Last Seen: 2025-04-28

GeneralInformation

cn-beijing.oss.aliyuncs.com

OpenPorts

111315172122374349801021041101111131191221351753113144274404434444465035135415485936026667717898118438738869539929931012102310801099111911531167117712001234125012911292129313371343136414331453145715151521155715991604172318001801191119621965197919842002200320082030205520672072208320872095212121812201222222592323233223452376240425582563262827612762285030013008302230493050305330563061307030763078309531163138315231683170318732603268330633103352338833893443352435513558378037904000402140224043406441174150415742824433443444434444444744664500450645104523455047864911499950015007500950105025517252015238525052545257543255005544559456005613590659075909591359205938598459855986599759986000600160026379644065126513658165886653666866866700677968877001700470717105717172187302734974157443754876017676777777787790802680458062807180818083808480878089809380998108811681268139814081458147815081518159816681698171818181868192820082368237824982808284829183008333838484088409842184298457853085338540854585568561858885938595859686238641864986638680868887288807883188348837886388648889889989699000900290129035904290479051906190709073907490829091909290999102911191129113912691389139914291449151915291579159916091699179919291959196920692139223924492479248925292929306933393519353938993989418950595299532975497619779987699029923999299979998999910001100031000610047100511013410249102501039710554109111093311002111121121011211112881148111680120001201612082120841210312139121421214312151121901219312200122031223112234122381224412248122491228012287122971229912305123091232412330123361233812345123511235412363123661236712368123801240112404124161244112449124511245412456124811248312492125011250812509125131251612530125431257512582126011290213084137801414714184143441487314905150001500215151155031600216019160211603016031160331604616047160581606616081160821608416094161021631616464169931700018007180081800918024180321804718052180551806018065180741807618079180811808518101181061823918245182641908219091200002001020053200602007020256205122054720600208002100121025210272123021233212452126521266212702128121330213792138121443215152200022001220222206722069225562342424082244422500125002250102508225105255652701527016270172801528017284432984029984300083002330122302223030130479307183102231337314223152231622323223240032764330603333834225365053777741800421944223542443432214402144158443034430444308443324481845001450054566747808479904888849121491524950249682496925000050004500505010050104511065123551294532005380554138544445544255443555535555459012600016012960443620786223763210632566325763260634436473865432
11 / tcp
-971970408 | 2025-04-15T09:20:36.669508
13 / tcp
-2127598635 | 2025-04-19T16:50:23.226813
15 / tcp
-1730858130 | 2025-04-06T14:03:35.388253
17 / tcp
-1559123399 | 2025-04-08T06:22:53.447777
21 / tcp
1564456597 | 2025-04-03T22:51:29.976169
22 / tcp
665193665 | 2025-04-09T08:14:34.910860
37 / tcp
-394428255 | 2025-04-26T17:18:45.712826
43 / tcp
-1399940268 | 2025-04-16T19:07:15.642451
49 / tcp
-1867457549 | 2025-04-28T08:30:05.585420
80 / tcp
906501480 | 2025-04-22T08:23:34.999585
102 / tcp
1426971893 | 2025-04-10T03:20:16.684018
104 / tcp
-2089734047 | 2025-03-31T15:01:32.562211
110 / tcp
-2089734047 | 2025-04-28T04:06:06.003407
111 / tcp
1545709575 | 2025-04-16T09:09:35.283023
113 / tcp
-414819019 | 2025-04-21T01:14:34.354036
119 / tcp
141730637 | 2025-04-11T06:25:08.606989
122 / tcp
-1327660293 | 2025-04-16T09:02:02.447290
135 / tcp
1141948216 | 2025-04-24T00:21:15.445695
175 / tcp
165188539 | 2025-04-08T06:18:51.648838
311 / tcp
749429829 | 2025-04-22T20:21:30.844600
314 / tcp
-904840257 | 2025-04-01T11:24:43.741758
427 / tcp
-349937125 | 2025-04-16T23:12:55.891904
440 / tcp
103159425 | 2025-04-03T18:48:41.830104
443 / tcp
1895747531 | 2025-04-22T17:22:31.696078
444 / tcp
-1013082686 | 2025-04-01T01:04:43.298309
446 / tcp
-1428621233 | 2025-04-27T21:37:47.399022
503 / tcp
-1327660293 | 2025-04-04T07:54:21.562428
513 / tcp
-1399940268 | 2025-04-28T02:51:21.268276
541 / tcp
1858569668 | 2025-04-24T19:38:12.493546
548 / tcp
1445639302 | 2025-04-22T07:18:28.067684
593 / tcp
1308377066 | 2025-04-21T05:51:13.406448
602 / tcp
1332894250 | 2025-04-05T09:29:58.366478
666 / tcp
1300162323 | 2025-04-27T22:27:47.269092
771 / tcp
-1399940268 | 2025-04-27T22:20:48.109416
789 / tcp
-1611764932 | 2025-04-28T04:54:49.655241
811 / tcp
165188539 | 2025-04-08T20:39:05.050966
843 / tcp
-2004989248 | 2025-04-23T05:30:03.460527
873 / tcp
-1970692834 | 2025-04-27T13:42:47.626890
886 / tcp
-2089734047 | 2025-04-05T17:57:43.535056
953 / tcp
-2089734047 | 2025-03-29T18:28:09.618731
992 / tcp
1814656027 | 2025-04-05T08:22:11.506182
993 / tcp
-1487943323 | 2025-04-07T15:42:29.430719
1012 / tcp
117101543 | 2025-04-06T11:43:38.670353
1023 / tcp
-1681927087 | 2025-04-27T17:53:25.571811
1080 / tcp
1362344524 | 2025-04-24T20:48:54.000462
1099 / tcp
-1611764932 | 2025-04-20T14:15:01.900973
1119 / tcp
-690472071 | 2025-04-09T16:22:45.527988
1153 / tcp
599074451 | 2025-04-22T03:27:37.627251
1167 / tcp
-2017887953 | 2025-04-15T06:53:22.177874
1177 / tcp
2087396567 | 2025-04-23T21:42:21.808638
1200 / tcp
2087396567 | 2025-04-01T22:08:23.680166
1234 / tcp
819727972 | 2025-04-15T21:48:43.342232
1250 / tcp
-1189269828 | 2025-04-22T20:22:12.686873
1291 / tcp
-249504111 | 2025-04-21T15:21:14.257691
1292 / tcp
709622286 | 2025-04-18T19:23:54.311061
1293 / tcp
-1733645023 | 2025-04-28T02:13:29.760803
1337 / tcp
1956828827 | 2025-04-26T18:15:12.522411
1343 / tcp
-1327660293 | 2025-04-28T06:24:44.586784
1364 / tcp
1911457608 | 2025-04-24T03:50:43.632273
1433 / tcp
419886129 | 2025-04-26T18:57:29.838182
1453 / tcp
-1538260461 | 2025-04-12T22:40:59.676087
1457 / tcp
1492413928 | 2025-04-20T12:35:26.051108
1515 / tcp
-952165951 | 2025-04-28T08:38:36.659597
1521 / tcp
-186520940 | 2025-04-17T01:33:13.793537
1557 / tcp
1911457608 | 2025-04-11T00:50:29.688216
1599 / tcp
819727972 | 2025-04-15T01:15:24.254964
1604 / tcp
2087396567 | 2025-04-01T17:33:40.508839
1723 / tcp
1103582599 | 2025-04-25T13:46:29.100913
1800 / tcp
-1648456501 | 2025-04-21T17:35:34.903278
1801 / tcp
1692069329 | 2025-04-10T22:30:32.436920
1911 / tcp
-1399940268 | 2025-04-23T23:54:47.296805
1962 / tcp
945910976 | 2025-04-22T21:12:52.445139
1965 / tcp
1911457608 | 2025-04-10T21:55:31.323745
1979 / tcp
2103111368 | 2025-04-27T18:22:46.026248
1984 / tcp
-42767839 | 2025-04-03T02:43:42.052272
2002 / tcp
819727972 | 2025-04-21T12:36:18.938932
2003 / tcp
89142341 | 2025-04-24T03:02:22.607094
2008 / tcp
-1839934832 | 2025-04-12T22:32:51.224373
2030 / tcp
1233062890 | 2025-04-22T14:43:47.497810
2055 / tcp
-1428621233 | 2025-04-10T14:29:38.592319
2067 / tcp
1911457608 | 2025-04-20T04:31:28.566256
2072 / tcp
-1399940268 | 2025-04-11T20:28:22.384724
2083 / tcp
2143387245 | 2025-04-21T23:44:42.439037
2087 / tcp
2087396567 | 2025-04-17T17:36:36.125113
2095 / tcp
-2096652808 | 2025-03-31T10:45:14.782765
2121 / tcp
141730637 | 2025-04-26T07:02:37.526780
2181 / tcp
546151771 | 2025-04-27T05:11:28.123217
2201 / tcp
-358801646 | 2025-04-04T17:04:51.915697
2222 / tcp
-1659353189 | 2025-04-20T07:16:45.308530
2259 / tcp
165188539 | 2025-04-25T08:52:22.033052
2323 / tcp
1662205251 | 2025-04-20T12:18:16.019756
2332 / tcp
962700458 | 2025-04-23T18:54:33.024352
2345 / tcp
-136006866 | 2025-04-14T16:52:57.598007
2376 / tcp
-971970408 | 2025-04-19T02:28:05.682917
2404 / tcp
165188539 | 2025-04-26T05:43:54.953034
2558 / tcp
1911457608 | 2025-04-02T18:32:01.604414
2563 / tcp
819727972 | 2025-04-01T16:30:49.057788
2628 / tcp
-1872120160 | 2025-04-24T12:41:48.375848
2761 / tcp
165188539 | 2025-04-23T11:22:49.050798
2762 / tcp
-2089734047 | 2025-04-02T11:54:25.997059
2850 / tcp
321971019 | 2025-04-08T05:34:18.887267
3001 / tcp
-1899074860 | 2025-04-26T06:51:50.002007
3008 / tcp
-1733106930 | 2025-04-11T16:53:06.799901
3022 / tcp
1278527606 | 2025-04-17T20:07:19.248430
3049 / tcp
-1399940268 | 2025-04-28T02:16:08.339321
3050 / tcp
-891714208 | 2025-04-25T02:02:50.568425
3053 / tcp
-1399940268 | 2025-04-28T03:53:39.263791
3056 / tcp
-1026951088 | 2025-04-03T20:34:18.245884
3061 / tcp
671605376 | 2025-04-25T00:11:30.477287
3070 / tcp
632542934 | 2025-04-10T01:34:45.932935
3076 / tcp
-1428621233 | 2025-04-12T10:04:58.884285
3078 / tcp
1919228981 | 2025-04-20T07:01:01.364357
3095 / tcp
2063598737 | 2025-04-17T23:11:10.751763
3116 / tcp
165188539 | 2025-04-11T07:16:33.472003
3138 / tcp
-1105333987 | 2025-04-19T16:50:46.499332
3152 / tcp
205347087 | 2025-04-05T20:48:28.399970
3168 / tcp
-1227409554 | 2025-04-06T23:58:07.794247
3170 / tcp
-1839934832 | 2025-04-16T20:25:53.216507
3187 / tcp
-1114821551 | 2025-04-20T10:59:54.711594
3260 / tcp
-862070606 | 2025-04-26T17:07:58.902774
3268 / tcp
1727372229 | 2025-04-12T22:15:39.257674
3306 / tcp
369808347 | 2025-04-15T18:48:33.331720
3310 / tcp
-1036370807 | 2025-04-09T19:20:01.161562
3352 / tcp
-653033013 | 2025-04-18T17:39:01.030604
3388 / tcp
-2096652808 | 2025-04-24T19:43:27.233556
3389 / tcp
740837454 | 2025-04-15T07:52:37.086902
3443 / tcp
455076604 | 2025-04-23T17:49:51.120947
3524 / tcp
-358801646 | 2025-04-22T18:50:32.472037
3551 / tcp
198844676 | 2025-04-12T21:48:29.285371
3558 / tcp
-1888448627 | 2025-04-09T18:11:40.966668
3780 / tcp
2087396567 | 2025-04-20T16:38:52.738023
3790 / tcp
-971970408 | 2025-04-27T17:53:44.650920
4000 / tcp
1123187653 | 2025-04-27T22:32:39.068843
4021 / tcp
-653033013 | 2025-04-10T22:12:27.134412
4022 / tcp
921225407 | 2025-04-05T08:20:35.868702
4043 / tcp
-1399940268 | 2025-04-22T21:47:09.572237
4064 / tcp
320677201 | 2025-04-04T17:32:09.889376
4117 / tcp
-1733645023 | 2025-04-11T17:33:59.388382
4150 / tcp
-1399940268 | 2025-04-17T11:26:21.119331
4157 / tcp
2087396567 | 2025-04-14T19:49:34.806483
4282 / tcp
2087396567 | 2025-04-20T01:17:58.890035
4433 / tcp
660175493 | 2025-04-23T18:03:13.090123
4434 / tcp
819727972 | 2025-04-22T13:03:45.604713
4443 / tcp
751161953 | 2025-04-01T15:23:08.589163
4444 / tcp
2087396567 | 2025-04-27T08:11:31.623971
4447 / tcp
-903067560 | 2025-04-19T16:14:55.529999
4466 / tcp
-1399940268 | 2025-04-18T00:46:11.856710
4500 / tcp
1761482307 | 2025-04-25T20:09:10.393919
4506 / tcp
-339084706 | 2025-04-06T22:40:55.342783
4510 / tcp
1911457608 | 2025-04-25T20:03:09.472658
4523 / tcp
-297128567 | 2025-04-11T15:08:47.568808
4550 / tcp
-1153110624 | 2025-04-02T21:02:59.548312
4786 / tcp
819727972 | 2025-04-22T10:48:51.379125
4911 / tcp
-249504111 | 2025-03-31T13:59:45.251355
4999 / tcp
1911457608 | 2025-04-20T19:52:32.692984
5001 / tcp
1286504516 | 2025-04-25T11:21:45.861622
5007 / tcp
1911457608 | 2025-04-22T22:33:46.390045
5009 / tcp
1182822286 | 2025-04-24T10:38:52.680577
5010 / tcp
-616720387 | 2025-04-19T21:51:43.516376
5025 / tcp
550048729 | 2025-04-19T19:38:50.502743
5172 / tcp
2087396567 | 2025-04-12T09:31:04.122807
5201 / tcp
398077695 | 2025-04-12T03:32:28.194193
5238 / tcp
-1399940268 | 2025-04-24T18:24:47.940553
5250 / tcp
819727972 | 2025-04-19T23:45:17.328194
5254 / tcp
819727972 | 2025-04-10T16:23:17.845976
5257 / tcp
-2089734047 | 2025-04-02T16:11:20.510255
5432 / tcp
165188539 | 2025-04-24T00:05:45.442106
5500 / tcp
1023953321 | 2025-04-17T12:39:03.200093
5544 / tcp
-2050145619 | 2025-04-20T15:43:11.659634
5594 / tcp
740837454 | 2025-04-04T11:21:46.144037
5600 / tcp
-1399940268 | 2025-04-18T03:05:47.430558
5613 / tcp
1911457608 | 2025-04-20T18:29:32.757139
5906 / tcp
-1249500036 | 2025-04-24T23:30:06.098888
5907 / tcp
-339084706 | 2025-04-09T09:47:56.122428
5909 / tcp
410249975 | 2025-04-07T21:12:52.547687
5913 / tcp
165188539 | 2025-04-04T21:11:19.926932
5920 / tcp
820958131 | 2025-04-15T22:02:05.565730
5938 / tcp
165188539 | 2025-04-26T11:29:13.640844
5984 / tcp
1999272906 | 2025-03-31T10:55:48.750955
5985 / tcp
0 | 2025-04-27T20:38:13.056371
5986 / tcp
-1045760528 | 2025-04-15T02:18:05.799150
5997 / tcp
165188539 | 2025-04-12T21:23:17.804318
5998 / tcp
-297057753 | 2025-04-20T11:03:57.540419
6000 / tcp
639175818 | 2025-04-19T13:02:11.494658
6001 / tcp
165188539 | 2025-04-24T07:16:14.941899
6002 / tcp
1632932802 | 2025-04-12T04:23:58.486172
6379 / tcp
321971019 | 2025-04-06T06:50:23.672590
6440 / tcp
-1329831334 | 2025-04-15T17:48:04.206963
6512 / tcp
1911457608 | 2025-04-03T01:44:36.881855
6513 / tcp
-1059554316 | 2025-04-03T18:16:37.282799
6581 / tcp
819727972 | 2025-04-21T05:02:23.224341
6588 / tcp
-653033013 | 2025-04-20T05:47:17.829441
6653 / tcp
165188539 | 2025-04-16T04:48:35.253457
6668 / tcp
321971019 | 2025-04-20T21:00:58.076344
6686 / tcp
-1699556818 | 2025-04-12T17:55:34.654194
6700 / tcp
819727972 | 2025-04-03T15:40:53.176676
6779 / tcp
-2033111675 | 2025-04-26T23:49:05.935418
6887 / tcp
-1297953727 | 2025-04-21T15:36:49.070561
7001 / tcp
1827807483 | 2025-04-26T15:04:53.605355
7004 / tcp
694172010 | 2025-04-22T00:37:33.588052
7071 / tcp
1741579575 | 2025-04-06T17:03:52.101999
7105 / tcp
51259122 | 2025-04-21T18:53:48.790257
7171 / tcp
819727972 | 2025-04-17T12:53:39.462115
7218 / tcp
1286504516 | 2025-04-18T01:40:24.272239
7302 / tcp
-1013082686 | 2025-04-17T12:25:48.081269
7349 / tcp
-1399940268 | 2025-04-23T06:04:26.414714
7415 / tcp
15018106 | 2025-04-14T16:30:06.681564
7443 / tcp
1342763855 | 2025-04-07T21:13:13.639166
7548 / tcp
-971970408 | 2025-04-23T12:41:00.715539
7601 / tcp
-1730858130 | 2025-04-20T22:43:11.604107
7676 / tcp
-913917757 | 2025-04-27T04:40:14.549071
7777 / tcp
1391945995 | 2025-04-07T10:10:00.431867
7778 / tcp
-1888448627 | 2025-04-12T14:01:21.785814
7790 / tcp
677934968 | 2025-04-15T21:02:14.963119
8026 / tcp
1911457608 | 2025-04-22T02:41:06.144323
8045 / tcp
2139917906 | 2025-04-15T15:31:49.882585
8062 / tcp
-1399940268 | 2025-04-27T08:41:42.549257
8071 / tcp
-1888448627 | 2025-04-26T09:47:21.336758
8081 / tcp
-454087041 | 2025-04-01T03:43:22.308619
8083 / tcp
459162008 | 2025-04-07T17:50:20.302825
8084 / tcp
709622286 | 2025-04-07T02:42:44.764895
8087 / tcp
921225407 | 2025-04-26T18:29:15.225319
8089 / tcp
-971970408 | 2025-04-04T08:40:10.017247
8093 / tcp
1705528964 | 2025-04-08T22:57:20.038461
8099 / tcp
1115736665 | 2025-04-21T17:53:50.817755
8108 / tcp
1996932384 | 2025-04-10T17:55:00.233220
8116 / tcp
-1327660293 | 2025-04-09T14:35:29.020073
8126 / tcp
-971970408 | 2025-04-07T18:50:50.782392
8139 / tcp
-1013082686 | 2025-04-23T18:32:37.968358
8140 / tcp
1426971893 | 2025-04-03T14:51:22.727233
8145 / tcp
1723769361 | 2025-04-15T19:52:51.282542
8147 / tcp
-1730858130 | 2025-04-11T17:14:34.770135
8150 / tcp
-1279886438 | 2025-04-21T23:18:19.983272
8151 / tcp
1911457608 | 2025-04-24T03:36:46.670852
8159 / tcp
-1899074860 | 2025-04-24T01:51:02.491023
8166 / tcp
1911457608 | 2025-03-31T14:52:53.746457
8169 / tcp
-1399940268 | 2025-04-26T03:19:46.933422
8171 / tcp
-1399940268 | 2025-04-22T22:26:16.960874
8181 / tcp
819727972 | 2025-04-28T01:02:15.909496
8186 / tcp
819727972 | 2025-04-23T04:07:06.374708
8192 / tcp
81614701 | 2025-04-01T00:41:26.555653
8200 / tcp
1320285193 | 2025-04-01T07:37:08.811436
8236 / tcp
819727972 | 2025-04-05T11:53:33.549061
8237 / tcp
1911457608 | 2025-04-05T22:33:33.337814
8249 / tcp
-1888448627 | 2025-04-10T09:27:41.205048
8280 / tcp
165188539 | 2025-04-07T12:01:43.845272
8284 / tcp
819727972 | 2025-04-09T15:22:15.537660
8291 / tcp
-1399940268 | 2025-04-16T10:15:57.559176
8300 / tcp
-734440417 | 2025-04-16T21:03:29.043811
8333 / tcp
-1713467553 | 2025-04-26T20:37:57.578055
8384 / tcp
1778988322 | 2025-04-04T07:25:39.033672
8408 / tcp
-1399940268 | 2025-03-31T06:16:30.787405
8409 / tcp
1623746877 | 2025-04-04T12:47:12.471500
8421 / tcp
-1626979812 | 2025-04-17T12:13:57.220911
8429 / tcp
-1399940268 | 2025-04-20T06:09:42.653330
8457 / tcp
165188539 | 2025-04-08T22:14:47.033102
8530 / tcp
-1230049476 | 2025-04-25T17:55:59.830690
8533 / tcp
-1399940268 | 2025-04-26T15:38:21.684540
8540 / tcp
677934968 | 2025-04-18T12:30:31.055848
8545 / tcp
1210754493 | 2025-04-15T17:06:48.878126
8556 / tcp
-1453516345 | 2025-04-11T14:09:31.196303
8561 / tcp
-1036370807 | 2025-04-22T17:37:52.498448
8588 / tcp
1189133115 | 2025-04-27T00:10:36.363845
8593 / tcp
-1279886438 | 2025-04-06T09:56:52.020689
8595 / tcp
-1261090339 | 2025-04-19T10:22:33.008651
8596 / tcp
1911457608 | 2025-04-07T22:00:12.652099
8623 / tcp
-1996280214 | 2025-04-22T23:55:15.730265
8641 / tcp
-1036370807 | 2025-04-26T09:27:52.849863
8649 / tcp
842535728 | 2025-04-19T02:33:39.473956
8663 / tcp
1615193817 | 2025-04-24T05:00:05.436181
8680 / tcp
-1428621233 | 2025-03-31T05:48:23.278717
8688 / tcp
-2096652808 | 2025-03-29T22:07:18.172870
8728 / tcp
1077013874 | 2025-04-18T05:06:19.800767
8807 / tcp
-2096652808 | 2025-04-17T22:11:57.695400
8831 / tcp
1615193817 | 2025-03-29T22:23:32.756274
8834 / tcp
-1713437100 | 2025-04-17T23:49:00.885565
8837 / tcp
-653033013 | 2025-04-18T01:44:58.102433
8863 / tcp
1332894250 | 2025-04-26T21:10:41.806427
8864 / tcp
-274082663 | 2025-04-17T19:36:40.035176
8889 / tcp
2087396567 | 2025-04-07T03:32:35.699424
8899 / tcp
372433470 | 2025-04-08T09:58:21.416202
8969 / tcp
819727972 | 2025-04-05T20:36:30.854594
9000 / tcp
-2067028711 | 2025-04-09T11:30:59.033035
9002 / tcp
1278527606 | 2025-04-21T02:15:37.282565
9012 / tcp
-2089734047 | 2025-04-17T09:13:36.335911
9035 / tcp
-339084706 | 2025-04-16T13:59:29.375302
9042 / tcp
1887224352 | 2025-03-31T15:41:50.916238
9047 / tcp
-1327660293 | 2025-04-15T13:50:17.168881
9051 / tcp
1286504516 | 2025-04-28T02:43:26.394781
9061 / tcp
-1189269828 | 2025-04-17T16:26:28.248374
9070 / tcp
819727972 | 2025-04-11T10:45:41.071967
9073 / tcp
-1399940268 | 2025-04-12T06:22:47.451727
9074 / tcp
-1888448627 | 2025-04-03T19:17:23.102137
9082 / tcp
632542934 | 2025-04-24T00:26:46.371973
9091 / tcp
-1026951088 | 2025-04-26T08:17:19.551558
9092 / tcp
740837454 | 2025-04-27T17:04:48.821760
9099 / tcp
638001051 | 2025-04-05T13:03:44.472486
9102 / tcp
819727972 | 2025-04-12T06:30:14.146825
9111 / tcp
-1399940268 | 2025-04-24T13:23:13.182575
9112 / tcp
-2140303521 | 2025-04-10T04:32:59.290456
9113 / tcp
1911457608 | 2025-04-11T17:13:44.976954
9126 / tcp
921225407 | 2025-04-27T15:20:05.070640
9138 / tcp
-2089734047 | 2025-04-12T06:23:16.910424
9139 / tcp
-1888448627 | 2025-04-14T21:16:45.288332
9142 / tcp
-2096652808 | 2025-04-11T19:25:00.863103
9144 / tcp
-2089734047 | 2025-04-06T21:12:35.110806
9151 / tcp
474736340 | 2025-04-20T00:15:52.085918
9152 / tcp
-1399940268 | 2025-04-05T17:45:12.729615
9157 / tcp
-1399940268 | 2025-04-16T06:28:28.597431
9159 / tcp
-441419608 | 2025-04-17T10:10:55.820693
9160 / tcp
632542934 | 2025-04-25T16:52:03.897465
9169 / tcp
580340387 | 2025-04-21T10:56:21.613157
9179 / tcp
-441419608 | 2025-04-18T17:46:29.639832
9192 / tcp
632542934 | 2025-04-20T20:41:49.158979
9195 / tcp
819727972 | 2025-04-12T23:18:59.564661
9196 / tcp
-1059554316 | 2025-04-20T10:55:06.998105
9206 / tcp
165188539 | 2025-04-25T17:18:50.704978
9213 / tcp
819727972 | 2025-04-25T13:52:22.540435
9223 / tcp
1948301213 | 2025-04-23T07:54:05.356029
9244 / tcp
-2033111675 | 2025-04-05T02:02:36.980395
9247 / tcp
-136006866 | 2025-04-08T06:50:18.662181
9248 / tcp
-1036370807 | 2025-04-21T03:56:23.938511
9252 / tcp
-1399940268 | 2025-03-31T16:24:05.366471
9292 / tcp
410249975 | 2025-04-25T14:39:48.976647
9306 / tcp
-1730858130 | 2025-04-21T13:13:13.967428
9333 / tcp
2087396567 | 2025-04-08T06:19:05.244889
9351 / tcp
819727972 | 2025-04-02T22:31:25.806780
9353 / tcp
1996932384 | 2025-04-03T07:29:11.589392
9389 / tcp
1911457608 | 2025-04-28T03:43:41.839799
9398 / tcp
-971970408 | 2025-04-18T21:50:02.914275
9418 / tcp
1909672637 | 2025-04-23T04:02:41.706088
9505 / tcp
921225407 | 2025-04-16T21:31:00.011096
9529 / tcp
-1329831334 | 2025-04-24T01:20:58.001774
9532 / tcp
-1399940268 | 2025-04-07T12:00:05.293967
9754 / tcp
-1399940268 | 2025-03-31T20:18:24.050487
9761 / tcp
-1399940268 | 2025-04-25T01:07:20.887211
9779 / tcp
-1487943323 | 2025-04-01T13:12:43.456821
9876 / tcp
2109639173 | 2025-04-23T12:25:44.329548
9902 / tcp
1615193817 | 2025-04-24T00:31:10.927394
9923 / tcp
1911457608 | 2025-04-19T06:57:57.214861
9992 / tcp
632542934 | 2025-04-08T16:45:57.517966
9997 / tcp
165188539 | 2025-03-31T07:27:09.559670
9998 / tcp
-347274959 | 2025-04-01T14:40:54.690850
9999 / tcp
1161309183 | 2025-04-24T04:52:19.505890
10001 / tcp
1492413928 | 2025-04-09T16:15:46.439707
10003 / tcp
-1140468363 | 2025-04-04T17:54:26.373741
10006 / tcp
-1947777893 | 2025-04-27T01:04:49.246710
10047 / tcp
-1611764932 | 2025-04-19T20:56:35.830412
10051 / tcp
171352214 | 2025-04-06T11:48:29.696545
10134 / tcp
-1598265216 | 2025-04-25T17:41:32.621585
10249 / tcp
671605376 | 2025-04-28T03:57:32.214843
10250 / tcp
-68075478 | 2025-04-11T01:37:03.658644
10397 / tcp
-2089734047 | 2025-04-24T02:47:22.605247
10554 / tcp
819727972 | 2025-04-06T19:21:41.348054
10911 / tcp
820958131 | 2025-04-27T11:45:00.219354
10933 / tcp
819727972 | 2025-04-17T11:08:21.504731
11002 / tcp
-1399940268 | 2025-04-21T20:36:40.385385
11112 / tcp
-1399940268 | 2025-04-15T14:08:47.350690
11210 / tcp
401555314 | 2025-04-25T03:09:20.826968
11211 / tcp
-136006866 | 2025-04-19T10:47:47.877814
11288 / tcp
-122096153 | 2025-04-11T07:32:09.170868
11481 / tcp
1189133115 | 2025-04-15T22:00:52.503966
11680 / tcp
1948301213 | 2025-04-25T10:01:55.343458
12000 / tcp
227700176 | 2025-04-25T19:26:00.899718
12016 / tcp
-1888448627 | 2025-04-23T22:42:57.896226
12082 / tcp
1911457608 | 2025-04-12T17:47:25.160641
12084 / tcp
1492413928 | 2025-04-24T00:25:07.330076
12103 / tcp
971933601 | 2025-04-26T08:22:12.276154
12139 / tcp
-1114821551 | 2025-04-05T20:14:03.602593
12142 / tcp
-2096652808 | 2025-04-12T17:44:18.453532
12143 / tcp
-1730858130 | 2025-04-06T04:31:49.335234
12151 / tcp
401555314 | 2025-04-17T21:52:28.291830
12190 / tcp
-891714208 | 2025-04-27T14:56:50.455665
12193 / tcp
-2096652808 | 2025-04-01T00:00:54.777200
12200 / tcp
-249504111 | 2025-04-05T06:42:49.613150
12203 / tcp
709622286 | 2025-04-25T14:48:28.728084
12231 / tcp
-1810987450 | 2025-04-08T11:01:50.695155
12234 / tcp
165188539 | 2025-04-23T20:18:51.096416
12238 / tcp
-1327660293 | 2025-04-15T10:18:39.527326
12244 / tcp
165188539 | 2025-04-19T20:02:53.810061
12248 / tcp
1308377066 | 2025-04-05T12:02:29.891302
12249 / tcp
321971019 | 2025-04-19T16:52:49.919491
12280 / tcp
1911457608 | 2025-04-16T11:48:52.831867
12287 / tcp
1723769361 | 2025-04-24T19:05:22.830897
12297 / tcp
-1399940268 | 2025-04-10T02:36:36.028200
12299 / tcp
1278527606 | 2025-04-17T20:04:03.513152
12305 / tcp
-1327660293 | 2025-04-28T07:25:10.649609
12309 / tcp
-1399940268 | 2025-04-05T15:45:22.847804
12324 / tcp
-136006866 | 2025-04-05T17:12:23.181721
12330 / tcp
-2089734047 | 2025-04-09T14:30:45.221863
12336 / tcp
-1737707071 | 2025-04-17T18:11:55.710503
12338 / tcp
1911457608 | 2025-04-24T21:51:17.875635
12345 / tcp
296364507 | 2025-04-27T04:49:57.004961
12351 / tcp
-1888448627 | 2025-04-23T02:53:22.665025
12354 / tcp
-1888448627 | 2025-04-22T04:00:54.975540
12363 / tcp
307999478 | 2025-04-10T05:43:53.500488
12366 / tcp
1642597142 | 2025-04-24T17:58:22.906949
12367 / tcp
-1428621233 | 2025-04-16T17:04:56.975076
12368 / tcp
819727972 | 2025-04-28T10:51:16.044043
12380 / tcp
2103111368 | 2025-04-24T20:17:07.217621
12401 / tcp
632542934 | 2025-04-16T21:05:16.067151
12404 / tcp
455076604 | 2025-04-27T03:57:26.066263
12416 / tcp
408230060 | 2025-04-26T04:23:27.045177
12441 / tcp
-2089734047 | 2025-04-15T13:46:03.581525
12449 / tcp
819727972 | 2025-04-24T23:03:32.727083
12451 / tcp
1911457608 | 2025-04-01T22:31:25.801639
12454 / tcp
-1487943323 | 2025-04-20T20:44:58.168506
12456 / tcp
-358801646 | 2025-04-21T03:19:22.863492
12481 / tcp
-1399940268 | 2025-04-22T18:54:57.422422
12483 / tcp
819727972 | 2025-04-06T03:31:15.165692
12492 / tcp
1911457608 | 2025-04-18T13:22:40.219263
12501 / tcp
897328069 | 2025-04-19T19:33:43.222947
12508 / tcp
-1399940268 | 2025-04-11T18:58:49.256130
12509 / tcp
1623746877 | 2025-04-25T00:00:00.317110
12513 / tcp
-2031152423 | 2025-04-20T03:00:10.496558
12516 / tcp
2098371729 | 2025-04-07T19:33:14.709706
12530 / tcp
-2096652808 | 2025-04-15T10:38:18.933632
12543 / tcp
-2031152423 | 2025-04-23T17:50:06.776510
12575 / tcp
-1399940268 | 2025-04-07T12:35:25.543970
12582 / tcp
165188539 | 2025-04-21T21:41:42.536518
12601 / tcp
1911457608 | 2025-04-14T19:25:05.058248
12902 / tcp
-1399940268 | 2025-04-02T18:56:04.620415
13084 / tcp
819727972 | 2025-04-24T18:51:30.744928
13780 / tcp
1911457608 | 2025-04-17T22:37:55.079894
14147 / tcp
-1399940268 | 2025-04-18T20:03:59.010480
14184 / tcp
-358801646 | 2025-04-20T16:17:45.074394
14344 / tcp
321971019 | 2025-04-23T03:28:41.710424
14873 / tcp
707919486 | 2025-04-24T21:49:26.320498
14905 / tcp
1665283070 | 2025-04-10T14:12:44.925554
15000 / tcp
1509130814 | 2025-04-03T16:17:12.948831
15002 / tcp
616471057 | 2025-04-26T13:57:51.363359
15151 / tcp
1723769361 | 2025-04-20T23:04:05.857936
15503 / tcp
1911457608 | 2025-04-21T18:26:55.926662
16002 / tcp
-1399940268 | 2025-04-21T20:17:01.416852
16019 / tcp
1911457608 | 2025-04-07T17:45:34.242052
16021 / tcp
-1399940268 | 2025-04-08T21:29:49.464472
16030 / tcp
-2118655245 | 2025-04-26T21:54:48.801829
16031 / tcp
-2096652808 | 2025-04-23T00:35:34.424628
16033 / tcp
-1399940268 | 2025-04-15T17:21:22.927624
16046 / tcp
-1399940268 | 2025-04-11T22:14:21.535244
16047 / tcp
-358801646 | 2025-04-28T00:39:45.312092
16058 / tcp
-2033111675 | 2025-04-20T20:49:01.650333
16066 / tcp
-1839934832 | 2025-04-15T18:11:25.056579
16081 / tcp
707919486 | 2025-04-15T16:50:08.476931
16082 / tcp
165188539 | 2025-04-02T20:24:10.913609
16084 / tcp
165188539 | 2025-04-25T02:26:41.509754
16094 / tcp
-303199180 | 2025-04-20T17:21:15.459258
16102 / tcp
-1888448627 | 2025-04-02T01:30:27.785607
16316 / tcp
1911457608 | 2025-04-26T15:52:26.990678
16464 / tcp
2087396567 | 2025-04-02T09:59:11.284188
16993 / tcp
-445721795 | 2025-04-27T23:37:07.406878
17000 / tcp
-1810987450 | 2025-04-03T20:17:35.761370
18007 / tcp
722711397 | 2025-04-18T17:14:47.194152
18008 / tcp
819727972 | 2025-04-18T11:55:58.065381
18009 / tcp
-1375131644 | 2025-04-11T02:08:15.770902
18024 / tcp
-345718689 | 2025-04-22T07:18:55.059720
18032 / tcp
1726594447 | 2025-04-27T01:11:57.615264
18047 / tcp
321971019 | 2025-04-21T20:31:30.942224
18052 / tcp
1011407350 | 2025-04-19T12:42:22.486019
18055 / tcp
2143387245 | 2025-04-21T23:53:51.519170
18060 / tcp
632542934 | 2025-04-23T20:42:44.393745
18065 / tcp
401555314 | 2025-04-15T14:20:09.694004
18074 / tcp
-653033013 | 2025-04-09T07:03:09.613568
18076 / tcp
1332894250 | 2025-04-02T03:12:02.372863
18079 / tcp
1332894250 | 2025-04-03T19:41:48.601664
18081 / tcp
-1399940268 | 2025-04-23T13:48:43.547187
18085 / tcp
-891714208 | 2025-04-09T15:01:40.348836
18101 / tcp
1473380279 | 2025-04-14T19:59:30.262029
18106 / tcp
-1733645023 | 2025-04-09T08:55:44.993871
18239 / tcp
1911457608 | 2025-04-06T11:48:58.744718
18245 / tcp
-904840257 | 2025-04-27T23:28:24.769123
18264 / tcp
1543809371 | 2025-04-08T01:41:12.668583
19082 / tcp
-1399940268 | 2025-04-06T03:46:01.549354
19091 / tcp
-2089734047 | 2025-04-11T20:49:51.946315
20000 / tcp
1900503736 | 2025-04-08T05:17:35.773128
20010 / tcp
819727972 | 2025-04-24T12:02:13.436989
20053 / tcp
-980525298 | 2025-04-25T13:05:08.094486
20060 / tcp
165188539 | 2025-04-15T05:38:52.313348
20070 / tcp
-1399940268 | 2025-04-20T08:11:39.469599
20256 / tcp
-1399940268 | 2025-04-21T18:35:39.261069
20512 / tcp
-616720387 | 2025-04-17T11:38:00.871642
20547 / tcp
-1327660293 | 2025-04-12T22:34:07.129455
20600 / tcp
1308377066 | 2025-04-01T15:11:04.183123
20800 / tcp
-358801646 | 2025-04-11T06:06:53.379887
21001 / tcp
89142341 | 2025-04-15T01:32:56.396927
21025 / tcp
1741579575 | 2025-04-26T20:52:53.738957
21027 / tcp
104385780 | 2025-04-04T09:35:59.902844
21230 / tcp
1210754493 | 2025-04-25T22:27:29.341708
21233 / tcp
819727972 | 2025-04-06T10:49:18.539637
21245 / tcp
-1947777893 | 2025-04-12T21:02:27.541269
21265 / tcp
-801484042 | 2025-04-22T15:05:23.154771
21266 / tcp
-1399940268 | 2025-03-29T15:38:48.113871
21270 / tcp
-358801646 | 2025-04-06T23:24:30.378811
21281 / tcp
1077013874 | 2025-04-04T04:56:52.407806
21330 / tcp
-1477838366 | 2025-04-27T20:13:13.938307
21379 / tcp
1189133115 | 2025-04-12T20:04:07.445158
21381 / tcp
722711397 | 2025-04-09T19:31:00.063225
21443 / tcp
669849225 | 2025-04-06T02:53:43.212306
21515 / tcp
671605376 | 2025-04-04T17:05:16.607625
22000 / tcp
117101543 | 2025-04-01T18:57:15.044506
22001 / tcp
819727972 | 2025-04-04T05:28:31.469385
22022 / tcp
740837454 | 2025-04-05T01:18:32.767998
22067 / tcp
-786044033 | 2025-04-02T04:01:28.687208
22069 / tcp
1741579575 | 2025-04-01T06:02:18.927408
22556 / tcp
-345718689 | 2025-04-08T04:36:12.541456
23424 / tcp
-1999117212 | 2025-04-12T09:11:27.349300
24082 / tcp
-1399940268 | 2025-04-24T13:15:07.157365
24442 / tcp
-457235091 | 2025-04-20T13:30:25.387362
25001 / tcp
165188539 | 2025-04-22T19:29:48.140656
25002 / tcp
1353260875 | 2025-04-16T18:23:35.821687
25010 / tcp
632542934 | 2025-04-22T07:26:27.943106
25082 / tcp
1911457608 | 2025-03-31T07:54:11.699289
25105 / tcp
539065883 | 2025-04-12T11:45:30.883243
25565 / tcp
-1795027372 | 2025-04-04T06:36:27.068246
27015 / tcp
-481785538 | 2025-04-28T09:24:30.293008
27016 / tcp
-971970408 | 2025-04-11T22:40:58.728302
27017 / tcp
1763259671 | 2025-04-15T00:35:50.224330
28015 / tcp
51259122 | 2025-04-16T18:21:10.439152
28017 / tcp
-2081419599 | 2025-04-12T01:37:46.058811
28443 / tcp
-1099385124 | 2025-04-25T07:49:12.616542
29840 / tcp
1353260875 | 2025-04-19T18:03:42.277236
29984 / tcp
-1327660293 | 2025-04-11T08:12:18.304402
30008 / tcp
1975288991 | 2025-04-18T13:07:47.196380
30023 / tcp
-1730858130 | 2025-04-25T10:21:00.759444
30122 / tcp
-746114901 | 2025-04-06T04:25:18.829837
30222 / tcp
-1730858130 | 2025-04-05T19:34:31.827388
30301 / tcp
-1189269828 | 2025-04-09T07:28:14.395088
30479 / tcp
-1399940268 | 2025-04-19T01:22:25.643741
30718 / tcp
428036883 | 2025-04-02T23:25:50.541217
31022 / tcp
2087396567 | 2025-04-05T18:06:45.432993
31337 / tcp
756886313 | 2025-04-24T00:39:14.877054
31422 / tcp
1690634669 | 2025-04-05T07:30:43.869571
31522 / tcp
-1059554316 | 2025-04-04T22:40:09.661211
31622 / tcp
-1990350878 | 2025-04-04T15:39:41.483250
32322 / tcp
-903067560 | 2025-04-04T21:01:52.599339
32400 / tcp
2087396567 | 2025-04-12T03:43:22.026312
32764 / tcp
799468586 | 2025-04-01T10:02:51.815610
33060 / tcp
1308377066 | 2025-04-24T06:35:09.120758
33338 / tcp
114471724 | 2025-04-11T16:09:12.115388
34225 / tcp
-146605374 | 2025-04-23T01:05:46.722723
36505 / tcp
1830187220 | 2025-04-24T20:15:15.577776
37777 / tcp
1381121983 | 2025-04-20T10:04:36.698262
41800 / tcp
1623746877 | 2025-04-24T09:42:55.608651
42194 / tcp
639175818 | 2025-04-08T18:48:18.619564
42235 / tcp
-1399940268 | 2025-04-25T02:05:44.350890
42443 / tcp
632542934 | 2025-04-11T02:43:10.603616
43221 / tcp
1911457608 | 2025-04-22T12:13:44.729897
44021 / tcp
819727972 | 2025-03-31T21:09:53.710951
44158 / tcp
-433302150 | 2025-04-18T10:25:30.398679
44303 / tcp
408230060 | 2025-04-12T10:39:22.691001
44304 / tcp
-2089734047 | 2025-04-15T04:05:04.936763
44308 / tcp
-339084706 | 2025-04-04T18:20:15.824883
44332 / tcp
-375604792 | 2025-04-20T19:06:57.168230
44818 / tcp
1426971893 | 2025-04-11T05:34:21.516100
45001 / tcp
819727972 | 2025-04-27T22:16:17.157839
45005 / tcp
1282941221 | 2025-04-15T13:17:54.038894
45667 / tcp
1911457608 | 2025-04-09T21:30:14.597383
47808 / tcp
474736340 | 2025-04-10T18:46:30.682788
47990 / tcp
819727972 | 2025-04-14T19:42:46.607742
48888 / tcp
-1888448627 | 2025-03-29T12:53:42.821976
49121 / tcp
-1399940268 | 2025-04-04T10:53:35.197490
49152 / tcp
-447260792 | 2025-04-11T04:00:41.389057
49502 / tcp
-1746074029 | 2025-04-11T12:41:05.765808
49682 / tcp
-2089734047 | 2025-04-09T17:55:37.831012
49692 / tcp
-1399940268 | 2025-04-27T13:33:24.605660
50000 / tcp
2087396567 | 2025-04-26T03:48:13.375461
50004 / tcp
-249504111 | 2025-04-04T11:17:29.011492
50050 / tcp
-1461540015 | 2025-04-10T23:38:39.751509
50100 / tcp
290819026 | 2025-04-21T01:36:42.040279
50104 / tcp
580340387 | 2025-04-18T08:32:54.651329
51106 / tcp
-527005584 | 2025-04-10T19:48:14.068165
51235 / tcp
165188539 | 2025-04-20T00:01:58.457952
51294 / tcp
1911457608 | 2025-04-24T04:37:47.889195
53200 / tcp
-358801646 | 2025-04-14T23:26:07.657347
53805 / tcp
-1399940268 | 2025-04-16T18:07:47.033389
54138 / tcp
-653033013 | 2025-04-23T03:57:02.691976
54444 / tcp
669849225 | 2025-04-07T23:54:58.784086
55442 / tcp
-1316491703 | 2025-04-10T02:34:25.290116
55443 / tcp
819727972 | 2025-04-01T01:17:48.218333
55553 / tcp
1850902677 | 2025-04-28T10:00:42.324336
55554 / tcp
842535728 | 2025-04-10T00:11:06.172468
59012 / tcp
401555314 | 2025-04-21T13:28:16.669004
60001 / tcp
-971970408 | 2025-04-09T18:57:29.404446
60129 / tcp
585675468 | 2025-04-03T19:02:32.782523
60443 / tcp
115332119 | 2025-04-23T13:19:12.168103
62078 / tcp
-154616015 | 2025-04-25T00:45:53.537610
62237 / tcp
1911457608 | 2025-04-01T23:53:19.006130
63210 / tcp
-1358907795 | 2025-04-19T10:52:31.985821
63256 / tcp
-79865617 | 2025-04-23T21:54:04.525257
63257 / tcp
1741579575 | 2025-04-06T22:33:14.298315
63260 / tcp
1842524259 | 2025-04-07T06:52:33.082410
63443 / tcp
165188539 | 2025-04-04T05:59:42.517939
64738 / tcp
2087396567 | 2025-04-09T22:25:32.198047
65432 / tcp
-2096652808 | 2025-04-22T16:27:20.422299

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(1)
CVE-2025-26465
6.8A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
2024(2)
CVE-2024-25117
6.8php-svg-lib is a scalable vector graphics (SVG) file parsing/rendering library. Prior to version 0.5.2, php-svg-lib fails to validate that font-family doesn't contain a PHAR url, which might leads to RCE on PHP < 8.0, and doesn't validate if external references are allowed. This might leads to bypass of restrictions or RCE on projects that are using it, if they do not strictly revalidate the fontName that is passed by php-svg-lib. The `Style::fromAttributes(`), or the `Style::parseCssStyle()` should check the content of the `font-family` and prevents it to use a PHAR url, to avoid passing an invalid and dangerous `fontName` value to other libraries. The same check as done in the `Style::fromStyleSheets` might be reused. Libraries using this library as a dependency might be vulnerable to some bypass of restrictions, or even remote code execution, if they do not double check the value of the `fontName` that is passed by php-svg-lib. Version 0.5.2 contains a fix for this issue.
CVE-2024-5458
5.3In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly.
2023(4)
CVE-2023-51767
7.0OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385
6.5In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-48795
5.9The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-38408
9.8The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
2022(7)
CVE-2022-37454
9.8The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.
CVE-2022-31630
6.5In PHP versions prior to 7.4.33, 8.0.25 and 8.1.12, when using imageloadfont() function in gd extension, it is possible to supply a specially crafted font file, such as if the loaded font is used with imagechar() function, the read outside allocated buffer will be used. This can lead to crashes or disclosure of confidential information. 
CVE-2022-31629
6.5In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.
CVE-2022-31628
2.3In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar uncompressor code would recursively uncompress "quines" gzip files, resulting in an infinite loop.
CVE-2022-31626
7.5In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when pdo_mysql extension with mysqlnd driver, if the third party is allowed to supply host to connect to and the password for the connection, password of excessive length can trigger a buffer overflow in PHP, which can lead to a remote code execution vulnerability.
CVE-2022-31625
8.1In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when using Postgres database extension, supplying invalid parameters to the parametrized query may lead to PHP attempting to free memory using uninitialized data as pointers. This could lead to RCE vulnerability or denial of service.
CVE-2022-4900
6.2A vulnerability was found in PHP where setting the environment variable PHP_CLI_SERVER_WORKERS to a large value leads to a heap buffer overflow.
2021(8)
CVE-2021-41617
7.0sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368
3.7An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
CVE-2021-21708
8.2In PHP versions 7.4.x below 7.4.28, 8.0.x below 8.0.16, and 8.1.x below 8.1.3, when using filter functions with FILTER_VALIDATE_FLOAT filter and min/max limits, if the filter fails, there is a possibility to trigger use of allocated memory after free, which can result it crashes, and potentially in overwrite of other memory chunks and RCE. This issue affects: code that uses FILTER_VALIDATE_FLOAT with min/max limits.
CVE-2021-21707
5.3In PHP versions 7.3.x below 7.3.33, 7.4.x below 7.4.26 and 8.0.x below 8.0.13, certain XML parsing functions, like simplexml_load_file(), URL-decode the filename passed to them. If that filename contains URL-encoded NUL character, this may cause the function to interpret this as the end of the filename, thus interpreting the filename differently from what the user intended, which may lead it to reading a different file than intended.
CVE-2021-21706
5.3In PHP versions 7.3.x below 7.3.31, 7.4.x below 7.4.24 and 8.0.x below 8.0.11, in Microsoft Windows environment, ZipArchive::extractTo may be tricked into writing a file outside target directory when extracting a ZIP file, thus potentially causing files to be created or overwritten, subject to OS permissions.
CVE-2021-21705
4.3In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
CVE-2021-21704
5.0In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using Firebird PDO driver extension, a malicious database server could cause crashes in various database functions, such as getAttribute(), execute(), fetch() and others by returning invalid response data that is not parsed correctly by the driver. This can result in crashes, denial of service or potentially memory corruption.
CVE-2021-21703
7.8In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the main process and write to it, modifying it in a way that would cause the root process to conduct invalid memory reads and writes, which can be used to escalate privileges from local unprivileged user to the root user.
2020(2)
CVE-2020-15778
7.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145
5.9The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
2019(4)
CVE-2019-16905
7.8OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVE-2019-6111
5.9An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110
6.8In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109
6.8An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
2018(3)
CVE-2018-20685
5.3In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-15919
5.3Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473
5.3OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
2017(4)
CVE-2017-15906
5.3The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
CVE-2017-9120
9.8PHP 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an Integer overflow in mysqli_real_escape_string.
CVE-2017-9118
7.5PHP 7.1.5 has an Out of bounds access in php_pcre_replace_impl via a crafted preg_replace call.
CVE-2017-8923
9.8The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.
2016(9)
CVE-2016-20012
5.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2016-10708
7.5sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
CVE-2016-10012
7.8The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
CVE-2016-10011
5.5authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
CVE-2016-10010
7.0sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
CVE-2016-10009
7.3Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
CVE-2016-3115
6.4Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
CVE-2016-1908
9.8The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
CVE-2016-0777
6.5The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
2015(4)
CVE-2015-6564
6.9Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
CVE-2015-6563
1.9The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
CVE-2015-5600
8.5The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
CVE-2015-5352
4.3The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
2014(3)
CVE-2014-2653
5.8The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532
4.9sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2014-1692
7.5The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
2013(1)
CVE-2013-2220
7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
2012(1)
CVE-2012-0814
3.5The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
2011(2)
CVE-2011-5000
3.5The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
CVE-2011-4327
2.1ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
2010(3)
CVE-2010-5107
5.0The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
CVE-2010-4755
4.0The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
CVE-2010-4478
7.5OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
2008(1)
CVE-2008-3844
9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
2007(2)
CVE-2007-3205
5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.
CVE-2007-2768
4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.



Contact Us

Shodan ® - All rights reserved