8.141.244.5

Regular View Raw Data Timeline
Last Seen: 2025-03-24

GeneralInformation

Hostnames alibabacloud.co.in
alibabacloud.com
alibabacloud.com.au
alibabacloud.com.hk
alibabacloud.com.my
alibabacloud.com.sg
alibabacloud.com.tw
alicdn.com
alicloud.com
aliyun-iot-share.com
aliyun.com
manager.channel.aliyun.com
aliyuncs.com
asmlink.cn
scdnphi6.com
sparenode.com
supet.com
tburl.in
teambition.com
teambition.net
teambitionapis.com
account.www.net.cn
dc.www.net.cn
dmp.www.net.cn
dns.www.net.cn
panda.www.net.cn
pandavip.www.net.cn
whois.www.net.cn
Domains alibabacloud.co.in alibabacloud.com alibabacloud.com.au alibabacloud.com.hk alibabacloud.com.my alibabacloud.com.sg alibabacloud.com.tw alicdn.com alicloud.com aliyun-iot-share.com aliyun.com aliyuncs.com asmlink.cn scdnphi6.com sparenode.com supet.com tburl.in teambition.com teambition.net teambitionapis.com www.net.cn 
Cloud Provider Alibaba Cloud
Country China
City Beijing
Organization Aliyun Computing Co.LTD
ISP Hangzhou Alibaba Advertising Co.,Ltd.
ASN AS37963

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(1)
CVE-2025-26465
6.8A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
2024(1)
CVE-2024-6387
8.1A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
2023(4)
CVE-2023-51767
7.0OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385
6.5In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-48795
5.9The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-38408
9.8The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
2021(2)
CVE-2021-41617
7.0sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368
3.7An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
2020(2)
CVE-2020-15778
7.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145
5.9The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
2019(4)
CVE-2019-16905
7.8OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVE-2019-6111
5.9An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110
6.8In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109
6.8An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
2018(3)
CVE-2018-20685
5.3In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-15919
5.3Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473
5.3OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
2017(1)
CVE-2017-15906
5.3The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
2016(9)
CVE-2016-20012
5.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2016-10708
7.5sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
CVE-2016-10012
7.8The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
CVE-2016-10011
5.5authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
CVE-2016-10010
7.0sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
CVE-2016-10009
7.3Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
CVE-2016-3115
6.4Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
CVE-2016-1908
9.8The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
CVE-2016-0777
6.5The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
2015(4)
CVE-2015-6564
6.9Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
CVE-2015-6563
1.9The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
CVE-2015-5600
8.5The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
CVE-2015-5352
4.3The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
2014(3)
CVE-2014-2653
5.8The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532
4.9sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2014-1692
7.5The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
2012(1)
CVE-2012-0814
3.5The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
2011(2)
CVE-2011-5000
3.5The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
CVE-2011-4327
2.1ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
2010(3)
CVE-2010-5107
5.0The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
CVE-2010-4755
4.0The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
CVE-2010-4478
7.5OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
2008(1)
CVE-2008-3844
9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
2007(1)
CVE-2007-2768
4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.

OpenPorts

11131719242526373843497079808792939496102104106110113135175179195221264311343442443462465503513515548554593636666789885888994995101210231025106310991153117711881200123412921337141414431460151515211599160418011820188319111926195119521953195419571962196419721974198019812002200320062008202020502067206820812082208320872121212221502154218122222323233223452376240424552570257228063001306330873089310231213130313831423143315231543166316731793183319231953199326032683269327033013310338934033406340935243551355435573780379039524064408041044150415741604282443344344443444445004506451045304545474747864840491149495006500750095010501150225051508950905119517252015233523652395240525252695280540055235558560556075660567156785680582258585904591959385984599259976001600660216379644364646590660366336653666666676668669767756998700170107050707170837085708771027105717171737218732573317433743475488000800180098014801680218031804080498055805680768077808380878089809280998110811581168118812481268140814681478149815281588168818181838185819482008222828583338382838484198443844484558472848185008502850585198545855785798581858786008649870887238791880188028804880588348856886088638875888088898899890889119000900190049005901090149019902090229035903990429051906390719081908990919103914091469147915191679173917891819183918692159218921992469247925092529257927392999301930693089333944394569458950595159527953095509600963396589761981098769908994399509993999899991000210005100161002510027100351003610037100421005010081100871025010444104771055410909109111100011027111121118211210112881130011596120001201612084120881210512114121181212312126121461215112154121551216212164121711218312194121971220212203122191223312258122621227212285123041231212334123411234512357123631237712380123951239912420124221243412455124591248012489124911249412499125031250712529125501256412566125671257712585126011300113128133801433014344144031444314875148801490115000150011544316000160131603616037160451605516062160631606616089163111640016404168311699317000170011702018008180281802918042180811808218083181011810718182182391824519000200202005320150204402054720880210022102521082210832124121247212782130021312213792138121515225562308424245250012500425006251052556526656270152801528080300003000230003300223002930083301103011330122303013032230422306223082230922310223112231210312223144431722320223212232222323223262232764328223292233022330603322233422335223362233722338223422234322344223452234622348223492235000350023512235222352403524135250353223552235531357223582235922361223622236522367223702237322375223777737922382223833338722388803902239422395223962239722400704022240322408944179441822419224212242208424224290143622440224412244158443344434544399444104522245322455224562245822460224612246222464224700147122475224780847990484224852248722488884892249692498225000050004500145005050070501005077751235514435202252200528695302253200534815413854984554225544355481555535555555722558225762257779581225822258522587226012961616620786321063256632606367664295
11 / tcp
-2031152423 | 2025-03-09T09:23:36.658755
13 / tcp
1725312227 | 2025-03-10T19:25:18.401689
17 / tcp
366084633 | 2025-03-24T16:03:03.655738
19 / tcp
-746345752 | 2025-03-14T23:49:08.974941
24 / tcp
-2096652808 | 2025-02-27T18:31:46.198165
25 / tcp
1353260875 | 2025-03-19T16:47:53.086124
26 / tcp
1492413928 | 2025-03-13T21:39:10.961841
37 / tcp
1463575233 | 2025-02-28T23:29:21.866220
38 / tcp
-2089734047 | 2025-03-09T09:07:58.633653
43 / tcp
1842524259 | 2025-03-10T09:18:19.471799
49 / tcp
-1101712668 | 2025-03-13T18:38:32.978029
70 / tcp
-1385078233 | 2025-03-21T13:13:53.075274
79 / tcp
268196945 | 2025-03-18T15:45:10.844013
80 / tcp
501077178 | 2025-03-16T16:58:17.799895
87 / tcp
-903067560 | 2025-03-15T17:22:54.209319
92 / tcp
-904840257 | 2025-03-22T00:00:45.661561
93 / tcp
-1140468363 | 2025-03-04T04:31:59.349906
94 / tcp
-1947777893 | 2025-03-19T21:11:51.869413
96 / tcp
1911457608 | 2025-03-16T21:56:33.521830
102 / tcp
722711397 | 2025-03-23T19:11:58.720954
104 / tcp
1278527606 | 2025-03-13T14:30:16.796985
106 / tcp
1107492609 | 2025-03-11T05:21:44.881672
110 / tcp
-2089734047 | 2025-03-24T00:46:42.366543
113 / tcp
-414819019 | 2025-03-17T04:51:21.162568
135 / tcp
-1589645334 | 2025-03-24T04:59:49.624600
175 / tcp
-358801646 | 2025-03-04T21:15:37.146328
179 / tcp
-399606100 | 2025-02-27T20:50:13.256168
195 / tcp
291723434 | 2025-03-22T09:00:09.201501
221 / tcp
165188539 | 2025-03-24T02:26:01.057321
264 / tcp
-1707068558 | 2025-03-23T01:48:23.771043
311 / tcp
676753056 | 2025-03-11T14:06:11.667533
343 / tcp
117101543 | 2025-03-23T08:38:41.276667
442 / tcp
-1399940268 | 2025-03-14T02:29:24.146364
443 / tcp
1834245623 | 2025-03-20T16:38:54.478706
462 / tcp
-1399940268 | 2025-02-25T09:53:39.327357
465 / tcp
897328069 | 2025-03-12T21:32:06.726426
503 / tcp
-1399940268 | 2025-03-23T13:36:51.887767
513 / tcp
-1013082686 | 2025-03-09T07:47:29.425842
515 / tcp
1492413928 | 2025-03-12T21:21:57.862213
548 / tcp
-773160241 | 2025-03-05T09:48:41.569955
554 / tcp
1060450357 | 2025-03-19T21:31:25.690754
593 / tcp
-1407711311 | 2025-03-17T04:05:22.783114
636 / tcp
-779815868 | 2025-03-24T10:15:51.887850
666 / tcp
-1420968138 | 2025-03-13T01:01:51.627378
789 / tcp
1767345577 | 2025-03-24T06:00:54.952618
885 / tcp
1632932802 | 2025-02-26T17:06:55.752738
888 / tcp
-262532376 | 2025-03-04T13:57:25.554441
994 / tcp
1543809371 | 2025-03-11T00:42:50.215987
995 / tcp
1685649979 | 2025-03-19T16:35:14.379540
1012 / tcp
819727972 | 2025-03-10T13:14:52.273039
1023 / tcp
171352214 | 2025-03-20T20:31:04.030243
1025 / tcp
-2089734047 | 2025-03-23T04:14:31.972448
1063 / tcp
1278527606 | 2025-03-23T11:50:03.957488
1099 / tcp
-1399940268 | 2025-03-21T23:54:00.269915
1153 / tcp
-1795027372 | 2025-03-13T14:31:48.501110
1177 / tcp
-1316398834 | 2025-03-09T09:19:56.405505
1188 / tcp
-136006866 | 2025-03-12T17:46:02.002757
1200 / tcp
2087396567 | 2025-03-06T11:39:57.975419
1234 / tcp
-1888448627 | 2025-02-27T22:46:26.231798
1292 / tcp
-441419608 | 2025-03-20T01:27:29.520381
1337 / tcp
-971970408 | 2025-03-23T01:17:35.921929
1414 / tcp
-274082663 | 2025-03-13T05:04:14.852641
1443 / tcp
-1715152554 | 2025-03-20T15:54:29.094345
1460 / tcp
-1888448627 | 2025-02-26T15:20:09.791817
1515 / tcp
819727972 | 2025-03-13T10:14:39.247548
1521 / tcp
1975288991 | 2025-03-22T10:57:43.483178
1599 / tcp
2087396567 | 2025-03-18T17:44:37.584763
1604 / tcp
1911457608 | 2025-03-19T11:01:56.182916
1801 / tcp
1535389866 | 2025-03-24T11:12:51.311626
1820 / tcp
-1399940268 | 2025-03-16T10:46:28.138820
1883 / tcp
2087396567 | 2025-03-12T12:05:40.883580
1911 / tcp
-1399940268 | 2025-03-18T12:20:17.184850
1926 / tcp
539065883 | 2025-03-18T16:34:33.807860
1951 / tcp
709622286 | 2025-03-15T01:51:24.748302
1952 / tcp
-1399940268 | 2025-03-24T18:09:36.277171
1953 / tcp
-1538260461 | 2025-03-13T23:27:18.373214
1954 / tcp
1830187220 | 2025-02-25T15:05:15.991747
1957 / tcp
366084633 | 2025-02-24T12:49:27.573731
1962 / tcp
-1399940268 | 2025-03-19T19:59:28.911904
1964 / tcp
2098371729 | 2025-03-23T12:03:32.906921
1972 / tcp
-2107996212 | 2025-03-19T05:11:30.601247
1974 / tcp
1665357098 | 2025-03-09T18:03:49.877911
1980 / tcp
408230060 | 2025-03-21T23:02:27.185069
1981 / tcp
-1230049476 | 2025-03-10T21:07:59.660960
2002 / tcp
-1839934832 | 2025-03-13T03:30:47.790068
2003 / tcp
1504401647 | 2025-03-09T16:52:17.048516
2006 / tcp
-1297953727 | 2025-03-17T05:45:28.389285
2008 / tcp
-1399940268 | 2025-03-23T00:59:23.735949
2020 / tcp
-1622153914 | 2025-03-15T22:42:52.533848
2050 / tcp
-358801646 | 2025-03-16T20:17:07.174794
2067 / tcp
819727972 | 2025-03-17T11:55:24.891105
2068 / tcp
-42767839 | 2025-03-04T22:06:18.597696
2081 / tcp
-1399940268 | 2025-03-23T18:19:59.545165
2082 / tcp
0 | 2025-03-20T21:49:09.628397
2083 / tcp
-358801646 | 2025-03-18T14:09:07.439024
2087 / tcp
1842524259 | 2025-03-19T13:26:26.685576
2121 / tcp
141730637 | 2025-03-04T18:32:44.979213
2122 / tcp
-1626979812 | 2025-03-15T09:28:34.889163
2150 / tcp
1911457608 | 2025-02-23T20:13:19.075504
2154 / tcp
-1999117212 | 2025-03-20T04:53:12.643043
2181 / tcp
546151771 | 2025-02-23T05:23:53.948051
2222 / tcp
2051656595 | 2025-03-15T19:28:51.591306
2323 / tcp
1662205251 | 2025-03-19T17:16:37.133777
2332 / tcp
211952361 | 2025-03-16T07:40:55.473692
2345 / tcp
819727972 | 2025-03-15T01:40:18.018663
2376 / tcp
320677201 | 2025-03-24T00:07:27.595067
2404 / tcp
-136006866 | 2025-03-19T17:10:16.112600
2455 / tcp
740837454 | 2025-03-20T17:20:28.850881
2570 / tcp
1632932802 | 2025-02-28T21:58:36.002433
2572 / tcp
320677201 | 2025-02-24T17:46:13.817836
2806 / tcp
-1013082686 | 2025-03-16T08:37:54.653696
3001 / tcp
1975288991 | 2025-02-25T21:07:40.223125
3063 / tcp
-1013082686 | 2025-03-12T20:59:24.975513
3087 / tcp
709622286 | 2025-03-08T21:55:42.789345
3089 / tcp
-1399940268 | 2025-03-17T12:13:19.213048
3102 / tcp
-303199180 | 2025-03-14T21:39:44.555058
3121 / tcp
-747911285 | 2025-03-15T14:07:00.205482
3130 / tcp
-1327660293 | 2025-03-06T16:50:28.633784
3138 / tcp
-1399940268 | 2025-03-10T09:51:33.273247
3142 / tcp
-1399940268 | 2025-03-09T08:50:24.290516
3143 / tcp
-1399940268 | 2025-02-26T16:25:07.530476
3152 / tcp
-1399940268 | 2025-03-06T06:16:28.085214
3154 / tcp
1975288991 | 2025-03-15T16:51:59.345542
3166 / tcp
-1399940268 | 2025-03-19T11:02:11.105935
3167 / tcp
819727972 | 2025-03-15T09:10:05.029461
3179 / tcp
-1399940268 | 2025-03-18T08:59:12.629876
3183 / tcp
-1888448627 | 2025-03-20T07:22:45.920168
3192 / tcp
-1810987450 | 2025-03-17T23:55:10.238860
3195 / tcp
-1013082686 | 2025-03-20T02:34:10.138488
3199 / tcp
2143387245 | 2025-02-24T04:57:22.221232
3260 / tcp
-862070606 | 2025-03-03T22:42:32.946218
3268 / tcp
-1688921933 | 2025-03-15T07:14:05.760410
3269 / tcp
-1105333987 | 2025-03-14T18:44:06.034207
3270 / tcp
-2096652808 | 2025-03-22T14:36:33.353929
3301 / tcp
-1105333987 | 2025-02-26T17:28:01.141227
3310 / tcp
1911457608 | 2025-03-15T18:24:22.912790
3389 / tcp
-989469824 | 2025-03-22T10:27:46.837244
3403 / tcp
1911457608 | 2025-03-10T12:11:17.805304
3406 / tcp
-1105333987 | 2025-03-22T18:04:02.468199
3409 / tcp
-616720387 | 2025-03-23T11:25:21.975392
3524 / tcp
-1399940268 | 2025-03-16T21:40:38.203427
3551 / tcp
198844676 | 2025-03-15T12:38:28.381379
3554 / tcp
819727972 | 2025-03-13T09:13:59.825180
3557 / tcp
455076604 | 2025-03-12T03:42:33.325614
3780 / tcp
1690634669 | 2025-03-14T18:29:03.562768
3790 / tcp
-1189269828 | 2025-03-16T04:27:05.944495
3952 / tcp
1767345577 | 2025-03-05T11:01:22.500403
4064 / tcp
1574088840 | 2025-03-23T18:12:52.264109
4080 / tcp
-1399940268 | 2025-03-15T22:31:41.581599
4104 / tcp
1911457608 | 2025-02-24T08:42:19.139193
4150 / tcp
1615193817 | 2025-02-24T18:13:08.490226
4157 / tcp
-616720387 | 2025-03-14T02:03:39.170433
4160 / tcp
-1598265216 | 2025-03-18T19:19:12.328219
4282 / tcp
819727972 | 2025-03-22T15:55:08.074769
4433 / tcp
-971970408 | 2025-03-23T22:35:00.051522
4434 / tcp
2087396567 | 2025-03-16T12:43:42.810351
4443 / tcp
141533638 | 2025-03-21T09:04:39.549296
4444 / tcp
-345718689 | 2025-03-19T04:40:34.032787
4500 / tcp
-2107996212 | 2025-03-10T11:54:58.926259
4506 / tcp
459162008 | 2025-03-17T01:42:25.560169
4510 / tcp
1208318993 | 2025-02-23T15:32:09.357409
4530 / tcp
15018106 | 2025-03-12T02:35:19.023313
4545 / tcp
-1399940268 | 2025-03-22T14:47:27.896404
4747 / tcp
2103111368 | 2025-03-06T18:16:55.662408
4786 / tcp
-1996280214 | 2025-03-12T17:42:25.665418
4840 / tcp
-1986594217 | 2025-03-07T17:00:06.041549
4911 / tcp
165188539 | 2025-03-06T17:10:08.029780
4949 / tcp
-754988795 | 2025-03-15T07:03:59.135055
5006 / tcp
1353260875 | 2025-03-20T13:08:32.262342
5007 / tcp
321971019 | 2025-03-22T08:18:09.643801
5009 / tcp
1017429513 | 2025-03-18T11:29:55.867291
5010 / tcp
1282941221 | 2025-03-23T07:47:59.627989
5011 / tcp
-2096652808 | 2025-03-23T17:42:29.687888
5022 / tcp
-1888448627 | 2025-03-19T03:04:34.650999
5051 / tcp
671605376 | 2025-02-25T02:07:35.819349
5089 / tcp
632542934 | 2025-02-22T20:59:41.184585
5090 / tcp
1911457608 | 2025-03-12T13:35:42.325109
5119 / tcp
-1538260461 | 2025-03-14T21:56:49.366663
5172 / tcp
-971970408 | 2025-03-06T05:02:02.486997
5201 / tcp
669849225 | 2025-03-06T21:00:43.716313
5233 / tcp
1911457608 | 2025-02-28T10:27:31.229652
5236 / tcp
-2089734047 | 2025-03-11T03:04:02.911106
5239 / tcp
-2089734047 | 2025-03-22T13:56:57.656164
5240 / tcp
-2089734047 | 2025-03-19T14:35:40.975869
5252 / tcp
-1399940268 | 2025-03-13T00:49:36.767118
5269 / tcp
1462885993 | 2025-03-19T23:10:36.998212
5280 / tcp
1661529882 | 2025-03-04T07:35:33.506556
5400 / tcp
-1399940268 | 2025-03-06T08:40:11.271793
5523 / tcp
-2140303521 | 2025-02-25T06:44:18.843191
5558 / tcp
-1327660293 | 2025-02-27T01:13:39.791110
5605 / tcp
671605376 | 2025-03-04T23:10:19.742894
5607 / tcp
-303199180 | 2025-03-05T02:47:30.351915
5660 / tcp
-1986594217 | 2025-03-21T02:29:06.630285
5671 / tcp
-1045760528 | 2025-03-24T16:09:47.375755
5678 / tcp
687434487 | 2025-03-16T06:07:45.527514
5680 / tcp
-1032713145 | 2025-03-12T01:40:11.481935
5822 / tcp
-1547976805 | 2025-02-24T12:49:08.480253
5858 / tcp
-1441741890 | 2025-03-20T18:14:52.731328
5904 / tcp
632542934 | 2025-03-05T19:11:51.170223
5919 / tcp
-358801646 | 2025-03-21T04:08:48.671571
5938 / tcp
707919486 | 2025-03-17T12:45:35.396408
5984 / tcp
1999272906 | 2025-03-24T01:32:25.884338
5992 / tcp
1911457608 | 2025-03-22T14:02:59.761545
5997 / tcp
-1399940268 | 2025-03-03T23:46:31.324987
6001 / tcp
-1399940268 | 2025-03-09T07:32:38.971061
6006 / tcp
307999478 | 2025-02-28T11:01:23.962797
6021 / tcp
-1641514916 | 2025-03-05T15:14:50.023659
6379 / tcp
321971019 | 2025-03-23T10:49:52.170435
6443 / tcp
-1114821551 | 2025-02-25T17:23:45.787973
6464 / tcp
-1839934832 | 2025-03-14T10:45:20.647238
6590 / tcp
1911457608 | 2025-02-24T14:55:53.351799
6603 / tcp
1632932802 | 2025-03-20T10:45:47.010414
6633 / tcp
165188539 | 2025-03-18T06:13:26.566303
6653 / tcp
-1626979812 | 2025-02-28T18:37:27.209373
6666 / tcp
4935895 | 2025-03-17T21:44:49.638065
6667 / tcp
1321679546 | 2025-03-05T06:38:08.184674
6668 / tcp
-1279886438 | 2025-03-20T17:08:56.353201
6697 / tcp
819727972 | 2025-03-23T17:56:20.787071
6775 / tcp
-2089734047 | 2025-03-04T07:46:19.330409
6998 / tcp
165188539 | 2025-03-16T06:25:12.323004
7001 / tcp
1749359477 | 2025-03-13T10:24:28.796877
7010 / tcp
-1399940268 | 2025-03-06T02:04:51.484912
7050 / tcp
-1105333987 | 2025-02-28T23:04:59.528946
7071 / tcp
1984588611 | 2025-02-25T10:24:41.390911
7083 / tcp
-1099385124 | 2025-03-19T02:09:37.133543
7085 / tcp
-1105333987 | 2025-02-24T06:36:51.459262
7087 / tcp
1332894250 | 2025-03-16T10:14:17.112461
7102 / tcp
-1598265216 | 2025-02-23T22:58:10.037081
7105 / tcp
-1453516345 | 2025-02-26T05:16:26.075538
7171 / tcp
-1737707071 | 2025-02-26T06:59:53.993676
7173 / tcp
819727972 | 2025-02-24T20:52:20.821697
7218 / tcp
-1839934832 | 2025-03-19T10:59:16.840028
7325 / tcp
-2031152423 | 2025-03-19T22:55:54.753899
7331 / tcp
1308377066 | 2025-03-19T11:09:26.262297
7433 / tcp
-1839934832 | 2025-03-07T14:14:02.458245
7434 / tcp
1426971893 | 2025-03-08T21:27:15.786148
7548 / tcp
2087396567 | 2025-02-27T05:48:50.898715
8000 / tcp
-1204391172 | 2025-03-16T07:49:01.072224
8001 / tcp
2103111368 | 2025-03-16T18:13:34.372207
8009 / tcp
-801484042 | 2025-03-20T05:23:18.329326
8014 / tcp
1212285915 | 2025-03-04T07:30:32.506252
8016 / tcp
-801484042 | 2025-03-21T20:29:08.158426
8021 / tcp
-1816125480 | 2025-03-06T15:44:14.960180
8031 / tcp
-1074334298 | 2025-03-10T07:48:36.048431
8040 / tcp
1223115691 | 2025-03-06T16:45:18.037015
8049 / tcp
-784071826 | 2025-03-04T22:39:32.403792
8055 / tcp
1975288991 | 2025-03-10T17:17:40.241910
8056 / tcp
632542934 | 2025-03-04T12:31:38.961568
8076 / tcp
-1598265216 | 2025-03-21T09:51:43.777905
8077 / tcp
-1399940268 | 2025-03-06T18:20:07.647121
8083 / tcp
-1261090339 | 2025-02-27T11:15:41.987329
8087 / tcp
921225407 | 2025-03-15T22:03:57.458489
8089 / tcp
2087396567 | 2025-03-19T21:03:26.494633
8092 / tcp
1396488228 | 2025-03-05T08:37:56.603601
8099 / tcp
-1249500036 | 2025-03-18T02:32:42.657144
8110 / tcp
-1888448627 | 2025-03-11T15:07:24.825123
8115 / tcp
-1045760528 | 2025-03-04T10:56:07.656424
8116 / tcp
1975288991 | 2025-02-26T23:45:13.112411
8118 / tcp
-1399940268 | 2025-02-28T19:04:08.479336
8124 / tcp
-2031152423 | 2025-03-09T11:00:31.719038
8126 / tcp
819727972 | 2025-03-24T10:50:07.444866
8140 / tcp
2087396567 | 2025-03-13T09:30:45.190754
8146 / tcp
-2089734047 | 2025-03-19T05:18:55.463066
8147 / tcp
-1399940268 | 2025-03-19T12:19:51.321684
8149 / tcp
1989907056 | 2025-03-16T07:11:39.396110
8152 / tcp
-2089734047 | 2025-03-11T08:30:56.956418
8158 / tcp
819727972 | 2025-03-13T06:59:29.988335
8168 / tcp
820958131 | 2025-03-17T00:14:08.475971
8181 / tcp
1690634669 | 2025-03-13T05:46:19.402308
8183 / tcp
-1399940268 | 2025-02-28T06:57:55.676547
8185 / tcp
-2089734047 | 2025-03-05T20:19:20.064467
8194 / tcp
897328069 | 2025-03-17T05:36:04.069124
8200 / tcp
1320285193 | 2025-02-26T20:35:32.379671
8222 / tcp
759851410 | 2025-03-04T02:14:35.054469
8285 / tcp
-1699556818 | 2025-02-23T13:36:00.909678
8333 / tcp
474736340 | 2025-03-19T14:12:30.875522
8382 / tcp
-1399940268 | 2025-03-22T17:12:25.181317
8384 / tcp
-1399940268 | 2025-03-12T14:25:46.997060
8419 / tcp
819727972 | 2025-03-21T09:18:28.176255
8443 / tcp
1036077092 | 2025-02-28T21:17:25.667043
8444 / tcp
1642597142 | 2025-03-21T08:51:07.912090
8455 / tcp
-438503381 | 2025-03-13T08:01:49.796277
8472 / tcp
455076604 | 2025-02-27T12:05:04.860703
8481 / tcp
639175818 | 2025-02-22T18:55:45.438121
8500 / tcp
1662811133 | 2025-02-27T11:23:45.481097
8502 / tcp
-1399940268 | 2025-03-04T03:11:25.274647
8505 / tcp
-2089734047 | 2025-02-24T15:12:16.405995
8519 / tcp
-136006866 | 2025-03-13T17:53:29.982207
8545 / tcp
-375604792 | 2025-03-19T05:11:51.188038
8557 / tcp
575925250 | 2025-02-23T04:18:29.054470
8579 / tcp
2098371729 | 2025-03-18T15:19:28.527340
8581 / tcp
-1329831334 | 2025-03-11T23:16:37.845308
8587 / tcp
-2089734047 | 2025-03-10T11:15:04.816300
8600 / tcp
-2067833852 | 2025-02-26T04:12:37.524744
8649 / tcp
842535728 | 2025-03-03T20:17:17.720808
8708 / tcp
-784071826 | 2025-03-04T09:08:15.417515
8723 / tcp
-802143704 | 2025-02-25T23:42:35.468245
8791 / tcp
-1399940268 | 2025-03-08T14:43:11.027672
8801 / tcp
1911457608 | 2025-03-15T02:09:39.392455
8802 / tcp
-1279886438 | 2025-03-22T08:01:13.682884
8804 / tcp
819727972 | 2025-03-22T14:09:53.414305
8805 / tcp
-1327660293 | 2025-03-19T02:31:49.712694
8834 / tcp
-2017887953 | 2025-02-25T22:30:13.376814
8856 / tcp
-2140303521 | 2025-03-17T02:51:06.841314
8860 / tcp
2103111368 | 2025-03-23T22:46:40.292891
8863 / tcp
165188539 | 2025-02-26T08:08:26.242492
8875 / tcp
-1538260461 | 2025-02-24T18:20:53.959815
8880 / tcp
1212921144 | 2025-03-22T18:20:25.938534
8889 / tcp
320677201 | 2025-03-22T16:57:14.032034
8899 / tcp
372433470 | 2025-03-15T16:58:04.308637
8908 / tcp
-784071826 | 2025-03-19T17:37:53.863583
8911 / tcp
-1611764932 | 2025-03-24T10:03:40.398295
9000 / tcp
-2067028711 | 2025-03-21T03:54:01.687284
9001 / tcp
-1026951088 | 2025-03-04T15:17:00.897927
9004 / tcp
632542934 | 2025-03-20T21:11:38.334993
9005 / tcp
819727972 | 2025-03-13T07:08:26.460741
9010 / tcp
632542934 | 2025-03-11T11:42:58.996012
9014 / tcp
165188539 | 2025-03-10T11:58:03.980195
9019 / tcp
740837454 | 2025-03-04T06:12:00.765978
9020 / tcp
-358801646 | 2025-03-11T04:50:45.637498
9022 / tcp
-1470145161 | 2025-03-17T21:28:29.589865
9035 / tcp
-1453516345 | 2025-03-11T11:23:51.891588
9039 / tcp
897328069 | 2025-03-23T19:00:08.128972
9042 / tcp
-154107716 | 2025-02-27T11:59:09.367819
9051 / tcp
-971970408 | 2025-03-24T17:43:11.137083
9063 / tcp
-1835475271 | 2025-02-26T09:13:34.865195
9071 / tcp
-1056270173 | 2025-03-17T18:38:52.851278
9081 / tcp
820958131 | 2025-03-04T19:39:32.306368
9089 / tcp
1504401647 | 2025-03-13T09:46:26.349963
9091 / tcp
504717326 | 2025-03-18T15:13:50.108840
9103 / tcp
-339084706 | 2025-03-12T03:48:15.786986
9140 / tcp
819727972 | 2025-03-23T00:34:56.521804
9146 / tcp
921225407 | 2025-03-14T09:10:18.679090
9147 / tcp
-2089734047 | 2025-03-17T13:21:54.094628
9151 / tcp
1741579575 | 2025-03-24T07:37:06.384837
9167 / tcp
103159425 | 2025-03-20T03:29:07.778724
9173 / tcp
632542934 | 2025-03-18T05:29:38.763010
9178 / tcp
103159425 | 2025-03-16T10:55:23.009829
9181 / tcp
1911457608 | 2025-02-24T21:23:27.912894
9183 / tcp
1519486042 | 2025-03-11T05:53:29.718175
9186 / tcp
-2046514463 | 2025-03-16T14:36:55.508996
9215 / tcp
819727972 | 2025-02-24T15:48:04.441192
9218 / tcp
921225407 | 2025-03-06T21:34:26.946419
9219 / tcp
819727972 | 2025-03-04T02:17:22.792497
9246 / tcp
819727972 | 2025-03-16T12:33:18.337045
9247 / tcp
921225407 | 2025-03-13T16:56:57.997792
9250 / tcp
-1888448627 | 2025-03-04T21:03:32.018294
9252 / tcp
1911457608 | 2025-03-11T10:52:00.752970
9257 / tcp
709622286 | 2025-03-22T10:05:17.570528
9273 / tcp
-1399940268 | 2025-03-03T17:54:23.920397
9299 / tcp
-339084706 | 2025-02-25T21:35:04.814925
9301 / tcp
-2089734047 | 2025-02-28T09:40:19.982330
9306 / tcp
1830187220 | 2025-03-19T14:52:34.813026
9308 / tcp
1426971893 | 2025-03-13T15:22:44.275651
9333 / tcp
1212285915 | 2025-03-18T17:25:42.872440
9443 / tcp
630622923 | 2025-03-19T02:08:08.316870
9456 / tcp
-1730858130 | 2025-02-26T02:37:26.744933
9458 / tcp
580340387 | 2025-03-24T14:47:24.055261
9505 / tcp
-345718689 | 2025-02-28T18:38:57.512025
9515 / tcp
-1327660293 | 2025-03-15T16:46:40.607405
9527 / tcp
-2089734047 | 2025-02-24T15:45:57.818354
9530 / tcp
1624217396 | 2025-03-10T11:50:02.670942
9550 / tcp
819727972 | 2025-03-21T19:48:09.077658
9600 / tcp
-1059554316 | 2025-03-24T08:32:11.620883
9633 / tcp
819727972 | 2025-03-18T17:58:03.772346
9658 / tcp
1911457608 | 2025-03-15T13:09:40.852096
9761 / tcp
45131230 | 2025-03-12T14:13:26.776141
9810 / tcp
677934968 | 2025-03-23T19:11:22.065227
9876 / tcp
-255236012 | 2025-03-16T02:55:14.776858
9908 / tcp
-1888448627 | 2025-03-08T19:45:28.797993
9943 / tcp
491999737 | 2025-03-14T14:41:20.819427
9950 / tcp
-146605374 | 2025-03-13T03:31:57.892938
9993 / tcp
2098371729 | 2025-03-21T13:10:48.021414
9998 / tcp
-1223770960 | 2025-02-23T11:17:49.801436
9999 / tcp
1161309183 | 2025-03-04T13:33:41.405044
10002 / tcp
1077013874 | 2025-02-27T10:58:53.550405
10005 / tcp
-1399940268 | 2025-03-01T00:27:12.258047
10016 / tcp
1308377066 | 2025-03-19T04:43:46.131530
10025 / tcp
-2089734047 | 2025-03-09T07:47:17.134706
10027 / tcp
-2089734047 | 2025-03-23T09:33:41.778922
10035 / tcp
1011407350 | 2025-03-18T10:00:51.802821
10036 / tcp
-1327660293 | 2025-02-24T17:30:14.169536
10037 / tcp
-1399940268 | 2025-03-23T07:00:27.980379
10042 / tcp
1504401647 | 2025-03-08T14:54:19.245755
10050 / tcp
1308377066 | 2025-03-12T13:21:43.363509
10081 / tcp
-2089734047 | 2025-02-23T20:17:39.603984
10087 / tcp
1991883981 | 2025-03-16T20:22:07.348158
10250 / tcp
104385780 | 2025-03-19T18:13:08.169857
10444 / tcp
-1888448627 | 2025-03-13T13:11:46.954806
10477 / tcp
2103111368 | 2025-02-24T00:07:39.238881
10554 / tcp
-320705161 | 2025-03-15T02:22:55.554795
10909 / tcp
-2089734047 | 2025-03-20T15:43:13.363543
10911 / tcp
-2140303521 | 2025-03-18T16:14:48.250790
11000 / tcp
1911457608 | 2025-03-23T20:29:07.436888
11027 / tcp
819727972 | 2025-03-07T15:42:54.310740
11112 / tcp
-136006866 | 2025-03-18T08:37:14.006322
11182 / tcp
-653033013 | 2025-03-01T00:10:17.501748
11210 / tcp
-1189269828 | 2025-02-24T17:58:38.284610
11288 / tcp
-1487943323 | 2025-03-24T11:47:03.854602
11300 / tcp
493955023 | 2025-03-04T18:18:24.737158
11596 / tcp
1911457608 | 2025-03-05T21:58:21.474661
12000 / tcp
-446385447 | 2025-03-04T10:41:02.352453
12016 / tcp
-1839934832 | 2025-03-15T16:57:57.361284
12084 / tcp
-653033013 | 2025-03-24T15:35:15.416129
12088 / tcp
-1428621233 | 2025-03-09T17:02:58.777997
12105 / tcp
-1428621233 | 2025-02-24T09:02:02.031550
12114 / tcp
1767345577 | 2025-03-20T05:40:39.901672
12118 / tcp
-2096652808 | 2025-03-06T03:17:34.200973
12123 / tcp
-2140303521 | 2025-02-23T00:59:31.321072
12126 / tcp
-2096652808 | 2025-03-15T23:51:19.927686
12146 / tcp
-1538260461 | 2025-03-20T08:40:43.146962
12151 / tcp
-1399940268 | 2025-03-10T17:11:54.695174
12154 / tcp
1911457608 | 2025-03-06T23:11:44.533957
12155 / tcp
921225407 | 2025-03-19T16:52:44.138409
12162 / tcp
1363464823 | 2025-03-23T10:23:48.088015
12164 / tcp
669849225 | 2025-03-10T01:34:38.464285
12171 / tcp
-1399940268 | 2025-03-17T03:06:17.311564
12183 / tcp
921225407 | 2025-03-19T19:59:55.942150
12194 / tcp
-2089734047 | 2025-03-05T08:24:33.675217
12197 / tcp
1011407350 | 2025-02-25T15:07:19.334780
12202 / tcp
-2089734047 | 2025-03-21T18:15:47.941343
12203 / tcp
-2031152423 | 2025-02-23T09:57:52.186312
12219 / tcp
1492413928 | 2025-03-16T18:57:02.274600
12233 / tcp
2121220663 | 2025-02-24T07:08:12.330009
12258 / tcp
-1839934832 | 2025-03-17T15:14:10.379189
12262 / tcp
1948301213 | 2025-03-06T20:49:25.702873
12272 / tcp
-2033111675 | 2025-02-24T00:13:49.521164
12285 / tcp
504717326 | 2025-03-13T03:08:04.438704
12304 / tcp
-1399940268 | 2025-02-25T17:48:41.980352
12312 / tcp
-1399940268 | 2025-02-24T16:45:48.375752
12334 / tcp
820958131 | 2025-03-18T19:32:14.510236
12341 / tcp
165188539 | 2025-02-27T12:06:57.898904
12345 / tcp
296364507 | 2025-03-22T22:30:53.946583
12357 / tcp
-2089734047 | 2025-03-20T06:02:08.590670
12363 / tcp
-1399940268 | 2025-03-15T02:47:23.864925
12377 / tcp
-801484042 | 2025-02-28T18:14:51.229498
12380 / tcp
-616720387 | 2025-02-26T19:21:26.659805
12395 / tcp
-1105333987 | 2025-03-05T12:35:48.199724
12399 / tcp
819727972 | 2025-03-12T06:29:43.037459
12420 / tcp
819727972 | 2025-03-19T05:05:44.518469
12422 / tcp
1830697416 | 2025-03-24T15:04:40.629266
12434 / tcp
321971019 | 2025-03-18T23:45:27.414722
12455 / tcp
1308377066 | 2025-02-25T01:27:38.241382
12459 / tcp
1353260875 | 2025-03-24T04:39:03.869306
12480 / tcp
2063598737 | 2025-03-05T16:41:57.783937
12489 / tcp
-1399940268 | 2025-03-06T05:37:40.399206
12491 / tcp
-288825733 | 2025-03-05T10:40:24.811754
12494 / tcp
-1733645023 | 2025-02-22T22:12:13.127974
12499 / tcp
819727972 | 2025-03-12T23:27:30.925863
12503 / tcp
2063598737 | 2025-03-18T16:04:04.666887
12507 / tcp
-1733645023 | 2025-03-04T13:33:09.491243
12529 / tcp
2103111368 | 2025-03-04T22:36:29.236911
12550 / tcp
-1839934832 | 2025-03-05T03:33:51.388030
12564 / tcp
1948301213 | 2025-03-23T23:34:34.981020
12566 / tcp
-1746074029 | 2025-03-14T04:48:53.413179
12567 / tcp
819727972 | 2025-03-19T16:05:16.246340
12577 / tcp
-2096652808 | 2025-03-15T00:47:50.601972
12585 / tcp
-1373613804 | 2025-03-13T20:21:34.826779
12601 / tcp
-1230049476 | 2025-03-23T14:40:37.011717
13001 / tcp
1911457608 | 2025-03-13T18:26:49.485792
13128 / tcp
819727972 | 2025-03-14T02:18:43.302025
13380 / tcp
-2089734047 | 2025-03-24T09:35:09.639785
14330 / tcp
-1399940268 | 2025-03-19T09:12:47.291986
14344 / tcp
745343730 | 2025-03-16T17:19:44.822955
14403 / tcp
-345718689 | 2025-03-16T15:06:05.447107
14443 / tcp
1134517380 | 2025-03-20T21:03:53.847657
14875 / tcp
1975288991 | 2025-03-23T18:32:10.710098
14880 / tcp
-2107996212 | 2025-02-22T23:10:13.456321
14901 / tcp
-2096652808 | 2025-03-15T02:03:47.212727
15000 / tcp
-942457744 | 2025-03-11T18:04:31.656276
15001 / tcp
-1399940268 | 2025-03-19T03:42:52.749255
15443 / tcp
660175493 | 2025-03-14T07:08:08.481106
16000 / tcp
665929633 | 2025-03-17T19:19:13.613175
16013 / tcp
-1888448627 | 2025-03-04T09:04:46.630030
16036 / tcp
321971019 | 2025-03-04T17:04:53.825316
16037 / tcp
-2107996212 | 2025-03-16T11:55:06.784772
16045 / tcp
971933601 | 2025-03-22T20:15:47.632924
16055 / tcp
-445721795 | 2025-03-24T05:51:55.145990
16062 / tcp
1726594447 | 2025-03-19T17:20:31.633167
16063 / tcp
-1839934832 | 2025-03-20T08:19:16.490604
16066 / tcp
1011407350 | 2025-02-23T09:27:45.324031
16089 / tcp
632542934 | 2025-03-10T21:18:28.482653
16311 / tcp
-1032713145 | 2025-03-19T09:00:10.013445
16400 / tcp
-1810987450 | 2025-03-19T05:09:43.599930
16404 / tcp
-903067560 | 2025-02-27T17:55:00.255367
16831 / tcp
1911457608 | 2025-03-18T17:16:49.710550
16993 / tcp
2087396567 | 2025-03-16T04:10:49.280980
17000 / tcp
-1316398834 | 2025-03-05T09:50:11.158716
17001 / tcp
-1810987450 | 2025-03-07T10:21:49.123384
17020 / tcp
-1399940268 | 2025-03-23T15:36:53.270190
18008 / tcp
1134517380 | 2025-03-13T20:54:18.863376
18028 / tcp
819727972 | 2025-03-18T18:22:10.743039
18029 / tcp
1911457608 | 2025-03-23T00:18:18.900219
18042 / tcp
707919486 | 2025-03-10T21:50:26.698442
18081 / tcp
-1729629024 | 2025-03-17T07:29:59.884485
18082 / tcp
-1036370807 | 2025-03-18T15:45:27.341788
18083 / tcp
921225407 | 2025-03-06T19:16:22.993789
18101 / tcp
1873760314 | 2025-03-22T01:49:45.546783
18107 / tcp
1615193817 | 2025-03-16T20:06:04.411121
18182 / tcp
493955023 | 2025-03-15T18:00:01.451357
18239 / tcp
819727972 | 2025-03-23T18:08:58.367901
18245 / tcp
-1730858130 | 2025-03-21T19:43:49.856681
19000 / tcp
-1399940268 | 2025-03-13T00:02:39.288930
20020 / tcp
819727972 | 2025-03-05T15:14:36.252655
20053 / tcp
-1399940268 | 2025-03-05T14:00:14.156017
20150 / tcp
819727972 | 2025-03-16T16:22:57.179839
20440 / tcp
-2089734047 | 2025-03-22T18:01:23.420004
20547 / tcp
-1230049476 | 2025-03-24T01:04:41.225874
20880 / tcp
1370263973 | 2025-03-15T16:24:49.604458
21002 / tcp
819727972 | 2025-02-27T06:16:46.072537
21025 / tcp
660175493 | 2025-03-19T13:41:10.397762
21082 / tcp
1767345577 | 2025-03-10T21:21:43.020454
21083 / tcp
-1899074860 | 2025-03-11T22:26:12.964386
21241 / tcp
-1399940268 | 2025-03-14T02:46:44.637141
21247 / tcp
1762042191 | 2025-03-21T19:01:47.015755
21278 / tcp
-1428621233 | 2025-03-17T17:21:37.611828
21300 / tcp
1911457608 | 2025-03-15T00:04:41.967452
21312 / tcp
1911457608 | 2025-03-23T15:42:35.701781
21379 / tcp
1690634669 | 2025-03-24T17:43:16.272413
21381 / tcp
1426971893 | 2025-03-09T09:01:44.357311
21515 / tcp
740837454 | 2025-03-20T00:29:20.183874
22556 / tcp
-1327660293 | 2025-02-28T00:04:56.221510
23084 / tcp
819727972 | 2025-02-27T18:49:44.678754
24245 / tcp
-1730858130 | 2025-03-14T15:40:47.029892
25001 / tcp
971933601 | 2025-03-19T00:21:38.987958
25004 / tcp
-1839934832 | 2025-03-12T18:41:21.898190
25006 / tcp
945910976 | 2025-02-27T16:06:20.663009
25105 / tcp
104385780 | 2025-03-22T21:05:30.672089
25565 / tcp
165188539 | 2025-03-15T19:36:06.969852
26656 / tcp
2087396567 | 2025-03-13T06:55:44.662676
27015 / tcp
1911457608 | 2025-03-04T08:25:07.284759
28015 / tcp
-1399940268 | 2025-03-14T15:39:53.704802
28080 / tcp
2087396567 | 2025-03-11T01:26:37.829963
30000 / tcp
-1426182427 | 2025-02-23T23:59:32.179174
30002 / tcp
-1013082686 | 2025-03-06T10:17:32.899290
30003 / tcp
-1681927087 | 2025-03-04T00:03:09.347102
30022 / tcp
1077013874 | 2025-03-14T21:54:22.800954
30029 / tcp
-1810987450 | 2025-03-11T02:35:31.429886
30083 / tcp
-1730858130 | 2025-03-05T15:41:15.058564
30110 / tcp
-375604792 | 2025-02-24T15:55:13.745297
30113 / tcp
1011407350 | 2025-03-09T10:32:42.534456
30122 / tcp
-2033111675 | 2025-03-11T04:54:43.757242
30301 / tcp
-971970408 | 2025-03-15T19:43:24.215503
30322 / tcp
2087396567 | 2025-03-24T14:16:19.880873
30422 / tcp
-445721795 | 2025-03-13T13:39:21.486566
30622 / tcp
1741579575 | 2025-03-12T12:07:43.964945
30822 / tcp
2087396567 | 2025-03-12T20:44:25.676326
30922 / tcp
1887224352 | 2025-03-20T22:56:10.352537
31022 / tcp
-138733098 | 2025-03-24T12:37:59.397072
31122 / tcp
178736976 | 2025-03-09T13:52:54.276559
31210 / tcp
1278527606 | 2025-03-13T20:45:15.012624
31222 / tcp
819727972 | 2025-03-24T02:53:31.269162
31444 / tcp
-2096652808 | 2025-02-27T00:56:33.126106
31722 / tcp
819727972 | 2025-03-21T16:20:23.793891
32022 / tcp
-801484042 | 2025-03-12T05:17:21.595920
32122 / tcp
819727972 | 2025-03-20T05:19:52.290433
32222 / tcp
1741579575 | 2025-03-23T18:01:25.782384
32322 / tcp
2087396567 | 2025-03-16T15:26:37.391256
32622 / tcp
1286504516 | 2025-03-11T20:01:32.348304
32764 / tcp
-345718689 | 2025-03-24T17:43:07.505614
32822 / tcp
-358801646 | 2025-03-23T04:12:22.069031
32922 / tcp
1542849631 | 2025-03-23T02:26:27.131297
33022 / tcp
-971970408 | 2025-03-23T01:15:04.075762
33060 / tcp
1208318993 | 2025-03-22T19:20:45.608311
33222 / tcp
-142686627 | 2025-03-20T00:19:50.841728
33422 / tcp
320677201 | 2025-03-19T17:24:13.669396
33522 / tcp
-653033013 | 2025-03-20T14:41:27.269107
33622 / tcp
320677201 | 2025-03-21T05:53:02.354343
33722 / tcp
-971970408 | 2025-03-08T20:21:16.550610
33822 / tcp
819727972 | 2025-03-08T13:19:27.406429
34222 / tcp
320677201 | 2025-03-20T02:02:53.962144
34322 / tcp
1842524259 | 2025-03-19T19:05:51.178677
34422 / tcp
1741579575 | 2025-03-15T01:24:19.920315
34522 / tcp
2087396567 | 2025-03-19T14:57:28.642318
34622 / tcp
-1529979118 | 2025-03-19T11:11:08.801739
34822 / tcp
2087396567 | 2025-03-19T06:53:03.960170
34922 / tcp
996960436 | 2025-03-18T23:54:48.717429
35000 / tcp
1911457608 | 2025-03-20T03:21:56.092823
35002 / tcp
-358801646 | 2025-03-15T18:20:24.907313
35122 / tcp
1353260875 | 2025-03-04T09:32:12.870741
35222 / tcp
751496153 | 2025-03-18T11:25:48.220718
35240 / tcp
1282941221 | 2025-03-06T13:06:58.800170
35241 / tcp
320677201 | 2025-03-09T10:49:19.028131
35250 / tcp
-1399940268 | 2025-03-11T08:38:18.054024
35322 / tcp
-971970408 | 2025-03-04T06:01:15.084016
35522 / tcp
-1730858130 | 2025-03-21T20:58:22.655877
35531 / tcp
-1428621233 | 2025-03-04T05:22:25.471941
35722 / tcp
104385780 | 2025-02-28T07:04:41.117755
35822 / tcp
597764502 | 2025-03-17T18:20:38.832486
35922 / tcp
2087396567 | 2025-03-16T21:59:40.053543
36122 / tcp
119860953 | 2025-03-13T10:34:07.186536
36222 / tcp
-616720387 | 2025-03-17T20:03:39.571458
36522 / tcp
1741579575 | 2025-03-18T16:59:39.560383
36722 / tcp
-792826324 | 2025-03-17T06:31:36.556045
37022 / tcp
-1230049476 | 2025-03-16T20:26:41.108463
37322 / tcp
2087396567 | 2025-03-16T11:50:55.685079
37522 / tcp
751496153 | 2025-03-16T10:22:38.051397
37777 / tcp
-1487943323 | 2025-02-24T16:04:12.236541
37922 / tcp
819727972 | 2025-03-18T01:13:54.319136
38222 / tcp
-903067560 | 2025-03-10T21:26:45.773167
38333 / tcp
114471724 | 2025-03-15T21:26:45.181728
38722 / tcp
-1839934832 | 2025-03-13T22:43:33.136572
38880 / tcp
1332894250 | 2025-03-11T14:14:48.268827
39022 / tcp
-79865617 | 2025-03-13T20:59:23.027598
39422 / tcp
1690634669 | 2025-03-11T13:46:42.838670
39522 / tcp
539065883 | 2025-03-11T10:01:40.558554
39622 / tcp
-445721795 | 2025-03-11T08:09:12.133412
39722 / tcp
-1373613804 | 2025-03-05T04:59:39.916177
40070 / tcp
-1996280214 | 2025-02-27T17:55:56.172743
40222 / tcp
50497985 | 2025-03-04T11:16:24.495317
40322 / tcp
539065883 | 2025-03-08T21:53:57.745702
40894 / tcp
-1045760528 | 2025-03-21T16:44:22.182178
41794 / tcp
2087396567 | 2025-03-23T21:42:23.494614
41822 / tcp
819727972 | 2025-03-07T18:21:34.660043
41922 / tcp
-1681927087 | 2025-03-07T16:39:02.944885
42122 / tcp
-971970408 | 2025-03-05T03:29:00.946869
42208 / tcp
-1399940268 | 2025-03-16T08:31:10.548875
42422 / tcp
-1375131644 | 2025-03-04T20:46:58.746396
42901 / tcp
2143387245 | 2025-02-26T03:46:30.387723
43622 / tcp
1690634669 | 2025-02-27T00:43:05.292777
44022 / tcp
-1261090339 | 2025-02-26T21:19:13.409409
44122 / tcp
1690634669 | 2025-02-26T23:01:41.174386
44158 / tcp
2054287019 | 2025-03-19T16:47:57.269715
44334 / tcp
-2107996212 | 2025-03-18T05:59:39.002312
44345 / tcp
-1399940268 | 2025-03-03T18:50:04.191241
44399 / tcp
-2089734047 | 2025-03-04T03:52:22.823068
44410 / tcp
-1375131644 | 2025-03-10T01:05:14.521040
45222 / tcp
1975288991 | 2025-02-25T19:50:55.314106
45322 / tcp
104385780 | 2025-02-25T18:14:07.132461
45522 / tcp
-1392039491 | 2025-02-25T16:40:39.950772
45622 / tcp
2087396567 | 2025-02-25T15:05:59.402276
45822 / tcp
-1036370807 | 2025-03-10T13:17:22.648679
46022 / tcp
-1114821551 | 2025-02-25T08:11:58.432039
46122 / tcp
-1839934832 | 2025-02-25T06:28:04.468409
46222 / tcp
-1392039491 | 2025-02-24T23:51:03.945091
46422 / tcp
677934968 | 2025-02-24T13:37:59.118205
47001 / tcp
-1730858130 | 2025-03-08T19:35:15.659253
47122 / tcp
-971970408 | 2025-02-23T23:17:17.767452
47522 / tcp
2087396567 | 2025-02-23T16:23:42.677529
47808 / tcp
2087396567 | 2025-03-24T04:37:31.332389
47990 / tcp
2087396567 | 2025-03-10T16:52:37.091855
48422 / tcp
819727972 | 2025-03-10T01:01:52.264595
48522 / tcp
671605376 | 2025-03-09T23:17:56.325810
48722 / tcp
1308377066 | 2025-02-24T16:36:16.490293
48888 / tcp
-1032713145 | 2025-03-24T02:33:20.275800
48922 / tcp
-971970408 | 2025-02-24T14:53:10.007141
49692 / tcp
921225407 | 2025-03-11T20:12:38.278617
49822 / tcp
2087396567 | 2025-02-22T21:08:28.824414
50000 / tcp
1767345577 | 2025-03-21T05:04:11.739664
50004 / tcp
819727972 | 2025-03-12T20:11:09.633754
50014 / tcp
-1733645023 | 2025-03-23T21:50:23.976167
50050 / tcp
401555314 | 2025-03-16T13:44:01.473223
50070 / tcp
-992671574 | 2025-03-22T01:05:27.603971
50100 / tcp
1308377066 | 2025-03-23T15:43:49.734854
50777 / tcp
-1399940268 | 2025-03-14T19:14:32.127713
51235 / tcp
669849225 | 2025-03-23T13:56:58.191038
51443 / tcp
-79865617 | 2025-03-12T01:33:11.812668
52022 / tcp
660175493 | 2025-03-07T01:18:40.242496
52200 / tcp
819727972 | 2025-03-04T19:49:46.533080
52869 / tcp
-1101712668 | 2025-03-21T14:45:22.297189
53022 / tcp
539065883 | 2025-03-07T08:16:03.644977
53200 / tcp
-1399940268 | 2025-03-17T16:14:03.083805
53481 / tcp
1911457608 | 2025-02-25T09:10:57.816771
54138 / tcp
921225407 | 2025-02-24T12:43:24.438715
54984 / tcp
1741579575 | 2025-03-21T07:43:09.040400
55422 / tcp
-1316491703 | 2025-03-06T18:24:02.751637
55443 / tcp
1887224352 | 2025-03-17T23:29:55.807335
55481 / tcp
-1888448627 | 2025-03-17T19:04:06.054840
55553 / tcp
-1097188123 | 2025-03-18T18:42:01.971259
55555 / tcp
-1406255272 | 2025-02-26T16:06:54.450183
55722 / tcp
2087396567 | 2025-03-06T20:06:47.945362
55822 / tcp
171352214 | 2025-03-06T22:30:35.243842
57622 / tcp
1492413928 | 2025-03-06T11:40:33.102484
57779 / tcp
-2096652808 | 2025-03-17T23:37:18.751362
58122 / tcp
2033888749 | 2025-03-06T03:25:46.287998
58222 / tcp
1741579575 | 2025-03-06T01:39:16.145952
58522 / tcp
-971970408 | 2025-03-05T20:27:53.613065
58722 / tcp
2087396567 | 2025-03-05T18:55:48.127643
60129 / tcp
-1013082686 | 2025-03-20T05:29:44.522038
61616 / tcp
-1136600457 | 2025-03-15T03:43:38.482465
62078 / tcp
-860824904 | 2025-03-10T06:56:11.715168
63210 / tcp
-1428621233 | 2025-03-15T00:06:22.968026
63256 / tcp
1189133115 | 2025-03-23T04:25:46.436273
63260 / tcp
1767345577 | 2025-03-16T10:27:42.835580
63676 / tcp
-339084706 | 2025-03-24T06:04:19.422235
64295 / tcp
632542934 | 2025-03-10T00:02:02.617563



Contact Us

Shodan ® - All rights reserved