· 6 years ago · Feb 28, 2020, 06:20 AM
1######################################################################################################################################
2======================================================================================================================================
3Hostname teens-sins.net ISP Serverius Holding B.V.
4Continent Europe Flag
5NL
6Country Netherlands Country Code NL
7Region Unknown Local time 28 Feb 2020 04:09 CET
8City Unknown Postal Code Unknown
9IP Address 37.1.207.121 Latitude 52.382
10 Longitude 4.9
11=======================================================================================================================================
12######################################################################################################################################
13> teens-sins.net
14Server: 10.101.0.243
15Address: 10.101.0.243#53
16
17Non-authoritative answer:
18Name: teens-sins.net
19Address: 37.1.207.121
20>
21######################################################################################################################################
22 Domain Name: TEENS-SINS.NET
23 Registry Domain ID: 1555237836_DOMAIN_NET-VRSN
24 Registrar WHOIS Server: whois.PublicDomainRegistry.com
25 Registrar URL: http://www.publicdomainregistry.com
26 Updated Date: 2019-04-21T10:15:13Z
27 Creation Date: 2009-05-10T19:46:13Z
28 Registry Expiry Date: 2020-05-10T19:46:13Z
29 Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com
30 Registrar IANA ID: 303
31 Registrar Abuse Contact Email: abuse-contact@publicdomainregistry.com
32 Registrar Abuse Contact Phone: +1.2013775952
33 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
34 Name Server: NS1.RUS-SEX-GIRLS.NET
35 Name Server: NS2.RUS-SEX-GIRLS.NET
36 DNSSEC: unsigned
37#####################################################################################################################################
38Domain Name: TEENS-SINS.NET
39Registry Domain ID: 1555237836_DOMAIN_NET-VRSN
40Registrar WHOIS Server: whois.publicdomainregistry.com
41Registrar URL: www.publicdomainregistry.com
42Updated Date: 2019-04-21T10:15:14Z
43Creation Date: 2009-05-10T19:46:13Z
44Registrar Registration Expiration Date: 2020-05-10T19:46:13Z
45Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com
46Registrar IANA ID: 303
47Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
48Registry Registrant ID: Not Available From Registry
49Registrant Name: hamradio
50Registrant Organization: hamradio
51Registrant Street: ul/79-j gvard. divizii
52Registrant City: Tomsk
53Registrant State/Province: Tomskaya oblast
54Registrant Postal Code: 634059
55Registrant Country: RU
56Registrant Phone: +7.9039146596
57Registrant Phone Ext:
58Registrant Fax:
59Registrant Fax Ext:
60Registrant Email: hamradio@home.tula.net
61Registry Admin ID: Not Available From Registry
62Admin Name: hamradio
63Admin Organization: hamradio
64Admin Street: ul/79-j gvard. divizii
65Admin City: Tomsk
66Admin State/Province: Tomskaya oblast
67Admin Postal Code: 634059
68Admin Country: RU
69Admin Phone: +7.9039146596
70Admin Phone Ext:
71Admin Fax:
72Admin Fax Ext:
73Admin Email: hamradio@home.tula.net
74Registry Tech ID: Not Available From Registry
75Tech Name: hamradio
76Tech Organization: hamradio
77Tech Street: ul/79-j gvard. divizii
78Tech City: Tomsk
79Tech State/Province: Tomskaya oblast
80Tech Postal Code: 634059
81Tech Country: RU
82Tech Phone: +7.9039146596
83Tech Phone Ext:
84Tech Fax:
85Tech Fax Ext:
86Tech Email: hamradio@home.tula.net
87Name Server: ns1.rus-sex-girls.net
88Name Server: ns2.rus-sex-girls.net
89DNSSEC: Unsigned
90######################################################################################################################################
91[+] Target : teens-sins.net
92
93[+] IP Address : 37.1.207.121
94
95[+] Headers :
96
97[+] Server : nginx/1.14.1
98[+] Date : Fri, 28 Feb 2020 03:15:11 GMT
99[+] Content-Type : text/html; charset=UTF-8
100[+] Transfer-Encoding : chunked
101[+] Connection : keep-alive
102[+] X-Powered-By : PHP/7.2.5
103
104[+] SSL Certificate Information :
105
106[-] SSL is not Present on Target URL...Skipping...
107
108[+] Whois Lookup :
109
110[+] NIR : None
111[+] ASN Registry : ripencc
112[+] ASN : 50673
113[+] ASN CIDR : 37.1.200.0/21
114[+] ASN Country Code : UA
115[+] ASN Date : 2011-12-13
116[+] ASN Description : SERVERIUS-AS, NL
117[+] cidr : 37.1.200.0/21
118[+] name : CLOUD-NETWORK-NL
119[+] handle : ISPR1-RIPE
120[+] range : 37.1.200.0 - 37.1.207.255
121[+] description : ********************************************************
122* As ISP we provide IP transit and bandwidth services.
123*
124* Those services are self managed by our customers
125* therefore, we are not using this IP space ourselves
126* and it could be assigned to various end customers.
127* In case of issues related with SPAM, Fraud, Phishing
128* DDoS, port scans or others, feel free to contact us
129* with relevant info. Abuse email: abuse@ispiria.net
130[+] country : NL
131[+] state : None
132[+] city : None
133[+] address : 5792 Saint Thomas Street, Suite 303, Belize City, Belize
134[+] postal_code : None
135[+] emails : ['abuse@ispiria.net', 'support@ispiria.net', 'sales@ispiria.net']
136[+] created : 2011-12-13T12:45:15Z
137[+] updated : 2019-09-26T09:28:11Z
138
139[+] Crawling Target...
140
141[+] Looking for robots.txt........[ Not Found ]
142[+] Looking for sitemap.xml.......[ Not Found ]
143[+] Extracting CSS Links..........[ 0 ]
144[+] Extracting Javascript Links...[ 0 ]
145[+] Extracting Internal Links.....[ 2 ]
146[+] Extracting External Links.....[ 0 ]
147[+] Extracting Images.............[ 130 ]
148
149[+] Total Links Extracted : 132
150
151[+] Dumping Links in /opt/FinalRecon/dumps/teens-sins.net.dump
152[+] Completed!
153######################################################################################################################################
154[i] Scanning Site: http://teens-sins.net
155
156
157
158B A S I C I N F O
159====================
160
161
162[+] Site Title: FREE PHOTO and VIDEO PORN GALLERY teen sins
163[+] IP address: 37.1.207.121
164[+] Web Server: nginx/1.14.1
165[+] CMS: Could Not Detect
166[+] Cloudflare: Not Detected
167[+] Robots File: Could NOT Find robots.txt!
168
169
170
171
172W H O I S L O O K U P
173========================
174
175 Domain Name: TEENS-SINS.NET
176 Registry Domain ID: 1555237836_DOMAIN_NET-VRSN
177 Registrar WHOIS Server: whois.PublicDomainRegistry.com
178 Registrar URL: http://www.publicdomainregistry.com
179 Updated Date: 2019-04-21T10:15:13Z
180 Creation Date: 2009-05-10T19:46:13Z
181 Registry Expiry Date: 2020-05-10T19:46:13Z
182 Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com
183 Registrar IANA ID: 303
184 Registrar Abuse Contact Email: abuse-contact@publicdomainregistry.com
185 Registrar Abuse Contact Phone: +1.2013775952
186 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
187 Name Server: NS1.RUS-SEX-GIRLS.NET
188 Name Server: NS2.RUS-SEX-GIRLS.NET
189 DNSSEC: unsigned
190 URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
191>>> Last update of whois database: 2020-02-28T03:15:12Z <<<
192
193For more information on Whois status codes, please visit https://icann.org/epp
194
195
196
197The Registry database contains ONLY .COM, .NET, .EDU domains and
198Registrars.
199
200
201
202
203G E O I P L O O K U P
204=========================
205
206[i] IP Address: 37.1.207.121
207[i] Country: Netherlands
208[i] State:
209[i] City:
210[i] Latitude: 52.3824
211[i] Longitude: 4.8995
212
213
214
215
216H T T P H E A D E R S
217=======================
218
219
220[i] HTTP/1.1 200 OK
221[i] Server: nginx/1.14.1
222[i] Date: Fri, 28 Feb 2020 03:15:28 GMT
223[i] Content-Type: text/html; charset=UTF-8
224[i] Connection: close
225[i] X-Powered-By: PHP/7.2.5
226
227
228
229
230D N S L O O K U P
231===================
232
233teens-sins.net. 3599 IN MX 10 mail.teens-sins.net.
234teens-sins.net. 3599 IN MX 20 mail.teens-sins.net.
235teens-sins.net. 3599 IN TXT "v=spf1 ip4:37.1.207.121 ip4:5.45.71.91 a mx ~all"
236teens-sins.net. 3599 IN A 37.1.207.121
237teens-sins.net. 3599 IN SOA server.domain.com. root.teens-sins.net. 2018060730 3600 3600 604800 86400
238teens-sins.net. 3599 IN NS ns1.rus-sex-girls.net.
239teens-sins.net. 3599 IN NS ns2.rus-sex-girls.net.
240
241
242
243
244S U B N E T C A L C U L A T I O N
245====================================
246
247Address = 37.1.207.121
248Network = 37.1.207.121 / 32
249Netmask = 255.255.255.255
250Broadcast = not needed on Point-to-Point links
251Wildcard Mask = 0.0.0.0
252Hosts Bits = 0
253Max. Hosts = 1 (2^0 - 0)
254Host Range = { 37.1.207.121 - 37.1.207.121 }
255
256
257
258N M A P P O R T S C A N
259============================
260
261Starting Nmap 7.70 ( https://nmap.org ) at 2020-02-28 03:15 UTC
262Nmap scan report for teens-sins.net (37.1.207.121)
263Host is up (0.080s latency).
264
265PORT STATE SERVICE
26621/tcp filtered ftp
26722/tcp filtered ssh
26880/tcp open http
269443/tcp closed https
270
271Nmap done: 1 IP address (1 host up) scanned in 1.99 seconds
272
273
274
275S U B - D O M A I N F I N D E R
276==================================
277
278
279[i] Total Subdomains Found : 1
280
281[+] Subdomain: www.teens-sins.net
282[-] IP: 37.1.207.121
283######################################################################################################################################
284[+] Starting At 2020-02-27 22:15:46.695253
285[+] Collecting Information On: http://teens-sins.net/
286[#] Status: 200
287--------------------------------------------------
288[#] Web Server Detected: nginx/1.14.1
289[#] X-Powered-By: PHP/7.2.5
290[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
291- Server: nginx/1.14.1
292- Date: Fri, 28 Feb 2020 03:15:42 GMT
293- Content-Type: text/html; charset=UTF-8
294- Transfer-Encoding: chunked
295- Connection: keep-alive
296- X-Powered-By: PHP/7.2.5
297--------------------------------------------------
298[#] Finding Location..!
299[#] status: success
300[#] country: Netherlands
301[#] countryCode: NL
302[#] region: FL
303[#] regionName: Provincie Flevoland
304[#] city: Dronten
305[#] zip: 8254
306[#] lat: 52.5347
307[#] lon: 5.72181
308[#] timezone: Europe/Amsterdam
309[#] isp: 3NT Hosting Network
310[#] org: 3NT Solutions LLP
311[#] as: AS50673 Serverius Holding B.V.
312[#] query: 37.1.207.121
313--------------------------------------------------
314[x] Didn't Detect WAF Presence on: http://teens-sins.net/
315--------------------------------------------------
316[#] Starting Reverse DNS
317[-] Failed ! Fail
318--------------------------------------------------
319[!] Scanning Open Port
320[#] 25/tcp open smtp
321[#] 53/tcp open domain
322[#] 80/tcp open http
323[#] 110/tcp open pop3
324[#] 143/tcp open imap
325[#] 465/tcp open smtps
326[#] 587/tcp open submission
327[#] 993/tcp open imaps
328[#] 995/tcp open pop3s
329[#] 1500/tcp open vlsi-lm
330[#] 8085/tcp open unknown
331--------------------------------------------------
332[+] Getting SSL Info
333[Errno 111] Connection refused
334--------------------------------------------------
335[+] Collecting Information Disclosure!
336[#] Detecting sitemap.xml file
337[-] sitemap.xml file not Found!?
338[#] Detecting robots.txt file
339[-] robots.txt file not Found!?
340[#] Detecting GNU Mailman
341[-] GNU Mailman App Not Detected!?
342--------------------------------------------------
343[+] Crawling Url Parameter On: http://teens-sins.net/
344--------------------------------------------------
345[#] Searching Html Form !
346[-] No Html Form Found!?
347--------------------------------------------------
348[-] No DOM Paramter Found!?
349--------------------------------------------------
350[!] 263 Internal Dynamic Parameter Discovered
351[+] http://www.teens-sins.net/ftt2/o.php?l=photo
352[+] http://teens-sins.net//streamrotator/out.php?l=0.1.0.24748.154328&u=/ftt2/o.php?link=0.1.0.24748.154328&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNTcwJTJGNzg0MzA3JTJGMjczJTJGaW5kZXgucGhw~
353[+] http://teens-sins.net//streamrotator/out.php?l=0.1.0.24748.154328&u=/ftt2/o.php?link=0.1.0.24748.154328&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNTcwJTJGNzg0MzA3JTJGMjczJTJGaW5kZXgucGhw~
354[+] http://teens-sins.net//streamrotator/out.php?l=0.1.1.37784.236239&u=/ftt2/o.php?link=0.1.1.37784.236239&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZmYWlyeWJlYXV0eXVuZHJlc3NpbmclMkY2MjklMkZpbmRleC5odG1s~
355[+] http://teens-sins.net//streamrotator/out.php?l=0.1.1.37784.236239&u=/ftt2/o.php?link=0.1.1.37784.236239&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZmYWlyeWJlYXV0eXVuZHJlc3NpbmclMkY2MjklMkZpbmRleC5odG1s~
356[+] http://teens-sins.net//streamrotator/out.php?l=0.1.2.19202.122111&u=/ftt2/o.php?link=0.1.2.19202.122111&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczIuYWR1bHQtZW1waXJlLmNvbSUyRjc5NDIlMkY1MjAyODYlMkY0MzMlMkYyJTJGaW5kZXgucGhw~
357[+] http://teens-sins.net//streamrotator/out.php?l=0.1.2.19202.122111&u=/ftt2/o.php?link=0.1.2.19202.122111&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczIuYWR1bHQtZW1waXJlLmNvbSUyRjc5NDIlMkY1MjAyODYlMkY0MzMlMkYyJTJGaW5kZXgucGhw~
358[+] http://teens-sins.net//streamrotator/out.php?l=0.1.3.34928.212137&u=/ftt2/o.php?link=0.1.3.34928.212137&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVuYW5nZWxmbG93ZXJzJTJGNjI5JTJGaW5kZXguaHRtbA==~
359[+] http://teens-sins.net//streamrotator/out.php?l=0.1.3.34928.212137&u=/ftt2/o.php?link=0.1.3.34928.212137&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVuYW5nZWxmbG93ZXJzJTJGNjI5JTJGaW5kZXguaHRtbA==~
360[+] http://teens-sins.net//streamrotator/out.php?l=0.1.4.42001.268256.t&u=/ftt2/o.php?link=0.1.4.42001.268256.t&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZGlucnllJTJGNjI5JTJGaW5kZXguaHRtbA==~
361[+] http://teens-sins.net//streamrotator/out.php?l=0.1.4.42001.268256.t&u=/ftt2/o.php?link=0.1.4.42001.268256.t&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZGlucnllJTJGNjI5JTJGaW5kZXguaHRtbA==~
362[+] http://teens-sins.net//streamrotator/out.php?l=0.1.5.42000.268272.t&u=/ftt2/o.php?link=0.1.5.42000.268272.t&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZyZWRoZWFkY2hhcm1lciUyRjYyOSUyRmluZGV4Lmh0bWw=~
363[+] http://teens-sins.net//streamrotator/out.php?l=0.1.5.42000.268272.t&u=/ftt2/o.php?link=0.1.5.42000.268272.t&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZyZWRoZWFkY2hhcm1lciUyRjYyOSUyRmluZGV4Lmh0bWw=~
364[+] http://teens-sins.net//streamrotator/out.php?l=0.1.6.2916.4518&u=/ftt2/o.php?link=0.1.6.2916.4518&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tJTJGOTk5NiUyRjYzMDc5OCUyRjI3MyUyRmluZGV4LnBocA==~
365[+] http://teens-sins.net//streamrotator/out.php?l=0.1.6.2916.4518&u=/ftt2/o.php?link=0.1.6.2916.4518&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tJTJGOTk5NiUyRjYzMDc5OCUyRjI3MyUyRmluZGV4LnBocA==~
366[+] http://teens-sins.net//streamrotator/out.php?l=0.1.7.3265.8525&u=/ftt2/o.php?link=0.1.7.3265.8525&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tJTJGMTA1NDElMkY2MzY1MjAlMkYyNzMlMkZpbmRleC5waHA=~
367[+] http://teens-sins.net//streamrotator/out.php?l=0.1.7.3265.8525&u=/ftt2/o.php?link=0.1.7.3265.8525&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tJTJGMTA1NDElMkY2MzY1MjAlMkYyNzMlMkZpbmRleC5waHA=~
368[+] http://teens-sins.net//streamrotator/out.php?l=0.1.8.11642.94453&u=/ftt2/o.php?link=0.1.8.11642.94453&url=~aHR0cCUzQSUyRiUyRnd3dy53YW5uYWdpcmxzLm5ldCUyRmdhbGxlcmllcyUyRmNvdmVyaGVyZmFjZS1zcGVybS1mYWNlJTJGaW5kZXgwMjQuaHRtbA==~
369[+] http://teens-sins.net//streamrotator/out.php?l=0.1.8.11642.94453&u=/ftt2/o.php?link=0.1.8.11642.94453&url=~aHR0cCUzQSUyRiUyRnd3dy53YW5uYWdpcmxzLm5ldCUyRmdhbGxlcmllcyUyRmNvdmVyaGVyZmFjZS1zcGVybS1mYWNlJTJGaW5kZXgwMjQuaHRtbA==~
370[+] http://teens-sins.net//streamrotator/out.php?l=0.1.9.9215.71677&u=/ftt2/o.php?link=0.1.9.9215.71677&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tJTJGMTA1MzUlMkY2MzkwNTUlMkYyODM2JTJGaW5kZXgucGhw~
371[+] http://teens-sins.net//streamrotator/out.php?l=0.1.9.9215.71677&u=/ftt2/o.php?link=0.1.9.9215.71677&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tJTJGMTA1MzUlMkY2MzkwNTUlMkYyODM2JTJGaW5kZXgucGhw~
372[+] http://teens-sins.net//streamrotator/out.php?l=0.1.10.37744.235539&u=/ftt2/o.php?link=0.1.10.37744.235539&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZiZWF1dHloYWlyeXB1c3N5JTJGNjI5JTJGaW5kZXguaHRtbA==~
373[+] http://teens-sins.net//streamrotator/out.php?l=0.1.10.37744.235539&u=/ftt2/o.php?link=0.1.10.37744.235539&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZiZWF1dHloYWlyeXB1c3N5JTJGNjI5JTJGaW5kZXguaHRtbA==~
374[+] http://teens-sins.net//streamrotator/out.php?l=0.1.11.37823.236907&u=/ftt2/o.php?link=0.1.11.37823.236907&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZGJsb25kZWJ1bm55JTJGNjI5JTJGaW5kZXguaHRtbA==~
375[+] http://teens-sins.net//streamrotator/out.php?l=0.1.11.37823.236907&u=/ftt2/o.php?link=0.1.11.37823.236907&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZGJsb25kZWJ1bm55JTJGNjI5JTJGaW5kZXguaHRtbA==~
376[+] http://teens-sins.net//streamrotator/out.php?l=0.1.12.23883.146385&u=/ftt2/o.php?link=0.1.12.23883.146385&url=~aHR0cCUzQSUyRiUyRmNvenl4eHguY29tJTJGOTU5OCUyRjgzMTcyMSUyRjI3MyUyRmluZGV4LnBocA==~
377[+] http://teens-sins.net//streamrotator/out.php?l=0.1.12.23883.146385&u=/ftt2/o.php?link=0.1.12.23883.146385&url=~aHR0cCUzQSUyRiUyRmNvenl4eHguY29tJTJGOTU5OCUyRjgzMTcyMSUyRjI3MyUyRmluZGV4LnBocA==~
378[+] http://teens-sins.net//streamrotator/out.php?l=0.1.13.22694.143508&u=/ftt2/o.php?link=0.1.13.22694.143508&url=~aHR0cCUzQSUyRiUyRnd3dy5udWRpc3QtcGhvdG9zLm5ldCUyRmZhbWlseS1udWRpc20tcGljdHVyZXMuaHRtbA==~
379[+] http://teens-sins.net//streamrotator/out.php?l=0.1.13.22694.143508&u=/ftt2/o.php?link=0.1.13.22694.143508&url=~aHR0cCUzQSUyRiUyRnd3dy5udWRpc3QtcGhvdG9zLm5ldCUyRmZhbWlseS1udWRpc20tcGljdHVyZXMuaHRtbA==~
380[+] http://teens-sins.net//streamrotator/out.php?l=0.1.14.41999.268237.t&u=/ftt2/o.php?link=0.1.14.41999.268237.t&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZudWRlbG9uZ2hhaXJlZHRlZW5pZSUyRjYyOSUyRmluZGV4Lmh0bWw=~
381[+] http://teens-sins.net//streamrotator/out.php?l=0.1.14.41999.268237.t&u=/ftt2/o.php?link=0.1.14.41999.268237.t&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZudWRlbG9uZ2hhaXJlZHRlZW5pZSUyRjYyOSUyRmluZGV4Lmh0bWw=~
382[+] http://teens-sins.net//streamrotator/out.php?l=0.1.15.35804.219761&u=/ftt2/o.php?link=0.1.15.35804.219761&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZGxvbmdoYWlyZWRjdXRpZSUyRjYyOSUyRmluZGV4Lmh0bWw=~
383[+] http://teens-sins.net//streamrotator/out.php?l=0.1.15.35804.219761&u=/ftt2/o.php?link=0.1.15.35804.219761&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZGxvbmdoYWlyZWRjdXRpZSUyRjYyOSUyRmluZGV4Lmh0bWw=~
384[+] http://teens-sins.net//streamrotator/out.php?l=0.1.16.34272.206151&u=/ftt2/o.php?link=0.1.16.34272.206151&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZG9uYmVhY2glMkY2MjklMkZpbmRleC5odG1s~
385[+] http://teens-sins.net//streamrotator/out.php?l=0.1.16.34272.206151&u=/ftt2/o.php?link=0.1.16.34272.206151&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZG9uYmVhY2glMkY2MjklMkZpbmRleC5odG1s~
386[+] http://teens-sins.net//streamrotator/out.php?l=0.1.17.23610.144528&u=/ftt2/o.php?link=0.1.17.23610.144528&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyOTI2JTJGODEzMjkwJTJGMjczJTJGaW5kZXgucGhw~
387[+] http://teens-sins.net//streamrotator/out.php?l=0.1.17.23610.144528&u=/ftt2/o.php?link=0.1.17.23610.144528&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyOTI2JTJGODEzMjkwJTJGMjczJTJGaW5kZXgucGhw~
388[+] http://teens-sins.net//streamrotator/out.php?l=0.1.18.24754.154191&u=/ftt2/o.php?link=0.1.18.24754.154191&url=~aHR0cCUzQSUyRiUyRnN3ZWV0Z2lybGllLmNvbSUyRmdhbGxzJTJGMDUyJTJGaW5kZXgucGhw~
389[+] http://teens-sins.net//streamrotator/out.php?l=0.1.18.24754.154191&u=/ftt2/o.php?link=0.1.18.24754.154191&url=~aHR0cCUzQSUyRiUyRnN3ZWV0Z2lybGllLmNvbSUyRmdhbGxzJTJGMDUyJTJGaW5kZXgucGhw~
390[+] http://teens-sins.net//streamrotator/out.php?l=0.1.19.22405.140725&u=/ftt2/o.php?link=0.1.19.22405.140725&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNzU4JTJGODEwNzAzJTJGMjczJTJGaW5kZXgucGhw~
391[+] http://teens-sins.net//streamrotator/out.php?l=0.1.19.22405.140725&u=/ftt2/o.php?link=0.1.19.22405.140725&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNzU4JTJGODEwNzAzJTJGMjczJTJGaW5kZXgucGhw~
392[+] http://teens-sins.net//streamrotator/out.php?l=0.2.0.36797.223630&u=/ftt2/o.php?link=video&p=50&url=~aHR0cHMlM0ElMkYlMkZ4aGFtc3Rlci5jb20lMkZtb3ZpZXMlMkYxMDc0Mjg2MCUyRmN1bV9vbl9teV9mcmllbmQuaHRtbA==~
393[+] http://teens-sins.net//streamrotator/out.php?l=0.2.0.36797.223630&u=/ftt2/o.php?link=video&p=50&url=~aHR0cHMlM0ElMkYlMkZ4aGFtc3Rlci5jb20lMkZtb3ZpZXMlMkYxMDc0Mjg2MCUyRmN1bV9vbl9teV9mcmllbmQuaHRtbA==~
394[+] http://teens-sins.net//streamrotator/out.php?l=0.2.1.30896.185592&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwMzczNDIlMkZqZXVuZV9jb2Nob25uZV9zdWNlX2VuX3ZvaXR1cmUuaHRtbA==~
395[+] http://teens-sins.net//streamrotator/out.php?l=0.2.1.30896.185592&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwMzczNDIlMkZqZXVuZV9jb2Nob25uZV9zdWNlX2VuX3ZvaXR1cmUuaHRtbA==~
396[+] http://teens-sins.net//streamrotator/out.php?l=0.2.2.33551.198854&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcxMDkyMjUlMkYxOF95b190ZWVuX2FtYXRldXJfYmxvd2pvYl9jdW1fc2hvdF9pbl9tb3V0aC5odG1s~
397[+] http://teens-sins.net//streamrotator/out.php?l=0.2.2.33551.198854&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcxMDkyMjUlMkYxOF95b190ZWVuX2FtYXRldXJfYmxvd2pvYl9jdW1fc2hvdF9pbl9tb3V0aC5odG1s~
398[+] http://teens-sins.net//streamrotator/out.php?l=0.2.3.31813.197031.t&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwNjE5NDUlMkZmaXJzdF90aW1lX3dlYmNhbV9tYXN0dXJiYXRlXy1fY2FtZm9ycG9ybl9jb21fLV8xNF9taW4uaHRtbA==~
399[+] http://teens-sins.net//streamrotator/out.php?l=0.2.3.31813.197031.t&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwNjE5NDUlMkZmaXJzdF90aW1lX3dlYmNhbV9tYXN0dXJiYXRlXy1fY2FtZm9ycG9ybl9jb21fLV8xNF9taW4uaHRtbA==~
400[+] http://teens-sins.net//streamrotator/out.php?l=0.2.4.39113.246098&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjY5OTE5NTIlMkZwZXRpdGVfdGVlbl9tYXN0dXJiYXRpbmdfYW5kX2RhbmNpbmcuaHRtbA==~
401[+] http://teens-sins.net//streamrotator/out.php?l=0.2.4.39113.246098&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjY5OTE5NTIlMkZwZXRpdGVfdGVlbl9tYXN0dXJiYXRpbmdfYW5kX2RhbmNpbmcuaHRtbA==~
402[+] http://teens-sins.net//streamrotator/out.php?l=0.2.5.35653.212194&u=/ftt2/o.php?link=video&p=50&url=~aHR0cHMlM0ElMkYlMkZ4aGFtc3Rlci5jb20lMkZtb3ZpZXMlMkYxMDU4MzM2MyUyRnRhbl9sZWF0aGVyX3NraW5fZmlybV9uaXBwbGVzX2FuZF93ZXRfZnVja19ob2xlLmh0bWw=~
403[+] http://teens-sins.net//streamrotator/out.php?l=0.2.5.35653.212194&u=/ftt2/o.php?link=video&p=50&url=~aHR0cHMlM0ElMkYlMkZ4aGFtc3Rlci5jb20lMkZtb3ZpZXMlMkYxMDU4MzM2MyUyRnRhbl9sZWF0aGVyX3NraW5fZmlybV9uaXBwbGVzX2FuZF93ZXRfZnVja19ob2xlLmh0bWw=~
404[+] http://teens-sins.net//streamrotator/out.php?l=0.2.6.32613.197946&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwNzk0NDUlMkZ0ZWVuX2NyeV93aGVuX2lfZnVja2VfaGVyX2Fzcy5odG1s~
405[+] http://teens-sins.net//streamrotator/out.php?l=0.2.6.32613.197946&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwNzk0NDUlMkZ0ZWVuX2NyeV93aGVuX2lfZnVja2VfaGVyX2Fzcy5odG1s~
406[+] http://teens-sins.net//streamrotator/out.php?l=0.2.7.36342.222037&u=/ftt2/o.php?link=video&p=50&url=~aHR0cHMlM0ElMkYlMkZ4aGFtc3Rlci5jb20lMkZtb3ZpZXMlMkYxMDY4OTQ0MyUyRmZ1Y2tpbmdfZ2ZfMThfeWVhcnNfb2xkX2Jidy5odG1s~
407[+] http://teens-sins.net//streamrotator/out.php?l=0.2.7.36342.222037&u=/ftt2/o.php?link=video&p=50&url=~aHR0cHMlM0ElMkYlMkZ4aGFtc3Rlci5jb20lMkZtb3ZpZXMlMkYxMDY4OTQ0MyUyRmZ1Y2tpbmdfZ2ZfMThfeWVhcnNfb2xkX2Jidy5odG1s~
408[+] http://teens-sins.net//streamrotator/out.php?l=0.2.8.32170.197410.t&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwNjk2OTklMkZjbGFyaXNzX2VuX3BsZWluX2V4ZXJjaXNzZS5odG1s~
409[+] http://teens-sins.net//streamrotator/out.php?l=0.2.8.32170.197410.t&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwNjk2OTklMkZjbGFyaXNzX2VuX3BsZWluX2V4ZXJjaXNzZS5odG1s~
410[+] http://teens-sins.net//streamrotator/out.php?l=0.2.9.39119.244822&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjY5OTE3ODUlMkZqdXN0X3dldHRpbmdfcHVibGljX2JhdGhyb29tX2Zsb29yLmh0bWw=~
411[+] http://teens-sins.net//streamrotator/out.php?l=0.2.9.39119.244822&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjY5OTE3ODUlMkZqdXN0X3dldHRpbmdfcHVibGljX2JhdGhyb29tX2Zsb29yLmh0bWw=~
412[+] http://teens-sins.net//streamrotator/out.php?l=0.2.10.32405.197717&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwNzU4MzglMkZzdXBlcl9zd2VldC5odG1s~
413[+] http://teens-sins.net//streamrotator/out.php?l=0.2.10.32405.197717&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwNzU4MzglMkZzdXBlcl9zd2VldC5odG1s~
414[+] http://teens-sins.net//streamrotator/out.php?l=0.2.11.36367.221872&u=/ftt2/o.php?link=video&p=50&url=~aHR0cHMlM0ElMkYlMkZ4aGFtc3Rlci5jb20lMkZtb3ZpZXMlMkYxMDY5MDY2NSUyRnRlYW1za2VldF8tX2Jlc3Rfb2ZfYW1hdGV1cl90ZWVuX2dpcmxzX2dldHRpbmdfZnVja2VkLmh0bWw=~
415[+] http://teens-sins.net//streamrotator/out.php?l=0.2.11.36367.221872&u=/ftt2/o.php?link=video&p=50&url=~aHR0cHMlM0ElMkYlMkZ4aGFtc3Rlci5jb20lMkZtb3ZpZXMlMkYxMDY5MDY2NSUyRnRlYW1za2VldF8tX2Jlc3Rfb2ZfYW1hdGV1cl90ZWVuX2dpcmxzX2dldHRpbmdfZnVja2VkLmh0bWw=~
416[+] http://teens-sins.net//streamrotator/out.php?l=0.2.12.30969.187029&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwNDExODYlMkZwZXJmZWN0X2hhbmRqb2JfYW5kX2N1bXNob3QuaHRtbA==~
417[+] http://teens-sins.net//streamrotator/out.php?l=0.2.12.30969.187029&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwNDExODYlMkZwZXJmZWN0X2hhbmRqb2JfYW5kX2N1bXNob3QuaHRtbA==~
418[+] http://teens-sins.net//streamrotator/out.php?l=0.2.13.39065.244856&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjY5ODYxNDclMkYzX3NleHlfdGVlbnNfZnVja193aXRoX2FfbHVja3lfZ3V5Lmh0bWw=~
419[+] http://teens-sins.net//streamrotator/out.php?l=0.2.13.39065.244856&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjY5ODYxNDclMkYzX3NleHlfdGVlbnNfZnVja193aXRoX2FfbHVja3lfZ3V5Lmh0bWw=~
420[+] http://teens-sins.net//streamrotator/out.php?l=0.2.14.31920.197245&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwNjY2MTUlMkZiaWdfY2xpdF8wNi5odG1s~
421[+] http://teens-sins.net//streamrotator/out.php?l=0.2.14.31920.197245&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwNjY2MTUlMkZiaWdfY2xpdF8wNi5odG1s~
422[+] http://teens-sins.net//streamrotator/out.php?l=0.1.20.10304.86341&u=/ftt2/o.php?link=0.1.20.10304.86341&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExMzQ0JTJGNzI1NDUxJTJGMjczJTJGaW5kZXgucGhw~
423[+] http://teens-sins.net//streamrotator/out.php?l=0.1.20.10304.86341&u=/ftt2/o.php?link=0.1.20.10304.86341&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExMzQ0JTJGNzI1NDUxJTJGMjczJTJGaW5kZXgucGhw~
424[+] http://teens-sins.net//streamrotator/out.php?l=0.1.21.23687.145255&u=/ftt2/o.php?link=0.1.21.23687.145255&url=~aHR0cCUzQSUyRiUyRmJ1bGtqZXJrLmNvbSUyRjM5MjYlMkY3OTA3MDElMkYxMTExJTJGaW5kZXgucGhw~
425[+] http://teens-sins.net//streamrotator/out.php?l=0.1.21.23687.145255&u=/ftt2/o.php?link=0.1.21.23687.145255&url=~aHR0cCUzQSUyRiUyRmJ1bGtqZXJrLmNvbSUyRjM5MjYlMkY3OTA3MDElMkYxMTExJTJGaW5kZXgucGhw~
426[+] http://teens-sins.net//streamrotator/out.php?l=0.1.22.38255.243964&u=/ftt2/o.php?link=0.1.22.38255.243964&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZzaGFwZWx5dGVlbnNoYXZlZHB1c3N5JTJGNjI5JTJGaW5kZXguaHRtbA==~
427[+] http://teens-sins.net//streamrotator/out.php?l=0.1.22.38255.243964&u=/ftt2/o.php?link=0.1.22.38255.243964&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZzaGFwZWx5dGVlbnNoYXZlZHB1c3N5JTJGNjI5JTJGaW5kZXguaHRtbA==~
428[+] http://teens-sins.net//streamrotator/out.php?l=0.1.23.23392.144005&u=/ftt2/o.php?link=0.1.23.23392.144005&url=~aHR0cCUzQSUyRiUyRnd3dy5yZWFsZ2ZzZXhwb3NlZC5jb20lMkZmaGclMkYyJTJGZ2ZzMTMlMkYlM0ZuYXRzJTNETkRRdU5pNHhMakV1TUM0NE9TNHdMakF1TUE=~
429[+] http://teens-sins.net//streamrotator/out.php?l=0.1.23.23392.144005&u=/ftt2/o.php?link=0.1.23.23392.144005&url=~aHR0cCUzQSUyRiUyRnd3dy5yZWFsZ2ZzZXhwb3NlZC5jb20lMkZmaGclMkYyJTJGZ2ZzMTMlMkYlM0ZuYXRzJTNETkRRdU5pNHhMakV1TUM0NE9TNHdMakF1TUE=~
430[+] http://teens-sins.net//streamrotator/out.php?l=0.1.24.18854.137624&u=/ftt2/o.php?link=0.1.24.18854.137624&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczIuYWR1bHQtZW1waXJlLmNvbSUyRjgyODElMkY1NDI1ODIlMkY2MTYwJTJGaW5kZXgucGhw~
431[+] http://teens-sins.net//streamrotator/out.php?l=0.1.24.18854.137624&u=/ftt2/o.php?link=0.1.24.18854.137624&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczIuYWR1bHQtZW1waXJlLmNvbSUyRjgyODElMkY1NDI1ODIlMkY2MTYwJTJGaW5kZXgucGhw~
432[+] http://teens-sins.net//streamrotator/out.php?l=0.1.25.22212.139515&u=/ftt2/o.php?link=0.1.25.22212.139515&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNzgyJTJGODAwMjA1JTJGMjczJTJGaW5kZXgucGhw~
433[+] http://teens-sins.net//streamrotator/out.php?l=0.1.25.22212.139515&u=/ftt2/o.php?link=0.1.25.22212.139515&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNzgyJTJGODAwMjA1JTJGMjczJTJGaW5kZXgucGhw~
434[+] http://teens-sins.net//streamrotator/out.php?l=0.1.26.24717.154255&u=/ftt2/o.php?link=0.1.26.24717.154255&url=~aHR0cCUzQSUyRiUyRmpvaW4udGVlbmxpbGx5LmNvbSUyRmdhbGxlcnklMkZoYW1yYWRpby4yLjQzLjQzLjAuMjc3MC4wLjAuMA==~
435[+] http://teens-sins.net//streamrotator/out.php?l=0.1.26.24717.154255&u=/ftt2/o.php?link=0.1.26.24717.154255&url=~aHR0cCUzQSUyRiUyRmpvaW4udGVlbmxpbGx5LmNvbSUyRmdhbGxlcnklMkZoYW1yYWRpby4yLjQzLjQzLjAuMjc3MC4wLjAuMA==~
436[+] http://teens-sins.net//streamrotator/out.php?l=0.1.27.10673.87803&u=/ftt2/o.php?link=0.1.27.10673.87803&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tJTJGNzU4NiUyRjcyNTk5NCUyRjI3MyUyRmluZGV4LnBocA==~
437[+] http://teens-sins.net//streamrotator/out.php?l=0.1.27.10673.87803&u=/ftt2/o.php?link=0.1.27.10673.87803&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tJTJGNzU4NiUyRjcyNTk5NCUyRjI3MyUyRmluZGV4LnBocA==~
438[+] http://teens-sins.net//streamrotator/out.php?l=0.1.28.19190.154259&u=/ftt2/o.php?link=0.1.28.19190.154259&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tJTJGOTg1MCUyRjU0MjQ4MiUyRjQzMyUyRmluZGV4LnBocA==~
439[+] http://teens-sins.net//streamrotator/out.php?l=0.1.28.19190.154259&u=/ftt2/o.php?link=0.1.28.19190.154259&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tJTJGOTg1MCUyRjU0MjQ4MiUyRjQzMyUyRmluZGV4LnBocA==~
440[+] http://teens-sins.net//streamrotator/out.php?l=0.1.29.584.72&u=/ftt2/o.php?link=0.1.29.584.72&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5lbWlseTE4LmNvbSUyRm51ZGUxJTJGZW1pbHktYWxvbmUlMkZpbmRleDYucGhwJTNGaWQlM0QxNjMxNzE0~
441[+] http://teens-sins.net//streamrotator/out.php?l=0.1.29.584.72&u=/ftt2/o.php?link=0.1.29.584.72&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5lbWlseTE4LmNvbSUyRm51ZGUxJTJGZW1pbHktYWxvbmUlMkZpbmRleDYucGhwJTNGaWQlM0QxNjMxNzE0~
442[+] http://teens-sins.net//streamrotator/out.php?l=0.1.30.1933.2209&u=/ftt2/o.php?link=0.1.30.1933.2209&url=~aHR0cCUzQSUyRiUyRnJlYWxleGdpcmxmcmllbmRzLndhdGNobXlnZi5uZXQlMkZnJTJGMzI4JTJGYWw0YQ==~
443[+] http://teens-sins.net//streamrotator/out.php?l=0.1.30.1933.2209&u=/ftt2/o.php?link=0.1.30.1933.2209&url=~aHR0cCUzQSUyRiUyRnJlYWxleGdpcmxmcmllbmRzLndhdGNobXlnZi5uZXQlMkZnJTJGMzI4JTJGYWw0YQ==~
444[+] http://teens-sins.net//streamrotator/out.php?l=0.1.31.41820.264750&u=/ftt2/o.php?link=0.1.31.41820.264750&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZzZW5zdWFsYnJ1bmV0dGUlMkY2MjklMkZpbmRleC5odG1s~
445[+] http://teens-sins.net//streamrotator/out.php?l=0.1.31.41820.264750&u=/ftt2/o.php?link=0.1.31.41820.264750&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZzZW5zdWFsYnJ1bmV0dGUlMkY2MjklMkZpbmRleC5odG1s~
446[+] http://teens-sins.net//streamrotator/out.php?l=0.1.32.11645.94725&u=/ftt2/o.php?link=0.1.32.11645.94725&url=~aHR0cCUzQSUyRiUyRnNlY3VyZS5teXRlZW5pZWNoZWVybGVhZGVyLmNvbSUyRmdhbGxlcnklMkZNakl1TVM0MkxqWXVNQzR5TURjdU1DNHdMakE=~
447[+] http://teens-sins.net//streamrotator/out.php?l=0.1.32.11645.94725&u=/ftt2/o.php?link=0.1.32.11645.94725&url=~aHR0cCUzQSUyRiUyRnNlY3VyZS5teXRlZW5pZWNoZWVybGVhZGVyLmNvbSUyRmdhbGxlcnklMkZNakl1TVM0MkxqWXVNQzR5TURjdU1DNHdMakE=~
448[+] http://teens-sins.net//streamrotator/out.php?l=0.1.33.38260.244057&u=/ftt2/o.php?link=0.1.33.38260.244057&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZ0aGluYmxvbmRlc3RyaXB0ZWFzZSUyRjYyOSUyRmluZGV4Lmh0bWw=~
449[+] http://teens-sins.net//streamrotator/out.php?l=0.1.33.38260.244057&u=/ftt2/o.php?link=0.1.33.38260.244057&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZ0aGluYmxvbmRlc3RyaXB0ZWFzZSUyRjYyOSUyRmluZGV4Lmh0bWw=~
450[+] http://teens-sins.net//streamrotator/out.php?l=0.1.34.27981.167622&u=/ftt2/o.php?link=0.1.34.27981.167622&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZzZXh5dGVlbnJlZmxlY3Rpb24lMkY2MjklMkZpbmRleC5odG1s~
451[+] http://teens-sins.net//streamrotator/out.php?l=0.1.34.27981.167622&u=/ftt2/o.php?link=0.1.34.27981.167622&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZzZXh5dGVlbnJlZmxlY3Rpb24lMkY2MjklMkZpbmRleC5odG1s~
452[+] http://teens-sins.net//streamrotator/out.php?l=0.1.35.34254.206070&u=/ftt2/o.php?link=0.1.35.34254.206070&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZidXN0eXNub3dxdWVlbiUyRjYyOSUyRmluZGV4Lmh0bWw=~
453[+] http://teens-sins.net//streamrotator/out.php?l=0.1.35.34254.206070&u=/ftt2/o.php?link=0.1.35.34254.206070&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZidXN0eXNub3dxdWVlbiUyRjYyOSUyRmluZGV4Lmh0bWw=~
454[+] http://teens-sins.net//streamrotator/out.php?l=0.1.36.4939.13869&u=/ftt2/o.php?link=0.1.36.4939.13869&url=~aHR0cCUzQSUyRiUyRmx1c3RnYWxsZXJpZXMubmV0JTJGJTNGaWQlM0Rlcm90aWMtbGFkaWVzLm5ldA==~
455[+] http://teens-sins.net//streamrotator/out.php?l=0.1.36.4939.13869&u=/ftt2/o.php?link=0.1.36.4939.13869&url=~aHR0cCUzQSUyRiUyRmx1c3RnYWxsZXJpZXMubmV0JTJGJTNGaWQlM0Rlcm90aWMtbGFkaWVzLm5ldA==~
456[+] http://teens-sins.net//streamrotator/out.php?l=0.1.37.27941.168385&u=/ftt2/o.php?link=0.1.37.27941.168385&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZG1vZGVsYm9hdCUyRjYyOSUyRmluZGV4Lmh0bWw=~
457[+] http://teens-sins.net//streamrotator/out.php?l=0.1.37.27941.168385&u=/ftt2/o.php?link=0.1.37.27941.168385&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZG1vZGVsYm9hdCUyRjYyOSUyRmluZGV4Lmh0bWw=~
458[+] http://teens-sins.net//streamrotator/out.php?l=0.1.38.10691.88164&u=/ftt2/o.php?link=0.1.38.10691.88164&url=~aHR0cCUzQSUyRiUyRmZyZWUuMXBhc3Nmb3JhbGxzaXRlcy5jb20lMkY3c2pwa3glMkYzJTJGQW15XyUzRnNpdGVfaWQlM0Q5OQ==~
459[+] http://teens-sins.net//streamrotator/out.php?l=0.1.38.10691.88164&u=/ftt2/o.php?link=0.1.38.10691.88164&url=~aHR0cCUzQSUyRiUyRmZyZWUuMXBhc3Nmb3JhbGxzaXRlcy5jb20lMkY3c2pwa3glMkYzJTJGQW15XyUzRnNpdGVfaWQlM0Q5OQ==~
460[+] http://teens-sins.net//streamrotator/out.php?l=0.1.39.6419.35704&u=/ftt2/o.php?link=0.1.39.6419.35704&url=~aHR0cCUzQSUyRiUyRmZyZWUueW91bmdsaWJlcnRpbmVzLmNvbSUyRnBpY3MlMkYzMTA2MDc5Mzg1JTJGaW5kZXguaHRtJTNGbmF0cyUzRE5qUXpPamM2TVRR~
461[+] http://teens-sins.net//streamrotator/out.php?l=0.1.39.6419.35704&u=/ftt2/o.php?link=0.1.39.6419.35704&url=~aHR0cCUzQSUyRiUyRmZyZWUueW91bmdsaWJlcnRpbmVzLmNvbSUyRnBpY3MlMkYzMTA2MDc5Mzg1JTJGaW5kZXguaHRtJTNGbmF0cyUzRE5qUXpPamM2TVRR~
462[+] http://teens-sins.net//streamrotator/out.php?l=0.1.40.10670.87974&u=/ftt2/o.php?link=0.1.40.10670.87974&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExMzI1JTJGNzI2ODMxJTJGMjczJTJGaW5kZXgucGhw~
463[+] http://teens-sins.net//streamrotator/out.php?l=0.1.40.10670.87974&u=/ftt2/o.php?link=0.1.40.10670.87974&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExMzI1JTJGNzI2ODMxJTJGMjczJTJGaW5kZXgucGhw~
464[+] http://teens-sins.net//streamrotator/out.php?l=0.1.41.24738.154371&u=/ftt2/o.php?link=0.1.41.24738.154371&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNzcxJTJGNzk1MjQ4JTJGMjczJTJGaW5kZXgucGhw~
465[+] http://teens-sins.net//streamrotator/out.php?l=0.1.41.24738.154371&u=/ftt2/o.php?link=0.1.41.24738.154371&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNzcxJTJGNzk1MjQ4JTJGMjczJTJGaW5kZXgucGhw~
466[+] http://teens-sins.net//streamrotator/out.php?l=0.1.42.24742.154462&u=/ftt2/o.php?link=0.1.42.24742.154462&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy53ZW5lZWRuZXd0YWxlbnRzLmNvbSUyRnBpY3MlMkY1NCUyRjc3NDY0NG1hcnRhJTJGMTAwNzk3MCUyRg==~
467[+] http://teens-sins.net//streamrotator/out.php?l=0.1.42.24742.154462&u=/ftt2/o.php?link=0.1.42.24742.154462&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy53ZW5lZWRuZXd0YWxlbnRzLmNvbSUyRnBpY3MlMkY1NCUyRjc3NDY0NG1hcnRhJTJGMTAwNzk3MCUyRg==~
468[+] http://teens-sins.net//streamrotator/out.php?l=0.1.43.5425.21340&u=/ftt2/o.php?link=0.1.43.5425.21340&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5tZXQtYXJ0LmNvbSUyRkZ1bGxfbWV0LWFydF9LRVJfNF84NTAlMkYlM0ZwYSUzRDE2NzA1NjY=~
469[+] http://teens-sins.net//streamrotator/out.php?l=0.1.43.5425.21340&u=/ftt2/o.php?link=0.1.43.5425.21340&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5tZXQtYXJ0LmNvbSUyRkZ1bGxfbWV0LWFydF9LRVJfNF84NTAlMkYlM0ZwYSUzRDE2NzA1NjY=~
470[+] http://teens-sins.net//streamrotator/out.php?l=0.1.44.17035.114259&u=/ftt2/o.php?link=0.1.44.17035.114259&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExNzI5JTJGNzU0MzgxJTJGMjczJTJGaW5kZXgucGhw~
471[+] http://teens-sins.net//streamrotator/out.php?l=0.1.44.17035.114259&u=/ftt2/o.php?link=0.1.44.17035.114259&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExNzI5JTJGNzU0MzgxJTJGMjczJTJGaW5kZXgucGhw~
472[+] http://teens-sins.net//streamrotator/out.php?l=0.1.45.24763.154470&u=/ftt2/o.php?link=0.1.45.24763.154470&url=~aHR0cCUzQSUyRiUyRnRlZW53YW50bWUuY29tJTJGZ2FsbHMlMkYwMDklMkZpbmRleC5odG0=~
473[+] http://teens-sins.net//streamrotator/out.php?l=0.1.45.24763.154470&u=/ftt2/o.php?link=0.1.45.24763.154470&url=~aHR0cCUzQSUyRiUyRnRlZW53YW50bWUuY29tJTJGZ2FsbHMlMkYwMDklMkZpbmRleC5odG0=~
474[+] http://teens-sins.net//streamrotator/out.php?l=0.1.46.37042.224487&u=/ftt2/o.php?link=0.1.46.37042.224487&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZwdXNzeWphY3V6emklMkY2MjklMkZpbmRleC5odG1s~
475[+] http://teens-sins.net//streamrotator/out.php?l=0.1.46.37042.224487&u=/ftt2/o.php?link=0.1.46.37042.224487&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZwdXNzeWphY3V6emklMkY2MjklMkZpbmRleC5odG1s~
476[+] http://teens-sins.net//streamrotator/out.php?l=0.1.47.10671.88066&u=/ftt2/o.php?link=0.1.47.10671.88066&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExMzY5JTJGNzI2NDM3JTJGMjczJTJGaW5kZXgucGhw~
477[+] http://teens-sins.net//streamrotator/out.php?l=0.1.47.10671.88066&u=/ftt2/o.php?link=0.1.47.10671.88066&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExMzY5JTJGNzI2NDM3JTJGMjczJTJGaW5kZXgucGhw~
478[+] http://teens-sins.net//streamrotator/out.php?l=0.1.48.38192.242485&u=/ftt2/o.php?link=0.1.48.38192.242485&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZzZXh5LW51ZGUta2l0dHklMkY2MjklMkZpbmRleC5odG1s~
479[+] http://teens-sins.net//streamrotator/out.php?l=0.1.48.38192.242485&u=/ftt2/o.php?link=0.1.48.38192.242485&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZzZXh5LW51ZGUta2l0dHklMkY2MjklMkZpbmRleC5odG1s~
480[+] http://teens-sins.net//streamrotator/out.php?l=0.1.49.24767.154339&u=/ftt2/o.php?link=0.1.49.24767.154339&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tJTJGNTIwOSUyRjcxNDQ2JTJGNDMzJTJGMiUyRmluZGV4LnBocA==~
481[+] http://teens-sins.net//streamrotator/out.php?l=0.1.49.24767.154339&u=/ftt2/o.php?link=0.1.49.24767.154339&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tJTJGNTIwOSUyRjcxNDQ2JTJGNDMzJTJGMiUyRmluZGV4LnBocA==~
482[+] http://teens-sins.net//streamrotator/out.php?l=0.1.50.24762.154021&u=/ftt2/o.php?link=0.1.50.24762.154021&url=~aHR0cCUzQSUyRiUyRnd3dy50ZWVuc3NlbGZzaG90LmNvbSUyRmZoZ3MlMkYwMjIxJTJGaW5kZXgucGhwJTNGY2NiaWxsJTNEMTQwODIzMA==~
483[+] http://teens-sins.net//streamrotator/out.php?l=0.1.50.24762.154021&u=/ftt2/o.php?link=0.1.50.24762.154021&url=~aHR0cCUzQSUyRiUyRnd3dy50ZWVuc3NlbGZzaG90LmNvbSUyRmZoZ3MlMkYwMjIxJTJGaW5kZXgucGhwJTNGY2NiaWxsJTNEMTQwODIzMA==~
484[+] http://teens-sins.net//streamrotator/out.php?l=0.1.51.10681.87931&u=/ftt2/o.php?link=0.1.51.10681.87931&url=~aHR0cCUzQSUyRiUyRnd3dy54eHg2OS5uZXQlMkZybHMwNTQ4OSUyRnJ1c3RlZW5zZXglMkYyMzYlMkYwMyUyRjAx~
485[+] http://teens-sins.net//streamrotator/out.php?l=0.1.51.10681.87931&u=/ftt2/o.php?link=0.1.51.10681.87931&url=~aHR0cCUzQSUyRiUyRnd3dy54eHg2OS5uZXQlMkZybHMwNTQ4OSUyRnJ1c3RlZW5zZXglMkYyMzYlMkYwMyUyRjAx~
486[+] http://teens-sins.net//streamrotator/out.php?l=0.1.52.37879.237917&u=/ftt2/o.php?link=0.1.52.37879.237917&url=~aHR0cCUzQSUyRiUyRnByb21vLnNrb2tvZmYuY29tJTJGZ2FscyUyRjY0MC13aWxkLXJlZC1lbGVvbm9yYSUyRiUzRndtJTNEMjM5MTY3MQ==~
487[+] http://teens-sins.net//streamrotator/out.php?l=0.1.52.37879.237917&u=/ftt2/o.php?link=0.1.52.37879.237917&url=~aHR0cCUzQSUyRiUyRnByb21vLnNrb2tvZmYuY29tJTJGZ2FscyUyRjY0MC13aWxkLXJlZC1lbGVvbm9yYSUyRiUzRndtJTNEMjM5MTY3MQ==~
488[+] http://teens-sins.net//streamrotator/out.php?l=0.1.53.6444.32787&u=/ftt2/o.php?link=0.1.53.6444.32787&url=~aHR0cCUzQSUyRiUyRmFtb3VyLXh4eC1hbmdlbHMuY29tJTJGZ2FsbGVyaWVzJTJGdGVlbi1tb2RlbDM4~
489[+] http://teens-sins.net//streamrotator/out.php?l=0.1.53.6444.32787&u=/ftt2/o.php?link=0.1.53.6444.32787&url=~aHR0cCUzQSUyRiUyRmFtb3VyLXh4eC1hbmdlbHMuY29tJTJGZ2FsbGVyaWVzJTJGdGVlbi1tb2RlbDM4~
490[+] http://teens-sins.net//streamrotator/out.php?l=0.1.54.35766.220449&u=/ftt2/o.php?link=0.1.54.35766.220449&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZudWRlbW9kZWxzbWFsbHRpdHMlMkY2MjklMkZpbmRleC5odG1s~
491[+] http://teens-sins.net//streamrotator/out.php?l=0.1.54.35766.220449&u=/ftt2/o.php?link=0.1.54.35766.220449&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZudWRlbW9kZWxzbWFsbHRpdHMlMkY2MjklMkZpbmRleC5odG1s~
492[+] http://teens-sins.net//streamrotator/out.php?l=0.1.55.24776.153905&u=/ftt2/o.php?link=0.1.55.24776.153905&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyMTgzJTJGNzY1MTQ1JTJGMjczJTJGaW5kZXgucGhw~
493[+] http://teens-sins.net//streamrotator/out.php?l=0.1.55.24776.153905&u=/ftt2/o.php?link=0.1.55.24776.153905&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyMTgzJTJGNzY1MTQ1JTJGMjczJTJGaW5kZXgucGhw~
494[+] http://teens-sins.net//streamrotator/out.php?l=0.1.56.41785.264076&u=/ftt2/o.php?link=0.1.56.41785.264076&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0aGluYmxvbmRldGVlbmJlYXV0eSUyRjYyOSUyRmluZGV4Lmh0bWw=~
495[+] http://teens-sins.net//streamrotator/out.php?l=0.1.56.41785.264076&u=/ftt2/o.php?link=0.1.56.41785.264076&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0aGluYmxvbmRldGVlbmJlYXV0eSUyRjYyOSUyRmluZGV4Lmh0bWw=~
496[+] http://teens-sins.net//streamrotator/out.php?l=0.1.57.41996.268187&u=/ftt2/o.php?link=0.1.57.41996.268187&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVucHVzc3loYXQlMkY2MjklMkZpbmRleC5odG1s~
497[+] http://teens-sins.net//streamrotator/out.php?l=0.1.57.41996.268187&u=/ftt2/o.php?link=0.1.57.41996.268187&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVucHVzc3loYXQlMkY2MjklMkZpbmRleC5odG1s~
498[+] http://teens-sins.net//streamrotator/out.php?l=0.1.58.13431.98935&u=/ftt2/o.php?link=0.1.58.13431.98935&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExNTMwJTJGNzM3NzE1JTJGMjczJTJGaW5kZXgucGhw~
499[+] http://teens-sins.net//streamrotator/out.php?l=0.1.58.13431.98935&u=/ftt2/o.php?link=0.1.58.13431.98935&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExNTMwJTJGNzM3NzE1JTJGMjczJTJGaW5kZXgucGhw~
500[+] http://teens-sins.net//streamrotator/out.php?l=0.1.59.26195.159067&u=/ftt2/o.php?link=0.1.59.26195.159067&url=~aHR0cCUzQSUyRiUyRmJ1bGtqZXJrLmNvbSUyRjM5MjYlMkY3OTAwMzQlMkYyNzMlMkZpbmRleC5waHA=~
501[+] http://teens-sins.net//streamrotator/out.php?l=0.1.59.26195.159067&u=/ftt2/o.php?link=0.1.59.26195.159067&url=~aHR0cCUzQSUyRiUyRmJ1bGtqZXJrLmNvbSUyRjM5MjYlMkY3OTAwMzQlMkYyNzMlMkZpbmRleC5waHA=~
502[+] http://www.teens-sins.net/ftt2/o.php?l=next
503[+] http://teens-sins.net//streamrotator/out.php?l=0.1.60.41321.258404&u=/ftt2/o.php?link=0.1.60.41321.258404&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwMzA5ayUyRmluZGV4LnBocCUzRm5hdHMlM0RNVGd3T1M0eExqVXVOeTR3TGpRMk5qZ3VNQzR3TGpB~
504[+] http://teens-sins.net//streamrotator/out.php?l=0.1.60.41321.258404&u=/ftt2/o.php?link=0.1.60.41321.258404&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwMzA5ayUyRmluZGV4LnBocCUzRm5hdHMlM0RNVGd3T1M0eExqVXVOeTR3TGpRMk5qZ3VNQzR3TGpB~
505[+] http://teens-sins.net//streamrotator/out.php?l=0.1.61.40829.251646&u=/ftt2/o.php?link=0.1.61.40829.251646&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZob3JueXRoaW50ZWVuJTJGNjI5JTJGaW5kZXguaHRtbA==~
506[+] http://teens-sins.net//streamrotator/out.php?l=0.1.61.40829.251646&u=/ftt2/o.php?link=0.1.61.40829.251646&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZob3JueXRoaW50ZWVuJTJGNjI5JTJGaW5kZXguaHRtbA==~
507[+] http://teens-sins.net//streamrotator/out.php?l=0.1.62.10672.87964&u=/ftt2/o.php?link=0.1.62.10672.87964&url=~aHR0cCUzQSUyRiUyRnNleHh4eXRlZW50dWJlLm5ldCUyRg==~
508[+] http://teens-sins.net//streamrotator/out.php?l=0.1.62.10672.87964&u=/ftt2/o.php?link=0.1.62.10672.87964&url=~aHR0cCUzQSUyRiUyRnNleHh4eXRlZW50dWJlLm5ldCUyRg==~
509[+] http://teens-sins.net//streamrotator/out.php?l=0.1.63.40583.247171&u=/ftt2/o.php?link=0.1.63.40583.247171&url=~aHR0cHMlM0ElMkYlMkZnaWdhcHJvbi5jb20lMkYxNDI2NiUyRjg4NjM4MyUyRjI3MyUyRmluZGV4LnBocA==~
510[+] http://teens-sins.net//streamrotator/out.php?l=0.1.63.40583.247171&u=/ftt2/o.php?link=0.1.63.40583.247171&url=~aHR0cHMlM0ElMkYlMkZnaWdhcHJvbi5jb20lMkYxNDI2NiUyRjg4NjM4MyUyRjI3MyUyRmluZGV4LnBocA==~
511[+] http://teens-sins.net//streamrotator/out.php?l=0.1.64.6857.38685&u=/ftt2/o.php?link=0.1.64.6857.38685&url=~aHR0cCUzQSUyRiUyRnd3dy5sb3ZlbHktbXktZ2lybHMuY29tJTJGZ2FsbGVyaWVzJTJGanVzdC10ZWVucy1wb3JuJTJGdGVlbnMta2lzcy1lYWNoLW90aGVyJTJG~
512[+] http://teens-sins.net//streamrotator/out.php?l=0.1.64.6857.38685&u=/ftt2/o.php?link=0.1.64.6857.38685&url=~aHR0cCUzQSUyRiUyRnd3dy5sb3ZlbHktbXktZ2lybHMuY29tJTJGZ2FsbGVyaWVzJTJGanVzdC10ZWVucy1wb3JuJTJGdGVlbnMta2lzcy1lYWNoLW90aGVyJTJG~
513[+] http://teens-sins.net//streamrotator/out.php?l=0.1.65.19354.123908&u=/ftt2/o.php?link=0.1.65.19354.123908&url=~aHR0cCUzQSUyRiUyRmNvenl4eHguY29tJTJGOTI5MyUyRjc3NDcwMCUyRjI3MyUyRmluZGV4LnBocA==~
514[+] http://teens-sins.net//streamrotator/out.php?l=0.1.65.19354.123908&u=/ftt2/o.php?link=0.1.65.19354.123908&url=~aHR0cCUzQSUyRiUyRmNvenl4eHguY29tJTJGOTI5MyUyRjc3NDcwMCUyRjI3MyUyRmluZGV4LnBocA==~
515[+] http://teens-sins.net//streamrotator/out.php?l=0.1.66.37754.235710&u=/ftt2/o.php?link=0.1.66.37754.235710&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZ0aGlubW9kZWxzdHJpcHRlYXNlJTJGNjI5JTJGaW5kZXguaHRtbA==~
516[+] http://teens-sins.net//streamrotator/out.php?l=0.1.66.37754.235710&u=/ftt2/o.php?link=0.1.66.37754.235710&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZ0aGlubW9kZWxzdHJpcHRlYXNlJTJGNjI5JTJGaW5kZXguaHRtbA==~
517[+] http://teens-sins.net//streamrotator/out.php?l=0.1.67.13433.98937&u=/ftt2/o.php?link=0.1.67.13433.98937&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExNTMwJTJGNzM3NzIyJTJGMjczJTJGaW5kZXgucGhw~
518[+] http://teens-sins.net//streamrotator/out.php?l=0.1.67.13433.98937&u=/ftt2/o.php?link=0.1.67.13433.98937&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExNTMwJTJGNzM3NzIyJTJGMjczJTJGaW5kZXgucGhw~
519[+] http://teens-sins.net//streamrotator/out.php?l=0.1.68.40676.248784&u=/ftt2/o.php?link=0.1.68.40676.248784&url=~aHR0cCUzQSUyRiUyRnd3dy5hcnRudWRlZ2FsbGVyaWVzLmNvbSUyRmJpZ2Jvb2JzJTJGNjI5JTJGaW5kZXguaHRtbA==~
520[+] http://teens-sins.net//streamrotator/out.php?l=0.1.68.40676.248784&u=/ftt2/o.php?link=0.1.68.40676.248784&url=~aHR0cCUzQSUyRiUyRnd3dy5hcnRudWRlZ2FsbGVyaWVzLmNvbSUyRmJpZ2Jvb2JzJTJGNjI5JTJGaW5kZXguaHRtbA==~
521[+] http://teens-sins.net//streamrotator/out.php?l=0.1.69.34447.208363&u=/ftt2/o.php?link=0.1.69.34447.208363&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZzZXh5bnVkZWJsb25kZWN1dGllJTJGNjI5JTJGaW5kZXguaHRtbA==~
522[+] http://teens-sins.net//streamrotator/out.php?l=0.1.69.34447.208363&u=/ftt2/o.php?link=0.1.69.34447.208363&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZzZXh5bnVkZWJsb25kZWN1dGllJTJGNjI5JTJGaW5kZXguaHRtbA==~
523[+] http://teens-sins.net//streamrotator/out.php?l=0.1.70.34482.208743&u=/ftt2/o.php?link=0.1.70.34482.208743&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5iZWF1dHk0ay5jb20lMkY0MDY3ODg0NSUyRiUzRmRlc2lnbiUzRDMlMjZuYXRzJTNETVRBeE1qY3lMalV1TkRJdU5ESXVNQzR3TGpBdU1DNHclQzIlQkI=~
524[+] http://teens-sins.net//streamrotator/out.php?l=0.1.70.34482.208743&u=/ftt2/o.php?link=0.1.70.34482.208743&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5iZWF1dHk0ay5jb20lMkY0MDY3ODg0NSUyRiUzRmRlc2lnbiUzRDMlMjZuYXRzJTNETVRBeE1qY3lMalV1TkRJdU5ESXVNQzR3TGpBdU1DNHclQzIlQkI=~
525[+] http://teens-sins.net//streamrotator/out.php?l=0.1.71.40969.254360&u=/ftt2/o.php?link=0.1.71.40969.254360&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0aGludGVlbmdsb2JlJTJGNjI5JTJGaW5kZXguaHRtbA==~
526[+] http://teens-sins.net//streamrotator/out.php?l=0.1.71.40969.254360&u=/ftt2/o.php?link=0.1.71.40969.254360&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0aGludGVlbmdsb2JlJTJGNjI5JTJGaW5kZXguaHRtbA==~
527[+] http://teens-sins.net//streamrotator/out.php?l=0.1.72.41998.268207&u=/ftt2/o.php?link=0.1.72.41998.268207&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZob3JueWJ1c3R5d2l0Y2glMkY2MjklMkZpbmRleC5odG1s~
528[+] http://teens-sins.net//streamrotator/out.php?l=0.1.72.41998.268207&u=/ftt2/o.php?link=0.1.72.41998.268207&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZob3JueWJ1c3R5d2l0Y2glMkY2MjklMkZpbmRleC5odG1s~
529[+] http://teens-sins.net//streamrotator/out.php?l=0.1.73.27968.167285&u=/ftt2/o.php?link=0.1.73.27968.167285&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZ0aGluY3V0aWVzdHJpcHRlYXNlJTJGNjI5JTJGaW5kZXguaHRtbA==~
530[+] http://teens-sins.net//streamrotator/out.php?l=0.1.73.27968.167285&u=/ftt2/o.php?link=0.1.73.27968.167285&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZ0aGluY3V0aWVzdHJpcHRlYXNlJTJGNjI5JTJGaW5kZXguaHRtbA==~
531[+] http://teens-sins.net//streamrotator/out.php?l=0.1.74.40896.252935&u=/ftt2/o.php?link=0.1.74.40896.252935&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVubW9kZWxoYWlyeXB1c3N5JTJGNjI5JTJGaW5kZXguaHRtbA==~
532[+] http://teens-sins.net//streamrotator/out.php?l=0.1.74.40896.252935&u=/ftt2/o.php?link=0.1.74.40896.252935&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVubW9kZWxoYWlyeXB1c3N5JTJGNjI5JTJGaW5kZXguaHRtbA==~
533[+] http://teens-sins.net//streamrotator/out.php?l=0.1.75.34945.211883&u=/ftt2/o.php?link=0.1.75.34945.211883&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVucHVzc3lyb2xsZXJza2F0ZXMlMkY2MjklMkZpbmRleC5odG1s~
534[+] http://teens-sins.net//streamrotator/out.php?l=0.1.75.34945.211883&u=/ftt2/o.php?link=0.1.75.34945.211883&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVucHVzc3lyb2xsZXJza2F0ZXMlMkY2MjklMkZpbmRleC5odG1s~
535[+] http://teens-sins.net//streamrotator/out.php?l=0.1.76.33859.203142&u=/ftt2/o.php?link=0.1.76.33859.203142&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZwdXNzeW91dGRvb3JzJTJGNjI5JTJGaW5kZXguaHRtbA==~
536[+] http://teens-sins.net//streamrotator/out.php?l=0.1.76.33859.203142&u=/ftt2/o.php?link=0.1.76.33859.203142&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZwdXNzeW91dGRvb3JzJTJGNjI5JTJGaW5kZXguaHRtbA==~
537[+] http://teens-sins.net//streamrotator/out.php?l=0.1.77.11294.92586&u=/ftt2/o.php?link=0.1.77.11294.92586&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExNDcxJTJGNzMzODk3JTJGMjczJTJGaW5kZXgucGhw~
538[+] http://teens-sins.net//streamrotator/out.php?l=0.1.77.11294.92586&u=/ftt2/o.php?link=0.1.77.11294.92586&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExNDcxJTJGNzMzODk3JTJGMjczJTJGaW5kZXgucGhw~
539[+] http://teens-sins.net//streamrotator/out.php?l=0.1.78.35067.215766&u=/ftt2/o.php?link=0.1.78.35067.215766&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwNDYwcyUyRmluZGV4LnBocCUzRm5hdHMlM0RNVGd3T1M0eExqVXVOeTR3TGpRNE1Ua3VNQzR3TGpB~
540[+] http://teens-sins.net//streamrotator/out.php?l=0.1.78.35067.215766&u=/ftt2/o.php?link=0.1.78.35067.215766&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwNDYwcyUyRmluZGV4LnBocCUzRm5hdHMlM0RNVGd3T1M0eExqVXVOeTR3TGpRNE1Ua3VNQzR3TGpB~
541[+] http://teens-sins.net//streamrotator/out.php?l=0.1.79.2160.2498&u=/ftt2/o.php?link=0.1.79.2160.2498&url=~aHR0cCUzQSUyRiUyRnRlZW53YW50bWUuY29tJTJGZ2FsbHMlMkYwMDUlMkZpbmRleC5odG0=~
542[+] http://teens-sins.net//streamrotator/out.php?l=0.1.79.2160.2498&u=/ftt2/o.php?link=0.1.79.2160.2498&url=~aHR0cCUzQSUyRiUyRnRlZW53YW50bWUuY29tJTJGZ2FsbHMlMkYwMDUlMkZpbmRleC5odG0=~
543[+] http://teens-sins.net//streamrotator/out.php?l=0.1.80.24730.154029&u=/ftt2/o.php?link=0.1.80.24730.154029&url=~aHR0cCUzQSUyRiUyRnByb21vLnNrb2tvZmYuY29tJTJGZ2FscyUyRjIwMTIxMDI4LXNrb2tvZmYtZmlyc3QtdGltZS0xNzklMkYlM0Z3bSUzRDIxNzI1MTU=~
544[+] http://teens-sins.net//streamrotator/out.php?l=0.1.80.24730.154029&u=/ftt2/o.php?link=0.1.80.24730.154029&url=~aHR0cCUzQSUyRiUyRnByb21vLnNrb2tvZmYuY29tJTJGZ2FscyUyRjIwMTIxMDI4LXNrb2tvZmYtZmlyc3QtdGltZS0xNzklMkYlM0Z3bSUzRDIxNzI1MTU=~
545[+] http://teens-sins.net//streamrotator/out.php?l=0.1.81.35206.218104&u=/ftt2/o.php?link=0.1.81.35206.218104&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwMzIxeSUyRmluZGV4LnBocCUzRm5hdHMlM0RNVGd3T1M0eExqVXVOeTR3TGpRMk9EQXVNQzR3TGpB~
546[+] http://teens-sins.net//streamrotator/out.php?l=0.1.81.35206.218104&u=/ftt2/o.php?link=0.1.81.35206.218104&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwMzIxeSUyRmluZGV4LnBocCUzRm5hdHMlM0RNVGd3T1M0eExqVXVOeTR3TGpRMk9EQXVNQzR3TGpB~
547[+] http://teens-sins.net//streamrotator/out.php?l=0.1.82.20307.129706&u=/ftt2/o.php?link=0.1.82.20307.129706&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNjE3JTJGNzg0ODE1JTJGMjczJTJGaW5kZXgucGhw~
548[+] http://teens-sins.net//streamrotator/out.php?l=0.1.82.20307.129706&u=/ftt2/o.php?link=0.1.82.20307.129706&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNjE3JTJGNzg0ODE1JTJGMjczJTJGaW5kZXgucGhw~
549[+] http://teens-sins.net//streamrotator/out.php?l=0.1.83.24740.154489&u=/ftt2/o.php?link=0.1.83.24740.154489&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNzgyJTJGODAwMTkxJTJGMjczJTJGaW5kZXgucGhw~
550[+] http://teens-sins.net//streamrotator/out.php?l=0.1.83.24740.154489&u=/ftt2/o.php?link=0.1.83.24740.154489&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNzgyJTJGODAwMTkxJTJGMjczJTJGaW5kZXgucGhw~
551[+] http://teens-sins.net//streamrotator/out.php?l=0.1.84.26768.156342&u=/ftt2/o.php?link=0.1.84.26768.156342&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjY1MjUlMkYzNDQ1NzUlMkYyNzMlMkZpbmRleC5waHA=~
552[+] http://teens-sins.net//streamrotator/out.php?l=0.1.84.26768.156342&u=/ftt2/o.php?link=0.1.84.26768.156342&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjY1MjUlMkYzNDQ1NzUlMkYyNzMlMkZpbmRleC5waHA=~
553[+] http://teens-sins.net//streamrotator/out.php?l=0.1.85.5718.21441&u=/ftt2/o.php?link=0.1.85.5718.21441&url=~aHR0cCUzQSUyRiUyRnd3dy5hcnRudWRlZ2FsbGVyaWVzLmNvbSUyRmN1dGllcG9zaW5nJTJGMTE0JTJGaW5kZXguaHRtbA==~
554[+] http://teens-sins.net//streamrotator/out.php?l=0.1.85.5718.21441&u=/ftt2/o.php?link=0.1.85.5718.21441&url=~aHR0cCUzQSUyRiUyRnd3dy5hcnRudWRlZ2FsbGVyaWVzLmNvbSUyRmN1dGllcG9zaW5nJTJGMTE0JTJGaW5kZXguaHRtbA==~
555[+] http://teens-sins.net//streamrotator/out.php?l=0.1.86.21775.137604&u=/ftt2/o.php?link=0.1.86.21775.137604&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNjEyJTJGNzg5MTY2JTJGMjczJTJGaW5kZXgucGhw~
556[+] http://teens-sins.net//streamrotator/out.php?l=0.1.86.21775.137604&u=/ftt2/o.php?link=0.1.86.21775.137604&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNjEyJTJGNzg5MTY2JTJGMjczJTJGaW5kZXgucGhw~
557[+] http://teens-sins.net//streamrotator/out.php?l=0.1.87.42001.268274&u=/ftt2/o.php?link=0.1.87.42001.268274&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZGlucnllJTJGNjI5JTJGaW5kZXguaHRtbA==~
558[+] http://teens-sins.net//streamrotator/out.php?l=0.1.87.42001.268274&u=/ftt2/o.php?link=0.1.87.42001.268274&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZGlucnllJTJGNjI5JTJGaW5kZXguaHRtbA==~
559[+] http://teens-sins.net//streamrotator/out.php?l=0.1.88.34198.205122&u=/ftt2/o.php?link=0.1.88.34198.205122&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZhcHBsZXNlcm90aWNhJTJGNjI5JTJGaW5kZXguaHRtbA==~
560[+] http://teens-sins.net//streamrotator/out.php?l=0.1.88.34198.205122&u=/ftt2/o.php?link=0.1.88.34198.205122&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZhcHBsZXNlcm90aWNhJTJGNjI5JTJGaW5kZXguaHRtbA==~
561[+] http://teens-sins.net//streamrotator/out.php?l=0.1.89.37158.226255&u=/ftt2/o.php?link=0.1.89.37158.226255&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVucHVzc3lyaXZlciUyRjYyOSUyRmluZGV4Lmh0bWw=~
562[+] http://teens-sins.net//streamrotator/out.php?l=0.1.89.37158.226255&u=/ftt2/o.php?link=0.1.89.37158.226255&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVucHVzc3lyaXZlciUyRjYyOSUyRmluZGV4Lmh0bWw=~
563[+] http://teens-sins.net//streamrotator/out.php?l=0.1.90.10680.87971&u=/ftt2/o.php?link=0.1.90.10680.87971&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExMzI0JTJGNzI2NzE3JTJGMjczJTJGaW5kZXgucGhw~
564[+] http://teens-sins.net//streamrotator/out.php?l=0.1.90.10680.87971&u=/ftt2/o.php?link=0.1.90.10680.87971&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExMzI0JTJGNzI2NzE3JTJGMjczJTJGaW5kZXgucGhw~
565[+] http://teens-sins.net//streamrotator/out.php?l=0.1.91.41951.267280&u=/ftt2/o.php?link=0.1.91.41951.267280&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZiZWF1dHlzYW5kJTJGNjI5JTJGaW5kZXguaHRtbA==~
566[+] http://teens-sins.net//streamrotator/out.php?l=0.1.91.41951.267280&u=/ftt2/o.php?link=0.1.91.41951.267280&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZiZWF1dHlzYW5kJTJGNjI5JTJGaW5kZXguaHRtbA==~
567[+] http://teens-sins.net//streamrotator/out.php?l=0.1.92.35170.213720&u=/ftt2/o.php?link=0.1.92.35170.213720&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwMzU3eCUyRmluZGV4LnBocCUzRm5hdHMlM0RNVGd3T1M0eExqVXVOeTR3TGpRM01UWXVNQzR3TGpB~
568[+] http://teens-sins.net//streamrotator/out.php?l=0.1.92.35170.213720&u=/ftt2/o.php?link=0.1.92.35170.213720&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwMzU3eCUyRmluZGV4LnBocCUzRm5hdHMlM0RNVGd3T1M0eExqVXVOeTR3TGpRM01UWXVNQzR3TGpB~
569[+] http://teens-sins.net//streamrotator/out.php?l=0.1.93.41836.265102&u=/ftt2/o.php?link=0.1.93.41836.265102&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZudWRldGFubmVkdGVlbiUyRjYyOSUyRmluZGV4Lmh0bWw=~
570[+] http://teens-sins.net//streamrotator/out.php?l=0.1.93.41836.265102&u=/ftt2/o.php?link=0.1.93.41836.265102&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZudWRldGFubmVkdGVlbiUyRjYyOSUyRmluZGV4Lmh0bWw=~
571[+] http://teens-sins.net//streamrotator/out.php?l=0.1.94.24722.154023&u=/ftt2/o.php?link=0.1.94.24722.154023&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNDA4JTJGNzgxODMxJTJGMjczJTJGaW5kZXgucGhw~
572[+] http://teens-sins.net//streamrotator/out.php?l=0.1.94.24722.154023&u=/ftt2/o.php?link=0.1.94.24722.154023&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNDA4JTJGNzgxODMxJTJGMjczJTJGaW5kZXgucGhw~
573[+] http://teens-sins.net//streamrotator/out.php?l=0.1.95.22427.140189&u=/ftt2/o.php?link=0.1.95.22427.140189&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyODgxJTJGODEwNzcwJTJGMjczJTJGaW5kZXgucGhw~
574[+] http://teens-sins.net//streamrotator/out.php?l=0.1.95.22427.140189&u=/ftt2/o.php?link=0.1.95.22427.140189&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyODgxJTJGODEwNzcwJTJGMjczJTJGaW5kZXgucGhw~
575[+] http://teens-sins.net//streamrotator/out.php?l=0.1.96.14040.99657&u=/ftt2/o.php?link=0.1.96.14040.99657&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExNTU4JTJGNzM5NjMxJTJGMjczJTJGaW5kZXgucGhw~
576[+] http://teens-sins.net//streamrotator/out.php?l=0.1.96.14040.99657&u=/ftt2/o.php?link=0.1.96.14040.99657&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExNTU4JTJGNzM5NjMxJTJGMjczJTJGaW5kZXgucGhw~
577[+] http://teens-sins.net//streamrotator/out.php?l=0.1.97.41126.262090&u=/ftt2/o.php?link=0.1.97.41126.262090&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwNTA3YyUyRmluZGV4LnBocCUzRm5hdHMlM0RNVGd3T1M0eExqVXVOeTR3TGpRNE5qWXVNQzR3TGpB~
578[+] http://teens-sins.net//streamrotator/out.php?l=0.1.97.41126.262090&u=/ftt2/o.php?link=0.1.97.41126.262090&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwNTA3YyUyRmluZGV4LnBocCUzRm5hdHMlM0RNVGd3T1M0eExqVXVOeTR3TGpRNE5qWXVNQzR3TGpB~
579[+] http://teens-sins.net//streamrotator/out.php?l=0.1.98.12349.96951&u=/ftt2/o.php?link=0.1.98.12349.96951&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExNDY2JTJGNzMzOTUwJTJGMjczJTJGaW5kZXgucGhw~
580[+] http://teens-sins.net//streamrotator/out.php?l=0.1.98.12349.96951&u=/ftt2/o.php?link=0.1.98.12349.96951&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExNDY2JTJGNzMzOTUwJTJGMjczJTJGaW5kZXgucGhw~
581[+] http://teens-sins.net//streamrotator/out.php?l=0.1.99.41555.255985&u=/ftt2/o.php?link=0.1.99.41555.255985&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwNzV1JTJGaW5kZXgucGhwJTNGbmF0cyUzRE1UZ3dPUzR4TGpVdU55NHdMalE1TlM0d0xqQXVNQQ==~
582[+] http://teens-sins.net//streamrotator/out.php?l=0.1.99.41555.255985&u=/ftt2/o.php?link=0.1.99.41555.255985&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwNzV1JTJGaW5kZXgucGhwJTNGbmF0cyUzRE1UZ3dPUzR4TGpVdU55NHdMalE1TlM0d0xqQXVNQQ==~
583[+] http://teens-sins.net//streamrotator/out.php?l=0.1.100.606.29&u=/ftt2/o.php?link=0.1.100.606.29&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczIuYWR1bHQtZW1waXJlLmNvbSUyRjg0OTMlMkY0MTE2ODQlMkYxMTE2JTJGaW5kZXgucGhw~
584[+] http://teens-sins.net//streamrotator/out.php?l=0.1.100.606.29&u=/ftt2/o.php?link=0.1.100.606.29&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczIuYWR1bHQtZW1waXJlLmNvbSUyRjg0OTMlMkY0MTE2ODQlMkYxMTE2JTJGaW5kZXgucGhw~
585[+] http://teens-sins.net//streamrotator/out.php?l=0.1.101.41343.259279&u=/ftt2/o.php?link=0.1.101.41343.259279&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwMjg3dCUyRmluZGV4LnBocCUzRm5hdHMlM0RNVGd3T1M0eExqVXVOeTR3TGpRMk5EWXVNQzR3TGpB~
586[+] http://teens-sins.net//streamrotator/out.php?l=0.1.101.41343.259279&u=/ftt2/o.php?link=0.1.101.41343.259279&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwMjg3dCUyRmluZGV4LnBocCUzRm5hdHMlM0RNVGd3T1M0eExqVXVOeTR3TGpRMk5EWXVNQzR3TGpB~
587[+] http://teens-sins.net//streamrotator/out.php?l=0.1.102.37865.237666&u=/ftt2/o.php?link=0.1.102.37865.237666&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZHRhbm5lZGJlYXV0eSUyRjYyOSUyRmluZGV4Lmh0bWw=~
588[+] http://teens-sins.net//streamrotator/out.php?l=0.1.102.37865.237666&u=/ftt2/o.php?link=0.1.102.37865.237666&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZHRhbm5lZGJlYXV0eSUyRjYyOSUyRmluZGV4Lmh0bWw=~
589[+] http://teens-sins.net//streamrotator/out.php?l=0.1.103.41830.264972&u=/ftt2/o.php?link=0.1.103.41830.264972&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZudWRlYmxvbmRldGhpbnRlZW4lMkY2MjklMkZpbmRleC5odG1s~
590[+] http://teens-sins.net//streamrotator/out.php?l=0.1.103.41830.264972&u=/ftt2/o.php?link=0.1.103.41830.264972&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZudWRlYmxvbmRldGhpbnRlZW4lMkY2MjklMkZpbmRleC5odG1s~
591[+] http://teens-sins.net//streamrotator/out.php?l=0.1.104.41987.267997&u=/ftt2/o.php?link=0.1.104.41987.267997&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZob3RjdXJseXRlZW5tb2RlbCUyRjYyOSUyRmluZGV4Lmh0bWw=~
592[+] http://teens-sins.net//streamrotator/out.php?l=0.1.104.41987.267997&u=/ftt2/o.php?link=0.1.104.41987.267997&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZob3RjdXJseXRlZW5tb2RlbCUyRjYyOSUyRmluZGV4Lmh0bWw=~
593[+] http://teens-sins.net//streamrotator/out.php?l=0.1.105.38138.241682&u=/ftt2/o.php?link=0.1.105.38138.241682&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZHRoaW5jdXRpZSUyRjYyOSUyRmluZGV4Lmh0bWw=~
594[+] http://teens-sins.net//streamrotator/out.php?l=0.1.105.38138.241682&u=/ftt2/o.php?link=0.1.105.38138.241682&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZHRoaW5jdXRpZSUyRjYyOSUyRmluZGV4Lmh0bWw=~
595[+] http://teens-sins.net//streamrotator/out.php?l=0.1.106.29951.174126&u=/ftt2/o.php?link=0.1.106.29951.174126&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjY5NTgyNzElMkZzZXhfYWxsX3Bvc3Rpb25zLmh0bWw=~
596[+] http://teens-sins.net//streamrotator/out.php?l=0.1.106.29951.174126&u=/ftt2/o.php?link=0.1.106.29951.174126&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjY5NTgyNzElMkZzZXhfYWxsX3Bvc3Rpb25zLmh0bWw=~
597[+] http://teens-sins.net//streamrotator/out.php?l=0.1.107.37561.233551&u=/ftt2/o.php?link=0.1.107.37561.233551&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVuYWlyYmFsbG9vbnMlMkY2MjklMkZpbmRleC5odG1s~
598[+] http://teens-sins.net//streamrotator/out.php?l=0.1.107.37561.233551&u=/ftt2/o.php?link=0.1.107.37561.233551&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVuYWlyYmFsbG9vbnMlMkY2MjklMkZpbmRleC5odG1s~
599[+] http://teens-sins.net//streamrotator/out.php?l=0.1.108.41794.264262&u=/ftt2/o.php?link=0.1.108.41794.264262&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVuc3RyaXB0ZWFzZWJhbGxvb25zJTJGNjI5JTJGaW5kZXguaHRtbA==~
600[+] http://teens-sins.net//streamrotator/out.php?l=0.1.108.41794.264262&u=/ftt2/o.php?link=0.1.108.41794.264262&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVuc3RyaXB0ZWFzZWJhbGxvb25zJTJGNjI5JTJGaW5kZXguaHRtbA==~
601[+] http://teens-sins.net//streamrotator/out.php?l=0.1.109.34429.208013&u=/ftt2/o.php?link=0.1.109.34429.208013&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZob3JueWJsb25kZW1vZGVsJTJGNjI5JTJGaW5kZXguaHRtbA==~
602[+] http://teens-sins.net//streamrotator/out.php?l=0.1.109.34429.208013&u=/ftt2/o.php?link=0.1.109.34429.208013&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZob3JueWJsb25kZW1vZGVsJTJGNjI5JTJGaW5kZXguaHRtbA==~
603[+] http://teens-sins.net//streamrotator/out.php?l=0.1.110.28027.167212&u=/ftt2/o.php?link=0.1.110.28027.167212&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZuYWtlZHRlZW5mcnVpdHMlMkY2MjklMkZpbmRleC5odG1s~
604[+] http://teens-sins.net//streamrotator/out.php?l=0.1.110.28027.167212&u=/ftt2/o.php?link=0.1.110.28027.167212&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZuYWtlZHRlZW5mcnVpdHMlMkY2MjklMkZpbmRleC5odG1s~
605[+] http://teens-sins.net//streamrotator/out.php?l=0.1.111.34303.206818&u=/ftt2/o.php?link=0.1.111.34303.206818&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZtYWplc3RpY3N1dGllJTJGNjI5JTJGaW5kZXguaHRtbA==~
606[+] http://teens-sins.net//streamrotator/out.php?l=0.1.111.34303.206818&u=/ftt2/o.php?link=0.1.111.34303.206818&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZtYWplc3RpY3N1dGllJTJGNjI5JTJGaW5kZXguaHRtbA==~
607[+] http://teens-sins.net//streamrotator/out.php?l=0.1.112.41897.266307&u=/ftt2/o.php?link=0.1.112.41897.266307&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZob3JueW51ZGViZWF1dHklMkY2MjklMkZpbmRleC5odG1s~
608[+] http://teens-sins.net//streamrotator/out.php?l=0.1.112.41897.266307&u=/ftt2/o.php?link=0.1.112.41897.266307&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZob3JueW51ZGViZWF1dHklMkY2MjklMkZpbmRleC5odG1s~
609[+] http://teens-sins.net//streamrotator/out.php?l=0.1.113.34580.210273&u=/ftt2/o.php?link=0.1.113.34580.210273&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZqdWljeXNsaW1uYWtlZG1vZGVsJTJGNjI5JTJGaW5kZXguaHRtbA==~
610[+] http://teens-sins.net//streamrotator/out.php?l=0.1.113.34580.210273&u=/ftt2/o.php?link=0.1.113.34580.210273&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZqdWljeXNsaW1uYWtlZG1vZGVsJTJGNjI5JTJGaW5kZXguaHRtbA==~
611[+] http://teens-sins.net//streamrotator/out.php?l=0.1.114.38207.243022&u=/ftt2/o.php?link=0.1.114.38207.243022&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZsb3ZlbHl0ZWVudW5kcmVzc2luZyUyRjYyOSUyRmluZGV4Lmh0bWw=~
612[+] http://teens-sins.net//streamrotator/out.php?l=0.1.114.38207.243022&u=/ftt2/o.php?link=0.1.114.38207.243022&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZsb3ZlbHl0ZWVudW5kcmVzc2luZyUyRjYyOSUyRmluZGV4Lmh0bWw=~
613[+] http://www.teens-sins.net/ftt2/o.php?l=next
614--------------------------------------------------
615[-] No external Dynamic Paramter Found!?
616--------------------------------------------------
617[!] 1 Internal links Discovered
618[+] http://teens-sins.net//ftt2/signup.php
619--------------------------------------------------
620[-] No External Link Found!?
621--------------------------------------------------
622[#] Mapping Subdomain..
623[!] Found 2 Subdomain
624- mail.teens-sins.net
625- www.teens-sins.net
626--------------------------------------------------
627[!] Done At 2020-02-27 22:16:04.273999
628#######################################################################################################################################
629[INFO] ------TARGET info------
630[*] TARGET: http://teens-sins.net/
631[*] TARGET IP: 37.1.207.121
632[INFO] NO load balancer detected for teens-sins.net...
633[*] DNS servers: server.domain.com.
634[*] TARGET server: nginx/1.14.1
635[*] CC: NL
636[*] Country: Netherlands
637[*] RegionCode: FL
638[*] RegionName: Provincie Flevoland
639[*] City: Dronten
640[*] ASN: AS50673
641[*] BGP_PREFIX: 37.1.200.0/21
642[*] ISP: Serverius-as Serverius Holding B.V., NL
643[INFO] DNS enumeration:
644[*] ftp.teens-sins.net 5.45.71.91
645[*] mail.teens-sins.net 37.1.207.121
646[*] ns1.teens-sins.net 37.1.207.121
647[*] ns2.teens-sins.net 37.1.207.121
648[INFO] Possible abuse mails are:
649[*] abuse@teens-sins.net
650[INFO] NO PAC (Proxy Auto Configuration) file FOUND
651[INFO] Starting FUZZing in http://teens-sins.net/FUzZzZzZzZz...
652[INFO] Status code Folders
653[ALERT] Look in the source code. It may contain passwords
654[ALERT] Content in http://teens-sins.net/ AND http://www.teens-sins.net/ is different
655[INFO] MD5 for http://teens-sins.net/ is: 9b6f8ca4c067ee5ed15f7a90091c1b71
656[INFO] MD5 for http://www.teens-sins.net/ is: 08447758a96474e92aabe7d218f2b4f1
657[INFO] http://teens-sins.net/ redirects to http://teens-sins.net/
658[INFO] http://www.teens-sins.net/ redirects to http://www.teens-sins.net/
659[INFO] Links found from http://teens-sins.net/ http://37.1.207.121/:
660[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=
661[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2371
662[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2372
663[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2373
664[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2374
665[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2376
666[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2377
667[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2378
668[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2398
669[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2399
670[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2400
671[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2401
672[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2402
673[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2456
674[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2478
675[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2479
676[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2501
677[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2502
678[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2503
679[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2504
680[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2509
681[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2527
682[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2528
683[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2530
684[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2531
685[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2534
686[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2535
687[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2536
688[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2538
689[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2539
690[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2540
691[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2577
692[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2578
693[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2809
694[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2825
695[*] http://37.1.207.121/ftt2/o.php?l=toplist&perm=2910
696[*] http://37.1.207.121/ftt2/signup.php
697[*] http://37.1.207.121/streamrotator/out.php?l=0.1.0.28.485&u=/ftt2/o.php?link=0.1.0.28.485&url=~aHR0cDovL2dhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tLzEwNDA3LzYxNDcyOS8yNzMvaW5kZXgucGhw~
698[*] http://37.1.207.121/streamrotator/out.php?l=0.1.100.4624.13569&u=/ftt2/o.php?link=0.1.100.4624.13569&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vanVpY3ludWRldGVlbmJlYXV0eS82MjkvaW5kZXguaHRtbA==~
699[*] http://37.1.207.121/streamrotator/out.php?l=0.1.101.4337.6089&u=/ftt2/o.php?link=0.1.101.4337.6089&url=~aHR0cDovL2Vuam95dmlkcy5jb20vZ2FsbGVyaWVzL25iZC9waWMvMDE1MmMvaW5kZXgucGhwP25hdHM9TVRnd09TNHhMalV1Tnk0d0xqazVOUzR3TGpBdU1B~
700[*] http://37.1.207.121/streamrotator/out.php?l=0.1.102.4521.7513&u=/ftt2/o.php?link=0.1.102.4521.7513&url=~aHR0cDovL2dhbGxlcmllcy5udWRlYmVhY2hkcmVhbXMuY29tL3BpY3MvbnVkZV9wZW9wbGUvc3dpbmdlcnMucGhwP25hdHM9TVRnd09TNHhMalV1Tnk0d0xqRTVNQzR3TGpBdU1B~
701[*] http://37.1.207.121/streamrotator/out.php?l=0.1.103.4490.10194&u=/ftt2/o.php?link=0.1.103.4490.10194&url=~aHR0cDovL2dhbGxlcmllcy5udWRlYmVhY2hkcmVhbXMuY29tL3BpY3MvcHJldHR5X2dpcmxzL3N3aW5nZXJzLnBocD9uYXRzPU1UZ3dPUzR4TGpVdU55NHdMakl5TVM0d0xqQXVNQQ==~
702[*] http://37.1.207.121/streamrotator/out.php?l=0.1.10.4.1572&u=/ftt2/o.php?link=0.1.10.4.1572&url=~aHR0cDovL2dhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tLzk4ODMvNzEzNTMyLzI3My9pbmRleC5waHA=~
703[*] http://37.1.207.121/streamrotator/out.php?l=0.1.104.3926.9493&u=/ftt2/o.php?link=0.1.104.3926.9493&url=~aHR0cDovL2Vuam95dmlkcy5jb20vZ2FsbGVyaWVzL25iZC9waWMvMDU2M2MvaW5kZXgucGhwP25hdHM9TVRnd09TNHhMalV1Tnk0d0xqUTVNakl1TUM0d0xqQQ==~
704[*] http://37.1.207.121/streamrotator/out.php?l=0.1.105.4414.11800&u=/ftt2/o.php?link=0.1.105.4414.11800&url=~aHR0cDovL2Vuam95dmlkcy5jb20vZ2FsbGVyaWVzL25iZC9waWMvMDc1dS9pbmRleC5waHA/bmF0cz1NVGd3T1M0eExqVXVOeTR3TGpRNU5TNHdMakF1TUE=~
705[*] http://37.1.207.121/streamrotator/out.php?l=0.1.106.88.1124&u=/ftt2/o.php?link=0.1.106.88.1124&url=~aHR0cDovL3Byb21vLmF2ZXJvdGljYS5jb20vZ2Fscy8yMDE1MDkwNC0yODY5LXZpa2tpLz93bT0yMzkxNjcx~
706[*] http://37.1.207.121/streamrotator/out.php?l=0.1.107.4661.14714&u=/ftt2/o.php?link=0.1.107.4661.14714&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGVtcHRpbmd0ZWVubGluZ2VyaWUvNjI5L2luZGV4Lmh0bWw=~
707[*] http://37.1.207.121/streamrotator/out.php?l=0.1.108.4500.7511&u=/ftt2/o.php?link=0.1.108.4500.7511&url=~aHR0cDovL2dhbGxlcmllcy5udWRlYmVhY2hkcmVhbXMuY29tL3BpY3MvY29ja19zdWNraW5nL3N3aW5nZXJzLnBocD9uYXRzPU1UZ3dPUzR4TGpVdU55NHdMakl4TVM0d0xqQXVNQQ==~
708[*] http://37.1.207.121/streamrotator/out.php?l=0.1.109.72.804&u=/ftt2/o.php?link=0.1.109.72.804&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMzEwMC84MzE4NTYvMjczL2luZGV4LnBocA==~
709[*] http://37.1.207.121/streamrotator/out.php?l=0.1.110.620.388&u=/ftt2/o.php?link=0.1.110.620.388&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vanVpY3lzbGltbmFrZWRtb2RlbC82MjkvaW5kZXguaHRtbA==~
710[*] http://37.1.207.121/streamrotator/out.php?l=0.1.111.4494.10275&u=/ftt2/o.php?link=0.1.111.4494.10275&url=~aHR0cDovL2dhbGxlcmllcy5udWRlYmVhY2hkcmVhbXMuY29tL3BpY3MvaGFyZGNvcmVfc2V4L3N3aW5nZXJzLnBocD9uYXRzPU1UZ3dPUzR4TGpVdU55NHdMakl4Tnk0d0xqQXVNQQ==~
711[*] http://37.1.207.121/streamrotator/out.php?l=0.1.112.4637.14221&u=/ftt2/o.php?link=0.1.112.4637.14221&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGVlbmN1dGllLXVuZHJlc3NpbmcvNjI5L2luZGV4Lmh0bWw=~
712[*] http://37.1.207.121/streamrotator/out.php?l=0.1.1.13.1185&u=/ftt2/o.php?link=0.1.1.13.1185&url=~aHR0cDovL3d3dy5teWJ1bm55Z2lybHMuY29tL2dhbGxlcmllcy9lbWlseS0xOC0xNzdyZWR0aW55cGFudGllcy9pbmRleDAzOC5odG1s~
713[*] http://37.1.207.121/streamrotator/out.php?l=0.1.113.4626.13602&u=/ftt2/o.php?link=0.1.113.4626.13602&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vY3VybHl0ZWVubW9kZWwvNjI5L2luZGV4Lmh0bWw=~
714[*] http://37.1.207.121/streamrotator/out.php?l=0.1.11.43.1316&u=/ftt2/o.php?link=0.1.11.43.1316&url=~aHR0cDovL3N3ZWV0Z2lybGllLmNvbS9nYWxscy8wNTQvaW5kZXgucGhw~
715[*] http://37.1.207.121/streamrotator/out.php?l=0.1.114.3919.5599&u=/ftt2/o.php?link=0.1.114.3919.5599&url=~aHR0cDovL2Vuam95dmlkcy5jb20vZ2FsbGVyaWVzL25iZC9waWMvMDU3MGcvaW5kZXgucGhwP25hdHM9TVRnd09TNHhMalV1Tnk0d0xqUTVNamt1TUM0d0xqQQ==~
716[*] http://37.1.207.121/streamrotator/out.php?l=0.1.115.4550.6217&u=/ftt2/o.php?link=0.1.115.4550.6217&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vY3VybHl0ZWVudW5kcmVzc2luZy82MjkvaW5kZXguaHRtbA==~
717[*] http://37.1.207.121/streamrotator/out.php?l=0.1.116.4560.6103&u=/ftt2/o.php?link=0.1.116.4560.6103&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vbmFrZWR0ZWVuY2FuZHkvNjI5L2luZGV4Lmh0bWw=~
718[*] http://37.1.207.121/streamrotator/out.php?l=0.1.117.981.503&u=/ftt2/o.php?link=0.1.117.981.503&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vZmFpcnliZWF1dHl1bmRyZXNzaW5nLzYyOS9pbmRleC5odG1s~
719[*] http://37.1.207.121/streamrotator/out.php?l=0.1.118.3901.5343&u=/ftt2/o.php?link=0.1.118.3901.5343&url=~aHR0cHM6Ly9naWdhcHJvbi5jb20vMTQzNTAvODg2NzE1LzI3My9pbmRleC5waHA=~
720[*] http://37.1.207.121/streamrotator/out.php?l=0.1.119.4638.14253&u=/ftt2/o.php?link=0.1.119.4638.14253&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGVlbmJsb25kZWd5bXB1c3N5LzYyOS9pbmRleC5odG1s~
721[*] http://37.1.207.121/streamrotator/out.php?l=0.1.12.21.1018&u=/ftt2/o.php?link=0.1.12.21.1018&url=~aHR0cDovL2dhbGxlcmllczIuYWR1bHQtZW1waXJlLmNvbS83OTQyLzQwNjYxNi80MzMvMi9pbmRleC5waHA=~
722[*] http://37.1.207.121/streamrotator/out.php?l=0.1.13.45.1170&u=/ftt2/o.php?link=0.1.13.45.1170&url=~aHR0cDovL25lMnctYXJ0LW51ZGUubmV0~
723[*] http://37.1.207.121/streamrotator/out.php?l=0.1.14.1004.1474&u=/ftt2/o.php?link=0.1.14.1004.1474&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vbmFrZWRibG9uZGVidW5ueS82MjkvaW5kZXguaHRtbA==~
724[*] http://37.1.207.121/streamrotator/out.php?l=0.1.15.4662.14715.t&u=/ftt2/o.php?link=0.1.15.4662.14715.t&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGVlbnB1c3N5aGF0LzYyOS9pbmRleC5odG1s~
725[*] http://37.1.207.121/streamrotator/out.php?l=0.1.16.56.1288&u=/ftt2/o.php?link=0.1.16.56.1288&url=~aHR0cDovL3RlZW53YW50bWUuY29tL2dhbGxzLzAwOS9pbmRleC5odG0=~
726[*] http://37.1.207.121/streamrotator/out.php?l=0.1.17.3906.5445&u=/ftt2/o.php?link=0.1.17.3906.5445&url=~aHR0cHM6Ly9naWdhcHJvbi5jb20vMTQzNTAvODg2NzIwLzI3My9pbmRleC5waHA=~
727[*] http://37.1.207.121/streamrotator/out.php?l=0.1.18.54.146&u=/ftt2/o.php?link=0.1.18.54.146&url=~aHR0cDovL2dhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbS8xMTM0NC83MjU0NTEvMjczL2luZGV4LnBocA==~
728[*] http://37.1.207.121/streamrotator/out.php?l=0.1.19.886.124&u=/ftt2/o.php?link=0.1.19.886.124&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGVlbmFpcmJhbGxvb25zLzYyOS9pbmRleC5odG1s~
729[*] http://37.1.207.121/streamrotator/out.php?l=0.1.20.77.626&u=/ftt2/o.php?link=0.1.20.77.626&url=~aHR0cDovL2J1bGtqZXJrLmNvbS8zOTI2Lzg0NDE4NS8yNzMvaW5kZXgucGhw~
730[*] http://37.1.207.121/streamrotator/out.php?l=0.1.21.25.1463&u=/ftt2/o.php?link=0.1.21.25.1463&url=~aHR0cDovL2Nvenl4eHguY29tLzk1OTgvNzg5Mzk0LzI3My9pbmRleC5waHA=~
731[*] http://37.1.207.121/streamrotator/out.php?l=0.1.22.20.9&u=/ftt2/o.php?link=0.1.22.20.9&url=~aHR0cDovL2dhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tLzk4NTAvNTQyNDgyLzQzMy9pbmRleC5waHA=~
732[*] http://37.1.207.121/streamrotator/out.php?l=0.1.23.39.241&u=/ftt2/o.php?link=0.1.23.39.241&url=~aHR0cDovL2dhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tLzk5OTYvNjMwNzk4LzI3My9pbmRleC5waHA=~
733[*] http://37.1.207.121/streamrotator/out.php?l=0.1.24.12.1140&u=/ftt2/o.php?link=0.1.24.12.1140&url=~aHR0cDovL3d3dy5icmFuZGlnaXJscy5jb20vdGF3bmVlLXN0b25lLzA0OC1waWNzLWxvdmVseS15b3VuZy1sYWR5LXBvc2luZw==~
734[*] http://37.1.207.121/streamrotator/out.php?l=0.1.25.9.1390&u=/ftt2/o.php?link=0.1.25.9.1390&url=~aHR0cDovL3d3dy5jaGlja2lwaWtpLmNvbS9pbWFnZXMvMDMwNTQuanBn~
735[*] http://37.1.207.121/streamrotator/out.php?l=0.1.26.22.105&u=/ftt2/o.php?link=0.1.26.22.105&url=~aHR0cDovL2dhbGxlcmllczIuYWR1bHQtZW1waXJlLmNvbS85MTkxLzQ4OTU0Mi82MTYwL2luZGV4LnBocA==~
736[*] http://37.1.207.121/streamrotator/out.php?l=0.1.27.44.1019&u=/ftt2/o.php?link=0.1.27.44.1019&url=~aHR0cDovL3N3ZWV0Z2lybGllLmNvbS9nYWxscy8wNTIvaW5kZXgucGhw~
737[*] http://37.1.207.121/streamrotator/out.php?l=0.1.28.1108.1355&u=/ftt2/o.php?link=0.1.28.1108.1355&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vbmFrZWR0aGluY3V0aWUvNjI5L2luZGV4Lmh0bWw=~
738[*] http://37.1.207.121/streamrotator/out.php?l=0.1.2.83.773&u=/ftt2/o.php?link=0.1.2.83.773&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vanVpY3ludWRldGVlbm1vZGVsLzYyOS9pbmRleC5odG1s~
739[*] http://37.1.207.121/streamrotator/out.php?l=0.1.29.80.1446&u=/ftt2/o.php?link=0.1.29.80.1446&url=~aHR0cDovL2J1bGtqZXJrLmNvbS8zOTI2Lzc4ODg0MC8yNzMvaW5kZXgucGhw~
740[*] http://37.1.207.121/streamrotator/out.php?l=0.1.30.53.795&u=/ftt2/o.php?link=0.1.30.53.795&url=~aHR0cDovL3Byb21vLnNrb2tvZmYuY29tL2dhbHMvMjAxMjA2MDItc2tva29mZi1nbG92ZXMtYW5kLXBhbnR5aG9zZS00NTUvP3dtPTE3MDYzMDE=~
741[*] http://37.1.207.121/streamrotator/out.php?l=0.1.31.11.1482&u=/ftt2/o.php?link=0.1.31.11.1482&url=~aHR0cDovL2dhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbS8xMTMyNS83MjY4MzEvMjczL2luZGV4LnBocA==~
742[*] http://37.1.207.121/streamrotator/out.php?l=0.1.32.18.723&u=/ftt2/o.php?link=0.1.32.18.723&url=~aHR0cDovL2dhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tLzEwNDYzLzc0NzIyMC8yNzMvaW5kZXgucGhw~
743[*] http://37.1.207.121/streamrotator/out.php?l=0.1.33.55.26&u=/ftt2/o.php?link=0.1.33.55.26&url=~aHR0cDovL3d3dy50ZWVuc3NlbGZzaG90LmNvbS9maGdzLzAyMjEvaW5kZXgucGhwP2NjYmlsbD0xNDA4MjMw~
744[*] http://37.1.207.121/streamrotator/out.php?l=0.1.34.47.372&u=/ftt2/o.php?link=0.1.34.47.372&url=~aHR0cDovL2J1bGtqZXJrLmNvbS8zOTI2LzgxNTA3OC8yNzMvaW5kZXgucGhw~
745[*] http://37.1.207.121/streamrotator/out.php?l=0.1.35.35.964&u=/ftt2/o.php?link=0.1.35.35.964&url=~aHR0cDovL3d3dy50bWNnYWxsZXJpZXMuY29tLzIwMDgvY2luZHkvaXZjaW5keW51MTYvP0NDQkM9MjMzNDE1MA==~
746[*] http://37.1.207.121/streamrotator/out.php?l=0.1.36.10.469&u=/ftt2/o.php?link=0.1.36.10.469&url=~aHR0cDovL2dmczRmcmVlLmNvbS9mcmVlLXBvcm4vd2F0Y2hteWdmL3BpY3MvMTE0MS9waW5rd29ybGQuaHRtbA==~
747[*] http://37.1.207.121/streamrotator/out.php?l=0.1.37.29.800&u=/ftt2/o.php?link=0.1.37.29.800&url=~aHR0cDovL3Byb21vLnNrb2tvZmYuY29tL2dhbHMvMjAxMjEwMjgtc2tva29mZi1maXJzdC10aW1lLTE3OS8/d209MjE3MjUxNQ==~
748[*] http://37.1.207.121/streamrotator/out.php?l=0.1.3.81.1108&u=/ftt2/o.php?link=0.1.3.81.1108&url=~aHR0cDovL2dhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tLzM5MjYvNTUxODQyLzI3My9pbmRleC5waHA=~
749[*] http://37.1.207.121/streamrotator/out.php?l=0.1.38.50.1504&u=/ftt2/o.php?link=0.1.38.50.1504&url=~aHR0cDovL3NleHh4eXRlZW50dWJlLm5ldC8=~
750[*] http://37.1.207.121/streamrotator/out.php?l=0.1.39.27.1089&u=/ftt2/o.php?link=0.1.39.27.1089&url=~aHR0cDovL2dhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tLzk5OTYvNjMwNzI5LzI3My9pbmRleC5waHA=~
751[*] http://37.1.207.121/streamrotator/out.php?l=0.1.40.4662.14723&u=/ftt2/o.php?link=0.1.40.4662.14723&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGVlbnB1c3N5aGF0LzYyOS9pbmRleC5odG1s~
752[*] http://37.1.207.121/streamrotator/out.php?l=0.1.41.412.403&u=/ftt2/o.php?link=0.1.41.412.403&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vYnVzdHlzbm93cXVlZW4vNjI5L2luZGV4Lmh0bWw=~
753[*] http://37.1.207.121/streamrotator/out.php?l=0.1.42.6.856&u=/ftt2/o.php?link=0.1.42.6.856&url=~aHR0cDovL2dhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tLzUzNTgvMjQwMDAvMzY1MS9pbmRleC5waHA=~
754[*] http://37.1.207.121/streamrotator/out.php?l=0.1.43.3.599&u=/ftt2/o.php?link=0.1.43.3.599&url=~aHR0cDovL2hvc3RlZC5tZXQtYXJ0LmNvbS9GdWxsX21ldC1hcnRfS0VSXzRfODUwLz9wYT0xNjcwNTY2~
755[*] http://37.1.207.121/streamrotator/out.php?l=0.1.4.38.130&u=/ftt2/o.php?link=0.1.4.38.130&url=~aHR0cDovL2dhbGxlcmllcy5saXR0bGVsdXBlLmNvbS8wMDYyMjY5NC0wMS0xMi9waWNzLzI0L2luZGV4LnBocA==~
756[*] http://37.1.207.121/streamrotator/out.php?l=0.1.44.52.188&u=/ftt2/o.php?link=0.1.44.52.188&url=~aHR0cDovL3d3dy5yZWFsZ2ZzZXhwb3NlZC5jb20vZmhnLzEvZ2ZzMTkvP25hdHM9TkRRdU5pNHhMakV1TUM0eE1EQXVNQzR3TGpB~
757[*] http://37.1.207.121/streamrotator/out.php?l=0.1.45.4623.13555&u=/ftt2/o.php?link=0.1.45.4623.13555&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGVlbnB1c3N5cG9ueXRhaWxzLzYyOS9pbmRleC5odG1s~
758[*] http://37.1.207.121/streamrotator/out.php?l=0.1.46.78.576&u=/ftt2/o.php?link=0.1.46.78.576&url=~aHR0cDovL2J1bGtqZXJrLmNvbS8zOTI2LzgyODE3Mi8yNzMvaW5kZXgucGhw~
759[*] http://37.1.207.121/streamrotator/out.php?l=0.1.47.86.987&u=/ftt2/o.php?link=0.1.47.86.987&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xNDE5Mi84NTg2MjgvMjczL2luZGV4LnBocA==~
760[*] http://37.1.207.121/streamrotator/out.php?l=0.1.48.7.937&u=/ftt2/o.php?link=0.1.48.7.937&url=~aHR0cDovL3RlZW53YW50bWUuY29tL2dhbGxzLzAwNC9pbmRleC5odG0=~
761[*] http://37.1.207.121/streamrotator/out.php?l=0.1.49.61.564&u=/ftt2/o.php?link=0.1.49.61.564&url=~aHR0cDovL2dhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbS8xMTIxMy83MTQ1NzIvNDMzL2luZGV4LnBocA==~
762[*] http://37.1.207.121/streamrotator/out.php?l=0.1.50.79.966&u=/ftt2/o.php?link=0.1.50.79.966&url=~aHR0cDovL2J1bGtqZXJrLmNvbS8zOTI2LzgyODE3MC8yNzMvaW5kZXgucGhw~
763[*] http://37.1.207.121/streamrotator/out.php?l=0.1.51.16.651&u=/ftt2/o.php?link=0.1.51.16.651&url=~aHR0cDovL3NlY3VyZS5teXRlZW5pZWNoZWVybGVhZGVyLmNvbS9nYWxsZXJ5L01qSXVNUzQyTGpZdU1DNHlNRGN1TUM0d0xqQQ==~
764[*] http://37.1.207.121/streamrotator/out.php?l=0.1.52.73.675&u=/ftt2/o.php?link=0.1.52.73.675&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMzEwMC84MzE4NzQvMjczL2luZGV4LnBocA==~
765[*] http://37.1.207.121/streamrotator/out.php?l=0.1.53.4629.13673&u=/ftt2/o.php?link=0.1.53.4629.13673&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vc2V4eXRlZW5oZWFkcGhvbmVzLzYyOS9pbmRleC5odG1s~
766[*] http://37.1.207.121/streamrotator/out.php?l=0.1.54.15.601&u=/ftt2/o.php?link=0.1.54.15.601&url=~aHR0cDovL3d3dy5ob3N0ZWQubXBsc3R1ZGlvcy5jb20vZ2FsbGVyaWVzLzEyL3RhcmFfdGFyYXNfaW50dWl0aW9uL2luZGV4Lmh0bT9hZmZpZD0xNTYxODc3~
767[*] http://37.1.207.121/streamrotator/out.php?l=0.1.5.4663.14741.t&u=/ftt2/o.php?link=0.1.5.4663.14741.t&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vbnVkZWxvbmdoYWlyZWR0ZWVuaWUvNjI5L2luZGV4Lmh0bWw=~
768[*] http://37.1.207.121/streamrotator/out.php?l=0.1.55.62.1169&u=/ftt2/o.php?link=0.1.55.62.1169&url=~aHR0cDovL2dhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tLzUyMDkvNzE0NDYvNDMzLzIvaW5kZXgucGhw~
769[*] http://37.1.207.121/streamrotator/out.php?l=0.1.56.4570.11883&u=/ftt2/o.php?link=0.1.56.4570.11883&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vaG9ybnlicnVuZXR0ZXRlZW5tb3VzZS82MjkvaW5kZXguaHRtbA==~
770[*] http://37.1.207.121/streamrotator/out.php?l=0.1.57.63.760&u=/ftt2/o.php?link=0.1.57.63.760&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMjYxMi83ODkxNjYvMjczL2luZGV4LnBocA==~
771[*] http://37.1.207.121/streamrotator/out.php?l=0.1.58.23.802&u=/ftt2/o.php?link=0.1.58.23.802&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMjQwOC83ODE4MzEvMjczL2luZGV4LnBocA==~
772[*] http://37.1.207.121/streamrotator/out.php?l=0.1.59.4660.14690&u=/ftt2/o.php?link=0.1.59.4660.14690&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vbnVkZWN1cmx5dGVlbmN1dGllLzYyOS9pbmRleC5odG1s~
773[*] http://37.1.207.121/streamrotator/out.php?l=0.1.60.2.1604&u=/ftt2/o.php?link=0.1.60.2.1604&url=~aHR0cDovL3d3dy5sb3ZlbHktbXktZ2lybHMuY29tL2dhbGxlcmllcy9qdXN0LXRlZW5zLXBvcm4vdGVlbnMta2lzcy1lYWNoLW90aGVyLw==~
774[*] http://37.1.207.121/streamrotator/out.php?l=0.1.61.4564.5936&u=/ftt2/o.php?link=0.1.61.4564.5936&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGVlbm1vZGVscGFuZGEvNjI5L2luZGV4Lmh0bWw=~
775[*] http://37.1.207.121/streamrotator/out.php?l=0.1.62.24.438&u=/ftt2/o.php?link=0.1.62.24.438&url=~aHR0cDovL2Nvenl4eHguY29tLzk1OTgvNzg5NDAzLzI3My9pbmRleC5waHA=~
776[*] http://37.1.207.121/streamrotator/out.php?l=0.1.63.1191.908&u=/ftt2/o.php?link=0.1.63.1191.908&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vdGhpbmxvbmdoYWlyZWRjdXRpZS82MjkvaW5kZXguaHRtbA==~
777[*] http://37.1.207.121/streamrotator/out.php?l=0.1.6.41.84&u=/ftt2/o.php?link=0.1.6.41.84&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMjkyNi84MTMyOTAvMjczL2luZGV4LnBocA==~
778[*] http://37.1.207.121/streamrotator/out.php?l=0.1.64.65.1464&u=/ftt2/o.php?link=0.1.64.65.1464&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMzE5MC84Mjk4MTIvMjczL2luZGV4LnBocA==~
779[*] http://37.1.207.121/streamrotator/out.php?l=0.1.65.34.1138&u=/ftt2/o.php?link=0.1.65.34.1138&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMjc4Mi84MDAxOTEvMjczL2luZGV4LnBocA==~
780[*] http://37.1.207.121/streamrotator/out.php?l=0.1.66.5.1134&u=/ftt2/o.php?link=0.1.66.5.1134&url=~aHR0cDovL3d3dy5zaGVkZXZpbHMuY29tL2dhbGxlcmllcy9iaWtpbmkvP2lkPTIxMjQxODc=~
781[*] http://37.1.207.121/streamrotator/out.php?l=0.1.67.49.109&u=/ftt2/o.php?link=0.1.67.49.109&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vcGVyZmVjdHNsaW10ZWVuLzYyOS9pbmRleC5odG1s~
782[*] http://37.1.207.121/streamrotator/out.php?l=0.1.68.71.571&u=/ftt2/o.php?link=0.1.68.71.571&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMjE4My83NjUxNjEvMjczL2luZGV4LnBocA==~
783[*] http://37.1.207.121/streamrotator/out.php?l=0.1.69.342.519&u=/ftt2/o.php?link=0.1.69.342.519&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vcHJldHR5Y2hhcm1lci82MjkvaW5kZXguaHRtbA==~
784[*] http://37.1.207.121/streamrotator/out.php?l=0.1.70.4628.13648&u=/ftt2/o.php?link=0.1.70.4628.13648&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGhpbnRlZW5yb3NlLzYyOS9pbmRleC5odG1s~
785[*] http://37.1.207.121/streamrotator/out.php?l=0.1.71.4488.10540&u=/ftt2/o.php?link=0.1.71.4488.10540&url=~aHR0cDovL2Vuam95dmlkcy5jb20vZ2FsbGVyaWVzL25iZC9waWMvMDAxdy9pbmRleC5waHA/bmF0cz1NVGd3T1M0eExqVXVOeTR3TGpNeU1TNHdMakF1TUE=~
786[*] http://37.1.207.121/streamrotator/out.php?l=0.1.7.14.812&u=/ftt2/o.php?link=0.1.7.14.812&url=~aHR0cDovL3d3dy53YW5uYWdpcmxzLm5ldC9nYWxsZXJpZXMvY292ZXJoZXJmYWNlLXNwZXJtLWZhY2UvaW5kZXgwMjQuaHRtbA==~
787[*] http://37.1.207.121/streamrotator/out.php?l=0.1.72.967.1119&u=/ftt2/o.php?link=0.1.72.967.1119&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vdGhpbmN1dGllcHVzc3kvNjI5L2luZGV4Lmh0bWw=~
788[*] http://37.1.207.121/streamrotator/out.php?l=0.1.73.68.356&u=/ftt2/o.php?link=0.1.73.68.356&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMjE4My83NjUxMzEvMjczL2luZGV4LnBocA==~
789[*] http://37.1.207.121/streamrotator/out.php?l=0.1.74.766.656&u=/ftt2/o.php?link=0.1.74.766.656&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vY3V0ZXRoaW5naXJsLzYyOS9pbmRleC5odG1s~
790[*] http://37.1.207.121/streamrotator/out.php?l=0.1.75.4619.13466&u=/ftt2/o.php?link=0.1.75.4619.13466&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vbnVkZXRhbm5lZHRlZW4vNjI5L2luZGV4Lmh0bWw=~
791[*] http://37.1.207.121/streamrotator/out.php?l=0.1.76.67.1425&u=/ftt2/o.php?link=0.1.76.67.1425&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMzE5MC84Mjk4NzIvMjczL2luZGV4LnBocA==~
792[*] http://37.1.207.121/streamrotator/out.php?l=0.1.77.57.1468&u=/ftt2/o.php?link=0.1.77.57.1468&url=~aHR0cDovL3RlZW53YW50bWUuY29tL2dhbGxzLzAwNS9pbmRleC5odG0=~
793[*] http://37.1.207.121/streamrotator/out.php?l=0.1.78.4617.13424&u=/ftt2/o.php?link=0.1.78.4617.13424&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vbnVkZWJsb25kZXRoaW50ZWVuLzYyOS9pbmRleC5odG1s~
794[*] http://37.1.207.121/streamrotator/out.php?l=0.1.79.287.1487&u=/ftt2/o.php?link=0.1.79.287.1487&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vcHVzc3ljbG9zZXVwLzYyOS9pbmRleC5odG1s~
795[*] http://37.1.207.121/streamrotator/out.php?l=0.1.80.33.1551&u=/ftt2/o.php?link=0.1.80.33.1551&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMjc1OS83OTUxODIvMjczL2luZGV4LnBocA==~
796[*] http://37.1.207.121/streamrotator/out.php?l=0.1.81.32.1135&u=/ftt2/o.php?link=0.1.81.32.1135&url=~aHR0cDovL2J1bGtqZXJrLmNvbS8xMDAyMi83OTUzMjgvMjczL2luZGV4LnBocA==~
797[*] http://37.1.207.121/streamrotator/out.php?l=0.1.82.84.508&u=/ftt2/o.php?link=0.1.82.84.508&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vc2xpbXRlZW5tb2RlbG51ZGUvNjI5L2luZGV4Lmh0bWw=~
798[*] http://37.1.207.121/streamrotator/out.php?l=0.1.83.90.826&u=/ftt2/o.php?link=0.1.83.90.826&url=~aHR0cDovL3Byb21vLmF2ZXJvdGljYS5jb20vZ2Fscy8yMDEyMDMyMi0xNjY0LW1hZ2dpZS8/d209MjM5MTY3MQ==~
799[*] http://37.1.207.121/streamrotator/out.php?l=0.1.8.42.1301&u=/ftt2/o.php?link=0.1.8.42.1301&url=~aHR0cDovL3d3dy5udWRpc3QtcGhvdG9zLm5ldC90ZWVuLW51ZGlzdC1naXJscy5odG1s~
800[*] http://37.1.207.121/streamrotator/out.php?l=0.1.84.30.972&u=/ftt2/o.php?link=0.1.84.30.972&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGVlbm11c2hyb29tcy82MjkvaW5kZXguaHRtbA==~
801[*] http://37.1.207.121/streamrotator/out.php?l=0.1.85.1001.212&u=/ftt2/o.php?link=0.1.85.1001.212&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vbmFrZWRtb2RlbHRlZGR5YmVhcnMvNjI5L2luZGV4Lmh0bWw=~
802[*] http://37.1.207.121/streamrotator/out.php?l=0.1.86.85.156&u=/ftt2/o.php?link=0.1.86.85.156&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xNDE5Mi84NTg2MjAvMjczL2luZGV4LnBocA==~
803[*] http://37.1.207.121/streamrotator/out.php?l=0.1.87.40.807&u=/ftt2/o.php?link=0.1.87.40.807&url=~aHR0cDovL3d3dy5icmF2b251ZGUuY29tL3Bhc3Npb24taGQtcG9ybi96b2V5LWFuZC1kYW5pL3NleHVhbC1uYXR1cmUv~
804[*] http://37.1.207.121/streamrotator/out.php?l=0.1.88.4290.11437&u=/ftt2/o.php?link=0.1.88.4290.11437&url=~aHR0cDovL2Vuam95dmlkcy5jb20vZ2FsbGVyaWVzL25iZC9waWMvMDE5OXMvaW5kZXgucGhwP25hdHM9TVRnd09TNHhMalV1Tnk0d0xqUTFOVGd1TUM0d0xqQQ==~
805[*] http://37.1.207.121/streamrotator/out.php?l=0.1.89.17.1543&u=/ftt2/o.php?link=0.1.89.17.1543&url=~aHR0cDovL2dhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbS8xMTQ1NS83Mzc0MjEvMjczL2luZGV4LnBocA==~
806[*] http://37.1.207.121/streamrotator/out.php?l=0.1.90.75.186&u=/ftt2/o.php?link=0.1.90.75.186&url=~aHR0cDovL2dhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbS82NTI1LzI3NTM0OS8yNzMvaW5kZXgucGhw~
807[*] http://37.1.207.121/streamrotator/out.php?l=0.1.91.3859.5191&u=/ftt2/o.php?link=0.1.91.3859.5191&url=~aHR0cHM6Ly9naWdhcHJvbi5jb20vMTQyMjgvODg2NTMzLzI3My9pbmRleC5waHA=~
808[*] http://37.1.207.121/streamrotator/out.php?l=0.1.92.4571.12247&u=/ftt2/o.php?link=0.1.92.4571.12247&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vc2V4eXRlZW5pZWFwcGxlcy82MjkvaW5kZXguaHRtbA==~
809[*] http://37.1.207.121/streamrotator/out.php?l=0.1.93.51.586&u=/ftt2/o.php?link=0.1.93.51.586&url=~aHR0cDovL2hvc3RlZC5tZXQtYXJ0LmNvbS9GdWxsX21ldC1hcnRfcnlfMzk1XzE5MS8/cGE9MTY3MDU2Ng==~
810[*] http://37.1.207.121/streamrotator/out.php?l=0.1.94.1027.202&u=/ftt2/o.php?link=0.1.94.1027.202&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vc2hvcnRoYWlyZWRibG9uZGVjdXRpZS82MjkvaW5kZXguaHRtbA==~
811[*] http://37.1.207.121/streamrotator/out.php?l=0.1.95.763.1&u=/ftt2/o.php?link=0.1.95.763.1&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vY3V0ZW51ZGV0ZWVuLzYyOS9pbmRleC5odG1s~
812[*] http://37.1.207.121/streamrotator/out.php?l=0.1.96.46.1100&u=/ftt2/o.php?link=0.1.96.46.1100&url=~aHR0cDovL2J1bGtqZXJrLmNvbS8zOTI2LzgxNTA3Ni8yNzMvaW5kZXgucGhw~
813[*] http://37.1.207.121/streamrotator/out.php?l=0.1.97.668.1360&u=/ftt2/o.php?link=0.1.97.668.1360&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGVlbnJvY2tlci82MjkvaW5kZXguaHRtbA==~
814[*] http://37.1.207.121/streamrotator/out.php?l=0.1.9.8.517&u=/ftt2/o.php?link=0.1.9.8.517&url=~aHR0cDovL2dhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tLzEwNTM1LzYzOTA1NS8yODM2L2luZGV4LnBocA==~
815[*] http://37.1.207.121/streamrotator/out.php?l=0.1.98.69.774&u=/ftt2/o.php?link=0.1.98.69.774&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMjE4My83NjUxNDUvMjczL2luZGV4LnBocA==~
816[*] http://37.1.207.121/streamrotator/out.php?l=0.1.99.4603.13175&u=/ftt2/o.php?link=0.1.99.4603.13175&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vbnVkZXRlZW5ibG9uZGVtb2RlbC82MjkvaW5kZXguaHRtbA==~
817[*] http://37.1.207.121/streamrotator/out.php?l=0.2.0.1848.3805&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk2NzAyNy9sZXZyZXR0ZV9wb3VyX255bXBoZXR0ZS5odG1s~
818[*] http://37.1.207.121/streamrotator/out.php?l=0.2.10.1680.918&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNzAxOTQ3Ni90aW55X3RlZW5faGVhdGhlcl9kZWVwX2RvZXNfbGF5aW5nX2Rvd25fcmV2ZXJzZV9kZWVwdGhyb2F0Lmh0bWw=~
819[*] http://37.1.207.121/streamrotator/out.php?l=0.2.11.2219.13834&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk2NzgyMS9leGNpdGVkX3RlZW5zX3RveXNfdHdhdHNfb3V0ZG9vcnMuaHRtbA==~
820[*] http://37.1.207.121/streamrotator/out.php?l=0.2.1.1436.889&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNzA4ODQ5Ni9ydW1pXy1famFwYW5lc2VfYW5nZWwuaHRtbA==~
821[*] http://37.1.207.121/streamrotator/out.php?l=0.2.12.1483.757&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk1ODI3MS9zZXhfYWxsX3Bvc3Rpb25zLmh0bWw=~
822[*] http://37.1.207.121/streamrotator/out.php?l=0.2.13.1545.184&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNzEwMDcyNS9vbmVfb2ZfbXlfY291c2luX2Nsb3NldXBfbmV3X3llYXJzX3BhcnR5Lmh0bWw=~
823[*] http://37.1.207.121/streamrotator/out.php?l=0.2.14.2151.2073.t&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk3MTc4Ny95b3VuZ19mcmllbmRfY29va2luZ19pbl9zaG9ydF9wYWphbWFzLmh0bWw=~
824[*] http://37.1.207.121/streamrotator/out.php?l=0.2.15.2005.12606&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk2NjA3NS9zd2VldF9ob25leV9mcm9tX2h1bmdhcnlfMS5odG1s~
825[*] http://37.1.207.121/streamrotator/out.php?l=0.2.16.1362.412&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNzAzNDY1OC9uYWtlZF90aWVkX3RlZW5fbWFzdHVyYmF0ZWRfYnlfb2xkZXJfbWFuLmh0bWw=~
826[*] http://37.1.207.121/streamrotator/out.php?l=0.2.17.2433.2539&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjkxMjI3OC9ydXNzaWFuX3RlZW5fc2lzdGVyX2xldHNfYnJvX2Z1Y2tfaGVyLmh0bWw=~
827[*] http://37.1.207.121/streamrotator/out.php?l=0.2.18.2118.12627&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk3MjczOC90ZWVuX2NyZWFteV9zcXVpcnQuaHRtbA==~
828[*] http://37.1.207.121/streamrotator/out.php?l=0.2.19.2156.13750&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjkyNTY4MC9jbGFzc3lfdGVlbl9hc3NmdWNrZWRfYWZ0ZXJfZmluZ2VyaW5nLmh0bWw=~
829[*] http://37.1.207.121/streamrotator/out.php?l=0.2.2.3664.3530&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNzAzMTIwNy9lbGV4aXNfci5odG1s~
830[*] http://37.1.207.121/streamrotator/out.php?l=0.2.3.1663.844&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk4NjQ0My90ZWVuX3NlbGZpZV9tYXN0dXJiYXRpb24uaHRtbA==~
831[*] http://37.1.207.121/streamrotator/out.php?l=0.2.4.1443.471&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk5MTk1Mi9wZXRpdGVfdGVlbl9tYXN0dXJiYXRpbmdfYW5kX2RhbmNpbmcuaHRtbA==~
832[*] http://37.1.207.121/streamrotator/out.php?l=0.2.5.1450.210&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNzAzOTg4MS9tb3Jtb25fdGVlbl9mYWNlX3JpZGRlbi5odG1s~
833[*] http://37.1.207.121/streamrotator/out.php?l=0.2.6.1915.2049&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk2MzMyNS9jdXRlX2dpcmxmcmllbmRfYmxvd2pvYi5odG1s~
834[*] http://37.1.207.121/streamrotator/out.php?l=0.2.7.3590.3369&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNzAyODgwNS9zZXh5X2JhYmVfc3ByZWFkc193aWRlX291dGRvb3JzLmh0bWw=~
835[*] http://37.1.207.121/streamrotator/out.php?l=0.2.8.1948.4510&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk1OTEwNC9vdHNvczEuaHRtbA==~
836[*] http://37.1.207.121/streamrotator/out.php?l=0.2.9.2377.2376&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk3OTE1OC90ZWVueV9mdWNrZWRfbGlrZV9pbl9oZXJfZHJlYW1zLmh0bWw=~
837[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=
838[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=1220
839[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=1868
840[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=1901
841[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2370
842[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2421
843[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2422
844[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2456
845[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2501
846[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2502
847[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2503
848[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2504
849[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2509
850[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2527
851[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2528
852[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2529
853[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2530
854[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2531
855[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2534
856[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2535
857[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2536
858[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2538
859[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2539
860[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2540
861[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=2802
862[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=31
863[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=322
864[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=367
865[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=368
866[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=406
867[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=508
868[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=571
869[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=655
870[*] http://teens-sins.net/ftt2/o.php?l=toplist&perm=7
871[*] http://teens-sins.net/ftt2/signup.php
872[*] http://teens-sins.net/streamrotator/out.php?l=0.1.0.24748.154328&u=/ftt2/o.php?link=0.1.0.24748.154328&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNTcwJTJGNzg0MzA3JTJGMjczJTJGaW5kZXgucGhw~
873[*] http://teens-sins.net/streamrotator/out.php?l=0.1.100.606.29&u=/ftt2/o.php?link=0.1.100.606.29&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczIuYWR1bHQtZW1waXJlLmNvbSUyRjg0OTMlMkY0MTE2ODQlMkYxMTE2JTJGaW5kZXgucGhw~
874[*] http://teens-sins.net/streamrotator/out.php?l=0.1.101.41343.259279&u=/ftt2/o.php?link=0.1.101.41343.259279&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwMjg3dCUyRmluZGV4LnBocCUzRm5hdHMlM0RNVGd3T1M0eExqVXVOeTR3TGpRMk5EWXVNQzR3TGpB~
875[*] http://teens-sins.net/streamrotator/out.php?l=0.1.102.37865.237666&u=/ftt2/o.php?link=0.1.102.37865.237666&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZHRhbm5lZGJlYXV0eSUyRjYyOSUyRmluZGV4Lmh0bWw=~
876[*] http://teens-sins.net/streamrotator/out.php?l=0.1.103.41830.264972&u=/ftt2/o.php?link=0.1.103.41830.264972&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZudWRlYmxvbmRldGhpbnRlZW4lMkY2MjklMkZpbmRleC5odG1s~
877[*] http://teens-sins.net/streamrotator/out.php?l=0.1.10.37744.235539&u=/ftt2/o.php?link=0.1.10.37744.235539&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZiZWF1dHloYWlyeXB1c3N5JTJGNjI5JTJGaW5kZXguaHRtbA==~
878[*] http://teens-sins.net/streamrotator/out.php?l=0.1.104.41987.267997&u=/ftt2/o.php?link=0.1.104.41987.267997&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZob3RjdXJseXRlZW5tb2RlbCUyRjYyOSUyRmluZGV4Lmh0bWw=~
879[*] http://teens-sins.net/streamrotator/out.php?l=0.1.105.38138.241682&u=/ftt2/o.php?link=0.1.105.38138.241682&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZHRoaW5jdXRpZSUyRjYyOSUyRmluZGV4Lmh0bWw=~
880[*] http://teens-sins.net/streamrotator/out.php?l=0.1.106.29951.174126&u=/ftt2/o.php?link=0.1.106.29951.174126&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjY5NTgyNzElMkZzZXhfYWxsX3Bvc3Rpb25zLmh0bWw=~
881[*] http://teens-sins.net/streamrotator/out.php?l=0.1.107.37561.233551&u=/ftt2/o.php?link=0.1.107.37561.233551&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVuYWlyYmFsbG9vbnMlMkY2MjklMkZpbmRleC5odG1s~
882[*] http://teens-sins.net/streamrotator/out.php?l=0.1.108.41794.264262&u=/ftt2/o.php?link=0.1.108.41794.264262&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVuc3RyaXB0ZWFzZWJhbGxvb25zJTJGNjI5JTJGaW5kZXguaHRtbA==~
883[*] http://teens-sins.net/streamrotator/out.php?l=0.1.109.34429.208013&u=/ftt2/o.php?link=0.1.109.34429.208013&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZob3JueWJsb25kZW1vZGVsJTJGNjI5JTJGaW5kZXguaHRtbA==~
884[*] http://teens-sins.net/streamrotator/out.php?l=0.1.110.28027.167212&u=/ftt2/o.php?link=0.1.110.28027.167212&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZuYWtlZHRlZW5mcnVpdHMlMkY2MjklMkZpbmRleC5odG1s~
885[*] http://teens-sins.net/streamrotator/out.php?l=0.1.111.34303.206818&u=/ftt2/o.php?link=0.1.111.34303.206818&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZtYWplc3RpY3N1dGllJTJGNjI5JTJGaW5kZXguaHRtbA==~
886[*] http://teens-sins.net/streamrotator/out.php?l=0.1.112.41897.266307&u=/ftt2/o.php?link=0.1.112.41897.266307&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZob3JueW51ZGViZWF1dHklMkY2MjklMkZpbmRleC5odG1s~
887[*] http://teens-sins.net/streamrotator/out.php?l=0.1.113.34580.210273&u=/ftt2/o.php?link=0.1.113.34580.210273&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZqdWljeXNsaW1uYWtlZG1vZGVsJTJGNjI5JTJGaW5kZXguaHRtbA==~
888[*] http://teens-sins.net/streamrotator/out.php?l=0.1.11.37823.236907&u=/ftt2/o.php?link=0.1.11.37823.236907&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZGJsb25kZWJ1bm55JTJGNjI5JTJGaW5kZXguaHRtbA==~
889[*] http://teens-sins.net/streamrotator/out.php?l=0.1.114.38207.243022&u=/ftt2/o.php?link=0.1.114.38207.243022&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZsb3ZlbHl0ZWVudW5kcmVzc2luZyUyRjYyOSUyRmluZGV4Lmh0bWw=~
890[*] http://teens-sins.net/streamrotator/out.php?l=0.1.12.23883.146385&u=/ftt2/o.php?link=0.1.12.23883.146385&url=~aHR0cCUzQSUyRiUyRmNvenl4eHguY29tJTJGOTU5OCUyRjgzMTcyMSUyRjI3MyUyRmluZGV4LnBocA==~
891[*] http://teens-sins.net/streamrotator/out.php?l=0.1.13.22694.143508&u=/ftt2/o.php?link=0.1.13.22694.143508&url=~aHR0cCUzQSUyRiUyRnd3dy5udWRpc3QtcGhvdG9zLm5ldCUyRmZhbWlseS1udWRpc20tcGljdHVyZXMuaHRtbA==~
892[*] http://teens-sins.net/streamrotator/out.php?l=0.1.1.37784.236239&u=/ftt2/o.php?link=0.1.1.37784.236239&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZmYWlyeWJlYXV0eXVuZHJlc3NpbmclMkY2MjklMkZpbmRleC5odG1s~
893[*] http://teens-sins.net/streamrotator/out.php?l=0.1.14.41999.268237.t&u=/ftt2/o.php?link=0.1.14.41999.268237.t&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZudWRlbG9uZ2hhaXJlZHRlZW5pZSUyRjYyOSUyRmluZGV4Lmh0bWw=~
894[*] http://teens-sins.net/streamrotator/out.php?l=0.1.15.35804.219761&u=/ftt2/o.php?link=0.1.15.35804.219761&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZGxvbmdoYWlyZWRjdXRpZSUyRjYyOSUyRmluZGV4Lmh0bWw=~
895[*] http://teens-sins.net/streamrotator/out.php?l=0.1.16.34272.206151&u=/ftt2/o.php?link=0.1.16.34272.206151&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZG9uYmVhY2glMkY2MjklMkZpbmRleC5odG1s~
896[*] http://teens-sins.net/streamrotator/out.php?l=0.1.17.23610.144528&u=/ftt2/o.php?link=0.1.17.23610.144528&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyOTI2JTJGODEzMjkwJTJGMjczJTJGaW5kZXgucGhw~
897[*] http://teens-sins.net/streamrotator/out.php?l=0.1.18.24754.154191&u=/ftt2/o.php?link=0.1.18.24754.154191&url=~aHR0cCUzQSUyRiUyRnN3ZWV0Z2lybGllLmNvbSUyRmdhbGxzJTJGMDUyJTJGaW5kZXgucGhw~
898[*] http://teens-sins.net/streamrotator/out.php?l=0.1.19.22405.140725&u=/ftt2/o.php?link=0.1.19.22405.140725&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNzU4JTJGODEwNzAzJTJGMjczJTJGaW5kZXgucGhw~
899[*] http://teens-sins.net/streamrotator/out.php?l=0.1.20.10304.86341&u=/ftt2/o.php?link=0.1.20.10304.86341&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExMzQ0JTJGNzI1NDUxJTJGMjczJTJGaW5kZXgucGhw~
900[*] http://teens-sins.net/streamrotator/out.php?l=0.1.21.23687.145255&u=/ftt2/o.php?link=0.1.21.23687.145255&url=~aHR0cCUzQSUyRiUyRmJ1bGtqZXJrLmNvbSUyRjM5MjYlMkY3OTA3MDElMkYxMTExJTJGaW5kZXgucGhw~
901[*] http://teens-sins.net/streamrotator/out.php?l=0.1.2.19202.122111&u=/ftt2/o.php?link=0.1.2.19202.122111&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczIuYWR1bHQtZW1waXJlLmNvbSUyRjc5NDIlMkY1MjAyODYlMkY0MzMlMkYyJTJGaW5kZXgucGhw~
902[*] http://teens-sins.net/streamrotator/out.php?l=0.1.22.38255.243964&u=/ftt2/o.php?link=0.1.22.38255.243964&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZzaGFwZWx5dGVlbnNoYXZlZHB1c3N5JTJGNjI5JTJGaW5kZXguaHRtbA==~
903[*] http://teens-sins.net/streamrotator/out.php?l=0.1.23.23392.144005&u=/ftt2/o.php?link=0.1.23.23392.144005&url=~aHR0cCUzQSUyRiUyRnd3dy5yZWFsZ2ZzZXhwb3NlZC5jb20lMkZmaGclMkYyJTJGZ2ZzMTMlMkYlM0ZuYXRzJTNETkRRdU5pNHhMakV1TUM0NE9TNHdMakF1TUE=~
904[*] http://teens-sins.net/streamrotator/out.php?l=0.1.24.18854.137624&u=/ftt2/o.php?link=0.1.24.18854.137624&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczIuYWR1bHQtZW1waXJlLmNvbSUyRjgyODElMkY1NDI1ODIlMkY2MTYwJTJGaW5kZXgucGhw~
905[*] http://teens-sins.net/streamrotator/out.php?l=0.1.25.22212.139515&u=/ftt2/o.php?link=0.1.25.22212.139515&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNzgyJTJGODAwMjA1JTJGMjczJTJGaW5kZXgucGhw~
906[*] http://teens-sins.net/streamrotator/out.php?l=0.1.26.24717.154255&u=/ftt2/o.php?link=0.1.26.24717.154255&url=~aHR0cCUzQSUyRiUyRmpvaW4udGVlbmxpbGx5LmNvbSUyRmdhbGxlcnklMkZoYW1yYWRpby4yLjQzLjQzLjAuMjc3MC4wLjAuMA==~
907[*] http://teens-sins.net/streamrotator/out.php?l=0.1.27.10673.87803&u=/ftt2/o.php?link=0.1.27.10673.87803&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tJTJGNzU4NiUyRjcyNTk5NCUyRjI3MyUyRmluZGV4LnBocA==~
908[*] http://teens-sins.net/streamrotator/out.php?l=0.1.28.19190.154259&u=/ftt2/o.php?link=0.1.28.19190.154259&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tJTJGOTg1MCUyRjU0MjQ4MiUyRjQzMyUyRmluZGV4LnBocA==~
909[*] http://teens-sins.net/streamrotator/out.php?l=0.1.29.584.72&u=/ftt2/o.php?link=0.1.29.584.72&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5lbWlseTE4LmNvbSUyRm51ZGUxJTJGZW1pbHktYWxvbmUlMkZpbmRleDYucGhwJTNGaWQlM0QxNjMxNzE0~
910[*] http://teens-sins.net/streamrotator/out.php?l=0.1.30.1933.2209&u=/ftt2/o.php?link=0.1.30.1933.2209&url=~aHR0cCUzQSUyRiUyRnJlYWxleGdpcmxmcmllbmRzLndhdGNobXlnZi5uZXQlMkZnJTJGMzI4JTJGYWw0YQ==~
911[*] http://teens-sins.net/streamrotator/out.php?l=0.1.31.41820.264750&u=/ftt2/o.php?link=0.1.31.41820.264750&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZzZW5zdWFsYnJ1bmV0dGUlMkY2MjklMkZpbmRleC5odG1s~
912[*] http://teens-sins.net/streamrotator/out.php?l=0.1.32.11645.94725&u=/ftt2/o.php?link=0.1.32.11645.94725&url=~aHR0cCUzQSUyRiUyRnNlY3VyZS5teXRlZW5pZWNoZWVybGVhZGVyLmNvbSUyRmdhbGxlcnklMkZNakl1TVM0MkxqWXVNQzR5TURjdU1DNHdMakE=~
913[*] http://teens-sins.net/streamrotator/out.php?l=0.1.33.38260.244057&u=/ftt2/o.php?link=0.1.33.38260.244057&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZ0aGluYmxvbmRlc3RyaXB0ZWFzZSUyRjYyOSUyRmluZGV4Lmh0bWw=~
914[*] http://teens-sins.net/streamrotator/out.php?l=0.1.3.34928.212137&u=/ftt2/o.php?link=0.1.3.34928.212137&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVuYW5nZWxmbG93ZXJzJTJGNjI5JTJGaW5kZXguaHRtbA==~
915[*] http://teens-sins.net/streamrotator/out.php?l=0.1.34.27981.167622&u=/ftt2/o.php?link=0.1.34.27981.167622&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZzZXh5dGVlbnJlZmxlY3Rpb24lMkY2MjklMkZpbmRleC5odG1s~
916[*] http://teens-sins.net/streamrotator/out.php?l=0.1.35.34254.206070&u=/ftt2/o.php?link=0.1.35.34254.206070&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZidXN0eXNub3dxdWVlbiUyRjYyOSUyRmluZGV4Lmh0bWw=~
917[*] http://teens-sins.net/streamrotator/out.php?l=0.1.36.4939.13869&u=/ftt2/o.php?link=0.1.36.4939.13869&url=~aHR0cCUzQSUyRiUyRmx1c3RnYWxsZXJpZXMubmV0JTJGJTNGaWQlM0Rlcm90aWMtbGFkaWVzLm5ldA==~
918[*] http://teens-sins.net/streamrotator/out.php?l=0.1.37.27941.168385&u=/ftt2/o.php?link=0.1.37.27941.168385&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZG1vZGVsYm9hdCUyRjYyOSUyRmluZGV4Lmh0bWw=~
919[*] http://teens-sins.net/streamrotator/out.php?l=0.1.38.10691.88164&u=/ftt2/o.php?link=0.1.38.10691.88164&url=~aHR0cCUzQSUyRiUyRmZyZWUuMXBhc3Nmb3JhbGxzaXRlcy5jb20lMkY3c2pwa3glMkYzJTJGQW15XyUzRnNpdGVfaWQlM0Q5OQ==~
920[*] http://teens-sins.net/streamrotator/out.php?l=0.1.39.6419.35704&u=/ftt2/o.php?link=0.1.39.6419.35704&url=~aHR0cCUzQSUyRiUyRmZyZWUueW91bmdsaWJlcnRpbmVzLmNvbSUyRnBpY3MlMkYzMTA2MDc5Mzg1JTJGaW5kZXguaHRtJTNGbmF0cyUzRE5qUXpPamM2TVRR~
921[*] http://teens-sins.net/streamrotator/out.php?l=0.1.40.10670.87974&u=/ftt2/o.php?link=0.1.40.10670.87974&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExMzI1JTJGNzI2ODMxJTJGMjczJTJGaW5kZXgucGhw~
922[*] http://teens-sins.net/streamrotator/out.php?l=0.1.41.24738.154371&u=/ftt2/o.php?link=0.1.41.24738.154371&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNzcxJTJGNzk1MjQ4JTJGMjczJTJGaW5kZXgucGhw~
923[*] http://teens-sins.net/streamrotator/out.php?l=0.1.42.24742.154462&u=/ftt2/o.php?link=0.1.42.24742.154462&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy53ZW5lZWRuZXd0YWxlbnRzLmNvbSUyRnBpY3MlMkY1NCUyRjc3NDY0NG1hcnRhJTJGMTAwNzk3MCUyRg==~
924[*] http://teens-sins.net/streamrotator/out.php?l=0.1.43.5425.21340&u=/ftt2/o.php?link=0.1.43.5425.21340&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5tZXQtYXJ0LmNvbSUyRkZ1bGxfbWV0LWFydF9LRVJfNF84NTAlMkYlM0ZwYSUzRDE2NzA1NjY=~
925[*] http://teens-sins.net/streamrotator/out.php?l=0.1.44.17035.114259&u=/ftt2/o.php?link=0.1.44.17035.114259&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExNzI5JTJGNzU0MzgxJTJGMjczJTJGaW5kZXgucGhw~
926[*] http://teens-sins.net/streamrotator/out.php?l=0.1.4.42001.268256.t&u=/ftt2/o.php?link=0.1.4.42001.268256.t&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZGlucnllJTJGNjI5JTJGaW5kZXguaHRtbA==~
927[*] http://teens-sins.net/streamrotator/out.php?l=0.1.45.24763.154470&u=/ftt2/o.php?link=0.1.45.24763.154470&url=~aHR0cCUzQSUyRiUyRnRlZW53YW50bWUuY29tJTJGZ2FsbHMlMkYwMDklMkZpbmRleC5odG0=~
928[*] http://teens-sins.net/streamrotator/out.php?l=0.1.46.37042.224487&u=/ftt2/o.php?link=0.1.46.37042.224487&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZwdXNzeWphY3V6emklMkY2MjklMkZpbmRleC5odG1s~
929[*] http://teens-sins.net/streamrotator/out.php?l=0.1.47.10671.88066&u=/ftt2/o.php?link=0.1.47.10671.88066&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExMzY5JTJGNzI2NDM3JTJGMjczJTJGaW5kZXgucGhw~
930[*] http://teens-sins.net/streamrotator/out.php?l=0.1.48.38192.242485&u=/ftt2/o.php?link=0.1.48.38192.242485&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZzZXh5LW51ZGUta2l0dHklMkY2MjklMkZpbmRleC5odG1s~
931[*] http://teens-sins.net/streamrotator/out.php?l=0.1.49.24767.154339&u=/ftt2/o.php?link=0.1.49.24767.154339&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tJTJGNTIwOSUyRjcxNDQ2JTJGNDMzJTJGMiUyRmluZGV4LnBocA==~
932[*] http://teens-sins.net/streamrotator/out.php?l=0.1.50.24762.154021&u=/ftt2/o.php?link=0.1.50.24762.154021&url=~aHR0cCUzQSUyRiUyRnd3dy50ZWVuc3NlbGZzaG90LmNvbSUyRmZoZ3MlMkYwMjIxJTJGaW5kZXgucGhwJTNGY2NiaWxsJTNEMTQwODIzMA==~
933[*] http://teens-sins.net/streamrotator/out.php?l=0.1.51.10681.87931&u=/ftt2/o.php?link=0.1.51.10681.87931&url=~aHR0cCUzQSUyRiUyRnd3dy54eHg2OS5uZXQlMkZybHMwNTQ4OSUyRnJ1c3RlZW5zZXglMkYyMzYlMkYwMyUyRjAx~
934[*] http://teens-sins.net/streamrotator/out.php?l=0.1.52.37879.237917&u=/ftt2/o.php?link=0.1.52.37879.237917&url=~aHR0cCUzQSUyRiUyRnByb21vLnNrb2tvZmYuY29tJTJGZ2FscyUyRjY0MC13aWxkLXJlZC1lbGVvbm9yYSUyRiUzRndtJTNEMjM5MTY3MQ==~
935[*] http://teens-sins.net/streamrotator/out.php?l=0.1.53.6444.32787&u=/ftt2/o.php?link=0.1.53.6444.32787&url=~aHR0cCUzQSUyRiUyRmFtb3VyLXh4eC1hbmdlbHMuY29tJTJGZ2FsbGVyaWVzJTJGdGVlbi1tb2RlbDM4~
936[*] http://teens-sins.net/streamrotator/out.php?l=0.1.5.42000.268272.t&u=/ftt2/o.php?link=0.1.5.42000.268272.t&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZyZWRoZWFkY2hhcm1lciUyRjYyOSUyRmluZGV4Lmh0bWw=~
937[*] http://teens-sins.net/streamrotator/out.php?l=0.1.54.35766.220449&u=/ftt2/o.php?link=0.1.54.35766.220449&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZudWRlbW9kZWxzbWFsbHRpdHMlMkY2MjklMkZpbmRleC5odG1s~
938[*] http://teens-sins.net/streamrotator/out.php?l=0.1.55.24776.153905&u=/ftt2/o.php?link=0.1.55.24776.153905&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyMTgzJTJGNzY1MTQ1JTJGMjczJTJGaW5kZXgucGhw~
939[*] http://teens-sins.net/streamrotator/out.php?l=0.1.56.41785.264076&u=/ftt2/o.php?link=0.1.56.41785.264076&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0aGluYmxvbmRldGVlbmJlYXV0eSUyRjYyOSUyRmluZGV4Lmh0bWw=~
940[*] http://teens-sins.net/streamrotator/out.php?l=0.1.57.41996.268187&u=/ftt2/o.php?link=0.1.57.41996.268187&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVucHVzc3loYXQlMkY2MjklMkZpbmRleC5odG1s~
941[*] http://teens-sins.net/streamrotator/out.php?l=0.1.58.13431.98935&u=/ftt2/o.php?link=0.1.58.13431.98935&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExNTMwJTJGNzM3NzE1JTJGMjczJTJGaW5kZXgucGhw~
942[*] http://teens-sins.net/streamrotator/out.php?l=0.1.59.26195.159067&u=/ftt2/o.php?link=0.1.59.26195.159067&url=~aHR0cCUzQSUyRiUyRmJ1bGtqZXJrLmNvbSUyRjM5MjYlMkY3OTAwMzQlMkYyNzMlMkZpbmRleC5waHA=~
943[*] http://teens-sins.net/streamrotator/out.php?l=0.1.60.41321.258404&u=/ftt2/o.php?link=0.1.60.41321.258404&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwMzA5ayUyRmluZGV4LnBocCUzRm5hdHMlM0RNVGd3T1M0eExqVXVOeTR3TGpRMk5qZ3VNQzR3TGpB~
944[*] http://teens-sins.net/streamrotator/out.php?l=0.1.61.40829.251646&u=/ftt2/o.php?link=0.1.61.40829.251646&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZob3JueXRoaW50ZWVuJTJGNjI5JTJGaW5kZXguaHRtbA==~
945[*] http://teens-sins.net/streamrotator/out.php?l=0.1.62.10672.87964&u=/ftt2/o.php?link=0.1.62.10672.87964&url=~aHR0cCUzQSUyRiUyRnNleHh4eXRlZW50dWJlLm5ldCUyRg==~
946[*] http://teens-sins.net/streamrotator/out.php?l=0.1.6.2916.4518&u=/ftt2/o.php?link=0.1.6.2916.4518&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tJTJGOTk5NiUyRjYzMDc5OCUyRjI3MyUyRmluZGV4LnBocA==~
947[*] http://teens-sins.net/streamrotator/out.php?l=0.1.63.40583.247171&u=/ftt2/o.php?link=0.1.63.40583.247171&url=~aHR0cHMlM0ElMkYlMkZnaWdhcHJvbi5jb20lMkYxNDI2NiUyRjg4NjM4MyUyRjI3MyUyRmluZGV4LnBocA==~
948[*] http://teens-sins.net/streamrotator/out.php?l=0.1.64.6857.38685&u=/ftt2/o.php?link=0.1.64.6857.38685&url=~aHR0cCUzQSUyRiUyRnd3dy5sb3ZlbHktbXktZ2lybHMuY29tJTJGZ2FsbGVyaWVzJTJGanVzdC10ZWVucy1wb3JuJTJGdGVlbnMta2lzcy1lYWNoLW90aGVyJTJG~
949[*] http://teens-sins.net/streamrotator/out.php?l=0.1.65.19354.123908&u=/ftt2/o.php?link=0.1.65.19354.123908&url=~aHR0cCUzQSUyRiUyRmNvenl4eHguY29tJTJGOTI5MyUyRjc3NDcwMCUyRjI3MyUyRmluZGV4LnBocA==~
950[*] http://teens-sins.net/streamrotator/out.php?l=0.1.66.37754.235710&u=/ftt2/o.php?link=0.1.66.37754.235710&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZ0aGlubW9kZWxzdHJpcHRlYXNlJTJGNjI5JTJGaW5kZXguaHRtbA==~
951[*] http://teens-sins.net/streamrotator/out.php?l=0.1.67.13433.98937&u=/ftt2/o.php?link=0.1.67.13433.98937&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExNTMwJTJGNzM3NzIyJTJGMjczJTJGaW5kZXgucGhw~
952[*] http://teens-sins.net/streamrotator/out.php?l=0.1.68.40676.248784&u=/ftt2/o.php?link=0.1.68.40676.248784&url=~aHR0cCUzQSUyRiUyRnd3dy5hcnRudWRlZ2FsbGVyaWVzLmNvbSUyRmJpZ2Jvb2JzJTJGNjI5JTJGaW5kZXguaHRtbA==~
953[*] http://teens-sins.net/streamrotator/out.php?l=0.1.69.34447.208363&u=/ftt2/o.php?link=0.1.69.34447.208363&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZzZXh5bnVkZWJsb25kZWN1dGllJTJGNjI5JTJGaW5kZXguaHRtbA==~
954[*] http://teens-sins.net/streamrotator/out.php?l=0.1.70.34482.208743&u=/ftt2/o.php?link=0.1.70.34482.208743&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5iZWF1dHk0ay5jb20lMkY0MDY3ODg0NSUyRiUzRmRlc2lnbiUzRDMlMjZuYXRzJTNETVRBeE1qY3lMalV1TkRJdU5ESXVNQzR3TGpBdU1DNHclQzIlQkI=~
955[*] http://teens-sins.net/streamrotator/out.php?l=0.1.71.40969.254360&u=/ftt2/o.php?link=0.1.71.40969.254360&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0aGludGVlbmdsb2JlJTJGNjI5JTJGaW5kZXguaHRtbA==~
956[*] http://teens-sins.net/streamrotator/out.php?l=0.1.72.41998.268207&u=/ftt2/o.php?link=0.1.72.41998.268207&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZob3JueWJ1c3R5d2l0Y2glMkY2MjklMkZpbmRleC5odG1s~
957[*] http://teens-sins.net/streamrotator/out.php?l=0.1.7.3265.8525&u=/ftt2/o.php?link=0.1.7.3265.8525&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tJTJGMTA1NDElMkY2MzY1MjAlMkYyNzMlMkZpbmRleC5waHA=~
958[*] http://teens-sins.net/streamrotator/out.php?l=0.1.73.27968.167285&u=/ftt2/o.php?link=0.1.73.27968.167285&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZ0aGluY3V0aWVzdHJpcHRlYXNlJTJGNjI5JTJGaW5kZXguaHRtbA==~
959[*] http://teens-sins.net/streamrotator/out.php?l=0.1.74.40896.252935&u=/ftt2/o.php?link=0.1.74.40896.252935&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVubW9kZWxoYWlyeXB1c3N5JTJGNjI5JTJGaW5kZXguaHRtbA==~
960[*] http://teens-sins.net/streamrotator/out.php?l=0.1.75.34945.211883&u=/ftt2/o.php?link=0.1.75.34945.211883&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVucHVzc3lyb2xsZXJza2F0ZXMlMkY2MjklMkZpbmRleC5odG1s~
961[*] http://teens-sins.net/streamrotator/out.php?l=0.1.76.33859.203142&u=/ftt2/o.php?link=0.1.76.33859.203142&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZwdXNzeW91dGRvb3JzJTJGNjI5JTJGaW5kZXguaHRtbA==~
962[*] http://teens-sins.net/streamrotator/out.php?l=0.1.77.11294.92586&u=/ftt2/o.php?link=0.1.77.11294.92586&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExNDcxJTJGNzMzODk3JTJGMjczJTJGaW5kZXgucGhw~
963[*] http://teens-sins.net/streamrotator/out.php?l=0.1.78.35067.215766&u=/ftt2/o.php?link=0.1.78.35067.215766&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwNDYwcyUyRmluZGV4LnBocCUzRm5hdHMlM0RNVGd3T1M0eExqVXVOeTR3TGpRNE1Ua3VNQzR3TGpB~
964[*] http://teens-sins.net/streamrotator/out.php?l=0.1.79.2160.2498&u=/ftt2/o.php?link=0.1.79.2160.2498&url=~aHR0cCUzQSUyRiUyRnRlZW53YW50bWUuY29tJTJGZ2FsbHMlMkYwMDUlMkZpbmRleC5odG0=~
965[*] http://teens-sins.net/streamrotator/out.php?l=0.1.80.24730.154029&u=/ftt2/o.php?link=0.1.80.24730.154029&url=~aHR0cCUzQSUyRiUyRnByb21vLnNrb2tvZmYuY29tJTJGZ2FscyUyRjIwMTIxMDI4LXNrb2tvZmYtZmlyc3QtdGltZS0xNzklMkYlM0Z3bSUzRDIxNzI1MTU=~
966[*] http://teens-sins.net/streamrotator/out.php?l=0.1.8.11642.94453&u=/ftt2/o.php?link=0.1.8.11642.94453&url=~aHR0cCUzQSUyRiUyRnd3dy53YW5uYWdpcmxzLm5ldCUyRmdhbGxlcmllcyUyRmNvdmVyaGVyZmFjZS1zcGVybS1mYWNlJTJGaW5kZXgwMjQuaHRtbA==~
967[*] http://teens-sins.net/streamrotator/out.php?l=0.1.81.35206.218104&u=/ftt2/o.php?link=0.1.81.35206.218104&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwMzIxeSUyRmluZGV4LnBocCUzRm5hdHMlM0RNVGd3T1M0eExqVXVOeTR3TGpRMk9EQXVNQzR3TGpB~
968[*] http://teens-sins.net/streamrotator/out.php?l=0.1.82.20307.129706&u=/ftt2/o.php?link=0.1.82.20307.129706&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNjE3JTJGNzg0ODE1JTJGMjczJTJGaW5kZXgucGhw~
969[*] http://teens-sins.net/streamrotator/out.php?l=0.1.83.24740.154489&u=/ftt2/o.php?link=0.1.83.24740.154489&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNzgyJTJGODAwMTkxJTJGMjczJTJGaW5kZXgucGhw~
970[*] http://teens-sins.net/streamrotator/out.php?l=0.1.84.26768.156342&u=/ftt2/o.php?link=0.1.84.26768.156342&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjY1MjUlMkYzNDQ1NzUlMkYyNzMlMkZpbmRleC5waHA=~
971[*] http://teens-sins.net/streamrotator/out.php?l=0.1.85.5718.21441&u=/ftt2/o.php?link=0.1.85.5718.21441&url=~aHR0cCUzQSUyRiUyRnd3dy5hcnRudWRlZ2FsbGVyaWVzLmNvbSUyRmN1dGllcG9zaW5nJTJGMTE0JTJGaW5kZXguaHRtbA==~
972[*] http://teens-sins.net/streamrotator/out.php?l=0.1.86.21775.137604&u=/ftt2/o.php?link=0.1.86.21775.137604&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNjEyJTJGNzg5MTY2JTJGMjczJTJGaW5kZXgucGhw~
973[*] http://teens-sins.net/streamrotator/out.php?l=0.1.87.42001.268274&u=/ftt2/o.php?link=0.1.87.42001.268274&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZuYWtlZGlucnllJTJGNjI5JTJGaW5kZXguaHRtbA==~
974[*] http://teens-sins.net/streamrotator/out.php?l=0.1.88.34198.205122&u=/ftt2/o.php?link=0.1.88.34198.205122&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZhcHBsZXNlcm90aWNhJTJGNjI5JTJGaW5kZXguaHRtbA==~
975[*] http://teens-sins.net/streamrotator/out.php?l=0.1.89.37158.226255&u=/ftt2/o.php?link=0.1.89.37158.226255&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZ0ZWVucHVzc3lyaXZlciUyRjYyOSUyRmluZGV4Lmh0bWw=~
976[*] http://teens-sins.net/streamrotator/out.php?l=0.1.90.10680.87971&u=/ftt2/o.php?link=0.1.90.10680.87971&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExMzI0JTJGNzI2NzE3JTJGMjczJTJGaW5kZXgucGhw~
977[*] http://teens-sins.net/streamrotator/out.php?l=0.1.91.41951.267280&u=/ftt2/o.php?link=0.1.91.41951.267280&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5zaG93eWJlYXV0eS5jb20lMkZiZWF1dHlzYW5kJTJGNjI5JTJGaW5kZXguaHRtbA==~
978[*] http://teens-sins.net/streamrotator/out.php?l=0.1.92.35170.213720&u=/ftt2/o.php?link=0.1.92.35170.213720&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwMzU3eCUyRmluZGV4LnBocCUzRm5hdHMlM0RNVGd3T1M0eExqVXVOeTR3TGpRM01UWXVNQzR3TGpB~
979[*] http://teens-sins.net/streamrotator/out.php?l=0.1.93.41836.265102&u=/ftt2/o.php?link=0.1.93.41836.265102&url=~aHR0cCUzQSUyRiUyRmhvc3RlZC5hbW91cmFuZ2Vscy5jb20lMkZudWRldGFubmVkdGVlbiUyRjYyOSUyRmluZGV4Lmh0bWw=~
980[*] http://teens-sins.net/streamrotator/out.php?l=0.1.94.24722.154023&u=/ftt2/o.php?link=0.1.94.24722.154023&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyNDA4JTJGNzgxODMxJTJGMjczJTJGaW5kZXgucGhw~
981[*] http://teens-sins.net/streamrotator/out.php?l=0.1.95.22427.140189&u=/ftt2/o.php?link=0.1.95.22427.140189&url=~aHR0cCUzQSUyRiUyRmdpZ2Fwcm9uLmNvbSUyRjEyODgxJTJGODEwNzcwJTJGMjczJTJGaW5kZXgucGhw~
982[*] http://teens-sins.net/streamrotator/out.php?l=0.1.96.14040.99657&u=/ftt2/o.php?link=0.1.96.14040.99657&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExNTU4JTJGNzM5NjMxJTJGMjczJTJGaW5kZXgucGhw~
983[*] http://teens-sins.net/streamrotator/out.php?l=0.1.97.41126.262090&u=/ftt2/o.php?link=0.1.97.41126.262090&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwNTA3YyUyRmluZGV4LnBocCUzRm5hdHMlM0RNVGd3T1M0eExqVXVOeTR3TGpRNE5qWXVNQzR3TGpB~
984[*] http://teens-sins.net/streamrotator/out.php?l=0.1.98.12349.96951&u=/ftt2/o.php?link=0.1.98.12349.96951&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbSUyRjExNDY2JTJGNzMzOTUwJTJGMjczJTJGaW5kZXgucGhw~
985[*] http://teens-sins.net/streamrotator/out.php?l=0.1.9.9215.71677&u=/ftt2/o.php?link=0.1.9.9215.71677&url=~aHR0cCUzQSUyRiUyRmdhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tJTJGMTA1MzUlMkY2MzkwNTUlMkYyODM2JTJGaW5kZXgucGhw~
986[*] http://teens-sins.net/streamrotator/out.php?l=0.1.99.41555.255985&u=/ftt2/o.php?link=0.1.99.41555.255985&url=~aHR0cCUzQSUyRiUyRmVuam95dmlkcy5jb20lMkZnYWxsZXJpZXMlMkZuYmQlMkZwaWMlMkYwNzV1JTJGaW5kZXgucGhwJTNGbmF0cyUzRE1UZ3dPUzR4TGpVdU55NHdMalE1TlM0d0xqQXVNQQ==~
987[*] http://teens-sins.net/streamrotator/out.php?l=0.2.0.36797.223630&u=/ftt2/o.php?link=video&p=50&url=~aHR0cHMlM0ElMkYlMkZ4aGFtc3Rlci5jb20lMkZtb3ZpZXMlMkYxMDc0Mjg2MCUyRmN1bV9vbl9teV9mcmllbmQuaHRtbA==~
988[*] http://teens-sins.net/streamrotator/out.php?l=0.2.10.32405.197717&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwNzU4MzglMkZzdXBlcl9zd2VldC5odG1s~
989[*] http://teens-sins.net/streamrotator/out.php?l=0.2.11.36367.221872&u=/ftt2/o.php?link=video&p=50&url=~aHR0cHMlM0ElMkYlMkZ4aGFtc3Rlci5jb20lMkZtb3ZpZXMlMkYxMDY5MDY2NSUyRnRlYW1za2VldF8tX2Jlc3Rfb2ZfYW1hdGV1cl90ZWVuX2dpcmxzX2dldHRpbmdfZnVja2VkLmh0bWw=~
990[*] http://teens-sins.net/streamrotator/out.php?l=0.2.12.30969.187029&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwNDExODYlMkZwZXJmZWN0X2hhbmRqb2JfYW5kX2N1bXNob3QuaHRtbA==~
991[*] http://teens-sins.net/streamrotator/out.php?l=0.2.1.30896.185592&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwMzczNDIlMkZqZXVuZV9jb2Nob25uZV9zdWNlX2VuX3ZvaXR1cmUuaHRtbA==~
992[*] http://teens-sins.net/streamrotator/out.php?l=0.2.13.39065.244856&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjY5ODYxNDclMkYzX3NleHlfdGVlbnNfZnVja193aXRoX2FfbHVja3lfZ3V5Lmh0bWw=~
993[*] http://teens-sins.net/streamrotator/out.php?l=0.2.14.31920.197245&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwNjY2MTUlMkZiaWdfY2xpdF8wNi5odG1s~
994[*] http://teens-sins.net/streamrotator/out.php?l=0.2.2.33551.198854&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcxMDkyMjUlMkYxOF95b190ZWVuX2FtYXRldXJfYmxvd2pvYl9jdW1fc2hvdF9pbl9tb3V0aC5odG1s~
995[*] http://teens-sins.net/streamrotator/out.php?l=0.2.3.31813.197031.t&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwNjE5NDUlMkZmaXJzdF90aW1lX3dlYmNhbV9tYXN0dXJiYXRlXy1fY2FtZm9ycG9ybl9jb21fLV8xNF9taW4uaHRtbA==~
996[*] http://teens-sins.net/streamrotator/out.php?l=0.2.4.39113.246098&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjY5OTE5NTIlMkZwZXRpdGVfdGVlbl9tYXN0dXJiYXRpbmdfYW5kX2RhbmNpbmcuaHRtbA==~
997[*] http://teens-sins.net/streamrotator/out.php?l=0.2.5.35653.212194&u=/ftt2/o.php?link=video&p=50&url=~aHR0cHMlM0ElMkYlMkZ4aGFtc3Rlci5jb20lMkZtb3ZpZXMlMkYxMDU4MzM2MyUyRnRhbl9sZWF0aGVyX3NraW5fZmlybV9uaXBwbGVzX2FuZF93ZXRfZnVja19ob2xlLmh0bWw=~
998[*] http://teens-sins.net/streamrotator/out.php?l=0.2.6.32613.197946&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwNzk0NDUlMkZ0ZWVuX2NyeV93aGVuX2lfZnVja2VfaGVyX2Fzcy5odG1s~
999[*] http://teens-sins.net/streamrotator/out.php?l=0.2.7.36342.222037&u=/ftt2/o.php?link=video&p=50&url=~aHR0cHMlM0ElMkYlMkZ4aGFtc3Rlci5jb20lMkZtb3ZpZXMlMkYxMDY4OTQ0MyUyRmZ1Y2tpbmdfZ2ZfMThfeWVhcnNfb2xkX2Jidy5odG1s~
1000[*] http://teens-sins.net/streamrotator/out.php?l=0.2.8.32170.197410.t&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjcwNjk2OTklMkZjbGFyaXNzX2VuX3BsZWluX2V4ZXJjaXNzZS5odG1s~
1001[*] http://teens-sins.net/streamrotator/out.php?l=0.2.9.39119.244822&u=/ftt2/o.php?link=video&p=50&url=~aHR0cCUzQSUyRiUyRnhoYW1zdGVyLmNvbSUyRm1vdmllcyUyRjY5OTE3ODUlMkZqdXN0X3dldHRpbmdfcHVibGljX2JhdGhyb29tX2Zsb29yLmh0bWw=~
1002[*] http://www.new-nude-girls.net/ftt2/o.php?l=next
1003[*] http://www.new-nude-girls.net/ftt2/o.php?l=photo
1004[*] http://www.teens-sins.net/ftt2/o.php?l=next
1005[*] http://www.teens-sins.net/ftt2/o.php?l=photo
1006cut: intervalle de champ incorrecte
1007Saisissez « cut --help » pour plus d'informations.
1008[INFO] Shodan detected the following opened ports on 37.1.207.121:
1009[*] 1
1010[*] 110
1011[*] 143
1012[*] 1500
1013[*] 25
1014[*] 4
1015[*] 465
1016[*] 53
1017[*] 587
1018[*] 80
1019[*] 993
1020[*] 995
1021[INFO] ------VirusTotal SECTION------
1022[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
1023[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
1024[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
1025[INFO] ------Alexa Rank SECTION------
1026[INFO] Percent of Visitors Rank in Country:
1027[INFO] Percent of Search Traffic:
1028[INFO] Percent of Unique Visits:
1029[INFO] Total Sites Linking In:
1030[*] Total Sites
1031[INFO] Useful links related to teens-sins.net - 37.1.207.121:
1032[*] https://www.virustotal.com/pt/ip-address/37.1.207.121/information/
1033[*] https://www.hybrid-analysis.com/search?host=37.1.207.121
1034[*] https://www.shodan.io/host/37.1.207.121
1035[*] https://www.senderbase.org/lookup/?search_string=37.1.207.121
1036[*] https://www.alienvault.com/open-threat-exchange/ip/37.1.207.121
1037[*] http://pastebin.com/search?q=37.1.207.121
1038[*] http://urlquery.net/search.php?q=37.1.207.121
1039[*] http://www.alexa.com/siteinfo/teens-sins.net
1040[*] http://www.google.com/safebrowsing/diagnostic?site=teens-sins.net
1041[*] https://censys.io/ipv4/37.1.207.121
1042[*] https://www.abuseipdb.com/check/37.1.207.121
1043[*] https://urlscan.io/search/#37.1.207.121
1044[*] https://github.com/search?q=37.1.207.121&type=Code
1045[INFO] Useful links related to AS50673 - 37.1.200.0/21:
1046[*] http://www.google.com/safebrowsing/diagnostic?site=AS:50673
1047[*] https://www.senderbase.org/lookup/?search_string=37.1.200.0/21
1048[*] http://bgp.he.net/AS50673
1049[*] https://stat.ripe.net/AS50673
1050[INFO] Date: 27/02/20 | Time: 22:16:53
1051[INFO] Total time: 1 minute(s) and 2 second(s)
1052######################################################################################################################################
1053Trying "teens-sins.net"
1054;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 65024
1055;; flags: qr rd ra; QUERY: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 2
1056
1057;; QUESTION SECTION:
1058;teens-sins.net. IN ANY
1059
1060;; ANSWER SECTION:
1061teens-sins.net. 3600 IN SOA server.domain.com. root.teens-sins.net. 2018060730 3600 3600 604800 86400
1062teens-sins.net. 3600 IN A 37.1.207.121
1063teens-sins.net. 3600 IN TXT "v=spf1 ip4:37.1.207.121 ip4:5.45.71.91 a mx ~all"
1064teens-sins.net. 3600 IN MX 20 mail.teens-sins.net.
1065teens-sins.net. 3600 IN MX 10 mail.teens-sins.net.
1066teens-sins.net. 3600 IN NS ns1.rus-sex-girls.net.
1067teens-sins.net. 3600 IN NS ns2.rus-sex-girls.net.
1068
1069;; ADDITIONAL SECTION:
1070ns2.rus-sex-girls.net. 6130 IN A 37.1.207.121
1071ns1.rus-sex-girls.net. 6130 IN A 37.1.207.121
1072
1073Received 286 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 128 ms
1074#####################################################################################################################################
1075; <<>> DiG 9.11.14-3-Debian <<>> +trace teens-sins.net any
1076;; global options: +cmd
1077. 16534 IN NS c.root-servers.net.
1078. 16534 IN NS a.root-servers.net.
1079. 16534 IN NS m.root-servers.net.
1080. 16534 IN NS i.root-servers.net.
1081. 16534 IN NS k.root-servers.net.
1082. 16534 IN NS e.root-servers.net.
1083. 16534 IN NS g.root-servers.net.
1084. 16534 IN NS d.root-servers.net.
1085. 16534 IN NS f.root-servers.net.
1086. 16534 IN NS l.root-servers.net.
1087. 16534 IN NS h.root-servers.net.
1088. 16534 IN NS b.root-servers.net.
1089. 16534 IN NS j.root-servers.net.
1090. 16534 IN RRSIG NS 8 0 518400 20200311170000 20200227160000 33853 . PYmZPjRE2BcDMGfIGZ7zFLJBIsmCjah1gfSPJsFJ+ceBLENLafC95B1M Wt+P5rP2/mCCiM428HJHUcNF9KJlE/CwpAC3kC+YsRjkEZUMP2o96jm7 9wjSEkcAz74RZKSt9QOHg9D0Hyy8WD8UispCLwVb6yOmNoYnnA1kxtKZ E+ChYU7m7N5TnQVrLOn4NUYE9Niw2NBaVU6vPWN2ashAs2xq3+UIzfpq fjNrmCbAlYc25nSfhlq4MISnZYFQn+iG+A08n/ejhJHI5X3SX3HE+ofC SEdYAnguMR11uYOeJttWCF2O76s3bph3+fJUmtwHKjo10aQ6Ih0fUib7 rabmLw==
1091;; Received 525 bytes from 10.101.0.243#53(10.101.0.243) in 215 ms
1092
1093net. 172800 IN NS l.gtld-servers.net.
1094net. 172800 IN NS b.gtld-servers.net.
1095net. 172800 IN NS c.gtld-servers.net.
1096net. 172800 IN NS d.gtld-servers.net.
1097net. 172800 IN NS e.gtld-servers.net.
1098net. 172800 IN NS f.gtld-servers.net.
1099net. 172800 IN NS g.gtld-servers.net.
1100net. 172800 IN NS a.gtld-servers.net.
1101net. 172800 IN NS h.gtld-servers.net.
1102net. 172800 IN NS i.gtld-servers.net.
1103net. 172800 IN NS j.gtld-servers.net.
1104net. 172800 IN NS k.gtld-servers.net.
1105net. 172800 IN NS m.gtld-servers.net.
1106net. 86400 IN DS 35886 8 2 7862B27F5F516EBE19680444D4CE5E762981931842C465F00236401D 8BD973EE
1107net. 86400 IN RRSIG DS 8 1 86400 20200311170000 20200227160000 33853 . lo3bHe4OaCC27E8mhlgv8Ze2Swgx890kPgpC7rhYAkCkt6lot0Fc9Jw6 sp8x3ZiBP0+Lh/jYlgj+jtxMiI2IAK8tf12XxEKI5NxFRA7YyGxDhvD0 M4vPoRHWfoEJIH/Rvkd3VXqIW42/Uu9bPJilFHGHfBoGjuzyfazkCh5x p6NPULF2w7uGiK7jo7UiGt1tSOS5OdLgx4p1QJahFLUiC9UU8AmrvHgc ehvufHuuNkb36F94yaUlsM1UpNs25KG7GSIQ8mCDcQuybnqNR5uLmBW3 JGSR037Jud1mvritROq408L8E3MNqYj58ZEM4GmX9jvM6IVzUAxDVJCR ETg3XQ==
1108;; Received 1171 bytes from 2001:500:2f::f#53(f.root-servers.net) in 27 ms
1109
1110teens-sins.net. 172800 IN NS ns1.rus-sex-girls.net.
1111teens-sins.net. 172800 IN NS ns2.rus-sex-girls.net.
1112A1RT98BS5QGC9NFI51S9HCI47ULJG6JH.net. 86400 IN NSEC3 1 1 0 - A1RUUFFJKCT2Q54P78F8EJGJ8JBK7I8B NS SOA RRSIG DNSKEY NSEC3PARAM
1113A1RT98BS5QGC9NFI51S9HCI47ULJG6JH.net. 86400 IN RRSIG NSEC3 8 2 86400 20200302073513 20200224062513 24512 net. ucLdn7B95JPIRIFd0Ns5CQi7dEYhL/vI23xc0MLVxYx1/M2bdnVqcAd9 bLlXG4ssEgSsIdYKaHvAXrQHR3FD9Mr9L08TKnQCQ4DLpLy0N18uIHvA DR3qw++EuUDbtSVF3+oVjwjptQ430b01EEiMLH1bxAt9DShwDXpDkabl CvOfekIf6HOwMhcIDXOd4CiWUzyHxdFSiOB8dyfweU+blw==
1114D4PNCCSP8R26HVAC6VSGIQGJHKG2QTTE.net. 86400 IN NSEC3 1 1 0 - D4Q2P1JGLSDP45TEMTPQMCFIKJ0R1QMP NS DS RRSIG
1115D4PNCCSP8R26HVAC6VSGIQGJHKG2QTTE.net. 86400 IN RRSIG NSEC3 8 2 86400 20200302073325 20200224062325 24512 net. ii8IO3/j7860+0+qhVQd6IHewYjCaQQkGDpFm00f0nLmKK7fUgmDri9j ZcsYN1BhI2+w3eQOOLtPcsv+89gxoHWwQbdH+gaZsNy10BmOO7tSyrzi XY5MvxsHwu12OTrnw58X9OEx8Ar8ntCgGXDHpJ7WoZ025nJhnU9SYyN1 PLRK2rCeTFuWpEfGAotV2E7blhEsMIPIV9uofwoF3PR16w==
1116;; Received 674 bytes from 192.54.112.30#53(h.gtld-servers.net) in 173 ms
1117
1118teens-sins.net. 3600 IN MX 10 mail.teens-sins.net.
1119teens-sins.net. 3600 IN MX 20 mail.teens-sins.net.
1120teens-sins.net. 3600 IN TXT "v=spf1 ip4:37.1.207.121 ip4:5.45.71.91 a mx ~all"
1121teens-sins.net. 3600 IN A 37.1.207.121
1122teens-sins.net. 3600 IN SOA server.domain.com. root.teens-sins.net. 2018060730 3600 3600 604800 86400
1123teens-sins.net. 3600 IN NS ns1.rus-sex-girls.net.
1124teens-sins.net. 3600 IN NS ns2.rus-sex-girls.net.
1125;; Received 313 bytes from 37.1.207.121#53(ns2.rus-sex-girls.net) in 171 ms
1126#####################################################################################################################################
1127[*] Performing General Enumeration of Domain: teens-sins.net
1128[-] DNSSEC is not configured for teens-sins.net
1129[*] SOA server.domain.com 66.96.162.92
1130[*] NS ns2.rus-sex-girls.net 37.1.207.121
1131[*] Bind Version for 37.1.207.121 9.9.4-RedHat-9.9.4-61.el7
1132[*] NS ns1.rus-sex-girls.net 37.1.207.121
1133[*] Bind Version for 37.1.207.121 9.9.4-RedHat-9.9.4-61.el7
1134[*] MX mail.teens-sins.net 37.1.207.121
1135[*] MX mail.teens-sins.net 37.1.207.121
1136[*] A teens-sins.net 37.1.207.121
1137[*] TXT teens-sins.net v=spf1 ip4:37.1.207.121 ip4:5.45.71.91 a mx ~all
1138[*] Enumerating SRV Records
1139[-] No SRV Records Found for teens-sins.net
1140[+] 0 Records Found
1141#####################################################################################################################################
1142traceroute to teens-sins.net (37.1.207.121), 30 hops max, 60 byte packets
1143 1 _gateway (10.203.3.1) 134.988 ms 134.974 ms 135.248 ms
1144 2 * * *
1145 3 te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49) 140.299 ms 140.287 ms 140.308 ms
1146 4 be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249) 140.226 ms 140.197 ms 140.187 ms
1147 5 be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194) 144.975 ms 144.969 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190) 145.260 ms
1148 6 be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105) 159.677 ms be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1) 156.439 ms 163.744 ms
1149 7 be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209) 172.974 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205) 176.233 ms 172.847 ms
1150 8 be3458.ccr21.ams04.atlas.cogentco.com (154.54.39.186) 172.870 ms be3457.ccr21.ams04.atlas.cogentco.com (130.117.1.10) 172.854 ms 176.110 ms
1151 9 149.11.39.188 (149.11.39.188) 176.034 ms 149.11.39.189 (149.11.39.189) 179.288 ms 149.11.39.186 (149.11.39.186) 175.859 ms
115210 185.8.179.40 (185.8.179.40) 175.894 ms 175.834 ms 169.691 ms
115311 185.8.177.33 (185.8.177.33) 177.099 ms 171.019 ms 171.417 ms
115412 teens-sins.net (37.1.207.121) 165.780 ms !X 168.976 ms !X 170.069 ms !X
1155######################################################################################################################################
1156----- teens-sins.net -----
1157
1158
1159Host's addresses:
1160__________________
1161
1162teens-sins.net. 3600 IN A 37.1.207.121
1163
1164
1165Name Servers:
1166______________
1167
1168ns2.rus-sex-girls.net. 3600 IN A 37.1.207.121
1169ns1.rus-sex-girls.net. 3600 IN A 37.1.207.121
1170
1171
1172Mail (MX) Servers:
1173___________________
1174
1175mail.teens-sins.net. 3600 IN A 37.1.207.121
1176mail.teens-sins.net. 3328 IN A 37.1.207.121
1177
1178
1179Trying Zone Transfers and getting Bind Versions:
1180_________________________________________________
1181
1182
1183Trying Zone Transfer for teens-sins.net on ns2.rus-sex-girls.net ...
1184teens-sins.net. 3600 IN SOA (
1185teens-sins.net. 3600 IN MX 10
1186teens-sins.net. 3600 IN MX 20
1187teens-sins.net. 3600 IN TXT (
1188teens-sins.net. 3600 IN A 37.1.207.121
1189teens-sins.net. 3600 IN NS ns1.rus-sex-girls.net.
1190teens-sins.net. 3600 IN NS ns2.rus-sex-girls.net.
1191_dmarc.teens-sins.net. 3600 IN TXT "v=DMARC1;
1192ftp.teens-sins.net. 3600 IN A 5.45.71.91
1193mail.teens-sins.net. 3600 IN A 37.1.207.121
1194ns1.teens-sins.net. 3600 IN A 37.1.207.121
1195ns2.teens-sins.net. 3600 IN A 37.1.207.121
1196pop.teens-sins.net. 3600 IN A 37.1.207.121
1197smtp.teens-sins.net. 3600 IN A 37.1.207.121
1198www.teens-sins.net. 3600 IN A 37.1.207.121
1199
1200Trying Zone Transfer for teens-sins.net on ns1.rus-sex-girls.net ...
1201teens-sins.net. 3600 IN SOA (
1202teens-sins.net. 3600 IN MX 10
1203teens-sins.net. 3600 IN MX 20
1204teens-sins.net. 3600 IN TXT (
1205teens-sins.net. 3600 IN A 37.1.207.121
1206teens-sins.net. 3600 IN NS ns1.rus-sex-girls.net.
1207teens-sins.net. 3600 IN NS ns2.rus-sex-girls.net.
1208_dmarc.teens-sins.net. 3600 IN TXT "v=DMARC1;
1209ftp.teens-sins.net. 3600 IN A 5.45.71.91
1210mail.teens-sins.net. 3600 IN A 37.1.207.121
1211ns1.teens-sins.net. 3600 IN A 37.1.207.121
1212ns2.teens-sins.net. 3600 IN A 37.1.207.121
1213pop.teens-sins.net. 3600 IN A 37.1.207.121
1214smtp.teens-sins.net. 3600 IN A 37.1.207.121
1215www.teens-sins.net. 3600 IN A 37.1.207.121
1216
1217
1218Scraping teens-sins.net subdomains from Google:
1219________________________________________________
1220
1221
1222 ---- Google search page: 1 ----
1223
1224 mail
1225
1226
1227Google Results:
1228________________
1229
1230
1231
1232Brute forcing with /usr/share/dnsenum/dns.txt:
1233_______________________________________________
1234
1235
1236
1237Launching Whois Queries:
1238_________________________
1239
1240 whois ip result: 37.1.207.0 -> 37.1.200.0/21
1241 whois ip result: 5.45.71.0 -> 5.45.64.0/21
1242
1243
1244teens-sins.net______________
1245
1246 5.45.64.0/21
1247 37.1.200.0/21
1248#####################################################################################################################################
1249WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
1250Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-28 00:45 EST
1251Nmap scan report for teens-sins.net (37.1.207.121)
1252Host is up (0.17s latency).
1253Not shown: 483 filtered ports, 3 closed ports
1254Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
1255PORT STATE SERVICE
125625/tcp open smtp
125753/tcp open domain
125880/tcp open http
1259110/tcp open pop3
1260143/tcp open imap
1261465/tcp open smtps
1262587/tcp open submission
1263993/tcp open imaps
1264995/tcp open pop3s
12658085/tcp open unknown
1266
1267Nmap done: 1 IP address (1 host up) scanned in 5.96 seconds
1268#####################################################################################################################################
1269Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-28 00:45 EST
1270Nmap scan report for teens-sins.net (37.1.207.121)
1271Host is up (0.17s latency).
1272Not shown: 14 filtered ports
1273PORT STATE SERVICE
127453/udp open|filtered domain
1275
1276Nmap done: 1 IP address (1 host up) scanned in 13.86 seconds
1277#####################################################################################################################################
1278Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-28 00:46 EST
1279NSE: Loaded 55 scripts for scanning.
1280NSE: Script Pre-scanning.
1281Initiating NSE at 00:46
1282Completed NSE at 00:46, 0.00s elapsed
1283Initiating NSE at 00:46
1284Completed NSE at 00:46, 0.00s elapsed
1285Initiating Parallel DNS resolution of 1 host. at 00:46
1286Completed Parallel DNS resolution of 1 host. at 00:46, 0.02s elapsed
1287Initiating SYN Stealth Scan at 00:46
1288Scanning teens-sins.net (37.1.207.121) [1 port]
1289Discovered open port 25/tcp on 37.1.207.121
1290Completed SYN Stealth Scan at 00:46, 0.20s elapsed (1 total ports)
1291Initiating Service scan at 00:46
1292Scanning 1 service on teens-sins.net (37.1.207.121)
1293Completed Service scan at 00:46, 0.35s elapsed (1 service on 1 host)
1294Initiating OS detection (try #1) against teens-sins.net (37.1.207.121)
1295Retrying OS detection (try #2) against teens-sins.net (37.1.207.121)
1296Initiating Traceroute at 00:46
1297Completed Traceroute at 00:46, 3.01s elapsed
1298Initiating Parallel DNS resolution of 10 hosts. at 00:46
1299Completed Parallel DNS resolution of 10 hosts. at 00:46, 5.52s elapsed
1300NSE: Script scanning 37.1.207.121.
1301Initiating NSE at 00:46
1302NSE Timing: About 71.62% done; ETC: 00:48 (0:00:30 remaining)
1303Completed NSE at 00:47, 90.45s elapsed
1304Initiating NSE at 00:47
1305Completed NSE at 00:47, 0.05s elapsed
1306Nmap scan report for teens-sins.net (37.1.207.121)
1307Host is up (0.17s latency).
1308
1309PORT STATE SERVICE VERSION
131025/tcp open smtp Exim smtpd 4.92
1311| smtp-commands: default.domain Hello teens-sins.net [45.132.192.89], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, CHUNKING, STARTTLS, HELP,
1312|_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1313| smtp-enum-users:
1314|_ Couldn't find any accounts
1315|_smtp-open-relay: SMTP RSET: failed to receive data: connection closed
1316| smtp-vuln-cve2010-4344:
1317| Exim version: 4.92
1318| Exim heap overflow vulnerability (CVE-2010-4344):
1319| Exim (CVE-2010-4344): NOT VULNERABLE
1320| Exim privileges escalation vulnerability (CVE-2010-4345):
1321| Exim (CVE-2010-4345): NOT VULNERABLE
1322|_ To confirm and exploit the vulnerabilities, run with --script-args='smtp-vuln-cve2010-4344.exploit'
1323| vulners:
1324| cpe:/a:exim:exim:4.92:
1325| CVE-2019-13917 10.0 https://vulners.com/cve/CVE-2019-13917
1326|_ CVE-2019-16928 7.5 https://vulners.com/cve/CVE-2019-16928
1327Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
1328Aggressive OS guesses: Linux 3.10 - 4.11 (92%), Linux 3.2 - 4.9 (92%), Linux 3.18 (90%), Crestron XPanel control system (90%), Linux 3.16 (89%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), Linux 3.2 (87%), HP P2000 G3 NAS device (87%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (87%)
1329No exact OS matches for host (test conditions non-ideal).
1330Uptime guess: 34.957 days (since Fri Jan 24 01:49:45 2020)
1331Network Distance: 12 hops
1332TCP Sequence Prediction: Difficulty=263 (Good luck!)
1333IP ID Sequence Generation: All zeros
1334Service Info: Host: default.domain
1335
1336TRACEROUTE (using port 25/tcp)
1337HOP RTT ADDRESS
13381 138.53 ms 10.203.39.1
13392 ...
13403 139.25 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
13414 138.68 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
13425 144.23 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
13436 158.66 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
13447 167.85 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
13458 167.49 ms be3457.ccr21.ams04.atlas.cogentco.com (130.117.1.10)
13469 170.77 ms 149.11.39.189
134710 ...
134811 179.61 ms 185.8.177.35
134912 170.02 ms teens-sins.net (37.1.207.121)
1350
1351NSE: Script Post-scanning.
1352Initiating NSE at 00:47
1353Completed NSE at 00:47, 0.00s elapsed
1354Initiating NSE at 00:47
1355Completed NSE at 00:47, 0.00s elapsed
1356######################################################################################################################################
1357Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-28 00:49 EST
1358NSE: Loaded 64 scripts for scanning.
1359NSE: Script Pre-scanning.
1360Initiating NSE at 00:49
1361Completed NSE at 00:49, 0.00s elapsed
1362Initiating NSE at 00:49
1363Completed NSE at 00:49, 0.00s elapsed
1364Initiating Parallel DNS resolution of 1 host. at 00:49
1365Completed Parallel DNS resolution of 1 host. at 00:49, 0.02s elapsed
1366Initiating SYN Stealth Scan at 00:49
1367Scanning teens-sins.net (37.1.207.121) [1 port]
1368Discovered open port 53/tcp on 37.1.207.121
1369Completed SYN Stealth Scan at 00:49, 0.21s elapsed (1 total ports)
1370Initiating Service scan at 00:49
1371Scanning 1 service on teens-sins.net (37.1.207.121)
1372Completed Service scan at 00:49, 6.34s elapsed (1 service on 1 host)
1373Initiating OS detection (try #1) against teens-sins.net (37.1.207.121)
1374Retrying OS detection (try #2) against teens-sins.net (37.1.207.121)
1375Initiating Traceroute at 00:49
1376Completed Traceroute at 00:49, 3.01s elapsed
1377Initiating Parallel DNS resolution of 9 hosts. at 00:49
1378Completed Parallel DNS resolution of 9 hosts. at 00:49, 0.17s elapsed
1379NSE: Script scanning 37.1.207.121.
1380Initiating NSE at 00:49
1381Completed NSE at 00:49, 9.76s elapsed
1382Initiating NSE at 00:49
1383Completed NSE at 00:49, 0.00s elapsed
1384Nmap scan report for teens-sins.net (37.1.207.121)
1385Host is up (0.17s latency).
1386
1387PORT STATE SERVICE VERSION
138853/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
1389|_dns-fuzz: Server didn't response to our probe, can't fuzz
1390| dns-nsec-enum:
1391|_ No NSEC records found
1392| dns-nsec3-enum:
1393|_ DNSSEC NSEC3 not supported
1394| dns-nsid:
1395|_ bind.version: 9.9.4-RedHat-9.9.4-61.el7
1396| dns-zone-transfer:
1397| teens-sins.net. SOA server.domain.com. root.teens-sins.net.
1398| teens-sins.net. MX 10 mail.teens-sins.net.
1399| teens-sins.net. MX 20 mail.teens-sins.net.
1400| teens-sins.net. TXT "v=spf1 ip4:37.1.207.121 ip4:5.45.71.91 a mx ~all"
1401| teens-sins.net. A 37.1.207.121
1402| teens-sins.net. NS ns1.rus-sex-girls.net.
1403| teens-sins.net. NS ns2.rus-sex-girls.net.
1404| _dmarc.teens-sins.net. TXT "v=DMARC1; p=none"
1405| ftp.teens-sins.net. A 5.45.71.91
1406| mail.teens-sins.net. A 37.1.207.121
1407| ns1.teens-sins.net. A 37.1.207.121
1408| ns2.teens-sins.net. A 37.1.207.121
1409| pop.teens-sins.net. A 37.1.207.121
1410| smtp.teens-sins.net. A 37.1.207.121
1411| www.teens-sins.net. A 37.1.207.121
1412|_teens-sins.net. SOA server.domain.com. root.teens-sins.net.
1413| vulners:
1414| cpe:/a:isc:bind:9.9.4:
1415| CVE-2015-4620 7.8 https://vulners.com/cve/CVE-2015-4620
1416| CVE-2014-8500 7.8 https://vulners.com/cve/CVE-2014-8500
1417| CVE-2017-3141 7.2 https://vulners.com/cve/CVE-2017-3141
1418| CVE-2015-8461 7.1 https://vulners.com/cve/CVE-2015-8461
1419| CVE-2015-1349 5.4 https://vulners.com/cve/CVE-2015-1349
1420| CVE-2018-5740 5.0 https://vulners.com/cve/CVE-2018-5740
1421| CVE-2017-3145 5.0 https://vulners.com/cve/CVE-2017-3145
1422| CVE-2016-9131 5.0 https://vulners.com/cve/CVE-2016-9131
1423| CVE-2016-8864 5.0 https://vulners.com/cve/CVE-2016-8864
1424| CVE-2016-1286 5.0 https://vulners.com/cve/CVE-2016-1286
1425| CVE-2015-8000 5.0 https://vulners.com/cve/CVE-2015-8000
1426| CVE-2019-6465 4.3 https://vulners.com/cve/CVE-2019-6465
1427| CVE-2018-5743 4.3 https://vulners.com/cve/CVE-2018-5743
1428| CVE-2018-5742 4.3 https://vulners.com/cve/CVE-2018-5742
1429| CVE-2017-3143 4.3 https://vulners.com/cve/CVE-2017-3143
1430| CVE-2017-3142 4.3 https://vulners.com/cve/CVE-2017-3142
1431| CVE-2017-3136 4.3 https://vulners.com/cve/CVE-2017-3136
1432| CVE-2016-2775 4.3 https://vulners.com/cve/CVE-2016-2775
1433| CVE-2016-1285 4.3 https://vulners.com/cve/CVE-2016-1285
1434| CVE-2018-5741 4.0 https://vulners.com/cve/CVE-2018-5741
1435| CVE-2016-6170 4.0 https://vulners.com/cve/CVE-2016-6170
1436|_ CVE-2018-5745 3.5 https://vulners.com/cve/CVE-2018-5745
1437Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
1438Aggressive OS guesses: Linux 3.10 - 4.11 (92%), Linux 3.18 (92%), Linux 3.2 - 4.9 (92%), Crestron XPanel control system (90%), Linux 3.16 (89%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), Linux 3.2 (87%), HP P2000 G3 NAS device (87%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (87%)
1439No exact OS matches for host (test conditions non-ideal).
1440Uptime guess: 34.958 days (since Fri Jan 24 01:49:44 2020)
1441Network Distance: 12 hops
1442TCP Sequence Prediction: Difficulty=261 (Good luck!)
1443IP ID Sequence Generation: All zeros
1444Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
1445
1446Host script results:
1447| dns-blacklist:
1448| SPAM
1449| l2.apews.org - SPAM
1450| dnsbl.inps.de - SPAM
1451| Spam Received See: http://www.sorbs.net/lookup.shtml?37.1.207.121
1452|_ spam.dnsbl.sorbs.net - SPAM
1453| dns-brute:
1454| DNS Brute-force hostnames:
1455| ns1.teens-sins.net - 37.1.207.121
1456| ns2.teens-sins.net - 37.1.207.121
1457| mail.teens-sins.net - 37.1.207.121
1458| www.teens-sins.net - 37.1.207.121
1459| ftp.teens-sins.net - 5.45.71.91
1460|_ smtp.teens-sins.net - 37.1.207.121
1461
1462TRACEROUTE (using port 53/tcp)
1463HOP RTT ADDRESS
14641 138.37 ms 10.203.39.1
14652 ...
14663 139.60 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
14674 139.63 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
14685 140.65 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190)
14696 155.66 ms be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1)
14707 171.46 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
14718 171.50 ms be3458.ccr21.ams04.atlas.cogentco.com (154.54.39.186)
14729 ... 10
147311 175.83 ms 185.8.177.33
147412 166.88 ms teens-sins.net (37.1.207.121)
1475
1476NSE: Script Post-scanning.
1477Initiating NSE at 00:49
1478Completed NSE at 00:49, 0.00s elapsed
1479Initiating NSE at 00:49
1480Completed NSE at 00:49, 0.00s elapsed
1481#####################################################################################################################################
1482HTTP/1.1 200 OK
1483Server: nginx/1.14.1
1484Date: Fri, 28 Feb 2020 05:49:28 GMT
1485Content-Type: text/html; charset=UTF-8
1486Connection: keep-alive
1487X-Powered-By: PHP/7.2.5
1488#####################################################################################################################################
1489cb280c31499d968ab54d3d7=Q1BoQzIyOWdjWDUwU0xSVEpuTnk5bFp0MWJzbWdkMVlORk9tT1RSalpqazRPR0V4TkRZeVpHUmpNMlEzWkRGall6WXpNR1ZtWWpNNU4yUT0b;path=/
1490e4b479ebd5b5220456eac4d306fda14497ff780c48458b186=SmVpTHowMkZ1TVRVNE1qZzJPRGsyT1Mwd0xUQT0b;expires=Sat, 29 Feb 2020 08:49:29 +0300;path=/
1491http://www.new-nude-girls.net/ftt2/o.php?l=next
1492http://www.new-nude-girls.net/ftt2/o.php?l=photo
1493//lessblog.pro/v2/a/vsl/js/66220
1494streamrotator/out.php?l=0.1.0.28.485&u=/ftt2/o.php?link=0.1.0.28.485&url=~aHR0cDovL2dhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tLzEwNDA3LzYxNDcyOS8yNzMvaW5kZXgucGhw~
1495streamrotator/out.php?l=0.1.100.88.1124&u=/ftt2/o.php?link=0.1.100.88.1124&url=~aHR0cDovL3Byb21vLmF2ZXJvdGljYS5jb20vZ2Fscy8yMDE1MDkwNC0yODY5LXZpa2tpLz93bT0yMzkxNjcx~
1496streamrotator/out.php?l=0.1.101.4500.7511&u=/ftt2/o.php?link=0.1.101.4500.7511&url=~aHR0cDovL2dhbGxlcmllcy5udWRlYmVhY2hkcmVhbXMuY29tL3BpY3MvY29ja19zdWNraW5nL3N3aW5nZXJzLnBocD9uYXRzPU1UZ3dPUzR4TGpVdU55NHdMakl4TVM0d0xqQXVNQQ==~
1497streamrotator/out.php?l=0.1.102.72.804&u=/ftt2/o.php?link=0.1.102.72.804&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMzEwMC84MzE4NTYvMjczL2luZGV4LnBocA==~
1498streamrotator/out.php?l=0.1.103.620.388&u=/ftt2/o.php?link=0.1.103.620.388&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vanVpY3lzbGltbmFrZWRtb2RlbC82MjkvaW5kZXguaHRtbA==~
1499streamrotator/out.php?l=0.1.10.41.84.t&u=/ftt2/o.php?link=0.1.10.41.84.t&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMjkyNi84MTMyOTAvMjczL2luZGV4LnBocA==~
1500streamrotator/out.php?l=0.1.104.4494.10275&u=/ftt2/o.php?link=0.1.104.4494.10275&url=~aHR0cDovL2dhbGxlcmllcy5udWRlYmVhY2hkcmVhbXMuY29tL3BpY3MvaGFyZGNvcmVfc2V4L3N3aW5nZXJzLnBocD9uYXRzPU1UZ3dPUzR4TGpVdU55NHdMakl4Tnk0d0xqQXVNQQ==~
1501streamrotator/out.php?l=0.1.105.4570.11883&u=/ftt2/o.php?link=0.1.105.4570.11883&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vaG9ybnlicnVuZXR0ZXRlZW5tb3VzZS82MjkvaW5kZXguaHRtbA==~
1502streamrotator/out.php?l=0.1.106.4661.14714&u=/ftt2/o.php?link=0.1.106.4661.14714&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGVtcHRpbmd0ZWVubGluZ2VyaWUvNjI5L2luZGV4Lmh0bWw=~
1503streamrotator/out.php?l=0.1.107.4637.14221&u=/ftt2/o.php?link=0.1.107.4637.14221&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGVlbmN1dGllLXVuZHJlc3NpbmcvNjI5L2luZGV4Lmh0bWw=~
1504streamrotator/out.php?l=0.1.108.4626.13602&u=/ftt2/o.php?link=0.1.108.4626.13602&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vY3VybHl0ZWVubW9kZWwvNjI5L2luZGV4Lmh0bWw=~
1505streamrotator/out.php?l=0.1.109.3919.5599&u=/ftt2/o.php?link=0.1.109.3919.5599&url=~aHR0cDovL2Vuam95dmlkcy5jb20vZ2FsbGVyaWVzL25iZC9waWMvMDU3MGcvaW5kZXgucGhwP25hdHM9TVRnd09TNHhMalV1Tnk0d0xqUTVNamt1TUM0d0xqQQ==~
1506streamrotator/out.php?l=0.1.110.4550.6217&u=/ftt2/o.php?link=0.1.110.4550.6217&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vY3VybHl0ZWVudW5kcmVzc2luZy82MjkvaW5kZXguaHRtbA==~
1507streamrotator/out.php?l=0.1.111.3901.5343&u=/ftt2/o.php?link=0.1.111.3901.5343&url=~aHR0cHM6Ly9naWdhcHJvbi5jb20vMTQzNTAvODg2NzE1LzI3My9pbmRleC5waHA=~
1508streamrotator/out.php?l=0.1.112.4560.6103&u=/ftt2/o.php?link=0.1.112.4560.6103&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vbmFrZWR0ZWVuY2FuZHkvNjI5L2luZGV4Lmh0bWw=~
1509streamrotator/out.php?l=0.1.1.13.1185&u=/ftt2/o.php?link=0.1.1.13.1185&url=~aHR0cDovL3d3dy5teWJ1bm55Z2lybHMuY29tL2dhbGxlcmllcy9lbWlseS0xOC0xNzdyZWR0aW55cGFudGllcy9pbmRleDAzOC5odG1s~
1510streamrotator/out.php?l=0.1.113.4638.14253&u=/ftt2/o.php?link=0.1.113.4638.14253&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGVlbmJsb25kZWd5bXB1c3N5LzYyOS9pbmRleC5odG1s~
1511streamrotator/out.php?l=0.1.11.45.1170&u=/ftt2/o.php?link=0.1.11.45.1170&url=~aHR0cDovL25lMnctYXJ0LW51ZGUubmV0~
1512streamrotator/out.php?l=0.1.114.981.503&u=/ftt2/o.php?link=0.1.114.981.503&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vZmFpcnliZWF1dHl1bmRyZXNzaW5nLzYyOS9pbmRleC5odG1s~
1513streamrotator/out.php?l=0.1.115.4488.10540&u=/ftt2/o.php?link=0.1.115.4488.10540&url=~aHR0cDovL2Vuam95dmlkcy5jb20vZ2FsbGVyaWVzL25iZC9waWMvMDAxdy9pbmRleC5waHA/bmF0cz1NVGd3T1M0eExqVXVOeTR3TGpNeU1TNHdMakF1TUE=~
1514streamrotator/out.php?l=0.1.116.4617.13424&u=/ftt2/o.php?link=0.1.116.4617.13424&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vbnVkZWJsb25kZXRoaW50ZWVuLzYyOS9pbmRleC5odG1s~
1515streamrotator/out.php?l=0.1.117.4624.13569&u=/ftt2/o.php?link=0.1.117.4624.13569&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vanVpY3ludWRldGVlbmJlYXV0eS82MjkvaW5kZXguaHRtbA==~
1516streamrotator/out.php?l=0.1.118.4630.13686&u=/ftt2/o.php?link=0.1.118.4630.13686&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vaG9ybnludWRldGVlbnJvc2VzLzYyOS9pbmRleC5odG1s~
1517streamrotator/out.php?l=0.1.119.4543.10116&u=/ftt2/o.php?link=0.1.119.4543.10116&url=~aHR0cDovL2dhbGxlcmllcy5udWRlYmVhY2hkcmVhbXMuY29tL3BpY3Mvc3dpbmdlcnNfbmFrZWRfZnVuL3N3aW5nZXJzLnBocD9uYXRzPU1UZ3dPUzR4TGpVdU55NHdMakUyT0M0d0xqQXVNQQ==~
1518streamrotator/out.php?l=0.1.12.3906.5445&u=/ftt2/o.php?link=0.1.12.3906.5445&url=~aHR0cHM6Ly9naWdhcHJvbi5jb20vMTQzNTAvODg2NzIwLzI3My9pbmRleC5waHA=~
1519streamrotator/out.php?l=0.1.13.54.146&u=/ftt2/o.php?link=0.1.13.54.146&url=~aHR0cDovL2dhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbS8xMTM0NC83MjU0NTEvMjczL2luZGV4LnBocA==~
1520streamrotator/out.php?l=0.1.14.77.626&u=/ftt2/o.php?link=0.1.14.77.626&url=~aHR0cDovL2J1bGtqZXJrLmNvbS8zOTI2Lzg0NDE4NS8yNzMvaW5kZXgucGhw~
1521streamrotator/out.php?l=0.1.15.886.124&u=/ftt2/o.php?link=0.1.15.886.124&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGVlbmFpcmJhbGxvb25zLzYyOS9pbmRleC5odG1s~
1522streamrotator/out.php?l=0.1.16.20.9&u=/ftt2/o.php?link=0.1.16.20.9&url=~aHR0cDovL2dhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tLzk4NTAvNTQyNDgyLzQzMy9pbmRleC5waHA=~
1523streamrotator/out.php?l=0.1.17.25.1463&u=/ftt2/o.php?link=0.1.17.25.1463&url=~aHR0cDovL2Nvenl4eHguY29tLzk1OTgvNzg5Mzk0LzI3My9pbmRleC5waHA=~
1524streamrotator/out.php?l=0.1.18.39.241&u=/ftt2/o.php?link=0.1.18.39.241&url=~aHR0cDovL2dhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tLzk5OTYvNjMwNzk4LzI3My9pbmRleC5waHA=~
1525streamrotator/out.php?l=0.1.19.44.1019&u=/ftt2/o.php?link=0.1.19.44.1019&url=~aHR0cDovL3N3ZWV0Z2lybGllLmNvbS9nYWxscy8wNTIvaW5kZXgucGhw~
1526streamrotator/out.php?l=0.1.20.22.105&u=/ftt2/o.php?link=0.1.20.22.105&url=~aHR0cDovL2dhbGxlcmllczIuYWR1bHQtZW1waXJlLmNvbS85MTkxLzQ4OTU0Mi82MTYwL2luZGV4LnBocA==~
1527streamrotator/out.php?l=0.1.21.9.1390&u=/ftt2/o.php?link=0.1.21.9.1390&url=~aHR0cDovL3d3dy5jaGlja2lwaWtpLmNvbS9pbWFnZXMvMDMwNTQuanBn~
1528streamrotator/out.php?l=0.1.22.1108.1355&u=/ftt2/o.php?link=0.1.22.1108.1355&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vbmFrZWR0aGluY3V0aWUvNjI5L2luZGV4Lmh0bWw=~
1529streamrotator/out.php?l=0.1.23.80.1446&u=/ftt2/o.php?link=0.1.23.80.1446&url=~aHR0cDovL2J1bGtqZXJrLmNvbS8zOTI2Lzc4ODg0MC8yNzMvaW5kZXgucGhw~
1530streamrotator/out.php?l=0.1.24.11.1482&u=/ftt2/o.php?link=0.1.24.11.1482&url=~aHR0cDovL2dhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbS8xMTMyNS83MjY4MzEvMjczL2luZGV4LnBocA==~
1531streamrotator/out.php?l=0.1.25.55.26&u=/ftt2/o.php?link=0.1.25.55.26&url=~aHR0cDovL3d3dy50ZWVuc3NlbGZzaG90LmNvbS9maGdzLzAyMjEvaW5kZXgucGhwP2NjYmlsbD0xNDA4MjMw~
1532streamrotator/out.php?l=0.1.26.53.795&u=/ftt2/o.php?link=0.1.26.53.795&url=~aHR0cDovL3Byb21vLnNrb2tvZmYuY29tL2dhbHMvMjAxMjA2MDItc2tva29mZi1nbG92ZXMtYW5kLXBhbnR5aG9zZS00NTUvP3dtPTE3MDYzMDE=~
1533streamrotator/out.php?l=0.1.27.47.372&u=/ftt2/o.php?link=0.1.27.47.372&url=~aHR0cDovL2J1bGtqZXJrLmNvbS8zOTI2LzgxNTA3OC8yNzMvaW5kZXgucGhw~
1534streamrotator/out.php?l=0.1.2.81.1108&u=/ftt2/o.php?link=0.1.2.81.1108&url=~aHR0cDovL2dhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tLzM5MjYvNTUxODQyLzI3My9pbmRleC5waHA=~
1535streamrotator/out.php?l=0.1.28.18.723&u=/ftt2/o.php?link=0.1.28.18.723&url=~aHR0cDovL2dhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tLzEwNDYzLzc0NzIyMC8yNzMvaW5kZXgucGhw~
1536streamrotator/out.php?l=0.1.29.27.1089&u=/ftt2/o.php?link=0.1.29.27.1089&url=~aHR0cDovL2dhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tLzk5OTYvNjMwNzI5LzI3My9pbmRleC5waHA=~
1537streamrotator/out.php?l=0.1.30.29.800&u=/ftt2/o.php?link=0.1.30.29.800&url=~aHR0cDovL3Byb21vLnNrb2tvZmYuY29tL2dhbHMvMjAxMjEwMjgtc2tva29mZi1maXJzdC10aW1lLTE3OS8/d209MjE3MjUxNQ==~
1538streamrotator/out.php?l=0.1.31.10.469&u=/ftt2/o.php?link=0.1.31.10.469&url=~aHR0cDovL2dmczRmcmVlLmNvbS9mcmVlLXBvcm4vd2F0Y2hteWdmL3BpY3MvMTE0MS9waW5rd29ybGQuaHRtbA==~
1539streamrotator/out.php?l=0.1.32.50.1504&u=/ftt2/o.php?link=0.1.32.50.1504&url=~aHR0cDovL3NleHh4eXRlZW50dWJlLm5ldC8=~
1540streamrotator/out.php?l=0.1.33.412.403&u=/ftt2/o.php?link=0.1.33.412.403&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vYnVzdHlzbm93cXVlZW4vNjI5L2luZGV4Lmh0bWw=~
1541streamrotator/out.php?l=0.1.3.38.130&u=/ftt2/o.php?link=0.1.3.38.130&url=~aHR0cDovL2dhbGxlcmllcy5saXR0bGVsdXBlLmNvbS8wMDYyMjY5NC0wMS0xMi9waWNzLzI0L2luZGV4LnBocA==~
1542streamrotator/out.php?l=0.1.34.3.599&u=/ftt2/o.php?link=0.1.34.3.599&url=~aHR0cDovL2hvc3RlZC5tZXQtYXJ0LmNvbS9GdWxsX21ldC1hcnRfS0VSXzRfODUwLz9wYT0xNjcwNTY2~
1543streamrotator/out.php?l=0.1.35.6.856&u=/ftt2/o.php?link=0.1.35.6.856&url=~aHR0cDovL2dhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tLzUzNTgvMjQwMDAvMzY1MS9pbmRleC5waHA=~
1544streamrotator/out.php?l=0.1.36.4662.14723&u=/ftt2/o.php?link=0.1.36.4662.14723&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGVlbnB1c3N5aGF0LzYyOS9pbmRleC5odG1s~
1545streamrotator/out.php?l=0.1.37.52.188&u=/ftt2/o.php?link=0.1.37.52.188&url=~aHR0cDovL3d3dy5yZWFsZ2ZzZXhwb3NlZC5jb20vZmhnLzEvZ2ZzMTkvP25hdHM9TkRRdU5pNHhMakV1TUM0eE1EQXVNQzR3TGpB~
1546streamrotator/out.php?l=0.1.38.4623.13555&u=/ftt2/o.php?link=0.1.38.4623.13555&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGVlbnB1c3N5cG9ueXRhaWxzLzYyOS9pbmRleC5odG1s~
1547streamrotator/out.php?l=0.1.39.78.576&u=/ftt2/o.php?link=0.1.39.78.576&url=~aHR0cDovL2J1bGtqZXJrLmNvbS8zOTI2LzgyODE3Mi8yNzMvaW5kZXgucGhw~
1548streamrotator/out.php?l=0.1.40.61.564&u=/ftt2/o.php?link=0.1.40.61.564&url=~aHR0cDovL2dhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbS8xMTIxMy83MTQ1NzIvNDMzL2luZGV4LnBocA==~
1549streamrotator/out.php?l=0.1.41.83.773.t&u=/ftt2/o.php?link=0.1.41.83.773.t&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vanVpY3ludWRldGVlbm1vZGVsLzYyOS9pbmRleC5odG1s~
1550streamrotator/out.php?l=0.1.42.86.987&u=/ftt2/o.php?link=0.1.42.86.987&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xNDE5Mi84NTg2MjgvMjczL2luZGV4LnBocA==~
1551streamrotator/out.php?l=0.1.43.7.937&u=/ftt2/o.php?link=0.1.43.7.937&url=~aHR0cDovL3RlZW53YW50bWUuY29tL2dhbGxzLzAwNC9pbmRleC5odG0=~
1552streamrotator/out.php?l=0.1.4.42.1301&u=/ftt2/o.php?link=0.1.4.42.1301&url=~aHR0cDovL3d3dy5udWRpc3QtcGhvdG9zLm5ldC90ZWVuLW51ZGlzdC1naXJscy5odG1s~
1553streamrotator/out.php?l=0.1.44.79.966&u=/ftt2/o.php?link=0.1.44.79.966&url=~aHR0cDovL2J1bGtqZXJrLmNvbS8zOTI2LzgyODE3MC8yNzMvaW5kZXgucGhw~
1554streamrotator/out.php?l=0.1.45.12.1140.t&u=/ftt2/o.php?link=0.1.45.12.1140.t&url=~aHR0cDovL3d3dy5icmFuZGlnaXJscy5jb20vdGF3bmVlLXN0b25lLzA0OC1waWNzLWxvdmVseS15b3VuZy1sYWR5LXBvc2luZw==~
1555streamrotator/out.php?l=0.1.46.16.651&u=/ftt2/o.php?link=0.1.46.16.651&url=~aHR0cDovL3NlY3VyZS5teXRlZW5pZWNoZWVybGVhZGVyLmNvbS9nYWxsZXJ5L01qSXVNUzQyTGpZdU1DNHlNRGN1TUM0d0xqQQ==~
1556streamrotator/out.php?l=0.1.47.73.675&u=/ftt2/o.php?link=0.1.47.73.675&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMzEwMC84MzE4NzQvMjczL2luZGV4LnBocA==~
1557streamrotator/out.php?l=0.1.48.4629.13673&u=/ftt2/o.php?link=0.1.48.4629.13673&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vc2V4eXRlZW5oZWFkcGhvbmVzLzYyOS9pbmRleC5odG1s~
1558streamrotator/out.php?l=0.1.49.15.601&u=/ftt2/o.php?link=0.1.49.15.601&url=~aHR0cDovL3d3dy5ob3N0ZWQubXBsc3R1ZGlvcy5jb20vZ2FsbGVyaWVzLzEyL3RhcmFfdGFyYXNfaW50dWl0aW9uL2luZGV4Lmh0bT9hZmZpZD0xNTYxODc3~
1559streamrotator/out.php?l=0.1.50.62.1169&u=/ftt2/o.php?link=0.1.50.62.1169&url=~aHR0cDovL2dhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tLzUyMDkvNzE0NDYvNDMzLzIvaW5kZXgucGhw~
1560streamrotator/out.php?l=0.1.51.63.760&u=/ftt2/o.php?link=0.1.51.63.760&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMjYxMi83ODkxNjYvMjczL2luZGV4LnBocA==~
1561streamrotator/out.php?l=0.1.52.23.802&u=/ftt2/o.php?link=0.1.52.23.802&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMjQwOC83ODE4MzEvMjczL2luZGV4LnBocA==~
1562streamrotator/out.php?l=0.1.53.2.1604&u=/ftt2/o.php?link=0.1.53.2.1604&url=~aHR0cDovL3d3dy5sb3ZlbHktbXktZ2lybHMuY29tL2dhbGxlcmllcy9qdXN0LXRlZW5zLXBvcm4vdGVlbnMta2lzcy1lYWNoLW90aGVyLw==~
1563streamrotator/out.php?l=0.1.5.4.1572&u=/ftt2/o.php?link=0.1.5.4.1572&url=~aHR0cDovL2dhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tLzk4ODMvNzEzNTMyLzI3My9pbmRleC5waHA=~
1564streamrotator/out.php?l=0.1.54.4660.14690&u=/ftt2/o.php?link=0.1.54.4660.14690&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vbnVkZWN1cmx5dGVlbmN1dGllLzYyOS9pbmRleC5odG1s~
1565streamrotator/out.php?l=0.1.55.4564.5936&u=/ftt2/o.php?link=0.1.55.4564.5936&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGVlbm1vZGVscGFuZGEvNjI5L2luZGV4Lmh0bWw=~
1566streamrotator/out.php?l=0.1.56.24.438&u=/ftt2/o.php?link=0.1.56.24.438&url=~aHR0cDovL2Nvenl4eHguY29tLzk1OTgvNzg5NDAzLzI3My9pbmRleC5waHA=~
1567streamrotator/out.php?l=0.1.57.1191.908&u=/ftt2/o.php?link=0.1.57.1191.908&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vdGhpbmxvbmdoYWlyZWRjdXRpZS82MjkvaW5kZXguaHRtbA==~
1568streamrotator/out.php?l=0.1.58.65.1464&u=/ftt2/o.php?link=0.1.58.65.1464&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMzE5MC84Mjk4MTIvMjczL2luZGV4LnBocA==~
1569streamrotator/out.php?l=0.1.59.34.1138&u=/ftt2/o.php?link=0.1.59.34.1138&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMjc4Mi84MDAxOTEvMjczL2luZGV4LnBocA==~
1570streamrotator/out.php?l=0.1.60.342.519&u=/ftt2/o.php?link=0.1.60.342.519&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vcHJldHR5Y2hhcm1lci82MjkvaW5kZXguaHRtbA==~
1571streamrotator/out.php?l=0.1.61.5.1134&u=/ftt2/o.php?link=0.1.61.5.1134&url=~aHR0cDovL3d3dy5zaGVkZXZpbHMuY29tL2dhbGxlcmllcy9iaWtpbmkvP2lkPTIxMjQxODc=~
1572streamrotator/out.php?l=0.1.62.49.109&u=/ftt2/o.php?link=0.1.62.49.109&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vcGVyZmVjdHNsaW10ZWVuLzYyOS9pbmRleC5odG1s~
1573streamrotator/out.php?l=0.1.63.71.571&u=/ftt2/o.php?link=0.1.63.71.571&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMjE4My83NjUxNjEvMjczL2luZGV4LnBocA==~
1574streamrotator/out.php?l=0.1.64.766.656&u=/ftt2/o.php?link=0.1.64.766.656&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vY3V0ZXRoaW5naXJsLzYyOS9pbmRleC5odG1s~
1575streamrotator/out.php?l=0.1.65.14.812.t&u=/ftt2/o.php?link=0.1.65.14.812.t&url=~aHR0cDovL3d3dy53YW5uYWdpcmxzLm5ldC9nYWxsZXJpZXMvY292ZXJoZXJmYWNlLXNwZXJtLWZhY2UvaW5kZXgwMjQuaHRtbA==~
1576streamrotator/out.php?l=0.1.66.4628.13648&u=/ftt2/o.php?link=0.1.66.4628.13648&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGhpbnRlZW5yb3NlLzYyOS9pbmRleC5odG1s~
1577streamrotator/out.php?l=0.1.67.967.1119&u=/ftt2/o.php?link=0.1.67.967.1119&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vdGhpbmN1dGllcHVzc3kvNjI5L2luZGV4Lmh0bWw=~
1578streamrotator/out.php?l=0.1.6.8.517&u=/ftt2/o.php?link=0.1.6.8.517&url=~aHR0cDovL2dhbGxlcmllcy5hZHVsdC1lbXBpcmUuY29tLzEwNTM1LzYzOTA1NS8yODM2L2luZGV4LnBocA==~
1579streamrotator/out.php?l=0.1.68.68.356&u=/ftt2/o.php?link=0.1.68.68.356&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMjE4My83NjUxMzEvMjczL2luZGV4LnBocA==~
1580streamrotator/out.php?l=0.1.69.4619.13466&u=/ftt2/o.php?link=0.1.69.4619.13466&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vbnVkZXRhbm5lZHRlZW4vNjI5L2luZGV4Lmh0bWw=~
1581streamrotator/out.php?l=0.1.70.67.1425&u=/ftt2/o.php?link=0.1.70.67.1425&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMzE5MC84Mjk4NzIvMjczL2luZGV4LnBocA==~
1582streamrotator/out.php?l=0.1.71.57.1468&u=/ftt2/o.php?link=0.1.71.57.1468&url=~aHR0cDovL3RlZW53YW50bWUuY29tL2dhbGxzLzAwNS9pbmRleC5odG0=~
1583streamrotator/out.php?l=0.1.7.21.1018&u=/ftt2/o.php?link=0.1.7.21.1018&url=~aHR0cDovL2dhbGxlcmllczIuYWR1bHQtZW1waXJlLmNvbS83OTQyLzQwNjYxNi80MzMvMi9pbmRleC5waHA=~
1584streamrotator/out.php?l=0.1.72.32.1135&u=/ftt2/o.php?link=0.1.72.32.1135&url=~aHR0cDovL2J1bGtqZXJrLmNvbS8xMDAyMi83OTUzMjgvMjczL2luZGV4LnBocA==~
1585streamrotator/out.php?l=0.1.73.287.1487&u=/ftt2/o.php?link=0.1.73.287.1487&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vcHVzc3ljbG9zZXVwLzYyOS9pbmRleC5odG1s~
1586streamrotator/out.php?l=0.1.74.85.156&u=/ftt2/o.php?link=0.1.74.85.156&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xNDE5Mi84NTg2MjAvMjczL2luZGV4LnBocA==~
1587streamrotator/out.php?l=0.1.75.40.807&u=/ftt2/o.php?link=0.1.75.40.807&url=~aHR0cDovL3d3dy5icmF2b251ZGUuY29tL3Bhc3Npb24taGQtcG9ybi96b2V5LWFuZC1kYW5pL3NleHVhbC1uYXR1cmUv~
1588streamrotator/out.php?l=0.1.76.33.1551&u=/ftt2/o.php?link=0.1.76.33.1551&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMjc1OS83OTUxODIvMjczL2luZGV4LnBocA==~
1589streamrotator/out.php?l=0.1.77.17.1543&u=/ftt2/o.php?link=0.1.77.17.1543&url=~aHR0cDovL2dhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbS8xMTQ1NS83Mzc0MjEvMjczL2luZGV4LnBocA==~
1590streamrotator/out.php?l=0.1.78.84.508&u=/ftt2/o.php?link=0.1.78.84.508&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vc2xpbXRlZW5tb2RlbG51ZGUvNjI5L2luZGV4Lmh0bWw=~
1591streamrotator/out.php?l=0.1.79.90.826&u=/ftt2/o.php?link=0.1.79.90.826&url=~aHR0cDovL3Byb21vLmF2ZXJvdGljYS5jb20vZ2Fscy8yMDEyMDMyMi0xNjY0LW1hZ2dpZS8/d209MjM5MTY3MQ==~
1592streamrotator/out.php?l=0.1.80.30.972&u=/ftt2/o.php?link=0.1.80.30.972&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGVlbm11c2hyb29tcy82MjkvaW5kZXguaHRtbA==~
1593streamrotator/out.php?l=0.1.81.4414.11800&u=/ftt2/o.php?link=0.1.81.4414.11800&url=~aHR0cDovL2Vuam95dmlkcy5jb20vZ2FsbGVyaWVzL25iZC9waWMvMDc1dS9pbmRleC5waHA/bmF0cz1NVGd3T1M0eExqVXVOeTR3TGpRNU5TNHdMakF1TUE=~
1594streamrotator/out.php?l=0.1.82.1001.212&u=/ftt2/o.php?link=0.1.82.1001.212&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vbmFrZWRtb2RlbHRlZGR5YmVhcnMvNjI5L2luZGV4Lmh0bWw=~
1595streamrotator/out.php?l=0.1.83.4290.11437&u=/ftt2/o.php?link=0.1.83.4290.11437&url=~aHR0cDovL2Vuam95dmlkcy5jb20vZ2FsbGVyaWVzL25iZC9waWMvMDE5OXMvaW5kZXgucGhwP25hdHM9TVRnd09TNHhMalV1Tnk0d0xqUTFOVGd1TUM0d0xqQQ==~
1596streamrotator/out.php?l=0.1.8.43.1316&u=/ftt2/o.php?link=0.1.8.43.1316&url=~aHR0cDovL3N3ZWV0Z2lybGllLmNvbS9nYWxscy8wNTQvaW5kZXgucGhw~
1597streamrotator/out.php?l=0.1.84.75.186&u=/ftt2/o.php?link=0.1.84.75.186&url=~aHR0cDovL2dhbGxlcmllczEuYWR1bHQtZW1waXJlLmNvbS82NTI1LzI3NTM0OS8yNzMvaW5kZXgucGhw~
1598streamrotator/out.php?l=0.1.85.3859.5191&u=/ftt2/o.php?link=0.1.85.3859.5191&url=~aHR0cHM6Ly9naWdhcHJvbi5jb20vMTQyMjgvODg2NTMzLzI3My9pbmRleC5waHA=~
1599streamrotator/out.php?l=0.1.86.51.586&u=/ftt2/o.php?link=0.1.86.51.586&url=~aHR0cDovL2hvc3RlZC5tZXQtYXJ0LmNvbS9GdWxsX21ldC1hcnRfcnlfMzk1XzE5MS8/cGE9MTY3MDU2Ng==~
1600streamrotator/out.php?l=0.1.87.4571.12247&u=/ftt2/o.php?link=0.1.87.4571.12247&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vc2V4eXRlZW5pZWFwcGxlcy82MjkvaW5kZXguaHRtbA==~
1601streamrotator/out.php?l=0.1.88.1027.202&u=/ftt2/o.php?link=0.1.88.1027.202&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vc2hvcnRoYWlyZWRibG9uZGVjdXRpZS82MjkvaW5kZXguaHRtbA==~
1602streamrotator/out.php?l=0.1.89.763.1&u=/ftt2/o.php?link=0.1.89.763.1&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vY3V0ZW51ZGV0ZWVuLzYyOS9pbmRleC5odG1s~
1603streamrotator/out.php?l=0.1.90.46.1100&u=/ftt2/o.php?link=0.1.90.46.1100&url=~aHR0cDovL2J1bGtqZXJrLmNvbS8zOTI2LzgxNTA3Ni8yNzMvaW5kZXgucGhw~
1604streamrotator/out.php?l=0.1.91.668.1360&u=/ftt2/o.php?link=0.1.91.668.1360&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vdGVlbnJvY2tlci82MjkvaW5kZXguaHRtbA==~
1605streamrotator/out.php?l=0.1.92.1004.1474.t&u=/ftt2/o.php?link=0.1.92.1004.1474.t&url=~aHR0cDovL2hvc3RlZC5zaG93eWJlYXV0eS5jb20vbmFrZWRibG9uZGVidW5ueS82MjkvaW5kZXguaHRtbA==~
1606streamrotator/out.php?l=0.1.93.69.774&u=/ftt2/o.php?link=0.1.93.69.774&url=~aHR0cDovL2dpZ2Fwcm9uLmNvbS8xMjE4My83NjUxNDUvMjczL2luZGV4LnBocA==~
1607streamrotator/out.php?l=0.1.94.4603.13175&u=/ftt2/o.php?link=0.1.94.4603.13175&url=~aHR0cDovL2hvc3RlZC5hbW91cmFuZ2Vscy5jb20vbnVkZXRlZW5ibG9uZGVtb2RlbC82MjkvaW5kZXguaHRtbA==~
1608streamrotator/out.php?l=0.1.95.4521.7513&u=/ftt2/o.php?link=0.1.95.4521.7513&url=~aHR0cDovL2dhbGxlcmllcy5udWRlYmVhY2hkcmVhbXMuY29tL3BpY3MvbnVkZV9wZW9wbGUvc3dpbmdlcnMucGhwP25hdHM9TVRnd09TNHhMalV1Tnk0d0xqRTVNQzR3TGpBdU1B~
1609streamrotator/out.php?l=0.1.9.56.1288&u=/ftt2/o.php?link=0.1.9.56.1288&url=~aHR0cDovL3RlZW53YW50bWUuY29tL2dhbGxzLzAwOS9pbmRleC5odG0=~
1610streamrotator/out.php?l=0.1.96.4337.6089&u=/ftt2/o.php?link=0.1.96.4337.6089&url=~aHR0cDovL2Vuam95dmlkcy5jb20vZ2FsbGVyaWVzL25iZC9waWMvMDE1MmMvaW5kZXgucGhwP25hdHM9TVRnd09TNHhMalV1Tnk0d0xqazVOUzR3TGpBdU1B~
1611streamrotator/out.php?l=0.1.97.4490.10194&u=/ftt2/o.php?link=0.1.97.4490.10194&url=~aHR0cDovL2dhbGxlcmllcy5udWRlYmVhY2hkcmVhbXMuY29tL3BpY3MvcHJldHR5X2dpcmxzL3N3aW5nZXJzLnBocD9uYXRzPU1UZ3dPUzR4TGpVdU55NHdMakl5TVM0d0xqQXVNQQ==~
1612streamrotator/out.php?l=0.1.98.3926.9493&u=/ftt2/o.php?link=0.1.98.3926.9493&url=~aHR0cDovL2Vuam95dmlkcy5jb20vZ2FsbGVyaWVzL25iZC9waWMvMDU2M2MvaW5kZXgucGhwP25hdHM9TVRnd09TNHhMalV1Tnk0d0xqUTVNakl1TUM0d0xqQQ==~
1613streamrotator/out.php?l=0.1.99.35.964.t&u=/ftt2/o.php?link=0.1.99.35.964.t&url=~aHR0cDovL3d3dy50bWNnYWxsZXJpZXMuY29tLzIwMDgvY2luZHkvaXZjaW5keW51MTYvP0NDQkM9MjMzNDE1MA==~
1614streamrotator/out.php?l=0.2.0.1848.3805&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk2NzAyNy9sZXZyZXR0ZV9wb3VyX255bXBoZXR0ZS5odG1s~
1615streamrotator/out.php?l=0.2.10.2377.2376&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk3OTE1OC90ZWVueV9mdWNrZWRfbGlrZV9pbl9oZXJfZHJlYW1zLmh0bWw=~
1616streamrotator/out.php?l=0.2.11.1680.918&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNzAxOTQ3Ni90aW55X3RlZW5faGVhdGhlcl9kZWVwX2RvZXNfbGF5aW5nX2Rvd25fcmV2ZXJzZV9kZWVwdGhyb2F0Lmh0bWw=~
1617streamrotator/out.php?l=0.2.1.1436.889&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNzA4ODQ5Ni9ydW1pXy1famFwYW5lc2VfYW5nZWwuaHRtbA==~
1618streamrotator/out.php?l=0.2.12.2219.13834&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk2NzgyMS9leGNpdGVkX3RlZW5zX3RveXNfdHdhdHNfb3V0ZG9vcnMuaHRtbA==~
1619streamrotator/out.php?l=0.2.13.1483.757&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk1ODI3MS9zZXhfYWxsX3Bvc3Rpb25zLmh0bWw=~
1620streamrotator/out.php?l=0.2.14.2433.2539&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjkxMjI3OC9ydXNzaWFuX3RlZW5fc2lzdGVyX2xldHNfYnJvX2Z1Y2tfaGVyLmh0bWw=~
1621streamrotator/out.php?l=0.2.15.1545.184&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNzEwMDcyNS9vbmVfb2ZfbXlfY291c2luX2Nsb3NldXBfbmV3X3llYXJzX3BhcnR5Lmh0bWw=~
1622streamrotator/out.php?l=0.2.16.2005.12606&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk2NjA3NS9zd2VldF9ob25leV9mcm9tX2h1bmdhcnlfMS5odG1s~
1623streamrotator/out.php?l=0.2.17.1362.412&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNzAzNDY1OC9uYWtlZF90aWVkX3RlZW5fbWFzdHVyYmF0ZWRfYnlfb2xkZXJfbWFuLmh0bWw=~
1624streamrotator/out.php?l=0.2.18.2118.12627&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk3MjczOC90ZWVuX2NyZWFteV9zcXVpcnQuaHRtbA==~
1625streamrotator/out.php?l=0.2.19.2156.13750&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjkyNTY4MC9jbGFzc3lfdGVlbl9hc3NmdWNrZWRfYWZ0ZXJfZmluZ2VyaW5nLmh0bWw=~
1626streamrotator/out.php?l=0.2.2.3664.3530&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNzAzMTIwNy9lbGV4aXNfci5odG1s~
1627streamrotator/out.php?l=0.2.3.1663.844&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk4NjQ0My90ZWVuX3NlbGZpZV9tYXN0dXJiYXRpb24uaHRtbA==~
1628streamrotator/out.php?l=0.2.4.1443.471&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk5MTk1Mi9wZXRpdGVfdGVlbl9tYXN0dXJiYXRpbmdfYW5kX2RhbmNpbmcuaHRtbA==~
1629streamrotator/out.php?l=0.2.5.1915.2049&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk2MzMyNS9jdXRlX2dpcmxmcmllbmRfYmxvd2pvYi5odG1s~
1630streamrotator/out.php?l=0.2.6.2175.13932.t&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk3MTQxMy9hbWVyaWNhbl9jYW0tc2x1dF9yaWRlc19oZXJfcGxhc3RpY19mcmllbmQuaHRtbA==~
1631streamrotator/out.php?l=0.2.7.1450.210&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNzAzOTg4MS9tb3Jtb25fdGVlbl9mYWNlX3JpZGRlbi5odG1s~
1632streamrotator/out.php?l=0.2.8.3590.3369&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNzAyODgwNS9zZXh5X2JhYmVfc3ByZWFkc193aWRlX291dGRvb3JzLmh0bWw=~
1633streamrotator/out.php?l=0.2.9.1948.4510&u=/ftt2/o.php?link=video&p=50&url=~aHR0cDovL3hoYW1zdGVyLmNvbS9tb3ZpZXMvNjk1OTEwNC9vdHNvczEuaHRtbA==~
1634streamrotator/thumbs/a/105.jpg
1635streamrotator/thumbs/a/109.jpg
1636streamrotator/thumbs/a/124.jpg
1637streamrotator/thumbs/a/130.jpg
1638streamrotator/thumbs/a/146.jpg
1639streamrotator/thumbs/a/156.jpg
1640streamrotator/thumbs/a/184.jpg
1641streamrotator/thumbs/a/186.jpg
1642streamrotator/thumbs/a/188.jpg
1643streamrotator/thumbs/a/1.jpg
1644streamrotator/thumbs/a/202.jpg
1645streamrotator/thumbs/a/210.jpg
1646streamrotator/thumbs/a/212.jpg
1647streamrotator/thumbs/a/241.jpg
1648streamrotator/thumbs/a/26.jpg
1649streamrotator/thumbs/a/356.jpg
1650streamrotator/thumbs/a/372.jpg
1651streamrotator/thumbs/a/388.jpg
1652streamrotator/thumbs/a/403.jpg
1653streamrotator/thumbs/a/412.jpg
1654streamrotator/thumbs/a/438.jpg
1655streamrotator/thumbs/a/469.jpg
1656streamrotator/thumbs/a/471.jpg
1657streamrotator/thumbs/a/485.jpg
1658streamrotator/thumbs/a/503.jpg
1659streamrotator/thumbs/a/508.jpg
1660streamrotator/thumbs/a/517.jpg
1661streamrotator/thumbs/a/519.jpg
1662streamrotator/thumbs/a/564.jpg
1663streamrotator/thumbs/a/571.jpg
1664streamrotator/thumbs/a/576.jpg
1665streamrotator/thumbs/a/586.jpg
1666streamrotator/thumbs/a/599.jpg
1667streamrotator/thumbs/a/601.jpg
1668streamrotator/thumbs/a/626.jpg
1669streamrotator/thumbs/a/651.jpg
1670streamrotator/thumbs/a/656.jpg
1671streamrotator/thumbs/a/675.jpg
1672streamrotator/thumbs/a/723.jpg
1673streamrotator/thumbs/a/757.jpg
1674streamrotator/thumbs/a/760.jpg
1675streamrotator/thumbs/a/773.jpg
1676streamrotator/thumbs/a/774.jpg
1677streamrotator/thumbs/a/795.jpg
1678streamrotator/thumbs/a/800.jpg
1679streamrotator/thumbs/a/802.jpg
1680streamrotator/thumbs/a/804.jpg
1681streamrotator/thumbs/a/807.jpg
1682streamrotator/thumbs/a/812.jpg
1683streamrotator/thumbs/a/826.jpg
1684streamrotator/thumbs/a/844.jpg
1685streamrotator/thumbs/a/84.jpg
1686streamrotator/thumbs/a/856.jpg
1687streamrotator/thumbs/a/889.jpg
1688streamrotator/thumbs/a/908.jpg
1689streamrotator/thumbs/a/918.jpg
1690streamrotator/thumbs/a/937.jpg
1691streamrotator/thumbs/a/964.jpg
1692streamrotator/thumbs/a/966.jpg
1693streamrotator/thumbs/a/972.jpg
1694streamrotator/thumbs/a/987.jpg
1695streamrotator/thumbs/a/9.jpg
1696streamrotator/thumbs/b/1018.jpg
1697streamrotator/thumbs/b/1019.jpg
1698streamrotator/thumbs/b/1089.jpg
1699streamrotator/thumbs/b/1100.jpg
1700streamrotator/thumbs/b/1108.jpg
1701streamrotator/thumbs/b/1119.jpg
1702streamrotator/thumbs/b/1124.jpg
1703streamrotator/thumbs/b/1134.jpg
1704streamrotator/thumbs/b/1135.jpg
1705streamrotator/thumbs/b/1138.jpg
1706streamrotator/thumbs/b/1140.jpg
1707streamrotator/thumbs/b/1169.jpg
1708streamrotator/thumbs/b/1170.jpg
1709streamrotator/thumbs/b/1185.jpg
1710streamrotator/thumbs/b/1288.jpg
1711streamrotator/thumbs/b/1301.jpg
1712streamrotator/thumbs/b/1316.jpg
1713streamrotator/thumbs/b/1355.jpg
1714streamrotator/thumbs/b/1360.jpg
1715streamrotator/thumbs/b/1390.jpg
1716streamrotator/thumbs/b/1425.jpg
1717streamrotator/thumbs/b/1446.jpg
1718streamrotator/thumbs/b/1463.jpg
1719streamrotator/thumbs/b/1464.jpg
1720streamrotator/thumbs/b/1468.jpg
1721streamrotator/thumbs/b/1474.jpg
1722streamrotator/thumbs/b/1482.jpg
1723streamrotator/thumbs/b/1487.jpg
1724streamrotator/thumbs/b/1504.jpg
1725streamrotator/thumbs/b/1543.jpg
1726streamrotator/thumbs/b/1551.jpg
1727streamrotator/thumbs/b/1572.jpg
1728streamrotator/thumbs/b/1604.jpg
1729streamrotator/thumbs/c/2049.jpg
1730streamrotator/thumbs/c/2376.jpg
1731streamrotator/thumbs/c/2539.jpg
1732streamrotator/thumbs/d/3369.jpg
1733streamrotator/thumbs/d/3530.jpg
1734streamrotator/thumbs/d/3805.jpg
1735streamrotator/thumbs/e/4510.jpg
1736streamrotator/thumbs/f/5191.jpg
1737streamrotator/thumbs/f/5343.jpg
1738streamrotator/thumbs/f/5445.jpg
1739streamrotator/thumbs/f/5599.jpg
1740streamrotator/thumbs/f/5936.jpg
1741streamrotator/thumbs/g/6089.jpg
1742streamrotator/thumbs/g/6103.jpg
1743streamrotator/thumbs/g/6217.jpg
1744streamrotator/thumbs/h/7511.jpg
1745streamrotator/thumbs/h/7513.jpg
1746streamrotator/thumbs/j/9493.jpg
1747streamrotator/thumbs/k/10116.jpg
1748streamrotator/thumbs/k/10194.jpg
1749streamrotator/thumbs/k/10275.jpg
1750streamrotator/thumbs/k/10540.jpg
1751streamrotator/thumbs/l/11437.jpg
1752streamrotator/thumbs/l/11800.jpg
1753streamrotator/thumbs/l/11883.jpg
1754streamrotator/thumbs/m/12247.jpg
1755streamrotator/thumbs/m/12606.jpg
1756streamrotator/thumbs/m/12627.jpg
1757streamrotator/thumbs/n/13175.jpg
1758streamrotator/thumbs/n/13424.jpg
1759streamrotator/thumbs/n/13466.jpg
1760streamrotator/thumbs/n/13555.jpg
1761streamrotator/thumbs/n/13569.jpg
1762streamrotator/thumbs/n/13602.jpg
1763streamrotator/thumbs/n/13648.jpg
1764streamrotator/thumbs/n/13673.jpg
1765streamrotator/thumbs/n/13686.jpg
1766streamrotator/thumbs/n/13750.jpg
1767streamrotator/thumbs/n/13834.jpg
1768streamrotator/thumbs/n/13932.jpg
1769streamrotator/thumbs/o/14221.jpg
1770streamrotator/thumbs/o/14253.jpg
1771streamrotator/thumbs/o/14690.jpg
1772streamrotator/thumbs/o/14714.jpg
1773streamrotator/thumbs/o/14723.jpg
1774text/javascript
1775#####################################################################################################################################
1776http://37.1.207.121 [200 OK] Country[UKRAINE][UA], HTTPServer[nginx/1.14.1], IP[37.1.207.121], PHP[7.2.5], Script[JavaScript,text/javascript], Title[FREE PHOTO PORN GALLERY ART NUDE], X-Powered-By[PHP/7.2.5], nginx[1.14.1]
1777####################################################################################################################################
1778
1779wig - WebApp Information Gatherer
1780
1781
1782Scanning http://37.1.207.121...
1783______________________________________________ SITE INFO ______________________________________________
1784IP Title
178537.1.207.121 FREE PHOTO PORN GALLERY ART NUDE
1786
1787_______________________________________________ VERSION _______________________________________________
1788Name Versions Type
1789Roundcube CMS
1790Apache 2.4.10 | 2.4.11 | 2.4.12 | 2.4.5 | 2.4.6 | 2.4.7 | 2.4.8 Platform
1791 2.4.9
1792PHP 7.2.5 Platform
1793nginx 1.14.1 Platform
1794CentOS 7-1511 | 7.0-1406 | 7.1-1503 OS
1795Red Hat Enterprise Linux RHEL-7.0 | RHEL-7.1 | RHEL-7.2 OS
1796Scientific Linux 7.0 | 7.1 | 7.2 OS
1797
1798________________________________________ PLATFORM OBSERVATIONS ________________________________________
1799Platform URL Type
1800PHP 5.4.16 /roundcube/ Observation
1801PHP 7.2.5 Observation
1802
1803_______________________________________________________________________________________________________
1804Time: 1.2 sec Urls: 525 Fingerprints: 40401
1805######################################################################################################################################
1806Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-28 00:49 EST
1807NSE: Loaded 161 scripts for scanning.
1808NSE: Script Pre-scanning.
1809Initiating NSE at 00:49
1810Completed NSE at 00:49, 0.00s elapsed
1811Initiating NSE at 00:49
1812Completed NSE at 00:49, 0.00s elapsed
1813Initiating Parallel DNS resolution of 1 host. at 00:49
1814Completed Parallel DNS resolution of 1 host. at 00:49, 0.02s elapsed
1815Initiating SYN Stealth Scan at 00:49
1816Scanning teens-sins.net (37.1.207.121) [1 port]
1817Discovered open port 80/tcp on 37.1.207.121
1818Completed SYN Stealth Scan at 00:49, 0.21s elapsed (1 total ports)
1819Initiating Service scan at 00:49
1820Scanning 1 service on teens-sins.net (37.1.207.121)
1821Completed Service scan at 00:50, 6.38s elapsed (1 service on 1 host)
1822Initiating OS detection (try #1) against teens-sins.net (37.1.207.121)
1823Retrying OS detection (try #2) against teens-sins.net (37.1.207.121)
1824Initiating Traceroute at 00:50
1825Completed Traceroute at 00:50, 3.02s elapsed
1826Initiating Parallel DNS resolution of 11 hosts. at 00:50
1827Completed Parallel DNS resolution of 11 hosts. at 00:50, 5.53s elapsed
1828NSE: Script scanning 37.1.207.121.
1829Initiating NSE at 00:50
1830Completed NSE at 00:51, 53.52s elapsed
1831Initiating NSE at 00:51
1832Completed NSE at 00:51, 0.76s elapsed
1833Nmap scan report for teens-sins.net (37.1.207.121)
1834Host is up (0.17s latency).
1835
1836PORT STATE SERVICE VERSION
183780/tcp open http nginx 1.14.1
1838| http-brute:
1839|_ Path "/" does not require authentication
1840|_http-chrono: Request times for /; avg: 1693.81ms; min: 1236.18ms; max: 2090.53ms
1841|_http-csrf: Couldn't find any CSRF vulnerabilities.
1842|_http-date: Fri, 28 Feb 2020 05:50:17 GMT; -6s from local time.
1843|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
1844|_http-dombased-xss: Couldn't find any DOM based XSS.
1845|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
1846|_http-errors: Couldn't find any error pages.
1847|_http-feed: Couldn't find any feeds.
1848|_http-fetch: Please enter the complete path of the directory to save data in.
1849| http-headers:
1850| Server: nginx/1.14.1
1851| Date: Fri, 28 Feb 2020 05:50:16 GMT
1852| Content-Type: text/html; charset=UTF-8
1853| Connection: close
1854| X-Powered-By: PHP/7.2.5
1855|
1856|_ (Request type: HEAD)
1857|_http-jsonp-detection: Couldn't find any JSONP endpoints.
1858| http-methods:
1859|_ Supported Methods: GET HEAD POST OPTIONS
1860|_http-mobileversion-checker: No mobile version detected.
1861| http-php-version: Logo query returned unknown hash 9482e74220f93e6698dc81d7ab5764e6
1862| Credits query returned unknown hash d5cba5ccf7c43cb97b18c557989c9b7f
1863|_Version from header x-powered-by: PHP/7.2.5
1864|_http-security-headers:
1865|_http-server-header: nginx/1.14.1
1866| http-sitemap-generator:
1867| Directory structure:
1868| /
1869| Other: 1
1870| /streamrotator/thumbs/21/
1871| jpg: 1
1872| /streamrotator/thumbs/38/
1873| jpg: 1
1874| /streamrotator/thumbs/87/
1875| jpg: 1
1876| /streamrotator/thumbs/Dd/
1877| jpg: 1
1878| /streamrotator/thumbs/Nd/
1879| jpg: 1
1880| /streamrotator/thumbs/Ob/
1881| jpg: 1
1882| /streamrotator/thumbs/Qb/
1883| jpg: 1
1884| /streamrotator/thumbs/Vd/
1885| jpg: 1
1886| /streamrotator/thumbs/Yb/
1887| jpg: 1
1888| /streamrotator/thumbs/hd/
1889| jpg: 1
1890| /streamrotator/thumbs/sc/
1891| jpg: 1
1892| Longest directory structure:
1893| Depth: 3
1894| Dir: /streamrotator/thumbs/Vd/
1895| Total files found (by extension):
1896|_ Other: 1; jpg: 11
1897|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
1898|_http-title: FREE PHOTO and VIDEO PORN GALLERY teen sins
1899| http-vhosts:
1900|_127 names had status 200
1901|_http-vuln-cve2017-1001000: ERROR: Script execution failed (use -d to debug)
1902|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
1903|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
1904|_http-xssed: No previously reported XSS vuln.
1905Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
1906Aggressive OS guesses: Linux 3.10 - 4.11 (92%), Linux 3.2 - 4.9 (92%), Linux 3.18 (90%), Crestron XPanel control system (90%), Linux 3.16 (89%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), Linux 3.2 (87%), HP P2000 G3 NAS device (87%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (87%)
1907No exact OS matches for host (test conditions non-ideal).
1908Uptime guess: 34.959 days (since Fri Jan 24 01:49:45 2020)
1909Network Distance: 12 hops
1910TCP Sequence Prediction: Difficulty=263 (Good luck!)
1911IP ID Sequence Generation: All zeros
1912
1913TRACEROUTE (using port 80/tcp)
1914HOP RTT ADDRESS
19151 135.37 ms 10.203.39.1
19162 ...
19173 136.19 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
19184 135.96 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
19195 141.57 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
19206 156.21 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
19217 172.23 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
19228 172.28 ms be3457.ccr21.ams04.atlas.cogentco.com (130.117.1.10)
19239 175.61 ms 149.11.39.188
192410 175.27 ms 185.8.179.40
192511 177.30 ms 185.8.177.33
192612 167.53 ms teens-sins.net (37.1.207.121)
1927
1928NSE: Script Post-scanning.
1929Initiating NSE at 00:51
1930Completed NSE at 00:51, 0.00s elapsed
1931Initiating NSE at 00:51
1932Completed NSE at 00:51, 0.00s elapsed
1933#######################################################################################################################################
1934Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-28 00:51 EST
1935NSE: Loaded 49 scripts for scanning.
1936NSE: Script Pre-scanning.
1937Initiating NSE at 00:51
1938Completed NSE at 00:51, 0.00s elapsed
1939Initiating NSE at 00:51
1940Completed NSE at 00:51, 0.00s elapsed
1941Initiating Ping Scan at 00:51
1942Scanning 37.1.207.121 [4 ports]
1943Completed Ping Scan at 00:51, 0.20s elapsed (1 total hosts)
1944Initiating Parallel DNS resolution of 1 host. at 00:51
1945Completed Parallel DNS resolution of 1 host. at 00:51, 0.02s elapsed
1946Initiating SYN Stealth Scan at 00:51
1947Scanning teens-sins.net (37.1.207.121) [1 port]
1948Discovered open port 110/tcp on 37.1.207.121
1949Completed SYN Stealth Scan at 00:51, 0.21s elapsed (1 total ports)
1950Initiating Service scan at 00:51
1951Scanning 1 service on teens-sins.net (37.1.207.121)
1952Completed Service scan at 00:51, 0.34s elapsed (1 service on 1 host)
1953Initiating OS detection (try #1) against teens-sins.net (37.1.207.121)
1954Retrying OS detection (try #2) against teens-sins.net (37.1.207.121)
1955Initiating Traceroute at 00:51
1956Completed Traceroute at 00:51, 3.00s elapsed
1957Initiating Parallel DNS resolution of 10 hosts. at 00:51
1958Completed Parallel DNS resolution of 10 hosts. at 00:51, 5.53s elapsed
1959NSE: Script scanning 37.1.207.121.
1960Initiating NSE at 00:51
1961NSE Timing: About 68.66% done; ETC: 00:53 (0:00:30 remaining)
1962Completed NSE at 00:53, 90.93s elapsed
1963Initiating NSE at 00:53
1964Completed NSE at 00:53, 0.05s elapsed
1965Nmap scan report for teens-sins.net (37.1.207.121)
1966Host is up (0.17s latency).
1967
1968PORT STATE SERVICE VERSION
1969110/tcp open pop3 Dovecot pop3d
1970|_pop3-capabilities: TOP UIDL CAPA PIPELINING STLS AUTH-RESP-CODE USER SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) RESP-CODES
1971Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
1972Aggressive OS guesses: Linux 3.10 - 4.11 (92%), Linux 3.18 (92%), Linux 3.2 - 4.9 (92%), Crestron XPanel control system (90%), Linux 3.16 (89%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), Linux 3.2 (87%), HP P2000 G3 NAS device (87%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (87%)
1973No exact OS matches for host (test conditions non-ideal).
1974Uptime guess: 34.961 days (since Fri Jan 24 01:49:44 2020)
1975Network Distance: 12 hops
1976TCP Sequence Prediction: Difficulty=259 (Good luck!)
1977IP ID Sequence Generation: All zeros
1978
1979TRACEROUTE (using port 443/tcp)
1980HOP RTT ADDRESS
19811 137.79 ms 10.203.39.1
19822 ...
19833 135.86 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
19844 135.91 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
19855 140.43 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
19866 159.05 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
19877 171.94 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
19888 171.97 ms be3457.ccr21.ams04.atlas.cogentco.com (130.117.1.10)
19899 171.91 ms 149.11.39.186
199010 ...
199111 173.61 ms 185.8.177.35
199212 169.76 ms teens-sins.net (37.1.207.121)
1993
1994NSE: Script Post-scanning.
1995Initiating NSE at 00:53
1996Completed NSE at 00:53, 0.00s elapsed
1997Initiating NSE at 00:53
1998Completed NSE at 00:53, 0.00s elapsed
1999#####################################################################################################################################
2000+---------------+--------------------------------------+--------------------------------------------------+-----------+-----------+
2001| App Name | URL to Application | Potential Exploit | Username | Password |
2002+---------------+--------------------------------------+--------------------------------------------------+-----------+-----------+
2003| Apache Tomcat | https://37.1.207.121:1500/manager | ./exploits/multi/http/tomcat_mgr_upload.rb | <None> | <None> |
2004| phpMyAdmin | http://37.1.207.121:8085/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | Not Found | Not Found |
2005+---------------+--------------------------------------+--------------------------------------------------+-----------+-----------+
2006#####################################################################################################################################
2007Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-28 00:56 EST
2008NSE: Loaded 46 scripts for scanning.
2009NSE: Script Pre-scanning.
2010Initiating NSE at 00:56
2011Completed NSE at 00:56, 0.00s elapsed
2012Initiating NSE at 00:56
2013Completed NSE at 00:56, 0.00s elapsed
2014Initiating Parallel DNS resolution of 1 host. at 00:56
2015Completed Parallel DNS resolution of 1 host. at 00:56, 0.03s elapsed
2016Initiating SYN Stealth Scan at 00:56
2017Scanning teens-sins.net (37.1.207.121) [65535 ports]
2018Discovered open port 143/tcp on 37.1.207.121
2019Discovered open port 993/tcp on 37.1.207.121
2020Discovered open port 80/tcp on 37.1.207.121
2021Discovered open port 110/tcp on 37.1.207.121
2022Discovered open port 53/tcp on 37.1.207.121
2023Discovered open port 25/tcp on 37.1.207.121
2024Discovered open port 995/tcp on 37.1.207.121
2025Discovered open port 587/tcp on 37.1.207.121
2026Discovered open port 1500/tcp on 37.1.207.121
2027SYN Stealth Scan Timing: About 7.56% done; ETC: 01:03 (0:06:19 remaining)
2028SYN Stealth Scan Timing: About 15.89% done; ETC: 01:03 (0:05:23 remaining)
2029SYN Stealth Scan Timing: About 26.11% done; ETC: 01:02 (0:04:18 remaining)
2030SYN Stealth Scan Timing: About 38.88% done; ETC: 01:01 (0:03:10 remaining)
2031Discovered open port 465/tcp on 37.1.207.121
2032SYN Stealth Scan Timing: About 55.98% done; ETC: 01:01 (0:01:59 remaining)
2033SYN Stealth Scan Timing: About 76.13% done; ETC: 01:00 (0:00:57 remaining)
2034Discovered open port 8085/tcp on 37.1.207.121
2035Completed SYN Stealth Scan at 01:00, 211.73s elapsed (65535 total ports)
2036Initiating Service scan at 01:00
2037Scanning 11 services on teens-sins.net (37.1.207.121)
2038Completed Service scan at 01:02, 138.57s elapsed (11 services on 1 host)
2039Initiating OS detection (try #1) against teens-sins.net (37.1.207.121)
2040Retrying OS detection (try #2) against teens-sins.net (37.1.207.121)
2041Initiating Traceroute at 01:02
2042Completed Traceroute at 01:02, 3.01s elapsed
2043Initiating Parallel DNS resolution of 10 hosts. at 01:02
2044Completed Parallel DNS resolution of 10 hosts. at 01:02, 5.52s elapsed
2045NSE: Script scanning 37.1.207.121.
2046Initiating NSE at 01:02
2047#####################################################################################################################################
2048Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-28 01:02 EST
2049NSE: Loaded 46 scripts for scanning.
2050NSE: Script Pre-scanning.
2051Initiating NSE at 01:02
2052Completed NSE at 01:02, 0.00s elapsed
2053Initiating NSE at 01:02
2054Completed NSE at 01:02, 0.00s elapsed
2055Initiating Parallel DNS resolution of 1 host. at 01:02
2056Completed Parallel DNS resolution of 1 host. at 01:02, 0.02s elapsed
2057Initiating UDP Scan at 01:02
2058Scanning teens-sins.net (37.1.207.121) [15 ports]
2059Discovered open port 53/udp on 37.1.207.121
2060Increasing send delay for 37.1.207.121 from 0 to 50 due to max_successful_tryno increase to 4
2061Increasing send delay for 37.1.207.121 from 50 to 100 due to max_successful_tryno increase to 5
2062Increasing send delay for 37.1.207.121 from 100 to 200 due to max_successful_tryno increase to 6
2063Completed UDP Scan at 01:02, 9.87s elapsed (15 total ports)
2064Initiating Service scan at 01:02
2065Scanning 1 service on teens-sins.net (37.1.207.121)
2066Completed Service scan at 01:03, 0.17s elapsed (1 service on 1 host)
2067Initiating OS detection (try #1) against teens-sins.net (37.1.207.121)
2068Retrying OS detection (try #2) against teens-sins.net (37.1.207.121)
2069Initiating Traceroute at 01:03
2070Completed Traceroute at 01:03, 3.01s elapsed
2071Initiating Parallel DNS resolution of 11 hosts. at 01:03
2072Completed Parallel DNS resolution of 11 hosts. at 01:03, 5.53s elapsed
2073NSE: Script scanning 37.1.207.121.
2074Initiating NSE at 01:03
2075Completed NSE at 01:03, 3.39s elapsed
2076Initiating NSE at 01:03
2077Completed NSE at 01:03, 0.00s elapsed
2078Nmap scan report for teens-sins.net (37.1.207.121)
2079Host is up (0.17s latency).
2080
2081PORT STATE SERVICE VERSION
208253/udp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
2083| vulners:
2084| cpe:/a:isc:bind:9.9.4:
2085| CVE-2015-4620 7.8 https://vulners.com/cve/CVE-2015-4620
2086| CVE-2014-8500 7.8 https://vulners.com/cve/CVE-2014-8500
2087| CVE-2017-3141 7.2 https://vulners.com/cve/CVE-2017-3141
2088| CVE-2015-8461 7.1 https://vulners.com/cve/CVE-2015-8461
2089| CVE-2015-1349 5.4 https://vulners.com/cve/CVE-2015-1349
2090| CVE-2018-5740 5.0 https://vulners.com/cve/CVE-2018-5740
2091| CVE-2017-3145 5.0 https://vulners.com/cve/CVE-2017-3145
2092| CVE-2016-9131 5.0 https://vulners.com/cve/CVE-2016-9131
2093| CVE-2016-8864 5.0 https://vulners.com/cve/CVE-2016-8864
2094| CVE-2016-1286 5.0 https://vulners.com/cve/CVE-2016-1286
2095| CVE-2015-8000 5.0 https://vulners.com/cve/CVE-2015-8000
2096| CVE-2019-6465 4.3 https://vulners.com/cve/CVE-2019-6465
2097| CVE-2018-5743 4.3 https://vulners.com/cve/CVE-2018-5743
2098| CVE-2018-5742 4.3 https://vulners.com/cve/CVE-2018-5742
2099| CVE-2017-3143 4.3 https://vulners.com/cve/CVE-2017-3143
2100| CVE-2017-3142 4.3 https://vulners.com/cve/CVE-2017-3142
2101| CVE-2017-3136 4.3 https://vulners.com/cve/CVE-2017-3136
2102| CVE-2016-2775 4.3 https://vulners.com/cve/CVE-2016-2775
2103| CVE-2016-1285 4.3 https://vulners.com/cve/CVE-2016-1285
2104| CVE-2018-5741 4.0 https://vulners.com/cve/CVE-2018-5741
2105| CVE-2016-6170 4.0 https://vulners.com/cve/CVE-2016-6170
2106|_ CVE-2018-5745 3.5 https://vulners.com/cve/CVE-2018-5745
210767/udp filtered dhcps
210868/udp filtered dhcpc
210969/udp filtered tftp
211088/udp filtered kerberos-sec
2111123/udp filtered ntp
2112137/udp filtered netbios-ns
2113138/udp filtered netbios-dgm
2114139/udp filtered netbios-ssn
2115161/udp filtered snmp
2116162/udp filtered snmptrap
2117389/udp filtered ldap
2118500/udp filtered isakmp
2119520/udp filtered route
21202049/udp filtered nfs
2121Too many fingerprints match this host to give specific OS details
2122Network Distance: 12 hops
2123Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
2124
2125TRACEROUTE (using port 500/udp)
2126HOP RTT ADDRESS
21271 137.46 ms 10.203.39.1
21282 ...
21293 140.27 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
21304 134.49 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
21315 139.88 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
21326 154.89 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
21337 171.09 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
21348 170.89 ms be3457.ccr21.ams04.atlas.cogentco.com (130.117.1.10)
21359 173.32 ms 149.11.39.189
213610 173.31 ms 185.8.179.40
213711 173.37 ms 185.8.177.33
213812 174.20 ms teens-sins.net (37.1.207.121)
2139
2140NSE: Script Post-scanning.
2141Initiating NSE at 01:03
2142Completed NSE at 01:03, 0.00s elapsed
2143Initiating NSE at 01:03
2144Completed NSE at 01:03, 0.00s elapsed
2145######################################################################################################################################
2146Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-27 23:07 EST
2147Nmap scan report for teens-sins.net (37.1.207.121)
2148Host is up (0.17s latency).
2149Not shown: 463 filtered ports, 3 closed ports
2150Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
2151PORT STATE SERVICE VERSION
215225/tcp open smtp Exim smtpd 4.92
2153| smtp-commands: default.domain Hello teens-sins.net [45.132.192.53], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, CHUNKING, STARTTLS, HELP,
2154|_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
2155| ssl-cert: Subject: commonName=server.domain.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
2156| Not valid before: 2018-06-07T13:03:54
2157|_Not valid after: 2028-06-04T13:03:54
2158|_ssl-date: TLS randomness does not represent time
215953/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
2160| dns-nsid:
2161|_ bind.version: 9.9.4-RedHat-9.9.4-61.el7
216280/tcp open http nginx 1.14.1
2163|_http-server-header: nginx/1.14.1
2164|_http-title: FREE PHOTO and VIDEO PORN GALLERY teen sins
2165110/tcp open pop3 Dovecot pop3d
2166|_pop3-capabilities: AUTH-RESP-CODE PIPELINING RESP-CODES CAPA STLS UIDL USER TOP SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5)
2167|_ssl-date: TLS randomness does not represent time
2168143/tcp open imap Dovecot imapd
2169|_imap-capabilities: Pre-login listed AUTH=DIGEST-MD5 OK have post-login AUTH=PLAIN LOGIN-REFERRALS STARTTLS ID IDLE AUTH=CRAM-MD5A0001 LITERAL+ capabilities AUTH=LOGIN more SASL-IR IMAP4rev1 ENABLE
2170|_ssl-date: TLS randomness does not represent time
2171465/tcp open ssl/smtp Exim smtpd 4.92
2172|_smtp-commands: Couldn't establish connection on port 465
2173| ssl-cert: Subject: commonName=server.domain.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
2174| Not valid before: 2018-06-07T13:03:54
2175|_Not valid after: 2028-06-04T13:03:54
2176|_ssl-date: TLS randomness does not represent time
2177587/tcp open smtp Exim smtpd 4.92
2178| smtp-commands: default.domain Hello teens-sins.net [45.132.192.53], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, CHUNKING, STARTTLS, HELP,
2179|_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
2180| ssl-cert: Subject: commonName=server.domain.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
2181| Not valid before: 2018-06-07T13:03:54
2182|_Not valid after: 2028-06-04T13:03:54
2183|_ssl-date: TLS randomness does not represent time
2184993/tcp open ssl/imaps?
2185|_ssl-date: TLS randomness does not represent time
2186995/tcp open ssl/pop3s?
2187|_ssl-date: TLS randomness does not represent time
21888085/tcp open http Apache httpd 2.4.6 ((CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.4.16)
2189| http-methods:
2190|_ Potentially risky methods: TRACE
2191|_http-server-header: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.4.16
2192|_http-title: Index of /
2193Aggressive OS guesses: Linux 3.10 - 4.11 (94%), Linux 3.2 - 4.9 (91%), Linux 3.13 (90%), Linux 3.13 or 4.2 (90%), Linux 4.10 (90%), Linux 4.2 (90%), Linux 4.4 (90%), Asus RT-AC66U WAP (90%), Linux 3.10 (90%), Linux 3.11 - 3.12 (90%)
2194No exact OS matches for host (test conditions non-ideal).
2195Network Distance: 12 hops
2196Service Info: Host: default.domain; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
2197
2198TRACEROUTE (using port 110/tcp)
2199HOP RTT ADDRESS
22001 137.62 ms 10.203.3.1
22012 ...
22023 138.22 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
22034 138.05 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
22045 143.27 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190)
22056 158.49 ms be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1)
22067 174.31 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
22078 174.93 ms be3458.ccr21.ams04.atlas.cogentco.com (154.54.39.186)
22089 173.51 ms 149.11.39.188
220910 176.55 ms 185.8.179.40
221011 176.50 ms 185.8.177.35
221112 166.07 ms teens-sins.net (37.1.207.121)
2212######################################################################################################################################
2213Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-27 23:10 EST
2214Warning: 37.1.207.121 giving up on port because retransmission cap hit (2).
2215Nmap scan report for teens-sins.net (37.1.207.121)
2216Host is up (0.16s latency).
2217Not shown: 16 filtered ports
2218Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
2219PORT STATE SERVICE VERSION
222053/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
222153/udp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
2222| dns-nsid:
2223|_ bind.version: 9.9.4-RedHat-9.9.4-61.el7
222468/udp open|filtered dhcpc
222569/udp open|filtered tftp
2226123/udp open|filtered ntp
2227138/udp open|filtered netbios-dgm
2228139/udp open|filtered netbios-ssn
2229161/udp open|filtered snmp
2230162/udp open|filtered snmptrap
2231389/udp open|filtered ldap
2232520/udp open|filtered route
22332049/udp open|filtered nfs
2234Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2235Aggressive OS guesses: Linux 3.10 - 4.11 (92%), Linux 3.2 - 4.9 (92%), Linux 3.18 (90%), Crestron XPanel control system (90%), Linux 3.16 (89%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), Linux 3.2 (87%), HP P2000 G3 NAS device (87%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (87%)
2236No exact OS matches for host (test conditions non-ideal).
2237Network Distance: 12 hops
2238Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
2239
2240TRACEROUTE (using port 53/tcp)
2241HOP RTT ADDRESS
22421 137.03 ms 10.203.3.1
22432 ...
22443 137.64 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
22454 137.40 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
22465 143.03 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190)
22476 157.74 ms be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1)
22487 173.84 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
22498 170.62 ms be3458.ccr21.ams04.atlas.cogentco.com (154.54.39.186)
22509 173.23 ms 149.11.39.188
225110 169.70 ms 185.8.179.39
225211 180.84 ms 185.8.177.33
225312 173.65 ms teens-sins.net (37.1.207.121)
2254######################################################################################################################################
2255Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-27 23:11 EST
2256NSE: [smtp-brute] usernames: Time limit 3m00s exceeded.
2257NSE: [smtp-brute] usernames: Time limit 3m00s exceeded.
2258NSE: [smtp-brute] passwords: Time limit 3m00s exceeded.
2259Nmap scan report for teens-sins.net (37.1.207.121)
2260Host is up (0.15s latency).
2261
2262PORT STATE SERVICE VERSION
226325/tcp open smtp Exim smtpd 4.92
2264| smtp-brute:
2265| Accounts: No valid accounts found
2266|_ Statistics: Performed 1809 guesses in 184 seconds, average tps: 9.5
2267| smtp-commands: default.domain Hello teens-sins.net [45.132.192.53], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, CHUNKING, STARTTLS, HELP,
2268|_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
2269| smtp-enum-users:
2270|_ Couldn't find any accounts
2271|_smtp-open-relay: SMTP RSET: failed to receive data: connection closed
2272| smtp-vuln-cve2010-4344:
2273| Exim version: 4.92
2274| Exim heap overflow vulnerability (CVE-2010-4344):
2275| Exim (CVE-2010-4344): NOT VULNERABLE
2276| Exim privileges escalation vulnerability (CVE-2010-4345):
2277| Exim (CVE-2010-4345): NOT VULNERABLE
2278|_ To confirm and exploit the vulnerabilities, run with --script-args='smtp-vuln-cve2010-4344.exploit'
2279Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2280Aggressive OS guesses: Linux 3.10 - 4.11 (91%), Linux 3.18 (91%), Linux 3.2 - 4.9 (91%), Crestron XPanel control system (89%), Linux 3.16 (88%), HP P2000 G3 NAS device (86%), ASUS RT-N56U WAP (Linux 3.4) (86%), Linux 3.1 (86%), Linux 3.2 (86%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (86%)
2281No exact OS matches for host (test conditions non-ideal).
2282Network Distance: 12 hops
2283Service Info: Host: default.domain
2284
2285TRACEROUTE (using port 25/tcp)
2286HOP RTT ADDRESS
22871 234.57 ms 10.203.3.1
22882 ...
22893 235.14 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
22904 234.94 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
22915 241.39 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
22926 259.04 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
22937 270.98 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
22948 271.39 ms be3457.ccr21.ams04.atlas.cogentco.com (130.117.1.10)
22959 275.23 ms 149.11.39.189
229610 ...
229711 220.41 ms 185.8.177.35
229812 215.92 ms teens-sins.net (37.1.207.121)
2299######################################################################################################################################
2300Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-27 23:15 EST
2301Nmap scan report for teens-sins.net (37.1.207.121)
2302Host is up (0.18s latency).
2303
2304PORT STATE SERVICE VERSION
230553/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
2306|_dns-fuzz: Server didn't response to our probe, can't fuzz
2307| dns-nsec-enum:
2308|_ No NSEC records found
2309| dns-nsec3-enum:
2310|_ DNSSEC NSEC3 not supported
2311| dns-nsid:
2312|_ bind.version: 9.9.4-RedHat-9.9.4-61.el7
2313| dns-zone-transfer:
2314| teens-sins.net. SOA server.domain.com. root.teens-sins.net.
2315| teens-sins.net. MX 10 mail.teens-sins.net.
2316| teens-sins.net. MX 20 mail.teens-sins.net.
2317| teens-sins.net. TXT "v=spf1 ip4:37.1.207.121 ip4:5.45.71.91 a mx ~all"
2318| teens-sins.net. A 37.1.207.121
2319| teens-sins.net. NS ns1.rus-sex-girls.net.
2320| teens-sins.net. NS ns2.rus-sex-girls.net.
2321| _dmarc.teens-sins.net. TXT "v=DMARC1; p=none"
2322| ftp.teens-sins.net. A 5.45.71.91
2323| mail.teens-sins.net. A 37.1.207.121
2324| ns1.teens-sins.net. A 37.1.207.121
2325| ns2.teens-sins.net. A 37.1.207.121
2326| pop.teens-sins.net. A 37.1.207.121
2327| smtp.teens-sins.net. A 37.1.207.121
2328| www.teens-sins.net. A 37.1.207.121
2329|_teens-sins.net. SOA server.domain.com. root.teens-sins.net.
2330Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2331Aggressive OS guesses: Linux 3.10 - 4.11 (94%), Linux 3.18 (94%), Linux 3.2 - 4.9 (94%), Crestron XPanel control system (93%), Linux 3.16 (93%), ASUS RT-N56U WAP (Linux 3.4) (92%), Oracle VM Server 3.4.2 (Linux 4.1) (90%), Linux 3.12 (90%), Linux 3.13 (90%), Linux 3.13 - 3.16 (90%)
2332No exact OS matches for host (test conditions non-ideal).
2333Network Distance: 12 hops
2334Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
2335
2336Host script results:
2337| dns-blacklist:
2338| SPAM
2339| spam.dnsbl.sorbs.net - SPAM
2340| dnsbl.inps.de - SPAM
2341| Spam Received See: http://www.sorbs.net/lookup.shtml?37.1.207.121
2342|_ l2.apews.org - SPAM
2343| dns-brute:
2344| DNS Brute-force hostnames:
2345| ns1.teens-sins.net - 37.1.207.121
2346| ns2.teens-sins.net - 37.1.207.121
2347| mail.teens-sins.net - 37.1.207.121
2348| www.teens-sins.net - 37.1.207.121
2349| ftp.teens-sins.net - 5.45.71.91
2350|_ smtp.teens-sins.net - 37.1.207.121
2351
2352TRACEROUTE (using port 53/tcp)
2353HOP RTT ADDRESS
23541 134.59 ms 10.203.3.1
23552 ...
23563 135.48 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
23574 135.42 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
23585 140.26 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
23596 160.06 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
23607 169.79 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
23618 170.04 ms be3457.ccr21.ams04.atlas.cogentco.com (130.117.1.10)
23629 ... 10
236311 219.23 ms 185.8.177.33
236412 217.46 ms teens-sins.net (37.1.207.121)
2365#####################################################################################################################################
2366Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-27 23:16 EST
2367Nmap scan report for teens-sins.net (37.1.207.121)
2368Host is up (0.17s latency).
2369
2370PORT STATE SERVICE VERSION
237168/tcp filtered dhcpc
237268/udp filtered dhcpc
2373Too many fingerprints match this host to give specific OS details
2374Network Distance: 12 hops
2375
2376TRACEROUTE (using port 68/udp)
2377HOP RTT ADDRESS
23781 137.14 ms 10.203.3.1
23792 ...
23803 137.85 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
23814 137.23 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
23825 142.21 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
23836 157.94 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
23847 169.38 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
23858 169.40 ms be3457.ccr21.ams04.atlas.cogentco.com (130.117.1.10)
23869 168.55 ms 149.11.39.188
238710 175.56 ms 185.8.179.40
238811 180.59 ms 185.8.177.33
238912 172.44 ms teens-sins.net (37.1.207.121)
2390######################################################################################################################################
2391Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-27 23:16 EST
2392Nmap scan report for teens-sins.net (37.1.207.121)
2393Host is up (0.17s latency).
2394
2395PORT STATE SERVICE VERSION
239669/tcp filtered tftp
239769/udp filtered tftp
2398Too many fingerprints match this host to give specific OS details
2399Network Distance: 14 hops
2400
2401TRACEROUTE (using port 69/udp)
2402HOP RTT ADDRESS
24031 144.29 ms 10.203.3.1
24042 ...
24053 144.75 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
24064 144.38 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
24075 146.42 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190)
24086 163.98 ms be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1)
24097 173.50 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
24108 173.71 ms be3458.ccr21.ams04.atlas.cogentco.com (154.54.39.186)
24119 178.09 ms 149.11.39.189
241210 ...
241311 195.47 ms 185.8.177.33
241412 ... 13
241514 180.50 ms teens-sins.net (37.1.207.121)
2416######################################################################################################################################
2417http://37.1.207.121 [200 OK] Country[UKRAINE][UA], HTTPServer[nginx/1.14.1], IP[37.1.207.121], PHP[7.2.5], Script[JavaScript,text/javascript], Title[FREE PHOTO PORN GALLERY ART NUDE], X-Powered-By[PHP/7.2.5], nginx[1.14.1]
2418#####################################################################################################################################
2419
2420wig - WebApp Information Gatherer
2421
2422
2423Scanning http://37.1.207.121...
2424______________________________________________ SITE INFO ______________________________________________
2425IP Title
242637.1.207.121 FREE PHOTO PORN GALLERY ART NUDE
2427
2428_______________________________________________ VERSION _______________________________________________
2429Name Versions Type
2430Roundcube CMS
2431Apache 2.4.10 | 2.4.11 | 2.4.12 | 2.4.5 | 2.4.6 | 2.4.7 | 2.4.8 Platform
2432 2.4.9
2433PHP 7.2.5 Platform
2434nginx 1.14.1 Platform
2435CentOS 7-1511 | 7.0-1406 | 7.1-1503 OS
2436Red Hat Enterprise Linux RHEL-7.0 | RHEL-7.1 | RHEL-7.2 OS
2437Scientific Linux 7.0 | 7.1 | 7.2 OS
2438
2439________________________________________ PLATFORM OBSERVATIONS ________________________________________
2440Platform URL Type
2441PHP 5.4.16 /roundcube/ Observation
2442PHP 7.2.5 Observation
2443
2444_______________________________________________________________________________________________________
2445Time: 34.4 sec Urls: 525 Fingerprints: 40401
2446######################################################################################################################################
2447HTTP/1.1 200 OK
2448Server: nginx/1.14.1
2449Date: Fri, 28 Feb 2020 04:17:31 GMT
2450Content-Type: text/html; charset=UTF-8
2451Connection: keep-alive
2452X-Powered-By: PHP/7.2.5
2453
2454HTTP/1.1 200 OK
2455Server: nginx/1.14.1
2456Date: Fri, 28 Feb 2020 04:17:32 GMT
2457Content-Type: text/html; charset=UTF-8
2458Connection: keep-alive
2459X-Powered-By: PHP/7.2.5
2460#####################################################################################################################################
2461Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-27 23:17 EST
2462NSE: [pop3-brute] usernames: Time limit 3m00s exceeded.
2463NSE: [pop3-brute] usernames: Time limit 3m00s exceeded.
2464NSE: [pop3-brute] passwords: Time limit 3m00s exceeded.
2465Nmap scan report for teens-sins.net (37.1.207.121)
2466Host is up (0.17s latency).
2467
2468PORT STATE SERVICE VERSION
2469110/tcp open pop3 Dovecot pop3d
2470| pop3-brute:
2471| Accounts: No valid accounts found
2472|_ Statistics: Performed 231 guesses in 197 seconds, average tps: 1.1
2473|_pop3-capabilities: UIDL AUTH-RESP-CODE USER CAPA RESP-CODES TOP PIPELINING STLS SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5)
2474Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2475Aggressive OS guesses: Linux 3.10 - 4.11 (92%), Linux 3.2 - 4.9 (92%), Linux 3.18 (90%), Crestron XPanel control system (90%), Linux 3.16 (89%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), Linux 3.2 (87%), HP P2000 G3 NAS device (87%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (87%)
2476No exact OS matches for host (test conditions non-ideal).
2477Network Distance: 12 hops
2478
2479TRACEROUTE (using port 110/tcp)
2480HOP RTT ADDRESS
24811 138.18 ms 10.203.3.1
24822 ...
24833 138.56 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
24844 138.56 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
24855 143.64 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190)
24866 158.44 ms be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1)
24877 174.87 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
24888 174.45 ms be3458.ccr21.ams04.atlas.cogentco.com (154.54.39.186)
24899 ... 10
249011 177.66 ms 185.8.177.35
249112 173.46 ms teens-sins.net (37.1.207.121)
2492######################################################################################################################################
2493Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-27 23:21 EST
2494Nmap scan report for teens-sins.net (37.1.207.121)
2495Host is up (0.17s latency).
2496
2497PORT STATE SERVICE VERSION
2498123/tcp filtered ntp
2499123/udp filtered ntp
2500Too many fingerprints match this host to give specific OS details
2501Network Distance: 12 hops
2502
2503TRACEROUTE (using port 123/udp)
2504HOP RTT ADDRESS
25051 137.20 ms 10.203.3.1
25062 ...
25073 137.31 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
25084 137.32 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
25095 142.36 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190)
25106 156.95 ms be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1)
25117 169.06 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
25128 169.79 ms be3458.ccr21.ams04.atlas.cogentco.com (154.54.39.186)
25139 167.79 ms 149.11.39.186
251410 172.59 ms 185.8.179.40
251511 182.49 ms 185.8.177.33
251612 180.42 ms teens-sins.net (37.1.207.121)
2517#####################################################################################################################################
2518+---------------+--------------------------------------+--------------------------------------------------+-----------+-----------+
2519| App Name | URL to Application | Potential Exploit | Username | Password |
2520+---------------+--------------------------------------+--------------------------------------------------+-----------+-----------+
2521| Apache Tomcat | https://37.1.207.121:1500/manager | ./exploits/multi/http/tomcat_mgr_upload.rb | <None> | <None> |
2522| phpMyAdmin | http://37.1.207.121:8085/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | Not Found | Not Found |
2523+---------------+--------------------------------------+--------------------------------------------------+-----------+-----------+
2524####################################################################################################################################
2525Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-27 23:33 EST
2526Warning: 37.1.207.121 giving up on port because retransmission cap hit (2).
2527Nmap scan report for teens-sins.net (37.1.207.121)
2528Host is up (0.16s latency).
2529
2530PORT STATE SERVICE VERSION
253153/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
253267/tcp filtered dhcps
253368/tcp filtered dhcpc
253469/tcp filtered tftp
253588/tcp filtered kerberos-sec
2536123/tcp filtered ntp
2537137/tcp filtered netbios-ns
2538138/tcp filtered netbios-dgm
2539139/tcp filtered netbios-ssn
2540161/tcp filtered snmp
2541162/tcp filtered snmptrap
2542389/tcp filtered ldap
2543520/tcp filtered efs
25442049/tcp filtered nfs
254553/udp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
2546| dns-nsid:
2547|_ bind.version: 9.9.4-RedHat-9.9.4-61.el7
254867/udp open|filtered dhcps
254968/udp filtered dhcpc
255069/udp open|filtered tftp
255188/udp filtered kerberos-sec
2552123/udp open|filtered ntp
2553137/udp open|filtered netbios-ns
2554138/udp open|filtered netbios-dgm
2555139/udp open|filtered netbios-ssn
2556161/udp open|filtered snmp
2557162/udp open|filtered snmptrap
2558389/udp open|filtered ldap
2559520/udp open|filtered route
25602049/udp filtered nfs
2561Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2562Aggressive OS guesses: Crestron XPanel control system (93%), Linux 3.16 (93%), ASUS RT-N56U WAP (Linux 3.4) (92%), Linux 3.10 - 4.11 (90%), Linux 3.12 (90%), Linux 3.13 (90%), Linux 3.13 or 4.2 (90%), Linux 3.18 (90%), Linux 3.2 - 4.9 (90%), DD-WRT (Linux 3.18) (90%)
2563No exact OS matches for host (test conditions non-ideal).
2564Network Distance: 12 hops
2565Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
2566
2567TRACEROUTE (using port 53/tcp)
2568HOP RTT ADDRESS
25691 135.16 ms 10.203.3.1
25702 ...
25713 135.77 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
25724 135.30 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
25735 140.91 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
25746 155.74 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
25757 171.73 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
25768 171.74 ms be3457.ccr21.ams04.atlas.cogentco.com (130.117.1.10)
25779 ... 10
257811 175.92 ms 185.8.177.35
257912 171.04 ms teens-sins.net (37.1.207.121)
2580#####################################################################################################################################
2581Hosts
2582=====
2583
2584address mac name os_name os_flavor os_sp purpose info comments
2585------- --- ---- ------- --------- ----- ------- ---- --------
258637.1.207.121 teens-sins.net 2-Series 3.X device
258745.88.202.111 Linux 3.X server
258864.69.94.253 Unknown device
258969.163.233.4 ps54052.dreamhostps.com Linux 14.04 server
259074.117.180.192 embedded device
259192.123.250.35 a92-123-250-35.deploy.static.akamaitechnologies.com embedded device
259292.123.250.65 a92-123-250-65.deploy.static.akamaitechnologies.com Linux 3.X server
2593149.126.72.220 149.126.72.220.ip.incapdns.net Linux 3.X server
2594151.106.38.107 ns3152160.ip-151-106-38.eu embedded device
2595158.69.13.254 ip254.ip-158-69-13.net 2-Series 2.6.X device
2596162.244.35.13 xnlog.com FreeBSD 7.X device
2597169.239.218.20 cp10.domains.co.za Linux 2.6.X server
2598173.214.244.169 173.214.244.169.serverel.net Unknown device
2599174.142.53.51 mail.marineland.ca Linux 3.X server
2600207.246.147.189 2-Series device
2601207.246.147.190 Linux 4.X server
2602207.246.147.247 Linux 4.X server
2603207.246.147.248 Linux 4.X server
2604211.13.196.135 sv3.isle.ne.jp Linux 2.6.X server
2605218.45.5.97 www.town.koya.wakayama.jp Linux 2.6.X server
2606#####################################################################################################################################
2607Services
2608========
2609
2610host port proto name state info
2611---- ---- ----- ---- ----- ----
261237.1.207.121 53 tcp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
261337.1.207.121 53 udp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
261437.1.207.121 67 tcp dhcps filtered
261537.1.207.121 67 udp dhcps unknown
261637.1.207.121 68 tcp dhcpc filtered
261737.1.207.121 68 udp dhcpc filtered
261837.1.207.121 69 tcp tftp filtered
261937.1.207.121 69 udp tftp unknown
262037.1.207.121 88 tcp kerberos-sec filtered
262137.1.207.121 88 udp kerberos-sec filtered
262237.1.207.121 123 tcp ntp filtered
262337.1.207.121 123 udp ntp unknown
262437.1.207.121 137 tcp netbios-ns filtered
262537.1.207.121 137 udp netbios-ns unknown
262637.1.207.121 138 tcp netbios-dgm filtered
262737.1.207.121 138 udp netbios-dgm unknown
262837.1.207.121 139 tcp netbios-ssn filtered
262937.1.207.121 139 udp netbios-ssn unknown
263037.1.207.121 161 tcp snmp filtered
263137.1.207.121 161 udp snmp unknown
263237.1.207.121 162 tcp snmptrap filtered
263337.1.207.121 162 udp snmptrap unknown
263437.1.207.121 389 tcp ldap filtered
263537.1.207.121 389 udp ldap unknown
263637.1.207.121 520 tcp efs filtered
263737.1.207.121 520 udp route unknown
263837.1.207.121 2049 tcp nfs filtered
263937.1.207.121 2049 udp nfs filtered
264045.88.202.111 22 tcp ssh open OpenSSH 7.9p1 Debian 10+deb10u1 protocol 2.0
264145.88.202.111 53 tcp domain open PowerDNS Authoritative Server 4.2.0-rc3
264245.88.202.111 53 udp domain open PowerDNS Authoritative Server 4.2.0-rc3
264345.88.202.111 67 tcp dhcps closed
264445.88.202.111 67 udp dhcps unknown
264545.88.202.111 68 tcp dhcpc closed
264645.88.202.111 68 udp dhcpc unknown
264745.88.202.111 69 tcp tftp closed
264845.88.202.111 69 udp tftp closed
264945.88.202.111 80 tcp http open nginx
265045.88.202.111 88 tcp kerberos-sec closed
265145.88.202.111 88 udp kerberos-sec unknown
265245.88.202.111 123 tcp ntp closed
265345.88.202.111 123 udp ntp closed
265445.88.202.111 137 tcp netbios-ns closed
265545.88.202.111 137 udp netbios-ns filtered
265645.88.202.111 138 tcp netbios-dgm closed
265745.88.202.111 138 udp netbios-dgm filtered
265845.88.202.111 139 tcp netbios-ssn closed
265945.88.202.111 139 udp netbios-ssn closed
266045.88.202.111 161 tcp snmp closed
266145.88.202.111 161 udp snmp closed
266245.88.202.111 162 tcp snmptrap closed
266345.88.202.111 162 udp snmptrap closed
266445.88.202.111 179 tcp bgp filtered
266545.88.202.111 389 tcp ldap closed
266645.88.202.111 389 udp ldap unknown
266745.88.202.111 443 tcp ssl/http open nginx
266845.88.202.111 520 tcp efs closed
266945.88.202.111 520 udp route unknown
267045.88.202.111 2049 tcp nfs closed
267145.88.202.111 2049 udp nfs closed
267245.88.202.111 10050 tcp tcpwrapped open
267364.69.94.253 53 tcp domain filtered
267464.69.94.253 53 udp domain unknown
267564.69.94.253 67 tcp dhcps filtered
267664.69.94.253 67 udp dhcps unknown
267764.69.94.253 68 tcp dhcpc filtered
267864.69.94.253 68 udp dhcpc unknown
267964.69.94.253 69 tcp tftp filtered
268064.69.94.253 69 udp tftp unknown
268164.69.94.253 88 tcp kerberos-sec filtered
268264.69.94.253 88 udp kerberos-sec unknown
268364.69.94.253 123 tcp ntp filtered
268464.69.94.253 123 udp ntp unknown
268564.69.94.253 137 tcp netbios-ns filtered
268664.69.94.253 137 udp netbios-ns unknown
268764.69.94.253 138 tcp netbios-dgm filtered
268864.69.94.253 138 udp netbios-dgm unknown
268964.69.94.253 139 tcp netbios-ssn filtered
269064.69.94.253 139 udp netbios-ssn unknown
269164.69.94.253 161 tcp snmp filtered
269264.69.94.253 161 udp snmp unknown
269364.69.94.253 162 tcp snmptrap filtered
269464.69.94.253 162 udp snmptrap unknown
269564.69.94.253 389 tcp ldap filtered
269664.69.94.253 389 udp ldap unknown
269764.69.94.253 520 tcp efs filtered
269864.69.94.253 520 udp route unknown
269964.69.94.253 2049 tcp nfs filtered
270064.69.94.253 2049 udp nfs unknown
270169.163.233.4 21 tcp ftp open 220 DreamHost FTP Server\x0d\x0a
270269.163.233.4 22 tcp ssh open SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.13
270369.163.233.4 25 tcp open
270469.163.233.4 53 tcp domain closed
270569.163.233.4 53 udp domain unknown
270669.163.233.4 67 tcp dhcps closed
270769.163.233.4 67 udp dhcps closed
270869.163.233.4 68 tcp dhcpc closed
270969.163.233.4 68 udp dhcpc unknown
271069.163.233.4 69 tcp tftp closed
271169.163.233.4 69 udp tftp closed
271269.163.233.4 88 tcp kerberos-sec closed
271369.163.233.4 88 udp kerberos-sec unknown
271469.163.233.4 123 tcp ntp closed
271569.163.233.4 123 udp ntp unknown
271669.163.233.4 137 tcp netbios-ns closed
271769.163.233.4 137 udp netbios-ns closed
271869.163.233.4 138 tcp netbios-dgm closed
271969.163.233.4 138 udp netbios-dgm closed
272069.163.233.4 139 tcp netbios-ssn closed
272169.163.233.4 139 udp netbios-ssn unknown
272269.163.233.4 161 tcp snmp closed
272369.163.233.4 161 udp snmp closed
272469.163.233.4 162 tcp snmptrap closed
272569.163.233.4 162 udp snmptrap closed
272669.163.233.4 389 tcp ldap closed
272769.163.233.4 389 udp ldap unknown
272869.163.233.4 520 tcp efs closed
272969.163.233.4 520 udp route closed
273069.163.233.4 2049 tcp nfs closed
273169.163.233.4 2049 udp nfs unknown
273274.117.180.192 21 tcp ftp filtered 220 Hello.\x0d\x0a
273374.117.180.192 22 tcp ssh filtered
273474.117.180.192 25 tcp smtp filtered
273574.117.180.192 53 tcp domain closed
273674.117.180.192 53 udp domain unknown
273774.117.180.192 67 tcp dhcps closed
273874.117.180.192 67 udp dhcps unknown
273974.117.180.192 68 tcp dhcpc closed
274074.117.180.192 68 udp dhcpc closed
274174.117.180.192 69 tcp tftp closed
274274.117.180.192 69 udp tftp closed
274374.117.180.192 80 tcp http filtered
274474.117.180.192 88 tcp kerberos-sec closed
274574.117.180.192 88 udp kerberos-sec closed
274674.117.180.192 110 tcp pop3 filtered
274774.117.180.192 111 tcp rpcbind filtered
274874.117.180.192 123 tcp ntp closed
274974.117.180.192 123 udp ntp unknown
275074.117.180.192 137 tcp netbios-ns closed
275174.117.180.192 137 udp netbios-ns closed
275274.117.180.192 138 tcp netbios-dgm closed
275374.117.180.192 138 udp netbios-dgm unknown
275474.117.180.192 139 tcp netbios-ssn closed
275574.117.180.192 139 udp netbios-ssn unknown
275674.117.180.192 143 tcp imap filtered
275774.117.180.192 161 tcp snmp closed
275874.117.180.192 161 udp snmp closed
275974.117.180.192 162 tcp snmptrap closed
276074.117.180.192 162 udp snmptrap unknown
276174.117.180.192 323 tcp rpki-rtr filtered
276274.117.180.192 389 tcp ldap closed
276374.117.180.192 389 udp ldap closed
276474.117.180.192 443 tcp https filtered
276574.117.180.192 465 tcp ssl/smtp open Exim smtpd 4.92.3
276674.117.180.192 520 tcp efs closed
276774.117.180.192 520 udp route unknown
276874.117.180.192 587 tcp submission filtered
276974.117.180.192 873 tcp rsync filtered
277074.117.180.192 993 tcp imaps filtered
277174.117.180.192 995 tcp pop3s filtered
277274.117.180.192 2049 tcp nfs closed
277374.117.180.192 2049 udp nfs closed
277474.117.180.192 2525 tcp smtp open Exim smtpd
277574.117.180.192 3306 tcp mysql filtered
277674.117.180.192 4949 tcp tcpwrapped open
277774.117.180.192 5666 tcp tcpwrapped open
277874.117.180.192 6380 tcp filtered
277974.117.180.192 9306 tcp sphinx-search open Sphinx Search daemon 2.1.5-id64-release
278074.117.180.192 11211 tcp memcache filtered
278192.123.250.35 53 tcp domain closed
278292.123.250.35 53 udp domain closed
278392.123.250.35 67 tcp dhcps filtered
278492.123.250.35 67 udp dhcps unknown
278592.123.250.35 68 tcp dhcpc filtered
278692.123.250.35 68 udp dhcpc unknown
278792.123.250.35 69 tcp tftp filtered
278892.123.250.35 69 udp tftp unknown
278992.123.250.35 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
279092.123.250.35 88 tcp kerberos-sec filtered
279192.123.250.35 88 udp kerberos-sec unknown
279292.123.250.35 123 tcp ntp filtered
279392.123.250.35 123 udp ntp unknown
279492.123.250.35 137 tcp netbios-ns filtered
279592.123.250.35 137 udp netbios-ns unknown
279692.123.250.35 138 tcp netbios-dgm filtered
279792.123.250.35 138 udp netbios-dgm unknown
279892.123.250.35 139 tcp netbios-ssn filtered
279992.123.250.35 139 udp netbios-ssn unknown
280092.123.250.35 161 tcp snmp filtered
280192.123.250.35 161 udp snmp unknown
280292.123.250.35 162 tcp snmptrap filtered
280392.123.250.35 162 udp snmptrap unknown
280492.123.250.35 389 tcp ldap filtered
280592.123.250.35 389 udp ldap unknown
280692.123.250.35 443 tcp ssl/https open
280792.123.250.35 520 tcp efs filtered
280892.123.250.35 520 udp route unknown
280992.123.250.35 2049 tcp nfs filtered
281092.123.250.35 2049 udp nfs unknown
281192.123.250.35 8883 tcp secure-mqtt open
281292.123.250.65 53 tcp domain filtered
281392.123.250.65 53 udp domain unknown
281492.123.250.65 67 tcp dhcps filtered
281592.123.250.65 67 udp dhcps unknown
281692.123.250.65 68 tcp dhcpc filtered
281792.123.250.65 68 udp dhcpc unknown
281892.123.250.65 69 tcp tftp filtered
281992.123.250.65 69 udp tftp unknown
282092.123.250.65 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
282192.123.250.65 88 tcp kerberos-sec filtered
282292.123.250.65 88 udp kerberos-sec unknown
282392.123.250.65 123 tcp ntp filtered
282492.123.250.65 123 udp ntp unknown
282592.123.250.65 137 tcp netbios-ns filtered
282692.123.250.65 137 udp netbios-ns unknown
282792.123.250.65 138 tcp netbios-dgm filtered
282892.123.250.65 138 udp netbios-dgm unknown
282992.123.250.65 139 tcp netbios-ssn filtered
283092.123.250.65 139 udp netbios-ssn unknown
283192.123.250.65 161 tcp snmp filtered
283292.123.250.65 161 udp snmp unknown
283392.123.250.65 162 tcp snmptrap filtered
283492.123.250.65 162 udp snmptrap unknown
283592.123.250.65 389 tcp ldap filtered
283692.123.250.65 389 udp ldap unknown
283792.123.250.65 443 tcp ssl/https open
283892.123.250.65 520 tcp efs filtered
283992.123.250.65 520 udp route unknown
284092.123.250.65 2049 tcp nfs filtered
284192.123.250.65 2049 udp nfs unknown
284292.123.250.65 8883 tcp secure-mqtt open
2843149.126.72.220 25 tcp smtp closed
2844149.126.72.220 51 tcp tcpwrapped open
2845149.126.72.220 53 tcp domain open
2846149.126.72.220 53 udp domain open
2847149.126.72.220 65 tcp tcpwrapped open
2848149.126.72.220 66 tcp tcpwrapped open
2849149.126.72.220 67 tcp dhcps filtered
2850149.126.72.220 67 udp dhcps unknown
2851149.126.72.220 68 tcp dhcpc filtered
2852149.126.72.220 68 udp dhcpc unknown
2853149.126.72.220 69 tcp tftp filtered
2854149.126.72.220 69 udp tftp unknown
2855149.126.72.220 80 tcp tcpwrapped open
2856149.126.72.220 81 tcp tcpwrapped open
2857149.126.72.220 82 tcp tcpwrapped open
2858149.126.72.220 83 tcp tcpwrapped open
2859149.126.72.220 84 tcp tcpwrapped open
2860149.126.72.220 85 tcp tcpwrapped open
2861149.126.72.220 86 tcp tcpwrapped open
2862149.126.72.220 88 tcp http open Incapsula CDN httpd
2863149.126.72.220 88 udp kerberos-sec unknown
2864149.126.72.220 89 tcp tcpwrapped open
2865149.126.72.220 90 tcp tcpwrapped open
2866149.126.72.220 91 tcp tcpwrapped open
2867149.126.72.220 92 tcp tcpwrapped open
2868149.126.72.220 98 tcp tcpwrapped open
2869149.126.72.220 99 tcp tcpwrapped open
2870149.126.72.220 123 tcp ntp filtered
2871149.126.72.220 123 udp ntp unknown
2872149.126.72.220 137 tcp netbios-ns filtered
2873149.126.72.220 137 udp netbios-ns filtered
2874149.126.72.220 138 tcp netbios-dgm filtered
2875149.126.72.220 138 udp netbios-dgm filtered
2876149.126.72.220 139 tcp netbios-ssn closed
2877149.126.72.220 139 udp netbios-ssn unknown
2878149.126.72.220 160 tcp sgmp-traps closed
2879149.126.72.220 161 tcp snmp filtered
2880149.126.72.220 161 udp snmp unknown
2881149.126.72.220 162 tcp snmptrap filtered
2882149.126.72.220 162 udp snmptrap unknown
2883149.126.72.220 189 tcp tcpwrapped open
2884149.126.72.220 190 tcp tcpwrapped open
2885149.126.72.220 192 tcp tcpwrapped open
2886149.126.72.220 243 tcp tcpwrapped open
2887149.126.72.220 285 tcp tcpwrapped open
2888149.126.72.220 314 tcp tcpwrapped open
2889149.126.72.220 343 tcp tcpwrapped open
2890149.126.72.220 347 tcp tcpwrapped open
2891149.126.72.220 385 tcp tcpwrapped open
2892149.126.72.220 389 tcp ssl/http open Incapsula CDN httpd
2893149.126.72.220 389 udp ldap unknown
2894149.126.72.220 400 tcp tcpwrapped open
2895149.126.72.220 440 tcp tcpwrapped open
2896149.126.72.220 441 tcp tcpwrapped open
2897149.126.72.220 442 tcp tcpwrapped open
2898149.126.72.220 443 tcp ssl/tcpwrapped open
2899149.126.72.220 444 tcp tcpwrapped open
2900149.126.72.220 445 tcp microsoft-ds closed
2901149.126.72.220 446 tcp tcpwrapped open
2902149.126.72.220 447 tcp tcpwrapped open
2903149.126.72.220 448 tcp tcpwrapped open
2904149.126.72.220 449 tcp tcpwrapped open
2905149.126.72.220 452 tcp tcpwrapped open
2906149.126.72.220 461 tcp tcpwrapped open
2907149.126.72.220 462 tcp tcpwrapped open
2908149.126.72.220 480 tcp tcpwrapped open
2909149.126.72.220 485 tcp tcpwrapped open
2910149.126.72.220 487 tcp tcpwrapped open
2911149.126.72.220 488 tcp tcpwrapped open
2912149.126.72.220 491 tcp tcpwrapped open
2913149.126.72.220 520 tcp efs filtered
2914149.126.72.220 520 udp route unknown
2915149.126.72.220 555 tcp tcpwrapped open
2916149.126.72.220 556 tcp tcpwrapped open
2917149.126.72.220 587 tcp tcpwrapped open
2918149.126.72.220 631 tcp tcpwrapped open
2919149.126.72.220 632 tcp tcpwrapped open
2920149.126.72.220 636 tcp tcpwrapped open
2921149.126.72.220 743 tcp tcpwrapped open
2922149.126.72.220 772 tcp tcpwrapped open
2923149.126.72.220 777 tcp tcpwrapped open
2924149.126.72.220 782 tcp tcpwrapped open
2925149.126.72.220 785 tcp tcpwrapped open
2926149.126.72.220 800 tcp tcpwrapped open
2927149.126.72.220 801 tcp tcpwrapped open
2928149.126.72.220 805 tcp tcpwrapped open
2929149.126.72.220 806 tcp tcpwrapped open
2930149.126.72.220 809 tcp tcpwrapped open
2931149.126.72.220 843 tcp tcpwrapped open
2932149.126.72.220 853 tcp tcpwrapped open
2933149.126.72.220 885 tcp tcpwrapped open
2934149.126.72.220 886 tcp tcpwrapped open
2935149.126.72.220 887 tcp tcpwrapped open
2936149.126.72.220 888 tcp tcpwrapped open
2937149.126.72.220 943 tcp tcpwrapped open
2938149.126.72.220 947 tcp tcpwrapped open
2939149.126.72.220 953 tcp tcpwrapped open
2940149.126.72.220 990 tcp tcpwrapped open
2941149.126.72.220 995 tcp tcpwrapped open
2942149.126.72.220 998 tcp tcpwrapped open
2943149.126.72.220 999 tcp tcpwrapped open
2944149.126.72.220 1000 tcp tcpwrapped open
2945149.126.72.220 1002 tcp tcpwrapped open
2946149.126.72.220 1024 tcp tcpwrapped open
2947149.126.72.220 1025 tcp tcpwrapped open
2948149.126.72.220 1028 tcp tcpwrapped open
2949149.126.72.220 1080 tcp tcpwrapped open
2950149.126.72.220 1103 tcp tcpwrapped open
2951149.126.72.220 1111 tcp tcpwrapped open
2952149.126.72.220 1180 tcp tcpwrapped open
2953149.126.72.220 1181 tcp tcpwrapped open
2954149.126.72.220 1207 tcp tcpwrapped open
2955149.126.72.220 1234 tcp tcpwrapped open
2956149.126.72.220 1250 tcp tcpwrapped open
2957149.126.72.220 1283 tcp tcpwrapped open
2958149.126.72.220 1291 tcp tcpwrapped open
2959149.126.72.220 1292 tcp tcpwrapped open
2960149.126.72.220 1293 tcp tcpwrapped open
2961149.126.72.220 1337 tcp tcpwrapped open
2962149.126.72.220 1344 tcp tcpwrapped open
2963149.126.72.220 1355 tcp tcpwrapped open
2964149.126.72.220 1364 tcp tcpwrapped open
2965149.126.72.220 1366 tcp tcpwrapped open
2966149.126.72.220 1377 tcp tcpwrapped open
2967149.126.72.220 1387 tcp tcpwrapped open
2968149.126.72.220 1388 tcp tcpwrapped open
2969149.126.72.220 1433 tcp tcpwrapped open
2970149.126.72.220 1443 tcp tcpwrapped open
2971149.126.72.220 1447 tcp tcpwrapped open
2972149.126.72.220 1450 tcp tcpwrapped open
2973149.126.72.220 1451 tcp tcpwrapped open
2974149.126.72.220 1452 tcp tcpwrapped open
2975149.126.72.220 1453 tcp tcpwrapped open
2976149.126.72.220 1454 tcp tcpwrapped open
2977149.126.72.220 1455 tcp tcpwrapped open
2978149.126.72.220 1456 tcp tcpwrapped open
2979149.126.72.220 1457 tcp tcpwrapped open
2980149.126.72.220 1458 tcp tcpwrapped open
2981149.126.72.220 1459 tcp tcpwrapped open
2982149.126.72.220 1460 tcp tcpwrapped open
2983149.126.72.220 1494 tcp tcpwrapped open
2984149.126.72.220 1935 tcp tcpwrapped open
2985149.126.72.220 1950 tcp tcpwrapped open
2986149.126.72.220 1951 tcp tcpwrapped open
2987149.126.72.220 1952 tcp tcpwrapped open
2988149.126.72.220 1953 tcp tcpwrapped open
2989149.126.72.220 1954 tcp tcpwrapped open
2990149.126.72.220 1955 tcp tcpwrapped open
2991149.126.72.220 1956 tcp tcpwrapped open
2992149.126.72.220 1957 tcp tcpwrapped open
2993149.126.72.220 1958 tcp tcpwrapped open
2994149.126.72.220 1959 tcp tcpwrapped open
2995149.126.72.220 1960 tcp tcpwrapped open
2996149.126.72.220 1964 tcp tcpwrapped open
2997149.126.72.220 1965 tcp tcpwrapped open
2998149.126.72.220 1966 tcp tcpwrapped open
2999149.126.72.220 1967 tcp tcpwrapped open
3000149.126.72.220 1968 tcp tcpwrapped open
3001149.126.72.220 1969 tcp tcpwrapped open
3002149.126.72.220 1970 tcp tcpwrapped open
3003149.126.72.220 1971 tcp tcpwrapped open
3004149.126.72.220 1972 tcp tcpwrapped open
3005149.126.72.220 1973 tcp tcpwrapped open
3006149.126.72.220 1974 tcp tcpwrapped open
3007149.126.72.220 1975 tcp tcpwrapped open
3008149.126.72.220 1976 tcp tcpwrapped open
3009149.126.72.220 1977 tcp tcpwrapped open
3010149.126.72.220 1978 tcp tcpwrapped open
3011149.126.72.220 1979 tcp tcpwrapped open
3012149.126.72.220 1980 tcp tcpwrapped open
3013149.126.72.220 1981 tcp tcpwrapped open
3014149.126.72.220 1982 tcp tcpwrapped open
3015149.126.72.220 1983 tcp tcpwrapped open
3016149.126.72.220 1984 tcp tcpwrapped open
3017149.126.72.220 1985 tcp tcpwrapped open
3018149.126.72.220 1986 tcp tcpwrapped open
3019149.126.72.220 1987 tcp tcpwrapped open
3020149.126.72.220 1988 tcp tcpwrapped open
3021149.126.72.220 1989 tcp tcpwrapped open
3022149.126.72.220 2000 tcp tcpwrapped open
3023149.126.72.220 2001 tcp tcpwrapped open
3024149.126.72.220 2006 tcp tcpwrapped open
3025149.126.72.220 2012 tcp tcpwrapped open
3026149.126.72.220 2020 tcp tcpwrapped open
3027149.126.72.220 2048 tcp tcpwrapped open
3028149.126.72.220 2049 tcp http open Incapsula CDN httpd
3029149.126.72.220 2049 udp nfs unknown
3030149.126.72.220 2050 tcp tcpwrapped open
3031149.126.72.220 2051 tcp tcpwrapped open
3032149.126.72.220 2052 tcp tcpwrapped open
3033149.126.72.220 2053 tcp tcpwrapped open
3034149.126.72.220 2054 tcp tcpwrapped open
3035149.126.72.220 2055 tcp tcpwrapped open
3036149.126.72.220 2056 tcp tcpwrapped open
3037149.126.72.220 2057 tcp tcpwrapped open
3038149.126.72.220 2058 tcp tcpwrapped open
3039149.126.72.220 2059 tcp tcpwrapped open
3040149.126.72.220 2060 tcp tcpwrapped open
3041149.126.72.220 2061 tcp tcpwrapped open
3042149.126.72.220 2062 tcp tcpwrapped open
3043149.126.72.220 2063 tcp tcpwrapped open
3044149.126.72.220 2064 tcp tcpwrapped open
3045149.126.72.220 2065 tcp tcpwrapped open
3046149.126.72.220 2066 tcp tcpwrapped open
3047149.126.72.220 2067 tcp tcpwrapped open
3048149.126.72.220 2068 tcp tcpwrapped open
3049149.126.72.220 2069 tcp tcpwrapped open
3050149.126.72.220 2070 tcp tcpwrapped open
3051149.126.72.220 2072 tcp tcpwrapped open
3052149.126.72.220 2082 tcp tcpwrapped open
3053149.126.72.220 2083 tcp tcpwrapped open
3054149.126.72.220 2087 tcp tcpwrapped open
3055149.126.72.220 2096 tcp tcpwrapped open
3056149.126.72.220 2100 tcp tcpwrapped open
3057149.126.72.220 2108 tcp tcpwrapped open
3058149.126.72.220 2200 tcp tcpwrapped open
3059149.126.72.220 2209 tcp tcpwrapped open
3060149.126.72.220 2222 tcp tcpwrapped open
3061149.126.72.220 2226 tcp tcpwrapped open
3062149.126.72.220 2248 tcp tcpwrapped open
3063149.126.72.220 2344 tcp tcpwrapped open
3064149.126.72.220 2345 tcp tcpwrapped open
3065149.126.72.220 2353 tcp tcpwrapped open
3066149.126.72.220 2363 tcp tcpwrapped open
3067149.126.72.220 2423 tcp tcpwrapped open
3068149.126.72.220 2433 tcp tcpwrapped open
3069149.126.72.220 2435 tcp tcpwrapped open
3070149.126.72.220 2443 tcp tcpwrapped open
3071149.126.72.220 2453 tcp tcpwrapped open
3072149.126.72.220 2480 tcp tcpwrapped open
3073149.126.72.220 2548 tcp tcpwrapped open
3074149.126.72.220 2549 tcp tcpwrapped open
3075149.126.72.220 2550 tcp tcpwrapped open
3076149.126.72.220 2551 tcp tcpwrapped open
3077149.126.72.220 2552 tcp tcpwrapped open
3078149.126.72.220 2553 tcp tcpwrapped open
3079149.126.72.220 2554 tcp tcpwrapped open
3080149.126.72.220 2555 tcp tcpwrapped open
3081149.126.72.220 2556 tcp tcpwrapped open
3082149.126.72.220 2557 tcp tcpwrapped open
3083149.126.72.220 2558 tcp tcpwrapped open
3084149.126.72.220 2559 tcp tcpwrapped open
3085149.126.72.220 2560 tcp tcpwrapped open
3086149.126.72.220 2561 tcp tcpwrapped open
3087149.126.72.220 2562 tcp tcpwrapped open
3088149.126.72.220 2563 tcp tcpwrapped open
3089149.126.72.220 2566 tcp tcpwrapped open
3090149.126.72.220 2567 tcp tcpwrapped open
3091149.126.72.220 2568 tcp tcpwrapped open
3092149.126.72.220 2569 tcp tcpwrapped open
3093149.126.72.220 2570 tcp tcpwrapped open
3094149.126.72.220 2572 tcp tcpwrapped open
3095149.126.72.220 2598 tcp tcpwrapped open
3096149.126.72.220 2599 tcp tcpwrapped open
3097149.126.72.220 2850 tcp tcpwrapped open
3098149.126.72.220 2985 tcp tcpwrapped open
3099149.126.72.220 2995 tcp tcpwrapped open
3100149.126.72.220 3000 tcp tcpwrapped open
3101149.126.72.220 3001 tcp tcpwrapped open
3102149.126.72.220 3002 tcp tcpwrapped open
3103149.126.72.220 3003 tcp tcpwrapped open
3104149.126.72.220 3004 tcp tcpwrapped open
3105149.126.72.220 3005 tcp tcpwrapped open
3106149.126.72.220 3006 tcp tcpwrapped open
3107149.126.72.220 3007 tcp tcpwrapped open
3108149.126.72.220 3008 tcp tcpwrapped open
3109149.126.72.220 3009 tcp tcpwrapped open
3110149.126.72.220 3010 tcp tcpwrapped open
3111149.126.72.220 3011 tcp tcpwrapped open
3112149.126.72.220 3012 tcp tcpwrapped open
3113149.126.72.220 3013 tcp tcpwrapped open
3114149.126.72.220 3014 tcp tcpwrapped open
3115149.126.72.220 3015 tcp tcpwrapped open
3116149.126.72.220 3016 tcp tcpwrapped open
3117149.126.72.220 3017 tcp tcpwrapped open
3118149.126.72.220 3018 tcp tcpwrapped open
3119149.126.72.220 3019 tcp tcpwrapped open
3120149.126.72.220 3020 tcp tcpwrapped open
3121149.126.72.220 3021 tcp tcpwrapped open
3122149.126.72.220 3022 tcp tcpwrapped open
3123149.126.72.220 3030 tcp tcpwrapped open
3124149.126.72.220 3047 tcp tcpwrapped open
3125149.126.72.220 3048 tcp tcpwrapped open
3126149.126.72.220 3049 tcp tcpwrapped open
3127149.126.72.220 3050 tcp tcpwrapped open
3128149.126.72.220 3051 tcp tcpwrapped open
3129149.126.72.220 3052 tcp tcpwrapped open
3130149.126.72.220 3053 tcp tcpwrapped open
3131149.126.72.220 3054 tcp tcpwrapped open
3132149.126.72.220 3055 tcp tcpwrapped open
3133149.126.72.220 3056 tcp tcpwrapped open
3134149.126.72.220 3057 tcp tcpwrapped open
3135149.126.72.220 3058 tcp tcpwrapped open
3136149.126.72.220 3059 tcp tcpwrapped open
3137149.126.72.220 3060 tcp tcpwrapped open
3138149.126.72.220 3061 tcp tcpwrapped open
3139149.126.72.220 3062 tcp tcpwrapped open
3140149.126.72.220 3063 tcp tcpwrapped open
3141149.126.72.220 3064 tcp tcpwrapped open
3142149.126.72.220 3065 tcp tcpwrapped open
3143149.126.72.220 3066 tcp tcpwrapped open
3144149.126.72.220 3067 tcp tcpwrapped open
3145149.126.72.220 3068 tcp tcpwrapped open
3146149.126.72.220 3069 tcp tcpwrapped open
3147149.126.72.220 3070 tcp tcpwrapped open
3148149.126.72.220 3071 tcp tcpwrapped open
3149149.126.72.220 3072 tcp tcpwrapped open
3150149.126.72.220 3073 tcp tcpwrapped open
3151149.126.72.220 3074 tcp tcpwrapped open
3152149.126.72.220 3075 tcp tcpwrapped open
3153149.126.72.220 3076 tcp tcpwrapped open
3154149.126.72.220 3077 tcp tcpwrapped open
3155149.126.72.220 3078 tcp tcpwrapped open
3156149.126.72.220 3079 tcp tcpwrapped open
3157149.126.72.220 3080 tcp tcpwrapped open
3158149.126.72.220 3081 tcp tcpwrapped open
3159149.126.72.220 3082 tcp tcpwrapped open
3160149.126.72.220 3083 tcp tcpwrapped open
3161149.126.72.220 3084 tcp tcpwrapped open
3162149.126.72.220 3085 tcp tcpwrapped open
3163149.126.72.220 3086 tcp tcpwrapped open
3164149.126.72.220 3087 tcp tcpwrapped open
3165149.126.72.220 3088 tcp tcpwrapped open
3166149.126.72.220 3089 tcp tcpwrapped open
3167149.126.72.220 3090 tcp tcpwrapped open
3168149.126.72.220 3091 tcp tcpwrapped open
3169149.126.72.220 3092 tcp tcpwrapped open
3170149.126.72.220 3093 tcp tcpwrapped open
3171149.126.72.220 3094 tcp tcpwrapped open
3172149.126.72.220 3095 tcp tcpwrapped open
3173149.126.72.220 3096 tcp tcpwrapped open
3174149.126.72.220 3097 tcp tcpwrapped open
3175149.126.72.220 3098 tcp tcpwrapped open
3176149.126.72.220 3099 tcp tcpwrapped open
3177149.126.72.220 3100 tcp tcpwrapped open
3178149.126.72.220 3101 tcp tcpwrapped open
3179149.126.72.220 3102 tcp tcpwrapped open
3180149.126.72.220 3103 tcp tcpwrapped open
3181149.126.72.220 3104 tcp tcpwrapped open
3182149.126.72.220 3105 tcp tcpwrapped open
3183149.126.72.220 3106 tcp tcpwrapped open
3184149.126.72.220 3107 tcp tcpwrapped open
3185149.126.72.220 3108 tcp tcpwrapped open
3186149.126.72.220 3109 tcp tcpwrapped open
3187149.126.72.220 3110 tcp tcpwrapped open
3188149.126.72.220 3111 tcp tcpwrapped open
3189149.126.72.220 3112 tcp tcpwrapped open
3190149.126.72.220 3113 tcp tcpwrapped open
3191149.126.72.220 3114 tcp tcpwrapped open
3192149.126.72.220 3115 tcp tcpwrapped open
3193149.126.72.220 3116 tcp tcpwrapped open
3194149.126.72.220 3117 tcp tcpwrapped open
3195149.126.72.220 3118 tcp tcpwrapped open
3196149.126.72.220 3119 tcp tcpwrapped open
3197149.126.72.220 3120 tcp tcpwrapped open
3198149.126.72.220 3121 tcp tcpwrapped open
3199149.126.72.220 3150 tcp tcpwrapped open
3200149.126.72.220 3155 tcp tcpwrapped open
3201149.126.72.220 3160 tcp tcpwrapped open
3202149.126.72.220 3165 tcp tcpwrapped open
3203149.126.72.220 3270 tcp tcpwrapped open
3204149.126.72.220 3299 tcp tcpwrapped open
3205149.126.72.220 3306 tcp tcpwrapped open
3206149.126.72.220 3333 tcp tcpwrapped open
3207149.126.72.220 3389 tcp tcpwrapped open
3208149.126.72.220 3391 tcp tcpwrapped open
3209149.126.72.220 3400 tcp tcpwrapped open
3210149.126.72.220 3401 tcp tcpwrapped open
3211149.126.72.220 3402 tcp tcpwrapped open
3212149.126.72.220 3403 tcp tcpwrapped open
3213149.126.72.220 3404 tcp tcpwrapped open
3214149.126.72.220 3405 tcp tcpwrapped open
3215149.126.72.220 3406 tcp tcpwrapped open
3216149.126.72.220 3407 tcp tcpwrapped open
3217149.126.72.220 3408 tcp tcpwrapped open
3218149.126.72.220 3409 tcp tcpwrapped open
3219149.126.72.220 3410 tcp tcpwrapped open
3220149.126.72.220 3412 tcp tcpwrapped open
3221149.126.72.220 3443 tcp tcpwrapped open
3222149.126.72.220 3500 tcp tcpwrapped open
3223149.126.72.220 3510 tcp tcpwrapped open
3224149.126.72.220 3521 tcp tcpwrapped open
3225149.126.72.220 3522 tcp tcpwrapped open
3226149.126.72.220 3523 tcp tcpwrapped open
3227149.126.72.220 3524 tcp tcpwrapped open
3228149.126.72.220 3530 tcp tcpwrapped open
3229149.126.72.220 3531 tcp tcpwrapped open
3230149.126.72.220 3540 tcp tcpwrapped open
3231149.126.72.220 3548 tcp tcpwrapped open
3232149.126.72.220 3549 tcp tcpwrapped open
3233149.126.72.220 3550 tcp tcpwrapped open
3234149.126.72.220 3551 tcp tcpwrapped open
3235149.126.72.220 3552 tcp tcpwrapped open
3236149.126.72.220 3553 tcp tcpwrapped open
3237149.126.72.220 3554 tcp tcpwrapped open
3238149.126.72.220 3555 tcp tcpwrapped open
3239149.126.72.220 3556 tcp tcpwrapped open
3240149.126.72.220 3557 tcp tcpwrapped open
3241149.126.72.220 3558 tcp tcpwrapped open
3242149.126.72.220 3559 tcp tcpwrapped open
3243149.126.72.220 3560 tcp tcpwrapped open
3244149.126.72.220 3561 tcp tcpwrapped open
3245149.126.72.220 3562 tcp tcpwrapped open
3246149.126.72.220 3563 tcp tcpwrapped open
3247149.126.72.220 3566 tcp tcpwrapped open
3248149.126.72.220 3567 tcp tcpwrapped open
3249149.126.72.220 3568 tcp tcpwrapped open
3250149.126.72.220 3569 tcp tcpwrapped open
3251149.126.72.220 3570 tcp tcpwrapped open
3252149.126.72.220 3572 tcp tcpwrapped open
3253149.126.72.220 3580 tcp tcpwrapped open
3254149.126.72.220 3590 tcp tcpwrapped open
3255149.126.72.220 3790 tcp tcpwrapped open
3256149.126.72.220 3791 tcp tcpwrapped open
3257149.126.72.220 3792 tcp tcpwrapped open
3258149.126.72.220 3793 tcp tcpwrapped open
3259149.126.72.220 3794 tcp tcpwrapped open
3260149.126.72.220 3838 tcp tcpwrapped open
3261149.126.72.220 3841 tcp tcpwrapped open
3262149.126.72.220 3842 tcp tcpwrapped open
3263149.126.72.220 3950 tcp tcpwrapped open
3264149.126.72.220 3951 tcp tcpwrapped open
3265149.126.72.220 3952 tcp tcpwrapped open
3266149.126.72.220 3953 tcp tcpwrapped open
3267149.126.72.220 3954 tcp adrep open
3268149.126.72.220 4000 tcp tcpwrapped open
3269149.126.72.220 4001 tcp newoak open
3270149.126.72.220 4002 tcp mlchat-proxy open
3271149.126.72.220 4021 tcp nexus-portal open
3272149.126.72.220 4022 tcp dnox open
3273149.126.72.220 4023 tcp esnm-zoning open
3274149.126.72.220 4043 tcp nirp open
3275149.126.72.220 4072 tcp zieto-sock open
3276149.126.72.220 4080 tcp lorica-in open
3277149.126.72.220 4085 tcp ezmessagesrv open
3278149.126.72.220 4120 tcp minirem open
3279149.126.72.220 4147 tcp vrxpservman open
3280149.126.72.220 4148 tcp hhb-handheld open
3281149.126.72.220 4150 tcp poweralert-nsa open
3282149.126.72.220 4155 tcp bzr open
3283149.126.72.220 4160 tcp jini-discovery open
3284149.126.72.220 4165 tcp altcp open
3285149.126.72.220 4172 tcp pcoip open
3286149.126.72.220 4243 tcp vrml-multi-use open
3287149.126.72.220 4244 tcp vrml-multi-use open
3288149.126.72.220 4250 tcp vrml-multi-use open
3289149.126.72.220 4300 tcp corelccam open
3290149.126.72.220 4333 tcp msql open
3291149.126.72.220 4343 tcp unicall open
3292149.126.72.220 4344 tcp vinainstall open
3293149.126.72.220 4400 tcp ds-srv open
3294149.126.72.220 4401 tcp tcpwrapped open
3295149.126.72.220 4402 tcp tcpwrapped open
3296149.126.72.220 4430 tcp tcpwrapped open
3297149.126.72.220 4431 tcp tcpwrapped open
3298149.126.72.220 4432 tcp tcpwrapped open
3299149.126.72.220 4434 tcp tcpwrapped open
3300149.126.72.220 4435 tcp tcpwrapped open
3301149.126.72.220 4436 tcp tcpwrapped open
3302149.126.72.220 4437 tcp tcpwrapped open
3303149.126.72.220 4439 tcp tcpwrapped open
3304149.126.72.220 4440 tcp tcpwrapped open
3305149.126.72.220 4443 tcp tcpwrapped open
3306149.126.72.220 4444 tcp tcpwrapped open
3307149.126.72.220 4445 tcp tcpwrapped open
3308149.126.72.220 4451 tcp tcpwrapped open
3309149.126.72.220 4455 tcp tcpwrapped open
3310149.126.72.220 4457 tcp tcpwrapped open
3311149.126.72.220 4459 tcp tcpwrapped open
3312149.126.72.220 4461 tcp tcpwrapped open
3313149.126.72.220 4463 tcp tcpwrapped open
3314149.126.72.220 4477 tcp tcpwrapped open
3315149.126.72.220 4482 tcp tcpwrapped open
3316149.126.72.220 4500 tcp tcpwrapped open
3317149.126.72.220 4502 tcp tcpwrapped open
3318149.126.72.220 4505 tcp tcpwrapped open
3319149.126.72.220 4572 tcp tcpwrapped open
3320149.126.72.220 4602 tcp tcpwrapped open
3321149.126.72.220 4620 tcp tcpwrapped open
3322149.126.72.220 4643 tcp tcpwrapped open
3323149.126.72.220 4848 tcp tcpwrapped open
3324149.126.72.220 4933 tcp tcpwrapped open
3325149.126.72.220 4993 tcp tcpwrapped open
3326149.126.72.220 5000 tcp tcpwrapped open
3327149.126.72.220 5001 tcp tcpwrapped open
3328149.126.72.220 5002 tcp tcpwrapped open
3329149.126.72.220 5003 tcp tcpwrapped open
3330149.126.72.220 5004 tcp tcpwrapped open
3331149.126.72.220 5005 tcp tcpwrapped open
3332149.126.72.220 5006 tcp tcpwrapped open
3333149.126.72.220 5007 tcp tcpwrapped open
3334149.126.72.220 5008 tcp tcpwrapped open
3335149.126.72.220 5009 tcp tcpwrapped open
3336149.126.72.220 5010 tcp tcpwrapped open
3337149.126.72.220 5011 tcp tcpwrapped open
3338149.126.72.220 5022 tcp tcpwrapped open
3339149.126.72.220 5050 tcp tcpwrapped open
3340149.126.72.220 5053 tcp tcpwrapped open
3341149.126.72.220 5060 tcp tcpwrapped open
3342149.126.72.220 5061 tcp tcpwrapped open
3343149.126.72.220 5080 tcp tcpwrapped open
3344149.126.72.220 5083 tcp tcpwrapped open
3345149.126.72.220 5089 tcp tcpwrapped open
3346149.126.72.220 5090 tcp tcpwrapped open
3347149.126.72.220 5100 tcp tcpwrapped open
3348149.126.72.220 5105 tcp tcpwrapped open
3349149.126.72.220 5119 tcp tcpwrapped open
3350149.126.72.220 5120 tcp tcpwrapped open
3351149.126.72.220 5130 tcp tcpwrapped open
3352149.126.72.220 5140 tcp tcpwrapped open
3353149.126.72.220 5150 tcp tcpwrapped open
3354149.126.72.220 5160 tcp tcpwrapped open
3355149.126.72.220 5180 tcp tcpwrapped open
3356149.126.72.220 5201 tcp tcpwrapped open
3357149.126.72.220 5222 tcp tcpwrapped open
3358149.126.72.220 5223 tcp tcpwrapped open
3359149.126.72.220 5224 tcp tcpwrapped open
3360149.126.72.220 5225 tcp tcpwrapped open
3361149.126.72.220 5226 tcp tcpwrapped open
3362149.126.72.220 5227 tcp tcpwrapped open
3363149.126.72.220 5228 tcp tcpwrapped open
3364149.126.72.220 5229 tcp tcpwrapped open
3365149.126.72.220 5230 tcp tcpwrapped open
3366149.126.72.220 5231 tcp tcpwrapped open
3367149.126.72.220 5232 tcp tcpwrapped open
3368149.126.72.220 5233 tcp tcpwrapped open
3369149.126.72.220 5234 tcp tcpwrapped open
3370149.126.72.220 5235 tcp tcpwrapped open
3371149.126.72.220 5236 tcp tcpwrapped open
3372149.126.72.220 5237 tcp tcpwrapped open
3373149.126.72.220 5238 tcp tcpwrapped open
3374149.126.72.220 5239 tcp tcpwrapped open
3375149.126.72.220 5240 tcp tcpwrapped open
3376149.126.72.220 5241 tcp tcpwrapped open
3377149.126.72.220 5242 tcp tcpwrapped open
3378149.126.72.220 5243 tcp tcpwrapped open
3379149.126.72.220 5244 tcp tcpwrapped open
3380149.126.72.220 5245 tcp tcpwrapped open
3381149.126.72.220 5246 tcp tcpwrapped open
3382149.126.72.220 5247 tcp tcpwrapped open
3383149.126.72.220 5248 tcp tcpwrapped open
3384149.126.72.220 5249 tcp tcpwrapped open
3385149.126.72.220 5250 tcp tcpwrapped open
3386149.126.72.220 5251 tcp tcpwrapped open
3387149.126.72.220 5252 tcp tcpwrapped open
3388149.126.72.220 5253 tcp tcpwrapped open
3389149.126.72.220 5254 tcp tcpwrapped open
3390149.126.72.220 5255 tcp tcpwrapped open
3391149.126.72.220 5256 tcp tcpwrapped open
3392149.126.72.220 5257 tcp tcpwrapped open
3393149.126.72.220 5258 tcp tcpwrapped open
3394149.126.72.220 5259 tcp tcpwrapped open
3395149.126.72.220 5260 tcp tcpwrapped open
3396149.126.72.220 5261 tcp tcpwrapped open
3397149.126.72.220 5262 tcp tcpwrapped open
3398149.126.72.220 5263 tcp tcpwrapped open
3399149.126.72.220 5264 tcp tcpwrapped open
3400149.126.72.220 5265 tcp tcpwrapped open
3401149.126.72.220 5266 tcp tcpwrapped open
3402149.126.72.220 5267 tcp tcpwrapped open
3403149.126.72.220 5268 tcp tcpwrapped open
3404149.126.72.220 5269 tcp tcpwrapped open
3405149.126.72.220 5270 tcp tcpwrapped open
3406149.126.72.220 5271 tcp tcpwrapped open
3407149.126.72.220 5272 tcp tcpwrapped open
3408149.126.72.220 5273 tcp tcpwrapped open
3409149.126.72.220 5274 tcp tcpwrapped open
3410149.126.72.220 5275 tcp tcpwrapped open
3411149.126.72.220 5276 tcp tcpwrapped open
3412149.126.72.220 5277 tcp tcpwrapped open
3413149.126.72.220 5278 tcp tcpwrapped open
3414149.126.72.220 5279 tcp tcpwrapped open
3415149.126.72.220 5280 tcp tcpwrapped open
3416149.126.72.220 5440 tcp tcpwrapped open
3417149.126.72.220 5443 tcp tcpwrapped open
3418149.126.72.220 5456 tcp tcpwrapped open
3419149.126.72.220 5494 tcp tcpwrapped open
3420149.126.72.220 5495 tcp tcpwrapped open
3421149.126.72.220 5500 tcp tcpwrapped open
3422149.126.72.220 5503 tcp tcpwrapped open
3423149.126.72.220 5552 tcp tcpwrapped open
3424149.126.72.220 5555 tcp tcpwrapped open
3425149.126.72.220 5556 tcp tcpwrapped open
3426149.126.72.220 5557 tcp tcpwrapped open
3427149.126.72.220 5567 tcp tcpwrapped open
3428149.126.72.220 5568 tcp tcpwrapped open
3429149.126.72.220 5569 tcp tcpwrapped open
3430149.126.72.220 5590 tcp tcpwrapped open
3431149.126.72.220 5591 tcp tcpwrapped open
3432149.126.72.220 5592 tcp tcpwrapped open
3433149.126.72.220 5593 tcp tcpwrapped open
3434149.126.72.220 5594 tcp tcpwrapped open
3435149.126.72.220 5595 tcp tcpwrapped open
3436149.126.72.220 5596 tcp tcpwrapped open
3437149.126.72.220 5597 tcp tcpwrapped open
3438149.126.72.220 5598 tcp tcpwrapped open
3439149.126.72.220 5599 tcp tcpwrapped open
3440149.126.72.220 5600 tcp tcpwrapped open
3441149.126.72.220 5601 tcp tcpwrapped open
3442149.126.72.220 5602 tcp tcpwrapped open
3443149.126.72.220 5603 tcp tcpwrapped open
3444149.126.72.220 5604 tcp tcpwrapped open
3445149.126.72.220 5605 tcp tcpwrapped open
3446149.126.72.220 5606 tcp tcpwrapped open
3447149.126.72.220 5607 tcp tcpwrapped open
3448149.126.72.220 5608 tcp tcpwrapped open
3449149.126.72.220 5609 tcp tcpwrapped open
3450149.126.72.220 5613 tcp tcpwrapped open
3451149.126.72.220 5614 tcp tcpwrapped open
3452149.126.72.220 5620 tcp tcpwrapped open
3453149.126.72.220 5630 tcp tcpwrapped open
3454149.126.72.220 5640 tcp tcpwrapped open
3455149.126.72.220 5650 tcp tcpwrapped open
3456149.126.72.220 5660 tcp tcpwrapped open
3457149.126.72.220 5671 tcp tcpwrapped open
3458149.126.72.220 5672 tcp tcpwrapped open
3459149.126.72.220 5673 tcp tcpwrapped open
3460149.126.72.220 5680 tcp tcpwrapped open
3461149.126.72.220 5696 tcp tcpwrapped open
3462149.126.72.220 5698 tcp tcpwrapped open
3463149.126.72.220 5701 tcp tcpwrapped open
3464149.126.72.220 5721 tcp tcpwrapped open
3465149.126.72.220 5900 tcp tcpwrapped open
3466149.126.72.220 5901 tcp tcpwrapped open
3467149.126.72.220 5902 tcp tcpwrapped open
3468149.126.72.220 5903 tcp tcpwrapped open
3469149.126.72.220 5904 tcp tcpwrapped open
3470149.126.72.220 5905 tcp tcpwrapped open
3471149.126.72.220 5906 tcp tcpwrapped open
3472149.126.72.220 5907 tcp tcpwrapped open
3473149.126.72.220 5908 tcp tcpwrapped open
3474149.126.72.220 5909 tcp tcpwrapped open
3475149.126.72.220 5910 tcp tcpwrapped open
3476149.126.72.220 5911 tcp tcpwrapped open
3477149.126.72.220 5912 tcp tcpwrapped open
3478149.126.72.220 5913 tcp tcpwrapped open
3479149.126.72.220 5914 tcp tcpwrapped open
3480149.126.72.220 5915 tcp tcpwrapped open
3481149.126.72.220 5916 tcp tcpwrapped open
3482149.126.72.220 5917 tcp tcpwrapped open
3483149.126.72.220 5918 tcp tcpwrapped open
3484149.126.72.220 5919 tcp tcpwrapped open
3485149.126.72.220 5920 tcp tcpwrapped open
3486149.126.72.220 5984 tcp tcpwrapped open
3487149.126.72.220 5985 tcp tcpwrapped open
3488149.126.72.220 5986 tcp tcpwrapped open
3489149.126.72.220 5987 tcp tcpwrapped open
3490149.126.72.220 5988 tcp tcpwrapped open
3491149.126.72.220 5989 tcp tcpwrapped open
3492149.126.72.220 5990 tcp tcpwrapped open
3493149.126.72.220 5991 tcp tcpwrapped open
3494149.126.72.220 5992 tcp tcpwrapped open
3495149.126.72.220 5993 tcp tcpwrapped open
3496149.126.72.220 5994 tcp tcpwrapped open
3497149.126.72.220 5995 tcp tcpwrapped open
3498149.126.72.220 5996 tcp tcpwrapped open
3499149.126.72.220 5997 tcp tcpwrapped open
3500149.126.72.220 5998 tcp tcpwrapped open
3501149.126.72.220 5999 tcp tcpwrapped open
3502149.126.72.220 6000 tcp tcpwrapped open
3503149.126.72.220 6001 tcp tcpwrapped open
3504149.126.72.220 6002 tcp tcpwrapped open
3505149.126.72.220 6003 tcp tcpwrapped open
3506149.126.72.220 6004 tcp tcpwrapped open
3507149.126.72.220 6005 tcp tcpwrapped open
3508149.126.72.220 6006 tcp tcpwrapped open
3509149.126.72.220 6007 tcp tcpwrapped open
3510149.126.72.220 6008 tcp tcpwrapped open
3511149.126.72.220 6009 tcp tcpwrapped open
3512149.126.72.220 6010 tcp tcpwrapped open
3513149.126.72.220 6011 tcp tcpwrapped open
3514149.126.72.220 6021 tcp tcpwrapped open
3515149.126.72.220 6060 tcp tcpwrapped open
3516149.126.72.220 6061 tcp tcpwrapped open
3517149.126.72.220 6081 tcp tcpwrapped open
3518149.126.72.220 6100 tcp tcpwrapped open
3519149.126.72.220 6102 tcp tcpwrapped open
3520149.126.72.220 6134 tcp tcpwrapped open
3521149.126.72.220 6161 tcp tcpwrapped open
3522149.126.72.220 6331 tcp tcpwrapped open
3523149.126.72.220 6348 tcp tcpwrapped open
3524149.126.72.220 6379 tcp tcpwrapped open
3525149.126.72.220 6380 tcp tcpwrapped open
3526149.126.72.220 6433 tcp tcpwrapped open
3527149.126.72.220 6440 tcp tcpwrapped open
3528149.126.72.220 6443 tcp tcpwrapped open
3529149.126.72.220 6488 tcp tcpwrapped open
3530149.126.72.220 6500 tcp tcpwrapped open
3531149.126.72.220 6505 tcp tcpwrapped open
3532149.126.72.220 6510 tcp tcpwrapped open
3533149.126.72.220 6511 tcp tcpwrapped open
3534149.126.72.220 6512 tcp tcpwrapped open
3535149.126.72.220 6514 tcp tcpwrapped open
3536149.126.72.220 6543 tcp tcpwrapped open
3537149.126.72.220 6544 tcp tcpwrapped open
3538149.126.72.220 6560 tcp tcpwrapped open
3539149.126.72.220 6561 tcp tcpwrapped open
3540149.126.72.220 6565 tcp tcpwrapped open
3541149.126.72.220 6580 tcp tcpwrapped open
3542149.126.72.220 6581 tcp tcpwrapped open
3543149.126.72.220 6590 tcp tcpwrapped open
3544149.126.72.220 6601 tcp tcpwrapped open
3545149.126.72.220 6603 tcp tcpwrapped open
3546149.126.72.220 6605 tcp tcpwrapped open
3547149.126.72.220 6661 tcp tcpwrapped open
3548149.126.72.220 6662 tcp tcpwrapped open
3549149.126.72.220 6666 tcp tcpwrapped open
3550149.126.72.220 6686 tcp tcpwrapped open
3551149.126.72.220 6688 tcp tcpwrapped open
3552149.126.72.220 6700 tcp tcpwrapped open
3553149.126.72.220 6755 tcp tcpwrapped open
3554149.126.72.220 6775 tcp tcpwrapped open
3555149.126.72.220 6779 tcp tcpwrapped open
3556149.126.72.220 6789 tcp tcpwrapped open
3557149.126.72.220 6799 tcp tcpwrapped open
3558149.126.72.220 7000 tcp tcpwrapped open
3559149.126.72.220 7001 tcp tcpwrapped open
3560149.126.72.220 7002 tcp tcpwrapped open
3561149.126.72.220 7003 tcp tcpwrapped open
3562149.126.72.220 7004 tcp tcpwrapped open
3563149.126.72.220 7005 tcp tcpwrapped open
3564149.126.72.220 7007 tcp tcpwrapped open
3565149.126.72.220 7010 tcp tcpwrapped open
3566149.126.72.220 7011 tcp tcpwrapped open
3567149.126.72.220 7021 tcp tcpwrapped open
3568149.126.72.220 7070 tcp tcpwrapped open
3569149.126.72.220 7071 tcp tcpwrapped open
3570149.126.72.220 7079 tcp tcpwrapped open
3571149.126.72.220 7080 tcp tcpwrapped open
3572149.126.72.220 7081 tcp tcpwrapped open
3573149.126.72.220 7082 tcp tcpwrapped open
3574149.126.72.220 7083 tcp tcpwrapped open
3575149.126.72.220 7084 tcp tcpwrapped open
3576149.126.72.220 7085 tcp tcpwrapped open
3577149.126.72.220 7086 tcp tcpwrapped open
3578149.126.72.220 7087 tcp tcpwrapped open
3579149.126.72.220 7088 tcp tcpwrapped open
3580149.126.72.220 7090 tcp tcpwrapped open
3581149.126.72.220 7171 tcp tcpwrapped open
3582149.126.72.220 7172 tcp tcpwrapped open
3583149.126.72.220 7272 tcp tcpwrapped open
3584149.126.72.220 7348 tcp tcpwrapped open
3585149.126.72.220 7403 tcp tcpwrapped open
3586149.126.72.220 7433 tcp tcpwrapped open
3587149.126.72.220 7441 tcp tcpwrapped open
3588149.126.72.220 7443 tcp tcpwrapped open
3589149.126.72.220 7444 tcp tcpwrapped open
3590149.126.72.220 7445 tcp tcpwrapped open
3591149.126.72.220 7473 tcp tcpwrapped open
3592149.126.72.220 7500 tcp tcpwrapped open
3593149.126.72.220 7537 tcp tcpwrapped open
3594149.126.72.220 7687 tcp tcpwrapped open
3595149.126.72.220 7700 tcp tcpwrapped open
3596149.126.72.220 7771 tcp tcpwrapped open
3597149.126.72.220 7773 tcp tcpwrapped open
3598149.126.72.220 7774 tcp tcpwrapped open
3599149.126.72.220 7775 tcp tcpwrapped open
3600149.126.72.220 7776 tcp tcpwrapped open
3601149.126.72.220 7777 tcp tcpwrapped open
3602149.126.72.220 7778 tcp tcpwrapped open
3603149.126.72.220 7779 tcp tcpwrapped open
3604149.126.72.220 7788 tcp tcpwrapped open
3605149.126.72.220 7799 tcp tcpwrapped open
3606149.126.72.220 7998 tcp tcpwrapped open
3607149.126.72.220 7999 tcp tcpwrapped open
3608149.126.72.220 8000 tcp tcpwrapped open
3609149.126.72.220 8001 tcp tcpwrapped open
3610149.126.72.220 8002 tcp tcpwrapped open
3611149.126.72.220 8003 tcp tcpwrapped open
3612149.126.72.220 8004 tcp tcpwrapped open
3613149.126.72.220 8005 tcp tcpwrapped open
3614149.126.72.220 8006 tcp tcpwrapped open
3615149.126.72.220 8007 tcp tcpwrapped open
3616149.126.72.220 8008 tcp tcpwrapped open
3617149.126.72.220 8009 tcp tcpwrapped open
3618149.126.72.220 8010 tcp tcpwrapped open
3619149.126.72.220 8011 tcp tcpwrapped open
3620149.126.72.220 8012 tcp tcpwrapped open
3621149.126.72.220 8013 tcp tcpwrapped open
3622149.126.72.220 8014 tcp tcpwrapped open
3623149.126.72.220 8015 tcp tcpwrapped open
3624149.126.72.220 8016 tcp tcpwrapped open
3625149.126.72.220 8017 tcp tcpwrapped open
3626149.126.72.220 8018 tcp tcpwrapped open
3627149.126.72.220 8019 tcp tcpwrapped open
3628149.126.72.220 8020 tcp tcpwrapped open
3629149.126.72.220 8021 tcp tcpwrapped open
3630149.126.72.220 8022 tcp tcpwrapped open
3631149.126.72.220 8023 tcp tcpwrapped open
3632149.126.72.220 8024 tcp tcpwrapped open
3633149.126.72.220 8025 tcp tcpwrapped open
3634149.126.72.220 8026 tcp tcpwrapped open
3635149.126.72.220 8027 tcp tcpwrapped open
3636149.126.72.220 8028 tcp tcpwrapped open
3637149.126.72.220 8029 tcp tcpwrapped open
3638149.126.72.220 8030 tcp tcpwrapped open
3639149.126.72.220 8031 tcp tcpwrapped open
3640149.126.72.220 8032 tcp tcpwrapped open
3641149.126.72.220 8033 tcp tcpwrapped open
3642149.126.72.220 8034 tcp tcpwrapped open
3643149.126.72.220 8035 tcp tcpwrapped open
3644149.126.72.220 8036 tcp tcpwrapped open
3645149.126.72.220 8037 tcp tcpwrapped open
3646149.126.72.220 8038 tcp tcpwrapped open
3647149.126.72.220 8039 tcp tcpwrapped open
3648149.126.72.220 8040 tcp tcpwrapped open
3649149.126.72.220 8041 tcp tcpwrapped open
3650149.126.72.220 8042 tcp tcpwrapped open
3651149.126.72.220 8043 tcp tcpwrapped open
3652149.126.72.220 8044 tcp tcpwrapped open
3653149.126.72.220 8045 tcp tcpwrapped open
3654149.126.72.220 8046 tcp tcpwrapped open
3655149.126.72.220 8047 tcp tcpwrapped open
3656149.126.72.220 8048 tcp tcpwrapped open
3657149.126.72.220 8049 tcp tcpwrapped open
3658149.126.72.220 8050 tcp tcpwrapped open
3659149.126.72.220 8051 tcp tcpwrapped open
3660149.126.72.220 8052 tcp tcpwrapped open
3661149.126.72.220 8053 tcp tcpwrapped open
3662149.126.72.220 8054 tcp tcpwrapped open
3663149.126.72.220 8055 tcp tcpwrapped open
3664149.126.72.220 8056 tcp tcpwrapped open
3665149.126.72.220 8057 tcp tcpwrapped open
3666149.126.72.220 8058 tcp tcpwrapped open
3667149.126.72.220 8060 tcp tcpwrapped open
3668149.126.72.220 8064 tcp tcpwrapped open
3669149.126.72.220 8065 tcp tcpwrapped open
3670149.126.72.220 8069 tcp tcpwrapped open
3671149.126.72.220 8070 tcp tcpwrapped open
3672149.126.72.220 8071 tcp tcpwrapped open
3673149.126.72.220 8072 tcp tcpwrapped open
3674149.126.72.220 8074 tcp tcpwrapped open
3675149.126.72.220 8079 tcp tcpwrapped open
3676149.126.72.220 8080 tcp tcpwrapped open
3677149.126.72.220 8081 tcp tcpwrapped open
3678149.126.72.220 8082 tcp tcpwrapped open
3679149.126.72.220 8083 tcp tcpwrapped open
3680149.126.72.220 8084 tcp tcpwrapped open
3681149.126.72.220 8085 tcp tcpwrapped open
3682149.126.72.220 8086 tcp tcpwrapped open
3683149.126.72.220 8087 tcp tcpwrapped open
3684149.126.72.220 8088 tcp tcpwrapped open
3685149.126.72.220 8089 tcp tcpwrapped open
3686149.126.72.220 8090 tcp tcpwrapped open
3687149.126.72.220 8091 tcp tcpwrapped open
3688149.126.72.220 8092 tcp tcpwrapped open
3689149.126.72.220 8093 tcp tcpwrapped open
3690149.126.72.220 8094 tcp tcpwrapped open
3691149.126.72.220 8095 tcp tcpwrapped open
3692149.126.72.220 8096 tcp tcpwrapped open
3693149.126.72.220 8097 tcp tcpwrapped open
3694149.126.72.220 8098 tcp tcpwrapped open
3695149.126.72.220 8099 tcp tcpwrapped open
3696149.126.72.220 8100 tcp tcpwrapped open
3697149.126.72.220 8101 tcp tcpwrapped open
3698149.126.72.220 8102 tcp tcpwrapped open
3699149.126.72.220 8103 tcp tcpwrapped open
3700149.126.72.220 8104 tcp tcpwrapped open
3701149.126.72.220 8105 tcp tcpwrapped open
3702149.126.72.220 8106 tcp tcpwrapped open
3703149.126.72.220 8107 tcp tcpwrapped open
3704149.126.72.220 8108 tcp tcpwrapped open
3705149.126.72.220 8109 tcp tcpwrapped open
3706149.126.72.220 8110 tcp tcpwrapped open
3707149.126.72.220 8113 tcp tcpwrapped open
3708149.126.72.220 8114 tcp tcpwrapped open
3709149.126.72.220 8115 tcp tcpwrapped open
3710149.126.72.220 8118 tcp tcpwrapped open
3711149.126.72.220 8119 tcp tcpwrapped open
3712149.126.72.220 8120 tcp tcpwrapped open
3713149.126.72.220 8121 tcp tcpwrapped open
3714149.126.72.220 8123 tcp tcpwrapped open
3715149.126.72.220 8125 tcp tcpwrapped open
3716149.126.72.220 8126 tcp tcpwrapped open
3717149.126.72.220 8128 tcp tcpwrapped open
3718149.126.72.220 8129 tcp tcpwrapped open
3719149.126.72.220 8130 tcp tcpwrapped open
3720149.126.72.220 8131 tcp tcpwrapped open
3721149.126.72.220 8132 tcp tcpwrapped open
3722149.126.72.220 8133 tcp tcpwrapped open
3723149.126.72.220 8136 tcp tcpwrapped open
3724149.126.72.220 8140 tcp tcpwrapped open
3725149.126.72.220 8142 tcp tcpwrapped open
3726149.126.72.220 8143 tcp tcpwrapped open
3727149.126.72.220 8144 tcp tcpwrapped open
3728149.126.72.220 8147 tcp tcpwrapped open
3729149.126.72.220 8148 tcp tcpwrapped open
3730149.126.72.220 8149 tcp tcpwrapped open
3731149.126.72.220 8150 tcp tcpwrapped open
3732149.126.72.220 8154 tcp tcpwrapped open
3733149.126.72.220 8156 tcp tcpwrapped open
3734149.126.72.220 8157 tcp tcpwrapped open
3735149.126.72.220 8158 tcp tcpwrapped open
3736149.126.72.220 8160 tcp tcpwrapped open
3737149.126.72.220 8161 tcp tcpwrapped open
3738149.126.72.220 8162 tcp tcpwrapped open
3739149.126.72.220 8163 tcp tcpwrapped open
3740149.126.72.220 8164 tcp tcpwrapped open
3741149.126.72.220 8165 tcp tcpwrapped open
3742149.126.72.220 8166 tcp tcpwrapped open
3743149.126.72.220 8167 tcp tcpwrapped open
3744149.126.72.220 8168 tcp tcpwrapped open
3745149.126.72.220 8169 tcp tcpwrapped open
3746149.126.72.220 8170 tcp tcpwrapped open
3747149.126.72.220 8171 tcp tcpwrapped open
3748149.126.72.220 8172 tcp tcpwrapped open
3749149.126.72.220 8173 tcp tcpwrapped open
3750149.126.72.220 8175 tcp tcpwrapped open
3751149.126.72.220 8176 tcp tcpwrapped open
3752149.126.72.220 8178 tcp tcpwrapped open
3753149.126.72.220 8179 tcp tcpwrapped open
3754149.126.72.220 8180 tcp tcpwrapped open
3755149.126.72.220 8181 tcp tcpwrapped open
3756149.126.72.220 8182 tcp tcpwrapped open
3757149.126.72.220 8183 tcp tcpwrapped open
3758149.126.72.220 8184 tcp tcpwrapped open
3759149.126.72.220 8185 tcp tcpwrapped open
3760149.126.72.220 8186 tcp tcpwrapped open
3761149.126.72.220 8187 tcp tcpwrapped open
3762149.126.72.220 8188 tcp tcpwrapped open
3763149.126.72.220 8189 tcp tcpwrapped open
3764149.126.72.220 8190 tcp tcpwrapped open
3765149.126.72.220 8191 tcp tcpwrapped open
3766149.126.72.220 8192 tcp tcpwrapped open
3767149.126.72.220 8193 tcp tcpwrapped open
3768149.126.72.220 8194 tcp tcpwrapped open
3769149.126.72.220 8195 tcp tcpwrapped open
3770149.126.72.220 8198 tcp tcpwrapped open
3771149.126.72.220 8199 tcp tcpwrapped open
3772149.126.72.220 8200 tcp tcpwrapped open
3773149.126.72.220 8203 tcp tcpwrapped open
3774149.126.72.220 8222 tcp tcpwrapped open
3775149.126.72.220 8230 tcp tcpwrapped open
3776149.126.72.220 8236 tcp tcpwrapped open
3777149.126.72.220 8237 tcp tcpwrapped open
3778149.126.72.220 8238 tcp tcpwrapped open
3779149.126.72.220 8239 tcp tcpwrapped open
3780149.126.72.220 8241 tcp tcpwrapped open
3781149.126.72.220 8243 tcp tcpwrapped open
3782149.126.72.220 8248 tcp tcpwrapped open
3783149.126.72.220 8249 tcp tcpwrapped open
3784149.126.72.220 8250 tcp tcpwrapped open
3785149.126.72.220 8251 tcp tcpwrapped open
3786149.126.72.220 8252 tcp tcpwrapped open
3787149.126.72.220 8280 tcp tcpwrapped open
3788149.126.72.220 8282 tcp tcpwrapped open
3789149.126.72.220 8333 tcp tcpwrapped open
3790149.126.72.220 8340 tcp tcpwrapped open
3791149.126.72.220 8343 tcp tcpwrapped open
3792149.126.72.220 8350 tcp tcpwrapped open
3793149.126.72.220 8381 tcp tcpwrapped open
3794149.126.72.220 8382 tcp tcpwrapped open
3795149.126.72.220 8383 tcp tcpwrapped open
3796149.126.72.220 8384 tcp tcpwrapped open
3797149.126.72.220 8385 tcp tcpwrapped open
3798149.126.72.220 8388 tcp tcpwrapped open
3799149.126.72.220 8393 tcp tcpwrapped open
3800149.126.72.220 8401 tcp tcpwrapped open
3801149.126.72.220 8402 tcp tcpwrapped open
3802149.126.72.220 8403 tcp tcpwrapped open
3803149.126.72.220 8404 tcp tcpwrapped open
3804149.126.72.220 8405 tcp tcpwrapped open
3805149.126.72.220 8406 tcp tcpwrapped open
3806149.126.72.220 8407 tcp tcpwrapped open
3807149.126.72.220 8408 tcp tcpwrapped open
3808149.126.72.220 8409 tcp tcpwrapped open
3809149.126.72.220 8410 tcp tcpwrapped open
3810149.126.72.220 8411 tcp tcpwrapped open
3811149.126.72.220 8412 tcp tcpwrapped open
3812149.126.72.220 8413 tcp tcpwrapped open
3813149.126.72.220 8414 tcp tcpwrapped open
3814149.126.72.220 8415 tcp tcpwrapped open
3815149.126.72.220 8416 tcp tcpwrapped open
3816149.126.72.220 8417 tcp tcpwrapped open
3817149.126.72.220 8418 tcp tcpwrapped open
3818149.126.72.220 8419 tcp tcpwrapped open
3819149.126.72.220 8420 tcp tcpwrapped open
3820149.126.72.220 8421 tcp tcpwrapped open
3821149.126.72.220 8422 tcp tcpwrapped open
3822149.126.72.220 8423 tcp tcpwrapped open
3823149.126.72.220 8424 tcp tcpwrapped open
3824149.126.72.220 8425 tcp tcpwrapped open
3825149.126.72.220 8426 tcp tcpwrapped open
3826149.126.72.220 8427 tcp tcpwrapped open
3827149.126.72.220 8428 tcp tcpwrapped open
3828149.126.72.220 8429 tcp tcpwrapped open
3829149.126.72.220 8430 tcp tcpwrapped open
3830149.126.72.220 8431 tcp tcpwrapped open
3831149.126.72.220 8432 tcp tcpwrapped open
3832149.126.72.220 8433 tcp tcpwrapped open
3833149.126.72.220 8435 tcp tcpwrapped open
3834149.126.72.220 8440 tcp tcpwrapped open
3835149.126.72.220 8441 tcp tcpwrapped open
3836149.126.72.220 8442 tcp tcpwrapped open
3837149.126.72.220 8443 tcp tcpwrapped open
3838149.126.72.220 8444 tcp tcpwrapped open
3839149.126.72.220 8445 tcp tcpwrapped open
3840149.126.72.220 8446 tcp tcpwrapped open
3841149.126.72.220 8447 tcp tcpwrapped open
3842149.126.72.220 8448 tcp tcpwrapped open
3843149.126.72.220 8449 tcp tcpwrapped open
3844149.126.72.220 8450 tcp tcpwrapped open
3845149.126.72.220 8451 tcp tcpwrapped open
3846149.126.72.220 8452 tcp tcpwrapped open
3847149.126.72.220 8453 tcp tcpwrapped open
3848149.126.72.220 8454 tcp tcpwrapped open
3849149.126.72.220 8455 tcp tcpwrapped open
3850149.126.72.220 8456 tcp tcpwrapped open
3851149.126.72.220 8457 tcp tcpwrapped open
3852149.126.72.220 8458 tcp tcpwrapped open
3853149.126.72.220 8459 tcp tcpwrapped open
3854149.126.72.220 8460 tcp tcpwrapped open
3855149.126.72.220 8461 tcp tcpwrapped open
3856149.126.72.220 8462 tcp tcpwrapped open
3857149.126.72.220 8463 tcp tcpwrapped open
3858149.126.72.220 8464 tcp tcpwrapped open
3859149.126.72.220 8465 tcp tcpwrapped open
3860149.126.72.220 8466 tcp tcpwrapped open
3861149.126.72.220 8467 tcp tcpwrapped open
3862149.126.72.220 8470 tcp tcpwrapped open
3863149.126.72.220 8472 tcp tcpwrapped open
3864149.126.72.220 8473 tcp tcpwrapped open
3865149.126.72.220 8475 tcp tcpwrapped open
3866149.126.72.220 8480 tcp tcpwrapped open
3867149.126.72.220 8481 tcp tcpwrapped open
3868149.126.72.220 8482 tcp tcpwrapped open
3869149.126.72.220 8484 tcp tcpwrapped open
3870149.126.72.220 8485 tcp tcpwrapped open
3871149.126.72.220 8488 tcp tcpwrapped open
3872149.126.72.220 8493 tcp tcpwrapped open
3873149.126.72.220 8494 tcp tcpwrapped open
3874149.126.72.220 8500 tcp tcpwrapped open
3875149.126.72.220 8502 tcp tcpwrapped open
3876149.126.72.220 8503 tcp tcpwrapped open
3877149.126.72.220 8504 tcp tcpwrapped open
3878149.126.72.220 8505 tcp tcpwrapped open
3879149.126.72.220 8506 tcp tcpwrapped open
3880149.126.72.220 8510 tcp tcpwrapped open
3881149.126.72.220 8513 tcp tcpwrapped open
3882149.126.72.220 8514 tcp tcpwrapped open
3883149.126.72.220 8515 tcp tcpwrapped open
3884149.126.72.220 8519 tcp tcpwrapped open
3885149.126.72.220 8520 tcp tcpwrapped open
3886149.126.72.220 8521 tcp tcpwrapped open
3887149.126.72.220 8523 tcp tcpwrapped open
3888149.126.72.220 8524 tcp tcpwrapped open
3889149.126.72.220 8525 tcp tcpwrapped open
3890149.126.72.220 8526 tcp tcpwrapped open
3891149.126.72.220 8528 tcp tcpwrapped open
3892149.126.72.220 8529 tcp tcpwrapped open
3893149.126.72.220 8530 tcp tcpwrapped open
3894149.126.72.220 8531 tcp tcpwrapped open
3895149.126.72.220 8532 tcp tcpwrapped open
3896149.126.72.220 8533 tcp tcpwrapped open
3897149.126.72.220 8536 tcp tcpwrapped open
3898149.126.72.220 8540 tcp tcpwrapped open
3899149.126.72.220 8543 tcp tcpwrapped open
3900149.126.72.220 8544 tcp tcpwrapped open
3901149.126.72.220 8548 tcp tcpwrapped open
3902149.126.72.220 8549 tcp tcpwrapped open
3903149.126.72.220 8550 tcp tcpwrapped open
3904149.126.72.220 8551 tcp tcpwrapped open
3905149.126.72.220 8553 tcp tcpwrapped open
3906149.126.72.220 8556 tcp tcpwrapped open
3907149.126.72.220 8557 tcp tcpwrapped open
3908149.126.72.220 8558 tcp tcpwrapped open
3909149.126.72.220 8560 tcp tcpwrapped open
3910149.126.72.220 8561 tcp tcpwrapped open
3911149.126.72.220 8562 tcp tcpwrapped open
3912149.126.72.220 8563 tcp tcpwrapped open
3913149.126.72.220 8564 tcp tcpwrapped open
3914149.126.72.220 8565 tcp tcpwrapped open
3915149.126.72.220 8566 tcp tcpwrapped open
3916149.126.72.220 8567 tcp tcpwrapped open
3917149.126.72.220 8568 tcp tcpwrapped open
3918149.126.72.220 8569 tcp tcpwrapped open
3919149.126.72.220 8570 tcp tcpwrapped open
3920149.126.72.220 8571 tcp tcpwrapped open
3921149.126.72.220 8573 tcp tcpwrapped open
3922149.126.72.220 8574 tcp tcpwrapped open
3923149.126.72.220 8575 tcp tcpwrapped open
3924149.126.72.220 8576 tcp tcpwrapped open
3925149.126.72.220 8577 tcp tcpwrapped open
3926149.126.72.220 8578 tcp tcpwrapped open
3927149.126.72.220 8579 tcp tcpwrapped open
3928149.126.72.220 8580 tcp tcpwrapped open
3929149.126.72.220 8581 tcp tcpwrapped open
3930149.126.72.220 8582 tcp tcpwrapped open
3931149.126.72.220 8583 tcp tcpwrapped open
3932149.126.72.220 8585 tcp tcpwrapped open
3933149.126.72.220 8586 tcp tcpwrapped open
3934149.126.72.220 8588 tcp tcpwrapped open
3935149.126.72.220 8589 tcp tcpwrapped open
3936149.126.72.220 8590 tcp tcpwrapped open
3937149.126.72.220 8591 tcp tcpwrapped open
3938149.126.72.220 8592 tcp tcpwrapped open
3939149.126.72.220 8593 tcp tcpwrapped open
3940149.126.72.220 8594 tcp tcpwrapped open
3941149.126.72.220 8595 tcp tcpwrapped open
3942149.126.72.220 8596 tcp tcpwrapped open
3943149.126.72.220 8597 tcp tcpwrapped open
3944149.126.72.220 8598 tcp tcpwrapped open
3945149.126.72.220 8599 tcp tcpwrapped open
3946149.126.72.220 8600 tcp tcpwrapped open
3947149.126.72.220 8601 tcp tcpwrapped open
3948149.126.72.220 8605 tcp tcpwrapped open
3949149.126.72.220 8606 tcp tcpwrapped open
3950149.126.72.220 8630 tcp tcpwrapped open
3951149.126.72.220 8640 tcp tcpwrapped open
3952149.126.72.220 8641 tcp tcpwrapped open
3953149.126.72.220 8643 tcp tcpwrapped open
3954149.126.72.220 8663 tcp tcpwrapped open
3955149.126.72.220 8666 tcp tcpwrapped open
3956149.126.72.220 8686 tcp tcpwrapped open
3957149.126.72.220 8688 tcp tcpwrapped open
3958149.126.72.220 8700 tcp tcpwrapped open
3959149.126.72.220 8701 tcp tcpwrapped open
3960149.126.72.220 8702 tcp tcpwrapped open
3961149.126.72.220 8703 tcp tcpwrapped open
3962149.126.72.220 8704 tcp tcpwrapped open
3963149.126.72.220 8705 tcp tcpwrapped open
3964149.126.72.220 8706 tcp tcpwrapped open
3965149.126.72.220 8707 tcp tcpwrapped open
3966149.126.72.220 8708 tcp tcpwrapped open
3967149.126.72.220 8709 tcp tcpwrapped open
3968149.126.72.220 8723 tcp tcpwrapped open
3969149.126.72.220 8724 tcp tcpwrapped open
3970149.126.72.220 8731 tcp tcpwrapped open
3971149.126.72.220 8732 tcp tcpwrapped open
3972149.126.72.220 8764 tcp tcpwrapped open
3973149.126.72.220 8765 tcp tcpwrapped open
3974149.126.72.220 8766 tcp tcpwrapped open
3975149.126.72.220 8767 tcp tcpwrapped open
3976149.126.72.220 8771 tcp tcpwrapped open
3977149.126.72.220 8787 tcp tcpwrapped open
3978149.126.72.220 8788 tcp tcpwrapped open
3979149.126.72.220 8789 tcp tcpwrapped open
3980149.126.72.220 8790 tcp tcpwrapped open
3981149.126.72.220 8791 tcp tcpwrapped open
3982149.126.72.220 8800 tcp tcpwrapped open
3983149.126.72.220 8801 tcp tcpwrapped open
3984149.126.72.220 8802 tcp tcpwrapped open
3985149.126.72.220 8803 tcp tcpwrapped open
3986149.126.72.220 8804 tcp tcpwrapped open
3987149.126.72.220 8805 tcp tcpwrapped open
3988149.126.72.220 8806 tcp tcpwrapped open
3989149.126.72.220 8807 tcp tcpwrapped open
3990149.126.72.220 8808 tcp tcpwrapped open
3991149.126.72.220 8809 tcp tcpwrapped open
3992149.126.72.220 8810 tcp tcpwrapped open
3993149.126.72.220 8811 tcp tcpwrapped open
3994149.126.72.220 8812 tcp tcpwrapped open
3995149.126.72.220 8813 tcp tcpwrapped open
3996149.126.72.220 8814 tcp tcpwrapped open
3997149.126.72.220 8815 tcp tcpwrapped open
3998149.126.72.220 8816 tcp tcpwrapped open
3999149.126.72.220 8817 tcp tcpwrapped open
4000149.126.72.220 8818 tcp tcpwrapped open
4001149.126.72.220 8819 tcp tcpwrapped open
4002149.126.72.220 8820 tcp tcpwrapped open
4003149.126.72.220 8821 tcp tcpwrapped open
4004149.126.72.220 8822 tcp tcpwrapped open
4005149.126.72.220 8823 tcp tcpwrapped open
4006149.126.72.220 8824 tcp tcpwrapped open
4007149.126.72.220 8825 tcp tcpwrapped open
4008149.126.72.220 8826 tcp tcpwrapped open
4009149.126.72.220 8827 tcp tcpwrapped open
4010149.126.72.220 8828 tcp tcpwrapped open
4011149.126.72.220 8829 tcp tcpwrapped open
4012149.126.72.220 8830 tcp tcpwrapped open
4013149.126.72.220 8831 tcp tcpwrapped open
4014149.126.72.220 8832 tcp tcpwrapped open
4015149.126.72.220 8833 tcp tcpwrapped open
4016149.126.72.220 8834 tcp tcpwrapped open
4017149.126.72.220 8835 tcp tcpwrapped open
4018149.126.72.220 8836 tcp tcpwrapped open
4019149.126.72.220 8837 tcp tcpwrapped open
4020149.126.72.220 8838 tcp tcpwrapped open
4021149.126.72.220 8839 tcp tcpwrapped open
4022149.126.72.220 8840 tcp tcpwrapped open
4023149.126.72.220 8841 tcp tcpwrapped open
4024149.126.72.220 8842 tcp tcpwrapped open
4025149.126.72.220 8843 tcp tcpwrapped open
4026149.126.72.220 8844 tcp tcpwrapped open
4027149.126.72.220 8845 tcp tcpwrapped open
4028149.126.72.220 8846 tcp tcpwrapped open
4029149.126.72.220 8847 tcp tcpwrapped open
4030149.126.72.220 8848 tcp tcpwrapped open
4031149.126.72.220 8849 tcp tcpwrapped open
4032149.126.72.220 8850 tcp tcpwrapped open
4033149.126.72.220 8851 tcp tcpwrapped open
4034149.126.72.220 8852 tcp tcpwrapped open
4035149.126.72.220 8853 tcp tcpwrapped open
4036149.126.72.220 8854 tcp tcpwrapped open
4037149.126.72.220 8855 tcp tcpwrapped open
4038149.126.72.220 8856 tcp tcpwrapped open
4039149.126.72.220 8857 tcp tcpwrapped open
4040149.126.72.220 8858 tcp tcpwrapped open
4041149.126.72.220 8859 tcp tcpwrapped open
4042149.126.72.220 8860 tcp tcpwrapped open
4043149.126.72.220 8861 tcp tcpwrapped open
4044149.126.72.220 8862 tcp tcpwrapped open
4045149.126.72.220 8863 tcp tcpwrapped open
4046149.126.72.220 8864 tcp tcpwrapped open
4047149.126.72.220 8865 tcp tcpwrapped open
4048149.126.72.220 8866 tcp tcpwrapped open
4049149.126.72.220 8867 tcp tcpwrapped open
4050149.126.72.220 8868 tcp tcpwrapped open
4051149.126.72.220 8869 tcp tcpwrapped open
4052149.126.72.220 8870 tcp tcpwrapped open
4053149.126.72.220 8871 tcp tcpwrapped open
4054149.126.72.220 8872 tcp tcpwrapped open
4055149.126.72.220 8873 tcp tcpwrapped open
4056149.126.72.220 8874 tcp tcpwrapped open
4057149.126.72.220 8875 tcp tcpwrapped open
4058149.126.72.220 8876 tcp tcpwrapped open
4059149.126.72.220 8877 tcp tcpwrapped open
4060149.126.72.220 8878 tcp tcpwrapped open
4061149.126.72.220 8879 tcp tcpwrapped open
4062149.126.72.220 8880 tcp tcpwrapped open
4063149.126.72.220 8881 tcp tcpwrapped open
4064149.126.72.220 8882 tcp tcpwrapped open
4065149.126.72.220 8883 tcp tcpwrapped open
4066149.126.72.220 8884 tcp tcpwrapped open
4067149.126.72.220 8885 tcp tcpwrapped open
4068149.126.72.220 8887 tcp tcpwrapped open
4069149.126.72.220 8888 tcp tcpwrapped open
4070149.126.72.220 8889 tcp tcpwrapped open
4071149.126.72.220 8890 tcp tcpwrapped open
4072149.126.72.220 8891 tcp tcpwrapped open
4073149.126.72.220 8899 tcp tcpwrapped open
4074149.126.72.220 8900 tcp tcpwrapped open
4075149.126.72.220 8901 tcp tcpwrapped open
4076149.126.72.220 8902 tcp tcpwrapped open
4077149.126.72.220 8905 tcp tcpwrapped open
4078149.126.72.220 8906 tcp tcpwrapped open
4079149.126.72.220 8907 tcp tcpwrapped open
4080149.126.72.220 8908 tcp tcpwrapped open
4081149.126.72.220 8910 tcp tcpwrapped open
4082149.126.72.220 8911 tcp tcpwrapped open
4083149.126.72.220 8912 tcp tcpwrapped open
4084149.126.72.220 8913 tcp tcpwrapped open
4085149.126.72.220 8915 tcp tcpwrapped open
4086149.126.72.220 8916 tcp tcpwrapped open
4087149.126.72.220 8935 tcp tcpwrapped open
4088149.126.72.220 8943 tcp tcpwrapped open
4089149.126.72.220 8969 tcp tcpwrapped open
4090149.126.72.220 8988 tcp tcpwrapped open
4091149.126.72.220 8989 tcp tcpwrapped open
4092149.126.72.220 8999 tcp tcpwrapped open
4093149.126.72.220 9000 tcp tcpwrapped open
4094149.126.72.220 9001 tcp tcpwrapped open
4095149.126.72.220 9002 tcp tcpwrapped open
4096149.126.72.220 9003 tcp tcpwrapped open
4097149.126.72.220 9004 tcp tcpwrapped open
4098149.126.72.220 9005 tcp tcpwrapped open
4099149.126.72.220 9006 tcp tcpwrapped open
4100149.126.72.220 9007 tcp tcpwrapped open
4101149.126.72.220 9008 tcp tcpwrapped open
4102149.126.72.220 9009 tcp tcpwrapped open
4103149.126.72.220 9010 tcp tcpwrapped open
4104149.126.72.220 9011 tcp tcpwrapped open
4105149.126.72.220 9012 tcp tcpwrapped open
4106149.126.72.220 9013 tcp tcpwrapped open
4107149.126.72.220 9014 tcp tcpwrapped open
4108149.126.72.220 9015 tcp tcpwrapped open
4109149.126.72.220 9016 tcp tcpwrapped open
4110149.126.72.220 9017 tcp tcpwrapped open
4111149.126.72.220 9018 tcp tcpwrapped open
4112149.126.72.220 9019 tcp tcpwrapped open
4113149.126.72.220 9020 tcp tcpwrapped open
4114149.126.72.220 9021 tcp tcpwrapped open
4115149.126.72.220 9022 tcp tcpwrapped open
4116149.126.72.220 9023 tcp tcpwrapped open
4117149.126.72.220 9024 tcp tcpwrapped open
4118149.126.72.220 9025 tcp tcpwrapped open
4119149.126.72.220 9026 tcp tcpwrapped open
4120149.126.72.220 9027 tcp tcpwrapped open
4121149.126.72.220 9028 tcp tcpwrapped open
4122149.126.72.220 9029 tcp tcpwrapped open
4123149.126.72.220 9030 tcp tcpwrapped open
4124149.126.72.220 9031 tcp tcpwrapped open
4125149.126.72.220 9032 tcp tcpwrapped open
4126149.126.72.220 9033 tcp tcpwrapped open
4127149.126.72.220 9034 tcp tcpwrapped open
4128149.126.72.220 9035 tcp tcpwrapped open
4129149.126.72.220 9036 tcp tcpwrapped open
4130149.126.72.220 9037 tcp tcpwrapped open
4131149.126.72.220 9038 tcp tcpwrapped open
4132149.126.72.220 9039 tcp tcpwrapped open
4133149.126.72.220 9040 tcp tcpwrapped open
4134149.126.72.220 9041 tcp tcpwrapped open
4135149.126.72.220 9042 tcp tcpwrapped open
4136149.126.72.220 9043 tcp tcpwrapped open
4137149.126.72.220 9044 tcp tcpwrapped open
4138149.126.72.220 9045 tcp tcpwrapped open
4139149.126.72.220 9046 tcp tcpwrapped open
4140149.126.72.220 9047 tcp tcpwrapped open
4141149.126.72.220 9048 tcp tcpwrapped open
4142149.126.72.220 9049 tcp tcpwrapped open
4143149.126.72.220 9050 tcp tcpwrapped open
4144149.126.72.220 9051 tcp tcpwrapped open
4145149.126.72.220 9052 tcp tcpwrapped open
4146149.126.72.220 9058 tcp tcpwrapped open
4147149.126.72.220 9060 tcp tcpwrapped open
4148149.126.72.220 9061 tcp tcpwrapped open
4149149.126.72.220 9070 tcp tcpwrapped open
4150149.126.72.220 9080 tcp tcpwrapped open
4151149.126.72.220 9081 tcp tcpwrapped open
4152149.126.72.220 9082 tcp tcpwrapped open
4153149.126.72.220 9084 tcp tcpwrapped open
4154149.126.72.220 9085 tcp tcpwrapped open
4155149.126.72.220 9086 tcp tcpwrapped open
4156149.126.72.220 9088 tcp tcpwrapped open
4157149.126.72.220 9089 tcp tcpwrapped open
4158149.126.72.220 9090 tcp tcpwrapped open
4159149.126.72.220 9091 tcp tcpwrapped open
4160149.126.72.220 9092 tcp tcpwrapped open
4161149.126.72.220 9093 tcp tcpwrapped open
4162149.126.72.220 9094 tcp tcpwrapped open
4163149.126.72.220 9095 tcp tcpwrapped open
4164149.126.72.220 9096 tcp tcpwrapped open
4165149.126.72.220 9097 tcp tcpwrapped open
4166149.126.72.220 9098 tcp tcpwrapped open
4167149.126.72.220 9099 tcp tcpwrapped open
4168149.126.72.220 9100 tcp jetdirect open
4169149.126.72.220 9101 tcp jetdirect open
4170149.126.72.220 9102 tcp jetdirect open
4171149.126.72.220 9103 tcp jetdirect open
4172149.126.72.220 9104 tcp jetdirect open
4173149.126.72.220 9105 tcp jetdirect open
4174149.126.72.220 9106 tcp jetdirect open
4175149.126.72.220 9107 tcp jetdirect open
4176149.126.72.220 9108 tcp tcpwrapped open
4177149.126.72.220 9109 tcp tcpwrapped open
4178149.126.72.220 9110 tcp tcpwrapped open
4179149.126.72.220 9111 tcp tcpwrapped open
4180149.126.72.220 9136 tcp tcpwrapped open
4181149.126.72.220 9143 tcp tcpwrapped open
4182149.126.72.220 9189 tcp tcpwrapped open
4183149.126.72.220 9199 tcp tcpwrapped open
4184149.126.72.220 9200 tcp tcpwrapped open
4185149.126.72.220 9201 tcp tcpwrapped open
4186149.126.72.220 9202 tcp tcpwrapped open
4187149.126.72.220 9203 tcp tcpwrapped open
4188149.126.72.220 9204 tcp tcpwrapped open
4189149.126.72.220 9205 tcp tcpwrapped open
4190149.126.72.220 9206 tcp tcpwrapped open
4191149.126.72.220 9207 tcp tcpwrapped open
4192149.126.72.220 9208 tcp tcpwrapped open
4193149.126.72.220 9209 tcp tcpwrapped open
4194149.126.72.220 9210 tcp tcpwrapped open
4195149.126.72.220 9211 tcp tcpwrapped open
4196149.126.72.220 9212 tcp tcpwrapped open
4197149.126.72.220 9213 tcp tcpwrapped open
4198149.126.72.220 9214 tcp tcpwrapped open
4199149.126.72.220 9215 tcp tcpwrapped open
4200149.126.72.220 9216 tcp tcpwrapped open
4201149.126.72.220 9217 tcp tcpwrapped open
4202149.126.72.220 9218 tcp tcpwrapped open
4203149.126.72.220 9219 tcp tcpwrapped open
4204149.126.72.220 9220 tcp tcpwrapped open
4205149.126.72.220 9221 tcp tcpwrapped open
4206149.126.72.220 9236 tcp tcpwrapped open
4207149.126.72.220 9251 tcp tcpwrapped open
4208149.126.72.220 9289 tcp tcpwrapped open
4209149.126.72.220 9299 tcp tcpwrapped open
4210149.126.72.220 9300 tcp tcpwrapped open
4211149.126.72.220 9301 tcp tcpwrapped open
4212149.126.72.220 9302 tcp tcpwrapped open
4213149.126.72.220 9303 tcp tcpwrapped open
4214149.126.72.220 9304 tcp tcpwrapped open
4215149.126.72.220 9305 tcp tcpwrapped open
4216149.126.72.220 9306 tcp tcpwrapped open
4217149.126.72.220 9307 tcp tcpwrapped open
4218149.126.72.220 9308 tcp tcpwrapped open
4219149.126.72.220 9309 tcp tcpwrapped open
4220149.126.72.220 9310 tcp tcpwrapped open
4221149.126.72.220 9311 tcp tcpwrapped open
4222149.126.72.220 9350 tcp tcpwrapped open
4223149.126.72.220 9383 tcp tcpwrapped open
4224149.126.72.220 9387 tcp tcpwrapped open
4225149.126.72.220 9389 tcp tcpwrapped open
4226149.126.72.220 9433 tcp tcpwrapped open
4227149.126.72.220 9443 tcp tcpwrapped open
4228149.126.72.220 9444 tcp tcpwrapped open
4229149.126.72.220 9446 tcp tcpwrapped open
4230149.126.72.220 9447 tcp tcpwrapped open
4231149.126.72.220 9500 tcp tcpwrapped open
4232149.126.72.220 9510 tcp tcpwrapped open
4233149.126.72.220 9530 tcp tcpwrapped open
4234149.126.72.220 9550 tcp tcpwrapped open
4235149.126.72.220 9600 tcp tcpwrapped open
4236149.126.72.220 9663 tcp tcpwrapped open
4237149.126.72.220 9690 tcp tcpwrapped open
4238149.126.72.220 9704 tcp tcpwrapped open
4239149.126.72.220 9710 tcp tcpwrapped open
4240149.126.72.220 9711 tcp tcpwrapped open
4241149.126.72.220 9765 tcp tcpwrapped open
4242149.126.72.220 9773 tcp tcpwrapped open
4243149.126.72.220 9779 tcp tcpwrapped open
4244149.126.72.220 9800 tcp tcpwrapped open
4245149.126.72.220 9803 tcp tcpwrapped open
4246149.126.72.220 9804 tcp tcpwrapped open
4247149.126.72.220 9950 tcp tcpwrapped open
4248149.126.72.220 9991 tcp tcpwrapped open
4249149.126.72.220 9992 tcp tcpwrapped open
4250149.126.72.220 9993 tcp tcpwrapped open
4251149.126.72.220 9994 tcp tcpwrapped open
4252149.126.72.220 9997 tcp tcpwrapped open
4253149.126.72.220 9998 tcp tcpwrapped open
4254149.126.72.220 9999 tcp tcpwrapped open
4255149.126.72.220 10000 tcp tcpwrapped open
4256149.126.72.220 10001 tcp tcpwrapped open
4257149.126.72.220 10002 tcp tcpwrapped open
4258149.126.72.220 10003 tcp tcpwrapped open
4259149.126.72.220 10004 tcp tcpwrapped open
4260149.126.72.220 10005 tcp tcpwrapped open
4261149.126.72.220 10006 tcp tcpwrapped open
4262149.126.72.220 10007 tcp tcpwrapped open
4263149.126.72.220 10008 tcp tcpwrapped open
4264149.126.72.220 10009 tcp tcpwrapped open
4265149.126.72.220 10010 tcp tcpwrapped open
4266149.126.72.220 10011 tcp tcpwrapped open
4267149.126.72.220 10012 tcp tcpwrapped open
4268149.126.72.220 10013 tcp tcpwrapped open
4269149.126.72.220 10014 tcp tcpwrapped open
4270149.126.72.220 10015 tcp tcpwrapped open
4271149.126.72.220 10016 tcp tcpwrapped open
4272149.126.72.220 10017 tcp tcpwrapped open
4273149.126.72.220 10018 tcp tcpwrapped open
4274149.126.72.220 10019 tcp tcpwrapped open
4275149.126.72.220 10020 tcp tcpwrapped open
4276149.126.72.220 10021 tcp tcpwrapped open
4277149.126.72.220 10022 tcp tcpwrapped open
4278149.126.72.220 10023 tcp tcpwrapped open
4279149.126.72.220 10024 tcp tcpwrapped open
4280149.126.72.220 10025 tcp tcpwrapped open
4281149.126.72.220 10026 tcp tcpwrapped open
4282149.126.72.220 10027 tcp tcpwrapped open
4283149.126.72.220 10028 tcp tcpwrapped open
4284149.126.72.220 10029 tcp tcpwrapped open
4285149.126.72.220 10030 tcp tcpwrapped open
4286149.126.72.220 10031 tcp tcpwrapped open
4287149.126.72.220 10032 tcp tcpwrapped open
4288149.126.72.220 10033 tcp tcpwrapped open
4289149.126.72.220 10034 tcp tcpwrapped open
4290149.126.72.220 10035 tcp tcpwrapped open
4291149.126.72.220 10036 tcp tcpwrapped open
4292149.126.72.220 10037 tcp tcpwrapped open
4293149.126.72.220 10038 tcp tcpwrapped open
4294149.126.72.220 10039 tcp tcpwrapped open
4295149.126.72.220 10040 tcp tcpwrapped open
4296149.126.72.220 10041 tcp tcpwrapped open
4297149.126.72.220 10042 tcp tcpwrapped open
4298149.126.72.220 10043 tcp tcpwrapped open
4299149.126.72.220 10044 tcp tcpwrapped open
4300149.126.72.220 10045 tcp tcpwrapped open
4301149.126.72.220 10046 tcp tcpwrapped open
4302149.126.72.220 10047 tcp tcpwrapped open
4303149.126.72.220 10048 tcp tcpwrapped open
4304149.126.72.220 10049 tcp tcpwrapped open
4305149.126.72.220 10065 tcp tcpwrapped open
4306149.126.72.220 10071 tcp tcpwrapped open
4307149.126.72.220 10075 tcp tcpwrapped open
4308149.126.72.220 10082 tcp tcpwrapped open
4309149.126.72.220 10084 tcp tcpwrapped open
4310149.126.72.220 10100 tcp tcpwrapped open
4311149.126.72.220 10123 tcp tcpwrapped open
4312149.126.72.220 10200 tcp tcpwrapped open
4313149.126.72.220 10443 tcp tcpwrapped open
4314149.126.72.220 10444 tcp tcpwrapped open
4315149.126.72.220 10892 tcp tcpwrapped open
4316149.126.72.220 10894 tcp tcpwrapped open
4317149.126.72.220 11001 tcp tcpwrapped open
4318149.126.72.220 11002 tcp tcpwrapped open
4319149.126.72.220 11007 tcp tcpwrapped open
4320149.126.72.220 11027 tcp tcpwrapped open
4321149.126.72.220 11065 tcp tcpwrapped open
4322149.126.72.220 11075 tcp tcpwrapped open
4323149.126.72.220 11082 tcp tcpwrapped open
4324149.126.72.220 11084 tcp tcpwrapped open
4325149.126.72.220 11110 tcp tcpwrapped open
4326149.126.72.220 11182 tcp tcpwrapped open
4327149.126.72.220 11184 tcp tcpwrapped open
4328149.126.72.220 11443 tcp tcpwrapped open
4329149.126.72.220 12016 tcp tcpwrapped open
4330149.126.72.220 12082 tcp tcpwrapped open
4331149.126.72.220 12084 tcp tcpwrapped open
4332149.126.72.220 12103 tcp tcpwrapped open
4333149.126.72.220 12104 tcp tcpwrapped open
4334149.126.72.220 12105 tcp tcpwrapped open
4335149.126.72.220 12106 tcp tcpwrapped open
4336149.126.72.220 12107 tcp tcpwrapped open
4337149.126.72.220 12108 tcp tcpwrapped open
4338149.126.72.220 12109 tcp tcpwrapped open
4339149.126.72.220 12110 tcp tcpwrapped open
4340149.126.72.220 12111 tcp tcpwrapped open
4341149.126.72.220 12112 tcp tcpwrapped open
4342149.126.72.220 12113 tcp tcpwrapped open
4343149.126.72.220 12114 tcp tcpwrapped open
4344149.126.72.220 12115 tcp tcpwrapped open
4345149.126.72.220 12116 tcp tcpwrapped open
4346149.126.72.220 12117 tcp tcpwrapped open
4347149.126.72.220 12118 tcp tcpwrapped open
4348149.126.72.220 12119 tcp tcpwrapped open
4349149.126.72.220 12120 tcp tcpwrapped open
4350149.126.72.220 12121 tcp tcpwrapped open
4351149.126.72.220 12122 tcp tcpwrapped open
4352149.126.72.220 12123 tcp tcpwrapped open
4353149.126.72.220 12124 tcp tcpwrapped open
4354149.126.72.220 12125 tcp tcpwrapped open
4355149.126.72.220 12126 tcp tcpwrapped open
4356149.126.72.220 12127 tcp tcpwrapped open
4357149.126.72.220 12128 tcp tcpwrapped open
4358149.126.72.220 12129 tcp tcpwrapped open
4359149.126.72.220 12130 tcp tcpwrapped open
4360149.126.72.220 12131 tcp tcpwrapped open
4361149.126.72.220 12132 tcp tcpwrapped open
4362149.126.72.220 12133 tcp tcpwrapped open
4363149.126.72.220 12134 tcp tcpwrapped open
4364149.126.72.220 12135 tcp tcpwrapped open
4365149.126.72.220 12136 tcp tcpwrapped open
4366149.126.72.220 12137 tcp tcpwrapped open
4367149.126.72.220 12138 tcp tcpwrapped open
4368149.126.72.220 12139 tcp tcpwrapped open
4369149.126.72.220 12140 tcp tcpwrapped open
4370149.126.72.220 12141 tcp tcpwrapped open
4371149.126.72.220 12142 tcp tcpwrapped open
4372149.126.72.220 12143 tcp tcpwrapped open
4373149.126.72.220 12144 tcp tcpwrapped open
4374149.126.72.220 12145 tcp tcpwrapped open
4375149.126.72.220 12146 tcp tcpwrapped open
4376149.126.72.220 12147 tcp tcpwrapped open
4377149.126.72.220 12148 tcp tcpwrapped open
4378149.126.72.220 12149 tcp tcpwrapped open
4379149.126.72.220 12150 tcp tcpwrapped open
4380149.126.72.220 12151 tcp tcpwrapped open
4381149.126.72.220 12152 tcp tcpwrapped open
4382149.126.72.220 12153 tcp tcpwrapped open
4383149.126.72.220 12154 tcp tcpwrapped open
4384149.126.72.220 12155 tcp tcpwrapped open
4385149.126.72.220 12156 tcp tcpwrapped open
4386149.126.72.220 12157 tcp tcpwrapped open
4387149.126.72.220 12158 tcp tcpwrapped open
4388149.126.72.220 12159 tcp tcpwrapped open
4389149.126.72.220 12160 tcp tcpwrapped open
4390149.126.72.220 12161 tcp tcpwrapped open
4391149.126.72.220 12162 tcp tcpwrapped open
4392149.126.72.220 12163 tcp tcpwrapped open
4393149.126.72.220 12164 tcp tcpwrapped open
4394149.126.72.220 12165 tcp tcpwrapped open
4395149.126.72.220 12166 tcp tcpwrapped open
4396149.126.72.220 12167 tcp tcpwrapped open
4397149.126.72.220 12168 tcp tcpwrapped open
4398149.126.72.220 12169 tcp tcpwrapped open
4399149.126.72.220 12170 tcp tcpwrapped open
4400149.126.72.220 12171 tcp tcpwrapped open
4401149.126.72.220 12172 tcp tcpwrapped open
4402149.126.72.220 12173 tcp tcpwrapped open
4403149.126.72.220 12174 tcp tcpwrapped open
4404149.126.72.220 12175 tcp tcpwrapped open
4405149.126.72.220 12176 tcp tcpwrapped open
4406149.126.72.220 12177 tcp tcpwrapped open
4407149.126.72.220 12178 tcp tcpwrapped open
4408149.126.72.220 12179 tcp tcpwrapped open
4409149.126.72.220 12180 tcp tcpwrapped open
4410149.126.72.220 12181 tcp tcpwrapped open
4411149.126.72.220 12182 tcp tcpwrapped open
4412149.126.72.220 12183 tcp tcpwrapped open
4413149.126.72.220 12184 tcp tcpwrapped open
4414149.126.72.220 12185 tcp tcpwrapped open
4415149.126.72.220 12186 tcp tcpwrapped open
4416149.126.72.220 12187 tcp tcpwrapped open
4417149.126.72.220 12188 tcp tcpwrapped open
4418149.126.72.220 12189 tcp tcpwrapped open
4419149.126.72.220 12190 tcp tcpwrapped open
4420149.126.72.220 12191 tcp tcpwrapped open
4421149.126.72.220 12192 tcp tcpwrapped open
4422149.126.72.220 12193 tcp tcpwrapped open
4423149.126.72.220 12194 tcp tcpwrapped open
4424149.126.72.220 12195 tcp tcpwrapped open
4425149.126.72.220 12196 tcp tcpwrapped open
4426149.126.72.220 12197 tcp tcpwrapped open
4427149.126.72.220 12198 tcp tcpwrapped open
4428149.126.72.220 12199 tcp tcpwrapped open
4429149.126.72.220 12200 tcp tcpwrapped open
4430149.126.72.220 12201 tcp tcpwrapped open
4431149.126.72.220 12202 tcp tcpwrapped open
4432149.126.72.220 12203 tcp tcpwrapped open
4433149.126.72.220 12204 tcp tcpwrapped open
4434149.126.72.220 12205 tcp tcpwrapped open
4435149.126.72.220 12206 tcp tcpwrapped open
4436149.126.72.220 12207 tcp tcpwrapped open
4437149.126.72.220 12208 tcp tcpwrapped open
4438149.126.72.220 12209 tcp tcpwrapped open
4439149.126.72.220 12210 tcp tcpwrapped open
4440149.126.72.220 12211 tcp tcpwrapped open
4441149.126.72.220 12212 tcp tcpwrapped open
4442149.126.72.220 12213 tcp tcpwrapped open
4443149.126.72.220 12214 tcp tcpwrapped open
4444149.126.72.220 12215 tcp tcpwrapped open
4445149.126.72.220 12216 tcp tcpwrapped open
4446149.126.72.220 12217 tcp tcpwrapped open
4447149.126.72.220 12218 tcp tcpwrapped open
4448149.126.72.220 12219 tcp tcpwrapped open
4449149.126.72.220 12220 tcp tcpwrapped open
4450149.126.72.220 12221 tcp tcpwrapped open
4451149.126.72.220 12222 tcp tcpwrapped open
4452149.126.72.220 12223 tcp tcpwrapped open
4453149.126.72.220 12224 tcp tcpwrapped open
4454149.126.72.220 12225 tcp tcpwrapped open
4455149.126.72.220 12226 tcp tcpwrapped open
4456149.126.72.220 12227 tcp tcpwrapped open
4457149.126.72.220 12228 tcp tcpwrapped open
4458149.126.72.220 12229 tcp tcpwrapped open
4459149.126.72.220 12230 tcp tcpwrapped open
4460149.126.72.220 12231 tcp tcpwrapped open
4461149.126.72.220 12232 tcp tcpwrapped open
4462149.126.72.220 12233 tcp tcpwrapped open
4463149.126.72.220 12234 tcp tcpwrapped open
4464149.126.72.220 12235 tcp tcpwrapped open
4465149.126.72.220 12236 tcp tcpwrapped open
4466149.126.72.220 12237 tcp tcpwrapped open
4467149.126.72.220 12238 tcp tcpwrapped open
4468149.126.72.220 12239 tcp tcpwrapped open
4469149.126.72.220 12240 tcp tcpwrapped open
4470149.126.72.220 12241 tcp tcpwrapped open
4471149.126.72.220 12242 tcp tcpwrapped open
4472149.126.72.220 12243 tcp tcpwrapped open
4473149.126.72.220 12244 tcp tcpwrapped open
4474149.126.72.220 12245 tcp tcpwrapped open
4475149.126.72.220 12246 tcp tcpwrapped open
4476149.126.72.220 12247 tcp tcpwrapped open
4477149.126.72.220 12248 tcp tcpwrapped open
4478149.126.72.220 12249 tcp tcpwrapped open
4479149.126.72.220 12250 tcp tcpwrapped open
4480149.126.72.220 12251 tcp tcpwrapped open
4481149.126.72.220 12252 tcp tcpwrapped open
4482149.126.72.220 12253 tcp tcpwrapped open
4483149.126.72.220 12254 tcp tcpwrapped open
4484149.126.72.220 12255 tcp tcpwrapped open
4485149.126.72.220 12256 tcp tcpwrapped open
4486149.126.72.220 12257 tcp tcpwrapped open
4487149.126.72.220 12258 tcp tcpwrapped open
4488149.126.72.220 12259 tcp tcpwrapped open
4489149.126.72.220 12260 tcp tcpwrapped open
4490149.126.72.220 12261 tcp tcpwrapped open
4491149.126.72.220 12262 tcp tcpwrapped open
4492149.126.72.220 12263 tcp tcpwrapped open
4493149.126.72.220 12264 tcp tcpwrapped open
4494149.126.72.220 12265 tcp tcpwrapped open
4495149.126.72.220 12266 tcp tcpwrapped open
4496149.126.72.220 12267 tcp tcpwrapped open
4497149.126.72.220 12268 tcp tcpwrapped open
4498149.126.72.220 12269 tcp tcpwrapped open
4499149.126.72.220 12270 tcp tcpwrapped open
4500149.126.72.220 12271 tcp tcpwrapped open
4501149.126.72.220 12272 tcp tcpwrapped open
4502149.126.72.220 12273 tcp tcpwrapped open
4503149.126.72.220 12274 tcp tcpwrapped open
4504149.126.72.220 12275 tcp tcpwrapped open
4505149.126.72.220 12276 tcp tcpwrapped open
4506149.126.72.220 12277 tcp tcpwrapped open
4507149.126.72.220 12278 tcp tcpwrapped open
4508149.126.72.220 12279 tcp tcpwrapped open
4509149.126.72.220 12280 tcp tcpwrapped open
4510149.126.72.220 12281 tcp tcpwrapped open
4511149.126.72.220 12282 tcp tcpwrapped open
4512149.126.72.220 12283 tcp tcpwrapped open
4513149.126.72.220 12284 tcp tcpwrapped open
4514149.126.72.220 12285 tcp tcpwrapped open
4515149.126.72.220 12286 tcp tcpwrapped open
4516149.126.72.220 12287 tcp tcpwrapped open
4517149.126.72.220 12288 tcp tcpwrapped open
4518149.126.72.220 12289 tcp tcpwrapped open
4519149.126.72.220 12290 tcp tcpwrapped open
4520149.126.72.220 12291 tcp tcpwrapped open
4521149.126.72.220 12292 tcp tcpwrapped open
4522149.126.72.220 12293 tcp tcpwrapped open
4523149.126.72.220 12294 tcp tcpwrapped open
4524149.126.72.220 12295 tcp tcpwrapped open
4525149.126.72.220 12296 tcp tcpwrapped open
4526149.126.72.220 12297 tcp tcpwrapped open
4527149.126.72.220 12298 tcp tcpwrapped open
4528149.126.72.220 12299 tcp tcpwrapped open
4529149.126.72.220 12300 tcp tcpwrapped open
4530149.126.72.220 12301 tcp tcpwrapped open
4531149.126.72.220 12302 tcp tcpwrapped open
4532149.126.72.220 12303 tcp tcpwrapped open
4533149.126.72.220 12304 tcp tcpwrapped open
4534149.126.72.220 12305 tcp tcpwrapped open
4535149.126.72.220 12306 tcp tcpwrapped open
4536149.126.72.220 12307 tcp tcpwrapped open
4537149.126.72.220 12308 tcp tcpwrapped open
4538149.126.72.220 12309 tcp tcpwrapped open
4539149.126.72.220 12310 tcp tcpwrapped open
4540149.126.72.220 12311 tcp tcpwrapped open
4541149.126.72.220 12312 tcp tcpwrapped open
4542149.126.72.220 12313 tcp tcpwrapped open
4543149.126.72.220 12314 tcp tcpwrapped open
4544149.126.72.220 12315 tcp tcpwrapped open
4545149.126.72.220 12316 tcp tcpwrapped open
4546149.126.72.220 12317 tcp tcpwrapped open
4547149.126.72.220 12318 tcp tcpwrapped open
4548149.126.72.220 12319 tcp tcpwrapped open
4549149.126.72.220 12320 tcp tcpwrapped open
4550149.126.72.220 12321 tcp tcpwrapped open
4551149.126.72.220 12322 tcp tcpwrapped open
4552149.126.72.220 12323 tcp tcpwrapped open
4553149.126.72.220 12324 tcp tcpwrapped open
4554149.126.72.220 12325 tcp tcpwrapped open
4555149.126.72.220 12326 tcp tcpwrapped open
4556149.126.72.220 12327 tcp tcpwrapped open
4557149.126.72.220 12328 tcp tcpwrapped open
4558149.126.72.220 12329 tcp tcpwrapped open
4559149.126.72.220 12330 tcp tcpwrapped open
4560149.126.72.220 12331 tcp tcpwrapped open
4561149.126.72.220 12332 tcp tcpwrapped open
4562149.126.72.220 12333 tcp tcpwrapped open
4563149.126.72.220 12334 tcp tcpwrapped open
4564149.126.72.220 12335 tcp tcpwrapped open
4565149.126.72.220 12336 tcp tcpwrapped open
4566149.126.72.220 12337 tcp tcpwrapped open
4567149.126.72.220 12338 tcp tcpwrapped open
4568149.126.72.220 12339 tcp tcpwrapped open
4569149.126.72.220 12340 tcp tcpwrapped open
4570149.126.72.220 12341 tcp tcpwrapped open
4571149.126.72.220 12342 tcp tcpwrapped open
4572149.126.72.220 12343 tcp tcpwrapped open
4573149.126.72.220 12344 tcp tcpwrapped open
4574149.126.72.220 12345 tcp tcpwrapped open
4575149.126.72.220 12346 tcp tcpwrapped open
4576149.126.72.220 12347 tcp tcpwrapped open
4577149.126.72.220 12348 tcp tcpwrapped open
4578149.126.72.220 12349 tcp tcpwrapped open
4579149.126.72.220 12350 tcp tcpwrapped open
4580149.126.72.220 12351 tcp tcpwrapped open
4581149.126.72.220 12352 tcp tcpwrapped open
4582149.126.72.220 12353 tcp tcpwrapped open
4583149.126.72.220 12354 tcp tcpwrapped open
4584149.126.72.220 12355 tcp tcpwrapped open
4585149.126.72.220 12356 tcp tcpwrapped open
4586149.126.72.220 12357 tcp tcpwrapped open
4587149.126.72.220 12358 tcp tcpwrapped open
4588149.126.72.220 12359 tcp tcpwrapped open
4589149.126.72.220 12360 tcp tcpwrapped open
4590149.126.72.220 12361 tcp tcpwrapped open
4591149.126.72.220 12362 tcp tcpwrapped open
4592149.126.72.220 12363 tcp tcpwrapped open
4593149.126.72.220 12364 tcp tcpwrapped open
4594149.126.72.220 12365 tcp tcpwrapped open
4595149.126.72.220 12366 tcp tcpwrapped open
4596149.126.72.220 12367 tcp tcpwrapped open
4597149.126.72.220 12368 tcp tcpwrapped open
4598149.126.72.220 12369 tcp tcpwrapped open
4599149.126.72.220 12370 tcp tcpwrapped open
4600149.126.72.220 12371 tcp tcpwrapped open
4601149.126.72.220 12372 tcp tcpwrapped open
4602149.126.72.220 12373 tcp tcpwrapped open
4603149.126.72.220 12374 tcp tcpwrapped open
4604149.126.72.220 12375 tcp tcpwrapped open
4605149.126.72.220 12376 tcp tcpwrapped open
4606149.126.72.220 12377 tcp tcpwrapped open
4607149.126.72.220 12378 tcp tcpwrapped open
4608149.126.72.220 12379 tcp tcpwrapped open
4609149.126.72.220 12380 tcp tcpwrapped open
4610149.126.72.220 12381 tcp tcpwrapped open
4611149.126.72.220 12382 tcp tcpwrapped open
4612149.126.72.220 12383 tcp tcpwrapped open
4613149.126.72.220 12384 tcp tcpwrapped open
4614149.126.72.220 12385 tcp tcpwrapped open
4615149.126.72.220 12386 tcp tcpwrapped open
4616149.126.72.220 12387 tcp tcpwrapped open
4617149.126.72.220 12388 tcp tcpwrapped open
4618149.126.72.220 12389 tcp tcpwrapped open
4619149.126.72.220 12390 tcp tcpwrapped open
4620149.126.72.220 12391 tcp tcpwrapped open
4621149.126.72.220 12392 tcp tcpwrapped open
4622149.126.72.220 12393 tcp tcpwrapped open
4623149.126.72.220 12394 tcp tcpwrapped open
4624149.126.72.220 12395 tcp tcpwrapped open
4625149.126.72.220 12396 tcp tcpwrapped open
4626149.126.72.220 12397 tcp tcpwrapped open
4627149.126.72.220 12398 tcp tcpwrapped open
4628149.126.72.220 12399 tcp tcpwrapped open
4629149.126.72.220 12400 tcp tcpwrapped open
4630149.126.72.220 12401 tcp tcpwrapped open
4631149.126.72.220 12402 tcp tcpwrapped open
4632149.126.72.220 12403 tcp tcpwrapped open
4633149.126.72.220 12404 tcp tcpwrapped open
4634149.126.72.220 12405 tcp tcpwrapped open
4635149.126.72.220 12406 tcp tcpwrapped open
4636149.126.72.220 12407 tcp tcpwrapped open
4637149.126.72.220 12408 tcp tcpwrapped open
4638149.126.72.220 12409 tcp tcpwrapped open
4639149.126.72.220 12410 tcp tcpwrapped open
4640149.126.72.220 12411 tcp tcpwrapped open
4641149.126.72.220 12412 tcp tcpwrapped open
4642149.126.72.220 12413 tcp tcpwrapped open
4643149.126.72.220 12414 tcp tcpwrapped open
4644149.126.72.220 12415 tcp tcpwrapped open
4645149.126.72.220 12416 tcp tcpwrapped open
4646149.126.72.220 12417 tcp tcpwrapped open
4647149.126.72.220 12418 tcp tcpwrapped open
4648149.126.72.220 12419 tcp tcpwrapped open
4649149.126.72.220 12420 tcp tcpwrapped open
4650149.126.72.220 12421 tcp tcpwrapped open
4651149.126.72.220 12422 tcp tcpwrapped open
4652149.126.72.220 12423 tcp tcpwrapped open
4653149.126.72.220 12424 tcp tcpwrapped open
4654149.126.72.220 12425 tcp tcpwrapped open
4655149.126.72.220 12426 tcp tcpwrapped open
4656149.126.72.220 12427 tcp tcpwrapped open
4657149.126.72.220 12428 tcp tcpwrapped open
4658149.126.72.220 12429 tcp tcpwrapped open
4659149.126.72.220 12430 tcp tcpwrapped open
4660149.126.72.220 12431 tcp tcpwrapped open
4661149.126.72.220 12432 tcp tcpwrapped open
4662149.126.72.220 12433 tcp tcpwrapped open
4663149.126.72.220 12434 tcp tcpwrapped open
4664149.126.72.220 12435 tcp tcpwrapped open
4665149.126.72.220 12436 tcp tcpwrapped open
4666149.126.72.220 12437 tcp tcpwrapped open
4667149.126.72.220 12438 tcp tcpwrapped open
4668149.126.72.220 12439 tcp tcpwrapped open
4669149.126.72.220 12440 tcp tcpwrapped open
4670149.126.72.220 12441 tcp tcpwrapped open
4671149.126.72.220 12442 tcp tcpwrapped open
4672149.126.72.220 12443 tcp tcpwrapped open
4673149.126.72.220 12444 tcp tcpwrapped open
4674149.126.72.220 12445 tcp tcpwrapped open
4675149.126.72.220 12446 tcp tcpwrapped open
4676149.126.72.220 12447 tcp tcpwrapped open
4677149.126.72.220 12448 tcp tcpwrapped open
4678149.126.72.220 12449 tcp tcpwrapped open
4679149.126.72.220 12450 tcp tcpwrapped open
4680149.126.72.220 12451 tcp tcpwrapped open
4681149.126.72.220 12452 tcp tcpwrapped open
4682149.126.72.220 12453 tcp tcpwrapped open
4683149.126.72.220 12454 tcp tcpwrapped open
4684149.126.72.220 12455 tcp tcpwrapped open
4685149.126.72.220 12456 tcp tcpwrapped open
4686149.126.72.220 12457 tcp tcpwrapped open
4687149.126.72.220 12458 tcp tcpwrapped open
4688149.126.72.220 12459 tcp tcpwrapped open
4689149.126.72.220 12460 tcp tcpwrapped open
4690149.126.72.220 12461 tcp tcpwrapped open
4691149.126.72.220 12462 tcp tcpwrapped open
4692149.126.72.220 12463 tcp tcpwrapped open
4693149.126.72.220 12464 tcp tcpwrapped open
4694149.126.72.220 12465 tcp tcpwrapped open
4695149.126.72.220 12466 tcp tcpwrapped open
4696149.126.72.220 12467 tcp tcpwrapped open
4697149.126.72.220 12468 tcp tcpwrapped open
4698149.126.72.220 12469 tcp tcpwrapped open
4699149.126.72.220 12470 tcp tcpwrapped open
4700149.126.72.220 12471 tcp tcpwrapped open
4701149.126.72.220 12472 tcp tcpwrapped open
4702149.126.72.220 12473 tcp tcpwrapped open
4703149.126.72.220 12474 tcp tcpwrapped open
4704149.126.72.220 12475 tcp tcpwrapped open
4705149.126.72.220 12476 tcp tcpwrapped open
4706149.126.72.220 12477 tcp tcpwrapped open
4707149.126.72.220 12478 tcp tcpwrapped open
4708149.126.72.220 12479 tcp tcpwrapped open
4709149.126.72.220 12480 tcp tcpwrapped open
4710149.126.72.220 12481 tcp tcpwrapped open
4711149.126.72.220 12482 tcp tcpwrapped open
4712149.126.72.220 12483 tcp tcpwrapped open
4713149.126.72.220 12484 tcp tcpwrapped open
4714149.126.72.220 12485 tcp tcpwrapped open
4715149.126.72.220 12486 tcp tcpwrapped open
4716149.126.72.220 12487 tcp tcpwrapped open
4717149.126.72.220 12488 tcp tcpwrapped open
4718149.126.72.220 12489 tcp tcpwrapped open
4719149.126.72.220 12490 tcp tcpwrapped open
4720149.126.72.220 12491 tcp tcpwrapped open
4721149.126.72.220 12492 tcp tcpwrapped open
4722149.126.72.220 12493 tcp tcpwrapped open
4723149.126.72.220 12494 tcp tcpwrapped open
4724149.126.72.220 12495 tcp tcpwrapped open
4725149.126.72.220 12496 tcp tcpwrapped open
4726149.126.72.220 12497 tcp tcpwrapped open
4727149.126.72.220 12498 tcp tcpwrapped open
4728149.126.72.220 12499 tcp tcpwrapped open
4729149.126.72.220 12500 tcp tcpwrapped open
4730149.126.72.220 12501 tcp tcpwrapped open
4731149.126.72.220 12502 tcp tcpwrapped open
4732149.126.72.220 12503 tcp tcpwrapped open
4733149.126.72.220 12504 tcp tcpwrapped open
4734149.126.72.220 12505 tcp tcpwrapped open
4735149.126.72.220 12506 tcp tcpwrapped open
4736149.126.72.220 12507 tcp tcpwrapped open
4737149.126.72.220 12508 tcp tcpwrapped open
4738149.126.72.220 12509 tcp tcpwrapped open
4739149.126.72.220 12510 tcp tcpwrapped open
4740149.126.72.220 12511 tcp tcpwrapped open
4741149.126.72.220 12512 tcp tcpwrapped open
4742149.126.72.220 12513 tcp tcpwrapped open
4743149.126.72.220 12514 tcp tcpwrapped open
4744149.126.72.220 12515 tcp tcpwrapped open
4745149.126.72.220 12516 tcp tcpwrapped open
4746149.126.72.220 12517 tcp tcpwrapped open
4747149.126.72.220 12518 tcp tcpwrapped open
4748149.126.72.220 12519 tcp tcpwrapped open
4749149.126.72.220 12520 tcp tcpwrapped open
4750149.126.72.220 12521 tcp tcpwrapped open
4751149.126.72.220 12522 tcp tcpwrapped open
4752149.126.72.220 12523 tcp tcpwrapped open
4753149.126.72.220 12524 tcp tcpwrapped open
4754149.126.72.220 12525 tcp tcpwrapped open
4755149.126.72.220 12526 tcp tcpwrapped open
4756149.126.72.220 12527 tcp tcpwrapped open
4757149.126.72.220 12528 tcp tcpwrapped open
4758149.126.72.220 12529 tcp tcpwrapped open
4759149.126.72.220 12530 tcp tcpwrapped open
4760149.126.72.220 12531 tcp tcpwrapped open
4761149.126.72.220 12532 tcp tcpwrapped open
4762149.126.72.220 12533 tcp tcpwrapped open
4763149.126.72.220 12534 tcp tcpwrapped open
4764149.126.72.220 12535 tcp tcpwrapped open
4765149.126.72.220 12536 tcp tcpwrapped open
4766149.126.72.220 12537 tcp tcpwrapped open
4767149.126.72.220 12538 tcp tcpwrapped open
4768149.126.72.220 12539 tcp tcpwrapped open
4769149.126.72.220 12540 tcp tcpwrapped open
4770149.126.72.220 12541 tcp tcpwrapped open
4771149.126.72.220 12542 tcp tcpwrapped open
4772149.126.72.220 12543 tcp tcpwrapped open
4773149.126.72.220 12544 tcp tcpwrapped open
4774149.126.72.220 12545 tcp tcpwrapped open
4775149.126.72.220 12546 tcp tcpwrapped open
4776149.126.72.220 12547 tcp tcpwrapped open
4777149.126.72.220 12548 tcp tcpwrapped open
4778149.126.72.220 12549 tcp tcpwrapped open
4779149.126.72.220 12550 tcp tcpwrapped open
4780149.126.72.220 12551 tcp tcpwrapped open
4781149.126.72.220 12552 tcp tcpwrapped open
4782149.126.72.220 12553 tcp tcpwrapped open
4783149.126.72.220 12554 tcp tcpwrapped open
4784149.126.72.220 12555 tcp tcpwrapped open
4785149.126.72.220 12556 tcp tcpwrapped open
4786149.126.72.220 12557 tcp tcpwrapped open
4787149.126.72.220 12558 tcp tcpwrapped open
4788149.126.72.220 12559 tcp tcpwrapped open
4789149.126.72.220 12560 tcp tcpwrapped open
4790149.126.72.220 12561 tcp tcpwrapped open
4791149.126.72.220 12562 tcp tcpwrapped open
4792149.126.72.220 12563 tcp tcpwrapped open
4793149.126.72.220 12564 tcp tcpwrapped open
4794149.126.72.220 12565 tcp tcpwrapped open
4795149.126.72.220 12566 tcp tcpwrapped open
4796149.126.72.220 12567 tcp tcpwrapped open
4797149.126.72.220 12568 tcp tcpwrapped open
4798149.126.72.220 12569 tcp tcpwrapped open
4799149.126.72.220 12570 tcp tcpwrapped open
4800149.126.72.220 12571 tcp tcpwrapped open
4801149.126.72.220 12572 tcp tcpwrapped open
4802149.126.72.220 12573 tcp tcpwrapped open
4803149.126.72.220 12574 tcp tcpwrapped open
4804149.126.72.220 12575 tcp tcpwrapped open
4805149.126.72.220 12576 tcp tcpwrapped open
4806149.126.72.220 12577 tcp tcpwrapped open
4807149.126.72.220 12578 tcp tcpwrapped open
4808149.126.72.220 12579 tcp tcpwrapped open
4809149.126.72.220 12580 tcp tcpwrapped open
4810149.126.72.220 12581 tcp tcpwrapped open
4811149.126.72.220 12582 tcp tcpwrapped open
4812149.126.72.220 12583 tcp tcpwrapped open
4813149.126.72.220 12584 tcp tcpwrapped open
4814149.126.72.220 12585 tcp tcpwrapped open
4815149.126.72.220 12586 tcp tcpwrapped open
4816149.126.72.220 12587 tcp tcpwrapped open
4817149.126.72.220 12588 tcp tcpwrapped open
4818149.126.72.220 12589 tcp tcpwrapped open
4819149.126.72.220 12590 tcp tcpwrapped open
4820149.126.72.220 13082 tcp tcpwrapped open
4821149.126.72.220 13084 tcp tcpwrapped open
4822149.126.72.220 13333 tcp tcpwrapped open
4823149.126.72.220 13443 tcp tcpwrapped open
4824149.126.72.220 14006 tcp tcpwrapped open
4825149.126.72.220 14082 tcp tcpwrapped open
4826149.126.72.220 14084 tcp tcpwrapped open
4827149.126.72.220 14104 tcp tcpwrapped open
4828149.126.72.220 14130 tcp tcpwrapped open
4829149.126.72.220 14182 tcp tcpwrapped open
4830149.126.72.220 14184 tcp tcpwrapped open
4831149.126.72.220 14330 tcp tcpwrapped open
4832149.126.72.220 14443 tcp tcpwrapped open
4833149.126.72.220 14825 tcp tcpwrapped open
4834149.126.72.220 15002 tcp tcpwrapped open
4835149.126.72.220 15006 tcp tcpwrapped open
4836149.126.72.220 15082 tcp tcpwrapped open
4837149.126.72.220 15084 tcp tcpwrapped open
4838149.126.72.220 15151 tcp tcpwrapped open
4839149.126.72.220 15555 tcp tcpwrapped open
4840149.126.72.220 16000 tcp tcpwrapped open
4841149.126.72.220 16001 tcp tcpwrapped open
4842149.126.72.220 16015 tcp tcpwrapped open
4843149.126.72.220 16016 tcp tcpwrapped open
4844149.126.72.220 16017 tcp tcpwrapped open
4845149.126.72.220 16082 tcp tcpwrapped open
4846149.126.72.220 16084 tcp tcpwrapped open
4847149.126.72.220 16311 tcp tcpwrapped open
4848149.126.72.220 16316 tcp tcpwrapped open
4849149.126.72.220 16443 tcp tcpwrapped open
4850149.126.72.220 16800 tcp tcpwrapped open
4851149.126.72.220 16888 tcp tcpwrapped open
4852149.126.72.220 17082 tcp tcpwrapped open
4853149.126.72.220 17084 tcp tcpwrapped open
4854149.126.72.220 17182 tcp tcpwrapped open
4855149.126.72.220 17184 tcp tcpwrapped open
4856149.126.72.220 17770 tcp tcpwrapped open
4857149.126.72.220 17771 tcp tcpwrapped open
4858149.126.72.220 17772 tcp tcpwrapped open
4859149.126.72.220 17773 tcp tcpwrapped open
4860149.126.72.220 17774 tcp tcpwrapped open
4861149.126.72.220 17775 tcp tcpwrapped open
4862149.126.72.220 17776 tcp tcpwrapped open
4863149.126.72.220 17777 tcp tcpwrapped open
4864149.126.72.220 17778 tcp tcpwrapped open
4865149.126.72.220 17779 tcp tcpwrapped open
4866149.126.72.220 17780 tcp tcpwrapped open
4867149.126.72.220 18000 tcp tcpwrapped open
4868149.126.72.220 18001 tcp tcpwrapped open
4869149.126.72.220 18002 tcp tcpwrapped open
4870149.126.72.220 18003 tcp tcpwrapped open
4871149.126.72.220 18004 tcp tcpwrapped open
4872149.126.72.220 18005 tcp tcpwrapped open
4873149.126.72.220 18006 tcp tcpwrapped open
4874149.126.72.220 18007 tcp tcpwrapped open
4875149.126.72.220 18008 tcp tcpwrapped open
4876149.126.72.220 18009 tcp tcpwrapped open
4877149.126.72.220 18010 tcp tcpwrapped open
4878149.126.72.220 18011 tcp tcpwrapped open
4879149.126.72.220 18012 tcp tcpwrapped open
4880149.126.72.220 18013 tcp tcpwrapped open
4881149.126.72.220 18014 tcp tcpwrapped open
4882149.126.72.220 18015 tcp tcpwrapped open
4883149.126.72.220 18016 tcp tcpwrapped open
4884149.126.72.220 18017 tcp tcpwrapped open
4885149.126.72.220 18018 tcp tcpwrapped open
4886149.126.72.220 18019 tcp tcpwrapped open
4887149.126.72.220 18020 tcp tcpwrapped open
4888149.126.72.220 18021 tcp tcpwrapped open
4889149.126.72.220 18022 tcp tcpwrapped open
4890149.126.72.220 18023 tcp tcpwrapped open
4891149.126.72.220 18024 tcp tcpwrapped open
4892149.126.72.220 18025 tcp tcpwrapped open
4893149.126.72.220 18026 tcp tcpwrapped open
4894149.126.72.220 18027 tcp tcpwrapped open
4895149.126.72.220 18028 tcp tcpwrapped open
4896149.126.72.220 18029 tcp tcpwrapped open
4897149.126.72.220 18030 tcp tcpwrapped open
4898149.126.72.220 18031 tcp tcpwrapped open
4899149.126.72.220 18032 tcp tcpwrapped open
4900149.126.72.220 18033 tcp tcpwrapped open
4901149.126.72.220 18034 tcp tcpwrapped open
4902149.126.72.220 18035 tcp tcpwrapped open
4903149.126.72.220 18036 tcp tcpwrapped open
4904149.126.72.220 18037 tcp tcpwrapped open
4905149.126.72.220 18038 tcp tcpwrapped open
4906149.126.72.220 18039 tcp tcpwrapped open
4907149.126.72.220 18040 tcp tcpwrapped open
4908149.126.72.220 18041 tcp tcpwrapped open
4909149.126.72.220 18042 tcp tcpwrapped open
4910149.126.72.220 18043 tcp tcpwrapped open
4911149.126.72.220 18044 tcp tcpwrapped open
4912149.126.72.220 18045 tcp tcpwrapped open
4913149.126.72.220 18046 tcp tcpwrapped open
4914149.126.72.220 18047 tcp tcpwrapped open
4915149.126.72.220 18048 tcp tcpwrapped open
4916149.126.72.220 18049 tcp tcpwrapped open
4917149.126.72.220 18050 tcp tcpwrapped open
4918149.126.72.220 18051 tcp tcpwrapped open
4919149.126.72.220 18052 tcp tcpwrapped open
4920149.126.72.220 18053 tcp tcpwrapped open
4921149.126.72.220 18054 tcp tcpwrapped open
4922149.126.72.220 18055 tcp tcpwrapped open
4923149.126.72.220 18056 tcp tcpwrapped open
4924149.126.72.220 18057 tcp tcpwrapped open
4925149.126.72.220 18058 tcp tcpwrapped open
4926149.126.72.220 18059 tcp tcpwrapped open
4927149.126.72.220 18060 tcp tcpwrapped open
4928149.126.72.220 18061 tcp tcpwrapped open
4929149.126.72.220 18062 tcp tcpwrapped open
4930149.126.72.220 18063 tcp tcpwrapped open
4931149.126.72.220 18064 tcp tcpwrapped open
4932149.126.72.220 18065 tcp tcpwrapped open
4933149.126.72.220 18066 tcp tcpwrapped open
4934149.126.72.220 18067 tcp tcpwrapped open
4935149.126.72.220 18068 tcp tcpwrapped open
4936149.126.72.220 18069 tcp tcpwrapped open
4937149.126.72.220 18070 tcp tcpwrapped open
4938149.126.72.220 18071 tcp tcpwrapped open
4939149.126.72.220 18072 tcp tcpwrapped open
4940149.126.72.220 18073 tcp tcpwrapped open
4941149.126.72.220 18074 tcp tcpwrapped open
4942149.126.72.220 18075 tcp tcpwrapped open
4943149.126.72.220 18076 tcp tcpwrapped open
4944149.126.72.220 18077 tcp tcpwrapped open
4945149.126.72.220 18078 tcp tcpwrapped open
4946149.126.72.220 18079 tcp tcpwrapped open
4947149.126.72.220 18080 tcp tcpwrapped open
4948149.126.72.220 18081 tcp tcpwrapped open
4949149.126.72.220 18082 tcp tcpwrapped open
4950149.126.72.220 18083 tcp tcpwrapped open
4951149.126.72.220 18084 tcp tcpwrapped open
4952149.126.72.220 18085 tcp tcpwrapped open
4953149.126.72.220 18086 tcp tcpwrapped open
4954149.126.72.220 18087 tcp tcpwrapped open
4955149.126.72.220 18088 tcp tcpwrapped open
4956149.126.72.220 18089 tcp tcpwrapped open
4957149.126.72.220 18090 tcp tcpwrapped open
4958149.126.72.220 18091 tcp tcpwrapped open
4959149.126.72.220 18092 tcp tcpwrapped open
4960149.126.72.220 18093 tcp tcpwrapped open
4961149.126.72.220 18094 tcp tcpwrapped open
4962149.126.72.220 18095 tcp tcpwrapped open
4963149.126.72.220 18096 tcp tcpwrapped open
4964149.126.72.220 18097 tcp tcpwrapped open
4965149.126.72.220 18098 tcp tcpwrapped open
4966149.126.72.220 18099 tcp tcpwrapped open
4967149.126.72.220 18100 tcp tcpwrapped open
4968149.126.72.220 18101 tcp tcpwrapped open
4969149.126.72.220 18102 tcp tcpwrapped open
4970149.126.72.220 18103 tcp tcpwrapped open
4971149.126.72.220 18104 tcp tcpwrapped open
4972149.126.72.220 18105 tcp tcpwrapped open
4973149.126.72.220 18106 tcp tcpwrapped open
4974149.126.72.220 18107 tcp tcpwrapped open
4975149.126.72.220 18108 tcp tcpwrapped open
4976149.126.72.220 18109 tcp tcpwrapped open
4977149.126.72.220 18110 tcp tcpwrapped open
4978149.126.72.220 18111 tcp tcpwrapped open
4979149.126.72.220 18112 tcp tcpwrapped open
4980149.126.72.220 18113 tcp tcpwrapped open
4981149.126.72.220 18200 tcp tcpwrapped open
4982149.126.72.220 18239 tcp tcpwrapped open
4983149.126.72.220 18443 tcp tcpwrapped open
4984149.126.72.220 18802 tcp tcpwrapped open
4985149.126.72.220 19013 tcp tcpwrapped open
4986149.126.72.220 19014 tcp tcpwrapped open
4987149.126.72.220 19015 tcp tcpwrapped open
4988149.126.72.220 19016 tcp tcpwrapped open
4989149.126.72.220 19017 tcp tcpwrapped open
4990149.126.72.220 19022 tcp tcpwrapped open
4991149.126.72.220 19080 tcp tcpwrapped open
4992149.126.72.220 19082 tcp tcpwrapped open
4993149.126.72.220 19084 tcp tcpwrapped open
4994149.126.72.220 19443 tcp tcpwrapped open
4995149.126.72.220 20000 tcp tcpwrapped open
4996149.126.72.220 20001 tcp tcpwrapped open
4997149.126.72.220 20010 tcp tcpwrapped open
4998149.126.72.220 20020 tcp tcpwrapped open
4999149.126.72.220 20030 tcp tcpwrapped open
5000149.126.72.220 20040 tcp tcpwrapped open
5001149.126.72.220 20050 tcp tcpwrapped open
5002149.126.72.220 20053 tcp tcpwrapped open
5003149.126.72.220 20060 tcp tcpwrapped open
5004149.126.72.220 20070 tcp tcpwrapped open
5005149.126.72.220 20080 tcp tcpwrapped open
5006149.126.72.220 20082 tcp tcpwrapped open
5007149.126.72.220 20084 tcp tcpwrapped open
5008149.126.72.220 20090 tcp tcpwrapped open
5009149.126.72.220 20100 tcp tcpwrapped open
5010149.126.72.220 20106 tcp tcpwrapped open
5011149.126.72.220 20107 tcp tcpwrapped open
5012149.126.72.220 20110 tcp tcpwrapped open
5013149.126.72.220 20150 tcp tcpwrapped open
5014149.126.72.220 20182 tcp tcpwrapped open
5015149.126.72.220 20184 tcp tcpwrapped open
5016149.126.72.220 20185 tcp tcpwrapped open
5017149.126.72.220 20200 tcp tcpwrapped open
5018149.126.72.220 20208 tcp tcpwrapped open
5019149.126.72.220 20325 tcp tcpwrapped open
5020149.126.72.220 20500 tcp tcpwrapped open
5021149.126.72.220 20512 tcp tcpwrapped open
5022149.126.72.220 20600 tcp tcpwrapped open
5023149.126.72.220 20800 tcp tcpwrapped open
5024149.126.72.220 20892 tcp tcpwrapped open
5025149.126.72.220 20894 tcp tcpwrapped open
5026149.126.72.220 20900 tcp tcpwrapped open
5027149.126.72.220 21081 tcp tcpwrapped open
5028149.126.72.220 21082 tcp tcpwrapped open
5029149.126.72.220 21083 tcp tcpwrapped open
5030149.126.72.220 21084 tcp tcpwrapped open
5031149.126.72.220 21100 tcp tcpwrapped open
5032149.126.72.220 21200 tcp tcpwrapped open
5033149.126.72.220 21300 tcp tcpwrapped open
5034149.126.72.220 21357 tcp tcpwrapped open
5035149.126.72.220 21381 tcp tcpwrapped open
5036149.126.72.220 21400 tcp tcpwrapped open
5037149.126.72.220 21500 tcp tcpwrapped open
5038149.126.72.220 21935 tcp tcpwrapped open
5039149.126.72.220 22082 tcp tcpwrapped open
5040149.126.72.220 22084 tcp tcpwrapped open
5041149.126.72.220 22103 tcp tcpwrapped open
5042149.126.72.220 22107 tcp tcpwrapped open
5043149.126.72.220 22206 tcp tcpwrapped open
5044149.126.72.220 22345 tcp tcpwrapped open
5045149.126.72.220 22403 tcp tcpwrapped open
5046149.126.72.220 22609 tcp tcpwrapped open
5047149.126.72.220 22703 tcp tcpwrapped open
5048149.126.72.220 22705 tcp tcpwrapped open
5049149.126.72.220 23082 tcp tcpwrapped open
5050149.126.72.220 23084 tcp tcpwrapped open
5051149.126.72.220 23182 tcp tcpwrapped open
5052149.126.72.220 23184 tcp tcpwrapped open
5053149.126.72.220 24082 tcp tcpwrapped open
5054149.126.72.220 24084 tcp tcpwrapped open
5055149.126.72.220 24472 tcp tcpwrapped open
5056149.126.72.220 24510 tcp tcpwrapped open
5057149.126.72.220 25000 tcp tcpwrapped open
5058149.126.72.220 25001 tcp tcpwrapped open
5059149.126.72.220 25002 tcp tcpwrapped open
5060149.126.72.220 25003 tcp tcpwrapped open
5061149.126.72.220 25004 tcp tcpwrapped open
5062149.126.72.220 25005 tcp tcpwrapped open
5063149.126.72.220 25006 tcp tcpwrapped open
5064149.126.72.220 25007 tcp tcpwrapped open
5065149.126.72.220 25008 tcp tcpwrapped open
5066149.126.72.220 25009 tcp tcpwrapped open
5067149.126.72.220 25010 tcp tcpwrapped open
5068149.126.72.220 25082 tcp tcpwrapped open
5069149.126.72.220 25084 tcp tcpwrapped open
5070149.126.72.220 25782 tcp tcpwrapped open
5071149.126.72.220 25952 tcp tcpwrapped open
5072149.126.72.220 27571 tcp tcpwrapped open
5073149.126.72.220 28001 tcp tcpwrapped open
5074149.126.72.220 28080 tcp tcpwrapped open
5075149.126.72.220 28818 tcp tcpwrapped open
5076149.126.72.220 29798 tcp tcpwrapped open
5077149.126.72.220 29799 tcp tcpwrapped open
5078149.126.72.220 30000 tcp tcpwrapped open
5079149.126.72.220 30001 tcp tcpwrapped open
5080149.126.72.220 30003 tcp tcpwrapped open
5081149.126.72.220 30005 tcp tcpwrapped open
5082149.126.72.220 30007 tcp tcpwrapped open
5083149.126.72.220 30009 tcp tcpwrapped open
5084149.126.72.220 30011 tcp tcpwrapped open
5085149.126.72.220 30013 tcp tcpwrapped open
5086149.126.72.220 30015 tcp tcpwrapped open
5087149.126.72.220 30017 tcp tcpwrapped open
5088149.126.72.220 30019 tcp tcpwrapped open
5089149.126.72.220 30021 tcp tcpwrapped open
5090149.126.72.220 30050 tcp tcpwrapped open
5091149.126.72.220 30106 tcp tcpwrapped open
5092149.126.72.220 30110 tcp tcpwrapped open
5093149.126.72.220 30111 tcp tcpwrapped open
5094149.126.72.220 30112 tcp tcpwrapped open
5095149.126.72.220 30113 tcp tcpwrapped open
5096149.126.72.220 30120 tcp tcpwrapped open
5097149.126.72.220 30121 tcp tcpwrapped open
5098149.126.72.220 30122 tcp tcpwrapped open
5099149.126.72.220 30123 tcp tcpwrapped open
5100149.126.72.220 30452 tcp tcpwrapped open
5101149.126.72.220 30468 tcp tcpwrapped open
5102149.126.72.220 30473 tcp tcpwrapped open
5103149.126.72.220 30479 tcp tcpwrapped open
5104149.126.72.220 30501 tcp tcpwrapped open
5105149.126.72.220 30700 tcp tcpwrapped open
5106149.126.72.220 30701 tcp tcpwrapped open
5107149.126.72.220 30892 tcp tcpwrapped open
5108149.126.72.220 30894 tcp tcpwrapped open
5109149.126.72.220 31337 tcp tcpwrapped open
5110149.126.72.220 32101 tcp tcpwrapped open
5111149.126.72.220 32102 tcp tcpwrapped open
5112149.126.72.220 32202 tcp tcpwrapped open
5113149.126.72.220 32303 tcp tcpwrapped open
5114149.126.72.220 32443 tcp tcpwrapped open
5115149.126.72.220 32444 tcp tcpwrapped open
5116149.126.72.220 32746 tcp tcpwrapped open
5117149.126.72.220 32800 tcp tcpwrapped open
5118149.126.72.220 34225 tcp tcpwrapped open
5119149.126.72.220 34500 tcp tcpwrapped open
5120149.126.72.220 35522 tcp tcpwrapped open
5121149.126.72.220 35524 tcp tcpwrapped open
5122149.126.72.220 35531 tcp tcpwrapped open
5123149.126.72.220 35554 tcp tcpwrapped open
5124149.126.72.220 35559 tcp tcpwrapped open
5125149.126.72.220 35560 tcp tcpwrapped open
5126149.126.72.220 36982 tcp tcpwrapped open
5127149.126.72.220 36983 tcp tcpwrapped open
5128149.126.72.220 36984 tcp tcpwrapped open
5129149.126.72.220 37080 tcp tcpwrapped open
5130149.126.72.220 38880 tcp tcpwrapped open
5131149.126.72.220 39001 tcp tcpwrapped open
5132149.126.72.220 40070 tcp tcpwrapped open
5133149.126.72.220 40099 tcp tcpwrapped open
5134149.126.72.220 40892 tcp tcpwrapped open
5135149.126.72.220 40894 tcp tcpwrapped open
5136149.126.72.220 42208 tcp tcpwrapped open
5137149.126.72.220 42424 tcp tcpwrapped open
5138149.126.72.220 42901 tcp tcpwrapped open
5139149.126.72.220 43008 tcp tcpwrapped open
5140149.126.72.220 43009 tcp tcpwrapped open
5141149.126.72.220 43200 tcp tcpwrapped open
5142149.126.72.220 44100 tcp tcpwrapped open
5143149.126.72.220 44300 tcp tcpwrapped open
5144149.126.72.220 44301 tcp tcpwrapped open
5145149.126.72.220 44302 tcp tcpwrapped open
5146149.126.72.220 44303 tcp tcpwrapped open
5147149.126.72.220 44304 tcp tcpwrapped open
5148149.126.72.220 44305 tcp tcpwrapped open
5149149.126.72.220 44306 tcp tcpwrapped open
5150149.126.72.220 44307 tcp tcpwrapped open
5151149.126.72.220 44308 tcp tcpwrapped open
5152149.126.72.220 44309 tcp tcpwrapped open
5153149.126.72.220 44310 tcp tcpwrapped open
5154149.126.72.220 44320 tcp tcpwrapped open
5155149.126.72.220 44332 tcp tcpwrapped open
5156149.126.72.220 44333 tcp tcpwrapped open
5157149.126.72.220 44334 tcp tcpwrapped open
5158149.126.72.220 44336 tcp tcpwrapped open
5159149.126.72.220 44337 tcp tcpwrapped open
5160149.126.72.220 44340 tcp tcpwrapped open
5161149.126.72.220 44341 tcp tcpwrapped open
5162149.126.72.220 44345 tcp tcpwrapped open
5163149.126.72.220 44400 tcp tcpwrapped open
5164149.126.72.220 44410 tcp tcpwrapped open
5165149.126.72.220 44420 tcp tcpwrapped open
5166149.126.72.220 45000 tcp tcpwrapped open
5167149.126.72.220 45555 tcp tcpwrapped open
5168149.126.72.220 45666 tcp tcpwrapped open
5169149.126.72.220 45667 tcp tcpwrapped open
5170149.126.72.220 45668 tcp tcpwrapped open
5171149.126.72.220 45677 tcp tcpwrapped open
5172149.126.72.220 45777 tcp tcpwrapped open
5173149.126.72.220 45788 tcp tcpwrapped open
5174149.126.72.220 45821 tcp tcpwrapped open
5175149.126.72.220 45886 tcp tcpwrapped open
5176149.126.72.220 45888 tcp tcpwrapped open
5177149.126.72.220 46000 tcp tcpwrapped open
5178149.126.72.220 46443 tcp tcpwrapped open
5179149.126.72.220 46862 tcp tcpwrapped open
5180149.126.72.220 47000 tcp tcpwrapped open
5181149.126.72.220 47080 tcp tcpwrapped open
5182149.126.72.220 47534 tcp tcpwrapped open
5183149.126.72.220 48888 tcp tcpwrapped open
5184149.126.72.220 48889 tcp tcpwrapped open
5185149.126.72.220 49200 tcp tcpwrapped open
5186149.126.72.220 49210 tcp tcpwrapped open
5187149.126.72.220 49443 tcp tcpwrapped open
5188149.126.72.220 49682 tcp tcpwrapped open
5189149.126.72.220 49684 tcp tcpwrapped open
5190149.126.72.220 49686 tcp tcpwrapped open
5191149.126.72.220 49688 tcp tcpwrapped open
5192149.126.72.220 49690 tcp tcpwrapped open
5193149.126.72.220 49692 tcp tcpwrapped open
5194149.126.72.220 49694 tcp tcpwrapped open
5195149.126.72.220 50000 tcp tcpwrapped open
5196149.126.72.220 50001 tcp tcpwrapped open
5197149.126.72.220 50042 tcp tcpwrapped open
5198149.126.72.220 50050 tcp tcpwrapped open
5199149.126.72.220 50073 tcp tcpwrapped open
5200149.126.72.220 50085 tcp tcpwrapped open
5201149.126.72.220 50101 tcp tcpwrapped open
5202149.126.72.220 50102 tcp tcpwrapped open
5203149.126.72.220 50103 tcp tcpwrapped open
5204149.126.72.220 50104 tcp tcpwrapped open
5205149.126.72.220 50105 tcp tcpwrapped open
5206149.126.72.220 50106 tcp tcpwrapped open
5207149.126.72.220 50107 tcp tcpwrapped open
5208149.126.72.220 50112 tcp tcpwrapped open
5209149.126.72.220 50113 tcp tcpwrapped open
5210149.126.72.220 50122 tcp tcpwrapped open
5211149.126.72.220 50160 tcp tcpwrapped open
5212149.126.72.220 50443 tcp tcpwrapped open
5213149.126.72.220 51002 tcp tcpwrapped open
5214149.126.72.220 51003 tcp tcpwrapped open
5215149.126.72.220 51434 tcp tcpwrapped open
5216149.126.72.220 52010 tcp tcpwrapped open
5217149.126.72.220 52230 tcp tcpwrapped open
5218149.126.72.220 52311 tcp tcpwrapped open
5219149.126.72.220 52536 tcp tcpwrapped open
5220149.126.72.220 53480 tcp tcpwrapped open
5221149.126.72.220 53481 tcp tcpwrapped open
5222149.126.72.220 53482 tcp tcpwrapped open
5223149.126.72.220 53483 tcp tcpwrapped open
5224149.126.72.220 53484 tcp tcpwrapped open
5225149.126.72.220 53485 tcp tcpwrapped open
5226149.126.72.220 53490 tcp tcpwrapped open
5227149.126.72.220 53805 tcp tcpwrapped open
5228149.126.72.220 53806 tcp tcpwrapped open
5229149.126.72.220 54327 tcp tcpwrapped open
5230149.126.72.220 54490 tcp tcpwrapped open
5231149.126.72.220 54545 tcp tcpwrapped open
5232149.126.72.220 55055 tcp tcpwrapped open
5233149.126.72.220 55080 tcp tcpwrapped open
5234149.126.72.220 55081 tcp tcpwrapped open
5235149.126.72.220 55350 tcp tcpwrapped open
5236149.126.72.220 55388 tcp tcpwrapped open
5237149.126.72.220 55470 tcp tcpwrapped open
5238149.126.72.220 55475 tcp tcpwrapped open
5239149.126.72.220 55481 tcp tcpwrapped open
5240149.126.72.220 55490 tcp tcpwrapped open
5241149.126.72.220 57778 tcp tcpwrapped open
5242149.126.72.220 57779 tcp tcpwrapped open
5243149.126.72.220 57780 tcp tcpwrapped open
5244149.126.72.220 57781 tcp tcpwrapped open
5245149.126.72.220 57782 tcp tcpwrapped open
5246149.126.72.220 57783 tcp tcpwrapped open
5247149.126.72.220 57784 tcp tcpwrapped open
5248149.126.72.220 57785 tcp tcpwrapped open
5249149.126.72.220 57786 tcp tcpwrapped open
5250149.126.72.220 57787 tcp tcpwrapped open
5251149.126.72.220 57788 tcp tcpwrapped open
5252149.126.72.220 58443 tcp tcpwrapped open
5253149.126.72.220 58585 tcp tcpwrapped open
5254149.126.72.220 59012 tcp tcpwrapped open
5255149.126.72.220 59443 tcp tcpwrapped open
5256149.126.72.220 60021 tcp tcpwrapped open
5257149.126.72.220 60023 tcp tcpwrapped open
5258149.126.72.220 60443 tcp tcpwrapped open
5259149.126.72.220 62080 tcp tcpwrapped open
5260149.126.72.220 62237 tcp tcpwrapped open
5261149.126.72.220 62443 tcp tcpwrapped open
5262149.126.72.220 62865 tcp tcpwrapped open
5263149.126.72.220 63443 tcp tcpwrapped open
5264149.126.72.220 64477 tcp tcpwrapped open
5265149.126.72.220 64671 tcp tcpwrapped open
5266151.106.38.107 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 12:11. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
5267151.106.38.107 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
5268151.106.38.107 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
5269151.106.38.107 67 tcp dhcps filtered
5270151.106.38.107 67 udp dhcps unknown
5271151.106.38.107 68 tcp dhcpc filtered
5272151.106.38.107 68 udp dhcpc unknown
5273151.106.38.107 69 tcp tftp filtered
5274151.106.38.107 69 udp tftp unknown
5275151.106.38.107 88 tcp kerberos-sec filtered
5276151.106.38.107 88 udp kerberos-sec unknown
5277151.106.38.107 123 tcp ntp filtered
5278151.106.38.107 123 udp ntp unknown
5279151.106.38.107 137 tcp netbios-ns filtered
5280151.106.38.107 137 udp netbios-ns unknown
5281151.106.38.107 138 tcp netbios-dgm filtered
5282151.106.38.107 138 udp netbios-dgm unknown
5283151.106.38.107 139 tcp netbios-ssn filtered
5284151.106.38.107 139 udp netbios-ssn unknown
5285151.106.38.107 161 tcp snmp filtered
5286151.106.38.107 161 udp snmp unknown
5287151.106.38.107 162 tcp snmptrap filtered
5288151.106.38.107 162 udp snmptrap unknown
5289151.106.38.107 389 tcp ldap filtered
5290151.106.38.107 389 udp ldap unknown
5291151.106.38.107 520 tcp efs filtered
5292151.106.38.107 520 udp route unknown
5293151.106.38.107 2049 tcp nfs filtered
5294151.106.38.107 2049 udp nfs unknown
5295158.69.13.254 22 tcp ssh open OpenSSH 7.4 protocol 2.0
5296158.69.13.254 25 tcp smtp open Exim smtpd 4.92.3
5297158.69.13.254 53 tcp domain open unknown banner: get lost
5298158.69.13.254 53 udp domain open unknown banner: get lost
5299158.69.13.254 67 tcp dhcps filtered
5300158.69.13.254 67 udp dhcps unknown
5301158.69.13.254 68 tcp dhcpc filtered
5302158.69.13.254 68 udp dhcpc unknown
5303158.69.13.254 69 tcp tftp filtered
5304158.69.13.254 69 udp tftp unknown
5305158.69.13.254 80 tcp http open nginx
5306158.69.13.254 88 tcp kerberos-sec filtered
5307158.69.13.254 88 udp kerberos-sec unknown
5308158.69.13.254 123 tcp ntp filtered
5309158.69.13.254 123 udp ntp unknown
5310158.69.13.254 137 tcp netbios-ns filtered
5311158.69.13.254 137 udp netbios-ns unknown
5312158.69.13.254 138 tcp netbios-dgm filtered
5313158.69.13.254 138 udp netbios-dgm unknown
5314158.69.13.254 139 tcp netbios-ssn filtered
5315158.69.13.254 139 udp netbios-ssn unknown
5316158.69.13.254 161 tcp snmp filtered
5317158.69.13.254 161 udp snmp unknown
5318158.69.13.254 162 tcp snmptrap filtered
5319158.69.13.254 162 udp snmptrap unknown
5320158.69.13.254 389 tcp ldap filtered
5321158.69.13.254 389 udp ldap unknown
5322158.69.13.254 443 tcp ssl/http open nginx
5323158.69.13.254 465 tcp ssl/smtp open Exim smtpd 4.92.3
5324158.69.13.254 520 tcp efs filtered
5325158.69.13.254 520 udp route unknown
5326158.69.13.254 587 tcp smtp open Exim smtpd 4.92.3
5327158.69.13.254 2049 tcp nfs filtered
5328158.69.13.254 2049 udp nfs unknown
5329158.69.13.254 2525 tcp smtp open Exim smtpd 4.92.3
5330158.69.13.254 3306 tcp mysql open MySQL blocked - too many connection errors
5331162.244.35.13 22 tcp ssh open SSH-2.0-OpenSSH_7.2 FreeBSD-20160310
5332162.244.35.13 25 tcp open
5333162.244.35.13 53 tcp domain open ISC BIND 9.10.6
5334162.244.35.13 53 udp domain open ISC BIND 9.10.6
5335162.244.35.13 67 tcp dhcps closed
5336162.244.35.13 67 udp dhcps closed
5337162.244.35.13 68 tcp dhcpc closed
5338162.244.35.13 68 udp dhcpc closed
5339162.244.35.13 69 tcp tftp closed
5340162.244.35.13 69 udp tftp closed
5341162.244.35.13 88 tcp kerberos-sec closed
5342162.244.35.13 88 udp kerberos-sec closed
5343162.244.35.13 123 tcp ntp closed
5344162.244.35.13 123 udp ntp closed
5345162.244.35.13 137 tcp netbios-ns filtered
5346162.244.35.13 137 udp netbios-ns unknown
5347162.244.35.13 138 tcp netbios-dgm filtered
5348162.244.35.13 138 udp netbios-dgm unknown
5349162.244.35.13 139 tcp netbios-ssn filtered
5350162.244.35.13 139 udp netbios-ssn unknown
5351162.244.35.13 161 tcp snmp closed
5352162.244.35.13 161 udp snmp closed
5353162.244.35.13 162 tcp snmptrap closed
5354162.244.35.13 162 udp snmptrap closed
5355162.244.35.13 389 tcp ldap closed
5356162.244.35.13 389 udp ldap closed
5357162.244.35.13 520 tcp efs closed
5358162.244.35.13 520 udp route closed
5359162.244.35.13 2049 tcp nfs closed
5360162.244.35.13 2049 udp nfs closed
5361169.239.218.20 25 tcp smtp closed
5362169.239.218.20 53 tcp domain filtered
5363169.239.218.20 53 udp domain unknown
5364169.239.218.20 67 tcp dhcps filtered
5365169.239.218.20 67 udp dhcps unknown
5366169.239.218.20 68 tcp dhcpc filtered
5367169.239.218.20 68 udp dhcpc unknown
5368169.239.218.20 69 tcp tftp filtered
5369169.239.218.20 69 udp tftp unknown
5370169.239.218.20 88 tcp kerberos-sec filtered
5371169.239.218.20 88 udp kerberos-sec unknown
5372169.239.218.20 113 tcp ident closed
5373169.239.218.20 123 tcp ntp filtered
5374169.239.218.20 123 udp ntp unknown
5375169.239.218.20 137 tcp netbios-ns filtered
5376169.239.218.20 137 udp netbios-ns filtered
5377169.239.218.20 138 tcp netbios-dgm filtered
5378169.239.218.20 138 udp netbios-dgm filtered
5379169.239.218.20 139 tcp netbios-ssn closed
5380169.239.218.20 139 udp netbios-ssn unknown
5381169.239.218.20 161 tcp snmp filtered
5382169.239.218.20 161 udp snmp unknown
5383169.239.218.20 162 tcp snmptrap filtered
5384169.239.218.20 162 udp snmptrap unknown
5385169.239.218.20 389 tcp ldap filtered
5386169.239.218.20 389 udp ldap unknown
5387169.239.218.20 445 tcp microsoft-ds closed
5388169.239.218.20 520 tcp efs filtered
5389169.239.218.20 520 udp route unknown
5390169.239.218.20 2049 tcp nfs filtered
5391169.239.218.20 2049 udp nfs unknown
5392169.239.218.20 8008 tcp tcpwrapped open
5393173.214.244.169 53 tcp domain filtered
5394173.214.244.169 53 udp domain unknown
5395173.214.244.169 67 tcp dhcps filtered
5396173.214.244.169 67 udp dhcps unknown
5397173.214.244.169 68 tcp dhcpc filtered
5398173.214.244.169 68 udp dhcpc unknown
5399173.214.244.169 69 tcp tftp filtered
5400173.214.244.169 69 udp tftp unknown
5401173.214.244.169 88 tcp kerberos-sec filtered
5402173.214.244.169 88 udp kerberos-sec unknown
5403173.214.244.169 123 tcp ntp filtered
5404173.214.244.169 123 udp ntp unknown
5405173.214.244.169 137 tcp netbios-ns filtered
5406173.214.244.169 137 udp netbios-ns unknown
5407173.214.244.169 138 tcp netbios-dgm filtered
5408173.214.244.169 138 udp netbios-dgm unknown
5409173.214.244.169 139 tcp netbios-ssn filtered
5410173.214.244.169 139 udp netbios-ssn unknown
5411173.214.244.169 161 tcp snmp filtered
5412173.214.244.169 161 udp snmp unknown
5413173.214.244.169 162 tcp snmptrap filtered
5414173.214.244.169 162 udp snmptrap unknown
5415173.214.244.169 389 tcp ldap filtered
5416173.214.244.169 389 udp ldap unknown
5417173.214.244.169 520 tcp efs filtered
5418173.214.244.169 520 udp route unknown
5419173.214.244.169 2049 tcp nfs filtered
5420173.214.244.169 2049 udp nfs unknown
5421174.142.53.51 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 13:59. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
5422174.142.53.51 22 tcp ssh open SSH-2.0-OpenSSH_7.4
5423174.142.53.51 25 tcp smtp closed
5424174.142.53.51 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
5425174.142.53.51 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
5426174.142.53.51 67 tcp dhcps filtered
5427174.142.53.51 67 udp dhcps unknown
5428174.142.53.51 68 tcp dhcpc filtered
5429174.142.53.51 68 udp dhcpc unknown
5430174.142.53.51 69 tcp tftp filtered
5431174.142.53.51 69 udp tftp unknown
5432174.142.53.51 88 tcp kerberos-sec filtered
5433174.142.53.51 88 udp kerberos-sec unknown
5434174.142.53.51 123 tcp ntp filtered
5435174.142.53.51 123 udp ntp unknown
5436174.142.53.51 137 tcp netbios-ns filtered
5437174.142.53.51 137 udp netbios-ns filtered
5438174.142.53.51 138 tcp netbios-dgm filtered
5439174.142.53.51 138 udp netbios-dgm filtered
5440174.142.53.51 139 tcp netbios-ssn closed
5441174.142.53.51 139 udp netbios-ssn unknown
5442174.142.53.51 161 tcp snmp filtered
5443174.142.53.51 161 udp snmp unknown
5444174.142.53.51 162 tcp snmptrap filtered
5445174.142.53.51 162 udp snmptrap unknown
5446174.142.53.51 389 tcp ldap filtered
5447174.142.53.51 389 udp ldap unknown
5448174.142.53.51 445 tcp microsoft-ds closed
5449174.142.53.51 520 tcp efs filtered
5450174.142.53.51 520 udp route unknown
5451174.142.53.51 2049 tcp nfs filtered
5452174.142.53.51 2049 udp nfs unknown
5453207.246.147.189 53 tcp domain filtered
5454207.246.147.189 53 udp domain unknown
5455207.246.147.189 67 tcp dhcps filtered
5456207.246.147.189 67 udp dhcps unknown
5457207.246.147.189 68 tcp dhcpc filtered
5458207.246.147.189 68 udp dhcpc unknown
5459207.246.147.189 69 tcp tftp filtered
5460207.246.147.189 69 udp tftp unknown
5461207.246.147.189 80 tcp http open nginx
5462207.246.147.189 88 tcp kerberos-sec filtered
5463207.246.147.189 88 udp kerberos-sec unknown
5464207.246.147.189 123 tcp ntp filtered
5465207.246.147.189 123 udp ntp unknown
5466207.246.147.189 137 tcp netbios-ns filtered
5467207.246.147.189 137 udp netbios-ns unknown
5468207.246.147.189 138 tcp netbios-dgm filtered
5469207.246.147.189 138 udp netbios-dgm unknown
5470207.246.147.189 139 tcp netbios-ssn filtered
5471207.246.147.189 139 udp netbios-ssn unknown
5472207.246.147.189 161 tcp snmp filtered
5473207.246.147.189 161 udp snmp unknown
5474207.246.147.189 162 tcp snmptrap filtered
5475207.246.147.189 162 udp snmptrap unknown
5476207.246.147.189 389 tcp ldap filtered
5477207.246.147.189 389 udp ldap unknown
5478207.246.147.189 443 tcp ssl/http open nginx
5479207.246.147.189 520 tcp efs filtered
5480207.246.147.189 520 udp route unknown
5481207.246.147.189 2049 tcp nfs filtered
5482207.246.147.189 2049 udp nfs unknown
5483207.246.147.190 53 tcp domain filtered
5484207.246.147.190 53 udp domain unknown
5485207.246.147.190 67 tcp dhcps filtered
5486207.246.147.190 67 udp dhcps unknown
5487207.246.147.190 68 tcp dhcpc filtered
5488207.246.147.190 68 udp dhcpc unknown
5489207.246.147.190 69 tcp tftp filtered
5490207.246.147.190 69 udp tftp unknown
5491207.246.147.190 80 tcp http open nginx
5492207.246.147.190 88 tcp kerberos-sec filtered
5493207.246.147.190 88 udp kerberos-sec unknown
5494207.246.147.190 123 tcp ntp filtered
5495207.246.147.190 123 udp ntp unknown
5496207.246.147.190 137 tcp netbios-ns filtered
5497207.246.147.190 137 udp netbios-ns unknown
5498207.246.147.190 138 tcp netbios-dgm filtered
5499207.246.147.190 138 udp netbios-dgm filtered
5500207.246.147.190 139 tcp netbios-ssn filtered
5501207.246.147.190 139 udp netbios-ssn unknown
5502207.246.147.190 161 tcp snmp filtered
5503207.246.147.190 161 udp snmp unknown
5504207.246.147.190 162 tcp snmptrap filtered
5505207.246.147.190 162 udp snmptrap unknown
5506207.246.147.190 389 tcp ldap filtered
5507207.246.147.190 389 udp ldap unknown
5508207.246.147.190 443 tcp ssl/http open nginx
5509207.246.147.190 520 tcp efs filtered
5510207.246.147.190 520 udp route unknown
5511207.246.147.190 2049 tcp nfs filtered
5512207.246.147.190 2049 udp nfs unknown
5513207.246.147.247 53 tcp domain filtered
5514207.246.147.247 53 udp domain filtered
5515207.246.147.247 67 tcp dhcps filtered
5516207.246.147.247 67 udp dhcps unknown
5517207.246.147.247 68 tcp dhcpc filtered
5518207.246.147.247 68 udp dhcpc unknown
5519207.246.147.247 69 tcp tftp filtered
5520207.246.147.247 69 udp tftp unknown
5521207.246.147.247 80 tcp http open nginx
5522207.246.147.247 88 tcp kerberos-sec filtered
5523207.246.147.247 88 udp kerberos-sec unknown
5524207.246.147.247 123 tcp ntp filtered
5525207.246.147.247 123 udp ntp unknown
5526207.246.147.247 137 tcp netbios-ns filtered
5527207.246.147.247 137 udp netbios-ns filtered
5528207.246.147.247 138 tcp netbios-dgm filtered
5529207.246.147.247 138 udp netbios-dgm unknown
5530207.246.147.247 139 tcp netbios-ssn filtered
5531207.246.147.247 139 udp netbios-ssn unknown
5532207.246.147.247 161 tcp snmp filtered
5533207.246.147.247 161 udp snmp unknown
5534207.246.147.247 162 tcp snmptrap filtered
5535207.246.147.247 162 udp snmptrap unknown
5536207.246.147.247 389 tcp ldap filtered
5537207.246.147.247 389 udp ldap unknown
5538207.246.147.247 443 tcp ssl/http open nginx
5539207.246.147.247 520 tcp efs filtered
5540207.246.147.247 520 udp route unknown
5541207.246.147.247 2049 tcp nfs filtered
5542207.246.147.247 2049 udp nfs unknown
5543207.246.147.248 53 tcp domain filtered
5544207.246.147.248 53 udp domain unknown
5545207.246.147.248 67 tcp dhcps filtered
5546207.246.147.248 67 udp dhcps unknown
5547207.246.147.248 68 tcp dhcpc filtered
5548207.246.147.248 68 udp dhcpc unknown
5549207.246.147.248 69 tcp tftp filtered
5550207.246.147.248 69 udp tftp unknown
5551207.246.147.248 80 tcp http open nginx
5552207.246.147.248 88 tcp kerberos-sec filtered
5553207.246.147.248 88 udp kerberos-sec unknown
5554207.246.147.248 123 tcp ntp filtered
5555207.246.147.248 123 udp ntp unknown
5556207.246.147.248 137 tcp netbios-ns filtered
5557207.246.147.248 137 udp netbios-ns unknown
5558207.246.147.248 138 tcp netbios-dgm filtered
5559207.246.147.248 138 udp netbios-dgm unknown
5560207.246.147.248 139 tcp netbios-ssn filtered
5561207.246.147.248 139 udp netbios-ssn unknown
5562207.246.147.248 161 tcp snmp filtered
5563207.246.147.248 161 udp snmp unknown
5564207.246.147.248 162 tcp snmptrap filtered
5565207.246.147.248 162 udp snmptrap unknown
5566207.246.147.248 389 tcp ldap filtered
5567207.246.147.248 389 udp ldap unknown
5568207.246.147.248 443 tcp ssl/http open nginx
5569207.246.147.248 520 tcp efs filtered
5570207.246.147.248 520 udp route unknown
5571207.246.147.248 2049 tcp nfs filtered
5572207.246.147.248 2049 udp nfs unknown
5573211.13.196.135 25 tcp smtp closed
5574211.13.196.135 53 tcp domain filtered
5575211.13.196.135 53 udp domain unknown
5576211.13.196.135 67 tcp dhcps filtered
5577211.13.196.135 67 udp dhcps unknown
5578211.13.196.135 68 tcp dhcpc filtered
5579211.13.196.135 68 udp dhcpc unknown
5580211.13.196.135 69 tcp tftp filtered
5581211.13.196.135 69 udp tftp unknown
5582211.13.196.135 80 tcp http open Apache httpd
5583211.13.196.135 88 tcp kerberos-sec filtered
5584211.13.196.135 88 udp kerberos-sec unknown
5585211.13.196.135 113 tcp ident closed
5586211.13.196.135 123 tcp ntp filtered
5587211.13.196.135 123 udp ntp unknown
5588211.13.196.135 137 tcp netbios-ns filtered
5589211.13.196.135 137 udp netbios-ns filtered
5590211.13.196.135 138 tcp netbios-dgm filtered
5591211.13.196.135 138 udp netbios-dgm filtered
5592211.13.196.135 139 tcp netbios-ssn closed
5593211.13.196.135 139 udp netbios-ssn unknown
5594211.13.196.135 161 tcp snmp filtered
5595211.13.196.135 161 udp snmp unknown
5596211.13.196.135 162 tcp snmptrap filtered
5597211.13.196.135 162 udp snmptrap unknown
5598211.13.196.135 389 tcp ldap filtered
5599211.13.196.135 389 udp ldap unknown
5600211.13.196.135 443 tcp ssl/http open Apache httpd
5601211.13.196.135 445 tcp microsoft-ds closed
5602211.13.196.135 520 tcp efs filtered
5603211.13.196.135 520 udp route unknown
5604211.13.196.135 2049 tcp nfs filtered
5605211.13.196.135 2049 udp nfs unknown
5606218.45.5.97 25 tcp smtp closed
5607218.45.5.97 53 tcp domain filtered
5608218.45.5.97 53 udp domain unknown
5609218.45.5.97 67 tcp dhcps filtered
5610218.45.5.97 67 udp dhcps unknown
5611218.45.5.97 68 tcp dhcpc filtered
5612218.45.5.97 68 udp dhcpc unknown
5613218.45.5.97 69 tcp tftp filtered
5614218.45.5.97 69 udp tftp unknown
5615218.45.5.97 80 tcp http open Apache httpd 2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.15
5616218.45.5.97 88 tcp kerberos-sec filtered
5617218.45.5.97 88 udp kerberos-sec unknown
5618218.45.5.97 113 tcp ident closed
5619218.45.5.97 123 tcp ntp filtered
5620218.45.5.97 123 udp ntp unknown
5621218.45.5.97 137 tcp netbios-ns filtered
5622218.45.5.97 137 udp netbios-ns filtered
5623218.45.5.97 138 tcp netbios-dgm filtered
5624218.45.5.97 138 udp netbios-dgm filtered
5625218.45.5.97 139 tcp netbios-ssn closed
5626218.45.5.97 139 udp netbios-ssn unknown
5627218.45.5.97 161 tcp snmp filtered
5628218.45.5.97 161 udp snmp unknown
5629218.45.5.97 162 tcp snmptrap filtered
5630218.45.5.97 162 udp snmptrap unknown
5631218.45.5.97 389 tcp ldap filtered
5632218.45.5.97 389 udp ldap unknown
5633218.45.5.97 443 tcp ssl/http open Apache httpd 2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.15
5634218.45.5.97 445 tcp microsoft-ds closed
5635218.45.5.97 520 tcp efs filtered
5636218.45.5.97 520 udp route unknown
5637218.45.5.97 2049 tcp nfs filtered
5638218.45.5.97 2049 udp nfs unknown
5639######################################################################################################################################
5640Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-27 23:08 EST
5641Nmap scan report for teens-sins.net (37.1.207.121)
5642Host is up (0.17s latency).
5643Not shown: 985 filtered ports
5644PORT STATE SERVICE VERSION
564525/tcp open smtp Exim smtpd 4.92
5646| vulscan: VulDB - https://vuldb.com:
5647| [141327] Exim up to 4.92.1 Backslash privilege escalation
5648| [138827] Exim up to 4.92 Expansion Code Execution
5649| [135932] Exim up to 4.92 privilege escalation
5650| [113048] Exim up to 4.90 SMTP Listener Message memory corruption
5651|
5652| MITRE CVE - https://cve.mitre.org:
5653| [CVE-2012-5671] Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.
5654| [CVE-2012-0478] The texImage2D implementation in the WebGL subsystem in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 does not properly restrict JSVAL_TO_OBJECT casts, which might allow remote attackers to execute arbitrary code via a crafted web page.
5655| [CVE-2011-1764] Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character.
5656| [CVE-2011-1407] The DKIM implementation in Exim 4.7x before 4.76 permits matching for DKIM identities to apply to lookup items, instead of only strings, which allows remote attackers to execute arbitrary code or access a filesystem via a crafted identity.
5657| [CVE-2011-0017] The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.
5658| [CVE-2010-4345] Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
5659| [CVE-2010-4344] Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.
5660| [CVE-2010-2024] transports/appendfile.c in Exim before 4.72, when MBX locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/.
5661| [CVE-2010-2023] transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user's file.
5662| [CVE-2006-1251] Argument injection vulnerability in greylistclean.cron in sa-exim 4.2 allows remote attackers to delete arbitrary files via an email with a To field that contains a filename separated by whitespace, which is not quoted when greylistclean.cron provides the argument to the rm command.
5663| [CVE-2005-0022] Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.
5664| [CVE-2005-0021] Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function.
5665| [CVE-2004-0400] Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.
5666| [CVE-2004-0399] Stack-based buffer overflow in Exim 3.35, and other versions before 4, when the sender_verify option is true, allows remote attackers to cause a denial of service and possibly execute arbitrary code during sender verification.
5667| [CVE-2003-0743] Heap-based buffer overflow in smtp_in.c for Exim 3 (exim3) before 3.36 and Exim 4 (exim4) before 4.21 may allow remote attackers to execute arbitrary code via an invalid (1) HELO or (2) EHLO argument with a large number of spaces followed by a NULL character and a newline, which is not properly trimmed before the "(no argument given)" string is appended to the buffer.
5668| [CVE-2002-1381] Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
5669|
5670| SecurityFocus - https://www.securityfocus.com/bid/:
5671| [103049] Exim 'base64d()' Function Buffer Overflow Vulnerability
5672| [99252] Exim CVE-2017-1000369 Local Privilege Escalation Vulnerability
5673| [94947] Exim CVE-2016-9963 Unspecified Information Disclosure Vulnerability
5674| [84132] Exim CVE-2016-1531 Local Privilege Escalation Vulnerability
5675| [68857] Exim CVE-2014-2972 Local Privilege Escalation Vulnerability
5676| [67695] Exim 'dmarc.c' Remote Code Execution Vulnerability
5677| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
5678| [56285] Exim DKIM DNS Decoding CVE-2012-5671 Remote Buffer Overflow Vulnerability
5679| [47836] Exim DKIM CVE-2011-1407 Remote Code Execution Vulnerability
5680| [47736] Exim 'dkim_exim_verify_finish()' Remote Format String Vulnerability
5681| [46065] Exim 'log.c' Local Privilege Escalation Vulnerability
5682| [45341] Exim ALT_CONFIG_ROOT_ONLY 'exim' User Local Privilege Escalation Vulnerability
5683| [45308] Exim Crafted Header Remote Code Execution Vulnerability
5684| [40454] Exim MBX Locking Insecure Temporary File Creation Vulnerability
5685| [40451] Exim Sticky Mail Directory Local Privilege Escalation Vulnerability
5686| [36181] ikiwiki 'teximg' Plugin Insecure TeX Commands Information Disclosure Vulnerability
5687| [23977] Exim SpamAssassin Reply Remote Buffer Overflow Vulnerability
5688| [17110] sa-exim Unauthorized File Access Vulnerability
5689| [12268] Exim IP Address Command Line Argument Local Buffer Overflow Vulnerability
5690| [12188] Exim SPA Authentication Remote Buffer Overflow Vulnerability
5691| [12185] Exim Illegal IPv6 Address Buffer Overflow Vulnerability
5692| [10291] Exim Header Syntax Checking Remote Stack Buffer Overrun Vulnerability
5693| [10290] Exim Sender Verification Remote Stack Buffer Overrun Vulnerability
5694| [8518] Exim EHLO/HELO Remote Heap Corruption Vulnerability
5695| [6314] Exim Internet Mailer Format String Vulnerability
5696| [4096] Exim Configuration File Argument Command Line Buffer Overflow Vulnerability
5697| [3728] Exim Pipe Hostname Arbitrary Command Execution Vulnerability
5698| [2828] Exim Format String Vulnerability
5699| [1859] Exim Buffer Overflow Vulnerability
5700|
5701| IBM X-Force - https://exchange.xforce.ibmcloud.com:
5702| [84758] Exim sender_address parameter command execution
5703| [84015] Exim command execution
5704| [80186] Mozilla Firefox, Thunderbird, and SeaMonkey copyTexImage2D code execution
5705| [80184] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D calls code execution
5706| [79615] Exim dkim_exim_query_dns_txt() buffer overflow
5707| [75155] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D denial of service
5708| [67455] Exim DKIM processing code execution
5709| [67299] Exim dkim_exim_verify_finish() format string
5710| [65028] Exim open_log privilege escalation
5711| [63967] Exim config file privilege escalation
5712| [63960] Exim header buffer overflow
5713| [59043] Exim mail directory privilege escalation
5714| [59042] Exim MBX symlink
5715| [52922] ikiwiki teximg plugin information disclosure
5716| [34265] Exim spamd buffer overflow
5717| [25286] Sa-exim greylistclean.cron file deletion
5718| [22687] RHSA-2005:025 updates for exim not installed
5719| [18901] Exim dns_build_reverse buffer overflow
5720| [18764] Exim spa_base64_to_bits function buffer overflow
5721| [18763] Exim host_aton buffer overflow
5722| [16079] Exim require_verify buffer overflow
5723| [16077] Exim header_check_syntax buffer overflow
5724| [16075] Exim sender_verify buffer overflow
5725| [13067] Exim HELO or EHLO command heap overflow
5726| [10761] Exim daemon.c format string
5727| [8194] Exim configuration file -c command-line argument buffer overflow
5728| [7738] Exim allows attacker to hide commands in localhost names using pipes
5729| [6671] Exim "
5730| [1893] Exim MTA allows local users to gain root privileges
5731|
5732| Exploit-DB - https://www.exploit-db.com:
5733| [16925] Exim4 <= 4.69 - string_format Function Heap Buffer Overflow
5734| [15725] Exim 4.63 Remote Root Exploit
5735| [1009] Exim <= 4.41 dns_build_reverse Local Exploit
5736| [812] Exim <= 4.43 auth_spa_server() Remote PoC Exploit
5737| [796] Exim <= 4.42 Local Root Exploit
5738| [756] Exim <= 4.41 dns_build_reverse Local Exploit PoC
5739|
5740| OpenVAS (Nessus) - http://www.openvas.org:
5741| [100663] Exim < 4.72 RC2 Multiple Vulnerabilities
5742|
5743| SecurityTracker - https://www.securitytracker.com:
5744| [1025539] Exim DKIM Processing Flaw Lets Remote Users Execute Arbitrary Code
5745| [1025504] Exim DKIM Signature Format String Flaw Lets Remote Users Execute Arbitrary Code
5746| [1024859] Exim Configuration File Capability Lets Local Users Gain Elevated Privileges
5747| [1024858] Exim Buffer Overfow in string_format() Lets Remote Users Execute Arbitrary Code
5748| [1012904] Exim Buffer Overflow in dns_build_reverse() Lets Local Users Obtain Elevated Privileges
5749| [1012771] Exim Buffer Overflows in host_aton() and spa_base64_to_bits() May Let Local Users Gain Elevated Privileges
5750| [1010081] Exim Buffer Overflows in 'accept.c' and 'verify.c' Let Remote Users Execute Arbitrary Code
5751| [1007609] Exim Heap Overflow in 'smtp_in.c' May Allow Remote Arbitrary Code Execution
5752| [1005756] Exim Mail Server Format String Bug Lets Local Exim Administrators Execute Arbitrary Code With Root Privileges
5753| [1003547] Potential Bug in Exim Mail Server May Let Local Users Execute Code With Root Privileges
5754| [1003014] Exim Mail Server Pipe Address Validation Error May Let Remote Users Execute Arbitrary Code With Root Privileges in a Certain Configuration
5755| [1001694] Exim Mail Server May Allow Remote Users to Execute Arbitrary Code with Root-Level Privileges on the Server
5756|
5757| OSVDB - http://www.osvdb.org:
5758| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
5759| [87599] Mozilla Multiple Product copyTexImage2D Call Image Dimension Handling Memory Corruption
5760| [87581] Mozilla Multiple Product texImage2D Call Handling Memory Corruption
5761| [86616] Exim src/dkim.c dkim_exim_query_dns_txt() Function DNS Record Parsing Remote Overflow
5762| [81523] Mozilla Multiple Product WebGL texImage2D() Function JSVAL_TO_OBJECT Remote Code Execution
5763| [72642] Exim DKIM Identity Lookup Item Remote Code Execution
5764| [72156] Exim src/dkim.c dkim_exim_verify_finish() Function DKIM-Signature Header Format String
5765| [70696] Exim log.c open_log() Function Local Privilege Escalation
5766| [69860] Exim exim User Account Configuration File Directive Local Privilege Escalation
5767| [69685] Exim string_format Function Remote Overflow
5768| [65159] Exim transports/appendfile.c MBX Locking Race Condition Permission Modification
5769| [65158] Exim transports/appendfile.c Hardlink Handling Arbitrary File Overwrite
5770| [57575] teximg Plugin for ikiwiki TEX Command Arbitrary File Local Disclosure
5771| [23849] sa-exim greylistclean.cron Arbitrary File Deletion
5772| [13073] Oracle Database Server Advanced Queuing Component dbms_transform_eximp Unspecified Security Issue
5773| [12946] Exim -bh Command Line Option dns_build_reverse Function Local Overflow
5774| [12727] Exim SPA Authentication spa_base64_to_bits Function Remote Overflow
5775| [12726] Exim -be Command Line Option host_aton Function Local Overflow
5776| [10877] Exim smtp_in.c HELO/EHLO Remote Overflow
5777| [10360] Exim daemon.c pid_file_path Variable Manipulation Arbitrary Command Execution
5778| [10032] libXpm CreateXImage Function Integer Overflow
5779| [7160] Exim .forward :include: Option Privilege Escalation
5780| [6479] Vexim COOKIE Authentication Credential Disclosure
5781| [6478] Vexim Multiple Parameter SQL Injection
5782| [5930] Exim Parenthesis File Name Filter Bypass
5783| [5897] Exim header_syntax Function Remote Overflow
5784| [5896] Exim sender_verify Function Remote Overflow
5785| [5530] Exim Localhost Name Arbitrary Command Execution
5786| [5330] Exim Configuration File Variable Overflow
5787| [1855] Exim Batched SMTP Mail Header Format String
5788|_
578953/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
5790| vulscan: VulDB - https://vuldb.com:
5791| [11804] ISC BIND up to 9.9.4 DNS Query bin/named/query.c query_findclosestnsec3 denial of service
5792| [11104] ISC BIND up to 9.9.4 WSAloctl Winsock API Bypass privilege escalation
5793| [9764] ISC BIND up to 9.9.4 RDATA rdata.c denial of service
5794| [119548] ISC BIND 9.9.12/9.10.7/9.11.3/9.12.1-P2 Recursion information disclosure
5795| [95202] ISC BIND up to 9.9.9-P4/9.10.4-P4/9.11.0-P1 DNSSEC denial of service
5796| [95201] ISC BIND up to 9.9.9-P4/9.10.4-P4/9.11.0-P1 DS Record Response denial of service
5797| [95200] ISC BIND up to 9.9.9-P4/9.10.4-P4/9.11.0-P1 ANY Query Response denial of service
5798| [89850] ISC BIND up to 9.9.9-P1/9.10.4-P1/9.11.0b1 Lightweight Resolution named.conf denial of service
5799| [81312] ISC BIND up to 9.9.8-P3/9.10.3-P3 named db.c/resolver.c Signature Record denial of service
5800| [81311] ISC BIND up to 9.9.8-P3/9.10.3-P3 named alist.c/sexpr.c denial of service
5801| [80787] ISC BIND up to 9.9.8-S4 Query rdataset.c denial of service
5802| [79802] ISC BIND 9.9.0/9.10.0/9.10.1-P1 Socket Error resolver.c denial of service
5803| [79801] ISC BIND 9.9.0/9.10.0/9.10.1-P1 Response db.c denial of service
5804| [76834] ISC BIND up to 9.9.7-P1/9.10.2-P2 TKEY Query Packet Crash denial of service
5805| [8108] ISC BIND up to 9.9.3 on Unix/Linux Regular Expression denial of service
5806| [7079] ISC BIND up to 9.9.1 DNS64 IPv6 Transition Mechanism denial of service
5807| [6295] ISC BIND up to 9.9.1-P2 Assertion Error Resource Record Parser RDATA Query denial of service
5808| [5875] ISC BIND 9.9.0/9.9.1 denial of service
5809| [5874] ISC BIND up to 9.9.1-P1 denial of service
5810| [5483] ISC BIND up to 9.9.1 DNS Resource Record information disclosure
5811|
5812| MITRE CVE - https://cve.mitre.org:
5813| [CVE-2013-4854] The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
5814| [CVE-2013-3919] resolver.c in ISC BIND 9.8.5 before 9.8.5-P1, 9.9.3 before 9.9.3-P1, and 9.6-ESV-R9 before 9.6-ESV-R9-P1, when a recursive resolver is configured, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a record in a malformed zone.
5815| [CVE-2013-2266] libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
5816| [CVE-2012-5689] ISC BIND 9.8.x through 9.8.4-P1 and 9.9.x through 9.9.2-P1, in certain configurations involving DNS64 with a Response Policy Zone that lacks an AAAA rewrite rule, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for an AAAA record.
5817| [CVE-2012-5688] ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
5818| [CVE-2012-5166] ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
5819| [CVE-2012-4244] ISC BIND 9.x before 9.7.6-P3, 9.8.x before 9.8.3-P3, 9.9.x before 9.9.1-P3, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P3 allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a long resource record.
5820| [CVE-2012-3868] Race condition in the ns_client structure management in ISC BIND 9.9.x before 9.9.1-P2 allows remote attackers to cause a denial of service (memory consumption or process exit) via a large volume of TCP queries.
5821| [CVE-2012-1667] ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record.
5822| [CVE-2011-4313] query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.
5823| [CVE-2011-2465] Unspecified vulnerability in ISC BIND 9 9.8.0, 9.8.0-P1, 9.8.0-P2, and 9.8.1b1, when recursion is enabled and the Response Policy Zone (RPZ) contains DNAME or certain CNAME records, allows remote attackers to cause a denial of service (named daemon crash) via an unspecified query.
5824| [CVE-2011-2464] Unspecified vulnerability in ISC BIND 9 9.6.x before 9.6-ESV-R4-P3, 9.7.x before 9.7.3-P3, and 9.8.x before 9.8.0-P4 allows remote attackers to cause a denial of service (named daemon crash) via a crafted UPDATE request.
5825|
5826| SecurityFocus - https://www.securityfocus.com/bid/:
5827| [61774] ISC BIND 9 SRTT Algorithm Authoritative Server Selection Security Vulnerability
5828| [61479] ISC BIND 9 DNS RDATA Handling CVE-2013-4854 Remote Denial of Service Vulnerability
5829| [58736] ISC BIND 9 'libdns' Remote Denial of Service Vulnerability
5830| [57556] ISC BIND 9 DNS64 CVE-2012-5689 Remote Denial of Service Vulnerability
5831| [56817] ISC BIND 9 DNS64 Remote Denial of Service Vulnerability
5832| [55852] ISC BIND 9 DNS RDATA Handling CVE-2012-5166 Remote Denial of Service Vulnerability
5833| [55522] ISC BIND 9 DNS Resource Records Handling CVE-2012-4244 Remote Denial of Service Vulnerability
5834| [54659] ISC BIND 9 TCP Query Remote Denial of Service Vulnerability
5835| [54658] ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability
5836| [53772] ISC BIND 9 DNS Resource Records Handling Remote Denial of Service Vulnerability
5837| [50690] ISC BIND 9 Recursive Queries Remote Denial of Service Vulnerability
5838| [48566] ISC BIND 9 Unspecified Packet Processing Remote Denial of Service Vulnerability
5839| [48565] ISC BIND 9 RPZ Configurations Remote Denial of Service Vulnerabilities
5840| [48007] ISC BIND 9 Large RRSIG RRsets Remote Denial of Service Vulnerability
5841| [47734] ISC BIND 9 RRSIG Query Type Remote Denial of Service Vulnerability
5842| [46491] ISC BIND 9 IXFR Transfer/DDNS Update Remote Denial of Service Vulnerability
5843| [45385] ISC BIND 9 DNSSEC Validation Remote Denial of Service Vulnerability
5844| [45133] ISC BIND 9 'RRSIG' Record Type Negative Cache Remote Denial of Service Vulnerability
5845| [41730] ISC BIND 9 'RRSIG' Record Type Remote Denial of Service Vulnerability
5846| [37865] ISC BIND 9 DNSSEC Bogus NXDOMAIN Response Remote Cache Poisoning Vulnerability
5847| [37118] ISC BIND 9 DNSSEC Query Response Additional Section Remote Cache Poisoning Vulnerability
5848| [35848] ISC BIND 9 Remote Dynamic Update Message Denial of Service Vulnerability
5849| [25076] ISC BIND 9 Default ACL Settings Recursive Queries And Cached Content Security Bypass Vulnerability
5850| [25037] ISC BIND 9 Remote Cache Poisoning Vulnerability
5851| [4936] ISC BIND 9 Remote Denial Of Service Vulnerability
5852| [100656] Cisco ASR 920 Series Routers CVE-2017-6795 Local Arbitrary File Overwrite Vulnerability
5853| [97450] Cisco ASR 903 and ASR 920 Series CVE-2017-6603 Denial of Service Vulnerability
5854| [93415] Cisco Nexus 9000 Series Switches CVE-2016-1455 Remote Information Disclosure Vulnerability
5855| [82579] Cisco Nexus 9000 Series ACI Mode Switches CVE-2015-6398 Denial of Service Vulnerability
5856| [77686] Cisco Firepower 9000 Series CVE-2015-6380 Unspecified OS Command Injection Vulnerability
5857| [77635] Cisco Firepower 9000 Series CVE-2015-6371 Multiple Arbitrary File Read Vulnerabilities
5858| [77634] Cisco Firepower 9000 Series CVE-2015-6370 Local Command Injection Vulnerability
5859| [77633] Cisco Firepower 9000 Series Switches CVE-2015-6372 HTML Injection Vulnerability
5860| [77631] Cisco Firepower 9000 Series Switches CVE-2015-6374 Clickjacking Vulnerability
5861| [77629] Cisco Firepower 9000 Series CVE-2015-6369 Local Denial of Service Vulnerability
5862| [77628] Cisco Firepower 9000 CVE-2015-6373 Cross Site Request Forgery Vulnerability
5863| [77614] Cisco Firepower 9000 Series Switches CVE-2015-6368 Information Disclosure Vulnerability
5864| [76913] Cisco NX-OS Software for Nexus 9000 Series Switches CVE-2015-6308 Denial of Service Vulnerability
5865| [76791] Cisco ASR 9000 Series Aggregation Services Routers CVE-2015-6301 Denial of Service Vulnerability
5866| [76762] Cisco NX-OS Software for Nexus 9000 Series CVE-2015-6295 Denial of Service Vulnerability
5867| [76329] Cisco Nexus 9000 Series Software CVE-2015-4301 Remote Denial of Service Vulnerability
5868| [76057] Cisco Firepower 9000 Series Devices CVE-2015-4287 Information Disclosure Vulnerability
5869| [75471] Cisco Unified IP Phones 9900 Series CVE-2015-4226 Denial of Service Vulnerability
5870| [75378] Cisco NX-OS Software for Nexus 9000 Series CVE-2015-4213 Information Disclosure Vulnerability
5871| [74029] Cisco ASR 9000 Series Routers CVE-2015-0694 Remote Security Bypass Vulnerability
5872| [73895] Cisco NX-OS Software for Nexus 9000 Series CVE-2015-0686 Denial of Service Vulnerability
5873| [73470] Cisco ASR 9000 Series Routers CVE-2015-0685 Denial of Service Vulnerability
5874| [73318] Cisco ASR 9000 Series Aggregation Services Routers CVE-2015-0672 Denial of Service Vulnerability
5875| [72485] Cisco Unified IP Phones 9900 Series CVE-2015-0604 Arbitrary File Upload Vulnerability
5876| [72484] Cisco Unified IP Phones 9900 Series CVE-2015-0603 Local Denial of Service Vulnerability
5877| [72483] Cisco Unified IP Phones 9900 Series CVE-2015-0601 Local Denial of Service Vulnerability
5878| [72482] Cisco Unified IP Phones 9900 Series CVE-2015-0602 Information Disclosure Vulnerability
5879| [72481] Cisco Unified IP Phones 9900 Series CVE-2015-0600 Denial of Service Vulnerability
5880| [71979] Cisco MDS 9000 NX-OS Software CVE-2015-0582 Denial of Service Vulnerability
5881| [70744] Cisco ASR 901 Series Routers CVE-2014-3293 Denial of Service Vulnerability
5882| [70658] ZTE ZXDSL 931VII 'manager_dev_config_t.gch' Information Disclosure Vulnerability
5883| [69057] Cisco Nexus 9000 Series Switches CVE-2014-3330 Access List Security Bypass Vulnerability
5884| [64770] Cisco Unified IP Phones 9900 Series Crafted Header Unregister Denial of Service Vulnerability
5885| [63564] Cisco MDS 9000 NX-OS Software VRRP Frames Denial of Service Vulnerability
5886| [62944] Cisco Unified IP Phones 9900 Series CVE-2013-5532 Buffer Overflow Vulnerability
5887| [62943] Cisco Unified IP Phones 9900 Series CVE-2013-5533 Local Command Injection Vulnerability
5888| [62905] Cisco Unified IP Phones 9900 Series CVE-2013-5526 Denial of Service Vulnerability
5889| [61330] Cisco Unified IP Phones 9900 Series CVE-2013-3426 Arbitrary File Download Vulnerability
5890| [49633] Oracle Application Server 9i 'httpd.conf' Information Disclosure Vulnerability
5891| [48811] Cisco ASR 9000 Series Routers IP Version 4 Denial of Service Vulnerability
5892| [48264] Aastra 9480i CT Multiple Information Disclosure Vulnerabilities
5893| [15542] NetObjects Fusion 9 Information Disclosure Vulnerability
5894| [6556] Oracle 9i Application Server Sample Scripts Information Disclosure Vulnerability
5895| [6459] Oracle 9i Application Server Java Server Page Source Code Disclosure Vulnerability
5896| [5335] Multiple Lucent Router UDP Port 9 Information Disclosure Vulnerability
5897| [4290] Oracle 9i Default Configuration File Information Disclosure Vulnerability
5898| [4034] Oracle 9IAS OracleJSP Information Disclosure Vulnerability
5899| [3848] Mandrake Bind 9 Package Insecure File Permissions Vulnerability
5900| [2516] Microsoft Plus! 98 Windows ME Password Disclosure Vulnerability
5901|
5902| IBM X-Force - https://exchange.xforce.ibmcloud.com:
5903| [85799] Cisco Unified IP Phones 9900 Series directory traversal
5904| [75412] Cisco Unified IP Phones 9900 series RT privilege escalation
5905| [68733] Cisco 9000 Series Aggregation Service Router IPv4 packet denial of service
5906| [9704] Multiple Lucent router UDP port 9 could disclose sensitive information
5907| [9250] BIND 9 dns_message_findtype() denial of service
5908| [1852] BIND prior to 4.9.7 buffer overflow affects Digital Firewall 97 users
5909| [539] Microsoft Windows 95 and Internet Explorer password disclosure
5910| [86004] ISC BIND RDATA denial of service
5911| [84767] ISC BIND denial of service
5912| [83066] ISC BIND denial of service
5913| [81504] ISC BIND AAAA denial of service
5914| [80510] ISC BIND DNS64 denial of service
5915| [79121] ISC BIND queries denial of service
5916| [78479] ISC BIND RDATA denial of service
5917| [77185] ISC BIND TCP queries denial of service
5918| [77184] ISC BIND bad cache denial of service
5919| [76034] ISC BIND rdata denial of service
5920| [73053] ISC BIND cache update policy security bypass
5921| [71332] ISC BIND recursive queries denial of service
5922| [68375] ISC BIND UPDATE denial of service
5923| [68374] ISC BIND Response Policy Zones denial of service
5924| [67665] ISC BIND RRSIG Rrsets denial of service
5925| [67297] ISC BIND RRSIG denial of service
5926| [65554] ISC BIND IXFR transfer denial of service
5927| [63602] ISC BIND allow-query security bypass
5928| [63596] ISC BIND zone data security bypass
5929| [63595] ISC BIND RRSIG denial of service
5930| [62072] ISC BIND DNSSEC query denial of service
5931| [62071] ISC BIND ACL security bypass
5932| [61871] ISC BIND anchors denial of service
5933| [60421] ISC BIND RRSIG denial of service
5934| [56049] ISC BIND out-of-bailiwick weak security
5935| [55937] ISC Bind unspecified cache poisoning
5936| [55753] ISC BIND DNSSEC NSEC/NSEC3 cache poisoning
5937| [54416] ISC BIND DNSSEC cache poisoning
5938| [52073] ISC BIND dns_db_findrdataset() denial of service
5939| [47409] Multiple Mozilla products XBL loadBindingDocument information disclosure
5940| [45234] ISC BIND UDP denial of service
5941| [39670] ISC BIND inet_network buffer overflow
5942| [37233] libgssapi ISC BIND Novell SUSE Linux Enterprise Server GSS-TSIG request denial of service
5943| [37128] RHSA update for ISC BIND RRset denial of service not installed
5944| [37127] RHSA update for ISC BIND named service denial of service not installed
5945| [36275] ISC BIND DNS query spoofing
5946| [35575] ISC BIND query ID cache poisoning
5947| [35571] ISC BIND ACL security bypass
5948| [31838] ISC BIND RRset denial of service
5949| [31799] ISC BIND named service denial of service
5950| [29876] HP Tru64 ypbind core dump information disclosure
5951| [28745] ISC BIND DNSSEC RRset denial of service
5952| [28744] ISC BIND recursive INSIST denial of service
5953| [22041] BEA WebLogic Server and Express LDAP anonymous bind information disclosure
5954| [18836] BIND hostname disclosure
5955| [10624] ISC BIND DNS stub resolver library (libresolv.a) stack buffer overflows
5956| [10333] ISC BIND SIG null pointer dereference denial of service
5957| [10332] ISC BIND OPT resource record (RR) denial of service
5958| [10304] ISC BIND SIG cached resource records (RR) heap buffer overflow
5959| [7027] Cisco CBOS Web-based configuration utility binds to port 80 by default
5960| [5814] ISC BIND "
5961| [5540] ISC BIND can be remotely crashed by issuing ZXFR requests
5962| [5462] ISC BIND AXFR host command remote buffer overflow
5963|
5964| Exploit-DB - https://www.exploit-db.com:
5965| [24689] cPanel 9.9.1 -R3 Front Page Extension Installation Information Disclosure
5966| [23059] Netbula Anyboard 9.9.5 6 Information Disclosure Vulnerability
5967| [9300] ISC BIND 9 Remote Dynamic Update Message Denial of Service PoC
5968|
5969| OpenVAS (Nessus) - http://www.openvas.org:
5970| [103090] ISC BIND 9 IXFR Transfer/DDNS Update Remote Denial of Service Vulnerability
5971| [103031] ISC BIND 9 < 9.7.2-P2 Multiple Vulnerabilities
5972| [103030] ISC BIND 9 'RRSIG' Record Type Negative Cache Remote Denial of Service Vulnerability
5973| [100717] ISC BIND 9 'RRSIG' Record Type Remote Denial of Service Vulnerability
5974| [100458] ISC BIND 9 DNSSEC Bogus NXDOMAIN Response Remote Cache Poisoning Vulnerability
5975| [100362] ISC BIND 9 DNSSEC Query Response Additional Section Remote Cache Poisoning Vulnerability
5976| [100251] ISC BIND 9 Remote Dynamic Update Message Denial of Service Vulnerability
5977| [63208] Fedora Core 9 FEDORA-2009-0350 (bind)
5978| [11226] Oracle 9iAS default error information disclosure
5979|
5980| SecurityTracker - https://www.securitytracker.com:
5981| [1025811] Cisco ASR 9000 Series Router IPv4 Packet Processing Flaw Lets Remote Users Deny Service
5982| [1012995] BIND 9 Validator Assumption Error May Let Remote Users Deny Service
5983| [1005048] Oracle Enterprise Manager Web Service Component of Oracle 9i Application Server Discloses the Web Cache Administrator Password to Local Users
5984| [1003675] Oracle 9iAS Application Server Discloses CGI-BIN Script Source Code to Remote Users
5985| [1001186] Microsoft Windows Me Operating System and Windows 98 with the Plus! 98 Package Disclose Data Compression Passwords
5986| [1028901] (McAfee Issues Advisory for McAfee Email Gateway) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
5987| [1028900] (McAfee Issues Advisory for McAfee Email and Web Security Appliance) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
5988| [1028899] (McAfee Issues Fix for McAfee Web Gateway) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
5989| [1028866] (McAfee Issues Fix for McAfee Firewall Enterprise) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
5990| [1028854] (NetBSD Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
5991| [1028849] (Red Hat Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
5992| [1028848] (Red Hat Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
5993| [1028839] (FreeBSD Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
5994| [1028838] ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
5995| [1028632] ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against Recursive Resolvers
5996| [1028046] ISC BIND DNS64 and Response Policy Zones (RPZ) Bug Lets Remote Users Deny Service
5997| [1027835] ISC BIND DNS64 Bug Lets Remote Users Deny Service
5998| [1027642] ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service
5999| [1027529] ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service
6000| [1026647] ISC BIND Cache Update Policy Can Be Bypassed to Allow Revoked Domain Names to Remain Resolvable
6001| [1026335] ISC BIND Invalid Record Caching Flaw Lets Remote Users Deny Service
6002| [1025743] ISC BIND Response Policy Zones DNAME/CNAME Processing Flaw Lets Remote Users Deny Service
6003| [1025742] ISC BIND Packet Processing Flaw Lets Remote Users Deny Service
6004| [1015850] Samba winbindd Daemon Discloses Server Password to Local Users
6005| [1003359] BindView NETinventory Discloses Password to Local Users During Auditing
6006| [1001721] BIND Domain Name System Software May Disclose DNS Transactional Signature (TSIG) Keys to Local Users
6007|
6008| OSVDB - http://www.osvdb.org:
6009| [86219] Cardiac Science G3 Plus 9390A-501 AED AEDUpdate Cleartext Password Local Disclosure
6010| [22517] MPN HP-180W Wireless IP Phone UDP Port 9090 Information Disclosure
6011| [22516] ZyXEL P-2000W_v2 VoIP Wi-Fi Phone UDP Port 9090 Information Disclosure
6012| [21292] ZyXEL P2000W UDP 9090 Remote Information Disclosure
6013|_
601480/tcp open http nginx 1.14.1
6015|_http-server-header: nginx/1.14.1
6016| vulscan: VulDB - https://vuldb.com:
6017| [126525] nginx up to 1.14.0/1.15.5 ngx_http_mp4_module Loop denial of service
6018| [126524] nginx up to 1.14.0/1.15.5 HTTP2 CPU Exhaustion denial of service
6019| [126523] nginx up to 1.14.0/1.15.5 HTTP2 Memory Consumption denial of service
6020|
6021| MITRE CVE - https://cve.mitre.org:
6022| [CVE-2013-2070] http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
6023| [CVE-2012-2089] Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
6024| [CVE-2012-1180] Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
6025| [CVE-2013-2028] The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.
6026| [CVE-2011-4963] nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
6027| [CVE-2011-4315] Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
6028|
6029| SecurityFocus - https://www.securityfocus.com/bid/:
6030| [99534] Nginx CVE-2017-7529 Remote Integer Overflow Vulnerability
6031| [93903] Nginx CVE-2016-1247 Remote Privilege Escalation Vulnerability
6032| [91819] Nginx CVE-2016-1000105 Security Bypass Vulnerability
6033| [90967] nginx CVE-2016-4450 Denial of Service Vulnerability
6034| [82230] nginx Multiple Denial of Service Vulnerabilities
6035| [78928] Nginx CVE-2010-2266 Denial-Of-Service Vulnerability
6036| [70025] nginx CVE-2014-3616 SSL Session Fixation Vulnerability
6037| [69111] nginx SMTP Proxy Remote Command Injection Vulnerability
6038| [67507] nginx SPDY Implementation CVE-2014-0088 Arbitrary Code Execution Vulnerability
6039| [66537] nginx SPDY Implementation Heap Based Buffer Overflow Vulnerability
6040| [63814] nginx CVE-2013-4547 URI Processing Security Bypass Vulnerability
6041| [59824] Nginx CVE-2013-2070 Remote Security Vulnerability
6042| [59699] nginx 'ngx_http_parse.c' Stack Buffer Overflow Vulnerability
6043| [59496] nginx 'ngx_http_close_connection()' Remote Integer Overflow Vulnerability
6044| [59323] nginx NULL-Byte Arbitrary Code Execution Vulnerability
6045| [58105] Nginx 'access.log' Insecure File Permissions Vulnerability
6046| [57139] nginx CVE-2011-4968 Man in The Middle Vulnerability
6047| [55920] nginx CVE-2011-4963 Security Bypass Vulnerability
6048| [54331] Nginx Naxsi Module 'nx_extract.py' Script Remote File Disclosure Vulnerability
6049| [52999] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
6050| [52578] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
6051| [50710] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
6052| [40760] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
6053| [40434] nginx Space String Remote Source Code Disclosure Vulnerability
6054| [40420] nginx Directory Traversal Vulnerability
6055| [37711] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
6056| [36839] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
6057| [36490] nginx WebDAV Multiple Directory Traversal Vulnerabilities
6058| [36438] nginx Proxy DNS Cache Domain Spoofing Vulnerability
6059| [36384] nginx HTTP Request Remote Buffer Overflow Vulnerability
6060|
6061| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6062| [84623] Phusion Passenger gem for Ruby with nginx configuration insecure permissions
6063| [84172] nginx denial of service
6064| [84048] nginx buffer overflow
6065| [83923] nginx ngx_http_close_connection() integer overflow
6066| [83688] nginx null byte code execution
6067| [83103] Naxsi module for Nginx naxsi_unescape_uri() function security bypass
6068| [82319] nginx access.log information disclosure
6069| [80952] nginx SSL spoofing
6070| [77244] nginx and Microsoft Windows request security bypass
6071| [76778] Naxsi module for Nginx nx_extract.py directory traversal
6072| [74831] nginx ngx_http_mp4_module.c buffer overflow
6073| [74191] nginx ngx_cpystrn() information disclosure
6074| [74045] nginx header response information disclosure
6075| [71355] nginx ngx_resolver_copy() buffer overflow
6076| [59370] nginx characters denial of service
6077| [59369] nginx DATA source code disclosure
6078| [59047] nginx space source code disclosure
6079| [58966] nginx unspecified directory traversal
6080| [54025] nginx ngx_http_parse.c denial of service
6081| [53431] nginx WebDAV component directory traversal
6082| [53328] Nginx CRC-32 cached domain name spoofing
6083| [53250] Nginx ngx_http_parse_complex_uri() function code execution
6084|
6085| Exploit-DB - https://www.exploit-db.com:
6086| [26737] nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
6087| [25775] Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
6088| [25499] nginx 1.3.9-1.4.0 DoS PoC
6089|
6090| OpenVAS (Nessus) - http://www.openvas.org:
6091| [66451] Fedora Core 11 FEDORA-2009-12782 (nginx)
6092| [66450] Fedora Core 10 FEDORA-2009-12775 (nginx)
6093| [66449] Fedora Core 12 FEDORA-2009-12750 (nginx)
6094| [64912] Fedora Core 10 FEDORA-2009-9652 (nginx)
6095| [64911] Fedora Core 11 FEDORA-2009-9630 (nginx)
6096| [64869] Debian Security Advisory DSA 1884-1 (nginx)
6097|
6098| SecurityTracker - https://www.securitytracker.com:
6099| [1028544] nginx Bug Lets Remote Users Deny Service or Obtain Potentially Sensitive Information
6100| [1028519] nginx Stack Overflow Lets Remote Users Execute Arbitrary Code
6101| [1026924] nginx Buffer Overflow in ngx_http_mp4_module Lets Remote Users Execute Arbitrary Code
6102| [1026827] nginx HTTP Response Processing Lets Remote Users Obtain Portions of Memory Contents
6103|
6104| OSVDB - http://www.osvdb.org:
6105| [94864] cPnginx Plugin for cPanel nginx Configuration Manipulation Arbitrary File Access
6106| [93282] nginx proxy_pass Crafted Upstream Proxied Server Response Handling Worker Process Memory Disclosure
6107| [93037] nginx /http/ngx_http_parse.c Worker Process Crafted Request Handling Remote Overflow
6108| [92796] nginx ngx_http_close_connection Function Crafted r->
6109| [92634] nginx ngx_http_request.h zero_in_uri URL Null Byte Handling Remote Code Execution
6110| [90518] nginx Log Directory Permission Weakness Local Information Disclosure
6111| [88910] nginx Proxy Functionality SSL Certificate Validation MitM Spoofing Weakness
6112| [84339] nginx/Windows Multiple Request Sequence Parsing Arbitrary File Access
6113| [83617] Naxsi Module for Nginx naxsi-ui/ nx_extract.py Traversal Arbitrary File Access
6114| [81339] nginx ngx_http_mp4_module Module Atom MP4 File Handling Remote Overflow
6115| [80124] nginx HTTP Header Response Parsing Freed Memory Information Disclosure
6116| [77184] nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote Overflow
6117| [65531] nginx on Windows URI ::$DATA Append Arbitrary File Access
6118| [65530] nginx Encoded Traversal Sequence Memory Corruption Remote DoS
6119| [65294] nginx on Windows Encoded Space Request Remote Source Disclosure
6120| [63136] nginx on Windows 8.3 Filename Alias Request Access Rules / Authentication Bypass
6121| [62617] nginx Internal DNS Cache Poisoning Weakness
6122| [61779] nginx HTTP Request Escape Sequence Terminal Command Injection
6123| [59278] nginx src/http/ngx_http_parse.c ngx_http_process_request_headers() Function URL Handling NULL Dereference DoS
6124| [58328] nginx WebDAV Multiple Method Traversal Arbitrary File Write
6125| [58128] nginx ngx_http_parse_complex_uri() Function Underflow
6126| [44447] nginx (engine x) msie_refresh Directive Unspecified XSS
6127| [44446] nginx (engine x) ssl_verify_client Directive HTTP/0.9 Protocol Bypass
6128| [44445] nginx (engine x) ngx_http_realip_module satisfy_any Directive Unspecified Access Bypass
6129| [44444] nginx (engine x) X-Accel-Redirect Header Unspecified Traversal
6130| [44443] nginx (engine x) rtsig Method Signal Queue Overflow
6131| [44442] nginx (engine x) Worker Process Millisecond Timers Unspecified Overflow
6132|_
6133110/tcp open pop3 Dovecot pop3d
6134| vulscan: VulDB - https://vuldb.com:
6135| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
6136| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
6137| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
6138| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
6139| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
6140| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
6141| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
6142| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
6143| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
6144| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
6145| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
6146| [69835] Dovecot 2.2.0/2.2.1 denial of service
6147| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
6148| [65684] Dovecot up to 2.2.6 unknown vulnerability
6149| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
6150| [63692] Dovecot up to 2.0.15 spoofing
6151| [7062] Dovecot 2.1.10 mail-search.c denial of service
6152| [57517] Dovecot up to 2.0.12 Login directory traversal
6153| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
6154| [57515] Dovecot up to 2.0.12 Crash denial of service
6155| [54944] Dovecot up to 1.2.14 denial of service
6156| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
6157| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
6158| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
6159| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
6160| [53277] Dovecot up to 1.2.10 denial of service
6161| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
6162| [45256] Dovecot up to 1.1.5 directory traversal
6163| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
6164| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
6165| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
6166| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
6167| [40356] Dovecot 1.0.9 Cache unknown vulnerability
6168| [38222] Dovecot 1.0.2 directory traversal
6169| [36376] Dovecot up to 1.0.x directory traversal
6170| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
6171|
6172| MITRE CVE - https://cve.mitre.org:
6173| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
6174| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
6175| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
6176| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
6177| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
6178| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
6179| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
6180| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
6181| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
6182| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
6183| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
6184| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
6185| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
6186| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
6187| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
6188| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
6189| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
6190| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
6191| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
6192| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
6193| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
6194| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
6195| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
6196| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
6197| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
6198| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
6199| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
6200| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
6201| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
6202| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
6203| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
6204| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
6205| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
6206| [CVE-2002-0925] Format string vulnerability in mmsyslog function allows remote attackers to execute arbitrary code via (1) the USER command to mmpop3d for mmmail 0.0.13 and earlier, (2) the HELO command to mmsmtpd for mmmail 0.0.13 and earlier, or (3) the USER command to mmftpd 0.0.7 and earlier.
6207| [CVE-2001-0143] vpop3d program in linuxconf 1.23r and earlier allows local users to overwrite arbitrary files via a symlink attack.
6208| [CVE-2000-1197] POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes.
6209| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
6210|
6211| SecurityFocus - https://www.securityfocus.com/bid/:
6212| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
6213| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
6214| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
6215| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
6216| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
6217| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
6218| [67306] Dovecot Denial of Service Vulnerability
6219| [67219] akpop3d 'pszQuery' Remote Memory Corruption Vulnerability
6220| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
6221| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
6222| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
6223| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
6224| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
6225| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
6226| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
6227| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
6228| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
6229| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
6230| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
6231| [39838] tpop3d Remote Denial of Service Vulnerability
6232| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
6233| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
6234| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
6235| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
6236| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
6237| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
6238| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
6239| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
6240| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
6241| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
6242| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
6243| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
6244| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
6245| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
6246| [17961] Dovecot Remote Information Disclosure Vulnerability
6247| [16672] Dovecot Double Free Denial of Service Vulnerability
6248| [8495] akpop3d User Name SQL Injection Vulnerability
6249| [8473] Vpop3d Remote Denial Of Service Vulnerability
6250| [3990] ZPop3D Bad Login Logging Failure Vulnerability
6251| [2781] DynFX MailServer POP3d Denial of Service Vulnerability
6252|
6253| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6254| [86382] Dovecot POP3 Service denial of service
6255| [84396] Dovecot IMAP APPEND denial of service
6256| [80453] Dovecot mail-search.c denial of service
6257| [71354] Dovecot SSL Common Name (CN) weak security
6258| [67675] Dovecot script-login security bypass
6259| [67674] Dovecot script-login directory traversal
6260| [67589] Dovecot header name denial of service
6261| [63267] Apple Mac OS X Dovecot information disclosure
6262| [62340] Dovecot mailbox security bypass
6263| [62339] Dovecot IMAP or POP3 denial of service
6264| [62256] Dovecot mailbox security bypass
6265| [62255] Dovecot ACL entry security bypass
6266| [60639] Dovecot ACL plugin weak security
6267| [57267] Apple Mac OS X Dovecot Kerberos security bypass
6268| [56763] Dovecot header denial of service
6269| [54363] Dovecot base_dir privilege escalation
6270| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
6271| [46323] Dovecot dovecot.conf information disclosure
6272| [46227] Dovecot message parsing denial of service
6273| [45669] Dovecot ACL mailbox security bypass
6274| [45667] Dovecot ACL plugin rights security bypass
6275| [41085] Dovecot TAB characters authentication bypass
6276| [41009] Dovecot mail_extra_groups option unauthorized access
6277| [39342] Dovecot LDAP auth cache configuration security bypass
6278| [35767] Dovecot ACL plugin security bypass
6279| [34082] Dovecot mbox-storage.c directory traversal
6280| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
6281| [26578] Cyrus IMAP pop3d buffer overflow
6282| [26536] Dovecot IMAP LIST information disclosure
6283| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
6284| [24709] Dovecot APPEND command denial of service
6285| [13018] akpop3d authentication code SQL injection
6286| [7345] Slackware Linux imapd and ipop3d core dump
6287| [6269] imap, ipop2d and ipop3d buffer overflows
6288| [5923] Linuxconf vpop3d symbolic link
6289| [4918] IPOP3D, Buffer overflow attack
6290| [1560] IPOP3D, user login successful
6291| [1559] IPOP3D user login to remote host successful
6292| [1525] IPOP3D, user logout
6293| [1524] IPOP3D, user auto-logout
6294| [1523] IPOP3D, user login failure
6295| [1522] IPOP3D, brute force attack
6296| [1521] IPOP3D, user kiss of death logout
6297| [418] pop3d mktemp creates insecure temporary files
6298|
6299| Exploit-DB - https://www.exploit-db.com:
6300| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
6301| [23053] Vpop3d Remote Denial of Service Vulnerability
6302| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
6303| [11893] tPop3d 1.5.3 DoS
6304| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
6305| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
6306| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
6307| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
6308|
6309| OpenVAS (Nessus) - http://www.openvas.org:
6310| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
6311| [901025] Dovecot Version Detection
6312| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
6313| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
6314| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
6315| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
6316| [870607] RedHat Update for dovecot RHSA-2011:0600-01
6317| [870471] RedHat Update for dovecot RHSA-2011:1187-01
6318| [870153] RedHat Update for dovecot RHSA-2008:0297-02
6319| [863272] Fedora Update for dovecot FEDORA-2011-7612
6320| [863115] Fedora Update for dovecot FEDORA-2011-7258
6321| [861525] Fedora Update for dovecot FEDORA-2007-664
6322| [861394] Fedora Update for dovecot FEDORA-2007-493
6323| [861333] Fedora Update for dovecot FEDORA-2007-1485
6324| [860845] Fedora Update for dovecot FEDORA-2008-9202
6325| [860663] Fedora Update for dovecot FEDORA-2008-2475
6326| [860169] Fedora Update for dovecot FEDORA-2008-2464
6327| [860089] Fedora Update for dovecot FEDORA-2008-9232
6328| [840950] Ubuntu Update for dovecot USN-1295-1
6329| [840668] Ubuntu Update for dovecot USN-1143-1
6330| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
6331| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
6332| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
6333| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
6334| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
6335| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
6336| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
6337| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
6338| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
6339| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
6340| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
6341| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
6342| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
6343| [70259] FreeBSD Ports: dovecot
6344| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
6345| [66522] FreeBSD Ports: dovecot
6346| [65010] Ubuntu USN-838-1 (dovecot)
6347| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
6348| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
6349| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
6350| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
6351| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
6352| [62854] FreeBSD Ports: dovecot-managesieve
6353| [61916] FreeBSD Ports: dovecot
6354| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
6355| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
6356| [60528] FreeBSD Ports: dovecot
6357| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
6358| [60089] FreeBSD Ports: dovecot
6359| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
6360| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
6361|
6362| SecurityTracker - https://www.securitytracker.com:
6363| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
6364| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
6365| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
6366|
6367| OSVDB - http://www.osvdb.org:
6368| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
6369| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
6370| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
6371| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
6372| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
6373| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
6374| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
6375| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
6376| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
6377| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
6378| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
6379| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
6380| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
6381| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
6382| [66113] Dovecot Mail Root Directory Creation Permission Weakness
6383| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
6384| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
6385| [66110] Dovecot Multiple Unspecified Buffer Overflows
6386| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
6387| [64783] Dovecot E-mail Message Header Unspecified DoS
6388| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
6389| [62796] Dovecot mbox Format Email Header Handling DoS
6390| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
6391| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
6392| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
6393| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
6394| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
6395| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
6396| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
6397| [43137] Dovecot mail_extra_groups Symlink File Manipulation
6398| [42979] Dovecot passdbs Argument Injection Authentication Bypass
6399| [39876] Dovecot LDAP Auth Cache Security Bypass
6400| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
6401| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
6402| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
6403| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
6404| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
6405| [23281] Dovecot imap/pop3-login dovecot-auth DoS
6406| [23280] Dovecot Malformed APPEND Command DoS
6407| [14459] mmmail mmpop3d USER Command mmsyslog Function Format String
6408| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
6409| [5857] Linux pop3d Arbitrary Mail File Access
6410| [2471] akpop3d username SQL Injection
6411|_
6412143/tcp open imap Dovecot imapd
6413| vulscan: VulDB - https://vuldb.com:
6414| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
6415| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
6416| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
6417| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
6418| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
6419| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
6420| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
6421| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
6422| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
6423| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
6424| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
6425| [69835] Dovecot 2.2.0/2.2.1 denial of service
6426| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
6427| [65684] Dovecot up to 2.2.6 unknown vulnerability
6428| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
6429| [63692] Dovecot up to 2.0.15 spoofing
6430| [7062] Dovecot 2.1.10 mail-search.c denial of service
6431| [59792] Cyrus IMAPd 2.4.11 weak authentication
6432| [57517] Dovecot up to 2.0.12 Login directory traversal
6433| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
6434| [57515] Dovecot up to 2.0.12 Crash denial of service
6435| [54944] Dovecot up to 1.2.14 denial of service
6436| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
6437| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
6438| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
6439| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
6440| [53277] Dovecot up to 1.2.10 denial of service
6441| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
6442| [45256] Dovecot up to 1.1.5 directory traversal
6443| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
6444| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
6445| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
6446| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
6447| [40356] Dovecot 1.0.9 Cache unknown vulnerability
6448| [38222] Dovecot 1.0.2 directory traversal
6449| [37927] Ipswitch Ipswitch Collaboration Suite up to 2006.1 IMAP Service imapd32.exe memory corruption
6450| [36376] Dovecot up to 1.0.x directory traversal
6451| [35759] Atrium MERCUR IMAPD IMAP4 mcrimap4.exe memory corruption
6452| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
6453|
6454| MITRE CVE - https://cve.mitre.org:
6455| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
6456| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
6457| [CVE-2011-3481] The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message.
6458| [CVE-2011-3372] imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command.
6459| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
6460| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
6461| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
6462| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
6463| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
6464| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
6465| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
6466| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
6467| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
6468| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
6469| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
6470| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
6471| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
6472| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
6473| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
6474| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
6475| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
6476| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
6477| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
6478| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
6479| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
6480| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
6481| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
6482| [CVE-2007-5740] The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism.
6483| [CVE-2007-5018] Stack-based buffer overflow in IMAPD in Mercury/32 4.52 allows remote authenticated users to execute arbitrary code via a long argument in a SEARCH ON command. NOTE: this issue might overlap with CVE-2004-1211.
6484| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
6485| [CVE-2007-3925] Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.
6486| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
6487| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
6488| [CVE-2007-1579] Stack-based buffer overflow in Atrium MERCUR IMAPD allows remote attackers to have an unknown impact via a certain SUBSCRIBE command.
6489| [CVE-2007-1578] Multiple integer signedness errors in the NTLM implementation in Atrium MERCUR IMAPD (mcrimap4.exe) 5.00.14, with SP4, allow remote attackers to execute arbitrary code via a long NTLMSSP argument that triggers a stack-based buffer overflow.
6490| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
6491| [CVE-2006-6762] The IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to cause a denial of service via an APPEND command with a single "(" (parenthesis) in the argument.
6492| [CVE-2006-6761] Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command.
6493| [CVE-2006-6425] Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via unspecified vectors involving the APPEND command.
6494| [CVE-2006-6424] Multiple buffer overflows in Novell NetMail before 3.52e FTF2 allow remote attackers to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow
6495| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
6496| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
6497| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
6498| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
6499| [CVE-2005-2278] Stack-based buffer overflow in the IMAP daemon (imapd) in MailEnable Professional 1.54 allows remote authenticated users to execute arbitrary code via the status command with a long mailbox name.
6500| [CVE-2005-1256] Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name.
6501| [CVE-2005-1249] The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop.
6502| [CVE-2005-1015] Buffer overflow in MailEnable Imapd (MEIMAP.exe) allows remote attackers to execute arbitrary code via a long LOGIN command.
6503| [CVE-2005-0546] Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd.
6504| [CVE-2003-1322] Multiple stack-based buffer overflows in Atrium MERCUR IMAPD in MERCUR Mailserver before 4.2.15.0 allow remote attackers to execute arbitrary code via a long (1) EXAMINE, (2) DELETE, (3) SUBSCRIBE, (4) RENAME, (5) UNSUBSCRIBE, (6) LIST, (7) LSUB, (8) STATUS, (9) LOGIN, (10) CREATE, or (11) SELECT command.
6505| [CVE-2002-1782] The default configuration of University of Washington IMAP daemon (wu-imapd), when running on a system that does not allow shell access, allows a local user with a valid IMAP account to read arbitrary files as that user.
6506| [CVE-2002-1604] Multiple buffer overflows in HP Tru64 UNIX allow local and possibly remote attackers to execute arbitrary code via a long NLSPATH environment variable to (1) csh, (2) dtsession, (3) dxsysinfo, (4) imapd, (5) inc, (6) uucp, (7) uux, (8) rdist, or (9) deliver.
6507| [CVE-2002-0997] Buffer overflows in IMAP Agent (imapd) for Novell NetMail (NIMS) 3.0.3 before 3.0.3A allows remote attackers to cause a denial of service.
6508| [CVE-2002-0379] Buffer overflow in University of Washington imap server (uw-imapd) imap-2001 (imapd 2001.315) and imap-2001a (imapd 2001.315) with legacy RFC 1730 support, and imapd 2000.287 and earlier, allows remote authenticated users to execute arbitrary code via a long BODY request.
6509| [CVE-2001-0691] Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations.
6510| [CVE-2000-0284] Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.
6511| [CVE-1999-1557] Buffer overflow in the login functions in IMAP server (imapd) in Ipswitch IMail 5.0 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long user name or (2) a long password.
6512| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
6513| [CVE-1999-1224] IMAP 4.1 BETA, and possibly other versions, does not properly handle the SIGABRT (abort) signal, which allows local users to crash the server (imapd) via certain sequences of commands, which causes a core dump that may contain sensitive password information.
6514|
6515| SecurityFocus - https://www.securityfocus.com/bid/:
6516| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
6517| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
6518| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
6519| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
6520| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
6521| [84478] imapd CVE-1999-1224 Denial-Of-Service Vulnerability
6522| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
6523| [67306] Dovecot Denial of Service Vulnerability
6524| [65650] Eudora WorldMail imapd 'UID' Command Buffer Overflow Vulnerability
6525| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
6526| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
6527| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
6528| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
6529| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
6530| [51403] Eudora WorldMail imapd 'LIST' Command Buffer Overflow Vulnerability
6531| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
6532| [49949] Cyrus IMAPd NTTP Logic Error Authentication Bypass Vulnerability
6533| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
6534| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
6535| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
6536| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
6537| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
6538| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
6539| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
6540| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
6541| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
6542| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
6543| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
6544| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
6545| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
6546| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
6547| [26270] Perdition IMAPD __STR_VWRITE Remote Format String Vulnerability
6548| [25733] Mercury/32 IMAPD SEARCH Command Remote Stack Buffer Overflow Vulnerability
6549| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
6550| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
6551| [23058] Atrium Mercur IMapD NTLM Buffer Overflow Vulnerability
6552| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
6553| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
6554| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
6555| [17961] Dovecot Remote Information Disclosure Vulnerability
6556| [16672] Dovecot Double Free Denial of Service Vulnerability
6557| [15980] Qualcomm WorldMail IMAPD Buffer Overflow Vulnerability
6558| [15753] Ipswitch Collaboration Suite and IMail Server IMAPD LIST Command Denial Of Service Vulnerability
6559| [12636] Cyrus IMAPD Multiple Remote Buffer Overflow Vulnerabilities
6560| [11738] Cyrus IMAPD Multiple Remote Unspecified Vulnerabilities
6561| [11729] Cyrus IMAPD Multiple Remote Vulnerabilities
6562| [6298] Cyrus IMAPD Pre-Login Heap Corruption Vulnerability
6563| [4713] Wu-imapd Partial Mailbox Attribute Remote Buffer Overflow Vulnerability
6564| [2856] Imapd 'Local' Buffer Overflow Vulnerabilities
6565| [1110] Univ. Of Washington imapd Buffer Overflow Vulnerabilities
6566| [502] NT IMail Imapd Buffer Overflow DoS Vulnerability
6567| [130] imapd Buffer Overflow Vulnerability
6568|
6569| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6570| [86382] Dovecot POP3 Service denial of service
6571| [84396] Dovecot IMAP APPEND denial of service
6572| [80453] Dovecot mail-search.c denial of service
6573| [71354] Dovecot SSL Common Name (CN) weak security
6574| [70325] Cyrus IMAPd NNTP security bypass
6575| [67675] Dovecot script-login security bypass
6576| [67674] Dovecot script-login directory traversal
6577| [67589] Dovecot header name denial of service
6578| [63267] Apple Mac OS X Dovecot information disclosure
6579| [62340] Dovecot mailbox security bypass
6580| [62339] Dovecot IMAP or POP3 denial of service
6581| [62256] Dovecot mailbox security bypass
6582| [62255] Dovecot ACL entry security bypass
6583| [60639] Dovecot ACL plugin weak security
6584| [57267] Apple Mac OS X Dovecot Kerberos security bypass
6585| [56763] Dovecot header denial of service
6586| [54363] Dovecot base_dir privilege escalation
6587| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
6588| [47526] UW-imapd rfc822_output_char() denial of service
6589| [46323] Dovecot dovecot.conf information disclosure
6590| [46227] Dovecot message parsing denial of service
6591| [45669] Dovecot ACL mailbox security bypass
6592| [45667] Dovecot ACL plugin rights security bypass
6593| [41085] Dovecot TAB characters authentication bypass
6594| [41009] Dovecot mail_extra_groups option unauthorized access
6595| [39342] Dovecot LDAP auth cache configuration security bypass
6596| [35767] Dovecot ACL plugin security bypass
6597| [34082] Dovecot mbox-storage.c directory traversal
6598| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
6599| [26536] Dovecot IMAP LIST information disclosure
6600| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
6601| [24709] Dovecot APPEND command denial of service
6602| [22629] RHSA-2005:408 updates for cyrus-imapd not installed
6603| [19460] Cyrus IMAP imapd buffer overflow
6604| [19455] Cyrus IMAP imapd extension off-by-one buffer overflow
6605| [18492] Novell NetMail IMAPD 101_mEna buffer overflow
6606| [10803] UW IMAP (wu-imapd) authenticated user buffer overflow
6607| [9238] UW IMAP (wu-imapd) could allow a remote attacker to access arbitrary files
6608| [9055] UW IMAP (wu-imapd) partial mailbox attributes to request buffer overflow
6609| [7345] Slackware Linux imapd and ipop3d core dump
6610| [573] Imapd denial of service
6611|
6612| Exploit-DB - https://www.exploit-db.com:
6613| [30724] Perdition 1.17 IMAPD __STR_VWRITE Remote Format String Vulnerability
6614| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
6615| [22061] Cyrus IMAPD 1.4/1.5.19/2.0.12/2.0.16/2.1.9/2.1.10 Pre-Login Heap Corruption Vulnerability
6616| [21443] Wu-imapd 2000/2001 Partial Mailbox Attribute Remote Buffer Overflow Vulnerability (2)
6617| [21442] Wu-imapd 2000/2001 Partial Mailbox Attribute Remote Buffer Overflow Vulnerability (1)
6618| [19849] UoW imapd 10.234/12.264 COPY Buffer Overflow (meta)
6619| [19848] UoW imapd 10.234/12.264 LSUB Buffer Overflow (meta)
6620| [19847] UoW imapd 10.234/12.264 Buffer Overflow Vulnerabilities
6621| [19377] Ipswitch IMail 5.0 Imapd Buffer Overflow DoS Vulnerability
6622| [19107] Netscape Messaging Server 3.55,University of Washington imapd 10.234 Buffer Overflow Vulnerability
6623| [18354] WorldMail imapd 3.0 SEH overflow (egg hunter)
6624| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
6625| [16485] MailEnable IMAPD 1.54 - STATUS Request Buffer Overflow
6626| [16482] MDaemon 9.6.4 IMAPD FETCH Buffer Overflow
6627| [16480] MailEnable IMAPD W3C Logging Buffer Overflow
6628| [16477] Mdaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow
6629| [16475] MailEnable IMAPD (2.35) Login Request Buffer Overflow
6630| [16474] Qualcomm WorldMail 3.0 IMAPD LIST Buffer Overflow
6631| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
6632| [4429] Mercury/32 4.52 IMAPD SEARCH command Post-Auth Overflow Exploit
6633| [3627] IPSwitch IMail Server <= 8.20 IMAPD Remote Buffer Overflow Exploit
6634| [3527] Mercur IMAPD 5.00.14 Remote Denial of Service Exploit (win32)
6635| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
6636| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
6637| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
6638| [1380] Eudora Qualcomm WorldMail 3.0 (IMAPd) Remote Overflow Exploit
6639| [1332] MailEnable 1.54 Pro Universal IMAPD W3C Logging BoF Exploit
6640| [1327] FTGate4 Groupware Mail Server 4.1 (imapd) Remote Buffer Overflow PoC
6641| [1151] MDaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow Exploit
6642| [1124] IPSwitch IMail Server <= 8.15 IMAPD Remote Root Exploit
6643| [915] MailEnable Enterprise 1.x Imapd Remote Exploit
6644| [903] Cyrus imapd 2.2.4 - 2.2.8 (imapmagicplus) Remote Exploit
6645| [340] Linux imapd Remote Overflow File Retrieve Exploit
6646|
6647| OpenVAS (Nessus) - http://www.openvas.org:
6648| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
6649| [901025] Dovecot Version Detection
6650| [881425] CentOS Update for cyrus-imapd CESA-2011:1508 centos5 x86_64
6651| [881403] CentOS Update for cyrus-imapd CESA-2011:0859 centos5 x86_64
6652| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
6653| [881397] CentOS Update for cyrus-imapd CESA-2011:1317 centos4 x86_64
6654| [881370] CentOS Update for cyrus-imapd CESA-2011:1508 centos4 x86_64
6655| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
6656| [881318] CentOS Update for cyrus-imapd CESA-2011:0859 centos4 x86_64
6657| [881255] CentOS Update for cyrus-imapd CESA-2011:1317 centos5 x86_64
6658| [881050] CentOS Update for cyrus-imapd CESA-2011:1508 centos5 i386
6659| [881049] CentOS Update for cyrus-imapd CESA-2011:1508 centos4 i386
6660| [881007] CentOS Update for cyrus-imapd CESA-2011:1317 centos5 i386
6661| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
6662| [880978] CentOS Update for cyrus-imapd CESA-2011:1317 centos4 i386
6663| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
6664| [880958] CentOS Update for cyrus-imapd CESA-2011:0859 centos4 i386
6665| [880905] CentOS Update for cyrus-imapd CESA-2009:1459 centos4 i386
6666| [880864] CentOS Update for cyrus-imapd CESA-2009:1459 centos5 i386
6667| [880826] CentOS Update for cyrus-imapd CESA-2009:1116 centos5 i386
6668| [880536] CentOS Update for cyrus-imapd CESA-2011:0859 centos5 i386
6669| [870607] RedHat Update for dovecot RHSA-2011:0600-01
6670| [870520] RedHat Update for cyrus-imapd RHSA-2011:1508-01
6671| [870489] RedHat Update for cyrus-imapd RHSA-2011:1317-01
6672| [870471] RedHat Update for dovecot RHSA-2011:1187-01
6673| [870443] RedHat Update for cyrus-imapd RHSA-2011:0859-01
6674| [870153] RedHat Update for dovecot RHSA-2008:0297-02
6675| [864075] Fedora Update for cyrus-imapd FEDORA-2011-13832
6676| [863585] Fedora Update for cyrus-imapd FEDORA-2011-13869
6677| [863579] Fedora Update for cyrus-imapd FEDORA-2011-13860
6678| [863281] Fedora Update for cyrus-imapd FEDORA-2011-7193
6679| [863273] Fedora Update for cyrus-imapd FEDORA-2011-7217
6680| [863272] Fedora Update for dovecot FEDORA-2011-7612
6681| [863115] Fedora Update for dovecot FEDORA-2011-7258
6682| [861525] Fedora Update for dovecot FEDORA-2007-664
6683| [861394] Fedora Update for dovecot FEDORA-2007-493
6684| [861333] Fedora Update for dovecot FEDORA-2007-1485
6685| [860845] Fedora Update for dovecot FEDORA-2008-9202
6686| [860663] Fedora Update for dovecot FEDORA-2008-2475
6687| [860169] Fedora Update for dovecot FEDORA-2008-2464
6688| [860089] Fedora Update for dovecot FEDORA-2008-9232
6689| [840950] Ubuntu Update for dovecot USN-1295-1
6690| [840668] Ubuntu Update for dovecot USN-1143-1
6691| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
6692| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
6693| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
6694| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
6695| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
6696| [831590] Mandriva Update for cyrus-imapd MDVSA-2012:037 (cyrus-imapd)
6697| [831468] Mandriva Update for cyrus-imapd MDVSA-2011:149 (cyrus-imapd)
6698| [831410] Mandriva Update for cyrus-imapd MDVSA-2011:100 (cyrus-imapd)
6699| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
6700| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
6701| [831207] Mandriva Update for cyrus-imapd MDVA-2010:208 (cyrus-imapd)
6702| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
6703| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
6704| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
6705| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
6706| [800149] UW-imapd tmail and dmail BOF Vulnerabilities (Linux)
6707| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
6708| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
6709| [70696] Debian Security Advisory DSA 2377-1 (cyrus-imapd-2.2)
6710| [70407] Debian Security Advisory DSA 2318-1 (cyrus-imapd-2.2)
6711| [70259] FreeBSD Ports: dovecot
6712| [69965] Debian Security Advisory DSA 2258-1 (kolab-cyrus-imapd)
6713| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
6714| [69740] Debian Security Advisory DSA 2242-1 (cyrus-imapd-2.2)
6715| [66522] FreeBSD Ports: dovecot
6716| [66416] Mandriva Security Advisory MDVSA-2009:229-1 (cyrus-imapd)
6717| [66233] SLES10: Security update for Cyrus IMAPD
6718| [66226] SLES11: Security update for Cyrus IMAPD
6719| [66222] SLES9: Security update for Cyrus IMAPD
6720| [65938] SLES10: Security update for Cyrus IMAPD
6721| [65723] SLES11: Security update for Cyrus IMAPD
6722| [65523] SLES9: Security update for Cyrus IMAPD
6723| [65479] SLES9: Security update for cyrus-imapd
6724| [65094] SLES9: Security update for cyrus-imapd
6725| [65010] Ubuntu USN-838-1 (dovecot)
6726| [64989] CentOS Security Advisory CESA-2009:1459 (cyrus-imapd)
6727| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
6728| [64977] Debian Security Advisory DSA 1893-1 (cyrus-imapd-2.2 kolab-cyrus-imapd)
6729| [64965] Fedora Core 11 FEDORA-2009-9901 (cyrus-imapd)
6730| [64963] Fedora Core 10 FEDORA-2009-9869 (cyrus-imapd)
6731| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
6732| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
6733| [64898] FreeBSD Ports: cyrus-imapd
6734| [64864] Debian Security Advisory DSA 1881-1 (cyrus-imapd-2.2)
6735| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
6736| [64847] Fedora Core 10 FEDORA-2009-9428 (cyrus-imapd)
6737| [64846] Fedora Core 11 FEDORA-2009-9417 (cyrus-imapd)
6738| [64838] Mandrake Security Advisory MDVSA-2009:229 (cyrus-imapd)
6739| [64271] CentOS Security Advisory CESA-2009:1116 (cyrus-imapd)
6740| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
6741| [62854] FreeBSD Ports: dovecot-managesieve
6742| [61916] FreeBSD Ports: dovecot
6743| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
6744| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
6745| [60528] FreeBSD Ports: dovecot
6746| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
6747| [60089] FreeBSD Ports: dovecot
6748| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
6749| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
6750| [55807] Slackware Advisory SSA:2005-310-06 imapd
6751| [54861] Gentoo Security Advisory GLSA 200502-29 (cyrus-imapd)
6752| [54755] Gentoo Security Advisory GLSA 200411-34 (cyrus-imapd)
6753| [53739] Debian Security Advisory DSA 215-1 (cyrus-imapd)
6754| [53288] Debian Security Advisory DSA 597-1 (cyrus-imapd)
6755| [52297] FreeBSD Ports: cyrus-imapd
6756| [52296] FreeBSD Ports: cyrus-imapd
6757| [52295] FreeBSD Ports: cyrus-imapd
6758| [52294] FreeBSD Ports: cyrus-imapd
6759| [52172] FreeBSD Ports: cyrus-imapd
6760|
6761| SecurityTracker - https://www.securitytracker.com:
6762| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
6763| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
6764| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
6765| [1013278] Cyrus IMAPd Buffer Overflows in Annotate Extension, Cached Header, and Fetchnews May Let Remote Users Execute Arbitrary Code
6766|
6767| OSVDB - http://www.osvdb.org:
6768| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
6769| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
6770| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
6771| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
6772| [78304] Eudora WorldMail imapd SEH LIST Command Parsing Remote Overflow
6773| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
6774| [75445] Cyrus IMAP Server imapd index.c index_get_ids Function References Header NULL Dereference Remote DoS
6775| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
6776| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
6777| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
6778| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
6779| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
6780| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
6781| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
6782| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
6783| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
6784| [66113] Dovecot Mail Root Directory Creation Permission Weakness
6785| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
6786| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
6787| [66110] Dovecot Multiple Unspecified Buffer Overflows
6788| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
6789| [64783] Dovecot E-mail Message Header Unspecified DoS
6790| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
6791| [62796] Dovecot mbox Format Email Header Handling DoS
6792| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
6793| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
6794| [57843] Cyrus IMAP Server (cyrus-imapd) SIEVE Script Component (sieve/script.c) Crafted Script Handling Overflow
6795| [57681] UoW imap Server (uw-imapd) Arbitrary Remote File Access
6796| [52906] UW-imapd c-client Initial Request Remote Format String
6797| [52905] UW-imapd c-client Library RFC822BUFFER Routines rfc822_output_char Function Off-by-one
6798| [52456] UW-imapd on Debian Linux LOGIN Command Remote DoS
6799| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
6800| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
6801| [49485] UW-imapd dmail Utility Mailbox Name Handling Overflow
6802| [49484] UW-imapd tmail Utility Mailbox Name Handling Overflow
6803| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
6804| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
6805| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
6806| [43137] Dovecot mail_extra_groups Symlink File Manipulation
6807| [42979] Dovecot passdbs Argument Injection Authentication Bypass
6808| [42004] Perdition Mail Retrieval Proxy IMAPD IMAP Tag Remote Format String Arbitrary Code Execution
6809| [39876] Dovecot LDAP Auth Cache Security Bypass
6810| [39670] Mercury Mail Transport System IMAPD SEARCH Command Remote Overflow
6811| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
6812| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
6813| [31362] Novell NetMail IMAP Daemon (IMAPD) APPEND Command Remote Overflow
6814| [31361] Novell NetMail IMAP Daemon (IMAPD) APPEND Command DoS
6815| [31360] Novell NetMail IMAP Daemon (IMAPD) SUBSCRIBE Command Remote Overflow
6816| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
6817| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
6818| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
6819| [23281] Dovecot imap/pop3-login dovecot-auth DoS
6820| [23280] Dovecot Malformed APPEND Command DoS
6821| [18179] HP Tru64 UNIX imapd NLSPATH Environment Variable Local Overflow
6822| [13242] UW-imapd CRAM-MD5 Authentication Bypass
6823| [12385] Novell NetMail IMAPD 101_mEna Script Remote Overflow
6824| [12042] UoW imapd Multiple Unspecified Overflows
6825| [12037] UoW imapd (UW-IMAP) Multiple Command Remote Overflows
6826| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
6827| [911] UoW imapd AUTHENTICATE Command Remote Overflow
6828| [790] UoW imap Server (uw-imapd) BODY Request Remote Overflow
6829| [519] UoW imapd SIGABRT Signal Forced Crash Information Disclosure
6830|_
6831443/tcp closed https
6832465/tcp open ssl/smtp Exim smtpd 4.92
6833| vulscan: VulDB - https://vuldb.com:
6834| [141327] Exim up to 4.92.1 Backslash privilege escalation
6835| [138827] Exim up to 4.92 Expansion Code Execution
6836| [135932] Exim up to 4.92 privilege escalation
6837| [113048] Exim up to 4.90 SMTP Listener Message memory corruption
6838|
6839| MITRE CVE - https://cve.mitre.org:
6840| [CVE-2012-5671] Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.
6841| [CVE-2012-0478] The texImage2D implementation in the WebGL subsystem in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 does not properly restrict JSVAL_TO_OBJECT casts, which might allow remote attackers to execute arbitrary code via a crafted web page.
6842| [CVE-2011-1764] Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character.
6843| [CVE-2011-1407] The DKIM implementation in Exim 4.7x before 4.76 permits matching for DKIM identities to apply to lookup items, instead of only strings, which allows remote attackers to execute arbitrary code or access a filesystem via a crafted identity.
6844| [CVE-2011-0017] The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.
6845| [CVE-2010-4345] Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
6846| [CVE-2010-4344] Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.
6847| [CVE-2010-2024] transports/appendfile.c in Exim before 4.72, when MBX locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/.
6848| [CVE-2010-2023] transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user's file.
6849| [CVE-2006-1251] Argument injection vulnerability in greylistclean.cron in sa-exim 4.2 allows remote attackers to delete arbitrary files via an email with a To field that contains a filename separated by whitespace, which is not quoted when greylistclean.cron provides the argument to the rm command.
6850| [CVE-2005-0022] Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.
6851| [CVE-2005-0021] Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function.
6852| [CVE-2004-0400] Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.
6853| [CVE-2004-0399] Stack-based buffer overflow in Exim 3.35, and other versions before 4, when the sender_verify option is true, allows remote attackers to cause a denial of service and possibly execute arbitrary code during sender verification.
6854| [CVE-2003-0743] Heap-based buffer overflow in smtp_in.c for Exim 3 (exim3) before 3.36 and Exim 4 (exim4) before 4.21 may allow remote attackers to execute arbitrary code via an invalid (1) HELO or (2) EHLO argument with a large number of spaces followed by a NULL character and a newline, which is not properly trimmed before the "(no argument given)" string is appended to the buffer.
6855| [CVE-2002-1381] Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
6856|
6857| SecurityFocus - https://www.securityfocus.com/bid/:
6858| [103049] Exim 'base64d()' Function Buffer Overflow Vulnerability
6859| [99252] Exim CVE-2017-1000369 Local Privilege Escalation Vulnerability
6860| [94947] Exim CVE-2016-9963 Unspecified Information Disclosure Vulnerability
6861| [84132] Exim CVE-2016-1531 Local Privilege Escalation Vulnerability
6862| [68857] Exim CVE-2014-2972 Local Privilege Escalation Vulnerability
6863| [67695] Exim 'dmarc.c' Remote Code Execution Vulnerability
6864| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
6865| [56285] Exim DKIM DNS Decoding CVE-2012-5671 Remote Buffer Overflow Vulnerability
6866| [47836] Exim DKIM CVE-2011-1407 Remote Code Execution Vulnerability
6867| [47736] Exim 'dkim_exim_verify_finish()' Remote Format String Vulnerability
6868| [46065] Exim 'log.c' Local Privilege Escalation Vulnerability
6869| [45341] Exim ALT_CONFIG_ROOT_ONLY 'exim' User Local Privilege Escalation Vulnerability
6870| [45308] Exim Crafted Header Remote Code Execution Vulnerability
6871| [40454] Exim MBX Locking Insecure Temporary File Creation Vulnerability
6872| [40451] Exim Sticky Mail Directory Local Privilege Escalation Vulnerability
6873| [36181] ikiwiki 'teximg' Plugin Insecure TeX Commands Information Disclosure Vulnerability
6874| [23977] Exim SpamAssassin Reply Remote Buffer Overflow Vulnerability
6875| [17110] sa-exim Unauthorized File Access Vulnerability
6876| [12268] Exim IP Address Command Line Argument Local Buffer Overflow Vulnerability
6877| [12188] Exim SPA Authentication Remote Buffer Overflow Vulnerability
6878| [12185] Exim Illegal IPv6 Address Buffer Overflow Vulnerability
6879| [10291] Exim Header Syntax Checking Remote Stack Buffer Overrun Vulnerability
6880| [10290] Exim Sender Verification Remote Stack Buffer Overrun Vulnerability
6881| [8518] Exim EHLO/HELO Remote Heap Corruption Vulnerability
6882| [6314] Exim Internet Mailer Format String Vulnerability
6883| [4096] Exim Configuration File Argument Command Line Buffer Overflow Vulnerability
6884| [3728] Exim Pipe Hostname Arbitrary Command Execution Vulnerability
6885| [2828] Exim Format String Vulnerability
6886| [1859] Exim Buffer Overflow Vulnerability
6887|
6888| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6889| [84758] Exim sender_address parameter command execution
6890| [84015] Exim command execution
6891| [80186] Mozilla Firefox, Thunderbird, and SeaMonkey copyTexImage2D code execution
6892| [80184] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D calls code execution
6893| [79615] Exim dkim_exim_query_dns_txt() buffer overflow
6894| [75155] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D denial of service
6895| [67455] Exim DKIM processing code execution
6896| [67299] Exim dkim_exim_verify_finish() format string
6897| [65028] Exim open_log privilege escalation
6898| [63967] Exim config file privilege escalation
6899| [63960] Exim header buffer overflow
6900| [59043] Exim mail directory privilege escalation
6901| [59042] Exim MBX symlink
6902| [52922] ikiwiki teximg plugin information disclosure
6903| [34265] Exim spamd buffer overflow
6904| [25286] Sa-exim greylistclean.cron file deletion
6905| [22687] RHSA-2005:025 updates for exim not installed
6906| [18901] Exim dns_build_reverse buffer overflow
6907| [18764] Exim spa_base64_to_bits function buffer overflow
6908| [18763] Exim host_aton buffer overflow
6909| [16079] Exim require_verify buffer overflow
6910| [16077] Exim header_check_syntax buffer overflow
6911| [16075] Exim sender_verify buffer overflow
6912| [13067] Exim HELO or EHLO command heap overflow
6913| [10761] Exim daemon.c format string
6914| [8194] Exim configuration file -c command-line argument buffer overflow
6915| [7738] Exim allows attacker to hide commands in localhost names using pipes
6916| [6671] Exim "
6917| [1893] Exim MTA allows local users to gain root privileges
6918|
6919| Exploit-DB - https://www.exploit-db.com:
6920| [16925] Exim4 <= 4.69 - string_format Function Heap Buffer Overflow
6921| [15725] Exim 4.63 Remote Root Exploit
6922| [1009] Exim <= 4.41 dns_build_reverse Local Exploit
6923| [812] Exim <= 4.43 auth_spa_server() Remote PoC Exploit
6924| [796] Exim <= 4.42 Local Root Exploit
6925| [756] Exim <= 4.41 dns_build_reverse Local Exploit PoC
6926|
6927| OpenVAS (Nessus) - http://www.openvas.org:
6928| [100663] Exim < 4.72 RC2 Multiple Vulnerabilities
6929|
6930| SecurityTracker - https://www.securitytracker.com:
6931| [1025539] Exim DKIM Processing Flaw Lets Remote Users Execute Arbitrary Code
6932| [1025504] Exim DKIM Signature Format String Flaw Lets Remote Users Execute Arbitrary Code
6933| [1024859] Exim Configuration File Capability Lets Local Users Gain Elevated Privileges
6934| [1024858] Exim Buffer Overfow in string_format() Lets Remote Users Execute Arbitrary Code
6935| [1012904] Exim Buffer Overflow in dns_build_reverse() Lets Local Users Obtain Elevated Privileges
6936| [1012771] Exim Buffer Overflows in host_aton() and spa_base64_to_bits() May Let Local Users Gain Elevated Privileges
6937| [1010081] Exim Buffer Overflows in 'accept.c' and 'verify.c' Let Remote Users Execute Arbitrary Code
6938| [1007609] Exim Heap Overflow in 'smtp_in.c' May Allow Remote Arbitrary Code Execution
6939| [1005756] Exim Mail Server Format String Bug Lets Local Exim Administrators Execute Arbitrary Code With Root Privileges
6940| [1003547] Potential Bug in Exim Mail Server May Let Local Users Execute Code With Root Privileges
6941| [1003014] Exim Mail Server Pipe Address Validation Error May Let Remote Users Execute Arbitrary Code With Root Privileges in a Certain Configuration
6942| [1001694] Exim Mail Server May Allow Remote Users to Execute Arbitrary Code with Root-Level Privileges on the Server
6943|
6944| OSVDB - http://www.osvdb.org:
6945| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
6946| [87599] Mozilla Multiple Product copyTexImage2D Call Image Dimension Handling Memory Corruption
6947| [87581] Mozilla Multiple Product texImage2D Call Handling Memory Corruption
6948| [86616] Exim src/dkim.c dkim_exim_query_dns_txt() Function DNS Record Parsing Remote Overflow
6949| [81523] Mozilla Multiple Product WebGL texImage2D() Function JSVAL_TO_OBJECT Remote Code Execution
6950| [72642] Exim DKIM Identity Lookup Item Remote Code Execution
6951| [72156] Exim src/dkim.c dkim_exim_verify_finish() Function DKIM-Signature Header Format String
6952| [70696] Exim log.c open_log() Function Local Privilege Escalation
6953| [69860] Exim exim User Account Configuration File Directive Local Privilege Escalation
6954| [69685] Exim string_format Function Remote Overflow
6955| [65159] Exim transports/appendfile.c MBX Locking Race Condition Permission Modification
6956| [65158] Exim transports/appendfile.c Hardlink Handling Arbitrary File Overwrite
6957| [57575] teximg Plugin for ikiwiki TEX Command Arbitrary File Local Disclosure
6958| [23849] sa-exim greylistclean.cron Arbitrary File Deletion
6959| [13073] Oracle Database Server Advanced Queuing Component dbms_transform_eximp Unspecified Security Issue
6960| [12946] Exim -bh Command Line Option dns_build_reverse Function Local Overflow
6961| [12727] Exim SPA Authentication spa_base64_to_bits Function Remote Overflow
6962| [12726] Exim -be Command Line Option host_aton Function Local Overflow
6963| [10877] Exim smtp_in.c HELO/EHLO Remote Overflow
6964| [10360] Exim daemon.c pid_file_path Variable Manipulation Arbitrary Command Execution
6965| [10032] libXpm CreateXImage Function Integer Overflow
6966| [7160] Exim .forward :include: Option Privilege Escalation
6967| [6479] Vexim COOKIE Authentication Credential Disclosure
6968| [6478] Vexim Multiple Parameter SQL Injection
6969| [5930] Exim Parenthesis File Name Filter Bypass
6970| [5897] Exim header_syntax Function Remote Overflow
6971| [5896] Exim sender_verify Function Remote Overflow
6972| [5530] Exim Localhost Name Arbitrary Command Execution
6973| [5330] Exim Configuration File Variable Overflow
6974| [1855] Exim Batched SMTP Mail Header Format String
6975|_
6976587/tcp open smtp Exim smtpd 4.92
6977| vulscan: VulDB - https://vuldb.com:
6978| [141327] Exim up to 4.92.1 Backslash privilege escalation
6979| [138827] Exim up to 4.92 Expansion Code Execution
6980| [135932] Exim up to 4.92 privilege escalation
6981| [113048] Exim up to 4.90 SMTP Listener Message memory corruption
6982|
6983| MITRE CVE - https://cve.mitre.org:
6984| [CVE-2012-5671] Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.
6985| [CVE-2012-0478] The texImage2D implementation in the WebGL subsystem in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 does not properly restrict JSVAL_TO_OBJECT casts, which might allow remote attackers to execute arbitrary code via a crafted web page.
6986| [CVE-2011-1764] Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character.
6987| [CVE-2011-1407] The DKIM implementation in Exim 4.7x before 4.76 permits matching for DKIM identities to apply to lookup items, instead of only strings, which allows remote attackers to execute arbitrary code or access a filesystem via a crafted identity.
6988| [CVE-2011-0017] The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.
6989| [CVE-2010-4345] Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
6990| [CVE-2010-4344] Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.
6991| [CVE-2010-2024] transports/appendfile.c in Exim before 4.72, when MBX locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/.
6992| [CVE-2010-2023] transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user's file.
6993| [CVE-2006-1251] Argument injection vulnerability in greylistclean.cron in sa-exim 4.2 allows remote attackers to delete arbitrary files via an email with a To field that contains a filename separated by whitespace, which is not quoted when greylistclean.cron provides the argument to the rm command.
6994| [CVE-2005-0022] Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.
6995| [CVE-2005-0021] Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function.
6996| [CVE-2004-0400] Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.
6997| [CVE-2004-0399] Stack-based buffer overflow in Exim 3.35, and other versions before 4, when the sender_verify option is true, allows remote attackers to cause a denial of service and possibly execute arbitrary code during sender verification.
6998| [CVE-2003-0743] Heap-based buffer overflow in smtp_in.c for Exim 3 (exim3) before 3.36 and Exim 4 (exim4) before 4.21 may allow remote attackers to execute arbitrary code via an invalid (1) HELO or (2) EHLO argument with a large number of spaces followed by a NULL character and a newline, which is not properly trimmed before the "(no argument given)" string is appended to the buffer.
6999| [CVE-2002-1381] Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
7000|
7001| SecurityFocus - https://www.securityfocus.com/bid/:
7002| [103049] Exim 'base64d()' Function Buffer Overflow Vulnerability
7003| [99252] Exim CVE-2017-1000369 Local Privilege Escalation Vulnerability
7004| [94947] Exim CVE-2016-9963 Unspecified Information Disclosure Vulnerability
7005| [84132] Exim CVE-2016-1531 Local Privilege Escalation Vulnerability
7006| [68857] Exim CVE-2014-2972 Local Privilege Escalation Vulnerability
7007| [67695] Exim 'dmarc.c' Remote Code Execution Vulnerability
7008| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
7009| [56285] Exim DKIM DNS Decoding CVE-2012-5671 Remote Buffer Overflow Vulnerability
7010| [47836] Exim DKIM CVE-2011-1407 Remote Code Execution Vulnerability
7011| [47736] Exim 'dkim_exim_verify_finish()' Remote Format String Vulnerability
7012| [46065] Exim 'log.c' Local Privilege Escalation Vulnerability
7013| [45341] Exim ALT_CONFIG_ROOT_ONLY 'exim' User Local Privilege Escalation Vulnerability
7014| [45308] Exim Crafted Header Remote Code Execution Vulnerability
7015| [40454] Exim MBX Locking Insecure Temporary File Creation Vulnerability
7016| [40451] Exim Sticky Mail Directory Local Privilege Escalation Vulnerability
7017| [36181] ikiwiki 'teximg' Plugin Insecure TeX Commands Information Disclosure Vulnerability
7018| [23977] Exim SpamAssassin Reply Remote Buffer Overflow Vulnerability
7019| [17110] sa-exim Unauthorized File Access Vulnerability
7020| [12268] Exim IP Address Command Line Argument Local Buffer Overflow Vulnerability
7021| [12188] Exim SPA Authentication Remote Buffer Overflow Vulnerability
7022| [12185] Exim Illegal IPv6 Address Buffer Overflow Vulnerability
7023| [10291] Exim Header Syntax Checking Remote Stack Buffer Overrun Vulnerability
7024| [10290] Exim Sender Verification Remote Stack Buffer Overrun Vulnerability
7025| [8518] Exim EHLO/HELO Remote Heap Corruption Vulnerability
7026| [6314] Exim Internet Mailer Format String Vulnerability
7027| [4096] Exim Configuration File Argument Command Line Buffer Overflow Vulnerability
7028| [3728] Exim Pipe Hostname Arbitrary Command Execution Vulnerability
7029| [2828] Exim Format String Vulnerability
7030| [1859] Exim Buffer Overflow Vulnerability
7031|
7032| IBM X-Force - https://exchange.xforce.ibmcloud.com:
7033| [84758] Exim sender_address parameter command execution
7034| [84015] Exim command execution
7035| [80186] Mozilla Firefox, Thunderbird, and SeaMonkey copyTexImage2D code execution
7036| [80184] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D calls code execution
7037| [79615] Exim dkim_exim_query_dns_txt() buffer overflow
7038| [75155] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D denial of service
7039| [67455] Exim DKIM processing code execution
7040| [67299] Exim dkim_exim_verify_finish() format string
7041| [65028] Exim open_log privilege escalation
7042| [63967] Exim config file privilege escalation
7043| [63960] Exim header buffer overflow
7044| [59043] Exim mail directory privilege escalation
7045| [59042] Exim MBX symlink
7046| [52922] ikiwiki teximg plugin information disclosure
7047| [34265] Exim spamd buffer overflow
7048| [25286] Sa-exim greylistclean.cron file deletion
7049| [22687] RHSA-2005:025 updates for exim not installed
7050| [18901] Exim dns_build_reverse buffer overflow
7051| [18764] Exim spa_base64_to_bits function buffer overflow
7052| [18763] Exim host_aton buffer overflow
7053| [16079] Exim require_verify buffer overflow
7054| [16077] Exim header_check_syntax buffer overflow
7055| [16075] Exim sender_verify buffer overflow
7056| [13067] Exim HELO or EHLO command heap overflow
7057| [10761] Exim daemon.c format string
7058| [8194] Exim configuration file -c command-line argument buffer overflow
7059| [7738] Exim allows attacker to hide commands in localhost names using pipes
7060| [6671] Exim "
7061| [1893] Exim MTA allows local users to gain root privileges
7062|
7063| Exploit-DB - https://www.exploit-db.com:
7064| [16925] Exim4 <= 4.69 - string_format Function Heap Buffer Overflow
7065| [15725] Exim 4.63 Remote Root Exploit
7066| [1009] Exim <= 4.41 dns_build_reverse Local Exploit
7067| [812] Exim <= 4.43 auth_spa_server() Remote PoC Exploit
7068| [796] Exim <= 4.42 Local Root Exploit
7069| [756] Exim <= 4.41 dns_build_reverse Local Exploit PoC
7070|
7071| OpenVAS (Nessus) - http://www.openvas.org:
7072| [100663] Exim < 4.72 RC2 Multiple Vulnerabilities
7073|
7074| SecurityTracker - https://www.securitytracker.com:
7075| [1025539] Exim DKIM Processing Flaw Lets Remote Users Execute Arbitrary Code
7076| [1025504] Exim DKIM Signature Format String Flaw Lets Remote Users Execute Arbitrary Code
7077| [1024859] Exim Configuration File Capability Lets Local Users Gain Elevated Privileges
7078| [1024858] Exim Buffer Overfow in string_format() Lets Remote Users Execute Arbitrary Code
7079| [1012904] Exim Buffer Overflow in dns_build_reverse() Lets Local Users Obtain Elevated Privileges
7080| [1012771] Exim Buffer Overflows in host_aton() and spa_base64_to_bits() May Let Local Users Gain Elevated Privileges
7081| [1010081] Exim Buffer Overflows in 'accept.c' and 'verify.c' Let Remote Users Execute Arbitrary Code
7082| [1007609] Exim Heap Overflow in 'smtp_in.c' May Allow Remote Arbitrary Code Execution
7083| [1005756] Exim Mail Server Format String Bug Lets Local Exim Administrators Execute Arbitrary Code With Root Privileges
7084| [1003547] Potential Bug in Exim Mail Server May Let Local Users Execute Code With Root Privileges
7085| [1003014] Exim Mail Server Pipe Address Validation Error May Let Remote Users Execute Arbitrary Code With Root Privileges in a Certain Configuration
7086| [1001694] Exim Mail Server May Allow Remote Users to Execute Arbitrary Code with Root-Level Privileges on the Server
7087|
7088| OSVDB - http://www.osvdb.org:
7089| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
7090| [87599] Mozilla Multiple Product copyTexImage2D Call Image Dimension Handling Memory Corruption
7091| [87581] Mozilla Multiple Product texImage2D Call Handling Memory Corruption
7092| [86616] Exim src/dkim.c dkim_exim_query_dns_txt() Function DNS Record Parsing Remote Overflow
7093| [81523] Mozilla Multiple Product WebGL texImage2D() Function JSVAL_TO_OBJECT Remote Code Execution
7094| [72642] Exim DKIM Identity Lookup Item Remote Code Execution
7095| [72156] Exim src/dkim.c dkim_exim_verify_finish() Function DKIM-Signature Header Format String
7096| [70696] Exim log.c open_log() Function Local Privilege Escalation
7097| [69860] Exim exim User Account Configuration File Directive Local Privilege Escalation
7098| [69685] Exim string_format Function Remote Overflow
7099| [65159] Exim transports/appendfile.c MBX Locking Race Condition Permission Modification
7100| [65158] Exim transports/appendfile.c Hardlink Handling Arbitrary File Overwrite
7101| [57575] teximg Plugin for ikiwiki TEX Command Arbitrary File Local Disclosure
7102| [23849] sa-exim greylistclean.cron Arbitrary File Deletion
7103| [13073] Oracle Database Server Advanced Queuing Component dbms_transform_eximp Unspecified Security Issue
7104| [12946] Exim -bh Command Line Option dns_build_reverse Function Local Overflow
7105| [12727] Exim SPA Authentication spa_base64_to_bits Function Remote Overflow
7106| [12726] Exim -be Command Line Option host_aton Function Local Overflow
7107| [10877] Exim smtp_in.c HELO/EHLO Remote Overflow
7108| [10360] Exim daemon.c pid_file_path Variable Manipulation Arbitrary Command Execution
7109| [10032] libXpm CreateXImage Function Integer Overflow
7110| [7160] Exim .forward :include: Option Privilege Escalation
7111| [6479] Vexim COOKIE Authentication Credential Disclosure
7112| [6478] Vexim Multiple Parameter SQL Injection
7113| [5930] Exim Parenthesis File Name Filter Bypass
7114| [5897] Exim header_syntax Function Remote Overflow
7115| [5896] Exim sender_verify Function Remote Overflow
7116| [5530] Exim Localhost Name Arbitrary Command Execution
7117| [5330] Exim Configuration File Variable Overflow
7118| [1855] Exim Batched SMTP Mail Header Format String
7119|_
7120993/tcp open ssl/imaps?
7121995/tcp open ssl/pop3s?
71221500/tcp open ssl/vlsi-lm?
7123| fingerprint-strings:
7124| FourOhFourRequest:
7125| HTTP/1.0 404 Not Found
7126| Content-Length: 2715
7127| Date: Fri, 28 Feb 2020 04:09:24 GMT
7128| <!DOCTYPE html>
7129| <html>
7130| <head>
7131| <title>404 Not Found</title>
7132| <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
7133| <style>
7134| body {
7135| font-weight: normal;
7136| font-size: 11px;
7137| font-family: Arial;
7138| .fatal-error {
7139| width: 270px;
7140| height: 270px;
7141| margin: 0 auto;
7142| position: absolute;
7143| top: 50%;
7144| left: 50%;
7145| margin-left: -135px;
7146| margin-top: -135px;
7147| .fatal-error-round {
7148| width: 270px;
7149| height: 270px;
7150| background: #FF8356;
7151| border-radius: 270px;
7152| .fatal-error-inner {
7153| padding-top: 23px;
7154| text-align: center;
7155| .fatal-error-sign {
7156| margin-bottom: 10px;
7157| .fatal-error-sign-top {
7158| background: #FFF;
7159| width: 14px;
7160| height: 7px;
7161| border-radius: 28px
7162| GetRequest:
7163| HTTP/1.0 200 OK
7164| Connection: close
7165| Content-Type: text/html; charset=UTF-8
7166| Pragma: no-cache
7167| Cache-Control: no-cache
7168| Expires: 0
7169| Set-Cookie: ispmgrses5=; path=/; HttpOnly; expires=Sat, 27 Feb 2021 07:08:42 MSK; Secure
7170| Set-Cookie: ispmgrlang5=orion:en; path=/; expires=Sat, 27 Feb 2021 07:08:42 MSK; Secure
7171| X-Frame-Options: SAMEORIGIN
7172| Date: Fri, 28 Feb 2020 04:08:42 GMT
7173| <!DOCTYPE html><html>
7174| <head>
7175| <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
7176| <title>Authorization</title>
7177| <link rel="stylesheet" href="/manimg/orion/default/main.css" type="text/css">
7178| <link rel="shortcut icon" href="/manimg/orion/default/favicon-ispmgr.ico" type="image/x-icon">
7179| <link rel="mask-icon" href="https:///manimg/common/maskicon/ispmgr.svg" color="#000000">
7180| <meta name="viewport" content="width=device-width, initial-scale=1.0, minimum-scale=1.0, maximum-scale=1.0, user-scalable=yes">
7181| </head
7182| HTTPOptions:
7183| HTTP/1.0 200 OK
7184| Content-Length: 0
7185| Date: Fri, 28 Feb 2020 04:08:43 GMT
7186| RTSPRequest:
7187| HTTP/1.1 200 OK
7188| Content-Length: 0
7189|_ Date: Fri, 28 Feb 2020 04:08:44 GMT
71903306/tcp closed mysql
71915432/tcp closed postgresql
71928085/tcp open http Apache httpd 2.4.6 ((CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.4.16)
7193|_http-server-header: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.4.16
7194| vulscan: VulDB - https://vuldb.com:
7195| [136374] Apache HTTP Server up to 2.4.38 Slash Regular Expression unknown vulnerability
7196| [136373] Apache HTTP Server 2.4.34/2.4.35/2.4.36/2.4.37/2.4.38 HTTP2 Request Crash denial of service
7197| [136372] Apache HTTP Server up to 2.4.38 HTTP2 Request unknown vulnerability
7198| [133112] Apache HTTP Server up to 2.4.38 mod_auth_digest race condition privilege escalation
7199| [133111] Apache HTTP Server 2.4.37/2.4.38 mod_ssl Bypass privilege escalation
7200| [130341] Apache HTTP Server 2.4.37 mod_ssl Loop denial of service
7201| [130330] Apache HTTP Server up to 2.4.37 mod_session Expired privilege escalation
7202| [130329] Apache HTTP Server 2.4.37 mod_http2 Slowloris denial of service
7203| [124447] Apache HTTP Server up to 2.4.34 SETTINGS Frame denial of service
7204| [121910] Apache HTTP Server 2.4.33 mod_md HTTP Requests denial of service
7205| [122569] Apache HTTP Server up to 2.4.33 HTTP2 Request denial of service
7206| [115061] Apache HTTP Server up to 2.4.29 HTTP Digest Authentication Challenge HTTP Requests Replay privilege escalation
7207| [115060] Apache HTTP Server up to 2.4.29 mod_cache_socache Request Header Crash denial of service
7208| [115059] Apache HTTP Server up to 2.4.29 HTTP2 NULL Pointer Dereference denial of service
7209| [115058] Apache HTTP Server up to 2.4.29 HTTP Header Crash denial of service
7210| [115057] Apache HTTP Server up to 2.4.29 mod_session Variable Name Cache privilege escalation
7211| [115039] Apache HTTP Server up to 2.4.29 FilesMatch File Upload privilege escalation
7212| [114258] Apache HTTP Server up to 2.4.22 mod_cluster Segmentation Fault denial of service
7213| [104986] Apache CXF 2.4.5/2.5.1 WS-SP UsernameToken Policy SOAP Request weak authentication
7214| [103521] Apache HTTP Server 2.4.26 HTTP2 Free memory corruption
7215| [94627] Apache HTTP Server up to 2.4.24 mod_auth_digest Crash denial of service
7216| [94626] Apache HTTP Server up to 2.4.24 mod_session_crypto Padding weak encryption
7217| [94625] Apache HTTP Server up to 2.4.24 Response Split privilege escalation
7218| [93958] Apache HTTP Server up to 2.4.23 mod_http2 h2_stream.c denial of service
7219| [89669] Apache HTTP Server up to 2.4.23 RFC 3875 Namespace Conflict Environment Variable Open Redirect
7220| [88747] Apache HTTP Server 2.4.17/2.4.18 mod_http2 denial of service
7221| [88667] Apache HTTP Server up to 2.4.20 mod_http2 Certificate weak authentication
7222| [77083] Apache Groovy up to 2.4.3 MethodClosure.java MethodClosure memory corruption
7223| [76733] Apache HTTP Server 2.4.7/2.4.8/2.4.9/2.4.10/2.4.12 ap_some_auth_required unknown vulnerability
7224| [76732] Apache HTTP Server 2.4.7/2.4.8/2.4.9/2.4.10/2.4.12 Request apr_brigade_flatten privilege escalation
7225| [76731] Apache HTTP Server 2.4.12 ErrorDocument 400 Crash denial of service
7226| [74367] Apache HTTP Server up to 2.4.12 mod_lua lua_request.c wsupgrade denial of service
7227| [73106] Apache Hadoop up to 2.4.0 Symlink privilege escalation
7228| [68575] Apache HTTP Server up to 2.4.10 LuaAuthzProvider mod_lua.c privilege escalation
7229| [68435] Apache HTTP Server 2.4.10 mod_proxy_fcgi.c handle_headers denial of service
7230| [67183] Apache HTTP Server up to 2.4.9 mod_proxy denial of service
7231| [67180] Apache HTTP Server up to 2.4.9 WinNT MPM Memory Leak denial of service
7232| [67185] Apache HTTP Server up to 2.4.9 mod_status Heap-Based memory corruption
7233| [67184] Apache HTTP Server 2.4.5/2.4.6 mod_cache NULL Pointer Dereference denial of service
7234| [67182] Apache HTTP Server up to 2.4.9 mod_deflate Memory Consumption denial of service
7235| [67181] Apache HTTP Server up to 2.4.9 mod_cgid denial of service
7236| [13300] Apache HTTP Server 2.4.1/2.4.2 mod_wsgi setuid privilege escalation
7237| [13299] Apache HTTP Server 2.4.1/2.4.2 mod_wsgi Content-Type Header information disclosure
7238| [12667] Apache HTTP Server 2.4.7 mod_log_config.c log_cookie denial of service
7239| [9683] Apache HTTP Server 2.4.5 mod_session_dbd denial of service
7240| [7202] Apache HTTP Server 2.4.2 on Oracle Solaris ld_library_path cross site scripting
7241| [62417] Apache CXF 2.4.7/2.4.8/2.5.3/2.5.4/2.6.1 spoofing
7242| [6092] Apache HTTP Server 2.4.0/2.4.1/2.4.2 mod_proxy_ajp.c information disclosure
7243| [6090] Apache HTTP Server 2.4.0/2.4.1/2.4.2 mod_proxy_http.c information disclosure
7244| [9673] Apache HTTP Server up to 2.4.4 mod_dav mod_dav.c Request denial of service
7245|
7246| MITRE CVE - https://cve.mitre.org:
7247| [CVE-2013-2249] mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.
7248| [CVE-2012-4558] Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.
7249| [CVE-2012-3502] The proxy functionality in (1) mod_proxy_ajp.c in the mod_proxy_ajp module and (2) mod_proxy_http.c in the mod_proxy_http module in the Apache HTTP Server 2.4.x before 2.4.3 does not properly determine the situations that require closing a back-end connection, which allows remote attackers to obtain sensitive information in opportunistic circumstances by reading a response that was intended for a different client.
7250| [CVE-2012-3499] Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
7251| [CVE-2012-3451] Apache CXF before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 allows remote attackers to execute unintended web-service operations by sending a header with a SOAP Action String that is inconsistent with the message body.
7252| [CVE-2012-2687] Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.
7253| [CVE-2012-2379] Apache CXF 2.4.x before 2.4.8, 2.5.x before 2.5.4, and 2.6.x before 2.6.1, when a Supporting Token specifies a child WS-SecurityPolicy 1.1 or 1.2 policy, does not properly ensure that an XML element is signed or encrypted, which has unspecified impact and attack vectors.
7254| [CVE-2012-2378] Apache CXF 2.4.5 through 2.4.7, 2.5.1 through 2.5.3, and 2.6.x before 2.6.1, does not properly enforce child policies of a WS-SecurityPolicy 1.1 SupportingToken policy on the client side, which allows remote attackers to bypass the (1) AlgorithmSuite, (2) SignedParts, (3) SignedElements, (4) EncryptedParts, and (5) EncryptedElements policies.
7255| [CVE-2012-0883] envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl.
7256| [CVE-2011-2516] Off-by-one error in the XML signature feature in Apache XML Security for C++ 1.6.0, as used in Shibboleth before 2.4.3 and possibly other products, allows remote attackers to cause a denial of service (crash) via a signature using a large RSA key, which triggers a buffer overflow.
7257|
7258| SecurityFocus - https://www.securityfocus.com/bid/:
7259| [42102] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
7260| [27237] Apache HTTP Server 2.2.6, 2.0.61 and 1.3.39 'mod_status' Cross-Site Scripting Vulnerability
7261| [15413] PHP Apache 2 Virtual() Safe_Mode and Open_Basedir Restriction Bypass Vulnerability
7262| [15177] PHP Apache 2 Local Denial of Service Vulnerability
7263| [6065] Apache 2 WebDAV CGI POST Request Information Disclosure Vulnerability
7264| [5816] Apache 2 mod_dav Denial Of Service Vulnerability
7265| [5486] Apache 2.0 CGI Path Disclosure Vulnerability
7266| [5485] Apache 2.0 Path Disclosure Vulnerability
7267| [5434] Apache 2.0 Encoded Backslash Directory Traversal Vulnerability
7268| [5256] Apache httpd 2.0 CGI Error Path Disclosure Vulnerability
7269| [4057] Apache 2 for Windows OPTIONS request Path Disclosure Vulnerability
7270| [4056] Apache 2 for Windows php.exe Path Disclosure Vulnerability
7271|
7272| IBM X-Force - https://exchange.xforce.ibmcloud.com:
7273| [75211] Debian GNU/Linux apache 2 cross-site scripting
7274|
7275| Exploit-DB - https://www.exploit-db.com:
7276| [31052] Apache <= 2.2.6 'mod_negotiation' HTML Injection and HTTP Response Splitting Vulnerability
7277| [30901] Apache HTTP Server 2.2.6 Windows Share PHP File Extension Mapping Information Disclosure Vulnerability
7278| [30835] Apache HTTP Server <= 2.2.4 413 Error HTTP Request Method Cross-Site Scripting Weakness
7279| [28424] Apache 2.x HTTP Server Arbitrary HTTP Request Headers Security Weakness
7280| [28365] Apache 2.2.2 CGI Script Source Code Information Disclosure Vulnerability
7281| [27915] Apache James 2.2 SMTP Denial of Service Vulnerability
7282| [27135] Apache Struts 2 DefaultActionMapper Prefixes OGNL Code Execution
7283| [26710] Apache CXF prior to 2.5.10, 2.6.7 and 2.7.4 - Denial of Service
7284| [24590] Apache 2.0.x mod_ssl Remote Denial of Service Vulnerability
7285| [23581] Apache 2.0.4x mod_perl Module File Descriptor Leakage Vulnerability
7286| [23482] Apache 2.0.4x mod_php Module File Descriptor Leakage Vulnerability (2)
7287| [23481] Apache 2.0.4x mod_php Module File Descriptor Leakage Vulnerability (1)
7288| [23296] Red Hat Apache 2.0.40 Directory Index Default Configuration Error
7289| [23282] apache cocoon 2.14/2.2 - Directory Traversal vulnerability
7290| [22191] Apache Web Server 2.0.x MS-DOS Device Name Denial of Service Vulnerability
7291| [21854] Apache 2.0.39/40 Oversized STDERR Buffer Denial of Service Vulnerability
7292| [21719] Apache 2.0 Path Disclosure Vulnerability
7293| [21697] Apache 2.0 Encoded Backslash Directory Traversal Vulnerability
7294| [20272] Apache 1.2.5/1.3.1,UnityMail 2.0 MIME Header DoS Vulnerability
7295| [19828] Cobalt RaQ 2.0/3.0 Apache .htaccess Disclosure Vulnerability
7296| [18984] Apache Struts <= 2.2.1.1 - Remote Command Execution
7297| [18329] Apache Struts2 <= 2.3.1 - Multiple Vulnerabilities
7298| [17691] Apache Struts < 2.2.0 - Remote Command Execution
7299| [15319] Apache 2.2 (Windows) Local Denial of Service
7300| [14617] Apache JackRabbit 2.0.0 webapp XPath Injection
7301| [11650] Apache 2.2.14 mod_isapi Dangling Pointer Remote SYSTEM Exploit
7302| [8458] Apache Geronimo <= 2.1.3 - Multiple Directory Traversal Vulnerabilities
7303| [5330] Apache 2.0 mod_jk2 2.0.2 - Remote Buffer Overflow Exploit (win32)
7304| [3996] Apache 2.0.58 mod_rewrite Remote Overflow Exploit (win2k3)
7305| [2237] Apache < 1.3.37, 2.0.59, 2.2.3 (mod_rewrite) Remote Overflow PoC
7306| [1056] Apache <= 2.0.49 Arbitrary Long HTTP Headers Denial of Service
7307| [855] Apache <= 2.0.52 HTTP GET request Denial of Service Exploit
7308| [132] Apache 1.3.x - 2.0.48 - mod_userdir Remote Users Disclosure Exploit
7309| [38] Apache <= 2.0.45 APR Remote Exploit -Apache-Knacker.pl
7310| [34] Webfroot Shoutbox < 2.32 (Apache) Remote Exploit
7311| [11] Apache <= 2.0.44 Linux Remote Denial of Service Exploit
7312| [9] Apache HTTP Server 2.x Memory Leak Exploit
7313|
7314| OpenVAS (Nessus) - http://www.openvas.org:
7315| [855524] Solaris Update for Apache 2 120544-14
7316| [855077] Solaris Update for Apache 2 120543-14
7317| [100858] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
7318| [72626] Debian Security Advisory DSA 2579-1 (apache2)
7319| [71551] Gentoo Security Advisory GLSA 201206-25 (apache)
7320| [71550] Gentoo Security Advisory GLSA 201206-24 (apache tomcat)
7321| [71485] Debian Security Advisory DSA 2506-1 (libapache-mod-security)
7322| [71256] Debian Security Advisory DSA 2452-1 (apache2)
7323| [71238] Debian Security Advisory DSA 2436-1 (libapache2-mod-fcgid)
7324| [70724] Debian Security Advisory DSA 2405-1 (apache2)
7325| [70235] Debian Security Advisory DSA 2298-2 (apache2)
7326| [70233] Debian Security Advisory DSA 2298-1 (apache2)
7327| [69988] Debian Security Advisory DSA 2279-1 (libapache2-mod-authnz-external)
7328| [69338] Debian Security Advisory DSA 2202-1 (apache2)
7329| [65131] SLES9: Security update for Apache 2 oes/CORE
7330| [64426] Gentoo Security Advisory GLSA 200907-04 (apache)
7331| [61381] Gentoo Security Advisory GLSA 200807-06 (apache)
7332| [60582] Gentoo Security Advisory GLSA 200803-19 (apache)
7333| [58745] Gentoo Security Advisory GLSA 200711-06 (apache)
7334| [57851] Gentoo Security Advisory GLSA 200608-01 (apache)
7335| [56246] Gentoo Security Advisory GLSA 200602-03 (Apache)
7336| [55392] Gentoo Security Advisory GLSA 200509-12 (Apache)
7337| [55129] Gentoo Security Advisory GLSA 200508-15 (apache)
7338| [54739] Gentoo Security Advisory GLSA 200411-18 (apache)
7339| [54724] Gentoo Security Advisory GLSA 200411-03 (apache)
7340| [54712] Gentoo Security Advisory GLSA 200410-21 (apache)
7341| [54689] Gentoo Security Advisory GLSA 200409-33 (net=www/apache)
7342| [54677] Gentoo Security Advisory GLSA 200409-21 (apache)
7343| [54610] Gentoo Security Advisory GLSA 200407-03 (Apache)
7344| [54601] Gentoo Security Advisory GLSA 200406-16 (Apache)
7345| [54590] Gentoo Security Advisory GLSA 200406-05 (Apache)
7346| [54582] Gentoo Security Advisory GLSA 200405-22 (Apache)
7347| [54529] Gentoo Security Advisory GLSA 200403-04 (Apache)
7348| [54499] Gentoo Security Advisory GLSA 200310-04 (Apache)
7349| [54498] Gentoo Security Advisory GLSA 200310-03 (Apache)
7350| [11092] Apache 2.0.39 Win32 directory traversal
7351| [66081] SLES11: Security update for Apache 2
7352| [66074] SLES10: Security update for Apache 2
7353| [66070] SLES9: Security update for Apache 2
7354| [65893] SLES10: Security update for Apache 2
7355| [65888] SLES10: Security update for Apache 2
7356| [65510] SLES9: Security update for Apache 2
7357| [65249] SLES9: Security update for Apache 2
7358| [65230] SLES9: Security update for Apache 2
7359| [65228] SLES9: Security update for Apache 2
7360| [65207] SLES9: Security update for Apache 2
7361| [65136] SLES9: Security update for Apache 2
7362| [65017] SLES9: Security update for Apache 2
7363|
7364| SecurityTracker - https://www.securitytracker.com:
7365| [1008196] Apache 2.x on Windows May Return Unexpected Files For URLs Ending With Certain Characters
7366| [1007143] Apache 2.0 Web Server May Use a Weaker Encryption Implementation Than Specified in Some Cases
7367| [1006444] Apache 2.0 Web Server Line Feed Buffer Allocation Flaw Lets Remote Users Deny Service
7368| [1005963] Apache Web Server 2.x Windows Device Access Flaw Lets Remote Users Crash the Server or Possibly Execute Arbitrary Code
7369| [1004770] Apache 2.x Web Server ap_log_rerror() Function May Disclose Full Installation Path to Remote Users
7370|
7371| OSVDB - http://www.osvdb.org:
7372| [20897] PHP w/ Apache 2 SAPI virtual() Function Unspecified INI Setting Disclosure
7373|_
737435500/tcp closed unknown
73751 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
7376SF-Port1500-TCP:V=7.80%T=SSL%I=7%D=2/27%Time=5E58924F%P=x86_64-pc-linux-gn
7377SF:u%r(GetRequest,16FF,"HTTP/1\.0\x20200\x20OK\r\nConnection:\x20close\r\n
7378SF:Content-Type:\x20text/html;\x20charset=UTF-8\r\nPragma:\x20no-cache\r\n
7379SF:Cache-Control:\x20no-cache\r\nExpires:\x200\r\nSet-Cookie:\x20ispmgrses
7380SF:5=;\x20path=/;\x20HttpOnly;\x20expires=Sat,\x2027\x20Feb\x202021\x2007:
7381SF:08:42\x20MSK;\x20Secure\r\nSet-Cookie:\x20ispmgrlang5=orion:en;\x20path
7382SF:=/;\x20expires=Sat,\x2027\x20Feb\x202021\x2007:08:42\x20MSK;\x20Secure\
7383SF:r\nX-Frame-Options:\x20SAMEORIGIN\r\nDate:\x20Fri,\x2028\x20Feb\x202020
7384SF:\x2004:08:42\x20GMT\r\n\r\n<!DOCTYPE\x20html><html>\n<head>\n<meta\x20h
7385SF:ttp-equiv=\"Content-Type\"\x20content=\"text/html;\x20charset=UTF-8\">\
7386SF:n<title>Authorization</title>\n<link\x20rel=\"stylesheet\"\x20href=\"/m
7387SF:animg/orion/default/main\.css\"\x20type=\"text/css\">\n<link\x20rel=\"s
7388SF:hortcut\x20icon\"\x20href=\"/manimg/orion/default/favicon-ispmgr\.ico\"
7389SF:\x20type=\"image/x-icon\">\n<link\x20rel=\"mask-icon\"\x20href=\"https:
7390SF:///manimg/common/maskicon/ispmgr\.svg\"\x20color=\"#000000\">\n<meta\x2
7391SF:0name=\"viewport\"\x20content=\"width=device-width,\x20initial-scale=1\
7392SF:.0,\x20minimum-scale=1\.0,\x20maximum-scale=1\.0,\x20user-scalable=yes\
7393SF:">\n</head")%r(HTTPOptions,4B,"HTTP/1\.0\x20200\x20OK\r\nContent-Length
7394SF::\x200\r\nDate:\x20Fri,\x2028\x20Feb\x202020\x2004:08:43\x20GMT\r\n\r\n
7395SF:")%r(RTSPRequest,4B,"HTTP/1\.1\x20200\x20OK\r\nContent-Length:\x200\r\n
7396SF:Date:\x20Fri,\x2028\x20Feb\x202020\x2004:08:44\x20GMT\r\n\r\n")%r(FourO
7397SF:hFourRequest,AF0,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Length:\x
7398SF:202715\r\nDate:\x20Fri,\x2028\x20Feb\x202020\x2004:09:24\x20GMT\r\n\r\n
7399SF:<!DOCTYPE\x20html>\n<html>\n<head>\n\x20\x20<title>404\x20Not\x20Found<
7400SF:/title>\n\x20\x20<meta\x20http-equiv=\"Content-Type\"\x20content=\"text
7401SF:/html;\x20charset=UTF-8\">\n\x20\x20<style>\n\x20\x20\x20\x20body\x20{\
7402SF:n\x20\x20\x20\x20\x20\x20font-weight:\x20normal;\n\x20\x20\x20\x20\x20\
7403SF:x20font-size:\x2011px;\n\x20\x20\x20\x20\x20\x20font-family:\x20Arial;\
7404SF:n\x20\x20\x20\x20}\n\x20\x20\x20\x20\.fatal-error\x20{\n\x20\x20\x20\x2
7405SF:0\x20\x20width:\x20270px;\n\x20\x20\x20\x20\x20\x20height:\x20270px;\n\
7406SF:x20\x20\x20\x20\x20\x20margin:\x200\x20auto;\n\x20\x20\x20\x20\x20\x20p
7407SF:osition:\x20absolute;\n\x20\x20\x20\x20\x20\x20top:\x2050%;\n\x20\x20\x
7408SF:20\x20\x20\x20left:\x2050%;\n\x20\x20\x20\x20\x20\x20margin-left:\x20-1
7409SF:35px;\n\x20\x20\x20\x20\x20\x20margin-top:\x20-135px;\n\x20\x20\x20\x20
7410SF:}\n\x20\x20\x20\x20\.fatal-error-round\x20{\n\x20\x20\x20\x20\x20\x20wi
7411SF:dth:\x20270px;\n\x20\x20\x20\x20\x20\x20height:\x20270px;\n\x20\x20\x20
7412SF:\x20\x20\x20background:\x20#FF8356;\n\x20\x20\x20\x20\x20\x20border-rad
7413SF:ius:\x20270px;\n\x20\x20\x20\x20}\n\x20\x20\x20\x20\.fatal-error-inner\
7414SF:x20{\n\x20\x20\x20\x20\x20\x20padding-top:\x2023px;\n\x20\x20\x20\x20\x
7415SF:20\x20text-align:\x20center;\n\x20\x20\x20\x20}\n\x20\x20\x20\x20\.fata
7416SF:l-error-sign\x20{\n\x20\x20\x20\x20\x20\x20margin-bottom:\x2010px;\n\x2
7417SF:0\x20\x20\x20}\n\x20\x20\x20\x20\.fatal-error-sign-top\x20{\n\x20\x20\x
7418SF:20\x20\x20\x20background:\x20#FFF;\n\x20\x20\x20\x20\x20\x20width:\x201
7419SF:4px;\n\x20\x20\x20\x20\x20\x20height:\x207px;\n\x20\x20\x20\x20\x20\x20
7420SF:border-radius:\x2028px");
7421Service Info: Host: default.domain; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
7422######################################################################################################################################
7423 Anonymous JTSEC #OpDeathEathers Full Recon #21