45.60.62.42

Regular View Raw Data
Last Seen: 2024-09-18
Tags:
cdn

GeneralInformation

Hostnames spot.dscp.solutions
vitae.dscp.solutions
vitae-next.dscp.solutions
enjoy.goodhealth.tech
imperva.com
goodhealth.remark.solutions
remarkgroup.com
www.remarkgroup.com
lifeportal-apac-mai.scor.com
lifeportal-apac-uat.scor.com
lifeportal-asia-mai.scor.com
lifeportal-emea-bld.scor.com
lifeportal-emea-dvt.scor.com
lifeportal-emea-int.scor.com
lifeportal-emea-mai.scor.com
lifeportal-emea-uat.scor.com
lifeportaltest.scor.com
recette-knowledge.scor.com
scordigitalsolutions.com
www.scordigitalsolutions.com
scorgloballifeamericas.com
swedenre.se
boclhk.wearableapi.com
group.wearableapi.com
healthcore.wearableapi.com
hla.wearableapi.com
nanshan.wearableapi.com
staging.nanshan.wearableapi.com
Domains dscp.solutions goodhealth.tech imperva.com remark.solutions remarkgroup.com scor.com scordigitalsolutions.com scorgloballifeamericas.com swedenre.se wearableapi.com 
Country United States
City Redwood City
Organization Incapsula Inc
ISP Incapsula Inc
ASN AS19551

WebTechnologies

JavaScript libraries
Security
Web frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

1443275237 | 2024-09-10T19:46:45.408591
  
25 / tcp
704219626 | 2024-08-28T12:50:10.935472
  
43 / tcp
740017397 | 2024-09-12T07:14:17.303958
  
80 / tcp
-1677346146 | 2024-09-16T17:24:39.424865
  
81 / tcp
-1900426203 | 2024-09-07T07:49:27.350365
  
82 / tcp
-1141260518 | 2024-09-10T02:23:57.192983
  
83 / tcp
542735554 | 2024-08-30T19:09:13.594835
  
84 / tcp
-1405288747 | 2024-09-10T11:46:59.928813
  
88 / tcp
-364230010 | 2024-09-12T06:13:41.180811
  
135 / tcp
-365822819 | 2024-09-14T23:57:13.496637
  
389 / tcp
-1631197182 | 2024-09-18T15:09:11.565176
  
443 / tcp
-58383008 | 2024-09-16T14:35:13.852687
  
444 / tcp
820463841 | 2024-09-07T00:32:02.502190
  
465 / tcp
596000182 | 2024-09-11T23:56:32.548748
  
554 / tcp
1201498520 | 2024-09-16T23:57:31.308421
  
587 / tcp
653803337 | 2024-09-14T22:51:04.509648
  
631 / tcp
543070456 | 2024-09-16T21:49:41.387739
  
636 / tcp
147317929 | 2024-09-16T16:58:11.950557
  
771 / tcp
-1325781139 | 2024-09-09T12:46:54.034362
  
1024 / tcp
-1083329422 | 2024-09-16T18:53:50.333847
  
1177 / tcp
1176000766 | 2024-09-15T00:58:57.403842
  
1234 / tcp
-47773830 | 2024-09-15T02:45:41.716789
  
1337 / tcp
52875699 | 2024-09-17T18:34:18.328961
  
1400 / tcp
-462366413 | 2024-09-18T01:05:33.106126
  
1433 / tcp
-694867687 | 2024-09-17T21:22:03.781857
  
1443 / tcp
268396094 | 2024-08-29T08:28:55.865018
  
1521 / tcp
1397999675 | 2024-09-17T10:55:57.953344
  
1935 / tcp
-860990724 | 2024-08-30T11:09:20.224917
  
2000 / tcp
1610566296 | 2024-09-17T12:04:06.717088
  
2082 / tcp
547753346 | 2024-09-18T01:56:29.551902
  
2083 / tcp
-592008611 | 2024-09-15T22:14:56.986881
  
2086 / tcp
1745935952 | 2024-09-10T14:51:53.800054
  
2087 / tcp
1998998491 | 2024-09-18T10:17:31.675626
  
2345 / tcp
-1683588811 | 2024-09-18T07:58:31.085885
  
2375 / tcp
1427669245 | 2024-09-04T18:53:22.915542
  
2376 / tcp
564793415 | 2024-09-10T20:44:48.025493
  
2404 / tcp
1853034775 | 2024-09-02T07:35:04.760916
  
2480 / tcp
-1058033253 | 2024-09-06T18:41:47.857282
  
2628 / tcp
1292873336 | 2024-09-15T16:18:49.105236
  
2761 / tcp
-1682132069 | 2024-09-06T04:53:36.363012
  
2762 / tcp
-444519249 | 2024-09-18T23:34:57.980565
  
3000 / tcp
1055265445 | 2024-09-18T08:06:30.951118
  
3001 / tcp
-575070627 | 2024-09-18T06:26:46.702207
  
3050 / tcp
1157191243 | 2024-09-14T20:26:55.580635
  
3268 / tcp
-2079979341 | 2024-09-10T03:24:22.317537
  
3269 / tcp
-132742577 | 2024-09-16T19:38:36.080128
  
3299 / tcp
1851785524 | 2024-09-18T00:21:15.489720
  
3333 / tcp
914589765 | 2024-09-17T12:41:25.522553
  
3389 / tcp
-175019355 | 2024-09-16T07:44:19.860372
  
3790 / tcp
852882524 | 2024-09-16T15:25:58.046206
  
4000 / tcp
-913191427 | 2024-09-17T16:02:38.934099
  
4022 / tcp
798889994 | 2024-09-16T03:44:47.663218
  
4040 / tcp
0 | 2024-09-18T00:50:03.308125
  
4064 / tcp
1452645667 | 2024-09-10T13:13:09.094726
  
4434 / tcp
-2119991753 | 2024-08-28T07:42:55.727295
  
4443 / tcp
1222941506 | 2024-09-08T02:09:53.055465
  
4444 / tcp
-1805802024 | 2024-09-12T00:56:04.170814
  
4500 / tcp
1024597256 | 2024-09-05T02:27:10.207012
  
4567 / tcp
-1314670518 | 2024-09-10T21:19:57.552899
  
4848 / tcp
976623326 | 2024-09-11T06:19:46.683543
  
4911 / tcp
529133813 | 2024-09-18T08:08:21.989416
  
5000 / tcp
-1467830054 | 2024-09-08T12:06:40.606264
  
5001 / tcp
-779256534 | 2024-08-26T04:53:42.362129
  
5005 / tcp
-2077826911 | 2024-09-14T08:58:19.098368
  
5006 / tcp
1124560197 | 2024-09-16T22:22:57.881156
  
5007 / tcp
-688471974 | 2024-09-13T18:29:42.419854
  
5009 / tcp
115188545 | 2024-09-14T23:23:22.519688
  
5010 / tcp
-329559087 | 2024-09-10T00:03:01.106327
  
5201 / tcp
-1016642665 | 2024-09-14T16:18:07.023252
  
5222 / tcp
-271559774 | 2024-09-18T09:56:14.283151
  
5555 / tcp
-425775318 | 2024-09-18T00:33:03.695154
  
5560 / tcp
-317102239 | 2024-09-14T02:10:53.646279
  
5601 / tcp
-1944837454 | 2024-09-18T09:27:41.434392
  
5672 / tcp
1561046534 | 2024-09-15T10:38:46.974185
  
5900 / tcp
784497165 | 2024-09-18T07:46:38.931281
  
5985 / tcp
1402251490 | 2024-09-16T07:57:12.263159
  
5986 / tcp
-613827616 | 2024-09-13T17:14:55.924213
  
6000 / tcp
2113396900 | 2024-09-18T18:33:36.347452
  
6001 / tcp
-971294211 | 2024-09-13T08:10:58.578709
  
6080 / tcp
2141475623 | 2024-09-01T03:12:25.241518
  
6443 / tcp
82535028 | 2024-09-08T09:30:22.202567
  
7001 / tcp
733924682 | 2024-09-12T20:35:02.097696
  
7071 / tcp
2027631878 | 2024-09-17T00:52:03.990677
  
7171 / tcp
-1117297881 | 2024-09-07T09:59:04.342055
  
7443 / tcp
1074783950 | 2024-09-13T09:02:12.349593
  
7474 / tcp
-774582831 | 2024-09-16T01:05:21.120459
  
7547 / tcp
-1144979740 | 2024-08-22T09:07:28.880353
  
7548 / tcp
2051431600 | 2024-09-16T13:24:41.738821
  
7777 / tcp
654393697 | 2024-09-16T11:00:38.563017
  
7779 / tcp
-920957542 | 2024-09-17T13:32:50.442509
  
8000 / tcp
777772948 | 2024-09-04T13:31:12.548530
  
8001 / tcp
720367707 | 2024-09-13T09:57:38.301330
  
8008 / tcp
-161011309 | 2024-09-05T02:27:06.489960
  
8009 / tcp
830514654 | 2024-09-09T11:52:33.423893
  
8010 / tcp
-677132919 | 2024-09-18T21:34:47.239107
  
8060 / tcp
-1376369150 | 2024-09-18T08:23:53.623426
  
8069 / tcp
2060739403 | 2024-09-14T02:21:00.555587
  
8080 / tcp
-479700257 | 2024-09-17T12:15:49.270738
  
8081 / tcp
-907719032 | 2024-09-17T14:54:28.097330
  
8083 / tcp
-2116340616 | 2024-09-03T01:41:28.931869
  
8085 / tcp
843180005 | 2024-09-13T19:32:19.480016
  
8086 / tcp
932051456 | 2024-09-17T15:30:01.318152
  
8089 / tcp
-1297853545 | 2024-09-14T07:03:33.711674
  
8090 / tcp
-1926811393 | 2024-09-04T22:56:06.312035
  
8098 / tcp
843006946 | 2024-09-05T15:00:42.467010
  
8112 / tcp
-1864644711 | 2024-09-16T22:16:49.496664
  
8123 / tcp
2035800757 | 2024-09-09T03:23:44.349156
  
8126 / tcp
-321727894 | 2024-09-06T10:28:07.865034
  
8139 / tcp
-1292848666 | 2024-08-31T01:22:50.695751
  
8140 / tcp
1531373196 | 2024-09-14T05:17:26.448147
  
8181 / tcp
1006489285 | 2024-09-17T16:01:45.060799
  
8200 / tcp
-1562258429 | 2024-08-24T16:08:21.562490
  
8384 / tcp
1182858450 | 2024-09-11T01:44:13.557294
  
8443 / tcp
-1107848425 | 2024-08-21T02:13:20.979867
  
8545 / tcp
-915505470 | 2024-09-12T02:28:01.769425
  
8800 / tcp
1929553221 | 2024-09-01T22:34:56.353189
  
8834 / tcp
-1536190330 | 2024-09-04T21:02:06.698116
  
8880 / tcp
767196577 | 2024-09-17T12:12:48.428423
  
8888 / tcp
-1425395241 | 2024-08-25T13:38:26.929716
  
8889 / tcp
613664567 | 2024-09-17T11:45:27.091015
  
9000 / tcp
596984573 | 2024-09-05T10:17:28.041094
  
9001 / tcp
-1058846616 | 2024-09-10T18:25:10.457549
  
9002 / tcp
-756199323 | 2024-09-07T21:18:58.490185
  
9009 / tcp
-860134605 | 2024-08-27T01:35:48.257887
  
9080 / tcp
-1641384807 | 2024-09-16T20:29:36.083942
  
9090 / tcp
1576036159 | 2024-09-15T09:50:11.465099
  
9091 / tcp
2076727753 | 2024-08-30T12:06:25.947844
  
9095 / tcp
-686134757 | 2024-09-13T15:44:28.192890
  
9100 / tcp
-422307541 | 2024-09-18T21:00:28.560893
  
9200 / tcp
110293199 | 2024-09-13T16:57:14.673225
  
9306 / tcp
-1738357654 | 2024-09-13T07:31:30.136505
  
9398 / tcp
-849487940 | 2024-08-25T13:39:27.055285
  
9443 / tcp
-1037383547 | 2024-09-15T15:40:57.232914
  
9600 / tcp
91887609 | 2024-09-17T21:24:02.242957
  
9876 / tcp
1542623718 | 2024-09-08T05:48:11.508688
  
9943 / tcp
-1264594717 | 2024-09-09T13:44:33.470212
  
9998 / tcp
-833147489 | 2024-09-08T06:08:15.628935
  
9999 / tcp
-32998177 | 2024-09-07T07:40:12.003940
  
10000 / tcp
-330901507 | 2024-09-09T07:09:19.097850
  
10001 / tcp
-2067028711 | 2024-09-13T22:28:09.158643
  
10134 / tcp
1499249095 | 2024-09-06T08:55:23.932577
  
10443 / tcp
-211800607 | 2024-09-09T11:38:06.317259
  
12345 / tcp
729705971 | 2024-09-18T18:56:25.144137
  
13047 / tcp
1096000129 | 2024-09-01T22:58:45.135442
  
13579 / tcp
-54081746 | 2024-09-16T13:11:47.901903
  
14265 / tcp
417985474 | 2024-09-05T14:24:08.959517
  
16010 / tcp
-1341999101 | 2024-09-16T01:12:59.086489
  
16030 / tcp
1593697963 | 2024-08-20T06:53:16.944221
  
18080 / tcp
-440711294 | 2024-09-11T14:03:10.187005
  
20000 / tcp
-1998875129 | 2024-08-25T03:32:02.113526
  
22000 / tcp
-229506720 | 2024-09-17T02:09:25.891784
  
31337 / tcp
-597872926 | 2024-09-11T14:02:26.228384
  
50000 / tcp
672398078 | 2024-09-18T04:42:43.641838
  
55000 / tcp
1774198775 | 2024-09-03T21:06:01.615558
  
55443 / tcp
-494159463 | 2024-09-17T18:44:31.093354
  
60001 / tcp



Contact Us

Shodan ® - All rights reserved

\", which results in the enclosed script logic to be executed.","verified":false},"CVE-2019-11358":{"cvss":4.3,"ports":[443],"summary":"jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.","verified":false},"CVE-2015-9251":{"cvss":4.3,"ports":[443],"summary":"jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.","verified":false},"CVE-2012-6708":{"cvss":4.3,"ports":[443],"summary":"jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.","verified":false}}; setupBannerCve(); setupVulns(VULNS); })();