2 /
tcp
307999478 | 2025-03-17T13:31:38.488254
unknown command \r\nunknown command \r\n
11 /
tcp
2087396567 | 2025-03-14T08:05:14.814475
kjnkjabhbanc283ubcsbhdc72
-1835577706 | 2025-02-27T12:34:25.507355
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html; charset="UTF-8"
Transfer-Encoding: chunked
Connection: keep-alive
Keep-Alive: timeout=20
Vary: Accept-Encoding
Cache-control: no-store
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
15 /
tcp
539065883 | 2025-03-03T20:57:13.055883
-255236012 | 2025-03-07T08:01:23.897557
HTTP/1.1 302
X-Frame-Options: SAMEORIGIN
21 /
tcp
-702037155 | 2025-03-17T21:15:12.794781
220 Ftp firmware update utility
23 /
tcp
164764193 | 2025-02-22T02:09:23.344958
25 /
tcp
-1279886438 | 2025-03-10T17:27:30.861237
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
37 /
tcp
1842948889 | 2025-03-09T19:21:18.303709
38 /
tcp
-2140303521 | 2025-03-06T08:46:37.941511
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
43 /
tcp
-1729629024 | 2025-03-17T13:06:15.742265
49 /
tcp
-1101712668 | 2025-02-28T17:24:45.552589
\\x1e\xc3\x80\\x010\\x02\xc2\xa8\xc3\xa3
53 /
tcp
-1156129152 | 2025-03-13T05:16:16.129204
9
\x81\x80\x00\x01\x00\x02\x00\x00\x00\x00\x08clients1\x06google\x03com\x00\x00\x01\x00\x01\xc0\x00\x05\x00\x01\x00\x00\x00G\x00\x16\x07clients\x01l\x06google\x03com\x00\xc01\x00\x01\x00\x01\x00\x00\x00\x85\x00\x04\x8e\xfb+\x0e
\x00\x06\x85\x80\x00\x01\x00\x01\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03\xc0\x00\x10\x00\x03\x00\x00\x00\x00\x00 \x08dnsmasq-
-1763883228 | 2025-03-15T05:20:06.409113
HTTP/1.1 400 Bad Request
Server: vista/0.7
Content-Type: text/html
Connection: close
79 /
tcp
-1846450790 | 2025-03-15T07:52:32.733301
<html>
<head><title>400 Bad Request</title></head>
<body bgcolor="white">
<center><h1>400 Bad Request</h1></center>
<hr><center>nginx/1.4.7</center>
</body>
</html>
-1839934832 | 2025-03-04T08:56:00.180614
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
90 /
tcp
819727972 | 2025-03-09T20:33:39.173086
SSH-2.0-OpenSSH_7.4
Vulnerabilities
91 /
tcp
1332894250 | 2025-03-17T08:34:20.613230
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
-1013082686 | 2025-02-28T19:40:33.188107
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
-2107996212 | 2025-03-08T16:59:22.592233
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
102 /
tcp
1723769361 | 2025-03-13T16:14:13.157656
ELM Enterprise Manager _l\r\nCopyright \xc2\xa9 18668511-928641920 TNT Software, Inc.\r\n
104 /
tcp
-2089734047 | 2025-02-26T02:03:13.396608
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1107492609 | 2025-02-26T21:18:06.757944
HTTP/1.1 200 OK
Server: App-webs/
Content-Type: text/html
Connection: close
110 /
tcp
-345718689 | 2025-02-27T12:26:24.255626
111 /
tcp
-111794959 | 2025-03-06T04:19:55.952280
Portmap
Program Version Protocol Port
1853121902 1949133925 1852273768 975187981
1852728675 1953066862 975201132 1869833485
1698308166 1919495200 842408014 1870012466
-1713467553 | 2025-03-12T22:16:12.627278
HTTP/1.1 400 Bad Request
Content-Type: text/html; charset=us-ascii
Server: Microsoft-HTTPAPI/2.0
Connection: close
122 /
tcp
1543809371 | 2025-03-15T10:11:38.792248
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
135 /
tcp
1302177452 | 2025-03-11T19:42:59.830470
\\x05\\x00\r\\x03\\x10\\x00\\x00\\x00\\x18\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x04\\x00\\x01\\x05\\x00\\x00\\x00\\x00\n\nServerAlive2: \n IP1: Lou\n IP2: 192.168.5.66\n IP3: 240e:381:1b0a:900:40eb:cce6:2dc1:4045\n IP4: 240e:381:1b0a:900:504f:3a1f:a682:9ab5\n IP5: 240e:381:1b0a:900::2e6\n\nNTLMSSP:\nTarget_Name: LOU\nProduct_Version: 10.0.22621 Ntlm 15\nOS: Windows 11, Version 22H2\nNetBIOS_Domain_Name: LOU\nNetBIOS_Computer_Name: LOU\nDNS_Domain_Name: Lou\nDNS_Computer_Name: Lou\nMsvAvFlags: 01000000\nSystem_Time: 2024-01-22 04:06:53 +0000 UTC\n\nDCE
143 /
tcp
-100373866 | 2025-02-21T15:15:21.439674
* OK TurboMail IMAP4 Service ready\r\n
154 /
tcp
-1059554316 | 2025-02-19T20:47:34.766467
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
175 /
tcp
-2031152423 | 2025-03-18T23:20:16.641720
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
179 /
tcp
-399606100 | 2025-02-23T01:05:43.416407
BGP Message\nType: 3\nMajor error Code: 6\nMinor error Code: 5\n
180 /
tcp
-1399940268 | 2025-03-04T19:45:13.300875
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
189 /
tcp
321971019 | 2025-02-24T15:04:03.306557
-ERR client ip is not in whitelist\r
195 /
tcp
819727972 | 2025-03-18T15:43:35.851488
SSH-2.0-OpenSSH_7.4
Vulnerabilities
211 /
tcp
362630950 | 2025-03-08T13:45:57.649000
J\\x00\\x00\\x00\n8.0.23\\x00H\\xad\\xed\\x0ek\\x146Td\\x16P#\\x00\\xff\\xff-\\x02\\x00\\xff\\xcf\\x15\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00Zz+VhH0IL\\x19u(\\x00caching_sha2_password\\x00
234 /
tcp
1911457608 | 2025-03-05T15:36:41.706647
\x00[\x00\x00\x00\x00\x00\x00
264 /
tcp
1672388472 | 2025-03-17T20:10:35.582728
CheckPoint\nFirewall Host: ADAPCN156FW02\nSmartCenter Host: adluprdfwmgt01..zjz4qa\\x00\n
389 /
tcp
-1907080992 | 2025-03-12T07:18:40.864792
0\x0c\\x02\\x01\\x01a\\x07\n\\x01\\x00\\x04\\x00\\x04\\x00
400 /
tcp
1623746877 | 2025-03-08T18:18:50.647388
500 Permission denied - closing connection.\r\n
442 /
tcp
-1399940268 | 2025-03-04T03:05:30.530755
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2067957117 | 2025-02-28T04:00:11.630921
HTTP/1.1 400 Bad Request
Server: nginx/1.22.1
Date: Fri, 28 Feb 2025 04:00:11 GMT
Content-Type: text/html
Content-Length: 157
Connection: close
<html>
<head><title>400 Bad Request</title></head>
<body>
<center><h1>400 Bad Request</h1></center>
<hr><center>nginx/1.22.1</center>
</body>
</html>
448 /
tcp
-1327660293 | 2025-03-17T08:40:23.191236
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
450 /
tcp
-1399940268 | 2025-03-05T01:51:18.429889
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
452 /
tcp
321971019 | 2025-03-14T17:41:14.227615
-ERR client ip is not in whitelist\r
465 /
tcp
897328069 | 2025-03-17T15:50:49.376412
220 mail.scott000.com ESMTP
480 /
tcp
1911457608 | 2025-03-12T08:25:34.915743
\x00[\x00\x00\x00\x00\x00\x00
487 /
tcp
1911457608 | 2025-03-17T07:40:25.229500
\x00[\x00\x00\x00\x00\x00\x00
491 /
tcp
1911457608 | 2025-03-05T04:18:49.521914
\x00[\x00\x00\x00\x00\x00\x00
513 /
tcp
-1746074029 | 2025-02-21T11:00:52.421261
515 /
tcp
-1730858130 | 2025-03-08T22:52:21.242737
RFB 003.008
VNC:
Protocol Version: 3.8
541 /
tcp
-1876452130 | 2025-02-26T07:48:44.849800
\\x16\\x03\\x01\\x01N\\x01\\x00\\x01J\\x03\\x03\\x1f\\xa5H\\xe5\\xb5*G%Y\\xc7\\xecN\\xe3\\x87\\xe4\\x86)D.}J\\x13\\xeb\'\\x95\\x8b\xc8\x8cD&b\\xae \\x8e\\x84\\x12\\x9fX\r\\xaf\\xcd)\\xa55kb\\xa2\\x8e\\xe72,\\x9e\x0b\\x90?}cg>\\xe6\\xfb\\x97\\x92O\\x94\\x002\\x13\\x02\\x13\\x03\\x13\\x01\\x009\\x005\\x00k\\x00=\\xc00\\
548 /
tcp
-2035415184 | 2025-03-10T21:34:09.316259
Fast Copy: Yes\nExtended Sleep: Yes\nUUIDs: Yes\nUTF8 Server Name: Yes\nDirectory Services: Yes\nReconnect: No\nServer Notifications: Yes\nTCP/IP: Yes\nServer Signature: Yes\nServer Message: No\nPassword Saving Prohibited: No\nPassword Changing: No\nCopy File: Yes\nServer Name: Landisk2\nMachine Type: \rNetatalk3.1.8\nAFP Versions: AFP2.2, AFPX03, AFP3.1, AFP3.2, AFP3.3, AFP3.4\nUAMs: Cleartxt Passwrd\\x04,DHX2\t,DHCAST128\\x00\nServer Signature: 00000000008002000180030002800280
593 /
tcp
1308377066 | 2025-03-13T09:10:59.005450
632 /
tcp
819727972 | 2025-02-22T21:05:57.335357
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1402312074 | 2025-03-18T19:51:01.356314
HTTP/1.1 400 Bad Request
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 13-51264013-0 0NNN RT(1705909593861 113) q(-1 -1 -1 -1) r(0 -1) b1
646 /
tcp
1252007143 | 2025-03-12T06:48:45.385882
\\x00\\x01\\x00\\x1c\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x01\\x00\\x12\\x00\\xa8\\xbf.\\x03\\x00\\x00\n\\x80\\x00\\x00\\x03\\x00\\x00\\x00\\x00\\x00\\x00
1300162323 | 2025-03-06T19:16:18.374664
HTTP/1.1 404 Not Found
Content-Type: text/plain; charset=utf-8
X-Content-Type-Options: nosniff
685 /
tcp
1911457608 | 2025-03-14T22:05:06.674128
\x00[\x00\x00\x00\x00\x00\x00
771 /
tcp
320677201 | 2025-03-04T19:26:02.228587
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
772 /
tcp
-2089734047 | 2025-02-19T02:26:22.386530
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
805 /
tcp
-784071826 | 2025-03-06T22:33:13.829709
SSH-2.0-OpenSSH_8.0
Vulnerabilities
833 /
tcp
321971019 | 2025-03-14T14:46:16.143287
-ERR client ip is not in whitelist\r
843 /
tcp
-2004989248 | 2025-02-25T02:05:04.674801
<cross-domain-policy>\n <allow-access-from domain="*" to-po\nrts="*" />\n</cross-domain-policy>
853 /
tcp
-1399940268 | 2025-02-27T20:47:23.039720
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
873 /
tcp
-992671574 | 2025-03-14T22:07:28.673007
-1256415508 | 2025-03-16T05:10:27.725444
HTTP/1.1 404 Not Found
Server: TornadoServer/6.1
Content-Type: text/html; charset=UTF-8
992 /
tcp
-1835475271 | 2025-02-26T21:12:27.914018
200 NOD32SS 99 (3318497116)\r\n
995 /
tcp
1685649979 | 2025-02-19T20:48:16.667740
-2072525622 | 2025-03-12T06:32:08.111638
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, pre-check=0, post-check=0, max-age=0
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Expires: Mon, 22 Jan 2024 16:06:36 +0800
Vary: Accept-Encoding
Server: Microsoft-IIS/8.5
X-Powered-By: PHP/5.6.40
Set-Cookie: phpMyAdmin=fkrenf42790gjdu0ej2flte4637qi54v; path=/; HttpOnly
X-ob_mode: 1
X-Frame-Options: DENY
X-X-WebKit-CSP: default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval';referrer no-referrer;style-src
Vulnerabilities
1012 /
tcp
1308377066 | 2025-03-17T23:57:31.965972
1022 /
tcp
819727972 | 2025-03-11T18:14:05.819097
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1023 /
tcp
1632932802 | 2025-03-15T21:54:53.385140
1025 /
tcp
-616720387 | 2025-03-12T00:25:56.597722
1050 /
tcp
-1261090339 | 2025-02-28T11:16:21.859566
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
1080 /
tcp
1362344524 | 2025-03-17T11:25:26.759965
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.7
1099 /
tcp
-1059554316 | 2025-03-12T00:14:54.073303
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
1103 /
tcp
-1297953727 | 2025-02-19T04:43:25.365578
\x02\x00\x00\x00\x00\x00\x06\x04\x00\x00\x00\x00\x00\x0c\x00\x00\n0\x00\x1c
1119 /
tcp
-879070264 | 2025-02-20T23:12:45.991982
\\xab\xca\xa5]\\x00\\x00\\x00\\x18\\xc0\\x00\\x00\\x01\\xff\\xff\\xff\\xff\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00
1153 /
tcp
165188539 | 2025-02-28T07:31:55.242943
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
2103111368 | 2025-03-15T23:40:35.196780
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
1177 /
tcp
-1031019485 | 2025-03-08T15:32:23.084805
1180 /
tcp
709622286 | 2025-02-22T01:24:58.627001
OK Welcome <299685> on DirectUpdate server 7286\r\n
1200 /
tcp
1261582754 | 2025-03-12T12:20:05.234444
unknown command
unknown command
1234 /
tcp
1911457608 | 2025-03-09T18:37:34.215933
\x00[\x00\x00\x00\x00\x00\x00
1337 /
tcp
819727972 | 2025-03-17T17:09:35.288279
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1344 /
tcp
-1297953727 | 2025-02-28T14:00:06.801479
\x02\x00\x00\x00\x00\x00\x06\x04\x00\x00\x00\x00\x00\x0c\x00\x00\n0\x00\x1c
1377 /
tcp
-2089734047 | 2025-03-09T15:08:54.321893
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-2118655245 | 2025-03-07T07:09:29.284651
HTTP/1.0 500 Internal Server Error
Content-Length: 20
1446 /
tcp
1492413928 | 2025-02-27T08:29:34.805526
SSH-2.0-OpenSSH_7.5
Vulnerabilities
1459 /
tcp
1492413928 | 2025-02-27T07:07:10.366683
SSH-2.0-OpenSSH_7.5
Vulnerabilities
1515 /
tcp
-971970408 | 2025-03-14T22:48:03.449673
1521 /
tcp
2002686051 | 2025-03-13T01:42:19.596675
Version:11.1.0.6.0\n\\x016\\x00\\x01\\x08\\x00\\x7f\\xff\\x01\\x00\\x00-\\x00 \r\\x08\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00(DESCRIPTION=(TMP=)(VSNNUM=185599488)(ERR=0))
1557 /
tcp
632542934 | 2025-02-22T18:06:54.234098
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
1599 /
tcp
1189133115 | 2025-03-18T22:18:31.825945
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
1604 /
tcp
996960436 | 2025-03-10T20:25:30.292607
1660 /
tcp
-2089734047 | 2025-02-23T07:22:04.422592
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1723 /
tcp
1103582599 | 2025-03-17T05:36:31.032442
Firmware: 1\nHostname: Vigor\nVendor: DrayTek\n
1800 /
tcp
1911457608 | 2025-02-23T15:31:13.860789
\x00[\x00\x00\x00\x00\x00\x00
1820 /
tcp
819727972 | 2025-03-09T13:33:17.144952
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1839934832 | 2025-03-06T03:58:41.728064
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
1926 /
tcp
1212921144 | 2025-03-14T10:28:49.896319
1332639794 | 2025-03-15T23:32:04.599716
HTTP/1.1 403 Forbidden
Server: HASP LM/16.00
Content-Type: text/html
1962 /
tcp
117101543 | 2025-03-16T19:12:22.970099
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
1970 /
tcp
632542934 | 2025-03-11T19:05:33.146728
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
1972 /
tcp
-2046514463 | 2025-02-24T18:31:09.997544
1990 /
tcp
1426971893 | 2025-03-17T05:14:29.261855
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
2000 /
tcp
632542934 | 2025-03-17T13:32:26.398340
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
2002 /
tcp
540463538 | 2025-03-18T09:28:06.820051
2003 /
tcp
103159425 | 2025-03-11T21:14:18.401277
2008 /
tcp
1741579575 | 2025-02-19T07:04:22.047531
2010 /
tcp
1911457608 | 2025-03-14T04:57:13.740414
\x00[\x00\x00\x00\x00\x00\x00
2030 /
tcp
-877598700 | 2025-03-11T22:32:21.530956
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\\x01\xc3\xbf\xc3\xbb\\x03\xc3\xbf\xc3\xbd\\x01\xc3\xbf\xc3\xbe\\x01Username:
2049 /
tcp
819727972 | 2025-03-04T21:15:41.618684
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2056 /
tcp
-1399940268 | 2025-03-13T15:23:36.715096
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2058 /
tcp
1278527606 | 2025-03-12T21:52:56.684369
2067 /
tcp
2033888749 | 2025-03-17T23:28:58.887374
Content-Type: text/rude-rejection
Content-Length: 24
Access Denied, go away.
Content-Type: text/disconnect-notice
C...
2068 /
tcp
-42767839 | 2025-03-05T18:07:26.010723
RFB 005.000
VNC:
Protocol Version: 5.0
2077 /
tcp
1278527606 | 2025-03-04T23:24:22.913214
2081 /
tcp
819727972 | 2025-03-08T14:21:05.526322
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2083 /
tcp
-142686627 | 2025-03-16T23:50:09.640389
\x00[\xc2\xba\x7fs\x7f\x00\x00
2087 /
tcp
-2017887953 | 2025-03-12T05:27:54.789517
SSH-2.0-OpenSSH_7.9
Vulnerabilities
2091 /
tcp
-2017887953 | 2025-02-27T13:28:12.442159
SSH-2.0-OpenSSH_7.9
Vulnerabilities
-2107996212 | 2025-02-28T09:30:46.614299
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
141730637 | 2025-03-06T21:53:24.051387
HTTP/1.0 200 OK
Server: Proxy
-271515508 | 2025-03-15T02:07:34.770036
HTTP/1.1 302 Moved Temporarily
Server: DrcomServer1.0
Location: http://192.168.254.3
Cache-Control: no-cache
Connection: close
2130 /
tcp
1911457608 | 2025-03-16T19:20:42.365888
\x00[\x00\x00\x00\x00\x00\x00
2133 /
tcp
-1032713145 | 2025-03-15T12:45:18.871121
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
2154 /
tcp
-971970408 | 2025-03-17T11:50:50.031241
2181 /
tcp
546151771 | 2025-03-16T08:09:26.359790
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
2196 /
tcp
-1399940268 | 2025-03-13T19:50:05.419455
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
372433470 | 2025-03-13T19:17:35.357182
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
2224 /
tcp
-1947777893 | 2025-03-04T04:00:19.401989
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
2226 /
tcp
-1399940268 | 2025-03-13T11:43:06.945377
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2271 /
tcp
-1139539254 | 2025-03-18T20:22:36.293886
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
1662205251 | 2025-03-18T11:06:05.174963
HTTP/1.0 404 FAIL
Content-length:5
Connection:Close
2327 /
tcp
-1730858130 | 2025-03-14T16:12:34.126278
RFB 003.008
VNC:
Protocol Version: 3.8
2345 /
tcp
321971019 | 2025-03-04T22:49:24.608258
-ERR client ip is not in whitelist\r
2351 /
tcp
366084633 | 2025-03-17T21:08:48.953914
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
-2118655245 | 2025-02-18T19:45:39.283388
HTTP/1.0 500 Internal Server Error
Content-Length: 20
2376 /
tcp
-345718689 | 2025-03-11T18:51:18.193943
2404 /
tcp
-1399940268 | 2025-03-15T21:39:34.381691
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2455 /
tcp
1741579575 | 2025-03-14T10:12:18.625120
-879497810 | 2025-02-25T02:30:37.059543
HTTP/1.1 503 Service Unavailable
Connection: close
Cache-Control: no-cache,no-store
Pragma: no-cache
-491012735 | 2025-02-21T11:01:45.064105
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 5-46817447-0 0NNN RT(1700341286319 0) q(0 -1 -1 -1) r(0 -1)
2559 /
tcp
819727972 | 2025-02-24T09:08:00.817399
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2563 /
tcp
-2031152423 | 2025-03-06T19:44:31.806708
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
2598 /
tcp
321971019 | 2025-03-07T17:28:19.926856
-ERR client ip is not in whitelist\r
2628 /
tcp
-984990168 | 2025-03-16T16:37:27.509166
2761 /
tcp
1911457608 | 2025-02-26T15:52:15.307549
\x00[\x00\x00\x00\x00\x00\x00
2762 /
tcp
-457235091 | 2025-03-06T12:11:33.565913
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
2850 /
tcp
819727972 | 2025-03-17T03:25:07.546223
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3001 /
tcp
-1888448627 | 2025-03-18T14:27:04.899196
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
3002 /
tcp
-407828767 | 2025-03-15T18:45:04.280119
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
3008 /
tcp
-1327660293 | 2025-03-06T07:51:39.579221
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
3010 /
tcp
-1399940268 | 2025-02-26T03:15:04.591363
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3012 /
tcp
-1399940268 | 2025-03-03T20:27:53.776099
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3014 /
tcp
-1032713145 | 2025-02-28T13:54:03.782520
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
3016 /
tcp
-980525298 | 2025-03-18T04:19:26.339529
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
3018 /
tcp
1189133115 | 2025-02-18T20:57:57.931401
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
3048 /
tcp
-375604792 | 2025-02-23T11:06:04.659914
220 Microsoft FTP Service
3063 /
tcp
1830187220 | 2025-02-26T15:39:47.306133
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
-1045760528 | 2025-03-18T08:59:59.556778
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
-1045760528 | 2025-03-18T07:01:58.605192
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
3069 /
tcp
1911457608 | 2025-03-05T20:19:44.060824
\x00[\x00\x00\x00\x00\x00\x00
3072 /
tcp
740837454 | 2025-02-21T20:11:48.897921
SSH-2.0-OpenSSH_5.3
Vulnerabilities
3076 /
tcp
-407828767 | 2025-03-18T06:10:23.590019
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
3080 /
tcp
819727972 | 2025-02-24T03:39:54.048543
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3085 /
tcp
921225407 | 2025-03-15T16:57:06.525519
\x00\x00\x00\x04\x00\x00\x00\x00\x00
3094 /
tcp
-2089734047 | 2025-03-12T07:37:49.996870
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3097 /
tcp
1543809371 | 2025-02-28T09:03:23.775077
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
3099 /
tcp
-1139539254 | 2025-02-28T02:09:16.598957
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
3107 /
tcp
-1399940268 | 2025-03-12T12:39:19.174475
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3109 /
tcp
1767345577 | 2025-02-26T17:28:13.276620
Hello, this is Quagga (version 0T).
Copyright 1996-200
3110 /
tcp
-1399940268 | 2025-03-07T17:55:12.894641
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1839934832 | 2025-02-26T05:33:42.077282
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
3113 /
tcp
-980525298 | 2025-03-14T10:32:32.245377
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
3116 /
tcp
-1399940268 | 2025-03-14T16:29:02.521657
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3122 /
tcp
1189133115 | 2025-03-06T22:48:44.336434
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
3123 /
tcp
-2096652808 | 2025-03-04T21:22:43.152737
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
3127 /
tcp
819727972 | 2025-03-15T23:04:16.558252
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3138 /
tcp
-1399940268 | 2025-03-10T12:37:27.334703
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3150 /
tcp
-2089734047 | 2025-02-26T08:56:48.651730
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3156 /
tcp
677934968 | 2025-02-28T09:34:31.324419
3167 /
tcp
165188539 | 2025-02-26T02:56:32.839951
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
3169 /
tcp
1126993057 | 2025-03-07T11:52:14.731126
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
3176 /
tcp
1911457608 | 2025-02-18T02:06:34.215435
\x00[\x00\x00\x00\x00\x00\x00
3187 /
tcp
-1399940268 | 2025-02-26T19:44:39.786167
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1396488228 | 2025-03-10T04:03:55.866855
HTTP/1.1 200 OK
Content-Length: 2037
Cache-Control: private, max-age=300
Content-Type: text/html
3197 /
tcp
580340387 | 2025-02-17T16:44:18.486429
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
3198 /
tcp
1623746877 | 2025-03-14T01:24:25.780680
500 Permission denied - closing connection.\r\n
3221 /
tcp
1625292406 | 2025-03-04T17:08:29.438462
3256 /
tcp
-1032713145 | 2025-03-14T16:53:50.378184
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
-1341662640 | 2025-03-10T19:05:08.292927
HTTP/1.1 301 Moved Permanently
Server: Zope/(2.13.23, python 1.7.18, linux2) ZServer/1.1
Content-Type: text/plain; charset=utf-8
Connection: close
-2031078612 | 2025-02-27T07:41:51.239171
HTTP/1.1 302 Found
Content-Type: text/html; charset=utf-8
Location: http://proxy.ces.org.tw:3000/login?url=http%3A%2F%2Floginbyurl.wanfangdata.com.cn%2F
-1230049476 | 2025-03-16T12:18:02.475431
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
3299 /
tcp
-1713437100 | 2025-03-16T17:07:21.394464
\xc3\xbf\xc3\xbb\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
3301 /
tcp
398077695 | 2025-03-04T06:06:00.875365
3306 /
tcp
-1036944024 | 2025-03-09T04:34:58.100460
F\\x00\\x00\\x00\\xffj\\x04Host \'*.*.*.*\' is not allowed to connect to this MySQL server
3310 /
tcp
321971019 | 2025-02-27T07:31:46.407406
-ERR client ip is not in whitelist\r
3342 /
tcp
455076604 | 2025-02-27T03:56:09.716804
!\x07version\x04bind7 t{RPowerDNS Recursor 410
3388 /
tcp
819727972 | 2025-03-18T02:10:30.431829
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3389 /
tcp
-6645672 | 2025-03-11T21:13:37.554271
Remote Desktop Protocol\n\\x03\\x00\\x00\\x13\\x0e\\xd0\\x00\\x00\\x124\\x00\\x02\\x0f\\x08\\x00\\x08\\x00\\x00\\x00\n\nFlag: PROTOCOL_HYBRID_EX\nTarget_Name: 172_16_0_11\nProduct_Version: 6.3.9600 Ntlm 15\nOS: Windows 8.1/Windows Server 2012 R2\nNetBIOS_Domain_Name: 172_16_0_11\nNetBIOS_Computer_Name: 172_16_0_11\nDNS_Domain_Name: 172_16_0_11\nDNS_Computer_Name: 172_16_0_11\nSystem_Time: 2024-01-22 08:42:27 +0000 UTC\n\n
3401 /
tcp
1011407350 | 2025-02-22T01:53:21.876163
* OK GroupWise IMAP4rev1 Server Ready\r\n
3406 /
tcp
1353260875 | 2025-03-14T14:33:51.448548
\x00[g\xc2\x95N\x7f\x00\x00
3408 /
tcp
-358801646 | 2025-02-26T13:32:32.774421
3412 /
tcp
1504401647 | 2025-03-17T13:26:13.654026
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
3521 /
tcp
820958131 | 2025-03-06T21:47:58.173856
kjnkjabhbanc283ubcsbhdc72\x02
3524 /
tcp
-1996280214 | 2025-02-17T00:52:54.181753
3553 /
tcp
-441419608 | 2025-03-06T18:40:14.493196
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
3561 /
tcp
-1036370807 | 2025-02-27T19:00:52.043082
3562 /
tcp
165188539 | 2025-02-20T08:43:01.687925
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
-1453516345 | 2025-03-14T09:56:16.632594
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
3569 /
tcp
819727972 | 2025-03-10T06:15:18.071674
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3572 /
tcp
1632932802 | 2025-02-17T22:36:17.280507
3780 /
tcp
660175493 | 2025-03-12T19:42:35.670610
3790 /
tcp
171352214 | 2025-02-25T18:19:26.302602
-ERR client ip is not in whitelist
3792 /
tcp
321971019 | 2025-03-05T13:31:57.196347
-ERR client ip is not in whitelist\r
3838 /
tcp
-1641514916 | 2025-03-14T07:05:59.548551
* OK Merak 1dFUa2 IMAP4rev1
3922 /
tcp
-1399940268 | 2025-03-11T15:03:32.785794
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3950 /
tcp
-1279886438 | 2025-02-26T14:57:00.424097
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
3953 /
tcp
-1399940268 | 2025-03-05T17:38:03.528263
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3954 /
tcp
671605376 | 2025-02-25T20:51:20.926905
1123187653 | 2025-02-27T14:36:50.767746
HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/10.0
X-Frame-Options: SAMEORIGIN
4022 /
tcp
504717326 | 2025-03-08T20:04:09.403117
SSH-2.0-OpenSSH_8.6
Vulnerabilities
4063 /
tcp
819727972 | 2025-03-12T02:27:35.824781
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4064 /
tcp
819727972 | 2025-02-20T00:51:26.660460
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4085 /
tcp
-1059554316 | 2025-02-23T07:15:37.798530
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
4150 /
tcp
-136006866 | 2025-02-27T22:19:28.358560
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
4157 /
tcp
1690634669 | 2025-02-27T17:08:41.789733
4160 /
tcp
117101543 | 2025-03-10T04:30:13.979992
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
4200 /
tcp
504717326 | 2025-03-16T17:38:44.271547
SSH-2.0-OpenSSH_8.6
Vulnerabilities
-1695841648 | 2025-02-28T07:50:38.875357
HTTP/1.1 404 Not Found
Server: nginx/1.18.11011 (Ubuntu)
Content-Type: text/plain; charset=utf-8
Connection: close
4243 /
tcp
-2089734047 | 2025-03-13T03:24:19.943579
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
4250 /
tcp
-1428621233 | 2025-02-28T21:51:04.967098
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
4282 /
tcp
819727972 | 2025-03-03T22:30:57.848570
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4321 /
tcp
-1250504565 | 2025-03-16T13:32:10.670618
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x80\x00\x04\x00\x01\x00\x00\x00\x05\x00\xff\xff\xff\x00\x00\x04\x08\x00\x00\x00\x00\x00\x7f\xff\x00\x00\x00\x00\x08\x07\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01
1175789752 | 2025-02-24T04:49:01.217148
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2a92_shwt138_62437-3212
4369 /
tcp
632542934 | 2025-03-17T08:59:50.801177
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
4433 /
tcp
2087396567 | 2025-03-08T15:48:39.171650
kjnkjabhbanc283ubcsbhdc72
4435 /
tcp
165188539 | 2025-02-27T14:13:09.304544
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
4437 /
tcp
-1399940268 | 2025-03-05T12:35:49.628619
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4438 /
tcp
740837454 | 2025-02-28T03:18:56.158875
SSH-2.0-OpenSSH_5.3
Vulnerabilities
4440 /
tcp
-1399940268 | 2025-02-25T16:42:10.392474
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2069201278 | 2025-02-21T09:18:53.097029
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html
Connection: keep-alive
Set-Cookie: login_err_num=0; path=/; secure=true; httponly=true
Set-Cookie: topsecsvportalstyle=style1; path=/; secure=true; httponly=true
Set-Cookie: topsecsvportallogodir=default; path=/; secure=true; httponly=true
Set-Cookie: topsecsvportalname=default; path=/; secure=true; httponly=true
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
Strict-Transport-Security: max-age=31536000; includeSubDomains
X-XSS-Protectio
4444 /
tcp
599074451 | 2025-03-17T22:06:44.393368
4466 /
tcp
-1139539254 | 2025-03-16T03:11:36.933754
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
4482 /
tcp
-1730858130 | 2025-03-17T05:17:36.000566
RFB 003.008
VNC:
Protocol Version: 3.8
4500 /
tcp
165188539 | 2025-03-08T17:26:31.407470
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
4506 /
tcp
398077695 | 2025-03-15T14:29:50.208087
4510 /
tcp
-375604792 | 2025-03-12T09:36:03.606018
220 Microsoft FTP Service
1830697416 | 2025-02-22T16:49:00.898789
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
1282941221 | 2025-03-05T05:51:48.312855
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
4550 /
tcp
-1153110624 | 2025-03-06T03:39:38.201569
4643 /
tcp
-441419608 | 2025-02-28T08:00:22.884265
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
4747 /
tcp
-2017887953 | 2025-02-16T23:48:15.916907
SSH-2.0-OpenSSH_7.9
Vulnerabilities
4786 /
tcp
819727972 | 2025-03-16T05:07:24.565842
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4821 /
tcp
1541211644 | 2025-02-25T21:00:59.523916
4840 /
tcp
707919486 | 2025-03-15T20:45:11.296748
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
4899 /
tcp
539065883 | 2025-03-15T16:58:13.591992
4911 /
tcp
-1399940268 | 2025-03-13T03:10:02.176337
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4949 /
tcp
1850902677 | 2025-03-15T21:39:35.557273
5001 /
tcp
1991883981 | 2025-03-08T17:20:30.481569
B\x00\x00\x00\xc3\xbfn\x04Too many connections
5004 /
tcp
-1399940268 | 2025-02-23T18:46:48.816541
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5007 /
tcp
-1399940268 | 2025-03-13T13:16:43.281433
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1017429513 | 2025-03-17T07:58:57.165596
HTTP/1.1 403 Forbidden
Content-Type: text/html
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
5010 /
tcp
1623746877 | 2025-03-18T22:30:32.460767
500 Permission denied - closing connection.\r\n
5025 /
tcp
1492413928 | 2025-03-10T09:13:37.502976
SSH-2.0-OpenSSH_7.5
Vulnerabilities
5090 /
tcp
-1538260461 | 2025-03-06T04:22:20.119730
5150 /
tcp
819727972 | 2025-03-12T05:57:59.214879
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5172 /
tcp
676476721 | 2025-03-12T10:44:19.849651
ELM Enterprise Manager _l
Copyright © 18668511-928641920 TNT Software, Inc.
5201 /
tcp
165188539 | 2025-03-18T22:12:46.780270
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
5222 /
tcp
2087396567 | 2025-03-10T07:35:45.696121
kjnkjabhbanc283ubcsbhdc72
5230 /
tcp
-1399940268 | 2025-03-11T15:11:35.632442
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5244 /
tcp
117101543 | 2025-02-28T21:07:26.212780
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
5245 /
tcp
-1399940268 | 2025-02-28T02:10:11.632470
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5246 /
tcp
-438503381 | 2025-03-04T08:10:05.785812
WORLD OF WARCRAFT CONNECTION - SERVER TO CLIENT - V2
5251 /
tcp
165188539 | 2025-03-07T17:39:38.003797
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
5255 /
tcp
2063598737 | 2025-02-17T08:29:30.106613
5257 /
tcp
-1733645023 | 2025-03-13T06:11:58.403273
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
1282941221 | 2025-03-15T16:27:53.609818
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
1743272246 | 2025-03-05T23:14:09.970972
HTTP/1.1 400 Bad Request
Server: CWAP-waf
Content-Type: text/html
Connection: close
WZWS-RAY: 1249-1705940324.547-w-waf01nbzt
5275 /
tcp
-441419608 | 2025-03-16T04:39:25.091645
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
5432 /
tcp
1911457608 | 2025-03-15T21:21:22.755584
\x00[\x00\x00\x00\x00\x00\x00
5433 /
tcp
-2096652808 | 2025-03-06T11:38:53.088020
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
5435 /
tcp
-1888448627 | 2025-03-17T17:02:57.740091
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
5446 /
tcp
819727972 | 2025-02-20T08:02:25.589863
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5523 /
tcp
-303199180 | 2025-03-05T10:11:25.739202
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
5557 /
tcp
745343730 | 2025-03-13T16:29:02.999709
220 smtp.qq.com Esmtp QQ Mail Server
5603 /
tcp
-1399940268 | 2025-03-11T19:14:04.597989
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5605 /
tcp
-1399940268 | 2025-03-14T19:28:23.599247
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5606 /
tcp
819727972 | 2025-02-17T01:42:26.363608
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5607 /
tcp
-358801646 | 2025-02-27T03:41:44.867786
5608 /
tcp
15018106 | 2025-03-16T05:28:08.514512
\x00\x19\x02\x00\x02\x00\x07\x00Protocol version mismatch\x00
5630 /
tcp
1911457608 | 2025-03-14T20:03:56.992531
\x00[\x00\x00\x00\x00\x00\x00
5650 /
tcp
165188539 | 2025-03-10T18:27:20.533255
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
5672 /
tcp
575925250 | 2025-02-19T20:35:14.243662
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
5673 /
tcp
-2096652808 | 2025-02-24T10:42:14.143797
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
5853 /
tcp
-1399940268 | 2025-03-12T11:35:46.956421
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5858 /
tcp
-1461540015 | 2025-03-16T02:41:47.164649
audio 0 RTP/AVP 18 4 3 8 0 101
a
5905 /
tcp
1308377066 | 2025-02-23T02:28:31.149102
5908 /
tcp
-1399940268 | 2025-03-14T23:16:50.969810
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5912 /
tcp
1308377066 | 2025-03-04T05:15:25.735976
5919 /
tcp
597764502 | 2025-03-05T18:02:04.296604
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
-2107996212 | 2025-03-16T18:15:41.352028
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
5938 /
tcp
1332894250 | 2025-02-26T22:04:57.339297
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
1999272906 | 2025-03-16T16:12:16.818855
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
5986 /
tcp
1278527606 | 2025-02-28T21:58:53.371038
5990 /
tcp
-1399940268 | 2025-03-12T11:38:45.713002
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5996 /
tcp
-1888448627 | 2025-03-05T14:55:59.043630
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
6000 /
tcp
-1760806421 | 2025-03-17T12:56:40.630044
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected
6001 /
tcp
-1399940268 | 2025-02-27T19:53:06.596014
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6002 /
tcp
-21576419 | 2025-03-13T00:38:34.839358
ÿûUDo you want ANSI color? (Y/n)
-1045760528 | 2025-03-11T05:41:05.752246
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
6022 /
tcp
819727972 | 2025-02-25T01:36:00.627332
SSH-2.0-OpenSSH_7.4
Vulnerabilities
6036 /
tcp
-1399940268 | 2025-02-24T18:45:50.290449
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6102 /
tcp
819727972 | 2025-03-17T08:03:13.578229
SSH-2.0-OpenSSH_7.4
Vulnerabilities
6264 /
tcp
398077695 | 2025-02-27T09:07:58.008602
6379 /
tcp
321971019 | 2025-03-16T09:18:31.369941
-ERR client ip is not in whitelist\r
6443 /
tcp
546151771 | 2025-03-06T07:48:42.538336
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
6464 /
tcp
-1327660293 | 2025-02-25T02:44:12.753262
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
6482 /
tcp
1911457608 | 2025-03-09T14:12:59.057560
\x00[\x00\x00\x00\x00\x00\x00
1631614226 | 2025-03-13T09:32:55.012205
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 14-150390958-0 0NNN RT(1700879691877 7) q(0 -1 -1 -1) r(0 -1)
6543 /
tcp
590585971 | 2025-03-13T07:47:37.802173
\\xba\\xdc\xcd\xab\\x01#\\x19\\x10C\\x00U\xd0\x94\\xbb\\x82\\x00\\x94z\\xab\\x18\\x00\\x00\\x00\\x00\\x00\\x00[153][15:47:34.500]\\xc1\\xac\\xbd\xd3\xb3\xc9\xb9\\xa6\\xa3\\xac\\xb1\\xbe\xc4\xa3\\xbf\\xe9 PID \xce\xaa 0x23=35\\x00\\xba\\xdc\xcd\xab\\x01#\\x19\\x10_\\x00U\xd0\x94\\xbb\\x82\\x00\\x94z\\xab\\x18\\x00\\x00\\x00\\x00\\x00\\x00[154][15:4
6556 /
tcp
-2089734047 | 2025-02-28T18:58:22.018248
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
6565 /
tcp
-367607324 | 2025-03-10T01:50:09.123020
\\x12\\x04\\x03\\x7f\xc3\xbf\xc3\xbf\xc3\xbf\n0\\x04\\x10\\x06 \\x04\\x08...\n
6601 /
tcp
1911457608 | 2025-03-09T17:25:07.087321
\x00[\x00\x00\x00\x00\x00\x00
6603 /
tcp
-1399940268 | 2025-03-16T22:54:57.282460
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6605 /
tcp
-2089734047 | 2025-02-18T23:41:01.942654
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
6622 /
tcp
-1888448627 | 2025-03-04T20:10:09.016371
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
-1013082686 | 2025-03-18T13:58:28.702649
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
6666 /
tcp
-365662216 | 2025-03-16T20:27:45.074715
6667 /
tcp
-441419608 | 2025-03-17T15:52:43.098838
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
6668 /
tcp
671605376 | 2025-03-05T05:47:05.583702
6697 /
tcp
-1996280214 | 2025-03-14T14:20:46.396118
6755 /
tcp
709622286 | 2025-03-09T12:54:33.087838
OK Welcome <299685> on DirectUpdate server 7286\r\n
6799 /
tcp
1911457608 | 2025-03-13T21:42:08.004284
\x00[\x00\x00\x00\x00\x00\x00
1827807483 | 2025-03-11T05:29:08.791355
HTTP/1.1 401 Unauthorized
Server:
Cache-Control: no-cache,no-store
Content-Type: text/html; charset=%s
Connection: close
7005 /
tcp
1189133115 | 2025-03-12T04:30:47.138360
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
-1453516345 | 2025-03-05T22:03:23.971989
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
7015 /
tcp
819727972 | 2025-03-11T09:46:12.076981
SSH-2.0-OpenSSH_7.4
Vulnerabilities
7018 /
tcp
-1947777893 | 2025-03-09T23:53:44.019104
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
7020 /
tcp
-1399940268 | 2025-03-16T01:00:47.964691
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7050 /
tcp
1989907056 | 2025-03-12T02:29:26.114456
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
7071 /
tcp
-971970408 | 2025-02-26T22:14:41.536505
7082 /
tcp
-136006866 | 2025-03-14T09:57:52.079262
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
7090 /
tcp
1762042191 | 2025-03-08T18:32:58.044313
7102 /
tcp
-1399940268 | 2025-03-15T08:30:25.804183
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7105 /
tcp
165188539 | 2025-03-15T17:12:47.031733
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
7171 /
tcp
1767345577 | 2025-03-17T23:54:11.986289
Hello, this is Quagga (version 0T).
Copyright 1996-200
7218 /
tcp
819727972 | 2025-03-11T21:36:48.174020
SSH-2.0-OpenSSH_7.4
Vulnerabilities
7272 /
tcp
-653033013 | 2025-02-21T21:20:32.465933
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
7302 /
tcp
-1399940268 | 2025-02-25T00:41:02.952753
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7348 /
tcp
-274082663 | 2025-03-10T10:51:32.505276
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
-2107996212 | 2025-03-15T10:28:54.118523
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
7434 /
tcp
-1641514916 | 2025-02-18T18:36:11.920479
* OK Merak 1dFUa2 IMAP4rev1
-1209805157 | 2025-03-16T13:14:25.682454
HTTP/1.1 403 Forbidden
Server: openresty
Content-Type: text/html
Connection: keep-alive
via: CHN-SH-COchilian1-CACHE1[1]
X-CCDN-FORBID-CODE: 040001
7535 /
tcp
1911457608 | 2025-02-27T13:30:36.669551
\x00[\x00\x00\x00\x00\x00\x00
7548 /
tcp
2087396567 | 2025-03-09T14:44:07.094862
kjnkjabhbanc283ubcsbhdc72
7634 /
tcp
104385780 | 2025-03-15T16:52:37.733211
7700 /
tcp
504717326 | 2025-02-24T05:54:45.831240
SSH-2.0-OpenSSH_8.6
Vulnerabilities
1391945995 | 2025-03-15T05:33:51.242758
HTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=utf-8
Proxy-Authenticate: Basic realm=""
7778 /
tcp
-2031152423 | 2025-03-14T12:25:08.699068
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
-2118655245 | 2025-02-28T20:47:38.978735
HTTP/1.0 500 Internal Server Error
Content-Length: 20
7780 /
tcp
1363464823 | 2025-03-10T19:14:10.705290
7782 /
tcp
897328069 | 2025-03-17T15:24:31.834702
220 mail.scott000.com ESMTP
7790 /
tcp
1911457608 | 2025-03-17T05:18:24.783601
\x00[\x00\x00\x00\x00\x00\x00
7801 /
tcp
-1399940268 | 2025-03-05T19:09:34.697821
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7946 /
tcp
1911457608 | 2025-03-11T00:28:44.038196
\x00[\x00\x00\x00\x00\x00\x00
8000 /
tcp
-1036370807 | 2025-03-16T03:23:00.948358
8005 /
tcp
819727972 | 2025-03-13T20:26:44.869322
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8006 /
tcp
-2096652808 | 2025-02-22T22:08:37.902374
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8009 /
tcp
165188539 | 2025-03-15T04:24:02.568196
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8022 /
tcp
819727972 | 2025-03-16T20:32:01.293993
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1839934832 | 2025-02-27T20:04:22.845346
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
8041 /
tcp
165188539 | 2025-02-17T21:01:21.668271
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8044 /
tcp
-1899074860 | 2025-03-18T20:39:16.252974
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
8048 /
tcp
205347087 | 2025-03-15T22:15:34.737501
SSH-25453-Cisco-3524665.35\n
8053 /
tcp
165188539 | 2025-02-26T13:53:42.270789
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8058 /
tcp
-1730858130 | 2025-02-24T14:58:54.909870
RFB 003.008
VNC:
Protocol Version: 3.8
8059 /
tcp
-653033013 | 2025-03-07T12:33:04.057794
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
8062 /
tcp
-1399940268 | 2025-02-28T18:23:42.493134
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8072 /
tcp
-1279886438 | 2025-03-11T09:52:16.242675
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
8081 /
tcp
-653033013 | 2025-02-25T18:41:37.419827
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
8083 /
tcp
1308377066 | 2025-03-03T19:06:23.195089
8084 /
tcp
89142341 | 2025-02-26T06:57:34.677734
\x05\x00\x00\x00\x0b\x08\x05\x1a\x00
8085 /
tcp
1975288991 | 2025-03-17T02:39:54.816660
-2118655245 | 2025-02-27T00:47:17.517003
HTTP/1.0 500 Internal Server Error
Content-Length: 20
8087 /
tcp
-122096153 | 2025-03-13T06:59:03.607639
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
8092 /
tcp
-1888448627 | 2025-03-10T16:57:06.744975
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
648174097 | 2025-03-06T17:47:14.373970
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-IIS/10.0
X-Powered-By: ASP.NET
8101 /
tcp
1911457608 | 2025-03-11T11:00:08.841855
\x00[\x00\x00\x00\x00\x00\x00
8108 /
tcp
1381121983 | 2025-03-04T10:41:59.360832
8109 /
tcp
307999478 | 2025-03-18T23:03:27.114505
unknown command \r\nunknown command \r\n
8114 /
tcp
-891714208 | 2025-03-13T04:00:53.670025
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
8116 /
tcp
2063598737 | 2025-02-25T16:47:09.141944
8117 /
tcp
632542934 | 2025-03-13T10:09:09.089064
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
8122 /
tcp
-2140303521 | 2025-03-17T05:41:48.669961
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
8126 /
tcp
2087396567 | 2025-03-11T18:18:38.686610
kjnkjabhbanc283ubcsbhdc72
-1013082686 | 2025-03-12T06:54:00.065749
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
8139 /
tcp
539065883 | 2025-03-18T22:09:33.892697
8140 /
tcp
1741579575 | 2025-02-20T15:04:18.103571
8150 /
tcp
-1795027372 | 2025-03-14T02:14:14.770883
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
-1013082686 | 2025-03-18T13:40:01.671411
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
8154 /
tcp
1011407350 | 2025-03-13T18:48:39.369305
* OK GroupWise IMAP4rev1 Server Ready\r\n
-1839934832 | 2025-02-25T13:50:59.741331
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
8171 /
tcp
-784071826 | 2025-02-21T17:05:15.566108
SSH-2.0-OpenSSH_8.0
Vulnerabilities
8176 /
tcp
-1248408558 | 2025-02-26T13:42:59.401887
220 MikroTik FTP server (MikroTik 6.44.3) ready
8183 /
tcp
945910976 | 2025-02-28T16:07:33.609130
* OK TeamXchange IMAP4rev1 server (otyUg) ready.\r\n
8189 /
tcp
321971019 | 2025-02-22T07:24:04.330962
-ERR client ip is not in whitelist\r
8197 /
tcp
-1399940268 | 2025-03-08T19:15:23.771068
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8198 /
tcp
1767345577 | 2025-03-08T13:59:30.365376
Hello, this is Quagga (version 0T).
Copyright 1996-200
19227125 | 2025-02-25T22:57:10.731120
HTTP/1.1 200 OK
CONNECTION: close
Etag: "1615985214:91b0"
CONTENT-LENGTH: 37296
CACHE-CONTROL: max-age=0
X-Frame-Options: SAMEORIGIN
Strict-Transport-Security: max-age=604800; includeSubDomains
X-XSS-Protection: 1;mode=block
X-Content-Type-Options: nosniff
CONTENT-TYPE: text/html
8291 /
tcp
-1899074860 | 2025-02-28T20:14:20.485706
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
8333 /
tcp
-1487943323 | 2025-03-11T20:15:09.927116
431 Unable to negotiate secure command connection.\r\n
8350 /
tcp
819727972 | 2025-03-14T16:51:10.893158
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8384 /
tcp
-1730858130 | 2025-03-04T14:19:52.000447
RFB 003.008
VNC:
Protocol Version: 3.8
8388 /
tcp
-1730858130 | 2025-03-15T10:16:03.810880
RFB 003.008
VNC:
Protocol Version: 3.8
-2107996212 | 2025-03-09T22:54:00.974431
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
8419 /
tcp
-1626979812 | 2025-02-20T08:20:20.672064
220 Service ready for new user.
8420 /
tcp
-1399940268 | 2025-02-25T02:58:52.602982
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8436 /
tcp
632542934 | 2025-03-13T22:37:59.327942
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
1096654864 | 2025-03-16T10:10:23.260079
HTTP/1.0 200 OK
Server: httpd/2.0
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
Content-Type: text/html
Connection: close
8448 /
tcp
1911457608 | 2025-03-10T13:38:28.166928
\x00[\x00\x00\x00\x00\x00\x00
8449 /
tcp
-1399940268 | 2025-02-20T22:11:23.285940
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8451 /
tcp
1665283070 | 2025-02-26T01:04:15.091587
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x01\x00\x00\x10\x00\x00\n0\x03\x00\x00\x00\x01\x00\x05\x00\x00@\x00\x00\x06\x00\x00\x1f@
8453 /
tcp
-904840257 | 2025-03-09T04:40:39.479888
572 Relay not authorized\r\n
8460 /
tcp
1189133115 | 2025-03-16T22:09:13.214178
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
8463 /
tcp
1911457608 | 2025-02-21T22:25:00.675924
\x00[\x00\x00\x00\x00\x00\x00
8470 /
tcp
1911457608 | 2025-03-06T06:16:14.973042
\x00[\x00\x00\x00\x00\x00\x00
8488 /
tcp
-2096652808 | 2025-03-06T23:11:57.786194
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8500 /
tcp
-684625978 | 2025-03-16T15:59:07.297382
{Datacenter:dc1 NodeName:consul-dev NodeID:e61aec6b-e338-67fa-3b08-f8185bd5b528 Revision:db839f18b Server:true Version:1.10.1}
8502 /
tcp
408230060 | 2025-02-23T00:50:02.383278
\r\nSorry, that nickname format is invalid.\r\n
8505 /
tcp
-980525298 | 2025-02-27T12:27:19.517880
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8510 /
tcp
-1399940268 | 2025-03-17T05:47:12.554782
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8513 /
tcp
-1888448627 | 2025-02-26T20:28:42.471797
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8525 /
tcp
-1888448627 | 2025-03-13T12:17:19.489829
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8528 /
tcp
-2089734047 | 2025-02-25T03:05:22.102734
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8529 /
tcp
-2017887953 | 2025-03-12T12:27:35.594204
SSH-2.0-OpenSSH_7.9
Vulnerabilities
8531 /
tcp
-1888448627 | 2025-03-15T01:28:46.192783
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8540 /
tcp
-1730858130 | 2025-03-12T02:33:19.102493
RFB 003.008
VNC:
Protocol Version: 3.8
8543 /
tcp
1210754493 | 2025-02-26T03:04:28.964777
0\x0c\x02\x01\x01a\x07\n\x01\x00\x04\x00\x04\x00
8545 /
tcp
1189133115 | 2025-02-23T23:23:59.821427
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
8548 /
tcp
-1399940268 | 2025-02-19T11:16:00.402637
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8549 /
tcp
-1399940268 | 2025-03-05T03:02:50.653183
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1282941221 | 2025-03-08T22:05:28.368284
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
8557 /
tcp
-136006866 | 2025-02-28T01:16:33.290208
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
8570 /
tcp
-1399940268 | 2025-03-08T14:14:47.814734
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8575 /
tcp
921225407 | 2025-03-18T14:51:42.367209
\x00\x00\x00\x04\x00\x00\x00\x00\x00
8580 /
tcp
1911457608 | 2025-03-15T16:28:12.127397
\x00[\x00\x00\x00\x00\x00\x00
8581 /
tcp
-891714208 | 2025-03-16T03:20:22.851172
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
8583 /
tcp
-891714208 | 2025-02-27T22:05:34.476888
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
8590 /
tcp
-891714208 | 2025-03-13T17:37:05.270449
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
8594 /
tcp
-891714208 | 2025-03-16T22:14:19.457446
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
-590834724 | 2025-03-14T18:07:15.556038
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1705938553.503-w-waf05shgt2
8607 /
tcp
632542934 | 2025-03-15T11:29:21.176139
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
8637 /
tcp
921225407 | 2025-03-05T04:33:13.496524
\x00\x00\x00\x04\x00\x00\x00\x00\x00
8649 /
tcp
842535728 | 2025-03-11T13:59:40.961342
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
8663 /
tcp
1623746877 | 2025-02-26T07:35:31.467177
500 Permission denied - closing connection.\r\n
-1839934832 | 2025-03-04T20:26:43.508410
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
8700 /
tcp
819727972 | 2025-02-25T08:19:26.916845
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-179406756 | 2025-03-08T14:56:50.345407
HTTP/1.1 403 Forbidden
Server: openresty
Content-Type: text/html
Connection: keep-alive
Deny-Reason: hotload rechange server uri format error!!
Request-Id: 65ab596aa2acf9750116c4fabd5eefaf
8705 /
tcp
1504401647 | 2025-03-04T03:57:20.308408
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
8728 /
tcp
639175818 | 2025-03-16T14:04:40.284762
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
971933601 | 2025-02-25T20:21:36.376756
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
8743 /
tcp
-136006866 | 2025-02-21T14:58:25.133385
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
8764 /
tcp
-1036370807 | 2025-03-14T10:46:13.014339
8771 /
tcp
-1648456501 | 2025-03-06T19:04:25.204414
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
8789 /
tcp
-1399940268 | 2025-03-15T03:30:52.848517
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8803 /
tcp
-1888448627 | 2025-02-25T17:14:56.729917
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8805 /
tcp
819727972 | 2025-03-18T16:27:57.945495
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8807 /
tcp
819727972 | 2025-03-15T20:47:49.749213
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8815 /
tcp
1991883981 | 2025-03-07T10:52:11.658364
B\x00\x00\x00\xc3\xbfn\x04Too many connections
8816 /
tcp
2063598737 | 2025-02-28T22:01:07.071611
8817 /
tcp
-2089734047 | 2025-02-19T13:52:34.898457
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8819 /
tcp
-2089734047 | 2025-03-16T15:51:53.530689
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8824 /
tcp
-1189269828 | 2025-03-12T12:35:08.554507
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8827 /
tcp
819727972 | 2025-03-12T23:36:49.979193
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8828 /
tcp
-1428621233 | 2025-02-27T21:32:26.593523
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
8834 /
tcp
474736340 | 2025-03-17T12:07:24.212428
431 Unable to negotiate secure command connection.
8837 /
tcp
-142686627 | 2025-02-19T22:54:43.601610
\x00[\xc2\xba\x7fs\x7f\x00\x00
8840 /
tcp
1519486042 | 2025-02-28T21:42:44.478567
<KU_goodbye>Protocol Error: XML data is not well-formed.</KU_goodbye>
-288825733 | 2025-03-07T00:57:58.321026
HTTP/1.1 200 OK
Connection: close
Content-Length: 2619
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Headers: authorization,Content-Type
Access-Control-Allow-Methods: POST, GET, OPTIONS, PUT, HEAD, DELETE
Content-Type: text/html
Server: Jetty(9.4.14.v20181114)
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1
8847 /
tcp
-1888448627 | 2025-03-04T03:32:43.023961
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8850 /
tcp
1011407350 | 2025-02-24T15:23:49.086047
* OK GroupWise IMAP4rev1 Server Ready\r\n
8863 /
tcp
1278527606 | 2025-02-21T11:24:44.067709
8865 /
tcp
165188539 | 2025-02-26T00:29:28.987906
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8875 /
tcp
1353260875 | 2025-03-14T05:56:13.894035
\x00[g\xc2\x95N\x7f\x00\x00
8880 /
tcp
2087396567 | 2025-03-06T10:24:48.480900
kjnkjabhbanc283ubcsbhdc72
8881 /
tcp
1308377066 | 2025-02-21T06:36:34.690437
8887 /
tcp
-653033013 | 2025-02-23T15:07:16.561538
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
8889 /
tcp
-358801646 | 2025-03-14T01:05:04.641502
8890 /
tcp
-1399940268 | 2025-03-10T23:04:37.538205
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
372433470 | 2025-03-18T13:29:11.901321
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
8913 /
tcp
819727972 | 2025-03-09T21:23:17.094391
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8980 /
tcp
1615193817 | 2025-02-25T00:53:25.318127
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
8993 /
tcp
1492413928 | 2025-02-21T07:58:14.361948
SSH-2.0-OpenSSH_7.5
Vulnerabilities
9000 /
tcp
-2067028711 | 2025-03-18T05:44:15.504870
\x15\x03\x01\x00\x02\x02F
9001 /
tcp
-1026951088 | 2025-03-11T18:22:33.970081
-2107996212 | 2025-03-06T03:37:20.294680
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
-1013082686 | 2025-03-16T15:56:16.653357
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
9017 /
tcp
1381121983 | 2025-03-12T16:04:22.699229
2103111368 | 2025-02-24T23:59:45.403708
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
9021 /
tcp
632542934 | 2025-03-12T07:33:17.672447
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
9027 /
tcp
-653033013 | 2025-02-25T08:02:41.589809
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
9031 /
tcp
-1399940268 | 2025-02-17T20:43:54.956192
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2143387245 | 2025-02-25T02:51:06.622670
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
9033 /
tcp
-1399940268 | 2025-02-19T19:25:31.133891
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1453516345 | 2025-02-25T17:37:00.187188
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
-1992400236 | 2025-03-05T22:07:50.115532
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65aa14b1_PS-000-01WVo210_17348-20089
9041 /
tcp
-1399940268 | 2025-03-17T21:56:52.808803
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9046 /
tcp
-1399940268 | 2025-03-12T08:22:07.224457
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9051 /
tcp
671605376 | 2025-03-15T11:56:34.031532
9055 /
tcp
669849225 | 2025-03-05T02:35:49.603051
SSH-98.60-SysaxSSH_81885..42\r\n
9062 /
tcp
-1099385124 | 2025-03-13T03:36:43.540947
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
971933601 | 2025-02-19T21:04:47.800214
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
9067 /
tcp
-2031152423 | 2025-02-21T19:15:56.874337
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
9069 /
tcp
1726594447 | 2025-03-11T15:06:07.007317
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
9070 /
tcp
921225407 | 2025-02-28T04:06:23.629117
\x00\x00\x00\x04\x00\x00\x00\x00\x00
9073 /
tcp
-1810987450 | 2025-02-21T02:07:59.977218
9086 /
tcp
1911457608 | 2025-02-28T23:58:56.614841
\x00[\x00\x00\x00\x00\x00\x00
9091 /
tcp
2087396567 | 2025-03-08T21:25:43.697387
kjnkjabhbanc283ubcsbhdc72
-1839934832 | 2025-03-12T11:59:44.160945
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
9097 /
tcp
-1428621233 | 2025-03-17T18:03:10.254146
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
9100 /
tcp
-1148066627 | 2025-03-12T04:39:31.563703
\x00[\xc2\x84\xc2\x86\xc3\xb2\x7f\x00\x00
9104 /
tcp
-1265999252 | 2025-03-18T11:20:45.326071
220 VMware Authentication Daemon Version 1.0, ServerDaemonProto\ncol:SOAP, MKSDisplayProtocol:VNC , ,
9105 /
tcp
-1265999252 | 2025-02-25T04:48:20.562899
220 VMware Authentication Daemon Version 1.0, ServerDaemonProto\ncol:SOAP, MKSDisplayProtocol:VNC , ,
9119 /
tcp
1208318993 | 2025-02-22T22:16:22.101504
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
9122 /
tcp
-2089734047 | 2025-03-12T17:18:18.993559
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9125 /
tcp
632542934 | 2025-02-23T23:07:43.971118
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
9126 /
tcp
921225407 | 2025-03-11T12:00:44.839588
\x00\x00\x00\x04\x00\x00\x00\x00\x00
9130 /
tcp
-1477838366 | 2025-03-14T01:59:43.323163
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
9133 /
tcp
819727972 | 2025-03-15T02:18:35.472128
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9141 /
tcp
-407828767 | 2025-02-24T13:25:00.937905
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
9150 /
tcp
-1730858130 | 2025-03-13T00:16:22.165948
RFB 003.008
VNC:
Protocol Version: 3.8
2103111368 | 2025-03-12T08:53:55.896777
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
9159 /
tcp
1208318993 | 2025-03-04T21:28:45.021043
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
9160 /
tcp
-1399940268 | 2025-03-13T13:41:09.533334
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9173 /
tcp
-1399940268 | 2025-03-06T07:34:37.709217
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9174 /
tcp
-1399940268 | 2025-03-10T14:03:36.921008
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9178 /
tcp
819727972 | 2025-03-11T12:40:28.782237
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9196 /
tcp
-2046514463 | 2025-03-09T11:37:02.871583
9204 /
tcp
1911457608 | 2025-02-19T01:16:19.168461
\x00[\x00\x00\x00\x00\x00\x00
9208 /
tcp
-2089734047 | 2025-03-05T09:50:11.486898
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9213 /
tcp
-1327660293 | 2025-03-06T05:27:21.988473
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
9220 /
tcp
-1477838366 | 2025-03-06T09:44:04.977841
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
9221 /
tcp
-1399940268 | 2025-03-09T19:21:02.218382
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1077013874 | 2025-03-15T22:13:01.176258
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
9252 /
tcp
740837454 | 2025-02-17T07:05:52.940049
SSH-2.0-OpenSSH_5.3
Vulnerabilities
9253 /
tcp
740837454 | 2025-02-23T10:19:59.852382
SSH-2.0-OpenSSH_5.3
Vulnerabilities
9273 /
tcp
493955023 | 2025-02-21T00:54:38.850737
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
9283 /
tcp
1911457608 | 2025-02-23T02:41:42.682457
\x00[\x00\x00\x00\x00\x00\x00
9291 /
tcp
1911457608 | 2025-03-15T16:31:23.058444
\x00[\x00\x00\x00\x00\x00\x00
9307 /
tcp
-1399940268 | 2025-02-22T06:27:48.378463
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9333 /
tcp
-1476017887 | 2025-03-04T11:38:48.030562
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
9387 /
tcp
455076604 | 2025-03-13T12:21:09.734443
!\x07version\x04bind7 t{RPowerDNS Recursor 410
9393 /
tcp
-2089734047 | 2025-02-26T16:34:36.443125
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9398 /
tcp
1426971893 | 2025-03-04T16:03:47.216627
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
1529351907 | 2025-02-17T21:52:19.045848
HTTP/1.1 407 OK
Content-Type: text/plain; charset=utf-8
Connection: keep-alive
please add white ip *.*.*.*
9433 /
tcp
-801484042 | 2025-02-27T16:25:26.053111
9441 /
tcp
-358801646 | 2025-03-18T07:37:53.042644
1282941221 | 2025-03-16T07:25:55.887138
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
9444 /
tcp
-1399940268 | 2025-03-17T06:52:48.181054
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9445 /
tcp
-1888448627 | 2025-02-19T06:14:50.150739
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9454 /
tcp
-992671574 | 2025-03-06T20:09:52.482843
9456 /
tcp
-2046514463 | 2025-03-10T07:27:10.684579
9458 /
tcp
-2096652808 | 2025-03-04T05:10:30.706471
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
9465 /
tcp
321971019 | 2025-02-17T13:12:16.697499
-ERR client ip is not in whitelist\r
2143387245 | 2025-02-25T04:47:26.186031
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
9505 /
tcp
632542934 | 2025-03-06T13:11:07.738946
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
9513 /
tcp
-1399940268 | 2025-03-16T14:07:10.027451
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9527 /
tcp
-274082663 | 2025-03-15T13:02:26.054590
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
9530 /
tcp
1911457608 | 2025-03-08T18:07:57.740500
\x00[\x00\x00\x00\x00\x00\x00
9532 /
tcp
205347087 | 2025-03-06T04:33:52.705442
SSH-25453-Cisco-3524665.35\n
9600 /
tcp
819727972 | 2025-03-05T02:31:49.693098
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9606 /
tcp
921225407 | 2025-02-25T09:38:52.025462
\x00\x00\x00\x04\x00\x00\x00\x00\x00
9633 /
tcp
957278843 | 2025-02-19T17:30:30.570865
9690 /
tcp
-1248408558 | 2025-02-28T18:50:54.756509
220 MikroTik FTP server (MikroTik 6.44.3) ready
9761 /
tcp
-1399940268 | 2025-03-16T07:32:55.550514
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9779 /
tcp
-1105333987 | 2025-02-23T22:49:49.102177
9802 /
tcp
1911457608 | 2025-02-22T01:20:31.621292
\x00[\x00\x00\x00\x00\x00\x00
9804 /
tcp
707919486 | 2025-02-23T17:58:22.520133
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
9876 /
tcp
2070013657 | 2025-03-15T03:07:41.651032
\\x00\\x00\\x01+\\x00\\x00\\x00_{"code":0,"flag":1,"language":"JAVA","opaque":0,"serializeTypeCurrentRPC":"JSON","version":433}{"brokerAddrTable":{"broker-a":{"brokerAddrs":{0:"127.63.135.245:10911"},"brokerName":"broker-a","cluster":"DefaultCluster","enableActingMaster":false}},"clusterAddrTable":{"DefaultCluster":["broker-a"]}}
9885 /
tcp
1911457608 | 2025-02-22T07:12:26.998569
\x00[\x00\x00\x00\x00\x00\x00
1615676803 | 2025-03-04T00:13:35.189455
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Accept-Ranges: bytes
Etag: "s5sw6112h"
492642197 | 2025-02-28T02:13:24.163170
HTTP/1.1 404 Not Found
Content-Type: text/plain; charset=utf-8
Via: 1.1 google
Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
X-Non-Compliaence: CK6u06Vu4
9901 /
tcp
1726594447 | 2025-03-17T23:15:14.290931
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
9902 /
tcp
-1399940268 | 2025-03-05T00:01:48.559653
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
49504708 | 2025-02-24T16:08:12.117905
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1705934624.751-s5jhg
9944 /
tcp
104385780 | 2025-03-18T06:38:19.679013
9991 /
tcp
819727972 | 2025-03-14T18:52:20.434598
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9992 /
tcp
-1327660293 | 2025-02-21T11:31:51.994609
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
-1901729922 | 2025-02-19T18:37:15.627173
HTTP/1.1 404
Vary: Origin
Vary: Access-Control-Request-Method
Vary: Access-Control-Request-Headers
Content-Type: application/json
Transfer-Encoding: chunked
9999 /
tcp
1161309183 | 2025-03-10T01:39:48.465739
10000 /
tcp
-321444299 | 2025-03-13T19:18:49.457769
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
10001 /
tcp
1492413928 | 2025-03-03T19:02:37.971191
SSH-2.0-OpenSSH_7.5
Vulnerabilities
10006 /
tcp
-358801646 | 2025-02-26T12:11:28.180128
10008 /
tcp
-457235091 | 2025-02-18T21:35:03.857244
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
10020 /
tcp
1911457608 | 2025-03-14T09:48:02.345474
\x00[\x00\x00\x00\x00\x00\x00
10024 /
tcp
-234408721 | 2025-02-22T07:31:52.854358
\\x00[\'(\\xc0\\xa8Y\\xfd
10029 /
tcp
1948301213 | 2025-03-06T19:44:32.497026
RFB 003.003
VNC:
Protocol Version: 3.3
10030 /
tcp
1504401647 | 2025-03-06T04:13:54.415275
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
10047 /
tcp
-1810987450 | 2025-03-04T13:31:30.500013
10049 /
tcp
-441419608 | 2025-03-12T17:29:58.129007
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
10050 /
tcp
841014058 | 2025-03-12T11:39:57.874499
Hello, this is FRRouting (version 4.0).
Copyright 19
96-2005 Kunihiro Ishiguro, et al.
Use...
10100 /
tcp
1426971893 | 2025-03-14T12:29:46.996181
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
10123 /
tcp
-358801646 | 2025-03-18T12:45:22.564376
10134 /
tcp
-1648456501 | 2025-03-18T05:39:14.313442
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
10210 /
tcp
1519486042 | 2025-03-18T07:44:45.678145
<KU_goodbye>Protocol Error: XML data is not well-formed.</KU_goodbye>
10250 /
tcp
1778988322 | 2025-02-25T19:25:40.968295
* OK GroupWise IMAP4rev1 Server Ready
10254 /
tcp
-2089734047 | 2025-02-27T21:52:06.323038
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
10283 /
tcp
819727972 | 2025-03-06T08:32:35.209558
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1830697416 | 2025-02-27T18:51:50.541204
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
10443 /
tcp
996960436 | 2025-03-05T00:05:41.877271
10444 /
tcp
-1097188123 | 2025-03-04T04:29:09.925000
10810 /
tcp
-1399940268 | 2025-03-04T16:57:13.607955
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10892 /
tcp
-1327660293 | 2025-02-27T07:41:43.913617
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
10909 /
tcp
-1888448627 | 2025-02-26T03:02:39.767744
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
10911 /
tcp
-1888448627 | 2025-03-18T20:27:41.352374
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
10934 /
tcp
-1399940268 | 2025-03-08T16:05:27.280894
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
11000 /
tcp
-358801646 | 2025-03-08T19:18:43.447128
11001 /
tcp
-1399940268 | 2025-03-18T06:42:23.358066
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
11082 /
tcp
-2096652808 | 2025-02-27T07:31:09.052390
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1282941221 | 2025-03-16T00:59:57.152761
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
11112 /
tcp
1911457608 | 2025-03-07T04:59:57.939288
\x00[\x00\x00\x00\x00\x00\x00
2103111368 | 2025-03-18T15:38:51.155490
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
11211 /
tcp
-136006866 | 2025-03-10T14:31:18.459312
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
11288 /
tcp
-142686627 | 2025-03-09T18:47:23.976772
\x00[\xc2\xba\x7fs\x7f\x00\x00
11300 /
tcp
165188539 | 2025-03-16T12:02:48.844990
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
11480 /
tcp
-1399940268 | 2025-03-12T02:37:31.506675
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-2046909074 | 2025-02-27T04:36:06.813677
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae217c_PS-000-01mL925_24271-10054
12016 /
tcp
-1297953727 | 2025-03-09T11:10:52.814117
\x02\x00\x00\x00\x00\x00\x06\x04\x00\x00\x00\x00\x00\x0c\x00\x00\n0\x00\x1c
12101 /
tcp
-2096652808 | 2025-03-07T02:06:46.123902
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12107 /
tcp
1632932802 | 2025-02-28T21:39:59.257719
12111 /
tcp
-891714208 | 2025-03-10T08:00:29.861838
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
12112 /
tcp
-1611764932 | 2025-03-08T17:37:58.450542
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
12114 /
tcp
-1327660293 | 2025-03-03T18:24:19.703489
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
12118 /
tcp
-1399940268 | 2025-02-24T03:21:22.721860
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12121 /
tcp
-1795027372 | 2025-03-12T10:39:00.339699
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
12122 /
tcp
677934968 | 2025-03-14T23:43:13.798797
12124 /
tcp
1011407350 | 2025-03-11T10:59:31.452175
* OK GroupWise IMAP4rev1 Server Ready\r\n
12143 /
tcp
-1139539254 | 2025-02-22T23:06:15.699234
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
12163 /
tcp
-303199180 | 2025-03-18T12:18:59.598306
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
12165 /
tcp
-1399940268 | 2025-03-08T14:08:52.310848
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12166 /
tcp
819727972 | 2025-02-21T21:05:19.309577
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12170 /
tcp
671605376 | 2025-03-15T16:01:43.338003
-1839934832 | 2025-02-24T09:37:50.865444
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
12188 /
tcp
165188539 | 2025-03-05T10:01:04.153399
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12192 /
tcp
1911457608 | 2025-03-15T04:55:08.840141
\x00[\x00\x00\x00\x00\x00\x00
12193 /
tcp
504717326 | 2025-03-09T22:20:59.078147
SSH-2.0-OpenSSH_8.6
Vulnerabilities
2103111368 | 2025-03-17T16:23:49.767004
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
12198 /
tcp
-1795027372 | 2025-03-17T00:04:25.147283
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
12203 /
tcp
-1399940268 | 2025-02-18T07:39:01.678453
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12217 /
tcp
-1435414831 | 2025-02-23T12:22:25.799295
12218 /
tcp
-1399940268 | 2025-03-04T03:27:30.722618
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12219 /
tcp
-653033013 | 2025-03-11T17:31:46.896124
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
12222 /
tcp
1723769361 | 2025-03-11T16:37:25.929221
ELM Enterprise Manager _l\r\nCopyright \xc2\xa9 18668511-928641920 TNT Software, Inc.\r\n
12225 /
tcp
1911457608 | 2025-02-25T16:06:38.590702
\x00[\x00\x00\x00\x00\x00\x00
12233 /
tcp
1911457608 | 2025-03-04T19:44:17.806159
\x00[\x00\x00\x00\x00\x00\x00
-1230049476 | 2025-02-26T10:45:02.651979
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
12242 /
tcp
-274082663 | 2025-03-15T10:26:24.093453
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
12243 /
tcp
-249504111 | 2025-03-10T15:32:46.849982
12246 /
tcp
321971019 | 2025-03-13T12:00:53.603246
-ERR client ip is not in whitelist\r
12248 /
tcp
-747911285 | 2025-03-11T14:08:40.525720
12258 /
tcp
321971019 | 2025-03-16T00:45:38.178506
-ERR client ip is not in whitelist\r
12272 /
tcp
819727972 | 2025-03-13T06:25:29.874614
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12283 /
tcp
1615193817 | 2025-02-28T20:37:09.440182
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
12289 /
tcp
-747911285 | 2025-03-10T20:07:36.700111
12294 /
tcp
321971019 | 2025-03-04T20:42:34.640836
-ERR client ip is not in whitelist\r
12297 /
tcp
-1888448627 | 2025-03-07T08:15:58.341013
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12304 /
tcp
-1428621233 | 2025-03-11T07:58:52.941186
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
12305 /
tcp
1134517380 | 2025-03-12T09:49:05.538631
welcome to Pandora console!\r\n----------------------------\n-------------------------\n| Login Time | 2021-12-08 1...\n
12306 /
tcp
-1888448627 | 2025-02-19T20:05:05.833353
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12308 /
tcp
-1329831334 | 2025-02-27T15:58:58.152930
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
12309 /
tcp
1911457608 | 2025-03-17T15:48:19.619812
\x00[\x00\x00\x00\x00\x00\x00
12314 /
tcp
-653033013 | 2025-02-17T20:54:14.612542
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
12315 /
tcp
-801484042 | 2025-03-07T15:47:01.216964
12325 /
tcp
1363464823 | 2025-02-25T10:13:44.843570
12333 /
tcp
89142341 | 2025-03-10T16:33:37.654534
\x05\x00\x00\x00\x0b\x08\x05\x1a\x00
12337 /
tcp
-1399940268 | 2025-02-27T06:28:00.407837
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
488204803 | 2025-03-15T14:50:45.740620
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae263c_CS-000-01Avv40_829-3172
12351 /
tcp
-1399940268 | 2025-03-14T10:59:31.769347
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2103111368 | 2025-02-25T04:24:02.576809
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
12360 /
tcp
921225407 | 2025-03-14T03:18:01.699347
\x00\x00\x00\x04\x00\x00\x00\x00\x00
12362 /
tcp
921225407 | 2025-03-17T17:18:31.171181
\x00\x00\x00\x04\x00\x00\x00\x00\x00
12364 /
tcp
2063598737 | 2025-02-18T00:31:09.998959
12375 /
tcp
-1399940268 | 2025-02-17T23:30:10.237480
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12380 /
tcp
165188539 | 2025-03-13T03:38:46.964122
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12383 /
tcp
819727972 | 2025-03-11T10:09:28.202037
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12386 /
tcp
-1399940268 | 2025-02-23T05:28:52.885015
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12387 /
tcp
921225407 | 2025-03-15T10:17:07.132256
\x00\x00\x00\x04\x00\x00\x00\x00\x00
12389 /
tcp
103159425 | 2025-03-06T03:35:14.675395
12391 /
tcp
321971019 | 2025-03-04T19:27:55.574472
-ERR client ip is not in whitelist\r
12395 /
tcp
-653033013 | 2025-02-19T09:11:49.821127
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
-1839934832 | 2025-03-16T16:46:18.274014
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
12401 /
tcp
-1105333987 | 2025-03-13T22:47:18.116098
12403 /
tcp
-1032713145 | 2025-02-20T23:14:17.625593
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
12405 /
tcp
-653033013 | 2025-03-10T08:45:54.007766
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
12407 /
tcp
-1261090339 | 2025-03-13T07:46:12.242054
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
12411 /
tcp
-1598265216 | 2025-03-15T15:40:38.929768
12412 /
tcp
1911457608 | 2025-03-12T07:52:06.335300
\x00[\x00\x00\x00\x00\x00\x00
12415 /
tcp
-1327660293 | 2025-03-09T15:08:15.198109
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
12427 /
tcp
-1399940268 | 2025-03-15T05:41:25.025692
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-2107996212 | 2025-03-18T08:52:12.772326
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
12432 /
tcp
1911457608 | 2025-03-06T04:37:49.228170
\x00[\x00\x00\x00\x00\x00\x00
12436 /
tcp
-2017887953 | 2025-03-06T09:06:12.409123
SSH-2.0-OpenSSH_7.9
Vulnerabilities
12447 /
tcp
1911457608 | 2025-02-17T03:18:12.479592
\x00[\x00\x00\x00\x00\x00\x00
-2107996212 | 2025-03-01T01:39:05.777619
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
12472 /
tcp
819727972 | 2025-02-20T18:10:51.967837
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1839934832 | 2025-02-18T20:58:36.502742
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
12474 /
tcp
1911457608 | 2025-02-23T09:45:54.482019
\x00[\x00\x00\x00\x00\x00\x00
12475 /
tcp
-832380282 | 2025-02-26T04:10:17.575173
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).\n
12477 /
tcp
165188539 | 2025-03-18T20:04:54.125109
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12478 /
tcp
-2089734047 | 2025-03-09T12:56:12.462239
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12484 /
tcp
1991883981 | 2025-03-11T23:36:52.235707
B\x00\x00\x00\xc3\xbfn\x04Too many connections
12485 /
tcp
-1399940268 | 2025-03-10T21:20:36.257896
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12491 /
tcp
165188539 | 2025-03-17T18:44:09.008670
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12503 /
tcp
-407828767 | 2025-03-18T01:34:40.618293
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
12509 /
tcp
-1477838366 | 2025-02-27T08:19:36.325245
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
12516 /
tcp
1623746877 | 2025-02-17T22:08:19.931332
500 Permission denied - closing connection.\r\n
12519 /
tcp
-1399940268 | 2025-03-03T22:59:55.511007
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12535 /
tcp
15018106 | 2025-02-26T05:07:47.944801
\x00\x19\x02\x00\x02\x00\x07\x00Protocol version mismatch\x00
12537 /
tcp
-1399940268 | 2025-02-24T06:14:34.270500
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12540 /
tcp
-274082663 | 2025-02-18T04:15:57.920206
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
12541 /
tcp
819727972 | 2025-03-17T02:34:21.072834
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12547 /
tcp
820958131 | 2025-03-12T22:20:32.999900
kjnkjabhbanc283ubcsbhdc72\x02
12554 /
tcp
1911457608 | 2025-02-24T12:16:13.969337
\x00[\x00\x00\x00\x00\x00\x00
12565 /
tcp
-1399940268 | 2025-03-14T22:28:29.952454
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12570 /
tcp
-1399940268 | 2025-03-15T21:12:18.383879
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12579 /
tcp
-1730858130 | 2025-03-08T17:46:52.692580
RFB 003.008
VNC:
Protocol Version: 3.8
12583 /
tcp
-1399940268 | 2025-02-23T23:20:57.598828
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12615 /
tcp
-1888448627 | 2025-03-13T06:06:08.786374
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
13047 /
tcp
2087396567 | 2025-03-11T21:59:25.951152
kjnkjabhbanc283ubcsbhdc72
14104 /
tcp
1911457608 | 2025-03-04T21:22:50.371417
\x00[\x00\x00\x00\x00\x00\x00
14147 /
tcp
-1399940268 | 2025-03-01T02:02:46.238574
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
14265 /
tcp
873425297 | 2025-03-06T10:33:36.188980
200 NOD32SS 99 (3318497116)
14344 /
tcp
1911457608 | 2025-03-12T18:42:27.800490
\x00[\x00\x00\x00\x00\x00\x00
14402 /
tcp
-1730858130 | 2025-03-05T12:00:01.866460
RFB 003.008
VNC:
Protocol Version: 3.8
14406 /
tcp
103159425 | 2025-02-25T04:53:52.919311
14443 /
tcp
-1626979812 | 2025-03-16T17:08:38.277880
220 Service ready for new user.
14894 /
tcp
1308377066 | 2025-03-05T20:33:39.776422
-2107996212 | 2025-02-21T09:54:50.071532
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
14905 /
tcp
580340387 | 2025-02-20T20:55:03.039056
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
15040 /
tcp
401555314 | 2025-02-28T13:32:24.570607
1830697416 | 2025-03-15T20:09:40.032349
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
15443 /
tcp
1286504516 | 2025-03-14T04:13:19.474541
CP2E Control Console
Connected to Host: gZI
16000 /
tcp
1944032451 | 2025-02-19T15:38:20.273090
K\\x02%~)J/\\tHjU(IAGENT = (AGENT_VERSION = 2388790170)(RPC_VERSION = 5..722))
16007 /
tcp
51259122 | 2025-03-18T11:25:23.700568
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
0 | 2025-03-14T01:23:01.026107
HTTP/1.1 408 Request Timeout
Content-Length: 0
16014 /
tcp
493955023 | 2025-02-19T22:50:08.423178
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
16016 /
tcp
-1954816821 | 2025-02-18T18:36:30.485432
16017 /
tcp
51259122 | 2025-02-23T02:28:25.344303
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
16019 /
tcp
921225407 | 2025-02-18T09:52:38.335112
\x00\x00\x00\x04\x00\x00\x00\x00\x00
16020 /
tcp
50497985 | 2025-03-15T12:57:46.474974
\x00[\xc3\x88\xc3\x9dS\x7f\x00\x00
16022 /
tcp
-358801646 | 2025-02-17T15:26:25.073757
16028 /
tcp
819727972 | 2025-03-04T22:42:41.518484
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16036 /
tcp
1911457608 | 2025-03-11T22:22:44.853201
\x00[\x00\x00\x00\x00\x00\x00
16037 /
tcp
632542934 | 2025-03-10T01:58:21.795545
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
16042 /
tcp
1911457608 | 2025-03-04T05:39:17.388694
\x00[\x00\x00\x00\x00\x00\x00
16046 /
tcp
-1399940268 | 2025-03-18T03:46:06.278167
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16050 /
tcp
-1810987450 | 2025-03-06T17:02:59.786305
16057 /
tcp
1911457608 | 2025-03-04T19:08:32.207030
\x00[\x00\x00\x00\x00\x00\x00
16064 /
tcp
-1189269828 | 2025-02-27T16:42:43.991352
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
16066 /
tcp
-1399940268 | 2025-02-23T02:49:43.222819
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16071 /
tcp
-1648456501 | 2025-02-18T16:17:21.319284
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
16072 /
tcp
-1399940268 | 2025-02-24T10:25:52.039851
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16081 /
tcp
921225407 | 2025-02-23T01:16:00.238085
\x00\x00\x00\x04\x00\x00\x00\x00\x00
16085 /
tcp
1370263973 | 2025-02-23T17:51:47.168516
16089 /
tcp
-1105333987 | 2025-02-28T16:49:10.927924
16090 /
tcp
1996932384 | 2025-03-10T23:21:09.752683
16401 /
tcp
-2096652808 | 2025-03-09T07:39:11.864890
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
16443 /
tcp
-1899074860 | 2025-02-20T15:23:05.245810
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
16601 /
tcp
-1810987450 | 2025-03-17T01:43:34.717412
16666 /
tcp
599074451 | 2025-03-06T23:01:57.422241
16993 /
tcp
819727972 | 2025-02-26T17:20:46.211958
SSH-2.0-OpenSSH_7.4
Vulnerabilities
17070 /
tcp
398077695 | 2025-03-09T04:21:15.753147
17770 /
tcp
1723769361 | 2025-03-07T13:26:14.083005
ELM Enterprise Manager _l\r\nCopyright \xc2\xa9 18668511-928641920 TNT Software, Inc.\r\n
17772 /
tcp
1767345577 | 2025-03-15T06:06:54.504429
Hello, this is Quagga (version 0T).
Copyright 1996-200
17775 /
tcp
-1399940268 | 2025-03-17T03:18:04.472430
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
17780 /
tcp
-122096153 | 2025-02-17T04:07:21.754135
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
18000 /
tcp
1541211644 | 2025-03-13T06:21:18.201774
18002 /
tcp
45131230 | 2025-03-17T21:05:46.763786
inv2W\x04\x0f\x00\x00\x00\x01\x00\t\x00\x00\x00
18022 /
tcp
398077695 | 2025-02-28T13:46:15.097203
18031 /
tcp
819727972 | 2025-03-12T21:41:03.928707
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1839934832 | 2025-02-20T21:05:31.328702
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
18034 /
tcp
819727972 | 2025-03-04T05:26:53.418669
SSH-2.0-OpenSSH_7.4
Vulnerabilities
18035 /
tcp
-1699556818 | 2025-03-11T09:02:19.757824
\x01remshd: Kerberos Authentication not enabled.\n
18039 /
tcp
-1626979812 | 2025-02-23T23:49:20.293315
220 Service ready for new user.
-1839934832 | 2025-02-21T20:34:34.747625
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
18053 /
tcp
-2096652808 | 2025-02-26T02:37:02.355858
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
18056 /
tcp
707919486 | 2025-02-18T22:51:51.743629
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
18059 /
tcp
-1733106930 | 2025-03-06T05:32:25.714786
Mysql Version: 5.6.50-log\nN\n5.6.50-log\x14(\nG5se"tGE\xc3\xbf\xc3\xb7-\x02\x7f\xc2\x80\x15cB^3$Zwh$wM[mysql_native_password
18061 /
tcp
-1399940268 | 2025-03-14T07:26:56.590108
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18062 /
tcp
820958131 | 2025-03-07T01:00:37.671299
kjnkjabhbanc283ubcsbhdc72\x02
18068 /
tcp
410249975 | 2025-02-20T06:10:30.191498
18073 /
tcp
-1399940268 | 2025-03-14T01:07:38.791795
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18080 /
tcp
1741579575 | 2025-03-17T15:17:21.584877
18081 /
tcp
-1316491703 | 2025-03-17T08:16:01.415751
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready
18082 /
tcp
1948301213 | 2025-03-12T19:05:51.151380
RFB 003.003
VNC:
Protocol Version: 3.3
18087 /
tcp
-1399940268 | 2025-03-12T09:54:10.663029
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18093 /
tcp
-2096652808 | 2025-03-08T18:12:37.002419
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
18096 /
tcp
-441419608 | 2025-02-17T21:37:53.979526
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
18104 /
tcp
-1399940268 | 2025-02-18T12:30:50.228367
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18105 /
tcp
-904840257 | 2025-03-09T12:22:06.763511
572 Relay not authorized\r\n
18107 /
tcp
-904840257 | 2025-03-16T20:12:41.133330
572 Relay not authorized\r\n
18109 /
tcp
-358801646 | 2025-02-25T14:18:59.540410
18112 /
tcp
-1399940268 | 2025-02-26T05:33:17.397760
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18200 /
tcp
366084633 | 2025-02-20T01:50:48.447865
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
18239 /
tcp
-1888448627 | 2025-02-20T18:59:18.200269
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
18245 /
tcp
-1261090339 | 2025-03-11T17:23:34.365796
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
18443 /
tcp
1690634669 | 2025-03-15T09:18:06.212450
18553 /
tcp
171352214 | 2025-03-14T11:45:21.523915
-ERR client ip is not in whitelist
18802 /
tcp
-1730858130 | 2025-03-17T20:09:19.249484
RFB 003.008
VNC:
Protocol Version: 3.8
19000 /
tcp
819727972 | 2025-03-15T06:33:50.283824
SSH-2.0-OpenSSH_7.4
Vulnerabilities
19022 /
tcp
819727972 | 2025-02-19T10:26:54.342758
SSH-2.0-OpenSSH_7.4
Vulnerabilities
19091 /
tcp
819727972 | 2025-02-26T16:24:04.304818
SSH-2.0-OpenSSH_7.4
Vulnerabilities
19100 /
tcp
1574088840 | 2025-02-21T13:14:04.859590
">Application and Content Networking Software 3.9</a>)\n</BODY><
19443 /
tcp
-2033111675 | 2025-03-11T12:00:35.217582
19930 /
tcp
-893477759 | 2025-03-14T09:56:14.029526
!versionbind7 t{RPowerDNS Recursor 410
19998 /
tcp
709622286 | 2025-02-28T02:41:15.797628
OK Welcome <299685> on DirectUpdate server 7286\r\n
19999 /
tcp
1308377066 | 2025-02-25T04:32:06.208951
1900503736 | 2025-02-25T11:01:52.667845
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-HTTPAPI/2.0
20010 /
tcp
632542934 | 2025-03-12T20:04:33.027951
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
20018 /
tcp
165188539 | 2025-03-05T08:16:44.959181
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
20053 /
tcp
921225407 | 2025-02-27T11:07:03.759450
\x00\x00\x00\x04\x00\x00\x00\x00\x00
20121 /
tcp
745343730 | 2025-03-18T08:50:29.002926
220 smtp.qq.com Esmtp QQ Mail Server
20150 /
tcp
-1428621233 | 2025-03-18T19:39:57.881302
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
20201 /
tcp
-2089734047 | 2025-02-19T22:37:07.847097
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
20256 /
tcp
819727972 | 2025-03-15T08:13:39.951437
SSH-2.0-OpenSSH_7.4
Vulnerabilities
20443 /
tcp
-1399940268 | 2025-02-23T19:49:01.659035
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1830697416 | 2025-03-16T16:13:51.501388
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
20880 /
tcp
1370263973 | 2025-03-10T07:24:09.773511
21025 /
tcp
819727972 | 2025-02-24T01:39:01.901076
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21081 /
tcp
-2089734047 | 2025-03-18T06:18:22.889461
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
21200 /
tcp
-653033013 | 2025-03-15T09:46:51.152538
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
21230 /
tcp
1615193817 | 2025-03-07T04:52:53.958295
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
21231 /
tcp
-1888448627 | 2025-03-16T19:55:47.458926
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
21237 /
tcp
819727972 | 2025-03-08T20:43:47.803920
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21239 /
tcp
819727972 | 2025-03-07T03:30:36.827056
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21244 /
tcp
-805362002 | 2025-02-25T16:43:43.238486
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
21245 /
tcp
-1399940268 | 2025-02-17T04:28:22.019435
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21246 /
tcp
819727972 | 2025-02-26T16:45:36.506448
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21252 /
tcp
-1888448627 | 2025-02-25T19:13:55.910677
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
21255 /
tcp
-122096153 | 2025-02-24T00:00:38.625425
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
21258 /
tcp
-1399940268 | 2025-03-14T20:35:00.360454
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21261 /
tcp
-1399940268 | 2025-02-25T14:30:49.413561
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21263 /
tcp
-1399940268 | 2025-03-17T00:17:49.858662
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21267 /
tcp
-1888448627 | 2025-02-18T09:30:15.571584
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
21269 /
tcp
-1428621233 | 2025-02-26T07:36:58.650683
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
-1013082686 | 2025-02-23T13:58:08.169320
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
21275 /
tcp
-122096153 | 2025-03-10T16:19:56.793732
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
21279 /
tcp
1332894250 | 2025-03-14T10:30:02.299821
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
21280 /
tcp
1308377066 | 2025-03-14T13:28:58.144859
21286 /
tcp
1381121983 | 2025-03-16T11:40:35.574034
21304 /
tcp
1911457608 | 2025-02-25T06:10:39.627696
\x00[\x00\x00\x00\x00\x00\x00
21312 /
tcp
51259122 | 2025-03-16T02:30:35.655740
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
21315 /
tcp
51259122 | 2025-03-10T11:49:33.888819
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
-1013082686 | 2025-03-15T00:33:16.650331
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
21317 /
tcp
819727972 | 2025-03-13T16:19:03.247002
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21319 /
tcp
-2017887953 | 2025-03-13T10:26:03.798366
SSH-2.0-OpenSSH_7.9
Vulnerabilities
21326 /
tcp
-1476017887 | 2025-03-13T14:26:28.114418
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
21379 /
tcp
819727972 | 2025-02-28T22:34:47.775144
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21515 /
tcp
-832380282 | 2025-03-13T10:41:46.839474
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).\n
22082 /
tcp
-1399940268 | 2025-03-09T19:29:49.911103
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
22206 /
tcp
1762042191 | 2025-03-10T23:36:47.716019
22403 /
tcp
-1641514916 | 2025-02-18T19:54:28.161528
* OK Merak 1dFUa2 IMAP4rev1
22556 /
tcp
-2089734047 | 2025-03-10T21:23:50.774120
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
25000 /
tcp
1911457608 | 2025-03-04T16:49:33.533807
\x00[\x00\x00\x00\x00\x00\x00
25001 /
tcp
-358801646 | 2025-03-14T15:15:39.229482
25004 /
tcp
1134517380 | 2025-03-04T22:12:38.230379
welcome to Pandora console!\r\n----------------------------\n-------------------------\n| Login Time | 2021-12-08 1...\n
25007 /
tcp
1911457608 | 2025-02-18T17:59:35.660784
\x00[\x00\x00\x00\x00\x00\x00
25009 /
tcp
-1399940268 | 2025-03-16T04:52:17.698304
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
25565 /
tcp
677934968 | 2025-03-17T05:02:17.674326
971933601 | 2025-03-12T01:30:03.641832
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
27015 /
tcp
-232716176 | 2025-03-13T00:57:47.970209
Command: None
Size: 759714643
ID: 758132274
Type: 1852141647
27017 /
tcp
1763259671 | 2025-03-06T22:07:20.334855
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
28015 /
tcp
1492413928 | 2025-03-06T03:06:11.085035
SSH-2.0-OpenSSH_7.5
Vulnerabilities
28080 /
tcp
1761482307 | 2025-03-11T00:19:44.290698
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
29799 /
tcp
-1279886438 | 2025-02-19T05:03:08.687386
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
29840 /
tcp
897328069 | 2025-02-22T00:35:37.498235
220 mail.scott000.com ESMTP
30000 /
tcp
-1426182427 | 2025-02-23T09:13:14.016245
\\x00[\\x00\\x00\\x00\\x00\\x00\\x00
30002 /
tcp
-1681927087 | 2025-03-13T23:33:10.401711
kjnkjabhbanc283ubcsbhdc72
30003 /
tcp
1632932802 | 2025-03-15T15:37:04.345843
30022 /
tcp
104385780 | 2025-03-18T20:54:22.431882
30023 /
tcp
-249504111 | 2025-02-26T17:47:20.331674
30027 /
tcp
-1399940268 | 2025-03-18T09:27:30.377166
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
30101 /
tcp
1332894250 | 2025-02-22T19:53:57.989924
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
30104 /
tcp
-653033013 | 2025-03-12T07:53:02.052528
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
30110 /
tcp
1134517380 | 2025-03-09T13:20:47.446023
welcome to Pandora console!\r\n----------------------------\n-------------------------\n| Login Time | 2021-12-08 1...\n
30111 /
tcp
-1888448627 | 2025-02-22T20:48:44.048432
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
30113 /
tcp
-1733645023 | 2025-03-16T22:52:45.106078
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
30122 /
tcp
-2033111675 | 2025-03-11T03:08:13.921868
30422 /
tcp
380146262 | 2025-03-13T10:48:17.071230
30468 /
tcp
-1265999252 | 2025-02-27T00:55:06.632842
220 VMware Authentication Daemon Version 1.0, ServerDaemonProto\ncol:SOAP, MKSDisplayProtocol:VNC , ,
30501 /
tcp
-1399940268 | 2025-03-06T02:03:39.629379
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
30522 /
tcp
1690634669 | 2025-03-12T16:05:44.649350
30622 /
tcp
233634112 | 2025-03-12T10:02:34.139789
SSH-98.60-SysaxSSH_81885..42
30700 /
tcp
-585940771 | 2025-02-18T21:28:15.043931
-1839934832 | 2025-03-13T12:32:29.230970
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
30892 /
tcp
-1730858130 | 2025-03-17T10:01:29.134723
RFB 003.008
VNC:
Protocol Version: 3.8
30922 /
tcp
1412519768 | 2025-03-12T08:20:35.113644
"AP0F1D85"
Connection: close
<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>
<BODY BGCOLOR
31022 /
tcp
819727972 | 2025-03-13T07:09:15.783780
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1839934832 | 2025-03-09T11:53:15.824232
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
31222 /
tcp
171352214 | 2025-03-13T03:29:32.575370
-ERR client ip is not in whitelist
-1230049476 | 2025-03-09T15:05:05.166020
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
31380 /
tcp
401555314 | 2025-02-21T11:00:53.597296
31422 /
tcp
171352214 | 2025-03-13T01:52:45.541088
-ERR client ip is not in whitelist
31443 /
tcp
740837454 | 2025-03-12T16:56:56.584080
SSH-2.0-OpenSSH_5.3
Vulnerabilities
31622 /
tcp
2087396567 | 2025-03-12T22:48:50.843580
kjnkjabhbanc283ubcsbhdc72
31722 /
tcp
819727972 | 2025-03-12T20:34:15.038188
SSH-2.0-OpenSSH_7.4
Vulnerabilities
31822 /
tcp
366084633 | 2025-03-12T06:53:51.484209
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
31922 /
tcp
2087396567 | 2025-03-11T04:59:33.923361
kjnkjabhbanc283ubcsbhdc72
32022 /
tcp
410249975 | 2025-03-12T03:12:49.529733
32122 /
tcp
2087396567 | 2025-03-09T21:10:20.037542
kjnkjabhbanc283ubcsbhdc72
-1013082686 | 2025-03-09T16:46:06.527060
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
32422 /
tcp
-1529979118 | 2025-03-09T13:21:25.575937
32622 /
tcp
-1477838366 | 2025-03-11T18:47:12.630465
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
32722 /
tcp
-2096652808 | 2025-03-11T15:26:46.459805
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
32764 /
tcp
1093576587 | 2025-03-11T12:06:16.047707
33022 /
tcp
819727972 | 2025-02-27T16:10:59.385244
SSH-2.0-OpenSSH_7.4
Vulnerabilities
33222 /
tcp
-1428621233 | 2025-03-09T18:28:23.655841
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
33322 /
tcp
-1477838366 | 2025-02-23T17:09:31.828273
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
33522 /
tcp
1741579575 | 2025-02-26T15:06:05.270845
33622 /
tcp
2087396567 | 2025-03-08T18:41:06.532324
kjnkjabhbanc283ubcsbhdc72
33722 /
tcp
2087396567 | 2025-03-18T03:18:53.411161
kjnkjabhbanc283ubcsbhdc72
33822 /
tcp
-138733098 | 2025-03-18T10:28:13.734613
33922 /
tcp
1975288991 | 2025-03-18T01:52:27.405362
34222 /
tcp
1212921144 | 2025-03-07T18:36:19.485127
34422 /
tcp
1161309183 | 2025-02-28T03:51:59.190030
34522 /
tcp
671605376 | 2025-03-05T05:13:54.973442
34622 /
tcp
-971970408 | 2025-03-04T16:54:29.803595
34722 /
tcp
2087396567 | 2025-03-04T01:05:39.532504
kjnkjabhbanc283ubcsbhdc72
34922 /
tcp
2087396567 | 2025-03-18T19:10:19.293712
kjnkjabhbanc283ubcsbhdc72
35000 /
tcp
-1835475271 | 2025-02-18T14:09:03.647129
200 NOD32SS 99 (3318497116)\r\n
35022 /
tcp
-1311598826 | 2025-03-04T00:52:02.024792
AMQP:
cluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local
copyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.
information:Licensed under the MPL 2.0. Website: https://rabbitmq.com
platform:Erlang/OTP 24.1
product:RabbitMQ
version:3.9.7
Capabilities:
publisher_confirms:true
exchange_exchange_bindings:true
basic.nack:true
consumer_cancel_notify:true
connection.blocked:true
consumer_priorities:true
authentication_failure_close:true
per_consumer_qos:true
direct_reply_to:tru
35100 /
tcp
-2089734047 | 2025-03-05T23:01:47.593268
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
35101 /
tcp
-2089734047 | 2025-02-23T04:03:01.210469
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
35122 /
tcp
2087396567 | 2025-03-04T08:01:21.156330
kjnkjabhbanc283ubcsbhdc72
35153 /
tcp
1278527606 | 2025-02-24T04:22:49.680644
35322 /
tcp
1261582754 | 2025-03-17T07:45:26.701073
unknown command
unknown command
35522 /
tcp
-1733645023 | 2025-03-17T00:08:32.986389
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
35531 /
tcp
-1810987450 | 2025-02-26T02:18:24.877612
35559 /
tcp
-136006866 | 2025-02-23T07:37:42.877426
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
35622 /
tcp
-971970408 | 2025-03-18T06:52:40.641039
35722 /
tcp
-321444299 | 2025-02-28T05:40:38.669988
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
35822 /
tcp
2087396567 | 2025-03-17T17:03:18.767548
kjnkjabhbanc283ubcsbhdc72
35922 /
tcp
171352214 | 2025-03-16T20:25:39.958201
-ERR client ip is not in whitelist
36022 /
tcp
-1872120160 | 2025-03-17T20:16:53.322798
">Application and Content Networking Software 3.9</a>)
</BODY><
36222 /
tcp
2087396567 | 2025-03-17T18:35:56.182041
kjnkjabhbanc283ubcsbhdc72
36322 /
tcp
1620329124 | 2025-03-17T11:11:31.540427
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
36422 /
tcp
1231376952 | 2025-03-15T08:32:38.925231
36522 /
tcp
2087396567 | 2025-03-18T15:36:11.179311
kjnkjabhbanc283ubcsbhdc72
36622 /
tcp
2087396567 | 2025-03-16T06:47:47.120375
kjnkjabhbanc283ubcsbhdc72
36722 /
tcp
996960436 | 2025-03-17T04:05:20.200465
36922 /
tcp
-2096652808 | 2025-03-18T12:05:00.800515
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
36983 /
tcp
1948301213 | 2025-02-19T12:17:55.231970
RFB 003.003
VNC:
Protocol Version: 3.3
36984 /
tcp
-1888448627 | 2025-02-18T11:12:29.424443
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
37022 /
tcp
745343730 | 2025-03-16T18:33:17.051932
220 smtp.qq.com Esmtp QQ Mail Server
37122 /
tcp
290819026 | 2025-03-16T22:15:26.186579
welcome to Pandora console!
----------------------------
-------------------------
| Login Time | 2021-12-08 1...
37222 /
tcp
-1428621233 | 2025-03-14T19:33:08.432080
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
37322 /
tcp
-971970408 | 2025-02-28T21:27:58.882047
37422 /
tcp
-314039103 | 2025-02-28T17:59:06.495788
Surnom.
Sorry, that nickname format is invalid.
1282941221 | 2025-03-16T08:30:59.856760
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
37622 /
tcp
1741579575 | 2025-03-16T01:08:47.516215
37722 /
tcp
546151771 | 2025-03-15T23:32:25.837497
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
37777 /
tcp
1911457608 | 2025-02-26T20:34:58.657641
\x00[\x00\x00\x00\x00\x00\x00
37822 /
tcp
819727972 | 2025-02-28T02:06:25.375452
SSH-2.0-OpenSSH_7.4
Vulnerabilities
37922 /
tcp
-971970408 | 2025-03-17T23:42:47.841107
38022 /
tcp
-441419608 | 2025-03-17T22:00:32.856267
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
1830697416 | 2025-03-15T16:34:27.277068
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
38222 /
tcp
1542849631 | 2025-03-11T17:13:14.678296
* OK [CAPABILITY a2,M\] nBwXk2pPP IMAP4rev1 20qx at
38322 /
tcp
1741579575 | 2025-03-15T12:49:58.943440
38333 /
tcp
-992671574 | 2025-03-15T21:05:28.506791
-2107996212 | 2025-02-18T21:15:15.530398
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
38520 /
tcp
1911457608 | 2025-02-21T15:44:00.469640
\x00[\x00\x00\x00\x00\x00\x00
1282941221 | 2025-03-13T23:19:39.598708
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
38622 /
tcp
-1730858130 | 2025-03-14T07:50:13.370193
RFB 003.008
VNC:
Protocol Version: 3.8
38722 /
tcp
117101543 | 2025-03-13T23:48:52.779912
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
38822 /
tcp
1761482307 | 2025-03-12T15:29:37.887588
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
38922 /
tcp
1741579575 | 2025-03-13T14:58:50.526669
39022 /
tcp
1212921144 | 2025-02-22T06:20:19.509841
39122 /
tcp
2087396567 | 2025-03-13T17:46:07.456614
kjnkjabhbanc283ubcsbhdc72
39222 /
tcp
1690634669 | 2025-03-13T16:32:45.226995
39322 /
tcp
2087396567 | 2025-03-11T10:57:26.266083
kjnkjabhbanc283ubcsbhdc72
39422 /
tcp
119860953 | 2025-03-11T12:13:19.249950
* OK ArGoSoft Mail Server IMAP Module v.YW at
39522 /
tcp
-1461540015 | 2025-03-11T08:23:47.316740
audio 0 RTP/AVP 18 4 3 8 0 101
a
39622 /
tcp
-971970408 | 2025-03-11T06:42:33.847019
39722 /
tcp
539065883 | 2025-03-05T03:38:26.522877
39822 /
tcp
1741579575 | 2025-03-12T04:54:38.027434
39922 /
tcp
1996932384 | 2025-02-26T16:25:00.727636
40022 /
tcp
873425297 | 2025-03-09T09:56:34.479994
200 NOD32SS 99 (3318497116)
40122 /
tcp
819727972 | 2025-02-26T12:57:57.463569
SSH-2.0-OpenSSH_7.4
Vulnerabilities
40222 /
tcp
-971970408 | 2025-03-04T09:54:21.673252
40322 /
tcp
2087396567 | 2025-03-08T20:23:38.568266
kjnkjabhbanc283ubcsbhdc72
40522 /
tcp
957278843 | 2025-03-04T06:15:49.810572
40622 /
tcp
-1999117212 | 2025-02-26T11:54:47.679811
40722 /
tcp
819727972 | 2025-03-08T13:33:06.546402
SSH-2.0-OpenSSH_7.4
Vulnerabilities
40894 /
tcp
-180163620 | 2025-02-25T02:51:15.759442
NPC Telnet permit one connection.\r\n But One connection() already keep alive.\r\nGood Bye !! \r\n
41022 /
tcp
1741579575 | 2025-02-17T04:47:09.206388
41122 /
tcp
1208318993 | 2025-02-27T13:59:28.291303
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
41222 /
tcp
2087396567 | 2025-03-04T23:54:42.204867
kjnkjabhbanc283ubcsbhdc72
41522 /
tcp
539065883 | 2025-03-04T20:35:43.160655
41822 /
tcp
-2081419599 | 2025-03-07T17:08:43.968765
42022 /
tcp
2033888749 | 2025-03-04T15:39:55.816576
Content-Type: text/rude-rejection
Content-Length: 24
Access Denied, go away.
Content-Type: text/disconnect-notice
C...
42222 /
tcp
819727972 | 2025-03-04T22:52:26.276680
SSH-2.0-OpenSSH_7.4
Vulnerabilities
42422 /
tcp
660175493 | 2025-03-04T18:39:58.142290
114471724 | 2025-02-28T14:30:21.539109
HTTP/1.1 302
X-Frame-Options: SAMEORIGIN
Server: NSX
43080 /
tcp
-2096652808 | 2025-03-12T17:19:09.076811
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
43222 /
tcp
1690634669 | 2025-02-28T23:14:15.154079
43322 /
tcp
233634112 | 2025-02-23T06:10:55.428174
SSH-98.60-SysaxSSH_81885..42
43522 /
tcp
474736340 | 2025-02-27T17:24:35.374451
431 Unable to negotiate secure command connection.
43622 /
tcp
1690634669 | 2025-02-26T23:21:12.409415
43822 /
tcp
-2096652808 | 2025-02-27T00:57:14.984288
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
43922 /
tcp
1830187220 | 2025-02-27T09:15:53.218035
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
44021 /
tcp
1911457608 | 2025-02-23T04:32:45.891929
\x00[\x00\x00\x00\x00\x00\x00
44022 /
tcp
819727972 | 2025-02-27T06:11:48.634440
SSH-2.0-OpenSSH_7.4
Vulnerabilities
44122 /
tcp
-1729629024 | 2025-02-26T21:33:46.601717
44158 /
tcp
-433302150 | 2025-03-17T11:43:14.592801
44222 /
tcp
-971970408 | 2025-03-10T22:25:28.383270
44300 /
tcp
-1399940268 | 2025-02-28T20:07:26.810431
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
44303 /
tcp
-1399940268 | 2025-03-14T08:29:28.778906
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
44304 /
tcp
1615193817 | 2025-02-27T03:55:04.655598
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
44307 /
tcp
599074451 | 2025-03-13T14:42:56.410706
44308 /
tcp
-1105333987 | 2025-03-18T01:30:25.355958
44322 /
tcp
2087396567 | 2025-02-26T09:32:17.302600
kjnkjabhbanc283ubcsbhdc72
44333 /
tcp
819727972 | 2025-03-13T13:00:32.830410
SSH-2.0-OpenSSH_7.4
Vulnerabilities
44334 /
tcp
1911457608 | 2025-03-06T01:15:17.364219
\x00[\x00\x00\x00\x00\x00\x00
44337 /
tcp
-358801646 | 2025-03-13T09:04:01.723189
44341 /
tcp
-1399940268 | 2025-03-17T15:07:56.448752
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
44400 /
tcp
1632932802 | 2025-03-15T20:36:22.628640
44410 /
tcp
-2033111675 | 2025-03-18T09:18:47.478048
44422 /
tcp
2087396567 | 2025-02-26T07:53:45.338586
kjnkjabhbanc283ubcsbhdc72
44444 /
tcp
-1399940268 | 2025-02-24T15:31:23.221165
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
44522 /
tcp
2087396567 | 2025-02-26T06:27:17.122197
kjnkjabhbanc283ubcsbhdc72
44622 /
tcp
1741579575 | 2025-02-23T02:42:00.642463
44818 /
tcp
-1888448627 | 2025-03-13T12:50:14.038516
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
45000 /
tcp
-832380282 | 2025-02-21T21:50:51.698744
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).\n
45122 /
tcp
-971970408 | 2025-02-24T06:29:20.134021
45222 /
tcp
1332894250 | 2025-02-25T18:25:27.412274
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
45422 /
tcp
996960436 | 2025-02-19T09:36:23.949805
45522 /
tcp
-314039103 | 2025-02-25T15:19:23.759671
Surnom.
Sorry, that nickname format is invalid.
45622 /
tcp
1231376952 | 2025-02-25T13:37:03.366004
45666 /
tcp
-1598265216 | 2025-02-27T08:15:57.210294
45822 /
tcp
842535728 | 2025-03-10T13:04:25.773810
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
45922 /
tcp
-971970408 | 2025-03-10T13:23:07.254792
46022 /
tcp
1542849631 | 2025-02-21T21:47:54.121423
* OK [CAPABILITY a2,M\] nBwXk2pPP IMAP4rev1 20qx at
46122 /
tcp
2087396567 | 2025-02-25T04:59:49.627395
kjnkjabhbanc283ubcsbhdc72
46222 /
tcp
-1641514916 | 2025-02-24T22:01:56.076576
* OK Merak 1dFUa2 IMAP4rev1
46322 /
tcp
-1375131644 | 2025-02-24T20:27:10.867429
\x00[v\xc3\xbdC\x7f\x00\x00
46422 /
tcp
819727972 | 2025-02-24T08:22:39.787585
SSH-2.0-OpenSSH_7.4
Vulnerabilities
46522 /
tcp
104385780 | 2025-02-24T04:49:05.194347
46622 /
tcp
2087396567 | 2025-02-24T03:00:57.607561
kjnkjabhbanc283ubcsbhdc72
46822 /
tcp
740837454 | 2025-02-24T01:16:46.295731
SSH-2.0-OpenSSH_5.3
Vulnerabilities
46922 /
tcp
1082732927 | 2025-02-23T23:30:52.765451
STAT pid 1660
STAT uptime 28884
STAT time 1641290377
STAT version 1.2.1
STAT pointer_size 32
STAT curr_items 14
STAT total_items 3533
STAT bytes 30524
STAT curr_connections 1
STAT total_connections 3542
STAT connection_structures 3
STAT cmd_get 3533
STAT cmd_set 3533
STAT get_hits 3519
STAT get_misses 14
STAT bytes_read 7927780
STAT bytes_written 7848552
STAT limit_maxbytes 67108864
END
47080 /
tcp
-358801646 | 2025-03-09T07:23:10.869359
-1839934832 | 2025-02-23T21:46:55.521613
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
47222 /
tcp
539065883 | 2025-02-23T20:02:39.321326
-1839934832 | 2025-02-24T23:48:27.247357
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
47522 /
tcp
539065883 | 2025-02-25T08:26:47.211894
47622 /
tcp
171352214 | 2025-02-25T01:33:08.312786
-ERR client ip is not in whitelist
47722 /
tcp
-1114821551 | 2025-03-10T09:55:46.003921
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
47922 /
tcp
2087396567 | 2025-03-10T06:57:54.439825
kjnkjabhbanc283ubcsbhdc72
48012 /
tcp
-1399940268 | 2025-03-18T19:56:18.379947
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
48019 /
tcp
819727972 | 2025-02-25T09:03:42.766594
SSH-2.0-OpenSSH_7.4
Vulnerabilities
48022 /
tcp
-971970408 | 2025-03-07T10:05:33.569394
48100 /
tcp
-1026951088 | 2025-02-24T18:57:53.156980
48222 /
tcp
2087396567 | 2025-03-10T03:03:13.707752
kjnkjabhbanc283ubcsbhdc72
48322 /
tcp
233634112 | 2025-03-10T03:29:36.724798
SSH-98.60-SysaxSSH_81885..42
48422 /
tcp
-68075478 | 2025-03-09T23:33:29.566744
48522 /
tcp
2087396567 | 2025-03-09T21:53:06.105395
kjnkjabhbanc283ubcsbhdc72
48622 /
tcp
1741579575 | 2025-02-24T18:38:11.865889
48722 /
tcp
-971970408 | 2025-02-24T15:01:36.243565
48889 /
tcp
1975288991 | 2025-02-17T15:55:47.938853
48922 /
tcp
539065883 | 2025-02-24T13:31:58.640146
49022 /
tcp
1690634669 | 2025-03-07T13:28:39.576335
49121 /
tcp
50497985 | 2025-03-15T12:06:41.374058
\x00[\xc3\x88\xc3\x9dS\x7f\x00\x00
49122 /
tcp
-971970408 | 2025-02-21T05:26:22.619161
49210 /
tcp
1911457608 | 2025-03-10T07:29:57.586218
\x00[\x00\x00\x00\x00\x00\x00
49222 /
tcp
2087396567 | 2025-02-22T23:11:03.966214
kjnkjabhbanc283ubcsbhdc72
49322 /
tcp
-971970408 | 2025-02-20T20:55:11.934407
49422 /
tcp
2087396567 | 2025-02-23T00:56:38.297931
kjnkjabhbanc283ubcsbhdc72
49622 /
tcp
1492413928 | 2025-02-22T12:08:53.897414
SSH-2.0-OpenSSH_7.5
Vulnerabilities
49686 /
tcp
819727972 | 2025-03-13T09:09:51.319914
SSH-2.0-OpenSSH_7.4
Vulnerabilities
49694 /
tcp
-1888448627 | 2025-02-21T11:07:51.608111
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
49722 /
tcp
104385780 | 2025-02-22T21:22:55.068865
49822 /
tcp
2087396567 | 2025-02-22T19:37:40.265787
kjnkjabhbanc283ubcsbhdc72
49922 /
tcp
1261582754 | 2025-02-22T17:56:30.630127
unknown command
unknown command
50000 /
tcp
-2033111675 | 2025-03-16T10:45:25.654657
-1715152554 | 2025-02-19T21:30:24.729592
HTTP/1.1 302 Moved Temporarily
Server: nginx/1.22.1
Date: Wed, 19 Feb 2025 21:29:48 GMT
Content-Type: text/html
Content-Length: 145
Connection: close
Location: https://59.82.96.224:443/
50005 /
tcp
-653033013 | 2025-03-04T02:09:36.322671
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
50009 /
tcp
-1399940268 | 2025-02-24T14:09:05.993384
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50042 /
tcp
-1099385124 | 2025-03-15T22:09:42.572583
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
50050 /
tcp
-971970408 | 2025-03-16T12:07:40.567889
50073 /
tcp
-1487943323 | 2025-02-18T22:40:45.574014
431 Unable to negotiate secure command connection.\r\n
50101 /
tcp
-1032713145 | 2025-02-18T11:35:00.042357
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
50102 /
tcp
-1399940268 | 2025-02-18T19:40:37.645378
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50103 /
tcp
321971019 | 2025-03-12T06:10:49.175642
-ERR client ip is not in whitelist\r
50106 /
tcp
1911457608 | 2025-02-22T21:58:16.078097
\x00[\x00\x00\x00\x00\x00\x00
50122 /
tcp
819727972 | 2025-02-22T08:14:33.386054
SSH-2.0-OpenSSH_7.4
Vulnerabilities
50160 /
tcp
1574088840 | 2025-02-18T03:25:57.763681
">Application and Content Networking Software 3.9</a>)\n</BODY><
50222 /
tcp
819727972 | 2025-02-22T06:34:05.896895
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1282941221 | 2025-03-05T20:00:56.217737
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
50522 /
tcp
2087396567 | 2025-02-21T22:19:17.500390
kjnkjabhbanc283ubcsbhdc72
50580 /
tcp
-1399940268 | 2025-02-26T00:01:51.907739
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50622 /
tcp
1370263973 | 2025-02-21T18:48:32.819312
50722 /
tcp
2087396567 | 2025-02-20T22:27:54.599767
kjnkjabhbanc283ubcsbhdc72
50822 /
tcp
-971970408 | 2025-02-20T18:58:07.706900
-1013082686 | 2025-02-21T15:24:48.674607
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
50997 /
tcp
2063598737 | 2025-03-17T03:06:37.000412
50999 /
tcp
-585940771 | 2025-02-17T18:50:51.627708
51002 /
tcp
307999478 | 2025-03-07T08:14:59.327599
unknown command \r\nunknown command \r\n
51122 /
tcp
842535728 | 2025-02-17T02:17:38.120282
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
51222 /
tcp
1189133115 | 2025-02-21T11:59:57.428797
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
51235 /
tcp
-1737707071 | 2025-03-06T16:00:22.356626
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
51443 /
tcp
1332894250 | 2025-03-11T23:44:52.819012
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
51622 /
tcp
50497985 | 2025-02-21T01:58:59.789996
\x00[\xc3\x88\xc3\x9dS\x7f\x00\x00
51822 /
tcp
2087396567 | 2025-02-20T16:30:05.706877
kjnkjabhbanc283ubcsbhdc72
51922 /
tcp
-2096652808 | 2025-02-20T11:17:13.723716
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
52022 /
tcp
1761482307 | 2025-03-07T02:08:42.212599
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
52122 /
tcp
1741579575 | 2025-02-20T06:48:45.865782
52230 /
tcp
1911457608 | 2025-02-27T04:30:45.993574
\x00[\x00\x00\x00\x00\x00\x00
52322 /
tcp
-1529979118 | 2025-02-20T05:02:48.438523
52522 /
tcp
-68075478 | 2025-02-19T07:51:38.948835
52622 /
tcp
-746114901 | 2025-02-20T00:41:18.776584
52931 /
tcp
1911457608 | 2025-03-15T12:16:09.123248
\x00[\x00\x00\x00\x00\x00\x00
53022 /
tcp
1332894250 | 2025-03-07T06:49:14.213478
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
53122 /
tcp
2087396567 | 2025-02-19T16:40:42.039084
kjnkjabhbanc283ubcsbhdc72
53322 /
tcp
2087396567 | 2025-02-19T15:22:27.392438
kjnkjabhbanc283ubcsbhdc72
53400 /
tcp
1911457608 | 2025-02-24T13:45:05.534884
\x00[\x00\x00\x00\x00\x00\x00
53483 /
tcp
-2089734047 | 2025-03-08T12:07:58.476874
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1282941221 | 2025-03-09T13:50:35.414845
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
53522 /
tcp
660175493 | 2025-02-19T13:09:00.188912
53805 /
tcp
1911457608 | 2025-02-28T19:17:05.801894
\x00[\x00\x00\x00\x00\x00\x00
53922 /
tcp
2087396567 | 2025-02-19T06:06:36.378371
kjnkjabhbanc283ubcsbhdc72
54022 /
tcp
1690634669 | 2025-02-19T04:32:48.399725
-1230049476 | 2025-03-10T18:59:58.890375
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
54322 /
tcp
819727972 | 2025-02-18T22:51:23.012677
SSH-2.0-OpenSSH_7.4
Vulnerabilities
54422 /
tcp
1741579575 | 2025-02-18T22:57:47.587184
54490 /
tcp
819727972 | 2025-02-24T10:46:20.929143
SSH-2.0-OpenSSH_7.4
Vulnerabilities
54522 /
tcp
104385780 | 2025-02-18T17:42:26.844436
54545 /
tcp
-784071826 | 2025-03-10T06:17:09.816512
SSH-2.0-OpenSSH_8.0
Vulnerabilities
54622 /
tcp
-2081419599 | 2025-02-18T13:54:15.997182
54822 /
tcp
-1392039491 | 2025-02-18T11:34:15.820094
"Broadband Router"
<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
54922 /
tcp
1741579575 | 2025-03-07T08:15:38.435866
55000 /
tcp
-653033013 | 2025-03-11T05:14:06.076967
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
55022 /
tcp
-314039103 | 2025-03-07T03:09:46.475494
Surnom.
Sorry, that nickname format is invalid.
55055 /
tcp
-1426182427 | 2025-02-25T18:44:41.432585
\\x00[\\x00\\x00\\x00\\x00\\x00\\x00
55222 /
tcp
2087396567 | 2025-03-07T01:34:02.459592
kjnkjabhbanc283ubcsbhdc72
55322 /
tcp
819727972 | 2025-02-18T02:57:41.233019
SSH-2.0-OpenSSH_7.4
Vulnerabilities
55388 /
tcp
1632932802 | 2025-03-10T13:16:09.810169
55422 /
tcp
539065883 | 2025-03-06T16:56:50.016126
55443 /
tcp
819727972 | 2025-02-23T12:25:16.494855
SSH-2.0-OpenSSH_7.4
Vulnerabilities
55470 /
tcp
-1032713145 | 2025-03-13T14:43:28.104253
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
55522 /
tcp
677934968 | 2025-03-06T22:04:58.803453
55553 /
tcp
290819026 | 2025-03-18T17:35:38.979817
welcome to Pandora console!
----------------------------
-------------------------
| Login Time | 2021-12-08 1...
55554 /
tcp
1984588611 | 2025-03-13T21:11:20.274851
55622 /
tcp
410249975 | 2025-03-06T17:17:14.641565
55722 /
tcp
-1514525820 | 2025-03-06T18:40:16.772472
Protocol version mismatch
55822 /
tcp
233634112 | 2025-03-06T23:07:19.010089
SSH-98.60-SysaxSSH_81885..42
56122 /
tcp
472902042 | 2025-02-17T21:46:53.802967
"Magic:ActiveMQ
Version:12
<ActiveMQ*TcpNoDelayEnabledSizePrefixDisabled CacheSizeProviderName ActiveMQStackTraceEnabledPlatformDetails JavaCacheEnabledTightEncodingEnabledMaxFrameSize@MaxInac
56222 /
tcp
2087396567 | 2025-02-17T19:45:57.916870
kjnkjabhbanc283ubcsbhdc72
56322 /
tcp
996960436 | 2025-02-17T17:58:51.917298
56422 /
tcp
-1139539254 | 2025-02-17T16:14:16.668387
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
56622 /
tcp
819727972 | 2025-02-17T14:29:25.448834
SSH-2.0-OpenSSH_7.4
Vulnerabilities
56822 /
tcp
2087396567 | 2025-02-17T13:41:22.442213
kjnkjabhbanc283ubcsbhdc72
57522 /
tcp
-805362002 | 2025-03-06T11:59:16.995536
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
57622 /
tcp
-1733106930 | 2025-03-06T08:47:51.325601
Mysql Version: 5.6.50-log\nN\n5.6.50-log\x14(\nG5se"tGE\xc3\xbf\xc3\xb7-\x02\x7f\xc2\x80\x15cB^3$Zwh$wM[mysql_native_password
57779 /
tcp
1911457608 | 2025-03-13T00:33:30.181778
\x00[\x00\x00\x00\x00\x00\x00
57780 /
tcp
-457235091 | 2025-03-13T00:58:49.997944
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
57787 /
tcp
1767345577 | 2025-03-16T13:41:26.180628
Hello, this is Quagga (version 0T).
Copyright 1996-200
57822 /
tcp
539065883 | 2025-03-06T05:35:17.963543
57922 /
tcp
171352214 | 2025-03-06T03:39:36.952448
-ERR client ip is not in whitelist
58000 /
tcp
-1399940268 | 2025-03-18T01:37:27.456124
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
58122 /
tcp
1778988322 | 2025-03-06T01:54:30.564066
* OK GroupWise IMAP4rev1 Server Ready
58222 /
tcp
-971970408 | 2025-03-06T00:11:12.375875
58322 /
tcp
819727972 | 2025-03-05T22:25:16.092107
SSH-2.0-OpenSSH_7.4
Vulnerabilities
58422 /
tcp
233634112 | 2025-03-05T20:42:14.832207
SSH-98.60-SysaxSSH_81885..42
58522 /
tcp
2087396567 | 2025-03-05T18:59:02.466760
kjnkjabhbanc283ubcsbhdc72
58585 /
tcp
-1428621233 | 2025-02-27T04:49:49.161953
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
58722 /
tcp
-1648456501 | 2025-03-05T17:15:06.419920
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
58822 /
tcp
1690634669 | 2025-03-05T15:33:15.934111
58922 /
tcp
819727972 | 2025-03-05T13:53:42.871178
SSH-2.0-OpenSSH_7.4
Vulnerabilities
59022 /
tcp
104385780 | 2025-03-05T12:22:19.517472
59122 /
tcp
-1392039491 | 2025-03-05T10:24:10.352289
"Broadband Router"
<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
59222 /
tcp
103159425 | 2025-03-05T08:40:34.183493
-2107996212 | 2025-03-05T07:10:38.391656
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
59443 /
tcp
-1611764932 | 2025-02-17T11:35:14.291071
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
59522 /
tcp
599074451 | 2025-03-03T17:47:05.085993
60001 /
tcp
1690634669 | 2025-03-15T02:00:00.337218
60021 /
tcp
-792826324 | 2025-02-20T17:23:45.559375
220 FTP server ready - login please
60129 /
tcp
842535728 | 2025-03-04T13:02:29.205492
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
115332119 | 2025-03-13T12:02:10.059961
HTTP/1.1 403 Forbidden
Transfer-Encoding: chunked
Connection: keep-alive
Content-Type: application/json
Access-Control-Allow-Origin: *
61613 /
tcp
-1399940268 | 2025-03-10T20:07:55.659243
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
61616 /
tcp
-801484042 | 2025-03-07T02:24:55.369561
62237 /
tcp
722711397 | 2025-03-04T11:14:14.337344
\x00[M\xc3\xba\xc3\x9a\x7f\x00\x00
62865 /
tcp
-1435414831 | 2025-03-13T21:38:31.071258
63210 /
tcp
1842524259 | 2025-03-14T23:23:25.850491
-1839934832 | 2025-03-07T11:47:38.525608
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
63257 /
tcp
-1428621233 | 2025-03-11T13:41:46.138141
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
63260 /
tcp
-992671574 | 2025-03-14T18:38:41.266253
63443 /
tcp
-1996280214 | 2025-03-06T22:05:17.660771
64295 /
tcp
1615193817 | 2025-02-20T18:24:51.216090
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
64671 /
tcp
-1399940268 | 2025-02-23T04:48:45.766281
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
64738 /
tcp
320677201 | 2025-03-15T04:06:56.983301
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
65432 /
tcp
-1399940268 | 2025-02-24T15:52:37.283371
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02