· 6 years ago · Mar 18, 2020, 10:17 PM
1################################################################################################################################
2==================================================================================================================================
3Hostname www.alenamodel.com ISP IP Volume inc
4Continent Europe Flag
5NL
6Country Netherlands Country Code NL
7Region North Holland Local time 18 Mar 2020 21:50 CET
8City Amsterdam Postal Code 1091
9IP Address 94.102.51.112 Latitude 52.353
10 Longitude 4.909
11==================================================================================================================================
12###################################################################################################################################
13> www.alenamodel.com
14Server: 10.101.0.243
15Address: 10.101.0.243#53
16
17Non-authoritative answer:
18Name: www.alenamodel.com
19Address: 94.102.51.112
20>
21##################################################################################################################################
22 Domain Name: ALENAMODEL.COM
23 Registry Domain ID: 150946100_DOMAIN_COM-VRSN
24 Registrar WHOIS Server: whois.namesilo.com
25 Registrar URL: http://www.namesilo.com
26 Updated Date: 2020-02-29T00:07:37Z
27 Creation Date: 2005-04-14T23:05:56Z
28 Registry Expiry Date: 2021-04-14T23:05:56Z
29 Registrar: NameSilo, LLC
30 Registrar IANA ID: 1479
31 Registrar Abuse Contact Email: abuse@namesilo.com
32 Registrar Abuse Contact Phone: +1.4805240066
33 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
34 Name Server: NS1.MONCHEKIN.COM
35 Name Server: NS2.MONCHEKIN.COM
36 DNSSEC: unsigned
37##################################################################################################################################
38Domain Name: alenamodel.com
39Registry Domain ID: 150946100_DOMAIN_COM-VRSN
40Registrar WHOIS Server: whois.namesilo.com
41Registrar URL: https://www.namesilo.com/
42Updated Date: 2020-03-12T07:00:00Z
43Creation Date: 2005-04-14T07:00:00Z
44Registrar Registration Expiration Date: 2021-04-14T07:00:00Z
45Registrar: NameSilo, LLC
46Registrar IANA ID: 1479
47Registrar Abuse Contact Email: abuse@namesilo.com
48Registrar Abuse Contact Phone: +1.4805240066
49Domain Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
50Registry Registrant ID:
51Registrant Name: Domain Administrator
52Registrant Organization: See PrivacyGuardian.org
53Registrant Street: 1928 E. Highland Ave. Ste F104 PMB# 255
54Registrant City: Phoenix
55Registrant State/Province: AZ
56Registrant Postal Code: 85016
57Registrant Country: US
58Registrant Phone: +1.3478717726
59Registrant Phone Ext:
60Registrant Fax:
61Registrant Fax Ext:
62Registrant Email: pw-13dfda62f20b01bc79807513a5d0c54d@privacyguardian.org
63Registry Admin ID:
64Admin Name: Domain Administrator
65Admin Organization: See PrivacyGuardian.org
66Admin Street: 1928 E. Highland Ave. Ste F104 PMB# 255
67Admin City: Phoenix
68Admin State/Province: AZ
69Admin Postal Code: 85016
70Admin Country: US
71Admin Phone: +1.3478717726
72Admin Phone Ext:
73Admin Fax:
74Admin Fax Ext:
75Admin Email: pw-13dfda62f20b01bc79807513a5d0c54d@privacyguardian.org
76Registry Tech ID:
77Tech Name: Domain Administrator
78Tech Organization: See PrivacyGuardian.org
79Tech Street: 1928 E. Highland Ave. Ste F104 PMB# 255
80Tech City: Phoenix
81Tech State/Province: AZ
82Tech Postal Code: 85016
83Tech Country: US
84Tech Phone: +1.3478717726
85Tech Phone Ext:
86Tech Fax:
87Tech Fax Ext:
88Tech Email: pw-13dfda62f20b01bc79807513a5d0c54d@privacyguardian.org
89Name Server: ns1.monchekin.com
90Name Server: ns2.monchekin.com
91DNSSEC: unsigned
92#################################################################################################################################
93[+] Target : www.alenamodel.com
94
95[+] IP Address : 94.102.51.112
96
97[+] Headers :
98
99[+] Server : nginx
100[+] Date : Wed, 18 Mar 2020 20:57:07 GMT
101[+] Content-Type : text/html
102[+] Transfer-Encoding : chunked
103[+] Connection : keep-alive
104[+] Vary : Accept-Encoding
105[+] Content-Encoding : gzip
106
107[+] SSL Certificate Information :
108
109[-] SSL is not Present on Target URL...Skipping...
110
111[+] Whois Lookup :
112
113[+] NIR : None
114[+] ASN Registry : ripencc
115[+] ASN : 202425
116[+] ASN CIDR : 94.102.51.0/24
117[+] ASN Country Code : NL
118[+] ASN Date : 2008-08-29
119[+] ASN Description : INT-NETWORK, SC
120[+] cidr : 94.102.51.0/24
121[+] name : NET-4-51
122[+] handle : IVI24-RIPE
123[+] range : 94.102.51.0 - 94.102.51.255
124[+] description : IPV NETBLOCK
125[+] country : NL
126[+] state : None
127[+] city : None
128[+] address : Suite 9
129Victoria, Mahe
130Seychelles
131[+] postal_code : None
132[+] emails : None
133[+] created : 2019-02-04T13:25:18Z
134[+] updated : 2019-02-04T13:25:18Z
135
136[+] Crawling Target...
137
138[+] Looking for robots.txt........[ Not Found ]
139[+] Looking for sitemap.xml.......[ Not Found ]
140[+] Extracting CSS Links..........[ 0 ]
141[+] Extracting Javascript Links...[ 0 ]
142[+] Extracting Internal Links.....[ 0 ]
143[+] Extracting External Links.....[ 0 ]
144[+] Extracting Images.............[ 60 ]
145
146[+] Total Links Extracted : 60
147
148[+] Dumping Links in /opt/FinalRecon/dumps/www.alenamodel.com.dump
149[+] Completed!
150#################################################################################################################################
151[i] Scanning Site: http://www.alenamodel.com
152
153
154
155B A S I C I N F O
156====================
157
158
159[+] Site Title: Alena Child Model
160[+] IP address: 94.102.51.112
161[+] Web Server: nginx
162[+] CMS: Could Not Detect
163[+] Cloudflare: Not Detected
164[+] Robots File: Could NOT Find robots.txt!
165
166
167
168
169W H O I S L O O K U P
170========================
171
172 Domain Name: ALENAMODEL.COM
173 Registry Domain ID: 150946100_DOMAIN_COM-VRSN
174 Registrar WHOIS Server: whois.namesilo.com
175 Registrar URL: http://www.namesilo.com
176 Updated Date: 2020-02-29T00:07:37Z
177 Creation Date: 2005-04-14T23:05:56Z
178 Registry Expiry Date: 2021-04-14T23:05:56Z
179 Registrar: NameSilo, LLC
180 Registrar IANA ID: 1479
181 Registrar Abuse Contact Email: abuse@namesilo.com
182 Registrar Abuse Contact Phone: +1.4805240066
183 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
184 Name Server: NS1.MONCHEKIN.COM
185 Name Server: NS2.MONCHEKIN.COM
186 DNSSEC: unsigned
187 URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
188>>> Last update of whois database: 2020-03-18T20:57:07Z <<<
189
190For more information on Whois status codes, please visit https://icann.org/epp
191
192
193
194The Registry database contains ONLY .COM, .NET, .EDU domains and
195Registrars.
196
197
198
199
200G E O I P L O O K U P
201=========================
202
203[i] IP Address: 94.102.51.112
204[i] Country: Netherlands
205[i] State: North Holland
206[i] City: Amsterdam
207[i] Latitude: 52.35
208[i] Longitude: 4.9167
209
210
211
212
213H T T P H E A D E R S
214=======================
215
216
217[i] HTTP/1.1 200 OK
218[i] Server: nginx
219[i] Date: Wed, 18 Mar 2020 20:57:27 GMT
220[i] Content-Type: text/html
221[i] Connection: close
222[i] Vary: Accept-Encoding
223
224
225
226
227D N S L O O K U P
228===================
229
230alenamodel.com. 3599 IN SOA a13s08.host.com. root.example.com. 2018030600 3600 3600 604800 86400
231alenamodel.com. 3599 IN NS ns1.monchekin.com.
232alenamodel.com. 3599 IN NS ns2.monchekin.com.
233alenamodel.com. 3599 IN TXT "v=spf1 ip4:94.102.51.33 a mx ~all"
234alenamodel.com. 3599 IN MX 10 mail.alenamodel.com.
235alenamodel.com. 3599 IN MX 20 mail.alenamodel.com.
236alenamodel.com. 3599 IN A 94.102.51.112
237
238
239
240
241S U B N E T C A L C U L A T I O N
242====================================
243
244Address = 94.102.51.112
245Network = 94.102.51.112 / 32
246Netmask = 255.255.255.255
247Broadcast = not needed on Point-to-Point links
248Wildcard Mask = 0.0.0.0
249Hosts Bits = 0
250Max. Hosts = 1 (2^0 - 0)
251Host Range = { 94.102.51.112 - 94.102.51.112 }
252
253
254
255N M A P P O R T S C A N
256============================
257
258Starting Nmap 7.70 ( https://nmap.org ) at 2020-03-18 20:57 UTC
259Nmap scan report for alenamodel.com (94.102.51.112)
260Host is up (0.081s latency).
261rDNS record for 94.102.51.112: no-reverse-dns-configured.com
262
263PORT STATE SERVICE
26421/tcp filtered ftp
26522/tcp open ssh
26680/tcp open http
267443/tcp closed https
268
269Nmap done: 1 IP address (1 host up) scanned in 1.84 seconds
270
271
272
273S U B - D O M A I N F I N D E R
274==================================
275
276
277[i] Total Subdomains Found : 1
278
279[+] Subdomain: www.alenamodel.com
280[-] IP: 94.102.51.112
281###################################################################################################################################
282[+] Starting At 2020-03-18 16:58:34.020428
283[+] Collecting Information On: http://www.alenamodel.com/
284[#] Status: 200
285--------------------------------------------------
286[#] Web Server Detected: nginx
287[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
288- Server: nginx
289- Date: Wed, 18 Mar 2020 20:58:28 GMT
290- Content-Type: text/html
291- Transfer-Encoding: chunked
292- Connection: keep-alive
293- Vary: Accept-Encoding
294- Content-Encoding: gzip
295--------------------------------------------------
296[#] Finding Location..!
297[#] status: success
298[#] country: Netherlands
299[#] countryCode: NL
300[#] region: NH
301[#] regionName: North Holland
302[#] city: Amsterdam
303[#] zip: 1091
304[#] lat: 52.3534
305[#] lon: 4.9087
306[#] timezone: Europe/Amsterdam
307[#] isp: IP Volume inc
308[#] org: IP Volume inc
309[#] as: AS202425 IP Volume inc
310[#] query: 94.102.51.112
311--------------------------------------------------
312[x] Didn't Detect WAF Presence on: http://www.alenamodel.com/
313--------------------------------------------------
314[#] Starting Reverse DNS
315[-] Failed ! Fail
316--------------------------------------------------
317[!] Scanning Open Port
318[#] 22/tcp open ssh
319[#] 25/tcp open smtp
320[#] 53/tcp open domain
321[#] 80/tcp open http
322[#] 110/tcp open pop3
323[#] 143/tcp open imap
324[#] 465/tcp open smtps
325[#] 993/tcp open imaps
326[#] 995/tcp open pop3s
327--------------------------------------------------
328[+] Getting SSL Info
329[Errno 111] Connection refused
330--------------------------------------------------
331[+] Collecting Information Disclosure!
332[#] Detecting sitemap.xml file
333[-] sitemap.xml file not Found!?
334[#] Detecting robots.txt file
335[-] robots.txt file not Found!?
336[#] Detecting GNU Mailman
337[-] GNU Mailman App Not Detected!?
338--------------------------------------------------
339[+] Crawling Url Parameter On: http://www.alenamodel.com/
340--------------------------------------------------
341[#] Searching Html Form !
342[-] No Html Form Found!?
343--------------------------------------------------
344[-] No DOM Paramter Found!?
345--------------------------------------------------
346[-] No internal Dynamic Parameter Found!?
347--------------------------------------------------
348[-] No external Dynamic Paramter Found!?
349--------------------------------------------------
350[!] 5 Internal links Discovered
351[+] http://www.alenamodel.com//join.htm
352[+] http://www.alenamodel.com//join.htm
353[+] http://www.alenamodel.com//links.htm
354[+] http://www.alenamodel.com//members.htm
355[+] http://www.alenamodel.com//join.htm
356--------------------------------------------------
357[-] No External Link Found!?
358--------------------------------------------------
359[#] Mapping Subdomain..
360[!] Found 2 Subdomain
361- mail.alenamodel.com
362- www.alenamodel.com
363--------------------------------------------------
364[!] Done At 2020-03-18 16:59:06.704520
365#################################################################################################################################
366[INFO] ------TARGET info------
367[*] TARGET: http://www.alenamodel.com/
368[*] TARGET IP: 94.102.51.112
369[INFO] NO load balancer detected for www.alenamodel.com...
370[*] DNS servers: a13s08.host.com.
371[*] TARGET server: nginx
372[*] CC: NL
373[*] Country: Netherlands
374[*] RegionCode: NH
375[*] RegionName: North Holland
376[*] City: Amsterdam
377[*] ASN: AS202425
378[*] BGP_PREFIX: 94.102.51.0/24
379[*] ISP: INT-NETWORK IP Volume inc, SC
380[INFO] DNS enumeration:
381[*] ftp.alenamodel.com 94.102.51.112
382[*] mail.alenamodel.com 94.102.51.112
383[INFO] Possible abuse mails are:
384[*] abuse@alenamodel.com
385[*] abuse@ipvolume.net
386[*] abuse@www.alenamodel.com
387[INFO] NO PAC (Proxy Auto Configuration) file FOUND
388[INFO] Starting FUZZing in http://www.alenamodel.com/FUzZzZzZzZz...
389[INFO] Status code Folders
390[ALERT] Look in the source code. It may contain passwords
391[INFO] Links found from http://www.alenamodel.com/ http://94.102.51.112/:
392[*] http://www.alenamodel.com/join.htm
393[*] http://www.alenamodel.com/links.htm
394[*] http://www.alenamodel.com/members.htm
395[*] http://www.andypioneer.com/cgi-bin/accounts.cgi
396[*] http://www.andypioneer.com/cgi-bin/accounts.cgi?login
397[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=1000mo&url=http://1000models.net/
398[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=100nn&url=http://100nonude.net
399[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=alena&url=http://www.alenamodel.com
400[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=alesea&url=http%3a%2f%2fwww.aleseamodel.com
401[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=alesea&url=http://www.aleseamodel.com
402[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=artblo&url=http%3a%2f%2fart-models.info
403[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=artblo&url=http://art-models.info
404[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=artcool&url=http://coolarts.net/cgi-bin/in.cgi?id=51
405[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=bbbs&url=http%3a%2f%2fnnbbs.net
406[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=bbbs&url=http://nnbbs.net
407[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=bcma&url=http://www.bestcma.com/
408[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=candy&url=http%3a%2f%2fcandydoll-chan.com
409[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=candy&url=http://candydoll-chan.com
410[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=cmamag&url=http://www.cmamag.com
411[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=cmas&url=http://www.cma-starts.com/?ft=andypioneer.com
412[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=cmavid&url=http://www.cma-video.com/
413[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=cool&url=http://www.coolnymph.com/cgi-bin/rankem.cgi?id=andy
414[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=dolltop&url=http://www.nndoltop.com/cgi-bin/rankem.cgi?id=andy
415[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=dolmod&url=http%3a%2f%2fdolce-models.com
416[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=dolmod&url=http://dolce-models.com
417[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=dream&url=http%3a%2f%2fdream-models.net
418[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=dream&url=http://dream-models.net
419[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=drvid&url=http%3a%2f%2fdream-video.com%2f
420[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=drvid&url=http://dream-video.com/
421[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=eros&url=http://www.modland.info/eros/
422[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=fashi&url=http://models-fashion.net
423[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=finej&url=http%3a%2f%2fwww.fine-julia.com%2f
424[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=finej&url=http://www.fine-julia.com/
425[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=flash&url=http%3a%2f%2fflash-top.net%2fcgi-bin%2fin.cgi%3fid%3d57
426[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=flash&url=http://flash-top.net/cgi-bin/in.cgi?id=57
427[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=forum&url=http://forum-nn.com
428[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=gadinebe&url=http%3a%2f%2fwww.newnnmod.com%2f
429[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=gadinebe&url=http://www.newnnmod.com/
430[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=gagavuz&url=http%3a%2f%2fwww.newnnmod.com%2f
431[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=gagavuz&url=http://www.newnnmod.com/
432[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=gala&url=http://www.goodtalens.com/gala/
433[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=goodtale&url=http://www.goodtalens.com
434[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=hchat&url=http://hello-chat.com/cgi-bin/rank/in.cgi?id=6
435[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=heruqiru&url=http%3a%2f%2fsmallmodels.net%2fcgi-bin%2fin.cgi%3fid%3d104
436[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=heruqiru&url=http://smallmodels.net/cgi-bin/in.cgi?id=104
437[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=honeys&url=http://www.hongirls.com
438[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=img3d&url=http%3a%2f%2fwww.fineimages3d.com%2f
439[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=img3d&url=http://www.fineimages3d.com/
440[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=iraa&url=http://www.iramodel.com
441[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=katmod&url=http://www.katmod.com/
442[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=lina&url=http://www.linamodel.net/
443[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=littlem0&url=http%3a%2f%2fwww.newnnmod.com%2f
444[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=littlem0&url=http://www.newnnmod.com/
445[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=lsmodels&url=http%3a%2f%2fwww.goodtalens.com%2flsmodels%2f
446[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=lsmodels&url=http://www.goodtalens.com/lsmodels/
447[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=luisa&url=http%3a%2f%2fwww.luisamodel.com%2f
448[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=luisa&url=http://www.luisamodel.com/
449[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=masha&url=http://www.goodtalens.com/masha/
450[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=moblo&url=http%3a%2f%2fnnmodelblog.com%2f
451[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=moblo&url=http://nnmodelblog.com/
452[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=modart&url=http://ice-pie.com/cgi-bin/in.cgi?id=50
453[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=mode&url=http://www.models-top.com/cgi-bin/rankem.cgi?id=andy
454[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=modland&url=http%3a%2f%2fwww.modland.info
455[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=modland&url=http://www.modland.info
456[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=modlinks&url=http%3a%2f%2fwww.modlinka.com
457[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=modlinks&url=http://www.modlinka.com
458[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=mymod&url=http%3a%2f%2fmy-models.net%2f
459[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=mymod&url=http://my-models.net/
460[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=nedphoto&url=http%3a%2f%2fteenmodels.club%2flanding%2f
461[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=nedphoto&url=http://teenmodels.club/landing/
462[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=newadd&url=http%3a%2f%2fwww.goodtalens.com%2fnewadd%2f
463[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=newadd&url=http://www.goodtalens.com/newadd/
464[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=newcma&url=http://newyear.modlinka.com
465[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=nnbook&url=http%3a%2f%2fnonubook.com
466[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=nnbook&url=http://nonubook.com
467[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=nnclub&url=http%3a%2f%2fnonuclub.com
468[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=nnclub&url=http://nonuclub.com
469[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=nndol&url=http://www.nndolmod.com
470[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=nnmds&url=http://nonublog.com
471[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=nnntop&url=http%3a%2f%2fnn-top.com%2fcgi-bin%2fin.cgi%3fid%3d81
472[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=nnntop&url=http://nn-top.com/cgi-bin/in.cgi?id=81
473[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=noncha&url=http%3a%2f%2fnonu-chan.com
474[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=noncha&url=http://nonu-chan.com
475[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=nonin&url=http%3a%2f%2fnonutop.com%2fcgi-bin%2fin.cgi%3fid%3d31
476[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=nonin&url=http://nonutop.com/cgi-bin/in.cgi?id=31
477[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=nonstop&url=http://www.nonstop-nn.net/cgi-bin/in.cgi?id=158
478[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=nonudere&url=http%3a%2f%2fnonude.re
479[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=nonudere&url=http://nonude.re
480[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=nonufo&url=http://nonuforum.com/
481[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=nonuwad3&url=http://nonude-top.xyz/cgi-bin/in.cgi?id=52
482[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=nonuwad4&url=http://nonude-top.info/cgi-bin/in.cgi?id=17
483[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=nostar&url=http%3a%2f%2fnonustars.com%2fcgi-bin%2fin.cgi%3fid%3d80
484[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=nostar&url=http://nonustars.com/cgi-bin/in.cgi?id=80
485[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=olam&url=http://www.olamodel.com/
486[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=olesya&url=http://www.olesyamodel.com
487[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=olyam&url=http://www.olyamodel.com
488[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=onegirl&url=http%3a%2f%2fwww.honeymod.com%2f%3fft%3dandypioneer.com
489[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=onegirl&url=http://www.honeymod.com/?ft=andypioneer.com
490[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=picasa&url=http://nnville.net/
491[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=pisonahe&url=http%3a%2f%2fwww.newnnmod.com%2f
492[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=pisonahe&url=http://www.newnnmod.com/
493[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=play&url=http://www.playing-girl.com
494[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=prd4u&url=http%3a%2f%2fnn-magazine.com
495[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=prd4u&url=http://nn-magazine.com
496[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=pre10mix&url=http%3a%2f%2fpre10mix.com%2fsite%2ftop-list%2f%3fide%3d674
497[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=pre10mix&url=http://pre10mix.com/site/top-list/?ide=674
498[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=preteen2&url=http%3a%2f%2fwww.newnnmod.com%2f
499[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=preteen2&url=http://www.newnnmod.com/
500[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=qoqupave&url=http%3a%2f%2fwww.cinderella-dreams.org%2fcgi-bin%2fin.cgi%3fid%3d844
501[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=qoqupave&url=http://www.cinderella-dreams.org/cgi-bin/in.cgi?id=844
502[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=share&url=http%3a%2f%2fshare-chan.com
503[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=share&url=http://share-chan.com
504[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=sotatuna&url=http%3a%2f%2fnew.nnmodsets.com
505[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=sotatuna&url=http://new.nnmodsets.com
506[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=stars&url=http://www.goodtalens.com/stars/
507[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=star&url=http%3a%2f%2fcute-stars.net
508[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=star&url=http://cute-stars.net
509[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=summer&url=http://www.summmerdays.com/
510[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=svetam&url=http://www.svetamodel.com
511[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=sveta&url=http://www.svetamodel.net/cgi-bin/top/rankem.cgi?id=andy
512[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=svetlana&url=http://www.svetlanamodel.com/
513[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=sweet&url=http://top.modlinka.com/cgi-bin/rankem.cgi?id=andy
514[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=talents&url=http://www.talyoungart.com
515[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=tart&url=http://www.goodtalens.com/talent/
516[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=teenbl&url=http%3a%2f%2fteensblog.net%2f
517[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=teenbl&url=http://teensblog.net/
518[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=teen&url=http://www.fteenimg.com/?ft=andypioneer.com
519[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=they18&url=http%3a%2f%2fnew.nnmodsets.com
520[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=they18&url=http://new.nnmodsets.com
521[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=thind&url=http://modlinka.com/thind/
522[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=tiana&url=http%3a%2f%2fwww.tianamodel.com%2f
523[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=tiana&url=http://www.tianamodel.com/
524[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=ultra&url=http://www.honey-ultra.com/
525[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=vasia&url=http%3a%2f%2fwww.vasilisamodel.com%2f
526[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=vasia&url=http://www.vasilisamodel.com/
527[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=vinka&url=http://www.vinkamodel.com/
528[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=wonder&url=http://www.wonteens.com/?ft=andypioneer.com
529[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=wowmod&url=http://www.wownm.com/?ft=andypioneer.com
530[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=yood&url=http%3a%2f%2fyour-model.com
531[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=yood&url=http://your-model.com
532[*] http://www.andypioneer.com/cgi-bin/out.cgi?id=young&url=http://www.young-models.info/cgi-bin/rankem.cgi?id=andy
533[*] http://www.bestcma.com/
534[*] http://www.goodtalens.com/diapers/
535[*] http://www.goodtalens.com/kitty/
536[*] http://www.goodtalens.com/lsmodels/
537[*] http://www.goodtalens.com/secret/
538[*] http://www.goodtalens.com/usenet/
539[*] http://www.honey-ultra.com/
540[*] http://www.newnnmod.com/
541[*] http://www.nndoltop.com/models/
542[*] http://www.nnmodsets.com/
543[*] http://www.talyoungart.com/
544[INFO] GOOGLE has Search instead for www.alenamodel.com about http://www.alenamodel.com/
545[INFO] Shodan detected the following opened ports on 94.102.51.112:
546[*] 1
547[*] 110
548[*] 143
549[*] 22
550[*] 25
551[*] 4
552[*] 465
553[*] 53
554[*] 80
555[*] 993
556[*] 995
557[INFO] ------VirusTotal SECTION------
558[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
559[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
560[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
561[INFO] ------Alexa Rank SECTION------
562[INFO] Percent of Visitors Rank in Country:
563[INFO] Percent of Search Traffic:
564[INFO] Percent of Unique Visits:
565[INFO] Total Sites Linking In:
566[*] Total Sites
567[INFO] Useful links related to www.alenamodel.com - 94.102.51.112:
568[*] https://www.virustotal.com/pt/ip-address/94.102.51.112/information/
569[*] https://www.hybrid-analysis.com/search?host=94.102.51.112
570[*] https://www.shodan.io/host/94.102.51.112
571[*] https://www.senderbase.org/lookup/?search_string=94.102.51.112
572[*] https://www.alienvault.com/open-threat-exchange/ip/94.102.51.112
573[*] http://pastebin.com/search?q=94.102.51.112
574[*] http://urlquery.net/search.php?q=94.102.51.112
575[*] http://www.alexa.com/siteinfo/www.alenamodel.com
576[*] http://www.google.com/safebrowsing/diagnostic?site=www.alenamodel.com
577[*] https://censys.io/ipv4/94.102.51.112
578[*] https://www.abuseipdb.com/check/94.102.51.112
579[*] https://urlscan.io/search/#94.102.51.112
580[*] https://github.com/search?q=94.102.51.112&type=Code
581[INFO] Useful links related to AS202425 - 94.102.51.0/24:
582[*] http://www.google.com/safebrowsing/diagnostic?site=AS:202425
583[*] https://www.senderbase.org/lookup/?search_string=94.102.51.0/24
584[*] http://bgp.he.net/AS202425
585[*] https://stat.ripe.net/AS202425
586[INFO] Date: 18/03/20 | Time: 16:59:53
587[INFO] Total time: 1 minute(s) and 22 second(s)
588#################################################################################################################################
589Trying "alenamodel.com"
590;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 22353
591;; flags: qr rd ra; QUERY: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 2
592
593;; QUESTION SECTION:
594;alenamodel.com. IN ANY
595
596;; ANSWER SECTION:
597alenamodel.com. 3600 IN A 94.102.51.112
598alenamodel.com. 3600 IN MX 20 mail.alenamodel.com.
599alenamodel.com. 3600 IN MX 10 mail.alenamodel.com.
600alenamodel.com. 3600 IN TXT "v=spf1 ip4:94.102.51.33 a mx ~all"
601alenamodel.com. 3600 IN SOA a13s08.host.com. root.example.com. 2018030600 3600 3600 604800 86400
602alenamodel.com. 3600 IN NS ns2.monchekin.com.
603alenamodel.com. 3600 IN NS ns1.monchekin.com.
604
605;; ADDITIONAL SECTION:
606ns2.monchekin.com. 5291 IN A 94.102.51.112
607ns1.monchekin.com. 5291 IN A 94.102.51.111
608
609Received 270 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 112 ms
610################################################################################################################################
611
612; <<>> DiG 9.11.16-2-Debian <<>> +trace alenamodel.com any
613;; global options: +cmd
614. 86400 IN NS m.root-servers.net.
615. 86400 IN NS b.root-servers.net.
616. 86400 IN NS c.root-servers.net.
617. 86400 IN NS d.root-servers.net.
618. 86400 IN NS e.root-servers.net.
619. 86400 IN NS f.root-servers.net.
620. 86400 IN NS g.root-servers.net.
621. 86400 IN NS h.root-servers.net.
622. 86400 IN NS a.root-servers.net.
623. 86400 IN NS i.root-servers.net.
624. 86400 IN NS j.root-servers.net.
625. 86400 IN NS k.root-servers.net.
626. 86400 IN NS l.root-servers.net.
627. 86400 IN RRSIG NS 8 0 518400 20200331170000 20200318160000 33853 . qgasYmvTaMw/ft2FJz7Ze3a8EYdfzDR3E/n9ffoT8zkgJZhW74Yf1Tdn yt7zJUoZjZSL0px3bOccsey7rwAAt7PG3PKsG50hINxFU/G65DdLn5Fe 0E3wqLh7J2oix+own3AHEUyntF3nuL/surpqvvZpLoS+DU4enbMfJlZf KSu2/73I+n6tx57gGWnekkFlgq7JVBS6MDry5UsFR4C3GwBInUqcFiQQ ATVi6s9+xcWmTWhUOLtZa9JyStBDWanch24001hD51VLFix7DOnA1+oG 9IcdQjqO4WTbzk2TgfRGNvax6IPeVWwLOTaDfpH/1UjfqI6OVNldnXSE xBsI6g==
628;; Received 525 bytes from 10.101.0.243#53(10.101.0.243) in 346 ms
629
630com. 172800 IN NS g.gtld-servers.net.
631com. 172800 IN NS e.gtld-servers.net.
632com. 172800 IN NS f.gtld-servers.net.
633com. 172800 IN NS b.gtld-servers.net.
634com. 172800 IN NS h.gtld-servers.net.
635com. 172800 IN NS m.gtld-servers.net.
636com. 172800 IN NS a.gtld-servers.net.
637com. 172800 IN NS k.gtld-servers.net.
638com. 172800 IN NS j.gtld-servers.net.
639com. 172800 IN NS c.gtld-servers.net.
640com. 172800 IN NS d.gtld-servers.net.
641com. 172800 IN NS i.gtld-servers.net.
642com. 172800 IN NS l.gtld-servers.net.
643com. 86400 IN DS 30909 8 2 E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CF C41A5766
644com. 86400 IN RRSIG DS 8 1 86400 20200331170000 20200318160000 33853 . IqOJ6nE+fKiwc8jNJy+qBpMo2fMSJSYGRbfNO6sz4VejsuoYGDuEdrb4 g/bcwebIXaCWIn/d3pOQaf7f0jweWvykYr4uyKj6Q1fu+ppvzLHyvLxw +OmqOStuZXXgw/kiMEyEFaRGuFShZd74clSc/LJnOjtRXZ3vIb1LSXZZ cTT9nBKIgCe/yS/cbZwWLdkoK4q0vqEJgcdIhdrUsghfti+EVAieq/W/ lYuafNiOdh474NuPdJLM1FRdYey49TLVdyUoZ8n3M+JmRygPLEqH4RAk BFN5Z0DZsWEj7Ny/gAxnxApvM3w1Bog9X4Zl9DvI5DV53Ek4U2b7GCd3 ijCY4Q==
645;; Received 1202 bytes from 192.36.148.17#53(i.root-servers.net) in 343 ms
646
647alenamodel.com. 172800 IN NS ns1.monchekin.com.
648alenamodel.com. 172800 IN NS ns2.monchekin.com.
649CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN NSEC3 1 1 0 - CK0Q1GIN43N1ARRC9OSM6QPQR81H5M9A NS SOA RRSIG DNSKEY NSEC3PARAM
650CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN RRSIG NSEC3 8 2 86400 20200322044927 20200315033927 56311 com. pKi3j2T+MmOgxjdmTcZS3YYGSfTSSb0jX5woxUr9roiXvsiM6gxczhHa 43lZFia30VmrYsRNrA43ddnO03iC0bAU0QOfsMSZ0SasKx6fAb+Ynj0H Z/MlenueBOVWr11KlixRNF5hZgLIl+c/+nVM48BkKM6Xfoju4j8+Wedm Nm9phbpnEyd+awJ31vZJAvXDfwOT1SAqqKEq2F06iYoR4g==
6518AFJLG02KUARSJ3VEONCP2U9TAQQGULC.com. 86400 IN NSEC3 1 1 0 - 8AFKK5QJ6TTPHPSO0AH7KQG1ICTENO4B NS DS RRSIG
6528AFJLG02KUARSJ3VEONCP2U9TAQQGULC.com. 86400 IN RRSIG NSEC3 8 2 86400 20200322043205 20200315032205 56311 com. CDWol1no0V2bE3khlSoKHPlu2pnhx/E+97RI/1dma9oppbB0VcvSAbT6 zOG5O6M0mRL3eAEZJp8xEjvK6GJqrslFL6mLQ+Xx5A9evwa2RVESH+Ac jkO8n1ckrJLCsdNna9TRMha+Ghwmsl6zg/YHd7aJxz3FccF7Ptw4M09Z bDL6HSwh6VjP8dDoG/TPWZAOB/UkHIg+5/F9N1tdEkJN7w==
653;; Received 670 bytes from 2001:503:d2d::30#53(k.gtld-servers.net) in 101 ms
654
655alenamodel.com. 3600 IN SOA a13s08.host.com. root.example.com. 2018030600 3600 3600 604800 86400
656alenamodel.com. 3600 IN NS ns1.monchekin.com.
657alenamodel.com. 3600 IN NS ns2.monchekin.com.
658alenamodel.com. 3600 IN TXT "v=spf1 ip4:94.102.51.33 a mx ~all"
659alenamodel.com. 3600 IN MX 10 mail.alenamodel.com.
660alenamodel.com. 3600 IN MX 20 mail.alenamodel.com.
661alenamodel.com. 3600 IN A 94.102.51.112
662;; Received 297 bytes from 94.102.51.112#53(ns2.monchekin.com) in 341 ms
663###################################################################################################################################
664traceroute to www.alenamodel.com (94.102.51.112), 30 hops max, 60 byte packets
665 1 _gateway (10.202.12.1) 129.220 ms 129.167 ms 129.139 ms
666 2 unn-84-17-52-126.cdn77.com (84.17.52.126) 129.112 ms 129.073 ms 129.043 ms
667 3 vl1337.fra-itx2-core-1.cdn77.com (185.229.188.4) 129.015 ms 128.989 ms 128.959 ms
668 4 he-net.peering.cz (91.213.211.118) 201.857 ms 201.835 ms 201.803 ms
669 5 100ge16-1.core1.fra1.he.net (184.105.213.233) 128.796 ms 315.693 ms 315.665 ms
670 6 100ge11-1.core1.fra2.he.net (72.52.92.86) 315.633 ms 672.172 ms 672.144 ms
671 7 100ge0-54.core1.ams2.he.net (184.104.192.130) 672.138 ms 672.153 ms *
672 8 100ge2-1.core1.ams1.he.net (184.104.192.129) 672.136 ms no-reverse-dns-configured.com (94.102.51.112) 672.119 ms 100ge2-1.core1.ams1.he.net (184.104.192.129) 672.080 ms
673#################################################################################################################################
674Domains still to check: 1
675 Checking if the hostname alenamodel.com. given is in fact a domain...
676
677Analyzing domain: alenamodel.com.
678 Checking NameServers using system default resolver...
679 IP: 94.102.51.111 (Netherlands)
680 HostName: ns1.monchekin.com Type: NS
681 IP: 94.102.51.112 (Netherlands)
682 HostName: ns2.monchekin.com Type: NS
683 HostName: no-reverse-dns-configured.com Type: PTR
684
685 Checking MailServers using system default resolver...
686 IP: 94.102.51.112 (Netherlands)
687 HostName: ns2.monchekin.com Type: NS
688 HostName: no-reverse-dns-configured.com Type: PTR
689 HostName: mail.alenamodel.com Type: MX
690 IP: 94.102.51.112 (Netherlands)
691 HostName: ns2.monchekin.com Type: NS
692 HostName: no-reverse-dns-configured.com Type: PTR
693 HostName: mail.alenamodel.com Type: MX
694 HostName: mail.alenamodel.com Type: MX
695
696 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
697 No zone transfer found on nameserver 94.102.51.112
698 No zone transfer found on nameserver 94.102.51.111
699
700 Checking SPF record...
701 New IP found: 94.102.51.33
702
703 Checking 192 most common hostnames using system default resolver...
704 IP: 94.102.51.112 (Netherlands)
705 HostName: ns2.monchekin.com Type: NS
706 HostName: no-reverse-dns-configured.com Type: PTR
707 HostName: mail.alenamodel.com Type: MX
708 HostName: mail.alenamodel.com Type: MX
709 HostName: www.alenamodel.com. Type: A
710 IP: 94.102.51.112 (Netherlands)
711 HostName: ns2.monchekin.com Type: NS
712 HostName: no-reverse-dns-configured.com Type: PTR
713 HostName: mail.alenamodel.com Type: MX
714 HostName: mail.alenamodel.com Type: MX
715 HostName: www.alenamodel.com. Type: A
716 HostName: ftp.alenamodel.com. Type: A
717 IP: 94.102.51.112 (Netherlands)
718 HostName: ns2.monchekin.com Type: NS
719 HostName: no-reverse-dns-configured.com Type: PTR
720 HostName: mail.alenamodel.com Type: MX
721 HostName: mail.alenamodel.com Type: MX
722 HostName: www.alenamodel.com. Type: A
723 HostName: ftp.alenamodel.com. Type: A
724 HostName: mail.alenamodel.com. Type: A
725 IP: 94.102.51.112 (Netherlands)
726 HostName: ns2.monchekin.com Type: NS
727 HostName: no-reverse-dns-configured.com Type: PTR
728 HostName: mail.alenamodel.com Type: MX
729 HostName: mail.alenamodel.com Type: MX
730 HostName: www.alenamodel.com. Type: A
731 HostName: ftp.alenamodel.com. Type: A
732 HostName: mail.alenamodel.com. Type: A
733 HostName: smtp.alenamodel.com. Type: A
734 IP: 94.102.51.112 (Netherlands)
735 HostName: ns2.monchekin.com Type: NS
736 HostName: no-reverse-dns-configured.com Type: PTR
737 HostName: mail.alenamodel.com Type: MX
738 HostName: mail.alenamodel.com Type: MX
739 HostName: www.alenamodel.com. Type: A
740 HostName: ftp.alenamodel.com. Type: A
741 HostName: mail.alenamodel.com. Type: A
742 HostName: smtp.alenamodel.com. Type: A
743 HostName: pop.alenamodel.com. Type: A
744
745 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
746 Checking netblock 94.102.51.0
747
748 Searching for alenamodel.com. emails in Google
749
750 Checking 3 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
751 Host 94.102.51.33 is up (syn-ack ttl 58)
752 Host 94.102.51.112 is up (syn-ack ttl 58)
753 Host 94.102.51.111 is up (syn-ack ttl 58)
754
755 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
756 Scanning ip 94.102.51.33 ():
757 22/tcp open ssh syn-ack ttl 58 OpenSSH 7.4 (protocol 2.0)
758 | ssh-hostkey:
759 | 2048 27:10:8b:2d:55:3f:93:10:9f:ba:60:48:15:2f:0d:a4 (RSA)
760 | 256 0d:61:df:64:d8:cf:76:01:c2:57:79:de:ef:12:b2:8a (ECDSA)
761 |_ 256 e8:da:20:c5:36:c1:5b:ec:a6:43:e9:8b:76:a9:43:96 (ED25519)
762 25/tcp open smtp syn-ack ttl 58 Exim smtpd 4.89
763 | smtp-commands: a13s08.host.com Hello nmap.scanme.org [84.17.52.74], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, CHUNKING, STARTTLS, HELP,
764 |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
765 | ssl-cert: Subject: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
766 | Issuer: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
767 | Public Key type: rsa
768 | Public Key bits: 1024
769 | Signature Algorithm: sha256WithRSAEncryption
770 | Not valid before: 2018-03-05T07:49:40
771 | Not valid after: 2028-03-02T07:49:40
772 | MD5: 5725 8193 eba3 6655 85e8 03ba ac88 3a0d
773 |_SHA-1: b25e d398 61f7 f64d 48ec a833 2fc2 ec3d 818c 497b
774 |_ssl-date: TLS randomness does not represent time
775 53/tcp open domain syn-ack ttl 58 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
776 | dns-nsid:
777 |_ bind.version: 9.9.4-RedHat-9.9.4-51.el7_4.2
778 80/tcp open http syn-ack ttl 58 nginx
779 |_http-favicon: Unknown favicon MD5: 1DD7E26D04237FA651903A0917D57955
780 |_http-generator: Microsoft FrontPage 5.0
781 | http-methods:
782 | Supported Methods: POST OPTIONS GET HEAD TRACE
783 |_ Potentially risky methods: TRACE
784 |_http-title: Andy Pioneer Top Sites
785 110/tcp open pop3 syn-ack ttl 58 Dovecot pop3d
786 |_pop3-capabilities: PIPELINING AUTH-RESP-CODE CAPA RESP-CODES STLS UIDL TOP SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) USER
787 |_ssl-date: TLS randomness does not represent time
788 143/tcp open imap syn-ack ttl 58 Dovecot imapd
789 |_imap-capabilities: Pre-login ID more AUTH=LOGIN have IDLE SASL-IR AUTH=CRAM-MD5A0001 STARTTLS listed AUTH=PLAIN OK post-login ENABLE LOGIN-REFERRALS capabilities LITERAL+ AUTH=DIGEST-MD5 IMAP4rev1
790 |_ssl-date: TLS randomness does not represent time
791 465/tcp open ssl/smtp syn-ack ttl 58 Exim smtpd 4.89
792 |_smtp-commands: SMTP EHLO nmap.scanme.org: failed to receive data: failed to receive data
793 | ssl-cert: Subject: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
794 | Issuer: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
795 | Public Key type: rsa
796 | Public Key bits: 1024
797 | Signature Algorithm: sha256WithRSAEncryption
798 | Not valid before: 2018-03-05T07:49:40
799 | Not valid after: 2028-03-02T07:49:40
800 | MD5: 5725 8193 eba3 6655 85e8 03ba ac88 3a0d
801 |_SHA-1: b25e d398 61f7 f64d 48ec a833 2fc2 ec3d 818c 497b
802 |_ssl-date: TLS randomness does not represent time
803 993/tcp open ssl/imaps? syn-ack ttl 58
804 |_ssl-date: TLS randomness does not represent time
805 995/tcp open ssl/pop3s? syn-ack ttl 58
806 |_ssl-date: TLS randomness does not represent time
807 OS Info: Service Info: Host: a13s08.host.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
808 Scanning ip 94.102.51.112 (pop.alenamodel.com.):
809 22/tcp open ssh? syn-ack ttl 58
810 |_ssh-hostkey: ERROR: Script execution failed (use -d to debug)
811 25/tcp open smtp syn-ack ttl 58 Exim smtpd 4.89
812 | smtp-commands: a13s08.host.com Hello nmap.scanme.org [84.17.52.74], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, CHUNKING, STARTTLS, HELP,
813 |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
814 | ssl-cert: Subject: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
815 | Issuer: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
816 | Public Key type: rsa
817 | Public Key bits: 1024
818 | Signature Algorithm: sha256WithRSAEncryption
819 | Not valid before: 2018-03-05T07:49:40
820 | Not valid after: 2028-03-02T07:49:40
821 | MD5: 5725 8193 eba3 6655 85e8 03ba ac88 3a0d
822 |_SHA-1: b25e d398 61f7 f64d 48ec a833 2fc2 ec3d 818c 497b
823 53/tcp open domain syn-ack ttl 58 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
824 | dns-nsid:
825 |_ bind.version: 9.9.4-RedHat-9.9.4-51.el7_4.2
826 80/tcp open http syn-ack ttl 58 nginx
827 |_http-favicon: Unknown favicon MD5: 1DD7E26D04237FA651903A0917D57955
828 |_http-generator: Microsoft FrontPage 5.0
829 | http-methods:
830 | Supported Methods: POST OPTIONS GET HEAD TRACE
831 |_ Potentially risky methods: TRACE
832 |_http-title: Andy Pioneer Top Sites
833 110/tcp open pop3 syn-ack ttl 58 Dovecot pop3d
834 |_pop3-capabilities: TOP STLS SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) CAPA PIPELINING UIDL USER RESP-CODES AUTH-RESP-CODE
835 |_ssl-date: TLS randomness does not represent time
836 143/tcp open imap syn-ack ttl 58 Dovecot imapd
837 |_imap-capabilities: capabilities OK ENABLE IMAP4rev1 STARTTLS AUTH=CRAM-MD5A0001 listed post-login more have SASL-IR IDLE AUTH=DIGEST-MD5 AUTH=PLAIN ID LOGIN-REFERRALS AUTH=LOGIN Pre-login LITERAL+
838 |_ssl-date: TLS randomness does not represent time
839 465/tcp open ssl/smtp syn-ack ttl 58 Exim smtpd 4.89
840 |_smtp-commands: SMTP EHLO nmap.scanme.org: failed to receive data: failed to receive data
841 | ssl-cert: Subject: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
842 | Issuer: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
843 | Public Key type: rsa
844 | Public Key bits: 1024
845 | Signature Algorithm: sha256WithRSAEncryption
846 | Not valid before: 2018-03-05T07:49:40
847 | Not valid after: 2028-03-02T07:49:40
848 | MD5: 5725 8193 eba3 6655 85e8 03ba ac88 3a0d
849 |_SHA-1: b25e d398 61f7 f64d 48ec a833 2fc2 ec3d 818c 497b
850 |_ssl-date: TLS randomness does not represent time
851 993/tcp open ssl/imaps? syn-ack ttl 58
852 |_ssl-date: TLS randomness does not represent time
853 995/tcp open ssl/pop3s? syn-ack ttl 58
854 |_ssl-date: TLS randomness does not represent time
855 OS Info: Service Info: Host: a13s08.host.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
856 Scanning ip 94.102.51.111 (ns1.monchekin.com):
857 22/tcp open ssh? syn-ack ttl 58
858 |_ssh-hostkey: ERROR: Script execution failed (use -d to debug)
859 25/tcp open smtp syn-ack ttl 58 Exim smtpd 4.89
860 | smtp-commands: a13s08.host.com Hello nmap.scanme.org [84.17.52.74], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, CHUNKING, STARTTLS, HELP,
861 |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
862 | ssl-cert: Subject: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
863 | Issuer: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
864 | Public Key type: rsa
865 | Public Key bits: 1024
866 | Signature Algorithm: sha256WithRSAEncryption
867 | Not valid before: 2018-03-05T07:49:40
868 | Not valid after: 2028-03-02T07:49:40
869 | MD5: 5725 8193 eba3 6655 85e8 03ba ac88 3a0d
870 |_SHA-1: b25e d398 61f7 f64d 48ec a833 2fc2 ec3d 818c 497b
871 |_ssl-date: TLS randomness does not represent time
872 53/tcp open domain syn-ack ttl 58 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
873 | dns-nsid:
874 |_ bind.version: 9.9.4-RedHat-9.9.4-51.el7_4.2
875 80/tcp open http syn-ack ttl 58 nginx
876 |_http-favicon: Unknown favicon MD5: 1DD7E26D04237FA651903A0917D57955
877 |_http-generator: Microsoft FrontPage 5.0
878 | http-methods:
879 | Supported Methods: POST OPTIONS GET HEAD TRACE
880 |_ Potentially risky methods: TRACE
881 |_http-title: Andy Pioneer Top Sites
882 110/tcp open pop3 syn-ack ttl 58 Dovecot pop3d
883 |_pop3-capabilities: STLS AUTH-RESP-CODE UIDL TOP SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) CAPA USER PIPELINING RESP-CODES
884 |_ssl-date: TLS randomness does not represent time
885 143/tcp open imap syn-ack ttl 58 Dovecot imapd
886 |_imap-capabilities: ID AUTH=CRAM-MD5A0001 AUTH=DIGEST-MD5 capabilities Pre-login have more AUTH=PLAIN AUTH=LOGIN ENABLE IMAP4rev1 post-login LOGIN-REFERRALS SASL-IR IDLE STARTTLS listed OK LITERAL+
887 |_ssl-date: TLS randomness does not represent time
888 465/tcp open ssl/smtp syn-ack ttl 58 Exim smtpd 4.89
889 |_smtp-commands: a13s08.host.com Hello nmap.scanme.org [84.17.52.74], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, CHUNKING, HELP,
890 | ssl-cert: Subject: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
891 | Issuer: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
892 | Public Key type: rsa
893 | Public Key bits: 1024
894 | Signature Algorithm: sha256WithRSAEncryption
895 | Not valid before: 2018-03-05T07:49:40
896 | Not valid after: 2028-03-02T07:49:40
897 | MD5: 5725 8193 eba3 6655 85e8 03ba ac88 3a0d
898 |_SHA-1: b25e d398 61f7 f64d 48ec a833 2fc2 ec3d 818c 497b
899 |_ssl-date: TLS randomness does not represent time
900 993/tcp open ssl/imaps? syn-ack ttl 58
901 |_ssl-date: TLS randomness does not represent time
902 995/tcp open ssl/pop3s? syn-ack ttl 58
903 |_ssl-date: TLS randomness does not represent time
904 OS Info: Service Info: Host: a13s08.host.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
905 WebCrawling domain's web servers... up to 50 max links.
906
907 + URL to crawl: http://mail.alenamodel.com.
908 + Date: 2020-03-18
909
910 + Crawling URL: http://mail.alenamodel.com.:
911 + Links:
912 + Crawling http://mail.alenamodel.com.
913 + Searching for directories...
914 + Searching open folders...
915
916
917 + URL to crawl: http://ns2.monchekin.com
918 + Date: 2020-03-18
919
920 + Crawling URL: http://ns2.monchekin.com:
921 + Links:
922 + Crawling http://ns2.monchekin.com
923 + Searching for directories...
924 + Searching open folders...
925
926
927 + URL to crawl: http://pop.alenamodel.com.
928 + Date: 2020-03-18
929
930 + Crawling URL: http://pop.alenamodel.com.:
931 + Links:
932 + Crawling http://pop.alenamodel.com.
933 + Searching for directories...
934 + Searching open folders...
935
936
937 + URL to crawl: http://mail.alenamodel.com
938 + Date: 2020-03-18
939
940 + Crawling URL: http://mail.alenamodel.com:
941 + Links:
942 + Crawling http://mail.alenamodel.com
943 + Searching for directories...
944 + Searching open folders...
945
946
947 + URL to crawl: http://ftp.alenamodel.com.
948 + Date: 2020-03-18
949
950 + Crawling URL: http://ftp.alenamodel.com.:
951 + Links:
952 + Crawling http://ftp.alenamodel.com.
953 + Searching for directories...
954 + Searching open folders...
955
956
957 + URL to crawl: http://smtp.alenamodel.com.
958 + Date: 2020-03-18
959
960 + Crawling URL: http://smtp.alenamodel.com.:
961 + Links:
962 + Crawling http://smtp.alenamodel.com.
963 + Searching for directories...
964 + Searching open folders...
965
966
967 + URL to crawl: http://www.alenamodel.com.
968 + Date: 2020-03-18
969
970 + Crawling URL: http://www.alenamodel.com.:
971 + Links:
972 + Crawling http://www.alenamodel.com.
973 + Crawling http://www.alenamodel.com./join.htm
974 + Crawling http://www.alenamodel.com./links.htm
975 + Crawling http://www.alenamodel.com./members.htm
976 + Crawling http://www.alenamodel.com./index.htm
977 + Searching for directories...
978 - Found: http://www.alenamodel.com./images/
979 - Found: http://www.alenamodel.com./imagestop/
980 + Searching open folders...
981 - http://www.alenamodel.com./images/ (403 Forbidden)
982 - http://www.alenamodel.com./imagestop/ (403 Forbidden)
983 + Crawl finished successfully.
984----------------------------------------------------------------------
985Summary of http://http://www.alenamodel.com.
986----------------------------------------------------------------------
987+ Links crawled:
988 - http://www.alenamodel.com.
989 - http://www.alenamodel.com./index.htm
990 - http://www.alenamodel.com./join.htm
991 - http://www.alenamodel.com./links.htm
992 - http://www.alenamodel.com./members.htm
993 Total links crawled: 5
994
995+ Links to files found:
996 - http://www.alenamodel.com./button1.jpg
997 - http://www.alenamodel.com./button2.jpg
998 - http://www.alenamodel.com./button3.jpg
999 - http://www.alenamodel.com./images/001.jpg
1000 - http://www.alenamodel.com./images/002.jpg
1001 - http://www.alenamodel.com./images/003.jpg
1002 - http://www.alenamodel.com./images/004.jpg
1003 - http://www.alenamodel.com./images/005.jpg
1004 - http://www.alenamodel.com./images/006.jpg
1005 - http://www.alenamodel.com./images/007.jpg
1006 - http://www.alenamodel.com./images/008.jpg
1007 - http://www.alenamodel.com./images/009.jpg
1008 - http://www.alenamodel.com./images/010.jpg
1009 - http://www.alenamodel.com./images/011.jpg
1010 - http://www.alenamodel.com./images/012.jpg
1011 - http://www.alenamodel.com./images/013.jpg
1012 - http://www.alenamodel.com./images/014.jpg
1013 - http://www.alenamodel.com./images/015.jpg
1014 - http://www.alenamodel.com./images/016.jpg
1015 - http://www.alenamodel.com./images/017.jpg
1016 - http://www.alenamodel.com./images/018.jpg
1017 - http://www.alenamodel.com./images/019.jpg
1018 - http://www.alenamodel.com./images/020.jpg
1019 - http://www.alenamodel.com./images/021.jpg
1020 - http://www.alenamodel.com./images/022.jpg
1021 - http://www.alenamodel.com./images/023.jpg
1022 - http://www.alenamodel.com./images/023_1.jpg
1023 - http://www.alenamodel.com./images/023_2.jpg
1024 - http://www.alenamodel.com./images/024.jpg
1025 - http://www.alenamodel.com./images/025.jpg
1026 - http://www.alenamodel.com./images/026.jpg
1027 - http://www.alenamodel.com./images/027.jpg
1028 - http://www.alenamodel.com./images/028.jpg
1029 - http://www.alenamodel.com./images/029.jpg
1030 - http://www.alenamodel.com./images/029_1.jpg
1031 - http://www.alenamodel.com./images/029_2.jpg
1032 - http://www.alenamodel.com./images/030.jpg
1033 - http://www.alenamodel.com./images/030_1.jpg
1034 - http://www.alenamodel.com./images/030_2.jpg
1035 - http://www.alenamodel.com./images/031.jpg
1036 - http://www.alenamodel.com./images/031_1.jpg
1037 - http://www.alenamodel.com./images/031_2.jpg
1038 - http://www.alenamodel.com./images/032.jpg
1039 - http://www.alenamodel.com./images/033.jpg
1040 - http://www.alenamodel.com./images/034.jpg
1041 - http://www.alenamodel.com./images/035.jpg
1042 - http://www.alenamodel.com./images/036.jpg
1043 - http://www.alenamodel.com./images/037.jpg
1044 - http://www.alenamodel.com./images/037_1.jpg
1045 - http://www.alenamodel.com./images/038.jpg
1046 - http://www.alenamodel.com./images/038_1.jpg
1047 - http://www.alenamodel.com./images/039.jpg
1048 - http://www.alenamodel.com./images/040.jpg
1049 - http://www.alenamodel.com./images/041.jpg
1050 - http://www.alenamodel.com./images/041_1.jpg
1051 - http://www.alenamodel.com./images/042.jpg
1052 - http://www.alenamodel.com./images/042_1.jpg
1053 - http://www.alenamodel.com./images/043.jpg
1054 - http://www.alenamodel.com./imagestop/allsites_ban.jpg
1055 - http://www.alenamodel.com./imagestop/andyban.jpg
1056 - http://www.alenamodel.com./imagestop/cmastars.jpg
1057 - http://www.alenamodel.com./imagestop/coolban.jpg
1058 - http://www.alenamodel.com./imagestop/fineteen_ban.jpg
1059 - http://www.alenamodel.com./imagestop/honey_ban.jpg
1060 - http://www.alenamodel.com./imagestop/modelban.jpg
1061 - http://www.alenamodel.com./imagestop/nndolmod.jpg
1062 - http://www.alenamodel.com./imagestop/nndoltop.jpg
1063 - http://www.alenamodel.com./imagestop/nnmodset.jpg
1064 - http://www.alenamodel.com./imagestop/stars_ban.jpg
1065 - http://www.alenamodel.com./imagestop/svetatop.jpg
1066 - http://www.alenamodel.com./imagestop/sweetbanner.jpg
1067 - http://www.alenamodel.com./imagestop/wonder_ban.jpg
1068 - http://www.alenamodel.com./imagestop/wow_ban.jpg
1069 - http://www.alenamodel.com./imagestop/youngban.jpg
1070 - http://www.alenamodel.com./official.jpg
1071 - http://www.alenamodel.com./upsite.jpg
1072 Total links to files: 76
1073
1074+ Externals links found:
1075 - http://new.nnmodsets.com/
1076 - http://top.modlinka.com/cgi-bin/rankem.cgi?id=alena
1077 - http://www.andypioneer.com/cgi-bin/rankem.cgi?id=alena
1078 - http://www.cma-starts.com
1079 - http://www.coolnymph.com/cgi-bin/rankem.cgi?id=alena
1080 - http://www.fteenimg.com
1081 - http://www.goodtalens.com/stars/
1082 - http://www.honeymod.com
1083 - http://www.models-top.com/cgi-bin/rankem.cgi?id=alena
1084 - http://www.nndolmod.com
1085 - http://www.nndoltop.com/cgi-bin/rankem.cgi?id=alena
1086 - http://www.nnmodsets.com/nnlinks/
1087 - http://www.ovncm.com/?n=0.08&u=www.alenamodel.com
1088 - http://www.svetamodel.net/cgi-bin/top/rankem.cgi?id=alena
1089 - http://www.wonteens.com
1090 - http://www.wownm.com
1091 - http://www.young-models.info/cgi-bin/rankem.cgi?id=alena
1092 Total external links: 17
1093
1094+ Email addresses found:
1095 Total email address found: 0
1096
1097+ Directories found:
1098 - http://www.alenamodel.com./images/ (403 Forbidden)
1099 - http://www.alenamodel.com./imagestop/ (403 Forbidden)
1100 Total directories: 2
1101
1102+ Directory indexing found:
1103 Total directories with indexing: 0
1104
1105----------------------------------------------------------------------
1106
1107
1108 + URL to crawl: http://ns1.monchekin.com
1109 + Date: 2020-03-18
1110
1111 + Crawling URL: http://ns1.monchekin.com:
1112 + Links:
1113 + Crawling http://ns1.monchekin.com
1114 + Searching for directories...
1115 + Searching open folders...
1116
1117--Finished--
1118Summary information for domain alenamodel.com.
1119-----------------------------------------
1120
1121 Domain Ips Information:
1122 IP: 94.102.51.33
1123 Type: SPF
1124 Is Active: True (syn-ack ttl 58)
1125 Port: 22/tcp open ssh syn-ack ttl 58 OpenSSH 7.4 (protocol 2.0)
1126 Script Info: | ssh-hostkey:
1127 Script Info: | 2048 27:10:8b:2d:55:3f:93:10:9f:ba:60:48:15:2f:0d:a4 (RSA)
1128 Script Info: | 256 0d:61:df:64:d8:cf:76:01:c2:57:79:de:ef:12:b2:8a (ECDSA)
1129 Script Info: |_ 256 e8:da:20:c5:36:c1:5b:ec:a6:43:e9:8b:76:a9:43:96 (ED25519)
1130 Port: 25/tcp open smtp syn-ack ttl 58 Exim smtpd 4.89
1131 Script Info: | smtp-commands: a13s08.host.com Hello nmap.scanme.org [84.17.52.74], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, CHUNKING, STARTTLS, HELP,
1132 Script Info: |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1133 Script Info: | ssl-cert: Subject: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
1134 Script Info: | Issuer: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
1135 Script Info: | Public Key type: rsa
1136 Script Info: | Public Key bits: 1024
1137 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1138 Script Info: | Not valid before: 2018-03-05T07:49:40
1139 Script Info: | Not valid after: 2028-03-02T07:49:40
1140 Script Info: | MD5: 5725 8193 eba3 6655 85e8 03ba ac88 3a0d
1141 Script Info: |_SHA-1: b25e d398 61f7 f64d 48ec a833 2fc2 ec3d 818c 497b
1142 Script Info: |_ssl-date: TLS randomness does not represent time
1143 Port: 53/tcp open domain syn-ack ttl 58 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
1144 Script Info: | dns-nsid:
1145 Script Info: |_ bind.version: 9.9.4-RedHat-9.9.4-51.el7_4.2
1146 Port: 80/tcp open http syn-ack ttl 58 nginx
1147 Script Info: |_http-favicon: Unknown favicon MD5: 1DD7E26D04237FA651903A0917D57955
1148 Script Info: |_http-generator: Microsoft FrontPage 5.0
1149 Script Info: | http-methods:
1150 Script Info: | Supported Methods: POST OPTIONS GET HEAD TRACE
1151 Script Info: |_ Potentially risky methods: TRACE
1152 Script Info: |_http-title: Andy Pioneer Top Sites
1153 Port: 110/tcp open pop3 syn-ack ttl 58 Dovecot pop3d
1154 Script Info: |_pop3-capabilities: PIPELINING AUTH-RESP-CODE CAPA RESP-CODES STLS UIDL TOP SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) USER
1155 Script Info: |_ssl-date: TLS randomness does not represent time
1156 Port: 143/tcp open imap syn-ack ttl 58 Dovecot imapd
1157 Script Info: |_imap-capabilities: Pre-login ID more AUTH=LOGIN have IDLE SASL-IR AUTH=CRAM-MD5A0001 STARTTLS listed AUTH=PLAIN OK post-login ENABLE LOGIN-REFERRALS capabilities LITERAL+ AUTH=DIGEST-MD5 IMAP4rev1
1158 Script Info: |_ssl-date: TLS randomness does not represent time
1159 Port: 465/tcp open ssl/smtp syn-ack ttl 58 Exim smtpd 4.89
1160 Script Info: |_smtp-commands: SMTP EHLO nmap.scanme.org: failed to receive data: failed to receive data
1161 Script Info: | ssl-cert: Subject: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
1162 Script Info: | Issuer: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
1163 Script Info: | Public Key type: rsa
1164 Script Info: | Public Key bits: 1024
1165 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1166 Script Info: | Not valid before: 2018-03-05T07:49:40
1167 Script Info: | Not valid after: 2028-03-02T07:49:40
1168 Script Info: | MD5: 5725 8193 eba3 6655 85e8 03ba ac88 3a0d
1169 Script Info: |_SHA-1: b25e d398 61f7 f64d 48ec a833 2fc2 ec3d 818c 497b
1170 Script Info: |_ssl-date: TLS randomness does not represent time
1171 Port: 993/tcp open ssl/imaps? syn-ack ttl 58
1172 Script Info: |_ssl-date: TLS randomness does not represent time
1173 Port: 995/tcp open ssl/pop3s? syn-ack ttl 58
1174 Script Info: |_ssl-date: TLS randomness does not represent time
1175 Os Info: Host: a13s08.host.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
1176 IP: 94.102.51.112
1177 HostName: ns2.monchekin.com Type: NS
1178 HostName: no-reverse-dns-configured.com Type: PTR
1179 HostName: mail.alenamodel.com Type: MX
1180 HostName: mail.alenamodel.com Type: MX
1181 HostName: www.alenamodel.com. Type: A
1182 HostName: ftp.alenamodel.com. Type: A
1183 HostName: mail.alenamodel.com. Type: A
1184 HostName: smtp.alenamodel.com. Type: A
1185 HostName: pop.alenamodel.com. Type: A
1186 Country: Netherlands
1187 Is Active: True (syn-ack ttl 58)
1188 Port: 22/tcp open ssh? syn-ack ttl 58
1189 Script Info: |_ssh-hostkey: ERROR: Script execution failed (use -d to debug)
1190 Port: 25/tcp open smtp syn-ack ttl 58 Exim smtpd 4.89
1191 Script Info: | smtp-commands: a13s08.host.com Hello nmap.scanme.org [84.17.52.74], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, CHUNKING, STARTTLS, HELP,
1192 Script Info: |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1193 Script Info: | ssl-cert: Subject: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
1194 Script Info: | Issuer: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
1195 Script Info: | Public Key type: rsa
1196 Script Info: | Public Key bits: 1024
1197 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1198 Script Info: | Not valid before: 2018-03-05T07:49:40
1199 Script Info: | Not valid after: 2028-03-02T07:49:40
1200 Script Info: | MD5: 5725 8193 eba3 6655 85e8 03ba ac88 3a0d
1201 Script Info: |_SHA-1: b25e d398 61f7 f64d 48ec a833 2fc2 ec3d 818c 497b
1202 Port: 53/tcp open domain syn-ack ttl 58 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
1203 Script Info: | dns-nsid:
1204 Script Info: |_ bind.version: 9.9.4-RedHat-9.9.4-51.el7_4.2
1205 Port: 80/tcp open http syn-ack ttl 58 nginx
1206 Script Info: |_http-favicon: Unknown favicon MD5: 1DD7E26D04237FA651903A0917D57955
1207 Script Info: |_http-generator: Microsoft FrontPage 5.0
1208 Script Info: | http-methods:
1209 Script Info: | Supported Methods: POST OPTIONS GET HEAD TRACE
1210 Script Info: |_ Potentially risky methods: TRACE
1211 Script Info: |_http-title: Andy Pioneer Top Sites
1212 Port: 110/tcp open pop3 syn-ack ttl 58 Dovecot pop3d
1213 Script Info: |_pop3-capabilities: TOP STLS SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) CAPA PIPELINING UIDL USER RESP-CODES AUTH-RESP-CODE
1214 Script Info: |_ssl-date: TLS randomness does not represent time
1215 Port: 143/tcp open imap syn-ack ttl 58 Dovecot imapd
1216 Script Info: |_imap-capabilities: capabilities OK ENABLE IMAP4rev1 STARTTLS AUTH=CRAM-MD5A0001 listed post-login more have SASL-IR IDLE AUTH=DIGEST-MD5 AUTH=PLAIN ID LOGIN-REFERRALS AUTH=LOGIN Pre-login LITERAL+
1217 Script Info: |_ssl-date: TLS randomness does not represent time
1218 Port: 465/tcp open ssl/smtp syn-ack ttl 58 Exim smtpd 4.89
1219 Script Info: |_smtp-commands: SMTP EHLO nmap.scanme.org: failed to receive data: failed to receive data
1220 Script Info: | ssl-cert: Subject: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
1221 Script Info: | Issuer: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
1222 Script Info: | Public Key type: rsa
1223 Script Info: | Public Key bits: 1024
1224 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1225 Script Info: | Not valid before: 2018-03-05T07:49:40
1226 Script Info: | Not valid after: 2028-03-02T07:49:40
1227 Script Info: | MD5: 5725 8193 eba3 6655 85e8 03ba ac88 3a0d
1228 Script Info: |_SHA-1: b25e d398 61f7 f64d 48ec a833 2fc2 ec3d 818c 497b
1229 Script Info: |_ssl-date: TLS randomness does not represent time
1230 Port: 993/tcp open ssl/imaps? syn-ack ttl 58
1231 Script Info: |_ssl-date: TLS randomness does not represent time
1232 Port: 995/tcp open ssl/pop3s? syn-ack ttl 58
1233 Script Info: |_ssl-date: TLS randomness does not represent time
1234 Os Info: Host: a13s08.host.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
1235 IP: 94.102.51.111
1236 HostName: ns1.monchekin.com Type: NS
1237 Country: Netherlands
1238 Is Active: True (syn-ack ttl 58)
1239 Port: 22/tcp open ssh? syn-ack ttl 58
1240 Script Info: |_ssh-hostkey: ERROR: Script execution failed (use -d to debug)
1241 Port: 25/tcp open smtp syn-ack ttl 58 Exim smtpd 4.89
1242 Script Info: | smtp-commands: a13s08.host.com Hello nmap.scanme.org [84.17.52.74], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, CHUNKING, STARTTLS, HELP,
1243 Script Info: |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1244 Script Info: | ssl-cert: Subject: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
1245 Script Info: | Issuer: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
1246 Script Info: | Public Key type: rsa
1247 Script Info: | Public Key bits: 1024
1248 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1249 Script Info: | Not valid before: 2018-03-05T07:49:40
1250 Script Info: | Not valid after: 2028-03-02T07:49:40
1251 Script Info: | MD5: 5725 8193 eba3 6655 85e8 03ba ac88 3a0d
1252 Script Info: |_SHA-1: b25e d398 61f7 f64d 48ec a833 2fc2 ec3d 818c 497b
1253 Script Info: |_ssl-date: TLS randomness does not represent time
1254 Port: 53/tcp open domain syn-ack ttl 58 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
1255 Script Info: | dns-nsid:
1256 Script Info: |_ bind.version: 9.9.4-RedHat-9.9.4-51.el7_4.2
1257 Port: 80/tcp open http syn-ack ttl 58 nginx
1258 Script Info: |_http-favicon: Unknown favicon MD5: 1DD7E26D04237FA651903A0917D57955
1259 Script Info: |_http-generator: Microsoft FrontPage 5.0
1260 Script Info: | http-methods:
1261 Script Info: | Supported Methods: POST OPTIONS GET HEAD TRACE
1262 Script Info: |_ Potentially risky methods: TRACE
1263 Script Info: |_http-title: Andy Pioneer Top Sites
1264 Port: 110/tcp open pop3 syn-ack ttl 58 Dovecot pop3d
1265 Script Info: |_pop3-capabilities: STLS AUTH-RESP-CODE UIDL TOP SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) CAPA USER PIPELINING RESP-CODES
1266 Script Info: |_ssl-date: TLS randomness does not represent time
1267 Port: 143/tcp open imap syn-ack ttl 58 Dovecot imapd
1268 Script Info: |_imap-capabilities: ID AUTH=CRAM-MD5A0001 AUTH=DIGEST-MD5 capabilities Pre-login have more AUTH=PLAIN AUTH=LOGIN ENABLE IMAP4rev1 post-login LOGIN-REFERRALS SASL-IR IDLE STARTTLS listed OK LITERAL+
1269 Script Info: |_ssl-date: TLS randomness does not represent time
1270 Port: 465/tcp open ssl/smtp syn-ack ttl 58 Exim smtpd 4.89
1271 Script Info: |_smtp-commands: a13s08.host.com Hello nmap.scanme.org [84.17.52.74], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, CHUNKING, HELP,
1272 Script Info: | ssl-cert: Subject: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
1273 Script Info: | Issuer: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
1274 Script Info: | Public Key type: rsa
1275 Script Info: | Public Key bits: 1024
1276 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1277 Script Info: | Not valid before: 2018-03-05T07:49:40
1278 Script Info: | Not valid after: 2028-03-02T07:49:40
1279 Script Info: | MD5: 5725 8193 eba3 6655 85e8 03ba ac88 3a0d
1280 Script Info: |_SHA-1: b25e d398 61f7 f64d 48ec a833 2fc2 ec3d 818c 497b
1281 Script Info: |_ssl-date: TLS randomness does not represent time
1282 Port: 993/tcp open ssl/imaps? syn-ack ttl 58
1283 Script Info: |_ssl-date: TLS randomness does not represent time
1284 Port: 995/tcp open ssl/pop3s? syn-ack ttl 58
1285 Script Info: |_ssl-date: TLS randomness does not represent time
1286 Os Info: Host: a13s08.host.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
1287
1288--------------End Summary --------------
1289#################################################################################################################################
1290----- alenamodel.com -----
1291
1292
1293Host's addresses:
1294__________________
1295
1296alenamodel.com. 3525 IN A 94.102.51.112
1297
1298
1299Name Servers:
1300______________
1301
1302ns2.monchekin.com. 3350 IN A 94.102.51.112
1303ns1.monchekin.com. 3350 IN A 94.102.51.111
1304
1305
1306Mail (MX) Servers:
1307___________________
1308
1309mail.alenamodel.com. 3523 IN A 94.102.51.112
1310mail.alenamodel.com. 3523 IN A 94.102.51.112
1311
1312
1313Trying Zone Transfers and getting Bind Versions:
1314_________________________________________________
1315
1316
1317
1318Trying Zone Transfer for alenamodel.com on ns2.monchekin.com ...
1319Trying Zone Transfer for alenamodel.com on ns1.monchekin.com ...
1320AXFR record query failed: REFUSED
1321AXFR record query failed: REFUSED
1322
1323
1324Scraping alenamodel.com subdomains from Google:
1325________________________________________________
1326
1327
1328 ---- Google search page: 1 ----
1329
1330
1331
1332Google Results:
1333________________
1334
1335 perhaps Google is blocking our queries.
1336 Check manually.
1337
1338
1339Brute forcing with /usr/share/dnsenum/dns.txt:
1340_______________________________________________
1341
1342ftp.alenamodel.com. 3546 IN A 94.102.51.112
1343mail.alenamodel.com. 3462 IN A 94.102.51.112
1344pop.alenamodel.com. 3527 IN A 94.102.51.112
1345smtp.alenamodel.com. 3513 IN A 94.102.51.112
1346www.alenamodel.com. 3454 IN A 94.102.51.112
1347
1348
1349Launching Whois Queries:
1350_________________________
1351
1352 whois ip result: 94.102.51.0 -> 94.102.51.0/24
1353
1354
1355alenamodel.com______________
1356
1357 94.102.51.0/24
1358#################################################################################################################################
1359URLCrazy Domain Report
1360Domain : www.alenamodel.com
1361Keyboard : qwerty
1362At : 2020-03-18 17:03:03 -0400
1363
1364# Please wait. 181 hostnames to process
1365
1366Typo Type Typo DNS-A CC-A DNS-MX Extn
1367------------------------------------------------------------------------------------------------------------------
1368Character Omission ww.alenamodel.com ? com
1369Character Omission www.aenamodel.com ? com
1370Character Omission www.aleamodel.com ? com
1371Character Omission www.alenamdel.com ? com
1372Character Omission www.alenamode.com ? com
1373Character Omission www.alenamodel.cm ? cm
1374Character Omission www.alenamodl.com ? com
1375Character Omission www.alenamoel.com ? com
1376Character Omission www.alenaodel.com ? com
1377Character Omission www.alenmodel.com ? com
1378Character Omission www.alnamodel.com ? com
1379Character Omission www.lenamodel.com 23.20.239.12 US,UNITED STATES com
1380Character Omission wwwalenamodel.com ? com
1381Character Repeat www.aalenamodel.com ? com
1382Character Repeat www.aleenamodel.com ? com
1383Character Repeat www.alenaamodel.com ? com
1384Character Repeat www.alenammodel.com ? com
1385Character Repeat www.alenamoddel.com ? com
1386Character Repeat www.alenamodeel.com ? com
1387Character Repeat www.alenamodell.com ? com
1388Character Repeat www.alenamoodel.com ? com
1389Character Repeat www.alennamodel.com ? com
1390Character Repeat www.allenamodel.com ? com
1391Character Repeat wwww.alenamodel.com ? com
1392Character Swap ww.walenamodel.com ? com
1393Character Swap www.aelnamodel.com ? com
1394Character Swap www.aleanmodel.com ? com
1395Character Swap www.alenamdoel.com ? com
1396Character Swap www.alenamodle.com ? com
1397Character Swap www.alenamoedl.com ? com
1398Character Swap www.alenaomdel.com ? com
1399Character Swap www.alenmaodel.com ? com
1400Character Swap www.alneamodel.com ? com
1401Character Swap www.laenamodel.com ? com
1402Character Swap wwwa.lenamodel.com 18.211.9.206 US,UNITED STATES com
1403Character Replacement eww.alenamodel.com ? com
1404Character Replacement qww.alenamodel.com ? com
1405Character Replacement wew.alenamodel.com ? com
1406Character Replacement wqw.alenamodel.com ? com
1407Character Replacement wwe.alenamodel.com ? com
1408Character Replacement wwq.alenamodel.com ? com
1409Character Replacement www.akenamodel.com ? com
1410Character Replacement www.alebamodel.com ? com
1411Character Replacement www.alemamodel.com ? com
1412Character Replacement www.alenamidel.com ? com
1413Character Replacement www.alenamodek.com ? com
1414Character Replacement www.alenamodrl.com ? com
1415Character Replacement www.alenamodwl.com ? com
1416Character Replacement www.alenamofel.com ? com
1417Character Replacement www.alenamosel.com ? com
1418Character Replacement www.alenampdel.com ? com
1419Character Replacement www.alenanodel.com ? com
1420Character Replacement www.alensmodel.com ? com
1421Character Replacement www.alrnamodel.com ? com
1422Character Replacement www.alwnamodel.com ? com
1423Character Replacement www.slenamodel.com ? com
1424Double Character Replacement eew.alenamodel.com ? com
1425Double Character Replacement qqw.alenamodel.com ? com
1426Double Character Replacement wee.alenamodel.com ? com
1427Double Character Replacement wqq.alenamodel.com ? com
1428Character Insertion weww.alenamodel.com ? com
1429Character Insertion wqww.alenamodel.com ? com
1430Character Insertion wwew.alenamodel.com ? com
1431Character Insertion wwqw.alenamodel.com ? com
1432Character Insertion www.alenamnodel.com ? com
1433Character Insertion www.alenamodelk.com ? com
1434Character Insertion www.alenamoderl.com ? com
1435Character Insertion www.alenamodewl.com ? com
1436Character Insertion www.alenamodfel.com ? com
1437Character Insertion www.alenamodsel.com ? com
1438Character Insertion www.alenamoidel.com ? com
1439Character Insertion www.alenamopdel.com ? com
1440Character Insertion www.alenasmodel.com ? com
1441Character Insertion www.alenbamodel.com ? com
1442Character Insertion www.alenmamodel.com ? com
1443Character Insertion www.alernamodel.com ? com
1444Character Insertion www.alewnamodel.com ? com
1445Character Insertion www.alkenamodel.com ? com
1446Character Insertion www.aslenamodel.com ? com
1447Character Insertion wwwe.alenamodel.com ? com
1448Character Insertion wwwq.alenamodel.com ? com
1449Missing Dot wwwwww.alenamodel.com ? com
1450Singular or Pluralise alenamodel.com 94.102.51.112 NL,NETHERLANDS mail.alenamodel.com com
1451Singular or Pluralise alenamodels.com ? com
1452Vowel Swap www.alanamodal.com ? com
1453Vowel Swap www.alinamodil.com ? com
1454Vowel Swap www.alonamodol.com ? com
1455Vowel Swap www.alunamodul.com ? com
1456Vowel Swap www.elenemodel.com ? com
1457Vowel Swap www.ilenimodel.com ? com
1458Vowel Swap www.olenomodel.com ? com
1459Vowel Swap www.ulenumodel.com ? com
1460Homophones www.ailnamodel.com ? com
1461Homophones www.alenamowedl.com ? com
1462Bit Flipping 7ww.alenamodel.com ? com
1463Bit Flipping gww.alenamodel.com ? com
1464Bit Flipping sww.alenamodel.com ? com
1465Bit Flipping uww.alenamodel.com ? com
1466Bit Flipping vww.alenamodel.com ? com
1467Bit Flipping w7w.alenamodel.com ? com
1468Bit Flipping wgw.alenamodel.com ? com
1469Bit Flipping wsw.alenamodel.com ? com
1470Bit Flipping wuw.alenamodel.com ? com
1471Bit Flipping wvw.alenamodel.com ? com
1472Bit Flipping ww7.alenamodel.com ? com
1473Bit Flipping wwg.alenamodel.com ? com
1474Bit Flipping wws.alenamodel.com ? com
1475Bit Flipping wwu.alenamodel.com ? com
1476Bit Flipping wwv.alenamodel.com ? com
1477Bit Flipping www.adenamodel.com ? com
1478Bit Flipping www.ahenamodel.com ? com
1479Bit Flipping www.alanamodel.com ? com
1480Bit Flipping www.aldnamodel.com ? com
1481Bit Flipping www.ale.amodel.com 35.186.238.101 US,UNITED STATES com
1482Bit Flipping www.alefamodel.com ? com
1483Bit Flipping www.alejamodel.com ? com
1484Bit Flipping www.alelamodel.com ? com
1485Bit Flipping www.alena-odel.com ? com
1486Bit Flipping www.alenaeodel.com ? com
1487Bit Flipping www.alenaiodel.com ? com
1488Bit Flipping www.alenalodel.com ? com
1489Bit Flipping www.alenamgdel.com ? com
1490Bit Flipping www.alenamkdel.com ? com
1491Bit Flipping www.alenammdel.com ? com
1492Bit Flipping www.alenamndel.com ? com
1493Bit Flipping www.alenamodal.com ? com
1494Bit Flipping www.alenamoddl.com ? com
1495Bit Flipping www.alenamoded.com ? com
1496Bit Flipping www.alenamodeh.com ? com
1497Bit Flipping www.alenamodem.com ? com
1498Bit Flipping www.alenamoden.com ? com
1499Bit Flipping www.alenamodgl.com ? com
1500Bit Flipping www.alenamodml.com ? com
1501Bit Flipping www.alenamodul.com ? com
1502Bit Flipping www.alenamoeel.com ? com
1503Bit Flipping www.alenamolel.com ? com
1504Bit Flipping www.alenamotel.com ? com
1505Bit Flipping www.alenaoodel.com ? com
1506Bit Flipping www.alencmodel.com ? com
1507Bit Flipping www.alenemodel.com ? com
1508Bit Flipping www.alenimodel.com ? com
1509Bit Flipping www.alenqmodel.com ? com
1510Bit Flipping www.aleoamodel.com ? com
1511Bit Flipping www.algnamodel.com ? com
1512Bit Flipping www.almnamodel.com ? com
1513Bit Flipping www.alunamodel.com ? com
1514Bit Flipping www.amenamodel.com ? com
1515Bit Flipping www.anenamodel.com ? com
1516Bit Flipping www.clenamodel.com ? com
1517Bit Flipping www.elenamodel.com 154.81.51.186 com
1518Bit Flipping www.ilenamodel.com ? com
1519Bit Flipping www.qlenamodel.com ? com
1520Bit Flipping wwwnalenamodel.com ? com
1521Homoglyphs vvvvvv.alenamodel.com ? com
1522Homoglyphs vvvvw.alenamodel.com ? com
1523Homoglyphs vvwvv.alenamodel.com ? com
1524Homoglyphs vvww.alenamodel.com ? com
1525Homoglyphs wvvvv.alenamodel.com ? com
1526Homoglyphs wvvw.alenamodel.com ? com
1527Homoglyphs wwvv.alenamodel.com ? com
1528Homoglyphs www.a1enamode1.com ? com
1529Homoglyphs www.a1enamodel.com ? com
1530Homoglyphs www.alenam0del.com ? com
1531Homoglyphs www.alenamoclel.com ? com
1532Homoglyphs www.alenamode1.com ? com
1533Homoglyphs www.alenarnodel.com ? com
1534Wrong TLD alenamodel.ca ? ca
1535Wrong TLD alenamodel.ch ? ch
1536Wrong TLD alenamodel.de ? de
1537Wrong TLD alenamodel.edu ? edu
1538Wrong TLD alenamodel.es ? es
1539Wrong TLD alenamodel.fr ? fr
1540Wrong TLD alenamodel.it ? it
1541Wrong TLD alenamodel.jp ? jp
1542Wrong TLD alenamodel.net ? net
1543Wrong TLD alenamodel.nl ? nl
1544Wrong TLD alenamodel.no ? no
1545Wrong TLD alenamodel.org ? org
1546Wrong TLD alenamodel.ru ? ru
1547Wrong TLD alenamodel.se ? se
1548Wrong TLD alenamodel.us ? us
1549#################################################################################################################################
1550[+] www.alenamodel.com has no SPF record!
1551[*] No DMARC record found. Looking for organizational record
1552[+] No organizational DMARC record
1553[+] Spoofing possible for www.alenamodel.com!
1554################################################################################################################################
1555WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
1556Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-18 17:09 EDT
1557Nmap scan report for www.alenamodel.com (94.102.51.112)
1558Host is up (0.25s latency).
1559rDNS record for 94.102.51.112: no-reverse-dns-configured.com
1560Not shown: 486 filtered ports, 1 closed port
1561Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
1562PORT STATE SERVICE
156322/tcp open ssh
156425/tcp open smtp
156553/tcp open domain
156680/tcp open http
1567110/tcp open pop3
1568143/tcp open imap
1569465/tcp open smtps
1570993/tcp open imaps
1571995/tcp open pop3s
1572
1573Nmap done: 1 IP address (1 host up) scanned in 13.74 seconds
1574##################################################################################################################################
1575Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-18 17:09 EDT
1576Nmap scan report for www.alenamodel.com (94.102.51.112)
1577Host is up (0.28s latency).
1578rDNS record for 94.102.51.112: no-reverse-dns-configured.com
1579
1580PORT STATE SERVICE
158153/udp open domain
158267/udp open|filtered dhcps
158368/udp open|filtered dhcpc
158469/udp open|filtered tftp
158588/udp open|filtered kerberos-sec
1586123/udp open|filtered ntp
1587137/udp open|filtered netbios-ns
1588138/udp open|filtered netbios-dgm
1589139/udp open|filtered netbios-ssn
1590161/udp open|filtered snmp
1591162/udp open|filtered snmptrap
1592389/udp open|filtered ldap
1593500/udp open|filtered isakmp
1594520/udp open|filtered route
15952049/udp open|filtered nfs
1596
1597Nmap done: 1 IP address (1 host up) scanned in 6.04 seconds
1598#################################################################################################################################
1599# general
1600(gen) banner: SSH-2.0-OpenSSH_7.4
1601(gen) software: OpenSSH 7.4
1602(gen) compatibility: OpenSSH 7.3+ (some functionality from 6.6), Dropbear SSH 2016.73+ (some functionality from 0.52)
1603(gen) compression: enabled (zlib@openssh.com)
1604
1605# key exchange algorithms
1606(kex) curve25519-sha256 -- [warn] unknown algorithm
1607(kex) curve25519-sha256@libssh.org -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
1608(kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
1609 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
1610(kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
1611 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
1612(kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
1613 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
1614(kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
1615 `- [info] available since OpenSSH 4.4
1616(kex) diffie-hellman-group16-sha512 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
1617(kex) diffie-hellman-group18-sha512 -- [info] available since OpenSSH 7.3
1618(kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
1619 `- [warn] using weak hashing algorithm
1620 `- [info] available since OpenSSH 2.3.0
1621(kex) diffie-hellman-group14-sha256 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
1622(kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
1623 `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
1624(kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
1625 `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
1626 `- [warn] using small 1024-bit modulus
1627 `- [warn] using weak hashing algorithm
1628 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
1629
1630# host-key algorithms
1631(key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
1632(key) rsa-sha2-512 -- [info] available since OpenSSH 7.2
1633(key) rsa-sha2-256 -- [info] available since OpenSSH 7.2
1634(key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
1635 `- [warn] using weak random number generator could reveal the key
1636 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
1637(key) ssh-ed25519 -- [info] available since OpenSSH 6.5
1638
1639# encryption algorithms (ciphers)
1640(enc) chacha20-poly1305@openssh.com -- [info] available since OpenSSH 6.5
1641 `- [info] default cipher since OpenSSH 6.9.
1642(enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
1643(enc) aes192-ctr -- [info] available since OpenSSH 3.7
1644(enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
1645(enc) aes128-gcm@openssh.com -- [info] available since OpenSSH 6.2
1646(enc) aes256-gcm@openssh.com -- [info] available since OpenSSH 6.2
1647(enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
1648 `- [warn] using weak cipher mode
1649 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
1650(enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
1651 `- [warn] using weak cipher mode
1652 `- [info] available since OpenSSH 2.3.0
1653(enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
1654 `- [warn] using weak cipher mode
1655 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
1656(enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
1657 `- [fail] disabled since Dropbear SSH 0.53
1658 `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
1659 `- [warn] using weak cipher mode
1660 `- [warn] using small 64-bit block size
1661 `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
1662(enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
1663 `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
1664 `- [warn] using weak cipher mode
1665 `- [warn] using small 64-bit block size
1666 `- [info] available since OpenSSH 2.1.0
1667(enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
1668 `- [warn] using weak cipher
1669 `- [warn] using weak cipher mode
1670 `- [warn] using small 64-bit block size
1671 `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
1672
1673# message authentication code algorithms
1674(mac) umac-64-etm@openssh.com -- [warn] using small 64-bit tag size
1675 `- [info] available since OpenSSH 6.2
1676(mac) umac-128-etm@openssh.com -- [info] available since OpenSSH 6.2
1677(mac) hmac-sha2-256-etm@openssh.com -- [info] available since OpenSSH 6.2
1678(mac) hmac-sha2-512-etm@openssh.com -- [info] available since OpenSSH 6.2
1679(mac) hmac-sha1-etm@openssh.com -- [warn] using weak hashing algorithm
1680 `- [info] available since OpenSSH 6.2
1681(mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
1682 `- [warn] using small 64-bit tag size
1683 `- [info] available since OpenSSH 4.7
1684(mac) umac-128@openssh.com -- [warn] using encrypt-and-MAC mode
1685 `- [info] available since OpenSSH 6.2
1686(mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
1687 `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
1688(mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
1689 `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
1690(mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
1691 `- [warn] using weak hashing algorithm
1692 `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
1693
1694# algorithm recommendations (for OpenSSH 7.4)
1695(rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
1696(rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
1697(rec) -diffie-hellman-group-exchange-sha256 -- kex algorithm to remove
1698(rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
1699(rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
1700(rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
1701(rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
1702(rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
1703(rec) -blowfish-cbc -- enc algorithm to remove
1704(rec) -3des-cbc -- enc algorithm to remove
1705(rec) -aes256-cbc -- enc algorithm to remove
1706(rec) -cast128-cbc -- enc algorithm to remove
1707(rec) -aes192-cbc -- enc algorithm to remove
1708(rec) -aes128-cbc -- enc algorithm to remove
1709(rec) -hmac-sha2-512 -- mac algorithm to remove
1710(rec) -umac-128@openssh.com -- mac algorithm to remove
1711(rec) -hmac-sha2-256 -- mac algorithm to remove
1712(rec) -umac-64@openssh.com -- mac algorithm to remove
1713(rec) -hmac-sha1 -- mac algorithm to remove
1714(rec) -hmac-sha1-etm@openssh.com -- mac algorithm to remove
1715(rec) -umac-64-etm@openssh.com -- mac algorithm to remove
1716##################################################################################################################################
1717Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-18 17:10 EDT
1718NSE: Loaded 51 scripts for scanning.
1719NSE: Script Pre-scanning.
1720Initiating NSE at 17:10
1721Completed NSE at 17:10, 0.00s elapsed
1722Initiating NSE at 17:10
1723Completed NSE at 17:10, 0.00s elapsed
1724Initiating Parallel DNS resolution of 1 host. at 17:10
1725Completed Parallel DNS resolution of 1 host. at 17:10, 0.02s elapsed
1726Initiating SYN Stealth Scan at 17:10
1727Scanning www.alenamodel.com (94.102.51.112) [1 port]
1728Discovered open port 22/tcp on 94.102.51.112
1729Completed SYN Stealth Scan at 17:10, 0.32s elapsed (1 total ports)
1730Initiating Service scan at 17:10
1731Scanning 1 service on www.alenamodel.com (94.102.51.112)
1732Completed Service scan at 17:10, 0.51s elapsed (1 service on 1 host)
1733Initiating OS detection (try #1) against www.alenamodel.com (94.102.51.112)
1734Retrying OS detection (try #2) against www.alenamodel.com (94.102.51.112)
1735Initiating Traceroute at 17:10
1736Completed Traceroute at 17:10, 0.31s elapsed
1737Initiating Parallel DNS resolution of 8 hosts. at 17:10
1738Completed Parallel DNS resolution of 8 hosts. at 17:10, 0.25s elapsed
1739NSE: Script scanning 94.102.51.112.
1740Initiating NSE at 17:10
1741NSE: [ssh-run 94.102.51.112:22] Failed to specify credentials and command to run.
1742NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: root:root
1743NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: admin:admin
1744NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: administrator:administrator
1745NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: webadmin:webadmin
1746NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: sysadmin:sysadmin
1747NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: netadmin:netadmin
1748NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: guest:guest
1749NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: user:user
1750NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: web:web
1751NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: test:test
1752NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: root:
1753NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: admin:
1754NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: administrator:
1755NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: webadmin:
1756NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: sysadmin:
1757NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: netadmin:
1758NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: guest:
1759NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: user:
1760NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: web:
1761NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: test:
1762NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: root:123456
1763NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: admin:123456
1764NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: administrator:123456
1765NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: webadmin:123456
1766NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: sysadmin:123456
1767NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: netadmin:123456
1768NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: guest:123456
1769NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: user:123456
1770NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: web:123456
1771NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: test:123456
1772NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: root:12345
1773NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: admin:12345
1774NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: administrator:12345
1775NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: webadmin:12345
1776NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: sysadmin:12345
1777NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: netadmin:12345
1778NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: guest:12345
1779NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: user:12345
1780NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: web:12345
1781NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: test:12345
1782NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: root:123456789
1783NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: admin:123456789
1784NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: administrator:123456789
1785NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: webadmin:123456789
1786NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: sysadmin:123456789
1787NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: netadmin:123456789
1788NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: guest:123456789
1789NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: user:123456789
1790NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: web:123456789
1791NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: test:123456789
1792NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: root:password
1793NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: admin:password
1794NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: administrator:password
1795NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: webadmin:password
1796NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: sysadmin:password
1797NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: netadmin:password
1798NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: guest:password
1799NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: user:password
1800NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: web:password
1801NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: test:password
1802NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: root:iloveyou
1803NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: admin:iloveyou
1804NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: administrator:iloveyou
1805NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: webadmin:iloveyou
1806NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: sysadmin:iloveyou
1807NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: netadmin:iloveyou
1808NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: guest:iloveyou
1809NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: user:iloveyou
1810NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: web:iloveyou
1811NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: test:iloveyou
1812NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: root:princess
1813NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: admin:princess
1814NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: administrator:princess
1815NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: webadmin:princess
1816NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: sysadmin:princess
1817NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: netadmin:princess
1818NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: guest:princess
1819NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: user:princess
1820NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: web:princess
1821NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: test:princess
1822NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: root:12345678
1823NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: admin:12345678
1824NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: administrator:12345678
1825NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: webadmin:12345678
1826NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: sysadmin:12345678
1827NSE: [ssh-brute 94.102.51.112:22] Trying username/password pair: netadmin:12345678
1828Completed NSE at 17:11, 90.74s elapsed
1829Initiating NSE at 17:11
1830Completed NSE at 17:11, 0.05s elapsed
1831Nmap scan report for www.alenamodel.com (94.102.51.112)
1832Host is up (0.26s latency).
1833rDNS record for 94.102.51.112: no-reverse-dns-configured.com
1834
1835PORT STATE SERVICE VERSION
183622/tcp open ssh OpenSSH 7.4 (protocol 2.0)
1837| ssh-auth-methods:
1838| Supported authentication methods:
1839| publickey
1840| gssapi-keyex
1841| gssapi-with-mic
1842|_ password
1843| ssh-hostkey:
1844| 2048 27:10:8b:2d:55:3f:93:10:9f:ba:60:48:15:2f:0d:a4 (RSA)
1845| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCuSDuH0ZZ1QaOQ2z9XwzG+h3EtdbvjlYz2TB9miT+5BD72uyS6mCppts/ADxxOIp3h39604aMln1X7MbBO/A59Wy2FURZ0/WMRFYTKnaheeBR9Lqr7BFpG/8i4Gh9ipvvqIkVQzGSVtANXXYNG5z9VbheQ/hf915CG/yCuuWqqJR/dZSYjk1JpI2Y5dFi7eglRLpQX647So85fELR1/88AGAKZaXLCWH7e0ECEDHt96FcK5jmsKD01N51w1NG6i8Bx+QMnPLLf/hgja0LzD1jdMZ3uwxu0jgWml3NigX0fTHYU5Ppo3CFwDIPWplHKOBDOVNb2KLFKx0GaLxZPDXvF
1846| 256 0d:61:df:64:d8:cf:76:01:c2:57:79:de:ef:12:b2:8a (ECDSA)
1847| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBHAWcDH3VJufEior6qVBb7Mu2hlmKJi0cCBuYcj1Hu5lyc47K933dViLar7A5c8bR4SEfQYsYyfhY6q3igBjKX4=
1848| 256 e8:da:20:c5:36:c1:5b:ec:a6:43:e9:8b:76:a9:43:96 (ED25519)
1849|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEGhQMuvfJV8fgV1rkjJX46zl30QWq4UMSjEslpzJbWb
1850| ssh-publickey-acceptance:
1851|_ Accepted Public Keys: No public keys accepted
1852|_ssh-run: Failed to specify credentials and command to run.
1853| vulners:
1854| cpe:/a:openbsd:openssh:7.4:
1855| CVE-2018-15919 5.0 https://vulners.com/cve/CVE-2018-15919
1856|_ CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906
1857Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
1858Device type: WAP|general purpose|specialized|broadband router
1859Running (JUST GUESSING): Linux 2.6.X|2.4.X (96%), Philips embedded (92%), Crestron 2-Series (90%), Asus embedded (87%)
1860OS CPE: cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.4.18 cpe:/o:linux:linux_kernel cpe:/o:crestron:2_series cpe:/h:asus:rt-ac66u cpe:/o:linux:linux_kernel:2.6 cpe:/h:asus:rt-n10
1861Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (96%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (94%), OpenWrt White Russian 0.9 (Linux 2.4.30) (94%), Linux 2.4.18 (92%), Philips Hue Bridge 2.0 (Linux) (92%), Crestron XPanel control system (90%), OpenWrt (Linux 2.4.30 - 2.4.34) (89%), OpenWrt (Linux 2.4.32) (89%), Asus RT-AC66U router (Linux 2.6) (87%), Asus RT-N10 router or AXIS 211A Network Camera (Linux 2.6) (87%)
1862No exact OS matches for host (test conditions non-ideal).
1863Network Distance: 8 hops
1864TCP Sequence Prediction: Difficulty=257 (Good luck!)
1865IP ID Sequence Generation: All zeros
1866
1867TRACEROUTE (using port 22/tcp)
1868HOP RTT ADDRESS
18691 298.97 ms 10.202.12.1
18702 299.01 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
18713 299.03 ms vl1337.fra-itx2-core-1.cdn77.com (185.229.188.4)
18724 299.07 ms he-net.peering.cz (91.213.211.118)
18735 299.06 ms 100ge16-1.core1.fra1.he.net (184.105.213.233)
18746 299.08 ms 100ge11-1.core1.fra2.he.net (72.52.92.86)
18757 299.12 ms 100ge0-54.core1.ams2.he.net (184.104.192.130)
18768 299.18 ms no-reverse-dns-configured.com (94.102.51.112)
1877
1878NSE: Script Post-scanning.
1879Initiating NSE at 17:11
1880Completed NSE at 17:11, 0.00s elapsed
1881Initiating NSE at 17:11
1882Completed NSE at 17:11, 0.00s elapsed
1883#################################################################################################################################
1884Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-18 17:12 EDT
1885NSE: Loaded 55 scripts for scanning.
1886NSE: Script Pre-scanning.
1887Initiating NSE at 17:12
1888Completed NSE at 17:12, 0.00s elapsed
1889Initiating NSE at 17:12
1890Completed NSE at 17:12, 0.00s elapsed
1891Initiating Parallel DNS resolution of 1 host. at 17:12
1892Completed Parallel DNS resolution of 1 host. at 17:12, 0.02s elapsed
1893Initiating SYN Stealth Scan at 17:12
1894Scanning www.alenamodel.com (94.102.51.112) [1 port]
1895Discovered open port 25/tcp on 94.102.51.112
1896Completed SYN Stealth Scan at 17:12, 0.17s elapsed (1 total ports)
1897Initiating Service scan at 17:12
1898Scanning 1 service on www.alenamodel.com (94.102.51.112)
1899Completed Service scan at 17:12, 0.30s elapsed (1 service on 1 host)
1900Initiating OS detection (try #1) against www.alenamodel.com (94.102.51.112)
1901Retrying OS detection (try #2) against www.alenamodel.com (94.102.51.112)
1902Initiating Traceroute at 17:12
1903Completed Traceroute at 17:12, 0.36s elapsed
1904Initiating Parallel DNS resolution of 8 hosts. at 17:12
1905Completed Parallel DNS resolution of 8 hosts. at 17:12, 0.43s elapsed
1906NSE: Script scanning 94.102.51.112.
1907Initiating NSE at 17:12
1908NSE Timing: About 71.23% done; ETC: 17:14 (0:00:30 remaining)
1909Completed NSE at 17:14, 90.73s elapsed
1910Initiating NSE at 17:14
1911Completed NSE at 17:14, 0.05s elapsed
1912Nmap scan report for www.alenamodel.com (94.102.51.112)
1913Host is up (0.28s latency).
1914rDNS record for 94.102.51.112: no-reverse-dns-configured.com
1915
1916PORT STATE SERVICE VERSION
191725/tcp open smtp Exim smtpd 4.89
1918| smtp-commands: a13s08.host.com Hello www.alenamodel.com [84.17.52.74], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, CHUNKING, STARTTLS, HELP,
1919|_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1920| smtp-enum-users:
1921|_ Method RCPT returned a unhandled status code.
1922|_smtp-open-relay: SMTP RSET: failed to receive data: connection closed
1923| smtp-vuln-cve2010-4344:
1924| Exim version: 4.89
1925| Exim heap overflow vulnerability (CVE-2010-4344):
1926| Exim (CVE-2010-4344): NOT VULNERABLE
1927| Exim privileges escalation vulnerability (CVE-2010-4345):
1928| Exim (CVE-2010-4345): NOT VULNERABLE
1929|_ To confirm and exploit the vulnerabilities, run with --script-args='smtp-vuln-cve2010-4344.exploit'
1930| vulners:
1931| cpe:/a:exim:exim:4.89:
1932| CVE-2019-15846 10.0 https://vulners.com/cve/CVE-2019-15846
1933| CVE-2019-13917 10.0 https://vulners.com/cve/CVE-2019-13917
1934| CVE-2019-10149 7.5 https://vulners.com/cve/CVE-2019-10149
1935| CVE-2018-6789 7.5 https://vulners.com/cve/CVE-2018-6789
1936| CVE-2017-16943 7.5 https://vulners.com/cve/CVE-2017-16943
1937| CVE-2017-16944 5.0 https://vulners.com/cve/CVE-2017-16944
1938|_ CVE-2017-1000369 2.1 https://vulners.com/cve/CVE-2017-1000369
1939Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
1940Device type: WAP|general purpose|specialized|broadband router
1941Running (JUST GUESSING): Linux 2.6.X|2.4.X (96%), Philips embedded (90%), Crestron 2-Series (90%), Asus embedded (87%)
1942OS CPE: cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.4.18 cpe:/o:linux:linux_kernel cpe:/o:crestron:2_series cpe:/h:asus:rt-ac66u cpe:/o:linux:linux_kernel:2.6 cpe:/h:asus:rt-n10
1943Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (96%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (94%), OpenWrt White Russian 0.9 (Linux 2.4.30) (94%), Linux 2.4.18 (92%), Philips Hue Bridge 2.0 (Linux) (90%), Crestron XPanel control system (90%), OpenWrt (Linux 2.4.30 - 2.4.34) (89%), OpenWrt (Linux 2.4.32) (89%), Asus RT-AC66U router (Linux 2.6) (87%), Asus RT-N10 router or AXIS 211A Network Camera (Linux 2.6) (87%)
1944No exact OS matches for host (test conditions non-ideal).
1945Network Distance: 8 hops
1946TCP Sequence Prediction: Difficulty=260 (Good luck!)
1947IP ID Sequence Generation: All zeros
1948Service Info: Host: a13s08.host.com
1949
1950TRACEROUTE (using port 25/tcp)
1951HOP RTT ADDRESS
19521 248.87 ms 10.202.12.1
19532 363.84 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
19543 363.90 ms vl1337.fra-itx2-core-1.cdn77.com (185.229.188.4)
19554 363.95 ms he-net.peering.cz (91.213.211.118)
19565 363.94 ms 100ge16-1.core1.fra1.he.net (184.105.213.233)
19576 363.98 ms 100ge11-1.core1.fra2.he.net (72.52.92.86)
19587 364.01 ms 100ge0-54.core1.ams2.he.net (184.104.192.130)
19598 364.05 ms no-reverse-dns-configured.com (94.102.51.112)
1960
1961NSE: Script Post-scanning.
1962Initiating NSE at 17:14
1963Completed NSE at 17:14, 0.00s elapsed
1964Initiating NSE at 17:14
1965Completed NSE at 17:14, 0.00s elapsed
1966##################################################################################################################################
1967Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-18 17:14 EDT
1968NSE: Loaded 64 scripts for scanning.
1969NSE: Script Pre-scanning.
1970Initiating NSE at 17:14
1971Completed NSE at 17:14, 0.00s elapsed
1972Initiating NSE at 17:14
1973Completed NSE at 17:14, 0.00s elapsed
1974Initiating Parallel DNS resolution of 1 host. at 17:14
1975Completed Parallel DNS resolution of 1 host. at 17:14, 0.02s elapsed
1976Initiating SYN Stealth Scan at 17:14
1977Scanning www.alenamodel.com (94.102.51.112) [1 port]
1978Discovered open port 53/tcp on 94.102.51.112
1979Completed SYN Stealth Scan at 17:14, 0.24s elapsed (1 total ports)
1980Initiating Service scan at 17:14
1981Scanning 1 service on www.alenamodel.com (94.102.51.112)
1982Completed Service scan at 17:14, 6.37s elapsed (1 service on 1 host)
1983Initiating OS detection (try #1) against www.alenamodel.com (94.102.51.112)
1984Retrying OS detection (try #2) against www.alenamodel.com (94.102.51.112)
1985Initiating Traceroute at 17:15
1986Completed Traceroute at 17:15, 3.01s elapsed
1987Initiating Parallel DNS resolution of 8 hosts. at 17:15
1988Completed Parallel DNS resolution of 8 hosts. at 17:15, 0.14s elapsed
1989NSE: Script scanning 94.102.51.112.
1990Initiating NSE at 17:15
1991Completed NSE at 17:15, 12.05s elapsed
1992Initiating NSE at 17:15
1993Completed NSE at 17:15, 0.00s elapsed
1994Nmap scan report for www.alenamodel.com (94.102.51.112)
1995Host is up (0.19s latency).
1996rDNS record for 94.102.51.112: no-reverse-dns-configured.com
1997
1998PORT STATE SERVICE VERSION
199953/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
2000|_dns-fuzz: Server didn't response to our probe, can't fuzz
2001| dns-nsec-enum:
2002|_ No NSEC records found
2003| dns-nsec3-enum:
2004|_ DNSSEC NSEC3 not supported
2005| dns-nsid:
2006|_ bind.version: 9.9.4-RedHat-9.9.4-51.el7_4.2
2007| vulners:
2008| cpe:/a:isc:bind:9.9.4:
2009| CVE-2015-4620 7.8 https://vulners.com/cve/CVE-2015-4620
2010| CVE-2014-8500 7.8 https://vulners.com/cve/CVE-2014-8500
2011| CVE-2017-3141 7.2 https://vulners.com/cve/CVE-2017-3141
2012| CVE-2015-8461 7.1 https://vulners.com/cve/CVE-2015-8461
2013| CVE-2015-1349 5.4 https://vulners.com/cve/CVE-2015-1349
2014| CVE-2018-5740 5.0 https://vulners.com/cve/CVE-2018-5740
2015| CVE-2017-3145 5.0 https://vulners.com/cve/CVE-2017-3145
2016| CVE-2016-9131 5.0 https://vulners.com/cve/CVE-2016-9131
2017| CVE-2016-8864 5.0 https://vulners.com/cve/CVE-2016-8864
2018| CVE-2016-1286 5.0 https://vulners.com/cve/CVE-2016-1286
2019| CVE-2015-8000 5.0 https://vulners.com/cve/CVE-2015-8000
2020| CVE-2019-6465 4.3 https://vulners.com/cve/CVE-2019-6465
2021| CVE-2018-5743 4.3 https://vulners.com/cve/CVE-2018-5743
2022| CVE-2018-5742 4.3 https://vulners.com/cve/CVE-2018-5742
2023| CVE-2017-3143 4.3 https://vulners.com/cve/CVE-2017-3143
2024| CVE-2017-3142 4.3 https://vulners.com/cve/CVE-2017-3142
2025| CVE-2017-3136 4.3 https://vulners.com/cve/CVE-2017-3136
2026| CVE-2016-2775 4.3 https://vulners.com/cve/CVE-2016-2775
2027| CVE-2016-1285 4.3 https://vulners.com/cve/CVE-2016-1285
2028| CVE-2018-5741 4.0 https://vulners.com/cve/CVE-2018-5741
2029| CVE-2016-6170 4.0 https://vulners.com/cve/CVE-2016-6170
2030|_ CVE-2018-5745 3.5 https://vulners.com/cve/CVE-2018-5745
2031Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2032Device type: WAP|general purpose|specialized|broadband router
2033Running (JUST GUESSING): Linux 2.6.X|2.4.X (96%), Philips embedded (92%), Crestron 2-Series (90%), Asus embedded (87%)
2034OS CPE: cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.4.18 cpe:/o:linux:linux_kernel cpe:/o:crestron:2_series cpe:/h:asus:rt-ac66u cpe:/o:linux:linux_kernel:2.6 cpe:/h:asus:rt-n10
2035Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (96%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (94%), OpenWrt White Russian 0.9 (Linux 2.4.30) (94%), Linux 2.4.18 (92%), Philips Hue Bridge 2.0 (Linux) (92%), Crestron XPanel control system (90%), OpenWrt (Linux 2.4.30 - 2.4.34) (89%), OpenWrt (Linux 2.4.32) (89%), Asus RT-AC66U router (Linux 2.6) (87%), Asus RT-N10 router or AXIS 211A Network Camera (Linux 2.6) (87%)
2036No exact OS matches for host (test conditions non-ideal).
2037Network Distance: 9 hops
2038TCP Sequence Prediction: Difficulty=257 (Good luck!)
2039IP ID Sequence Generation: All zeros
2040Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
2041
2042Host script results:
2043| dns-blacklist:
2044| SPAM
2045|_ l2.apews.org - SPAM
2046| dns-brute:
2047| DNS Brute-force hostnames:
2048| mail.alenamodel.com - 94.102.51.112
2049| www.alenamodel.com - 94.102.51.112
2050| ftp.alenamodel.com - 94.102.51.112
2051|_ smtp.alenamodel.com - 94.102.51.112
2052
2053TRACEROUTE (using port 53/tcp)
2054HOP RTT ADDRESS
20551 140.32 ms 10.202.12.1
20562 140.35 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
20573 140.37 ms vl1337.fra-itx2-core-1.cdn77.com (185.229.188.4)
20584 140.40 ms he-net.peering.cz (91.213.211.118)
20595 140.39 ms 100ge16-1.core1.fra1.he.net (184.105.213.233)
20606 189.63 ms 100ge6-1.core1.ams1.he.net (72.52.92.5)
20617 ...
20628 140.44 ms 100ge2-1.core1.ams1.he.net (184.104.192.129)
20639 140.46 ms no-reverse-dns-configured.com (94.102.51.112)
2064
2065NSE: Script Post-scanning.
2066Initiating NSE at 17:15
2067Completed NSE at 17:15, 0.00s elapsed
2068Initiating NSE at 17:15
2069Completed NSE at 17:15, 0.00s elapsed
2070#################################################################################################################################
2071
2072
2073Scanning http://www.alenamodel.com...
2074_________________________________________ SITE INFO _________________________________________
2075IP Title
207694.102.51.112 Alena Child Model
2077
2078__________________________________________ VERSION __________________________________________
2079Name Versions Type
2080phpMyAdmin 4_4_15_8 CMS
2081Apache 2.4.10 | 2.4.11 | 2.4.12 | 2.4.5 | 2.4.6 | 2.4.7 | 2.4.8 Platform
2082 2.4.9
2083PHP 5.4.45 Platform
2084nginx Platform
2085FreeBSD 10 | 11 OS
2086OpenBSD 5.9 OS
2087
2088_____________________________________________________________________________________________
2089Time: 58.1 sec Urls: 772 Fingerprints: 40401
2090#################################################################################################################################
2091Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-18 17:16 EDT
2092NSE: Loaded 161 scripts for scanning.
2093NSE: Script Pre-scanning.
2094Initiating NSE at 17:16
2095Completed NSE at 17:16, 0.00s elapsed
2096Initiating NSE at 17:16
2097Completed NSE at 17:16, 0.00s elapsed
2098Initiating Parallel DNS resolution of 1 host. at 17:16
2099Completed Parallel DNS resolution of 1 host. at 17:16, 0.02s elapsed
2100Initiating SYN Stealth Scan at 17:16
2101Scanning www.alenamodel.com (94.102.51.112) [1 port]
2102Discovered open port 80/tcp on 94.102.51.112
2103Completed SYN Stealth Scan at 17:16, 0.23s elapsed (1 total ports)
2104Initiating Service scan at 17:16
2105Scanning 1 service on www.alenamodel.com (94.102.51.112)
2106Completed Service scan at 17:16, 6.44s elapsed (1 service on 1 host)
2107Initiating OS detection (try #1) against www.alenamodel.com (94.102.51.112)
2108Retrying OS detection (try #2) against www.alenamodel.com (94.102.51.112)
2109Initiating Traceroute at 17:16
2110Completed Traceroute at 17:16, 3.00s elapsed
2111Initiating Parallel DNS resolution of 8 hosts. at 17:16
2112Completed Parallel DNS resolution of 8 hosts. at 17:16, 0.14s elapsed
2113NSE: Script scanning 94.102.51.112.
2114Initiating NSE at 17:16
2115Completed NSE at 17:17, 52.07s elapsed
2116Initiating NSE at 17:17
2117Completed NSE at 17:17, 0.99s elapsed
2118Nmap scan report for www.alenamodel.com (94.102.51.112)
2119Host is up (0.20s latency).
2120rDNS record for 94.102.51.112: no-reverse-dns-configured.com
2121
2122PORT STATE SERVICE VERSION
212380/tcp open http nginx
2124| http-brute:
2125|_ Path "/" does not require authentication
2126|_http-chrono: Request times for /; avg: 871.40ms; min: 725.51ms; max: 1010.62ms
2127| http-csrf:
2128| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=www.alenamodel.com
2129| Found the following possible CSRF vulnerabilities:
2130|
2131| Path: http://www.alenamodel.com:80/join.htm
2132| Form id:
2133| Form action: https://nnpay.net/
2134|
2135| Path: http://www.alenamodel.com:80/join.htm
2136| Form id:
2137| Form action: https://nnpay.net/
2138|
2139| Path: http://www.alenamodel.com:80/join.htm
2140| Form id:
2141|_ Form action: https://nnpay.net/
2142|_http-date: Wed, 18 Mar 2020 21:16:52 GMT; -7s from local time.
2143|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
2144|_http-dombased-xss: Couldn't find any DOM based XSS.
2145|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
2146|_http-errors: Couldn't find any error pages.
2147|_http-feed: Couldn't find any feeds.
2148|_http-fetch: Please enter the complete path of the directory to save data in.
2149| http-headers:
2150| Server: nginx
2151| Date: Wed, 18 Mar 2020 21:16:52 GMT
2152| Content-Type: text/html
2153| Connection: close
2154| Vary: Accept-Encoding
2155|
2156|_ (Request type: HEAD)
2157|_http-jsonp-detection: Couldn't find any JSONP endpoints.
2158| http-methods:
2159| Supported Methods: POST OPTIONS GET HEAD TRACE
2160|_ Potentially risky methods: TRACE
2161|_http-mobileversion-checker: No mobile version detected.
2162| http-php-version: Logo query returned unknown hash e1b8228b8e58c30ad0d74a0755fd1bbe
2163|_Credits query returned unknown hash e1b8228b8e58c30ad0d74a0755fd1bbe
2164|_http-security-headers:
2165| http-sitemap-generator:
2166| Directory structure:
2167| /
2168| Other: 1; htm: 1; jpg: 1
2169| /images/
2170| jpg: 17
2171| Longest directory structure:
2172| Depth: 1
2173| Dir: /images/
2174| Total files found (by extension):
2175|_ Other: 1; htm: 1; jpg: 18
2176|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
2177|_http-title: Alena Child Model
2178| http-vhosts:
2179|_127 names had status 200
2180|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
2181|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
2182|_http-xssed: No previously reported XSS vuln.
2183Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2184Device type: WAP|general purpose|specialized|broadband router
2185Running (JUST GUESSING): Linux 2.6.X|2.4.X (96%), Philips embedded (92%), Crestron 2-Series (90%), Asus embedded (87%)
2186OS CPE: cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.4.18 cpe:/o:linux:linux_kernel cpe:/o:crestron:2_series cpe:/h:asus:rt-ac66u cpe:/o:linux:linux_kernel:2.6 cpe:/h:asus:rt-n10
2187Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (96%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (94%), OpenWrt White Russian 0.9 (Linux 2.4.30) (94%), Linux 2.4.18 (92%), Philips Hue Bridge 2.0 (Linux) (92%), Crestron XPanel control system (90%), OpenWrt (Linux 2.4.30 - 2.4.34) (89%), OpenWrt (Linux 2.4.32) (89%), Asus RT-AC66U router (Linux 2.6) (87%), Asus RT-N10 router or AXIS 211A Network Camera (Linux 2.6) (87%)
2188No exact OS matches for host (test conditions non-ideal).
2189Network Distance: 9 hops
2190TCP Sequence Prediction: Difficulty=260 (Good luck!)
2191IP ID Sequence Generation: All zeros
2192
2193TRACEROUTE (using port 80/tcp)
2194HOP RTT ADDRESS
21951 260.78 ms 10.202.12.1
21962 260.81 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
21973 260.83 ms vl1337.fra-itx2-core-1.cdn77.com (185.229.188.4)
21984 260.86 ms he-net.peering.cz (91.213.211.118)
21995 260.85 ms 100ge16-1.core1.fra1.he.net (184.105.213.233)
22006 260.89 ms 100ge6-1.core1.ams1.he.net (72.52.92.5)
22017 ...
22028 260.98 ms 100ge2-1.core1.ams1.he.net (184.104.192.129)
22039 260.92 ms no-reverse-dns-configured.com (94.102.51.112)
2204
2205NSE: Script Post-scanning.
2206Initiating NSE at 17:17
2207Completed NSE at 17:17, 0.00s elapsed
2208Initiating NSE at 17:17
2209Completed NSE at 17:17, 0.00s elapsed
2210##################################################################################################################################
2211Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-18 17:27 EDT
2212NSE: Loaded 49 scripts for scanning.
2213NSE: Script Pre-scanning.
2214Initiating NSE at 17:27
2215Completed NSE at 17:27, 0.00s elapsed
2216Initiating NSE at 17:27
2217Completed NSE at 17:27, 0.00s elapsed
2218Initiating Ping Scan at 17:27
2219Scanning www.alenamodel.com (94.102.51.112) [4 ports]
2220Completed Ping Scan at 17:27, 0.17s elapsed (1 total hosts)
2221Initiating Parallel DNS resolution of 1 host. at 17:27
2222Completed Parallel DNS resolution of 1 host. at 17:27, 0.02s elapsed
2223Initiating SYN Stealth Scan at 17:27
2224Scanning www.alenamodel.com (94.102.51.112) [1 port]
2225Discovered open port 110/tcp on 94.102.51.112
2226Completed SYN Stealth Scan at 17:27, 0.31s elapsed (1 total ports)
2227Initiating Service scan at 17:27
2228Scanning 1 service on www.alenamodel.com (94.102.51.112)
2229Completed Service scan at 17:27, 0.33s elapsed (1 service on 1 host)
2230Initiating OS detection (try #1) against www.alenamodel.com (94.102.51.112)
2231Retrying OS detection (try #2) against www.alenamodel.com (94.102.51.112)
2232Initiating Traceroute at 17:27
2233Completed Traceroute at 17:28, 3.02s elapsed
2234Initiating Parallel DNS resolution of 8 hosts. at 17:28
2235Completed Parallel DNS resolution of 8 hosts. at 17:28, 0.27s elapsed
2236NSE: Script scanning 94.102.51.112.
2237Initiating NSE at 17:28
2238NSE Timing: About 68.66% done; ETC: 17:29 (0:00:30 remaining)
2239Completed NSE at 17:29, 91.17s elapsed
2240Initiating NSE at 17:29
2241Completed NSE at 17:29, 0.05s elapsed
2242Nmap scan report for www.alenamodel.com (94.102.51.112)
2243Host is up (0.29s latency).
2244rDNS record for 94.102.51.112: no-reverse-dns-configured.com
2245
2246PORT STATE SERVICE VERSION
2247110/tcp open pop3 Dovecot pop3d
2248|_pop3-capabilities: TOP STLS CAPA UIDL USER RESP-CODES PIPELINING AUTH-RESP-CODE SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5)
2249Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2250Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (97%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (96%), OpenWrt White Russian 0.9 (Linux 2.4.30) (96%), OpenWrt (Linux 2.4.32) (92%), Philips Hue Bridge 2.0 (Linux) (92%), Linux 2.6.24 (91%), OpenWrt (Linux 2.4.30 - 2.4.34) (90%), Crestron XPanel control system (90%), Linux 2.4.18 (90%), Toshiba Magnia SG10 server appliance (Linux 2.4.18) (89%)
2251No exact OS matches for host (test conditions non-ideal).
2252Network Distance: 9 hops
2253TCP Sequence Prediction: Difficulty=259 (Good luck!)
2254IP ID Sequence Generation: All zeros
2255
2256TRACEROUTE (using port 110/tcp)
2257HOP RTT ADDRESS
22581 253.12 ms 10.202.12.1
22592 369.11 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
22603 369.15 ms vl1337.fra-itx2-core-1.cdn77.com (185.229.188.4)
22614 369.18 ms he-net.peering.cz (91.213.211.118)
22625 369.17 ms 100ge16-1.core1.fra1.he.net (184.105.213.233)
22636 369.21 ms 100ge6-1.core1.ams1.he.net (72.52.92.5)
22647 ...
22658 369.24 ms 100ge2-1.core1.ams1.he.net (184.104.192.129)
22669 369.27 ms no-reverse-dns-configured.com (94.102.51.112)
2267
2268NSE: Script Post-scanning.
2269Initiating NSE at 17:29
2270Completed NSE at 17:29, 0.00s elapsed
2271Initiating NSE at 17:29
2272Completed NSE at 17:29, 0.00s elapsed
2273#################################################################################################################################
2274--------------------------------------------------------
2275<<<Yasuo discovered following vulnerable applications>>>
2276--------------------------------------------------------
2277+------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
2278| App Name | URL to Application | Potential Exploit | Username | Password |
2279+------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
2280| phpMyAdmin | http://94.102.51.112:80/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | Not Found | Not Found |
2281+------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
2282#################################################################################################################################
2283Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-18 17:02 EDT
2284Nmap scan report for no-reverse-dns-configured.com (94.102.51.112)
2285Host is up (0.21s latency).
2286Not shown: 466 filtered ports, 1 closed port
2287Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
2288PORT STATE SERVICE VERSION
228922/tcp open ssh OpenSSH 7.4 (protocol 2.0)
2290| ssh-hostkey:
2291| 2048 27:10:8b:2d:55:3f:93:10:9f:ba:60:48:15:2f:0d:a4 (RSA)
2292| 256 0d:61:df:64:d8:cf:76:01:c2:57:79:de:ef:12:b2:8a (ECDSA)
2293|_ 256 e8:da:20:c5:36:c1:5b:ec:a6:43:e9:8b:76:a9:43:96 (ED25519)
229425/tcp open smtp Exim smtpd 4.89
2295| smtp-commands: a13s08.host.com Hello no-reverse-dns-configured.com [84.17.52.74], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, CHUNKING, STARTTLS, HELP,
2296|_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
2297| ssl-cert: Subject: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
2298| Not valid before: 2018-03-05T07:49:40
2299|_Not valid after: 2028-03-02T07:49:40
2300|_ssl-date: TLS randomness does not represent time
230153/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
2302| dns-nsid:
2303|_ bind.version: 9.9.4-RedHat-9.9.4-51.el7_4.2
230480/tcp open http nginx
2305|_http-generator: Microsoft FrontPage 5.0
2306| http-methods:
2307|_ Potentially risky methods: TRACE
2308|_http-title: Andy Pioneer Top Sites
2309110/tcp open pop3 Dovecot pop3d
2310|_pop3-capabilities: USER RESP-CODES STLS CAPA PIPELINING UIDL SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) TOP AUTH-RESP-CODE
2311|_ssl-date: TLS randomness does not represent time
2312143/tcp open imap Dovecot imapd
2313|_imap-capabilities: IMAP4rev1 AUTH=LOGIN AUTH=CRAM-MD5A0001 IDLE post-login STARTTLS OK listed LOGIN-REFERRALS Pre-login AUTH=DIGEST-MD5 more SASL-IR have ENABLE ID AUTH=PLAIN capabilities LITERAL+
2314|_ssl-date: TLS randomness does not represent time
2315465/tcp open ssl/smtp Exim smtpd 4.89
2316|_smtp-commands: SMTP EHLO no-reverse-dns-configured.com: failed to receive data: failed to receive data
2317| ssl-cert: Subject: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
2318| Not valid before: 2018-03-05T07:49:40
2319|_Not valid after: 2028-03-02T07:49:40
2320|_ssl-date: TLS randomness does not represent time
2321993/tcp open ssl/imaps?
2322|_ssl-date: TLS randomness does not represent time
2323995/tcp open ssl/pop3s?
2324|_ssl-date: TLS randomness does not represent time
2325Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (97%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (96%), OpenWrt White Russian 0.9 (Linux 2.4.30) (96%), Linux 2.4.18 (90%), Asus RT-AC66U router (Linux 2.6) (89%), Asus RT-N16 WAP (Linux 2.6) (89%), Asus RT-N66U WAP (Linux 2.6) (89%), Tomato 1.28 (Linux 2.6.22) (89%), Crestron XPanel control system (89%), OpenWrt (Linux 2.4.32) (89%)
2326No exact OS matches for host (test conditions non-ideal).
2327Network Distance: 9 hops
2328Service Info: Host: a13s08.host.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
2329
2330TRACEROUTE (using port 22/tcp)
2331HOP RTT ADDRESS
23321 169.30 ms 10.202.12.1
23332 169.34 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
23343 169.34 ms vl1337.fra-itx2-core-1.cdn77.com (185.229.188.4)
23354 169.36 ms he-net.peering.cz (91.213.211.118)
23365 169.36 ms 100ge16-1.core1.fra1.he.net (184.105.213.233)
23376 169.38 ms 100ge6-1.core1.ams1.he.net (72.52.92.5)
23387 ...
23398 169.39 ms 100ge2-1.core1.ams1.he.net (184.104.192.129)
23409 169.43 ms no-reverse-dns-configured.com (94.102.51.112)
2341##################################################################################################################################
2342Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-18 17:05 EDT
2343Nmap scan report for no-reverse-dns-configured.com (94.102.51.112)
2344Host is up (0.23s latency).
2345Not shown: 13 filtered ports
2346Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
2347PORT STATE SERVICE VERSION
234853/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
234953/udp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
2350| dns-nsid:
2351|_ bind.version: 9.9.4-RedHat-9.9.4-51.el7_4.2
235267/udp open|filtered dhcps
235368/udp open|filtered dhcpc
235469/udp open|filtered tftp
235588/udp open|filtered kerberos-sec
2356123/udp open|filtered ntp
2357137/udp open|filtered netbios-ns
2358138/udp open|filtered netbios-dgm
2359139/udp open|filtered netbios-ssn
2360161/udp open|filtered snmp
2361162/udp open|filtered snmptrap
2362389/udp open|filtered ldap
2363520/udp open|filtered route
23642049/udp open|filtered nfs
2365Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2366Device type: WAP|general purpose|specialized|broadband router
2367Running (JUST GUESSING): Linux 2.6.X|2.4.X (96%), Philips embedded (90%), Crestron 2-Series (90%), Asus embedded (87%)
2368OS CPE: cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.4.18 cpe:/o:linux:linux_kernel cpe:/o:crestron:2_series cpe:/h:asus:rt-ac66u cpe:/o:linux:linux_kernel:2.6 cpe:/h:asus:rt-n10
2369Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (96%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (94%), OpenWrt White Russian 0.9 (Linux 2.4.30) (94%), Linux 2.4.18 (92%), Philips Hue Bridge 2.0 (Linux) (90%), Crestron XPanel control system (90%), OpenWrt (Linux 2.4.30 - 2.4.34) (89%), OpenWrt (Linux 2.4.32) (89%), Asus RT-AC66U router (Linux 2.6) (87%), Asus RT-N10 router or AXIS 211A Network Camera (Linux 2.6) (87%)
2370No exact OS matches for host (test conditions non-ideal).
2371Network Distance: 8 hops
2372Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
2373
2374TRACEROUTE (using port 53/tcp)
2375HOP RTT ADDRESS
23761 245.40 ms 10.202.12.1
23772 245.44 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
23783 245.46 ms vl1337.fra-itx2-core-1.cdn77.com (185.229.188.4)
23794 245.51 ms he-net.peering.cz (91.213.211.118)
23805 245.49 ms 100ge16-1.core1.fra1.he.net (184.105.213.233)
23816 245.51 ms 100ge11-1.core1.fra2.he.net (72.52.92.86)
23827 245.55 ms 100ge0-54.core1.ams2.he.net (184.104.192.130)
23838 245.61 ms no-reverse-dns-configured.com (94.102.51.112)
2384#################################################################################################################################
2385Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-18 17:10 EDT
2386Nmap scan report for no-reverse-dns-configured.com (94.102.51.112)
2387Host is up (0.20s latency).
2388
2389PORT STATE SERVICE VERSION
239022/tcp open ssh?
2391|_ssh-auth-methods: ERROR: Script execution failed (use -d to debug)
2392|_ssh-brute: ERROR: Script execution failed (use -d to debug)
2393|_ssh-hostkey: ERROR: Script execution failed (use -d to debug)
2394|_ssh-publickey-acceptance: ERROR: Script execution failed (use -d to debug)
2395|_ssh-run: ERROR: Script execution failed (use -d to debug)
2396Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2397Device type: WAP|general purpose|specialized|broadband router
2398Running (JUST GUESSING): Linux 2.6.X|2.4.X (96%), Philips embedded (90%), Crestron 2-Series (90%), Asus embedded (87%)
2399OS CPE: cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.4.18 cpe:/o:linux:linux_kernel cpe:/o:crestron:2_series cpe:/h:asus:rt-ac66u cpe:/o:linux:linux_kernel:2.6 cpe:/h:asus:rt-n10
2400Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (96%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (94%), OpenWrt White Russian 0.9 (Linux 2.4.30) (94%), Linux 2.4.18 (92%), Philips Hue Bridge 2.0 (Linux) (90%), Crestron XPanel control system (90%), OpenWrt (Linux 2.4.30 - 2.4.34) (89%), OpenWrt (Linux 2.4.32) (89%), Asus RT-AC66U router (Linux 2.6) (87%), Asus RT-N10 router or AXIS 211A Network Camera (Linux 2.6) (87%)
2401No exact OS matches for host (test conditions non-ideal).
2402Network Distance: 9 hops
2403
2404TRACEROUTE (using port 22/tcp)
2405HOP RTT ADDRESS
24061 148.84 ms 10.202.12.1
24072 148.87 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
24083 148.90 ms vl1337.fra-itx2-core-1.cdn77.com (185.229.188.4)
24094 148.94 ms he-net.peering.cz (91.213.211.118)
24105 148.93 ms 100ge16-1.core1.fra1.he.net (184.105.213.233)
24116 212.99 ms 100ge6-1.core1.ams1.he.net (72.52.92.5)
24127 ...
24138 149.00 ms 100ge2-1.core1.ams1.he.net (184.104.192.129)
24149 149.06 ms no-reverse-dns-configured.com (94.102.51.112)
2415#################################################################################################################################
2416Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-18 17:14 EDT
2417NSE: [smtp-brute] usernames: Time limit 3m00s exceeded.
2418NSE: [smtp-brute] usernames: Time limit 3m00s exceeded.
2419NSE: [smtp-brute] passwords: Time limit 3m00s exceeded.
2420Nmap scan report for no-reverse-dns-configured.com (94.102.51.112)
2421Host is up (0.25s latency).
2422
2423PORT STATE SERVICE VERSION
242425/tcp open smtp Exim smtpd 4.89
2425| smtp-brute:
2426| Accounts: No valid accounts found
2427|_ Statistics: Performed 1910 guesses in 181 seconds, average tps: 10.0
2428| smtp-commands: a13s08.host.com Hello no-reverse-dns-configured.com [84.17.52.74], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, CHUNKING, STARTTLS, HELP,
2429|_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
2430| smtp-enum-users:
2431|_ Couldn't find any accounts
2432|_smtp-open-relay: SMTP RSET: failed to receive data: connection closed
2433| smtp-vuln-cve2010-4344:
2434| Exim version: 4.89
2435| Exim heap overflow vulnerability (CVE-2010-4344):
2436| Exim (CVE-2010-4344): NOT VULNERABLE
2437| Exim privileges escalation vulnerability (CVE-2010-4345):
2438| Exim (CVE-2010-4345): NOT VULNERABLE
2439|_ To confirm and exploit the vulnerabilities, run with --script-args='smtp-vuln-cve2010-4344.exploit'
2440Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2441Device type: WAP|general purpose|specialized|broadband router
2442Running (JUST GUESSING): Linux 2.4.X|2.6.X (94%), Philips embedded (91%), Crestron 2-Series (89%), Toshiba embedded (86%), Asus embedded (86%)
2443OS CPE: cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:linux:linux_kernel:2.4.18 cpe:/o:linux:linux_kernel cpe:/o:crestron:2_series cpe:/h:toshiba:magnia_sg10 cpe:/h:asus:rt-ac66u cpe:/o:linux:linux_kernel:2.6
2444Aggressive OS guesses: OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (94%), OpenWrt White Russian 0.9 (Linux 2.4.30) (94%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (94%), Linux 2.4.18 (92%), Philips Hue Bridge 2.0 (Linux) (91%), Crestron XPanel control system (89%), OpenWrt (Linux 2.4.30 - 2.4.34) (88%), OpenWrt (Linux 2.4.32) (88%), Toshiba Magnia SG10 server appliance (Linux 2.4.18) (86%), Asus RT-AC66U router (Linux 2.6) (86%)
2445No exact OS matches for host (test conditions non-ideal).
2446Network Distance: 8 hops
2447Service Info: Host: a13s08.host.com
2448
2449TRACEROUTE (using port 25/tcp)
2450HOP RTT ADDRESS
24511 311.82 ms 10.202.12.1
24522 311.86 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
24533 311.88 ms vl1337.fra-itx2-core-1.cdn77.com (185.229.188.4)
24544 311.92 ms he-net.peering.cz (91.213.211.118)
24555 311.91 ms 100ge16-1.core1.fra1.he.net (184.105.213.233)
24566 311.93 ms 100ge11-1.core1.fra2.he.net (72.52.92.86)
24577 311.97 ms 100ge0-54.core1.ams2.he.net (184.104.192.130)
24588 312.10 ms no-reverse-dns-configured.com (94.102.51.112)
2459#################################################################################################################################
2460Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-18 17:19 EDT
2461Nmap scan report for no-reverse-dns-configured.com (94.102.51.112)
2462Host is up (0.22s latency).
2463
2464PORT STATE SERVICE VERSION
246553/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
2466|_dns-fuzz: Server didn't response to our probe, can't fuzz
2467| dns-nsec-enum:
2468|_ No NSEC records found
2469| dns-nsec3-enum:
2470|_ DNSSEC NSEC3 not supported
2471| dns-nsid:
2472|_ bind.version: 9.9.4-RedHat-9.9.4-51.el7_4.2
2473Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2474Device type: WAP|general purpose|specialized|broadband router
2475Running (JUST GUESSING): Linux 2.4.X|2.6.X (94%), Philips embedded (91%), Crestron 2-Series (89%), Toshiba embedded (86%), Asus embedded (86%)
2476OS CPE: cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:linux:linux_kernel:2.4.18 cpe:/o:linux:linux_kernel cpe:/o:crestron:2_series cpe:/h:toshiba:magnia_sg10 cpe:/h:asus:rt-ac66u cpe:/o:linux:linux_kernel:2.6
2477Aggressive OS guesses: OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (94%), OpenWrt White Russian 0.9 (Linux 2.4.30) (94%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (94%), Linux 2.4.18 (92%), Philips Hue Bridge 2.0 (Linux) (91%), Crestron XPanel control system (89%), OpenWrt (Linux 2.4.30 - 2.4.34) (88%), OpenWrt (Linux 2.4.32) (88%), Toshiba Magnia SG10 server appliance (Linux 2.4.18) (86%), Asus RT-AC66U router (Linux 2.6) (86%)
2478No exact OS matches for host (test conditions non-ideal).
2479Network Distance: 8 hops
2480Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
2481
2482Host script results:
2483| dns-blacklist:
2484| SPAM
2485|_ l2.apews.org - SPAM
2486| dns-brute:
2487|_ DNS Brute-force hostnames: No results.
2488
2489TRACEROUTE (using port 53/tcp)
2490HOP RTT ADDRESS
24911 341.37 ms 10.202.12.1
24922 227.21 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
24933 227.24 ms vl1337.fra-itx2-core-1.cdn77.com (185.229.188.4)
24944 227.27 ms he-net.peering.cz (91.213.211.118)
24955 227.27 ms 100ge16-1.core1.fra1.he.net (184.105.213.233)
24966 227.54 ms 100ge11-1.core1.fra2.he.net (72.52.92.86)
24977 227.53 ms 100ge0-54.core1.ams2.he.net (184.104.192.130)
24988 227.51 ms no-reverse-dns-configured.com (94.102.51.112)
2499#################################################################################################################################
2500Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-18 17:19 EDT
2501Nmap scan report for no-reverse-dns-configured.com (94.102.51.112)
2502Host is up (0.21s latency).
2503
2504PORT STATE SERVICE VERSION
250567/tcp filtered dhcps
250667/udp open|filtered dhcps
2507|_dhcp-discover: ERROR: Script execution failed (use -d to debug)
2508Too many fingerprints match this host to give specific OS details
2509Network Distance: 8 hops
2510
2511TRACEROUTE (using proto 1/icmp)
2512HOP RTT ADDRESS
25131 256.50 ms 10.202.12.1
25142 256.55 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
25153 256.57 ms vl1337.fra-itx2-core-1.cdn77.com (185.229.188.4)
25164 256.61 ms he-net.peering.cz (91.213.211.118)
25175 256.60 ms 100ge16-1.core1.fra1.he.net (184.105.213.233)
25186 256.63 ms 100ge6-1.core1.ams1.he.net (72.52.92.5)
25197 ...
25208 256.71 ms no-reverse-dns-configured.com (94.102.51.112)
2521#################################################################################################################################
2522Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-18 17:21 EDT
2523Nmap scan report for no-reverse-dns-configured.com (94.102.51.112)
2524Host is up (0.37s latency).
2525
2526PORT STATE SERVICE VERSION
252768/tcp filtered dhcpc
252868/udp open|filtered dhcpc
2529Too many fingerprints match this host to give specific OS details
2530Network Distance: 8 hops
2531
2532TRACEROUTE (using proto 1/icmp)
2533HOP RTT ADDRESS
25341 563.84 ms 10.202.12.1
25352 680.15 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
25363 680.17 ms vl1337.fra-itx2-core-1.cdn77.com (185.229.188.4)
25374 680.18 ms he-net.peering.cz (91.213.211.118)
25385 680.18 ms 100ge16-1.core1.fra1.he.net (184.105.213.233)
25396 680.19 ms 100ge6-1.core1.ams1.he.net (72.52.92.5)
25407 ...
25418 680.21 ms no-reverse-dns-configured.com (94.102.51.112)
2542#################################################################################################################################
2543Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-18 17:23 EDT
2544Nmap scan report for no-reverse-dns-configured.com (94.102.51.112)
2545Host is up (0.23s latency).
2546
2547PORT STATE SERVICE VERSION
254869/tcp filtered tftp
254969/udp open|filtered tftp
2550Too many fingerprints match this host to give specific OS details
2551Network Distance: 8 hops
2552
2553TRACEROUTE (using proto 1/icmp)
2554HOP RTT ADDRESS
25551 193.51 ms 10.202.12.1
25562 193.55 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
25573 311.42 ms vl1337.fra-itx2-core-1.cdn77.com (185.229.188.4)
25584 311.45 ms he-net.peering.cz (91.213.211.118)
25595 311.45 ms 100ge16-1.core1.fra1.he.net (184.105.213.233)
25606 311.46 ms 100ge6-1.core1.ams1.he.net (72.52.92.5)
25617 ...
25628 311.50 ms no-reverse-dns-configured.com (94.102.51.112)
2563#################################################################################################################################
2564
2565wig - WebApp Information Gatherer
2566
2567
2568Scanning http://94.102.51.112...
2569_________________________________________ SITE INFO _________________________________________
2570IP Title
257194.102.51.112 Andy Pioneer Top Sites
2572
2573__________________________________________ VERSION __________________________________________
2574Name Versions Type
2575phpMyAdmin 4_4_15_8 CMS
2576Apache 2.4.10 | 2.4.11 | 2.4.12 | 2.4.5 | 2.4.6 | 2.4.7 | 2.4.8 Platform
2577 2.4.9
2578PHP 5.4.45 Platform
2579nginx Platform
2580FreeBSD 10 | 11 OS
2581OpenBSD 5.9 OS
2582
2583_____________________________________________________________________________________________
2584Time: 55.1 sec Urls: 714 Fingerprints: 40401
2585##################################################################################################################################
2586HTTP/1.1 200 OK
2587Server: nginx
2588Date: Wed, 18 Mar 2020 21:26:54 GMT
2589Content-Type: text/html
2590Connection: keep-alive
2591Vary: Accept-Encoding
2592
2593HTTP/1.1 200 OK
2594Server: nginx
2595Date: Wed, 18 Mar 2020 21:26:54 GMT
2596Content-Type: text/html
2597Connection: keep-alive
2598Vary: Accept-Encoding
2599#################################################################################################################################
2600NSE: [pop3-brute] usernames: Time limit 3m00s exceeded.
2601NSE: [pop3-brute] usernames: Time limit 3m00s exceeded.
2602NSE: [pop3-brute] passwords: Time limit 3m00s exceeded.
2603Nmap scan report for no-reverse-dns-configured.com (94.102.51.112)
2604Host is up (0.20s latency).
2605
2606PORT STATE SERVICE VERSION
2607110/tcp open pop3 Dovecot pop3d
2608| pop3-brute:
2609| Accounts: No valid accounts found
2610|_ Statistics: Performed 213 guesses in 183 seconds, average tps: 1.1
2611|_pop3-capabilities: TOP USER CAPA RESP-CODES SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) AUTH-RESP-CODE PIPELINING STLS UIDL
2612Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2613Device type: WAP|general purpose|specialized|broadband router
2614Running (JUST GUESSING): Linux 2.6.X|2.4.X (96%), Philips embedded (92%), Crestron 2-Series (90%), Asus embedded (87%)
2615OS CPE: cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.4.18 cpe:/o:linux:linux_kernel cpe:/o:crestron:2_series cpe:/h:asus:rt-ac66u cpe:/o:linux:linux_kernel:2.6 cpe:/h:asus:rt-n10
2616Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (96%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (94%), OpenWrt White Russian 0.9 (Linux 2.4.30) (94%), Linux 2.4.18 (92%), Philips Hue Bridge 2.0 (Linux) (92%), Crestron XPanel control system (90%), OpenWrt (Linux 2.4.30 - 2.4.34) (89%), OpenWrt (Linux 2.4.32) (89%), Asus RT-AC66U router (Linux 2.6) (87%), Asus RT-N10 router or AXIS 211A Network Camera (Linux 2.6) (87%)
2617No exact OS matches for host (test conditions non-ideal).
2618Network Distance: 8 hops
2619
2620TRACEROUTE (using port 110/tcp)
2621HOP RTT ADDRESS
26221 211.98 ms 10.202.12.1
26232 212.01 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
26243 212.02 ms vl1337.fra-itx2-core-1.cdn77.com (185.229.188.4)
26254 212.04 ms he-net.peering.cz (91.213.211.118)
26265 212.04 ms 100ge16-1.core1.fra1.he.net (184.105.213.233)
26276 212.05 ms 100ge11-1.core1.fra2.he.net (72.52.92.86)
26287 212.08 ms 100ge0-54.core1.ams2.he.net (184.104.192.130)
26298 212.08 ms no-reverse-dns-configured.com (94.102.51.112)
2630#################################################################################################################################
2631Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-18 17:30 EDT
2632Nmap scan report for no-reverse-dns-configured.com (94.102.51.112)
2633Host is up (0.16s latency).
2634
2635PORT STATE SERVICE VERSION
2636123/tcp filtered ntp
2637123/udp open|filtered ntp
2638Too many fingerprints match this host to give specific OS details
2639Network Distance: 8 hops
2640
2641TRACEROUTE (using proto 1/icmp)
2642HOP RTT ADDRESS
26431 188.82 ms 10.202.12.1
26442 188.87 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
26453 188.90 ms vl1337.fra-itx2-core-1.cdn77.com (185.229.188.4)
26464 188.94 ms he-net.peering.cz (91.213.211.118)
26475 188.93 ms 100ge16-1.core1.fra1.he.net (184.105.213.233)
26486 189.04 ms 100ge6-1.core1.ams1.he.net (72.52.92.5)
26497 ...
26508 189.04 ms no-reverse-dns-configured.com (94.102.51.112)
2651##################################################################################################################################
2652--------------------------------------------------------
2653<<<Yasuo discovered following vulnerable applications>>>
2654--------------------------------------------------------
2655+------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
2656| App Name | URL to Application | Potential Exploit | Username | Password |
2657+------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
2658| phpMyAdmin | http://94.102.51.112:80/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | Not Found | Not Found |
2659+------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
2660#################################################################################################################################
2661Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-18 17:37 EDT
2662Nmap scan report for no-reverse-dns-configured.com (94.102.51.112)
2663Host is up (0.17s latency).
2664Not shown: 64514 filtered ports, 1012 closed ports
2665PORT STATE SERVICE VERSION
266622/tcp open ssh?
2667|_ssh-hostkey: ERROR: Script execution failed (use -d to debug)
266825/tcp open smtp Exim smtpd 4.89
2669| smtp-commands: a13s08.host.com Hello no-reverse-dns-configured.com [84.17.52.74], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, CHUNKING, STARTTLS, HELP,
2670|_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
2671| ssl-cert: Subject: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
2672| Not valid before: 2018-03-05T07:49:40
2673|_Not valid after: 2028-03-02T07:49:40
2674|_ssl-date: TLS randomness does not represent time
267553/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
2676| dns-nsid:
2677|_ bind.version: 9.9.4-RedHat-9.9.4-51.el7_4.2
267880/tcp open http nginx
2679|_http-generator: Microsoft FrontPage 5.0
2680| http-methods:
2681|_ Potentially risky methods: TRACE
2682|_http-title: Andy Pioneer Top Sites
2683110/tcp open pop3 Dovecot pop3d
2684|_pop3-capabilities: UIDL RESP-CODES PIPELINING TOP USER SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) CAPA STLS AUTH-RESP-CODE
2685|_ssl-date: TLS randomness does not represent time
2686143/tcp open imap Dovecot imapd
2687|_imap-capabilities: IMAP4rev1 more AUTH=CRAM-MD5A0001 capabilities post-login AUTH=DIGEST-MD5 ENABLE AUTH=PLAIN AUTH=LOGIN LITERAL+ have STARTTLS IDLE Pre-login listed LOGIN-REFERRALS OK SASL-IR ID
2688|_ssl-date: TLS randomness does not represent time
2689465/tcp open ssl/smtp Exim smtpd 4.89
2690|_smtp-commands: SMTP EHLO no-reverse-dns-configured.com: failed to receive data: failed to receive data
2691| ssl-cert: Subject: commonName=a13s08.host.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
2692| Not valid before: 2018-03-05T07:49:40
2693|_Not valid after: 2028-03-02T07:49:40
2694|_ssl-date: TLS randomness does not represent time
2695993/tcp open ssl/imaps?
2696|_ssl-date: TLS randomness does not represent time
2697995/tcp open ssl/pop3s?
2698|_ssl-date: TLS randomness does not represent time
2699Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (97%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (96%), OpenWrt White Russian 0.9 (Linux 2.4.30) (96%), Linux 2.4.18 (90%), Asus RT-AC66U router (Linux 2.6) (89%), Asus RT-N16 WAP (Linux 2.6) (89%), Asus RT-N66U WAP (Linux 2.6) (89%), Tomato 1.28 (Linux 2.6.22) (89%), Crestron XPanel control system (88%), OpenWrt (Linux 2.4.32) (88%)
2700No exact OS matches for host (test conditions non-ideal).
2701Network Distance: 9 hops
2702Service Info: Host: a13s08.host.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
2703
2704TRACEROUTE (using port 443/tcp)
2705HOP RTT ADDRESS
27061 247.92 ms 10.202.12.1
27072 247.95 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
27083 247.97 ms vl1337.fra-itx2-core-1.cdn77.com (185.229.188.4)
27094 247.99 ms he-net.peering.cz (91.213.211.118)
27105 361.84 ms 100ge16-1.core1.fra1.he.net (184.105.213.233)
27116 248.01 ms 100ge6-1.core1.ams1.he.net (72.52.92.5)
27127 ...
27138 248.03 ms 100ge2-1.core1.ams1.he.net (184.104.192.129)
27149 248.06 ms no-reverse-dns-configured.com (94.102.51.112)
2715#################################################################################################################################
2716Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-18 17:48 EDT
2717Nmap scan report for no-reverse-dns-configured.com (94.102.51.112)
2718Host is up (0.20s latency).
2719
2720PORT STATE SERVICE VERSION
272153/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
272267/tcp filtered dhcps
272368/tcp filtered dhcpc
272469/tcp filtered tftp
272588/tcp filtered kerberos-sec
2726123/tcp filtered ntp
2727137/tcp filtered netbios-ns
2728138/tcp filtered netbios-dgm
2729139/tcp filtered netbios-ssn
2730161/tcp filtered snmp
2731162/tcp filtered snmptrap
2732389/tcp filtered ldap
2733520/tcp filtered efs
27342049/tcp filtered nfs
273553/udp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
2736| dns-nsid:
2737|_ bind.version: 9.9.4-RedHat-9.9.4-51.el7_4.2
273867/udp open|filtered dhcps
273968/udp open|filtered dhcpc
274069/udp open|filtered tftp
274188/udp open|filtered kerberos-sec
2742123/udp open|filtered ntp
2743137/udp open|filtered netbios-ns
2744138/udp open|filtered netbios-dgm
2745139/udp open|filtered netbios-ssn
2746161/udp open|filtered snmp
2747162/udp open|filtered snmptrap
2748389/udp open|filtered ldap
2749520/udp open|filtered route
27502049/udp open|filtered nfs
2751Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2752Device type: WAP|general purpose|specialized|broadband router
2753Running (JUST GUESSING): Linux 2.6.X|2.4.X (96%), Philips embedded (90%), Crestron 2-Series (90%), Asus embedded (87%)
2754OS CPE: cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.4.18 cpe:/o:linux:linux_kernel cpe:/o:crestron:2_series cpe:/h:asus:rt-ac66u cpe:/o:linux:linux_kernel:2.6 cpe:/h:asus:rt-n10
2755Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (96%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (94%), OpenWrt White Russian 0.9 (Linux 2.4.30) (94%), Linux 2.4.18 (92%), Philips Hue Bridge 2.0 (Linux) (90%), Crestron XPanel control system (90%), OpenWrt (Linux 2.4.30 - 2.4.34) (89%), OpenWrt (Linux 2.4.32) (89%), Asus RT-AC66U router (Linux 2.6) (87%), Asus RT-N10 router or AXIS 211A Network Camera (Linux 2.6) (87%)
2756No exact OS matches for host (test conditions non-ideal).
2757Network Distance: 9 hops
2758Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
2759
2760TRACEROUTE (using port 53/tcp)
2761HOP RTT ADDRESS
27621 290.64 ms 10.202.12.1
27632 290.68 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
27643 290.70 ms vl1337.fra-itx2-core-1.cdn77.com (185.229.188.4)
27654 290.73 ms he-net.peering.cz (91.213.211.118)
27665 290.73 ms 100ge16-1.core1.fra1.he.net (184.105.213.233)
27676 290.76 ms 100ge6-1.core1.ams1.he.net (72.52.92.5)
27687 ...
27698 290.79 ms 100ge2-1.core1.ams1.he.net (184.104.192.129)
27709 290.82 ms no-reverse-dns-configured.com (94.102.51.112)
2771#################################################################################################################################
2772Hosts
2773=====
2774
2775address mac name os_name os_flavor os_sp purpose info comments
2776------- --- ---- ------- --------- ----- ------- ---- --------
27773.83.211.23 ec2-3-83-211-23.compute-1.amazonaws.com embedded device
27783.216.98.236 ec2-3-216-98-236.compute-1.amazonaws.com Linux 3.X server
277934.224.171.238 ec2-34-224-171-238.compute-1.amazonaws.com Linux server
278034.236.0.217 ec2-34-236-0-217.compute-1.amazonaws.com Linux 3.X server
278134.253.89.155 ec2-34-253-89-155.eu-west-1.compute.amazonaws.com Linux 4.X server
278237.1.207.121 teens-sins.net 2-Series 3.X device
278343.245.223.4 Linux 2.6.X server
278445.60.47.218 Linux 3.X server
278545.88.202.111 Linux 3.X server
278645.239.108.252 whale.ecohosting.cl Linux 3.X server
278752.1.2.24 ec2-52-1-2-24.compute-1.amazonaws.com Linux server
278852.1.174.10 ec2-52-1-174-10.compute-1.amazonaws.com Linux 3.X server
278952.30.54.73 ec2-52-30-54-73.eu-west-1.compute.amazonaws.com Linux 4.X server
279052.52.234.222 ec2-52-52-234-222.us-west-1.compute.amazonaws.com Unknown device
279154.72.57.25 ec2-54-72-57-25.eu-west-1.compute.amazonaws.com Linux 4.X server
279254.85.59.109 ec2-54-85-59-109.compute-1.amazonaws.com Linux 3.X server
279354.194.134.190 ec2-54-194-134-190.eu-west-1.compute.amazonaws.com Linux 4.X server
279464.69.94.253 Unknown device
279569.163.233.4 ps54052.dreamhostps.com Linux 14.04 server
279674.117.180.192 embedded device
279782.94.222.131 Unknown device
279892.123.250.35 a92-123-250-35.deploy.static.akamaitechnologies.com embedded device
279992.123.250.65 a92-123-250-65.deploy.static.akamaitechnologies.com Linux 3.X server
280094.102.51.112 no-reverse-dns-configured.com Linux 2.6.X server
2801104.244.73.40 Unknown device
2802104.244.76.231 Linux 3.X server
2803104.244.77.188 Linux 3.X server
2804104.244.79.89 Linux 3.X server
2805107.180.28.114 ip-107-180-28-114.ip.secureserver.net Unknown device
2806111.90.145.39 web16.support-emilid.com Linux 2.6.X server
2807143.95.110.248 ip-143-95-110-248.iplocal Linux 3.X server
2808149.126.72.220 149.126.72.220.ip.incapdns.net Linux 3.X server
2809151.106.38.107 ns3152160.ip-151-106-38.eu embedded device
2810158.69.13.254 ip254.ip-158-69-13.net 2-Series 2.6.X device
2811162.244.35.13 xnlog.com FreeBSD 7.X device
2812163.247.48.46 Unknown device
2813163.247.127.20 Unknown device
2814163.247.130.114 embedded device
2815163.247.175.176 Unknown device
2816165.22.143.229 Linux 2.6.X server
2817165.227.99.239 Linux 3.X server
2818169.239.218.20 cp10.domains.co.za Linux 2.6.X server
2819173.214.244.169 173.214.244.169.serverel.net Unknown device
2820174.142.53.51 mail.marineland.ca Linux 3.X server
2821186.64.118.40 mail.blue127.dnsmisitio.net embedded device
2822190.98.209.37 static.190.98.209.37.gtdinternet.com Unknown device
2823190.107.177.35 srv25.cpanelhost.cl Linux 2.6.X server
2824190.110.121.175 todofutbol.hn.cl Unknown device
2825190.153.209.187 static.190.153.209.187.gtdinternet.com Unknown device
2826190.153.219.254 mail.evopoli.cl Linux 3.X server
2827192.185.134.58 ns36.accountservergroup.com Linux 3.X server
2828200.2.249.28 Linux 3.X server
2829200.10.251.82 homer.sii.cl Unknown device
2830200.12.19.101 embedded device
2831200.29.0.33 cp33.puntoweb.cl Unknown device
2832200.54.92.108 Linux 9.0 server
2833200.54.230.247 plesk.tdata.cloud Linux 3.X server
2834200.55.198.228 Linux 2.4.X server
2835200.68.30.227 mail.gorecoquimbo.cl Unknown device
2836200.68.34.99 Unknown device
2837200.73.54.34 mail.maxtel.cl Linux 2.6.X server
2838200.91.40.252 200-91-40-252.avz.cl Unknown device
2839200.91.41.5 cruzblanca.cl Unknown device
2840200.126.100.83 toqui.gorearaucania.cl Unknown device
2841201.159.170.136 soloweb.sinc.cl Unknown device
2842204.93.193.141 suzuka.mochahost.com Unknown device
2843206.48.140.40 Unknown device
2844207.246.147.189 2-Series device
2845207.246.147.190 Linux 4.X server
2846207.246.147.247 Linux 4.X server
2847207.246.147.248 Linux 4.X server
2848211.13.196.135 sv3.isle.ne.jp Linux 2.6.X server
2849212.174.0.150 Windows 2012 server
2850216.172.184.117 Linux 3.X server
2851218.45.5.97 www.town.koya.wakayama.jp Linux 2.6.X server
2852#################################################################################################################################
2853Services
2854========
2855
2856host port proto name state info
2857---- ---- ----- ---- ----- ----
28583.83.211.23 53 tcp domain filtered
28593.83.211.23 53 udp domain unknown
28603.83.211.23 67 tcp dhcps filtered
28613.83.211.23 67 udp dhcps unknown
28623.83.211.23 68 tcp dhcpc filtered
28633.83.211.23 68 udp dhcpc unknown
28643.83.211.23 69 tcp tftp filtered
28653.83.211.23 69 udp tftp unknown
28663.83.211.23 80 tcp http open Microsoft IIS httpd 10.0
28673.83.211.23 88 tcp kerberos-sec filtered
28683.83.211.23 88 udp kerberos-sec unknown
28693.83.211.23 123 tcp ntp filtered
28703.83.211.23 123 udp ntp unknown
28713.83.211.23 137 tcp netbios-ns filtered
28723.83.211.23 137 udp netbios-ns unknown
28733.83.211.23 138 tcp netbios-dgm filtered
28743.83.211.23 138 udp netbios-dgm unknown
28753.83.211.23 139 tcp netbios-ssn filtered
28763.83.211.23 139 udp netbios-ssn unknown
28773.83.211.23 161 tcp snmp filtered
28783.83.211.23 161 udp snmp unknown
28793.83.211.23 162 tcp snmptrap filtered
28803.83.211.23 162 udp snmptrap unknown
28813.83.211.23 389 tcp ldap filtered
28823.83.211.23 389 udp ldap unknown
28833.83.211.23 443 tcp ssl/http open Microsoft IIS httpd 10.0
28843.83.211.23 520 tcp efs filtered
28853.83.211.23 520 udp route unknown
28863.83.211.23 2049 tcp nfs filtered
28873.83.211.23 2049 udp nfs unknown
28883.216.98.236 53 tcp domain filtered
28893.216.98.236 53 udp domain unknown
28903.216.98.236 67 tcp dhcps filtered
28913.216.98.236 67 udp dhcps unknown
28923.216.98.236 68 tcp dhcpc filtered
28933.216.98.236 68 udp dhcpc unknown
28943.216.98.236 69 tcp tftp filtered
28953.216.98.236 69 udp tftp unknown
28963.216.98.236 80 tcp http open Microsoft IIS httpd 10.0
28973.216.98.236 88 tcp kerberos-sec filtered
28983.216.98.236 88 udp kerberos-sec unknown
28993.216.98.236 123 tcp ntp filtered
29003.216.98.236 123 udp ntp unknown
29013.216.98.236 137 tcp netbios-ns filtered
29023.216.98.236 137 udp netbios-ns unknown
29033.216.98.236 138 tcp netbios-dgm filtered
29043.216.98.236 138 udp netbios-dgm unknown
29053.216.98.236 139 tcp netbios-ssn filtered
29063.216.98.236 139 udp netbios-ssn unknown
29073.216.98.236 161 tcp snmp filtered
29083.216.98.236 161 udp snmp unknown
29093.216.98.236 162 tcp snmptrap filtered
29103.216.98.236 162 udp snmptrap unknown
29113.216.98.236 389 tcp ldap filtered
29123.216.98.236 389 udp ldap unknown
29133.216.98.236 443 tcp ssl/http open Microsoft IIS httpd 10.0
29143.216.98.236 520 tcp efs filtered
29153.216.98.236 520 udp route unknown
29163.216.98.236 2049 tcp nfs filtered
29173.216.98.236 2049 udp nfs unknown
291834.224.171.238 53 tcp domain filtered
291934.224.171.238 53 udp domain unknown
292034.224.171.238 67 tcp dhcps filtered
292134.224.171.238 67 udp dhcps unknown
292234.224.171.238 68 tcp dhcpc filtered
292334.224.171.238 68 udp dhcpc unknown
292434.224.171.238 69 tcp tftp filtered
292534.224.171.238 69 udp tftp unknown
292634.224.171.238 80 tcp http open Apache httpd 2.4.29 (Ubuntu)
292734.224.171.238 88 tcp kerberos-sec filtered
292834.224.171.238 88 udp kerberos-sec unknown
292934.224.171.238 123 tcp ntp filtered
293034.224.171.238 123 udp ntp unknown
293134.224.171.238 137 tcp netbios-ns filtered
293234.224.171.238 137 udp netbios-ns unknown
293334.224.171.238 138 tcp netbios-dgm filtered
293434.224.171.238 138 udp netbios-dgm unknown
293534.224.171.238 139 tcp netbios-ssn filtered
293634.224.171.238 139 udp netbios-ssn unknown
293734.224.171.238 161 tcp snmp filtered
293834.224.171.238 161 udp snmp unknown
293934.224.171.238 162 tcp snmptrap filtered
294034.224.171.238 162 udp snmptrap unknown
294134.224.171.238 389 tcp ldap filtered
294234.224.171.238 389 udp ldap unknown
294334.224.171.238 443 tcp ssl/http open Apache httpd 2.4.29 (Ubuntu)
294434.224.171.238 520 tcp efs filtered
294534.224.171.238 520 udp route unknown
294634.224.171.238 2049 tcp nfs filtered
294734.224.171.238 2049 udp nfs unknown
294834.236.0.217 53 tcp domain filtered
294934.236.0.217 53 udp domain unknown
295034.236.0.217 67 tcp dhcps filtered
295134.236.0.217 67 udp dhcps unknown
295234.236.0.217 68 tcp dhcpc filtered
295334.236.0.217 68 udp dhcpc unknown
295434.236.0.217 69 tcp tftp filtered
295534.236.0.217 69 udp tftp unknown
295634.236.0.217 80 tcp http open nginx
295734.236.0.217 88 tcp kerberos-sec filtered
295834.236.0.217 88 udp kerberos-sec unknown
295934.236.0.217 123 tcp ntp filtered
296034.236.0.217 123 udp ntp unknown
296134.236.0.217 137 tcp netbios-ns filtered
296234.236.0.217 137 udp netbios-ns unknown
296334.236.0.217 138 tcp netbios-dgm filtered
296434.236.0.217 138 udp netbios-dgm unknown
296534.236.0.217 139 tcp netbios-ssn filtered
296634.236.0.217 139 udp netbios-ssn unknown
296734.236.0.217 161 tcp snmp filtered
296834.236.0.217 161 udp snmp unknown
296934.236.0.217 162 tcp snmptrap filtered
297034.236.0.217 162 udp snmptrap unknown
297134.236.0.217 389 tcp ldap filtered
297234.236.0.217 389 udp ldap unknown
297334.236.0.217 443 tcp ssl/http open nginx
297434.236.0.217 520 tcp efs filtered
297534.236.0.217 520 udp route unknown
297634.236.0.217 2049 tcp nfs filtered
297734.236.0.217 2049 udp nfs unknown
297834.253.89.155 53 tcp domain closed
297934.253.89.155 53 udp domain unknown
298034.253.89.155 67 tcp dhcps closed
298134.253.89.155 67 udp dhcps unknown
298234.253.89.155 68 tcp dhcpc closed
298334.253.89.155 68 udp dhcpc unknown
298434.253.89.155 69 tcp tftp closed
298534.253.89.155 69 udp tftp unknown
298634.253.89.155 80 tcp http open nginx
298734.253.89.155 88 tcp kerberos-sec closed
298834.253.89.155 88 udp kerberos-sec unknown
298934.253.89.155 123 tcp ntp closed
299034.253.89.155 123 udp ntp unknown
299134.253.89.155 137 tcp netbios-ns closed
299234.253.89.155 137 udp netbios-ns unknown
299334.253.89.155 138 tcp netbios-dgm closed
299434.253.89.155 138 udp netbios-dgm unknown
299534.253.89.155 139 tcp netbios-ssn closed
299634.253.89.155 139 udp netbios-ssn unknown
299734.253.89.155 161 tcp snmp closed
299834.253.89.155 161 udp snmp unknown
299934.253.89.155 162 tcp snmptrap closed
300034.253.89.155 162 udp snmptrap unknown
300134.253.89.155 389 tcp ldap closed
300234.253.89.155 389 udp ldap unknown
300334.253.89.155 443 tcp ssl/http open nginx
300434.253.89.155 520 tcp efs closed
300534.253.89.155 520 udp route unknown
300634.253.89.155 2049 tcp nfs closed
300734.253.89.155 2049 udp nfs unknown
300837.1.207.121 53 tcp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
300937.1.207.121 53 udp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
301037.1.207.121 67 tcp dhcps filtered
301137.1.207.121 67 udp dhcps unknown
301237.1.207.121 68 tcp dhcpc filtered
301337.1.207.121 68 udp dhcpc filtered
301437.1.207.121 69 tcp tftp filtered
301537.1.207.121 69 udp tftp unknown
301637.1.207.121 88 tcp kerberos-sec filtered
301737.1.207.121 88 udp kerberos-sec filtered
301837.1.207.121 123 tcp ntp filtered
301937.1.207.121 123 udp ntp unknown
302037.1.207.121 137 tcp netbios-ns filtered
302137.1.207.121 137 udp netbios-ns unknown
302237.1.207.121 138 tcp netbios-dgm filtered
302337.1.207.121 138 udp netbios-dgm unknown
302437.1.207.121 139 tcp netbios-ssn filtered
302537.1.207.121 139 udp netbios-ssn unknown
302637.1.207.121 161 tcp snmp filtered
302737.1.207.121 161 udp snmp unknown
302837.1.207.121 162 tcp snmptrap filtered
302937.1.207.121 162 udp snmptrap unknown
303037.1.207.121 389 tcp ldap filtered
303137.1.207.121 389 udp ldap unknown
303237.1.207.121 520 tcp efs filtered
303337.1.207.121 520 udp route unknown
303437.1.207.121 2049 tcp nfs filtered
303537.1.207.121 2049 udp nfs filtered
303643.245.223.4 80 tcp http open nginx
303743.245.223.4 443 tcp ssl/http open nginx
303843.245.223.4 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
303945.60.47.218 25 tcp http open Incapsula CDN httpd
304045.60.47.218 53 tcp domain open
304145.60.47.218 53 udp domain open
304245.60.47.218 67 udp dhcps unknown
304345.60.47.218 68 udp dhcpc unknown
304445.60.47.218 69 udp tftp unknown
304545.60.47.218 80 tcp http open Incapsula CDN httpd
304645.60.47.218 81 tcp http open Incapsula CDN httpd
304745.60.47.218 85 tcp http open Incapsula CDN httpd
304845.60.47.218 88 tcp http open Incapsula CDN httpd
304945.60.47.218 88 udp kerberos-sec unknown
305045.60.47.218 123 udp ntp unknown
305145.60.47.218 137 udp netbios-ns unknown
305245.60.47.218 138 udp netbios-dgm unknown
305345.60.47.218 139 udp netbios-ssn unknown
305445.60.47.218 161 udp snmp unknown
305545.60.47.218 162 udp snmptrap unknown
305645.60.47.218 389 tcp ssl/http open Incapsula CDN httpd
305745.60.47.218 389 udp ldap unknown
305845.60.47.218 443 tcp ssl/http open Incapsula CDN httpd
305945.60.47.218 444 tcp ssl/http open Incapsula CDN httpd
306045.60.47.218 445 tcp ssl/http open Incapsula CDN httpd
306145.60.47.218 446 tcp http open Incapsula CDN httpd
306245.60.47.218 520 udp route unknown
306345.60.47.218 587 tcp http open Incapsula CDN httpd
306445.60.47.218 631 tcp http open Incapsula CDN httpd
306545.60.47.218 888 tcp http open Incapsula CDN httpd
306645.60.47.218 995 tcp ssl/http open Incapsula CDN httpd
306745.60.47.218 998 tcp ssl/http open Incapsula CDN httpd
306845.60.47.218 999 tcp http open Incapsula CDN httpd
306945.60.47.218 1000 tcp http open Incapsula CDN httpd
307045.60.47.218 1024 tcp http open Incapsula CDN httpd
307145.60.47.218 1103 tcp http open Incapsula CDN httpd
307245.60.47.218 1234 tcp http open Incapsula CDN httpd
307345.60.47.218 1433 tcp http open Incapsula CDN httpd
307445.60.47.218 1494 tcp http open Incapsula CDN httpd
307545.60.47.218 2000 tcp ssl/http open Incapsula CDN httpd
307645.60.47.218 2001 tcp http open Incapsula CDN httpd
307745.60.47.218 2049 tcp http open Incapsula CDN httpd
307845.60.47.218 2049 udp nfs unknown
307945.60.47.218 2067 tcp http open Incapsula CDN httpd
308045.60.47.218 2100 tcp ssl/http open Incapsula CDN httpd
308145.60.47.218 2222 tcp http open Incapsula CDN httpd
308245.60.47.218 2598 tcp http open Incapsula CDN httpd
308345.60.47.218 3000 tcp http open Incapsula CDN httpd
308445.60.47.218 3050 tcp http open Incapsula CDN httpd
308545.60.47.218 3057 tcp http open Incapsula CDN httpd
308645.60.47.218 3299 tcp http open Incapsula CDN httpd
308745.60.47.218 3306 tcp ssl/http open Incapsula CDN httpd
308845.60.47.218 3333 tcp http open Incapsula CDN httpd
308945.60.47.218 3389 tcp ssl/http open Incapsula CDN httpd
309045.60.47.218 3500 tcp http open Incapsula CDN httpd
309145.60.47.218 3790 tcp http open Incapsula CDN httpd
309245.60.47.218 4000 tcp http open Incapsula CDN httpd
309345.60.47.218 4444 tcp ssl/http open Incapsula CDN httpd
309445.60.47.218 4445 tcp ssl/http open Incapsula CDN httpd
309545.60.47.218 4848 tcp http open Incapsula CDN httpd
309645.60.47.218 5000 tcp http open Incapsula CDN httpd
309745.60.47.218 5009 tcp http open Incapsula CDN httpd
309845.60.47.218 5051 tcp ssl/http open Incapsula CDN httpd
309945.60.47.218 5060 tcp ssl/http open Incapsula CDN httpd
310045.60.47.218 5061 tcp ssl/http open Incapsula CDN httpd
310145.60.47.218 5227 tcp ssl/http open Incapsula CDN httpd
310245.60.47.218 5247 tcp ssl/http open Incapsula CDN httpd
310345.60.47.218 5250 tcp ssl/http open Incapsula CDN httpd
310445.60.47.218 5555 tcp http open Incapsula CDN httpd
310545.60.47.218 5900 tcp http open Incapsula CDN httpd
310645.60.47.218 5901 tcp ssl/http open Incapsula CDN httpd
310745.60.47.218 5902 tcp ssl/http open Incapsula CDN httpd
310845.60.47.218 5903 tcp ssl/http open Incapsula CDN httpd
310945.60.47.218 5904 tcp ssl/http open Incapsula CDN httpd
311045.60.47.218 5905 tcp ssl/http open Incapsula CDN httpd
311145.60.47.218 5906 tcp ssl/http open Incapsula CDN httpd
311245.60.47.218 5907 tcp ssl/http open Incapsula CDN httpd
311345.60.47.218 5908 tcp ssl/http open Incapsula CDN httpd
311445.60.47.218 5909 tcp ssl/http open Incapsula CDN httpd
311545.60.47.218 5910 tcp ssl/http open Incapsula CDN httpd
311645.60.47.218 5920 tcp ssl/http open Incapsula CDN httpd
311745.60.47.218 5984 tcp ssl/http open Incapsula CDN httpd
311845.60.47.218 5985 tcp http open Incapsula CDN httpd
311945.60.47.218 5986 tcp ssl/http open Incapsula CDN httpd
312045.60.47.218 5999 tcp ssl/http open Incapsula CDN httpd
312145.60.47.218 6000 tcp http open Incapsula CDN httpd
312245.60.47.218 6060 tcp http open Incapsula CDN httpd
312345.60.47.218 6161 tcp http open Incapsula CDN httpd
312445.60.47.218 6379 tcp http open Incapsula CDN httpd
312545.60.47.218 6661 tcp ssl/http open Incapsula CDN httpd
312645.60.47.218 6789 tcp http open Incapsula CDN httpd
312745.60.47.218 7000 tcp ssl/http open Incapsula CDN httpd
312845.60.47.218 7001 tcp http open Incapsula CDN httpd
312945.60.47.218 7021 tcp http open Incapsula CDN httpd
313045.60.47.218 7071 tcp ssl/http open Incapsula CDN httpd
313145.60.47.218 7080 tcp http open Incapsula CDN httpd
313245.60.47.218 7272 tcp ssl/http open Incapsula CDN httpd
313345.60.47.218 7443 tcp ssl/http open Incapsula CDN httpd
313445.60.47.218 7700 tcp http open Incapsula CDN httpd
313545.60.47.218 7777 tcp http open Incapsula CDN httpd
313645.60.47.218 7778 tcp http open Incapsula CDN httpd
313745.60.47.218 8000 tcp http open Incapsula CDN httpd
313845.60.47.218 8001 tcp http open Incapsula CDN httpd
313945.60.47.218 8008 tcp http open Incapsula CDN httpd
314045.60.47.218 8014 tcp http open Incapsula CDN httpd
314145.60.47.218 8020 tcp http open Incapsula CDN httpd
314245.60.47.218 8023 tcp http open Incapsula CDN httpd
314345.60.47.218 8028 tcp http open Incapsula CDN httpd
314445.60.47.218 8030 tcp http open Incapsula CDN httpd
314545.60.47.218 8050 tcp http open Incapsula CDN httpd
314645.60.47.218 8051 tcp http open Incapsula CDN httpd
314745.60.47.218 8080 tcp http open Incapsula CDN httpd
314845.60.47.218 8081 tcp http open Incapsula CDN httpd
314945.60.47.218 8082 tcp http open Incapsula CDN httpd
315045.60.47.218 8085 tcp http open Incapsula CDN httpd
315145.60.47.218 8086 tcp http open Incapsula CDN httpd
315245.60.47.218 8087 tcp http open Incapsula CDN httpd
315345.60.47.218 8088 tcp http open Incapsula CDN httpd
315445.60.47.218 8090 tcp http open Incapsula CDN httpd
315545.60.47.218 8091 tcp http open Incapsula CDN httpd
315645.60.47.218 8095 tcp http open Incapsula CDN httpd
315745.60.47.218 8101 tcp http open Incapsula CDN httpd
315845.60.47.218 8161 tcp http open Incapsula CDN httpd
315945.60.47.218 8180 tcp http open Incapsula CDN httpd
316045.60.47.218 8222 tcp http open Incapsula CDN httpd
316145.60.47.218 8333 tcp http open Incapsula CDN httpd
316245.60.47.218 8443 tcp ssl/http open Incapsula CDN httpd
316345.60.47.218 8444 tcp http open Incapsula CDN httpd
316445.60.47.218 8445 tcp http open Incapsula CDN httpd
316545.60.47.218 8503 tcp ssl/http open Incapsula CDN httpd
316645.60.47.218 8686 tcp http open Incapsula CDN httpd
316745.60.47.218 8701 tcp ssl/http open Incapsula CDN httpd
316845.60.47.218 8787 tcp http open Incapsula CDN httpd
316945.60.47.218 8800 tcp http open Incapsula CDN httpd
317045.60.47.218 8812 tcp http open Incapsula CDN httpd
317145.60.47.218 8834 tcp http open Incapsula CDN httpd
317245.60.47.218 8880 tcp http open Incapsula CDN httpd
317345.60.47.218 8888 tcp http open Incapsula CDN httpd
317445.60.47.218 8889 tcp http open Incapsula CDN httpd
317545.60.47.218 8890 tcp http open Incapsula CDN httpd
317645.60.47.218 8899 tcp http open Incapsula CDN httpd
317745.60.47.218 8901 tcp http open Incapsula CDN httpd
317845.60.47.218 8902 tcp http open Incapsula CDN httpd
317945.60.47.218 8999 tcp http open Incapsula CDN httpd
318045.60.47.218 9000 tcp http open Incapsula CDN httpd
318145.60.47.218 9001 tcp http open Incapsula CDN httpd
318245.60.47.218 9002 tcp http open Incapsula CDN httpd
318345.60.47.218 9003 tcp http open Incapsula CDN httpd
318445.60.47.218 9004 tcp http open Incapsula CDN httpd
318545.60.47.218 9005 tcp http open Incapsula CDN httpd
318645.60.47.218 9010 tcp http open Incapsula CDN httpd
318745.60.47.218 9050 tcp http open Incapsula CDN httpd
318845.60.47.218 9080 tcp http open Incapsula CDN httpd
318945.60.47.218 9081 tcp ssl/http open Incapsula CDN httpd
319045.60.47.218 9084 tcp http open Incapsula CDN httpd
319145.60.47.218 9090 tcp http open Incapsula CDN httpd
319245.60.47.218 9099 tcp http open Incapsula CDN httpd
319345.60.47.218 9100 tcp jetdirect open
319445.60.47.218 9111 tcp http open Incapsula CDN httpd
319545.60.47.218 9200 tcp http open Incapsula CDN httpd
319645.60.47.218 9300 tcp http open Incapsula CDN httpd
319745.60.47.218 9500 tcp http open Incapsula CDN httpd
319845.60.47.218 9711 tcp ssl/http open Incapsula CDN httpd
319945.60.47.218 9991 tcp http open Incapsula CDN httpd
320045.60.47.218 9999 tcp http open Incapsula CDN httpd
320145.60.47.218 10000 tcp http open Incapsula CDN httpd
320245.60.47.218 10001 tcp http open Incapsula CDN httpd
320345.60.47.218 10008 tcp http open Incapsula CDN httpd
320445.60.47.218 10443 tcp ssl/http open Incapsula CDN httpd
320545.60.47.218 11001 tcp ssl/http open Incapsula CDN httpd
320645.60.47.218 12174 tcp http open Incapsula CDN httpd
320745.60.47.218 12203 tcp http open Incapsula CDN httpd
320845.60.47.218 12221 tcp http open Incapsula CDN httpd
320945.60.47.218 12345 tcp http open Incapsula CDN httpd
321045.60.47.218 12397 tcp http open Incapsula CDN httpd
321145.60.47.218 12401 tcp http open Incapsula CDN httpd
321245.60.47.218 14330 tcp http open Incapsula CDN httpd
321345.60.47.218 16000 tcp http open Incapsula CDN httpd
321445.60.47.218 20000 tcp http open Incapsula CDN httpd
321545.60.47.218 20010 tcp ssl/http open Incapsula CDN httpd
321645.60.47.218 25000 tcp ssl/http open Incapsula CDN httpd
321745.60.47.218 30000 tcp http open Incapsula CDN httpd
321845.60.47.218 44334 tcp ssl/http open Incapsula CDN httpd
321945.60.47.218 50000 tcp http open Incapsula CDN httpd
322045.60.47.218 50001 tcp ssl/http open Incapsula CDN httpd
322145.60.47.218 50050 tcp ssl/http open Incapsula CDN httpd
322245.88.202.111 22 tcp ssh open OpenSSH 7.9p1 Debian 10+deb10u1 protocol 2.0
322345.88.202.111 53 tcp domain open PowerDNS Authoritative Server 4.2.0-rc3
322445.88.202.111 53 udp domain open PowerDNS Authoritative Server 4.2.0-rc3
322545.88.202.111 67 tcp dhcps closed
322645.88.202.111 67 udp dhcps unknown
322745.88.202.111 68 tcp dhcpc closed
322845.88.202.111 68 udp dhcpc unknown
322945.88.202.111 69 tcp tftp closed
323045.88.202.111 69 udp tftp closed
323145.88.202.111 80 tcp http open nginx
323245.88.202.111 88 tcp kerberos-sec closed
323345.88.202.111 88 udp kerberos-sec unknown
323445.88.202.111 123 tcp ntp closed
323545.88.202.111 123 udp ntp closed
323645.88.202.111 137 tcp netbios-ns closed
323745.88.202.111 137 udp netbios-ns filtered
323845.88.202.111 138 tcp netbios-dgm closed
323945.88.202.111 138 udp netbios-dgm filtered
324045.88.202.111 139 tcp netbios-ssn closed
324145.88.202.111 139 udp netbios-ssn closed
324245.88.202.111 161 tcp snmp closed
324345.88.202.111 161 udp snmp closed
324445.88.202.111 162 tcp snmptrap closed
324545.88.202.111 162 udp snmptrap closed
324645.88.202.111 179 tcp bgp filtered
324745.88.202.111 389 tcp ldap closed
324845.88.202.111 389 udp ldap unknown
324945.88.202.111 443 tcp ssl/http open nginx
325045.88.202.111 520 tcp efs closed
325145.88.202.111 520 udp route unknown
325245.88.202.111 2049 tcp nfs closed
325345.88.202.111 2049 udp nfs closed
325445.88.202.111 10050 tcp tcpwrapped open
325545.239.108.252 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
325645.239.108.252 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
325745.239.108.252 67 tcp dhcps filtered
325845.239.108.252 67 udp dhcps unknown
325945.239.108.252 68 tcp dhcpc filtered
326045.239.108.252 68 udp dhcpc unknown
326145.239.108.252 69 tcp tftp filtered
326245.239.108.252 69 udp tftp unknown
326345.239.108.252 88 tcp kerberos-sec filtered
326445.239.108.252 88 udp kerberos-sec unknown
326545.239.108.252 123 tcp ntp filtered
326645.239.108.252 123 udp ntp unknown
326745.239.108.252 137 tcp netbios-ns filtered
326845.239.108.252 137 udp netbios-ns unknown
326945.239.108.252 138 tcp netbios-dgm filtered
327045.239.108.252 138 udp netbios-dgm unknown
327145.239.108.252 139 tcp netbios-ssn filtered
327245.239.108.252 139 udp netbios-ssn unknown
327345.239.108.252 161 tcp snmp filtered
327445.239.108.252 161 udp snmp unknown
327545.239.108.252 162 tcp snmptrap filtered
327645.239.108.252 162 udp snmptrap unknown
327745.239.108.252 389 tcp ldap filtered
327845.239.108.252 389 udp ldap unknown
327945.239.108.252 520 tcp efs filtered
328045.239.108.252 520 udp route unknown
328145.239.108.252 2049 tcp nfs filtered
328245.239.108.252 2049 udp nfs unknown
328352.1.2.24 53 tcp domain filtered
328452.1.2.24 53 udp domain unknown
328552.1.2.24 67 tcp dhcps filtered
328652.1.2.24 67 udp dhcps unknown
328752.1.2.24 68 tcp dhcpc filtered
328852.1.2.24 68 udp dhcpc unknown
328952.1.2.24 69 tcp tftp filtered
329052.1.2.24 69 udp tftp unknown
329152.1.2.24 80 tcp http open Apache httpd 2.4.29 (Ubuntu)
329252.1.2.24 88 tcp kerberos-sec filtered
329352.1.2.24 88 udp kerberos-sec unknown
329452.1.2.24 123 tcp ntp filtered
329552.1.2.24 123 udp ntp unknown
329652.1.2.24 137 tcp netbios-ns filtered
329752.1.2.24 137 udp netbios-ns unknown
329852.1.2.24 138 tcp netbios-dgm filtered
329952.1.2.24 138 udp netbios-dgm unknown
330052.1.2.24 139 tcp netbios-ssn filtered
330152.1.2.24 139 udp netbios-ssn unknown
330252.1.2.24 161 tcp snmp filtered
330352.1.2.24 161 udp snmp unknown
330452.1.2.24 162 tcp snmptrap filtered
330552.1.2.24 162 udp snmptrap unknown
330652.1.2.24 389 tcp ldap filtered
330752.1.2.24 389 udp ldap unknown
330852.1.2.24 443 tcp ssl/http open Apache httpd 2.4.29 (Ubuntu)
330952.1.2.24 520 tcp efs filtered
331052.1.2.24 520 udp route unknown
331152.1.2.24 2049 tcp nfs filtered
331252.1.2.24 2049 udp nfs unknown
331352.1.174.10 53 tcp domain filtered
331452.1.174.10 53 udp domain unknown
331552.1.174.10 67 tcp dhcps filtered
331652.1.174.10 67 udp dhcps unknown
331752.1.174.10 68 tcp dhcpc filtered
331852.1.174.10 68 udp dhcpc unknown
331952.1.174.10 69 tcp tftp filtered
332052.1.174.10 69 udp tftp unknown
332152.1.174.10 80 tcp http open nginx
332252.1.174.10 88 tcp kerberos-sec filtered
332352.1.174.10 88 udp kerberos-sec unknown
332452.1.174.10 123 tcp ntp filtered
332552.1.174.10 123 udp ntp unknown
332652.1.174.10 137 tcp netbios-ns filtered
332752.1.174.10 137 udp netbios-ns unknown
332852.1.174.10 138 tcp netbios-dgm filtered
332952.1.174.10 138 udp netbios-dgm unknown
333052.1.174.10 139 tcp netbios-ssn filtered
333152.1.174.10 139 udp netbios-ssn unknown
333252.1.174.10 161 tcp snmp filtered
333352.1.174.10 161 udp snmp unknown
333452.1.174.10 162 tcp snmptrap filtered
333552.1.174.10 162 udp snmptrap unknown
333652.1.174.10 389 tcp ldap filtered
333752.1.174.10 389 udp ldap unknown
333852.1.174.10 443 tcp ssl/http open nginx
333952.1.174.10 520 tcp efs filtered
334052.1.174.10 520 udp route unknown
334152.1.174.10 2049 tcp nfs filtered
334252.1.174.10 2049 udp nfs unknown
334352.30.54.73 53 tcp domain closed
334452.30.54.73 53 udp domain unknown
334552.30.54.73 67 tcp dhcps closed
334652.30.54.73 67 udp dhcps unknown
334752.30.54.73 68 tcp dhcpc closed
334852.30.54.73 68 udp dhcpc unknown
334952.30.54.73 69 tcp tftp closed
335052.30.54.73 69 udp tftp unknown
335152.30.54.73 80 tcp http open nginx
335252.30.54.73 88 tcp kerberos-sec closed
335352.30.54.73 88 udp kerberos-sec unknown
335452.30.54.73 123 tcp ntp closed
335552.30.54.73 123 udp ntp unknown
335652.30.54.73 137 tcp netbios-ns closed
335752.30.54.73 137 udp netbios-ns unknown
335852.30.54.73 138 tcp netbios-dgm closed
335952.30.54.73 138 udp netbios-dgm unknown
336052.30.54.73 139 tcp netbios-ssn closed
336152.30.54.73 139 udp netbios-ssn unknown
336252.30.54.73 161 tcp snmp closed
336352.30.54.73 161 udp snmp unknown
336452.30.54.73 162 tcp snmptrap closed
336552.30.54.73 162 udp snmptrap unknown
336652.30.54.73 389 tcp ldap closed
336752.30.54.73 389 udp ldap unknown
336852.30.54.73 443 tcp ssl/http open nginx
336952.30.54.73 520 tcp efs closed
337052.30.54.73 520 udp route unknown
337152.30.54.73 2049 tcp nfs closed
337252.30.54.73 2049 udp nfs unknown
337352.52.234.222 53 tcp domain filtered
337452.52.234.222 53 udp domain unknown
337552.52.234.222 67 tcp dhcps filtered
337652.52.234.222 67 udp dhcps unknown
337752.52.234.222 68 tcp dhcpc filtered
337852.52.234.222 68 udp dhcpc unknown
337952.52.234.222 69 tcp tftp filtered
338052.52.234.222 69 udp tftp unknown
338152.52.234.222 88 tcp kerberos-sec filtered
338252.52.234.222 88 udp kerberos-sec unknown
338352.52.234.222 123 tcp ntp filtered
338452.52.234.222 123 udp ntp unknown
338552.52.234.222 137 tcp netbios-ns filtered
338652.52.234.222 137 udp netbios-ns unknown
338752.52.234.222 138 tcp netbios-dgm filtered
338852.52.234.222 138 udp netbios-dgm unknown
338952.52.234.222 139 tcp netbios-ssn filtered
339052.52.234.222 139 udp netbios-ssn unknown
339152.52.234.222 161 tcp snmp filtered
339252.52.234.222 161 udp snmp unknown
339352.52.234.222 162 tcp snmptrap filtered
339452.52.234.222 162 udp snmptrap unknown
339552.52.234.222 389 tcp ldap filtered
339652.52.234.222 389 udp ldap unknown
339752.52.234.222 520 tcp efs filtered
339852.52.234.222 520 udp route unknown
339952.52.234.222 2049 tcp nfs filtered
340052.52.234.222 2049 udp nfs unknown
340154.72.57.25 53 tcp domain closed
340254.72.57.25 53 udp domain unknown
340354.72.57.25 67 tcp dhcps closed
340454.72.57.25 67 udp dhcps unknown
340554.72.57.25 68 tcp dhcpc closed
340654.72.57.25 68 udp dhcpc unknown
340754.72.57.25 69 tcp tftp closed
340854.72.57.25 69 udp tftp unknown
340954.72.57.25 80 tcp http open nginx
341054.72.57.25 88 tcp kerberos-sec closed
341154.72.57.25 88 udp kerberos-sec unknown
341254.72.57.25 123 tcp ntp closed
341354.72.57.25 123 udp ntp unknown
341454.72.57.25 137 tcp netbios-ns closed
341554.72.57.25 137 udp netbios-ns unknown
341654.72.57.25 138 tcp netbios-dgm closed
341754.72.57.25 138 udp netbios-dgm unknown
341854.72.57.25 139 tcp netbios-ssn closed
341954.72.57.25 139 udp netbios-ssn unknown
342054.72.57.25 161 tcp snmp closed
342154.72.57.25 161 udp snmp unknown
342254.72.57.25 162 tcp snmptrap closed
342354.72.57.25 162 udp snmptrap unknown
342454.72.57.25 389 tcp ldap closed
342554.72.57.25 389 udp ldap unknown
342654.72.57.25 443 tcp ssl/http open nginx
342754.72.57.25 520 tcp efs closed
342854.72.57.25 520 udp route unknown
342954.72.57.25 2049 tcp nfs closed
343054.72.57.25 2049 udp nfs unknown
343154.85.59.109 53 tcp domain filtered
343254.85.59.109 53 udp domain unknown
343354.85.59.109 67 tcp dhcps filtered
343454.85.59.109 67 udp dhcps unknown
343554.85.59.109 68 tcp dhcpc filtered
343654.85.59.109 68 udp dhcpc unknown
343754.85.59.109 69 tcp tftp filtered
343854.85.59.109 69 udp tftp unknown
343954.85.59.109 80 tcp http open nginx
344054.85.59.109 88 tcp kerberos-sec filtered
344154.85.59.109 88 udp kerberos-sec unknown
344254.85.59.109 123 tcp ntp filtered
344354.85.59.109 123 udp ntp unknown
344454.85.59.109 137 tcp netbios-ns filtered
344554.85.59.109 137 udp netbios-ns unknown
344654.85.59.109 138 tcp netbios-dgm filtered
344754.85.59.109 138 udp netbios-dgm unknown
344854.85.59.109 139 tcp netbios-ssn filtered
344954.85.59.109 139 udp netbios-ssn unknown
345054.85.59.109 161 tcp snmp filtered
345154.85.59.109 161 udp snmp unknown
345254.85.59.109 162 tcp snmptrap filtered
345354.85.59.109 162 udp snmptrap unknown
345454.85.59.109 389 tcp ldap filtered
345554.85.59.109 389 udp ldap unknown
345654.85.59.109 443 tcp ssl/http open nginx
345754.85.59.109 520 tcp efs filtered
345854.85.59.109 520 udp route unknown
345954.85.59.109 2049 tcp nfs filtered
346054.85.59.109 2049 udp nfs unknown
346154.194.134.190 53 tcp domain closed
346254.194.134.190 53 udp domain unknown
346354.194.134.190 67 tcp dhcps closed
346454.194.134.190 67 udp dhcps unknown
346554.194.134.190 68 tcp dhcpc closed
346654.194.134.190 68 udp dhcpc unknown
346754.194.134.190 69 tcp tftp closed
346854.194.134.190 69 udp tftp unknown
346954.194.134.190 80 tcp http open nginx
347054.194.134.190 88 tcp kerberos-sec closed
347154.194.134.190 88 udp kerberos-sec unknown
347254.194.134.190 123 tcp ntp closed
347354.194.134.190 123 udp ntp unknown
347454.194.134.190 137 tcp netbios-ns closed
347554.194.134.190 137 udp netbios-ns unknown
347654.194.134.190 138 tcp netbios-dgm closed
347754.194.134.190 138 udp netbios-dgm unknown
347854.194.134.190 139 tcp netbios-ssn closed
347954.194.134.190 139 udp netbios-ssn unknown
348054.194.134.190 161 tcp snmp closed
348154.194.134.190 161 udp snmp unknown
348254.194.134.190 162 tcp snmptrap closed
348354.194.134.190 162 udp snmptrap unknown
348454.194.134.190 389 tcp ldap closed
348554.194.134.190 389 udp ldap unknown
348654.194.134.190 443 tcp ssl/http open nginx
348754.194.134.190 520 tcp efs closed
348854.194.134.190 520 udp route unknown
348954.194.134.190 2049 tcp nfs closed
349054.194.134.190 2049 udp nfs unknown
349164.69.94.253 53 tcp domain filtered
349264.69.94.253 53 udp domain unknown
349364.69.94.253 67 tcp dhcps filtered
349464.69.94.253 67 udp dhcps unknown
349564.69.94.253 68 tcp dhcpc filtered
349664.69.94.253 68 udp dhcpc unknown
349764.69.94.253 69 tcp tftp filtered
349864.69.94.253 69 udp tftp unknown
349964.69.94.253 88 tcp kerberos-sec filtered
350064.69.94.253 88 udp kerberos-sec unknown
350164.69.94.253 123 tcp ntp filtered
350264.69.94.253 123 udp ntp unknown
350364.69.94.253 137 tcp netbios-ns filtered
350464.69.94.253 137 udp netbios-ns unknown
350564.69.94.253 138 tcp netbios-dgm filtered
350664.69.94.253 138 udp netbios-dgm unknown
350764.69.94.253 139 tcp netbios-ssn filtered
350864.69.94.253 139 udp netbios-ssn unknown
350964.69.94.253 161 tcp snmp filtered
351064.69.94.253 161 udp snmp unknown
351164.69.94.253 162 tcp snmptrap filtered
351264.69.94.253 162 udp snmptrap unknown
351364.69.94.253 389 tcp ldap filtered
351464.69.94.253 389 udp ldap unknown
351564.69.94.253 520 tcp efs filtered
351664.69.94.253 520 udp route unknown
351764.69.94.253 2049 tcp nfs filtered
351864.69.94.253 2049 udp nfs unknown
351969.163.233.4 21 tcp ftp open 220 DreamHost FTP Server\x0d\x0a
352069.163.233.4 22 tcp ssh open SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.13
352169.163.233.4 25 tcp open
352269.163.233.4 53 tcp domain closed
352369.163.233.4 53 udp domain unknown
352469.163.233.4 67 tcp dhcps closed
352569.163.233.4 67 udp dhcps closed
352669.163.233.4 68 tcp dhcpc closed
352769.163.233.4 68 udp dhcpc unknown
352869.163.233.4 69 tcp tftp closed
352969.163.233.4 69 udp tftp closed
353069.163.233.4 88 tcp kerberos-sec closed
353169.163.233.4 88 udp kerberos-sec unknown
353269.163.233.4 123 tcp ntp closed
353369.163.233.4 123 udp ntp unknown
353469.163.233.4 137 tcp netbios-ns closed
353569.163.233.4 137 udp netbios-ns closed
353669.163.233.4 138 tcp netbios-dgm closed
353769.163.233.4 138 udp netbios-dgm closed
353869.163.233.4 139 tcp netbios-ssn closed
353969.163.233.4 139 udp netbios-ssn unknown
354069.163.233.4 161 tcp snmp closed
354169.163.233.4 161 udp snmp closed
354269.163.233.4 162 tcp snmptrap closed
354369.163.233.4 162 udp snmptrap closed
354469.163.233.4 389 tcp ldap closed
354569.163.233.4 389 udp ldap unknown
354669.163.233.4 520 tcp efs closed
354769.163.233.4 520 udp route closed
354869.163.233.4 2049 tcp nfs closed
354969.163.233.4 2049 udp nfs unknown
355074.117.180.192 21 tcp ftp filtered 220 Hello.\x0d\x0a
355174.117.180.192 22 tcp ssh filtered
355274.117.180.192 25 tcp smtp filtered
355374.117.180.192 53 tcp domain closed
355474.117.180.192 53 udp domain unknown
355574.117.180.192 67 tcp dhcps closed
355674.117.180.192 67 udp dhcps unknown
355774.117.180.192 68 tcp dhcpc closed
355874.117.180.192 68 udp dhcpc closed
355974.117.180.192 69 tcp tftp closed
356074.117.180.192 69 udp tftp closed
356174.117.180.192 80 tcp http filtered
356274.117.180.192 88 tcp kerberos-sec closed
356374.117.180.192 88 udp kerberos-sec closed
356474.117.180.192 110 tcp pop3 filtered
356574.117.180.192 111 tcp rpcbind filtered
356674.117.180.192 123 tcp ntp closed
356774.117.180.192 123 udp ntp unknown
356874.117.180.192 137 tcp netbios-ns closed
356974.117.180.192 137 udp netbios-ns closed
357074.117.180.192 138 tcp netbios-dgm closed
357174.117.180.192 138 udp netbios-dgm unknown
357274.117.180.192 139 tcp netbios-ssn closed
357374.117.180.192 139 udp netbios-ssn unknown
357474.117.180.192 143 tcp imap filtered
357574.117.180.192 161 tcp snmp closed
357674.117.180.192 161 udp snmp closed
357774.117.180.192 162 tcp snmptrap closed
357874.117.180.192 162 udp snmptrap unknown
357974.117.180.192 323 tcp rpki-rtr filtered
358074.117.180.192 389 tcp ldap closed
358174.117.180.192 389 udp ldap closed
358274.117.180.192 443 tcp https filtered
358374.117.180.192 465 tcp ssl/smtp open Exim smtpd 4.92.3
358474.117.180.192 520 tcp efs closed
358574.117.180.192 520 udp route unknown
358674.117.180.192 587 tcp submission filtered
358774.117.180.192 873 tcp rsync filtered
358874.117.180.192 993 tcp imaps filtered
358974.117.180.192 995 tcp pop3s filtered
359074.117.180.192 2049 tcp nfs closed
359174.117.180.192 2049 udp nfs closed
359274.117.180.192 2525 tcp smtp open Exim smtpd
359374.117.180.192 3306 tcp mysql filtered
359474.117.180.192 4949 tcp tcpwrapped open
359574.117.180.192 5666 tcp tcpwrapped open
359674.117.180.192 6380 tcp filtered
359774.117.180.192 9306 tcp sphinx-search open Sphinx Search daemon 2.1.5-id64-release
359874.117.180.192 11211 tcp memcache filtered
359982.94.222.131 53 udp domain unknown
360082.94.222.131 67 udp dhcps unknown
360182.94.222.131 68 udp dhcpc unknown
360282.94.222.131 69 udp tftp unknown
360382.94.222.131 88 udp kerberos-sec unknown
360482.94.222.131 123 udp ntp unknown
360582.94.222.131 137 udp netbios-ns unknown
360682.94.222.131 138 udp netbios-dgm unknown
360782.94.222.131 139 udp netbios-ssn unknown
360882.94.222.131 161 udp snmp unknown
360982.94.222.131 162 udp snmptrap unknown
361082.94.222.131 389 udp ldap unknown
361182.94.222.131 520 udp route unknown
361282.94.222.131 2049 udp nfs unknown
361392.123.250.35 53 tcp domain closed
361492.123.250.35 53 udp domain closed
361592.123.250.35 67 tcp dhcps filtered
361692.123.250.35 67 udp dhcps unknown
361792.123.250.35 68 tcp dhcpc filtered
361892.123.250.35 68 udp dhcpc unknown
361992.123.250.35 69 tcp tftp filtered
362092.123.250.35 69 udp tftp unknown
362192.123.250.35 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
362292.123.250.35 88 tcp kerberos-sec filtered
362392.123.250.35 88 udp kerberos-sec unknown
362492.123.250.35 123 tcp ntp filtered
362592.123.250.35 123 udp ntp unknown
362692.123.250.35 137 tcp netbios-ns filtered
362792.123.250.35 137 udp netbios-ns unknown
362892.123.250.35 138 tcp netbios-dgm filtered
362992.123.250.35 138 udp netbios-dgm unknown
363092.123.250.35 139 tcp netbios-ssn filtered
363192.123.250.35 139 udp netbios-ssn unknown
363292.123.250.35 161 tcp snmp filtered
363392.123.250.35 161 udp snmp unknown
363492.123.250.35 162 tcp snmptrap filtered
363592.123.250.35 162 udp snmptrap unknown
363692.123.250.35 389 tcp ldap filtered
363792.123.250.35 389 udp ldap unknown
363892.123.250.35 443 tcp ssl/https open
363992.123.250.35 520 tcp efs filtered
364092.123.250.35 520 udp route unknown
364192.123.250.35 2049 tcp nfs filtered
364292.123.250.35 2049 udp nfs unknown
364392.123.250.35 8883 tcp secure-mqtt open
364492.123.250.65 53 tcp domain filtered
364592.123.250.65 53 udp domain unknown
364692.123.250.65 67 tcp dhcps filtered
364792.123.250.65 67 udp dhcps unknown
364892.123.250.65 68 tcp dhcpc filtered
364992.123.250.65 68 udp dhcpc unknown
365092.123.250.65 69 tcp tftp filtered
365192.123.250.65 69 udp tftp unknown
365292.123.250.65 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
365392.123.250.65 88 tcp kerberos-sec filtered
365492.123.250.65 88 udp kerberos-sec unknown
365592.123.250.65 123 tcp ntp filtered
365692.123.250.65 123 udp ntp unknown
365792.123.250.65 137 tcp netbios-ns filtered
365892.123.250.65 137 udp netbios-ns unknown
365992.123.250.65 138 tcp netbios-dgm filtered
366092.123.250.65 138 udp netbios-dgm unknown
366192.123.250.65 139 tcp netbios-ssn filtered
366292.123.250.65 139 udp netbios-ssn unknown
366392.123.250.65 161 tcp snmp filtered
366492.123.250.65 161 udp snmp unknown
366592.123.250.65 162 tcp snmptrap filtered
366692.123.250.65 162 udp snmptrap unknown
366792.123.250.65 389 tcp ldap filtered
366892.123.250.65 389 udp ldap unknown
366992.123.250.65 443 tcp ssl/https open
367092.123.250.65 520 tcp efs filtered
367192.123.250.65 520 udp route unknown
367292.123.250.65 2049 tcp nfs filtered
367392.123.250.65 2049 udp nfs unknown
367492.123.250.65 8883 tcp secure-mqtt open
367594.102.51.112 22 tcp ssh open
367694.102.51.112 25 tcp smtp open Exim smtpd 4.89
367794.102.51.112 53 tcp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
367894.102.51.112 53 udp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
367994.102.51.112 67 tcp dhcps filtered
368094.102.51.112 67 udp dhcps unknown
368194.102.51.112 68 tcp dhcpc filtered
368294.102.51.112 68 udp dhcpc unknown
368394.102.51.112 69 tcp tftp filtered
368494.102.51.112 69 udp tftp unknown
368594.102.51.112 80 tcp http open nginx
368694.102.51.112 88 tcp kerberos-sec filtered
368794.102.51.112 88 udp kerberos-sec unknown
368894.102.51.112 110 tcp pop3 open Dovecot pop3d
368994.102.51.112 123 tcp ntp filtered
369094.102.51.112 123 udp ntp unknown
369194.102.51.112 137 tcp netbios-ns filtered
369294.102.51.112 137 udp netbios-ns unknown
369394.102.51.112 138 tcp netbios-dgm filtered
369494.102.51.112 138 udp netbios-dgm unknown
369594.102.51.112 139 tcp netbios-ssn filtered
369694.102.51.112 139 udp netbios-ssn unknown
369794.102.51.112 143 tcp imap open Dovecot imapd
369894.102.51.112 161 tcp snmp filtered
369994.102.51.112 161 udp snmp unknown
370094.102.51.112 162 tcp snmptrap filtered
370194.102.51.112 162 udp snmptrap unknown
370294.102.51.112 389 tcp ldap filtered
370394.102.51.112 389 udp ldap unknown
370494.102.51.112 465 tcp ssl/smtp open Exim smtpd 4.89
370594.102.51.112 520 tcp efs filtered
370694.102.51.112 520 udp route unknown
370794.102.51.112 993 tcp ssl/imaps open
370894.102.51.112 995 tcp ssl/pop3s open
370994.102.51.112 2049 tcp nfs filtered
371094.102.51.112 2049 udp nfs unknown
3711104.244.73.40 53 udp domain unknown
3712104.244.73.40 67 udp dhcps unknown
3713104.244.73.40 68 udp dhcpc unknown
3714104.244.73.40 69 udp tftp unknown
3715104.244.73.40 88 udp kerberos-sec unknown
3716104.244.73.40 123 udp ntp unknown
3717104.244.73.40 137 udp netbios-ns unknown
3718104.244.73.40 138 udp netbios-dgm unknown
3719104.244.73.40 139 udp netbios-ssn unknown
3720104.244.73.40 161 udp snmp unknown
3721104.244.73.40 162 udp snmptrap unknown
3722104.244.73.40 389 udp ldap unknown
3723104.244.73.40 520 udp route unknown
3724104.244.73.40 2049 udp nfs unknown
3725104.244.76.231 53 tcp domain filtered
3726104.244.76.231 53 udp domain unknown
3727104.244.76.231 67 tcp dhcps filtered
3728104.244.76.231 67 udp dhcps unknown
3729104.244.76.231 68 tcp dhcpc filtered
3730104.244.76.231 68 udp dhcpc unknown
3731104.244.76.231 69 tcp tftp filtered
3732104.244.76.231 69 udp tftp unknown
3733104.244.76.231 80 tcp http open nginx
3734104.244.76.231 88 tcp kerberos-sec filtered
3735104.244.76.231 88 udp kerberos-sec unknown
3736104.244.76.231 123 tcp ntp filtered
3737104.244.76.231 123 udp ntp unknown
3738104.244.76.231 137 tcp netbios-ns filtered
3739104.244.76.231 137 udp netbios-ns unknown
3740104.244.76.231 138 tcp netbios-dgm filtered
3741104.244.76.231 138 udp netbios-dgm unknown
3742104.244.76.231 139 tcp netbios-ssn filtered
3743104.244.76.231 139 udp netbios-ssn unknown
3744104.244.76.231 161 tcp snmp filtered
3745104.244.76.231 161 udp snmp unknown
3746104.244.76.231 162 tcp snmptrap filtered
3747104.244.76.231 162 udp snmptrap unknown
3748104.244.76.231 389 tcp ldap filtered
3749104.244.76.231 389 udp ldap unknown
3750104.244.76.231 443 tcp ssl/http open nginx
3751104.244.76.231 520 tcp efs filtered
3752104.244.76.231 520 udp route unknown
3753104.244.76.231 2049 tcp nfs filtered
3754104.244.76.231 2049 udp nfs unknown
3755104.244.76.231 5040 tcp unknown closed
3756104.244.76.231 16001 tcp ssl/http open MiniServ 1.910 Webmin httpd
3757104.244.76.231 16221 tcp closed
3758104.244.76.231 23022 tcp closed
3759104.244.76.231 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
3760104.244.77.188 53 tcp domain filtered
3761104.244.77.188 53 udp domain unknown
3762104.244.77.188 67 tcp dhcps filtered
3763104.244.77.188 67 udp dhcps unknown
3764104.244.77.188 68 tcp dhcpc filtered
3765104.244.77.188 68 udp dhcpc unknown
3766104.244.77.188 69 tcp tftp filtered
3767104.244.77.188 69 udp tftp unknown
3768104.244.77.188 80 tcp http open nginx
3769104.244.77.188 88 tcp kerberos-sec filtered
3770104.244.77.188 88 udp kerberos-sec unknown
3771104.244.77.188 123 tcp ntp filtered
3772104.244.77.188 123 udp ntp unknown
3773104.244.77.188 137 tcp netbios-ns filtered
3774104.244.77.188 137 udp netbios-ns unknown
3775104.244.77.188 138 tcp netbios-dgm filtered
3776104.244.77.188 138 udp netbios-dgm unknown
3777104.244.77.188 139 tcp netbios-ssn filtered
3778104.244.77.188 139 udp netbios-ssn unknown
3779104.244.77.188 161 tcp snmp filtered
3780104.244.77.188 161 udp snmp unknown
3781104.244.77.188 162 tcp snmptrap filtered
3782104.244.77.188 162 udp snmptrap unknown
3783104.244.77.188 389 tcp ldap filtered
3784104.244.77.188 389 udp ldap unknown
3785104.244.77.188 443 tcp ssl/http open nginx
3786104.244.77.188 520 tcp efs filtered
3787104.244.77.188 520 udp route unknown
3788104.244.77.188 2049 tcp nfs filtered
3789104.244.77.188 2049 udp nfs unknown
3790104.244.77.188 5040 tcp unknown closed
3791104.244.77.188 16001 tcp ssl/http open MiniServ 1.910 Webmin httpd
3792104.244.77.188 16221 tcp closed
3793104.244.77.188 23022 tcp closed
3794104.244.77.188 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
3795104.244.79.89 53 tcp domain filtered
3796104.244.79.89 53 udp domain unknown
3797104.244.79.89 67 tcp dhcps filtered
3798104.244.79.89 67 udp dhcps unknown
3799104.244.79.89 68 tcp dhcpc filtered
3800104.244.79.89 68 udp dhcpc unknown
3801104.244.79.89 69 tcp tftp filtered
3802104.244.79.89 69 udp tftp unknown
3803104.244.79.89 80 tcp http open nginx
3804104.244.79.89 88 tcp kerberos-sec filtered
3805104.244.79.89 88 udp kerberos-sec unknown
3806104.244.79.89 123 tcp ntp filtered
3807104.244.79.89 123 udp ntp unknown
3808104.244.79.89 137 tcp netbios-ns filtered
3809104.244.79.89 137 udp netbios-ns unknown
3810104.244.79.89 138 tcp netbios-dgm filtered
3811104.244.79.89 138 udp netbios-dgm unknown
3812104.244.79.89 139 tcp netbios-ssn filtered
3813104.244.79.89 139 udp netbios-ssn unknown
3814104.244.79.89 161 tcp snmp filtered
3815104.244.79.89 161 udp snmp unknown
3816104.244.79.89 162 tcp snmptrap filtered
3817104.244.79.89 162 udp snmptrap unknown
3818104.244.79.89 389 tcp ldap filtered
3819104.244.79.89 389 udp ldap unknown
3820104.244.79.89 443 tcp ssl/http open nginx
3821104.244.79.89 520 tcp efs filtered
3822104.244.79.89 520 udp route unknown
3823104.244.79.89 2049 tcp nfs filtered
3824104.244.79.89 2049 udp nfs unknown
3825104.244.79.89 7910 tcp ssl/http open nginx
3826104.244.79.89 7920 tcp unknown closed
3827104.244.79.89 7930 tcp closed
3828104.244.79.89 16001 tcp http open MiniServ 1.930 Webmin httpd
3829104.244.79.89 16010 tcp ssl/http open nginx
3830104.244.79.89 16221 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
3831104.244.79.89 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
3832107.180.28.114 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 3 of 500 allowed.\x0d\x0a220-Local time is now 05:54. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
3833107.180.28.114 22 tcp ssh open SSH-2.0-OpenSSH_5.3
3834107.180.28.114 53 tcp domain filtered
3835107.180.28.114 53 udp domain unknown
3836107.180.28.114 67 tcp dhcps filtered
3837107.180.28.114 67 udp dhcps unknown
3838107.180.28.114 68 tcp dhcpc filtered
3839107.180.28.114 68 udp dhcpc unknown
3840107.180.28.114 69 tcp tftp filtered
3841107.180.28.114 69 udp tftp unknown
3842107.180.28.114 88 tcp kerberos-sec filtered
3843107.180.28.114 88 udp kerberos-sec unknown
3844107.180.28.114 123 tcp ntp filtered
3845107.180.28.114 123 udp ntp unknown
3846107.180.28.114 137 tcp netbios-ns filtered
3847107.180.28.114 137 udp netbios-ns unknown
3848107.180.28.114 138 tcp netbios-dgm filtered
3849107.180.28.114 138 udp netbios-dgm unknown
3850107.180.28.114 139 tcp netbios-ssn filtered
3851107.180.28.114 139 udp netbios-ssn unknown
3852107.180.28.114 161 tcp snmp filtered
3853107.180.28.114 161 udp snmp unknown
3854107.180.28.114 162 tcp snmptrap filtered
3855107.180.28.114 162 udp snmptrap unknown
3856107.180.28.114 389 tcp ldap filtered
3857107.180.28.114 389 udp ldap unknown
3858107.180.28.114 520 tcp efs filtered
3859107.180.28.114 520 udp route unknown
3860107.180.28.114 2049 tcp nfs filtered
3861107.180.28.114 2049 udp nfs unknown
3862111.90.145.39 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 15:04. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
3863111.90.145.39 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
3864111.90.145.39 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
3865111.90.145.39 67 tcp dhcps closed
3866111.90.145.39 67 udp dhcps closed
3867111.90.145.39 68 tcp dhcpc closed
3868111.90.145.39 68 udp dhcpc unknown
3869111.90.145.39 69 tcp tftp closed
3870111.90.145.39 69 udp tftp unknown
3871111.90.145.39 88 tcp kerberos-sec closed
3872111.90.145.39 88 udp kerberos-sec unknown
3873111.90.145.39 123 tcp ntp closed
3874111.90.145.39 123 udp ntp closed
3875111.90.145.39 137 tcp netbios-ns closed
3876111.90.145.39 137 udp netbios-ns unknown
3877111.90.145.39 138 tcp netbios-dgm closed
3878111.90.145.39 138 udp netbios-dgm unknown
3879111.90.145.39 139 tcp netbios-ssn filtered
3880111.90.145.39 139 udp netbios-ssn closed
3881111.90.145.39 161 tcp snmp closed
3882111.90.145.39 161 udp snmp unknown
3883111.90.145.39 162 tcp snmptrap closed
3884111.90.145.39 162 udp snmptrap closed
3885111.90.145.39 389 tcp ldap closed
3886111.90.145.39 389 udp ldap unknown
3887111.90.145.39 520 tcp efs closed
3888111.90.145.39 520 udp route closed
3889111.90.145.39 2049 tcp nfs closed
3890111.90.145.39 2049 udp nfs closed
3891143.95.110.248 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 150 allowed.\x0d\x0a220-Local time is now 05:55. Server port: 21.\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
3892143.95.110.248 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
3893143.95.110.248 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
3894143.95.110.248 67 tcp dhcps closed
3895143.95.110.248 67 udp dhcps unknown
3896143.95.110.248 68 tcp dhcpc closed
3897143.95.110.248 68 udp dhcpc unknown
3898143.95.110.248 69 tcp tftp closed
3899143.95.110.248 69 udp tftp unknown
3900143.95.110.248 88 tcp kerberos-sec closed
3901143.95.110.248 88 udp kerberos-sec unknown
3902143.95.110.248 123 tcp ntp closed
3903143.95.110.248 123 udp ntp unknown
3904143.95.110.248 137 tcp netbios-ns closed
3905143.95.110.248 137 udp netbios-ns unknown
3906143.95.110.248 138 tcp netbios-dgm closed
3907143.95.110.248 138 udp netbios-dgm closed
3908143.95.110.248 139 tcp netbios-ssn closed
3909143.95.110.248 139 udp netbios-ssn unknown
3910143.95.110.248 161 tcp snmp closed
3911143.95.110.248 161 udp snmp closed
3912143.95.110.248 162 tcp snmptrap closed
3913143.95.110.248 162 udp snmptrap unknown
3914143.95.110.248 389 tcp ldap closed
3915143.95.110.248 389 udp ldap closed
3916143.95.110.248 520 tcp efs closed
3917143.95.110.248 520 udp route unknown
3918143.95.110.248 2049 tcp nfs closed
3919143.95.110.248 2049 udp nfs unknown
3920149.126.72.220 25 tcp smtp closed
3921149.126.72.220 51 tcp tcpwrapped open
3922149.126.72.220 53 tcp domain open
3923149.126.72.220 53 udp domain open
3924149.126.72.220 65 tcp tcpwrapped open
3925149.126.72.220 66 tcp tcpwrapped open
3926149.126.72.220 67 tcp dhcps filtered
3927149.126.72.220 67 udp dhcps unknown
3928149.126.72.220 68 tcp dhcpc filtered
3929149.126.72.220 68 udp dhcpc unknown
3930149.126.72.220 69 tcp tftp filtered
3931149.126.72.220 69 udp tftp unknown
3932149.126.72.220 80 tcp tcpwrapped open
3933149.126.72.220 81 tcp tcpwrapped open
3934149.126.72.220 82 tcp tcpwrapped open
3935149.126.72.220 83 tcp tcpwrapped open
3936149.126.72.220 84 tcp tcpwrapped open
3937149.126.72.220 85 tcp tcpwrapped open
3938149.126.72.220 86 tcp tcpwrapped open
3939149.126.72.220 88 tcp http open Incapsula CDN httpd
3940149.126.72.220 88 udp kerberos-sec unknown
3941149.126.72.220 89 tcp tcpwrapped open
3942149.126.72.220 90 tcp tcpwrapped open
3943149.126.72.220 91 tcp tcpwrapped open
3944149.126.72.220 92 tcp tcpwrapped open
3945149.126.72.220 98 tcp tcpwrapped open
3946149.126.72.220 99 tcp tcpwrapped open
3947149.126.72.220 123 tcp ntp filtered
3948149.126.72.220 123 udp ntp unknown
3949149.126.72.220 137 tcp netbios-ns filtered
3950149.126.72.220 137 udp netbios-ns filtered
3951149.126.72.220 138 tcp netbios-dgm filtered
3952149.126.72.220 138 udp netbios-dgm filtered
3953149.126.72.220 139 tcp netbios-ssn closed
3954149.126.72.220 139 udp netbios-ssn unknown
3955149.126.72.220 160 tcp sgmp-traps closed
3956149.126.72.220 161 tcp snmp filtered
3957149.126.72.220 161 udp snmp unknown
3958149.126.72.220 162 tcp snmptrap filtered
3959149.126.72.220 162 udp snmptrap unknown
3960149.126.72.220 189 tcp tcpwrapped open
3961149.126.72.220 190 tcp tcpwrapped open
3962149.126.72.220 192 tcp tcpwrapped open
3963149.126.72.220 243 tcp tcpwrapped open
3964149.126.72.220 285 tcp tcpwrapped open
3965149.126.72.220 314 tcp tcpwrapped open
3966149.126.72.220 343 tcp tcpwrapped open
3967149.126.72.220 347 tcp tcpwrapped open
3968149.126.72.220 385 tcp tcpwrapped open
3969149.126.72.220 389 tcp ssl/http open Incapsula CDN httpd
3970149.126.72.220 389 udp ldap unknown
3971149.126.72.220 400 tcp tcpwrapped open
3972149.126.72.220 440 tcp tcpwrapped open
3973149.126.72.220 441 tcp tcpwrapped open
3974149.126.72.220 442 tcp tcpwrapped open
3975149.126.72.220 443 tcp ssl/tcpwrapped open
3976149.126.72.220 444 tcp tcpwrapped open
3977149.126.72.220 445 tcp microsoft-ds closed
3978149.126.72.220 446 tcp tcpwrapped open
3979149.126.72.220 447 tcp tcpwrapped open
3980149.126.72.220 448 tcp tcpwrapped open
3981149.126.72.220 449 tcp tcpwrapped open
3982149.126.72.220 452 tcp tcpwrapped open
3983149.126.72.220 461 tcp tcpwrapped open
3984149.126.72.220 462 tcp tcpwrapped open
3985149.126.72.220 480 tcp tcpwrapped open
3986149.126.72.220 485 tcp tcpwrapped open
3987149.126.72.220 487 tcp tcpwrapped open
3988149.126.72.220 488 tcp tcpwrapped open
3989149.126.72.220 491 tcp tcpwrapped open
3990149.126.72.220 520 tcp efs filtered
3991149.126.72.220 520 udp route unknown
3992149.126.72.220 555 tcp tcpwrapped open
3993149.126.72.220 556 tcp tcpwrapped open
3994149.126.72.220 587 tcp tcpwrapped open
3995149.126.72.220 631 tcp tcpwrapped open
3996149.126.72.220 632 tcp tcpwrapped open
3997149.126.72.220 636 tcp tcpwrapped open
3998149.126.72.220 743 tcp tcpwrapped open
3999149.126.72.220 772 tcp tcpwrapped open
4000149.126.72.220 777 tcp tcpwrapped open
4001149.126.72.220 782 tcp tcpwrapped open
4002149.126.72.220 785 tcp tcpwrapped open
4003149.126.72.220 800 tcp tcpwrapped open
4004149.126.72.220 801 tcp tcpwrapped open
4005149.126.72.220 805 tcp tcpwrapped open
4006149.126.72.220 806 tcp tcpwrapped open
4007149.126.72.220 809 tcp tcpwrapped open
4008149.126.72.220 843 tcp tcpwrapped open
4009149.126.72.220 853 tcp tcpwrapped open
4010149.126.72.220 885 tcp tcpwrapped open
4011149.126.72.220 886 tcp tcpwrapped open
4012149.126.72.220 887 tcp tcpwrapped open
4013149.126.72.220 888 tcp tcpwrapped open
4014149.126.72.220 943 tcp tcpwrapped open
4015149.126.72.220 947 tcp tcpwrapped open
4016149.126.72.220 953 tcp tcpwrapped open
4017149.126.72.220 990 tcp tcpwrapped open
4018149.126.72.220 995 tcp tcpwrapped open
4019149.126.72.220 998 tcp tcpwrapped open
4020149.126.72.220 999 tcp tcpwrapped open
4021149.126.72.220 1000 tcp tcpwrapped open
4022149.126.72.220 1002 tcp tcpwrapped open
4023149.126.72.220 1024 tcp tcpwrapped open
4024149.126.72.220 1025 tcp tcpwrapped open
4025149.126.72.220 1028 tcp tcpwrapped open
4026149.126.72.220 1080 tcp tcpwrapped open
4027149.126.72.220 1103 tcp tcpwrapped open
4028149.126.72.220 1111 tcp tcpwrapped open
4029149.126.72.220 1180 tcp tcpwrapped open
4030149.126.72.220 1181 tcp tcpwrapped open
4031149.126.72.220 1207 tcp tcpwrapped open
4032149.126.72.220 1234 tcp tcpwrapped open
4033149.126.72.220 1250 tcp tcpwrapped open
4034149.126.72.220 1283 tcp tcpwrapped open
4035149.126.72.220 1291 tcp tcpwrapped open
4036149.126.72.220 1292 tcp tcpwrapped open
4037149.126.72.220 1293 tcp tcpwrapped open
4038149.126.72.220 1337 tcp tcpwrapped open
4039149.126.72.220 1344 tcp tcpwrapped open
4040149.126.72.220 1355 tcp tcpwrapped open
4041149.126.72.220 1364 tcp tcpwrapped open
4042149.126.72.220 1366 tcp tcpwrapped open
4043149.126.72.220 1377 tcp tcpwrapped open
4044149.126.72.220 1387 tcp tcpwrapped open
4045149.126.72.220 1388 tcp tcpwrapped open
4046149.126.72.220 1433 tcp tcpwrapped open
4047149.126.72.220 1443 tcp tcpwrapped open
4048149.126.72.220 1447 tcp tcpwrapped open
4049149.126.72.220 1450 tcp tcpwrapped open
4050149.126.72.220 1451 tcp tcpwrapped open
4051149.126.72.220 1452 tcp tcpwrapped open
4052149.126.72.220 1453 tcp tcpwrapped open
4053149.126.72.220 1454 tcp tcpwrapped open
4054149.126.72.220 1455 tcp tcpwrapped open
4055149.126.72.220 1456 tcp tcpwrapped open
4056149.126.72.220 1457 tcp tcpwrapped open
4057149.126.72.220 1458 tcp tcpwrapped open
4058149.126.72.220 1459 tcp tcpwrapped open
4059149.126.72.220 1460 tcp tcpwrapped open
4060149.126.72.220 1494 tcp tcpwrapped open
4061149.126.72.220 1935 tcp tcpwrapped open
4062149.126.72.220 1950 tcp tcpwrapped open
4063149.126.72.220 1951 tcp tcpwrapped open
4064149.126.72.220 1952 tcp tcpwrapped open
4065149.126.72.220 1953 tcp tcpwrapped open
4066149.126.72.220 1954 tcp tcpwrapped open
4067149.126.72.220 1955 tcp tcpwrapped open
4068149.126.72.220 1956 tcp tcpwrapped open
4069149.126.72.220 1957 tcp tcpwrapped open
4070149.126.72.220 1958 tcp tcpwrapped open
4071149.126.72.220 1959 tcp tcpwrapped open
4072149.126.72.220 1960 tcp tcpwrapped open
4073149.126.72.220 1964 tcp tcpwrapped open
4074149.126.72.220 1965 tcp tcpwrapped open
4075149.126.72.220 1966 tcp tcpwrapped open
4076149.126.72.220 1967 tcp tcpwrapped open
4077149.126.72.220 1968 tcp tcpwrapped open
4078149.126.72.220 1969 tcp tcpwrapped open
4079149.126.72.220 1970 tcp tcpwrapped open
4080149.126.72.220 1971 tcp tcpwrapped open
4081149.126.72.220 1972 tcp tcpwrapped open
4082149.126.72.220 1973 tcp tcpwrapped open
4083149.126.72.220 1974 tcp tcpwrapped open
4084149.126.72.220 1975 tcp tcpwrapped open
4085149.126.72.220 1976 tcp tcpwrapped open
4086149.126.72.220 1977 tcp tcpwrapped open
4087149.126.72.220 1978 tcp tcpwrapped open
4088149.126.72.220 1979 tcp tcpwrapped open
4089149.126.72.220 1980 tcp tcpwrapped open
4090149.126.72.220 1981 tcp tcpwrapped open
4091149.126.72.220 1982 tcp tcpwrapped open
4092149.126.72.220 1983 tcp tcpwrapped open
4093149.126.72.220 1984 tcp tcpwrapped open
4094149.126.72.220 1985 tcp tcpwrapped open
4095149.126.72.220 1986 tcp tcpwrapped open
4096149.126.72.220 1987 tcp tcpwrapped open
4097149.126.72.220 1988 tcp tcpwrapped open
4098149.126.72.220 1989 tcp tcpwrapped open
4099149.126.72.220 2000 tcp tcpwrapped open
4100149.126.72.220 2001 tcp tcpwrapped open
4101149.126.72.220 2006 tcp tcpwrapped open
4102149.126.72.220 2012 tcp tcpwrapped open
4103149.126.72.220 2020 tcp tcpwrapped open
4104149.126.72.220 2048 tcp tcpwrapped open
4105149.126.72.220 2049 tcp http open Incapsula CDN httpd
4106149.126.72.220 2049 udp nfs unknown
4107149.126.72.220 2050 tcp tcpwrapped open
4108149.126.72.220 2051 tcp tcpwrapped open
4109149.126.72.220 2052 tcp tcpwrapped open
4110149.126.72.220 2053 tcp tcpwrapped open
4111149.126.72.220 2054 tcp tcpwrapped open
4112149.126.72.220 2055 tcp tcpwrapped open
4113149.126.72.220 2056 tcp tcpwrapped open
4114149.126.72.220 2057 tcp tcpwrapped open
4115149.126.72.220 2058 tcp tcpwrapped open
4116149.126.72.220 2059 tcp tcpwrapped open
4117149.126.72.220 2060 tcp tcpwrapped open
4118149.126.72.220 2061 tcp tcpwrapped open
4119149.126.72.220 2062 tcp tcpwrapped open
4120149.126.72.220 2063 tcp tcpwrapped open
4121149.126.72.220 2064 tcp tcpwrapped open
4122149.126.72.220 2065 tcp tcpwrapped open
4123149.126.72.220 2066 tcp tcpwrapped open
4124149.126.72.220 2067 tcp tcpwrapped open
4125149.126.72.220 2068 tcp tcpwrapped open
4126149.126.72.220 2069 tcp tcpwrapped open
4127149.126.72.220 2070 tcp tcpwrapped open
4128149.126.72.220 2072 tcp tcpwrapped open
4129149.126.72.220 2082 tcp tcpwrapped open
4130149.126.72.220 2083 tcp tcpwrapped open
4131149.126.72.220 2087 tcp tcpwrapped open
4132149.126.72.220 2096 tcp tcpwrapped open
4133149.126.72.220 2100 tcp tcpwrapped open
4134149.126.72.220 2108 tcp tcpwrapped open
4135149.126.72.220 2200 tcp tcpwrapped open
4136149.126.72.220 2209 tcp tcpwrapped open
4137149.126.72.220 2222 tcp tcpwrapped open
4138149.126.72.220 2226 tcp tcpwrapped open
4139149.126.72.220 2248 tcp tcpwrapped open
4140149.126.72.220 2344 tcp tcpwrapped open
4141149.126.72.220 2345 tcp tcpwrapped open
4142149.126.72.220 2353 tcp tcpwrapped open
4143149.126.72.220 2363 tcp tcpwrapped open
4144149.126.72.220 2423 tcp tcpwrapped open
4145149.126.72.220 2433 tcp tcpwrapped open
4146149.126.72.220 2435 tcp tcpwrapped open
4147149.126.72.220 2443 tcp tcpwrapped open
4148149.126.72.220 2453 tcp tcpwrapped open
4149149.126.72.220 2480 tcp tcpwrapped open
4150149.126.72.220 2548 tcp tcpwrapped open
4151149.126.72.220 2549 tcp tcpwrapped open
4152149.126.72.220 2550 tcp tcpwrapped open
4153149.126.72.220 2551 tcp tcpwrapped open
4154149.126.72.220 2552 tcp tcpwrapped open
4155149.126.72.220 2553 tcp tcpwrapped open
4156149.126.72.220 2554 tcp tcpwrapped open
4157149.126.72.220 2555 tcp tcpwrapped open
4158149.126.72.220 2556 tcp tcpwrapped open
4159149.126.72.220 2557 tcp tcpwrapped open
4160149.126.72.220 2558 tcp tcpwrapped open
4161149.126.72.220 2559 tcp tcpwrapped open
4162149.126.72.220 2560 tcp tcpwrapped open
4163149.126.72.220 2561 tcp tcpwrapped open
4164149.126.72.220 2562 tcp tcpwrapped open
4165149.126.72.220 2563 tcp tcpwrapped open
4166149.126.72.220 2566 tcp tcpwrapped open
4167149.126.72.220 2567 tcp tcpwrapped open
4168149.126.72.220 2568 tcp tcpwrapped open
4169149.126.72.220 2569 tcp tcpwrapped open
4170149.126.72.220 2570 tcp tcpwrapped open
4171149.126.72.220 2572 tcp tcpwrapped open
4172149.126.72.220 2598 tcp tcpwrapped open
4173149.126.72.220 2599 tcp tcpwrapped open
4174149.126.72.220 2850 tcp tcpwrapped open
4175149.126.72.220 2985 tcp tcpwrapped open
4176149.126.72.220 2995 tcp tcpwrapped open
4177149.126.72.220 3000 tcp tcpwrapped open
4178149.126.72.220 3001 tcp tcpwrapped open
4179149.126.72.220 3002 tcp tcpwrapped open
4180149.126.72.220 3003 tcp tcpwrapped open
4181149.126.72.220 3004 tcp tcpwrapped open
4182149.126.72.220 3005 tcp tcpwrapped open
4183149.126.72.220 3006 tcp tcpwrapped open
4184149.126.72.220 3007 tcp tcpwrapped open
4185149.126.72.220 3008 tcp tcpwrapped open
4186149.126.72.220 3009 tcp tcpwrapped open
4187149.126.72.220 3010 tcp tcpwrapped open
4188149.126.72.220 3011 tcp tcpwrapped open
4189149.126.72.220 3012 tcp tcpwrapped open
4190149.126.72.220 3013 tcp tcpwrapped open
4191149.126.72.220 3014 tcp tcpwrapped open
4192149.126.72.220 3015 tcp tcpwrapped open
4193149.126.72.220 3016 tcp tcpwrapped open
4194149.126.72.220 3017 tcp tcpwrapped open
4195149.126.72.220 3018 tcp tcpwrapped open
4196149.126.72.220 3019 tcp tcpwrapped open
4197149.126.72.220 3020 tcp tcpwrapped open
4198149.126.72.220 3021 tcp tcpwrapped open
4199149.126.72.220 3022 tcp tcpwrapped open
4200149.126.72.220 3030 tcp tcpwrapped open
4201149.126.72.220 3047 tcp tcpwrapped open
4202149.126.72.220 3048 tcp tcpwrapped open
4203149.126.72.220 3049 tcp tcpwrapped open
4204149.126.72.220 3050 tcp tcpwrapped open
4205149.126.72.220 3051 tcp tcpwrapped open
4206149.126.72.220 3052 tcp tcpwrapped open
4207149.126.72.220 3053 tcp tcpwrapped open
4208149.126.72.220 3054 tcp tcpwrapped open
4209149.126.72.220 3055 tcp tcpwrapped open
4210149.126.72.220 3056 tcp tcpwrapped open
4211149.126.72.220 3057 tcp tcpwrapped open
4212149.126.72.220 3058 tcp tcpwrapped open
4213149.126.72.220 3059 tcp tcpwrapped open
4214149.126.72.220 3060 tcp tcpwrapped open
4215149.126.72.220 3061 tcp tcpwrapped open
4216149.126.72.220 3062 tcp tcpwrapped open
4217149.126.72.220 3063 tcp tcpwrapped open
4218149.126.72.220 3064 tcp tcpwrapped open
4219149.126.72.220 3065 tcp tcpwrapped open
4220149.126.72.220 3066 tcp tcpwrapped open
4221149.126.72.220 3067 tcp tcpwrapped open
4222149.126.72.220 3068 tcp tcpwrapped open
4223149.126.72.220 3069 tcp tcpwrapped open
4224149.126.72.220 3070 tcp tcpwrapped open
4225149.126.72.220 3071 tcp tcpwrapped open
4226149.126.72.220 3072 tcp tcpwrapped open
4227149.126.72.220 3073 tcp tcpwrapped open
4228149.126.72.220 3074 tcp tcpwrapped open
4229149.126.72.220 3075 tcp tcpwrapped open
4230149.126.72.220 3076 tcp tcpwrapped open
4231149.126.72.220 3077 tcp tcpwrapped open
4232149.126.72.220 3078 tcp tcpwrapped open
4233149.126.72.220 3079 tcp tcpwrapped open
4234149.126.72.220 3080 tcp tcpwrapped open
4235149.126.72.220 3081 tcp tcpwrapped open
4236149.126.72.220 3082 tcp tcpwrapped open
4237149.126.72.220 3083 tcp tcpwrapped open
4238149.126.72.220 3084 tcp tcpwrapped open
4239149.126.72.220 3085 tcp tcpwrapped open
4240149.126.72.220 3086 tcp tcpwrapped open
4241149.126.72.220 3087 tcp tcpwrapped open
4242149.126.72.220 3088 tcp tcpwrapped open
4243149.126.72.220 3089 tcp tcpwrapped open
4244149.126.72.220 3090 tcp tcpwrapped open
4245149.126.72.220 3091 tcp tcpwrapped open
4246149.126.72.220 3092 tcp tcpwrapped open
4247149.126.72.220 3093 tcp tcpwrapped open
4248149.126.72.220 3094 tcp tcpwrapped open
4249149.126.72.220 3095 tcp tcpwrapped open
4250149.126.72.220 3096 tcp tcpwrapped open
4251149.126.72.220 3097 tcp tcpwrapped open
4252149.126.72.220 3098 tcp tcpwrapped open
4253149.126.72.220 3099 tcp tcpwrapped open
4254149.126.72.220 3100 tcp tcpwrapped open
4255149.126.72.220 3101 tcp tcpwrapped open
4256149.126.72.220 3102 tcp tcpwrapped open
4257149.126.72.220 3103 tcp tcpwrapped open
4258149.126.72.220 3104 tcp tcpwrapped open
4259149.126.72.220 3105 tcp tcpwrapped open
4260149.126.72.220 3106 tcp tcpwrapped open
4261149.126.72.220 3107 tcp tcpwrapped open
4262149.126.72.220 3108 tcp tcpwrapped open
4263149.126.72.220 3109 tcp tcpwrapped open
4264149.126.72.220 3110 tcp tcpwrapped open
4265149.126.72.220 3111 tcp tcpwrapped open
4266149.126.72.220 3112 tcp tcpwrapped open
4267149.126.72.220 3113 tcp tcpwrapped open
4268149.126.72.220 3114 tcp tcpwrapped open
4269149.126.72.220 3115 tcp tcpwrapped open
4270149.126.72.220 3116 tcp tcpwrapped open
4271149.126.72.220 3117 tcp tcpwrapped open
4272149.126.72.220 3118 tcp tcpwrapped open
4273149.126.72.220 3119 tcp tcpwrapped open
4274149.126.72.220 3120 tcp tcpwrapped open
4275149.126.72.220 3121 tcp tcpwrapped open
4276149.126.72.220 3150 tcp tcpwrapped open
4277149.126.72.220 3155 tcp tcpwrapped open
4278149.126.72.220 3160 tcp tcpwrapped open
4279149.126.72.220 3165 tcp tcpwrapped open
4280149.126.72.220 3270 tcp tcpwrapped open
4281149.126.72.220 3299 tcp tcpwrapped open
4282149.126.72.220 3306 tcp tcpwrapped open
4283149.126.72.220 3333 tcp tcpwrapped open
4284149.126.72.220 3389 tcp tcpwrapped open
4285149.126.72.220 3391 tcp tcpwrapped open
4286149.126.72.220 3400 tcp tcpwrapped open
4287149.126.72.220 3401 tcp tcpwrapped open
4288149.126.72.220 3402 tcp tcpwrapped open
4289149.126.72.220 3403 tcp tcpwrapped open
4290149.126.72.220 3404 tcp tcpwrapped open
4291149.126.72.220 3405 tcp tcpwrapped open
4292149.126.72.220 3406 tcp tcpwrapped open
4293149.126.72.220 3407 tcp tcpwrapped open
4294149.126.72.220 3408 tcp tcpwrapped open
4295149.126.72.220 3409 tcp tcpwrapped open
4296149.126.72.220 3410 tcp tcpwrapped open
4297149.126.72.220 3412 tcp tcpwrapped open
4298149.126.72.220 3443 tcp tcpwrapped open
4299149.126.72.220 3500 tcp tcpwrapped open
4300149.126.72.220 3510 tcp tcpwrapped open
4301149.126.72.220 3521 tcp tcpwrapped open
4302149.126.72.220 3522 tcp tcpwrapped open
4303149.126.72.220 3523 tcp tcpwrapped open
4304149.126.72.220 3524 tcp tcpwrapped open
4305149.126.72.220 3530 tcp tcpwrapped open
4306149.126.72.220 3531 tcp tcpwrapped open
4307149.126.72.220 3540 tcp tcpwrapped open
4308149.126.72.220 3548 tcp tcpwrapped open
4309149.126.72.220 3549 tcp tcpwrapped open
4310149.126.72.220 3550 tcp tcpwrapped open
4311149.126.72.220 3551 tcp tcpwrapped open
4312149.126.72.220 3552 tcp tcpwrapped open
4313149.126.72.220 3553 tcp tcpwrapped open
4314149.126.72.220 3554 tcp tcpwrapped open
4315149.126.72.220 3555 tcp tcpwrapped open
4316149.126.72.220 3556 tcp tcpwrapped open
4317149.126.72.220 3557 tcp tcpwrapped open
4318149.126.72.220 3558 tcp tcpwrapped open
4319149.126.72.220 3559 tcp tcpwrapped open
4320149.126.72.220 3560 tcp tcpwrapped open
4321149.126.72.220 3561 tcp tcpwrapped open
4322149.126.72.220 3562 tcp tcpwrapped open
4323149.126.72.220 3563 tcp tcpwrapped open
4324149.126.72.220 3566 tcp tcpwrapped open
4325149.126.72.220 3567 tcp tcpwrapped open
4326149.126.72.220 3568 tcp tcpwrapped open
4327149.126.72.220 3569 tcp tcpwrapped open
4328149.126.72.220 3570 tcp tcpwrapped open
4329149.126.72.220 3572 tcp tcpwrapped open
4330149.126.72.220 3580 tcp tcpwrapped open
4331149.126.72.220 3590 tcp tcpwrapped open
4332149.126.72.220 3790 tcp tcpwrapped open
4333149.126.72.220 3791 tcp tcpwrapped open
4334149.126.72.220 3792 tcp tcpwrapped open
4335149.126.72.220 3793 tcp tcpwrapped open
4336149.126.72.220 3794 tcp tcpwrapped open
4337149.126.72.220 3838 tcp tcpwrapped open
4338149.126.72.220 3841 tcp tcpwrapped open
4339149.126.72.220 3842 tcp tcpwrapped open
4340149.126.72.220 3950 tcp tcpwrapped open
4341149.126.72.220 3951 tcp tcpwrapped open
4342149.126.72.220 3952 tcp tcpwrapped open
4343149.126.72.220 3953 tcp tcpwrapped open
4344149.126.72.220 3954 tcp adrep open
4345149.126.72.220 4000 tcp tcpwrapped open
4346149.126.72.220 4001 tcp newoak open
4347149.126.72.220 4002 tcp mlchat-proxy open
4348149.126.72.220 4021 tcp nexus-portal open
4349149.126.72.220 4022 tcp dnox open
4350149.126.72.220 4023 tcp esnm-zoning open
4351149.126.72.220 4043 tcp nirp open
4352149.126.72.220 4072 tcp zieto-sock open
4353149.126.72.220 4080 tcp lorica-in open
4354149.126.72.220 4085 tcp ezmessagesrv open
4355149.126.72.220 4120 tcp minirem open
4356149.126.72.220 4147 tcp vrxpservman open
4357149.126.72.220 4148 tcp hhb-handheld open
4358149.126.72.220 4150 tcp poweralert-nsa open
4359149.126.72.220 4155 tcp bzr open
4360149.126.72.220 4160 tcp jini-discovery open
4361149.126.72.220 4165 tcp altcp open
4362149.126.72.220 4172 tcp pcoip open
4363149.126.72.220 4243 tcp vrml-multi-use open
4364149.126.72.220 4244 tcp vrml-multi-use open
4365149.126.72.220 4250 tcp vrml-multi-use open
4366149.126.72.220 4300 tcp corelccam open
4367149.126.72.220 4333 tcp msql open
4368149.126.72.220 4343 tcp unicall open
4369149.126.72.220 4344 tcp vinainstall open
4370149.126.72.220 4400 tcp ds-srv open
4371149.126.72.220 4401 tcp tcpwrapped open
4372149.126.72.220 4402 tcp tcpwrapped open
4373149.126.72.220 4430 tcp tcpwrapped open
4374149.126.72.220 4431 tcp tcpwrapped open
4375149.126.72.220 4432 tcp tcpwrapped open
4376149.126.72.220 4434 tcp tcpwrapped open
4377149.126.72.220 4435 tcp tcpwrapped open
4378149.126.72.220 4436 tcp tcpwrapped open
4379149.126.72.220 4437 tcp tcpwrapped open
4380149.126.72.220 4439 tcp tcpwrapped open
4381149.126.72.220 4440 tcp tcpwrapped open
4382149.126.72.220 4443 tcp tcpwrapped open
4383149.126.72.220 4444 tcp tcpwrapped open
4384149.126.72.220 4445 tcp tcpwrapped open
4385149.126.72.220 4451 tcp tcpwrapped open
4386149.126.72.220 4455 tcp tcpwrapped open
4387149.126.72.220 4457 tcp tcpwrapped open
4388149.126.72.220 4459 tcp tcpwrapped open
4389149.126.72.220 4461 tcp tcpwrapped open
4390149.126.72.220 4463 tcp tcpwrapped open
4391149.126.72.220 4477 tcp tcpwrapped open
4392149.126.72.220 4482 tcp tcpwrapped open
4393149.126.72.220 4500 tcp tcpwrapped open
4394149.126.72.220 4502 tcp tcpwrapped open
4395149.126.72.220 4505 tcp tcpwrapped open
4396149.126.72.220 4572 tcp tcpwrapped open
4397149.126.72.220 4602 tcp tcpwrapped open
4398149.126.72.220 4620 tcp tcpwrapped open
4399149.126.72.220 4643 tcp tcpwrapped open
4400149.126.72.220 4848 tcp tcpwrapped open
4401149.126.72.220 4933 tcp tcpwrapped open
4402149.126.72.220 4993 tcp tcpwrapped open
4403149.126.72.220 5000 tcp tcpwrapped open
4404149.126.72.220 5001 tcp tcpwrapped open
4405149.126.72.220 5002 tcp tcpwrapped open
4406149.126.72.220 5003 tcp tcpwrapped open
4407149.126.72.220 5004 tcp tcpwrapped open
4408149.126.72.220 5005 tcp tcpwrapped open
4409149.126.72.220 5006 tcp tcpwrapped open
4410149.126.72.220 5007 tcp tcpwrapped open
4411149.126.72.220 5008 tcp tcpwrapped open
4412149.126.72.220 5009 tcp tcpwrapped open
4413149.126.72.220 5010 tcp tcpwrapped open
4414149.126.72.220 5011 tcp tcpwrapped open
4415149.126.72.220 5022 tcp tcpwrapped open
4416149.126.72.220 5050 tcp tcpwrapped open
4417149.126.72.220 5053 tcp tcpwrapped open
4418149.126.72.220 5060 tcp tcpwrapped open
4419149.126.72.220 5061 tcp tcpwrapped open
4420149.126.72.220 5080 tcp tcpwrapped open
4421149.126.72.220 5083 tcp tcpwrapped open
4422149.126.72.220 5089 tcp tcpwrapped open
4423149.126.72.220 5090 tcp tcpwrapped open
4424149.126.72.220 5100 tcp tcpwrapped open
4425149.126.72.220 5105 tcp tcpwrapped open
4426149.126.72.220 5119 tcp tcpwrapped open
4427149.126.72.220 5120 tcp tcpwrapped open
4428149.126.72.220 5130 tcp tcpwrapped open
4429149.126.72.220 5140 tcp tcpwrapped open
4430149.126.72.220 5150 tcp tcpwrapped open
4431149.126.72.220 5160 tcp tcpwrapped open
4432149.126.72.220 5180 tcp tcpwrapped open
4433149.126.72.220 5201 tcp tcpwrapped open
4434149.126.72.220 5222 tcp tcpwrapped open
4435149.126.72.220 5223 tcp tcpwrapped open
4436149.126.72.220 5224 tcp tcpwrapped open
4437149.126.72.220 5225 tcp tcpwrapped open
4438149.126.72.220 5226 tcp tcpwrapped open
4439149.126.72.220 5227 tcp tcpwrapped open
4440149.126.72.220 5228 tcp tcpwrapped open
4441149.126.72.220 5229 tcp tcpwrapped open
4442149.126.72.220 5230 tcp tcpwrapped open
4443149.126.72.220 5231 tcp tcpwrapped open
4444149.126.72.220 5232 tcp tcpwrapped open
4445149.126.72.220 5233 tcp tcpwrapped open
4446149.126.72.220 5234 tcp tcpwrapped open
4447149.126.72.220 5235 tcp tcpwrapped open
4448149.126.72.220 5236 tcp tcpwrapped open
4449149.126.72.220 5237 tcp tcpwrapped open
4450149.126.72.220 5238 tcp tcpwrapped open
4451149.126.72.220 5239 tcp tcpwrapped open
4452149.126.72.220 5240 tcp tcpwrapped open
4453149.126.72.220 5241 tcp tcpwrapped open
4454149.126.72.220 5242 tcp tcpwrapped open
4455149.126.72.220 5243 tcp tcpwrapped open
4456149.126.72.220 5244 tcp tcpwrapped open
4457149.126.72.220 5245 tcp tcpwrapped open
4458149.126.72.220 5246 tcp tcpwrapped open
4459149.126.72.220 5247 tcp tcpwrapped open
4460149.126.72.220 5248 tcp tcpwrapped open
4461149.126.72.220 5249 tcp tcpwrapped open
4462149.126.72.220 5250 tcp tcpwrapped open
4463149.126.72.220 5251 tcp tcpwrapped open
4464149.126.72.220 5252 tcp tcpwrapped open
4465149.126.72.220 5253 tcp tcpwrapped open
4466149.126.72.220 5254 tcp tcpwrapped open
4467149.126.72.220 5255 tcp tcpwrapped open
4468149.126.72.220 5256 tcp tcpwrapped open
4469149.126.72.220 5257 tcp tcpwrapped open
4470149.126.72.220 5258 tcp tcpwrapped open
4471149.126.72.220 5259 tcp tcpwrapped open
4472149.126.72.220 5260 tcp tcpwrapped open
4473149.126.72.220 5261 tcp tcpwrapped open
4474149.126.72.220 5262 tcp tcpwrapped open
4475149.126.72.220 5263 tcp tcpwrapped open
4476149.126.72.220 5264 tcp tcpwrapped open
4477149.126.72.220 5265 tcp tcpwrapped open
4478149.126.72.220 5266 tcp tcpwrapped open
4479149.126.72.220 5267 tcp tcpwrapped open
4480149.126.72.220 5268 tcp tcpwrapped open
4481149.126.72.220 5269 tcp tcpwrapped open
4482149.126.72.220 5270 tcp tcpwrapped open
4483149.126.72.220 5271 tcp tcpwrapped open
4484149.126.72.220 5272 tcp tcpwrapped open
4485149.126.72.220 5273 tcp tcpwrapped open
4486149.126.72.220 5274 tcp tcpwrapped open
4487149.126.72.220 5275 tcp tcpwrapped open
4488149.126.72.220 5276 tcp tcpwrapped open
4489149.126.72.220 5277 tcp tcpwrapped open
4490149.126.72.220 5278 tcp tcpwrapped open
4491149.126.72.220 5279 tcp tcpwrapped open
4492149.126.72.220 5280 tcp tcpwrapped open
4493149.126.72.220 5440 tcp tcpwrapped open
4494149.126.72.220 5443 tcp tcpwrapped open
4495149.126.72.220 5456 tcp tcpwrapped open
4496149.126.72.220 5494 tcp tcpwrapped open
4497149.126.72.220 5495 tcp tcpwrapped open
4498149.126.72.220 5500 tcp tcpwrapped open
4499149.126.72.220 5503 tcp tcpwrapped open
4500149.126.72.220 5552 tcp tcpwrapped open
4501149.126.72.220 5555 tcp tcpwrapped open
4502149.126.72.220 5556 tcp tcpwrapped open
4503149.126.72.220 5557 tcp tcpwrapped open
4504149.126.72.220 5567 tcp tcpwrapped open
4505149.126.72.220 5568 tcp tcpwrapped open
4506149.126.72.220 5569 tcp tcpwrapped open
4507149.126.72.220 5590 tcp tcpwrapped open
4508149.126.72.220 5591 tcp tcpwrapped open
4509149.126.72.220 5592 tcp tcpwrapped open
4510149.126.72.220 5593 tcp tcpwrapped open
4511149.126.72.220 5594 tcp tcpwrapped open
4512149.126.72.220 5595 tcp tcpwrapped open
4513149.126.72.220 5596 tcp tcpwrapped open
4514149.126.72.220 5597 tcp tcpwrapped open
4515149.126.72.220 5598 tcp tcpwrapped open
4516149.126.72.220 5599 tcp tcpwrapped open
4517149.126.72.220 5600 tcp tcpwrapped open
4518149.126.72.220 5601 tcp tcpwrapped open
4519149.126.72.220 5602 tcp tcpwrapped open
4520149.126.72.220 5603 tcp tcpwrapped open
4521149.126.72.220 5604 tcp tcpwrapped open
4522149.126.72.220 5605 tcp tcpwrapped open
4523149.126.72.220 5606 tcp tcpwrapped open
4524149.126.72.220 5607 tcp tcpwrapped open
4525149.126.72.220 5608 tcp tcpwrapped open
4526149.126.72.220 5609 tcp tcpwrapped open
4527149.126.72.220 5613 tcp tcpwrapped open
4528149.126.72.220 5614 tcp tcpwrapped open
4529149.126.72.220 5620 tcp tcpwrapped open
4530149.126.72.220 5630 tcp tcpwrapped open
4531149.126.72.220 5640 tcp tcpwrapped open
4532149.126.72.220 5650 tcp tcpwrapped open
4533149.126.72.220 5660 tcp tcpwrapped open
4534149.126.72.220 5671 tcp tcpwrapped open
4535149.126.72.220 5672 tcp tcpwrapped open
4536149.126.72.220 5673 tcp tcpwrapped open
4537149.126.72.220 5680 tcp tcpwrapped open
4538149.126.72.220 5696 tcp tcpwrapped open
4539149.126.72.220 5698 tcp tcpwrapped open
4540149.126.72.220 5701 tcp tcpwrapped open
4541149.126.72.220 5721 tcp tcpwrapped open
4542149.126.72.220 5900 tcp tcpwrapped open
4543149.126.72.220 5901 tcp tcpwrapped open
4544149.126.72.220 5902 tcp tcpwrapped open
4545149.126.72.220 5903 tcp tcpwrapped open
4546149.126.72.220 5904 tcp tcpwrapped open
4547149.126.72.220 5905 tcp tcpwrapped open
4548149.126.72.220 5906 tcp tcpwrapped open
4549149.126.72.220 5907 tcp tcpwrapped open
4550149.126.72.220 5908 tcp tcpwrapped open
4551149.126.72.220 5909 tcp tcpwrapped open
4552149.126.72.220 5910 tcp tcpwrapped open
4553149.126.72.220 5911 tcp tcpwrapped open
4554149.126.72.220 5912 tcp tcpwrapped open
4555149.126.72.220 5913 tcp tcpwrapped open
4556149.126.72.220 5914 tcp tcpwrapped open
4557149.126.72.220 5915 tcp tcpwrapped open
4558149.126.72.220 5916 tcp tcpwrapped open
4559149.126.72.220 5917 tcp tcpwrapped open
4560149.126.72.220 5918 tcp tcpwrapped open
4561149.126.72.220 5919 tcp tcpwrapped open
4562149.126.72.220 5920 tcp tcpwrapped open
4563149.126.72.220 5984 tcp tcpwrapped open
4564149.126.72.220 5985 tcp tcpwrapped open
4565149.126.72.220 5986 tcp tcpwrapped open
4566149.126.72.220 5987 tcp tcpwrapped open
4567149.126.72.220 5988 tcp tcpwrapped open
4568149.126.72.220 5989 tcp tcpwrapped open
4569149.126.72.220 5990 tcp tcpwrapped open
4570149.126.72.220 5991 tcp tcpwrapped open
4571149.126.72.220 5992 tcp tcpwrapped open
4572149.126.72.220 5993 tcp tcpwrapped open
4573149.126.72.220 5994 tcp tcpwrapped open
4574149.126.72.220 5995 tcp tcpwrapped open
4575149.126.72.220 5996 tcp tcpwrapped open
4576149.126.72.220 5997 tcp tcpwrapped open
4577149.126.72.220 5998 tcp tcpwrapped open
4578149.126.72.220 5999 tcp tcpwrapped open
4579149.126.72.220 6000 tcp tcpwrapped open
4580149.126.72.220 6001 tcp tcpwrapped open
4581149.126.72.220 6002 tcp tcpwrapped open
4582149.126.72.220 6003 tcp tcpwrapped open
4583149.126.72.220 6004 tcp tcpwrapped open
4584149.126.72.220 6005 tcp tcpwrapped open
4585149.126.72.220 6006 tcp tcpwrapped open
4586149.126.72.220 6007 tcp tcpwrapped open
4587149.126.72.220 6008 tcp tcpwrapped open
4588149.126.72.220 6009 tcp tcpwrapped open
4589149.126.72.220 6010 tcp tcpwrapped open
4590149.126.72.220 6011 tcp tcpwrapped open
4591149.126.72.220 6021 tcp tcpwrapped open
4592149.126.72.220 6060 tcp tcpwrapped open
4593149.126.72.220 6061 tcp tcpwrapped open
4594149.126.72.220 6081 tcp tcpwrapped open
4595149.126.72.220 6100 tcp tcpwrapped open
4596149.126.72.220 6102 tcp tcpwrapped open
4597149.126.72.220 6134 tcp tcpwrapped open
4598149.126.72.220 6161 tcp tcpwrapped open
4599149.126.72.220 6331 tcp tcpwrapped open
4600149.126.72.220 6348 tcp tcpwrapped open
4601149.126.72.220 6379 tcp tcpwrapped open
4602149.126.72.220 6380 tcp tcpwrapped open
4603149.126.72.220 6433 tcp tcpwrapped open
4604149.126.72.220 6440 tcp tcpwrapped open
4605149.126.72.220 6443 tcp tcpwrapped open
4606149.126.72.220 6488 tcp tcpwrapped open
4607149.126.72.220 6500 tcp tcpwrapped open
4608149.126.72.220 6505 tcp tcpwrapped open
4609149.126.72.220 6510 tcp tcpwrapped open
4610149.126.72.220 6511 tcp tcpwrapped open
4611149.126.72.220 6512 tcp tcpwrapped open
4612149.126.72.220 6514 tcp tcpwrapped open
4613149.126.72.220 6543 tcp tcpwrapped open
4614149.126.72.220 6544 tcp tcpwrapped open
4615149.126.72.220 6560 tcp tcpwrapped open
4616149.126.72.220 6561 tcp tcpwrapped open
4617149.126.72.220 6565 tcp tcpwrapped open
4618149.126.72.220 6580 tcp tcpwrapped open
4619149.126.72.220 6581 tcp tcpwrapped open
4620149.126.72.220 6590 tcp tcpwrapped open
4621149.126.72.220 6601 tcp tcpwrapped open
4622149.126.72.220 6603 tcp tcpwrapped open
4623149.126.72.220 6605 tcp tcpwrapped open
4624149.126.72.220 6661 tcp tcpwrapped open
4625149.126.72.220 6662 tcp tcpwrapped open
4626149.126.72.220 6666 tcp tcpwrapped open
4627149.126.72.220 6686 tcp tcpwrapped open
4628149.126.72.220 6688 tcp tcpwrapped open
4629149.126.72.220 6700 tcp tcpwrapped open
4630149.126.72.220 6755 tcp tcpwrapped open
4631149.126.72.220 6775 tcp tcpwrapped open
4632149.126.72.220 6779 tcp tcpwrapped open
4633149.126.72.220 6789 tcp tcpwrapped open
4634149.126.72.220 6799 tcp tcpwrapped open
4635149.126.72.220 7000 tcp tcpwrapped open
4636149.126.72.220 7001 tcp tcpwrapped open
4637149.126.72.220 7002 tcp tcpwrapped open
4638149.126.72.220 7003 tcp tcpwrapped open
4639149.126.72.220 7004 tcp tcpwrapped open
4640149.126.72.220 7005 tcp tcpwrapped open
4641149.126.72.220 7007 tcp tcpwrapped open
4642149.126.72.220 7010 tcp tcpwrapped open
4643149.126.72.220 7011 tcp tcpwrapped open
4644149.126.72.220 7021 tcp tcpwrapped open
4645149.126.72.220 7070 tcp tcpwrapped open
4646149.126.72.220 7071 tcp tcpwrapped open
4647149.126.72.220 7079 tcp tcpwrapped open
4648149.126.72.220 7080 tcp tcpwrapped open
4649149.126.72.220 7081 tcp tcpwrapped open
4650149.126.72.220 7082 tcp tcpwrapped open
4651149.126.72.220 7083 tcp tcpwrapped open
4652149.126.72.220 7084 tcp tcpwrapped open
4653149.126.72.220 7085 tcp tcpwrapped open
4654149.126.72.220 7086 tcp tcpwrapped open
4655149.126.72.220 7087 tcp tcpwrapped open
4656149.126.72.220 7088 tcp tcpwrapped open
4657149.126.72.220 7090 tcp tcpwrapped open
4658149.126.72.220 7171 tcp tcpwrapped open
4659149.126.72.220 7172 tcp tcpwrapped open
4660149.126.72.220 7272 tcp tcpwrapped open
4661149.126.72.220 7348 tcp tcpwrapped open
4662149.126.72.220 7403 tcp tcpwrapped open
4663149.126.72.220 7433 tcp tcpwrapped open
4664149.126.72.220 7441 tcp tcpwrapped open
4665149.126.72.220 7443 tcp tcpwrapped open
4666149.126.72.220 7444 tcp tcpwrapped open
4667149.126.72.220 7445 tcp tcpwrapped open
4668149.126.72.220 7473 tcp tcpwrapped open
4669149.126.72.220 7500 tcp tcpwrapped open
4670149.126.72.220 7537 tcp tcpwrapped open
4671149.126.72.220 7687 tcp tcpwrapped open
4672149.126.72.220 7700 tcp tcpwrapped open
4673149.126.72.220 7771 tcp tcpwrapped open
4674149.126.72.220 7773 tcp tcpwrapped open
4675149.126.72.220 7774 tcp tcpwrapped open
4676149.126.72.220 7775 tcp tcpwrapped open
4677149.126.72.220 7776 tcp tcpwrapped open
4678149.126.72.220 7777 tcp tcpwrapped open
4679149.126.72.220 7778 tcp tcpwrapped open
4680149.126.72.220 7779 tcp tcpwrapped open
4681149.126.72.220 7788 tcp tcpwrapped open
4682149.126.72.220 7799 tcp tcpwrapped open
4683149.126.72.220 7998 tcp tcpwrapped open
4684149.126.72.220 7999 tcp tcpwrapped open
4685149.126.72.220 8000 tcp tcpwrapped open
4686149.126.72.220 8001 tcp tcpwrapped open
4687149.126.72.220 8002 tcp tcpwrapped open
4688149.126.72.220 8003 tcp tcpwrapped open
4689149.126.72.220 8004 tcp tcpwrapped open
4690149.126.72.220 8005 tcp tcpwrapped open
4691149.126.72.220 8006 tcp tcpwrapped open
4692149.126.72.220 8007 tcp tcpwrapped open
4693149.126.72.220 8008 tcp tcpwrapped open
4694149.126.72.220 8009 tcp tcpwrapped open
4695149.126.72.220 8010 tcp tcpwrapped open
4696149.126.72.220 8011 tcp tcpwrapped open
4697149.126.72.220 8012 tcp tcpwrapped open
4698149.126.72.220 8013 tcp tcpwrapped open
4699149.126.72.220 8014 tcp tcpwrapped open
4700149.126.72.220 8015 tcp tcpwrapped open
4701149.126.72.220 8016 tcp tcpwrapped open
4702149.126.72.220 8017 tcp tcpwrapped open
4703149.126.72.220 8018 tcp tcpwrapped open
4704149.126.72.220 8019 tcp tcpwrapped open
4705149.126.72.220 8020 tcp tcpwrapped open
4706149.126.72.220 8021 tcp tcpwrapped open
4707149.126.72.220 8022 tcp tcpwrapped open
4708149.126.72.220 8023 tcp tcpwrapped open
4709149.126.72.220 8024 tcp tcpwrapped open
4710149.126.72.220 8025 tcp tcpwrapped open
4711149.126.72.220 8026 tcp tcpwrapped open
4712149.126.72.220 8027 tcp tcpwrapped open
4713149.126.72.220 8028 tcp tcpwrapped open
4714149.126.72.220 8029 tcp tcpwrapped open
4715149.126.72.220 8030 tcp tcpwrapped open
4716149.126.72.220 8031 tcp tcpwrapped open
4717149.126.72.220 8032 tcp tcpwrapped open
4718149.126.72.220 8033 tcp tcpwrapped open
4719149.126.72.220 8034 tcp tcpwrapped open
4720149.126.72.220 8035 tcp tcpwrapped open
4721149.126.72.220 8036 tcp tcpwrapped open
4722149.126.72.220 8037 tcp tcpwrapped open
4723149.126.72.220 8038 tcp tcpwrapped open
4724149.126.72.220 8039 tcp tcpwrapped open
4725149.126.72.220 8040 tcp tcpwrapped open
4726149.126.72.220 8041 tcp tcpwrapped open
4727149.126.72.220 8042 tcp tcpwrapped open
4728149.126.72.220 8043 tcp tcpwrapped open
4729149.126.72.220 8044 tcp tcpwrapped open
4730149.126.72.220 8045 tcp tcpwrapped open
4731149.126.72.220 8046 tcp tcpwrapped open
4732149.126.72.220 8047 tcp tcpwrapped open
4733149.126.72.220 8048 tcp tcpwrapped open
4734149.126.72.220 8049 tcp tcpwrapped open
4735149.126.72.220 8050 tcp tcpwrapped open
4736149.126.72.220 8051 tcp tcpwrapped open
4737149.126.72.220 8052 tcp tcpwrapped open
4738149.126.72.220 8053 tcp tcpwrapped open
4739149.126.72.220 8054 tcp tcpwrapped open
4740149.126.72.220 8055 tcp tcpwrapped open
4741149.126.72.220 8056 tcp tcpwrapped open
4742149.126.72.220 8057 tcp tcpwrapped open
4743149.126.72.220 8058 tcp tcpwrapped open
4744149.126.72.220 8060 tcp tcpwrapped open
4745149.126.72.220 8064 tcp tcpwrapped open
4746149.126.72.220 8065 tcp tcpwrapped open
4747149.126.72.220 8069 tcp tcpwrapped open
4748149.126.72.220 8070 tcp tcpwrapped open
4749149.126.72.220 8071 tcp tcpwrapped open
4750149.126.72.220 8072 tcp tcpwrapped open
4751149.126.72.220 8074 tcp tcpwrapped open
4752149.126.72.220 8079 tcp tcpwrapped open
4753149.126.72.220 8080 tcp tcpwrapped open
4754149.126.72.220 8081 tcp tcpwrapped open
4755149.126.72.220 8082 tcp tcpwrapped open
4756149.126.72.220 8083 tcp tcpwrapped open
4757149.126.72.220 8084 tcp tcpwrapped open
4758149.126.72.220 8085 tcp tcpwrapped open
4759149.126.72.220 8086 tcp tcpwrapped open
4760149.126.72.220 8087 tcp tcpwrapped open
4761149.126.72.220 8088 tcp tcpwrapped open
4762149.126.72.220 8089 tcp tcpwrapped open
4763149.126.72.220 8090 tcp tcpwrapped open
4764149.126.72.220 8091 tcp tcpwrapped open
4765149.126.72.220 8092 tcp tcpwrapped open
4766149.126.72.220 8093 tcp tcpwrapped open
4767149.126.72.220 8094 tcp tcpwrapped open
4768149.126.72.220 8095 tcp tcpwrapped open
4769149.126.72.220 8096 tcp tcpwrapped open
4770149.126.72.220 8097 tcp tcpwrapped open
4771149.126.72.220 8098 tcp tcpwrapped open
4772149.126.72.220 8099 tcp tcpwrapped open
4773149.126.72.220 8100 tcp tcpwrapped open
4774149.126.72.220 8101 tcp tcpwrapped open
4775149.126.72.220 8102 tcp tcpwrapped open
4776149.126.72.220 8103 tcp tcpwrapped open
4777149.126.72.220 8104 tcp tcpwrapped open
4778149.126.72.220 8105 tcp tcpwrapped open
4779149.126.72.220 8106 tcp tcpwrapped open
4780149.126.72.220 8107 tcp tcpwrapped open
4781149.126.72.220 8108 tcp tcpwrapped open
4782149.126.72.220 8109 tcp tcpwrapped open
4783149.126.72.220 8110 tcp tcpwrapped open
4784149.126.72.220 8113 tcp tcpwrapped open
4785149.126.72.220 8114 tcp tcpwrapped open
4786149.126.72.220 8115 tcp tcpwrapped open
4787149.126.72.220 8118 tcp tcpwrapped open
4788149.126.72.220 8119 tcp tcpwrapped open
4789149.126.72.220 8120 tcp tcpwrapped open
4790149.126.72.220 8121 tcp tcpwrapped open
4791149.126.72.220 8123 tcp tcpwrapped open
4792149.126.72.220 8125 tcp tcpwrapped open
4793149.126.72.220 8126 tcp tcpwrapped open
4794149.126.72.220 8128 tcp tcpwrapped open
4795149.126.72.220 8129 tcp tcpwrapped open
4796149.126.72.220 8130 tcp tcpwrapped open
4797149.126.72.220 8131 tcp tcpwrapped open
4798149.126.72.220 8132 tcp tcpwrapped open
4799149.126.72.220 8133 tcp tcpwrapped open
4800149.126.72.220 8136 tcp tcpwrapped open
4801149.126.72.220 8140 tcp tcpwrapped open
4802149.126.72.220 8142 tcp tcpwrapped open
4803149.126.72.220 8143 tcp tcpwrapped open
4804149.126.72.220 8144 tcp tcpwrapped open
4805149.126.72.220 8147 tcp tcpwrapped open
4806149.126.72.220 8148 tcp tcpwrapped open
4807149.126.72.220 8149 tcp tcpwrapped open
4808149.126.72.220 8150 tcp tcpwrapped open
4809149.126.72.220 8154 tcp tcpwrapped open
4810149.126.72.220 8156 tcp tcpwrapped open
4811149.126.72.220 8157 tcp tcpwrapped open
4812149.126.72.220 8158 tcp tcpwrapped open
4813149.126.72.220 8160 tcp tcpwrapped open
4814149.126.72.220 8161 tcp tcpwrapped open
4815149.126.72.220 8162 tcp tcpwrapped open
4816149.126.72.220 8163 tcp tcpwrapped open
4817149.126.72.220 8164 tcp tcpwrapped open
4818149.126.72.220 8165 tcp tcpwrapped open
4819149.126.72.220 8166 tcp tcpwrapped open
4820149.126.72.220 8167 tcp tcpwrapped open
4821149.126.72.220 8168 tcp tcpwrapped open
4822149.126.72.220 8169 tcp tcpwrapped open
4823149.126.72.220 8170 tcp tcpwrapped open
4824149.126.72.220 8171 tcp tcpwrapped open
4825149.126.72.220 8172 tcp tcpwrapped open
4826149.126.72.220 8173 tcp tcpwrapped open
4827149.126.72.220 8175 tcp tcpwrapped open
4828149.126.72.220 8176 tcp tcpwrapped open
4829149.126.72.220 8178 tcp tcpwrapped open
4830149.126.72.220 8179 tcp tcpwrapped open
4831149.126.72.220 8180 tcp tcpwrapped open
4832149.126.72.220 8181 tcp tcpwrapped open
4833149.126.72.220 8182 tcp tcpwrapped open
4834149.126.72.220 8183 tcp tcpwrapped open
4835149.126.72.220 8184 tcp tcpwrapped open
4836149.126.72.220 8185 tcp tcpwrapped open
4837149.126.72.220 8186 tcp tcpwrapped open
4838149.126.72.220 8187 tcp tcpwrapped open
4839149.126.72.220 8188 tcp tcpwrapped open
4840149.126.72.220 8189 tcp tcpwrapped open
4841149.126.72.220 8190 tcp tcpwrapped open
4842149.126.72.220 8191 tcp tcpwrapped open
4843149.126.72.220 8192 tcp tcpwrapped open
4844149.126.72.220 8193 tcp tcpwrapped open
4845149.126.72.220 8194 tcp tcpwrapped open
4846149.126.72.220 8195 tcp tcpwrapped open
4847149.126.72.220 8198 tcp tcpwrapped open
4848149.126.72.220 8199 tcp tcpwrapped open
4849149.126.72.220 8200 tcp tcpwrapped open
4850149.126.72.220 8203 tcp tcpwrapped open
4851149.126.72.220 8222 tcp tcpwrapped open
4852149.126.72.220 8230 tcp tcpwrapped open
4853149.126.72.220 8236 tcp tcpwrapped open
4854149.126.72.220 8237 tcp tcpwrapped open
4855149.126.72.220 8238 tcp tcpwrapped open
4856149.126.72.220 8239 tcp tcpwrapped open
4857149.126.72.220 8241 tcp tcpwrapped open
4858149.126.72.220 8243 tcp tcpwrapped open
4859149.126.72.220 8248 tcp tcpwrapped open
4860149.126.72.220 8249 tcp tcpwrapped open
4861149.126.72.220 8250 tcp tcpwrapped open
4862149.126.72.220 8251 tcp tcpwrapped open
4863149.126.72.220 8252 tcp tcpwrapped open
4864149.126.72.220 8280 tcp tcpwrapped open
4865149.126.72.220 8282 tcp tcpwrapped open
4866149.126.72.220 8333 tcp tcpwrapped open
4867149.126.72.220 8340 tcp tcpwrapped open
4868149.126.72.220 8343 tcp tcpwrapped open
4869149.126.72.220 8350 tcp tcpwrapped open
4870149.126.72.220 8381 tcp tcpwrapped open
4871149.126.72.220 8382 tcp tcpwrapped open
4872149.126.72.220 8383 tcp tcpwrapped open
4873149.126.72.220 8384 tcp tcpwrapped open
4874149.126.72.220 8385 tcp tcpwrapped open
4875149.126.72.220 8388 tcp tcpwrapped open
4876149.126.72.220 8393 tcp tcpwrapped open
4877149.126.72.220 8401 tcp tcpwrapped open
4878149.126.72.220 8402 tcp tcpwrapped open
4879149.126.72.220 8403 tcp tcpwrapped open
4880149.126.72.220 8404 tcp tcpwrapped open
4881149.126.72.220 8405 tcp tcpwrapped open
4882149.126.72.220 8406 tcp tcpwrapped open
4883149.126.72.220 8407 tcp tcpwrapped open
4884149.126.72.220 8408 tcp tcpwrapped open
4885149.126.72.220 8409 tcp tcpwrapped open
4886149.126.72.220 8410 tcp tcpwrapped open
4887149.126.72.220 8411 tcp tcpwrapped open
4888149.126.72.220 8412 tcp tcpwrapped open
4889149.126.72.220 8413 tcp tcpwrapped open
4890149.126.72.220 8414 tcp tcpwrapped open
4891149.126.72.220 8415 tcp tcpwrapped open
4892149.126.72.220 8416 tcp tcpwrapped open
4893149.126.72.220 8417 tcp tcpwrapped open
4894149.126.72.220 8418 tcp tcpwrapped open
4895149.126.72.220 8419 tcp tcpwrapped open
4896149.126.72.220 8420 tcp tcpwrapped open
4897149.126.72.220 8421 tcp tcpwrapped open
4898149.126.72.220 8422 tcp tcpwrapped open
4899149.126.72.220 8423 tcp tcpwrapped open
4900149.126.72.220 8424 tcp tcpwrapped open
4901149.126.72.220 8425 tcp tcpwrapped open
4902149.126.72.220 8426 tcp tcpwrapped open
4903149.126.72.220 8427 tcp tcpwrapped open
4904149.126.72.220 8428 tcp tcpwrapped open
4905149.126.72.220 8429 tcp tcpwrapped open
4906149.126.72.220 8430 tcp tcpwrapped open
4907149.126.72.220 8431 tcp tcpwrapped open
4908149.126.72.220 8432 tcp tcpwrapped open
4909149.126.72.220 8433 tcp tcpwrapped open
4910149.126.72.220 8435 tcp tcpwrapped open
4911149.126.72.220 8440 tcp tcpwrapped open
4912149.126.72.220 8441 tcp tcpwrapped open
4913149.126.72.220 8442 tcp tcpwrapped open
4914149.126.72.220 8443 tcp tcpwrapped open
4915149.126.72.220 8444 tcp tcpwrapped open
4916149.126.72.220 8445 tcp tcpwrapped open
4917149.126.72.220 8446 tcp tcpwrapped open
4918149.126.72.220 8447 tcp tcpwrapped open
4919149.126.72.220 8448 tcp tcpwrapped open
4920149.126.72.220 8449 tcp tcpwrapped open
4921149.126.72.220 8450 tcp tcpwrapped open
4922149.126.72.220 8451 tcp tcpwrapped open
4923149.126.72.220 8452 tcp tcpwrapped open
4924149.126.72.220 8453 tcp tcpwrapped open
4925149.126.72.220 8454 tcp tcpwrapped open
4926149.126.72.220 8455 tcp tcpwrapped open
4927149.126.72.220 8456 tcp tcpwrapped open
4928149.126.72.220 8457 tcp tcpwrapped open
4929149.126.72.220 8458 tcp tcpwrapped open
4930149.126.72.220 8459 tcp tcpwrapped open
4931149.126.72.220 8460 tcp tcpwrapped open
4932149.126.72.220 8461 tcp tcpwrapped open
4933149.126.72.220 8462 tcp tcpwrapped open
4934149.126.72.220 8463 tcp tcpwrapped open
4935149.126.72.220 8464 tcp tcpwrapped open
4936149.126.72.220 8465 tcp tcpwrapped open
4937149.126.72.220 8466 tcp tcpwrapped open
4938149.126.72.220 8467 tcp tcpwrapped open
4939149.126.72.220 8470 tcp tcpwrapped open
4940149.126.72.220 8472 tcp tcpwrapped open
4941149.126.72.220 8473 tcp tcpwrapped open
4942149.126.72.220 8475 tcp tcpwrapped open
4943149.126.72.220 8480 tcp tcpwrapped open
4944149.126.72.220 8481 tcp tcpwrapped open
4945149.126.72.220 8482 tcp tcpwrapped open
4946149.126.72.220 8484 tcp tcpwrapped open
4947149.126.72.220 8485 tcp tcpwrapped open
4948149.126.72.220 8488 tcp tcpwrapped open
4949149.126.72.220 8493 tcp tcpwrapped open
4950149.126.72.220 8494 tcp tcpwrapped open
4951149.126.72.220 8500 tcp tcpwrapped open
4952149.126.72.220 8502 tcp tcpwrapped open
4953149.126.72.220 8503 tcp tcpwrapped open
4954149.126.72.220 8504 tcp tcpwrapped open
4955149.126.72.220 8505 tcp tcpwrapped open
4956149.126.72.220 8506 tcp tcpwrapped open
4957149.126.72.220 8510 tcp tcpwrapped open
4958149.126.72.220 8513 tcp tcpwrapped open
4959149.126.72.220 8514 tcp tcpwrapped open
4960149.126.72.220 8515 tcp tcpwrapped open
4961149.126.72.220 8519 tcp tcpwrapped open
4962149.126.72.220 8520 tcp tcpwrapped open
4963149.126.72.220 8521 tcp tcpwrapped open
4964149.126.72.220 8523 tcp tcpwrapped open
4965149.126.72.220 8524 tcp tcpwrapped open
4966149.126.72.220 8525 tcp tcpwrapped open
4967149.126.72.220 8526 tcp tcpwrapped open
4968149.126.72.220 8528 tcp tcpwrapped open
4969149.126.72.220 8529 tcp tcpwrapped open
4970149.126.72.220 8530 tcp tcpwrapped open
4971149.126.72.220 8531 tcp tcpwrapped open
4972149.126.72.220 8532 tcp tcpwrapped open
4973149.126.72.220 8533 tcp tcpwrapped open
4974149.126.72.220 8536 tcp tcpwrapped open
4975149.126.72.220 8540 tcp tcpwrapped open
4976149.126.72.220 8543 tcp tcpwrapped open
4977149.126.72.220 8544 tcp tcpwrapped open
4978149.126.72.220 8548 tcp tcpwrapped open
4979149.126.72.220 8549 tcp tcpwrapped open
4980149.126.72.220 8550 tcp tcpwrapped open
4981149.126.72.220 8551 tcp tcpwrapped open
4982149.126.72.220 8553 tcp tcpwrapped open
4983149.126.72.220 8556 tcp tcpwrapped open
4984149.126.72.220 8557 tcp tcpwrapped open
4985149.126.72.220 8558 tcp tcpwrapped open
4986149.126.72.220 8560 tcp tcpwrapped open
4987149.126.72.220 8561 tcp tcpwrapped open
4988149.126.72.220 8562 tcp tcpwrapped open
4989149.126.72.220 8563 tcp tcpwrapped open
4990149.126.72.220 8564 tcp tcpwrapped open
4991149.126.72.220 8565 tcp tcpwrapped open
4992149.126.72.220 8566 tcp tcpwrapped open
4993149.126.72.220 8567 tcp tcpwrapped open
4994149.126.72.220 8568 tcp tcpwrapped open
4995149.126.72.220 8569 tcp tcpwrapped open
4996149.126.72.220 8570 tcp tcpwrapped open
4997149.126.72.220 8571 tcp tcpwrapped open
4998149.126.72.220 8573 tcp tcpwrapped open
4999149.126.72.220 8574 tcp tcpwrapped open
5000149.126.72.220 8575 tcp tcpwrapped open
5001149.126.72.220 8576 tcp tcpwrapped open
5002149.126.72.220 8577 tcp tcpwrapped open
5003149.126.72.220 8578 tcp tcpwrapped open
5004149.126.72.220 8579 tcp tcpwrapped open
5005149.126.72.220 8580 tcp tcpwrapped open
5006149.126.72.220 8581 tcp tcpwrapped open
5007149.126.72.220 8582 tcp tcpwrapped open
5008149.126.72.220 8583 tcp tcpwrapped open
5009149.126.72.220 8585 tcp tcpwrapped open
5010149.126.72.220 8586 tcp tcpwrapped open
5011149.126.72.220 8588 tcp tcpwrapped open
5012149.126.72.220 8589 tcp tcpwrapped open
5013149.126.72.220 8590 tcp tcpwrapped open
5014149.126.72.220 8591 tcp tcpwrapped open
5015149.126.72.220 8592 tcp tcpwrapped open
5016149.126.72.220 8593 tcp tcpwrapped open
5017149.126.72.220 8594 tcp tcpwrapped open
5018149.126.72.220 8595 tcp tcpwrapped open
5019149.126.72.220 8596 tcp tcpwrapped open
5020149.126.72.220 8597 tcp tcpwrapped open
5021149.126.72.220 8598 tcp tcpwrapped open
5022149.126.72.220 8599 tcp tcpwrapped open
5023149.126.72.220 8600 tcp tcpwrapped open
5024149.126.72.220 8601 tcp tcpwrapped open
5025149.126.72.220 8605 tcp tcpwrapped open
5026149.126.72.220 8606 tcp tcpwrapped open
5027149.126.72.220 8630 tcp tcpwrapped open
5028149.126.72.220 8640 tcp tcpwrapped open
5029149.126.72.220 8641 tcp tcpwrapped open
5030149.126.72.220 8643 tcp tcpwrapped open
5031149.126.72.220 8663 tcp tcpwrapped open
5032149.126.72.220 8666 tcp tcpwrapped open
5033149.126.72.220 8686 tcp tcpwrapped open
5034149.126.72.220 8688 tcp tcpwrapped open
5035149.126.72.220 8700 tcp tcpwrapped open
5036149.126.72.220 8701 tcp tcpwrapped open
5037149.126.72.220 8702 tcp tcpwrapped open
5038149.126.72.220 8703 tcp tcpwrapped open
5039149.126.72.220 8704 tcp tcpwrapped open
5040149.126.72.220 8705 tcp tcpwrapped open
5041149.126.72.220 8706 tcp tcpwrapped open
5042149.126.72.220 8707 tcp tcpwrapped open
5043149.126.72.220 8708 tcp tcpwrapped open
5044149.126.72.220 8709 tcp tcpwrapped open
5045149.126.72.220 8723 tcp tcpwrapped open
5046149.126.72.220 8724 tcp tcpwrapped open
5047149.126.72.220 8731 tcp tcpwrapped open
5048149.126.72.220 8732 tcp tcpwrapped open
5049149.126.72.220 8764 tcp tcpwrapped open
5050149.126.72.220 8765 tcp tcpwrapped open
5051149.126.72.220 8766 tcp tcpwrapped open
5052149.126.72.220 8767 tcp tcpwrapped open
5053149.126.72.220 8771 tcp tcpwrapped open
5054149.126.72.220 8787 tcp tcpwrapped open
5055149.126.72.220 8788 tcp tcpwrapped open
5056149.126.72.220 8789 tcp tcpwrapped open
5057149.126.72.220 8790 tcp tcpwrapped open
5058149.126.72.220 8791 tcp tcpwrapped open
5059149.126.72.220 8800 tcp tcpwrapped open
5060149.126.72.220 8801 tcp tcpwrapped open
5061149.126.72.220 8802 tcp tcpwrapped open
5062149.126.72.220 8803 tcp tcpwrapped open
5063149.126.72.220 8804 tcp tcpwrapped open
5064149.126.72.220 8805 tcp tcpwrapped open
5065149.126.72.220 8806 tcp tcpwrapped open
5066149.126.72.220 8807 tcp tcpwrapped open
5067149.126.72.220 8808 tcp tcpwrapped open
5068149.126.72.220 8809 tcp tcpwrapped open
5069149.126.72.220 8810 tcp tcpwrapped open
5070149.126.72.220 8811 tcp tcpwrapped open
5071149.126.72.220 8812 tcp tcpwrapped open
5072149.126.72.220 8813 tcp tcpwrapped open
5073149.126.72.220 8814 tcp tcpwrapped open
5074149.126.72.220 8815 tcp tcpwrapped open
5075149.126.72.220 8816 tcp tcpwrapped open
5076149.126.72.220 8817 tcp tcpwrapped open
5077149.126.72.220 8818 tcp tcpwrapped open
5078149.126.72.220 8819 tcp tcpwrapped open
5079149.126.72.220 8820 tcp tcpwrapped open
5080149.126.72.220 8821 tcp tcpwrapped open
5081149.126.72.220 8822 tcp tcpwrapped open
5082149.126.72.220 8823 tcp tcpwrapped open
5083149.126.72.220 8824 tcp tcpwrapped open
5084149.126.72.220 8825 tcp tcpwrapped open
5085149.126.72.220 8826 tcp tcpwrapped open
5086149.126.72.220 8827 tcp tcpwrapped open
5087149.126.72.220 8828 tcp tcpwrapped open
5088149.126.72.220 8829 tcp tcpwrapped open
5089149.126.72.220 8830 tcp tcpwrapped open
5090149.126.72.220 8831 tcp tcpwrapped open
5091149.126.72.220 8832 tcp tcpwrapped open
5092149.126.72.220 8833 tcp tcpwrapped open
5093149.126.72.220 8834 tcp tcpwrapped open
5094149.126.72.220 8835 tcp tcpwrapped open
5095149.126.72.220 8836 tcp tcpwrapped open
5096149.126.72.220 8837 tcp tcpwrapped open
5097149.126.72.220 8838 tcp tcpwrapped open
5098149.126.72.220 8839 tcp tcpwrapped open
5099149.126.72.220 8840 tcp tcpwrapped open
5100149.126.72.220 8841 tcp tcpwrapped open
5101149.126.72.220 8842 tcp tcpwrapped open
5102149.126.72.220 8843 tcp tcpwrapped open
5103149.126.72.220 8844 tcp tcpwrapped open
5104149.126.72.220 8845 tcp tcpwrapped open
5105149.126.72.220 8846 tcp tcpwrapped open
5106149.126.72.220 8847 tcp tcpwrapped open
5107149.126.72.220 8848 tcp tcpwrapped open
5108149.126.72.220 8849 tcp tcpwrapped open
5109149.126.72.220 8850 tcp tcpwrapped open
5110149.126.72.220 8851 tcp tcpwrapped open
5111149.126.72.220 8852 tcp tcpwrapped open
5112149.126.72.220 8853 tcp tcpwrapped open
5113149.126.72.220 8854 tcp tcpwrapped open
5114149.126.72.220 8855 tcp tcpwrapped open
5115149.126.72.220 8856 tcp tcpwrapped open
5116149.126.72.220 8857 tcp tcpwrapped open
5117149.126.72.220 8858 tcp tcpwrapped open
5118149.126.72.220 8859 tcp tcpwrapped open
5119149.126.72.220 8860 tcp tcpwrapped open
5120149.126.72.220 8861 tcp tcpwrapped open
5121149.126.72.220 8862 tcp tcpwrapped open
5122149.126.72.220 8863 tcp tcpwrapped open
5123149.126.72.220 8864 tcp tcpwrapped open
5124149.126.72.220 8865 tcp tcpwrapped open
5125149.126.72.220 8866 tcp tcpwrapped open
5126149.126.72.220 8867 tcp tcpwrapped open
5127149.126.72.220 8868 tcp tcpwrapped open
5128149.126.72.220 8869 tcp tcpwrapped open
5129149.126.72.220 8870 tcp tcpwrapped open
5130149.126.72.220 8871 tcp tcpwrapped open
5131149.126.72.220 8872 tcp tcpwrapped open
5132149.126.72.220 8873 tcp tcpwrapped open
5133149.126.72.220 8874 tcp tcpwrapped open
5134149.126.72.220 8875 tcp tcpwrapped open
5135149.126.72.220 8876 tcp tcpwrapped open
5136149.126.72.220 8877 tcp tcpwrapped open
5137149.126.72.220 8878 tcp tcpwrapped open
5138149.126.72.220 8879 tcp tcpwrapped open
5139149.126.72.220 8880 tcp tcpwrapped open
5140149.126.72.220 8881 tcp tcpwrapped open
5141149.126.72.220 8882 tcp tcpwrapped open
5142149.126.72.220 8883 tcp tcpwrapped open
5143149.126.72.220 8884 tcp tcpwrapped open
5144149.126.72.220 8885 tcp tcpwrapped open
5145149.126.72.220 8887 tcp tcpwrapped open
5146149.126.72.220 8888 tcp tcpwrapped open
5147149.126.72.220 8889 tcp tcpwrapped open
5148149.126.72.220 8890 tcp tcpwrapped open
5149149.126.72.220 8891 tcp tcpwrapped open
5150149.126.72.220 8899 tcp tcpwrapped open
5151149.126.72.220 8900 tcp tcpwrapped open
5152149.126.72.220 8901 tcp tcpwrapped open
5153149.126.72.220 8902 tcp tcpwrapped open
5154149.126.72.220 8905 tcp tcpwrapped open
5155149.126.72.220 8906 tcp tcpwrapped open
5156149.126.72.220 8907 tcp tcpwrapped open
5157149.126.72.220 8908 tcp tcpwrapped open
5158149.126.72.220 8910 tcp tcpwrapped open
5159149.126.72.220 8911 tcp tcpwrapped open
5160149.126.72.220 8912 tcp tcpwrapped open
5161149.126.72.220 8913 tcp tcpwrapped open
5162149.126.72.220 8915 tcp tcpwrapped open
5163149.126.72.220 8916 tcp tcpwrapped open
5164149.126.72.220 8935 tcp tcpwrapped open
5165149.126.72.220 8943 tcp tcpwrapped open
5166149.126.72.220 8969 tcp tcpwrapped open
5167149.126.72.220 8988 tcp tcpwrapped open
5168149.126.72.220 8989 tcp tcpwrapped open
5169149.126.72.220 8999 tcp tcpwrapped open
5170149.126.72.220 9000 tcp tcpwrapped open
5171149.126.72.220 9001 tcp tcpwrapped open
5172149.126.72.220 9002 tcp tcpwrapped open
5173149.126.72.220 9003 tcp tcpwrapped open
5174149.126.72.220 9004 tcp tcpwrapped open
5175149.126.72.220 9005 tcp tcpwrapped open
5176149.126.72.220 9006 tcp tcpwrapped open
5177149.126.72.220 9007 tcp tcpwrapped open
5178149.126.72.220 9008 tcp tcpwrapped open
5179149.126.72.220 9009 tcp tcpwrapped open
5180149.126.72.220 9010 tcp tcpwrapped open
5181149.126.72.220 9011 tcp tcpwrapped open
5182149.126.72.220 9012 tcp tcpwrapped open
5183149.126.72.220 9013 tcp tcpwrapped open
5184149.126.72.220 9014 tcp tcpwrapped open
5185149.126.72.220 9015 tcp tcpwrapped open
5186149.126.72.220 9016 tcp tcpwrapped open
5187149.126.72.220 9017 tcp tcpwrapped open
5188149.126.72.220 9018 tcp tcpwrapped open
5189149.126.72.220 9019 tcp tcpwrapped open
5190149.126.72.220 9020 tcp tcpwrapped open
5191149.126.72.220 9021 tcp tcpwrapped open
5192149.126.72.220 9022 tcp tcpwrapped open
5193149.126.72.220 9023 tcp tcpwrapped open
5194149.126.72.220 9024 tcp tcpwrapped open
5195149.126.72.220 9025 tcp tcpwrapped open
5196149.126.72.220 9026 tcp tcpwrapped open
5197149.126.72.220 9027 tcp tcpwrapped open
5198149.126.72.220 9028 tcp tcpwrapped open
5199149.126.72.220 9029 tcp tcpwrapped open
5200149.126.72.220 9030 tcp tcpwrapped open
5201149.126.72.220 9031 tcp tcpwrapped open
5202149.126.72.220 9032 tcp tcpwrapped open
5203149.126.72.220 9033 tcp tcpwrapped open
5204149.126.72.220 9034 tcp tcpwrapped open
5205149.126.72.220 9035 tcp tcpwrapped open
5206149.126.72.220 9036 tcp tcpwrapped open
5207149.126.72.220 9037 tcp tcpwrapped open
5208149.126.72.220 9038 tcp tcpwrapped open
5209149.126.72.220 9039 tcp tcpwrapped open
5210149.126.72.220 9040 tcp tcpwrapped open
5211149.126.72.220 9041 tcp tcpwrapped open
5212149.126.72.220 9042 tcp tcpwrapped open
5213149.126.72.220 9043 tcp tcpwrapped open
5214149.126.72.220 9044 tcp tcpwrapped open
5215149.126.72.220 9045 tcp tcpwrapped open
5216149.126.72.220 9046 tcp tcpwrapped open
5217149.126.72.220 9047 tcp tcpwrapped open
5218149.126.72.220 9048 tcp tcpwrapped open
5219149.126.72.220 9049 tcp tcpwrapped open
5220149.126.72.220 9050 tcp tcpwrapped open
5221149.126.72.220 9051 tcp tcpwrapped open
5222149.126.72.220 9052 tcp tcpwrapped open
5223149.126.72.220 9058 tcp tcpwrapped open
5224149.126.72.220 9060 tcp tcpwrapped open
5225149.126.72.220 9061 tcp tcpwrapped open
5226149.126.72.220 9070 tcp tcpwrapped open
5227149.126.72.220 9080 tcp tcpwrapped open
5228149.126.72.220 9081 tcp tcpwrapped open
5229149.126.72.220 9082 tcp tcpwrapped open
5230149.126.72.220 9084 tcp tcpwrapped open
5231149.126.72.220 9085 tcp tcpwrapped open
5232149.126.72.220 9086 tcp tcpwrapped open
5233149.126.72.220 9088 tcp tcpwrapped open
5234149.126.72.220 9089 tcp tcpwrapped open
5235149.126.72.220 9090 tcp tcpwrapped open
5236149.126.72.220 9091 tcp tcpwrapped open
5237149.126.72.220 9092 tcp tcpwrapped open
5238149.126.72.220 9093 tcp tcpwrapped open
5239149.126.72.220 9094 tcp tcpwrapped open
5240149.126.72.220 9095 tcp tcpwrapped open
5241149.126.72.220 9096 tcp tcpwrapped open
5242149.126.72.220 9097 tcp tcpwrapped open
5243149.126.72.220 9098 tcp tcpwrapped open
5244149.126.72.220 9099 tcp tcpwrapped open
5245149.126.72.220 9100 tcp jetdirect open
5246149.126.72.220 9101 tcp jetdirect open
5247149.126.72.220 9102 tcp jetdirect open
5248149.126.72.220 9103 tcp jetdirect open
5249149.126.72.220 9104 tcp jetdirect open
5250149.126.72.220 9105 tcp jetdirect open
5251149.126.72.220 9106 tcp jetdirect open
5252149.126.72.220 9107 tcp jetdirect open
5253149.126.72.220 9108 tcp tcpwrapped open
5254149.126.72.220 9109 tcp tcpwrapped open
5255149.126.72.220 9110 tcp tcpwrapped open
5256149.126.72.220 9111 tcp tcpwrapped open
5257149.126.72.220 9136 tcp tcpwrapped open
5258149.126.72.220 9143 tcp tcpwrapped open
5259149.126.72.220 9189 tcp tcpwrapped open
5260149.126.72.220 9199 tcp tcpwrapped open
5261149.126.72.220 9200 tcp tcpwrapped open
5262149.126.72.220 9201 tcp tcpwrapped open
5263149.126.72.220 9202 tcp tcpwrapped open
5264149.126.72.220 9203 tcp tcpwrapped open
5265149.126.72.220 9204 tcp tcpwrapped open
5266149.126.72.220 9205 tcp tcpwrapped open
5267149.126.72.220 9206 tcp tcpwrapped open
5268149.126.72.220 9207 tcp tcpwrapped open
5269149.126.72.220 9208 tcp tcpwrapped open
5270149.126.72.220 9209 tcp tcpwrapped open
5271149.126.72.220 9210 tcp tcpwrapped open
5272149.126.72.220 9211 tcp tcpwrapped open
5273149.126.72.220 9212 tcp tcpwrapped open
5274149.126.72.220 9213 tcp tcpwrapped open
5275149.126.72.220 9214 tcp tcpwrapped open
5276149.126.72.220 9215 tcp tcpwrapped open
5277149.126.72.220 9216 tcp tcpwrapped open
5278149.126.72.220 9217 tcp tcpwrapped open
5279149.126.72.220 9218 tcp tcpwrapped open
5280149.126.72.220 9219 tcp tcpwrapped open
5281149.126.72.220 9220 tcp tcpwrapped open
5282149.126.72.220 9221 tcp tcpwrapped open
5283149.126.72.220 9236 tcp tcpwrapped open
5284149.126.72.220 9251 tcp tcpwrapped open
5285149.126.72.220 9289 tcp tcpwrapped open
5286149.126.72.220 9299 tcp tcpwrapped open
5287149.126.72.220 9300 tcp tcpwrapped open
5288149.126.72.220 9301 tcp tcpwrapped open
5289149.126.72.220 9302 tcp tcpwrapped open
5290149.126.72.220 9303 tcp tcpwrapped open
5291149.126.72.220 9304 tcp tcpwrapped open
5292149.126.72.220 9305 tcp tcpwrapped open
5293149.126.72.220 9306 tcp tcpwrapped open
5294149.126.72.220 9307 tcp tcpwrapped open
5295149.126.72.220 9308 tcp tcpwrapped open
5296149.126.72.220 9309 tcp tcpwrapped open
5297149.126.72.220 9310 tcp tcpwrapped open
5298149.126.72.220 9311 tcp tcpwrapped open
5299149.126.72.220 9350 tcp tcpwrapped open
5300149.126.72.220 9383 tcp tcpwrapped open
5301149.126.72.220 9387 tcp tcpwrapped open
5302149.126.72.220 9389 tcp tcpwrapped open
5303149.126.72.220 9433 tcp tcpwrapped open
5304149.126.72.220 9443 tcp tcpwrapped open
5305149.126.72.220 9444 tcp tcpwrapped open
5306149.126.72.220 9446 tcp tcpwrapped open
5307149.126.72.220 9447 tcp tcpwrapped open
5308149.126.72.220 9500 tcp tcpwrapped open
5309149.126.72.220 9510 tcp tcpwrapped open
5310149.126.72.220 9530 tcp tcpwrapped open
5311149.126.72.220 9550 tcp tcpwrapped open
5312149.126.72.220 9600 tcp tcpwrapped open
5313149.126.72.220 9663 tcp tcpwrapped open
5314149.126.72.220 9690 tcp tcpwrapped open
5315149.126.72.220 9704 tcp tcpwrapped open
5316149.126.72.220 9710 tcp tcpwrapped open
5317149.126.72.220 9711 tcp tcpwrapped open
5318149.126.72.220 9765 tcp tcpwrapped open
5319149.126.72.220 9773 tcp tcpwrapped open
5320149.126.72.220 9779 tcp tcpwrapped open
5321149.126.72.220 9800 tcp tcpwrapped open
5322149.126.72.220 9803 tcp tcpwrapped open
5323149.126.72.220 9804 tcp tcpwrapped open
5324149.126.72.220 9950 tcp tcpwrapped open
5325149.126.72.220 9991 tcp tcpwrapped open
5326149.126.72.220 9992 tcp tcpwrapped open
5327149.126.72.220 9993 tcp tcpwrapped open
5328149.126.72.220 9994 tcp tcpwrapped open
5329149.126.72.220 9997 tcp tcpwrapped open
5330149.126.72.220 9998 tcp tcpwrapped open
5331149.126.72.220 9999 tcp tcpwrapped open
5332149.126.72.220 10000 tcp tcpwrapped open
5333149.126.72.220 10001 tcp tcpwrapped open
5334149.126.72.220 10002 tcp tcpwrapped open
5335149.126.72.220 10003 tcp tcpwrapped open
5336149.126.72.220 10004 tcp tcpwrapped open
5337149.126.72.220 10005 tcp tcpwrapped open
5338149.126.72.220 10006 tcp tcpwrapped open
5339149.126.72.220 10007 tcp tcpwrapped open
5340149.126.72.220 10008 tcp tcpwrapped open
5341149.126.72.220 10009 tcp tcpwrapped open
5342149.126.72.220 10010 tcp tcpwrapped open
5343149.126.72.220 10011 tcp tcpwrapped open
5344149.126.72.220 10012 tcp tcpwrapped open
5345149.126.72.220 10013 tcp tcpwrapped open
5346149.126.72.220 10014 tcp tcpwrapped open
5347149.126.72.220 10015 tcp tcpwrapped open
5348149.126.72.220 10016 tcp tcpwrapped open
5349149.126.72.220 10017 tcp tcpwrapped open
5350149.126.72.220 10018 tcp tcpwrapped open
5351149.126.72.220 10019 tcp tcpwrapped open
5352149.126.72.220 10020 tcp tcpwrapped open
5353149.126.72.220 10021 tcp tcpwrapped open
5354149.126.72.220 10022 tcp tcpwrapped open
5355149.126.72.220 10023 tcp tcpwrapped open
5356149.126.72.220 10024 tcp tcpwrapped open
5357149.126.72.220 10025 tcp tcpwrapped open
5358149.126.72.220 10026 tcp tcpwrapped open
5359149.126.72.220 10027 tcp tcpwrapped open
5360149.126.72.220 10028 tcp tcpwrapped open
5361149.126.72.220 10029 tcp tcpwrapped open
5362149.126.72.220 10030 tcp tcpwrapped open
5363149.126.72.220 10031 tcp tcpwrapped open
5364149.126.72.220 10032 tcp tcpwrapped open
5365149.126.72.220 10033 tcp tcpwrapped open
5366149.126.72.220 10034 tcp tcpwrapped open
5367149.126.72.220 10035 tcp tcpwrapped open
5368149.126.72.220 10036 tcp tcpwrapped open
5369149.126.72.220 10037 tcp tcpwrapped open
5370149.126.72.220 10038 tcp tcpwrapped open
5371149.126.72.220 10039 tcp tcpwrapped open
5372149.126.72.220 10040 tcp tcpwrapped open
5373149.126.72.220 10041 tcp tcpwrapped open
5374149.126.72.220 10042 tcp tcpwrapped open
5375149.126.72.220 10043 tcp tcpwrapped open
5376149.126.72.220 10044 tcp tcpwrapped open
5377149.126.72.220 10045 tcp tcpwrapped open
5378149.126.72.220 10046 tcp tcpwrapped open
5379149.126.72.220 10047 tcp tcpwrapped open
5380149.126.72.220 10048 tcp tcpwrapped open
5381149.126.72.220 10049 tcp tcpwrapped open
5382149.126.72.220 10065 tcp tcpwrapped open
5383149.126.72.220 10071 tcp tcpwrapped open
5384149.126.72.220 10075 tcp tcpwrapped open
5385149.126.72.220 10082 tcp tcpwrapped open
5386149.126.72.220 10084 tcp tcpwrapped open
5387149.126.72.220 10100 tcp tcpwrapped open
5388149.126.72.220 10123 tcp tcpwrapped open
5389149.126.72.220 10200 tcp tcpwrapped open
5390149.126.72.220 10443 tcp tcpwrapped open
5391149.126.72.220 10444 tcp tcpwrapped open
5392149.126.72.220 10892 tcp tcpwrapped open
5393149.126.72.220 10894 tcp tcpwrapped open
5394149.126.72.220 11001 tcp tcpwrapped open
5395149.126.72.220 11002 tcp tcpwrapped open
5396149.126.72.220 11007 tcp tcpwrapped open
5397149.126.72.220 11027 tcp tcpwrapped open
5398149.126.72.220 11065 tcp tcpwrapped open
5399149.126.72.220 11075 tcp tcpwrapped open
5400149.126.72.220 11082 tcp tcpwrapped open
5401149.126.72.220 11084 tcp tcpwrapped open
5402149.126.72.220 11110 tcp tcpwrapped open
5403149.126.72.220 11182 tcp tcpwrapped open
5404149.126.72.220 11184 tcp tcpwrapped open
5405149.126.72.220 11443 tcp tcpwrapped open
5406149.126.72.220 12016 tcp tcpwrapped open
5407149.126.72.220 12082 tcp tcpwrapped open
5408149.126.72.220 12084 tcp tcpwrapped open
5409149.126.72.220 12103 tcp tcpwrapped open
5410149.126.72.220 12104 tcp tcpwrapped open
5411149.126.72.220 12105 tcp tcpwrapped open
5412149.126.72.220 12106 tcp tcpwrapped open
5413149.126.72.220 12107 tcp tcpwrapped open
5414149.126.72.220 12108 tcp tcpwrapped open
5415149.126.72.220 12109 tcp tcpwrapped open
5416149.126.72.220 12110 tcp tcpwrapped open
5417149.126.72.220 12111 tcp tcpwrapped open
5418149.126.72.220 12112 tcp tcpwrapped open
5419149.126.72.220 12113 tcp tcpwrapped open
5420149.126.72.220 12114 tcp tcpwrapped open
5421149.126.72.220 12115 tcp tcpwrapped open
5422149.126.72.220 12116 tcp tcpwrapped open
5423149.126.72.220 12117 tcp tcpwrapped open
5424149.126.72.220 12118 tcp tcpwrapped open
5425149.126.72.220 12119 tcp tcpwrapped open
5426149.126.72.220 12120 tcp tcpwrapped open
5427149.126.72.220 12121 tcp tcpwrapped open
5428149.126.72.220 12122 tcp tcpwrapped open
5429149.126.72.220 12123 tcp tcpwrapped open
5430149.126.72.220 12124 tcp tcpwrapped open
5431149.126.72.220 12125 tcp tcpwrapped open
5432149.126.72.220 12126 tcp tcpwrapped open
5433149.126.72.220 12127 tcp tcpwrapped open
5434149.126.72.220 12128 tcp tcpwrapped open
5435149.126.72.220 12129 tcp tcpwrapped open
5436149.126.72.220 12130 tcp tcpwrapped open
5437149.126.72.220 12131 tcp tcpwrapped open
5438149.126.72.220 12132 tcp tcpwrapped open
5439149.126.72.220 12133 tcp tcpwrapped open
5440149.126.72.220 12134 tcp tcpwrapped open
5441149.126.72.220 12135 tcp tcpwrapped open
5442149.126.72.220 12136 tcp tcpwrapped open
5443149.126.72.220 12137 tcp tcpwrapped open
5444149.126.72.220 12138 tcp tcpwrapped open
5445149.126.72.220 12139 tcp tcpwrapped open
5446149.126.72.220 12140 tcp tcpwrapped open
5447149.126.72.220 12141 tcp tcpwrapped open
5448149.126.72.220 12142 tcp tcpwrapped open
5449149.126.72.220 12143 tcp tcpwrapped open
5450149.126.72.220 12144 tcp tcpwrapped open
5451149.126.72.220 12145 tcp tcpwrapped open
5452149.126.72.220 12146 tcp tcpwrapped open
5453149.126.72.220 12147 tcp tcpwrapped open
5454149.126.72.220 12148 tcp tcpwrapped open
5455149.126.72.220 12149 tcp tcpwrapped open
5456149.126.72.220 12150 tcp tcpwrapped open
5457149.126.72.220 12151 tcp tcpwrapped open
5458149.126.72.220 12152 tcp tcpwrapped open
5459149.126.72.220 12153 tcp tcpwrapped open
5460149.126.72.220 12154 tcp tcpwrapped open
5461149.126.72.220 12155 tcp tcpwrapped open
5462149.126.72.220 12156 tcp tcpwrapped open
5463149.126.72.220 12157 tcp tcpwrapped open
5464149.126.72.220 12158 tcp tcpwrapped open
5465149.126.72.220 12159 tcp tcpwrapped open
5466149.126.72.220 12160 tcp tcpwrapped open
5467149.126.72.220 12161 tcp tcpwrapped open
5468149.126.72.220 12162 tcp tcpwrapped open
5469149.126.72.220 12163 tcp tcpwrapped open
5470149.126.72.220 12164 tcp tcpwrapped open
5471149.126.72.220 12165 tcp tcpwrapped open
5472149.126.72.220 12166 tcp tcpwrapped open
5473149.126.72.220 12167 tcp tcpwrapped open
5474149.126.72.220 12168 tcp tcpwrapped open
5475149.126.72.220 12169 tcp tcpwrapped open
5476149.126.72.220 12170 tcp tcpwrapped open
5477149.126.72.220 12171 tcp tcpwrapped open
5478149.126.72.220 12172 tcp tcpwrapped open
5479149.126.72.220 12173 tcp tcpwrapped open
5480149.126.72.220 12174 tcp tcpwrapped open
5481149.126.72.220 12175 tcp tcpwrapped open
5482149.126.72.220 12176 tcp tcpwrapped open
5483149.126.72.220 12177 tcp tcpwrapped open
5484149.126.72.220 12178 tcp tcpwrapped open
5485149.126.72.220 12179 tcp tcpwrapped open
5486149.126.72.220 12180 tcp tcpwrapped open
5487149.126.72.220 12181 tcp tcpwrapped open
5488149.126.72.220 12182 tcp tcpwrapped open
5489149.126.72.220 12183 tcp tcpwrapped open
5490149.126.72.220 12184 tcp tcpwrapped open
5491149.126.72.220 12185 tcp tcpwrapped open
5492149.126.72.220 12186 tcp tcpwrapped open
5493149.126.72.220 12187 tcp tcpwrapped open
5494149.126.72.220 12188 tcp tcpwrapped open
5495149.126.72.220 12189 tcp tcpwrapped open
5496149.126.72.220 12190 tcp tcpwrapped open
5497149.126.72.220 12191 tcp tcpwrapped open
5498149.126.72.220 12192 tcp tcpwrapped open
5499149.126.72.220 12193 tcp tcpwrapped open
5500149.126.72.220 12194 tcp tcpwrapped open
5501149.126.72.220 12195 tcp tcpwrapped open
5502149.126.72.220 12196 tcp tcpwrapped open
5503149.126.72.220 12197 tcp tcpwrapped open
5504149.126.72.220 12198 tcp tcpwrapped open
5505149.126.72.220 12199 tcp tcpwrapped open
5506149.126.72.220 12200 tcp tcpwrapped open
5507149.126.72.220 12201 tcp tcpwrapped open
5508149.126.72.220 12202 tcp tcpwrapped open
5509149.126.72.220 12203 tcp tcpwrapped open
5510149.126.72.220 12204 tcp tcpwrapped open
5511149.126.72.220 12205 tcp tcpwrapped open
5512149.126.72.220 12206 tcp tcpwrapped open
5513149.126.72.220 12207 tcp tcpwrapped open
5514149.126.72.220 12208 tcp tcpwrapped open
5515149.126.72.220 12209 tcp tcpwrapped open
5516149.126.72.220 12210 tcp tcpwrapped open
5517149.126.72.220 12211 tcp tcpwrapped open
5518149.126.72.220 12212 tcp tcpwrapped open
5519149.126.72.220 12213 tcp tcpwrapped open
5520149.126.72.220 12214 tcp tcpwrapped open
5521149.126.72.220 12215 tcp tcpwrapped open
5522149.126.72.220 12216 tcp tcpwrapped open
5523149.126.72.220 12217 tcp tcpwrapped open
5524149.126.72.220 12218 tcp tcpwrapped open
5525149.126.72.220 12219 tcp tcpwrapped open
5526149.126.72.220 12220 tcp tcpwrapped open
5527149.126.72.220 12221 tcp tcpwrapped open
5528149.126.72.220 12222 tcp tcpwrapped open
5529149.126.72.220 12223 tcp tcpwrapped open
5530149.126.72.220 12224 tcp tcpwrapped open
5531149.126.72.220 12225 tcp tcpwrapped open
5532149.126.72.220 12226 tcp tcpwrapped open
5533149.126.72.220 12227 tcp tcpwrapped open
5534149.126.72.220 12228 tcp tcpwrapped open
5535149.126.72.220 12229 tcp tcpwrapped open
5536149.126.72.220 12230 tcp tcpwrapped open
5537149.126.72.220 12231 tcp tcpwrapped open
5538149.126.72.220 12232 tcp tcpwrapped open
5539149.126.72.220 12233 tcp tcpwrapped open
5540149.126.72.220 12234 tcp tcpwrapped open
5541149.126.72.220 12235 tcp tcpwrapped open
5542149.126.72.220 12236 tcp tcpwrapped open
5543149.126.72.220 12237 tcp tcpwrapped open
5544149.126.72.220 12238 tcp tcpwrapped open
5545149.126.72.220 12239 tcp tcpwrapped open
5546149.126.72.220 12240 tcp tcpwrapped open
5547149.126.72.220 12241 tcp tcpwrapped open
5548149.126.72.220 12242 tcp tcpwrapped open
5549149.126.72.220 12243 tcp tcpwrapped open
5550149.126.72.220 12244 tcp tcpwrapped open
5551149.126.72.220 12245 tcp tcpwrapped open
5552149.126.72.220 12246 tcp tcpwrapped open
5553149.126.72.220 12247 tcp tcpwrapped open
5554149.126.72.220 12248 tcp tcpwrapped open
5555149.126.72.220 12249 tcp tcpwrapped open
5556149.126.72.220 12250 tcp tcpwrapped open
5557149.126.72.220 12251 tcp tcpwrapped open
5558149.126.72.220 12252 tcp tcpwrapped open
5559149.126.72.220 12253 tcp tcpwrapped open
5560149.126.72.220 12254 tcp tcpwrapped open
5561149.126.72.220 12255 tcp tcpwrapped open
5562149.126.72.220 12256 tcp tcpwrapped open
5563149.126.72.220 12257 tcp tcpwrapped open
5564149.126.72.220 12258 tcp tcpwrapped open
5565149.126.72.220 12259 tcp tcpwrapped open
5566149.126.72.220 12260 tcp tcpwrapped open
5567149.126.72.220 12261 tcp tcpwrapped open
5568149.126.72.220 12262 tcp tcpwrapped open
5569149.126.72.220 12263 tcp tcpwrapped open
5570149.126.72.220 12264 tcp tcpwrapped open
5571149.126.72.220 12265 tcp tcpwrapped open
5572149.126.72.220 12266 tcp tcpwrapped open
5573149.126.72.220 12267 tcp tcpwrapped open
5574149.126.72.220 12268 tcp tcpwrapped open
5575149.126.72.220 12269 tcp tcpwrapped open
5576149.126.72.220 12270 tcp tcpwrapped open
5577149.126.72.220 12271 tcp tcpwrapped open
5578149.126.72.220 12272 tcp tcpwrapped open
5579149.126.72.220 12273 tcp tcpwrapped open
5580149.126.72.220 12274 tcp tcpwrapped open
5581149.126.72.220 12275 tcp tcpwrapped open
5582149.126.72.220 12276 tcp tcpwrapped open
5583149.126.72.220 12277 tcp tcpwrapped open
5584149.126.72.220 12278 tcp tcpwrapped open
5585149.126.72.220 12279 tcp tcpwrapped open
5586149.126.72.220 12280 tcp tcpwrapped open
5587149.126.72.220 12281 tcp tcpwrapped open
5588149.126.72.220 12282 tcp tcpwrapped open
5589149.126.72.220 12283 tcp tcpwrapped open
5590149.126.72.220 12284 tcp tcpwrapped open
5591149.126.72.220 12285 tcp tcpwrapped open
5592149.126.72.220 12286 tcp tcpwrapped open
5593149.126.72.220 12287 tcp tcpwrapped open
5594149.126.72.220 12288 tcp tcpwrapped open
5595149.126.72.220 12289 tcp tcpwrapped open
5596149.126.72.220 12290 tcp tcpwrapped open
5597149.126.72.220 12291 tcp tcpwrapped open
5598149.126.72.220 12292 tcp tcpwrapped open
5599149.126.72.220 12293 tcp tcpwrapped open
5600149.126.72.220 12294 tcp tcpwrapped open
5601149.126.72.220 12295 tcp tcpwrapped open
5602149.126.72.220 12296 tcp tcpwrapped open
5603149.126.72.220 12297 tcp tcpwrapped open
5604149.126.72.220 12298 tcp tcpwrapped open
5605149.126.72.220 12299 tcp tcpwrapped open
5606149.126.72.220 12300 tcp tcpwrapped open
5607149.126.72.220 12301 tcp tcpwrapped open
5608149.126.72.220 12302 tcp tcpwrapped open
5609149.126.72.220 12303 tcp tcpwrapped open
5610149.126.72.220 12304 tcp tcpwrapped open
5611149.126.72.220 12305 tcp tcpwrapped open
5612149.126.72.220 12306 tcp tcpwrapped open
5613149.126.72.220 12307 tcp tcpwrapped open
5614149.126.72.220 12308 tcp tcpwrapped open
5615149.126.72.220 12309 tcp tcpwrapped open
5616149.126.72.220 12310 tcp tcpwrapped open
5617149.126.72.220 12311 tcp tcpwrapped open
5618149.126.72.220 12312 tcp tcpwrapped open
5619149.126.72.220 12313 tcp tcpwrapped open
5620149.126.72.220 12314 tcp tcpwrapped open
5621149.126.72.220 12315 tcp tcpwrapped open
5622149.126.72.220 12316 tcp tcpwrapped open
5623149.126.72.220 12317 tcp tcpwrapped open
5624149.126.72.220 12318 tcp tcpwrapped open
5625149.126.72.220 12319 tcp tcpwrapped open
5626149.126.72.220 12320 tcp tcpwrapped open
5627149.126.72.220 12321 tcp tcpwrapped open
5628149.126.72.220 12322 tcp tcpwrapped open
5629149.126.72.220 12323 tcp tcpwrapped open
5630149.126.72.220 12324 tcp tcpwrapped open
5631149.126.72.220 12325 tcp tcpwrapped open
5632149.126.72.220 12326 tcp tcpwrapped open
5633149.126.72.220 12327 tcp tcpwrapped open
5634149.126.72.220 12328 tcp tcpwrapped open
5635149.126.72.220 12329 tcp tcpwrapped open
5636149.126.72.220 12330 tcp tcpwrapped open
5637149.126.72.220 12331 tcp tcpwrapped open
5638149.126.72.220 12332 tcp tcpwrapped open
5639149.126.72.220 12333 tcp tcpwrapped open
5640149.126.72.220 12334 tcp tcpwrapped open
5641149.126.72.220 12335 tcp tcpwrapped open
5642149.126.72.220 12336 tcp tcpwrapped open
5643149.126.72.220 12337 tcp tcpwrapped open
5644149.126.72.220 12338 tcp tcpwrapped open
5645149.126.72.220 12339 tcp tcpwrapped open
5646149.126.72.220 12340 tcp tcpwrapped open
5647149.126.72.220 12341 tcp tcpwrapped open
5648149.126.72.220 12342 tcp tcpwrapped open
5649149.126.72.220 12343 tcp tcpwrapped open
5650149.126.72.220 12344 tcp tcpwrapped open
5651149.126.72.220 12345 tcp tcpwrapped open
5652149.126.72.220 12346 tcp tcpwrapped open
5653149.126.72.220 12347 tcp tcpwrapped open
5654149.126.72.220 12348 tcp tcpwrapped open
5655149.126.72.220 12349 tcp tcpwrapped open
5656149.126.72.220 12350 tcp tcpwrapped open
5657149.126.72.220 12351 tcp tcpwrapped open
5658149.126.72.220 12352 tcp tcpwrapped open
5659149.126.72.220 12353 tcp tcpwrapped open
5660149.126.72.220 12354 tcp tcpwrapped open
5661149.126.72.220 12355 tcp tcpwrapped open
5662149.126.72.220 12356 tcp tcpwrapped open
5663149.126.72.220 12357 tcp tcpwrapped open
5664149.126.72.220 12358 tcp tcpwrapped open
5665149.126.72.220 12359 tcp tcpwrapped open
5666149.126.72.220 12360 tcp tcpwrapped open
5667149.126.72.220 12361 tcp tcpwrapped open
5668149.126.72.220 12362 tcp tcpwrapped open
5669149.126.72.220 12363 tcp tcpwrapped open
5670149.126.72.220 12364 tcp tcpwrapped open
5671149.126.72.220 12365 tcp tcpwrapped open
5672149.126.72.220 12366 tcp tcpwrapped open
5673149.126.72.220 12367 tcp tcpwrapped open
5674149.126.72.220 12368 tcp tcpwrapped open
5675149.126.72.220 12369 tcp tcpwrapped open
5676149.126.72.220 12370 tcp tcpwrapped open
5677149.126.72.220 12371 tcp tcpwrapped open
5678149.126.72.220 12372 tcp tcpwrapped open
5679149.126.72.220 12373 tcp tcpwrapped open
5680149.126.72.220 12374 tcp tcpwrapped open
5681149.126.72.220 12375 tcp tcpwrapped open
5682149.126.72.220 12376 tcp tcpwrapped open
5683149.126.72.220 12377 tcp tcpwrapped open
5684149.126.72.220 12378 tcp tcpwrapped open
5685149.126.72.220 12379 tcp tcpwrapped open
5686149.126.72.220 12380 tcp tcpwrapped open
5687149.126.72.220 12381 tcp tcpwrapped open
5688149.126.72.220 12382 tcp tcpwrapped open
5689149.126.72.220 12383 tcp tcpwrapped open
5690149.126.72.220 12384 tcp tcpwrapped open
5691149.126.72.220 12385 tcp tcpwrapped open
5692149.126.72.220 12386 tcp tcpwrapped open
5693149.126.72.220 12387 tcp tcpwrapped open
5694149.126.72.220 12388 tcp tcpwrapped open
5695149.126.72.220 12389 tcp tcpwrapped open
5696149.126.72.220 12390 tcp tcpwrapped open
5697149.126.72.220 12391 tcp tcpwrapped open
5698149.126.72.220 12392 tcp tcpwrapped open
5699149.126.72.220 12393 tcp tcpwrapped open
5700149.126.72.220 12394 tcp tcpwrapped open
5701149.126.72.220 12395 tcp tcpwrapped open
5702149.126.72.220 12396 tcp tcpwrapped open
5703149.126.72.220 12397 tcp tcpwrapped open
5704149.126.72.220 12398 tcp tcpwrapped open
5705149.126.72.220 12399 tcp tcpwrapped open
5706149.126.72.220 12400 tcp tcpwrapped open
5707149.126.72.220 12401 tcp tcpwrapped open
5708149.126.72.220 12402 tcp tcpwrapped open
5709149.126.72.220 12403 tcp tcpwrapped open
5710149.126.72.220 12404 tcp tcpwrapped open
5711149.126.72.220 12405 tcp tcpwrapped open
5712149.126.72.220 12406 tcp tcpwrapped open
5713149.126.72.220 12407 tcp tcpwrapped open
5714149.126.72.220 12408 tcp tcpwrapped open
5715149.126.72.220 12409 tcp tcpwrapped open
5716149.126.72.220 12410 tcp tcpwrapped open
5717149.126.72.220 12411 tcp tcpwrapped open
5718149.126.72.220 12412 tcp tcpwrapped open
5719149.126.72.220 12413 tcp tcpwrapped open
5720149.126.72.220 12414 tcp tcpwrapped open
5721149.126.72.220 12415 tcp tcpwrapped open
5722149.126.72.220 12416 tcp tcpwrapped open
5723149.126.72.220 12417 tcp tcpwrapped open
5724149.126.72.220 12418 tcp tcpwrapped open
5725149.126.72.220 12419 tcp tcpwrapped open
5726149.126.72.220 12420 tcp tcpwrapped open
5727149.126.72.220 12421 tcp tcpwrapped open
5728149.126.72.220 12422 tcp tcpwrapped open
5729149.126.72.220 12423 tcp tcpwrapped open
5730149.126.72.220 12424 tcp tcpwrapped open
5731149.126.72.220 12425 tcp tcpwrapped open
5732149.126.72.220 12426 tcp tcpwrapped open
5733149.126.72.220 12427 tcp tcpwrapped open
5734149.126.72.220 12428 tcp tcpwrapped open
5735149.126.72.220 12429 tcp tcpwrapped open
5736149.126.72.220 12430 tcp tcpwrapped open
5737149.126.72.220 12431 tcp tcpwrapped open
5738149.126.72.220 12432 tcp tcpwrapped open
5739149.126.72.220 12433 tcp tcpwrapped open
5740149.126.72.220 12434 tcp tcpwrapped open
5741149.126.72.220 12435 tcp tcpwrapped open
5742149.126.72.220 12436 tcp tcpwrapped open
5743149.126.72.220 12437 tcp tcpwrapped open
5744149.126.72.220 12438 tcp tcpwrapped open
5745149.126.72.220 12439 tcp tcpwrapped open
5746149.126.72.220 12440 tcp tcpwrapped open
5747149.126.72.220 12441 tcp tcpwrapped open
5748149.126.72.220 12442 tcp tcpwrapped open
5749149.126.72.220 12443 tcp tcpwrapped open
5750149.126.72.220 12444 tcp tcpwrapped open
5751149.126.72.220 12445 tcp tcpwrapped open
5752149.126.72.220 12446 tcp tcpwrapped open
5753149.126.72.220 12447 tcp tcpwrapped open
5754149.126.72.220 12448 tcp tcpwrapped open
5755149.126.72.220 12449 tcp tcpwrapped open
5756149.126.72.220 12450 tcp tcpwrapped open
5757149.126.72.220 12451 tcp tcpwrapped open
5758149.126.72.220 12452 tcp tcpwrapped open
5759149.126.72.220 12453 tcp tcpwrapped open
5760149.126.72.220 12454 tcp tcpwrapped open
5761149.126.72.220 12455 tcp tcpwrapped open
5762149.126.72.220 12456 tcp tcpwrapped open
5763149.126.72.220 12457 tcp tcpwrapped open
5764149.126.72.220 12458 tcp tcpwrapped open
5765149.126.72.220 12459 tcp tcpwrapped open
5766149.126.72.220 12460 tcp tcpwrapped open
5767149.126.72.220 12461 tcp tcpwrapped open
5768149.126.72.220 12462 tcp tcpwrapped open
5769149.126.72.220 12463 tcp tcpwrapped open
5770149.126.72.220 12464 tcp tcpwrapped open
5771149.126.72.220 12465 tcp tcpwrapped open
5772149.126.72.220 12466 tcp tcpwrapped open
5773149.126.72.220 12467 tcp tcpwrapped open
5774149.126.72.220 12468 tcp tcpwrapped open
5775149.126.72.220 12469 tcp tcpwrapped open
5776149.126.72.220 12470 tcp tcpwrapped open
5777149.126.72.220 12471 tcp tcpwrapped open
5778149.126.72.220 12472 tcp tcpwrapped open
5779149.126.72.220 12473 tcp tcpwrapped open
5780149.126.72.220 12474 tcp tcpwrapped open
5781149.126.72.220 12475 tcp tcpwrapped open
5782149.126.72.220 12476 tcp tcpwrapped open
5783149.126.72.220 12477 tcp tcpwrapped open
5784149.126.72.220 12478 tcp tcpwrapped open
5785149.126.72.220 12479 tcp tcpwrapped open
5786149.126.72.220 12480 tcp tcpwrapped open
5787149.126.72.220 12481 tcp tcpwrapped open
5788149.126.72.220 12482 tcp tcpwrapped open
5789149.126.72.220 12483 tcp tcpwrapped open
5790149.126.72.220 12484 tcp tcpwrapped open
5791149.126.72.220 12485 tcp tcpwrapped open
5792149.126.72.220 12486 tcp tcpwrapped open
5793149.126.72.220 12487 tcp tcpwrapped open
5794149.126.72.220 12488 tcp tcpwrapped open
5795149.126.72.220 12489 tcp tcpwrapped open
5796149.126.72.220 12490 tcp tcpwrapped open
5797149.126.72.220 12491 tcp tcpwrapped open
5798149.126.72.220 12492 tcp tcpwrapped open
5799149.126.72.220 12493 tcp tcpwrapped open
5800149.126.72.220 12494 tcp tcpwrapped open
5801149.126.72.220 12495 tcp tcpwrapped open
5802149.126.72.220 12496 tcp tcpwrapped open
5803149.126.72.220 12497 tcp tcpwrapped open
5804149.126.72.220 12498 tcp tcpwrapped open
5805149.126.72.220 12499 tcp tcpwrapped open
5806149.126.72.220 12500 tcp tcpwrapped open
5807149.126.72.220 12501 tcp tcpwrapped open
5808149.126.72.220 12502 tcp tcpwrapped open
5809149.126.72.220 12503 tcp tcpwrapped open
5810149.126.72.220 12504 tcp tcpwrapped open
5811149.126.72.220 12505 tcp tcpwrapped open
5812149.126.72.220 12506 tcp tcpwrapped open
5813149.126.72.220 12507 tcp tcpwrapped open
5814149.126.72.220 12508 tcp tcpwrapped open
5815149.126.72.220 12509 tcp tcpwrapped open
5816149.126.72.220 12510 tcp tcpwrapped open
5817149.126.72.220 12511 tcp tcpwrapped open
5818149.126.72.220 12512 tcp tcpwrapped open
5819149.126.72.220 12513 tcp tcpwrapped open
5820149.126.72.220 12514 tcp tcpwrapped open
5821149.126.72.220 12515 tcp tcpwrapped open
5822149.126.72.220 12516 tcp tcpwrapped open
5823149.126.72.220 12517 tcp tcpwrapped open
5824149.126.72.220 12518 tcp tcpwrapped open
5825149.126.72.220 12519 tcp tcpwrapped open
5826149.126.72.220 12520 tcp tcpwrapped open
5827149.126.72.220 12521 tcp tcpwrapped open
5828149.126.72.220 12522 tcp tcpwrapped open
5829149.126.72.220 12523 tcp tcpwrapped open
5830149.126.72.220 12524 tcp tcpwrapped open
5831149.126.72.220 12525 tcp tcpwrapped open
5832149.126.72.220 12526 tcp tcpwrapped open
5833149.126.72.220 12527 tcp tcpwrapped open
5834149.126.72.220 12528 tcp tcpwrapped open
5835149.126.72.220 12529 tcp tcpwrapped open
5836149.126.72.220 12530 tcp tcpwrapped open
5837149.126.72.220 12531 tcp tcpwrapped open
5838149.126.72.220 12532 tcp tcpwrapped open
5839149.126.72.220 12533 tcp tcpwrapped open
5840149.126.72.220 12534 tcp tcpwrapped open
5841149.126.72.220 12535 tcp tcpwrapped open
5842149.126.72.220 12536 tcp tcpwrapped open
5843149.126.72.220 12537 tcp tcpwrapped open
5844149.126.72.220 12538 tcp tcpwrapped open
5845149.126.72.220 12539 tcp tcpwrapped open
5846149.126.72.220 12540 tcp tcpwrapped open
5847149.126.72.220 12541 tcp tcpwrapped open
5848149.126.72.220 12542 tcp tcpwrapped open
5849149.126.72.220 12543 tcp tcpwrapped open
5850149.126.72.220 12544 tcp tcpwrapped open
5851149.126.72.220 12545 tcp tcpwrapped open
5852149.126.72.220 12546 tcp tcpwrapped open
5853149.126.72.220 12547 tcp tcpwrapped open
5854149.126.72.220 12548 tcp tcpwrapped open
5855149.126.72.220 12549 tcp tcpwrapped open
5856149.126.72.220 12550 tcp tcpwrapped open
5857149.126.72.220 12551 tcp tcpwrapped open
5858149.126.72.220 12552 tcp tcpwrapped open
5859149.126.72.220 12553 tcp tcpwrapped open
5860149.126.72.220 12554 tcp tcpwrapped open
5861149.126.72.220 12555 tcp tcpwrapped open
5862149.126.72.220 12556 tcp tcpwrapped open
5863149.126.72.220 12557 tcp tcpwrapped open
5864149.126.72.220 12558 tcp tcpwrapped open
5865149.126.72.220 12559 tcp tcpwrapped open
5866149.126.72.220 12560 tcp tcpwrapped open
5867149.126.72.220 12561 tcp tcpwrapped open
5868149.126.72.220 12562 tcp tcpwrapped open
5869149.126.72.220 12563 tcp tcpwrapped open
5870149.126.72.220 12564 tcp tcpwrapped open
5871149.126.72.220 12565 tcp tcpwrapped open
5872149.126.72.220 12566 tcp tcpwrapped open
5873149.126.72.220 12567 tcp tcpwrapped open
5874149.126.72.220 12568 tcp tcpwrapped open
5875149.126.72.220 12569 tcp tcpwrapped open
5876149.126.72.220 12570 tcp tcpwrapped open
5877149.126.72.220 12571 tcp tcpwrapped open
5878149.126.72.220 12572 tcp tcpwrapped open
5879149.126.72.220 12573 tcp tcpwrapped open
5880149.126.72.220 12574 tcp tcpwrapped open
5881149.126.72.220 12575 tcp tcpwrapped open
5882149.126.72.220 12576 tcp tcpwrapped open
5883149.126.72.220 12577 tcp tcpwrapped open
5884149.126.72.220 12578 tcp tcpwrapped open
5885149.126.72.220 12579 tcp tcpwrapped open
5886149.126.72.220 12580 tcp tcpwrapped open
5887149.126.72.220 12581 tcp tcpwrapped open
5888149.126.72.220 12582 tcp tcpwrapped open
5889149.126.72.220 12583 tcp tcpwrapped open
5890149.126.72.220 12584 tcp tcpwrapped open
5891149.126.72.220 12585 tcp tcpwrapped open
5892149.126.72.220 12586 tcp tcpwrapped open
5893149.126.72.220 12587 tcp tcpwrapped open
5894149.126.72.220 12588 tcp tcpwrapped open
5895149.126.72.220 12589 tcp tcpwrapped open
5896149.126.72.220 12590 tcp tcpwrapped open
5897149.126.72.220 13082 tcp tcpwrapped open
5898149.126.72.220 13084 tcp tcpwrapped open
5899149.126.72.220 13333 tcp tcpwrapped open
5900149.126.72.220 13443 tcp tcpwrapped open
5901149.126.72.220 14006 tcp tcpwrapped open
5902149.126.72.220 14082 tcp tcpwrapped open
5903149.126.72.220 14084 tcp tcpwrapped open
5904149.126.72.220 14104 tcp tcpwrapped open
5905149.126.72.220 14130 tcp tcpwrapped open
5906149.126.72.220 14182 tcp tcpwrapped open
5907149.126.72.220 14184 tcp tcpwrapped open
5908149.126.72.220 14330 tcp tcpwrapped open
5909149.126.72.220 14443 tcp tcpwrapped open
5910149.126.72.220 14825 tcp tcpwrapped open
5911149.126.72.220 15002 tcp tcpwrapped open
5912149.126.72.220 15006 tcp tcpwrapped open
5913149.126.72.220 15082 tcp tcpwrapped open
5914149.126.72.220 15084 tcp tcpwrapped open
5915149.126.72.220 15151 tcp tcpwrapped open
5916149.126.72.220 15555 tcp tcpwrapped open
5917149.126.72.220 16000 tcp tcpwrapped open
5918149.126.72.220 16001 tcp tcpwrapped open
5919149.126.72.220 16015 tcp tcpwrapped open
5920149.126.72.220 16016 tcp tcpwrapped open
5921149.126.72.220 16017 tcp tcpwrapped open
5922149.126.72.220 16082 tcp tcpwrapped open
5923149.126.72.220 16084 tcp tcpwrapped open
5924149.126.72.220 16311 tcp tcpwrapped open
5925149.126.72.220 16316 tcp tcpwrapped open
5926149.126.72.220 16443 tcp tcpwrapped open
5927149.126.72.220 16800 tcp tcpwrapped open
5928149.126.72.220 16888 tcp tcpwrapped open
5929149.126.72.220 17082 tcp tcpwrapped open
5930149.126.72.220 17084 tcp tcpwrapped open
5931149.126.72.220 17182 tcp tcpwrapped open
5932149.126.72.220 17184 tcp tcpwrapped open
5933149.126.72.220 17770 tcp tcpwrapped open
5934149.126.72.220 17771 tcp tcpwrapped open
5935149.126.72.220 17772 tcp tcpwrapped open
5936149.126.72.220 17773 tcp tcpwrapped open
5937149.126.72.220 17774 tcp tcpwrapped open
5938149.126.72.220 17775 tcp tcpwrapped open
5939149.126.72.220 17776 tcp tcpwrapped open
5940149.126.72.220 17777 tcp tcpwrapped open
5941149.126.72.220 17778 tcp tcpwrapped open
5942149.126.72.220 17779 tcp tcpwrapped open
5943149.126.72.220 17780 tcp tcpwrapped open
5944149.126.72.220 18000 tcp tcpwrapped open
5945149.126.72.220 18001 tcp tcpwrapped open
5946149.126.72.220 18002 tcp tcpwrapped open
5947149.126.72.220 18003 tcp tcpwrapped open
5948149.126.72.220 18004 tcp tcpwrapped open
5949149.126.72.220 18005 tcp tcpwrapped open
5950149.126.72.220 18006 tcp tcpwrapped open
5951149.126.72.220 18007 tcp tcpwrapped open
5952149.126.72.220 18008 tcp tcpwrapped open
5953149.126.72.220 18009 tcp tcpwrapped open
5954149.126.72.220 18010 tcp tcpwrapped open
5955149.126.72.220 18011 tcp tcpwrapped open
5956149.126.72.220 18012 tcp tcpwrapped open
5957149.126.72.220 18013 tcp tcpwrapped open
5958149.126.72.220 18014 tcp tcpwrapped open
5959149.126.72.220 18015 tcp tcpwrapped open
5960149.126.72.220 18016 tcp tcpwrapped open
5961149.126.72.220 18017 tcp tcpwrapped open
5962149.126.72.220 18018 tcp tcpwrapped open
5963149.126.72.220 18019 tcp tcpwrapped open
5964149.126.72.220 18020 tcp tcpwrapped open
5965149.126.72.220 18021 tcp tcpwrapped open
5966149.126.72.220 18022 tcp tcpwrapped open
5967149.126.72.220 18023 tcp tcpwrapped open
5968149.126.72.220 18024 tcp tcpwrapped open
5969149.126.72.220 18025 tcp tcpwrapped open
5970149.126.72.220 18026 tcp tcpwrapped open
5971149.126.72.220 18027 tcp tcpwrapped open
5972149.126.72.220 18028 tcp tcpwrapped open
5973149.126.72.220 18029 tcp tcpwrapped open
5974149.126.72.220 18030 tcp tcpwrapped open
5975149.126.72.220 18031 tcp tcpwrapped open
5976149.126.72.220 18032 tcp tcpwrapped open
5977149.126.72.220 18033 tcp tcpwrapped open
5978149.126.72.220 18034 tcp tcpwrapped open
5979149.126.72.220 18035 tcp tcpwrapped open
5980149.126.72.220 18036 tcp tcpwrapped open
5981149.126.72.220 18037 tcp tcpwrapped open
5982149.126.72.220 18038 tcp tcpwrapped open
5983149.126.72.220 18039 tcp tcpwrapped open
5984149.126.72.220 18040 tcp tcpwrapped open
5985149.126.72.220 18041 tcp tcpwrapped open
5986149.126.72.220 18042 tcp tcpwrapped open
5987149.126.72.220 18043 tcp tcpwrapped open
5988149.126.72.220 18044 tcp tcpwrapped open
5989149.126.72.220 18045 tcp tcpwrapped open
5990149.126.72.220 18046 tcp tcpwrapped open
5991149.126.72.220 18047 tcp tcpwrapped open
5992149.126.72.220 18048 tcp tcpwrapped open
5993149.126.72.220 18049 tcp tcpwrapped open
5994149.126.72.220 18050 tcp tcpwrapped open
5995149.126.72.220 18051 tcp tcpwrapped open
5996149.126.72.220 18052 tcp tcpwrapped open
5997149.126.72.220 18053 tcp tcpwrapped open
5998149.126.72.220 18054 tcp tcpwrapped open
5999149.126.72.220 18055 tcp tcpwrapped open
6000149.126.72.220 18056 tcp tcpwrapped open
6001149.126.72.220 18057 tcp tcpwrapped open
6002149.126.72.220 18058 tcp tcpwrapped open
6003149.126.72.220 18059 tcp tcpwrapped open
6004149.126.72.220 18060 tcp tcpwrapped open
6005149.126.72.220 18061 tcp tcpwrapped open
6006149.126.72.220 18062 tcp tcpwrapped open
6007149.126.72.220 18063 tcp tcpwrapped open
6008149.126.72.220 18064 tcp tcpwrapped open
6009149.126.72.220 18065 tcp tcpwrapped open
6010149.126.72.220 18066 tcp tcpwrapped open
6011149.126.72.220 18067 tcp tcpwrapped open
6012149.126.72.220 18068 tcp tcpwrapped open
6013149.126.72.220 18069 tcp tcpwrapped open
6014149.126.72.220 18070 tcp tcpwrapped open
6015149.126.72.220 18071 tcp tcpwrapped open
6016149.126.72.220 18072 tcp tcpwrapped open
6017149.126.72.220 18073 tcp tcpwrapped open
6018149.126.72.220 18074 tcp tcpwrapped open
6019149.126.72.220 18075 tcp tcpwrapped open
6020149.126.72.220 18076 tcp tcpwrapped open
6021149.126.72.220 18077 tcp tcpwrapped open
6022149.126.72.220 18078 tcp tcpwrapped open
6023149.126.72.220 18079 tcp tcpwrapped open
6024149.126.72.220 18080 tcp tcpwrapped open
6025149.126.72.220 18081 tcp tcpwrapped open
6026149.126.72.220 18082 tcp tcpwrapped open
6027149.126.72.220 18083 tcp tcpwrapped open
6028149.126.72.220 18084 tcp tcpwrapped open
6029149.126.72.220 18085 tcp tcpwrapped open
6030149.126.72.220 18086 tcp tcpwrapped open
6031149.126.72.220 18087 tcp tcpwrapped open
6032149.126.72.220 18088 tcp tcpwrapped open
6033149.126.72.220 18089 tcp tcpwrapped open
6034149.126.72.220 18090 tcp tcpwrapped open
6035149.126.72.220 18091 tcp tcpwrapped open
6036149.126.72.220 18092 tcp tcpwrapped open
6037149.126.72.220 18093 tcp tcpwrapped open
6038149.126.72.220 18094 tcp tcpwrapped open
6039149.126.72.220 18095 tcp tcpwrapped open
6040149.126.72.220 18096 tcp tcpwrapped open
6041149.126.72.220 18097 tcp tcpwrapped open
6042149.126.72.220 18098 tcp tcpwrapped open
6043149.126.72.220 18099 tcp tcpwrapped open
6044149.126.72.220 18100 tcp tcpwrapped open
6045149.126.72.220 18101 tcp tcpwrapped open
6046149.126.72.220 18102 tcp tcpwrapped open
6047149.126.72.220 18103 tcp tcpwrapped open
6048149.126.72.220 18104 tcp tcpwrapped open
6049149.126.72.220 18105 tcp tcpwrapped open
6050149.126.72.220 18106 tcp tcpwrapped open
6051149.126.72.220 18107 tcp tcpwrapped open
6052149.126.72.220 18108 tcp tcpwrapped open
6053149.126.72.220 18109 tcp tcpwrapped open
6054149.126.72.220 18110 tcp tcpwrapped open
6055149.126.72.220 18111 tcp tcpwrapped open
6056149.126.72.220 18112 tcp tcpwrapped open
6057149.126.72.220 18113 tcp tcpwrapped open
6058149.126.72.220 18200 tcp tcpwrapped open
6059149.126.72.220 18239 tcp tcpwrapped open
6060149.126.72.220 18443 tcp tcpwrapped open
6061149.126.72.220 18802 tcp tcpwrapped open
6062149.126.72.220 19013 tcp tcpwrapped open
6063149.126.72.220 19014 tcp tcpwrapped open
6064149.126.72.220 19015 tcp tcpwrapped open
6065149.126.72.220 19016 tcp tcpwrapped open
6066149.126.72.220 19017 tcp tcpwrapped open
6067149.126.72.220 19022 tcp tcpwrapped open
6068149.126.72.220 19080 tcp tcpwrapped open
6069149.126.72.220 19082 tcp tcpwrapped open
6070149.126.72.220 19084 tcp tcpwrapped open
6071149.126.72.220 19443 tcp tcpwrapped open
6072149.126.72.220 20000 tcp tcpwrapped open
6073149.126.72.220 20001 tcp tcpwrapped open
6074149.126.72.220 20010 tcp tcpwrapped open
6075149.126.72.220 20020 tcp tcpwrapped open
6076149.126.72.220 20030 tcp tcpwrapped open
6077149.126.72.220 20040 tcp tcpwrapped open
6078149.126.72.220 20050 tcp tcpwrapped open
6079149.126.72.220 20053 tcp tcpwrapped open
6080149.126.72.220 20060 tcp tcpwrapped open
6081149.126.72.220 20070 tcp tcpwrapped open
6082149.126.72.220 20080 tcp tcpwrapped open
6083149.126.72.220 20082 tcp tcpwrapped open
6084149.126.72.220 20084 tcp tcpwrapped open
6085149.126.72.220 20090 tcp tcpwrapped open
6086149.126.72.220 20100 tcp tcpwrapped open
6087149.126.72.220 20106 tcp tcpwrapped open
6088149.126.72.220 20107 tcp tcpwrapped open
6089149.126.72.220 20110 tcp tcpwrapped open
6090149.126.72.220 20150 tcp tcpwrapped open
6091149.126.72.220 20182 tcp tcpwrapped open
6092149.126.72.220 20184 tcp tcpwrapped open
6093149.126.72.220 20185 tcp tcpwrapped open
6094149.126.72.220 20200 tcp tcpwrapped open
6095149.126.72.220 20208 tcp tcpwrapped open
6096149.126.72.220 20325 tcp tcpwrapped open
6097149.126.72.220 20500 tcp tcpwrapped open
6098149.126.72.220 20512 tcp tcpwrapped open
6099149.126.72.220 20600 tcp tcpwrapped open
6100149.126.72.220 20800 tcp tcpwrapped open
6101149.126.72.220 20892 tcp tcpwrapped open
6102149.126.72.220 20894 tcp tcpwrapped open
6103149.126.72.220 20900 tcp tcpwrapped open
6104149.126.72.220 21081 tcp tcpwrapped open
6105149.126.72.220 21082 tcp tcpwrapped open
6106149.126.72.220 21083 tcp tcpwrapped open
6107149.126.72.220 21084 tcp tcpwrapped open
6108149.126.72.220 21100 tcp tcpwrapped open
6109149.126.72.220 21200 tcp tcpwrapped open
6110149.126.72.220 21300 tcp tcpwrapped open
6111149.126.72.220 21357 tcp tcpwrapped open
6112149.126.72.220 21381 tcp tcpwrapped open
6113149.126.72.220 21400 tcp tcpwrapped open
6114149.126.72.220 21500 tcp tcpwrapped open
6115149.126.72.220 21935 tcp tcpwrapped open
6116149.126.72.220 22082 tcp tcpwrapped open
6117149.126.72.220 22084 tcp tcpwrapped open
6118149.126.72.220 22103 tcp tcpwrapped open
6119149.126.72.220 22107 tcp tcpwrapped open
6120149.126.72.220 22206 tcp tcpwrapped open
6121149.126.72.220 22345 tcp tcpwrapped open
6122149.126.72.220 22403 tcp tcpwrapped open
6123149.126.72.220 22609 tcp tcpwrapped open
6124149.126.72.220 22703 tcp tcpwrapped open
6125149.126.72.220 22705 tcp tcpwrapped open
6126149.126.72.220 23082 tcp tcpwrapped open
6127149.126.72.220 23084 tcp tcpwrapped open
6128149.126.72.220 23182 tcp tcpwrapped open
6129149.126.72.220 23184 tcp tcpwrapped open
6130149.126.72.220 24082 tcp tcpwrapped open
6131149.126.72.220 24084 tcp tcpwrapped open
6132149.126.72.220 24472 tcp tcpwrapped open
6133149.126.72.220 24510 tcp tcpwrapped open
6134149.126.72.220 25000 tcp tcpwrapped open
6135149.126.72.220 25001 tcp tcpwrapped open
6136149.126.72.220 25002 tcp tcpwrapped open
6137149.126.72.220 25003 tcp tcpwrapped open
6138149.126.72.220 25004 tcp tcpwrapped open
6139149.126.72.220 25005 tcp tcpwrapped open
6140149.126.72.220 25006 tcp tcpwrapped open
6141149.126.72.220 25007 tcp tcpwrapped open
6142149.126.72.220 25008 tcp tcpwrapped open
6143149.126.72.220 25009 tcp tcpwrapped open
6144149.126.72.220 25010 tcp tcpwrapped open
6145149.126.72.220 25082 tcp tcpwrapped open
6146149.126.72.220 25084 tcp tcpwrapped open
6147149.126.72.220 25782 tcp tcpwrapped open
6148149.126.72.220 25952 tcp tcpwrapped open
6149149.126.72.220 27571 tcp tcpwrapped open
6150149.126.72.220 28001 tcp tcpwrapped open
6151149.126.72.220 28080 tcp tcpwrapped open
6152149.126.72.220 28818 tcp tcpwrapped open
6153149.126.72.220 29798 tcp tcpwrapped open
6154149.126.72.220 29799 tcp tcpwrapped open
6155149.126.72.220 30000 tcp tcpwrapped open
6156149.126.72.220 30001 tcp tcpwrapped open
6157149.126.72.220 30003 tcp tcpwrapped open
6158149.126.72.220 30005 tcp tcpwrapped open
6159149.126.72.220 30007 tcp tcpwrapped open
6160149.126.72.220 30009 tcp tcpwrapped open
6161149.126.72.220 30011 tcp tcpwrapped open
6162149.126.72.220 30013 tcp tcpwrapped open
6163149.126.72.220 30015 tcp tcpwrapped open
6164149.126.72.220 30017 tcp tcpwrapped open
6165149.126.72.220 30019 tcp tcpwrapped open
6166149.126.72.220 30021 tcp tcpwrapped open
6167149.126.72.220 30050 tcp tcpwrapped open
6168149.126.72.220 30106 tcp tcpwrapped open
6169149.126.72.220 30110 tcp tcpwrapped open
6170149.126.72.220 30111 tcp tcpwrapped open
6171149.126.72.220 30112 tcp tcpwrapped open
6172149.126.72.220 30113 tcp tcpwrapped open
6173149.126.72.220 30120 tcp tcpwrapped open
6174149.126.72.220 30121 tcp tcpwrapped open
6175149.126.72.220 30122 tcp tcpwrapped open
6176149.126.72.220 30123 tcp tcpwrapped open
6177149.126.72.220 30452 tcp tcpwrapped open
6178149.126.72.220 30468 tcp tcpwrapped open
6179149.126.72.220 30473 tcp tcpwrapped open
6180149.126.72.220 30479 tcp tcpwrapped open
6181149.126.72.220 30501 tcp tcpwrapped open
6182149.126.72.220 30700 tcp tcpwrapped open
6183149.126.72.220 30701 tcp tcpwrapped open
6184149.126.72.220 30892 tcp tcpwrapped open
6185149.126.72.220 30894 tcp tcpwrapped open
6186149.126.72.220 31337 tcp tcpwrapped open
6187149.126.72.220 32101 tcp tcpwrapped open
6188149.126.72.220 32102 tcp tcpwrapped open
6189149.126.72.220 32202 tcp tcpwrapped open
6190149.126.72.220 32303 tcp tcpwrapped open
6191149.126.72.220 32443 tcp tcpwrapped open
6192149.126.72.220 32444 tcp tcpwrapped open
6193149.126.72.220 32746 tcp tcpwrapped open
6194149.126.72.220 32800 tcp tcpwrapped open
6195149.126.72.220 34225 tcp tcpwrapped open
6196149.126.72.220 34500 tcp tcpwrapped open
6197149.126.72.220 35522 tcp tcpwrapped open
6198149.126.72.220 35524 tcp tcpwrapped open
6199149.126.72.220 35531 tcp tcpwrapped open
6200149.126.72.220 35554 tcp tcpwrapped open
6201149.126.72.220 35559 tcp tcpwrapped open
6202149.126.72.220 35560 tcp tcpwrapped open
6203149.126.72.220 36982 tcp tcpwrapped open
6204149.126.72.220 36983 tcp tcpwrapped open
6205149.126.72.220 36984 tcp tcpwrapped open
6206149.126.72.220 37080 tcp tcpwrapped open
6207149.126.72.220 38880 tcp tcpwrapped open
6208149.126.72.220 39001 tcp tcpwrapped open
6209149.126.72.220 40070 tcp tcpwrapped open
6210149.126.72.220 40099 tcp tcpwrapped open
6211149.126.72.220 40892 tcp tcpwrapped open
6212149.126.72.220 40894 tcp tcpwrapped open
6213149.126.72.220 42208 tcp tcpwrapped open
6214149.126.72.220 42424 tcp tcpwrapped open
6215149.126.72.220 42901 tcp tcpwrapped open
6216149.126.72.220 43008 tcp tcpwrapped open
6217149.126.72.220 43009 tcp tcpwrapped open
6218149.126.72.220 43200 tcp tcpwrapped open
6219149.126.72.220 44100 tcp tcpwrapped open
6220149.126.72.220 44300 tcp tcpwrapped open
6221149.126.72.220 44301 tcp tcpwrapped open
6222149.126.72.220 44302 tcp tcpwrapped open
6223149.126.72.220 44303 tcp tcpwrapped open
6224149.126.72.220 44304 tcp tcpwrapped open
6225149.126.72.220 44305 tcp tcpwrapped open
6226149.126.72.220 44306 tcp tcpwrapped open
6227149.126.72.220 44307 tcp tcpwrapped open
6228149.126.72.220 44308 tcp tcpwrapped open
6229149.126.72.220 44309 tcp tcpwrapped open
6230149.126.72.220 44310 tcp tcpwrapped open
6231149.126.72.220 44320 tcp tcpwrapped open
6232149.126.72.220 44332 tcp tcpwrapped open
6233149.126.72.220 44333 tcp tcpwrapped open
6234149.126.72.220 44334 tcp tcpwrapped open
6235149.126.72.220 44336 tcp tcpwrapped open
6236149.126.72.220 44337 tcp tcpwrapped open
6237149.126.72.220 44340 tcp tcpwrapped open
6238149.126.72.220 44341 tcp tcpwrapped open
6239149.126.72.220 44345 tcp tcpwrapped open
6240149.126.72.220 44400 tcp tcpwrapped open
6241149.126.72.220 44410 tcp tcpwrapped open
6242149.126.72.220 44420 tcp tcpwrapped open
6243149.126.72.220 45000 tcp tcpwrapped open
6244149.126.72.220 45555 tcp tcpwrapped open
6245149.126.72.220 45666 tcp tcpwrapped open
6246149.126.72.220 45667 tcp tcpwrapped open
6247149.126.72.220 45668 tcp tcpwrapped open
6248149.126.72.220 45677 tcp tcpwrapped open
6249149.126.72.220 45777 tcp tcpwrapped open
6250149.126.72.220 45788 tcp tcpwrapped open
6251149.126.72.220 45821 tcp tcpwrapped open
6252149.126.72.220 45886 tcp tcpwrapped open
6253149.126.72.220 45888 tcp tcpwrapped open
6254149.126.72.220 46000 tcp tcpwrapped open
6255149.126.72.220 46443 tcp tcpwrapped open
6256149.126.72.220 46862 tcp tcpwrapped open
6257149.126.72.220 47000 tcp tcpwrapped open
6258149.126.72.220 47080 tcp tcpwrapped open
6259149.126.72.220 47534 tcp tcpwrapped open
6260149.126.72.220 48888 tcp tcpwrapped open
6261149.126.72.220 48889 tcp tcpwrapped open
6262149.126.72.220 49200 tcp tcpwrapped open
6263149.126.72.220 49210 tcp tcpwrapped open
6264149.126.72.220 49443 tcp tcpwrapped open
6265149.126.72.220 49682 tcp tcpwrapped open
6266149.126.72.220 49684 tcp tcpwrapped open
6267149.126.72.220 49686 tcp tcpwrapped open
6268149.126.72.220 49688 tcp tcpwrapped open
6269149.126.72.220 49690 tcp tcpwrapped open
6270149.126.72.220 49692 tcp tcpwrapped open
6271149.126.72.220 49694 tcp tcpwrapped open
6272149.126.72.220 50000 tcp tcpwrapped open
6273149.126.72.220 50001 tcp tcpwrapped open
6274149.126.72.220 50042 tcp tcpwrapped open
6275149.126.72.220 50050 tcp tcpwrapped open
6276149.126.72.220 50073 tcp tcpwrapped open
6277149.126.72.220 50085 tcp tcpwrapped open
6278149.126.72.220 50101 tcp tcpwrapped open
6279149.126.72.220 50102 tcp tcpwrapped open
6280149.126.72.220 50103 tcp tcpwrapped open
6281149.126.72.220 50104 tcp tcpwrapped open
6282149.126.72.220 50105 tcp tcpwrapped open
6283149.126.72.220 50106 tcp tcpwrapped open
6284149.126.72.220 50107 tcp tcpwrapped open
6285149.126.72.220 50112 tcp tcpwrapped open
6286149.126.72.220 50113 tcp tcpwrapped open
6287149.126.72.220 50122 tcp tcpwrapped open
6288149.126.72.220 50160 tcp tcpwrapped open
6289149.126.72.220 50443 tcp tcpwrapped open
6290149.126.72.220 51002 tcp tcpwrapped open
6291149.126.72.220 51003 tcp tcpwrapped open
6292149.126.72.220 51434 tcp tcpwrapped open
6293149.126.72.220 52010 tcp tcpwrapped open
6294149.126.72.220 52230 tcp tcpwrapped open
6295149.126.72.220 52311 tcp tcpwrapped open
6296149.126.72.220 52536 tcp tcpwrapped open
6297149.126.72.220 53480 tcp tcpwrapped open
6298149.126.72.220 53481 tcp tcpwrapped open
6299149.126.72.220 53482 tcp tcpwrapped open
6300149.126.72.220 53483 tcp tcpwrapped open
6301149.126.72.220 53484 tcp tcpwrapped open
6302149.126.72.220 53485 tcp tcpwrapped open
6303149.126.72.220 53490 tcp tcpwrapped open
6304149.126.72.220 53805 tcp tcpwrapped open
6305149.126.72.220 53806 tcp tcpwrapped open
6306149.126.72.220 54327 tcp tcpwrapped open
6307149.126.72.220 54490 tcp tcpwrapped open
6308149.126.72.220 54545 tcp tcpwrapped open
6309149.126.72.220 55055 tcp tcpwrapped open
6310149.126.72.220 55080 tcp tcpwrapped open
6311149.126.72.220 55081 tcp tcpwrapped open
6312149.126.72.220 55350 tcp tcpwrapped open
6313149.126.72.220 55388 tcp tcpwrapped open
6314149.126.72.220 55470 tcp tcpwrapped open
6315149.126.72.220 55475 tcp tcpwrapped open
6316149.126.72.220 55481 tcp tcpwrapped open
6317149.126.72.220 55490 tcp tcpwrapped open
6318149.126.72.220 57778 tcp tcpwrapped open
6319149.126.72.220 57779 tcp tcpwrapped open
6320149.126.72.220 57780 tcp tcpwrapped open
6321149.126.72.220 57781 tcp tcpwrapped open
6322149.126.72.220 57782 tcp tcpwrapped open
6323149.126.72.220 57783 tcp tcpwrapped open
6324149.126.72.220 57784 tcp tcpwrapped open
6325149.126.72.220 57785 tcp tcpwrapped open
6326149.126.72.220 57786 tcp tcpwrapped open
6327149.126.72.220 57787 tcp tcpwrapped open
6328149.126.72.220 57788 tcp tcpwrapped open
6329149.126.72.220 58443 tcp tcpwrapped open
6330149.126.72.220 58585 tcp tcpwrapped open
6331149.126.72.220 59012 tcp tcpwrapped open
6332149.126.72.220 59443 tcp tcpwrapped open
6333149.126.72.220 60021 tcp tcpwrapped open
6334149.126.72.220 60023 tcp tcpwrapped open
6335149.126.72.220 60443 tcp tcpwrapped open
6336149.126.72.220 62080 tcp tcpwrapped open
6337149.126.72.220 62237 tcp tcpwrapped open
6338149.126.72.220 62443 tcp tcpwrapped open
6339149.126.72.220 62865 tcp tcpwrapped open
6340149.126.72.220 63443 tcp tcpwrapped open
6341149.126.72.220 64477 tcp tcpwrapped open
6342149.126.72.220 64671 tcp tcpwrapped open
6343151.106.38.107 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 12:11. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
6344151.106.38.107 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
6345151.106.38.107 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
6346151.106.38.107 67 tcp dhcps filtered
6347151.106.38.107 67 udp dhcps unknown
6348151.106.38.107 68 tcp dhcpc filtered
6349151.106.38.107 68 udp dhcpc unknown
6350151.106.38.107 69 tcp tftp filtered
6351151.106.38.107 69 udp tftp unknown
6352151.106.38.107 88 tcp kerberos-sec filtered
6353151.106.38.107 88 udp kerberos-sec unknown
6354151.106.38.107 123 tcp ntp filtered
6355151.106.38.107 123 udp ntp unknown
6356151.106.38.107 137 tcp netbios-ns filtered
6357151.106.38.107 137 udp netbios-ns unknown
6358151.106.38.107 138 tcp netbios-dgm filtered
6359151.106.38.107 138 udp netbios-dgm unknown
6360151.106.38.107 139 tcp netbios-ssn filtered
6361151.106.38.107 139 udp netbios-ssn unknown
6362151.106.38.107 161 tcp snmp filtered
6363151.106.38.107 161 udp snmp unknown
6364151.106.38.107 162 tcp snmptrap filtered
6365151.106.38.107 162 udp snmptrap unknown
6366151.106.38.107 389 tcp ldap filtered
6367151.106.38.107 389 udp ldap unknown
6368151.106.38.107 520 tcp efs filtered
6369151.106.38.107 520 udp route unknown
6370151.106.38.107 2049 tcp nfs filtered
6371151.106.38.107 2049 udp nfs unknown
6372158.69.13.254 22 tcp ssh open OpenSSH 7.4 protocol 2.0
6373158.69.13.254 25 tcp smtp open Exim smtpd 4.92.3
6374158.69.13.254 53 tcp domain open unknown banner: get lost
6375158.69.13.254 53 udp domain open unknown banner: get lost
6376158.69.13.254 67 tcp dhcps filtered
6377158.69.13.254 67 udp dhcps unknown
6378158.69.13.254 68 tcp dhcpc filtered
6379158.69.13.254 68 udp dhcpc unknown
6380158.69.13.254 69 tcp tftp filtered
6381158.69.13.254 69 udp tftp unknown
6382158.69.13.254 80 tcp http open nginx
6383158.69.13.254 88 tcp kerberos-sec filtered
6384158.69.13.254 88 udp kerberos-sec unknown
6385158.69.13.254 123 tcp ntp filtered
6386158.69.13.254 123 udp ntp unknown
6387158.69.13.254 137 tcp netbios-ns filtered
6388158.69.13.254 137 udp netbios-ns unknown
6389158.69.13.254 138 tcp netbios-dgm filtered
6390158.69.13.254 138 udp netbios-dgm unknown
6391158.69.13.254 139 tcp netbios-ssn filtered
6392158.69.13.254 139 udp netbios-ssn unknown
6393158.69.13.254 161 tcp snmp filtered
6394158.69.13.254 161 udp snmp unknown
6395158.69.13.254 162 tcp snmptrap filtered
6396158.69.13.254 162 udp snmptrap unknown
6397158.69.13.254 389 tcp ldap filtered
6398158.69.13.254 389 udp ldap unknown
6399158.69.13.254 443 tcp ssl/http open nginx
6400158.69.13.254 465 tcp ssl/smtp open Exim smtpd 4.92.3
6401158.69.13.254 520 tcp efs filtered
6402158.69.13.254 520 udp route unknown
6403158.69.13.254 587 tcp smtp open Exim smtpd 4.92.3
6404158.69.13.254 2049 tcp nfs filtered
6405158.69.13.254 2049 udp nfs unknown
6406158.69.13.254 2525 tcp smtp open Exim smtpd 4.92.3
6407158.69.13.254 3306 tcp mysql open MySQL blocked - too many connection errors
6408162.244.35.13 22 tcp ssh open SSH-2.0-OpenSSH_7.2 FreeBSD-20160310
6409162.244.35.13 25 tcp open
6410162.244.35.13 53 tcp domain open ISC BIND 9.10.6
6411162.244.35.13 53 udp domain open ISC BIND 9.10.6
6412162.244.35.13 67 tcp dhcps closed
6413162.244.35.13 67 udp dhcps closed
6414162.244.35.13 68 tcp dhcpc closed
6415162.244.35.13 68 udp dhcpc closed
6416162.244.35.13 69 tcp tftp closed
6417162.244.35.13 69 udp tftp closed
6418162.244.35.13 88 tcp kerberos-sec closed
6419162.244.35.13 88 udp kerberos-sec closed
6420162.244.35.13 123 tcp ntp closed
6421162.244.35.13 123 udp ntp closed
6422162.244.35.13 137 tcp netbios-ns filtered
6423162.244.35.13 137 udp netbios-ns unknown
6424162.244.35.13 138 tcp netbios-dgm filtered
6425162.244.35.13 138 udp netbios-dgm unknown
6426162.244.35.13 139 tcp netbios-ssn filtered
6427162.244.35.13 139 udp netbios-ssn unknown
6428162.244.35.13 161 tcp snmp closed
6429162.244.35.13 161 udp snmp closed
6430162.244.35.13 162 tcp snmptrap closed
6431162.244.35.13 162 udp snmptrap closed
6432162.244.35.13 389 tcp ldap closed
6433162.244.35.13 389 udp ldap closed
6434162.244.35.13 520 tcp efs closed
6435162.244.35.13 520 udp route closed
6436162.244.35.13 2049 tcp nfs closed
6437162.244.35.13 2049 udp nfs closed
6438163.247.48.46 53 tcp domain filtered
6439163.247.48.46 53 udp domain unknown
6440163.247.48.46 67 tcp dhcps filtered
6441163.247.48.46 67 udp dhcps unknown
6442163.247.48.46 68 tcp dhcpc filtered
6443163.247.48.46 68 udp dhcpc unknown
6444163.247.48.46 69 tcp tftp filtered
6445163.247.48.46 69 udp tftp unknown
6446163.247.48.46 88 tcp kerberos-sec filtered
6447163.247.48.46 88 udp kerberos-sec unknown
6448163.247.48.46 123 tcp ntp filtered
6449163.247.48.46 123 udp ntp unknown
6450163.247.48.46 137 tcp netbios-ns filtered
6451163.247.48.46 137 udp netbios-ns unknown
6452163.247.48.46 138 tcp netbios-dgm filtered
6453163.247.48.46 138 udp netbios-dgm unknown
6454163.247.48.46 139 tcp netbios-ssn filtered
6455163.247.48.46 139 udp netbios-ssn unknown
6456163.247.48.46 161 tcp snmp filtered
6457163.247.48.46 161 udp snmp unknown
6458163.247.48.46 162 tcp snmptrap filtered
6459163.247.48.46 162 udp snmptrap unknown
6460163.247.48.46 389 tcp ldap filtered
6461163.247.48.46 389 udp ldap unknown
6462163.247.48.46 520 tcp efs filtered
6463163.247.48.46 520 udp route unknown
6464163.247.48.46 2049 tcp nfs filtered
6465163.247.48.46 2049 udp nfs unknown
6466163.247.127.20 53 tcp domain filtered
6467163.247.127.20 53 udp domain unknown
6468163.247.127.20 67 tcp dhcps filtered
6469163.247.127.20 67 udp dhcps unknown
6470163.247.127.20 68 tcp dhcpc filtered
6471163.247.127.20 68 udp dhcpc unknown
6472163.247.127.20 69 tcp tftp filtered
6473163.247.127.20 69 udp tftp unknown
6474163.247.127.20 88 tcp kerberos-sec filtered
6475163.247.127.20 88 udp kerberos-sec unknown
6476163.247.127.20 123 tcp ntp filtered
6477163.247.127.20 123 udp ntp unknown
6478163.247.127.20 137 tcp netbios-ns filtered
6479163.247.127.20 137 udp netbios-ns unknown
6480163.247.127.20 138 tcp netbios-dgm filtered
6481163.247.127.20 138 udp netbios-dgm unknown
6482163.247.127.20 139 tcp netbios-ssn filtered
6483163.247.127.20 139 udp netbios-ssn unknown
6484163.247.127.20 161 tcp snmp filtered
6485163.247.127.20 161 udp snmp unknown
6486163.247.127.20 162 tcp snmptrap filtered
6487163.247.127.20 162 udp snmptrap unknown
6488163.247.127.20 389 tcp ldap filtered
6489163.247.127.20 389 udp ldap unknown
6490163.247.127.20 520 tcp efs filtered
6491163.247.127.20 520 udp route unknown
6492163.247.127.20 2049 tcp nfs filtered
6493163.247.127.20 2049 udp nfs unknown
6494163.247.130.114 53 tcp domain closed
6495163.247.130.114 53 udp domain unknown
6496163.247.130.114 67 tcp dhcps filtered
6497163.247.130.114 67 udp dhcps unknown
6498163.247.130.114 68 tcp dhcpc filtered
6499163.247.130.114 68 udp dhcpc unknown
6500163.247.130.114 69 tcp tftp filtered
6501163.247.130.114 69 udp tftp closed
6502163.247.130.114 88 tcp kerberos-sec filtered
6503163.247.130.114 88 udp kerberos-sec unknown
6504163.247.130.114 123 tcp ntp filtered
6505163.247.130.114 123 udp ntp unknown
6506163.247.130.114 137 tcp netbios-ns filtered
6507163.247.130.114 137 udp netbios-ns unknown
6508163.247.130.114 138 tcp netbios-dgm filtered
6509163.247.130.114 138 udp netbios-dgm unknown
6510163.247.130.114 139 tcp netbios-ssn filtered
6511163.247.130.114 139 udp netbios-ssn unknown
6512163.247.130.114 161 tcp snmp filtered
6513163.247.130.114 161 udp snmp open net-snmp; net-snmp SNMPv3 server
6514163.247.130.114 162 tcp snmptrap filtered
6515163.247.130.114 162 udp snmptrap unknown
6516163.247.130.114 389 tcp ldap filtered
6517163.247.130.114 389 udp ldap unknown
6518163.247.130.114 520 tcp efs filtered
6519163.247.130.114 520 udp route unknown
6520163.247.130.114 2049 tcp nfs filtered
6521163.247.130.114 2049 udp nfs unknown
6522163.247.175.176 53 tcp tcpwrapped open
6523163.247.175.176 53 udp domain unknown
6524163.247.175.176 67 tcp tcpwrapped open
6525163.247.175.176 67 udp dhcps unknown
6526163.247.175.176 68 tcp tcpwrapped open
6527163.247.175.176 68 udp dhcpc unknown
6528163.247.175.176 69 tcp tcpwrapped open
6529163.247.175.176 69 udp tftp unknown
6530163.247.175.176 88 tcp tcpwrapped open
6531163.247.175.176 88 udp kerberos-sec unknown
6532163.247.175.176 123 tcp tcpwrapped open
6533163.247.175.176 123 udp ntp unknown
6534163.247.175.176 137 tcp tcpwrapped open
6535163.247.175.176 137 udp netbios-ns unknown
6536163.247.175.176 138 tcp tcpwrapped open
6537163.247.175.176 138 udp netbios-dgm unknown
6538163.247.175.176 139 udp netbios-ssn unknown
6539163.247.175.176 161 tcp tcpwrapped open
6540163.247.175.176 161 udp snmp unknown
6541163.247.175.176 162 tcp tcpwrapped open
6542163.247.175.176 162 udp snmptrap unknown
6543163.247.175.176 389 tcp tcpwrapped open
6544163.247.175.176 389 udp ldap unknown
6545163.247.175.176 520 tcp tcpwrapped open
6546163.247.175.176 520 udp route unknown
6547163.247.175.176 2049 tcp tcpwrapped open
6548163.247.175.176 2049 udp nfs unknown
6549165.22.143.229 53 tcp domain closed
6550165.22.143.229 53 udp domain unknown
6551165.22.143.229 67 tcp dhcps closed
6552165.22.143.229 67 udp dhcps unknown
6553165.22.143.229 68 tcp dhcpc closed
6554165.22.143.229 68 udp dhcpc unknown
6555165.22.143.229 69 tcp tftp closed
6556165.22.143.229 69 udp tftp closed
6557165.22.143.229 88 tcp kerberos-sec closed
6558165.22.143.229 88 udp kerberos-sec unknown
6559165.22.143.229 123 tcp ntp closed
6560165.22.143.229 123 udp ntp open NTP v4 secondary server
6561165.22.143.229 137 tcp netbios-ns closed
6562165.22.143.229 137 udp netbios-ns closed
6563165.22.143.229 138 tcp netbios-dgm closed
6564165.22.143.229 138 udp netbios-dgm closed
6565165.22.143.229 139 tcp netbios-ssn closed
6566165.22.143.229 139 udp netbios-ssn unknown
6567165.22.143.229 161 tcp snmp closed
6568165.22.143.229 161 udp snmp closed
6569165.22.143.229 162 tcp snmptrap closed
6570165.22.143.229 162 udp snmptrap unknown
6571165.22.143.229 389 tcp ldap closed
6572165.22.143.229 389 udp ldap closed
6573165.22.143.229 520 tcp efs closed
6574165.22.143.229 520 udp route closed
6575165.22.143.229 2049 tcp nfs closed
6576165.22.143.229 2049 udp nfs closed
6577165.227.99.239 53 tcp domain filtered
6578165.227.99.239 53 udp domain unknown
6579165.227.99.239 67 tcp dhcps filtered
6580165.227.99.239 67 udp dhcps unknown
6581165.227.99.239 68 tcp dhcpc filtered
6582165.227.99.239 68 udp dhcpc unknown
6583165.227.99.239 69 tcp tftp filtered
6584165.227.99.239 69 udp tftp unknown
6585165.227.99.239 80 tcp http open nginx
6586165.227.99.239 88 tcp kerberos-sec filtered
6587165.227.99.239 88 udp kerberos-sec unknown
6588165.227.99.239 123 tcp ntp filtered
6589165.227.99.239 123 udp ntp unknown
6590165.227.99.239 137 tcp netbios-ns filtered
6591165.227.99.239 137 udp netbios-ns unknown
6592165.227.99.239 138 tcp netbios-dgm filtered
6593165.227.99.239 138 udp netbios-dgm unknown
6594165.227.99.239 139 tcp netbios-ssn filtered
6595165.227.99.239 139 udp netbios-ssn unknown
6596165.227.99.239 161 tcp snmp filtered
6597165.227.99.239 161 udp snmp open net-snmp; net-snmp SNMPv3 server
6598165.227.99.239 162 tcp snmptrap filtered
6599165.227.99.239 162 udp snmptrap closed
6600165.227.99.239 389 tcp ldap filtered
6601165.227.99.239 389 udp ldap unknown
6602165.227.99.239 443 tcp ssl/http open nginx
6603165.227.99.239 520 tcp efs filtered
6604165.227.99.239 520 udp route unknown
6605165.227.99.239 2049 tcp nfs filtered
6606165.227.99.239 2049 udp nfs unknown
6607169.239.218.20 25 tcp smtp closed
6608169.239.218.20 53 tcp domain filtered
6609169.239.218.20 53 udp domain unknown
6610169.239.218.20 67 tcp dhcps filtered
6611169.239.218.20 67 udp dhcps unknown
6612169.239.218.20 68 tcp dhcpc filtered
6613169.239.218.20 68 udp dhcpc unknown
6614169.239.218.20 69 tcp tftp filtered
6615169.239.218.20 69 udp tftp unknown
6616169.239.218.20 88 tcp kerberos-sec filtered
6617169.239.218.20 88 udp kerberos-sec unknown
6618169.239.218.20 113 tcp ident closed
6619169.239.218.20 123 tcp ntp filtered
6620169.239.218.20 123 udp ntp unknown
6621169.239.218.20 137 tcp netbios-ns filtered
6622169.239.218.20 137 udp netbios-ns filtered
6623169.239.218.20 138 tcp netbios-dgm filtered
6624169.239.218.20 138 udp netbios-dgm filtered
6625169.239.218.20 139 tcp netbios-ssn closed
6626169.239.218.20 139 udp netbios-ssn unknown
6627169.239.218.20 161 tcp snmp filtered
6628169.239.218.20 161 udp snmp unknown
6629169.239.218.20 162 tcp snmptrap filtered
6630169.239.218.20 162 udp snmptrap unknown
6631169.239.218.20 389 tcp ldap filtered
6632169.239.218.20 389 udp ldap unknown
6633169.239.218.20 445 tcp microsoft-ds closed
6634169.239.218.20 520 tcp efs filtered
6635169.239.218.20 520 udp route unknown
6636169.239.218.20 2049 tcp nfs filtered
6637169.239.218.20 2049 udp nfs unknown
6638169.239.218.20 8008 tcp tcpwrapped open
6639173.214.244.169 53 tcp domain filtered
6640173.214.244.169 53 udp domain unknown
6641173.214.244.169 67 tcp dhcps filtered
6642173.214.244.169 67 udp dhcps unknown
6643173.214.244.169 68 tcp dhcpc filtered
6644173.214.244.169 68 udp dhcpc unknown
6645173.214.244.169 69 tcp tftp filtered
6646173.214.244.169 69 udp tftp unknown
6647173.214.244.169 88 tcp kerberos-sec filtered
6648173.214.244.169 88 udp kerberos-sec unknown
6649173.214.244.169 123 tcp ntp filtered
6650173.214.244.169 123 udp ntp unknown
6651173.214.244.169 137 tcp netbios-ns filtered
6652173.214.244.169 137 udp netbios-ns unknown
6653173.214.244.169 138 tcp netbios-dgm filtered
6654173.214.244.169 138 udp netbios-dgm unknown
6655173.214.244.169 139 tcp netbios-ssn filtered
6656173.214.244.169 139 udp netbios-ssn unknown
6657173.214.244.169 161 tcp snmp filtered
6658173.214.244.169 161 udp snmp unknown
6659173.214.244.169 162 tcp snmptrap filtered
6660173.214.244.169 162 udp snmptrap unknown
6661173.214.244.169 389 tcp ldap filtered
6662173.214.244.169 389 udp ldap unknown
6663173.214.244.169 520 tcp efs filtered
6664173.214.244.169 520 udp route unknown
6665173.214.244.169 2049 tcp nfs filtered
6666173.214.244.169 2049 udp nfs unknown
6667174.142.53.51 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 13:59. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
6668174.142.53.51 22 tcp ssh open SSH-2.0-OpenSSH_7.4
6669174.142.53.51 25 tcp smtp closed
6670174.142.53.51 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
6671174.142.53.51 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
6672174.142.53.51 67 tcp dhcps filtered
6673174.142.53.51 67 udp dhcps unknown
6674174.142.53.51 68 tcp dhcpc filtered
6675174.142.53.51 68 udp dhcpc unknown
6676174.142.53.51 69 tcp tftp filtered
6677174.142.53.51 69 udp tftp unknown
6678174.142.53.51 88 tcp kerberos-sec filtered
6679174.142.53.51 88 udp kerberos-sec unknown
6680174.142.53.51 123 tcp ntp filtered
6681174.142.53.51 123 udp ntp unknown
6682174.142.53.51 137 tcp netbios-ns filtered
6683174.142.53.51 137 udp netbios-ns filtered
6684174.142.53.51 138 tcp netbios-dgm filtered
6685174.142.53.51 138 udp netbios-dgm filtered
6686174.142.53.51 139 tcp netbios-ssn closed
6687174.142.53.51 139 udp netbios-ssn unknown
6688174.142.53.51 161 tcp snmp filtered
6689174.142.53.51 161 udp snmp unknown
6690174.142.53.51 162 tcp snmptrap filtered
6691174.142.53.51 162 udp snmptrap unknown
6692174.142.53.51 389 tcp ldap filtered
6693174.142.53.51 389 udp ldap unknown
6694174.142.53.51 445 tcp microsoft-ds closed
6695174.142.53.51 520 tcp efs filtered
6696174.142.53.51 520 udp route unknown
6697174.142.53.51 2049 tcp nfs filtered
6698174.142.53.51 2049 udp nfs unknown
6699186.64.118.40 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 100 allowed.\x0d\x0a220-Local time is now 13:39. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 10 minutes of inactivity.\x0d\x0a
6700186.64.118.40 53 tcp domain filtered
6701186.64.118.40 53 udp domain closed
6702186.64.118.40 67 tcp dhcps filtered
6703186.64.118.40 67 udp dhcps unknown
6704186.64.118.40 68 tcp dhcpc filtered
6705186.64.118.40 68 udp dhcpc unknown
6706186.64.118.40 69 tcp tftp filtered
6707186.64.118.40 69 udp tftp unknown
6708186.64.118.40 88 tcp kerberos-sec filtered
6709186.64.118.40 88 udp kerberos-sec unknown
6710186.64.118.40 123 tcp ntp filtered
6711186.64.118.40 123 udp ntp unknown
6712186.64.118.40 137 tcp netbios-ns filtered
6713186.64.118.40 137 udp netbios-ns unknown
6714186.64.118.40 138 tcp netbios-dgm filtered
6715186.64.118.40 138 udp netbios-dgm unknown
6716186.64.118.40 139 tcp netbios-ssn filtered
6717186.64.118.40 139 udp netbios-ssn unknown
6718186.64.118.40 161 tcp snmp filtered
6719186.64.118.40 161 udp snmp unknown
6720186.64.118.40 162 tcp snmptrap filtered
6721186.64.118.40 162 udp snmptrap unknown
6722186.64.118.40 389 tcp ldap filtered
6723186.64.118.40 389 udp ldap unknown
6724186.64.118.40 520 tcp efs filtered
6725186.64.118.40 520 udp route unknown
6726186.64.118.40 2049 tcp nfs closed
6727186.64.118.40 2049 udp nfs unknown
6728190.98.209.37 53 tcp domain filtered
6729190.98.209.37 53 udp domain unknown
6730190.98.209.37 67 tcp dhcps filtered
6731190.98.209.37 67 udp dhcps unknown
6732190.98.209.37 68 tcp dhcpc filtered
6733190.98.209.37 68 udp dhcpc unknown
6734190.98.209.37 69 tcp tftp filtered
6735190.98.209.37 69 udp tftp unknown
6736190.98.209.37 88 tcp kerberos-sec filtered
6737190.98.209.37 88 udp kerberos-sec unknown
6738190.98.209.37 123 tcp ntp filtered
6739190.98.209.37 123 udp ntp unknown
6740190.98.209.37 137 tcp netbios-ns filtered
6741190.98.209.37 137 udp netbios-ns unknown
6742190.98.209.37 138 tcp netbios-dgm filtered
6743190.98.209.37 138 udp netbios-dgm unknown
6744190.98.209.37 139 tcp netbios-ssn filtered
6745190.98.209.37 139 udp netbios-ssn unknown
6746190.98.209.37 161 tcp snmp filtered
6747190.98.209.37 161 udp snmp unknown
6748190.98.209.37 162 tcp snmptrap filtered
6749190.98.209.37 162 udp snmptrap unknown
6750190.98.209.37 389 tcp ldap filtered
6751190.98.209.37 389 udp ldap unknown
6752190.98.209.37 520 tcp efs filtered
6753190.98.209.37 520 udp route unknown
6754190.98.209.37 2049 tcp nfs filtered
6755190.98.209.37 2049 udp nfs unknown
6756190.107.177.35 53 tcp domain filtered ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
6757190.107.177.35 53 udp domain unknown ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
6758190.107.177.35 67 tcp dhcps filtered
6759190.107.177.35 67 udp dhcps unknown
6760190.107.177.35 68 tcp dhcpc filtered
6761190.107.177.35 68 udp dhcpc unknown
6762190.107.177.35 69 tcp tftp filtered
6763190.107.177.35 69 udp tftp unknown
6764190.107.177.35 88 tcp kerberos-sec filtered
6765190.107.177.35 88 udp kerberos-sec unknown
6766190.107.177.35 123 tcp ntp filtered
6767190.107.177.35 123 udp ntp unknown
6768190.107.177.35 137 tcp netbios-ns filtered
6769190.107.177.35 137 udp netbios-ns unknown
6770190.107.177.35 138 tcp netbios-dgm filtered
6771190.107.177.35 138 udp netbios-dgm unknown
6772190.107.177.35 139 tcp netbios-ssn filtered
6773190.107.177.35 139 udp netbios-ssn unknown
6774190.107.177.35 161 tcp snmp filtered
6775190.107.177.35 161 udp snmp unknown
6776190.107.177.35 162 tcp snmptrap filtered
6777190.107.177.35 162 udp snmptrap unknown
6778190.107.177.35 389 tcp ldap filtered
6779190.107.177.35 389 udp ldap unknown
6780190.107.177.35 520 tcp efs filtered
6781190.107.177.35 520 udp route unknown
6782190.107.177.35 2049 tcp nfs filtered
6783190.107.177.35 2049 udp nfs unknown
6784190.110.121.175 53 tcp domain filtered
6785190.110.121.175 53 udp domain unknown
6786190.110.121.175 67 tcp dhcps filtered
6787190.110.121.175 67 udp dhcps unknown
6788190.110.121.175 68 tcp dhcpc filtered
6789190.110.121.175 68 udp dhcpc unknown
6790190.110.121.175 69 tcp tftp filtered
6791190.110.121.175 69 udp tftp unknown
6792190.110.121.175 88 tcp kerberos-sec filtered
6793190.110.121.175 88 udp kerberos-sec unknown
6794190.110.121.175 123 tcp ntp filtered
6795190.110.121.175 123 udp ntp unknown
6796190.110.121.175 137 tcp netbios-ns filtered
6797190.110.121.175 137 udp netbios-ns unknown
6798190.110.121.175 138 tcp netbios-dgm filtered
6799190.110.121.175 138 udp netbios-dgm unknown
6800190.110.121.175 139 tcp netbios-ssn filtered
6801190.110.121.175 139 udp netbios-ssn unknown
6802190.110.121.175 161 tcp snmp filtered
6803190.110.121.175 161 udp snmp unknown
6804190.110.121.175 162 tcp snmptrap filtered
6805190.110.121.175 162 udp snmptrap unknown
6806190.110.121.175 389 tcp ldap filtered
6807190.110.121.175 389 udp ldap unknown
6808190.110.121.175 520 tcp efs filtered
6809190.110.121.175 520 udp route unknown
6810190.110.121.175 2049 tcp nfs filtered
6811190.110.121.175 2049 udp nfs unknown
6812190.153.209.187 53 tcp domain filtered
6813190.153.209.187 53 udp domain unknown
6814190.153.209.187 67 tcp dhcps filtered
6815190.153.209.187 67 udp dhcps unknown
6816190.153.209.187 68 tcp dhcpc filtered
6817190.153.209.187 68 udp dhcpc unknown
6818190.153.209.187 69 tcp tftp filtered
6819190.153.209.187 69 udp tftp unknown
6820190.153.209.187 88 tcp kerberos-sec filtered
6821190.153.209.187 88 udp kerberos-sec unknown
6822190.153.209.187 123 tcp ntp filtered
6823190.153.209.187 123 udp ntp unknown
6824190.153.209.187 137 tcp netbios-ns filtered
6825190.153.209.187 137 udp netbios-ns unknown
6826190.153.209.187 138 tcp netbios-dgm filtered
6827190.153.209.187 138 udp netbios-dgm unknown
6828190.153.209.187 139 tcp netbios-ssn filtered
6829190.153.209.187 139 udp netbios-ssn unknown
6830190.153.209.187 161 tcp snmp filtered
6831190.153.209.187 161 udp snmp unknown
6832190.153.209.187 162 tcp snmptrap filtered
6833190.153.209.187 162 udp snmptrap unknown
6834190.153.209.187 389 tcp ldap filtered
6835190.153.209.187 389 udp ldap unknown
6836190.153.209.187 520 tcp efs filtered
6837190.153.209.187 520 udp route unknown
6838190.153.209.187 2049 tcp nfs filtered
6839190.153.209.187 2049 udp nfs unknown
6840190.153.219.254 22 tcp ssh open SSH-2.0-OpenSSH_7.4
6841190.153.219.254 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
6842190.153.219.254 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
6843190.153.219.254 67 tcp dhcps filtered
6844190.153.219.254 67 udp dhcps unknown
6845190.153.219.254 68 tcp dhcpc filtered
6846190.153.219.254 68 udp dhcpc unknown
6847190.153.219.254 69 tcp tftp filtered
6848190.153.219.254 69 udp tftp unknown
6849190.153.219.254 88 tcp kerberos-sec filtered
6850190.153.219.254 88 udp kerberos-sec unknown
6851190.153.219.254 123 tcp ntp filtered
6852190.153.219.254 123 udp ntp unknown
6853190.153.219.254 137 tcp netbios-ns filtered
6854190.153.219.254 137 udp netbios-ns unknown
6855190.153.219.254 138 tcp netbios-dgm filtered
6856190.153.219.254 138 udp netbios-dgm unknown
6857190.153.219.254 139 tcp netbios-ssn filtered
6858190.153.219.254 139 udp netbios-ssn unknown
6859190.153.219.254 161 tcp snmp filtered
6860190.153.219.254 161 udp snmp unknown
6861190.153.219.254 162 tcp snmptrap filtered
6862190.153.219.254 162 udp snmptrap unknown
6863190.153.219.254 389 tcp ldap filtered
6864190.153.219.254 389 udp ldap unknown
6865190.153.219.254 520 tcp efs filtered
6866190.153.219.254 520 udp route unknown
6867190.153.219.254 2049 tcp nfs filtered
6868190.153.219.254 2049 udp nfs unknown
6869192.185.134.58 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 2 of 150 allowed.\x0d\x0a220-Local time is now 22:31. Server port: 21.\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
6870192.185.134.58 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
6871192.185.134.58 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
6872192.185.134.58 67 tcp dhcps closed
6873192.185.134.58 67 udp dhcps unknown
6874192.185.134.58 68 tcp dhcpc closed
6875192.185.134.58 68 udp dhcpc unknown
6876192.185.134.58 69 tcp tftp closed
6877192.185.134.58 69 udp tftp closed
6878192.185.134.58 88 tcp kerberos-sec closed
6879192.185.134.58 88 udp kerberos-sec closed
6880192.185.134.58 123 tcp ntp closed
6881192.185.134.58 123 udp ntp unknown
6882192.185.134.58 137 tcp netbios-ns closed
6883192.185.134.58 137 udp netbios-ns closed
6884192.185.134.58 138 tcp netbios-dgm closed
6885192.185.134.58 138 udp netbios-dgm closed
6886192.185.134.58 139 tcp netbios-ssn closed
6887192.185.134.58 139 udp netbios-ssn closed
6888192.185.134.58 161 tcp snmp closed
6889192.185.134.58 161 udp snmp unknown
6890192.185.134.58 162 tcp snmptrap closed
6891192.185.134.58 162 udp snmptrap closed
6892192.185.134.58 389 tcp ldap closed
6893192.185.134.58 389 udp ldap unknown
6894192.185.134.58 520 tcp efs closed
6895192.185.134.58 520 udp route unknown
6896192.185.134.58 2049 tcp nfs closed
6897192.185.134.58 2049 udp nfs unknown
6898200.2.249.28 21 tcp ftp open vsftpd 3.0.2
6899200.2.249.28 53 udp domain unknown
6900200.2.249.28 67 udp dhcps unknown
6901200.2.249.28 68 udp dhcpc unknown
6902200.2.249.28 69 udp tftp unknown
6903200.2.249.28 80 tcp http open Oracle Application Server 10g httpd 10.1.3.5.0
6904200.2.249.28 88 udp kerberos-sec unknown
6905200.2.249.28 123 udp ntp unknown
6906200.2.249.28 137 udp netbios-ns unknown
6907200.2.249.28 138 udp netbios-dgm unknown
6908200.2.249.28 139 tcp netbios-ssn open Samba smbd 4.8.3 workgroup: SAMBA
6909200.2.249.28 139 udp netbios-ssn unknown
6910200.2.249.28 161 udp snmp unknown
6911200.2.249.28 162 udp snmptrap unknown
6912200.2.249.28 389 udp ldap unknown
6913200.2.249.28 445 tcp netbios-ssn open Samba smbd 4.8.3 workgroup: SAMBA
6914200.2.249.28 520 udp route unknown
6915200.2.249.28 2049 udp nfs unknown
6916200.10.251.82 53 tcp domain filtered
6917200.10.251.82 53 udp domain unknown
6918200.10.251.82 67 tcp dhcps filtered
6919200.10.251.82 67 udp dhcps unknown
6920200.10.251.82 68 tcp dhcpc filtered
6921200.10.251.82 68 udp dhcpc unknown
6922200.10.251.82 69 tcp tftp filtered
6923200.10.251.82 69 udp tftp unknown
6924200.10.251.82 88 tcp kerberos-sec filtered
6925200.10.251.82 88 udp kerberos-sec unknown
6926200.10.251.82 123 tcp ntp filtered
6927200.10.251.82 123 udp ntp unknown
6928200.10.251.82 137 tcp netbios-ns filtered
6929200.10.251.82 137 udp netbios-ns unknown
6930200.10.251.82 138 tcp netbios-dgm filtered
6931200.10.251.82 138 udp netbios-dgm unknown
6932200.10.251.82 139 tcp netbios-ssn filtered
6933200.10.251.82 139 udp netbios-ssn unknown
6934200.10.251.82 161 tcp snmp filtered
6935200.10.251.82 161 udp snmp unknown
6936200.10.251.82 162 tcp snmptrap filtered
6937200.10.251.82 162 udp snmptrap unknown
6938200.10.251.82 389 tcp ldap filtered
6939200.10.251.82 389 udp ldap unknown
6940200.10.251.82 520 tcp efs filtered
6941200.10.251.82 520 udp route unknown
6942200.10.251.82 2049 tcp nfs filtered
6943200.10.251.82 2049 udp nfs unknown
6944200.12.19.101 21 tcp ftp open 220 Microsoft FTP Service\x0d\x0a
6945200.12.19.101 53 tcp domain filtered
6946200.12.19.101 53 udp domain unknown
6947200.12.19.101 67 tcp dhcps filtered
6948200.12.19.101 67 udp dhcps closed
6949200.12.19.101 68 tcp dhcpc closed
6950200.12.19.101 68 udp dhcpc closed
6951200.12.19.101 69 tcp tftp closed
6952200.12.19.101 69 udp tftp closed
6953200.12.19.101 88 tcp kerberos-sec closed
6954200.12.19.101 88 udp kerberos-sec closed
6955200.12.19.101 123 tcp ntp filtered
6956200.12.19.101 123 udp ntp unknown
6957200.12.19.101 137 tcp netbios-ns closed
6958200.12.19.101 137 udp netbios-ns unknown
6959200.12.19.101 138 tcp netbios-dgm closed
6960200.12.19.101 138 udp netbios-dgm closed
6961200.12.19.101 139 tcp netbios-ssn closed
6962200.12.19.101 139 udp netbios-ssn closed
6963200.12.19.101 161 tcp snmp closed
6964200.12.19.101 161 udp snmp unknown
6965200.12.19.101 162 tcp snmptrap closed
6966200.12.19.101 162 udp snmptrap closed
6967200.12.19.101 389 tcp ldap closed
6968200.12.19.101 389 udp ldap unknown
6969200.12.19.101 520 tcp efs filtered
6970200.12.19.101 520 udp route unknown
6971200.12.19.101 2049 tcp nfs closed
6972200.12.19.101 2049 udp nfs unknown
6973200.29.0.33 53 tcp domain filtered
6974200.29.0.33 53 udp domain unknown
6975200.29.0.33 67 tcp dhcps filtered
6976200.29.0.33 67 udp dhcps unknown
6977200.29.0.33 68 tcp dhcpc filtered
6978200.29.0.33 68 udp dhcpc unknown
6979200.29.0.33 69 tcp tftp filtered
6980200.29.0.33 69 udp tftp unknown
6981200.29.0.33 88 tcp kerberos-sec filtered
6982200.29.0.33 88 udp kerberos-sec unknown
6983200.29.0.33 123 tcp ntp filtered
6984200.29.0.33 123 udp ntp unknown
6985200.29.0.33 137 tcp netbios-ns filtered
6986200.29.0.33 137 udp netbios-ns unknown
6987200.29.0.33 138 tcp netbios-dgm filtered
6988200.29.0.33 138 udp netbios-dgm unknown
6989200.29.0.33 139 tcp netbios-ssn filtered
6990200.29.0.33 139 udp netbios-ssn unknown
6991200.29.0.33 161 tcp snmp filtered
6992200.29.0.33 161 udp snmp unknown
6993200.29.0.33 162 tcp snmptrap filtered
6994200.29.0.33 162 udp snmptrap unknown
6995200.29.0.33 389 tcp ldap filtered
6996200.29.0.33 389 udp ldap unknown
6997200.29.0.33 520 tcp efs filtered
6998200.29.0.33 520 udp route unknown
6999200.29.0.33 2049 tcp nfs filtered
7000200.29.0.33 2049 udp nfs unknown
7001200.54.92.108 21 tcp ftp open 220 (vsFTPd 3.0.3)\x0d\x0a
7002200.54.92.108 22 tcp ssh open SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u7
7003200.54.92.108 53 tcp domain closed
7004200.54.92.108 53 udp domain unknown
7005200.54.92.108 67 tcp dhcps closed
7006200.54.92.108 67 udp dhcps unknown
7007200.54.92.108 68 tcp dhcpc closed
7008200.54.92.108 68 udp dhcpc unknown
7009200.54.92.108 69 tcp tftp closed
7010200.54.92.108 69 udp tftp unknown
7011200.54.92.108 88 tcp kerberos-sec closed
7012200.54.92.108 88 udp kerberos-sec unknown
7013200.54.92.108 123 tcp ntp closed
7014200.54.92.108 123 udp ntp unknown
7015200.54.92.108 137 tcp netbios-ns closed
7016200.54.92.108 137 udp netbios-ns unknown
7017200.54.92.108 138 tcp netbios-dgm closed
7018200.54.92.108 138 udp netbios-dgm unknown
7019200.54.92.108 139 tcp netbios-ssn closed
7020200.54.92.108 139 udp netbios-ssn unknown
7021200.54.92.108 161 tcp snmp closed
7022200.54.92.108 161 udp snmp unknown
7023200.54.92.108 162 tcp snmptrap closed
7024200.54.92.108 162 udp snmptrap unknown
7025200.54.92.108 389 tcp ldap closed
7026200.54.92.108 389 udp ldap unknown
7027200.54.92.108 520 tcp efs closed
7028200.54.92.108 520 udp route unknown
7029200.54.92.108 2049 tcp nfs closed
7030200.54.92.108 2049 udp nfs unknown
7031200.54.230.247 21 tcp ftp open 220 ProFTPD Server (ProFTPD) [200.54.230.247]\x0d\x0a
7032200.54.230.247 22 tcp ssh open SSH-2.0-OpenSSH_7.4
7033200.54.230.247 53 tcp domain open unknown banner: none
7034200.54.230.247 53 udp domain open unknown banner: none
7035200.54.230.247 67 tcp dhcps filtered
7036200.54.230.247 67 udp dhcps unknown
7037200.54.230.247 68 tcp dhcpc filtered
7038200.54.230.247 68 udp dhcpc unknown
7039200.54.230.247 69 tcp tftp filtered
7040200.54.230.247 69 udp tftp unknown
7041200.54.230.247 88 tcp kerberos-sec filtered
7042200.54.230.247 88 udp kerberos-sec unknown
7043200.54.230.247 123 tcp ntp filtered
7044200.54.230.247 123 udp ntp unknown
7045200.54.230.247 137 tcp netbios-ns filtered
7046200.54.230.247 137 udp netbios-ns unknown
7047200.54.230.247 138 tcp netbios-dgm filtered
7048200.54.230.247 138 udp netbios-dgm unknown
7049200.54.230.247 139 tcp netbios-ssn filtered
7050200.54.230.247 139 udp netbios-ssn filtered
7051200.54.230.247 161 tcp snmp filtered
7052200.54.230.247 161 udp snmp unknown
7053200.54.230.247 162 tcp snmptrap filtered
7054200.54.230.247 162 udp snmptrap unknown
7055200.54.230.247 389 tcp ldap filtered
7056200.54.230.247 389 udp ldap filtered
7057200.54.230.247 520 tcp efs filtered
7058200.54.230.247 520 udp route filtered
7059200.54.230.247 2049 tcp nfs filtered
7060200.54.230.247 2049 udp nfs unknown
7061200.55.198.228 22 tcp ssh open SSH-2.0-OpenSSH_7.4p1 Debian-11.0nosystemd1
7062200.55.198.228 53 tcp domain open
7063200.55.198.228 53 udp domain open
7064200.55.198.228 67 tcp dhcps filtered
7065200.55.198.228 67 udp dhcps unknown
7066200.55.198.228 68 tcp dhcpc filtered
7067200.55.198.228 68 udp dhcpc unknown
7068200.55.198.228 69 tcp tftp filtered
7069200.55.198.228 69 udp tftp unknown
7070200.55.198.228 88 tcp kerberos-sec filtered
7071200.55.198.228 88 udp kerberos-sec unknown
7072200.55.198.228 123 tcp ntp filtered
7073200.55.198.228 123 udp ntp unknown
7074200.55.198.228 137 tcp netbios-ns filtered
7075200.55.198.228 137 udp netbios-ns unknown
7076200.55.198.228 138 tcp netbios-dgm filtered
7077200.55.198.228 138 udp netbios-dgm unknown
7078200.55.198.228 139 tcp netbios-ssn filtered
7079200.55.198.228 139 udp netbios-ssn unknown
7080200.55.198.228 161 tcp snmp filtered
7081200.55.198.228 161 udp snmp unknown
7082200.55.198.228 162 tcp snmptrap filtered
7083200.55.198.228 162 udp snmptrap unknown
7084200.55.198.228 389 tcp ldap filtered
7085200.55.198.228 389 udp ldap unknown
7086200.55.198.228 520 tcp efs filtered
7087200.55.198.228 520 udp route closed
7088200.55.198.228 2049 tcp nfs filtered
7089200.55.198.228 2049 udp nfs unknown
7090200.68.30.227 53 tcp domain closed
7091200.68.30.227 53 udp domain unknown
7092200.68.30.227 67 tcp dhcps closed
7093200.68.30.227 67 udp dhcps filtered
7094200.68.30.227 68 tcp dhcpc closed
7095200.68.30.227 68 udp dhcpc unknown
7096200.68.30.227 69 tcp tftp closed
7097200.68.30.227 69 udp tftp unknown
7098200.68.30.227 88 tcp kerberos-sec closed
7099200.68.30.227 88 udp kerberos-sec unknown
7100200.68.30.227 123 tcp ntp closed
7101200.68.30.227 123 udp ntp filtered
7102200.68.30.227 137 tcp netbios-ns closed
7103200.68.30.227 137 udp netbios-ns filtered
7104200.68.30.227 138 tcp netbios-dgm closed
7105200.68.30.227 138 udp netbios-dgm filtered
7106200.68.30.227 139 tcp netbios-ssn closed
7107200.68.30.227 139 udp netbios-ssn filtered
7108200.68.30.227 161 tcp snmp closed
7109200.68.30.227 161 udp snmp filtered
7110200.68.30.227 162 tcp snmptrap closed
7111200.68.30.227 162 udp snmptrap filtered
7112200.68.30.227 389 tcp ldap closed
7113200.68.30.227 389 udp ldap unknown
7114200.68.30.227 520 tcp efs closed
7115200.68.30.227 520 udp route filtered
7116200.68.30.227 2049 tcp nfs closed
7117200.68.30.227 2049 udp nfs filtered
7118200.68.34.99 53 tcp domain filtered
7119200.68.34.99 53 udp domain unknown
7120200.68.34.99 67 tcp dhcps filtered
7121200.68.34.99 67 udp dhcps unknown
7122200.68.34.99 68 tcp dhcpc filtered
7123200.68.34.99 68 udp dhcpc unknown
7124200.68.34.99 69 tcp tftp filtered
7125200.68.34.99 69 udp tftp unknown
7126200.68.34.99 88 tcp kerberos-sec filtered
7127200.68.34.99 88 udp kerberos-sec unknown
7128200.68.34.99 123 tcp ntp filtered
7129200.68.34.99 123 udp ntp unknown
7130200.68.34.99 137 tcp netbios-ns filtered
7131200.68.34.99 137 udp netbios-ns unknown
7132200.68.34.99 138 tcp netbios-dgm filtered
7133200.68.34.99 138 udp netbios-dgm unknown
7134200.68.34.99 139 tcp netbios-ssn filtered
7135200.68.34.99 139 udp netbios-ssn unknown
7136200.68.34.99 161 tcp snmp filtered
7137200.68.34.99 161 udp snmp unknown
7138200.68.34.99 162 tcp snmptrap filtered
7139200.68.34.99 162 udp snmptrap unknown
7140200.68.34.99 389 tcp ldap filtered
7141200.68.34.99 389 udp ldap unknown
7142200.68.34.99 520 tcp efs filtered
7143200.68.34.99 520 udp route unknown
7144200.68.34.99 2049 tcp nfs filtered
7145200.68.34.99 2049 udp nfs unknown
7146200.73.54.34 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
7147200.73.54.34 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
7148200.73.54.34 67 tcp dhcps filtered
7149200.73.54.34 67 udp dhcps unknown
7150200.73.54.34 68 tcp dhcpc filtered
7151200.73.54.34 68 udp dhcpc unknown
7152200.73.54.34 69 tcp tftp filtered
7153200.73.54.34 69 udp tftp unknown
7154200.73.54.34 88 tcp kerberos-sec filtered
7155200.73.54.34 88 udp kerberos-sec unknown
7156200.73.54.34 123 tcp ntp filtered
7157200.73.54.34 123 udp ntp unknown
7158200.73.54.34 137 tcp netbios-ns filtered
7159200.73.54.34 137 udp netbios-ns unknown
7160200.73.54.34 138 tcp netbios-dgm filtered
7161200.73.54.34 138 udp netbios-dgm unknown
7162200.73.54.34 139 tcp netbios-ssn filtered
7163200.73.54.34 139 udp netbios-ssn unknown
7164200.73.54.34 161 tcp snmp filtered
7165200.73.54.34 161 udp snmp unknown
7166200.73.54.34 162 tcp snmptrap filtered
7167200.73.54.34 162 udp snmptrap unknown
7168200.73.54.34 389 tcp ldap filtered
7169200.73.54.34 389 udp ldap unknown
7170200.73.54.34 520 tcp efs filtered
7171200.73.54.34 520 udp route unknown
7172200.73.54.34 2049 tcp nfs filtered
7173200.73.54.34 2049 udp nfs unknown
7174200.91.40.252 53 tcp domain filtered
7175200.91.40.252 53 udp domain unknown
7176200.91.40.252 67 tcp dhcps filtered
7177200.91.40.252 67 udp dhcps unknown
7178200.91.40.252 68 tcp dhcpc filtered
7179200.91.40.252 68 udp dhcpc unknown
7180200.91.40.252 69 tcp tftp filtered
7181200.91.40.252 69 udp tftp unknown
7182200.91.40.252 88 tcp kerberos-sec filtered
7183200.91.40.252 88 udp kerberos-sec unknown
7184200.91.40.252 123 tcp ntp filtered
7185200.91.40.252 123 udp ntp unknown
7186200.91.40.252 137 tcp netbios-ns filtered
7187200.91.40.252 137 udp netbios-ns unknown
7188200.91.40.252 138 tcp netbios-dgm filtered
7189200.91.40.252 138 udp netbios-dgm unknown
7190200.91.40.252 139 tcp netbios-ssn filtered
7191200.91.40.252 139 udp netbios-ssn unknown
7192200.91.40.252 161 tcp snmp filtered
7193200.91.40.252 161 udp snmp unknown
7194200.91.40.252 162 tcp snmptrap filtered
7195200.91.40.252 162 udp snmptrap unknown
7196200.91.40.252 389 tcp ldap filtered
7197200.91.40.252 389 udp ldap unknown
7198200.91.40.252 520 tcp efs filtered
7199200.91.40.252 520 udp route unknown
7200200.91.40.252 2049 tcp nfs filtered
7201200.91.40.252 2049 udp nfs unknown
7202200.91.41.5 53 tcp domain filtered
7203200.91.41.5 53 udp domain unknown
7204200.91.41.5 67 tcp dhcps filtered
7205200.91.41.5 67 udp dhcps unknown
7206200.91.41.5 68 tcp dhcpc filtered
7207200.91.41.5 68 udp dhcpc unknown
7208200.91.41.5 69 tcp tftp filtered
7209200.91.41.5 69 udp tftp unknown
7210200.91.41.5 88 tcp kerberos-sec filtered
7211200.91.41.5 88 udp kerberos-sec unknown
7212200.91.41.5 123 tcp ntp filtered
7213200.91.41.5 123 udp ntp unknown
7214200.91.41.5 137 tcp netbios-ns filtered
7215200.91.41.5 137 udp netbios-ns unknown
7216200.91.41.5 138 tcp netbios-dgm filtered
7217200.91.41.5 138 udp netbios-dgm unknown
7218200.91.41.5 139 tcp netbios-ssn filtered
7219200.91.41.5 139 udp netbios-ssn unknown
7220200.91.41.5 161 tcp snmp filtered
7221200.91.41.5 161 udp snmp unknown
7222200.91.41.5 162 tcp snmptrap filtered
7223200.91.41.5 162 udp snmptrap unknown
7224200.91.41.5 389 tcp ldap filtered
7225200.91.41.5 389 udp ldap unknown
7226200.91.41.5 520 tcp efs filtered
7227200.91.41.5 520 udp route unknown
7228200.91.41.5 2049 tcp nfs filtered
7229200.91.41.5 2049 udp nfs unknown
7230200.126.100.83 53 tcp domain filtered
7231200.126.100.83 53 udp domain unknown
7232200.126.100.83 67 tcp dhcps filtered
7233200.126.100.83 67 udp dhcps unknown
7234200.126.100.83 68 tcp dhcpc filtered
7235200.126.100.83 68 udp dhcpc unknown
7236200.126.100.83 69 tcp tftp filtered
7237200.126.100.83 69 udp tftp unknown
7238200.126.100.83 88 tcp kerberos-sec filtered
7239200.126.100.83 88 udp kerberos-sec unknown
7240200.126.100.83 123 tcp ntp filtered
7241200.126.100.83 123 udp ntp unknown
7242200.126.100.83 137 tcp netbios-ns filtered
7243200.126.100.83 137 udp netbios-ns unknown
7244200.126.100.83 138 tcp netbios-dgm filtered
7245200.126.100.83 138 udp netbios-dgm unknown
7246200.126.100.83 139 tcp netbios-ssn filtered
7247200.126.100.83 139 udp netbios-ssn unknown
7248200.126.100.83 161 tcp snmp filtered
7249200.126.100.83 161 udp snmp unknown
7250200.126.100.83 162 tcp snmptrap filtered
7251200.126.100.83 162 udp snmptrap unknown
7252200.126.100.83 389 tcp ldap filtered
7253200.126.100.83 389 udp ldap unknown
7254200.126.100.83 520 tcp efs filtered
7255200.126.100.83 520 udp route unknown
7256200.126.100.83 2049 tcp nfs filtered
7257200.126.100.83 2049 udp nfs unknown
7258201.159.170.136 53 tcp domain filtered
7259201.159.170.136 53 udp domain unknown
7260201.159.170.136 67 tcp dhcps filtered
7261201.159.170.136 67 udp dhcps unknown
7262201.159.170.136 68 tcp dhcpc filtered
7263201.159.170.136 68 udp dhcpc unknown
7264201.159.170.136 69 tcp tftp filtered
7265201.159.170.136 69 udp tftp unknown
7266201.159.170.136 88 tcp kerberos-sec filtered
7267201.159.170.136 88 udp kerberos-sec unknown
7268201.159.170.136 123 tcp ntp filtered
7269201.159.170.136 123 udp ntp unknown
7270201.159.170.136 137 tcp netbios-ns filtered
7271201.159.170.136 137 udp netbios-ns unknown
7272201.159.170.136 138 tcp netbios-dgm filtered
7273201.159.170.136 138 udp netbios-dgm unknown
7274201.159.170.136 139 tcp netbios-ssn filtered
7275201.159.170.136 139 udp netbios-ssn unknown
7276201.159.170.136 161 tcp snmp filtered
7277201.159.170.136 161 udp snmp unknown
7278201.159.170.136 162 tcp snmptrap filtered
7279201.159.170.136 162 udp snmptrap unknown
7280201.159.170.136 389 tcp ldap filtered
7281201.159.170.136 389 udp ldap unknown
7282201.159.170.136 520 tcp efs filtered
7283201.159.170.136 520 udp route unknown
7284201.159.170.136 2049 tcp nfs filtered
7285201.159.170.136 2049 udp nfs unknown
7286204.93.193.141 21 tcp ftp open Your connection to this server has been blocked.\x0d\x0a\x0d\x0aYou are most likely being blocked due to use of incorrect user/pass combination. Please, check all of your computers/devices to make sure that they are using the correct login credentials, including your email clients. You may also get blocked due to too many POP3/IMAP logins in 1 minute interval, please adjust your email client settings.\x0d\x0a
7287204.93.193.141 53 tcp domain filtered
7288204.93.193.141 53 udp domain unknown
7289204.93.193.141 67 tcp dhcps filtered
7290204.93.193.141 67 udp dhcps unknown
7291204.93.193.141 68 tcp dhcpc filtered
7292204.93.193.141 68 udp dhcpc unknown
7293204.93.193.141 69 tcp tftp filtered
7294204.93.193.141 69 udp tftp unknown
7295204.93.193.141 88 tcp kerberos-sec filtered
7296204.93.193.141 88 udp kerberos-sec unknown
7297204.93.193.141 123 tcp ntp filtered
7298204.93.193.141 123 udp ntp unknown
7299204.93.193.141 137 tcp netbios-ns filtered
7300204.93.193.141 137 udp netbios-ns unknown
7301204.93.193.141 138 tcp netbios-dgm filtered
7302204.93.193.141 138 udp netbios-dgm unknown
7303204.93.193.141 139 tcp netbios-ssn filtered
7304204.93.193.141 139 udp netbios-ssn unknown
7305204.93.193.141 161 tcp snmp filtered
7306204.93.193.141 161 udp snmp unknown
7307204.93.193.141 162 tcp snmptrap filtered
7308204.93.193.141 162 udp snmptrap unknown
7309204.93.193.141 389 tcp ldap filtered
7310204.93.193.141 389 udp ldap unknown
7311204.93.193.141 520 tcp efs filtered
7312204.93.193.141 520 udp route unknown
7313204.93.193.141 2049 tcp nfs filtered
7314204.93.193.141 2049 udp nfs unknown
7315206.48.140.40 53 tcp domain filtered
7316206.48.140.40 53 udp domain unknown
7317206.48.140.40 67 tcp dhcps filtered
7318206.48.140.40 67 udp dhcps unknown
7319206.48.140.40 68 tcp dhcpc filtered
7320206.48.140.40 68 udp dhcpc unknown
7321206.48.140.40 69 tcp tftp filtered
7322206.48.140.40 69 udp tftp unknown
7323206.48.140.40 88 tcp kerberos-sec filtered
7324206.48.140.40 88 udp kerberos-sec unknown
7325206.48.140.40 123 tcp ntp filtered
7326206.48.140.40 123 udp ntp unknown
7327206.48.140.40 137 tcp netbios-ns filtered
7328206.48.140.40 137 udp netbios-ns unknown
7329206.48.140.40 138 tcp netbios-dgm filtered
7330206.48.140.40 138 udp netbios-dgm unknown
7331206.48.140.40 139 tcp netbios-ssn filtered
7332206.48.140.40 139 udp netbios-ssn unknown
7333206.48.140.40 161 tcp snmp filtered
7334206.48.140.40 161 udp snmp unknown
7335206.48.140.40 162 tcp snmptrap filtered
7336206.48.140.40 162 udp snmptrap unknown
7337206.48.140.40 389 tcp ldap filtered
7338206.48.140.40 389 udp ldap unknown
7339206.48.140.40 520 tcp efs filtered
7340206.48.140.40 520 udp route unknown
7341206.48.140.40 2049 tcp nfs filtered
7342206.48.140.40 2049 udp nfs unknown
7343207.246.147.189 53 tcp domain filtered
7344207.246.147.189 53 udp domain unknown
7345207.246.147.189 67 tcp dhcps filtered
7346207.246.147.189 67 udp dhcps unknown
7347207.246.147.189 68 tcp dhcpc filtered
7348207.246.147.189 68 udp dhcpc unknown
7349207.246.147.189 69 tcp tftp filtered
7350207.246.147.189 69 udp tftp unknown
7351207.246.147.189 80 tcp http open nginx
7352207.246.147.189 88 tcp kerberos-sec filtered
7353207.246.147.189 88 udp kerberos-sec unknown
7354207.246.147.189 123 tcp ntp filtered
7355207.246.147.189 123 udp ntp unknown
7356207.246.147.189 137 tcp netbios-ns filtered
7357207.246.147.189 137 udp netbios-ns unknown
7358207.246.147.189 138 tcp netbios-dgm filtered
7359207.246.147.189 138 udp netbios-dgm unknown
7360207.246.147.189 139 tcp netbios-ssn filtered
7361207.246.147.189 139 udp netbios-ssn unknown
7362207.246.147.189 161 tcp snmp filtered
7363207.246.147.189 161 udp snmp unknown
7364207.246.147.189 162 tcp snmptrap filtered
7365207.246.147.189 162 udp snmptrap unknown
7366207.246.147.189 389 tcp ldap filtered
7367207.246.147.189 389 udp ldap unknown
7368207.246.147.189 443 tcp ssl/http open nginx
7369207.246.147.189 520 tcp efs filtered
7370207.246.147.189 520 udp route unknown
7371207.246.147.189 2049 tcp nfs filtered
7372207.246.147.189 2049 udp nfs unknown
7373207.246.147.190 53 tcp domain filtered
7374207.246.147.190 53 udp domain unknown
7375207.246.147.190 67 tcp dhcps filtered
7376207.246.147.190 67 udp dhcps unknown
7377207.246.147.190 68 tcp dhcpc filtered
7378207.246.147.190 68 udp dhcpc unknown
7379207.246.147.190 69 tcp tftp filtered
7380207.246.147.190 69 udp tftp unknown
7381207.246.147.190 80 tcp http open nginx
7382207.246.147.190 88 tcp kerberos-sec filtered
7383207.246.147.190 88 udp kerberos-sec unknown
7384207.246.147.190 123 tcp ntp filtered
7385207.246.147.190 123 udp ntp unknown
7386207.246.147.190 137 tcp netbios-ns filtered
7387207.246.147.190 137 udp netbios-ns unknown
7388207.246.147.190 138 tcp netbios-dgm filtered
7389207.246.147.190 138 udp netbios-dgm filtered
7390207.246.147.190 139 tcp netbios-ssn filtered
7391207.246.147.190 139 udp netbios-ssn unknown
7392207.246.147.190 161 tcp snmp filtered
7393207.246.147.190 161 udp snmp unknown
7394207.246.147.190 162 tcp snmptrap filtered
7395207.246.147.190 162 udp snmptrap unknown
7396207.246.147.190 389 tcp ldap filtered
7397207.246.147.190 389 udp ldap unknown
7398207.246.147.190 443 tcp ssl/http open nginx
7399207.246.147.190 520 tcp efs filtered
7400207.246.147.190 520 udp route unknown
7401207.246.147.190 2049 tcp nfs filtered
7402207.246.147.190 2049 udp nfs unknown
7403207.246.147.247 53 tcp domain filtered
7404207.246.147.247 53 udp domain filtered
7405207.246.147.247 67 tcp dhcps filtered
7406207.246.147.247 67 udp dhcps unknown
7407207.246.147.247 68 tcp dhcpc filtered
7408207.246.147.247 68 udp dhcpc unknown
7409207.246.147.247 69 tcp tftp filtered
7410207.246.147.247 69 udp tftp unknown
7411207.246.147.247 80 tcp http open nginx
7412207.246.147.247 88 tcp kerberos-sec filtered
7413207.246.147.247 88 udp kerberos-sec unknown
7414207.246.147.247 123 tcp ntp filtered
7415207.246.147.247 123 udp ntp unknown
7416207.246.147.247 137 tcp netbios-ns filtered
7417207.246.147.247 137 udp netbios-ns filtered
7418207.246.147.247 138 tcp netbios-dgm filtered
7419207.246.147.247 138 udp netbios-dgm unknown
7420207.246.147.247 139 tcp netbios-ssn filtered
7421207.246.147.247 139 udp netbios-ssn unknown
7422207.246.147.247 161 tcp snmp filtered
7423207.246.147.247 161 udp snmp unknown
7424207.246.147.247 162 tcp snmptrap filtered
7425207.246.147.247 162 udp snmptrap unknown
7426207.246.147.247 389 tcp ldap filtered
7427207.246.147.247 389 udp ldap unknown
7428207.246.147.247 443 tcp ssl/http open nginx
7429207.246.147.247 520 tcp efs filtered
7430207.246.147.247 520 udp route unknown
7431207.246.147.247 2049 tcp nfs filtered
7432207.246.147.247 2049 udp nfs unknown
7433207.246.147.248 53 tcp domain filtered
7434207.246.147.248 53 udp domain unknown
7435207.246.147.248 67 tcp dhcps filtered
7436207.246.147.248 67 udp dhcps unknown
7437207.246.147.248 68 tcp dhcpc filtered
7438207.246.147.248 68 udp dhcpc unknown
7439207.246.147.248 69 tcp tftp filtered
7440207.246.147.248 69 udp tftp unknown
7441207.246.147.248 80 tcp http open nginx
7442207.246.147.248 88 tcp kerberos-sec filtered
7443207.246.147.248 88 udp kerberos-sec unknown
7444207.246.147.248 123 tcp ntp filtered
7445207.246.147.248 123 udp ntp unknown
7446207.246.147.248 137 tcp netbios-ns filtered
7447207.246.147.248 137 udp netbios-ns unknown
7448207.246.147.248 138 tcp netbios-dgm filtered
7449207.246.147.248 138 udp netbios-dgm unknown
7450207.246.147.248 139 tcp netbios-ssn filtered
7451207.246.147.248 139 udp netbios-ssn unknown
7452207.246.147.248 161 tcp snmp filtered
7453207.246.147.248 161 udp snmp unknown
7454207.246.147.248 162 tcp snmptrap filtered
7455207.246.147.248 162 udp snmptrap unknown
7456207.246.147.248 389 tcp ldap filtered
7457207.246.147.248 389 udp ldap unknown
7458207.246.147.248 443 tcp ssl/http open nginx
7459207.246.147.248 520 tcp efs filtered
7460207.246.147.248 520 udp route unknown
7461207.246.147.248 2049 tcp nfs filtered
7462207.246.147.248 2049 udp nfs unknown
7463211.13.196.135 25 tcp smtp closed
7464211.13.196.135 53 tcp domain filtered
7465211.13.196.135 53 udp domain unknown
7466211.13.196.135 67 tcp dhcps filtered
7467211.13.196.135 67 udp dhcps unknown
7468211.13.196.135 68 tcp dhcpc filtered
7469211.13.196.135 68 udp dhcpc unknown
7470211.13.196.135 69 tcp tftp filtered
7471211.13.196.135 69 udp tftp unknown
7472211.13.196.135 80 tcp http open Apache httpd
7473211.13.196.135 88 tcp kerberos-sec filtered
7474211.13.196.135 88 udp kerberos-sec unknown
7475211.13.196.135 113 tcp ident closed
7476211.13.196.135 123 tcp ntp filtered
7477211.13.196.135 123 udp ntp unknown
7478211.13.196.135 137 tcp netbios-ns filtered
7479211.13.196.135 137 udp netbios-ns filtered
7480211.13.196.135 138 tcp netbios-dgm filtered
7481211.13.196.135 138 udp netbios-dgm filtered
7482211.13.196.135 139 tcp netbios-ssn closed
7483211.13.196.135 139 udp netbios-ssn unknown
7484211.13.196.135 161 tcp snmp filtered
7485211.13.196.135 161 udp snmp unknown
7486211.13.196.135 162 tcp snmptrap filtered
7487211.13.196.135 162 udp snmptrap unknown
7488211.13.196.135 389 tcp ldap filtered
7489211.13.196.135 389 udp ldap unknown
7490211.13.196.135 443 tcp ssl/http open Apache httpd
7491211.13.196.135 445 tcp microsoft-ds closed
7492211.13.196.135 520 tcp efs filtered
7493211.13.196.135 520 udp route unknown
7494211.13.196.135 2049 tcp nfs filtered
7495211.13.196.135 2049 udp nfs unknown
7496212.174.0.150 53 tcp domain filtered
7497212.174.0.150 53 udp domain unknown
7498212.174.0.150 67 tcp dhcps filtered
7499212.174.0.150 67 udp dhcps unknown
7500212.174.0.150 68 tcp dhcpc filtered
7501212.174.0.150 68 udp dhcpc unknown
7502212.174.0.150 69 tcp tftp filtered
7503212.174.0.150 69 udp tftp unknown
7504212.174.0.150 80 tcp http open Microsoft IIS httpd 8.5
7505212.174.0.150 88 tcp kerberos-sec filtered
7506212.174.0.150 88 udp kerberos-sec unknown
7507212.174.0.150 123 tcp ntp filtered
7508212.174.0.150 123 udp ntp unknown
7509212.174.0.150 137 tcp netbios-ns filtered
7510212.174.0.150 137 udp netbios-ns unknown
7511212.174.0.150 138 tcp netbios-dgm filtered
7512212.174.0.150 138 udp netbios-dgm unknown
7513212.174.0.150 139 tcp netbios-ssn filtered
7514212.174.0.150 139 udp netbios-ssn unknown
7515212.174.0.150 161 tcp snmp filtered
7516212.174.0.150 161 udp snmp unknown
7517212.174.0.150 162 tcp snmptrap filtered
7518212.174.0.150 162 udp snmptrap unknown
7519212.174.0.150 389 tcp ldap filtered
7520212.174.0.150 389 udp ldap unknown
7521212.174.0.150 520 tcp efs filtered
7522212.174.0.150 520 udp route unknown
7523212.174.0.150 2049 tcp nfs filtered
7524212.174.0.150 2049 udp nfs unknown
7525216.172.184.117 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 5 of 150 allowed.\x0d\x0a220-Local time is now 01:41. Server port: 21.\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
7526216.172.184.117 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
7527216.172.184.117 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
7528216.172.184.117 67 tcp dhcps closed
7529216.172.184.117 67 udp dhcps closed
7530216.172.184.117 68 tcp dhcpc closed
7531216.172.184.117 68 udp dhcpc unknown
7532216.172.184.117 69 tcp tftp closed
7533216.172.184.117 69 udp tftp unknown
7534216.172.184.117 88 tcp kerberos-sec closed
7535216.172.184.117 88 udp kerberos-sec unknown
7536216.172.184.117 123 tcp ntp closed
7537216.172.184.117 123 udp ntp unknown
7538216.172.184.117 137 tcp netbios-ns closed
7539216.172.184.117 137 udp netbios-ns unknown
7540216.172.184.117 138 tcp netbios-dgm closed
7541216.172.184.117 138 udp netbios-dgm closed
7542216.172.184.117 139 tcp netbios-ssn closed
7543216.172.184.117 139 udp netbios-ssn closed
7544216.172.184.117 161 tcp snmp closed
7545216.172.184.117 161 udp snmp unknown
7546216.172.184.117 162 tcp snmptrap closed
7547216.172.184.117 162 udp snmptrap closed
7548216.172.184.117 389 tcp ldap closed
7549216.172.184.117 389 udp ldap closed
7550216.172.184.117 520 tcp efs closed
7551216.172.184.117 520 udp route closed
7552216.172.184.117 2049 tcp nfs closed
7553216.172.184.117 2049 udp nfs unknown
7554218.45.5.97 25 tcp smtp closed
7555218.45.5.97 53 tcp domain filtered
7556218.45.5.97 53 udp domain unknown
7557218.45.5.97 67 tcp dhcps filtered
7558218.45.5.97 67 udp dhcps unknown
7559218.45.5.97 68 tcp dhcpc filtered
7560218.45.5.97 68 udp dhcpc unknown
7561218.45.5.97 69 tcp tftp filtered
7562218.45.5.97 69 udp tftp unknown
7563218.45.5.97 80 tcp http open Apache httpd 2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.15
7564218.45.5.97 88 tcp kerberos-sec filtered
7565218.45.5.97 88 udp kerberos-sec unknown
7566218.45.5.97 113 tcp ident closed
7567218.45.5.97 123 tcp ntp filtered
7568218.45.5.97 123 udp ntp unknown
7569218.45.5.97 137 tcp netbios-ns filtered
7570218.45.5.97 137 udp netbios-ns filtered
7571218.45.5.97 138 tcp netbios-dgm filtered
7572218.45.5.97 138 udp netbios-dgm filtered
7573218.45.5.97 139 tcp netbios-ssn closed
7574218.45.5.97 139 udp netbios-ssn unknown
7575218.45.5.97 161 tcp snmp filtered
7576218.45.5.97 161 udp snmp unknown
7577218.45.5.97 162 tcp snmptrap filtered
7578218.45.5.97 162 udp snmptrap unknown
7579218.45.5.97 389 tcp ldap filtered
7580218.45.5.97 389 udp ldap unknown
7581218.45.5.97 443 tcp ssl/http open Apache httpd 2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.15
7582218.45.5.97 445 tcp microsoft-ds closed
7583218.45.5.97 520 tcp efs filtered
7584218.45.5.97 520 udp route unknown
7585218.45.5.97 2049 tcp nfs filtered
7586218.45.5.97 2049 udp nfs unknown
7587###################################################################################################################################
7588Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-18 17:02 EDT
7589Nmap scan report for no-reverse-dns-configured.com (94.102.51.112)
7590Host is up (0.22s latency).
7591Not shown: 989 filtered ports
7592PORT STATE SERVICE VERSION
759322/tcp open ssh OpenSSH 7.4 (protocol 2.0)
7594| vulscan: VulDB - https://vuldb.com:
7595| [130671] gsi-openssh-server 7.9p1 on Fedora /etc/gsissh/sshd_config weak authentication
7596| [130371] OpenSSH 7.9 scp Man-in-the-Middle directory traversal
7597| [130370] OpenSSH 7.9 Man-in-the-Middle spoofing
7598| [130369] OpenSSH 7.9 Encoding progressmeter.c refresh_progress_meter() spoofing
7599| [129007] OpenSSH 7.9 scp Client scp.c Filename privilege escalation
7600| [123343] OpenSSH up to 7.8 GSS2 auth-gss2.c information disclosure
7601| [123011] OpenSSH up to 7.7 auth2-gss.c Request information disclosure
7602| [112267] OpenSSH up to 7.3 sshd kex.c/packet.c NEWKEYS Message denial of service
7603| [108627] OpenSSH up to 7.5 Readonly Mode sftp-server.c process_open unknown vulnerability
7604| [94611] OpenSSH up to 7.3 Access Control privilege escalation
7605| [94610] OpenSSH up to 7.3 Shared Memory Manager privilege escalation
7606| [94608] OpenSSH up to 7.3 Unix-Domain Socket privilege escalation
7607| [94607] OpenSSH up to 7.3 Forwarded Agent Channel privilege escalation
7608| [90671] OpenSSH up to 7.2 auth-passwd.c auth_password denial of service
7609| [90405] OpenSSH up to 7.2p2 sshd information disclosure
7610| [90404] OpenSSH up to 7.2p2 sshd information disclosure
7611| [90403] OpenSSH up to 7.2p2 sshd CPU Exhaustion denial of service
7612| [89622] OpenSSH 7.2p2 Authentication Username information disclosure
7613| [81320] OpenSSH up to 7.2p1 X11 Authentication Credential xauth privilege escalation
7614| [80656] OpenBSD OpenSSH 7.1 X11 Forwarding privilege escalation
7615| [80330] OpenSSH up to 7.1p1 packet.c ssh_packet_read_poll2 memory corruption
7616|
7617| MITRE CVE - https://cve.mitre.org:
7618| [CVE-2010-4755] The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
7619| [CVE-1999-0661] A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6.
7620|
7621| SecurityFocus - https://www.securityfocus.com/bid/:
7622| [102780] OpenSSH CVE-2016-10708 Multiple Denial of Service Vulnerabilities
7623| [101552] OpenSSH 'sftp-server.c' Remote Security Bypass Vulnerability
7624| [94977] OpenSSH CVE-2016-10011 Local Information Disclosure Vulnerability
7625| [94975] OpenSSH CVE-2016-10012 Security Bypass Vulnerability
7626| [94972] OpenSSH CVE-2016-10010 Privilege Escalation Vulnerability
7627| [94968] OpenSSH CVE-2016-10009 Remote Code Execution Vulnerability
7628| [93776] OpenSSH 'ssh/kex.c' Denial of Service Vulnerability
7629| [92212] OpenSSH CVE-2016-6515 Denial of Service Vulnerability
7630| [92210] OpenSSH CBC Padding Weak Encryption Security Weakness
7631| [92209] OpenSSH MAC Verification Security Bypass Vulnerability
7632| [91812] OpenSSH CVE-2016-6210 User Enumeration Vulnerability
7633| [90440] OpenSSH CVE-2004-1653 Remote Security Vulnerability
7634| [90340] OpenSSH CVE-2004-2760 Remote Security Vulnerability
7635| [89385] OpenSSH CVE-2005-2666 Local Security Vulnerability
7636| [88655] OpenSSH CVE-2001-1382 Remote Security Vulnerability
7637| [88513] OpenSSH CVE-2000-0999 Remote Security Vulnerability
7638| [88367] OpenSSH CVE-1999-1010 Local Security Vulnerability
7639| [87789] OpenSSH CVE-2003-0682 Remote Security Vulnerability
7640| [86187] OpenSSH 'session.c' Local Security Bypass Vulnerability
7641| [86144] OpenSSH CVE-2007-2768 Remote Security Vulnerability
7642| [84427] OpenSSH CVE-2016-1908 Security Bypass Vulnerability
7643| [84314] OpenSSH CVE-2016-3115 Remote Command Injection Vulnerability
7644| [84185] OpenSSH CVE-2006-4925 Denial-Of-Service Vulnerability
7645| [81293] OpenSSH CVE-2016-1907 Denial of Service Vulnerability
7646| [80698] OpenSSH CVE-2016-0778 Heap Based Buffer Overflow Vulnerability
7647| [80695] OpenSSH CVE-2016-0777 Information Disclosure Vulnerability
7648| [76497] OpenSSH CVE-2015-6565 Local Security Bypass Vulnerability
7649| [76317] OpenSSH PAM Support Multiple Remote Code Execution Vulnerabilities
7650| [75990] OpenSSH Login Handling Security Bypass Weakness
7651| [75525] OpenSSH 'x11_open_helper()' Function Security Bypass Vulnerability
7652| [71420] Portable OpenSSH 'gss-serv-krb5.c' Security Bypass Vulnerability
7653| [68757] OpenSSH Multiple Remote Denial of Service Vulnerabilities
7654| [66459] OpenSSH Certificate Validation Security Bypass Vulnerability
7655| [66355] OpenSSH 'child_set_env()' Function Security Bypass Vulnerability
7656| [65674] OpenSSH 'ssh-keysign.c' Local Information Disclosure Vulnerability
7657| [65230] OpenSSH 'schnorr.c' Remote Memory Corruption Vulnerability
7658| [63605] OpenSSH 'sshd' Process Remote Memory Corruption Vulnerability
7659| [61286] OpenSSH Remote Denial of Service Vulnerability
7660| [58894] GSI-OpenSSH PAM_USER Security Bypass Vulnerability
7661| [58162] OpenSSH CVE-2010-5107 Denial of Service Vulnerability
7662| [54114] OpenSSH 'ssh_gssapi_parse_ename()' Function Denial of Service Vulnerability
7663| [51702] Debian openssh-server Forced Command Handling Information Disclosure Vulnerability
7664| [50416] Linux Kernel 'kdump' and 'mkdumprd' OpenSSH Integration Remote Information Disclosure Vulnerability
7665| [49473] OpenSSH Ciphersuite Specification Information Disclosure Weakness
7666| [48507] OpenSSH 'pam_thread()' Remote Buffer Overflow Vulnerability
7667| [47691] Portable OpenSSH 'ssh-keysign' Local Unauthorized Access Vulnerability
7668| [46155] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
7669| [45304] OpenSSH J-PAKE Security Bypass Vulnerability
7670| [36552] Red Hat Enterprise Linux OpenSSH 'ChrootDirectory' Option Local Privilege Escalation Vulnerability
7671| [32319] OpenSSH CBC Mode Information Disclosure Vulnerability
7672| [30794] Red Hat OpenSSH Backdoor Vulnerability
7673| [30339] OpenSSH 'X11UseLocalhost' X11 Forwarding Session Hijacking Vulnerability
7674| [30276] Debian OpenSSH SELinux Privilege Escalation Vulnerability
7675| [28531] OpenSSH ForceCommand Command Execution Weakness
7676| [28444] OpenSSH X Connections Session Hijacking Vulnerability
7677| [26097] OpenSSH LINUX_AUDIT_RECORD_EVENT Remote Log Injection Weakness
7678| [25628] OpenSSH X11 Cookie Local Authentication Bypass Vulnerability
7679| [23601] OpenSSH S/Key Remote Information Disclosure Vulnerability
7680| [20956] OpenSSH Privilege Separation Key Signature Weakness
7681| [20418] OpenSSH-Portable Existing Password Remote Information Disclosure Weakness
7682| [20245] OpenSSH-Portable GSSAPI Authentication Abort Information Disclosure Weakness
7683| [20241] Portable OpenSSH GSSAPI Remote Code Execution Vulnerability
7684| [20216] OpenSSH Duplicated Block Remote Denial of Service Vulnerability
7685| [16892] OpenSSH Remote PAM Denial Of Service Vulnerability
7686| [14963] OpenSSH LoginGraceTime Remote Denial Of Service Vulnerability
7687| [14729] OpenSSH GSSAPI Credential Disclosure Vulnerability
7688| [14727] OpenSSH DynamicForward Inadvertent GatewayPorts Activation Vulnerability
7689| [11781] OpenSSH-portable PAM Authentication Remote Information Disclosure Vulnerability
7690| [9986] RCP, OpenSSH SCP Client File Corruption Vulnerability
7691| [9040] OpenSSH PAM Conversation Memory Scrubbing Weakness
7692| [8677] Multiple Portable OpenSSH PAM Vulnerabilities
7693| [8628] OpenSSH Buffer Mismanagement Vulnerabilities
7694| [7831] OpenSSH Reverse DNS Lookup Access Control Bypass Vulnerability
7695| [7482] OpenSSH Remote Root Authentication Timing Side-Channel Weakness
7696| [7467] OpenSSH-portable Enabled PAM Delay Information Disclosure Vulnerability
7697| [7343] OpenSSH Authentication Execution Path Timing Information Leakage Weakness
7698| [6168] OpenSSH Visible Password Vulnerability
7699| [5374] OpenSSH Trojan Horse Vulnerability
7700| [5093] OpenSSH Challenge-Response Buffer Overflow Vulnerabilities
7701| [4560] OpenSSH Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
7702| [4241] OpenSSH Channel Code Off-By-One Vulnerability
7703| [3614] OpenSSH UseLogin Environment Variable Passing Vulnerability
7704| [3560] OpenSSH Kerberos Arbitrary Privilege Elevation Vulnerability
7705| [3369] OpenSSH Key Based Source IP Access Control Bypass Vulnerability
7706| [3345] OpenSSH SFTP Command Restriction Bypassing Vulnerability
7707| [2917] OpenSSH PAM Session Evasion Vulnerability
7708| [2825] OpenSSH Client X11 Forwarding Cookie Removal File Symbolic Link Vulnerability
7709| [2356] OpenSSH Private Key Authentication Check Vulnerability
7710| [1949] OpenSSH Client Unauthorized Remote Forwarding Vulnerability
7711| [1334] OpenSSH UseLogin Vulnerability
7712|
7713| IBM X-Force - https://exchange.xforce.ibmcloud.com:
7714| [83258] GSI-OpenSSH auth-pam.c security bypass
7715| [82781] OpenSSH time limit denial of service
7716| [82231] OpenSSH pam_ssh_agent_auth PAM code execution
7717| [74809] OpenSSH ssh_gssapi_parse_ename denial of service
7718| [72756] Debian openssh-server commands information disclosure
7719| [68339] OpenSSH pam_thread buffer overflow
7720| [67264] OpenSSH ssh-keysign unauthorized access
7721| [65910] OpenSSH remote_glob function denial of service
7722| [65163] OpenSSH certificate information disclosure
7723| [64387] OpenSSH J-PAKE security bypass
7724| [63337] Cisco Unified Videoconferencing OpenSSH weak security
7725| [46620] OpenSSH and multiple SSH Tectia products CBC mode information disclosure
7726| [45202] OpenSSH signal handler denial of service
7727| [44747] RHEL OpenSSH backdoor
7728| [44280] OpenSSH PermitRootLogin information disclosure
7729| [44279] OpenSSH sshd weak security
7730| [44037] OpenSSH sshd SELinux role unauthorized access
7731| [43940] OpenSSH X11 forwarding information disclosure
7732| [41549] OpenSSH ForceCommand directive security bypass
7733| [41438] OpenSSH sshd session hijacking
7734| [40897] OpenSSH known_hosts weak security
7735| [40587] OpenSSH username weak security
7736| [37371] OpenSSH username data manipulation
7737| [37118] RHSA update for OpenSSH privilege separation monitor authentication verification weakness not installed
7738| [37112] RHSA update for OpenSSH signal handler race condition not installed
7739| [37107] RHSA update for OpenSSH identical block denial of service not installed
7740| [36637] OpenSSH X11 cookie privilege escalation
7741| [35167] OpenSSH packet.c newkeys[mode] denial of service
7742| [34490] OpenSSH OPIE information disclosure
7743| [33794] OpenSSH ChallengeResponseAuthentication information disclosure
7744| [32975] Apple Mac OS X OpenSSH denial of service
7745| [32387] RHSA-2006:0738 updates for openssh not installed
7746| [32359] RHSA-2006:0697 updates for openssh not installed
7747| [32230] RHSA-2006:0298 updates for openssh not installed
7748| [32132] RHSA-2006:0044 updates for openssh not installed
7749| [30120] OpenSSH privilege separation monitor authentication verification weakness
7750| [29255] OpenSSH GSSAPI user enumeration
7751| [29254] OpenSSH signal handler race condition
7752| [29158] OpenSSH identical block denial of service
7753| [28147] Apple Mac OS X OpenSSH nonexistent user login denial of service
7754| [25116] OpenSSH OpenPAM denial of service
7755| [24305] OpenSSH SCP shell expansion command execution
7756| [22665] RHSA-2005:106 updates for openssh not installed
7757| [22117] OpenSSH GSSAPI allows elevated privileges
7758| [22115] OpenSSH GatewayPorts security bypass
7759| [20930] OpenSSH sshd.c LoginGraceTime denial of service
7760| [19441] Sun Solaris OpenSSH LDAP (1) client authentication denial of service
7761| [17213] OpenSSH allows port bouncing attacks
7762| [16323] OpenSSH scp file overwrite
7763| [13797] OpenSSH PAM information leak
7764| [13271] OpenSSH could allow an attacker to corrupt the PAM conversion stack
7765| [13264] OpenSSH PAM code could allow an attacker to gain access
7766| [13215] OpenSSH buffer management errors could allow an attacker to execute code
7767| [13214] OpenSSH memory vulnerabilities
7768| [13191] OpenSSH large packet buffer overflow
7769| [12196] OpenSSH could allow an attacker to bypass login restrictions
7770| [11970] OpenSSH could allow an attacker to obtain valid administrative account
7771| [11902] OpenSSH PAM support enabled information leak
7772| [9803] OpenSSH "
7773| [9763] OpenSSH downloaded from the OpenBSD FTP site or OpenBSD FTP mirror sites could contain a Trojan Horse
7774| [9307] OpenSSH is running on the system
7775| [9169] OpenSSH "
7776| [8896] OpenSSH Kerberos 4 TGT/AFS buffer overflow
7777| [8697] FreeBSD libutil in OpenSSH fails to drop privileges prior to using the login class capability database
7778| [8383] OpenSSH off-by-one error in channel code
7779| [7647] OpenSSH UseLogin option arbitrary code execution
7780| [7634] OpenSSH using sftp and restricted keypairs could allow an attacker to bypass restrictions
7781| [7598] OpenSSH with Kerberos allows attacker to gain elevated privileges
7782| [7179] OpenSSH source IP access control bypass
7783| [6757] OpenSSH "
7784| [6676] OpenSSH X11 forwarding symlink attack could allow deletion of arbitrary files
7785| [6084] OpenSSH 2.3.1 allows remote users to bypass authentication
7786| [5517] OpenSSH allows unauthorized access to resources
7787| [4646] OpenSSH UseLogin option allows remote users to execute commands as root
7788|
7789| Exploit-DB - https://www.exploit-db.com:
7790| [21579] OpenSSH 3.x Challenge-Response Buffer Overflow Vulnerabilities (2)
7791| [21578] OpenSSH 3.x Challenge-Response Buffer Overflow Vulnerabilities (1)
7792| [21402] OpenSSH 2.x/3.x Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
7793| [21314] OpenSSH 2.x/3.0.1/3.0.2 Channel Code Off-By-One Vulnerability
7794| [20253] OpenSSH 1.2 scp File Create/Overwrite Vulnerability
7795| [17462] FreeBSD OpenSSH 3.5p1 - Remote Root Exploit
7796| [14866] Novell Netware 6.5 - OpenSSH Remote Stack Overflow
7797| [6094] Debian OpenSSH Remote SELinux Privilege Elevation Exploit (auth)
7798| [3303] Portable OpenSSH <= 3.6.1p-PAM / 4.1-SUSE Timing Attack Exploit
7799| [2444] OpenSSH <= 4.3 p1 (Duplicated Block) Remote Denial of Service Exploit
7800| [1572] Dropbear / OpenSSH Server (MAX_UNAUTH_CLIENTS) Denial of Service
7801| [258] glibc-2.2 and openssh-2.3.0p1 exploits glibc => 2.1.9x
7802| [26] OpenSSH/PAM <= 3.6.1p1 Remote Users Ident (gossh.sh)
7803| [25] OpenSSH/PAM <= 3.6.1p1 Remote Users Discovery Tool
7804|
7805| OpenVAS (Nessus) - http://www.openvas.org:
7806| [902488] OpenSSH 'sshd' GSSAPI Credential Disclosure Vulnerability
7807| [900179] OpenSSH CBC Mode Information Disclosure Vulnerability
7808| [881183] CentOS Update for openssh CESA-2012:0884 centos6
7809| [880802] CentOS Update for openssh CESA-2009:1287 centos5 i386
7810| [880746] CentOS Update for openssh CESA-2009:1470 centos5 i386
7811| [870763] RedHat Update for openssh RHSA-2012:0884-04
7812| [870129] RedHat Update for openssh RHSA-2008:0855-01
7813| [861813] Fedora Update for openssh FEDORA-2010-5429
7814| [861319] Fedora Update for openssh FEDORA-2007-395
7815| [861170] Fedora Update for openssh FEDORA-2007-394
7816| [861012] Fedora Update for openssh FEDORA-2007-715
7817| [840345] Ubuntu Update for openssh vulnerability USN-597-1
7818| [840300] Ubuntu Update for openssh update USN-612-5
7819| [840271] Ubuntu Update for openssh vulnerability USN-612-2
7820| [840268] Ubuntu Update for openssh update USN-612-7
7821| [840259] Ubuntu Update for openssh vulnerabilities USN-649-1
7822| [840214] Ubuntu Update for openssh vulnerability USN-566-1
7823| [831074] Mandriva Update for openssh MDVA-2010:162 (openssh)
7824| [830929] Mandriva Update for openssh MDVA-2010:090 (openssh)
7825| [830807] Mandriva Update for openssh MDVA-2010:026 (openssh)
7826| [830603] Mandriva Update for openssh MDVSA-2008:098 (openssh)
7827| [830523] Mandriva Update for openssh MDVSA-2008:078 (openssh)
7828| [830317] Mandriva Update for openssh-askpass-qt MDKA-2007:127 (openssh-askpass-qt)
7829| [830191] Mandriva Update for openssh MDKSA-2007:236 (openssh)
7830| [802407] OpenSSH 'sshd' Challenge Response Authentication Buffer Overflow Vulnerability
7831| [103503] openssh-server Forced Command Handling Information Disclosure Vulnerability
7832| [103247] OpenSSH Ciphersuite Specification Information Disclosure Weakness
7833| [103064] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
7834| [100584] OpenSSH X Connections Session Hijacking Vulnerability
7835| [100153] OpenSSH CBC Mode Information Disclosure Vulnerability
7836| [66170] CentOS Security Advisory CESA-2009:1470 (openssh)
7837| [65987] SLES10: Security update for OpenSSH
7838| [65819] SLES10: Security update for OpenSSH
7839| [65514] SLES9: Security update for OpenSSH
7840| [65513] SLES9: Security update for OpenSSH
7841| [65334] SLES9: Security update for OpenSSH
7842| [65248] SLES9: Security update for OpenSSH
7843| [65218] SLES9: Security update for OpenSSH
7844| [65169] SLES9: Security update for openssh,openssh-askpass
7845| [65126] SLES9: Security update for OpenSSH
7846| [65019] SLES9: Security update for OpenSSH
7847| [65015] SLES9: Security update for OpenSSH
7848| [64931] CentOS Security Advisory CESA-2009:1287 (openssh)
7849| [61639] Debian Security Advisory DSA 1638-1 (openssh)
7850| [61030] Debian Security Advisory DSA 1576-2 (openssh)
7851| [61029] Debian Security Advisory DSA 1576-1 (openssh)
7852| [60840] FreeBSD Security Advisory (FreeBSD-SA-08:05.openssh.asc)
7853| [60803] Gentoo Security Advisory GLSA 200804-03 (openssh)
7854| [60667] Slackware Advisory SSA:2008-095-01 openssh
7855| [59014] Slackware Advisory SSA:2007-255-01 openssh
7856| [58741] Gentoo Security Advisory GLSA 200711-02 (openssh)
7857| [57919] Gentoo Security Advisory GLSA 200611-06 (openssh)
7858| [57895] Gentoo Security Advisory GLSA 200609-17 (openssh)
7859| [57585] Debian Security Advisory DSA 1212-1 (openssh (1:3.8.1p1-8.sarge.6))
7860| [57492] Slackware Advisory SSA:2006-272-02 openssh
7861| [57483] Debian Security Advisory DSA 1189-1 (openssh-krb5)
7862| [57476] FreeBSD Security Advisory (FreeBSD-SA-06:22.openssh.asc)
7863| [57470] FreeBSD Ports: openssh
7864| [56352] FreeBSD Security Advisory (FreeBSD-SA-06:09.openssh.asc)
7865| [56330] Gentoo Security Advisory GLSA 200602-11 (OpenSSH)
7866| [56294] Slackware Advisory SSA:2006-045-06 openssh
7867| [53964] Slackware Advisory SSA:2003-266-01 New OpenSSH packages
7868| [53885] Slackware Advisory SSA:2003-259-01 OpenSSH Security Advisory
7869| [53884] Slackware Advisory SSA:2003-260-01 OpenSSH updated again
7870| [53788] Debian Security Advisory DSA 025-1 (openssh)
7871| [52638] FreeBSD Security Advisory (FreeBSD-SA-03:15.openssh.asc)
7872| [52635] FreeBSD Security Advisory (FreeBSD-SA-03:12.openssh.asc)
7873| [11343] OpenSSH Client Unauthorized Remote Forwarding
7874| [10954] OpenSSH AFS/Kerberos ticket/token passing
7875| [10883] OpenSSH Channel Code Off by 1
7876| [10823] OpenSSH UseLogin Environment Variables
7877|
7878| SecurityTracker - https://www.securitytracker.com:
7879| [1028187] OpenSSH pam_ssh_agent_auth Module on Red Hat Enterprise Linux Lets Remote Users Execute Arbitrary Code
7880| [1026593] OpenSSH Lets Remote Authenticated Users Obtain Potentially Sensitive Information
7881| [1025739] OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code
7882| [1025482] OpenSSH ssh-keysign Utility Lets Local Users Gain Elevated Privileges
7883| [1025028] OpenSSH Legacy Certificates May Disclose Stack Contents to Remote Users
7884| [1022967] OpenSSH on Red Hat Enterprise Linux Lets Remote Authenticated Users Gain Elevated Privileges
7885| [1021235] OpenSSH CBC Mode Error Handling May Let Certain Remote Users Obtain Plain Text in Certain Cases
7886| [1020891] OpenSSH on Debian Lets Remote Users Prevent Logins
7887| [1020730] OpenSSH for Red Hat Enterprise Linux Packages May Have Been Compromised
7888| [1020537] OpenSSH on HP-UX Lets Local Users Hijack X11 Sessions
7889| [1019733] OpenSSH Unsafe Default Configuration May Let Local Users Execute Arbitrary Commands
7890| [1019707] OpenSSH Lets Local Users Hijack Forwarded X Sessions in Certain Cases
7891| [1017756] Apple OpenSSH Key Generation Process Lets Remote Users Deny Service
7892| [1017183] OpenSSH Privilege Separation Monitor Validation Error May Cause the Monitor to Fail to Properly Control the Unprivileged Process
7893| [1016940] OpenSSH Race Condition in Signal Handler Lets Remote Users Deny Service and May Potentially Permit Code Execution
7894| [1016939] OpenSSH GSSAPI Authentication Abort Error Lets Remote Users Determine Valid Usernames
7895| [1016931] OpenSSH SSH v1 CRC Attack Detection Implementation Lets Remote Users Deny Service
7896| [1016672] OpenSSH on Mac OS X Lets Remote Users Deny Service
7897| [1015706] OpenSSH Interaction With OpenPAM Lets Remote Users Deny Service
7898| [1015540] OpenSSH scp Double Shell Character Expansion During Local-to-Local Copying May Let Local Users Gain Elevated Privileges in Certain Cases
7899| [1014845] OpenSSH May Unexpectedly Activate GatewayPorts and Also May Disclose GSSAPI Credentials in Certain Cases
7900| [1011193] OpenSSH scp Directory Traversal Flaw Lets Remote SSH Servers Overwrite Files in Certain Cases
7901| [1011143] OpenSSH Default Configuration May Be Unsafe When Used With Anonymous SSH Services
7902| [1007791] Portable OpenSSH PAM free() Bug May Let Remote Users Execute Root Code
7903| [1007716] OpenSSH buffer_append_space() and Other Buffer Management Errors May Let Remote Users Execute Arbitrary Code
7904| [1006926] OpenSSH Host Access Restrictions Can Be Bypassed By Remote Users
7905| [1006688] OpenSSH Timing Flaw With Pluggable Authentication Modules Can Disclose Valid User Account Names to Remote Users
7906| [1004818] OpenSSH's Secure Shell (SSH) Implementation Weakness May Disclose User Passwords to Remote Users During Man-in-the-Middle Attacks
7907| [1004616] OpenSSH Integer Overflow and Buffer Overflow May Allow Remote Users to Gain Root Access to the System
7908| [1004391] OpenSSH 'BSD_AUTH' Access Control Bug May Allow Unauthorized Remote Users to Authenticated to the System
7909| [1004115] OpenSSH Buffer Overflow in Kerberos Ticket and AFS Token Processing Lets Local Users Execute Arbitrary Code With Root Level Permissions
7910| [1003758] OpenSSH Off-by-one 'Channels' Bug May Let Authorized Remote Users Execute Arbitrary Code with Root Privileges
7911| [1002895] OpenSSH UseLogin Environment Variable Bug Lets Local Users Execute Commands and Gain Root Access
7912| [1002748] OpenSSH 3.0 Denial of Service Condition May Allow Remote Users to Crash the sshd Daemon and KerberosV Configuration Error May Allow Remote Users to Partially Authenticate When Authentication Should Not Be Permitted
7913| [1002734] OpenSSH's S/Key Implementation Information Disclosure Flaw Provides Remote Users With Information About Valid User Accounts
7914| [1002455] OpenSSH May Fail to Properly Restrict IP Addresses in Certain Configurations
7915| [1002432] OpenSSH's Sftp-server Subsystem Lets Authorized Remote Users with Restricted Keypairs Obtain Additional Access on the Server
7916| [1001683] OpenSSH Allows Authorized Users to Delete Other User Files Named Cookies
7917|
7918| OSVDB - http://www.osvdb.org:
7919| [92034] GSI-OpenSSH auth-pam.c Memory Management Authentication Bypass
7920| [90474] Red Hat / Fedora PAM Module for OpenSSH Incorrect error() Function Calling Local Privilege Escalation
7921| [90007] OpenSSH logingracetime / maxstartup Threshold Connection Saturation Remote DoS
7922| [81500] OpenSSH gss-serv.c ssh_gssapi_parse_ename Function Field Length Value Parsing Remote DoS
7923| [78706] OpenSSH auth-options.c sshd auth_parse_options Function authorized_keys Command Option Debug Message Information Disclosure
7924| [75753] OpenSSH PAM Module Aborted Conversation Local Information Disclosure
7925| [75249] OpenSSH sftp-glob.c remote_glob Function Glob Expression Parsing Remote DoS
7926| [75248] OpenSSH sftp.c process_put Function Glob Expression Parsing Remote DoS
7927| [72183] Portable OpenSSH ssh-keysign ssh-rand-helper Utility File Descriptor Leak Local Information Disclosure
7928| [70873] OpenSSH Legacy Certificates Stack Memory Disclosure
7929| [69658] OpenSSH J-PAKE Public Parameter Validation Shared Secret Authentication Bypass
7930| [67743] Novell NetWare OpenSSH SSHD.NLM Absolute Path Handling Remote Overflow
7931| [59353] OpenSSH sshd Local TCP Redirection Connection Masking Weakness
7932| [58495] OpenSSH sshd ChrootDirectory Feature SetUID Hard Link Local Privilege Escalation
7933| [56921] OpenSSH Unspecified Remote Compromise
7934| [53021] OpenSSH on ftp.openbsd.org Trojaned Distribution
7935| [50036] OpenSSH CBC Mode Chosen Ciphertext 32-bit Chunk Plaintext Context Disclosure
7936| [49386] OpenSSH sshd TCP Connection State Remote Account Enumeration
7937| [48791] OpenSSH on Debian sshd Crafted Username Arbitrary Remote SELinux Role Access
7938| [47635] OpenSSH Packages on Red Hat Enterprise Linux Compromised Distribution
7939| [47227] OpenSSH X11UseLocalhost X11 Forwarding Port Hijacking
7940| [45873] Cisco WebNS SSHield w/ OpenSSH Crafted Large Packet Remote DoS
7941| [43911] OpenSSH ~/.ssh/rc ForceCommand Bypass Arbitrary Command Execution
7942| [43745] OpenSSH X11 Forwarding Local Session Hijacking
7943| [43371] OpenSSH Trusted X11 Cookie Connection Policy Bypass
7944| [39214] OpenSSH linux_audit_record_event Crafted Username Audit Log Injection
7945| [37315] pam_usb OpenSSH Authentication Unspecified Issue
7946| [34850] OpenSSH on Mac OS X Key Generation Remote Connection DoS
7947| [34601] OPIE w/ OpenSSH Account Enumeration
7948| [34600] OpenSSH S/KEY Authentication Account Enumeration
7949| [32721] OpenSSH Username Password Complexity Account Enumeration
7950| [30232] OpenSSH Privilege Separation Monitor Weakness
7951| [29494] OpenSSH packet.c Invalid Protocol Sequence Remote DoS
7952| [29266] OpenSSH GSSAPI Authentication Abort Username Enumeration
7953| [29264] OpenSSH Signal Handler Pre-authentication Race Condition Code Execution
7954| [29152] OpenSSH Identical Block Packet DoS
7955| [27745] Apple Mac OS X OpenSSH Nonexistent Account Login Enumeration DoS
7956| [23797] OpenSSH with OpenPAM Connection Saturation Forked Process Saturation DoS
7957| [22692] OpenSSH scp Command Line Filename Processing Command Injection
7958| [20216] OpenSSH with KerberosV Remote Authentication Bypass
7959| [19142] OpenSSH Multiple X11 Channel Forwarding Leaks
7960| [19141] OpenSSH GSSAPIAuthentication Credential Escalation
7961| [18236] OpenSSH no pty Command Execution Local PAM Restriction Bypass
7962| [16567] OpenSSH Privilege Separation LoginGraceTime DoS
7963| [16039] Solaris 108994 Series Patch OpenSSH LDAP Client Authentication DoS
7964| [9562] OpenSSH Default Configuration Anon SSH Service Port Bounce Weakness
7965| [9550] OpenSSH scp Traversal Arbitrary File Overwrite
7966| [6601] OpenSSH *realloc() Unspecified Memory Errors
7967| [6245] OpenSSH SKEY/BSD_AUTH Challenge-Response Remote Overflow
7968| [6073] OpenSSH on FreeBSD libutil Arbitrary File Read
7969| [6072] OpenSSH PAM Conversation Function Stack Modification
7970| [6071] OpenSSH SSHv1 PAM Challenge-Response Authentication Privilege Escalation
7971| [5536] OpenSSH sftp-server Restricted Keypair Restriction Bypass
7972| [5408] OpenSSH echo simulation Information Disclosure
7973| [5113] OpenSSH NIS YP Netgroups Authentication Bypass
7974| [4536] OpenSSH Portable AIX linker Privilege Escalation
7975| [3938] OpenSSL and OpenSSH /dev/random Check Failure
7976| [3456] OpenSSH buffer_append_space() Heap Corruption
7977| [2557] OpenSSH Multiple Buffer Management Multiple Overflows
7978| [2140] OpenSSH w/ PAM Username Validity Timing Attack
7979| [2112] OpenSSH Reverse DNS Lookup Bypass
7980| [2109] OpenSSH sshd Root Login Timing Side-Channel Weakness
7981| [1853] OpenSSH Symbolic Link 'cookies' File Removal
7982| [839] OpenSSH PAMAuthenticationViaKbdInt Challenge-Response Remote Overflow
7983| [781] OpenSSH Kerberos TGT/AFS Token Passing Remote Overflow
7984| [730] OpenSSH Channel Code Off by One Remote Privilege Escalation
7985| [688] OpenSSH UseLogin Environment Variable Local Command Execution
7986| [642] OpenSSH Multiple Key Type ACL Bypass
7987| [504] OpenSSH SSHv2 Public Key Authentication Bypass
7988| [341] OpenSSH UseLogin Local Privilege Escalation
7989|_
799025/tcp open smtp Exim smtpd 4.89
7991| vulscan: VulDB - https://vuldb.com:
7992| [109969] Exim 4.88/4.89 SMTP Daemon receive.c bdat_getc denial of service
7993| [109968] Exim 4.88/4.89 SMTP Daemon receive.c receive_msg memory corruption
7994| [94599] Exim up to 4.87 information disclosure
7995| [13422] Exim 4.82 Mail Header dmarc.c expand_string memory corruption
7996| [6817] Exim up to 4.80 src/dkim.c dkim_exim_query_dns_txt memory corruption
7997| [141327] Exim up to 4.92.1 Backslash privilege escalation
7998| [138827] Exim up to 4.92 Expansion Code Execution
7999| [135932] Exim up to 4.92 privilege escalation
8000| [113048] Exim up to 4.90 SMTP Listener Message memory corruption
8001| [58841] exim up to 4.69 dkim_exim_verify_finish memory corruption
8002| [57462] Exim up to 4.75 Filesystem memory corruption
8003| [4280] Exim Server 4.x open_log race condition
8004|
8005| MITRE CVE - https://cve.mitre.org:
8006| [CVE-2012-5671] Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.
8007| [CVE-2012-0478] The texImage2D implementation in the WebGL subsystem in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 does not properly restrict JSVAL_TO_OBJECT casts, which might allow remote attackers to execute arbitrary code via a crafted web page.
8008| [CVE-2011-1764] Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character.
8009| [CVE-2011-1407] The DKIM implementation in Exim 4.7x before 4.76 permits matching for DKIM identities to apply to lookup items, instead of only strings, which allows remote attackers to execute arbitrary code or access a filesystem via a crafted identity.
8010| [CVE-2011-0017] The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.
8011| [CVE-2010-4345] Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
8012| [CVE-2010-4344] Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.
8013| [CVE-2010-2024] transports/appendfile.c in Exim before 4.72, when MBX locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/.
8014| [CVE-2010-2023] transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user's file.
8015| [CVE-2006-1251] Argument injection vulnerability in greylistclean.cron in sa-exim 4.2 allows remote attackers to delete arbitrary files via an email with a To field that contains a filename separated by whitespace, which is not quoted when greylistclean.cron provides the argument to the rm command.
8016| [CVE-2005-0022] Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.
8017| [CVE-2005-0021] Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function.
8018| [CVE-2004-0400] Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.
8019| [CVE-2004-0399] Stack-based buffer overflow in Exim 3.35, and other versions before 4, when the sender_verify option is true, allows remote attackers to cause a denial of service and possibly execute arbitrary code during sender verification.
8020| [CVE-2003-0743] Heap-based buffer overflow in smtp_in.c for Exim 3 (exim3) before 3.36 and Exim 4 (exim4) before 4.21 may allow remote attackers to execute arbitrary code via an invalid (1) HELO or (2) EHLO argument with a large number of spaces followed by a NULL character and a newline, which is not properly trimmed before the "(no argument given)" string is appended to the buffer.
8021| [CVE-2002-1381] Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
8022|
8023| SecurityFocus - https://www.securityfocus.com/bid/:
8024| [103049] Exim 'base64d()' Function Buffer Overflow Vulnerability
8025| [99252] Exim CVE-2017-1000369 Local Privilege Escalation Vulnerability
8026| [94947] Exim CVE-2016-9963 Unspecified Information Disclosure Vulnerability
8027| [84132] Exim CVE-2016-1531 Local Privilege Escalation Vulnerability
8028| [68857] Exim CVE-2014-2972 Local Privilege Escalation Vulnerability
8029| [67695] Exim 'dmarc.c' Remote Code Execution Vulnerability
8030| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
8031| [56285] Exim DKIM DNS Decoding CVE-2012-5671 Remote Buffer Overflow Vulnerability
8032| [47836] Exim DKIM CVE-2011-1407 Remote Code Execution Vulnerability
8033| [47736] Exim 'dkim_exim_verify_finish()' Remote Format String Vulnerability
8034| [46065] Exim 'log.c' Local Privilege Escalation Vulnerability
8035| [45341] Exim ALT_CONFIG_ROOT_ONLY 'exim' User Local Privilege Escalation Vulnerability
8036| [45308] Exim Crafted Header Remote Code Execution Vulnerability
8037| [40454] Exim MBX Locking Insecure Temporary File Creation Vulnerability
8038| [40451] Exim Sticky Mail Directory Local Privilege Escalation Vulnerability
8039| [36181] ikiwiki 'teximg' Plugin Insecure TeX Commands Information Disclosure Vulnerability
8040| [23977] Exim SpamAssassin Reply Remote Buffer Overflow Vulnerability
8041| [17110] sa-exim Unauthorized File Access Vulnerability
8042| [12268] Exim IP Address Command Line Argument Local Buffer Overflow Vulnerability
8043| [12188] Exim SPA Authentication Remote Buffer Overflow Vulnerability
8044| [12185] Exim Illegal IPv6 Address Buffer Overflow Vulnerability
8045| [10291] Exim Header Syntax Checking Remote Stack Buffer Overrun Vulnerability
8046| [10290] Exim Sender Verification Remote Stack Buffer Overrun Vulnerability
8047| [8518] Exim EHLO/HELO Remote Heap Corruption Vulnerability
8048| [6314] Exim Internet Mailer Format String Vulnerability
8049| [4096] Exim Configuration File Argument Command Line Buffer Overflow Vulnerability
8050| [3728] Exim Pipe Hostname Arbitrary Command Execution Vulnerability
8051| [2828] Exim Format String Vulnerability
8052| [1859] Exim Buffer Overflow Vulnerability
8053|
8054| IBM X-Force - https://exchange.xforce.ibmcloud.com:
8055| [84758] Exim sender_address parameter command execution
8056| [84015] Exim command execution
8057| [80186] Mozilla Firefox, Thunderbird, and SeaMonkey copyTexImage2D code execution
8058| [80184] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D calls code execution
8059| [79615] Exim dkim_exim_query_dns_txt() buffer overflow
8060| [75155] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D denial of service
8061| [67455] Exim DKIM processing code execution
8062| [67299] Exim dkim_exim_verify_finish() format string
8063| [65028] Exim open_log privilege escalation
8064| [63967] Exim config file privilege escalation
8065| [63960] Exim header buffer overflow
8066| [59043] Exim mail directory privilege escalation
8067| [59042] Exim MBX symlink
8068| [52922] ikiwiki teximg plugin information disclosure
8069| [34265] Exim spamd buffer overflow
8070| [25286] Sa-exim greylistclean.cron file deletion
8071| [22687] RHSA-2005:025 updates for exim not installed
8072| [18901] Exim dns_build_reverse buffer overflow
8073| [18764] Exim spa_base64_to_bits function buffer overflow
8074| [18763] Exim host_aton buffer overflow
8075| [16079] Exim require_verify buffer overflow
8076| [16077] Exim header_check_syntax buffer overflow
8077| [16075] Exim sender_verify buffer overflow
8078| [13067] Exim HELO or EHLO command heap overflow
8079| [10761] Exim daemon.c format string
8080| [8194] Exim configuration file -c command-line argument buffer overflow
8081| [7738] Exim allows attacker to hide commands in localhost names using pipes
8082| [6671] Exim "
8083| [1893] Exim MTA allows local users to gain root privileges
8084|
8085| Exploit-DB - https://www.exploit-db.com:
8086| [16925] Exim4 <= 4.69 - string_format Function Heap Buffer Overflow
8087| [15725] Exim 4.63 Remote Root Exploit
8088| [1009] Exim <= 4.41 dns_build_reverse Local Exploit
8089| [812] Exim <= 4.43 auth_spa_server() Remote PoC Exploit
8090| [796] Exim <= 4.42 Local Root Exploit
8091| [756] Exim <= 4.41 dns_build_reverse Local Exploit PoC
8092|
8093| OpenVAS (Nessus) - http://www.openvas.org:
8094| [100663] Exim < 4.72 RC2 Multiple Vulnerabilities
8095|
8096| SecurityTracker - https://www.securitytracker.com:
8097| [1025539] Exim DKIM Processing Flaw Lets Remote Users Execute Arbitrary Code
8098| [1025504] Exim DKIM Signature Format String Flaw Lets Remote Users Execute Arbitrary Code
8099| [1024859] Exim Configuration File Capability Lets Local Users Gain Elevated Privileges
8100| [1024858] Exim Buffer Overfow in string_format() Lets Remote Users Execute Arbitrary Code
8101| [1012904] Exim Buffer Overflow in dns_build_reverse() Lets Local Users Obtain Elevated Privileges
8102| [1012771] Exim Buffer Overflows in host_aton() and spa_base64_to_bits() May Let Local Users Gain Elevated Privileges
8103| [1010081] Exim Buffer Overflows in 'accept.c' and 'verify.c' Let Remote Users Execute Arbitrary Code
8104| [1007609] Exim Heap Overflow in 'smtp_in.c' May Allow Remote Arbitrary Code Execution
8105| [1005756] Exim Mail Server Format String Bug Lets Local Exim Administrators Execute Arbitrary Code With Root Privileges
8106| [1003547] Potential Bug in Exim Mail Server May Let Local Users Execute Code With Root Privileges
8107| [1003014] Exim Mail Server Pipe Address Validation Error May Let Remote Users Execute Arbitrary Code With Root Privileges in a Certain Configuration
8108| [1001694] Exim Mail Server May Allow Remote Users to Execute Arbitrary Code with Root-Level Privileges on the Server
8109|
8110| OSVDB - http://www.osvdb.org:
8111| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
8112| [87599] Mozilla Multiple Product copyTexImage2D Call Image Dimension Handling Memory Corruption
8113| [87581] Mozilla Multiple Product texImage2D Call Handling Memory Corruption
8114| [86616] Exim src/dkim.c dkim_exim_query_dns_txt() Function DNS Record Parsing Remote Overflow
8115| [81523] Mozilla Multiple Product WebGL texImage2D() Function JSVAL_TO_OBJECT Remote Code Execution
8116| [72642] Exim DKIM Identity Lookup Item Remote Code Execution
8117| [72156] Exim src/dkim.c dkim_exim_verify_finish() Function DKIM-Signature Header Format String
8118| [70696] Exim log.c open_log() Function Local Privilege Escalation
8119| [69860] Exim exim User Account Configuration File Directive Local Privilege Escalation
8120| [69685] Exim string_format Function Remote Overflow
8121| [65159] Exim transports/appendfile.c MBX Locking Race Condition Permission Modification
8122| [65158] Exim transports/appendfile.c Hardlink Handling Arbitrary File Overwrite
8123| [57575] teximg Plugin for ikiwiki TEX Command Arbitrary File Local Disclosure
8124| [23849] sa-exim greylistclean.cron Arbitrary File Deletion
8125| [13073] Oracle Database Server Advanced Queuing Component dbms_transform_eximp Unspecified Security Issue
8126| [12946] Exim -bh Command Line Option dns_build_reverse Function Local Overflow
8127| [12727] Exim SPA Authentication spa_base64_to_bits Function Remote Overflow
8128| [12726] Exim -be Command Line Option host_aton Function Local Overflow
8129| [10877] Exim smtp_in.c HELO/EHLO Remote Overflow
8130| [10360] Exim daemon.c pid_file_path Variable Manipulation Arbitrary Command Execution
8131| [10032] libXpm CreateXImage Function Integer Overflow
8132| [7160] Exim .forward :include: Option Privilege Escalation
8133| [6479] Vexim COOKIE Authentication Credential Disclosure
8134| [6478] Vexim Multiple Parameter SQL Injection
8135| [5930] Exim Parenthesis File Name Filter Bypass
8136| [5897] Exim header_syntax Function Remote Overflow
8137| [5896] Exim sender_verify Function Remote Overflow
8138| [5530] Exim Localhost Name Arbitrary Command Execution
8139| [5330] Exim Configuration File Variable Overflow
8140| [1855] Exim Batched SMTP Mail Header Format String
8141|_
814253/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
8143| vulscan: VulDB - https://vuldb.com:
8144| [11804] ISC BIND up to 9.9.4 DNS Query bin/named/query.c query_findclosestnsec3 denial of service
8145| [11104] ISC BIND up to 9.9.4 WSAloctl Winsock API Bypass privilege escalation
8146| [9764] ISC BIND up to 9.9.4 RDATA rdata.c denial of service
8147| [119548] ISC BIND 9.9.12/9.10.7/9.11.3/9.12.1-P2 Recursion information disclosure
8148| [95202] ISC BIND up to 9.9.9-P4/9.10.4-P4/9.11.0-P1 DNSSEC denial of service
8149| [95201] ISC BIND up to 9.9.9-P4/9.10.4-P4/9.11.0-P1 DS Record Response denial of service
8150| [95200] ISC BIND up to 9.9.9-P4/9.10.4-P4/9.11.0-P1 ANY Query Response denial of service
8151| [89850] ISC BIND up to 9.9.9-P1/9.10.4-P1/9.11.0b1 Lightweight Resolution named.conf denial of service
8152| [81312] ISC BIND up to 9.9.8-P3/9.10.3-P3 named db.c/resolver.c Signature Record denial of service
8153| [81311] ISC BIND up to 9.9.8-P3/9.10.3-P3 named alist.c/sexpr.c denial of service
8154| [80787] ISC BIND up to 9.9.8-S4 Query rdataset.c denial of service
8155| [79802] ISC BIND 9.9.0/9.10.0/9.10.1-P1 Socket Error resolver.c denial of service
8156| [79801] ISC BIND 9.9.0/9.10.0/9.10.1-P1 Response db.c denial of service
8157| [76834] ISC BIND up to 9.9.7-P1/9.10.2-P2 TKEY Query Packet Crash denial of service
8158| [8108] ISC BIND up to 9.9.3 on Unix/Linux Regular Expression denial of service
8159| [7079] ISC BIND up to 9.9.1 DNS64 IPv6 Transition Mechanism denial of service
8160| [6295] ISC BIND up to 9.9.1-P2 Assertion Error Resource Record Parser RDATA Query denial of service
8161| [5875] ISC BIND 9.9.0/9.9.1 denial of service
8162| [5874] ISC BIND up to 9.9.1-P1 denial of service
8163| [5483] ISC BIND up to 9.9.1 DNS Resource Record information disclosure
8164|
8165| MITRE CVE - https://cve.mitre.org:
8166| [CVE-2013-4854] The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
8167| [CVE-2013-3919] resolver.c in ISC BIND 9.8.5 before 9.8.5-P1, 9.9.3 before 9.9.3-P1, and 9.6-ESV-R9 before 9.6-ESV-R9-P1, when a recursive resolver is configured, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a record in a malformed zone.
8168| [CVE-2013-2266] libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
8169| [CVE-2012-5689] ISC BIND 9.8.x through 9.8.4-P1 and 9.9.x through 9.9.2-P1, in certain configurations involving DNS64 with a Response Policy Zone that lacks an AAAA rewrite rule, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for an AAAA record.
8170| [CVE-2012-5688] ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
8171| [CVE-2012-5166] ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
8172| [CVE-2012-4244] ISC BIND 9.x before 9.7.6-P3, 9.8.x before 9.8.3-P3, 9.9.x before 9.9.1-P3, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P3 allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a long resource record.
8173| [CVE-2012-3868] Race condition in the ns_client structure management in ISC BIND 9.9.x before 9.9.1-P2 allows remote attackers to cause a denial of service (memory consumption or process exit) via a large volume of TCP queries.
8174| [CVE-2012-1667] ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record.
8175| [CVE-2011-4313] query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.
8176| [CVE-2011-2465] Unspecified vulnerability in ISC BIND 9 9.8.0, 9.8.0-P1, 9.8.0-P2, and 9.8.1b1, when recursion is enabled and the Response Policy Zone (RPZ) contains DNAME or certain CNAME records, allows remote attackers to cause a denial of service (named daemon crash) via an unspecified query.
8177| [CVE-2011-2464] Unspecified vulnerability in ISC BIND 9 9.6.x before 9.6-ESV-R4-P3, 9.7.x before 9.7.3-P3, and 9.8.x before 9.8.0-P4 allows remote attackers to cause a denial of service (named daemon crash) via a crafted UPDATE request.
8178|
8179| SecurityFocus - https://www.securityfocus.com/bid/:
8180| [61774] ISC BIND 9 SRTT Algorithm Authoritative Server Selection Security Vulnerability
8181| [61479] ISC BIND 9 DNS RDATA Handling CVE-2013-4854 Remote Denial of Service Vulnerability
8182| [58736] ISC BIND 9 'libdns' Remote Denial of Service Vulnerability
8183| [57556] ISC BIND 9 DNS64 CVE-2012-5689 Remote Denial of Service Vulnerability
8184| [56817] ISC BIND 9 DNS64 Remote Denial of Service Vulnerability
8185| [55852] ISC BIND 9 DNS RDATA Handling CVE-2012-5166 Remote Denial of Service Vulnerability
8186| [55522] ISC BIND 9 DNS Resource Records Handling CVE-2012-4244 Remote Denial of Service Vulnerability
8187| [54659] ISC BIND 9 TCP Query Remote Denial of Service Vulnerability
8188| [54658] ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability
8189| [53772] ISC BIND 9 DNS Resource Records Handling Remote Denial of Service Vulnerability
8190| [50690] ISC BIND 9 Recursive Queries Remote Denial of Service Vulnerability
8191| [48566] ISC BIND 9 Unspecified Packet Processing Remote Denial of Service Vulnerability
8192| [48565] ISC BIND 9 RPZ Configurations Remote Denial of Service Vulnerabilities
8193| [48007] ISC BIND 9 Large RRSIG RRsets Remote Denial of Service Vulnerability
8194| [47734] ISC BIND 9 RRSIG Query Type Remote Denial of Service Vulnerability
8195| [46491] ISC BIND 9 IXFR Transfer/DDNS Update Remote Denial of Service Vulnerability
8196| [45385] ISC BIND 9 DNSSEC Validation Remote Denial of Service Vulnerability
8197| [45133] ISC BIND 9 'RRSIG' Record Type Negative Cache Remote Denial of Service Vulnerability
8198| [41730] ISC BIND 9 'RRSIG' Record Type Remote Denial of Service Vulnerability
8199| [37865] ISC BIND 9 DNSSEC Bogus NXDOMAIN Response Remote Cache Poisoning Vulnerability
8200| [37118] ISC BIND 9 DNSSEC Query Response Additional Section Remote Cache Poisoning Vulnerability
8201| [35848] ISC BIND 9 Remote Dynamic Update Message Denial of Service Vulnerability
8202| [25076] ISC BIND 9 Default ACL Settings Recursive Queries And Cached Content Security Bypass Vulnerability
8203| [25037] ISC BIND 9 Remote Cache Poisoning Vulnerability
8204| [4936] ISC BIND 9 Remote Denial Of Service Vulnerability
8205| [100656] Cisco ASR 920 Series Routers CVE-2017-6795 Local Arbitrary File Overwrite Vulnerability
8206| [97450] Cisco ASR 903 and ASR 920 Series CVE-2017-6603 Denial of Service Vulnerability
8207| [93415] Cisco Nexus 9000 Series Switches CVE-2016-1455 Remote Information Disclosure Vulnerability
8208| [82579] Cisco Nexus 9000 Series ACI Mode Switches CVE-2015-6398 Denial of Service Vulnerability
8209| [77686] Cisco Firepower 9000 Series CVE-2015-6380 Unspecified OS Command Injection Vulnerability
8210| [77635] Cisco Firepower 9000 Series CVE-2015-6371 Multiple Arbitrary File Read Vulnerabilities
8211| [77634] Cisco Firepower 9000 Series CVE-2015-6370 Local Command Injection Vulnerability
8212| [77633] Cisco Firepower 9000 Series Switches CVE-2015-6372 HTML Injection Vulnerability
8213| [77631] Cisco Firepower 9000 Series Switches CVE-2015-6374 Clickjacking Vulnerability
8214| [77629] Cisco Firepower 9000 Series CVE-2015-6369 Local Denial of Service Vulnerability
8215| [77628] Cisco Firepower 9000 CVE-2015-6373 Cross Site Request Forgery Vulnerability
8216| [77614] Cisco Firepower 9000 Series Switches CVE-2015-6368 Information Disclosure Vulnerability
8217| [76913] Cisco NX-OS Software for Nexus 9000 Series Switches CVE-2015-6308 Denial of Service Vulnerability
8218| [76791] Cisco ASR 9000 Series Aggregation Services Routers CVE-2015-6301 Denial of Service Vulnerability
8219| [76762] Cisco NX-OS Software for Nexus 9000 Series CVE-2015-6295 Denial of Service Vulnerability
8220| [76329] Cisco Nexus 9000 Series Software CVE-2015-4301 Remote Denial of Service Vulnerability
8221| [76057] Cisco Firepower 9000 Series Devices CVE-2015-4287 Information Disclosure Vulnerability
8222| [75471] Cisco Unified IP Phones 9900 Series CVE-2015-4226 Denial of Service Vulnerability
8223| [75378] Cisco NX-OS Software for Nexus 9000 Series CVE-2015-4213 Information Disclosure Vulnerability
8224| [74029] Cisco ASR 9000 Series Routers CVE-2015-0694 Remote Security Bypass Vulnerability
8225| [73895] Cisco NX-OS Software for Nexus 9000 Series CVE-2015-0686 Denial of Service Vulnerability
8226| [73470] Cisco ASR 9000 Series Routers CVE-2015-0685 Denial of Service Vulnerability
8227| [73318] Cisco ASR 9000 Series Aggregation Services Routers CVE-2015-0672 Denial of Service Vulnerability
8228| [72485] Cisco Unified IP Phones 9900 Series CVE-2015-0604 Arbitrary File Upload Vulnerability
8229| [72484] Cisco Unified IP Phones 9900 Series CVE-2015-0603 Local Denial of Service Vulnerability
8230| [72483] Cisco Unified IP Phones 9900 Series CVE-2015-0601 Local Denial of Service Vulnerability
8231| [72482] Cisco Unified IP Phones 9900 Series CVE-2015-0602 Information Disclosure Vulnerability
8232| [72481] Cisco Unified IP Phones 9900 Series CVE-2015-0600 Denial of Service Vulnerability
8233| [71979] Cisco MDS 9000 NX-OS Software CVE-2015-0582 Denial of Service Vulnerability
8234| [70744] Cisco ASR 901 Series Routers CVE-2014-3293 Denial of Service Vulnerability
8235| [70658] ZTE ZXDSL 931VII 'manager_dev_config_t.gch' Information Disclosure Vulnerability
8236| [69057] Cisco Nexus 9000 Series Switches CVE-2014-3330 Access List Security Bypass Vulnerability
8237| [64770] Cisco Unified IP Phones 9900 Series Crafted Header Unregister Denial of Service Vulnerability
8238| [63564] Cisco MDS 9000 NX-OS Software VRRP Frames Denial of Service Vulnerability
8239| [62944] Cisco Unified IP Phones 9900 Series CVE-2013-5532 Buffer Overflow Vulnerability
8240| [62943] Cisco Unified IP Phones 9900 Series CVE-2013-5533 Local Command Injection Vulnerability
8241| [62905] Cisco Unified IP Phones 9900 Series CVE-2013-5526 Denial of Service Vulnerability
8242| [61330] Cisco Unified IP Phones 9900 Series CVE-2013-3426 Arbitrary File Download Vulnerability
8243| [49633] Oracle Application Server 9i 'httpd.conf' Information Disclosure Vulnerability
8244| [48811] Cisco ASR 9000 Series Routers IP Version 4 Denial of Service Vulnerability
8245| [48264] Aastra 9480i CT Multiple Information Disclosure Vulnerabilities
8246| [15542] NetObjects Fusion 9 Information Disclosure Vulnerability
8247| [6556] Oracle 9i Application Server Sample Scripts Information Disclosure Vulnerability
8248| [6459] Oracle 9i Application Server Java Server Page Source Code Disclosure Vulnerability
8249| [5335] Multiple Lucent Router UDP Port 9 Information Disclosure Vulnerability
8250| [4290] Oracle 9i Default Configuration File Information Disclosure Vulnerability
8251| [4034] Oracle 9IAS OracleJSP Information Disclosure Vulnerability
8252| [3848] Mandrake Bind 9 Package Insecure File Permissions Vulnerability
8253| [2516] Microsoft Plus! 98 Windows ME Password Disclosure Vulnerability
8254|
8255| IBM X-Force - https://exchange.xforce.ibmcloud.com:
8256| [85799] Cisco Unified IP Phones 9900 Series directory traversal
8257| [75412] Cisco Unified IP Phones 9900 series RT privilege escalation
8258| [68733] Cisco 9000 Series Aggregation Service Router IPv4 packet denial of service
8259| [9704] Multiple Lucent router UDP port 9 could disclose sensitive information
8260| [9250] BIND 9 dns_message_findtype() denial of service
8261| [1852] BIND prior to 4.9.7 buffer overflow affects Digital Firewall 97 users
8262| [539] Microsoft Windows 95 and Internet Explorer password disclosure
8263| [86004] ISC BIND RDATA denial of service
8264| [84767] ISC BIND denial of service
8265| [83066] ISC BIND denial of service
8266| [81504] ISC BIND AAAA denial of service
8267| [80510] ISC BIND DNS64 denial of service
8268| [79121] ISC BIND queries denial of service
8269| [78479] ISC BIND RDATA denial of service
8270| [77185] ISC BIND TCP queries denial of service
8271| [77184] ISC BIND bad cache denial of service
8272| [76034] ISC BIND rdata denial of service
8273| [73053] ISC BIND cache update policy security bypass
8274| [71332] ISC BIND recursive queries denial of service
8275| [68375] ISC BIND UPDATE denial of service
8276| [68374] ISC BIND Response Policy Zones denial of service
8277| [67665] ISC BIND RRSIG Rrsets denial of service
8278| [67297] ISC BIND RRSIG denial of service
8279| [65554] ISC BIND IXFR transfer denial of service
8280| [63602] ISC BIND allow-query security bypass
8281| [63596] ISC BIND zone data security bypass
8282| [63595] ISC BIND RRSIG denial of service
8283| [62072] ISC BIND DNSSEC query denial of service
8284| [62071] ISC BIND ACL security bypass
8285| [61871] ISC BIND anchors denial of service
8286| [60421] ISC BIND RRSIG denial of service
8287| [56049] ISC BIND out-of-bailiwick weak security
8288| [55937] ISC Bind unspecified cache poisoning
8289| [55753] ISC BIND DNSSEC NSEC/NSEC3 cache poisoning
8290| [54416] ISC BIND DNSSEC cache poisoning
8291| [52073] ISC BIND dns_db_findrdataset() denial of service
8292| [47409] Multiple Mozilla products XBL loadBindingDocument information disclosure
8293| [45234] ISC BIND UDP denial of service
8294| [39670] ISC BIND inet_network buffer overflow
8295| [37233] libgssapi ISC BIND Novell SUSE Linux Enterprise Server GSS-TSIG request denial of service
8296| [37128] RHSA update for ISC BIND RRset denial of service not installed
8297| [37127] RHSA update for ISC BIND named service denial of service not installed
8298| [36275] ISC BIND DNS query spoofing
8299| [35575] ISC BIND query ID cache poisoning
8300| [35571] ISC BIND ACL security bypass
8301| [31838] ISC BIND RRset denial of service
8302| [31799] ISC BIND named service denial of service
8303| [29876] HP Tru64 ypbind core dump information disclosure
8304| [28745] ISC BIND DNSSEC RRset denial of service
8305| [28744] ISC BIND recursive INSIST denial of service
8306| [22041] BEA WebLogic Server and Express LDAP anonymous bind information disclosure
8307| [18836] BIND hostname disclosure
8308| [10624] ISC BIND DNS stub resolver library (libresolv.a) stack buffer overflows
8309| [10333] ISC BIND SIG null pointer dereference denial of service
8310| [10332] ISC BIND OPT resource record (RR) denial of service
8311| [10304] ISC BIND SIG cached resource records (RR) heap buffer overflow
8312| [7027] Cisco CBOS Web-based configuration utility binds to port 80 by default
8313| [5814] ISC BIND "
8314| [5540] ISC BIND can be remotely crashed by issuing ZXFR requests
8315| [5462] ISC BIND AXFR host command remote buffer overflow
8316|
8317| Exploit-DB - https://www.exploit-db.com:
8318| [24689] cPanel 9.9.1 -R3 Front Page Extension Installation Information Disclosure
8319| [23059] Netbula Anyboard 9.9.5 6 Information Disclosure Vulnerability
8320| [9300] ISC BIND 9 Remote Dynamic Update Message Denial of Service PoC
8321|
8322| OpenVAS (Nessus) - http://www.openvas.org:
8323| [103090] ISC BIND 9 IXFR Transfer/DDNS Update Remote Denial of Service Vulnerability
8324| [103031] ISC BIND 9 < 9.7.2-P2 Multiple Vulnerabilities
8325| [103030] ISC BIND 9 'RRSIG' Record Type Negative Cache Remote Denial of Service Vulnerability
8326| [100717] ISC BIND 9 'RRSIG' Record Type Remote Denial of Service Vulnerability
8327| [100458] ISC BIND 9 DNSSEC Bogus NXDOMAIN Response Remote Cache Poisoning Vulnerability
8328| [100362] ISC BIND 9 DNSSEC Query Response Additional Section Remote Cache Poisoning Vulnerability
8329| [100251] ISC BIND 9 Remote Dynamic Update Message Denial of Service Vulnerability
8330| [63208] Fedora Core 9 FEDORA-2009-0350 (bind)
8331| [11226] Oracle 9iAS default error information disclosure
8332|
8333| SecurityTracker - https://www.securitytracker.com:
8334| [1025811] Cisco ASR 9000 Series Router IPv4 Packet Processing Flaw Lets Remote Users Deny Service
8335| [1012995] BIND 9 Validator Assumption Error May Let Remote Users Deny Service
8336| [1005048] Oracle Enterprise Manager Web Service Component of Oracle 9i Application Server Discloses the Web Cache Administrator Password to Local Users
8337| [1003675] Oracle 9iAS Application Server Discloses CGI-BIN Script Source Code to Remote Users
8338| [1001186] Microsoft Windows Me Operating System and Windows 98 with the Plus! 98 Package Disclose Data Compression Passwords
8339| [1028901] (McAfee Issues Advisory for McAfee Email Gateway) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
8340| [1028900] (McAfee Issues Advisory for McAfee Email and Web Security Appliance) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
8341| [1028899] (McAfee Issues Fix for McAfee Web Gateway) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
8342| [1028866] (McAfee Issues Fix for McAfee Firewall Enterprise) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
8343| [1028854] (NetBSD Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
8344| [1028849] (Red Hat Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
8345| [1028848] (Red Hat Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
8346| [1028839] (FreeBSD Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
8347| [1028838] ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
8348| [1028632] ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against Recursive Resolvers
8349| [1028046] ISC BIND DNS64 and Response Policy Zones (RPZ) Bug Lets Remote Users Deny Service
8350| [1027835] ISC BIND DNS64 Bug Lets Remote Users Deny Service
8351| [1027642] ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service
8352| [1027529] ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service
8353| [1026647] ISC BIND Cache Update Policy Can Be Bypassed to Allow Revoked Domain Names to Remain Resolvable
8354| [1026335] ISC BIND Invalid Record Caching Flaw Lets Remote Users Deny Service
8355| [1025743] ISC BIND Response Policy Zones DNAME/CNAME Processing Flaw Lets Remote Users Deny Service
8356| [1025742] ISC BIND Packet Processing Flaw Lets Remote Users Deny Service
8357| [1015850] Samba winbindd Daemon Discloses Server Password to Local Users
8358| [1003359] BindView NETinventory Discloses Password to Local Users During Auditing
8359| [1001721] BIND Domain Name System Software May Disclose DNS Transactional Signature (TSIG) Keys to Local Users
8360|
8361| OSVDB - http://www.osvdb.org:
8362| [86219] Cardiac Science G3 Plus 9390A-501 AED AEDUpdate Cleartext Password Local Disclosure
8363| [22517] MPN HP-180W Wireless IP Phone UDP Port 9090 Information Disclosure
8364| [22516] ZyXEL P-2000W_v2 VoIP Wi-Fi Phone UDP Port 9090 Information Disclosure
8365| [21292] ZyXEL P2000W UDP 9090 Remote Information Disclosure
8366|_
836780/tcp open http nginx
8368| vulscan: VulDB - https://vuldb.com:
8369| [133852] Sangfor Sundray WLAN Controller up to 3.7.4.2 Cookie Header nginx_webconsole.php Code Execution
8370| [132132] SoftNAS Cloud 4.2.0/4.2.1 Nginx privilege escalation
8371| [131858] Puppet Discovery up to 1.3.x Nginx Container weak authentication
8372| [130644] Nginx Unit up to 1.7.0 Router Process Request Heap-based memory corruption
8373| [127759] VeryNginx 0.3.3 Web Application Firewall privilege escalation
8374| [126525] nginx up to 1.14.0/1.15.5 ngx_http_mp4_module Loop denial of service
8375| [126524] nginx up to 1.14.0/1.15.5 HTTP2 CPU Exhaustion denial of service
8376| [126523] nginx up to 1.14.0/1.15.5 HTTP2 Memory Consumption denial of service
8377| [119845] Pivotal Operations Manager up to 2.0.13/2.1.5 Nginx privilege escalation
8378| [114368] SuSE Portus 2.3 Nginx Certificate weak authentication
8379| [103517] nginx up to 1.13.2 Range Filter Request Integer Overflow memory corruption
8380| [89849] nginx RFC 3875 Namespace Conflict Environment Variable Open Redirect
8381| [87719] nginx up to 1.11.0 ngx_files.c ngx_chain_to_iovec denial of service
8382| [80760] nginx 0.6.18/1.9.9 DNS CNAME Record Crash denial of service
8383| [80759] nginx 0.6.18/1.9.9 DNS CNAME Record Use-After-Free denial of service
8384| [80758] nginx 0.6.18/1.9.9 DNS UDP Packet Crash denial of service
8385| [67677] nginx up to 1.7.3 SSL weak authentication
8386| [67296] nginx up to 1.7.3 SMTP Proxy ngx_mail_smtp_starttls privilege escalation
8387| [12822] nginx up to 1.5.11 SPDY SPDY Request Heap-based memory corruption
8388| [12824] nginx 1.5.10 on 32-bit SPDY memory corruption
8389| [11237] nginx up to 1.5.6 URI String Bypass privilege escalation
8390| [65364] nginx up to 1.1.13 Default Configuration information disclosure
8391| [8671] nginx up to 1.4 proxy_pass denial of service
8392| [8618] nginx 1.3.9/1.4.0 http/ngx_http_parse.c ngx_http_parse_chunked() memory corruption
8393| [7247] nginx 1.2.6 Proxy Function spoofing
8394| [61434] nginx 1.2.0/1.3.0 on Windows Access Restriction privilege escalation
8395| [5293] nginx up to 1.1.18 ngx_http_mp4_module MP4 File memory corruption
8396| [4843] nginx up to 1.0.13/1.1.16 HTTP Header Response Parser ngx_http_parse.c information disclosure
8397| [59645] nginx up to 0.8.9 Heap-based memory corruption
8398| [53592] nginx 0.8.36 memory corruption
8399| [53590] nginx up to 0.8.9 unknown vulnerability
8400| [51533] nginx 0.7.64 Terminal privilege escalation
8401| [50905] nginx up to 0.8.9 directory traversal
8402| [50903] nginx up to 0.8.10 NULL Pointer Dereference denial of service
8403| [50043] nginx up to 0.8.10 memory corruption
8404|
8405| MITRE CVE - https://cve.mitre.org:
8406| [CVE-2013-2070] http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
8407| [CVE-2013-2028] The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.
8408| [CVE-2012-3380] Directory traversal vulnerability in naxsi-ui/nx_extract.py in the Naxsi module before 0.46-1 for Nginx allows local users to read arbitrary files via unspecified vectors.
8409| [CVE-2012-2089] Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
8410| [CVE-2012-1180] Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
8411| [CVE-2011-4963] nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
8412| [CVE-2011-4315] Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
8413| [CVE-2010-2266] nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.
8414| [CVE-2010-2263] nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
8415| [CVE-2009-4487] nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
8416| [CVE-2009-3898] Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method.
8417| [CVE-2009-3896] src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI.
8418| [CVE-2009-2629] Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.
8419|
8420| SecurityFocus - https://www.securityfocus.com/bid/:
8421| [99534] Nginx CVE-2017-7529 Remote Integer Overflow Vulnerability
8422| [93903] Nginx CVE-2016-1247 Remote Privilege Escalation Vulnerability
8423| [91819] Nginx CVE-2016-1000105 Security Bypass Vulnerability
8424| [90967] nginx CVE-2016-4450 Denial of Service Vulnerability
8425| [82230] nginx Multiple Denial of Service Vulnerabilities
8426| [78928] Nginx CVE-2010-2266 Denial-Of-Service Vulnerability
8427| [70025] nginx CVE-2014-3616 SSL Session Fixation Vulnerability
8428| [69111] nginx SMTP Proxy Remote Command Injection Vulnerability
8429| [67507] nginx SPDY Implementation CVE-2014-0088 Arbitrary Code Execution Vulnerability
8430| [66537] nginx SPDY Implementation Heap Based Buffer Overflow Vulnerability
8431| [63814] nginx CVE-2013-4547 URI Processing Security Bypass Vulnerability
8432| [59824] Nginx CVE-2013-2070 Remote Security Vulnerability
8433| [59699] nginx 'ngx_http_parse.c' Stack Buffer Overflow Vulnerability
8434| [59496] nginx 'ngx_http_close_connection()' Remote Integer Overflow Vulnerability
8435| [59323] nginx NULL-Byte Arbitrary Code Execution Vulnerability
8436| [58105] Nginx 'access.log' Insecure File Permissions Vulnerability
8437| [57139] nginx CVE-2011-4968 Man in The Middle Vulnerability
8438| [55920] nginx CVE-2011-4963 Security Bypass Vulnerability
8439| [54331] Nginx Naxsi Module 'nx_extract.py' Script Remote File Disclosure Vulnerability
8440| [52999] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
8441| [52578] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
8442| [50710] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
8443| [40760] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
8444| [40434] nginx Space String Remote Source Code Disclosure Vulnerability
8445| [40420] nginx Directory Traversal Vulnerability
8446| [37711] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
8447| [36839] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
8448| [36490] nginx WebDAV Multiple Directory Traversal Vulnerabilities
8449| [36438] nginx Proxy DNS Cache Domain Spoofing Vulnerability
8450| [36384] nginx HTTP Request Remote Buffer Overflow Vulnerability
8451|
8452| IBM X-Force - https://exchange.xforce.ibmcloud.com:
8453| [84623] Phusion Passenger gem for Ruby with nginx configuration insecure permissions
8454| [84172] nginx denial of service
8455| [84048] nginx buffer overflow
8456| [83923] nginx ngx_http_close_connection() integer overflow
8457| [83688] nginx null byte code execution
8458| [83103] Naxsi module for Nginx naxsi_unescape_uri() function security bypass
8459| [82319] nginx access.log information disclosure
8460| [80952] nginx SSL spoofing
8461| [77244] nginx and Microsoft Windows request security bypass
8462| [76778] Naxsi module for Nginx nx_extract.py directory traversal
8463| [74831] nginx ngx_http_mp4_module.c buffer overflow
8464| [74191] nginx ngx_cpystrn() information disclosure
8465| [74045] nginx header response information disclosure
8466| [71355] nginx ngx_resolver_copy() buffer overflow
8467| [59370] nginx characters denial of service
8468| [59369] nginx DATA source code disclosure
8469| [59047] nginx space source code disclosure
8470| [58966] nginx unspecified directory traversal
8471| [54025] nginx ngx_http_parse.c denial of service
8472| [53431] nginx WebDAV component directory traversal
8473| [53328] Nginx CRC-32 cached domain name spoofing
8474| [53250] Nginx ngx_http_parse_complex_uri() function code execution
8475|
8476| Exploit-DB - https://www.exploit-db.com:
8477| [26737] nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
8478| [25775] Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
8479| [25499] nginx 1.3.9-1.4.0 DoS PoC
8480| [24967] nginx 0.6.x Arbitrary Code Execution NullByte Injection
8481| [14830] nginx 0.6.38 - Heap Corruption Exploit
8482| [13822] Nginx <= 0.7.65 / 0.8.39 (dev) Source Disclosure / Download Vulnerability
8483| [13818] Nginx 0.8.36 Source Disclosure and DoS Vulnerabilities
8484| [12804] nginx [engine x] http server <= 0.6.36 Path Draversal
8485| [9901] nginx 0.7.0-0.7.61, 0.6.0-0.6.38, 0.5.0-0.5.37, 0.4.0-0.4.14 PoC
8486| [9829] nginx 0.7.61 WebDAV directory traversal
8487|
8488| OpenVAS (Nessus) - http://www.openvas.org:
8489| [864418] Fedora Update for nginx FEDORA-2012-3846
8490| [864310] Fedora Update for nginx FEDORA-2012-6238
8491| [864209] Fedora Update for nginx FEDORA-2012-6411
8492| [864204] Fedora Update for nginx FEDORA-2012-6371
8493| [864121] Fedora Update for nginx FEDORA-2012-4006
8494| [864115] Fedora Update for nginx FEDORA-2012-3991
8495| [864065] Fedora Update for nginx FEDORA-2011-16075
8496| [863654] Fedora Update for nginx FEDORA-2011-16110
8497| [861232] Fedora Update for nginx FEDORA-2007-1158
8498| [850180] SuSE Update for nginx openSUSE-SU-2012:0237-1 (nginx)
8499| [831680] Mandriva Update for nginx MDVSA-2012:043 (nginx)
8500| [802045] 64-bit Debian Linux Rootkit with nginx Doing iFrame Injection
8501| [801636] nginx HTTP Request Remote Buffer Overflow Vulnerability
8502| [103470] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
8503| [103469] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
8504| [103344] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
8505| [100676] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
8506| [100659] nginx Directory Traversal Vulnerability
8507| [100658] nginx Space String Remote Source Code Disclosure Vulnerability
8508| [100441] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
8509| [100321] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
8510| [100277] nginx Proxy DNS Cache Domain Spoofing Vulnerability
8511| [100276] nginx HTTP Request Remote Buffer Overflow Vulnerability
8512| [100275] nginx WebDAV Multiple Directory Traversal Vulnerabilities
8513| [71574] Gentoo Security Advisory GLSA 201206-07 (nginx)
8514| [71308] Gentoo Security Advisory GLSA 201203-22 (nginx)
8515| [71297] FreeBSD Ports: nginx
8516| [71276] FreeBSD Ports: nginx
8517| [71239] Debian Security Advisory DSA 2434-1 (nginx)
8518| [66451] Fedora Core 11 FEDORA-2009-12782 (nginx)
8519| [66450] Fedora Core 10 FEDORA-2009-12775 (nginx)
8520| [66449] Fedora Core 12 FEDORA-2009-12750 (nginx)
8521| [64924] Gentoo Security Advisory GLSA 200909-18 (nginx)
8522| [64912] Fedora Core 10 FEDORA-2009-9652 (nginx)
8523| [64911] Fedora Core 11 FEDORA-2009-9630 (nginx)
8524| [64894] FreeBSD Ports: nginx
8525| [64869] Debian Security Advisory DSA 1884-1 (nginx)
8526|
8527| SecurityTracker - https://www.securitytracker.com:
8528| [1028544] nginx Bug Lets Remote Users Deny Service or Obtain Potentially Sensitive Information
8529| [1028519] nginx Stack Overflow Lets Remote Users Execute Arbitrary Code
8530| [1026924] nginx Buffer Overflow in ngx_http_mp4_module Lets Remote Users Execute Arbitrary Code
8531| [1026827] nginx HTTP Response Processing Lets Remote Users Obtain Portions of Memory Contents
8532|
8533| OSVDB - http://www.osvdb.org:
8534| [94864] cPnginx Plugin for cPanel nginx Configuration Manipulation Arbitrary File Access
8535| [93282] nginx proxy_pass Crafted Upstream Proxied Server Response Handling Worker Process Memory Disclosure
8536| [93037] nginx /http/ngx_http_parse.c Worker Process Crafted Request Handling Remote Overflow
8537| [92796] nginx ngx_http_close_connection Function Crafted r->
8538| [92634] nginx ngx_http_request.h zero_in_uri URL Null Byte Handling Remote Code Execution
8539| [90518] nginx Log Directory Permission Weakness Local Information Disclosure
8540| [88910] nginx Proxy Functionality SSL Certificate Validation MitM Spoofing Weakness
8541| [84339] nginx/Windows Multiple Request Sequence Parsing Arbitrary File Access
8542| [83617] Naxsi Module for Nginx naxsi-ui/ nx_extract.py Traversal Arbitrary File Access
8543| [81339] nginx ngx_http_mp4_module Module Atom MP4 File Handling Remote Overflow
8544| [80124] nginx HTTP Header Response Parsing Freed Memory Information Disclosure
8545| [77184] nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote Overflow
8546| [65531] nginx on Windows URI ::$DATA Append Arbitrary File Access
8547| [65530] nginx Encoded Traversal Sequence Memory Corruption Remote DoS
8548| [65294] nginx on Windows Encoded Space Request Remote Source Disclosure
8549| [63136] nginx on Windows 8.3 Filename Alias Request Access Rules / Authentication Bypass
8550| [62617] nginx Internal DNS Cache Poisoning Weakness
8551| [61779] nginx HTTP Request Escape Sequence Terminal Command Injection
8552| [59278] nginx src/http/ngx_http_parse.c ngx_http_process_request_headers() Function URL Handling NULL Dereference DoS
8553| [58328] nginx WebDAV Multiple Method Traversal Arbitrary File Write
8554| [58128] nginx ngx_http_parse_complex_uri() Function Underflow
8555| [44447] nginx (engine x) msie_refresh Directive Unspecified XSS
8556| [44446] nginx (engine x) ssl_verify_client Directive HTTP/0.9 Protocol Bypass
8557| [44445] nginx (engine x) ngx_http_realip_module satisfy_any Directive Unspecified Access Bypass
8558| [44444] nginx (engine x) X-Accel-Redirect Header Unspecified Traversal
8559| [44443] nginx (engine x) rtsig Method Signal Queue Overflow
8560| [44442] nginx (engine x) Worker Process Millisecond Timers Unspecified Overflow
8561|_
8562110/tcp open pop3 Dovecot pop3d
8563| vulscan: VulDB - https://vuldb.com:
8564| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
8565| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
8566| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
8567| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
8568| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
8569| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
8570| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
8571| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
8572| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
8573| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
8574| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
8575| [69835] Dovecot 2.2.0/2.2.1 denial of service
8576| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
8577| [65684] Dovecot up to 2.2.6 unknown vulnerability
8578| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
8579| [63692] Dovecot up to 2.0.15 spoofing
8580| [7062] Dovecot 2.1.10 mail-search.c denial of service
8581| [57517] Dovecot up to 2.0.12 Login directory traversal
8582| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
8583| [57515] Dovecot up to 2.0.12 Crash denial of service
8584| [54944] Dovecot up to 1.2.14 denial of service
8585| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
8586| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
8587| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
8588| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
8589| [53277] Dovecot up to 1.2.10 denial of service
8590| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
8591| [45256] Dovecot up to 1.1.5 directory traversal
8592| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
8593| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
8594| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
8595| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
8596| [40356] Dovecot 1.0.9 Cache unknown vulnerability
8597| [38222] Dovecot 1.0.2 directory traversal
8598| [36376] Dovecot up to 1.0.x directory traversal
8599| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
8600|
8601| MITRE CVE - https://cve.mitre.org:
8602| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
8603| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
8604| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
8605| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
8606| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
8607| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
8608| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
8609| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
8610| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
8611| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
8612| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
8613| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
8614| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
8615| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
8616| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
8617| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
8618| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
8619| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
8620| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
8621| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
8622| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
8623| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
8624| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
8625| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
8626| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
8627| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
8628| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
8629| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
8630| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
8631| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
8632| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
8633| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
8634| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
8635| [CVE-2002-0925] Format string vulnerability in mmsyslog function allows remote attackers to execute arbitrary code via (1) the USER command to mmpop3d for mmmail 0.0.13 and earlier, (2) the HELO command to mmsmtpd for mmmail 0.0.13 and earlier, or (3) the USER command to mmftpd 0.0.7 and earlier.
8636| [CVE-2001-0143] vpop3d program in linuxconf 1.23r and earlier allows local users to overwrite arbitrary files via a symlink attack.
8637| [CVE-2000-1197] POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes.
8638| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
8639|
8640| SecurityFocus - https://www.securityfocus.com/bid/:
8641| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
8642| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
8643| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
8644| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
8645| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
8646| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
8647| [67306] Dovecot Denial of Service Vulnerability
8648| [67219] akpop3d 'pszQuery' Remote Memory Corruption Vulnerability
8649| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
8650| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
8651| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
8652| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
8653| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
8654| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
8655| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
8656| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
8657| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
8658| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
8659| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
8660| [39838] tpop3d Remote Denial of Service Vulnerability
8661| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
8662| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
8663| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
8664| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
8665| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
8666| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
8667| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
8668| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
8669| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
8670| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
8671| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
8672| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
8673| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
8674| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
8675| [17961] Dovecot Remote Information Disclosure Vulnerability
8676| [16672] Dovecot Double Free Denial of Service Vulnerability
8677| [8495] akpop3d User Name SQL Injection Vulnerability
8678| [8473] Vpop3d Remote Denial Of Service Vulnerability
8679| [3990] ZPop3D Bad Login Logging Failure Vulnerability
8680| [2781] DynFX MailServer POP3d Denial of Service Vulnerability
8681|
8682| IBM X-Force - https://exchange.xforce.ibmcloud.com:
8683| [86382] Dovecot POP3 Service denial of service
8684| [84396] Dovecot IMAP APPEND denial of service
8685| [80453] Dovecot mail-search.c denial of service
8686| [71354] Dovecot SSL Common Name (CN) weak security
8687| [67675] Dovecot script-login security bypass
8688| [67674] Dovecot script-login directory traversal
8689| [67589] Dovecot header name denial of service
8690| [63267] Apple Mac OS X Dovecot information disclosure
8691| [62340] Dovecot mailbox security bypass
8692| [62339] Dovecot IMAP or POP3 denial of service
8693| [62256] Dovecot mailbox security bypass
8694| [62255] Dovecot ACL entry security bypass
8695| [60639] Dovecot ACL plugin weak security
8696| [57267] Apple Mac OS X Dovecot Kerberos security bypass
8697| [56763] Dovecot header denial of service
8698| [54363] Dovecot base_dir privilege escalation
8699| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
8700| [46323] Dovecot dovecot.conf information disclosure
8701| [46227] Dovecot message parsing denial of service
8702| [45669] Dovecot ACL mailbox security bypass
8703| [45667] Dovecot ACL plugin rights security bypass
8704| [41085] Dovecot TAB characters authentication bypass
8705| [41009] Dovecot mail_extra_groups option unauthorized access
8706| [39342] Dovecot LDAP auth cache configuration security bypass
8707| [35767] Dovecot ACL plugin security bypass
8708| [34082] Dovecot mbox-storage.c directory traversal
8709| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
8710| [26578] Cyrus IMAP pop3d buffer overflow
8711| [26536] Dovecot IMAP LIST information disclosure
8712| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
8713| [24709] Dovecot APPEND command denial of service
8714| [13018] akpop3d authentication code SQL injection
8715| [7345] Slackware Linux imapd and ipop3d core dump
8716| [6269] imap, ipop2d and ipop3d buffer overflows
8717| [5923] Linuxconf vpop3d symbolic link
8718| [4918] IPOP3D, Buffer overflow attack
8719| [1560] IPOP3D, user login successful
8720| [1559] IPOP3D user login to remote host successful
8721| [1525] IPOP3D, user logout
8722| [1524] IPOP3D, user auto-logout
8723| [1523] IPOP3D, user login failure
8724| [1522] IPOP3D, brute force attack
8725| [1521] IPOP3D, user kiss of death logout
8726| [418] pop3d mktemp creates insecure temporary files
8727|
8728| Exploit-DB - https://www.exploit-db.com:
8729| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
8730| [23053] Vpop3d Remote Denial of Service Vulnerability
8731| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
8732| [11893] tPop3d 1.5.3 DoS
8733| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
8734| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
8735| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
8736| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
8737|
8738| OpenVAS (Nessus) - http://www.openvas.org:
8739| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
8740| [901025] Dovecot Version Detection
8741| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
8742| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
8743| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
8744| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
8745| [870607] RedHat Update for dovecot RHSA-2011:0600-01
8746| [870471] RedHat Update for dovecot RHSA-2011:1187-01
8747| [870153] RedHat Update for dovecot RHSA-2008:0297-02
8748| [863272] Fedora Update for dovecot FEDORA-2011-7612
8749| [863115] Fedora Update for dovecot FEDORA-2011-7258
8750| [861525] Fedora Update for dovecot FEDORA-2007-664
8751| [861394] Fedora Update for dovecot FEDORA-2007-493
8752| [861333] Fedora Update for dovecot FEDORA-2007-1485
8753| [860845] Fedora Update for dovecot FEDORA-2008-9202
8754| [860663] Fedora Update for dovecot FEDORA-2008-2475
8755| [860169] Fedora Update for dovecot FEDORA-2008-2464
8756| [860089] Fedora Update for dovecot FEDORA-2008-9232
8757| [840950] Ubuntu Update for dovecot USN-1295-1
8758| [840668] Ubuntu Update for dovecot USN-1143-1
8759| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
8760| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
8761| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
8762| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
8763| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
8764| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
8765| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
8766| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
8767| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
8768| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
8769| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
8770| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
8771| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
8772| [70259] FreeBSD Ports: dovecot
8773| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
8774| [66522] FreeBSD Ports: dovecot
8775| [65010] Ubuntu USN-838-1 (dovecot)
8776| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
8777| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
8778| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
8779| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
8780| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
8781| [62854] FreeBSD Ports: dovecot-managesieve
8782| [61916] FreeBSD Ports: dovecot
8783| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
8784| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
8785| [60528] FreeBSD Ports: dovecot
8786| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
8787| [60089] FreeBSD Ports: dovecot
8788| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
8789| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
8790|
8791| SecurityTracker - https://www.securitytracker.com:
8792| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
8793| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
8794| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
8795|
8796| OSVDB - http://www.osvdb.org:
8797| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
8798| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
8799| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
8800| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
8801| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
8802| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
8803| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
8804| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
8805| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
8806| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
8807| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
8808| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
8809| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
8810| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
8811| [66113] Dovecot Mail Root Directory Creation Permission Weakness
8812| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
8813| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
8814| [66110] Dovecot Multiple Unspecified Buffer Overflows
8815| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
8816| [64783] Dovecot E-mail Message Header Unspecified DoS
8817| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
8818| [62796] Dovecot mbox Format Email Header Handling DoS
8819| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
8820| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
8821| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
8822| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
8823| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
8824| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
8825| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
8826| [43137] Dovecot mail_extra_groups Symlink File Manipulation
8827| [42979] Dovecot passdbs Argument Injection Authentication Bypass
8828| [39876] Dovecot LDAP Auth Cache Security Bypass
8829| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
8830| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
8831| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
8832| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
8833| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
8834| [23281] Dovecot imap/pop3-login dovecot-auth DoS
8835| [23280] Dovecot Malformed APPEND Command DoS
8836| [14459] mmmail mmpop3d USER Command mmsyslog Function Format String
8837| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
8838| [5857] Linux pop3d Arbitrary Mail File Access
8839| [2471] akpop3d username SQL Injection
8840|_
8841143/tcp open imap Dovecot imapd
8842| vulscan: VulDB - https://vuldb.com:
8843| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
8844| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
8845| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
8846| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
8847| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
8848| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
8849| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
8850| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
8851| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
8852| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
8853| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
8854| [69835] Dovecot 2.2.0/2.2.1 denial of service
8855| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
8856| [65684] Dovecot up to 2.2.6 unknown vulnerability
8857| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
8858| [63692] Dovecot up to 2.0.15 spoofing
8859| [7062] Dovecot 2.1.10 mail-search.c denial of service
8860| [59792] Cyrus IMAPd 2.4.11 weak authentication
8861| [57517] Dovecot up to 2.0.12 Login directory traversal
8862| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
8863| [57515] Dovecot up to 2.0.12 Crash denial of service
8864| [54944] Dovecot up to 1.2.14 denial of service
8865| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
8866| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
8867| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
8868| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
8869| [53277] Dovecot up to 1.2.10 denial of service
8870| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
8871| [45256] Dovecot up to 1.1.5 directory traversal
8872| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
8873| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
8874| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
8875| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
8876| [40356] Dovecot 1.0.9 Cache unknown vulnerability
8877| [38222] Dovecot 1.0.2 directory traversal
8878| [37927] Ipswitch Ipswitch Collaboration Suite up to 2006.1 IMAP Service imapd32.exe memory corruption
8879| [36376] Dovecot up to 1.0.x directory traversal
8880| [35759] Atrium MERCUR IMAPD IMAP4 mcrimap4.exe memory corruption
8881| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
8882|
8883| MITRE CVE - https://cve.mitre.org:
8884| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
8885| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
8886| [CVE-2011-3481] The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message.
8887| [CVE-2011-3372] imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command.
8888| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
8889| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
8890| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
8891| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
8892| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
8893| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
8894| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
8895| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
8896| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
8897| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
8898| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
8899| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
8900| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
8901| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
8902| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
8903| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
8904| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
8905| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
8906| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
8907| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
8908| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
8909| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
8910| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
8911| [CVE-2007-5740] The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism.
8912| [CVE-2007-5018] Stack-based buffer overflow in IMAPD in Mercury/32 4.52 allows remote authenticated users to execute arbitrary code via a long argument in a SEARCH ON command. NOTE: this issue might overlap with CVE-2004-1211.
8913| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
8914| [CVE-2007-3925] Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.
8915| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
8916| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
8917| [CVE-2007-1579] Stack-based buffer overflow in Atrium MERCUR IMAPD allows remote attackers to have an unknown impact via a certain SUBSCRIBE command.
8918| [CVE-2007-1578] Multiple integer signedness errors in the NTLM implementation in Atrium MERCUR IMAPD (mcrimap4.exe) 5.00.14, with SP4, allow remote attackers to execute arbitrary code via a long NTLMSSP argument that triggers a stack-based buffer overflow.
8919| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
8920| [CVE-2006-6762] The IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to cause a denial of service via an APPEND command with a single "(" (parenthesis) in the argument.
8921| [CVE-2006-6761] Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command.
8922| [CVE-2006-6425] Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via unspecified vectors involving the APPEND command.
8923| [CVE-2006-6424] Multiple buffer overflows in Novell NetMail before 3.52e FTF2 allow remote attackers to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow
8924| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
8925| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
8926| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
8927| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
8928| [CVE-2005-2278] Stack-based buffer overflow in the IMAP daemon (imapd) in MailEnable Professional 1.54 allows remote authenticated users to execute arbitrary code via the status command with a long mailbox name.
8929| [CVE-2005-1256] Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name.
8930| [CVE-2005-1249] The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop.
8931| [CVE-2005-1015] Buffer overflow in MailEnable Imapd (MEIMAP.exe) allows remote attackers to execute arbitrary code via a long LOGIN command.
8932| [CVE-2005-0546] Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd.
8933| [CVE-2003-1322] Multiple stack-based buffer overflows in Atrium MERCUR IMAPD in MERCUR Mailserver before 4.2.15.0 allow remote attackers to execute arbitrary code via a long (1) EXAMINE, (2) DELETE, (3) SUBSCRIBE, (4) RENAME, (5) UNSUBSCRIBE, (6) LIST, (7) LSUB, (8) STATUS, (9) LOGIN, (10) CREATE, or (11) SELECT command.
8934| [CVE-2002-1782] The default configuration of University of Washington IMAP daemon (wu-imapd), when running on a system that does not allow shell access, allows a local user with a valid IMAP account to read arbitrary files as that user.
8935| [CVE-2002-1604] Multiple buffer overflows in HP Tru64 UNIX allow local and possibly remote attackers to execute arbitrary code via a long NLSPATH environment variable to (1) csh, (2) dtsession, (3) dxsysinfo, (4) imapd, (5) inc, (6) uucp, (7) uux, (8) rdist, or (9) deliver.
8936| [CVE-2002-0997] Buffer overflows in IMAP Agent (imapd) for Novell NetMail (NIMS) 3.0.3 before 3.0.3A allows remote attackers to cause a denial of service.
8937| [CVE-2002-0379] Buffer overflow in University of Washington imap server (uw-imapd) imap-2001 (imapd 2001.315) and imap-2001a (imapd 2001.315) with legacy RFC 1730 support, and imapd 2000.287 and earlier, allows remote authenticated users to execute arbitrary code via a long BODY request.
8938| [CVE-2001-0691] Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations.
8939| [CVE-2000-0284] Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.
8940| [CVE-1999-1557] Buffer overflow in the login functions in IMAP server (imapd) in Ipswitch IMail 5.0 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long user name or (2) a long password.
8941| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
8942| [CVE-1999-1224] IMAP 4.1 BETA, and possibly other versions, does not properly handle the SIGABRT (abort) signal, which allows local users to crash the server (imapd) via certain sequences of commands, which causes a core dump that may contain sensitive password information.
8943|
8944| SecurityFocus - https://www.securityfocus.com/bid/:
8945| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
8946| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
8947| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
8948| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
8949| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
8950| [84478] imapd CVE-1999-1224 Denial-Of-Service Vulnerability
8951| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
8952| [67306] Dovecot Denial of Service Vulnerability
8953| [65650] Eudora WorldMail imapd 'UID' Command Buffer Overflow Vulnerability
8954| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
8955| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
8956| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
8957| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
8958| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
8959| [51403] Eudora WorldMail imapd 'LIST' Command Buffer Overflow Vulnerability
8960| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
8961| [49949] Cyrus IMAPd NTTP Logic Error Authentication Bypass Vulnerability
8962| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
8963| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
8964| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
8965| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
8966| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
8967| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
8968| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
8969| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
8970| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
8971| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
8972| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
8973| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
8974| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
8975| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
8976| [26270] Perdition IMAPD __STR_VWRITE Remote Format String Vulnerability
8977| [25733] Mercury/32 IMAPD SEARCH Command Remote Stack Buffer Overflow Vulnerability
8978| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
8979| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
8980| [23058] Atrium Mercur IMapD NTLM Buffer Overflow Vulnerability
8981| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
8982| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
8983| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
8984| [17961] Dovecot Remote Information Disclosure Vulnerability
8985| [16672] Dovecot Double Free Denial of Service Vulnerability
8986| [15980] Qualcomm WorldMail IMAPD Buffer Overflow Vulnerability
8987| [15753] Ipswitch Collaboration Suite and IMail Server IMAPD LIST Command Denial Of Service Vulnerability
8988| [12636] Cyrus IMAPD Multiple Remote Buffer Overflow Vulnerabilities
8989| [11738] Cyrus IMAPD Multiple Remote Unspecified Vulnerabilities
8990| [11729] Cyrus IMAPD Multiple Remote Vulnerabilities
8991| [6298] Cyrus IMAPD Pre-Login Heap Corruption Vulnerability
8992| [4713] Wu-imapd Partial Mailbox Attribute Remote Buffer Overflow Vulnerability
8993| [2856] Imapd 'Local' Buffer Overflow Vulnerabilities
8994| [1110] Univ. Of Washington imapd Buffer Overflow Vulnerabilities
8995| [502] NT IMail Imapd Buffer Overflow DoS Vulnerability
8996| [130] imapd Buffer Overflow Vulnerability
8997|
8998| IBM X-Force - https://exchange.xforce.ibmcloud.com:
8999| [86382] Dovecot POP3 Service denial of service
9000| [84396] Dovecot IMAP APPEND denial of service
9001| [80453] Dovecot mail-search.c denial of service
9002| [71354] Dovecot SSL Common Name (CN) weak security
9003| [70325] Cyrus IMAPd NNTP security bypass
9004| [67675] Dovecot script-login security bypass
9005| [67674] Dovecot script-login directory traversal
9006| [67589] Dovecot header name denial of service
9007| [63267] Apple Mac OS X Dovecot information disclosure
9008| [62340] Dovecot mailbox security bypass
9009| [62339] Dovecot IMAP or POP3 denial of service
9010| [62256] Dovecot mailbox security bypass
9011| [62255] Dovecot ACL entry security bypass
9012| [60639] Dovecot ACL plugin weak security
9013| [57267] Apple Mac OS X Dovecot Kerberos security bypass
9014| [56763] Dovecot header denial of service
9015| [54363] Dovecot base_dir privilege escalation
9016| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
9017| [47526] UW-imapd rfc822_output_char() denial of service
9018| [46323] Dovecot dovecot.conf information disclosure
9019| [46227] Dovecot message parsing denial of service
9020| [45669] Dovecot ACL mailbox security bypass
9021| [45667] Dovecot ACL plugin rights security bypass
9022| [41085] Dovecot TAB characters authentication bypass
9023| [41009] Dovecot mail_extra_groups option unauthorized access
9024| [39342] Dovecot LDAP auth cache configuration security bypass
9025| [35767] Dovecot ACL plugin security bypass
9026| [34082] Dovecot mbox-storage.c directory traversal
9027| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
9028| [26536] Dovecot IMAP LIST information disclosure
9029| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
9030| [24709] Dovecot APPEND command denial of service
9031| [22629] RHSA-2005:408 updates for cyrus-imapd not installed
9032| [19460] Cyrus IMAP imapd buffer overflow
9033| [19455] Cyrus IMAP imapd extension off-by-one buffer overflow
9034| [18492] Novell NetMail IMAPD 101_mEna buffer overflow
9035| [10803] UW IMAP (wu-imapd) authenticated user buffer overflow
9036| [9238] UW IMAP (wu-imapd) could allow a remote attacker to access arbitrary files
9037| [9055] UW IMAP (wu-imapd) partial mailbox attributes to request buffer overflow
9038| [7345] Slackware Linux imapd and ipop3d core dump
9039| [573] Imapd denial of service
9040|
9041| Exploit-DB - https://www.exploit-db.com:
9042| [30724] Perdition 1.17 IMAPD __STR_VWRITE Remote Format String Vulnerability
9043| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
9044| [22061] Cyrus IMAPD 1.4/1.5.19/2.0.12/2.0.16/2.1.9/2.1.10 Pre-Login Heap Corruption Vulnerability
9045| [21443] Wu-imapd 2000/2001 Partial Mailbox Attribute Remote Buffer Overflow Vulnerability (2)
9046| [21442] Wu-imapd 2000/2001 Partial Mailbox Attribute Remote Buffer Overflow Vulnerability (1)
9047| [19849] UoW imapd 10.234/12.264 COPY Buffer Overflow (meta)
9048| [19848] UoW imapd 10.234/12.264 LSUB Buffer Overflow (meta)
9049| [19847] UoW imapd 10.234/12.264 Buffer Overflow Vulnerabilities
9050| [19377] Ipswitch IMail 5.0 Imapd Buffer Overflow DoS Vulnerability
9051| [19107] Netscape Messaging Server 3.55,University of Washington imapd 10.234 Buffer Overflow Vulnerability
9052| [18354] WorldMail imapd 3.0 SEH overflow (egg hunter)
9053| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
9054| [16485] MailEnable IMAPD 1.54 - STATUS Request Buffer Overflow
9055| [16482] MDaemon 9.6.4 IMAPD FETCH Buffer Overflow
9056| [16480] MailEnable IMAPD W3C Logging Buffer Overflow
9057| [16477] Mdaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow
9058| [16475] MailEnable IMAPD (2.35) Login Request Buffer Overflow
9059| [16474] Qualcomm WorldMail 3.0 IMAPD LIST Buffer Overflow
9060| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
9061| [4429] Mercury/32 4.52 IMAPD SEARCH command Post-Auth Overflow Exploit
9062| [3627] IPSwitch IMail Server <= 8.20 IMAPD Remote Buffer Overflow Exploit
9063| [3527] Mercur IMAPD 5.00.14 Remote Denial of Service Exploit (win32)
9064| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
9065| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
9066| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
9067| [1380] Eudora Qualcomm WorldMail 3.0 (IMAPd) Remote Overflow Exploit
9068| [1332] MailEnable 1.54 Pro Universal IMAPD W3C Logging BoF Exploit
9069| [1327] FTGate4 Groupware Mail Server 4.1 (imapd) Remote Buffer Overflow PoC
9070| [1151] MDaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow Exploit
9071| [1124] IPSwitch IMail Server <= 8.15 IMAPD Remote Root Exploit
9072| [915] MailEnable Enterprise 1.x Imapd Remote Exploit
9073| [903] Cyrus imapd 2.2.4 - 2.2.8 (imapmagicplus) Remote Exploit
9074| [340] Linux imapd Remote Overflow File Retrieve Exploit
9075|
9076| OpenVAS (Nessus) - http://www.openvas.org:
9077| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
9078| [901025] Dovecot Version Detection
9079| [881425] CentOS Update for cyrus-imapd CESA-2011:1508 centos5 x86_64
9080| [881403] CentOS Update for cyrus-imapd CESA-2011:0859 centos5 x86_64
9081| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
9082| [881397] CentOS Update for cyrus-imapd CESA-2011:1317 centos4 x86_64
9083| [881370] CentOS Update for cyrus-imapd CESA-2011:1508 centos4 x86_64
9084| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
9085| [881318] CentOS Update for cyrus-imapd CESA-2011:0859 centos4 x86_64
9086| [881255] CentOS Update for cyrus-imapd CESA-2011:1317 centos5 x86_64
9087| [881050] CentOS Update for cyrus-imapd CESA-2011:1508 centos5 i386
9088| [881049] CentOS Update for cyrus-imapd CESA-2011:1508 centos4 i386
9089| [881007] CentOS Update for cyrus-imapd CESA-2011:1317 centos5 i386
9090| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
9091| [880978] CentOS Update for cyrus-imapd CESA-2011:1317 centos4 i386
9092| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
9093| [880958] CentOS Update for cyrus-imapd CESA-2011:0859 centos4 i386
9094| [880905] CentOS Update for cyrus-imapd CESA-2009:1459 centos4 i386
9095| [880864] CentOS Update for cyrus-imapd CESA-2009:1459 centos5 i386
9096| [880826] CentOS Update for cyrus-imapd CESA-2009:1116 centos5 i386
9097| [880536] CentOS Update for cyrus-imapd CESA-2011:0859 centos5 i386
9098| [870607] RedHat Update for dovecot RHSA-2011:0600-01
9099| [870520] RedHat Update for cyrus-imapd RHSA-2011:1508-01
9100| [870489] RedHat Update for cyrus-imapd RHSA-2011:1317-01
9101| [870471] RedHat Update for dovecot RHSA-2011:1187-01
9102| [870443] RedHat Update for cyrus-imapd RHSA-2011:0859-01
9103| [870153] RedHat Update for dovecot RHSA-2008:0297-02
9104| [864075] Fedora Update for cyrus-imapd FEDORA-2011-13832
9105| [863585] Fedora Update for cyrus-imapd FEDORA-2011-13869
9106| [863579] Fedora Update for cyrus-imapd FEDORA-2011-13860
9107| [863281] Fedora Update for cyrus-imapd FEDORA-2011-7193
9108| [863273] Fedora Update for cyrus-imapd FEDORA-2011-7217
9109| [863272] Fedora Update for dovecot FEDORA-2011-7612
9110| [863115] Fedora Update for dovecot FEDORA-2011-7258
9111| [861525] Fedora Update for dovecot FEDORA-2007-664
9112| [861394] Fedora Update for dovecot FEDORA-2007-493
9113| [861333] Fedora Update for dovecot FEDORA-2007-1485
9114| [860845] Fedora Update for dovecot FEDORA-2008-9202
9115| [860663] Fedora Update for dovecot FEDORA-2008-2475
9116| [860169] Fedora Update for dovecot FEDORA-2008-2464
9117| [860089] Fedora Update for dovecot FEDORA-2008-9232
9118| [840950] Ubuntu Update for dovecot USN-1295-1
9119| [840668] Ubuntu Update for dovecot USN-1143-1
9120| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
9121| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
9122| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
9123| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
9124| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
9125| [831590] Mandriva Update for cyrus-imapd MDVSA-2012:037 (cyrus-imapd)
9126| [831468] Mandriva Update for cyrus-imapd MDVSA-2011:149 (cyrus-imapd)
9127| [831410] Mandriva Update for cyrus-imapd MDVSA-2011:100 (cyrus-imapd)
9128| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
9129| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
9130| [831207] Mandriva Update for cyrus-imapd MDVA-2010:208 (cyrus-imapd)
9131| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
9132| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
9133| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
9134| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
9135| [800149] UW-imapd tmail and dmail BOF Vulnerabilities (Linux)
9136| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
9137| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
9138| [70696] Debian Security Advisory DSA 2377-1 (cyrus-imapd-2.2)
9139| [70407] Debian Security Advisory DSA 2318-1 (cyrus-imapd-2.2)
9140| [70259] FreeBSD Ports: dovecot
9141| [69965] Debian Security Advisory DSA 2258-1 (kolab-cyrus-imapd)
9142| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
9143| [69740] Debian Security Advisory DSA 2242-1 (cyrus-imapd-2.2)
9144| [66522] FreeBSD Ports: dovecot
9145| [66416] Mandriva Security Advisory MDVSA-2009:229-1 (cyrus-imapd)
9146| [66233] SLES10: Security update for Cyrus IMAPD
9147| [66226] SLES11: Security update for Cyrus IMAPD
9148| [66222] SLES9: Security update for Cyrus IMAPD
9149| [65938] SLES10: Security update for Cyrus IMAPD
9150| [65723] SLES11: Security update for Cyrus IMAPD
9151| [65523] SLES9: Security update for Cyrus IMAPD
9152| [65479] SLES9: Security update for cyrus-imapd
9153| [65094] SLES9: Security update for cyrus-imapd
9154| [65010] Ubuntu USN-838-1 (dovecot)
9155| [64989] CentOS Security Advisory CESA-2009:1459 (cyrus-imapd)
9156| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
9157| [64977] Debian Security Advisory DSA 1893-1 (cyrus-imapd-2.2 kolab-cyrus-imapd)
9158| [64965] Fedora Core 11 FEDORA-2009-9901 (cyrus-imapd)
9159| [64963] Fedora Core 10 FEDORA-2009-9869 (cyrus-imapd)
9160| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
9161| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
9162| [64898] FreeBSD Ports: cyrus-imapd
9163| [64864] Debian Security Advisory DSA 1881-1 (cyrus-imapd-2.2)
9164| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
9165| [64847] Fedora Core 10 FEDORA-2009-9428 (cyrus-imapd)
9166| [64846] Fedora Core 11 FEDORA-2009-9417 (cyrus-imapd)
9167| [64838] Mandrake Security Advisory MDVSA-2009:229 (cyrus-imapd)
9168| [64271] CentOS Security Advisory CESA-2009:1116 (cyrus-imapd)
9169| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
9170| [62854] FreeBSD Ports: dovecot-managesieve
9171| [61916] FreeBSD Ports: dovecot
9172| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
9173| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
9174| [60528] FreeBSD Ports: dovecot
9175| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
9176| [60089] FreeBSD Ports: dovecot
9177| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
9178| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
9179| [55807] Slackware Advisory SSA:2005-310-06 imapd
9180| [54861] Gentoo Security Advisory GLSA 200502-29 (cyrus-imapd)
9181| [54755] Gentoo Security Advisory GLSA 200411-34 (cyrus-imapd)
9182| [53739] Debian Security Advisory DSA 215-1 (cyrus-imapd)
9183| [53288] Debian Security Advisory DSA 597-1 (cyrus-imapd)
9184| [52297] FreeBSD Ports: cyrus-imapd
9185| [52296] FreeBSD Ports: cyrus-imapd
9186| [52295] FreeBSD Ports: cyrus-imapd
9187| [52294] FreeBSD Ports: cyrus-imapd
9188| [52172] FreeBSD Ports: cyrus-imapd
9189|
9190| SecurityTracker - https://www.securitytracker.com:
9191| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
9192| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
9193| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
9194| [1013278] Cyrus IMAPd Buffer Overflows in Annotate Extension, Cached Header, and Fetchnews May Let Remote Users Execute Arbitrary Code
9195|
9196| OSVDB - http://www.osvdb.org:
9197| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
9198| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
9199| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
9200| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
9201| [78304] Eudora WorldMail imapd SEH LIST Command Parsing Remote Overflow
9202| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
9203| [75445] Cyrus IMAP Server imapd index.c index_get_ids Function References Header NULL Dereference Remote DoS
9204| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
9205| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
9206| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
9207| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
9208| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
9209| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
9210| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
9211| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
9212| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
9213| [66113] Dovecot Mail Root Directory Creation Permission Weakness
9214| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
9215| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
9216| [66110] Dovecot Multiple Unspecified Buffer Overflows
9217| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
9218| [64783] Dovecot E-mail Message Header Unspecified DoS
9219| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
9220| [62796] Dovecot mbox Format Email Header Handling DoS
9221| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
9222| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
9223| [57843] Cyrus IMAP Server (cyrus-imapd) SIEVE Script Component (sieve/script.c) Crafted Script Handling Overflow
9224| [57681] UoW imap Server (uw-imapd) Arbitrary Remote File Access
9225| [52906] UW-imapd c-client Initial Request Remote Format String
9226| [52905] UW-imapd c-client Library RFC822BUFFER Routines rfc822_output_char Function Off-by-one
9227| [52456] UW-imapd on Debian Linux LOGIN Command Remote DoS
9228| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
9229| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
9230| [49485] UW-imapd dmail Utility Mailbox Name Handling Overflow
9231| [49484] UW-imapd tmail Utility Mailbox Name Handling Overflow
9232| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
9233| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
9234| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
9235| [43137] Dovecot mail_extra_groups Symlink File Manipulation
9236| [42979] Dovecot passdbs Argument Injection Authentication Bypass
9237| [42004] Perdition Mail Retrieval Proxy IMAPD IMAP Tag Remote Format String Arbitrary Code Execution
9238| [39876] Dovecot LDAP Auth Cache Security Bypass
9239| [39670] Mercury Mail Transport System IMAPD SEARCH Command Remote Overflow
9240| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
9241| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
9242| [31362] Novell NetMail IMAP Daemon (IMAPD) APPEND Command Remote Overflow
9243| [31361] Novell NetMail IMAP Daemon (IMAPD) APPEND Command DoS
9244| [31360] Novell NetMail IMAP Daemon (IMAPD) SUBSCRIBE Command Remote Overflow
9245| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
9246| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
9247| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
9248| [23281] Dovecot imap/pop3-login dovecot-auth DoS
9249| [23280] Dovecot Malformed APPEND Command DoS
9250| [18179] HP Tru64 UNIX imapd NLSPATH Environment Variable Local Overflow
9251| [13242] UW-imapd CRAM-MD5 Authentication Bypass
9252| [12385] Novell NetMail IMAPD 101_mEna Script Remote Overflow
9253| [12042] UoW imapd Multiple Unspecified Overflows
9254| [12037] UoW imapd (UW-IMAP) Multiple Command Remote Overflows
9255| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
9256| [911] UoW imapd AUTHENTICATE Command Remote Overflow
9257| [790] UoW imap Server (uw-imapd) BODY Request Remote Overflow
9258| [519] UoW imapd SIGABRT Signal Forced Crash Information Disclosure
9259|_
9260443/tcp closed https
9261465/tcp open ssl/smtp Exim smtpd 4.89
9262| vulscan: VulDB - https://vuldb.com:
9263| [109969] Exim 4.88/4.89 SMTP Daemon receive.c bdat_getc denial of service
9264| [109968] Exim 4.88/4.89 SMTP Daemon receive.c receive_msg memory corruption
9265| [94599] Exim up to 4.87 information disclosure
9266| [13422] Exim 4.82 Mail Header dmarc.c expand_string memory corruption
9267| [6817] Exim up to 4.80 src/dkim.c dkim_exim_query_dns_txt memory corruption
9268| [141327] Exim up to 4.92.1 Backslash privilege escalation
9269| [138827] Exim up to 4.92 Expansion Code Execution
9270| [135932] Exim up to 4.92 privilege escalation
9271| [113048] Exim up to 4.90 SMTP Listener Message memory corruption
9272| [58841] exim up to 4.69 dkim_exim_verify_finish memory corruption
9273| [57462] Exim up to 4.75 Filesystem memory corruption
9274| [4280] Exim Server 4.x open_log race condition
9275|
9276| MITRE CVE - https://cve.mitre.org:
9277| [CVE-2012-5671] Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.
9278| [CVE-2012-0478] The texImage2D implementation in the WebGL subsystem in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 does not properly restrict JSVAL_TO_OBJECT casts, which might allow remote attackers to execute arbitrary code via a crafted web page.
9279| [CVE-2011-1764] Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character.
9280| [CVE-2011-1407] The DKIM implementation in Exim 4.7x before 4.76 permits matching for DKIM identities to apply to lookup items, instead of only strings, which allows remote attackers to execute arbitrary code or access a filesystem via a crafted identity.
9281| [CVE-2011-0017] The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.
9282| [CVE-2010-4345] Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
9283| [CVE-2010-4344] Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.
9284| [CVE-2010-2024] transports/appendfile.c in Exim before 4.72, when MBX locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/.
9285| [CVE-2010-2023] transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user's file.
9286| [CVE-2006-1251] Argument injection vulnerability in greylistclean.cron in sa-exim 4.2 allows remote attackers to delete arbitrary files via an email with a To field that contains a filename separated by whitespace, which is not quoted when greylistclean.cron provides the argument to the rm command.
9287| [CVE-2005-0022] Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.
9288| [CVE-2005-0021] Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function.
9289| [CVE-2004-0400] Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.
9290| [CVE-2004-0399] Stack-based buffer overflow in Exim 3.35, and other versions before 4, when the sender_verify option is true, allows remote attackers to cause a denial of service and possibly execute arbitrary code during sender verification.
9291| [CVE-2003-0743] Heap-based buffer overflow in smtp_in.c for Exim 3 (exim3) before 3.36 and Exim 4 (exim4) before 4.21 may allow remote attackers to execute arbitrary code via an invalid (1) HELO or (2) EHLO argument with a large number of spaces followed by a NULL character and a newline, which is not properly trimmed before the "(no argument given)" string is appended to the buffer.
9292| [CVE-2002-1381] Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
9293|
9294| SecurityFocus - https://www.securityfocus.com/bid/:
9295| [103049] Exim 'base64d()' Function Buffer Overflow Vulnerability
9296| [99252] Exim CVE-2017-1000369 Local Privilege Escalation Vulnerability
9297| [94947] Exim CVE-2016-9963 Unspecified Information Disclosure Vulnerability
9298| [84132] Exim CVE-2016-1531 Local Privilege Escalation Vulnerability
9299| [68857] Exim CVE-2014-2972 Local Privilege Escalation Vulnerability
9300| [67695] Exim 'dmarc.c' Remote Code Execution Vulnerability
9301| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
9302| [56285] Exim DKIM DNS Decoding CVE-2012-5671 Remote Buffer Overflow Vulnerability
9303| [47836] Exim DKIM CVE-2011-1407 Remote Code Execution Vulnerability
9304| [47736] Exim 'dkim_exim_verify_finish()' Remote Format String Vulnerability
9305| [46065] Exim 'log.c' Local Privilege Escalation Vulnerability
9306| [45341] Exim ALT_CONFIG_ROOT_ONLY 'exim' User Local Privilege Escalation Vulnerability
9307| [45308] Exim Crafted Header Remote Code Execution Vulnerability
9308| [40454] Exim MBX Locking Insecure Temporary File Creation Vulnerability
9309| [40451] Exim Sticky Mail Directory Local Privilege Escalation Vulnerability
9310| [36181] ikiwiki 'teximg' Plugin Insecure TeX Commands Information Disclosure Vulnerability
9311| [23977] Exim SpamAssassin Reply Remote Buffer Overflow Vulnerability
9312| [17110] sa-exim Unauthorized File Access Vulnerability
9313| [12268] Exim IP Address Command Line Argument Local Buffer Overflow Vulnerability
9314| [12188] Exim SPA Authentication Remote Buffer Overflow Vulnerability
9315| [12185] Exim Illegal IPv6 Address Buffer Overflow Vulnerability
9316| [10291] Exim Header Syntax Checking Remote Stack Buffer Overrun Vulnerability
9317| [10290] Exim Sender Verification Remote Stack Buffer Overrun Vulnerability
9318| [8518] Exim EHLO/HELO Remote Heap Corruption Vulnerability
9319| [6314] Exim Internet Mailer Format String Vulnerability
9320| [4096] Exim Configuration File Argument Command Line Buffer Overflow Vulnerability
9321| [3728] Exim Pipe Hostname Arbitrary Command Execution Vulnerability
9322| [2828] Exim Format String Vulnerability
9323| [1859] Exim Buffer Overflow Vulnerability
9324|
9325| IBM X-Force - https://exchange.xforce.ibmcloud.com:
9326| [84758] Exim sender_address parameter command execution
9327| [84015] Exim command execution
9328| [80186] Mozilla Firefox, Thunderbird, and SeaMonkey copyTexImage2D code execution
9329| [80184] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D calls code execution
9330| [79615] Exim dkim_exim_query_dns_txt() buffer overflow
9331| [75155] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D denial of service
9332| [67455] Exim DKIM processing code execution
9333| [67299] Exim dkim_exim_verify_finish() format string
9334| [65028] Exim open_log privilege escalation
9335| [63967] Exim config file privilege escalation
9336| [63960] Exim header buffer overflow
9337| [59043] Exim mail directory privilege escalation
9338| [59042] Exim MBX symlink
9339| [52922] ikiwiki teximg plugin information disclosure
9340| [34265] Exim spamd buffer overflow
9341| [25286] Sa-exim greylistclean.cron file deletion
9342| [22687] RHSA-2005:025 updates for exim not installed
9343| [18901] Exim dns_build_reverse buffer overflow
9344| [18764] Exim spa_base64_to_bits function buffer overflow
9345| [18763] Exim host_aton buffer overflow
9346| [16079] Exim require_verify buffer overflow
9347| [16077] Exim header_check_syntax buffer overflow
9348| [16075] Exim sender_verify buffer overflow
9349| [13067] Exim HELO or EHLO command heap overflow
9350| [10761] Exim daemon.c format string
9351| [8194] Exim configuration file -c command-line argument buffer overflow
9352| [7738] Exim allows attacker to hide commands in localhost names using pipes
9353| [6671] Exim "
9354| [1893] Exim MTA allows local users to gain root privileges
9355|
9356| Exploit-DB - https://www.exploit-db.com:
9357| [16925] Exim4 <= 4.69 - string_format Function Heap Buffer Overflow
9358| [15725] Exim 4.63 Remote Root Exploit
9359| [1009] Exim <= 4.41 dns_build_reverse Local Exploit
9360| [812] Exim <= 4.43 auth_spa_server() Remote PoC Exploit
9361| [796] Exim <= 4.42 Local Root Exploit
9362| [756] Exim <= 4.41 dns_build_reverse Local Exploit PoC
9363|
9364| OpenVAS (Nessus) - http://www.openvas.org:
9365| [100663] Exim < 4.72 RC2 Multiple Vulnerabilities
9366|
9367| SecurityTracker - https://www.securitytracker.com:
9368| [1025539] Exim DKIM Processing Flaw Lets Remote Users Execute Arbitrary Code
9369| [1025504] Exim DKIM Signature Format String Flaw Lets Remote Users Execute Arbitrary Code
9370| [1024859] Exim Configuration File Capability Lets Local Users Gain Elevated Privileges
9371| [1024858] Exim Buffer Overfow in string_format() Lets Remote Users Execute Arbitrary Code
9372| [1012904] Exim Buffer Overflow in dns_build_reverse() Lets Local Users Obtain Elevated Privileges
9373| [1012771] Exim Buffer Overflows in host_aton() and spa_base64_to_bits() May Let Local Users Gain Elevated Privileges
9374| [1010081] Exim Buffer Overflows in 'accept.c' and 'verify.c' Let Remote Users Execute Arbitrary Code
9375| [1007609] Exim Heap Overflow in 'smtp_in.c' May Allow Remote Arbitrary Code Execution
9376| [1005756] Exim Mail Server Format String Bug Lets Local Exim Administrators Execute Arbitrary Code With Root Privileges
9377| [1003547] Potential Bug in Exim Mail Server May Let Local Users Execute Code With Root Privileges
9378| [1003014] Exim Mail Server Pipe Address Validation Error May Let Remote Users Execute Arbitrary Code With Root Privileges in a Certain Configuration
9379| [1001694] Exim Mail Server May Allow Remote Users to Execute Arbitrary Code with Root-Level Privileges on the Server
9380|
9381| OSVDB - http://www.osvdb.org:
9382| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
9383| [87599] Mozilla Multiple Product copyTexImage2D Call Image Dimension Handling Memory Corruption
9384| [87581] Mozilla Multiple Product texImage2D Call Handling Memory Corruption
9385| [86616] Exim src/dkim.c dkim_exim_query_dns_txt() Function DNS Record Parsing Remote Overflow
9386| [81523] Mozilla Multiple Product WebGL texImage2D() Function JSVAL_TO_OBJECT Remote Code Execution
9387| [72642] Exim DKIM Identity Lookup Item Remote Code Execution
9388| [72156] Exim src/dkim.c dkim_exim_verify_finish() Function DKIM-Signature Header Format String
9389| [70696] Exim log.c open_log() Function Local Privilege Escalation
9390| [69860] Exim exim User Account Configuration File Directive Local Privilege Escalation
9391| [69685] Exim string_format Function Remote Overflow
9392| [65159] Exim transports/appendfile.c MBX Locking Race Condition Permission Modification
9393| [65158] Exim transports/appendfile.c Hardlink Handling Arbitrary File Overwrite
9394| [57575] teximg Plugin for ikiwiki TEX Command Arbitrary File Local Disclosure
9395| [23849] sa-exim greylistclean.cron Arbitrary File Deletion
9396| [13073] Oracle Database Server Advanced Queuing Component dbms_transform_eximp Unspecified Security Issue
9397| [12946] Exim -bh Command Line Option dns_build_reverse Function Local Overflow
9398| [12727] Exim SPA Authentication spa_base64_to_bits Function Remote Overflow
9399| [12726] Exim -be Command Line Option host_aton Function Local Overflow
9400| [10877] Exim smtp_in.c HELO/EHLO Remote Overflow
9401| [10360] Exim daemon.c pid_file_path Variable Manipulation Arbitrary Command Execution
9402| [10032] libXpm CreateXImage Function Integer Overflow
9403| [7160] Exim .forward :include: Option Privilege Escalation
9404| [6479] Vexim COOKIE Authentication Credential Disclosure
9405| [6478] Vexim Multiple Parameter SQL Injection
9406| [5930] Exim Parenthesis File Name Filter Bypass
9407| [5897] Exim header_syntax Function Remote Overflow
9408| [5896] Exim sender_verify Function Remote Overflow
9409| [5530] Exim Localhost Name Arbitrary Command Execution
9410| [5330] Exim Configuration File Variable Overflow
9411| [1855] Exim Batched SMTP Mail Header Format String
9412|_
9413993/tcp open ssl/imaps?
9414995/tcp open ssl/pop3s?
941535500/tcp closed unknown
9416Service Info: Host: a13s08.host.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
9417#################################################################################################################################
9418 Anonymous JTSEC #OpDeathEathers Full Recon #26