11 /
tcp
-971970408 | 2025-03-16T09:56:53.560330
13 /
tcp
291723434 | 2025-03-16T17:58:36.862674
Lantronix MSS100 Version V118/523(045538937)
Type HELP at the 'Local_61349> ' prompt for assistance.
Username>
15 /
tcp
-260710842 | 2025-03-17T01:42:37.145303
19 /
tcp
873425297 | 2025-03-14T00:00:27.446800
200 NOD32SS 99 (3318497116)
21 /
tcp
179309064 | 2025-03-07T16:22:21.266039
220 Microsoft FTP Service
530 User cannot log in.
23 /
tcp
-1816600103 | 2025-03-23T05:24:55.244089
1110767461 | 2025-03-25T20:13:54.585981
HTTP/1.1 200 OK
Server: nginx/1
43 /
tcp
1991883981 | 2025-03-06T09:55:46.096208
B\x00\x00\x00\xc3\xbfn\x04Too many connections
49 /
tcp
-1620040646 | 2025-03-25T01:33:57.567633
\xc3\xbf\xc3\xbb\\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
53 /
tcp
1666554202 | 2025-03-25T01:24:21.543290
9\n\\x81\\x80\\x00\\x01\\x00\\x02\\x00\\x00\\x00\\x00\\x08clients1\\x06google\\x03com\\x00\\x00\\x01\\x00\\x01\\xc0\x0c\\x00\\x05\\x00\\x01\\x00\\x00\\x00\\xbd\\x00\x0c\\x07clients\\x01l\\xc0\\x15\\xc01\\x00\\x01\\x00\\x01\\x00\\x00\\x00\\xa2\\x00\\x04\\xac\xd9\xa3.\n\\x00\\x06\\x85\\x80\\x00\\x01\\x00\\x01\\x00\\x00\\x00
70 /
tcp
1738069263 | 2025-03-25T02:25:09.636898
\x01remshd: Kerberos Authentication not enabled.
79 /
tcp
-1770051369 | 2025-03-24T22:09:18.060743
1216780473 | 2025-03-26T05:06:00.032747
HTTP/1.1 403 Forbidden
Server: AliyunOSS
Date: Wed, 26 Mar 2025 05:05:59 GMT
Content-Type: application/xml
Content-Length: 346
Connection: keep-alive
x-oss-request-id: 67E38B3781BEF33537EB3F18
x-oss-server-time: 0
x-oss-ec: 0003-00001201
87 /
tcp
-2089734047 | 2025-03-17T22:15:47.118771
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
89 /
tcp
-1399940268 | 2025-03-17T18:39:21.045205
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
92 /
tcp
-1699556818 | 2025-03-04T20:37:16.540570
\x01remshd: Kerberos Authentication not enabled.\n
95 /
tcp
-1399940268 | 2025-03-15T17:03:04.305511
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1013082686 | 2025-03-14T06:53:08.539488
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
-1013082686 | 2025-03-05T10:32:00.551482
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
101 /
tcp
-1538260461 | 2025-03-25T16:57:23.505427
102 /
tcp
307999478 | 2025-03-26T08:27:55.160130
unknown command \r\nunknown command \r\n
104 /
tcp
-1626979812 | 2025-03-28T10:23:29.296125
220 Service ready for new user.
110 /
tcp
1726594447 | 2025-03-12T09:00:30.389165
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
113 /
tcp
-1777894858 | 2025-02-28T17:14:23.780528
113 , 35054 : USERID : OTHER :99
135 /
tcp
-646274631 | 2025-03-13T14:30:37.758254
\\x05\\x00\r\\x03\\x10\\x00\\x00\\x00\\x18\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x04\\x00\\x01\\x05\\x00\\x00\\x00\\x00\n\nServerAlive2: \n IP1: user-PC\n IP2: 192.168.1.104\n IP3: 220.129.89.73\n IP4: 2001:b011:3009:904e:d83e:3f80:66e3:747\n IP5: 2001:b011:3009:904e:901d:7e1d:524b:cf68\n IP6: 2001:b011:3009:ec00:d8a9:208f:6a7e:b9c3\n\nNTLMSSP:\nTarget_Name: USER-PC\nProduct_Version: 6.1.7601 Ntlm 15\nOS: Windows 7, Service Pack 1/Windows Server 2008 R2, Service Pack 1\nNetBIOS_Domain_Name: USER-PC\nNetBIOS_Computer_Name: USER-PC\nDNS_Domain_Name:
179 /
tcp
-399606100 | 2025-03-18T18:35:31.814664
BGP Message\nType: 3\nMajor error Code: 6\nMinor error Code: 5\n
195 /
tcp
819727972 | 2025-03-18T13:46:33.541680
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1547976805 | 2025-03-16T14:05:28.091555
HTTP/1.1 403 Forbidden
Server: nginx
Content-Type: text/html
Connection: close
314 /
tcp
165188539 | 2025-03-18T21:22:50.563273
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
811247330 | 2025-03-28T18:31:09.866201
HTTP/1.1 200 OK
Server: Apache
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Permitted-Cross-Domain-Policies: none
X-Robots-Tag: noindex, nofollow, noarchive, nosnippet, nosnippet, notranslate, noimageindex
Content-Type: text/html; charset=utf-8
-854000961 | 2025-03-27T03:13:25.012454
HTTP/1.1 403 Forbidden
Server: AliyunOSS
Date: Thu, 27 Mar 2025 03:13:24 GMT
Content-Type: application/xml
Content-Length: 346
Connection: keep-alive
x-oss-request-id: 67E4C254CDD77A32310D9BA8
x-oss-server-time: 1
x-oss-ec: 0003-00001201
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
61:6b:68:69:54:4a:81:bb:93:b4:d7:d1
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=BE, O=GlobalSign nv-sa, CN=GlobalSign GCC R3 OV TLS CA 2024
Validity
Not Before: Jan 2 06:32:06 2025 GMT
Not After : Sep 4 00:00:00 2025 GMT
Subject: C=CN, ST=ZheJiang, L=HangZhou, O=Alibaba (China) Technology Co., Ltd., CN=cn-beijing.oss.aliyuncs.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:cb:fd:cb:7f:5f:49:ee:e8:d9:d0:d6:53:d0:a5:
88:fd:fc:56:3c:06:76:2d:ad:ee:c9:65:e1:8c:fd:
ee:ef:a1:a2:34:db:d3:65:1e:4a:9c:f7:9d:a6:ad:
fa:a7:b3:1a:8b:45:f7:13:2a:26:24:9c:50:28:92:
25:54:45:fc:d2:2e:17:7d:c1:47:45:a1:39:bf:ce:
7e:f2:8b:d7:69:2c:b6:94:3f:5c:fc:a9:6e:c3:bd:
a5:a9:f3:6e:65:55:50:ba:b2:8a:df:ee:e9:50:a7:
81:b5:5f:3a:96:f9:74:c3:8a:54:51:d7:eb:02:1c:
58:33:e6:a0:ea:12:10:52:63:c9:df:03:84:cf:a3:
15:9c:50:7b:5e:6e:42:0f:3d:bd:33:3c:f6:6a:eb:
be:30:24:30:72:cb:84:a8:e9:17:aa:6a:45:f8:12:
c2:a1:78:0d:31:f0:45:2b:32:2f:ff:98:a3:03:a2:
5a:b0:8d:e2:d5:ce:e1:35:56:0b:0a:f8:11:bf:18:
44:f7:b8:7b:a0:a0:eb:1d:8d:cf:e8:cc:cf:c4:c5:
54:69:59:53:e1:ee:51:79:04:67:86:cf:8b:e5:c6:
88:a8:cc:9e:61:75:91:90:b5:8a:af:4c:a2:8d:57:
14:8a:f6:54:fb:1e:71:e5:09:e3:0a:12:df:34:8d:
d5:47
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Basic Constraints: critical
CA:FALSE
Authority Information Access:
CA Issuers - URI:http://secure.globalsign.com/cacert/gsgccr3ovtlsca2024.crt
OCSP - URI:http://ocsp.globalsign.com/gsgccr3ovtlsca2024
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.2
Policy: 1.3.6.1.4.1.4146.10.1.2
CPS: https://www.globalsign.com/repository/
X509v3 CRL Distribution Points:
Full Name:
URI:http://crl.globalsign.com/gsgccr3ovtlsca2024.crl
X509v3 Subject Alternative Name:
DNS:cn-beijing.oss.aliyuncs.com, DNS:*.cn-beijing.oss-console.aliyuncs.com, DNS:*.s3.oss-cn-beijing.aliyuncs.com, DNS:*.s3.oss-cn-beijing-internal.aliyuncs.com, DNS:*.cn-beijing.mgw.aliyuncs.com, DNS:*.oss.cn-beijing.privatelink.aliyuncs.com, DNS:*.oss-cn-beijing.oss-object-process.aliyuncs.com, DNS:*.oss-cn-beijing-internal.oss-object-process.aliyuncs.com, DNS:*.oss-cn-beijing.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-beijing-internal.oss-accesspoint.aliyuncs.com, DNS:*.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-beijing.aliyuncs.com, DNS:*.img-cn-beijing-internal.aliyuncs.com, DNS:*.oss-cn-beijing-internal-cross.aliyuncs.com, DNS:*.oss-cn-beijing-internal.aliyuncs.com, DNS:*.oss-cn-beijing-cross.aliyuncs.com, DNS:*.img-cn-beijing.aliyuncs.com, DNS:*.vpc100-oss-cn-beijing.aliyuncs.com, DNS:*.cn-beijing.oss.aliyuncs.com, DNS:*.oss-cache-cn-beijing-h.aliyuncs.com, DNS:*.oss-cache-cn-beijing-h-cross.aliyuncs.com, DNS:*.oss-cn-beijing-finance-1-pub-internal.aliyuncs.com, DNS:*.oss-cn-beijing-finance-1-pub.aliyuncs.com, DNS:*.cn-beijing-finance.oss.aliyuncs.com, DNS:*.oss-cn-beijing-finance-1-internal.aliyuncs.com, DNS:*.oss-cn-beijing-finance-1.aliyuncs.com, DNS:*.cn-beijing-finance-1.oss.aliyuncs.com, DNS:*.cn-beijing-vpc.oss.aliyuncs.com, DNS:*.oss-enet-cm.aliyuncs.com, DNS:*.oss-enet-cu.aliyuncs.com, DNS:*.oss-enet-ct.aliyuncs.com, DNS:*.oss-enet-cn-north.aliyuncs.com, DNS:*.aliyuncs.com, DNS:*.oss-enet.aliyuncs.com, DNS:*.oss-internal.aliyuncs.com, DNS:*.oss-internal.aliyun-inc.com, DNS:*.oss-accelerate.aliyuncs.com, DNS:*.oss-accelerate-overseas.aliyuncs.com, DNS:*.s3.oss-accelerate.aliyuncs.com, DNS:*.s3.oss-accelerate-overseas.aliyuncs.com, DNS:*.cn-beijing-cross.mgw.aliyuncs.com, DNS:*.oss-vpc.aliyuncs.com, DNS:*.cn-beijing.oss-vpc.aliyuncs.com, DNS:*.oss.aliyuncs.com
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Authority Key Identifier:
DA:D3:A8:08:48:0C:34:37:58:EE:E5:A7:75:2E:59:FC:D6:DC:3C:38
X509v3 Subject Key Identifier:
C1:58:AC:32:69:71:BB:67:42:6C:42:FE:14:E5:57:72:91:C1:82:D6
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 1A:04:FF:49:D0:54:1D:40:AF:F6:A0:C3:BF:F1:D8:C4:
67:2F:4E:EC:EE:23:40:68:98:6B:17:40:2E:DC:89:7D
Timestamp : Jan 2 06:32:08.952 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:D4:22:D6:BD:85:6A:79:2B:66:0F:1F:
36:9C:87:35:37:A2:DA:91:B3:41:21:70:33:24:48:B8:
AC:01:B2:4F:8A:02:20:78:33:2F:5E:6C:72:6C:BA:8A:
2A:DB:4A:42:99:29:A1:0C:E4:7B:86:88:C2:7F:9F:BE:
CE:93:8F:5D:00:2F:8C
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 12:F1:4E:34:BD:53:72:4C:84:06:19:C3:8F:3F:7A:13:
F8:E7:B5:62:87:88:9C:6D:30:05:84:EB:E5:86:26:3A
Timestamp : Jan 2 06:32:08.990 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:DE:60:8C:72:69:F8:ED:DD:B5:9B:2F:
88:2B:94:8E:C5:EA:A3:29:CF:5E:76:E1:32:5B:33:E9:
09:55:C0:9B:0A:02:20:72:4F:8B:E6:B3:1A:36:F6:61:
91:02:36:00:EA:76:E0:8C:5C:3C:8C:AF:C1:4A:F2:FD:
CA:7D:2B:6A:A6:5A:A7
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 0D:E1:F2:30:2B:D3:0D:C1:40:62:12:09:EA:55:2E:FC:
47:74:7C:B1:D7:E9:30:EF:0E:42:1E:B4:7E:4E:AA:34
Timestamp : Jan 2 06:32:08.695 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:82:E8:40:FB:D2:F4:C7:36:73:02:4A:
CD:8A:B4:A7:3D:E9:DC:7F:23:C7:17:0C:B1:8F:65:59:
3C:89:A5:E4:F0:02:20:2D:57:40:3F:AC:33:84:81:B8:
79:8C:CE:B4:F4:CC:44:29:AE:5A:FA:CD:66:FF:7A:69:
DA:8E:8E:6B:3D:C7:D7
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
4e:88:42:e9:bd:d6:24:7a:b8:0b:08:70:28:8b:e3:90:92:79:
25:1f:f9:ec:83:69:41:21:cb:3f:cc:c6:2c:76:54:44:09:81:
c9:8b:a9:bc:32:e4:5e:d4:72:17:de:fd:a1:50:2b:58:ed:45:
8e:ba:40:ee:f9:54:31:0e:56:0e:7f:9e:36:2d:98:8b:3a:21:
ac:4c:f7:4b:e5:97:32:cd:c3:b4:9d:b7:99:07:f1:4f:bb:81:
14:60:64:c2:01:bb:85:62:e5:8a:7e:84:86:9f:c9:0b:80:80:
c3:95:a2:77:b8:d9:81:73:28:dc:14:f9:af:1b:22:8b:33:2a:
b5:dd:34:fb:a6:90:3d:a1:37:b1:93:f5:d9:93:d0:3c:86:ac:
28:04:f6:71:24:54:fd:0c:42:2d:48:d4:9c:a6:e5:fa:88:71:
e3:dc:e1:a7:c7:8a:d5:39:43:29:5f:5d:2c:02:1a:72:08:e8:
ce:86:a9:22:b1:ed:4f:4e:7f:e5:7d:ea:01:3b:7f:34:2c:e6:
94:3c:5b:6c:64:09:c3:88:e5:08:64:91:8a:17:63:99:dc:0c:
85:ee:6c:4a:67:f4:66:21:e9:7a:a3:95:8c:ed:6c:6f:af:92:
f8:a3:49:8f:de:3b:85:de:68:56:95:f4:e7:e7:7b:1e:c2:0a:
1f:12:b5:15
200028872 | 2025-03-15T22:54:09.476685
HTTP/1.1 302 Moved Temporarily
Server: nginx/1.22.1
Date: Sat, 15 Mar 2025 22:54:09 GMT
Content-Type: text/html
Content-Length: 145
Connection: close
Location: https://59.110.185.48:443/
<html>
<head><title>302 Found</title></head>
<body>
<center><h1>302 Found</h1></center>
<hr><center>nginx/1.22.1</center>
</body>
</html>
465 /
tcp
897328069 | 2025-03-13T05:08:02.484042
220 mail.scott000.com ESMTP
480 /
tcp
-1399940268 | 2025-03-08T17:39:31.036904
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
502 /
tcp
1543809371 | 2025-03-21T06:00:35.055160
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
513 /
tcp
-747911285 | 2025-03-21T21:22:55.132315
515 /
tcp
2087396567 | 2025-03-11T22:03:31.821964
kjnkjabhbanc283ubcsbhdc72
548 /
tcp
444328471 | 2025-02-28T12:57:39.835337
Fast Copy: Yes\nExtended Sleep: Yes\nUUIDs: Yes\nUTF8 Server Name: Yes\nDirectory Services: Yes\nReconnect: No\nServer Notifications: Yes\nTCP/IP: Yes\nServer Signature: Yes\nServer Message: No\nPassword Saving Prohibited: No\nPassword Changing: No\nCopy File: Yes\nServer Name: SynologyRouter\nMachine Type: \rNetatalk3.1.1\nAFP Versions: AFP2.2, AFPX03, AFP3.1, AFP3.2, AFP3.3, AFP3.4\nUAMs: DHX2\t,DHCAST128\\x00\nServer Signature: 00000000008002000180030002800280
554 /
tcp
285770450 | 2025-03-20T03:58:43.522388
RTSP/1.0 401 Unauthorized
CSeq: 1
555 /
tcp
-1399940268 | 2025-03-12T19:02:11.549163
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
826560219 | 2025-03-13T15:58:44.478975
HTTP/1.1 400 Bad Request
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 59-8951886-0 0NNN RT(1705909763732 169) q(-1 -1 -1 -1) r(0 -1) b1
1300162323 | 2025-03-24T06:01:55.806924
HTTP/1.1 404 Not Found
Content-Type: text/plain; charset=utf-8
X-Content-Type-Options: nosniff
675 /
tcp
-339084706 | 2025-03-06T09:28:14.998188
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
-58765571 | 2025-03-10T16:35:33.243021
HTTP/1.1 302 Moved Temporarily
Content-Type: text/html
Connection: close
Server: Nginx
Expires: 0
Pragma: no-cache
Cache-Control: no-cache
Location: https://portal.ikuai8-wifi.com/templates/default/index.html?timestamp=1705534360&router_ver=3.2.4&firmware=IK-RouterOS&template=default&gwid=a7dea2d1ff2b46d582c814cbae2fb058&user_ip=*.*.*.*
-1346601424 | 2025-03-15T13:26:51.325521
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 13-38977912-0 0NNN RT(1705905272179 0) q(0 -1 -1 -1) r(0 -1)
789 /
tcp
165188539 | 2025-03-26T18:29:09.141544
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
843 /
tcp
-2004989248 | 2025-03-06T16:51:19.284382
<cross-domain-policy>\n <allow-access-from domain="*" to-po\nrts="*" />\n</cross-domain-policy>
873 /
tcp
-992671574 | 2025-03-23T13:23:46.911777
943 /
tcp
-653033013 | 2025-03-24T15:37:15.669526
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
-936692830 | 2025-03-15T02:10:52.479290
HTTP/1.1 202 OK
Connection: Keep-Alive
Content-Type: text/html
Keep-Alive: timeout=15; max=19
993 /
tcp
-1399940268 | 2025-03-19T07:53:04.914784
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
995 /
tcp
-1489591880 | 2025-03-29T02:40:52.312302
1023 /
tcp
-1032248025 | 2025-03-18T21:06:32.298921
=Àÿÿ?"<ZDECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6
1025 /
tcp
1426971893 | 2025-03-23T00:06:58.514707
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
1029 /
tcp
-1019343788 | 2025-03-17T05:50:19.396730
1080 /
tcp
1362344524 | 2025-03-18T20:55:30.810502
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.7
1153 /
tcp
1948301213 | 2025-03-28T08:31:29.396235
RFB 003.003
VNC:
Protocol Version: 3.3
1167 /
tcp
-358801646 | 2025-03-26T19:42:22.556090
1177 /
tcp
2067064333 | 2025-03-05T17:48:28.783815
1193 /
tcp
1911457608 | 2025-02-28T12:15:41.870152
\x00[\x00\x00\x00\x00\x00\x00
1200 /
tcp
1519486042 | 2025-03-20T21:05:35.476425
<KU_goodbye>Protocol Error: XML data is not well-formed.</KU_goodbye>
1234 /
tcp
1911457608 | 2025-03-27T11:57:15.545244
\x00[\x00\x00\x00\x00\x00\x00
1293 /
tcp
819727972 | 2025-03-10T16:57:20.189457
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1414 /
tcp
-2080784861 | 2025-03-28T00:28:16.160414
GBPK\xc3\xbb\xc3\xb7n\xc2\x93W\xc2\xaf\xc2\x86\xc2\x93x@\xc2\xa9\x0e\xc3\x8a*\xc2\x9bS\x00
1433 /
tcp
-182670276 | 2025-03-28T23:44:21.765882
MSSQL Server\nVersion: 171050560 (0xa320640)\nSub-Build: 0\nEncryption:Not available\n\nMSSQL NTLM Info:\nTarget_Name: IZJ6FUBS9PLYUOZ\nProduct_Version: 6.3.9600 Ntlm 15\nOS: Windows 8.1/Windows Server 2012 R2\nNetBIOS_Domain_Name: IZJ6FUBS9PLYUOZ\nNetBIOS_Computer_Name: IZJ6FUBS9PLYUOZ\nDNS_Domain_Name: iZj6fubs9plyuoZ\nDNS_Computer_Name: iZj6fubs9plyuoZ\nSystem_Time: 2024-01-22 03:53:09 +0000 UTC\n\n
1444 /
tcp
1911457608 | 2025-03-09T15:37:31.792220
\x00[\x00\x00\x00\x00\x00\x00
1451 /
tcp
-2089734047 | 2025-03-18T07:28:12.120272
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1460 /
tcp
-358801646 | 2025-03-17T17:02:59.568524
1515 /
tcp
2087396567 | 2025-03-24T21:58:24.638859
kjnkjabhbanc283ubcsbhdc72
1521 /
tcp
1869192275 | 2025-03-18T23:24:23.967492
1604 /
tcp
-2089734047 | 2025-03-19T11:07:21.802595
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1723 /
tcp
1103582599 | 2025-03-29T14:11:09.430502
Firmware: 1\nHostname: Vigor\nVendor: DrayTek\n
1911 /
tcp
-1648456501 | 2025-03-23T02:41:36.017465
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
1962 /
tcp
-801484042 | 2025-02-28T11:28:19.886408
1972 /
tcp
-2089734047 | 2025-03-19T04:14:56.292556
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1979 /
tcp
1911457608 | 2025-03-12T18:14:18.760340
\x00[\x00\x00\x00\x00\x00\x00
2000 /
tcp
2063598737 | 2025-03-12T00:14:50.765252
2002 /
tcp
-1681927087 | 2025-03-13T00:29:06.345768
kjnkjabhbanc283ubcsbhdc72
2003 /
tcp
-1399940268 | 2025-03-19T16:25:21.749443
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2008 /
tcp
-971970408 | 2025-03-21T18:35:35.070908
2018 /
tcp
819727972 | 2025-03-23T12:37:05.418904
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2048 /
tcp
-1899074860 | 2025-03-24T21:07:08.839116
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
1830697416 | 2025-03-12T14:31:38.150313
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
2061 /
tcp
1911457608 | 2025-03-23T11:15:46.660644
\x00[\x00\x00\x00\x00\x00\x00
2067 /
tcp
819727972 | 2025-03-19T21:53:48.919238
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2080 /
tcp
-801484042 | 2025-03-23T19:48:32.523929
2081 /
tcp
-2089734047 | 2025-03-14T07:31:01.291682
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
2083 /
tcp
-2017887953 | 2025-03-19T17:23:49.248005
SSH-2.0-OpenSSH_7.9
Vulnerabilities
2087 /
tcp
-1026951088 | 2025-03-25T05:06:30.855048
2090 /
tcp
-1810987450 | 2025-03-27T20:13:54.052843
-1013082686 | 2025-03-26T14:49:58.736039
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
-1045760528 | 2025-03-19T15:58:35.895911
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
2181 /
tcp
546151771 | 2025-03-28T11:22:17.722857
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
1023953321 | 2025-03-08T18:06:37.238057
HTTP/1.0 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm="proxy"
Connection: close
Content-type: text/html; charset=utf-8
2209 /
tcp
-2096652808 | 2025-03-24T19:45:54.208074
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
2250 /
tcp
-1733106930 | 2025-03-04T05:12:08.476833
Mysql Version: 5.6.50-log\nN\n5.6.50-log\x14(\nG5se"tGE\xc3\xbf\xc3\xb7-\x02\x7f\xc2\x80\x15cB^3$Zwh$wM[mysql_native_password
2332 /
tcp
1632932802 | 2025-03-05T06:21:05.299939
2345 /
tcp
-2031152423 | 2025-03-20T14:27:44.036255
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
2352 /
tcp
-358801646 | 2025-03-05T09:52:57.083974
2376 /
tcp
-1730858130 | 2025-03-11T17:14:12.935674
RFB 003.008
VNC:
Protocol Version: 3.8
2404 /
tcp
-784071826 | 2025-03-13T02:33:48.432700
SSH-2.0-OpenSSH_8.0
Vulnerabilities
2455 /
tcp
819727972 | 2025-03-23T06:59:37.555177
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2601 /
tcp
-1804005872 | 2025-03-29T15:16:43.515386
\n\nWelcome to visit GOCLOUD S2A series router!\n\n\r\nUser Access Verification\r\n\r\n\\xff\\xfb\\x01\\xff\\xfb\\x03\\xff\\xfe"\\xff\\xfd\\x1fPassword:
2628 /
tcp
-971970408 | 2025-03-04T12:29:50.835543
2761 /
tcp
1911457608 | 2025-03-15T08:20:17.656689
\x00[\x00\x00\x00\x00\x00\x00
2762 /
tcp
-339084706 | 2025-03-21T06:58:51.981425
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
231461308 | 2025-03-16T20:11:54.949123
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 42-4717774-0 0NNN RT(1705901600426 0) q(0 -1 -1 -1) r(0 -1)
3018 /
tcp
-1399940268 | 2025-03-11T09:23:39.745894
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3050 /
tcp
1911457608 | 2025-03-13T12:36:42.819679
\x00[\x00\x00\x00\x00\x00\x00
3056 /
tcp
455076604 | 2025-03-20T03:11:54.052777
!\x07version\x04bind7 t{RPowerDNS Recursor 410
3076 /
tcp
1624217396 | 2025-03-09T18:46:11.380020
HELO:10.3.6.0.false\nAS:2048\nHL:19
3084 /
tcp
745343730 | 2025-03-14T02:57:46.779803
220 smtp.qq.com Esmtp QQ Mail Server
3096 /
tcp
-2089734047 | 2025-03-05T16:41:35.445239
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3101 /
tcp
1911457608 | 2025-03-28T15:39:35.315610
\x00[\x00\x00\x00\x00\x00\x00
3119 /
tcp
-1399940268 | 2025-03-21T08:53:17.509331
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3143 /
tcp
-2089734047 | 2025-03-16T20:21:54.979090
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3147 /
tcp
-2033111675 | 2025-03-29T22:24:07.800471
3152 /
tcp
321971019 | 2025-03-23T02:47:40.217924
-ERR client ip is not in whitelist\r
3160 /
tcp
-2089734047 | 2025-03-16T17:08:22.991786
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
971933601 | 2025-03-22T01:20:26.088659
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
-1695841648 | 2025-03-26T17:50:30.520880
HTTP/1.1 404 Not Found
Server: nginx/1.18.11011 (Ubuntu)
Content-Type: text/plain; charset=utf-8
Connection: close
-1341662640 | 2025-03-15T18:08:04.174480
HTTP/1.1 301 Moved Permanently
Server: Zope/(2.13.23, python 1.7.18, linux2) ZServer/1.1
Content-Type: text/plain; charset=utf-8
Connection: close
-1688921933 | 2025-03-03T23:14:23.449918
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 12-14878276-0 0NNN RT(1705363841143 0) q(0 -1 -1 -1) r(0 -1)
3299 /
tcp
1741579575 | 2025-03-17T00:27:48.559236
3306 /
tcp
1673132866 | 2025-03-26T02:16:00.997016
I\\x00\\x00\\x01\\xffj\\x04Host \'*.*.*.*\' is not allowed to connect to this MariaDB server
3310 /
tcp
1381121983 | 2025-02-28T09:46:11.550011
3342 /
tcp
-1835475271 | 2025-03-07T05:58:00.028471
200 NOD32SS 99 (3318497116)\r\n
3388 /
tcp
1975288991 | 2025-03-24T17:16:36.497365
3389 /
tcp
1146750585 | 2025-03-27T18:48:37.534981
Remote Desktop Protocol\n\\x03\\x00\\x00\\x13\\x0e\\xd0\\x00\\x00\\x124\\x00\\x02\\x0f\\x08\\x00\\x08\\x00\\x00\\x00\n\nFlag: PROTOCOL_HYBRID_EX\nTarget_Name: UHYPBIESUENB72Z\nProduct_Version: 6.3.9600 Ntlm 15\nOS: Windows 8.1/Windows Server 2012 R2\nNetBIOS_Domain_Name: UHYPBIESUENB72Z\nNetBIOS_Computer_Name: UHYPBIESUENB72Z\nDNS_Domain_Name: uhypbiesuenb72ze\nDNS_Computer_Name: uhypbiesuenb72ze\nSystem_Time: 2023-02-06 08:40:05 +0000 UTC\n\n
3400 /
tcp
1911457608 | 2025-03-03T20:28:35.863687
\x00[\x00\x00\x00\x00\x00\x00
3401 /
tcp
-1399940268 | 2025-03-13T16:26:25.446690
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3522 /
tcp
-122096153 | 2025-03-20T23:28:43.176855
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
3549 /
tcp
321971019 | 2025-03-10T08:23:16.442933
-ERR client ip is not in whitelist\r
198844676 | 2025-03-09T07:34:49.947629
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3554 /
tcp
-1327660293 | 2025-03-28T19:54:37.605048
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
3557 /
tcp
-1399940268 | 2025-03-20T17:30:54.869244
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3563 /
tcp
-303199180 | 2025-03-26T18:16:54.568094
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
3566 /
tcp
-1399940268 | 2025-03-29T14:50:49.675970
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3569 /
tcp
1948301213 | 2025-03-22T15:08:08.544099
RFB 003.003
VNC:
Protocol Version: 3.3
3570 /
tcp
1911457608 | 2025-03-15T09:17:43.554363
\x00[\x00\x00\x00\x00\x00\x00
3590 /
tcp
1492413928 | 2025-03-06T17:03:03.223370
SSH-2.0-OpenSSH_7.5
Vulnerabilities
3780 /
tcp
-971970408 | 2025-03-06T20:36:57.991501
3790 /
tcp
-1713437100 | 2025-03-17T03:59:35.300268
\xc3\xbf\xc3\xbb\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
3952 /
tcp
1011407350 | 2025-03-10T17:14:18.209295
* OK GroupWise IMAP4rev1 Server Ready\r\n
4022 /
tcp
-1399940268 | 2025-03-24T03:33:35.603241
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4043 /
tcp
-1399940268 | 2025-03-15T14:23:25.562868
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4063 /
tcp
2087396567 | 2025-03-21T00:50:41.237467
kjnkjabhbanc283ubcsbhdc72
4064 /
tcp
-345718689 | 2025-03-18T02:15:16.104035
4101 /
tcp
-1888448627 | 2025-03-27T08:34:21.222704
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
4150 /
tcp
1911457608 | 2025-03-10T07:34:20.247171
\x00[\x00\x00\x00\x00\x00\x00
4157 /
tcp
171352214 | 2025-03-26T18:15:53.780929
-ERR client ip is not in whitelist
-1341662640 | 2025-03-25T23:21:29.270548
HTTP/1.1 301 Moved Permanently
Server: Zope/(2.13.23, python 1.7.18, linux2) ZServer/1.1
Content-Type: text/plain; charset=utf-8
Connection: close
4282 /
tcp
2087396567 | 2025-03-24T16:58:05.077293
kjnkjabhbanc283ubcsbhdc72
4369 /
tcp
-1399940268 | 2025-03-04T03:48:50.559460
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4433 /
tcp
-1114821551 | 2025-03-25T12:15:03.181767
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
4434 /
tcp
-784071826 | 2025-03-09T14:03:37.598291
SSH-2.0-OpenSSH_8.0
Vulnerabilities
1140068775 | 2025-03-27T19:59:04.817132
HTTP/1.1 200 OK
Connection: Keep-Alive
Content-Type: text/html
X-Frame-Options: DENY
Name: VMware ESXi
FullName: VMware ESXi 6.7.0 build-8169922
Vendor: VMware, Inc.
Version: 6.7.0
Build: 8169922
LocaleVersion: INTL
LocaleBuild: 000
OsType: vmnix-x86
ProductLineId: embeddedEsx
ApiType: HostAgent
ApiVersion: 6.7
4444 /
tcp
1620329124 | 2025-03-17T23:38:58.621872
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
4445 /
tcp
-454087041 | 2025-03-06T19:44:42.140696
\x1e\xc3\x80\x010\x02\x00\xc2\xa8\xc3\xa3\x00\x00\x00\x00
4477 /
tcp
-1626979812 | 2025-03-05T22:02:58.245552
220 Service ready for new user.
4482 /
tcp
632542934 | 2025-03-05T06:05:54.999184
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
4543 /
tcp
819727972 | 2025-03-27T06:09:08.340322
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4786 /
tcp
-146605374 | 2025-03-22T08:09:29.107548
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
4840 /
tcp
819727972 | 2025-03-25T09:27:46.131627
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4949 /
tcp
-616720387 | 2025-03-28T02:49:13.621387
4999 /
tcp
-2096652808 | 2025-03-19T13:24:30.174343
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
5001 /
tcp
-971970408 | 2025-03-23T04:41:37.180753
5006 /
tcp
-971970408 | 2025-03-19T13:55:23.025614
5007 /
tcp
740837454 | 2025-03-17T16:27:58.102243
SSH-2.0-OpenSSH_5.3
Vulnerabilities
567505242 | 2025-03-12T05:13:38.283213
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae1a3c_wdx20_40557-6922
1077013874 | 2025-03-25T16:24:22.073309
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
5083 /
tcp
-358801646 | 2025-03-25T17:21:29.601356
5123 /
tcp
-585940771 | 2025-03-23T12:38:33.332527
5222 /
tcp
-358801646 | 2025-03-18T08:23:02.354333
5233 /
tcp
1830187220 | 2025-03-11T10:15:53.294940
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
5245 /
tcp
-358801646 | 2025-03-05T19:10:58.949755
5254 /
tcp
165188539 | 2025-03-26T13:15:44.957613
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
5257 /
tcp
819727972 | 2025-03-25T11:52:18.907102
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1359734371 | 2025-03-17T22:20:29.876140
HTTP/1.1 400 Bad Request
Server: CWAP-waf
Content-Type: text/html
Connection: close
WZWS-RAY: 1249-1705938451.076-w-waf01tjgt
5400 /
tcp
1332894250 | 2025-03-22T14:26:47.730908
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
-582957865 | 2025-03-16T07:43:23.899623
HTTP/1.1 404 Not Found
DATE: Fri, 19 Jan 2024 11:56:42 GMT
Connection: Keep-Alive
Server: LINUX/2.4 UPnP/1.0 BRCM400/1.0
Content-Type: text/xml; charset="utf-8"
EXT:
5432 /
tcp
1332894250 | 2025-03-09T10:09:26.549454
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
5435 /
tcp
-2096652808 | 2025-03-24T08:18:29.982488
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
5456 /
tcp
-122096153 | 2025-03-23T22:24:46.089885
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
5590 /
tcp
-1947777893 | 2025-03-06T02:28:33.859162
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
5598 /
tcp
-1888448627 | 2025-03-14T06:12:01.066103
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
5613 /
tcp
-1399940268 | 2025-03-22T11:25:14.410763
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5650 /
tcp
89142341 | 2025-03-12T19:43:24.415680
\x05\x00\x00\x00\x0b\x08\x05\x1a\x00
5672 /
tcp
575925250 | 2025-03-28T09:03:44.709935
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
5678 /
tcp
687434487 | 2025-03-12T21:28:22.903544
\\x00\\x00\\x00{\n "RPCMethod":"preinstall",\n }
5858 /
tcp
-2096652808 | 2025-03-12T23:19:32.910507
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
5904 /
tcp
1996932384 | 2025-03-19T15:47:56.410713
971933601 | 2025-03-15T04:21:30.482361
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
5938 /
tcp
-1399940268 | 2025-03-26T18:23:31.582591
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5986 /
tcp
-952165951 | 2025-03-23T22:57:13.197074
6005 /
tcp
-2089734047 | 2025-03-10T05:22:25.858348
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
6010 /
tcp
1948301213 | 2025-03-21T19:19:32.830855
RFB 003.003
VNC:
Protocol Version: 3.3
6070 /
tcp
639175818 | 2025-03-27T11:18:07.985300
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
1890184730 | 2025-03-16T03:10:18.919588
HTTP/1.1 400 Bad Request
Server: squid/3.5.20
Mime-Version: 1.0
Content-Type: text/html;charset=utf-8
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from proxyadahome4
X-Cache-Lookup: NONE from proxyadahome4:6100
Via: 1.1 proxyadahome4 (squid/3.5.20)
Connection: close
2143387245 | 2025-03-12T18:19:31.287895
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
6512 /
tcp
-2089734047 | 2025-03-06T18:56:01.298672
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
6561 /
tcp
103159425 | 2025-03-06T17:43:24.190584
6601 /
tcp
-457235091 | 2025-03-09T10:17:05.591109
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
6605 /
tcp
1911457608 | 2025-03-12T12:08:56.266961
\x00[\x00\x00\x00\x00\x00\x00
-1839934832 | 2025-03-14T08:11:10.794127
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
6668 /
tcp
-1399940268 | 2025-03-20T20:00:41.120429
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6789 /
tcp
-1598265216 | 2025-03-13T19:01:49.869438
265065882 | 2025-03-22T17:37:37.995614
HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
-211144064 | 2025-03-19T09:44:55.800774
HTTP/1.1 302 Found
Server: nginx
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
Cache-control: no-cache,must-revalidate
Location: /xiezuomao/index/login.html
7011 /
tcp
632542934 | 2025-03-28T16:26:59.841935
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
7071 /
tcp
1690634669 | 2025-03-21T04:17:02.035561
7079 /
tcp
-1399940268 | 2025-03-26T02:53:23.612764
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7171 /
tcp
1830187220 | 2025-03-21T02:39:51.053431
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
7349 /
tcp
1308377066 | 2025-03-11T20:09:16.593576
7373 /
tcp
-303199180 | 2025-03-12T09:55:25.423445
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
7415 /
tcp
1519486042 | 2025-03-28T13:02:02.320050
<KU_goodbye>Protocol Error: XML data is not well-formed.</KU_goodbye>
7433 /
tcp
819727972 | 2025-03-04T22:46:24.528771
SSH-2.0-OpenSSH_7.4
Vulnerabilities
7434 /
tcp
1690634669 | 2025-03-16T11:31:17.024223
7441 /
tcp
1911457608 | 2025-03-22T23:42:09.619301
\x00[\x00\x00\x00\x00\x00\x00
0 | 2025-03-08T15:04:48.064558
HTTP/1.1 408 Request Timeout
content-length: 0
7548 /
tcp
-1872120160 | 2025-03-12T08:40:35.080256
">Application and Content Networking Software 3.9</a>)
</BODY><
7771 /
tcp
307999478 | 2025-03-06T19:08:59.280816
unknown command \r\nunknown command \r\n
7775 /
tcp
1911457608 | 2025-03-20T15:12:52.624225
\x00[\x00\x00\x00\x00\x00\x00
1391945995 | 2025-03-27T14:16:59.621472
HTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=utf-8
Proxy-Authenticate: Basic realm=""
7822 /
tcp
-1399940268 | 2025-03-04T18:27:00.079856
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7946 /
tcp
-1399940268 | 2025-03-25T04:26:56.132420
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8000 /
tcp
-1204391172 | 2025-03-16T06:07:33.812093
2103111368 | 2025-03-10T20:01:53.018603
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
1282941221 | 2025-03-11T17:18:38.182849
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
8038 /
tcp
1911457608 | 2025-03-24T04:30:18.036407
\x00[\x00\x00\x00\x00\x00\x00
8040 /
tcp
1223115691 | 2025-03-06T19:51:42.175432
8041 /
tcp
819727972 | 2025-03-25T12:06:40.709216
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8054 /
tcp
-1399940268 | 2025-03-28T20:13:12.206744
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8061 /
tcp
-616720387 | 2025-03-17T23:39:21.688554
8068 /
tcp
-1733106930 | 2025-03-16T08:39:08.379250
Mysql Version: 5.6.50-log\nN\n5.6.50-log\x14(\nG5se"tGE\xc3\xbf\xc3\xb7-\x02\x7f\xc2\x80\x15cB^3$Zwh$wM[mysql_native_password
8081 /
tcp
2087396567 | 2025-03-05T04:24:52.549207
kjnkjabhbanc283ubcsbhdc72
8085 /
tcp
957278843 | 2025-03-08T11:28:45.975979
8089 /
tcp
-903067560 | 2025-03-18T18:55:54.543191
\x00[\x13)\xc2\x81\x7f\x00\x00
81614701 | 2025-03-09T15:09:17.312250
HTTP/1.1 200 OK
Content-Type: text/html
Accept-Ranges: bytes
Server: Microsoft-IIS/10.0
X-Powered-By: ASP.NET
-1416565584 | 2025-03-17T21:14:04.434064
HTTP/1.1 500 Internal Server Error
Content-Type: text/html
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options: nosniff
X-XSS-Protection: 1
Connection: close
8101 /
tcp
-358801646 | 2025-03-12T00:55:28.115131
8104 /
tcp
-441419608 | 2025-03-16T06:55:25.974450
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
8114 /
tcp
1911457608 | 2025-03-20T23:19:37.162002
\x00[\x00\x00\x00\x00\x00\x00
8126 /
tcp
-971970408 | 2025-03-14T17:32:19.872014
8129 /
tcp
819727972 | 2025-03-15T13:06:31.366391
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8137 /
tcp
819727972 | 2025-03-27T13:47:34.244980
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8139 /
tcp
1978059005 | 2025-03-23T12:13:51.611926
Sorry, that nickname format is invalid.
8140 /
tcp
2087396567 | 2025-03-17T22:10:50.126070
kjnkjabhbanc283ubcsbhdc72
8143 /
tcp
819727972 | 2025-03-04T19:17:34.303808
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8172 /
tcp
1541211644 | 2025-03-26T19:32:12.823053
1830697416 | 2025-03-23T00:41:46.776367
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
8194 /
tcp
-142686627 | 2025-03-23T07:08:28.674172
\x00[\xc2\xba\x7fs\x7f\x00\x00
8198 /
tcp
-2089734047 | 2025-03-14T11:24:28.306176
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8291 /
tcp
321971019 | 2025-03-29T09:20:50.006087
-ERR client ip is not in whitelist\r
8318 /
tcp
-1888448627 | 2025-03-05T03:30:08.535541
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
1335782347 | 2025-03-27T16:08:45.016552
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1705940700.09-waf02bjtp3
8384 /
tcp
2087396567 | 2025-03-27T23:25:17.896044
kjnkjabhbanc283ubcsbhdc72
8440 /
tcp
819727972 | 2025-03-20T11:58:01.642308
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8441 /
tcp
-2089734047 | 2025-03-21T16:18:48.503693
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8450 /
tcp
819727972 | 2025-03-27T18:51:39.513135
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8458 /
tcp
-1399940268 | 2025-03-14T22:53:25.354076
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8465 /
tcp
-2096652808 | 2025-03-03T21:33:23.477322
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8470 /
tcp
-1097188123 | 2025-03-27T19:40:52.934130
8472 /
tcp
-1996280214 | 2025-03-07T01:46:32.976292
8494 /
tcp
-1399940268 | 2025-03-25T20:03:02.602630
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1652191202 | 2025-03-03T22:04:05.840211
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae296b_PS-NTG-014eQ157_14943-13699
8528 /
tcp
-1399940268 | 2025-03-18T19:58:20.909463
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8557 /
tcp
1911457608 | 2025-03-08T16:51:42.858632
\x00[\x00\x00\x00\x00\x00\x00
8570 /
tcp
45131230 | 2025-03-23T14:14:21.915810
inv2W\x04\x0f\x00\x00\x00\x01\x00\t\x00\x00\x00
8597 /
tcp
1504401647 | 2025-03-21T18:45:53.813454
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
8622 /
tcp
-2017887953 | 2025-03-13T12:57:07.145223
SSH-2.0-OpenSSH_7.9
Vulnerabilities
8663 /
tcp
819727972 | 2025-03-11T07:35:24.555854
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-179406756 | 2025-03-20T16:55:41.884270
HTTP/1.1 403 Forbidden
Server: openresty
Content-Type: text/html
Connection: keep-alive
Deny-Reason: hotload rechange server uri format error!!
Request-Id: 65ab596aa2acf9750116c4fabd5eefaf
8784 /
tcp
1911457608 | 2025-03-26T20:27:20.024649
\x00[\x00\x00\x00\x00\x00\x00
8806 /
tcp
-1399940268 | 2025-03-20T07:10:26.579863
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8812 /
tcp
-345718689 | 2025-03-21T12:23:53.080435
8820 /
tcp
-1399940268 | 2025-03-05T17:57:04.431613
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8824 /
tcp
-339084706 | 2025-03-07T16:07:49.513894
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
8834 /
tcp
2087396567 | 2025-03-15T01:27:53.423062
kjnkjabhbanc283ubcsbhdc72
8836 /
tcp
1911457608 | 2025-03-11T18:56:48.123114
\x00[\x00\x00\x00\x00\x00\x00
8837 /
tcp
103159425 | 2025-03-16T21:32:25.159887
8842 /
tcp
1911457608 | 2025-03-20T09:21:59.152205
\x00[\x00\x00\x00\x00\x00\x00
8845 /
tcp
599074451 | 2025-03-22T09:47:12.883348
8856 /
tcp
-1399940268 | 2025-03-28T09:35:52.079580
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8870 /
tcp
-2046514463 | 2025-03-08T17:30:17.980372
8889 /
tcp
-358801646 | 2025-03-18T14:27:29.915303
372433470 | 2025-03-29T12:09:58.291732
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
8935 /
tcp
-1399940268 | 2025-03-25T07:42:59.854290
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9000 /
tcp
1119676909 | 2025-03-19T05:51:49.228351
M\\xc4\xc5\xb1\\xfa\\xde\\xc8)W\\xad\\xaf\\xb8\\xb5\\x05\\x89\\x9f\\xa2\\x82\\xf2j7
9002 /
tcp
-792826324 | 2025-03-11T03:40:02.478877
220 FTP server ready - login please
9004 /
tcp
-1399940268 | 2025-03-21T20:59:34.470330
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9006 /
tcp
401555314 | 2025-03-03T22:13:22.494054
-1453516345 | 2025-03-29T14:42:26.615591
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
9015 /
tcp
307999478 | 2025-03-19T05:56:34.507135
unknown command \r\nunknown command \r\n
9026 /
tcp
1975288991 | 2025-03-22T13:28:18.184747
9036 /
tcp
-1888448627 | 2025-03-24T21:08:18.662217
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9037 /
tcp
-1888448627 | 2025-03-21T09:09:51.275429
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9042 /
tcp
1741579575 | 2025-03-24T14:58:02.750395
9043 /
tcp
1911457608 | 2025-03-20T07:05:48.517142
\x00[\x00\x00\x00\x00\x00\x00
9051 /
tcp
-893477759 | 2025-03-19T05:48:03.163938
!versionbind7 t{RPowerDNS Recursor 410
9053 /
tcp
-1730858130 | 2025-03-17T13:56:26.931531
RFB 003.008
VNC:
Protocol Version: 3.8
9059 /
tcp
-1099385124 | 2025-03-27T20:38:03.351373
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
9065 /
tcp
-1329831334 | 2025-03-29T10:19:26.411098
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
9087 /
tcp
1911457608 | 2025-03-24T14:37:51.794597
\x00[\x00\x00\x00\x00\x00\x00
9091 /
tcp
2087396567 | 2025-03-19T23:38:39.941996
kjnkjabhbanc283ubcsbhdc72
9092 /
tcp
-1139539254 | 2025-03-19T20:14:27.068545
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
9095 /
tcp
957278843 | 2025-03-11T19:42:11.405698
9096 /
tcp
-1538260461 | 2025-03-12T07:14:35.999058
9097 /
tcp
-1399940268 | 2025-03-25T23:25:37.184113
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1013082686 | 2025-03-25T15:42:39.991528
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
9123 /
tcp
-1399940268 | 2025-03-11T05:46:46.651033
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9135 /
tcp
-1399940268 | 2025-03-05T08:56:30.765354
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9138 /
tcp
819727972 | 2025-02-28T09:59:37.060746
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9140 /
tcp
-1114821551 | 2025-03-20T01:38:17.379902
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
9141 /
tcp
819727972 | 2025-03-14T22:06:58.029237
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9151 /
tcp
-1887823886 | 2025-03-27T23:35:36.969418
K%~)J/\tHjU(IAGENT = (AGENT_VERSION = 2388790170)(RPC_VERSION = 5..722))
9160 /
tcp
-2096652808 | 2025-03-06T11:48:39.334442
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
9172 /
tcp
-1327660293 | 2025-03-05T00:25:06.168226
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
9177 /
tcp
1911457608 | 2025-03-29T20:15:16.894074
\x00[\x00\x00\x00\x00\x00\x00
2103111368 | 2025-03-04T13:53:17.407434
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
9203 /
tcp
-1611764932 | 2025-02-28T08:49:42.082251
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
9209 /
tcp
1911457608 | 2025-03-10T09:17:32.698698
\x00[\x00\x00\x00\x00\x00\x00
9223 /
tcp
1996932384 | 2025-03-08T18:03:13.438913
9243 /
tcp
119860953 | 2025-03-17T21:04:14.521684
* OK ArGoSoft Mail Server IMAP Module v.YW at
9245 /
tcp
-2080784861 | 2025-02-28T22:34:25.311987
GBPK\xc3\xbb\xc3\xb7n\xc2\x93W\xc2\xaf\xc2\x86\xc2\x93x@\xc2\xa9\x0e\xc3\x8a*\xc2\x9bS\x00
9256 /
tcp
1665283070 | 2025-03-10T19:17:09.917798
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x01\x00\x00\x10\x00\x00\n0\x03\x00\x00\x00\x01\x00\x05\x00\x00@\x00\x00\x06\x00\x00\x1f@
9306 /
tcp
-1399940268 | 2025-03-28T19:12:42.868824
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1282941221 | 2025-03-17T19:04:35.118619
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
9333 /
tcp
1308377066 | 2025-03-29T13:29:58.807299
9350 /
tcp
-1888448627 | 2025-03-27T12:30:40.652594
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
-1839934832 | 2025-03-17T01:43:27.373551
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
9418 /
tcp
-1036370807 | 2025-03-23T19:58:54.251261
9441 /
tcp
1541211644 | 2025-03-12T15:01:28.578733
9443 /
tcp
-1713437100 | 2025-03-21T21:50:48.980611
\xc3\xbf\xc3\xbb\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
9480 /
tcp
-1327660293 | 2025-03-10T04:12:04.031305
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
9530 /
tcp
-1399940268 | 2025-03-12T08:32:33.382371
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1839934832 | 2025-03-07T18:39:31.661729
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
9633 /
tcp
1921398876 | 2025-03-26T17:39:35.198743
ÿý"
LinuxNode v06953 (ggfks)
login:
9658 /
tcp
1492413928 | 2025-03-20T01:19:11.698760
SSH-2.0-OpenSSH_7.5
Vulnerabilities
9682 /
tcp
165188539 | 2025-03-19T11:29:55.377874
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9761 /
tcp
-2096652808 | 2025-03-06T09:47:34.428941
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1127011450 | 2025-03-26T11:09:32.017138
HTTP/1.1 200
Vary: Origin
Vary: Access-Control-Request-Method
Vary: Access-Control-Request-Headers
Accept-Ranges: bytes
Content-Type: text/html;charset=utf-8
Content-Language: en
9908 /
tcp
-1399940268 | 2025-03-28T22:40:28.438874
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9916 /
tcp
-1399940268 | 2025-03-17T20:02:57.930749
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9955 /
tcp
1911457608 | 2025-03-24T07:58:58.467945
\x00[\x00\x00\x00\x00\x00\x00
9997 /
tcp
-1399940268 | 2025-03-17T02:43:02.202255
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1637038794 | 2025-02-28T08:59:15.288860
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2521_PS-PEK-015Wj25_25111-50596
9999 /
tcp
1161309183 | 2025-03-26T22:19:40.414791
-2107996212 | 2025-03-15T06:08:12.693995
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
10001 /
tcp
1492413928 | 2025-03-16T20:16:25.698913
SSH-2.0-OpenSSH_7.5
Vulnerabilities
10015 /
tcp
1911457608 | 2025-03-24T02:24:56.637039
\x00[\x00\x00\x00\x00\x00\x00
10018 /
tcp
165188539 | 2025-03-08T11:51:11.662643
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
10023 /
tcp
-1888448627 | 2025-03-08T13:40:38.722613
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
10027 /
tcp
1996932384 | 2025-03-29T10:40:40.282956
10033 /
tcp
-1373613804 | 2025-03-11T19:35:53.794579
00970795:d7:smethod,6:shello,8:soptions,80:d10:shttp_port,368696:i1082,5:sname,5:sL_x,10:ssync_port,5:i00469,10:stimestamp,3190459:f920.7251553166,8:sversion,6262522:sl4X,
10040 /
tcp
-142686627 | 2025-03-05T16:23:17.997747
\x00[\xc2\xba\x7fs\x7f\x00\x00
10066 /
tcp
-1399940268 | 2025-03-11T19:51:35.060754
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10071 /
tcp
-2089734047 | 2025-03-20T03:47:29.919196
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
10210 /
tcp
-2089734047 | 2025-03-17T14:39:03.827014
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
10255 /
tcp
321971019 | 2025-03-29T12:20:20.942185
-ERR client ip is not in whitelist\r
10283 /
tcp
-1114821551 | 2025-03-21T17:42:01.549617
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
10390 /
tcp
-358801646 | 2025-03-03T21:29:55.345632
10911 /
tcp
-1626979812 | 2025-03-09T19:58:02.251486
220 Service ready for new user.
10936 /
tcp
103159425 | 2025-03-15T02:20:57.868143
11000 /
tcp
493955023 | 2025-03-03T18:30:36.751753
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
11112 /
tcp
1623746877 | 2025-03-19T05:53:15.087808
500 Permission denied - closing connection.\r\n
11210 /
tcp
321971019 | 2025-03-04T19:49:39.476661
-ERR client ip is not in whitelist\r
11288 /
tcp
-1399940268 | 2025-03-21T22:38:51.779379
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12000 /
tcp
-142852466 | 2025-03-15T19:50:18.243858
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.11\r\n
12118 /
tcp
819727972 | 2025-03-04T19:00:46.163524
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12133 /
tcp
-2096652808 | 2025-03-08T16:51:08.288661
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12136 /
tcp
-2089734047 | 2025-03-14T13:00:19.771707
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12140 /
tcp
1189133115 | 2025-03-23T10:12:38.046468
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
12150 /
tcp
-2096652808 | 2025-03-28T11:44:29.646880
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12155 /
tcp
677934968 | 2025-03-24T16:38:23.954322
12172 /
tcp
-1626979812 | 2025-03-08T15:33:50.169497
220 Service ready for new user.
12190 /
tcp
-2089734047 | 2025-03-24T11:45:45.273529
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12205 /
tcp
-903067560 | 2025-03-15T20:10:09.606383
\x00[\x13)\xc2\x81\x7f\x00\x00
12207 /
tcp
-1598265216 | 2025-03-20T10:18:52.427218
12208 /
tcp
-1598265216 | 2025-03-21T18:52:43.968312
12209 /
tcp
1632932802 | 2025-03-10T02:57:44.042746
12211 /
tcp
-345718689 | 2025-03-17T14:41:28.597988
12223 /
tcp
-1399940268 | 2025-03-14T22:21:41.083027
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12249 /
tcp
-1888448627 | 2025-03-12T17:37:34.047220
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12250 /
tcp
-784071826 | 2025-03-24T20:34:04.894894
SSH-2.0-OpenSSH_8.0
Vulnerabilities
12254 /
tcp
1519486042 | 2025-03-19T06:33:28.418964
<KU_goodbye>Protocol Error: XML data is not well-formed.</KU_goodbye>
12287 /
tcp
1763259671 | 2025-03-13T17:13:22.885788
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
12288 /
tcp
-1399940268 | 2025-03-14T14:27:33.240845
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12293 /
tcp
-136006866 | 2025-03-28T19:34:33.297675
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
12296 /
tcp
-1399940268 | 2025-03-09T08:56:17.181629
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12308 /
tcp
-1888448627 | 2025-03-28T01:14:44.894126
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12314 /
tcp
-375604792 | 2025-03-23T10:49:01.997412
220 Microsoft FTP Service
878900329 | 2025-03-22T04:32:19.425009
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae24ba_PStjkgwtss75_22411-43255
12347 /
tcp
-1538260461 | 2025-03-17T20:24:07.200424
12391 /
tcp
819727972 | 2025-03-10T21:36:03.168526
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12393 /
tcp
1911457608 | 2025-03-16T00:26:14.535768
\x00[\x00\x00\x00\x00\x00\x00
12402 /
tcp
-1399940268 | 2025-03-17T01:54:32.771332
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12416 /
tcp
819727972 | 2025-03-23T21:59:10.970795
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12420 /
tcp
-1399940268 | 2025-03-16T02:24:42.121638
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12439 /
tcp
1624217396 | 2025-02-28T13:41:07.973545
HELO:10.3.6.0.false\nAS:2048\nHL:19
12445 /
tcp
-1265999252 | 2025-03-21T05:16:14.442903
220 VMware Authentication Daemon Version 1.0, ServerDaemonProto\ncol:SOAP, MKSDisplayProtocol:VNC , ,
12466 /
tcp
-407828767 | 2025-03-22T11:18:59.610910
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
12479 /
tcp
-1730858130 | 2025-03-26T20:48:28.144620
RFB 003.008
VNC:
Protocol Version: 3.8
12481 /
tcp
-1261090339 | 2025-03-13T13:29:22.718124
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
12483 /
tcp
401555314 | 2025-03-16T17:48:27.982442
12488 /
tcp
-1399940268 | 2025-03-19T00:09:18.559026
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1013082686 | 2025-03-16T19:04:30.745872
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
12495 /
tcp
-2096652808 | 2025-03-22T01:04:33.411991
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12502 /
tcp
-1261090339 | 2025-03-23T12:35:13.780707
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
12507 /
tcp
103159425 | 2025-03-14T22:57:23.666503
12519 /
tcp
321971019 | 2025-02-28T11:40:51.839536
-ERR client ip is not in whitelist\r
12522 /
tcp
1911457608 | 2025-03-18T11:11:59.284205
\x00[\x00\x00\x00\x00\x00\x00
12543 /
tcp
-1810987450 | 2025-03-24T00:21:26.997806
12548 /
tcp
820958131 | 2025-03-29T22:28:28.214265
kjnkjabhbanc283ubcsbhdc72\x02
12550 /
tcp
-1626979812 | 2025-03-17T20:01:00.022969
220 Service ready for new user.
12556 /
tcp
-1626979812 | 2025-03-06T19:56:34.371304
220 Service ready for new user.
12574 /
tcp
-1888448627 | 2025-03-18T21:20:15.173360
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12576 /
tcp
-904840257 | 2025-03-08T16:44:23.037724
572 Relay not authorized\r\n
12578 /
tcp
-339084706 | 2025-03-06T18:12:01.972088
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
12585 /
tcp
-1810987450 | 2025-03-29T10:53:57.035722
12615 /
tcp
-1888448627 | 2025-03-27T12:29:55.396497
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
13047 /
tcp
-2096652808 | 2025-03-27T08:23:56.389323
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
14147 /
tcp
819727972 | 2025-03-17T16:50:11.743829
SSH-2.0-OpenSSH_7.4
Vulnerabilities
14330 /
tcp
-1261090339 | 2025-03-17T01:12:49.890866
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
14401 /
tcp
-1399940268 | 2025-03-16T05:51:59.488108
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
14895 /
tcp
921225407 | 2025-03-25T10:24:41.483013
\x00\x00\x00\x04\x00\x00\x00\x00\x00
14901 /
tcp
740837454 | 2025-03-15T06:57:41.548674
SSH-2.0-OpenSSH_5.3
Vulnerabilities
15151 /
tcp
-1888448627 | 2025-03-17T19:13:45.962262
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
15443 /
tcp
-1730858130 | 2025-03-14T05:31:03.064802
RFB 003.008
VNC:
Protocol Version: 3.8
16000 /
tcp
665929633 | 2025-03-11T02:27:51.968749
<MSG>;88888;99998;</MSG>\r
-1013082686 | 2025-03-10T22:29:06.517288
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
16054 /
tcp
-2089734047 | 2025-03-27T16:25:32.516426
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
16063 /
tcp
1543809371 | 2025-03-12T17:43:56.855606
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
16066 /
tcp
-1626979812 | 2025-03-09T20:09:13.359724
220 Service ready for new user.
16070 /
tcp
1919228981 | 2025-03-16T18:24:11.145178
\x00\x1e\x00\x06\xc2\x81\xc2\x85\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
16077 /
tcp
-1399940268 | 2025-03-16T17:29:34.742399
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16079 /
tcp
-1399940268 | 2025-03-17T17:29:24.883638
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16090 /
tcp
-1399940268 | 2025-03-17T00:31:48.081163
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16100 /
tcp
1911457608 | 2025-03-12T18:47:16.677301
\x00[\x00\x00\x00\x00\x00\x00
16103 /
tcp
-1713437100 | 2025-03-04T23:52:45.830682
\xc3\xbf\xc3\xbb\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
16104 /
tcp
165188539 | 2025-03-16T21:10:53.897842
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
16464 /
tcp
-1810987450 | 2025-03-21T00:21:03.325371
16993 /
tcp
-1730858130 | 2025-03-22T16:34:39.759067
RFB 003.008
VNC:
Protocol Version: 3.8
17020 /
tcp
669849225 | 2025-03-16T12:22:56.716882
SSH-98.60-SysaxSSH_81885..42\r\n
18009 /
tcp
1381121983 | 2025-03-26T00:45:52.833010
18014 /
tcp
-2017887953 | 2025-03-23T17:19:47.016034
SSH-2.0-OpenSSH_7.9
Vulnerabilities
18021 /
tcp
-1399940268 | 2025-03-27T14:38:46.295076
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18032 /
tcp
-1399940268 | 2025-03-10T21:27:22.185284
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18037 /
tcp
1726594447 | 2025-03-29T03:07:47.800142
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
-221994463 | 2025-03-22T03:51:00.984375
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65a1141a_PSfjfzdx2wz88_26408-22109
18041 /
tcp
-1476017887 | 2025-02-28T07:04:08.594695
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
18051 /
tcp
-445721795 | 2025-03-29T09:42:38.797989
\x00[\xc3\xaed\x1a\x7f\x00\x00
18067 /
tcp
1948301213 | 2025-03-13T06:18:28.313116
RFB 003.003
VNC:
Protocol Version: 3.3
18069 /
tcp
-1327660293 | 2025-03-29T08:52:34.560695
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
18080 /
tcp
-1316491703 | 2025-03-17T16:14:53.959175
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready
18081 /
tcp
-1514525820 | 2025-03-17T07:10:45.659046
Protocol version mismatch
-2107996212 | 2025-03-04T21:08:49.625451
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
18105 /
tcp
819727972 | 2025-03-16T09:08:17.899138
SSH-2.0-OpenSSH_7.4
Vulnerabilities
18181 /
tcp
-1399940268 | 2025-03-15T21:57:33.484097
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18182 /
tcp
-2089734047 | 2025-03-10T09:23:25.641985
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
18245 /
tcp
-1399940268 | 2025-03-15T01:05:09.647665
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18443 /
tcp
-971970408 | 2025-03-15T10:54:50.570670
1282941221 | 2025-03-14T12:45:28.440324
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
19016 /
tcp
819727972 | 2025-03-13T11:28:12.478855
SSH-2.0-OpenSSH_7.4
Vulnerabilities
19930 /
tcp
1741579575 | 2025-03-26T17:48:24.675247
1900503736 | 2025-03-27T02:14:16.253828
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-HTTPAPI/2.0
20018 /
tcp
819727972 | 2025-03-27T11:59:18.825135
SSH-2.0-OpenSSH_7.4
Vulnerabilities
20020 /
tcp
-1947777893 | 2025-03-25T17:40:44.685848
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
20087 /
tcp
808560482 | 2025-03-26T12:55:11.146855
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP
: USERID : UNIX : Cr8
20100 /
tcp
-1399940268 | 2025-03-06T10:11:52.195638
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
20256 /
tcp
-314039103 | 2025-03-26T22:34:16.115252
Surnom.
Sorry, that nickname format is invalid.
20547 /
tcp
-527005584 | 2025-03-24T00:49:45.032405
20880 /
tcp
1370263973 | 2025-03-26T23:43:05.742151
21025 /
tcp
171352214 | 2025-03-22T05:44:17.496656
-ERR client ip is not in whitelist
21200 /
tcp
-1996280214 | 2025-03-22T07:58:07.430194
21231 /
tcp
819727972 | 2025-03-25T14:17:02.322604
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21251 /
tcp
1911457608 | 2025-03-29T20:07:26.000340
\x00[\x00\x00\x00\x00\x00\x00
21257 /
tcp
1011407350 | 2025-03-14T00:35:43.419710
* OK GroupWise IMAP4rev1 Server Ready\r\n
21259 /
tcp
819727972 | 2025-03-16T11:53:17.234600
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21261 /
tcp
819727972 | 2025-03-09T19:22:17.099329
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21269 /
tcp
937756010 | 2025-03-26T21:29:28.856609
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x01\x00\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
21296 /
tcp
-1477838366 | 2025-03-09T23:35:29.111630
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
21298 /
tcp
-407828767 | 2025-03-20T07:18:47.472325
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
21326 /
tcp
205347087 | 2025-03-20T00:36:37.406062
SSH-25453-Cisco-3524665.35\n
21379 /
tcp
-2089734047 | 2025-02-28T14:26:49.696749
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
22001 /
tcp
410249975 | 2025-03-27T21:29:06.683398
22067 /
tcp
2087396567 | 2025-03-27T17:53:18.963095
kjnkjabhbanc283ubcsbhdc72
22403 /
tcp
1911457608 | 2025-03-05T12:30:43.929337
\x00[\x00\x00\x00\x00\x00\x00
23023 /
tcp
539065883 | 2025-03-23T22:59:33.993397
24245 /
tcp
546151771 | 2025-03-14T14:20:21.737736
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
24442 /
tcp
-1399940268 | 2025-03-22T01:50:43.408106
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
25001 /
tcp
-1648456501 | 2025-03-19T12:33:44.372264
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
25004 /
tcp
1332894250 | 2025-03-26T13:10:54.292464
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
-1839934832 | 2025-03-27T11:52:17.469636
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
25082 /
tcp
-805362002 | 2025-03-12T05:16:00.759220
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
25105 /
tcp
-971970408 | 2025-03-22T21:59:42.498354
25952 /
tcp
366084633 | 2025-03-06T19:43:41.904331
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
26656 /
tcp
1426971893 | 2025-03-29T00:25:19.900602
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
26657 /
tcp
2087396567 | 2025-03-28T03:38:47.156796
kjnkjabhbanc283ubcsbhdc72
27015 /
tcp
-1316491703 | 2025-03-25T12:43:20.940633
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready
27036 /
tcp
1741579575 | 2025-03-25T09:05:38.725331
28015 /
tcp
-345718689 | 2025-03-21T12:32:48.649110
30002 /
tcp
-1681927087 | 2025-03-12T09:04:38.760299
kjnkjabhbanc283ubcsbhdc72
30003 /
tcp
-1914935523 | 2025-03-28T11:33:48.502152
30017 /
tcp
-2089734047 | 2025-03-17T16:13:35.414959
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
30022 /
tcp
2087396567 | 2025-03-18T22:41:35.789566
kjnkjabhbanc283ubcsbhdc72
30112 /
tcp
921225407 | 2025-03-23T03:50:18.879557
\x00\x00\x00\x04\x00\x00\x00\x00\x00
30122 /
tcp
-1189269828 | 2025-03-19T20:35:38.308193
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
30322 /
tcp
-971970408 | 2025-03-24T13:58:49.168576
30422 /
tcp
2087396567 | 2025-03-26T08:01:13.885480
kjnkjabhbanc283ubcsbhdc72
30722 /
tcp
1991883981 | 2025-03-13T13:51:43.455158
B\x00\x00\x00\xc3\xbfn\x04Too many connections
30822 /
tcp
-1148066627 | 2025-03-26T02:42:51.299480
\x00[\xc2\x84\xc2\x86\xc3\xb2\x7f\x00\x00
30922 /
tcp
1542849631 | 2025-03-20T22:38:28.401811
* OK [CAPABILITY a2,M\] nBwXk2pPP IMAP4rev1 20qx at
31001 /
tcp
921225407 | 2025-03-27T12:15:19.076614
\x00\x00\x00\x04\x00\x00\x00\x00\x00
31122 /
tcp
-358801646 | 2025-03-09T12:50:28.370770
31210 /
tcp
1911457608 | 2025-03-19T09:51:45.620812
\x00[\x00\x00\x00\x00\x00\x00
31222 /
tcp
539065883 | 2025-03-24T02:35:06.707335
31322 /
tcp
819727972 | 2025-03-25T05:36:52.174932
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-147424911 | 2025-03-08T18:05:46.697096
HTTP/1.1 404 Not Found
Content Length: 0
31443 /
tcp
819727972 | 2025-03-28T19:40:01.600696
SSH-2.0-OpenSSH_7.4
Vulnerabilities
31522 /
tcp
2087396567 | 2025-03-23T11:58:07.520742
kjnkjabhbanc283ubcsbhdc72
31622 /
tcp
2087396567 | 2025-03-23T11:11:14.108485
kjnkjabhbanc283ubcsbhdc72
31722 /
tcp
-971970408 | 2025-03-12T21:44:01.865789
31822 /
tcp
-358801646 | 2025-03-20T19:23:54.277261
32122 /
tcp
-2033111675 | 2025-03-20T03:29:38.137040
32322 /
tcp
1761482307 | 2025-03-09T18:24:39.183907
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
32400 /
tcp
2087396567 | 2025-03-23T15:52:47.284633
kjnkjabhbanc283ubcsbhdc72
32522 /
tcp
2087396567 | 2025-03-22T04:34:11.447368
kjnkjabhbanc283ubcsbhdc72
32622 /
tcp
1161309183 | 2025-03-21T03:55:15.947019
32722 /
tcp
-1999117212 | 2025-03-11T16:35:53.071412
32764 /
tcp
1690634669 | 2025-03-21T00:36:27.252460
1077013874 | 2025-03-28T19:55:26.175966
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
32822 /
tcp
-438503381 | 2025-03-23T03:54:04.011303
WORLD OF WARCRAFT CONNECTION - SERVER TO CLIENT - V2
32922 /
tcp
2087396567 | 2025-03-23T02:38:36.519616
kjnkjabhbanc283ubcsbhdc72
33022 /
tcp
2087396567 | 2025-03-23T00:24:03.718558
kjnkjabhbanc283ubcsbhdc72
33060 /
tcp
-1031019485 | 2025-03-18T17:34:28.332407
33122 /
tcp
1620329124 | 2025-03-22T22:37:52.852114
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
33422 /
tcp
-971970408 | 2025-03-19T17:08:07.980684
33522 /
tcp
819727972 | 2025-03-20T17:36:16.698625
SSH-2.0-OpenSSH_7.4
Vulnerabilities
33822 /
tcp
-2031152423 | 2025-03-08T13:31:38.806803
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
34022 /
tcp
1741579575 | 2025-03-20T17:31:02.260960
34322 /
tcp
1212921144 | 2025-03-19T18:47:11.731260
34422 /
tcp
-746114901 | 2025-03-15T01:07:55.917815
34622 /
tcp
-971970408 | 2025-03-19T10:00:57.868322
34822 /
tcp
1308377066 | 2025-03-03T22:25:51.891244
34922 /
tcp
808560482 | 2025-03-18T20:06:44.691645
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP
: USERID : UNIX : Cr8
35000 /
tcp
1504401647 | 2025-03-21T17:26:00.363518
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
35122 /
tcp
1286504516 | 2025-03-19T01:18:24.336427
CP2E Control Console
Connected to Host: gZI
35250 /
tcp
-1399940268 | 2025-03-26T22:46:08.128267
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
35322 /
tcp
-358801646 | 2025-03-04T05:42:55.508260
35422 /
tcp
-971970408 | 2025-03-18T23:37:34.913282
35522 /
tcp
819727972 | 2025-03-04T03:55:51.901345
SSH-2.0-OpenSSH_7.4
Vulnerabilities
35531 /
tcp
-2089734047 | 2025-03-28T22:30:54.681207
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
35622 /
tcp
1189133115 | 2025-03-18T08:05:41.042503
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
35722 /
tcp
819727972 | 2025-03-17T10:45:27.904339
SSH-2.0-OpenSSH_7.4
Vulnerabilities
35822 /
tcp
1161309183 | 2025-03-17T18:07:00.448151
35922 /
tcp
-1730858130 | 2025-03-16T22:47:22.688951
RFB 003.008
VNC:
Protocol Version: 3.8
36322 /
tcp
-952165951 | 2025-03-17T15:20:41.549966
36622 /
tcp
-971970408 | 2025-03-16T07:58:38.668683
36822 /
tcp
-358801646 | 2025-03-18T15:32:27.454220
36922 /
tcp
-68075478 | 2025-03-18T13:13:20.751474
36983 /
tcp
-1248408558 | 2025-03-10T16:14:41.625885
220 MikroTik FTP server (MikroTik 6.44.3) ready
37122 /
tcp
-971970408 | 2025-03-16T23:31:40.710672
37215 /
tcp
1690634669 | 2025-03-21T10:53:58.675186
1830697416 | 2025-03-14T20:02:19.159194
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
37622 /
tcp
422524323 | 2025-03-16T03:28:54.242456
{
"Version": "3.4.18",
"VersionArray": [
3,
4,
18,
0
],
"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",
"OpenSSLVersion": "",
"SysInfo": "",
"Bits": 64,
"Debug": false,
"MaxObjectSize": 16777216
}
2143387245 | 2025-03-19T01:57:15.044670
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
37822 /
tcp
819727972 | 2025-02-28T03:16:44.758502
SSH-2.0-OpenSSH_7.4
Vulnerabilities
38222 /
tcp
2087396567 | 2025-03-10T21:12:08.252851
kjnkjabhbanc283ubcsbhdc72
38333 /
tcp
841014058 | 2025-03-15T21:13:58.176211
Hello, this is FRRouting (version 4.0).
Copyright 19
96-2005 Kunihiro Ishiguro, et al.
Use...
38522 /
tcp
2087396567 | 2025-03-14T00:11:53.104651
kjnkjabhbanc283ubcsbhdc72
38622 /
tcp
2087396567 | 2025-03-14T09:15:16.897894
kjnkjabhbanc283ubcsbhdc72
38722 /
tcp
1286504516 | 2025-03-13T22:35:46.723237
CP2E Control Console
Connected to Host: gZI
38822 /
tcp
1842524259 | 2025-03-12T16:24:34.112150
40022 /
tcp
745343730 | 2025-03-09T11:33:39.983177
220 smtp.qq.com Esmtp QQ Mail Server
40070 /
tcp
1911457608 | 2025-03-19T15:43:38.243838
\x00[\x00\x00\x00\x00\x00\x00
40322 /
tcp
-971970408 | 2025-03-08T21:33:27.184572
41443 /
tcp
671605376 | 2025-03-28T07:10:46.391903
41794 /
tcp
539065883 | 2025-03-23T21:13:24.821886
41800 /
tcp
740837454 | 2025-03-23T00:25:50.783565
SSH-2.0-OpenSSH_5.3
Vulnerabilities
42922 /
tcp
841014058 | 2025-02-28T15:39:19.535325
Hello, this is FRRouting (version 4.0).
Copyright 19
96-2005 Kunihiro Ishiguro, et al.
Use...
1282941221 | 2025-03-13T02:49:18.447055
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
44158 /
tcp
-433302150 | 2025-03-17T05:38:18.552472
44332 /
tcp
398077695 | 2025-03-20T12:28:38.787843
44336 /
tcp
-1399940268 | 2025-02-28T22:39:13.082870
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
44350 /
tcp
-2089734047 | 2025-03-26T20:07:54.552916
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
44410 /
tcp
-1399940268 | 2025-03-20T01:41:53.270055
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
44818 /
tcp
-1626979812 | 2025-03-24T20:44:34.069400
220 Service ready for new user.
45677 /
tcp
-1733645023 | 2025-03-22T19:55:14.666364
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
45788 /
tcp
-345718689 | 2025-03-12T00:13:50.044944
45821 /
tcp
819727972 | 2025-03-12T02:06:53.205038
SSH-2.0-OpenSSH_7.4
Vulnerabilities
47990 /
tcp
1778988322 | 2025-03-14T06:49:07.600060
* OK GroupWise IMAP4rev1 Server Ready
48019 /
tcp
-2089734047 | 2025-03-14T19:08:07.683753
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
48322 /
tcp
539065883 | 2025-03-10T02:28:24.460705
48522 /
tcp
-68075478 | 2025-03-09T23:21:29.818424
49153 /
tcp
-1900404274 | 2025-03-22T13:56:14.013257
49501 /
tcp
-1399940268 | 2025-03-11T22:32:24.763770
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50000 /
tcp
1741579575 | 2025-03-22T11:01:51.017332
50050 /
tcp
597764502 | 2025-03-16T13:28:44.595381
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
50070 /
tcp
1278527606 | 2025-03-22T00:44:00.993686
50080 /
tcp
1308377066 | 2025-03-04T10:04:31.122340
50100 /
tcp
-1136600457 | 2025-03-24T21:22:41.169699
HELO:10.3.6.0.false
AS:2048
HL:19
50101 /
tcp
-1399940268 | 2025-03-24T11:13:07.751729
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50104 /
tcp
669849225 | 2025-03-06T17:17:30.911142
SSH-98.60-SysaxSSH_81885..42\r\n
50105 /
tcp
-1399940268 | 2025-03-28T20:50:21.847204
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
51000 /
tcp
51259122 | 2025-03-15T06:47:33.305660
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
51106 /
tcp
1690634669 | 2025-03-29T20:41:59.775930
51235 /
tcp
2087396567 | 2025-03-21T17:43:24.719433
kjnkjabhbanc283ubcsbhdc72
51434 /
tcp
1541211644 | 2025-03-24T10:01:54.087087
51443 /
tcp
819727972 | 2025-03-12T03:29:47.813917
SSH-2.0-OpenSSH_7.4
Vulnerabilities
52230 /
tcp
-1795027372 | 2025-03-21T21:11:58.920267
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
52536 /
tcp
-438503381 | 2025-03-22T01:53:23.630383
WORLD OF WARCRAFT CONNECTION - SERVER TO CLIENT - V2
-1072158793 | 2025-03-21T14:16:23.631872
HTTP/1.1 500 Internal Server Error
SERVER: Linux/2.6.21.5, UPnP/1.0, Portable SDK for UPnP devices/1.6.6
CONNECTION: close
CONTENT-LENGTH: 60
CONTENT-TYPE: text/html
53413 /
tcp
-971970408 | 2025-03-22T02:25:28.167341
54327 /
tcp
1911457608 | 2025-03-16T04:07:39.387051
\x00[\x00\x00\x00\x00\x00\x00
55350 /
tcp
1989907056 | 2025-03-22T09:31:42.578084
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
55442 /
tcp
1690634669 | 2025-03-29T22:25:20.384629
55470 /
tcp
307999478 | 2025-03-24T12:45:40.084090
unknown command \r\nunknown command \r\n
55522 /
tcp
957278843 | 2025-03-06T23:16:39.023503
55553 /
tcp
2087396567 | 2025-03-29T05:22:24.847751
kjnkjabhbanc283ubcsbhdc72
55622 /
tcp
751496153 | 2025-03-06T16:53:57.780638
* OK TeamXchange IMAP4rev1 server (otyUg) ready.
57022 /
tcp
2087396567 | 2025-03-06T14:55:50.054549
kjnkjabhbanc283ubcsbhdc72
57784 /
tcp
-1888448627 | 2025-03-13T14:39:31.087128
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
57922 /
tcp
-1681927087 | 2025-03-06T04:50:15.952117
kjnkjabhbanc283ubcsbhdc72
58122 /
tcp
2087396567 | 2025-03-06T03:06:03.933268
kjnkjabhbanc283ubcsbhdc72
58322 /
tcp
1741579575 | 2025-03-05T23:45:41.893970
58422 /
tcp
660175493 | 2025-03-05T21:52:23.588529
58443 /
tcp
-1399940268 | 2025-03-11T09:26:28.891449
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
59022 /
tcp
1542849631 | 2025-03-05T13:26:54.871722
* OK [CAPABILITY a2,M\] nBwXk2pPP IMAP4rev1 20qx at
59122 /
tcp
2087396567 | 2025-03-05T11:34:00.146961
kjnkjabhbanc283ubcsbhdc72
59222 /
tcp
-784071826 | 2025-03-05T09:51:39.581613
SSH-2.0-OpenSSH_8.0
Vulnerabilities
-1013082686 | 2025-03-03T19:02:47.649446
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
60001 /
tcp
-154107716 | 2025-03-15T03:03:26.688023
220 Microsoft FTP Service
530 User cannot log in.
214-The following commands are recognized (* ==>'s unimplemented).
ABOR
ACCT
ADAT *
ALLO
APPE
AUTH
CCC
CDUP
CWD
DELE
ENC *
EPRT
EPSV
FEAT
HELP
HOST
LANG
LIST ...
60129 /
tcp
819727972 | 2025-03-25T15:59:46.765689
SSH-2.0-OpenSSH_7.4
Vulnerabilities
61613 /
tcp
820958131 | 2025-03-10T16:42:07.397179
kjnkjabhbanc283ubcsbhdc72\x02
971933601 | 2025-03-22T03:18:25.531227
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
61617 /
tcp
1911457608 | 2025-03-18T09:08:31.169944
\x00[\x00\x00\x00\x00\x00\x00
62016 /
tcp
-2089734047 | 2025-03-08T14:08:52.402570
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
62078 /
tcp
-1113435755 | 2025-03-12T13:38:49.742059
/1.1 404 Not Found
Content Length: 0
63210 /
tcp
1519486042 | 2025-03-14T23:21:16.542695
<KU_goodbye>Protocol Error: XML data is not well-formed.</KU_goodbye>
63256 /
tcp
1778988322 | 2025-03-21T21:49:56.069327
* OK GroupWise IMAP4rev1 Server Ready
63260 /
tcp
171352214 | 2025-03-11T21:26:41.181785
-ERR client ip is not in whitelist
63676 /
tcp
819727972 | 2025-03-09T19:42:02.217772
SSH-2.0-OpenSSH_7.4
Vulnerabilities
64738 /
tcp
-441419608 | 2025-03-15T04:50:23.262698
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3