11 /
tcp
1960438949 | 2025-03-18T16:13:35.193146
Siemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready
ÿûÿûÿýÿþUsername:
15 /
tcp
-345718689 | 2025-03-16T21:01:00.970760
17 /
tcp
-1296032851 | 2025-02-27T05:39:20.707141
\x01=\x01À\x06ÿÿ?"<ZDECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x01\x01
19 /
tcp
829384519 | 2025-03-24T23:55:43.489018
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefg
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUV
25 /
tcp
-1795027372 | 2025-02-27T12:30:07.438323
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
26 /
tcp
-1139539254 | 2025-03-12T23:18:46.718109
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
49 /
tcp
-801484042 | 2025-03-24T12:53:19.323138
-1056270173 | 2025-03-16T17:28:33.969886
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
-2029556872 | 2025-03-16T04:29:48.288839
HTTP/1.1 200 OK
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
Content-Type: text/html
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Connection: Keep-Alive
Accept-Ranges: bytes
-1584607988 | 2025-02-28T07:06:04.418516
HTTP/1.1 403 Forbidden
Server: AliyunOSS
Date: Fri, 28 Feb 2025 07:06:04 GMT
Content-Type: application/xml
Content-Length: 346
Connection: keep-alive
x-oss-request-id: 67C1605CC0E5F830341E6E71
x-oss-server-time: 1
x-oss-ec: 0003-00001201
102 /
tcp
921225407 | 2025-03-18T22:53:31.436974
\x00\x00\x00\x04\x00\x00\x00\x00\x00
104 /
tcp
819727972 | 2025-03-24T03:23:31.459007
SSH-2.0-OpenSSH_7.4
Vulnerabilities
110 /
tcp
-1099385124 | 2025-03-25T18:31:17.207285
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
111 /
tcp
1187188851 | 2025-03-05T21:35:53.152996
Portmap
Program Version Protocol Port
113 /
tcp
1921398876 | 2025-03-16T05:13:02.481450
ÿý"
LinuxNode v06953 (ggfks)
login:
143 /
tcp
-398621179 | 2025-03-22T16:46:51.656119
* OK everfull.com.cn IMAP4rev1 MDaemon 12.5.6 ready\r\n
175 /
tcp
-1888448627 | 2025-03-10T06:21:43.316725
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
179 /
tcp
-399606100 | 2025-03-11T08:50:06.564674
BGP Message\nType: 3\nMajor error Code: 6\nMinor error Code: 5\n
195 /
tcp
-79865617 | 2025-03-26T06:54:39.565642
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com
mit-revprops depth log-revprops partial-replay ) ) )
211 /
tcp
367914955 | 2025-03-15T07:44:55.671633
MudNames 77 - (C) 1997-2001 Ragnar Hojland Espinosa <ragnar@ragnar-hojland.com>\n\r
221 /
tcp
1911457608 | 2025-03-18T10:18:43.141140
\x00[\x00\x00\x00\x00\x00\x00
264 /
tcp
-1022036431 | 2025-03-21T09:59:27.778826
CheckPoint\nFirewall Host: CN05FWINT01\nSmartCenter Host: fw-go-mgmt-01..x6vcm5\\x00\n
385 /
tcp
1723769361 | 2025-03-23T21:01:04.446986
ELM Enterprise Manager _l\r\nCopyright \xc2\xa9 18668511-928641920 TNT Software, Inc.\r\n
427 /
tcp
1327409218 | 2025-03-12T03:35:17.491554
SAAdvert Response:\nVersion: 2\nFunction: SA Advertisement (11)\nURL: service:service-agent://localhost.localdomain\nScopeList: default\nAttrributeList: \n\n\nserviceTypes:\nservice:VMwareInfrastructure\n\nResponse of service:VMwareInfrastructure SrvReq:\nVersion: 2\nFunction: Service Reply (2)\nErrorCode: SUCCESS (0)\nURL Entries:\n Lifetime: 65535\n URL: service:VMwareInfrastructure://localhost.localdomain\n\n\nResponse of service:VMwareInfrastructure AttrRqst:\nVersion: 2\nFunction: Attribute Reply (7)\nErrorCode: SUCCESS (0
611502824 | 2025-03-17T00:44:19.299206
HTTP/1.1 403 Forbidden
Server: AliyunOSS
Date: Mon, 17 Mar 2025 00:44:19 GMT
Content-Type: application/xml
Content-Length: 346
Connection: keep-alive
x-oss-request-id: 67D77063393D1B393836C432
x-oss-server-time: 0
x-oss-ec: 0003-00001201
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0b:b9:08:d2:36:80:eb:91:c2:da:92:f2
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=BE, O=GlobalSign nv-sa, CN=GlobalSign GCC R3 OV TLS CA 2024
Validity
Not Before: Jan 13 06:51:20 2025 GMT
Not After : Feb 14 06:51:19 2026 GMT
Subject: C=CN, ST=ZheJiang, L=HangZhou, O=Alibaba (China) Technology Co., Ltd., CN=cn-hangzhou.oss.aliyuncs.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:e4:33:85:33:df:c3:af:64:36:c4:2f:07:75:c9:
3a:b3:26:75:db:43:da:5c:3a:52:cd:1a:22:6e:91:
63:82:4a:49:60:30:02:b2:57:00:98:0e:8d:7c:8a:
70:cf:bf:d6:9b:82:41:ea:ba:94:fb:3a:bb:e8:7c:
2f:79:90:84:d7:a7:24:a3:ef:ee:6a:a7:8e:cf:2a:
e0:d1:9a:ac:9c:b6:8c:0c:a4:2f:62:20:54:e0:14:
86:b1:3c:7a:30:f2:19:7e:d1:39:17:e9:d6:18:6e:
c3:33:ed:1a:4c:e1:9c:89:36:0f:3c:4c:c7:85:60:
6e:18:95:3c:c7:a5:3e:77:2e:3a:bb:a8:ff:56:38:
37:86:64:c1:7f:36:de:ac:0f:53:7e:b2:09:3e:e0:
7a:12:10:10:fb:73:5d:d8:44:08:54:86:67:b0:f9:
7d:c4:5a:e4:bf:09:89:1e:c4:8c:fe:0f:de:e3:00:
7b:3c:95:53:77:3c:78:dc:c6:13:a1:d2:89:33:66:
f1:ef:82:ea:9d:48:1e:5e:ee:cc:26:6c:4e:22:5c:
70:e5:4f:6e:9f:29:f2:96:e2:32:8f:1f:f5:ce:7c:
59:a7:ce:66:16:c6:1d:8a:e4:f2:3b:ae:7d:4c:23:
40:3b:65:06:b9:02:54:82:88:ed:c5:5f:25:7b:db:
53:5d
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Basic Constraints: critical
CA:FALSE
Authority Information Access:
CA Issuers - URI:http://secure.globalsign.com/cacert/gsgccr3ovtlsca2024.crt
OCSP - URI:http://ocsp.globalsign.com/gsgccr3ovtlsca2024
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.2
Policy: 1.3.6.1.4.1.4146.10.1.2
CPS: https://www.globalsign.com/repository/
X509v3 CRL Distribution Points:
Full Name:
URI:http://crl.globalsign.com/gsgccr3ovtlsca2024.crl
X509v3 Subject Alternative Name:
DNS:cn-hangzhou.oss.aliyuncs.com, DNS:*.oss-cn-hangzhou.aliyuncs.com, DNS:*.img-cn-hangzhou-internal.aliyuncs.com, DNS:*.oss-cn-hzjbp-a-internal.aliyuncs.com, DNS:*.oss-cn-hangzhou-internal.aliyuncs.com, DNS:*.oss-cn-hangzhou-diku-internal.aliyuncs.com, DNS:*.cn-hangzhou.oss.aliyuncs.com, DNS:*.oss-enet-cm.aliyuncs.com, DNS:*.cn-hangzhou.oss-internal-cross.aliyun-inc.com, DNS:*.oss-cn-hangzhou-am101.aliyuncs.com, DNS:*.oss-internal.aliyuncs.com, DNS:*.oss-accelerate.aliyuncs.com, DNS:*.oss-cn-hzjbp-b-internal.aliyuncs.com, DNS:*.img-cn-hangzhou.aliyuncs.com, DNS:*.oss-accelerate-overseas.aliyuncs.com, DNS:*.oss-cn-hangzhou-zmf.aliyuncs.com, DNS:*.oss-cn-hangzhou-hsa.aliyuncs.com, DNS:*.aliyuncs.com, DNS:*.oss.aliyuncs.com, DNS:*.oss-cn-hangzhou-cross.aliyuncs.com, DNS:*.vpc100-oss-cn-hangzhou.aliyuncs.com, DNS:*.oss-cn-hzfinance.aliyuncs.com, DNS:*.oss-enet.aliyuncs.com, DNS:*.cn-hangzhou.oss-internal.aliyuncs.com, DNS:*.oss-enet-cu.aliyuncs.com, DNS:*.oss-enet-ct.aliyuncs.com, DNS:*.oss-cn-hangzhou-zmf-internal.aliyuncs.com, DNS:*.oss-cn-hzfinance-internal.aliyuncs.com, DNS:*.cn-hangzhou-finance.oss.aliyuncs.com, DNS:*.oss-cn-hzjbp-b-console.aliyuncs.com, DNS:*.oss-cache-cn-hangzhou-j.aliyuncs.com, DNS:*.oss-cache-cn-hangzhou-j-cross.aliyuncs.com, DNS:*.oss-enet-cn-east.aliyuncs.com, DNS:*.cn-hangzhou-vpc.oss.aliyuncs.com, DNS:*.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-hangzhou.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-hangzhou-internal.oss-accesspoint.aliyuncs.com, DNS:*.cn-hangzhou.oss-console.aliyuncs.com, DNS:*.s3.oss-cn-hangzhou.aliyuncs.com, DNS:*.s3.oss-cn-hangzhou-internal.aliyuncs.com, DNS:*.cn-hangzhou.mgw.aliyuncs.com, DNS:*.oss.cn-hangzhou.privatelink.aliyuncs.com, DNS:*.oss-cn-hangzhou.oss-object-process.aliyuncs.com, DNS:*.oss-cn-hangzhou-internal.oss-object-process.aliyuncs.com, DNS:*.s3.oss-accelerate.aliyuncs.com, DNS:*.s3.oss-accelerate-overseas.aliyuncs.com, DNS:*.cn-hangzhou-cross.mgw.aliyuncs.com, DNS:*.oss-vpc.aliyuncs.com, DNS:*.cn-hangzhou.oss-vpc.aliyuncs.com
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Authority Key Identifier:
DA:D3:A8:08:48:0C:34:37:58:EE:E5:A7:75:2E:59:FC:D6:DC:3C:38
X509v3 Subject Key Identifier:
A9:B4:08:AD:74:76:24:F8:94:02:09:AF:A1:CD:4B:1D:51:33:C1:61
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:
4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0
Timestamp : Jan 13 06:51:23.013 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:46:02:21:00:E7:15:F1:D1:6C:B2:8E:BE:40:3C:23:
1D:42:C9:E8:12:B3:A6:A9:2D:31:81:C6:F5:CF:D9:47:
C0:B8:4A:ED:32:02:21:00:DC:73:79:D6:C7:B7:DE:2C:
C1:01:F6:60:CB:3A:CC:67:D8:69:CF:26:4E:C1:D2:D0:
2D:C2:90:E3:EA:81:60:46
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 96:97:64:BF:55:58:97:AD:F7:43:87:68:37:08:42:77:
E9:F0:3A:D5:F6:A4:F3:36:6E:46:A4:3F:0F:CA:A9:C6
Timestamp : Jan 13 06:51:23.061 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:96:64:91:51:2A:A8:7F:CD:CD:0D:39:
F5:89:22:09:9C:4F:F1:19:85:3A:3C:93:27:4F:FF:B0:
B4:2A:01:C2:68:02:20:17:65:BC:F7:F6:85:B9:19:24:
B2:CD:EC:D9:2E:06:DC:61:ED:59:8C:2B:F9:FC:7C:56:
83:F4:8B:AC:EA:B7:01
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 49:9C:9B:69:DE:1D:7C:EC:FC:36:DE:CD:87:64:A6:B8:
5B:AF:0A:87:80:19:D1:55:52:FB:E9:EB:29:DD:F8:C3
Timestamp : Jan 13 06:51:23.027 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:AF:BB:AA:E2:C0:B0:50:D9:07:86:99:
E5:19:F4:9D:D2:77:00:55:EF:1C:D9:E2:54:9E:EA:EB:
E2:CD:5E:FA:DF:02:20:59:A4:42:90:A7:0B:4A:F8:D4:
72:D8:2B:31:4F:1C:60:E3:EF:0E:F7:57:28:87:C7:E8:
7E:E7:28:14:9F:89:EA
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
85:c9:21:91:94:50:c4:96:29:fa:81:eb:e7:e8:2e:16:9c:fd:
38:09:e2:a3:3c:21:8b:2f:a6:77:d2:78:fc:51:63:7e:92:7f:
32:fb:51:6c:37:2d:2a:40:5a:ac:4f:f6:50:6c:28:fc:52:b4:
39:d6:c6:3c:ab:19:5b:88:a7:df:af:e1:7a:06:35:f7:7f:a9:
94:3d:c3:77:d7:29:9c:e2:1c:87:2b:0b:97:f5:5d:34:68:78:
ed:71:4e:63:2f:fe:81:67:65:8d:88:1f:72:e7:ca:2f:09:2f:
5d:f3:64:f0:16:94:c8:89:5d:fb:ed:22:11:a7:b1:4c:59:a2:
0b:5d:88:d9:41:2b:83:d8:1c:04:58:c4:f3:61:98:52:f4:d2:
48:35:b7:6b:43:ad:81:21:d4:dd:52:1a:47:61:75:26:54:e7:
33:c6:97:9f:99:8e:b4:03:f7:34:14:a4:38:6e:a3:49:31:df:
33:ff:f2:63:6e:d8:12:81:8d:f2:d6:ea:61:af:ba:bc:9c:62:
11:0b:6f:d2:54:75:bc:3a:1b:f7:b6:7a:db:d7:06:54:0d:31:
2b:12:6d:19:c3:98:4a:21:0d:72:03:e7:31:72:da:dd:61:d3:
30:e8:03:fb:77:61:79:f6:41:4f:55:39:c3:80:f5:31:58:7a:
50:16:3e:dc
444 /
tcp
671605376 | 2025-03-24T04:39:51.647360
491 /
tcp
671605376 | 2025-03-05T09:55:36.152714
503 /
tcp
921225407 | 2025-03-24T01:12:22.649597
\x00\x00\x00\x04\x00\x00\x00\x00\x00
513 /
tcp
1911457608 | 2025-03-22T03:18:37.064117
\x00[\x00\x00\x00\x00\x00\x00
515 /
tcp
-321444299 | 2025-03-05T19:46:21.826806
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
548 /
tcp
-2035415184 | 2025-03-17T13:02:30.637725
Fast Copy: Yes\nExtended Sleep: Yes\nUUIDs: Yes\nUTF8 Server Name: Yes\nDirectory Services: Yes\nReconnect: No\nServer Notifications: Yes\nTCP/IP: Yes\nServer Signature: Yes\nServer Message: No\nPassword Saving Prohibited: No\nPassword Changing: No\nCopy File: Yes\nServer Name: Landisk2\nMachine Type: \rNetatalk3.1.8\nAFP Versions: AFP2.2, AFPX03, AFP3.1, AFP3.2, AFP3.3, AFP3.4\nUAMs: Cleartxt Passwrd\\x04,DHX2\t,DHCAST128\\x00\nServer Signature: 00000000008002000180030002800280
554 /
tcp
285770450 | 2025-03-07T12:22:32.274482
RTSP/1.0 401 Unauthorized
CSeq: 1
1300162323 | 2025-03-11T22:17:56.956361
HTTP/1.1 404 Not Found
Content-Type: text/plain; charset=utf-8
X-Content-Type-Options: nosniff
675 /
tcp
-1399940268 | 2025-03-20T10:39:30.855878
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
811 /
tcp
820958131 | 2025-03-24T09:35:35.331835
kjnkjabhbanc283ubcsbhdc72\x02
873 /
tcp
-1970692834 | 2025-03-17T19:30:34.888629
@RSYNCD: 31.0\n@RSYNCD: EXIT\n
902 /
tcp
1956828827 | 2025-03-10T10:31:42.630876
220 VMware Authentication Daemon Version 1.10: SSL Required, Se
rverDaemonProtocol:SOAP, MKSDisplayProtocol:VNC , , NFCSSL supported/t
992 /
tcp
-1835475271 | 2025-03-13T00:42:15.244090
200 NOD32SS 99 (3318497116)\r\n
1023 /
tcp
-1681927087 | 2025-03-06T17:30:43.527716
kjnkjabhbanc283ubcsbhdc72
1050 /
tcp
-2089734047 | 2025-03-24T23:54:54.440973
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1099 /
tcp
-1036370807 | 2025-02-28T13:08:22.067929
-690472071 | 2025-02-24T17:39:54.005354
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
<html>
<head><title>400 Bad Request</title></head>
<body>
<center><h1>400 Bad Request</h1></center>
<hr><center>nginx</center>
</body>
</html>
1153 /
tcp
-1399940268 | 2025-03-13T14:24:57.069825
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1177 /
tcp
-1136600457 | 2025-03-05T20:47:41.461236
HELO:10.3.6.0.false
AS:2048
HL:19
1200 /
tcp
-2033111675 | 2025-03-22T05:53:41.831046
1234 /
tcp
1911457608 | 2025-03-16T11:42:18.282183
\x00[\x00\x00\x00\x00\x00\x00
1337 /
tcp
-786044033 | 2025-03-20T02:10:38.548127
OK Welcome <299685> on DirectUpdate server 7286
1414 /
tcp
1723769361 | 2025-03-10T08:52:48.509239
ELM Enterprise Manager _l\r\nCopyright \xc2\xa9 18668511-928641920 TNT Software, Inc.\r\n
1433 /
tcp
-325802316 | 2025-03-25T19:17:25.794803
MSSQL Server\nVersion: 134219767 (0x80007f7)\nSub-Build: 0\nEncryption:Not available\n\nMSSQL NTLM Info:\nTarget_Name: PC-20150816MQOM\nProduct_Version: 6.1.7601 Ntlm 15\nOS: Windows 7, Service Pack 1/Windows Server 2008 R2, Service Pack 1\nNetBIOS_Domain_Name: PC-20150816MQOM\nNetBIOS_Computer_Name: PC-20150816MQOM\nDNS_Domain_Name: PC-20150816MQOM\nDNS_Computer_Name: PC-20150816MQOM\nMsvAvFlags: 01000000\nSystem_Time: 2024-01-22 04:03:26 +0000 UTC\n\n
1454 /
tcp
819727972 | 2025-03-23T03:34:20.134064
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1521 /
tcp
2002686051 | 2025-03-19T10:14:14.347604
Version:11.1.0.6.0\n\\x016\\x00\\x01\\x08\\x00\\x7f\\xff\\x01\\x00\\x00-\\x00 \r\\x08\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00(DESCRIPTION=(TMP=)(VSNNUM=185599488)(ERR=0))
1599 /
tcp
1741579575 | 2025-03-24T14:27:10.589525
1604 /
tcp
1911457608 | 2025-03-25T20:02:09.379885
\x00[\x00\x00\x00\x00\x00\x00
1723 /
tcp
1103582599 | 2025-03-05T22:58:46.542969
Firmware: 1\nHostname: Vigor\nVendor: DrayTek\n
1801 /
tcp
-833635452 | 2025-03-21T03:35:04.821654
\\x10Z\x0b\\x00LIOR<\\x02\\x00\\x00\\xff\\xff\\xff\\xff\\x00\\x00\\x12\\x00a36a0e421af47074\\x05\xe8\x9b\xb5\\x95E\\x1eJ\\x85\xd5\xb1\\xe4\\xf9\\xba\\xf6+92d3\\x10\\x03\\x00\\x00ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
1911 /
tcp
632542934 | 2025-03-05T17:49:32.697348
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
1926 /
tcp
-1730858130 | 2025-02-27T00:45:08.009326
RFB 003.008
VNC:
Protocol Version: 3.8
-1013082686 | 2025-03-15T20:19:02.711174
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
1957 /
tcp
-1327660293 | 2025-03-12T19:15:47.559686
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
1962 /
tcp
-653033013 | 2025-02-25T20:46:35.965365
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
1987 /
tcp
1761482307 | 2025-03-18T02:07:06.488952
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
2000 /
tcp
117101543 | 2025-03-14T07:51:41.420341
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
2002 /
tcp
1887224352 | 2025-02-24T14:41:37.815694
2003 /
tcp
1911457608 | 2025-03-23T20:19:22.332858
\x00[\x00\x00\x00\x00\x00\x00
2006 /
tcp
1911457608 | 2025-03-08T12:07:32.190955
\x00[\x00\x00\x00\x00\x00\x00
-1839934832 | 2025-03-10T17:18:23.364781
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
2051 /
tcp
1911457608 | 2025-03-03T22:46:06.953126
\x00[\x00\x00\x00\x00\x00\x00
2067 /
tcp
291723434 | 2025-03-08T14:07:16.787048
Lantronix MSS100 Version V118/523(045538937)
Type HELP at the 'Local_61349> ' prompt for assistance.
Username>
2083 /
tcp
2087396567 | 2025-03-22T07:31:47.013126
kjnkjabhbanc283ubcsbhdc72
2087 /
tcp
1541211644 | 2025-03-24T04:55:58.219369
2121 /
tcp
-459998123 | 2025-03-25T22:50:48.569033
220-FileZilla Server version 0.9.46 beta\r\n
756886313 | 2025-03-25T20:31:37.062777
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
2210 /
tcp
-1399940268 | 2025-03-09T15:12:19.507636
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2221 /
tcp
-1810987450 | 2025-03-21T15:54:20.958240
2226 /
tcp
819727972 | 2025-03-08T17:03:11.209220
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2323 /
tcp
-2112953016 | 2025-03-21T08:21:14.095201
There are too many users,please wait a moment to log in!
TELNET Negotiation:
will: Echo, Suppress Go Ahead
do: Echo, Negotiate About Window Size, Remote Flow Control
2345 /
tcp
-1399940268 | 2025-03-11T23:06:11.431960
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2376 /
tcp
-1529979118 | 2025-03-22T03:25:19.786806
2404 /
tcp
-2096652808 | 2025-03-24T13:00:15.761671
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
2455 /
tcp
2087396567 | 2025-03-14T17:46:24.118037
kjnkjabhbanc283ubcsbhdc72
2567 /
tcp
1353260875 | 2025-03-13T19:10:41.232772
\x00[g\xc2\x95N\x7f\x00\x00
2628 /
tcp
2087396567 | 2025-03-05T02:17:46.281629
kjnkjabhbanc283ubcsbhdc72
2650 /
tcp
1911457608 | 2025-03-12T13:46:14.300471
\x00[\x00\x00\x00\x00\x00\x00
2701 /
tcp
1869192275 | 2025-02-28T19:11:45.779713
3001 /
tcp
-1626979812 | 2025-03-25T12:06:26.283084
220 Service ready for new user.
3002 /
tcp
-1598265216 | 2025-03-22T01:01:57.925903
3009 /
tcp
-1279886438 | 2025-03-05T06:27:43.428357
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
587250289 | 2025-03-06T02:01:35.266452
HTTP/1.1 400 Bad Request
Server: nginx/1.18.11011 (Ubuntu)
Content-Type: text/plain; charset=utf-8
Connection: close
3058 /
tcp
-1399940268 | 2025-03-09T23:45:51.835189
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3062 /
tcp
408230060 | 2025-03-21T15:14:30.817338
\r\nSorry, that nickname format is invalid.\r\n
3140 /
tcp
-2089734047 | 2025-03-19T08:10:10.595528
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3143 /
tcp
-1261090339 | 2025-03-20T20:26:17.056939
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
3161 /
tcp
-2017887953 | 2025-03-03T21:36:04.054047
SSH-2.0-OpenSSH_7.9
Vulnerabilities
3170 /
tcp
-1032713145 | 2025-02-27T04:23:23.799674
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
3182 /
tcp
-1105333987 | 2025-03-18T07:20:45.436644
3187 /
tcp
1996932384 | 2025-03-21T05:58:40.986457
3191 /
tcp
-1399940268 | 2025-03-05T01:05:33.355460
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3256 /
tcp
233634112 | 2025-03-14T18:26:03.622811
SSH-98.60-SysaxSSH_81885..42
3260 /
tcp
-862070606 | 2025-03-25T12:31:03.702987
Login Response Success(0x0000)\nKey/Value Pairs\nAuthMethod=None\nTargetAlias=LIO Target\nTargetPortalGroupTag=1\n\n
-1547976805 | 2025-03-12T19:45:31.423151
HTTP/1.1 403 Forbidden
Server: nginx
Content-Type: text/html
Connection: close
3306 /
tcp
-1036944024 | 2025-03-14T17:37:03.670038
F\\x00\\x00\\x00\\xffj\\x04Host \'*.*.*.*\' is not allowed to connect to this MySQL server
3310 /
tcp
-2096652808 | 2025-03-17T12:36:33.940830
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
3341 /
tcp
819727972 | 2025-03-04T21:04:07.379259
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3388 /
tcp
921225407 | 2025-03-06T04:42:09.653118
\x00\x00\x00\x04\x00\x00\x00\x00\x00
3389 /
tcp
848680996 | 2025-03-16T17:55:47.059964
Remote Desktop Protocol\n\\x03\\x00\\x00\\x13\\x0e\\xd0\\x00\\x00\\x124\\x00\\x02\t\\x08\\x00\\x02\\x00\\x00\\x00\n\nFlag: PROTOCOL_HYBRID\nTarget_Name: WINCTYU-KTI28LG\nProduct_Version: 6.1.7601 Ntlm 15\nOS: Windows 7, Service Pack 1/Windows Server 2008 R2, Service Pack 1\nNetBIOS_Domain_Name: WINCTYU-KTI28LG\nNetBIOS_Computer_Name: WINCTYU-KTI28LG\nDNS_Domain_Name: WINCTYU-KTI28LG\nDNS_Computer_Name: WINCTYU-KTI28LG\nSystem_Time: 2024-01-22 08:43:05 +0000 UTC\n\n
3690 /
tcp
-891714208 | 2025-03-25T19:02:37.632586
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
3780 /
tcp
2033888749 | 2025-03-08T11:53:34.430106
Content-Type: text/rude-rejection
Content-Length: 24
Access Denied, go away.
Content-Type: text/disconnect-notice
C...
3790 /
tcp
-971970408 | 2025-03-14T02:44:03.311756