8.141.181.138

Regular View Raw Data Timeline
Last Seen: 2025-02-18

GeneralInformation

Cloud Provider Alibaba Cloud
Country China
City Beijing
Organization Aliyun Computing Co.LTD
ISP Hangzhou Alibaba Advertising Co.,Ltd.
ASN AS37963

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2023
CVE-2023-51767
7.0OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385
6.5In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-48795
5.9The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-38408
9.8The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
2021
CVE-2021-41617
7.0sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368
3.7An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
2020
CVE-2020-15778
7.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145
5.9The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
2019
CVE-2019-16905
7.8OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVE-2019-6111
5.9An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110
6.8In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109
6.8An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
2018
CVE-2018-20685
5.3In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-15919
5.3Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473
5.3OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
2017
CVE-2017-15906
5.3The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
2016
CVE-2016-20012
5.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2016-10708
7.5sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
CVE-2016-10012
7.8The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
CVE-2016-10011
5.5authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
CVE-2016-10010
7.0sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
CVE-2016-10009
7.3Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
CVE-2016-3115
6.4Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
CVE-2016-1908
9.8The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
CVE-2016-0777
6.5The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
2015
CVE-2015-6564
6.9Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
CVE-2015-6563
1.9The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
CVE-2015-5600
8.5The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
CVE-2015-5352
4.3The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
2014
CVE-2014-2653
5.8The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532
4.9sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2014-1692
7.5The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
2012
CVE-2012-0814
3.5The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
2011
CVE-2011-5000
3.5The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
CVE-2011-4327
2.1ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
2010
CVE-2010-5107
5.0The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
CVE-2010-4755
4.0The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
CVE-2010-4478
7.5OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
2008
CVE-2008-3844
9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
2007
CVE-2007-2768
4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.

OpenPorts

111317192123253743495370798092102110111113119143175179195221225234243264389427441443444462465487502503513515548593636771772777873995102210231025108010991177120012341337141414331451152115991604172318001801188319111926195119621964198119872000200220032008201220182060206120622065208120872100211121212130218122092222224822592323232723322376240425062554255725622569259826282762300130193021302230503056306230683075308030923110311231173123313631473148314931653167317631863193319732683299330633103341338833903403349835103551355635593562378039104000400140224063406441014147415041574165424242504282432143694431443344344436444344444445450646024747478648404899491149495007500950255061519052015222522752365238524752485259526652695432543955005555556955925597559958045910593859846000600160026036635264056488651265606580660266336653666766687001701870717078707970887171721874157434744174437548763476547687777179797998802180248031803880408044805180558059807180818085808980948099810781098119812481268127813681378139814081458147814981628164817381848200820382838291830084428456845984608462848484888500851385328544855085548556856585758576864987028728873187648784881588168817882088288833883488568869887088818883890089028907894390019002903190369045904990519062907390829083909190929094910091029119912591469151915491609172918392109219924292449257929292999301930693339376939894189433944394559530960096119633976197659899990999439950999910001100031000510007100091002810031100381004210082100861009310134102101025010251104431047710554109111094311000110021111211184112101121111288113001200112101121111211212114121181212412133121371213812141121561216912175121801218312195122001221212264122751227612285122941230412308123241233312335123441234512348123491235012364123661237312374123901240412415124191244112460124791248512489124961250812515125191252012535125671258512590130821408214084141011426514344144031489514901150001500616010160111602016032160491605316056160641607216084160971666716993177771800418005180061805118053180611806518068180731808618098181021810918182182452000020090202002025620443205472088021001210832125021255212692128121301213102137923023240842418124442250012500725009255652701527017280152808029799300013000230007300293011330443313373220232222328223302233060331223342233622337223382233922342223442234522349223500035022352223572236022361223632236622367223682237122374223752237722377773802238222390223932239722398224009940122402224032240422405224062240822409224102241122415224162241722418224192242122422084222242420424224244342522427224292243221433224352243722440224415844304443094432244337443404452244622448224492245002450394522245322455224562245666457224592246022464224662246722468224702247122476224772247822479904800148012480224832248422487224888948922490224912149200492224932249443495224962249694497224982249922500005000350008500225008550100501225022250322504225092251002510035102251122512005123551422514345152251622517225182252230523225262252722528225292253022531225322253722541225413854222544225452254857550005538855422554435549055553555545572255922560225622256822569225712257222577795778157785580225962259722599226009960129616136161662078632106325663443
11 / tcp
1778988322 | 2025-01-22T18:32:08.983023
13 / tcp
1286504516 | 2025-02-08T20:59:33.727598
17 / tcp
366084633 | 2025-02-04T23:23:07.457662
19 / tcp
676476721 | 2025-02-16T14:22:20.197570
21 / tcp
1564456597 | 2025-02-03T23:49:40.433038
23 / tcp
-23362551 | 2025-02-11T20:22:56.841899
25 / tcp
819727972 | 2025-01-29T19:57:39.248265
37 / tcp
726777565 | 2025-02-09T01:08:45.329761
43 / tcp
1975288991 | 2025-02-08T13:07:58.652072
49 / tcp
-1101712668 | 2025-02-13T20:05:17.901648
53 / tcp
1252359125 | 2025-01-30T20:05:00.734564
70 / tcp
1412519768 | 2025-02-16T10:15:02.395935
79 / tcp
-746345752 | 2025-02-08T00:10:47.355222
80 / tcp
-1541892459 | 2025-02-17T15:31:31.335101
92 / tcp
1726594447 | 2025-01-21T12:38:03.292935
102 / tcp
-784071826 | 2025-02-18T04:19:39.960267
110 / tcp
-1399940268 | 2025-01-23T19:19:30.916416
111 / tcp
-1797602132 | 2025-01-24T10:35:34.733072
113 / tcp
-669112739 | 2025-02-02T19:53:20.711912
119 / tcp
141730637 | 2025-02-08T10:14:24.308355
143 / tcp
639175818 | 2025-01-30T23:48:45.340748
175 / tcp
-1399940268 | 2025-02-03T03:37:38.936239
179 / tcp
-399606100 | 2025-02-06T19:17:23.371714
195 / tcp
474736340 | 2025-01-26T15:21:28.305103
221 / tcp
-358801646 | 2025-02-15T08:13:51.546777
225 / tcp
819727972 | 2025-02-09T07:26:43.133885
234 / tcp
-1888448627 | 2025-02-05T20:54:46.717627
243 / tcp
-1810987450 | 2025-02-07T20:13:03.201403
264 / tcp
1672388472 | 2025-02-09T18:01:38.719968
389 / tcp
-1639129386 | 2025-02-03T22:38:28.549207
427 / tcp
-826599962 | 2025-02-09T10:04:43.580294
441 / tcp
1911457608 | 2025-02-02T18:14:57.719550
443 / tcp
1638645179 | 2025-02-05T17:22:19.037865
444 / tcp
-1715152554 | 2025-02-05T16:50:00.186008
462 / tcp
819727972 | 2025-02-15T03:57:25.113014
465 / tcp
897328069 | 2025-01-27T16:46:48.658053
487 / tcp
165188539 | 2025-01-30T10:48:09.637861
502 / tcp
-2046514463 | 2025-02-16T23:27:34.294492
503 / tcp
1208318993 | 2025-02-03T15:22:25.888222
513 / tcp
2103111368 | 2025-02-05T05:19:55.830510
515 / tcp
819727972 | 2025-02-09T18:45:44.799065
548 / tcp
1801869778 | 2025-02-08T22:33:13.812188
593 / tcp
1308377066 | 2025-02-05T23:06:16.490036
636 / tcp
4146400 | 2025-02-07T06:07:15.501627
771 / tcp
1911457608 | 2025-01-31T18:39:19.842997
772 / tcp
-457235091 | 2025-01-29T18:16:16.705565
777 / tcp
-1346601424 | 2025-02-17T08:28:49.440333
873 / tcp
-1970692834 | 2025-02-13T09:46:58.996549
995 / tcp
-1489591880 | 2025-01-25T13:31:49.847623
1022 / tcp
819727972 | 2025-02-10T16:32:30.961739
1023 / tcp
1996932384 | 2025-01-28T04:52:25.619528
1025 / tcp
580340387 | 2025-01-30T01:09:51.912268
1080 / tcp
1362344524 | 2025-01-19T13:01:48.153605
1099 / tcp
1911457608 | 2025-02-06T04:33:49.853305
1177 / tcp
1824169301 | 2025-02-14T06:03:45.782721
1200 / tcp
819727972 | 2025-02-17T22:02:50.029910
1234 / tcp
-1045760528 | 2025-02-15T21:48:32.615206
1337 / tcp
2087396567 | 2025-02-02T22:56:18.970919
1414 / tcp
-358801646 | 2025-02-06T22:53:02.042821
1433 / tcp
555056254 | 2025-02-16T22:47:02.197807
1451 / tcp
-136006866 | 2025-02-07T20:54:13.751387
1521 / tcp
1975288991 | 2025-01-26T07:24:51.352721
1599 / tcp
2033888749 | 2025-02-08T19:19:56.014075
1604 / tcp
1189133115 | 2025-01-29T17:19:52.978089
1723 / tcp
1103582599 | 2025-02-09T04:29:04.051481
1800 / tcp
-1399940268 | 2025-01-27T12:25:51.690181
1801 / tcp
-1299899661 | 2025-02-10T03:32:31.444831
1883 / tcp
-971970408 | 2025-01-24T10:32:59.609359
1911 / tcp
1911457608 | 2025-01-27T11:55:10.134311
1926 / tcp
2033888749 | 2025-02-14T12:27:32.407358
1951 / tcp
1911457608 | 2025-01-28T08:47:11.432483
1962 / tcp
1911457608 | 2025-02-14T03:25:45.030689
1964 / tcp
1761482307 | 2025-02-09T06:05:55.700478
1981 / tcp
575925250 | 2025-01-30T03:09:43.840712
1987 / tcp
1911457608 | 2025-02-02T20:48:39.637891
2000 / tcp
1911457608 | 2025-02-14T22:47:56.917263
2002 / tcp
1282941221 | 2025-02-08T00:19:48.758799
2003 / tcp
-832380282 | 2025-01-22T16:53:04.297284
2008 / tcp
-1316398834 | 2025-02-03T22:24:28.832733
2012 / tcp
-1746074029 | 2025-02-10T01:05:14.650455
2018 / tcp
-1399940268 | 2025-01-25T04:16:31.201744
2060 / tcp
-1399940268 | 2025-02-17T07:19:27.528740
2061 / tcp
45131230 | 2025-02-03T06:27:26.947571
2062 / tcp
-1099385124 | 2025-02-04T10:00:09.917729
2065 / tcp
-42767839 | 2025-01-31T22:47:59.770333
2081 / tcp
-1248408558 | 2025-01-27T22:46:24.822489
2087 / tcp
660175493 | 2025-02-13T04:05:42.854348
2100 / tcp
398077695 | 2025-02-17T22:10:26.709714
2111 / tcp
372433470 | 2025-02-02T03:59:47.990780
2121 / tcp
141730637 | 2025-02-07T01:54:10.745429
2130 / tcp
-1148066627 | 2025-02-03T01:50:04.228304
2181 / tcp
546151771 | 2025-02-03T05:52:22.514718
2209 / tcp
1911457608 | 2025-01-30T19:57:26.266012
2222 / tcp
2051656595 | 2025-02-10T18:08:50.792149
2248 / tcp
-441419608 | 2025-01-24T07:04:42.908132
2259 / tcp
-1032713145 | 2025-02-14T22:33:51.699572
2323 / tcp
1662205251 | 2025-02-15T08:14:55.210771
2327 / tcp
-1399940268 | 2025-02-14T21:02:16.737598
2332 / tcp
1282941221 | 2025-02-03T04:56:46.471757
2376 / tcp
1544300041 | 2025-02-14T06:13:24.769423
2404 / tcp
-805362002 | 2025-02-03T01:12:48.924560
2506 / tcp
-2096652808 | 2025-01-19T10:55:05.623927
2554 / tcp
1615193817 | 2025-01-21T11:31:36.896979
2557 / tcp
-271515508 | 2025-01-26T06:09:21.627193
2562 / tcp
51259122 | 2025-01-22T18:38:52.150810
2569 / tcp
165188539 | 2025-02-09T18:18:01.442250
2598 / tcp
1911457608 | 2025-02-05T18:56:12.805182
2628 / tcp
1741579575 | 2025-02-15T12:14:30.550931
2762 / tcp
-1399940268 | 2025-01-20T07:35:30.856339
3001 / tcp
-1399940268 | 2025-02-15T18:42:40.140969
3019 / tcp
-832380282 | 2025-01-31T08:16:26.558863
3021 / tcp
165188539 | 2025-01-30T08:19:03.793185
3022 / tcp
1278527606 | 2025-01-28T20:29:01.011350
3050 / tcp
-2031152423 | 2025-02-02T14:14:55.247083
3056 / tcp
-2107996212 | 2025-02-13T22:36:27.601596
3062 / tcp
1623746877 | 2025-02-16T14:14:10.007951
3068 / tcp
1911457608 | 2025-01-23T17:17:12.527266
3075 / tcp
1991883981 | 2025-02-16T20:49:53.435067
3080 / tcp
1623746877 | 2025-02-02T22:11:00.447593
3092 / tcp
-1399940268 | 2025-02-01T21:01:44.106071
3110 / tcp
-1399940268 | 2025-02-06T05:20:38.452615
3112 / tcp
-1327660293 | 2025-01-30T18:29:24.338847
3117 / tcp
117101543 | 2025-02-13T13:04:59.946136
3123 / tcp
-1399940268 | 2025-02-04T22:43:46.056136
3136 / tcp
1948301213 | 2025-02-09T07:05:57.531920
3147 / tcp
-1399940268 | 2025-02-15T17:37:32.735720
3148 / tcp
-1730858130 | 2025-02-16T12:39:00.214834
3149 / tcp
819727972 | 2025-02-08T22:48:22.700172
3165 / tcp
-1399940268 | 2025-01-28T23:20:53.248700
3167 / tcp
-2089734047 | 2025-01-20T03:07:18.241755
3176 / tcp
-407828767 | 2025-02-05T03:19:40.804146
3186 / tcp
1911457608 | 2025-02-03T23:19:25.471449
3193 / tcp
-1399940268 | 2025-01-30T23:25:53.268258
3197 / tcp
-1399940268 | 2025-02-02T05:10:59.680934
3268 / tcp
921482974 | 2025-02-08T17:38:05.026799
3299 / tcp
1842524259 | 2025-02-05T04:13:35.411021
3306 / tcp
369808347 | 2025-02-14T10:45:59.691391
3310 / tcp
1623746877 | 2025-02-11T00:52:29.338181
3341 / tcp
1762042191 | 2025-02-14T16:30:00.866865
3388 / tcp
320677201 | 2025-02-07T04:21:52.818709
3390 / tcp
1282941221 | 2025-02-17T02:54:48.935290
3403 / tcp
-980525298 | 2025-02-15T12:26:58.815342
3498 / tcp
-2089734047 | 2025-01-23T09:37:44.924826
3510 / tcp
-1399940268 | 2025-02-01T18:53:17.823787
3551 / tcp
198844676 | 2025-01-26T16:41:12.992955
3556 / tcp
1911457608 | 2025-02-09T14:57:38.250446
3559 / tcp
1911457608 | 2025-02-15T20:58:14.655794
3562 / tcp
-2031152423 | 2025-01-23T09:24:53.686534
3780 / tcp
2087396567 | 2025-02-07T04:45:46.112765
3910 / tcp
1911457608 | 2025-02-03T20:17:15.872619
4000 / tcp
1170207731 | 2025-02-05T05:14:00.420596
4001 / tcp
-1045760528 | 2025-01-30T09:16:00.554550
4022 / tcp
-1399940268 | 2025-02-16T11:49:48.479379
4063 / tcp
897328069 | 2025-02-14T08:36:26.276913
4064 / tcp
165188539 | 2025-02-01T08:45:13.157303
4101 / tcp
1830187220 | 2025-02-01T10:18:31.374269
4147 / tcp
1911457608 | 2025-02-17T07:10:40.588216
4150 / tcp
1911457608 | 2025-02-15T02:25:04.744468
4157 / tcp
-527005584 | 2025-01-31T08:12:14.960985
4165 / tcp
-1476017887 | 2025-02-06T06:44:04.177273
4242 / tcp
-1879056922 | 2025-02-05T15:40:21.401265
4250 / tcp
-1839934832 | 2025-02-04T05:21:38.140272
4282 / tcp
-784071826 | 2025-02-17T04:25:24.939415
4321 / tcp
-1250504565 | 2025-01-28T22:35:36.592406
4369 / tcp
819727972 | 2025-02-16T17:37:28.570705
4431 / tcp
165188539 | 2025-01-23T10:47:34.285519
4433 / tcp
-971970408 | 2025-02-06T14:16:44.791832
4434 / tcp
-1059554316 | 2025-02-17T09:42:51.134529
4436 / tcp
1011407350 | 2025-01-24T09:11:45.340554
4443 / tcp
285437346 | 2025-02-01T06:46:39.078135
4444 / tcp
-321444299 | 2025-02-15T01:53:28.587463
4445 / tcp
-2107996212 | 2025-02-17T20:33:21.061974
4506 / tcp
820958131 | 2025-01-21T14:14:27.347825
4602 / tcp
-1059554316 | 2025-01-26T16:30:01.765767
4747 / tcp
921225407 | 2025-01-24T14:04:15.625801
4786 / tcp
-784071826 | 2025-02-09T00:20:39.221065
4840 / tcp
119860953 | 2025-02-13T11:34:58.994206
4899 / tcp
819727972 | 2025-02-01T23:55:31.386170
4911 / tcp
-2017887953 | 2025-01-21T06:11:43.372422
4949 / tcp
799468586 | 2025-02-11T17:34:32.204831
5007 / tcp
165188539 | 2025-02-03T21:16:10.120806
5009 / tcp
567505242 | 2025-01-19T11:01:54.807851
5025 / tcp
1921398876 | 2025-02-15T06:48:16.047402
5061 / tcp
-1730858130 | 2025-01-24T18:34:12.511393
5190 / tcp
-1056270173 | 2025-01-21T08:17:37.304485
5201 / tcp
-1375131644 | 2025-02-17T13:07:17.962087
5222 / tcp
585675468 | 2025-02-09T19:10:05.185034
5227 / tcp
1911457608 | 2025-02-11T16:06:41.954446
5236 / tcp
-1399940268 | 2025-02-03T15:16:38.764386
5238 / tcp
819727972 | 2025-01-21T07:08:58.559469
5247 / tcp
1911457608 | 2025-02-08T21:38:19.284581
5248 / tcp
632542934 | 2025-02-15T16:42:29.877124
5259 / tcp
165188539 | 2025-01-24T20:11:16.067316
5266 / tcp
51259122 | 2025-02-07T08:18:08.212885
5269 / tcp
1462885993 | 2025-02-08T19:51:17.354793
5432 / tcp
-904840257 | 2025-02-15T02:37:53.622338
5439 / tcp
-1399940268 | 2025-01-19T20:29:48.489293
5500 / tcp
1023953321 | 2025-01-29T18:12:08.890541
5555 / tcp
2106853541 | 2025-02-14T22:04:34.281365
5569 / tcp
165188539 | 2025-01-24T16:31:21.411992
5592 / tcp
921225407 | 2025-01-28T23:05:45.981786
5597 / tcp
-1399940268 | 2025-02-05T17:19:30.353910
5599 / tcp
-1373613804 | 2025-02-13T12:18:53.382941
5804 / tcp
1212285915 | 2025-01-20T20:52:31.797329
5910 / tcp
-1056270173 | 2025-02-15T21:11:21.843433
5938 / tcp
-2089734047 | 2025-02-12T10:54:59.305120
5984 / tcp
1999272906 | 2025-02-06T19:53:18.055403
6000 / tcp
-1487943323 | 2025-02-11T23:35:39.357643
6001 / tcp
819727972 | 2025-01-31T18:25:51.635017
6002 / tcp
962700458 | 2025-02-01T16:29:48.309105
6036 / tcp
-1399940268 | 2025-02-05T15:50:19.817774
6352 / tcp
-1428621233 | 2025-02-01T23:51:13.826736
6405 / tcp
-1327660293 | 2025-01-22T11:47:10.991339
6488 / tcp
-1399940268 | 2025-02-14T17:53:19.521468
6512 / tcp
-1248408558 | 2025-02-04T22:06:21.305035
6560 / tcp
1278527606 | 2025-01-23T19:08:41.773880
6580 / tcp
-1056270173 | 2025-01-29T12:19:45.275581
6602 / tcp
-792826324 | 2025-02-10T11:09:11.385866
6633 / tcp
-1399940268 | 2025-01-27T21:39:43.525387
6653 / tcp
819727972 | 2025-02-02T16:47:10.814794
6667 / tcp
539065883 | 2025-02-10T03:51:13.551376
6668 / tcp
-1105333987 | 2025-02-03T17:22:54.986487
7001 / tcp
1265582946 | 2025-02-02T06:09:13.899322
7018 / tcp
-1996280214 | 2025-01-28T03:28:23.089280
7071 / tcp
819727972 | 2025-02-05T23:20:26.169054
7078 / tcp
-1399940268 | 2025-01-29T04:27:42.823848
7079 / tcp
1911457608 | 2025-02-02T03:15:44.771811
7088 / tcp
-303199180 | 2025-01-31T01:55:26.191982
7171 / tcp
1332894250 | 2025-02-14T09:32:41.914498
7218 / tcp
-1280833795 | 2025-02-14T10:49:21.155440
7415 / tcp
-1032713145 | 2025-02-05T10:48:32.678836
7434 / tcp
-142686627 | 2025-02-08T07:16:39.955753
7441 / tcp
-2017887953 | 2025-01-26T14:11:34.600171
7443 / tcp
-584993230 | 2025-01-26T18:06:39.720133
7548 / tcp
-1311598826 | 2025-02-14T04:38:49.476240
7634 / tcp
819727972 | 2025-02-03T22:57:34.861043
7654 / tcp
-2089734047 | 2025-02-03T21:42:02.312304
7687 / tcp
1726594447 | 2025-02-08T06:27:15.300772
7771 / tcp
-904840257 | 2025-02-16T07:14:11.670701
7979 / tcp
-297128567 | 2025-02-10T19:46:29.405554
7998 / tcp
-2089734047 | 2025-01-27T05:45:56.697597
8021 / tcp
-1816125480 | 2025-01-25T16:16:05.312334
8024 / tcp
-992671574 | 2025-01-24T10:58:11.413252
8031 / tcp
-2102434810 | 2025-02-03T05:57:37.352840
8038 / tcp
1426971893 | 2025-01-31T00:59:19.917185
8040 / tcp
1223115691 | 2025-02-09T05:35:38.150524
8044 / tcp
-1013082686 | 2025-02-08T08:02:28.151983
8051 / tcp
1991883981 | 2025-02-02T04:52:57.544394
8055 / tcp
709622286 | 2025-02-02T17:57:26.911443
8059 / tcp
-1399940268 | 2025-01-25T22:52:33.676212
8071 / tcp
1363464823 | 2025-02-02T09:02:32.933075
8081 / tcp
1842524259 | 2025-02-13T07:14:21.372297
8085 / tcp
2087396567 | 2025-02-18T00:46:17.355266
8089 / tcp
599074451 | 2025-02-13T18:01:11.754612
8094 / tcp
-1730858130 | 2025-01-25T06:16:47.370886
8099 / tcp
648174097 | 2025-02-07T20:51:49.599739
8107 / tcp
-180163620 | 2025-01-20T12:54:03.512984
8109 / tcp
632542934 | 2025-01-26T01:34:12.701659
8119 / tcp
1911457608 | 2025-01-25T19:14:50.796824
8124 / tcp
-1019343788 | 2025-01-27T17:00:26.074658
8126 / tcp
-971970408 | 2025-02-10T17:44:43.626305
8127 / tcp
366084633 | 2025-02-18T06:35:39.070735
8136 / tcp
-2089734047 | 2025-01-25T05:59:05.221107
8137 / tcp
-2089734047 | 2025-01-24T16:19:16.618866
8139 / tcp
171352214 | 2025-02-05T13:12:32.531306
8140 / tcp
1842524259 | 2025-01-23T06:53:52.216934
8145 / tcp
1504401647 | 2025-01-23T08:45:16.319027
8147 / tcp
-1399940268 | 2025-02-10T20:01:03.202786
8149 / tcp
1911457608 | 2025-02-03T16:07:37.636340
8162 / tcp
-445721795 | 2025-02-11T16:19:37.062695
8164 / tcp
-2096652808 | 2025-01-26T04:25:40.582188
8173 / tcp
1911457608 | 2025-01-30T12:43:13.288882
8184 / tcp
921225407 | 2025-01-28T14:25:26.809584
8200 / tcp
556442608 | 2025-02-01T06:24:21.710011
8203 / tcp
1911457608 | 2025-02-09T01:07:36.605436
8283 / tcp
-1795027372 | 2025-02-12T09:48:10.543081
8291 / tcp
819727972 | 2025-02-05T19:38:46.839982
8300 / tcp
-734440417 | 2025-01-27T10:55:22.447032
8442 / tcp
-1329831334 | 2025-02-13T15:34:58.325177
8456 / tcp
-1399940268 | 2025-02-02T05:58:51.304667
8459 / tcp
-1888448627 | 2025-02-15T23:00:46.180739
8460 / tcp
1911457608 | 2025-02-02T12:26:45.806200
8462 / tcp
-1399940268 | 2025-02-06T21:09:32.457069
8484 / tcp
-2089734047 | 2025-02-16T06:25:04.726061
8488 / tcp
1991883981 | 2025-02-07T17:51:58.771395
8500 / tcp
-684625978 | 2025-02-17T19:33:48.442152
8513 / tcp
-1327660293 | 2025-01-30T06:04:58.931580
8532 / tcp
-1538260461 | 2025-02-15T19:46:37.201846
8544 / tcp
-1476017887 | 2025-01-21T10:57:19.131359
8550 / tcp
1761482307 | 2025-02-13T19:41:14.663381
8554 / tcp
171352214 | 2025-01-26T13:01:51.473268
8556 / tcp
819727972 | 2025-02-04T23:15:08.837546
8565 / tcp
632542934 | 2025-02-04T09:09:45.757825
8575 / tcp
1308377066 | 2025-01-24T18:41:16.208989
8576 / tcp
819727972 | 2025-01-25T07:18:32.304003
8649 / tcp
842535728 | 2025-01-27T01:43:57.544837
8702 / tcp
1911457608 | 2025-02-01T06:48:14.544004
8728 / tcp
-345718689 | 2025-02-04T21:23:11.125379
8731 / tcp
-1730858130 | 2025-02-16T12:52:36.082170
8764 / tcp
-1399940268 | 2025-02-10T02:52:17.427715
8784 / tcp
1911457608 | 2025-02-05T04:00:05.436103
8815 / tcp
2063598737 | 2025-02-04T11:01:03.839112
8816 / tcp
-1399940268 | 2025-01-24T15:57:29.714489
8817 / tcp
-1399940268 | 2025-02-03T19:20:49.403068
8820 / tcp
669849225 | 2025-01-27T13:27:13.706888
8828 / tcp
-1428621233 | 2025-01-21T07:50:21.237580
8833 / tcp
-1399940268 | 2025-02-11T22:13:37.349013
8834 / tcp
2087396567 | 2025-01-24T13:31:30.864469
8856 / tcp
580340387 | 2025-02-13T19:47:11.208006
8869 / tcp
-1839934832 | 2025-01-25T07:17:06.781779
8870 / tcp
-1839934832 | 2025-01-25T23:06:10.251878
8881 / tcp
-339084706 | 2025-01-22T20:22:22.762386
8883 / tcp
820958131 | 2025-02-14T09:25:48.168068
8900 / tcp
-1399940268 | 2025-02-03T22:15:05.173267
8902 / tcp
1282941221 | 2025-02-15T19:57:39.293101
8907 / tcp
-1032713145 | 2025-02-03T21:53:34.166876
8943 / tcp
599074451 | 2025-02-09T17:35:37.927051
9001 / tcp
-1026951088 | 2025-02-06T08:06:39.254615
9002 / tcp
-971970408 | 2025-02-15T20:41:39.001813
9031 / tcp
-653033013 | 2025-01-23T22:17:26.227182
9036 / tcp
-1399940268 | 2025-01-23T13:28:05.487797
9045 / tcp
-1730858130 | 2025-01-19T18:27:51.348720
9049 / tcp
1911457608 | 2025-01-20T12:44:31.223340
9051 / tcp
1690634669 | 2025-02-01T07:46:52.026045
9062 / tcp
-1399940268 | 2025-01-20T05:21:12.225531
9073 / tcp
693973426 | 2025-02-03T08:48:17.826423
9082 / tcp
-407828767 | 2025-02-18T03:36:34.313737
9083 / tcp
-2089734047 | 2025-02-08T21:28:23.174716
9091 / tcp
-971970408 | 2025-01-29T02:31:24.857581
9092 / tcp
-904840257 | 2025-02-05T10:21:33.448807
9094 / tcp
-1327660293 | 2025-02-08T05:33:14.262694
9100 / tcp
-2107996212 | 2025-02-10T01:11:53.114343
9102 / tcp
1308377066 | 2025-02-08T20:49:00.895756
9119 / tcp
1991883981 | 2025-02-02T03:57:14.979928
9125 / tcp
-1888448627 | 2025-02-18T07:40:23.035164
9146 / tcp
-1399940268 | 2025-01-26T05:41:42.754435
9151 / tcp
104385780 | 2025-02-09T09:38:37.504144
9154 / tcp
-1045760528 | 2025-02-08T20:57:07.561511
9160 / tcp
-1140468363 | 2025-01-31T03:52:25.305695
9172 / tcp
-2089734047 | 2025-01-28T06:29:17.425984
9183 / tcp
-904840257 | 2025-02-06T13:24:11.227764
9210 / tcp
-375604792 | 2025-01-31T17:15:59.920037
9219 / tcp
1543809371 | 2025-01-30T22:39:45.470703
9242 / tcp
-1059554316 | 2025-01-22T11:34:04.221218
9244 / tcp
819727972 | 2025-01-22T13:26:15.218414
9257 / tcp
-1428621233 | 2025-01-30T19:10:44.616930
9292 / tcp
1077013874 | 2025-01-30T18:23:31.040032
9299 / tcp
1975288991 | 2025-02-18T00:45:45.557741
9301 / tcp
-2031152423 | 2025-01-28T17:59:27.856949
9306 / tcp
1911457608 | 2025-02-05T21:13:09.498829
9333 / tcp
-1399940268 | 2025-02-13T20:09:02.016390
9376 / tcp
165188539 | 2025-01-26T08:03:12.718113
9398 / tcp
-68075478 | 2025-02-08T00:28:54.169508
9418 / tcp
1529351907 | 2025-02-15T03:29:50.880353
9433 / tcp
-1888448627 | 2025-01-29T03:54:05.639017
9443 / tcp
-1428621233 | 2025-02-16T00:01:27.791018
9455 / tcp
-1399940268 | 2025-02-01T14:21:22.516072
9530 / tcp
819727972 | 2025-02-04T03:11:50.678394
9600 / tcp
1208318993 | 2025-02-04T04:16:02.528439
9611 / tcp
819727972 | 2025-02-18T03:45:07.107531
9633 / tcp
-2017887953 | 2025-01-30T10:35:58.473783
9761 / tcp
-375604792 | 2025-02-17T12:37:27.168243
9765 / tcp
1911457608 | 2025-01-19T10:52:57.544131
9899 / tcp
709622286 | 2025-01-22T07:41:34.001387
9909 / tcp
1911457608 | 2025-01-20T11:31:06.873579
9943 / tcp
248249138 | 2025-02-03T08:06:06.442098
9950 / tcp
-2096652808 | 2025-01-30T11:24:12.396278
9999 / tcp
1161309183 | 2025-02-12T17:17:58.419314
10001 / tcp
1492413928 | 2025-02-06T21:57:51.458289
10003 / tcp
-2140303521 | 2025-01-24T10:36:21.529605
10005 / tcp
1830697416 | 2025-02-08T08:25:05.768791
10007 / tcp
1353260875 | 2025-01-25T02:33:16.103361
10009 / tcp
1191574520 | 2025-01-30T15:49:36.621215
10028 / tcp
632542934 | 2025-01-29T17:55:25.837496
10031 / tcp
89142341 | 2025-02-02T13:06:56.051111
10038 / tcp
1911457608 | 2025-02-11T09:42:09.468714
10042 / tcp
-1839934832 | 2025-01-20T17:51:29.352883
10082 / tcp
1683672699 | 2025-02-05T17:37:55.108282
10086 / tcp
-1428621233 | 2025-02-10T05:40:21.772694
10093 / tcp
-904840257 | 2025-02-02T09:15:39.052378
10134 / tcp
1911457608 | 2025-02-16T16:04:08.587774
10210 / tcp
-801484042 | 2025-02-14T17:26:25.353503
10250 / tcp
2087396567 | 2025-02-13T01:55:20.044858
10251 / tcp
-1399940268 | 2025-01-28T17:45:36.941945
10443 / tcp
0 | 2025-02-11T16:53:20.369918
10477 / tcp
722711397 | 2025-01-28T21:46:36.560389
10554 / tcp
550048729 | 2025-02-14T21:00:24.445833
10911 / tcp
-1375131644 | 2025-01-24T19:31:10.418977
10943 / tcp
-454087041 | 2025-02-01T01:37:44.773285
11000 / tcp
1948301213 | 2025-02-01T09:36:18.784574
11002 / tcp
165188539 | 2025-02-02T23:04:59.846808
11112 / tcp
-303199180 | 2025-01-30T05:53:52.619134
11184 / tcp
-585940771 | 2025-01-19T21:48:36.086320
11210 / tcp
819727972 | 2025-01-30T09:22:41.573105
11211 / tcp
-136006866 | 2025-01-29T16:04:56.105470
11288 / tcp
-1399940268 | 2025-02-05T19:35:29.016805
11300 / tcp
1011407350 | 2025-02-01T14:16:07.384002
12001 / tcp
1911457608 | 2025-01-21T17:34:19.575275
12101 / tcp
1911457608 | 2025-01-30T16:12:45.108321
12111 / tcp
-653033013 | 2025-02-16T05:22:38.516160
12112 / tcp
-2096652808 | 2025-02-17T04:49:14.564672
12114 / tcp
-303199180 | 2025-02-08T15:58:56.586212
12118 / tcp
1126993057 | 2025-01-19T19:45:02.916843
12124 / tcp
2103111368 | 2025-01-29T17:37:05.426824
12133 / tcp
165188539 | 2025-02-16T20:22:04.058998
12137 / tcp
2121220663 | 2025-02-13T22:36:24.017910
12138 / tcp
1308377066 | 2025-02-09T00:07:37.089864
12141 / tcp
-1713437100 | 2025-02-05T00:43:43.133829
12156 / tcp
1911457608 | 2025-02-07T17:38:16.055182
12169 / tcp
1208318993 | 2025-02-01T09:57:52.093402
12175 / tcp
819727972 | 2025-01-19T12:20:00.603922
12180 / tcp
1919228981 | 2025-02-10T17:35:10.045000
12183 / tcp
-1399940268 | 2025-02-03T22:20:15.380534
12195 / tcp
-1045760528 | 2025-02-05T21:21:11.261746
12200 / tcp
819727972 | 2025-01-27T18:45:51.938508
12212 / tcp
-1611764932 | 2025-01-29T12:04:37.133644
12264 / tcp
-2046514463 | 2025-01-28T06:20:32.935499
12275 / tcp
819727972 | 2025-01-29T16:54:13.113906
12276 / tcp
819727972 | 2025-01-20T21:51:28.864567
12285 / tcp
-1105333987 | 2025-02-16T17:40:21.181214
12294 / tcp
-1839934832 | 2025-01-30T12:50:24.825804
12304 / tcp
819727972 | 2025-01-29T18:49:30.053251
12308 / tcp
-1810987450 | 2025-02-17T15:35:39.452965
12324 / tcp
1975288991 | 2025-01-30T00:58:58.235518
12333 / tcp
-1399940268 | 2025-02-13T03:55:43.592820
12335 / tcp
-1476017887 | 2025-02-06T23:34:10.947585
12344 / tcp
103159425 | 2025-02-17T12:45:35.040238
12345 / tcp
488204803 | 2025-01-31T20:20:24.908119
12348 / tcp
-1399940268 | 2025-01-30T20:11:54.315568
12349 / tcp
-1399940268 | 2025-02-05T22:21:35.490915
12350 / tcp
-1105333987 | 2025-01-21T03:25:36.508080
12364 / tcp
632542934 | 2025-02-16T20:27:17.755002
12366 / tcp
2063598737 | 2025-02-14T03:56:19.749020
12373 / tcp
165188539 | 2025-02-04T19:41:30.359994
12374 / tcp
2098371729 | 2025-02-05T07:13:00.264109
12390 / tcp
-1737707071 | 2025-01-26T09:07:25.920041
12404 / tcp
819727972 | 2025-01-25T15:39:56.436178
12415 / tcp
-1399940268 | 2025-01-29T07:02:31.739273
12419 / tcp
1989907056 | 2025-01-31T16:12:10.329621
12441 / tcp
1543809371 | 2025-02-06T05:27:44.858887
12460 / tcp
15018106 | 2025-02-07T14:29:53.329171
12479 / tcp
897328069 | 2025-02-02T01:01:01.106656
12485 / tcp
921225407 | 2025-02-08T10:29:41.427473
12489 / tcp
-1399940268 | 2025-01-27T20:20:15.891882
12496 / tcp
-1097188123 | 2025-01-27T02:04:45.982038
12508 / tcp
51259122 | 2025-01-22T17:36:09.978693
12515 / tcp
-146605374 | 2025-01-23T20:31:58.206548
12519 / tcp
819727972 | 2025-01-29T09:18:30.047008
12520 / tcp
1208318993 | 2025-02-08T22:35:40.928420
12535 / tcp
1911457608 | 2025-01-25T18:00:26.346529
12567 / tcp
165188539 | 2025-02-15T12:16:00.557099
12585 / tcp
-1399940268 | 2025-02-09T20:24:18.504176
12590 / tcp
819727972 | 2025-01-21T19:27:33.497800
13082 / tcp
-1399940268 | 2025-01-28T10:21:13.331278
14082 / tcp
819727972 | 2025-01-30T17:29:28.987836
14084 / tcp
408230060 | 2025-02-03T19:37:07.633321
14101 / tcp
-1013082686 | 2025-02-01T18:54:15.547448
14265 / tcp
-1399940268 | 2025-01-23T08:16:52.246867
14344 / tcp
-358801646 | 2025-02-07T08:18:19.114348
14403 / tcp
1282941221 | 2025-02-08T15:44:28.053763
14895 / tcp
-1230049476 | 2025-01-21T01:48:19.166780
14901 / tcp
819727972 | 2025-01-24T06:54:39.890768
15000 / tcp
-942457744 | 2025-02-03T21:49:54.144028
15006 / tcp
-1189269828 | 2025-02-07T21:25:33.736592
16010 / tcp
0 | 2025-01-31T13:48:34.923124
16011 / tcp
1208318993 | 2025-01-27T04:35:54.142076
16020 / tcp
1059192566 | 2025-01-21T19:53:03.005630
16032 / tcp
819727972 | 2025-01-29T06:08:17.658955
16049 / tcp
-1399940268 | 2025-02-07T20:48:34.281339
16053 / tcp
-358801646 | 2025-02-13T22:15:59.762892
16056 / tcp
-1399940268 | 2025-02-04T01:29:37.926602
16064 / tcp
1767345577 | 2025-02-07T18:34:03.375229
16072 / tcp
-1399940268 | 2025-02-02T16:12:09.817770
16084 / tcp
1911457608 | 2025-01-25T23:53:59.212990
16097 / tcp
632542934 | 2025-02-06T19:51:02.552449
16667 / tcp
-1888448627 | 2025-01-19T16:28:57.927845
16993 / tcp
-1261090339 | 2025-01-26T09:00:00.664239
17777 / tcp
819727972 | 2025-02-05T05:49:18.906156
18004 / tcp
-1399940268 | 2025-02-11T06:31:08.149921
18005 / tcp
597764502 | 2025-02-07T10:58:41.232556
18006 / tcp
819727972 | 2025-02-15T11:21:28.435173
18051 / tcp
-1888448627 | 2025-01-19T16:51:48.728371
18053 / tcp
-2046514463 | 2025-02-08T20:24:06.547892
18061 / tcp
1282941221 | 2025-02-17T20:52:24.923878
18065 / tcp
819727972 | 2025-01-19T12:22:16.247313
18068 / tcp
165188539 | 2025-02-01T16:13:30.363743
18073 / tcp
-1899074860 | 2025-02-03T11:12:38.547029
18086 / tcp
632542934 | 2025-01-20T17:55:32.838460
18098 / tcp
1911457608 | 2025-02-08T04:19:06.088466
18102 / tcp
-1730858130 | 2025-02-06T23:24:40.505579
18109 / tcp
1363464823 | 2025-01-29T13:20:27.506046
18182 / tcp
677934968 | 2025-02-16T04:08:21.210261
18245 / tcp
-1888448627 | 2025-02-08T01:45:03.819869
20000 / tcp
1900503736 | 2025-02-05T22:21:47.254930
20090 / tcp
921225407 | 2025-01-27T23:17:39.158612
20200 / tcp
-1810987450 | 2025-02-08T17:55:48.984104
20256 / tcp
-1996280214 | 2025-02-01T05:20:52.377879
20443 / tcp
921225407 | 2025-02-11T20:31:42.357574
20547 / tcp
819727972 | 2025-02-12T16:24:22.544235
20880 / tcp
1370263973 | 2025-02-09T05:25:32.664150
21001 / tcp
1363464823 | 2025-01-30T09:51:50.293275
21083 / tcp
-303199180 | 2025-02-02T13:07:47.873195
21250 / tcp
819727972 | 2025-02-07T08:35:40.345233
21255 / tcp
-2089734047 | 2025-01-28T19:08:11.690535
21269 / tcp
1363464823 | 2025-01-22T10:09:31.192273
21281 / tcp
-1399940268 | 2025-02-07T10:07:50.207493
21301 / tcp
1059192566 | 2025-01-27T22:37:54.775884
21310 / tcp
1632932802 | 2025-01-23T23:17:37.450199
21379 / tcp
1991883981 | 2025-02-14T14:58:42.558286
23023 / tcp
-842670865 | 2025-02-03T19:35:07.989676
24084 / tcp
15018106 | 2025-01-30T09:32:06.710358
24181 / tcp
1126993057 | 2025-02-04T19:21:20.854260
24442 / tcp
2103111368 | 2025-01-23T20:41:39.450052
25001 / tcp
1126993057 | 2025-02-17T07:02:12.686885
25007 / tcp
819727972 | 2025-01-31T17:57:28.142987
25009 / tcp
165188539 | 2025-02-11T20:23:07.127174
25565 / tcp
-1399940268 | 2025-02-03T19:12:42.640187
27015 / tcp
-2017887953 | 2025-01-22T12:53:13.298564
27017 / tcp
1763259671 | 2025-01-22T17:03:51.114529
28015 / tcp
-2089734047 | 2025-02-07T05:56:17.493213
28080 / tcp
-1399940268 | 2025-01-31T19:28:03.007864
29799 / tcp
1077013874 | 2025-01-25T23:06:12.088896
30001 / tcp
-1699556818 | 2025-01-30T00:03:53.022644
30002 / tcp
819727972 | 2025-01-26T15:50:21.763161
30007 / tcp
1189133115 | 2025-01-19T15:01:43.673979
30029 / tcp
-653033013 | 2025-02-15T00:18:05.324993
30113 / tcp
1623746877 | 2025-02-17T05:07:43.633851
30443 / tcp
-136006866 | 2025-02-03T06:35:59.106463
31337 / tcp
-786044033 | 2025-02-09T18:16:19.651050
32202 / tcp
1492413928 | 2025-01-21T00:23:33.151463
32222 / tcp
-1611764932 | 2025-02-07T13:09:42.682933
32822 / tcp
819727972 | 2025-02-07T16:38:44.968986
33022 / tcp
2087396567 | 2025-02-07T15:14:03.143385
33060 / tcp
-971970408 | 2025-02-13T14:00:36.126984
33122 / tcp
2143387245 | 2025-02-07T08:18:53.597965
33422 / tcp
-2096652808 | 2025-02-06T23:30:07.677709
33622 / tcp
1741579575 | 2025-02-07T01:12:35.626657
33722 / tcp
1690634669 | 2025-02-06T21:39:27.439126
33822 / tcp
-2080784861 | 2025-02-06T19:55:20.673136
33922 / tcp
-1681927087 | 2025-02-06T07:47:25.300435
34222 / tcp
2087396567 | 2025-02-06T16:46:35.009621
34422 / tcp
-1648456501 | 2025-02-06T09:38:18.428424
34522 / tcp
2087396567 | 2025-02-05T21:25:37.925283
34922 / tcp
-971970408 | 2025-02-06T00:48:05.943920
35000 / tcp
-616720387 | 2025-02-17T19:21:30.206037
35022 / tcp
-1036370807 | 2025-02-06T05:23:07.732616
35222 / tcp
89282912 | 2025-02-05T19:36:57.107454
35722 / tcp
-407828767 | 2025-02-05T05:26:08.958030
36022 / tcp
2087396567 | 2025-02-05T03:39:27.207151
36122 / tcp
1741579575 | 2025-02-04T16:58:32.882673
36322 / tcp
-1139539254 | 2025-02-04T20:33:56.502184
36622 / tcp
1842524259 | 2025-02-04T18:46:13.898547
36722 / tcp
-971970408 | 2025-02-04T13:24:00.863070
36822 / tcp
-1032713145 | 2025-02-04T15:11:18.192942
37122 / tcp
-1136600457 | 2025-02-04T11:37:58.768157
37422 / tcp
2087396567 | 2025-02-03T19:44:26.134454
37522 / tcp
-746114901 | 2025-02-04T03:30:51.411830
37722 / tcp
1282941221 | 2025-02-03T21:30:57.550291
37777 / tcp
819727972 | 2025-02-01T03:09:39.011143
38022 / tcp
-358801646 | 2025-02-03T16:10:59.342591
38222 / tcp
-1990350878 | 2025-02-03T11:16:10.577629
39022 / tcp
-1626979812 | 2025-02-02T23:18:52.688516
39322 / tcp
-971970408 | 2025-02-02T15:26:47.969500
39722 / tcp
-971970408 | 2025-02-02T11:55:54.624297
39822 / tcp
897328069 | 2025-02-18T08:55:19.002376
40099 / tcp
819727972 | 2025-01-30T01:02:14.630448
40122 / tcp
1948301213 | 2025-02-01T11:05:42.871037
40222 / tcp
996960436 | 2025-02-10T16:14:45.196662
40322 / tcp
-971970408 | 2025-02-17T06:20:31.343550
40422 / tcp
-1428621233 | 2025-02-01T20:02:16.743027
40522 / tcp
-971970408 | 2025-02-01T18:04:40.210010
40622 / tcp
1690634669 | 2025-02-17T01:01:32.378754
40822 / tcp
474736340 | 2025-02-16T19:48:34.924546
40922 / tcp
-445721795 | 2025-02-01T12:50:24.787569
41022 / tcp
1741579575 | 2025-02-17T04:52:48.812567
41122 / tcp
-79865617 | 2025-02-01T07:37:44.902291
41522 / tcp
819727972 | 2025-01-31T20:54:24.718036
41622 / tcp
-616720387 | 2025-02-15T17:27:52.857678
41722 / tcp
660175493 | 2025-01-31T19:10:04.334132
41822 / tcp
-971970408 | 2025-02-15T09:01:04.958559
41922 / tcp
1741579575 | 2025-01-31T17:20:18.526145
42122 / tcp
2087396567 | 2025-02-08T22:08:07.607123
42208 / tcp
1059192566 | 2025-01-19T19:34:15.417412
42222 / tcp
-79865617 | 2025-02-15T17:36:18.573602
42420 / tcp
-345718689 | 2025-02-13T15:51:47.047043
42422 / tcp
2087396567 | 2025-02-15T14:16:17.938315
42443 / tcp
-2089734047 | 2025-02-09T18:05:57.743099
42522 / tcp
2087396567 | 2025-02-14T18:43:21.552240
42722 / tcp
660175493 | 2025-01-31T05:23:49.488692
42922 / tcp
2087396567 | 2025-01-31T01:39:09.578791
43221 / tcp
-358801646 | 2025-02-13T19:15:36.714321
43322 / tcp
1887224352 | 2025-01-29T20:50:58.766203
43522 / tcp
539065883 | 2025-01-30T17:23:27.051002
43722 / tcp
-2017887953 | 2025-01-30T10:34:15.354869
44022 / tcp
-971970408 | 2025-01-29T23:40:53.090351
44158 / tcp
2054287019 | 2025-02-13T19:26:51.991261
44304 / tcp
-1399940268 | 2025-01-22T19:23:26.975071
44309 / tcp
117101543 | 2025-02-04T10:44:24.875097
44322 / tcp
660175493 | 2025-01-29T00:43:31.753668
44337 / tcp
-891714208 | 2025-02-04T04:13:44.116850
44340 / tcp
-1839934832 | 2025-01-21T05:24:08.147266
44522 / tcp
-1729629024 | 2025-02-14T01:12:37.616794
44622 / tcp
-971970408 | 2025-02-13T19:32:52.395105
44822 / tcp
-1428621233 | 2025-01-28T15:40:30.034554
44922 / tcp
546151771 | 2025-01-29T12:51:14.853302
45002 / tcp
-1888448627 | 2025-01-25T13:15:52.850284
45039 / tcp
671605376 | 2025-02-17T15:56:04.907916
45222 / tcp
-801484042 | 2025-01-29T04:29:46.047636
45322 / tcp
-1476017887 | 2025-01-29T06:07:05.227631
45522 / tcp
422524323 | 2025-01-28T23:13:46.728162
45622 / tcp
2087396567 | 2025-01-28T18:05:12.394246
45666 / tcp
51259122 | 2025-01-28T02:51:02.890365
45722 / tcp
1741579575 | 2025-01-28T19:18:00.651191
45922 / tcp
2087396567 | 2025-01-27T21:31:14.437162
46022 / tcp
-445721795 | 2025-01-28T12:26:07.970059
46422 / tcp
-1316491703 | 2025-02-08T20:03:56.400715
46622 / tcp
-1026951088 | 2025-01-27T23:21:19.083715
46722 / tcp
819727972 | 2025-02-08T13:54:16.250916
46822 / tcp
2087396567 | 2025-02-09T22:43:35.478472
47022 / tcp
-1013082686 | 2025-01-27T10:46:50.462236
47122 / tcp
2087396567 | 2025-02-09T13:34:34.768211
47622 / tcp
1426971893 | 2025-01-27T07:52:36.946284
47722 / tcp
1308377066 | 2025-01-26T23:52:38.243829
47822 / tcp
60948681 | 2025-01-27T05:13:47.636591
47990 / tcp
422524323 | 2025-02-07T05:37:47.822077
48001 / tcp
-1139539254 | 2025-01-30T15:57:57.226789
48012 / tcp
-1986594217 | 2025-01-31T10:22:17.931928
48022 / tcp
-146605374 | 2025-01-26T16:34:25.955669
48322 / tcp
2087396567 | 2025-01-26T20:22:36.231923
48422 / tcp
-2096652808 | 2025-01-26T18:24:12.693645
48722 / tcp
-971970408 | 2025-01-26T11:20:21.884124
48889 / tcp
-784071826 | 2025-02-04T20:16:27.169136
48922 / tcp
1282941221 | 2025-01-25T17:10:46.609661
49022 / tcp
740837454 | 2025-01-26T07:41:30.865223
49121 / tcp
-1399940268 | 2025-02-10T19:53:34.817497
49200 / tcp
-2089734047 | 2025-01-29T09:18:28.776653
49222 / tcp
-1733645023 | 2025-01-26T05:52:40.513245
49322 / tcp
2087396567 | 2025-01-26T02:13:19.991591
49443 / tcp
-1399940268 | 2025-01-24T22:32:48.154654
49522 / tcp
1642597142 | 2025-01-26T00:36:06.872643
49622 / tcp
1741579575 | 2025-02-09T01:32:21.635910
49694 / tcp
321971019 | 2025-02-07T18:19:00.554587
49722 / tcp
-2081419599 | 2025-02-08T16:50:30.105582
49822 / tcp
539065883 | 2025-02-09T12:07:27.662486
49922 / tcp
1282941221 | 2025-02-07T21:37:44.574751
50000 / tcp
-375604792 | 2025-02-14T13:53:12.000780
50003 / tcp
-146605374 | 2025-01-20T04:19:07.886407
50008 / tcp
-1453516345 | 2025-02-09T06:42:12.439510
50022 / tcp
819727972 | 2025-02-15T03:58:40.325422
50085 / tcp
921225407 | 2025-01-29T06:48:49.521950
50100 / tcp
1231376952 | 2025-02-15T06:09:28.681043
50122 / tcp
-345718689 | 2025-02-09T18:53:45.205961
50222 / tcp
-971970408 | 2025-01-25T08:03:47.489372
50322 / tcp
1308377066 | 2025-02-08T11:31:12.008737
50422 / tcp
-321444299 | 2025-01-25T02:17:40.243473
50922 / tcp
671605376 | 2025-01-24T17:05:07.280288
51002 / tcp
380146262 | 2025-02-10T18:18:02.236512
51003 / tcp
-1428621233 | 2025-01-23T08:19:18.633000
51022 / tcp
171352214 | 2025-02-08T04:39:57.633755
51122 / tcp
-1013082686 | 2025-02-08T07:56:37.183343
51200 / tcp
819727972 | 2025-02-09T18:15:52.818960
51235 / tcp
1519486042 | 2025-02-13T10:08:39.708463
51422 / tcp
2087396567 | 2025-01-24T02:34:20.297237
51434 / tcp
320677201 | 2025-02-13T17:23:41.537988
51522 / tcp
-454087041 | 2025-02-14T10:58:55.661239
51622 / tcp
-2107996212 | 2025-01-24T12:02:38.912462
51722 / tcp
-1559123399 | 2025-01-23T20:23:40.793261
51822 / tcp
707919486 | 2025-01-23T21:48:03.110612
52230 / tcp
-1795027372 | 2025-02-04T22:46:45.302455
52322 / tcp
117101543 | 2025-01-23T18:28:33.483874
52622 / tcp
-1839934832 | 2025-01-23T07:40:19.698250
52722 / tcp
2087396567 | 2025-01-23T03:56:30.177335
52822 / tcp
-1804465946 | 2025-01-23T06:15:19.697433
52922 / tcp
-358801646 | 2025-01-23T00:18:18.312364
53022 / tcp
957278843 | 2025-01-23T02:03:57.699522
53122 / tcp
1690634669 | 2025-01-22T22:22:57.933343
53222 / tcp
1282941221 | 2025-01-22T20:51:35.620962
53722 / tcp
-1733106930 | 2025-01-22T09:35:53.829399
54122 / tcp
1004056929 | 2025-01-22T07:45:22.794603
54138 / tcp
-1373613804 | 2025-01-30T11:03:20.002143
54222 / tcp
-971970408 | 2025-02-16T21:30:43.489706
54422 / tcp
1082732927 | 2025-01-21T18:49:35.517619
54522 / tcp
171352214 | 2025-01-21T20:33:17.808454
54857 / tcp
-1996280214 | 2025-01-30T07:19:37.742677
55000 / tcp
820958131 | 2025-02-17T02:01:45.461208
55388 / tcp
-288825733 | 2025-02-13T16:56:52.027343
55422 / tcp
842535728 | 2025-01-21T09:11:11.797863
55443 / tcp
1492413928 | 2025-01-21T19:06:14.145006
55490 / tcp
-904840257 | 2025-02-08T02:12:31.066515
55553 / tcp
-1453516345 | 2025-02-08T13:38:44.727052
55554 / tcp
1282941221 | 2025-02-05T04:52:16.001729
55722 / tcp
1741579575 | 2025-01-21T00:30:38.895869
55922 / tcp
104385780 | 2025-02-18T01:44:52.774545
56022 / tcp
841014058 | 2025-01-20T13:12:32.695854
56222 / tcp
819727972 | 2025-02-17T20:35:11.909609
56822 / tcp
-971970408 | 2025-01-20T07:22:22.563328
56922 / tcp
1286504516 | 2025-01-19T18:16:37.324666
57122 / tcp
-319440554 | 2025-01-20T00:06:11.127955
57222 / tcp
539065883 | 2025-02-16T09:15:41.594081
57779 / tcp
-653033013 | 2025-01-30T22:47:19.767840
57781 / tcp
-1327660293 | 2025-01-29T21:41:10.284825
57785 / tcp
-358801646 | 2025-02-08T15:33:58.727561
58022 / tcp
-1316491703 | 2025-02-16T04:00:22.379202
59622 / tcp
2087396567 | 2025-02-15T22:40:58.281710
59722 / tcp
819727972 | 2025-02-15T20:57:12.064324
59922 / tcp
539065883 | 2025-02-15T05:34:56.360687
60099 / tcp
1492413928 | 2025-02-04T13:05:37.742891
60129 / tcp
-438503381 | 2025-02-03T18:17:22.548863
61613 / tcp
-1375131644 | 2025-02-10T08:17:18.112023
61616 / tcp
1308377066 | 2025-02-16T22:34:17.559817
62078 / tcp
-1113435755 | 2025-02-05T16:20:27.191200
63210 / tcp
-21576419 | 2025-02-02T23:12:49.665020
63256 / tcp
-1681927087 | 2025-02-07T20:00:45.292317
63443 / tcp
165188539 | 2025-02-02T10:40:57.968240



Contact Us

Shodan ® - All rights reserved