2 /
tcp
-445721795 | 2025-03-23T20:15:35.423681
\x00[\xc3\xaed\x1a\x7f\x00\x00
11 /
tcp
1690634669 | 2025-03-11T00:16:53.198711
13 /
tcp
1346417108 | 2025-03-15T18:50:16.358261
15 /
tcp
-345718689 | 2025-03-14T14:37:31.121280
2143387245 | 2025-03-27T09:28:39.545236
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
21 /
tcp
1564456597 | 2025-03-25T02:14:13.418524
220 Firewall Authentication required before proceeding with service
23 /
tcp
-23362551 | 2025-03-20T18:45:23.550752
\xff\xfb\x01\xff\xfb\x03\xff\xfd\x18
25 /
tcp
921225407 | 2025-03-05T09:37:28.505940
\x00\x00\x00\x04\x00\x00\x00\x00\x00
43 /
tcp
-1399940268 | 2025-03-14T23:17:49.571958
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
49 /
tcp
-1620040646 | 2025-03-23T11:45:20.125550
\xc3\xbf\xc3\xbb\\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
53 /
tcp
-1370420049 | 2025-03-04T20:44:07.947513
9
\x81\x80\x00\x01\x00\x02\x00\x00\x00\x00\x08clients1\x06google\x03com\x00\x00\x01\x00\x01\xc0\x00\x05\x00\x01\x00\x00\x00\x02\x00\x07clients\x01l\xc0\x15\xc01\x00\x01\x00\x01\x00\x00\x00\x02\x00\x04\xac٣.
\x00\x06\x85\x00\x00\x01\x00\x00\x00\x01\x00
175081126 | 2025-03-13T00:32:30.281243
HTTP/1.1 400 Bad Request
Server: nginx/1.14.2
Content-Type: text/html
Connection: close
94 /
tcp
-1428621233 | 2025-03-27T23:10:11.397651
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
102 /
tcp
-2096652808 | 2025-03-18T07:06:53.227525
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
104 /
tcp
819727972 | 2025-03-25T16:16:10.766416
SSH-2.0-OpenSSH_7.4
Vulnerabilities
110 /
tcp
-1888448627 | 2025-03-26T16:47:35.802668
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
111 /
tcp
-2089734047 | 2025-03-21T00:19:32.268544
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-1713467553 | 2025-03-21T15:50:55.684251
HTTP/1.1 400 Bad Request
Content-Type: text/html; charset=us-ascii
Server: Microsoft-HTTPAPI/2.0
Connection: close
121 /
tcp
-1279886438 | 2025-03-22T20:05:20.444770
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
143 /
tcp
639175818 | 2025-03-22T20:43:14.929610
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
177 /
tcp
-2096652808 | 2025-03-12T03:52:25.824831
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
179 /
tcp
-399606100 | 2025-03-16T18:34:30.235322
BGP Message\nType: 3\nMajor error Code: 6\nMinor error Code: 5\n
264 /
tcp
-1709030885 | 2025-03-12T01:30:19.469559
-1547976805 | 2025-03-21T16:29:53.610965
HTTP/1.1 403 Forbidden
Server: nginx
Content-Type: text/html
Connection: close
427 /
tcp
-826599962 | 2025-03-21T02:45:49.714240
SAAdvert Response:\nVersion: 2\nFunction: SA Advertisement (11)\nURL: service:service-agent://localhost.localdomain\nScopeList: default\nAttrributeList: \n\n
444 /
tcp
103159425 | 2025-03-20T15:28:39.428432
450 /
tcp
-1779118422 | 2025-02-28T09:40:24.441473
\x00[\xc2\xae\xc2\x8d{\x7f\x00\x00
462 /
tcp
-441419608 | 2025-03-25T20:03:38.826849
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
465 /
tcp
897328069 | 2025-03-06T02:23:14.930335
220 mail.scott000.com ESMTP
491 /
tcp
709622286 | 2025-03-05T22:17:15.099202
OK Welcome <299685> on DirectUpdate server 7286\r\n
502 /
tcp
-2031152423 | 2025-03-19T15:40:50.816377
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
513 /
tcp
165188539 | 2025-03-17T08:32:02.130352
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
548 /
tcp
155249582 | 2025-03-28T00:38:45.950336
Fast Copy: Yes\nExtended Sleep: Yes\nUUIDs: Yes\nUTF8 Server Name: Yes\nDirectory Services: Yes\nReconnect: No\nServer Notifications: Yes\nTCP/IP: Yes\nServer Signature: Yes\nServer Message: No\nPassword Saving Prohibited: No\nPassword Changing: No\nCopy File: Yes\nServer Name: NGU\nMachine Type: \rNetatalk3.1.8\nAFP Versions: AFP2.2, AFPX03, AFP3.1, AFP3.2, AFP3.3, AFP3.4\nUAMs: Cleartxt Passwrd\\x04,DHX2\t,DHCAST128\\x00\nServer Signature: 00000000008002000180030002800280
554 /
tcp
285770450 | 2025-03-16T00:41:03.783707
RTSP/1.0 401 Unauthorized
CSeq: 1
1732481781 | 2025-03-27T16:47:35.141352
HTTP/1.1 400 Bad Request
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 8-38284903-0 0NNN RT(1705909933705 166) q(-1 -1 -1 -1) r(0 -1) b1
1300162323 | 2025-03-15T17:56:39.838467
HTTP/1.1 404 Not Found
Content-Type: text/plain; charset=utf-8
X-Content-Type-Options: nosniff
743 /
tcp
-1399940268 | 2025-03-10T09:27:31.526578
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
771 /
tcp
205347087 | 2025-03-18T00:29:56.524280
SSH-25453-Cisco-3524665.35\n
-1256415508 | 2025-03-25T10:16:12.874614
HTTP/1.1 404 Not Found
Server: TornadoServer/6.1
Content-Type: text/html; charset=UTF-8
887 /
tcp
1623746877 | 2025-03-12T01:36:38.921120
500 Permission denied - closing connection.\r\n
943 /
tcp
-801484042 | 2025-03-13T05:55:10.927811
990 /
tcp
1583167286 | 2025-03-16T04:32:16.716885
\\x01remshd: Kerberos Authentication not enabled.\n
992 /
tcp
-1835475271 | 2025-03-12T12:44:15.593562
200 NOD32SS 99 (3318497116)\r\n
993 /
tcp
165188539 | 2025-02-28T15:50:27.148574
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
995 /
tcp
689999346 | 2025-03-19T14:08:44.814333
+OK The Microsoft Exchange POP3 service is ready. [SgBIADAAUABSADAAMQBDAEEAMAAwADUAMgAuAGEAcABjAHAAcgBkADAAMQAuAHAAcgBvAGQALgBlAHgAYwBoAGEAbgBnAGUAbABhAGIAcwAuAGMAbwBtAA==]\r\n
-2072525622 | 2025-03-13T00:54:24.817247
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, pre-check=0, post-check=0, max-age=0
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Expires: Mon, 22 Jan 2024 16:06:36 +0800
Vary: Accept-Encoding
Server: Microsoft-IIS/8.5
X-Powered-By: PHP/5.6.40
Set-Cookie: phpMyAdmin=fkrenf42790gjdu0ej2flte4637qi54v; path=/; HttpOnly
X-ob_mode: 1
X-Frame-Options: DENY
X-X-WebKit-CSP: default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval';referrer no-referrer;style-src
Vulnerabilities
1013 /
tcp
1911457608 | 2025-03-05T17:21:32.338367
\x00[\x00\x00\x00\x00\x00\x00
1023 /
tcp
1231376952 | 2025-03-16T06:39:33.385555
1025 /
tcp
-1899074860 | 2025-03-15T10:59:58.989207
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
1099 /
tcp
669849225 | 2025-03-17T12:49:42.458630
SSH-98.60-SysaxSSH_81885..42\r\n
1153 /
tcp
-2017887953 | 2025-03-27T22:47:48.440011
SSH-2.0-OpenSSH_7.9
Vulnerabilities
1177 /
tcp
380146262 | 2025-03-11T18:30:39.778974
1193 /
tcp
-2031152423 | 2025-03-25T22:28:49.886937
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
1200 /
tcp
416263569 | 2025-03-25T07:02:38.777579
1234 /
tcp
-1399940268 | 2025-03-28T23:27:16.505637
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1453516345 | 2025-03-10T02:39:01.642569
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
1337 /
tcp
1741579575 | 2025-03-18T17:28:17.733170
1366 /
tcp
1975288991 | 2025-03-22T01:03:32.181552
1414 /
tcp
1332894250 | 2025-02-28T06:07:28.727868
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
1459 /
tcp
-1105333987 | 2025-03-15T15:31:43.009718
225472646 | 2025-03-20T20:13:50.730964
HTTP/1.1 200 OK
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8
Pragma: no-cache
Cache-Control: no-cache
Expires: 0
X-Frame-Options: SAMEORIGIN
1077013874 | 2025-03-17T16:58:57.419147
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
1521 /
tcp
-1184558916 | 2025-03-19T21:44:20.290033
Version:11.2.0.4.0\n"\\x00\\x00Y(DESCRIPTION=(TMP=)(VSNNUM=186647552)(ERR=1189)(ERROR_STACK=(ERROR=(CODE=1189)(EMFI=4))))
1604 /
tcp
-1399940268 | 2025-02-27T05:07:06.885541
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1723 /
tcp
-1608241410 | 2025-03-28T01:49:08.045439
Firmware: 1\nHostname: local\nVendor: linux\n
1800 /
tcp
119860953 | 2025-03-26T22:13:33.083531
* OK ArGoSoft Mail Server IMAP Module v.YW at
1883 /
tcp
1492413928 | 2025-03-28T04:44:51.672269
SSH-2.0-OpenSSH_7.5
Vulnerabilities
1911 /
tcp
-2096652808 | 2025-03-22T13:13:37.443981
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1926 /
tcp
-971970408 | 2025-03-27T07:47:15.785097
1954 /
tcp
-1730858130 | 2025-03-18T22:03:48.206013
RFB 003.008
VNC:
Protocol Version: 3.8
1955 /
tcp
-1399940268 | 2025-03-12T05:04:29.434745
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1962 /
tcp
1011407350 | 2025-03-17T13:03:16.887545
* OK GroupWise IMAP4rev1 Server Ready\r\n
1969 /
tcp
639175818 | 2025-03-05T04:08:01.146873
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
2000 /
tcp
1911457608 | 2025-03-28T18:18:43.395668
\x00[\x00\x00\x00\x00\x00\x00
2002 /
tcp
-1142844482 | 2025-03-21T16:36:31.755326
ÿûSOYO_SIP VBNQyQSKc settings
Password:
2003 /
tcp
1543809371 | 2025-03-20T16:55:21.298633
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
2006 /
tcp
1996932384 | 2025-03-24T10:16:05.238690
2008 /
tcp
-971970408 | 2025-03-25T23:17:36.178183
2055 /
tcp
-1399940268 | 2025-03-09T08:17:38.130399
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2060 /
tcp
2098371729 | 2025-03-28T18:52:53.588613
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
2067 /
tcp
-2081419599 | 2025-03-23T18:07:24.929565
2081 /
tcp
-441419608 | 2025-03-28T12:30:49.102006
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
2083 /
tcp
474736340 | 2025-03-11T18:37:45.911043
431 Unable to negotiate secure command connection.
2087 /
tcp
-784071826 | 2025-03-18T09:49:17.580533
SSH-2.0-OpenSSH_8.0
Vulnerabilities
2095 /
tcp
-142686627 | 2025-03-05T12:31:03.486050
\x00[\xc2\xba\x7fs\x7f\x00\x00
2100 /
tcp
-1373613804 | 2025-03-15T05:56:28.640320
00970795:d7:smethod,6:shello,8:soptions,80:d10:shttp_port,368696:i1082,5:sname,5:sL_x,10:ssync_port,5:i00469,10:stimestamp,3190459:f920.7251553166,8:sversion,6262522:sl4X,
372433470 | 2025-03-15T19:38:01.209679
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
2154 /
tcp
-971970408 | 2025-03-13T14:40:26.143476
2181 /
tcp
546151771 | 2025-03-14T04:41:39.360740
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
2196 /
tcp
-441419608 | 2025-03-16T04:10:28.093426
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
2201 /
tcp
-358801646 | 2025-03-09T17:28:01.058395
2209 /
tcp
1011407350 | 2025-03-14T20:38:31.581705
* OK GroupWise IMAP4rev1 Server Ready\r\n
372433470 | 2025-03-24T13:20:30.976474
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
2266 /
tcp
-2089734047 | 2025-03-06T13:00:49.557711
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
2271 /
tcp
-1996280214 | 2025-03-06T20:53:24.839507
1662205251 | 2025-03-17T09:24:01.571098
HTTP/1.0 404 FAIL
Content-length:5
Connection:Close
2345 /
tcp
-1399940268 | 2025-03-27T12:04:23.457552
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2376 /
tcp
1842524259 | 2025-03-22T22:45:23.176140
2404 /
tcp
-1730858130 | 2025-03-27T19:37:30.963630
RFB 003.008
VNC:
Protocol Version: 3.8
2435 /
tcp
669849225 | 2025-03-14T17:01:22.086414
SSH-98.60-SysaxSSH_81885..42\r\n
2455 /
tcp
539065883 | 2025-03-04T15:03:03.562000
2506 /
tcp
-1279886438 | 2025-03-12T02:33:25.281116
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
1830697416 | 2025-03-13T17:02:58.549763
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
2568 /
tcp
1308377066 | 2025-03-13T10:59:46.540774
2601 /
tcp
1715665777 | 2025-03-24T00:42:30.333042
Vty password is not set.\r\n
2626 /
tcp
-1598265216 | 2025-03-19T16:21:43.683227
2628 /
tcp
-1114821551 | 2025-03-27T04:30:29.144679
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
2761 /
tcp
-1399940268 | 2025-03-28T06:16:59.792431
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2762 /
tcp
493955023 | 2025-03-26T09:05:15.891352
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
2985 /
tcp
-1888448627 | 2025-03-09T18:02:52.247547
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
3001 /
tcp
1690634669 | 2025-03-17T01:57:30.682570
3006 /
tcp
165188539 | 2025-03-16T13:11:28.463654
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
3009 /
tcp
1911457608 | 2025-03-12T19:05:30.875801
\x00[\x00\x00\x00\x00\x00\x00
-1568680103 | 2025-03-09T22:54:22.454836
HTTP/1.1 301 Moved Permanently
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
-1261053701 | 2025-03-13T08:50:11.132491
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html; charset="UTF-8"
Transfer-Encoding: chunked
Connection: keep-alive
Keep-Alive: timeout=20
Cache-control: no-store
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
3050 /
tcp
-1888448627 | 2025-03-19T21:47:32.979712
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
3055 /
tcp
819727972 | 2025-03-11T22:14:27.009582
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3057 /
tcp
-1399940268 | 2025-03-25T07:39:57.304823
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3063 /
tcp
2098371729 | 2025-03-04T17:16:59.890935
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
3070 /
tcp
-653033013 | 2025-03-11T12:57:29.210682
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
3078 /
tcp
-1019343788 | 2025-03-12T04:59:33.860620
3093 /
tcp
45131230 | 2025-03-16T05:04:19.328273
inv2W\x04\x0f\x00\x00\x00\x01\x00\t\x00\x00\x00
3097 /
tcp
819727972 | 2025-03-25T11:35:49.789862
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3100 /
tcp
-1399940268 | 2025-03-22T13:18:05.414168
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3119 /
tcp
-585940771 | 2025-03-25T14:00:41.485213
3141 /
tcp
-358801646 | 2025-03-11T13:59:16.829023
3142 /
tcp
819727972 | 2025-03-17T21:59:30.186720
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3144 /
tcp
-1139539254 | 2025-03-03T20:55:56.636079
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
3161 /
tcp
-904840257 | 2025-03-19T06:24:24.704686
572 Relay not authorized\r\n
3162 /
tcp
-2096652808 | 2025-03-22T15:24:17.404902
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
3166 /
tcp
-1399940268 | 2025-03-13T13:15:53.423411
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3170 /
tcp
819727972 | 2025-02-27T18:40:36.994710
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3187 /
tcp
1911457608 | 2025-03-09T20:14:04.211131
\x00[\x00\x00\x00\x00\x00\x00
3197 /
tcp
707919486 | 2025-03-17T09:12:00.116982
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
3199 /
tcp
-339084706 | 2025-03-17T09:04:31.809447
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
3256 /
tcp
233634112 | 2025-03-14T17:11:20.125381
SSH-98.60-SysaxSSH_81885..42
-1914158197 | 2025-03-17T00:57:50.848116
HTTP/1.1 500 Internal Server Error
Server: nginx/1.18.11011 (Ubuntu)
Content-Type: text/plain; charset=utf-8
Connection: close
247702477 | 2025-03-25T20:07:40.515417
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 9-54370107-0 0NNN RT(1701565466051 0) q(0 -1 -1 -1) r(0 -1)
3299 /
tcp
1991883981 | 2025-03-04T19:04:56.934185
B\x00\x00\x00\xc3\xbfn\x04Too many connections
3301 /
tcp
-1399940268 | 2025-03-14T20:31:31.470515
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3306 /
tcp
1801207137 | 2025-03-10T10:22:50.815580
F\\x00\\x00\\x00\\xffj\\x04Host \'106.75.96.125\' is not allowed to connect to this MySQL server
3310 /
tcp
819727972 | 2025-03-16T18:54:49.656345
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3341 /
tcp
-1399940268 | 2025-03-20T17:34:06.607763
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3389 /
tcp
-6645672 | 2025-03-08T11:46:23.691524
Remote Desktop Protocol\n\\x03\\x00\\x00\\x13\\x0e\\xd0\\x00\\x00\\x124\\x00\\x02\\x0f\\x08\\x00\\x08\\x00\\x00\\x00\n\nFlag: PROTOCOL_HYBRID_EX\nTarget_Name: 172_16_0_11\nProduct_Version: 6.3.9600 Ntlm 15\nOS: Windows 8.1/Windows Server 2012 R2\nNetBIOS_Domain_Name: 172_16_0_11\nNetBIOS_Computer_Name: 172_16_0_11\nDNS_Domain_Name: 172_16_0_11\nDNS_Computer_Name: 172_16_0_11\nSystem_Time: 2024-01-22 08:42:27 +0000 UTC\n\n
3409 /
tcp
-1399940268 | 2025-03-06T09:09:27.498244
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3523 /
tcp
165188539 | 2025-03-05T16:20:45.329868
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
3531 /
tcp
-2089734047 | 2025-03-07T14:32:29.471857
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
198844676 | 2025-03-06T20:53:22.232400
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3558 /
tcp
-2089734047 | 2025-03-26T07:38:58.622132
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3572 /
tcp
504717326 | 2025-03-11T10:09:56.881952
SSH-2.0-OpenSSH_8.6
Vulnerabilities
3780 /
tcp
2087396567 | 2025-03-15T20:24:40.592528
kjnkjabhbanc283ubcsbhdc72
3793 /
tcp
-1835475271 | 2025-03-10T10:24:28.036608
200 NOD32SS 99 (3318497116)\r\n
1282941221 | 2025-03-12T18:41:55.965520
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
141533638 | 2025-03-19T02:54:13.930413
HTTP/1.1 302 Found
Location: /index.html
4022 /
tcp
1011407350 | 2025-03-17T04:20:54.505382
* OK GroupWise IMAP4rev1 Server Ready\r\n
4063 /
tcp
1690634669 | 2025-03-22T20:01:45.862811
4064 /
tcp
-1399940268 | 2025-03-16T05:02:41.622290
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4150 /
tcp
945910976 | 2025-03-06T20:08:12.824482
* OK TeamXchange IMAP4rev1 server (otyUg) ready.\r\n
4172 /
tcp
-1888448627 | 2025-02-28T18:48:25.855571
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
198844676 | 2025-03-24T13:33:00.695401
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
-1013082686 | 2025-03-09T11:26:22.855569
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
4250 /
tcp
-2017887953 | 2025-03-24T06:54:16.792676
SSH-2.0-OpenSSH_7.9
Vulnerabilities
4282 /
tcp
-1626979812 | 2025-03-20T15:09:54.120532
220 Service ready for new user.
4300 /
tcp
-1487943323 | 2025-03-17T22:00:53.055016
431 Unable to negotiate secure command connection.\r\n
4369 /
tcp
165188539 | 2025-03-22T09:19:10.791180
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
4433 /
tcp
-438503381 | 2025-03-26T09:28:36.256755
WORLD OF WARCRAFT CONNECTION - SERVER TO CLIENT - V2
4434 /
tcp
104385780 | 2025-03-22T00:55:43.694728
-1013082686 | 2025-03-20T06:59:46.082203
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
4444 /
tcp
472902042 | 2025-03-28T09:13:57.088220
"Magic:ActiveMQ
Version:12
<ActiveMQ*TcpNoDelayEnabledSizePrefixDisabled CacheSizeProviderName ActiveMQStackTraceEnabledPlatformDetails JavaCacheEnabledTightEncodingEnabledMaxFrameSize@MaxInac
971933601 | 2025-03-11T10:17:39.555367
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
4455 /
tcp
-1399940268 | 2025-02-27T10:28:12.052281
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4463 /
tcp
819727972 | 2025-03-23T10:06:44.350760
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4466 /
tcp
-1099385124 | 2025-03-25T12:04:17.349562
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
4482 /
tcp
1911457608 | 2025-03-26T15:21:57.013465
\x00[\x00\x00\x00\x00\x00\x00
4500 /
tcp
1332894250 | 2025-03-21T13:19:11.807278
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
4506 /
tcp
641705735 | 2025-03-12T13:35:48.686643
4524 /
tcp
-136006866 | 2025-03-10T11:43:07.919589
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
4550 /
tcp
-660019401 | 2025-03-13T02:39:35.195540
4734 /
tcp
819727972 | 2025-03-22T19:53:57.312827
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4808 /
tcp
1308377066 | 2025-03-19T06:34:23.829558
4899 /
tcp
819727972 | 2025-03-12T01:47:08.104050
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4911 /
tcp
2063598737 | 2025-03-09T23:34:47.373765
4949 /
tcp
1794594071 | 2025-03-28T15:45:35.100749
5001 /
tcp
-616720387 | 2025-03-14T21:34:22.103078
5006 /
tcp
2087396567 | 2025-03-25T12:53:03.710762
kjnkjabhbanc283ubcsbhdc72
5007 /
tcp
408230060 | 2025-03-12T13:58:59.178613
\r\nSorry, that nickname format is invalid.\r\n
5010 /
tcp
-1428621233 | 2025-03-05T02:25:55.320480
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
5093 /
tcp
-1399940268 | 2025-03-15T18:47:30.895662
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5105 /
tcp
-2033111675 | 2025-03-07T17:18:55.503390
5119 /
tcp
599074451 | 2025-03-27T02:25:40.539962
5140 /
tcp
-1399940268 | 2025-03-25T12:16:47.497145
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5160 /
tcp
1126993057 | 2025-03-09T07:13:47.614551
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
5172 /
tcp
-1887823886 | 2025-03-13T22:48:14.809055
K%~)J/\tHjU(IAGENT = (AGENT_VERSION = 2388790170)(RPC_VERSION = 5..722))
5201 /
tcp
-2089734047 | 2025-03-19T12:48:53.033568
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
5237 /
tcp
165188539 | 2025-03-21T17:07:31.671165
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
5243 /
tcp
-2089734047 | 2025-03-27T21:29:26.690954
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
5257 /
tcp
-1487943323 | 2025-03-13T15:54:57.194535
431 Unable to negotiate secure command connection.\r\n
1743272246 | 2025-03-22T22:41:32.346389
HTTP/1.1 400 Bad Request
Server: CWAP-waf
Content-Type: text/html
Connection: close
WZWS-RAY: 1249-1705940324.547-w-waf01nbzt
5432 /
tcp
2063598737 | 2025-03-18T20:14:15.565244
5454 /
tcp
-1036370807 | 2025-03-13T18:40:27.729419
5456 /
tcp
819727972 | 2025-03-16T08:46:19.923998
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1023953321 | 2025-02-28T18:51:37.815355
HTTP/1.0 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm="proxy"
Connection: close
Content-type: text/html; charset=utf-8
5503 /
tcp
1911457608 | 2025-03-21T00:20:36.405167
\x00[\x00\x00\x00\x00\x00\x00
-829048661 | 2025-03-20T18:27:00.955725
HTTP/1.1 503 Service Unavailable
Server: GStreamer RTSP Server
Connection: close
Cache-Control: no-store
Pragma: no-cache
5552 /
tcp
-1399940268 | 2025-03-21T02:00:57.601117
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1282941221 | 2025-02-28T02:10:36.220544
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
5607 /
tcp
1208318993 | 2025-03-21T04:42:06.347287
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
5680 /
tcp
740837454 | 2025-03-28T12:50:27.018449
SSH-2.0-OpenSSH_5.3
Vulnerabilities
2143387245 | 2025-02-28T02:24:06.029805
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
5853 /
tcp
2063598737 | 2025-02-27T09:43:36.375149
5910 /
tcp
-1912189249 | 2025-03-17T20:40:24.053484
RFB 003.006
VNC:
Protocol Version: 3.6
5911 /
tcp
1911457608 | 2025-03-16T20:44:23.356489
\x00[\x00\x00\x00\x00\x00\x00
-840053751 | 2025-03-12T10:54:50.473766
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html
Connection: keep-alive
Access-Control-Allow-Origin: *
Access-Control-Allow-Methods: POST, GET,PUT,DELETE OPTIONS
Access-Control-Allow-Headers: Origin, Authorization, Accept,Content-Type
Access-Control-Allow-Credentials: true
Accept-Ranges: bytes
Access-Control-Allow-Origin: *
Access-Control-Allow-Methods: POST, GET,PUT,DELETE OPTIONS
Access-Control-Allow-Headers: Origin, Authorization, Accept,Content-Type
Access-Control-Allow-Credentials: tru
5916 /
tcp
-1099385124 | 2025-03-15T15:50:21.665860
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
5938 /
tcp
-1730858130 | 2025-03-16T09:51:34.030639
RFB 003.008
VNC:
Protocol Version: 3.8
5988 /
tcp
1208318993 | 2025-03-23T13:10:12.679690
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
-1013082686 | 2025-03-16T22:32:40.814022
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
6002 /
tcp
-616720387 | 2025-03-18T07:00:19.238930
2125172975 | 2025-03-05T12:27:38.052148
HTTP/1.1 404 Not Found
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/8.5
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
6011 /
tcp
-1399940268 | 2025-03-25T04:05:58.147144
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6021 /
tcp
-1399940268 | 2025-03-11T23:07:29.605492
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6036 /
tcp
1208318993 | 2025-03-17T02:43:02.168674
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
6102 /
tcp
1370263973 | 2025-03-28T23:16:50.266083
6379 /
tcp
321971019 | 2025-03-25T19:53:56.021558
-ERR client ip is not in whitelist\r
6513 /
tcp
-1399940268 | 2025-03-21T00:45:04.475349
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6514 /
tcp
1989907056 | 2025-03-22T01:51:22.869565
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
6600 /
tcp
-1428621233 | 2025-03-16T17:19:02.062869
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
6653 /
tcp
819727972 | 2025-03-07T13:04:53.780656
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4935895 | 2025-03-23T00:52:32.263772
HTTP/1.1 400 Bad Request
Server: CloudWAF
6667 /
tcp
-1316491703 | 2025-03-24T08:26:48.356512
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready
6789 /
tcp
-616720387 | 2025-03-15T19:53:36.899119
6799 /
tcp
-339084706 | 2025-03-15T00:54:48.871623
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
1220127183 | 2025-03-10T21:08:49.390408
HTTP/1.1 400 Bad Request
Connection: keep-alive
Connection: close
X-Via-JSL: 6958812,-
X-Cache: error
7003 /
tcp
1911457608 | 2025-03-09T20:50:36.665475
\x00[\x00\x00\x00\x00\x00\x00
-2121693451 | 2025-03-28T15:06:58.679319
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae28cd_CS-NKG-01HoU21_7739-64564
7071 /
tcp
2067064333 | 2025-03-24T00:26:47.238637
7078 /
tcp
165188539 | 2025-03-23T22:00:54.741908
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
7218 /
tcp
-1840865572 | 2025-03-08T15:29:43.552692
HÿjHost '101.133.140.114' is not allowed to
connect to this MySQL server
7331 /
tcp
-2096652808 | 2025-03-14T07:36:40.090052
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
7373 /
tcp
-1399940268 | 2025-03-11T12:24:46.887402
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7415 /
tcp
-2089734047 | 2025-03-17T09:51:16.257952
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
7433 /
tcp
1308377066 | 2025-03-19T22:53:50.908536
7434 /
tcp
-1148066627 | 2025-03-21T20:17:50.911592
\x00[\xc2\x84\xc2\x86\xc3\xb2\x7f\x00\x00
0 | 2025-03-27T21:33:45.381207
HTTP/1.1 408 Request Timeout
content-length: 0
7548 /
tcp
996960436 | 2025-03-18T23:24:03.746328
-913917757 | 2025-03-20T07:33:42.269967
HTTP/1.1 200 OK
Server: nginx/onex
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
Vary: Accept-Encoding
Strict-Transport-Security: max-age=31536000
1391945995 | 2025-03-15T06:15:26.308307
HTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=utf-8
Proxy-Authenticate: Basic realm=""
7788 /
tcp
-441419608 | 2025-03-28T23:12:01.995941
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
2103111368 | 2025-03-10T17:29:03.150019
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
-1453516345 | 2025-03-23T17:44:10.345814
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
8009 /
tcp
1212921144 | 2025-03-05T04:22:38.946725
-1839934832 | 2025-03-16T15:55:31.162747
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
8036 /
tcp
-1399940268 | 2025-03-26T20:26:59.434570
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8042 /
tcp
2049274725 | 2025-03-27T15:44:54.790109
8048 /
tcp
-2096652808 | 2025-03-21T08:11:40.084025
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8049 /
tcp
820958131 | 2025-03-06T18:42:30.812388
kjnkjabhbanc283ubcsbhdc72\x02
8057 /
tcp
-1399940268 | 2025-03-27T15:06:48.420788
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8066 /
tcp
1911457608 | 2025-03-11T13:50:30.571697
\x00[\x00\x00\x00\x00\x00\x00
8068 /
tcp
-980525298 | 2025-03-09T22:52:42.864163
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8081 /
tcp
-445721795 | 2025-03-15T22:24:18.508435
\x00[\xc3\xaed\x1a\x7f\x00\x00
8083 /
tcp
819727972 | 2025-03-18T22:35:29.312796
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8085 /
tcp
740837454 | 2025-03-28T18:18:30.271562
SSH-2.0-OpenSSH_5.3
Vulnerabilities
8087 /
tcp
-345718689 | 2025-03-24T04:51:43.241963
8103 /
tcp
-441419608 | 2025-03-21T18:26:52.756558
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
8119 /
tcp
-2096652808 | 2025-03-28T17:07:31.003415
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8136 /
tcp
307999478 | 2025-02-27T17:55:40.169526
unknown command \r\nunknown command \r\n
8152 /
tcp
-2089734047 | 2025-03-21T21:25:43.835191
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8155 /
tcp
-1399940268 | 2025-02-27T21:44:51.955615
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8170 /
tcp
819727972 | 2025-03-05T01:05:28.111846
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8173 /
tcp
-2096652808 | 2025-03-26T19:35:29.404516
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8174 /
tcp
1989907056 | 2025-03-11T09:09:29.537583
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
8179 /
tcp
1911457608 | 2025-03-19T03:38:43.265575
\x00[\x00\x00\x00\x00\x00\x00
8181 /
tcp
1212921144 | 2025-03-16T09:22:40.710179
1320285193 | 2025-03-17T16:42:50.618418
HTTP/1.1 404 Not Found
Server: CloudWAF
Content-Type: text/html
Connection: keep-alive
8291 /
tcp
1911457608 | 2025-03-22T10:50:18.515039
\x00[\x00\x00\x00\x00\x00\x00
8319 /
tcp
-1399940268 | 2025-03-18T17:01:57.781926
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1335782347 | 2025-03-11T08:17:50.327385
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1705940700.09-waf02bjtp3
8343 /
tcp
-1099385124 | 2025-03-03T17:57:33.917407
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
8393 /
tcp
819727972 | 2025-03-11T22:31:58.087592
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8419 /
tcp
-2140303521 | 2025-03-10T21:19:01.973866
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
8420 /
tcp
321971019 | 2025-03-14T15:04:51.596295
-ERR client ip is not in whitelist\r
8431 /
tcp
1615193817 | 2025-03-04T08:47:13.099470
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
8433 /
tcp
819727972 | 2025-03-23T08:23:22.535704
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8435 /
tcp
819727972 | 2025-02-28T03:47:06.816860
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8440 /
tcp
921225407 | 2025-03-06T22:11:26.422683
\x00\x00\x00\x04\x00\x00\x00\x00\x00
8442 /
tcp
-891714208 | 2025-03-25T13:20:43.003837
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
1096654864 | 2025-03-21T12:44:09.322929
HTTP/1.0 200 OK
Server: httpd/2.0
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
Content-Type: text/html
Connection: close
8454 /
tcp
1492413928 | 2025-03-21T07:33:33.750177
SSH-2.0-OpenSSH_7.5
Vulnerabilities
8514 /
tcp
1911457608 | 2025-03-09T18:34:43.313818
\x00[\x00\x00\x00\x00\x00\x00
8526 /
tcp
1911457608 | 2025-03-16T16:06:48.410475
\x00[\x00\x00\x00\x00\x00\x00
8528 /
tcp
819727972 | 2025-03-10T04:08:46.552557
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8529 /
tcp
819727972 | 2025-03-15T04:30:20.563707
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8530 /
tcp
-1399940268 | 2025-03-22T02:04:25.857446
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8543 /
tcp
-358801646 | 2025-03-12T08:36:14.820163
8545 /
tcp
-2096652808 | 2025-03-05T09:36:00.687525
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8551 /
tcp
-2089734047 | 2025-03-17T20:33:57.526945
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8554 /
tcp
-68075478 | 2025-03-19T19:36:55.130217
-1013082686 | 2025-03-27T00:48:21.412270
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
8578 /
tcp
1911457608 | 2025-03-09T07:29:05.444435
\x00[\x00\x00\x00\x00\x00\x00
8586 /
tcp
-1373613804 | 2025-03-10T01:30:50.584220
00970795:d7:smethod,6:shello,8:soptions,80:d10:shttp_port,368696:i1082,5:sname,5:sL_x,10:ssync_port,5:i00469,10:stimestamp,3190459:f920.7251553166,8:sversion,6262522:sl4X,
8649 /
tcp
842535728 | 2025-03-21T02:59:23.137619
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
8663 /
tcp
-1746074029 | 2025-03-25T14:57:31.957191
8688 /
tcp
2098371729 | 2025-03-27T20:30:44.529227
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
8709 /
tcp
-1888448627 | 2025-03-15T04:36:33.866006
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8728 /
tcp
-358801646 | 2025-03-04T21:22:20.736326
2103111368 | 2025-03-13T22:36:57.090565
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
8765 /
tcp
-2033111675 | 2025-02-28T23:42:54.865775
8771 /
tcp
-2017887953 | 2025-03-22T05:50:28.303789
SSH-2.0-OpenSSH_7.9
Vulnerabilities
-1839934832 | 2025-03-25T17:30:05.228498
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
8791 /
tcp
819727972 | 2025-03-10T21:56:42.852495
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8814 /
tcp
-1327660293 | 2025-03-15T03:34:33.899244
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
8818 /
tcp
1504401647 | 2025-03-04T07:15:00.591591
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
8825 /
tcp
320677201 | 2025-03-07T07:36:57.505549
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
8830 /
tcp
165188539 | 2025-03-09T06:06:30.840063
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8833 /
tcp
-1699556818 | 2025-03-14T13:29:59.716956
\x01remshd: Kerberos Authentication not enabled.\n
8855 /
tcp
-1699556818 | 2025-03-09T10:23:11.570368
\x01remshd: Kerberos Authentication not enabled.\n
8867 /
tcp
-1036370807 | 2025-03-28T07:43:21.225492
8872 /
tcp
819727972 | 2025-03-24T04:33:12.102152
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8876 /
tcp
1830187220 | 2025-03-09T16:48:56.515583
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
8877 /
tcp
-1399940268 | 2025-03-03T20:11:30.590546
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8902 /
tcp
-1399940268 | 2025-03-24T19:57:22.944121
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8935 /
tcp
-339084706 | 2025-03-13T15:27:13.796591
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
1966849516 | 2025-03-21T18:04:44.852171
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65adecfe_CS-000-01NFs233_3728-19750
9001 /
tcp
-1026951088 | 2025-03-07T12:12:00.874503
9008 /
tcp
-1399940268 | 2025-03-06T02:32:50.650161
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9013 /
tcp
819727972 | 2025-03-09T14:16:13.436636
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9015 /
tcp
-1888448627 | 2025-03-18T10:26:45.973257
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9026 /
tcp
1308377066 | 2025-03-26T04:09:32.980930
9039 /
tcp
-1399940268 | 2025-03-10T15:45:26.386570
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9043 /
tcp
-653033013 | 2025-03-13T23:20:28.873690
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
9047 /
tcp
-1139539254 | 2025-03-15T20:55:58.293035
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
9049 /
tcp
2098371729 | 2025-03-10T08:51:25.338264
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
9051 /
tcp
842535728 | 2025-03-28T05:23:16.690309
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
9059 /
tcp
1911457608 | 2025-03-17T18:20:05.188673
\x00[\x00\x00\x00\x00\x00\x00
9066 /
tcp
-1399940268 | 2025-03-18T01:35:24.280133
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9070 /
tcp
1911457608 | 2025-03-25T17:12:43.974718
\x00[\x00\x00\x00\x00\x00\x00
9091 /
tcp
-971970408 | 2025-03-27T09:31:50.744098
9100 /
tcp
-2089734047 | 2025-03-14T07:44:20.343215
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9104 /
tcp
-1375131644 | 2025-03-26T18:26:06.443022
\x00[v\xc3\xbdC\x7f\x00\x00
9119 /
tcp
-653033013 | 2025-03-28T05:00:22.364499
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
9121 /
tcp
671605376 | 2025-03-19T19:46:13.626069
9126 /
tcp
-1327660293 | 2025-03-24T03:14:38.713663
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
9132 /
tcp
819727972 | 2025-03-17T13:41:17.034284
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1013082686 | 2025-03-24T19:01:01.407173
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
9141 /
tcp
819727972 | 2025-03-15T07:55:45.669840
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9142 /
tcp
-1399940268 | 2025-03-15T21:42:16.953900
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9151 /
tcp
1741579575 | 2025-03-17T12:40:36.422783
9155 /
tcp
-1399940268 | 2025-03-25T10:28:18.584211
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9156 /
tcp
1126993057 | 2025-03-12T12:16:27.360190
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
9160 /
tcp
632542934 | 2025-02-27T12:21:54.057471
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
9163 /
tcp
-1733645023 | 2025-03-16T09:46:57.187048
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
9166 /
tcp
-1888448627 | 2025-03-24T02:23:38.301286
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9170 /
tcp
632542934 | 2025-02-27T13:20:04.913520
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
-2107996212 | 2025-03-11T18:20:57.818994
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
9177 /
tcp
1126993057 | 2025-03-13T21:48:18.247618
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
9195 /
tcp
-1399940268 | 2025-03-10T22:31:22.456844
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9208 /
tcp
-1888448627 | 2025-03-15T23:28:22.772598
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9219 /
tcp
-1327660293 | 2025-02-28T21:58:51.163942
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
9222 /
tcp
-1399940268 | 2025-03-09T17:28:44.886553
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-2107996212 | 2025-03-11T13:29:29.590773
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
9246 /
tcp
945910976 | 2025-03-11T11:12:54.695345
* OK TeamXchange IMAP4rev1 server (otyUg) ready.\r\n
2103111368 | 2025-03-16T20:12:32.885767
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
9292 /
tcp
-1399940268 | 2025-03-19T05:54:39.137995
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9306 /
tcp
-891714208 | 2025-03-19T14:49:32.704340
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
9308 /
tcp
165188539 | 2025-03-23T08:03:26.736980
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9333 /
tcp
-1375131644 | 2025-03-18T15:23:19.128329
\x00[v\xc3\xbdC\x7f\x00\x00
1909672637 | 2025-03-25T22:43:28.846511
HTTP/1.1 400 Bad Request
Content-Type: text/plain; charset=utf-8
Sec-Websocket-Version: 13
X-Content-Type-Options: nosniff
9530 /
tcp
819727972 | 2025-03-25T10:44:39.518218
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1839934832 | 2025-03-20T04:16:02.967180
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
9633 /
tcp
-1477838366 | 2025-03-23T00:26:30.698550
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
9658 /
tcp
1353260875 | 2025-03-11T10:52:34.148584
\x00[g\xc2\x95N\x7f\x00\x00
-1839934832 | 2025-03-23T03:48:52.953104
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
9690 /
tcp
1189133115 | 2025-03-27T17:39:21.700331
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
9700 /
tcp
-1399940268 | 2025-03-09T17:03:17.960821
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9761 /
tcp
820958131 | 2025-03-05T18:04:55.070832
kjnkjabhbanc283ubcsbhdc72\x02
9802 /
tcp
1308377066 | 2025-03-14T17:18:38.883373
9876 /
tcp
1975288991 | 2025-03-21T15:24:18.271799
2143387245 | 2025-03-10T23:35:11.639801
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
9922 /
tcp
819727972 | 2025-03-27T11:37:24.537264
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9928 /
tcp
-1279886438 | 2025-03-04T15:28:23.222878
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
1712606111 | 2025-03-23T09:18:49.700033
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae1282_PSzqstdxyw34_8689-21922
9990 /
tcp
-1399940268 | 2025-03-17T09:51:53.195979
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9994 /
tcp
599074451 | 2025-03-23T21:07:27.814721
1637038794 | 2025-03-23T20:37:32.436992
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2521_PS-PEK-015Wj25_25111-50596
9999 /
tcp
1161309183 | 2025-03-25T09:44:59.343928
10000 /
tcp
-1375131644 | 2025-03-18T21:42:47.604578
\x00[v\xc3\xbdC\x7f\x00\x00
10004 /
tcp
599074451 | 2025-03-07T01:46:13.415139
10005 /
tcp
-297128567 | 2025-03-05T19:12:05.010451
\x04\x01\xc3\xb4\x00\x15Internal Server Error\x00\x00\x00AB\x00\x02\x05\x00
10015 /
tcp
677934968 | 2025-03-06T16:30:15.794576
10025 /
tcp
1363464823 | 2025-03-17T06:22:29.809979
10027 /
tcp
1363464823 | 2025-03-22T19:31:34.343499
10041 /
tcp
307999478 | 2025-03-13T20:31:41.384201
unknown command \r\nunknown command \r\n
10042 /
tcp
307999478 | 2025-03-04T11:42:18.193094
unknown command \r\nunknown command \r\n
10049 /
tcp
921225407 | 2025-03-18T03:33:40.235526
\x00\x00\x00\x04\x00\x00\x00\x00\x00
10066 /
tcp
-345718689 | 2025-03-24T04:52:28.363656
10134 /
tcp
165188539 | 2025-03-15T13:12:39.573868
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
10250 /
tcp
-2096652808 | 2025-03-17T03:45:50.904284
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
10380 /
tcp
819727972 | 2025-03-25T00:46:18.353987
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10393 /
tcp
-2096652808 | 2025-02-27T15:38:12.850447
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
-1013082686 | 2025-03-14T12:15:48.691995
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
10933 /
tcp
-1105333987 | 2025-03-25T14:57:14.963845
10943 /
tcp
401555314 | 2025-03-05T14:17:50.494195
11007 /
tcp
1911457608 | 2025-03-24T00:48:09.437839
\x00[\x00\x00\x00\x00\x00\x00
11065 /
tcp
2098371729 | 2025-03-04T14:30:52.641122
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
-147424911 | 2025-03-16T13:20:35.900303
HTTP/1.1 404 Not Found
Content Length: 0
11112 /
tcp
-1810987450 | 2025-03-26T18:59:46.207257
11210 /
tcp
-2089734047 | 2025-02-28T07:35:55.669133
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
11211 /
tcp
-136006866 | 2025-02-28T16:10:07.289105
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
11481 /
tcp
-1399940268 | 2025-03-06T14:56:20.464810
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
11701 /
tcp
-1399940268 | 2025-02-27T16:02:42.430258
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12082 /
tcp
-1399940268 | 2025-03-18T00:25:52.982557
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12105 /
tcp
1632932802 | 2025-03-16T04:27:16.793539
12106 /
tcp
921225407 | 2025-03-19T16:52:36.206382
\x00\x00\x00\x04\x00\x00\x00\x00\x00
12124 /
tcp
1996932384 | 2025-03-27T16:14:42.438364
12132 /
tcp
819727972 | 2025-03-17T06:35:38.291091
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12133 /
tcp
165188539 | 2025-03-09T12:11:47.076884
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
-1839934832 | 2025-03-08T21:55:25.096866
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
12141 /
tcp
819727972 | 2025-02-27T09:46:34.488624
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12149 /
tcp
1911457608 | 2025-03-25T01:03:44.160907
\x00[\x00\x00\x00\x00\x00\x00
-1453516345 | 2025-02-28T10:30:09.728154
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
12164 /
tcp
1208318993 | 2025-03-14T17:32:38.740053
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
12169 /
tcp
707919486 | 2025-03-16T22:35:38.434452
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
12170 /
tcp
-1036370807 | 2025-03-18T19:38:05.365689
12186 /
tcp
165188539 | 2025-03-09T23:28:05.942287
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
-1045760528 | 2025-03-09T19:26:06.738841
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
12223 /
tcp
820958131 | 2025-02-27T04:54:10.097555
kjnkjabhbanc283ubcsbhdc72\x02
12228 /
tcp
740837454 | 2025-03-28T07:07:19.306448
SSH-2.0-OpenSSH_5.3
Vulnerabilities
12234 /
tcp
165188539 | 2025-03-07T09:11:32.538332
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12238 /
tcp
-1399940268 | 2025-03-08T18:39:21.218255
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12241 /
tcp
-1399940268 | 2025-03-23T17:09:43.618512
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12251 /
tcp
1189133115 | 2025-02-27T19:13:19.757409
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
12254 /
tcp
-1032713145 | 2025-03-11T22:18:33.907442
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
12264 /
tcp
-2033111675 | 2025-03-21T22:45:45.420615
12278 /
tcp
819727972 | 2025-03-19T22:51:13.957779
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1396488228 | 2025-03-20T10:18:43.826978
HTTP/1.1 200 OK
Content-Length: 2037
Cache-Control: private, max-age=300
Content-Type: text/html
12304 /
tcp
-1538260461 | 2025-03-04T17:20:43.415274
12309 /
tcp
1363464823 | 2025-03-23T02:52:35.564847
12311 /
tcp
669849225 | 2025-03-07T02:35:46.678585
SSH-98.60-SysaxSSH_81885..42\r\n
12322 /
tcp
-1399940268 | 2025-03-20T19:51:40.515806
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12332 /
tcp
-358801646 | 2025-03-28T22:30:39.651211
12336 /
tcp
-375604792 | 2025-03-24T07:15:28.529707
220 Microsoft FTP Service
296364507 | 2025-03-27T23:25:46.314186
HTTP/1.1 500 Internal Server Error
SERVER: Trend Chip UPnP/1.0 DMS
CONNECTION: close
CONTENT-LENGTH: 60
CONTENT-TYPE: text/html
12347 /
tcp
1011407350 | 2025-03-06T15:43:25.316917
* OK GroupWise IMAP4rev1 Server Ready\r\n
12352 /
tcp
-1059554316 | 2025-03-15T17:45:49.988130
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
12354 /
tcp
1723769361 | 2025-03-23T11:46:21.888966
ELM Enterprise Manager _l\r\nCopyright \xc2\xa9 18668511-928641920 TNT Software, Inc.\r\n
12358 /
tcp
1911457608 | 2025-03-15T18:09:15.044687
\x00[\x00\x00\x00\x00\x00\x00
12361 /
tcp
-1435414831 | 2025-03-24T01:40:43.365847
12363 /
tcp
819727972 | 2025-03-17T03:47:45.558133
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12371 /
tcp
1541211644 | 2025-03-24T02:25:26.118105
12372 /
tcp
165188539 | 2025-03-29T01:25:58.364440
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12374 /
tcp
-1810987450 | 2025-03-16T10:29:47.866677
12378 /
tcp
-1279886438 | 2025-03-08T11:40:07.591696
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
12387 /
tcp
-1327660293 | 2025-02-27T06:14:46.582103
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
12393 /
tcp
819727972 | 2025-03-14T20:15:52.054372
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12405 /
tcp
-1327660293 | 2025-03-22T01:46:44.046424
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
12432 /
tcp
1381121983 | 2025-03-05T13:51:23.479865
12446 /
tcp
-358801646 | 2025-03-20T18:32:54.585696
12449 /
tcp
-1399940268 | 2025-02-27T06:06:40.177126
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12464 /
tcp
819727972 | 2025-03-25T04:09:33.530746
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12473 /
tcp
-1399940268 | 2025-03-10T18:50:18.745123
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12481 /
tcp
-1114821551 | 2025-03-06T12:42:43.943615
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
12482 /
tcp
669849225 | 2025-03-17T11:13:39.843666
SSH-98.60-SysaxSSH_81885..42\r\n
12494 /
tcp
-1105333987 | 2025-03-03T17:36:27.855591
12510 /
tcp
1911457608 | 2025-03-25T15:14:49.230056
\x00[\x00\x00\x00\x00\x00\x00
12517 /
tcp
-2017887953 | 2025-03-12T14:07:32.166254
SSH-2.0-OpenSSH_7.9
Vulnerabilities
2103111368 | 2025-03-07T11:23:07.054586
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
12530 /
tcp
-1399940268 | 2025-03-09T20:29:43.528737
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12559 /
tcp
-1399940268 | 2025-03-12T17:15:01.043819
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12580 /
tcp
-1730858130 | 2025-03-25T04:27:05.794810
RFB 003.008
VNC:
Protocol Version: 3.8
12584 /
tcp
321971019 | 2025-03-16T09:14:47.432612
-ERR client ip is not in whitelist\r
12585 /
tcp
2121220663 | 2025-03-23T09:17:11.494601
12589 /
tcp
819727972 | 2025-03-14T01:13:45.732555
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12980 /
tcp
-1105333987 | 2025-03-05T18:58:43.421037
13047 /
tcp
808560482 | 2025-03-27T07:04:58.094103
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP
: USERID : UNIX : Cr8
13128 /
tcp
-1888448627 | 2025-03-22T03:43:16.652927
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
14026 /
tcp
-303199180 | 2025-03-16T00:16:18.877919
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
14130 /
tcp
819727972 | 2025-03-14T06:27:32.216806
SSH-2.0-OpenSSH_7.4
Vulnerabilities
14147 /
tcp
-2089734047 | 2025-03-20T19:17:16.472357
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
14344 /
tcp
-805362002 | 2025-03-28T20:09:54.607445
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
14404 /
tcp
819727972 | 2025-03-20T19:56:59.263734
SSH-2.0-OpenSSH_7.4
Vulnerabilities
14894 /
tcp
-2140303521 | 2025-03-19T09:11:27.598615
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
14901 /
tcp
-1899074860 | 2025-03-05T16:00:44.387692
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
-1056270173 | 2025-03-07T11:20:45.498338
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
15006 /
tcp
722711397 | 2025-03-16T19:49:23.358619
\x00[M\xc3\xba\xc3\x9a\x7f\x00\x00
15018 /
tcp
-1105333987 | 2025-03-15T23:59:05.550383
15588 /
tcp
819727972 | 2025-03-18T20:41:09.477970
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16004 /
tcp
-1746074029 | 2025-03-05T05:15:37.398771
16029 /
tcp
1911457608 | 2025-03-25T00:39:53.492643
\x00[\x00\x00\x00\x00\x00\x00
16032 /
tcp
-2089734047 | 2025-03-06T13:13:58.390939
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
16040 /
tcp
-1399940268 | 2025-03-04T22:25:38.386638
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16043 /
tcp
1948301213 | 2025-03-21T22:24:06.000666
RFB 003.003
VNC:
Protocol Version: 3.3
16047 /
tcp
-441419608 | 2025-03-15T00:40:32.498392
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
16058 /
tcp
-1730858130 | 2025-03-24T12:27:59.545555
RFB 003.008
VNC:
Protocol Version: 3.8
16062 /
tcp
366084633 | 2025-03-10T19:44:59.532210
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
16067 /
tcp
165188539 | 2025-03-13T15:21:05.904297
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
16071 /
tcp
-1399940268 | 2025-03-24T16:53:32.937929
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1013082686 | 2025-03-10T04:48:50.081970
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
16097 /
tcp
321971019 | 2025-03-16T03:05:51.146577
-ERR client ip is not in whitelist\r
16101 /
tcp
205347087 | 2025-03-04T11:22:30.205295
SSH-25453-Cisco-3524665.35\n
16316 /
tcp
-1399940268 | 2025-03-20T02:50:00.128648
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16992 /
tcp
-1900404274 | 2025-03-22T16:02:52.948154
16993 /
tcp
-1311598826 | 2025-03-22T14:20:33.779217
AMQP:
cluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local
copyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.
information:Licensed under the MPL 2.0. Website: https://rabbitmq.com
platform:Erlang/OTP 24.1
product:RabbitMQ
version:3.9.7
Capabilities:
publisher_confirms:true
exchange_exchange_bindings:true
basic.nack:true
consumer_cancel_notify:true
connection.blocked:true
consumer_priorities:true
authentication_failure_close:true
per_consumer_qos:true
direct_reply_to:tru
17010 /
tcp
921225407 | 2025-03-20T14:47:12.553854
\x00\x00\x00\x04\x00\x00\x00\x00\x00
18051 /
tcp
165188539 | 2025-03-17T07:54:56.432641
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
18069 /
tcp
-358801646 | 2025-03-28T08:38:29.807511
18074 /
tcp
1911457608 | 2025-03-22T14:22:42.036442
\x00[\x00\x00\x00\x00\x00\x00
18077 /
tcp
-1399940268 | 2025-03-19T12:07:27.981755
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18081 /
tcp
-1399940268 | 2025-03-09T23:39:04.848906
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18096 /
tcp
-1713437100 | 2025-03-24T16:12:38.750628
\xc3\xbf\xc3\xbb\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
18098 /
tcp
1308377066 | 2025-03-24T11:45:15.708457
18099 /
tcp
-616720387 | 2025-03-07T16:46:50.656362
18100 /
tcp
1911457608 | 2025-03-06T09:04:04.720116
\x00[\x00\x00\x00\x00\x00\x00
18102 /
tcp
-2096652808 | 2025-02-28T17:03:47.522422
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
18245 /
tcp
-903067560 | 2025-03-21T18:15:34.858224
\x00[\x13)\xc2\x81\x7f\x00\x00
18443 /
tcp
1690634669 | 2025-03-28T19:26:13.119955
19000 /
tcp
-653033013 | 2025-03-17T21:23:19.878021
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
19200 /
tcp
-971970408 | 2025-03-27T18:27:16.008116
19930 /
tcp
-407828767 | 2025-03-26T16:30:07.844084
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
1900503736 | 2025-02-28T03:58:26.561619
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-HTTPAPI/2.0
20070 /
tcp
-2089734047 | 2025-03-03T18:58:05.988650
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
20082 /
tcp
-1265999252 | 2025-03-15T21:06:27.624876
220 VMware Authentication Daemon Version 1.0, ServerDaemonProto\ncol:SOAP, MKSDisplayProtocol:VNC , ,
20084 /
tcp
639175818 | 2025-03-19T18:26:57.633405
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
20087 /
tcp
1723769361 | 2025-03-26T10:24:52.066327
ELM Enterprise Manager _l\r\nCopyright \xc2\xa9 18668511-928641920 TNT Software, Inc.\r\n
20150 /
tcp
-2046514463 | 2025-03-28T00:38:40.893380
20256 /
tcp
1741579575 | 2025-03-26T13:44:48.366230
20800 /
tcp
-1399940268 | 2025-03-16T20:46:59.514850
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
20880 /
tcp
1370263973 | 2025-03-18T01:02:02.435482
21025 /
tcp
677934968 | 2025-03-28T10:46:39.976568
21027 /
tcp
-971970408 | 2025-03-26T22:20:46.608697
21081 /
tcp
-1032713145 | 2025-03-05T18:18:03.623013
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
21246 /
tcp
632542934 | 2025-03-26T01:37:44.250985
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
21250 /
tcp
504717326 | 2025-03-04T04:05:06.800131
SSH-2.0-OpenSSH_8.6
Vulnerabilities
21263 /
tcp
1911457608 | 2025-03-13T11:22:27.594921
\x00[\x00\x00\x00\x00\x00\x00
21280 /
tcp
-1399940268 | 2025-03-23T02:40:08.620717
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21287 /
tcp
819727972 | 2025-03-21T04:51:49.393216
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21299 /
tcp
-1947777893 | 2025-03-20T03:24:26.145370
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
21305 /
tcp
819727972 | 2025-03-15T17:57:03.254923
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21309 /
tcp
897328069 | 2025-03-14T12:08:56.104129
220 mail.scott000.com ESMTP
21319 /
tcp
1011407350 | 2025-03-19T14:42:58.409100
* OK GroupWise IMAP4rev1 Server Ready\r\n
21321 /
tcp
-358801646 | 2025-03-11T19:55:36.464143
21322 /
tcp
-2089734047 | 2025-03-22T11:07:11.288719
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
21935 /
tcp
165188539 | 2025-03-05T08:25:51.755854
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
22000 /
tcp
-653033013 | 2025-03-27T11:04:48.899699
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
22001 /
tcp
-438503381 | 2025-03-27T20:18:45.872317
WORLD OF WARCRAFT CONNECTION - SERVER TO CLIENT - V2
-1013082686 | 2025-03-25T00:51:45.894380
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
22082 /
tcp
-375604792 | 2025-02-28T15:09:45.065735
220 Microsoft FTP Service
22103 /
tcp
-2089734047 | 2025-03-18T00:17:55.032284
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
22107 /
tcp
-1327660293 | 2025-03-15T00:27:15.250287
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
22380 /
tcp
-1399940268 | 2025-03-04T21:19:42.437431
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
22556 /
tcp
1911457608 | 2025-03-25T12:34:46.481781
\x00[\x00\x00\x00\x00\x00\x00
22609 /
tcp
639175818 | 2025-03-04T01:39:38.920338
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
-288825733 | 2025-03-23T21:46:18.025418
HTTP/1.1 200 OK
Connection: close
Content-Length: 2619
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Headers: authorization,Content-Type
Access-Control-Allow-Methods: POST, GET, OPTIONS, PUT, HEAD, DELETE
Content-Type: text/html
Server: Jetty(9.4.14.v20181114)
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1
24245 /
tcp
1690634669 | 2025-03-14T17:43:40.677995
25001 /
tcp
-1399940268 | 2025-03-22T10:02:26.294704
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
25565 /
tcp
-1026951088 | 2025-03-25T22:11:25.813947
26656 /
tcp
-746114901 | 2025-03-13T05:18:23.992505
27015 /
tcp
-613706304 | 2025-03-07T17:50:23.623665
Command: None
Size: 540029490
ID: 1919117645
Type: 1718580079
27017 /
tcp
422524323 | 2025-03-25T09:40:34.862603
{
"Version": "3.4.18",
"VersionArray": [
3,
4,
18,
0
],
"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",
"OpenSSLVersion": "",
"SysInfo": "",
"Bits": 64,
"Debug": false,
"MaxObjectSize": 16777216
}
28015 /
tcp
-1399940268 | 2025-03-13T03:44:54.507714
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
30003 /
tcp
-1142844482 | 2025-03-05T15:23:05.706527
ÿûSOYO_SIP VBNQyQSKc settings
Password:
30022 /
tcp
841014058 | 2025-03-18T20:38:28.743950
Hello, this is FRRouting (version 4.0).
Copyright 19
96-2005 Kunihiro Ishiguro, et al.
Use...
30113 /
tcp
819727972 | 2025-03-20T10:06:31.683106
SSH-2.0-OpenSSH_7.4
Vulnerabilities
30222 /
tcp
599074451 | 2025-03-25T14:59:08.159422
30301 /
tcp
-971970408 | 2025-03-15T18:15:24.145433
30422 /
tcp
-971970408 | 2025-03-26T06:50:14.171709
30501 /
tcp
205347087 | 2025-03-29T02:44:11.788213
SSH-25453-Cisco-3524665.35\n
30718 /
tcp
-305970756 | 2025-03-22T10:52:34.820573
MAC Addr:00:80:a3:fd:5f:0d
30822 /
tcp
2087396567 | 2025-03-25T20:52:13.346928
kjnkjabhbanc283ubcsbhdc72
31022 /
tcp
-971970408 | 2025-03-13T07:34:02.554493
31122 /
tcp
-375604792 | 2025-03-25T16:42:04.527420
220 Microsoft FTP Service
31210 /
tcp
819727972 | 2025-03-15T15:57:30.532036
SSH-2.0-OpenSSH_7.4
Vulnerabilities
31222 /
tcp
-358801646 | 2025-03-24T01:26:18.219267
31322 /
tcp
320677201 | 2025-03-25T04:33:23.024260
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
756886313 | 2025-03-21T09:07:27.956023
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
31422 /
tcp
1690634669 | 2025-03-25T02:39:39.596281
31443 /
tcp
2087396567 | 2025-03-28T16:37:55.015899
kjnkjabhbanc283ubcsbhdc72
31522 /
tcp
1544300041 | 2025-03-12T23:58:35.862598
SSH-25453-Cisco-3524665.35
31622 /
tcp
-68075478 | 2025-03-12T22:16:03.316761
31722 /
tcp
-2031152423 | 2025-03-12T20:31:58.622746
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
32022 /
tcp
1690634669 | 2025-03-23T18:14:44.456947
32102 /
tcp
-2089734047 | 2025-03-28T16:19:19.526674
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
32202 /
tcp
-891714208 | 2025-03-06T01:06:21.067630
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
32400 /
tcp
1842524259 | 2025-03-23T15:08:34.883228
32422 /
tcp
1778988322 | 2025-03-23T12:31:50.922752
* OK GroupWise IMAP4rev1 Server Ready
32764 /
tcp
416263569 | 2025-03-28T01:03:54.153806
32922 /
tcp
2087396567 | 2025-03-23T04:01:41.074851
kjnkjabhbanc283ubcsbhdc72
33022 /
tcp
-68075478 | 2025-03-22T23:40:18.689498
33060 /
tcp
819727972 | 2025-03-14T17:35:44.206209
SSH-2.0-OpenSSH_7.4
Vulnerabilities
33222 /
tcp
-1514525820 | 2025-03-19T22:51:48.600154
Protocol version mismatch
33422 /
tcp
-971970408 | 2025-03-09T08:16:25.795150
33622 /
tcp
-1795027372 | 2025-03-08T18:41:36.415226
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
34122 /
tcp
1830187220 | 2025-03-20T15:59:19.120933
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
34322 /
tcp
2087396567 | 2025-03-19T17:37:36.876827
kjnkjabhbanc283ubcsbhdc72
34422 /
tcp
-641479109 | 2025-03-15T00:04:33.886889
34722 /
tcp
104385780 | 2025-03-19T07:12:58.878813
35000 /
tcp
-1327660293 | 2025-03-18T21:17:56.207244
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
35022 /
tcp
1286504516 | 2025-03-04T00:48:25.564438
CP2E Control Console
Connected to Host: gZI
35122 /
tcp
1208318993 | 2025-03-04T08:09:01.241384
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
35250 /
tcp
921225407 | 2025-03-25T17:19:28.507368
\x00\x00\x00\x04\x00\x00\x00\x00\x00
35322 /
tcp
1690634669 | 2025-03-17T07:54:58.765954
35560 /
tcp
-358801646 | 2025-03-19T01:12:41.278732
35622 /
tcp
-2017887953 | 2025-03-18T08:53:03.351813
SSH-2.0-OpenSSH_7.9
Vulnerabilities
35822 /
tcp
-971970408 | 2025-03-17T16:52:06.243252
35922 /
tcp
1690634669 | 2025-03-16T20:26:24.740788
36022 /
tcp
2087396567 | 2025-03-17T20:21:05.613842
kjnkjabhbanc283ubcsbhdc72
36122 /
tcp
2087396567 | 2025-03-13T10:01:30.325811
kjnkjabhbanc283ubcsbhdc72
36322 /
tcp
-2096652808 | 2025-03-17T11:12:04.787976
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
37022 /
tcp
1261582754 | 2025-03-16T18:33:19.136399
unknown command
unknown command
37322 /
tcp
1286504516 | 2025-03-16T10:18:55.007795
CP2E Control Console
Connected to Host: gZI
37622 /
tcp
1632932802 | 2025-03-16T03:44:28.175207
37722 /
tcp
2087396567 | 2025-03-15T23:26:38.500150
kjnkjabhbanc283ubcsbhdc72
37777 /
tcp
-1399940268 | 2025-03-25T09:02:39.940220
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
38022 /
tcp
1690634669 | 2025-03-17T22:08:56.186728
38122 /
tcp
819727972 | 2025-03-15T16:49:30.734385
SSH-2.0-OpenSSH_7.4
Vulnerabilities
38333 /
tcp
-441419608 | 2025-03-15T19:58:45.883166
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
38722 /
tcp
-971970408 | 2025-03-07T04:56:00.896057
2103111368 | 2025-03-03T20:09:42.181863
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
39722 /
tcp
2087396567 | 2025-03-05T03:26:31.799620
kjnkjabhbanc283ubcsbhdc72
40222 /
tcp
1082732927 | 2025-03-04T09:47:33.967128
STAT pid 1660
STAT uptime 28884
STAT time 1641290377
STAT version 1.2.1
STAT pointer_size 32
STAT curr_items 14
STAT total_items 3533
STAT bytes 30524
STAT curr_connections 1
STAT total_connections 3542
STAT connection_structures 3
STAT cmd_get 3533
STAT cmd_set 3533
STAT get_hits 3519
STAT get_misses 14
STAT bytes_read 7927780
STAT bytes_written 7848552
STAT limit_maxbytes 67108864
END
41522 /
tcp
474736340 | 2025-03-04T22:10:47.376041
431 Unable to negotiate secure command connection.
41794 /
tcp
1741579575 | 2025-03-23T20:26:56.876354
41800 /
tcp
-2089734047 | 2025-03-26T00:29:08.679024
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
42222 /
tcp
1690634669 | 2025-03-05T00:11:42.434662
42922 /
tcp
398077695 | 2025-02-28T14:28:14.841598
43222 /
tcp
1308377066 | 2025-02-28T23:14:30.142951
43422 /
tcp
-971970408 | 2025-02-27T19:45:37.074713
43522 /
tcp
2087396567 | 2025-02-27T17:24:50.436868
kjnkjabhbanc283ubcsbhdc72
-2107996212 | 2025-02-27T06:08:32.051926
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
44158 /
tcp
-433302150 | 2025-03-05T10:11:03.595581
44222 /
tcp
504717326 | 2025-03-10T21:46:44.917895
SSH-2.0-OpenSSH_8.6
Vulnerabilities
44336 /
tcp
-1626979812 | 2025-03-09T12:16:50.059484
220 Service ready for new user.
44337 /
tcp
1665283070 | 2025-03-15T04:32:24.762368
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x01\x00\x00\x10\x00\x00\n0\x03\x00\x00\x00\x01\x00\x05\x00\x00@\x00\x00\x06\x00\x00\x1f@
44818 /
tcp
-1297953727 | 2025-03-06T15:32:59.965675
\x02\x00\x00\x00\x00\x00\x06\x04\x00\x00\x00\x00\x00\x0c\x00\x00\n0\x00\x1c
45003 /
tcp
1911457608 | 2025-03-03T18:13:02.088948
\x00[\x00\x00\x00\x00\x00\x00
45022 /
tcp
-154107716 | 2025-03-10T16:24:34.493361
220 Microsoft FTP Service
530 User cannot log in.
214-The following commands are recognized (* ==>'s unimplemented).
ABOR
ACCT
ADAT *
ALLO
APPE
AUTH
CCC
CDUP
CWD
DELE
ENC *
EPRT
EPSV
FEAT
HELP
HOST
LANG
LIST ...
45667 /
tcp
-1327660293 | 2025-03-04T18:40:57.039097
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
45886 /
tcp
-805362002 | 2025-03-21T18:23:14.086771
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
45922 /
tcp
873425297 | 2025-03-10T13:32:02.297949
200 NOD32SS 99 (3318497116)
47001 /
tcp
1911457608 | 2025-03-27T23:00:14.179317
\x00[\x00\x00\x00\x00\x00\x00
47808 /
tcp
740837454 | 2025-03-24T03:26:16.520809
SSH-2.0-OpenSSH_5.3
Vulnerabilities
47922 /
tcp
2087396567 | 2025-03-10T06:31:40.520443
kjnkjabhbanc283ubcsbhdc72
47990 /
tcp
-903067560 | 2025-03-10T12:12:24.467846
\x00[\x13)\xc2\x81\x7f\x00\x00
1077013874 | 2025-03-20T15:42:19.990701
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
48122 /
tcp
2087396567 | 2025-03-10T04:45:49.052037
kjnkjabhbanc283ubcsbhdc72
48222 /
tcp
233634112 | 2025-03-10T02:59:57.851727
SSH-98.60-SysaxSSH_81885..42
48899 /
tcp
-971970408 | 2025-03-22T04:43:50.090097
49022 /
tcp
1741579575 | 2025-03-07T13:28:52.793234
49121 /
tcp
1426971893 | 2025-03-21T06:45:10.757515
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
50000 /
tcp
1267517148 | 2025-03-26T09:31:14.254081
=Àÿÿ?"<ZDECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6
50010 /
tcp
1911457608 | 2025-03-16T01:20:25.237796
\x00[\x00\x00\x00\x00\x00\x00
50013 /
tcp
-358801646 | 2025-03-10T14:09:08.086373
50022 /
tcp
819727972 | 2025-03-11T04:06:46.820773
SSH-2.0-OpenSSH_7.4
Vulnerabilities
50050 /
tcp
-1261090339 | 2025-03-16T12:38:15.278699
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
-1839934832 | 2025-03-15T21:09:26.257505
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
50100 /
tcp
-1733106930 | 2025-03-21T21:54:51.541794
Mysql Version: 5.6.50-log\nN\n5.6.50-log\x14(\nG5se"tGE\xc3\xbf\xc3\xb7-\x02\x7f\xc2\x80\x15cB^3$Zwh$wM[mysql_native_password
50104 /
tcp
1665283070 | 2025-03-10T22:25:20.377111
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x01\x00\x00\x10\x00\x00\n0\x03\x00\x00\x00\x01\x00\x05\x00\x00@\x00\x00\x06\x00\x00\x1f@
50122 /
tcp
-136006866 | 2025-03-21T07:39:10.281584
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
50257 /
tcp
-1399940268 | 2025-02-28T14:37:36.365033
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
51106 /
tcp
-971970408 | 2025-03-20T09:33:15.693451
51235 /
tcp
165188539 | 2025-03-20T07:33:29.029669
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
51434 /
tcp
819727972 | 2025-03-14T10:18:29.204809
SSH-2.0-OpenSSH_7.4
Vulnerabilities
52311 /
tcp
669849225 | 2025-03-05T23:05:47.688481
SSH-98.60-SysaxSSH_81885..42\r\n
52881 /
tcp
117101543 | 2025-03-11T23:52:03.279273
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
53400 /
tcp
165188539 | 2025-03-27T23:33:47.781834
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
53413 /
tcp
819727972 | 2025-03-22T01:25:03.421965
SSH-2.0-OpenSSH_7.4
Vulnerabilities
53483 /
tcp
1492413928 | 2025-02-27T22:57:22.351664
SSH-2.0-OpenSSH_7.5
Vulnerabilities
54138 /
tcp
-2031152423 | 2025-03-18T07:00:20.879712
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
54922 /
tcp
1741579575 | 2025-03-07T08:15:48.303557
54984 /
tcp
819727972 | 2025-03-21T06:09:40.700269
SSH-2.0-OpenSSH_7.4
Vulnerabilities
55000 /
tcp
819727972 | 2025-03-17T10:40:15.266178
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-271515508 | 2025-03-16T07:25:36.818112
HTTP/1.1 302 Moved Temporarily
Server: DrcomServer1.0
Location: http://192.168.254.3
Cache-Control: no-cache
Connection: close
55200 /
tcp
-1899074860 | 2025-03-08T14:53:30.371972
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
55443 /
tcp
2087396567 | 2025-03-16T19:36:45.531837
kjnkjabhbanc283ubcsbhdc72
55554 /
tcp
2087396567 | 2025-03-16T06:19:13.961864
kjnkjabhbanc283ubcsbhdc72
55722 /
tcp
1208318993 | 2025-03-06T18:55:35.635758
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
55822 /
tcp
-971970408 | 2025-03-06T20:23:03.726272
57622 /
tcp
539065883 | 2025-03-06T09:44:07.079572
57782 /
tcp
165188539 | 2025-03-15T17:49:43.345486
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
57783 /
tcp
-1888448627 | 2025-03-27T09:54:19.464338
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
57786 /
tcp
165188539 | 2025-03-13T16:01:11.951127
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
58122 /
tcp
401555314 | 2025-03-06T02:00:39.906310
58422 /
tcp
819727972 | 2025-03-05T21:51:34.867997
SSH-2.0-OpenSSH_7.4
Vulnerabilities
58443 /
tcp
-1399940268 | 2025-03-23T05:43:54.984348
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
58522 /
tcp
819727972 | 2025-03-05T18:58:56.704932
SSH-2.0-OpenSSH_7.4
Vulnerabilities
58722 /
tcp
819727972 | 2025-03-05T17:15:47.463201
SSH-2.0-OpenSSH_7.4
Vulnerabilities
59022 /
tcp
-1730858130 | 2025-03-05T12:58:44.724708
RFB 003.008
VNC:
Protocol Version: 3.8
59222 /
tcp
-746114901 | 2025-03-05T08:51:39.808899
59522 /
tcp
1741579575 | 2025-03-03T17:46:50.508087
60001 /
tcp
2087396567 | 2025-03-15T01:42:03.901392
kjnkjabhbanc283ubcsbhdc72
1282941221 | 2025-03-21T23:48:15.543927
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
61613 /
tcp
-358801646 | 2025-03-11T11:30:05.160173
61616 /
tcp
539065883 | 2025-03-24T17:21:01.385331
62016 /
tcp
1208318993 | 2025-03-22T21:50:48.816711
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
63210 /
tcp
1948301213 | 2025-03-16T06:31:14.053323
RFB 003.003
VNC:
Protocol Version: 3.3
63256 /
tcp
-1681927087 | 2025-03-10T05:32:23.676195
kjnkjabhbanc283ubcsbhdc72
63260 /
tcp
1996932384 | 2025-03-11T20:16:33.793230
64295 /
tcp
-1399940268 | 2025-03-21T19:47:06.819728
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02