47.104.153.29

Regular View Raw Data Timeline

GeneralInformation

Country China
City Qingdao
Organization Aliyun Computing Co., LTD
ISP Hangzhou Alibaba Advertising Co.,Ltd.
ASN AS37963

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2024(11)
CVE-2024-45537
6.5Apache Druid allows users with certain permissions to read data from other database systems using JDBC. This functionality allows trusted users to set up Druid lookups or run ingestion tasks. Druid also allows administrators to configure a list of allowed properties that users are able to provide for their JDBC connections. By default, this allowed properties list restricts users to TLS-related properties only. However, when configuration a MySQL JDBC connection, users can use a particularly-crafted JDBC connection string to provide properties that are not on this allow list. Users without the permission to configure JDBC connections are not able to exploit this vulnerability. CVE-2021-26919 describes a similar vulnerability which was partially addressed in Apache Druid 0.20.2. This issue is fixed in Apache Druid 30.0.1.
CVE-2024-45384
5.3Padding Oracle vulnerability in Apache Druid extension, druid-pac4j. This could allow an attacker to manipulate a pac4j session cookie. This issue affects Apache Druid versions 0.18.0 through 30.0.0. Since the druid-pac4j extension is optional and disabled by default, Druid installations not using the druid-pac4j extension are not affected by this vulnerability. While we are not aware of a way to meaningfully exploit this flaw, we nevertheless recommend upgrading to version 30.0.1 or higher which fixes the issue and ensuring you have a strong druid.auth.pac4j.cookiePassphrase as a precaution.
CVE-2024-40898
7.5SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests. Users are recommended to upgrade to version 2.4.62 which fixes this issue. 
CVE-2024-38477
7.5null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
CVE-2024-38476
9.8Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
CVE-2024-38474
9.8Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI. Users are recommended to upgrade to version 2.4.60, which fixes this issue. Some RewriteRules that capture and substitute unsafely will now fail unless rewrite flag "UnsafeAllow3F" is specified.
CVE-2024-25117
6.8php-svg-lib is a scalable vector graphics (SVG) file parsing/rendering library. Prior to version 0.5.2, php-svg-lib fails to validate that font-family doesn't contain a PHAR url, which might leads to RCE on PHP < 8.0, and doesn't validate if external references are allowed. This might leads to bypass of restrictions or RCE on projects that are using it, if they do not strictly revalidate the fontName that is passed by php-svg-lib. The `Style::fromAttributes(`), or the `Style::parseCssStyle()` should check the content of the `font-family` and prevents it to use a PHAR url, to avoid passing an invalid and dangerous `fontName` value to other libraries. The same check as done in the `Style::fromStyleSheets` might be reused. Libraries using this library as a dependency might be vulnerable to some bypass of restrictions, or even remote code execution, if they do not double check the value of the `fontName` that is passed by php-svg-lib. Version 0.5.2 contains a fix for this issue.
CVE-2024-22201
7.5Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established and TCP congested will be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients. The vulnerability is patched in 9.4.54, 10.0.20, 11.0.20, and 12.0.6.
CVE-2024-8184
5.9There exists a security vulnerability in Jetty's ThreadLimitHandler.getRemote() which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory.
CVE-2024-6763
3.7Eclipse Jetty is a lightweight, highly scalable, Java-based web server and Servlet engine . It includes a utility class, HttpURI, for URI/URL parsing. The HttpURI class does insufficient validation on the authority segment of a URI. However the behaviour of HttpURI differs from the common browsers in how it handles a URI that would be considered invalid if fully validated against the RRC. Specifically HttpURI and the browser may differ on the value of the host extracted from an invalid URI and thus a combination of Jetty and a vulnerable browser may be vulnerable to a open redirect attack or to a SSRF attack if the URI is used after passing validation checks.
CVE-2024-0727
5.5Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.
2023(20)
CVE-2023-45725
5.7Design document functions which receive a user http request object may expose authorization or session cookie headers of the user who accesses the document. These design document functions are: *   list *   show *   rewrite *   update An attacker can leak the session component using an HTML-like output, insert the session as an external resource (such as an image), or store the credential in a _local document with an "update" function. For the attack to succeed the attacker has to be able to insert the design documents into the database, then manipulate a user to access a function from that design document. Workaround: Avoid using design documents from untrusted sources which may attempt to access or manipulate request object's headers
CVE-2023-44487
7.5The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2023-40167
5.3Jetty is a Java based web server and servlet engine. Prior to versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1, Jetty accepts the `+` character proceeding the content-length value in a HTTP/1 header field. This is more permissive than allowed by the RFC and other servers routinely reject such requests with 400 responses. There is no known exploit scenario, but it is conceivable that request smuggling could result if jetty is used in combination with a server that does not close the connection after sending such a 400 response. Versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1 contain a patch for this issue. There is no workaround as there is no known exploit scenario.
CVE-2023-36479
3.5Eclipse Jetty Canonical Repository is the canonical repository for the Jetty project. Users of the CgiServlet with a very specific command structure may have the wrong command executed. If a user sends a request to a org.eclipse.jetty.servlets.CGI Servlet for a binary with a space in its name, the servlet will escape the command by wrapping it in quotation marks. This wrapped command, plus an optional command prefix, will then be executed through a call to Runtime.exec. If the original binary name provided by the user contains a quotation mark followed by a space, the resulting command line will contain multiple tokens instead of one. This issue was patched in version 9.4.52, 10.0.16, 11.0.16 and 12.0.0-beta2.
CVE-2023-36478
7.5Eclipse Jetty provides a web server and servlet container. In versions 11.0.0 through 11.0.15, 10.0.0 through 10.0.15, and 9.0.0 through 9.4.52, an integer overflow in `MetaDataBuilder.checkSize` allows for HTTP/2 HPACK header values to exceed their size limit. `MetaDataBuilder.java` determines if a header name or value exceeds the size limit, and throws an exception if the limit is exceeded. However, when length is very large and huffman is true, the multiplication by 4 in line 295 will overflow, and length will become negative. `(_size+length)` will now be negative, and the check on line 296 will not be triggered. Furthermore, `MetaDataBuilder.checkSize` allows for user-entered HPACK header value sizes to be negative, potentially leading to a very large buffer allocation later on when the user-entered size is multiplied by 2. This means that if a user provides a negative length value (or, more precisely, a length value which, when multiplied by the 4/3 fudge factor, is negative), and this length value is a very large positive number when multiplied by 2, then the user can cause a very large buffer to be allocated on the server. Users of HTTP/2 can be impacted by a remote denial of service attack. The issue has been fixed in versions 11.0.16, 10.0.16, and 9.4.53. There are no known workarounds.
CVE-2023-31122
7.5Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.
CVE-2023-30800
7.5The web server used by MikroTik RouterOS version 6 is affected by a heap memory corruption issue. A remote and unauthenticated attacker can corrupt the server's heap memory by sending a crafted HTTP request. As a result, the web interface crashes and is immediately restarted. The issue was fixed in RouterOS 6.49.10 stable. RouterOS version 7 is not affected.
CVE-2023-30799
9.1MikroTik RouterOS stable before 6.49.7 and long-term through 6.48.6 are vulnerable to a privilege escalation issue. A remote and authenticated attacker can escalate privileges from admin to super-admin on the Winbox or HTTP interface. The attacker can abuse this vulnerability to execute arbitrary code on the system.
CVE-2023-26268
4.4Design documents with matching document IDs, from databases on the same cluster, may share a mutable Javascript environment when using these design document functions: * validate_doc_update * list * filter * filter views (using view functions as filters) * rewrite * update This doesn't affect map/reduce or search (Dreyfus) index functions. Users are recommended to upgrade to a version that is no longer affected by this issue (Apache CouchDB 3.3.2 or 3.2.3). Workaround: Avoid using design documents from untrusted sources which may attempt to cache or store data in the Javascript environment.
CVE-2023-26049
2.4Jetty is a java based web server and servlet engine. Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism. If Jetty sees a cookie VALUE that starts with `"` (double quote), it will continue to read the cookie string until it sees a closing quote -- even if a semicolon is encountered. So, a cookie header such as: `DISPLAY_LANGUAGE="b; JSESSIONID=1337; c=d"` will be parsed as one cookie, with the name DISPLAY_LANGUAGE and a value of b; JSESSIONID=1337; c=d instead of 3 separate cookies. This has security implications because if, say, JSESSIONID is an HttpOnly cookie, and the DISPLAY_LANGUAGE cookie value is rendered on the page, an attacker can smuggle the JSESSIONID cookie into the DISPLAY_LANGUAGE cookie and thereby exfiltrate it. This is significant when an intermediary is enacting some policy based on cookies, so a smuggled cookie can bypass that policy yet still be seen by the Jetty server or its logging system. This issue has been addressed in versions 9.4.51, 10.0.14, 11.0.14, and 12.0.0.beta0 and users are advised to upgrade. There are no known workarounds for this issue.
CVE-2023-26048
5.3Jetty is a java based web server and servlet engine. In affected versions servlets with multipart support (e.g. annotated with `@MultipartConfig`) that call `HttpServletRequest.getParameter()` or `HttpServletRequest.getParts()` may cause `OutOfMemoryError` when the client sends a multipart request with a part that has a name but no filename and very large content. This happens even with the default settings of `fileSizeThreshold=0` which should stream the whole part content to disk. An attacker client may send a large multipart request and cause the server to throw `OutOfMemoryError`. However, the server may be able to recover after the `OutOfMemoryError` and continue its service -- although it may take some time. This issue has been patched in versions 9.4.51, 10.0.14, and 11.0.14. Users are advised to upgrade. Users unable to upgrade may set the multipart parameter `maxRequestSize` which must be set to a non-negative value, so the whole multipart content is limited (although still read into memory).
CVE-2023-25690
9.8Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
CVE-2023-5678
5.3Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn't make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn't check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the "-pubcheck" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
CVE-2023-3817
5.3Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the "-check" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
CVE-2023-2650
6.5Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. The time complexity is O(n^2) with 'n' being the size of the sub-identifiers in bytes (*). With OpenSSL 3.0, support to fetch cryptographic algorithms using names / identifiers in string form was introduced. This includes using OBJECT IDENTIFIERs in canonical numeric text form as identifiers for fetching algorithms. Such OBJECT IDENTIFIERs may be received through the ASN.1 structure AlgorithmIdentifier, which is commonly used in multiple protocols to specify what cryptographic algorithm should be used to sign or verify, encrypt or decrypt, or digest passed data. Applications that call OBJ_obj2txt() directly with untrusted data are affected, with any version of OpenSSL. If the use is for the mere purpose of display, the severity is considered low. In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS. It also impacts anything that processes X.509 certificates, including simple things like verifying its signature. The impact on TLS is relatively low, because all versions of OpenSSL have a 100KiB limit on the peer's certificate chain. Additionally, this only impacts clients, or servers that have explicitly enabled client authentication. In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects, such as X.509 certificates. This is assumed to not happen in such a way that it would cause a Denial of Service, so these versions are considered not affected by this issue in such a way that it would be cause for concern, and the severity is therefore considered low.
CVE-2023-0466
5.3The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.
CVE-2023-0465
5.3Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.
CVE-2023-0464
7.5A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.
CVE-2023-0286
7.4There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.
CVE-2023-0215
7.5The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.
2022(27)
CVE-2022-45315
9.8Mikrotik RouterOs before stable v7.6 was discovered to contain an out-of-bounds read in the snmp process. This vulnerability allows attackers to execute arbitrary code via a crafted packet.
CVE-2022-45313
8.8Mikrotik RouterOs before stable v7.5 was discovered to contain an out-of-bounds read in the hotspot process. This vulnerability allows attackers to execute arbitrary code via a crafted nova message.
CVE-2022-37436
5.3Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.
CVE-2022-36760
9.0Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.
CVE-2022-36522
6.5Mikrotik RouterOs through stable v6.48.3 was discovered to contain an assertion failure in the component /advanced-tools/nova/bin/netwatch. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
CVE-2022-31813
9.8Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.
CVE-2022-31629
6.5In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.
CVE-2022-31628
2.3In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar uncompressor code would recursively uncompress "quines" gzip files, resulting in an infinite loop.
CVE-2022-30556
7.5Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.
CVE-2022-29404
7.5In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
CVE-2022-28889
4.3In Apache Druid 0.22.1 and earlier, the server did not set appropriate headers to prevent clickjacking. Druid 0.23.0 and later prevent clickjacking using the Content-Security-Policy header.
CVE-2022-28615
9.1Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
CVE-2022-28614
5.3The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.
CVE-2022-28330
5.3Apache HTTP Server 2.4.53 and earlier on Windows may read beyond bounds when configured to process requests with the mod_isapi module.
CVE-2022-26377
7.5Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.
CVE-2022-24706
9.8In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, including recommending using a firewall in front of all CouchDB installations.
CVE-2022-23943
9.8Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.
CVE-2022-22721
9.1If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.
CVE-2022-22720
9.8Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling
CVE-2022-22719
7.5A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.
CVE-2022-4900
6.2A vulnerability was found in PHP where setting the environment variable PHP_CLI_SERVER_WORKERS to a large value leads to a heap buffer overflow.
CVE-2022-4304
5.9A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.
CVE-2022-2068
9.8In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).
CVE-2022-2048
7.5In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.
CVE-2022-2047
2.7In Eclipse Jetty versions 9.4.0 thru 9.4.46, and 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, the parsing of the authority segment of an http scheme URI, the Jetty HttpURI class improperly detects an invalid input as a hostname. This can lead to failures in a Proxy scenario.
CVE-2022-1292
9.8The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).
CVE-2022-0778
7.5The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).
2021(30)
CVE-2021-44791
6.1In Apache Druid 0.22.1 and earlier, certain specially-crafted links result in unescaped URL parameters being sent back in HTML responses. This makes it possible to execute reflected XSS attacks.
CVE-2021-44790
9.8A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.
CVE-2021-40438
9.0A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
CVE-2021-39275
9.8ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.
CVE-2021-38295
7.3In Apache CouchDB, a malicious user with permission to create documents in a database is able to attach a HTML attachment to a document. If a CouchDB admin opens that attachment in a browser, e.g. via the CouchDB admin interface Fauxton, any JavaScript code embedded in that HTML attachment will be executed within the security context of that admin. A similar route is available with the already deprecated _show and _list functionality. This privilege escalation vulnerability allows an attacker to add or remove data in any database or make configuration changes. This issue affected Apache CouchDB prior to 3.1.2
CVE-2021-36749
6.5In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource. This issue was previously mentioned as being fixed in 0.21.0 as per CVE-2021-26920 but was not fixed in 0.21.0 or 0.21.1.
CVE-2021-36614
6.5Mikrotik RouterOs before stable 6.48.2 suffers from a memory corruption vulnerability in the tr069-client process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
CVE-2021-36613
6.5Mikrotik RouterOs before stable 6.48.2 suffers from a memory corruption vulnerability in the ptp process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
CVE-2021-34798
7.5Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.
CVE-2021-34428
2.9For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.
CVE-2021-32792
3.1mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, there is an XSS vulnerability in when using `OIDCPreservePost On`.
CVE-2021-32791
5.9mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, the AES GCM encryption in mod_auth_openidc uses a static IV and AAD. It is important to fix because this creates a static nonce and since aes-gcm is a stream cipher, this can lead to known cryptographic issues, since the same key is being reused. From 2.4.9 onwards this has been patched to use dynamic values through usage of cjose AES encryption routines.
CVE-2021-32786
4.7mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9, `oidc_validate_redirect_url()` does not parse URLs the same way as most browsers do. As a result, this function can be bypassed and leads to an Open Redirect vulnerability in the logout functionality. This bug has been fixed in version 2.4.9 by replacing any backslash of the URL to redirect with slashes to address a particular breaking change between the different specifications (RFC2396 / RFC3986 and WHATWG). As a workaround, this vulnerability can be mitigated by configuring `mod_auth_openidc` to only allow redirection whose destination matches a given regular expression.
CVE-2021-32785
5.3mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. When mod_auth_openidc versions prior to 2.4.9 are configured to use an unencrypted Redis cache (`OIDCCacheEncrypt off`, `OIDCSessionType server-cache`, `OIDCCacheType redis`), `mod_auth_openidc` wrongly performed argument interpolation before passing Redis requests to `hiredis`, which would perform it again and lead to an uncontrolled format string bug. Initial assessment shows that this bug does not appear to allow gaining arbitrary code execution, but can reliably provoke a denial of service by repeatedly crashing the Apache workers. This bug has been corrected in version 2.4.9 by performing argument interpolation only once, using the `hiredis` API. As a workaround, this vulnerability can be mitigated by setting `OIDCCacheEncrypt` to `on`, as cache keys are cryptographically hashed before use when this option is enabled.
CVE-2021-32761
7.5Redis is an in-memory database that persists on disk. A vulnerability involving out-of-bounds read and integer overflow to buffer overflow exists starting with version 2.2 and prior to versions 5.0.13, 6.0.15, and 6.2.5. On 32-bit systems, Redis `*BIT*` command are vulnerable to integer overflow that can potentially be exploited to corrupt the heap, leak arbitrary heap contents or trigger remote code execution. The vulnerability involves changing the default `proto-max-bulk-len` configuration parameter to a very large value and constructing specially crafted commands bit commands. This problem only affects Redis on 32-bit platforms, or compiled as a 32-bit binary. Redis versions 5.0.`3m 6.0.15, and 6.2.5 contain patches for this issue. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `proto-max-bulk-len` configuration parameter. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command.
CVE-2021-28169
5.3For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
CVE-2021-28165
7.5In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame.
CVE-2021-26920
6.5In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource.
CVE-2021-26919
8.8Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Druid server processes. This issue was addressed in Apache Druid 0.20.2
CVE-2021-26691
9.8In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow
CVE-2021-26690
7.5Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service
CVE-2021-25646
8.8Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process.
CVE-2021-23841
5.9The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
CVE-2021-23840
7.5Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
CVE-2021-21285
6.5In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.
CVE-2021-21284
6.8In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/<remapping>" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.
CVE-2021-4160
5.9There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlikely and include reusing private keys. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH private key among multiple clients, which is no longer an option since CVE-2016-0701. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0.0. It was addressed in the releases of 1.1.1m and 3.0.1 on the 15th of December 2021. For the 1.0.2 release it is addressed in git commit 6fc1aaaf3 that is available to premium support customers only. It will be made available in 1.0.2zc when it is released. The issue only affects OpenSSL on MIPS platforms. Fixed in OpenSSL 3.0.1 (Affected 3.0.0). Fixed in OpenSSL 1.1.1m (Affected 1.1.1-1.1.1l). Fixed in OpenSSL 1.0.2zc-dev (Affected 1.0.2-1.0.2zb).
CVE-2021-3712
7.4ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).
CVE-2021-3470
5.3A heap overflow issue was found in Redis in versions before 5.0.10, before 6.0.9 and before 6.2.0 when using a heap allocator other than jemalloc or glibc's malloc, leading to potential out of bound write or process crash. Effectively this flaw does not affect the vast majority of users, who use jemalloc or glibc malloc.
CVE-2021-3014
6.1In MikroTik RouterOS through 2021-01-04, the hotspot login page is vulnerable to reflected XSS via the target parameter.
2020(36)
CVE-2020-35452
7.3Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow
CVE-2020-27534
5.3util/binfmt_misc/check.go in Builder in Docker Engine before 19.03.9 calls os.OpenFile with a potentially unsafe qemu-check temporary pathname, constructed with an empty first argument in an ioutil.TempDir call.
CVE-2020-27223
5.3In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values.
CVE-2020-27218
4.8In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is received entirely but not consumed by the application, then a subsequent request on the same connection will see that body prepended to its body. The attacker will not see any data but may inject data into the body of the subsequent request.
CVE-2020-27216
7.0In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.
CVE-2020-20267
6.5Mikrotik RouterOs before 6.47 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/resolver process. An authenticated remote attacker can cause a Denial of Service due to invalid memory access.
CVE-2020-20266
6.5Mikrotik RouterOs before 6.47 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/dot1x process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
CVE-2020-20265
6.5Mikrotik RouterOs before 6.47 (stable tree) suffers from a memory corruption vulnerability in the /ram/pckg/wireless/nova/bin/wireless process. An authenticated remote attacker can cause a Denial of Service due via a crafted packet.
CVE-2020-20264
6.5Mikrotik RouterOs before 6.47 (stable tree) in the /ram/pckg/advanced-tools/nova/bin/netwatch process. An authenticated remote attacker can cause a Denial of Service due to a divide by zero error.
CVE-2020-20262
6.5Mikrotik RouterOs before 6.47 (stable tree) suffers from an assertion failure vulnerability in the /ram/pckg/security/nova/bin/ipsec process. An authenticated remote attacker can cause a Denial of Service due to an assertion failure via a crafted packet.
CVE-2020-20254
6.5Mikrotik RouterOs before 6.47 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/lcdstat process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
CVE-2020-20253
6.5Mikrotik RouterOs before 6.47 (stable tree) suffers from a divison by zero vulnerability in the /nova/bin/lcdstat process. An authenticated remote attacker can cause a Denial of Service due to a divide by zero error.
CVE-2020-20252
6.5Mikrotik RouterOs before stable version 6.47 suffers from a memory corruption vulnerability in the /nova/bin/lcdstat process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
CVE-2020-20250
6.5Mikrotik RouterOs before stable version 6.47 suffers from a memory corruption vulnerability in the /nova/bin/lcdstat process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference). NOTE: this is different from CVE-2020-20253 and CVE-2020-20254. All four vulnerabilities in the /nova/bin/lcdstat process are discussed in the CVE-2020-20250 github.com/cq674350529 reference.
CVE-2020-20249
6.5Mikrotik RouterOs before stable 6.47 suffers from a memory corruption vulnerability in the resolver process. By sending a crafted packet, an authenticated remote attacker can cause a Denial of Service.
CVE-2020-20247
6.5Mikrotik RouterOs before 6.46.5 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/traceroute process. An authenticated remote attacker can cause a Denial of Service due via the loop counter variable.
CVE-2020-20230
6.5Mikrotik RouterOs before stable 6.47 suffers from an uncontrolled resource consumption in the sshd process. An authenticated remote attacker can cause a Denial of Service due to overloading the systems CPU.
CVE-2020-20225
6.5Mikrotik RouterOs before 6.47 (stable tree) suffers from an assertion failure vulnerability in the /nova/bin/user process. An authenticated remote attacker can cause a Denial of Service due to an assertion failure via a crafted packet.
CVE-2020-20221
6.5Mikrotik RouterOs before 6.44.6 (long-term tree) suffers from an uncontrolled resource consumption vulnerability in the /nova/bin/cerm process. An authenticated remote attacker can cause a Denial of Service due to overloading the systems CPU.
CVE-2020-20220
6.5Mikrotik RouterOs prior to stable 6.47 suffers from a memory corruption vulnerability in the /nova/bin/bfd process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
CVE-2020-20217
6.5Mikrotik RouterOs before 6.47 (stable tree) suffers from an uncontrolled resource consumption vulnerability in the /nova/bin/route process. An authenticated remote attacker can cause a Denial of Service due to overloading the systems CPU.
CVE-2020-20021
7.5An issue discovered in MikroTik Router v6.46.3 and earlier allows attacker to cause denial of service via misconfiguration in the SSH daemon.
CVE-2020-17518
7.5Apache Flink 1.5.1 introduced a REST handler that allows you to write an uploaded file to an arbitrary location on the local file system, through a maliciously modified HTTP HEADER. The files can be written to any location accessible by Flink 1.5.1. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit a5264a6f41524afe8ceadf1d8ddc8c80f323ebc4 from apache/flink:master.
CVE-2020-14147
7.7An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.
CVE-2020-13938
5.5Apache HTTP Server versions 2.4.0 to 2.4.46 Unprivileged local users can stop httpd on Windows
CVE-2020-11985
5.3IP address spoofing when proxying using mod_remoteip and mod_rewrite For configurations using proxying with mod_remoteip and certain mod_rewrite rules, an attacker could spoof their IP address for logging and PHP scripts. Note this issue was fixed in Apache HTTP Server 2.4.24 but was retrospectively allocated a low severity CVE in 2020.
CVE-2020-11579
7.5An issue was discovered in Chadha PHPKB 9.0 Enterprise Edition. installer/test-connection.php (part of the installation process) allows a remote unauthenticated attacker to disclose local files on hosts running PHP before 7.2.16, or on hosts where the MySQL ALLOW LOCAL DATA INFILE option is enabled.
CVE-2020-11023
6.9In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022
6.9In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-10364
7.5The SSH daemon on MikroTik routers through v6.44.3 could allow remote attackers to generate CPU activity, trigger refusal of new authorized connections, and cause a reboot via connect and write system calls, because of uncontrolled resource management.
CVE-2020-7656
6.1jquery prior to 1.9.0 allows Cross-site Scripting attacks via the load method. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be executed.
CVE-2020-1971
5.9The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).
CVE-2020-1968
3.7The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).
CVE-2020-1960
4.7A vulnerability in Apache Flink (1.1.0 to 1.1.5, 1.2.0 to 1.2.1, 1.3.0 to 1.3.3, 1.4.0 to 1.4.2, 1.5.0 to 1.5.6, 1.6.0 to 1.6.4, 1.7.0 to 1.7.2, 1.8.0 to 1.8.3, 1.9.0 to 1.9.2, 1.10.0) where, when running a process with an enabled JMXReporter, with a port configured via metrics.reporter.reporter_name>.port, an attacker with local access to the machine and JMX port can execute a man-in-the-middle attack using a specially crafted request to rebind the JMXRMI registry to one under the attacker's control. This compromises any connection established to the process via JMX, allowing extraction of credentials and any other transferred data.
CVE-2020-1934
5.3In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server.
CVE-2020-1927
6.1In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.
2019(39)
CVE-2019-17567
5.3Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.
CVE-2019-16884
7.5runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
CVE-2019-16160
7.5An integer underflow in the SMB server of MikroTik RouterOS before 6.45.5 allows remote unauthenticated attackers to crash the service.
CVE-2019-15055
6.5MikroTik RouterOS through 6.44.5 and 6.45.x through 6.45.3 improperly handles the disk name, which allows authenticated users to delete arbitrary files. Attackers can exploit this vulnerability to reset credential storage, which allows them access to the management interface as an administrator without authentication.
CVE-2019-13955
6.5Mikrotik RouterOS before 6.44.5 (long-term release tree) is vulnerable to stack exhaustion. By sending a crafted HTTP request, an authenticated remote attacker can crash the HTTP server via recursive parsing of JSON. Malicious code cannot be injected.
CVE-2019-13954
6.5Mikrotik RouterOS before 6.44.5 (long-term release tree) is vulnerable to memory exhaustion. By sending a crafted HTTP request, an authenticated remote attacker can crash the HTTP server and in some circumstances reboot the system. Malicious code cannot be injected.
CVE-2019-13509
7.5In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that includes (non external) secrets. It potentially applies to other API users of the stack API if they resend the secret.
CVE-2019-13074
7.5A vulnerability in the FTP daemon on MikroTik routers through 6.44.3 could allow remote attackers to exhaust all available memory, causing the device to reboot because of uncontrolled resource management.
CVE-2019-11358
6.1jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2019-11072
9.8lighttpd before 1.4.54 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malicious HTTP GET request, as demonstrated by mishandling of /%2F? in burl_normalize_2F_to_slash_fix in burl.c. NOTE: The developer states "The feature which can be abused to cause the crash is a new feature in lighttpd 1.4.50, and is not enabled by default. It must be explicitly configured in the config file (e.g. lighttpd.conf). Certain input will trigger an abort() in lighttpd when that feature is enabled. lighttpd detects the underflow or realloc() will fail (in both 32-bit and 64-bit executables), also detected in lighttpd. Either triggers an explicit abort() by lighttpd. This is not exploitable beyond triggering the explicit abort() with subsequent application exit.
CVE-2019-10247
5.3In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.
CVE-2019-10241
6.1In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.
CVE-2019-10098
6.1In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL.
CVE-2019-10092
6.1In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.
CVE-2019-9641
9.8An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_TIFF.
CVE-2019-9639
7.5An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the data_len variable.
CVE-2019-9638
7.5An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the maker_note->offset relationship to value_len.
CVE-2019-9637
7.5An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data.
CVE-2019-9024
7.5An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. xmlrpc_decode() can allow a hostile XMLRPC server to cause PHP to read memory outside of allocated areas in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c.
CVE-2019-9023
9.8An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcomp.c, ext/mbstring/oniguruma/regexec.c, ext/mbstring/oniguruma/regparse.c, ext/mbstring/oniguruma/enc/unicode.c, and ext/mbstring/oniguruma/src/utf32_be.c when a multibyte regular expression pattern contains invalid multibyte sequences.
CVE-2019-9021
9.8An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A heap-based buffer over-read in PHAR reading functions in the PHAR extension may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse the file name, a different vulnerability than CVE-2018-20783. This is related to phar_detect_phar_fname_ext in ext/phar/phar.c.
CVE-2019-9020
9.8An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. Invalid input to the function xmlrpc_decode() can lead to an invalid memory access (heap out of bounds read or read after free). This is related to xml_elem_parse_buf in ext/xmlrpc/libxmlrpc/xml_element.c.
CVE-2019-8331
6.1In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.
CVE-2019-6977
8.8gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data.
CVE-2019-5736
8.6runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
CVE-2019-3981
3.7MikroTik Winbox 3.20 and below is vulnerable to man in the middle attacks. A man in the middle can downgrade the client's authentication protocol and recover the user's username and MD5 hashed password.
CVE-2019-3979
7.5RouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below are vulnerable to a DNS unrelated data attack. The router adds all A records to its DNS cache even when the records are unrelated to the domain that was queried. Therefore, a remote attacker controlled DNS server can poison the router's DNS cache via malicious responses with additional and untrue records.
CVE-2019-3978
7.5RouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below allow remote unauthenticated attackers to trigger DNS queries via port 8291. The queries are sent from the router to a server of the attacker's choice. The DNS responses are cached by the router, potentially resulting in cache poisoning
CVE-2019-3977
7.5RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below insufficiently validate where upgrade packages are download from when using the autoupgrade feature. Therefore, a remote attacker can trick the router into "upgrading" to an older version of RouterOS and possibly reseting all the system's usernames and passwords.
CVE-2019-3976
8.8RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below are vulnerable to an arbitrary directory creation vulnerability via the upgrade package's name field. If an authenticated user installs a malicious package then a directory could be created and the developer shell could be enabled.
CVE-2019-3943
8.1MikroTik RouterOS versions Stable 6.43.12 and below, Long-term 6.42.12 and below, and Testing 6.44beta75 and below are vulnerable to an authenticated, remote directory traversal via the HTTP or Winbox interfaces. An authenticated, remote attack can use this vulnerability to read and write files outside of the sandbox directory (/rw/disk).
CVE-2019-3924
7.5MikroTik RouterOS before 6.43.12 (stable) and 6.42.12 (long-term) is vulnerable to an intermediary vulnerability. The software will execute user defined network requests to both WAN and LAN clients. A remote unauthenticated attacker can use this vulnerability to bypass the router's firewall or for general network scanning activities.
CVE-2019-1563
3.7In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
CVE-2019-1559
5.9If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).
CVE-2019-1552
3.3OpenSSL has internal defaults for a directory tree where it can find a configuration file as well as certificates used for verification in TLS. This directory is most commonly referred to as OPENSSLDIR, and is configurable with the --prefix / --openssldir configuration options. For OpenSSL versions 1.1.0 and 1.1.1, the mingw configuration targets assume that resulting programs and libraries are installed in a Unix-like environment and the default prefix for program installation as well as for OPENSSLDIR should be '/usr/local'. However, mingw programs are Windows programs, and as such, find themselves looking at sub-directories of 'C:/usr/local', which may be world writable, which enables untrusted users to modify OpenSSL's default configuration, insert CA certificates, modify (or even replace) existing engine modules, etc. For OpenSSL 1.0.2, '/usr/local/ssl' is used as default for OPENSSLDIR on all Unix and Windows targets, including Visual C builds. However, some build instructions for the diverse Windows targets on 1.0.2 encourage you to specify your own --prefix. OpenSSL versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
CVE-2019-1551
5.3There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).
CVE-2019-1547
4.7Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
CVE-2019-0220
5.3A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.
CVE-2019-0217
7.5In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.
2018(49)
CVE-2018-20783
7.5In PHP before 5.6.39, 7.x before 7.0.33, 7.1.x before 7.1.25, and 7.2.x before 7.2.13, a buffer over-read in PHAR reading functions may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse a .phar file. This is related to phar_parse_pharfile in ext/phar/phar.c.
CVE-2018-20677
6.1In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
CVE-2018-20676
6.1In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
CVE-2018-19520
8.8An issue was discovered in SDCMS 1.6 with PHP 5.x. app/admin/controller/themecontroller.php uses a check_bad function in an attempt to block certain PHP functions such as eval, but does not prevent use of preg_replace 'e' calls, allowing users to execute arbitrary code by leveraging access to admin template management.
CVE-2018-19396
7.5ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.
CVE-2018-19395
7.5ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").
CVE-2018-19052
7.5An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.
CVE-2018-17199
7.5In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.
CVE-2018-17188
7.2Prior to CouchDB version 2.3.0, CouchDB allowed for runtime-configuration of key components of the database. In some cases, this lead to vulnerabilities where CouchDB admin users could access the underlying operating system as the CouchDB user. Together with other vulnerabilities, it allowed full system entry for unauthenticated users. Rather than waiting for new vulnerabilities to be discovered, and fixing them as they come up, the CouchDB development team decided to make changes to avoid this entire class of vulnerabilities.
CVE-2018-17082
6.1The Apache2 component in PHP before 5.6.38, 7.0.x before 7.0.32, 7.1.x before 7.1.22, and 7.2.x before 7.2.10 allows XSS via the body of a "Transfer-Encoding: chunked" request, because the bucket brigade is mishandled in the php_handler function in sapi/apache2handler/sapi_apache2.c.
CVE-2018-15514
8.8HandleRequestAsync in Docker for Windows before 18.06.0-ce-rc3-win68 (edge) and before 18.06.0-ce-win72 (stable) deserialized requests over the \\.\pipe\dockerBackend named pipe without verifying the validity of the deserialized .NET objects. This would allow a malicious user in the "docker-users" group (who may not otherwise have administrator access) to escalate to administrator privileges.
CVE-2018-15132
7.5An issue was discovered in ext/standard/link_win32.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. The linkinfo function on Windows doesn't implement the open_basedir check. This could be abused to find files on paths outside of the allowed directories.
CVE-2018-14883
7.5An issue was discovered in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.
CVE-2018-14851
5.5exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.
CVE-2018-14847
9.1MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.
CVE-2018-14042
6.1In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.
CVE-2018-14040
6.1In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.
CVE-2018-12545
7.5In Eclipse Jetty version 9.3.x and 9.4.x, the server is vulnerable to Denial of Service conditions if a remote client sends either large SETTINGs frames container containing many settings, or many small SETTINGs frames. The vulnerability is due to the additional CPU and memory allocations required to handle changed settings.
CVE-2018-12536
5.3In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn't match a dynamic url-pattern, and is eventually handled by the DefaultServlet's static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system.
CVE-2018-12453
7.5Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream.
CVE-2018-12326
8.4Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.
CVE-2018-11769
7.2CouchDB administrative users before 2.2.0 can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user under which CouchDB runs, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows a CouchDB admin user to gain arbitrary remote code execution, bypassing CVE-2017-12636 and CVE-2018-8007.
CVE-2018-11219
9.8An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.
CVE-2018-11218
9.8Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.
CVE-2018-10549
8.8An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character.
CVE-2018-10548
7.5An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. ext/ldap/ldap.c allows remote LDAP servers to cause a denial of service (NULL pointer dereference and application crash) because of mishandling of the ldap_get_dn return value.
CVE-2018-10547
6.1An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712.
CVE-2018-10546
7.5An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.
CVE-2018-10545
4.7An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
CVE-2018-8007
7.2Apache CouchDB administrative users can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user that CouchDB runs under, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows an existing CouchDB admin user to gain arbitrary remote code execution, bypassing already disclosed CVE-2017-12636. Mitigation: All users should upgrade to CouchDB releases 1.7.2 or 2.1.2.
CVE-2018-7584
9.8In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
CVE-2018-7445
9.8A buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. The overflow occurs before authentication takes place, so it is possible for an unauthenticated remote attacker to exploit it. All architectures and all devices running RouterOS before versions 6.41.3/6.42rc27 are vulnerable.
CVE-2018-5951
7.5An issue was discovered in Mikrotik RouterOS. Crafting a packet that has a size of 1 byte and sending it to an IPv6 address of a RouterOS box with IP Protocol 97 will cause RouterOS to reboot imminently. All versions of RouterOS that supports EoIPv6 are vulnerable to this attack.
CVE-2018-5712
6.1An issue was discovered in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. There is Reflected XSS on the PHAR 404 error page via the URI of a request for a .phar file.
CVE-2018-5711
5.5gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP function. This is related to GetCode_ and gdImageCreateFromGifCtx.
CVE-2018-5407
4.7Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.
CVE-2018-1312
9.8In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.
CVE-2018-1303
7.5A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.30 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache. The vulnerability is considered as low risk since mod_cache_socache is not widely used, mod_cache_disk is not concerned by this vulnerability.
CVE-2018-1302
5.9When an HTTP/2 stream was destroyed after being handled, the Apache HTTP Server prior to version 2.4.30 could have written a NULL pointer potentially to an already freed memory. The memory pools maintained by the server make this vulnerability hard to trigger in usual configurations, the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk.
CVE-2018-1301
5.9A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.
CVE-2018-1283
5.3In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.
CVE-2018-1159
6.5Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a memory corruption vulnerability. An authenticated remote attacker can crash the HTTP server by rapidly authenticating and disconnecting.
CVE-2018-1158
6.5Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a stack exhaustion vulnerability. An authenticated remote attacker can crash the HTTP server via recursive parsing of JSON.
CVE-2018-1157
6.5Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a memory exhaustion vulnerability. An authenticated remote attacker can crash the HTTP server and in some circumstances reboot the system via a crafted HTTP POST request.
CVE-2018-1156
8.8Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to stack buffer overflow through the license upgrade interface. This vulnerability could theoretically allow a remote authenticated attacker execute arbitrary code on the system.
CVE-2018-0739
6.5Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).
CVE-2018-0737
5.9The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).
CVE-2018-0734
5.9The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).
CVE-2018-0732
7.5During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
2017(32)
CVE-2017-20149
9.8The Mikrotik RouterOS web server allows memory corruption in releases before Stable 6.38.5 and Long-term 6.37.5, aka Chimay-Red. A remote and unauthenticated user can trigger the vulnerability by sending a crafted HTTP request. An attacker can use this vulnerability to execute arbitrary code on the affected system, as exploited in the wild in mid-2017 and later.
CVE-2017-16642
7.5In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: this is a different issue than CVE-2017-11145.
CVE-2017-15715
8.1In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.
CVE-2017-15710
7.5In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.
CVE-2017-12933
9.8The finish_nested_data function in ext/standard/var_unserializer.re in PHP before 5.6.31, 7.0.x before 7.0.21, and 7.1.x before 7.1.7 is prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue can have an unspecified impact on the integrity of PHP.
CVE-2017-12868
9.8The secureCompare method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.13 and earlier, when used with PHP before 5.6, allows attackers to conduct session fixation attacks or possibly bypass authentication by leveraging missing character conversions before an XOR operation.
CVE-2017-12636
7.2CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet.
CVE-2017-12635
9.8Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keys for 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behaviour that if two 'roles' keys are available in the JSON, the second one will be used for authorising the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges.
CVE-2017-11628
7.8In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.
CVE-2017-11147
9.1In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c.
CVE-2017-11145
7.5In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, an error in the date extension's timelib_meridian parsing code could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: the correct fix is in the e8b7698f5ee757ce2c8bd10a192a491a498f891c commit, not the bd77ac90d3bdf31ce2a5251ad92e9e75 gist.
CVE-2017-11144
7.5In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, the openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could lead to a crash of the PHP interpreter, related to an interpretation conflict for a negative number in ext/openssl/openssl.c, and an OpenSSL documentation omission.
CVE-2017-11143
7.5In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c.
CVE-2017-11142
7.5In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3, remote attackers could cause a CPU consumption denial of service attack by injecting long form variables, related to main/php_variables.c.
CVE-2017-9798
7.5Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.
CVE-2017-9788
9.1In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.
CVE-2017-9735
7.5Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.
CVE-2017-9226
9.8An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.
CVE-2017-9224
9.8An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.
CVE-2017-8923
9.8The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.
CVE-2017-7963
7.5The GNU Multiple Precision Arithmetic Library (GMP) interfaces for PHP through 7.1.4 allow attackers to cause a denial of service (memory consumption and application crash) via operations on long strings. NOTE: the vendor disputes this, stating "There is no security issue here, because GMP safely aborts in case of an OOM condition. The only attack vector here is denial of service. However, if you allow attacker-controlled, unbounded allocations you have a DoS vector regardless of GMP's OOM behavior.
CVE-2017-7890
6.5The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information.
CVE-2017-7679
9.8In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.
CVE-2017-7658
9.8In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.
CVE-2017-7657
9.8In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.
CVE-2017-7656
7.5In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled poorly. An HTTP/1 style request line (i.e. method space URI space version) that declares a version of HTTP/0.9 was accepted and treated as a 0.9 request. If deployed behind an intermediary that also accepted and passed through the 0.9 version (but did not act on it), then the response sent could be interpreted by the intermediary as HTTP/1 headers. This could be used to poison the cache if the server allowed the origin client to generate arbitrary content in the response.
CVE-2017-7272
7.4PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.
CVE-2017-3738
5.9There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.
CVE-2017-3737
5.9OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected.
CVE-2017-3736
6.5There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.
CVE-2017-3735
5.3While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.
CVE-2017-3167
9.8In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.
2016(76)
CVE-2016-10735
6.1In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
CVE-2016-10712
7.5In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all of the return values of stream_get_meta_data can be controlled if the input can be controlled (e.g., during file uploads). For example, a "$uri = stream_get_meta_data(fopen($file, "r"))['uri']" call mishandles the case where $file is data:text/plain;uri=eviluri, -- in other words, metadata can be set by an attacker.
CVE-2016-10517
7.4networking.c in Redis before 3.2.7 allows "Cross Protocol Scripting" because it lacks a check for POST and Host: strings, which are not valid in the Redis protocol (but commonly occur when an attack triggers an HTTP request to the Redis TCP port).
CVE-2016-10397
7.5In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).
CVE-2016-10161
7.5The object_common1 function in ext/standard/var_unserializer.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via crafted serialized data that is mishandled in a finish_nested_data call.
CVE-2016-10159
7.5Integer overflow in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory consumption or application crash) via a truncated manifest entry in a PHAR archive.
CVE-2016-10158
7.5The exif_convert_any_to_int function in ext/exif/exif.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (application crash) via crafted EXIF data that triggers an attempt to divide the minimum representable negative integer by -1.
CVE-2016-9935
9.8The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document.
CVE-2016-9934
7.5ext/wddx/wddx.c in PHP before 5.6.28 and 7.x before 7.0.13 allows remote attackers to cause a denial of service (NULL pointer dereference) via crafted serialized data in a wddxPacket XML document, as demonstrated by a PDORow string.
CVE-2016-9933
7.5Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a negative color value.
CVE-2016-9138
9.8PHP through 5.6.27 and 7.x through 7.0.12 mishandles property modification during __wakeup processing, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data, as demonstrated by Exception::__toString with DateInterval::__wakeup.
CVE-2016-9137
9.8Use-after-free vulnerability in the CURLFile implementation in ext/curl/curl_file.c in PHP before 5.6.27 and 7.x before 7.0.12 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that is mishandled during __wakeup processing.
CVE-2016-8743
7.5Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.
CVE-2016-8670
9.8Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagecreatefromstring call.
CVE-2016-8612
4.3Apache HTTP Server mod_cluster before version httpd 2.4.23 is vulnerable to an Improper Input Validation in the protocol parsing logic in the load balancer resulting in a Segmentation Fault in the serving httpd process.
CVE-2016-7478
7.5Zend/zend_exceptions.c in PHP, possibly 5.x before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (infinite loop) via a crafted Exception object in serialized data, a related issue to CVE-2015-8876.
CVE-2016-7418
7.5The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service (invalid pointer access and out-of-bounds read) or possibly have unspecified other impact via an incorrect boolean element in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call.
CVE-2016-7417
9.8ext/spl/spl_array.c in PHP before 5.6.26 and 7.x before 7.0.11 proceeds with SplArray unserialization without validating a return value and data type, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data.
CVE-2016-7416
7.5ext/intl/msgformat/msgformat_format.c in PHP before 5.6.26 and 7.x before 7.0.11 does not properly restrict the locale length provided to the Locale class in the ICU library, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a MessageFormatter::formatMessage call with a long first argument.
CVE-2016-7414
9.8The ZIP signature-verification feature in PHP before 5.6.26 and 7.x before 7.0.11 does not ensure that the uncompressed_filesize field is large enough, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a crafted PHAR archive, related to ext/phar/util.c and ext/phar/zip.c.
CVE-2016-7413
9.8Use-after-free vulnerability in the wddx_stack_destroy function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a wddxPacket XML document that lacks an end-tag for a recordset field element, leading to mishandling in a wddx_deserialize call.
CVE-2016-7412
8.1ext/mysqlnd/mysqlnd_wireprotocol.c in PHP before 5.6.26 and 7.x before 7.0.11 does not verify that a BIT field has the UNSIGNED_FLAG flag, which allows remote MySQL servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted field metadata.
CVE-2016-7411
9.8ext/standard/var_unserializer.re in PHP before 5.6.26 mishandles object-deserialization failures, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via an unserialize call that references a partially constructed object.
CVE-2016-7132
7.5ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a stray element inside a boolean element, leading to incorrect pop processing.
CVE-2016-7131
7.5ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via a malformed wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a tag that lacks a < (less than) character.
CVE-2016-7130
7.5The php_wddx_pop_element function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid base64 binary value, as demonstrated by a wddx_deserialize call that mishandles a binary element in a wddxPacket XML document.
CVE-2016-7129
9.8The php_wddx_process_data function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via an invalid ISO 8601 time value, as demonstrated by a wddx_deserialize call that mishandles a dateTime element in a wddxPacket XML document.
CVE-2016-7128
5.3The exif_process_IFD_in_TIFF function in ext/exif/exif.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles the case of a thumbnail offset that exceeds the file size, which allows remote attackers to obtain sensitive information from process memory via a crafted TIFF image.
CVE-2016-7127
9.8The imagegammacorrect function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate gamma values, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by providing different signs for the second and third arguments.
CVE-2016-7126
9.8The imagetruecolortopalette function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate the number of colors, which allows remote attackers to cause a denial of service (select_colors allocation error and out-of-bounds write) or possibly have unspecified other impact via a large value in the third argument.
CVE-2016-7125
7.5ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.
CVE-2016-7124
9.8ext/standard/var_unserializer.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles certain invalid objects, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that leads to a (1) __destruct call or (2) magic method call.
CVE-2016-6297
8.8Integer overflow in the php_stream_zip_opener function in ext/zip/zip_stream.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted zip:// URL.
CVE-2016-6296
9.8Integer signedness error in the simplestring_addn function in simplestring.c in xmlrpc-epi through 0.54.2, as used in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a long first argument to the PHP xmlrpc_encode_request function.
CVE-2016-6295
9.8ext/snmp/snmp.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via crafted serialized data, a related issue to CVE-2016-5773.
CVE-2016-6294
9.8The locale_accept_from_http function in ext/intl/locale/locale_methods.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 does not properly restrict calls to the ICU uloc_acceptLanguageFromHTTP function, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long argument.
CVE-2016-6292
6.5The exif_process_user_comment function in ext/exif/exif.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted JPEG image.
CVE-2016-6291
9.8The exif_process_IFD_in_MAKERNOTE function in ext/exif/exif.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (out-of-bounds array access and memory corruption), obtain sensitive information from process memory, or possibly have unspecified other impact via a crafted JPEG image.
CVE-2016-6290
9.8ext/session/session.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 does not properly maintain a certain hash data structure, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to session deserialization.
CVE-2016-6289
7.8Integer overflow in the virtual_file_ex function in TSRM/tsrm_virtual_cwd.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted extract operation on a ZIP archive.
CVE-2016-6288
9.8The php_url_parse_ex function in ext/standard/url.c in PHP before 5.5.38 allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via vectors involving the smart_str data type.
CVE-2016-6174
8.1applications/core/modules/front/system/content.php in Invision Power Services IPS Community Suite (aka Invision Power Board, IPB, or Power Board) before 4.1.13, when used with PHP before 5.4.24 or 5.5.x before 5.5.8, allows remote attackers to execute arbitrary code via the content_class parameter.
CVE-2016-5773
9.8php_zip.c in the zip extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data containing a ZipArchive object.
CVE-2016-5772
9.8Double free vulnerability in the php_wddx_process_data function in wddx.c in the WDDX extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted XML data that is mishandled in a wddx_deserialize call.
CVE-2016-5771
9.8spl_array.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data.
CVE-2016-5770
9.8Integer overflow in the SplFileObject::fread function in spl_directory.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer argument, a related issue to CVE-2016-5096.
CVE-2016-5769
9.8Multiple integer overflows in mcrypt.c in the mcrypt extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allow remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted length value, related to the (1) mcrypt_generic and (2) mdecrypt_generic functions.
CVE-2016-5768
9.8Double free vulnerability in the _php_mb_regex_ereg_replace_exec function in php_mbregex.c in the mbstring extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by leveraging a callback exception.
CVE-2016-5767
8.8Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted image dimensions.
CVE-2016-5766
8.8Integer overflow in the _gd2GetHeader function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image.
CVE-2016-5399
7.8The bzread function in ext/bz2/bz2.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted bz2 archive.
CVE-2016-5387
8.1The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.
CVE-2016-5114
9.1sapi/fpm/fpm/fpm_log.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 misinterprets the semantics of the snprintf return value, which allows attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and buffer overflow) via a long string, as demonstrated by a long URI in a configuration with custom REQUEST_URI logging.
CVE-2016-5096
8.6Integer overflow in the fread function in ext/standard/file.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer in the second argument.
CVE-2016-5095
8.6Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-5094.
CVE-2016-5094
8.6Integer overflow in the php_html_entities function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from the htmlspecialchars function.
CVE-2016-5093
8.6The get_icu_value_internal function in ext/intl/locale/locale_methods.c in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x before 7.0.7 does not ensure the presence of a '\0' character, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted locale_get_primary_language call.
CVE-2016-4975
6.1Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).
CVE-2016-4543
9.8The exif_process_IFD_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate IFD sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.
CVE-2016-4542
9.8The exif_process_IFD_TAG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not properly construct spprintf arguments, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.
CVE-2016-4541
9.8The grapheme_strpos function in ext/intl/grapheme/grapheme_string.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset.
CVE-2016-4540
9.8The grapheme_stripos function in ext/intl/grapheme/grapheme_string.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset.
CVE-2016-4539
9.8The xml_parse_into_struct function in ext/xml/xml.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (buffer under-read and segmentation fault) or possibly have unspecified other impact via crafted XML data in the second argument, leading to a parser level of zero.
CVE-2016-4538
9.8The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 modifies certain data structures without considering whether they are copies of the _zero_, _one_, or _two_ global variable, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call.
CVE-2016-4537
9.8The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 accepts a negative integer for the scale argument, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call.
CVE-2016-4343
8.8The phar_make_dirstream function in ext/phar/dirstream.c in PHP before 5.6.18 and 7.x before 7.0.3 mishandles zero-size ././@LongLink files, which allows remote attackers to cause a denial of service (uninitialized pointer dereference) or possibly have unspecified other impact via a crafted TAR archive.
CVE-2016-4342
8.8ext/phar/phar_object.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 mishandles zero-length uncompressed data, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) TAR, (2) ZIP, or (3) PHAR archive.
CVE-2016-4070
7.5Integer overflow in the php_raw_url_encode function in ext/standard/url.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to cause a denial of service (application crash) via a long string to the rawurlencode function. NOTE: the vendor says "Not sure if this qualifies as security issue (probably not).
CVE-2016-3185
7.1The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, 5.6.x before 5.6.12, and 7.x before 7.0.4 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (type confusion and application crash) via crafted serialized _cookies data, related to the SoapClient::__call method in ext/soap/soap.c.
CVE-2016-3171
8.1Drupal 6.x before 6.38, when used with PHP before 5.4.45, 5.5.x before 5.5.29, or 5.6.x before 5.6.13, might allow remote attackers to execute arbitrary code via vectors related to session data truncation.
CVE-2016-3142
8.2The phar_parse_zipfile function in zip.c in the PHAR extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) by placing a PK\x05\x06 signature at an invalid location.
CVE-2016-3141
9.8Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.
CVE-2016-2554
9.8Stack-based buffer overflow in ext/phar/tar.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TAR archive.
CVE-2016-2161
7.5In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.
CVE-2016-1903
9.1The gdImageRotateInterpolated function in ext/gd/libgd/gd_interpolation.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a large bgd_color argument to the imagerotate function.
CVE-2016-0736
7.5In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.
2015(75)
CVE-2015-9253
6.5An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.
CVE-2015-9251
6.1jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
CVE-2015-8994
7.5An issue was discovered in PHP 5.x and 7.x, when the configuration uses apache2handler/mod_php or php-fpm with OpCache enabled. With 5.x after 5.6.28 or 7.x after 7.0.13, the issue is resolved in a non-default configuration with the opcache.validate_permission=1 setting. The vulnerability details are as follows. In PHP SAPIs where PHP interpreters share a common parent process, Zend OpCache creates a shared memory object owned by the common parent during initialization. Child PHP processes inherit the SHM descriptor, using it to cache and retrieve compiled script bytecode ("opcode" in PHP jargon). Cache keys vary depending on configuration, but filename is a central key component, and compiled opcode can generally be run if a script's filename is known or can be guessed. Many common shared-hosting configurations change EUID in child processes to enforce privilege separation among hosted users (for example using mod_ruid2 for the Apache HTTP Server, or php-fpm user settings). In these scenarios, the default Zend OpCache behavior defeats script file permissions by sharing a single SHM cache among all child PHP processes. PHP scripts often contain sensitive information: Think of CMS configurations where reading or running another user's script usually means gaining privileges to the CMS database.
CVE-2015-8935
6.1The sapi_header_op function in main/SAPI.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 supports deprecated line folding without considering browser compatibility, which allows remote attackers to conduct cross-site scripting (XSS) attacks against Internet Explorer by leveraging (1) %0A%20 or (2) %0D%0A%20 mishandling in the header function.
CVE-2015-8879
7.5The odbc_bindcols function in ext/odbc/php_odbc.c in PHP before 5.6.12 mishandles driver behavior for SQL_WVARCHAR columns, which allows remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table.
CVE-2015-8877
7.5The gdImageScaleTwoPass function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in PHP before 5.6.12, uses inconsistent allocate and free approaches, which allows remote attackers to cause a denial of service (memory consumption) via a crafted call, as demonstrated by a call to the PHP imagescale function.
CVE-2015-8876
9.8Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not validate certain Exception objects, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or trigger unintended method execution via crafted serialized data.
CVE-2015-8874
7.5Stack consumption vulnerability in GD in PHP before 5.6.12 allows remote attackers to cause a denial of service via a crafted imagefilltoborder call.
CVE-2015-8873
7.5Stack consumption vulnerability in Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to cause a denial of service (segmentation fault) via recursive method calls.
CVE-2015-8867
7.5The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 incorrectly relies on the deprecated RAND_pseudo_bytes function, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
CVE-2015-8865
7.3The file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5, mishandles continuation-level jumps, which allows context-dependent attackers to cause a denial of service (buffer overflow and application crash) or possibly execute arbitrary code via a crafted magic file.
CVE-2015-8838
5.9ext/mysqlnd/mysqlnd.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 uses a client SSL option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152.
CVE-2015-8835
9.8The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not properly retrieve keys, which allows remote attackers to cause a denial of service (NULL pointer dereference, type confusion, and application crash) or possibly execute arbitrary code via crafted serialized data representing a numerically indexed _cookies array, related to the SoapClient::__call method in ext/soap/soap.c.
CVE-2015-8080
7.5Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.
CVE-2015-7804
6.8Off-by-one error in the phar_parse_zipfile function in ext/phar/zip.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (uninitialized pointer dereference and application crash) by including the / filename in a .zip PHAR archive.
CVE-2015-7803
6.8The phar_get_entry_data function in ext/phar/util.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a .phar file with a crafted TAR archive entry in which the Link indicator references a file that does not exist.
CVE-2015-6838
7.5The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13, when libxml2 before 2.9.2 is used, does not consider the possibility of a NULL valuePop return value before proceeding with a free operation after the principal argument loop, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6837.
CVE-2015-6837
7.5The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13, when libxml2 before 2.9.2 is used, does not consider the possibility of a NULL valuePop return value before proceeding with a free operation during initial error checking, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6838.
CVE-2015-6836
7.3The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.
CVE-2015-6835
9.8The session deserializer in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 mishandles multiple php_var_unserialize calls, which allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted session content.
CVE-2015-6834
9.8Multiple use-after-free vulnerabilities in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 allow remote attackers to execute arbitrary code via vectors related to (1) the Serializable interface, (2) the SplObjectStorage class, and (3) the SplDoublyLinkedList class, which are mishandled during unserialization.
CVE-2015-6833
7.5Directory traversal vulnerability in the PharData class in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to write to arbitrary files via a .. (dot dot) in a ZIP archive entry that is mishandled during an extractTo call.
CVE-2015-6832
7.3Use-after-free vulnerability in the SPL unserialize implementation in ext/spl/spl_array.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to execute arbitrary code via crafted serialized data that triggers misuse of an array field.
CVE-2015-6831
7.3Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.
CVE-2015-6497
8.8The create function in app/code/core/Mage/Catalog/Model/Product/Api/V2.php in Magento Community Edition (CE) before 1.9.2.1 and Enterprise Edition (EE) before 1.14.2.1, when used with PHP before 5.4.24 or 5.5.8, allows remote authenticated users to execute arbitrary PHP code via the productData parameter to index.php/api/v2_soap.
CVE-2015-5590
7.3Stack-based buffer overflow in the phar_fix_filepath function in ext/phar/phar.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large length value, as demonstrated by mishandling of an e-mail attachment by the imap PHP extension.
CVE-2015-5589
9.8The phar_convert_to_other function in ext/phar/phar_object.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 does not validate a file pointer before a close operation, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted TAR archive that is mishandled in a Phar::convertToData call.
CVE-2015-4644
7.5The php_pgsql_meta_data function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not validate token extraction for table names, which might allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1352.
CVE-2015-4643
9.8Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4022.
CVE-2015-4642
9.8The escapeshellarg function in ext/standard/exec.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 on Windows allows remote attackers to execute arbitrary OS commands via a crafted string to an application that accepts command-line arguments for a call to the PHP system function.
CVE-2015-4605
7.5The mcopy function in softmagic.c in file 5.x, as used in the Fileinfo component in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, does not properly restrict a certain offset value, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string that is mishandled by a "Python script text executable" rule.
CVE-2015-4604
7.5The mget function in softmagic.c in file 5.x, as used in the Fileinfo component in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, does not properly maintain a certain pointer relationship, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string that is mishandled by a "Python script text executable" rule.
CVE-2015-4603
9.8The exception::getTraceAsString function in Zend/zend_exceptions.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
CVE-2015-4602
9.8The __PHP_Incomplete_Class function in ext/standard/incomplete_class.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
CVE-2015-4601
9.8PHP before 5.6.7 might allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in (1) ext/soap/php_encoding.c, (2) ext/soap/php_http.c, and (3) ext/soap/soap.c, a different issue than CVE-2015-4600.
CVE-2015-4600
9.8The SoapClient implementation in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in the (1) SoapClient::__getLastRequest, (2) SoapClient::__getLastResponse, (3) SoapClient::__getLastRequestHeaders, (4) SoapClient::__getLastResponseHeaders, (5) SoapClient::__getCookies, and (6) SoapClient::__setCookie methods.
CVE-2015-4599
9.8The SoapFault::__toString method in ext/soap/soap.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information, cause a denial of service (application crash), or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
CVE-2015-4598
6.5PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument save method or (2) the GD imagepsloadfont function, as demonstrated by a filename\0.html attack that bypasses an intended configuration in which client users may write to only .html files.
CVE-2015-4335
10Redis before 2.8.21 and 3.x before 3.0.2 allows remote attackers to execute arbitrary Lua bytecode via the eval command.
CVE-2015-4148
5.0The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that the uri property is a string, which allows remote attackers to obtain sensitive information by providing crafted serialized data with an int data type, related to a "type confusion" issue.
CVE-2015-4147
7.5The SoapClient::__call method in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that __default_headers is an array, which allows remote attackers to execute arbitrary code by providing crafted serialized data with an unexpected data type, related to a "type confusion" issue.
CVE-2015-4116
9.8Use-after-free vulnerability in the spl_ptr_heap_insert function in ext/spl/spl_heap.c in PHP before 5.5.27 and 5.6.x before 5.6.11 allows remote attackers to execute arbitrary code by triggering a failed SplMinHeap::compare operation.
CVE-2015-4026
7.5The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
CVE-2015-4025
7.5PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character in certain situations, which allows remote attackers to bypass intended extension restrictions and access files or directories with unexpected names via a crafted argument to (1) set_include_path, (2) tempnam, (3) rmdir, or (4) readlink. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
CVE-2015-4024
5.0Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote attackers to cause a denial of service (CPU consumption) via crafted form data that triggers an improper order-of-growth outcome.
CVE-2015-4022
7.5Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow.
CVE-2015-4021
5.0The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 does not verify that the first character of a filename is different from the \0 character, which allows remote attackers to cause a denial of service (integer underflow and memory corruption) via a crafted entry in a tar archive.
CVE-2015-3416
7.5The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
CVE-2015-3415
7.5The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement.
CVE-2015-3414
7.5SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement.
CVE-2015-3412
5.3PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension.
CVE-2015-3411
6.5PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument load method, (2) the xmlwriter_open_uri function, (3) the finfo_file function, or (4) the hash_hmac_file function, as demonstrated by a filename\0.xml attack that bypasses an intended configuration in which client users may read only .xml files.
CVE-2015-3330
6.8The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, when the Apache HTTP Server 2.4.x is used, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via pipelined HTTP requests that result in a "deconfigured interpreter."
CVE-2015-3329
7.5Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allow remote attackers to execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive.
CVE-2015-3307
7.5The phar_parse_metadata function in ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (heap metadata corruption) or possibly have unspecified other impact via a crafted tar archive.
CVE-2015-3200
7.5mod_auth in lighttpd before 1.4.36 allows remote attackers to inject arbitrary log entries via a basic HTTP authentication string without a colon character, as demonstrated by a string containing a NULL and new line character.
CVE-2015-3185
4.3The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.
CVE-2015-3184
5.0mod_authz_svn in Apache Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using Apache httpd 2.4.x, does not properly restrict anonymous access, which allows remote anonymous users to read hidden files via the path name.
CVE-2015-3183
5.0The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.
CVE-2015-3152
5.9Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a "BACKRONYM" attack.
CVE-2015-2787
7.5Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages use of the unset function within an __wakeup function, a related issue to CVE-2015-0231.
CVE-2015-2783
5.8ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions.
CVE-2015-2348
5.0The move_uploaded_file implementation in ext/standard/basic_functions.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 truncates a pathname upon encountering a \x00 character, which allows remote attackers to bypass intended extension restrictions and create files with unexpected names via a crafted second argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
CVE-2015-2331
7.5Integer overflow in the _zip_cdir_new function in zip_dirent.c in libzip 0.11.2 and earlier, as used in the ZIP extension in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a ZIP archive that contains many entries, leading to a heap-based buffer overflow.
CVE-2015-2326
5.5The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by "((?+1)(\1))/".
CVE-2015-2325
7.8The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.
CVE-2015-2305
6.8Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.
CVE-2015-2301
7.5Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP before 5.5.22 and 5.6.x before 5.6.6 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted renaming of a Phar archive to the name of an existing file.
CVE-2015-1352
5.0The build_tablename function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP through 5.6.7 does not validate token extraction for table names, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name.
CVE-2015-1351
7.5Use-after-free vulnerability in the _zend_shared_memdup function in zend_shared_alloc.c in the OPcache extension in PHP through 5.6.7 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
CVE-2015-0273
7.5Multiple use-after-free vulnerabilities in ext/date/php_date.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allow remote attackers to execute arbitrary code via crafted serialized input containing a (1) R or (2) r type specifier in (a) DateTimeZone data handled by the php_date_timezone_initialize_from_hash function or (b) DateTime data handled by the php_date_initialize_from_hash function.
CVE-2015-0235
10Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
CVE-2015-0232
6.8The exif_process_unicode function in ext/exif/exif.c in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free and application crash) via crafted EXIF data in a JPEG image.
CVE-2015-0231
7.5Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142.
CVE-2015-0228
5.0The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.
2014(48)
CVE-2014-9912
9.8The get_icu_disp_value_src_php function in ext/intl/locale/locale_methods.c in PHP before 5.3.29, 5.4.x before 5.4.30, and 5.5.x before 5.5.14 does not properly restrict calls to the ICU uresbund.cpp component, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a locale_get_display_name call with a long first argument.
CVE-2014-9767
4.3Directory traversal vulnerability in the ZipArchive::extractTo function in ext/zip/php_zip.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 and ext/zip/ext_zip.cpp in HHVM before 3.12.1 allows remote attackers to create arbitrary empty directories via a crafted ZIP archive.
CVE-2014-9709
5.0The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.
CVE-2014-9705
7.5Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.
CVE-2014-9653
7.5readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file.
CVE-2014-9652
5.0The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file.
CVE-2014-9427
7.5sapi/cgi/cgi_main.c in the CGI component in PHP through 5.4.36, 5.5.x through 5.5.20, and 5.6.x through 5.6.4, when mmap is used to read a .php file, does not properly consider the mapping's length during processing of an invalid file that begins with a # character and lacks a newline character, which causes an out-of-bounds read and might (1) allow remote attackers to obtain sensitive information from php-cgi process memory by leveraging the ability to upload a .php file or (2) trigger unexpected code execution if a valid PHP script is present in memory locations adjacent to the mapping.
CVE-2014-9426
7.3The apprentice_load function in libmagic/apprentice.c in the Fileinfo component in PHP through 5.6.4 attempts to perform a free operation on a stack-based character array, which allows remote attackers to cause a denial of service (memory corruption or application crash) or possibly have unspecified other impact via unknown vectors. NOTE: this is disputed by the vendor because the standard erealloc behavior makes the free operation unreachable
CVE-2014-9425
7.5Double free vulnerability in the zend_ts_hash_graceful_destroy function in zend_ts_hash.c in the Zend Engine in PHP through 5.5.20 and 5.6.x through 5.6.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
CVE-2014-8142
7.5Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys within the serialized properties of an object, a different vulnerability than CVE-2004-1019.
CVE-2014-8109
4.3mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multiple Require directives, as demonstrated by a configuration that specifies authorization for one group to access a certain directory, and authorization for a second group to access a second directory.
CVE-2014-5459
3.6The PEAR_REST class in REST.php in PEAR in PHP through 5.6.0 allows local users to write to arbitrary files via a symlink attack on a (1) rest.cachefile or (2) rest.cacheid file in /tmp/pear/cache/, related to the retrieveCacheFirst and useLocalCache functions.
CVE-2014-5120
6.4gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function.
CVE-2014-4721
2.6The phpinfo implementation in ext/standard/info.c in PHP before 5.4.30 and 5.5.x before 5.5.14 does not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allow context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a "type confusion" vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php.
CVE-2014-4698
4.6Use-after-free vulnerability in ext/spl/spl_array.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted ArrayIterator usage within applications in certain web-hosting environments.
CVE-2014-4670
4.6Use-after-free vulnerability in ext/spl/spl_dllist.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted iterator usage within applications in certain web-hosting environments.
CVE-2014-4049
5.1Heap-based buffer overflow in the php_parserr function in ext/standard/dns.c in PHP 5.6.0beta4 and earlier allows remote servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS TXT record, related to the dns_get_record function.
CVE-2014-3981
3.3acinclude.m4, as used in the configure script in PHP 5.5.13 and earlier, allows local users to overwrite arbitrary files via a symlink attack on the /tmp/phpglibccheck file.
CVE-2014-3710
5.0The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.
CVE-2014-3670
6.8The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted JPEG image with TIFF thumbnail data that is improperly handled by the exif_thumbnail function.
CVE-2014-3669
7.5Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function that triggers calculation of a large length value.
CVE-2014-3668
5.0Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument to the xmlrpc_set_type function or (2) a crafted argument to the xmlrpc_decode function, related to an out-of-bounds read operation.
CVE-2014-3597
6.8Multiple buffer overflows in the php_parserr function in ext/standard/dns.c in PHP before 5.4.32 and 5.5.x before 5.5.16 allow remote DNS servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted DNS record, related to the dns_get_record function and the dn_expand function. NOTE: this issue exists because of an incomplete fix for CVE-2014-4049.
CVE-2014-3587
4.3Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1571.
CVE-2014-3581
5.0The cache_merge_headers_out function in modules/cache/cache_util.c in the mod_cache module in the Apache HTTP Server before 2.4.11 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty HTTP Content-Type header.
CVE-2014-3538
5.0file before 5.19 does not properly restrict the amount of data read during a regex search, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted file that triggers backtracking during processing of an awk rule. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7345.
CVE-2014-3523
5.0Memory leak in the winnt_accept function in server/mpm/winnt/child.c in the WinNT MPM in the Apache HTTP Server 2.4.x before 2.4.10 on Windows, when the default AcceptFilter is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted requests.
CVE-2014-3515
7.5The SPL component in PHP before 5.4.30 and 5.5.x before 5.5.14 incorrectly anticipates that certain data structures will have the array data type after unserialization, which allows remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to "type confusion" issues in (1) ArrayObject and (2) SPLObjectStorage.
CVE-2014-3487
4.3The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate a stream offset, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
CVE-2014-3480
4.3The cdf_count_chain function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate sector-count data, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
CVE-2014-3479
4.3The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, relies on incorrect sector-size data, which allows remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file.
CVE-2014-3478
5.0Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion.
CVE-2014-2497
4.3The gdImageCreateFromXpm function in gdxpm.c in libgd, as used in PHP 5.4.26 and earlier, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted color table in an XPM file.
CVE-2014-2324
5.0Multiple directory traversal vulnerabilities in (1) mod_evhost and (2) mod_simple_vhost in lighttpd before 1.4.35 allow remote attackers to read arbitrary files via a .. (dot dot) in the host name, related to request_check_hostname.
CVE-2014-2323
9.8SQL injection vulnerability in mod_mysql_vhost.c in lighttpd before 1.4.35 allows remote attackers to execute arbitrary SQL commands via the host name, related to request_check_hostname.
CVE-2014-2270
4.3softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.
CVE-2014-2020
5.0ext/gd/gd.c in PHP 5.5.x before 5.5.9 does not check data types, which might allow remote attackers to obtain sensitive information by using a (1) string or (2) array data type in place of a numeric data type, as demonstrated by an imagecrop function call with a string for the x dimension value, a different vulnerability than CVE-2013-7226.
CVE-2014-1943
5.0Fine Free file before 5.17 allows context-dependent attackers to cause a denial of service (infinite recursion, CPU consumption, and crash) via a crafted indirect offset value in the magic of a file.
CVE-2014-0238
5.0The cdf_read_property_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (infinite loop or out-of-bounds memory access) via a vector that (1) has zero length or (2) is too long.
CVE-2014-0237
5.0The cdf_unpack_summary_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (performance degradation) by triggering many file_printf calls.
CVE-2014-0236
7.5file before 5.18, as used in the Fileinfo component in PHP before 5.6.0, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a zero root_storage value in a CDF file, related to cdf.c and readcdf.c.
CVE-2014-0231
5.0The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.
CVE-2014-0226
6.8Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
CVE-2014-0207
4.3The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.
CVE-2014-0185
7.2sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP before 5.4.28 and 5.5.x before 5.5.12 uses 0666 permissions for the UNIX socket, which allows local users to gain privileges via a crafted FastCGI client.
CVE-2014-0118
4.3The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size.
CVE-2014-0117
4.3The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.
CVE-2014-0098
5.0The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.
2013(21)
CVE-2013-7458
3.3linenoise, as used in Redis before 3.2.3, uses world-readable permissions for .rediscli_history, which allows local users to obtain sensitive information by reading the file.
CVE-2013-7456
7.6gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.1.1, as used in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x before 7.0.7, allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted image that is mishandled by the imagescale function.
CVE-2013-7345
5.0The BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.
CVE-2013-7327
6.8The gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 does not check return values, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via invalid imagecrop arguments that lead to use of a NULL pointer as a return value, a different vulnerability than CVE-2013-7226.
CVE-2013-6712
5.0The scan function in ext/date/lib/parse_iso_intervals.c in PHP through 5.5.6 does not properly restrict creation of DateInterval objects, which might allow remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted interval specification.
CVE-2013-6501
4.6The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_sdl function in ext/soap/php_sdl.c.
CVE-2013-6438
5.0The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request.
CVE-2013-6420
7.5The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function.
CVE-2013-5704
5.0The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such."
CVE-2013-4560
5.0Use-after-free vulnerability in lighttpd before 1.4.33 allows remote attackers to cause a denial of service (segmentation fault and crash) via unspecified vectors that trigger FAMMonitorDirectory failures.
CVE-2013-4559
7.6lighttpd before 1.4.33 does not check the return value of the (1) setuid, (2) setgid, or (3) setgroups functions, which might cause lighttpd to run as root if it is restarted and allows remote attackers to gain privileges, as demonstrated by multiple calls to the clone function that cause setuid to fail when the user process limit is reached.
CVE-2013-4508
7.5lighttpd before 1.4.34, when SNI is enabled, configures weak SSL ciphers, which makes it easier for remote attackers to hijack sessions by inserting packets into the client-server data stream or obtain sensitive information by sniffing the network.
CVE-2013-4365
7.5Heap-based buffer overflow in the fcgid_header_bucket_read function in fcgid_bucket.c in the mod_fcgid module before 2.3.9 for the Apache HTTP Server allows remote attackers to have an unspecified impact via unknown vectors.
CVE-2013-4352
4.3The cache_invalidate function in modules/cache/cache_storage.c in the mod_cache module in the Apache HTTP Server 2.4.6, when a caching forward proxy is enabled, allows remote HTTP servers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger a missing hostname value.
CVE-2013-4248
4.3The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
CVE-2013-4113
6.8ext/xml/xml.c in PHP before 5.3.27 does not properly consider parsing depth, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted document that is processed by the xml_parse_into_struct function.
CVE-2013-3735
7.5The Zend Engine in PHP before 5.4.16 RC1, and 5.5.0 before RC2, does not properly determine whether a parser error occurred, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted function definition, as demonstrated by an attack within a shared web-hosting environment. NOTE: the vendor's http://php.net/security-note.php page says "for critical security situations you should be using OS-level security by running multiple web servers each as their own user id.
CVE-2013-2765
5.0The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header.
CVE-2013-2220
7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
CVE-2013-0942
4.3Cross-site scripting (XSS) vulnerability in EMC RSA Authentication Agent 7.1 before 7.1.1 for Web for Internet Information Services, and 7.1 before 7.1.1 for Web for Apache, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CVE-2013-0941
2.1EMC RSA Authentication API before 8.1 SP1, RSA Web Agent before 5.3.5 for Apache Web Server, RSA Web Agent before 5.3.5 for IIS, RSA PAM Agent before 7.0, and RSA Agent before 6.1.4 for Microsoft Windows use an improper encryption algorithm and a weak key for maintaining the stored data of the node secret for the SecurID Authentication API, which allows local users to obtain sensitive information via cryptographic attacks on this data.
2012(6)
CVE-2012-6708
6.1jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
CVE-2012-5533
5.0The http_request_split_value function in request.c in lighttpd before 1.4.32 allows remote attackers to cause a denial of service (infinite loop) via a request with a header containing an empty token, as demonstrated using the "Connection: TE,,Keep-Alive" header.
CVE-2012-4360
4.3Cross-site scripting (XSS) vulnerability in the mod_pagespeed module 0.10.19.1 through 0.10.22.4 for the Apache HTTP Server allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CVE-2012-4001
5.0The mod_pagespeed module before 0.10.22.6 for the Apache HTTP Server does not properly verify its host name, which allows remote attackers to trigger HTTP requests to arbitrary hosts via unspecified vectors, as demonstrated by requests to intranet servers.
CVE-2012-3526
5.0The reverse proxy add forward module (mod_rpaf) 0.5 and 0.6 for the Apache HTTP Server allows remote attackers to cause a denial of service (server or application crash) via multiple X-Forwarded-For headers in a request.
CVE-2012-1171
5.0The libxml RSHUTDOWN function in PHP 5.x allows remote attackers to bypass the open_basedir protection mechanism and read arbitrary files via vectors involving a stream_close method call during use of a custom stream wrapper.
2011(4)
CVE-2011-4969
4.3Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using location.hash to select elements, allows remote attackers to inject arbitrary web script or HTML via a crafted tag.
CVE-2011-4718
6.8Session fixation vulnerability in the Sessions subsystem in PHP before 5.5.2 allows remote attackers to hijack web sessions by specifying a session ID.
CVE-2011-2688
7.5SQL injection vulnerability in mysql/mysql-auth.pl in the mod_authnz_external module 3.2.5 and earlier for the Apache HTTP Server allows remote attackers to execute arbitrary SQL commands via the user field.
CVE-2011-1176
4.3The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk Multi-Processing Module 2.2.11-01 and 2.2.11-02 for the Apache HTTP Server does not properly handle certain configuration sections that specify NiceValue but not AssignUserID, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.
2009(6)
CVE-2009-3767
4.3libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
CVE-2009-3766
6.8mutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when OpenSSL is used, does not verify the domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
CVE-2009-3765
6.8mutt_ssl.c in mutt 1.5.19 and 1.5.20, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
CVE-2009-2299
5.0The Artofdefence Hyperguard Web Application Firewall (WAF) module before 2.5.5-11635, 3.0 before 3.0.3-11636, and 3.1 before 3.1.1-11637, a module for the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via an HTTP request with a large Content-Length value but no POST data.
CVE-2009-1390
6.8Mutt 1.5.19, when linked against (1) OpenSSL (mutt_ssl.c) or (2) GnuTLS (mutt_ssl_gnutls.c), allows connections when only one TLS certificate in the chain is accepted instead of verifying the entire chain, which allows remote attackers to spoof trusted servers via a man-in-the-middle attack.
CVE-2009-0796
2.6Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote attackers to inject arbitrary web script or HTML via the URI.
2007(2)
CVE-2007-4723
7.5Directory traversal vulnerability in Ragnarok Online Control Panel 4.3.4a, when the Apache HTTP Server is used, allows remote attackers to bypass authentication via directory traversal sequences in a URI that ends with the name of a publicly available page, as demonstrated by a "/...../" sequence and an account_manage.php/login.php final component for reaching the protected account_manage.php page.
CVE-2007-3205
5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.
2006(1)
CVE-2006-20001
7.5A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier.

OpenPorts

2111315171920212223242526373843495153656670798081828384858687889091929394959697989910010110210410611011111311912114315416117517717918018919019219519921122122222523424326326428531131434034334738538940042744044144244344444644744844945045145245346146246548048548748849150250351351552254154855455555658759160263163263664666667568568970074377177277778278578980080180580680880981183083183283384385387388088588688788890294394795399099299399499599899910001002101210131022102310241026102710281029105010631080109911031110111111191153116711801181118811901193119511981200120712341235125012831290129112921293131113371343134413551364136513661370137713871388140014141433144414461447145014511452145314541455145614571458145914601471149415001521155415571577158815991604160516501660170017231741180118201830183318831901191119251926193519471950195119521953195519561957195819591960196219641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199020002001200220032006200820102012201620182020202120222030203120482049205020512052205320542055205620572058205920602061206320642065206620672068206920702072207720782079208020812082208320852086208720902091209520962100210121032107210821092111212121222126213021332134215021542156218121952196220022012202220922102211222022212222222322242225222622322233224822502259226622712323232723322344234523512352235323622375237623792382240424232435244324442453245525062525254825492550255125522553255425552556255725582559256025612562256325662567256825692570257225982599260126022626262826502701270927612762280628502985299530003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022303030423047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003211322132563260326832693270329933013306330733103311333733413342334533493352336533883389339034003401340234033404340534063407340834093410341234433479349835003503351035213522352335243530353135403541354235483549355035513552355335543555355635573558355935603561356235633566356735683569357035723580359036223689369037493780379037913792379337943838384138423910392239503951395239533954400040014002401040214022402340404042404340634064407240804085409541004101410341044117411841204147414841504155415941604165417241904200424242434244425042824300432143334344436944004401440244314432443344344435443644374438443944404443444544474449445144554457445944614463446644774482448844994500450245064510452045234524452845304531454345454550456745724602462046434646466447004734474747824786480848214840484848994911493349494993499950005001500250035004500550065007500950105011502250255051505350615070508050835089509050935100510551195120512251235130513551405150516051725180519052015209522252235224522552265227522852295230523152325233523452355236523752385239524052415242524352445245524652475248524952505251525252535254525552565257525852595260526152625263526452655266526752685269527052715272527352745275527652775278527952805321535153575400543154325433543554395440544354445446545454565494549555005503552355425543554455525555555655575558556055675568556955905591559255935594559555965597559855995600560156025603560456055606560756085609561356145620563056405650566056715673567856805696569857015721580058015804582258535858590059015902590359045905590659075908590959105911591259135914591559165917591859195920593859845985598659875988598959905991599259935994599559965997599859996000600160026003600460056006600760086009601060116020602160226036605060606061607060806081610061026134616162626264630863316348635263636379640064056433644064436482648865006503650565106511651265136514654365446550655665606561656565806581658865906600660166026603660566226633665066536661666266646666666766686686668866976699670067486755677567796789679968876955699870007001700270037004700570067007701070117012701370147015701670187020702170227025705070577070707170787079708070817082708370847085708670877088709071007102710571707171717271737218727272837302732573317348734973737401740374337434744174437444744574657473747474807493750075107535753775477548760176037634765476577676768777007771777377747775777677777778777977807782778877907799780178227878788779007946797979807989799879998000800180028003800480058006800780088009801080118012801380148015801680178018801980208021802280238024802580268027802880298030803180328033803480358036803780388039804080418042804380448045804680478048804980508051805280538054805580568057805880598060806180628063806480658066806780688069807080718072807380748075807680778078807980808081808280838084808580868087808980908091809280938094809580968097809880998100810181028103810481058106810781088109811081118112811381148115811681178118812081218122812381248125812681288129813081318132813381348135813681378138813981408141814281438144814581468147814881498150815181528153815481558156815781588159816081618162816381648165816681678168816981708171817281738174817581768177817881798180818181828183818481858186818781888189819081918192819381948195819681978198819982008203822282308236823782388239824182438248824982508251825282808282828382848285829183008315831683178318831983228333833483408343835083818382838483858388839384018402840384048405840684078408840984108411841284138414841584168417841884198420842184238424842584268427842884298430843184328433843484358436844084418442844384448445844684478448844984508451845284538454845584568457845884598460846184628463846484658467847084728473847584808481848284848485848884938494850085018502850385048505850685108513851485158519852085218523852485258526852885298530853185338536854085438544854585488549855085518553855485568557855885608561856285638564856585668567856885698570857185738574857585768577857885798580858185828583858485858586858785888589859085918592859385948595859685978598859986008601860286058606860786218622862386308637864086418643864986638666868086868700870187028703870487058706870787088709872387248728873187328733874387458764876587668767877187798782878487878788878987908791880088018802880388048805880688078808880988108811881288138814881588168817881888198820882188228823882488258826882788288829883088318832883388348835883688378838883988408841884288438844884588468847884888498850885188528853885488558856885788588859886088618862886388648865886688678868886988708871887288738874887588768877887888798880888188828883888488858886888788888889889088918899890089018902890689078908891089118912891389158916893589438969898089888989899089918993899990009001900290039004900590069007900890099010901190129013901490159016901790189019902090219022902390249025902690279028902990329033903490359036903790389039904090419042904390449045904690479048904990509051905290539054905590569057905890599060906190629063906490659066906790689069907090719072907390749075907690779078907990809081908290839084908590869087908890899090909190929093909490959096909790999100910191029103910491059106910791089109911091119112911391149115911691179118911991209121912291239124912591269127912891299130913191329133913491359136913791389139914091419142914391449145914691479148914991509151915291539154915591569157915891599160916191629163916491659166916791689169917091719172917391759176917791789179918091819182918391849185918691879188918991909191919291939194919591969197919891999200920192029203920492059206920792089209921092119212921392149215921692179218921992209221922292239226923092369241924292439244924592469247924892499250925192529253925692579273928092839289929192929295929993009301930393049305930693079308930993109311931293139315933393459350935193539376938393879389939393989399940094109418944194439444944594469447945494559456945894659480948895009501950595079510951395159527952995309532955095539595960096069611965896639674968296909696970097049710971197349743975497589761976597739779979798009802980398049810981198619869987298769885988898989899990099019902990899099916991899199922992399269928992999309939994399449950995599669977998199909991999299939994999799989999100001000110002100031000410005100061000710008100091001010011100121001310014100151001610017100181001910020100211002210023100241002510026100271002810029100301003110032100331003410035100361003710038100391004010041100421004310044100451004610047100481004910050100511005210065100661006810071100751008010081100821008310084100861008710089100901009310100101011010610123101801018110200102011020510209102101022510240102431024910250102511025410255102561028310302103241034810380103901039310397103981039910443104441044510477104801053310554108101089210894109091091110933109341093510936109431100011001110021100711027110651107511082110841110111110111111111211180111821118411210112111128811300113711140111434114431148011481115961160111602116801168111688117011192012000120011201612019120561208212084120881210112103121041210512107121081210912110121111211212113121141211512116121171211812119121201212112122121231212412125121261212712128121291213012131121321213312134121351213612137121381213912140121411214212143121441214512146121471214812149121501215112152121531215412155121561215712158121591216012161121621216312164121651216612167121681216912170121711217212173121741217512176121771217812179121801218112182121831218412185121861218712188121891219012191121921219312194121951219612197121981219912200122011220212203122041220512206122071220812209122101221112212122131221412215122161221712218122191222012221122221222312224122251222612227122281222912230122311223212233122341223512236122371223812239122401224112242122431224412245122461224712248122491225012251122531225412255122561225712258122591226012261122621226312264122651226612267122681226912270122711227212273122741227512276122781227912280122811228212283122841228512286122871228812289122901229112292122931229412295122961229712298122991230012301123021230312304123051230612307123081230912310123111231212313123141231512316123171231812319123201232212323123241232512326123271232812330123311233212333123341233512336123371233812339123401234112342123431234412345123461234712348123491235012351123521235312354123551235612357123581235912360123611236212363123641236512366123671236812369123701237112372123731237412375123761237712378123791238012381123821238312384123851238612387123881238912390123911239212393123941239512396123971239812399124001240112402124031240412405124061240712408124091241012411124121241312414124151241612417124181241912420124211242212423124241242512426124271242812429124301243112432124331243412435124361243712438124391244012441124421244312444124451244612447124481244912450124511245212453124541245512456124571245812459124601246112462124631246412465124661246712468124691247012471124721247312474124751247612477124781247912480124811248212483124841248512486124871248812489124901249112492124931249412495124961249712498124991250012501125021250312504125051250612507125081250912510125111251212513125141251512516125171251812519125201252112522125231252412525125271252812529125301253112532125331253412535125361253712538125391254012542125431254412545125461254712548125491255012551125521255312554125551255612557125581255912560125611256212563125641256512566125671256812569125701257112572125731257412575125761257712578125791258012581125821258312584125851258612587125881258912590126011261512902129801300013001130471308213084131281322813333133801344313579137801400614024140261408214084141011410414130141471418214184142651433014400144011440214403144041440614407144431452314524148251487314875148801489414895148961489714900149011490314905149091500015001150021500615018150381504015042150441508215084151231515115443155021550315504155551558815672156731583116000160011600216003160041600516006160071600816009160101601116012160131601416015160161601716018160191602016021160221602316024160251602616027160281602916030160311603216033160341603516036160371603816039160401604116042160431604416045160461604716048160491605016051160521605316054160551605616057160581605916060160611606216063160641606516066160671606816069160701607116072160731607416075160761607716078160791608016081160821608316084160851608616087160881608916090160911609216093160941609516096160971609816099161001610116102161031631116316164001640116402164031640416443164641660116666166671680016831168881699216993170001700117010170201707017082170841710017102171821718417443177701777117772177731777417775177761777717778177791778018000180011800218004180051800618007180081800918010180111801218013180141801518016180171801818019180201802118022180231802418025180261802718028180291803018031180321803318034180351803618037180381803918040180411804218043180441804518046180471804818049180501805118052180531805418055180561805718058180591806018061180621806318064180651806618067180681806918070180711807218073180741807518076180771807818079180801808118082180831808418085180861808718088180891809018091180921809318094180951809618097180981809918100181011810218103181041810518106181071810818109181101811118112181131818218200182251823918245182641836818443185531855618765188021888819000190131901419015190161901719022190711908019082190841909019091191001920019222192331944319776199021993019998199992000020001200102001820020200302004020050200532006020070200802008220084200872009020100201062010720110201212015020151201822018420185202002020120202202082025620325204402044320500205122054720600208002088020892208942090021002210252102721081210822108321084211002120021230212312123221233212342123521236212372123821239212402124121242212432124421245212462124721248212492125021251212522125321254212552125621257212582125921260212612126221263212642126521266212672126821269212702127121272212732127421275212762127721278212792128021281212822128321284212852128621287212882128921290212912129221293212942129521296212972129821299213002130121302213032130421305213062130721308213092131021311213122131321314213152131621317213182131921320213212132221323213242132521326213272132821329213302135721379213812140021443215002151521935220002200122022220672206922070220822208422103221072220622222223452238022403225562270322705230232308223084231282318223184234242408224084241812424524442244722451024808250002500125002250032500425005250062500725009250102508225084251052556525782259522665626657270152701627017270362710527571280012801528017280802844328818297982979929840298423000030001300023000330004300053000630007300083000930010300113001330015300173001930021300223002330025300273002930050300833010130104301063011030111301123011330120301213012230123302223030130303303223042230444304523046830473304793050130522306223070030701307223082230892308943092231001310173102231122312103122231322313373138031422314433144431522316223172231822319223200132022320803210132102321223220232222323033232232400324223244332444325223262232722327463276432800328223292233022330603312233222333223333833389334223362233722338223392234022341223422234225343223442234500345223462234722348223492235000350023500435022351003510135122351533522235240352413525035251353223552235524355313555935560356223572235822359223602236122362223632236422365013650536722368223692236982369833698437022370803712237215372223732237443375223762237722377773782238022380803812238222383223833338520385223872238822388803892239001390223922239322394223952239622397224000040001400054002240029400704009940322404714052240892408944122241443415224179441800418224192242122422084223542420424224242442443429014300843009430804320043221440214410044158442224430044301443024430344304443054430644307443084430944310443204433244333443344433644337443404434544350443654439944400444104442044444445004451044520448184500045001450024500345005450064502245039451114533345444455554566645667456684567745777457864578845821458864588845922460004600146443468624700047001470804753447722478084782247922479844798947990480004800148002480124801348018480194802048022481004822248322484224852248888488894889949022490804912149152492004921049443495014950249592496824968449686496884969049692496944976750000500015000250003500045000550006500075000850009500105001150012500135001450022500425005050070500735008050085501005010150102501035010450105501065010750113501225016050202502575044350500505805077750805509955099650997509985099951000510015100251004510055100751106512005120151235512945143451443520105202252200522305231152536528695288152931529515302253200534005341353480534815348253483534845348553490538055380654022541385432754490545455485754922549845500055022550555508055081552005522255350553885542255442554435547055475554815549055522555535555455555557225702257522577785777957780577815778257783577845778557786577875778857822579225800058122582225832258378583925842258443585225853258585586035872258822589225901259022591225922259322594435952260000600016001060021600236003060099601296123461613616166161761619620166207862080622376244362865630456321063256632606344363676644776467164683650006500465432
2 / tcp
-98713449 | 2025-03-29T02:50:58.275766
11 / tcp
-98713449 | 2025-03-31T13:20:22.023058
13 / tcp
-98713449 | 2025-03-31T05:51:30.810417
15 / tcp
-98713449 | 2025-03-31T18:48:39.130038
17 / tcp
-98713449 | 2025-03-31T13:05:57.534539
19 / tcp
-2031469209 | 2025-03-31T15:41:42.789727
20 / tcp
-2031469209 | 2025-03-29T09:30:38.109871
21 / tcp
-1027545997 | 2025-03-31T13:04:08.057540
22 / tcp
2138751412 | 2025-03-31T13:40:09.322661
23 / tcp
-1451107405 | 2025-03-31T22:53:17.884496
24 / tcp
-2031469209 | 2025-03-29T03:32:19.185853
25 / tcp
786525225 | 2025-03-31T21:12:33.744334
26 / tcp
102623024 | 2025-03-31T08:06:13.991043
37 / tcp
-98713449 | 2025-03-29T13:26:09.079090
38 / tcp
-2031469209 | 2025-03-28T12:45:18.913792
43 / tcp
-2031469209 | 2025-03-31T20:44:44.590018
49 / tcp
-98713449 | 2025-03-31T16:13:31.049430
51 / tcp
-2031469209 | 2025-03-28T07:17:27.643912
53 / tcp
-98713449 | 2025-03-31T21:24:27.042801
65 / tcp
-98713449 | 2025-03-29T18:36:07.003942
66 / tcp
-98713449 | 2025-03-29T09:31:08.327066
70 / tcp
-2031469209 | 2025-03-31T15:43:30.737862
79 / tcp
-2031469209 | 2025-03-31T13:43:45.104258
80 / tcp
0 | 2025-04-01T00:00:03.869428
81 / tcp
-488469797 | 2025-03-31T21:55:39.028324
82 / tcp
-207704745 | 2025-03-31T15:51:59.864696
83 / tcp
-207704745 | 2025-03-31T12:56:54.629232
84 / tcp
870917816 | 2025-03-31T14:09:52.656199
85 / tcp
-1805871619 | 2025-03-29T05:11:02.006392
86 / tcp
1638073473 | 2025-03-29T02:49:45.313596
87 / tcp
777756849 | 2025-03-28T13:50:41.825885
88 / tcp
-488469797 | 2025-03-29T09:58:50.595914
90 / tcp
-1344134987 | 2025-03-29T02:22:32.091075
91 / tcp
-2031469209 | 2025-03-29T18:26:51.355856
92 / tcp
-98713449 | 2025-03-29T17:18:55.493765
93 / tcp
-2031469209 | 2025-03-28T05:47:52.137816
94 / tcp
-2031469209 | 2025-03-29T18:40:52.396098
95 / tcp
-2031469209 | 2025-03-29T19:17:37.373790
96 / tcp
-98713449 | 2025-03-29T03:31:10.755205
97 / tcp
-2031469209 | 2025-03-29T02:28:17.047113
98 / tcp
-98713449 | 2025-03-29T01:00:19.841960
99 / tcp
-98713449 | 2025-03-29T08:16:21.207278
100 / tcp
-2031469209 | 2025-03-29T13:59:51.612007
101 / tcp
-98713449 | 2025-03-28T11:08:01.179127
102 / tcp
-1091575315 | 2025-03-31T23:28:36.375628
104 / tcp
-98713449 | 2025-03-31T18:29:39.314172
106 / tcp
-98713449 | 2025-03-28T22:12:05.365765
110 / tcp
-776469200 | 2025-03-31T13:56:34.606686
111 / tcp
-98713449 | 2025-03-31T14:57:04.084575
113 / tcp
-2031469209 | 2025-03-31T17:41:11.141205
119 / tcp
-98713449 | 2025-04-01T00:12:12.590556
121 / tcp
-2031469209 | 2025-03-29T15:46:10.168394
143 / tcp
-1687578356 | 2025-03-31T16:58:57.609912
154 / tcp
-2031469209 | 2025-03-28T05:55:02.324270
161 / udp
-289893565 | 2025-03-25T17:16:12.968806
175 / tcp
-98713449 | 2025-03-31T18:44:47.549632
177 / tcp
-98713449 | 2025-03-29T01:45:25.609444
179 / tcp
-98713449 | 2025-03-29T07:47:55.522298
180 / tcp
-98713449 | 2025-03-29T15:10:05.561996
189 / tcp
-2031469209 | 2025-03-28T22:13:03.403471
190 / tcp
-98713449 | 2025-03-28T11:49:38.304566
192 / tcp
-98713449 | 2025-03-29T01:24:52.566763
195 / tcp
-2031469209 | 2025-03-31T13:59:10.115096
199 / tcp
-98713449 | 2025-03-29T05:07:54.722785
211 / tcp
-2031469209 | 2025-03-29T15:06:21.882493
221 / tcp
-98713449 | 2025-03-29T02:32:26.181043
222 / tcp
2076594265 | 2025-03-29T08:11:20.323431
225 / tcp
-2031469209 | 2025-03-29T11:15:31.659823
234 / tcp
-2031469209 | 2025-03-29T04:21:34.656187
243 / tcp
-98713449 | 2025-03-29T04:08:09.080613
263 / tcp
-98713449 | 2025-03-28T09:17:25.856537
264 / tcp
-98713449 | 2025-03-31T23:19:40.654565
285 / tcp
-2031469209 | 2025-03-29T15:51:28.016729
311 / tcp
1094048410 | 2025-03-31T20:24:15.100399
314 / tcp
-2031469209 | 2025-03-28T12:42:38.857140
340 / tcp
-98713449 | 2025-03-29T13:14:42.906164
343 / tcp
-2031469209 | 2025-03-29T11:21:22.851408
347 / tcp
-2031469209 | 2025-03-28T02:40:23.795847
385 / tcp
-98713449 | 2025-03-29T13:44:19.031910
389 / tcp
-98713449 | 2025-03-31T22:51:57.552167
400 / tcp
-2031469209 | 2025-03-29T16:03:16.935113
427 / tcp
-1453395553 | 2025-03-31T17:53:52.926305
440 / tcp
-98713449 | 2025-03-29T14:27:50.335958
441 / tcp
-2031469209 | 2025-03-29T13:18:05.315540
442 / tcp
-98713449 | 2025-03-29T17:22:37.057735
443 / tcp
1055507059 | 2025-03-31T19:05:35.211525
444 / tcp
-771463154 | 2025-03-31T20:55:34.687834
446 / tcp
-2031469209 | 2025-03-29T17:13:10.682174
447 / tcp
-98713449 | 2025-03-29T10:12:29.817846
448 / tcp
-98713449 | 2025-03-29T20:25:43.098579
449 / tcp
-2031469209 | 2025-03-29T17:29:53.640919
450 / tcp
-2031469209 | 2025-03-29T14:59:05.787088
451 / tcp
-2031469209 | 2025-03-29T09:38:05.960652
452 / tcp
-98713449 | 2025-03-28T11:03:13.529521
453 / tcp
-98713449 | 2025-03-29T14:21:41.446445
461 / tcp
-98713449 | 2025-03-28T05:51:42.511600
462 / tcp
-2031469209 | 2025-03-28T21:51:33.750447
465 / tcp
-98713449 | 2025-03-31T22:58:44.459532
480 / tcp
-98713449 | 2025-03-29T12:12:16.803409
485 / tcp
-2031469209 | 2025-03-29T17:54:03.764150
487 / tcp
-98713449 | 2025-03-28T05:24:37.912234
488 / tcp
-98713449 | 2025-03-29T17:41:46.502787
491 / tcp
-98713449 | 2025-03-29T02:48:29.114136
502 / tcp
-236382233 | 2025-03-31T17:22:25.827266
503 / tcp
-2031469209 | 2025-04-01T00:58:33.203117
513 / tcp
-98713449 | 2025-03-29T02:39:21.065497
515 / tcp
-98713449 | 2025-03-31T19:36:02.303449
522 / tcp
-98713449 | 2025-03-29T19:35:51.422237
541 / tcp
-98713449 | 2025-03-31T14:59:26.393926
548 / tcp
-2031469209 | 2025-03-31T21:04:32.509591
554 / tcp
-2031469209 | 2025-03-31T17:29:19.280734
555 / tcp
-2031469209 | 2025-03-29T15:36:56.251378
556 / tcp
-2031469209 | 2025-03-29T08:22:23.464860
587 / tcp
-2031469209 | 2025-03-29T16:56:29.565348
591 / tcp
-2031469209 | 2025-03-29T09:10:16.813493
602 / tcp
-98713449 | 2025-03-29T10:12:40.586781
631 / tcp
998037014 | 2025-03-31T13:16:37.780306
632 / tcp
998037014 | 2025-03-28T21:42:16.297511
636 / tcp
998037014 | 2025-03-31T22:56:32.384703
646 / tcp
998037014 | 2025-03-29T08:48:42.471580
666 / tcp
-98713449 | 2025-03-28T21:41:21.228127
675 / tcp
-98713449 | 2025-03-29T14:55:54.863573
685 / tcp
-2031469209 | 2025-03-29T03:36:57.308279
689 / tcp
-98713449 | 2025-03-29T13:34:47.843470
700 / tcp
-98713449 | 2025-03-29T05:14:24.680593
743 / tcp
-2031469209 | 2025-03-29T11:46:49.330747
771 / tcp
-98713449 | 2025-03-31T19:08:12.908245
772 / tcp
-98713449 | 2025-03-29T21:16:28.726069
777 / tcp
-2031469209 | 2025-03-29T19:53:49.037426
782 / tcp
-2031469209 | 2025-03-28T23:38:11.727084
785 / tcp
-98713449 | 2025-03-29T19:51:42.881271
789 / tcp
-98713449 | 2025-03-29T09:34:48.016285
800 / tcp
-2031469209 | 2025-03-29T01:41:13.403852
801 / tcp
-2031469209 | 2025-03-29T16:46:27.385699
805 / tcp
-98713449 | 2025-03-28T11:46:00.712686
806 / tcp
-98713449 | 2025-03-28T19:26:43.223175
808 / tcp
-2031469209 | 2025-03-29T13:48:41.428731
809 / tcp
-2031469209 | 2025-03-29T12:16:34.038754
811 / tcp
-2031469209 | 2025-03-24T09:39:47.626573
830 / tcp
-2031469209 | 2025-03-29T18:04:52.919140
831 / tcp
-2031469209 | 2025-03-29T09:04:53.524280
832 / tcp
-98713449 | 2025-03-28T22:35:05.425582
833 / tcp
-2031469209 | 2025-03-29T08:09:05.606214
843 / tcp
-2031469209 | 2025-03-29T20:05:19.142196
853 / tcp
-98713449 | 2025-03-29T04:34:05.757398
873 / tcp
-2031469209 | 2025-03-28T14:53:08.098897
880 / tcp
-98713449 | 2025-03-29T03:02:36.828595
885 / tcp
-98713449 | 2025-03-29T10:10:30.341550
886 / tcp
-98713449 | 2025-03-29T13:00:52.676638
887 / tcp
-98713449 | 2025-03-29T22:12:51.376089
888 / tcp
-98713449 | 2025-03-28T11:16:31.750477
902 / tcp
-2031469209 | 2025-03-31T13:39:08.029335
943 / tcp
-98713449 | 2025-03-28T02:14:39.136147
947 / tcp
-98713449 | 2025-03-28T16:59:00.904313
953 / tcp
-98713449 | 2025-03-28T02:02:46.962912
990 / tcp
-2031469209 | 2025-03-28T02:55:48.553626
992 / tcp
-2031469209 | 2025-03-31T21:50:19.092623
993 / tcp
-98713449 | 2025-03-31T11:34:30.158192
994 / tcp
-98713449 | 2025-03-28T19:18:44.134741
995 / tcp
-2031469209 | 2025-03-29T20:48:32.927440
998 / tcp
-2031469209 | 2025-03-29T11:32:04.825062
999 / tcp
-98713449 | 2025-03-29T11:18:38.575206
1000 / tcp
-98713449 | 2025-03-29T09:19:20.864497
1002 / tcp
-2031469209 | 2025-03-29T20:03:58.598916
1012 / tcp
-2031469209 | 2025-03-28T18:21:34.308868
1013 / tcp
-98713449 | 2025-03-29T00:27:41.620055
1022 / tcp
-2031469209 | 2025-03-29T19:08:33.171550
1023 / tcp
469851863 | 2025-03-31T20:45:19.110592
1024 / tcp
-98713449 | 2025-03-29T18:40:31.002568
1026 / tcp
-1723522812 | 2025-03-29T13:07:53.787091
1027 / tcp
-98713449 | 2025-03-29T18:52:42.838020
1028 / tcp
-98713449 | 2025-03-29T18:12:04.775468
1029 / tcp
-98713449 | 2025-03-29T20:22:18.878221
1050 / tcp
-98713449 | 2025-03-29T14:06:22.577046
1063 / tcp
-98713449 | 2025-03-29T21:09:51.513800
1080 / tcp
1121074672 | 2025-03-31T19:40:01.439352
1099 / tcp
213650225 | 2025-03-29T12:28:02.909471
1103 / tcp
-98713449 | 2025-03-28T10:03:31.267955
1110 / tcp
-2031469209 | 2025-03-29T16:28:39.327716
1111 / tcp
-98713449 | 2025-03-29T11:00:53.954947
1119 / tcp
-98713449 | 2025-03-29T08:53:03.630301
1153 / tcp
-98713449 | 2025-03-31T16:05:37.467139
1167 / tcp
-2031469209 | 2025-03-29T08:56:52.727822
1180 / tcp
-2031469209 | 2025-03-29T07:57:00.012019
1181 / tcp
-2031469209 | 2025-03-28T15:09:12.101317
1188 / tcp
-2031469209 | 2025-03-29T16:27:09.401149
1190 / tcp
-2031469209 | 2025-03-29T05:23:45.858669
1193 / tcp
-98713449 | 2025-03-29T12:41:10.015133
1195 / tcp
-98713449 | 2025-03-29T18:49:57.866310
1198 / tcp
-98713449 | 2025-03-29T13:40:46.976610
1200 / tcp
-98713449 | 2025-03-31T09:31:37.601972
1207 / tcp
-2031469209 | 2025-03-22T05:00:00.446462
1234 / tcp
-597069886 | 2025-03-31T11:50:09.044663
1235 / tcp
-2031469209 | 2025-03-28T23:14:47.092729
1250 / tcp
-2031469209 | 2025-03-29T13:45:28.471381
1283 / tcp
-98713449 | 2025-03-29T15:38:03.211412
1290 / tcp
-2031469209 | 2025-03-28T15:19:12.923636
1291 / tcp
-2031469209 | 2025-03-28T14:55:06.022893
1292 / tcp
-2031469209 | 2025-03-29T03:41:50.367232
1293 / tcp
-98713449 | 2025-03-29T20:26:33.871008
1311 / tcp
-98713449 | 2025-03-31T20:59:04.999450
1337 / tcp
-1622420804 | 2025-04-01T00:33:52.672366
1343 / tcp
-2031469209 | 2025-03-29T09:34:27.238399
1344 / tcp
-98713449 | 2025-03-29T14:13:56.419921
1355 / tcp
-98713449 | 2025-03-29T18:02:26.677818
1364 / tcp
-2031469209 | 2025-03-29T11:46:13.617972
1365 / tcp
-98713449 | 2025-03-28T04:31:19.799970
1366 / tcp
-2031469209 | 2025-03-23T00:47:36.299551
1370 / tcp
-98713449 | 2025-03-29T04:48:26.597593
1377 / tcp
-98713449 | 2025-03-28T11:20:05.837357
1387 / tcp
-98713449 | 2025-03-28T11:27:39.549641
1388 / tcp
-98713449 | 2025-03-29T19:57:41.877757
1400 / tcp
-98713449 | 2025-03-31T14:52:21.163500
1414 / tcp
-98713449 | 2025-03-28T12:45:35.594176
1433 / tcp
1339473574 | 2025-04-01T00:53:13.942686
1444 / tcp
-2031469209 | 2025-03-29T20:47:29.474367
1446 / tcp
-98713449 | 2025-03-29T02:09:25.467585
1447 / tcp
-98713449 | 2025-03-29T09:28:20.507474
1450 / tcp
-98713449 | 2025-03-29T03:22:52.847901
1451 / tcp
-2031469209 | 2025-03-31T21:12:42.932262
1452 / tcp
-98713449 | 2025-03-29T19:55:22.069256
1453 / tcp
-98713449 | 2025-03-29T03:13:13.236477
1454 / tcp
-2031469209 | 2025-03-29T17:48:30.005340
1455 / tcp
-98713449 | 2025-03-29T17:20:43.638630
1456 / tcp
-98713449 | 2025-03-29T09:52:02.478886
1457 / tcp
-98713449 | 2025-03-29T01:56:35.068984
1458 / tcp
-98713449 | 2025-03-29T14:55:18.602532
1459 / tcp
-2031469209 | 2025-03-29T13:01:02.009687
1460 / tcp
-2031469209 | 2025-03-29T15:08:30.378700
1471 / tcp
-98713449 | 2025-03-27T07:42:50.972525
1494 / tcp
-98713449 | 2025-03-29T21:15:32.517749
1500 / tcp
-98713449 | 2025-03-29T10:34:20.808902
1521 / tcp
-98713449 | 2025-03-31T15:41:49.901030
1554 / tcp
-98713449 | 2025-03-29T19:29:37.824391
1557 / tcp
-2031469209 | 2025-03-29T10:24:40.241563
1577 / tcp
-2031469209 | 2025-03-29T20:15:26.766289
1588 / tcp
-2031469209 | 2025-03-22T22:40:55.425880
1599 / tcp
-98713449 | 2025-03-28T09:18:47.052089
1604 / tcp
-98713449 | 2025-03-31T13:48:27.859953
1605 / tcp
-2031469209 | 2025-03-28T08:48:26.787915
1650 / tcp
-98713449 | 2025-03-29T04:26:49.759301
1660 / tcp
-98713449 | 2025-03-29T04:58:49.565149
1700 / tcp
-2031469209 | 2025-03-29T11:44:44.391685
1723 / tcp
-2031469209 | 2025-03-31T19:11:32.280426
1741 / tcp
-2031469209 | 2025-03-31T16:42:06.812841
1820 / tcp
-98713449 | 2025-03-29T06:24:04.284228
1830 / tcp
-98713449 | 2025-03-29T02:07:34.997256
1833 / tcp
-98713449 | 2025-03-29T08:26:29.640259
1883 / tcp
-2031469209 | 2025-03-31T11:45:21.177903
1901 / tcp
-2031469209 | 2025-03-28T01:14:54.367839
1911 / tcp
-2031469209 | 2025-03-31T21:08:24.969349
1925 / tcp
-2031469209 | 2025-03-31T19:51:13.025972
1926 / tcp
411540654 | 2025-03-31T16:35:28.121075
1935 / tcp
-98713449 | 2025-03-31T13:46:11.621858
1947 / tcp
-98713449 | 2025-03-28T12:50:13.641063
1950 / tcp
-2031469209 | 2025-03-29T11:49:37.806150
1951 / tcp
-2031469209 | 2025-03-29T20:56:54.815256
1952 / tcp
-98713449 | 2025-03-29T03:57:27.701543
1953 / tcp
-98713449 | 2025-03-28T22:16:44.656422
1955 / tcp
-2031469209 | 2025-03-29T15:45:49.301821
1956 / tcp
-98713449 | 2025-03-29T19:44:30.106667
1957 / tcp
-2031469209 | 2025-03-29T20:15:59.539914
1958 / tcp
-98713449 | 2025-03-29T15:54:58.691813
1959 / tcp
-98713449 | 2025-03-29T02:15:19.554471
1960 / tcp
-98713449 | 2025-03-29T09:27:43.222560
1962 / tcp
-2031469209 | 2025-03-31T15:09:07.360402
1964 / tcp
-2031469209 | 2025-03-29T10:16:30.579724
1965 / tcp
-98713449 | 2025-03-29T15:04:09.589110
1966 / tcp
-2031469209 | 2025-03-29T09:14:10.791974
1967 / tcp
-98713449 | 2025-03-28T19:33:44.359258
1968 / tcp
-98713449 | 2025-03-29T09:35:16.805289
1969 / tcp
-2031469209 | 2025-03-29T10:46:59.089281
1970 / tcp
-2031469209 | 2025-03-28T13:50:13.270797
1971 / tcp
-98713449 | 2025-03-28T19:51:38.055776
1972 / tcp
-2031469209 | 2025-03-29T11:56:10.369470
1973 / tcp
-98713449 | 2025-03-28T09:18:13.713201
1974 / tcp
-2031469209 | 2025-03-29T02:35:42.773325
1975 / tcp
-98713449 | 2025-03-29T14:12:57.360674
1976 / tcp
-2031469209 | 2025-03-29T01:48:47.883235
1977 / tcp
-98713449 | 2025-03-29T08:45:07.061545
1978 / tcp
-2031469209 | 2025-03-29T11:27:47.831498
1979 / tcp
-2031469209 | 2025-03-28T21:20:52.552255
1980 / tcp
-2031469209 | 2025-03-29T10:42:17.775550
1981 / tcp
-98713449 | 2025-03-29T07:46:31.370573
1982 / tcp
-2031469209 | 2025-03-29T10:25:12.494150
1983 / tcp
-2031469209 | 2025-03-29T12:32:28.286511
1984 / tcp
-98713449 | 2025-03-29T17:38:10.545370
1985 / tcp
-98713449 | 2025-03-29T10:12:05.297539
1986 / tcp
-98713449 | 2025-03-29T04:07:50.306420
1987 / tcp
-98713449 | 2025-03-29T04:44:07.686061
1988 / tcp
-845604421 | 2025-03-29T17:53:34.787388
1989 / tcp
-98713449 | 2025-03-29T04:31:05.812132
1990 / tcp
-98713449 | 2025-03-29T14:34:43.567233
2000 / tcp
-2031469209 | 2025-03-31T16:42:23.753408
2001 / tcp
-98713449 | 2025-03-29T09:34:21.288450
2002 / tcp
-98713449 | 2025-03-31T15:28:24.236180
2003 / tcp
-98713449 | 2025-03-31T19:25:49.830616
2006 / tcp
-2031469209 | 2025-03-28T00:51:47.384963
2008 / tcp
-2031469209 | 2025-03-27T11:27:20.226294
2010 / tcp
-2031469209 | 2025-03-29T19:45:33.077219
2012 / tcp
-98713449 | 2025-03-29T08:29:18.807284
2016 / tcp
-2031469209 | 2025-03-28T14:12:30.745889
2018 / tcp
-98713449 | 2025-03-29T09:57:24.055594
2020 / tcp
-98713449 | 2025-03-29T08:27:35.161034
2021 / tcp
-2031469209 | 2025-03-29T02:30:26.315213
2022 / tcp
-1145666664 | 2025-03-29T13:17:41.449595
2030 / tcp
-2031469209 | 2025-03-29T15:33:51.136529
2031 / tcp
-2031469209 | 2025-03-29T12:52:14.124383
2048 / tcp
-2031469209 | 2025-03-29T09:47:39.382738
2049 / tcp
1500500966 | 2025-03-29T14:10:06.063514
2050 / tcp
-2031469209 | 2025-03-28T20:08:26.189674
2051 / tcp
-2031469209 | 2025-03-29T15:10:13.817437
2052 / tcp
-98713449 | 2025-03-29T03:46:17.313293
2053 / tcp
-2031469209 | 2025-03-29T04:50:54.377649
2054 / tcp
-98713449 | 2025-03-28T21:14:19.548437
2055 / tcp
-98713449 | 2025-03-29T03:39:23.290115
2056 / tcp
-98713449 | 2025-03-29T09:09:23.818713
2057 / tcp
-98713449 | 2025-03-29T05:27:29.283096
2058 / tcp
-2031469209 | 2025-03-29T20:33:55.978693
2059 / tcp
-98713449 | 2025-03-29T08:43:39.131438
2060 / tcp
-98713449 | 2025-03-29T17:45:51.785938
2061 / tcp
-98713449 | 2025-03-28T14:32:02.451194
2063 / tcp
-2031469209 | 2025-03-28T05:47:31.640286
2064 / tcp
-98713449 | 2025-03-29T20:14:44.658477
2065 / tcp
-98713449 | 2025-03-28T06:01:02.558336
2066 / tcp
-98713449 | 2025-03-29T18:19:29.987114
2067 / tcp
-98713449 | 2025-04-01T01:22:32.339347
2068 / tcp
-98713449 | 2025-03-29T16:11:31.038183
2069 / tcp
-98713449 | 2025-03-29T04:40:25.249218
2070 / tcp
-2031469209 | 2025-03-28T11:20:40.493329
2072 / tcp
-98713449 | 2025-03-28T01:12:41.914252
2077 / tcp
-2031469209 | 2025-03-28T11:51:08.870083
2078 / tcp
-98713449 | 2025-03-29T20:10:27.682042
2079 / tcp
-2031469209 | 2025-03-29T20:19:03.790189
2080 / tcp
-2031469209 | 2025-03-29T15:07:54.186371
2081 / tcp
-98713449 | 2025-03-29T01:55:31.665312
2082 / tcp
-98713449 | 2025-03-31T14:40:31.293911
2083 / tcp
1094048410 | 2025-03-31T19:31:19.750350
2085 / tcp
-2031469209 | 2025-03-29T08:19:45.645379
2086 / tcp
-1475755397 | 2025-03-31T17:57:03.845158
2090 / tcp
-1291629541 | 2025-03-29T03:40:24.910983
2091 / tcp
-2031469209 | 2025-03-29T18:21:42.985867
2095 / tcp
-98713449 | 2025-03-29T15:32:23.144660
2096 / tcp
-98713449 | 2025-03-29T09:22:52.553183
2100 / tcp
-98713449 | 2025-03-29T11:25:52.352975
2101 / tcp
-2031469209 | 2025-03-29T08:41:01.531951
2103 / tcp
-2031469209 | 2025-03-28T04:08:43.509024
2107 / tcp
-98713449 | 2025-03-29T21:06:27.009891
2108 / tcp
-2031469209 | 2025-03-29T11:07:57.867580
2109 / tcp
-98713449 | 2025-03-29T09:22:11.378806
2111 / tcp
-2031469209 | 2025-03-29T02:33:18.992134
2121 / tcp
-2031469209 | 2025-03-31T14:08:27.624491
2122 / tcp
-98713449 | 2025-03-29T15:12:50.915661
2126 / tcp
-98713449 | 2025-03-31T16:57:12.369938
2130 / tcp
-98713449 | 2025-03-31T16:35:02.288265
2133 / tcp
-2031469209 | 2025-03-31T18:48:29.760442
2134 / tcp
-98713449 | 2025-03-28T01:31:43.810955
2150 / tcp
-98713449 | 2025-03-29T22:20:55.068410
2154 / tcp
-98713449 | 2025-03-31T15:22:01.149277
2156 / tcp
-98713449 | 2025-03-29T18:56:52.767912
2181 / tcp
-98713449 | 2025-03-28T11:48:58.909612
2195 / tcp
-98713449 | 2025-03-29T12:12:26.075933
2196 / tcp
-98713449 | 2025-03-28T21:38:15.857288
2200 / tcp
-98713449 | 2025-03-31T21:32:14.102523
2201 / tcp
-2031469209 | 2025-03-31T21:38:43.890833
2202 / tcp
-1885599911 | 2025-03-31T17:32:28.019086
2209 / tcp
-98713449 | 2025-04-01T00:18:55.741732
2210 / tcp
-2031469209 | 2025-03-31T16:04:43.039604
2211 / tcp
-2031469209 | 2025-03-31T13:40:11.958664
2220 / tcp
-98713449 | 2025-03-31T23:46:17.284112
2221 / tcp
-98713449 | 2025-03-31T21:21:25.449137
2222 / tcp
-1145666664 | 2025-03-31T23:21:34.192361
2223 / tcp
-98713449 | 2025-03-31T11:17:16.369828
2224 / tcp
-2031469209 | 2025-03-28T09:57:51.166177
2225 / tcp
-98713449 | 2025-03-31T20:42:32.387760
2226 / tcp
-98713449 | 2025-03-31T22:56:26.765771
2232 / tcp
-98713449 | 2025-03-31T14:50:23.673654
2233 / tcp
-2031469209 | 2025-03-29T12:10:30.053696
2248 / tcp
-98713449 | 2025-03-28T08:24:28.143176
2250 / tcp
-98713449 | 2025-03-29T20:40:38.729803
2259 / tcp
-2031469209 | 2025-03-31T14:00:32.259282
2266 / tcp
-2031469209 | 2025-03-29T17:16:02.754701
2271 / tcp
-98713449 | 2025-03-31T14:26:04.119129
2323 / tcp
-1690889578 | 2025-03-29T08:34:23.778534
2327 / tcp
-98713449 | 2025-03-29T04:48:57.236267
2332 / tcp
-98713449 | 2025-03-29T20:52:55.325650
2344 / tcp
-98713449 | 2025-03-28T06:21:13.299646
2345 / tcp
-98713449 | 2025-04-01T00:38:10.464077
2351 / tcp
-2031469209 | 2025-03-29T11:02:44.951669
2352 / tcp
-98713449 | 2025-03-28T21:03:05.085473
2353 / tcp
-2031469209 | 2025-03-29T03:48:28.115597
2362 / tcp
-2031469209 | 2025-03-28T06:15:00.593767
2375 / tcp
-98713449 | 2025-03-31T10:13:16.998018
2376 / tcp
411540654 | 2025-04-01T00:59:41.174920
2379 / tcp
-98713449 | 2025-04-01T00:31:02.025767
2382 / tcp
-98713449 | 2025-03-29T11:17:23.516175
2404 / tcp
-1863726365 | 2025-03-29T04:42:44.000270
2423 / tcp
-98713449 | 2025-03-28T18:26:54.584862
2435 / tcp
-98713449 | 2025-03-29T13:13:02.140578
2443 / tcp
-98713449 | 2025-03-29T14:18:46.076631
2444 / tcp
-98713449 | 2025-03-28T19:32:26.627039
2453 / tcp
-98713449 | 2025-03-28T03:57:37.504592
2455 / tcp
-98713449 | 2025-03-31T23:30:14.060462
2506 / tcp
-98713449 | 2025-03-29T19:46:25.326761
2525 / tcp
-98713449 | 2025-03-29T10:45:22.024767
2548 / tcp
-2031469209 | 2025-03-29T18:50:14.696388
2549 / tcp
-2031469209 | 2025-03-29T02:24:18.506546
2550 / tcp
-98713449 | 2025-03-29T05:04:29.029661
2551 / tcp
-98713449 | 2025-03-28T13:23:25.437934
2552 / tcp
-98713449 | 2025-03-29T21:22:46.405082
2553 / tcp
-98713449 | 2025-03-29T03:14:01.829765
2554 / tcp
-2031469209 | 2025-03-29T14:15:42.827929
2555 / tcp
-98713449 | 2025-03-29T11:03:40.025883
2556 / tcp
-98713449 | 2025-03-29T17:19:53.507752
2557 / tcp
-2031469209 | 2025-03-29T08:56:45.913939
2558 / tcp
-98713449 | 2025-03-29T02:14:42.145713
2559 / tcp
-98713449 | 2025-03-28T00:52:11.770655
2560 / tcp
-2031469209 | 2025-03-29T12:44:44.145298
2561 / tcp
-98713449 | 2025-03-29T10:00:27.611571
2562 / tcp
-2031469209 | 2025-03-29T10:08:41.365616
2563 / tcp
-2031469209 | 2025-03-29T03:22:57.997530
2566 / tcp
-98713449 | 2025-03-29T15:35:55.754144
2567 / tcp
-98713449 | 2025-03-29T10:55:05.878519
2568 / tcp
-2031469209 | 2025-03-29T21:11:56.741603
2569 / tcp
-2031469209 | 2025-03-28T02:32:33.151018
2570 / tcp
-98713449 | 2025-03-29T02:56:41.622176
2572 / tcp
-2031469209 | 2025-03-29T16:52:47.873911
2598 / tcp
-2031469209 | 2025-03-28T12:27:58.357296
2599 / tcp
-2031469209 | 2025-03-29T11:52:52.509580
2601 / tcp
-98713449 | 2025-03-29T19:57:10.030664
2602 / tcp
-98713449 | 2025-03-28T22:03:41.989669
2626 / tcp
-2031469209 | 2025-03-28T11:46:03.106375
2650 / tcp
-98713449 | 2025-03-29T09:19:34.663103
2701 / tcp
-2031469209 | 2025-03-29T16:09:13.916357
2709 / tcp
-98713449 | 2025-03-29T15:26:34.917081
2761 / tcp
-2031469209 | 2025-03-29T03:00:53.961829
2762 / tcp
-2031469209 | 2025-03-31T23:12:25.363955
2806 / tcp
-98713449 | 2025-03-29T18:54:25.981596
2850 / tcp
-98713449 | 2025-03-29T16:39:25.691486
2985 / tcp
-2031469209 | 2025-03-29T02:29:17.486999
2995 / tcp
-2031469209 | 2025-03-28T15:30:16.207737
3000 / tcp
-291974457 | 2025-03-28T17:11:05.799589
3001 / tcp
-98713449 | 2025-03-29T11:29:29.058566
3002 / tcp
-98713449 | 2025-03-28T04:01:27.612198
3003 / tcp
-2031469209 | 2025-03-29T03:58:23.998673
3004 / tcp
-98713449 | 2025-03-29T17:48:08.696431
3005 / tcp
-2031469209 | 2025-03-29T13:24:29.318547
3006 / tcp
-98713449 | 2025-03-29T02:45:14.662306
3007 / tcp
-2031469209 | 2025-03-29T11:41:26.644606
3008 / tcp
-2031469209 | 2025-03-29T00:40:58.933845
3009 / tcp
-2031469209 | 2025-03-28T23:38:34.996434
3010 / tcp
-2031469209 | 2025-03-29T11:28:12.341645
3011 / tcp
-98713449 | 2025-03-29T13:41:03.236534
3012 / tcp
-2031469209 | 2025-03-28T02:22:47.090495
3013 / tcp
-2031469209 | 2025-03-28T16:48:21.949286
3014 / tcp
-98713449 | 2025-03-29T17:23:31.928254
3015 / tcp
-2031469209 | 2025-03-29T12:14:14.167893
3016 / tcp
-98713449 | 2025-03-29T21:30:30.155667
3017 / tcp
-98713449 | 2025-03-28T13:48:58.904092
3018 / tcp
-2031469209 | 2025-03-29T16:28:28.655656
3019 / tcp
-98713449 | 2025-03-29T13:42:05.674655
3020 / tcp
-2031469209 | 2025-03-29T18:37:38.479142
3021 / tcp
-98713449 | 2025-03-29T17:06:46.550874
3022 / tcp
-98713449 | 2025-03-29T14:22:58.044354
3030 / tcp
-2031469209 | 2025-03-29T20:20:09.582301
3042 / tcp
-98713449 | 2025-03-28T20:27:49.061057
3047 / tcp
-98713449 | 2025-03-29T17:48:40.044113
3048 / tcp
-2031469209 | 2025-03-29T01:47:02.066870
3049 / tcp
-2031469209 | 2025-03-29T13:13:23.318200
3050 / tcp
-2031469209 | 2025-03-29T15:54:34.187073
3051 / tcp
-98713449 | 2025-03-29T22:26:11.794630
3052 / tcp
-2031469209 | 2025-03-28T02:13:04.901253
3053 / tcp
-2031469209 | 2025-03-28T02:45:25.250748
3054 / tcp
-98713449 | 2025-03-29T19:18:36.619265
3055 / tcp
-2031469209 | 2025-03-29T04:01:11.776344
3056 / tcp
-98713449 | 2025-03-29T14:36:35.282407
3057 / tcp
-2031469209 | 2025-03-28T23:46:01.275902
3058 / tcp
-98713449 | 2025-03-29T03:17:54.837330
3059 / tcp
-2031469209 | 2025-03-29T10:23:23.567433
3060 / tcp
-2031469209 | 2025-03-29T00:46:46.550666
3061 / tcp
-98713449 | 2025-03-28T04:30:21.472239
3062 / tcp
-2031469209 | 2025-03-24T04:38:59.020793
3063 / tcp
-98713449 | 2025-03-29T18:02:05.693865
3064 / tcp
-98713449 | 2025-03-29T16:42:37.771395
3065 / tcp
-98713449 | 2025-03-29T17:17:11.473144
3066 / tcp
-98713449 | 2025-03-29T20:22:04.896922
3067 / tcp
-98713449 | 2025-03-29T07:57:46.864424
3068 / tcp
-98713449 | 2025-03-29T18:55:00.155269
3069 / tcp
-98713449 | 2025-03-28T19:47:59.121000
3070 / tcp
-98713449 | 2025-03-29T13:52:50.320193
3071 / tcp
-2031469209 | 2025-03-29T11:06:22.403841
3072 / tcp
-98713449 | 2025-03-29T05:15:29.994219
3073 / tcp
-2031469209 | 2025-03-29T16:35:46.843958
3074 / tcp
-2031469209 | 2025-03-29T04:12:58.453752
3075 / tcp
-98713449 | 2025-03-29T08:08:11.491444
3076 / tcp
-98713449 | 2025-03-29T08:47:05.176280
3077 / tcp
-98713449 | 2025-03-29T16:04:22.693883
3078 / tcp
-2031469209 | 2025-03-29T15:24:23.494979
3079 / tcp
-98713449 | 2025-03-29T09:44:47.136243
3080 / tcp
-98713449 | 2025-03-29T11:05:42.942031
3081 / tcp
-98713449 | 2025-03-29T21:11:29.014667
3082 / tcp
-98713449 | 2025-03-29T02:16:34.384673
3083 / tcp
-2031469209 | 2025-03-29T20:37:36.764912
3084 / tcp
-98713449 | 2025-03-29T03:11:31.890345
3085 / tcp
-98713449 | 2025-03-29T19:54:04.399430
3086 / tcp
-98713449 | 2025-03-29T21:07:53.049616
3087 / tcp
-98713449 | 2025-03-29T21:02:43.840758
3088 / tcp
-98713449 | 2025-03-29T16:13:17.681343
3089 / tcp
-2031469209 | 2025-03-29T02:26:23.313542
3090 / tcp
-98713449 | 2025-03-28T19:39:16.826680
3091 / tcp
-2031469209 | 2025-03-29T11:01:37.694828
3092 / tcp
-2031469209 | 2025-03-29T00:24:26.210809
3093 / tcp
-98713449 | 2025-03-29T10:22:12.423061
3094 / tcp
-2031469209 | 2025-03-29T19:36:38.571234
3095 / tcp
-2031469209 | 2025-03-28T13:43:57.745538
3096 / tcp
-98713449 | 2025-03-28T21:46:17.663971
3097 / tcp
-98713449 | 2025-03-29T08:04:27.926336
3098 / tcp
-2031469209 | 2025-03-28T19:36:56.901423
3099 / tcp
-2031469209 | 2025-03-28T20:14:43.174727
3100 / tcp
-2031469209 | 2025-03-29T18:30:18.074489
3101 / tcp
-98713449 | 2025-03-28T02:54:05.254647
3102 / tcp
-98713449 | 2025-03-28T18:02:28.310072
3103 / tcp
-98713449 | 2025-03-29T14:27:30.472190
3104 / tcp
-2031469209 | 2025-03-29T11:05:40.740876
3105 / tcp
-98713449 | 2025-03-29T15:37:58.336097
3106 / tcp
-98713449 | 2025-03-29T12:03:26.664261
3107 / tcp
-98713449 | 2025-03-29T11:13:05.949300
3108 / tcp
-2031469209 | 2025-03-29T11:25:02.854888
3109 / tcp
-2031469209 | 2025-03-29T09:25:17.815680
3110 / tcp
-2031469209 | 2025-03-29T12:32:48.046800
3111 / tcp
-98713449 | 2025-03-29T15:39:22.738979
3112 / tcp
-98713449 | 2025-03-29T17:55:12.369469
3113 / tcp
-98713449 | 2025-03-29T09:41:25.583886
3114 / tcp
-98713449 | 2025-03-29T01:03:37.972936
3115 / tcp
-2031469209 | 2025-03-28T07:16:15.191849
3116 / tcp
-98713449 | 2025-03-29T16:59:26.433719
3117 / tcp
-98713449 | 2025-03-29T12:42:00.928381
3118 / tcp
-2031469209 | 2025-03-29T01:36:46.004860
3119 / tcp
-2031469209 | 2025-03-29T17:49:28.523465
3120 / tcp
-2031469209 | 2025-03-29T16:43:26.420836
3121 / tcp
-2031469209 | 2025-03-29T04:08:59.126151
3122 / tcp
-98713449 | 2025-03-29T17:54:23.658580
3123 / tcp
-2031469209 | 2025-03-29T03:53:54.309392
3124 / tcp
-2031469209 | 2025-03-28T11:48:32.909387
3125 / tcp
-98713449 | 2025-03-29T09:21:47.892694
3126 / tcp
-2031469209 | 2025-03-28T12:52:13.887816
3127 / tcp
-2031469209 | 2025-03-29T02:44:28.731155
3128 / tcp
-2031469209 | 2025-03-31T17:57:43.170989
3129 / tcp
-2031469209 | 2025-03-28T12:44:30.890873
3130 / tcp
-98713449 | 2025-03-29T12:50:54.644301
3131 / tcp
-2031469209 | 2025-03-29T15:49:47.029039
3132 / tcp
-2031469209 | 2025-03-29T02:17:32.287775
3133 / tcp
-98713449 | 2025-03-29T13:18:55.769218
3134 / tcp
-98713449 | 2025-03-28T01:59:03.815936
3136 / tcp
-98713449 | 2025-03-29T03:54:51.585830
3137 / tcp
-98713449 | 2025-03-29T00:55:02.930407
3138 / tcp
-2031469209 | 2025-03-28T22:01:41.950785
3139 / tcp
-98713449 | 2025-03-29T17:05:59.582593
3140 / tcp
-2031469209 | 2025-03-29T16:25:07.365505
3141 / tcp
-98713449 | 2025-03-28T04:40:54.871827
3142 / tcp
-2031469209 | 2025-03-28T21:55:22.863980
3143 / tcp
-2031469209 | 2025-03-29T06:25:40.042673
3144 / tcp
-98713449 | 2025-03-28T11:37:59.465051
3145 / tcp
-98713449 | 2025-03-29T17:11:09.711604
3146 / tcp
-98713449 | 2025-03-29T20:07:35.339259
3147 / tcp
-98713449 | 2025-03-29T02:07:18.437668
3148 / tcp
-98713449 | 2025-03-28T02:56:56.614778
3149 / tcp
-98713449 | 2025-03-29T20:47:08.224646
3150 / tcp
-98713449 | 2025-03-28T22:57:32.689161
3151 / tcp
-2031469209 | 2025-03-28T09:28:40.555209
3152 / tcp
-98713449 | 2025-03-29T04:05:06.114045
3153 / tcp
-2031469209 | 2025-03-28T13:47:07.420545
3154 / tcp
-98713449 | 2025-03-28T03:15:04.533200
3155 / tcp
-98713449 | 2025-03-29T16:15:23.949490
3156 / tcp
-98713449 | 2025-03-29T20:37:33.157188
3157 / tcp
-2031469209 | 2025-03-31T20:25:49.079979
3158 / tcp
-2031469209 | 2025-03-29T12:53:15.381120
3159 / tcp
-98713449 | 2025-03-29T20:14:36.502051
3160 / tcp
-98713449 | 2025-03-29T05:21:57.465903
3161 / tcp
-2031469209 | 2025-03-28T18:18:23.430781
3162 / tcp
-2031469209 | 2025-03-29T04:24:13.755453
3163 / tcp
-98713449 | 2025-03-29T10:18:33.158395
3164 / tcp
-2031469209 | 2025-03-29T05:22:48.720440
3165 / tcp
-98713449 | 2025-03-29T17:23:19.057241
3166 / tcp
-98713449 | 2025-03-29T16:07:48.656970
3167 / tcp
-2031469209 | 2025-03-29T19:52:01.755049
3168 / tcp
-2031469209 | 2025-03-29T11:34:20.831665
3169 / tcp
-2031469209 | 2025-03-29T15:58:10.384747
3170 / tcp
-98713449 | 2025-03-28T14:26:47.750551
3171 / tcp
-2031469209 | 2025-03-29T18:44:57.309426
3172 / tcp
-98713449 | 2025-03-28T19:30:47.568783
3173 / tcp
-98713449 | 2025-03-29T10:54:47.956057
3174 / tcp
-2031469209 | 2025-03-29T03:54:27.402510
3175 / tcp
-98713449 | 2025-03-29T14:20:41.172659
3176 / tcp
-98713449 | 2025-03-29T03:35:46.338468
3177 / tcp
-2031469209 | 2025-03-29T08:54:46.611584
3178 / tcp
-98713449 | 2025-03-29T20:18:17.120337
3179 / tcp
-98713449 | 2025-03-29T15:05:44.811930
3180 / tcp
-98713449 | 2025-03-29T04:52:08.018093
3181 / tcp
-98713449 | 2025-03-29T20:17:41.226853
3182 / tcp
-2031469209 | 2025-03-29T16:30:24.407100
3183 / tcp
-2031469209 | 2025-03-29T09:05:26.211390
3184 / tcp
-98713449 | 2025-03-29T13:51:55.288774
3185 / tcp
-2031469209 | 2025-03-28T06:12:07.082257
3186 / tcp
-2031469209 | 2025-03-29T17:41:22.184219
3187 / tcp
-98713449 | 2025-03-29T04:04:01.040054
3188 / tcp
-2031469209 | 2025-03-28T00:44:00.212012
3189 / tcp
-98713449 | 2025-03-29T17:42:55.956720
3190 / tcp
-98713449 | 2025-03-29T05:04:51.946164
3191 / tcp
-98713449 | 2025-03-29T17:15:06.620467
3192 / tcp
-2031469209 | 2025-03-29T01:41:50.352908
3193 / tcp
-98713449 | 2025-03-29T09:39:04.666436
3194 / tcp
-2031469209 | 2025-03-29T18:42:45.084547
3195 / tcp
-98713449 | 2025-03-29T18:35:52.240863
3196 / tcp
-2031469209 | 2025-03-28T17:42:57.467022
3197 / tcp
-98713449 | 2025-03-29T03:02:01.629839
3198 / tcp
-98713449 | 2025-03-29T21:32:59.069316
3199 / tcp
-98713449 | 2025-03-29T08:00:03.614082
3200 / tcp
-98713449 | 2025-03-23T17:52:57.569760
3211 / tcp
-2031469209 | 2025-03-29T01:54:35.833608
3221 / tcp
-98713449 | 2025-03-29T02:27:41.473478
3256 / tcp
411540654 | 2025-03-27T06:35:51.931553
3260 / tcp
-2031469209 | 2025-04-01T00:09:14.164776
3268 / tcp
-98713449 | 2025-03-31T14:13:57.803567
3269 / tcp
-2031469209 | 2025-03-29T16:22:04.098572
3270 / tcp
-98713449 | 2025-03-31T20:07:30.109461
3299 / tcp
-98713449 | 2025-03-29T14:07:21.115693
3301 / tcp
-2031469209 | 2025-03-31T23:49:53.871955
3306 / tcp
-1288050977 | 2025-03-29T10:57:11.794430
3307 / tcp
-740155298 | 2025-03-29T21:04:07.337084
3310 / tcp
-2031469209 | 2025-03-31T15:19:13.555305
3311 / tcp
-98713449 | 2025-03-29T17:43:23.125099
3337 / tcp
-98713449 | 2025-03-29T20:22:43.750389
3341 / tcp
-2031469209 | 2025-03-29T04:46:37.476332
3342 / tcp
-2031469209 | 2025-03-29T14:48:39.924294
3345 / tcp
-98713449 | 2025-03-29T16:17:44.705178
3349 / tcp
-2031469209 | 2025-03-29T14:54:32.810373
3352 / tcp
-2031469209 | 2025-03-29T14:30:01.849966
3365 / tcp
-2031469209 | 2025-03-29T17:31:04.101125
3388 / tcp
-98713449 | 2025-03-31T14:18:13.863624
3389 / tcp
981973376 | 2025-03-31T17:20:31.958731
3390 / tcp
-98713449 | 2025-03-29T05:25:37.581137
3400 / tcp
-98713449 | 2025-03-29T13:22:50.617302
3401 / tcp
-2031469209 | 2025-03-29T14:03:52.414669
3402 / tcp
-98713449 | 2025-03-29T13:54:47.870646
3403 / tcp
-98713449 | 2025-03-29T11:19:11.725514
3404 / tcp
-2031469209 | 2025-03-29T09:38:37.340550
3405 / tcp
-2031469209 | 2025-03-29T11:48:30.042580
3406 / tcp
-98713449 | 2025-03-29T17:09:49.885212
3407 / tcp
-98713449 | 2025-03-28T16:22:56.925000
3408 / tcp
-2031469209 | 2025-03-29T04:38:21.801578
3409 / tcp
-2031469209 | 2025-03-29T01:44:14.573806
3410 / tcp
-98713449 | 2025-03-29T18:35:59.107041
3412 / tcp
-98713449 | 2025-03-29T03:02:45.274204
3443 / tcp
-2031469209 | 2025-03-29T17:06:09.327553
3479 / tcp
-98713449 | 2025-03-29T12:57:05.660701
3498 / tcp
-2031469209 | 2025-03-29T03:05:55.421605
3500 / tcp
-98713449 | 2025-03-29T02:17:13.607110
3503 / tcp
-98713449 | 2025-03-29T01:25:43.543645
3510 / tcp
-98713449 | 2025-03-28T03:37:03.322004
3521 / tcp
-98713449 | 2025-03-29T18:01:57.348459
3522 / tcp
-2031469209 | 2025-03-29T14:39:52.743004
3523 / tcp
-2031469209 | 2025-03-28T03:00:57.622657
3524 / tcp
-2031469209 | 2025-03-29T05:28:29.891653
3530 / tcp
-2031469209 | 2025-03-29T11:55:13.063916
3531 / tcp
-98713449 | 2025-03-29T07:51:12.207624
3540 / tcp
-2031469209 | 2025-03-31T11:43:42.501405
3541 / tcp
-2031469209 | 2025-03-31T15:29:22.265002
3542 / tcp
-98713449 | 2025-03-31T16:19:14.808845
3548 / tcp
-98713449 | 2025-03-28T21:36:57.867663
3549 / tcp
-2031469209 | 2025-03-29T03:46:01.096775
3550 / tcp
-98713449 | 2025-03-29T04:11:29.182170
3551 / tcp
-98713449 | 2025-03-29T09:59:48.624108
3552 / tcp
-98713449 | 2025-03-29T19:35:59.118756
3553 / tcp
-98713449 | 2025-03-29T18:17:15.573015
3554 / tcp
-98713449 | 2025-03-29T03:37:19.132778
3555 / tcp
-2031469209 | 2025-03-29T16:22:50.219829
3556 / tcp
-98713449 | 2025-03-29T16:01:21.683628
3557 / tcp
-98713449 | 2025-03-28T06:04:10.068953
3558 / tcp
-98713449 | 2025-03-29T16:23:38.386282
3559 / tcp
-98713449 | 2025-03-29T12:32:25.611406
3560 / tcp
-98713449 | 2025-03-29T05:04:02.692259
3561 / tcp
-98713449 | 2025-03-29T15:56:50.546945
3562 / tcp
-2031469209 | 2025-03-28T23:57:03.493635
3563 / tcp
-2031469209 | 2025-03-29T08:46:30.094478
3566 / tcp
-2031469209 | 2025-03-28T11:43:34.067863
3567 / tcp
-98713449 | 2025-03-29T01:51:09.089772
3568 / tcp
-98713449 | 2025-03-29T18:43:18.121128
3569 / tcp
-98713449 | 2025-03-29T14:19:54.842537
3570 / tcp
-2031469209 | 2025-03-29T01:20:17.529114
3572 / tcp
-2031469209 | 2025-03-29T02:29:56.909882
3580 / tcp
-98713449 | 2025-03-29T21:17:41.802513
3590 / tcp
-98713449 | 2025-03-28T23:33:03.634069
3622 / tcp
-2031469209 | 2025-03-29T02:13:18.857136
3689 / tcp
-2031469209 | 2025-03-31T14:32:29.962155
3690 / tcp
-98713449 | 2025-03-29T17:03:46.012796
3749 / tcp
-98713449 | 2025-03-31T18:59:57.037928
3780 / tcp
411540654 | 2025-03-31T08:13:19.455891
3791 / tcp
-98713449 | 2025-03-28T02:44:46.039801
3792 / tcp
-2031469209 | 2025-03-29T19:32:40.561446
3793 / tcp
-98713449 | 2025-03-28T13:01:53.100022
3794 / tcp
-98713449 | 2025-03-29T18:42:57.095809
3838 / tcp
-98713449 | 2025-03-29T20:58:02.828482
3841 / tcp
-98713449 | 2025-03-28T15:33:59.175589
3842 / tcp
-2031469209 | 2025-03-28T10:32:14.186414
3910 / tcp
-98713449 | 2025-03-28T00:55:13.107222
3922 / tcp
-98713449 | 2025-03-29T20:32:16.084836
3950 / tcp
-98713449 | 2025-03-29T21:12:13.321897
3951 / tcp
-2031469209 | 2025-03-29T03:29:13.246604
3952 / tcp
-98713449 | 2025-03-29T18:32:57.681452
3953 / tcp
-2031469209 | 2025-03-29T03:46:58.787896
3954 / tcp
-2031469209 | 2025-03-23T06:56:39.460606
4000 / tcp
-2031469209 | 2025-03-31T18:34:57.993247
4001 / tcp
-2031469209 | 2025-03-29T14:22:37.048144
4002 / tcp
-98713449 | 2025-03-29T13:19:10.123488
4010 / tcp
-2031469209 | 2025-03-29T16:53:16.855134
4021 / tcp
-2031469209 | 2025-03-29T16:37:36.645074
4022 / tcp
-1198227559 | 2025-03-29T09:10:21.325666
4023 / tcp
-98713449 | 2025-03-29T04:12:16.705673
4040 / tcp
-98713449 | 2025-03-29T00:44:15.250152
4042 / tcp
-98713449 | 2025-03-29T12:04:25.888016
4043 / tcp
-98713449 | 2025-03-29T12:56:14.356528
4063 / tcp
-2031469209 | 2025-04-01T01:11:51.813472
4064 / tcp
-2031469209 | 2025-03-31T08:52:20.118445
4072 / tcp
-2031469209 | 2025-03-29T08:14:47.514019
4080 / tcp
-98713449 | 2025-03-28T11:15:20.807527
4085 / tcp
-98713449 | 2025-03-28T20:54:59.034416
4095 / tcp
-98713449 | 2025-03-29T01:05:31.237838
4100 / tcp
-98713449 | 2025-03-29T14:16:16.214924
4101 / tcp
-2031469209 | 2025-03-28T11:15:40.644196
4103 / tcp
-98713449 | 2025-03-29T03:10:48.956307
4104 / tcp
-98713449 | 2025-03-29T02:35:40.167125
4117 / tcp
-98713449 | 2025-03-28T07:34:10.407101
4118 / tcp
-2031469209 | 2025-03-29T03:59:42.869030
4120 / tcp
-98713449 | 2025-03-29T08:47:31.177383
4147 / tcp
-98713449 | 2025-03-29T05:19:46.252082
4148 / tcp
-2031469209 | 2025-03-29T14:48:42.127326
4150 / tcp
-98713449 | 2025-03-31T20:53:01.023899
4155 / tcp
-2031469209 | 2025-03-29T08:50:02.744287
4159 / tcp
-98713449 | 2025-03-29T17:43:07.784963
4160 / tcp
-98713449 | 2025-03-29T04:54:46.544854
4165 / tcp
-2031469209 | 2025-03-28T16:58:01.810764
4172 / tcp
-98713449 | 2025-03-28T13:24:54.307039
4190 / tcp
-2031469209 | 2025-03-29T11:42:10.129136
4200 / tcp
-98713449 | 2025-03-29T13:34:02.274315
4242 / tcp
-247035957 | 2025-03-29T04:55:19.927564
4243 / tcp
-98713449 | 2025-03-29T18:25:42.837112
4244 / tcp
-98713449 | 2025-03-29T08:32:06.078488
4250 / tcp
-2031469209 | 2025-03-29T17:45:07.802906
4282 / tcp
-98713449 | 2025-03-25T02:55:19.354952
4300 / tcp
-2031469209 | 2025-03-29T18:32:14.128707
4321 / tcp
-2031469209 | 2025-03-29T19:45:43.120760
4333 / tcp
-98713449 | 2025-03-29T03:08:19.317368
4344 / tcp
-98713449 | 2025-03-29T09:36:29.874637
4369 / tcp
-2031469209 | 2025-03-31T08:00:44.616187
4400 / tcp
-2031469209 | 2025-03-29T09:16:42.969460
4401 / tcp
-98713449 | 2025-03-29T10:58:01.068274
4402 / tcp
-98713449 | 2025-03-29T10:02:23.389733
4431 / tcp
-98713449 | 2025-03-29T11:08:40.731103
4432 / tcp
-98713449 | 2025-03-31T21:09:40.429688
4433 / tcp
-756278524 | 2025-03-31T21:49:34.671739
4434 / tcp
411540654 | 2025-03-31T09:14:01.620763
4435 / tcp
-2031469209 | 2025-03-29T05:24:38.932586
4436 / tcp
-98713449 | 2025-03-29T12:51:46.554979
4437 / tcp
-2031469209 | 2025-03-28T06:11:31.268551
4438 / tcp
-98713449 | 2025-03-28T16:38:30.134697
4439 / tcp
-98713449 | 2025-03-29T05:10:08.137409
4440 / tcp
-98713449 | 2025-03-29T14:24:22.732290
4443 / tcp
-207704745 | 2025-03-31T12:50:30.035213
4445 / tcp
1638073473 | 2025-03-29T16:38:57.476602
4447 / tcp
-98713449 | 2025-03-29T02:43:51.624838
4449 / tcp
-98713449 | 2025-03-29T09:32:51.071204
4451 / tcp
-98713449 | 2025-03-29T19:42:17.410252
4455 / tcp
-98713449 | 2025-03-29T16:20:45.810481
4457 / tcp
-2031469209 | 2025-03-24T00:04:13.478319
4459 / tcp
-2031469209 | 2025-03-28T21:45:12.188350
4461 / tcp
-98713449 | 2025-03-29T05:17:53.778672
4463 / tcp
-2031469209 | 2025-03-29T17:05:31.232872
4466 / tcp
-98713449 | 2025-03-29T13:42:40.976062
4477 / tcp
-2031469209 | 2025-03-29T02:42:16.902518
4482 / tcp
-98713449 | 2025-03-28T07:19:13.889577
4488 / tcp
-98713449 | 2025-03-29T11:16:24.191444
4499 / tcp
-2031469209 | 2025-03-29T01:30:15.132735
4500 / tcp
-98713449 | 2025-03-31T22:39:21.169332
4502 / tcp
-2031469209 | 2025-03-29T18:23:30.157897
4506 / tcp
-2031469209 | 2025-04-01T00:05:33.194034
4510 / tcp
-98713449 | 2025-03-29T22:03:23.838878
4520 / tcp
-98713449 | 2025-03-07T01:34:43.907748
4523 / tcp
-2031469209 | 2025-03-29T03:52:54.378571
4524 / tcp
-2031469209 | 2025-03-29T07:48:45.623490
4528 / tcp
-2031469209 | 2025-03-23T12:05:35.972955
4530 / tcp
-98713449 | 2025-03-28T14:35:12.571738
4531 / tcp
-98713449 | 2025-03-29T21:31:22.366211
4543 / tcp
-98713449 | 2025-03-29T05:28:50.159315
4545 / tcp
-98713449 | 2025-03-29T10:48:11.217605
4550 / tcp
-2031469209 | 2025-03-29T10:48:53.334076
4567 / tcp
-98713449 | 2025-04-01T00:35:09.209801
4572 / tcp
-2031469209 | 2025-03-29T15:25:29.095503
4602 / tcp
-98713449 | 2025-03-29T03:21:06.516949
4620 / tcp
-2031469209 | 2025-03-29T12:04:05.495164
4643 / tcp
-2031469209 | 2025-03-28T16:52:07.584404
4646 / tcp
-2031469209 | 2025-03-29T10:35:47.703050
4664 / tcp
-98713449 | 2025-03-31T19:49:11.012608
4700 / tcp
-2031469209 | 2025-03-28T04:39:29.013955
4734 / tcp
-98713449 | 2025-03-29T11:51:17.572219
4747 / tcp
-2031469209 | 2025-03-29T09:23:55.017785
4782 / tcp
-98713449 | 2025-03-29T11:13:55.623006
4786 / tcp
-1478571435 | 2025-03-31T23:01:08.518812
4808 / tcp
-98713449 | 2025-03-29T12:32:04.758531
4821 / tcp
-2031469209 | 2025-03-29T01:26:00.423197
4840 / tcp
-98713449 | 2025-03-31T11:52:28.672224
4848 / tcp
-98713449 | 2025-03-31T13:18:00.900427
4899 / tcp
-98713449 | 2025-04-01T00:39:58.141228
4911 / tcp
-2031469209 | 2025-03-31T22:50:03.393493
4933 / tcp
-2031469209 | 2025-03-28T08:04:03.502148
4949 / tcp
-98713449 | 2025-03-31T16:02:52.536093
4993 / tcp
-98713449 | 2025-03-29T17:55:27.601547
4999 / tcp
-2031469209 | 2025-03-29T16:31:15.370786
5000 / tcp
1561587376 | 2025-03-31T20:46:34.116093
5002 / tcp
-2031469209 | 2025-03-29T02:31:01.002111
5003 / tcp
-2031469209 | 2025-03-29T01:56:26.242851
5004 / tcp
-98713449 | 2025-03-29T08:03:53.656729
5005 / tcp
-98713449 | 2025-03-29T19:41:02.036443
5006 / tcp
411540654 | 2025-03-28T02:39:31.885167
5007 / tcp
-2031469209 | 2025-03-29T20:54:31.831978
5009 / tcp
-2031469209 | 2025-03-31T18:34:45.308360
5010 / tcp
-98713449 | 2025-03-29T09:52:46.592325
5011 / tcp
-98713449 | 2025-03-29T08:51:36.482010
5022 / tcp
845148370 | 2025-03-29T10:19:11.498044
5025 / tcp
-2031469209 | 2025-03-31T15:19:56.672081
5051 / tcp
-2031469209 | 2025-03-29T20:59:13.606967
5053 / tcp
-2031469209 | 2025-03-29T02:10:46.028271
5061 / tcp
-98713449 | 2025-03-28T17:42:37.274646
5070 / tcp
-2031469209 | 2025-03-29T20:23:09.697765
5080 / tcp
-98713449 | 2025-03-29T01:00:21.219627
5083 / tcp
-2031469209 | 2025-03-29T14:12:30.938426
5089 / tcp
-98713449 | 2025-03-28T19:25:33.694953
5090 / tcp
-98713449 | 2025-03-29T20:11:00.862549
5093 / tcp
-98713449 | 2025-03-29T02:57:32.997707
5100 / tcp
-2031469209 | 2025-03-29T11:28:51.103600
5105 / tcp
-98713449 | 2025-03-28T20:52:56.122833
5119 / tcp
-98713449 | 2025-03-29T03:27:42.489233
5120 / tcp
-98713449 | 2025-03-29T18:12:13.505102
5122 / tcp
-2031469209 | 2025-03-28T09:39:41.314245
5123 / tcp
-98713449 | 2025-03-29T17:04:25.582821
5130 / tcp
-98713449 | 2025-03-28T10:24:37.450765
5135 / tcp
-98713449 | 2025-03-28T14:01:56.878037
5140 / tcp
-2031469209 | 2025-03-28T02:36:39.778812
5150 / tcp
-2031469209 | 2025-03-29T21:19:15.612131
5160 / tcp
-2031469209 | 2025-03-28T17:29:51.861183
5172 / tcp
411540654 | 2025-03-29T08:26:19.053838
5180 / tcp
-98713449 | 2025-03-29T03:04:19.868328
5190 / tcp
-98713449 | 2025-03-29T20:48:22.231377
5201 / tcp
-98713449 | 2025-04-01T00:04:37.601123
5209 / tcp
-2031469209 | 2025-03-29T14:57:01.217924
5222 / tcp
-2031469209 | 2025-03-31T16:23:01.567416
5223 / tcp
-2031469209 | 2025-03-29T13:43:41.790933
5224 / tcp
-98713449 | 2025-03-29T18:53:27.425199
5225 / tcp
-98713449 | 2025-03-29T15:24:52.780587
5226 / tcp
-98713449 | 2025-03-29T02:12:02.362052
5227 / tcp
-2031469209 | 2025-03-29T04:58:17.123185
5228 / tcp
-98713449 | 2025-03-29T16:15:57.884370
5229 / tcp
-98713449 | 2025-03-29T15:42:38.700819
5230 / tcp
-98713449 | 2025-03-29T18:41:37.163556
5231 / tcp
-98713449 | 2025-03-29T04:37:41.682336
5232 / tcp
-2031469209 | 2025-03-29T16:45:05.414305
5233 / tcp
-98713449 | 2025-03-29T09:24:49.254687
5234 / tcp
-98713449 | 2025-03-29T17:19:20.578756
5235 / tcp
-2031469209 | 2025-03-29T02:50:27.873514
5236 / tcp
-2031469209 | 2025-03-29T16:31:47.973048
5237 / tcp
-2031469209 | 2025-03-28T08:47:38.028884
5238 / tcp
-98713449 | 2025-03-29T20:12:05.431376
5239 / tcp
-2031469209 | 2025-03-29T09:54:19.230724
5240 / tcp
-98713449 | 2025-03-29T04:23:49.998103
5241 / tcp
-2031469209 | 2025-03-28T23:13:53.379748
5242 / tcp
-98713449 | 2025-03-28T05:10:00.515459
5243 / tcp
-98713449 | 2025-03-29T13:39:00.931565
5244 / tcp
-2031469209 | 2025-03-29T20:28:09.969876
5245 / tcp
-98713449 | 2025-03-29T18:47:34.439380
5246 / tcp
-98713449 | 2025-03-29T12:24:18.991705
5247 / tcp
-98713449 | 2025-03-29T12:04:33.204107
5248 / tcp
-2031469209 | 2025-03-29T15:47:38.128637
5249 / tcp
-98713449 | 2025-03-29T09:54:30.790898
5250 / tcp
-2031469209 | 2025-03-29T16:19:40.567025
5251 / tcp
-2031469209 | 2025-03-28T10:27:28.675411
5252 / tcp
-98713449 | 2025-03-29T21:46:16.826724
5253 / tcp
-2031469209 | 2025-03-29T09:47:53.447435
5254 / tcp
-2031469209 | 2025-03-28T10:28:04.962159
5255 / tcp
-2031469209 | 2025-03-29T05:01:59.746726
5256 / tcp
-98713449 | 2025-03-29T09:49:44.439825
5257 / tcp
-98713449 | 2025-03-29T16:12:57.481499
5258 / tcp
-2031469209 | 2025-03-29T11:23:15.998406
5259 / tcp
-98713449 | 2025-03-28T04:05:13.823332
5260 / tcp
-98713449 | 2025-03-29T12:48:40.707379
5261 / tcp
-98713449 | 2025-03-28T14:04:27.211098
5262 / tcp
-98713449 | 2025-03-28T16:21:37.745808
5263 / tcp
-98713449 | 2025-03-29T01:57:35.862058
5264 / tcp
-98713449 | 2025-03-28T20:40:38.722474
5265 / tcp
-2031469209 | 2025-03-29T16:51:48.603384
5266 / tcp
-2031469209 | 2025-03-28T16:09:29.337130
5267 / tcp
-98713449 | 2025-03-29T13:38:05.505174
5268 / tcp
-98713449 | 2025-03-28T05:24:46.166262
5269 / tcp
-98713449 | 2025-03-29T17:57:29.840846
5270 / tcp
-2031469209 | 2025-03-28T16:55:07.268201
5271 / tcp
-98713449 | 2025-03-28T02:51:45.545713
5272 / tcp
-98713449 | 2025-03-29T19:36:31.615681
5273 / tcp
-2031469209 | 2025-03-18T21:33:42.063050
5274 / tcp
-2031469209 | 2025-03-29T10:48:59.593116
5275 / tcp
-2031469209 | 2025-03-29T15:45:17.647040
5276 / tcp
-98713449 | 2025-03-29T08:44:07.203488
5277 / tcp
-98713449 | 2025-03-29T02:52:39.782005
5278 / tcp
-98713449 | 2025-03-28T04:22:07.440536
5279 / tcp
-2031469209 | 2025-03-29T18:23:39.615796
5280 / tcp
-2031469209 | 2025-03-29T20:31:27.652122
5321 / tcp
-98713449 | 2025-03-29T16:42:26.278315
5351 / tcp
-98713449 | 2025-03-29T09:43:57.324262
5357 / tcp
-98713449 | 2025-03-31T13:33:54.829951
5400 / tcp
-98713449 | 2025-03-28T09:14:44.141028
5431 / tcp
-98713449 | 2025-03-29T15:10:36.018898
5432 / tcp
-726790289 | 2025-03-31T19:02:40.092968
5433 / tcp
-2031469209 | 2025-03-29T19:46:44.989985
5435 / tcp
-98713449 | 2025-04-01T01:21:11.387967
5439 / tcp
-2031469209 | 2025-03-29T15:35:11.807227
5440 / tcp
-98713449 | 2025-03-28T01:11:33.145292
5443 / tcp
-2031469209 | 2025-03-29T20:34:19.993076
5444 / tcp
-2031469209 | 2025-03-29T14:18:51.841304
5446 / tcp
-2031469209 | 2025-03-29T02:38:59.551661
5454 / tcp
-98713449 | 2025-03-29T12:46:10.539550
5456 / tcp
-2031469209 | 2025-03-22T21:44:01.175427
5494 / tcp
-98713449 | 2025-03-29T15:37:37.005045
5495 / tcp
-2031469209 | 2025-03-29T02:46:52.981280
5500 / tcp
-2031469209 | 2025-03-29T03:48:09.101226
5503 / tcp
-2031469209 | 2025-03-29T03:12:48.913753
5523 / tcp
-2031469209 | 2025-03-31T22:12:05.590780
5542 / tcp
-98713449 | 2025-03-29T03:48:49.597111
5543 / tcp
-98713449 | 2025-03-29T09:23:49.310045
5544 / tcp
-2031469209 | 2025-03-29T14:37:03.879143
5552 / tcp
-2031469209 | 2025-03-28T10:17:58.046806
5555 / tcp
1675216947 | 2025-03-16T12:25:49.147625
5556 / tcp
-98713449 | 2025-03-29T13:17:56.908332
5557 / tcp
-2031469209 | 2025-03-29T04:16:49.649494
5558 / tcp
-2031469209 | 2025-03-29T10:42:52.026891
5560 / tcp
-98713449 | 2025-03-31T13:38:59.067307
5567 / tcp
-2031469209 | 2025-03-29T15:29:52.878191
5568 / tcp
-98713449 | 2025-03-28T23:39:10.138277
5569 / tcp
-2031469209 | 2025-03-28T13:41:29.160837
5590 / tcp
-2031469209 | 2025-03-29T01:58:14.198381
5591 / tcp
-98713449 | 2025-03-29T12:13:13.146725
5592 / tcp
-2031469209 | 2025-03-28T01:55:26.807788
5593 / tcp
-2031469209 | 2025-03-29T14:27:39.970205
5594 / tcp
-98713449 | 2025-03-29T17:44:34.063442
5595 / tcp
-98713449 | 2025-03-29T20:43:19.433412
5596 / tcp
-2031469209 | 2025-03-28T23:27:53.868339
5597 / tcp
-98713449 | 2025-03-29T09:46:06.047135
5598 / tcp
-98713449 | 2025-03-29T04:41:10.267806
5599 / tcp
-98713449 | 2025-03-29T08:04:44.702958
5600 / tcp
-98713449 | 2025-03-28T16:45:46.000740
5601 / tcp
997310454 | 2025-03-29T21:33:06.330494
5602 / tcp
-98713449 | 2025-03-29T08:00:42.123102
5603 / tcp
-2031469209 | 2025-03-29T20:49:52.157154
5604 / tcp
-2031469209 | 2025-03-28T17:09:34.804155
5605 / tcp
-98713449 | 2025-03-29T15:04:40.109574
5606 / tcp
-98713449 | 2025-03-29T21:22:40.317425
5607 / tcp
-2031469209 | 2025-03-29T15:59:04.682919
5608 / tcp
-2031469209 | 2025-03-28T13:52:39.627620
5609 / tcp
-2031469209 | 2025-03-29T14:42:08.257656
5613 / tcp
-98713449 | 2025-03-28T07:41:09.168235
5614 / tcp
-98713449 | 2025-03-29T03:26:51.535783
5620 / tcp
-98713449 | 2025-03-22T06:06:25.441916
5630 / tcp
-98713449 | 2025-03-29T10:33:44.958783
5640 / tcp
-98713449 | 2025-03-29T08:40:55.532651
5650 / tcp
-98713449 | 2025-03-29T04:04:08.859602
5660 / tcp
-98713449 | 2025-03-29T21:08:56.408312
5671 / tcp
-98713449 | 2025-03-29T03:40:53.392170
5673 / tcp
-98713449 | 2025-03-29T04:43:57.452513
5678 / tcp
1561587376 | 2025-03-29T16:23:17.879501
5680 / tcp
-98713449 | 2025-03-29T07:55:22.169206
5696 / tcp
-2031469209 | 2025-03-28T05:47:00.118984
5698 / tcp
-98713449 | 2025-03-29T03:48:28.930161
5701 / tcp
-98713449 | 2025-03-29T19:48:26.644986
5721 / tcp
-2031469209 | 2025-03-29T17:45:08.380908
5800 / tcp
-98713449 | 2025-03-20T05:23:33.823383
5801 / tcp
-98713449 | 2025-03-31T13:33:20.637583
5804 / tcp
-2031469209 | 2025-03-28T08:35:44.338265
5822 / tcp
-2031469209 | 2025-03-29T20:42:15.419059
5853 / tcp
-2031469209 | 2025-03-29T12:32:55.315113
5858 / tcp
-2031469209 | 2025-03-31T20:59:51.020027
5900 / tcp
497968563 | 2025-03-20T10:31:28.987039
5901 / tcp
-98713449 | 2025-03-31T15:36:06.571949
5902 / tcp
-2031469209 | 2025-03-29T09:23:29.385324
5903 / tcp
-2031469209 | 2025-03-29T16:09:49.520020
5904 / tcp
-2031469209 | 2025-03-29T02:24:13.169358
5905 / tcp
-98713449 | 2025-03-29T11:50:36.881357
5906 / tcp
-2031469209 | 2025-03-28T05:11:37.961796
5907 / tcp
-2031469209 | 2025-03-29T12:49:23.818890
5908 / tcp
-98713449 | 2025-03-29T02:46:07.667154
5909 / tcp
-98713449 | 2025-03-29T20:07:49.313168
5910 / tcp
-2031469209 | 2025-03-31T14:12:50.221529
5911 / tcp
-2031469209 | 2025-03-28T20:48:22.437060
5912 / tcp
-98713449 | 2025-03-29T08:53:43.326370
5913 / tcp
-2031469209 | 2025-03-29T09:18:19.859790
5914 / tcp
-98713449 | 2025-03-28T22:09:24.781024
5915 / tcp
-98713449 | 2025-03-28T08:10:43.998996
5916 / tcp
-2031469209 | 2025-03-29T18:36:59.280950
5917 / tcp
-98713449 | 2025-03-29T13:41:38.918226
5918 / tcp
-98713449 | 2025-03-29T17:47:28.968383
5919 / tcp
-2031469209 | 2025-03-29T11:04:54.848517
5920 / tcp
-2031469209 | 2025-03-29T11:36:03.398310
5938 / tcp
-98713449 | 2025-03-31T15:19:59.818270
5984 / tcp
-453886593 | 2025-03-31T15:06:25.412576
5985 / tcp
-427937664 | 2025-03-31T15:42:34.940422
5986 / tcp
1922387288 | 2025-03-29T15:19:48.120661
5987 / tcp
-2031469209 | 2025-03-22T06:01:52.234497
5988 / tcp
-98713449 | 2025-03-29T11:19:28.071501
5989 / tcp
-2031469209 | 2025-03-29T11:30:38.568972
5990 / tcp
-98713449 | 2025-03-28T13:56:37.754879
5991 / tcp
-2031469209 | 2025-03-29T18:49:00.427001
5992 / tcp
-2031469209 | 2025-03-29T01:53:52.789667
5993 / tcp
-2031469209 | 2025-03-29T21:11:13.564362
5994 / tcp
-98713449 | 2025-03-29T02:23:54.721817
5995 / tcp
-98713449 | 2025-03-29T01:33:03.685267
5996 / tcp
-2031469209 | 2025-03-28T21:54:42.898075
5997 / tcp
-2031469209 | 2025-03-29T10:27:52.525994
5998 / tcp
-2031469209 | 2025-03-29T17:21:50.641199
5999 / tcp
-2031469209 | 2025-03-29T20:42:28.055205
6000 / tcp
-2031469209 | 2025-03-31T11:29:51.542870
6001 / tcp
-2031469209 | 2025-04-01T00:31:12.729733
6002 / tcp
-2031469209 | 2025-03-29T01:57:58.074459
6003 / tcp
-2031469209 | 2025-03-29T08:06:57.238539
6004 / tcp
-2031469209 | 2025-03-29T13:27:44.407838
6005 / tcp
-2031469209 | 2025-03-29T17:07:07.973538
6006 / tcp
-2031469209 | 2025-03-29T11:42:17.315814
6007 / tcp
-2031469209 | 2025-03-29T14:35:28.214453
6008 / tcp
-98713449 | 2025-03-29T09:06:25.664824
6009 / tcp
-98713449 | 2025-03-29T00:24:44.718573
6010 / tcp
-98713449 | 2025-03-29T10:57:52.323930
6011 / tcp
-98713449 | 2025-03-29T19:57:25.304938
6020 / tcp
-98713449 | 2025-03-28T20:48:01.185663
6021 / tcp
-2031469209 | 2025-03-28T16:13:50.650216
6022 / tcp
-98713449 | 2025-03-29T22:27:36.512098
6036 / tcp
-98713449 | 2025-03-29T03:36:34.212290
6050 / tcp
-2031469209 | 2025-03-29T08:39:00.383558
6060 / tcp
-2031469209 | 2025-03-29T08:17:53.089539
6061 / tcp
-2031469209 | 2025-03-29T21:00:26.091672
6070 / tcp
-2031469209 | 2025-03-29T09:48:26.227835
6080 / tcp
-2031469209 | 2025-03-31T09:33:44.926887
6081 / tcp
-2031469209 | 2025-03-28T17:33:52.685751
6100 / tcp
-98713449 | 2025-03-29T13:05:49.471747
6102 / tcp
-98713449 | 2025-03-29T12:08:19.398660
6134 / tcp
-2031469209 | 2025-03-31T17:57:54.053617
6161 / tcp
-2031469209 | 2025-03-29T17:29:27.939667
6262 / tcp
-2031469209 | 2025-03-28T18:58:32.349291
6264 / tcp
-98713449 | 2025-03-28T11:09:56.380397
6308 / tcp
-98713449 | 2025-03-29T15:00:15.362087
6331 / tcp
-98713449 | 2025-03-29T08:58:45.350058
6348 / tcp
-98713449 | 2025-03-29T02:58:41.163360
6352 / tcp
-2031469209 | 2025-03-29T09:47:23.735313
6363 / tcp
-2031469209 | 2025-03-29T20:53:22.888955
6379 / tcp
-1963419546 | 2025-03-31T19:16:26.912582
6400 / tcp
-98713449 | 2025-03-29T19:53:07.681380
6405 / tcp
-2031469209 | 2025-03-29T20:57:56.621505
6433 / tcp
-98713449 | 2025-03-29T11:38:36.481159
6440 / tcp
-98713449 | 2025-03-29T17:38:46.274074
6443 / tcp
411540654 | 2025-03-31T10:40:18.715358
6482 / tcp
-98713449 | 2025-03-29T18:16:48.341345
6488 / tcp
-2031469209 | 2025-03-29T12:56:04.035257
6500 / tcp
-98713449 | 2025-03-29T04:18:10.644266
6503 / tcp
-2031469209 | 2025-03-29T20:47:47.415746
6505 / tcp
-98713449 | 2025-03-28T15:58:55.122887
6510 / tcp
-98713449 | 2025-03-29T14:51:08.732199
6511 / tcp
-98713449 | 2025-03-29T17:40:17.096298
6512 / tcp
-98713449 | 2025-03-28T05:27:01.778991
6513 / tcp
-2031469209 | 2025-03-29T20:44:23.229788
6514 / tcp
-98713449 | 2025-03-29T04:56:21.272320
6543 / tcp
-2031469209 | 2025-03-29T07:51:44.816432
6544 / tcp
-2031469209 | 2025-03-29T20:32:00.577465
6550 / tcp
-2031469209 | 2025-03-29T03:43:35.891346
6556 / tcp
-2031469209 | 2025-03-29T06:23:42.499691
6560 / tcp
-98713449 | 2025-03-29T05:11:39.008170
6561 / tcp
-98713449 | 2025-03-29T03:30:17.973290
6565 / tcp
-98713449 | 2025-03-28T08:45:24.167834
6580 / tcp
-2031469209 | 2025-03-28T09:55:52.770588
6581 / tcp
-98713449 | 2025-03-29T15:34:33.827877
6588 / tcp
-2031469209 | 2025-03-29T11:04:20.412802
6590 / tcp
-2031469209 | 2025-03-29T04:04:37.330643
6600 / tcp
-98713449 | 2025-03-29T20:13:42.006624
6601 / tcp
-2031469209 | 2025-03-28T23:07:15.960510
6602 / tcp
-2031469209 | 2025-03-29T03:12:31.355410
6603 / tcp
-2031469209 | 2025-03-29T20:25:36.988311
6605 / tcp
-98713449 | 2025-03-29T03:56:18.488679
6622 / tcp
-2031469209 | 2025-03-28T19:53:37.482631
6633 / tcp
-98713449 | 2025-03-31T23:26:15.172250
6650 / tcp
-98713449 | 2025-03-28T12:28:03.255484
6653 / tcp
-2031469209 | 2025-03-31T23:02:22.499436
6661 / tcp
-2031469209 | 2025-03-29T02:48:42.802411
6662 / tcp
-2031469209 | 2025-03-29T15:19:04.124755
6664 / tcp
-2031469209 | 2025-03-29T09:44:03.103466
6666 / tcp
-2031469209 | 2025-03-31T19:39:38.471480
6667 / tcp
-2031469209 | 2025-03-31T12:02:25.146917
6668 / tcp
-2031469209 | 2025-03-31T21:13:51.014898
6686 / tcp
-2031469209 | 2025-03-29T10:48:03.097546
6688 / tcp
-98713449 | 2025-03-29T12:02:55.742189
6697 / tcp
-2031469209 | 2025-03-31T12:15:54.082571
6699 / tcp
-2031469209 | 2025-03-29T09:49:49.555070
6700 / tcp
-2031469209 | 2025-03-28T23:30:49.427288
6748 / tcp
-98713449 | 2025-03-29T08:25:57.680017
6755 / tcp
-98713449 | 2025-03-29T09:00:18.428473
6775 / tcp
-98713449 | 2025-03-28T09:28:18.639403
6779 / tcp
-98713449 | 2025-03-28T01:18:00.601582
6789 / tcp
-2031469209 | 2025-03-29T01:21:59.121678
6799 / tcp
-98713449 | 2025-03-29T01:41:43.936183
6887 / tcp
-98713449 | 2025-03-28T21:25:21.779702
6955 / tcp
-2031469209 | 2025-03-29T21:20:35.230490
6998 / tcp
-2031469209 | 2025-03-29T04:45:12.606308
7000 / tcp
-2031469209 | 2025-03-28T22:56:55.694541
7001 / tcp
-1572713806 | 2025-03-31T19:16:35.004286
7002 / tcp
-2031469209 | 2025-03-29T20:41:37.845753
7003 / tcp
-98713449 | 2025-03-29T15:17:47.881606
7004 / tcp
-2031469209 | 2025-03-23T17:57:02.072765
7005 / tcp
-98713449 | 2025-03-29T12:17:19.777051
7006 / tcp
-98713449 | 2025-03-28T21:35:55.983189
7007 / tcp
-98713449 | 2025-03-29T03:50:16.130077
7010 / tcp
-98713449 | 2025-03-29T02:59:20.938827
7011 / tcp
-2031469209 | 2025-03-28T17:42:51.199713
7012 / tcp
-2031469209 | 2025-03-29T18:37:38.856417
7013 / tcp
-2031469209 | 2025-03-29T16:38:29.372581
7014 / tcp
-98713449 | 2025-03-29T18:16:13.197619
7015 / tcp
-2031469209 | 2025-03-29T14:35:19.545096
7016 / tcp
-98713449 | 2025-03-29T10:06:40.164654
7018 / tcp
-98713449 | 2025-03-29T16:08:11.992382
7020 / tcp
-2031469209 | 2025-03-29T05:13:23.627941
7021 / tcp
-98713449 | 2025-03-29T16:18:06.289416
7022 / tcp
-2031469209 | 2025-03-29T01:55:06.322991
7025 / tcp
-2031469209 | 2025-03-29T19:44:09.037633
7050 / tcp
-98713449 | 2025-03-29T11:10:49.923101
7057 / tcp
-98713449 | 2025-03-28T10:20:40.608626
7070 / tcp
-98713449 | 2025-03-29T13:53:44.060149
7071 / tcp
411540654 | 2025-04-01T00:18:54.246538
7078 / tcp
-98713449 | 2025-03-29T19:52:38.197235
7079 / tcp
-98713449 | 2025-03-23T12:13:10.898695
7080 / tcp
-2031469209 | 2025-03-29T12:07:20.989639
7081 / tcp
-98713449 | 2025-03-29T11:40:57.514314
7082 / tcp
-98713449 | 2025-03-28T14:05:36.322178
7083 / tcp
-98713449 | 2025-03-29T11:30:17.215182
7084 / tcp
-2031469209 | 2025-03-28T15:39:55.582495
7085 / tcp
-2031469209 | 2025-03-29T21:02:26.186911
7086 / tcp
-2031469209 | 2025-03-29T09:42:20.101018
7087 / tcp
-98713449 | 2025-03-29T11:31:08.128520
7088 / tcp
-98713449 | 2025-03-29T04:13:33.144005
7090 / tcp
-98713449 | 2025-03-29T08:32:28.992203
7100 / tcp
-2031469209 | 2025-03-28T07:12:46.478145
7102 / tcp
-98713449 | 2025-03-29T16:14:15.420339
7105 / tcp
-98713449 | 2025-03-29T15:04:15.704182
7170 / tcp
-98713449 | 2025-03-29T20:51:09.348039
7171 / tcp
-2031469209 | 2025-03-31T21:32:54.857523
7172 / tcp
-2031469209 | 2025-03-28T13:11:06.182100
7173 / tcp
-98713449 | 2025-03-28T20:47:00.118055
7218 / tcp
-98713449 | 2025-03-29T09:37:09.863022
7272 / tcp
-2031469209 | 2025-03-29T08:45:56.938711
7283 / tcp
-2031469209 | 2025-03-29T17:01:28.092750
7302 / tcp
-98713449 | 2025-03-29T16:50:00.403072
7325 / tcp
-98713449 | 2025-03-29T11:21:02.624887
7331 / tcp
-2031469209 | 2025-03-29T13:51:26.253593
7348 / tcp
-98713449 | 2025-03-28T06:56:42.773100
7349 / tcp
-2031469209 | 2025-03-29T04:36:00.894826
7373 / tcp
-98713449 | 2025-03-29T15:22:04.840294
7401 / tcp
-2031469209 | 2025-03-29T02:21:57.624121
7403 / tcp
-98713449 | 2025-03-28T16:22:31.684832
7433 / tcp
-2031469209 | 2025-03-29T04:42:25.034961
7434 / tcp
1094048410 | 2025-03-31T20:37:33.010164
7441 / tcp
-2031469209 | 2025-03-28T14:09:08.443759
7443 / tcp
411540654 | 2025-03-31T16:16:22.184617
7444 / tcp
-98713449 | 2025-03-28T21:53:23.252582
7445 / tcp
-98713449 | 2025-03-29T13:44:40.267381
7465 / tcp
-98713449 | 2025-03-29T04:27:17.760523
7473 / tcp
-2031469209 | 2025-03-29T12:19:39.673256
7474 / tcp
2105495716 | 2025-03-31T15:01:38.738214
7480 / tcp
-98713449 | 2025-03-29T08:05:59.082929
7493 / tcp
-2031469209 | 2025-03-29T01:50:28.443959
7500 / tcp
-98713449 | 2025-03-29T03:43:13.824014
7510 / tcp
-98713449 | 2025-03-28T20:57:37.982227
7535 / tcp
-98713449 | 2025-03-29T12:07:57.591730
7537 / tcp
-98713449 | 2025-03-29T11:37:38.184817
7547 / tcp
430537855 | 2025-03-29T10:01:37.418829
7548 / tcp
411540654 | 2025-03-29T10:21:18.808109
7601 / tcp
-2031469209 | 2025-03-28T01:56:53.500940
7603 / tcp
-98713449 | 2025-03-29T10:59:57.132454
7634 / tcp
-98713449 | 2025-03-31T20:21:58.662153
7654 / tcp
-2031469209 | 2025-03-29T02:49:29.523643
7657 / tcp
-98713449 | 2025-03-29T03:29:26.318629
7676 / tcp
-98713449 | 2025-03-29T16:42:44.545502
7687 / tcp
-2031469209 | 2025-03-29T17:52:55.078924
7700 / tcp
-98713449 | 2025-03-29T01:48:33.330889
7771 / tcp
-2031469209 | 2025-03-29T12:12:39.620961
7773 / tcp
-98713449 | 2025-03-29T09:37:56.724601
7774 / tcp
-98713449 | 2025-03-29T10:32:45.328193
7775 / tcp
-98713449 | 2025-03-29T16:31:01.843022
7776 / tcp
-98713449 | 2025-03-29T02:24:35.529036
7777 / tcp
-98713449 | 2025-03-29T10:21:56.256541
7778 / tcp
-98713449 | 2025-03-29T08:40:28.104525
7779 / tcp
-2031469209 | 2025-03-31T17:36:02.987130
7780 / tcp
-98713449 | 2025-03-28T11:40:10.115280
7782 / tcp
-98713449 | 2025-03-29T12:53:33.627724
7788 / tcp
-2031469209 | 2025-03-28T04:09:03.051102
7790 / tcp
-2031469209 | 2025-03-29T04:28:59.669961
7799 / tcp
-98713449 | 2025-03-29T20:16:02.128909
7801 / tcp
-98713449 | 2025-03-29T19:08:14.826560
7822 / tcp
-98713449 | 2025-03-29T09:00:14.830869
7878 / tcp
-98713449 | 2025-03-29T01:28:52.157589
7887 / tcp
-98713449 | 2025-03-29T17:14:09.697190
7900 / tcp
-98713449 | 2025-03-29T12:11:47.436580
7946 / tcp
-2031469209 | 2025-03-29T12:54:58.669068
7979 / tcp
-2031469209 | 2025-03-29T04:07:01.604463
7980 / tcp
-98713449 | 2025-03-29T02:20:32.039465
7989 / tcp
-98713449 | 2025-03-31T20:48:14.912805
7998 / tcp
-98713449 | 2025-03-29T16:06:22.915229
7999 / tcp
-98713449 | 2025-03-29T11:23:42.014108
8000 / tcp
1832614531 | 2025-03-31T14:32:14.687676
8001 / tcp
1638073473 | 2025-03-29T09:08:19.969173
8002 / tcp
777756849 | 2025-03-28T20:30:10.536986
8003 / tcp
1638073473 | 2025-03-29T20:40:07.661647
8004 / tcp
1638073473 | 2025-03-29T14:13:03.850383
8005 / tcp
1638073473 | 2025-03-29T09:21:24.069264
8006 / tcp
1638073473 | 2025-03-29T05:31:38.070979
8007 / tcp
1638073473 | 2025-03-29T15:13:57.061176
8008 / tcp
-207704745 | 2025-03-31T20:30:50.141798
8010 / tcp
-207704745 | 2025-03-31T09:52:28.953276
8011 / tcp
-98713449 | 2025-03-29T00:24:02.511195
8012 / tcp
-2031469209 | 2025-03-29T03:28:22.647653
8013 / tcp
-2031469209 | 2025-03-29T09:52:57.525026
8014 / tcp
-2031469209 | 2025-03-28T17:53:01.410683
8015 / tcp
-98713449 | 2025-03-29T15:59:30.528686
8016 / tcp
-2031469209 | 2025-03-28T19:27:47.426108
8017 / tcp
-98713449 | 2025-03-29T19:15:36.703769
8018 / tcp
-98713449 | 2025-03-29T16:31:53.464701
8019 / tcp
-98713449 | 2025-03-29T18:28:34.076024
8020 / tcp
-98713449 | 2025-03-29T18:29:36.223526
8021 / tcp
-2031469209 | 2025-03-29T11:31:51.944948
8022 / tcp
-336938356 | 2025-03-29T15:01:18.056595
8023 / tcp
-2031469209 | 2025-03-29T08:40:22.843634
8024 / tcp
-2031469209 | 2025-03-29T19:14:50.056683
8025 / tcp
-98713449 | 2025-03-29T01:42:28.307338
8026 / tcp
-2031469209 | 2025-03-29T15:48:29.300223
8027 / tcp
-2031469209 | 2025-03-29T20:44:57.626866
8028 / tcp
-98713449 | 2025-03-29T20:28:37.498480
8029 / tcp
-2031469209 | 2025-03-29T13:54:30.923964
8030 / tcp
-98713449 | 2025-03-29T03:38:52.145018
8031 / tcp
-2031469209 | 2025-03-28T07:14:07.000224
8032 / tcp
-2031469209 | 2025-03-29T16:26:58.471701
8033 / tcp
-98713449 | 2025-03-31T20:09:20.640238
8034 / tcp
-2031469209 | 2025-03-29T01:38:14.489611
8035 / tcp
-98713449 | 2025-03-29T18:59:10.759755
8036 / tcp
-2031469209 | 2025-03-29T18:45:23.389010
8037 / tcp
-98713449 | 2025-03-28T16:47:39.157952
8038 / tcp
-98713449 | 2025-03-29T11:31:14.360813
8039 / tcp
-2031469209 | 2025-03-29T16:48:26.257511
8040 / tcp
-2031469209 | 2025-03-29T20:23:50.999330
8041 / tcp
-98713449 | 2025-03-29T08:33:35.887327
8042 / tcp
-1843295204 | 2025-03-29T15:05:44.672073
8043 / tcp
-98713449 | 2025-03-29T15:30:56.497759
8044 / tcp
-2031469209 | 2025-03-29T08:50:22.800855
8045 / tcp
-2031469209 | 2025-03-28T22:19:20.381360
8046 / tcp
-2031469209 | 2025-03-29T08:04:09.809206
8047 / tcp
-98713449 | 2025-03-29T02:22:44.943502
8048 / tcp
-98713449 | 2025-03-29T14:21:33.047799
8049 / tcp
-98713449 | 2025-03-28T15:34:08.535284
8050 / tcp
-2031469209 | 2025-03-22T01:55:08.175549
8051 / tcp
414005480 | 2025-03-29T21:01:12.610790
8052 / tcp
-2031469209 | 2025-03-29T19:56:42.232455
8053 / tcp
-98713449 | 2025-03-29T16:22:21.003771
8054 / tcp
-98713449 | 2025-03-29T03:24:47.063223
8055 / tcp
-98713449 | 2025-03-29T03:27:33.896832
8056 / tcp
-98713449 | 2025-03-29T10:41:24.444175
8057 / tcp
-98713449 | 2025-03-29T18:22:33.535198
8058 / tcp
-2031469209 | 2025-03-28T08:28:30.280487
8059 / tcp
-98713449 | 2025-03-29T13:59:42.956154
8060 / tcp
-98713449 | 2025-03-31T22:17:06.542949
8061 / tcp
-98713449 | 2025-03-29T16:29:07.896017
8062 / tcp
-98713449 | 2025-03-29T11:06:52.276514
8063 / tcp
-98713449 | 2025-03-29T11:16:05.544752
8064 / tcp
-2031469209 | 2025-03-28T23:44:09.241381
8065 / tcp
-98713449 | 2025-03-29T13:19:27.814085
8066 / tcp
-2031469209 | 2025-03-28T13:45:27.552862
8067 / tcp
-2031469209 | 2025-03-29T10:15:06.293682
8068 / tcp
-2031469209 | 2025-03-29T19:56:59.726218
8069 / tcp
-98713449 | 2025-03-31T19:47:15.940226
8070 / tcp
-98713449 | 2025-03-29T14:14:10.274360
8071 / tcp
-98713449 | 2025-03-29T01:54:44.585848
8072 / tcp
-2031469209 | 2025-03-29T11:23:13.810298
8073 / tcp
-2031469209 | 2025-03-28T21:44:48.321492
8074 / tcp
-98713449 | 2025-03-29T20:46:43.172980
8075 / tcp
-2031469209 | 2025-03-29T04:49:28.478477
8076 / tcp
-2031469209 | 2025-03-29T05:11:07.634631
8077 / tcp
-98713449 | 2025-03-28T10:29:02.580858
8078 / tcp
-2031469209 | 2025-03-29T08:05:27.807497
8079 / tcp
-98713449 | 2025-03-29T03:04:38.641046
8080 / tcp
-1572713806 | 2025-03-31T17:55:13.127002
8082 / tcp
1023643010 | 2025-03-29T17:01:35.223955
8084 / tcp
1638073473 | 2025-03-29T11:37:17.983199
8086 / tcp
-207704745 | 2025-03-31T07:29:26.667810
8089 / tcp
1813028183 | 2025-03-31T23:32:48.722195
8090 / tcp
1685468267 | 2025-03-31T20:32:46.422718
8091 / tcp
-98713449 | 2025-03-29T16:09:20.190993
8092 / tcp
-2031469209 | 2025-03-28T13:26:22.729749
8093 / tcp
777756849 | 2025-03-28T05:34:09.222440
8094 / tcp
-98713449 | 2025-03-28T02:19:57.062804
8095 / tcp
-1222558326 | 2025-03-29T11:02:05.533860
8096 / tcp
-2031469209 | 2025-03-23T15:46:19.409712
8097 / tcp
-98713449 | 2025-03-29T13:33:17.566945
8098 / tcp
-98713449 | 2025-03-31T13:58:04.226704
8099 / tcp
901475780 | 2025-03-31T19:04:36.172210
8100 / tcp
-2031469209 | 2025-03-29T10:08:59.631254
8101 / tcp
-98713449 | 2025-03-29T09:19:43.380964
8102 / tcp
-98713449 | 2025-03-31T21:04:05.733544
8103 / tcp
-2031469209 | 2025-03-28T16:08:22.498338
8104 / tcp
-98713449 | 2025-03-29T01:31:53.072612
8105 / tcp
-98713449 | 2025-03-28T14:00:35.727863
8106 / tcp
-2031469209 | 2025-03-29T16:07:59.307102
8107 / tcp
-2031469209 | 2025-03-28T14:27:22.107635
8108 / tcp
-98713449 | 2025-03-29T03:42:24.266047
8109 / tcp
-98713449 | 2025-03-29T03:03:00.262082
8110 / tcp
-2031469209 | 2025-03-29T17:22:06.920883
8111 / tcp
-98713449 | 2025-03-28T06:39:28.120785
8112 / tcp
-2031469209 | 2025-03-31T21:52:59.838075
8113 / tcp
-98713449 | 2025-03-28T02:08:47.515321
8114 / tcp
-2031469209 | 2025-03-29T14:13:45.452510
8115 / tcp
-98713449 | 2025-03-29T14:43:56.445894
8116 / tcp
-98713449 | 2025-03-29T21:18:59.576216
8117 / tcp
-98713449 | 2025-03-29T05:15:40.105643
8118 / tcp
-98713449 | 2025-03-29T18:42:37.136952
8120 / tcp
-98713449 | 2025-03-29T10:03:43.251472
8121 / tcp
-98713449 | 2025-03-29T13:17:21.806384
8122 / tcp
-2031469209 | 2025-03-28T07:42:08.205167
8123 / tcp
-98713449 | 2025-03-31T14:36:33.239123
8124 / tcp
-2031469209 | 2025-03-28T06:01:43.100408
8125 / tcp
-2031469209 | 2025-03-29T11:00:22.135634
8126 / tcp
-98713449 | 2025-03-31T19:41:31.157203
8128 / tcp
-2031469209 | 2025-03-28T12:15:13.565622
8129 / tcp
-2031469209 | 2025-03-23T09:30:49.393265
8130 / tcp
-98713449 | 2025-03-29T15:12:15.819612
8131 / tcp
-98713449 | 2025-03-28T19:21:13.516396
8132 / tcp
-98713449 | 2025-03-28T05:05:23.253857
8133 / tcp
-98713449 | 2025-03-29T00:39:47.054127
8134 / tcp
-98713449 | 2025-03-29T18:24:12.628405
8135 / tcp
-98713449 | 2025-03-29T15:30:16.657052
8136 / tcp
-98713449 | 2025-03-19T18:54:01.855354
8137 / tcp
-98713449 | 2025-03-29T17:52:59.930666
8138 / tcp
-2031469209 | 2025-03-29T17:13:56.465874
8139 / tcp
1094048410 | 2025-03-31T19:19:11.725910
8140 / tcp
411540654 | 2025-03-29T04:42:34.595409
8141 / tcp
-2031469209 | 2025-03-29T08:02:01.273671
8142 / tcp
-98713449 | 2025-03-29T04:19:00.224276
8143 / tcp
-98713449 | 2025-03-31T21:58:10.232513
8144 / tcp
-98713449 | 2025-03-29T09:53:38.145654
8145 / tcp
-2031469209 | 2025-03-29T19:34:37.573413
8146 / tcp
-98713449 | 2025-03-31T18:27:15.685615
8147 / tcp
-2031469209 | 2025-03-31T14:23:50.439133
8148 / tcp
-98713449 | 2025-03-31T14:09:44.548030
8149 / tcp
-2031469209 | 2025-03-29T12:49:01.670301
8150 / tcp
-2031469209 | 2025-03-31T21:09:29.651533
8151 / tcp
-98713449 | 2025-03-31T10:08:49.748003
8152 / tcp
-98713449 | 2025-03-31T15:53:45.204768
8153 / tcp
-98713449 | 2025-03-29T01:45:52.077643
8154 / tcp
-2031469209 | 2025-03-31T22:12:18.746103
8155 / tcp
-2031469209 | 2025-03-31T18:08:21.365503
8156 / tcp
-2031469209 | 2025-03-31T17:28:39.861961
8157 / tcp
-98713449 | 2025-03-31T20:54:36.453214
8158 / tcp
-98713449 | 2025-03-29T04:22:51.929726
8160 / tcp
-98713449 | 2025-03-31T21:32:58.818971
8161 / tcp
414005480 | 2025-03-28T07:35:14.178902
8162 / tcp
-2031469209 | 2025-03-31T20:09:03.776814
8163 / tcp
-2031469209 | 2025-03-31T21:35:22.978146
8164 / tcp
-2031469209 | 2025-04-01T00:28:58.852536
8165 / tcp
-98713449 | 2025-03-29T03:35:22.074608
8166 / tcp
-2031469209 | 2025-03-31T23:32:41.848892
8167 / tcp
-2031469209 | 2025-03-31T23:22:37.365888
8168 / tcp
-2031469209 | 2025-03-31T21:20:48.810069
8169 / tcp
-98713449 | 2025-03-31T20:06:25.973221
8170 / tcp
-2031469209 | 2025-03-31T10:15:33.760324
8171 / tcp
-98713449 | 2025-03-31T20:25:31.521380
8172 / tcp
-98713449 | 2025-03-29T18:55:30.607049
8173 / tcp
-98713449 | 2025-03-29T14:01:37.829819
8174 / tcp
-98713449 | 2025-03-31T15:22:00.197910
8175 / tcp
-98713449 | 2025-03-29T09:26:27.911587
8176 / tcp
-98713449 | 2025-03-29T15:30:23.726176
8177 / tcp
-98713449 | 2025-03-29T04:25:14.920048
8178 / tcp
-98713449 | 2025-03-29T15:43:58.084370
8179 / tcp
-98713449 | 2025-03-29T09:33:16.396464
8180 / tcp
-98713449 | 2025-03-29T12:27:15.328573
8181 / tcp
-853934447 | 2025-03-31T13:07:44.033168
8182 / tcp
-98713449 | 2025-03-29T14:37:36.027923
8183 / tcp
-2031469209 | 2025-03-29T21:21:20.067946
8184 / tcp
-98713449 | 2025-03-28T13:23:07.069304
8185 / tcp
-98713449 | 2025-03-29T08:53:43.424457
8186 / tcp
-2031469209 | 2025-03-28T16:30:17.670213
8187 / tcp
-2031469209 | 2025-03-29T08:54:46.693278
8188 / tcp
-2031469209 | 2025-03-31T16:35:20.180018
8189 / tcp
-2031469209 | 2025-03-29T21:00:00.557024
8190 / tcp
-2031469209 | 2025-03-28T18:30:43.879427
8191 / tcp
-98713449 | 2025-03-28T06:15:52.845498
8192 / tcp
-98713449 | 2025-03-29T19:47:01.439803
8193 / tcp
-98713449 | 2025-03-29T03:51:14.933129
8194 / tcp
-2031469209 | 2025-03-28T17:36:59.723363
8195 / tcp
-98713449 | 2025-03-29T03:41:38.195096
8196 / tcp
-2031469209 | 2025-03-28T01:37:37.511306
8197 / tcp
-98713449 | 2025-03-29T03:52:21.207128
8198 / tcp
-2031469209 | 2025-03-26T14:50:09.143395
8199 / tcp
-98713449 | 2025-03-29T09:31:33.519194
8200 / tcp
-2031469209 | 2025-03-31T17:18:27.962361
8203 / tcp
-98713449 | 2025-03-29T20:59:13.092972
8222 / tcp
-98713449 | 2025-03-29T17:14:46.046182
8230 / tcp
-98713449 | 2025-03-29T08:30:49.163423
8236 / tcp
-2031469209 | 2025-03-29T09:49:51.130489
8237 / tcp
-2031469209 | 2025-03-28T21:06:53.050554
8238 / tcp
-98713449 | 2025-03-29T17:57:59.430870
8239 / tcp
-98713449 | 2025-03-28T04:24:06.800244
8241 / tcp
-98713449 | 2025-03-28T14:01:58.294463
8243 / tcp
-2031469209 | 2025-03-28T01:45:13.154167
8248 / tcp
-98713449 | 2025-03-29T03:24:18.574842
8249 / tcp
-2031469209 | 2025-03-29T02:25:20.534272
8250 / tcp
-2031469209 | 2025-03-28T14:39:58.410717
8251 / tcp
-98713449 | 2025-03-29T08:01:18.676298
8252 / tcp
-98713449 | 2025-03-28T05:54:08.501904
8280 / tcp
-2031469209 | 2025-03-29T19:07:24.510189
8282 / tcp
-2031469209 | 2025-03-29T12:45:48.474549
8283 / tcp
-2031469209 | 2025-03-29T12:46:34.440107
8284 / tcp
-2031469209 | 2025-03-29T05:29:53.397039
8285 / tcp
-2031469209 | 2025-03-29T18:30:43.780539
8291 / tcp
1191162421 | 2025-03-31T15:08:29.026668
8300 / tcp
-2031469209 | 2025-03-31T11:58:59.260303
8315 / tcp
-2031469209 | 2025-03-29T08:48:51.601678
8316 / tcp
-98713449 | 2025-03-29T10:55:47.500567
8317 / tcp
-98713449 | 2025-03-29T05:14:03.338542
8318 / tcp
-2031469209 | 2025-03-29T10:28:13.584730
8319 / tcp
-98713449 | 2025-03-29T02:07:58.351672
8322 / tcp
-98713449 | 2025-03-28T01:29:46.239607
8333 / tcp
-98713449 | 2025-03-31T18:52:19.619117
8334 / tcp
-98713449 | 2025-03-29T03:57:03.115818
8340 / tcp
-2031469209 | 2025-03-29T17:55:50.770525
8343 / tcp
-98713449 | 2025-03-28T13:28:45.668683
8350 / tcp
-98713449 | 2025-03-29T20:59:07.020181
8381 / tcp
-2031469209 | 2025-03-29T11:20:40.947056
8382 / tcp
-2031469209 | 2025-03-29T16:49:40.736168
8384 / tcp
-2031469209 | 2025-03-29T15:33:01.040205
8385 / tcp
-98713449 | 2025-03-29T20:31:06.917901
8388 / tcp
-98713449 | 2025-03-28T04:24:27.345471
8393 / tcp
-98713449 | 2025-03-29T14:05:32.509055
8401 / tcp
-98713449 | 2025-03-28T06:12:29.448708
8402 / tcp
-98713449 | 2025-03-29T14:46:50.360335
8403 / tcp
-2031469209 | 2025-03-29T13:21:06.103912
8404 / tcp
-2031469209 | 2025-03-28T02:51:26.999831
8405 / tcp
-2031469209 | 2025-03-29T20:21:12.014651
8406 / tcp
-98713449 | 2025-03-29T12:12:05.829837
8407 / tcp
-2031469209 | 2025-03-29T09:59:10.758766
8408 / tcp
-98713449 | 2025-03-29T04:59:36.690007
8409 / tcp
-98713449 | 2025-03-29T00:33:16.228836
8410 / tcp
-98713449 | 2025-03-29T12:49:31.670744
8411 / tcp
-2031469209 | 2025-03-29T04:15:05.235120
8412 / tcp
-98713449 | 2025-03-29T01:39:40.814755
8413 / tcp
-98713449 | 2025-03-29T11:34:55.228536
8414 / tcp
-98713449 | 2025-03-28T13:19:22.339829
8415 / tcp
-98713449 | 2025-03-29T15:26:43.637348
8416 / tcp
-98713449 | 2025-03-29T20:29:18.897616
8417 / tcp
-98713449 | 2025-03-28T12:44:11.437125
8418 / tcp
-2031469209 | 2025-03-28T01:07:59.762143
8419 / tcp
-98713449 | 2025-03-29T08:21:53.634400
8420 / tcp
-2031469209 | 2025-03-29T19:42:28.680128
8421 / tcp
-98713449 | 2025-03-29T13:53:08.377400
8423 / tcp
-98713449 | 2025-03-29T12:52:35.654414
8424 / tcp
-98713449 | 2025-03-28T12:43:12.000653
8425 / tcp
-2031469209 | 2025-03-29T20:16:19.888790
8426 / tcp
-2031469209 | 2025-03-29T02:13:35.072970
8427 / tcp
-2031469209 | 2025-03-29T16:55:03.800389
8428 / tcp
-98713449 | 2025-03-28T12:53:14.490614
8429 / tcp
-2031469209 | 2025-03-29T21:30:59.605444
8430 / tcp
-98713449 | 2025-03-29T20:51:43.200564
8431 / tcp
-98713449 | 2025-03-29T08:02:51.297862
8432 / tcp
-2031469209 | 2025-03-28T19:20:28.966542
8433 / tcp
-2031469209 | 2025-03-29T11:49:30.096338
8434 / tcp
-98713449 | 2025-03-29T19:45:44.068816
8435 / tcp
-98713449 | 2025-03-28T23:47:11.587060
8436 / tcp
-98713449 | 2025-03-29T04:54:05.288318
8440 / tcp
-2031469209 | 2025-03-29T09:37:28.179576
8441 / tcp
-98713449 | 2025-03-29T05:32:29.514719
8442 / tcp
-98713449 | 2025-03-28T22:07:01.638061
8443 / tcp
-431430815 | 2025-03-31T05:59:36.983799
8444 / tcp
-98713449 | 2025-03-29T01:36:42.814317
8445 / tcp
-98713449 | 2025-03-29T01:46:22.480580
8446 / tcp
-98713449 | 2025-03-29T08:29:50.465871
8447 / tcp
-98713449 | 2025-03-29T19:51:16.541920
8448 / tcp
-98713449 | 2025-03-28T13:34:10.885749
8449 / tcp
-98713449 | 2025-03-29T13:24:50.977441
8450 / tcp
-2031469209 | 2025-03-29T08:44:47.096513
8451 / tcp
-2031469209 | 2025-03-28T01:22:53.099216
8452 / tcp
-98713449 | 2025-03-28T02:42:52.200037
8453 / tcp
-2031469209 | 2025-03-28T18:06:29.618745
8454 / tcp
-98713449 | 2025-03-29T22:17:40.609141
8455 / tcp
-98713449 | 2025-03-29T15:04:21.936027
8456 / tcp
-2031469209 | 2025-03-29T10:48:13.071027
8457 / tcp
-98713449 | 2025-03-29T20:39:28.574482
8458 / tcp
-2031469209 | 2025-03-29T01:22:13.606137
8459 / tcp
-98713449 | 2025-03-29T04:12:09.287297
8460 / tcp
-2031469209 | 2025-03-29T12:15:05.133457
8461 / tcp
-2031469209 | 2025-03-29T09:29:18.581551
8462 / tcp
-98713449 | 2025-03-29T18:04:13.271782
8463 / tcp
-2031469209 | 2025-03-29T16:10:53.079550
8464 / tcp
-98713449 | 2025-03-29T04:56:37.221849
8465 / tcp
-2031469209 | 2025-03-28T11:38:40.935577
8467 / tcp
-98713449 | 2025-03-29T10:05:33.794219
8470 / tcp
-98713449 | 2025-03-29T00:31:20.673392
8472 / tcp
-98713449 | 2025-03-29T20:21:18.386805
8473 / tcp
-98713449 | 2025-03-29T20:43:11.790953
8475 / tcp
-2031469209 | 2025-03-28T09:38:40.377793
8480 / tcp
-2031469209 | 2025-03-29T20:13:24.318450
8481 / tcp
-98713449 | 2025-03-29T18:50:05.574564
8482 / tcp
-2031469209 | 2025-03-29T09:06:00.956651
8484 / tcp
-98713449 | 2025-03-29T01:33:38.153889
8485 / tcp
-2031469209 | 2025-03-29T11:03:33.441031
8488 / tcp
-98713449 | 2025-03-29T18:34:28.218329
8493 / tcp
-98713449 | 2025-03-29T10:45:40.603246
8494 / tcp
-98713449 | 2025-03-29T18:35:19.085302
8500 / tcp
411540654 | 2025-03-29T12:14:30.506070
8501 / tcp
-98713449 | 2025-03-29T02:31:07.998648
8502 / tcp
-2031469209 | 2025-03-29T01:49:05.055816
8503 / tcp
-2031469209 | 2025-03-28T15:49:17.867889
8504 / tcp
-2031469209 | 2025-03-29T20:00:17.650311
8505 / tcp
-2031469209 | 2025-03-29T20:30:25.667608
8506 / tcp
-2031469209 | 2025-03-28T13:52:32.496254
8510 / tcp
-2031469209 | 2025-03-29T16:51:25.849316
8513 / tcp
-2031469209 | 2025-03-29T19:08:09.033920
8514 / tcp
-98713449 | 2025-03-29T14:06:52.014163
8515 / tcp
-2031469209 | 2025-03-29T16:54:37.171430
8519 / tcp
-98713449 | 2025-03-28T05:44:19.618596
8520 / tcp
-2031469209 | 2025-03-29T10:47:54.877412
8521 / tcp
-98713449 | 2025-03-29T02:44:46.191851
8523 / tcp
-2031469209 | 2025-03-28T01:21:25.917906
8524 / tcp
-98713449 | 2025-03-29T10:24:32.924069
8525 / tcp
-98713449 | 2025-03-29T19:44:46.840954
8526 / tcp
-2031469209 | 2025-03-29T19:41:46.800494
8528 / tcp
-98713449 | 2025-03-29T09:05:52.745826
8529 / tcp
-98713449 | 2025-03-28T10:23:01.172485
8530 / tcp
-98713449 | 2025-03-29T14:39:47.192085
8531 / tcp
-2031469209 | 2025-03-28T12:39:20.536369
8533 / tcp
-2031469209 | 2025-03-29T22:10:47.565529
8536 / tcp
-98713449 | 2025-03-28T13:19:25.035367
8540 / tcp
-98713449 | 2025-03-29T05:16:36.636458
8543 / tcp
-98713449 | 2025-03-29T00:27:22.173470
8544 / tcp
-98713449 | 2025-03-29T20:35:02.883326
8545 / tcp
-1341732464 | 2025-03-31T21:17:02.426584
8548 / tcp
-2031469209 | 2025-03-29T03:13:49.117074
8549 / tcp
-2031469209 | 2025-03-28T10:10:24.625965
8550 / tcp
-98713449 | 2025-03-29T12:03:35.447897
8551 / tcp
-2031469209 | 2025-03-28T20:08:03.501155
8553 / tcp
-2031469209 | 2025-03-29T14:47:42.964071
8554 / tcp
-98713449 | 2025-03-31T20:15:16.475086
8556 / tcp
-2031469209 | 2025-03-29T08:36:35.344288
8557 / tcp
-2031469209 | 2025-03-29T02:34:19.591503
8558 / tcp
-98713449 | 2025-03-29T10:03:49.842651
8560 / tcp
-98713449 | 2025-03-29T21:07:56.691400
8561 / tcp
-2031469209 | 2025-03-29T08:01:08.386477
8562 / tcp
-98713449 | 2025-03-29T01:41:07.270310
8563 / tcp
-98713449 | 2025-03-29T02:58:34.552168
8564 / tcp
-2031469209 | 2025-03-29T20:06:42.155959
8565 / tcp
-2031469209 | 2025-03-29T15:51:34.302654
8566 / tcp
-98713449 | 2025-03-28T09:30:37.438082
8567 / tcp
-2031469209 | 2025-03-29T03:56:43.748382
8568 / tcp
-2031469209 | 2025-03-29T18:24:41.979763
8569 / tcp
-2031469209 | 2025-03-29T16:24:23.807554
8570 / tcp
-2031469209 | 2025-03-29T16:43:44.785537
8571 / tcp
-2031469209 | 2025-03-29T08:37:14.298974
8573 / tcp
-2031469209 | 2025-03-28T22:33:51.848699
8574 / tcp
-2031469209 | 2025-03-29T20:30:54.045455
8575 / tcp
-2031469209 | 2025-03-31T16:00:46.685292
8576 / tcp
-2031469209 | 2025-03-28T01:24:52.375225
8577 / tcp
-2031469209 | 2025-03-28T12:23:42.276645
8578 / tcp
-2031469209 | 2025-03-29T11:15:31.365352
8579 / tcp
-98713449 | 2025-03-29T16:47:12.961456
8580 / tcp
-98713449 | 2025-03-29T08:49:58.776514
8581 / tcp
-2031469209 | 2025-03-29T08:46:15.202325
8582 / tcp
-2031469209 | 2025-03-28T22:15:43.959742
8583 / tcp
-98713449 | 2025-03-29T19:20:44.227347
8584 / tcp
-2031469209 | 2025-03-29T03:59:24.315398
8585 / tcp
-2031469209 | 2025-03-28T10:15:45.628498
8586 / tcp
-2031469209 | 2025-03-28T05:50:21.299238
8587 / tcp
-98713449 | 2025-03-29T17:10:06.349072
8588 / tcp
-98713449 | 2025-03-28T13:24:36.746761
8589 / tcp
-98713449 | 2025-03-29T11:45:29.423857
8590 / tcp
-2031469209 | 2025-03-29T14:36:54.461929
8591 / tcp
-98713449 | 2025-03-28T07:59:19.168722
8592 / tcp
-2031469209 | 2025-03-28T11:46:05.483754
8593 / tcp
-98713449 | 2025-03-28T11:08:14.139843
8594 / tcp
-98713449 | 2025-03-29T04:43:00.878619
8595 / tcp
-98713449 | 2025-03-29T17:56:39.443465
8596 / tcp
-98713449 | 2025-03-29T10:22:46.559011
8597 / tcp
-98713449 | 2025-03-29T14:37:46.834300
8598 / tcp
-98713449 | 2025-03-29T04:48:16.124721
8599 / tcp
-98713449 | 2025-03-28T01:32:40.030123
8600 / tcp
-98713449 | 2025-03-28T13:18:52.782309
8601 / tcp
-2031469209 | 2025-03-28T07:12:02.835725
8602 / tcp
-2031469209 | 2025-03-29T03:35:34.514592
8605 / tcp
-2031469209 | 2025-03-29T03:37:23.885781
8606 / tcp
-98713449 | 2025-03-29T10:43:25.803272
8607 / tcp
-2031469209 | 2025-03-28T02:05:16.158380
8621 / tcp
-98713449 | 2025-03-29T14:33:27.094055
8622 / tcp
-2031469209 | 2025-03-29T14:53:46.956162
8623 / tcp
-98713449 | 2025-03-29T20:23:32.857428
8630 / tcp
-2031469209 | 2025-03-29T17:18:02.434942
8637 / tcp
-2031469209 | 2025-03-29T12:35:32.837087
8640 / tcp
-2031469209 | 2025-03-28T07:16:35.442992
8641 / tcp
-2031469209 | 2025-03-29T08:22:54.638047
8643 / tcp
-2031469209 | 2025-03-29T08:18:46.519421
8649 / tcp
-98713449 | 2025-03-31T23:35:06.808068
8663 / tcp
-2031469209 | 2025-03-29T12:58:44.816721
8666 / tcp
-2031469209 | 2025-03-29T20:09:25.054819
8680 / tcp
-98713449 | 2025-03-29T14:10:55.283808
8686 / tcp
-1058385585 | 2025-03-29T18:21:01.098755
8700 / tcp
-2031469209 | 2025-03-29T16:02:43.761666
8701 / tcp
-2031469209 | 2025-03-29T03:20:32.282584
8702 / tcp
-98713449 | 2025-03-29T21:00:48.896416
8703 / tcp
-98713449 | 2025-03-28T15:36:17.565402
8704 / tcp
-2031469209 | 2025-03-29T21:22:13.700640
8705 / tcp
-98713449 | 2025-03-29T17:28:13.817810
8706 / tcp
-98713449 | 2025-03-29T12:05:52.306647
8707 / tcp
-98713449 | 2025-03-29T21:12:53.234087
8708 / tcp
-2031469209 | 2025-03-29T17:00:51.510177
8709 / tcp
-98713449 | 2025-03-29T11:52:17.375175
8723 / tcp
-98713449 | 2025-03-29T09:21:14.832223
8724 / tcp
-98713449 | 2025-03-29T04:26:32.095449
8731 / tcp
-98713449 | 2025-03-29T17:09:15.773278
8732 / tcp
-98713449 | 2025-03-29T13:57:54.154275
8733 / tcp
-98713449 | 2025-03-28T19:34:05.326001
8743 / tcp
-98713449 | 2025-03-29T13:10:30.492968
8745 / tcp
-2031469209 | 2025-03-29T14:25:36.627230
8764 / tcp
-98713449 | 2025-03-29T01:51:52.531918
8765 / tcp
-2031469209 | 2025-03-29T20:04:14.378234
8766 / tcp
-2031469209 | 2025-03-29T02:48:12.624638
8767 / tcp
-98713449 | 2025-03-29T12:11:42.983675
8771 / tcp
-2031469209 | 2025-03-29T19:45:18.720084
8779 / tcp
-2031469209 | 2025-03-29T19:56:31.400322
8782 / tcp
-98713449 | 2025-03-28T23:30:53.548826
8784 / tcp
-2031469209 | 2025-03-29T19:43:12.165330
8787 / tcp
-2031469209 | 2025-03-28T23:04:17.086201
8788 / tcp
-2031469209 | 2025-03-29T18:25:19.542198
8789 / tcp
-98713449 | 2025-03-28T08:32:54.460082
8790 / tcp
-98713449 | 2025-03-29T20:29:01.460844
8791 / tcp
-2031469209 | 2025-03-28T04:30:19.870544
8800 / tcp
-2031469209 | 2025-03-29T19:06:48.990118
8801 / tcp
-98713449 | 2025-03-29T18:56:45.367965
8802 / tcp
-2031469209 | 2025-03-29T02:53:28.833825
8803 / tcp
-98713449 | 2025-03-29T10:17:51.576463
8804 / tcp
-2031469209 | 2025-03-29T17:42:34.167726
8805 / tcp
-98713449 | 2025-03-29T09:57:25.069313
8806 / tcp
-98713449 | 2025-03-29T20:37:13.508670
8807 / tcp
-2031469209 | 2025-03-29T12:06:53.811218
8808 / tcp
-98713449 | 2025-03-28T15:24:57.196482
8809 / tcp
-2031469209 | 2025-03-29T19:56:04.608666
8810 / tcp
-98713449 | 2025-03-29T04:35:54.875721
8811 / tcp
-98713449 | 2025-03-31T18:21:53.291642
8812 / tcp
-2031469209 | 2025-03-29T12:15:57.594916
8813 / tcp
-98713449 | 2025-03-29T16:18:36.323983
8814 / tcp
-2031469209 | 2025-03-29T13:58:36.243037
8815 / tcp
-98713449 | 2025-03-29T11:07:36.482362
8816 / tcp
-2031469209 | 2025-03-29T03:01:04.776512
8817 / tcp
-2031469209 | 2025-03-29T18:50:03.754179
8818 / tcp
-2031469209 | 2025-03-28T10:06:03.628751
8819 / tcp
-98713449 | 2025-03-29T15:24:06.071846
8820 / tcp
-98713449 | 2025-03-29T21:23:41.232832
8821 / tcp
-98713449 | 2025-03-29T08:13:38.584306
8822 / tcp
624273059 | 2025-03-29T02:18:29.601433
8823 / tcp
-98713449 | 2025-03-29T09:44:21.681337
8824 / tcp
-98713449 | 2025-03-29T05:27:32.854166
8825 / tcp
-2031469209 | 2025-03-29T09:49:10.673988
8826 / tcp
-98713449 | 2025-03-29T21:15:13.623796
8827 / tcp
-2031469209 | 2025-03-29T12:33:22.527418
8828 / tcp
-98713449 | 2025-03-29T05:24:36.016806
8829 / tcp
-2031469209 | 2025-03-28T18:30:35.939842
8830 / tcp
-2031469209 | 2025-03-29T05:09:19.475233
8831 / tcp
-98713449 | 2025-03-28T23:32:54.644518
8832 / tcp
-98713449 | 2025-03-29T18:56:09.598937
8833 / tcp
-2031469209 | 2025-03-29T01:42:20.642963
8834 / tcp
411540654 | 2025-03-31T17:15:00.619991
8835 / tcp
-98713449 | 2025-03-29T05:02:24.088867
8836 / tcp
-98713449 | 2025-03-29T01:25:12.078662
8837 / tcp
-98713449 | 2025-03-29T15:56:31.593961
8838 / tcp
-2031469209 | 2025-03-29T02:35:11.538904
8839 / tcp
-98713449 | 2025-03-29T09:57:47.930515
8840 / tcp
-2031469209 | 2025-03-29T19:49:51.665463
8841 / tcp
-2031469209 | 2025-03-28T13:44:38.004105
8842 / tcp
-2031469209 | 2025-03-28T17:25:24.638285
8843 / tcp
-98713449 | 2025-03-28T10:16:40.394484
8844 / tcp
-2031469209 | 2025-03-22T22:47:43.284809
8845 / tcp
-98713449 | 2025-03-28T09:30:58.233845
8846 / tcp
-2031469209 | 2025-03-29T10:59:17.433544
8847 / tcp
-98713449 | 2025-03-29T17:59:56.523031
8848 / tcp
-98713449 | 2025-03-29T18:39:49.772724
8849 / tcp
-2031469209 | 2025-03-29T16:20:37.761581
8850 / tcp
-98713449 | 2025-03-31T17:37:32.503200
8851 / tcp
-2031469209 | 2025-03-29T14:27:17.443826
8852 / tcp
-2031469209 | 2025-03-29T13:56:51.276815
8853 / tcp
-2031469209 | 2025-03-29T21:02:05.365001
8854 / tcp
-2031469209 | 2025-03-29T11:38:02.978816
8855 / tcp
-98713449 | 2025-03-28T09:18:11.198767
8856 / tcp
-98713449 | 2025-03-29T21:09:02.515503
8857 / tcp
-98713449 | 2025-03-29T14:07:26.838177
8858 / tcp
-98713449 | 2025-03-29T19:50:12.014994
8859 / tcp
-2031469209 | 2025-03-29T19:40:23.813474
8860 / tcp
-2031469209 | 2025-03-29T02:08:48.616122
8861 / tcp
-98713449 | 2025-03-29T13:01:36.574469
8862 / tcp
-2031469209 | 2025-03-29T04:42:05.336294
8863 / tcp
-2031469209 | 2025-03-29T15:29:32.812058
8864 / tcp
-2031469209 | 2025-03-29T19:40:53.398390
8865 / tcp
-2031469209 | 2025-03-29T04:22:20.728666
8866 / tcp
-2031469209 | 2025-03-28T04:52:07.816116
8867 / tcp
-98713449 | 2025-03-22T05:32:54.554747
8868 / tcp
-98713449 | 2025-03-29T12:09:51.802890
8869 / tcp
-98713449 | 2025-03-29T07:53:14.901880
8870 / tcp
-2031469209 | 2025-03-28T23:35:04.770929
8871 / tcp
-2031469209 | 2025-03-29T08:05:28.420472
8872 / tcp
-2031469209 | 2025-03-29T16:11:27.730721
8873 / tcp
-2031469209 | 2025-03-29T17:08:51.101028
8874 / tcp
-2031469209 | 2025-03-29T04:59:39.007465
8875 / tcp
-98713449 | 2025-03-29T02:23:19.896032
8876 / tcp
-2031469209 | 2025-03-29T08:21:13.426500
8877 / tcp
-2031469209 | 2025-03-28T10:30:35.841113
8878 / tcp
-98713449 | 2025-03-29T11:07:30.282859
8879 / tcp
-98713449 | 2025-03-28T11:30:43.754918
8880 / tcp
411540654 | 2025-03-28T01:41:30.083027
8881 / tcp
-2031469209 | 2025-03-28T01:18:34.222141
8882 / tcp
-2031469209 | 2025-03-29T13:13:56.914675
8883 / tcp
-2031469209 | 2025-03-29T21:17:03.876710
8884 / tcp
-2031469209 | 2025-03-29T08:41:59.772672
8885 / tcp
-2031469209 | 2025-03-29T12:04:53.487629
8886 / tcp
-98713449 | 2025-03-28T01:39:29.129770
8887 / tcp
-98713449 | 2025-03-29T21:11:22.249180
8888 / tcp
-857396081 | 2025-03-29T03:23:32.290634
8889 / tcp
1094048410 | 2025-03-31T12:47:35.368140
8890 / tcp
-98713449 | 2025-03-29T08:15:33.587530
8891 / tcp
-2031469209 | 2025-03-28T03:56:17.852641
8899 / tcp
411540654 | 2025-03-29T11:49:57.339819
8900 / tcp
-2031469209 | 2025-03-28T03:53:40.467907
8901 / tcp
-98713449 | 2025-03-29T10:58:34.880324
8902 / tcp
-98713449 | 2025-03-29T08:50:30.022645
8906 / tcp
-98713449 | 2025-03-29T04:35:06.523678
8907 / tcp
-98713449 | 2025-03-29T18:58:36.378836
8908 / tcp
-2031469209 | 2025-03-28T13:44:47.911520
8910 / tcp
-98713449 | 2025-03-29T17:30:09.007229
8911 / tcp
-2031469209 | 2025-03-28T07:39:29.575613
8912 / tcp
-98713449 | 2025-03-29T14:02:01.121694
8913 / tcp
-98713449 | 2025-03-29T11:54:45.886848
8915 / tcp
-98713449 | 2025-03-29T08:07:30.766613
8916 / tcp
-98713449 | 2025-03-29T19:33:46.296725
8935 / tcp
-98713449 | 2025-03-29T14:19:19.209739
8943 / tcp
-98713449 | 2025-03-29T18:47:57.295827
8969 / tcp
-2031469209 | 2025-03-29T04:00:16.065588
8980 / tcp
-2031469209 | 2025-03-28T02:41:14.078172
8988 / tcp
-2031469209 | 2025-03-29T16:59:49.871606
8989 / tcp
-98713449 | 2025-03-29T20:09:03.639897
8990 / tcp
-2031469209 | 2025-03-29T13:42:00.803526
8991 / tcp
-98713449 | 2025-03-29T12:01:36.490128
8993 / tcp
-2031469209 | 2025-03-29T08:25:58.055706
8999 / tcp
-2031469209 | 2025-03-29T01:37:31.036815
9000 / tcp
1347224596 | 2025-04-01T00:26:47.374176
9001 / tcp
1634741987 | 2025-03-31T10:50:39.677627
9002 / tcp
411540654 | 2025-03-31T12:41:56.752416
9003 / tcp
-98713449 | 2025-03-29T01:37:08.512919
9004 / tcp
-98713449 | 2025-03-29T15:25:50.726793
9005 / tcp
-98713449 | 2025-03-29T21:06:47.753691
9006 / tcp
-2031469209 | 2025-03-29T15:14:05.882244
9007 / tcp
-98713449 | 2025-03-28T05:32:11.337716
9008 / tcp
-98713449 | 2025-03-29T10:49:57.370711
9009 / tcp
-2031469209 | 2025-03-31T13:41:22.359372
9010 / tcp
-98713449 | 2025-03-29T21:04:24.489637
9011 / tcp
-98713449 | 2025-03-29T14:53:55.170526
9012 / tcp
-98713449 | 2025-03-29T10:06:06.816634
9013 / tcp
-98713449 | 2025-03-29T00:46:05.512239
9014 / tcp
-2031469209 | 2025-03-31T06:11:56.874075
9015 / tcp
-98713449 | 2025-03-29T16:47:21.131171
9016 / tcp
-98713449 | 2025-03-29T04:36:17.259777
9017 / tcp
-2031469209 | 2025-03-29T05:31:20.740643
9018 / tcp
-2031469209 | 2025-03-28T06:38:20.368956
9019 / tcp
-2031469209 | 2025-03-28T13:12:26.469224
9020 / tcp
-2031469209 | 2025-03-29T03:06:37.812417
9021 / tcp
-2031469209 | 2025-03-29T14:58:14.204716
9022 / tcp
-2031469209 | 2025-03-29T18:42:11.274177
9023 / tcp
-98713449 | 2025-03-29T14:06:43.442803
9024 / tcp
-98713449 | 2025-03-29T21:00:51.196403
9025 / tcp
-98713449 | 2025-03-29T21:09:19.801303
9026 / tcp
-98713449 | 2025-03-28T18:36:13.955602
9027 / tcp
-98713449 | 2025-03-29T15:03:29.850577
9028 / tcp
-2031469209 | 2025-03-29T08:24:04.270255
9029 / tcp
-2031469209 | 2025-03-28T08:29:09.666982
9032 / tcp
-2031469209 | 2025-03-29T10:34:54.769607
9033 / tcp
-2031469209 | 2025-03-29T17:12:48.612586
9034 / tcp
-98713449 | 2025-03-29T12:12:49.419563
9035 / tcp
-2031469209 | 2025-03-29T15:22:49.845743
9036 / tcp
-98713449 | 2025-03-29T10:30:22.963988
9037 / tcp
-2031469209 | 2025-03-29T01:39:12.613237
9038 / tcp
-98713449 | 2025-03-31T10:03:50.887873
9039 / tcp
-98713449 | 2025-03-29T00:23:57.332558
9040 / tcp
-2031469209 | 2025-03-29T14:29:23.331777
9041 / tcp
-2031469209 | 2025-03-28T06:31:20.728956
9042 / tcp
-98713449 | 2025-03-31T19:40:48.055372
9043 / tcp
-2031469209 | 2025-03-29T04:53:46.760323
9044 / tcp
-2031469209 | 2025-03-29T14:00:16.453110
9045 / tcp
-98713449 | 2025-03-29T07:54:31.538053
9046 / tcp
-98713449 | 2025-03-28T06:46:53.868056
9047 / tcp
-98713449 | 2025-03-28T14:02:20.932540
9048 / tcp
-98713449 | 2025-03-28T21:46:02.246902
9049 / tcp
-98713449 | 2025-03-29T11:11:09.285662
9050 / tcp
-2031469209 | 2025-03-29T19:14:27.497962
9051 / tcp
-2031469209 | 2025-03-31T15:58:55.305371
9052 / tcp
-98713449 | 2025-03-29T14:32:52.661353
9053 / tcp
-2031469209 | 2025-03-29T20:41:46.401179
9054 / tcp
-98713449 | 2025-03-29T14:38:05.618503
9055 / tcp
-2031469209 | 2025-03-29T03:42:18.966396
9056 / tcp
-2031469209 | 2025-03-29T13:12:54.965998
9057 / tcp
-2031469209 | 2025-03-29T03:11:23.682997
9058 / tcp
-2031469209 | 2025-03-29T18:17:56.988439
9059 / tcp
-98713449 | 2025-03-29T19:55:47.819660
9060 / tcp
-2031469209 | 2025-03-29T22:30:17.011823
9061 / tcp
-2031469209 | 2025-03-29T19:16:09.216217
9062 / tcp
-2031469209 | 2025-03-29T09:31:51.925380
9063 / tcp
-2031469209 | 2025-03-28T02:20:34.888550
9064 / tcp
-98713449 | 2025-03-29T17:42:40.028151
9065 / tcp
-2031469209 | 2025-03-28T02:46:24.554873
9066 / tcp
-2031469209 | 2025-03-29T20:32:48.975228
9067 / tcp
-98713449 | 2025-03-29T04:00:37.463474
9068 / tcp
-2031469209 | 2025-03-29T19:38:18.784100
9069 / tcp
-98713449 | 2025-03-28T12:52:49.004052
9070 / tcp
-2031469209 | 2025-03-29T14:25:44.321598
9071 / tcp
-2031469209 | 2025-03-29T14:34:33.783445
9072 / tcp
-98713449 | 2025-03-29T16:33:35.983455
9073 / tcp
-98713449 | 2025-03-29T04:58:11.167031
9074 / tcp
-2031469209 | 2025-03-29T19:59:53.397873
9075 / tcp
-2031469209 | 2025-03-29T20:54:29.701188
9076 / tcp
-2031469209 | 2025-03-29T04:33:52.255662
9077 / tcp
-98713449 | 2025-03-29T11:51:52.935780
9078 / tcp
-2031469209 | 2025-03-28T15:11:32.139029
9079 / tcp
-2031469209 | 2025-03-29T04:06:13.093156
9080 / tcp
-2113003112 | 2025-03-31T20:37:19.868339
9081 / tcp
-2031469209 | 2025-03-29T04:19:33.406790
9082 / tcp
-2031469209 | 2025-03-29T03:49:44.753333
9083 / tcp
-98713449 | 2025-03-23T19:36:20.293922
9084 / tcp
-2031469209 | 2025-03-29T13:11:42.827048
9085 / tcp
-98713449 | 2025-03-29T04:57:52.137047
9086 / tcp
-98713449 | 2025-03-29T05:30:14.340126
9087 / tcp
-2031469209 | 2025-03-29T16:27:37.876948
9088 / tcp
-857396081 | 2025-03-28T11:13:13.715555
9089 / tcp
-2031469209 | 2025-03-28T11:23:24.925457
9090 / tcp
2005929508 | 2025-03-31T14:39:28.337969
9091 / tcp
1094048410 | 2025-03-31T12:21:47.105586
9092 / tcp
-98713449 | 2025-03-31T09:24:23.694122
9093 / tcp
-98713449 | 2025-03-28T02:10:40.326281
9094 / tcp
-98713449 | 2025-03-29T21:05:17.709716
9095 / tcp
411540654 | 2025-03-31T23:24:02.730775
9096 / tcp
-98713449 | 2025-03-28T12:44:12.800431
9097 / tcp
-98713449 | 2025-03-29T15:14:42.178867
9099 / tcp
-98713449 | 2025-03-29T21:39:34.142116
9100 / tcp
-2031469209 | 2025-03-31T15:08:07.021138
9101 / tcp
-98713449 | 2025-03-28T12:41:50.435556
9102 / tcp
-98713449 | 2025-03-29T02:18:08.916343
9103 / tcp
-98713449 | 2025-03-29T01:35:17.361339
9104 / tcp
1634741987 | 2025-03-29T09:04:29.929294
9105 / tcp
-98713449 | 2025-03-29T16:37:28.949084
9106 / tcp
-2031469209 | 2025-03-29T17:13:03.750161
9107 / tcp
-2031469209 | 2025-03-29T18:58:21.279582
9108 / tcp
-2031469209 | 2025-03-28T05:32:00.526563
9109 / tcp
-98713449 | 2025-03-29T07:59:12.743298
9110 / tcp
-98713449 | 2025-03-28T14:08:57.304282
9111 / tcp
-2031469209 | 2025-03-31T16:36:00.885473
9112 / tcp
-2031469209 | 2025-03-29T14:09:47.991609
9113 / tcp
-2031469209 | 2025-03-29T11:23:23.516684
9114 / tcp
-2031469209 | 2025-03-28T09:41:20.406106
9115 / tcp
-2031469209 | 2025-03-29T18:58:01.715146
9116 / tcp
-98713449 | 2025-03-29T14:31:48.936590
9117 / tcp
-2031469209 | 2025-03-29T17:40:33.196443
9118 / tcp
-98713449 | 2025-03-29T12:41:34.961521
9119 / tcp
-2031469209 | 2025-03-29T11:28:33.451323
9120 / tcp
-98713449 | 2025-03-29T14:29:43.542038
9121 / tcp
-2031469209 | 2025-03-29T19:05:04.471759
9122 / tcp
-98713449 | 2025-03-29T08:59:55.516198
9123 / tcp
-2031469209 | 2025-03-29T13:02:20.949896
9124 / tcp
-2031469209 | 2025-03-29T17:13:45.426276
9125 / tcp
-2031469209 | 2025-03-29T21:32:10.379642
9126 / tcp
-2031469209 | 2025-03-29T04:23:42.435178
9127 / tcp
-2031469209 | 2025-03-29T13:48:19.101730
9128 / tcp
-2031469209 | 2025-03-28T00:40:52.970716
9129 / tcp
-98713449 | 2025-03-29T20:12:05.779731
9130 / tcp
-2031469209 | 2025-03-29T14:04:25.909022
9131 / tcp
-2031469209 | 2025-03-29T19:29:16.021420
9132 / tcp
-2031469209 | 2025-03-28T19:50:40.328793
9133 / tcp
-2031469209 | 2025-03-29T19:17:47.955836
9134 / tcp
-98713449 | 2025-03-29T20:16:46.331476
9135 / tcp
-2031469209 | 2025-03-29T15:37:29.035245
9136 / tcp
-98713449 | 2025-03-28T14:38:37.995447
9137 / tcp
-98713449 | 2025-03-29T20:03:47.248340
9138 / tcp
-98713449 | 2025-03-29T11:13:48.612249
9139 / tcp
-98713449 | 2025-03-29T21:18:19.578210
9140 / tcp
-2031469209 | 2025-03-28T06:54:06.531748
9141 / tcp
-98713449 | 2025-03-29T15:21:17.778811
9142 / tcp
-2031469209 | 2025-03-29T08:57:57.812717
9143 / tcp
-2031469209 | 2025-03-29T13:41:13.204444
9144 / tcp
-98713449 | 2025-03-28T17:03:21.458227
9145 / tcp
-2031469209 | 2025-03-29T08:56:22.242391
9146 / tcp
-98713449 | 2025-03-29T18:27:16.073847
9147 / tcp
-2031469209 | 2025-03-28T13:52:49.655816
9148 / tcp
-98713449 | 2025-03-29T22:27:30.924696
9149 / tcp
-98713449 | 2025-03-29T05:24:06.063554
9150 / tcp
-2031469209 | 2025-03-29T13:00:31.358260
9151 / tcp
-98713449 | 2025-03-31T13:31:40.700940
9152 / tcp
-98713449 | 2025-03-29T03:30:46.647251
9153 / tcp
-2031469209 | 2025-03-28T03:38:14.751857
9154 / tcp
-2031469209 | 2025-03-29T04:17:25.060773
9155 / tcp
-98713449 | 2025-03-29T12:53:54.858209
9156 / tcp
-98713449 | 2025-03-28T04:59:04.799026
9157 / tcp
-2031469209 | 2025-03-29T05:12:09.202469
9158 / tcp
-98713449 | 2025-03-29T14:11:51.140767
9159 / tcp
-98713449 | 2025-03-29T18:30:12.697321
9160 / tcp
-2031469209 | 2025-03-31T17:33:04.908608
9161 / tcp
-98713449 | 2025-03-29T18:20:48.639467
9162 / tcp
-98713449 | 2025-03-29T19:54:18.055760
9163 / tcp
-98713449 | 2025-03-29T21:18:37.122033
9164 / tcp
-98713449 | 2025-03-29T02:20:02.699379
9165 / tcp
-2031469209 | 2025-03-31T21:48:43.842887
9166 / tcp
-2031469209 | 2025-03-29T14:16:30.066740
9167 / tcp
-2031469209 | 2025-03-29T15:03:46.447524
9168 / tcp
-98713449 | 2025-03-29T21:14:21.525782
9169 / tcp
-2031469209 | 2025-03-28T08:02:21.522145
9170 / tcp
-2031469209 | 2025-03-29T19:16:34.588646
9171 / tcp
-2031469209 | 2025-03-29T18:27:44.528631
9172 / tcp
-98713449 | 2025-03-29T13:54:50.621826
9173 / tcp
-2031469209 | 2025-03-29T04:39:29.151848
9175 / tcp
-2031469209 | 2025-03-29T03:52:06.756302
9176 / tcp
-2031469209 | 2025-03-29T07:59:11.451014
9177 / tcp
-2031469209 | 2025-03-29T04:22:07.160750
9178 / tcp
-2031469209 | 2025-03-28T21:50:26.958434
9179 / tcp
-98713449 | 2025-03-28T15:21:57.352292
9180 / tcp
-2031469209 | 2025-03-29T01:34:22.028978
9181 / tcp
-2031469209 | 2025-03-28T04:51:48.143466
9182 / tcp
-98713449 | 2025-03-29T21:01:44.627244
9183 / tcp
-2031469209 | 2025-03-29T08:56:56.917237
9184 / tcp
-2031469209 | 2025-03-29T10:14:09.712648
9185 / tcp
-98713449 | 2025-03-29T10:44:24.252902
9186 / tcp
-2031469209 | 2025-03-29T04:26:04.724428
9187 / tcp
-2031469209 | 2025-03-29T19:47:34.298739
9188 / tcp
-2031469209 | 2025-03-29T08:45:04.170305
9189 / tcp
-98713449 | 2025-03-29T12:42:46.131187
9190 / tcp
-2031469209 | 2025-03-29T04:02:30.240865
9191 / tcp
521951111 | 2025-03-31T09:18:34.872126
9192 / tcp
-2031469209 | 2025-03-29T04:32:04.010809
9193 / tcp
-98713449 | 2025-03-29T19:17:11.409111
9194 / tcp
-98713449 | 2025-03-04T23:38:20.938154
9195 / tcp
-2031469209 | 2025-03-29T12:48:51.071165
9196 / tcp
-98713449 | 2025-03-28T01:02:19.873834
9197 / tcp
-98713449 | 2025-03-29T18:21:19.618806
9198 / tcp
-2031469209 | 2025-03-29T17:08:57.473026
9199 / tcp
-2031469209 | 2025-03-29T11:20:52.775223
9200 / tcp
1701962934 | 2025-03-29T13:19:35.234964
9201 / tcp
-2031469209 | 2025-03-29T13:19:03.128873
9202 / tcp
-2031469209 | 2025-03-28T23:56:20.618768
9203 / tcp
-2031469209 | 2025-03-29T16:58:12.888011
9204 / tcp
-98713449 | 2025-03-28T15:19:44.232116
9205 / tcp
-2031469209 | 2025-03-29T09:24:40.504593
9206 / tcp
-2031469209 | 2025-03-28T11:22:18.003295
9207 / tcp
-98713449 | 2025-03-28T05:39:00.602354
9208 / tcp
-98713449 | 2025-03-29T14:51:24.930844
9209 / tcp
-2031469209 | 2025-03-28T23:41:21.570572
9210 / tcp
-2031469209 | 2025-03-28T17:50:58.562562
9211 / tcp
-98713449 | 2025-03-28T05:52:23.901634
9212 / tcp
-98713449 | 2025-03-28T21:26:04.854433
9213 / tcp
-98713449 | 2025-03-29T12:50:09.039779
9214 / tcp
-98713449 | 2025-03-28T04:10:06.491553
9215 / tcp
-98713449 | 2025-03-29T11:44:12.644955
9216 / tcp
-2031469209 | 2025-03-29T16:15:15.090294
9217 / tcp
-2031469209 | 2025-03-29T04:10:03.163489
9218 / tcp
-98713449 | 2025-03-29T20:21:38.885012
9219 / tcp
-98713449 | 2025-03-28T21:14:03.144950
9220 / tcp
-2031469209 | 2025-03-29T21:07:19.179092
9221 / tcp
-98713449 | 2025-03-29T14:13:14.246271
9222 / tcp
-2031469209 | 2025-03-28T02:41:38.728643
9223 / tcp
-2031469209 | 2025-03-28T03:05:55.503320
9226 / tcp
-2031469209 | 2025-03-29T14:43:22.979009
9230 / tcp
-2031469209 | 2025-03-28T11:47:33.073881
9236 / tcp
-98713449 | 2025-03-28T16:32:37.381873
9241 / tcp
-98713449 | 2025-03-29T16:39:58.566684
9242 / tcp
-98713449 | 2025-03-29T02:32:58.860657
9243 / tcp
-98713449 | 2025-03-29T04:23:05.851878
9244 / tcp
-2031469209 | 2025-03-28T11:35:11.827824
9245 / tcp
-2031469209 | 2025-03-29T17:08:21.131851
9246 / tcp
-2031469209 | 2025-03-29T20:58:33.948311
9247 / tcp
-2031469209 | 2025-03-29T10:31:04.970610
9248 / tcp
-98713449 | 2025-03-29T12:17:44.463818
9249 / tcp
-98713449 | 2025-03-29T18:28:40.821042
9250 / tcp
-98713449 | 2025-03-29T09:04:13.751795
9251 / tcp
-2031469209 | 2025-03-29T01:53:08.030882
9252 / tcp
-2031469209 | 2025-03-28T12:50:32.766698
9253 / tcp
-98713449 | 2025-03-28T17:20:20.332906
9256 / tcp
-2031469209 | 2025-03-29T09:44:25.586901
9257 / tcp
-98713449 | 2025-03-29T09:43:01.717552
9273 / tcp
-2031469209 | 2025-03-29T21:34:10.300150
9280 / tcp
-98713449 | 2025-03-29T08:47:44.939109
9283 / tcp
-2031469209 | 2025-03-29T04:59:09.115407
9289 / tcp
-2031469209 | 2025-03-29T15:29:37.056663
9291 / tcp
-2031469209 | 2025-03-29T21:18:53.070311
9292 / tcp
-2031469209 | 2025-03-29T20:08:44.484046
9295 / tcp
-98713449 | 2025-03-31T11:53:28.368744
9299 / tcp
-98713449 | 2025-03-28T21:54:43.722129
9300 / tcp
1701962934 | 2025-03-29T01:45:34.163667
9301 / tcp
-2031469209 | 2025-03-29T10:23:13.355870
9303 / tcp
-2031469209 | 2025-03-29T02:27:04.761888
9304 / tcp
-98713449 | 2025-03-29T09:29:47.392585
9305 / tcp
-2031469209 | 2025-03-29T02:19:16.984798
9306 / tcp
1094048410 | 2025-03-31T20:51:49.272161
9307 / tcp
-98713449 | 2025-03-29T18:19:48.870676
9308 / tcp
-98713449 | 2025-03-29T02:37:50.920169
9309 / tcp
-98713449 | 2025-03-29T03:12:28.380228
9310 / tcp
-98713449 | 2025-03-29T09:12:07.637604
9311 / tcp
-98713449 | 2025-03-29T20:44:10.830653
9312 / tcp
-2031469209 | 2025-03-29T09:45:40.591388
9313 / tcp
-2031469209 | 2025-03-29T09:59:28.850101
9315 / tcp
-98713449 | 2025-03-29T11:15:10.768892
9333 / tcp
-2031469209 | 2025-03-31T22:01:48.552876
9345 / tcp
-2031469209 | 2025-03-29T10:47:18.165210
9350 / tcp
-2031469209 | 2025-03-28T14:14:17.044582
9351 / tcp
-98713449 | 2025-03-29T08:43:35.551392
9353 / tcp
-98713449 | 2025-03-29T02:51:06.444610
9376 / tcp
-2031469209 | 2025-03-28T11:38:53.092378
9383 / tcp
-98713449 | 2025-03-28T06:17:53.286295
9387 / tcp
-98713449 | 2025-03-28T20:42:25.462390
9389 / tcp
-2031469209 | 2025-03-29T11:39:43.824990
9393 / tcp
-98713449 | 2025-03-29T13:23:23.178336
9398 / tcp
411540654 | 2025-03-31T08:20:47.858833
9399 / tcp
-2031469209 | 2025-03-29T12:47:02.209580
9400 / tcp
-98713449 | 2025-03-29T15:00:48.422646
9410 / tcp
-98713449 | 2025-03-29T12:15:20.763201
9418 / tcp
-98713449 | 2025-03-31T17:02:53.755432
9441 / tcp
-2031469209 | 2025-03-28T19:59:59.198804
9443 / tcp
864306896 | 2025-03-31T22:10:35.983248
9444 / tcp
-2031469209 | 2025-03-29T12:11:35.727914
9445 / tcp
-98713449 | 2025-03-29T16:59:58.598217
9446 / tcp
-2031469209 | 2025-03-29T16:16:09.265960
9447 / tcp
-98713449 | 2025-03-28T11:15:01.255359
9454 / tcp
-2031469209 | 2025-03-29T13:16:36.577240
9455 / tcp
-2031469209 | 2025-03-28T05:49:51.493046
9456 / tcp
-2031469209 | 2025-03-29T10:17:12.408157
9458 / tcp
-2031469209 | 2025-03-29T06:26:45.918271
9465 / tcp
-98713449 | 2025-03-29T10:58:57.890573
9480 / tcp
-2031469209 | 2025-03-29T08:55:50.978762
9488 / tcp
-2031469209 | 2025-03-28T23:21:36.314883
9500 / tcp
-2031469209 | 2025-03-29T11:54:58.220895
9501 / tcp
-2031469209 | 2025-03-28T14:35:58.166148
9505 / tcp
-2031469209 | 2025-03-28T23:59:14.980108
9507 / tcp
-98713449 | 2025-03-28T16:01:27.378476
9510 / tcp
-98713449 | 2025-03-28T10:33:56.531526
9513 / tcp
-2031469209 | 2025-03-29T15:47:09.925401
9515 / tcp
-98713449 | 2025-03-29T20:54:21.012987
9527 / tcp
1634741987 | 2025-03-29T04:41:42.044895
9529 / tcp
-98713449 | 2025-03-28T08:20:31.457682
9530 / tcp
-98713449 | 2025-03-31T12:16:01.469836
9532 / tcp
-98713449 | 2025-03-29T14:30:54.606147
9550 / tcp
-2031469209 | 2025-03-29T21:29:05.037988
9553 / tcp
-98713449 | 2025-03-29T03:59:38.485230
9595 / tcp
-98713449 | 2025-03-31T15:10:37.060499
9600 / tcp
-98713449 | 2025-03-29T05:17:37.331881
9606 / tcp
-2031469209 | 2025-03-29T09:46:46.162088
9611 / tcp
-2031469209 | 2025-03-28T03:01:28.026816
9658 / tcp
-2031469209 | 2025-03-28T21:13:18.132727
9663 / tcp
-2031469209 | 2025-03-29T08:13:10.718327
9674 / tcp
-2031469209 | 2025-03-29T09:59:18.239195
9682 / tcp
-98713449 | 2025-03-29T16:38:37.099681
9690 / tcp
-98713449 | 2025-03-29T19:42:13.098239
9696 / tcp
-2031469209 | 2025-03-31T14:25:13.684925
9700 / tcp
-98713449 | 2025-03-29T09:28:35.494517
9704 / tcp
-98713449 | 2025-03-29T21:25:26.433283
9710 / tcp
-98713449 | 2025-03-29T16:03:09.911374
9711 / tcp
-2031469209 | 2025-03-29T10:33:27.016497
9734 / tcp
-98713449 | 2025-03-29T18:55:38.070766
9743 / tcp
-98713449 | 2025-03-29T12:02:30.023101
9754 / tcp
-2031469209 | 2025-03-29T14:00:35.626502
9758 / tcp
-2031469209 | 2025-03-29T18:13:25.825291
9761 / tcp
-2031469209 | 2025-03-31T20:54:09.119616
9765 / tcp
-98713449 | 2025-03-29T21:03:25.379035
9773 / tcp
-98713449 | 2025-03-28T09:04:08.900102
9779 / tcp
-98713449 | 2025-03-28T08:00:12.847277
9797 / tcp
-98713449 | 2025-03-29T18:56:18.909280
9800 / tcp
-98713449 | 2025-03-31T13:20:17.134075
9802 / tcp
-2031469209 | 2025-03-29T18:54:09.247943
9803 / tcp
-98713449 | 2025-03-29T19:38:08.889713
9804 / tcp
-2031469209 | 2025-03-29T05:27:52.985983
9810 / tcp
-2031469209 | 2025-03-29T22:19:27.015579
9811 / tcp
-98713449 | 2025-03-29T17:40:58.575368
9861 / tcp
-2031469209 | 2025-03-29T14:08:17.674906
9869 / tcp
-98713449 | 2025-03-29T18:32:02.440337
9872 / tcp
-98713449 | 2025-03-28T07:46:19.073918
9876 / tcp
-2031469209 | 2025-03-31T19:32:58.225549
9885 / tcp
-98713449 | 2025-03-29T11:39:45.072145
9888 / tcp
-98713449 | 2025-03-29T02:26:06.515424
9898 / tcp
1463819167 | 2025-03-31T17:20:56.137240
9899 / tcp
-98713449 | 2025-03-29T18:59:05.821764
9900 / tcp
-2031469209 | 2025-03-29T03:32:25.189393
9901 / tcp
-98713449 | 2025-03-29T18:17:24.247305
9902 / tcp
-2031469209 | 2025-03-29T15:41:58.794704
9908 / tcp
-98713449 | 2025-03-29T17:51:09.919343
9909 / tcp
-98713449 | 2025-03-29T16:50:36.341019
9916 / tcp
-98713449 | 2025-03-28T17:04:28.078963
9918 / tcp
-2031469209 | 2025-03-29T13:08:23.604052
9919 / tcp
-98713449 | 2025-03-29T04:13:41.286187
9922 / tcp
-2031469209 | 2025-03-28T06:42:31.974908
9923 / tcp
-98713449 | 2025-03-29T15:34:26.016070
9926 / tcp
-2031469209 | 2025-03-29T20:31:12.718302
9928 / tcp
-98713449 | 2025-03-29T13:16:12.489813
9929 / tcp
-2031469209 | 2025-03-29T19:52:06.442552
9930 / tcp
-98713449 | 2025-03-29T14:53:00.415648
9939 / tcp
-2031469209 | 2025-03-29T21:32:45.720256
9943 / tcp
1094048410 | 2025-03-31T19:32:35.869212
9944 / tcp
-2031469209 | 2025-03-29T19:27:45.531083
9950 / tcp
-2031469209 | 2025-03-29T21:34:52.510300
9955 / tcp
-98713449 | 2025-03-29T18:15:55.073985
9966 / tcp
-98713449 | 2025-03-29T13:07:17.121094
9977 / tcp
-98713449 | 2025-03-29T04:06:18.918186
9981 / tcp
-2031469209 | 2025-03-31T17:51:05.644581
9990 / tcp
-98713449 | 2025-03-29T02:06:51.321122
9991 / tcp
-98713449 | 2025-03-28T16:13:10.239544
9992 / tcp
-2031469209 | 2025-03-29T11:00:18.499388
9993 / tcp
-2031469209 | 2025-03-29T18:43:51.849895
9994 / tcp
-2031469209 | 2025-03-29T11:40:32.368198
9997 / tcp
-98713449 | 2025-03-29T13:50:05.048650
9998 / tcp
-2031469209 | 2025-03-31T15:49:08.337594
9999 / tcp
523246302 | 2025-03-31T21:59:52.651271
10000 / tcp
1838581166 | 2025-03-31T22:50:07.504266
10001 / tcp
-2031469209 | 2025-03-31T19:26:41.516542
10002 / tcp
-98713449 | 2025-03-29T03:39:55.916370
10003 / tcp
-2031469209 | 2025-03-28T11:49:41.144107
10004 / tcp
-2031469209 | 2025-03-29T18:06:17.824180
10005 / tcp
-98713449 | 2025-03-29T04:23:19.055695
10006 / tcp
-98713449 | 2025-03-29T16:57:59.786496
10007 / tcp
-98713449 | 2025-03-28T13:17:19.836321
10008 / tcp
-98713449 | 2025-03-29T01:52:16.748687
10009 / tcp
-98713449 | 2025-03-29T04:28:23.352343
10010 / tcp
-98713449 | 2025-03-29T05:23:28.736045
10011 / tcp
-1058385585 | 2025-03-29T04:51:09.959997
10012 / tcp
-98713449 | 2025-03-29T04:02:58.592375
10013 / tcp
-2031469209 | 2025-03-29T11:03:21.135876
10014 / tcp
-2031469209 | 2025-03-29T02:35:32.308488
10015 / tcp
-2031469209 | 2025-03-28T21:57:23.624520
10016 / tcp
-2031469209 | 2025-03-29T10:55:29.011443
10017 / tcp
-98713449 | 2025-03-28T01:20:52.563259
10018 / tcp
-2031469209 | 2025-03-29T13:40:15.588859
10019 / tcp
-2031469209 | 2025-03-29T16:26:03.488482
10020 / tcp
-98713449 | 2025-03-29T14:00:57.525421
10021 / tcp
-98713449 | 2025-03-29T10:02:17.995288
10022 / tcp
619871948 | 2025-03-28T08:46:31.051530
10023 / tcp
-98713449 | 2025-03-28T01:30:02.894705
10024 / tcp
-2031469209 | 2025-03-29T21:07:04.512385
10025 / tcp
-2031469209 | 2025-03-28T01:58:04.062299
10026 / tcp
-2031469209 | 2025-03-29T15:16:12.750593
10027 / tcp
-98713449 | 2025-03-29T18:54:42.316088
10028 / tcp
-98713449 | 2025-03-29T03:21:34.288511
10029 / tcp
-98713449 | 2025-03-29T01:43:24.902116
10030 / tcp
-98713449 | 2025-03-29T17:42:19.850585
10031 / tcp
-2031469209 | 2025-03-28T08:46:56.930378
10032 / tcp
-2031469209 | 2025-03-29T10:02:11.433604
10033 / tcp
-98713449 | 2025-03-29T19:40:31.178005
10034 / tcp
-98713449 | 2025-03-29T20:03:52.129865
10035 / tcp
-1058385585 | 2025-03-28T09:44:10.048257
10036 / tcp
-2031469209 | 2025-03-29T16:44:57.550464
10037 / tcp
-98713449 | 2025-03-29T09:09:57.448405
10038 / tcp
-2031469209 | 2025-03-29T00:29:22.348935
10039 / tcp
-98713449 | 2025-03-29T14:02:32.891988
10040 / tcp
-98713449 | 2025-03-28T16:21:58.129102
10041 / tcp
-98713449 | 2025-03-28T05:30:24.198700
10042 / tcp
-2031469209 | 2025-03-29T01:54:34.708625
10043 / tcp
-98713449 | 2025-03-29T01:22:43.769570
10044 / tcp
-98713449 | 2025-03-29T19:46:03.990920
10045 / tcp
-98713449 | 2025-03-29T04:59:20.141342
10046 / tcp
-2031469209 | 2025-03-29T03:07:58.534311
10047 / tcp
-2031469209 | 2025-03-29T09:44:52.010978
10048 / tcp
-98713449 | 2025-03-29T09:46:49.271731
10049 / tcp
-98713449 | 2025-03-29T04:42:59.340394
10050 / tcp
-2031469209 | 2025-03-29T12:42:54.241704
10051 / tcp
-98713449 | 2025-03-29T17:15:55.348279
10052 / tcp
-2031469209 | 2025-03-29T10:13:34.704319
10065 / tcp
-2031469209 | 2025-03-29T03:23:21.573468
10066 / tcp
-2031469209 | 2025-03-28T18:39:35.056141
10068 / tcp
-2031469209 | 2025-03-29T15:07:00.590148
10071 / tcp
-2031469209 | 2025-03-23T08:41:49.929496
10075 / tcp
-2031469209 | 2025-03-29T22:17:45.903809
10080 / tcp
-98713449 | 2025-03-28T08:38:35.129427
10081 / tcp
-2031469209 | 2025-03-29T20:37:18.077236
10082 / tcp
-98713449 | 2025-03-29T04:28:15.122532
10083 / tcp
-98713449 | 2025-03-29T01:27:06.169146
10084 / tcp
-98713449 | 2025-03-29T16:34:23.601368
10086 / tcp
-98713449 | 2025-03-29T10:45:11.567497
10087 / tcp
-2031469209 | 2025-03-29T21:55:33.354100
10089 / tcp
-2031469209 | 2025-03-29T17:27:55.171593
10090 / tcp
-98713449 | 2025-03-29T21:35:16.526243
10093 / tcp
-2031469209 | 2025-03-28T20:51:36.952850
10100 / tcp
-98713449 | 2025-03-29T12:46:56.385893
10101 / tcp
-2031469209 | 2025-03-29T18:47:19.632396
10106 / tcp
-2031469209 | 2025-03-29T20:28:29.013230
10123 / tcp
-98713449 | 2025-03-29T02:06:51.479189
10180 / tcp
-2031469209 | 2025-03-29T16:06:45.411888
10181 / tcp
-98713449 | 2025-03-29T18:49:44.236705
10200 / tcp
-98713449 | 2025-03-28T21:22:01.981157
10201 / tcp
-98713449 | 2025-03-29T13:04:44.770230
10205 / tcp
-98713449 | 2025-03-29T08:58:14.703082
10209 / tcp
-98713449 | 2025-03-29T14:19:34.535665
10210 / tcp
-2031469209 | 2025-03-29T18:48:28.885618
10225 / tcp
-2031469209 | 2025-03-29T15:41:28.290722
10240 / tcp
-98713449 | 2025-03-29T13:28:53.638893
10243 / tcp
-98713449 | 2025-03-29T15:15:42.016067
10249 / tcp
-98713449 | 2025-03-29T12:05:18.530315
10250 / tcp
411540654 | 2025-03-31T14:20:49.661861
10251 / tcp
-2031469209 | 2025-03-29T13:36:38.874369
10254 / tcp
-2031469209 | 2025-03-29T03:33:58.445910
10255 / tcp
-98713449 | 2025-03-29T02:52:57.249353
10256 / tcp
-2031469209 | 2025-03-29T03:44:16.255235
10283 / tcp
-2031469209 | 2025-03-29T15:21:04.976814
10302 / tcp
-2031469209 | 2025-03-29T10:04:31.326764
10324 / tcp
-2031469209 | 2025-03-29T08:15:11.264175
10348 / tcp
-2031469209 | 2025-03-29T01:26:14.141891
10380 / tcp
-98713449 | 2025-03-29T05:09:56.353770
10390 / tcp
-2031469209 | 2025-03-29T09:16:24.068083
10393 / tcp
-98713449 | 2025-03-29T13:18:27.499256
10397 / tcp
-2031469209 | 2025-03-29T13:56:06.026037
10398 / tcp
-98713449 | 2025-03-29T09:10:53.269194
10399 / tcp
-2031469209 | 2025-03-29T20:56:20.648951
10443 / tcp
1793581629 | 2025-03-28T01:39:13.284955
10444 / tcp
-98713449 | 2025-03-28T09:18:44.132465
10445 / tcp
-2031469209 | 2025-03-29T07:52:37.937589
10477 / tcp
-2031469209 | 2025-03-29T17:05:01.860912
10480 / tcp
-2031469209 | 2025-03-28T15:42:09.844566
10533 / tcp
-2031469209 | 2025-03-28T16:37:37.074348
10554 / tcp
-2031469209 | 2025-03-29T15:15:49.093337
10810 / tcp
-2031469209 | 2025-03-29T02:42:22.006194
10892 / tcp
-2031469209 | 2025-03-29T00:06:29.868363
10894 / tcp
-98713449 | 2025-03-29T14:05:46.667178
10909 / tcp
-2031469209 | 2025-03-31T16:31:18.863982
10911 / tcp
-2031469209 | 2025-03-29T15:00:29.296323
10933 / tcp
-98713449 | 2025-03-28T09:37:48.195643
10934 / tcp
-98713449 | 2025-03-28T01:00:24.744060
10935 / tcp
-2031469209 | 2025-03-23T07:19:22.634374
10936 / tcp
-2031469209 | 2025-03-29T13:04:24.002338
10943 / tcp
-98713449 | 2025-03-29T09:49:04.525377
11000 / tcp
-2031469209 | 2025-04-01T01:13:37.035616
11001 / tcp
-98713449 | 2025-03-28T17:29:17.661779
11002 / tcp
-2031469209 | 2025-03-29T03:03:06.807906
11007 / tcp
-98713449 | 2025-03-29T04:23:06.408117
11027 / tcp
-2031469209 | 2025-03-29T13:39:52.041662
11065 / tcp
-98713449 | 2025-03-29T03:19:01.656572
11075 / tcp
-98713449 | 2025-03-29T17:30:26.056644
11082 / tcp
-2031469209 | 2025-03-29T13:23:59.436359
11084 / tcp
-98713449 | 2025-03-29T02:20:34.738731
11101 / tcp
-2031469209 | 2025-03-29T10:17:28.068235
11110 / tcp
-2031469209 | 2025-03-29T19:43:27.757952
11111 / tcp
-2031469209 | 2025-03-29T13:26:36.257518
11112 / tcp
-2031469209 | 2025-03-27T14:47:22.239881
11180 / tcp
-98713449 | 2025-03-29T19:27:17.975221
11182 / tcp
-2031469209 | 2025-03-29T15:54:05.013438
11184 / tcp
-98713449 | 2025-03-29T18:17:03.102198
11210 / tcp
-2031469209 | 2025-03-29T07:58:14.389138
11211 / tcp
2034197593 | 2025-03-28T13:22:34.121374
11288 / tcp
-2031469209 | 2025-03-28T12:37:39.979954
11300 / tcp
-2031469209 | 2025-04-01T01:21:01.582036
11371 / tcp
-2031469209 | 2025-03-29T19:18:25.192097
11401 / tcp
-98713449 | 2025-03-28T12:54:36.450453
11434 / tcp
-2031469209 | 2025-03-31T16:50:55.309834
11443 / tcp
-98713449 | 2025-03-29T09:14:52.792018
11480 / tcp
-2031469209 | 2025-03-29T01:02:27.875995
11481 / tcp
-2031469209 | 2025-03-29T03:31:54.783225
11596 / tcp
-98713449 | 2025-03-29T14:04:50.016758
11601 / tcp
-98713449 | 2025-03-28T07:23:56.113867
11602 / tcp
-2031469209 | 2025-03-29T14:46:27.394568
11680 / tcp
-98713449 | 2025-03-28T11:31:41.216677
11681 / tcp
-98713449 | 2025-03-28T03:45:46.467391
11688 / tcp
-2031469209 | 2025-03-28T19:25:29.442267
11701 / tcp
-98713449 | 2025-03-29T19:15:11.264964
11920 / tcp
-2031469209 | 2025-03-28T15:32:32.899137
12000 / tcp
-2031469209 | 2025-03-31T15:38:16.073471
12001 / tcp
-2031469209 | 2025-03-29T03:34:34.963408
12016 / tcp
-2031469209 | 2025-03-28T13:54:46.484071
12019 / tcp
-98713449 | 2025-03-28T19:31:22.575751
12056 / tcp
-2031469209 | 2025-03-28T02:26:51.298231
12082 / tcp
-98713449 | 2025-03-29T04:57:46.305883
12084 / tcp
-2031469209 | 2025-03-28T20:39:35.733987
12088 / tcp
-98713449 | 2025-03-29T19:31:23.541539
12101 / tcp
-2031469209 | 2025-03-29T05:17:24.461474
12103 / tcp
-2031469209 | 2025-03-29T12:45:27.231072
12104 / tcp
-98713449 | 2025-03-29T08:21:23.190970
12105 / tcp
-98713449 | 2025-03-29T11:52:48.139903
12107 / tcp
-98713449 | 2025-03-29T01:25:26.108474
12108 / tcp
-98713449 | 2025-03-29T05:20:30.553847
12109 / tcp
-98713449 | 2025-03-29T16:33:17.581417
12110 / tcp
-2031469209 | 2025-03-29T10:25:21.591120
12111 / tcp
-98713449 | 2025-03-29T04:10:07.712551
12112 / tcp
-98713449 | 2025-03-29T03:03:40.324151
12113 / tcp
-2031469209 | 2025-03-29T06:25:29.799645
12114 / tcp
-98713449 | 2025-03-29T20:26:11.754787
12115 / tcp
-2031469209 | 2025-03-29T12:31:53.795129
12116 / tcp
-98713449 | 2025-03-29T05:33:54.856124
12117 / tcp
-98713449 | 2025-03-29T21:42:43.352353
12118 / tcp
-98713449 | 2025-03-29T05:25:28.427135
12119 / tcp
-98713449 | 2025-03-28T15:11:31.943953
12120 / tcp
-98713449 | 2025-03-29T12:56:13.823226
12121 / tcp
-2031469209 | 2025-03-29T03:15:02.846392
12122 / tcp
-98713449 | 2025-03-29T15:26:25.259735
12123 / tcp
-98713449 | 2025-03-29T16:17:01.885956
12124 / tcp
-2031469209 | 2025-03-28T11:56:57.868920
12125 / tcp
-2031469209 | 2025-03-28T11:54:09.470676
12126 / tcp
-98713449 | 2025-03-28T01:37:58.796753
12127 / tcp
-2031469209 | 2025-03-29T12:17:02.697529
12128 / tcp
-2031469209 | 2025-03-28T07:22:04.723470
12129 / tcp
-98713449 | 2025-03-29T21:31:24.102557
12130 / tcp
-98713449 | 2025-03-28T14:55:44.540753
12131 / tcp
-2031469209 | 2025-03-29T03:46:35.020464
12132 / tcp
-2031469209 | 2025-03-29T03:00:02.590853
12133 / tcp
-2031469209 | 2025-03-29T07:52:44.619606
12134 / tcp
-2031469209 | 2025-03-28T09:13:53.752964
12135 / tcp
-2031469209 | 2025-03-29T01:43:24.333436
12136 / tcp
-98713449 | 2025-03-29T04:29:32.582695
12137 / tcp
-98713449 | 2025-03-29T02:18:55.490579
12138 / tcp
-98713449 | 2025-03-29T16:24:11.788624
12139 / tcp
-98713449 | 2025-03-29T07:47:31.029088
12140 / tcp
-2031469209 | 2025-03-29T11:37:25.853183
12141 / tcp
-98713449 | 2025-03-29T10:14:48.475013
12142 / tcp
-98713449 | 2025-03-29T05:13:59.026595
12143 / tcp
-98713449 | 2025-03-29T16:05:37.242775
12144 / tcp
-98713449 | 2025-03-28T13:52:37.431756
12145 / tcp
-2031469209 | 2025-03-29T17:17:31.233051
12146 / tcp
-98713449 | 2025-03-29T12:53:36.298357
12147 / tcp
-98713449 | 2025-03-29T02:47:59.527407
12148 / tcp
-2031469209 | 2025-03-29T15:19:17.800245
12149 / tcp
-98713449 | 2025-03-28T03:40:59.836211
12150 / tcp
-2031469209 | 2025-03-29T09:46:40.050401
12151 / tcp
-98713449 | 2025-03-29T05:13:03.993849
12152 / tcp
-98713449 | 2025-03-29T05:12:22.292745
12153 / tcp
-98713449 | 2025-03-19T12:00:18.956346
12154 / tcp
-98713449 | 2025-03-28T01:53:50.147274
12155 / tcp
-98713449 | 2025-03-28T23:53:43.158551
12156 / tcp
-2031469209 | 2025-03-29T11:35:44.181487
12157 / tcp
-98713449 | 2025-03-29T21:08:35.360554
12158 / tcp
-2031469209 | 2025-03-29T14:57:11.066888
12159 / tcp
-98713449 | 2025-03-29T15:43:47.042473
12160 / tcp
-98713449 | 2025-03-29T11:42:58.197248
12161 / tcp
-98713449 | 2025-03-29T03:09:53.619635
12162 / tcp
-98713449 | 2025-03-29T03:57:44.572296
12163 / tcp
-2031469209 | 2025-03-28T19:44:00.373020
12164 / tcp
-98713449 | 2025-03-29T09:32:20.457907
12165 / tcp
-2031469209 | 2025-03-29T21:11:10.715581
12166 / tcp
-98713449 | 2025-03-22T05:19:24.016120
12167 / tcp
-2031469209 | 2025-03-29T00:17:00.976546
12168 / tcp
-98713449 | 2025-03-29T02:36:50.418597
12169 / tcp
-2031469209 | 2025-03-28T07:38:10.463979
12170 / tcp
-98713449 | 2025-03-29T18:05:39.408551
12171 / tcp
-2031469209 | 2025-03-29T16:48:04.757173
12172 / tcp
-2031469209 | 2025-03-29T11:16:08.742803
12173 / tcp
-98713449 | 2025-03-28T20:50:06.239409
12174 / tcp
-98713449 | 2025-03-29T05:29:38.297920
12175 / tcp
-2031469209 | 2025-03-29T14:05:41.627513
12176 / tcp
-2031469209 | 2025-03-28T17:46:50.782250
12177 / tcp
-2031469209 | 2025-03-29T13:31:15.476357
12178 / tcp
-98713449 | 2025-03-28T07:56:39.436133
12179 / tcp
-2031469209 | 2025-03-29T17:15:24.896813
12180 / tcp
-2031469209 | 2025-03-28T11:53:49.643170
12181 / tcp
-98713449 | 2025-03-29T04:33:44.387378
12182 / tcp
-2031469209 | 2025-03-29T05:13:42.225972
12183 / tcp
-98713449 | 2025-03-28T08:21:27.528079
12184 / tcp
-98713449 | 2025-03-31T21:25:52.425314
12185 / tcp
-98713449 | 2025-03-29T19:37:18.276191
12186 / tcp
-98713449 | 2025-03-29T16:42:58.504879
12187 / tcp
-2031469209 | 2025-03-23T16:49:55.900391
12188 / tcp
-2031469209 | 2025-03-29T10:26:19.908097
12189 / tcp
-2031469209 | 2025-03-28T02:43:43.584047
12190 / tcp
-98713449 | 2025-03-29T08:57:22.953629
12191 / tcp
-98713449 | 2025-03-28T02:29:53.232395
12192 / tcp
-2031469209 | 2025-03-29T10:35:22.148485
12193 / tcp
-2031469209 | 2025-03-29T01:33:59.609337
12194 / tcp
-98713449 | 2025-03-29T19:30:26.598717
12195 / tcp
-98713449 | 2025-03-28T17:44:07.181288
12196 / tcp
-2031469209 | 2025-03-29T14:38:52.591280
12197 / tcp
-2031469209 | 2025-03-28T22:31:06.719142
12198 / tcp
-2031469209 | 2025-03-23T02:53:42.523393
12199 / tcp
-2031469209 | 2025-03-29T10:15:14.170691
12200 / tcp
-98713449 | 2025-03-29T11:09:02.947334
12201 / tcp
-98713449 | 2025-03-29T03:16:33.958127
12202 / tcp
-2031469209 | 2025-03-29T15:31:05.453638
12203 / tcp
-98713449 | 2025-03-29T20:56:15.080908
12204 / tcp
-2031469209 | 2025-03-28T19:27:55.641378
12205 / tcp
-98713449 | 2025-03-29T10:21:36.983708
12206 / tcp
-98713449 | 2025-03-28T06:43:25.144129
12207 / tcp
-2031469209 | 2025-03-28T20:35:10.376089
12208 / tcp
-98713449 | 2025-03-29T18:52:25.687585
12209 / tcp
-98713449 | 2025-03-29T08:16:43.879559
12210 / tcp
-98713449 | 2025-03-29T15:09:24.605058
12211 / tcp
-98713449 | 2025-03-28T17:20:43.083906
12212 / tcp
-98713449 | 2025-03-29T04:40:06.305376
12213 / tcp
-98713449 | 2025-03-28T05:48:01.112501
12214 / tcp
-98713449 | 2025-03-29T17:47:10.632356
12215 / tcp
-2031469209 | 2025-03-29T04:49:19.440369
12216 / tcp
-98713449 | 2025-03-29T16:05:26.043591
12217 / tcp
-98713449 | 2025-03-28T15:47:32.243459
12218 / tcp
-98713449 | 2025-03-29T19:20:31.435729
12219 / tcp
-98713449 | 2025-03-29T08:04:58.503853
12220 / tcp
-2031469209 | 2025-03-28T15:26:16.473206
12221 / tcp
-2031469209 | 2025-03-29T21:53:27.239027
12222 / tcp
-2031469209 | 2025-03-28T08:47:18.131404
12223 / tcp
-98713449 | 2025-03-24T00:15:00.215271
12224 / tcp
-2031469209 | 2025-03-29T03:35:08.595487
12225 / tcp
-98713449 | 2025-03-29T01:57:09.851551
12226 / tcp
-98713449 | 2025-03-29T03:39:49.061007
12227 / tcp
-98713449 | 2025-03-29T16:53:06.821659
12228 / tcp
-2031469209 | 2025-03-29T02:27:21.287457
12229 / tcp
-98713449 | 2025-03-29T01:34:31.858317
12230 / tcp
-2031469209 | 2025-03-29T02:28:56.280587
12231 / tcp
-2031469209 | 2025-03-29T13:00:17.214764
12232 / tcp
-98713449 | 2025-03-28T18:43:48.052594
12233 / tcp
-98713449 | 2025-03-29T12:48:03.224149
12234 / tcp
-2031469209 | 2025-03-29T04:07:03.247165
12235 / tcp
-98713449 | 2025-03-29T03:18:21.551246
12236 / tcp
-98713449 | 2025-03-29T21:23:21.202120
12237 / tcp
-2031469209 | 2025-03-29T20:14:52.767576
12238 / tcp
-98713449 | 2025-03-29T14:03:08.658759
12239 / tcp
-98713449 | 2025-03-29T13:44:50.413571
12240 / tcp
-2031469209 | 2025-03-28T19:55:10.089292
12241 / tcp
-98713449 | 2025-03-29T04:43:21.535128
12242 / tcp
-2031469209 | 2025-03-29T09:18:58.831607
12243 / tcp
-2031469209 | 2025-03-28T17:12:38.504376
12244 / tcp
-2031469209 | 2025-03-29T08:10:48.712246
12245 / tcp
-2031469209 | 2025-03-29T12:48:16.642631
12246 / tcp
-2031469209 | 2025-03-29T15:40:53.652721
12247 / tcp
-2031469209 | 2025-03-29T19:19:15.556117
12248 / tcp
-2031469209 | 2025-03-29T10:01:31.944834
12249 / tcp
-2031469209 | 2025-03-29T01:53:37.005281
12250 / tcp
-2031469209 | 2025-03-29T18:35:20.986249
12251 / tcp
-98713449 | 2025-03-28T03:37:08.185688
12253 / tcp
-2031469209 | 2025-03-31T10:35:36.806327
12254 / tcp
-98713449 | 2025-03-29T03:02:41.322974
12255 / tcp
-98713449 | 2025-03-29T15:12:25.827131
12256 / tcp
-2031469209 | 2025-03-28T22:18:17.930827
12257 / tcp
-98713449 | 2025-03-29T17:29:35.194632
12258 / tcp
-98713449 | 2025-03-29T01:49:42.685218
12259 / tcp
-98713449 | 2025-03-29T17:38:20.463116
12260 / tcp
-98713449 | 2025-03-29T15:18:38.294787
12261 / tcp
-98713449 | 2025-03-28T12:55:43.309927
12262 / tcp
-2031469209 | 2025-03-28T16:27:16.762239
12263 / tcp
-2031469209 | 2025-03-29T14:11:13.615499
12264 / tcp
-2031469209 | 2025-03-28T10:02:45.967753
12265 / tcp
-98713449 | 2025-03-28T05:14:23.806253
12266 / tcp
-2031469209 | 2025-03-29T18:18:02.154367
12267 / tcp
-98713449 | 2025-03-28T06:04:44.334659
12268 / tcp
-2031469209 | 2025-03-29T12:33:09.585656
12269 / tcp
-98713449 | 2025-03-29T09:43:13.720095
12270 / tcp
-98713449 | 2025-03-29T08:53:17.718035
12271 / tcp
-98713449 | 2025-03-29T15:02:49.380662
12272 / tcp
-98713449 | 2025-03-29T19:51:01.489338
12273 / tcp
-98713449 | 2025-03-29T13:05:12.972836
12274 / tcp
-98713449 | 2025-03-29T12:29:19.821782
12275 / tcp
-2031469209 | 2025-03-29T14:27:45.645806
12276 / tcp
-98713449 | 2025-03-29T19:21:34.468052
12278 / tcp
-98713449 | 2025-03-29T12:20:09.186548
12279 / tcp
-98713449 | 2025-03-29T02:38:22.945675
12280 / tcp
-2031469209 | 2025-03-29T19:44:23.352125
12281 / tcp
-98713449 | 2025-03-29T14:12:14.845064
12282 / tcp
-98713449 | 2025-03-22T18:56:08.903473
12283 / tcp
-2031469209 | 2025-03-28T12:29:29.054652
12284 / tcp
-2031469209 | 2025-03-29T13:07:29.898253
12285 / tcp
-98713449 | 2025-03-29T13:35:36.986399
12286 / tcp
-2031469209 | 2025-03-29T14:20:28.759423
12287 / tcp
-2031469209 | 2025-03-29T04:10:36.777594
12288 / tcp
-98713449 | 2025-03-29T11:44:34.458786
12289 / tcp
-2031469209 | 2025-03-29T04:20:08.966818
12290 / tcp
-2031469209 | 2025-03-29T20:52:05.310716
12291 / tcp
-98713449 | 2025-03-29T06:25:22.961706
12292 / tcp
-2031469209 | 2025-03-29T09:12:49.438446
12293 / tcp
-2031469209 | 2025-03-29T05:05:16.297937
12294 / tcp
-98713449 | 2025-03-28T07:09:17.624694
12295 / tcp
-98713449 | 2025-03-29T11:50:14.464466
12296 / tcp
-2031469209 | 2025-03-29T09:22:45.271306
12297 / tcp
-2031469209 | 2025-03-29T20:30:47.348929
12298 / tcp
-2031469209 | 2025-03-29T04:32:34.416812
12299 / tcp
-98713449 | 2025-03-29T20:01:32.748121
12300 / tcp
-98713449 | 2025-03-28T19:10:16.923536
12301 / tcp
-98713449 | 2025-03-28T13:02:26.514745
12302 / tcp
-98713449 | 2025-03-29T16:18:14.109767
12303 / tcp
-98713449 | 2025-03-29T01:43:44.198335
12304 / tcp
-98713449 | 2025-03-29T17:56:45.677269
12305 / tcp
-98713449 | 2025-03-29T20:27:08.743068
12306 / tcp
-2031469209 | 2025-03-29T02:15:10.099279
12307 / tcp
-98713449 | 2025-03-29T09:46:24.572849
12308 / tcp
-98713449 | 2025-03-29T17:11:42.446552
12309 / tcp
-2031469209 | 2025-03-29T13:23:16.649685
12310 / tcp
-98713449 | 2025-03-28T04:25:59.188777
12311 / tcp
-98713449 | 2025-03-23T10:20:36.184622
12312 / tcp
-2031469209 | 2025-03-28T11:19:54.614346
12313 / tcp
-98713449 | 2025-03-29T11:26:47.587064
12314 / tcp
-98713449 | 2025-03-28T18:01:02.512796
12315 / tcp
-2031469209 | 2025-03-29T10:34:42.675819
12316 / tcp
-98713449 | 2025-03-29T04:33:04.883027
12317 / tcp
-2031469209 | 2025-03-29T16:58:13.178214
12318 / tcp
-2031469209 | 2025-03-29T02:59:51.748060
12319 / tcp
-98713449 | 2025-03-28T02:33:13.713741
12320 / tcp
-2031469209 | 2025-03-29T10:11:35.097725
12322 / tcp
-2031469209 | 2025-03-29T03:48:57.380912
12323 / tcp
1453710100 | 2025-03-29T20:31:27.443236
12324 / tcp
-2031469209 | 2025-03-28T23:55:53.898930
12325 / tcp
-98713449 | 2025-03-29T03:09:22.884964
12326 / tcp
-2031469209 | 2025-03-29T11:56:09.765497
12327 / tcp
-98713449 | 2025-03-29T19:45:59.671725
12328 / tcp
-2031469209 | 2025-03-28T00:56:31.007321
12330 / tcp
-2031469209 | 2025-03-28T10:35:34.649491
12331 / tcp
-2031469209 | 2025-03-29T09:55:18.077458
12332 / tcp
-98713449 | 2025-03-29T18:51:34.299931
12333 / tcp
-98713449 | 2025-03-29T03:38:10.868507
12334 / tcp
-2031469209 | 2025-03-29T04:32:25.748174
12335 / tcp
-2031469209 | 2025-03-29T03:21:13.058371
12336 / tcp
-2031469209 | 2025-03-29T08:02:36.430884
12337 / tcp
-2031469209 | 2025-03-29T20:10:52.498107
12338 / tcp
-2031469209 | 2025-03-29T11:25:18.294688
12339 / tcp
-2031469209 | 2025-03-29T20:50:02.372577
12340 / tcp
-2031469209 | 2025-03-29T11:01:00.155772
12341 / tcp
-2031469209 | 2025-03-29T15:39:14.084729
12342 / tcp
-98713449 | 2025-03-29T03:33:25.640885
12343 / tcp
-98713449 | 2025-03-29T16:29:14.847932
12344 / tcp
-2031469209 | 2025-03-29T17:07:37.775735
12345 / tcp
1638073473 | 2025-03-29T04:53:12.294235
12346 / tcp
-98713449 | 2025-03-29T00:59:30.800480
12347 / tcp
-98713449 | 2025-03-29T04:07:47.891564
12348 / tcp
-2031469209 | 2025-03-29T04:18:43.773220
12349 / tcp
-98713449 | 2025-03-29T17:20:59.296348
12350 / tcp
-2031469209 | 2025-03-28T12:55:19.250180
12351 / tcp
-2031469209 | 2025-03-29T14:36:05.582266
12352 / tcp
-2031469209 | 2025-03-29T22:13:58.166353
12353 / tcp
-98713449 | 2025-03-29T13:25:37.462461
12354 / tcp
-2031469209 | 2025-03-29T21:03:58.768860
12355 / tcp
-98713449 | 2025-03-28T23:25:37.377749
12356 / tcp
-98713449 | 2025-03-29T10:41:53.240327
12357 / tcp
-2031469209 | 2025-03-29T12:25:32.783060
12358 / tcp
-98713449 | 2025-03-29T13:37:31.328246
12359 / tcp
-98713449 | 2025-03-29T20:36:30.322146
12360 / tcp
-98713449 | 2025-03-28T19:56:04.271382
12361 / tcp
-98713449 | 2025-03-29T18:41:10.089787
12362 / tcp
-98713449 | 2025-03-29T13:13:17.708568
12363 / tcp
-98713449 | 2025-03-28T03:03:35.741953
12364 / tcp
-98713449 | 2025-03-29T18:25:48.440532
12365 / tcp
-98713449 | 2025-03-29T14:25:15.203425
12366 / tcp
-98713449 | 2025-03-29T18:49:54.612389
12367 / tcp
-2031469209 | 2025-03-29T08:57:08.859750
12368 / tcp
-98713449 | 2025-03-29T10:55:09.847093
12369 / tcp
-98713449 | 2025-03-29T07:53:22.600315
12370 / tcp
-98713449 | 2025-03-29T09:45:09.330304
12371 / tcp
-2031469209 | 2025-03-29T05:22:14.096687
12372 / tcp
-98713449 | 2025-03-29T10:41:35.924720
12373 / tcp
-2031469209 | 2025-03-28T13:52:22.346807
12374 / tcp
-2031469209 | 2025-03-29T20:40:17.215036
12375 / tcp
-98713449 | 2025-03-29T09:34:40.098806
12376 / tcp
-98713449 | 2025-03-29T17:09:26.750071
12377 / tcp
-2031469209 | 2025-03-29T15:03:45.633587
12378 / tcp
-2031469209 | 2025-03-29T11:34:16.573892
12379 / tcp
-2031469209 | 2025-03-29T09:53:17.015015
12380 / tcp
-2031469209 | 2025-03-29T02:21:17.797817
12381 / tcp
-2031469209 | 2025-03-29T13:04:18.640913
12382 / tcp
-2031469209 | 2025-03-29T05:18:32.118577
12383 / tcp
-2031469209 | 2025-03-28T17:50:00.507573
12384 / tcp
-98713449 | 2025-03-28T12:12:30.851744
12385 / tcp
-98713449 | 2025-03-29T20:45:24.892775
12386 / tcp
-2031469209 | 2025-03-29T08:47:36.543090
12387 / tcp
-2031469209 | 2025-03-29T18:05:58.981975
12388 / tcp
-2031469209 | 2025-03-29T15:16:25.924569
12389 / tcp
-98713449 | 2025-03-28T04:34:26.910105
12390 / tcp
-98713449 | 2025-03-29T01:31:44.547715
12391 / tcp
-2031469209 | 2025-03-28T18:35:33.942999
12392 / tcp
-2031469209 | 2025-03-28T23:25:02.818490
12393 / tcp
-2031469209 | 2025-03-28T09:58:22.056933
12394 / tcp
-2031469209 | 2025-03-29T02:57:13.864775
12395 / tcp
-2031469209 | 2025-03-29T08:35:55.631298
12396 / tcp
-98713449 | 2025-03-28T16:45:09.092117
12397 / tcp
-2031469209 | 2025-03-29T05:27:54.376170
12398 / tcp
-98713449 | 2025-03-28T21:06:21.124847
12399 / tcp
-2031469209 | 2025-03-29T10:05:25.352267
12400 / tcp
-98713449 | 2025-03-29T11:17:52.430515
12401 / tcp
-2031469209 | 2025-03-28T07:23:06.211285
12402 / tcp
-2031469209 | 2025-03-29T13:25:17.234540
12403 / tcp
-2031469209 | 2025-03-29T19:56:12.750831
12404 / tcp
-2031469209 | 2025-03-29T07:58:24.088596
12405 / tcp
-98713449 | 2025-03-29T04:49:35.472641
12406 / tcp
-98713449 | 2025-03-29T01:30:37.051982
12407 / tcp
-98713449 | 2025-03-28T06:20:33.868368
12408 / tcp
-98713449 | 2025-03-29T13:54:04.049897
12409 / tcp
-2031469209 | 2025-03-29T16:21:53.551216
12410 / tcp
-98713449 | 2025-03-28T19:47:18.468203
12411 / tcp
-98713449 | 2025-03-29T16:11:34.632510
12412 / tcp
-98713449 | 2025-03-29T17:10:54.201360
12413 / tcp
-2031469209 | 2025-03-29T08:32:51.964617
12414 / tcp
-98713449 | 2025-03-29T17:17:40.312886
12415 / tcp
-98713449 | 2025-03-29T20:50:34.694414
12416 / tcp
-98713449 | 2025-03-29T14:01:44.355318
12417 / tcp
-2031469209 | 2025-03-29T01:48:02.734136
12418 / tcp
-2031469209 | 2025-03-28T04:11:21.812399
12419 / tcp
-98713449 | 2025-03-29T13:26:24.665886
12420 / tcp
-2031469209 | 2025-03-29T08:56:04.183628
12421 / tcp
-98713449 | 2025-03-28T17:30:18.874587
12422 / tcp
-2031469209 | 2025-03-29T21:17:13.028231
12423 / tcp
-98713449 | 2025-03-29T02:39:47.876166
12424 / tcp
-98713449 | 2025-03-28T01:04:04.083953
12425 / tcp
-98713449 | 2025-03-29T11:16:43.024141
12426 / tcp
-98713449 | 2025-03-29T13:38:23.021903
12427 / tcp
-98713449 | 2025-03-29T19:53:30.342663
12428 / tcp
-2031469209 | 2025-03-29T15:01:39.578001
12429 / tcp
-2031469209 | 2025-03-29T12:13:36.855268
12430 / tcp
-98713449 | 2025-03-28T17:24:22.420569
12431 / tcp
-98713449 | 2025-03-28T05:00:03.184790
12432 / tcp
-2031469209 | 2025-03-29T20:32:03.321385
12433 / tcp
-98713449 | 2025-03-28T07:11:20.375748
12434 / tcp
-98713449 | 2025-03-28T12:59:44.100521
12435 / tcp
-2031469209 | 2025-03-29T15:01:45.674538
12436 / tcp
-98713449 | 2025-03-29T18:39:43.582731
12437 / tcp
-2031469209 | 2025-03-29T13:22:27.139028
12438 / tcp
-98713449 | 2025-03-29T05:06:27.316987
12439 / tcp
-98713449 | 2025-03-29T08:17:20.970711
12440 / tcp
-2031469209 | 2025-03-28T16:49:37.661695
12441 / tcp
-2031469209 | 2025-03-28T04:47:15.491460
12442 / tcp
-98713449 | 2025-03-29T08:31:35.987568
12443 / tcp
-98713449 | 2025-03-29T21:16:47.942270
12444 / tcp
-98713449 | 2025-03-29T04:45:04.769930
12445 / tcp
-2031469209 | 2025-03-29T06:26:04.096733
12446 / tcp
-2031469209 | 2025-03-29T17:27:36.054577
12447 / tcp
-98713449 | 2025-03-29T07:46:48.111238
12448 / tcp
-98713449 | 2025-03-29T14:28:33.484414
12449 / tcp
-98713449 | 2025-03-28T02:09:14.917717
12450 / tcp
-98713449 | 2025-03-28T09:42:58.943771
12451 / tcp
-98713449 | 2025-03-29T14:17:48.547271
12452 / tcp
-98713449 | 2025-03-29T09:18:39.197684
12453 / tcp
-98713449 | 2025-03-29T11:01:18.293114
12454 / tcp
-2031469209 | 2025-03-29T04:03:41.487669
12455 / tcp
-2031469209 | 2025-03-29T12:59:47.110661
12456 / tcp
-2031469209 | 2025-03-28T15:01:45.739481
12457 / tcp
-2031469209 | 2025-03-28T21:28:11.506352
12458 / tcp
-2031469209 | 2025-03-28T01:55:03.115003
12459 / tcp
-2031469209 | 2025-03-29T17:44:02.083148
12460 / tcp
-98713449 | 2025-03-29T13:40:40.677426
12461 / tcp
-2031469209 | 2025-03-28T02:27:38.907807
12462 / tcp
-2031469209 | 2025-03-29T14:12:26.275572
12463 / tcp
-98713449 | 2025-03-29T02:55:58.104508
12464 / tcp
-98713449 | 2025-03-29T00:55:49.865920
12465 / tcp
-98713449 | 2025-03-29T21:39:00.544518
12466 / tcp
-98713449 | 2025-03-28T11:28:00.287051
12467 / tcp
-2031469209 | 2025-03-29T07:48:13.991763
12468 / tcp
-2031469209 | 2025-03-29T09:30:29.506231
12469 / tcp
-2031469209 | 2025-03-29T03:04:57.245540
12470 / tcp
-2031469209 | 2025-03-28T20:14:09.492907
12471 / tcp
-2031469209 | 2025-03-29T03:07:42.785565
12472 / tcp
-2031469209 | 2025-03-29T17:24:21.809826
12473 / tcp
-2031469209 | 2025-03-29T20:06:16.168752
12474 / tcp
-98713449 | 2025-03-29T18:45:09.598732
12475 / tcp
-2031469209 | 2025-03-29T02:42:00.616418
12476 / tcp
-2031469209 | 2025-03-28T03:53:14.362487
12477 / tcp
-98713449 | 2025-03-29T13:32:40.725353
12478 / tcp
-98713449 | 2025-03-29T19:43:51.493170
12479 / tcp
-2031469209 | 2025-03-28T12:16:52.413926
12480 / tcp
-2031469209 | 2025-03-29T19:19:25.831138
12481 / tcp
-98713449 | 2025-03-29T20:52:28.340449
12482 / tcp
-2031469209 | 2025-03-29T09:12:31.997495
12483 / tcp
-98713449 | 2025-03-29T15:09:48.478421
12484 / tcp
-98713449 | 2025-03-29T14:51:34.378110
12485 / tcp
-2031469209 | 2025-03-29T16:50:54.893040
12486 / tcp
-98713449 | 2025-03-29T21:00:29.309840
12487 / tcp
-98713449 | 2025-03-29T02:56:58.507616
12488 / tcp
-2031469209 | 2025-03-28T03:34:15.308388
12489 / tcp
-98713449 | 2025-03-29T09:41:33.281829
12490 / tcp
-2031469209 | 2025-03-29T10:07:19.711948
12491 / tcp
-98713449 | 2025-03-29T14:40:32.074561
12492 / tcp
-2031469209 | 2025-03-29T14:03:24.767662
12493 / tcp
-98713449 | 2025-03-22T23:16:56.274674
12494 / tcp
-98713449 | 2025-03-29T12:18:31.122460
12495 / tcp
-98713449 | 2025-03-29T12:19:32.280294
12496 / tcp
-98713449 | 2025-03-29T13:01:53.702531
12497 / tcp
-2031469209 | 2025-03-29T13:11:15.748677
12498 / tcp
-98713449 | 2025-03-28T10:00:25.646044
12499 / tcp
-2031469209 | 2025-03-29T16:57:53.746569
12500 / tcp
-98713449 | 2025-03-29T21:20:58.369136
12501 / tcp
-98713449 | 2025-03-29T10:44:39.234288
12502 / tcp
-2031469209 | 2025-03-29T09:39:43.648951
12503 / tcp
-98713449 | 2025-03-29T15:56:10.141960
12504 / tcp
-2031469209 | 2025-03-28T17:10:56.619364
12505 / tcp
-2031469209 | 2025-03-29T12:47:43.974884
12506 / tcp
-2031469209 | 2025-03-29T11:45:21.888017
12507 / tcp
-98713449 | 2025-03-29T07:51:37.253063
12508 / tcp
-98713449 | 2025-03-29T08:39:32.206304
12509 / tcp
-2031469209 | 2025-03-29T17:24:58.697359
12510 / tcp
-2031469209 | 2025-03-29T18:13:46.413472
12511 / tcp
-98713449 | 2025-03-29T20:03:41.546891
12512 / tcp
-2031469209 | 2025-03-29T01:22:58.865414
12513 / tcp
-98713449 | 2025-03-29T07:46:55.747449
12514 / tcp
-98713449 | 2025-03-29T00:39:58.532526
12515 / tcp
-98713449 | 2025-03-29T02:47:10.269986
12516 / tcp
-98713449 | 2025-03-29T08:05:44.171444
12517 / tcp
-98713449 | 2025-03-29T12:02:49.721363
12518 / tcp
-2031469209 | 2025-03-29T02:47:44.679572
12519 / tcp
-2031469209 | 2025-03-29T01:20:35.626241
12520 / tcp
-98713449 | 2025-03-29T14:32:09.999019
12521 / tcp
-98713449 | 2025-03-29T13:46:26.339843
12522 / tcp
-98713449 | 2025-03-29T01:23:30.045846
12523 / tcp
-2031469209 | 2025-03-28T06:06:43.805250
12524 / tcp
-2031469209 | 2025-03-28T11:46:37.078623
12525 / tcp
-98713449 | 2025-03-28T03:50:25.266016
12527 / tcp
-98713449 | 2025-03-28T06:50:45.861090
12528 / tcp
-2031469209 | 2025-03-29T17:19:13.697768
12529 / tcp
-98713449 | 2025-03-28T09:07:42.803996
12530 / tcp
-98713449 | 2025-03-29T04:01:34.541924
12531 / tcp
-98713449 | 2025-03-29T15:01:08.492507
12532 / tcp
-2031469209 | 2025-03-23T21:50:21.171946
12533 / tcp
-2031469209 | 2025-03-29T10:09:24.820790
12534 / tcp
-98713449 | 2025-03-28T15:20:26.942022
12535 / tcp
-2031469209 | 2025-03-29T16:32:51.031158
12536 / tcp
-2031469209 | 2025-03-29T10:27:05.486994
12537 / tcp
-2031469209 | 2025-03-29T08:59:15.994453
12538 / tcp
-2031469209 | 2025-03-29T03:42:56.277719
12539 / tcp
-98713449 | 2025-03-29T02:31:41.941477
12540 / tcp
-98713449 | 2025-03-29T08:29:43.823484
12542 / tcp
-2031469209 | 2025-03-29T12:54:04.333422
12543 / tcp
-98713449 | 2025-03-29T17:00:30.208652
12544 / tcp
-2031469209 | 2025-03-29T11:27:01.223244
12545 / tcp
-2031469209 | 2025-03-29T20:59:35.742536
12546 / tcp
-2031469209 | 2025-03-29T13:13:33.895900
12547 / tcp
-98713449 | 2025-03-29T13:36:09.681547
12548 / tcp
-98713449 | 2025-03-29T15:45:18.945595
12549 / tcp
-98713449 | 2025-03-29T13:55:31.103313
12550 / tcp
-2031469209 | 2025-03-29T03:07:03.550902
12551 / tcp
-2031469209 | 2025-03-29T14:20:52.361861
12552 / tcp
-2031469209 | 2025-03-29T17:04:50.715254
12553 / tcp
-98713449 | 2025-03-29T09:06:27.356234
12554 / tcp
-2031469209 | 2025-03-28T13:01:35.429664
12555 / tcp
-98713449 | 2025-03-29T08:19:42.559130
12556 / tcp
-98713449 | 2025-03-28T04:10:42.088220
12557 / tcp
-98713449 | 2025-03-29T12:27:21.550262
12558 / tcp
-98713449 | 2025-03-29T07:49:10.585675
12559 / tcp
-2031469209 | 2025-03-29T01:16:58.409165
12560 / tcp
-98713449 | 2025-03-29T13:47:25.180640
12561 / tcp
-98713449 | 2025-03-29T18:51:43.321292
12562 / tcp
-98713449 | 2025-03-29T02:25:35.704696
12563 / tcp
-98713449 | 2025-03-29T18:12:31.031469
12564 / tcp
-98713449 | 2025-03-28T11:25:54.089992
12565 / tcp
-2031469209 | 2025-03-29T16:07:27.285145
12566 / tcp
-98713449 | 2025-03-28T19:36:44.174376
12567 / tcp
-98713449 | 2025-03-29T01:27:36.230036
12568 / tcp
-98713449 | 2025-03-29T20:45:35.457784
12569 / tcp
-2031469209 | 2025-03-29T02:16:04.741020
12570 / tcp
-98713449 | 2025-03-28T12:29:17.230753
12571 / tcp
-2031469209 | 2025-03-29T20:47:23.776166
12572 / tcp
-2031469209 | 2025-03-28T13:28:09.442930
12573 / tcp
-2031469209 | 2025-03-29T09:55:12.733769
12574 / tcp
-2031469209 | 2025-03-29T09:53:20.937264
12575 / tcp
-2031469209 | 2025-03-29T12:51:21.720167
12576 / tcp
-2031469209 | 2025-03-28T06:15:13.146127
12577 / tcp
-2031469209 | 2025-03-29T09:09:37.889483
12578 / tcp
-2031469209 | 2025-03-29T05:22:38.334622
12579 / tcp
-98713449 | 2025-03-29T19:07:08.634030
12580 / tcp
-98713449 | 2025-03-28T18:01:47.920314
12581 / tcp
-98713449 | 2025-03-29T15:27:03.545627
12582 / tcp
-98713449 | 2025-03-28T23:04:55.045881
12583 / tcp
-98713449 | 2025-03-29T20:19:48.064759
12584 / tcp
-98713449 | 2025-03-29T12:09:56.342820
12585 / tcp
-98713449 | 2025-03-29T21:16:00.671804
12586 / tcp
-98713449 | 2025-03-28T15:37:21.164696
12587 / tcp
-2031469209 | 2025-03-31T07:56:16.053042
12588 / tcp
-2031469209 | 2025-03-29T02:37:59.151361
12589 / tcp
-2031469209 | 2025-03-29T01:31:20.570514
12590 / tcp
-2031469209 | 2025-03-29T18:45:59.871250
12601 / tcp
-2031469209 | 2025-03-28T17:32:49.587648
12615 / tcp
-98713449 | 2025-03-28T18:43:18.895792
12902 / tcp
-2031469209 | 2025-03-28T15:31:38.721236
12980 / tcp
-98713449 | 2025-03-28T21:25:01.472562
13000 / tcp
-2031469209 | 2025-03-29T16:36:10.212443
13001 / tcp
-98713449 | 2025-03-28T13:26:08.302141
13047 / tcp
411540654 | 2025-03-27T08:39:33.831940
13082 / tcp
-98713449 | 2025-03-29T17:20:37.521818
13084 / tcp
-2031469209 | 2025-03-29T08:22:09.179366
13128 / tcp
-2031469209 | 2025-03-29T08:23:02.055430
13228 / tcp
-98713449 | 2025-03-29T15:20:40.757135
13333 / tcp
-2031469209 | 2025-03-29T04:14:36.265161
13380 / tcp
-98713449 | 2025-03-29T04:33:15.638303
13443 / tcp
-2031469209 | 2025-03-29T17:53:49.549261
13579 / tcp
-2031469209 | 2025-03-29T17:22:51.335018
13780 / tcp
-98713449 | 2025-03-29T09:52:40.962592
14006 / tcp
-98713449 | 2025-03-29T15:48:04.778611
14024 / tcp
-98713449 | 2025-03-29T14:30:54.995146
14026 / tcp
-98713449 | 2025-03-29T08:31:43.234675
14082 / tcp
-98713449 | 2025-03-29T07:48:28.385758
14084 / tcp
-98713449 | 2025-03-29T10:09:45.791364
14101 / tcp
-2031469209 | 2025-03-28T02:40:10.558610
14104 / tcp
-2031469209 | 2025-03-29T04:55:04.385633
14130 / tcp
-2031469209 | 2025-03-28T09:09:01.243885
14147 / tcp
-2031469209 | 2025-03-31T10:59:17.780785
14182 / tcp
-98713449 | 2025-03-29T18:34:30.185387
14184 / tcp
-2031469209 | 2025-03-29T15:55:27.281409
14265 / tcp
-2031469209 | 2025-03-31T23:28:45.117104
14330 / tcp
-2031469209 | 2025-03-29T15:36:16.007330
14400 / tcp
-2031469209 | 2025-03-28T19:09:58.312303
14401 / tcp
-98713449 | 2025-03-29T22:17:22.902175
14402 / tcp
-2031469209 | 2025-03-29T15:27:40.416138
14403 / tcp
-2031469209 | 2025-03-29T11:49:11.719200
14404 / tcp
-2031469209 | 2025-03-29T21:24:38.148731
14406 / tcp
-98713449 | 2025-03-29T17:48:59.025385
14407 / tcp
-98713449 | 2025-03-29T10:45:33.187145
14443 / tcp
-98713449 | 2025-03-28T03:43:08.788578
14523 / tcp
-98713449 | 2025-03-29T14:16:50.781952
14524 / tcp
-2031469209 | 2025-03-29T21:24:04.730518
14825 / tcp
-2031469209 | 2025-03-29T04:44:42.675636
14873 / tcp
-98713449 | 2025-03-29T15:58:10.983905
14875 / tcp
-2031469209 | 2025-03-29T19:32:40.927755
14880 / tcp
-98713449 | 2025-03-29T12:53:52.952194
14894 / tcp
-2031469209 | 2025-03-29T14:24:01.948080
14895 / tcp
-2031469209 | 2025-03-28T02:51:15.113067
14896 / tcp
-2031469209 | 2025-03-28T04:53:28.381931
14897 / tcp
-98713449 | 2025-03-29T13:35:31.340226
14900 / tcp
-2031469209 | 2025-03-29T13:52:24.152448
14901 / tcp
-98713449 | 2025-03-28T16:49:20.143710
14903 / tcp
-98713449 | 2025-03-29T00:18:34.376675
14905 / tcp
-98713449 | 2025-03-29T20:53:58.282494
14909 / tcp
-98713449 | 2025-03-29T03:55:42.973733
15000 / tcp
-98713449 | 2025-03-29T01:04:45.911745
15001 / tcp
-2031469209 | 2025-03-29T15:10:58.578259
15002 / tcp
-2031469209 | 2025-03-28T17:22:36.277309
15006 / tcp
-2031469209 | 2025-03-29T14:31:39.743220
15018 / tcp
-2031469209 | 2025-03-29T11:04:01.088923
15038 / tcp
-98713449 | 2025-03-28T15:45:53.067087
15040 / tcp
-98713449 | 2025-03-29T04:48:01.551152
15042 / tcp
-98713449 | 2025-03-29T12:07:01.147290
15044 / tcp
-2031469209 | 2025-03-29T14:27:47.674694
15082 / tcp
-2031469209 | 2025-03-29T13:09:42.922990
15084 / tcp
-2031469209 | 2025-03-29T18:15:30.126050
15123 / tcp
-2031469209 | 2025-03-29T15:08:50.424726
15151 / tcp
-98713449 | 2025-03-29T14:43:00.058524
15443 / tcp
1094048410 | 2025-03-28T14:40:02.867843
15502 / tcp
-98713449 | 2025-03-29T02:10:40.777190
15503 / tcp
-2031469209 | 2025-03-28T07:10:46.273715
15504 / tcp
-2031469209 | 2025-03-31T22:01:27.158346
15555 / tcp
-98713449 | 2025-03-28T23:50:44.266407
15588 / tcp
-98713449 | 2025-03-29T15:16:17.171373
15672 / tcp
-2031469209 | 2025-03-29T10:49:48.212738
15673 / tcp
-2031469209 | 2025-03-29T17:15:45.832097
15831 / tcp
-98713449 | 2025-03-28T12:28:57.157622
16000 / tcp
-2031469209 | 2025-03-29T07:52:44.148472
16001 / tcp
-98713449 | 2025-03-29T18:53:00.293839
16002 / tcp
-2031469209 | 2025-03-29T03:06:06.223813
16003 / tcp
-98713449 | 2025-03-28T00:35:16.394079
16004 / tcp
-2031469209 | 2025-03-29T17:51:28.495613
16005 / tcp
-98713449 | 2025-03-29T15:53:16.765665
16006 / tcp
-98713449 | 2025-03-29T14:59:41.941477
16007 / tcp
-98713449 | 2025-03-28T03:52:55.998471
16008 / tcp
-98713449 | 2025-03-29T02:15:29.676045
16009 / tcp
-98713449 | 2025-03-28T00:32:19.104860
16010 / tcp
-98713449 | 2025-03-31T18:14:06.297601
16011 / tcp
-2031469209 | 2025-03-29T04:20:02.934518
16012 / tcp
-98713449 | 2025-03-29T15:38:20.428851
16013 / tcp
-98713449 | 2025-03-29T17:31:29.532049
16014 / tcp
-2031469209 | 2025-03-29T14:33:59.646280
16015 / tcp
-2031469209 | 2025-03-28T21:49:46.648015
16016 / tcp
-98713449 | 2025-03-29T15:52:20.883394
16017 / tcp
-98713449 | 2025-03-28T11:11:40.539853
16018 / tcp
-98713449 | 2025-03-04T23:07:53.623390
16019 / tcp
-2031469209 | 2025-03-29T21:24:30.196229
16020 / tcp
-2031469209 | 2025-03-28T04:47:55.832100
16021 / tcp
-2031469209 | 2025-03-29T01:02:27.018207
16022 / tcp
-98713449 | 2025-03-29T02:25:20.942316
16023 / tcp
-98713449 | 2025-03-29T18:34:05.832108
16024 / tcp
-2031469209 | 2025-03-28T16:25:40.333899
16025 / tcp
-2031469209 | 2025-03-23T02:10:56.002612
16026 / tcp
-2031469209 | 2025-03-29T01:24:01.120569
16027 / tcp
-2031469209 | 2025-03-28T08:38:15.447495
16028 / tcp
-2031469209 | 2025-03-28T01:57:38.757887
16029 / tcp
-2031469209 | 2025-03-29T01:52:47.460703
16030 / tcp
-98713449 | 2025-03-29T17:58:00.311906
16031 / tcp
-98713449 | 2025-03-29T10:25:57.447354
16032 / tcp
-98713449 | 2025-03-29T16:10:31.127755
16033 / tcp
-98713449 | 2025-03-29T08:42:22.229802
16034 / tcp
-2031469209 | 2025-03-29T01:29:13.341472
16035 / tcp
-98713449 | 2025-03-29T18:14:13.682375
16036 / tcp
-98713449 | 2025-03-28T15:15:15.462090
16037 / tcp
-98713449 | 2025-03-29T02:45:27.272624
16038 / tcp
-98713449 | 2025-03-29T14:31:59.005962
16039 / tcp
-2031469209 | 2025-03-28T18:59:58.133692
16040 / tcp
-98713449 | 2025-03-29T03:54:03.389863
16041 / tcp
-98713449 | 2025-03-29T02:57:40.862471
16042 / tcp
-2031469209 | 2025-03-29T19:40:00.653480
16043 / tcp
-2031469209 | 2025-03-23T10:01:37.464186
16044 / tcp
-2031469209 | 2025-03-29T15:04:58.501523
16045 / tcp
-98713449 | 2025-03-29T04:27:08.666875
16046 / tcp
-98713449 | 2025-03-28T17:27:19.796648
16047 / tcp
-98713449 | 2025-03-29T03:07:27.717429
16048 / tcp
-2031469209 | 2025-03-29T08:41:13.736678
16049 / tcp
-98713449 | 2025-03-29T16:24:29.356795
16050 / tcp
-2031469209 | 2025-03-29T10:04:54.870665
16051 / tcp
-98713449 | 2025-03-29T02:48:59.453073
16052 / tcp
-98713449 | 2025-03-28T21:15:41.506915
16053 / tcp
-98713449 | 2025-03-28T21:01:39.374771
16054 / tcp
-2031469209 | 2025-03-28T01:21:11.455423
16055 / tcp
-98713449 | 2025-03-28T12:26:52.189349
16056 / tcp
-98713449 | 2025-03-29T08:26:49.996219
16057 / tcp
-98713449 | 2025-03-29T11:51:36.194464
16058 / tcp
-98713449 | 2025-03-29T02:21:08.508356
16059 / tcp
-2031469209 | 2025-03-29T01:47:24.774813
16060 / tcp
-98713449 | 2025-03-28T01:45:15.800576
16061 / tcp
-98713449 | 2025-03-29T19:20:51.847842
16062 / tcp
-2031469209 | 2025-03-29T21:00:31.064955
16063 / tcp
-98713449 | 2025-03-29T09:34:05.224045
16064 / tcp
-98713449 | 2025-03-29T15:39:41.084072
16065 / tcp
-2031469209 | 2025-03-29T04:37:01.817806
16066 / tcp
-2031469209 | 2025-03-29T10:09:04.176661
16067 / tcp
-2031469209 | 2025-03-29T09:54:55.288687
16068 / tcp
-98713449 | 2025-03-28T22:21:11.768351
16069 / tcp
-98713449 | 2025-03-29T17:02:58.598426
16070 / tcp
-98713449 | 2025-03-28T19:32:15.684622
16071 / tcp
-98713449 | 2025-03-29T00:51:12.651151
16072 / tcp
-98713449 | 2025-03-29T12:07:54.418430
16073 / tcp
-2031469209 | 2025-03-29T13:03:22.809120
16074 / tcp
-2031469209 | 2025-03-29T04:41:20.539656
16075 / tcp
-98713449 | 2025-03-28T15:52:15.391494
16076 / tcp
-2031469209 | 2025-03-29T18:31:56.947556
16077 / tcp
-2031469209 | 2025-03-29T08:51:14.023266
16078 / tcp
-98713449 | 2025-03-29T07:50:05.196055
16079 / tcp
-2031469209 | 2025-03-29T08:44:57.635019
16080 / tcp
-2031469209 | 2025-03-29T21:30:59.453967
16081 / tcp
-98713449 | 2025-03-29T21:09:45.764964
16082 / tcp
-98713449 | 2025-03-29T14:29:04.033166
16083 / tcp
-2031469209 | 2025-03-29T21:20:50.146444
16084 / tcp
-2031469209 | 2025-03-29T04:14:01.341571
16085 / tcp
-98713449 | 2025-03-29T16:26:37.108581
16086 / tcp
-98713449 | 2025-03-28T01:38:41.986482
16087 / tcp
-98713449 | 2025-03-29T15:23:46.814823
16088 / tcp
-98713449 | 2025-03-28T23:51:13.980207
16089 / tcp
-2031469209 | 2025-03-22T07:15:44.837689
16090 / tcp
-2031469209 | 2025-03-28T03:43:37.058368
16091 / tcp
-98713449 | 2025-03-23T15:10:17.530262
16092 / tcp
-98713449 | 2025-03-29T14:42:09.051803
16093 / tcp
-2031469209 | 2025-03-29T14:26:29.938515
16094 / tcp
-2031469209 | 2025-03-29T12:58:15.048929
16095 / tcp
-98713449 | 2025-03-29T20:40:56.978738
16096 / tcp
-2031469209 | 2025-03-29T10:57:28.728926
16097 / tcp
-98713449 | 2025-03-29T08:24:59.730512
16098 / tcp
-2031469209 | 2025-03-29T15:37:57.651226
16099 / tcp
-2031469209 | 2025-03-29T08:46:46.795895
16100 / tcp
-2031469209 | 2025-03-28T04:13:04.983665
16101 / tcp
-2031469209 | 2025-03-28T04:01:18.020372
16102 / tcp
-2031469209 | 2025-03-28T09:24:05.840849
16103 / tcp
-98713449 | 2025-03-29T05:15:07.931381
16311 / tcp
-98713449 | 2025-03-29T21:07:45.907944
16316 / tcp
-98713449 | 2025-03-29T08:54:29.763391
16400 / tcp
-2031469209 | 2025-03-29T15:49:59.649289
16401 / tcp
-98713449 | 2025-03-28T04:18:47.846301
16402 / tcp
-2031469209 | 2025-03-29T04:57:03.571125
16403 / tcp
-2031469209 | 2025-03-29T03:15:11.893267
16404 / tcp
-98713449 | 2025-03-29T12:51:22.100577
16443 / tcp
-98713449 | 2025-03-29T11:21:53.740653
16464 / tcp
1094048410 | 2025-03-21T00:41:33.011544
16601 / tcp
-98713449 | 2025-03-29T18:36:55.165491
16666 / tcp
-98713449 | 2025-03-28T20:12:14.750689
16667 / tcp
-2031469209 | 2025-03-29T01:58:39.944174
16800 / tcp
-2031469209 | 2025-03-29T02:53:03.472647
16831 / tcp
-98713449 | 2025-03-29T13:01:46.357537
16888 / tcp
-2031469209 | 2025-03-28T13:41:26.304990
16992 / tcp
998037014 | 2025-03-31T10:12:14.002852
17000 / tcp
-98713449 | 2025-03-27T10:42:43.521166
17001 / tcp
-98713449 | 2025-03-28T22:47:13.531749
17010 / tcp
-98713449 | 2025-03-28T14:49:19.113492
17020 / tcp
-98713449 | 2025-03-28T09:39:23.078213
17070 / tcp
-2031469209 | 2025-03-28T09:06:08.026229
17082 / tcp
-2031469209 | 2025-03-28T22:52:26.553551
17084 / tcp
-98713449 | 2025-03-28T19:13:34.949852
17100 / tcp
-98713449 | 2025-03-29T20:08:03.977858
17102 / tcp
-98713449 | 2025-03-29T16:29:35.560743
17182 / tcp
-2031469209 | 2025-03-29T10:56:35.288020
17184 / tcp
-98713449 | 2025-03-29T12:18:52.501876
17443 / tcp
-2031469209 | 2025-03-29T21:15:53.591523
17770 / tcp
-98713449 | 2025-03-29T09:26:59.736392
17771 / tcp
-98713449 | 2025-03-29T17:59:29.526159
17772 / tcp
-98713449 | 2025-03-28T15:29:36.731569
17773 / tcp
-2031469209 | 2025-03-29T04:49:03.829224
17774 / tcp
-2031469209 | 2025-03-29T16:48:04.807824
17775 / tcp
-2031469209 | 2025-03-29T15:44:41.477280
17776 / tcp
-2031469209 | 2025-03-29T11:25:14.132876
17777 / tcp
-2031469209 | 2025-03-29T08:07:03.431627
17778 / tcp
-2031469209 | 2025-03-29T12:30:48.243192
17779 / tcp
-2031469209 | 2025-03-29T09:23:12.739501
17780 / tcp
-98713449 | 2025-03-28T16:33:14.483088
18000 / tcp
-2031469209 | 2025-03-28T23:43:45.098348
18001 / tcp
-98713449 | 2025-03-29T02:22:23.478476
18002 / tcp
-2031469209 | 2025-03-29T18:40:04.429804
18004 / tcp
-98713449 | 2025-03-29T08:00:06.093373
18005 / tcp
-98713449 | 2025-03-29T16:21:35.663360
18006 / tcp
-98713449 | 2025-03-29T13:04:02.103414
18007 / tcp
-2031469209 | 2025-03-28T17:54:52.835189
18008 / tcp
-98713449 | 2025-03-29T09:25:59.525871
18009 / tcp
-2031469209 | 2025-03-28T05:08:35.519821
18010 / tcp
-98713449 | 2025-03-29T19:07:41.231180
18011 / tcp
-98713449 | 2025-03-29T04:12:28.190142
18012 / tcp
-98713449 | 2025-03-29T02:32:07.931506
18013 / tcp
-2031469209 | 2025-03-29T05:09:31.440488
18014 / tcp
-2031469209 | 2025-03-29T11:20:21.895641
18015 / tcp
-2031469209 | 2025-03-29T13:31:44.505062
18016 / tcp
-2031469209 | 2025-03-29T03:10:31.330090
18017 / tcp
-2031469209 | 2025-03-29T09:27:27.120575
18018 / tcp
-2031469209 | 2025-03-28T19:01:53.888238
18019 / tcp
-98713449 | 2025-03-29T03:55:27.478019
18020 / tcp
-2031469209 | 2025-03-28T10:11:25.739140
18021 / tcp
-98713449 | 2025-03-29T16:18:36.086093
18022 / tcp
-2031469209 | 2025-03-29T08:19:20.654532
18023 / tcp
-98713449 | 2025-03-29T01:57:33.062802
18024 / tcp
-2031469209 | 2025-03-29T03:03:04.452750
18025 / tcp
-98713449 | 2025-03-29T02:24:49.646931
18026 / tcp
-2031469209 | 2025-03-29T14:14:32.759442
18027 / tcp
-2031469209 | 2025-03-28T03:14:25.575501
18028 / tcp
-98713449 | 2025-03-29T08:58:59.720484
18029 / tcp
-2031469209 | 2025-03-24T03:19:45.313335
18030 / tcp
-2031469209 | 2025-03-29T18:23:16.185116
18031 / tcp
-2031469209 | 2025-03-23T02:32:56.238485
18032 / tcp
-98713449 | 2025-03-29T09:08:42.794306
18033 / tcp
-98713449 | 2025-03-29T16:20:20.245991
18034 / tcp
-2031469209 | 2025-03-28T03:47:45.644884
18035 / tcp
-2031469209 | 2025-03-29T03:30:03.433440
18036 / tcp
-2031469209 | 2025-03-29T13:58:50.811190
18037 / tcp
-98713449 | 2025-03-29T02:38:52.435348
18038 / tcp
-98713449 | 2025-03-29T15:57:21.714167
18039 / tcp
-98713449 | 2025-03-29T15:11:34.085966
18040 / tcp
-2031469209 | 2025-03-29T02:49:14.199483
18041 / tcp
-98713449 | 2025-03-29T17:50:11.332872
18042 / tcp
-2031469209 | 2025-03-29T09:14:02.997775
18043 / tcp
-2031469209 | 2025-03-29T02:21:38.063480
18044 / tcp
-98713449 | 2025-03-29T04:50:48.266865
18045 / tcp
-2031469209 | 2025-03-29T08:39:38.389248
18046 / tcp
-98713449 | 2025-03-29T18:29:44.853314
18047 / tcp
-2031469209 | 2025-03-29T08:12:31.781581
18048 / tcp
-2031469209 | 2025-03-28T03:40:05.278266
18049 / tcp
-98713449 | 2025-03-29T19:51:09.910780
18050 / tcp
-2031469209 | 2025-03-28T13:59:02.826881
18051 / tcp
-2031469209 | 2025-03-29T14:15:21.300233
18052 / tcp
-98713449 | 2025-03-29T13:15:40.613505
18053 / tcp
-98713449 | 2025-03-29T03:25:57.810010
18054 / tcp
-2031469209 | 2025-03-28T04:01:59.577734
18055 / tcp
-2031469209 | 2025-03-29T09:31:14.986800
18056 / tcp
-98713449 | 2025-03-29T22:22:33.711956
18057 / tcp
-98713449 | 2025-03-28T09:36:40.573387
18058 / tcp
-2031469209 | 2025-03-31T12:53:02.264939
18059 / tcp
-98713449 | 2025-03-29T04:08:42.059670
18060 / tcp
-2031469209 | 2025-03-29T17:27:03.058122
18061 / tcp
-98713449 | 2025-03-29T01:50:00.025577
18062 / tcp
-2031469209 | 2025-03-29T11:44:59.579560
18063 / tcp
-98713449 | 2025-03-29T05:17:11.314172
18064 / tcp
-98713449 | 2025-03-29T05:22:05.540534
18065 / tcp
-98713449 | 2025-03-29T08:12:15.497043
18066 / tcp
-2031469209 | 2025-03-29T16:20:01.552587
18067 / tcp
-98713449 | 2025-03-28T23:00:46.685062
18068 / tcp
-2031469209 | 2025-03-29T17:26:13.213724
18069 / tcp
-98713449 | 2025-03-29T18:17:06.882891
18070 / tcp
-98713449 | 2025-03-29T21:58:21.227642
18071 / tcp
-98713449 | 2025-03-28T18:32:02.855373
18072 / tcp
-2031469209 | 2025-03-29T09:11:13.694973
18073 / tcp
-98713449 | 2025-03-28T11:31:31.169515
18074 / tcp
-98713449 | 2025-03-29T10:17:59.471807
18075 / tcp
-98713449 | 2025-03-29T15:57:53.702223
18076 / tcp
-98713449 | 2025-03-29T20:58:40.048310
18077 / tcp
-98713449 | 2025-03-28T05:14:34.178023
18078 / tcp
-2031469209 | 2025-03-28T04:02:20.335507
18079 / tcp
-2031469209 | 2025-03-29T10:27:27.825538
18080 / tcp
-333141579 | 2025-03-28T17:46:28.839072
18081 / tcp
1859111832 | 2025-03-31T17:41:13.852870
18082 / tcp
-98713449 | 2025-03-28T16:24:31.006684
18083 / tcp
-2031469209 | 2025-03-29T19:58:40.486109
18084 / tcp
-2031469209 | 2025-03-28T11:48:26.797536
18085 / tcp
-2031469209 | 2025-03-29T21:27:17.106530
18086 / tcp
-98713449 | 2025-03-29T15:16:51.484668
18087 / tcp
-98713449 | 2025-03-29T10:22:53.452545
18088 / tcp
-98713449 | 2025-03-29T11:03:18.227250
18089 / tcp
-98713449 | 2025-03-29T14:48:20.763596
18090 / tcp
-2031469209 | 2025-03-29T09:57:03.686755
18091 / tcp
-98713449 | 2025-03-29T11:03:31.079067
18092 / tcp
-98713449 | 2025-03-29T15:41:34.674525
18093 / tcp
-98713449 | 2025-03-29T13:49:41.781595
18094 / tcp
-98713449 | 2025-03-29T11:37:30.633900
18095 / tcp
-98713449 | 2025-03-28T19:15:48.799519
18096 / tcp
-2031469209 | 2025-03-29T16:28:19.537683
18097 / tcp
-2031469209 | 2025-03-29T18:28:15.718589
18098 / tcp
-98713449 | 2025-03-28T19:46:18.854383
18099 / tcp
-2031469209 | 2025-03-29T01:31:02.647970
18100 / tcp
-2031469209 | 2025-03-28T22:18:42.773522
18101 / tcp
-2031469209 | 2025-03-29T10:33:20.032392
18102 / tcp
-2031469209 | 2025-03-29T10:28:21.721016
18103 / tcp
-98713449 | 2025-03-29T18:51:52.020311
18104 / tcp
-2031469209 | 2025-03-29T02:16:51.658146
18105 / tcp
-2031469209 | 2025-03-29T19:04:44.755844
18106 / tcp
-98713449 | 2025-03-29T08:17:18.799670
18107 / tcp
-98713449 | 2025-03-29T02:06:59.313474
18108 / tcp
-2031469209 | 2025-03-28T07:11:08.925854
18109 / tcp
-98713449 | 2025-03-29T08:48:18.577708
18110 / tcp
-2031469209 | 2025-03-29T02:47:14.157944
18111 / tcp
-2031469209 | 2025-03-28T21:52:27.733936
18112 / tcp
-98713449 | 2025-03-28T01:57:22.236671
18113 / tcp
-98713449 | 2025-03-29T21:24:18.907240
18182 / tcp
-98713449 | 2025-03-28T10:25:41.558011
18200 / tcp
-98713449 | 2025-03-29T21:09:59.968339
18225 / tcp
-98713449 | 2025-03-29T14:06:37.120446
18239 / tcp
-98713449 | 2025-03-29T17:02:33.918898
18245 / tcp
-2031469209 | 2025-03-31T18:26:30.148501
18264 / tcp
-98713449 | 2025-03-29T03:40:39.622122
18368 / tcp
-2031469209 | 2025-03-29T04:54:25.651875
18443 / tcp
159303791 | 2025-03-28T20:54:20.643726
18553 / tcp
1094048410 | 2025-03-26T21:55:48.510516
18556 / tcp
-98713449 | 2025-03-28T09:32:20.136171
18765 / tcp
-2031469209 | 2025-03-29T03:31:34.458713
18802 / tcp
-2031469209 | 2025-03-28T16:36:59.789489
18888 / tcp
-2031469209 | 2025-03-29T01:24:16.508218
19000 / tcp
-98713449 | 2025-03-31T19:21:58.158414
19013 / tcp
-98713449 | 2025-03-28T05:34:50.521754
19014 / tcp
-2031469209 | 2025-03-29T03:32:48.988940
19015 / tcp
-2031469209 | 2025-03-29T09:58:43.339243
19016 / tcp
-98713449 | 2025-03-29T04:24:38.112348
19017 / tcp
-2031469209 | 2025-03-29T11:25:53.857318
19022 / tcp
-2031469209 | 2025-03-28T07:19:51.936783
19071 / tcp
-2031469209 | 2025-03-29T11:15:05.588496
19080 / tcp
-98713449 | 2025-03-29T11:27:29.803639
19082 / tcp
-98713449 | 2025-03-29T21:13:46.565789
19084 / tcp
-98713449 | 2025-03-29T08:35:48.102191
19090 / tcp
-98713449 | 2025-03-29T02:14:23.597996
19091 / tcp
-98713449 | 2025-03-29T13:37:17.100144
19100 / tcp
-98713449 | 2025-03-29T03:45:23.609490
19200 / tcp
411540654 | 2025-03-27T20:15:47.101524
19222 / tcp
-98713449 | 2025-03-28T09:00:44.740030
19233 / tcp
-2031469209 | 2025-03-29T00:15:54.590519
19443 / tcp
-2031469209 | 2025-03-28T13:45:17.459561
19776 / tcp
-2031469209 | 2025-03-29T21:31:26.823326
19902 / tcp
-98713449 | 2025-03-28T17:33:36.866340
19930 / tcp
411540654 | 2025-03-26T18:35:19.492724
19998 / tcp
-2031469209 | 2025-03-28T11:05:02.857261
19999 / tcp
1440224878 | 2025-03-28T07:51:15.709944
20000 / tcp
-2031469209 | 2025-03-31T13:55:23.144446
20001 / tcp
-2031469209 | 2025-03-29T10:46:41.026543
20010 / tcp
-2031469209 | 2025-03-28T17:07:06.802625
20018 / tcp
-2031469209 | 2025-03-29T12:05:12.963079
20020 / tcp
-98713449 | 2025-03-29T15:32:20.392953
20030 / tcp
-98713449 | 2025-03-29T11:26:27.799391
20040 / tcp
-98713449 | 2025-03-29T17:47:03.369873
20050 / tcp
-98713449 | 2025-03-29T18:47:01.865002
20053 / tcp
-98713449 | 2025-03-29T20:13:30.326912
20060 / tcp
-2031469209 | 2025-03-29T13:48:37.337931
20070 / tcp
-2031469209 | 2025-03-29T14:07:40.784762
20080 / tcp
-2031469209 | 2025-03-29T13:46:21.139568
20082 / tcp
-2031469209 | 2025-03-28T23:51:13.686788
20084 / tcp
-98713449 | 2025-03-29T13:28:31.663557
20087 / tcp
1094048410 | 2025-03-26T11:57:53.254469
20090 / tcp
-98713449 | 2025-03-28T02:00:03.514226
20100 / tcp
-98713449 | 2025-03-29T07:55:40.422947
20106 / tcp
-98713449 | 2025-03-29T16:01:39.910077
20107 / tcp
-2031469209 | 2025-03-29T11:49:02.527145
20110 / tcp
-98713449 | 2025-03-29T10:46:10.193471
20121 / tcp
-2031469209 | 2025-03-29T11:00:27.590263
20150 / tcp
-98713449 | 2025-03-29T21:11:19.278742
20151 / tcp
-2031469209 | 2025-03-28T06:18:32.912265
20182 / tcp
-2031469209 | 2025-03-29T10:32:06.527445
20184 / tcp
-2031469209 | 2025-03-29T19:45:03.531920
20185 / tcp
-2031469209 | 2025-03-29T04:31:27.358156
20200 / tcp
-98713449 | 2025-03-29T03:39:06.710205
20201 / tcp
-2031469209 | 2025-03-29T02:15:01.708711
20202 / tcp
-98713449 | 2025-03-29T11:25:45.642308
20208 / tcp
-2031469209 | 2025-03-29T05:02:47.874946
20256 / tcp
-2031469209 | 2025-03-29T11:40:32.450533
20325 / tcp
-98713449 | 2025-03-29T10:26:41.087571
20440 / tcp
-98713449 | 2025-03-28T04:24:48.855666
20443 / tcp
-2031469209 | 2025-03-29T16:16:06.702740
20500 / tcp
-2031469209 | 2025-03-28T01:37:00.221357
20512 / tcp
-98713449 | 2025-03-28T06:14:09.648324
20547 / tcp
-2031469209 | 2025-03-29T11:39:31.225420
20600 / tcp
-98713449 | 2025-03-31T09:42:43.477546
20800 / tcp
-2031469209 | 2025-03-29T11:22:29.368083
20892 / tcp
-2031469209 | 2025-03-29T08:55:36.063925
20894 / tcp
-2031469209 | 2025-03-29T15:12:17.191260
20900 / tcp
-98713449 | 2025-03-29T15:13:31.593448
21002 / tcp
-98713449 | 2025-03-29T02:43:33.353516
21025 / tcp
-2031469209 | 2025-03-31T21:20:44.697555
21027 / tcp
411540654 | 2025-03-26T23:38:35.113057
21081 / tcp
-2031469209 | 2025-03-29T18:51:20.420893
21082 / tcp
-98713449 | 2025-03-28T06:51:35.506013
21083 / tcp
-98713449 | 2025-03-29T03:30:27.093938
21084 / tcp
-98713449 | 2025-03-29T15:29:06.091768
21100 / tcp
-98713449 | 2025-03-29T21:15:41.375253
21200 / tcp
-98713449 | 2025-03-29T13:27:33.496747
21230 / tcp
-98713449 | 2025-03-29T05:10:35.192903
21231 / tcp
-98713449 | 2025-03-29T14:36:29.393707
21232 / tcp
-98713449 | 2025-03-29T19:46:51.496233
21233 / tcp
-98713449 | 2025-03-29T09:56:14.574902
21234 / tcp
-2031469209 | 2025-03-29T21:10:18.683455
21235 / tcp
-98713449 | 2025-03-29T11:48:47.519015
21236 / tcp
-98713449 | 2025-03-29T22:02:31.632211
21237 / tcp
-98713449 | 2025-03-29T10:32:13.152703
21238 / tcp
-2031469209 | 2025-03-28T11:07:20.984308
21239 / tcp
-98713449 | 2025-03-29T15:06:36.919037
21240 / tcp
-98713449 | 2025-03-29T15:50:21.287930
21241 / tcp
-2031469209 | 2025-03-28T06:12:56.668102
21242 / tcp
-98713449 | 2025-03-29T18:26:18.205808
21243 / tcp
-2031469209 | 2025-03-29T14:44:41.167404
21244 / tcp
-98713449 | 2025-03-29T11:39:11.057806
21245 / tcp
-98713449 | 2025-03-29T20:02:57.455749
21246 / tcp
-98713449 | 2025-03-28T09:53:51.230296
21247 / tcp
-98713449 | 2025-03-28T17:29:56.735790
21248 / tcp
-2031469209 | 2025-03-29T09:17:05.943495
21249 / tcp
-98713449 | 2025-03-29T14:38:33.367350
21250 / tcp
-98713449 | 2025-03-28T07:57:36.631542
21251 / tcp
-98713449 | 2025-03-28T19:51:59.873183
21252 / tcp
-98713449 | 2025-03-29T17:43:48.872514
21253 / tcp
-98713449 | 2025-03-29T11:18:47.618671
21254 / tcp
-2031469209 | 2025-03-29T13:27:21.730253
21255 / tcp
-98713449 | 2025-03-29T17:52:24.876718
21256 / tcp
-98713449 | 2025-03-29T15:22:21.796589
21257 / tcp
-2031469209 | 2025-03-29T16:52:11.071607
21258 / tcp
-98713449 | 2025-03-31T20:32:37.425295
21259 / tcp
-98713449 | 2025-03-29T05:12:59.804466
21260 / tcp
-2031469209 | 2025-03-29T05:08:08.806691
21261 / tcp
-2031469209 | 2025-03-29T10:43:16.331069
21262 / tcp
-2031469209 | 2025-03-29T02:54:10.894567
21263 / tcp
-2031469209 | 2025-03-29T15:29:11.508831
21264 / tcp
-2031469209 | 2025-03-29T20:49:01.242699
21265 / tcp
-98713449 | 2025-03-29T09:52:21.392139
21266 / tcp
-98713449 | 2025-03-29T18:37:08.911355
21267 / tcp
-98713449 | 2025-03-29T02:34:12.958983
21268 / tcp
-98713449 | 2025-03-29T17:41:05.050065
21269 / tcp
-98713449 | 2025-03-29T00:17:49.051465
21270 / tcp
-2031469209 | 2025-03-29T13:06:10.831579
21271 / tcp
-98713449 | 2025-03-29T20:25:31.528772
21272 / tcp
-98713449 | 2025-03-28T23:40:06.704272
21273 / tcp
-2031469209 | 2025-03-29T01:58:13.173548
21274 / tcp
-98713449 | 2025-03-29T18:01:23.854181
21275 / tcp
-98713449 | 2025-03-29T04:15:23.696572
21276 / tcp
-2031469209 | 2025-03-28T09:01:23.631544
21277 / tcp
-98713449 | 2025-03-29T04:07:19.801665
21278 / tcp
-2031469209 | 2025-03-29T09:00:21.036966
21279 / tcp
-98713449 | 2025-03-29T14:24:07.405821
21280 / tcp
-98713449 | 2025-03-29T18:32:51.408015
21281 / tcp
-98713449 | 2025-03-29T05:00:54.988592
21282 / tcp
-98713449 | 2025-03-29T08:37:40.860470
21283 / tcp
-2031469209 | 2025-03-28T11:14:01.660960
21284 / tcp
-2031469209 | 2025-03-28T02:51:23.045448
21285 / tcp
-98713449 | 2025-03-29T16:23:11.261750
21286 / tcp
-98713449 | 2025-03-29T17:51:25.792452
21287 / tcp
-2031469209 | 2025-03-29T16:10:09.449197
21288 / tcp
-2031469209 | 2025-03-29T20:33:44.665584
21289 / tcp
-98713449 | 2025-03-29T15:18:21.802146
21290 / tcp
-98713449 | 2025-03-29T01:48:08.719280
21291 / tcp
-98713449 | 2025-03-28T19:47:56.733489
21292 / tcp
-2031469209 | 2025-03-29T11:13:09.901300
21293 / tcp
-2031469209 | 2025-03-29T15:58:27.548275
21294 / tcp
-2031469209 | 2025-03-29T14:24:42.308012
21295 / tcp
-98713449 | 2025-03-29T15:35:36.290547
21296 / tcp
-2031469209 | 2025-03-29T16:54:22.112120
21297 / tcp
-2031469209 | 2025-03-28T03:26:07.226787
21298 / tcp
-98713449 | 2025-03-29T09:29:02.462740
21299 / tcp
-2031469209 | 2025-03-29T14:56:31.133782
21300 / tcp
-98713449 | 2025-03-29T16:35:25.867607
21301 / tcp
-98713449 | 2025-03-29T12:08:01.159331
21302 / tcp
-98713449 | 2025-03-29T18:31:05.003330
21303 / tcp
-2031469209 | 2025-03-29T08:00:35.170616
21304 / tcp
-98713449 | 2025-03-29T21:11:35.679613
21305 / tcp
-98713449 | 2025-03-29T01:07:15.103489
21306 / tcp
-98713449 | 2025-03-29T08:50:38.409039
21307 / tcp
-2031469209 | 2025-03-29T14:59:34.271913
21308 / tcp
-98713449 | 2025-03-29T16:39:24.799739
21309 / tcp
-98713449 | 2025-03-29T04:49:50.811198
21310 / tcp
-2031469209 | 2025-03-29T09:14:29.402076
21311 / tcp
-98713449 | 2025-03-29T13:03:11.280849
21312 / tcp
-2031469209 | 2025-03-29T08:14:29.509612
21313 / tcp
-98713449 | 2025-03-29T13:29:20.739020
21314 / tcp
-98713449 | 2025-03-29T15:04:06.735886
21315 / tcp
-98713449 | 2025-03-28T16:48:08.523943
21316 / tcp
-2031469209 | 2025-03-29T21:53:05.875949
21317 / tcp
-2031469209 | 2025-03-29T02:50:13.829262
21318 / tcp
-98713449 | 2025-03-29T12:59:03.801134
21319 / tcp
-98713449 | 2025-03-28T04:38:38.213122
21320 / tcp
-2031469209 | 2025-03-28T08:21:02.180900
21321 / tcp
-2031469209 | 2025-03-28T04:21:39.581616
21322 / tcp
-98713449 | 2025-03-29T18:44:13.412899
21323 / tcp
-2031469209 | 2025-03-28T12:14:57.113872
21324 / tcp
-98713449 | 2025-03-28T10:04:17.509211
21325 / tcp
-2031469209 | 2025-03-28T04:23:48.496309
21326 / tcp
-98713449 | 2025-03-28T13:15:35.719450
21327 / tcp
-98713449 | 2025-03-29T19:29:20.027301
21328 / tcp
-98713449 | 2025-03-29T10:08:02.563347
21329 / tcp
-2031469209 | 2025-03-29T01:11:54.367611
21330 / tcp
-98713449 | 2025-03-29T14:23:06.269700
21357 / tcp
-2031469209 | 2025-03-29T13:46:36.030838
21379 / tcp
-2031469209 | 2025-04-01T00:28:29.522527
21381 / tcp
-98713449 | 2025-03-28T05:25:07.712400
21400 / tcp
-98713449 | 2025-03-29T02:09:08.273010
21443 / tcp
-98713449 | 2025-03-28T12:20:04.531739
21500 / tcp
-2031469209 | 2025-03-29T17:45:32.686824
21515 / tcp
-2031469209 | 2025-03-28T07:38:49.248940
21935 / tcp
-98713449 | 2025-03-29T08:28:45.197922
22000 / tcp
-98713449 | 2025-03-29T11:18:19.956831
22001 / tcp
411540654 | 2025-03-27T21:37:49.947331
22022 / tcp
1301968029 | 2025-03-28T04:19:04.636744
22067 / tcp
1094048410 | 2025-03-27T18:01:05.344134
22069 / tcp
411540654 | 2025-03-25T02:14:34.250211
22070 / tcp
1094048410 | 2025-03-27T16:13:53.838150
22082 / tcp
-98713449 | 2025-03-29T15:56:57.807666
22084 / tcp
-98713449 | 2025-03-29T22:10:05.610577
22103 / tcp
-2031469209 | 2025-03-29T00:40:18.801629
22107 / tcp
-98713449 | 2025-03-29T13:39:28.724768
22206 / tcp
-98713449 | 2025-03-29T15:48:52.744080
22222 / tcp
-98713449 | 2025-03-29T13:07:07.443411
22345 / tcp
-98713449 | 2025-03-29T04:02:02.052925
22380 / tcp
-2031469209 | 2025-03-29T18:27:49.546768
22403 / tcp
-98713449 | 2025-03-29T13:57:59.799954
22556 / tcp
-2031469209 | 2025-03-31T21:31:30.826689
22703 / tcp
-2031469209 | 2025-03-29T03:11:39.590798
22705 / tcp
-2031469209 | 2025-03-29T17:30:41.911125
23023 / tcp
-98713449 | 2025-03-31T13:29:36.148851
23082 / tcp
-2031469209 | 2025-03-29T16:19:02.076353
23084 / tcp
-98713449 | 2025-03-29T19:57:59.877619
23128 / tcp
-98713449 | 2025-03-08T21:21:05.271800
23182 / tcp
-98713449 | 2025-03-29T08:54:11.353166
23184 / tcp
-98713449 | 2025-03-29T13:04:52.578224
23424 / tcp
-2031469209 | 2025-03-31T22:37:49.532553
24082 / tcp
-98713449 | 2025-03-29T11:36:29.343312
24084 / tcp
-2031469209 | 2025-03-28T17:06:19.531532
24181 / tcp
-2031469209 | 2025-03-22T18:57:34.351715
24245 / tcp
411540654 | 2025-03-26T05:01:46.671269
24442 / tcp
-98713449 | 2025-03-29T14:20:22.460738
24472 / tcp
-2031469209 | 2025-03-28T15:18:53.405946
24510 / tcp
-98713449 | 2025-03-29T11:53:08.111962
24808 / tcp
-2031469209 | 2025-03-28T18:22:03.542469
25000 / tcp
-2031469209 | 2025-03-29T09:03:22.139152
25001 / tcp
-2031469209 | 2025-03-29T15:34:51.370362
25002 / tcp
-2031469209 | 2025-03-29T10:57:14.532375
25003 / tcp
-2031469209 | 2025-03-29T12:46:58.183162
25004 / tcp
-2031469209 | 2025-03-29T12:29:42.564127
25005 / tcp
-98713449 | 2025-03-29T18:42:30.989678
25006 / tcp
-98713449 | 2025-03-28T18:25:50.199709
25007 / tcp
-98713449 | 2025-03-29T11:46:03.829989
25009 / tcp
-2031469209 | 2025-03-29T15:15:03.753021
25010 / tcp
-98713449 | 2025-03-29T04:58:40.873253
25082 / tcp
-98713449 | 2025-03-29T00:19:00.581844
25084 / tcp
-2031469209 | 2025-03-29T22:15:24.601830
25105 / tcp
-98713449 | 2025-03-31T13:12:01.237111
25565 / tcp
-98713449 | 2025-03-31T12:23:18.883977
25782 / tcp
-98713449 | 2025-03-29T19:36:58.575013
25952 / tcp
-2031469209 | 2025-03-29T13:35:54.185151
26656 / tcp
411540654 | 2025-03-29T02:21:54.689507
26657 / tcp
411540654 | 2025-03-28T03:05:27.738181
27015 / tcp
-2031469209 | 2025-03-31T15:28:37.564110
27016 / tcp
411540654 | 2025-03-29T10:15:07.666806
27017 / tcp
448794242 | 2025-03-31T17:11:58.229937
27036 / tcp
411540654 | 2025-03-25T09:12:56.413965
27105 / tcp
-98713449 | 2025-03-29T17:54:47.837496
27571 / tcp
-98713449 | 2025-03-29T12:43:23.605724
28001 / tcp
-2031469209 | 2025-03-29T01:26:33.423747
28015 / tcp
-2031469209 | 2025-03-31T15:17:41.043172
28017 / tcp
-98713449 | 2025-03-31T17:45:16.892684
28080 / tcp
-98713449 | 2025-03-29T11:10:26.014778
28443 / tcp
-98713449 | 2025-03-29T03:21:51.555824
28818 / tcp
-98713449 | 2025-03-29T09:30:13.193964
29798 / tcp
-2031469209 | 2025-03-29T03:58:57.857186
29799 / tcp
-98713449 | 2025-03-28T17:28:09.642610
29840 / tcp
-2031469209 | 2025-03-29T05:17:00.293643
29842 / tcp
-98713449 | 2025-03-29T20:55:54.750932
30000 / tcp
-98713449 | 2025-03-29T14:57:51.848754
30001 / tcp
-2031469209 | 2025-03-29T02:35:58.607522
30002 / tcp
-2031469209 | 2025-03-31T14:51:32.561119
30003 / tcp
-98713449 | 2025-03-31T15:34:28.569551
30004 / tcp
-98713449 | 2025-03-29T12:08:58.747013
30005 / tcp
-2031469209 | 2025-03-29T14:53:21.920290
30006 / tcp
-2031469209 | 2025-03-29T04:37:48.492356
30007 / tcp
-98713449 | 2025-03-28T21:00:38.429985
30008 / tcp
-98713449 | 2025-03-28T23:20:34.384749
30009 / tcp
-2031469209 | 2025-03-29T22:04:50.004298
30010 / tcp
-98713449 | 2025-03-29T19:06:10.604369
30011 / tcp
-2031469209 | 2025-03-29T03:17:03.839451
30013 / tcp
-98713449 | 2025-03-28T03:26:26.413329
30015 / tcp
-98713449 | 2025-03-29T19:33:00.913782
30017 / tcp
-98713449 | 2025-03-29T05:11:14.520271
30019 / tcp
-98713449 | 2025-03-29T18:39:13.292920
30021 / tcp
-98713449 | 2025-03-28T23:22:36.456768
30022 / tcp
1094048410 | 2025-03-18T21:58:57.605148
30023 / tcp
-2031469209 | 2025-03-28T05:02:25.326556
30025 / tcp
-98713449 | 2025-03-29T03:52:44.640973
30027 / tcp
-2031469209 | 2025-03-29T17:00:21.325406
30029 / tcp
-98713449 | 2025-03-29T08:08:08.238034
30050 / tcp
-98713449 | 2025-03-29T02:51:23.423959
30083 / tcp
-2031469209 | 2025-03-29T05:16:15.103695
30101 / tcp
-2031469209 | 2025-03-28T18:48:47.086434
30104 / tcp
-98713449 | 2025-03-29T13:17:54.766420
30106 / tcp
-2031469209 | 2025-03-29T08:47:44.265284
30110 / tcp
-98713449 | 2025-03-29T09:42:27.716431
30111 / tcp
-98713449 | 2025-03-29T16:03:35.306748
30112 / tcp
-2031469209 | 2025-03-28T16:31:19.571793
30113 / tcp
-2031469209 | 2025-03-29T17:57:22.473205
30120 / tcp
-98713449 | 2025-03-28T17:38:39.543835
30121 / tcp
-98713449 | 2025-03-29T11:09:28.736612
30122 / tcp
-98713449 | 2025-03-29T19:06:26.470438
30123 / tcp
-98713449 | 2025-03-29T08:31:10.851121
30222 / tcp
411540654 | 2025-03-25T17:16:12.651636
30301 / tcp
411540654 | 2025-03-31T20:24:01.968827
30303 / tcp
411540654 | 2025-03-31T22:46:45.169150
30322 / tcp
1094048410 | 2025-03-24T14:07:05.851408
30422 / tcp
411540654 | 2025-03-26T08:08:12.793502
30444 / tcp
-98713449 | 2025-03-29T16:09:41.475830
30452 / tcp
-2031469209 | 2025-03-29T08:36:29.292244
30468 / tcp
-98713449 | 2025-03-29T20:44:39.633599
30473 / tcp
-98713449 | 2025-03-29T16:04:30.074671
30479 / tcp
-98713449 | 2025-03-29T20:17:05.994267
30501 / tcp
-2031469209 | 2025-03-29T15:53:50.149836
30522 / tcp
411540654 | 2025-03-26T06:26:58.886374
30622 / tcp
1094048410 | 2025-03-26T02:56:00.685744
30700 / tcp
-2031469209 | 2025-03-29T14:10:39.809174
30701 / tcp
-98713449 | 2025-03-29T04:15:48.139854
30722 / tcp
411540654 | 2025-03-25T00:26:33.409639
30822 / tcp
411540654 | 2025-03-25T21:34:35.682629
30892 / tcp
-98713449 | 2025-03-28T18:23:41.026654
30894 / tcp
-2031469209 | 2025-03-29T19:19:11.482899
30922 / tcp
1094048410 | 2025-03-20T22:46:06.516844
31001 / tcp
-98713449 | 2025-03-29T03:03:48.773390
31017 / tcp
-98713449 | 2025-03-29T11:21:05.854009
31022 / tcp
411540654 | 2025-03-24T12:25:04.864310
31122 / tcp
1094048410 | 2025-03-25T17:58:47.612427
31210 / tcp
-2031469209 | 2025-03-29T07:54:13.469988
31222 / tcp
1094048410 | 2025-03-13T05:05:34.185380
31322 / tcp
411540654 | 2025-03-25T05:52:14.969206
31337 / tcp
411540654 | 2025-03-31T10:22:47.249317
31380 / tcp
-2031469209 | 2025-03-28T22:08:32.395194
31422 / tcp
411540654 | 2025-03-25T03:59:09.802287
31443 / tcp
-2031469209 | 2025-03-29T18:38:37.842805
31444 / tcp
-98713449 | 2025-03-29T16:40:18.020294
31522 / tcp
411540654 | 2025-03-23T12:06:00.820506
31622 / tcp
1094048410 | 2025-03-23T10:20:43.193455
31722 / tcp
1094048410 | 2025-03-21T16:05:59.589292
31822 / tcp
1094048410 | 2025-03-20T19:21:00.497477
31922 / tcp
1094048410 | 2025-03-24T07:21:21.813998
32001 / tcp
-98713449 | 2025-03-29T15:44:28.727511
32022 / tcp
411540654 | 2025-03-23T19:33:49.497549
32080 / tcp
-98713449 | 2025-03-28T01:55:14.156069
32101 / tcp
-2031469209 | 2025-03-29T18:12:58.492775
32102 / tcp
-98713449 | 2025-03-29T17:22:32.229172
32122 / tcp
1094048410 | 2025-03-20T03:40:19.928408
32202 / tcp
-2031469209 | 2025-03-28T17:19:35.644128
32222 / tcp
411540654 | 2025-03-23T18:01:52.472589
32303 / tcp
-98713449 | 2025-03-29T18:12:51.665595
32322 / tcp
411540654 | 2025-03-16T15:15:45.133156
32400 / tcp
1094048410 | 2025-03-31T13:26:52.122709
32422 / tcp
411540654 | 2025-03-09T14:39:14.991230
32443 / tcp
-2031469209 | 2025-03-28T07:36:11.239174
32444 / tcp
-98713449 | 2025-03-29T09:10:38.080758
32522 / tcp
411540654 | 2025-03-22T04:18:11.521792
32622 / tcp
1094048410 | 2025-03-21T06:26:37.424448
32722 / tcp
1094048410 | 2025-03-23T05:49:14.648713
32746 / tcp
-2031469209 | 2025-03-29T03:50:43.908652
32764 / tcp
-98713449 | 2025-03-28T20:36:58.504622
32800 / tcp
-2031469209 | 2025-03-28T15:38:23.576379
32822 / tcp
411540654 | 2025-03-23T04:17:02.275139
32922 / tcp
411540654 | 2025-03-23T03:14:42.350001
33022 / tcp
1094048410 | 2025-03-23T00:31:42.353953
33060 / tcp
-2031469209 | 2025-04-01T00:54:27.673268
33122 / tcp
411540654 | 2025-03-22T22:46:32.930727
33222 / tcp
1094048410 | 2025-03-20T00:10:03.128521
33322 / tcp
411540654 | 2025-03-22T07:52:33.200705
33338 / tcp
1094048410 | 2025-03-24T08:31:15.117511
33389 / tcp
-2031469209 | 2025-03-29T02:20:23.859188
33422 / tcp
1094048410 | 2025-03-19T18:12:05.412003
33622 / tcp
1094048410 | 2025-03-21T05:43:27.982820
33722 / tcp
1094048410 | 2025-03-18T04:42:01.117339
33822 / tcp
411540654 | 2025-03-08T13:08:55.615988
33922 / tcp
411540654 | 2025-03-18T02:58:35.234447
34022 / tcp
1094048410 | 2025-03-20T17:39:56.881628
34122 / tcp
411540654 | 2025-03-20T16:32:50.281898
34222 / tcp
411540654 | 2025-03-20T01:54:16.561934
34225 / tcp
-2031469209 | 2025-03-29T20:36:49.861500
34322 / tcp
411540654 | 2025-03-19T18:55:23.388386
34422 / tcp
411540654 | 2025-03-15T01:15:16.763794
34500 / tcp
-2031469209 | 2025-03-29T19:58:18.727501
34522 / tcp
411540654 | 2025-03-19T11:50:49.956453
34622 / tcp
1094048410 | 2025-03-19T10:11:10.117069
34722 / tcp
1094048410 | 2025-03-19T09:05:02.544685
34822 / tcp
411540654 | 2025-03-19T06:43:00.632185
34922 / tcp
411540654 | 2025-03-18T21:05:19.927772
35000 / tcp
-98713449 | 2025-03-31T22:57:00.715000
35002 / tcp
-2031469209 | 2025-03-28T16:00:48.310210
35004 / tcp
-2031469209 | 2025-03-29T13:06:32.967292
35022 / tcp
1094048410 | 2025-03-19T03:14:29.696986
35100 / tcp
-2031469209 | 2025-03-29T12:15:39.689120
35101 / tcp
-2031469209 | 2025-03-29T02:13:56.431486
35122 / tcp
411540654 | 2025-03-19T01:43:14.834883
35153 / tcp
-98713449 | 2025-03-29T16:48:24.641545
35222 / tcp
1094048410 | 2025-03-18T09:54:02.294986
35240 / tcp
-2031469209 | 2025-03-29T16:50:57.321859
35241 / tcp
-98713449 | 2025-03-28T03:47:54.340017
35250 / tcp
-98713449 | 2025-03-29T08:07:48.976984
35251 / tcp
-2031469209 | 2025-03-29T21:00:22.498845
35322 / tcp
1094048410 | 2025-03-17T09:03:02.612102
35522 / tcp
-98713449 | 2025-03-29T13:37:37.345523
35524 / tcp
-2031469209 | 2025-03-29T04:17:35.872675
35531 / tcp
-98713449 | 2025-03-28T08:59:24.124097
35559 / tcp
-2031469209 | 2025-03-29T04:51:28.244684
35560 / tcp
-2031469209 | 2025-03-28T08:06:42.565515
35622 / tcp
411540654 | 2025-03-18T08:10:29.473189
35722 / tcp
1094048410 | 2025-03-17T10:47:49.454790
35822 / tcp
1094048410 | 2025-03-17T18:11:00.512724
35922 / tcp
1094048410 | 2025-03-16T23:25:26.814799
36022 / tcp
411540654 | 2025-03-17T21:36:32.347404
36122 / tcp
411540654 | 2025-03-13T10:23:40.291765
36222 / tcp
411540654 | 2025-03-17T19:54:37.920077
36322 / tcp
1094048410 | 2025-03-17T12:30:28.086839
36422 / tcp
411540654 | 2025-03-15T08:53:58.564664
36501 / tcp
-98713449 | 2025-03-29T09:14:52.549846
36505 / tcp
-98713449 | 2025-03-29T19:39:08.183879
36722 / tcp
1094048410 | 2025-03-17T05:22:47.160087
36822 / tcp
411540654 | 2025-03-18T15:24:46.643507
36922 / tcp
411540654 | 2025-03-18T13:22:53.867503
36982 / tcp
-2031469209 | 2025-03-29T05:00:29.750932
36983 / tcp
-2031469209 | 2025-03-29T04:45:51.166579
36984 / tcp
-2031469209 | 2025-03-29T18:03:52.690421
37022 / tcp
411540654 | 2025-03-16T19:58:50.404596
37080 / tcp
-98713449 | 2025-03-29T18:22:58.329259
37122 / tcp
411540654 | 2025-03-16T23:36:47.094827
37222 / tcp
411540654 | 2025-03-14T21:45:17.791820
37322 / tcp
1094048410 | 2025-03-16T12:10:14.306754
37443 / tcp
-98713449 | 2025-03-29T10:31:15.199763
37522 / tcp
1094048410 | 2025-03-16T09:53:13.961291
37622 / tcp
1094048410 | 2025-03-16T02:28:21.693975
37722 / tcp
1094048410 | 2025-03-16T01:39:02.978603
37777 / tcp
-98713449 | 2025-03-31T13:21:35.472456
37822 / tcp
1094048410 | 2025-03-14T03:14:29.746284
38022 / tcp
411540654 | 2025-03-17T23:18:28.662220
38080 / tcp
-98713449 | 2025-03-29T14:14:23.792224
38122 / tcp
411540654 | 2025-03-15T17:50:26.205983
38222 / tcp
411540654 | 2025-03-11T18:35:37.600221
38322 / tcp
411540654 | 2025-03-15T14:08:13.564093
38333 / tcp
411540654 | 2025-03-28T19:13:21.277484
38520 / tcp
-2031469209 | 2025-03-29T08:17:14.590170
38522 / tcp
411540654 | 2025-03-14T00:30:49.722231
38722 / tcp
1094048410 | 2025-03-13T22:34:06.684684
38822 / tcp
411540654 | 2025-03-12T17:04:39.146964
38880 / tcp
-98713449 | 2025-03-29T12:11:10.732139
38922 / tcp
411540654 | 2025-03-13T15:45:21.633343
39001 / tcp
-98713449 | 2025-03-29T08:52:30.904338
39022 / tcp
411540654 | 2025-03-13T20:49:24.666904
39222 / tcp
1094048410 | 2025-03-13T18:09:45.333048
39322 / tcp
411540654 | 2025-03-11T12:22:30.247619
39422 / tcp
1094048410 | 2025-03-11T13:17:00.529262
39522 / tcp
411540654 | 2025-03-11T10:42:17.159690
39622 / tcp
411540654 | 2025-03-11T08:10:58.794719
39722 / tcp
411540654 | 2025-03-05T07:10:39.081703
40000 / tcp
-98713449 | 2025-03-28T01:04:37.325894
40001 / tcp
-2031469209 | 2025-03-29T04:36:38.711818
40005 / tcp
-98713449 | 2025-03-29T12:08:53.362152
40022 / tcp
411540654 | 2025-03-09T11:34:30.961832
40029 / tcp
-2031469209 | 2025-03-29T14:58:38.608981
40070 / tcp
-2031469209 | 2025-03-29T16:25:27.903950
40099 / tcp
-98713449 | 2025-03-29T14:22:15.148466
40322 / tcp
411540654 | 2025-03-08T21:42:02.442375
40471 / tcp
-98713449 | 2025-03-29T15:31:31.396523
40522 / tcp
411540654 | 2025-03-04T07:36:13.694896
40892 / tcp
-2031469209 | 2025-03-29T14:07:55.043571
40894 / tcp
-98713449 | 2025-03-29T04:12:38.809215
41222 / tcp
411540654 | 2025-03-05T01:17:08.735306
41443 / tcp
1094048410 | 2025-03-14T03:47:34.656217
41522 / tcp
1094048410 | 2025-03-04T21:44:18.153813
41794 / tcp
411540654 | 2025-03-23T21:20:24.913411
41800 / tcp
-2031469209 | 2025-03-29T14:25:58.427442
41822 / tcp
411540654 | 2025-03-07T18:18:08.981531
41922 / tcp
411540654 | 2025-03-07T18:32:53.130848
42122 / tcp
411540654 | 2025-03-05T03:01:35.078862
42208 / tcp
-2031469209 | 2025-03-29T09:45:45.456752
42235 / tcp
-2031469209 | 2025-03-29T01:47:40.122801
42420 / tcp
-2031469209 | 2025-03-28T14:57:34.393436
42422 / tcp
411540654 | 2025-03-04T20:06:05.692908
42424 / tcp
-98713449 | 2025-03-29T03:22:18.804542
42443 / tcp
-98713449 | 2025-03-29T20:07:29.206223
42901 / tcp
-2031469209 | 2025-03-29T03:26:33.367741
43008 / tcp
-2031469209 | 2025-03-29T20:23:14.156642
43009 / tcp
-98713449 | 2025-03-29T11:11:53.989558
43080 / tcp
-98713449 | 2025-03-28T04:53:10.088781
43200 / tcp
-98713449 | 2025-03-28T04:18:30.525032
43221 / tcp
-2031469209 | 2025-03-28T15:19:53.417334
44021 / tcp
-98713449 | 2025-03-29T11:31:34.338346
44100 / tcp
-98713449 | 2025-03-29T00:54:03.163537
44158 / tcp
-98713449 | 2025-03-31T21:38:38.056131
44222 / tcp
411540654 | 2025-03-10T23:03:45.191605
44300 / tcp
-98713449 | 2025-03-29T14:57:47.537826
44301 / tcp
-2031469209 | 2025-03-29T15:54:14.478568
44302 / tcp
-2031469209 | 2025-03-28T08:29:41.806834
44303 / tcp
-98713449 | 2025-03-29T17:17:32.939952
44304 / tcp
-2031469209 | 2025-03-29T13:10:57.332083
44305 / tcp
-2031469209 | 2025-03-29T10:26:12.302093
44306 / tcp
-98713449 | 2025-03-29T20:06:50.326746
44307 / tcp
-98713449 | 2025-03-29T02:10:39.118656
44308 / tcp
-98713449 | 2025-03-31T16:54:52.873196
44309 / tcp
-2031469209 | 2025-03-29T10:04:05.430348
44310 / tcp
-98713449 | 2025-03-29T17:23:36.334801
44320 / tcp
-98713449 | 2025-03-29T05:31:00.506089
44332 / tcp
-2031469209 | 2025-03-29T11:34:37.185442
44333 / tcp
-2031469209 | 2025-03-29T00:46:43.027786
44334 / tcp
-2031469209 | 2025-03-29T14:55:51.193328
44336 / tcp
-98713449 | 2025-03-29T09:26:56.864895
44337 / tcp
-2031469209 | 2025-03-29T21:14:06.138309
44340 / tcp
-98713449 | 2025-03-29T17:07:14.266660
44345 / tcp
-98713449 | 2025-03-28T12:47:02.725451
44350 / tcp
-98713449 | 2025-03-31T15:57:55.758028
44365 / tcp
-2031469209 | 2025-03-29T05:00:25.908203
44399 / tcp
-2031469209 | 2025-03-29T20:08:22.150345
44400 / tcp
-2031469209 | 2025-03-28T16:53:45.845975
44410 / tcp
-2031469209 | 2025-03-29T05:31:55.741309
44420 / tcp
-2031469209 | 2025-03-29T11:53:57.993683
44444 / tcp
-2031469209 | 2025-03-28T01:11:20.967102
44500 / tcp
-2031469209 | 2025-03-29T02:54:37.297599
44510 / tcp
-98713449 | 2025-03-29T03:01:01.672965
44520 / tcp
-2031469209 | 2025-03-28T05:25:49.994820
45000 / tcp
-2031469209 | 2025-03-29T18:37:50.823831
45001 / tcp
-98713449 | 2025-03-29T12:55:16.952109
45002 / tcp
-98713449 | 2025-03-29T18:53:33.997030
45003 / tcp
-98713449 | 2025-03-29T03:36:11.780724
45005 / tcp
-2031469209 | 2025-03-29T12:31:49.515823
45006 / tcp
-98713449 | 2025-03-29T22:27:43.390178
45022 / tcp
411540654 | 2025-03-10T16:25:12.271151
45039 / tcp
-2031469209 | 2025-03-29T14:41:58.962419
45111 / tcp
-98713449 | 2025-03-29T08:18:37.945467
45333 / tcp
-98713449 | 2025-03-29T08:55:38.854198
45444 / tcp
-2031469209 | 2025-03-28T09:36:45.278994
45555 / tcp
-98713449 | 2025-03-29T08:22:28.985059
45666 / tcp
-98713449 | 2025-03-29T18:21:24.157128
45667 / tcp
-2031469209 | 2025-03-29T05:20:21.415253
45668 / tcp
-2031469209 | 2025-03-29T20:43:53.966577
45677 / tcp
-2031469209 | 2025-03-29T03:39:07.393206
45777 / tcp
-2031469209 | 2025-03-31T17:09:48.527827
45786 / tcp
-98713449 | 2025-03-29T15:54:02.959843
45788 / tcp
-98713449 | 2025-03-28T16:50:19.724014
45821 / tcp
-98713449 | 2025-03-29T09:20:49.367357
45886 / tcp
-98713449 | 2025-03-29T14:55:21.606995
45888 / tcp
-98713449 | 2025-03-29T14:41:07.599593
45922 / tcp
411540654 | 2025-03-10T14:41:51.682011
46000 / tcp
-98713449 | 2025-03-28T18:46:12.938666
46001 / tcp
-2031469209 | 2025-03-29T14:27:30.353135
46443 / tcp
-2031469209 | 2025-03-29T11:06:14.156579
46862 / tcp
-98713449 | 2025-03-29T17:46:43.854438
47000 / tcp
-98713449 | 2025-03-29T19:20:24.669995
47001 / tcp
-2031469209 | 2025-03-29T16:34:55.596750
47080 / tcp
-2031469209 | 2025-03-29T11:51:51.857829
47534 / tcp
-98713449 | 2025-03-29T08:49:00.863614
47722 / tcp
411540654 | 2025-03-10T11:15:21.783759
47808 / tcp
411540654 | 2025-03-31T11:16:38.504681
47822 / tcp
411540654 | 2025-03-10T10:32:43.915073
47922 / tcp
411540654 | 2025-03-10T07:53:52.878677
47984 / tcp
-98713449 | 2025-03-29T13:06:40.702319
47989 / tcp
-2031469209 | 2025-03-29T20:57:04.626378
47990 / tcp
411540654 | 2025-03-31T16:02:33.077694
48000 / tcp
-2031469209 | 2025-03-29T09:15:36.012130
48001 / tcp
-98713449 | 2025-03-29T14:46:26.200858
48002 / tcp
-2031469209 | 2025-03-29T10:00:37.262763
48012 / tcp
-98713449 | 2025-03-29T12:44:10.203064
48013 / tcp
-2031469209 | 2025-03-29T17:26:35.203560
48018 / tcp
-98713449 | 2025-03-29T15:52:39.662934
48019 / tcp
-2031469209 | 2025-03-29T09:39:06.177809
48020 / tcp
-2031469209 | 2025-03-29T19:55:13.268879
48022 / tcp
411540654 | 2025-03-07T11:23:59.413768
48100 / tcp
-98713449 | 2025-03-29T16:36:44.742913
48222 / tcp
411540654 | 2025-03-10T04:23:58.723768
48322 / tcp
411540654 | 2025-03-10T02:36:48.803377
48422 / tcp
411540654 | 2025-03-10T00:51:47.034796
48522 / tcp
411540654 | 2025-03-09T23:29:13.533668
48888 / tcp
-98713449 | 2025-03-29T16:39:17.301388
48889 / tcp
-2031469209 | 2025-03-29T01:19:07.836934
48899 / tcp
411540654 | 2025-03-31T09:33:40.792427
49022 / tcp
411540654 | 2025-03-07T15:40:31.995994
49080 / tcp
-2031469209 | 2025-03-28T18:27:28.751361
49121 / tcp
-2031469209 | 2025-03-29T08:24:49.299304
49152 / tcp
1094048410 | 2025-03-31T21:01:44.530962
49200 / tcp
-98713449 | 2025-03-28T09:11:55.239015
49210 / tcp
-98713449 | 2025-04-01T01:00:04.764802
49443 / tcp
-98713449 | 2025-03-29T14:11:11.480664
49501 / tcp
-2031469209 | 2025-03-29T13:14:58.260816
49502 / tcp
-2031469209 | 2025-03-28T22:49:08.533037
49592 / tcp
-98713449 | 2025-03-29T13:37:58.224829
49682 / tcp
-98713449 | 2025-03-28T06:22:46.239957
49684 / tcp
-2031469209 | 2025-03-28T10:29:35.681578
49686 / tcp
-2031469209 | 2025-03-29T11:36:19.835607
49688 / tcp
-2031469209 | 2025-03-29T13:45:37.665780
49690 / tcp
-2031469209 | 2025-03-29T19:42:05.813463
49692 / tcp
-98713449 | 2025-03-29T07:50:20.752433
49694 / tcp
-98713449 | 2025-03-29T04:55:46.977958
49767 / tcp
-2031469209 | 2025-03-28T06:38:33.819174
50000 / tcp
-2031469209 | 2025-03-31T21:41:58.837792
50001 / tcp
-98713449 | 2025-03-29T06:25:59.914374
50002 / tcp
-2031469209 | 2025-03-29T11:13:29.677808
50003 / tcp
-98713449 | 2025-03-29T16:02:16.870679
50004 / tcp
-98713449 | 2025-03-29T03:25:22.251930
50005 / tcp
-98713449 | 2025-03-29T08:22:42.423663
50006 / tcp
-98713449 | 2025-03-29T15:44:09.152767
50007 / tcp
-98713449 | 2025-03-29T18:04:53.829856
50008 / tcp
-2031469209 | 2025-03-28T23:31:54.419729
50009 / tcp
-98713449 | 2025-03-29T09:55:38.022411
50010 / tcp
-98713449 | 2025-03-29T10:29:23.381574
50011 / tcp
-98713449 | 2025-03-29T09:40:54.163141
50012 / tcp
-98713449 | 2025-03-29T20:06:34.428163
50013 / tcp
-98713449 | 2025-03-29T12:28:32.864468
50014 / tcp
-98713449 | 2025-03-28T17:58:57.779089
50022 / tcp
-98713449 | 2025-03-29T02:50:34.123920
50042 / tcp
-98713449 | 2025-03-28T21:28:30.190037
50050 / tcp
-98713449 | 2025-03-31T13:34:27.178593
50070 / tcp
1869901852 | 2025-03-31T20:47:44.043083
50073 / tcp
-98713449 | 2025-03-29T04:20:27.236922
50080 / tcp
-2031469209 | 2025-03-28T14:36:57.178373
50085 / tcp
-2031469209 | 2025-03-29T14:30:32.641608
50100 / tcp
-98713449 | 2025-03-28T09:05:40.776725
50101 / tcp
-2031469209 | 2025-03-28T02:54:26.595418
50102 / tcp
-98713449 | 2025-03-29T17:02:10.852280
50103 / tcp
-2031469209 | 2025-03-28T19:18:14.306498
50104 / tcp
-2031469209 | 2025-03-29T14:01:35.288209
50105 / tcp
-2031469209 | 2025-03-29T02:52:33.193526
50106 / tcp
-2031469209 | 2025-03-28T20:12:19.028592
50107 / tcp
-2031469209 | 2025-03-29T21:30:21.647984
50113 / tcp
-98713449 | 2025-03-29T16:27:40.132831
50122 / tcp
-2031469209 | 2025-03-29T16:19:18.485118
50160 / tcp
-2031469209 | 2025-03-29T21:14:14.734370
50202 / tcp
-98713449 | 2025-03-29T21:20:16.727478
50257 / tcp
-2031469209 | 2025-03-29T02:32:36.017056
50443 / tcp
-98713449 | 2025-03-29T20:53:49.942435
50500 / tcp
-2031469209 | 2025-03-29T09:56:40.970521
50580 / tcp
-98713449 | 2025-03-28T09:27:54.264284
50777 / tcp
-2031469209 | 2025-03-29T05:25:04.207423
50805 / tcp
-2031469209 | 2025-03-29T12:09:25.305777
50995 / tcp
-98713449 | 2025-03-29T08:09:21.157345
50996 / tcp
-98713449 | 2025-03-29T05:09:48.612002
50997 / tcp
-2031469209 | 2025-03-28T12:00:12.533888
50998 / tcp
-98713449 | 2025-03-29T08:44:30.161179
50999 / tcp
-2031469209 | 2025-03-29T19:34:47.677347
51000 / tcp
-2031469209 | 2025-03-29T17:57:14.016394
51001 / tcp
-2031469209 | 2025-03-29T03:38:36.476855
51002 / tcp
-98713449 | 2025-03-28T16:33:58.867582
51004 / tcp
-98713449 | 2025-03-29T15:33:30.857496
51005 / tcp
-2031469209 | 2025-03-28T18:57:02.163848
51007 / tcp
-2031469209 | 2025-03-29T16:36:22.817890
51106 / tcp
1094048410 | 2025-03-29T20:50:33.984158
51200 / tcp
-98713449 | 2025-03-29T19:35:11.302169
51201 / tcp
-2031469209 | 2025-03-28T19:06:18.788687
51235 / tcp
-2031469209 | 2025-03-31T21:13:52.770684
51294 / tcp
-2031469209 | 2025-03-29T14:39:13.984699
51434 / tcp
-2031469209 | 2025-03-29T14:24:56.150466
51443 / tcp
1094048410 | 2025-03-28T15:39:05.857244
52010 / tcp
-2031469209 | 2025-03-28T13:46:38.333610
52022 / tcp
411540654 | 2025-03-07T01:10:59.023526
52200 / tcp
-2031469209 | 2025-03-29T20:26:51.881325
52230 / tcp
-2031469209 | 2025-03-28T07:02:46.447009
52311 / tcp
-2031469209 | 2025-03-31T20:30:34.133429
52536 / tcp
-2031469209 | 2025-03-29T01:20:50.275911
52869 / tcp
-2031469209 | 2025-03-31T12:01:39.555697
52881 / tcp
-98713449 | 2025-03-29T17:31:25.872221
52931 / tcp
-2031469209 | 2025-03-29T09:48:15.720140
52951 / tcp
-2031469209 | 2025-03-29T17:52:19.695037
53022 / tcp
411540654 | 2025-03-07T07:48:57.470445
53200 / tcp
-2031469209 | 2025-03-29T04:14:58.119918
53400 / tcp
-2031469209 | 2025-03-29T11:19:05.160574
53413 / tcp
411540654 | 2025-03-29T09:33:17.757528
53413 / udp
-1959516545 | 2025-03-14T16:40:16.841952
53480 / tcp
-2031469209 | 2025-03-28T16:50:16.909567
53481 / tcp
-98713449 | 2025-03-29T14:03:06.637131
53482 / tcp
-98713449 | 2025-03-29T03:00:49.985585
53483 / tcp
-98713449 | 2025-03-28T03:44:10.724808
53484 / tcp
-2031469209 | 2025-03-29T12:52:13.064085
53485 / tcp
-2031469209 | 2025-03-28T09:51:30.990981
53490 / tcp
-98713449 | 2025-03-28T08:37:34.729209
53805 / tcp
-98713449 | 2025-03-29T19:39:50.963588
53806 / tcp
-98713449 | 2025-03-29T08:36:42.969412
54022 / tcp
-98713449 | 2025-03-29T16:16:40.580360
54138 / tcp
-2031469209 | 2025-03-31T14:10:03.870612
54327 / tcp
-98713449 | 2025-03-28T11:39:13.549463
54490 / tcp
-98713449 | 2025-03-29T18:14:57.158928
54545 / tcp
-2031469209 | 2025-03-29T18:50:57.218507
54857 / tcp
-98713449 | 2025-03-29T02:55:02.963040
54922 / tcp
411540654 | 2025-03-07T09:40:51.282168
54984 / tcp
411540654 | 2025-03-28T22:48:48.730795
55000 / tcp
-2031469209 | 2025-03-31T21:28:03.940362
55022 / tcp
1094048410 | 2025-03-07T04:43:16.243217
55055 / tcp
-98713449 | 2025-03-29T03:28:46.988244
55080 / tcp
-2031469209 | 2025-03-29T08:16:54.092165
55081 / tcp
-2031469209 | 2025-03-28T07:31:28.363359
55200 / tcp
-2031469209 | 2025-03-29T17:37:51.799021
55222 / tcp
411540654 | 2025-03-07T02:46:24.221337
55350 / tcp
-98713449 | 2025-03-28T07:16:27.237812
55388 / tcp
-2031469209 | 2025-03-29T19:49:23.456219
55422 / tcp
411540654 | 2025-03-06T18:15:00.527396
55442 / tcp
-2031469209 | 2025-03-31T17:32:57.194034
55443 / tcp
411540654 | 2025-03-31T11:39:07.371445
55470 / tcp
-2031469209 | 2025-03-29T11:40:39.186072
55475 / tcp
-98713449 | 2025-03-29T18:29:09.783816
55481 / tcp
-98713449 | 2025-03-29T03:47:08.954304
55490 / tcp
-98713449 | 2025-03-28T13:47:21.682644
55522 / tcp
411540654 | 2025-03-06T23:29:35.961401
55553 / tcp
1094048410 | 2025-03-31T16:01:15.670012
55554 / tcp
-98713449 | 2025-03-31T18:20:58.947005
55555 / tcp
-2031469209 | 2025-03-29T03:40:14.843802
55722 / tcp
411540654 | 2025-03-06T19:56:47.565788
57022 / tcp
411540654 | 2025-03-06T14:53:52.589794
57522 / tcp
411540654 | 2025-03-06T13:11:28.668350
57778 / tcp
-2031469209 | 2025-03-29T07:56:35.213923
57779 / tcp
-2031469209 | 2025-03-29T09:21:48.079511
57780 / tcp
-98713449 | 2025-03-29T03:58:15.961621
57781 / tcp
-98713449 | 2025-03-29T04:47:26.362394
57782 / tcp
-98713449 | 2025-03-28T04:04:05.521087
57783 / tcp
-2031469209 | 2025-03-29T10:29:16.887770
57784 / tcp
-98713449 | 2025-03-29T08:55:20.345788
57785 / tcp
-98713449 | 2025-03-29T07:49:55.779192
57786 / tcp
-2031469209 | 2025-03-29T09:06:56.426515
57787 / tcp
-98713449 | 2025-03-28T18:27:48.805655
57788 / tcp
-2031469209 | 2025-03-29T05:09:16.283171
57822 / tcp
411540654 | 2025-03-06T06:58:40.286978
57922 / tcp
411540654 | 2025-03-06T04:59:28.677315
58000 / tcp
-98713449 | 2025-03-29T09:28:30.072847
58122 / tcp
411540654 | 2025-03-06T03:14:47.573407
58222 / tcp
411540654 | 2025-03-06T01:30:40.571687
58322 / tcp
411540654 | 2025-03-05T23:44:41.279773
58378 / tcp
-98713449 | 2025-03-29T03:47:16.264099
58392 / tcp
-98713449 | 2025-03-29T08:28:15.434186
58422 / tcp
411540654 | 2025-03-05T22:30:35.971901
58443 / tcp
-2031469209 | 2025-03-28T03:46:35.924214
58522 / tcp
1094048410 | 2025-03-05T20:17:04.119460
58532 / tcp
-98713449 | 2025-03-28T22:05:03.686323
58585 / tcp
-2031469209 | 2025-03-29T05:27:07.616260
58603 / tcp
-2031469209 | 2025-03-29T09:40:13.506767
58722 / tcp
411540654 | 2025-03-05T18:55:22.964965
58822 / tcp
411540654 | 2025-03-05T16:50:41.314744
58922 / tcp
411540654 | 2025-03-05T15:20:47.075513
59012 / tcp
-2031469209 | 2025-03-29T17:36:39.191240
59022 / tcp
411540654 | 2025-03-05T13:25:33.702265
59122 / tcp
411540654 | 2025-03-05T11:42:01.944401
59222 / tcp
411540654 | 2025-03-05T09:58:44.904317
59322 / tcp
411540654 | 2025-03-05T08:13:59.141830
59443 / tcp
-98713449 | 2025-03-29T09:13:36.575274
59522 / tcp
411540654 | 2025-03-03T19:05:46.782722
60000 / tcp
-2031469209 | 2025-03-29T14:52:14.893039
60001 / tcp
-2031469209 | 2025-03-31T15:24:04.935922
60010 / tcp
-2031469209 | 2025-03-31T21:40:08.667462
60021 / tcp
-98713449 | 2025-03-29T05:24:21.368274
60023 / tcp
-98713449 | 2025-03-29T16:21:24.236164
60030 / tcp
-2031469209 | 2025-03-31T19:09:10.239206
60099 / tcp
-98713449 | 2025-03-29T16:11:57.227368
60129 / tcp
411540654 | 2025-03-20T05:42:20.205711
61234 / tcp
-98713449 | 2025-03-28T16:20:37.009565
61613 / tcp
-98713449 | 2025-03-31T08:37:37.181888
61616 / tcp
-2031469209 | 2025-03-31T18:26:35.520788
61617 / tcp
-98713449 | 2025-03-29T21:03:03.755759
61619 / tcp
-98713449 | 2025-03-29T19:59:22.519316
62016 / tcp
-98713449 | 2025-03-29T02:18:08.723737
62078 / tcp
-98713449 | 2025-03-31T19:43:03.868659
62080 / tcp
-98713449 | 2025-03-29T09:08:23.417781
62237 / tcp
-2031469209 | 2025-03-28T08:12:23.438838
62443 / tcp
-98713449 | 2025-03-28T15:14:51.621764
62865 / tcp
-98713449 | 2025-03-29T19:06:14.453718
63045 / tcp
-2031469209 | 2025-03-29T19:32:09.607227
63210 / tcp
-2031469209 | 2025-03-28T16:14:34.774329
63256 / tcp
-2031469209 | 2025-03-31T23:11:19.887560
63260 / tcp
-2031469209 | 2025-03-29T05:25:23.862602
63443 / tcp
-2031469209 | 2025-03-29T01:40:04.221308
63676 / tcp
-98713449 | 2025-03-29T10:59:26.009107
64477 / tcp
-2031469209 | 2025-03-29T14:17:38.467174
64671 / tcp
-98713449 | 2025-03-29T16:03:14.964076
64683 / tcp
-98713449 | 2025-03-28T13:00:25.260166
65000 / tcp
-98713449 | 2025-03-28T14:21:32.078118
65004 / tcp
-2031469209 | 2025-03-29T04:43:59.964767
65432 / tcp
-1897272419 | 2025-03-29T09:16:06.825460



Contact Us

Shodan ® - All rights reserved