11 /
tcp
-971970408 | 2025-04-15T09:20:36.669508
13 /
tcp
-2127598635 | 2025-04-19T16:50:23.226813
15 /
tcp
-1730858130 | 2025-04-06T14:03:35.388253
RFB 003.008
VNC:
Protocol Version: 3.8
17 /
tcp
-1559123399 | 2025-04-08T06:22:53.447777
500 Permission denied - closing connection.
21 /
tcp
1564456597 | 2025-04-03T22:51:29.976169
220 Firewall Authentication required before proceeding with service
22 /
tcp
665193665 | 2025-04-09T08:14:34.910860
SSH-2.0-dropbear_2018.76\r\n
37 /
tcp
-394428255 | 2025-04-26T17:18:45.712826
43 /
tcp
-1399940268 | 2025-04-16T19:07:15.642451
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1867457549 | 2025-04-28T08:30:05.585420
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
906501480 | 2025-04-22T08:23:34.999585
HTTP/1.1 403 Forbidden
Server: AliyunOSS
Date: Tue, 22 Apr 2025 08:23:34 GMT
Content-Type: application/xml
Content-Length: 345
Connection: keep-alive
x-oss-request-id: 68075206E80D013638478BD1
x-oss-server-time: 0
x-oss-ec: 0003-00001201
102 /
tcp
1426971893 | 2025-04-10T03:20:16.684018
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
104 /
tcp
-2089734047 | 2025-03-31T15:01:32.562211
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
110 /
tcp
-2089734047 | 2025-04-28T04:06:06.003407
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
111 /
tcp
1545709575 | 2025-04-16T09:09:35.283023
Portmap
Program Version Protocol Port
772606496 1114993696 1332634912 1668247150
1869490217 543255666 1700881529 543909221
1769366830 218777455 1868832834 2036670497
-414819019 | 2025-04-21T01:14:34.354036
HTTP/1.1 200 OK
Content-type: text/html
Connection: close
141730637 | 2025-04-11T06:25:08.606989
HTTP/1.0 200 OK
Server: Proxy
122 /
tcp
-1327660293 | 2025-04-16T09:02:02.447290
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
135 /
tcp
1141948216 | 2025-04-24T00:21:15.445695
\\x05\\x00\r\\x03\\x10\\x00\\x00\\x00\\x18\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x04\\x00\\x01\\x05\\x00\\x00\\x00\\x00\n\nServerAlive2: \n IP1: DESKTOP-HL59G5J\n IP2: 169.254.93.199\n IP3: 175.180.100.187\n\nNTLMSSP:\nTarget_Name: DESKTOP-HL59G5J\nProduct_Version: 10.0.19041 Ntlm 15\nOS: Windows 10, Version 2004/Windows Server, Version 2004\nNetBIOS_Domain_Name: DESKTOP-HL59G5J\nNetBIOS_Computer_Name: DESKTOP-HL59G5J\nDNS_Domain_Name: DESKTOP-HL59G5J\nDNS_Computer_Name: DESKTOP-HL59G5J\nSystem_Time: 2024-01-22 06:04:34 +0000 UTC\n\nDCERPC Dump:\n954
175 /
tcp
165188539 | 2025-04-08T06:18:51.648838
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
311 /
tcp
749429829 | 2025-04-22T20:21:30.844600
\xc3\xa3\r\n\r\n\\x01KvInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
314 /
tcp
-904840257 | 2025-04-01T11:24:43.741758
572 Relay not authorized\r\n
427 /
tcp
-349937125 | 2025-04-16T23:12:55.891904
SAAdvert Response:\nVersion: 2\nFunction: SA Advertisement (11)\nURL: service:service-agent://192.168.118.88\nScopeList: default\nAttrributeList: \n\n\nserviceTypes:\nservice:VMwareInfrastructure\nservice:wbem:https\n\nResponse of service:VMwareInfrastructure SrvReq:\nVersion: 2\nFunction: Service Reply (2)\nErrorCode: SUCCESS (0)\nURL Entries:\n Lifetime: 65535\n URL: service:VMwareInfrastructure://192.168.118.88\n\n\nResponse of service:VMwareInfrastructure AttrRqst:\nVersion: 2\nFunction: Attribute Reply (7)\nErrorCode: SUCCE
440 /
tcp
103159425 | 2025-04-03T18:48:41.830104
1895747531 | 2025-04-22T17:22:31.696078
HTTP/1.1 403 Forbidden
Server: AliyunOSS
Date: Tue, 22 Apr 2025 17:22:31 GMT
Content-Type: application/xml
Content-Length: 345
Connection: keep-alive
x-oss-request-id: 6807D05735EB2632378369D0
x-oss-server-time: 0
x-oss-ec: 0003-00001201
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
61:6b:68:69:54:4a:81:bb:93:b4:d7:d1
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=BE, O=GlobalSign nv-sa, CN=GlobalSign GCC R3 OV TLS CA 2024
Validity
Not Before: Jan 2 06:32:06 2025 GMT
Not After : Sep 4 00:00:00 2025 GMT
Subject: C=CN, ST=ZheJiang, L=HangZhou, O=Alibaba (China) Technology Co., Ltd., CN=cn-beijing.oss.aliyuncs.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:cb:fd:cb:7f:5f:49:ee:e8:d9:d0:d6:53:d0:a5:
88:fd:fc:56:3c:06:76:2d:ad:ee:c9:65:e1:8c:fd:
ee:ef:a1:a2:34:db:d3:65:1e:4a:9c:f7:9d:a6:ad:
fa:a7:b3:1a:8b:45:f7:13:2a:26:24:9c:50:28:92:
25:54:45:fc:d2:2e:17:7d:c1:47:45:a1:39:bf:ce:
7e:f2:8b:d7:69:2c:b6:94:3f:5c:fc:a9:6e:c3:bd:
a5:a9:f3:6e:65:55:50:ba:b2:8a:df:ee:e9:50:a7:
81:b5:5f:3a:96:f9:74:c3:8a:54:51:d7:eb:02:1c:
58:33:e6:a0:ea:12:10:52:63:c9:df:03:84:cf:a3:
15:9c:50:7b:5e:6e:42:0f:3d:bd:33:3c:f6:6a:eb:
be:30:24:30:72:cb:84:a8:e9:17:aa:6a:45:f8:12:
c2:a1:78:0d:31:f0:45:2b:32:2f:ff:98:a3:03:a2:
5a:b0:8d:e2:d5:ce:e1:35:56:0b:0a:f8:11:bf:18:
44:f7:b8:7b:a0:a0:eb:1d:8d:cf:e8:cc:cf:c4:c5:
54:69:59:53:e1:ee:51:79:04:67:86:cf:8b:e5:c6:
88:a8:cc:9e:61:75:91:90:b5:8a:af:4c:a2:8d:57:
14:8a:f6:54:fb:1e:71:e5:09:e3:0a:12:df:34:8d:
d5:47
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Basic Constraints: critical
CA:FALSE
Authority Information Access:
CA Issuers - URI:http://secure.globalsign.com/cacert/gsgccr3ovtlsca2024.crt
OCSP - URI:http://ocsp.globalsign.com/gsgccr3ovtlsca2024
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.2
Policy: 1.3.6.1.4.1.4146.10.1.2
CPS: https://www.globalsign.com/repository/
X509v3 CRL Distribution Points:
Full Name:
URI:http://crl.globalsign.com/gsgccr3ovtlsca2024.crl
X509v3 Subject Alternative Name:
DNS:cn-beijing.oss.aliyuncs.com, DNS:*.cn-beijing.oss-console.aliyuncs.com, DNS:*.s3.oss-cn-beijing.aliyuncs.com, DNS:*.s3.oss-cn-beijing-internal.aliyuncs.com, DNS:*.cn-beijing.mgw.aliyuncs.com, DNS:*.oss.cn-beijing.privatelink.aliyuncs.com, DNS:*.oss-cn-beijing.oss-object-process.aliyuncs.com, DNS:*.oss-cn-beijing-internal.oss-object-process.aliyuncs.com, DNS:*.oss-cn-beijing.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-beijing-internal.oss-accesspoint.aliyuncs.com, DNS:*.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-beijing.aliyuncs.com, DNS:*.img-cn-beijing-internal.aliyuncs.com, DNS:*.oss-cn-beijing-internal-cross.aliyuncs.com, DNS:*.oss-cn-beijing-internal.aliyuncs.com, DNS:*.oss-cn-beijing-cross.aliyuncs.com, DNS:*.img-cn-beijing.aliyuncs.com, DNS:*.vpc100-oss-cn-beijing.aliyuncs.com, DNS:*.cn-beijing.oss.aliyuncs.com, DNS:*.oss-cache-cn-beijing-h.aliyuncs.com, DNS:*.oss-cache-cn-beijing-h-cross.aliyuncs.com, DNS:*.oss-cn-beijing-finance-1-pub-internal.aliyuncs.com, DNS:*.oss-cn-beijing-finance-1-pub.aliyuncs.com, DNS:*.cn-beijing-finance.oss.aliyuncs.com, DNS:*.oss-cn-beijing-finance-1-internal.aliyuncs.com, DNS:*.oss-cn-beijing-finance-1.aliyuncs.com, DNS:*.cn-beijing-finance-1.oss.aliyuncs.com, DNS:*.cn-beijing-vpc.oss.aliyuncs.com, DNS:*.oss-enet-cm.aliyuncs.com, DNS:*.oss-enet-cu.aliyuncs.com, DNS:*.oss-enet-ct.aliyuncs.com, DNS:*.oss-enet-cn-north.aliyuncs.com, DNS:*.aliyuncs.com, DNS:*.oss-enet.aliyuncs.com, DNS:*.oss-internal.aliyuncs.com, DNS:*.oss-internal.aliyun-inc.com, DNS:*.oss-accelerate.aliyuncs.com, DNS:*.oss-accelerate-overseas.aliyuncs.com, DNS:*.s3.oss-accelerate.aliyuncs.com, DNS:*.s3.oss-accelerate-overseas.aliyuncs.com, DNS:*.cn-beijing-cross.mgw.aliyuncs.com, DNS:*.oss-vpc.aliyuncs.com, DNS:*.cn-beijing.oss-vpc.aliyuncs.com, DNS:*.oss.aliyuncs.com
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Authority Key Identifier:
DA:D3:A8:08:48:0C:34:37:58:EE:E5:A7:75:2E:59:FC:D6:DC:3C:38
X509v3 Subject Key Identifier:
C1:58:AC:32:69:71:BB:67:42:6C:42:FE:14:E5:57:72:91:C1:82:D6
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 1A:04:FF:49:D0:54:1D:40:AF:F6:A0:C3:BF:F1:D8:C4:
67:2F:4E:EC:EE:23:40:68:98:6B:17:40:2E:DC:89:7D
Timestamp : Jan 2 06:32:08.952 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:D4:22:D6:BD:85:6A:79:2B:66:0F:1F:
36:9C:87:35:37:A2:DA:91:B3:41:21:70:33:24:48:B8:
AC:01:B2:4F:8A:02:20:78:33:2F:5E:6C:72:6C:BA:8A:
2A:DB:4A:42:99:29:A1:0C:E4:7B:86:88:C2:7F:9F:BE:
CE:93:8F:5D:00:2F:8C
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 12:F1:4E:34:BD:53:72:4C:84:06:19:C3:8F:3F:7A:13:
F8:E7:B5:62:87:88:9C:6D:30:05:84:EB:E5:86:26:3A
Timestamp : Jan 2 06:32:08.990 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:DE:60:8C:72:69:F8:ED:DD:B5:9B:2F:
88:2B:94:8E:C5:EA:A3:29:CF:5E:76:E1:32:5B:33:E9:
09:55:C0:9B:0A:02:20:72:4F:8B:E6:B3:1A:36:F6:61:
91:02:36:00:EA:76:E0:8C:5C:3C:8C:AF:C1:4A:F2:FD:
CA:7D:2B:6A:A6:5A:A7
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 0D:E1:F2:30:2B:D3:0D:C1:40:62:12:09:EA:55:2E:FC:
47:74:7C:B1:D7:E9:30:EF:0E:42:1E:B4:7E:4E:AA:34
Timestamp : Jan 2 06:32:08.695 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:82:E8:40:FB:D2:F4:C7:36:73:02:4A:
CD:8A:B4:A7:3D:E9:DC:7F:23:C7:17:0C:B1:8F:65:59:
3C:89:A5:E4:F0:02:20:2D:57:40:3F:AC:33:84:81:B8:
79:8C:CE:B4:F4:CC:44:29:AE:5A:FA:CD:66:FF:7A:69:
DA:8E:8E:6B:3D:C7:D7
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
4e:88:42:e9:bd:d6:24:7a:b8:0b:08:70:28:8b:e3:90:92:79:
25:1f:f9:ec:83:69:41:21:cb:3f:cc:c6:2c:76:54:44:09:81:
c9:8b:a9:bc:32:e4:5e:d4:72:17:de:fd:a1:50:2b:58:ed:45:
8e:ba:40:ee:f9:54:31:0e:56:0e:7f:9e:36:2d:98:8b:3a:21:
ac:4c:f7:4b:e5:97:32:cd:c3:b4:9d:b7:99:07:f1:4f:bb:81:
14:60:64:c2:01:bb:85:62:e5:8a:7e:84:86:9f:c9:0b:80:80:
c3:95:a2:77:b8:d9:81:73:28:dc:14:f9:af:1b:22:8b:33:2a:
b5:dd:34:fb:a6:90:3d:a1:37:b1:93:f5:d9:93:d0:3c:86:ac:
28:04:f6:71:24:54:fd:0c:42:2d:48:d4:9c:a6:e5:fa:88:71:
e3:dc:e1:a7:c7:8a:d5:39:43:29:5f:5d:2c:02:1a:72:08:e8:
ce:86:a9:22:b1:ed:4f:4e:7f:e5:7d:ea:01:3b:7f:34:2c:e6:
94:3c:5b:6c:64:09:c3:88:e5:08:64:91:8a:17:63:99:dc:0c:
85:ee:6c:4a:67:f4:66:21:e9:7a:a3:95:8c:ed:6c:6f:af:92:
f8:a3:49:8f:de:3b:85:de:68:56:95:f4:e7:e7:7b:1e:c2:0a:
1f:12:b5:15
-1013082686 | 2025-04-01T01:04:43.298309
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
446 /
tcp
-1428621233 | 2025-04-27T21:37:47.399022
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
503 /
tcp
-1327660293 | 2025-04-04T07:54:21.562428
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
513 /
tcp
-1399940268 | 2025-04-28T02:51:21.268276
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
541 /
tcp
1858569668 | 2025-04-24T19:38:12.493546
\\x16\\x03\\x01\\x01[\\x01\\x00\\x01W\\x03\\x03\\xf63}\r\\xbef2O\\x9e\\xdc\\xf5\\xd2\\xc83\\xe6~w\\x93\\xa0\\xbcE\\x07\\xd2%k\\x97\\xeaR\\x1c\\xd60^ #\\x04\\x8dI\\xa5\\x92\\xbd\xca\x897\\x93\\x98\\xd2c\\x85\\x1b_]\\xab\\x86\\xb4\\x1cY\xc2\xbe\\xfe\\x03a9\\xe3\\xf7\\x82\\x002\\x13\\x02\\x13\\x03\\x13\\x01\\x009\\x005\\x00
548 /
tcp
1445639302 | 2025-04-22T07:18:28.067684
Fast Copy: Yes\nExtended Sleep: Yes\nUUIDs: Yes\nUTF8 Server Name: Yes\nDirectory Services: Yes\nReconnect: No\nServer Notifications: Yes\nTCP/IP: Yes\nServer Signature: Yes\nServer Message: No\nPassword Saving Prohibited: No\nPassword Changing: No\nCopy File: Yes\nServer Name: DS218sikeer\nMachine Type: \\x0eNetatalk3.1.12\nAFP Versions: AFP2.2, AFPX03, AFP3.1, AFP3.2, AFP3.3, AFP3.4\nUAMs: Cleartxt Passwrd\\x04,DHX2\t,DHCAST128\\x00\nServer Signature: 00000000008002000180030002800280
593 /
tcp
1308377066 | 2025-04-21T05:51:13.406448
602 /
tcp
1332894250 | 2025-04-05T09:29:58.366478
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
1300162323 | 2025-04-27T22:27:47.269092
HTTP/1.1 404 Not Found
Content-Type: text/plain; charset=utf-8
X-Content-Type-Options: nosniff
771 /
tcp
-1399940268 | 2025-04-27T22:20:48.109416
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
789 /
tcp
-1611764932 | 2025-04-28T04:54:49.655241
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
811 /
tcp
165188539 | 2025-04-08T20:39:05.050966
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
843 /
tcp
-2004989248 | 2025-04-23T05:30:03.460527
<cross-domain-policy>\n <allow-access-from domain="*" to-po\nrts="*" />\n</cross-domain-policy>
873 /
tcp
-1970692834 | 2025-04-27T13:42:47.626890
@RSYNCD: 31.0\n@RSYNCD: EXIT\n
886 /
tcp
-2089734047 | 2025-04-05T17:57:43.535056
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
953 /
tcp
-2089734047 | 2025-03-29T18:28:09.618731
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1814656027 | 2025-04-05T08:22:11.506182
HTTP/1.1 403 Forbidden
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=15; max=19
993 /
tcp
-1487943323 | 2025-04-07T15:42:29.430719
431 Unable to negotiate secure command connection.\r\n
1012 /
tcp
117101543 | 2025-04-06T11:43:38.670353
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
1023 /
tcp
-1681927087 | 2025-04-27T17:53:25.571811
kjnkjabhbanc283ubcsbhdc72
1080 /
tcp
1362344524 | 2025-04-24T20:48:54.000462
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.7
1099 /
tcp
-1611764932 | 2025-04-20T14:15:01.900973
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
-690472071 | 2025-04-09T16:22:45.527988
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
<html>
<head><title>400 Bad Request</title></head>
<body>
<center><h1>400 Bad Request</h1></center>
<hr><center>nginx</center>
</body>
</html>
1153 /
tcp
599074451 | 2025-04-22T03:27:37.627251
1167 /
tcp
-2017887953 | 2025-04-15T06:53:22.177874
SSH-2.0-OpenSSH_7.9
Vulnerabilities
1177 /
tcp
2087396567 | 2025-04-23T21:42:21.808638
kjnkjabhbanc283ubcsbhdc72
1200 /
tcp
2087396567 | 2025-04-01T22:08:23.680166
kjnkjabhbanc283ubcsbhdc72
1234 /
tcp
819727972 | 2025-04-15T21:48:43.342232
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1250 /
tcp
-1189269828 | 2025-04-22T20:22:12.686873
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1291 /
tcp
-249504111 | 2025-04-21T15:21:14.257691
1292 /
tcp
709622286 | 2025-04-18T19:23:54.311061
OK Welcome <299685> on DirectUpdate server 7286\r\n
1293 /
tcp
-1733645023 | 2025-04-28T02:13:29.760803
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
1337 /
tcp
1956828827 | 2025-04-26T18:15:12.522411
220 VMware Authentication Daemon Version 1.10: SSL Required, Se
rverDaemonProtocol:SOAP, MKSDisplayProtocol:VNC , , NFCSSL supported/t
1343 /
tcp
-1327660293 | 2025-04-28T06:24:44.586784
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
1364 /
tcp
1911457608 | 2025-04-24T03:50:43.632273
\x00[\x00\x00\x00\x00\x00\x00
1433 /
tcp
419886129 | 2025-04-26T18:57:29.838182
MSSQL Server\nVersion: 167773760 (0xa000640)\nSub-Build: 0\nEncryption:Not available\n\nMSSQL NTLM Info:\nTarget_Name: XTZJ-20210317RG\nProduct_Version: 6.1.7601 Ntlm 15\nOS: Windows 7, Service Pack 1/Windows Server 2008 R2, Service Pack 1\nNetBIOS_Domain_Name: XTZJ-20210317RG\nNetBIOS_Computer_Name: XTZJ-20210317RG\nDNS_Domain_Name: XTZJ-20210317RG\nDNS_Computer_Name: XTZJ-20210317RG\nSystem_Time: 2024-01-22 04:01:04 +0000 UTC\n\n
1453 /
tcp
-1538260461 | 2025-04-12T22:40:59.676087
1457 /
tcp
1492413928 | 2025-04-20T12:35:26.051108
SSH-2.0-OpenSSH_7.5
Vulnerabilities
1515 /
tcp
-952165951 | 2025-04-28T08:38:36.659597
-186520940 | 2025-04-17T01:33:13.793537
1557 /
tcp
1911457608 | 2025-04-11T00:50:29.688216
\x00[\x00\x00\x00\x00\x00\x00
1599 /
tcp
819727972 | 2025-04-15T01:15:24.254964
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1604 /
tcp
2087396567 | 2025-04-01T17:33:40.508839
kjnkjabhbanc283ubcsbhdc72
1723 /
tcp
1103582599 | 2025-04-25T13:46:29.100913
Firmware: 1\nHostname: Vigor\nVendor: DrayTek\n
1800 /
tcp
-1648456501 | 2025-04-21T17:35:34.903278
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
1801 /
tcp
1692069329 | 2025-04-10T22:30:32.436920
\\x10Z\x0b\\x00LIOR<\\x02\\x00\\x00\\xff\\xff\\xff\\xff\\x00\\x00\\x12\\x00a36a0e421af47074\\xe14\\xf0\\xb6\\xb85\x0bB\\x86\\x99B\\xa5\\x07\\xb0\\xf6V92d3\\x10\\x03\\x00\\x00ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
1911 /
tcp
-1399940268 | 2025-04-23T23:54:47.296805
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1962 /
tcp
945910976 | 2025-04-22T21:12:52.445139
* OK TeamXchange IMAP4rev1 server (otyUg) ready.\r\n
1965 /
tcp
1911457608 | 2025-04-10T21:55:31.323745
\x00[\x00\x00\x00\x00\x00\x00
2103111368 | 2025-04-27T18:22:46.026248
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
1984 /
tcp
-42767839 | 2025-04-03T02:43:42.052272
RFB 005.000
VNC:
Protocol Version: 5.0
2002 /
tcp
819727972 | 2025-04-21T12:36:18.938932
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2003 /
tcp
89142341 | 2025-04-24T03:02:22.607094
\x05\x00\x00\x00\x0b\x08\x05\x1a\x00
-1839934832 | 2025-04-12T22:32:51.224373
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
1233062890 | 2025-04-22T14:43:47.497810
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae212e_gwt27_22331-28963
2055 /
tcp
-1428621233 | 2025-04-10T14:29:38.592319
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
2067 /
tcp
1911457608 | 2025-04-20T04:31:28.566256
\x00[\x00\x00\x00\x00\x00\x00
2072 /
tcp
-1399940268 | 2025-04-11T20:28:22.384724
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2143387245 | 2025-04-21T23:44:42.439037
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
2087 /
tcp
2087396567 | 2025-04-17T17:36:36.125113
kjnkjabhbanc283ubcsbhdc72
2095 /
tcp
-2096652808 | 2025-03-31T10:45:14.782765
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
141730637 | 2025-04-26T07:02:37.526780
HTTP/1.0 200 OK
Server: Proxy
2181 /
tcp
546151771 | 2025-04-27T05:11:28.123217
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
2201 /
tcp
-358801646 | 2025-04-04T17:04:51.915697
2222 /
tcp
-1659353189 | 2025-04-20T07:16:45.308530
SSH-2.0-ssh-server\r\n\\x00\\x00\\x02\\x14\x0b\\x14\x0b\\xed\\x16\\xae\\x96\t\\xc5En\\xbd\\x1cgn\\xff\\xad\\xd7\\x00\\x00\\x00\\xbbcurve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group14-sha256,diffie-hellman-gr
2259 /
tcp
165188539 | 2025-04-25T08:52:22.033052
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
1662205251 | 2025-04-20T12:18:16.019756
HTTP/1.0 404 FAIL
Content-length:5
Connection:Close
2332 /
tcp
962700458 | 2025-04-23T18:54:33.024352
2345 /
tcp
-136006866 | 2025-04-14T16:52:57.598007
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
2376 /
tcp
-971970408 | 2025-04-19T02:28:05.682917
2404 /
tcp
165188539 | 2025-04-26T05:43:54.953034
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
2558 /
tcp
1911457608 | 2025-04-02T18:32:01.604414
\x00[\x00\x00\x00\x00\x00\x00
2563 /
tcp
819727972 | 2025-04-01T16:30:49.057788
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2628 /
tcp
-1872120160 | 2025-04-24T12:41:48.375848
">Application and Content Networking Software 3.9</a>)
</BODY><
2761 /
tcp
165188539 | 2025-04-23T11:22:49.050798
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
2762 /
tcp
-2089734047 | 2025-04-02T11:54:25.997059
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
2850 /
tcp
321971019 | 2025-04-08T05:34:18.887267
-ERR client ip is not in whitelist\r
3001 /
tcp
-1899074860 | 2025-04-26T06:51:50.002007
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
3008 /
tcp
-1733106930 | 2025-04-11T16:53:06.799901
Mysql Version: 5.6.50-log\nN\n5.6.50-log\x14(\nG5se"tGE\xc3\xbf\xc3\xb7-\x02\x7f\xc2\x80\x15cB^3$Zwh$wM[mysql_native_password
3022 /
tcp
1278527606 | 2025-04-17T20:07:19.248430
3049 /
tcp
-1399940268 | 2025-04-28T02:16:08.339321
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3050 /
tcp
-891714208 | 2025-04-25T02:02:50.568425
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
3053 /
tcp
-1399940268 | 2025-04-28T03:53:39.263791
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3056 /
tcp
-1026951088 | 2025-04-03T20:34:18.245884
3061 /
tcp
671605376 | 2025-04-25T00:11:30.477287
3070 /
tcp
632542934 | 2025-04-10T01:34:45.932935
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
3076 /
tcp
-1428621233 | 2025-04-12T10:04:58.884285
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
3078 /
tcp
1919228981 | 2025-04-20T07:01:01.364357
\x00\x1e\x00\x06\xc2\x81\xc2\x85\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
3095 /
tcp
2063598737 | 2025-04-17T23:11:10.751763
3116 /
tcp
165188539 | 2025-04-11T07:16:33.472003
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
3138 /
tcp
-1105333987 | 2025-04-19T16:50:46.499332
3152 /
tcp
205347087 | 2025-04-05T20:48:28.399970
SSH-25453-Cisco-3524665.35\n
-1227409554 | 2025-04-06T23:58:07.794247
HTTP/1.1 500 Internal Server Error
Server: Zope/(2.13.23, python 1.7.18, linux2) ZServer/1.1
Content-Type: text/plain; charset=utf-8
Connection: close
-1839934832 | 2025-04-16T20:25:53.216507
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
3187 /
tcp
-1114821551 | 2025-04-20T10:59:54.711594
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
3260 /
tcp
-862070606 | 2025-04-26T17:07:58.902774
Login Response Success(0x0000)\nKey/Value Pairs\nAuthMethod=None\nTargetAlias=LIO Target\nTargetPortalGroupTag=1\n\n
1727372229 | 2025-04-12T22:15:39.257674
HTTP/1.1 302
Location: http://116.6.76.114:3268/index.html
3306 /
tcp
369808347 | 2025-04-15T18:48:33.331720
Mysql Version: 5.7.31-log \r\nN\\x00\\x00\\x00\n5.7.31-log\\x00Ut_\\x02S|d0n0s \\x00\\xff\\xff-\\x02\\x00\\xff\\xc1\\x15\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\x0c\\x04&+MJX\n#in8\\x00mysql_native_password\\x00
3310 /
tcp
-1036370807 | 2025-04-09T19:20:01.161562
3352 /
tcp
-653033013 | 2025-04-18T17:39:01.030604
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
3388 /
tcp
-2096652808 | 2025-04-24T19:43:27.233556
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
3389 /
tcp
740837454 | 2025-04-15T07:52:37.086902
SSH-2.0-OpenSSH_5.3
Vulnerabilities
3443 /
tcp
455076604 | 2025-04-23T17:49:51.120947
!\x07version\x04bind7 t{RPowerDNS Recursor 410
3524 /
tcp
-358801646 | 2025-04-22T18:50:32.472037
198844676 | 2025-04-12T21:48:29.285371
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3558 /
tcp
-1888448627 | 2025-04-09T18:11:40.966668
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
3780 /
tcp
2087396567 | 2025-04-20T16:38:52.738023
kjnkjabhbanc283ubcsbhdc72
3790 /
tcp
-971970408 | 2025-04-27T17:53:44.650920
1123187653 | 2025-04-27T22:32:39.068843
HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/10.0
X-Frame-Options: SAMEORIGIN
4021 /
tcp
-653033013 | 2025-04-10T22:12:27.134412
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
4022 /
tcp
921225407 | 2025-04-05T08:20:35.868702
\x00\x00\x00\x04\x00\x00\x00\x00\x00
4043 /
tcp
-1399940268 | 2025-04-22T21:47:09.572237
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4064 /
tcp
320677201 | 2025-04-04T17:32:09.889376
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
4117 /
tcp
-1733645023 | 2025-04-11T17:33:59.388382
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
4150 /
tcp
-1399940268 | 2025-04-17T11:26:21.119331
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4157 /
tcp
2087396567 | 2025-04-14T19:49:34.806483
kjnkjabhbanc283ubcsbhdc72
4282 /
tcp
2087396567 | 2025-04-20T01:17:58.890035
kjnkjabhbanc283ubcsbhdc72
4433 /
tcp
660175493 | 2025-04-23T18:03:13.090123
4434 /
tcp
819727972 | 2025-04-22T13:03:45.604713
SSH-2.0-OpenSSH_7.4
Vulnerabilities
751161953 | 2025-04-01T15:23:08.589163
HTTP/1.1 403 Forbidden
Server: openresty
Content-Type: text/html
Connection: keep-alive
Deny-Reason: hotload rechange server uri format error!!
Request-Id: 65ae295529c967ad650ec3304d944abd
4444 /
tcp
2087396567 | 2025-04-27T08:11:31.623971
kjnkjabhbanc283ubcsbhdc72
4447 /
tcp
-903067560 | 2025-04-19T16:14:55.529999
\x00[\x13)\xc2\x81\x7f\x00\x00
4466 /
tcp
-1399940268 | 2025-04-18T00:46:11.856710
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4500 /
tcp
1761482307 | 2025-04-25T20:09:10.393919
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
4506 /
tcp
-339084706 | 2025-04-06T22:40:55.342783
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
4510 /
tcp
1911457608 | 2025-04-25T20:03:09.472658
\x00[\x00\x00\x00\x00\x00\x00
4523 /
tcp
-297128567 | 2025-04-11T15:08:47.568808
\x04\x01\xc3\xb4\x00\x15Internal Server Error\x00\x00\x00AB\x00\x02\x05\x00
4550 /
tcp
-1153110624 | 2025-04-02T21:02:59.548312
4786 /
tcp
819727972 | 2025-04-22T10:48:51.379125
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4911 /
tcp
-249504111 | 2025-03-31T13:59:45.251355
4999 /
tcp
1911457608 | 2025-04-20T19:52:32.692984
\x00[\x00\x00\x00\x00\x00\x00
5001 /
tcp
1286504516 | 2025-04-25T11:21:45.861622
CP2E Control Console
Connected to Host: gZI
5007 /
tcp
1911457608 | 2025-04-22T22:33:46.390045
\x00[\x00\x00\x00\x00\x00\x00
1182822286 | 2025-04-24T10:38:52.680577
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae237b_dianxun172_7460-1469
5010 /
tcp
-616720387 | 2025-04-19T21:51:43.516376
5025 /
tcp
550048729 | 2025-04-19T19:38:50.502743
5172 /
tcp
2087396567 | 2025-04-12T09:31:04.122807
kjnkjabhbanc283ubcsbhdc72
5201 /
tcp
398077695 | 2025-04-12T03:32:28.194193
5238 /
tcp
-1399940268 | 2025-04-24T18:24:47.940553
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5250 /
tcp
819727972 | 2025-04-19T23:45:17.328194
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5254 /
tcp
819727972 | 2025-04-10T16:23:17.845976
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5257 /
tcp
-2089734047 | 2025-04-02T16:11:20.510255
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
5432 /
tcp
165188539 | 2025-04-24T00:05:45.442106
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
1023953321 | 2025-04-17T12:39:03.200093
HTTP/1.0 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm="proxy"
Connection: close
Content-type: text/html; charset=utf-8
-2050145619 | 2025-04-20T15:43:11.659634
5594 /
tcp
740837454 | 2025-04-04T11:21:46.144037
SSH-2.0-OpenSSH_5.3
Vulnerabilities
5600 /
tcp
-1399940268 | 2025-04-18T03:05:47.430558
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5613 /
tcp
1911457608 | 2025-04-20T18:29:32.757139
\x00[\x00\x00\x00\x00\x00\x00
-1249500036 | 2025-04-24T23:30:06.098888
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html
Connection: keep-alive
Accept-Ranges: bytes
5907 /
tcp
-339084706 | 2025-04-09T09:47:56.122428
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
5909 /
tcp
410249975 | 2025-04-07T21:12:52.547687
5913 /
tcp
165188539 | 2025-04-04T21:11:19.926932
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
5920 /
tcp
820958131 | 2025-04-15T22:02:05.565730
kjnkjabhbanc283ubcsbhdc72\x02
5938 /
tcp
165188539 | 2025-04-26T11:29:13.640844
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
1999272906 | 2025-03-31T10:55:48.750955
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
0 | 2025-04-27T20:38:13.056371
HTTP/1.1 408 Request Timeout
Content-Length: 0
-1045760528 | 2025-04-15T02:18:05.799150
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
5997 /
tcp
165188539 | 2025-04-12T21:23:17.804318
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
-297057753 | 2025-04-20T11:03:57.540419
HTTP/1.1 401 Unauthorized
X-Plex-Protocol: 1.0
Content-Type: text/html
Connection: close
Cache-Control: no-cache
6000 /
tcp
639175818 | 2025-04-19T13:02:11.494658
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
6001 /
tcp
165188539 | 2025-04-24T07:16:14.941899
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
6002 /
tcp
1632932802 | 2025-04-12T04:23:58.486172
6379 /
tcp
321971019 | 2025-04-06T06:50:23.672590
-ERR client ip is not in whitelist\r
6440 /
tcp
-1329831334 | 2025-04-15T17:48:04.206963
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
6512 /
tcp
1911457608 | 2025-04-03T01:44:36.881855
\x00[\x00\x00\x00\x00\x00\x00
6513 /
tcp
-1059554316 | 2025-04-03T18:16:37.282799
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
6581 /
tcp
819727972 | 2025-04-21T05:02:23.224341
SSH-2.0-OpenSSH_7.4
Vulnerabilities
6588 /
tcp
-653033013 | 2025-04-20T05:47:17.829441
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
6653 /
tcp
165188539 | 2025-04-16T04:48:35.253457
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
6668 /
tcp
321971019 | 2025-04-20T21:00:58.076344
-ERR client ip is not in whitelist\r
6686 /
tcp
-1699556818 | 2025-04-12T17:55:34.654194
\x01remshd: Kerberos Authentication not enabled.\n
6700 /
tcp
819727972 | 2025-04-03T15:40:53.176676
SSH-2.0-OpenSSH_7.4
Vulnerabilities
6779 /
tcp
-2033111675 | 2025-04-26T23:49:05.935418
6887 /
tcp
-1297953727 | 2025-04-21T15:36:49.070561
\x02\x00\x00\x00\x00\x00\x06\x04\x00\x00\x00\x00\x00\x0c\x00\x00\n0\x00\x1c
1827807483 | 2025-04-26T15:04:53.605355
HTTP/1.1 401 Unauthorized
Server:
Cache-Control: no-cache,no-store
Content-Type: text/html; charset=%s
Connection: close
694172010 | 2025-04-22T00:37:33.588052
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae292b_CS-NKG-015sn19_26622-15534
7071 /
tcp
1741579575 | 2025-04-06T17:03:52.101999
7105 /
tcp
51259122 | 2025-04-21T18:53:48.790257
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
7171 /
tcp
819727972 | 2025-04-17T12:53:39.462115
SSH-2.0-OpenSSH_7.4
Vulnerabilities
7218 /
tcp
1286504516 | 2025-04-18T01:40:24.272239
CP2E Control Console
Connected to Host: gZI
-1013082686 | 2025-04-17T12:25:48.081269
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
7349 /
tcp
-1399940268 | 2025-04-23T06:04:26.414714
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7415 /
tcp
15018106 | 2025-04-14T16:30:06.681564
\x00\x19\x02\x00\x02\x00\x07\x00Protocol version mismatch\x00
1342763855 | 2025-04-07T21:13:13.639166
HTTP/1.1 302 Moved Temporarily
Content-Type: text/html
Connection: close
Server: Nginx
Expires: 0
Pragma: no-cache
Cache-Control: no-cache
X-LANG: 1
X-Timezone: 0800
X-Timestamp: 1705912071
X-Arch: x86
X-Sysbit: x64
X-Enterprise: 0
X-Support-i18n: 0
X-Support-wifi: 0
Location: /login
7548 /
tcp
-971970408 | 2025-04-23T12:41:00.715539
7601 /
tcp
-1730858130 | 2025-04-20T22:43:11.604107
RFB 003.008
VNC:
Protocol Version: 3.8
-913917757 | 2025-04-27T04:40:14.549071
HTTP/1.1 200 OK
Server: nginx/onex
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
Vary: Accept-Encoding
Strict-Transport-Security: max-age=31536000
1391945995 | 2025-04-07T10:10:00.431867
HTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=utf-8
Proxy-Authenticate: Basic realm=""
7778 /
tcp
-1888448627 | 2025-04-12T14:01:21.785814
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
7790 /
tcp
677934968 | 2025-04-15T21:02:14.963119
8026 /
tcp
1911457608 | 2025-04-22T02:41:06.144323
\x00[\x00\x00\x00\x00\x00\x00
2139917906 | 2025-04-15T15:31:49.882585
HTTP/1.1 404 Not Found
content-type: text/plain;charset=utf-8
content-length: 10
connection: keep-alive
8062 /
tcp
-1399940268 | 2025-04-27T08:41:42.549257
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8071 /
tcp
-1888448627 | 2025-04-26T09:47:21.336758
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8081 /
tcp
-454087041 | 2025-04-01T03:43:22.308619
\x1e\xc3\x80\x010\x02\x00\xc2\xa8\xc3\xa3\x00\x00\x00\x00
8083 /
tcp
459162008 | 2025-04-07T17:50:20.302825
8084 /
tcp
709622286 | 2025-04-07T02:42:44.764895
OK Welcome <299685> on DirectUpdate server 7286\r\n
8087 /
tcp
921225407 | 2025-04-26T18:29:15.225319
\x00\x00\x00\x04\x00\x00\x00\x00\x00
8089 /
tcp
-971970408 | 2025-04-04T08:40:10.017247
1705528964 | 2025-04-08T22:57:20.038461
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2160_hlj44_13881-60457
1115736665 | 2025-04-21T17:53:50.817755
HTTP/1.1 403 Forbidden
Server: openresty
Content-Type: text/html
Connection: keep-alive
via: CHN-GDdongguan-AREACMCC2-CACHE15[8]
X-CCDN-FORBID-CODE: 040001
8108 /
tcp
1996932384 | 2025-04-10T17:55:00.233220
8116 /
tcp
-1327660293 | 2025-04-09T14:35:29.020073
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
8126 /
tcp
-971970408 | 2025-04-07T18:50:50.782392
-1013082686 | 2025-04-23T18:32:37.968358
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
8140 /
tcp
1426971893 | 2025-04-03T14:51:22.727233
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
8145 /
tcp
1723769361 | 2025-04-15T19:52:51.282542
ELM Enterprise Manager _l\r\nCopyright \xc2\xa9 18668511-928641920 TNT Software, Inc.\r\n
8147 /
tcp
-1730858130 | 2025-04-11T17:14:34.770135
RFB 003.008
VNC:
Protocol Version: 3.8
8150 /
tcp
-1279886438 | 2025-04-21T23:18:19.983272
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
8151 /
tcp
1911457608 | 2025-04-24T03:36:46.670852
\x00[\x00\x00\x00\x00\x00\x00
8159 /
tcp
-1899074860 | 2025-04-24T01:51:02.491023
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
8166 /
tcp
1911457608 | 2025-03-31T14:52:53.746457
\x00[\x00\x00\x00\x00\x00\x00
8169 /
tcp
-1399940268 | 2025-04-26T03:19:46.933422
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8171 /
tcp
-1399940268 | 2025-04-22T22:26:16.960874
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8181 /
tcp
819727972 | 2025-04-28T01:02:15.909496
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8186 /
tcp
819727972 | 2025-04-23T04:07:06.374708
SSH-2.0-OpenSSH_7.4
Vulnerabilities
81614701 | 2025-04-01T00:41:26.555653
HTTP/1.1 200 OK
Content-Type: text/html
Accept-Ranges: bytes
Server: Microsoft-IIS/10.0
X-Powered-By: ASP.NET
1320285193 | 2025-04-01T07:37:08.811436
HTTP/1.1 404 Not Found
Server: CloudWAF
Content-Type: text/html
Connection: keep-alive
8236 /
tcp
819727972 | 2025-04-05T11:53:33.549061
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8237 /
tcp
1911457608 | 2025-04-05T22:33:33.337814
\x00[\x00\x00\x00\x00\x00\x00
8249 /
tcp
-1888448627 | 2025-04-10T09:27:41.205048
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8280 /
tcp
165188539 | 2025-04-07T12:01:43.845272
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8284 /
tcp
819727972 | 2025-04-09T15:22:15.537660
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8291 /
tcp
-1399940268 | 2025-04-16T10:15:57.559176
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-734440417 | 2025-04-16T21:03:29.043811
HTTP/1.1 400 Bad Request
Content-Type: text/html
Connection: close
Server: nginx/1.17.3
-1713467553 | 2025-04-26T20:37:57.578055
HTTP/1.1 400 Bad Request
Content-Type: text/html; charset=us-ascii
Server: Microsoft-HTTPAPI/2.0
Connection: close
8384 /
tcp
1778988322 | 2025-04-04T07:25:39.033672
* OK GroupWise IMAP4rev1 Server Ready
8408 /
tcp
-1399940268 | 2025-03-31T06:16:30.787405
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8409 /
tcp
1623746877 | 2025-04-04T12:47:12.471500
500 Permission denied - closing connection.\r\n
8421 /
tcp
-1626979812 | 2025-04-17T12:13:57.220911
220 Service ready for new user.
8429 /
tcp
-1399940268 | 2025-04-20T06:09:42.653330
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8457 /
tcp
165188539 | 2025-04-08T22:14:47.033102
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
-1230049476 | 2025-04-25T17:55:59.830690
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
8533 /
tcp
-1399940268 | 2025-04-26T15:38:21.684540
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8540 /
tcp
677934968 | 2025-04-18T12:30:31.055848
8545 /
tcp
1210754493 | 2025-04-15T17:06:48.878126
0\x0c\x02\x01\x01a\x07\n\x01\x00\x04\x00\x04\x00
-1453516345 | 2025-04-11T14:09:31.196303
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
8561 /
tcp
-1036370807 | 2025-04-22T17:37:52.498448
8588 /
tcp
1189133115 | 2025-04-27T00:10:36.363845
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
8593 /
tcp
-1279886438 | 2025-04-06T09:56:52.020689
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
8595 /
tcp
-1261090339 | 2025-04-19T10:22:33.008651
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
8596 /
tcp
1911457608 | 2025-04-07T22:00:12.652099
\x00[\x00\x00\x00\x00\x00\x00
8623 /
tcp
-1996280214 | 2025-04-22T23:55:15.730265
8641 /
tcp
-1036370807 | 2025-04-26T09:27:52.849863
8649 /
tcp
842535728 | 2025-04-19T02:33:39.473956
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
8663 /
tcp
1615193817 | 2025-04-24T05:00:05.436181
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
8680 /
tcp
-1428621233 | 2025-03-31T05:48:23.278717
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
8688 /
tcp
-2096652808 | 2025-03-29T22:07:18.172870
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1077013874 | 2025-04-18T05:06:19.800767
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
8807 /
tcp
-2096652808 | 2025-04-17T22:11:57.695400
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8831 /
tcp
1615193817 | 2025-03-29T22:23:32.756274
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
8834 /
tcp
-1713437100 | 2025-04-17T23:49:00.885565
\xc3\xbf\xc3\xbb\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
8837 /
tcp
-653033013 | 2025-04-18T01:44:58.102433
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
8863 /
tcp
1332894250 | 2025-04-26T21:10:41.806427
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
8864 /
tcp
-274082663 | 2025-04-17T19:36:40.035176
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
8889 /
tcp
2087396567 | 2025-04-07T03:32:35.699424
kjnkjabhbanc283ubcsbhdc72
372433470 | 2025-04-08T09:58:21.416202
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
8969 /
tcp
819727972 | 2025-04-05T20:36:30.854594
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9000 /
tcp
-2067028711 | 2025-04-09T11:30:59.033035
\x15\x03\x01\x00\x02\x02F
9002 /
tcp
1278527606 | 2025-04-21T02:15:37.282565
9012 /
tcp
-2089734047 | 2025-04-17T09:13:36.335911
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9035 /
tcp
-339084706 | 2025-04-16T13:59:29.375302
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
9042 /
tcp
1887224352 | 2025-03-31T15:41:50.916238
9047 /
tcp
-1327660293 | 2025-04-15T13:50:17.168881
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
9051 /
tcp
1286504516 | 2025-04-28T02:43:26.394781
CP2E Control Console
Connected to Host: gZI
9061 /
tcp
-1189269828 | 2025-04-17T16:26:28.248374
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
9070 /
tcp
819727972 | 2025-04-11T10:45:41.071967
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9073 /
tcp
-1399940268 | 2025-04-12T06:22:47.451727
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9074 /
tcp
-1888448627 | 2025-04-03T19:17:23.102137
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9082 /
tcp
632542934 | 2025-04-24T00:26:46.371973
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
9091 /
tcp
-1026951088 | 2025-04-26T08:17:19.551558
9092 /
tcp
740837454 | 2025-04-27T17:04:48.821760
SSH-2.0-OpenSSH_5.3
Vulnerabilities
638001051 | 2025-04-05T13:03:44.472486
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2311_PS-000-013Ry57_7584-47162
9102 /
tcp
819727972 | 2025-04-12T06:30:14.146825
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9111 /
tcp
-1399940268 | 2025-04-24T13:23:13.182575
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9112 /
tcp
-2140303521 | 2025-04-10T04:32:59.290456
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
9113 /
tcp
1911457608 | 2025-04-11T17:13:44.976954
\x00[\x00\x00\x00\x00\x00\x00
9126 /
tcp
921225407 | 2025-04-27T15:20:05.070640
\x00\x00\x00\x04\x00\x00\x00\x00\x00
9138 /
tcp
-2089734047 | 2025-04-12T06:23:16.910424
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9139 /
tcp
-1888448627 | 2025-04-14T21:16:45.288332
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9142 /
tcp
-2096652808 | 2025-04-11T19:25:00.863103
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
9144 /
tcp
-2089734047 | 2025-04-06T21:12:35.110806
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9151 /
tcp
474736340 | 2025-04-20T00:15:52.085918
431 Unable to negotiate secure command connection.
9152 /
tcp
-1399940268 | 2025-04-05T17:45:12.729615
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9157 /
tcp
-1399940268 | 2025-04-16T06:28:28.597431
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9159 /
tcp
-441419608 | 2025-04-17T10:10:55.820693
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
9160 /
tcp
632542934 | 2025-04-25T16:52:03.897465
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
9169 /
tcp
580340387 | 2025-04-21T10:56:21.613157
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
9179 /
tcp
-441419608 | 2025-04-18T17:46:29.639832
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
9192 /
tcp
632542934 | 2025-04-20T20:41:49.158979
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
9195 /
tcp
819727972 | 2025-04-12T23:18:59.564661
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9196 /
tcp
-1059554316 | 2025-04-20T10:55:06.998105
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
9206 /
tcp
165188539 | 2025-04-25T17:18:50.704978
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9213 /
tcp
819727972 | 2025-04-25T13:52:22.540435
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9223 /
tcp
1948301213 | 2025-04-23T07:54:05.356029
RFB 003.003
VNC:
Protocol Version: 3.3
9244 /
tcp
-2033111675 | 2025-04-05T02:02:36.980395
9247 /
tcp
-136006866 | 2025-04-08T06:50:18.662181
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
9248 /
tcp
-1036370807 | 2025-04-21T03:56:23.938511
9252 /
tcp
-1399940268 | 2025-03-31T16:24:05.366471
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9292 /
tcp
410249975 | 2025-04-25T14:39:48.976647
9306 /
tcp
-1730858130 | 2025-04-21T13:13:13.967428
RFB 003.008
VNC:
Protocol Version: 3.8
9333 /
tcp
2087396567 | 2025-04-08T06:19:05.244889
kjnkjabhbanc283ubcsbhdc72
9351 /
tcp
819727972 | 2025-04-02T22:31:25.806780
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9353 /
tcp
1996932384 | 2025-04-03T07:29:11.589392
9389 /
tcp
1911457608 | 2025-04-28T03:43:41.839799
\x00[\x00\x00\x00\x00\x00\x00
9398 /
tcp
-971970408 | 2025-04-18T21:50:02.914275
1909672637 | 2025-04-23T04:02:41.706088
HTTP/1.1 400 Bad Request
Content-Type: text/plain; charset=utf-8
Sec-Websocket-Version: 13
X-Content-Type-Options: nosniff
9505 /
tcp
921225407 | 2025-04-16T21:31:00.011096
\x00\x00\x00\x04\x00\x00\x00\x00\x00
9529 /
tcp
-1329831334 | 2025-04-24T01:20:58.001774
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
9532 /
tcp
-1399940268 | 2025-04-07T12:00:05.293967
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9754 /
tcp
-1399940268 | 2025-03-31T20:18:24.050487
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9761 /
tcp
-1399940268 | 2025-04-25T01:07:20.887211
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9779 /
tcp
-1487943323 | 2025-04-01T13:12:43.456821
431 Unable to negotiate secure command connection.\r\n
9876 /
tcp
2109639173 | 2025-04-23T12:25:44.329548
\\x00\\x00\\x01\\xb8\\x00\\x00\\x00_{"code":0,"flag":1,"language":"JAVA","opaque":0,"serializeTypeCurrentRPC":"JSON","version":401}{"brokerAddrTable":{"rocketmq-cnng0d8ee3802629-broker-0":{"brokerAddrs":{0:"180.184.35.245:30950",2:"180.184.35.245:30951",3:"180.184.35.245:30952"},"brokerName":"rocketmq-cnng0d8ee3802629-broker-0","cluster":"rocketmq-cnng0d8ee3802629-broker"}},"clusterAddrTable":{"rocketmq-cnng0d8ee3802629-broker":["rocketmq-cnng0d8ee3802629-broker-0"]}}
9902 /
tcp
1615193817 | 2025-04-24T00:31:10.927394
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
9923 /
tcp
1911457608 | 2025-04-19T06:57:57.214861
\x00[\x00\x00\x00\x00\x00\x00
9992 /
tcp
632542934 | 2025-04-08T16:45:57.517966
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
9997 /
tcp
165188539 | 2025-03-31T07:27:09.559670
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
-347274959 | 2025-04-01T14:40:54.690850
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2831_PS-000-01PIX79_36197-59880
9999 /
tcp
1161309183 | 2025-04-24T04:52:19.505890
10001 /
tcp
1492413928 | 2025-04-09T16:15:46.439707
SSH-2.0-OpenSSH_7.5
Vulnerabilities
10003 /
tcp
-1140468363 | 2025-04-04T17:54:26.373741
10006 /
tcp
-1947777893 | 2025-04-27T01:04:49.246710
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
10047 /
tcp
-1611764932 | 2025-04-19T20:56:35.830412
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
10051 /
tcp
171352214 | 2025-04-06T11:48:29.696545
-ERR client ip is not in whitelist
10134 /
tcp
-1598265216 | 2025-04-25T17:41:32.621585
10249 /
tcp
671605376 | 2025-04-28T03:57:32.214843
10250 /
tcp
-68075478 | 2025-04-11T01:37:03.658644
10397 /
tcp
-2089734047 | 2025-04-24T02:47:22.605247
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
10554 /
tcp
819727972 | 2025-04-06T19:21:41.348054
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10911 /
tcp
820958131 | 2025-04-27T11:45:00.219354
kjnkjabhbanc283ubcsbhdc72\x02
10933 /
tcp
819727972 | 2025-04-17T11:08:21.504731
SSH-2.0-OpenSSH_7.4
Vulnerabilities
11002 /
tcp
-1399940268 | 2025-04-21T20:36:40.385385
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
11112 /
tcp
-1399940268 | 2025-04-15T14:08:47.350690
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
11210 /
tcp
401555314 | 2025-04-25T03:09:20.826968
11211 /
tcp
-136006866 | 2025-04-19T10:47:47.877814
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
11288 /
tcp
-122096153 | 2025-04-11T07:32:09.170868
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
11481 /
tcp
1189133115 | 2025-04-15T22:00:52.503966
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
11680 /
tcp
1948301213 | 2025-04-25T10:01:55.343458
RFB 003.003
VNC:
Protocol Version: 3.3
227700176 | 2025-04-25T19:26:00.899718
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
Cache-Control: no-store, no-transform
Set-Cookie: _csrf=kW6lEf7WlBTiDChV5oht1zfpUBE6MTcwNTkxMjc1NjU1NzkzNjYwNQ; Path=/; Expires=Tue, 23 Jan 2024 08:39:16 GMT; HttpOnly; SameSite=Lax
Set-Cookie: macaron_flash=; Path=/; Max-Age=0; HttpOnly; SameSite=Lax
X-Frame-Options: SAMEORIGIN
Cache-Control: no-cache
12016 /
tcp
-1888448627 | 2025-04-23T22:42:57.896226
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12082 /
tcp
1911457608 | 2025-04-12T17:47:25.160641
\x00[\x00\x00\x00\x00\x00\x00
12084 /
tcp
1492413928 | 2025-04-24T00:25:07.330076
SSH-2.0-OpenSSH_7.5
Vulnerabilities
971933601 | 2025-04-26T08:22:12.276154
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
12139 /
tcp
-1114821551 | 2025-04-05T20:14:03.602593
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
12142 /
tcp
-2096652808 | 2025-04-12T17:44:18.453532
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12143 /
tcp
-1730858130 | 2025-04-06T04:31:49.335234
RFB 003.008
VNC:
Protocol Version: 3.8
12151 /
tcp
401555314 | 2025-04-17T21:52:28.291830
12190 /
tcp
-891714208 | 2025-04-27T14:56:50.455665
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
12193 /
tcp
-2096652808 | 2025-04-01T00:00:54.777200
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12200 /
tcp
-249504111 | 2025-04-05T06:42:49.613150
12203 /
tcp
709622286 | 2025-04-25T14:48:28.728084
OK Welcome <299685> on DirectUpdate server 7286\r\n
12231 /
tcp
-1810987450 | 2025-04-08T11:01:50.695155
12234 /
tcp
165188539 | 2025-04-23T20:18:51.096416
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12238 /
tcp
-1327660293 | 2025-04-15T10:18:39.527326
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
12244 /
tcp
165188539 | 2025-04-19T20:02:53.810061
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12248 /
tcp
1308377066 | 2025-04-05T12:02:29.891302
12249 /
tcp
321971019 | 2025-04-19T16:52:49.919491
-ERR client ip is not in whitelist\r
12280 /
tcp
1911457608 | 2025-04-16T11:48:52.831867
\x00[\x00\x00\x00\x00\x00\x00
12287 /
tcp
1723769361 | 2025-04-24T19:05:22.830897
ELM Enterprise Manager _l\r\nCopyright \xc2\xa9 18668511-928641920 TNT Software, Inc.\r\n
12297 /
tcp
-1399940268 | 2025-04-10T02:36:36.028200
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12299 /
tcp
1278527606 | 2025-04-17T20:04:03.513152
12305 /
tcp
-1327660293 | 2025-04-28T07:25:10.649609
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
12309 /
tcp
-1399940268 | 2025-04-05T15:45:22.847804
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12324 /
tcp
-136006866 | 2025-04-05T17:12:23.181721
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
12330 /
tcp
-2089734047 | 2025-04-09T14:30:45.221863
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12336 /
tcp
-1737707071 | 2025-04-17T18:11:55.710503
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
12338 /
tcp
1911457608 | 2025-04-24T21:51:17.875635
\x00[\x00\x00\x00\x00\x00\x00
296364507 | 2025-04-27T04:49:57.004961
HTTP/1.1 500 Internal Server Error
SERVER: Trend Chip UPnP/1.0 DMS
CONNECTION: close
CONTENT-LENGTH: 60
CONTENT-TYPE: text/html
12351 /
tcp
-1888448627 | 2025-04-23T02:53:22.665025
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12354 /
tcp
-1888448627 | 2025-04-22T04:00:54.975540
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12363 /
tcp
307999478 | 2025-04-10T05:43:53.500488
unknown command \r\nunknown command \r\n
12366 /
tcp
1642597142 | 2025-04-24T17:58:22.906949
\x00y\xc3\x90\x02\xc3\xbf\xc3\xbf\x00s\x12L\x00\x06\x11I\x00\x08\x00N\x11S\x00\xc3\x93
12367 /
tcp
-1428621233 | 2025-04-16T17:04:56.975076
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
12368 /
tcp
819727972 | 2025-04-28T10:51:16.044043
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2103111368 | 2025-04-24T20:17:07.217621
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
12401 /
tcp
632542934 | 2025-04-16T21:05:16.067151
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
12404 /
tcp
455076604 | 2025-04-27T03:57:26.066263
!\x07version\x04bind7 t{RPowerDNS Recursor 410
12416 /
tcp
408230060 | 2025-04-26T04:23:27.045177
\r\nSorry, that nickname format is invalid.\r\n
12441 /
tcp
-2089734047 | 2025-04-15T13:46:03.581525
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12449 /
tcp
819727972 | 2025-04-24T23:03:32.727083
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12451 /
tcp
1911457608 | 2025-04-01T22:31:25.801639
\x00[\x00\x00\x00\x00\x00\x00
12454 /
tcp
-1487943323 | 2025-04-20T20:44:58.168506
431 Unable to negotiate secure command connection.\r\n
12456 /
tcp
-358801646 | 2025-04-21T03:19:22.863492
12481 /
tcp
-1399940268 | 2025-04-22T18:54:57.422422
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12483 /
tcp
819727972 | 2025-04-06T03:31:15.165692
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12492 /
tcp
1911457608 | 2025-04-18T13:22:40.219263
\x00[\x00\x00\x00\x00\x00\x00
12501 /
tcp
897328069 | 2025-04-19T19:33:43.222947
220 mail.scott000.com ESMTP
12508 /
tcp
-1399940268 | 2025-04-11T18:58:49.256130
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12509 /
tcp
1623746877 | 2025-04-25T00:00:00.317110
500 Permission denied - closing connection.\r\n
12513 /
tcp
-2031152423 | 2025-04-20T03:00:10.496558
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
12516 /
tcp
2098371729 | 2025-04-07T19:33:14.709706
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
12530 /
tcp
-2096652808 | 2025-04-15T10:38:18.933632
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12543 /
tcp
-2031152423 | 2025-04-23T17:50:06.776510
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
12575 /
tcp
-1399940268 | 2025-04-07T12:35:25.543970
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12582 /
tcp
165188539 | 2025-04-21T21:41:42.536518
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12601 /
tcp
1911457608 | 2025-04-14T19:25:05.058248
\x00[\x00\x00\x00\x00\x00\x00
12902 /
tcp
-1399940268 | 2025-04-02T18:56:04.620415
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
13084 /
tcp
819727972 | 2025-04-24T18:51:30.744928
SSH-2.0-OpenSSH_7.4
Vulnerabilities
13780 /
tcp
1911457608 | 2025-04-17T22:37:55.079894
\x00[\x00\x00\x00\x00\x00\x00
14147 /
tcp
-1399940268 | 2025-04-18T20:03:59.010480
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
14184 /
tcp
-358801646 | 2025-04-20T16:17:45.074394
14344 /
tcp
321971019 | 2025-04-23T03:28:41.710424
-ERR client ip is not in whitelist\r
14873 /
tcp
707919486 | 2025-04-24T21:49:26.320498
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
14905 /
tcp
1665283070 | 2025-04-10T14:12:44.925554
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x01\x00\x00\x10\x00\x00\n0\x03\x00\x00\x00\x01\x00\x05\x00\x00@\x00\x00\x06\x00\x00\x1f@
1509130814 | 2025-04-03T16:17:12.948831
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae29f9_PS-000-01Q6N23_11336-21575
616471057 | 2025-04-26T13:57:51.363359
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html; charset=utf-8
X-Powered-By: PHP/7.4.19
refresh: 1800
Vary: Accept-Encoding
Transfer-Encoding: chunked
Vulnerabilities
15151 /
tcp
1723769361 | 2025-04-20T23:04:05.857936
ELM Enterprise Manager _l\r\nCopyright \xc2\xa9 18668511-928641920 TNT Software, Inc.\r\n
15503 /
tcp
1911457608 | 2025-04-21T18:26:55.926662
\x00[\x00\x00\x00\x00\x00\x00
16002 /
tcp
-1399940268 | 2025-04-21T20:17:01.416852
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16019 /
tcp
1911457608 | 2025-04-07T17:45:34.242052
\x00[\x00\x00\x00\x00\x00\x00
16021 /
tcp
-1399940268 | 2025-04-08T21:29:49.464472
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-2118655245 | 2025-04-26T21:54:48.801829
HTTP/1.0 500 Internal Server Error
Content-Length: 20
16031 /
tcp
-2096652808 | 2025-04-23T00:35:34.424628
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
16033 /
tcp
-1399940268 | 2025-04-15T17:21:22.927624
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16046 /
tcp
-1399940268 | 2025-04-11T22:14:21.535244
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16047 /
tcp
-358801646 | 2025-04-28T00:39:45.312092
16058 /
tcp
-2033111675 | 2025-04-20T20:49:01.650333
-1839934832 | 2025-04-15T18:11:25.056579
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
16081 /
tcp
707919486 | 2025-04-15T16:50:08.476931
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
16082 /
tcp
165188539 | 2025-04-02T20:24:10.913609
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
16084 /
tcp
165188539 | 2025-04-25T02:26:41.509754
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
16094 /
tcp
-303199180 | 2025-04-20T17:21:15.459258
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
16102 /
tcp
-1888448627 | 2025-04-02T01:30:27.785607
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
16316 /
tcp
1911457608 | 2025-04-26T15:52:26.990678
\x00[\x00\x00\x00\x00\x00\x00
16464 /
tcp
2087396567 | 2025-04-02T09:59:11.284188
kjnkjabhbanc283ubcsbhdc72
16993 /
tcp
-445721795 | 2025-04-27T23:37:07.406878
\x00[\xc3\xaed\x1a\x7f\x00\x00
17000 /
tcp
-1810987450 | 2025-04-03T20:17:35.761370
18007 /
tcp
722711397 | 2025-04-18T17:14:47.194152
\x00[M\xc3\xba\xc3\x9a\x7f\x00\x00
18008 /
tcp
819727972 | 2025-04-18T11:55:58.065381
SSH-2.0-OpenSSH_7.4
Vulnerabilities
18009 /
tcp
-1375131644 | 2025-04-11T02:08:15.770902
\x00[v\xc3\xbdC\x7f\x00\x00
18024 /
tcp
-345718689 | 2025-04-22T07:18:55.059720
18032 /
tcp
1726594447 | 2025-04-27T01:11:57.615264
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
18047 /
tcp
321971019 | 2025-04-21T20:31:30.942224
-ERR client ip is not in whitelist\r
18052 /
tcp
1011407350 | 2025-04-19T12:42:22.486019
* OK GroupWise IMAP4rev1 Server Ready\r\n
2143387245 | 2025-04-21T23:53:51.519170
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
18060 /
tcp
632542934 | 2025-04-23T20:42:44.393745
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
18065 /
tcp
401555314 | 2025-04-15T14:20:09.694004
18074 /
tcp
-653033013 | 2025-04-09T07:03:09.613568
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
18076 /
tcp
1332894250 | 2025-04-02T03:12:02.372863
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
18079 /
tcp
1332894250 | 2025-04-03T19:41:48.601664
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
18081 /
tcp
-1399940268 | 2025-04-23T13:48:43.547187
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18085 /
tcp
-891714208 | 2025-04-09T15:01:40.348836
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
1473380279 | 2025-04-14T19:59:30.262029
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65a113d3_PSfjfzdx2zb89_8264-50748
18106 /
tcp
-1733645023 | 2025-04-09T08:55:44.993871
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
18239 /
tcp
1911457608 | 2025-04-06T11:48:58.744718
\x00[\x00\x00\x00\x00\x00\x00
18245 /
tcp
-904840257 | 2025-04-27T23:28:24.769123
572 Relay not authorized\r\n
18264 /
tcp
1543809371 | 2025-04-08T01:41:12.668583
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
19082 /
tcp
-1399940268 | 2025-04-06T03:46:01.549354
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
19091 /
tcp
-2089734047 | 2025-04-11T20:49:51.946315
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1900503736 | 2025-04-08T05:17:35.773128
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-HTTPAPI/2.0
20010 /
tcp
819727972 | 2025-04-24T12:02:13.436989
SSH-2.0-OpenSSH_7.4
Vulnerabilities
20053 /
tcp
-980525298 | 2025-04-25T13:05:08.094486
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
20060 /
tcp
165188539 | 2025-04-15T05:38:52.313348
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
20070 /
tcp
-1399940268 | 2025-04-20T08:11:39.469599
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
20256 /
tcp
-1399940268 | 2025-04-21T18:35:39.261069
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
20512 /
tcp
-616720387 | 2025-04-17T11:38:00.871642
20547 /
tcp
-1327660293 | 2025-04-12T22:34:07.129455
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
20600 /
tcp
1308377066 | 2025-04-01T15:11:04.183123
20800 /
tcp
-358801646 | 2025-04-11T06:06:53.379887
21001 /
tcp
89142341 | 2025-04-15T01:32:56.396927
\x05\x00\x00\x00\x0b\x08\x05\x1a\x00
21025 /
tcp
1741579575 | 2025-04-26T20:52:53.738957
21027 /
tcp
104385780 | 2025-04-04T09:35:59.902844
21230 /
tcp
1210754493 | 2025-04-25T22:27:29.341708
0\x0c\x02\x01\x01a\x07\n\x01\x00\x04\x00\x04\x00
21233 /
tcp
819727972 | 2025-04-06T10:49:18.539637
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21245 /
tcp
-1947777893 | 2025-04-12T21:02:27.541269
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
21265 /
tcp
-801484042 | 2025-04-22T15:05:23.154771
21266 /
tcp
-1399940268 | 2025-03-29T15:38:48.113871
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21270 /
tcp
-358801646 | 2025-04-06T23:24:30.378811
1077013874 | 2025-04-04T04:56:52.407806
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
21330 /
tcp
-1477838366 | 2025-04-27T20:13:13.938307
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
21379 /
tcp
1189133115 | 2025-04-12T20:04:07.445158
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
21381 /
tcp
722711397 | 2025-04-09T19:31:00.063225
\x00[M\xc3\xba\xc3\x9a\x7f\x00\x00
21443 /
tcp
669849225 | 2025-04-06T02:53:43.212306
SSH-98.60-SysaxSSH_81885..42\r\n
21515 /
tcp
671605376 | 2025-04-04T17:05:16.607625
22000 /
tcp
117101543 | 2025-04-01T18:57:15.044506
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
22001 /
tcp
819727972 | 2025-04-04T05:28:31.469385
SSH-2.0-OpenSSH_7.4
Vulnerabilities
22022 /
tcp
740837454 | 2025-04-05T01:18:32.767998
SSH-2.0-OpenSSH_5.3
Vulnerabilities
22067 /
tcp
-786044033 | 2025-04-02T04:01:28.687208
OK Welcome <299685> on DirectUpdate server 7286
22069 /
tcp
1741579575 | 2025-04-01T06:02:18.927408
22556 /
tcp
-345718689 | 2025-04-08T04:36:12.541456
23424 /
tcp
-1999117212 | 2025-04-12T09:11:27.349300
24082 /
tcp
-1399940268 | 2025-04-24T13:15:07.157365
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
24442 /
tcp
-457235091 | 2025-04-20T13:30:25.387362
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
25001 /
tcp
165188539 | 2025-04-22T19:29:48.140656
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
25002 /
tcp
1353260875 | 2025-04-16T18:23:35.821687
\x00[g\xc2\x95N\x7f\x00\x00
25010 /
tcp
632542934 | 2025-04-22T07:26:27.943106
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
25082 /
tcp
1911457608 | 2025-03-31T07:54:11.699289
\x00[\x00\x00\x00\x00\x00\x00
25105 /
tcp
539065883 | 2025-04-12T11:45:30.883243
25565 /
tcp
-1795027372 | 2025-04-04T06:36:27.068246
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
27015 /
tcp
-481785538 | 2025-04-28T09:24:30.293008
Command: None
Size: 1347703880
ID: 808333615
Type: 808464928
27016 /
tcp
-971970408 | 2025-04-11T22:40:58.728302
27017 /
tcp
1763259671 | 2025-04-15T00:35:50.224330
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
28015 /
tcp
51259122 | 2025-04-16T18:21:10.439152
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
28017 /
tcp
-2081419599 | 2025-04-12T01:37:46.058811
28443 /
tcp
-1099385124 | 2025-04-25T07:49:12.616542
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
29840 /
tcp
1353260875 | 2025-04-19T18:03:42.277236
\x00[g\xc2\x95N\x7f\x00\x00
29984 /
tcp
-1327660293 | 2025-04-11T08:12:18.304402
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
30008 /
tcp
1975288991 | 2025-04-18T13:07:47.196380
30023 /
tcp
-1730858130 | 2025-04-25T10:21:00.759444
RFB 003.008
VNC:
Protocol Version: 3.8
30122 /
tcp
-746114901 | 2025-04-06T04:25:18.829837
30222 /
tcp
-1730858130 | 2025-04-05T19:34:31.827388
RFB 003.008
VNC:
Protocol Version: 3.8
30301 /
tcp
-1189269828 | 2025-04-09T07:28:14.395088
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
30479 /
tcp
-1399940268 | 2025-04-19T01:22:25.643741
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
30718 /
tcp
428036883 | 2025-04-02T23:25:50.541217
LH\xdb\xc6\xdd\xf6g\x10\x19\x00\x00\x00\x18\x00\x01\x02\x00\x10\x00\x04\x00\x00\x00\x01b\xa8\xacO\xd0\x10D!\xce\x19Aa\xaf\x04\x8c\xfe
31022 /
tcp
2087396567 | 2025-04-05T18:06:45.432993
kjnkjabhbanc283ubcsbhdc72
756886313 | 2025-04-24T00:39:14.877054
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
31422 /
tcp
1690634669 | 2025-04-05T07:30:43.869571
31522 /
tcp
-1059554316 | 2025-04-04T22:40:09.661211
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
31622 /
tcp
-1990350878 | 2025-04-04T15:39:41.483250
32322 /
tcp
-903067560 | 2025-04-04T21:01:52.599339
\x00[\x13)\xc2\x81\x7f\x00\x00
32400 /
tcp
2087396567 | 2025-04-12T03:43:22.026312
kjnkjabhbanc283ubcsbhdc72
32764 /
tcp
799468586 | 2025-04-01T10:02:51.815610
33060 /
tcp
1308377066 | 2025-04-24T06:35:09.120758
114471724 | 2025-04-11T16:09:12.115388
HTTP/1.1 302
X-Frame-Options: SAMEORIGIN
Server: NSX
34225 /
tcp
-146605374 | 2025-04-23T01:05:46.722723
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
36505 /
tcp
1830187220 | 2025-04-24T20:15:15.577776
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
37777 /
tcp
1381121983 | 2025-04-20T10:04:36.698262
41800 /
tcp
1623746877 | 2025-04-24T09:42:55.608651
500 Permission denied - closing connection.\r\n
42194 /
tcp
639175818 | 2025-04-08T18:48:18.619564
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
42235 /
tcp
-1399940268 | 2025-04-25T02:05:44.350890
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
42443 /
tcp
632542934 | 2025-04-11T02:43:10.603616
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
43221 /
tcp
1911457608 | 2025-04-22T12:13:44.729897
\x00[\x00\x00\x00\x00\x00\x00
44021 /
tcp
819727972 | 2025-03-31T21:09:53.710951
SSH-2.0-OpenSSH_7.4
Vulnerabilities
44158 /
tcp
-433302150 | 2025-04-18T10:25:30.398679
44303 /
tcp
408230060 | 2025-04-12T10:39:22.691001
\r\nSorry, that nickname format is invalid.\r\n
44304 /
tcp
-2089734047 | 2025-04-15T04:05:04.936763
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
44308 /
tcp
-339084706 | 2025-04-04T18:20:15.824883
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
44332 /
tcp
-375604792 | 2025-04-20T19:06:57.168230
220 Microsoft FTP Service
44818 /
tcp
1426971893 | 2025-04-11T05:34:21.516100
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
45001 /
tcp
819727972 | 2025-04-27T22:16:17.157839
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1282941221 | 2025-04-15T13:17:54.038894
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
45667 /
tcp
1911457608 | 2025-04-09T21:30:14.597383
\x00[\x00\x00\x00\x00\x00\x00
47808 /
tcp
474736340 | 2025-04-10T18:46:30.682788
431 Unable to negotiate secure command connection.
47990 /
tcp
819727972 | 2025-04-14T19:42:46.607742
SSH-2.0-OpenSSH_7.4
Vulnerabilities
48888 /
tcp
-1888448627 | 2025-03-29T12:53:42.821976
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
49121 /
tcp
-1399940268 | 2025-04-04T10:53:35.197490
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-447260792 | 2025-04-11T04:00:41.389057
HTTP/1.1 500 Internal Server Error
CONTENT-LENGTH: 411
CONTENT-TYPE: text/xml; charset="utf-8"
DATE: Mon, 22 Jan 2024 16:17:13 GMT
EXT:
SERVER: Linux, UPnP/1.0, Private Upnp SDK
X-User-Agent: redsonic
<s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
<s:Body>
<s:Fault>
<faultcode>s:Client</faultcode>
<faultstring>UPnPError</faultstring>
<detail>
<UPnPError xmlns="urn:schemas-upnp-org:control-1-0">
<errorCode>-1</errorCode>
<
49502 /
tcp
-1746074029 | 2025-04-11T12:41:05.765808
49682 /
tcp
-2089734047 | 2025-04-09T17:55:37.831012
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
49692 /
tcp
-1399940268 | 2025-04-27T13:33:24.605660
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50000 /
tcp
2087396567 | 2025-04-26T03:48:13.375461
kjnkjabhbanc283ubcsbhdc72
50004 /
tcp
-249504111 | 2025-04-04T11:17:29.011492
50050 /
tcp
-1461540015 | 2025-04-10T23:38:39.751509
audio 0 RTP/AVP 18 4 3 8 0 101
a
50100 /
tcp
290819026 | 2025-04-21T01:36:42.040279
welcome to Pandora console!
----------------------------
-------------------------
| Login Time | 2021-12-08 1...
50104 /
tcp
580340387 | 2025-04-18T08:32:54.651329
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
51106 /
tcp
-527005584 | 2025-04-10T19:48:14.068165
51235 /
tcp
165188539 | 2025-04-20T00:01:58.457952
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
51294 /
tcp
1911457608 | 2025-04-24T04:37:47.889195
\x00[\x00\x00\x00\x00\x00\x00
53200 /
tcp
-358801646 | 2025-04-14T23:26:07.657347
53805 /
tcp
-1399940268 | 2025-04-16T18:07:47.033389
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
54138 /
tcp
-653033013 | 2025-04-23T03:57:02.691976
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
54444 /
tcp
669849225 | 2025-04-07T23:54:58.784086
SSH-98.60-SysaxSSH_81885..42\r\n
55442 /
tcp
-1316491703 | 2025-04-10T02:34:25.290116
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready
55443 /
tcp
819727972 | 2025-04-01T01:17:48.218333
SSH-2.0-OpenSSH_7.4
Vulnerabilities
55553 /
tcp
1850902677 | 2025-04-28T10:00:42.324336
55554 /
tcp
842535728 | 2025-04-10T00:11:06.172468
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
59012 /
tcp
401555314 | 2025-04-21T13:28:16.669004
60001 /
tcp
-971970408 | 2025-04-09T18:57:29.404446
60129 /
tcp
585675468 | 2025-04-03T19:02:32.782523
115332119 | 2025-04-23T13:19:12.168103
HTTP/1.1 403 Forbidden
Transfer-Encoding: chunked
Connection: keep-alive
Content-Type: application/json
Access-Control-Allow-Origin: *
62078 /
tcp
-154616015 | 2025-04-25T00:45:53.537610
=\x01À\x06ÿÿ?"<ZDECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x01\x01
62237 /
tcp
1911457608 | 2025-04-01T23:53:19.006130
\x00[\x00\x00\x00\x00\x00\x00
63210 /
tcp
-1358907795 | 2025-04-19T10:52:31.985821
63256 /
tcp
-79865617 | 2025-04-23T21:54:04.525257
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com
mit-revprops depth log-revprops partial-replay ) ) )
63257 /
tcp
1741579575 | 2025-04-06T22:33:14.298315
63260 /
tcp
1842524259 | 2025-04-07T06:52:33.082410
63443 /
tcp
165188539 | 2025-04-04T05:59:42.517939
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
64738 /
tcp
2087396567 | 2025-04-09T22:25:32.198047
kjnkjabhbanc283ubcsbhdc72
65432 /
tcp
-2096652808 | 2025-04-22T16:27:20.422299
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n