59.82.133.79

Regular View Raw Data Timeline
Last Seen: 2025-03-29

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(1)
CVE-2025-26465
6.8A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
2024(1)
CVE-2024-6387
8.1A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
2023(4)
CVE-2023-51767
7.0OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385
6.5In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-48795
5.9The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-38408
9.8The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
2021(2)
CVE-2021-41617
7.0sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368
3.7An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
2020(2)
CVE-2020-15778
7.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145
5.9The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
2019(4)
CVE-2019-16905
7.8OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVE-2019-6111
5.9An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110
6.8In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109
6.8An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
2018(3)
CVE-2018-20685
5.3In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-15919
5.3Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473
5.3OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
2017(1)
CVE-2017-15906
5.3The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
2016(9)
CVE-2016-20012
5.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2016-10708
7.5sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
CVE-2016-10012
7.8The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
CVE-2016-10011
5.5authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
CVE-2016-10010
7.0sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
CVE-2016-10009
7.3Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
CVE-2016-3115
6.4Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
CVE-2016-1908
9.8The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
CVE-2016-0777
6.5The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
2015(4)
CVE-2015-6564
6.9Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
CVE-2015-6563
1.9The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
CVE-2015-5600
8.5The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
CVE-2015-5352
4.3The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
2014(3)
CVE-2014-2653
5.8The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532
4.9sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2014-1692
7.5The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
2012(1)
CVE-2012-0814
3.5The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
2011(2)
CVE-2011-5000
3.5The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
CVE-2011-4327
2.1ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
2010(3)
CVE-2010-5107
5.0The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
CVE-2010-4755
4.0The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
CVE-2010-4478
7.5OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
2008(1)
CVE-2008-3844
9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
2007(1)
CVE-2007-2768
4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.

OpenPorts

131517192325434970798085909310010210411311913517919522131142744044344448550251351554154855455659363677178981190299399510021013102310251028108010991153117712341291141414331454149415001515152115991604172318001830188319541962197719832000200320082010205420672072208020812083208720952122212621542181219522112222232023232332234523622363237924042435245525502559256625692628276130013009301630493050305830723074307630853090309831003123313131363149316031693173317931833221326032683269329933063388354035533554356637804000401040224063406441574242428243214344440044334434443644434444444744994500450245064786489949495009501050255061513051355172520152225241524552515252525452605435549455695596559956605858590759095938598459865988599059966001600260046022607062646308637965806667669769557006701070717171740174347443744476347676777477777778794680018007800980148015801680238024804780508061808180838085808780998100810181148116812681408147814981698171817581928196820082918318833383938403840784268485850085458554855785658575857685798582859085948649872887458767880588078817882488348841885088518867887088808889889188998905890690129034905090529063906890729083908990919095909991009101911191329137914091429145915191559160916591669167917791799189919492069207920892099213922392309249925092899306930993339398945695309754976198989900990899189926992899309944999899991000010018100501005110066100751009310554109091091111112112111128811300120001208412101121161212012127121401214212143121471214812153121581216212166121801218512230122431225212275122811228212300123041231412317123191232112331123381234512360123801238812390123941240312409124191243112440124421244412472124861250512506125261254012563125751258912980130821344313780141471434414407148951544316001160201602816033160651607516094163111640216464169921699317010171821777317779180041801918066180681807918080180811808318087180921810318110181111822518245183681844319000190151999920000200702010720121208802123321236212452124821261212822129121292213262137921400215152200122380224032255623023230842418124245245102500125565266562701527017270362801529984300033000530009300173002230110301213012230473305223062230722308223092231022315223162231722319223202232101321023212232622327223276433022330603312233422338223412234622347223482234922350003500435101351223552235554358223602236422365223682236922370223722237322374223752237622377773802238333385223888039622398224002240029403224052240892411224144341522417944180041922421224290143222440214410044307443104441044818450034566645667457864588845922477224798947990480014802248322485224888848899491524969450000500025000850050500705007350100501225099851000512355144353022534135413854922549845500055022550555535055443554705547555522557225582257722577825778758122584225844359012591225922260001601296161361616620786321063257632606447764738
13 / tcp
-1835577706 | 2025-03-27T18:58:59.924280
15 / tcp
1850902677 | 2025-03-08T20:47:19.797558
17 / tcp
2115448635 | 2025-03-23T15:59:48.953133
19 / tcp
829384519 | 2025-02-28T12:03:33.235337
23 / tcp
676675086 | 2025-03-28T05:14:08.686481
25 / tcp
-1730858130 | 2025-03-13T03:56:14.691310
43 / tcp
-1399940268 | 2025-03-28T18:24:22.615064
49 / tcp
-1056270173 | 2025-03-19T03:22:00.232815
70 / tcp
-1056270173 | 2025-03-23T17:00:37.378023
79 / tcp
-1770051369 | 2025-03-18T18:35:47.596694
80 / tcp
-1466342676 | 2025-03-29T09:22:54.216413
85 / tcp
-1888448627 | 2025-03-07T16:50:51.191437
90 / tcp
-1399940268 | 2025-03-11T05:17:55.305979
93 / tcp
-1099385124 | 2025-03-24T09:41:21.373949
100 / tcp
165188539 | 2025-03-15T19:27:42.689697
102 / tcp
819727972 | 2025-03-22T11:14:55.148827
104 / tcp
165188539 | 2025-03-18T03:23:34.339804
113 / tcp
1412519768 | 2025-03-15T22:59:57.931659
119 / tcp
-1958992631 | 2025-03-12T00:42:52.869803
135 / tcp
-1589645334 | 2025-03-23T13:08:57.442968
179 / tcp
-399606100 | 2025-03-08T13:50:46.086425
195 / tcp
-971970408 | 2025-03-26T04:51:06.970537
221 / tcp
2098371729 | 2025-03-13T19:15:59.856664
311 / tcp
67948279 | 2025-03-06T21:51:10.530854
427 / tcp
-349937125 | 2025-03-11T08:27:08.367833
440 / tcp
1308377066 | 2025-03-27T04:41:37.399958
443 / tcp
2053195084 | 2025-03-12T02:53:03.599700
444 / tcp
-303826268 | 2025-03-17T12:09:20.829046
485 / tcp
-1648456501 | 2025-03-20T13:17:25.476349
502 / tcp
632542934 | 2025-03-14T14:56:18.101782
513 / tcp
-1373613804 | 2025-03-18T23:37:07.197372
515 / tcp
988099889 | 2025-03-28T07:18:43.742163
541 / tcp
-1299118573 | 2025-03-27T18:44:05.707077
548 / tcp
-1128967010 | 2025-03-13T21:13:08.114125
554 / tcp
1167995424 | 2025-03-26T10:14:54.877603
556 / tcp
632542934 | 2025-03-25T18:32:08.548376
593 / tcp
-1112304903 | 2025-03-06T06:33:25.436203
636 / tcp
-2023550675 | 2025-03-18T20:08:46.085781
771 / tcp
-1399940268 | 2025-03-16T12:11:43.754260
789 / tcp
-1795027372 | 2025-03-08T18:16:51.677037
811 / tcp
-1399940268 | 2025-03-24T09:23:16.167241
902 / tcp
1956828827 | 2025-03-03T17:39:27.309483
993 / tcp
45131230 | 2025-03-20T15:00:25.467858
995 / tcp
1685649979 | 2025-03-04T18:42:54.737200
1002 / tcp
1761482307 | 2025-03-15T22:05:26.655555
1013 / tcp
-904840257 | 2025-03-20T22:05:05.676574
1023 / tcp
233634112 | 2025-03-15T21:34:08.668622
1025 / tcp
-1230049476 | 2025-03-07T12:24:48.018262
1028 / tcp
2103111368 | 2025-03-25T03:04:12.113258
1080 / tcp
1362344524 | 2025-03-22T10:41:08.151589
1099 / tcp
819727972 | 2025-03-09T19:01:51.010174
1153 / tcp
580340387 | 2025-03-13T12:46:44.419171
1177 / tcp
1960438949 | 2025-03-24T22:53:32.058773
1234 / tcp
321971019 | 2025-03-10T18:50:01.512191
1291 / tcp
-1399940268 | 2025-03-22T19:46:52.074338
1414 / tcp
-2096652808 | 2025-03-24T04:48:20.567191
1433 / tcp
-186520940 | 2025-03-17T23:07:23.972393
1454 / tcp
-1795027372 | 2025-03-13T20:48:49.264811
1494 / tcp
-1049213899 | 2025-03-16T12:02:14.447213
1500 / tcp
-271515508 | 2025-03-24T20:00:16.606966
1515 / tcp
819727972 | 2025-03-24T17:42:37.529747
1521 / tcp
-1184558916 | 2025-03-07T10:16:42.233938
1599 / tcp
290819026 | 2025-03-27T04:54:50.784897
1604 / tcp
2087396567 | 2025-03-07T16:24:30.590286
1723 / tcp
2064046231 | 2025-03-18T17:20:44.797435
1800 / tcp
165188539 | 2025-03-20T17:59:26.872612
1830 / tcp
1911457608 | 2025-03-12T18:00:04.238790
1883 / tcp
1231376952 | 2025-03-16T21:53:21.959973
1954 / tcp
1911457608 | 2025-03-24T17:51:45.198170
1962 / tcp
455076604 | 2025-03-26T03:44:23.643050
1977 / tcp
819727972 | 2025-03-25T21:15:25.436472
1983 / tcp
669849225 | 2025-03-10T00:10:50.122786
2000 / tcp
671605376 | 2025-03-03T23:50:16.081553
2003 / tcp
-1399940268 | 2025-03-19T04:25:31.449927
2008 / tcp
1492413928 | 2025-03-24T14:17:25.271387
2010 / tcp
321971019 | 2025-03-10T22:39:20.717833
2054 / tcp
-980525298 | 2025-02-27T18:34:58.105180
2067 / tcp
-801484042 | 2025-03-09T05:07:56.998188
2072 / tcp
819727972 | 2025-03-17T16:41:41.212792
2080 / tcp
45131230 | 2025-03-24T22:26:08.352471
2081 / tcp
-2096652808 | 2025-03-04T08:26:20.168448
2083 / tcp
-1461540015 | 2025-03-20T15:02:46.229180
2087 / tcp
117101543 | 2025-03-25T11:16:28.487380
2095 / tcp
632542934 | 2025-03-17T15:27:57.597012
2122 / tcp
-1626979812 | 2025-03-25T07:00:43.754426
2126 / tcp
2115448635 | 2025-03-26T02:32:22.287763
2154 / tcp
104385780 | 2025-02-27T16:41:45.347272
2181 / tcp
-122096153 | 2025-03-04T17:28:44.598917
2195 / tcp
-1327660293 | 2025-03-22T20:28:32.705629
2211 / tcp
819727972 | 2025-03-15T08:19:44.029300
2222 / tcp
2051656595 | 2025-03-28T07:48:30.632232
2320 / tcp
819727972 | 2025-03-18T04:40:00.351541
2323 / tcp
1662205251 | 2025-03-10T13:03:28.793170
2332 / tcp
1632932802 | 2025-03-22T05:24:38.834987
2345 / tcp
1911457608 | 2025-03-27T01:52:15.505743
2362 / tcp
-1888448627 | 2025-03-08T14:52:25.197325
2363 / tcp
-1428621233 | 2025-03-26T02:57:20.363000
2379 / tcp
1282941221 | 2025-03-12T08:49:08.363733
2404 / tcp
1282941221 | 2025-03-27T14:14:58.782110
2435 / tcp
-1986594217 | 2025-03-22T21:49:16.428509
2455 / tcp
2087396567 | 2025-03-16T17:28:42.046669
2550 / tcp
819727972 | 2025-03-19T00:35:29.912813
2559 / tcp
921225407 | 2025-03-04T00:15:26.996406
2566 / tcp
2063598737 | 2025-03-20T16:14:04.505653
2569 / tcp
-1399940268 | 2025-03-15T17:03:43.801992
2628 / tcp
2087396567 | 2025-03-16T13:36:41.051579
2761 / tcp
165188539 | 2025-03-21T11:57:33.756090
3001 / tcp
-971970408 | 2025-03-04T00:18:30.602240
3009 / tcp
1623746877 | 2025-03-19T06:59:49.519217
3016 / tcp
-1598265216 | 2025-03-26T07:14:45.492936
3049 / tcp
921225407 | 2025-03-18T15:55:21.367326
3050 / tcp
2143387245 | 2025-03-15T05:20:54.805936
3058 / tcp
165188539 | 2025-03-11T23:40:16.552747
3072 / tcp
1911457608 | 2025-03-20T00:59:20.652728
3074 / tcp
1911457608 | 2025-03-12T13:24:37.959448
3076 / tcp
307999478 | 2025-03-05T22:37:27.438700
3085 / tcp
1911457608 | 2025-03-22T09:39:29.952615
3090 / tcp
1991883981 | 2025-03-09T23:43:17.052079
3098 / tcp
-1399940268 | 2025-03-05T15:10:34.700476
3100 / tcp
1911457608 | 2025-03-19T21:54:28.338492
3123 / tcp
1830187220 | 2025-03-18T23:32:35.714648
3131 / tcp
2098371729 | 2025-03-09T11:18:33.843141
3136 / tcp
1353260875 | 2025-03-12T22:33:06.816618
3149 / tcp
-1399940268 | 2025-03-16T06:15:09.877921
3160 / tcp
-1399940268 | 2025-03-23T17:21:04.157971
3169 / tcp
-288825733 | 2025-03-19T14:05:11.254835
3173 / tcp
307999478 | 2025-03-22T10:20:46.340685
3179 / tcp
-585940771 | 2025-03-14T03:06:42.243059
3183 / tcp
-1888448627 | 2025-03-03T23:35:46.656583
3221 / tcp
1625292406 | 2025-03-21T19:29:06.587407
3260 / tcp
-862070606 | 2025-03-28T05:51:16.297158
3268 / tcp
-1688921933 | 2025-03-15T22:34:13.699134
3269 / tcp
-1399940268 | 2025-03-13T18:29:36.591962
3299 / tcp
-1839934832 | 2025-03-16T02:43:06.527242
3306 / tcp
292351399 | 2025-03-24T03:48:58.204019
3388 / tcp
1632932802 | 2025-02-27T18:58:11.107293
3540 / tcp
-1399940268 | 2025-03-26T22:54:30.112998
3553 / tcp
1332894250 | 2025-03-28T08:43:02.033355
3554 / tcp
1332894250 | 2025-03-15T10:26:08.239452
3566 / tcp
1632932802 | 2025-03-06T03:29:58.712940
3780 / tcp
1544300041 | 2025-03-18T07:52:16.423312
4000 / tcp
-1148803158 | 2025-03-17T21:03:57.055030
4010 / tcp
-1375131644 | 2025-03-23T15:01:12.922002
4022 / tcp
1911457608 | 2025-03-09T18:32:28.644810
4063 / tcp
1978059005 | 2025-03-18T12:44:09.873553
4064 / tcp
819727972 | 2025-03-05T02:16:48.004770
4157 / tcp
-1839934832 | 2025-03-25T17:11:22.972647
4242 / tcp
-1341662640 | 2025-03-09T12:23:46.351978
4282 / tcp
-1999117212 | 2025-03-24T08:21:58.145859
4321 / tcp
-269926141 | 2025-03-17T01:54:29.575956
4344 / tcp
669849225 | 2025-03-06T01:35:42.075338
4400 / tcp
-2096652808 | 2025-03-15T02:55:55.597057
4433 / tcp
1830187220 | 2025-03-08T21:07:22.571453
4434 / tcp
1282941221 | 2025-03-24T09:58:37.785671
4436 / tcp
1830187220 | 2025-03-21T06:55:28.686171
4443 / tcp
1140068775 | 2025-03-18T04:49:53.908930
4444 / tcp
819727972 | 2025-03-23T22:51:00.171188
4447 / tcp
819727972 | 2025-02-28T17:24:22.040416
4499 / tcp
1212285915 | 2025-03-16T18:07:24.083018
4500 / tcp
-2089734047 | 2025-03-22T02:35:45.985725
4502 / tcp
1948301213 | 2025-03-08T17:44:10.948819
4506 / tcp
1093576587 | 2025-03-17T23:21:19.601112
4786 / tcp
-1139539254 | 2025-03-17T09:13:59.714530
4899 / tcp
-358801646 | 2025-03-11T20:42:48.090738
4949 / tcp
1544300041 | 2025-03-12T02:39:27.537769
5009 / tcp
1182822286 | 2025-03-18T03:53:50.272452
5010 / tcp
-1099385124 | 2025-03-20T15:51:46.611568
5025 / tcp
1778988322 | 2025-03-24T19:29:30.508250
5061 / tcp
677934968 | 2025-03-19T18:35:00.686387
5130 / tcp
320677201 | 2025-03-13T04:18:29.087953
5135 / tcp
1911457608 | 2025-03-25T11:46:54.842424
5172 / tcp
539065883 | 2025-03-17T16:37:21.077554
5201 / tcp
165188539 | 2025-03-13T06:58:52.511590
5222 / tcp
-641479109 | 2025-03-19T18:22:50.488102
5241 / tcp
-1399940268 | 2025-03-18T23:02:33.572444
5245 / tcp
-1399940268 | 2025-03-05T22:29:47.093526
5251 / tcp
1911457608 | 2025-03-18T18:10:45.937509
5252 / tcp
-1327660293 | 2025-03-10T15:57:14.447126
5254 / tcp
1767345577 | 2025-03-08T18:49:22.477076
5260 / tcp
-1327660293 | 2025-03-05T03:37:05.483049
5435 / tcp
1363464823 | 2025-03-25T16:29:31.513651
5494 / tcp
971933601 | 2025-03-07T01:57:00.712330
5569 / tcp
1911457608 | 2025-03-26T04:12:15.646500
5596 / tcp
-441419608 | 2025-03-12T15:40:38.076911
5599 / tcp
-1839934832 | 2025-03-15T04:29:09.187061
5660 / tcp
-1327660293 | 2025-03-15T18:13:50.463368
5858 / tcp
-971970408 | 2025-03-28T18:51:17.580191
5907 / tcp
-1045760528 | 2025-03-29T11:13:16.030961
5909 / tcp
1282941221 | 2025-03-14T02:52:30.329664
5938 / tcp
1763259671 | 2025-03-23T12:08:11.574889
5984 / tcp
1999272906 | 2025-03-22T20:08:18.761584
5986 / tcp
-407828767 | 2025-02-28T14:00:08.659230
5988 / tcp
632542934 | 2025-03-28T16:41:50.130126
5990 / tcp
921225407 | 2025-03-21T02:26:10.501560
5996 / tcp
-1453516345 | 2025-02-27T20:01:44.301673
6001 / tcp
819727972 | 2025-03-18T12:27:58.965602
6002 / tcp
1911495665 | 2025-03-25T09:26:15.385360
6004 / tcp
-339084706 | 2025-03-17T17:37:24.104124
6022 / tcp
819727972 | 2025-03-15T05:03:16.926595
6070 / tcp
-1399940268 | 2025-03-17T01:50:28.696074
6264 / tcp
1543809371 | 2025-02-27T18:45:26.898566
6308 / tcp
1011407350 | 2025-03-20T12:03:33.243533
6379 / tcp
321971019 | 2025-02-27T14:07:08.358518
6580 / tcp
-1835475271 | 2025-03-25T05:24:22.388998
6667 / tcp
819727972 | 2025-03-27T18:53:28.948016
6697 / tcp
819727972 | 2025-03-10T07:01:35.958883
6955 / tcp
-2089734047 | 2025-03-09T08:10:10.560653
7006 / tcp
307999478 | 2025-03-19T19:16:46.644428
7010 / tcp
-1399940268 | 2025-03-23T18:19:41.115630
7071 / tcp
660175493 | 2025-03-22T23:10:39.775636
7171 / tcp
-1399940268 | 2025-03-12T10:11:28.608111
7401 / tcp
1370263973 | 2025-03-22T13:55:45.794836
7434 / tcp
842535728 | 2025-02-27T18:27:16.593885
7443 / tcp
1612309769 | 2025-03-25T09:06:47.208933
7444 / tcp
165188539 | 2025-03-19T20:52:00.154082
7634 / tcp
641705735 | 2025-03-26T20:45:34.040894
7676 / tcp
1100205395 | 2025-03-28T12:51:25.491611
7774 / tcp
-1399940268 | 2025-03-12T19:05:30.661432
7777 / tcp
1391945995 | 2025-03-27T13:56:53.661759
7778 / tcp
-1996280214 | 2025-03-18T06:29:24.811713
7946 / tcp
1761482307 | 2025-03-26T11:45:20.007193
8001 / tcp
2103111368 | 2025-03-16T17:23:19.868645
8007 / tcp
1529339778 | 2025-03-29T11:03:25.873010
8009 / tcp
-971970408 | 2025-03-15T13:17:30.700372
8014 / tcp
-1399940268 | 2025-03-06T01:45:58.149128
8015 / tcp
-653033013 | 2025-03-21T19:56:23.871672
8016 / tcp
-1477838366 | 2025-03-25T09:01:24.198636
8023 / tcp
819727972 | 2025-03-06T13:55:01.888714
8024 / tcp
-1428621233 | 2025-03-14T00:18:17.671589
8047 / tcp
-1839934832 | 2025-03-19T11:42:20.655471
8050 / tcp
-1839934832 | 2025-03-26T12:55:42.175792
8061 / tcp
-1059554316 | 2025-03-10T21:12:32.434053
8081 / tcp
2087396567 | 2025-03-17T13:35:53.684448
8083 / tcp
401555314 | 2025-03-13T00:07:58.177937
8085 / tcp
1544300041 | 2025-03-23T06:33:26.729813
8087 / tcp
-1538260461 | 2025-03-22T00:21:00.510358
8099 / tcp
-1639624373 | 2025-03-20T19:54:30.595317
8100 / tcp
-1279886438 | 2025-03-11T22:18:54.406035
8101 / tcp
1911457608 | 2025-02-28T19:33:49.343142
8114 / tcp
-1059554316 | 2025-03-10T03:22:13.491860
8116 / tcp
-1730858130 | 2025-02-28T14:27:42.650260
8126 / tcp
504717326 | 2025-03-26T05:54:31.558767
8140 / tcp
-375604792 | 2025-03-14T07:14:27.306011
8147 / tcp
819727972 | 2025-03-19T08:18:59.947856
8149 / tcp
-1839934832 | 2025-03-04T00:16:27.623627
8169 / tcp
1363464823 | 2025-03-06T09:47:25.025043
8171 / tcp
-1099385124 | 2025-03-06T22:38:14.216252
8175 / tcp
1642597142 | 2025-03-28T17:17:15.242954
8192 / tcp
-1755723830 | 2025-03-19T11:28:04.570685
8196 / tcp
-345718689 | 2025-03-10T03:58:39.770132
8200 / tcp
556442608 | 2025-03-23T06:34:20.142856
8291 / tcp
455076604 | 2025-03-13T01:46:09.483283
8318 / tcp
-1399940268 | 2025-03-17T20:27:06.209158
8333 / tcp
1723769361 | 2025-03-26T21:38:59.397521
8393 / tcp
165188539 | 2025-02-28T04:56:21.318897
8403 / tcp
1911457608 | 2025-02-28T05:11:37.042310
8407 / tcp
504717326 | 2025-03-14T21:12:06.805413
8426 / tcp
410249975 | 2025-03-18T23:12:23.613746
8485 / tcp
165188539 | 2025-03-11T02:42:17.947910
8500 / tcp
-1784271535 | 2025-03-05T22:27:08.487504
8545 / tcp
2087396567 | 2025-03-19T04:40:32.084995
8554 / tcp
-2089734047 | 2025-03-12T18:32:52.371119
8557 / tcp
51259122 | 2025-03-27T22:01:28.223451
8565 / tcp
1830187220 | 2025-03-28T01:24:33.432209
8575 / tcp
-1399940268 | 2025-03-13T00:47:30.321788
8576 / tcp
-2089734047 | 2025-03-25T16:40:53.437857
8579 / tcp
114471724 | 2025-03-25T22:26:00.361301
8582 / tcp
-1399940268 | 2025-03-20T17:01:34.284147
8590 / tcp
321971019 | 2025-03-12T03:46:36.842911
8594 / tcp
117101543 | 2025-03-12T05:37:48.383600
8649 / tcp
1489954473 | 2025-03-18T20:36:36.390817
8728 / tcp
-1779118422 | 2025-03-25T06:45:18.729540
8745 / tcp
-454087041 | 2025-03-04T22:42:25.069569
8767 / tcp
-1399940268 | 2025-03-24T21:34:12.290295
8805 / tcp
-1019343788 | 2025-03-06T21:17:05.475239
8807 / tcp
820958131 | 2025-03-18T13:27:49.353117
8817 / tcp
-1097188123 | 2025-03-16T00:39:05.725092
8824 / tcp
-980525298 | 2025-03-09T22:19:44.046954
8834 / tcp
1996932384 | 2025-03-22T22:59:08.766278
8841 / tcp
819727972 | 2025-03-17T03:03:34.138458
8850 / tcp
1911457608 | 2025-03-19T21:12:11.106365
8851 / tcp
819727972 | 2025-03-07T10:29:45.579922
8867 / tcp
-441419608 | 2025-02-28T03:19:16.594730
8870 / tcp
819727972 | 2025-02-27T20:56:15.777880
8880 / tcp
740837454 | 2025-03-14T21:51:21.519725
8889 / tcp
291723434 | 2025-03-25T17:27:39.121085
8891 / tcp
2103111368 | 2025-02-28T16:12:47.007403
8899 / tcp
474736340 | 2025-03-15T15:42:38.169062
8905 / tcp
921225407 | 2025-02-27T17:18:11.129945
8906 / tcp
1282941221 | 2025-03-16T20:10:38.750458
9012 / tcp
2143387245 | 2025-03-09T13:14:27.376433
9034 / tcp
-1399940268 | 2025-03-20T14:56:28.386867
9050 / tcp
-392669295 | 2025-03-09T13:05:31.652314
9052 / tcp
1353260875 | 2025-03-24T20:35:54.169226
9063 / tcp
1332894250 | 2025-03-04T20:06:10.981115
9068 / tcp
-274082663 | 2025-03-20T09:21:59.427326
9072 / tcp
-1327660293 | 2025-03-10T07:18:01.838338
9083 / tcp
-274082663 | 2025-03-06T23:28:37.527519
9089 / tcp
819727972 | 2025-03-04T21:32:58.378184
9091 / tcp
-1032713145 | 2025-03-14T21:57:57.532876
9095 / tcp
-1681927087 | 2025-03-27T20:54:47.707083
9099 / tcp
-1914711518 | 2025-03-09T23:39:17.694125
9100 / tcp
820958131 | 2025-03-25T18:34:40.748531
9101 / tcp
-1032713145 | 2025-03-29T08:18:31.526804
9111 / tcp
-1399940268 | 2025-03-19T10:25:19.137442
9132 / tcp
-1399940268 | 2025-03-27T14:30:07.444904
9137 / tcp
-1746074029 | 2025-03-21T09:34:01.920167
9140 / tcp
165188539 | 2025-03-12T00:26:11.711442
9142 / tcp
-1888448627 | 2025-03-10T12:40:56.505648
9145 / tcp
921225407 | 2025-03-25T17:25:08.993821
9151 / tcp
-319440554 | 2025-03-03T23:46:31.005169
9155 / tcp
-2031152423 | 2025-03-20T09:00:00.707154
9160 / tcp
321971019 | 2025-03-27T13:04:37.397758
9165 / tcp
819727972 | 2025-03-07T14:27:09.334582
9166 / tcp
-784071826 | 2025-03-24T18:30:08.133231
9167 / tcp
-1399940268 | 2025-03-17T06:45:45.606988
9177 / tcp
-1399940268 | 2025-03-11T18:36:00.554092
9179 / tcp
321971019 | 2025-03-18T14:44:49.450014
9189 / tcp
1189133115 | 2025-03-28T16:46:16.386595
9194 / tcp
1911457608 | 2025-02-27T16:10:25.682153
9206 / tcp
740837454 | 2025-03-20T03:37:41.781271
9207 / tcp
1989907056 | 2025-03-15T03:34:40.041672
9208 / tcp
-1399940268 | 2025-03-12T12:09:53.767620
9209 / tcp
-1839934832 | 2025-03-04T03:37:04.507528
9213 / tcp
-2089734047 | 2025-03-22T10:56:43.014278
9223 / tcp
1911457608 | 2025-03-06T20:27:26.278630
9230 / tcp
1308377066 | 2025-03-16T18:36:40.442558
9249 / tcp
205347087 | 2025-03-21T09:57:55.955398
9250 / tcp
321971019 | 2025-03-09T22:38:03.533788
9289 / tcp
-2033111675 | 2025-03-24T04:43:00.925935
9306 / tcp
819727972 | 2025-03-04T08:35:46.643388
9309 / tcp
-1105333987 | 2025-03-19T02:16:20.818295
9333 / tcp
-358801646 | 2025-03-21T14:35:25.770216
9398 / tcp
-1900404274 | 2025-03-26T21:45:11.976267
9456 / tcp
1363464823 | 2025-03-22T01:03:39.236386
9530 / tcp
632542934 | 2025-03-26T08:32:40.215691
9754 / tcp
408230060 | 2025-03-04T07:58:05.729619
9761 / tcp
-1730858130 | 2025-03-06T17:22:48.191703
9898 / tcp
1320285193 | 2025-03-24T19:15:51.467292
9900 / tcp
-414819019 | 2025-03-15T23:42:44.953588
9908 / tcp
165188539 | 2025-03-25T09:44:08.276907
9918 / tcp
-1399940268 | 2025-03-27T21:58:06.840976
9926 / tcp
819727972 | 2025-03-14T22:04:15.892061
9928 / tcp
-2089734047 | 2025-03-16T06:58:16.148300
9930 / tcp
1948301213 | 2025-03-19T20:51:40.141774
9944 / tcp
2087396567 | 2025-03-18T06:15:53.633545
9998 / tcp
-696402907 | 2025-03-24T12:54:14.498552
9999 / tcp
1161309183 | 2025-03-28T18:01:12.080116
10000 / tcp
2087396567 | 2025-03-18T10:03:23.855884
10018 / tcp
-1611764932 | 2025-03-11T22:37:22.833444
10050 / tcp
819727972 | 2025-03-27T04:10:35.744912
10051 / tcp
104385780 | 2025-03-14T15:45:41.418442
10066 / tcp
632542934 | 2025-03-14T11:38:08.210984
10075 / tcp
-146605374 | 2025-03-06T19:01:22.549258
10093 / tcp
819727972 | 2025-03-21T12:45:58.313566
10554 / tcp
539065883 | 2025-03-09T20:25:26.906516
10909 / tcp
1996932384 | 2025-03-19T23:38:54.566959
10911 / tcp
-1899074860 | 2025-03-05T06:34:33.047901
11112 / tcp
-1327660293 | 2025-03-22T01:24:23.827018
11211 / tcp
-136006866 | 2025-03-11T23:57:34.774357
11288 / tcp
-1529979118 | 2025-03-28T09:53:01.054287
11300 / tcp
819727972 | 2025-03-07T02:55:45.254210
12000 / tcp
-1368104760 | 2025-03-27T08:09:59.824564
12084 / tcp
-1327660293 | 2025-03-13T06:23:54.039364
12101 / tcp
1911457608 | 2025-03-25T11:12:44.530326
12116 / tcp
-2089734047 | 2025-03-09T07:29:57.679069
12120 / tcp
1615193817 | 2025-03-25T18:35:03.175045
12127 / tcp
493955023 | 2025-03-23T05:15:14.390261
12140 / tcp
1911457608 | 2025-03-06T00:53:28.425257
12142 / tcp
-616720387 | 2025-03-26T19:17:11.128828
12143 / tcp
632542934 | 2025-03-14T06:52:23.841585
12147 / tcp
639175818 | 2025-03-08T21:57:06.742024
12148 / tcp
-1399940268 | 2025-03-06T16:53:05.986307
12153 / tcp
-1399940268 | 2025-03-09T19:54:54.595848
12158 / tcp
-1477838366 | 2025-02-28T22:50:44.211205
12162 / tcp
1308377066 | 2025-03-14T00:16:15.777417
12166 / tcp
-1733645023 | 2025-03-17T23:07:50.430905
12180 / tcp
1363464823 | 2025-03-24T17:53:17.819793
12185 / tcp
-1327660293 | 2025-02-28T14:34:51.287502
12230 / tcp
-1399940268 | 2025-03-15T07:21:01.973736
12243 / tcp
-1399940268 | 2025-03-06T10:38:44.897165
12252 / tcp
-1327660293 | 2025-03-17T01:30:33.937267
12275 / tcp
-1810987450 | 2025-03-11T21:41:49.774949
12281 / tcp
1911457608 | 2025-03-27T01:10:45.248040
12282 / tcp
1911457608 | 2025-03-15T11:06:08.764103
12300 / tcp
897328069 | 2025-03-15T23:27:12.497140
12304 / tcp
493955023 | 2025-03-25T12:03:19.863445
12314 / tcp
819727972 | 2025-03-14T23:17:48.552115
12317 / tcp
-1399940268 | 2025-03-21T06:50:15.644166
12319 / tcp
51259122 | 2025-03-15T12:47:19.048155
12321 / tcp
-653033013 | 2025-03-12T13:35:26.445300
12331 / tcp
-1399940268 | 2025-03-14T15:36:38.141076
12338 / tcp
1919228981 | 2025-03-05T14:13:16.879945
12345 / tcp
296364507 | 2025-03-13T03:12:54.793694
12360 / tcp
-339084706 | 2025-03-15T13:11:32.380767
12380 / tcp
-142686627 | 2025-03-19T10:55:54.312650
12388 / tcp
-1428621233 | 2025-03-04T15:13:27.073373
12390 / tcp
-1648456501 | 2025-03-26T16:42:59.362977
12394 / tcp
819727972 | 2025-03-22T17:12:35.979673
12403 / tcp
-1476017887 | 2025-03-09T08:11:19.863115
12409 / tcp
819727972 | 2025-03-10T00:07:48.048463
12419 / tcp
401555314 | 2025-03-22T12:59:26.293985
12431 / tcp
408230060 | 2025-03-17T23:09:38.770738
12440 / tcp
321971019 | 2025-03-04T10:43:22.352809
12442 / tcp
-1839934832 | 2025-03-19T12:32:30.605671
12444 / tcp
1911457608 | 2025-03-21T09:19:14.417795
12472 / tcp
819727972 | 2025-03-15T09:59:25.606895
12486 / tcp
580340387 | 2025-03-21T13:02:44.242050
12505 / tcp
-1839934832 | 2025-03-23T19:17:56.436284
12506 / tcp
1911457608 | 2025-03-05T04:53:27.924015
12526 / tcp
1655023012 | 2025-03-18T03:03:10.996031
12540 / tcp
-1810987450 | 2025-03-26T20:01:43.824133
12563 / tcp
-1036370807 | 2025-03-28T07:18:12.142602
12575 / tcp
-1375131644 | 2025-03-13T10:03:20.544868
12589 / tcp
1308377066 | 2025-03-05T21:20:48.386806
12980 / tcp
-1888448627 | 2025-03-08T12:22:24.030965
13082 / tcp
1911457608 | 2025-03-06T01:43:54.801003
13443 / tcp
1911457608 | 2025-03-23T16:07:59.957839
13780 / tcp
-1399940268 | 2025-03-24T18:52:02.672768
14147 / tcp
493955023 | 2025-03-08T11:52:20.454843
14344 / tcp
921225407 | 2025-03-26T08:02:47.229943
14407 / tcp
-1399940268 | 2025-03-05T22:28:10.218382
14895 / tcp
45131230 | 2025-03-25T06:15:03.384066
15443 / tcp
1282941221 | 2025-03-15T19:22:19.120886
16001 / tcp
1632932802 | 2025-03-18T20:36:58.906898
16020 / tcp
819727972 | 2025-03-18T12:51:29.110008
16028 / tcp
-2096652808 | 2025-03-25T19:11:03.074485
16033 / tcp
165188539 | 2025-03-26T10:02:20.895230
16065 / tcp
-2096652808 | 2025-03-24T16:42:23.137119
16075 / tcp
1911457608 | 2025-03-21T19:14:30.188522
16094 / tcp
-1399940268 | 2025-03-17T06:04:55.343471
16311 / tcp
321971019 | 2025-03-07T18:27:54.333827
16402 / tcp
1911457608 | 2025-03-10T19:22:45.544447
16464 / tcp
-345718689 | 2025-03-21T00:09:32.704914
16992 / tcp
-1840324437 | 2025-03-22T17:01:55.527544
16993 / tcp
2087396567 | 2025-03-26T08:22:39.493377
17010 / tcp
-904840257 | 2025-03-18T16:57:21.433887
17182 / tcp
89142341 | 2025-03-09T14:24:42.687900
17773 / tcp
1911457608 | 2025-03-15T17:40:53.766885
17779 / tcp
1911457608 | 2025-03-16T15:50:00.277531
18004 / tcp
-1737707071 | 2025-03-18T06:40:06.919153
18019 / tcp
-992671574 | 2025-03-20T19:45:52.217414
18066 / tcp
493955023 | 2025-03-05T21:27:31.372124
18068 / tcp
-1329831334 | 2025-03-10T09:09:52.189434
18079 / tcp
-2089734047 | 2025-03-18T17:52:30.504446
18080 / tcp
-653033013 | 2025-03-17T16:25:40.345006
18081 / tcp
-2031152423 | 2025-03-22T01:43:25.667819
18083 / tcp
-616720387 | 2025-02-28T02:00:54.354627
18087 / tcp
-1428621233 | 2025-03-14T20:06:46.931869
18092 / tcp
-1428621233 | 2025-03-12T18:11:51.563527
18103 / tcp
-1399940268 | 2025-03-20T15:39:49.149916
18110 / tcp
-345718689 | 2025-03-03T18:13:39.974014
18111 / tcp
-122096153 | 2025-03-16T08:58:20.849167
18225 / tcp
819727972 | 2025-03-20T02:37:20.697324
18245 / tcp
-1428621233 | 2025-03-21T19:13:51.558000
18368 / tcp
819727972 | 2025-03-20T23:49:35.014720
18443 / tcp
632542934 | 2025-03-26T06:53:24.383048
19000 / tcp
-1099385124 | 2025-03-13T16:13:44.817083
19015 / tcp
1308377066 | 2025-03-04T17:24:24.705620
19999 / tcp
-2096652808 | 2025-03-17T18:00:57.024760
20000 / tcp
1900503736 | 2025-03-11T11:36:04.049772
20070 / tcp
-1399940268 | 2025-02-28T21:47:16.872978
20107 / tcp
-1888448627 | 2025-03-26T21:16:13.437603
20121 / tcp
1762042191 | 2025-03-16T20:00:46.194146
20880 / tcp
1370263973 | 2025-03-18T21:28:47.448315
21233 / tcp
819727972 | 2025-03-20T00:42:52.858186
21236 / tcp
819727972 | 2025-03-19T23:34:51.066665
21245 / tcp
599074451 | 2025-03-17T17:05:24.388669
21248 / tcp
-1733645023 | 2025-03-26T17:44:18.415635
21261 / tcp
1308377066 | 2025-03-01T01:23:36.977988
21282 / tcp
-457235091 | 2025-03-27T18:20:06.189463
21291 / tcp
1911457608 | 2025-03-17T00:21:10.531478
21292 / tcp
-1888448627 | 2025-03-09T13:44:18.445109
21326 / tcp
1332894250 | 2025-03-25T14:21:22.333572
21379 / tcp
819727972 | 2025-03-11T08:34:10.465202
21400 / tcp
-358801646 | 2025-03-23T07:16:11.522627
21515 / tcp
-441419608 | 2025-03-06T15:38:13.974606
22001 / tcp
2087396567 | 2025-03-27T21:15:11.927959
22380 / tcp
1767345577 | 2025-03-16T20:24:32.536028
22403 / tcp
1830697416 | 2025-03-15T05:28:18.025624
22556 / tcp
-2089734047 | 2025-03-16T10:40:21.831463
23023 / tcp
1690634669 | 2025-03-23T23:30:46.971376
23084 / tcp
-1648456501 | 2025-03-20T13:07:07.323030
24181 / tcp
632542934 | 2025-03-04T00:03:08.317296
24245 / tcp
2087396567 | 2025-03-14T14:21:22.661291
24510 / tcp
1208318993 | 2025-03-25T11:13:55.052309
25001 / tcp
-1013082686 | 2025-03-22T16:16:49.233914
25565 / tcp
-2089734047 | 2025-03-11T10:29:53.616659
26656 / tcp
996960436 | 2025-03-29T00:11:31.890477
27015 / tcp
-454087041 | 2025-03-25T12:30:15.513384
27017 / tcp
1763259671 | 2025-03-27T08:24:14.942206
27036 / tcp
1282941221 | 2025-03-25T08:53:07.027110
28015 / tcp
-2089734047 | 2025-03-05T20:12:02.341402
29984 / tcp
1830187220 | 2025-03-26T14:29:54.953571
30003 / tcp
171352214 | 2025-03-05T03:44:34.837384
30005 / tcp
-1399940268 | 2025-03-21T12:54:19.956303
30009 / tcp
-1329831334 | 2025-03-28T21:25:26.124419
30017 / tcp
320677201 | 2025-03-07T16:08:00.448010
30022 / tcp
-971970408 | 2025-03-14T21:23:50.604343
30110 / tcp
-1399940268 | 2025-03-27T21:09:41.631597
30121 / tcp
921225407 | 2025-03-06T01:14:30.006800
30122 / tcp
2087396567 | 2025-03-19T20:22:05.646624
30473 / tcp
1911457608 | 2025-02-27T22:35:05.546727
30522 / tcp
-971970408 | 2025-03-12T15:51:26.210483
30622 / tcp
799468586 | 2025-03-12T10:59:10.530026
30722 / tcp
-1839934832 | 2025-03-13T13:31:44.334392
30822 / tcp
539065883 | 2025-03-12T19:45:11.567543
30922 / tcp
-971970408 | 2025-03-20T22:25:47.022652
31022 / tcp
-653033013 | 2025-03-24T12:05:46.238660
31522 / tcp
2087396567 | 2025-03-13T01:28:00.295148
31622 / tcp
171352214 | 2025-03-23T09:59:42.434730
31722 / tcp
808560482 | 2025-03-12T23:00:43.407341
31922 / tcp
-971970408 | 2025-03-24T06:23:54.983169
32022 / tcp
2087396567 | 2025-03-23T19:12:36.524282
32101 / tcp
-1907909544 | 2025-03-05T15:32:25.704412
32102 / tcp
-1399940268 | 2025-03-12T02:54:58.143188
32122 / tcp
-2096652808 | 2025-03-09T21:05:05.458758
32622 / tcp
1332894250 | 2025-03-11T19:32:36.422965
32722 / tcp
2087396567 | 2025-03-23T05:28:31.511642
32764 / tcp
1880683805 | 2025-03-14T20:25:34.882841
33022 / tcp
-319440554 | 2025-02-27T16:47:51.278922
33060 / tcp
-1013082686 | 2025-03-23T11:00:09.070747
33122 / tcp
-971970408 | 2025-03-04T14:24:09.040912
33422 / tcp
1690634669 | 2025-03-19T17:02:28.197636
33822 / tcp
2087396567 | 2025-03-18T12:19:34.269342
34122 / tcp
-905685638 | 2025-03-20T15:36:34.222644
34622 / tcp
-746114901 | 2025-03-19T10:37:13.690314
34722 / tcp
2087396567 | 2025-03-04T00:15:08.482730
34822 / tcp
-971970408 | 2025-03-19T06:55:08.602026
34922 / tcp
1189133115 | 2025-03-18T19:54:01.187981
35000 / tcp
-2089734047 | 2025-03-17T15:14:51.454879
35004 / tcp
819727972 | 2025-03-23T02:41:22.988992
35101 / tcp
-1399940268 | 2025-03-05T03:40:08.297072
35122 / tcp
1830187220 | 2025-03-19T01:05:24.974394
35522 / tcp
819727972 | 2025-03-17T01:06:25.414229
35554 / tcp
-2033111675 | 2025-03-19T13:26:06.515827
35822 / tcp
-2107996212 | 2025-03-17T17:50:53.961234
36022 / tcp
-314039103 | 2025-03-17T21:15:19.861524
36422 / tcp
-1375131644 | 2025-03-15T08:45:16.663840
36522 / tcp
-1461540015 | 2025-03-18T16:50:20.296102
36822 / tcp
1996932384 | 2025-03-18T14:53:11.456846
36922 / tcp
1741579575 | 2025-03-18T13:00:27.398955
37022 / tcp
1690634669 | 2025-03-16T19:35:34.930497
37222 / tcp
2087396567 | 2025-03-14T20:49:36.488122
37322 / tcp
740837454 | 2025-03-16T11:28:02.843886
37422 / tcp
-441419608 | 2025-02-28T20:01:38.446178
37522 / tcp
-407828767 | 2025-03-16T10:04:07.151592
37622 / tcp
1996932384 | 2025-03-16T02:16:21.094777
37777 / tcp
-1327660293 | 2025-03-17T23:45:11.834168
38022 / tcp
-2017887953 | 2025-03-17T23:05:51.263224
38333 / tcp
-971970408 | 2025-03-28T18:42:50.487575
38522 / tcp
-79865617 | 2025-03-13T23:58:33.117332
38880 / tcp
-1013082686 | 2025-02-27T19:45:28.720300
39622 / tcp
-971970408 | 2025-03-11T07:40:37.777195
39822 / tcp
1887224352 | 2025-03-12T06:52:02.645516
40022 / tcp
1741579575 | 2025-03-09T11:37:44.245921
40029 / tcp
-375604792 | 2025-03-25T11:32:14.931912
40322 / tcp
-971970408 | 2025-03-08T21:21:15.669319
40522 / tcp
171352214 | 2025-03-04T08:39:29.808826
40892 / tcp
1996932384 | 2025-03-08T13:29:21.148425
41122 / tcp
-2107996212 | 2025-02-27T15:22:54.043255
41443 / tcp
-746114901 | 2025-03-28T06:27:28.633199
41522 / tcp
-2033111675 | 2025-03-04T22:33:16.592573
41794 / tcp
-805362002 | 2025-03-23T20:58:54.215672
41800 / tcp
-1996280214 | 2025-03-07T07:23:21.238974
41922 / tcp
114471724 | 2025-03-07T16:09:45.488377
42122 / tcp
897328069 | 2025-03-05T02:46:39.489581
42901 / tcp
707919486 | 2025-03-28T17:33:40.282677
43222 / tcp
-1476017887 | 2025-03-01T00:22:10.792330
44021 / tcp
-1059554316 | 2025-03-14T00:10:15.984527
44100 / tcp
-136006866 | 2025-03-08T14:55:44.636469
44307 / tcp
819727972 | 2025-03-18T20:02:58.237635
44310 / tcp
-2080784861 | 2025-03-17T11:20:25.837701
44410 / tcp
1632932802 | 2025-03-28T03:34:13.037386
44818 / tcp
819727972 | 2025-03-24T20:32:44.855583
45003 / tcp
-1013082686 | 2025-03-18T12:23:54.225045
45666 / tcp
-2089734047 | 2025-03-12T15:51:23.588229
45667 / tcp
-1399940268 | 2025-03-26T16:32:07.837514
45786 / tcp
455076604 | 2025-03-23T19:40:22.790183
45888 / tcp
-1399940268 | 2025-03-18T03:58:54.607843
45922 / tcp
-2096652808 | 2025-03-10T14:21:54.641012
47722 / tcp
-1681927087 | 2025-03-10T12:01:49.693441
47989 / tcp
1911457608 | 2025-03-13T19:10:21.098190
47990 / tcp
-1013082686 | 2025-03-26T13:47:07.076434
48001 / tcp
-1839934832 | 2025-03-08T18:03:30.508047
48022 / tcp
539065883 | 2025-03-07T11:40:17.610656
48322 / tcp
819727972 | 2025-03-10T02:43:40.687072
48522 / tcp
841014058 | 2025-03-09T22:48:31.935692
48888 / tcp
-2096652808 | 2025-03-24T17:57:54.152059
48899 / tcp
2087396567 | 2025-03-22T05:44:26.864855
49152 / tcp
1449779382 | 2025-03-20T07:02:57.482398
49694 / tcp
-1888448627 | 2025-03-09T23:28:42.029660
50000 / tcp
2087396567 | 2025-03-22T10:01:38.185247
50002 / tcp
669849225 | 2025-03-27T10:00:38.464659
50008 / tcp
-358801646 | 2025-02-27T20:01:06.053962
50050 / tcp
2087396567 | 2025-03-29T04:02:46.795077
50070 / tcp
2087396567 | 2025-03-28T13:05:26.773589
50073 / tcp
119860953 | 2025-03-04T07:40:30.418103
50100 / tcp
-1681927087 | 2025-03-25T12:30:20.960354
50122 / tcp
-1947777893 | 2025-03-16T02:36:36.046876
50998 / tcp
-585940771 | 2025-03-09T18:08:05.508135
51000 / tcp
819727972 | 2025-03-13T18:24:15.258065
51235 / tcp
-971970408 | 2025-03-21T17:30:15.259935
51443 / tcp
539065883 | 2025-03-28T15:09:31.104846
53022 / tcp
-2096652808 | 2025-03-07T07:30:17.898241
53413 / tcp
171352214 | 2025-03-22T02:55:32.249325
54138 / tcp
1161309183 | 2025-03-21T10:30:26.178491
54922 / tcp
291723434 | 2025-03-07T09:19:17.987659
54984 / tcp
2087396567 | 2025-03-28T22:48:58.588111
55000 / tcp
-1375131644 | 2025-03-17T07:10:44.673517
55022 / tcp
320677201 | 2025-03-07T04:53:07.968959
55055 / tcp
-585940771 | 2025-03-12T03:26:26.050836
55350 / tcp
-1626979812 | 2025-03-28T12:06:53.431776
55443 / tcp
-1990350878 | 2025-03-08T13:25:59.102734
55470 / tcp
114471724 | 2025-03-09T21:25:23.212867
55475 / tcp
1911457608 | 2025-03-12T01:03:49.127943
55522 / tcp
539065883 | 2025-03-06T23:39:05.711547
55722 / tcp
2087396567 | 2025-03-06T19:37:56.488815
55822 / tcp
1278527606 | 2025-03-06T21:37:37.374028
57722 / tcp
171352214 | 2025-03-06T08:52:18.474031
57782 / tcp
15018106 | 2025-03-29T10:00:33.471869
57787 / tcp
-1399940268 | 2025-03-05T23:57:41.045361
58122 / tcp
2087396567 | 2025-03-06T02:54:22.859827
58422 / tcp
-971970408 | 2025-03-05T21:40:30.049678
58443 / tcp
-1888448627 | 2025-03-18T07:08:50.554886
59012 / tcp
321971019 | 2025-03-08T14:46:21.667730
59122 / tcp
2143387245 | 2025-03-05T11:22:59.433244
59222 / tcp
-1598265216 | 2025-03-05T09:38:16.670325
60001 / tcp
-454087041 | 2025-03-29T05:56:13.154568
60129 / tcp
178736976 | 2025-03-06T15:46:52.123127
61613 / tcp
1624217396 | 2025-03-07T07:44:39.105079
61616 / tcp
-138733098 | 2025-03-20T12:53:08.563536
62078 / tcp
-860824904 | 2025-03-21T14:04:31.915595
63210 / tcp
-1681927087 | 2025-03-27T09:44:18.529817
63257 / tcp
89282912 | 2025-03-11T14:50:33.563829
63260 / tcp
-616720387 | 2025-03-11T21:14:55.919214
64477 / tcp
-1327660293 | 2025-03-06T13:20:19.304266
64738 / tcp
996960436 | 2025-03-15T04:37:52.240575



Contact Us

Shodan ® - All rights reserved