13 /
tcp
-1585903915 | 2025-03-06T01:54:53.428590
15 /
tcp
2087396567 | 2025-03-10T14:19:24.626249
kjnkjabhbanc283ubcsbhdc72
17 /
tcp
344087494 | 2025-02-26T15:54:51.263601
"When a stupid man is doing something he is ashamed of, he always declares
that it is his duty." George Bernard Shaw (1856-1950)
\x00
19 /
tcp
-746345752 | 2025-02-26T14:56:23.395566
¥A\x01,\x02L\x08Connectx\x0857222
25 /
tcp
-1399940268 | 2025-02-23T07:08:25.387269
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
26 /
tcp
-1487943323 | 2025-03-16T04:08:31.512209
431 Unable to negotiate secure command connection.\r\n
43 /
tcp
-1681927087 | 2025-03-14T12:27:36.884712
kjnkjabhbanc283ubcsbhdc72
-1056270173 | 2025-02-20T05:04:29.945095
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
53 /
tcp
1155744004 | 2025-02-24T22:47:41.427496
9
\x81\x80\x00\x01\x00\x02\x00\x00\x00\x00\x08clients1\x06google\x03com\x00\x00\x01\x00\x01\xc0\x00\x05\x00\x01\x00\x00\x00\x1e\x00\x07clients\x01l\xc0\x15\xc01\x00\x01\x00\x01\x00\x00\x00\x1e\x00\x04\x8e\xfb+\x0e
\x00\x06\x85\x80\x00\x01\x00\x01\x00\x
-972699072 | 2025-02-20T20:51:20.643448
HTTP/1.0 200 OK
Content-type: text/html
Server: uc-httpd 1.0.0
Expires: 0
Vulnerabilities
1162594872 | 2025-03-10T17:29:23.758648
HTTP/1.1 403 Forbidden
Server: AliyunOSS
Date: Mon, 10 Mar 2025 17:29:23 GMT
Content-Type: application/xml
Content-Length: 344
Connection: keep-alive
x-oss-request-id: 67CF21735BA09F37380E35EB
x-oss-server-time: 1
x-oss-ec: 0003-00001201
90 /
tcp
-1888448627 | 2025-02-26T07:21:46.846994
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
92 /
tcp
-1699556818 | 2025-02-23T02:18:42.055024
\x01remshd: Kerberos Authentication not enabled.\n
98 /
tcp
-358801646 | 2025-02-19T16:25:01.236522
102 /
tcp
1911457608 | 2025-03-16T14:11:25.577378
\x00[\x00\x00\x00\x00\x00\x00
104 /
tcp
1623746877 | 2025-03-16T21:20:53.482518
500 Permission denied - closing connection.\r\n
110 /
tcp
1911457608 | 2025-02-25T07:33:39.296383
\x00[\x00\x00\x00\x00\x00\x00
111 /
tcp
-463621022 | 2025-03-07T11:36:31.024772
Portmap
Program Version Protocol Port
1701978211 1634627183 1948281967 1730177390
875385960 1696622191 1819045751 1768843040
1634624627 543257189 544367971 1869049449
673849405 1027483507 544566889 1836084325
1701062958 169877536 541147727 1377831456
1128485920 169877536 541148225 1411394058
1095519311 537534496 538984784 1346707466
1096111176 537534496 538985283 1126173216
1146441760 169877536 541284164 537534496
1279598602 538976288 1162756896 705306656
1381244938 538976288 1162892118 537534496
1096032266 538976288 1212501072 537534496
1398022154 538976288 1279348295 537534496
113 /
tcp
60948681 | 2025-03-05T20:37:24.382937
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).
-2107996212 | 2025-03-16T06:38:18.127119
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
122 /
tcp
1210754493 | 2025-03-05T07:18:17.554591
0\x0c\x02\x01\x01a\x07\n\x01\x00\x04\x00\x04\x00
135 /
tcp
96945398 | 2025-03-12T20:51:28.187065
\\x05\\x00\r\\x03\\x10\\x00\\x00\\x00\\x18\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x04\\x00\\x01\\x05\\x00\\x00\\x00\\x00\n\nServerAlive2: \n IP1: WIN-UI6V5MAREEP\n IP2: 192.168.1.3\n\nNTLMSSP:\nTarget_Name: WIN-UI6V5MAREEP\nProduct_Version: 6.1.7601 Ntlm 15\nOS: Windows 7, Service Pack 1/Windows Server 2008 R2, Service Pack 1\nNetBIOS_Domain_Name: WIN-UI6V5MAREEP\nNetBIOS_Computer_Name: WIN-UI6V5MAREEP\nDNS_Domain_Name: WIN-UI6V5MAREEP\nDNS_Computer_Name: WIN-UI6V5MAREEP\nSystem_Time: 2024-01-22 04:04:25 +0000 UTC\n\nDCERPC Dump:\n76f226c3-ec14-4325-
154 /
tcp
165188539 | 2025-02-23T21:00:19.719527
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
179 /
tcp
-399606100 | 2025-02-28T23:23:53.414361
BGP Message\nType: 3\nMajor error Code: 6\nMinor error Code: 5\n
189 /
tcp
632542934 | 2025-03-13T13:31:59.697209
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
-288825733 | 2025-03-12T17:07:30.826143
HTTP/1.1 200 OK
Connection: close
Content-Length: 2619
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Headers: authorization,Content-Type
Access-Control-Allow-Methods: POST, GET, OPTIONS, PUT, HEAD, DELETE
Content-Type: text/html
Server: Jetty(9.4.14.v20181114)
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1
264 /
tcp
-1180827859 | 2025-03-15T02:09:02.192788
CheckPoint\nFirewall Host: SKIET_LIBS1_INT_FW_SG5400_1\nSmartCenter Host: SKIET_LIBS1_MGMT_FW_NGSM10..umxpwy\\x00\n
67948279 | 2025-03-07T00:48:35.236063
HTTP/1.1 200 OK
Content-Type: text/html
Accept-Ranges: bytes
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
811247330 | 2025-02-25T08:51:26.392167
HTTP/1.1 200 OK
Server: Apache
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Permitted-Cross-Domain-Policies: none
X-Robots-Tag: noindex, nofollow, noarchive, nosnippet, nosnippet, notranslate, noimageindex
Content-Type: text/html; charset=utf-8
427 /
tcp
-826599962 | 2025-02-23T04:34:07.519154
SAAdvert Response:\nVersion: 2\nFunction: SA Advertisement (11)\nURL: service:service-agent://localhost.localdomain\nScopeList: default\nAttrributeList: \n\n
440 /
tcp
321971019 | 2025-03-08T18:48:52.033804
-ERR client ip is not in whitelist\r
-14826999 | 2025-03-05T12:25:38.548936
HTTP/1.1 403 Forbidden
Server: AliyunOSS
Date: Wed, 05 Mar 2025 12:25:29 GMT
Content-Type: application/xml
Content-Length: 344
Connection: keep-alive
x-oss-request-id: 67C842B9ED169333308A2C11
x-oss-server-time: 1
x-oss-ec: 0003-00001201
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6a:14:da:36:53:09:8b:0e:94:cd:6d:ee
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=BE, O=GlobalSign nv-sa, CN=GlobalSign GCC R3 OV TLS CA 2024
Validity
Not Before: Jan 3 03:21:02 2025 GMT
Not After : Feb 4 03:21:01 2026 GMT
Subject: C=CN, ST=ZheJiang, L=HangZhou, O=Alibaba (China) Technology Co., Ltd., CN=*.oss-cn-shenzhen.aliyuncs.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:b0:c7:54:83:40:8e:09:77:61:48:ac:c9:ca:24:
6b:a5:f6:40:76:6a:c2:5e:38:f5:c3:d9:fa:b8:28:
2b:0e:8e:1d:d8:e3:c2:c3:e4:cc:bb:ce:ed:dc:88:
cf:31:05:22:ef:ae:26:bf:a2:15:1f:dd:cb:1f:46:
8f:4e:bc:41:5f:58:65:97:ad:8e:07:54:c3:f7:d8:
23:9e:3e:8e:a6:1b:36:86:e3:0d:f0:6f:fc:1e:a0:
c7:33:e3:2c:13:02:a1:12:10:d2:a8:8a:a2:ce:8e:
73:8c:83:e5:c5:51:c4:63:bf:57:a3:ff:37:4c:db:
bc:44:d9:91:cc:ee:88:9e:83:74:91:30:a2:d6:c7:
2b:ad:1b:68:de:63:a1:e6:13:b9:e4:2e:9c:64:18:
0e:b6:20:81:7b:00:14:c1:46:80:31:a4:cb:10:5d:
38:a2:6c:d7:77:09:8f:12:d1:6e:47:69:a1:79:c6:
35:c7:90:0b:84:09:ec:33:26:6c:56:98:fb:2d:38:
e4:a6:8a:98:1a:d5:f9:ac:d2:40:58:44:5d:a2:cb:
c1:34:98:c7:31:9a:78:f8:1e:98:26:4a:42:ef:78:
c8:27:b5:57:c3:c2:c4:f7:9a:dc:e0:66:75:56:0e:
02:c4:88:e5:16:e6:25:db:bf:24:26:b9:96:8c:07:
e2:c3
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Basic Constraints: critical
CA:FALSE
Authority Information Access:
CA Issuers - URI:http://secure.globalsign.com/cacert/gsgccr3ovtlsca2024.crt
OCSP - URI:http://ocsp.globalsign.com/gsgccr3ovtlsca2024
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.2
Policy: 1.3.6.1.4.1.4146.10.1.2
CPS: https://www.globalsign.com/repository/
X509v3 CRL Distribution Points:
Full Name:
URI:http://crl.globalsign.com/gsgccr3ovtlsca2024.crl
X509v3 Subject Alternative Name:
DNS:*.oss-cn-shenzhen.aliyuncs.com, DNS:*.oss-cn-shenzhen-finance-1.aliyuncs.com, DNS:*.oss-cn-shenzhen-internal.aliyuncs.com, DNS:*.img-cn-shenzhen-internal.aliyuncs.com, DNS:*.oss-cn-shenzhen-internal-cross.aliyuncs.com, DNS:*.oss-cn-szfinance.aliyuncs.com, DNS:*.oss-cn-shenzhen-diku-internal.aliyuncs.com, DNS:*.oss-cn-shenzhen-finance-1-internal.aliyuncs.com, DNS:*.cn-heyuan.oss.aliyuncs.com, DNS:*.oss-cn-shenzhen-cross.aliyuncs.com, DNS:*.oss-enet-cn-south.aliyuncs.com, DNS:*.oss-internal.aliyuncs.com, DNS:*.oss-cn-guangzhou.aliyuncs.com, DNS:*.oss-cn-guangzhou-cross.aliyuncs.com, DNS:*.oss-accelerate.aliyuncs.com, DNS:*.oss-cn-heyuan-internal.aliyuncs.com, DNS:*.oss-accelerate-overseas.aliyuncs.com, DNS:*.aliyuncs.com, DNS:*.oss.aliyuncs.com, DNS:*.oss-cn-heyuan-cross.aliyuncs.com, DNS:*.img-cn-shenzhen.aliyuncs.com, DNS:*.oss-enet.aliyuncs.com, DNS:*.oss-cn-szfinance-internal.aliyuncs.com, DNS:*.vpc100-oss-cn-shenzhen.aliyuncs.com, DNS:*.cn-shenzhen.oss.aliyuncs.com, DNS:*.oss-cn-heyuan.aliyuncs.com, DNS:*.oss-cn-guangzhou-internal.aliyuncs.com, DNS:*.cn-guangzhou.oss.aliyuncs.com, DNS:*.cn-shenzhen-finance.oss.aliyuncs.com, DNS:*.cn-shenzhen-dualstack.oss.aliyuncs.com, DNS:*.cn-shenzhen-vpc.oss.aliyuncs.com, DNS:*.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-shenzhen.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-shenzhen-internal.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-heyuan.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-heyuan-internal.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-guangzhou.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-guangzhou-internal.oss-accesspoint.aliyuncs.com, DNS:*.cn-shenzhen.oss-console.aliyuncs.com, DNS:*.s3.oss-cn-shenzhen.aliyuncs.com, DNS:*.s3.oss-cn-shenzhen-internal.aliyuncs.com, DNS:*.cn-shenzhen.mgw.aliyuncs.com, DNS:*.oss.cn-shenzhen.privatelink.aliyuncs.com, DNS:*.oss-cn-shenzhen.oss-object-process.aliyuncs.com, DNS:*.oss-cn-shenzhen-internal.oss-object-process.aliyuncs.com, DNS:*.oss-vpc.aliyuncs.com, DNS:*.cn-shenzhen.oss-vpc.aliyuncs.com, DNS:oss-cn-shenzhen.aliyuncs.com
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Authority Key Identifier:
DA:D3:A8:08:48:0C:34:37:58:EE:E5:A7:75:2E:59:FC:D6:DC:3C:38
X509v3 Subject Key Identifier:
6F:0A:05:0F:AD:E0:67:D5:94:20:25:0A:B9:A1:6C:32:00:B2:CD:87
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:
4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0
Timestamp : Jan 3 03:21:04.713 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:46:02:21:00:D6:1F:CC:D3:A4:9D:5F:9F:32:F0:74:
5F:B8:85:EF:D7:C9:B4:59:58:74:B2:B0:4A:06:A1:1E:
8B:A5:22:34:B9:02:21:00:B3:B1:61:82:15:32:FA:81:
22:82:AA:E0:3A:55:16:20:15:DE:B3:1B:94:7B:03:AE:
27:37:66:28:7C:4F:D2:82
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 0E:57:94:BC:F3:AE:A9:3E:33:1B:2C:99:07:B3:F7:90:
DF:9B:C2:3D:71:32:25:DD:21:A9:25:AC:61:C5:4E:21
Timestamp : Jan 3 03:21:05.062 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:20:35:96:5D:CD:F7:99:BA:18:39:06:9E:79:
69:44:44:96:FB:13:1A:9B:65:EC:FA:79:BA:AF:2D:51:
1E:1F:B3:E2:02:21:00:C7:A2:1C:30:C9:8A:51:6C:57:
6C:D4:B8:3B:84:E6:20:85:DA:FB:88:A6:38:F1:4C:5E:
34:69:AD:30:37:D4:AF
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 25:2F:94:C2:2B:29:E9:6E:9F:41:1A:72:07:2B:69:5C:
5B:52:FF:97:A9:0D:25:40:BB:FC:DC:51:EC:4D:EE:0B
Timestamp : Jan 3 03:21:04.792 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:44:02:20:4D:BB:E7:FF:BA:3B:0B:43:8F:9D:17:8C:
F4:3C:82:FA:F6:0F:8D:74:4C:EE:90:CA:F9:1F:36:CD:
1E:A7:1A:8F:02:20:4E:D0:A0:43:56:04:25:22:B3:24:
2E:60:EB:26:3C:8D:BD:42:15:F9:9C:FE:7E:74:EE:28:
E8:3F:CC:85:B4:B1
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
2b:f7:41:91:27:63:90:44:b9:92:f0:38:13:64:80:52:9b:fc:
d7:23:bc:5b:b9:6b:05:a4:2d:4b:22:b9:c0:59:73:ca:5c:70:
0e:97:6d:d5:00:d3:40:19:a1:39:81:a4:52:45:8e:8f:2b:32:
cd:df:31:cf:6e:aa:a4:99:34:66:5a:43:b7:62:ed:7d:97:63:
56:73:79:d5:c0:a2:df:e2:d2:73:22:90:93:7c:b8:d6:3f:ae:
52:3e:b7:14:f4:e9:e3:2f:a0:ac:ba:db:cd:48:1e:8c:df:ef:
25:d8:2c:3b:93:06:09:a6:13:25:45:27:68:e9:49:cc:03:27:
48:0a:f5:ed:ed:e4:d1:3c:fa:ac:2f:6a:0d:ee:92:d4:b5:f2:
31:8c:6b:61:88:81:e0:6f:89:f6:b9:1f:39:9e:00:6f:e2:d7:
c2:e9:47:ec:12:4f:cf:ad:74:2c:5a:a0:ea:b6:39:b5:c3:70:
fb:71:db:b0:f7:d3:b3:27:3f:14:5d:f2:3e:fe:46:97:f3:71:
1f:2b:23:c9:35:1d:aa:61:4b:16:9e:1b:05:dd:21:b2:ae:30:
05:aa:03:f6:75:ca:9e:a7:45:cc:77:ca:e7:09:3c:4b:e8:f8:
fb:8e:fc:91:b3:59:9c:a7:9f:76:17:b7:25:05:d1:e3:15:f8:
ce:8c:37:c6
-995719555 | 2025-03-11T05:21:06.620187
HTTP/1.1 302 Moved Temporarily
Server: nginx/1.22.1
Date: Tue, 11 Mar 2025 05:21:06 GMT
Content-Type: text/html
Content-Length: 145
Connection: close
Location: https://47.106.4.29:443/
<html>
<head><title>302 Found</title></head>
<body>
<center><h1>302 Found</h1></center>
<hr><center>nginx/1.22.1</center>
</body>
</html>
448 /
tcp
745343730 | 2025-02-21T02:39:31.007435
220 smtp.qq.com Esmtp QQ Mail Server
465 /
tcp
897328069 | 2025-03-10T16:08:35.771494
220 mail.scott000.com ESMTP
491 /
tcp
410249975 | 2025-03-15T02:00:46.702737
503 /
tcp
819727972 | 2025-03-10T21:58:14.577602
SSH-2.0-OpenSSH_7.4
Vulnerabilities
515 /
tcp
1880683805 | 2025-03-13T05:05:48.460146
522 /
tcp
117101543 | 2025-03-12T22:20:48.160249
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
541 /
tcp
-1876452130 | 2025-03-04T08:47:09.220462
\\x16\\x03\\x01\\x01N\\x01\\x00\\x01J\\x03\\x03\\x1f\\xa5H\\xe5\\xb5*G%Y\\xc7\\xecN\\xe3\\x87\\xe4\\x86)D.}J\\x13\\xeb\'\\x95\\x8b\xc8\x8cD&b\\xae \\x8e\\x84\\x12\\x9fX\r\\xaf\\xcd)\\xa55kb\\xa2\\x8e\\xe72,\\x9e\x0b\\x90?}cg>\\xe6\\xfb\\x97\\x92O\\x94\\x002\\x13\\x02\\x13\\x03\\x13\\x01\\x009\\x005\\x00k\\x00=\\xc00\\
548 /
tcp
-1769206458 | 2025-03-10T00:56:48.418733
Fast Copy: Yes\nExtended Sleep: Yes\nUUIDs: Yes\nUTF8 Server Name: Yes\nDirectory Services: Yes\nReconnect: No\nServer Notifications: Yes\nTCP/IP: Yes\nServer Signature: Yes\nServer Message: No\nPassword Saving Prohibited: No\nPassword Changing: No\nCopy File: Yes\nServer Name: NASDF59D2\nMachine Type: \\x10Netatalk3.1.9.q2\nAFP Versions: AFP2.2, AFPX03, AFP3.1, AFP3.2, AFP3.3, AFP3.4\nUAMs: DHX2\\x0f,No User Authent\\x10,Cleartxt Passwrd\\x00\nServer Signature: 00000000008002000180030002800280
554 /
tcp
-927382641 | 2025-02-25T20:57:31.743710
RTSP/1.0 200 OK
CSeq: 1
Public: OPTIONS, DESCRIBE, PLAY, PAUSE, SETUP, TEARDOWN, SET_PARAMETER, GET_PARAMETER
555 /
tcp
1911457608 | 2025-03-12T02:39:37.600787
\x00[\x00\x00\x00\x00\x00\x00
556 /
tcp
1911457608 | 2025-03-12T03:29:02.261507
\x00[\x00\x00\x00\x00\x00\x00
587 /
tcp
745343730 | 2025-03-05T05:01:59.500738
220 smtp.qq.com Esmtp QQ Mail Server
4146400 | 2025-03-14T17:23:18.441422
HTTP/1.1 400 Bad Request
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 8-26086461-0 0NNN RT(1705912253915 115) q(-1 -1 -1 -1) r(0 -1) b1
1300162323 | 2025-03-09T22:57:07.137705
HTTP/1.1 404 Not Found
Content-Type: text/plain; charset=utf-8
X-Content-Type-Options: nosniff
-1013082686 | 2025-03-06T19:23:49.789710
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
685 /
tcp
1363464823 | 2025-02-23T20:49:27.100452
743 /
tcp
1492413928 | 2025-03-09T07:37:31.523349
SSH-2.0-OpenSSH_7.5
Vulnerabilities
771 /
tcp
1011407350 | 2025-03-08T20:08:38.217559
* OK GroupWise IMAP4rev1 Server Ready\r\n
789 /
tcp
-2096652808 | 2025-02-27T15:09:27.803347
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
806 /
tcp
-2033111675 | 2025-03-15T20:17:48.851428
873 /
tcp
-1970692834 | 2025-03-10T08:44:31.322092
@RSYNCD: 31.0\n@RSYNCD: EXIT\n
886 /
tcp
-2096652808 | 2025-03-04T21:48:46.232213
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
943 /
tcp
1763259671 | 2025-03-17T10:38:02.300811
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
995 /
tcp
-740312032 | 2025-03-12T03:42:20.077463
+OK Dovecot (Ubuntu) ready.\r\n
1012 /
tcp
1504401647 | 2025-03-15T23:13:23.886939
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
1023 /
tcp
-1508080900 | 2025-03-14T04:26:32.361769
1050 /
tcp
321971019 | 2025-03-07T05:25:58.171031
-ERR client ip is not in whitelist\r
1080 /
tcp
1362344524 | 2025-02-25T16:49:28.369572
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.7
1099 /
tcp
-1399940268 | 2025-02-28T17:15:13.228549
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1909672637 | 2025-02-24T20:00:23.281872
HTTP/1.1 400 Bad Request
Content-Type: text/plain; charset=utf-8
Sec-Websocket-Version: 13
X-Content-Type-Options: nosniff
1111 /
tcp
-358801646 | 2025-03-09T17:27:41.796292
1153 /
tcp
-1399940268 | 2025-03-10T18:59:49.264891
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1200 /
tcp
550048729 | 2025-03-15T17:43:04.110845
1283 /
tcp
1212285915 | 2025-02-27T23:01:20.993118
\x00K\x00\x00\x02\x00\x00\x00%~)J/\\tHjU(IAGENT = (AGENT_VERSION = 2388790170)(RPC_VERSION = 5..722))
1290 /
tcp
-1428621233 | 2025-02-27T15:06:22.475625
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
1291 /
tcp
-1189269828 | 2025-02-19T14:13:32.452017
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1337 /
tcp
2087396567 | 2025-03-16T13:05:32.880181
kjnkjabhbanc283ubcsbhdc72
2143387245 | 2025-03-16T01:30:37.259119
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
1414 /
tcp
-1888448627 | 2025-02-21T19:10:41.751212
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
1433 /
tcp
637263328 | 2025-03-13T08:34:20.865577
MSSQL Server\nVersion: 171050560 (0xa320640)\nSub-Build: 0\nEncryption:Not available\n\nMSSQL NTLM Info:\nTarget_Name: SERVER\nProduct_Version: 10.0.19041 Ntlm 15\nOS: Windows 10, Version 2004/Windows Server, Version 2004\nNetBIOS_Domain_Name: SERVER\nNetBIOS_Computer_Name: SERVER\nDNS_Domain_Name: server\nDNS_Computer_Name: server\nSystem_Time: 2024-01-22 01:21:33 +0000 UTC\n\n
1456 /
tcp
-1888448627 | 2025-02-22T23:46:01.244932
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
1515 /
tcp
-1316398834 | 2025-02-27T00:45:32.303821
1521 /
tcp
-541815454 | 2025-03-14T19:07:29.631917
Version:11.2.0.1.0\n"\\x00\\x00Y(DESCRIPTION=(TMP=)(VSNNUM=186646784)(ERR=1189)(ERROR_STACK=(ERROR=(CODE=1189)(EMFI=4))))
1604 /
tcp
819727972 | 2025-03-10T20:07:21.537012
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1723 /
tcp
1103582599 | 2025-02-25T23:54:35.441388
Firmware: 1\nHostname: Vigor\nVendor: DrayTek\n
1800 /
tcp
580340387 | 2025-03-17T15:12:40.126668
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
1801 /
tcp
1692069329 | 2025-03-16T08:04:38.540751
\\x10Z\x0b\\x00LIOR<\\x02\\x00\\x00\\xff\\xff\\xff\\xff\\x00\\x00\\x12\\x00a36a0e421af47074\\xe14\\xf0\\xb6\\xb85\x0bB\\x86\\x99B\\xa5\\x07\\xb0\\xf6V92d3\\x10\\x03\\x00\\x00ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
1911 /
tcp
1134517380 | 2025-03-04T13:38:35.908018
welcome to Pandora console!\r\n----------------------------\n-------------------------\n| Login Time | 2021-12-08 1...\n
1955 /
tcp
-1888448627 | 2025-02-19T11:14:08.853938
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
1962 /
tcp
-1399940268 | 2025-03-11T10:33:04.520432
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1969 /
tcp
-1248408558 | 2025-03-10T21:58:52.848538
220 MikroTik FTP server (MikroTik 6.44.3) ready
1970 /
tcp
-375604792 | 2025-03-11T07:31:18.703669
220 Microsoft FTP Service
1976 /
tcp
1911457608 | 2025-03-15T01:29:38.334021
\x00[\x00\x00\x00\x00\x00\x00
1980 /
tcp
1911457608 | 2025-03-10T22:58:17.942804
\x00[\x00\x00\x00\x00\x00\x00
1983 /
tcp
-1648456501 | 2025-02-21T16:36:06.756641
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
1988 /
tcp
1911457608 | 2025-02-22T09:04:19.819015
\x00[\x00\x00\x00\x00\x00\x00
2000 /
tcp
632542934 | 2025-03-03T22:00:11.773880
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
2003 /
tcp
1911457608 | 2025-02-28T16:14:54.987973
\x00[\x00\x00\x00\x00\x00\x00
2006 /
tcp
-2031152423 | 2025-02-19T18:52:17.973255
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
2008 /
tcp
-1681927087 | 2025-03-16T14:20:24.991233
kjnkjabhbanc283ubcsbhdc72
2050 /
tcp
-1730858130 | 2025-02-27T04:34:36.543084
RFB 003.008
VNC:
Protocol Version: 3.8
2057 /
tcp
320677201 | 2025-02-22T17:55:50.076216
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
2058 /
tcp
632542934 | 2025-03-08T16:53:05.844556
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
2060 /
tcp
-653033013 | 2025-02-26T02:16:25.872220
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
2065 /
tcp
-42767839 | 2025-02-19T16:26:05.325008
RFB 005.000
VNC:
Protocol Version: 5.0
2066 /
tcp
-1730858130 | 2025-03-06T04:29:50.696504
RFB 003.008
VNC:
Protocol Version: 3.8
2067 /
tcp
2033888749 | 2025-03-10T18:16:15.868998
Content-Type: text/rude-rejection
Content-Length: 24
Access Denied, go away.
Content-Type: text/disconnect-notice
C...
2068 /
tcp
-42767839 | 2025-03-07T15:56:14.591661
RFB 005.000
VNC:
Protocol Version: 5.0
2080 /
tcp
1911457608 | 2025-02-27T07:55:47.581642
\x00[\x00\x00\x00\x00\x00\x00
2081 /
tcp
-1399940268 | 2025-03-15T12:32:32.381874
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2087 /
tcp
2087396567 | 2025-02-25T00:30:13.923838
kjnkjabhbanc283ubcsbhdc72
2090 /
tcp
165188539 | 2025-03-11T07:56:20.938952
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
2100 /
tcp
1212285915 | 2025-02-24T05:57:07.230879
\x00K\x00\x00\x02\x00\x00\x00%~)J/\\tHjU(IAGENT = (AGENT_VERSION = 2388790170)(RPC_VERSION = 5..722))
141730637 | 2025-03-14T14:13:58.252819
HTTP/1.0 200 OK
Server: Proxy
2122 /
tcp
-1626979812 | 2025-03-14T10:24:25.676509
220 Service ready for new user.
2130 /
tcp
-1399940268 | 2025-03-04T19:44:32.351049
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2133 /
tcp
117101543 | 2025-02-25T02:17:55.860365
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
2154 /
tcp
366084633 | 2025-03-04T00:42:37.317374
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
2181 /
tcp
546151771 | 2025-03-10T15:46:26.772447
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
2195 /
tcp
819727972 | 2025-03-16T11:57:14.073707
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1662205251 | 2025-03-12T04:44:26.175612
HTTP/1.0 404 FAIL
Content-length:5
Connection:Close
2327 /
tcp
921225407 | 2025-03-04T19:29:00.738034
\x00\x00\x00\x04\x00\x00\x00\x00\x00
2332 /
tcp
-358801646 | 2025-03-16T16:04:13.883246
2345 /
tcp
1332894250 | 2025-03-06T12:49:44.081505
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
2404 /
tcp
-805362002 | 2025-03-17T13:56:32.623880
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
2423 /
tcp
-1399940268 | 2025-03-13T00:45:15.868610
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2435 /
tcp
921225407 | 2025-03-10T13:02:36.989368
\x00\x00\x00\x04\x00\x00\x00\x00\x00
2455 /
tcp
-2033111675 | 2025-03-11T04:22:23.951256
2548 /
tcp
165188539 | 2025-02-21T11:18:52.980223
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
2550 /
tcp
1541211644 | 2025-03-13T18:08:17.876289
2554 /
tcp
-1399940268 | 2025-03-13T12:06:18.512205
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2555 /
tcp
-1105333987 | 2025-02-25T20:09:12.792513
2556 /
tcp
119860953 | 2025-02-22T01:51:18.337159
* OK ArGoSoft Mail Server IMAP Module v.YW at
2563 /
tcp
-805362002 | 2025-03-13T22:01:59.094879
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
2566 /
tcp
819727972 | 2025-03-12T10:24:23.846365
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2598 /
tcp
-2096652808 | 2025-03-16T17:00:17.504146
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
2628 /
tcp
660175493 | 2025-03-16T20:01:22.924118
2709 /
tcp
-1399940268 | 2025-03-17T06:36:37.731352
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2761 /
tcp
-274082663 | 2025-03-14T23:35:34.661869
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
2762 /
tcp
-1399940268 | 2025-03-16T05:11:46.134580
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2995 /
tcp
677934968 | 2025-03-12T03:32:04.165001
3001 /
tcp
1991883981 | 2025-03-17T03:34:23.495454
B\x00\x00\x00\xc3\xbfn\x04Too many connections
391958514 | 2025-03-05T07:50:18.100908
HTTP/1.1 404 Not Found
Content-Type: text/plain;charset=utf-8
Access-Control-Allow-Origin: *
Access-Control-Allow-Headers: X-Requested-With
Access-Control-Allow-Methods: PUT,POST,GET,DELETE,OPTIONS
Connection: keep-alive
Transfer-Encoding: chunked
3015 /
tcp
-1399940268 | 2025-03-17T02:10:28.003652
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3019 /
tcp
-1399940268 | 2025-02-19T17:54:53.771949
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3056 /
tcp
-1099385124 | 2025-03-14T23:08:42.884163
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
3058 /
tcp
-1026951088 | 2025-03-10T21:49:43.271668
3061 /
tcp
-801484042 | 2025-03-06T06:42:57.264961
3063 /
tcp
-1399940268 | 2025-03-07T10:49:13.718166
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3065 /
tcp
-1279886438 | 2025-03-17T11:59:25.321750
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
3066 /
tcp
1308377066 | 2025-02-28T01:32:08.239409
3069 /
tcp
-653033013 | 2025-03-12T15:10:00.534441
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
198844676 | 2025-02-20T07:19:03.513848
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3072 /
tcp
-274082663 | 2025-02-26T19:47:37.583988
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
3073 /
tcp
-1399940268 | 2025-03-07T07:35:11.782991
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
198844676 | 2025-03-16T16:56:35.015966
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3102 /
tcp
1767345577 | 2025-03-12T22:43:08.311301
Hello, this is Quagga (version 0T).
Copyright 1996-200
3104 /
tcp
-1428621233 | 2025-02-21T00:37:39.791704
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
3105 /
tcp
819727972 | 2025-03-12T22:13:10.081659
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3108 /
tcp
-1114821551 | 2025-02-22T06:46:39.168797
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
3130 /
tcp
-1399940268 | 2025-03-07T09:56:09.348032
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3138 /
tcp
1623746877 | 2025-03-16T22:06:26.044689
500 Permission denied - closing connection.\r\n
3146 /
tcp
1911457608 | 2025-03-15T23:41:13.724584
\x00[\x00\x00\x00\x00\x00\x00
3148 /
tcp
-1730858130 | 2025-02-28T14:56:59.722575
RFB 003.008
VNC:
Protocol Version: 3.8
3152 /
tcp
-407828767 | 2025-03-17T09:12:14.384666
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
3157 /
tcp
-1139539254 | 2025-03-06T08:26:15.121814
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
3159 /
tcp
-1611764932 | 2025-03-08T21:21:21.082151
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
2143387245 | 2025-03-08T21:29:02.291137
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
3174 /
tcp
-2031152423 | 2025-03-11T23:08:53.907217
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
3179 /
tcp
-358801646 | 2025-02-27T22:38:06.752713
3186 /
tcp
-1399940268 | 2025-02-28T17:39:39.864186
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3191 /
tcp
819727972 | 2025-02-21T06:03:29.054759
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3195 /
tcp
-2089734047 | 2025-03-14T00:26:55.283997
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3197 /
tcp
-358801646 | 2025-03-05T18:46:54.099346
3260 /
tcp
-271466677 | 2025-03-15T21:48:58.376257
RIFA\\x00\\x00\\x00\\x00\\x10\\x88\\x81\\x00\\x00\\x00\\x00\\x00\\x00\x0b\\x00\\x05\\x00\\x00\\x00:\\x00HD316\\x00\\x01\\x00
-1547976805 | 2025-03-05T09:48:39.596754
HTTP/1.1 403 Forbidden
Server: nginx
Content-Type: text/html
Connection: close
3269 /
tcp
-904840257 | 2025-03-11T03:03:33.640000
572 Relay not authorized\r\n
3299 /
tcp
740837454 | 2025-03-13T08:02:10.060583
SSH-2.0-OpenSSH_5.3
Vulnerabilities
3301 /
tcp
-1996280214 | 2025-03-04T14:32:53.703926
3306 /
tcp
1673132866 | 2025-02-25T04:54:26.894011
I\\x00\\x00\\x01\\xffj\\x04Host \'*.*.*.*\' is not allowed to connect to this MariaDB server
3310 /
tcp
1911457608 | 2025-03-12T18:23:15.398357
\x00[\x00\x00\x00\x00\x00\x00
3388 /
tcp
-1733645023 | 2025-02-27T00:38:53.741449
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
3390 /
tcp
819727972 | 2025-03-13T13:56:58.120423
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3400 /
tcp
819727972 | 2025-03-08T20:28:31.798057
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3510 /
tcp
1911457608 | 2025-03-10T01:01:54.571414
\x00[\x00\x00\x00\x00\x00\x00
198844676 | 2025-03-12T01:35:23.290733
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3556 /
tcp
819727972 | 2025-03-10T02:22:00.049875
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1227409554 | 2025-03-16T12:57:31.044456
HTTP/1.1 500 Internal Server Error
Server: Zope/(2.13.23, python 1.7.18, linux2) ZServer/1.1
Content-Type: text/plain; charset=utf-8
Connection: close
3780 /
tcp
-1392039491 | 2025-02-22T02:44:41.932525
"Broadband Router"
<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
3790 /
tcp
-441419608 | 2025-02-25T15:29:11.002574
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
3793 /
tcp
1208318993 | 2025-03-05T11:37:45.896298
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
3794 /
tcp
-1105333987 | 2025-03-11T12:54:57.538916
-1230049476 | 2025-03-05T17:52:14.598925
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
4022 /
tcp
1911457608 | 2025-03-10T10:43:09.114460
\x00[\x00\x00\x00\x00\x00\x00
4042 /
tcp
45131230 | 2025-03-10T16:42:40.632572
inv2W\x04\x0f\x00\x00\x00\x01\x00\t\x00\x00\x00
4063 /
tcp
808560482 | 2025-03-12T23:51:59.439708
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP
: USERID : UNIX : Cr8
4064 /
tcp
819727972 | 2025-02-19T23:23:33.742246
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4150 /
tcp
-441419608 | 2025-03-11T17:59:16.117803
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
4159 /
tcp
632542934 | 2025-03-13T17:49:49.552657
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
-1879056922 | 2025-03-11T07:03:58.687800
HTTP/1.1 403 Forbidden
Server: Apache/2.4.41 (Unix) OpenSSL/1.1.1d TST PHP/7.3.11
Content-Type: text/plain; charset=utf-8
Connection: close
4282 /
tcp
819727972 | 2025-03-11T23:52:46.332028
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4321 /
tcp
-1250504565 | 2025-03-17T15:56:45.167725
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x80\x00\x04\x00\x01\x00\x00\x00\x05\x00\xff\xff\xff\x00\x00\x04\x08\x00\x00\x00\x00\x00\x7f\xff\x00\x00\x00\x00\x08\x07\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01
4401 /
tcp
-1746074029 | 2025-03-15T06:57:40.988961
4432 /
tcp
-1888448627 | 2025-03-06T06:48:46.058118
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
4433 /
tcp
2087396567 | 2025-03-06T02:23:25.729567
kjnkjabhbanc283ubcsbhdc72
4434 /
tcp
660175493 | 2025-02-25T21:14:31.543526
4500 /
tcp
1911457608 | 2025-02-22T04:19:58.949076
\x00[\x00\x00\x00\x00\x00\x00
4506 /
tcp
550048729 | 2025-02-25T15:56:57.907350
4572 /
tcp
639175818 | 2025-03-11T14:19:02.129525
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
4646 /
tcp
1208318993 | 2025-02-26T12:15:06.274238
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
4786 /
tcp
819727972 | 2025-03-08T20:25:12.407183
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4899 /
tcp
-971970408 | 2025-03-09T07:58:06.974989
-1839934832 | 2025-03-09T20:57:39.737711
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
4949 /
tcp
-2033111675 | 2025-03-10T07:29:04.526238
5001 /
tcp
819727972 | 2025-03-16T19:23:18.548102
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5007 /
tcp
-1737707071 | 2025-03-11T19:39:21.678573
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
-1122307493 | 2025-02-28T09:32:26.093669
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae1ed0_xz202_38367-12424
5010 /
tcp
1767345577 | 2025-03-06T21:13:14.349374
Hello, this is Quagga (version 0T).
Copyright 1996-200
5025 /
tcp
819727972 | 2025-03-08T17:19:22.227271
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1671292022 | 2025-02-25T00:50:41.068410
HTTP/1.0 200 OK
Content-Type: text/json
5135 /
tcp
-358801646 | 2025-03-14T11:56:31.763409
5172 /
tcp
897328069 | 2025-03-11T19:01:19.398480
220 mail.scott000.com ESMTP
5201 /
tcp
-1399940268 | 2025-02-28T03:54:13.665715
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5222 /
tcp
819727972 | 2025-03-17T17:25:09.662086
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5248 /
tcp
1308377066 | 2025-03-10T12:41:42.406250
5259 /
tcp
1996932384 | 2025-02-27T14:16:44.556524
5261 /
tcp
597764502 | 2025-03-05T02:14:55.080984
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
5265 /
tcp
-1810987450 | 2025-02-19T15:40:43.708367
5267 /
tcp
819727972 | 2025-03-04T13:49:11.013689
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1854630806 | 2025-03-16T20:47:35.710046
HTTP/1.1 400 Bad Request
Server: CWAP-waf
Content-Type: text/html
Connection: close
WZWS-RAY: 1249-1705937491.237-w-waf01tjgt
5272 /
tcp
-358801646 | 2025-03-08T11:30:29.562737
-2084705145 | 2025-03-10T05:14:26.481305
HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/10.0
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
858211407 | 2025-02-28T14:53:19.482919
HTTP/1.1 404 Not Found
DATE: Fri, 19 Jan 2024 11:56:45 GMT
Connection: Keep-Alive
Server: LINUX/2.4 UPnP/1.0 BRCM400/1.0
Content-Type: text/xml; charset="utf-8"
EXT:
5432 /
tcp
321971019 | 2025-03-14T00:08:51.749853
-ERR client ip is not in whitelist\r
5435 /
tcp
165188539 | 2025-03-11T23:55:19.571231
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
49012578 | 2025-02-22T01:08:37.518794
HTTP/1.1 401 Unauthorized
Server: hmhttpd/1.24-20160808
Cache-Control: no-cache,no-store
Content-Type: text/html; charset=%s
Connection: close
5591 /
tcp
-1399940268 | 2025-02-24T09:43:06.636385
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5595 /
tcp
-1399940268 | 2025-02-25T02:01:19.046616
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5600 /
tcp
-303199180 | 2025-03-14T18:12:19.599425
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
1396488228 | 2025-03-13T20:35:01.882323
HTTP/1.1 200 OK
Content-Length: 2037
Cache-Control: private, max-age=300
Content-Type: text/html
5607 /
tcp
-1399940268 | 2025-02-26T13:35:15.103949
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5660 /
tcp
1911457608 | 2025-03-17T20:16:07.132617
\x00[\x00\x00\x00\x00\x00\x00
5672 /
tcp
575925250 | 2025-03-16T15:22:32.235432
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
5680 /
tcp
-1399940268 | 2025-03-06T06:06:44.341349
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5858 /
tcp
2087396567 | 2025-02-25T04:58:34.012944
kjnkjabhbanc283ubcsbhdc72
5908 /
tcp
1308377066 | 2025-03-10T19:24:32.614803
175144872 | 2025-02-20T02:16:05.588328
HTTP/1.1 302 Moved Temporarily
Server: nginx
Content-Type: text/html
Connection: keep-alive
Location: https://222.174.85.210:5910/webclient
5912 /
tcp
632542934 | 2025-03-11T12:45:18.058811
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
5917 /
tcp
632542934 | 2025-02-22T20:51:47.921735
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
5920 /
tcp
493955023 | 2025-03-13T07:57:10.459394
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
1999272906 | 2025-03-07T17:52:46.471103
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
5986 /
tcp
1741579575 | 2025-03-17T15:30:52.170714
5989 /
tcp
1911457608 | 2025-03-06T05:24:52.916163
\x00[\x00\x00\x00\x00\x00\x00
5992 /
tcp
819727972 | 2025-03-08T15:41:56.064574
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5993 /
tcp
819727972 | 2025-03-04T20:59:38.475667
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5994 /
tcp
165188539 | 2025-02-26T14:39:00.654126
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
5996 /
tcp
-1746074029 | 2025-02-28T20:54:36.151663
6000 /
tcp
2087396567 | 2025-03-17T14:27:54.314592
kjnkjabhbanc283ubcsbhdc72
6002 /
tcp
-1681927087 | 2025-02-23T02:49:08.064926
kjnkjabhbanc283ubcsbhdc72
6021 /
tcp
-1399940268 | 2025-02-21T19:36:02.626251
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6036 /
tcp
1948301213 | 2025-02-23T04:01:48.468480
RFB 003.003
VNC:
Protocol Version: 3.3
6050 /
tcp
819727972 | 2025-02-21T02:53:01.709461
SSH-2.0-OpenSSH_7.4
Vulnerabilities
6379 /
tcp
321971019 | 2025-03-16T23:49:36.709850
-ERR client ip is not in whitelist\r
6482 /
tcp
1492413928 | 2025-03-11T08:47:37.328292
SSH-2.0-OpenSSH_7.5
Vulnerabilities
6503 /
tcp
819727972 | 2025-03-13T11:20:02.087672
SSH-2.0-OpenSSH_7.4
Vulnerabilities
6505 /
tcp
-2089734047 | 2025-02-23T20:02:36.151236
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
6512 /
tcp
1911457608 | 2025-03-14T03:15:30.737113
\x00[\x00\x00\x00\x00\x00\x00
6544 /
tcp
-2033111675 | 2025-03-10T07:07:42.804009
6556 /
tcp
1911457608 | 2025-02-27T23:32:31.960201
\x00[\x00\x00\x00\x00\x00\x00
6565 /
tcp
-367607324 | 2025-03-12T16:55:34.034953
\\x12\\x04\\x03\\x7f\xc3\xbf\xc3\xbf\xc3\xbf\n0\\x04\\x10\\x06 \\x04\\x08...\n
6581 /
tcp
921225407 | 2025-02-21T21:16:55.604825
\x00\x00\x00\x04\x00\x00\x00\x00\x00
6590 /
tcp
819727972 | 2025-03-15T18:50:33.157558
SSH-2.0-OpenSSH_7.4
Vulnerabilities
6605 /
tcp
1208318993 | 2025-02-27T13:48:47.356314
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
971933601 | 2025-03-13T16:02:31.209032
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
-1327849035 | 2025-02-28T17:20:26.584119
HTTP/1.1 200 OK
Server: Webs
X-Frame-Options: SAMEORIGIN
Content-Type: text/html
Connection: keep-alive
Keep-Alive: timeout=60, max=99
6667 /
tcp
1996932384 | 2025-03-16T06:30:08.385432
1282941221 | 2025-03-06T10:43:28.790442
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
6697 /
tcp
165188539 | 2025-02-25T17:10:14.327593
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
6755 /
tcp
1911457608 | 2025-03-01T01:48:55.622011
\x00[\x00\x00\x00\x00\x00\x00
6789 /
tcp
-1399940268 | 2025-03-13T05:10:33.139735
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7001 /
tcp
-829704895 | 2025-03-05T16:27:14.577454
1320285193 | 2025-03-14T00:30:05.045642
HTTP/1.1 404 Not Found
Server: CloudWAF
Content-Type: text/html
Connection: keep-alive
7071 /
tcp
-1810987450 | 2025-03-14T04:31:05.711146
7090 /
tcp
632542934 | 2025-03-06T10:02:46.833602
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
7171 /
tcp
-1399940268 | 2025-02-25T16:48:41.255835
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7401 /
tcp
819727972 | 2025-03-12T13:31:36.668448
SSH-2.0-OpenSSH_7.4
Vulnerabilities
7415 /
tcp
-2096652808 | 2025-03-15T11:18:10.647825
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
7434 /
tcp
2087396567 | 2025-03-15T02:26:55.813362
kjnkjabhbanc283ubcsbhdc72
7445 /
tcp
-2096652808 | 2025-03-14T06:28:32.760769
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
7500 /
tcp
819727972 | 2025-03-07T09:54:05.391668
SSH-2.0-OpenSSH_7.4
Vulnerabilities
7548 /
tcp
104385780 | 2025-03-13T19:56:11.682719
7603 /
tcp
1911457608 | 2025-03-10T19:19:15.130464
\x00[\x00\x00\x00\x00\x00\x00
7634 /
tcp
1321679546 | 2025-03-11T00:30:14.977264
7790 /
tcp
-1399940268 | 2025-03-11T18:10:49.096956
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1259524839 | 2025-03-13T10:08:50.728769
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=UTF-8
Server: Microsoft-HTTPAPI/2.0
8000 /
tcp
-1204391172 | 2025-03-16T06:06:35.392150
2103111368 | 2025-03-16T19:01:52.877308
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
1320285193 | 2025-03-10T10:50:55.062379
HTTP/1.1 404 Not Found
Server: CloudWAF
Content-Type: text/html
Connection: keep-alive
8013 /
tcp
-1888448627 | 2025-03-04T08:05:18.366920
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8025 /
tcp
-1435414831 | 2025-03-10T04:03:37.596517
8027 /
tcp
-1399940268 | 2025-03-11T00:26:39.455673
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-18839499 | 2025-03-11T13:31:06.063260
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 657cf309_gangwangtong32_18208-2853
8043 /
tcp
-2046514463 | 2025-03-16T13:14:34.049511
8044 /
tcp
-1399940268 | 2025-02-25T15:06:44.113214
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1830697416 | 2025-02-22T21:07:14.785857
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
8054 /
tcp
1189133115 | 2025-02-28T19:10:24.993778
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
8066 /
tcp
1363464823 | 2025-03-14T02:37:25.596567
8074 /
tcp
819727972 | 2025-03-15T14:58:50.606972
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8081 /
tcp
539065883 | 2025-03-12T05:46:32.707925
8085 /
tcp
-971970408 | 2025-03-15T15:29:25.825426
8087 /
tcp
819727972 | 2025-03-15T07:37:15.245504
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8089 /
tcp
171352214 | 2025-02-21T15:07:56.472304
-ERR client ip is not in whitelist
-1325461991 | 2025-03-15T15:22:58.432087
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae1c07_hwt113_18014-11905
8095 /
tcp
-1399940268 | 2025-02-26T07:42:50.030985
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8110 /
tcp
-1899074860 | 2025-03-14T20:13:20.137125
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
8116 /
tcp
1492413928 | 2025-02-28T23:08:28.888215
SSH-2.0-OpenSSH_7.5
Vulnerabilities
8126 /
tcp
819727972 | 2025-02-24T17:20:11.180595
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8138 /
tcp
1911457608 | 2025-02-25T15:28:12.145237
\x00[\x00\x00\x00\x00\x00\x00
8145 /
tcp
-375604792 | 2025-02-23T14:23:17.760585
220 Microsoft FTP Service
8158 /
tcp
-653033013 | 2025-02-19T15:17:44.111789
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
8162 /
tcp
1762042191 | 2025-03-04T22:31:18.869411
-1015019981 | 2025-03-12T11:47:15.321769
HTTP/1.1 200 OK
Content-Type: text/html
Connection: close
Server: DLNADOC/1.50 UPnP/1.0 MiniDLNA/1.1.4
EXT:
8230 /
tcp
819727972 | 2025-03-05T03:28:16.711830
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8237 /
tcp
819727972 | 2025-03-04T02:58:41.747637
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8239 /
tcp
-1399940268 | 2025-03-10T06:30:40.478338
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8241 /
tcp
1911457608 | 2025-03-06T01:23:11.642473
\x00[\x00\x00\x00\x00\x00\x00
8285 /
tcp
-345718689 | 2025-03-12T16:54:28.973324
1282941221 | 2025-03-16T21:18:26.565663
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
8317 /
tcp
-1611764932 | 2025-02-25T10:22:21.995038
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
8403 /
tcp
-2089734047 | 2025-03-18T00:17:56.241311
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8405 /
tcp
-2089734047 | 2025-03-17T20:38:10.813025
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8413 /
tcp
632542934 | 2025-02-27T22:59:36.326010
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
8418 /
tcp
-2096652808 | 2025-03-12T07:32:33.640212
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8421 /
tcp
1911457608 | 2025-02-26T07:00:07.789188
\x00[\x00\x00\x00\x00\x00\x00
8444 /
tcp
-1737707071 | 2025-03-11T08:19:23.726241
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
8449 /
tcp
-2089734047 | 2025-03-09T19:49:19.055254
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8450 /
tcp
-1733645023 | 2025-03-13T08:53:02.984024
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
8459 /
tcp
-1428621233 | 2025-03-15T04:23:17.329679
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
8484 /
tcp
-1399940268 | 2025-03-12T01:23:44.730920
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8493 /
tcp
1911457608 | 2025-02-25T17:50:07.867008
\x00[\x00\x00\x00\x00\x00\x00
1529351907 | 2025-02-26T05:24:35.393223
HTTP/1.1 407 OK
Content-Type: text/plain; charset=utf-8
Connection: keep-alive
please add white ip *.*.*.*
8533 /
tcp
-339084706 | 2025-03-04T02:18:51.501437
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
8549 /
tcp
1504401647 | 2025-03-15T23:16:22.222363
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
8554 /
tcp
1286504516 | 2025-02-28T19:26:31.563867
CP2E Control Console
Connected to Host: gZI
8573 /
tcp
819727972 | 2025-02-20T20:05:13.709024
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8576 /
tcp
1948301213 | 2025-03-16T07:22:37.428652
RFB 003.003
VNC:
Protocol Version: 3.3
8577 /
tcp
-1399940268 | 2025-03-14T17:52:10.058503
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8578 /
tcp
-1399940268 | 2025-02-26T08:28:20.472417
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8587 /
tcp
-1399940268 | 2025-03-12T17:35:50.000234
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8588 /
tcp
1911457608 | 2025-03-13T14:59:22.489258
\x00[\x00\x00\x00\x00\x00\x00
8594 /
tcp
-2089734047 | 2025-03-06T01:39:34.512084
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8599 /
tcp
-1399940268 | 2025-03-13T16:18:52.569015
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8621 /
tcp
1623746877 | 2025-03-09T18:44:01.871760
500 Permission denied - closing connection.\r\n
8622 /
tcp
921225407 | 2025-02-28T09:46:26.452007
\x00\x00\x00\x04\x00\x00\x00\x00\x00
8649 /
tcp
842535728 | 2025-03-14T22:57:11.304971
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
8686 /
tcp
639175818 | 2025-02-24T12:31:59.301829
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
8700 /
tcp
-2089734047 | 2025-02-28T11:21:22.877793
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1282941221 | 2025-03-14T21:50:39.090591
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
8708 /
tcp
722711397 | 2025-02-24T20:54:54.552078
\x00[M\xc3\xba\xc3\x9a\x7f\x00\x00
8709 /
tcp
1761482307 | 2025-03-06T16:47:54.880121
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
8728 /
tcp
1278527606 | 2025-02-24T22:39:52.399043
8743 /
tcp
321971019 | 2025-02-21T03:23:18.557811
-ERR client ip is not in whitelist\r
8767 /
tcp
-2089734047 | 2025-03-14T18:13:01.136409
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8779 /
tcp
632542934 | 2025-03-14T14:53:52.784892
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
8801 /
tcp
1308377066 | 2025-02-24T20:13:55.500377
8818 /
tcp
-2140303521 | 2025-03-06T12:22:49.282497
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
8823 /
tcp
-1148066627 | 2025-02-27T07:13:29.366180
\x00[\xc2\x84\xc2\x86\xc3\xb2\x7f\x00\x00
8829 /
tcp
-1399940268 | 2025-03-10T03:11:28.409855
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8832 /
tcp
-445721795 | 2025-02-23T04:00:43.838192
\x00[\xc3\xaed\x1a\x7f\x00\x00
8842 /
tcp
-1279886438 | 2025-03-11T17:45:31.379576
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
8844 /
tcp
-1026951088 | 2025-03-03T20:21:31.003091
8849 /
tcp
-1026951088 | 2025-02-26T23:31:15.534077
8856 /
tcp
-801484042 | 2025-03-16T19:56:36.863771
8870 /
tcp
-274082663 | 2025-03-06T12:51:51.628639
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
8873 /
tcp
-1153858743 | 2025-02-26T23:29:15.589958
8878 /
tcp
-1399940268 | 2025-02-23T23:14:43.848807
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8881 /
tcp
-1399940268 | 2025-03-14T10:54:26.960309
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8883 /
tcp
-1399940268 | 2025-03-11T05:50:16.597901
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8885 /
tcp
-1327660293 | 2025-02-24T21:11:13.087132
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
8889 /
tcp
-407828767 | 2025-03-14T00:33:49.330561
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
372433470 | 2025-03-15T16:47:55.063030
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
8991 /
tcp
1975288991 | 2025-03-11T13:10:42.631231
9000 /
tcp
1119676909 | 2025-03-06T10:54:12.211487
M\\xc4\xc5\xb1\\xfa\\xde\\xc8)W\\xad\\xaf\\xb8\\xb5\\x05\\x89\\x9f\\xa2\\x82\\xf2j7
9001 /
tcp
-1026951088 | 2025-03-06T16:40:15.325900
9006 /
tcp
819727972 | 2025-03-12T15:21:39.887130
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9016 /
tcp
-1265999252 | 2025-02-20T22:27:18.139818
220 VMware Authentication Daemon Version 1.0, ServerDaemonProto\ncol:SOAP, MKSDisplayProtocol:VNC , ,
9027 /
tcp
-1399940268 | 2025-03-05T12:28:14.504209
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9029 /
tcp
677934968 | 2025-02-27T20:24:23.728288
9030 /
tcp
819727972 | 2025-03-16T08:55:16.887380
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9035 /
tcp
632542934 | 2025-03-17T21:53:26.239414
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
9039 /
tcp
165188539 | 2025-02-23T16:46:21.179359
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9051 /
tcp
1492413928 | 2025-03-16T01:15:17.659583
SSH-2.0-OpenSSH_7.5
Vulnerabilities
9055 /
tcp
504717326 | 2025-02-19T08:48:44.528900
SSH-2.0-OpenSSH_8.6
Vulnerabilities
9062 /
tcp
165188539 | 2025-03-07T17:45:49.358978
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
-1056270173 | 2025-02-23T01:07:57.787688
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
9072 /
tcp
-1399940268 | 2025-03-12T05:22:30.787819
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9076 /
tcp
1134517380 | 2025-02-27T04:15:50.711127
welcome to Pandora console!\r\n----------------------------\n-------------------------\n| Login Time | 2021-12-08 1...\n
9081 /
tcp
1632932802 | 2025-03-16T01:41:22.593175
9082 /
tcp
819727972 | 2025-02-20T19:27:13.593414
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9086 /
tcp
-1730858130 | 2025-03-13T07:23:22.074010
RFB 003.008
VNC:
Protocol Version: 3.8
9091 /
tcp
-1900404274 | 2025-03-10T11:43:03.736319
9095 /
tcp
-1681927087 | 2025-03-16T03:49:27.578543
kjnkjabhbanc283ubcsbhdc72
728404894 | 2025-03-11T12:24:22.375018
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae1e1e_PS-000-013Ry57_4578-61483
9105 /
tcp
819727972 | 2025-03-14T07:24:00.038781
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9130 /
tcp
-1626979812 | 2025-03-14T13:35:21.076663
220 Service ready for new user.
9133 /
tcp
671605376 | 2025-03-14T23:47:53.933788
9134 /
tcp
819727972 | 2025-02-27T01:45:02.428279
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9136 /
tcp
1830187220 | 2025-03-12T00:22:39.968294
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
9143 /
tcp
-904840257 | 2025-03-16T19:15:09.809202
572 Relay not authorized\r\n
9147 /
tcp
671605376 | 2025-03-01T00:14:55.775553
9151 /
tcp
165188539 | 2025-03-05T06:15:23.225894
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9152 /
tcp
-2096652808 | 2025-03-07T05:27:16.655019
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
9154 /
tcp
-2096652808 | 2025-02-25T10:02:44.058284
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
9160 /
tcp
-1399940268 | 2025-03-05T21:09:46.115054
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9162 /
tcp
819727972 | 2025-03-16T12:28:14.874360
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9167 /
tcp
921225407 | 2025-03-05T23:35:16.799063
\x00\x00\x00\x04\x00\x00\x00\x00\x00
1282941221 | 2025-02-22T19:43:13.433802
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
9188 /
tcp
1519486042 | 2025-03-17T10:22:17.142560
<KU_goodbye>Protocol Error: XML data is not well-formed.</KU_goodbye>
9197 /
tcp
-2046514463 | 2025-03-11T14:44:56.083059
9198 /
tcp
632542934 | 2025-03-13T12:15:34.103545
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
9209 /
tcp
-1399940268 | 2025-03-09T15:13:22.607414
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9210 /
tcp
-2096652808 | 2025-03-17T00:05:32.604716
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
9211 /
tcp
-2096652808 | 2025-03-14T23:53:24.587609
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
9212 /
tcp
-2017887953 | 2025-02-26T08:11:14.504909
SSH-2.0-OpenSSH_7.9
Vulnerabilities
9217 /
tcp
-1327660293 | 2025-02-20T17:25:29.031137
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
9218 /
tcp
-1399940268 | 2025-03-14T03:32:22.448966
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9219 /
tcp
2098371729 | 2025-02-25T17:03:51.508821
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
9220 /
tcp
493955023 | 2025-03-14T21:47:12.731777
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
9247 /
tcp
-1327660293 | 2025-03-12T11:00:29.535437
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
9251 /
tcp
321971019 | 2025-03-10T04:26:29.158917
-ERR client ip is not in whitelist\r
9273 /
tcp
-1399940268 | 2025-03-11T09:39:58.683747
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9291 /
tcp
1623746877 | 2025-03-07T11:20:20.615862
500 Permission denied - closing connection.\r\n
9292 /
tcp
-1779118422 | 2025-03-03T21:42:47.866666
\x00[\xc2\xae\xc2\x8d{\x7f\x00\x00
9306 /
tcp
632542934 | 2025-03-11T18:11:46.930778
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
9313 /
tcp
-1399940268 | 2025-03-11T04:31:36.139330
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9333 /
tcp
1308377066 | 2025-03-15T23:04:08.825207
9351 /
tcp
-1399940268 | 2025-03-05T17:32:34.207470
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9398 /
tcp
-971970408 | 2025-02-19T19:02:09.343684
9410 /
tcp
1623746877 | 2025-03-17T15:17:50.993311
500 Permission denied - closing connection.\r\n
1529351907 | 2025-02-21T17:17:17.270585
HTTP/1.1 407 OK
Content-Type: text/plain; charset=utf-8
Connection: keep-alive
please add white ip *.*.*.*
9445 /
tcp
819727972 | 2025-03-14T09:08:07.469413
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9507 /
tcp
-2089734047 | 2025-02-28T16:29:42.141875
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9510 /
tcp
819727972 | 2025-02-24T21:49:04.316420
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9530 /
tcp
504717326 | 2025-03-06T22:13:16.509740
SSH-2.0-OpenSSH_8.6
Vulnerabilities
9550 /
tcp
1761482307 | 2025-02-28T13:07:28.765896
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
9600 /
tcp
-1399940268 | 2025-03-17T09:31:38.814970
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9633 /
tcp
1842524259 | 2025-03-06T17:21:35.165965
9658 /
tcp
1911457608 | 2025-03-11T00:42:07.063306
\x00[\x00\x00\x00\x00\x00\x00
9696 /
tcp
-1375131644 | 2025-02-24T22:57:20.516198
\x00[v\xc3\xbdC\x7f\x00\x00
9761 /
tcp
-1730858130 | 2025-02-25T14:10:07.820700
RFB 003.008
VNC:
Protocol Version: 3.8
9779 /
tcp
819727972 | 2025-03-16T04:25:28.614040
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9810 /
tcp
-1713437100 | 2025-02-21T05:45:44.902042
\xc3\xbf\xc3\xbb\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
9885 /
tcp
-1399940268 | 2025-02-26T17:38:09.589172
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1615676803 | 2025-03-13T00:01:19.633114
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Accept-Ranges: bytes
Etag: "s5sw6112h"
9909 /
tcp
820958131 | 2025-03-04T11:14:33.825669
kjnkjabhbanc283ubcsbhdc72\x02
9923 /
tcp
-1611764932 | 2025-03-14T19:46:50.517291
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
9928 /
tcp
-1261090339 | 2025-03-15T20:24:22.366854
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
9950 /
tcp
820958131 | 2025-02-26T09:13:19.201369
kjnkjabhbanc283ubcsbhdc72\x02
9966 /
tcp
165188539 | 2025-03-11T19:35:14.832068
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9991 /
tcp
819727972 | 2025-03-05T11:58:44.591008
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-696402907 | 2025-03-07T11:27:10.138170
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae298c_PS-HIA-01Q7y203_55153-4321
9999 /
tcp
1161309183 | 2025-03-11T02:19:49.682872
10000 /
tcp
1426971893 | 2025-02-28T14:26:26.539858
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
10001 /
tcp
1492413928 | 2025-02-27T20:04:07.054223
SSH-2.0-OpenSSH_7.5
Vulnerabilities
10013 /
tcp
599074451 | 2025-03-11T09:44:41.046159
-2107996212 | 2025-03-17T05:10:38.980962
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
10019 /
tcp
632542934 | 2025-02-21T16:19:02.448863
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
-1839934832 | 2025-03-14T06:49:32.784038
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
-2107996212 | 2025-03-14T02:32:20.169355
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
10046 /
tcp
1911457608 | 2025-03-03T17:54:45.252029
\x00[\x00\x00\x00\x00\x00\x00
10047 /
tcp
1353260875 | 2025-03-14T21:14:42.686157
\x00[g\xc2\x95N\x7f\x00\x00
10052 /
tcp
-2089734047 | 2025-02-25T08:16:19.792158
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
10066 /
tcp
-2089734047 | 2025-03-15T18:51:46.089805
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
10081 /
tcp
819727972 | 2025-03-17T07:16:55.512828
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10084 /
tcp
307999478 | 2025-03-04T19:51:28.185246
unknown command \r\nunknown command \r\n
10093 /
tcp
819727972 | 2025-03-11T12:07:53.232636
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10134 /
tcp
-1996280214 | 2025-03-14T21:42:54.975310
10180 /
tcp
698877129 | 2025-03-16T12:42:45.109393
\\x00[\'\\xc4\\xc0\\xa8X\\xfd
10200 /
tcp
921225407 | 2025-03-09T17:12:46.536510
\x00\x00\x00\x04\x00\x00\x00\x00\x00
10250 /
tcp
-971970408 | 2025-03-04T23:55:58.631570
10397 /
tcp
117101543 | 2025-02-26T09:05:29.851932
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
10398 /
tcp
117101543 | 2025-03-12T13:49:02.578664
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
10477 /
tcp
-1888448627 | 2025-03-16T15:52:56.244866
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
10909 /
tcp
-792826324 | 2025-03-13T22:39:41.683226
220 FTP server ready - login please
10911 /
tcp
1208318993 | 2025-03-16T23:46:08.161278
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
10935 /
tcp
-1399940268 | 2025-02-20T16:56:25.485860
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1230049476 | 2025-02-27T16:40:21.978806
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
11002 /
tcp
-1032713145 | 2025-02-26T12:55:00.131640
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
11065 /
tcp
819727972 | 2025-02-19T12:59:00.996557
SSH-2.0-OpenSSH_7.4
Vulnerabilities
11210 /
tcp
580340387 | 2025-03-10T18:21:04.172646
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
11288 /
tcp
2087396567 | 2025-03-14T07:24:53.323635
kjnkjabhbanc283ubcsbhdc72
11300 /
tcp
1975288991 | 2025-03-11T03:36:30.527033
11401 /
tcp
-358801646 | 2025-03-12T20:02:45.168223
1734465113 | 2025-03-10T13:45:22.257677
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1705938548.385-w-waf05cqt
12101 /
tcp
-747911285 | 2025-03-15T17:11:11.948493
12109 /
tcp
-1888448627 | 2025-02-28T12:51:12.765508
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12115 /
tcp
1996932384 | 2025-03-04T11:36:40.878905
12117 /
tcp
-1888448627 | 2025-02-27T18:25:47.816544
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12133 /
tcp
-1399940268 | 2025-02-27T19:19:54.125601
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1839934832 | 2025-02-28T06:58:38.835186
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
12142 /
tcp
-1730858130 | 2025-03-06T21:38:03.084943
RFB 003.008
VNC:
Protocol Version: 3.8
12147 /
tcp
1370263973 | 2025-02-26T00:54:33.680490
12166 /
tcp
-1399940268 | 2025-02-23T03:35:55.079904
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12172 /
tcp
-1888448627 | 2025-02-24T22:48:06.602182
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12176 /
tcp
1911457608 | 2025-02-23T04:25:32.085071
\x00[\x00\x00\x00\x00\x00\x00
12179 /
tcp
-1888448627 | 2025-02-27T17:09:08.880625
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12184 /
tcp
-445721795 | 2025-03-07T01:00:06.596494
\x00[\xc3\xaed\x1a\x7f\x00\x00
12185 /
tcp
-1538260461 | 2025-03-11T19:57:51.290655
12189 /
tcp
-1327660293 | 2025-02-22T23:34:04.360216
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
12196 /
tcp
-358801646 | 2025-02-28T22:09:14.454339
12197 /
tcp
2098371729 | 2025-03-13T23:39:48.931985
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
12200 /
tcp
50497985 | 2025-02-28T18:51:26.657835
\x00[\xc3\x88\xc3\x9dS\x7f\x00\x00
1282941221 | 2025-02-24T12:30:35.314218
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
12212 /
tcp
-1399940268 | 2025-02-26T23:25:26.631490
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12216 /
tcp
-358801646 | 2025-02-21T06:44:58.126545
12217 /
tcp
-1611764932 | 2025-03-12T14:00:10.680198
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
12225 /
tcp
1911457608 | 2025-02-26T15:14:55.427733
\x00[\x00\x00\x00\x00\x00\x00
12226 /
tcp
740837454 | 2025-03-04T06:31:14.977645
SSH-2.0-OpenSSH_5.3
Vulnerabilities
12228 /
tcp
-1713437100 | 2025-02-25T02:12:33.097736
\xc3\xbf\xc3\xbb\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
12233 /
tcp
1911457608 | 2025-02-22T18:30:18.309172
\x00[\x00\x00\x00\x00\x00\x00
12235 /
tcp
-1399940268 | 2025-02-24T05:10:38.928314
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12262 /
tcp
819727972 | 2025-03-07T17:14:43.284519
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12270 /
tcp
1767345577 | 2025-03-12T23:57:00.281247
Hello, this is Quagga (version 0T).
Copyright 1996-200
12272 /
tcp
-2089734047 | 2025-02-23T01:46:39.832593
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12278 /
tcp
-2096652808 | 2025-03-15T01:00:57.285173
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12290 /
tcp
1726594447 | 2025-02-26T13:48:24.239335
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
12292 /
tcp
-2096652808 | 2025-03-07T08:03:33.024774
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12293 /
tcp
-980525298 | 2025-03-06T20:18:18.376608
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
-1839934832 | 2025-02-22T23:40:15.838382
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
12296 /
tcp
-2096652808 | 2025-02-24T17:56:51.610099
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12297 /
tcp
677934968 | 2025-03-05T05:14:17.188201
12302 /
tcp
-136006866 | 2025-03-13T16:56:11.554299
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
12305 /
tcp
-136006866 | 2025-03-11T03:52:24.486017
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
12312 /
tcp
2121220663 | 2025-03-10T08:41:24.501808
12314 /
tcp
119860953 | 2025-02-25T20:46:20.529060
* OK ArGoSoft Mail Server IMAP Module v.YW at
12325 /
tcp
1911457608 | 2025-03-14T04:55:40.579011
\x00[\x00\x00\x00\x00\x00\x00
12328 /
tcp
-1399940268 | 2025-03-15T18:12:51.996916
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12329 /
tcp
-146605374 | 2025-03-11T13:49:24.409583
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
12333 /
tcp
-1399940268 | 2025-02-22T21:51:00.955935
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12337 /
tcp
165188539 | 2025-03-11T14:46:12.243574
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
296364507 | 2025-03-04T15:10:47.552715
HTTP/1.1 500 Internal Server Error
SERVER: Trend Chip UPnP/1.0 DMS
CONNECTION: close
CONTENT-LENGTH: 60
CONTENT-TYPE: text/html
12361 /
tcp
-358801646 | 2025-02-26T06:29:30.742961
12393 /
tcp
89142341 | 2025-03-04T01:05:19.451448
\x05\x00\x00\x00\x0b\x08\x05\x1a\x00
12413 /
tcp
-980525298 | 2025-02-27T17:59:35.314430
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12426 /
tcp
-1019343788 | 2025-02-21T01:20:39.812022
12428 /
tcp
-1399940268 | 2025-03-10T16:08:30.321408
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12430 /
tcp
-585940771 | 2025-03-15T09:43:54.710653
12444 /
tcp
-1699556818 | 2025-03-08T14:33:21.758453
\x01remshd: Kerberos Authentication not enabled.\n
12448 /
tcp
-1399940268 | 2025-03-09T09:30:54.478234
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12451 /
tcp
1615193817 | 2025-03-09T07:14:58.879703
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
12457 /
tcp
-1399940268 | 2025-03-04T05:53:52.478328
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12463 /
tcp
819727972 | 2025-03-17T01:57:49.796660
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12467 /
tcp
819727972 | 2025-02-21T01:17:17.423221
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12480 /
tcp
103159425 | 2025-02-24T16:53:46.689428
12481 /
tcp
1911457608 | 2025-02-19T23:08:20.976953
\x00[\x00\x00\x00\x00\x00\x00
12484 /
tcp
-2017887953 | 2025-03-15T13:33:52.385436
SSH-2.0-OpenSSH_7.9
Vulnerabilities
12496 /
tcp
-2096652808 | 2025-02-21T11:27:09.652867
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12498 /
tcp
-1327660293 | 2025-03-07T04:55:57.415279
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
12503 /
tcp
-1399940268 | 2025-03-08T14:12:05.920949
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12505 /
tcp
-1399940268 | 2025-02-19T04:43:22.753543
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12511 /
tcp
165188539 | 2025-02-23T16:34:30.544492
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12513 /
tcp
-1399940268 | 2025-02-25T13:30:23.641191
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12517 /
tcp
-1611764932 | 2025-03-11T07:04:54.384896
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
12519 /
tcp
1011407350 | 2025-03-11T09:22:47.316810
* OK GroupWise IMAP4rev1 Server Ready\r\n
12520 /
tcp
-653033013 | 2025-02-21T03:22:18.564414
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
12527 /
tcp
165188539 | 2025-02-24T09:27:54.640107
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12530 /
tcp
-2089734047 | 2025-02-22T05:00:03.310788
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12535 /
tcp
1308377066 | 2025-03-03T23:05:34.617402
12545 /
tcp
-2089734047 | 2025-02-26T15:17:25.687955
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12554 /
tcp
-1835475271 | 2025-03-16T21:53:58.976318
200 NOD32SS 99 (3318497116)\r\n
12558 /
tcp
1504401647 | 2025-02-19T14:42:15.841314
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
12586 /
tcp
819727972 | 2025-03-13T14:19:39.727823
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12588 /
tcp
-1733645023 | 2025-02-23T20:18:34.573315
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
12601 /
tcp
205347087 | 2025-02-23T13:56:57.943549
SSH-25453-Cisco-3524665.35\n
13000 /
tcp
-2140303521 | 2025-03-13T00:46:43.133135
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
13047 /
tcp
1189133115 | 2025-03-11T23:19:12.391453
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
13082 /
tcp
-1399940268 | 2025-03-07T02:48:29.467801
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
13228 /
tcp
-1611764932 | 2025-02-23T15:43:34.916980
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
14147 /
tcp
-1626979812 | 2025-03-09T20:58:37.433089
220 Service ready for new user.
14265 /
tcp
-2007509835 | 2025-03-04T23:57:00.226475
14330 /
tcp
1911457608 | 2025-02-20T13:09:41.688313
\x00[\x00\x00\x00\x00\x00\x00
14344 /
tcp
-375604792 | 2025-02-27T12:22:24.621571
220 Microsoft FTP Service
14400 /
tcp
-832380282 | 2025-02-26T06:42:31.473210
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).\n
14407 /
tcp
-2031152423 | 2025-03-13T23:47:05.735169
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
14903 /
tcp
-146605374 | 2025-02-27T20:40:46.472968
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
-147424911 | 2025-03-06T15:31:23.696952
HTTP/1.1 404 Not Found
Content Length: 0
15038 /
tcp
-1888448627 | 2025-03-14T18:27:04.505128
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
15040 /
tcp
669849225 | 2025-02-23T14:05:08.773226
SSH-98.60-SysaxSSH_81885..42\r\n
-1839934832 | 2025-03-10T17:48:37.370527
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
-1839934832 | 2025-03-06T12:41:57.025635
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
15673 /
tcp
-339084706 | 2025-02-23T06:23:13.907371
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
16004 /
tcp
1911457608 | 2025-02-19T22:56:09.129913
\x00[\x00\x00\x00\x00\x00\x00
16007 /
tcp
-2046514463 | 2025-02-21T21:19:39.273265
16013 /
tcp
-1399940268 | 2025-03-11T05:23:58.659446
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16015 /
tcp
-653033013 | 2025-03-08T19:38:35.675597
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
16025 /
tcp
-1399940268 | 2025-03-11T23:49:05.010012
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16031 /
tcp
-2089734047 | 2025-03-12T15:04:24.830411
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
16035 /
tcp
-441419608 | 2025-02-27T03:19:33.629205
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
16036 /
tcp
580340387 | 2025-03-17T03:30:09.601314
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
16037 /
tcp
165188539 | 2025-02-21T10:24:28.472443
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
1282941221 | 2025-03-17T20:33:11.866332
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
16052 /
tcp
1624217396 | 2025-03-15T20:03:55.776980
HELO:10.3.6.0.false\nAS:2048\nHL:19
16061 /
tcp
639175818 | 2025-03-09T07:57:59.511683
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
16064 /
tcp
1991883981 | 2025-03-17T23:07:30.643080
B\x00\x00\x00\xc3\xbfn\x04Too many connections
16069 /
tcp
1492413928 | 2025-02-22T14:26:42.520557
SSH-2.0-OpenSSH_7.5
Vulnerabilities
16075 /
tcp
597764502 | 2025-02-28T07:44:23.092779
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
16081 /
tcp
165188539 | 2025-02-27T01:34:58.915498
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
16101 /
tcp
-1399940268 | 2025-03-15T18:06:31.520893
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16403 /
tcp
-616720387 | 2025-03-15T16:00:43.832890
16831 /
tcp
-1399940268 | 2025-03-16T13:56:19.598226
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16993 /
tcp
-2033111675 | 2025-03-13T15:09:06.590960
17102 /
tcp
-1327660293 | 2025-03-15T13:18:05.944074
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
17774 /
tcp
597764502 | 2025-02-25T11:33:35.718271
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
17775 /
tcp
921225407 | 2025-03-10T19:46:16.087892
\x00\x00\x00\x04\x00\x00\x00\x00\x00
2103111368 | 2025-03-08T17:12:36.683404
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
18011 /
tcp
165188539 | 2025-03-14T03:00:12.405794
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
18012 /
tcp
-1399940268 | 2025-03-14T05:23:10.375628
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18018 /
tcp
819727972 | 2025-03-12T22:49:53.411297
SSH-2.0-OpenSSH_7.4
Vulnerabilities
18033 /
tcp
1308377066 | 2025-02-20T01:04:47.398376
-1839934832 | 2025-03-16T13:51:43.461704
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
18063 /
tcp
1543809371 | 2025-02-25T15:29:06.797866
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
18080 /
tcp
2087396567 | 2025-03-17T16:41:22.489169
kjnkjabhbanc283ubcsbhdc72
18081 /
tcp
2087396567 | 2025-03-17T07:19:55.405699
kjnkjabhbanc283ubcsbhdc72
18088 /
tcp
-1399940268 | 2025-03-05T02:32:11.955755
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18096 /
tcp
819727972 | 2025-03-11T16:39:13.931451
SSH-2.0-OpenSSH_7.4
Vulnerabilities
18108 /
tcp
-2089734047 | 2025-03-09T06:03:45.165847
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
18110 /
tcp
-407828767 | 2025-02-22T09:09:09.940381
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
18111 /
tcp
-1730858130 | 2025-02-28T06:49:29.116372
RFB 003.008
VNC:
Protocol Version: 3.8
18239 /
tcp
-805362002 | 2025-02-24T04:08:58.771784
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
18245 /
tcp
-1399940268 | 2025-03-14T02:03:52.966027
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18553 /
tcp
1975288991 | 2025-03-14T12:35:03.275813
19000 /
tcp
819727972 | 2025-03-05T00:10:57.618721
SSH-2.0-OpenSSH_7.4
Vulnerabilities
19233 /
tcp
1504401647 | 2025-03-17T02:40:09.730894
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
-1839934832 | 2025-03-17T21:18:04.762983
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
19930 /
tcp
819727972 | 2025-03-14T11:12:08.872723
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1900503736 | 2025-03-05T16:05:27.615082
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-HTTPAPI/2.0
20070 /
tcp
-1810987450 | 2025-02-20T19:47:37.107470
20200 /
tcp
1911457608 | 2025-03-13T05:52:15.290385
\x00[\x00\x00\x00\x00\x00\x00
20202 /
tcp
1126993057 | 2025-02-25T23:28:11.910826
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
20256 /
tcp
819727972 | 2025-03-17T01:17:29.089300
SSH-2.0-OpenSSH_7.4
Vulnerabilities
20547 /
tcp
-1399940268 | 2025-03-07T00:33:42.315715
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
20880 /
tcp
1370263973 | 2025-02-27T22:22:28.561287
21082 /
tcp
321971019 | 2025-02-23T04:58:25.052958
-ERR client ip is not in whitelist\r
21084 /
tcp
1911457608 | 2025-02-25T21:24:21.186869
\x00[\x00\x00\x00\x00\x00\x00
21100 /
tcp
-2089734047 | 2025-02-19T23:16:04.675031
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-1839934832 | 2025-02-24T03:53:32.445579
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
21240 /
tcp
-1399940268 | 2025-03-08T12:58:54.209851
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21252 /
tcp
819727972 | 2025-03-15T09:31:52.116363
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21254 /
tcp
401555314 | 2025-03-16T01:07:39.164381
21261 /
tcp
819727972 | 2025-02-20T12:10:25.523083
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21268 /
tcp
-1399940268 | 2025-03-13T04:08:26.528990
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21269 /
tcp
-1538260461 | 2025-02-27T06:25:06.546885
21275 /
tcp
-1327660293 | 2025-03-12T16:30:24.101137
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
21288 /
tcp
-358801646 | 2025-03-09T15:37:01.172047
21302 /
tcp
1911457608 | 2025-03-11T04:33:53.337574
\x00[\x00\x00\x00\x00\x00\x00
21312 /
tcp
1492413928 | 2025-02-22T01:16:22.147881
SSH-2.0-OpenSSH_7.5
Vulnerabilities
21322 /
tcp
-1713437100 | 2025-03-05T18:52:56.928072
\xc3\xbf\xc3\xbb\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
21329 /
tcp
740837454 | 2025-02-24T12:05:40.394166
SSH-2.0-OpenSSH_5.3
Vulnerabilities
21379 /
tcp
1911457608 | 2025-03-12T14:17:34.801435
\x00[\x00\x00\x00\x00\x00\x00
21381 /
tcp
-2089734047 | 2025-03-17T09:31:28.306024
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
22556 /
tcp
597764502 | 2025-03-15T11:00:10.966478
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
22703 /
tcp
1911457608 | 2025-03-15T14:10:37.367401
\x00[\x00\x00\x00\x00\x00\x00
23128 /
tcp
-1996280214 | 2025-03-12T19:25:41.095102
24245 /
tcp
-971970408 | 2025-03-14T14:17:13.698993
25001 /
tcp
-1327660293 | 2025-03-12T22:03:15.935150
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
25008 /
tcp
408230060 | 2025-03-04T01:32:59.586583
\r\nSorry, that nickname format is invalid.\r\n
25009 /
tcp
-1399940268 | 2025-02-25T07:52:53.615976
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
25082 /
tcp
1620329124 | 2025-03-14T10:04:06.174667
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
26657 /
tcp
539065883 | 2025-03-12T03:03:53.231360
27015 /
tcp
663345494 | 2025-03-14T22:28:25.370227
Command: None
Size: 759714643
ID: 758132274
Type: 1145590611
27017 /
tcp
1763259671 | 2025-02-25T07:52:12.175537
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
28001 /
tcp
1189133115 | 2025-03-06T21:31:00.751255
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
28015 /
tcp
-1399940268 | 2025-02-23T10:22:04.630848
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
30000 /
tcp
-1426182427 | 2025-03-06T03:48:01.799622
\\x00[\\x00\\x00\\x00\\x00\\x00\\x00
30002 /
tcp
-358801646 | 2025-03-16T21:22:07.019112
30017 /
tcp
1911457608 | 2025-03-13T14:51:37.817772
\x00[\x00\x00\x00\x00\x00\x00
30022 /
tcp
1308377066 | 2025-03-14T23:11:00.878186
30112 /
tcp
921225407 | 2025-02-24T05:54:09.810340
\x00\x00\x00\x04\x00\x00\x00\x00\x00
30113 /
tcp
-1399940268 | 2025-02-21T12:31:28.301909
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
30121 /
tcp
-1032713145 | 2025-02-20T05:01:06.681967
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
-1839934832 | 2025-03-11T05:19:58.344429
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
30222 /
tcp
290819026 | 2025-03-09T07:55:59.100668
welcome to Pandora console!
----------------------------
-------------------------
| Login Time | 2021-12-08 1...
30301 /
tcp
-905685638 | 2025-03-15T22:04:22.647601
30322 /
tcp
2087396567 | 2025-03-09T04:31:57.791158
kjnkjabhbanc283ubcsbhdc72
30422 /
tcp
-971970408 | 2025-03-13T12:07:33.285035
30479 /
tcp
-2096652808 | 2025-03-10T22:10:38.236275
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
30522 /
tcp
1261582754 | 2025-03-12T14:52:39.909865
unknown command
unknown command
2103111368 | 2025-03-08T12:34:58.345249
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
30722 /
tcp
233634112 | 2025-03-13T15:27:44.687865
SSH-98.60-SysaxSSH_81885..42
30922 /
tcp
-1713437100 | 2025-03-12T09:37:47.848597
\xc3\xbf\xc3\xbb\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
31122 /
tcp
366084633 | 2025-03-09T12:57:47.898420
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
31222 /
tcp
1991883981 | 2025-03-13T05:34:49.690493
B\x00\x00\x00\xc3\xbfn\x04Too many connections
31322 /
tcp
1690634669 | 2025-03-09T16:39:43.599710
31443 /
tcp
-653033013 | 2025-03-12T18:28:06.006420
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
31622 /
tcp
-971970408 | 2025-03-12T23:34:04.152046
31722 /
tcp
1741579575 | 2025-03-12T21:53:21.801851
31822 /
tcp
-971970408 | 2025-03-12T07:56:02.293473
32080 /
tcp
-1399940268 | 2025-03-05T16:26:43.813823
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
32322 /
tcp
897328069 | 2025-03-09T18:03:21.443674
220 mail.scott000.com ESMTP
32422 /
tcp
2087396567 | 2025-03-09T14:49:28.503176
kjnkjabhbanc283ubcsbhdc72
32444 /
tcp
819727972 | 2025-03-15T23:39:30.487956
SSH-2.0-OpenSSH_7.4
Vulnerabilities
32622 /
tcp
2087396567 | 2025-03-11T19:53:01.552017
kjnkjabhbanc283ubcsbhdc72
32722 /
tcp
-2096652808 | 2025-03-11T16:42:57.546182
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
32746 /
tcp
-2096652808 | 2025-03-12T13:48:27.637779
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
32764 /
tcp
-1316398834 | 2025-02-26T02:12:23.364336
33022 /
tcp
1286504516 | 2025-02-27T19:37:13.495454
CP2E Control Console
Connected to Host: gZI
33060 /
tcp
-1760806421 | 2025-03-16T05:22:34.869454
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected
33122 /
tcp
842535728 | 2025-03-04T14:44:10.115696
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
33222 /
tcp
-319440554 | 2025-03-09T19:47:41.930415
33322 /
tcp
-1477838366 | 2025-02-23T17:53:33.727927
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
-2107996212 | 2025-02-25T17:29:20.489852
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
33422 /
tcp
1741579575 | 2025-03-09T09:35:02.078088
33522 /
tcp
819727972 | 2025-02-26T15:59:15.174534
SSH-2.0-OpenSSH_7.4
Vulnerabilities
33622 /
tcp
-971970408 | 2025-03-08T20:14:49.132295
33722 /
tcp
2087396567 | 2025-03-08T18:57:52.281852
kjnkjabhbanc283ubcsbhdc72
33822 /
tcp
808560482 | 2025-03-08T13:09:43.178316
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP
: USERID : UNIX : Cr8
33922 /
tcp
-971970408 | 2025-03-08T11:27:35.621560
34422 /
tcp
-222277909 | 2025-02-28T05:28:52.095202
34622 /
tcp
707919486 | 2025-03-04T19:35:16.530067
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
34822 /
tcp
1842524259 | 2025-03-03T22:34:57.906543
35022 /
tcp
2087396567 | 2025-03-04T02:21:43.908373
kjnkjabhbanc283ubcsbhdc72
35122 /
tcp
1741579575 | 2025-03-04T09:33:09.597264
35322 /
tcp
-1375131644 | 2025-03-04T05:50:22.123126
\x00[v\xc3\xbdC\x7f\x00\x00
35422 /
tcp
171352214 | 2025-02-28T08:40:36.026991
-ERR client ip is not in whitelist
35522 /
tcp
539065883 | 2025-03-17T01:30:12.228559
35554 /
tcp
819727972 | 2025-03-10T09:42:08.376885
SSH-2.0-OpenSSH_7.4
Vulnerabilities
35722 /
tcp
1690634669 | 2025-03-17T11:36:54.516926
35922 /
tcp
2087396567 | 2025-03-16T21:50:03.293838
kjnkjabhbanc283ubcsbhdc72
36022 /
tcp
1308377066 | 2025-03-17T22:14:04.537623
36122 /
tcp
-358801646 | 2025-03-13T10:33:35.312817
36522 /
tcp
-1641514916 | 2025-02-28T21:11:18.862914
* OK Merak 1dFUa2 IMAP4rev1
37022 /
tcp
2087396567 | 2025-03-16T20:32:37.757102
kjnkjabhbanc283ubcsbhdc72
37122 /
tcp
1741579575 | 2025-03-17T00:12:28.113777
37322 /
tcp
1690634669 | 2025-03-16T12:11:27.986323
37422 /
tcp
-1729629024 | 2025-03-15T12:32:00.511032
37522 /
tcp
2087396567 | 2025-03-16T10:18:07.408820
kjnkjabhbanc283ubcsbhdc72
37622 /
tcp
2087396567 | 2025-03-16T02:28:10.357174
kjnkjabhbanc283ubcsbhdc72
37722 /
tcp
2087396567 | 2025-03-16T00:44:22.753389
kjnkjabhbanc283ubcsbhdc72
37777 /
tcp
165188539 | 2025-03-14T15:56:30.674299
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
37822 /
tcp
1690634669 | 2025-03-14T02:05:21.072991
37922 /
tcp
-1375131644 | 2025-03-18T01:03:56.071460
\x00[v\xc3\xbdC\x7f\x00\x00
38022 /
tcp
2087396567 | 2025-03-17T23:18:41.863963
kjnkjabhbanc283ubcsbhdc72
38122 /
tcp
1161309183 | 2025-03-15T17:50:51.545693
38222 /
tcp
-1036370807 | 2025-03-11T18:24:28.340915
38322 /
tcp
1353260875 | 2025-03-15T14:08:25.253838
\x00[g\xc2\x95N\x7f\x00\x00
38520 /
tcp
-1810987450 | 2025-03-10T18:22:05.994736
38722 /
tcp
2087396567 | 2025-03-13T22:55:56.001129
kjnkjabhbanc283ubcsbhdc72
38822 /
tcp
171352214 | 2025-03-12T16:32:20.915082
-ERR client ip is not in whitelist
114471724 | 2025-02-22T17:35:36.066334
HTTP/1.1 302
X-Frame-Options: SAMEORIGIN
Server: NSX
1282941221 | 2025-03-13T21:02:24.853987
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
39122 /
tcp
-971970408 | 2025-03-13T19:35:58.732919
39222 /
tcp
2087396567 | 2025-03-13T17:43:45.784176
kjnkjabhbanc283ubcsbhdc72
39322 /
tcp
1741579575 | 2025-03-11T11:43:47.588018
39422 /
tcp
-971970408 | 2025-02-20T18:34:50.208585
39522 /
tcp
-1760806421 | 2025-03-11T09:44:27.184024
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected
39922 /
tcp
1082732927 | 2025-02-26T17:57:32.381387
STAT pid 1660
STAT uptime 28884
STAT time 1641290377
STAT version 1.2.1
STAT pointer_size 32
STAT curr_items 14
STAT total_items 3533
STAT bytes 30524
STAT curr_connections 1
STAT total_connections 3542
STAT connection_structures 3
STAT cmd_get 3533
STAT cmd_set 3533
STAT get_hits 3519
STAT get_misses 14
STAT bytes_read 7927780
STAT bytes_written 7848552
STAT limit_maxbytes 67108864
END
40022 /
tcp
2087396567 | 2025-03-09T11:14:59.552216
kjnkjabhbanc283ubcsbhdc72
40222 /
tcp
-971970408 | 2025-03-04T11:08:52.021207
40322 /
tcp
1741579575 | 2025-03-08T21:58:54.589933
40722 /
tcp
-971970408 | 2025-03-08T14:51:31.561114
40892 /
tcp
632542934 | 2025-03-06T02:59:43.499467
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
41222 /
tcp
539065883 | 2025-03-05T01:17:55.694258
41443 /
tcp
-971970408 | 2025-03-14T05:44:04.160711
41522 /
tcp
1975288991 | 2025-03-04T21:59:38.515933
41800 /
tcp
-2096652808 | 2025-03-10T19:41:09.509977
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
41822 /
tcp
2087396567 | 2025-03-07T18:12:25.700444
kjnkjabhbanc283ubcsbhdc72
41922 /
tcp
1332894250 | 2025-03-07T16:31:01.299964
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
42122 /
tcp
2087396567 | 2025-03-05T03:01:32.779397
kjnkjabhbanc283ubcsbhdc72
42222 /
tcp
-375604792 | 2025-03-04T23:29:59.578714
220 Microsoft FTP Service
42422 /
tcp
2087396567 | 2025-03-04T19:59:03.035965
kjnkjabhbanc283ubcsbhdc72
43009 /
tcp
2063598737 | 2025-03-08T12:59:50.659150
43200 /
tcp
-1399940268 | 2025-02-25T16:16:24.689278
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
43322 /
tcp
-407828767 | 2025-02-27T22:12:39.933348
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
43422 /
tcp
-1641514916 | 2025-02-27T21:23:02.820777
* OK Merak 1dFUa2 IMAP4rev1
43522 /
tcp
-971970408 | 2025-02-27T18:44:55.411206
43622 /
tcp
-1611764932 | 2025-02-27T00:33:46.814242
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
43722 /
tcp
671605376 | 2025-02-27T04:00:48.702768
43822 /
tcp
660175493 | 2025-02-23T06:08:29.885297
43922 /
tcp
2033888749 | 2025-02-27T10:11:54.226266
Content-Type: text/rude-rejection
Content-Length: 24
Access Denied, go away.
Content-Type: text/disconnect-notice
C...
44022 /
tcp
1761482307 | 2025-02-27T08:37:26.901864
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
-1839934832 | 2025-02-23T09:59:35.100538
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
44122 /
tcp
-319440554 | 2025-02-26T22:53:24.917596
44222 /
tcp
-971970408 | 2025-03-10T23:03:57.334286
1830697416 | 2025-02-24T17:46:56.144327
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
44322 /
tcp
1690634669 | 2025-02-26T11:18:53.888992
44333 /
tcp
-1399940268 | 2025-03-14T10:28:43.761253
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
44365 /
tcp
-1032713145 | 2025-02-26T22:39:28.312041
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
44422 /
tcp
-1611764932 | 2025-02-26T09:26:14.811047
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
44500 /
tcp
-2096652808 | 2025-03-15T01:41:38.212124
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
44622 /
tcp
1690634669 | 2025-02-23T04:00:55.292915
44722 /
tcp
819727972 | 2025-02-26T05:43:30.866349
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1282941221 | 2025-03-09T19:19:18.395938
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
44922 /
tcp
103159425 | 2025-02-26T04:02:17.176136
45122 /
tcp
2087396567 | 2025-02-25T13:13:55.737504
kjnkjabhbanc283ubcsbhdc72
45222 /
tcp
-971970408 | 2025-02-25T19:44:35.426722
45322 /
tcp
-1730858130 | 2025-02-25T18:10:37.218556
RFB 003.008
VNC:
Protocol Version: 3.8
45522 /
tcp
1308377066 | 2025-02-25T16:34:00.504224
45622 /
tcp
1208318993 | 2025-02-25T15:10:03.123806
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
45677 /
tcp
-1888448627 | 2025-02-28T21:44:03.455838
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
45786 /
tcp
-1399940268 | 2025-03-05T15:17:01.645490
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
45788 /
tcp
-2089734047 | 2025-03-04T18:14:13.114274
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
45822 /
tcp
-2096652808 | 2025-03-10T13:50:11.305381
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
45922 /
tcp
1632932802 | 2025-03-10T14:42:23.403025
46001 /
tcp
-792826324 | 2025-03-11T13:40:30.989458
220 FTP server ready - login please
46022 /
tcp
671605376 | 2025-02-25T08:01:53.727486
46122 /
tcp
2087396567 | 2025-02-25T06:45:49.118805
kjnkjabhbanc283ubcsbhdc72
46522 /
tcp
2087396567 | 2025-02-24T06:06:51.112599
kjnkjabhbanc283ubcsbhdc72
46622 /
tcp
546151771 | 2025-02-24T04:54:19.963924
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
-1230049476 | 2025-02-24T00:51:40.622308
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
47080 /
tcp
-2089734047 | 2025-02-24T13:54:04.840723
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
47122 /
tcp
1948301213 | 2025-02-24T00:46:22.825309
RFB 003.003
VNC:
Protocol Version: 3.3
47322 /
tcp
-358801646 | 2025-02-25T04:33:50.694676
47422 /
tcp
-971970408 | 2025-02-25T01:07:27.164343
47522 /
tcp
1996932384 | 2025-02-25T10:30:51.235975
47622 /
tcp
-971970408 | 2025-02-25T02:54:30.790391
47822 /
tcp
-345718689 | 2025-03-10T10:34:33.193711
1282941221 | 2025-03-10T07:47:42.926265
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
47990 /
tcp
-971970408 | 2025-03-03T23:41:03.207501
48001 /
tcp
-2089734047 | 2025-03-12T22:56:59.766975
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
48019 /
tcp
1948301213 | 2025-03-14T20:24:11.071973
RFB 003.003
VNC:
Protocol Version: 3.3
48022 /
tcp
-1373613804 | 2025-03-07T11:23:53.983049
00970795:d7:smethod,6:shello,8:soptions,80:d10:shttp_port,368696:i1082,5:sname,5:sL_x,10:ssync_port,5:i00469,10:stimestamp,3190459:f920.7251553166,8:sversion,6262522:sl4X,
48322 /
tcp
-2081419599 | 2025-03-10T02:37:09.725753
48522 /
tcp
-1648456501 | 2025-03-10T01:17:24.817355
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
48622 /
tcp
1212921144 | 2025-02-24T20:30:13.144817
48822 /
tcp
-1032713145 | 2025-02-24T18:07:34.418897
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
48922 /
tcp
2087396567 | 2025-02-24T14:38:14.230799
kjnkjabhbanc283ubcsbhdc72
49122 /
tcp
-971970408 | 2025-02-21T06:46:19.079981
49222 /
tcp
-375604792 | 2025-02-23T00:31:27.520031
220 Microsoft FTP Service
49322 /
tcp
-314039103 | 2025-02-20T22:03:47.901559
Surnom.
Sorry, that nickname format is invalid.
49422 /
tcp
842535728 | 2025-02-23T02:17:51.099156
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
49443 /
tcp
1911457608 | 2025-02-21T03:55:49.903021
\x00[\x00\x00\x00\x00\x00\x00
49622 /
tcp
2087396567 | 2025-02-22T13:39:15.224037
kjnkjabhbanc283ubcsbhdc72
49692 /
tcp
1911457608 | 2025-02-27T08:58:52.429960
\x00[\x00\x00\x00\x00\x00\x00
49767 /
tcp
819727972 | 2025-03-09T22:52:21.982433
SSH-2.0-OpenSSH_7.4
Vulnerabilities
49822 /
tcp
2087396567 | 2025-02-22T21:16:18.914315
kjnkjabhbanc283ubcsbhdc72
-2107996212 | 2025-02-22T19:17:06.546726
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
50000 /
tcp
1996932384 | 2025-03-15T12:54:53.664504
50002 /
tcp
-653033013 | 2025-03-14T15:46:43.577782
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
50010 /
tcp
1911457608 | 2025-03-17T21:58:25.460116
\x00[\x00\x00\x00\x00\x00\x00
50022 /
tcp
819727972 | 2025-02-28T10:15:42.975137
SSH-2.0-OpenSSH_7.4
Vulnerabilities
50050 /
tcp
-1626979812 | 2025-03-16T13:33:16.228787
220 Service ready for new user.
50085 /
tcp
-445721795 | 2025-03-10T19:50:02.267400
\x00[\xc3\xaed\x1a\x7f\x00\x00
1396488228 | 2025-02-26T13:21:35.387762
HTTP/1.1 200 OK
Content-Length: 2037
Cache-Control: private, max-age=300
Content-Type: text/html
50106 /
tcp
1189133115 | 2025-03-16T12:16:24.163030
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
50222 /
tcp
401555314 | 2025-02-22T07:49:37.012754
50257 /
tcp
-1399940268 | 2025-03-12T04:11:40.693119
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50622 /
tcp
842535728 | 2025-02-21T20:12:28.076164
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
50822 /
tcp
1370263973 | 2025-02-20T20:30:24.195859
50922 /
tcp
-1529979118 | 2025-02-21T16:42:10.343458
51002 /
tcp
-1327660293 | 2025-03-07T12:42:31.201060
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
51222 /
tcp
1690634669 | 2025-02-21T13:17:10.531660
51235 /
tcp
-1399940268 | 2025-03-04T22:14:43.120823
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
51322 /
tcp
-971970408 | 2025-02-21T11:38:31.722738
51443 /
tcp
-1261090339 | 2025-03-12T01:05:42.868894
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
51622 /
tcp
660175493 | 2025-02-21T03:19:07.102459
51822 /
tcp
2087396567 | 2025-02-20T16:49:52.620014
kjnkjabhbanc283ubcsbhdc72
51922 /
tcp
1308377066 | 2025-02-20T09:56:03.443342
52022 /
tcp
1632932802 | 2025-03-07T01:10:19.220045
52200 /
tcp
-1399940268 | 2025-02-28T18:30:03.731867
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
52536 /
tcp
-2096652808 | 2025-03-11T05:06:45.702357
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
52622 /
tcp
1741579575 | 2025-02-20T01:27:10.998830
52822 /
tcp
-1455684014 | 2025-02-19T23:21:37.683180
\xff\xfb\x01\xff\xfb\x03\xff\xfc'\xff\xfe\x01\xff\xfd\x03\xff\xfe"\xff\xfd'\xff\xfd\x18\xff\xfe\x1fUsername: GET / HTTP/1.1
Password:
welcome
>Accept: */*
>
>
52881 /
tcp
-585940771 | 2025-03-13T13:53:16.628281
53022 /
tcp
2087396567 | 2025-03-07T09:32:41.872910
kjnkjabhbanc283ubcsbhdc72
53322 /
tcp
-154107716 | 2025-02-19T16:15:03.215358
220 Microsoft FTP Service
530 User cannot log in.
214-The following commands are recognized (* ==>'s unimplemented).
ABOR
ACCT
ADAT *
ALLO
APPE
AUTH
CCC
CDUP
CWD
DELE
ENC *
EPRT
EPSV
FEAT
HELP
HOST
LANG
LIST ...
53483 /
tcp
-1399940268 | 2025-02-28T12:18:19.248217
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
53522 /
tcp
-445721795 | 2025-02-19T14:52:32.605330
\x00[\xc3\xaed\x1a\x7f\x00\x00
54138 /
tcp
401555314 | 2025-03-14T10:18:50.061736
54922 /
tcp
-1900404274 | 2025-03-07T09:40:17.932645
55000 /
tcp
-345718689 | 2025-03-17T04:30:32.273225
55022 /
tcp
-971970408 | 2025-03-07T04:30:32.347864
55055 /
tcp
-1947777893 | 2025-03-06T20:58:44.589709
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
55200 /
tcp
-1399940268 | 2025-02-19T22:44:29.309792
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
55443 /
tcp
539065883 | 2025-02-19T23:15:20.922824
55522 /
tcp
-358801646 | 2025-03-06T23:26:23.065357
55553 /
tcp
2033888749 | 2025-02-27T17:54:47.231116
Content-Type: text/rude-rejection
Content-Length: 24
Access Denied, go away.
Content-Type: text/disconnect-notice
C...
55554 /
tcp
-1316398834 | 2025-03-14T00:51:07.216698
55722 /
tcp
740837454 | 2025-03-06T19:56:53.291437
SSH-2.0-OpenSSH_5.3
Vulnerabilities
57022 /
tcp
1741579575 | 2025-03-06T15:28:43.855323
57522 /
tcp
-1559123399 | 2025-03-06T13:12:03.452127
500 Permission denied - closing connection.
57622 /
tcp
-2096652808 | 2025-03-06T12:01:49.383007
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
57722 /
tcp
-971970408 | 2025-03-06T08:22:02.084148
57786 /
tcp
-1428621233 | 2025-02-22T18:20:01.932113
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
57922 /
tcp
1996932384 | 2025-03-06T05:46:23.876506
58222 /
tcp
-79865617 | 2025-03-06T01:46:14.675129
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com
mit-revprops depth log-revprops partial-replay ) ) )
58322 /
tcp
1741579575 | 2025-03-05T23:56:11.318742
58378 /
tcp
819727972 | 2025-02-22T19:17:19.550095
SSH-2.0-OpenSSH_7.4
Vulnerabilities
58422 /
tcp
-441419608 | 2025-03-05T22:00:45.044958
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
58522 /
tcp
-1036370807 | 2025-03-05T20:28:57.374752
58822 /
tcp
2087396567 | 2025-03-05T16:55:11.267990
kjnkjabhbanc283ubcsbhdc72
58922 /
tcp
1842524259 | 2025-03-05T15:08:36.753467
59022 /
tcp
1984588611 | 2025-03-05T13:26:00.118699
59122 /
tcp
-1598265216 | 2025-03-05T11:41:56.658841
59222 /
tcp
-445721795 | 2025-03-05T09:58:34.777002
\x00[\xc3\xaed\x1a\x7f\x00\x00
59322 /
tcp
1690634669 | 2025-03-05T08:19:34.896384
59522 /
tcp
1741579575 | 2025-03-03T19:34:00.070126
60001 /
tcp
1636811864 | 2025-03-15T04:12:40.908087
60021 /
tcp
-792826324 | 2025-02-25T21:44:30.383645
220 FTP server ready - login please
60129 /
tcp
1741579575 | 2025-03-13T22:50:59.244738
61613 /
tcp
632542934 | 2025-03-17T09:24:32.115948
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
61616 /
tcp
-971970408 | 2025-02-22T14:27:05.719055
62078 /
tcp
-154616015 | 2025-03-11T00:41:38.149665
=\x01À\x06ÿÿ?"<ZDECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x01\x01
63210 /
tcp
-1392039491 | 2025-03-14T23:30:27.368783
"Broadband Router"
<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
63256 /
tcp
-1681927087 | 2025-03-15T15:11:28.162507
kjnkjabhbanc283ubcsbhdc72
63260 /
tcp
1208318993 | 2025-03-11T21:35:21.613616
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
63443 /
tcp
819727972 | 2025-03-09T22:28:19.048412
SSH-2.0-OpenSSH_7.4
Vulnerabilities
64295 /
tcp
-457235091 | 2025-02-23T07:47:15.492771
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
64738 /
tcp
819727972 | 2025-03-15T06:18:24.929472
SSH-2.0-OpenSSH_7.4
Vulnerabilities
65004 /
tcp
1543809371 | 2025-03-11T10:06:48.467398
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])