13 /
tcp
-1770051369 | 2025-03-07T02:50:30.909277
17 /
tcp
-2006293986 | 2025-02-25T18:18:50.218831
ÿû\x01
Welcome to NetLinx v94 Copyright AMX Corp. 34395-49007
>
19 /
tcp
-746345752 | 2025-03-18T03:38:53.737851
¥A\x01,\x02L\x08Connectx\x0857222
21 /
tcp
-731285715 | 2025-03-13T20:35:05.742411
26 /
tcp
819727972 | 2025-03-17T18:26:06.876851
SSH-2.0-OpenSSH_7.4
Vulnerabilities
37 /
tcp
726777565 | 2025-03-17T09:57:14.172503
43 /
tcp
2087396567 | 2025-02-27T23:12:05.296550
kjnkjabhbanc283ubcsbhdc72
49 /
tcp
-1101712668 | 2025-03-16T19:30:52.902084
\\x1e\xc3\x80\\x010\\x02\xc2\xa8\xc3\xa3
53 /
tcp
-626196604 | 2025-03-21T21:40:36.835022
9
\x81\x80\x00\x01\x00\x02\x00\x00\x00\x00\x08clients1\x06google\x03com\x00\x00\x01\x00\x01\xc0\x00\x05\x00\x01\x00\x00\x00\xca\x00\x07clients\x01l\xc0\x15\xc01\x00\x01\x00\x01\x00\x00\x00\x83\x00\x04\xac٠n
\x00\x06\x81\x85\x00\x01\x00\x00\x00\x00\x00
-1385078233 | 2025-03-09T05:38:22.156220
HTTP/1.1 404
Content-Type: text/html;charset=utf-8
Content-Language: zh-CN
-267578546 | 2025-03-18T23:09:04.166599
HTTP/1.1 403 Forbidden
Server: AliyunOSS
Date: Tue, 18 Mar 2025 23:09:04 GMT
Content-Type: application/xml
Content-Length: 344
Connection: keep-alive
x-oss-request-id: 67D9FD1085ECD635303B4DC3
x-oss-server-time: 0
x-oss-ec: 0003-00001201
90 /
tcp
-904840257 | 2025-03-17T16:43:01.056581
572 Relay not authorized\r\n
92 /
tcp
-1996280214 | 2025-03-19T13:38:05.110267
95 /
tcp
-2096652808 | 2025-03-25T01:17:02.406070
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
98 /
tcp
320677201 | 2025-02-26T10:30:43.559361
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
102 /
tcp
1278527606 | 2025-03-03T19:14:57.203933
971933601 | 2025-03-14T22:44:37.194144
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
110 /
tcp
1911457608 | 2025-02-27T12:20:56.718856
\x00[\x00\x00\x00\x00\x00\x00
111 /
tcp
819727972 | 2025-02-27T06:56:50.020820
SSH-2.0-OpenSSH_7.4
Vulnerabilities
113 /
tcp
1921398876 | 2025-03-14T04:55:26.998869
ÿý"
LinuxNode v06953 (ggfks)
login:
141730637 | 2025-03-10T07:02:51.111407
HTTP/1.0 200 OK
Server: Proxy
131 /
tcp
-1399940268 | 2025-02-28T10:11:20.214294
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
135 /
tcp
-875843738 | 2025-03-21T05:56:54.583850
\\x05\\x00\r\\x03\\x10\\x00\\x00\\x00\\x18\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x04\\x00\\x01\\x05\\x00\\x00\\x00\\x00\n\nServerAlive2: \n IP1: DESKTOP-QII9S59\n IP2: 192.168.2.2\n IP3: 192.168.80.1\n IP4: 172.28.112.1\n\nNTLMSSP:\nTarget_Name: DESKTOP-QII9S59\nProduct_Version: 10.0.19041 Ntlm 15\nOS: Windows 10, Version 2004/Windows Server, Version 2004\nNetBIOS_Domain_Name: DESKTOP-QII9S59\nNetBIOS_Computer_Name: DESKTOP-QII9S59\nDNS_Domain_Name: DESKTOP-QII9S59\nDNS_Computer_Name: DESKTOP-QII9S59\nSystem_Time: 2024-01-22 04:06:58 +0000 UTC\n\nDCE
139 /
tcp
-52803170 | 2025-03-09T18:17:02.254194
Version: 6.1Build 0\nTarget Name : LUSHOME\n
143 /
tcp
-858402222 | 2025-03-24T09:50:36.704767
* OK Waiting for authentication process to respond..\r\n
175 /
tcp
-1399940268 | 2025-03-21T03:05:43.326754
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
177 /
tcp
-2089734047 | 2025-02-27T03:44:09.189321
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
179 /
tcp
-399606100 | 2025-03-22T06:00:17.141732
BGP Message\nType: 3\nMajor error Code: 6\nMinor error Code: 5\n
195 /
tcp
1741579575 | 2025-03-23T23:54:24.124338
221 /
tcp
-1729629024 | 2025-03-24T07:51:38.492561
-1547976805 | 2025-03-04T22:22:42.866776
HTTP/1.1 403 Forbidden
Server: nginx
Content-Type: text/html
Connection: close
-1230049476 | 2025-03-13T07:53:04.372684
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
389 /
tcp
-1907080992 | 2025-03-24T09:44:48.310765
0\x0c\\x02\\x01\\x01a\\x07\n\\x01\\x00\\x04\\x00\\x04\\x00
427 /
tcp
1388449297 | 2025-03-21T12:34:07.470220
SAAdvert Response:\nVersion: 2\nFunction: SA Advertisement (11)\nURL: service:service-agent://*.*.*.*\nScopeList: default\nAttrributeList: \n\n\nserviceTypes:\nservice:ipmi\nservice:uartmirrorlog\nservice:lighttpd\nservice:redfish\nservice:management-hardware.ThinkBMC\nservice:cdserver\nservice:hdserver\nservice:adviser\nservice:MCTPMain\nB://l:87/x\n\nResponse of service:ipmi SrvReq:\nVersion: 2\nFunction: Service Reply (2)\nErrorCode: SUCCESS (0)\nURL Entries:\n Lifetime: 65535\n URL: service:ipmi://LNV-7D53-J6001R60:623\n\n\nRespo
440 /
tcp
-1888448627 | 2025-03-03T23:26:03.696621
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
-1239736796 | 2025-03-13T00:52:02.290123
HTTP/1.1 403 Forbidden
Server: AliyunOSS
Date: Thu, 13 Mar 2025 00:52:02 GMT
Content-Type: application/xml
Content-Length: 344
Connection: keep-alive
x-oss-request-id: 67D22C329082053931A0F35F
x-oss-server-time: 0
x-oss-ec: 0003-00001201
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1d:16:e8:0a:e2:57:df:7f:53:49:ff:48
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=BE, O=GlobalSign nv-sa, CN=GlobalSign GCC R3 OV TLS CA 2024
Validity
Not Before: Jan 13 06:51:17 2025 GMT
Not After : Feb 14 06:51:16 2026 GMT
Subject: C=CN, ST=ZheJiang, L=HangZhou, O=Alibaba (China) Technology Co., Ltd., CN=cn-shanghai.oss.aliyuncs.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:bf:7d:9f:c7:ea:61:cc:2c:13:11:ec:32:85:ed:
85:b4:ed:71:62:c4:49:9e:e3:47:d3:13:5f:8b:44:
fe:bc:e7:64:27:a1:54:16:be:cd:2d:a1:f2:ef:46:
a9:81:b3:08:5a:03:44:ce:08:0a:a6:d0:f0:31:10:
61:32:f0:db:2e:5a:75:1f:c4:76:1c:02:00:26:2c:
b9:5b:1e:ca:86:a2:19:29:0e:16:e0:57:f5:b3:3d:
3c:04:90:5d:cc:34:0b:cc:e0:f4:03:9a:b8:51:68:
88:d9:61:3f:6b:f9:ef:01:59:f1:4a:b8:ff:92:70:
ce:0a:40:22:bd:58:21:d9:dd:91:0d:5f:6e:96:4d:
f5:bd:cb:96:8a:7c:f4:ef:67:e0:5e:30:ba:dd:bf:
b5:82:7c:d6:12:b4:6d:b7:67:93:c6:89:a9:57:af:
89:3d:4e:5c:96:50:ee:69:fb:dd:c2:b0:0c:c3:dc:
b4:1b:a5:03:f6:68:85:d7:c4:78:96:39:78:93:0a:
79:96:79:91:59:60:cc:33:5f:f9:53:73:55:02:3b:
b2:e8:5d:e4:7b:b5:89:bc:17:1a:38:9f:02:1e:58:
96:e1:10:c1:1b:24:86:dd:be:c1:06:6b:e2:37:5e:
1c:a0:2f:6e:e5:90:5a:13:c3:81:80:39:ee:27:0e:
7e:83
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Basic Constraints: critical
CA:FALSE
Authority Information Access:
CA Issuers - URI:http://secure.globalsign.com/cacert/gsgccr3ovtlsca2024.crt
OCSP - URI:http://ocsp.globalsign.com/gsgccr3ovtlsca2024
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.2
Policy: 1.3.6.1.4.1.4146.10.1.2
CPS: https://www.globalsign.com/repository/
X509v3 CRL Distribution Points:
Full Name:
URI:http://crl.globalsign.com/gsgccr3ovtlsca2024.crl
X509v3 Subject Alternative Name:
DNS:cn-shanghai.oss.aliyuncs.com, DNS:*.oss-enet-cm.aliyuncs.com, DNS:*.oss-cn-shanghai-finance-1-pub.aliyuncs.com, DNS:*.oss-cache-cn-shanghai-g.aliyuncs.com, DNS:*.oss-internal.aliyuncs.com, DNS:*.cn-shanghai.oss.aliyuncs.com, DNS:*.img-cn-shanghai.aliyuncs.com, DNS:*.oss-accelerate.aliyuncs.com, DNS:*.oss-cn-shanghai-finance-1-pub-internal.aliyuncs.com, DNS:*.oss-accelerate-overseas.aliyuncs.com, DNS:*.aliyuncs.com, DNS:*.oss.aliyuncs.com, DNS:*.img-cn-shanghai-internal.aliyuncs.com, DNS:*.oss-cn-shanghai-finance-1-internal.aliyuncs.com, DNS:*.oss-enet.aliyuncs.com, DNS:*.oss-enet-cu.aliyuncs.com, DNS:*.img-cn-shanghai-cross.aliyuncs.com, DNS:*.oss-enet-ct.aliyuncs.com, DNS:*.oss-cn-shanghai.aliyuncs.com, DNS:*.oss-cn-shanghai-internal.aliyuncs.com, DNS:*.oss-cn-shanghai-cross.aliyuncs.com, DNS:*.oss-cn-shanghai-finance-1.aliyuncs.com, DNS:*.vpc100-oss-cn-shanghai.aliyuncs.com, DNS:*.cn-shanghai-finance.oss.aliyuncs.com, DNS:*.oss-cache-cn-shanghai-g-cross.aliyuncs.com, DNS:*.cn-shanghai-dualstack.oss.aliyuncs.com, DNS:*.oss-enet-cn-east.aliyuncs.com, DNS:*.cn-shanghai-vpc.oss.aliyuncs.com, DNS:*.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-shanghai.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-shanghai-internal.oss-accesspoint.aliyuncs.com, DNS:*.cn-shanghai.oss-console.aliyuncs.com, DNS:*.s3.oss-cn-shanghai.aliyuncs.com, DNS:*.s3.oss-cn-shanghai-internal.aliyuncs.com, DNS:*.cn-shanghai.mgw.aliyuncs.com, DNS:*.oss.cn-shanghai.privatelink.aliyuncs.com, DNS:*.oss-cn-shanghai.oss-object-process.aliyuncs.com, DNS:*.oss-cn-shanghai-internal.oss-object-process.aliyuncs.com, DNS:*.s3.oss-accelerate.aliyuncs.com, DNS:*.s3.oss-accelerate-overseas.aliyuncs.com, DNS:*.cn-shanghai-cross.mgw.aliyuncs.com, DNS:*.cn-shanghai.oss-vpc.aliyuncs.com, DNS:cn-shanghai.oss-vpc.aliyuncs.com
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Authority Key Identifier:
DA:D3:A8:08:48:0C:34:37:58:EE:E5:A7:75:2E:59:FC:D6:DC:3C:38
X509v3 Subject Key Identifier:
EE:74:11:C5:EF:61:1F:BA:AE:9F:F7:21:19:CC:8E:CC:7E:C2:0B:52
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:
4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0
Timestamp : Jan 13 06:51:20.015 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:20:3E:2A:2D:3E:EC:96:50:4C:1A:C6:CA:16:
E2:B2:23:0F:5A:A4:F0:25:CC:BE:40:E6:FC:A2:D4:1F:
DA:91:7B:D1:02:21:00:A9:FC:D1:2A:36:DA:EA:3F:D1:
8F:31:22:16:9A:53:F7:DE:20:13:A9:6F:9B:40:01:C8:
AC:A8:91:20:AF:F1:39
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 0E:57:94:BC:F3:AE:A9:3E:33:1B:2C:99:07:B3:F7:90:
DF:9B:C2:3D:71:32:25:DD:21:A9:25:AC:61:C5:4E:21
Timestamp : Jan 13 06:51:19.998 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:20:71:A9:20:F6:06:42:7E:ED:23:B2:18:F8:
9F:FE:65:22:DE:5B:E0:FB:08:05:CA:25:D4:79:B2:B9:
BC:19:C7:8F:02:21:00:DE:D6:26:7A:B8:02:3B:C4:D8:
9B:E9:A7:C7:CD:56:41:35:C0:6C:A1:1B:A0:B4:97:CF:
EE:54:F9:14:71:3F:16
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 25:2F:94:C2:2B:29:E9:6E:9F:41:1A:72:07:2B:69:5C:
5B:52:FF:97:A9:0D:25:40:BB:FC:DC:51:EC:4D:EE:0B
Timestamp : Jan 13 06:51:20.043 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:44:02:20:14:80:AD:94:B3:BE:7B:9B:D9:A0:00:65:
A3:4F:2A:E4:4A:3F:D3:BE:F7:19:7F:EC:55:F6:AD:8D:
8B:21:A4:0C:02:20:07:4B:0E:C5:7D:13:45:D9:55:DF:
D0:17:4B:F3:EE:23:A5:AF:E9:4E:AB:E5:24:4D:CC:EE:
11:28:2A:94:F7:16
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
9f:af:bd:6e:7a:8e:c5:23:81:66:8f:76:9c:d6:b8:af:6b:c3:
c6:de:56:de:6c:0b:61:93:0d:c3:04:24:ab:1c:f3:5b:71:b1:
96:78:b4:b6:e4:47:75:d2:76:4e:a6:26:c5:e5:b6:e0:c0:0e:
3b:89:de:0d:f6:47:7b:c8:b6:05:3d:94:b3:aa:15:3c:22:9c:
f6:0a:b9:9c:00:a2:00:7a:4b:c2:d0:6c:09:81:e4:c3:15:c4:
90:10:dd:fd:12:11:33:37:08:26:84:26:3a:8d:90:c1:95:8a:
03:49:22:73:d2:4a:38:60:ed:66:85:fb:37:42:0e:fe:33:95:
54:61:79:e1:35:ed:97:67:4d:2c:dc:5c:b2:52:6b:82:25:4c:
37:0c:ee:02:37:aa:dc:bd:82:09:57:47:0c:71:a8:42:11:d5:
e9:3e:32:d4:6c:3f:f3:8a:1f:ef:d5:46:15:00:66:ec:08:08:
a8:1f:3d:f2:15:c3:e2:7e:e7:61:e2:36:68:0c:d3:85:d9:93:
55:cf:7c:86:fc:4b:63:56:af:9b:0c:82:e5:c9:4d:b5:48:34:
d3:15:3f:d4:4f:98:cf:f1:72:73:6a:95:5d:60:e9:a9:e7:81:
75:9f:e0:6e:83:e6:71:46:ab:1c:bf:03:a8:c8:a5:a0:be:a4:
4c:9d:35:32
850738788 | 2025-03-08T22:12:32.542711
HTTP/1.1 400 Bad Request
Server: nginx/1.22.1
Date: Sat, 08 Mar 2025 22:12:32 GMT
Content-Type: text/html
Content-Length: 157
Connection: close
<html>
<head><title>400 Bad Request</title></head>
<body>
<center><h1>400 Bad Request</h1></center>
<hr><center>nginx/1.22.1</center>
</body>
</html>
447 /
tcp
-1399940268 | 2025-03-08T15:21:29.885865
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
449 /
tcp
-1399940268 | 2025-03-06T18:35:31.182734
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
461 /
tcp
-2031152423 | 2025-02-27T22:14:24.605083
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
465 /
tcp
897328069 | 2025-03-22T07:24:26.182237
220 mail.scott000.com ESMTP
503 /
tcp
921225407 | 2025-03-18T19:16:25.396721
\x00\x00\x00\x04\x00\x00\x00\x00\x00
515 /
tcp
-1760806421 | 2025-02-27T14:48:26.275904
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected
548 /
tcp
862587784 | 2025-02-24T16:19:16.815417
Fast Copy: Yes\nExtended Sleep: Yes\nUUIDs: Yes\nUTF8 Server Name: Yes\nDirectory Services: Yes\nReconnect: No\nServer Notifications: Yes\nTCP/IP: Yes\nServer Signature: Yes\nServer Message: No\nPassword Saving Prohibited: No\nPassword Changing: No\nCopy File: Yes\nServer Name: pangzinas\nMachine Type: \\x0eNetatalk3.1.12\nAFP Versions: AFP2.2, AFPX03, AFP3.1, AFP3.2, AFP3.3, AFP3.4\nUAMs: Cleartxt Passwrd\\x0f,No User Authent\\x04,DHX2\t,DHCAST128\\x00\nServer Signature: 00000000008002000180030002800280
554 /
tcp
-1142488525 | 2025-03-09T12:44:05.441608
RTSP/1.0 401 Unauthorized
CSeq: 0
587 /
tcp
745343730 | 2025-03-16T22:06:45.935479
220 smtp.qq.com Esmtp QQ Mail Server
593 /
tcp
1308377066 | 2025-03-16T20:12:31.825444
602 /
tcp
-1032713145 | 2025-02-25T22:55:37.879018
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
636 /
tcp
-2023550675 | 2025-03-20T10:05:35.371031
\\x01\x0b=\\x01\xc3\x80\\x06\xc3\xbf\xc3\xbf?"<ZDECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\\x01\\x01
646 /
tcp
914325460 | 2025-02-23T21:54:17.735861
\\x00\\x01\\x00\\x1c\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x01\\x00\\x12\\x00\\x04,L\\x03\\x00\\x00\n\\x80\\x00\\x00\\x03\\x00\\x00\\x00\\x00\\x00\\x00
-2074356892 | 2025-02-28T20:12:20.840500
HTTP/1.1 302 Moved Temporarily
Content-Type: text/html
Connection: close
Server: Nginx
Expires: 0
Pragma: no-cache
Cache-Control: no-cache
Location: https://portal.ikuai8-wifi.com/templates/default/index.html?timestamp=1705534875&router_ver=3.2.7&firmware=IK-RouterOS&template=default&gwid=dd51dff587fb29512f5e0c65319cba25&user_ip=106%2E75%2E95%2E40
743 /
tcp
321971019 | 2025-03-05T00:13:48.341163
-ERR client ip is not in whitelist\r
789 /
tcp
-1641514916 | 2025-03-18T20:51:44.771158
* OK Merak 1dFUa2 IMAP4rev1
-29892444 | 2025-02-25T06:21:09.392493
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2540_PS-TSN-01bvK144_7822-18911
-1166978945 | 2025-03-21T09:16:16.659426
HTTP/1.1 407 Proxy Authentication Required
Server: Proxy
Proxy-Authenticate: Basic realm="CCProxy Authorization"
Connection: Close
Proxy-Connection: Close
873 /
tcp
-992671574 | 2025-03-20T01:27:13.705157
-1256415508 | 2025-03-22T13:08:15.577655
HTTP/1.1 404 Not Found
Server: TornadoServer/6.1
Content-Type: text/html; charset=UTF-8
-1718295362 | 2025-03-22T21:58:35.660841
HTTP/1.1 400 Bad Request
Content-Type: text/plain; charset=utf-8
995 /
tcp
934210070 | 2025-03-19T08:37:55.573225
+OK mail.dupre.idv.tw IceWarp 11.2.1.2 x64 POP3 Mon, 22 Jan 2024 12:43:35 +0800 <20240122124334@mail.dupre.idv.tw>\r\n
998 /
tcp
-832380282 | 2025-02-25T01:20:05.721565
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).\n
1012 /
tcp
-1399940268 | 2025-02-27T04:46:19.225941
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1839934832 | 2025-03-16T01:10:00.718556
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
1023 /
tcp
1261582754 | 2025-02-27T20:50:36.132010
unknown command
unknown command
1025 /
tcp
-585940771 | 2025-03-24T02:05:03.262156
1027 /
tcp
677934968 | 2025-02-27T08:20:19.993597
1029 /
tcp
1363464823 | 2025-03-23T16:42:10.030526
1282941221 | 2025-03-16T15:30:44.204775
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
1063 /
tcp
119860953 | 2025-03-23T13:13:00.437252
* OK ArGoSoft Mail Server IMAP Module v.YW at
1080 /
tcp
1362344524 | 2025-03-17T00:17:51.676639
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.7
1099 /
tcp
-441419608 | 2025-03-20T14:21:01.326510
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
1110 /
tcp
1685649979 | 2025-03-14T03:56:36.396150
1234 /
tcp
-1888448627 | 2025-03-24T04:38:31.342644
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
1337 /
tcp
1741579575 | 2025-03-15T19:26:44.817871
1414 /
tcp
820958131 | 2025-03-23T17:31:23.305546
kjnkjabhbanc283ubcsbhdc72\x02
1433 /
tcp
419886129 | 2025-03-21T12:56:59.450537
MSSQL Server\nVersion: 167773760 (0xa000640)\nSub-Build: 0\nEncryption:Not available\n\nMSSQL NTLM Info:\nTarget_Name: XTZJ-20210317RG\nProduct_Version: 6.1.7601 Ntlm 15\nOS: Windows 7, Service Pack 1/Windows Server 2008 R2, Service Pack 1\nNetBIOS_Domain_Name: XTZJ-20210317RG\nNetBIOS_Computer_Name: XTZJ-20210317RG\nDNS_Domain_Name: XTZJ-20210317RG\nDNS_Computer_Name: XTZJ-20210317RG\nSystem_Time: 2024-01-22 04:01:04 +0000 UTC\n\n
1451 /
tcp
-801484042 | 2025-03-20T23:00:47.613386
-1373985444 | 2025-03-24T03:28:19.235485
HTTP/1.1 200 OK
Server: Apache/2.4.48 (Win64) PHP/7.3.28
X-Powered-By: PHP/7.3.28
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Vulnerabilities
1515 /
tcp
2087396567 | 2025-03-04T20:17:09.678370
kjnkjabhbanc283ubcsbhdc72
1588 /
tcp
165188539 | 2025-02-26T01:04:40.830187
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
1800 /
tcp
-1399940268 | 2025-03-06T23:34:01.995273
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1833 /
tcp
-358801646 | 2025-03-11T03:14:03.709584
1883 /
tcp
-321444299 | 2025-03-12T05:32:58.724885
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
-2107996212 | 2025-03-10T05:37:48.873307
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
-1421527001 | 2025-03-10T15:09:25.388871
HTTP/1.1 403 Forbidden
Server: HASP LM/22.00
Content-Type: text/html
1957 /
tcp
819727972 | 2025-03-04T21:32:01.180017
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1962 /
tcp
819727972 | 2025-03-06T16:00:23.761195
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1013082686 | 2025-03-14T23:54:35.618863
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
-1013082686 | 2025-03-18T01:10:29.585602
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
1979 /
tcp
-1888448627 | 2025-03-22T07:34:17.587805
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
1984 /
tcp
-42767839 | 2025-03-04T03:05:52.253005
RFB 005.000
VNC:
Protocol Version: 5.0
2000 /
tcp
-1779118422 | 2025-03-13T08:04:53.718677
\x00[\xc2\xae\xc2\x8d{\x7f\x00\x00
2002 /
tcp
819727972 | 2025-03-23T01:05:41.469749
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2003 /
tcp
165188539 | 2025-03-16T14:45:40.159886
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
2008 /
tcp
1492413928 | 2025-03-22T03:44:49.630459
SSH-2.0-OpenSSH_7.5
Vulnerabilities
2010 /
tcp
-1399940268 | 2025-03-23T03:01:17.810558
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2018 /
tcp
669849225 | 2025-03-04T09:04:33.318355
SSH-98.60-SysaxSSH_81885..42\r\n
2022 /
tcp
819727972 | 2025-03-19T17:04:48.591143
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2060 /
tcp
1726594447 | 2025-03-23T13:36:50.017222
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
-2107996212 | 2025-02-25T00:37:18.284868
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
2067 /
tcp
-1023516719 | 2025-03-11T10:29:21.958064
ã
KvInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
2081 /
tcp
-441419608 | 2025-03-18T07:35:55.165169
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
2083 /
tcp
2087396567 | 2025-03-16T12:03:08.409668
kjnkjabhbanc283ubcsbhdc72
-1045760528 | 2025-03-23T15:34:54.161817
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
2091 /
tcp
-2089734047 | 2025-03-13T10:52:50.303683
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
2103 /
tcp
826567260 | 2025-03-14T02:45:51.371061
\\x05\\x00\r\\x03\\x10\\x00\\x00\\x00\\x18\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x04\\x00\\x01\\x05\\x00\\x00\\x00\\x00
2154 /
tcp
2087396567 | 2025-03-09T11:25:35.505309
kjnkjabhbanc283ubcsbhdc72
2181 /
tcp
546151771 | 2025-03-21T09:00:35.772292
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
2209 /
tcp
819727972 | 2025-03-07T06:39:24.248691
SSH-2.0-OpenSSH_7.4
Vulnerabilities
372433470 | 2025-03-09T14:49:54.558889
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
2232 /
tcp
819727972 | 2025-03-19T05:30:19.623450
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2259 /
tcp
677934968 | 2025-03-17T08:48:59.287075
1662205251 | 2025-03-10T20:19:56.141229
HTTP/1.0 404 FAIL
Content-length:5
Connection:Close
2332 /
tcp
1286504516 | 2025-03-20T06:38:41.860296
CP2E Control Console
Connected to Host: gZI
-2107996212 | 2025-03-10T01:26:26.900810
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
2345 /
tcp
-1399940268 | 2025-03-12T01:29:28.312403
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2352 /
tcp
-1641514916 | 2025-03-13T09:44:13.240922
* OK Merak 1dFUa2 IMAP4rev1
2376 /
tcp
-971970408 | 2025-03-24T02:52:21.710987
2404 /
tcp
-1399940268 | 2025-03-22T12:06:29.704278
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2443 /
tcp
-2089734047 | 2025-03-24T08:59:25.691888
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
2455 /
tcp
819727972 | 2025-03-11T22:40:27.171316
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-491012735 | 2025-03-05T17:24:34.894845
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 5-46817447-0 0NNN RT(1700341286319 0) q(0 -1 -1 -1) r(0 -1)
2568 /
tcp
-1399940268 | 2025-03-15T08:26:42.798075
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2628 /
tcp
2087396567 | 2025-03-24T13:59:39.297811
kjnkjabhbanc283ubcsbhdc72
339981947 | 2025-03-05T23:29:31.104910
HTTP/1.1 401 Unauthorized
connection: keep-alive
content-length: 12
content-security-policy: default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data:; script-src 'self' 'unsafe-inline'; object-src 'none'; form-action 'self'; frame-ancestors 'self';
content-type: text/plain; charset=UTF-8
date: Mon, 22 Jan 2024 00:55:31 GMT
referrer-policy: same-origin
x-content-type-options: nosniff
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
2709 /
tcp
1996932384 | 2025-03-08T16:51:14.537034
2761 /
tcp
408230060 | 2025-03-17T21:02:42.357269
\r\nSorry, that nickname format is invalid.\r\n
2762 /
tcp
1353260875 | 2025-03-07T08:56:22.132680
\x00[g\xc2\x95N\x7f\x00\x00
1830697416 | 2025-03-24T16:47:02.117496
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
3048 /
tcp
-1730858130 | 2025-03-16T00:37:44.755077
RFB 003.008
VNC:
Protocol Version: 3.8
3050 /
tcp
-1888448627 | 2025-03-10T21:49:12.396772
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
3066 /
tcp
1632932802 | 2025-03-14T08:04:36.518436
3076 /
tcp
-339084706 | 2025-03-08T22:58:35.971417
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
3087 /
tcp
1830187220 | 2025-03-07T08:34:10.492584
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
3105 /
tcp
1911457608 | 2025-03-11T10:47:56.608742
\x00[\x00\x00\x00\x00\x00\x00
3113 /
tcp
-1373613804 | 2025-03-06T13:43:53.579590
00970795:d7:smethod,6:shello,8:soptions,80:d10:shttp_port,368696:i1082,5:sname,5:sL_x,10:ssync_port,5:i00469,10:stimestamp,3190459:f920.7251553166,8:sversion,6262522:sl4X,
3116 /
tcp
-1399940268 | 2025-03-19T11:18:39.859384
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3123 /
tcp
-1648456501 | 2025-02-28T11:07:43.529483
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
3142 /
tcp
321971019 | 2025-03-03T20:38:25.393502
-ERR client ip is not in whitelist\r
3159 /
tcp
-1399940268 | 2025-03-01T01:49:28.535387
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3165 /
tcp
819727972 | 2025-03-23T00:49:49.733387
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3166 /
tcp
819727972 | 2025-03-18T01:48:35.824629
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3174 /
tcp
-1399940268 | 2025-03-03T18:31:48.231747
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3184 /
tcp
1426971893 | 2025-03-18T00:40:19.474196
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
3189 /
tcp
-1648456501 | 2025-03-19T00:32:09.742608
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
3191 /
tcp
1574088840 | 2025-03-12T01:30:18.711328
">Application and Content Networking Software 3.9</a>)\n</BODY><
3256 /
tcp
2087396567 | 2025-03-14T17:48:11.422137
kjnkjabhbanc283ubcsbhdc72
3260 /
tcp
-862070606 | 2025-02-24T05:33:17.956698
Login Response Success(0x0000)\nKey/Value Pairs\nAuthMethod=None\nTargetAlias=LIO Target\nTargetPortalGroupTag=1\n\n
198844676 | 2025-03-23T18:01:55.362205
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3299 /
tcp
2087396567 | 2025-03-21T19:45:58.352320
kjnkjabhbanc283ubcsbhdc72
3306 /
tcp
-1036944024 | 2025-03-24T21:09:45.988750
F\\x00\\x00\\x00\\xffj\\x04Host \'*.*.*.*\' is not allowed to connect to this MySQL server
3307 /
tcp
897328069 | 2025-03-19T17:56:13.691390
220 mail.scott000.com ESMTP
3310 /
tcp
-1435414831 | 2025-03-16T15:11:32.190181
3337 /
tcp
1208318993 | 2025-02-28T17:16:11.011467
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
-1453516345 | 2025-02-23T20:41:47.398677
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
2143387245 | 2025-03-23T11:19:42.934642
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
3389 /
tcp
848680996 | 2025-03-22T17:34:26.731550
Remote Desktop Protocol\n\\x03\\x00\\x00\\x13\\x0e\\xd0\\x00\\x00\\x124\\x00\\x02\t\\x08\\x00\\x02\\x00\\x00\\x00\n\nFlag: PROTOCOL_HYBRID\nTarget_Name: WINCTYU-KTI28LG\nProduct_Version: 6.1.7601 Ntlm 15\nOS: Windows 7, Service Pack 1/Windows Server 2008 R2, Service Pack 1\nNetBIOS_Domain_Name: WINCTYU-KTI28LG\nNetBIOS_Computer_Name: WINCTYU-KTI28LG\nDNS_Domain_Name: WINCTYU-KTI28LG\nDNS_Computer_Name: WINCTYU-KTI28LG\nSystem_Time: 2024-01-22 08:43:05 +0000 UTC\n\n
3400 /
tcp
1189133115 | 2025-03-11T20:00:38.447728
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
3403 /
tcp
-653033013 | 2025-03-22T04:58:23.280256
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
3498 /
tcp
-2089734047 | 2025-03-22T06:30:01.142790
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3531 /
tcp
-1105333987 | 2025-03-15T04:27:30.517307
-2118655245 | 2025-03-14T18:13:28.200811
HTTP/1.0 500 Internal Server Error
Content-Length: 20
3559 /
tcp
1975288991 | 2025-03-18T01:38:13.736621
-1839934832 | 2025-03-22T12:22:56.569408
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
2103111368 | 2025-03-04T17:08:39.426127
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
3841 /
tcp
677934968 | 2025-03-22T13:29:56.415818
2143387245 | 2025-03-04T10:41:02.678610
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
3953 /
tcp
-784071826 | 2025-03-15T09:10:49.685975
SSH-2.0-OpenSSH_8.0
Vulnerabilities
1170207731 | 2025-03-24T08:39:28.779272
HTTP/1.1 200 OK
cache-control: max-age=0, private, must-revalidate
content-length: 9446
content-type: text/html; charset=utf-8
cross-origin-window-policy: deny
date: Mon, 22 Jan 2024 08:34:42 GMT
server: Cowboy
x-content-type-options: nosniff
x-download-options: noopen
x-frame-options: SAMEORIGIN
x-permitted-cross-domain-policies: none
x-request-id: F6yeXaHCjyC4elgAAoAh
x-xss-protection: 1; mode=block
set-cookie: _teslamate_key=SFMyNTY.g3QAAAAEbQAAAAtfY3NyZl90b2tlbm0AAAAYaUxzWXpoMm5SdWh1V2piMFd
4002 /
tcp
1911457608 | 2025-03-17T05:50:35.749545
\x00[\x00\x00\x00\x00\x00\x00
4010 /
tcp
-1399940268 | 2025-02-24T21:09:56.875934
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-2107996212 | 2025-03-23T15:31:57.321436
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
4043 /
tcp
-1399940268 | 2025-03-06T04:59:09.609572
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4064 /
tcp
321971019 | 2025-03-24T19:11:56.293082
-ERR client ip is not in whitelist\r
4150 /
tcp
819727972 | 2025-02-25T18:33:12.877121
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4157 /
tcp
819727972 | 2025-03-19T04:47:15.697451
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1695841648 | 2025-03-18T20:03:58.711731
HTTP/1.1 404 Not Found
Server: nginx/1.18.11011 (Ubuntu)
Content-Type: text/plain; charset=utf-8
Connection: close
4243 /
tcp
165188539 | 2025-03-06T21:37:52.596144
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
4282 /
tcp
819727972 | 2025-03-23T17:30:23.116041
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4321 /
tcp
-269926141 | 2025-03-22T22:25:03.005550
\\x00\\x00\\x12\\x04\\x00\\x00\\x00\\x00\\x00\\x00\\x03\\x00\\x00\\x00\\x80\\x00\\x04\\x00\\x01\\x00\\x00\\x00\\x05\\x00\\xff\\xff\\xff\\x00\\x00\\x04\\x08\\x00\\x00\\x00\\x00\\x00\\x7f\\xff\\x00\\x00\\x00\\x00\\x08\\x07\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x01
4369 /
tcp
321971019 | 2025-03-17T23:15:40.540159
-ERR client ip is not in whitelist\r
4433 /
tcp
472902042 | 2025-03-19T03:29:51.641667
"Magic:ActiveMQ
Version:12
<ActiveMQ*TcpNoDelayEnabledSizePrefixDisabled CacheSizeProviderName ActiveMQStackTraceEnabledPlatformDetails JavaCacheEnabledTightEncodingEnabledMaxFrameSize@MaxInac
4434 /
tcp
-784071826 | 2025-03-03T20:13:57.435093
SSH-2.0-OpenSSH_8.0
Vulnerabilities
4435 /
tcp
-249504111 | 2025-03-03T18:17:10.773146
4436 /
tcp
-441419608 | 2025-03-20T19:54:58.342146
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
594761768 | 2025-03-16T09:49:32.560324
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2a00_PS-NKG-01Aqo82_2843-52437
4444 /
tcp
1308377066 | 2025-03-22T06:18:33.523362
4461 /
tcp
-653033013 | 2025-03-06T01:41:18.716909
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
4500 /
tcp
-136006866 | 2025-03-15T02:40:08.961482
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
4506 /
tcp
-1304843095 | 2025-03-23T19:08:03.296857
4524 /
tcp
-1399940268 | 2025-03-13T12:50:14.766063
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4620 /
tcp
-1026951088 | 2025-03-10T18:21:13.383995
4821 /
tcp
165188539 | 2025-03-15T07:02:08.297035
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
4840 /
tcp
-2089734047 | 2025-03-24T14:11:21.326147
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
4899 /
tcp
472902042 | 2025-03-19T05:56:48.032114
"Magic:ActiveMQ
Version:12
<ActiveMQ*TcpNoDelayEnabledSizePrefixDisabled CacheSizeProviderName ActiveMQStackTraceEnabledPlatformDetails JavaCacheEnabledTightEncodingEnabledMaxFrameSize@MaxInac
4911 /
tcp
1723769361 | 2025-03-21T18:35:42.276856
ELM Enterprise Manager _l\r\nCopyright \xc2\xa9 18668511-928641920 TNT Software, Inc.\r\n
4949 /
tcp
1082732927 | 2025-03-21T21:26:37.018709
STAT pid 1660
STAT uptime 28884
STAT time 1641290377
STAT version 1.2.1
STAT pointer_size 32
STAT curr_items 14
STAT total_items 3533
STAT bytes 30524
STAT curr_connections 1
STAT total_connections 3542
STAT connection_structures 3
STAT cmd_get 3533
STAT cmd_set 3533
STAT get_hits 3519
STAT get_misses 14
STAT bytes_read 7927780
STAT bytes_written 7848552
STAT limit_maxbytes 67108864
END
5006 /
tcp
1842524259 | 2025-03-12T05:35:05.974347
5009 /
tcp
1472866667 | 2025-03-13T03:45:49.594368
5010 /
tcp
-1947777893 | 2025-03-23T19:08:24.614989
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
5025 /
tcp
1741579575 | 2025-03-22T16:56:25.136758
5051 /
tcp
819727972 | 2025-02-28T19:42:31.891937
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5053 /
tcp
-1114821551 | 2025-03-10T05:18:51.098530
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
5122 /
tcp
-2089734047 | 2025-03-16T11:16:38.467807
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
5172 /
tcp
740837454 | 2025-03-24T14:38:34.898934
SSH-2.0-OpenSSH_5.3
Vulnerabilities
5201 /
tcp
-1888448627 | 2025-02-24T02:52:54.146900
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
5222 /
tcp
1544300041 | 2025-03-12T01:11:20.640079
SSH-25453-Cisco-3524665.35
-1839934832 | 2025-03-15T05:21:47.803500
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
5233 /
tcp
1911457608 | 2025-02-26T19:06:03.360512
\x00[\x00\x00\x00\x00\x00\x00
5235 /
tcp
1574088840 | 2025-02-23T17:24:15.932728
">Application and Content Networking Software 3.9</a>)\n</BODY><
5240 /
tcp
-1399940268 | 2025-03-11T20:01:41.211307
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5252 /
tcp
-407828767 | 2025-02-28T18:22:51.757683
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
5253 /
tcp
-407828767 | 2025-03-10T22:04:16.574867
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
-898901461 | 2025-03-17T07:30:14.642006
HTTP/1.1 400 Bad Request
Server: CWAP-waf
Content-Type: text/html
Connection: close
WZWS-RAY: 1249-1705941047.522-w-waf01tjgt
5278 /
tcp
-1399940268 | 2025-03-19T21:42:39.816182
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5443 /
tcp
1911457608 | 2025-03-01T01:22:23.648373
\x00[\x00\x00\x00\x00\x00\x00
5454 /
tcp
-2089734047 | 2025-03-14T06:16:38.332229
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
5494 /
tcp
921225407 | 2025-02-23T20:36:42.121341
\x00\x00\x00\x04\x00\x00\x00\x00\x00
5609 /
tcp
1332894250 | 2025-02-27T02:59:38.065176
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
5660 /
tcp
15018106 | 2025-03-08T19:36:15.331116
\x00\x19\x02\x00\x02\x00\x07\x00Protocol version mismatch\x00
5672 /
tcp
575925250 | 2025-03-17T15:11:49.255153
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
5673 /
tcp
-1399940268 | 2025-03-10T12:29:41.052238
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5858 /
tcp
-616720387 | 2025-03-23T21:09:15.128703
5908 /
tcp
-1399940268 | 2025-03-19T03:02:08.934322
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5911 /
tcp
819727972 | 2025-03-18T06:39:34.328847
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5986 /
tcp
2087396567 | 2025-03-19T08:27:53.368144
kjnkjabhbanc283ubcsbhdc72
5993 /
tcp
-616720387 | 2025-03-18T09:08:34.218463
5994 /
tcp
-1105333987 | 2025-03-19T22:19:25.147039
1830697416 | 2025-03-17T14:04:50.210538
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
6007 /
tcp
1632932802 | 2025-03-15T10:29:41.485304
2103111368 | 2025-02-27T13:21:56.737981
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
6433 /
tcp
117101543 | 2025-03-13T20:44:32.257100
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
6443 /
tcp
2087396567 | 2025-03-20T16:39:59.851140
kjnkjabhbanc283ubcsbhdc72
6488 /
tcp
1911457608 | 2025-02-27T07:09:18.868616
\x00[\x00\x00\x00\x00\x00\x00
6503 /
tcp
819727972 | 2025-03-17T19:01:43.399966
SSH-2.0-OpenSSH_7.4
Vulnerabilities
6513 /
tcp
-1399940268 | 2025-02-25T11:24:43.035793
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6543 /
tcp
-930644848 | 2025-03-15T19:15:19.315321
\\xba\\xdc\xcd\xab\\x01#\\x19\\x10C\\x00U\xd0\x94\\xbc\\x85\\x00\\x94z\\xab\\x18\\x00\\x00\\x00\\x00\\x00\\x00[032][11:39:50.410]\\xc1\\xac\\xbd\xd3\xb3\xc9\xb9\\xa6\\xa3\\xac\\xb1\\xbe\xc4\xa3\\xbf\\xe9 PID \xce\xaa 0x23=35\\x00\\xba\\xdc\xcd\xab\\x01#\\x00\\x00_\\x00U\\xa9\\x00\\x00\\x1d\\x00\\x94\\x8aS\\xb0\\x94\\x8aS\\xb4\\x94;[033][11:3
6544 /
tcp
707919486 | 2025-03-17T20:36:52.623710
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
6622 /
tcp
-2089734047 | 2025-03-16T15:55:11.467941
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
6633 /
tcp
-1399940268 | 2025-02-27T01:46:26.689938
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6653 /
tcp
-599252106 | 2025-03-13T15:08:20.145979
4935895 | 2025-03-16T20:14:20.131643
HTTP/1.1 400 Bad Request
Server: CloudWAF
6668 /
tcp
1623746877 | 2025-03-19T20:49:10.148082
500 Permission denied - closing connection.\r\n
6697 /
tcp
1911457608 | 2025-03-10T04:32:13.920354
\x00[\x00\x00\x00\x00\x00\x00
6700 /
tcp
-2089734047 | 2025-02-28T22:23:25.054400
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-1013082686 | 2025-03-19T02:23:29.692621
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
1827807483 | 2025-03-13T00:43:30.445075
HTTP/1.1 401 Unauthorized
Server:
Cache-Control: no-cache,no-store
Content-Type: text/html; charset=%s
Connection: close
7016 /
tcp
1363464823 | 2025-03-12T00:53:35.754570
7050 /
tcp
-339084706 | 2025-02-27T19:45:49.184221
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
7071 /
tcp
819727972 | 2025-03-18T05:28:43.322950
SSH-2.0-OpenSSH_7.4
Vulnerabilities
7105 /
tcp
1543809371 | 2025-03-12T12:19:35.577085
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
7171 /
tcp
1911457608 | 2025-03-20T06:13:51.419041
\x00[\x00\x00\x00\x00\x00\x00
-1839934832 | 2025-02-26T03:01:49.824201
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
7218 /
tcp
-1598265216 | 2025-03-08T15:12:54.730358
7373 /
tcp
-1888448627 | 2025-03-12T23:50:52.572666
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
7415 /
tcp
493955023 | 2025-03-20T16:15:56.531665
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
7433 /
tcp
-1888448627 | 2025-02-27T15:06:24.772216
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
7434 /
tcp
1842524259 | 2025-03-04T10:38:50.088767
-584993230 | 2025-03-10T09:46:22.855221
HTTP/1.1 400 Bad Request
Server:
Content-Type: text/html
Connection: close
7480 /
tcp
-2096652808 | 2025-03-05T19:52:00.353560
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
7634 /
tcp
808560482 | 2025-03-22T09:15:33.181067
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP
: USERID : UNIX : Cr8
1391945995 | 2025-03-15T06:42:00.454348
HTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=utf-8
Proxy-Authenticate: Basic realm=""
7801 /
tcp
-1032713145 | 2025-03-13T07:59:18.566005
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
7980 /
tcp
921225407 | 2025-02-27T03:13:44.316896
\x00\x00\x00\x04\x00\x00\x00\x00\x00
2103111368 | 2025-03-16T17:23:05.402807
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
8009 /
tcp
-1399940268 | 2025-03-23T21:32:08.252476
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-99290876 | 2025-03-24T14:04:16.579059
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65adfce8_PS-WDS-01hQz46_5490-3384
8025 /
tcp
504717326 | 2025-03-24T09:00:26.911569
SSH-2.0-OpenSSH_8.6
Vulnerabilities
8027 /
tcp
321971019 | 2025-03-10T03:53:36.845138
-ERR client ip is not in whitelist\r
8030 /
tcp
1911457608 | 2025-03-24T11:41:03.198572
\x00[\x00\x00\x00\x00\x00\x00
-1839934832 | 2025-03-23T23:53:50.615275
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
8033 /
tcp
1911457608 | 2025-03-23T13:32:27.078227
\x00[\x00\x00\x00\x00\x00\x00
8034 /
tcp
321971019 | 2025-02-28T15:01:36.861206
-ERR client ip is not in whitelist\r
-2107996212 | 2025-03-12T12:37:00.212726
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
8050 /
tcp
-445721795 | 2025-02-27T22:51:14.630915
\x00[\xc3\xaed\x1a\x7f\x00\x00
8068 /
tcp
-1399940268 | 2025-03-21T10:30:44.299275
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8073 /
tcp
-1399940268 | 2025-03-23T08:49:32.042388
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8081 /
tcp
539065883 | 2025-03-04T00:24:37.373563
8083 /
tcp
1996932384 | 2025-03-19T11:37:31.513315
8085 /
tcp
1620329124 | 2025-02-25T20:59:30.516646
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
8087 /
tcp
1911457608 | 2025-03-03T21:12:08.304659
\x00[\x00\x00\x00\x00\x00\x00
8089 /
tcp
539065883 | 2025-03-06T11:47:58.524516
8097 /
tcp
-2089734047 | 2025-03-13T15:24:52.413264
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
648174097 | 2025-02-26T01:04:44.850487
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-IIS/10.0
X-Powered-By: ASP.NET
1282941221 | 2025-03-16T14:38:10.394836
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
8114 /
tcp
819727972 | 2025-03-10T14:16:56.865154
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8126 /
tcp
550048729 | 2025-03-25T02:54:47.151872
8133 /
tcp
-1888448627 | 2025-02-26T21:25:40.617341
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8134 /
tcp
709622286 | 2025-03-06T05:23:32.915007
OK Welcome <299685> on DirectUpdate server 7286\r\n
8135 /
tcp
-1399940268 | 2025-03-16T09:32:53.718043
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8139 /
tcp
-358801646 | 2025-03-20T11:04:04.541368
8148 /
tcp
819727972 | 2025-03-19T17:12:03.066798
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8163 /
tcp
1332894250 | 2025-02-23T22:16:51.802865
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
8175 /
tcp
-1327660293 | 2025-03-15T20:34:35.358337
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
8176 /
tcp
165188539 | 2025-03-12T09:16:42.762272
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8181 /
tcp
178736976 | 2025-03-25T02:04:38.226579
8183 /
tcp
117101543 | 2025-03-07T01:10:38.930540
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
8190 /
tcp
-274082663 | 2025-02-27T13:47:27.770095
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
-1839934832 | 2025-03-17T05:12:36.184461
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
8198 /
tcp
-1097188123 | 2025-03-10T04:51:47.362596
-1015019981 | 2025-03-22T20:35:24.472087
HTTP/1.1 200 OK
Content-Type: text/html
Connection: close
Server: DLNADOC/1.50 UPnP/1.0 MiniDLNA/1.1.4
EXT:
8249 /
tcp
-146605374 | 2025-02-26T12:02:46.505136
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
8283 /
tcp
1911457608 | 2025-02-23T13:50:03.392996
\x00[\x00\x00\x00\x00\x00\x00
-734440417 | 2025-02-25T15:07:30.985372
HTTP/1.1 400 Bad Request
Content-Type: text/html
Connection: close
Server: nginx/1.17.3
-1729028106 | 2025-03-14T20:25:44.294337
HTTP/1.1 401 Unauthorized
Content-Type: text/html
Server: Microsoft-IIS/10.0
8381 /
tcp
398077695 | 2025-03-05T19:08:38.774963
8385 /
tcp
1763259671 | 2025-03-12T01:51:54.777320
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
8393 /
tcp
-1032713145 | 2025-03-10T09:34:37.283472
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
1282941221 | 2025-03-04T08:12:09.415235
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
1282941221 | 2025-02-23T19:17:41.649750
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
8432 /
tcp
1911457608 | 2025-03-21T10:58:32.597163
\x00[\x00\x00\x00\x00\x00\x00
8434 /
tcp
1911457608 | 2025-03-21T19:12:35.237465
\x00[\x00\x00\x00\x00\x00\x00
8444 /
tcp
-1428621233 | 2025-03-14T20:24:27.996749
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
8453 /
tcp
-274082663 | 2025-02-26T22:02:26.677016
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
8457 /
tcp
1911457608 | 2025-03-14T18:28:01.621955
\x00[\x00\x00\x00\x00\x00\x00
8458 /
tcp
-1810987450 | 2025-03-04T11:46:10.048497
8460 /
tcp
-146605374 | 2025-03-16T15:36:55.678336
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
8470 /
tcp
-1888448627 | 2025-03-23T08:32:59.635220
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8473 /
tcp
1911457608 | 2025-03-16T21:49:24.273142
\x00[\x00\x00\x00\x00\x00\x00
8481 /
tcp
-1327660293 | 2025-02-25T09:20:08.614154
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
-1455149952 | 2025-03-05T11:51:44.040242
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae1e27_PS-000-01sNY99_31294-28028
8514 /
tcp
599074451 | 2025-03-04T23:43:44.585627
8531 /
tcp
-1399940268 | 2025-02-23T11:27:32.783061
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8536 /
tcp
1208318993 | 2025-03-21T02:43:58.612841
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
8543 /
tcp
1353260875 | 2025-03-19T02:03:43.045388
\x00[g\xc2\x95N\x7f\x00\x00
8545 /
tcp
2087396567 | 2025-03-19T05:10:23.975274
kjnkjabhbanc283ubcsbhdc72
8548 /
tcp
-1399940268 | 2025-03-20T05:45:06.353135
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8554 /
tcp
841014058 | 2025-03-24T09:06:52.377597
Hello, this is FRRouting (version 4.0).
Copyright 19
96-2005 Kunihiro Ishiguro, et al.
Use...
8560 /
tcp
819727972 | 2025-03-17T07:35:33.509942
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8562 /
tcp
-1148066627 | 2025-03-18T19:10:37.357378
\x00[\xc2\x84\xc2\x86\xc3\xb2\x7f\x00\x00
8575 /
tcp
-1148066627 | 2025-03-22T16:38:53.953791
\x00[\xc2\x84\xc2\x86\xc3\xb2\x7f\x00\x00
8576 /
tcp
165188539 | 2025-03-14T10:38:52.576329
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8593 /
tcp
-891714208 | 2025-03-17T05:24:21.964589
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
8594 /
tcp
-980525298 | 2025-03-15T22:49:05.975804
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8596 /
tcp
1989907056 | 2025-03-25T05:55:13.494707
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
8597 /
tcp
1492413928 | 2025-02-28T10:01:57.819611
SSH-2.0-OpenSSH_7.5
Vulnerabilities
89906503 | 2025-03-05T20:51:13.892349
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1705939051.204-w-waf01shgt2
8605 /
tcp
1767345577 | 2025-03-10T04:16:27.555679
Hello, this is Quagga (version 0T).
Copyright 1996-200
8607 /
tcp
1767345577 | 2025-03-14T14:31:20.109455
Hello, this is Quagga (version 0T).
Copyright 1996-200
8623 /
tcp
-1399940268 | 2025-03-15T12:38:53.116774
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8630 /
tcp
1543809371 | 2025-03-22T02:58:17.708248
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
8649 /
tcp
-42767839 | 2025-03-16T20:22:21.745851
RFB 005.000
VNC:
Protocol Version: 5.0
8703 /
tcp
580340387 | 2025-03-14T16:18:19.624873
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
8708 /
tcp
-1099385124 | 2025-03-21T16:43:54.249426
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
8709 /
tcp
1911457608 | 2025-02-27T03:40:27.467111
\x00[\x00\x00\x00\x00\x00\x00
8743 /
tcp
580340387 | 2025-03-13T13:47:13.262231
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
8745 /
tcp
-1399940268 | 2025-03-18T00:03:01.235706
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8771 /
tcp
1332894250 | 2025-03-09T18:12:35.281243
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
8782 /
tcp
819727972 | 2025-03-15T20:46:28.217325
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8791 /
tcp
-1810987450 | 2025-03-22T02:33:07.567527
8803 /
tcp
-1399940268 | 2025-03-12T00:31:48.969826
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1839934832 | 2025-02-23T10:13:12.657700
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
8826 /
tcp
-2089734047 | 2025-02-25T08:19:15.969046
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8827 /
tcp
-2089734047 | 2025-03-21T21:03:40.762076
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8831 /
tcp
819727972 | 2025-02-24T03:57:37.071211
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8855 /
tcp
819727972 | 2025-03-09T17:27:18.096484
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8856 /
tcp
-358801646 | 2025-03-13T12:35:15.293665
8862 /
tcp
-1399940268 | 2025-02-25T05:19:35.599679
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8878 /
tcp
1911457608 | 2025-03-16T02:57:00.361558
\x00[\x00\x00\x00\x00\x00\x00
8879 /
tcp
1911457608 | 2025-03-19T17:08:26.981706
\x00[\x00\x00\x00\x00\x00\x00
8880 /
tcp
-971970408 | 2025-03-07T18:35:35.015961
8886 /
tcp
-1399940268 | 2025-03-14T00:41:39.594416
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8889 /
tcp
-971970408 | 2025-02-25T20:26:36.974976
372433470 | 2025-03-15T15:43:48.682469
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
8905 /
tcp
-653033013 | 2025-03-13T01:42:02.446216
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
9000 /
tcp
-2067028711 | 2025-03-24T14:43:29.416450
\x15\x03\x01\x00\x02\x02F
9002 /
tcp
1887224352 | 2025-02-25T11:12:48.147298
9011 /
tcp
1911457608 | 2025-02-25T12:28:38.413469
\x00[\x00\x00\x00\x00\x00\x00
9012 /
tcp
819727972 | 2025-03-16T23:00:45.487694
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9016 /
tcp
1996932384 | 2025-03-16T06:46:38.013338
9023 /
tcp
1911457608 | 2025-03-22T18:26:01.518671
\x00[\x00\x00\x00\x00\x00\x00
9028 /
tcp
-438503381 | 2025-02-23T15:22:01.627941
WORLD OF WARCRAFT CONNECTION - SERVER TO CLIENT - V2
9034 /
tcp
1911457608 | 2025-03-20T15:50:02.661838
\x00[\x00\x00\x00\x00\x00\x00
9041 /
tcp
709622286 | 2025-03-19T08:37:09.365264
OK Welcome <299685> on DirectUpdate server 7286\r\n
9042 /
tcp
2087396567 | 2025-03-18T10:05:40.580932
kjnkjabhbanc283ubcsbhdc72
9058 /
tcp
-2089734047 | 2025-03-05T15:49:55.748222
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9062 /
tcp
-1329831334 | 2025-03-17T10:25:41.536494
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
9067 /
tcp
1911457608 | 2025-03-13T13:40:30.220859
\x00[\x00\x00\x00\x00\x00\x00
9069 /
tcp
-136006866 | 2025-03-15T11:26:06.562792
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
9070 /
tcp
-1538260461 | 2025-03-04T03:12:22.824613
-1839934832 | 2025-03-20T01:58:17.054209
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
9092 /
tcp
-1399940268 | 2025-03-18T02:18:08.238961
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9095 /
tcp
1426971893 | 2025-03-12T15:44:04.972861
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
9098 /
tcp
639175818 | 2025-02-25T20:13:58.594896
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
9100 /
tcp
1161309183 | 2025-03-14T11:59:11.545071
9109 /
tcp
740837454 | 2025-03-10T04:53:06.281399
SSH-2.0-OpenSSH_5.3
Vulnerabilities
9118 /
tcp
366084633 | 2025-03-13T20:16:52.948500
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
9122 /
tcp
321971019 | 2025-03-16T06:03:14.036495
-ERR client ip is not in whitelist\r
9136 /
tcp
-1730858130 | 2025-03-11T00:14:25.013591
RFB 003.008
VNC:
Protocol Version: 3.8
9138 /
tcp
722711397 | 2025-03-21T16:51:45.851282
\x00[M\xc3\xba\xc3\x9a\x7f\x00\x00
9151 /
tcp
-1900404274 | 2025-03-15T16:55:51.783910
9160 /
tcp
-1399940268 | 2025-03-21T01:22:37.537899
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9163 /
tcp
819727972 | 2025-03-21T12:08:55.024414
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9173 /
tcp
-2046514463 | 2025-02-24T09:35:20.144399
1077013874 | 2025-03-20T07:33:19.247466
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
9181 /
tcp
921225407 | 2025-02-25T19:16:23.049494
\x00\x00\x00\x04\x00\x00\x00\x00\x00
9186 /
tcp
-358801646 | 2025-03-15T02:38:06.904822
9216 /
tcp
-1810987450 | 2025-03-07T05:06:33.823895
9219 /
tcp
1911457608 | 2025-03-06T02:54:46.575404
\x00[\x00\x00\x00\x00\x00\x00
9242 /
tcp
-1399940268 | 2025-03-23T21:23:53.546213
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9249 /
tcp
-445721795 | 2025-03-05T09:22:22.482324
\x00[\xc3\xaed\x1a\x7f\x00\x00
9253 /
tcp
-1986594217 | 2025-03-10T12:10:09.727139
"AP0F1D85"\r\nConnection: close\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>\n<BODY BGCOLOR
9256 /
tcp
-1730858130 | 2025-03-10T12:40:01.439657
RFB 003.008
VNC:
Protocol Version: 3.8
9289 /
tcp
819727972 | 2025-03-16T05:44:19.060161
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9300 /
tcp
-1279886438 | 2025-03-16T21:58:33.863900
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
9303 /
tcp
-1399940268 | 2025-03-10T15:21:25.531668
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9306 /
tcp
-1888448627 | 2025-03-13T11:17:29.183772
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9333 /
tcp
-154107716 | 2025-03-15T22:43:01.362226
220 Microsoft FTP Service
530 User cannot log in.
214-The following commands are recognized (* ==>'s unimplemented).
ABOR
ACCT
ADAT *
ALLO
APPE
AUTH
CCC
CDUP
CWD
DELE
ENC *
EPRT
EPSV
FEAT
HELP
HOST
LANG
LIST ...
9398 /
tcp
1741579575 | 2025-03-17T23:31:16.992145
9400 /
tcp
-358801646 | 2025-03-22T23:58:12.401276
1909672637 | 2025-03-22T06:13:31.533177
HTTP/1.1 400 Bad Request
Content-Type: text/plain; charset=utf-8
Sec-Websocket-Version: 13
X-Content-Type-Options: nosniff
-1045760528 | 2025-03-05T03:43:27.039086
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
9441 /
tcp
-1032713145 | 2025-03-17T02:25:59.697679
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
9445 /
tcp
-1399940268 | 2025-03-16T21:12:07.113194
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9454 /
tcp
740837454 | 2025-02-28T04:29:15.795950
SSH-2.0-OpenSSH_5.3
Vulnerabilities
9456 /
tcp
1308377066 | 2025-02-27T15:11:14.543760
9465 /
tcp
-1399940268 | 2025-03-05T23:56:57.734241
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9488 /
tcp
1911457608 | 2025-02-24T13:53:10.675573
\x00[\x00\x00\x00\x00\x00\x00
9501 /
tcp
1911457608 | 2025-03-24T22:18:05.706765
\x00[\x00\x00\x00\x00\x00\x00
9513 /
tcp
-441419608 | 2025-03-11T19:58:30.962303
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
9529 /
tcp
937756010 | 2025-03-25T01:14:28.363398
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x01\x00\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
9530 /
tcp
1308377066 | 2025-03-21T22:47:54.183895
9553 /
tcp
819727972 | 2025-03-21T00:19:51.210259
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9600 /
tcp
1911457608 | 2025-03-23T06:58:19.933599
\x00[\x00\x00\x00\x00\x00\x00
9700 /
tcp
117101543 | 2025-03-19T03:29:35.237346
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
9704 /
tcp
945910976 | 2025-03-06T19:55:19.085574
* OK TeamXchange IMAP4rev1 server (otyUg) ready.\r\n
9711 /
tcp
103159425 | 2025-03-13T04:33:23.439368
9734 /
tcp
-1399940268 | 2025-03-06T11:45:47.466645
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9754 /
tcp
-303199180 | 2025-03-24T18:56:42.125866
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
9761 /
tcp
1911457608 | 2025-03-22T07:21:44.086068
\x00[\x00\x00\x00\x00\x00\x00
9773 /
tcp
-1888448627 | 2025-03-23T11:49:17.902694
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9803 /
tcp
366084633 | 2025-03-18T08:53:05.157255
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
9804 /
tcp
-339084706 | 2025-02-26T10:35:27.834802
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
9876 /
tcp
2109639173 | 2025-03-23T23:39:32.232560
\\x00\\x00\\x01\\xb8\\x00\\x00\\x00_{"code":0,"flag":1,"language":"JAVA","opaque":0,"serializeTypeCurrentRPC":"JSON","version":401}{"brokerAddrTable":{"rocketmq-cnng0d8ee3802629-broker-0":{"brokerAddrs":{0:"180.184.35.245:30950",2:"180.184.35.245:30951",3:"180.184.35.245:30952"},"brokerName":"rocketmq-cnng0d8ee3802629-broker-0","cluster":"rocketmq-cnng0d8ee3802629-broker"}},"clusterAddrTable":{"rocketmq-cnng0d8ee3802629-broker":["rocketmq-cnng0d8ee3802629-broker-0"]}}
9885 /
tcp
321971019 | 2025-02-26T23:28:39.151709
-ERR client ip is not in whitelist\r
9923 /
tcp
819727972 | 2025-02-27T20:24:20.530772
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-2107996212 | 2025-02-28T01:59:33.631400
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
248249138 | 2025-03-18T02:39:01.279559
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae24d3_xyd116_25356-2749
9944 /
tcp
60948681 | 2025-03-18T06:24:32.158370
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).
9977 /
tcp
580340387 | 2025-03-11T04:31:35.721051
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
-2118655245 | 2025-03-23T13:51:08.948554
HTTP/1.0 500 Internal Server Error
Content-Length: 20
9988 /
tcp
119860953 | 2025-03-03T22:54:57.809128
* OK ArGoSoft Mail Server IMAP Module v.YW at
9992 /
tcp
1830187220 | 2025-03-23T20:59:36.579288
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
9994 /
tcp
-1399940268 | 2025-03-21T17:49:57.970260
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1223770960 | 2025-03-21T13:18:11.851293
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae28e5_PS-PEK-01Whk40_31773-63705
10000 /
tcp
-358801646 | 2025-03-14T08:51:09.887979
10001 /
tcp
1492413928 | 2025-03-10T18:31:37.905625
SSH-2.0-OpenSSH_7.5
Vulnerabilities
10009 /
tcp
-709267009 | 2025-03-15T09:15:33.050004
\\x00[\'\\x19\\xc0\\xa8X\\xfd
10012 /
tcp
-1380608668 | 2025-03-20T20:54:20.053450
\\x00[\'\\x1c\\xc0\\xa8X\\xfd
10014 /
tcp
819727972 | 2025-03-19T15:17:09.826469
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10021 /
tcp
1426971893 | 2025-02-28T18:29:01.568652
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
10025 /
tcp
1911457608 | 2025-03-13T19:36:33.755752
\x00[\x00\x00\x00\x00\x00\x00
10027 /
tcp
632542934 | 2025-02-26T06:40:33.950546
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
10033 /
tcp
1519486042 | 2025-03-22T14:51:17.159060
<KU_goodbye>Protocol Error: XML data is not well-formed.</KU_goodbye>
10042 /
tcp
599074451 | 2025-03-16T15:49:52.298488
10043 /
tcp
-1399940268 | 2025-02-27T11:29:54.021859
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10048 /
tcp
-1097188123 | 2025-03-15T12:45:22.324122
10075 /
tcp
575925250 | 2025-03-24T10:11:54.578266
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
10123 /
tcp
-1399940268 | 2025-02-23T23:55:23.971709
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10134 /
tcp
-345718689 | 2025-03-22T02:29:56.709552
10201 /
tcp
-1399940268 | 2025-02-26T13:42:21.403941
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10250 /
tcp
-79865617 | 2025-03-07T05:03:52.049084
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com
mit-revprops depth log-revprops partial-replay ) ) )
10533 /
tcp
307999478 | 2025-02-25T22:45:48.011258
unknown command \r\nunknown command \r\n
10909 /
tcp
921225407 | 2025-03-10T23:12:21.909912
\x00\x00\x00\x04\x00\x00\x00\x00\x00
10911 /
tcp
321971019 | 2025-03-21T17:49:00.234630
-ERR client ip is not in whitelist\r
10933 /
tcp
-136006866 | 2025-02-25T22:00:26.005965
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
11001 /
tcp
165188539 | 2025-02-28T01:27:47.583285
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
11110 /
tcp
-1426182427 | 2025-03-16T20:14:26.144598
\\x00[\\x00\\x00\\x00\\x00\\x00\\x00
11112 /
tcp
1208318993 | 2025-02-26T02:44:12.636845
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
11210 /
tcp
-2089734047 | 2025-03-19T10:29:52.224268
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
11288 /
tcp
1726594447 | 2025-03-16T20:10:59.410704
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
11688 /
tcp
632542934 | 2025-03-04T12:15:54.894309
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
-446385447 | 2025-03-21T00:54:49.764918
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae1efa_PS-CKG-01vQy48_16235-38870
12016 /
tcp
165188539 | 2025-03-09T06:12:48.018828
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12082 /
tcp
-2017887953 | 2025-02-25T04:54:46.675692
SSH-2.0-OpenSSH_7.9
Vulnerabilities
12088 /
tcp
-653033013 | 2025-03-23T09:58:10.501332
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
12104 /
tcp
-1399940268 | 2025-02-28T10:50:15.179786
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12106 /
tcp
103159425 | 2025-03-05T03:34:21.821141
12107 /
tcp
1911457608 | 2025-03-22T21:46:09.504318
\x00[\x00\x00\x00\x00\x00\x00
-2107996212 | 2025-03-16T03:29:05.953794
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
12116 /
tcp
-1265999252 | 2025-03-23T16:23:21.950925
220 VMware Authentication Daemon Version 1.0, ServerDaemonProto\ncol:SOAP, MKSDisplayProtocol:VNC , ,
12126 /
tcp
937756010 | 2025-03-21T05:30:00.507807
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x01\x00\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12128 /
tcp
819727972 | 2025-03-15T16:20:20.054735
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12129 /
tcp
575925250 | 2025-03-06T21:56:45.262833
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
12147 /
tcp
1911457608 | 2025-03-06T04:47:37.086014
\x00[\x00\x00\x00\x00\x00\x00
12148 /
tcp
575925250 | 2025-02-25T18:48:48.466640
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
12150 /
tcp
1911457608 | 2025-03-09T21:38:54.505642
\x00[\x00\x00\x00\x00\x00\x00
-1839934832 | 2025-03-10T17:38:04.882610
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
12163 /
tcp
165188539 | 2025-03-10T08:56:22.448803
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12167 /
tcp
819727972 | 2025-03-18T00:34:26.739236
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2103111368 | 2025-02-27T10:06:55.904289
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
12198 /
tcp
-2089734047 | 2025-03-06T16:21:34.575333
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12211 /
tcp
819727972 | 2025-03-18T04:53:59.957025
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12213 /
tcp
921225407 | 2025-02-24T16:10:50.672162
\x00\x00\x00\x04\x00\x00\x00\x00\x00
1830697416 | 2025-03-16T03:16:14.861601
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
12219 /
tcp
-1399940268 | 2025-03-16T02:48:10.168451
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12234 /
tcp
-1399940268 | 2025-03-16T00:00:19.128886
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12237 /
tcp
1911457608 | 2025-02-27T03:42:07.499334
\x00[\x00\x00\x00\x00\x00\x00
12239 /
tcp
-441419608 | 2025-03-23T23:38:49.680743
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
12244 /
tcp
632542934 | 2025-03-15T03:20:00.885847
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
12251 /
tcp
921225407 | 2025-03-22T13:47:43.983860
\x00\x00\x00\x04\x00\x00\x00\x00\x00
12261 /
tcp
819727972 | 2025-02-28T21:15:12.419281
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12264 /
tcp
-303199180 | 2025-02-27T20:52:16.967044
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
-460069439 | 2025-02-26T11:18:25.535447
HTTP/1.0 400 Bad Request
Server: AkamaiGHost
Mime-Version: 1.0
Content-Type: text/html
Expires: Sat, 25 Nov 2023 19:50:45 GMT
Connection: close
12266 /
tcp
-303199180 | 2025-03-17T04:03:14.585503
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
12267 /
tcp
-1140468363 | 2025-03-19T14:34:35.098403
12286 /
tcp
-249504111 | 2025-03-22T17:36:46.263515
12302 /
tcp
1208318993 | 2025-03-22T19:20:42.731975
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
12309 /
tcp
-1598265216 | 2025-02-24T21:11:30.615209
12318 /
tcp
-2096652808 | 2025-02-28T10:44:53.106942
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12327 /
tcp
820958131 | 2025-03-15T02:33:49.551533
kjnkjabhbanc283ubcsbhdc72\x02
12344 /
tcp
819727972 | 2025-03-05T06:21:01.613717
SSH-2.0-OpenSSH_7.4
Vulnerabilities
878900329 | 2025-03-20T09:24:35.101634
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae24ba_PStjkgwtss75_22411-43255
12350 /
tcp
-1097188123 | 2025-03-14T02:04:10.141234
12351 /
tcp
1911457608 | 2025-03-05T17:41:53.538785
\x00[\x00\x00\x00\x00\x00\x00
12359 /
tcp
-1399940268 | 2025-03-12T03:19:18.109268
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12360 /
tcp
677934968 | 2025-03-07T18:26:34.067781
12362 /
tcp
-1399940268 | 2025-03-08T16:14:52.897058
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12365 /
tcp
1543809371 | 2025-03-14T22:29:54.861729
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
12373 /
tcp
1948301213 | 2025-03-06T18:54:29.388031
RFB 003.003
VNC:
Protocol Version: 3.3
12384 /
tcp
-1399940268 | 2025-03-04T19:07:08.624268
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12385 /
tcp
-358801646 | 2025-02-23T21:25:14.450967
12389 /
tcp
-1399940268 | 2025-03-24T04:37:07.187300
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12395 /
tcp
-1399940268 | 2025-03-15T03:41:34.787209
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12400 /
tcp
1911457608 | 2025-03-07T04:12:48.075341
\x00[\x00\x00\x00\x00\x00\x00
12402 /
tcp
819727972 | 2025-03-17T22:19:19.702042
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12405 /
tcp
-339084706 | 2025-03-21T01:48:36.766984
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
12407 /
tcp
-1139539254 | 2025-02-24T23:35:20.069378
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
12416 /
tcp
1911457608 | 2025-03-22T00:03:27.836728
\x00[\x00\x00\x00\x00\x00\x00
12421 /
tcp
165188539 | 2025-02-25T23:04:17.430159
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12423 /
tcp
1911457608 | 2025-03-17T00:25:09.645682
\x00[\x00\x00\x00\x00\x00\x00
12428 /
tcp
-653033013 | 2025-03-08T22:49:07.307058
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
12436 /
tcp
-1399940268 | 2025-03-15T07:33:08.047406
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12454 /
tcp
-2089734047 | 2025-03-12T02:15:39.727605
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12463 /
tcp
-1399940268 | 2025-03-21T07:13:10.816209
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12465 /
tcp
-1399940268 | 2025-03-05T17:30:35.749530
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12466 /
tcp
1911457608 | 2025-03-21T07:12:00.244488
\x00[\x00\x00\x00\x00\x00\x00
12475 /
tcp
1911457608 | 2025-03-10T07:02:06.758394
\x00[\x00\x00\x00\x00\x00\x00
12481 /
tcp
1632932802 | 2025-03-18T22:54:25.587514
12494 /
tcp
-2096652808 | 2025-03-04T20:22:28.066223
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12499 /
tcp
51259122 | 2025-03-15T07:27:35.553152
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
12508 /
tcp
671605376 | 2025-03-24T13:15:11.270535
12511 /
tcp
165188539 | 2025-03-08T17:35:03.047046
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
-1839934832 | 2025-02-26T15:00:47.703108
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
1830697416 | 2025-03-22T22:36:05.626123
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
12547 /
tcp
-1399940268 | 2025-03-06T18:06:44.184311
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12553 /
tcp
-1399940268 | 2025-03-14T18:16:49.315194
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12568 /
tcp
-249504111 | 2025-03-24T14:46:53.164796
12577 /
tcp
-2140303521 | 2025-03-06T04:44:36.482686
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
12581 /
tcp
-1888448627 | 2025-03-20T14:38:18.269011
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12902 /
tcp
-2089734047 | 2025-03-14T14:50:33.734087
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
13001 /
tcp
-1329831334 | 2025-03-25T00:10:47.012768
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
13380 /
tcp
1911457608 | 2025-03-04T23:14:31.470344
\x00[\x00\x00\x00\x00\x00\x00
14147 /
tcp
-445721795 | 2025-03-24T18:25:08.376308
\x00[\xc3\xaed\x1a\x7f\x00\x00
14265 /
tcp
-1996280214 | 2025-03-21T21:12:25.944921
14344 /
tcp
1363464823 | 2025-03-25T01:57:24.282899
14524 /
tcp
-274082663 | 2025-03-23T19:45:29.010648
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
15040 /
tcp
819727972 | 2025-02-28T11:10:07.680679
SSH-2.0-OpenSSH_7.4
Vulnerabilities
15044 /
tcp
-2046514463 | 2025-03-16T03:57:40.119137
-1230049476 | 2025-03-14T06:54:32.542672
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
15588 /
tcp
819727972 | 2025-02-26T23:09:33.180067
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16007 /
tcp
707919486 | 2025-02-24T02:16:00.500270
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
16010 /
tcp
819727972 | 2025-03-21T02:03:07.453793
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16020 /
tcp
-1261090339 | 2025-03-04T19:18:29.224574
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
16022 /
tcp
-339084706 | 2025-03-21T06:43:29.436137
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
16023 /
tcp
1189133115 | 2025-03-13T07:25:51.871177
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
16024 /
tcp
-1036370807 | 2025-03-23T13:28:06.735052
16027 /
tcp
-2096652808 | 2025-03-04T06:32:09.788470
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
16033 /
tcp
1830187220 | 2025-02-26T19:58:10.706657
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
16043 /
tcp
398077695 | 2025-03-09T11:13:15.021849
16049 /
tcp
1989907056 | 2025-03-12T21:41:39.457460
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
16051 /
tcp
165188539 | 2025-03-12T10:51:59.761336
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
16065 /
tcp
1911457608 | 2025-03-15T03:01:33.311966
\x00[\x00\x00\x00\x00\x00\x00
16086 /
tcp
1541211644 | 2025-03-11T10:56:22.241444
16087 /
tcp
677934968 | 2025-03-19T03:38:57.618925
16101 /
tcp
-903067560 | 2025-02-27T23:09:17.712113
\x00[\x13)\xc2\x81\x7f\x00\x00
16311 /
tcp
1574088840 | 2025-03-24T11:37:27.397859
">Application and Content Networking Software 3.9</a>)\n</BODY><
16316 /
tcp
-1888448627 | 2025-03-07T03:23:17.485351
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
16443 /
tcp
-2096652808 | 2025-03-17T08:06:53.833589
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
16464 /
tcp
819727972 | 2025-03-21T00:10:26.628315
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16993 /
tcp
-358801646 | 2025-03-16T06:52:08.971498
17020 /
tcp
1726594447 | 2025-03-23T10:47:32.281115
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
17100 /
tcp
-1026951088 | 2025-03-20T20:02:50.268908
114471724 | 2025-02-27T20:08:11.119730
HTTP/1.1 302
X-Frame-Options: SAMEORIGIN
Server: NSX
114471724 | 2025-03-09T16:30:14.247012
HTTP/1.1 302
X-Frame-Options: SAMEORIGIN
Server: NSX
18020 /
tcp
-1399940268 | 2025-02-24T02:14:16.418561
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18035 /
tcp
-2089734047 | 2025-03-14T02:56:25.786482
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
18039 /
tcp
-1327660293 | 2025-02-28T06:51:08.439711
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
18043 /
tcp
-1476017887 | 2025-02-27T18:07:38.605665
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
18055 /
tcp
-1399940268 | 2025-03-19T13:38:45.449561
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18063 /
tcp
1911457608 | 2025-02-23T22:15:59.504274
\x00[\x00\x00\x00\x00\x00\x00
18065 /
tcp
740837454 | 2025-03-22T23:24:36.112846
SSH-2.0-OpenSSH_5.3
Vulnerabilities
18067 /
tcp
740837454 | 2025-03-10T10:18:07.650082
SSH-2.0-OpenSSH_5.3
Vulnerabilities
18068 /
tcp
-832380282 | 2025-02-28T11:50:14.603576
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).\n
18072 /
tcp
-1399940268 | 2025-03-11T14:41:46.048126
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18077 /
tcp
632542934 | 2025-03-20T13:37:25.679613
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
18079 /
tcp
-441419608 | 2025-03-16T21:20:19.526877
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
18080 /
tcp
-1099385124 | 2025-03-19T18:27:09.972409
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
18081 /
tcp
1996932384 | 2025-03-17T06:57:27.650544
18083 /
tcp
-445721795 | 2025-03-22T18:29:26.840912
\x00[\xc3\xaed\x1a\x7f\x00\x00
18089 /
tcp
1212285915 | 2025-03-12T17:50:47.585010
\x00K\x00\x00\x02\x00\x00\x00%~)J/\\tHjU(IAGENT = (AGENT_VERSION = 2388790170)(RPC_VERSION = 5..722))
18091 /
tcp
1126993057 | 2025-03-23T01:05:03.032809
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
-1601079786 | 2025-03-11T05:12:12.428490
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65a113c3_PSfjfzdx2zb89_10840-46230
18102 /
tcp
597764502 | 2025-03-08T12:07:09.352821
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
18110 /
tcp
1126993057 | 2025-03-01T01:11:17.728053
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
18245 /
tcp
1830187220 | 2025-03-21T19:15:39.569535
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
18264 /
tcp
-2089734047 | 2025-03-19T16:36:09.946812
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
18443 /
tcp
1975288991 | 2025-03-15T10:22:25.021785
18553 /
tcp
-2096652808 | 2025-03-14T12:18:15.259619
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
19000 /
tcp
1308377066 | 2025-03-18T06:43:30.609825
19016 /
tcp
-1888448627 | 2025-03-13T21:21:51.647744
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
19930 /
tcp
291723434 | 2025-03-14T10:31:27.220063
Lantronix MSS100 Version V118/523(045538937)
Type HELP at the 'Local_61349> ' prompt for assistance.
Username>
1900503736 | 2025-03-21T18:15:00.847986
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-HTTPAPI/2.0
20030 /
tcp
-1835475271 | 2025-03-10T20:56:21.229004
200 NOD32SS 99 (3318497116)\r\n
20110 /
tcp
-1598265216 | 2025-03-23T14:37:00.517665
20202 /
tcp
-1399940268 | 2025-03-09T14:17:08.290190
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
20256 /
tcp
-1399940268 | 2025-03-18T23:49:04.382590
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
20512 /
tcp
-441419608 | 2025-02-23T13:07:37.015926
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
20547 /
tcp
117101543 | 2025-03-24T00:36:06.807166
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
20880 /
tcp
1370263973 | 2025-03-07T09:17:01.420891
21025 /
tcp
1767345577 | 2025-03-24T03:37:19.121861
Hello, this is Quagga (version 0T).
Copyright 1996-200
-1839934832 | 2025-02-27T19:08:55.391183
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
21200 /
tcp
-1399940268 | 2025-03-25T03:21:25.155538
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21230 /
tcp
1911457608 | 2025-03-21T09:36:52.197149
\x00[\x00\x00\x00\x00\x00\x00
21231 /
tcp
-1261090339 | 2025-03-06T05:57:46.455416
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
21232 /
tcp
1308377066 | 2025-03-18T21:59:16.453206
21249 /
tcp
-1648456501 | 2025-03-16T14:00:56.573098
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
1282941221 | 2025-03-17T08:23:41.320392
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
21269 /
tcp
1911457608 | 2025-03-17T02:18:56.450375
\x00[\x00\x00\x00\x00\x00\x00
21275 /
tcp
-1746074029 | 2025-03-15T16:54:42.318433
21288 /
tcp
-1399940268 | 2025-03-18T12:00:05.244504
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21292 /
tcp
-1746074029 | 2025-03-03T23:31:49.988396
21295 /
tcp
-136006866 | 2025-02-28T22:24:33.146567
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
21303 /
tcp
1911457608 | 2025-03-15T11:19:43.937453
\x00[\x00\x00\x00\x00\x00\x00
21305 /
tcp
819727972 | 2025-02-25T02:39:16.310027
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21309 /
tcp
1911457608 | 2025-02-27T20:59:14.783754
\x00[\x00\x00\x00\x00\x00\x00
21311 /
tcp
-1641514916 | 2025-03-04T19:56:24.574128
* OK Merak 1dFUa2 IMAP4rev1
-288825733 | 2025-02-24T00:14:50.589631
HTTP/1.1 200 OK
Connection: close
Content-Length: 2619
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Headers: authorization,Content-Type
Access-Control-Allow-Methods: POST, GET, OPTIONS, PUT, HEAD, DELETE
Content-Type: text/html
Server: Jetty(9.4.14.v20181114)
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1
21318 /
tcp
-2089734047 | 2025-03-04T06:01:41.337944
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
21319 /
tcp
-1737707071 | 2025-03-01T01:58:57.966190
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
21322 /
tcp
-2089734047 | 2025-03-17T22:51:54.126638
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
21329 /
tcp
1911457608 | 2025-03-20T19:38:22.938745
\x00[\x00\x00\x00\x00\x00\x00
21379 /
tcp
-1311598826 | 2025-03-24T17:26:48.475556
AMQP:
cluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local
copyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.
information:Licensed under the MPL 2.0. Website: https://rabbitmq.com
platform:Erlang/OTP 24.1
product:RabbitMQ
version:3.9.7
Capabilities:
publisher_confirms:true
exchange_exchange_bindings:true
basic.nack:true
consumer_cancel_notify:true
connection.blocked:true
consumer_priorities:true
authentication_failure_close:true
per_consumer_qos:true
direct_reply_to:tru
22069 /
tcp
2087396567 | 2025-03-25T02:02:11.188455
kjnkjabhbanc283ubcsbhdc72
22082 /
tcp
1911457608 | 2025-03-24T06:05:01.790864
\x00[\x00\x00\x00\x00\x00\x00
22107 /
tcp
-1399940268 | 2025-03-11T02:18:39.851873
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
22345 /
tcp
2063598737 | 2025-03-18T03:50:09.599896
22609 /
tcp
1911457608 | 2025-03-13T01:59:20.964943
\x00[\x00\x00\x00\x00\x00\x00
22705 /
tcp
-1297953727 | 2025-03-07T11:36:21.810232
\x02\x00\x00\x00\x00\x00\x06\x04\x00\x00\x00\x00\x00\x0c\x00\x00\n0\x00\x1c
23023 /
tcp
819727972 | 2025-03-23T23:03:58.823581
SSH-2.0-OpenSSH_7.4
Vulnerabilities
23424 /
tcp
1370263973 | 2025-03-24T22:19:02.372994
1830697416 | 2025-03-23T20:41:43.117407
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
25001 /
tcp
-1538260461 | 2025-03-22T06:25:02.633073
25565 /
tcp
-2089734047 | 2025-03-06T02:00:42.980467
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
26656 /
tcp
-1428621233 | 2025-03-13T06:35:13.689165
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
-1839934832 | 2025-03-12T02:31:06.262820
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
27017 /
tcp
1763259671 | 2025-03-17T21:27:42.480966
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
28015 /
tcp
-1026951088 | 2025-03-14T10:58:40.064895
2143387245 | 2025-02-27T21:17:03.189887
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
30003 /
tcp
1632932802 | 2025-03-19T07:17:06.492112
30009 /
tcp
1308377066 | 2025-02-26T09:36:59.005619
30010 /
tcp
-1399940268 | 2025-02-28T12:46:38.595254
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
30019 /
tcp
709622286 | 2025-03-16T07:39:27.434721
OK Welcome <299685> on DirectUpdate server 7286\r\n
30022 /
tcp
1353260875 | 2025-03-14T21:26:05.844770
\x00[g\xc2\x95N\x7f\x00\x00
30025 /
tcp
1911457608 | 2025-03-23T00:35:40.971890
\x00[\x00\x00\x00\x00\x00\x00
30112 /
tcp
1011407350 | 2025-03-15T04:23:02.010882
* OK GroupWise IMAP4rev1 Server Ready\r\n
30121 /
tcp
-2017887953 | 2025-03-24T05:20:32.458460
SSH-2.0-OpenSSH_7.9
Vulnerabilities
30122 /
tcp
2087396567 | 2025-03-11T06:34:27.896243
kjnkjabhbanc283ubcsbhdc72
30222 /
tcp
-297128567 | 2025-03-09T07:17:09.876997
\x04\x01\xc3\xb4\x00\x15Internal Server Error\x00\x00\x00AB\x00\x02\x05\x00
30303 /
tcp
-1810987450 | 2025-03-19T22:35:25.299866
30322 /
tcp
-1114821551 | 2025-03-24T13:47:26.043219
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
30700 /
tcp
1632932802 | 2025-03-04T15:53:03.768221
30718 /
tcp
-1719756037 | 2025-03-22T11:35:36.147813
LH\xdb\xc6\xdd\xf6g\x10\x19\x00\x00\x00\x18\x00\x01\x02\x00\x10\x00\x04\x00\x00\x00\x01\x8fm\x0fN\xc7\x1e\x88"\xee\xd9\xd7\xf2x{\x04\x85
30722 /
tcp
2033888749 | 2025-03-25T01:06:21.880824
Content-Type: text/rude-rejection
Content-Length: 24
Access Denied, go away.
Content-Type: text/disconnect-notice
C...
30922 /
tcp
-2096652808 | 2025-03-20T22:27:01.894748
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
31001 /
tcp
1830187220 | 2025-03-16T22:36:00.135973
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
31022 /
tcp
819727972 | 2025-03-24T12:06:50.498706
SSH-2.0-OpenSSH_7.4
Vulnerabilities
31122 /
tcp
1741579575 | 2025-03-09T12:41:13.175261
31222 /
tcp
2087396567 | 2025-03-13T05:41:27.779043
kjnkjabhbanc283ubcsbhdc72
-2133761335 | 2025-03-24T01:27:40.967312
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
Vary: Accept-Encoding
X-Powered-By: PHP/7.4.21
31422 /
tcp
740837454 | 2025-03-25T03:40:15.910895
SSH-2.0-OpenSSH_5.3
Vulnerabilities
31443 /
tcp
-1730858130 | 2025-03-12T18:01:53.784915
RFB 003.008
VNC:
Protocol Version: 3.8
31522 /
tcp
2087396567 | 2025-03-13T01:05:01.759965
kjnkjabhbanc283ubcsbhdc72
31622 /
tcp
-1114821551 | 2025-03-23T10:01:03.939488
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
31822 /
tcp
-1598265216 | 2025-03-20T19:15:03.981890
1282941221 | 2025-03-24T05:52:28.947321
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
32022 /
tcp
-971970408 | 2025-03-23T19:14:39.513879
32222 /
tcp
2087396567 | 2025-03-23T17:32:25.527986
kjnkjabhbanc283ubcsbhdc72
32322 /
tcp
171352214 | 2025-03-16T15:39:54.976977
-ERR client ip is not in whitelist
-2118655245 | 2025-03-24T16:18:17.019350
HTTP/1.0 500 Internal Server Error
Content-Length: 20
32422 /
tcp
2087396567 | 2025-03-09T14:21:20.892079
kjnkjabhbanc283ubcsbhdc72
32522 /
tcp
819727972 | 2025-03-22T03:59:44.776797
SSH-2.0-OpenSSH_7.4
Vulnerabilities
32622 /
tcp
-971970408 | 2025-03-11T19:34:48.042140
32722 /
tcp
-1114821551 | 2025-03-23T06:02:15.220825
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
1282941221 | 2025-02-25T01:50:40.316732
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
32822 /
tcp
103159425 | 2025-03-23T04:37:10.161988
33022 /
tcp
1842524259 | 2025-02-27T16:40:55.953920
33060 /
tcp
2087396567 | 2025-03-22T19:06:28.037106
kjnkjabhbanc283ubcsbhdc72
33122 /
tcp
1082732927 | 2025-03-22T22:29:12.295855
STAT pid 1660
STAT uptime 28884
STAT time 1641290377
STAT version 1.2.1
STAT pointer_size 32
STAT curr_items 14
STAT total_items 3533
STAT bytes 30524
STAT curr_connections 1
STAT total_connections 3542
STAT connection_structures 3
STAT cmd_get 3533
STAT cmd_set 3533
STAT get_hits 3519
STAT get_misses 14
STAT bytes_read 7927780
STAT bytes_written 7848552
STAT limit_maxbytes 67108864
END
33222 /
tcp
-971970408 | 2025-03-09T19:27:02.709740
33322 /
tcp
-1477838366 | 2025-03-22T07:33:17.471909
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
33338 /
tcp
1842524259 | 2025-03-24T07:36:18.054010
33422 /
tcp
539065883 | 2025-03-19T16:55:05.323664
33522 /
tcp
-971970408 | 2025-03-20T13:54:27.763188
33622 /
tcp
1690634669 | 2025-03-21T05:25:35.934117
33722 /
tcp
1842524259 | 2025-03-18T04:22:32.220832
33822 /
tcp
2087396567 | 2025-03-18T11:53:28.226857
kjnkjabhbanc283ubcsbhdc72
33922 /
tcp
1286504516 | 2025-03-08T11:13:48.078537
CP2E Control Console
Connected to Host: gZI
34122 /
tcp
2087396567 | 2025-03-20T16:00:35.675800
kjnkjabhbanc283ubcsbhdc72
34222 /
tcp
-653033013 | 2025-03-20T02:15:54.766271
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
34322 /
tcp
2087396567 | 2025-03-19T19:32:30.790947
kjnkjabhbanc283ubcsbhdc72
34522 /
tcp
-1872120160 | 2025-03-19T14:49:45.325255
">Application and Content Networking Software 3.9</a>)
</BODY><
34722 /
tcp
2087396567 | 2025-03-19T08:08:48.158739
kjnkjabhbanc283ubcsbhdc72
34822 /
tcp
2087396567 | 2025-03-19T06:41:01.175699
kjnkjabhbanc283ubcsbhdc72
34922 /
tcp
-2096652808 | 2025-03-18T20:15:37.412925
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
35000 /
tcp
1911457608 | 2025-03-24T15:42:27.223087
\x00[\x00\x00\x00\x00\x00\x00
35022 /
tcp
-971970408 | 2025-03-19T02:53:49.209400
35240 /
tcp
819727972 | 2025-03-22T11:51:19.427788
SSH-2.0-OpenSSH_7.4
Vulnerabilities
35322 /
tcp
2087396567 | 2025-03-17T08:44:38.038164
kjnkjabhbanc283ubcsbhdc72
35522 /
tcp
539065883 | 2025-03-04T03:43:23.245361
35524 /
tcp
-1105333987 | 2025-03-04T01:35:32.117912
35622 /
tcp
2087396567 | 2025-03-18T07:59:40.196547
kjnkjabhbanc283ubcsbhdc72
35722 /
tcp
-992671574 | 2025-02-28T06:58:52.305237
35822 /
tcp
2087396567 | 2025-03-17T17:55:05.721859
kjnkjabhbanc283ubcsbhdc72
36022 /
tcp
2087396567 | 2025-03-17T21:16:43.467890
kjnkjabhbanc283ubcsbhdc72
36122 /
tcp
-616720387 | 2025-03-13T10:30:25.211936
36505 /
tcp
119860953 | 2025-03-16T07:40:47.872890
* OK ArGoSoft Mail Server IMAP Module v.YW at
36522 /
tcp
2087396567 | 2025-02-28T20:58:39.549766
kjnkjabhbanc283ubcsbhdc72
36622 /
tcp
-375604792 | 2025-03-16T07:48:47.603653
220 Microsoft FTP Service
36822 /
tcp
1830187220 | 2025-03-18T14:45:06.409072
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
2103111368 | 2025-03-18T13:02:46.466572
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
36982 /
tcp
-1399940268 | 2025-03-14T09:15:03.428494
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
36983 /
tcp
-653033013 | 2025-03-18T12:47:45.568495
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
37122 /
tcp
2087396567 | 2025-03-16T23:17:01.392340
kjnkjabhbanc283ubcsbhdc72
37215 /
tcp
819727972 | 2025-03-21T11:08:22.304761
SSH-2.0-OpenSSH_7.4
Vulnerabilities
37522 /
tcp
-971970408 | 2025-03-16T09:42:46.377415
37622 /
tcp
-971970408 | 2025-03-16T02:08:10.750153
37722 /
tcp
171352214 | 2025-03-16T00:25:41.963010
-ERR client ip is not in whitelist
37777 /
tcp
-903067560 | 2025-03-24T19:09:40.739058
\x00[\x13)\xc2\x81\x7f\x00\x00
37922 /
tcp
-358801646 | 2025-03-18T00:44:42.201234
38080 /
tcp
1911457608 | 2025-03-04T22:23:58.897960
\x00[\x00\x00\x00\x00\x00\x00
38122 /
tcp
1308377066 | 2025-03-15T17:42:29.471338
38333 /
tcp
2087396567 | 2025-03-15T20:58:01.879269
kjnkjabhbanc283ubcsbhdc72
38520 /
tcp
493955023 | 2025-03-13T03:39:21.392737
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
38522 /
tcp
819727972 | 2025-03-14T00:00:09.839878
SSH-2.0-OpenSSH_7.4
Vulnerabilities
38622 /
tcp
2033888749 | 2025-03-14T08:50:44.327464
Content-Type: text/rude-rejection
Content-Length: 24
Access Denied, go away.
Content-Type: text/disconnect-notice
C...
38722 /
tcp
-1428621233 | 2025-03-13T22:15:10.885748
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
38822 /
tcp
819727972 | 2025-03-03T20:31:38.957190
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1453516345 | 2025-03-22T05:37:33.640839
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
39022 /
tcp
-1681927087 | 2025-03-13T20:29:22.215522
kjnkjabhbanc283ubcsbhdc72
39122 /
tcp
1852418385 | 2025-03-13T18:57:07.420151
RTSP/1.0 453 Not Enough Bandwidth
Server: AirTunes/7l_wZ
39322 /
tcp
-971970408 | 2025-03-11T11:10:10.903626
39622 /
tcp
-971970408 | 2025-03-11T07:41:57.589464
39922 /
tcp
-971970408 | 2025-02-26T17:24:20.026192
40122 /
tcp
819727972 | 2025-02-26T14:51:13.750286
SSH-2.0-OpenSSH_7.4
Vulnerabilities
40722 /
tcp
1642597142 | 2025-03-08T14:34:35.162310
\x00y\xc3\x90\x02\xc3\xbf\xc3\xbf\x00s\x12L\x00\x06\x11I\x00\x08\x00N\x11S\x00\xc3\x93
41522 /
tcp
-747911285 | 2025-03-04T21:50:39.136282
41794 /
tcp
-952165951 | 2025-03-23T21:01:38.871985
41800 /
tcp
-1996280214 | 2025-02-24T11:44:00.761165
41922 /
tcp
-1136600457 | 2025-03-07T16:10:39.148301
HELO:10.3.6.0.false
AS:2048
HL:19
42422 /
tcp
808560482 | 2025-03-04T19:40:15.748721
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP
: USERID : UNIX : Cr8
42901 /
tcp
1189133115 | 2025-03-24T02:19:39.165243
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
42922 /
tcp
1492413928 | 2025-02-28T15:51:28.068007
SSH-2.0-OpenSSH_7.5
Vulnerabilities
43200 /
tcp
-2089734047 | 2025-03-18T21:46:05.405663
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
43222 /
tcp
1426971893 | 2025-03-01T01:00:11.296277
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
43322 /
tcp
2087396567 | 2025-02-27T23:11:32.154011
kjnkjabhbanc283ubcsbhdc72
43422 /
tcp
-445721795 | 2025-02-27T20:09:56.066471
\x00[\xc3\xaed\x1a\x7f\x00\x00
43622 /
tcp
-971970408 | 2025-02-27T00:14:38.946625
43722 /
tcp
2087396567 | 2025-02-27T03:40:48.439954
kjnkjabhbanc283ubcsbhdc72
43822 /
tcp
233634112 | 2025-02-27T03:49:38.702934
SSH-98.60-SysaxSSH_81885..42
43922 /
tcp
1778988322 | 2025-02-27T09:52:40.107893
* OK GroupWise IMAP4rev1 Server Ready
44022 /
tcp
-1730858130 | 2025-02-27T08:29:14.194831
RFB 003.008
VNC:
Protocol Version: 3.8
44158 /
tcp
-433302150 | 2025-02-24T20:25:03.254080
44222 /
tcp
-1872120160 | 2025-03-10T22:55:43.887999
">Application and Content Networking Software 3.9</a>)
</BODY><
44300 /
tcp
819727972 | 2025-03-08T20:59:41.174917
SSH-2.0-OpenSSH_7.4
Vulnerabilities
44399 /
tcp
-747911285 | 2025-02-27T17:00:23.933486
44420 /
tcp
1911457608 | 2025-03-20T00:08:22.375669
\x00[\x00\x00\x00\x00\x00\x00
44422 /
tcp
2087396567 | 2025-02-26T01:53:04.307745
kjnkjabhbanc283ubcsbhdc72
44818 /
tcp
2087396567 | 2025-03-24T20:33:23.165692
kjnkjabhbanc283ubcsbhdc72
45122 /
tcp
660175493 | 2025-02-25T12:54:39.356427
45222 /
tcp
2087396567 | 2025-02-25T19:59:13.082754
kjnkjabhbanc283ubcsbhdc72
45322 /
tcp
2087396567 | 2025-02-25T18:49:40.596180
kjnkjabhbanc283ubcsbhdc72
45522 /
tcp
1852418385 | 2025-02-25T16:19:42.024101
RTSP/1.0 453 Not Enough Bandwidth
Server: AirTunes/7l_wZ
45622 /
tcp
-792826324 | 2025-02-25T14:37:11.722025
220 FTP server ready - login please
45667 /
tcp
-358801646 | 2025-02-27T05:49:39.637940
45922 /
tcp
104385780 | 2025-03-10T14:23:15.605545
46122 /
tcp
104385780 | 2025-02-25T06:00:29.733715
46222 /
tcp
819727972 | 2025-02-24T23:04:02.245339
SSH-2.0-OpenSSH_7.4
Vulnerabilities
46522 /
tcp
-358801646 | 2025-02-24T05:46:09.714188
47222 /
tcp
2087396567 | 2025-02-23T21:25:29.650400
kjnkjabhbanc283ubcsbhdc72
47322 /
tcp
2087396567 | 2025-02-25T04:15:46.174016
kjnkjabhbanc283ubcsbhdc72
47622 /
tcp
1370263973 | 2025-02-23T14:06:26.845262
47722 /
tcp
-971970408 | 2025-03-10T10:55:43.736986
47808 /
tcp
819727972 | 2025-03-24T04:09:44.964045
SSH-2.0-OpenSSH_7.4
Vulnerabilities
47922 /
tcp
2087396567 | 2025-03-10T07:28:04.763700
kjnkjabhbanc283ubcsbhdc72
47990 /
tcp
1642597142 | 2025-03-18T22:17:04.765726
\x00y\xc3\x90\x02\xc3\xbf\xc3\xbf\x00s\x12L\x00\x06\x11I\x00\x08\x00N\x11S\x00\xc3\x93
48019 /
tcp
-1399940268 | 2025-02-27T01:43:11.942352
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
48022 /
tcp
2087396567 | 2025-03-07T12:44:24.904517
kjnkjabhbanc283ubcsbhdc72
-1013082686 | 2025-03-10T04:05:47.842873
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
48322 /
tcp
722711397 | 2025-03-10T02:17:16.892013
\x00[M\xc3\xba\xc3\x9a\x7f\x00\x00
48422 /
tcp
2087396567 | 2025-03-10T00:33:34.128642
kjnkjabhbanc283ubcsbhdc72
48722 /
tcp
2087396567 | 2025-02-24T16:02:05.029242
kjnkjabhbanc283ubcsbhdc72
48822 /
tcp
-971970408 | 2025-02-23T08:55:22.206703
49022 /
tcp
2087396567 | 2025-03-07T14:28:13.578437
kjnkjabhbanc283ubcsbhdc72
1827602907 | 2025-03-20T08:19:44.676449
HTTP/1.1 500 Internal Server Error
CONTENT-LENGTH: 411
CONTENT-TYPE: text/xml; charset="utf-8"
DATE: Mon, 22 Jan 2024 07:42:10 GMT
EXT:
SERVER: 6.2.9200 2/, UPnP/1.0, Portable SDK for UPnP devices/1.4.7
X-User-Agent: redsonic
<s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
<s:Body>
<s:Fault>
<faultcode>s:Client</faultcode>
<faultstring>UPnPError</faultstring>
<detail>
<UPnPError xmlns="urn:schemas-upnp-org:control-1-0">
<e
49501 /
tcp
819727972 | 2025-02-25T00:00:43.571982
SSH-2.0-OpenSSH_7.4
Vulnerabilities
49682 /
tcp
819727972 | 2025-03-13T02:43:33.932126
SSH-2.0-OpenSSH_7.4
Vulnerabilities
50000 /
tcp
-971970408 | 2025-03-19T04:27:41.266562
50050 /
tcp
-1476017887 | 2025-03-16T13:14:43.637634
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
50070 /
tcp
117101543 | 2025-03-22T00:33:10.215992
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
50080 /
tcp
-2089734047 | 2025-03-23T02:49:20.915185
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
50100 /
tcp
957278843 | 2025-03-21T23:35:03.525333
50101 /
tcp
669849225 | 2025-03-16T12:11:12.743550
SSH-98.60-SysaxSSH_81885..42\r\n
50580 /
tcp
-1399940268 | 2025-03-13T07:01:30.846091
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50777 /
tcp
819727972 | 2025-02-26T01:35:03.536973
SSH-2.0-OpenSSH_7.4
Vulnerabilities
51106 /
tcp
1082732927 | 2025-03-20T10:31:04.292784
STAT pid 1660
STAT uptime 28884
STAT time 1641290377
STAT version 1.2.1
STAT pointer_size 32
STAT curr_items 14
STAT total_items 3533
STAT bytes 30524
STAT curr_connections 1
STAT total_connections 3542
STAT connection_structures 3
STAT cmd_get 3533
STAT cmd_set 3533
STAT get_hits 3519
STAT get_misses 14
STAT bytes_read 7927780
STAT bytes_written 7848552
STAT limit_maxbytes 67108864
END
-1045760528 | 2025-03-21T17:33:07.698740
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
51434 /
tcp
-1248408558 | 2025-02-23T23:21:56.925277
220 MikroTik FTP server (MikroTik 6.44.3) ready
52340 /
tcp
-1746074029 | 2025-03-06T10:23:04.600513
52869 /
tcp
-949565575 | 2025-03-21T14:04:16.447163
\x19\x02\x02\x07Protocol version mismatch
52931 /
tcp
-1888448627 | 2025-02-23T15:33:37.322036
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
53022 /
tcp
-2031152423 | 2025-03-07T07:32:03.539217
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
54138 /
tcp
819727972 | 2025-03-21T09:26:45.356819
SSH-2.0-OpenSSH_7.4
Vulnerabilities
55000 /
tcp
-1947777893 | 2025-03-23T07:03:50.594001
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
55443 /
tcp
233634112 | 2025-03-20T08:46:58.907831
SSH-98.60-SysaxSSH_81885..42
1396488228 | 2025-03-16T08:55:19.087967
HTTP/1.1 200 OK
Content-Length: 2037
Cache-Control: private, max-age=300
Content-Type: text/html
55554 /
tcp
-68075478 | 2025-03-20T11:40:29.203935
55555 /
tcp
-1406255272 | 2025-02-24T09:29:57.039193
SSH-2.0-dropbear_0.52\r\n
57778 /
tcp
-1261090339 | 2025-03-20T17:04:41.113627
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
57822 /
tcp
2087396567 | 2025-03-06T06:21:41.652178
kjnkjabhbanc283ubcsbhdc72
58378 /
tcp
580340387 | 2025-03-23T18:33:50.418454
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
58443 /
tcp
-1399940268 | 2025-02-28T00:29:18.006982
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
58522 /
tcp
-358801646 | 2025-03-05T19:58:41.170404
58722 /
tcp
707919486 | 2025-03-05T18:15:12.222786
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
59222 /
tcp
-1681927087 | 2025-03-05T09:39:21.601685
kjnkjabhbanc283ubcsbhdc72
60001 /
tcp
2087396567 | 2025-03-15T03:31:33.530284
kjnkjabhbanc283ubcsbhdc72
60021 /
tcp
-792826324 | 2025-02-27T03:04:08.260674
220 FTP server ready - login please
60129 /
tcp
-792826324 | 2025-03-20T05:00:23.069645
220 FTP server ready - login please
61616 /
tcp
1690634669 | 2025-03-20T20:54:49.182245
62078 /
tcp
980478633 | 2025-02-23T06:05:34.241878
rry, that nickname format is invalid.
63210 /
tcp
819727972 | 2025-03-24T18:54:57.622755
SSH-2.0-OpenSSH_7.4
Vulnerabilities
63256 /
tcp
2087396567 | 2025-03-21T20:58:00.950156
kjnkjabhbanc283ubcsbhdc72
63260 /
tcp
-2080784861 | 2025-03-11T21:37:36.964771
GBPK\xc3\xbb\xc3\xb7n\xc2\x93W\xc2\xaf\xc2\x86\xc2\x93x@\xc2\xa9\x0e\xc3\x8a*\xc2\x9bS\x00