· 5 years ago · Mar 06, 2020, 06:15 AM
1######################################################################################################################################
2=====================================================================================================================================
3Hostname www.igemar.cl ISP Amazon.com, Inc.
4Continent North America Flag
5US
6Country United States Country Code US
7Region California Local time 05 Mar 2020 19:29 PST
8City San Jose Postal Code 95141
9IP Address 52.52.234.222 Latitude 37.339
10 Longitude -121.891
11=======================================================================================================================================
12#######################################################################################################################################
13> www.igemar.cl
14Server: 10.101.0.243
15Address: 10.101.0.243#53
16
17Non-authoritative answer:
18Name: www.igemar.cl
19Address: 52.52.234.222
20>
21#####################################################################################################################################
22Domain name: igemar.cl
23Registrant name: Pesquera Iquique-Guanaye S.A. (PESQUERA IQUIQUE GUANAYE S A)
24Registrant organisation:
25Registrar name: NIC Chile
26Registrar URL: https://www.nic.cl
27Creation date: 1999-06-23 21:42:08 CLST
28Expiration date: 2022-07-19 17:42:00 CLST
29Name server: sigma-inter.sigma.cl
30Name server: sigma-inter2.sigma.cl
31#####################################################################################################################################
32[+] Target : www.igemar.cl
33
34[+] IP Address : 52.52.234.222
35
36[+] Headers :
37
38[+] Date : Fri, 06 Mar 2020 03:36:42 GMT
39[+] Server : Apache-Coyote/1.1
40[+] X-Content-Type-Options : nosniff
41[+] X-Frame-Options : SAMEORIGIN
42[+] X-XSS-Protection : 1
43[+] Content-Encoding : gzip
44[+] Liferay-Portal : Liferay Community Edition Portal 7.0.2 GA3 (Wilberforce / Build 7002 / August 5, 2016)
45[+] Content-Type : text/html;charset=UTF-8
46[+] Set-Cookie : JSESSIONID=962A5479FA42EEED40C0B0B9A4194F5C; Path=/; Secure; HttpOnly, COOKIE_SUPPORT=true; Expires=Sat, 06-Mar-2021 03:36:42 GMT; Path=/; Secure; HttpOnly, GUEST_LANGUAGE_ID=es_ES; Domain=.igemar.cl; Expires=Sat, 06-Mar-2021 03:36:42 GMT; Path=/; Secure; HttpOnly
47[+] Keep-Alive : timeout=15, max=100
48[+] Connection : Keep-Alive
49[+] Transfer-Encoding : chunked
50
51[+] SSL Certificate Information :
52
53[+] organizationalUnitName : COMODO SSL
54[+] commonName : www.igemar.cl
55[+] countryName : GB
56[+] stateOrProvinceName : Greater Manchester
57[+] localityName : Salford
58[+] organizationName : Sectigo Limited
59[+] commonName : Sectigo RSA Domain Validation Secure Server CA
60[+] Version : 3
61[+] Serial Number : DBD566A0E3C97906A49F3DD40503CAE1
62[+] Not Before : Apr 10 00:00:00 2019 GMT
63[+] Not After : Apr 9 23:59:59 2021 GMT
64[+] OCSP : ('http://ocsp.sectigo.com',)
65[+] subject Alt Name : (('DNS', 'www.igemar.cl'), ('DNS', 'igemar.cl'))
66[+] CA Issuers : ('http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt',)
67
68[+] Whois Lookup :
69
70[+] NIR : None
71[+] ASN Registry : arin
72[+] ASN : 16509
73[+] ASN CIDR : 52.52.0.0/15
74[+] ASN Country Code : US
75[+] ASN Date : 2015-09-02
76[+] ASN Description : AMAZON-02, US
77[+] cidr : 52.32.0.0/11
78[+] name : AT-88-Z
79[+] handle : NET-52-32-0-0-1
80[+] range : 52.32.0.0 - 52.63.255.255
81[+] description : Amazon Technologies Inc.
82[+] country : US
83[+] state : WA
84[+] city : Seattle
85[+] address : 410 Terry Ave N.
86[+] postal_code : 98109
87[+] emails : ['amzn-noc-contact@amazon.com', 'abuse@amazonaws.com', 'aws-routing-poc@amazon.com']
88[+] created : 2015-09-02
89[+] updated : 2015-09-02
90
91[+] Crawling Target...
92
93[+] Looking for robots.txt........[ Found ]
94[+] Extracting robots Links.......[ 0 ]
95[+] Looking for sitemap.xml.......[ Found ]
96[+] Extracting sitemap Links......[ 0 ]
97[+] Extracting CSS Links..........[ 8 ]
98[+] Extracting Javascript Links...[ 6 ]
99[+] Extracting Internal Links.....[ 3 ]
100[+] Extracting External Links.....[ 5 ]
101[+] Extracting Images.............[ 27 ]
102
103[+] Total Links Extracted : 49
104
105[+] Dumping Links in /opt/FinalRecon/dumps/www.igemar.cl.dump
106[+] Completed!
107####################################################################################################################################
108[i] Scanning Site: https://www.igemar.cl
109
110
111
112B A S I C I N F O
113====================
114
115
116[+] Site Title:
117[+] IP address: 52.52.234.222
118[+] Web Server: Apache-Coyote/1.1
119[+] CMS: Could Not Detect
120[+] Cloudflare: Not Detected
121[+] Robots File: Could NOT Find robots.txt!
122
123
124
125
126W H O I S L O O K U P
127========================
128
129 %%
130%% This is the NIC Chile Whois server (whois.nic.cl).
131%%
132%% Rights restricted by copyright.
133%% See https://www.nic.cl/normativa/politica-publicacion-de-datos-cl.pdf
134%%
135
136Domain name: igemar.cl
137Registrant name: Pesquera Iquique-Guanaye S.A. (PESQUERA IQUIQUE GUANAYE S A)
138Registrant organisation:
139Registrar name: NIC Chile
140Registrar URL: https://www.nic.cl
141Creation date: 1999-06-23 21:42:08 CLST
142Expiration date: 2022-07-19 17:42:00 CLST
143Name server: sigma-inter.sigma.cl
144Name server: sigma-inter2.sigma.cl
145
146%%
147%% For communication with domain contacts please use website.
148%% See https://www.nic.cl/registry/Whois.do?d=igemar.cl
149%%
150
151
152
153
154G E O I P L O O K U P
155=========================
156
157[i] IP Address: 52.52.234.222
158[i] Country: United States
159[i] State: California
160[i] City: San Jose
161[i] Latitude: 37.3388
162[i] Longitude: -121.8914
163
164
165
166
167H T T P H E A D E R S
168=======================
169
170
171[i] HTTP/1.1 404 Not Found
172[i] Date: Fri, 06 Mar 2020 03:37:20 GMT
173[i] Server: Apache-Coyote/1.1
174[i] X-Content-Type-Options: nosniff
175[i] X-Frame-Options: SAMEORIGIN
176[i] X-XSS-Protection: 1
177[i] Liferay-Portal: Liferay Community Edition Portal 7.0.2 GA3 (Wilberforce / Build 7002 / August 5, 2016)
178[i] Content-Type: text/html;charset=UTF-8
179[i] Content-Length: 230799
180[i] Set-Cookie: JSESSIONID=24FE4EF705E5C01E09009E36DF246F9B; Path=/; Secure; HttpOnly
181[i] Set-Cookie: COOKIE_SUPPORT=true; Expires=Sat, 06-Mar-2021 03:37:20 GMT; Path=/; Secure; HttpOnly
182[i] Set-Cookie: GUEST_LANGUAGE_ID=es_ES; Domain=.igemar.cl; Expires=Sat, 06-Mar-2021 03:37:20 GMT; Path=/; Secure; HttpOnly
183[i] Connection: close
184
185
186
187
188D N S L O O K U P
189===================
190
191igemar.cl. 3599 IN TXT "v=spf1 include:spf.protection.outlook.com -all"
192igemar.cl. 3599 IN TXT "MS=ms52251860"
193igemar.cl. 29 IN SOA pub-ns1.redtogreen.cl. pub-ns2.redtogreen.cl. 2020022701 3600 3600 1209600 30
194igemar.cl. 29 IN A 52.52.234.222
195igemar.cl. 29 IN NS pub-ns2.redtogreen.cl.
196igemar.cl. 29 IN NS pub-ns1.redtogreen.cl.
197igemar.cl. 29 IN MX 0 igemar-cl.mail.protection.outlook.com.
198
199
200
201
202S U B N E T C A L C U L A T I O N
203====================================
204
205Address = 52.52.234.222
206Network = 52.52.234.222 / 32
207Netmask = 255.255.255.255
208Broadcast = not needed on Point-to-Point links
209Wildcard Mask = 0.0.0.0
210Hosts Bits = 0
211Max. Hosts = 1 (2^0 - 0)
212Host Range = { 52.52.234.222 - 52.52.234.222 }
213
214
215
216N M A P P O R T S C A N
217============================
218
219Starting Nmap 7.70 ( https://nmap.org ) at 2020-03-06 03:37 UTC
220Nmap scan report for igemar.cl (52.52.234.222)
221Host is up (0.075s latency).
222rDNS record for 52.52.234.222: ec2-52-52-234-222.us-west-1.compute.amazonaws.com
223
224PORT STATE SERVICE
22521/tcp filtered ftp
22622/tcp filtered ssh
22780/tcp open http
228443/tcp open https
229
230Nmap done: 1 IP address (1 host up) scanned in 1.98 seconds
231
232
233
234S U B - D O M A I N F I N D E R
235==================================
236
237
238[i] Total Subdomains Found : 1
239
240[+] Subdomain: www.igemar.cl
241[-] IP: 52.52.234.222
242#####################################################################################################################################
243[+] Starting At 2020-03-05 22:38:17.493756
244[+] Collecting Information On: https://www.igemar.cl/
245[#] Status: 200
246--------------------------------------------------
247[#] Web Server Detected: Apache-Coyote/1.1
248[+] Xss Protection Detected !
249- Date: Fri, 06 Mar 2020 03:38:16 GMT
250- Server: Apache-Coyote/1.1
251- X-Content-Type-Options: nosniff
252- X-Frame-Options: SAMEORIGIN
253- X-XSS-Protection: 1
254- Content-Encoding: gzip
255- Liferay-Portal: Liferay Community Edition Portal 7.0.2 GA3 (Wilberforce / Build 7002 / August 5, 2016)
256- Content-Type: text/html;charset=UTF-8
257- Set-Cookie: JSESSIONID=8446C510E4592FD71058F7F3CD3E054B; Path=/; Secure; HttpOnly, COOKIE_SUPPORT=true; Expires=Sat, 06-Mar-2021 03:38:16 GMT; Path=/; Secure; HttpOnly, GUEST_LANGUAGE_ID=es_ES; Domain=.igemar.cl; Expires=Sat, 06-Mar-2021 03:38:16 GMT; Path=/; Secure; HttpOnly
258- Keep-Alive: timeout=15, max=100
259- Connection: Keep-Alive
260- Transfer-Encoding: chunked
261--------------------------------------------------
262[#] Finding Location..!
263[#] status: success
264[#] country: United States
265[#] countryCode: US
266[#] region: CA
267[#] regionName: California
268[#] city: San Jose
269[#] zip: 95141
270[#] lat: 37.3394
271[#] lon: -121.895
272[#] timezone: America/Los_Angeles
273[#] isp: Amazon.com, Inc.
274[#] org: AWS EC2 (us-west-1)
275[#] as: AS16509 Amazon.com, Inc.
276[#] query: 52.52.234.222
277--------------------------------------------------
278[x] Didn't Detect WAF Presence on: https://www.igemar.cl/
279--------------------------------------------------
280[#] Starting Reverse DNS
281[-] Failed ! Fail
282--------------------------------------------------
283[!] Scanning Open Port
284[#] 80/tcp open http
285[#] 443/tcp open https
286--------------------------------------------------
287[+] Getting SSL Info
288{'OCSP': ('http://ocsp.sectigo.com',),
289 'caIssuers': ('http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt',),
290 'issuer': ((('countryName', 'GB'),),
291 (('stateOrProvinceName', 'Greater Manchester'),),
292 (('localityName', 'Salford'),),
293 (('organizationName', 'Sectigo Limited'),),
294 (('commonName',
295 'Sectigo RSA Domain Validation Secure Server CA'),)),
296 'notAfter': 'Apr 9 23:59:59 2021 GMT',
297 'notBefore': 'Apr 10 00:00:00 2019 GMT',
298 'serialNumber': 'DBD566A0E3C97906A49F3DD40503CAE1',
299 'subject': ((('organizationalUnitName', 'Domain Control Validated'),),
300 (('organizationalUnitName', 'COMODO SSL'),),
301 (('commonName', 'www.igemar.cl'),)),
302 'subjectAltName': (('DNS', 'www.igemar.cl'), ('DNS', 'igemar.cl')),
303 'version': 3}
304-----BEGIN CERTIFICATE-----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340-----END CERTIFICATE-----
341
342--------------------------------------------------
343[+] Collecting Information Disclosure!
344[#] Detecting sitemap.xml file
345[!] sitemap.xml File Found: https://www.igemar.cl//sitemap.xml
346[#] Detecting robots.txt file
347[!] robots.txt File Found: https://www.igemar.cl//robots.txt
348[#] Detecting GNU Mailman
349[-] GNU Mailman App Not Detected!?
350--------------------------------------------------
351[+] Crawling Url Parameter On: https://www.igemar.cl/
352--------------------------------------------------
353[#] Searching Html Form !
354[+] Html Form Discovered
355[#] action: https://www.igemar.cl/principal?p_p_id=contactos_portlet_ContactosPortlet_INSTANCE_3cyVGEANrBy8&p_p_lifecycle=1&p_p_state=normal&p_p_mode=view&p_p_col_id=_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instcontactos__column-1&p_p_col_count=1&_contactos_portlet_ContactosPortlet_INSTANCE_3cyVGEANrBy8_javax.portlet.action=send&p_auth=wvjkyPQ3
356[#] class: None
357[#] id: form
358[#] method: POST
359--------------------------------------------------
360[!] Found 77 dom parameter
361[#] https://www.igemar.cl
362[#] https://www.igemar.cl/o/igemar-theme-v-4-theme/css/aui.css?browserId=firefox&themeId=igemarthemev4_WAR_igemarthemev4theme&minifierType=css&languageId=es_ES&b=7002&t=32
363[#] https://www.igemar.cl///o/frontend-css-web/main.css?browserId=firefox&themeId=igemarthemev4_WAR_igemarthemev4theme&minifierType=css&languageId=es_ES&b=7002&t=1499283982794
364[#] https://www.igemar.cl///combo?browserId=firefox&minifierType=&themeId=igemarthemev4_WAR_igemarthemev4theme&languageId=es_ES&b=7002&com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_RCbC6oSJceYR:%2Fcss%2Fmain.css&com_liferay_product_navigation_product_menu_web_portlet_ProductMenuPortlet:%2Fcss%2Fmain.css&t=1579299552000
365[#] https://www.igemar.cl/o/igemar-theme-v-4-theme/css/main.css?browserId=firefox&themeId=igemarthemev4_WAR_igemarthemev4theme&minifierType=css&languageId=es_ES&b=7002&t=32
366[#] https://www.igemar.cl//#main-content
367[#] https://www.igemar.cl//#principal
368[#] https://www.igemar.cl//#
369[#] https://www.igemar.cl//#destacados
370[#] https://www.igemar.cl//#quienessomos
371[#] https://www.igemar.cl//#negocios
372[#] https://www.igemar.cl//#gobierno
373[#] https://www.igemar.cl//#inversionistas
374[#] https://www.igemar.cl//#accionistas
375[#] https://www.igemar.cl//#contactos
376[#] https://www.igemar.cl//#destacados
377[#] https://www.igemar.cl//#quienessomos
378[#] https://www.igemar.cl//#negocios
379[#] https://www.igemar.cl//#gobierno
380[#] https://www.igemar.cl//#inversionistas
381[#] https://www.igemar.cl//#accionistas
382[#] https://www.igemar.cl//#contactos
383[#] https://www.igemar.cl//#negocios
384[#] https://www.igemar.cl//#memorias
385[#] https://www.igemar.cl//#accionistas
386[#] https://www.igemar.cl//#quienessomos
387[#] https://www.igemar.cl//#quienessomos
388[#] https://www.igemar.cl//#quienessomos
389[#] https://www.igemar.cl//#negocios
390[#] https://www.igemar.cl//#gobierno
391[#] https://www.igemar.cl//#gobierno
392[#] https://www.igemar.cl//#gobierno
393[#] https://www.igemar.cl//#memorias
394[#] https://www.igemar.cl//#inversionistas
395[#] https://www.igemar.cl//#inversionistas
396[#] https://www.igemar.cl//#contactos
397[#] https://www.igemar.cl//#
398[#] https://www.igemar.cl//#2019
399[#] https://www.igemar.cl//#2018
400[#] https://www.igemar.cl//#2017
401[#] https://www.igemar.cl//#2016
402[#] https://www.igemar.cl//#2015
403[#] https://www.igemar.cl//#2014
404[#] https://www.igemar.cl//#2013
405[#] https://www.igemar.cl//#
406[#] https://www.igemar.cl//#accionistas
407[#] https://www.igemar.cl//#accionistas
408[#] https://www.igemar.cl//#accionistas
409[#] https://www.igemar.cl//#accionistas
410[#] https://www.igemar.cl//#accionistas
411[#] https://www.igemar.cl//#destacados
412[#] https://www.igemar.cl//#negocios
413[#] https://www.igemar.cl//#memorias
414[#] https://www.igemar.cl//#accionistas
415[#] https://www.igemar.cl//#quienessomos
416[#] https://www.igemar.cl//#quienessomos
417[#] https://www.igemar.cl//#quienessomos
418[#] https://www.igemar.cl//#quienessomos
419[#] https://www.igemar.cl//#negocios
420[#] https://www.igemar.cl//#negocios
421[#] https://www.igemar.cl//#gobierno
422[#] https://www.igemar.cl//#gobierno
423[#] https://www.igemar.cl//#gobierno
424[#] https://www.igemar.cl//#gobierno
425[#] https://www.igemar.cl//#inversionistas
426[#] https://www.igemar.cl//#memorias
427[#] https://www.igemar.cl//#inversionistas
428[#] https://www.igemar.cl//#inversionistas
429[#] https://www.igemar.cl//#contactos
430[#] https://www.igemar.cl//#accionistas
431[#] https://www.igemar.cl//#accionistas
432[#] https://www.igemar.cl//#accionistas
433[#] https://www.igemar.cl//#accionistas
434[#] https://www.igemar.cl//#accionistas
435[#] https://www.igemar.cl//#accionistas
436[#] https://www.igemar.cl//#
437[#] https://www.igemar.cl//#
438--------------------------------------------------
439[!] 3 Internal Dynamic Parameter Discovered
440[+] https://www.igemar.cl///combo?browserId=firefox&minifierType=css&languageId=es_ES&b=7002&t=1499283972015&/o/product-navigation-simulation-theme-contributor/css/simulation_panel.css&/o/product-navigation-product-menu-theme-contributor/product_navigation_product_menu.css&/o/product-navigation-control-menu-theme-contributor/product_navigation_control_menu.css
441[+] https://www.igemar.cl/c/portal/update_language?p_l_id=34686&languageId=es_ES
442[+] https://www.igemar.cl/c/portal/update_language?p_l_id=34686&languageId=en_EN
443--------------------------------------------------
444[!] 1 External Dynamic Parameter Discovered
445[#] https://fonts.googleapis.com/css?family=Lato:300,400,400i,700,900
446--------------------------------------------------
447[!] 155 Internal links Discovered
448[+] https://www.igemar.cl/o/dynamic-data-mapping-form-renderer/css/main.css
449[+] https://www.igemar.cl/o/mentions-web/css/mentions.css
450[+] https://www.igemar.cl/o/igemar-theme-v-4-theme/images/favicon.ico
451[+] https://www.igemar.cl/o/igemar-theme-v-4-theme/css/jquery.fullPage.css
452[+] https://www.igemar.cl/o/igemar-theme-v-4-theme/images/favicon.png
453[+] https://www.igemar.cl///documents/34275/34693/162_igemar_estatutos_2016.pdf/73573522-5713-3312-f9d8-2b386b3860f3
454[+] http://www.igemar.cl
455[+] https://www.igemar.cl///documents/34275/34696/politica_libre_comp_igemar2017.pdf/24d0d534-515b-bd3a-6426-66ddc4fa0dab
456[+] https://www.igemar.cl///documents/34275/34696/175_poli-tica-de-aportes-igemar.pdf/cd0c2d1c-c41b-a4a0-c396-6f4500b03068
457[+] https://www.igemar.cl///documents/34275/34696/politica_gestion_riesgos_igemar.pdf/ac9567bf-0dff-39a8-0e6f-4d3205ae3c39
458[+] https://www.igemar.cl///documents/34275/34696/Polit_prevdelitos_igemar_ago2019.pdf/c4f3201e-98ab-601f-9192-56d14939af89
459[+] https://www.igemar.cl///documents/34275/34696/175_modelo-prevencion-igemar_dic16.pdf/0b30cb27-619d-0b59-b6e5-26b675929a56
460[+] https://www.igemar.cl///documents/34275/34696/Codigo_etica_Igemar_agosto19.pdf/d4282dfb-db8c-ac29-b2f5-e7f693667b8c
461[+] https://www.igemar.cl///documents/34275/34696/175_procedimientos-de-gobierno-corporativo-igemar.pdf/ace5d64c-3d86-961b-b0b0-4e6430b6aa25
462[+] https://www.igemar.cl///documents/34275/34696/Linea_directa_Igemar_ago2019.pdf/225427b0-26c5-08a9-d7a2-226faca0e411
463[+] https://www.igemar.cl///documents/34275/242536/EF_201903.pdf/cb2614b9-7e4b-3dee-33f3-369678f82dd5
464[+] https://www.igemar.cl///documents/34275/242536/AR_201903.pdf/c5d826c7-a468-ced5-e876-4a932ca0ab84
465[+] https://www.igemar.cl///documents/34275/242536/DR_201903.pdf/5a3a6a85-4c6d-265b-1106-efcd8f813b64
466[+] https://www.igemar.cl///documents/34275/242536/HR_201903.pdf/fdd1d57b-923e-edf6-6824-167f32acc23d
467[+] https://www.igemar.cl///documents/34275/183706/EF_91123000_201803.pdf/2fb6a33e-8dad-f817-e979-533daa6af7f7
468[+] https://www.igemar.cl///documents/34275/183706/Estados_financieros_%28PDF%2991123000_201806.pdf/2030347b-3bfd-5fb2-22aa-fad3659620cf
469[+] https://www.igemar.cl///documents/34275/183706/Estados_financieros_%28pdf%2991123000_201809.pdf/a3023e02-5dc9-5ea1-9eaa-1811da323d34
470[+] https://www.igemar.cl///documents/34275/183706/EEFF_dic2018.pdf/0a8f229d-297a-04db-4b0a-f9606116f292
471[+] https://www.igemar.cl///documents/34275/183706/AR_91123000_201803.pdf/c44b5ffd-e838-8e71-7c22-7b0d885c00ff
472[+] https://www.igemar.cl///documents/34275/183706/An%C3%A1lisis_Razonado91123000_201806.pdf/35c5cb8c-9704-fcab-e5fb-3d345847f696
473[+] https://www.igemar.cl///documents/34275/183706/Analisis_Razonado91123000_201809.pdf/4f377ad7-9a18-6a88-1a27-c36adca1ca8d
474[+] https://www.igemar.cl///documents/34275/183706/AR_dic2018.pdf/55ae8535-ed01-6519-bb7e-67c724d37144
475[+] https://www.igemar.cl///documents/34275/183706/DR_91123000_201803.pdf/f2020d48-73bf-1c3a-5f63-0b3266066c5c
476[+] https://www.igemar.cl///documents/34275/183706/Declaraci%C3%B3n_de_responsabilidad91123000_201806.pdf/a44dabe7-3d36-e476-9644-4c7980528e5b
477[+] https://www.igemar.cl///documents/34275/183706/Analisis_Razonado91123000_201809.pdf/4f377ad7-9a18-6a88-1a27-c36adca1ca8d
478[+] https://www.igemar.cl///documents/34275/183706/DR_dic2018.pdf/7fea0c9e-348f-8d84-b4e2-1aa698294dae
479[+] https://www.igemar.cl///documents/34275/183706/HR_91123000_201803.pdf/262adf2e-eb46-d04f-d6b0-1c3cb476f1d7
480[+] https://www.igemar.cl///documents/34275/183706/Hechos_Relevantes91123000_201806.pdf/9027e73a-09c3-363f-4eb2-319564f75378
481[+] https://www.igemar.cl///documents/34275/183706/Hechos_relevantes91123000_201809.pdf/f4bdbff1-7f48-bb63-ad30-e589d8ab9e7d
482[+] https://www.igemar.cl///documents/34275/183706/HR_dic2018.pdf/99f8091d-4a2c-a3e8-653b-037e5df5a57a
483[+] https://www.igemar.cl///documents/34275/34720/EFF0317.pdf/231e310b-2d87-fa78-320d-58da1762137a
484[+] https://www.igemar.cl///documents/34275/126736/IFRS_201706.pdf/b4605514-e843-6756-594b-4ef660aae018
485[+] https://www.igemar.cl///documents/34275/34720/Estados_financieros_%28PDF%2991123000_201709.pdf/7c422914-ee17-091d-f402-d058d322fc75
486[+] https://www.igemar.cl///documents/34275/34705/Estados_financieros91123000_201712.pdf/a652e445-8218-0a67-dd4a-487c9e752466
487[+] https://www.igemar.cl///documents/34275/34720/AR_0317.pdf/ae9b45e1-cca0-30e6-52f1-01d8cbd8ffb7
488[+] https://www.igemar.cl///documents/34275/126736/AR_201706.pdf/091bbbef-1e2a-a0cd-890a-996a057d2ace
489[+] https://www.igemar.cl///documents/34275/34720/An%C3%A1lisis_Razonado91123000_201709.pdf/5df24712-f409-ce76-4994-21424823e940
490[+] https://www.igemar.cl///documents/34275/34705/Analisis_Razonado91123000_201712.pdf/882c4c22-3bfe-0ce7-3ac1-09226c215fa2
491[+] https://www.igemar.cl///documents/34275/34720/DR0317.pdf/667adaa0-68c8-d457-c621-50670ca7650e
492[+] https://www.igemar.cl///documents/34275/126736/DR_201706.pdf/c5aefcdd-6c86-8b60-d514-805c618b75d8
493[+] https://www.igemar.cl///documents/34275/34720/Declaraci%C3%B3n_de_responsabilidad91123000_201709.pdf/6d38b44a-d804-a70b-badf-b7d19be7ca27
494[+] https://www.igemar.cl///documents/34275/34705/Declaracion_de_responsabilidad91123000_201712.pdf/ec60ec62-30c5-ed79-a12c-a28b378ce84a
495[+] https://www.igemar.cl///documents/34275/34720/HR0317.pdf/b421cc79-1ac9-193b-e224-d499b853714a
496[+] https://www.igemar.cl///documents/34275/126736/HR_201706.pdf/e7793591-4f99-3414-9535-620b7a7667eb
497[+] https://www.igemar.cl///documents/34275/34720/Hechos_Relevantes91123000_201709.pdf/9c70f235-b920-82c4-b392-331bcb91a6ce
498[+] https://www.igemar.cl///documents/34275/34705/Hechos_Relevantes91123000_201712.pdf/1c8a07a5-7748-750d-def4-fa44e64813ca
499[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_-pdf-91123000_201603.pdf/84553bb2-9ec4-86fa-90f7-368139f3acf1
500[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_-pdf-91123000_201606.pdf/0885f4b0-a74d-dd6f-906a-b9c00e1e46c1
501[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_-pdf-91123000_201609.pdf/0ffd3142-10b5-814a-4705-472b024fb660
502[+] https://www.igemar.cl///documents/34275/34705/Igemar_eeff_2016.pdf/cd7cca3e-1dab-058c-d57a-e2283fd8bb8a
503[+] https://www.igemar.cl///documents/34275/34705/179_analisis_razonado91123000_201603.pdf/fe3df267-a7f5-7edb-bf5e-a2515905bcf8
504[+] https://www.igemar.cl///documents/34275/34705/179_analisis_razonado91123000_201606.pdf/11e6d74a-5605-2357-1500-4fc96ef6fd5e
505[+] https://www.igemar.cl///documents/34275/34705/179_analisis_razonado91123000_201609.pdf/d23594b8-1195-3054-f3a4-da16c6293939
506[+] https://www.igemar.cl///documents/34275/34705/Igemar_AR_2016.pdf/99357c62-5fce-f212-bba4-187b04802a17
507[+] https://www.igemar.cl///documents/34275/34705/179_declaracion_de_responsabilidad91123000_201603.pdf/a59b5b7a-fd54-8d95-6aab-2a7cab84ab3f
508[+] https://www.igemar.cl///documents/34275/34705/179_declaracion_de_responsabilidad91123000_201606.pdf/d1bd918a-b3a4-ee28-a87b-b1d22f3a9d92
509[+] https://www.igemar.cl///documents/34275/34705/179_declaracion_de_responsabilidad91123000_201609.pdf/5f177679-f41c-fb2b-b40d-8296304e277b
510[+] https://www.igemar.cl///documents/34275/34705/Igemar_DR_2016.pdf/e0810c51-cca5-05f0-79a5-bb6409c42e52
511[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes91123000_201603.pdf/4f5620ca-bb4c-9b83-4d56-4642048b6b42
512[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes91123000_201606.pdf/ea39bb65-4d64-cbd0-258e-ccdf9f334f22
513[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes91123000_201609.pdf/07c53b95-591a-77ca-fefc-d995bdfba1f3
514[+] https://www.igemar.cl///documents/34275/34705/Igemar_HR_2016.pdf/70415e75-d832-ad69-9986-0bb5314bae63
515[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_-pdf-91123000_201503.pdf/9400a47f-d767-b036-3e77-209138525624
516[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_junio_2015.pdf/4b5e5630-301c-cb7c-b605-3093a3669034
517[+] https://www.igemar.cl///documents/34275/34705/179_estados-financieros-septiembre-2015.pdf/75bec3ce-229f-f182-d69f-3470ee9d60d0
518[+] https://www.igemar.cl///documents/34275/34705/179_eeff-diciembre-2015.pdf/4dff7d99-d5e1-18c3-2833-b73a15ce4e1a
519[+] https://www.igemar.cl///documents/34275/34705/179_xa1lisis_razonado91123000_201503.pdf/e1fbc168-07ed-08c1-ca69-a27d9ec23314
520[+] https://www.igemar.cl///documents/34275/34705/179_xa1lisis_razonado_junio_2015.pdf/0e448547-b6cf-f304-5904-4f430308515c
521[+] https://www.igemar.cl///documents/34275/34705/179_xa1lisis-razonado-septiembre-2015.pdf/522c0024-5563-9a06-1064-8bd797af9c37
522[+] https://www.igemar.cl///documents/34275/34705/179_analisis_razonado-diciembre-2015.pdf/65d7b10b-4ea9-a837-3ef2-e2fe13287f05
523[+] https://www.igemar.cl///documents/34275/34705/179_xb3n_de_responsabilidad91123000_201503.pdf/bdc8140a-a884-3e3b-ce19-b178d6b45d6b
524[+] https://www.igemar.cl///documents/34275/34705/179_xb3n_de_responsabilidad_junio_2015.pdf/d9c3f090-b779-48d0-1284-dccfc0a3cdd9
525[+] https://www.igemar.cl///documents/34275/34705/179_xb3n-responsabilidad-septiembre-2015.pdf/b71a50b7-beed-add9-9231-d7481221551a
526[+] https://www.igemar.cl///documents/34275/34705/179_declaracion_responsabilidad-diciembre-2015.pdf/6a83b5c8-fa3a-a4c1-8905-c2aeaf8ab7a4
527[+] https://www.igemar.cl///documents/34275/34705/Hechos_Relevantes91123000_201503.pdf/261c32ea-ef6a-d334-5e83-4a795258016d
528[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes_junio_2015.pdf/2171c120-6482-06a1-07e1-2d65099588a5
529[+] https://www.igemar.cl///documents/34275/34705/179_hechos-relevantes-septiembre-2015.pdf/de515067-9408-85f9-5666-f2814362c514
530[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes-diciembre-2015.pdf/99e15269-383d-b285-b4d8-f08d6db1de12
531[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_-pdf-91123000_201403.pdf/446a4b9a-bddb-a91d-8b3f-749db4eccecc
532[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_junio_2014.pdf/a62c6a49-361a-15da-f2a5-b8a926f1c82d
533[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_septiembre_2014.pdf/54a2748b-8672-362a-0400-bf4880d23705
534[+] https://www.igemar.cl///documents/34275/34705/179_eeff2014.pdf/69bc8eb6-ae47-60ce-ad82-b8f9e499200d
535[+] https://www.igemar.cl///documents/34275/34705/179_an-c3-a1lisis_razonado91123000_201403.pdf/e28f5c87-1717-7c78-393d-2de6bc271b2e
536[+] https://www.igemar.cl///documents/34275/34705/179_analisis_razonado_junio_2014.pdf/3f0ee5e9-c2da-4076-553a-a7d2eba51c56
537[+] https://www.igemar.cl///documents/34275/34705/179_xa1lisis_razonado_septiembre_2014.pdf/9b871d1e-0f95-0838-a7a4-fe807ffd2501
538[+] https://www.igemar.cl///documents/34275/34705/179_xa1lisis_razonado91123000_201412.pdf/1180d807-ecac-a845-39ea-6a868ea4c47b
539[+] https://www.igemar.cl///documents/34275/34705/179_declaraci-c3-b3n_de_responsabilidad91123000_201403.pdf/7cf24895-138d-0b72-5406-85dadc3c030e
540[+] https://www.igemar.cl///documents/34275/34705/179_declaracion_de_responsabilidad_junio_2014.pdf/e451ce99-a95e-dd0e-8cd2-12b4b5f8f715
541[+] https://www.igemar.cl///documents/34275/34705/179_xb3n_de_responsabilidad_septiembre_2014.pdf/ff313834-6517-aefb-84d4-90ef5daf0961
542[+] https://www.igemar.cl///documents/34275/34705/179_xb3n_de_responsabilidad91123000_201412.pdf/4727ab6b-16df-b7c4-bace-1d7c10331a33
543[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes91123000_201403.pdf/d89861aa-771b-df93-97b9-eb2087747581
544[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes_junio_2014.pdf/af19aa56-6ac0-2ba1-c575-c4025defd163
545[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes_septiembre_2014.pdf/173e652a-a45e-6a6a-927c-71dc94ab38da
546[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes91123000_201412.pdf/ba645dee-85c0-1baa-8d05-1d06e41e44fc
547[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_igemar_0313.pdf/7d352aef-7c12-1798-835a-a556e10f0583
548[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_-pdf-91123000_201306.pdf/c4a361c7-50b7-f3f1-a805-75e2a9269ca1
549[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_-pdf-91123000_201309.pdf/24e942a5-4309-8476-2c72-874bb925c902
550[+] https://www.igemar.cl///documents/34275/34705/179_fecu2013.pdf/5855d2b8-767d-96cd-8442-c6a8f5a7cd8e
551[+] https://www.igemar.cl///documents/34275/34705/179_analisis_razonado_igemar_0313.pdf/59c26bf9-31c1-3934-f2f5-4c5bec1b1ed1
552[+] https://www.igemar.cl///documents/34275/34705/179_xa1lisis_razonado91123000_201306.pdf/88cc5920-eeab-205a-a0ff-98fce76f5f32
553[+] https://www.igemar.cl///documents/34275/34705/179_xa1lisis_razonado91123000_201309.pdf/15d14ee0-5199-f543-15ad-01d9301a419e
554[+] https://www.igemar.cl///documents/34275/34705/179_xa1lisis_razonado_diciembre_2013.pdf/a922f72d-4b77-a19f-8049-bba15d2327cc
555[+] https://www.igemar.cl///documents/34275/34705/179_xb3n_de_responsabilidad_igemar_0313.pdf/5737843e-896a-5fc0-a4d6-925298a7b7ee
556[+] https://www.igemar.cl///documents/34275/34705/179_xb3n_de_responsabilidad91123000_201306.pdf/9d751e76-f024-5628-6d91-fdf74aaa37ea
557[+] https://www.igemar.cl///documents/34275/34705/179_xb3n_de_responsabilidad91123000_201309.pdf/30f0d1bb-fae9-6cfd-3320-85f76c78a8fb
558[+] https://www.igemar.cl///documents/34275/34705/179_xb3n_de_responsabilidad_diciembre_2013.pdf/4fa057e0-59a5-3f5f-ad49-1dbe6bc1a850
559[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes_igemar_0313.pdf/70cdd43d-12d3-e6c3-1762-fad64b963f7d
560[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes91123000_201306.pdf/5b7df00d-0b37-4ba4-0021-3a34b88313dc
561[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes91123000_201309.pdf/ba8f025b-fde5-a1e5-7607-39935f2a242e
562[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes_diciembre_2013.pdf/4e9d3f1a-1392-560a-4147-77f9ec3d417b
563[+] https://www.igemar.cl///documents/34275/34699/he_271218.pdf/63043daf-1684-47bf-04d1-e5dbc6a0d0c1
564[+] https://www.igemar.cl///documents/34275/34699/he_250418.pdf/2bf76065-ed37-8e5c-200b-69bb0de622c3
565[+] https://www.igemar.cl///documents/34275/34699/he_06042018.pdf/9879f937-dc01-3caf-3124-e2bcd6bcb98d
566[+] https://www.igemar.cl///documents/34275/34699/he_29032018.pdf/c6c62eb5-02f2-fd9b-9bbd-435e5920029f
567[+] https://www.igemar.cl///documents/34275/34699/HE_igemar_170817.pdf/db81f20a-804b-dff0-241d-394c72cea636
568[+] https://www.igemar.cl///documents/34275/34699/HE_igemar_070717.pdf/f041ffdd-23f0-8d58-dec0-8f3b1517c08a
569[+] https://www.igemar.cl///documents/34275/34699/hes_2017060103310.pdf/bd8e8303-fa78-1bc5-b2dd-9d82d3e1812a
570[+] https://www.igemar.cl///documents/34275/34699/H+E+Selecta.pdf/7c3fefe4-a733-c321-4e8c-d5e6000ccd43
571[+] https://www.igemar.cl///documents/34275/34699/Hecho+Esencial+Junta+Igemar7deabril.pdf/d161a9bd-6609-ec8c-3cac-2689e54a46de
572[+] https://www.igemar.cl///documents/34275/34699/Hecho-Esencial-08.03.2017.pdf/7adc5b06-b5b7-0f85-fd47-52406d333aa4
573[+] https://www.igemar.cl///documents/34275/34699/180_hecho-esencial-octubre-2014.pdf/b64abc9a-5759-8b77-df03-8185002d839f
574[+] https://www.igemar.cl///documents/34275/34702/MemoriaAnual2018_Igemar.pdf/13c90655-35f2-3a5c-a8dc-4eb6f462b313
575[+] https://www.igemar.cl///documents/34275/34708/EEFF_dic2018.pdf/b4c1b7d4-41ae-0d6b-8935-f705a21a1835
576[+] https://www.igemar.cl///documents/34275/34708/candidatos2019_Igemar.pdf/b0b7dce7-2fc0-9920-8e0d-017a7446c672
577[+] https://www.igemar.cl///documents/34275/34708/Fundamentos_Designacion_Auditores_Igemar.pdf/4f60033a-13ec-24e5-ff9a-3f741217f784
578[+] https://www.igemar.cl///documents/34275/34708/Citacion_Junta2019_Igemar.pdf/8a126a9b-23bc-d68e-601c-6ae939ae3175
579[+] https://www.igemar.cl///documents/34275/34708/Aviso_Junta2019_Igemar.pdf/2b1fe919-9572-6cf5-5e15-55fc85c19499
580[+] https://www.igemar.cl///documents/34275/34708/Acta_Junta_Igemar_2019.pdf/f74084fc-0265-c92d-6cd0-c9acd9a8f55f
581[+] https://www.igemar.cl///documents/34275/34708/ActaJuntaExtraordinaria2018.pdf/402fca9a-724f-5ac2-4218-aff51bd030d2
582[+] https://www.igemar.cl///documents/34275/34708/ActaJuntaOrdinaria2018.pdf/145fe6a8-67dd-8bc3-83ad-db296dd1611f
583[+] https://www.igemar.cl///documents/34275/34708/Acta+Junta+2017+Igemar.pdf/cd44d4c4-b7e4-253b-ab6a-d400b4424943
584[+] https://www.igemar.cl///documents/34275/34708/206_acta_igemar_2016.pdf/151cf0db-026a-7396-c3bf-da2aeefb98f1
585[+] https://www.igemar.cl///documents/34275/34708/197_acta-junta-igemar.pdf/3c1a510b-5618-689c-e9d2-f9196a0eacbe
586[+] https://www.igemar.cl///documents/34275/34708/197_acta_junta2014.pdf/fc41ee7b-110b-237e-2a63-44dce010b1aa
587[+] https://www.igemar.cl///documents/34275/34702/MemoriaAnual2018_Igemar.pdf/13c90655-35f2-3a5c-a8dc-4eb6f462b313
588[+] https://www.igemar.cl///documents/34275/34702/memoria_igemar_2017.pdf/4bebaa66-6f29-5a96-3ebd-64ffacd76303
589[+] https://www.igemar.cl///documents/34275/34702/Igemar_memoria_2016_SVS.pdf/3e39aced-fedf-5062-3715-30b03aef5aca
590[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar-2015_web5.pdf/cedff9a0-9999-0481-1797-050885a9b45f
591[+] https://www.igemar.cl///documents/34275/34702/178_memoria-20igemar-202014_web.pdf/434ee0cc-a3be-4d8f-d337-1caa97ae45bf
592[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar_2013.pdf/5656d439-347b-2fe6-d6de-91e555d06cab
593[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar_2012.pdf/007b9c91-afde-c41b-e921-80c6cfc457d0
594[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar_2011.pdf/5949e01a-7e59-a442-2331-309007120272
595[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar_2010.pdf/60c3ba85-4893-e79f-fa01-752a239e0124
596[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar_2009.pdf/51ff63f9-138e-7f36-c0aa-744f2369070f
597[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar_2008.pdf/8dc0a611-bd78-da92-411d-a29552d33f64
598[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar_2007.pdf/11c4c3c9-daf6-ca34-4adc-ebfd3cdc79e0
599[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar_2006.pdf/1c36ee28-9739-2831-2461-60c9ea2e9bda
600[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar_2005.pdf/d493b7a3-7f16-a5f8-cb47-e5b97c08d606
601[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar_2004.pdf/77fc6db8-3785-bff6-521b-195f78cffc34
602[+] https://www.igemar.cl//www.igemar.cl
603--------------------------------------------------
604[!] 12 External links Discovered
605[#] https://www.igemar.cl
606[#] https://www.igemar.cl/o/igemar-theme-v-4-theme/css/aui.css?browserId=firefox&themeId=igemarthemev4_WAR_igemarthemev4theme&minifierType=css&languageId=es_ES&b=7002&t=32
607[#] https://www.igemar.cl/o/igemar-theme-v-4-theme/css/main.css?browserId=firefox&themeId=igemarthemev4_WAR_igemarthemev4theme&minifierType=css&languageId=es_ES&b=7002&t=32
608[#] http://www.sercor.cl
609[#] http://www.corpesca.cl
610[#] http://www.orizon.cl/
611[#] https://www.canaldedenuncia.cl/cda/sercor/cdpages/inicio.aspx
612[#] http://www.sercor.cl/
613[#] http://www.sercor.cl
614[#] https://www.canaldedenuncia.cl/cda/sercor/cdpages/inicio.aspx
615[#] http://www.sercor.cl
616[#] https://www.canaldedenuncia.cl/cda/sercor/cdpages/inicio.aspx
617--------------------------------------------------
618[#] Mapping Subdomain..
619[!] Found 2 Subdomain
620- igemar.cl
621- www.igemar.cl
622--------------------------------------------------
623[!] Done At 2020-03-05 22:39:11.947273
624####################################################################################################################################
625[INFO] ------TARGET info------
626[*] TARGET: https://www.igemar.cl/
627[*] TARGET IP: 52.52.234.222
628[INFO] NO load balancer detected for www.igemar.cl...
629[*] DNS servers: pub-ns1.redtogreen.cl.
630 Apache-Coyote/1.1 Apache/2.2.34 (Amazon)
631[*] CC: US
632[*] Country: United States
633[*] RegionCode: CA
634[*] RegionName: California
635[*] City: San Jose
636[*] ASN: AS16509
637[*] BGP_PREFIX: 52.52.0.0/15
638[*] ISP: AMAZON-02, US
639[INFO] SSL/HTTPS certificate detected
640[*] Issuer: issuer=C = GB, ST = Greater Manchester, L = Salford, O = Sectigo Limited, CN = Sectigo RSA Domain Validation Secure Server CA
641[*] Subject: subject=OU = Domain Control Validated, OU = COMODO SSL, CN = www.igemar.cl
642[INFO] DNS enumeration:
643[INFO] Possible abuse mails are:
644[*] abuse@igemar.cl
645[*] abuse@www.igemar.cl
646[INFO] NO PAC (Proxy Auto Configuration) file FOUND
647[ALERT] robots.txt file FOUND in http://www.igemar.cl/robots.txt
648[INFO] Checking for HTTP status codes recursively from http://www.igemar.cl/robots.txt
649[INFO] Status code Folders
650[INFO] Starting FUZZing in http://www.igemar.cl/FUzZzZzZzZz...
651[INFO] Status code Folders
652[*] 200 http://www.igemar.cl/index
653[*] 200 http://www.igemar.cl/images
654[*] 200 http://www.igemar.cl/download
655[*] 200 http://www.igemar.cl/2006
656[*] 200 http://www.igemar.cl/news
657[*] 200 http://www.igemar.cl/crack
658[*] 200 http://www.igemar.cl/serial
659[*] 200 http://www.igemar.cl/warez
660[*] 200 http://www.igemar.cl/full
661[*] 200 http://www.igemar.cl/12
662[ALERT] Look in the source code. It may contain passwords
663
664Recherche 52.52.234.222
665Connexion HTTP à 52.52.234.222
666Envoi de la requête HTTP.
667Requête HTTP envoyée. Attente de réponse.
668HTTP/1.1 302 Found
669Transfert de données terminé
670HTTP/1.1 302 Found
671Utilisation de https://52.52.234.222/
672Recherche 52.52.234.222
673Connexion HTTPS à 52.52.234.222
674
675lynx : accès impossible au fichier de départ http://52.52.234.222/
676[INFO] Links found from https://www.igemar.cl/ http://52.52.234.222/:
677[*] https://www.canaldedenuncia.cl/cda/sercor/cdpages/inicio.aspx
678[*] https://www.google.com/maps/embed?key=AIzaSyCAAN8L7pmMgSZQZ-HMPuIBH9xmnDcxpWQ&pb=!1m18!1m12!1m3!1d3330.3500716383255!2d-70.59469008435245!3d-33.414116480784415!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x9662cf3e0fa7a67f:0x300d0c7f976e2ec8!2sEl+Golf+150,+Las+Condes,+Región+Metropolitana!5e0!3m2!1sen!2scl!4v1486074188631
679[*] https://www.igemar.cl/
680[*] https://www.igemar.cl/#2013
681[*] https://www.igemar.cl/#2014
682[*] https://www.igemar.cl/#2015
683[*] https://www.igemar.cl/#2016
684[*] https://www.igemar.cl/#2017
685[*] https://www.igemar.cl/#2018
686[*] https://www.igemar.cl/#2019
687[*] https://www.igemar.cl/#accionistas
688[*] https://www.igemar.cl/#contactos
689[*] https://www.igemar.cl/c/portal/update_language?p_l_id=34686&languageId=es_ES
690[*] https://www.igemar.cl/#destacados
691[*] https://www.igemar.cl/documents/34275/126736/AR_201706.pdf/091bbbef-1e2a-a0cd-890a-996a057d2ace
692[*] https://www.igemar.cl/documents/34275/126736/DR_201706.pdf/c5aefcdd-6c86-8b60-d514-805c618b75d8
693[*] https://www.igemar.cl/documents/34275/126736/HR_201706.pdf/e7793591-4f99-3414-9535-620b7a7667eb
694[*] https://www.igemar.cl/documents/34275/126736/IFRS_201706.pdf/b4605514-e843-6756-594b-4ef660aae018
695[*] https://www.igemar.cl/documents/34275/183706/Analisis_Razonado91123000_201809.pdf/4f377ad7-9a18-6a88-1a27-c36adca1ca8d
696[*] https://www.igemar.cl/documents/34275/183706/An%C3%A1lisis_Razonado91123000_201806.pdf/35c5cb8c-9704-fcab-e5fb-3d345847f696
697[*] https://www.igemar.cl/documents/34275/183706/AR_91123000_201803.pdf/c44b5ffd-e838-8e71-7c22-7b0d885c00ff
698[*] https://www.igemar.cl/documents/34275/183706/AR_dic2018.pdf/55ae8535-ed01-6519-bb7e-67c724d37144
699[*] https://www.igemar.cl/documents/34275/183706/Declaraci%C3%B3n_de_responsabilidad91123000_201806.pdf/a44dabe7-3d36-e476-9644-4c7980528e5b
700[*] https://www.igemar.cl/documents/34275/183706/DR_91123000_201803.pdf/f2020d48-73bf-1c3a-5f63-0b3266066c5c
701[*] https://www.igemar.cl/documents/34275/183706/DR_dic2018.pdf/7fea0c9e-348f-8d84-b4e2-1aa698294dae
702[*] https://www.igemar.cl/documents/34275/183706/EEFF_dic2018.pdf/0a8f229d-297a-04db-4b0a-f9606116f292
703[*] https://www.igemar.cl/documents/34275/183706/EF_91123000_201803.pdf/2fb6a33e-8dad-f817-e979-533daa6af7f7
704[*] https://www.igemar.cl/documents/34275/183706/Estados_financieros_%28PDF%2991123000_201806.pdf/2030347b-3bfd-5fb2-22aa-fad3659620cf
705[*] https://www.igemar.cl/documents/34275/183706/Estados_financieros_%28pdf%2991123000_201809.pdf/a3023e02-5dc9-5ea1-9eaa-1811da323d34
706[*] https://www.igemar.cl/documents/34275/183706/Hechos_Relevantes91123000_201806.pdf/9027e73a-09c3-363f-4eb2-319564f75378
707[*] https://www.igemar.cl/documents/34275/183706/Hechos_relevantes91123000_201809.pdf/f4bdbff1-7f48-bb63-ad30-e589d8ab9e7d
708[*] https://www.igemar.cl/documents/34275/183706/HR_91123000_201803.pdf/262adf2e-eb46-d04f-d6b0-1c3cb476f1d7
709[*] https://www.igemar.cl/documents/34275/183706/HR_dic2018.pdf/99f8091d-4a2c-a3e8-653b-037e5df5a57a
710[*] https://www.igemar.cl/documents/34275/242536/AR_201903.pdf/c5d826c7-a468-ced5-e876-4a932ca0ab84
711[*] https://www.igemar.cl/documents/34275/242536/DR_201903.pdf/5a3a6a85-4c6d-265b-1106-efcd8f813b64
712[*] https://www.igemar.cl/documents/34275/242536/EF_201903.pdf/cb2614b9-7e4b-3dee-33f3-369678f82dd5
713[*] https://www.igemar.cl/documents/34275/242536/HR_201903.pdf/fdd1d57b-923e-edf6-6824-167f32acc23d
714[*] https://www.igemar.cl/documents/34275/34693/162_igemar_estatutos_2016.pdf/73573522-5713-3312-f9d8-2b386b3860f3
715[*] https://www.igemar.cl/documents/34275/34696/175_modelo-prevencion-igemar_dic16.pdf/0b30cb27-619d-0b59-b6e5-26b675929a56
716[*] https://www.igemar.cl/documents/34275/34696/175_poli-tica-de-aportes-igemar.pdf/cd0c2d1c-c41b-a4a0-c396-6f4500b03068
717[*] https://www.igemar.cl/documents/34275/34696/175_procedimientos-de-gobierno-corporativo-igemar.pdf/ace5d64c-3d86-961b-b0b0-4e6430b6aa25
718[*] https://www.igemar.cl/documents/34275/34696/Codigo_etica_Igemar_agosto19.pdf/d4282dfb-db8c-ac29-b2f5-e7f693667b8c
719[*] https://www.igemar.cl/documents/34275/34696/Linea_directa_Igemar_ago2019.pdf/225427b0-26c5-08a9-d7a2-226faca0e411
720[*] https://www.igemar.cl/documents/34275/34696/politica_gestion_riesgos_igemar.pdf/ac9567bf-0dff-39a8-0e6f-4d3205ae3c39
721[*] https://www.igemar.cl/documents/34275/34696/politica_libre_comp_igemar2017.pdf/24d0d534-515b-bd3a-6426-66ddc4fa0dab
722[*] https://www.igemar.cl/documents/34275/34696/Polit_prevdelitos_igemar_ago2019.pdf/c4f3201e-98ab-601f-9192-56d14939af89
723[*] https://www.igemar.cl/documents/34275/34699/180_hecho-esencial-octubre-2014.pdf/b64abc9a-5759-8b77-df03-8185002d839f
724[*] https://www.igemar.cl/documents/34275/34699/he_06042018.pdf/9879f937-dc01-3caf-3124-e2bcd6bcb98d
725[*] https://www.igemar.cl/documents/34275/34699/he_250418.pdf/2bf76065-ed37-8e5c-200b-69bb0de622c3
726[*] https://www.igemar.cl/documents/34275/34699/he_271218.pdf/63043daf-1684-47bf-04d1-e5dbc6a0d0c1
727[*] https://www.igemar.cl/documents/34275/34699/he_29032018.pdf/c6c62eb5-02f2-fd9b-9bbd-435e5920029f
728[*] https://www.igemar.cl/documents/34275/34699/Hecho-Esencial-08.03.2017.pdf/7adc5b06-b5b7-0f85-fd47-52406d333aa4
729[*] https://www.igemar.cl/documents/34275/34699/Hecho+Esencial+Junta+Igemar7deabril.pdf/d161a9bd-6609-ec8c-3cac-2689e54a46de
730[*] https://www.igemar.cl/documents/34275/34699/HE_igemar_070717.pdf/f041ffdd-23f0-8d58-dec0-8f3b1517c08a
731[*] https://www.igemar.cl/documents/34275/34699/HE_igemar_170817.pdf/db81f20a-804b-dff0-241d-394c72cea636
732[*] https://www.igemar.cl/documents/34275/34699/hes_2017060103310.pdf/bd8e8303-fa78-1bc5-b2dd-9d82d3e1812a
733[*] https://www.igemar.cl/documents/34275/34699/H+E+Selecta.pdf/7c3fefe4-a733-c321-4e8c-d5e6000ccd43
734[*] https://www.igemar.cl/documents/34275/34702/178_memoria-20igemar-202014_web.pdf/434ee0cc-a3be-4d8f-d337-1caa97ae45bf
735[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2004.pdf/77fc6db8-3785-bff6-521b-195f78cffc34
736[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2005.pdf/d493b7a3-7f16-a5f8-cb47-e5b97c08d606
737[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2006.pdf/1c36ee28-9739-2831-2461-60c9ea2e9bda
738[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2007.pdf/11c4c3c9-daf6-ca34-4adc-ebfd3cdc79e0
739[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2008.pdf/8dc0a611-bd78-da92-411d-a29552d33f64
740[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2009.pdf/51ff63f9-138e-7f36-c0aa-744f2369070f
741[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2010.pdf/60c3ba85-4893-e79f-fa01-752a239e0124
742[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2011.pdf/5949e01a-7e59-a442-2331-309007120272
743[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2012.pdf/007b9c91-afde-c41b-e921-80c6cfc457d0
744[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2013.pdf/5656d439-347b-2fe6-d6de-91e555d06cab
745[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar-2015_web5.pdf/cedff9a0-9999-0481-1797-050885a9b45f
746[*] https://www.igemar.cl/documents/34275/34702/Igemar_memoria_2016_SVS.pdf/3e39aced-fedf-5062-3715-30b03aef5aca
747[*] https://www.igemar.cl/documents/34275/34702/MemoriaAnual2018_Igemar.pdf/13c90655-35f2-3a5c-a8dc-4eb6f462b313
748[*] https://www.igemar.cl/documents/34275/34702/memoria_igemar_2017.pdf/4bebaa66-6f29-5a96-3ebd-64ffacd76303
749[*] https://www.igemar.cl/documents/34275/34705/179_analisis_razonado91123000_201603.pdf/fe3df267-a7f5-7edb-bf5e-a2515905bcf8
750[*] https://www.igemar.cl/documents/34275/34705/179_analisis_razonado91123000_201606.pdf/11e6d74a-5605-2357-1500-4fc96ef6fd5e
751[*] https://www.igemar.cl/documents/34275/34705/179_analisis_razonado91123000_201609.pdf/d23594b8-1195-3054-f3a4-da16c6293939
752[*] https://www.igemar.cl/documents/34275/34705/179_analisis_razonado-diciembre-2015.pdf/65d7b10b-4ea9-a837-3ef2-e2fe13287f05
753[*] https://www.igemar.cl/documents/34275/34705/179_analisis_razonado_igemar_0313.pdf/59c26bf9-31c1-3934-f2f5-4c5bec1b1ed1
754[*] https://www.igemar.cl/documents/34275/34705/179_analisis_razonado_junio_2014.pdf/3f0ee5e9-c2da-4076-553a-a7d2eba51c56
755[*] https://www.igemar.cl/documents/34275/34705/179_an-c3-a1lisis_razonado91123000_201403.pdf/e28f5c87-1717-7c78-393d-2de6bc271b2e
756[*] https://www.igemar.cl/documents/34275/34705/179_declaraci-c3-b3n_de_responsabilidad91123000_201403.pdf/7cf24895-138d-0b72-5406-85dadc3c030e
757[*] https://www.igemar.cl/documents/34275/34705/179_declaracion_de_responsabilidad91123000_201603.pdf/a59b5b7a-fd54-8d95-6aab-2a7cab84ab3f
758[*] https://www.igemar.cl/documents/34275/34705/179_declaracion_de_responsabilidad91123000_201606.pdf/d1bd918a-b3a4-ee28-a87b-b1d22f3a9d92
759[*] https://www.igemar.cl/documents/34275/34705/179_declaracion_de_responsabilidad91123000_201609.pdf/5f177679-f41c-fb2b-b40d-8296304e277b
760[*] https://www.igemar.cl/documents/34275/34705/179_declaracion_de_responsabilidad_junio_2014.pdf/e451ce99-a95e-dd0e-8cd2-12b4b5f8f715
761[*] https://www.igemar.cl/documents/34275/34705/179_declaracion_responsabilidad-diciembre-2015.pdf/6a83b5c8-fa3a-a4c1-8905-c2aeaf8ab7a4
762[*] https://www.igemar.cl/documents/34275/34705/179_eeff2014.pdf/69bc8eb6-ae47-60ce-ad82-b8f9e499200d
763[*] https://www.igemar.cl/documents/34275/34705/179_eeff-diciembre-2015.pdf/4dff7d99-d5e1-18c3-2833-b73a15ce4e1a
764[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_igemar_0313.pdf/7d352aef-7c12-1798-835a-a556e10f0583
765[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_junio_2014.pdf/a62c6a49-361a-15da-f2a5-b8a926f1c82d
766[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_junio_2015.pdf/4b5e5630-301c-cb7c-b605-3093a3669034
767[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201306.pdf/c4a361c7-50b7-f3f1-a805-75e2a9269ca1
768[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201309.pdf/24e942a5-4309-8476-2c72-874bb925c902
769[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201403.pdf/446a4b9a-bddb-a91d-8b3f-749db4eccecc
770[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201503.pdf/9400a47f-d767-b036-3e77-209138525624
771[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201603.pdf/84553bb2-9ec4-86fa-90f7-368139f3acf1
772[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201606.pdf/0885f4b0-a74d-dd6f-906a-b9c00e1e46c1
773[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201609.pdf/0ffd3142-10b5-814a-4705-472b024fb660
774[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_septiembre_2014.pdf/54a2748b-8672-362a-0400-bf4880d23705
775[*] https://www.igemar.cl/documents/34275/34705/179_estados-financieros-septiembre-2015.pdf/75bec3ce-229f-f182-d69f-3470ee9d60d0
776[*] https://www.igemar.cl/documents/34275/34705/179_fecu2013.pdf/5855d2b8-767d-96cd-8442-c6a8f5a7cd8e
777[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201306.pdf/5b7df00d-0b37-4ba4-0021-3a34b88313dc
778[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201309.pdf/ba8f025b-fde5-a1e5-7607-39935f2a242e
779[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201403.pdf/d89861aa-771b-df93-97b9-eb2087747581
780[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201412.pdf/ba645dee-85c0-1baa-8d05-1d06e41e44fc
781[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201603.pdf/4f5620ca-bb4c-9b83-4d56-4642048b6b42
782[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201606.pdf/ea39bb65-4d64-cbd0-258e-ccdf9f334f22
783[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201609.pdf/07c53b95-591a-77ca-fefc-d995bdfba1f3
784[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes_diciembre_2013.pdf/4e9d3f1a-1392-560a-4147-77f9ec3d417b
785[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes-diciembre-2015.pdf/99e15269-383d-b285-b4d8-f08d6db1de12
786[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes_igemar_0313.pdf/70cdd43d-12d3-e6c3-1762-fad64b963f7d
787[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes_junio_2014.pdf/af19aa56-6ac0-2ba1-c575-c4025defd163
788[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes_junio_2015.pdf/2171c120-6482-06a1-07e1-2d65099588a5
789[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes_septiembre_2014.pdf/173e652a-a45e-6a6a-927c-71dc94ab38da
790[*] https://www.igemar.cl/documents/34275/34705/179_hechos-relevantes-septiembre-2015.pdf/de515067-9408-85f9-5666-f2814362c514
791[*] https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201306.pdf/88cc5920-eeab-205a-a0ff-98fce76f5f32
792[*] https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201309.pdf/15d14ee0-5199-f543-15ad-01d9301a419e
793[*] https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201412.pdf/1180d807-ecac-a845-39ea-6a868ea4c47b
794[*] https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201503.pdf/e1fbc168-07ed-08c1-ca69-a27d9ec23314
795[*] https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado_diciembre_2013.pdf/a922f72d-4b77-a19f-8049-bba15d2327cc
796[*] https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado_junio_2015.pdf/0e448547-b6cf-f304-5904-4f430308515c
797[*] https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado_septiembre_2014.pdf/9b871d1e-0f95-0838-a7a4-fe807ffd2501
798[*] https://www.igemar.cl/documents/34275/34705/179_xa1lisis-razonado-septiembre-2015.pdf/522c0024-5563-9a06-1064-8bd797af9c37
799[*] https://www.igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201306.pdf/9d751e76-f024-5628-6d91-fdf74aaa37ea
800[*] https://www.igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201309.pdf/30f0d1bb-fae9-6cfd-3320-85f76c78a8fb
801[*] https://www.igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201412.pdf/4727ab6b-16df-b7c4-bace-1d7c10331a33
802[*] https://www.igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201503.pdf/bdc8140a-a884-3e3b-ce19-b178d6b45d6b
803[*] https://www.igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad_diciembre_2013.pdf/4fa057e0-59a5-3f5f-ad49-1dbe6bc1a850
804[*] https://www.igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad_igemar_0313.pdf/5737843e-896a-5fc0-a4d6-925298a7b7ee
805[*] https://www.igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad_junio_2015.pdf/d9c3f090-b779-48d0-1284-dccfc0a3cdd9
806[*] https://www.igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad_septiembre_2014.pdf/ff313834-6517-aefb-84d4-90ef5daf0961
807[*] https://www.igemar.cl/documents/34275/34705/179_xb3n-responsabilidad-septiembre-2015.pdf/b71a50b7-beed-add9-9231-d7481221551a
808[*] https://www.igemar.cl/documents/34275/34705/Analisis_Razonado91123000_201712.pdf/882c4c22-3bfe-0ce7-3ac1-09226c215fa2
809[*] https://www.igemar.cl/documents/34275/34705/Declaracion_de_responsabilidad91123000_201712.pdf/ec60ec62-30c5-ed79-a12c-a28b378ce84a
810[*] https://www.igemar.cl/documents/34275/34705/Estados_financieros91123000_201712.pdf/a652e445-8218-0a67-dd4a-487c9e752466
811[*] https://www.igemar.cl/documents/34275/34705/Hechos_Relevantes91123000_201503.pdf/261c32ea-ef6a-d334-5e83-4a795258016d
812[*] https://www.igemar.cl/documents/34275/34705/Hechos_Relevantes91123000_201712.pdf/1c8a07a5-7748-750d-def4-fa44e64813ca
813[*] https://www.igemar.cl/documents/34275/34705/Igemar_AR_2016.pdf/99357c62-5fce-f212-bba4-187b04802a17
814[*] https://www.igemar.cl/documents/34275/34705/Igemar_DR_2016.pdf/e0810c51-cca5-05f0-79a5-bb6409c42e52
815[*] https://www.igemar.cl/documents/34275/34705/Igemar_eeff_2016.pdf/cd7cca3e-1dab-058c-d57a-e2283fd8bb8a
816[*] https://www.igemar.cl/documents/34275/34705/Igemar_HR_2016.pdf/70415e75-d832-ad69-9986-0bb5314bae63
817[*] https://www.igemar.cl/documents/34275/34708/197_acta_junta2014.pdf/fc41ee7b-110b-237e-2a63-44dce010b1aa
818[*] https://www.igemar.cl/documents/34275/34708/197_acta-junta-igemar.pdf/3c1a510b-5618-689c-e9d2-f9196a0eacbe
819[*] https://www.igemar.cl/documents/34275/34708/206_acta_igemar_2016.pdf/151cf0db-026a-7396-c3bf-da2aeefb98f1
820[*] https://www.igemar.cl/documents/34275/34708/Acta+Junta+2017+Igemar.pdf/cd44d4c4-b7e4-253b-ab6a-d400b4424943
821[*] https://www.igemar.cl/documents/34275/34708/ActaJuntaExtraordinaria2018.pdf/402fca9a-724f-5ac2-4218-aff51bd030d2
822[*] https://www.igemar.cl/documents/34275/34708/Acta_Junta_Igemar_2019.pdf/f74084fc-0265-c92d-6cd0-c9acd9a8f55f
823[*] https://www.igemar.cl/documents/34275/34708/ActaJuntaOrdinaria2018.pdf/145fe6a8-67dd-8bc3-83ad-db296dd1611f
824[*] https://www.igemar.cl/documents/34275/34708/Aviso_Junta2019_Igemar.pdf/2b1fe919-9572-6cf5-5e15-55fc85c19499
825[*] https://www.igemar.cl/documents/34275/34708/candidatos2019_Igemar.pdf/b0b7dce7-2fc0-9920-8e0d-017a7446c672
826[*] https://www.igemar.cl/documents/34275/34708/Citacion_Junta2019_Igemar.pdf/8a126a9b-23bc-d68e-601c-6ae939ae3175
827[*] https://www.igemar.cl/documents/34275/34708/EEFF_dic2018.pdf/b4c1b7d4-41ae-0d6b-8935-f705a21a1835
828[*] https://www.igemar.cl/documents/34275/34708/Fundamentos_Designacion_Auditores_Igemar.pdf/4f60033a-13ec-24e5-ff9a-3f741217f784
829[*] https://www.igemar.cl/documents/34275/34720/An%C3%A1lisis_Razonado91123000_201709.pdf/5df24712-f409-ce76-4994-21424823e940
830[*] https://www.igemar.cl/documents/34275/34720/AR_0317.pdf/ae9b45e1-cca0-30e6-52f1-01d8cbd8ffb7
831[*] https://www.igemar.cl/documents/34275/34720/Declaraci%C3%B3n_de_responsabilidad91123000_201709.pdf/6d38b44a-d804-a70b-badf-b7d19be7ca27
832[*] https://www.igemar.cl/documents/34275/34720/DR0317.pdf/667adaa0-68c8-d457-c621-50670ca7650e
833[*] https://www.igemar.cl/documents/34275/34720/EFF0317.pdf/231e310b-2d87-fa78-320d-58da1762137a
834[*] https://www.igemar.cl/documents/34275/34720/Estados_financieros_%28PDF%2991123000_201709.pdf/7c422914-ee17-091d-f402-d058d322fc75
835[*] https://www.igemar.cl/documents/34275/34720/Hechos_Relevantes91123000_201709.pdf/9c70f235-b920-82c4-b392-331bcb91a6ce
836[*] https://www.igemar.cl/documents/34275/34720/HR0317.pdf/b421cc79-1ac9-193b-e224-d499b853714a
837[*] https://www.igemar.cl/#gobierno
838[*] https://www.igemar.cl/#inversionistas
839[*] https://www.igemar.cl/#main-content
840[*] https://www.igemar.cl/#memorias
841[*] https://www.igemar.cl/#negocios
842[*] https://www.igemar.cl/#principal
843[*] https://www.igemar.cl/#quienessomos
844[*] https://www.igemar.cl/www.igemar.cl
845[*] http://www.corpesca.cl/
846[*] http://www.igemar.cl/
847[*] http://www.orizon.cl/
848[*] http://www.sercor.cl/
849cut: intervalle de champ incorrecte
850Saisissez « cut --help » pour plus d'informations.
851[INFO] BING shows 52.52.234.222 is shared with 82 hosts/vhosts
852[INFO] Shodan detected the following opened ports on 52.52.234.222:
853[*] 443
854[*] 80
855[INFO] ------VirusTotal SECTION------
856[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
857[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
858[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
859[INFO] ------Alexa Rank SECTION------
860[INFO] Percent of Visitors Rank in Country:
861[INFO] Percent of Search Traffic:
862[INFO] Percent of Unique Visits:
863[INFO] Total Sites Linking In:
864[*] Total Sites
865[INFO] Useful links related to www.igemar.cl - 52.52.234.222:
866[*] https://www.virustotal.com/pt/ip-address/52.52.234.222/information/
867[*] https://www.hybrid-analysis.com/search?host=52.52.234.222
868[*] https://www.shodan.io/host/52.52.234.222
869[*] https://www.senderbase.org/lookup/?search_string=52.52.234.222
870[*] https://www.alienvault.com/open-threat-exchange/ip/52.52.234.222
871[*] http://pastebin.com/search?q=52.52.234.222
872[*] http://urlquery.net/search.php?q=52.52.234.222
873[*] http://www.alexa.com/siteinfo/www.igemar.cl
874[*] http://www.google.com/safebrowsing/diagnostic?site=www.igemar.cl
875[*] https://censys.io/ipv4/52.52.234.222
876[*] https://www.abuseipdb.com/check/52.52.234.222
877[*] https://urlscan.io/search/#52.52.234.222
878[*] https://github.com/search?q=52.52.234.222&type=Code
879[INFO] Useful links related to AS16509 - 52.52.0.0/15:
880[*] http://www.google.com/safebrowsing/diagnostic?site=AS:16509
881[*] https://www.senderbase.org/lookup/?search_string=52.52.0.0/15
882[*] http://bgp.he.net/AS16509
883[*] https://stat.ripe.net/AS16509
884[INFO] Date: 05/03/20 | Time: 22:41:26
885[INFO] Total time: 3 minute(s) and 17 second(s)
886###################################################################################################################################
887Trying "igemar.cl"
888;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3883
889;; flags: qr rd ra; QUERY: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 0
890
891;; QUESTION SECTION:
892;igemar.cl. IN ANY
893
894;; ANSWER SECTION:
895igemar.cl. 30 IN MX 0 igemar-cl.mail.protection.outlook.com.
896igemar.cl. 30 IN A 52.52.234.222
897igemar.cl. 30 IN SOA pub-ns1.redtogreen.cl. pub-ns2.redtogreen.cl. 2020022701 3600 3600 1209600 30
898igemar.cl. 3600 IN TXT "v=spf1 include:spf.protection.outlook.com -all"
899igemar.cl. 3600 IN TXT "MS=ms52251860"
900igemar.cl. 30 IN NS pub-ns1.redtogreen.cl.
901igemar.cl. 30 IN NS pub-ns2.redtogreen.cl.
902
903Received 272 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 167 ms
904#####################################################################################################################################
905; <<>> DiG 9.11.16-2-Debian <<>> +trace igemar.cl any
906;; global options: +cmd
907. 41291 IN NS b.root-servers.net.
908. 41291 IN NS k.root-servers.net.
909. 41291 IN NS f.root-servers.net.
910. 41291 IN NS c.root-servers.net.
911. 41291 IN NS g.root-servers.net.
912. 41291 IN NS j.root-servers.net.
913. 41291 IN NS d.root-servers.net.
914. 41291 IN NS e.root-servers.net.
915. 41291 IN NS m.root-servers.net.
916. 41291 IN NS h.root-servers.net.
917. 41291 IN NS i.root-servers.net.
918. 41291 IN NS l.root-servers.net.
919. 41291 IN NS a.root-servers.net.
920. 41291 IN RRSIG NS 8 0 518400 20200318220000 20200305210000 33853 . 3V0U45kJIeNCHAi3ZNgFlUOKrjheWd8FIAwDOKnkFp23dZZUnTbjjheB nvdYfiLAMFD+Bi3ra5f5PmW2pcADtKKz/0UCG8Hxg+XXrBv3perzNePs 7cSivqaO3ugpnX6CLW8dQ5mv+rzfo6MKtxnY6NDcOaazqpvK2+uBbOTE RtTktpvlQLDLNU5TfpX/YV/pinyqZGNavbnQLktvvTzKd4ugftLHKeCq pKQIblazELiNacWf1psoKqEjx0CmcK1F7Zss0Y/rS+SuTgPiPWsU1vsM A1uOQTdwoVFl0gqWSqezggQNYygtNxNlYy+9LKjTSb0LKPSpb1Eo7Ex0 asDoRw==
921;; Received 525 bytes from 10.101.0.243#53(10.101.0.243) in 224 ms
922
923cl. 172800 IN NS c.nic.cl.
924cl. 172800 IN NS a.nic.cl.
925cl. 172800 IN NS cl2-tld.d-zone.ca.
926cl. 172800 IN NS cl1.dnsnode.net.
927cl. 172800 IN NS cl-ns.anycast.pch.net.
928cl. 172800 IN NS b.nic.cl.
929cl. 172800 IN NS cl1-tld.d-zone.ca.
930cl. 86400 IN DS 21199 8 2 7D756DFFAB6D3CD9C786FF5C659954C22944FAEF9433EEE26F1D84EB 5370B394
931cl. 86400 IN RRSIG DS 8 1 86400 20200318220000 20200305210000 33853 . zamayD1tmP/pI5l8ujdQ6Pz//6zb7LF71DBZvcsbtyL4ppkslsxjvdQD gJmWLoy617FAmNkiMiYVMGft6dQjU8uGV7NXQBIjvduEcHa9dCprH5K7 e/7xncTpSUbyNvvDArJB52XWZPrZqGbdaS7n6rR6n4S1vnvFME7HaGwb ruttUV/EQjOWOlycvV6qXEv4TVcBpTCVOraCUbw22GDLu+hBcVUBeyQp eMZDQvP4YrHKOTBHOOsPfYx0a/uQk6e+QeMUYvylocUZ5MMKTdK1vggh rweNOv+0c6/PmNJXJK11cG/9xYP1oWeHHrBrTkDT8GkTTPwVIO7We2r0 RJGoVw==
932;; Received 819 bytes from 2001:dc3::35#53(m.root-servers.net) in 87 ms
933
934igemar.cl. 3600 IN NS sigma-inter.sigma.cl.
935igemar.cl. 3600 IN NS sigma-inter2.sigma.cl.
9363njbblpr23kfqbpddp6grvcdkp7n3m4h.cl. 900 IN NSEC3 1 1 2 F9704E303681F704A7D0B4DEEC5296DA 3T29PVC45SK01N00CNKBNN5V00S2B65H NS SOA TXT RRSIG DNSKEY NSEC3PARAM
9373njbblpr23kfqbpddp6grvcdkp7n3m4h.cl. 900 IN RRSIG NSEC3 8 2 900 20200419144511 20200306023024 24384 cl. dvpfKopFVlYd6BCtyVDrdFQYRWmSt798j8R6+tgPhY8p+oGa/PLngFKh 71UWPLEs1lI4bjf3Dpz6nj7wvKiUN4WxjKFsZ2sJC9HzWPILymq3uMqR grpESdTcH8NnOPxF2VE0VebiSbhZ7m8W/1AhJXSkjcblzqxJxbeeUOVN VUs=
938i71d2i5k9dvf28c41dhru54ea6irmt1s.cl. 900 IN NSEC3 1 1 2 F9704E303681F704A7D0B4DEEC5296DA IMFTC6GNGDI7BUJ5BRQ1RH5E9VM37EFU NS DS RRSIG
939i71d2i5k9dvf28c41dhru54ea6irmt1s.cl. 900 IN RRSIG NSEC3 8 2 900 20200419134140 20200306023024 24384 cl. AtwWVCrItIWfAd/F3m35lqiyzUu0yuBqE+UWWv5iZSE1vOe0ulVHsq7N wZbFzE+rxOSu8u7tXqstejLqYFTxxrKh25lNBfqISV/JStcRDH6HSroT kk+p0RcjJ8F8b+bpfdrvLEXSF3Q5Iy7/3/p5qfJLy5d4ipQsVJnJL+XW zBs=
940;; Received 676 bytes from 200.7.4.7#53(b.nic.cl) in 153 ms
941
942igemar.cl. 3600 IN TXT "v=spf1 include:spf.protection.outlook.com -all"
943igemar.cl. 3600 IN TXT "MS=ms52251860"
944igemar.cl. 30 IN SOA pub-ns1.redtogreen.cl. pub-ns2.redtogreen.cl. 2020022701 3600 3600 1209600 30
945igemar.cl. 30 IN A 52.52.234.222
946igemar.cl. 30 IN NS pub-ns1.redtogreen.cl.
947igemar.cl. 30 IN NS pub-ns2.redtogreen.cl.
948igemar.cl. 30 IN MX 0 igemar-cl.mail.protection.outlook.com.
949;; Received 315 bytes from 200.54.240.104#53(sigma-inter2.sigma.cl) in 449 ms
950####################################################################################################################################
951[*] Performing General Enumeration of Domain: igemar.cl
952[-] DNSSEC is not configured for igemar.cl
953[*] SOA pub-ns1.redtogreen.cl 164.77.211.200
954[*] NS pub-ns1.redtogreen.cl 164.77.211.200
955[*] Bind Version for 164.77.211.200 b'9.9.4-RedHat-9.9.4-74.el7_6.1'
956[*] NS pub-ns2.redtogreen.cl 200.54.240.104
957[*] Bind Version for 200.54.240.104 b'9.9.4-RedHat-9.9.4-74.el7_6.1'
958[*] MX igemar-cl.mail.protection.outlook.com 104.47.58.110
959[*] MX igemar-cl.mail.protection.outlook.com 104.47.55.110
960[*] A igemar.cl 52.52.234.222
961[*] Enumerating SRV Records
962[*] SRV _sip._tls.igemar.cl sipdir.online.lync.com 52.112.192.139 443 1
963[*] SRV _sip._tls.igemar.cl sipdir.online.lync.com 2603:1027:0:3::b 443 1
964[*] SRV _sipfederationtls._tcp.igemar.cl sipfed.online.lync.com 52.112.194.75 5061 1
965[*] SRV _sipfederationtls._tcp.igemar.cl sipfed.online.lync.com 2603:1027:0:9::b 5061 1
966[+] 4 Records Found
967####################################################################################################################################
968 AVAILABLE PLUGINS
969 -----------------
970
971 RobotPlugin
972 OpenSslCipherSuitesPlugin
973 OpenSslCcsInjectionPlugin
974 EarlyDataPlugin
975 SessionResumptionPlugin
976 SessionRenegotiationPlugin
977 CertificateInfoPlugin
978 CompressionPlugin
979 FallbackScsvPlugin
980 HttpHeadersPlugin
981 HeartbleedPlugin
982
983
984
985 CHECKING HOST(S) AVAILABILITY
986 -----------------------------
987
988 52.52.234.222:443 => 52.52.234.222
989
990
991
992
993 SCAN RESULTS FOR 52.52.234.222:443 - 52.52.234.222
994 --------------------------------------------------
995
996 * OpenSSL Heartbleed:
997 OK - Not vulnerable to Heartbleed
998
999 * Deflate Compression:
1000 OK - Compression disabled
1001
1002 * OpenSSL CCS Injection:
1003 OK - Not vulnerable to OpenSSL CCS injection
1004
1005 * TLSV1_1 Cipher Suites:
1006 Forward Secrecy OK - Supported
1007 RC4 INSECURE - Supported
1008
1009 Preferred:
1010 None - Server followed client cipher suite preference.
1011 Accepted:
1012 TLS_RSA_WITH_SEED_CBC_SHA 128 bits HTTP 404 Not Found
1013 TLS_RSA_WITH_RC4_128_SHA 128 bits HTTP 404 Not Found
1014 TLS_RSA_WITH_RC4_128_MD5 128 bits HTTP 404 Not Found
1015 TLS_RSA_WITH_IDEA_CBC_SHA 128 bits HTTP 404 Not Found
1016 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 404 Not Found
1017 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 404 Not Found
1018 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
1019 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
1020 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 404 Not Found
1021 TLS_ECDHE_RSA_WITH_RC4_128_SHA 128 bits HTTP 404 Not Found
1022 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
1023 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
1024 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 404 Not Found
1025 TLS_DHE_RSA_WITH_SEED_CBC_SHA 128 bits HTTP 404 Not Found
1026 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 404 Not Found
1027 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 404 Not Found
1028 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
1029 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
1030 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 404 Not Found
1031
1032 * TLSV1 Cipher Suites:
1033 Forward Secrecy OK - Supported
1034 RC4 INSECURE - Supported
1035
1036 Preferred:
1037 None - Server followed client cipher suite preference.
1038 Accepted:
1039 TLS_RSA_WITH_SEED_CBC_SHA 128 bits HTTP 404 Not Found
1040 TLS_RSA_WITH_RC4_128_SHA 128 bits HTTP 404 Not Found
1041 TLS_RSA_WITH_RC4_128_MD5 128 bits HTTP 404 Not Found
1042 TLS_RSA_WITH_IDEA_CBC_SHA 128 bits HTTP 404 Not Found
1043 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 404 Not Found
1044 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 404 Not Found
1045 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
1046 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
1047 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 404 Not Found
1048 TLS_ECDHE_RSA_WITH_RC4_128_SHA 128 bits HTTP 404 Not Found
1049 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
1050 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
1051 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 404 Not Found
1052 TLS_DHE_RSA_WITH_SEED_CBC_SHA 128 bits HTTP 404 Not Found
1053 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 404 Not Found
1054 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 404 Not Found
1055 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
1056 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
1057 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits Timeout on HTTP GET
1058
1059 * TLSV1_2 Cipher Suites:
1060 Forward Secrecy OK - Supported
1061 RC4 INSECURE - Supported
1062
1063 Preferred:
1064 None - Server followed client cipher suite preference.
1065 Accepted:
1066 TLS_RSA_WITH_SEED_CBC_SHA 128 bits HTTP 404 Not Found
1067 TLS_RSA_WITH_RC4_128_SHA 128 bits Timeout on HTTP GET
1068 TLS_RSA_WITH_RC4_128_MD5 128 bits HTTP 404 Not Found
1069 TLS_RSA_WITH_IDEA_CBC_SHA 128 bits HTTP 404 Not Found
1070 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 404 Not Found
1071 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 404 Not Found
1072 TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 404 Not Found
1073 TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 404 Not Found
1074 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
1075 TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 404 Not Found
1076 TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 404 Not Found
1077 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
1078 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 404 Not Found
1079 TLS_ECDHE_RSA_WITH_RC4_128_SHA 128 bits HTTP 404 Not Found
1080 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 404 Not Found
1081 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 404 Not Found
1082 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
1083 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 404 Not Found
1084 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 404 Not Found
1085 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
1086 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 404 Not Found
1087 TLS_DHE_RSA_WITH_SEED_CBC_SHA 128 bits HTTP 404 Not Found
1088 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 404 Not Found
1089 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 404 Not Found
1090 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 404 Not Found
1091 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 404 Not Found
1092 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
1093 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 404 Not Found
1094 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 404 Not Found
1095 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
1096 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 404 Not Found
1097 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 404 Not Found
1098
1099 * TLS 1.2 Session Resumption Support:
1100 With Session IDs: PARTIALLY SUPPORTED (2 successful, 3 failed, 0 errors, 5 total attempts).
1101 With TLS Tickets: OK - Supported
1102
1103 * Certificate Information:
1104 Content
1105 SHA1 Fingerprint: 25828887a46c79493ef52844a5892a5aa962d94a
1106 Common Name: www.siemel.cl
1107 Issuer: Sectigo RSA Domain Validation Secure Server CA
1108 Serial Number: 174753422455441198131053605908069173878
1109 Not Before: 2019-04-10 00:00:00
1110 Not After: 2021-04-09 23:59:59
1111 Signature Algorithm: sha256
1112 Public Key Algorithm: RSA
1113 Key Size: 2048
1114 Exponent: 65537 (0x10001)
1115 DNS Subject Alternative Names: ['www.siemel.cl', 'siemel.cl']
1116
1117 Trust
1118 Hostname Validation: FAILED - Certificate does NOT match 52.52.234.222
1119 Android CA Store (9.0.0_r9): OK - Certificate is trusted
1120 Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):OK - Certificate is trusted
1121 Java CA Store (jdk-12.0.1): OK - Certificate is trusted
1122 Mozilla CA Store (2019-03-14): OK - Certificate is trusted
1123 Windows CA Store (2019-05-27): OK - Certificate is trusted
1124 Symantec 2018 Deprecation: WARNING: Certificate distrusted by Google and Mozilla on September 2018
1125 Received Chain: www.siemel.cl --> Sectigo RSA Domain Validation Secure Server CA
1126 Verified Chain: www.siemel.cl --> Sectigo RSA Domain Validation Secure Server CA --> USERTrust RSA Certification Authority
1127 Received Chain Contains Anchor: OK - Anchor certificate not sent
1128 Received Chain Order: OK - Order is valid
1129 Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
1130
1131 Extensions
1132 OCSP Must-Staple: NOT SUPPORTED - Extension not found
1133 Certificate Transparency: OK - 3 SCTs included
1134
1135 OCSP Stapling
1136 NOT SUPPORTED - Server did not send back an OCSP response
1137
1138 * Session Renegotiation:
1139 Client-initiated Renegotiation: OK - Rejected
1140 Secure Renegotiation: OK - Supported
1141
1142 * SSLV2 Cipher Suites:
1143 Server rejected all cipher suites.
1144
1145 * Downgrade Attacks:
1146 TLS_FALLBACK_SCSV: OK - Supported
1147
1148 * TLSV1_3 Cipher Suites:
1149 Server rejected all cipher suites.
1150
1151 * SSLV3 Cipher Suites:
1152 Server rejected all cipher suites.
1153
1154 * ROBOT Attack:
1155 OK - Not vulnerable
1156
1157
1158 SCAN COMPLETED IN 45.38 S
1159 -------------------------
1160####################################################################################################################################
1161traceroute to www.igemar.cl (52.52.234.222), 30 hops max, 60 byte packets
1162 1 _gateway (10.202.9.1) 113.765 ms 234.691 ms 234.685 ms
1163 2 unn-84-17-52-126.cdn77.com (84.17.52.126) 234.670 ms 234.644 ms 234.626 ms
1164 3 5.56.20.161 (5.56.20.161) 234.606 ms 234.586 ms 234.567 ms
1165 4 ae12-2022.fra10.core-backbone.com (81.95.15.57) 234.550 ms 234.531 ms 234.510 ms
1166 5 ae26.cr10-fra2.ip4.gtt.net (87.119.97.189) 234.516 ms 234.496 ms 339.220 ms
1167 6 et-0-0-31.cr5-sjc1.ip4.gtt.net (89.149.180.38) 454.984 ms 333.900 ms 278.143 ms
1168 7 a100-us-gw.ip4.gtt.net (173.241.129.142) 278.091 ms 278.094 ms 278.032 ms
1169 8 54.240.242.48 (54.240.242.48) 346.541 ms 54.240.242.68 (54.240.242.68) 346.545 ms 278.832 ms
1170 9 54.240.242.127 (54.240.242.127) 279.683 ms 279.694 ms 54.240.242.27 (54.240.242.27) 279.737 ms
117110 72.21.222.17 (72.21.222.17) 279.498 ms 52.93.47.88 (52.93.47.88) 346.446 ms 72.21.222.17 (72.21.222.17) 279.459 ms
1172####################################################################################################################################
1173Domains still to check: 1
1174 Checking if the hostname igemar.cl. given is in fact a domain...
1175
1176Analyzing domain: igemar.cl.
1177 Checking NameServers using system default resolver...
1178 IP: 200.54.240.104 (Chile)
1179 HostName: pub-ns2.redtogreen.cl Type: NS
1180 HostName: sigma-inter2.sigma.cl Type: PTR
1181 IP: 164.77.211.200 (Chile)
1182 HostName: pub-ns1.redtogreen.cl Type: NS
1183
1184 Checking MailServers using system default resolver...
1185 IP: 104.47.70.110 (United States)
1186 HostName: igemar-cl.mail.protection.outlook.com Type: MX
1187 IP: 104.47.58.110 (United States)
1188 HostName: igemar-cl.mail.protection.outlook.com Type: MX
1189
1190 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
1191 No zone transfer found on nameserver 164.77.211.200
1192 No zone transfer found on nameserver 200.54.240.104
1193
1194 Checking SPF record...
1195
1196 Checking SPF record...
1197 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.92.0.0/15, but only the network IP
1198 New IP found: 40.92.0.0
1199 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.107.0.0/16, but only the network IP
1200 New IP found: 40.107.0.0
1201 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 52.100.0.0/14, but only the network IP
1202 New IP found: 52.100.0.0
1203 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 104.47.0.0/17, but only the network IP
1204 New IP found: 104.47.0.0
1205 There are no IPv4 addresses in the SPF. Maybe IPv6.
1206 There are no IPv4 addresses in the SPF. Maybe IPv6.
1207
1208 Checking 192 most common hostnames using system default resolver...
1209 IP: 52.52.234.222 (United States)
1210 HostName: www.igemar.cl. Type: A
1211
1212 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
1213 Checking netblock 52.100.0.0
1214 Checking netblock 164.77.211.0
1215 Checking netblock 52.52.234.0
1216 Checking netblock 104.47.70.0
1217 Checking netblock 200.54.240.0
1218 Checking netblock 104.47.0.0
1219 Checking netblock 104.47.58.0
1220 Checking netblock 40.107.0.0
1221 Checking netblock 40.92.0.0
1222
1223 Searching for igemar.cl. emails in Google
1224 gerenciageneral@igemar.cl.
1225
1226 Checking 9 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
1227 Host 52.100.0.0 is down
1228 Host 164.77.211.200 is up (reset ttl 43)
1229 Host 52.52.234.222 is up (syn-ack ttl 228)
1230 Host 104.47.70.110 is up (syn-ack ttl 112)
1231 Host 200.54.240.104 is up (reset ttl 43)
1232 Host 104.47.0.0 is down
1233 Host 104.47.58.110 is up (syn-ack ttl 110)
1234 Host 40.107.0.0 is down
1235 Host 40.92.0.0 is down
1236
1237 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
1238 Scanning ip 164.77.211.200 (pub-ns1.redtogreen.cl):
1239 53/tcp open domain syn-ack ttl 41 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
1240 | dns-nsid:
1241 |_ bind.version: 9.9.4-RedHat-9.9.4-74.el7_6.1
1242 Device type: specialized|router|printer|general purpose|WAP
1243 OS Info: Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
1244 Scanning ip 52.52.234.222 (www.igemar.cl.):
1245 80/tcp open http syn-ack ttl 228 Apache httpd 2.2.34
1246 | http-methods:
1247 |_ Supported Methods: GET HEAD POST OPTIONS
1248 |_http-server-header: Apache/2.2.34 (Amazon)
1249 |_http-title: Did not follow redirect to https://52.52.234.222/
1250 443/tcp open ssl/http syn-ack ttl 228 Apache Tomcat/Coyote JSP engine 1.1
1251 | http-methods:
1252 |_ Supported Methods: GET HEAD POST
1253 | http-server-header:
1254 | Apache-Coyote/1.1
1255 |_ Apache/2.2.34 (Amazon)
1256 |_http-title: Estado - Sercor
1257 | ssl-cert: Subject: commonName=www.siemel.cl
1258 | Subject Alternative Name: DNS:www.siemel.cl, DNS:siemel.cl
1259 | Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1260 | Public Key type: rsa
1261 | Public Key bits: 2048
1262 | Signature Algorithm: sha256WithRSAEncryption
1263 | Not valid before: 2019-04-10T00:00:00
1264 | Not valid after: 2021-04-09T23:59:59
1265 | MD5: eb43 314c 77ad e4fd 6598 6473 ba7d e350
1266 |_SHA-1: 2582 8887 a46c 7949 3ef5 2844 a589 2a5a a962 d94a
1267 |_ssl-date: TLS randomness does not represent time
1268 OS Info: Service Info: Host: inversionistas.antarchile.cl
1269 Scanning ip 104.47.70.110 (igemar-cl.mail.protection.outlook.com):
1270 25/tcp open smtp syn-ack ttl 112 Microsoft Exchange smtpd
1271 | smtp-commands: BN7NAM10FT025.mail.protection.outlook.com Hello [84.17.52.11], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
1272 |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
1273 | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
1274 | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
1275 | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
1276 | Public Key type: rsa
1277 | Public Key bits: 2048
1278 | Signature Algorithm: sha256WithRSAEncryption
1279 | Not valid before: 2018-05-18T22:06:55
1280 | Not valid after: 2020-05-18T22:06:55
1281 | MD5: fedc 1f64 4917 777a 5361 1fc9 3a9d 733e
1282 |_SHA-1: 73b8 9750 fa40 6f7d 4f7e 43a9 355a 9d27 1079 e938
1283 |_ssl-date: 2020-03-06T03:56:13+00:00; -3s from scanner time.
1284 OS Info: Service Info: Host: BN7NAM10FT033.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
1285 |_clock-skew: -3s
1286 Scanning ip 200.54.240.104 (sigma-inter2.sigma.cl (PTR)):
1287 53/tcp open domain syn-ack ttl 40 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
1288 | dns-nsid:
1289 |_ bind.version: 9.9.4-RedHat-9.9.4-74.el7_6.1
1290 Device type: specialized|router|printer|general purpose|WAP
1291 OS Info: Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
1292 Scanning ip 104.47.58.110 (igemar-cl.mail.protection.outlook.com):
1293 25/tcp open smtp syn-ack ttl 110 Microsoft Exchange smtpd
1294 | smtp-commands: DM6NAM10FT063.mail.protection.outlook.com Hello [84.17.52.11], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
1295 |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
1296 | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
1297 | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
1298 | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
1299 | Public Key type: rsa
1300 | Public Key bits: 2048
1301 | Signature Algorithm: sha256WithRSAEncryption
1302 | Not valid before: 2018-05-18T22:06:55
1303 | Not valid after: 2020-05-18T22:06:55
1304 | MD5: fedc 1f64 4917 777a 5361 1fc9 3a9d 733e
1305 |_SHA-1: 73b8 9750 fa40 6f7d 4f7e 43a9 355a 9d27 1079 e938
1306 |_ssl-date: 2020-03-06T03:57:20+00:00; -2s from scanner time.
1307 OS Info: Service Info: Host: DM6NAM10FT045.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
1308 |_clock-skew: -2s
1309 WebCrawling domain's web servers... up to 50 max links.
1310
1311 + URL to crawl: http://www.igemar.cl.
1312 + Date: 2020-03-05
1313
1314 + Crawling URL: http://www.igemar.cl.:
1315 + Links:
1316 + Crawling http://www.igemar.cl. (404 Not Found)
1317 + Searching for directories...
1318 + Searching open folders...
1319
1320
1321 + URL to crawl: https://www.igemar.cl.
1322 + Date: 2020-03-05
1323
1324 + Crawling URL: https://www.igemar.cl.:
1325 + Links:
1326 + Crawling https://www.igemar.cl.
1327 + Searching for directories...
1328 + Searching open folders...
1329
1330--Finished--
1331Summary information for domain igemar.cl.
1332-----------------------------------------
1333 Domain Specific Information:
1334 Email: gerenciageneral@igemar.cl.
1335
1336 Domain Ips Information:
1337 IP: 52.100.0.0
1338 Type: SPF
1339 Is Active: False
1340 IP: 164.77.211.200
1341 HostName: pub-ns1.redtogreen.cl Type: NS
1342 Country: Chile
1343 Is Active: True (reset ttl 43)
1344 Port: 53/tcp open domain syn-ack ttl 41 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
1345 Script Info: | dns-nsid:
1346 Script Info: |_ bind.version: 9.9.4-RedHat-9.9.4-74.el7_6.1
1347 Script Info: Device type: specialized|router|printer|general purpose|WAP
1348 Os Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
1349 IP: 52.52.234.222
1350 HostName: www.igemar.cl. Type: A
1351 Country: United States
1352 Is Active: True (syn-ack ttl 228)
1353 Port: 80/tcp open http syn-ack ttl 228 Apache httpd 2.2.34
1354 Script Info: | http-methods:
1355 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1356 Script Info: |_http-server-header: Apache/2.2.34 (Amazon)
1357 Script Info: |_http-title: Did not follow redirect to https://52.52.234.222/
1358 Port: 443/tcp open ssl/http syn-ack ttl 228 Apache Tomcat/Coyote JSP engine 1.1
1359 Script Info: | http-methods:
1360 Script Info: |_ Supported Methods: GET HEAD POST
1361 Script Info: | http-server-header:
1362 Script Info: | Apache-Coyote/1.1
1363 Script Info: |_ Apache/2.2.34 (Amazon)
1364 Script Info: |_http-title: Estado - Sercor
1365 Script Info: | ssl-cert: Subject: commonName=www.siemel.cl
1366 Script Info: | Subject Alternative Name: DNS:www.siemel.cl, DNS:siemel.cl
1367 Script Info: | Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1368 Script Info: | Public Key type: rsa
1369 Script Info: | Public Key bits: 2048
1370 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1371 Script Info: | Not valid before: 2019-04-10T00:00:00
1372 Script Info: | Not valid after: 2021-04-09T23:59:59
1373 Script Info: | MD5: eb43 314c 77ad e4fd 6598 6473 ba7d e350
1374 Script Info: |_SHA-1: 2582 8887 a46c 7949 3ef5 2844 a589 2a5a a962 d94a
1375 Script Info: |_ssl-date: TLS randomness does not represent time
1376 Os Info: Host: inversionistas.antarchile.cl
1377 IP: 104.47.70.110
1378 HostName: igemar-cl.mail.protection.outlook.com Type: MX
1379 Country: United States
1380 Is Active: True (syn-ack ttl 112)
1381 Port: 25/tcp open smtp syn-ack ttl 112 Microsoft Exchange smtpd
1382 Script Info: | smtp-commands: BN7NAM10FT025.mail.protection.outlook.com Hello [84.17.52.11], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
1383 Script Info: |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
1384 Script Info: | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
1385 Script Info: | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
1386 Script Info: | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
1387 Script Info: | Public Key type: rsa
1388 Script Info: | Public Key bits: 2048
1389 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1390 Script Info: | Not valid before: 2018-05-18T22:06:55
1391 Script Info: | Not valid after: 2020-05-18T22:06:55
1392 Script Info: | MD5: fedc 1f64 4917 777a 5361 1fc9 3a9d 733e
1393 Script Info: |_SHA-1: 73b8 9750 fa40 6f7d 4f7e 43a9 355a 9d27 1079 e938
1394 Script Info: |_ssl-date: 2020-03-06T03:56:13+00:00; -3s from scanner time.
1395 Os Info: Host: BN7NAM10FT033.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
1396 Script Info: |_clock-skew: -3s
1397 IP: 200.54.240.104
1398 HostName: pub-ns2.redtogreen.cl Type: NS
1399 HostName: sigma-inter2.sigma.cl Type: PTR
1400 Country: Chile
1401 Is Active: True (reset ttl 43)
1402 Port: 53/tcp open domain syn-ack ttl 40 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
1403 Script Info: | dns-nsid:
1404 Script Info: |_ bind.version: 9.9.4-RedHat-9.9.4-74.el7_6.1
1405 Script Info: Device type: specialized|router|printer|general purpose|WAP
1406 Os Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
1407 IP: 104.47.0.0
1408 Type: SPF
1409 Is Active: False
1410 IP: 104.47.58.110
1411 HostName: igemar-cl.mail.protection.outlook.com Type: MX
1412 Country: United States
1413 Is Active: True (syn-ack ttl 110)
1414 Port: 25/tcp open smtp syn-ack ttl 110 Microsoft Exchange smtpd
1415 Script Info: | smtp-commands: DM6NAM10FT063.mail.protection.outlook.com Hello [84.17.52.11], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
1416 Script Info: |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
1417 Script Info: | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
1418 Script Info: | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
1419 Script Info: | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
1420 Script Info: | Public Key type: rsa
1421 Script Info: | Public Key bits: 2048
1422 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1423 Script Info: | Not valid before: 2018-05-18T22:06:55
1424 Script Info: | Not valid after: 2020-05-18T22:06:55
1425 Script Info: | MD5: fedc 1f64 4917 777a 5361 1fc9 3a9d 733e
1426 Script Info: |_SHA-1: 73b8 9750 fa40 6f7d 4f7e 43a9 355a 9d27 1079 e938
1427 Script Info: |_ssl-date: 2020-03-06T03:57:20+00:00; -2s from scanner time.
1428 Os Info: Host: DM6NAM10FT045.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
1429 Script Info: |_clock-skew: -2s
1430 IP: 40.107.0.0
1431 Type: SPF
1432 Is Active: False
1433 IP: 40.92.0.0
1434 Type: SPF
1435 Is Active: False
1436
1437--------------End Summary --------------
1438-----------------------------------------
1439#####################################################################################################################################
1440----- igemar.cl -----
1441
1442
1443Host's addresses:
1444__________________
1445
1446igemar.cl. 30 IN A 52.52.234.222
1447
1448
1449Name Servers:
1450______________
1451
1452pub-ns2.redtogreen.cl. 299 IN A 200.54.240.104
1453pub-ns1.redtogreen.cl. 300 IN A 164.77.211.200
1454
1455
1456Mail (MX) Servers:
1457___________________
1458
1459igemar-cl.mail.protection.outlook.com. 10 IN A 104.47.55.110
1460igemar-cl.mail.protection.outlook.com. 10 IN A 104.47.58.110
1461
1462
1463Brute forcing with /usr/share/dnsenum/dns.txt:
1464_______________________________________________
1465
1466www.igemar.cl. 30 IN A 52.52.234.222
1467
1468
1469Launching Whois Queries:
1470_________________________
1471
1472 whois ip result: 52.52.234.0 -> 52.32.0.0/11
1473
1474
1475igemar.cl_________
1476
1477 52.32.0.0/11
1478####################################################################################################################################
1479Source:
1480whois.arin.net
1481IP Address:
148252.52.234.222
1483Name:
1484AT-88-Z
1485Handle:
1486NET-52-32-0-0-1
1487Registration Date:
14889/2/15
1489Range:
149052.32.0.0-52.63.255.255
1491Org:
1492Amazon Technologies Inc.
1493Org Handle:
1494AT-88-Z
1495Address:
1496410 Terry Ave N.
1497City:
1498Seattle
1499State/Province:
1500WA
1501Postal Code:
150298109
1503Country:
1504United States
1505Name Servers:
1506######################################################################################################################################
1507URLCrazy Domain Report
1508Domain : www.igemar.cl
1509Keyboard : qwerty
1510At : 2020-03-05 22:44:52 -0500
1511
1512# Please wait. 145 hostnames to process
1513
1514Typo Type Typo DNS-A CC-A DNS-MX Extn
1515--------------------------------------------------------------------------------------------------------------------------------
1516Character Omission ww.igemar.cl ? cl
1517Character Omission www.gemar.cl ? cl
1518Character Omission www.iemar.cl ? cl
1519Character Omission www.igear.cl ? cl
1520Character Omission www.igema.cl 217.16.182.253 CZ,CZECH REPUBLIC cl
1521Character Omission www.igemr.cl ? cl
1522Character Omission www.igmar.cl ? cl
1523Character Omission wwwigemar.cl ? cl
1524Character Repeat www.igeemar.cl ? cl
1525Character Repeat www.igemaar.cl ? cl
1526Character Repeat www.igemarr.cl ? cl
1527Character Repeat www.igemmar.cl ? cl
1528Character Repeat www.iggemar.cl ? cl
1529Character Repeat www.iigemar.cl ? cl
1530Character Repeat wwww.igemar.cl ? cl
1531Character Swap ww.wigemar.cl ? cl
1532Character Swap www.giemar.cl ? cl
1533Character Swap www.iegmar.cl ? cl
1534Character Swap www.igeamr.cl ? cl
1535Character Swap www.igemar.lc ? lc
1536Character Swap www.igemra.cl ? cl
1537Character Swap www.igmear.cl ? cl
1538Character Swap wwwi.gemar.cl ? cl
1539Character Replacement eww.igemar.cl ? cl
1540Character Replacement qww.igemar.cl ? cl
1541Character Replacement wew.igemar.cl ? cl
1542Character Replacement wqw.igemar.cl ? cl
1543Character Replacement wwe.igemar.cl ? cl
1544Character Replacement wwq.igemar.cl ? cl
1545Character Replacement www.ifemar.cl ? cl
1546Character Replacement www.igemae.cl ? cl
1547Character Replacement www.igemat.cl ? cl
1548Character Replacement www.igemsr.cl ? cl
1549Character Replacement www.igenar.cl 200.14.114.31 CL,CHILE cl
1550Character Replacement www.igrmar.cl ? cl
1551Character Replacement www.igwmar.cl ? cl
1552Character Replacement www.ihemar.cl ? cl
1553Character Replacement www.ogemar.cl ? cl
1554Character Replacement www.ugemar.cl ? cl
1555Double Character Replacement eew.igemar.cl ? cl
1556Double Character Replacement qqw.igemar.cl ? cl
1557Double Character Replacement wee.igemar.cl ? cl
1558Double Character Replacement wqq.igemar.cl ? cl
1559Character Insertion weww.igemar.cl ? cl
1560Character Insertion wqww.igemar.cl ? cl
1561Character Insertion wwew.igemar.cl ? cl
1562Character Insertion wwqw.igemar.cl ? cl
1563Character Insertion www.igemare.cl ? cl
1564Character Insertion www.igemart.cl ? cl
1565Character Insertion www.igemasr.cl ? cl
1566Character Insertion www.igemnar.cl ? cl
1567Character Insertion www.igermar.cl ? cl
1568Character Insertion www.igewmar.cl ? cl
1569Character Insertion www.igfemar.cl ? cl
1570Character Insertion www.ighemar.cl ? cl
1571Character Insertion www.iogemar.cl ? cl
1572Character Insertion www.iugemar.cl ? cl
1573Character Insertion wwwe.igemar.cl ? cl
1574Character Insertion wwwq.igemar.cl ? cl
1575Missing Dot wwwwww.igemar.cl ? cl
1576Singular or Pluralise igemar.cl 52.52.234.222 US,UNITED STATES igemar-cl.mail.protection.outlook.com cl
1577Singular or Pluralise igemars.cl ? cl
1578Vowel Swap www.agemar.cl 200.72.128.20 CL,CHILE cl
1579Vowel Swap www.egemar.cl ? cl
1580Vowel Swap www.igamar.cl ? cl
1581Vowel Swap www.igemer.cl ? cl
1582Vowel Swap www.igemir.cl ? cl
1583Vowel Swap www.igemor.cl ? cl
1584Vowel Swap www.igemur.cl ? cl
1585Vowel Swap www.igimar.cl ? cl
1586Vowel Swap www.igomar.cl ? cl
1587Vowel Swap www.igumar.cl ? cl
1588Homophones www.ayegemar.cl ? cl
1589Homophones www.eyegemar.cl ? cl
1590Bit Flipping 7ww.igemar.cl ? cl
1591Bit Flipping gww.igemar.cl ? cl
1592Bit Flipping sww.igemar.cl ? cl
1593Bit Flipping uww.igemar.cl ? cl
1594Bit Flipping vww.igemar.cl ? cl
1595Bit Flipping w7w.igemar.cl ? cl
1596Bit Flipping wgw.igemar.cl ? cl
1597Bit Flipping wsw.igemar.cl ? cl
1598Bit Flipping wuw.igemar.cl ? cl
1599Bit Flipping wvw.igemar.cl ? cl
1600Bit Flipping ww7.igemar.cl ? cl
1601Bit Flipping wwg.igemar.cl ? cl
1602Bit Flipping wws.igemar.cl ? cl
1603Bit Flipping wwu.igemar.cl ? cl
1604Bit Flipping wwv.igemar.cl ? cl
1605Bit Flipping www.hgemar.cl ? cl
1606Bit Flipping www.icemar.cl ? cl
1607Bit Flipping www.ieemar.cl ? cl
1608Bit Flipping www.igdmar.cl ? cl
1609Bit Flipping www.ige-ar.cl ? cl
1610Bit Flipping www.igeear.cl ? cl
1611Bit Flipping www.igeiar.cl ? cl
1612Bit Flipping www.igelar.cl ? cl
1613Bit Flipping www.igema2.cl ? cl
1614Bit Flipping www.igemab.cl ? cl
1615Bit Flipping www.igemap.cl ? cl
1616Bit Flipping www.igemar.cd ? cd
1617Bit Flipping www.igemar.ch ? ch
1618Bit Flipping www.igemar.cm ? cm
1619Bit Flipping www.igemar.cn ? cn
1620Bit Flipping www.igemar.gl ? gl
1621Bit Flipping www.igemar.sl ? sl
1622Bit Flipping www.igemas.cl ? cl
1623Bit Flipping www.igemav.cl ? cl
1624Bit Flipping www.igemaz.cl ? cl
1625Bit Flipping www.igemcr.cl ? cl
1626Bit Flipping www.igemqr.cl ? cl
1627Bit Flipping www.igeoar.cl ? cl
1628Bit Flipping www.iggmar.cl ? cl
1629Bit Flipping www.igmmar.cl ? cl
1630Bit Flipping www.ioemar.cl ? cl
1631Bit Flipping www.iwemar.cl ? cl
1632Bit Flipping www.kgemar.cl ? cl
1633Bit Flipping www.mgemar.cl ? cl
1634Bit Flipping www.ygemar.cl ? cl
1635Bit Flipping wwwnigemar.cl ? cl
1636Homoglyphs vvvvvv.igemar.cl ? cl
1637Homoglyphs vvvvw.igemar.cl ? cl
1638Homoglyphs vvwvv.igemar.cl ? cl
1639Homoglyphs vvww.igemar.cl ? cl
1640Homoglyphs wvvvv.igemar.cl ? cl
1641Homoglyphs wvvw.igemar.cl ? cl
1642Homoglyphs wwvv.igemar.cl ? cl
1643Homoglyphs www.igernar.cl ? cl
1644Homoglyphs www.lgemar.cl ? cl
1645Wrong TLD igemar.ca ? ca
1646Wrong TLD igemar.ch ? ch
1647Wrong TLD igemar.com ? com
1648Wrong TLD igemar.de ? de
1649Wrong TLD igemar.edu ? edu
1650Wrong TLD igemar.es ? es
1651Wrong TLD igemar.fr ? fr
1652Wrong TLD igemar.it ? it
1653Wrong TLD igemar.jp ? jp
1654Wrong TLD igemar.net ? net
1655Wrong TLD igemar.nl ? nl
1656Wrong TLD igemar.no ? no
1657Wrong TLD igemar.org ? org
1658Wrong TLD igemar.ru ? ru
1659Wrong TLD igemar.se ? se
1660Wrong TLD igemar.us ? us
1661######################################################################################################################################
1662[3/25] https://www.igemar.cl/documents/34275/34696/175_codigo-de-etica-igemar.pdf
1663[4/25] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2006.pdf/1c36ee28-9739-2831-2461-60c9ea2e9bda
1664[5/25] https://www.igemar.cl/documents/34275/34708/Citacion_Accionistas_Igemar_2018.pdf/70247ae8-8363-59bb-6672-647117481524
1665[6/25] https://www.igemar.cl/documents/34275/34705/179_analisis_razonado91123000_201606.pdf/11e6d74a-5605-2357-1500-4fc96ef6fd5e
1666[7/25] https://www.igemar.cl/documents/34275/183706/An%25C3%25A1lisis_Razonado91123000_201806.pdf/35c5cb8c-9704-fcab-e5fb-3d345847f696
1667[8/25] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201309.pdf/ba8f025b-fde5-a1e5-7607-39935f2a242e
1668[9/25] https://www.igemar.cl/documents/34275/34705/Igemar_eeff_2016.pdf/cd7cca3e-1dab-058c-d57a-e2283fd8bb8a
1669[10/25] https://www.igemar.cl/documents/34275/34696/Linea_directa_Igemar_ago2019.pdf/225427b0-26c5-08a9-d7a2-226faca0e411
1670[11/25] https://www.igemar.cl/documents/34275/34708/Acta_Junta_Igemar_2019.pdf/f74084fc-0265-c92d-6cd0-c9acd9a8f55f
1671[12/25] https://www.igemar.cl/documents/34275/34705/Analisis_Razonado91123000_201712.pdf/882c4c22-3bfe-0ce7-3ac1-09226c215fa2
1672[13/25] https://www.igemar.cl/documents/34275/183706/HR_dic2018.pdf/99f8091d-4a2c-a3e8-653b-037e5df5a57a
1673[14/25] https://www.igemar.cl/documents/34275/183706/Hechos_relevantes91123000_201809.pdf/f4bdbff1-7f48-bb63-ad30-e589d8ab9e7d
1674[15/25] https://www.igemar.cl/documents/34275/34702/memoria_igemar_2017.pdf/4bebaa66-6f29-5a96-3ebd-64ffacd76303
1675[16/25] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2010.pdf/60c3ba85-4893-e79f-fa01-752a239e0124
1676[17/25] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2008.pdf/8dc0a611-bd78-da92-411d-a29552d33f64
1677[18/25] https://www.igemar.cl/documents/34275/34696/practicas_gobierno_corporativo_2018_Igemar.pdf/f18f770b-2296-4386-fd63-f84efcd73c9b
1678[19/25] https://www.igemar.cl/documents/34275/34705/179_analisis_razonado_igemar_0313.pdf/59c26bf9-31c1-3934-f2f5-4c5bec1b1ed1
1679[20/25] https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado_diciembre_2013.pdf/a922f72d-4b77-a19f-8049-bba15d2327cc
1680[21/25] https://www.igemar.cl/documents/34275/34705/179_informe_ifrs_diciembre_2009.pdf/00704054-fd88-b994-3f03-96cee5898ee6
1681[22/25] https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201503.pdf/e1fbc168-07ed-08c1-ca69-a27d9ec23314
1682[23/25] https://www.igemar.cl/documents/34275/34705/179_informe_ifrs_marzo_2011.pdf/53d23c52-cc67-bd26-a4c8-009c5ca442f9
1683[24/25] https://www.igemar.cl/documents/34275/183706/Analisis_Razonado91123000_201809.pdf/4f377ad7-9a18-6a88-1a27-c36adca1ca8d
1684[25/25] https://www.igemar.cl/documents/34275/34702/Igemar_memoria_2016_SVS.pdf/3e39aced-fedf-5062-3715-30b03aef5aca
1685
1686
1687[+] List of users found:
1688--------------------------
1689��pharris
1690jtgr
1691SouthPacific Korp S.A.
1692Paulina Mardones
1693cherrera
1694Pol�tica de aportes a la comunidad
1695pwichmann
1696Abd�n
1697Abdon Suarez Z.
1698
1699[+] List of software found:
1700-----------------------------
1701��PDFCreator 2.1.2.0
1702Adobe PDF Library 8.0
1703Adobe InDesign CS3 (5.0.4)
1704��Microsoft� Word 2013
1705��Microsoft� Word 2016
1706��Microsoft� Word para Office 365
1707��Microsoft� Word 2010
1708PDFescape Desktop
1709Adobe PDF Library 19.21.79
1710Acrobat PDFMaker 19 para Word
1711Microsoft� Word 2016
1712Microsoft� Word para Office 365
1713Adobe PDF Library 15.0
1714Adobe InDesign CC 2015 (Macintosh)
1715Adobe PDF Library 9.9
1716Adobe InDesign CS5 (7.0)
1717Adobe InDesign CS3 (5.0)
1718Acrobat Distiller 5.0.5 (Windows)
1719PScript5.dll Version 5.2.2
1720Adobe PDF Library 9.0
1721Acrobat PDFMaker 9.1 para Word
1722
1723[+] List of paths and servers found:
1724---------------------------------------
1725
1726[+] List of e-mails found:
1727----------------------------
1728deloittechile@deloitte.com
1729gerenciageneral@igemar.cl
1730deloittechile@deloitte.com
1731gerenciageneral@igemar.cl
1732deloittechile@deloitte.com
1733######################################################################################################################################
1734[+] www.igemar.cl has no SPF record!
1735[*] No DMARC record found. Looking for organizational record
1736[+] No organizational DMARC record
1737[+] Spoofing possible for www.igemar.cl!
1738######################################################################################################################################
1739WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
1740Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-05 23:15 EST
1741Nmap scan report for www.igemar.cl (52.52.234.222)
1742Host is up (0.30s latency).
1743rDNS record for 52.52.234.222: ec2-52-52-234-222.us-west-1.compute.amazonaws.com
1744Not shown: 494 filtered ports
1745Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
1746PORT STATE SERVICE
174780/tcp open http
1748443/tcp open https
1749
1750Nmap done: 1 IP address (1 host up) scanned in 14.41 seconds
1751######################################################################################################################################
1752Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-05 23:16 EST
1753Nmap scan report for www.igemar.cl (52.52.234.222)
1754Host is up.
1755rDNS record for 52.52.234.222: ec2-52-52-234-222.us-west-1.compute.amazonaws.com
1756
1757PORT STATE SERVICE
175853/udp open|filtered domain
175967/udp open|filtered dhcps
176068/udp open|filtered dhcpc
176169/udp open|filtered tftp
176288/udp open|filtered kerberos-sec
1763123/udp open|filtered ntp
1764137/udp open|filtered netbios-ns
1765138/udp open|filtered netbios-dgm
1766139/udp open|filtered netbios-ssn
1767161/udp open|filtered snmp
1768162/udp open|filtered snmptrap
1769389/udp open|filtered ldap
1770500/udp open|filtered isakmp
1771520/udp open|filtered route
17722049/udp open|filtered nfs
1773
1774Nmap done: 1 IP address (1 host up) scanned in 5.66 seconds
1775######################################################################################################################################
1776HTTP/1.1 302 Found
1777Date: Fri, 06 Mar 2020 04:16:15 GMT
1778Server: Apache/2.2.34 (Amazon)
1779Location: https://www.igemar.cl/
1780Connection: close
1781Content-Type: text/html; charset=iso-8859-1
1782#####################################################################################################################################
1783<!DOCTYPE html> <html class="ltr" dir="ltr" lang="es-ES"> <head> <!-- Descripción del sitio –––––––––––––––––––––––––––––––––––––––––––––––––– --> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <title>Principal - Igemar</title> <meta name="author" content="Igemar" /> <meta name="description" content="PesqueraIquique-Guanaye, Igemar, está presente en el norte y centro-sur de Chile, con una de las flotas más modernas del país. Su gestión eficiente y avanzadas tecnologías, le han permitido consolidarse, en la producción de harina y aceite de pescado, y también en conservas y congelados para consumo humano. Asimismo, hoy es pionera en el desarrollo de concentrados de Omega 3 en Chile, productos de mayor valor agregado que podrán satisfacer una demanda creciente en los rubros de la nutrición y la salud." /> <meta name="keywords" content="" /> <!-- Mobile Specific Metas –––––––––––––––––––––––––––––––––––––––––––––––––– --> <meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="format-detection" content="telephone=no"> <link href="https://www.igemar.cl/o/dynamic-data-mapping-form-renderer/css/main.css" rel="stylesheet" type = "text/css" /> <link href="https://www.igemar.cl/o/mentions-web/css/mentions.css" rel="stylesheet" type = "text/css" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type" /> <link data-senna-track="temporary" href="https://www.igemar.cl/o/igemar-theme-v-4-theme/images/favicon.ico" rel="Shortcut Icon" /> <link data-senna-track="temporary" href="https://www.igemar.cl" rel="canonical" /> <link class="lfr-css-file" data-senna-track="temporary" href="https://www.igemar.cl/o/igemar-theme-v-4-theme/css/aui.css?browserId=other&themeId=igemarthemev4_WAR_igemarthemev4theme&minifierType=css&languageId=es_ES&b=7002&t=32" id="liferayAUICSS" rel="stylesheet" type="text/css" /> <link data-senna-track="temporary" href="/o/frontend-css-web/main.css?browserId=other&themeId=igemarthemev4_WAR_igemarthemev4theme&minifierType=css&languageId=es_ES&b=7002&t=1499283982794" id="liferayPortalCSS" rel="stylesheet" type="text/css" /> <link data-senna-track="permanent" href="/combo?browserId=other&minifierType=&themeId=igemarthemev4_WAR_igemarthemev4theme&languageId=es_ES&b=7002&com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_RCbC6oSJceYR:%2Fcss%2Fmain.css&com_liferay_product_navigation_product_menu_web_portlet_ProductMenuPortlet:%2Fcss%2Fmain.css&t=1579299552000" id="e083c8c1" rel="stylesheet" type="text/css" /> <script data-senna-track="temporary" type="text/javascript">var Liferay=Liferay||{};
1784490,494,499,491,492,493,495,220])})})()},function(a){console.error(a)});</script> <!-- CSS –––––––––––––––––––––––––––––––––––––––––––––––––– --> <!-- Font --> <link href="https://fonts.googleapis.com/css?family=Lato:300,400,400i,700,900" rel="stylesheet"> <!-- Full Page --> <link href="https://www.igemar.cl/o/igemar-theme-v-4-theme/css/jquery.fullPage.css" rel="stylesheet" type="text/css" /> <!-- Favicon --> <link href="https://www.igemar.cl/o/igemar-theme-v-4-theme/images/favicon.png" rel="icon" type="image/png" /> <style type="text/css">.section{background-image:url("/documents/34275/0/1-home.jpg")!important;background-attachment:initial;background-size:cover;background-position:center center;background-repeat:no-repeat}.section.fdestacados{background-image:url("/documents/34275/0/2-destacados.jpg")!important;background-size:cover}.section.fquienes{background-image:url("/documents/34275/0/3-quienes-somos.jpg")!important;background-size:cover}.section.fnegocios{background-image:url("/documents/34275/0/4-negocios.jpg")!important;background-size:cover}.section.fgobierno{background-image:url("/documents/34275/0/5-gobierno-corporativo.jpg")!important;background-size:cover}.section.finversionistas{background-image:url("/documents/34275/0/6-inversionistas.jpg")!important;background-size:cover}.section.faccionistas{background-image:url("/documents/34275/0/7-accionistas.jpg")!important;background-size:cover}.section.fmemorias{background-image:url("/documents/34275/0/8-memorias-anuales.jpg")!important;background-size:cover}.section.fcontacto{background-image:url("/documents/34275/0/9-contacto.jpg")!important;background-size:cover}</style> </head> <body class=" controls-visible yui3-skin-sam signed-out public-page site img-bg"> <nav class="quick-access-nav" id="ahla_quickAccessNav"> <h1 class="hide-accessible">Navegación</h1> <ul> <li><a href="#main-content">Saltar al contenido</a></li> </ul> </nav> <!-- NUEVO HEADER --> <header> <nav class="navbar navbar-default navbar-fixed-top"> <div class="container-fluid"> <!-- Brand and toggle get grouped for better mobile display --> <div class="navbar-header"> <button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target="#bs-example-navbar-collapse-1" aria-expanded="false"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a class="navbar-brand" href="#principal"><img src="https://www.igemar.cl/o/igemar-theme-v-4-theme/images/logo-igemar-isotipo-color.svg" alt="Logo Igemar" /></a> </div> <!-- Collect the nav links, forms, and other content for toggling --> <div class="collapse navbar-collapse" id="bs-example-navbar-collapse-1"> <ul class="nav navbar-nav navbar-right"> <!-- Dropdown solo visible en Tablet y Desktop --> <li class="dropdown visible-lg-block"> <a href="#" class="dropdown-toggle" data-toggle="dropdown" role="button" aria-haspopup="true" aria-expanded="false">Menú <span class="caret"></span></a> <ul class="dropdown-menu"> <div class="container-fluid"> <!-- español --> <li data-menuanchor="destacados"><a href="#destacados">Destacados</a></li> <li data-menuanchor="quienessomos"><a href="#quienessomos" opcion="empresa">Quiénes Somos</a></li> <li data-menuanchor="negocios"><a href="#negocios" opcion="inversiones">Negocios</a></li> <li data-menuanchor="gobierno"><a href="#gobierno" opcion="directorio">Gobierno Corporativo</a></li> <li data-menuanchor="inversionistas"><a href="#inversionistas" opcion="estados">Inversionistas</a></li> <li data-menuanchor="accionistas"><a href="#accionistas" opcion="juntas">Accionistas</a></li> <li data-menuanchor="contactos"><a href="#contactos">Contacto</a></li> </div> </ul> </li> <div class="language"> <ul> <li><a href="https://www.igemar.cl/c/portal/update_language?p_l_id=34686&languageId=es_ES" title="Español"><img src="https://www.igemar.cl/o/igemar-theme-v-4-theme/templates/../images/flag-chile.svg" alt="Bandera de Chile" /></a></li> <!-- <li><a href="https://www.igemar.cl/c/portal/update_language?p_l_id=34686&languageId=en_EN" title="English"><img src="https://www.igemar.cl/o/igemar-theme-v-4-theme/templates/../images/flag-eeuu.svg" alt="Bandera del Reino Unido" /></a></li>--> </ul> </div> <!-- Lista sólo visible en versión responsive/mobile --> <!-- español --> <li class="hidden-lg"><a href="#destacados">Destacados</a></li> <li class="hidden-lg"><a href="#quienessomos" opcion="empresa">Quiénes Somos</a></li> <li class="hidden-lg"><a href="#negocios" opcion="inversiones">Negocios</a></li> <li class="hidden-lg"><a href="#gobierno" opcion="directorio">Gobierno Corporativo</a></li> <li class="hidden-lg"><a href="#inversionistas" opcion="estados">Inversionistas</a></li> <li class="hidden-lg"><a href="#accionistas" opcion="juntas">Accionistas</a></li> <li class="hidden-lg"><a href="#contactos">Contacto</a></li> </ul> </div><!-- /.navbar-collapse --> </div><!-- /.container-fluid --> </nav> </header> <div id="fullpage"> <!-- HOME --> <div class="section active img-bg" id="home"> <!-- MAIN CONTENT --> <div class="contenedor-logo"> <h1 class="logo-home text-hide">IGEMAR - Pesquera Iquique-Guanaye S.A.</h1> </div> <!-- /.contenedor-logo --> <!-- FOOTER --> <footer> <div class="container"> <div class="col-xs-12 col-sm-12"> <figure class="ico-mouse"> <img src="https://www.igemar.cl/o/igemar-theme-v-4-theme/images/ico-mouse.svg" alt="Mouse" height="22" width="15" /> <figcaption>Scroll</figcaption> </figure> </div> </div> <!-- /.container --> </footer> </div> <!-- / #home --> <!-- DESTACADOS --> <div class="section fdestacados fp-auto-height img-bg categoria"> <div class="container-fluid altura-minima"> <div class="row"> <!-- español --> <h2 class="col-sm-12 titulo-pagina">Destacados</h2> <div class="col-sm-12"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdestacados_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdestacados"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdestacados_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdestacados_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdestacados__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_RCbC6oSJceYR_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_RCbC6oSJceYR"> <div class="portlet-content"> <h2 class="portlet-title-text">Destacados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <section class="contenedor-calugas"> <div class="row"> <!-- 1 --> <article class="col-xs-12 col-sm-6"> <a href="#negocios" opcion="empresas" title="Ir a enlace"> <div class="caluga-kit inner"> <figure class="celda"> <img alt="Destacado" src="/documents/34275/34711/ico-destacados-inversiones-principales.svg/d00408d0-3823-ad3b-9571-5bdd65d68872"> </figure> <div class="celda llamado"> <h3>Inversiones Principales</h3> </div> </div> </a> </article> <!-- 2 --> <article class="col-xs-12 col-sm-6"> <a href="#memorias" title="Ir a enlace"> <div class="caluga-kit inner"> <figure class="celda"> <img alt="Destacado" src="/documents/34275/34711/ico-destacados-memoria-anual.svg/92b8a1b1-e89d-10e5-3847-1788a0740089"> </figure> <div class="celda llamado"> <h3>Memoria Anual</h3> </div> </div> </a> </article> <!-- 3 --> <article class="col-xs-12 col-sm-6"> <a href="#accionistas" opcion="juntas" title="Ir a enlace"> <div class="caluga-kit inner"> <figure class="celda"> <img alt="Destacado" src="/documents/34275/34711/ico-destacados-junta-de-accionistas-anual.svg/6288c4a3-23fe-4222-3885-d05586cd07f9"> </figure> <div class="celda llamado"> <h3>Junta Anual de Accionistas</h3> </div> </div> </a> </article> <!-- 4 --> <article class="col-xs-12 col-sm-6"> <a href="http://www.sercor.cl" target="_blank" title="Ir a enlace"> <div class="caluga-kit inner"> <figure class="celda"> <img alt="Destacado" src="/documents/34275/34711/ico-destacados-servicio-a-accionistas.svg/01a52c31-55f5-eaaa-9673-972fc57cd4f4"> </figure> <div class="celda llamado"> <h3>Servicio a Accionistas</h3> </div> </div> </a> </article> </div> <!-- /.row --> </section> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </div> </div> <!-- /.row --> </div> <!-- /.container-fluid --> </div><!-- / id destacados --> <!-- QUIENES SOMOS --> <div class="section fquienes fp-auto-height img-bg categoria" id="quienes-somos"> <div class="container-fluid altura-minima"> <div class="row"> <!-- español --> <h2 class="col-sm-12 titulo-pagina">Quiénes Somos</h2> <!-- Enlaces de la categoría --> <div class="col-sm-4"> <ul class="enlaces-categoria"> <!-- español --> <li class="option active" id="link-empresa"><a href="#quienessomos" opcion="empresa" title="Ir a enlace">La Empresa</a></li> <li class="option" id="link-antecedentes"><a href="#quienessomos" opcion="antecedentes" title="Ir a enlace">Antecedentes de la Sociedad</a></li> <li class="option" id="link-hitos"><a href="#quienessomos" opcion="hitos" title="Ir a enlace">Hitos</a></li> </ul> <!-- /.enlaces-categoria --> </div> <div class="col-sm-8"> <article class="contenido-single portlet-anidado fondo-negro" id="cont-empresa"> <p> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instempresa_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instempresa"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instempresa_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instempresa_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instempresa__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_ZbWAvsvWaSMG_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_ZbWAvsvWaSMG"> <div class="portlet-content"> <h2 class="portlet-title-text">La Empresa</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <p>Pesquera Iquique - Guanaye S.A., Igemar, está presente en el norte y centro-sur de Chile, con una de las flotas más modernas del país. Su gestión eficiente y avanzadas tecnologías, le han permitido consolidarse, en la producción de harina y aceite de pescado, y también en conservas y congelados para consumo humano. Asimismo, hoy es pionera en el desarrollo de concentrados de Omega 3 en Chile, productos de mayor valor agregado que podrán satisfacer una demanda creciente en los rubros de la nutrición y la salud.</p> <p>Los inicios de Pesquera Iquique S.A. se remontan a 1945, con la puesta en marcha de una plantaconservera en la zona de Talcahuano.</p> <ul class="lista-pdf"> <li><a href="/documents/34275/34693/162_igemar_estatutos_2016.pdf/73573522-5713-3312-f9d8-2b386b3860f3" target="_blank" title="Ver documento">Estatutos</a></li> </ul> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </p> </article> <article class="contenido-single portlet-anidado fondo-negro" id="cont-antecedentes"> <p> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instantecedentes_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instantecedentes"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instantecedentes_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instantecedentes_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instantecedentes__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_JYJjPSLIlMdL_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_JYJjPSLIlMdL"> <div class="portlet-content"> <h2 class="portlet-title-text">Antecedentes de la Sociedad</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <p><strong>RAZÓN SOCIAL</strong><br /> Pesquera Iquique - Guanaye S.A. (Igemar)</p> <p> </p> <p><strong>RUT</strong><br /> N° 91.123.000-3</p> <p> </p> <p><strong>DOMICILIO</strong><br /> Av. El Golf 150 piso 17, <br /> Las Condes, Santiago, Chile.<br /> Teléfono: (56-2) 2461 7021<br /> Fax: (56-2) 2461 7070<br /> Casilla: 3781 Santiago</p> <p> </p> <p><strong>TIPO DE SOCIEDAD</strong><br /> Sociedad Anónima Abierta</p> <p> </p> <p>INSCRIPCIÓN REGISTRO DE VALORES<br /> Registro de Valores N° 0044</p> <p><a href="http://www.igemar.cl">www.igemar.cl</a></p> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </p> </article> <article class="descripcion portlet-anidado" id="cont-hitos"> <p> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthitos_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthitos"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthitos_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthitos_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthitos__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_zHBPAKBbKmhY_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_zHBPAKBbKmhY"> <div class="portlet-content"> <h2 class="portlet-title-text">Hitos (descripción)</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <p>Desde sus orígenes, Pesquera Iquique-Guanaye S.A. gestiona y desarrolla sus negocios con una visión a largo plazo, criterio que ha estado siempre presente en las decisiones para expandir, consolidar y diversificar sus empresas subsidiarias y asociadas.</p> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </p> </article> </div> </div> <!-- /.row --> <!-- Timeline hitos --> <div class="row contenido-single portlet-anidado" id="cont-hitos-timeline"> <div class="col-sm-12"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insttimeline_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insttimeline"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insttimeline_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insttimeline_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insttimeline__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_nectia_hitos_web_portlet_HitosPortlet_ portlet-static portlet-static-end portlet-decorate " id="p_p_id_com_liferay_nectia_hitos_web_portlet_HitosPortlet_INSTANCE_oPUPgQgWi5M6_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nectia_hitos_web_portlet_HitosPortlet_INSTANCE_oPUPgQgWi5M6"> <div class="portlet-content"> <h2 class="portlet-title-text">Hitos</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="row contenido-single" id="cont-hitos-timeline"> <div class="col-sm-12"> <ul class="timeline"> <li> <div class="timeline-badge"> <strong>2018</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>• Orizon S.A. materializa la compra a la Sociedad Comercializadora Novaverde S.A. de los negocios consistentes en la distribución en Chile de los productos de la empresa norteamericana General Mills y de la distribución y comercialización de palta procesada. El precio total de adquisición por parte de Orizon ascendió a US$ 8.085.635.- <br/> • Se logra el mayor nivel de captura en la historia de Orizon S.A., con un volumen de 100.000 toneladas, 70% superior al registrado el año anterior. <br/> • Orizon S.A. lanza la línea de Productos RO, gama de conservas de lomitos de jurel, en 3 presentaciones: natural, aceite y aceite ahumado. <br/> • Se inaugura la primera Sala de Ventas en el complejo productivo ubicado en Coronel, como parte de las iniciativas de vinculación e integración a la comunidad.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>2017</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>• Empresa Pesquera Eperva S.A., en conjunto con Pesquera Iquique-Guanaye S.A. (Igemar) y AntarChile S.A., adquirieron el 23% de las acciones que Sociedad Pesquera Coloso S.A. mantenía en Corpesca S.A. El precio total de la transacción ascendió a US$ 69,39 millones. De esta forma, las tres sociedades poseen, en conjunto, el 100% de la propiedad de Corpesca S.A. <br/> • La filial Corpesca do Brasil Empreendimentos e Participações Ltda., vendió el 60% de su asociada Sementes Selecta S.A. en US$ 214 millones. <br/> • La afiliada Orizon S.A. lanzó la línea de productos congelados San José On Ice para venta nacional. Esta incluye lomos de jurel, filetes de reineta, filetes de merluza choritos con concha y choritos sin concha. <br/> • La afiliada Orizon Food LLC. abrió en octubre una oficina comercial en Estados Unidos, en la ciudad de Maryland.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>2016</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>Corpesca adquiere el 30% de la brasileña FASA, empresa dedicada a la producción de concentrados proteicos de alta calidad para la nutrición animal, por una inversión cercana a US$ 43 millones.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>2015</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>La filial Corpesca do Brasil adquiere un 10% adicional de Selecta, alcanzando así un 70% de participación en la propiedad.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>2013</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>• Sociedad Pesquera Coloso S.A. ejerce su opción de venta del 20% de las acciones de Orizon S.A. Tras esto, Pesquera Iquique - Guanaye S.A. aumenta su participación a 66,80%. /n • Corpesca adquiere 60% de la propiedad de Selecta, firma brasileña con más de 25 años de experiencia en el sector de la agroindustria, enfocada principalmente a la industrialización y comercialización de soya.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>2012</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>Golden Omega comienza su operación.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>2010</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>• La compañía y Servicios de Combustibles Ltda. -únicos accionistas de SouthPacific Korp S.A.-, la Sociedad Pesquera Coloso S.A. y Duncan Fox S.A. -únicos accionistas de Pesquera San José S.A.-, acuerdan fusionar ambas empresas pesqueras, proceso que se concreta en noviembre de 2010. Se incorpora la Pesquera San José S.A. a SouthPacific Korp S.A., que cambia su razón social a Orizon S.A. • Pesquera Iquique - Guanaye S.A. vende a Empresa Pesquera Eperva S.A. parte de su participación accionaria en SouthPacific Korp S.A. Tras ello, la compañía queda con una participación de 83,5% en SouthPacific Korp S.A. y Empresa Pesquera Eperva S.A. con un 16,5%. Luego de la fusión, el capital accionario de Orizon S.A. queda distribuido en 50,1% para Pesquera Iquique - Guanaye S.A., 40% para Pesquera San José S.A. y un 9,9% para Empresa Pesquera Eperva S.A. • La fusión da origen a Orizon S.A.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>2008</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>Orizon S.A. y Corpesca S.A. acuerdan participar en el desarrollo de un proyecto industrial para producir, a partir de aceite de pescado, concentrados de Omega 3. Esta iniciativa dio origen a Golden Omega S.A., en la cual se invirtieron del orden de US$ 80 millones para la construcción de un complejo industrial en Arica.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>2005</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>Pesquera Iquique - Guanaye S.A. compra a Inversiones ICC Chile Ltda. el capital accionario que poseía en SouthPacific Korp S.A., alcanzando el 99,9% de participación en dicha empresa.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>1999</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>• Pesquera Iquique - Guanaye S.A., Empresa Pesquera Eperva S.A. y Sociedad Pesquera Coloso S.A. firman un Acuerdo de Reestructuración Pesquera, que establece las bases para formar una nueva compañía, que consolida sus actividades pesqueras de la Zona Norte. Así, se constituye Corpesca S.A., la que actualmente es propietaria de los activos pesqueros que las empresas mencionadas poseían en la I y II regiones del país. • Fusión de Pesquera Iquique - Guanaye S.A., Pesquera Pacific Protein S.A. y Pesquera El Quillay S.A. Tras ello, Pesquera Iquique - Guanaye S.A. aporta los activos que poseía en la zona centro-sur y la nueva sociedad se denomina SouthPacific Korp S.A. (SPK). La compañía queda con una participación accionaria de 75%.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>1992</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>Ambas sociedades se fusionan, dando origen a Pesquera Iquique - Guanaye S.A. (IGEMAR).</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>1962</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>Sociedad Pesquera Guanaye Ltda. inicia actividades en el puerto de Iquique y fue una de las empresas pioneras de la industria productora de harina de pescado en Chile.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>1945</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>Sociedad Pesquera Guanaye Ltda. inicia actividades en el puerto de Iquique y fue una de las empresas pioneras de la industria productora de harina de pescado en Chile.</p> </div> </div> </li> </ul> <!-- /.timeline --> </div> </div> <!-- /.row --> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </div> </div> <!-- /.row --> </div> <!-- /.container-fluid --> </div> <!-- / id quienes-somos --> <!-- NEGOCIO --> <div class="section fnegocios fp-auto-height img-bg categoria" id="negocio"> <div class="container-fluid altura-minima"> <div class="row"> <!-- español --> <h2 class="col-sm-12 titulo-pagina">Negocios</h2> <!-- Enlaces de la categoría --> <div class="col-sm-4"> <ul class="enlaces-categoria"> <!-- español --> <li class="option active" id="link-empresas"><a href="#negocios" opcion="empresas" title="Ir a enlace">Empresas Relacionadas</a></li> </ul> <!-- /.enlaces-categoria --> </div> <div class="col-sm-8"> <article class="contenido-single portlet-anidado fondo-negro" id="cont-empresas"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instempresas_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instempresas"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instempresas_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instempresas_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instempresas__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_c7ATNlja7J7O_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_c7ATNlja7J7O"> <div class="portlet-content"> <h2 class="portlet-title-text">Empresas Relacionadas</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <h4><a href="http://www.corpesca.cl" target="_blank"><img src="/documents/34275/34711/250a--corpesca.jpg/1cf0b193-eae0-e034-5c80-d53633d0338d?t=1490189242643" style="width: 203px; height: 148px;" /></a></h4> <h4> </h4> <p><meta /></p> <p>Corpesca es la principal compañía pesquera de Chile y cuenta con operaciones comerciales y productivas a nivel internacional.</p> <p>Hoy, se consolida como un productor global de alimentos proteicos de origen marino, vegetal y animal, fuertemente comprometido con la excelencia operacional, la sustentabilidad y la innovación.</p> <p> </p> <h4> </h4> <h4><a href="http://www.orizon.cl/" target="_blank"><img height="95" src="/documents/34275/34711/logo-orizon-fondo-blanco.jpg/0548c6f9-e320-5b5e-b0b2-a7bd56c5fecc?t=1488838615467" style="width: 211px; height: 52px;" width="382" /></a></h4> <p> </p> <p>Realiza actividades de pesca industrial en la zona centro-sur del país, contando con centros de cultivo de choritos, además de siete plantas de proceso y una flota de cinco barcos operativos.</p> <h4> </h4> <h4> </h4> <p><img src="/documents/34275/34711/logo-golden-omega.jpg/835889d0-e50d-db5b-cffd-660e6850a160?t=1488838635764" style="width: 206px; height: 159px;" /></p> <p>Compañía orientada a la producción de concentrados de Omega 3 de alta calidad a partir de aceites de pescado llegando a concentraciones de hasta 85% de EPA y DHA.</p> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </article> </div> </div> <!-- /.row --> </div> <!-- /.container-fluid --> </div> <!-- /#negocios --> <!-- GOBIERNO CORPORATIVO --> <div class="section fgobierno fp-auto-height img-bg categoria" id="gobierno-corporativo"> <div class="container-fluid altura-minima"> <div class="row"> <!-- español --> <h2 class="col-sm-12 titulo-pagina ">GOBIERNO CORPORATIVO</h2> <!-- Enlaces de la categoría --> <div class="col-sm-4"> <ul class="enlaces-categoria"> <!-- español --> <li class="option active" id="link-directorio"><a href="#gobierno" opcion="directorio" title="Ir a enlace">Directorio</a></li> <li class="option" id="link-administracion"><a href="#gobierno" opcion="administracion" title="Ir a enlace">Administración</a></li> <li class="option" id="link-modelos"><a href="#gobierno" opcion="modelos" title="Ir a enlace">Modelos y Prácticas de Gobierno Corporativo</a></li> <li class=""><a href="https://www.canaldedenuncia.cl/cda/sercor/cdpages/inicio.aspx" target="_blank" title="Ir a enlace">Canal de Denuncias</a></li> </ul> <!-- /.enlaces-categoria --> </div> <div class="col-sm-8"> <article class="contenido-single portlet-anidado fondo-negro" id="cont-directorio"> <p> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdirectorio_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdirectorio"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdirectorio_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdirectorio_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdirectorio__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_yf5ROxQV99pL_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_yf5ROxQV99pL"> <div class="portlet-content"> <h2 class="portlet-title-text">Directorio (Igemar)</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <style type="text/css">.directorio figcaption{margin-top:0!important}</style> <article class="directorio ajuste-provisorio"> <h6 class="sr-only">Descripción de la categoría</h6> <!-- Presidencia --> <div class="row"> <h2 class="col-sm-12">Directorio</h2> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/igemar-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption><strong>Presidente</strong> <h4>Roberto Angelini Rossi <span>Ingeniero Civil industrial</span></h4> </figcaption> </figure> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/igemar-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption><strong>Vicepresidente</strong> <h4>Manuel Antonio Tocornal Astoreca <span>Empresario</span></h4> </figcaption> </figure> </div> <!-- Directores --> <div class="row"> <h2 class="col-sm-12">Directores</h2> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/igemar-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption class="sin-cargo"> <h4>Fernando Agüero Garcés <span>Ingeniero Civil</span></h4> </figcaption> </figure> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/igemar-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption class="sin-cargo"> <h4>Jorge Andueza Fouque <span>Ingeniero Civil</span></h4> </figcaption> </figure> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/igemar-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption class="sin-cargo"> <h4>Manuel Enrique Bezanilla Urrutia <span>Abogado</span></h4> </figcaption> </figure> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/igemar-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption class="sin-cargo"> <h4>Charles Kimber Wylie <span>Ingeniero Comercial</span></h4> </figcaption> </figure> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/igemar-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption class="sin-cargo"> <h4>Ramiro Méndez Urrutia <span>Abogado</span></h4> </figcaption> </figure> </div> </article> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </p> </article> <article class="contenido-single portlet-anidado fondo-negro" id="cont-administracion"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instadministracion_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instadministracion"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instadministracion_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instadministracion_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instadministracion__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_aZtOQvfLP5FA_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_aZtOQvfLP5FA"> <div class="portlet-content"> <h2 class="portlet-title-text">Administración</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <style type="text/css">.directorio figcaption{margin-top:0!important}</style> <article class="directorio"> <div class="row"> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/siemel-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption><strong>Gerente General</strong> <h4>Eduardo Navarro Beltrán <span>Ingeniero Comercial</span></h4> </figcaption> </figure> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/siemel-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption><strong>Gerente de Administración y Finanzas</strong> <h4>Rodrigo Huidobro Alvarado <span>Ingeniero Civil Industrial</span></h4> </figcaption> </figure> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/siemel-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption><strong>Contador General </strong> <h4>Ricardo Vargas Bernal <span>Contador Auditor</span></h4> </figcaption> </figure> </div> <div class="row"> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/siemel-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption><strong>Asesores Legales</strong> <h4>Portaluppi, Guzmán y Bezanilla Asesorías Ltda.</h4> </figcaption> </figure> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/siemel-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption><strong>Auditores</strong> <h4>Deloitte Auditores y Consultores Ltda.</h4> </figcaption> </figure> </div> </article> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </p> </article> <article class="contenido-single portlet-anidado fondo-negro" id="cont-modelos"> <p> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instmodelos_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instmodelos"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instmodelos_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instmodelos_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instmodelos__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_HD5QJvMQpg1K_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_HD5QJvMQpg1K"> <div class="portlet-content"> <h2 class="portlet-title-text">Modelos y Prácticas de gobierno corporativo</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <p>En 2011, nuestra empresa formalizó sus prácticas y conductas de negocio en su Código de Ética – Principios y Valores, en el cual se establecen procedimientos y directrices para las mejores prácticas de negocio. El principal objetivo de este documento, es promover el más estricto cumplimiento de las normativas vigentes.</p> <p>Posteriormente se implementó un Modelo de Prevención de Delitos, una Política y los procedimientos a seguir conforme a las disposiciones legales. A estos documentos se unieron en 2015, una Política de Aportes a la Comunidad, que establece criterios y procedimientos a seguir en las donaciones, patrocinios y similares que entregue la empresa y una Política de Gestión de Riesgos, que recoge las directrices establecidas por el Directorio, para que la empresa adopte formalmente la gestión de sus riesgos.</p> <p>Adicionalmente, el Directorio lleva a cabo un programa de capacitación con el objetivo de actualizar sus conocimientos en materia de mejores prácticas de gobierno corporativo, temas de inclusión, diversidad y reportes de sostenibilidad, gestión de riesgos, fallos, sanciones y conflictos de interés.</p> <p>Durante el 2019, se han realizado las siguientes charlas de capacitación:</p> <p>* Análisis de las nuevas responsabilidades penales para las empresas y sus directivos: 3 de junio de 2019<br /> * La Alta Dirección ante la nueva Ley 20.393. Una oportunidad de fortalecer la cultura organizacional: 3 de junio de 2019<br /> * Acceso a información de Directorios: 4 de noviembre de 2019<br /> * Más allá del control y compliance: Directorios que agregan valor: 4 de noviembre de 2019</p> <hr /> <ul class="lista-pdf"> <li><a href="/documents/34275/34696/politica_libre_comp_igemar2017.pdf/24d0d534-515b-bd3a-6426-66ddc4fa0dab" target="_blank">Política de Libre Competencia</a></li> <li><a href="/documents/34275/34696/175_poli-tica-de-aportes-igemar.pdf/cd0c2d1c-c41b-a4a0-c396-6f4500b03068" target="_blank" title="Ver documento">Política de Aportes a la Comunidad</a></li> <li><a href="/documents/34275/34696/politica_gestion_riesgos_igemar.pdf/ac9567bf-0dff-39a8-0e6f-4d3205ae3c39" target="_blank" title="Ver documento">Política de Gestión de Riesgos</a></li> <li><a href="/documents/34275/34696/Polit_prevdelitos_igemar_ago2019.pdf/c4f3201e-98ab-601f-9192-56d14939af89" target="_blank" title="Ver documento">Política de Prevención de Delitos</a></li> <li><a href="/documents/34275/34696/175_modelo-prevencion-igemar_dic16.pdf/0b30cb27-619d-0b59-b6e5-26b675929a56" target="_blank" title="Ver documento">Modelo de Prevención de Delitos</a></li> <li><a href="/documents/34275/34696/Codigo_etica_Igemar_agosto19.pdf/d4282dfb-db8c-ac29-b2f5-e7f693667b8c" target="_blank" title="Ver documento">Código de Etica</a></li> <li><a href="/documents/34275/34696/175_procedimientos-de-gobierno-corporativo-igemar.pdf/ace5d64c-3d86-961b-b0b0-4e6430b6aa25" target="_blank" title="Ver documento">Procedimientos de Gobierno Corporativo</a></li> <li><a href="/documents/34275/34696/Linea_directa_Igemar_ago2019.pdf/225427b0-26c5-08a9-d7a2-226faca0e411" target="_blank" title="Ver documento">Linea Directa</a></li> </ul> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </p> </article> </div> </div> <!-- /.row --> </div> <!-- /.container-fluid --> </div> <!-- /#gobierno-corporativo --> <!-- INVERSIONISTAS --> <div class="section finversionistas fp-auto-height img-bg categoria"> <div class="container-fluid altura-minima"> <div class="row"> <!-- español --> <h2 class="col-sm-12 titulo-pagina">INVERSIONISTAS</h2> <!-- Enlaces de la categoría --> <div class="col-sm-4"> <ul class="enlaces-categoria"> <!-- español --> <li class=""><a href="#memorias" title="Ir a enlace">Memorias Anuales</a></li> <li class="option active" id="link-estados"><a href="#inversionistas" opcion="estados" title="Ir a enlace">Estados Financieros</a></li> <!--<li class="option" id="link-informacion"><a href="#inversionistas" opcion="informacion" title="Ir a enlace">Información Bursátil</a></li>--> <li class=""><a href="#contactos" title="Investor Relations">IR</a></li> </ul> <!-- /.enlaces-categoria --> </div> <div class="col-sm-8"> <article class="contenido-single portlet-anidado fondo-negro" id="cont-estados"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instestados_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instestados"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instestados_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instestados_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instestados__column-1"> <div class="portlet-boundary portlet-boundary_EstadoFinancieroIgemar_ portlet-static portlet-static-end portlet-decorate " id="p_p_id_EstadoFinancieroIgemar_INSTANCE_2AMr9ICHC0fw_" > <!DOCTYPE html> <section class="portlet" id="portlet_EstadoFinancieroIgemar_INSTANCE_2AMr9ICHC0fw"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlet EstadoFinanciero Igemar</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div data-example-id="togglable-tabs"> <ul class="nav nav-tabs " id="myTabs" role="tablist"> <li class="dropdown active" role="presentation"> <a aria-controls="myTabDrop1-contents" aria-expanded="false" class="dropdown-toggle" data-toggle="dropdown" href="#" id="myTabDrop1">Elige un año </a> <ul aria-labelledby="myTabDrop1" class="dropdown-menu" id="myTabDrop1-contents"> <li class="active"><a aria-controls="2019" aria-expanded="true" data-toggle="tab" href="#2019" id="2019-tab" role="tab">2019</a></li> <li><a aria-controls="2018" aria-expanded="true" data-toggle="tab" href="#2018" id="2018-tab" role="tab">2018</a></li> <li><a aria-controls="2017" aria-expanded="true" data-toggle="tab" href="#2017" id="2017-tab" role="tab">2017</a></li> <li><a aria-controls="2016" aria-expanded="true" data-toggle="tab" href="#2016" id="2016-tab" role="tab">2016</a></li> <li><a aria-controls="2015" aria-expanded="true" data-toggle="tab" href="#2015" id="2015-tab" role="tab">2015</a></li> <li><a aria-controls="2014" aria-expanded="true" data-toggle="tab" href="#2014" id="2014-tab" role="tab">2014</a></li> <li><a aria-controls="2013" aria-expanded="true" data-toggle="tab" href="#2013" id="2013-tab" role="tab">2013</a></li> </ul></li> </ul> <div class="tab-content" id="myTabContent"> <div class="journal-content-article"> <style type="text/css">.nt_table-scroll{overflow-x:auto;position:relative}table.nt_table{border-collapse:collapse;border-spacing:0;width:100%}.nt_table tr{height:30px}.nt_table td,.nt_table th{padding:10px}.nt_table tr:nth-child(odd){background-color:#eee}.fade{display:none}.fade.active{display:block;margin-bottom:13px}</style> <div aria-labelledby="2019-tab" class="tab-pane fade active in" id="2019" role="tabpanel"> <h3>2019</h3> <div class="nt_table-scroll"> <table class="nt_table table-hover"> <tbody> <tr> <td bgcolor="#0086BF" style="height: 26px;"><span style="color: rgb(255, 255, 255);">Documentos</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Marzo</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Junio</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Septiembre</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Diciembre</span></td> </tr> <tr> <td>Estado Financiero</td> <td style="text-align: center;"><a href="/documents/34275/242536/EF_201903.pdf/cb2614b9-7e4b-3dee-33f3-369678f82dd5" target="_blank"> <img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /> </a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="#" target="_blank"> </a></td> <!-- septiembre --> <td style="text-align: center;"> </td> <!-- diciembre --> <td style="text-align: center;"> </td> </tr> <tr> <td>Análisis Razonado</td> <td style="text-align: center;"><a href="/documents/34275/242536/AR_201903.pdf/c5d826c7-a468-ced5-e876-4a932ca0ab84" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"> </td> <!-- septiembre --> <td style="text-align: center;"> </td> <!-- diciembre --> <td style="text-align: center;"> </td> </tr> <tr> <td>Declaración de Responsabilidad</td> <td style="text-align: center;"><a href="/documents/34275/242536/DR_201903.pdf/5a3a6a85-4c6d-265b-1106-efcd8f813b64" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"> </td> <!-- septiembre --> <td style="text-align: center;"> </td> <!-- diciembre --> <td style="text-align: center;"> </td> </tr> <tr> <td>Hechos Relevantes</td> <td style="text-align: center;"><a href="/documents/34275/242536/HR_201903.pdf/fdd1d57b-923e-edf6-6824-167f32acc23d" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"> </td> <!-- septiembre --> <td style="text-align: center;"> </td> <!-- diciembre --> <td style="text-align: center;"> </td> </tr> </tbody> </table> </div> </div> <div aria-labelledby="2018-tab" class="tab-pane fade" id="2018" role="tabpanel"> <h3>2018</h3> <div class="nt_table-scroll"> <table class="nt_table table-hover"> <tbody> <tr> <td bgcolor="#0086BF" style="height: 26px;"><span style="color: rgb(255, 255, 255);">Documentos</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Marzo</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Junio</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Septiembre</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Diciembre</span></td> </tr> <tr> <td>Estado Financiero</td> <td style="text-align: center;"><a href="/documents/34275/183706/EF_91123000_201803.pdf/2fb6a33e-8dad-f817-e979-533daa6af7f7" target="_blank"> <img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /> </a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/183706/Estados_financieros_%28PDF%2991123000_201806.pdf/2030347b-3bfd-5fb2-22aa-fad3659620cf" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/183706/Estados_financieros_%28pdf%2991123000_201809.pdf/a3023e02-5dc9-5ea1-9eaa-1811da323d34" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/183706/EEFF_dic2018.pdf/0a8f229d-297a-04db-4b0a-f9606116f292" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Análisis Razonado</td> <td style="text-align: center;"><a href="/documents/34275/183706/AR_91123000_201803.pdf/c44b5ffd-e838-8e71-7c22-7b0d885c00ff" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/183706/An%C3%A1lisis_Razonado91123000_201806.pdf/35c5cb8c-9704-fcab-e5fb-3d345847f696" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/183706/Analisis_Razonado91123000_201809.pdf/4f377ad7-9a18-6a88-1a27-c36adca1ca8d" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/183706/AR_dic2018.pdf/55ae8535-ed01-6519-bb7e-67c724d37144" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Declaración de Responsabilidad</td> <td style="text-align: center;"><a href="/documents/34275/183706/DR_91123000_201803.pdf/f2020d48-73bf-1c3a-5f63-0b3266066c5c" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/183706/Declaraci%C3%B3n_de_responsabilidad91123000_201806.pdf/a44dabe7-3d36-e476-9644-4c7980528e5b" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/183706/Analisis_Razonado91123000_201809.pdf/4f377ad7-9a18-6a88-1a27-c36adca1ca8d" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/183706/DR_dic2018.pdf/7fea0c9e-348f-8d84-b4e2-1aa698294dae" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Hechos Relevantes</td> <td style="text-align: center;"><a href="/documents/34275/183706/HR_91123000_201803.pdf/262adf2e-eb46-d04f-d6b0-1c3cb476f1d7" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/183706/Hechos_Relevantes91123000_201806.pdf/9027e73a-09c3-363f-4eb2-319564f75378" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"> <a href="/documents/34275/183706/Hechos_relevantes91123000_201809.pdf/f4bdbff1-7f48-bb63-ad30-e589d8ab9e7d" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/183706/HR_dic2018.pdf/99f8091d-4a2c-a3e8-653b-037e5df5a57a" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> </tbody> </table> </div> </div> <div aria-labelledby="2017-tab" class="tab-pane fade" id="2017" role="tabpanel"> <h3>2017</h3> <div class="nt_table-scroll"> <table class="nt_table table-hover"> <tbody> <tr> <td bgcolor="#0086BF" style="height: 26px;"><span style="color: rgb(255, 255, 255);">Documentos</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Marzo</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Junio</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Septiembre</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Diciembre</span></td> </tr> <tr> <td>Estado Financiero</td> <td style="text-align: center;"><a href="/documents/34275/34720/EFF0317.pdf/231e310b-2d87-fa78-320d-58da1762137a" target="_blank"> <img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /> </a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/126736/IFRS_201706.pdf/b4605514-e843-6756-594b-4ef660aae018" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34720/Estados_financieros_%28PDF%2991123000_201709.pdf/7c422914-ee17-091d-f402-d058d322fc75" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/Estados_financieros91123000_201712.pdf/a652e445-8218-0a67-dd4a-487c9e752466" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Análisis Razonado</td> <td style="text-align: center;"><a href="/documents/34275/34720/AR_0317.pdf/ae9b45e1-cca0-30e6-52f1-01d8cbd8ffb7" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/126736/AR_201706.pdf/091bbbef-1e2a-a0cd-890a-996a057d2ace" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34720/An%C3%A1lisis_Razonado91123000_201709.pdf/5df24712-f409-ce76-4994-21424823e940" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/Analisis_Razonado91123000_201712.pdf/882c4c22-3bfe-0ce7-3ac1-09226c215fa2" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Declaración de Responsabilidad</td> <td style="text-align: center;"><a href="/documents/34275/34720/DR0317.pdf/667adaa0-68c8-d457-c621-50670ca7650e" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/126736/DR_201706.pdf/c5aefcdd-6c86-8b60-d514-805c618b75d8" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34720/Declaraci%C3%B3n_de_responsabilidad91123000_201709.pdf/6d38b44a-d804-a70b-badf-b7d19be7ca27" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/Declaracion_de_responsabilidad91123000_201712.pdf/ec60ec62-30c5-ed79-a12c-a28b378ce84a" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Hechos Relevantes</td> <td style="text-align: center;"><a href="/documents/34275/34720/HR0317.pdf/b421cc79-1ac9-193b-e224-d499b853714a" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/126736/HR_201706.pdf/e7793591-4f99-3414-9535-620b7a7667eb" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"> <a href="/documents/34275/34720/Hechos_Relevantes91123000_201709.pdf/9c70f235-b920-82c4-b392-331bcb91a6ce" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/Hechos_Relevantes91123000_201712.pdf/1c8a07a5-7748-750d-def4-fa44e64813ca" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> </tbody> </table> </div> </div> <div aria-labelledby="2016-tab" class="tab-pane fade" id="2016" role="tabpanel"> <h3>2016</h3> <div class="nt_table-scroll"> <table class="nt_table table-hover"> <tbody> <tr> <td bgcolor="#0086BF" style="height: 26px;"><span style="color: rgb(255, 255, 255);">Documentos</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Marzo</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Junio</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Septiembre</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Diciembre</span></td> </tr> <tr> <td>Estado Financiero</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_-pdf-91123000_201603.pdf/84553bb2-9ec4-86fa-90f7-368139f3acf1" target="_blank"> <img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /> </a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_-pdf-91123000_201606.pdf/0885f4b0-a74d-dd6f-906a-b9c00e1e46c1" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_-pdf-91123000_201609.pdf/0ffd3142-10b5-814a-4705-472b024fb660" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/Igemar_eeff_2016.pdf/cd7cca3e-1dab-058c-d57a-e2283fd8bb8a" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Análisis Razonado</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_analisis_razonado91123000_201603.pdf/fe3df267-a7f5-7edb-bf5e-a2515905bcf8" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_analisis_razonado91123000_201606.pdf/11e6d74a-5605-2357-1500-4fc96ef6fd5e" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_analisis_razonado91123000_201609.pdf/d23594b8-1195-3054-f3a4-da16c6293939" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/Igemar_AR_2016.pdf/99357c62-5fce-f212-bba4-187b04802a17" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Declaración de Responsabilidad</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_declaracion_de_responsabilidad91123000_201603.pdf/a59b5b7a-fd54-8d95-6aab-2a7cab84ab3f" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_declaracion_de_responsabilidad91123000_201606.pdf/d1bd918a-b3a4-ee28-a87b-b1d22f3a9d92" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_declaracion_de_responsabilidad91123000_201609.pdf/5f177679-f41c-fb2b-b40d-8296304e277b" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/Igemar_DR_2016.pdf/e0810c51-cca5-05f0-79a5-bb6409c42e52" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Hechos Relevantes</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_hechos_relevantes91123000_201603.pdf/4f5620ca-bb4c-9b83-4d56-4642048b6b42" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_hechos_relevantes91123000_201606.pdf/ea39bb65-4d64-cbd0-258e-ccdf9f334f22" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"> <a href="/documents/34275/34705/179_hechos_relevantes91123000_201609.pdf/07c53b95-591a-77ca-fefc-d995bdfba1f3" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/Igemar_HR_2016.pdf/70415e75-d832-ad69-9986-0bb5314bae63" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> </tbody> </table> </div> </div> <div aria-labelledby="2015-tab" class="tab-pane fade" id="2015" role="tabpanel"> <h3>2015</h3> <div class="nt_table-scroll"> <table class="nt_table table-hover"> <tbody> <tr> <td bgcolor="#0086BF" style="height: 26px;"><span style="color: rgb(255, 255, 255);">Documentos</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Marzo</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Junio</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Septiembre</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Diciembre</span></td> </tr> <tr> <td>Estado Financiero</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_-pdf-91123000_201503.pdf/9400a47f-d767-b036-3e77-209138525624" target="_blank"> <img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /> </a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_junio_2015.pdf/4b5e5630-301c-cb7c-b605-3093a3669034" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados-financieros-septiembre-2015.pdf/75bec3ce-229f-f182-d69f-3470ee9d60d0" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_eeff-diciembre-2015.pdf/4dff7d99-d5e1-18c3-2833-b73a15ce4e1a" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Análisis Razonado</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_xa1lisis_razonado91123000_201503.pdf/e1fbc168-07ed-08c1-ca69-a27d9ec23314" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xa1lisis_razonado_junio_2015.pdf/0e448547-b6cf-f304-5904-4f430308515c" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xa1lisis-razonado-septiembre-2015.pdf/522c0024-5563-9a06-1064-8bd797af9c37" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_analisis_razonado-diciembre-2015.pdf/65d7b10b-4ea9-a837-3ef2-e2fe13287f05" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Declaración de Responsabilidad</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201503.pdf/bdc8140a-a884-3e3b-ce19-b178d6b45d6b" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xb3n_de_responsabilidad_junio_2015.pdf/d9c3f090-b779-48d0-1284-dccfc0a3cdd9" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xb3n-responsabilidad-septiembre-2015.pdf/b71a50b7-beed-add9-9231-d7481221551a" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_declaracion_responsabilidad-diciembre-2015.pdf/6a83b5c8-fa3a-a4c1-8905-c2aeaf8ab7a4" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Hechos Relevantes</td> <td style="text-align: center;"><a href="/documents/34275/34705/Hechos_Relevantes91123000_201503.pdf/261c32ea-ef6a-d334-5e83-4a795258016d" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_hechos_relevantes_junio_2015.pdf/2171c120-6482-06a1-07e1-2d65099588a5" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"> <a href="/documents/34275/34705/179_hechos-relevantes-septiembre-2015.pdf/de515067-9408-85f9-5666-f2814362c514" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_hechos_relevantes-diciembre-2015.pdf/99e15269-383d-b285-b4d8-f08d6db1de12" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> </tbody> </table> </div> </div> <div aria-labelledby="2014-tab" class="tab-pane fade" id="2014" role="tabpanel"> <h3>2014</h3> <div class="nt_table-scroll"> <table class="nt_table table-hover"> <tbody> <tr> <td bgcolor="#0086BF" style="height: 26px;"><span style="color: rgb(255, 255, 255);">Documentos</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Marzo</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Junio</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Septiembre</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Diciembre</span></td> </tr> <tr> <td>Estado Financiero</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_-pdf-91123000_201403.pdf/446a4b9a-bddb-a91d-8b3f-749db4eccecc" target="_blank"> <img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /> </a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_junio_2014.pdf/a62c6a49-361a-15da-f2a5-b8a926f1c82d" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_septiembre_2014.pdf/54a2748b-8672-362a-0400-bf4880d23705" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_eeff2014.pdf/69bc8eb6-ae47-60ce-ad82-b8f9e499200d" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Análisis Razonado</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_an-c3-a1lisis_razonado91123000_201403.pdf/e28f5c87-1717-7c78-393d-2de6bc271b2e" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_analisis_razonado_junio_2014.pdf/3f0ee5e9-c2da-4076-553a-a7d2eba51c56" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xa1lisis_razonado_septiembre_2014.pdf/9b871d1e-0f95-0838-a7a4-fe807ffd2501" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xa1lisis_razonado91123000_201412.pdf/1180d807-ecac-a845-39ea-6a868ea4c47b" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Declaración de Responsabilidad</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_declaraci-c3-b3n_de_responsabilidad91123000_201403.pdf/7cf24895-138d-0b72-5406-85dadc3c030e" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_declaracion_de_responsabilidad_junio_2014.pdf/e451ce99-a95e-dd0e-8cd2-12b4b5f8f715" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xb3n_de_responsabilidad_septiembre_2014.pdf/ff313834-6517-aefb-84d4-90ef5daf0961" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201412.pdf/4727ab6b-16df-b7c4-bace-1d7c10331a33" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Hechos Relevantes</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_hechos_relevantes91123000_201403.pdf/d89861aa-771b-df93-97b9-eb2087747581" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_hechos_relevantes_junio_2014.pdf/af19aa56-6ac0-2ba1-c575-c4025defd163" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"> <a href="/documents/34275/34705/179_hechos_relevantes_septiembre_2014.pdf/173e652a-a45e-6a6a-927c-71dc94ab38da" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_hechos_relevantes91123000_201412.pdf/ba645dee-85c0-1baa-8d05-1d06e41e44fc" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> </tbody> </table> </div> </div> <div aria-labelledby="2013-tab" class="tab-pane fade" id="2013" role="tabpanel"> <h3>2013</h3> <div class="nt_table-scroll"> <table class="nt_table table-hover"> <tbody> <tr> <td bgcolor="#0086BF" style="height: 26px;"><span style="color: rgb(255, 255, 255);">Documentos</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Marzo</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Junio</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Septiembre</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Diciembre</span></td> </tr> <tr> <td>Estado Financiero</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_igemar_0313.pdf/7d352aef-7c12-1798-835a-a556e10f0583" target="_blank"> <img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /> </a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_-pdf-91123000_201306.pdf/c4a361c7-50b7-f3f1-a805-75e2a9269ca1" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_-pdf-91123000_201309.pdf/24e942a5-4309-8476-2c72-874bb925c902" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_fecu2013.pdf/5855d2b8-767d-96cd-8442-c6a8f5a7cd8e" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Análisis Razonado</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_analisis_razonado_igemar_0313.pdf/59c26bf9-31c1-3934-f2f5-4c5bec1b1ed1" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xa1lisis_razonado91123000_201306.pdf/88cc5920-eeab-205a-a0ff-98fce76f5f32" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xa1lisis_razonado91123000_201309.pdf/15d14ee0-5199-f543-15ad-01d9301a419e" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xa1lisis_razonado_diciembre_2013.pdf/a922f72d-4b77-a19f-8049-bba15d2327cc" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Declaración de Responsabilidad</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_xb3n_de_responsabilidad_igemar_0313.pdf/5737843e-896a-5fc0-a4d6-925298a7b7ee" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201306.pdf/9d751e76-f024-5628-6d91-fdf74aaa37ea" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201309.pdf/30f0d1bb-fae9-6cfd-3320-85f76c78a8fb" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xb3n_de_responsabilidad_diciembre_2013.pdf/4fa057e0-59a5-3f5f-ad49-1dbe6bc1a850" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Hechos Relevantes</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_hechos_relevantes_igemar_0313.pdf/70cdd43d-12d3-e6c3-1762-fad64b963f7d" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_hechos_relevantes91123000_201306.pdf/5b7df00d-0b37-4ba4-0021-3a34b88313dc" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"> <a href="/documents/34275/34705/179_hechos_relevantes91123000_201309.pdf/ba8f025b-fde5-a1e5-7607-39935f2a242e" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_hechos_relevantes_diciembre_2013.pdf/4e9d3f1a-1392-560a-4147-77f9ec3d417b" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> </tbody> </table> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </article> <article class="contenido-single portlet-anidado fondo-negro" id="cont-informacion"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instinformacion_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instinformacion"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instinformacion_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instinformacion_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instinformacion__column-1"></div> </div> </div> </div> </div> </div> </div> </section> </div> </article> </div> </div> <!-- /.row --> </div> <!-- /.container-fluid --> </div> <!-- /#inversionistas --> <!-- ACCIONISTAS --> <div class="section faccionistas fp-auto-height img-bg categoria" > <div class="container-fluid altura-minima"> <div class="row"> <!-- español --> <h2 class="col-sm-12 titulo-pagina">ACCIONISTAS</h2> <!-- Enlaces de la categoría --> <div class="col-sm-4"> <ul class="enlaces-categoria"> <!-- español --> <li class="option active" id="link-juntas"><a href="#accionistas" opcion="juntas" title="Ir a enlace">Juntas de Accionistas</a></li> <li class="" ><a href="http://www.sercor.cl/" target="_blank" title="Ir a enlace">Servicio a Accionistas</a></li> <li class="option" id="link-propiedad"><a href="#accionistas" opcion="propiedad" title="Ir a enlace">Propiedad</a></li> <li class="option" id="link-dividendos"><a href="#accionistas" opcion="dividendos" title="Ir a enlace">Dividendos</a></li> <li class="option" id="link-hechos"><a href="#accionistas" opcion="hechos" title="Ir a enlace">Hechos Esenciales</a></li> <li class="option" id="link-actas"><a href="#accionistas" opcion="actas" title="Ir a enlace">Actas Juntas de Accionistas</a></li> </ul> <!-- /.enlaces-categoria --> </div> <div class="col-sm-8"> <article class="contenido-single portlet-anidado fondo-negro" id="cont-propiedad"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instpropiedad_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instpropiedad"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instpropiedad_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instpropiedad_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instpropiedad__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_M18hOzzjI05p_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_M18hOzzjI05p"> <div class="portlet-content"> <h2 class="portlet-title-text">Propiedad</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <p>Los 12 principales accionistas al 31 de diciembre de 2018 eran los siguientes:</p> <style type="text/css">.nt_table-scroll{position:relative;overflow-x:auto}table.nt_table{border-collapse:collapse;border-spacing:0;width:100%;max-width:none!important}.nt_table tr{height:30px}.nt_table td,.nt_table th{padding:10px}.nt_table tr:nth-child(odd){background-color:#eee}</style> <div class="nt_table-scroll"> <table class="nt_table table-hover"> <tbody> <tr> <td bgcolor="#85B916" style="height: 26px;"><span style="color: rgb(255, 255, 255);">Accionista</span></td> <td bgcolor="#85B916" style="height: 26px;"><span style="color: rgb(255, 255, 255);">RUT</span></td> <td bgcolor="#85B916" style="height: 26px;"><span style="color: rgb(255, 255, 255);">Acciones</span></td> <td bgcolor="#85B916" style="height: 26px;"><span style="color: rgb(255, 255, 255);">% de Participación</span></td> </tr> <tr> <td>Empresas Copec S.A.</td> <td>90.690.000-9</td> <td>1.810.948.384</td> <td>50,22%</td> </tr> <tr> <td>Inversiones Nueva Sercom Ltda.</td> <td>76.306.362-3</td> <td>1.143.699.700</td> <td>31,71%</td> </tr> <tr> <td>AntarChile S.A.</td> <td>96.556.310-5</td> <td>628.792.747</td> <td>17,44%</td> </tr> <tr> <td>Pesquera Iquique S.A.</td> <td>91.123.000-3</td> <td>14.621.618</td> <td>0,41%</td> </tr> <tr> <td>Julius Neger Berl</td> <td>1.626.340-0</td> <td>2.782.883</td> <td>0,08%</td> </tr> <tr> <td>David Josef</td> <td>8.729.231-2</td> <td>1.934.911</td> <td>0,05%</td> </tr> <tr> <td>Jaime Larraín y Cía. Corredores de Bolsa</td> <td>84.360.700-4</td> <td>286.594</td> <td>0,01%</td> </tr> <tr> <td>Inversiones Civiles Oscar, Alice y Compañía.</td> <td>76.446.020-0</td> <td>208.030</td> <td>0,01%</td> </tr> <tr> <td>Larraín Vial S.A. Corredores de Bolsa</td> <td>80.537.000-9</td> <td>206.389</td> <td>0,01%</td> </tr> <tr> <td>BCI Corredor de Bolsa S.A.</td> <td>96.519.800-8</td> <td>203.129</td> <td>0,01%</td> </tr> <tr> <td>Inverkorp SPA</td> <td>99.596.510-0</td> <td>140.000</td> <td>0,00%</td> </tr> <tr> <td>Compañía Minera La Presidenta S.C.</td> <td>90.006.000-9</td> <td>105.000</td> <td>0,00%</td> </tr> <tr> <td> </td> <td> </td> <td> </td> <td> </td> </tr> </tbody> </table> </div> <p>Al 31 de diciembre de 2018, la compañía cuenta con un total de 1.229 accionistas.</p> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </article> <article class="contenido-single portlet-anidado fondo-negro" id="cont-dividendos"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdividendos_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdividendos"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdividendos_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdividendos_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdividendos__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_fvjVqCh48Zf7_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_fvjVqCh48Zf7"> <div class="portlet-content"> <h2 class="portlet-title-text">Dividendos</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <p>Según lo señalado en la ley N° 18.046, salvo acuerdo diferente de la unanimidad de los accionistas, cuando exista utilidad deberá destinarse a lo menos el 30% de la misma al reparto de dividendos.</p> <p>En Sesión de Directorio N° 598 de la Compañía celebrada el día 8 de mayo de 2003, se acordó modificar la política de dividendos con vigencia al 1 de enero de 2003, en orden a que la Sociedad distribuirá dividendos por el 43% de las utilidades líquidas que determinen los balances anuales, una vez que se encuentren absorbidas las pérdidas acumuladas.</p> <p>Desde 1991 la Compañía no distribuye dividendos a sus accionistas, dado que ha registrado pérdidas acumuladas en sus balances.</p> <p> </p> <style type="text/css">.nt_table-scroll{position:relative;overflow-x:auto}table.nt_table{border-collapse:collapse;border-spacing:0;width:100%}tr{height:30px}td,th{padding:10px}tr:nth-child(odd){background-color:#eee}</style> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </article> <article class="contenido-single portlet-anidado fondo-negro" id="cont-hechos"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthechos_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthechos"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthechos_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthechos_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthechos__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_3ov7b4obzKwM_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_3ov7b4obzKwM"> <div class="portlet-content"> <h2 class="portlet-title-text">Hechos Esenciales</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <p>Hechos esenciales de nuestra compañía. </p> <ul class="lista-pdf"> <li><a href="/documents/34275/34699/he_271218.pdf/63043daf-1684-47bf-04d1-e5dbc6a0d0c1" target="_blank">Hecho Esencial 27.12.2018</a></li> <li><a href="/documents/34275/34699/he_250418.pdf/2bf76065-ed37-8e5c-200b-69bb0de622c3">Hecho Esencial 25.04.2018</a></li> <li><a href="/documents/34275/34699/he_06042018.pdf/9879f937-dc01-3caf-3124-e2bcd6bcb98d">Hecho Esencial 06.04.2018</a></li> <li><a href="/documents/34275/34699/he_29032018.pdf/c6c62eb5-02f2-fd9b-9bbd-435e5920029f">Hecho Esencial 29.03.2018</a></li> <li><a href="/documents/34275/34699/HE_igemar_170817.pdf/db81f20a-804b-dff0-241d-394c72cea636">Hecho Esencial 17.08.2017</a></li> <li><a href="/documents/34275/34699/HE_igemar_070717.pdf/f041ffdd-23f0-8d58-dec0-8f3b1517c08a" target="_blank">Hecho Esencial 07.07.2017</a></li> <li><a href="/documents/34275/34699/hes_2017060103310.pdf/bd8e8303-fa78-1bc5-b2dd-9d82d3e1812a" target="_blank">Hecho Esencial 13.06.2017</a></li> <li><a href="/documents/34275/34699/H+E+Selecta.pdf/7c3fefe4-a733-c321-4e8c-d5e6000ccd43" target="_blank">Hecho Esencial 12.06.2017</a></li> <li><a href="/documents/34275/34699/Hecho+Esencial+Junta+Igemar7deabril.pdf/d161a9bd-6609-ec8c-3cac-2689e54a46de" target="_blank">Hecho Esencial 07.04.2017</a></li> <li><a href="/documents/34275/34699/Hecho-Esencial-08.03.2017.pdf/7adc5b06-b5b7-0f85-fd47-52406d333aa4" target="_blank" title="Ver documento">Hecho Esencial 08.03.2017</a></li> <li><a href="/documents/34275/34699/180_hecho-esencial-octubre-2014.pdf/b64abc9a-5759-8b77-df03-8185002d839f" target="_blank" title="Ver documento">Hecho Esencial Octubre 2014</a></li> </ul> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </article> <article class="contenido-single portlet-anidado fondo-negro" id="cont-juntas"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instjuntas_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instjuntas"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instjuntas_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instjuntas_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instjuntas__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_7Zm62o4x0rD4_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_7Zm62o4x0rD4"> <div class="portlet-content"> <h2 class="portlet-title-text">Acta Juntas de Accionistas</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <h3>Junta de Accionistas 2019</h3> <ul class="lista-pdf"> <li><a href="/documents/34275/34702/MemoriaAnual2018_Igemar.pdf/13c90655-35f2-3a5c-a8dc-4eb6f462b313" target="_blank">Memoria Anual Pesquera Iquique - Guanaye S.A. 2018</a></li> <li><a href="/documents/34275/34708/EEFF_dic2018.pdf/b4c1b7d4-41ae-0d6b-8935-f705a21a1835">Estados Financieros Pesquera Iquique - Guanaye S.A. 2018</a></li> <li><a href="/documents/34275/34708/candidatos2019_Igemar.pdf/b0b7dce7-2fc0-9920-8e0d-017a7446c672">Listado de candidatos a director</a></li> <li><a href="/documents/34275/34708/Fundamentos_Designacion_Auditores_Igemar.pdf/4f60033a-13ec-24e5-ff9a-3f741217f784">Fundamentos para la designación de auditores externos</a></li> <li><a href="/documents/34275/34708/Citacion_Junta2019_Igemar.pdf/8a126a9b-23bc-d68e-601c-6ae939ae3175">Carta de Citación a Junta de Accionistas Pesquera Iquique - Guanaye S.A. 2019</a></li> <li><a href="/documents/34275/34708/Aviso_Junta2019_Igemar.pdf/2b1fe919-9572-6cf5-5e15-55fc85c19499" target="_blank">Aviso de Citación a Junta de Accionistas Pesquera Iquique - Guanaye S.A. 2019</a></li> <li><a href="/documents/34275/34708/Acta_Junta_Igemar_2019.pdf/f74084fc-0265-c92d-6cd0-c9acd9a8f55f">Acta Junta General Ordinaria de Accionistas 2019</a></li> </ul> <p> </p> <p>En conformidad al artículo 135 del Nuevo Reglamento de Sociedades Anónimas, la sociedad mantendrá durante los 15 días anteriores a la fecha de la Junta, a disposición de sus accionistas en las oficinas principales de sus filiales, todos los libros, actas, memorias, balances, inventarios e informes de auditores de dichas sociedades.<br /> <br /> Los antes referidos documentos no serán publicados en el sitio web de la compañía debido a su volumen, y por la dificultad técnica de implementar sistemas para que esta voluminosa información pueda ser conocida sólo por los accionistas y no por terceros.</p> <p> </p> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </article> <article class="contenido-single portlet-anidado fondo-negro" id="cont-actas"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instactas_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instactas"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instactas_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instactas_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instactas__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_uiAfFW1XfjTw_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_uiAfFW1XfjTw"> <div class="portlet-content"> <h2 class="portlet-title-text">Actas de Juntas Ordinarias y Extraordinarias</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <ul class="lista-pdf"> <li><a href="/documents/34275/34708/ActaJuntaExtraordinaria2018.pdf/402fca9a-724f-5ac2-4218-aff51bd030d2" target="_blank">Junta General Extraordinaria de Accionistas 2018</a></li> <li><a href="/documents/34275/34708/ActaJuntaOrdinaria2018.pdf/145fe6a8-67dd-8bc3-83ad-db296dd1611f" target="">Junta General Ordinaria de Accionistas 2018</a></li> <li><a href="/documents/34275/34708/Acta+Junta+2017+Igemar.pdf/cd44d4c4-b7e4-253b-ab6a-d400b4424943" target="">Junta General Ordinaria de Accionistas 2017</a></li> <li><a href="/documents/34275/34708/206_acta_igemar_2016.pdf/151cf0db-026a-7396-c3bf-da2aeefb98f1" target="_blank" title="Ver documento">Junta General Ordinaria de Accionistas 2016</a></li> <li><a href="/documents/34275/34708/197_acta-junta-igemar.pdf/3c1a510b-5618-689c-e9d2-f9196a0eacbe" target="_blank" title="Ver documento">Junta General Ordinaria de Accionistas 2015</a></li> <li><a href="/documents/34275/34708/197_acta_junta2014.pdf/fc41ee7b-110b-237e-2a63-44dce010b1aa" target="_blank" title="Ver documento">Junta General Ordinaria de Accionistas 2014</a></li> </ul> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </article> </div> </div> <!-- /.row --> </div> <!-- /.container-fluid --> </div> <!-- /#accionistas --> <!-- MEMORIAS ANUALES --> <div class="section fmemorias fp-auto-height img-bg categoria"> <div class="container-fluid altura-minima"> <div class="row"> <!-- español --> <h2 class="col-sm-12 titulo-pagina">Memorias Anuales</h2> <div class="col-sm-12"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instmemorias_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instmemorias"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instmemorias_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instmemorias_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instmemorias__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_nectia_memorias_web_portlet_MemoriasPortlet_ portlet-static portlet-static-end portlet-decorate " id="p_p_id_com_liferay_nectia_memorias_web_portlet_MemoriasPortlet_INSTANCE_9KcJwOTqnQkE_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nectia_memorias_web_portlet_MemoriasPortlet_INSTANCE_9KcJwOTqnQkE"> <div class="portlet-content"> <h2 class="portlet-title-text">Memorias Sercor</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <section class="contenedor-calugas memorias-anuales"> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/MemoriaAnual2018_Igemar.pdf/13c90655-35f2-3a5c-a8dc-4eb6f462b313" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/MemoriaAnual2018_Igemar.pdf/13c90655-35f2-3a5c-a8dc-4eb6f462b313?documentThumbnail=1" alt="Memoria Anual 2018" height="200px"/> </figure> <h4> Memoria Anual <strong>2018</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/memoria_igemar_2017.pdf/4bebaa66-6f29-5a96-3ebd-64ffacd76303" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/memoria_igemar_2017.pdf/4bebaa66-6f29-5a96-3ebd-64ffacd76303?documentThumbnail=1" alt="Memoria Anual 2017" height="200px"/> </figure> <h4> Memoria Anual <strong>2017</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/Igemar_memoria_2016_SVS.pdf/3e39aced-fedf-5062-3715-30b03aef5aca" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/Igemar_memoria_2016_SVS.pdf/3e39aced-fedf-5062-3715-30b03aef5aca?documentThumbnail=1" alt="Memoria Anual 2016" height="200px"/> </figure> <h4> Memoria Anual <strong>2016</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar-2015_web5.pdf/cedff9a0-9999-0481-1797-050885a9b45f" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria_igemar-2015_web5.pdf/cedff9a0-9999-0481-1797-050885a9b45f?documentThumbnail=1" alt="Memoria Anual 2015" height="200px"/> </figure> <h4> Memoria Anual <strong>2015</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria-20igemar-202014_web.pdf/434ee0cc-a3be-4d8f-d337-1caa97ae45bf" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria-20igemar-202014_web.pdf/434ee0cc-a3be-4d8f-d337-1caa97ae45bf?documentThumbnail=1" alt="Memoria Anual 2014" height="200px"/> </figure> <h4> Memoria Anual <strong>2014</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar_2013.pdf/5656d439-347b-2fe6-d6de-91e555d06cab" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34717/memoria_igemar_2013.png/d67c294b-0b36-01af-0f60-424c3a558301?imageThumbnail=1" alt="Memoria Anual 2013" height="200px"/> </figure> <h4> Memoria Anual <strong>2013</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar_2012.pdf/007b9c91-afde-c41b-e921-80c6cfc457d0" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria_igemar_2012.pdf/007b9c91-afde-c41b-e921-80c6cfc457d0?documentThumbnail=1" alt="Memoria Anual 2012" height="200px"/> </figure> <h4> Memoria Anual <strong>2012</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar_2011.pdf/5949e01a-7e59-a442-2331-309007120272" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria_igemar_2011.pdf/5949e01a-7e59-a442-2331-309007120272?documentThumbnail=1" alt="Memoria Anual 2011" height="200px"/> </figure> <h4> Memoria Anual <strong>2011</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar_2010.pdf/60c3ba85-4893-e79f-fa01-752a239e0124" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria_igemar_2010.pdf/60c3ba85-4893-e79f-fa01-752a239e0124?documentThumbnail=1" alt="Memoria Anual 2010" height="200px"/> </figure> <h4> Memoria Anual <strong>2010</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar_2009.pdf/51ff63f9-138e-7f36-c0aa-744f2369070f" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria_igemar_2009.pdf/51ff63f9-138e-7f36-c0aa-744f2369070f?documentThumbnail=1" alt="Memoria Anual 2009" height="200px"/> </figure> <h4> Memoria Anual <strong>2009</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar_2008.pdf/8dc0a611-bd78-da92-411d-a29552d33f64" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria_igemar_2008.pdf/8dc0a611-bd78-da92-411d-a29552d33f64?documentThumbnail=1" alt="Memoria Anual 2008" height="200px"/> </figure> <h4> Memoria Anual <strong>2008</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar_2007.pdf/11c4c3c9-daf6-ca34-4adc-ebfd3cdc79e0" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria_igemar_2007.pdf/11c4c3c9-daf6-ca34-4adc-ebfd3cdc79e0?documentThumbnail=1" alt="Memoria Anual 2007" height="200px"/> </figure> <h4> Memoria Anual <strong>2007</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar_2006.pdf/1c36ee28-9739-2831-2461-60c9ea2e9bda" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria_igemar_2006.pdf/1c36ee28-9739-2831-2461-60c9ea2e9bda?documentThumbnail=1" alt="Memoria Anual 2006" height="200px"/> </figure> <h4> Memoria Anual <strong>2006</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar_2005.pdf/d493b7a3-7f16-a5f8-cb47-e5b97c08d606" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria_igemar_2005.pdf/d493b7a3-7f16-a5f8-cb47-e5b97c08d606?documentThumbnail=1" alt="Memoria Anual 2005" height="200px"/> </figure> <h4> Memoria Anual <strong>2005</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar_2004.pdf/77fc6db8-3785-bff6-521b-195f78cffc34" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria_igemar_2004.pdf/77fc6db8-3785-bff6-521b-195f78cffc34?documentThumbnail=1" alt="Memoria Anual 2004" height="200px"/> </figure> <h4> Memoria Anual <strong>2004</strong> </h4> </div> </a> </article> </section> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </div> <!-- /.contenedor-calugas --> </div> <!-- /.row --> </div> <!-- /.container-fluid --> </div> <!-- / id memorias-anuales --> <!-- CONTACTO --> <div class="section fcontacto fp-auto-height img-bg categoria"> <!-- MAIN CONTENT --> <section class="main-content"> <h6 class="sr-only">Contacto</h6> <div class="container-fluid mb-300"> <div class="row"> <!-- español --> <h2 class="col-sm-12 titulo-pagina">Contacto</h2> <div class="col-sm-12"> <section class="contenedor-calugas contacto"> <div class="row"> <!-- Formulario de Contacto --> <div class="col-xs-12 col-sm-4 mb-mobile"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instcontactos_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instcontactos"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instcontactos_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instcontactos_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instcontactos__column-1"> <div class="portlet-boundary portlet-boundary_contactos_portlet_ContactosPortlet_ portlet-static portlet-static-end portlet-decorate " id="p_p_id_contactos_portlet_ContactosPortlet_INSTANCE_3cyVGEANrBy8_" > <!DOCTYPE html> <section class="portlet" id="portlet_contactos_portlet_ContactosPortlet_INSTANCE_3cyVGEANrBy8"> <div class="portlet-content"> <h2 class="portlet-title-text">Contactos Portlet</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <script>var onloadCallback=function(){grecaptcha.render("html_element",{sitekey:"6LfFLhkUAAAAADASrlLeP9FqgJmO9gaXFjUVOX0A"})},cleanForm=function(){$("#nombre").val("");$("#apellido").val("");$("#empresa").val("");$("#cargo").val("");$("#telefono").val("");$("#email").val("");$("#mensaje").val("");grecaptcha.reset()},ejecutar=function(d){var a=$("#language").val();if(""==grecaptcha.getResponse())return"es_ES"==a?alert("Por favor seleccione el Captcha!"):alert("Please selected the Captcha!"),!1;jQuery.ajax({type:"POST",
1785_contactos_portlet_ContactosPortlet_INSTANCE_3cyVGEANrBy8_language:$("#language").val()}}).success(function(b){var c=JSON.parse(b);b.error?"es_ES"==a?alert("Se produjo un error en el env\u00edo del correo, por favor intente nuevamente"):alert("There was an error sending the mail, please try again"):(console.log(c),"es_ES"==a?alert("Mensaje enviado, recibir\u00e1s un mensaje de confirmaci\u00f3n en tu correo! "):alert("Message sent, you will receive a confirmation message in your email!"),cleanForm())})};</script> <form action="https://www.igemar.cl/principal?p_p_id=contactos_portlet_ContactosPortlet_INSTANCE_3cyVGEANrBy8&p_p_lifecycle=1&p_p_state=normal&p_p_mode=view&p_p_col_id=_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instcontactos__column-1&p_p_col_count=1&_contactos_portlet_ContactosPortlet_INSTANCE_3cyVGEANrBy8_javax.portlet.action=send&p_auth=czRtZynB" method="POST" id="form" onSubmit="event.preventDefault(); ejecutar();"> <input class="form-control" type="hidden" required id="language" name="language" value="es_ES" style="visible:false;"/> <div class="form-group"> <div class="col-sm-12"> <label for="nombre"></label> <input class="form-control" type="text" required id="nombre" placeholder="Nombre" name="nombre" value="" /> </div> </div> <div class="form-group"> <div class="col-sm-12"> <label for="apellido"></label> <input class="form-control" type="text" required id="apellido" placeholder="Apellido" name="apellido" value="" /> </div> </div> <div class="form-group"> <div class="col-sm-12"> <label for="empresa"></label> <input class="form-control" id="empresa" type="text" placeholder="Empresa" name="empresa" value="" /> </div> </div> <div class="form-group"> <div class="col-sm-12"> <label for="cargo"></label> <input class="form-control" id="cargo" type="text" placeholder="Cargo" name="cargo" value="" /> </div> </div> <div class="form-group"> <div class="col-sm-12"> <label for="telefono"></label> <input class="form-control" id="telefono" type="text" required placeholder="Teléfono" name="telefono" value="" /> </div> </div> <div class="form-group"> <div class="col-sm-12"> <label for="email"></label> <input class="form-control" id="email" type="email" required placeholder="E-mail" name="email" value="" /> </div> </div> <div class="form-group"> <div class="col-sm-12"> <label for="mensaje"></label> <textarea class="form-control" id="mensaje" rows="3" required placeholder="Mensaje" name="mensaje" ></textarea> </div> </div> <div class="form-group"> <div class="col-sm-12"> <label for="html_element"></label> <div id="html_element" required></div> </div> </div> <div class="form-group"> <div class="col-sm-12"> <div class="button-holder " > <button class="btn btn-primary btn-default" id="_contactos_portlet_ContactosPortlet_INSTANCE_3cyVGEANrBy8_fqtm" type="submit" > <span class="lfr-btn-label">Enviar</span> </button> </div> </div> </div> </form> <script src='https://www.google.com/recaptcha/api.js?onload=onloadCallback&render=explicit'></script> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </div> <!-- Datos + Mapa de Google --> <div class="col-xs-12 col-sm-4 mb-mobile"> <div class="row"> <!-- Datos --> <div class="col-sm-12 direccion"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instinfocontactos_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instinfocontactos"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instinfocontactos_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instinfocontactos_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instinfocontactos__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_EwAL4lf21hdc_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_EwAL4lf21hdc"> <div class="portlet-content"> <h2 class="portlet-title-text">Información de contacto</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <h4>Pesquera Iquique-Guanaye S.A.</h4> <p>Av. El Golf 150 piso 17</p> <p>Las Condes, Santiago, Chile.</p> <p>Tel. (56-2) 2461 7021 - Fax. (56-2) 2461 7070</p> <p>Casilla 3781 Santiago</p> <hr /> <h5>Contacto Inversionista</h5> <p><strong>Eduardo Navarro Beltrán</strong><br /> <br /> E-mail: <img alt="texto e-mail contacto" src="/documents/34275/34711/txt-mail-contacto-igemar.png/0d533649-aeb5-96c2-9180-226e52ba2a1c?t=1488898016544" style="vertical-align: bottom;" /> Fono: (56-2) 2461 7021</p> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </div> <!-- /.direccion --> </div> </div> <!-- Mapa de Google --> <div class="col-xs-12 col-sm-4 mb-mobile mapa-g"> <iframe src="https://www.google.com/maps/embed?key=AIzaSyCAAN8L7pmMgSZQZ-HMPuIBH9xmnDcxpWQ&pb=!1m18!1m12!1m3!1d3330.3500716383255!2d-70.59469008435245!3d-33.414116480784415!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x9662cf3e0fa7a67f%3A0x300d0c7f976e2ec8!2sEl+Golf+150%2C+Las+Condes%2C+Regi%C3%B3n+Metropolitana!5e0!3m2!1sen!2scl!4v1486074188631" width="100%" frameborder="0" style="border:0" allowfullscreen></iframe> </div> </div> <!-- /.row --> </section> </div> <!-- /.contenedor-calugas --> </div> </div> <!-- /.container-fluid --> <!-- FOOTER lista enlaces --> <div class="footer-site"> <div class="container-fluid"> <ul class="row"> <li class="col-xs-12 col-sm-2 ajuste-ancho"> <ul> <!-- español --> <li class="titulo-categoria"><a title="Ir a enlace" href="#destacados">Destacados</a></li> <li><a title="Ir a enlace" href="#negocios" opcion="empresas">Inversiones Principales</a></li> <li><a title="Ir a enlace" href="#memorias">Memoria Anual </a></li> <li><a title="Ir a enlace" href="http://www.sercor.cl" target="_blank">Servicio a Accionistas</a></li> <li><a title="Ir a enlace" href="#accionistas" opcion="juntas">Junta Anual de Accionistas</a></li> </ul> </li> <li class="col-xs-12 col-sm-2 ajuste-ancho"> <ul> <!-- español --> <li class="titulo-categoria"><a title="Ir a enlace" href="#quienessomos" opcion="empresa">Quiénes Somos</a></li> <li><a title="Ir a enlace" href="#quienessomos" opcion="empresa">La Empresa</a></li> <li><a title="Ir a enlace" href="#quienessomos" opcion="antecedentes">Antecedentes de la Sociedad</a></li> <li><a title="Ir a enlace" href="#quienessomos" opcion="hitos">Hitos</a></li> </ul> </li> <li class="col-xs-12 col-sm-2 ajuste-ancho"> <ul> <!-- español --> <li class="titulo-categoria"><a title="Ir a enlace" href="#negocios" opcion="empresas">Negocios</a></li> <li><a title="Ir a enlace" href="#negocios" opcion="empresas">Empresas Afiliadas y Asociadas</a></li> </ul> </li> <li class="col-xs-12 col-sm-2 ajuste-ancho"> <ul> <!-- español --> <li class="titulo-categoria"><a title="Ir a enlace" href="#gobierno" opcion="directorio">Gobierno Corporativo</a></li> <li><a title="Ir a enlace" href="#gobierno" opcion="directorio">Directorio</a></li> <li><a title="Ir a enlace" href="#gobierno" opcion="administracion">Administración y/o Ejecutivos Principales</a></li> <li><a title="Ir a enlace" href="#gobierno" opcion="modelos">Modelos y Prácticas de Gobierno Corporativo</a></li> <li><a title="Ir a enlace" href="https://www.canaldedenuncia.cl/cda/sercor/cdpages/inicio.aspx" target="_blank">Canal de Denuncias</a></li> </ul> </li> <li class="col-xs-12 col-sm-2 ajuste-ancho"> <ul> <!-- español --> <li class="titulo-categoria"><a title="Ir a enlace" href="#inversionistas" opcion="estados">Inversionistas</a></li> <li><a title="Ir a enlace" href="#memorias">Memorias Anuales</a></li> <li><a title="Ir a enlace" href="#inversionistas" opcion="estados">Estados Financieros</a></li> <li><a title="Ir a enlace" href="#inversionistas" opcion="informacion">Información Bursátil</a></li> <li><a title="Ir a enlace" href="#contactos">IR</a></li> </ul> </li> <li class="col-xs-12 col-sm-2 ajuste-ancho"> <ul> <!-- español --> <li class="titulo-categoria"><a title="Ir a enlace" href="#accionistas" opcion="juntas">Accionistas</a></li> <li><a title="Ir a enlace" href="#accionistas" opcion="juntas">Juntas Anual de Accionistas</a></li> <li><a title="Ir a enlace" href="http://www.sercor.cl" target="_blank">Servicio a Accionistas</a></li> <li><a title="Ir a enlace" href="#accionistas" opcion="propiedad">Propiedad</a></li> <li><a title="Ir a enlace" href="#accionistas" opcion="dividendos">Dividendos</a></li> <li><a title="Ir a enlace" href="#accionistas" opcion="hechos">Hechos Esenciales</a></li> <li><a title="Ir a enlace" href="#accionistas" opcion="actas">Actas de Juntas</a></li> </ul> </li> <li class="col-xs-12 col-sm-12 footer-nav"> <hr /> <div class="row"> <ul class="col-xs-12 col-sm-12 pull-right"> <div class="pull-right"> <!-- español --> <li><a href="https://www.canaldedenuncia.cl/cda/sercor/cdpages/inicio.aspx" target="_blank" title="Ir a enlace">Canal de Denuncias</a></li> <li><a href="#" data-toggle="modal" data-target="#modalCondicionesdeUsos" title="Ir a enlace">Condiciones de Uso</a></li> <li><a href="#" data-toggle="modal" data-target="#modalAvisoLegal" title="Ir a enlace">Aviso Legal de Privacidad</a></li> </div> </ul> </div> <!-- /.row --> </li> </ul> <!-- /.row --> </div> <!-- /.container-fluid --> </div> <!-- /.footer-site --> </section> </div> <!-- / #contacto --> </div> <!-- / #fullpage --> <!-- Modal :: "Condiciones de Uso" --> <div class="modal fade" id="modalCondicionesdeUsos" tabindex="-1" style="display: none;" role="dialog" aria-labelledby="modalCondicionesdeUsosLabel"> <div class="modal-dialog" role="document"> <div class="modal-content"> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> <!-- español --> <h4 class="modal-title" id="modalCondicionesdeUsosLabel">Condiciones de Uso</h4> </div> <div class="modal-body"> <!-- español --> <strong class="enunciado">Principios Generales - Responsabilidad del Usuario</strong> <p>El usuario se obliga a utilizar los servicios y contenidos que le proporciona el PORTAL conforme a la legislación vigente y a los principios de buena fe y usos generalmente aceptados y a no contravenir con su actuación a través de la Web la moral, el orden público o la seguridad nacional. Por tanto, queda prohibido todo uso con fines ilícitos o que perjudiquen o impidan, puedan dañar y/o sobrecargar, de cualquier forma, la utilización y normal funcionamiento del Sitio directa o indirectamente atenten contra el mismo o contra cualquier tercero.</p> <p>El usuario no transmitirá a través del servicio ningún concepto que atente contra los valores y la dignidad de las personas, de acuerdo con las normas nacionales e internacionales de protección a los derechos de las personas.</p> <p>Asimismo, quedan prohibidas la reproducción, distribución, transmisión, adaptación o modificación, por cualquier medio y en cualquier forma, de los contenidos de la Web del Sitio de Pesquera Iquique-Guanaye S.A. (textos, diseños, gráficos, informaciones, bases de datos, archivos de sonido y/o imagen, logos,…) y demás elementos de este sitio, salvo autorización previa de sus legítimos titulares o cuando así resulte permitido por la ley.</p> <p>Se prohíben asimismo, respecto de los contenidos antes detallados, cualquier utilización comercial o publicitaria, distinta de la estrictamente permitida, en su caso, y la vulneración, en general, de cualquier derecho derivado de los mismos.</p> </div> </div> </div> </div> <!-- Modal :: "Aviso Legal de Privacidad" --> <div class="modal fade" id="modalAvisoLegal" tabindex="-1" role="dialog" style="display: none;" aria-labelledby="modalAvisoLegalLabel"> <div class="modal-dialog" role="document"> <div class="modal-content"> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> <!-- español --> <h4 class="modal-title" id="modalAvisoLegalLabel">Aviso Legal de Privacidad</h4> </div> <div class="modal-body"> <!-- español --> <p>Empresa Pesquera Iquique-Guanaye S.A. pone a disposición de los usuarios de Internet su sitio web <a href="www.igemar.cl">www.igemar.cl</a> en forma gratuita.</p> <p>El acceso a y/o uso del sitio es totalmente voluntario y atribuye a quien lo realiza la condición de USUARIO. Todo USUARIO acepta, desde el mismo momento en el que accede, sin ningún tipo de reserva, el contenido de las presentes "CONDICIONES GENERALES" así como, en su caso, las "Condiciones Particulares" que puedan complementarlas, sustituirlas o modificarlas en algún sentido en relación con los contenidos del Sitio. En consecuencia, el USUARIO deberá leer detenidamente unas y otras antes del acceso y de utilización de cualquier servicio del Sitio bajo su entera responsabilidad.</p> <strong class="enunciado">Objeto y Modificación de condiciones</strong> <p>Empresa Pesquera Iquique-Guanaye S.A. pone a disposición de los USUARIOS la posibilidad de navegar, accediendo a los contenidos del sitio, siempre que lo hagan de acuerdo con lo previsto en las presentes CONDICIONES DE USO.</p> <p>En cualquier caso, Empresa Pesquera Iquique-Guanaye S.A. se reserva el derecho de, en cualquier momento y sin necesidad de previo aviso, modificar o eliminar el contenido, la estructura, el diseño, los servicios y las condiciones de acceso y/o uso de este sitio, cada vez que lo estime oportuno.</p> </div> </div> </div> </div> <!-- FIN DEL CONTENIDO --> <script type="text/javascript">Liferay.BrowserSelectors.run();</script> <script type="text/javascript">Liferay.currentURL="/";Liferay.currentURLEncoded="%2F";</script> <script type="text/javascript"></script> <script type="text/javascript">Liferay.Portlet.onLoad({canEditTitle:!1,columnPos:0,isStatic:"end",namespacedId:"p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthitos_",portletId:"com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthitos",refreshURL:"/c/portal/render_portlet?p_l_id\x3d34686\x26p_p_id\x3dcom_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthitos\x26p_p_lifecycle\x3d0\x26p_t_lifecycle\x3d0\x26p_p_state\x3dnormal\x26p_p_mode\x3dview\x26p_p_col_id\x3dnull\x26p_p_col_pos\x3dnull\x26p_p_col_count\x3dnull\x26p_p_static\x3d1\x26p_p_isolated\x3d1\x26currentURL\x3d%2F"});
1786Liferay.provide(Liferay.Portlet,"loadCSSEditor",function(a,b,c,d){Liferay.PortletCSS.init(a,b,c,d)},["liferay-look-and-feel"]);</script> <script type="text/javascript">AUI().use("aui-base",function(a){(a=window.frameElement)&&"simulationDeviceIframe"===a.getAttribute("id")&&AUI().one("body").addClass("lfr-has-simulation-panel")});</script> <!-- inject:js --> <script>define._amd=define.amd;define.amd=!1;</script> <!-- Recaptcha de Google --> <!-- <script src='https://www.google.com/recaptcha/api.js'></script>--> <!-- Scrolloverflow --> <script type="text/javascript" src="https://www.igemar.cl/o/igemar-theme-v-4-theme/js/scrolloverflow.min.js"></script> <!-- Plugin fullPAge --> <script type="text/javascript" src="https://www.igemar.cl/o/igemar-theme-v-4-theme/js/jquery.fullPage.min.js"></script> <!-- Bootstrap --> <!--<script type="text/javascript" src="https://www.igemar.cl/o/igemar-theme-v-4-theme/js/bootstrap.min.js"></script>--> <script>define.amd=define._amd;</script> <script type="text/javascript" src="https://www.igemar.cl/o/igemar-theme-v-4-theme/js/analitycs.js"></script> <script>(function(f,a,g,h,d,e,b){f.GoogleAnalyticsObject=d;f[d]=f[d]||function(){(f[d].q=f[d].q||[]).push(arguments)};f[d].l=1*new Date;e=a.createElement(g);b=a.getElementsByTagName(g)[0];e.async=1;e.src=h;b.parentNode.insertBefore(e,b)})(window,document,"script","https://www.google-analytics.com/analytics.js","ga");ga("create","UA-96260257-3","auto");ga("send","pageview");
1787b?(a("empresa"),a("empresas"),a("directorio"),a("juntas")):"#accionistas"==b&&(a("empresa"),a("empresas"),a("directorio"),a("estados")),"undefined"!=c&&($("#link-"+c).addClass("active"),$("#cont-"+c).show(),"hitos"==c&&$("#cont-hitos-timeline").show()),$.fn.fullpage.reBuild())))})});</script> <!-- endinject --> <!-- JQuery --> </body> </html>
1788######################################################################################################################################
1789https://fonts.googleapis.com/css?family=Lato:300,400,400i,700,900
1790https://www.igemar.cl/principal?p_p_id\x3dcontactos_portlet_ContactosPortlet_INSTANCE_3cyVGEANrBy8\x26p_p_lifecycle\x3d2\x26p_p_state\x3dnormal\x26p_p_mode\x3dview\x26p_p_resource_id\x3denviarCorreo\x26p_p_cacheability\x3dcacheLevelPage\x26p_p_col_id\x3d_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instcontactos__column-1\x26p_p_col_count\x3d1
1791/o/igemar-theme-v-4-theme
1792#####################################################################################################################################
1793http://www.igemar.cl [302 Found] Apache[2.2.34], Country[UNITED STATES][US], HTTPServer[Apache/2.2.34 (Amazon)], IP[52.52.234.222], RedirectLocation[https://www.igemar.cl/], Title[302 Found]
1794https://www.igemar.cl/ [200 OK] Apache, Cookies[COOKIE_SUPPORT,GUEST_LANGUAGE_ID,JSESSIONID], Country[UNITED STATES][US], Frame, HTML5, HTTPServer[Apache-Coyote/1.1], HttpOnly[COOKIE_SUPPORT,GUEST_LANGUAGE_ID,JSESSIONID], IP[52.52.234.222], JQuery, Java, Liferay, Meta-Author[Igemar], Script[text/javascript], Title[Principal - Igemar], UncommonHeaders[x-content-type-options,liferay-portal], X-Frame-Options[SAMEORIGIN], X-XSS-Protection[1]
1795####################################################################################################################################
1796
1797wig - WebApp Information Gatherer
1798
1799
1800Scanning https://www.igemar.cl...
1801______________________ SITE INFO ______________________
1802IP Title
180352.52.234.222 Estado - Igemar
1804
1805_______________________ VERSION _______________________
1806Name Versions Type
1807apache-coyote 1.1 Platform
1808
1809_____________________ INTERESTING _____________________
1810URL Note Type
1811/readme.html Readme file Interesting
1812/install.php Installation file Interesting
1813/test.php Test file Interesting
1814/test.htm Test file Interesting
1815
1816_______________________________________________________
1817Time: 123.1 sec Urls: 648 Fingerprints: 40401
1818######################################################################################################################################
1819===============================================================
1820Gobuster v3.0.1
1821by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)
1822===============================================================
1823[+] Url: http://www.igemar.cl
1824[+] Threads: 10
1825[+] Wordlist: /usr/share/sniper/wordlists/vhosts.txt
1826[+] User Agent: gobuster/3.0.1
1827[+] Timeout: 10s
1828===============================================================
18292020/03/05 23:19:29 Starting gobuster
1830===============================================================
1831Found: admin.www.igemar.cl (Status: 302) [Size: 297]
1832Found: apache.www.igemar.cl (Status: 302) [Size: 299]
1833Found: api.www.igemar.cl (Status: 302) [Size: 293]
1834Found: alpha.www.igemar.cl (Status: 302) [Size: 297]
1835Found: alerts.www.igemar.cl (Status: 302) [Size: 299]
1836Found: 127.0.0.1.www.igemar.cl (Status: 302) [Size: 305]
1837Found: ads.www.igemar.cl (Status: 302) [Size: 293]
1838Found: adserver.www.igemar.cl (Status: 302) [Size: 303]
1839Found: ap.www.igemar.cl (Status: 302) [Size: 291]
1840Found: administration.www.igemar.cl (Status: 302) [Size: 315]
1841Found: cdn.www.igemar.cl (Status: 302) [Size: 293]
1842Found: appserver.www.igemar.cl (Status: 302) [Size: 305]
1843Found: backup.www.igemar.cl (Status: 302) [Size: 299]
1844Found: chat.www.igemar.cl (Status: 302) [Size: 295]
1845Found: blog.www.igemar.cl (Status: 302) [Size: 295]
1846Found: app.www.igemar.cl (Status: 302) [Size: 293]
1847Found: auth.www.igemar.cl (Status: 302) [Size: 295]
1848Found: beta.www.igemar.cl (Status: 302) [Size: 295]
1849Found: aptest.www.igemar.cl (Status: 302) [Size: 299]
1850Found: apps.www.igemar.cl (Status: 302) [Size: 295]
1851Found: cvs.www.igemar.cl (Status: 302) [Size: 293]
1852Found: corp.www.igemar.cl (Status: 302) [Size: 295]
1853Found: demo.www.igemar.cl (Status: 302) [Size: 295]
1854Found: dashboard.www.igemar.cl (Status: 302) [Size: 305]
1855Found: crs.www.igemar.cl (Status: 302) [Size: 293]
1856Found: database.www.igemar.cl (Status: 302) [Size: 303]
1857Found: citrix.www.igemar.cl (Status: 302) [Size: 299]
1858Found: db.www.igemar.cl (Status: 302) [Size: 291]
1859Found: cms.www.igemar.cl (Status: 302) [Size: 293]
1860Found: dev.www.igemar.cl (Status: 302) [Size: 293]
1861Found: devsql.www.igemar.cl (Status: 302) [Size: 299]
1862Found: devel.www.igemar.cl (Status: 302) [Size: 297]
1863Found: dhcp.www.igemar.cl (Status: 302) [Size: 295]
1864Found: devtest.www.igemar.cl (Status: 302) [Size: 301]
1865Found: development.www.igemar.cl (Status: 302) [Size: 309]
1866Found: dns1.www.igemar.cl (Status: 302) [Size: 295]
1867Found: direct.www.igemar.cl (Status: 302) [Size: 299]
1868Found: dmz.www.igemar.cl (Status: 302) [Size: 293]
1869Found: dns.www.igemar.cl (Status: 302) [Size: 293]
1870Found: dns0.www.igemar.cl (Status: 302) [Size: 295]
1871Found: en.www.igemar.cl (Status: 302) [Size: 291]
1872Found: download.www.igemar.cl (Status: 302) [Size: 303]
1873Found: dns2.www.igemar.cl (Status: 302) [Size: 295]
1874Found: erp.www.igemar.cl (Status: 302) [Size: 293]
1875Found: eshop.www.igemar.cl (Status: 302) [Size: 297]
1876Found: fileserver.www.igemar.cl (Status: 302) [Size: 307]
1877Found: f5.www.igemar.cl (Status: 302) [Size: 291]
1878Found: firewall.www.igemar.cl (Status: 302) [Size: 303]
1879Found: exchange.www.igemar.cl (Status: 302) [Size: 303]
1880Found: forum.www.igemar.cl (Status: 302) [Size: 297]
1881Found: help.www.igemar.cl (Status: 302) [Size: 295]
1882Found: ftp0.www.igemar.cl (Status: 302) [Size: 295]
1883Found: git.www.igemar.cl (Status: 302) [Size: 293]
1884Found: gw.www.igemar.cl (Status: 302) [Size: 291]
1885Found: ftp.www.igemar.cl (Status: 302) [Size: 293]
1886Found: helpdesk.www.igemar.cl (Status: 302) [Size: 303]
1887Found: home.www.igemar.cl (Status: 302) [Size: 295]
1888Found: http.www.igemar.cl (Status: 302) [Size: 295]
1889Found: host.www.igemar.cl (Status: 302) [Size: 295]
1890Found: id.www.igemar.cl (Status: 302) [Size: 291]
1891Found: internet.www.igemar.cl (Status: 302) [Size: 303]
1892Found: intra.www.igemar.cl (Status: 302) [Size: 297]
1893Found: internal.www.igemar.cl (Status: 302) [Size: 303]
1894Found: images.www.igemar.cl (Status: 302) [Size: 299]
1895Found: info.www.igemar.cl (Status: 302) [Size: 295]
1896Found: intranet.www.igemar.cl (Status: 302) [Size: 303]
1897Found: ipv6.www.igemar.cl (Status: 302) [Size: 295]
1898Found: ldap.www.igemar.cl (Status: 302) [Size: 295]
1899Found: lab.www.igemar.cl (Status: 302) [Size: 293]
1900Found: linux.www.igemar.cl (Status: 302) [Size: 297]
1901Found: localhost.www.igemar.cl (Status: 302) [Size: 305]
1902Found: local.www.igemar.cl (Status: 302) [Size: 297]
1903Found: log.www.igemar.cl (Status: 302) [Size: 293]
1904Found: m.www.igemar.cl (Status: 302) [Size: 289]
1905Found: mail.www.igemar.cl (Status: 302) [Size: 295]
1906Found: mail2.www.igemar.cl (Status: 302) [Size: 297]
1907Found: mailgate.www.igemar.cl (Status: 302) [Size: 303]
1908Found: main.www.igemar.cl (Status: 302) [Size: 295]
1909Found: mail3.www.igemar.cl (Status: 302) [Size: 297]
1910Found: manage.www.igemar.cl (Status: 302) [Size: 299]
1911Found: mirror.www.igemar.cl (Status: 302) [Size: 299]
1912Found: monitor.www.igemar.cl (Status: 302) [Size: 301]
1913Found: mobile.www.igemar.cl (Status: 302) [Size: 299]
1914Found: mgmt.www.igemar.cl (Status: 302) [Size: 295]
1915Found: mta.www.igemar.cl (Status: 302) [Size: 293]
1916Found: mssql.www.igemar.cl (Status: 302) [Size: 297]
1917Found: mx.www.igemar.cl (Status: 302) [Size: 291]
1918Found: mx1.www.igemar.cl (Status: 302) [Size: 293]
1919Found: mx0.www.igemar.cl (Status: 302) [Size: 293]
1920Found: noc.www.igemar.cl (Status: 302) [Size: 293]
1921Found: ns0.www.igemar.cl (Status: 302) [Size: 293]
1922Found: ns.www.igemar.cl (Status: 302) [Size: 291]
1923Found: mysql.www.igemar.cl (Status: 302) [Size: 297]
1924Found: news.www.igemar.cl (Status: 302) [Size: 295]
1925Found: ns3.www.igemar.cl (Status: 302) [Size: 293]
1926Found: ns2.www.igemar.cl (Status: 302) [Size: 293]
1927Found: ns1.www.igemar.cl (Status: 302) [Size: 293]
1928Found: old.www.igemar.cl (Status: 302) [Size: 293]
1929Found: ntp.www.igemar.cl (Status: 302) [Size: 293]
1930Found: owa.www.igemar.cl (Status: 302) [Size: 293]
1931Found: ops.www.igemar.cl (Status: 302) [Size: 293]
1932Found: portal.www.igemar.cl (Status: 302) [Size: 299]
1933Found: pbx.www.igemar.cl (Status: 302) [Size: 293]
1934Found: oracle.www.igemar.cl (Status: 302) [Size: 299]
1935Found: s3.www.igemar.cl (Status: 302) [Size: 291]
1936Found: server.www.igemar.cl (Status: 302) [Size: 299]
1937Found: secure.www.igemar.cl (Status: 302) [Size: 299]
1938Found: sharepoint.www.igemar.cl (Status: 302) [Size: 307]
1939Found: shop.www.igemar.cl (Status: 302) [Size: 295]
1940Found: smtp.www.igemar.cl (Status: 302) [Size: 295]
1941Found: ssh.www.igemar.cl (Status: 302) [Size: 293]
1942Found: sql.www.igemar.cl (Status: 302) [Size: 293]
1943Found: sip.www.igemar.cl (Status: 302) [Size: 293]
1944Found: squid.www.igemar.cl (Status: 302) [Size: 297]
1945Found: stage.www.igemar.cl (Status: 302) [Size: 297]
1946Found: ssl.www.igemar.cl (Status: 302) [Size: 293]
1947Found: staging.www.igemar.cl (Status: 302) [Size: 301]
1948Found: status.www.igemar.cl (Status: 302) [Size: 299]
1949Found: stats.www.igemar.cl (Status: 302) [Size: 297]
1950Found: test2.www.igemar.cl (Status: 302) [Size: 297]
1951Found: svn.www.igemar.cl (Status: 302) [Size: 293]
1952Found: test1.www.igemar.cl (Status: 302) [Size: 297]
1953Found: syslog.www.igemar.cl (Status: 302) [Size: 299]
1954Found: test.www.igemar.cl (Status: 302) [Size: 295]
1955Found: uat.www.igemar.cl (Status: 302) [Size: 293]
1956Found: upload.www.igemar.cl (Status: 302) [Size: 299]
1957Found: testing.www.igemar.cl (Status: 302) [Size: 301]
1958Found: v1.www.igemar.cl (Status: 302) [Size: 291]
1959Found: v2.www.igemar.cl (Status: 302) [Size: 291]
1960Found: vnc.www.igemar.cl (Status: 302) [Size: 293]
1961Found: v3.www.igemar.cl (Status: 302) [Size: 291]
1962Found: voip.www.igemar.cl (Status: 302) [Size: 295]
1963Found: vm.www.igemar.cl (Status: 302) [Size: 291]
1964Found: vpn.www.igemar.cl (Status: 302) [Size: 293]
1965Found: web2test.www.igemar.cl (Status: 302) [Size: 303]
1966Found: whois.www.igemar.cl (Status: 302) [Size: 297]
1967Found: web.www.igemar.cl (Status: 302) [Size: 293]
1968Found: wiki.www.igemar.cl (Status: 302) [Size: 295]
1969Found: www.www.igemar.cl (Status: 302) [Size: 293]
1970Found: www2.www.igemar.cl (Status: 302) [Size: 295]
1971Found: xml.www.igemar.cl (Status: 302) [Size: 293]
1972===============================================================
19732020/03/05 23:19:46 Finished
1974===============================================================
1975#####################################################################################################################################
1976Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-05 23:19 EST
1977NSE: Loaded 161 scripts for scanning.
1978NSE: Script Pre-scanning.
1979Initiating NSE at 23:19
1980Completed NSE at 23:19, 0.00s elapsed
1981Initiating NSE at 23:19
1982Completed NSE at 23:19, 0.00s elapsed
1983Initiating Parallel DNS resolution of 1 host. at 23:19
1984Completed Parallel DNS resolution of 1 host. at 23:19, 0.06s elapsed
1985Initiating SYN Stealth Scan at 23:19
1986Scanning www.igemar.cl (52.52.234.222) [1 port]
1987Discovered open port 80/tcp on 52.52.234.222
1988Completed SYN Stealth Scan at 23:19, 0.31s elapsed (1 total ports)
1989Initiating Service scan at 23:19
1990Scanning 1 service on www.igemar.cl (52.52.234.222)
1991Completed Service scan at 23:19, 6.58s elapsed (1 service on 1 host)
1992Initiating OS detection (try #1) against www.igemar.cl (52.52.234.222)
1993Retrying OS detection (try #2) against www.igemar.cl (52.52.234.222)
1994Initiating Traceroute at 23:20
1995Completed Traceroute at 23:20, 3.38s elapsed
1996Initiating Parallel DNS resolution of 11 hosts. at 23:20
1997Completed Parallel DNS resolution of 11 hosts. at 23:20, 0.60s elapsed
1998NSE: Script scanning 52.52.234.222.
1999Initiating NSE at 23:20
2000Completed NSE at 23:21, 90.33s elapsed
2001Initiating NSE at 23:21
2002Completed NSE at 23:21, 1.71s elapsed
2003Nmap scan report for www.igemar.cl (52.52.234.222)
2004Host is up (0.38s latency).
2005rDNS record for 52.52.234.222: ec2-52-52-234-222.us-west-1.compute.amazonaws.com
2006
2007PORT STATE SERVICE VERSION
200880/tcp open http Apache httpd 2.2.34
2009| http-brute:
2010|_ Path "/" does not require authentication
2011|_http-chrono: Request times for /; avg: 1041.81ms; min: 928.41ms; max: 1237.97ms
2012|_http-csrf: Couldn't find any CSRF vulnerabilities.
2013|_http-date: Fri, 06 Mar 2020 04:20:07 GMT; -3s from local time.
2014|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
2015|_http-dombased-xss: Couldn't find any DOM based XSS.
2016|_http-errors: Couldn't find any error pages.
2017|_http-feed: Couldn't find any feeds.
2018|_http-fetch: Please enter the complete path of the directory to save data in.
2019| http-headers:
2020| Date: Fri, 06 Mar 2020 04:20:20 GMT
2021| Server: Apache/2.2.34 (Amazon)
2022| Location: https://www.igemar.cl/
2023| Content-Length: 285
2024| Connection: close
2025| Content-Type: text/html; charset=iso-8859-1
2026|
2027|_ (Request type: GET)
2028|_http-jsonp-detection: Couldn't find any JSONP endpoints.
2029| http-methods:
2030|_ Supported Methods: GET HEAD POST OPTIONS
2031|_http-mobileversion-checker: No mobile version detected.
2032|_http-passwd: ERROR: Script execution failed (use -d to debug)
2033| http-security-headers:
2034| X_Frame_Options:
2035| Header: X-Frame-Options: SAMEORIGIN
2036| Description: The browser must not display this content in any frame from a page of different origin than the content itself.
2037| X_XSS_Protection:
2038| Header: X-XSS-Protection: 1
2039| X_Content_Type_Options:
2040| Header: X-Content-Type-Options: nosniff
2041|_ Description: Will prevent the browser from MIME-sniffing a response away from the declared content-type.
2042|_http-server-header: Apache/2.2.34 (Amazon)
2043| http-sitemap-generator:
2044| Directory structure:
2045| Longest directory structure:
2046| Depth: 0
2047| Dir: /
2048| Total files found (by extension):
2049|_
2050|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
2051|_http-title: Did not follow redirect to https://www.igemar.cl/
2052| http-vhosts:
2053|_127 names had status 302
2054|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
2055|_http-xssed: No previously reported XSS vuln.
2056| vulners:
2057| cpe:/a:apache:http_server:2.2.34:
2058| CVE-2018-1312 6.8 https://vulners.com/cve/CVE-2018-1312
2059|_ CVE-2016-8612 3.3 https://vulners.com/cve/CVE-2016-8612
2060Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2061Device type: general purpose|PBX
2062Running (JUST GUESSING): Linux 3.X (88%), Vodavi embedded (87%)
2063OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/h:vodavi:xts-ip
2064Aggressive OS guesses: Linux 3.10 - 3.13 (88%), Vodavi XTS-IP PBX (87%)
2065No exact OS matches for host (test conditions non-ideal).
2066Uptime guess: 40.267 days (since Sat Jan 25 16:56:51 2020)
2067Network Distance: 17 hops
2068TCP Sequence Prediction: Difficulty=261 (Good luck!)
2069IP ID Sequence Generation: All zeros
2070Service Info: Host: inversionistas.antarchile.cl
2071
2072TRACEROUTE (using port 80/tcp)
2073HOP RTT ADDRESS
20741 139.23 ms 10.202.9.1
20752 255.94 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
20763 255.98 ms 5.56.20.161
20774 256.02 ms ae12-2022.fra10.core-backbone.com (81.95.15.57)
20785 256.01 ms ae26.cr10-fra2.ip4.gtt.net (87.119.97.189)
20796 371.31 ms et-0-0-31.cr5-sjc1.ip4.gtt.net (89.149.180.38)
20807 371.35 ms a100-us-gw.ip4.gtt.net (173.241.129.142)
20818 371.40 ms 54.240.242.48
20829 371.39 ms 54.240.242.87
208310 371.48 ms 72.21.222.17
208411 ... 16
208517 385.46 ms ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
2086
2087NSE: Script Post-scanning.
2088Initiating NSE at 23:21
2089Completed NSE at 23:21, 0.00s elapsed
2090Initiating NSE at 23:21
2091Completed NSE at 23:21, 0.00s elapsed
2092Read data files from: /usr/bin/../share/nmap
2093OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
2094Nmap done: 1 IP address (1 host up) scanned in 113.66 seconds
2095 Raw packets sent: 113 (10.012KB) | Rcvd: 52 (3.352KB)
2096#####################################################################################################################################
2097------------------------------------------------------------------------------------------------------------------------
2098
2099[ ! ] Starting SCANNER INURLBR 2.1 at [05-03-2020 23:33:04]
2100[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
2101It is the end user's responsibility to obey all applicable local, state and federal laws.
2102Developers assume no liability and are not responsible for any misuse or damage caused by this program
2103
2104[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.igemar.cl/output/inurlbr-www.igemar.cl ]
2105[ INFO ][ DORK ]::[ site:www.igemar.cl ]
2106[ INFO ][ SEARCHING ]:: {
2107[ INFO ][ ENGINE ]::[ GOOGLE - www.google.com.af ]
2108
2109[ INFO ][ SEARCHING ]::
2110-[:::]
2111[ INFO ][ ENGINE ]::[ GOOGLE API ]
2112
2113[ INFO ][ SEARCHING ]::
2114-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2115[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.ar ID: 006748068166572874491:55ez0c3j3ey ]
2116
2117[ INFO ][ SEARCHING ]::
2118-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2119
2120[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
2121
2122
2123 _[ - ]::--------------------------------------------------------------------------------------------------------------
2124|_[ + ] [ 0 / 100 ]-[23:33:32] [ - ]
2125|_[ + ] Target:: [ https://www.igemar.cl/ ]
2126|_[ + ] Exploit::
2127|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2128|_[ + ] More details:: / - / , ISP:
2129|_[ + ] Found:: UNIDENTIFIED
2130
2131 _[ - ]::--------------------------------------------------------------------------------------------------------------
2132|_[ + ] [ 1 / 100 ]-[23:33:35] [ - ]
2133|_[ + ] Target:: [ https://www.igemar.cl/web/guest ]
2134|_[ + ] Exploit::
2135|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2136|_[ + ] More details:: / - / , ISP:
2137|_[ + ] Found:: UNIDENTIFIED
2138
2139 _[ - ]::--------------------------------------------------------------------------------------------------------------
2140|_[ + ] [ 2 / 100 ]-[23:33:39] [ - ]
2141|_[ + ] Target:: [ https://www.igemar.cl/en/web/guest ]
2142|_[ + ] Exploit::
2143|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2144|_[ + ] More details:: / - / , ISP:
2145|_[ + ] Found:: UNIDENTIFIED
2146
2147 _[ - ]::--------------------------------------------------------------------------------------------------------------
2148|_[ + ] [ 3 / 100 ]-[23:33:42] [ - ]
2149|_[ + ] Target:: [ https://www.igemar.cl/en/group/control_panel?refererPlid=46108 ]
2150|_[ + ] Exploit::
2151|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2152|_[ + ] More details:: / - / , ISP:
2153|_[ + ] Found:: UNIDENTIFIED
2154
2155 _[ - ]::--------------------------------------------------------------------------------------------------------------
2156|_[ + ] [ 4 / 100 ]-[23:33:48] [ - ]
2157|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/175_codigo-de-etica-igemar.pdf ]
2158|_[ + ] Exploit::
2159|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2160|_[ + ] More details:: / - / , ISP:
2161|_[ + ] Found:: UNIDENTIFIED
2162
2163 _[ - ]::--------------------------------------------------------------------------------------------------------------
2164|_[ + ] [ 5 / 100 ]-[23:33:54] [ - ]
2165|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2006.pdf/1c36ee28-9739-2831-2461-60c9ea2e9bda ]
2166|_[ + ] Exploit::
2167|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2168|_[ + ] More details:: / - / , ISP:
2169|_[ + ] Found:: UNIDENTIFIED
2170
2171 _[ - ]::--------------------------------------------------------------------------------------------------------------
2172|_[ + ] [ 6 / 100 ]-[23:33:58] [ - ]
2173|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/Citacion_Accionistas_Igemar_2018.pdf/70247ae8-8363-59bb-6672-647117481524 ]
2174|_[ + ] Exploit::
2175|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2176|_[ + ] More details:: / - / , ISP:
2177|_[ + ] Found:: UNIDENTIFIED
2178
2179 _[ - ]::--------------------------------------------------------------------------------------------------------------
2180|_[ + ] [ 7 / 100 ]-[23:34:02] [ - ]
2181|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_analisis_razonado91123000_201606.pdf/11e6d74a-5605-2357-1500-4fc96ef6fd5e ]
2182|_[ + ] Exploit::
2183|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2184|_[ + ] More details:: / - / , ISP:
2185|_[ + ] Found:: UNIDENTIFIED
2186
2187 _[ - ]::--------------------------------------------------------------------------------------------------------------
2188|_[ + ] [ 8 / 100 ]-[23:34:06] [ - ]
2189|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/183706/Análisis_Razonado91123000_201806.pdf/35c5cb8c-9704-fcab-e5fb-3d345847f696 ]
2190|_[ + ] Exploit::
2191|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2192|_[ + ] More details:: / - / , ISP:
2193|_[ + ] Found:: UNIDENTIFIED
2194
2195 _[ - ]::--------------------------------------------------------------------------------------------------------------
2196|_[ + ] [ 9 / 100 ]-[23:34:10] [ - ]
2197|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201309.pdf/ba8f025b-fde5-a1e5-7607-39935f2a242e ]
2198|_[ + ] Exploit::
2199|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2200|_[ + ] More details:: / - / , ISP:
2201|_[ + ] Found:: UNIDENTIFIED
2202
2203 _[ - ]::--------------------------------------------------------------------------------------------------------------
2204|_[ + ] [ 10 / 100 ]-[23:34:16] [ - ]
2205|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/Igemar_eeff_2016.pdf/cd7cca3e-1dab-058c-d57a-e2283fd8bb8a ]
2206|_[ + ] Exploit::
2207|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2208|_[ + ] More details:: / - / , ISP:
2209|_[ + ] Found:: UNIDENTIFIED
2210
2211 _[ - ]::--------------------------------------------------------------------------------------------------------------
2212|_[ + ] [ 11 / 100 ]-[23:34:22] [ - ]
2213|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/Linea_directa_Igemar_ago2019.pdf/225427b0-26c5-08a9-d7a2-226faca0e411 ]
2214|_[ + ] Exploit::
2215|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2216|_[ + ] More details:: / - / , ISP:
2217|_[ + ] Found:: UNIDENTIFIED
2218
2219 _[ - ]::--------------------------------------------------------------------------------------------------------------
2220|_[ + ] [ 12 / 100 ]-[23:34:28] [ - ]
2221|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/Acta_Junta_Igemar_2019.pdf/f74084fc-0265-c92d-6cd0-c9acd9a8f55f ]
2222|_[ + ] Exploit::
2223|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2224|_[ + ] More details:: / - / , ISP:
2225|_[ + ] Found:: UNIDENTIFIED
2226
2227 _[ - ]::--------------------------------------------------------------------------------------------------------------
2228|_[ + ] [ 13 / 100 ]-[23:34:32] [ - ]
2229|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/Analisis_Razonado91123000_201712.pdf/882c4c22-3bfe-0ce7-3ac1-09226c215fa2 ]
2230|_[ + ] Exploit::
2231|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2232|_[ + ] More details:: / - / , ISP:
2233|_[ + ] Found:: UNIDENTIFIED
2234
2235 _[ - ]::--------------------------------------------------------------------------------------------------------------
2236|_[ + ] [ 14 / 100 ]-[23:34:36] [ - ]
2237|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/183706/HR_dic2018.pdf/99f8091d-4a2c-a3e8-653b-037e5df5a57a ]
2238|_[ + ] Exploit::
2239|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2240|_[ + ] More details:: / - / , ISP:
2241|_[ + ] Found:: UNIDENTIFIED
2242
2243 _[ - ]::--------------------------------------------------------------------------------------------------------------
2244|_[ + ] [ 15 / 100 ]-[23:34:40] [ - ]
2245|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/183706/Hechos_relevantes91123000_201809.pdf/f4bdbff1-7f48-bb63-ad30-e589d8ab9e7d ]
2246|_[ + ] Exploit::
2247|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2248|_[ + ] More details:: / - / , ISP:
2249|_[ + ] Found:: UNIDENTIFIED
2250
2251 _[ - ]::--------------------------------------------------------------------------------------------------------------
2252|_[ + ] [ 16 / 100 ]-[23:34:46] [ - ]
2253|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/memoria_igemar_2017.pdf/4bebaa66-6f29-5a96-3ebd-64ffacd76303 ]
2254|_[ + ] Exploit::
2255|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2256|_[ + ] More details:: / - / , ISP:
2257|_[ + ] Found:: UNIDENTIFIED
2258
2259 _[ - ]::--------------------------------------------------------------------------------------------------------------
2260|_[ + ] [ 17 / 100 ]-[23:34:51] [ - ]
2261|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2010.pdf/60c3ba85-4893-e79f-fa01-752a239e0124 ]
2262|_[ + ] Exploit::
2263|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2264|_[ + ] More details:: / - / , ISP:
2265|_[ + ] Found:: UNIDENTIFIED
2266
2267 _[ - ]::--------------------------------------------------------------------------------------------------------------
2268|_[ + ] [ 18 / 100 ]-[23:34:57] [ - ]
2269|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2008.pdf/8dc0a611-bd78-da92-411d-a29552d33f64 ]
2270|_[ + ] Exploit::
2271|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2272|_[ + ] More details:: / - / , ISP:
2273|_[ + ] Found:: UNIDENTIFIED
2274
2275 _[ - ]::--------------------------------------------------------------------------------------------------------------
2276|_[ + ] [ 19 / 100 ]-[23:35:02] [ - ]
2277|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/practicas_gobierno_corporativo_2018_Igemar.pdf/f18f770b-2296-4386-fd63-f84efcd73c9b ]
2278|_[ + ] Exploit::
2279|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2280|_[ + ] More details:: / - / , ISP:
2281|_[ + ] Found:: UNIDENTIFIED
2282
2283 _[ - ]::--------------------------------------------------------------------------------------------------------------
2284|_[ + ] [ 20 / 100 ]-[23:35:06] [ - ]
2285|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_analisis_razonado_igemar_0313.pdf/59c26bf9-31c1-3934-f2f5-4c5bec1b1ed1 ]
2286|_[ + ] Exploit::
2287|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2288|_[ + ] More details:: / - / , ISP:
2289|_[ + ] Found:: UNIDENTIFIED
2290
2291 _[ - ]::--------------------------------------------------------------------------------------------------------------
2292|_[ + ] [ 21 / 100 ]-[23:35:10] [ - ]
2293|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado_diciembre_2013.pdf/a922f72d-4b77-a19f-8049-bba15d2327cc ]
2294|_[ + ] Exploit::
2295|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2296|_[ + ] More details:: / - / , ISP:
2297|_[ + ] Found:: UNIDENTIFIED
2298
2299 _[ - ]::--------------------------------------------------------------------------------------------------------------
2300|_[ + ] [ 22 / 100 ]-[23:35:16] [ - ]
2301|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_informe_ifrs_diciembre_2009.pdf/00704054-fd88-b994-3f03-96cee5898ee6 ]
2302|_[ + ] Exploit::
2303|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2304|_[ + ] More details:: / - / , ISP:
2305|_[ + ] Found:: UNIDENTIFIED
2306
2307 _[ - ]::--------------------------------------------------------------------------------------------------------------
2308|_[ + ] [ 23 / 100 ]-[23:35:20] [ - ]
2309|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201503.pdf/e1fbc168-07ed-08c1-ca69-a27d9ec23314 ]
2310|_[ + ] Exploit::
2311|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2312|_[ + ] More details:: / - / , ISP:
2313|_[ + ] Found:: UNIDENTIFIED
2314
2315 _[ - ]::--------------------------------------------------------------------------------------------------------------
2316|_[ + ] [ 24 / 100 ]-[23:35:26] [ - ]
2317|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_informe_ifrs_marzo_2011.pdf/53d23c52-cc67-bd26-a4c8-009c5ca442f9 ]
2318|_[ + ] Exploit::
2319|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2320|_[ + ] More details:: / - / , ISP:
2321|_[ + ] Found:: UNIDENTIFIED
2322
2323 _[ - ]::--------------------------------------------------------------------------------------------------------------
2324|_[ + ] [ 25 / 100 ]-[23:35:30] [ - ]
2325|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/183706/Analisis_Razonado91123000_201809.pdf/4f377ad7-9a18-6a88-1a27-c36adca1ca8d ]
2326|_[ + ] Exploit::
2327|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2328|_[ + ] More details:: / - / , ISP:
2329|_[ + ] Found:: UNIDENTIFIED
2330
2331 _[ - ]::--------------------------------------------------------------------------------------------------------------
2332|_[ + ] [ 26 / 100 ]-[23:35:36] [ - ]
2333|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/Igemar_memoria_2016_SVS.pdf/3e39aced-fedf-5062-3715-30b03aef5aca ]
2334|_[ + ] Exploit::
2335|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2336|_[ + ] More details:: / - / , ISP:
2337|_[ + ] Found:: UNIDENTIFIED
2338
2339 _[ - ]::--------------------------------------------------------------------------------------------------------------
2340|_[ + ] [ 27 / 100 ]-[23:35:40] [ - ]
2341|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/197_acta_junta2014.pdf/fc41ee7b-110b-237e-2a63-44dce010b1aa ]
2342|_[ + ] Exploit::
2343|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2344|_[ + ] More details:: / - / , ISP:
2345|_[ + ] Found:: UNIDENTIFIED
2346
2347 _[ - ]::--------------------------------------------------------------------------------------------------------------
2348|_[ + ] [ 28 / 100 ]-[23:35:46] [ - ]
2349|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/242536/EF_201903.pdf/cb2614b9-7e4b-3dee-33f3-369678f82dd5 ]
2350|_[ + ] Exploit::
2351|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2352|_[ + ] More details:: / - / , ISP:
2353|_[ + ] Found:: UNIDENTIFIED
2354
2355 _[ - ]::--------------------------------------------------------------------------------------------------------------
2356|_[ + ] [ 29 / 100 ]-[23:35:52] [ - ]
2357|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_informe_ifrs_diciembre_2011.pdf/bae828b8-e3fe-7d47-a858-4af18ed3e701 ]
2358|_[ + ] Exploit::
2359|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2360|_[ + ] More details:: / - / , ISP:
2361|_[ + ] Found:: UNIDENTIFIED
2362
2363 _[ - ]::--------------------------------------------------------------------------------------------------------------
2364|_[ + ] [ 30 / 100 ]-[23:35:56] [ - ]
2365|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_analisis_razonado_diciembre_2011.pdf/08d1a3de-38ec-9f3a-5fc8-9dcdbc9b604a ]
2366|_[ + ] Exploit::
2367|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2368|_[ + ] More details:: / - / , ISP:
2369|_[ + ] Found:: UNIDENTIFIED
2370
2371 _[ - ]::--------------------------------------------------------------------------------------------------------------
2372|_[ + ] [ 31 / 100 ]-[23:36:02] [ - ]
2373|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/Codigo_etica_Igemar_agosto19.pdf/d4282dfb-db8c-ac29-b2f5-e7f693667b8c ]
2374|_[ + ] Exploit::
2375|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2376|_[ + ] More details:: / - / , ISP:
2377|_[ + ] Found:: UNIDENTIFIED
2378
2379 _[ - ]::--------------------------------------------------------------------------------------------------------------
2380|_[ + ] [ 32 / 100 ]-[23:36:08] [ - ]
2381|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/Igemar_Memoria_2017_SVS.pdf/4aed403c-c416-0d87-1619-9c40f6b059e3 ]
2382|_[ + ] Exploit::
2383|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2384|_[ + ] More details:: / - / , ISP:
2385|_[ + ] Found:: UNIDENTIFIED
2386
2387 _[ - ]::--------------------------------------------------------------------------------------------------------------
2388|_[ + ] [ 33 / 100 ]-[23:36:13] [ - ]
2389|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/Polit_prevdelitos_igemar_ago2019.pdf/c4f3201e-98ab-601f-9192-56d14939af89 ]
2390|_[ + ] Exploit::
2391|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2392|_[ + ] More details:: / - / , ISP:
2393|_[ + ] Found:: UNIDENTIFIED
2394
2395 _[ - ]::--------------------------------------------------------------------------------------------------------------
2396|_[ + ] [ 34 / 100 ]-[23:36:17] [ - ]
2397|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/politica_prevencion_delitos_igemar.pdf/12d69642-77d7-6a8a-021a-35acdcdb745d ]
2398|_[ + ] Exploit::
2399|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2400|_[ + ] More details:: / - / , ISP:
2401|_[ + ] Found:: UNIDENTIFIED
2402
2403 _[ - ]::--------------------------------------------------------------------------------------------------------------
2404|_[ + ] [ 35 / 100 ]-[23:36:20] [ - ]
2405|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/183706/Hechos_Relevantes91123000_201806.pdf/9027e73a-09c3-363f-4eb2-319564f75378 ]
2406|_[ + ] Exploit::
2407|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2408|_[ + ] More details:: / - / , ISP:
2409|_[ + ] Found:: UNIDENTIFIED
2410
2411 _[ - ]::--------------------------------------------------------------------------------------------------------------
2412|_[ + ] [ 36 / 100 ]-[23:36:26] [ - ]
2413|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/MemoriaAnual2018_Igemar.pdf/13c90655-35f2-3a5c-a8dc-4eb6f462b313 ]
2414|_[ + ] Exploit::
2415|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2416|_[ + ] More details:: / - / , ISP:
2417|_[ + ] Found:: UNIDENTIFIED
2418
2419 _[ - ]::--------------------------------------------------------------------------------------------------------------
2420|_[ + ] [ 37 / 100 ]-[23:36:32] [ - ]
2421|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/Aviso_Junta_Igemar_2018.pdf/fa8c7b01-ddb3-04f8-70cb-fb2cfcf685c8 ]
2422|_[ + ] Exploit::
2423|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2424|_[ + ] More details:: / - / , ISP:
2425|_[ + ] Found:: UNIDENTIFIED
2426
2427 _[ - ]::--------------------------------------------------------------------------------------------------------------
2428|_[ + ] [ 38 / 100 ]-[23:36:37] [ - ]
2429|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_estados_financieros_igemar_0313.pdf/7d352aef-7c12-1798-835a-a556e10f0583 ]
2430|_[ + ] Exploit::
2431|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2432|_[ + ] More details:: / - / , ISP:
2433|_[ + ] Found:: UNIDENTIFIED
2434
2435 _[ - ]::--------------------------------------------------------------------------------------------------------------
2436|_[ + ] [ 39 / 100 ]-[23:36:41] [ - ]
2437|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34699/he_29032018.pdf/c6c62eb5-02f2-fd9b-9bbd-435e5920029f ]
2438|_[ + ] Exploit::
2439|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2440|_[ + ] More details:: / - / , ISP:
2441|_[ + ] Found:: UNIDENTIFIED
2442
2443 _[ - ]::--------------------------------------------------------------------------------------------------------------
2444|_[ + ] [ 40 / 100 ]-[23:36:47] [ - ]
2445|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2012.pdf/007b9c91-afde-c41b-e921-80c6cfc457d0 ]
2446|_[ + ] Exploit::
2447|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2448|_[ + ] More details:: / - / , ISP:
2449|_[ + ] Found:: UNIDENTIFIED
2450
2451 _[ - ]::--------------------------------------------------------------------------------------------------------------
2452|_[ + ] [ 41 / 100 ]-[23:36:53] [ - ]
2453|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/Memoria_Anual_Igemar_2016.pdf/238a6538-3ab6-9ef9-473d-465d93d94108 ]
2454|_[ + ] Exploit::
2455|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2456|_[ + ] More details:: / - / , ISP:
2457|_[ + ] Found:: UNIDENTIFIED
2458
2459 _[ - ]::--------------------------------------------------------------------------------------------------------------
2460|_[ + ] [ 42 / 100 ]-[23:36:57] [ - ]
2461|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/politica_libre_comp_igemar2017.pdf/24d0d534-515b-bd3a-6426-66ddc4fa0dab ]
2462|_[ + ] Exploit::
2463|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2464|_[ + ] More details:: / - / , ISP:
2465|_[ + ] Found:: UNIDENTIFIED
2466
2467 _[ - ]::--------------------------------------------------------------------------------------------------------------
2468|_[ + ] [ 43 / 100 ]-[23:37:01] [ - ]
2469|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_analisis_razonado_marzo_2012.pdf/4a6338bb-ee36-b63c-d5be-51b597c9427a ]
2470|_[ + ] Exploit::
2471|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2472|_[ + ] More details:: / - / , ISP:
2473|_[ + ] Found:: UNIDENTIFIED
2474
2475 _[ - ]::--------------------------------------------------------------------------------------------------------------
2476|_[ + ] [ 44 / 100 ]-[23:37:05] [ - ]
2477|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado_junio_2015.pdf/0e448547-b6cf-f304-5904-4f430308515c ]
2478|_[ + ] Exploit::
2479|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2480|_[ + ] More details:: / - / , ISP:
2481|_[ + ] Found:: UNIDENTIFIED
2482
2483 _[ - ]::--------------------------------------------------------------------------------------------------------------
2484|_[ + ] [ 45 / 100 ]-[23:37:08] [ - ]
2485|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34720/Análisis_Razonado91123000_201709.pdf/5df24712-f409-ce76-4994-21424823e940 ]
2486|_[ + ] Exploit::
2487|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2488|_[ + ] More details:: / - / , ISP:
2489|_[ + ] Found:: UNIDENTIFIED
2490
2491 _[ - ]::--------------------------------------------------------------------------------------------------------------
2492|_[ + ] [ 46 / 100 ]-[23:37:14] [ - ]
2493|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2013.pdf/5656d439-347b-2fe6-d6de-91e555d06cab ]
2494|_[ + ] Exploit::
2495|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2496|_[ + ] More details:: / - / , ISP:
2497|_[ + ] Found:: UNIDENTIFIED
2498
2499 _[ - ]::--------------------------------------------------------------------------------------------------------------
2500|_[ + ] [ 47 / 100 ]-[23:37:18] [ - ]
2501|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/242536/AR_201903.pdf/c5d826c7-a468-ced5-e876-4a932ca0ab84 ]
2502|_[ + ] Exploit::
2503|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2504|_[ + ] More details:: / - / , ISP:
2505|_[ + ] Found:: UNIDENTIFIED
2506
2507 _[ - ]::--------------------------------------------------------------------------------------------------------------
2508|_[ + ] [ 48 / 100 ]-[23:37:22] [ - ]
2509|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34720/AR_0317.pdf/ae9b45e1-cca0-30e6-52f1-01d8cbd8ffb7 ]
2510|_[ + ] Exploit::
2511|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2512|_[ + ] More details:: / - / , ISP:
2513|_[ + ] Found:: UNIDENTIFIED
2514
2515 _[ - ]::--------------------------------------------------------------------------------------------------------------
2516|_[ + ] [ 49 / 100 ]-[23:37:25] [ - ]
2517|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_analisis_razonado91123000_201603.pdf/fe3df267-a7f5-7edb-bf5e-a2515905bcf8 ]
2518|_[ + ] Exploit::
2519|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2520|_[ + ] More details:: / - / , ISP:
2521|_[ + ] Found:: UNIDENTIFIED
2522
2523 _[ - ]::--------------------------------------------------------------------------------------------------------------
2524|_[ + ] [ 50 / 100 ]-[23:37:31] [ - ]
2525|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/Estados_financieros91123000_201712.pdf/a652e445-8218-0a67-dd4a-487c9e752466 ]
2526|_[ + ] Exploit::
2527|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2528|_[ + ] More details:: / - / , ISP:
2529|_[ + ] Found:: UNIDENTIFIED
2530
2531 _[ - ]::--------------------------------------------------------------------------------------------------------------
2532|_[ + ] [ 51 / 100 ]-[23:37:35] [ - ]
2533|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/126736/HR_201706.pdf/e7793591-4f99-3414-9535-620b7a7667eb ]
2534|_[ + ] Exploit::
2535|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2536|_[ + ] More details:: / - / , ISP:
2537|_[ + ] Found:: UNIDENTIFIED
2538
2539 _[ - ]::--------------------------------------------------------------------------------------------------------------
2540|_[ + ] [ 52 / 100 ]-[23:37:41] [ - ]
2541|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/EEFF_dic2018.pdf/b4c1b7d4-41ae-0d6b-8935-f705a21a1835 ]
2542|_[ + ] Exploit::
2543|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2544|_[ + ] More details:: / - / , ISP:
2545|_[ + ] Found:: UNIDENTIFIED
2546
2547 _[ - ]::--------------------------------------------------------------------------------------------------------------
2548|_[ + ] [ 53 / 100 ]-[23:37:47] [ - ]
2549|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34699/he_250418.pdf/2bf76065-ed37-8e5c-200b-69bb0de622c3 ]
2550|_[ + ] Exploit::
2551|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2552|_[ + ] More details:: / - / , ISP:
2553|_[ + ] Found:: UNIDENTIFIED
2554
2555 _[ - ]::--------------------------------------------------------------------------------------------------------------
2556|_[ + ] [ 54 / 100 ]-[23:37:51] [ - ]
2557|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_analisis_razonado_junio_2011.pdf/41d53ca3-1b1e-5723-8e05-de90b20562a9 ]
2558|_[ + ] Exploit::
2559|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2560|_[ + ] More details:: / - / , ISP:
2561|_[ + ] Found:: UNIDENTIFIED
2562
2563 _[ - ]::--------------------------------------------------------------------------------------------------------------
2564|_[ + ] [ 55 / 100 ]-[23:37:57] [ - ]
2565|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_fecu2013.pdf/5855d2b8-767d-96cd-8442-c6a8f5a7cd8e ]
2566|_[ + ] Exploit::
2567|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2568|_[ + ] More details:: / - / , ISP:
2569|_[ + ] Found:: UNIDENTIFIED
2570
2571 _[ - ]::--------------------------------------------------------------------------------------------------------------
2572|_[ + ] [ 56 / 100 ]-[23:38:02] [ - ]
2573|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/Igemar_AR_2016.pdf/99357c62-5fce-f212-bba4-187b04802a17 ]
2574|_[ + ] Exploit::
2575|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2576|_[ + ] More details:: / - / , ISP:
2577|_[ + ] Found:: UNIDENTIFIED
2578
2579 _[ - ]::--------------------------------------------------------------------------------------------------------------
2580|_[ + ] [ 57 / 100 ]-[23:38:07] [ - ]
2581|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_analisis_razonado_junio_2014.pdf/3f0ee5e9-c2da-4076-553a-a7d2eba51c56 ]
2582|_[ + ] Exploit::
2583|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2584|_[ + ] More details:: / - / , ISP:
2585|_[ + ] Found:: UNIDENTIFIED
2586
2587 _[ - ]::--------------------------------------------------------------------------------------------------------------
2588|_[ + ] [ 58 / 100 ]-[23:38:12] [ - ]
2589|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2009.pdf/51ff63f9-138e-7f36-c0aa-744f2369070f ]
2590|_[ + ] Exploit::
2591|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2592|_[ + ] More details:: / - / , ISP:
2593|_[ + ] Found:: UNIDENTIFIED
2594
2595 _[ - ]::--------------------------------------------------------------------------------------------------------------
2596|_[ + ] [ 59 / 100 ]-[23:38:17] [ - ]
2597|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/183706/EF_91123000_201803.pdf/2fb6a33e-8dad-f817-e979-533daa6af7f7 ]
2598|_[ + ] Exploit::
2599|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2600|_[ + ] More details:: / - / , ISP:
2601|_[ + ] Found:: UNIDENTIFIED
2602
2603 _[ - ]::--------------------------------------------------------------------------------------------------------------
2604|_[ + ] [ 60 / 100 ]-[23:38:23] [ - ]
2605|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/igemar_cod_etica_2018.pdf/e78c57b7-df7a-ba65-358b-338a8dee3790 ]
2606|_[ + ] Exploit::
2607|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2608|_[ + ] More details:: / - / , ISP:
2609|_[ + ] Found:: UNIDENTIFIED
2610
2611 _[ - ]::--------------------------------------------------------------------------------------------------------------
2612|_[ + ] [ 61 / 100 ]-[23:38:28] [ - ]
2613|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_estados_financieros_junio_2015.pdf/4b5e5630-301c-cb7c-b605-3093a3669034 ]
2614|_[ + ] Exploit::
2615|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2616|_[ + ] More details:: / - / , ISP:
2617|_[ + ] Found:: UNIDENTIFIED
2618
2619 _[ - ]::--------------------------------------------------------------------------------------------------------------
2620|_[ + ] [ 62 / 100 ]-[23:38:32] [ - ]
2621|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34720/Hechos_Relevantes91123000_201709.pdf/9c70f235-b920-82c4-b392-331bcb91a6ce ]
2622|_[ + ] Exploit::
2623|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2624|_[ + ] More details:: / - / , ISP:
2625|_[ + ] Found:: UNIDENTIFIED
2626
2627 _[ - ]::--------------------------------------------------------------------------------------------------------------
2628|_[ + ] [ 63 / 100 ]-[23:38:36] [ - ]
2629|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/183706/AR_91123000_201803.pdf/c44b5ffd-e838-8e71-7c22-7b0d885c00ff ]
2630|_[ + ] Exploit::
2631|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2632|_[ + ] More details:: / - / , ISP:
2633|_[ + ] Found:: UNIDENTIFIED
2634
2635 _[ - ]::--------------------------------------------------------------------------------------------------------------
2636|_[ + ] [ 64 / 100 ]-[23:38:40] [ - ]
2637|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201412.pdf/1180d807-ecac-a845-39ea-6a868ea4c47b ]
2638|_[ + ] Exploit::
2639|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2640|_[ + ] More details:: / - / , ISP:
2641|_[ + ] Found:: UNIDENTIFIED
2642
2643 _[ - ]::--------------------------------------------------------------------------------------------------------------
2644|_[ + ] [ 65 / 100 ]-[23:38:44] [ - ]
2645|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201412.pdf/ba645dee-85c0-1baa-8d05-1d06e41e44fc ]
2646|_[ + ] Exploit::
2647|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2648|_[ + ] More details:: / - / , ISP:
2649|_[ + ] Found:: UNIDENTIFIED
2650
2651 _[ - ]::--------------------------------------------------------------------------------------------------------------
2652|_[ + ] [ 66 / 100 ]-[23:38:50] [ - ]
2653|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2011.pdf/5949e01a-7e59-a442-2331-309007120272 ]
2654|_[ + ] Exploit::
2655|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2656|_[ + ] More details:: / - / , ISP:
2657|_[ + ] Found:: UNIDENTIFIED
2658
2659 _[ - ]::--------------------------------------------------------------------------------------------------------------
2660|_[ + ] [ 67 / 100 ]-[23:38:54] [ - ]
2661|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201306.pdf/88cc5920-eeab-205a-a0ff-98fce76f5f32 ]
2662|_[ + ] Exploit::
2663|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2664|_[ + ] More details:: / - / , ISP:
2665|_[ + ] Found:: UNIDENTIFIED
2666
2667 _[ - ]::--------------------------------------------------------------------------------------------------------------
2668|_[ + ] [ 68 / 100 ]-[23:39:00] [ - ]
2669|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/126736/IFRS_201706.pdf/b4605514-e843-6756-594b-4ef660aae018 ]
2670|_[ + ] Exploit::
2671|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2672|_[ + ] More details:: / - / , ISP:
2673|_[ + ] Found:: UNIDENTIFIED
2674
2675 _[ - ]::--------------------------------------------------------------------------------------------------------------
2676|_[ + ] [ 69 / 100 ]-[23:39:06] [ - ]
2677|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_informe_ifrs_junio2009.pdf/8dc4bf28-8651-1f28-93b1-afac6a5f3c0e ]
2678|_[ + ] Exploit::
2679|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2680|_[ + ] More details:: / - / , ISP:
2681|_[ + ] Found:: UNIDENTIFIED
2682
2683 _[ - ]::--------------------------------------------------------------------------------------------------------------
2684|_[ + ] [ 70 / 100 ]-[23:39:10] [ - ]
2685|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201309.pdf/15d14ee0-5199-f543-15ad-01d9301a419e ]
2686|_[ + ] Exploit::
2687|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2688|_[ + ] More details:: / - / , ISP:
2689|_[ + ] Found:: UNIDENTIFIED
2690
2691 _[ - ]::--------------------------------------------------------------------------------------------------------------
2692|_[ + ] [ 71 / 100 ]-[23:39:15] [ - ]
2693|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes_diciembre_2013.pdf/4e9d3f1a-1392-560a-4147-77f9ec3d417b ]
2694|_[ + ] Exploit::
2695|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2696|_[ + ] More details:: / - / , ISP:
2697|_[ + ] Found:: UNIDENTIFIED
2698
2699 _[ - ]::--------------------------------------------------------------------------------------------------------------
2700|_[ + ] [ 72 / 100 ]-[23:39:20] [ - ]
2701|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/175_adopcion_practicas_igemar2015.pdf/f38cfd3b-ea82-3ce9-da3b-fab1c4116a3c ]
2702|_[ + ] Exploit::
2703|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2704|_[ + ] More details:: / - / , ISP:
2705|_[ + ] Found:: UNIDENTIFIED
2706
2707 _[ - ]::--------------------------------------------------------------------------------------------------------------
2708|_[ + ] [ 73 / 100 ]-[23:39:26] [ - ]
2709|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_estados_financieros_septiembre_2014.pdf/54a2748b-8672-362a-0400-bf4880d23705 ]
2710|_[ + ] Exploit::
2711|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2712|_[ + ] More details:: / - / , ISP:
2713|_[ + ] Found:: UNIDENTIFIED
2714
2715 _[ - ]::--------------------------------------------------------------------------------------------------------------
2716|_[ + ] [ 74 / 100 ]-[23:39:31] [ - ]
2717|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/Adopcion_practicas_igemar.pdf/87cd182d-4c19-c79b-de64-482e6639e3c8 ]
2718|_[ + ] Exploit::
2719|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2720|_[ + ] More details:: / - / , ISP:
2721|_[ + ] Found:: UNIDENTIFIED
2722
2723 _[ - ]::--------------------------------------------------------------------------------------------------------------
2724|_[ + ] [ 75 / 100 ]-[23:39:37] [ - ]
2725|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_estados_financieros_junio_2014.pdf/a62c6a49-361a-15da-f2a5-b8a926f1c82d ]
2726|_[ + ] Exploit::
2727|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2728|_[ + ] More details:: / - / , ISP:
2729|_[ + ] Found:: UNIDENTIFIED
2730
2731 _[ - ]::--------------------------------------------------------------------------------------------------------------
2732|_[ + ] [ 76 / 100 ]-[23:39:43] [ - ]
2733|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34699/HE_igemar_170817.pdf/db81f20a-804b-dff0-241d-394c72cea636 ]
2734|_[ + ] Exploit::
2735|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2736|_[ + ] More details:: / - / , ISP:
2737|_[ + ] Found:: UNIDENTIFIED
2738
2739 _[ - ]::--------------------------------------------------------------------------------------------------------------
2740|_[ + ] [ 77 / 100 ]-[23:39:47] [ - ]
2741|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34699/he_06042018.pdf/9879f937-dc01-3caf-3124-e2bcd6bcb98d ]
2742|_[ + ] Exploit::
2743|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2744|_[ + ] More details:: / - / , ISP:
2745|_[ + ] Found:: UNIDENTIFIED
2746
2747 _[ - ]::--------------------------------------------------------------------------------------------------------------
2748|_[ + ] [ 78 / 100 ]-[23:39:51] [ - ]
2749|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/Hechos_Relevantes91123000_201712.pdf/1c8a07a5-7748-750d-def4-fa44e64813ca ]
2750|_[ + ] Exploit::
2751|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2752|_[ + ] More details:: / - / , ISP:
2753|_[ + ] Found:: UNIDENTIFIED
2754
2755 _[ - ]::--------------------------------------------------------------------------------------------------------------
2756|_[ + ] [ 79 / 100 ]-[23:39:55] [ - ]
2757|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/206_acta_igemar_2016.pdf/151cf0db-026a-7396-c3bf-da2aeefb98f1 ]
2758|_[ + ] Exploit::
2759|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2760|_[ + ] More details:: / - / , ISP:
2761|_[ + ] Found:: UNIDENTIFIED
2762
2763 _[ - ]::--------------------------------------------------------------------------------------------------------------
2764|_[ + ] [ 80 / 100 ]-[23:40:00] [ - ]
2765|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_analisis_razonado91123000_201609.pdf/d23594b8-1195-3054-f3a4-da16c6293939 ]
2766|_[ + ] Exploit::
2767|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2768|_[ + ] More details:: / - / , ISP:
2769|_[ + ] Found:: UNIDENTIFIED
2770
2771 _[ - ]::--------------------------------------------------------------------------------------------------------------
2772|_[ + ] [ 81 / 100 ]-[23:40:05] [ - ]
2773|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/manual_manejo_info_igemar.pdf/8bce76e4-9c0f-59a9-21ad-6e682350de3f ]
2774|_[ + ] Exploit::
2775|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2776|_[ + ] More details:: / - / , ISP:
2777|_[ + ] Found:: UNIDENTIFIED
2778
2779 _[ - ]::--------------------------------------------------------------------------------------------------------------
2780|_[ + ] [ 82 / 100 ]-[23:40:11] [ ! ]
2781|_[ + ] Target:: [ ( POTENTIALLY VULNERABLE ) https://www.igemar.cl/documents/34275/34720/EFF0317.pdf/231e310b-2d87-fa78-320d-58da1762137a ]
2782|_[ + ] Exploit::
2783|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2784|_[ + ] More details:: / - / , ISP:
2785|_[ + ] Found:: POSTGRESQL-06 - VALUE: pg_
2786|_[ + ] VALUE SAVED IN THE FILE:: inurlbr-www.igemar.cl
2787
2788 _[ - ]::--------------------------------------------------------------------------------------------------------------
2789|_[ + ] [ 83 / 100 ]-[23:40:15] [ - ]
2790|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/183706/AR_dic2018.pdf/55ae8535-ed01-6519-bb7e-67c724d37144 ]
2791|_[ + ] Exploit::
2792|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2793|_[ + ] More details:: / - / , ISP:
2794|_[ + ] Found:: UNIDENTIFIED
2795
2796 _[ - ]::--------------------------------------------------------------------------------------------------------------
2797|_[ + ] [ 84 / 100 ]-[23:40:20] [ - ]
2798|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2007.pdf/11c4c3c9-daf6-ca34-4adc-ebfd3cdc79e0 ]
2799|_[ + ] Exploit::
2800|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2801|_[ + ] More details:: / - / , ISP:
2802|_[ + ] Found:: UNIDENTIFIED
2803
2804 _[ - ]::--------------------------------------------------------------------------------------------------------------
2805|_[ + ] [ 85 / 100 ]-[23:40:26] [ - ]
2806|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/ActaJuntaExtraordinaria2018.pdf/402fca9a-724f-5ac2-4218-aff51bd030d2 ]
2807|_[ + ] Exploit::
2808|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2809|_[ + ] More details:: / - / , ISP:
2810|_[ + ] Found:: UNIDENTIFIED
2811
2812 _[ - ]::--------------------------------------------------------------------------------------------------------------
2813|_[ + ] [ 86 / 100 ]-[23:40:30] [ - ]
2814|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes_septiembre_2014.pdf/173e652a-a45e-6a6a-927c-71dc94ab38da ]
2815|_[ + ] Exploit::
2816|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2817|_[ + ] More details:: / - / , ISP:
2818|_[ + ] Found:: UNIDENTIFIED
2819
2820 _[ - ]::--------------------------------------------------------------------------------------------------------------
2821|_[ + ] [ 87 / 100 ]-[23:40:35] [ - ]
2822|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34693/162_igemar_estatutos_2016.pdf/73573522-5713-3312-f9d8-2b386b3860f3 ]
2823|_[ + ] Exploit::
2824|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2825|_[ + ] More details:: / - / , ISP:
2826|_[ + ] Found:: UNIDENTIFIED
2827
2828 _[ - ]::--------------------------------------------------------------------------------------------------------------
2829|_[ + ] [ 88 / 100 ]-[23:40:39] [ - ]
2830|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/Fundamentos_Junta_extra_2018.pdf/a635a271-55f1-a149-f6a1-93eee10b441c ]
2831|_[ + ] Exploit::
2832|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2833|_[ + ] More details:: / - / , ISP:
2834|_[ + ] Found:: UNIDENTIFIED
2835
2836 _[ - ]::--------------------------------------------------------------------------------------------------------------
2837|_[ + ] [ 89 / 100 ]-[23:40:43] [ - ]
2838|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/politica_gestion_riesgos_igemar.pdf/ac9567bf-0dff-39a8-0e6f-4d3205ae3c39 ]
2839|_[ + ] Exploit::
2840|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2841|_[ + ] More details:: / - / , ISP:
2842|_[ + ] Found:: UNIDENTIFIED
2843
2844 _[ - ]::--------------------------------------------------------------------------------------------------------------
2845|_[ + ] [ 90 / 100 ]-[23:40:47] [ - ]
2846|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes_junio_2014.pdf/af19aa56-6ac0-2ba1-c575-c4025defd163 ]
2847|_[ + ] Exploit::
2848|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2849|_[ + ] More details:: / - / , ISP:
2850|_[ + ] Found:: UNIDENTIFIED
2851
2852 _[ - ]::--------------------------------------------------------------------------------------------------------------
2853|_[ + ] [ 91 / 100 ]-[23:40:52] [ - ]
2854|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/126736/AR_201706.pdf/091bbbef-1e2a-a0cd-890a-996a057d2ace ]
2855|_[ + ] Exploit::
2856|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2857|_[ + ] More details:: / - / , ISP:
2858|_[ + ] Found:: UNIDENTIFIED
2859
2860 _[ - ]::--------------------------------------------------------------------------------------------------------------
2861|_[ + ] [ 92 / 100 ]-[23:40:58] [ - ]
2862|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_eeff2014.pdf/69bc8eb6-ae47-60ce-ad82-b8f9e499200d ]
2863|_[ + ] Exploit::
2864|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2865|_[ + ] More details:: / - / , ISP:
2866|_[ + ] Found:: UNIDENTIFIED
2867
2868 _[ - ]::--------------------------------------------------------------------------------------------------------------
2869|_[ + ] [ 93 / 100 ]-[23:41:01] [ - ]
2870|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/197_acta_igemar_2013.pdf/691b9669-4afe-3d91-4b6b-9e66967ed860 ]
2871|_[ + ] Exploit::
2872|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2873|_[ + ] More details:: / - / , ISP:
2874|_[ + ] Found:: UNIDENTIFIED
2875
2876 _[ - ]::--------------------------------------------------------------------------------------------------------------
2877|_[ + ] [ 94 / 100 ]-[23:41:06] [ - ]
2878|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/Aviso_Junta_Igemar_2017.pdf/e8317389-eb07-e826-0fd7-a5a719ee5128 ]
2879|_[ + ] Exploit::
2880|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2881|_[ + ] More details:: / - / , ISP:
2882|_[ + ] Found:: UNIDENTIFIED
2883
2884 _[ - ]::--------------------------------------------------------------------------------------------------------------
2885|_[ + ] [ 95 / 100 ]-[23:41:09] [ - ]
2886|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/Igemar_HR_2016.pdf/70415e75-d832-ad69-9986-0bb5314bae63 ]
2887|_[ + ] Exploit::
2888|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2889|_[ + ] More details:: / - / , ISP:
2890|_[ + ] Found:: UNIDENTIFIED
2891
2892 _[ - ]::--------------------------------------------------------------------------------------------------------------
2893|_[ + ] [ 96 / 100 ]-[23:41:13] [ - ]
2894|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/183706/HR_91123000_201803.pdf/262adf2e-eb46-d04f-d6b0-1c3cb476f1d7 ]
2895|_[ + ] Exploit::
2896|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2897|_[ + ] More details:: / - / , ISP:
2898|_[ + ] Found:: UNIDENTIFIED
2899
2900 _[ - ]::--------------------------------------------------------------------------------------------------------------
2901|_[ + ] [ 97 / 100 ]-[23:41:18] [ - ]
2902|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/Aviso_Junta2019_Igemar.pdf/2b1fe919-9572-6cf5-5e15-55fc85c19499 ]
2903|_[ + ] Exploit::
2904|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2905|_[ + ] More details:: / - / , ISP:
2906|_[ + ] Found:: UNIDENTIFIED
2907
2908 _[ - ]::--------------------------------------------------------------------------------------------------------------
2909|_[ + ] [ 98 / 100 ]-[23:41:22] [ - ]
2910|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/Fundamentos_Auditores_Externos_Igemar.pdf/a9cff67a-66de-57ab-cee0-bc9b6c156eaf ]
2911|_[ + ] Exploit::
2912|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2913|_[ + ] More details:: / - / , ISP:
2914|_[ + ] Found:: UNIDENTIFIED
2915
2916 _[ - ]::--------------------------------------------------------------------------------------------------------------
2917|_[ + ] [ 99 / 100 ]-[23:41:26] [ - ]
2918|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34699/HE_igemar_070717.pdf/f041ffdd-23f0-8d58-dec0-8f3b1517c08a ]
2919|_[ + ] Exploit::
2920|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
2921|_[ + ] More details:: / - / , ISP:
2922|_[ + ] Found:: UNIDENTIFIED
2923
2924[ INFO ] [ Shutting down ]
2925[ INFO ] [ End of process INURLBR at [05-03-2020 23:41:26]
2926[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 1 ]
2927[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.igemar.cl/output/inurlbr-www.igemar.cl ]
2928|_________________________________________________________________________________________
2929https://www.igemar.cl/documents/34275/34720/EFF0317.pdf/231e310b-2d87-fa78-320d-58da1762137a
2930
2931\_________________________________________________________________________________________/
2932#####################################################################################################################################
2933HTTP/1.1 200 OK
2934Date: Fri, 06 Mar 2020 04:41:30 GMT
2935Server: Apache-Coyote/1.1
2936X-Content-Type-Options: nosniff
2937X-Frame-Options: SAMEORIGIN
2938X-XSS-Protection: 1
2939Liferay-Portal: Liferay Community Edition Portal 7.0.2 GA3 (Wilberforce / Build 7002 / August 5, 2016)
2940Content-Type: text/html;charset=UTF-8
2941Set-Cookie: JSESSIONID=55C9EB9612EF9060606F0A44A5DFFD3B; Path=/; Secure; HttpOnly
2942Set-Cookie: COOKIE_SUPPORT=true; Expires=Sat, 06-Mar-2021 04:41:31 GMT; Path=/; Secure; HttpOnly
2943Set-Cookie: GUEST_LANGUAGE_ID=es_ES; Domain=.igemar.cl; Expires=Sat, 06-Mar-2021 04:41:31 GMT; Path=/; Secure; HttpOnly
2944
2945Allow: GET, HEAD, POST, TRACE, OPTIONS
2946######################################################################################################################################
2947<!DOCTYPE html> <html class="ltr" dir="ltr" lang="es-ES"> <head> <!-- Descripción del sitio –––––––––––––––––––––––––––––––––––––––––––––––––– --> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <title>Principal - Igemar</title> <meta name="author" content="Igemar" /> <meta name="description" content="PesqueraIquique-Guanaye, Igemar, está presente en el norte y centro-sur de Chile, con una de las flotas más modernas del país. Su gestión eficiente y avanzadas tecnologías, le han permitido consolidarse, en la producción de harina y aceite de pescado, y también en conservas y congelados para consumo humano. Asimismo, hoy es pionera en el desarrollo de concentrados de Omega 3 en Chile, productos de mayor valor agregado que podrán satisfacer una demanda creciente en los rubros de la nutrición y la salud." /> <meta name="keywords" content="" /> <!-- Mobile Specific Metas –––––––––––––––––––––––––––––––––––––––––––––––––– --> <meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="format-detection" content="telephone=no"> <link href="https://www.igemar.cl/o/dynamic-data-mapping-form-renderer/css/main.css" rel="stylesheet" type = "text/css" /> <link href="https://www.igemar.cl/o/mentions-web/css/mentions.css" rel="stylesheet" type = "text/css" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type" /> <link data-senna-track="temporary" href="https://www.igemar.cl/o/igemar-theme-v-4-theme/images/favicon.ico" rel="Shortcut Icon" /> <link data-senna-track="temporary" href="https://www.igemar.cl" rel="canonical" /> <link class="lfr-css-file" data-senna-track="temporary" href="https://www.igemar.cl/o/igemar-theme-v-4-theme/css/aui.css?browserId=other&themeId=igemarthemev4_WAR_igemarthemev4theme&minifierType=css&languageId=es_ES&b=7002&t=32" id="liferayAUICSS" rel="stylesheet" type="text/css" /> <link data-senna-track="temporary" href="/o/frontend-css-web/main.css?browserId=other&themeId=igemarthemev4_WAR_igemarthemev4theme&minifierType=css&languageId=es_ES&b=7002&t=1499283982794" id="liferayPortalCSS" rel="stylesheet" type="text/css" /> <link data-senna-track="permanent" href="/combo?browserId=other&minifierType=&themeId=igemarthemev4_WAR_igemarthemev4theme&languageId=es_ES&b=7002&com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_RCbC6oSJceYR:%2Fcss%2Fmain.css&com_liferay_product_navigation_product_menu_web_portlet_ProductMenuPortlet:%2Fcss%2Fmain.css&t=1579299552000" id="e083c8c1" rel="stylesheet" type="text/css" /> <script data-senna-track="temporary" type="text/javascript">var Liferay=Liferay||{};
2948490,494,499,491,492,493,495,220])})})()},function(a){console.error(a)});</script> <!-- CSS –––––––––––––––––––––––––––––––––––––––––––––––––– --> <!-- Font --> <link href="https://fonts.googleapis.com/css?family=Lato:300,400,400i,700,900" rel="stylesheet"> <!-- Full Page --> <link href="https://www.igemar.cl/o/igemar-theme-v-4-theme/css/jquery.fullPage.css" rel="stylesheet" type="text/css" /> <!-- Favicon --> <link href="https://www.igemar.cl/o/igemar-theme-v-4-theme/images/favicon.png" rel="icon" type="image/png" /> <style type="text/css">.section{background-image:url("/documents/34275/0/1-home.jpg")!important;background-attachment:initial;background-size:cover;background-position:center center;background-repeat:no-repeat}.section.fdestacados{background-image:url("/documents/34275/0/2-destacados.jpg")!important;background-size:cover}.section.fquienes{background-image:url("/documents/34275/0/3-quienes-somos.jpg")!important;background-size:cover}.section.fnegocios{background-image:url("/documents/34275/0/4-negocios.jpg")!important;background-size:cover}.section.fgobierno{background-image:url("/documents/34275/0/5-gobierno-corporativo.jpg")!important;background-size:cover}.section.finversionistas{background-image:url("/documents/34275/0/6-inversionistas.jpg")!important;background-size:cover}.section.faccionistas{background-image:url("/documents/34275/0/7-accionistas.jpg")!important;background-size:cover}.section.fmemorias{background-image:url("/documents/34275/0/8-memorias-anuales.jpg")!important;background-size:cover}.section.fcontacto{background-image:url("/documents/34275/0/9-contacto.jpg")!important;background-size:cover}</style> </head> <body class=" controls-visible yui3-skin-sam signed-out public-page site img-bg"> <nav class="quick-access-nav" id="mtrn_quickAccessNav"> <h1 class="hide-accessible">Navegación</h1> <ul> <li><a href="#main-content">Saltar al contenido</a></li> </ul> </nav> <!-- NUEVO HEADER --> <header> <nav class="navbar navbar-default navbar-fixed-top"> <div class="container-fluid"> <!-- Brand and toggle get grouped for better mobile display --> <div class="navbar-header"> <button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target="#bs-example-navbar-collapse-1" aria-expanded="false"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a class="navbar-brand" href="#principal"><img src="https://www.igemar.cl/o/igemar-theme-v-4-theme/images/logo-igemar-isotipo-color.svg" alt="Logo Igemar" /></a> </div> <!-- Collect the nav links, forms, and other content for toggling --> <div class="collapse navbar-collapse" id="bs-example-navbar-collapse-1"> <ul class="nav navbar-nav navbar-right"> <!-- Dropdown solo visible en Tablet y Desktop --> <li class="dropdown visible-lg-block"> <a href="#" class="dropdown-toggle" data-toggle="dropdown" role="button" aria-haspopup="true" aria-expanded="false">Menú <span class="caret"></span></a> <ul class="dropdown-menu"> <div class="container-fluid"> <!-- español --> <li data-menuanchor="destacados"><a href="#destacados">Destacados</a></li> <li data-menuanchor="quienessomos"><a href="#quienessomos" opcion="empresa">Quiénes Somos</a></li> <li data-menuanchor="negocios"><a href="#negocios" opcion="inversiones">Negocios</a></li> <li data-menuanchor="gobierno"><a href="#gobierno" opcion="directorio">Gobierno Corporativo</a></li> <li data-menuanchor="inversionistas"><a href="#inversionistas" opcion="estados">Inversionistas</a></li> <li data-menuanchor="accionistas"><a href="#accionistas" opcion="juntas">Accionistas</a></li> <li data-menuanchor="contactos"><a href="#contactos">Contacto</a></li> </div> </ul> </li> <div class="language"> <ul> <li><a href="https://www.igemar.cl/c/portal/update_language?p_l_id=34686&languageId=es_ES" title="Español"><img src="https://www.igemar.cl/o/igemar-theme-v-4-theme/templates/../images/flag-chile.svg" alt="Bandera de Chile" /></a></li> <!-- <li><a href="https://www.igemar.cl/c/portal/update_language?p_l_id=34686&languageId=en_EN" title="English"><img src="https://www.igemar.cl/o/igemar-theme-v-4-theme/templates/../images/flag-eeuu.svg" alt="Bandera del Reino Unido" /></a></li>--> </ul> </div> <!-- Lista sólo visible en versión responsive/mobile --> <!-- español --> <li class="hidden-lg"><a href="#destacados">Destacados</a></li> <li class="hidden-lg"><a href="#quienessomos" opcion="empresa">Quiénes Somos</a></li> <li class="hidden-lg"><a href="#negocios" opcion="inversiones">Negocios</a></li> <li class="hidden-lg"><a href="#gobierno" opcion="directorio">Gobierno Corporativo</a></li> <li class="hidden-lg"><a href="#inversionistas" opcion="estados">Inversionistas</a></li> <li class="hidden-lg"><a href="#accionistas" opcion="juntas">Accionistas</a></li> <li class="hidden-lg"><a href="#contactos">Contacto</a></li> </ul> </div><!-- /.navbar-collapse --> </div><!-- /.container-fluid --> </nav> </header> <div id="fullpage"> <!-- HOME --> <div class="section active img-bg" id="home"> <!-- MAIN CONTENT --> <div class="contenedor-logo"> <h1 class="logo-home text-hide">IGEMAR - Pesquera Iquique-Guanaye S.A.</h1> </div> <!-- /.contenedor-logo --> <!-- FOOTER --> <footer> <div class="container"> <div class="col-xs-12 col-sm-12"> <figure class="ico-mouse"> <img src="https://www.igemar.cl/o/igemar-theme-v-4-theme/images/ico-mouse.svg" alt="Mouse" height="22" width="15" /> <figcaption>Scroll</figcaption> </figure> </div> </div> <!-- /.container --> </footer> </div> <!-- / #home --> <!-- DESTACADOS --> <div class="section fdestacados fp-auto-height img-bg categoria"> <div class="container-fluid altura-minima"> <div class="row"> <!-- español --> <h2 class="col-sm-12 titulo-pagina">Destacados</h2> <div class="col-sm-12"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdestacados_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdestacados"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdestacados_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdestacados_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdestacados__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_RCbC6oSJceYR_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_RCbC6oSJceYR"> <div class="portlet-content"> <h2 class="portlet-title-text">Destacados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <section class="contenedor-calugas"> <div class="row"> <!-- 1 --> <article class="col-xs-12 col-sm-6"> <a href="#negocios" opcion="empresas" title="Ir a enlace"> <div class="caluga-kit inner"> <figure class="celda"> <img alt="Destacado" src="/documents/34275/34711/ico-destacados-inversiones-principales.svg/d00408d0-3823-ad3b-9571-5bdd65d68872"> </figure> <div class="celda llamado"> <h3>Inversiones Principales</h3> </div> </div> </a> </article> <!-- 2 --> <article class="col-xs-12 col-sm-6"> <a href="#memorias" title="Ir a enlace"> <div class="caluga-kit inner"> <figure class="celda"> <img alt="Destacado" src="/documents/34275/34711/ico-destacados-memoria-anual.svg/92b8a1b1-e89d-10e5-3847-1788a0740089"> </figure> <div class="celda llamado"> <h3>Memoria Anual</h3> </div> </div> </a> </article> <!-- 3 --> <article class="col-xs-12 col-sm-6"> <a href="#accionistas" opcion="juntas" title="Ir a enlace"> <div class="caluga-kit inner"> <figure class="celda"> <img alt="Destacado" src="/documents/34275/34711/ico-destacados-junta-de-accionistas-anual.svg/6288c4a3-23fe-4222-3885-d05586cd07f9"> </figure> <div class="celda llamado"> <h3>Junta Anual de Accionistas</h3> </div> </div> </a> </article> <!-- 4 --> <article class="col-xs-12 col-sm-6"> <a href="http://www.sercor.cl" target="_blank" title="Ir a enlace"> <div class="caluga-kit inner"> <figure class="celda"> <img alt="Destacado" src="/documents/34275/34711/ico-destacados-servicio-a-accionistas.svg/01a52c31-55f5-eaaa-9673-972fc57cd4f4"> </figure> <div class="celda llamado"> <h3>Servicio a Accionistas</h3> </div> </div> </a> </article> </div> <!-- /.row --> </section> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </div> </div> <!-- /.row --> </div> <!-- /.container-fluid --> </div><!-- / id destacados --> <!-- QUIENES SOMOS --> <div class="section fquienes fp-auto-height img-bg categoria" id="quienes-somos"> <div class="container-fluid altura-minima"> <div class="row"> <!-- español --> <h2 class="col-sm-12 titulo-pagina">Quiénes Somos</h2> <!-- Enlaces de la categoría --> <div class="col-sm-4"> <ul class="enlaces-categoria"> <!-- español --> <li class="option active" id="link-empresa"><a href="#quienessomos" opcion="empresa" title="Ir a enlace">La Empresa</a></li> <li class="option" id="link-antecedentes"><a href="#quienessomos" opcion="antecedentes" title="Ir a enlace">Antecedentes de la Sociedad</a></li> <li class="option" id="link-hitos"><a href="#quienessomos" opcion="hitos" title="Ir a enlace">Hitos</a></li> </ul> <!-- /.enlaces-categoria --> </div> <div class="col-sm-8"> <article class="contenido-single portlet-anidado fondo-negro" id="cont-empresa"> <p> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instempresa_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instempresa"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instempresa_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instempresa_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instempresa__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_ZbWAvsvWaSMG_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_ZbWAvsvWaSMG"> <div class="portlet-content"> <h2 class="portlet-title-text">La Empresa</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <p>Pesquera Iquique - Guanaye S.A., Igemar, está presente en el norte y centro-sur de Chile, con una de las flotas más modernas del país. Su gestión eficiente y avanzadas tecnologías, le han permitido consolidarse, en la producción de harina y aceite de pescado, y también en conservas y congelados para consumo humano. Asimismo, hoy es pionera en el desarrollo de concentrados de Omega 3 en Chile, productos de mayor valor agregado que podrán satisfacer una demanda creciente en los rubros de la nutrición y la salud.</p> <p>Los inicios de Pesquera Iquique S.A. se remontan a 1945, con la puesta en marcha de una plantaconservera en la zona de Talcahuano.</p> <ul class="lista-pdf"> <li><a href="/documents/34275/34693/162_igemar_estatutos_2016.pdf/73573522-5713-3312-f9d8-2b386b3860f3" target="_blank" title="Ver documento">Estatutos</a></li> </ul> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </p> </article> <article class="contenido-single portlet-anidado fondo-negro" id="cont-antecedentes"> <p> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instantecedentes_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instantecedentes"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instantecedentes_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instantecedentes_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instantecedentes__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_JYJjPSLIlMdL_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_JYJjPSLIlMdL"> <div class="portlet-content"> <h2 class="portlet-title-text">Antecedentes de la Sociedad</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <p><strong>RAZÓN SOCIAL</strong><br /> Pesquera Iquique - Guanaye S.A. (Igemar)</p> <p> </p> <p><strong>RUT</strong><br /> N° 91.123.000-3</p> <p> </p> <p><strong>DOMICILIO</strong><br /> Av. El Golf 150 piso 17, <br /> Las Condes, Santiago, Chile.<br /> Teléfono: (56-2) 2461 7021<br /> Fax: (56-2) 2461 7070<br /> Casilla: 3781 Santiago</p> <p> </p> <p><strong>TIPO DE SOCIEDAD</strong><br /> Sociedad Anónima Abierta</p> <p> </p> <p>INSCRIPCIÓN REGISTRO DE VALORES<br /> Registro de Valores N° 0044</p> <p><a href="http://www.igemar.cl">www.igemar.cl</a></p> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </p> </article> <article class="descripcion portlet-anidado" id="cont-hitos"> <p> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthitos_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthitos"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthitos_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthitos_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthitos__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_zHBPAKBbKmhY_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_zHBPAKBbKmhY"> <div class="portlet-content"> <h2 class="portlet-title-text">Hitos (descripción)</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <p>Desde sus orígenes, Pesquera Iquique-Guanaye S.A. gestiona y desarrolla sus negocios con una visión a largo plazo, criterio que ha estado siempre presente en las decisiones para expandir, consolidar y diversificar sus empresas subsidiarias y asociadas.</p> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </p> </article> </div> </div> <!-- /.row --> <!-- Timeline hitos --> <div class="row contenido-single portlet-anidado" id="cont-hitos-timeline"> <div class="col-sm-12"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insttimeline_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insttimeline"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insttimeline_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insttimeline_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insttimeline__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_nectia_hitos_web_portlet_HitosPortlet_ portlet-static portlet-static-end portlet-decorate " id="p_p_id_com_liferay_nectia_hitos_web_portlet_HitosPortlet_INSTANCE_oPUPgQgWi5M6_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nectia_hitos_web_portlet_HitosPortlet_INSTANCE_oPUPgQgWi5M6"> <div class="portlet-content"> <h2 class="portlet-title-text">Hitos</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="row contenido-single" id="cont-hitos-timeline"> <div class="col-sm-12"> <ul class="timeline"> <li> <div class="timeline-badge"> <strong>2018</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>• Orizon S.A. materializa la compra a la Sociedad Comercializadora Novaverde S.A. de los negocios consistentes en la distribución en Chile de los productos de la empresa norteamericana General Mills y de la distribución y comercialización de palta procesada. El precio total de adquisición por parte de Orizon ascendió a US$ 8.085.635.- <br/> • Se logra el mayor nivel de captura en la historia de Orizon S.A., con un volumen de 100.000 toneladas, 70% superior al registrado el año anterior. <br/> • Orizon S.A. lanza la línea de Productos RO, gama de conservas de lomitos de jurel, en 3 presentaciones: natural, aceite y aceite ahumado. <br/> • Se inaugura la primera Sala de Ventas en el complejo productivo ubicado en Coronel, como parte de las iniciativas de vinculación e integración a la comunidad.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>2017</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>• Empresa Pesquera Eperva S.A., en conjunto con Pesquera Iquique-Guanaye S.A. (Igemar) y AntarChile S.A., adquirieron el 23% de las acciones que Sociedad Pesquera Coloso S.A. mantenía en Corpesca S.A. El precio total de la transacción ascendió a US$ 69,39 millones. De esta forma, las tres sociedades poseen, en conjunto, el 100% de la propiedad de Corpesca S.A. <br/> • La filial Corpesca do Brasil Empreendimentos e Participações Ltda., vendió el 60% de su asociada Sementes Selecta S.A. en US$ 214 millones. <br/> • La afiliada Orizon S.A. lanzó la línea de productos congelados San José On Ice para venta nacional. Esta incluye lomos de jurel, filetes de reineta, filetes de merluza choritos con concha y choritos sin concha. <br/> • La afiliada Orizon Food LLC. abrió en octubre una oficina comercial en Estados Unidos, en la ciudad de Maryland.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>2016</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>Corpesca adquiere el 30% de la brasileña FASA, empresa dedicada a la producción de concentrados proteicos de alta calidad para la nutrición animal, por una inversión cercana a US$ 43 millones.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>2015</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>La filial Corpesca do Brasil adquiere un 10% adicional de Selecta, alcanzando así un 70% de participación en la propiedad.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>2013</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>• Sociedad Pesquera Coloso S.A. ejerce su opción de venta del 20% de las acciones de Orizon S.A. Tras esto, Pesquera Iquique - Guanaye S.A. aumenta su participación a 66,80%. /n • Corpesca adquiere 60% de la propiedad de Selecta, firma brasileña con más de 25 años de experiencia en el sector de la agroindustria, enfocada principalmente a la industrialización y comercialización de soya.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>2012</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>Golden Omega comienza su operación.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>2010</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>• La compañía y Servicios de Combustibles Ltda. -únicos accionistas de SouthPacific Korp S.A.-, la Sociedad Pesquera Coloso S.A. y Duncan Fox S.A. -únicos accionistas de Pesquera San José S.A.-, acuerdan fusionar ambas empresas pesqueras, proceso que se concreta en noviembre de 2010. Se incorpora la Pesquera San José S.A. a SouthPacific Korp S.A., que cambia su razón social a Orizon S.A. • Pesquera Iquique - Guanaye S.A. vende a Empresa Pesquera Eperva S.A. parte de su participación accionaria en SouthPacific Korp S.A. Tras ello, la compañía queda con una participación de 83,5% en SouthPacific Korp S.A. y Empresa Pesquera Eperva S.A. con un 16,5%. Luego de la fusión, el capital accionario de Orizon S.A. queda distribuido en 50,1% para Pesquera Iquique - Guanaye S.A., 40% para Pesquera San José S.A. y un 9,9% para Empresa Pesquera Eperva S.A. • La fusión da origen a Orizon S.A.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>2008</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>Orizon S.A. y Corpesca S.A. acuerdan participar en el desarrollo de un proyecto industrial para producir, a partir de aceite de pescado, concentrados de Omega 3. Esta iniciativa dio origen a Golden Omega S.A., en la cual se invirtieron del orden de US$ 80 millones para la construcción de un complejo industrial en Arica.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>2005</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>Pesquera Iquique - Guanaye S.A. compra a Inversiones ICC Chile Ltda. el capital accionario que poseía en SouthPacific Korp S.A., alcanzando el 99,9% de participación en dicha empresa.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>1999</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>• Pesquera Iquique - Guanaye S.A., Empresa Pesquera Eperva S.A. y Sociedad Pesquera Coloso S.A. firman un Acuerdo de Reestructuración Pesquera, que establece las bases para formar una nueva compañía, que consolida sus actividades pesqueras de la Zona Norte. Así, se constituye Corpesca S.A., la que actualmente es propietaria de los activos pesqueros que las empresas mencionadas poseían en la I y II regiones del país. • Fusión de Pesquera Iquique - Guanaye S.A., Pesquera Pacific Protein S.A. y Pesquera El Quillay S.A. Tras ello, Pesquera Iquique - Guanaye S.A. aporta los activos que poseía en la zona centro-sur y la nueva sociedad se denomina SouthPacific Korp S.A. (SPK). La compañía queda con una participación accionaria de 75%.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>1992</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>Ambas sociedades se fusionan, dando origen a Pesquera Iquique - Guanaye S.A. (IGEMAR).</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>1962</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>Sociedad Pesquera Guanaye Ltda. inicia actividades en el puerto de Iquique y fue una de las empresas pioneras de la industria productora de harina de pescado en Chile.</p> </div> </div> </li> <li> <div class="timeline-badge"> <strong>1945</strong> </div> <div class="timeline-panel"> <div class="timeline-heading"> <h4 class="timeline-title"></h4> </div> <div class="timeline-body"> <p>Sociedad Pesquera Guanaye Ltda. inicia actividades en el puerto de Iquique y fue una de las empresas pioneras de la industria productora de harina de pescado en Chile.</p> </div> </div> </li> </ul> <!-- /.timeline --> </div> </div> <!-- /.row --> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </div> </div> <!-- /.row --> </div> <!-- /.container-fluid --> </div> <!-- / id quienes-somos --> <!-- NEGOCIO --> <div class="section fnegocios fp-auto-height img-bg categoria" id="negocio"> <div class="container-fluid altura-minima"> <div class="row"> <!-- español --> <h2 class="col-sm-12 titulo-pagina">Negocios</h2> <!-- Enlaces de la categoría --> <div class="col-sm-4"> <ul class="enlaces-categoria"> <!-- español --> <li class="option active" id="link-empresas"><a href="#negocios" opcion="empresas" title="Ir a enlace">Empresas Relacionadas</a></li> </ul> <!-- /.enlaces-categoria --> </div> <div class="col-sm-8"> <article class="contenido-single portlet-anidado fondo-negro" id="cont-empresas"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instempresas_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instempresas"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instempresas_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instempresas_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instempresas__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_c7ATNlja7J7O_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_c7ATNlja7J7O"> <div class="portlet-content"> <h2 class="portlet-title-text">Empresas Relacionadas</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <h4><a href="http://www.corpesca.cl" target="_blank"><img src="/documents/34275/34711/250a--corpesca.jpg/1cf0b193-eae0-e034-5c80-d53633d0338d?t=1490189242643" style="width: 203px; height: 148px;" /></a></h4> <h4> </h4> <p><meta /></p> <p>Corpesca es la principal compañía pesquera de Chile y cuenta con operaciones comerciales y productivas a nivel internacional.</p> <p>Hoy, se consolida como un productor global de alimentos proteicos de origen marino, vegetal y animal, fuertemente comprometido con la excelencia operacional, la sustentabilidad y la innovación.</p> <p> </p> <h4> </h4> <h4><a href="http://www.orizon.cl/" target="_blank"><img height="95" src="/documents/34275/34711/logo-orizon-fondo-blanco.jpg/0548c6f9-e320-5b5e-b0b2-a7bd56c5fecc?t=1488838615467" style="width: 211px; height: 52px;" width="382" /></a></h4> <p> </p> <p>Realiza actividades de pesca industrial en la zona centro-sur del país, contando con centros de cultivo de choritos, además de siete plantas de proceso y una flota de cinco barcos operativos.</p> <h4> </h4> <h4> </h4> <p><img src="/documents/34275/34711/logo-golden-omega.jpg/835889d0-e50d-db5b-cffd-660e6850a160?t=1488838635764" style="width: 206px; height: 159px;" /></p> <p>Compañía orientada a la producción de concentrados de Omega 3 de alta calidad a partir de aceites de pescado llegando a concentraciones de hasta 85% de EPA y DHA.</p> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </article> </div> </div> <!-- /.row --> </div> <!-- /.container-fluid --> </div> <!-- /#negocios --> <!-- GOBIERNO CORPORATIVO --> <div class="section fgobierno fp-auto-height img-bg categoria" id="gobierno-corporativo"> <div class="container-fluid altura-minima"> <div class="row"> <!-- español --> <h2 class="col-sm-12 titulo-pagina ">GOBIERNO CORPORATIVO</h2> <!-- Enlaces de la categoría --> <div class="col-sm-4"> <ul class="enlaces-categoria"> <!-- español --> <li class="option active" id="link-directorio"><a href="#gobierno" opcion="directorio" title="Ir a enlace">Directorio</a></li> <li class="option" id="link-administracion"><a href="#gobierno" opcion="administracion" title="Ir a enlace">Administración</a></li> <li class="option" id="link-modelos"><a href="#gobierno" opcion="modelos" title="Ir a enlace">Modelos y Prácticas de Gobierno Corporativo</a></li> <li class=""><a href="https://www.canaldedenuncia.cl/cda/sercor/cdpages/inicio.aspx" target="_blank" title="Ir a enlace">Canal de Denuncias</a></li> </ul> <!-- /.enlaces-categoria --> </div> <div class="col-sm-8"> <article class="contenido-single portlet-anidado fondo-negro" id="cont-directorio"> <p> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdirectorio_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdirectorio"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdirectorio_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdirectorio_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdirectorio__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_yf5ROxQV99pL_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_yf5ROxQV99pL"> <div class="portlet-content"> <h2 class="portlet-title-text">Directorio (Igemar)</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <style type="text/css">.directorio figcaption{margin-top:0!important}</style> <article class="directorio ajuste-provisorio"> <h6 class="sr-only">Descripción de la categoría</h6> <!-- Presidencia --> <div class="row"> <h2 class="col-sm-12">Directorio</h2> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/igemar-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption><strong>Presidente</strong> <h4>Roberto Angelini Rossi <span>Ingeniero Civil industrial</span></h4> </figcaption> </figure> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/igemar-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption><strong>Vicepresidente</strong> <h4>Manuel Antonio Tocornal Astoreca <span>Empresario</span></h4> </figcaption> </figure> </div> <!-- Directores --> <div class="row"> <h2 class="col-sm-12">Directores</h2> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/igemar-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption class="sin-cargo"> <h4>Fernando Agüero Garcés <span>Ingeniero Civil</span></h4> </figcaption> </figure> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/igemar-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption class="sin-cargo"> <h4>Jorge Andueza Fouque <span>Ingeniero Civil</span></h4> </figcaption> </figure> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/igemar-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption class="sin-cargo"> <h4>Manuel Enrique Bezanilla Urrutia <span>Abogado</span></h4> </figcaption> </figure> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/igemar-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption class="sin-cargo"> <h4>Charles Kimber Wylie <span>Ingeniero Comercial</span></h4> </figcaption> </figure> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/igemar-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption class="sin-cargo"> <h4>Ramiro Méndez Urrutia <span>Abogado</span></h4> </figcaption> </figure> </div> </article> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </p> </article> <article class="contenido-single portlet-anidado fondo-negro" id="cont-administracion"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instadministracion_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instadministracion"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instadministracion_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instadministracion_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instadministracion__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_aZtOQvfLP5FA_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_aZtOQvfLP5FA"> <div class="portlet-content"> <h2 class="portlet-title-text">Administración</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <style type="text/css">.directorio figcaption{margin-top:0!important}</style> <article class="directorio"> <div class="row"> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/siemel-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption><strong>Gerente General</strong> <h4>Eduardo Navarro Beltrán <span>Ingeniero Comercial</span></h4> </figcaption> </figure> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/siemel-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption><strong>Gerente de Administración y Finanzas</strong> <h4>Rodrigo Huidobro Alvarado <span>Ingeniero Civil Industrial</span></h4> </figcaption> </figure> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/siemel-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption><strong>Contador General </strong> <h4>Ricardo Vargas Bernal <span>Contador Auditor</span></h4> </figcaption> </figure> </div> <div class="row"> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/siemel-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption><strong>Asesores Legales</strong> <h4>Portaluppi, Guzmán y Bezanilla Asesorías Ltda.</h4> </figcaption> </figure> <figure class="col-xs-12 col-sm-4"><!-- <img alt="Imagen de ejemplo" src="/o/siemel-theme/img/directorio-foto-ejemplo.png" /> --> <figcaption><strong>Auditores</strong> <h4>Deloitte Auditores y Consultores Ltda.</h4> </figcaption> </figure> </div> </article> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </p> </article> <article class="contenido-single portlet-anidado fondo-negro" id="cont-modelos"> <p> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instmodelos_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instmodelos"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instmodelos_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instmodelos_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instmodelos__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_HD5QJvMQpg1K_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_HD5QJvMQpg1K"> <div class="portlet-content"> <h2 class="portlet-title-text">Modelos y Prácticas de gobierno corporativo</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <p>En 2011, nuestra empresa formalizó sus prácticas y conductas de negocio en su Código de Ética – Principios y Valores, en el cual se establecen procedimientos y directrices para las mejores prácticas de negocio. El principal objetivo de este documento, es promover el más estricto cumplimiento de las normativas vigentes.</p> <p>Posteriormente se implementó un Modelo de Prevención de Delitos, una Política y los procedimientos a seguir conforme a las disposiciones legales. A estos documentos se unieron en 2015, una Política de Aportes a la Comunidad, que establece criterios y procedimientos a seguir en las donaciones, patrocinios y similares que entregue la empresa y una Política de Gestión de Riesgos, que recoge las directrices establecidas por el Directorio, para que la empresa adopte formalmente la gestión de sus riesgos.</p> <p>Adicionalmente, el Directorio lleva a cabo un programa de capacitación con el objetivo de actualizar sus conocimientos en materia de mejores prácticas de gobierno corporativo, temas de inclusión, diversidad y reportes de sostenibilidad, gestión de riesgos, fallos, sanciones y conflictos de interés.</p> <p>Durante el 2019, se han realizado las siguientes charlas de capacitación:</p> <p>* Análisis de las nuevas responsabilidades penales para las empresas y sus directivos: 3 de junio de 2019<br /> * La Alta Dirección ante la nueva Ley 20.393. Una oportunidad de fortalecer la cultura organizacional: 3 de junio de 2019<br /> * Acceso a información de Directorios: 4 de noviembre de 2019<br /> * Más allá del control y compliance: Directorios que agregan valor: 4 de noviembre de 2019</p> <hr /> <ul class="lista-pdf"> <li><a href="/documents/34275/34696/politica_libre_comp_igemar2017.pdf/24d0d534-515b-bd3a-6426-66ddc4fa0dab" target="_blank">Política de Libre Competencia</a></li> <li><a href="/documents/34275/34696/175_poli-tica-de-aportes-igemar.pdf/cd0c2d1c-c41b-a4a0-c396-6f4500b03068" target="_blank" title="Ver documento">Política de Aportes a la Comunidad</a></li> <li><a href="/documents/34275/34696/politica_gestion_riesgos_igemar.pdf/ac9567bf-0dff-39a8-0e6f-4d3205ae3c39" target="_blank" title="Ver documento">Política de Gestión de Riesgos</a></li> <li><a href="/documents/34275/34696/Polit_prevdelitos_igemar_ago2019.pdf/c4f3201e-98ab-601f-9192-56d14939af89" target="_blank" title="Ver documento">Política de Prevención de Delitos</a></li> <li><a href="/documents/34275/34696/175_modelo-prevencion-igemar_dic16.pdf/0b30cb27-619d-0b59-b6e5-26b675929a56" target="_blank" title="Ver documento">Modelo de Prevención de Delitos</a></li> <li><a href="/documents/34275/34696/Codigo_etica_Igemar_agosto19.pdf/d4282dfb-db8c-ac29-b2f5-e7f693667b8c" target="_blank" title="Ver documento">Código de Etica</a></li> <li><a href="/documents/34275/34696/175_procedimientos-de-gobierno-corporativo-igemar.pdf/ace5d64c-3d86-961b-b0b0-4e6430b6aa25" target="_blank" title="Ver documento">Procedimientos de Gobierno Corporativo</a></li> <li><a href="/documents/34275/34696/Linea_directa_Igemar_ago2019.pdf/225427b0-26c5-08a9-d7a2-226faca0e411" target="_blank" title="Ver documento">Linea Directa</a></li> </ul> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </p> </article> </div> </div> <!-- /.row --> </div> <!-- /.container-fluid --> </div> <!-- /#gobierno-corporativo --> <!-- INVERSIONISTAS --> <div class="section finversionistas fp-auto-height img-bg categoria"> <div class="container-fluid altura-minima"> <div class="row"> <!-- español --> <h2 class="col-sm-12 titulo-pagina">INVERSIONISTAS</h2> <!-- Enlaces de la categoría --> <div class="col-sm-4"> <ul class="enlaces-categoria"> <!-- español --> <li class=""><a href="#memorias" title="Ir a enlace">Memorias Anuales</a></li> <li class="option active" id="link-estados"><a href="#inversionistas" opcion="estados" title="Ir a enlace">Estados Financieros</a></li> <!--<li class="option" id="link-informacion"><a href="#inversionistas" opcion="informacion" title="Ir a enlace">Información Bursátil</a></li>--> <li class=""><a href="#contactos" title="Investor Relations">IR</a></li> </ul> <!-- /.enlaces-categoria --> </div> <div class="col-sm-8"> <article class="contenido-single portlet-anidado fondo-negro" id="cont-estados"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instestados_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instestados"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instestados_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instestados_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instestados__column-1"> <div class="portlet-boundary portlet-boundary_EstadoFinancieroIgemar_ portlet-static portlet-static-end portlet-decorate " id="p_p_id_EstadoFinancieroIgemar_INSTANCE_2AMr9ICHC0fw_" > <!DOCTYPE html> <section class="portlet" id="portlet_EstadoFinancieroIgemar_INSTANCE_2AMr9ICHC0fw"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlet EstadoFinanciero Igemar</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div data-example-id="togglable-tabs"> <ul class="nav nav-tabs " id="myTabs" role="tablist"> <li class="dropdown active" role="presentation"> <a aria-controls="myTabDrop1-contents" aria-expanded="false" class="dropdown-toggle" data-toggle="dropdown" href="#" id="myTabDrop1">Elige un año </a> <ul aria-labelledby="myTabDrop1" class="dropdown-menu" id="myTabDrop1-contents"> <li class="active"><a aria-controls="2019" aria-expanded="true" data-toggle="tab" href="#2019" id="2019-tab" role="tab">2019</a></li> <li><a aria-controls="2018" aria-expanded="true" data-toggle="tab" href="#2018" id="2018-tab" role="tab">2018</a></li> <li><a aria-controls="2017" aria-expanded="true" data-toggle="tab" href="#2017" id="2017-tab" role="tab">2017</a></li> <li><a aria-controls="2016" aria-expanded="true" data-toggle="tab" href="#2016" id="2016-tab" role="tab">2016</a></li> <li><a aria-controls="2015" aria-expanded="true" data-toggle="tab" href="#2015" id="2015-tab" role="tab">2015</a></li> <li><a aria-controls="2014" aria-expanded="true" data-toggle="tab" href="#2014" id="2014-tab" role="tab">2014</a></li> <li><a aria-controls="2013" aria-expanded="true" data-toggle="tab" href="#2013" id="2013-tab" role="tab">2013</a></li> </ul></li> </ul> <div class="tab-content" id="myTabContent"> <div class="journal-content-article"> <style type="text/css">.nt_table-scroll{overflow-x:auto;position:relative}table.nt_table{border-collapse:collapse;border-spacing:0;width:100%}.nt_table tr{height:30px}.nt_table td,.nt_table th{padding:10px}.nt_table tr:nth-child(odd){background-color:#eee}.fade{display:none}.fade.active{display:block;margin-bottom:13px}</style> <div aria-labelledby="2019-tab" class="tab-pane fade active in" id="2019" role="tabpanel"> <h3>2019</h3> <div class="nt_table-scroll"> <table class="nt_table table-hover"> <tbody> <tr> <td bgcolor="#0086BF" style="height: 26px;"><span style="color: rgb(255, 255, 255);">Documentos</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Marzo</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Junio</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Septiembre</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Diciembre</span></td> </tr> <tr> <td>Estado Financiero</td> <td style="text-align: center;"><a href="/documents/34275/242536/EF_201903.pdf/cb2614b9-7e4b-3dee-33f3-369678f82dd5" target="_blank"> <img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /> </a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="#" target="_blank"> </a></td> <!-- septiembre --> <td style="text-align: center;"> </td> <!-- diciembre --> <td style="text-align: center;"> </td> </tr> <tr> <td>Análisis Razonado</td> <td style="text-align: center;"><a href="/documents/34275/242536/AR_201903.pdf/c5d826c7-a468-ced5-e876-4a932ca0ab84" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"> </td> <!-- septiembre --> <td style="text-align: center;"> </td> <!-- diciembre --> <td style="text-align: center;"> </td> </tr> <tr> <td>Declaración de Responsabilidad</td> <td style="text-align: center;"><a href="/documents/34275/242536/DR_201903.pdf/5a3a6a85-4c6d-265b-1106-efcd8f813b64" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"> </td> <!-- septiembre --> <td style="text-align: center;"> </td> <!-- diciembre --> <td style="text-align: center;"> </td> </tr> <tr> <td>Hechos Relevantes</td> <td style="text-align: center;"><a href="/documents/34275/242536/HR_201903.pdf/fdd1d57b-923e-edf6-6824-167f32acc23d" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"> </td> <!-- septiembre --> <td style="text-align: center;"> </td> <!-- diciembre --> <td style="text-align: center;"> </td> </tr> </tbody> </table> </div> </div> <div aria-labelledby="2018-tab" class="tab-pane fade" id="2018" role="tabpanel"> <h3>2018</h3> <div class="nt_table-scroll"> <table class="nt_table table-hover"> <tbody> <tr> <td bgcolor="#0086BF" style="height: 26px;"><span style="color: rgb(255, 255, 255);">Documentos</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Marzo</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Junio</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Septiembre</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Diciembre</span></td> </tr> <tr> <td>Estado Financiero</td> <td style="text-align: center;"><a href="/documents/34275/183706/EF_91123000_201803.pdf/2fb6a33e-8dad-f817-e979-533daa6af7f7" target="_blank"> <img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /> </a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/183706/Estados_financieros_%28PDF%2991123000_201806.pdf/2030347b-3bfd-5fb2-22aa-fad3659620cf" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/183706/Estados_financieros_%28pdf%2991123000_201809.pdf/a3023e02-5dc9-5ea1-9eaa-1811da323d34" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/183706/EEFF_dic2018.pdf/0a8f229d-297a-04db-4b0a-f9606116f292" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Análisis Razonado</td> <td style="text-align: center;"><a href="/documents/34275/183706/AR_91123000_201803.pdf/c44b5ffd-e838-8e71-7c22-7b0d885c00ff" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/183706/An%C3%A1lisis_Razonado91123000_201806.pdf/35c5cb8c-9704-fcab-e5fb-3d345847f696" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/183706/Analisis_Razonado91123000_201809.pdf/4f377ad7-9a18-6a88-1a27-c36adca1ca8d" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/183706/AR_dic2018.pdf/55ae8535-ed01-6519-bb7e-67c724d37144" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Declaración de Responsabilidad</td> <td style="text-align: center;"><a href="/documents/34275/183706/DR_91123000_201803.pdf/f2020d48-73bf-1c3a-5f63-0b3266066c5c" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/183706/Declaraci%C3%B3n_de_responsabilidad91123000_201806.pdf/a44dabe7-3d36-e476-9644-4c7980528e5b" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/183706/Analisis_Razonado91123000_201809.pdf/4f377ad7-9a18-6a88-1a27-c36adca1ca8d" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/183706/DR_dic2018.pdf/7fea0c9e-348f-8d84-b4e2-1aa698294dae" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Hechos Relevantes</td> <td style="text-align: center;"><a href="/documents/34275/183706/HR_91123000_201803.pdf/262adf2e-eb46-d04f-d6b0-1c3cb476f1d7" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/183706/Hechos_Relevantes91123000_201806.pdf/9027e73a-09c3-363f-4eb2-319564f75378" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"> <a href="/documents/34275/183706/Hechos_relevantes91123000_201809.pdf/f4bdbff1-7f48-bb63-ad30-e589d8ab9e7d" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/183706/HR_dic2018.pdf/99f8091d-4a2c-a3e8-653b-037e5df5a57a" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> </tbody> </table> </div> </div> <div aria-labelledby="2017-tab" class="tab-pane fade" id="2017" role="tabpanel"> <h3>2017</h3> <div class="nt_table-scroll"> <table class="nt_table table-hover"> <tbody> <tr> <td bgcolor="#0086BF" style="height: 26px;"><span style="color: rgb(255, 255, 255);">Documentos</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Marzo</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Junio</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Septiembre</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Diciembre</span></td> </tr> <tr> <td>Estado Financiero</td> <td style="text-align: center;"><a href="/documents/34275/34720/EFF0317.pdf/231e310b-2d87-fa78-320d-58da1762137a" target="_blank"> <img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /> </a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/126736/IFRS_201706.pdf/b4605514-e843-6756-594b-4ef660aae018" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34720/Estados_financieros_%28PDF%2991123000_201709.pdf/7c422914-ee17-091d-f402-d058d322fc75" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/Estados_financieros91123000_201712.pdf/a652e445-8218-0a67-dd4a-487c9e752466" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Análisis Razonado</td> <td style="text-align: center;"><a href="/documents/34275/34720/AR_0317.pdf/ae9b45e1-cca0-30e6-52f1-01d8cbd8ffb7" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/126736/AR_201706.pdf/091bbbef-1e2a-a0cd-890a-996a057d2ace" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34720/An%C3%A1lisis_Razonado91123000_201709.pdf/5df24712-f409-ce76-4994-21424823e940" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/Analisis_Razonado91123000_201712.pdf/882c4c22-3bfe-0ce7-3ac1-09226c215fa2" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Declaración de Responsabilidad</td> <td style="text-align: center;"><a href="/documents/34275/34720/DR0317.pdf/667adaa0-68c8-d457-c621-50670ca7650e" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/126736/DR_201706.pdf/c5aefcdd-6c86-8b60-d514-805c618b75d8" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34720/Declaraci%C3%B3n_de_responsabilidad91123000_201709.pdf/6d38b44a-d804-a70b-badf-b7d19be7ca27" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/Declaracion_de_responsabilidad91123000_201712.pdf/ec60ec62-30c5-ed79-a12c-a28b378ce84a" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Hechos Relevantes</td> <td style="text-align: center;"><a href="/documents/34275/34720/HR0317.pdf/b421cc79-1ac9-193b-e224-d499b853714a" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/126736/HR_201706.pdf/e7793591-4f99-3414-9535-620b7a7667eb" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"> <a href="/documents/34275/34720/Hechos_Relevantes91123000_201709.pdf/9c70f235-b920-82c4-b392-331bcb91a6ce" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/Hechos_Relevantes91123000_201712.pdf/1c8a07a5-7748-750d-def4-fa44e64813ca" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> </tbody> </table> </div> </div> <div aria-labelledby="2016-tab" class="tab-pane fade" id="2016" role="tabpanel"> <h3>2016</h3> <div class="nt_table-scroll"> <table class="nt_table table-hover"> <tbody> <tr> <td bgcolor="#0086BF" style="height: 26px;"><span style="color: rgb(255, 255, 255);">Documentos</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Marzo</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Junio</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Septiembre</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Diciembre</span></td> </tr> <tr> <td>Estado Financiero</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_-pdf-91123000_201603.pdf/84553bb2-9ec4-86fa-90f7-368139f3acf1" target="_blank"> <img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /> </a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_-pdf-91123000_201606.pdf/0885f4b0-a74d-dd6f-906a-b9c00e1e46c1" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_-pdf-91123000_201609.pdf/0ffd3142-10b5-814a-4705-472b024fb660" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/Igemar_eeff_2016.pdf/cd7cca3e-1dab-058c-d57a-e2283fd8bb8a" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Análisis Razonado</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_analisis_razonado91123000_201603.pdf/fe3df267-a7f5-7edb-bf5e-a2515905bcf8" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_analisis_razonado91123000_201606.pdf/11e6d74a-5605-2357-1500-4fc96ef6fd5e" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_analisis_razonado91123000_201609.pdf/d23594b8-1195-3054-f3a4-da16c6293939" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/Igemar_AR_2016.pdf/99357c62-5fce-f212-bba4-187b04802a17" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Declaración de Responsabilidad</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_declaracion_de_responsabilidad91123000_201603.pdf/a59b5b7a-fd54-8d95-6aab-2a7cab84ab3f" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_declaracion_de_responsabilidad91123000_201606.pdf/d1bd918a-b3a4-ee28-a87b-b1d22f3a9d92" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_declaracion_de_responsabilidad91123000_201609.pdf/5f177679-f41c-fb2b-b40d-8296304e277b" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/Igemar_DR_2016.pdf/e0810c51-cca5-05f0-79a5-bb6409c42e52" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Hechos Relevantes</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_hechos_relevantes91123000_201603.pdf/4f5620ca-bb4c-9b83-4d56-4642048b6b42" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_hechos_relevantes91123000_201606.pdf/ea39bb65-4d64-cbd0-258e-ccdf9f334f22" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"> <a href="/documents/34275/34705/179_hechos_relevantes91123000_201609.pdf/07c53b95-591a-77ca-fefc-d995bdfba1f3" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/Igemar_HR_2016.pdf/70415e75-d832-ad69-9986-0bb5314bae63" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> </tbody> </table> </div> </div> <div aria-labelledby="2015-tab" class="tab-pane fade" id="2015" role="tabpanel"> <h3>2015</h3> <div class="nt_table-scroll"> <table class="nt_table table-hover"> <tbody> <tr> <td bgcolor="#0086BF" style="height: 26px;"><span style="color: rgb(255, 255, 255);">Documentos</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Marzo</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Junio</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Septiembre</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Diciembre</span></td> </tr> <tr> <td>Estado Financiero</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_-pdf-91123000_201503.pdf/9400a47f-d767-b036-3e77-209138525624" target="_blank"> <img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /> </a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_junio_2015.pdf/4b5e5630-301c-cb7c-b605-3093a3669034" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados-financieros-septiembre-2015.pdf/75bec3ce-229f-f182-d69f-3470ee9d60d0" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_eeff-diciembre-2015.pdf/4dff7d99-d5e1-18c3-2833-b73a15ce4e1a" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Análisis Razonado</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_xa1lisis_razonado91123000_201503.pdf/e1fbc168-07ed-08c1-ca69-a27d9ec23314" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xa1lisis_razonado_junio_2015.pdf/0e448547-b6cf-f304-5904-4f430308515c" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xa1lisis-razonado-septiembre-2015.pdf/522c0024-5563-9a06-1064-8bd797af9c37" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_analisis_razonado-diciembre-2015.pdf/65d7b10b-4ea9-a837-3ef2-e2fe13287f05" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Declaración de Responsabilidad</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201503.pdf/bdc8140a-a884-3e3b-ce19-b178d6b45d6b" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xb3n_de_responsabilidad_junio_2015.pdf/d9c3f090-b779-48d0-1284-dccfc0a3cdd9" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xb3n-responsabilidad-septiembre-2015.pdf/b71a50b7-beed-add9-9231-d7481221551a" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_declaracion_responsabilidad-diciembre-2015.pdf/6a83b5c8-fa3a-a4c1-8905-c2aeaf8ab7a4" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Hechos Relevantes</td> <td style="text-align: center;"><a href="/documents/34275/34705/Hechos_Relevantes91123000_201503.pdf/261c32ea-ef6a-d334-5e83-4a795258016d" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_hechos_relevantes_junio_2015.pdf/2171c120-6482-06a1-07e1-2d65099588a5" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"> <a href="/documents/34275/34705/179_hechos-relevantes-septiembre-2015.pdf/de515067-9408-85f9-5666-f2814362c514" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_hechos_relevantes-diciembre-2015.pdf/99e15269-383d-b285-b4d8-f08d6db1de12" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> </tbody> </table> </div> </div> <div aria-labelledby="2014-tab" class="tab-pane fade" id="2014" role="tabpanel"> <h3>2014</h3> <div class="nt_table-scroll"> <table class="nt_table table-hover"> <tbody> <tr> <td bgcolor="#0086BF" style="height: 26px;"><span style="color: rgb(255, 255, 255);">Documentos</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Marzo</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Junio</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Septiembre</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Diciembre</span></td> </tr> <tr> <td>Estado Financiero</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_-pdf-91123000_201403.pdf/446a4b9a-bddb-a91d-8b3f-749db4eccecc" target="_blank"> <img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /> </a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_junio_2014.pdf/a62c6a49-361a-15da-f2a5-b8a926f1c82d" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_septiembre_2014.pdf/54a2748b-8672-362a-0400-bf4880d23705" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_eeff2014.pdf/69bc8eb6-ae47-60ce-ad82-b8f9e499200d" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Análisis Razonado</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_an-c3-a1lisis_razonado91123000_201403.pdf/e28f5c87-1717-7c78-393d-2de6bc271b2e" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_analisis_razonado_junio_2014.pdf/3f0ee5e9-c2da-4076-553a-a7d2eba51c56" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xa1lisis_razonado_septiembre_2014.pdf/9b871d1e-0f95-0838-a7a4-fe807ffd2501" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xa1lisis_razonado91123000_201412.pdf/1180d807-ecac-a845-39ea-6a868ea4c47b" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Declaración de Responsabilidad</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_declaraci-c3-b3n_de_responsabilidad91123000_201403.pdf/7cf24895-138d-0b72-5406-85dadc3c030e" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_declaracion_de_responsabilidad_junio_2014.pdf/e451ce99-a95e-dd0e-8cd2-12b4b5f8f715" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xb3n_de_responsabilidad_septiembre_2014.pdf/ff313834-6517-aefb-84d4-90ef5daf0961" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201412.pdf/4727ab6b-16df-b7c4-bace-1d7c10331a33" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Hechos Relevantes</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_hechos_relevantes91123000_201403.pdf/d89861aa-771b-df93-97b9-eb2087747581" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_hechos_relevantes_junio_2014.pdf/af19aa56-6ac0-2ba1-c575-c4025defd163" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"> <a href="/documents/34275/34705/179_hechos_relevantes_septiembre_2014.pdf/173e652a-a45e-6a6a-927c-71dc94ab38da" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_hechos_relevantes91123000_201412.pdf/ba645dee-85c0-1baa-8d05-1d06e41e44fc" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> </tbody> </table> </div> </div> <div aria-labelledby="2013-tab" class="tab-pane fade" id="2013" role="tabpanel"> <h3>2013</h3> <div class="nt_table-scroll"> <table class="nt_table table-hover"> <tbody> <tr> <td bgcolor="#0086BF" style="height: 26px;"><span style="color: rgb(255, 255, 255);">Documentos</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Marzo</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Junio</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Septiembre</span></td> <td bgcolor="#0086BF" style="text-align: center; height: 26px; min-width: 101px;"><span style="color: rgb(255, 255, 255);">Diciembre</span></td> </tr> <tr> <td>Estado Financiero</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_igemar_0313.pdf/7d352aef-7c12-1798-835a-a556e10f0583" target="_blank"> <img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /> </a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_-pdf-91123000_201306.pdf/c4a361c7-50b7-f3f1-a805-75e2a9269ca1" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_estados_financieros_-pdf-91123000_201309.pdf/24e942a5-4309-8476-2c72-874bb925c902" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_fecu2013.pdf/5855d2b8-767d-96cd-8442-c6a8f5a7cd8e" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Análisis Razonado</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_analisis_razonado_igemar_0313.pdf/59c26bf9-31c1-3934-f2f5-4c5bec1b1ed1" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xa1lisis_razonado91123000_201306.pdf/88cc5920-eeab-205a-a0ff-98fce76f5f32" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xa1lisis_razonado91123000_201309.pdf/15d14ee0-5199-f543-15ad-01d9301a419e" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xa1lisis_razonado_diciembre_2013.pdf/a922f72d-4b77-a19f-8049-bba15d2327cc" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Declaración de Responsabilidad</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_xb3n_de_responsabilidad_igemar_0313.pdf/5737843e-896a-5fc0-a4d6-925298a7b7ee" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201306.pdf/9d751e76-f024-5628-6d91-fdf74aaa37ea" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201309.pdf/30f0d1bb-fae9-6cfd-3320-85f76c78a8fb" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_xb3n_de_responsabilidad_diciembre_2013.pdf/4fa057e0-59a5-3f5f-ad49-1dbe6bc1a850" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> <tr> <td>Hechos Relevantes</td> <td style="text-align: center;"><a href="/documents/34275/34705/179_hechos_relevantes_igemar_0313.pdf/70cdd43d-12d3-e6c3-1762-fad64b963f7d" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- JUNIO --> <td style="text-align: center;"><a href="/documents/34275/34705/179_hechos_relevantes91123000_201306.pdf/5b7df00d-0b37-4ba4-0021-3a34b88313dc" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- septiembre --> <td style="text-align: center;"> <a href="/documents/34275/34705/179_hechos_relevantes91123000_201309.pdf/ba8f025b-fde5-a1e5-7607-39935f2a242e" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> <!-- diciembre --> <td style="text-align: center;"><a href="/documents/34275/34705/179_hechos_relevantes_diciembre_2013.pdf/4e9d3f1a-1392-560a-4147-77f9ec3d417b" target="_blank"><img src="https://dm5migu4zj3pb.cloudfront.net/images/adobe_pdf_file_icon.png" alt="" style="height:23; text-align:start; widht:23;" /></a></td> </tr> </tbody> </table> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </article> <article class="contenido-single portlet-anidado fondo-negro" id="cont-informacion"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instinformacion_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instinformacion"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instinformacion_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instinformacion_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instinformacion__column-1"></div> </div> </div> </div> </div> </div> </div> </section> </div> </article> </div> </div> <!-- /.row --> </div> <!-- /.container-fluid --> </div> <!-- /#inversionistas --> <!-- ACCIONISTAS --> <div class="section faccionistas fp-auto-height img-bg categoria" > <div class="container-fluid altura-minima"> <div class="row"> <!-- español --> <h2 class="col-sm-12 titulo-pagina">ACCIONISTAS</h2> <!-- Enlaces de la categoría --> <div class="col-sm-4"> <ul class="enlaces-categoria"> <!-- español --> <li class="option active" id="link-juntas"><a href="#accionistas" opcion="juntas" title="Ir a enlace">Juntas de Accionistas</a></li> <li class="" ><a href="http://www.sercor.cl/" target="_blank" title="Ir a enlace">Servicio a Accionistas</a></li> <li class="option" id="link-propiedad"><a href="#accionistas" opcion="propiedad" title="Ir a enlace">Propiedad</a></li> <li class="option" id="link-dividendos"><a href="#accionistas" opcion="dividendos" title="Ir a enlace">Dividendos</a></li> <li class="option" id="link-hechos"><a href="#accionistas" opcion="hechos" title="Ir a enlace">Hechos Esenciales</a></li> <li class="option" id="link-actas"><a href="#accionistas" opcion="actas" title="Ir a enlace">Actas Juntas de Accionistas</a></li> </ul> <!-- /.enlaces-categoria --> </div> <div class="col-sm-8"> <article class="contenido-single portlet-anidado fondo-negro" id="cont-propiedad"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instpropiedad_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instpropiedad"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instpropiedad_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instpropiedad_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instpropiedad__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_M18hOzzjI05p_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_M18hOzzjI05p"> <div class="portlet-content"> <h2 class="portlet-title-text">Propiedad</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <p>Los 12 principales accionistas al 31 de diciembre de 2018 eran los siguientes:</p> <style type="text/css">.nt_table-scroll{position:relative;overflow-x:auto}table.nt_table{border-collapse:collapse;border-spacing:0;width:100%;max-width:none!important}.nt_table tr{height:30px}.nt_table td,.nt_table th{padding:10px}.nt_table tr:nth-child(odd){background-color:#eee}</style> <div class="nt_table-scroll"> <table class="nt_table table-hover"> <tbody> <tr> <td bgcolor="#85B916" style="height: 26px;"><span style="color: rgb(255, 255, 255);">Accionista</span></td> <td bgcolor="#85B916" style="height: 26px;"><span style="color: rgb(255, 255, 255);">RUT</span></td> <td bgcolor="#85B916" style="height: 26px;"><span style="color: rgb(255, 255, 255);">Acciones</span></td> <td bgcolor="#85B916" style="height: 26px;"><span style="color: rgb(255, 255, 255);">% de Participación</span></td> </tr> <tr> <td>Empresas Copec S.A.</td> <td>90.690.000-9</td> <td>1.810.948.384</td> <td>50,22%</td> </tr> <tr> <td>Inversiones Nueva Sercom Ltda.</td> <td>76.306.362-3</td> <td>1.143.699.700</td> <td>31,71%</td> </tr> <tr> <td>AntarChile S.A.</td> <td>96.556.310-5</td> <td>628.792.747</td> <td>17,44%</td> </tr> <tr> <td>Pesquera Iquique S.A.</td> <td>91.123.000-3</td> <td>14.621.618</td> <td>0,41%</td> </tr> <tr> <td>Julius Neger Berl</td> <td>1.626.340-0</td> <td>2.782.883</td> <td>0,08%</td> </tr> <tr> <td>David Josef</td> <td>8.729.231-2</td> <td>1.934.911</td> <td>0,05%</td> </tr> <tr> <td>Jaime Larraín y Cía. Corredores de Bolsa</td> <td>84.360.700-4</td> <td>286.594</td> <td>0,01%</td> </tr> <tr> <td>Inversiones Civiles Oscar, Alice y Compañía.</td> <td>76.446.020-0</td> <td>208.030</td> <td>0,01%</td> </tr> <tr> <td>Larraín Vial S.A. Corredores de Bolsa</td> <td>80.537.000-9</td> <td>206.389</td> <td>0,01%</td> </tr> <tr> <td>BCI Corredor de Bolsa S.A.</td> <td>96.519.800-8</td> <td>203.129</td> <td>0,01%</td> </tr> <tr> <td>Inverkorp SPA</td> <td>99.596.510-0</td> <td>140.000</td> <td>0,00%</td> </tr> <tr> <td>Compañía Minera La Presidenta S.C.</td> <td>90.006.000-9</td> <td>105.000</td> <td>0,00%</td> </tr> <tr> <td> </td> <td> </td> <td> </td> <td> </td> </tr> </tbody> </table> </div> <p>Al 31 de diciembre de 2018, la compañía cuenta con un total de 1.229 accionistas.</p> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </article> <article class="contenido-single portlet-anidado fondo-negro" id="cont-dividendos"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdividendos_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdividendos"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdividendos_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdividendos_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instdividendos__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_fvjVqCh48Zf7_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_fvjVqCh48Zf7"> <div class="portlet-content"> <h2 class="portlet-title-text">Dividendos</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <p>Según lo señalado en la ley N° 18.046, salvo acuerdo diferente de la unanimidad de los accionistas, cuando exista utilidad deberá destinarse a lo menos el 30% de la misma al reparto de dividendos.</p> <p>En Sesión de Directorio N° 598 de la Compañía celebrada el día 8 de mayo de 2003, se acordó modificar la política de dividendos con vigencia al 1 de enero de 2003, en orden a que la Sociedad distribuirá dividendos por el 43% de las utilidades líquidas que determinen los balances anuales, una vez que se encuentren absorbidas las pérdidas acumuladas.</p> <p>Desde 1991 la Compañía no distribuye dividendos a sus accionistas, dado que ha registrado pérdidas acumuladas en sus balances.</p> <p> </p> <style type="text/css">.nt_table-scroll{position:relative;overflow-x:auto}table.nt_table{border-collapse:collapse;border-spacing:0;width:100%}tr{height:30px}td,th{padding:10px}tr:nth-child(odd){background-color:#eee}</style> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </article> <article class="contenido-single portlet-anidado fondo-negro" id="cont-hechos"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthechos_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthechos"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthechos_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthechos_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthechos__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_3ov7b4obzKwM_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_3ov7b4obzKwM"> <div class="portlet-content"> <h2 class="portlet-title-text">Hechos Esenciales</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <p>Hechos esenciales de nuestra compañía. </p> <ul class="lista-pdf"> <li><a href="/documents/34275/34699/he_271218.pdf/63043daf-1684-47bf-04d1-e5dbc6a0d0c1" target="_blank">Hecho Esencial 27.12.2018</a></li> <li><a href="/documents/34275/34699/he_250418.pdf/2bf76065-ed37-8e5c-200b-69bb0de622c3">Hecho Esencial 25.04.2018</a></li> <li><a href="/documents/34275/34699/he_06042018.pdf/9879f937-dc01-3caf-3124-e2bcd6bcb98d">Hecho Esencial 06.04.2018</a></li> <li><a href="/documents/34275/34699/he_29032018.pdf/c6c62eb5-02f2-fd9b-9bbd-435e5920029f">Hecho Esencial 29.03.2018</a></li> <li><a href="/documents/34275/34699/HE_igemar_170817.pdf/db81f20a-804b-dff0-241d-394c72cea636">Hecho Esencial 17.08.2017</a></li> <li><a href="/documents/34275/34699/HE_igemar_070717.pdf/f041ffdd-23f0-8d58-dec0-8f3b1517c08a" target="_blank">Hecho Esencial 07.07.2017</a></li> <li><a href="/documents/34275/34699/hes_2017060103310.pdf/bd8e8303-fa78-1bc5-b2dd-9d82d3e1812a" target="_blank">Hecho Esencial 13.06.2017</a></li> <li><a href="/documents/34275/34699/H+E+Selecta.pdf/7c3fefe4-a733-c321-4e8c-d5e6000ccd43" target="_blank">Hecho Esencial 12.06.2017</a></li> <li><a href="/documents/34275/34699/Hecho+Esencial+Junta+Igemar7deabril.pdf/d161a9bd-6609-ec8c-3cac-2689e54a46de" target="_blank">Hecho Esencial 07.04.2017</a></li> <li><a href="/documents/34275/34699/Hecho-Esencial-08.03.2017.pdf/7adc5b06-b5b7-0f85-fd47-52406d333aa4" target="_blank" title="Ver documento">Hecho Esencial 08.03.2017</a></li> <li><a href="/documents/34275/34699/180_hecho-esencial-octubre-2014.pdf/b64abc9a-5759-8b77-df03-8185002d839f" target="_blank" title="Ver documento">Hecho Esencial Octubre 2014</a></li> </ul> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </article> <article class="contenido-single portlet-anidado fondo-negro" id="cont-juntas"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instjuntas_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instjuntas"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instjuntas_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instjuntas_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instjuntas__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_7Zm62o4x0rD4_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_7Zm62o4x0rD4"> <div class="portlet-content"> <h2 class="portlet-title-text">Acta Juntas de Accionistas</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <h3>Junta de Accionistas 2019</h3> <ul class="lista-pdf"> <li><a href="/documents/34275/34702/MemoriaAnual2018_Igemar.pdf/13c90655-35f2-3a5c-a8dc-4eb6f462b313" target="_blank">Memoria Anual Pesquera Iquique - Guanaye S.A. 2018</a></li> <li><a href="/documents/34275/34708/EEFF_dic2018.pdf/b4c1b7d4-41ae-0d6b-8935-f705a21a1835">Estados Financieros Pesquera Iquique - Guanaye S.A. 2018</a></li> <li><a href="/documents/34275/34708/candidatos2019_Igemar.pdf/b0b7dce7-2fc0-9920-8e0d-017a7446c672">Listado de candidatos a director</a></li> <li><a href="/documents/34275/34708/Fundamentos_Designacion_Auditores_Igemar.pdf/4f60033a-13ec-24e5-ff9a-3f741217f784">Fundamentos para la designación de auditores externos</a></li> <li><a href="/documents/34275/34708/Citacion_Junta2019_Igemar.pdf/8a126a9b-23bc-d68e-601c-6ae939ae3175">Carta de Citación a Junta de Accionistas Pesquera Iquique - Guanaye S.A. 2019</a></li> <li><a href="/documents/34275/34708/Aviso_Junta2019_Igemar.pdf/2b1fe919-9572-6cf5-5e15-55fc85c19499" target="_blank">Aviso de Citación a Junta de Accionistas Pesquera Iquique - Guanaye S.A. 2019</a></li> <li><a href="/documents/34275/34708/Acta_Junta_Igemar_2019.pdf/f74084fc-0265-c92d-6cd0-c9acd9a8f55f">Acta Junta General Ordinaria de Accionistas 2019</a></li> </ul> <p> </p> <p>En conformidad al artículo 135 del Nuevo Reglamento de Sociedades Anónimas, la sociedad mantendrá durante los 15 días anteriores a la fecha de la Junta, a disposición de sus accionistas en las oficinas principales de sus filiales, todos los libros, actas, memorias, balances, inventarios e informes de auditores de dichas sociedades.<br /> <br /> Los antes referidos documentos no serán publicados en el sitio web de la compañía debido a su volumen, y por la dificultad técnica de implementar sistemas para que esta voluminosa información pueda ser conocida sólo por los accionistas y no por terceros.</p> <p> </p> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </article> <article class="contenido-single portlet-anidado fondo-negro" id="cont-actas"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instactas_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instactas"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instactas_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instactas_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instactas__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_uiAfFW1XfjTw_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_uiAfFW1XfjTw"> <div class="portlet-content"> <h2 class="portlet-title-text">Actas de Juntas Ordinarias y Extraordinarias</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <ul class="lista-pdf"> <li><a href="/documents/34275/34708/ActaJuntaExtraordinaria2018.pdf/402fca9a-724f-5ac2-4218-aff51bd030d2" target="_blank">Junta General Extraordinaria de Accionistas 2018</a></li> <li><a href="/documents/34275/34708/ActaJuntaOrdinaria2018.pdf/145fe6a8-67dd-8bc3-83ad-db296dd1611f" target="">Junta General Ordinaria de Accionistas 2018</a></li> <li><a href="/documents/34275/34708/Acta+Junta+2017+Igemar.pdf/cd44d4c4-b7e4-253b-ab6a-d400b4424943" target="">Junta General Ordinaria de Accionistas 2017</a></li> <li><a href="/documents/34275/34708/206_acta_igemar_2016.pdf/151cf0db-026a-7396-c3bf-da2aeefb98f1" target="_blank" title="Ver documento">Junta General Ordinaria de Accionistas 2016</a></li> <li><a href="/documents/34275/34708/197_acta-junta-igemar.pdf/3c1a510b-5618-689c-e9d2-f9196a0eacbe" target="_blank" title="Ver documento">Junta General Ordinaria de Accionistas 2015</a></li> <li><a href="/documents/34275/34708/197_acta_junta2014.pdf/fc41ee7b-110b-237e-2a63-44dce010b1aa" target="_blank" title="Ver documento">Junta General Ordinaria de Accionistas 2014</a></li> </ul> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </article> </div> </div> <!-- /.row --> </div> <!-- /.container-fluid --> </div> <!-- /#accionistas --> <!-- MEMORIAS ANUALES --> <div class="section fmemorias fp-auto-height img-bg categoria"> <div class="container-fluid altura-minima"> <div class="row"> <!-- español --> <h2 class="col-sm-12 titulo-pagina">Memorias Anuales</h2> <div class="col-sm-12"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instmemorias_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instmemorias"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instmemorias_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instmemorias_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instmemorias__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_nectia_memorias_web_portlet_MemoriasPortlet_ portlet-static portlet-static-end portlet-decorate " id="p_p_id_com_liferay_nectia_memorias_web_portlet_MemoriasPortlet_INSTANCE_9KcJwOTqnQkE_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nectia_memorias_web_portlet_MemoriasPortlet_INSTANCE_9KcJwOTqnQkE"> <div class="portlet-content"> <h2 class="portlet-title-text">Memorias Sercor</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <section class="contenedor-calugas memorias-anuales"> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/MemoriaAnual2018_Igemar.pdf/13c90655-35f2-3a5c-a8dc-4eb6f462b313" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/MemoriaAnual2018_Igemar.pdf/13c90655-35f2-3a5c-a8dc-4eb6f462b313?documentThumbnail=1" alt="Memoria Anual 2018" height="200px"/> </figure> <h4> Memoria Anual <strong>2018</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/memoria_igemar_2017.pdf/4bebaa66-6f29-5a96-3ebd-64ffacd76303" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/memoria_igemar_2017.pdf/4bebaa66-6f29-5a96-3ebd-64ffacd76303?documentThumbnail=1" alt="Memoria Anual 2017" height="200px"/> </figure> <h4> Memoria Anual <strong>2017</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/Igemar_memoria_2016_SVS.pdf/3e39aced-fedf-5062-3715-30b03aef5aca" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/Igemar_memoria_2016_SVS.pdf/3e39aced-fedf-5062-3715-30b03aef5aca?documentThumbnail=1" alt="Memoria Anual 2016" height="200px"/> </figure> <h4> Memoria Anual <strong>2016</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar-2015_web5.pdf/cedff9a0-9999-0481-1797-050885a9b45f" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria_igemar-2015_web5.pdf/cedff9a0-9999-0481-1797-050885a9b45f?documentThumbnail=1" alt="Memoria Anual 2015" height="200px"/> </figure> <h4> Memoria Anual <strong>2015</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria-20igemar-202014_web.pdf/434ee0cc-a3be-4d8f-d337-1caa97ae45bf" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria-20igemar-202014_web.pdf/434ee0cc-a3be-4d8f-d337-1caa97ae45bf?documentThumbnail=1" alt="Memoria Anual 2014" height="200px"/> </figure> <h4> Memoria Anual <strong>2014</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar_2013.pdf/5656d439-347b-2fe6-d6de-91e555d06cab" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34717/memoria_igemar_2013.png/d67c294b-0b36-01af-0f60-424c3a558301?imageThumbnail=1" alt="Memoria Anual 2013" height="200px"/> </figure> <h4> Memoria Anual <strong>2013</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar_2012.pdf/007b9c91-afde-c41b-e921-80c6cfc457d0" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria_igemar_2012.pdf/007b9c91-afde-c41b-e921-80c6cfc457d0?documentThumbnail=1" alt="Memoria Anual 2012" height="200px"/> </figure> <h4> Memoria Anual <strong>2012</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar_2011.pdf/5949e01a-7e59-a442-2331-309007120272" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria_igemar_2011.pdf/5949e01a-7e59-a442-2331-309007120272?documentThumbnail=1" alt="Memoria Anual 2011" height="200px"/> </figure> <h4> Memoria Anual <strong>2011</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar_2010.pdf/60c3ba85-4893-e79f-fa01-752a239e0124" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria_igemar_2010.pdf/60c3ba85-4893-e79f-fa01-752a239e0124?documentThumbnail=1" alt="Memoria Anual 2010" height="200px"/> </figure> <h4> Memoria Anual <strong>2010</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar_2009.pdf/51ff63f9-138e-7f36-c0aa-744f2369070f" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria_igemar_2009.pdf/51ff63f9-138e-7f36-c0aa-744f2369070f?documentThumbnail=1" alt="Memoria Anual 2009" height="200px"/> </figure> <h4> Memoria Anual <strong>2009</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar_2008.pdf/8dc0a611-bd78-da92-411d-a29552d33f64" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria_igemar_2008.pdf/8dc0a611-bd78-da92-411d-a29552d33f64?documentThumbnail=1" alt="Memoria Anual 2008" height="200px"/> </figure> <h4> Memoria Anual <strong>2008</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar_2007.pdf/11c4c3c9-daf6-ca34-4adc-ebfd3cdc79e0" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria_igemar_2007.pdf/11c4c3c9-daf6-ca34-4adc-ebfd3cdc79e0?documentThumbnail=1" alt="Memoria Anual 2007" height="200px"/> </figure> <h4> Memoria Anual <strong>2007</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar_2006.pdf/1c36ee28-9739-2831-2461-60c9ea2e9bda" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria_igemar_2006.pdf/1c36ee28-9739-2831-2461-60c9ea2e9bda?documentThumbnail=1" alt="Memoria Anual 2006" height="200px"/> </figure> <h4> Memoria Anual <strong>2006</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar_2005.pdf/d493b7a3-7f16-a5f8-cb47-e5b97c08d606" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria_igemar_2005.pdf/d493b7a3-7f16-a5f8-cb47-e5b97c08d606?documentThumbnail=1" alt="Memoria Anual 2005" height="200px"/> </figure> <h4> Memoria Anual <strong>2005</strong> </h4> </div> </a> </article> <article class="col-xs-6 col-sm-2 col-md-2 col-lg-2"> <a href="/documents/34275/34702/178_memoria_igemar_2004.pdf/77fc6db8-3785-bff6-521b-195f78cffc34" target="_blank" title="Ver Memoria"> <div class="inner"> <figure> <img src="/documents/34275/34702/178_memoria_igemar_2004.pdf/77fc6db8-3785-bff6-521b-195f78cffc34?documentThumbnail=1" alt="Memoria Anual 2004" height="200px"/> </figure> <h4> Memoria Anual <strong>2004</strong> </h4> </div> </a> </article> </section> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </div> <!-- /.contenedor-calugas --> </div> <!-- /.row --> </div> <!-- /.container-fluid --> </div> <!-- / id memorias-anuales --> <!-- CONTACTO --> <div class="section fcontacto fp-auto-height img-bg categoria"> <!-- MAIN CONTENT --> <section class="main-content"> <h6 class="sr-only">Contacto</h6> <div class="container-fluid mb-300"> <div class="row"> <!-- español --> <h2 class="col-sm-12 titulo-pagina">Contacto</h2> <div class="col-sm-12"> <section class="contenedor-calugas contacto"> <div class="row"> <!-- Formulario de Contacto --> <div class="col-xs-12 col-sm-4 mb-mobile"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instcontactos_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instcontactos"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instcontactos_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instcontactos_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instcontactos__column-1"> <div class="portlet-boundary portlet-boundary_contactos_portlet_ContactosPortlet_ portlet-static portlet-static-end portlet-decorate " id="p_p_id_contactos_portlet_ContactosPortlet_INSTANCE_3cyVGEANrBy8_" > <!DOCTYPE html> <section class="portlet" id="portlet_contactos_portlet_ContactosPortlet_INSTANCE_3cyVGEANrBy8"> <div class="portlet-content"> <h2 class="portlet-title-text">Contactos Portlet</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <script>var onloadCallback=function(){grecaptcha.render("html_element",{sitekey:"6LfFLhkUAAAAADASrlLeP9FqgJmO9gaXFjUVOX0A"})},cleanForm=function(){$("#nombre").val("");$("#apellido").val("");$("#empresa").val("");$("#cargo").val("");$("#telefono").val("");$("#email").val("");$("#mensaje").val("");grecaptcha.reset()},ejecutar=function(d){var a=$("#language").val();if(""==grecaptcha.getResponse())return"es_ES"==a?alert("Por favor seleccione el Captcha!"):alert("Please selected the Captcha!"),!1;jQuery.ajax({type:"POST",
2949_contactos_portlet_ContactosPortlet_INSTANCE_3cyVGEANrBy8_language:$("#language").val()}}).success(function(b){var c=JSON.parse(b);b.error?"es_ES"==a?alert("Se produjo un error en el env\u00edo del correo, por favor intente nuevamente"):alert("There was an error sending the mail, please try again"):(console.log(c),"es_ES"==a?alert("Mensaje enviado, recibir\u00e1s un mensaje de confirmaci\u00f3n en tu correo! "):alert("Message sent, you will receive a confirmation message in your email!"),cleanForm())})};</script> <form action="https://www.igemar.cl/principal?p_p_id=contactos_portlet_ContactosPortlet_INSTANCE_3cyVGEANrBy8&p_p_lifecycle=1&p_p_state=normal&p_p_mode=view&p_p_col_id=_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instcontactos__column-1&p_p_col_count=1&_contactos_portlet_ContactosPortlet_INSTANCE_3cyVGEANrBy8_javax.portlet.action=send&p_auth=YROXOyRV" method="POST" id="form" onSubmit="event.preventDefault(); ejecutar();"> <input class="form-control" type="hidden" required id="language" name="language" value="es_ES" style="visible:false;"/> <div class="form-group"> <div class="col-sm-12"> <label for="nombre"></label> <input class="form-control" type="text" required id="nombre" placeholder="Nombre" name="nombre" value="" /> </div> </div> <div class="form-group"> <div class="col-sm-12"> <label for="apellido"></label> <input class="form-control" type="text" required id="apellido" placeholder="Apellido" name="apellido" value="" /> </div> </div> <div class="form-group"> <div class="col-sm-12"> <label for="empresa"></label> <input class="form-control" id="empresa" type="text" placeholder="Empresa" name="empresa" value="" /> </div> </div> <div class="form-group"> <div class="col-sm-12"> <label for="cargo"></label> <input class="form-control" id="cargo" type="text" placeholder="Cargo" name="cargo" value="" /> </div> </div> <div class="form-group"> <div class="col-sm-12"> <label for="telefono"></label> <input class="form-control" id="telefono" type="text" required placeholder="Teléfono" name="telefono" value="" /> </div> </div> <div class="form-group"> <div class="col-sm-12"> <label for="email"></label> <input class="form-control" id="email" type="email" required placeholder="E-mail" name="email" value="" /> </div> </div> <div class="form-group"> <div class="col-sm-12"> <label for="mensaje"></label> <textarea class="form-control" id="mensaje" rows="3" required placeholder="Mensaje" name="mensaje" ></textarea> </div> </div> <div class="form-group"> <div class="col-sm-12"> <label for="html_element"></label> <div id="html_element" required></div> </div> </div> <div class="form-group"> <div class="col-sm-12"> <div class="button-holder " > <button class="btn btn-primary btn-default" id="_contactos_portlet_ContactosPortlet_INSTANCE_3cyVGEANrBy8_gbpx" type="submit" > <span class="lfr-btn-label">Enviar</span> </button> </div> </div> </div> </form> <script src='https://www.google.com/recaptcha/api.js?onload=onloadCallback&render=explicit'></script> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </div> <!-- Datos + Mapa de Google --> <div class="col-xs-12 col-sm-4 mb-mobile"> <div class="row"> <!-- Datos --> <div class="col-sm-12 direccion"> <div class="portlet-boundary portlet-boundary_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_ portlet-static portlet-static-end portlet-decorate portlet-nested-portlets " id="p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instinfocontactos_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instinfocontactos"> <div class="portlet-content"> <h2 class="portlet-title-text">Portlets anidados</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="s" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instinfocontactos_main-content" role="main"> <div class="portlet-layout row"> <div class="col-md-12 portlet-column portlet-column-only" id="_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instinfocontactos_column-1"> <div class="portlet-dropzone portlet-column-content portlet-column-content-only" id="layout-column__com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instinfocontactos__column-1"> <div class="portlet-boundary portlet-boundary_com_liferay_journal_content_web_portlet_JournalContentPortlet_ portlet-static portlet-static-end portlet-decorate portlet-journal-content " id="p_p_id_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_EwAL4lf21hdc_" > <!DOCTYPE html> <section class="portlet" id="portlet_com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_EwAL4lf21hdc"> <div class="portlet-content"> <h2 class="portlet-title-text">Información de contacto</h2> <div class=" portlet-content-container" > <div class="portlet-body"> <div class="text-right user-tool-asset-addon-entries"> </div> <div class="journal-content-article"> <h4>Pesquera Iquique-Guanaye S.A.</h4> <p>Av. El Golf 150 piso 17</p> <p>Las Condes, Santiago, Chile.</p> <p>Tel. (56-2) 2461 7021 - Fax. (56-2) 2461 7070</p> <p>Casilla 3781 Santiago</p> <hr /> <h5>Contacto Inversionista</h5> <p><strong>Eduardo Navarro Beltrán</strong><br /> <br /> E-mail: <img alt="texto e-mail contacto" src="/documents/34275/34711/txt-mail-contacto-igemar.png/0d533649-aeb5-96c2-9180-226e52ba2a1c?t=1488898016544" style="vertical-align: bottom;" /> Fono: (56-2) 2461 7021</p> </div> <div class="content-metadata-asset-addon-entries"> </div> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </div> <!-- /.direccion --> </div> </div> <!-- Mapa de Google --> <div class="col-xs-12 col-sm-4 mb-mobile mapa-g"> <iframe src="https://www.google.com/maps/embed?key=AIzaSyCAAN8L7pmMgSZQZ-HMPuIBH9xmnDcxpWQ&pb=!1m18!1m12!1m3!1d3330.3500716383255!2d-70.59469008435245!3d-33.414116480784415!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x9662cf3e0fa7a67f%3A0x300d0c7f976e2ec8!2sEl+Golf+150%2C+Las+Condes%2C+Regi%C3%B3n+Metropolitana!5e0!3m2!1sen!2scl!4v1486074188631" width="100%" frameborder="0" style="border:0" allowfullscreen></iframe> </div> </div> <!-- /.row --> </section> </div> <!-- /.contenedor-calugas --> </div> </div> <!-- /.container-fluid --> <!-- FOOTER lista enlaces --> <div class="footer-site"> <div class="container-fluid"> <ul class="row"> <li class="col-xs-12 col-sm-2 ajuste-ancho"> <ul> <!-- español --> <li class="titulo-categoria"><a title="Ir a enlace" href="#destacados">Destacados</a></li> <li><a title="Ir a enlace" href="#negocios" opcion="empresas">Inversiones Principales</a></li> <li><a title="Ir a enlace" href="#memorias">Memoria Anual </a></li> <li><a title="Ir a enlace" href="http://www.sercor.cl" target="_blank">Servicio a Accionistas</a></li> <li><a title="Ir a enlace" href="#accionistas" opcion="juntas">Junta Anual de Accionistas</a></li> </ul> </li> <li class="col-xs-12 col-sm-2 ajuste-ancho"> <ul> <!-- español --> <li class="titulo-categoria"><a title="Ir a enlace" href="#quienessomos" opcion="empresa">Quiénes Somos</a></li> <li><a title="Ir a enlace" href="#quienessomos" opcion="empresa">La Empresa</a></li> <li><a title="Ir a enlace" href="#quienessomos" opcion="antecedentes">Antecedentes de la Sociedad</a></li> <li><a title="Ir a enlace" href="#quienessomos" opcion="hitos">Hitos</a></li> </ul> </li> <li class="col-xs-12 col-sm-2 ajuste-ancho"> <ul> <!-- español --> <li class="titulo-categoria"><a title="Ir a enlace" href="#negocios" opcion="empresas">Negocios</a></li> <li><a title="Ir a enlace" href="#negocios" opcion="empresas">Empresas Afiliadas y Asociadas</a></li> </ul> </li> <li class="col-xs-12 col-sm-2 ajuste-ancho"> <ul> <!-- español --> <li class="titulo-categoria"><a title="Ir a enlace" href="#gobierno" opcion="directorio">Gobierno Corporativo</a></li> <li><a title="Ir a enlace" href="#gobierno" opcion="directorio">Directorio</a></li> <li><a title="Ir a enlace" href="#gobierno" opcion="administracion">Administración y/o Ejecutivos Principales</a></li> <li><a title="Ir a enlace" href="#gobierno" opcion="modelos">Modelos y Prácticas de Gobierno Corporativo</a></li> <li><a title="Ir a enlace" href="https://www.canaldedenuncia.cl/cda/sercor/cdpages/inicio.aspx" target="_blank">Canal de Denuncias</a></li> </ul> </li> <li class="col-xs-12 col-sm-2 ajuste-ancho"> <ul> <!-- español --> <li class="titulo-categoria"><a title="Ir a enlace" href="#inversionistas" opcion="estados">Inversionistas</a></li> <li><a title="Ir a enlace" href="#memorias">Memorias Anuales</a></li> <li><a title="Ir a enlace" href="#inversionistas" opcion="estados">Estados Financieros</a></li> <li><a title="Ir a enlace" href="#inversionistas" opcion="informacion">Información Bursátil</a></li> <li><a title="Ir a enlace" href="#contactos">IR</a></li> </ul> </li> <li class="col-xs-12 col-sm-2 ajuste-ancho"> <ul> <!-- español --> <li class="titulo-categoria"><a title="Ir a enlace" href="#accionistas" opcion="juntas">Accionistas</a></li> <li><a title="Ir a enlace" href="#accionistas" opcion="juntas">Juntas Anual de Accionistas</a></li> <li><a title="Ir a enlace" href="http://www.sercor.cl" target="_blank">Servicio a Accionistas</a></li> <li><a title="Ir a enlace" href="#accionistas" opcion="propiedad">Propiedad</a></li> <li><a title="Ir a enlace" href="#accionistas" opcion="dividendos">Dividendos</a></li> <li><a title="Ir a enlace" href="#accionistas" opcion="hechos">Hechos Esenciales</a></li> <li><a title="Ir a enlace" href="#accionistas" opcion="actas">Actas de Juntas</a></li> </ul> </li> <li class="col-xs-12 col-sm-12 footer-nav"> <hr /> <div class="row"> <ul class="col-xs-12 col-sm-12 pull-right"> <div class="pull-right"> <!-- español --> <li><a href="https://www.canaldedenuncia.cl/cda/sercor/cdpages/inicio.aspx" target="_blank" title="Ir a enlace">Canal de Denuncias</a></li> <li><a href="#" data-toggle="modal" data-target="#modalCondicionesdeUsos" title="Ir a enlace">Condiciones de Uso</a></li> <li><a href="#" data-toggle="modal" data-target="#modalAvisoLegal" title="Ir a enlace">Aviso Legal de Privacidad</a></li> </div> </ul> </div> <!-- /.row --> </li> </ul> <!-- /.row --> </div> <!-- /.container-fluid --> </div> <!-- /.footer-site --> </section> </div> <!-- / #contacto --> </div> <!-- / #fullpage --> <!-- Modal :: "Condiciones de Uso" --> <div class="modal fade" id="modalCondicionesdeUsos" tabindex="-1" style="display: none;" role="dialog" aria-labelledby="modalCondicionesdeUsosLabel"> <div class="modal-dialog" role="document"> <div class="modal-content"> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> <!-- español --> <h4 class="modal-title" id="modalCondicionesdeUsosLabel">Condiciones de Uso</h4> </div> <div class="modal-body"> <!-- español --> <strong class="enunciado">Principios Generales - Responsabilidad del Usuario</strong> <p>El usuario se obliga a utilizar los servicios y contenidos que le proporciona el PORTAL conforme a la legislación vigente y a los principios de buena fe y usos generalmente aceptados y a no contravenir con su actuación a través de la Web la moral, el orden público o la seguridad nacional. Por tanto, queda prohibido todo uso con fines ilícitos o que perjudiquen o impidan, puedan dañar y/o sobrecargar, de cualquier forma, la utilización y normal funcionamiento del Sitio directa o indirectamente atenten contra el mismo o contra cualquier tercero.</p> <p>El usuario no transmitirá a través del servicio ningún concepto que atente contra los valores y la dignidad de las personas, de acuerdo con las normas nacionales e internacionales de protección a los derechos de las personas.</p> <p>Asimismo, quedan prohibidas la reproducción, distribución, transmisión, adaptación o modificación, por cualquier medio y en cualquier forma, de los contenidos de la Web del Sitio de Pesquera Iquique-Guanaye S.A. (textos, diseños, gráficos, informaciones, bases de datos, archivos de sonido y/o imagen, logos,…) y demás elementos de este sitio, salvo autorización previa de sus legítimos titulares o cuando así resulte permitido por la ley.</p> <p>Se prohíben asimismo, respecto de los contenidos antes detallados, cualquier utilización comercial o publicitaria, distinta de la estrictamente permitida, en su caso, y la vulneración, en general, de cualquier derecho derivado de los mismos.</p> </div> </div> </div> </div> <!-- Modal :: "Aviso Legal de Privacidad" --> <div class="modal fade" id="modalAvisoLegal" tabindex="-1" role="dialog" style="display: none;" aria-labelledby="modalAvisoLegalLabel"> <div class="modal-dialog" role="document"> <div class="modal-content"> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> <!-- español --> <h4 class="modal-title" id="modalAvisoLegalLabel">Aviso Legal de Privacidad</h4> </div> <div class="modal-body"> <!-- español --> <p>Empresa Pesquera Iquique-Guanaye S.A. pone a disposición de los usuarios de Internet su sitio web <a href="www.igemar.cl">www.igemar.cl</a> en forma gratuita.</p> <p>El acceso a y/o uso del sitio es totalmente voluntario y atribuye a quien lo realiza la condición de USUARIO. Todo USUARIO acepta, desde el mismo momento en el que accede, sin ningún tipo de reserva, el contenido de las presentes "CONDICIONES GENERALES" así como, en su caso, las "Condiciones Particulares" que puedan complementarlas, sustituirlas o modificarlas en algún sentido en relación con los contenidos del Sitio. En consecuencia, el USUARIO deberá leer detenidamente unas y otras antes del acceso y de utilización de cualquier servicio del Sitio bajo su entera responsabilidad.</p> <strong class="enunciado">Objeto y Modificación de condiciones</strong> <p>Empresa Pesquera Iquique-Guanaye S.A. pone a disposición de los USUARIOS la posibilidad de navegar, accediendo a los contenidos del sitio, siempre que lo hagan de acuerdo con lo previsto en las presentes CONDICIONES DE USO.</p> <p>En cualquier caso, Empresa Pesquera Iquique-Guanaye S.A. se reserva el derecho de, en cualquier momento y sin necesidad de previo aviso, modificar o eliminar el contenido, la estructura, el diseño, los servicios y las condiciones de acceso y/o uso de este sitio, cada vez que lo estime oportuno.</p> </div> </div> </div> </div> <!-- FIN DEL CONTENIDO --> <script type="text/javascript">Liferay.BrowserSelectors.run();</script> <script type="text/javascript">Liferay.currentURL="/";Liferay.currentURLEncoded="%2F";</script> <script type="text/javascript"></script> <script type="text/javascript">Liferay.Portlet.onLoad({canEditTitle:!1,columnPos:0,isStatic:"end",namespacedId:"p_p_id_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthitos_",portletId:"com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthitos",refreshURL:"/c/portal/render_portlet?p_l_id\x3d34686\x26p_p_id\x3dcom_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_insthitos\x26p_p_lifecycle\x3d0\x26p_t_lifecycle\x3d0\x26p_p_state\x3dnormal\x26p_p_mode\x3dview\x26p_p_col_id\x3dnull\x26p_p_col_pos\x3dnull\x26p_p_col_count\x3dnull\x26p_p_static\x3d1\x26p_p_isolated\x3d1\x26currentURL\x3d%2F"});
2950Liferay.provide(Liferay.Portlet,"loadCSSEditor",function(a,b,c,d){Liferay.PortletCSS.init(a,b,c,d)},["liferay-look-and-feel"]);</script> <script type="text/javascript">AUI().use("aui-base",function(a){(a=window.frameElement)&&"simulationDeviceIframe"===a.getAttribute("id")&&AUI().one("body").addClass("lfr-has-simulation-panel")});</script> <!-- inject:js --> <script>define._amd=define.amd;define.amd=!1;</script> <!-- Recaptcha de Google --> <!-- <script src='https://www.google.com/recaptcha/api.js'></script>--> <!-- Scrolloverflow --> <script type="text/javascript" src="https://www.igemar.cl/o/igemar-theme-v-4-theme/js/scrolloverflow.min.js"></script> <!-- Plugin fullPAge --> <script type="text/javascript" src="https://www.igemar.cl/o/igemar-theme-v-4-theme/js/jquery.fullPage.min.js"></script> <!-- Bootstrap --> <!--<script type="text/javascript" src="https://www.igemar.cl/o/igemar-theme-v-4-theme/js/bootstrap.min.js"></script>--> <script>define.amd=define._amd;</script> <script type="text/javascript" src="https://www.igemar.cl/o/igemar-theme-v-4-theme/js/analitycs.js"></script> <script>(function(f,a,g,h,d,e,b){f.GoogleAnalyticsObject=d;f[d]=f[d]||function(){(f[d].q=f[d].q||[]).push(arguments)};f[d].l=1*new Date;e=a.createElement(g);b=a.getElementsByTagName(g)[0];e.async=1;e.src=h;b.parentNode.insertBefore(e,b)})(window,document,"script","https://www.google-analytics.com/analytics.js","ga");ga("create","UA-96260257-3","auto");ga("send","pageview");
2951b?(a("empresa"),a("empresas"),a("directorio"),a("juntas")):"#accionistas"==b&&(a("empresa"),a("empresas"),a("directorio"),a("estados")),"undefined"!=c&&($("#link-"+c).addClass("active"),$("#cont-"+c).show(),"hitos"==c&&$("#cont-hitos-timeline").show()),$.fn.fullpage.reBuild())))})});</script> <!-- endinject --> <!-- JQuery --> </body> </html>
2952#####################################################################################################################################
2953https://fonts.googleapis.com/css?family=Lato:300,400,400i,700,900
2954https://www.igemar.cl/principal?p_p_id\x3dcontactos_portlet_ContactosPortlet_INSTANCE_3cyVGEANrBy8\x26p_p_lifecycle\x3d2\x26p_p_state\x3dnormal\x26p_p_mode\x3dview\x26p_p_resource_id\x3denviarCorreo\x26p_p_cacheability\x3dcacheLevelPage\x26p_p_col_id\x3d_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instcontactos__column-1\x26p_p_col_count\x3d1
2955/o/igemar-theme-v-4-theme
2956######################################################################################################################################
2957https://www.igemar.cl [200 OK] Apache, Cookies[COOKIE_SUPPORT,GUEST_LANGUAGE_ID,JSESSIONID], Country[UNITED STATES][US], Frame, HTML5, HTTPServer[Apache-Coyote/1.1], HttpOnly[COOKIE_SUPPORT,GUEST_LANGUAGE_ID,JSESSIONID], IP[52.52.234.222], JQuery, Java, Liferay, Meta-Author[Igemar], Script[text/javascript], Title[Principal - Igemar], UncommonHeaders[x-content-type-options,liferay-portal], X-Frame-Options[SAMEORIGIN], X-XSS-Protection[1]
2958#####################################################################################################################################
2959Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-05 23:42 EST
2960NSE: Loaded 161 scripts for scanning.
2961NSE: Script Pre-scanning.
2962Initiating NSE at 23:42
2963Completed NSE at 23:42, 0.00s elapsed
2964Initiating NSE at 23:42
2965Completed NSE at 23:42, 0.00s elapsed
2966Initiating Parallel DNS resolution of 1 host. at 23:42
2967Completed Parallel DNS resolution of 1 host. at 23:42, 0.04s elapsed
2968Initiating SYN Stealth Scan at 23:42
2969Scanning www.igemar.cl (52.52.234.222) [1 port]
2970Discovered open port 443/tcp on 52.52.234.222
2971Completed SYN Stealth Scan at 23:42, 0.32s elapsed (1 total ports)
2972Initiating Service scan at 23:42
2973Scanning 1 service on www.igemar.cl (52.52.234.222)
2974Completed Service scan at 23:42, 14.31s elapsed (1 service on 1 host)
2975Initiating OS detection (try #1) against www.igemar.cl (52.52.234.222)
2976Retrying OS detection (try #2) against www.igemar.cl (52.52.234.222)
2977Initiating Traceroute at 23:42
2978Completed Traceroute at 23:42, 3.81s elapsed
2979Initiating Parallel DNS resolution of 11 hosts. at 23:42
2980Completed Parallel DNS resolution of 11 hosts. at 23:42, 0.34s elapsed
2981NSE: Script scanning 52.52.234.222.
2982Initiating NSE at 23:42
2983Completed NSE at 23:44, 90.58s elapsed
2984Initiating NSE at 23:44
2985Completed NSE at 23:44, 3.63s elapsed
2986Nmap scan report for www.igemar.cl (52.52.234.222)
2987Host is up (0.35s latency).
2988rDNS record for 52.52.234.222: ec2-52-52-234-222.us-west-1.compute.amazonaws.com
2989
2990PORT STATE SERVICE VERSION
2991443/tcp open ssl/ssl Apache httpd (SSL-only mode)
2992| http-brute:
2993|_ Path "/" does not require authentication
2994|_http-chrono: Request times for /; avg: 4412.87ms; min: 2847.60ms; max: 5677.81ms
2995| http-csrf:
2996| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=www.igemar.cl
2997| Found the following possible CSRF vulnerabilities:
2998|
2999| Path: https://www.igemar.cl:443/
3000| Form id: form
3001|_ Form action: https://www.igemar.cl/principal?p_p_id=contactos_portlet_ContactosPortlet_INSTANCE_3cyVGEANrBy8&p_p_lifecycle=1&p_p_state=normal&p_p_mode=view&p_p_col_id=_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instcontactos__column-1&p_p_col_count=1&_contactos_portlet_ContactosPortlet_INSTANCE_3cyVGEANrBy8_javax.portlet.action=send&p_auth=at942i0A
3002|_http-date: Fri, 06 Mar 2020 04:42:51 GMT; -11s from local time.
3003| http-default-accounts:
3004| [Arris 2307] at /logo_t.gif
3005|_ <blank>:<blank>
3006|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
3007|_http-dombased-xss: Couldn't find any DOM based XSS.
3008|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
3009| http-errors:
3010| Spidering limited to: maxpagecount=40; withinhost=www.igemar.cl
3011| Found the following error pages:
3012|
3013| Error Code: 403
3014| https://www.igemar.cl:443/documents/34275/34705/179_estados_financieros_-pdf-91123000_201503.pdf/9400a47f-d767-b036-3e77-209138525624
3015|
3016| Error Code: 403
3017| https://www.igemar.cl:443/documents/34275/34705/179_hechos_relevantes_junio_2014.pdf/af19aa56-6ac0-2ba1-c575-c4025defd163
3018|
3019| Error Code: 403
3020| https://www.igemar.cl:443/documents/34275/183706/EEFF_dic2018.pdf/0a8f229d-297a-04db-4b0a-f9606116f292
3021|
3022| Error Code: 403
3023| https://www.igemar.cl:443/documents/34275/242536/HR_201903.pdf/fdd1d57b-923e-edf6-6824-167f32acc23d
3024|
3025| Error Code: 403
3026| https://www.igemar.cl:443/documents/34275/34720/An%c3%a1lisis_Razonado91123000_201709.pdf/5df24712-f409-ce76-4994-21424823e940
3027|
3028| Error Code: 403
3029| https://www.igemar.cl:443/documents/34275/34702/178_memoria-20igemar-202014_web.pdf/434ee0cc-a3be-4d8f-d337-1caa97ae45bf?documentThumbnail=1
3030|
3031| Error Code: 403
3032| https://www.igemar.cl:443/c/portal/update_language?p_l_id=34686&languageId=es_ES
3033|
3034| Error Code: 403
3035| https://www.igemar.cl:443/documents/34275/34696/politica_libre_comp_igemar2017.pdf/24d0d534-515b-bd3a-6426-66ddc4fa0dab
3036|
3037| Error Code: 403
3038| https://www.igemar.cl:443/o/igemar-theme-v-4-theme/js/analitycs.js
3039|
3040| Error Code: 403
3041| https://www.igemar.cl:443/documents/34275/34705/179_declaraci-c3-b3n_de_responsabilidad91123000_201403.pdf/7cf24895-138d-0b72-5406-85dadc3c030e
3042|
3043| Error Code: 403
3044| https://www.igemar.cl:443/documents/34275/34699/HE_igemar_170817.pdf/db81f20a-804b-dff0-241d-394c72cea636
3045|
3046| Error Code: 403
3047| https://www.igemar.cl:443/documents/34275/183706/Declaraci%c3%b3n_de_responsabilidad91123000_201806.pdf/a44dabe7-3d36-e476-9644-4c7980528e5b
3048|
3049| Error Code: 403
3050| https://www.igemar.cl:443/documents/34275/183706/HR_91123000_201803.pdf/262adf2e-eb46-d04f-d6b0-1c3cb476f1d7
3051|
3052| Error Code: 403
3053| https://www.igemar.cl:443/documents/34275/34705/179_hechos_relevantes91123000_201306.pdf/5b7df00d-0b37-4ba4-0021-3a34b88313dc
3054|
3055| Error Code: 403
3056| https://www.igemar.cl:443/o/dynamic-data-mapping-form-renderer/css/main.css
3057|
3058| Error Code: 403
3059| https://www.igemar.cl:443/documents/34275/34705/179_xa1lisis_razonado91123000_201503.pdf/e1fbc168-07ed-08c1-ca69-a27d9ec23314
3060|
3061| Error Code: 403
3062| https://www.igemar.cl:443/documents/34275/34699/he_06042018.pdf/9879f937-dc01-3caf-3124-e2bcd6bcb98d
3063|
3064| Error Code: 403
3065| https://www.igemar.cl:443/documents/34275/34705/179_hechos_relevantes91123000_201609.pdf/07c53b95-591a-77ca-fefc-d995bdfba1f3
3066|
3067| Error Code: 403
3068| https://www.igemar.cl:443/documents/34275/34705/179_declaracion_de_responsabilidad_junio_2014.pdf/e451ce99-a95e-dd0e-8cd2-12b4b5f8f715
3069|
3070| Error Code: 403
3071| https://www.igemar.cl:443/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201412.pdf/4727ab6b-16df-b7c4-bace-1d7c10331a33
3072|
3073| Error Code: 404
3074|_ https://www.igemar.cl:443/
3075|_http-fetch: Please enter the complete path of the directory to save data in.
3076| http-headers:
3077| Date: Fri, 06 Mar 2020 04:43:32 GMT
3078| Server: Apache-Coyote/1.1
3079| X-Content-Type-Options: nosniff
3080| X-Frame-Options: SAMEORIGIN
3081| X-XSS-Protection: 1
3082| Liferay-Portal: Liferay Community Edition Portal 7.0.2 GA3 (Wilberforce / Build 7002 / August 5, 2016)
3083| Content-Type: text/html;charset=UTF-8
3084| Content-Length: 230799
3085| Set-Cookie: JSESSIONID=D1D64BA6DDE121B9AD5183A142DAF0AE; Path=/; Secure; HttpOnly
3086| Set-Cookie: COOKIE_SUPPORT=true; Expires=Sat, 06-Mar-2021 04:43:32 GMT; Path=/; Secure; HttpOnly
3087| Set-Cookie: GUEST_LANGUAGE_ID=es_ES; Domain=.igemar.cl; Expires=Sat, 06-Mar-2021 04:43:32 GMT; Path=/; Secure; HttpOnly
3088| Connection: close
3089|
3090|_ (Request type: GET)
3091|_http-jsonp-detection: Couldn't find any JSONP endpoints.
3092| http-methods:
3093| Supported Methods: GET HEAD POST TRACE OPTIONS
3094|_ Potentially risky methods: TRACE
3095|_http-mobileversion-checker: No mobile version detected.
3096| http-security-headers:
3097| Strict_Transport_Security:
3098|_ HSTS not configured in HTTPS Server
3099|_http-server-header: Apache/2.2.34 (Amazon)
3100| http-sitemap-generator:
3101| Directory structure:
3102| Longest directory structure:
3103| Depth: 0
3104| Dir: /
3105| Total files found (by extension):
3106|_
3107|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
3108|_http-title: Estado - Igemar
3109|_http-userdir-enum: Potential Users: root, admin, administrator, webadmin, sysadmin, netadmin, guest, user, web, test
3110| http-vhosts:
3111| www.igemar.cl : 404
3112|_126 names had status 400
3113|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
3114|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
3115|_http-xssed: No previously reported XSS vuln.
3116Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
3117Device type: general purpose|PBX
3118Running (JUST GUESSING): Linux 3.X (88%), Vodavi embedded (87%)
3119OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/h:vodavi:xts-ip
3120Aggressive OS guesses: Linux 3.10 - 3.13 (88%), Vodavi XTS-IP PBX (87%)
3121No exact OS matches for host (test conditions non-ideal).
3122Uptime guess: 27.747 days (since Fri Feb 7 05:48:29 2020)
3123Network Distance: 17 hops
3124TCP Sequence Prediction: Difficulty=258 (Good luck!)
3125IP ID Sequence Generation: All zeros
3126
3127TRACEROUTE (using port 443/tcp)
3128HOP RTT ADDRESS
31291 571.38 ms 10.202.9.1
31302 683.12 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
31313 683.18 ms 5.56.20.161
31324 683.21 ms ae12-2022.fra10.core-backbone.com (81.95.15.57)
31335 683.24 ms ae26.cr10-fra2.ip4.gtt.net (87.119.97.189)
31346 795.26 ms et-0-0-35.cr5-sjc1.ip4.gtt.net (89.149.180.86)
31357 795.23 ms a100-us-gw.ip4.gtt.net (173.241.129.142)
31368 795.32 ms 54.240.242.68
31379 795.31 ms 54.240.242.107
313810 795.39 ms 52.93.47.88
313911 ... 16
314017 389.05 ms ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
3141
3142NSE: Script Post-scanning.
3143Initiating NSE at 23:44
3144Completed NSE at 23:44, 0.00s elapsed
3145Initiating NSE at 23:44
3146Completed NSE at 23:44, 0.00s elapsed
3147#####################################################################################################################################
3148===============================================================
3149Gobuster v3.0.1
3150by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)
3151===============================================================
3152[+] Url: https://www.igemar.cl
3153[+] Threads: 10
3154[+] Wordlist: /usr/share/sniper/wordlists/vhosts.txt
3155[+] User Agent: gobuster/3.0.1
3156[+] Timeout: 10s
3157===============================================================
31582020/03/05 23:44:20 Starting gobuster
3159===============================================================
3160Found: ads.www.igemar.cl (Status: 400) [Size: 310]
3161Found: adserver.www.igemar.cl (Status: 400) [Size: 315]
3162Found: ap.www.igemar.cl (Status: 400) [Size: 309]
3163Found: apache.www.igemar.cl (Status: 400) [Size: 313]
3164Found: alpha.www.igemar.cl (Status: 400) [Size: 312]
3165Found: alerts.www.igemar.cl (Status: 400) [Size: 313]
3166Found: 127.0.0.1.www.igemar.cl (Status: 400) [Size: 316]
3167Found: api.www.igemar.cl (Status: 400) [Size: 310]
3168Found: administration.www.igemar.cl (Status: 400) [Size: 321]
3169Found: admin.www.igemar.cl (Status: 400) [Size: 312]
3170Found: backup.www.igemar.cl (Status: 400) [Size: 313]
3171Found: aptest.www.igemar.cl (Status: 400) [Size: 313]
3172Found: beta.www.igemar.cl (Status: 400) [Size: 311]
3173Found: blog.www.igemar.cl (Status: 400) [Size: 311]
3174Found: auth.www.igemar.cl (Status: 400) [Size: 311]
3175Found: cdn.www.igemar.cl (Status: 400) [Size: 310]
3176Found: apps.www.igemar.cl (Status: 400) [Size: 311]
3177Found: app.www.igemar.cl (Status: 400) [Size: 310]
3178Found: appserver.www.igemar.cl (Status: 400) [Size: 316]
3179Found: chat.www.igemar.cl (Status: 400) [Size: 311]
3180Found: dev.www.igemar.cl (Status: 400) [Size: 310]
3181Found: cms.www.igemar.cl (Status: 400) [Size: 310]
3182Found: db.www.igemar.cl (Status: 400) [Size: 309]
3183Found: citrix.www.igemar.cl (Status: 400) [Size: 313]
3184Found: crs.www.igemar.cl (Status: 400) [Size: 310]
3185Found: dashboard.www.igemar.cl (Status: 400) [Size: 316]
3186Found: database.www.igemar.cl (Status: 400) [Size: 315]
3187Found: demo.www.igemar.cl (Status: 400) [Size: 311]
3188Found: corp.www.igemar.cl (Status: 400) [Size: 311]
3189Found: cvs.www.igemar.cl (Status: 400) [Size: 310]
3190Found: dhcp.www.igemar.cl (Status: 400) [Size: 311]
3191Found: devsql.www.igemar.cl (Status: 400) [Size: 313]
3192Found: direct.www.igemar.cl (Status: 400) [Size: 313]
3193Found: development.www.igemar.cl (Status: 400) [Size: 318]
3194Found: dmz.www.igemar.cl (Status: 400) [Size: 310]
3195Found: devtest.www.igemar.cl (Status: 400) [Size: 314]
3196Found: devel.www.igemar.cl (Status: 400) [Size: 312]
3197Found: dns1.www.igemar.cl (Status: 400) [Size: 311]
3198Found: dns0.www.igemar.cl (Status: 400) [Size: 311]
3199Found: dns.www.igemar.cl (Status: 400) [Size: 310]
3200Found: eshop.www.igemar.cl (Status: 400) [Size: 312]
3201Found: dns2.www.igemar.cl (Status: 400) [Size: 311]
3202Found: download.www.igemar.cl (Status: 400) [Size: 315]
3203Found: exchange.www.igemar.cl (Status: 400) [Size: 315]
3204Found: erp.www.igemar.cl (Status: 400) [Size: 310]
3205Found: f5.www.igemar.cl (Status: 400) [Size: 309]
3206Found: forum.www.igemar.cl (Status: 400) [Size: 312]
3207Found: en.www.igemar.cl (Status: 400) [Size: 309]
3208Found: fileserver.www.igemar.cl (Status: 400) [Size: 317]
3209Found: firewall.www.igemar.cl (Status: 400) [Size: 315]
3210Found: ftp.www.igemar.cl (Status: 400) [Size: 310]
3211Found: gw.www.igemar.cl (Status: 400) [Size: 309]
3212Found: help.www.igemar.cl (Status: 400) [Size: 311]
3213Found: git.www.igemar.cl (Status: 400) [Size: 310]
3214Found: helpdesk.www.igemar.cl (Status: 400) [Size: 315]
3215Found: ftp0.www.igemar.cl (Status: 400) [Size: 311]
3216Found: id.www.igemar.cl (Status: 400) [Size: 309]
3217Found: host.www.igemar.cl (Status: 400) [Size: 311]
3218Found: http.www.igemar.cl (Status: 400) [Size: 311]
3219Found: home.www.igemar.cl (Status: 400) [Size: 311]
3220Found: internet.www.igemar.cl (Status: 400) [Size: 315]
3221Found: images.www.igemar.cl (Status: 400) [Size: 313]
3222Found: info.www.igemar.cl (Status: 400) [Size: 311]
3223Found: internal.www.igemar.cl (Status: 400) [Size: 315]
3224Found: intra.www.igemar.cl (Status: 400) [Size: 312]
3225Found: ipv6.www.igemar.cl (Status: 400) [Size: 311]
3226Found: intranet.www.igemar.cl (Status: 400) [Size: 315]
3227Found: linux.www.igemar.cl (Status: 400) [Size: 312]
3228Found: lab.www.igemar.cl (Status: 400) [Size: 310]
3229Found: ldap.www.igemar.cl (Status: 400) [Size: 311]
3230Found: mail3.www.igemar.cl (Status: 400) [Size: 312]
3231Found: localhost.www.igemar.cl (Status: 400) [Size: 316]
3232Found: local.www.igemar.cl (Status: 400) [Size: 312]
3233Found: mail2.www.igemar.cl (Status: 400) [Size: 312]
3234Found: main.www.igemar.cl (Status: 400) [Size: 311]
3235Found: m.www.igemar.cl (Status: 400) [Size: 308]
3236Found: mailgate.www.igemar.cl (Status: 400) [Size: 315]
3237Found: log.www.igemar.cl (Status: 400) [Size: 310]
3238Found: mail.www.igemar.cl (Status: 400) [Size: 311]
3239Found: manage.www.igemar.cl (Status: 400) [Size: 313]
3240Found: mgmt.www.igemar.cl (Status: 400) [Size: 311]
3241Found: mobile.www.igemar.cl (Status: 400) [Size: 313]
3242Found: mirror.www.igemar.cl (Status: 400) [Size: 313]
3243Found: monitor.www.igemar.cl (Status: 400) [Size: 314]
3244Found: mx0.www.igemar.cl (Status: 400) [Size: 310]
3245Found: mta.www.igemar.cl (Status: 400) [Size: 310]
3246Found: mx.www.igemar.cl (Status: 400) [Size: 309]
3247Found: mssql.www.igemar.cl (Status: 400) [Size: 312]
3248Found: mx1.www.igemar.cl (Status: 400) [Size: 310]
3249Found: mysql.www.igemar.cl (Status: 400) [Size: 312]
3250Found: noc.www.igemar.cl (Status: 400) [Size: 310]
3251Found: news.www.igemar.cl (Status: 400) [Size: 311]
3252Found: ns0.www.igemar.cl (Status: 400) [Size: 310]
3253Found: ns2.www.igemar.cl (Status: 400) [Size: 310]
3254Found: ntp.www.igemar.cl (Status: 400) [Size: 310]
3255Found: ns.www.igemar.cl (Status: 400) [Size: 309]
3256Found: ns1.www.igemar.cl (Status: 400) [Size: 310]
3257Found: old.www.igemar.cl (Status: 400) [Size: 310]
3258Found: ns3.www.igemar.cl (Status: 400) [Size: 310]
3259Found: ops.www.igemar.cl (Status: 400) [Size: 310]
3260Found: oracle.www.igemar.cl (Status: 400) [Size: 313]
3261Found: pbx.www.igemar.cl (Status: 400) [Size: 310]
3262Found: owa.www.igemar.cl (Status: 400) [Size: 310]
3263Found: secure.www.igemar.cl (Status: 400) [Size: 313]
3264Found: shop.www.igemar.cl (Status: 400) [Size: 311]
3265Found: portal.www.igemar.cl (Status: 400) [Size: 313]
3266Found: s3.www.igemar.cl (Status: 400) [Size: 309]
3267Found: server.www.igemar.cl (Status: 400) [Size: 313]
3268Found: sharepoint.www.igemar.cl (Status: 400) [Size: 317]
3269Found: sip.www.igemar.cl (Status: 400) [Size: 310]
3270Found: sql.www.igemar.cl (Status: 400) [Size: 310]
3271Found: smtp.www.igemar.cl (Status: 400) [Size: 311]
3272Found: squid.www.igemar.cl (Status: 400) [Size: 312]
3273Found: ssl.www.igemar.cl (Status: 400) [Size: 310]
3274Found: ssh.www.igemar.cl (Status: 400) [Size: 310]
3275Found: stage.www.igemar.cl (Status: 400) [Size: 312]
3276Found: staging.www.igemar.cl (Status: 400) [Size: 314]
3277Found: status.www.igemar.cl (Status: 400) [Size: 313]
3278Found: svn.www.igemar.cl (Status: 400) [Size: 310]
3279Found: stats.www.igemar.cl (Status: 400) [Size: 312]
3280Found: test.www.igemar.cl (Status: 400) [Size: 311]
3281Found: syslog.www.igemar.cl (Status: 400) [Size: 313]
3282Found: test1.www.igemar.cl (Status: 400) [Size: 312]
3283Found: test2.www.igemar.cl (Status: 400) [Size: 312]
3284Found: uat.www.igemar.cl (Status: 400) [Size: 310]
3285Found: testing.www.igemar.cl (Status: 400) [Size: 314]
3286Found: v1.www.igemar.cl (Status: 400) [Size: 309]
3287Found: upload.www.igemar.cl (Status: 400) [Size: 313]
3288Found: v2.www.igemar.cl (Status: 400) [Size: 309]
3289Found: v3.www.igemar.cl (Status: 400) [Size: 309]
3290Found: vm.www.igemar.cl (Status: 400) [Size: 309]
3291Found: vnc.www.igemar.cl (Status: 400) [Size: 310]
3292Found: web.www.igemar.cl (Status: 400) [Size: 310]
3293Found: vpn.www.igemar.cl (Status: 400) [Size: 310]
3294Found: voip.www.igemar.cl (Status: 400) [Size: 311]
3295Found: whois.www.igemar.cl (Status: 400) [Size: 312]
3296Found: web2test.www.igemar.cl (Status: 400) [Size: 315]
3297Found: wiki.www.igemar.cl (Status: 400) [Size: 311]
3298Found: www.www.igemar.cl (Status: 400) [Size: 310]
3299Found: www2.www.igemar.cl (Status: 400) [Size: 311]
3300Found: xml.www.igemar.cl (Status: 400) [Size: 310]
3301===============================================================
33022020/03/05 23:44:49 Finished
3303===============================================================
3304######################################################################################################################################
3305Version: 1.11.13-static
3306OpenSSL 1.0.2-chacha (1.0.2g-dev)
3307
3308Connected to 52.52.234.222
3309
3310Testing SSL server www.igemar.cl on port 443 using SNI name www.igemar.cl
3311
3312 TLS Fallback SCSV:
3313Server supports TLS Fallback SCSV
3314
3315 TLS renegotiation:
3316Secure session renegotiation supported
3317
3318 TLS Compression:
3319Compression disabled
3320
3321 Heartbleed:
3322TLS 1.2 not vulnerable to heartbleed
3323TLS 1.1 not vulnerable to heartbleed
3324TLS 1.0 not vulnerable to heartbleed
3325
3326 Supported Server Cipher(s):
3327Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
3328Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
3329Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
3330Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
3331Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
3332Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
3333Accepted TLSv1.2 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
3334Accepted TLSv1.2 256 bits AES256-GCM-SHA384
3335Accepted TLSv1.2 256 bits AES256-SHA256
3336Accepted TLSv1.2 256 bits AES256-SHA
3337Accepted TLSv1.2 256 bits CAMELLIA256-SHA
3338Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
3339Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
3340Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
3341Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
3342Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
3343Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
3344Accepted TLSv1.2 128 bits DHE-RSA-SEED-SHA DHE 2048 bits
3345Accepted TLSv1.2 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
3346Accepted TLSv1.2 128 bits AES128-GCM-SHA256
3347Accepted TLSv1.2 128 bits AES128-SHA256
3348Accepted TLSv1.2 128 bits AES128-SHA
3349Accepted TLSv1.2 128 bits SEED-SHA
3350Accepted TLSv1.2 128 bits CAMELLIA128-SHA
3351Accepted TLSv1.2 128 bits IDEA-CBC-SHA
3352Accepted TLSv1.2 128 bits ECDHE-RSA-RC4-SHA Curve P-256 DHE 256
3353Accepted TLSv1.2 128 bits RC4-SHA
3354Accepted TLSv1.2 128 bits RC4-MD5
3355Accepted TLSv1.2 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
3356Accepted TLSv1.2 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
3357Accepted TLSv1.2 112 bits DES-CBC3-SHA
3358Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
3359Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
3360Accepted TLSv1.1 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
3361Accepted TLSv1.1 256 bits AES256-SHA
3362Accepted TLSv1.1 256 bits CAMELLIA256-SHA
3363Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
3364Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
3365Accepted TLSv1.1 128 bits DHE-RSA-SEED-SHA DHE 2048 bits
3366Accepted TLSv1.1 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
3367Accepted TLSv1.1 128 bits AES128-SHA
3368Accepted TLSv1.1 128 bits SEED-SHA
3369Accepted TLSv1.1 128 bits CAMELLIA128-SHA
3370Accepted TLSv1.1 128 bits IDEA-CBC-SHA
3371Accepted TLSv1.1 128 bits ECDHE-RSA-RC4-SHA Curve P-256 DHE 256
3372Accepted TLSv1.1 128 bits RC4-SHA
3373Accepted TLSv1.1 128 bits RC4-MD5
3374Accepted TLSv1.1 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
3375Accepted TLSv1.1 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
3376Accepted TLSv1.1 112 bits DES-CBC3-SHA
3377Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
3378Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
3379Accepted TLSv1.0 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
3380Accepted TLSv1.0 256 bits AES256-SHA
3381Accepted TLSv1.0 256 bits CAMELLIA256-SHA
3382Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
3383Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
3384Accepted TLSv1.0 128 bits DHE-RSA-SEED-SHA DHE 2048 bits
3385Accepted TLSv1.0 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
3386Accepted TLSv1.0 128 bits AES128-SHA
3387Accepted TLSv1.0 128 bits SEED-SHA
3388Accepted TLSv1.0 128 bits CAMELLIA128-SHA
3389Accepted TLSv1.0 128 bits IDEA-CBC-SHA
3390Accepted TLSv1.0 128 bits ECDHE-RSA-RC4-SHA Curve P-256 DHE 256
3391Accepted TLSv1.0 128 bits RC4-SHA
3392Accepted TLSv1.0 128 bits RC4-MD5
3393Accepted TLSv1.0 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
3394Accepted TLSv1.0 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
3395Accepted TLSv1.0 112 bits DES-CBC3-SHA
3396
3397 SSL Certificate:
3398Signature Algorithm: sha256WithRSAEncryption
3399RSA Key Strength: 2048
3400
3401Subject: www.igemar.cl
3402Altnames: DNS:www.igemar.cl, DNS:igemar.cl
3403Issuer: Sectigo RSA Domain Validation Secure Server CA
3404
3405Not valid before: Apr 10 00:00:00 2019 GMT
3406Not valid after: Apr 9 23:59:59 2021 GMT
3407
3408###################################################################################################################################
3409------------------------------------------------------------------------------------------------------------------------
3410
3411[ ! ] Starting SCANNER INURLBR 2.1 at [05-03-2020 23:59:33]
3412[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
3413It is the end user's responsibility to obey all applicable local, state and federal laws.
3414Developers assume no liability and are not responsible for any misuse or damage caused by this program
3415
3416[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.igemar.cl/output/inurlbr-www.igemar.cl ]
3417[ INFO ][ DORK ]::[ site:www.igemar.cl ]
3418[ INFO ][ SEARCHING ]:: {
3419[ INFO ][ ENGINE ]::[ GOOGLE - www.google.bf ]
3420
3421[ INFO ][ SEARCHING ]::
3422-[:::]
3423[ INFO ][ ENGINE ]::[ GOOGLE API ]
3424
3425[ INFO ][ SEARCHING ]::
3426-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
3427[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.lv ID: 005911257635119896548:iiolgmwf2se ]
3428
3429[ INFO ][ SEARCHING ]::
3430-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
3431
3432[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
3433
3434
3435 _[ - ]::--------------------------------------------------------------------------------------------------------------
3436|_[ + ] [ 0 / 100 ]-[00:00:00] [ - ]
3437|_[ + ] Target:: [ https://www.igemar.cl/ ]
3438|_[ + ] Exploit::
3439|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3440|_[ + ] More details:: / - / , ISP:
3441|_[ + ] Found:: UNIDENTIFIED
3442
3443 _[ - ]::--------------------------------------------------------------------------------------------------------------
3444|_[ + ] [ 1 / 100 ]-[00:00:03] [ - ]
3445|_[ + ] Target:: [ https://www.igemar.cl/web/guest ]
3446|_[ + ] Exploit::
3447|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3448|_[ + ] More details:: / - / , ISP:
3449|_[ + ] Found:: UNIDENTIFIED
3450
3451 _[ - ]::--------------------------------------------------------------------------------------------------------------
3452|_[ + ] [ 2 / 100 ]-[00:00:07] [ - ]
3453|_[ + ] Target:: [ https://www.igemar.cl/en/web/guest ]
3454|_[ + ] Exploit::
3455|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3456|_[ + ] More details:: / - / , ISP:
3457|_[ + ] Found:: UNIDENTIFIED
3458
3459 _[ - ]::--------------------------------------------------------------------------------------------------------------
3460|_[ + ] [ 3 / 100 ]-[00:00:10] [ - ]
3461|_[ + ] Target:: [ https://www.igemar.cl/en/group/control_panel?refererPlid=46108 ]
3462|_[ + ] Exploit::
3463|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3464|_[ + ] More details:: / - / , ISP:
3465|_[ + ] Found:: UNIDENTIFIED
3466
3467 _[ - ]::--------------------------------------------------------------------------------------------------------------
3468|_[ + ] [ 4 / 100 ]-[00:00:16] [ - ]
3469|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/175_codigo-de-etica-igemar.pdf ]
3470|_[ + ] Exploit::
3471|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3472|_[ + ] More details:: / - / , ISP:
3473|_[ + ] Found:: UNIDENTIFIED
3474
3475 _[ - ]::--------------------------------------------------------------------------------------------------------------
3476|_[ + ] [ 5 / 100 ]-[00:00:22] [ - ]
3477|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2006.pdf/1c36ee28-9739-2831-2461-60c9ea2e9bda ]
3478|_[ + ] Exploit::
3479|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3480|_[ + ] More details:: / - / , ISP:
3481|_[ + ] Found:: UNIDENTIFIED
3482
3483 _[ - ]::--------------------------------------------------------------------------------------------------------------
3484|_[ + ] [ 6 / 100 ]-[00:00:26] [ - ]
3485|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/Citacion_Accionistas_Igemar_2018.pdf/70247ae8-8363-59bb-6672-647117481524 ]
3486|_[ + ] Exploit::
3487|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3488|_[ + ] More details:: / - / , ISP:
3489|_[ + ] Found:: UNIDENTIFIED
3490
3491 _[ - ]::--------------------------------------------------------------------------------------------------------------
3492|_[ + ] [ 7 / 100 ]-[00:00:31] [ - ]
3493|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_analisis_razonado91123000_201606.pdf/11e6d74a-5605-2357-1500-4fc96ef6fd5e ]
3494|_[ + ] Exploit::
3495|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3496|_[ + ] More details:: / - / , ISP:
3497|_[ + ] Found:: UNIDENTIFIED
3498
3499 _[ - ]::--------------------------------------------------------------------------------------------------------------
3500|_[ + ] [ 8 / 100 ]-[00:00:36] [ - ]
3501|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/183706/Análisis_Razonado91123000_201806.pdf/35c5cb8c-9704-fcab-e5fb-3d345847f696 ]
3502|_[ + ] Exploit::
3503|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3504|_[ + ] More details:: / - / , ISP:
3505|_[ + ] Found:: UNIDENTIFIED
3506
3507 _[ - ]::--------------------------------------------------------------------------------------------------------------
3508|_[ + ] [ 9 / 100 ]-[00:00:42] [ - ]
3509|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201309.pdf/ba8f025b-fde5-a1e5-7607-39935f2a242e ]
3510|_[ + ] Exploit::
3511|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3512|_[ + ] More details:: / - / , ISP:
3513|_[ + ] Found:: UNIDENTIFIED
3514
3515 _[ - ]::--------------------------------------------------------------------------------------------------------------
3516|_[ + ] [ 10 / 100 ]-[00:00:47] [ - ]
3517|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/Igemar_eeff_2016.pdf/cd7cca3e-1dab-058c-d57a-e2283fd8bb8a ]
3518|_[ + ] Exploit::
3519|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3520|_[ + ] More details:: / - / , ISP:
3521|_[ + ] Found:: UNIDENTIFIED
3522
3523 _[ - ]::--------------------------------------------------------------------------------------------------------------
3524|_[ + ] [ 11 / 100 ]-[00:00:53] [ - ]
3525|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/Linea_directa_Igemar_ago2019.pdf/225427b0-26c5-08a9-d7a2-226faca0e411 ]
3526|_[ + ] Exploit::
3527|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3528|_[ + ] More details:: / - / , ISP:
3529|_[ + ] Found:: UNIDENTIFIED
3530
3531 _[ - ]::--------------------------------------------------------------------------------------------------------------
3532|_[ + ] [ 12 / 100 ]-[00:00:59] [ - ]
3533|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/Acta_Junta_Igemar_2019.pdf/f74084fc-0265-c92d-6cd0-c9acd9a8f55f ]
3534|_[ + ] Exploit::
3535|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3536|_[ + ] More details:: / - / , ISP:
3537|_[ + ] Found:: UNIDENTIFIED
3538
3539 _[ - ]::--------------------------------------------------------------------------------------------------------------
3540|_[ + ] [ 13 / 100 ]-[00:01:04] [ - ]
3541|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/Analisis_Razonado91123000_201712.pdf/882c4c22-3bfe-0ce7-3ac1-09226c215fa2 ]
3542|_[ + ] Exploit::
3543|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3544|_[ + ] More details:: / - / , ISP:
3545|_[ + ] Found:: UNIDENTIFIED
3546
3547 _[ - ]::--------------------------------------------------------------------------------------------------------------
3548|_[ + ] [ 14 / 100 ]-[00:01:08] [ - ]
3549|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/183706/HR_dic2018.pdf/99f8091d-4a2c-a3e8-653b-037e5df5a57a ]
3550|_[ + ] Exploit::
3551|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3552|_[ + ] More details:: / - / , ISP:
3553|_[ + ] Found:: UNIDENTIFIED
3554
3555 _[ - ]::--------------------------------------------------------------------------------------------------------------
3556|_[ + ] [ 15 / 100 ]-[00:01:12] [ - ]
3557|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/183706/Hechos_relevantes91123000_201809.pdf/f4bdbff1-7f48-bb63-ad30-e589d8ab9e7d ]
3558|_[ + ] Exploit::
3559|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3560|_[ + ] More details:: / - / , ISP:
3561|_[ + ] Found:: UNIDENTIFIED
3562
3563 _[ - ]::--------------------------------------------------------------------------------------------------------------
3564|_[ + ] [ 16 / 100 ]-[00:01:18] [ - ]
3565|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/memoria_igemar_2017.pdf/4bebaa66-6f29-5a96-3ebd-64ffacd76303 ]
3566|_[ + ] Exploit::
3567|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3568|_[ + ] More details:: / - / , ISP:
3569|_[ + ] Found:: UNIDENTIFIED
3570
3571 _[ - ]::--------------------------------------------------------------------------------------------------------------
3572|_[ + ] [ 17 / 100 ]-[00:01:23] [ - ]
3573|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2010.pdf/60c3ba85-4893-e79f-fa01-752a239e0124 ]
3574|_[ + ] Exploit::
3575|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3576|_[ + ] More details:: / - / , ISP:
3577|_[ + ] Found:: UNIDENTIFIED
3578
3579 _[ - ]::--------------------------------------------------------------------------------------------------------------
3580|_[ + ] [ 18 / 100 ]-[00:01:29] [ - ]
3581|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2008.pdf/8dc0a611-bd78-da92-411d-a29552d33f64 ]
3582|_[ + ] Exploit::
3583|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3584|_[ + ] More details:: / - / , ISP:
3585|_[ + ] Found:: UNIDENTIFIED
3586
3587 _[ - ]::--------------------------------------------------------------------------------------------------------------
3588|_[ + ] [ 19 / 100 ]-[00:01:35] [ - ]
3589|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/practicas_gobierno_corporativo_2018_Igemar.pdf/f18f770b-2296-4386-fd63-f84efcd73c9b ]
3590|_[ + ] Exploit::
3591|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3592|_[ + ] More details:: / - / , ISP:
3593|_[ + ] Found:: UNIDENTIFIED
3594
3595 _[ - ]::--------------------------------------------------------------------------------------------------------------
3596|_[ + ] [ 20 / 100 ]-[00:01:39] [ - ]
3597|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_analisis_razonado_igemar_0313.pdf/59c26bf9-31c1-3934-f2f5-4c5bec1b1ed1 ]
3598|_[ + ] Exploit::
3599|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3600|_[ + ] More details:: / - / , ISP:
3601|_[ + ] Found:: UNIDENTIFIED
3602
3603 _[ - ]::--------------------------------------------------------------------------------------------------------------
3604|_[ + ] [ 21 / 100 ]-[00:01:44] [ - ]
3605|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado_diciembre_2013.pdf/a922f72d-4b77-a19f-8049-bba15d2327cc ]
3606|_[ + ] Exploit::
3607|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3608|_[ + ] More details:: / - / , ISP:
3609|_[ + ] Found:: UNIDENTIFIED
3610
3611 _[ - ]::--------------------------------------------------------------------------------------------------------------
3612|_[ + ] [ 22 / 100 ]-[00:01:50] [ - ]
3613|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_informe_ifrs_diciembre_2009.pdf/00704054-fd88-b994-3f03-96cee5898ee6 ]
3614|_[ + ] Exploit::
3615|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3616|_[ + ] More details:: / - / , ISP:
3617|_[ + ] Found:: UNIDENTIFIED
3618
3619 _[ - ]::--------------------------------------------------------------------------------------------------------------
3620|_[ + ] [ 23 / 100 ]-[00:01:55] [ - ]
3621|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201503.pdf/e1fbc168-07ed-08c1-ca69-a27d9ec23314 ]
3622|_[ + ] Exploit::
3623|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3624|_[ + ] More details:: / - / , ISP:
3625|_[ + ] Found:: UNIDENTIFIED
3626
3627 _[ - ]::--------------------------------------------------------------------------------------------------------------
3628|_[ + ] [ 24 / 100 ]-[00:02:01] [ - ]
3629|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_informe_ifrs_marzo_2011.pdf/53d23c52-cc67-bd26-a4c8-009c5ca442f9 ]
3630|_[ + ] Exploit::
3631|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3632|_[ + ] More details:: / - / , ISP:
3633|_[ + ] Found:: UNIDENTIFIED
3634
3635 _[ - ]::--------------------------------------------------------------------------------------------------------------
3636|_[ + ] [ 25 / 100 ]-[00:02:05] [ - ]
3637|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/183706/Analisis_Razonado91123000_201809.pdf/4f377ad7-9a18-6a88-1a27-c36adca1ca8d ]
3638|_[ + ] Exploit::
3639|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3640|_[ + ] More details:: / - / , ISP:
3641|_[ + ] Found:: UNIDENTIFIED
3642
3643 _[ - ]::--------------------------------------------------------------------------------------------------------------
3644|_[ + ] [ 26 / 100 ]-[00:02:11] [ - ]
3645|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/Igemar_memoria_2016_SVS.pdf/3e39aced-fedf-5062-3715-30b03aef5aca ]
3646|_[ + ] Exploit::
3647|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3648|_[ + ] More details:: / - / , ISP:
3649|_[ + ] Found:: UNIDENTIFIED
3650
3651 _[ - ]::--------------------------------------------------------------------------------------------------------------
3652|_[ + ] [ 27 / 100 ]-[00:02:15] [ - ]
3653|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/197_acta_junta2014.pdf/fc41ee7b-110b-237e-2a63-44dce010b1aa ]
3654|_[ + ] Exploit::
3655|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3656|_[ + ] More details:: / - / , ISP:
3657|_[ + ] Found:: UNIDENTIFIED
3658
3659 _[ - ]::--------------------------------------------------------------------------------------------------------------
3660|_[ + ] [ 28 / 100 ]-[00:02:21] [ - ]
3661|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/242536/EF_201903.pdf/cb2614b9-7e4b-3dee-33f3-369678f82dd5 ]
3662|_[ + ] Exploit::
3663|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3664|_[ + ] More details:: / - / , ISP:
3665|_[ + ] Found:: UNIDENTIFIED
3666
3667 _[ - ]::--------------------------------------------------------------------------------------------------------------
3668|_[ + ] [ 29 / 100 ]-[00:02:27] [ - ]
3669|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_informe_ifrs_diciembre_2011.pdf/bae828b8-e3fe-7d47-a858-4af18ed3e701 ]
3670|_[ + ] Exploit::
3671|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3672|_[ + ] More details:: / - / , ISP:
3673|_[ + ] Found:: UNIDENTIFIED
3674
3675 _[ - ]::--------------------------------------------------------------------------------------------------------------
3676|_[ + ] [ 30 / 100 ]-[00:02:31] [ - ]
3677|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_analisis_razonado_diciembre_2011.pdf/08d1a3de-38ec-9f3a-5fc8-9dcdbc9b604a ]
3678|_[ + ] Exploit::
3679|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3680|_[ + ] More details:: / - / , ISP:
3681|_[ + ] Found:: UNIDENTIFIED
3682
3683 _[ - ]::--------------------------------------------------------------------------------------------------------------
3684|_[ + ] [ 31 / 100 ]-[00:02:37] [ - ]
3685|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/Codigo_etica_Igemar_agosto19.pdf/d4282dfb-db8c-ac29-b2f5-e7f693667b8c ]
3686|_[ + ] Exploit::
3687|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3688|_[ + ] More details:: / - / , ISP:
3689|_[ + ] Found:: UNIDENTIFIED
3690
3691 _[ - ]::--------------------------------------------------------------------------------------------------------------
3692|_[ + ] [ 32 / 100 ]-[00:02:43] [ - ]
3693|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/Igemar_Memoria_2017_SVS.pdf/4aed403c-c416-0d87-1619-9c40f6b059e3 ]
3694|_[ + ] Exploit::
3695|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3696|_[ + ] More details:: / - / , ISP:
3697|_[ + ] Found:: UNIDENTIFIED
3698
3699 _[ - ]::--------------------------------------------------------------------------------------------------------------
3700|_[ + ] [ 33 / 100 ]-[00:02:49] [ - ]
3701|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/Polit_prevdelitos_igemar_ago2019.pdf/c4f3201e-98ab-601f-9192-56d14939af89 ]
3702|_[ + ] Exploit::
3703|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3704|_[ + ] More details:: / - / , ISP:
3705|_[ + ] Found:: UNIDENTIFIED
3706
3707 _[ - ]::--------------------------------------------------------------------------------------------------------------
3708|_[ + ] [ 34 / 100 ]-[00:02:54] [ - ]
3709|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/politica_prevencion_delitos_igemar.pdf/12d69642-77d7-6a8a-021a-35acdcdb745d ]
3710|_[ + ] Exploit::
3711|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3712|_[ + ] More details:: / - / , ISP:
3713|_[ + ] Found:: UNIDENTIFIED
3714
3715 _[ - ]::--------------------------------------------------------------------------------------------------------------
3716|_[ + ] [ 35 / 100 ]-[00:02:57] [ - ]
3717|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/183706/Hechos_Relevantes91123000_201806.pdf/9027e73a-09c3-363f-4eb2-319564f75378 ]
3718|_[ + ] Exploit::
3719|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3720|_[ + ] More details:: / - / , ISP:
3721|_[ + ] Found:: UNIDENTIFIED
3722
3723 _[ - ]::--------------------------------------------------------------------------------------------------------------
3724|_[ + ] [ 36 / 100 ]-[00:03:03] [ - ]
3725|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/MemoriaAnual2018_Igemar.pdf/13c90655-35f2-3a5c-a8dc-4eb6f462b313 ]
3726|_[ + ] Exploit::
3727|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3728|_[ + ] More details:: / - / , ISP:
3729|_[ + ] Found:: UNIDENTIFIED
3730
3731 _[ - ]::--------------------------------------------------------------------------------------------------------------
3732|_[ + ] [ 37 / 100 ]-[00:03:08] [ - ]
3733|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/Aviso_Junta_Igemar_2018.pdf/fa8c7b01-ddb3-04f8-70cb-fb2cfcf685c8 ]
3734|_[ + ] Exploit::
3735|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3736|_[ + ] More details:: / - / , ISP:
3737|_[ + ] Found:: UNIDENTIFIED
3738
3739 _[ - ]::--------------------------------------------------------------------------------------------------------------
3740|_[ + ] [ 38 / 100 ]-[00:03:14] [ - ]
3741|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_estados_financieros_igemar_0313.pdf/7d352aef-7c12-1798-835a-a556e10f0583 ]
3742|_[ + ] Exploit::
3743|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3744|_[ + ] More details:: / - / , ISP:
3745|_[ + ] Found:: UNIDENTIFIED
3746
3747 _[ - ]::--------------------------------------------------------------------------------------------------------------
3748|_[ + ] [ 39 / 100 ]-[00:03:18] [ - ]
3749|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34699/he_29032018.pdf/c6c62eb5-02f2-fd9b-9bbd-435e5920029f ]
3750|_[ + ] Exploit::
3751|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3752|_[ + ] More details:: / - / , ISP:
3753|_[ + ] Found:: UNIDENTIFIED
3754
3755 _[ - ]::--------------------------------------------------------------------------------------------------------------
3756|_[ + ] [ 40 / 100 ]-[00:03:24] [ - ]
3757|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2012.pdf/007b9c91-afde-c41b-e921-80c6cfc457d0 ]
3758|_[ + ] Exploit::
3759|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3760|_[ + ] More details:: / - / , ISP:
3761|_[ + ] Found:: UNIDENTIFIED
3762
3763 _[ - ]::--------------------------------------------------------------------------------------------------------------
3764|_[ + ] [ 41 / 100 ]-[00:03:29] [ - ]
3765|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/Memoria_Anual_Igemar_2016.pdf/238a6538-3ab6-9ef9-473d-465d93d94108 ]
3766|_[ + ] Exploit::
3767|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3768|_[ + ] More details:: / - / , ISP:
3769|_[ + ] Found:: UNIDENTIFIED
3770
3771 _[ - ]::--------------------------------------------------------------------------------------------------------------
3772|_[ + ] [ 42 / 100 ]-[00:03:33] [ - ]
3773|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/politica_libre_comp_igemar2017.pdf/24d0d534-515b-bd3a-6426-66ddc4fa0dab ]
3774|_[ + ] Exploit::
3775|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3776|_[ + ] More details:: / - / , ISP:
3777|_[ + ] Found:: UNIDENTIFIED
3778
3779 _[ - ]::--------------------------------------------------------------------------------------------------------------
3780|_[ + ] [ 43 / 100 ]-[00:03:39] [ - ]
3781|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_analisis_razonado_marzo_2012.pdf/4a6338bb-ee36-b63c-d5be-51b597c9427a ]
3782|_[ + ] Exploit::
3783|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3784|_[ + ] More details:: / - / , ISP:
3785|_[ + ] Found:: UNIDENTIFIED
3786
3787 _[ - ]::--------------------------------------------------------------------------------------------------------------
3788|_[ + ] [ 44 / 100 ]-[00:03:43] [ - ]
3789|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado_junio_2015.pdf/0e448547-b6cf-f304-5904-4f430308515c ]
3790|_[ + ] Exploit::
3791|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3792|_[ + ] More details:: / - / , ISP:
3793|_[ + ] Found:: UNIDENTIFIED
3794
3795 _[ - ]::--------------------------------------------------------------------------------------------------------------
3796|_[ + ] [ 45 / 100 ]-[00:03:47] [ - ]
3797|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34720/Análisis_Razonado91123000_201709.pdf/5df24712-f409-ce76-4994-21424823e940 ]
3798|_[ + ] Exploit::
3799|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3800|_[ + ] More details:: / - / , ISP:
3801|_[ + ] Found:: UNIDENTIFIED
3802
3803 _[ - ]::--------------------------------------------------------------------------------------------------------------
3804|_[ + ] [ 46 / 100 ]-[00:03:53] [ - ]
3805|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2013.pdf/5656d439-347b-2fe6-d6de-91e555d06cab ]
3806|_[ + ] Exploit::
3807|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3808|_[ + ] More details:: / - / , ISP:
3809|_[ + ] Found:: UNIDENTIFIED
3810
3811 _[ - ]::--------------------------------------------------------------------------------------------------------------
3812|_[ + ] [ 47 / 100 ]-[00:03:57] [ - ]
3813|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/242536/AR_201903.pdf/c5d826c7-a468-ced5-e876-4a932ca0ab84 ]
3814|_[ + ] Exploit::
3815|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3816|_[ + ] More details:: / - / , ISP:
3817|_[ + ] Found:: UNIDENTIFIED
3818
3819 _[ - ]::--------------------------------------------------------------------------------------------------------------
3820|_[ + ] [ 48 / 100 ]-[00:04:01] [ - ]
3821|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34720/AR_0317.pdf/ae9b45e1-cca0-30e6-52f1-01d8cbd8ffb7 ]
3822|_[ + ] Exploit::
3823|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3824|_[ + ] More details:: / - / , ISP:
3825|_[ + ] Found:: UNIDENTIFIED
3826
3827 _[ - ]::--------------------------------------------------------------------------------------------------------------
3828|_[ + ] [ 49 / 100 ]-[00:04:06] [ - ]
3829|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_analisis_razonado91123000_201603.pdf/fe3df267-a7f5-7edb-bf5e-a2515905bcf8 ]
3830|_[ + ] Exploit::
3831|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3832|_[ + ] More details:: / - / , ISP:
3833|_[ + ] Found:: UNIDENTIFIED
3834
3835 _[ - ]::--------------------------------------------------------------------------------------------------------------
3836|_[ + ] [ 50 / 100 ]-[00:04:12] [ - ]
3837|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/Estados_financieros91123000_201712.pdf/a652e445-8218-0a67-dd4a-487c9e752466 ]
3838|_[ + ] Exploit::
3839|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3840|_[ + ] More details:: / - / , ISP:
3841|_[ + ] Found:: UNIDENTIFIED
3842
3843 _[ - ]::--------------------------------------------------------------------------------------------------------------
3844|_[ + ] [ 51 / 100 ]-[00:04:15] [ - ]
3845|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/126736/HR_201706.pdf/e7793591-4f99-3414-9535-620b7a7667eb ]
3846|_[ + ] Exploit::
3847|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3848|_[ + ] More details:: / - / , ISP:
3849|_[ + ] Found:: UNIDENTIFIED
3850
3851 _[ - ]::--------------------------------------------------------------------------------------------------------------
3852|_[ + ] [ 52 / 100 ]-[00:04:21] [ - ]
3853|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/EEFF_dic2018.pdf/b4c1b7d4-41ae-0d6b-8935-f705a21a1835 ]
3854|_[ + ] Exploit::
3855|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3856|_[ + ] More details:: / - / , ISP:
3857|_[ + ] Found:: UNIDENTIFIED
3858
3859 _[ - ]::--------------------------------------------------------------------------------------------------------------
3860|_[ + ] [ 53 / 100 ]-[00:04:27] [ - ]
3861|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34699/he_250418.pdf/2bf76065-ed37-8e5c-200b-69bb0de622c3 ]
3862|_[ + ] Exploit::
3863|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3864|_[ + ] More details:: / - / , ISP:
3865|_[ + ] Found:: UNIDENTIFIED
3866
3867 _[ - ]::--------------------------------------------------------------------------------------------------------------
3868|_[ + ] [ 54 / 100 ]-[00:04:33] [ - ]
3869|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_analisis_razonado_junio_2011.pdf/41d53ca3-1b1e-5723-8e05-de90b20562a9 ]
3870|_[ + ] Exploit::
3871|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3872|_[ + ] More details:: / - / , ISP:
3873|_[ + ] Found:: UNIDENTIFIED
3874
3875 _[ - ]::--------------------------------------------------------------------------------------------------------------
3876|_[ + ] [ 55 / 100 ]-[00:04:39] [ - ]
3877|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_fecu2013.pdf/5855d2b8-767d-96cd-8442-c6a8f5a7cd8e ]
3878|_[ + ] Exploit::
3879|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3880|_[ + ] More details:: / - / , ISP:
3881|_[ + ] Found:: UNIDENTIFIED
3882
3883 _[ - ]::--------------------------------------------------------------------------------------------------------------
3884|_[ + ] [ 56 / 100 ]-[00:04:44] [ - ]
3885|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/Igemar_AR_2016.pdf/99357c62-5fce-f212-bba4-187b04802a17 ]
3886|_[ + ] Exploit::
3887|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3888|_[ + ] More details:: / - / , ISP:
3889|_[ + ] Found:: UNIDENTIFIED
3890
3891 _[ - ]::--------------------------------------------------------------------------------------------------------------
3892|_[ + ] [ 57 / 100 ]-[00:04:49] [ - ]
3893|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_analisis_razonado_junio_2014.pdf/3f0ee5e9-c2da-4076-553a-a7d2eba51c56 ]
3894|_[ + ] Exploit::
3895|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3896|_[ + ] More details:: / - / , ISP:
3897|_[ + ] Found:: UNIDENTIFIED
3898
3899 _[ - ]::--------------------------------------------------------------------------------------------------------------
3900|_[ + ] [ 58 / 100 ]-[00:04:55] [ - ]
3901|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2009.pdf/51ff63f9-138e-7f36-c0aa-744f2369070f ]
3902|_[ + ] Exploit::
3903|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3904|_[ + ] More details:: / - / , ISP:
3905|_[ + ] Found:: UNIDENTIFIED
3906
3907 _[ - ]::--------------------------------------------------------------------------------------------------------------
3908|_[ + ] [ 59 / 100 ]-[00:05:00] [ - ]
3909|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/183706/EF_91123000_201803.pdf/2fb6a33e-8dad-f817-e979-533daa6af7f7 ]
3910|_[ + ] Exploit::
3911|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3912|_[ + ] More details:: / - / , ISP:
3913|_[ + ] Found:: UNIDENTIFIED
3914
3915 _[ - ]::--------------------------------------------------------------------------------------------------------------
3916|_[ + ] [ 60 / 100 ]-[00:05:06] [ - ]
3917|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/igemar_cod_etica_2018.pdf/e78c57b7-df7a-ba65-358b-338a8dee3790 ]
3918|_[ + ] Exploit::
3919|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3920|_[ + ] More details:: / - / , ISP:
3921|_[ + ] Found:: UNIDENTIFIED
3922
3923 _[ - ]::--------------------------------------------------------------------------------------------------------------
3924|_[ + ] [ 61 / 100 ]-[00:05:12] [ - ]
3925|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_estados_financieros_junio_2015.pdf/4b5e5630-301c-cb7c-b605-3093a3669034 ]
3926|_[ + ] Exploit::
3927|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3928|_[ + ] More details:: / - / , ISP:
3929|_[ + ] Found:: UNIDENTIFIED
3930
3931 _[ - ]::--------------------------------------------------------------------------------------------------------------
3932|_[ + ] [ 62 / 100 ]-[00:05:17] [ - ]
3933|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34720/Hechos_Relevantes91123000_201709.pdf/9c70f235-b920-82c4-b392-331bcb91a6ce ]
3934|_[ + ] Exploit::
3935|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3936|_[ + ] More details:: / - / , ISP:
3937|_[ + ] Found:: UNIDENTIFIED
3938
3939 _[ - ]::--------------------------------------------------------------------------------------------------------------
3940|_[ + ] [ 63 / 100 ]-[00:05:21] [ - ]
3941|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/183706/AR_91123000_201803.pdf/c44b5ffd-e838-8e71-7c22-7b0d885c00ff ]
3942|_[ + ] Exploit::
3943|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3944|_[ + ] More details:: / - / , ISP:
3945|_[ + ] Found:: UNIDENTIFIED
3946
3947 _[ - ]::--------------------------------------------------------------------------------------------------------------
3948|_[ + ] [ 64 / 100 ]-[00:05:24] [ - ]
3949|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201412.pdf/1180d807-ecac-a845-39ea-6a868ea4c47b ]
3950|_[ + ] Exploit::
3951|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3952|_[ + ] More details:: / - / , ISP:
3953|_[ + ] Found:: UNIDENTIFIED
3954
3955 _[ - ]::--------------------------------------------------------------------------------------------------------------
3956|_[ + ] [ 65 / 100 ]-[00:05:28] [ - ]
3957|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201412.pdf/ba645dee-85c0-1baa-8d05-1d06e41e44fc ]
3958|_[ + ] Exploit::
3959|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3960|_[ + ] More details:: / - / , ISP:
3961|_[ + ] Found:: UNIDENTIFIED
3962
3963 _[ - ]::--------------------------------------------------------------------------------------------------------------
3964|_[ + ] [ 66 / 100 ]-[00:05:34] [ - ]
3965|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2011.pdf/5949e01a-7e59-a442-2331-309007120272 ]
3966|_[ + ] Exploit::
3967|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3968|_[ + ] More details:: / - / , ISP:
3969|_[ + ] Found:: UNIDENTIFIED
3970
3971 _[ - ]::--------------------------------------------------------------------------------------------------------------
3972|_[ + ] [ 67 / 100 ]-[00:05:38] [ - ]
3973|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201306.pdf/88cc5920-eeab-205a-a0ff-98fce76f5f32 ]
3974|_[ + ] Exploit::
3975|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3976|_[ + ] More details:: / - / , ISP:
3977|_[ + ] Found:: UNIDENTIFIED
3978
3979 _[ - ]::--------------------------------------------------------------------------------------------------------------
3980|_[ + ] [ 68 / 100 ]-[00:05:44] [ - ]
3981|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/126736/IFRS_201706.pdf/b4605514-e843-6756-594b-4ef660aae018 ]
3982|_[ + ] Exploit::
3983|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3984|_[ + ] More details:: / - / , ISP:
3985|_[ + ] Found:: UNIDENTIFIED
3986
3987 _[ - ]::--------------------------------------------------------------------------------------------------------------
3988|_[ + ] [ 69 / 100 ]-[00:05:50] [ - ]
3989|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_informe_ifrs_junio2009.pdf/8dc4bf28-8651-1f28-93b1-afac6a5f3c0e ]
3990|_[ + ] Exploit::
3991|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
3992|_[ + ] More details:: / - / , ISP:
3993|_[ + ] Found:: UNIDENTIFIED
3994
3995 _[ - ]::--------------------------------------------------------------------------------------------------------------
3996|_[ + ] [ 70 / 100 ]-[00:05:55] [ - ]
3997|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201309.pdf/15d14ee0-5199-f543-15ad-01d9301a419e ]
3998|_[ + ] Exploit::
3999|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4000|_[ + ] More details:: / - / , ISP:
4001|_[ + ] Found:: UNIDENTIFIED
4002
4003 _[ - ]::--------------------------------------------------------------------------------------------------------------
4004|_[ + ] [ 71 / 100 ]-[00:06:00] [ - ]
4005|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes_diciembre_2013.pdf/4e9d3f1a-1392-560a-4147-77f9ec3d417b ]
4006|_[ + ] Exploit::
4007|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4008|_[ + ] More details:: / - / , ISP:
4009|_[ + ] Found:: UNIDENTIFIED
4010
4011 _[ - ]::--------------------------------------------------------------------------------------------------------------
4012|_[ + ] [ 72 / 100 ]-[00:06:05] [ - ]
4013|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/175_adopcion_practicas_igemar2015.pdf/f38cfd3b-ea82-3ce9-da3b-fab1c4116a3c ]
4014|_[ + ] Exploit::
4015|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4016|_[ + ] More details:: / - / , ISP:
4017|_[ + ] Found:: UNIDENTIFIED
4018
4019 _[ - ]::--------------------------------------------------------------------------------------------------------------
4020|_[ + ] [ 73 / 100 ]-[00:06:11] [ - ]
4021|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_estados_financieros_septiembre_2014.pdf/54a2748b-8672-362a-0400-bf4880d23705 ]
4022|_[ + ] Exploit::
4023|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4024|_[ + ] More details:: / - / , ISP:
4025|_[ + ] Found:: UNIDENTIFIED
4026
4027 _[ - ]::--------------------------------------------------------------------------------------------------------------
4028|_[ + ] [ 74 / 100 ]-[00:06:17] [ - ]
4029|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/Adopcion_practicas_igemar.pdf/87cd182d-4c19-c79b-de64-482e6639e3c8 ]
4030|_[ + ] Exploit::
4031|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4032|_[ + ] More details:: / - / , ISP:
4033|_[ + ] Found:: UNIDENTIFIED
4034
4035 _[ - ]::--------------------------------------------------------------------------------------------------------------
4036|_[ + ] [ 75 / 100 ]-[00:06:22] [ - ]
4037|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_estados_financieros_junio_2014.pdf/a62c6a49-361a-15da-f2a5-b8a926f1c82d ]
4038|_[ + ] Exploit::
4039|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4040|_[ + ] More details:: / - / , ISP:
4041|_[ + ] Found:: UNIDENTIFIED
4042
4043 _[ - ]::--------------------------------------------------------------------------------------------------------------
4044|_[ + ] [ 76 / 100 ]-[00:06:28] [ - ]
4045|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34699/HE_igemar_170817.pdf/db81f20a-804b-dff0-241d-394c72cea636 ]
4046|_[ + ] Exploit::
4047|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4048|_[ + ] More details:: / - / , ISP:
4049|_[ + ] Found:: UNIDENTIFIED
4050
4051 _[ - ]::--------------------------------------------------------------------------------------------------------------
4052|_[ + ] [ 77 / 100 ]-[00:06:32] [ - ]
4053|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34699/he_06042018.pdf/9879f937-dc01-3caf-3124-e2bcd6bcb98d ]
4054|_[ + ] Exploit::
4055|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4056|_[ + ] More details:: / - / , ISP:
4057|_[ + ] Found:: UNIDENTIFIED
4058
4059 _[ - ]::--------------------------------------------------------------------------------------------------------------
4060|_[ + ] [ 78 / 100 ]-[00:06:36] [ - ]
4061|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/Hechos_Relevantes91123000_201712.pdf/1c8a07a5-7748-750d-def4-fa44e64813ca ]
4062|_[ + ] Exploit::
4063|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4064|_[ + ] More details:: / - / , ISP:
4065|_[ + ] Found:: UNIDENTIFIED
4066
4067 _[ - ]::--------------------------------------------------------------------------------------------------------------
4068|_[ + ] [ 79 / 100 ]-[00:06:40] [ - ]
4069|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/206_acta_igemar_2016.pdf/151cf0db-026a-7396-c3bf-da2aeefb98f1 ]
4070|_[ + ] Exploit::
4071|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4072|_[ + ] More details:: / - / , ISP:
4073|_[ + ] Found:: UNIDENTIFIED
4074
4075 _[ - ]::--------------------------------------------------------------------------------------------------------------
4076|_[ + ] [ 80 / 100 ]-[00:06:45] [ - ]
4077|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_analisis_razonado91123000_201609.pdf/d23594b8-1195-3054-f3a4-da16c6293939 ]
4078|_[ + ] Exploit::
4079|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4080|_[ + ] More details:: / - / , ISP:
4081|_[ + ] Found:: UNIDENTIFIED
4082
4083 _[ - ]::--------------------------------------------------------------------------------------------------------------
4084|_[ + ] [ 81 / 100 ]-[00:06:50] [ - ]
4085|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/manual_manejo_info_igemar.pdf/8bce76e4-9c0f-59a9-21ad-6e682350de3f ]
4086|_[ + ] Exploit::
4087|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4088|_[ + ] More details:: / - / , ISP:
4089|_[ + ] Found:: UNIDENTIFIED
4090
4091 _[ - ]::--------------------------------------------------------------------------------------------------------------
4092|_[ + ] [ 82 / 100 ]-[00:06:56] [ ! ]
4093|_[ + ] Target:: [ ( POTENTIALLY VULNERABLE ) https://www.igemar.cl/documents/34275/34720/EFF0317.pdf/231e310b-2d87-fa78-320d-58da1762137a ]
4094|_[ + ] Exploit::
4095|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4096|_[ + ] More details:: / - / , ISP:
4097|_[ + ] Found:: POSTGRESQL-06 - VALUE: pg_
4098|_[ + ] VALUE SAVED IN THE FILE:: inurlbr-www.igemar.cl
4099
4100 _[ - ]::--------------------------------------------------------------------------------------------------------------
4101|_[ + ] [ 83 / 100 ]-[00:07:00] [ - ]
4102|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/183706/AR_dic2018.pdf/55ae8535-ed01-6519-bb7e-67c724d37144 ]
4103|_[ + ] Exploit::
4104|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4105|_[ + ] More details:: / - / , ISP:
4106|_[ + ] Found:: UNIDENTIFIED
4107
4108 _[ - ]::--------------------------------------------------------------------------------------------------------------
4109|_[ + ] [ 84 / 100 ]-[00:07:06] [ - ]
4110|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2007.pdf/11c4c3c9-daf6-ca34-4adc-ebfd3cdc79e0 ]
4111|_[ + ] Exploit::
4112|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4113|_[ + ] More details:: / - / , ISP:
4114|_[ + ] Found:: UNIDENTIFIED
4115
4116 _[ - ]::--------------------------------------------------------------------------------------------------------------
4117|_[ + ] [ 85 / 100 ]-[00:07:11] [ - ]
4118|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/ActaJuntaExtraordinaria2018.pdf/402fca9a-724f-5ac2-4218-aff51bd030d2 ]
4119|_[ + ] Exploit::
4120|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4121|_[ + ] More details:: / - / , ISP:
4122|_[ + ] Found:: UNIDENTIFIED
4123
4124 _[ - ]::--------------------------------------------------------------------------------------------------------------
4125|_[ + ] [ 86 / 100 ]-[00:07:15] [ - ]
4126|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes_septiembre_2014.pdf/173e652a-a45e-6a6a-927c-71dc94ab38da ]
4127|_[ + ] Exploit::
4128|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4129|_[ + ] More details:: / - / , ISP:
4130|_[ + ] Found:: UNIDENTIFIED
4131
4132 _[ - ]::--------------------------------------------------------------------------------------------------------------
4133|_[ + ] [ 87 / 100 ]-[00:07:20] [ - ]
4134|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34693/162_igemar_estatutos_2016.pdf/73573522-5713-3312-f9d8-2b386b3860f3 ]
4135|_[ + ] Exploit::
4136|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4137|_[ + ] More details:: / - / , ISP:
4138|_[ + ] Found:: UNIDENTIFIED
4139
4140 _[ - ]::--------------------------------------------------------------------------------------------------------------
4141|_[ + ] [ 88 / 100 ]-[00:07:24] [ - ]
4142|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/Fundamentos_Junta_extra_2018.pdf/a635a271-55f1-a149-f6a1-93eee10b441c ]
4143|_[ + ] Exploit::
4144|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4145|_[ + ] More details:: / - / , ISP:
4146|_[ + ] Found:: UNIDENTIFIED
4147
4148 _[ - ]::--------------------------------------------------------------------------------------------------------------
4149|_[ + ] [ 89 / 100 ]-[00:07:30] [ - ]
4150|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34696/politica_gestion_riesgos_igemar.pdf/ac9567bf-0dff-39a8-0e6f-4d3205ae3c39 ]
4151|_[ + ] Exploit::
4152|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4153|_[ + ] More details:: / - / , ISP:
4154|_[ + ] Found:: UNIDENTIFIED
4155
4156 _[ - ]::--------------------------------------------------------------------------------------------------------------
4157|_[ + ] [ 90 / 100 ]-[00:07:34] [ - ]
4158|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes_junio_2014.pdf/af19aa56-6ac0-2ba1-c575-c4025defd163 ]
4159|_[ + ] Exploit::
4160|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4161|_[ + ] More details:: / - / , ISP:
4162|_[ + ] Found:: UNIDENTIFIED
4163
4164 _[ - ]::--------------------------------------------------------------------------------------------------------------
4165|_[ + ] [ 91 / 100 ]-[00:07:39] [ - ]
4166|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/126736/AR_201706.pdf/091bbbef-1e2a-a0cd-890a-996a057d2ace ]
4167|_[ + ] Exploit::
4168|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4169|_[ + ] More details:: / - / , ISP:
4170|_[ + ] Found:: UNIDENTIFIED
4171
4172 _[ - ]::--------------------------------------------------------------------------------------------------------------
4173|_[ + ] [ 92 / 100 ]-[00:07:45] [ - ]
4174|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/179_eeff2014.pdf/69bc8eb6-ae47-60ce-ad82-b8f9e499200d ]
4175|_[ + ] Exploit::
4176|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4177|_[ + ] More details:: / - / , ISP:
4178|_[ + ] Found:: UNIDENTIFIED
4179
4180 _[ - ]::--------------------------------------------------------------------------------------------------------------
4181|_[ + ] [ 93 / 100 ]-[00:07:49] [ - ]
4182|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/197_acta_igemar_2013.pdf/691b9669-4afe-3d91-4b6b-9e66967ed860 ]
4183|_[ + ] Exploit::
4184|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4185|_[ + ] More details:: / - / , ISP:
4186|_[ + ] Found:: UNIDENTIFIED
4187
4188 _[ - ]::--------------------------------------------------------------------------------------------------------------
4189|_[ + ] [ 94 / 100 ]-[00:07:53] [ - ]
4190|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/Aviso_Junta_Igemar_2017.pdf/e8317389-eb07-e826-0fd7-a5a719ee5128 ]
4191|_[ + ] Exploit::
4192|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4193|_[ + ] More details:: / - / , ISP:
4194|_[ + ] Found:: UNIDENTIFIED
4195
4196 _[ - ]::--------------------------------------------------------------------------------------------------------------
4197|_[ + ] [ 95 / 100 ]-[00:07:57] [ - ]
4198|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34705/Igemar_HR_2016.pdf/70415e75-d832-ad69-9986-0bb5314bae63 ]
4199|_[ + ] Exploit::
4200|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4201|_[ + ] More details:: / - / , ISP:
4202|_[ + ] Found:: UNIDENTIFIED
4203
4204 _[ - ]::--------------------------------------------------------------------------------------------------------------
4205|_[ + ] [ 96 / 100 ]-[00:08:01] [ - ]
4206|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/183706/HR_91123000_201803.pdf/262adf2e-eb46-d04f-d6b0-1c3cb476f1d7 ]
4207|_[ + ] Exploit::
4208|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4209|_[ + ] More details:: / - / , ISP:
4210|_[ + ] Found:: UNIDENTIFIED
4211
4212 _[ - ]::--------------------------------------------------------------------------------------------------------------
4213|_[ + ] [ 97 / 100 ]-[00:08:06] [ - ]
4214|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/Aviso_Junta2019_Igemar.pdf/2b1fe919-9572-6cf5-5e15-55fc85c19499 ]
4215|_[ + ] Exploit::
4216|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4217|_[ + ] More details:: / - / , ISP:
4218|_[ + ] Found:: UNIDENTIFIED
4219
4220 _[ - ]::--------------------------------------------------------------------------------------------------------------
4221|_[ + ] [ 98 / 100 ]-[00:08:10] [ - ]
4222|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34708/Fundamentos_Auditores_Externos_Igemar.pdf/a9cff67a-66de-57ab-cee0-bc9b6c156eaf ]
4223|_[ + ] Exploit::
4224|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4225|_[ + ] More details:: / - / , ISP:
4226|_[ + ] Found:: UNIDENTIFIED
4227
4228 _[ - ]::--------------------------------------------------------------------------------------------------------------
4229|_[ + ] [ 99 / 100 ]-[00:08:14] [ - ]
4230|_[ + ] Target:: [ https://www.igemar.cl/documents/34275/34699/HE_igemar_070717.pdf/f041ffdd-23f0-8d58-dec0-8f3b1517c08a ]
4231|_[ + ] Exploit::
4232|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache-Coyote/1.1 , IP:52.52.234.222:443
4233|_[ + ] More details:: / - / , ISP:
4234|_[ + ] Found:: UNIDENTIFIED
4235
4236[ INFO ] [ Shutting down ]
4237[ INFO ] [ End of process INURLBR at [06-03-2020 00:08:14]
4238[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 1 ]
4239[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.igemar.cl/output/inurlbr-www.igemar.cl ]
4240|_________________________________________________________________________________________
4241https://www.igemar.cl/documents/34275/34720/EFF0317.pdf/231e310b-2d87-fa78-320d-58da1762137a
4242
4243\_________________________________________________________________________________________
4244#####################################################################################################################################
4245Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-05 22:43 EST
4246Nmap scan report for ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
4247Host is up (0.30s latency).
4248Not shown: 474 filtered ports
4249Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
4250PORT STATE SERVICE VERSION
425180/tcp open http Apache httpd 2.2.34
4252|_http-server-header: Apache/2.2.34 (Amazon)
4253|_http-title: Did not follow redirect to https://ec2-52-52-234-222.us-west-1.compute.amazonaws.com/
4254443/tcp open ssl/http Apache Tomcat/Coyote JSP engine 1.1
4255|_http-server-header: Apache/2.2.34 (Amazon)
4256|_http-title: 400 Bad Request
4257| ssl-cert: Subject: commonName=www.siemel.cl
4258| Subject Alternative Name: DNS:www.siemel.cl, DNS:siemel.cl
4259| Not valid before: 2019-04-10T00:00:00
4260|_Not valid after: 2021-04-09T23:59:59
4261|_ssl-date: TLS randomness does not represent time
4262Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4263Device type: general purpose|PBX
4264Running (JUST GUESSING): Linux 3.X (88%), Vodavi embedded (87%)
4265OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/h:vodavi:xts-ip
4266Aggressive OS guesses: Linux 3.10 - 3.13 (88%), Vodavi XTS-IP PBX (87%)
4267No exact OS matches for host (test conditions non-ideal).
4268Network Distance: 17 hops
4269Service Info: Host: inversionistas.antarchile.cl
4270
4271TRACEROUTE (using port 443/tcp)
4272HOP RTT ADDRESS
42731 233.55 ms 10.202.9.1
42742 345.27 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
42753 345.30 ms 5.56.20.161
42764 345.32 ms ae12-2022.fra10.core-backbone.com (81.95.15.57)
42775 345.33 ms ae26.cr10-fra2.ip4.gtt.net (87.119.97.189)
42786 457.99 ms et-0-0-35.cr5-sjc1.ip4.gtt.net (89.149.180.86)
42797 457.98 ms a100-us-gw.ip4.gtt.net (173.241.129.142)
42808 458.01 ms 54.240.242.108
42819 458.02 ms 54.240.242.127
428210 345.39 ms 52.93.47.88
428311 ... 16
428417 399.75 ms ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
4285#####################################################################################################################################
4286Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-05 22:44 EST
4287Nmap scan report for ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
4288Host is up.
4289Not shown: 14 filtered ports
4290Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
4291PORT STATE SERVICE VERSION
429253/udp open|filtered domain
429367/udp open|filtered dhcps
429468/udp open|filtered dhcpc
429569/udp open|filtered tftp
429688/udp open|filtered kerberos-sec
4297123/udp open|filtered ntp
4298137/udp open|filtered netbios-ns
4299138/udp open|filtered netbios-dgm
4300139/udp open|filtered netbios-ssn
4301161/udp open|filtered snmp
4302162/udp open|filtered snmptrap
4303389/udp open|filtered ldap
4304520/udp open|filtered route
43052049/udp open|filtered nfs
4306Too many fingerprints match this host to give specific OS details
4307
4308TRACEROUTE (using proto 1/icmp)
4309HOP RTT ADDRESS
43101 633.33 ms 10.202.9.1
43112 745.23 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
43123 745.26 ms 5.56.20.161
43134 745.28 ms ae12-2022.fra10.core-backbone.com (81.95.15.57)
43145 745.29 ms ae26.cr10-fra2.ip4.gtt.net (87.119.97.189)
43156 901.32 ms et-0-0-35.cr5-sjc1.ip4.gtt.net (89.149.180.86)
43167 901.30 ms a100-us-gw.ip4.gtt.net (173.241.129.142)
43178 901.34 ms 54.240.242.108
43189 901.34 ms 54.240.242.127
431910 901.37 ms 205.251.229.158
432011 ... 30
4321####################################################################################################################################
4322Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-05 22:50 EST
4323Nmap scan report for ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
4324Host is up.
4325
4326PORT STATE SERVICE VERSION
432767/tcp filtered dhcps
432867/udp open|filtered dhcps
4329|_dhcp-discover: ERROR: Script execution failed (use -d to debug)
4330Too many fingerprints match this host to give specific OS details
4331
4332TRACEROUTE (using proto 1/icmp)
4333HOP RTT ADDRESS
43341 177.88 ms 10.202.9.1
43352 177.90 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
43363 177.90 ms 5.56.20.161
43374 177.92 ms ae12-2022.fra10.core-backbone.com (81.95.15.57)
43385 177.91 ms ae26.cr10-fra2.ip4.gtt.net (87.119.97.189)
43396 290.01 ms et-0-0-35.cr5-sjc1.ip4.gtt.net (89.149.180.86)
43407 290.00 ms a100-us-gw.ip4.gtt.net (173.241.129.142)
43418 290.03 ms 54.240.242.108
43429 290.03 ms 54.240.242.127
434310 290.07 ms 205.251.229.158
434411 ... 30
4345#####################################################################################################################################
4346Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-05 22:52 EST
4347Nmap scan report for ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
4348Host is up.
4349
4350PORT STATE SERVICE VERSION
435168/tcp filtered dhcpc
435268/udp open|filtered dhcpc
4353Too many fingerprints match this host to give specific OS details
4354
4355TRACEROUTE (using proto 1/icmp)
4356HOP RTT ADDRESS
43571 245.83 ms 10.202.9.1
43582 245.84 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
43593 245.85 ms 5.56.20.161
43604 245.86 ms ae12-2022.fra10.core-backbone.com (81.95.15.57)
43615 245.87 ms ae26.cr10-fra2.ip4.gtt.net (87.119.97.189)
43626 363.85 ms et-0-0-35.cr5-sjc1.ip4.gtt.net (89.149.180.86)
43637 363.87 ms a100-us-gw.ip4.gtt.net (173.241.129.142)
43648 363.90 ms 54.240.242.108
43659 363.89 ms 54.240.242.127
436610 363.92 ms 205.251.229.158
436711 ... 30
4368#####################################################################################################################################
4369Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-05 22:53 EST
4370Nmap scan report for ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
4371Host is up.
4372
4373PORT STATE SERVICE VERSION
437469/tcp filtered tftp
437569/udp open|filtered tftp
4376Too many fingerprints match this host to give specific OS details
4377
4378TRACEROUTE (using proto 1/icmp)
4379HOP RTT ADDRESS
43801 309.01 ms 10.202.9.1
43812 309.02 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
43823 309.03 ms 5.56.20.161
43834 309.04 ms ae12-2022.fra10.core-backbone.com (81.95.15.57)
43845 309.04 ms ae26.cr10-fra2.ip4.gtt.net (87.119.97.189)
43856 422.23 ms et-0-0-35.cr5-sjc1.ip4.gtt.net (89.149.180.86)
43867 422.21 ms a100-us-gw.ip4.gtt.net (173.241.129.142)
43878 422.24 ms 54.240.242.108
43889 422.25 ms 54.240.242.127
438910 422.27 ms 205.251.229.158
439011 ... 30
4391####################################################################################################################################
4392http://52.52.234.222 [302 Found] Apache[2.2.34], Country[UNITED STATES][US], HTTPServer[Apache/2.2.34 (Amazon)], IP[52.52.234.222], RedirectLocation[https://52.52.234.222/], Title[302 Found]
4393https://52.52.234.222/ [404 Not Found] Apache, Cookies[COOKIE_SUPPORT,GUEST_LANGUAGE_ID,JSESSIONID], Country[UNITED STATES][US], HTML5, HTTPServer[Apache-Coyote/1.1], HttpOnly[COOKIE_SUPPORT,GUEST_LANGUAGE_ID,JSESSIONID], IP[52.52.234.222], Java, Liferay, Script[text/javascript], Title[Estado - Sercor], UncommonHeaders[x-content-type-options,liferay-portal], X-Frame-Options[SAMEORIGIN], X-XSS-Protection[1]
4394####################################################################################################################################
4395HTTP/1.1 302 Found
4396Date: Fri, 06 Mar 2020 03:56:53 GMT
4397Server: Apache/2.2.34 (Amazon)
4398Location: https://52.52.234.222/
4399Connection: close
4400Content-Type: text/html; charset=iso-8859-1
4401
4402HTTP/1.1 302 Found
4403Date: Fri, 06 Mar 2020 03:56:54 GMT
4404Server: Apache/2.2.34 (Amazon)
4405Location: https://52.52.234.222/
4406Connection: close
4407Content-Type: text/html; charset=iso-8859-1
4408####################################################################################################################################
4409Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-05 22:57 EST
4410Nmap scan report for ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
4411Host is up.
4412
4413PORT STATE SERVICE VERSION
4414123/tcp filtered ntp
4415123/udp open|filtered ntp
4416Too many fingerprints match this host to give specific OS details
4417
4418TRACEROUTE (using proto 1/icmp)
4419HOP RTT ADDRESS
44201 229.24 ms 10.202.9.1
44212 229.27 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
44223 341.49 ms 5.56.20.161
44234 341.52 ms ae12-2022.fra10.core-backbone.com (81.95.15.57)
44245 341.53 ms ae26.cr10-fra2.ip4.gtt.net (87.119.97.189)
44256 453.48 ms et-0-0-35.cr5-sjc1.ip4.gtt.net (89.149.180.86)
44267 453.49 ms a100-us-gw.ip4.gtt.net (173.241.129.142)
44278 453.50 ms 54.240.242.108
44289 453.52 ms 54.240.242.127
442910 453.53 ms 205.251.229.158
443011 ... 30
4431####################################################################################################################################
4432https://52.52.234.222/ [404 Not Found] Apache, Cookies[COOKIE_SUPPORT,GUEST_LANGUAGE_ID,JSESSIONID], Country[UNITED STATES][US], HTML5, HTTPServer[Apache-Coyote/1.1], HttpOnly[COOKIE_SUPPORT,GUEST_LANGUAGE_ID,JSESSIONID], IP[52.52.234.222], Java, Liferay, Script[text/javascript], Title[Estado - Sercor], UncommonHeaders[x-content-type-options,liferay-portal], X-Frame-Options[SAMEORIGIN], X-XSS-Protection[1]
4433#####################################################################################################################################
4434Version: 1.11.13-static
4435OpenSSL 1.0.2-chacha (1.0.2g-dev)
4436
4437Connected to 52.52.234.222
4438
4439Testing SSL server 52.52.234.222 on port 443 using SNI name 52.52.234.222
4440
4441 TLS Fallback SCSV:
4442Server supports TLS Fallback SCSV
4443
4444 TLS renegotiation:
4445Secure session renegotiation supported
4446
4447 TLS Compression:
4448Compression disabled
4449
4450 Heartbleed:
4451TLS 1.2 not vulnerable to heartbleed
4452TLS 1.1 not vulnerable to heartbleed
4453TLS 1.0 not vulnerable to heartbleed
4454
4455 Supported Server Cipher(s):
4456Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
4457Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
4458Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
4459Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
4460Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
4461Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
4462Accepted TLSv1.2 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
4463Accepted TLSv1.2 256 bits AES256-GCM-SHA384
4464Accepted TLSv1.2 256 bits AES256-SHA256
4465Accepted TLSv1.2 256 bits AES256-SHA
4466Accepted TLSv1.2 256 bits CAMELLIA256-SHA
4467Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
4468Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
4469Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
4470Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
4471Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
4472Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
4473Accepted TLSv1.2 128 bits DHE-RSA-SEED-SHA DHE 2048 bits
4474Accepted TLSv1.2 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
4475Accepted TLSv1.2 128 bits AES128-GCM-SHA256
4476Accepted TLSv1.2 128 bits AES128-SHA256
4477Accepted TLSv1.2 128 bits AES128-SHA
4478Accepted TLSv1.2 128 bits SEED-SHA
4479Accepted TLSv1.2 128 bits CAMELLIA128-SHA
4480Accepted TLSv1.2 128 bits IDEA-CBC-SHA
4481Accepted TLSv1.2 128 bits ECDHE-RSA-RC4-SHA Curve P-256 DHE 256
4482Accepted TLSv1.2 128 bits RC4-SHA
4483Accepted TLSv1.2 128 bits RC4-MD5
4484Accepted TLSv1.2 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
4485Accepted TLSv1.2 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
4486Accepted TLSv1.2 112 bits DES-CBC3-SHA
4487Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
4488Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
4489Accepted TLSv1.1 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
4490Accepted TLSv1.1 256 bits AES256-SHA
4491Accepted TLSv1.1 256 bits CAMELLIA256-SHA
4492Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
4493Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
4494Accepted TLSv1.1 128 bits DHE-RSA-SEED-SHA DHE 2048 bits
4495Accepted TLSv1.1 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
4496Accepted TLSv1.1 128 bits AES128-SHA
4497Accepted TLSv1.1 128 bits SEED-SHA
4498Accepted TLSv1.1 128 bits CAMELLIA128-SHA
4499Accepted TLSv1.1 128 bits IDEA-CBC-SHA
4500Accepted TLSv1.1 128 bits ECDHE-RSA-RC4-SHA Curve P-256 DHE 256
4501Accepted TLSv1.1 128 bits RC4-SHA
4502Accepted TLSv1.1 128 bits RC4-MD5
4503Accepted TLSv1.1 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
4504Accepted TLSv1.1 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
4505Accepted TLSv1.1 112 bits DES-CBC3-SHA
4506Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
4507Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
4508Accepted TLSv1.0 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
4509Accepted TLSv1.0 256 bits AES256-SHA
4510Accepted TLSv1.0 256 bits CAMELLIA256-SHA
4511Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
4512Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
4513Accepted TLSv1.0 128 bits DHE-RSA-SEED-SHA DHE 2048 bits
4514Accepted TLSv1.0 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
4515Accepted TLSv1.0 128 bits AES128-SHA
4516Accepted TLSv1.0 128 bits SEED-SHA
4517Accepted TLSv1.0 128 bits CAMELLIA128-SHA
4518Accepted TLSv1.0 128 bits IDEA-CBC-SHA
4519Accepted TLSv1.0 128 bits ECDHE-RSA-RC4-SHA Curve P-256 DHE 256
4520Accepted TLSv1.0 128 bits RC4-SHA
4521Accepted TLSv1.0 128 bits RC4-MD5
4522Accepted TLSv1.0 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
4523Accepted TLSv1.0 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
4524Accepted TLSv1.0 112 bits DES-CBC3-SHA
4525
4526 SSL Certificate:
4527Signature Algorithm: sha256WithRSAEncryption
4528RSA Key Strength: 2048
4529
4530Subject: www.siemel.cl
4531Altnames: DNS:www.siemel.cl, DNS:siemel.cl
4532Issuer: Sectigo RSA Domain Validation Secure Server CA
4533
4534Not valid before: Apr 10 00:00:00 2019 GMT
4535Not valid after: Apr 9 23:59:59 2021 GMT
4536#######################################################################################################################################
4537Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-05 23:20 EST
4538Nmap scan report for ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
4539Host is up.
4540
4541PORT STATE SERVICE VERSION
454253/tcp filtered domain
454367/tcp filtered dhcps
454468/tcp filtered dhcpc
454569/tcp filtered tftp
454688/tcp filtered kerberos-sec
4547123/tcp filtered ntp
4548137/tcp filtered netbios-ns
4549138/tcp filtered netbios-dgm
4550139/tcp filtered netbios-ssn
4551161/tcp filtered snmp
4552162/tcp filtered snmptrap
4553389/tcp filtered ldap
4554520/tcp filtered efs
45552049/tcp filtered nfs
455653/udp open|filtered domain
455767/udp open|filtered dhcps
455868/udp open|filtered dhcpc
455969/udp open|filtered tftp
456088/udp open|filtered kerberos-sec
4561123/udp open|filtered ntp
4562137/udp open|filtered netbios-ns
4563138/udp open|filtered netbios-dgm
4564139/udp open|filtered netbios-ssn
4565161/udp open|filtered snmp
4566162/udp open|filtered snmptrap
4567389/udp open|filtered ldap
4568520/udp open|filtered route
45692049/udp open|filtered nfs
4570Too many fingerprints match this host to give specific OS details
4571
4572TRACEROUTE (using proto 1/icmp)
4573HOP RTT ADDRESS
45741 128.60 ms 10.202.9.1
45752 128.62 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
45763 128.63 ms 5.56.20.161
45774 131.79 ms ae12-2022.fra10.core-backbone.com (81.95.15.57)
45785 131.76 ms ae26.cr10-fra2.ip4.gtt.net (87.119.97.189)
45796 286.54 ms et-0-0-35.cr5-sjc1.ip4.gtt.net (89.149.180.86)
45807 286.52 ms a100-us-gw.ip4.gtt.net (173.241.129.142)
45818 286.55 ms 54.240.242.108
45829 286.58 ms 54.240.242.127
458310 286.60 ms 205.251.229.158
458411 ... 30
4585######################################################################################################################################
4586Hosts
4587=====
4588
4589address mac name os_name os_flavor os_sp purpose info comments
4590------- --- ---- ------- --------- ----- ------- ---- --------
45913.83.211.23 ec2-3-83-211-23.compute-1.amazonaws.com embedded device
45923.216.98.236 ec2-3-216-98-236.compute-1.amazonaws.com Linux 3.X server
459334.236.0.217 ec2-34-236-0-217.compute-1.amazonaws.com Linux 3.X server
459437.1.207.121 teens-sins.net 2-Series 3.X device
459543.245.223.4 Linux 2.6.X server
459645.60.47.218 Linux 3.X server
459745.88.202.111 Linux 3.X server
459852.1.174.10 ec2-52-1-174-10.compute-1.amazonaws.com Linux 3.X server
459952.52.234.222 ec2-52-52-234-222.us-west-1.compute.amazonaws.com Unknown device
460054.85.59.109 ec2-54-85-59-109.compute-1.amazonaws.com Linux 3.X server
460164.69.94.253 Unknown device
460269.163.233.4 ps54052.dreamhostps.com Linux 14.04 server
460374.117.180.192 embedded device
460482.94.222.131 Unknown device
460592.123.250.35 a92-123-250-35.deploy.static.akamaitechnologies.com embedded device
460692.123.250.65 a92-123-250-65.deploy.static.akamaitechnologies.com Linux 3.X server
4607104.244.73.40 Unknown device
4608104.244.76.231 Linux 3.X server
4609104.244.77.188 Linux 3.X server
4610104.244.79.89 Linux 3.X server
4611111.90.145.39 web16.support-emilid.com Linux 2.6.X server
4612143.95.110.248 ip-143-95-110-248.iplocal Linux 3.X server
4613149.126.72.220 149.126.72.220.ip.incapdns.net Linux 3.X server
4614151.106.38.107 ns3152160.ip-151-106-38.eu embedded device
4615158.69.13.254 ip254.ip-158-69-13.net 2-Series 2.6.X device
4616162.244.35.13 xnlog.com FreeBSD 7.X device
4617169.239.218.20 cp10.domains.co.za Linux 2.6.X server
4618173.214.244.169 173.214.244.169.serverel.net Unknown device
4619174.142.53.51 mail.marineland.ca Linux 3.X server
4620186.64.118.40 mail.blue127.dnsmisitio.net embedded device
4621190.98.209.37 static.190.98.209.37.gtdinternet.com Unknown device
4622190.107.177.35 srv25.cpanelhost.cl Linux 2.6.X server
4623190.110.121.175 todofutbol.hn.cl Unknown device
4624190.153.209.187 static.190.153.209.187.gtdinternet.com Unknown device
4625190.153.219.254 mail.evopoli.cl Linux 3.X server
4626192.185.134.58 ns36.accountservergroup.com Linux 3.X server
4627200.2.249.28 Linux 3.X server
4628200.29.0.33 cp33.puntoweb.cl Unknown device
4629200.54.92.108 Linux 9.0 server
4630200.55.198.228 Linux 2.4.X server
4631200.68.34.99 Unknown device
4632200.73.54.34 mail.maxtel.cl Linux 2.6.X server
4633200.91.40.252 200-91-40-252.avz.cl Unknown device
4634201.159.170.136 soloweb.sinc.cl Unknown device
4635204.93.193.141 suzuka.mochahost.com Unknown device
4636206.48.140.40 Unknown device
4637207.246.147.189 2-Series device
4638207.246.147.190 Linux 4.X server
4639207.246.147.247 Linux 4.X server
4640207.246.147.248 Linux 4.X server
4641211.13.196.135 sv3.isle.ne.jp Linux 2.6.X server
4642212.174.0.150 Windows 2012 server
4643216.172.184.117 Linux 3.X server
4644218.45.5.97 www.town.koya.wakayama.jp Linux 2.6.X server
4645#######################################################################################################################################
4646Services
4647========
4648
4649host port proto name state info
4650---- ---- ----- ---- ----- ----
46513.83.211.23 53 tcp domain filtered
46523.83.211.23 53 udp domain unknown
46533.83.211.23 67 tcp dhcps filtered
46543.83.211.23 67 udp dhcps unknown
46553.83.211.23 68 tcp dhcpc filtered
46563.83.211.23 68 udp dhcpc unknown
46573.83.211.23 69 tcp tftp filtered
46583.83.211.23 69 udp tftp unknown
46593.83.211.23 80 tcp http open Microsoft IIS httpd 10.0
46603.83.211.23 88 tcp kerberos-sec filtered
46613.83.211.23 88 udp kerberos-sec unknown
46623.83.211.23 123 tcp ntp filtered
46633.83.211.23 123 udp ntp unknown
46643.83.211.23 137 tcp netbios-ns filtered
46653.83.211.23 137 udp netbios-ns unknown
46663.83.211.23 138 tcp netbios-dgm filtered
46673.83.211.23 138 udp netbios-dgm unknown
46683.83.211.23 139 tcp netbios-ssn filtered
46693.83.211.23 139 udp netbios-ssn unknown
46703.83.211.23 161 tcp snmp filtered
46713.83.211.23 161 udp snmp unknown
46723.83.211.23 162 tcp snmptrap filtered
46733.83.211.23 162 udp snmptrap unknown
46743.83.211.23 389 tcp ldap filtered
46753.83.211.23 389 udp ldap unknown
46763.83.211.23 443 tcp ssl/http open Microsoft IIS httpd 10.0
46773.83.211.23 520 tcp efs filtered
46783.83.211.23 520 udp route unknown
46793.83.211.23 2049 tcp nfs filtered
46803.83.211.23 2049 udp nfs unknown
46813.216.98.236 53 tcp domain filtered
46823.216.98.236 53 udp domain unknown
46833.216.98.236 67 tcp dhcps filtered
46843.216.98.236 67 udp dhcps unknown
46853.216.98.236 68 tcp dhcpc filtered
46863.216.98.236 68 udp dhcpc unknown
46873.216.98.236 69 tcp tftp filtered
46883.216.98.236 69 udp tftp unknown
46893.216.98.236 80 tcp http open Microsoft IIS httpd 10.0
46903.216.98.236 88 tcp kerberos-sec filtered
46913.216.98.236 88 udp kerberos-sec unknown
46923.216.98.236 123 tcp ntp filtered
46933.216.98.236 123 udp ntp unknown
46943.216.98.236 137 tcp netbios-ns filtered
46953.216.98.236 137 udp netbios-ns unknown
46963.216.98.236 138 tcp netbios-dgm filtered
46973.216.98.236 138 udp netbios-dgm unknown
46983.216.98.236 139 tcp netbios-ssn filtered
46993.216.98.236 139 udp netbios-ssn unknown
47003.216.98.236 161 tcp snmp filtered
47013.216.98.236 161 udp snmp unknown
47023.216.98.236 162 tcp snmptrap filtered
47033.216.98.236 162 udp snmptrap unknown
47043.216.98.236 389 tcp ldap filtered
47053.216.98.236 389 udp ldap unknown
47063.216.98.236 443 tcp ssl/http open Microsoft IIS httpd 10.0
47073.216.98.236 520 tcp efs filtered
47083.216.98.236 520 udp route unknown
47093.216.98.236 2049 tcp nfs filtered
47103.216.98.236 2049 udp nfs unknown
471134.236.0.217 53 tcp domain filtered
471234.236.0.217 53 udp domain unknown
471334.236.0.217 67 tcp dhcps filtered
471434.236.0.217 67 udp dhcps unknown
471534.236.0.217 68 tcp dhcpc filtered
471634.236.0.217 68 udp dhcpc unknown
471734.236.0.217 69 tcp tftp filtered
471834.236.0.217 69 udp tftp unknown
471934.236.0.217 80 tcp http open nginx
472034.236.0.217 88 tcp kerberos-sec filtered
472134.236.0.217 88 udp kerberos-sec unknown
472234.236.0.217 123 tcp ntp filtered
472334.236.0.217 123 udp ntp unknown
472434.236.0.217 137 tcp netbios-ns filtered
472534.236.0.217 137 udp netbios-ns unknown
472634.236.0.217 138 tcp netbios-dgm filtered
472734.236.0.217 138 udp netbios-dgm unknown
472834.236.0.217 139 tcp netbios-ssn filtered
472934.236.0.217 139 udp netbios-ssn unknown
473034.236.0.217 161 tcp snmp filtered
473134.236.0.217 161 udp snmp unknown
473234.236.0.217 162 tcp snmptrap filtered
473334.236.0.217 162 udp snmptrap unknown
473434.236.0.217 389 tcp ldap filtered
473534.236.0.217 389 udp ldap unknown
473634.236.0.217 443 tcp ssl/http open nginx
473734.236.0.217 520 tcp efs filtered
473834.236.0.217 520 udp route unknown
473934.236.0.217 2049 tcp nfs filtered
474034.236.0.217 2049 udp nfs unknown
474137.1.207.121 53 tcp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
474237.1.207.121 53 udp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
474337.1.207.121 67 tcp dhcps filtered
474437.1.207.121 67 udp dhcps unknown
474537.1.207.121 68 tcp dhcpc filtered
474637.1.207.121 68 udp dhcpc filtered
474737.1.207.121 69 tcp tftp filtered
474837.1.207.121 69 udp tftp unknown
474937.1.207.121 88 tcp kerberos-sec filtered
475037.1.207.121 88 udp kerberos-sec filtered
475137.1.207.121 123 tcp ntp filtered
475237.1.207.121 123 udp ntp unknown
475337.1.207.121 137 tcp netbios-ns filtered
475437.1.207.121 137 udp netbios-ns unknown
475537.1.207.121 138 tcp netbios-dgm filtered
475637.1.207.121 138 udp netbios-dgm unknown
475737.1.207.121 139 tcp netbios-ssn filtered
475837.1.207.121 139 udp netbios-ssn unknown
475937.1.207.121 161 tcp snmp filtered
476037.1.207.121 161 udp snmp unknown
476137.1.207.121 162 tcp snmptrap filtered
476237.1.207.121 162 udp snmptrap unknown
476337.1.207.121 389 tcp ldap filtered
476437.1.207.121 389 udp ldap unknown
476537.1.207.121 520 tcp efs filtered
476637.1.207.121 520 udp route unknown
476737.1.207.121 2049 tcp nfs filtered
476837.1.207.121 2049 udp nfs filtered
476943.245.223.4 80 tcp http open nginx
477043.245.223.4 443 tcp ssl/http open nginx
477143.245.223.4 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
477245.60.47.218 25 tcp http open Incapsula CDN httpd
477345.60.47.218 53 tcp domain open
477445.60.47.218 53 udp domain open
477545.60.47.218 67 udp dhcps unknown
477645.60.47.218 68 udp dhcpc unknown
477745.60.47.218 69 udp tftp unknown
477845.60.47.218 80 tcp http open Incapsula CDN httpd
477945.60.47.218 81 tcp http open Incapsula CDN httpd
478045.60.47.218 85 tcp http open Incapsula CDN httpd
478145.60.47.218 88 tcp http open Incapsula CDN httpd
478245.60.47.218 88 udp kerberos-sec unknown
478345.60.47.218 123 udp ntp unknown
478445.60.47.218 137 udp netbios-ns unknown
478545.60.47.218 138 udp netbios-dgm unknown
478645.60.47.218 139 udp netbios-ssn unknown
478745.60.47.218 161 udp snmp unknown
478845.60.47.218 162 udp snmptrap unknown
478945.60.47.218 389 tcp ssl/http open Incapsula CDN httpd
479045.60.47.218 389 udp ldap unknown
479145.60.47.218 443 tcp ssl/http open Incapsula CDN httpd
479245.60.47.218 444 tcp ssl/http open Incapsula CDN httpd
479345.60.47.218 445 tcp ssl/http open Incapsula CDN httpd
479445.60.47.218 446 tcp http open Incapsula CDN httpd
479545.60.47.218 520 udp route unknown
479645.60.47.218 587 tcp http open Incapsula CDN httpd
479745.60.47.218 631 tcp http open Incapsula CDN httpd
479845.60.47.218 888 tcp http open Incapsula CDN httpd
479945.60.47.218 995 tcp ssl/http open Incapsula CDN httpd
480045.60.47.218 998 tcp ssl/http open Incapsula CDN httpd
480145.60.47.218 999 tcp http open Incapsula CDN httpd
480245.60.47.218 1000 tcp http open Incapsula CDN httpd
480345.60.47.218 1024 tcp http open Incapsula CDN httpd
480445.60.47.218 1103 tcp http open Incapsula CDN httpd
480545.60.47.218 1234 tcp http open Incapsula CDN httpd
480645.60.47.218 1433 tcp http open Incapsula CDN httpd
480745.60.47.218 1494 tcp http open Incapsula CDN httpd
480845.60.47.218 2000 tcp ssl/http open Incapsula CDN httpd
480945.60.47.218 2001 tcp http open Incapsula CDN httpd
481045.60.47.218 2049 tcp http open Incapsula CDN httpd
481145.60.47.218 2049 udp nfs unknown
481245.60.47.218 2067 tcp http open Incapsula CDN httpd
481345.60.47.218 2100 tcp ssl/http open Incapsula CDN httpd
481445.60.47.218 2222 tcp http open Incapsula CDN httpd
481545.60.47.218 2598 tcp http open Incapsula CDN httpd
481645.60.47.218 3000 tcp http open Incapsula CDN httpd
481745.60.47.218 3050 tcp http open Incapsula CDN httpd
481845.60.47.218 3057 tcp http open Incapsula CDN httpd
481945.60.47.218 3299 tcp http open Incapsula CDN httpd
482045.60.47.218 3306 tcp ssl/http open Incapsula CDN httpd
482145.60.47.218 3333 tcp http open Incapsula CDN httpd
482245.60.47.218 3389 tcp ssl/http open Incapsula CDN httpd
482345.60.47.218 3500 tcp http open Incapsula CDN httpd
482445.60.47.218 3790 tcp http open Incapsula CDN httpd
482545.60.47.218 4000 tcp http open Incapsula CDN httpd
482645.60.47.218 4444 tcp ssl/http open Incapsula CDN httpd
482745.60.47.218 4445 tcp ssl/http open Incapsula CDN httpd
482845.60.47.218 4848 tcp http open Incapsula CDN httpd
482945.60.47.218 5000 tcp http open Incapsula CDN httpd
483045.60.47.218 5009 tcp http open Incapsula CDN httpd
483145.60.47.218 5051 tcp ssl/http open Incapsula CDN httpd
483245.60.47.218 5060 tcp ssl/http open Incapsula CDN httpd
483345.60.47.218 5061 tcp ssl/http open Incapsula CDN httpd
483445.60.47.218 5227 tcp ssl/http open Incapsula CDN httpd
483545.60.47.218 5247 tcp ssl/http open Incapsula CDN httpd
483645.60.47.218 5250 tcp ssl/http open Incapsula CDN httpd
483745.60.47.218 5555 tcp http open Incapsula CDN httpd
483845.60.47.218 5900 tcp http open Incapsula CDN httpd
483945.60.47.218 5901 tcp ssl/http open Incapsula CDN httpd
484045.60.47.218 5902 tcp ssl/http open Incapsula CDN httpd
484145.60.47.218 5903 tcp ssl/http open Incapsula CDN httpd
484245.60.47.218 5904 tcp ssl/http open Incapsula CDN httpd
484345.60.47.218 5905 tcp ssl/http open Incapsula CDN httpd
484445.60.47.218 5906 tcp ssl/http open Incapsula CDN httpd
484545.60.47.218 5907 tcp ssl/http open Incapsula CDN httpd
484645.60.47.218 5908 tcp ssl/http open Incapsula CDN httpd
484745.60.47.218 5909 tcp ssl/http open Incapsula CDN httpd
484845.60.47.218 5910 tcp ssl/http open Incapsula CDN httpd
484945.60.47.218 5920 tcp ssl/http open Incapsula CDN httpd
485045.60.47.218 5984 tcp ssl/http open Incapsula CDN httpd
485145.60.47.218 5985 tcp http open Incapsula CDN httpd
485245.60.47.218 5986 tcp ssl/http open Incapsula CDN httpd
485345.60.47.218 5999 tcp ssl/http open Incapsula CDN httpd
485445.60.47.218 6000 tcp http open Incapsula CDN httpd
485545.60.47.218 6060 tcp http open Incapsula CDN httpd
485645.60.47.218 6161 tcp http open Incapsula CDN httpd
485745.60.47.218 6379 tcp http open Incapsula CDN httpd
485845.60.47.218 6661 tcp ssl/http open Incapsula CDN httpd
485945.60.47.218 6789 tcp http open Incapsula CDN httpd
486045.60.47.218 7000 tcp ssl/http open Incapsula CDN httpd
486145.60.47.218 7001 tcp http open Incapsula CDN httpd
486245.60.47.218 7021 tcp http open Incapsula CDN httpd
486345.60.47.218 7071 tcp ssl/http open Incapsula CDN httpd
486445.60.47.218 7080 tcp http open Incapsula CDN httpd
486545.60.47.218 7272 tcp ssl/http open Incapsula CDN httpd
486645.60.47.218 7443 tcp ssl/http open Incapsula CDN httpd
486745.60.47.218 7700 tcp http open Incapsula CDN httpd
486845.60.47.218 7777 tcp http open Incapsula CDN httpd
486945.60.47.218 7778 tcp http open Incapsula CDN httpd
487045.60.47.218 8000 tcp http open Incapsula CDN httpd
487145.60.47.218 8001 tcp http open Incapsula CDN httpd
487245.60.47.218 8008 tcp http open Incapsula CDN httpd
487345.60.47.218 8014 tcp http open Incapsula CDN httpd
487445.60.47.218 8020 tcp http open Incapsula CDN httpd
487545.60.47.218 8023 tcp http open Incapsula CDN httpd
487645.60.47.218 8028 tcp http open Incapsula CDN httpd
487745.60.47.218 8030 tcp http open Incapsula CDN httpd
487845.60.47.218 8050 tcp http open Incapsula CDN httpd
487945.60.47.218 8051 tcp http open Incapsula CDN httpd
488045.60.47.218 8080 tcp http open Incapsula CDN httpd
488145.60.47.218 8081 tcp http open Incapsula CDN httpd
488245.60.47.218 8082 tcp http open Incapsula CDN httpd
488345.60.47.218 8085 tcp http open Incapsula CDN httpd
488445.60.47.218 8086 tcp http open Incapsula CDN httpd
488545.60.47.218 8087 tcp http open Incapsula CDN httpd
488645.60.47.218 8088 tcp http open Incapsula CDN httpd
488745.60.47.218 8090 tcp http open Incapsula CDN httpd
488845.60.47.218 8091 tcp http open Incapsula CDN httpd
488945.60.47.218 8095 tcp http open Incapsula CDN httpd
489045.60.47.218 8101 tcp http open Incapsula CDN httpd
489145.60.47.218 8161 tcp http open Incapsula CDN httpd
489245.60.47.218 8180 tcp http open Incapsula CDN httpd
489345.60.47.218 8222 tcp http open Incapsula CDN httpd
489445.60.47.218 8333 tcp http open Incapsula CDN httpd
489545.60.47.218 8443 tcp ssl/http open Incapsula CDN httpd
489645.60.47.218 8444 tcp http open Incapsula CDN httpd
489745.60.47.218 8445 tcp http open Incapsula CDN httpd
489845.60.47.218 8503 tcp ssl/http open Incapsula CDN httpd
489945.60.47.218 8686 tcp http open Incapsula CDN httpd
490045.60.47.218 8701 tcp ssl/http open Incapsula CDN httpd
490145.60.47.218 8787 tcp http open Incapsula CDN httpd
490245.60.47.218 8800 tcp http open Incapsula CDN httpd
490345.60.47.218 8812 tcp http open Incapsula CDN httpd
490445.60.47.218 8834 tcp http open Incapsula CDN httpd
490545.60.47.218 8880 tcp http open Incapsula CDN httpd
490645.60.47.218 8888 tcp http open Incapsula CDN httpd
490745.60.47.218 8889 tcp http open Incapsula CDN httpd
490845.60.47.218 8890 tcp http open Incapsula CDN httpd
490945.60.47.218 8899 tcp http open Incapsula CDN httpd
491045.60.47.218 8901 tcp http open Incapsula CDN httpd
491145.60.47.218 8902 tcp http open Incapsula CDN httpd
491245.60.47.218 8999 tcp http open Incapsula CDN httpd
491345.60.47.218 9000 tcp http open Incapsula CDN httpd
491445.60.47.218 9001 tcp http open Incapsula CDN httpd
491545.60.47.218 9002 tcp http open Incapsula CDN httpd
491645.60.47.218 9003 tcp http open Incapsula CDN httpd
491745.60.47.218 9004 tcp http open Incapsula CDN httpd
491845.60.47.218 9005 tcp http open Incapsula CDN httpd
491945.60.47.218 9010 tcp http open Incapsula CDN httpd
492045.60.47.218 9050 tcp http open Incapsula CDN httpd
492145.60.47.218 9080 tcp http open Incapsula CDN httpd
492245.60.47.218 9081 tcp ssl/http open Incapsula CDN httpd
492345.60.47.218 9084 tcp http open Incapsula CDN httpd
492445.60.47.218 9090 tcp http open Incapsula CDN httpd
492545.60.47.218 9099 tcp http open Incapsula CDN httpd
492645.60.47.218 9100 tcp jetdirect open
492745.60.47.218 9111 tcp http open Incapsula CDN httpd
492845.60.47.218 9200 tcp http open Incapsula CDN httpd
492945.60.47.218 9300 tcp http open Incapsula CDN httpd
493045.60.47.218 9500 tcp http open Incapsula CDN httpd
493145.60.47.218 9711 tcp ssl/http open Incapsula CDN httpd
493245.60.47.218 9991 tcp http open Incapsula CDN httpd
493345.60.47.218 9999 tcp http open Incapsula CDN httpd
493445.60.47.218 10000 tcp http open Incapsula CDN httpd
493545.60.47.218 10001 tcp http open Incapsula CDN httpd
493645.60.47.218 10008 tcp http open Incapsula CDN httpd
493745.60.47.218 10443 tcp ssl/http open Incapsula CDN httpd
493845.60.47.218 11001 tcp ssl/http open Incapsula CDN httpd
493945.60.47.218 12174 tcp http open Incapsula CDN httpd
494045.60.47.218 12203 tcp http open Incapsula CDN httpd
494145.60.47.218 12221 tcp http open Incapsula CDN httpd
494245.60.47.218 12345 tcp http open Incapsula CDN httpd
494345.60.47.218 12397 tcp http open Incapsula CDN httpd
494445.60.47.218 12401 tcp http open Incapsula CDN httpd
494545.60.47.218 14330 tcp http open Incapsula CDN httpd
494645.60.47.218 16000 tcp http open Incapsula CDN httpd
494745.60.47.218 20000 tcp http open Incapsula CDN httpd
494845.60.47.218 20010 tcp ssl/http open Incapsula CDN httpd
494945.60.47.218 25000 tcp ssl/http open Incapsula CDN httpd
495045.60.47.218 30000 tcp http open Incapsula CDN httpd
495145.60.47.218 44334 tcp ssl/http open Incapsula CDN httpd
495245.60.47.218 50000 tcp http open Incapsula CDN httpd
495345.60.47.218 50001 tcp ssl/http open Incapsula CDN httpd
495445.60.47.218 50050 tcp ssl/http open Incapsula CDN httpd
495545.88.202.111 22 tcp ssh open OpenSSH 7.9p1 Debian 10+deb10u1 protocol 2.0
495645.88.202.111 53 tcp domain open PowerDNS Authoritative Server 4.2.0-rc3
495745.88.202.111 53 udp domain open PowerDNS Authoritative Server 4.2.0-rc3
495845.88.202.111 67 tcp dhcps closed
495945.88.202.111 67 udp dhcps unknown
496045.88.202.111 68 tcp dhcpc closed
496145.88.202.111 68 udp dhcpc unknown
496245.88.202.111 69 tcp tftp closed
496345.88.202.111 69 udp tftp closed
496445.88.202.111 80 tcp http open nginx
496545.88.202.111 88 tcp kerberos-sec closed
496645.88.202.111 88 udp kerberos-sec unknown
496745.88.202.111 123 tcp ntp closed
496845.88.202.111 123 udp ntp closed
496945.88.202.111 137 tcp netbios-ns closed
497045.88.202.111 137 udp netbios-ns filtered
497145.88.202.111 138 tcp netbios-dgm closed
497245.88.202.111 138 udp netbios-dgm filtered
497345.88.202.111 139 tcp netbios-ssn closed
497445.88.202.111 139 udp netbios-ssn closed
497545.88.202.111 161 tcp snmp closed
497645.88.202.111 161 udp snmp closed
497745.88.202.111 162 tcp snmptrap closed
497845.88.202.111 162 udp snmptrap closed
497945.88.202.111 179 tcp bgp filtered
498045.88.202.111 389 tcp ldap closed
498145.88.202.111 389 udp ldap unknown
498245.88.202.111 443 tcp ssl/http open nginx
498345.88.202.111 520 tcp efs closed
498445.88.202.111 520 udp route unknown
498545.88.202.111 2049 tcp nfs closed
498645.88.202.111 2049 udp nfs closed
498745.88.202.111 10050 tcp tcpwrapped open
498852.1.174.10 53 tcp domain filtered
498952.1.174.10 53 udp domain unknown
499052.1.174.10 67 tcp dhcps filtered
499152.1.174.10 67 udp dhcps unknown
499252.1.174.10 68 tcp dhcpc filtered
499352.1.174.10 68 udp dhcpc unknown
499452.1.174.10 69 tcp tftp filtered
499552.1.174.10 69 udp tftp unknown
499652.1.174.10 80 tcp http open nginx
499752.1.174.10 88 tcp kerberos-sec filtered
499852.1.174.10 88 udp kerberos-sec unknown
499952.1.174.10 123 tcp ntp filtered
500052.1.174.10 123 udp ntp unknown
500152.1.174.10 137 tcp netbios-ns filtered
500252.1.174.10 137 udp netbios-ns unknown
500352.1.174.10 138 tcp netbios-dgm filtered
500452.1.174.10 138 udp netbios-dgm unknown
500552.1.174.10 139 tcp netbios-ssn filtered
500652.1.174.10 139 udp netbios-ssn unknown
500752.1.174.10 161 tcp snmp filtered
500852.1.174.10 161 udp snmp unknown
500952.1.174.10 162 tcp snmptrap filtered
501052.1.174.10 162 udp snmptrap unknown
501152.1.174.10 389 tcp ldap filtered
501252.1.174.10 389 udp ldap unknown
501352.1.174.10 443 tcp ssl/http open nginx
501452.1.174.10 520 tcp efs filtered
501552.1.174.10 520 udp route unknown
501652.1.174.10 2049 tcp nfs filtered
501752.1.174.10 2049 udp nfs unknown
501852.52.234.222 53 tcp domain filtered
501952.52.234.222 53 udp domain unknown
502052.52.234.222 67 tcp dhcps filtered
502152.52.234.222 67 udp dhcps unknown
502252.52.234.222 68 tcp dhcpc filtered
502352.52.234.222 68 udp dhcpc unknown
502452.52.234.222 69 tcp tftp filtered
502552.52.234.222 69 udp tftp unknown
502652.52.234.222 88 tcp kerberos-sec filtered
502752.52.234.222 88 udp kerberos-sec unknown
502852.52.234.222 123 tcp ntp filtered
502952.52.234.222 123 udp ntp unknown
503052.52.234.222 137 tcp netbios-ns filtered
503152.52.234.222 137 udp netbios-ns unknown
503252.52.234.222 138 tcp netbios-dgm filtered
503352.52.234.222 138 udp netbios-dgm unknown
503452.52.234.222 139 tcp netbios-ssn filtered
503552.52.234.222 139 udp netbios-ssn unknown
503652.52.234.222 161 tcp snmp filtered
503752.52.234.222 161 udp snmp unknown
503852.52.234.222 162 tcp snmptrap filtered
503952.52.234.222 162 udp snmptrap unknown
504052.52.234.222 389 tcp ldap filtered
504152.52.234.222 389 udp ldap unknown
504252.52.234.222 520 tcp efs filtered
504352.52.234.222 520 udp route unknown
504452.52.234.222 2049 tcp nfs filtered
504552.52.234.222 2049 udp nfs unknown
504654.85.59.109 53 tcp domain filtered
504754.85.59.109 53 udp domain unknown
504854.85.59.109 67 tcp dhcps filtered
504954.85.59.109 67 udp dhcps unknown
505054.85.59.109 68 tcp dhcpc filtered
505154.85.59.109 68 udp dhcpc unknown
505254.85.59.109 69 tcp tftp filtered
505354.85.59.109 69 udp tftp unknown
505454.85.59.109 80 tcp http open nginx
505554.85.59.109 88 tcp kerberos-sec filtered
505654.85.59.109 88 udp kerberos-sec unknown
505754.85.59.109 123 tcp ntp filtered
505854.85.59.109 123 udp ntp unknown
505954.85.59.109 137 tcp netbios-ns filtered
506054.85.59.109 137 udp netbios-ns unknown
506154.85.59.109 138 tcp netbios-dgm filtered
506254.85.59.109 138 udp netbios-dgm unknown
506354.85.59.109 139 tcp netbios-ssn filtered
506454.85.59.109 139 udp netbios-ssn unknown
506554.85.59.109 161 tcp snmp filtered
506654.85.59.109 161 udp snmp unknown
506754.85.59.109 162 tcp snmptrap filtered
506854.85.59.109 162 udp snmptrap unknown
506954.85.59.109 389 tcp ldap filtered
507054.85.59.109 389 udp ldap unknown
507154.85.59.109 443 tcp ssl/http open nginx
507254.85.59.109 520 tcp efs filtered
507354.85.59.109 520 udp route unknown
507454.85.59.109 2049 tcp nfs filtered
507554.85.59.109 2049 udp nfs unknown
507664.69.94.253 53 tcp domain filtered
507764.69.94.253 53 udp domain unknown
507864.69.94.253 67 tcp dhcps filtered
507964.69.94.253 67 udp dhcps unknown
508064.69.94.253 68 tcp dhcpc filtered
508164.69.94.253 68 udp dhcpc unknown
508264.69.94.253 69 tcp tftp filtered
508364.69.94.253 69 udp tftp unknown
508464.69.94.253 88 tcp kerberos-sec filtered
508564.69.94.253 88 udp kerberos-sec unknown
508664.69.94.253 123 tcp ntp filtered
508764.69.94.253 123 udp ntp unknown
508864.69.94.253 137 tcp netbios-ns filtered
508964.69.94.253 137 udp netbios-ns unknown
509064.69.94.253 138 tcp netbios-dgm filtered
509164.69.94.253 138 udp netbios-dgm unknown
509264.69.94.253 139 tcp netbios-ssn filtered
509364.69.94.253 139 udp netbios-ssn unknown
509464.69.94.253 161 tcp snmp filtered
509564.69.94.253 161 udp snmp unknown
509664.69.94.253 162 tcp snmptrap filtered
509764.69.94.253 162 udp snmptrap unknown
509864.69.94.253 389 tcp ldap filtered
509964.69.94.253 389 udp ldap unknown
510064.69.94.253 520 tcp efs filtered
510164.69.94.253 520 udp route unknown
510264.69.94.253 2049 tcp nfs filtered
510364.69.94.253 2049 udp nfs unknown
510469.163.233.4 21 tcp ftp open 220 DreamHost FTP Server\x0d\x0a
510569.163.233.4 22 tcp ssh open SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.13
510669.163.233.4 25 tcp open
510769.163.233.4 53 tcp domain closed
510869.163.233.4 53 udp domain unknown
510969.163.233.4 67 tcp dhcps closed
511069.163.233.4 67 udp dhcps closed
511169.163.233.4 68 tcp dhcpc closed
511269.163.233.4 68 udp dhcpc unknown
511369.163.233.4 69 tcp tftp closed
511469.163.233.4 69 udp tftp closed
511569.163.233.4 88 tcp kerberos-sec closed
511669.163.233.4 88 udp kerberos-sec unknown
511769.163.233.4 123 tcp ntp closed
511869.163.233.4 123 udp ntp unknown
511969.163.233.4 137 tcp netbios-ns closed
512069.163.233.4 137 udp netbios-ns closed
512169.163.233.4 138 tcp netbios-dgm closed
512269.163.233.4 138 udp netbios-dgm closed
512369.163.233.4 139 tcp netbios-ssn closed
512469.163.233.4 139 udp netbios-ssn unknown
512569.163.233.4 161 tcp snmp closed
512669.163.233.4 161 udp snmp closed
512769.163.233.4 162 tcp snmptrap closed
512869.163.233.4 162 udp snmptrap closed
512969.163.233.4 389 tcp ldap closed
513069.163.233.4 389 udp ldap unknown
513169.163.233.4 520 tcp efs closed
513269.163.233.4 520 udp route closed
513369.163.233.4 2049 tcp nfs closed
513469.163.233.4 2049 udp nfs unknown
513574.117.180.192 21 tcp ftp filtered 220 Hello.\x0d\x0a
513674.117.180.192 22 tcp ssh filtered
513774.117.180.192 25 tcp smtp filtered
513874.117.180.192 53 tcp domain closed
513974.117.180.192 53 udp domain unknown
514074.117.180.192 67 tcp dhcps closed
514174.117.180.192 67 udp dhcps unknown
514274.117.180.192 68 tcp dhcpc closed
514374.117.180.192 68 udp dhcpc closed
514474.117.180.192 69 tcp tftp closed
514574.117.180.192 69 udp tftp closed
514674.117.180.192 80 tcp http filtered
514774.117.180.192 88 tcp kerberos-sec closed
514874.117.180.192 88 udp kerberos-sec closed
514974.117.180.192 110 tcp pop3 filtered
515074.117.180.192 111 tcp rpcbind filtered
515174.117.180.192 123 tcp ntp closed
515274.117.180.192 123 udp ntp unknown
515374.117.180.192 137 tcp netbios-ns closed
515474.117.180.192 137 udp netbios-ns closed
515574.117.180.192 138 tcp netbios-dgm closed
515674.117.180.192 138 udp netbios-dgm unknown
515774.117.180.192 139 tcp netbios-ssn closed
515874.117.180.192 139 udp netbios-ssn unknown
515974.117.180.192 143 tcp imap filtered
516074.117.180.192 161 tcp snmp closed
516174.117.180.192 161 udp snmp closed
516274.117.180.192 162 tcp snmptrap closed
516374.117.180.192 162 udp snmptrap unknown
516474.117.180.192 323 tcp rpki-rtr filtered
516574.117.180.192 389 tcp ldap closed
516674.117.180.192 389 udp ldap closed
516774.117.180.192 443 tcp https filtered
516874.117.180.192 465 tcp ssl/smtp open Exim smtpd 4.92.3
516974.117.180.192 520 tcp efs closed
517074.117.180.192 520 udp route unknown
517174.117.180.192 587 tcp submission filtered
517274.117.180.192 873 tcp rsync filtered
517374.117.180.192 993 tcp imaps filtered
517474.117.180.192 995 tcp pop3s filtered
517574.117.180.192 2049 tcp nfs closed
517674.117.180.192 2049 udp nfs closed
517774.117.180.192 2525 tcp smtp open Exim smtpd
517874.117.180.192 3306 tcp mysql filtered
517974.117.180.192 4949 tcp tcpwrapped open
518074.117.180.192 5666 tcp tcpwrapped open
518174.117.180.192 6380 tcp filtered
518274.117.180.192 9306 tcp sphinx-search open Sphinx Search daemon 2.1.5-id64-release
518374.117.180.192 11211 tcp memcache filtered
518482.94.222.131 53 udp domain unknown
518582.94.222.131 67 udp dhcps unknown
518682.94.222.131 68 udp dhcpc unknown
518782.94.222.131 69 udp tftp unknown
518882.94.222.131 88 udp kerberos-sec unknown
518982.94.222.131 123 udp ntp unknown
519082.94.222.131 137 udp netbios-ns unknown
519182.94.222.131 138 udp netbios-dgm unknown
519282.94.222.131 139 udp netbios-ssn unknown
519382.94.222.131 161 udp snmp unknown
519482.94.222.131 162 udp snmptrap unknown
519582.94.222.131 389 udp ldap unknown
519682.94.222.131 520 udp route unknown
519782.94.222.131 2049 udp nfs unknown
519892.123.250.35 53 tcp domain closed
519992.123.250.35 53 udp domain closed
520092.123.250.35 67 tcp dhcps filtered
520192.123.250.35 67 udp dhcps unknown
520292.123.250.35 68 tcp dhcpc filtered
520392.123.250.35 68 udp dhcpc unknown
520492.123.250.35 69 tcp tftp filtered
520592.123.250.35 69 udp tftp unknown
520692.123.250.35 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
520792.123.250.35 88 tcp kerberos-sec filtered
520892.123.250.35 88 udp kerberos-sec unknown
520992.123.250.35 123 tcp ntp filtered
521092.123.250.35 123 udp ntp unknown
521192.123.250.35 137 tcp netbios-ns filtered
521292.123.250.35 137 udp netbios-ns unknown
521392.123.250.35 138 tcp netbios-dgm filtered
521492.123.250.35 138 udp netbios-dgm unknown
521592.123.250.35 139 tcp netbios-ssn filtered
521692.123.250.35 139 udp netbios-ssn unknown
521792.123.250.35 161 tcp snmp filtered
521892.123.250.35 161 udp snmp unknown
521992.123.250.35 162 tcp snmptrap filtered
522092.123.250.35 162 udp snmptrap unknown
522192.123.250.35 389 tcp ldap filtered
522292.123.250.35 389 udp ldap unknown
522392.123.250.35 443 tcp ssl/https open
522492.123.250.35 520 tcp efs filtered
522592.123.250.35 520 udp route unknown
522692.123.250.35 2049 tcp nfs filtered
522792.123.250.35 2049 udp nfs unknown
522892.123.250.35 8883 tcp secure-mqtt open
522992.123.250.65 53 tcp domain filtered
523092.123.250.65 53 udp domain unknown
523192.123.250.65 67 tcp dhcps filtered
523292.123.250.65 67 udp dhcps unknown
523392.123.250.65 68 tcp dhcpc filtered
523492.123.250.65 68 udp dhcpc unknown
523592.123.250.65 69 tcp tftp filtered
523692.123.250.65 69 udp tftp unknown
523792.123.250.65 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
523892.123.250.65 88 tcp kerberos-sec filtered
523992.123.250.65 88 udp kerberos-sec unknown
524092.123.250.65 123 tcp ntp filtered
524192.123.250.65 123 udp ntp unknown
524292.123.250.65 137 tcp netbios-ns filtered
524392.123.250.65 137 udp netbios-ns unknown
524492.123.250.65 138 tcp netbios-dgm filtered
524592.123.250.65 138 udp netbios-dgm unknown
524692.123.250.65 139 tcp netbios-ssn filtered
524792.123.250.65 139 udp netbios-ssn unknown
524892.123.250.65 161 tcp snmp filtered
524992.123.250.65 161 udp snmp unknown
525092.123.250.65 162 tcp snmptrap filtered
525192.123.250.65 162 udp snmptrap unknown
525292.123.250.65 389 tcp ldap filtered
525392.123.250.65 389 udp ldap unknown
525492.123.250.65 443 tcp ssl/https open
525592.123.250.65 520 tcp efs filtered
525692.123.250.65 520 udp route unknown
525792.123.250.65 2049 tcp nfs filtered
525892.123.250.65 2049 udp nfs unknown
525992.123.250.65 8883 tcp secure-mqtt open
5260104.244.73.40 53 udp domain unknown
5261104.244.73.40 67 udp dhcps unknown
5262104.244.73.40 68 udp dhcpc unknown
5263104.244.73.40 69 udp tftp unknown
5264104.244.73.40 88 udp kerberos-sec unknown
5265104.244.73.40 123 udp ntp unknown
5266104.244.73.40 137 udp netbios-ns unknown
5267104.244.73.40 138 udp netbios-dgm unknown
5268104.244.73.40 139 udp netbios-ssn unknown
5269104.244.73.40 161 udp snmp unknown
5270104.244.73.40 162 udp snmptrap unknown
5271104.244.73.40 389 udp ldap unknown
5272104.244.73.40 520 udp route unknown
5273104.244.73.40 2049 udp nfs unknown
5274104.244.76.231 53 tcp domain filtered
5275104.244.76.231 53 udp domain unknown
5276104.244.76.231 67 tcp dhcps filtered
5277104.244.76.231 67 udp dhcps unknown
5278104.244.76.231 68 tcp dhcpc filtered
5279104.244.76.231 68 udp dhcpc unknown
5280104.244.76.231 69 tcp tftp filtered
5281104.244.76.231 69 udp tftp unknown
5282104.244.76.231 80 tcp http open nginx
5283104.244.76.231 88 tcp kerberos-sec filtered
5284104.244.76.231 88 udp kerberos-sec unknown
5285104.244.76.231 123 tcp ntp filtered
5286104.244.76.231 123 udp ntp unknown
5287104.244.76.231 137 tcp netbios-ns filtered
5288104.244.76.231 137 udp netbios-ns unknown
5289104.244.76.231 138 tcp netbios-dgm filtered
5290104.244.76.231 138 udp netbios-dgm unknown
5291104.244.76.231 139 tcp netbios-ssn filtered
5292104.244.76.231 139 udp netbios-ssn unknown
5293104.244.76.231 161 tcp snmp filtered
5294104.244.76.231 161 udp snmp unknown
5295104.244.76.231 162 tcp snmptrap filtered
5296104.244.76.231 162 udp snmptrap unknown
5297104.244.76.231 389 tcp ldap filtered
5298104.244.76.231 389 udp ldap unknown
5299104.244.76.231 443 tcp ssl/http open nginx
5300104.244.76.231 520 tcp efs filtered
5301104.244.76.231 520 udp route unknown
5302104.244.76.231 2049 tcp nfs filtered
5303104.244.76.231 2049 udp nfs unknown
5304104.244.76.231 5040 tcp unknown closed
5305104.244.76.231 16001 tcp ssl/http open MiniServ 1.910 Webmin httpd
5306104.244.76.231 16221 tcp closed
5307104.244.76.231 23022 tcp closed
5308104.244.76.231 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
5309104.244.77.188 53 tcp domain filtered
5310104.244.77.188 53 udp domain unknown
5311104.244.77.188 67 tcp dhcps filtered
5312104.244.77.188 67 udp dhcps unknown
5313104.244.77.188 68 tcp dhcpc filtered
5314104.244.77.188 68 udp dhcpc unknown
5315104.244.77.188 69 tcp tftp filtered
5316104.244.77.188 69 udp tftp unknown
5317104.244.77.188 80 tcp http open nginx
5318104.244.77.188 88 tcp kerberos-sec filtered
5319104.244.77.188 88 udp kerberos-sec unknown
5320104.244.77.188 123 tcp ntp filtered
5321104.244.77.188 123 udp ntp unknown
5322104.244.77.188 137 tcp netbios-ns filtered
5323104.244.77.188 137 udp netbios-ns unknown
5324104.244.77.188 138 tcp netbios-dgm filtered
5325104.244.77.188 138 udp netbios-dgm unknown
5326104.244.77.188 139 tcp netbios-ssn filtered
5327104.244.77.188 139 udp netbios-ssn unknown
5328104.244.77.188 161 tcp snmp filtered
5329104.244.77.188 161 udp snmp unknown
5330104.244.77.188 162 tcp snmptrap filtered
5331104.244.77.188 162 udp snmptrap unknown
5332104.244.77.188 389 tcp ldap filtered
5333104.244.77.188 389 udp ldap unknown
5334104.244.77.188 443 tcp ssl/http open nginx
5335104.244.77.188 520 tcp efs filtered
5336104.244.77.188 520 udp route unknown
5337104.244.77.188 2049 tcp nfs filtered
5338104.244.77.188 2049 udp nfs unknown
5339104.244.77.188 5040 tcp unknown closed
5340104.244.77.188 16001 tcp ssl/http open MiniServ 1.910 Webmin httpd
5341104.244.77.188 16221 tcp closed
5342104.244.77.188 23022 tcp closed
5343104.244.77.188 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
5344104.244.79.89 53 tcp domain filtered
5345104.244.79.89 53 udp domain unknown
5346104.244.79.89 67 tcp dhcps filtered
5347104.244.79.89 67 udp dhcps unknown
5348104.244.79.89 68 tcp dhcpc filtered
5349104.244.79.89 68 udp dhcpc unknown
5350104.244.79.89 69 tcp tftp filtered
5351104.244.79.89 69 udp tftp unknown
5352104.244.79.89 80 tcp http open nginx
5353104.244.79.89 88 tcp kerberos-sec filtered
5354104.244.79.89 88 udp kerberos-sec unknown
5355104.244.79.89 123 tcp ntp filtered
5356104.244.79.89 123 udp ntp unknown
5357104.244.79.89 137 tcp netbios-ns filtered
5358104.244.79.89 137 udp netbios-ns unknown
5359104.244.79.89 138 tcp netbios-dgm filtered
5360104.244.79.89 138 udp netbios-dgm unknown
5361104.244.79.89 139 tcp netbios-ssn filtered
5362104.244.79.89 139 udp netbios-ssn unknown
5363104.244.79.89 161 tcp snmp filtered
5364104.244.79.89 161 udp snmp unknown
5365104.244.79.89 162 tcp snmptrap filtered
5366104.244.79.89 162 udp snmptrap unknown
5367104.244.79.89 389 tcp ldap filtered
5368104.244.79.89 389 udp ldap unknown
5369104.244.79.89 443 tcp ssl/http open nginx
5370104.244.79.89 520 tcp efs filtered
5371104.244.79.89 520 udp route unknown
5372104.244.79.89 2049 tcp nfs filtered
5373104.244.79.89 2049 udp nfs unknown
5374104.244.79.89 7910 tcp ssl/http open nginx
5375104.244.79.89 7920 tcp unknown closed
5376104.244.79.89 7930 tcp closed
5377104.244.79.89 16001 tcp http open MiniServ 1.930 Webmin httpd
5378104.244.79.89 16010 tcp ssl/http open nginx
5379104.244.79.89 16221 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
5380104.244.79.89 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
5381111.90.145.39 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 15:04. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
5382111.90.145.39 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
5383111.90.145.39 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
5384111.90.145.39 67 tcp dhcps closed
5385111.90.145.39 67 udp dhcps closed
5386111.90.145.39 68 tcp dhcpc closed
5387111.90.145.39 68 udp dhcpc unknown
5388111.90.145.39 69 tcp tftp closed
5389111.90.145.39 69 udp tftp unknown
5390111.90.145.39 88 tcp kerberos-sec closed
5391111.90.145.39 88 udp kerberos-sec unknown
5392111.90.145.39 123 tcp ntp closed
5393111.90.145.39 123 udp ntp closed
5394111.90.145.39 137 tcp netbios-ns closed
5395111.90.145.39 137 udp netbios-ns unknown
5396111.90.145.39 138 tcp netbios-dgm closed
5397111.90.145.39 138 udp netbios-dgm unknown
5398111.90.145.39 139 tcp netbios-ssn filtered
5399111.90.145.39 139 udp netbios-ssn closed
5400111.90.145.39 161 tcp snmp closed
5401111.90.145.39 161 udp snmp unknown
5402111.90.145.39 162 tcp snmptrap closed
5403111.90.145.39 162 udp snmptrap closed
5404111.90.145.39 389 tcp ldap closed
5405111.90.145.39 389 udp ldap unknown
5406111.90.145.39 520 tcp efs closed
5407111.90.145.39 520 udp route closed
5408111.90.145.39 2049 tcp nfs closed
5409111.90.145.39 2049 udp nfs closed
5410143.95.110.248 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 150 allowed.\x0d\x0a220-Local time is now 05:55. Server port: 21.\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
5411143.95.110.248 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
5412143.95.110.248 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
5413143.95.110.248 67 tcp dhcps closed
5414143.95.110.248 67 udp dhcps unknown
5415143.95.110.248 68 tcp dhcpc closed
5416143.95.110.248 68 udp dhcpc unknown
5417143.95.110.248 69 tcp tftp closed
5418143.95.110.248 69 udp tftp unknown
5419143.95.110.248 88 tcp kerberos-sec closed
5420143.95.110.248 88 udp kerberos-sec unknown
5421143.95.110.248 123 tcp ntp closed
5422143.95.110.248 123 udp ntp unknown
5423143.95.110.248 137 tcp netbios-ns closed
5424143.95.110.248 137 udp netbios-ns unknown
5425143.95.110.248 138 tcp netbios-dgm closed
5426143.95.110.248 138 udp netbios-dgm closed
5427143.95.110.248 139 tcp netbios-ssn closed
5428143.95.110.248 139 udp netbios-ssn unknown
5429143.95.110.248 161 tcp snmp closed
5430143.95.110.248 161 udp snmp closed
5431143.95.110.248 162 tcp snmptrap closed
5432143.95.110.248 162 udp snmptrap unknown
5433143.95.110.248 389 tcp ldap closed
5434143.95.110.248 389 udp ldap closed
5435143.95.110.248 520 tcp efs closed
5436143.95.110.248 520 udp route unknown
5437143.95.110.248 2049 tcp nfs closed
5438143.95.110.248 2049 udp nfs unknown
5439149.126.72.220 25 tcp smtp closed
5440149.126.72.220 51 tcp tcpwrapped open
5441149.126.72.220 53 tcp domain open
5442149.126.72.220 53 udp domain open
5443149.126.72.220 65 tcp tcpwrapped open
5444149.126.72.220 66 tcp tcpwrapped open
5445149.126.72.220 67 tcp dhcps filtered
5446149.126.72.220 67 udp dhcps unknown
5447149.126.72.220 68 tcp dhcpc filtered
5448149.126.72.220 68 udp dhcpc unknown
5449149.126.72.220 69 tcp tftp filtered
5450149.126.72.220 69 udp tftp unknown
5451149.126.72.220 80 tcp tcpwrapped open
5452149.126.72.220 81 tcp tcpwrapped open
5453149.126.72.220 82 tcp tcpwrapped open
5454149.126.72.220 83 tcp tcpwrapped open
5455149.126.72.220 84 tcp tcpwrapped open
5456149.126.72.220 85 tcp tcpwrapped open
5457149.126.72.220 86 tcp tcpwrapped open
5458149.126.72.220 88 tcp http open Incapsula CDN httpd
5459149.126.72.220 88 udp kerberos-sec unknown
5460149.126.72.220 89 tcp tcpwrapped open
5461149.126.72.220 90 tcp tcpwrapped open
5462149.126.72.220 91 tcp tcpwrapped open
5463149.126.72.220 92 tcp tcpwrapped open
5464149.126.72.220 98 tcp tcpwrapped open
5465149.126.72.220 99 tcp tcpwrapped open
5466149.126.72.220 123 tcp ntp filtered
5467149.126.72.220 123 udp ntp unknown
5468149.126.72.220 137 tcp netbios-ns filtered
5469149.126.72.220 137 udp netbios-ns filtered
5470149.126.72.220 138 tcp netbios-dgm filtered
5471149.126.72.220 138 udp netbios-dgm filtered
5472149.126.72.220 139 tcp netbios-ssn closed
5473149.126.72.220 139 udp netbios-ssn unknown
5474149.126.72.220 160 tcp sgmp-traps closed
5475149.126.72.220 161 tcp snmp filtered
5476149.126.72.220 161 udp snmp unknown
5477149.126.72.220 162 tcp snmptrap filtered
5478149.126.72.220 162 udp snmptrap unknown
5479149.126.72.220 189 tcp tcpwrapped open
5480149.126.72.220 190 tcp tcpwrapped open
5481149.126.72.220 192 tcp tcpwrapped open
5482149.126.72.220 243 tcp tcpwrapped open
5483149.126.72.220 285 tcp tcpwrapped open
5484149.126.72.220 314 tcp tcpwrapped open
5485149.126.72.220 343 tcp tcpwrapped open
5486149.126.72.220 347 tcp tcpwrapped open
5487149.126.72.220 385 tcp tcpwrapped open
5488149.126.72.220 389 tcp ssl/http open Incapsula CDN httpd
5489149.126.72.220 389 udp ldap unknown
5490149.126.72.220 400 tcp tcpwrapped open
5491149.126.72.220 440 tcp tcpwrapped open
5492149.126.72.220 441 tcp tcpwrapped open
5493149.126.72.220 442 tcp tcpwrapped open
5494149.126.72.220 443 tcp ssl/tcpwrapped open
5495149.126.72.220 444 tcp tcpwrapped open
5496149.126.72.220 445 tcp microsoft-ds closed
5497149.126.72.220 446 tcp tcpwrapped open
5498149.126.72.220 447 tcp tcpwrapped open
5499149.126.72.220 448 tcp tcpwrapped open
5500149.126.72.220 449 tcp tcpwrapped open
5501149.126.72.220 452 tcp tcpwrapped open
5502149.126.72.220 461 tcp tcpwrapped open
5503149.126.72.220 462 tcp tcpwrapped open
5504149.126.72.220 480 tcp tcpwrapped open
5505149.126.72.220 485 tcp tcpwrapped open
5506149.126.72.220 487 tcp tcpwrapped open
5507149.126.72.220 488 tcp tcpwrapped open
5508149.126.72.220 491 tcp tcpwrapped open
5509149.126.72.220 520 tcp efs filtered
5510149.126.72.220 520 udp route unknown
5511149.126.72.220 555 tcp tcpwrapped open
5512149.126.72.220 556 tcp tcpwrapped open
5513149.126.72.220 587 tcp tcpwrapped open
5514149.126.72.220 631 tcp tcpwrapped open
5515149.126.72.220 632 tcp tcpwrapped open
5516149.126.72.220 636 tcp tcpwrapped open
5517149.126.72.220 743 tcp tcpwrapped open
5518149.126.72.220 772 tcp tcpwrapped open
5519149.126.72.220 777 tcp tcpwrapped open
5520149.126.72.220 782 tcp tcpwrapped open
5521149.126.72.220 785 tcp tcpwrapped open
5522149.126.72.220 800 tcp tcpwrapped open
5523149.126.72.220 801 tcp tcpwrapped open
5524149.126.72.220 805 tcp tcpwrapped open
5525149.126.72.220 806 tcp tcpwrapped open
5526149.126.72.220 809 tcp tcpwrapped open
5527149.126.72.220 843 tcp tcpwrapped open
5528149.126.72.220 853 tcp tcpwrapped open
5529149.126.72.220 885 tcp tcpwrapped open
5530149.126.72.220 886 tcp tcpwrapped open
5531149.126.72.220 887 tcp tcpwrapped open
5532149.126.72.220 888 tcp tcpwrapped open
5533149.126.72.220 943 tcp tcpwrapped open
5534149.126.72.220 947 tcp tcpwrapped open
5535149.126.72.220 953 tcp tcpwrapped open
5536149.126.72.220 990 tcp tcpwrapped open
5537149.126.72.220 995 tcp tcpwrapped open
5538149.126.72.220 998 tcp tcpwrapped open
5539149.126.72.220 999 tcp tcpwrapped open
5540149.126.72.220 1000 tcp tcpwrapped open
5541149.126.72.220 1002 tcp tcpwrapped open
5542149.126.72.220 1024 tcp tcpwrapped open
5543149.126.72.220 1025 tcp tcpwrapped open
5544149.126.72.220 1028 tcp tcpwrapped open
5545149.126.72.220 1080 tcp tcpwrapped open
5546149.126.72.220 1103 tcp tcpwrapped open
5547149.126.72.220 1111 tcp tcpwrapped open
5548149.126.72.220 1180 tcp tcpwrapped open
5549149.126.72.220 1181 tcp tcpwrapped open
5550149.126.72.220 1207 tcp tcpwrapped open
5551149.126.72.220 1234 tcp tcpwrapped open
5552149.126.72.220 1250 tcp tcpwrapped open
5553149.126.72.220 1283 tcp tcpwrapped open
5554149.126.72.220 1291 tcp tcpwrapped open
5555149.126.72.220 1292 tcp tcpwrapped open
5556149.126.72.220 1293 tcp tcpwrapped open
5557149.126.72.220 1337 tcp tcpwrapped open
5558149.126.72.220 1344 tcp tcpwrapped open
5559149.126.72.220 1355 tcp tcpwrapped open
5560149.126.72.220 1364 tcp tcpwrapped open
5561149.126.72.220 1366 tcp tcpwrapped open
5562149.126.72.220 1377 tcp tcpwrapped open
5563149.126.72.220 1387 tcp tcpwrapped open
5564149.126.72.220 1388 tcp tcpwrapped open
5565149.126.72.220 1433 tcp tcpwrapped open
5566149.126.72.220 1443 tcp tcpwrapped open
5567149.126.72.220 1447 tcp tcpwrapped open
5568149.126.72.220 1450 tcp tcpwrapped open
5569149.126.72.220 1451 tcp tcpwrapped open
5570149.126.72.220 1452 tcp tcpwrapped open
5571149.126.72.220 1453 tcp tcpwrapped open
5572149.126.72.220 1454 tcp tcpwrapped open
5573149.126.72.220 1455 tcp tcpwrapped open
5574149.126.72.220 1456 tcp tcpwrapped open
5575149.126.72.220 1457 tcp tcpwrapped open
5576149.126.72.220 1458 tcp tcpwrapped open
5577149.126.72.220 1459 tcp tcpwrapped open
5578149.126.72.220 1460 tcp tcpwrapped open
5579149.126.72.220 1494 tcp tcpwrapped open
5580149.126.72.220 1935 tcp tcpwrapped open
5581149.126.72.220 1950 tcp tcpwrapped open
5582149.126.72.220 1951 tcp tcpwrapped open
5583149.126.72.220 1952 tcp tcpwrapped open
5584149.126.72.220 1953 tcp tcpwrapped open
5585149.126.72.220 1954 tcp tcpwrapped open
5586149.126.72.220 1955 tcp tcpwrapped open
5587149.126.72.220 1956 tcp tcpwrapped open
5588149.126.72.220 1957 tcp tcpwrapped open
5589149.126.72.220 1958 tcp tcpwrapped open
5590149.126.72.220 1959 tcp tcpwrapped open
5591149.126.72.220 1960 tcp tcpwrapped open
5592149.126.72.220 1964 tcp tcpwrapped open
5593149.126.72.220 1965 tcp tcpwrapped open
5594149.126.72.220 1966 tcp tcpwrapped open
5595149.126.72.220 1967 tcp tcpwrapped open
5596149.126.72.220 1968 tcp tcpwrapped open
5597149.126.72.220 1969 tcp tcpwrapped open
5598149.126.72.220 1970 tcp tcpwrapped open
5599149.126.72.220 1971 tcp tcpwrapped open
5600149.126.72.220 1972 tcp tcpwrapped open
5601149.126.72.220 1973 tcp tcpwrapped open
5602149.126.72.220 1974 tcp tcpwrapped open
5603149.126.72.220 1975 tcp tcpwrapped open
5604149.126.72.220 1976 tcp tcpwrapped open
5605149.126.72.220 1977 tcp tcpwrapped open
5606149.126.72.220 1978 tcp tcpwrapped open
5607149.126.72.220 1979 tcp tcpwrapped open
5608149.126.72.220 1980 tcp tcpwrapped open
5609149.126.72.220 1981 tcp tcpwrapped open
5610149.126.72.220 1982 tcp tcpwrapped open
5611149.126.72.220 1983 tcp tcpwrapped open
5612149.126.72.220 1984 tcp tcpwrapped open
5613149.126.72.220 1985 tcp tcpwrapped open
5614149.126.72.220 1986 tcp tcpwrapped open
5615149.126.72.220 1987 tcp tcpwrapped open
5616149.126.72.220 1988 tcp tcpwrapped open
5617149.126.72.220 1989 tcp tcpwrapped open
5618149.126.72.220 2000 tcp tcpwrapped open
5619149.126.72.220 2001 tcp tcpwrapped open
5620149.126.72.220 2006 tcp tcpwrapped open
5621149.126.72.220 2012 tcp tcpwrapped open
5622149.126.72.220 2020 tcp tcpwrapped open
5623149.126.72.220 2048 tcp tcpwrapped open
5624149.126.72.220 2049 tcp http open Incapsula CDN httpd
5625149.126.72.220 2049 udp nfs unknown
5626149.126.72.220 2050 tcp tcpwrapped open
5627149.126.72.220 2051 tcp tcpwrapped open
5628149.126.72.220 2052 tcp tcpwrapped open
5629149.126.72.220 2053 tcp tcpwrapped open
5630149.126.72.220 2054 tcp tcpwrapped open
5631149.126.72.220 2055 tcp tcpwrapped open
5632149.126.72.220 2056 tcp tcpwrapped open
5633149.126.72.220 2057 tcp tcpwrapped open
5634149.126.72.220 2058 tcp tcpwrapped open
5635149.126.72.220 2059 tcp tcpwrapped open
5636149.126.72.220 2060 tcp tcpwrapped open
5637149.126.72.220 2061 tcp tcpwrapped open
5638149.126.72.220 2062 tcp tcpwrapped open
5639149.126.72.220 2063 tcp tcpwrapped open
5640149.126.72.220 2064 tcp tcpwrapped open
5641149.126.72.220 2065 tcp tcpwrapped open
5642149.126.72.220 2066 tcp tcpwrapped open
5643149.126.72.220 2067 tcp tcpwrapped open
5644149.126.72.220 2068 tcp tcpwrapped open
5645149.126.72.220 2069 tcp tcpwrapped open
5646149.126.72.220 2070 tcp tcpwrapped open
5647149.126.72.220 2072 tcp tcpwrapped open
5648149.126.72.220 2082 tcp tcpwrapped open
5649149.126.72.220 2083 tcp tcpwrapped open
5650149.126.72.220 2087 tcp tcpwrapped open
5651149.126.72.220 2096 tcp tcpwrapped open
5652149.126.72.220 2100 tcp tcpwrapped open
5653149.126.72.220 2108 tcp tcpwrapped open
5654149.126.72.220 2200 tcp tcpwrapped open
5655149.126.72.220 2209 tcp tcpwrapped open
5656149.126.72.220 2222 tcp tcpwrapped open
5657149.126.72.220 2226 tcp tcpwrapped open
5658149.126.72.220 2248 tcp tcpwrapped open
5659149.126.72.220 2344 tcp tcpwrapped open
5660149.126.72.220 2345 tcp tcpwrapped open
5661149.126.72.220 2353 tcp tcpwrapped open
5662149.126.72.220 2363 tcp tcpwrapped open
5663149.126.72.220 2423 tcp tcpwrapped open
5664149.126.72.220 2433 tcp tcpwrapped open
5665149.126.72.220 2435 tcp tcpwrapped open
5666149.126.72.220 2443 tcp tcpwrapped open
5667149.126.72.220 2453 tcp tcpwrapped open
5668149.126.72.220 2480 tcp tcpwrapped open
5669149.126.72.220 2548 tcp tcpwrapped open
5670149.126.72.220 2549 tcp tcpwrapped open
5671149.126.72.220 2550 tcp tcpwrapped open
5672149.126.72.220 2551 tcp tcpwrapped open
5673149.126.72.220 2552 tcp tcpwrapped open
5674149.126.72.220 2553 tcp tcpwrapped open
5675149.126.72.220 2554 tcp tcpwrapped open
5676149.126.72.220 2555 tcp tcpwrapped open
5677149.126.72.220 2556 tcp tcpwrapped open
5678149.126.72.220 2557 tcp tcpwrapped open
5679149.126.72.220 2558 tcp tcpwrapped open
5680149.126.72.220 2559 tcp tcpwrapped open
5681149.126.72.220 2560 tcp tcpwrapped open
5682149.126.72.220 2561 tcp tcpwrapped open
5683149.126.72.220 2562 tcp tcpwrapped open
5684149.126.72.220 2563 tcp tcpwrapped open
5685149.126.72.220 2566 tcp tcpwrapped open
5686149.126.72.220 2567 tcp tcpwrapped open
5687149.126.72.220 2568 tcp tcpwrapped open
5688149.126.72.220 2569 tcp tcpwrapped open
5689149.126.72.220 2570 tcp tcpwrapped open
5690149.126.72.220 2572 tcp tcpwrapped open
5691149.126.72.220 2598 tcp tcpwrapped open
5692149.126.72.220 2599 tcp tcpwrapped open
5693149.126.72.220 2850 tcp tcpwrapped open
5694149.126.72.220 2985 tcp tcpwrapped open
5695149.126.72.220 2995 tcp tcpwrapped open
5696149.126.72.220 3000 tcp tcpwrapped open
5697149.126.72.220 3001 tcp tcpwrapped open
5698149.126.72.220 3002 tcp tcpwrapped open
5699149.126.72.220 3003 tcp tcpwrapped open
5700149.126.72.220 3004 tcp tcpwrapped open
5701149.126.72.220 3005 tcp tcpwrapped open
5702149.126.72.220 3006 tcp tcpwrapped open
5703149.126.72.220 3007 tcp tcpwrapped open
5704149.126.72.220 3008 tcp tcpwrapped open
5705149.126.72.220 3009 tcp tcpwrapped open
5706149.126.72.220 3010 tcp tcpwrapped open
5707149.126.72.220 3011 tcp tcpwrapped open
5708149.126.72.220 3012 tcp tcpwrapped open
5709149.126.72.220 3013 tcp tcpwrapped open
5710149.126.72.220 3014 tcp tcpwrapped open
5711149.126.72.220 3015 tcp tcpwrapped open
5712149.126.72.220 3016 tcp tcpwrapped open
5713149.126.72.220 3017 tcp tcpwrapped open
5714149.126.72.220 3018 tcp tcpwrapped open
5715149.126.72.220 3019 tcp tcpwrapped open
5716149.126.72.220 3020 tcp tcpwrapped open
5717149.126.72.220 3021 tcp tcpwrapped open
5718149.126.72.220 3022 tcp tcpwrapped open
5719149.126.72.220 3030 tcp tcpwrapped open
5720149.126.72.220 3047 tcp tcpwrapped open
5721149.126.72.220 3048 tcp tcpwrapped open
5722149.126.72.220 3049 tcp tcpwrapped open
5723149.126.72.220 3050 tcp tcpwrapped open
5724149.126.72.220 3051 tcp tcpwrapped open
5725149.126.72.220 3052 tcp tcpwrapped open
5726149.126.72.220 3053 tcp tcpwrapped open
5727149.126.72.220 3054 tcp tcpwrapped open
5728149.126.72.220 3055 tcp tcpwrapped open
5729149.126.72.220 3056 tcp tcpwrapped open
5730149.126.72.220 3057 tcp tcpwrapped open
5731149.126.72.220 3058 tcp tcpwrapped open
5732149.126.72.220 3059 tcp tcpwrapped open
5733149.126.72.220 3060 tcp tcpwrapped open
5734149.126.72.220 3061 tcp tcpwrapped open
5735149.126.72.220 3062 tcp tcpwrapped open
5736149.126.72.220 3063 tcp tcpwrapped open
5737149.126.72.220 3064 tcp tcpwrapped open
5738149.126.72.220 3065 tcp tcpwrapped open
5739149.126.72.220 3066 tcp tcpwrapped open
5740149.126.72.220 3067 tcp tcpwrapped open
5741149.126.72.220 3068 tcp tcpwrapped open
5742149.126.72.220 3069 tcp tcpwrapped open
5743149.126.72.220 3070 tcp tcpwrapped open
5744149.126.72.220 3071 tcp tcpwrapped open
5745149.126.72.220 3072 tcp tcpwrapped open
5746149.126.72.220 3073 tcp tcpwrapped open
5747149.126.72.220 3074 tcp tcpwrapped open
5748149.126.72.220 3075 tcp tcpwrapped open
5749149.126.72.220 3076 tcp tcpwrapped open
5750149.126.72.220 3077 tcp tcpwrapped open
5751149.126.72.220 3078 tcp tcpwrapped open
5752149.126.72.220 3079 tcp tcpwrapped open
5753149.126.72.220 3080 tcp tcpwrapped open
5754149.126.72.220 3081 tcp tcpwrapped open
5755149.126.72.220 3082 tcp tcpwrapped open
5756149.126.72.220 3083 tcp tcpwrapped open
5757149.126.72.220 3084 tcp tcpwrapped open
5758149.126.72.220 3085 tcp tcpwrapped open
5759149.126.72.220 3086 tcp tcpwrapped open
5760149.126.72.220 3087 tcp tcpwrapped open
5761149.126.72.220 3088 tcp tcpwrapped open
5762149.126.72.220 3089 tcp tcpwrapped open
5763149.126.72.220 3090 tcp tcpwrapped open
5764149.126.72.220 3091 tcp tcpwrapped open
5765149.126.72.220 3092 tcp tcpwrapped open
5766149.126.72.220 3093 tcp tcpwrapped open
5767149.126.72.220 3094 tcp tcpwrapped open
5768149.126.72.220 3095 tcp tcpwrapped open
5769149.126.72.220 3096 tcp tcpwrapped open
5770149.126.72.220 3097 tcp tcpwrapped open
5771149.126.72.220 3098 tcp tcpwrapped open
5772149.126.72.220 3099 tcp tcpwrapped open
5773149.126.72.220 3100 tcp tcpwrapped open
5774149.126.72.220 3101 tcp tcpwrapped open
5775149.126.72.220 3102 tcp tcpwrapped open
5776149.126.72.220 3103 tcp tcpwrapped open
5777149.126.72.220 3104 tcp tcpwrapped open
5778149.126.72.220 3105 tcp tcpwrapped open
5779149.126.72.220 3106 tcp tcpwrapped open
5780149.126.72.220 3107 tcp tcpwrapped open
5781149.126.72.220 3108 tcp tcpwrapped open
5782149.126.72.220 3109 tcp tcpwrapped open
5783149.126.72.220 3110 tcp tcpwrapped open
5784149.126.72.220 3111 tcp tcpwrapped open
5785149.126.72.220 3112 tcp tcpwrapped open
5786149.126.72.220 3113 tcp tcpwrapped open
5787149.126.72.220 3114 tcp tcpwrapped open
5788149.126.72.220 3115 tcp tcpwrapped open
5789149.126.72.220 3116 tcp tcpwrapped open
5790149.126.72.220 3117 tcp tcpwrapped open
5791149.126.72.220 3118 tcp tcpwrapped open
5792149.126.72.220 3119 tcp tcpwrapped open
5793149.126.72.220 3120 tcp tcpwrapped open
5794149.126.72.220 3121 tcp tcpwrapped open
5795149.126.72.220 3150 tcp tcpwrapped open
5796149.126.72.220 3155 tcp tcpwrapped open
5797149.126.72.220 3160 tcp tcpwrapped open
5798149.126.72.220 3165 tcp tcpwrapped open
5799149.126.72.220 3270 tcp tcpwrapped open
5800149.126.72.220 3299 tcp tcpwrapped open
5801149.126.72.220 3306 tcp tcpwrapped open
5802149.126.72.220 3333 tcp tcpwrapped open
5803149.126.72.220 3389 tcp tcpwrapped open
5804149.126.72.220 3391 tcp tcpwrapped open
5805149.126.72.220 3400 tcp tcpwrapped open
5806149.126.72.220 3401 tcp tcpwrapped open
5807149.126.72.220 3402 tcp tcpwrapped open
5808149.126.72.220 3403 tcp tcpwrapped open
5809149.126.72.220 3404 tcp tcpwrapped open
5810149.126.72.220 3405 tcp tcpwrapped open
5811149.126.72.220 3406 tcp tcpwrapped open
5812149.126.72.220 3407 tcp tcpwrapped open
5813149.126.72.220 3408 tcp tcpwrapped open
5814149.126.72.220 3409 tcp tcpwrapped open
5815149.126.72.220 3410 tcp tcpwrapped open
5816149.126.72.220 3412 tcp tcpwrapped open
5817149.126.72.220 3443 tcp tcpwrapped open
5818149.126.72.220 3500 tcp tcpwrapped open
5819149.126.72.220 3510 tcp tcpwrapped open
5820149.126.72.220 3521 tcp tcpwrapped open
5821149.126.72.220 3522 tcp tcpwrapped open
5822149.126.72.220 3523 tcp tcpwrapped open
5823149.126.72.220 3524 tcp tcpwrapped open
5824149.126.72.220 3530 tcp tcpwrapped open
5825149.126.72.220 3531 tcp tcpwrapped open
5826149.126.72.220 3540 tcp tcpwrapped open
5827149.126.72.220 3548 tcp tcpwrapped open
5828149.126.72.220 3549 tcp tcpwrapped open
5829149.126.72.220 3550 tcp tcpwrapped open
5830149.126.72.220 3551 tcp tcpwrapped open
5831149.126.72.220 3552 tcp tcpwrapped open
5832149.126.72.220 3553 tcp tcpwrapped open
5833149.126.72.220 3554 tcp tcpwrapped open
5834149.126.72.220 3555 tcp tcpwrapped open
5835149.126.72.220 3556 tcp tcpwrapped open
5836149.126.72.220 3557 tcp tcpwrapped open
5837149.126.72.220 3558 tcp tcpwrapped open
5838149.126.72.220 3559 tcp tcpwrapped open
5839149.126.72.220 3560 tcp tcpwrapped open
5840149.126.72.220 3561 tcp tcpwrapped open
5841149.126.72.220 3562 tcp tcpwrapped open
5842149.126.72.220 3563 tcp tcpwrapped open
5843149.126.72.220 3566 tcp tcpwrapped open
5844149.126.72.220 3567 tcp tcpwrapped open
5845149.126.72.220 3568 tcp tcpwrapped open
5846149.126.72.220 3569 tcp tcpwrapped open
5847149.126.72.220 3570 tcp tcpwrapped open
5848149.126.72.220 3572 tcp tcpwrapped open
5849149.126.72.220 3580 tcp tcpwrapped open
5850149.126.72.220 3590 tcp tcpwrapped open
5851149.126.72.220 3790 tcp tcpwrapped open
5852149.126.72.220 3791 tcp tcpwrapped open
5853149.126.72.220 3792 tcp tcpwrapped open
5854149.126.72.220 3793 tcp tcpwrapped open
5855149.126.72.220 3794 tcp tcpwrapped open
5856149.126.72.220 3838 tcp tcpwrapped open
5857149.126.72.220 3841 tcp tcpwrapped open
5858149.126.72.220 3842 tcp tcpwrapped open
5859149.126.72.220 3950 tcp tcpwrapped open
5860149.126.72.220 3951 tcp tcpwrapped open
5861149.126.72.220 3952 tcp tcpwrapped open
5862149.126.72.220 3953 tcp tcpwrapped open
5863149.126.72.220 3954 tcp adrep open
5864149.126.72.220 4000 tcp tcpwrapped open
5865149.126.72.220 4001 tcp newoak open
5866149.126.72.220 4002 tcp mlchat-proxy open
5867149.126.72.220 4021 tcp nexus-portal open
5868149.126.72.220 4022 tcp dnox open
5869149.126.72.220 4023 tcp esnm-zoning open
5870149.126.72.220 4043 tcp nirp open
5871149.126.72.220 4072 tcp zieto-sock open
5872149.126.72.220 4080 tcp lorica-in open
5873149.126.72.220 4085 tcp ezmessagesrv open
5874149.126.72.220 4120 tcp minirem open
5875149.126.72.220 4147 tcp vrxpservman open
5876149.126.72.220 4148 tcp hhb-handheld open
5877149.126.72.220 4150 tcp poweralert-nsa open
5878149.126.72.220 4155 tcp bzr open
5879149.126.72.220 4160 tcp jini-discovery open
5880149.126.72.220 4165 tcp altcp open
5881149.126.72.220 4172 tcp pcoip open
5882149.126.72.220 4243 tcp vrml-multi-use open
5883149.126.72.220 4244 tcp vrml-multi-use open
5884149.126.72.220 4250 tcp vrml-multi-use open
5885149.126.72.220 4300 tcp corelccam open
5886149.126.72.220 4333 tcp msql open
5887149.126.72.220 4343 tcp unicall open
5888149.126.72.220 4344 tcp vinainstall open
5889149.126.72.220 4400 tcp ds-srv open
5890149.126.72.220 4401 tcp tcpwrapped open
5891149.126.72.220 4402 tcp tcpwrapped open
5892149.126.72.220 4430 tcp tcpwrapped open
5893149.126.72.220 4431 tcp tcpwrapped open
5894149.126.72.220 4432 tcp tcpwrapped open
5895149.126.72.220 4434 tcp tcpwrapped open
5896149.126.72.220 4435 tcp tcpwrapped open
5897149.126.72.220 4436 tcp tcpwrapped open
5898149.126.72.220 4437 tcp tcpwrapped open
5899149.126.72.220 4439 tcp tcpwrapped open
5900149.126.72.220 4440 tcp tcpwrapped open
5901149.126.72.220 4443 tcp tcpwrapped open
5902149.126.72.220 4444 tcp tcpwrapped open
5903149.126.72.220 4445 tcp tcpwrapped open
5904149.126.72.220 4451 tcp tcpwrapped open
5905149.126.72.220 4455 tcp tcpwrapped open
5906149.126.72.220 4457 tcp tcpwrapped open
5907149.126.72.220 4459 tcp tcpwrapped open
5908149.126.72.220 4461 tcp tcpwrapped open
5909149.126.72.220 4463 tcp tcpwrapped open
5910149.126.72.220 4477 tcp tcpwrapped open
5911149.126.72.220 4482 tcp tcpwrapped open
5912149.126.72.220 4500 tcp tcpwrapped open
5913149.126.72.220 4502 tcp tcpwrapped open
5914149.126.72.220 4505 tcp tcpwrapped open
5915149.126.72.220 4572 tcp tcpwrapped open
5916149.126.72.220 4602 tcp tcpwrapped open
5917149.126.72.220 4620 tcp tcpwrapped open
5918149.126.72.220 4643 tcp tcpwrapped open
5919149.126.72.220 4848 tcp tcpwrapped open
5920149.126.72.220 4933 tcp tcpwrapped open
5921149.126.72.220 4993 tcp tcpwrapped open
5922149.126.72.220 5000 tcp tcpwrapped open
5923149.126.72.220 5001 tcp tcpwrapped open
5924149.126.72.220 5002 tcp tcpwrapped open
5925149.126.72.220 5003 tcp tcpwrapped open
5926149.126.72.220 5004 tcp tcpwrapped open
5927149.126.72.220 5005 tcp tcpwrapped open
5928149.126.72.220 5006 tcp tcpwrapped open
5929149.126.72.220 5007 tcp tcpwrapped open
5930149.126.72.220 5008 tcp tcpwrapped open
5931149.126.72.220 5009 tcp tcpwrapped open
5932149.126.72.220 5010 tcp tcpwrapped open
5933149.126.72.220 5011 tcp tcpwrapped open
5934149.126.72.220 5022 tcp tcpwrapped open
5935149.126.72.220 5050 tcp tcpwrapped open
5936149.126.72.220 5053 tcp tcpwrapped open
5937149.126.72.220 5060 tcp tcpwrapped open
5938149.126.72.220 5061 tcp tcpwrapped open
5939149.126.72.220 5080 tcp tcpwrapped open
5940149.126.72.220 5083 tcp tcpwrapped open
5941149.126.72.220 5089 tcp tcpwrapped open
5942149.126.72.220 5090 tcp tcpwrapped open
5943149.126.72.220 5100 tcp tcpwrapped open
5944149.126.72.220 5105 tcp tcpwrapped open
5945149.126.72.220 5119 tcp tcpwrapped open
5946149.126.72.220 5120 tcp tcpwrapped open
5947149.126.72.220 5130 tcp tcpwrapped open
5948149.126.72.220 5140 tcp tcpwrapped open
5949149.126.72.220 5150 tcp tcpwrapped open
5950149.126.72.220 5160 tcp tcpwrapped open
5951149.126.72.220 5180 tcp tcpwrapped open
5952149.126.72.220 5201 tcp tcpwrapped open
5953149.126.72.220 5222 tcp tcpwrapped open
5954149.126.72.220 5223 tcp tcpwrapped open
5955149.126.72.220 5224 tcp tcpwrapped open
5956149.126.72.220 5225 tcp tcpwrapped open
5957149.126.72.220 5226 tcp tcpwrapped open
5958149.126.72.220 5227 tcp tcpwrapped open
5959149.126.72.220 5228 tcp tcpwrapped open
5960149.126.72.220 5229 tcp tcpwrapped open
5961149.126.72.220 5230 tcp tcpwrapped open
5962149.126.72.220 5231 tcp tcpwrapped open
5963149.126.72.220 5232 tcp tcpwrapped open
5964149.126.72.220 5233 tcp tcpwrapped open
5965149.126.72.220 5234 tcp tcpwrapped open
5966149.126.72.220 5235 tcp tcpwrapped open
5967149.126.72.220 5236 tcp tcpwrapped open
5968149.126.72.220 5237 tcp tcpwrapped open
5969149.126.72.220 5238 tcp tcpwrapped open
5970149.126.72.220 5239 tcp tcpwrapped open
5971149.126.72.220 5240 tcp tcpwrapped open
5972149.126.72.220 5241 tcp tcpwrapped open
5973149.126.72.220 5242 tcp tcpwrapped open
5974149.126.72.220 5243 tcp tcpwrapped open
5975149.126.72.220 5244 tcp tcpwrapped open
5976149.126.72.220 5245 tcp tcpwrapped open
5977149.126.72.220 5246 tcp tcpwrapped open
5978149.126.72.220 5247 tcp tcpwrapped open
5979149.126.72.220 5248 tcp tcpwrapped open
5980149.126.72.220 5249 tcp tcpwrapped open
5981149.126.72.220 5250 tcp tcpwrapped open
5982149.126.72.220 5251 tcp tcpwrapped open
5983149.126.72.220 5252 tcp tcpwrapped open
5984149.126.72.220 5253 tcp tcpwrapped open
5985149.126.72.220 5254 tcp tcpwrapped open
5986149.126.72.220 5255 tcp tcpwrapped open
5987149.126.72.220 5256 tcp tcpwrapped open
5988149.126.72.220 5257 tcp tcpwrapped open
5989149.126.72.220 5258 tcp tcpwrapped open
5990149.126.72.220 5259 tcp tcpwrapped open
5991149.126.72.220 5260 tcp tcpwrapped open
5992149.126.72.220 5261 tcp tcpwrapped open
5993149.126.72.220 5262 tcp tcpwrapped open
5994149.126.72.220 5263 tcp tcpwrapped open
5995149.126.72.220 5264 tcp tcpwrapped open
5996149.126.72.220 5265 tcp tcpwrapped open
5997149.126.72.220 5266 tcp tcpwrapped open
5998149.126.72.220 5267 tcp tcpwrapped open
5999149.126.72.220 5268 tcp tcpwrapped open
6000149.126.72.220 5269 tcp tcpwrapped open
6001149.126.72.220 5270 tcp tcpwrapped open
6002149.126.72.220 5271 tcp tcpwrapped open
6003149.126.72.220 5272 tcp tcpwrapped open
6004149.126.72.220 5273 tcp tcpwrapped open
6005149.126.72.220 5274 tcp tcpwrapped open
6006149.126.72.220 5275 tcp tcpwrapped open
6007149.126.72.220 5276 tcp tcpwrapped open
6008149.126.72.220 5277 tcp tcpwrapped open
6009149.126.72.220 5278 tcp tcpwrapped open
6010149.126.72.220 5279 tcp tcpwrapped open
6011149.126.72.220 5280 tcp tcpwrapped open
6012149.126.72.220 5440 tcp tcpwrapped open
6013149.126.72.220 5443 tcp tcpwrapped open
6014149.126.72.220 5456 tcp tcpwrapped open
6015149.126.72.220 5494 tcp tcpwrapped open
6016149.126.72.220 5495 tcp tcpwrapped open
6017149.126.72.220 5500 tcp tcpwrapped open
6018149.126.72.220 5503 tcp tcpwrapped open
6019149.126.72.220 5552 tcp tcpwrapped open
6020149.126.72.220 5555 tcp tcpwrapped open
6021149.126.72.220 5556 tcp tcpwrapped open
6022149.126.72.220 5557 tcp tcpwrapped open
6023149.126.72.220 5567 tcp tcpwrapped open
6024149.126.72.220 5568 tcp tcpwrapped open
6025149.126.72.220 5569 tcp tcpwrapped open
6026149.126.72.220 5590 tcp tcpwrapped open
6027149.126.72.220 5591 tcp tcpwrapped open
6028149.126.72.220 5592 tcp tcpwrapped open
6029149.126.72.220 5593 tcp tcpwrapped open
6030149.126.72.220 5594 tcp tcpwrapped open
6031149.126.72.220 5595 tcp tcpwrapped open
6032149.126.72.220 5596 tcp tcpwrapped open
6033149.126.72.220 5597 tcp tcpwrapped open
6034149.126.72.220 5598 tcp tcpwrapped open
6035149.126.72.220 5599 tcp tcpwrapped open
6036149.126.72.220 5600 tcp tcpwrapped open
6037149.126.72.220 5601 tcp tcpwrapped open
6038149.126.72.220 5602 tcp tcpwrapped open
6039149.126.72.220 5603 tcp tcpwrapped open
6040149.126.72.220 5604 tcp tcpwrapped open
6041149.126.72.220 5605 tcp tcpwrapped open
6042149.126.72.220 5606 tcp tcpwrapped open
6043149.126.72.220 5607 tcp tcpwrapped open
6044149.126.72.220 5608 tcp tcpwrapped open
6045149.126.72.220 5609 tcp tcpwrapped open
6046149.126.72.220 5613 tcp tcpwrapped open
6047149.126.72.220 5614 tcp tcpwrapped open
6048149.126.72.220 5620 tcp tcpwrapped open
6049149.126.72.220 5630 tcp tcpwrapped open
6050149.126.72.220 5640 tcp tcpwrapped open
6051149.126.72.220 5650 tcp tcpwrapped open
6052149.126.72.220 5660 tcp tcpwrapped open
6053149.126.72.220 5671 tcp tcpwrapped open
6054149.126.72.220 5672 tcp tcpwrapped open
6055149.126.72.220 5673 tcp tcpwrapped open
6056149.126.72.220 5680 tcp tcpwrapped open
6057149.126.72.220 5696 tcp tcpwrapped open
6058149.126.72.220 5698 tcp tcpwrapped open
6059149.126.72.220 5701 tcp tcpwrapped open
6060149.126.72.220 5721 tcp tcpwrapped open
6061149.126.72.220 5900 tcp tcpwrapped open
6062149.126.72.220 5901 tcp tcpwrapped open
6063149.126.72.220 5902 tcp tcpwrapped open
6064149.126.72.220 5903 tcp tcpwrapped open
6065149.126.72.220 5904 tcp tcpwrapped open
6066149.126.72.220 5905 tcp tcpwrapped open
6067149.126.72.220 5906 tcp tcpwrapped open
6068149.126.72.220 5907 tcp tcpwrapped open
6069149.126.72.220 5908 tcp tcpwrapped open
6070149.126.72.220 5909 tcp tcpwrapped open
6071149.126.72.220 5910 tcp tcpwrapped open
6072149.126.72.220 5911 tcp tcpwrapped open
6073149.126.72.220 5912 tcp tcpwrapped open
6074149.126.72.220 5913 tcp tcpwrapped open
6075149.126.72.220 5914 tcp tcpwrapped open
6076149.126.72.220 5915 tcp tcpwrapped open
6077149.126.72.220 5916 tcp tcpwrapped open
6078149.126.72.220 5917 tcp tcpwrapped open
6079149.126.72.220 5918 tcp tcpwrapped open
6080149.126.72.220 5919 tcp tcpwrapped open
6081149.126.72.220 5920 tcp tcpwrapped open
6082149.126.72.220 5984 tcp tcpwrapped open
6083149.126.72.220 5985 tcp tcpwrapped open
6084149.126.72.220 5986 tcp tcpwrapped open
6085149.126.72.220 5987 tcp tcpwrapped open
6086149.126.72.220 5988 tcp tcpwrapped open
6087149.126.72.220 5989 tcp tcpwrapped open
6088149.126.72.220 5990 tcp tcpwrapped open
6089149.126.72.220 5991 tcp tcpwrapped open
6090149.126.72.220 5992 tcp tcpwrapped open
6091149.126.72.220 5993 tcp tcpwrapped open
6092149.126.72.220 5994 tcp tcpwrapped open
6093149.126.72.220 5995 tcp tcpwrapped open
6094149.126.72.220 5996 tcp tcpwrapped open
6095149.126.72.220 5997 tcp tcpwrapped open
6096149.126.72.220 5998 tcp tcpwrapped open
6097149.126.72.220 5999 tcp tcpwrapped open
6098149.126.72.220 6000 tcp tcpwrapped open
6099149.126.72.220 6001 tcp tcpwrapped open
6100149.126.72.220 6002 tcp tcpwrapped open
6101149.126.72.220 6003 tcp tcpwrapped open
6102149.126.72.220 6004 tcp tcpwrapped open
6103149.126.72.220 6005 tcp tcpwrapped open
6104149.126.72.220 6006 tcp tcpwrapped open
6105149.126.72.220 6007 tcp tcpwrapped open
6106149.126.72.220 6008 tcp tcpwrapped open
6107149.126.72.220 6009 tcp tcpwrapped open
6108149.126.72.220 6010 tcp tcpwrapped open
6109149.126.72.220 6011 tcp tcpwrapped open
6110149.126.72.220 6021 tcp tcpwrapped open
6111149.126.72.220 6060 tcp tcpwrapped open
6112149.126.72.220 6061 tcp tcpwrapped open
6113149.126.72.220 6081 tcp tcpwrapped open
6114149.126.72.220 6100 tcp tcpwrapped open
6115149.126.72.220 6102 tcp tcpwrapped open
6116149.126.72.220 6134 tcp tcpwrapped open
6117149.126.72.220 6161 tcp tcpwrapped open
6118149.126.72.220 6331 tcp tcpwrapped open
6119149.126.72.220 6348 tcp tcpwrapped open
6120149.126.72.220 6379 tcp tcpwrapped open
6121149.126.72.220 6380 tcp tcpwrapped open
6122149.126.72.220 6433 tcp tcpwrapped open
6123149.126.72.220 6440 tcp tcpwrapped open
6124149.126.72.220 6443 tcp tcpwrapped open
6125149.126.72.220 6488 tcp tcpwrapped open
6126149.126.72.220 6500 tcp tcpwrapped open
6127149.126.72.220 6505 tcp tcpwrapped open
6128149.126.72.220 6510 tcp tcpwrapped open
6129149.126.72.220 6511 tcp tcpwrapped open
6130149.126.72.220 6512 tcp tcpwrapped open
6131149.126.72.220 6514 tcp tcpwrapped open
6132149.126.72.220 6543 tcp tcpwrapped open
6133149.126.72.220 6544 tcp tcpwrapped open
6134149.126.72.220 6560 tcp tcpwrapped open
6135149.126.72.220 6561 tcp tcpwrapped open
6136149.126.72.220 6565 tcp tcpwrapped open
6137149.126.72.220 6580 tcp tcpwrapped open
6138149.126.72.220 6581 tcp tcpwrapped open
6139149.126.72.220 6590 tcp tcpwrapped open
6140149.126.72.220 6601 tcp tcpwrapped open
6141149.126.72.220 6603 tcp tcpwrapped open
6142149.126.72.220 6605 tcp tcpwrapped open
6143149.126.72.220 6661 tcp tcpwrapped open
6144149.126.72.220 6662 tcp tcpwrapped open
6145149.126.72.220 6666 tcp tcpwrapped open
6146149.126.72.220 6686 tcp tcpwrapped open
6147149.126.72.220 6688 tcp tcpwrapped open
6148149.126.72.220 6700 tcp tcpwrapped open
6149149.126.72.220 6755 tcp tcpwrapped open
6150149.126.72.220 6775 tcp tcpwrapped open
6151149.126.72.220 6779 tcp tcpwrapped open
6152149.126.72.220 6789 tcp tcpwrapped open
6153149.126.72.220 6799 tcp tcpwrapped open
6154149.126.72.220 7000 tcp tcpwrapped open
6155149.126.72.220 7001 tcp tcpwrapped open
6156149.126.72.220 7002 tcp tcpwrapped open
6157149.126.72.220 7003 tcp tcpwrapped open
6158149.126.72.220 7004 tcp tcpwrapped open
6159149.126.72.220 7005 tcp tcpwrapped open
6160149.126.72.220 7007 tcp tcpwrapped open
6161149.126.72.220 7010 tcp tcpwrapped open
6162149.126.72.220 7011 tcp tcpwrapped open
6163149.126.72.220 7021 tcp tcpwrapped open
6164149.126.72.220 7070 tcp tcpwrapped open
6165149.126.72.220 7071 tcp tcpwrapped open
6166149.126.72.220 7079 tcp tcpwrapped open
6167149.126.72.220 7080 tcp tcpwrapped open
6168149.126.72.220 7081 tcp tcpwrapped open
6169149.126.72.220 7082 tcp tcpwrapped open
6170149.126.72.220 7083 tcp tcpwrapped open
6171149.126.72.220 7084 tcp tcpwrapped open
6172149.126.72.220 7085 tcp tcpwrapped open
6173149.126.72.220 7086 tcp tcpwrapped open
6174149.126.72.220 7087 tcp tcpwrapped open
6175149.126.72.220 7088 tcp tcpwrapped open
6176149.126.72.220 7090 tcp tcpwrapped open
6177149.126.72.220 7171 tcp tcpwrapped open
6178149.126.72.220 7172 tcp tcpwrapped open
6179149.126.72.220 7272 tcp tcpwrapped open
6180149.126.72.220 7348 tcp tcpwrapped open
6181149.126.72.220 7403 tcp tcpwrapped open
6182149.126.72.220 7433 tcp tcpwrapped open
6183149.126.72.220 7441 tcp tcpwrapped open
6184149.126.72.220 7443 tcp tcpwrapped open
6185149.126.72.220 7444 tcp tcpwrapped open
6186149.126.72.220 7445 tcp tcpwrapped open
6187149.126.72.220 7473 tcp tcpwrapped open
6188149.126.72.220 7500 tcp tcpwrapped open
6189149.126.72.220 7537 tcp tcpwrapped open
6190149.126.72.220 7687 tcp tcpwrapped open
6191149.126.72.220 7700 tcp tcpwrapped open
6192149.126.72.220 7771 tcp tcpwrapped open
6193149.126.72.220 7773 tcp tcpwrapped open
6194149.126.72.220 7774 tcp tcpwrapped open
6195149.126.72.220 7775 tcp tcpwrapped open
6196149.126.72.220 7776 tcp tcpwrapped open
6197149.126.72.220 7777 tcp tcpwrapped open
6198149.126.72.220 7778 tcp tcpwrapped open
6199149.126.72.220 7779 tcp tcpwrapped open
6200149.126.72.220 7788 tcp tcpwrapped open
6201149.126.72.220 7799 tcp tcpwrapped open
6202149.126.72.220 7998 tcp tcpwrapped open
6203149.126.72.220 7999 tcp tcpwrapped open
6204149.126.72.220 8000 tcp tcpwrapped open
6205149.126.72.220 8001 tcp tcpwrapped open
6206149.126.72.220 8002 tcp tcpwrapped open
6207149.126.72.220 8003 tcp tcpwrapped open
6208149.126.72.220 8004 tcp tcpwrapped open
6209149.126.72.220 8005 tcp tcpwrapped open
6210149.126.72.220 8006 tcp tcpwrapped open
6211149.126.72.220 8007 tcp tcpwrapped open
6212149.126.72.220 8008 tcp tcpwrapped open
6213149.126.72.220 8009 tcp tcpwrapped open
6214149.126.72.220 8010 tcp tcpwrapped open
6215149.126.72.220 8011 tcp tcpwrapped open
6216149.126.72.220 8012 tcp tcpwrapped open
6217149.126.72.220 8013 tcp tcpwrapped open
6218149.126.72.220 8014 tcp tcpwrapped open
6219149.126.72.220 8015 tcp tcpwrapped open
6220149.126.72.220 8016 tcp tcpwrapped open
6221149.126.72.220 8017 tcp tcpwrapped open
6222149.126.72.220 8018 tcp tcpwrapped open
6223149.126.72.220 8019 tcp tcpwrapped open
6224149.126.72.220 8020 tcp tcpwrapped open
6225149.126.72.220 8021 tcp tcpwrapped open
6226149.126.72.220 8022 tcp tcpwrapped open
6227149.126.72.220 8023 tcp tcpwrapped open
6228149.126.72.220 8024 tcp tcpwrapped open
6229149.126.72.220 8025 tcp tcpwrapped open
6230149.126.72.220 8026 tcp tcpwrapped open
6231149.126.72.220 8027 tcp tcpwrapped open
6232149.126.72.220 8028 tcp tcpwrapped open
6233149.126.72.220 8029 tcp tcpwrapped open
6234149.126.72.220 8030 tcp tcpwrapped open
6235149.126.72.220 8031 tcp tcpwrapped open
6236149.126.72.220 8032 tcp tcpwrapped open
6237149.126.72.220 8033 tcp tcpwrapped open
6238149.126.72.220 8034 tcp tcpwrapped open
6239149.126.72.220 8035 tcp tcpwrapped open
6240149.126.72.220 8036 tcp tcpwrapped open
6241149.126.72.220 8037 tcp tcpwrapped open
6242149.126.72.220 8038 tcp tcpwrapped open
6243149.126.72.220 8039 tcp tcpwrapped open
6244149.126.72.220 8040 tcp tcpwrapped open
6245149.126.72.220 8041 tcp tcpwrapped open
6246149.126.72.220 8042 tcp tcpwrapped open
6247149.126.72.220 8043 tcp tcpwrapped open
6248149.126.72.220 8044 tcp tcpwrapped open
6249149.126.72.220 8045 tcp tcpwrapped open
6250149.126.72.220 8046 tcp tcpwrapped open
6251149.126.72.220 8047 tcp tcpwrapped open
6252149.126.72.220 8048 tcp tcpwrapped open
6253149.126.72.220 8049 tcp tcpwrapped open
6254149.126.72.220 8050 tcp tcpwrapped open
6255149.126.72.220 8051 tcp tcpwrapped open
6256149.126.72.220 8052 tcp tcpwrapped open
6257149.126.72.220 8053 tcp tcpwrapped open
6258149.126.72.220 8054 tcp tcpwrapped open
6259149.126.72.220 8055 tcp tcpwrapped open
6260149.126.72.220 8056 tcp tcpwrapped open
6261149.126.72.220 8057 tcp tcpwrapped open
6262149.126.72.220 8058 tcp tcpwrapped open
6263149.126.72.220 8060 tcp tcpwrapped open
6264149.126.72.220 8064 tcp tcpwrapped open
6265149.126.72.220 8065 tcp tcpwrapped open
6266149.126.72.220 8069 tcp tcpwrapped open
6267149.126.72.220 8070 tcp tcpwrapped open
6268149.126.72.220 8071 tcp tcpwrapped open
6269149.126.72.220 8072 tcp tcpwrapped open
6270149.126.72.220 8074 tcp tcpwrapped open
6271149.126.72.220 8079 tcp tcpwrapped open
6272149.126.72.220 8080 tcp tcpwrapped open
6273149.126.72.220 8081 tcp tcpwrapped open
6274149.126.72.220 8082 tcp tcpwrapped open
6275149.126.72.220 8083 tcp tcpwrapped open
6276149.126.72.220 8084 tcp tcpwrapped open
6277149.126.72.220 8085 tcp tcpwrapped open
6278149.126.72.220 8086 tcp tcpwrapped open
6279149.126.72.220 8087 tcp tcpwrapped open
6280149.126.72.220 8088 tcp tcpwrapped open
6281149.126.72.220 8089 tcp tcpwrapped open
6282149.126.72.220 8090 tcp tcpwrapped open
6283149.126.72.220 8091 tcp tcpwrapped open
6284149.126.72.220 8092 tcp tcpwrapped open
6285149.126.72.220 8093 tcp tcpwrapped open
6286149.126.72.220 8094 tcp tcpwrapped open
6287149.126.72.220 8095 tcp tcpwrapped open
6288149.126.72.220 8096 tcp tcpwrapped open
6289149.126.72.220 8097 tcp tcpwrapped open
6290149.126.72.220 8098 tcp tcpwrapped open
6291149.126.72.220 8099 tcp tcpwrapped open
6292149.126.72.220 8100 tcp tcpwrapped open
6293149.126.72.220 8101 tcp tcpwrapped open
6294149.126.72.220 8102 tcp tcpwrapped open
6295149.126.72.220 8103 tcp tcpwrapped open
6296149.126.72.220 8104 tcp tcpwrapped open
6297149.126.72.220 8105 tcp tcpwrapped open
6298149.126.72.220 8106 tcp tcpwrapped open
6299149.126.72.220 8107 tcp tcpwrapped open
6300149.126.72.220 8108 tcp tcpwrapped open
6301149.126.72.220 8109 tcp tcpwrapped open
6302149.126.72.220 8110 tcp tcpwrapped open
6303149.126.72.220 8113 tcp tcpwrapped open
6304149.126.72.220 8114 tcp tcpwrapped open
6305149.126.72.220 8115 tcp tcpwrapped open
6306149.126.72.220 8118 tcp tcpwrapped open
6307149.126.72.220 8119 tcp tcpwrapped open
6308149.126.72.220 8120 tcp tcpwrapped open
6309149.126.72.220 8121 tcp tcpwrapped open
6310149.126.72.220 8123 tcp tcpwrapped open
6311149.126.72.220 8125 tcp tcpwrapped open
6312149.126.72.220 8126 tcp tcpwrapped open
6313149.126.72.220 8128 tcp tcpwrapped open
6314149.126.72.220 8129 tcp tcpwrapped open
6315149.126.72.220 8130 tcp tcpwrapped open
6316149.126.72.220 8131 tcp tcpwrapped open
6317149.126.72.220 8132 tcp tcpwrapped open
6318149.126.72.220 8133 tcp tcpwrapped open
6319149.126.72.220 8136 tcp tcpwrapped open
6320149.126.72.220 8140 tcp tcpwrapped open
6321149.126.72.220 8142 tcp tcpwrapped open
6322149.126.72.220 8143 tcp tcpwrapped open
6323149.126.72.220 8144 tcp tcpwrapped open
6324149.126.72.220 8147 tcp tcpwrapped open
6325149.126.72.220 8148 tcp tcpwrapped open
6326149.126.72.220 8149 tcp tcpwrapped open
6327149.126.72.220 8150 tcp tcpwrapped open
6328149.126.72.220 8154 tcp tcpwrapped open
6329149.126.72.220 8156 tcp tcpwrapped open
6330149.126.72.220 8157 tcp tcpwrapped open
6331149.126.72.220 8158 tcp tcpwrapped open
6332149.126.72.220 8160 tcp tcpwrapped open
6333149.126.72.220 8161 tcp tcpwrapped open
6334149.126.72.220 8162 tcp tcpwrapped open
6335149.126.72.220 8163 tcp tcpwrapped open
6336149.126.72.220 8164 tcp tcpwrapped open
6337149.126.72.220 8165 tcp tcpwrapped open
6338149.126.72.220 8166 tcp tcpwrapped open
6339149.126.72.220 8167 tcp tcpwrapped open
6340149.126.72.220 8168 tcp tcpwrapped open
6341149.126.72.220 8169 tcp tcpwrapped open
6342149.126.72.220 8170 tcp tcpwrapped open
6343149.126.72.220 8171 tcp tcpwrapped open
6344149.126.72.220 8172 tcp tcpwrapped open
6345149.126.72.220 8173 tcp tcpwrapped open
6346149.126.72.220 8175 tcp tcpwrapped open
6347149.126.72.220 8176 tcp tcpwrapped open
6348149.126.72.220 8178 tcp tcpwrapped open
6349149.126.72.220 8179 tcp tcpwrapped open
6350149.126.72.220 8180 tcp tcpwrapped open
6351149.126.72.220 8181 tcp tcpwrapped open
6352149.126.72.220 8182 tcp tcpwrapped open
6353149.126.72.220 8183 tcp tcpwrapped open
6354149.126.72.220 8184 tcp tcpwrapped open
6355149.126.72.220 8185 tcp tcpwrapped open
6356149.126.72.220 8186 tcp tcpwrapped open
6357149.126.72.220 8187 tcp tcpwrapped open
6358149.126.72.220 8188 tcp tcpwrapped open
6359149.126.72.220 8189 tcp tcpwrapped open
6360149.126.72.220 8190 tcp tcpwrapped open
6361149.126.72.220 8191 tcp tcpwrapped open
6362149.126.72.220 8192 tcp tcpwrapped open
6363149.126.72.220 8193 tcp tcpwrapped open
6364149.126.72.220 8194 tcp tcpwrapped open
6365149.126.72.220 8195 tcp tcpwrapped open
6366149.126.72.220 8198 tcp tcpwrapped open
6367149.126.72.220 8199 tcp tcpwrapped open
6368149.126.72.220 8200 tcp tcpwrapped open
6369149.126.72.220 8203 tcp tcpwrapped open
6370149.126.72.220 8222 tcp tcpwrapped open
6371149.126.72.220 8230 tcp tcpwrapped open
6372149.126.72.220 8236 tcp tcpwrapped open
6373149.126.72.220 8237 tcp tcpwrapped open
6374149.126.72.220 8238 tcp tcpwrapped open
6375149.126.72.220 8239 tcp tcpwrapped open
6376149.126.72.220 8241 tcp tcpwrapped open
6377149.126.72.220 8243 tcp tcpwrapped open
6378149.126.72.220 8248 tcp tcpwrapped open
6379149.126.72.220 8249 tcp tcpwrapped open
6380149.126.72.220 8250 tcp tcpwrapped open
6381149.126.72.220 8251 tcp tcpwrapped open
6382149.126.72.220 8252 tcp tcpwrapped open
6383149.126.72.220 8280 tcp tcpwrapped open
6384149.126.72.220 8282 tcp tcpwrapped open
6385149.126.72.220 8333 tcp tcpwrapped open
6386149.126.72.220 8340 tcp tcpwrapped open
6387149.126.72.220 8343 tcp tcpwrapped open
6388149.126.72.220 8350 tcp tcpwrapped open
6389149.126.72.220 8381 tcp tcpwrapped open
6390149.126.72.220 8382 tcp tcpwrapped open
6391149.126.72.220 8383 tcp tcpwrapped open
6392149.126.72.220 8384 tcp tcpwrapped open
6393149.126.72.220 8385 tcp tcpwrapped open
6394149.126.72.220 8388 tcp tcpwrapped open
6395149.126.72.220 8393 tcp tcpwrapped open
6396149.126.72.220 8401 tcp tcpwrapped open
6397149.126.72.220 8402 tcp tcpwrapped open
6398149.126.72.220 8403 tcp tcpwrapped open
6399149.126.72.220 8404 tcp tcpwrapped open
6400149.126.72.220 8405 tcp tcpwrapped open
6401149.126.72.220 8406 tcp tcpwrapped open
6402149.126.72.220 8407 tcp tcpwrapped open
6403149.126.72.220 8408 tcp tcpwrapped open
6404149.126.72.220 8409 tcp tcpwrapped open
6405149.126.72.220 8410 tcp tcpwrapped open
6406149.126.72.220 8411 tcp tcpwrapped open
6407149.126.72.220 8412 tcp tcpwrapped open
6408149.126.72.220 8413 tcp tcpwrapped open
6409149.126.72.220 8414 tcp tcpwrapped open
6410149.126.72.220 8415 tcp tcpwrapped open
6411149.126.72.220 8416 tcp tcpwrapped open
6412149.126.72.220 8417 tcp tcpwrapped open
6413149.126.72.220 8418 tcp tcpwrapped open
6414149.126.72.220 8419 tcp tcpwrapped open
6415149.126.72.220 8420 tcp tcpwrapped open
6416149.126.72.220 8421 tcp tcpwrapped open
6417149.126.72.220 8422 tcp tcpwrapped open
6418149.126.72.220 8423 tcp tcpwrapped open
6419149.126.72.220 8424 tcp tcpwrapped open
6420149.126.72.220 8425 tcp tcpwrapped open
6421149.126.72.220 8426 tcp tcpwrapped open
6422149.126.72.220 8427 tcp tcpwrapped open
6423149.126.72.220 8428 tcp tcpwrapped open
6424149.126.72.220 8429 tcp tcpwrapped open
6425149.126.72.220 8430 tcp tcpwrapped open
6426149.126.72.220 8431 tcp tcpwrapped open
6427149.126.72.220 8432 tcp tcpwrapped open
6428149.126.72.220 8433 tcp tcpwrapped open
6429149.126.72.220 8435 tcp tcpwrapped open
6430149.126.72.220 8440 tcp tcpwrapped open
6431149.126.72.220 8441 tcp tcpwrapped open
6432149.126.72.220 8442 tcp tcpwrapped open
6433149.126.72.220 8443 tcp tcpwrapped open
6434149.126.72.220 8444 tcp tcpwrapped open
6435149.126.72.220 8445 tcp tcpwrapped open
6436149.126.72.220 8446 tcp tcpwrapped open
6437149.126.72.220 8447 tcp tcpwrapped open
6438149.126.72.220 8448 tcp tcpwrapped open
6439149.126.72.220 8449 tcp tcpwrapped open
6440149.126.72.220 8450 tcp tcpwrapped open
6441149.126.72.220 8451 tcp tcpwrapped open
6442149.126.72.220 8452 tcp tcpwrapped open
6443149.126.72.220 8453 tcp tcpwrapped open
6444149.126.72.220 8454 tcp tcpwrapped open
6445149.126.72.220 8455 tcp tcpwrapped open
6446149.126.72.220 8456 tcp tcpwrapped open
6447149.126.72.220 8457 tcp tcpwrapped open
6448149.126.72.220 8458 tcp tcpwrapped open
6449149.126.72.220 8459 tcp tcpwrapped open
6450149.126.72.220 8460 tcp tcpwrapped open
6451149.126.72.220 8461 tcp tcpwrapped open
6452149.126.72.220 8462 tcp tcpwrapped open
6453149.126.72.220 8463 tcp tcpwrapped open
6454149.126.72.220 8464 tcp tcpwrapped open
6455149.126.72.220 8465 tcp tcpwrapped open
6456149.126.72.220 8466 tcp tcpwrapped open
6457149.126.72.220 8467 tcp tcpwrapped open
6458149.126.72.220 8470 tcp tcpwrapped open
6459149.126.72.220 8472 tcp tcpwrapped open
6460149.126.72.220 8473 tcp tcpwrapped open
6461149.126.72.220 8475 tcp tcpwrapped open
6462149.126.72.220 8480 tcp tcpwrapped open
6463149.126.72.220 8481 tcp tcpwrapped open
6464149.126.72.220 8482 tcp tcpwrapped open
6465149.126.72.220 8484 tcp tcpwrapped open
6466149.126.72.220 8485 tcp tcpwrapped open
6467149.126.72.220 8488 tcp tcpwrapped open
6468149.126.72.220 8493 tcp tcpwrapped open
6469149.126.72.220 8494 tcp tcpwrapped open
6470149.126.72.220 8500 tcp tcpwrapped open
6471149.126.72.220 8502 tcp tcpwrapped open
6472149.126.72.220 8503 tcp tcpwrapped open
6473149.126.72.220 8504 tcp tcpwrapped open
6474149.126.72.220 8505 tcp tcpwrapped open
6475149.126.72.220 8506 tcp tcpwrapped open
6476149.126.72.220 8510 tcp tcpwrapped open
6477149.126.72.220 8513 tcp tcpwrapped open
6478149.126.72.220 8514 tcp tcpwrapped open
6479149.126.72.220 8515 tcp tcpwrapped open
6480149.126.72.220 8519 tcp tcpwrapped open
6481149.126.72.220 8520 tcp tcpwrapped open
6482149.126.72.220 8521 tcp tcpwrapped open
6483149.126.72.220 8523 tcp tcpwrapped open
6484149.126.72.220 8524 tcp tcpwrapped open
6485149.126.72.220 8525 tcp tcpwrapped open
6486149.126.72.220 8526 tcp tcpwrapped open
6487149.126.72.220 8528 tcp tcpwrapped open
6488149.126.72.220 8529 tcp tcpwrapped open
6489149.126.72.220 8530 tcp tcpwrapped open
6490149.126.72.220 8531 tcp tcpwrapped open
6491149.126.72.220 8532 tcp tcpwrapped open
6492149.126.72.220 8533 tcp tcpwrapped open
6493149.126.72.220 8536 tcp tcpwrapped open
6494149.126.72.220 8540 tcp tcpwrapped open
6495149.126.72.220 8543 tcp tcpwrapped open
6496149.126.72.220 8544 tcp tcpwrapped open
6497149.126.72.220 8548 tcp tcpwrapped open
6498149.126.72.220 8549 tcp tcpwrapped open
6499149.126.72.220 8550 tcp tcpwrapped open
6500149.126.72.220 8551 tcp tcpwrapped open
6501149.126.72.220 8553 tcp tcpwrapped open
6502149.126.72.220 8556 tcp tcpwrapped open
6503149.126.72.220 8557 tcp tcpwrapped open
6504149.126.72.220 8558 tcp tcpwrapped open
6505149.126.72.220 8560 tcp tcpwrapped open
6506149.126.72.220 8561 tcp tcpwrapped open
6507149.126.72.220 8562 tcp tcpwrapped open
6508149.126.72.220 8563 tcp tcpwrapped open
6509149.126.72.220 8564 tcp tcpwrapped open
6510149.126.72.220 8565 tcp tcpwrapped open
6511149.126.72.220 8566 tcp tcpwrapped open
6512149.126.72.220 8567 tcp tcpwrapped open
6513149.126.72.220 8568 tcp tcpwrapped open
6514149.126.72.220 8569 tcp tcpwrapped open
6515149.126.72.220 8570 tcp tcpwrapped open
6516149.126.72.220 8571 tcp tcpwrapped open
6517149.126.72.220 8573 tcp tcpwrapped open
6518149.126.72.220 8574 tcp tcpwrapped open
6519149.126.72.220 8575 tcp tcpwrapped open
6520149.126.72.220 8576 tcp tcpwrapped open
6521149.126.72.220 8577 tcp tcpwrapped open
6522149.126.72.220 8578 tcp tcpwrapped open
6523149.126.72.220 8579 tcp tcpwrapped open
6524149.126.72.220 8580 tcp tcpwrapped open
6525149.126.72.220 8581 tcp tcpwrapped open
6526149.126.72.220 8582 tcp tcpwrapped open
6527149.126.72.220 8583 tcp tcpwrapped open
6528149.126.72.220 8585 tcp tcpwrapped open
6529149.126.72.220 8586 tcp tcpwrapped open
6530149.126.72.220 8588 tcp tcpwrapped open
6531149.126.72.220 8589 tcp tcpwrapped open
6532149.126.72.220 8590 tcp tcpwrapped open
6533149.126.72.220 8591 tcp tcpwrapped open
6534149.126.72.220 8592 tcp tcpwrapped open
6535149.126.72.220 8593 tcp tcpwrapped open
6536149.126.72.220 8594 tcp tcpwrapped open
6537149.126.72.220 8595 tcp tcpwrapped open
6538149.126.72.220 8596 tcp tcpwrapped open
6539149.126.72.220 8597 tcp tcpwrapped open
6540149.126.72.220 8598 tcp tcpwrapped open
6541149.126.72.220 8599 tcp tcpwrapped open
6542149.126.72.220 8600 tcp tcpwrapped open
6543149.126.72.220 8601 tcp tcpwrapped open
6544149.126.72.220 8605 tcp tcpwrapped open
6545149.126.72.220 8606 tcp tcpwrapped open
6546149.126.72.220 8630 tcp tcpwrapped open
6547149.126.72.220 8640 tcp tcpwrapped open
6548149.126.72.220 8641 tcp tcpwrapped open
6549149.126.72.220 8643 tcp tcpwrapped open
6550149.126.72.220 8663 tcp tcpwrapped open
6551149.126.72.220 8666 tcp tcpwrapped open
6552149.126.72.220 8686 tcp tcpwrapped open
6553149.126.72.220 8688 tcp tcpwrapped open
6554149.126.72.220 8700 tcp tcpwrapped open
6555149.126.72.220 8701 tcp tcpwrapped open
6556149.126.72.220 8702 tcp tcpwrapped open
6557149.126.72.220 8703 tcp tcpwrapped open
6558149.126.72.220 8704 tcp tcpwrapped open
6559149.126.72.220 8705 tcp tcpwrapped open
6560149.126.72.220 8706 tcp tcpwrapped open
6561149.126.72.220 8707 tcp tcpwrapped open
6562149.126.72.220 8708 tcp tcpwrapped open
6563149.126.72.220 8709 tcp tcpwrapped open
6564149.126.72.220 8723 tcp tcpwrapped open
6565149.126.72.220 8724 tcp tcpwrapped open
6566149.126.72.220 8731 tcp tcpwrapped open
6567149.126.72.220 8732 tcp tcpwrapped open
6568149.126.72.220 8764 tcp tcpwrapped open
6569149.126.72.220 8765 tcp tcpwrapped open
6570149.126.72.220 8766 tcp tcpwrapped open
6571149.126.72.220 8767 tcp tcpwrapped open
6572149.126.72.220 8771 tcp tcpwrapped open
6573149.126.72.220 8787 tcp tcpwrapped open
6574149.126.72.220 8788 tcp tcpwrapped open
6575149.126.72.220 8789 tcp tcpwrapped open
6576149.126.72.220 8790 tcp tcpwrapped open
6577149.126.72.220 8791 tcp tcpwrapped open
6578149.126.72.220 8800 tcp tcpwrapped open
6579149.126.72.220 8801 tcp tcpwrapped open
6580149.126.72.220 8802 tcp tcpwrapped open
6581149.126.72.220 8803 tcp tcpwrapped open
6582149.126.72.220 8804 tcp tcpwrapped open
6583149.126.72.220 8805 tcp tcpwrapped open
6584149.126.72.220 8806 tcp tcpwrapped open
6585149.126.72.220 8807 tcp tcpwrapped open
6586149.126.72.220 8808 tcp tcpwrapped open
6587149.126.72.220 8809 tcp tcpwrapped open
6588149.126.72.220 8810 tcp tcpwrapped open
6589149.126.72.220 8811 tcp tcpwrapped open
6590149.126.72.220 8812 tcp tcpwrapped open
6591149.126.72.220 8813 tcp tcpwrapped open
6592149.126.72.220 8814 tcp tcpwrapped open
6593149.126.72.220 8815 tcp tcpwrapped open
6594149.126.72.220 8816 tcp tcpwrapped open
6595149.126.72.220 8817 tcp tcpwrapped open
6596149.126.72.220 8818 tcp tcpwrapped open
6597149.126.72.220 8819 tcp tcpwrapped open
6598149.126.72.220 8820 tcp tcpwrapped open
6599149.126.72.220 8821 tcp tcpwrapped open
6600149.126.72.220 8822 tcp tcpwrapped open
6601149.126.72.220 8823 tcp tcpwrapped open
6602149.126.72.220 8824 tcp tcpwrapped open
6603149.126.72.220 8825 tcp tcpwrapped open
6604149.126.72.220 8826 tcp tcpwrapped open
6605149.126.72.220 8827 tcp tcpwrapped open
6606149.126.72.220 8828 tcp tcpwrapped open
6607149.126.72.220 8829 tcp tcpwrapped open
6608149.126.72.220 8830 tcp tcpwrapped open
6609149.126.72.220 8831 tcp tcpwrapped open
6610149.126.72.220 8832 tcp tcpwrapped open
6611149.126.72.220 8833 tcp tcpwrapped open
6612149.126.72.220 8834 tcp tcpwrapped open
6613149.126.72.220 8835 tcp tcpwrapped open
6614149.126.72.220 8836 tcp tcpwrapped open
6615149.126.72.220 8837 tcp tcpwrapped open
6616149.126.72.220 8838 tcp tcpwrapped open
6617149.126.72.220 8839 tcp tcpwrapped open
6618149.126.72.220 8840 tcp tcpwrapped open
6619149.126.72.220 8841 tcp tcpwrapped open
6620149.126.72.220 8842 tcp tcpwrapped open
6621149.126.72.220 8843 tcp tcpwrapped open
6622149.126.72.220 8844 tcp tcpwrapped open
6623149.126.72.220 8845 tcp tcpwrapped open
6624149.126.72.220 8846 tcp tcpwrapped open
6625149.126.72.220 8847 tcp tcpwrapped open
6626149.126.72.220 8848 tcp tcpwrapped open
6627149.126.72.220 8849 tcp tcpwrapped open
6628149.126.72.220 8850 tcp tcpwrapped open
6629149.126.72.220 8851 tcp tcpwrapped open
6630149.126.72.220 8852 tcp tcpwrapped open
6631149.126.72.220 8853 tcp tcpwrapped open
6632149.126.72.220 8854 tcp tcpwrapped open
6633149.126.72.220 8855 tcp tcpwrapped open
6634149.126.72.220 8856 tcp tcpwrapped open
6635149.126.72.220 8857 tcp tcpwrapped open
6636149.126.72.220 8858 tcp tcpwrapped open
6637149.126.72.220 8859 tcp tcpwrapped open
6638149.126.72.220 8860 tcp tcpwrapped open
6639149.126.72.220 8861 tcp tcpwrapped open
6640149.126.72.220 8862 tcp tcpwrapped open
6641149.126.72.220 8863 tcp tcpwrapped open
6642149.126.72.220 8864 tcp tcpwrapped open
6643149.126.72.220 8865 tcp tcpwrapped open
6644149.126.72.220 8866 tcp tcpwrapped open
6645149.126.72.220 8867 tcp tcpwrapped open
6646149.126.72.220 8868 tcp tcpwrapped open
6647149.126.72.220 8869 tcp tcpwrapped open
6648149.126.72.220 8870 tcp tcpwrapped open
6649149.126.72.220 8871 tcp tcpwrapped open
6650149.126.72.220 8872 tcp tcpwrapped open
6651149.126.72.220 8873 tcp tcpwrapped open
6652149.126.72.220 8874 tcp tcpwrapped open
6653149.126.72.220 8875 tcp tcpwrapped open
6654149.126.72.220 8876 tcp tcpwrapped open
6655149.126.72.220 8877 tcp tcpwrapped open
6656149.126.72.220 8878 tcp tcpwrapped open
6657149.126.72.220 8879 tcp tcpwrapped open
6658149.126.72.220 8880 tcp tcpwrapped open
6659149.126.72.220 8881 tcp tcpwrapped open
6660149.126.72.220 8882 tcp tcpwrapped open
6661149.126.72.220 8883 tcp tcpwrapped open
6662149.126.72.220 8884 tcp tcpwrapped open
6663149.126.72.220 8885 tcp tcpwrapped open
6664149.126.72.220 8887 tcp tcpwrapped open
6665149.126.72.220 8888 tcp tcpwrapped open
6666149.126.72.220 8889 tcp tcpwrapped open
6667149.126.72.220 8890 tcp tcpwrapped open
6668149.126.72.220 8891 tcp tcpwrapped open
6669149.126.72.220 8899 tcp tcpwrapped open
6670149.126.72.220 8900 tcp tcpwrapped open
6671149.126.72.220 8901 tcp tcpwrapped open
6672149.126.72.220 8902 tcp tcpwrapped open
6673149.126.72.220 8905 tcp tcpwrapped open
6674149.126.72.220 8906 tcp tcpwrapped open
6675149.126.72.220 8907 tcp tcpwrapped open
6676149.126.72.220 8908 tcp tcpwrapped open
6677149.126.72.220 8910 tcp tcpwrapped open
6678149.126.72.220 8911 tcp tcpwrapped open
6679149.126.72.220 8912 tcp tcpwrapped open
6680149.126.72.220 8913 tcp tcpwrapped open
6681149.126.72.220 8915 tcp tcpwrapped open
6682149.126.72.220 8916 tcp tcpwrapped open
6683149.126.72.220 8935 tcp tcpwrapped open
6684149.126.72.220 8943 tcp tcpwrapped open
6685149.126.72.220 8969 tcp tcpwrapped open
6686149.126.72.220 8988 tcp tcpwrapped open
6687149.126.72.220 8989 tcp tcpwrapped open
6688149.126.72.220 8999 tcp tcpwrapped open
6689149.126.72.220 9000 tcp tcpwrapped open
6690149.126.72.220 9001 tcp tcpwrapped open
6691149.126.72.220 9002 tcp tcpwrapped open
6692149.126.72.220 9003 tcp tcpwrapped open
6693149.126.72.220 9004 tcp tcpwrapped open
6694149.126.72.220 9005 tcp tcpwrapped open
6695149.126.72.220 9006 tcp tcpwrapped open
6696149.126.72.220 9007 tcp tcpwrapped open
6697149.126.72.220 9008 tcp tcpwrapped open
6698149.126.72.220 9009 tcp tcpwrapped open
6699149.126.72.220 9010 tcp tcpwrapped open
6700149.126.72.220 9011 tcp tcpwrapped open
6701149.126.72.220 9012 tcp tcpwrapped open
6702149.126.72.220 9013 tcp tcpwrapped open
6703149.126.72.220 9014 tcp tcpwrapped open
6704149.126.72.220 9015 tcp tcpwrapped open
6705149.126.72.220 9016 tcp tcpwrapped open
6706149.126.72.220 9017 tcp tcpwrapped open
6707149.126.72.220 9018 tcp tcpwrapped open
6708149.126.72.220 9019 tcp tcpwrapped open
6709149.126.72.220 9020 tcp tcpwrapped open
6710149.126.72.220 9021 tcp tcpwrapped open
6711149.126.72.220 9022 tcp tcpwrapped open
6712149.126.72.220 9023 tcp tcpwrapped open
6713149.126.72.220 9024 tcp tcpwrapped open
6714149.126.72.220 9025 tcp tcpwrapped open
6715149.126.72.220 9026 tcp tcpwrapped open
6716149.126.72.220 9027 tcp tcpwrapped open
6717149.126.72.220 9028 tcp tcpwrapped open
6718149.126.72.220 9029 tcp tcpwrapped open
6719149.126.72.220 9030 tcp tcpwrapped open
6720149.126.72.220 9031 tcp tcpwrapped open
6721149.126.72.220 9032 tcp tcpwrapped open
6722149.126.72.220 9033 tcp tcpwrapped open
6723149.126.72.220 9034 tcp tcpwrapped open
6724149.126.72.220 9035 tcp tcpwrapped open
6725149.126.72.220 9036 tcp tcpwrapped open
6726149.126.72.220 9037 tcp tcpwrapped open
6727149.126.72.220 9038 tcp tcpwrapped open
6728149.126.72.220 9039 tcp tcpwrapped open
6729149.126.72.220 9040 tcp tcpwrapped open
6730149.126.72.220 9041 tcp tcpwrapped open
6731149.126.72.220 9042 tcp tcpwrapped open
6732149.126.72.220 9043 tcp tcpwrapped open
6733149.126.72.220 9044 tcp tcpwrapped open
6734149.126.72.220 9045 tcp tcpwrapped open
6735149.126.72.220 9046 tcp tcpwrapped open
6736149.126.72.220 9047 tcp tcpwrapped open
6737149.126.72.220 9048 tcp tcpwrapped open
6738149.126.72.220 9049 tcp tcpwrapped open
6739149.126.72.220 9050 tcp tcpwrapped open
6740149.126.72.220 9051 tcp tcpwrapped open
6741149.126.72.220 9052 tcp tcpwrapped open
6742149.126.72.220 9058 tcp tcpwrapped open
6743149.126.72.220 9060 tcp tcpwrapped open
6744149.126.72.220 9061 tcp tcpwrapped open
6745149.126.72.220 9070 tcp tcpwrapped open
6746149.126.72.220 9080 tcp tcpwrapped open
6747149.126.72.220 9081 tcp tcpwrapped open
6748149.126.72.220 9082 tcp tcpwrapped open
6749149.126.72.220 9084 tcp tcpwrapped open
6750149.126.72.220 9085 tcp tcpwrapped open
6751149.126.72.220 9086 tcp tcpwrapped open
6752149.126.72.220 9088 tcp tcpwrapped open
6753149.126.72.220 9089 tcp tcpwrapped open
6754149.126.72.220 9090 tcp tcpwrapped open
6755149.126.72.220 9091 tcp tcpwrapped open
6756149.126.72.220 9092 tcp tcpwrapped open
6757149.126.72.220 9093 tcp tcpwrapped open
6758149.126.72.220 9094 tcp tcpwrapped open
6759149.126.72.220 9095 tcp tcpwrapped open
6760149.126.72.220 9096 tcp tcpwrapped open
6761149.126.72.220 9097 tcp tcpwrapped open
6762149.126.72.220 9098 tcp tcpwrapped open
6763149.126.72.220 9099 tcp tcpwrapped open
6764149.126.72.220 9100 tcp jetdirect open
6765149.126.72.220 9101 tcp jetdirect open
6766149.126.72.220 9102 tcp jetdirect open
6767149.126.72.220 9103 tcp jetdirect open
6768149.126.72.220 9104 tcp jetdirect open
6769149.126.72.220 9105 tcp jetdirect open
6770149.126.72.220 9106 tcp jetdirect open
6771149.126.72.220 9107 tcp jetdirect open
6772149.126.72.220 9108 tcp tcpwrapped open
6773149.126.72.220 9109 tcp tcpwrapped open
6774149.126.72.220 9110 tcp tcpwrapped open
6775149.126.72.220 9111 tcp tcpwrapped open
6776149.126.72.220 9136 tcp tcpwrapped open
6777149.126.72.220 9143 tcp tcpwrapped open
6778149.126.72.220 9189 tcp tcpwrapped open
6779149.126.72.220 9199 tcp tcpwrapped open
6780149.126.72.220 9200 tcp tcpwrapped open
6781149.126.72.220 9201 tcp tcpwrapped open
6782149.126.72.220 9202 tcp tcpwrapped open
6783149.126.72.220 9203 tcp tcpwrapped open
6784149.126.72.220 9204 tcp tcpwrapped open
6785149.126.72.220 9205 tcp tcpwrapped open
6786149.126.72.220 9206 tcp tcpwrapped open
6787149.126.72.220 9207 tcp tcpwrapped open
6788149.126.72.220 9208 tcp tcpwrapped open
6789149.126.72.220 9209 tcp tcpwrapped open
6790149.126.72.220 9210 tcp tcpwrapped open
6791149.126.72.220 9211 tcp tcpwrapped open
6792149.126.72.220 9212 tcp tcpwrapped open
6793149.126.72.220 9213 tcp tcpwrapped open
6794149.126.72.220 9214 tcp tcpwrapped open
6795149.126.72.220 9215 tcp tcpwrapped open
6796149.126.72.220 9216 tcp tcpwrapped open
6797149.126.72.220 9217 tcp tcpwrapped open
6798149.126.72.220 9218 tcp tcpwrapped open
6799149.126.72.220 9219 tcp tcpwrapped open
6800149.126.72.220 9220 tcp tcpwrapped open
6801149.126.72.220 9221 tcp tcpwrapped open
6802149.126.72.220 9236 tcp tcpwrapped open
6803149.126.72.220 9251 tcp tcpwrapped open
6804149.126.72.220 9289 tcp tcpwrapped open
6805149.126.72.220 9299 tcp tcpwrapped open
6806149.126.72.220 9300 tcp tcpwrapped open
6807149.126.72.220 9301 tcp tcpwrapped open
6808149.126.72.220 9302 tcp tcpwrapped open
6809149.126.72.220 9303 tcp tcpwrapped open
6810149.126.72.220 9304 tcp tcpwrapped open
6811149.126.72.220 9305 tcp tcpwrapped open
6812149.126.72.220 9306 tcp tcpwrapped open
6813149.126.72.220 9307 tcp tcpwrapped open
6814149.126.72.220 9308 tcp tcpwrapped open
6815149.126.72.220 9309 tcp tcpwrapped open
6816149.126.72.220 9310 tcp tcpwrapped open
6817149.126.72.220 9311 tcp tcpwrapped open
6818149.126.72.220 9350 tcp tcpwrapped open
6819149.126.72.220 9383 tcp tcpwrapped open
6820149.126.72.220 9387 tcp tcpwrapped open
6821149.126.72.220 9389 tcp tcpwrapped open
6822149.126.72.220 9433 tcp tcpwrapped open
6823149.126.72.220 9443 tcp tcpwrapped open
6824149.126.72.220 9444 tcp tcpwrapped open
6825149.126.72.220 9446 tcp tcpwrapped open
6826149.126.72.220 9447 tcp tcpwrapped open
6827149.126.72.220 9500 tcp tcpwrapped open
6828149.126.72.220 9510 tcp tcpwrapped open
6829149.126.72.220 9530 tcp tcpwrapped open
6830149.126.72.220 9550 tcp tcpwrapped open
6831149.126.72.220 9600 tcp tcpwrapped open
6832149.126.72.220 9663 tcp tcpwrapped open
6833149.126.72.220 9690 tcp tcpwrapped open
6834149.126.72.220 9704 tcp tcpwrapped open
6835149.126.72.220 9710 tcp tcpwrapped open
6836149.126.72.220 9711 tcp tcpwrapped open
6837149.126.72.220 9765 tcp tcpwrapped open
6838149.126.72.220 9773 tcp tcpwrapped open
6839149.126.72.220 9779 tcp tcpwrapped open
6840149.126.72.220 9800 tcp tcpwrapped open
6841149.126.72.220 9803 tcp tcpwrapped open
6842149.126.72.220 9804 tcp tcpwrapped open
6843149.126.72.220 9950 tcp tcpwrapped open
6844149.126.72.220 9991 tcp tcpwrapped open
6845149.126.72.220 9992 tcp tcpwrapped open
6846149.126.72.220 9993 tcp tcpwrapped open
6847149.126.72.220 9994 tcp tcpwrapped open
6848149.126.72.220 9997 tcp tcpwrapped open
6849149.126.72.220 9998 tcp tcpwrapped open
6850149.126.72.220 9999 tcp tcpwrapped open
6851149.126.72.220 10000 tcp tcpwrapped open
6852149.126.72.220 10001 tcp tcpwrapped open
6853149.126.72.220 10002 tcp tcpwrapped open
6854149.126.72.220 10003 tcp tcpwrapped open
6855149.126.72.220 10004 tcp tcpwrapped open
6856149.126.72.220 10005 tcp tcpwrapped open
6857149.126.72.220 10006 tcp tcpwrapped open
6858149.126.72.220 10007 tcp tcpwrapped open
6859149.126.72.220 10008 tcp tcpwrapped open
6860149.126.72.220 10009 tcp tcpwrapped open
6861149.126.72.220 10010 tcp tcpwrapped open
6862149.126.72.220 10011 tcp tcpwrapped open
6863149.126.72.220 10012 tcp tcpwrapped open
6864149.126.72.220 10013 tcp tcpwrapped open
6865149.126.72.220 10014 tcp tcpwrapped open
6866149.126.72.220 10015 tcp tcpwrapped open
6867149.126.72.220 10016 tcp tcpwrapped open
6868149.126.72.220 10017 tcp tcpwrapped open
6869149.126.72.220 10018 tcp tcpwrapped open
6870149.126.72.220 10019 tcp tcpwrapped open
6871149.126.72.220 10020 tcp tcpwrapped open
6872149.126.72.220 10021 tcp tcpwrapped open
6873149.126.72.220 10022 tcp tcpwrapped open
6874149.126.72.220 10023 tcp tcpwrapped open
6875149.126.72.220 10024 tcp tcpwrapped open
6876149.126.72.220 10025 tcp tcpwrapped open
6877149.126.72.220 10026 tcp tcpwrapped open
6878149.126.72.220 10027 tcp tcpwrapped open
6879149.126.72.220 10028 tcp tcpwrapped open
6880149.126.72.220 10029 tcp tcpwrapped open
6881149.126.72.220 10030 tcp tcpwrapped open
6882149.126.72.220 10031 tcp tcpwrapped open
6883149.126.72.220 10032 tcp tcpwrapped open
6884149.126.72.220 10033 tcp tcpwrapped open
6885149.126.72.220 10034 tcp tcpwrapped open
6886149.126.72.220 10035 tcp tcpwrapped open
6887149.126.72.220 10036 tcp tcpwrapped open
6888149.126.72.220 10037 tcp tcpwrapped open
6889149.126.72.220 10038 tcp tcpwrapped open
6890149.126.72.220 10039 tcp tcpwrapped open
6891149.126.72.220 10040 tcp tcpwrapped open
6892149.126.72.220 10041 tcp tcpwrapped open
6893149.126.72.220 10042 tcp tcpwrapped open
6894149.126.72.220 10043 tcp tcpwrapped open
6895149.126.72.220 10044 tcp tcpwrapped open
6896149.126.72.220 10045 tcp tcpwrapped open
6897149.126.72.220 10046 tcp tcpwrapped open
6898149.126.72.220 10047 tcp tcpwrapped open
6899149.126.72.220 10048 tcp tcpwrapped open
6900149.126.72.220 10049 tcp tcpwrapped open
6901149.126.72.220 10065 tcp tcpwrapped open
6902149.126.72.220 10071 tcp tcpwrapped open
6903149.126.72.220 10075 tcp tcpwrapped open
6904149.126.72.220 10082 tcp tcpwrapped open
6905149.126.72.220 10084 tcp tcpwrapped open
6906149.126.72.220 10100 tcp tcpwrapped open
6907149.126.72.220 10123 tcp tcpwrapped open
6908149.126.72.220 10200 tcp tcpwrapped open
6909149.126.72.220 10443 tcp tcpwrapped open
6910149.126.72.220 10444 tcp tcpwrapped open
6911149.126.72.220 10892 tcp tcpwrapped open
6912149.126.72.220 10894 tcp tcpwrapped open
6913149.126.72.220 11001 tcp tcpwrapped open
6914149.126.72.220 11002 tcp tcpwrapped open
6915149.126.72.220 11007 tcp tcpwrapped open
6916149.126.72.220 11027 tcp tcpwrapped open
6917149.126.72.220 11065 tcp tcpwrapped open
6918149.126.72.220 11075 tcp tcpwrapped open
6919149.126.72.220 11082 tcp tcpwrapped open
6920149.126.72.220 11084 tcp tcpwrapped open
6921149.126.72.220 11110 tcp tcpwrapped open
6922149.126.72.220 11182 tcp tcpwrapped open
6923149.126.72.220 11184 tcp tcpwrapped open
6924149.126.72.220 11443 tcp tcpwrapped open
6925149.126.72.220 12016 tcp tcpwrapped open
6926149.126.72.220 12082 tcp tcpwrapped open
6927149.126.72.220 12084 tcp tcpwrapped open
6928149.126.72.220 12103 tcp tcpwrapped open
6929149.126.72.220 12104 tcp tcpwrapped open
6930149.126.72.220 12105 tcp tcpwrapped open
6931149.126.72.220 12106 tcp tcpwrapped open
6932149.126.72.220 12107 tcp tcpwrapped open
6933149.126.72.220 12108 tcp tcpwrapped open
6934149.126.72.220 12109 tcp tcpwrapped open
6935149.126.72.220 12110 tcp tcpwrapped open
6936149.126.72.220 12111 tcp tcpwrapped open
6937149.126.72.220 12112 tcp tcpwrapped open
6938149.126.72.220 12113 tcp tcpwrapped open
6939149.126.72.220 12114 tcp tcpwrapped open
6940149.126.72.220 12115 tcp tcpwrapped open
6941149.126.72.220 12116 tcp tcpwrapped open
6942149.126.72.220 12117 tcp tcpwrapped open
6943149.126.72.220 12118 tcp tcpwrapped open
6944149.126.72.220 12119 tcp tcpwrapped open
6945149.126.72.220 12120 tcp tcpwrapped open
6946149.126.72.220 12121 tcp tcpwrapped open
6947149.126.72.220 12122 tcp tcpwrapped open
6948149.126.72.220 12123 tcp tcpwrapped open
6949149.126.72.220 12124 tcp tcpwrapped open
6950149.126.72.220 12125 tcp tcpwrapped open
6951149.126.72.220 12126 tcp tcpwrapped open
6952149.126.72.220 12127 tcp tcpwrapped open
6953149.126.72.220 12128 tcp tcpwrapped open
6954149.126.72.220 12129 tcp tcpwrapped open
6955149.126.72.220 12130 tcp tcpwrapped open
6956149.126.72.220 12131 tcp tcpwrapped open
6957149.126.72.220 12132 tcp tcpwrapped open
6958149.126.72.220 12133 tcp tcpwrapped open
6959149.126.72.220 12134 tcp tcpwrapped open
6960149.126.72.220 12135 tcp tcpwrapped open
6961149.126.72.220 12136 tcp tcpwrapped open
6962149.126.72.220 12137 tcp tcpwrapped open
6963149.126.72.220 12138 tcp tcpwrapped open
6964149.126.72.220 12139 tcp tcpwrapped open
6965149.126.72.220 12140 tcp tcpwrapped open
6966149.126.72.220 12141 tcp tcpwrapped open
6967149.126.72.220 12142 tcp tcpwrapped open
6968149.126.72.220 12143 tcp tcpwrapped open
6969149.126.72.220 12144 tcp tcpwrapped open
6970149.126.72.220 12145 tcp tcpwrapped open
6971149.126.72.220 12146 tcp tcpwrapped open
6972149.126.72.220 12147 tcp tcpwrapped open
6973149.126.72.220 12148 tcp tcpwrapped open
6974149.126.72.220 12149 tcp tcpwrapped open
6975149.126.72.220 12150 tcp tcpwrapped open
6976149.126.72.220 12151 tcp tcpwrapped open
6977149.126.72.220 12152 tcp tcpwrapped open
6978149.126.72.220 12153 tcp tcpwrapped open
6979149.126.72.220 12154 tcp tcpwrapped open
6980149.126.72.220 12155 tcp tcpwrapped open
6981149.126.72.220 12156 tcp tcpwrapped open
6982149.126.72.220 12157 tcp tcpwrapped open
6983149.126.72.220 12158 tcp tcpwrapped open
6984149.126.72.220 12159 tcp tcpwrapped open
6985149.126.72.220 12160 tcp tcpwrapped open
6986149.126.72.220 12161 tcp tcpwrapped open
6987149.126.72.220 12162 tcp tcpwrapped open
6988149.126.72.220 12163 tcp tcpwrapped open
6989149.126.72.220 12164 tcp tcpwrapped open
6990149.126.72.220 12165 tcp tcpwrapped open
6991149.126.72.220 12166 tcp tcpwrapped open
6992149.126.72.220 12167 tcp tcpwrapped open
6993149.126.72.220 12168 tcp tcpwrapped open
6994149.126.72.220 12169 tcp tcpwrapped open
6995149.126.72.220 12170 tcp tcpwrapped open
6996149.126.72.220 12171 tcp tcpwrapped open
6997149.126.72.220 12172 tcp tcpwrapped open
6998149.126.72.220 12173 tcp tcpwrapped open
6999149.126.72.220 12174 tcp tcpwrapped open
7000149.126.72.220 12175 tcp tcpwrapped open
7001149.126.72.220 12176 tcp tcpwrapped open
7002149.126.72.220 12177 tcp tcpwrapped open
7003149.126.72.220 12178 tcp tcpwrapped open
7004149.126.72.220 12179 tcp tcpwrapped open
7005149.126.72.220 12180 tcp tcpwrapped open
7006149.126.72.220 12181 tcp tcpwrapped open
7007149.126.72.220 12182 tcp tcpwrapped open
7008149.126.72.220 12183 tcp tcpwrapped open
7009149.126.72.220 12184 tcp tcpwrapped open
7010149.126.72.220 12185 tcp tcpwrapped open
7011149.126.72.220 12186 tcp tcpwrapped open
7012149.126.72.220 12187 tcp tcpwrapped open
7013149.126.72.220 12188 tcp tcpwrapped open
7014149.126.72.220 12189 tcp tcpwrapped open
7015149.126.72.220 12190 tcp tcpwrapped open
7016149.126.72.220 12191 tcp tcpwrapped open
7017149.126.72.220 12192 tcp tcpwrapped open
7018149.126.72.220 12193 tcp tcpwrapped open
7019149.126.72.220 12194 tcp tcpwrapped open
7020149.126.72.220 12195 tcp tcpwrapped open
7021149.126.72.220 12196 tcp tcpwrapped open
7022149.126.72.220 12197 tcp tcpwrapped open
7023149.126.72.220 12198 tcp tcpwrapped open
7024149.126.72.220 12199 tcp tcpwrapped open
7025149.126.72.220 12200 tcp tcpwrapped open
7026149.126.72.220 12201 tcp tcpwrapped open
7027149.126.72.220 12202 tcp tcpwrapped open
7028149.126.72.220 12203 tcp tcpwrapped open
7029149.126.72.220 12204 tcp tcpwrapped open
7030149.126.72.220 12205 tcp tcpwrapped open
7031149.126.72.220 12206 tcp tcpwrapped open
7032149.126.72.220 12207 tcp tcpwrapped open
7033149.126.72.220 12208 tcp tcpwrapped open
7034149.126.72.220 12209 tcp tcpwrapped open
7035149.126.72.220 12210 tcp tcpwrapped open
7036149.126.72.220 12211 tcp tcpwrapped open
7037149.126.72.220 12212 tcp tcpwrapped open
7038149.126.72.220 12213 tcp tcpwrapped open
7039149.126.72.220 12214 tcp tcpwrapped open
7040149.126.72.220 12215 tcp tcpwrapped open
7041149.126.72.220 12216 tcp tcpwrapped open
7042149.126.72.220 12217 tcp tcpwrapped open
7043149.126.72.220 12218 tcp tcpwrapped open
7044149.126.72.220 12219 tcp tcpwrapped open
7045149.126.72.220 12220 tcp tcpwrapped open
7046149.126.72.220 12221 tcp tcpwrapped open
7047149.126.72.220 12222 tcp tcpwrapped open
7048149.126.72.220 12223 tcp tcpwrapped open
7049149.126.72.220 12224 tcp tcpwrapped open
7050149.126.72.220 12225 tcp tcpwrapped open
7051149.126.72.220 12226 tcp tcpwrapped open
7052149.126.72.220 12227 tcp tcpwrapped open
7053149.126.72.220 12228 tcp tcpwrapped open
7054149.126.72.220 12229 tcp tcpwrapped open
7055149.126.72.220 12230 tcp tcpwrapped open
7056149.126.72.220 12231 tcp tcpwrapped open
7057149.126.72.220 12232 tcp tcpwrapped open
7058149.126.72.220 12233 tcp tcpwrapped open
7059149.126.72.220 12234 tcp tcpwrapped open
7060149.126.72.220 12235 tcp tcpwrapped open
7061149.126.72.220 12236 tcp tcpwrapped open
7062149.126.72.220 12237 tcp tcpwrapped open
7063149.126.72.220 12238 tcp tcpwrapped open
7064149.126.72.220 12239 tcp tcpwrapped open
7065149.126.72.220 12240 tcp tcpwrapped open
7066149.126.72.220 12241 tcp tcpwrapped open
7067149.126.72.220 12242 tcp tcpwrapped open
7068149.126.72.220 12243 tcp tcpwrapped open
7069149.126.72.220 12244 tcp tcpwrapped open
7070149.126.72.220 12245 tcp tcpwrapped open
7071149.126.72.220 12246 tcp tcpwrapped open
7072149.126.72.220 12247 tcp tcpwrapped open
7073149.126.72.220 12248 tcp tcpwrapped open
7074149.126.72.220 12249 tcp tcpwrapped open
7075149.126.72.220 12250 tcp tcpwrapped open
7076149.126.72.220 12251 tcp tcpwrapped open
7077149.126.72.220 12252 tcp tcpwrapped open
7078149.126.72.220 12253 tcp tcpwrapped open
7079149.126.72.220 12254 tcp tcpwrapped open
7080149.126.72.220 12255 tcp tcpwrapped open
7081149.126.72.220 12256 tcp tcpwrapped open
7082149.126.72.220 12257 tcp tcpwrapped open
7083149.126.72.220 12258 tcp tcpwrapped open
7084149.126.72.220 12259 tcp tcpwrapped open
7085149.126.72.220 12260 tcp tcpwrapped open
7086149.126.72.220 12261 tcp tcpwrapped open
7087149.126.72.220 12262 tcp tcpwrapped open
7088149.126.72.220 12263 tcp tcpwrapped open
7089149.126.72.220 12264 tcp tcpwrapped open
7090149.126.72.220 12265 tcp tcpwrapped open
7091149.126.72.220 12266 tcp tcpwrapped open
7092149.126.72.220 12267 tcp tcpwrapped open
7093149.126.72.220 12268 tcp tcpwrapped open
7094149.126.72.220 12269 tcp tcpwrapped open
7095149.126.72.220 12270 tcp tcpwrapped open
7096149.126.72.220 12271 tcp tcpwrapped open
7097149.126.72.220 12272 tcp tcpwrapped open
7098149.126.72.220 12273 tcp tcpwrapped open
7099149.126.72.220 12274 tcp tcpwrapped open
7100149.126.72.220 12275 tcp tcpwrapped open
7101149.126.72.220 12276 tcp tcpwrapped open
7102149.126.72.220 12277 tcp tcpwrapped open
7103149.126.72.220 12278 tcp tcpwrapped open
7104149.126.72.220 12279 tcp tcpwrapped open
7105149.126.72.220 12280 tcp tcpwrapped open
7106149.126.72.220 12281 tcp tcpwrapped open
7107149.126.72.220 12282 tcp tcpwrapped open
7108149.126.72.220 12283 tcp tcpwrapped open
7109149.126.72.220 12284 tcp tcpwrapped open
7110149.126.72.220 12285 tcp tcpwrapped open
7111149.126.72.220 12286 tcp tcpwrapped open
7112149.126.72.220 12287 tcp tcpwrapped open
7113149.126.72.220 12288 tcp tcpwrapped open
7114149.126.72.220 12289 tcp tcpwrapped open
7115149.126.72.220 12290 tcp tcpwrapped open
7116149.126.72.220 12291 tcp tcpwrapped open
7117149.126.72.220 12292 tcp tcpwrapped open
7118149.126.72.220 12293 tcp tcpwrapped open
7119149.126.72.220 12294 tcp tcpwrapped open
7120149.126.72.220 12295 tcp tcpwrapped open
7121149.126.72.220 12296 tcp tcpwrapped open
7122149.126.72.220 12297 tcp tcpwrapped open
7123149.126.72.220 12298 tcp tcpwrapped open
7124149.126.72.220 12299 tcp tcpwrapped open
7125149.126.72.220 12300 tcp tcpwrapped open
7126149.126.72.220 12301 tcp tcpwrapped open
7127149.126.72.220 12302 tcp tcpwrapped open
7128149.126.72.220 12303 tcp tcpwrapped open
7129149.126.72.220 12304 tcp tcpwrapped open
7130149.126.72.220 12305 tcp tcpwrapped open
7131149.126.72.220 12306 tcp tcpwrapped open
7132149.126.72.220 12307 tcp tcpwrapped open
7133149.126.72.220 12308 tcp tcpwrapped open
7134149.126.72.220 12309 tcp tcpwrapped open
7135149.126.72.220 12310 tcp tcpwrapped open
7136149.126.72.220 12311 tcp tcpwrapped open
7137149.126.72.220 12312 tcp tcpwrapped open
7138149.126.72.220 12313 tcp tcpwrapped open
7139149.126.72.220 12314 tcp tcpwrapped open
7140149.126.72.220 12315 tcp tcpwrapped open
7141149.126.72.220 12316 tcp tcpwrapped open
7142149.126.72.220 12317 tcp tcpwrapped open
7143149.126.72.220 12318 tcp tcpwrapped open
7144149.126.72.220 12319 tcp tcpwrapped open
7145149.126.72.220 12320 tcp tcpwrapped open
7146149.126.72.220 12321 tcp tcpwrapped open
7147149.126.72.220 12322 tcp tcpwrapped open
7148149.126.72.220 12323 tcp tcpwrapped open
7149149.126.72.220 12324 tcp tcpwrapped open
7150149.126.72.220 12325 tcp tcpwrapped open
7151149.126.72.220 12326 tcp tcpwrapped open
7152149.126.72.220 12327 tcp tcpwrapped open
7153149.126.72.220 12328 tcp tcpwrapped open
7154149.126.72.220 12329 tcp tcpwrapped open
7155149.126.72.220 12330 tcp tcpwrapped open
7156149.126.72.220 12331 tcp tcpwrapped open
7157149.126.72.220 12332 tcp tcpwrapped open
7158149.126.72.220 12333 tcp tcpwrapped open
7159149.126.72.220 12334 tcp tcpwrapped open
7160149.126.72.220 12335 tcp tcpwrapped open
7161149.126.72.220 12336 tcp tcpwrapped open
7162149.126.72.220 12337 tcp tcpwrapped open
7163149.126.72.220 12338 tcp tcpwrapped open
7164149.126.72.220 12339 tcp tcpwrapped open
7165149.126.72.220 12340 tcp tcpwrapped open
7166149.126.72.220 12341 tcp tcpwrapped open
7167149.126.72.220 12342 tcp tcpwrapped open
7168149.126.72.220 12343 tcp tcpwrapped open
7169149.126.72.220 12344 tcp tcpwrapped open
7170149.126.72.220 12345 tcp tcpwrapped open
7171149.126.72.220 12346 tcp tcpwrapped open
7172149.126.72.220 12347 tcp tcpwrapped open
7173149.126.72.220 12348 tcp tcpwrapped open
7174149.126.72.220 12349 tcp tcpwrapped open
7175149.126.72.220 12350 tcp tcpwrapped open
7176149.126.72.220 12351 tcp tcpwrapped open
7177149.126.72.220 12352 tcp tcpwrapped open
7178149.126.72.220 12353 tcp tcpwrapped open
7179149.126.72.220 12354 tcp tcpwrapped open
7180149.126.72.220 12355 tcp tcpwrapped open
7181149.126.72.220 12356 tcp tcpwrapped open
7182149.126.72.220 12357 tcp tcpwrapped open
7183149.126.72.220 12358 tcp tcpwrapped open
7184149.126.72.220 12359 tcp tcpwrapped open
7185149.126.72.220 12360 tcp tcpwrapped open
7186149.126.72.220 12361 tcp tcpwrapped open
7187149.126.72.220 12362 tcp tcpwrapped open
7188149.126.72.220 12363 tcp tcpwrapped open
7189149.126.72.220 12364 tcp tcpwrapped open
7190149.126.72.220 12365 tcp tcpwrapped open
7191149.126.72.220 12366 tcp tcpwrapped open
7192149.126.72.220 12367 tcp tcpwrapped open
7193149.126.72.220 12368 tcp tcpwrapped open
7194149.126.72.220 12369 tcp tcpwrapped open
7195149.126.72.220 12370 tcp tcpwrapped open
7196149.126.72.220 12371 tcp tcpwrapped open
7197149.126.72.220 12372 tcp tcpwrapped open
7198149.126.72.220 12373 tcp tcpwrapped open
7199149.126.72.220 12374 tcp tcpwrapped open
7200149.126.72.220 12375 tcp tcpwrapped open
7201149.126.72.220 12376 tcp tcpwrapped open
7202149.126.72.220 12377 tcp tcpwrapped open
7203149.126.72.220 12378 tcp tcpwrapped open
7204149.126.72.220 12379 tcp tcpwrapped open
7205149.126.72.220 12380 tcp tcpwrapped open
7206149.126.72.220 12381 tcp tcpwrapped open
7207149.126.72.220 12382 tcp tcpwrapped open
7208149.126.72.220 12383 tcp tcpwrapped open
7209149.126.72.220 12384 tcp tcpwrapped open
7210149.126.72.220 12385 tcp tcpwrapped open
7211149.126.72.220 12386 tcp tcpwrapped open
7212149.126.72.220 12387 tcp tcpwrapped open
7213149.126.72.220 12388 tcp tcpwrapped open
7214149.126.72.220 12389 tcp tcpwrapped open
7215149.126.72.220 12390 tcp tcpwrapped open
7216149.126.72.220 12391 tcp tcpwrapped open
7217149.126.72.220 12392 tcp tcpwrapped open
7218149.126.72.220 12393 tcp tcpwrapped open
7219149.126.72.220 12394 tcp tcpwrapped open
7220149.126.72.220 12395 tcp tcpwrapped open
7221149.126.72.220 12396 tcp tcpwrapped open
7222149.126.72.220 12397 tcp tcpwrapped open
7223149.126.72.220 12398 tcp tcpwrapped open
7224149.126.72.220 12399 tcp tcpwrapped open
7225149.126.72.220 12400 tcp tcpwrapped open
7226149.126.72.220 12401 tcp tcpwrapped open
7227149.126.72.220 12402 tcp tcpwrapped open
7228149.126.72.220 12403 tcp tcpwrapped open
7229149.126.72.220 12404 tcp tcpwrapped open
7230149.126.72.220 12405 tcp tcpwrapped open
7231149.126.72.220 12406 tcp tcpwrapped open
7232149.126.72.220 12407 tcp tcpwrapped open
7233149.126.72.220 12408 tcp tcpwrapped open
7234149.126.72.220 12409 tcp tcpwrapped open
7235149.126.72.220 12410 tcp tcpwrapped open
7236149.126.72.220 12411 tcp tcpwrapped open
7237149.126.72.220 12412 tcp tcpwrapped open
7238149.126.72.220 12413 tcp tcpwrapped open
7239149.126.72.220 12414 tcp tcpwrapped open
7240149.126.72.220 12415 tcp tcpwrapped open
7241149.126.72.220 12416 tcp tcpwrapped open
7242149.126.72.220 12417 tcp tcpwrapped open
7243149.126.72.220 12418 tcp tcpwrapped open
7244149.126.72.220 12419 tcp tcpwrapped open
7245149.126.72.220 12420 tcp tcpwrapped open
7246149.126.72.220 12421 tcp tcpwrapped open
7247149.126.72.220 12422 tcp tcpwrapped open
7248149.126.72.220 12423 tcp tcpwrapped open
7249149.126.72.220 12424 tcp tcpwrapped open
7250149.126.72.220 12425 tcp tcpwrapped open
7251149.126.72.220 12426 tcp tcpwrapped open
7252149.126.72.220 12427 tcp tcpwrapped open
7253149.126.72.220 12428 tcp tcpwrapped open
7254149.126.72.220 12429 tcp tcpwrapped open
7255149.126.72.220 12430 tcp tcpwrapped open
7256149.126.72.220 12431 tcp tcpwrapped open
7257149.126.72.220 12432 tcp tcpwrapped open
7258149.126.72.220 12433 tcp tcpwrapped open
7259149.126.72.220 12434 tcp tcpwrapped open
7260149.126.72.220 12435 tcp tcpwrapped open
7261149.126.72.220 12436 tcp tcpwrapped open
7262149.126.72.220 12437 tcp tcpwrapped open
7263149.126.72.220 12438 tcp tcpwrapped open
7264149.126.72.220 12439 tcp tcpwrapped open
7265149.126.72.220 12440 tcp tcpwrapped open
7266149.126.72.220 12441 tcp tcpwrapped open
7267149.126.72.220 12442 tcp tcpwrapped open
7268149.126.72.220 12443 tcp tcpwrapped open
7269149.126.72.220 12444 tcp tcpwrapped open
7270149.126.72.220 12445 tcp tcpwrapped open
7271149.126.72.220 12446 tcp tcpwrapped open
7272149.126.72.220 12447 tcp tcpwrapped open
7273149.126.72.220 12448 tcp tcpwrapped open
7274149.126.72.220 12449 tcp tcpwrapped open
7275149.126.72.220 12450 tcp tcpwrapped open
7276149.126.72.220 12451 tcp tcpwrapped open
7277149.126.72.220 12452 tcp tcpwrapped open
7278149.126.72.220 12453 tcp tcpwrapped open
7279149.126.72.220 12454 tcp tcpwrapped open
7280149.126.72.220 12455 tcp tcpwrapped open
7281149.126.72.220 12456 tcp tcpwrapped open
7282149.126.72.220 12457 tcp tcpwrapped open
7283149.126.72.220 12458 tcp tcpwrapped open
7284149.126.72.220 12459 tcp tcpwrapped open
7285149.126.72.220 12460 tcp tcpwrapped open
7286149.126.72.220 12461 tcp tcpwrapped open
7287149.126.72.220 12462 tcp tcpwrapped open
7288149.126.72.220 12463 tcp tcpwrapped open
7289149.126.72.220 12464 tcp tcpwrapped open
7290149.126.72.220 12465 tcp tcpwrapped open
7291149.126.72.220 12466 tcp tcpwrapped open
7292149.126.72.220 12467 tcp tcpwrapped open
7293149.126.72.220 12468 tcp tcpwrapped open
7294149.126.72.220 12469 tcp tcpwrapped open
7295149.126.72.220 12470 tcp tcpwrapped open
7296149.126.72.220 12471 tcp tcpwrapped open
7297149.126.72.220 12472 tcp tcpwrapped open
7298149.126.72.220 12473 tcp tcpwrapped open
7299149.126.72.220 12474 tcp tcpwrapped open
7300149.126.72.220 12475 tcp tcpwrapped open
7301149.126.72.220 12476 tcp tcpwrapped open
7302149.126.72.220 12477 tcp tcpwrapped open
7303149.126.72.220 12478 tcp tcpwrapped open
7304149.126.72.220 12479 tcp tcpwrapped open
7305149.126.72.220 12480 tcp tcpwrapped open
7306149.126.72.220 12481 tcp tcpwrapped open
7307149.126.72.220 12482 tcp tcpwrapped open
7308149.126.72.220 12483 tcp tcpwrapped open
7309149.126.72.220 12484 tcp tcpwrapped open
7310149.126.72.220 12485 tcp tcpwrapped open
7311149.126.72.220 12486 tcp tcpwrapped open
7312149.126.72.220 12487 tcp tcpwrapped open
7313149.126.72.220 12488 tcp tcpwrapped open
7314149.126.72.220 12489 tcp tcpwrapped open
7315149.126.72.220 12490 tcp tcpwrapped open
7316149.126.72.220 12491 tcp tcpwrapped open
7317149.126.72.220 12492 tcp tcpwrapped open
7318149.126.72.220 12493 tcp tcpwrapped open
7319149.126.72.220 12494 tcp tcpwrapped open
7320149.126.72.220 12495 tcp tcpwrapped open
7321149.126.72.220 12496 tcp tcpwrapped open
7322149.126.72.220 12497 tcp tcpwrapped open
7323149.126.72.220 12498 tcp tcpwrapped open
7324149.126.72.220 12499 tcp tcpwrapped open
7325149.126.72.220 12500 tcp tcpwrapped open
7326149.126.72.220 12501 tcp tcpwrapped open
7327149.126.72.220 12502 tcp tcpwrapped open
7328149.126.72.220 12503 tcp tcpwrapped open
7329149.126.72.220 12504 tcp tcpwrapped open
7330149.126.72.220 12505 tcp tcpwrapped open
7331149.126.72.220 12506 tcp tcpwrapped open
7332149.126.72.220 12507 tcp tcpwrapped open
7333149.126.72.220 12508 tcp tcpwrapped open
7334149.126.72.220 12509 tcp tcpwrapped open
7335149.126.72.220 12510 tcp tcpwrapped open
7336149.126.72.220 12511 tcp tcpwrapped open
7337149.126.72.220 12512 tcp tcpwrapped open
7338149.126.72.220 12513 tcp tcpwrapped open
7339149.126.72.220 12514 tcp tcpwrapped open
7340149.126.72.220 12515 tcp tcpwrapped open
7341149.126.72.220 12516 tcp tcpwrapped open
7342149.126.72.220 12517 tcp tcpwrapped open
7343149.126.72.220 12518 tcp tcpwrapped open
7344149.126.72.220 12519 tcp tcpwrapped open
7345149.126.72.220 12520 tcp tcpwrapped open
7346149.126.72.220 12521 tcp tcpwrapped open
7347149.126.72.220 12522 tcp tcpwrapped open
7348149.126.72.220 12523 tcp tcpwrapped open
7349149.126.72.220 12524 tcp tcpwrapped open
7350149.126.72.220 12525 tcp tcpwrapped open
7351149.126.72.220 12526 tcp tcpwrapped open
7352149.126.72.220 12527 tcp tcpwrapped open
7353149.126.72.220 12528 tcp tcpwrapped open
7354149.126.72.220 12529 tcp tcpwrapped open
7355149.126.72.220 12530 tcp tcpwrapped open
7356149.126.72.220 12531 tcp tcpwrapped open
7357149.126.72.220 12532 tcp tcpwrapped open
7358149.126.72.220 12533 tcp tcpwrapped open
7359149.126.72.220 12534 tcp tcpwrapped open
7360149.126.72.220 12535 tcp tcpwrapped open
7361149.126.72.220 12536 tcp tcpwrapped open
7362149.126.72.220 12537 tcp tcpwrapped open
7363149.126.72.220 12538 tcp tcpwrapped open
7364149.126.72.220 12539 tcp tcpwrapped open
7365149.126.72.220 12540 tcp tcpwrapped open
7366149.126.72.220 12541 tcp tcpwrapped open
7367149.126.72.220 12542 tcp tcpwrapped open
7368149.126.72.220 12543 tcp tcpwrapped open
7369149.126.72.220 12544 tcp tcpwrapped open
7370149.126.72.220 12545 tcp tcpwrapped open
7371149.126.72.220 12546 tcp tcpwrapped open
7372149.126.72.220 12547 tcp tcpwrapped open
7373149.126.72.220 12548 tcp tcpwrapped open
7374149.126.72.220 12549 tcp tcpwrapped open
7375149.126.72.220 12550 tcp tcpwrapped open
7376149.126.72.220 12551 tcp tcpwrapped open
7377149.126.72.220 12552 tcp tcpwrapped open
7378149.126.72.220 12553 tcp tcpwrapped open
7379149.126.72.220 12554 tcp tcpwrapped open
7380149.126.72.220 12555 tcp tcpwrapped open
7381149.126.72.220 12556 tcp tcpwrapped open
7382149.126.72.220 12557 tcp tcpwrapped open
7383149.126.72.220 12558 tcp tcpwrapped open
7384149.126.72.220 12559 tcp tcpwrapped open
7385149.126.72.220 12560 tcp tcpwrapped open
7386149.126.72.220 12561 tcp tcpwrapped open
7387149.126.72.220 12562 tcp tcpwrapped open
7388149.126.72.220 12563 tcp tcpwrapped open
7389149.126.72.220 12564 tcp tcpwrapped open
7390149.126.72.220 12565 tcp tcpwrapped open
7391149.126.72.220 12566 tcp tcpwrapped open
7392149.126.72.220 12567 tcp tcpwrapped open
7393149.126.72.220 12568 tcp tcpwrapped open
7394149.126.72.220 12569 tcp tcpwrapped open
7395149.126.72.220 12570 tcp tcpwrapped open
7396149.126.72.220 12571 tcp tcpwrapped open
7397149.126.72.220 12572 tcp tcpwrapped open
7398149.126.72.220 12573 tcp tcpwrapped open
7399149.126.72.220 12574 tcp tcpwrapped open
7400149.126.72.220 12575 tcp tcpwrapped open
7401149.126.72.220 12576 tcp tcpwrapped open
7402149.126.72.220 12577 tcp tcpwrapped open
7403149.126.72.220 12578 tcp tcpwrapped open
7404149.126.72.220 12579 tcp tcpwrapped open
7405149.126.72.220 12580 tcp tcpwrapped open
7406149.126.72.220 12581 tcp tcpwrapped open
7407149.126.72.220 12582 tcp tcpwrapped open
7408149.126.72.220 12583 tcp tcpwrapped open
7409149.126.72.220 12584 tcp tcpwrapped open
7410149.126.72.220 12585 tcp tcpwrapped open
7411149.126.72.220 12586 tcp tcpwrapped open
7412149.126.72.220 12587 tcp tcpwrapped open
7413149.126.72.220 12588 tcp tcpwrapped open
7414149.126.72.220 12589 tcp tcpwrapped open
7415149.126.72.220 12590 tcp tcpwrapped open
7416149.126.72.220 13082 tcp tcpwrapped open
7417149.126.72.220 13084 tcp tcpwrapped open
7418149.126.72.220 13333 tcp tcpwrapped open
7419149.126.72.220 13443 tcp tcpwrapped open
7420149.126.72.220 14006 tcp tcpwrapped open
7421149.126.72.220 14082 tcp tcpwrapped open
7422149.126.72.220 14084 tcp tcpwrapped open
7423149.126.72.220 14104 tcp tcpwrapped open
7424149.126.72.220 14130 tcp tcpwrapped open
7425149.126.72.220 14182 tcp tcpwrapped open
7426149.126.72.220 14184 tcp tcpwrapped open
7427149.126.72.220 14330 tcp tcpwrapped open
7428149.126.72.220 14443 tcp tcpwrapped open
7429149.126.72.220 14825 tcp tcpwrapped open
7430149.126.72.220 15002 tcp tcpwrapped open
7431149.126.72.220 15006 tcp tcpwrapped open
7432149.126.72.220 15082 tcp tcpwrapped open
7433149.126.72.220 15084 tcp tcpwrapped open
7434149.126.72.220 15151 tcp tcpwrapped open
7435149.126.72.220 15555 tcp tcpwrapped open
7436149.126.72.220 16000 tcp tcpwrapped open
7437149.126.72.220 16001 tcp tcpwrapped open
7438149.126.72.220 16015 tcp tcpwrapped open
7439149.126.72.220 16016 tcp tcpwrapped open
7440149.126.72.220 16017 tcp tcpwrapped open
7441149.126.72.220 16082 tcp tcpwrapped open
7442149.126.72.220 16084 tcp tcpwrapped open
7443149.126.72.220 16311 tcp tcpwrapped open
7444149.126.72.220 16316 tcp tcpwrapped open
7445149.126.72.220 16443 tcp tcpwrapped open
7446149.126.72.220 16800 tcp tcpwrapped open
7447149.126.72.220 16888 tcp tcpwrapped open
7448149.126.72.220 17082 tcp tcpwrapped open
7449149.126.72.220 17084 tcp tcpwrapped open
7450149.126.72.220 17182 tcp tcpwrapped open
7451149.126.72.220 17184 tcp tcpwrapped open
7452149.126.72.220 17770 tcp tcpwrapped open
7453149.126.72.220 17771 tcp tcpwrapped open
7454149.126.72.220 17772 tcp tcpwrapped open
7455149.126.72.220 17773 tcp tcpwrapped open
7456149.126.72.220 17774 tcp tcpwrapped open
7457149.126.72.220 17775 tcp tcpwrapped open
7458149.126.72.220 17776 tcp tcpwrapped open
7459149.126.72.220 17777 tcp tcpwrapped open
7460149.126.72.220 17778 tcp tcpwrapped open
7461149.126.72.220 17779 tcp tcpwrapped open
7462149.126.72.220 17780 tcp tcpwrapped open
7463149.126.72.220 18000 tcp tcpwrapped open
7464149.126.72.220 18001 tcp tcpwrapped open
7465149.126.72.220 18002 tcp tcpwrapped open
7466149.126.72.220 18003 tcp tcpwrapped open
7467149.126.72.220 18004 tcp tcpwrapped open
7468149.126.72.220 18005 tcp tcpwrapped open
7469149.126.72.220 18006 tcp tcpwrapped open
7470149.126.72.220 18007 tcp tcpwrapped open
7471149.126.72.220 18008 tcp tcpwrapped open
7472149.126.72.220 18009 tcp tcpwrapped open
7473149.126.72.220 18010 tcp tcpwrapped open
7474149.126.72.220 18011 tcp tcpwrapped open
7475149.126.72.220 18012 tcp tcpwrapped open
7476149.126.72.220 18013 tcp tcpwrapped open
7477149.126.72.220 18014 tcp tcpwrapped open
7478149.126.72.220 18015 tcp tcpwrapped open
7479149.126.72.220 18016 tcp tcpwrapped open
7480149.126.72.220 18017 tcp tcpwrapped open
7481149.126.72.220 18018 tcp tcpwrapped open
7482149.126.72.220 18019 tcp tcpwrapped open
7483149.126.72.220 18020 tcp tcpwrapped open
7484149.126.72.220 18021 tcp tcpwrapped open
7485149.126.72.220 18022 tcp tcpwrapped open
7486149.126.72.220 18023 tcp tcpwrapped open
7487149.126.72.220 18024 tcp tcpwrapped open
7488149.126.72.220 18025 tcp tcpwrapped open
7489149.126.72.220 18026 tcp tcpwrapped open
7490149.126.72.220 18027 tcp tcpwrapped open
7491149.126.72.220 18028 tcp tcpwrapped open
7492149.126.72.220 18029 tcp tcpwrapped open
7493149.126.72.220 18030 tcp tcpwrapped open
7494149.126.72.220 18031 tcp tcpwrapped open
7495149.126.72.220 18032 tcp tcpwrapped open
7496149.126.72.220 18033 tcp tcpwrapped open
7497149.126.72.220 18034 tcp tcpwrapped open
7498149.126.72.220 18035 tcp tcpwrapped open
7499149.126.72.220 18036 tcp tcpwrapped open
7500149.126.72.220 18037 tcp tcpwrapped open
7501149.126.72.220 18038 tcp tcpwrapped open
7502149.126.72.220 18039 tcp tcpwrapped open
7503149.126.72.220 18040 tcp tcpwrapped open
7504149.126.72.220 18041 tcp tcpwrapped open
7505149.126.72.220 18042 tcp tcpwrapped open
7506149.126.72.220 18043 tcp tcpwrapped open
7507149.126.72.220 18044 tcp tcpwrapped open
7508149.126.72.220 18045 tcp tcpwrapped open
7509149.126.72.220 18046 tcp tcpwrapped open
7510149.126.72.220 18047 tcp tcpwrapped open
7511149.126.72.220 18048 tcp tcpwrapped open
7512149.126.72.220 18049 tcp tcpwrapped open
7513149.126.72.220 18050 tcp tcpwrapped open
7514149.126.72.220 18051 tcp tcpwrapped open
7515149.126.72.220 18052 tcp tcpwrapped open
7516149.126.72.220 18053 tcp tcpwrapped open
7517149.126.72.220 18054 tcp tcpwrapped open
7518149.126.72.220 18055 tcp tcpwrapped open
7519149.126.72.220 18056 tcp tcpwrapped open
7520149.126.72.220 18057 tcp tcpwrapped open
7521149.126.72.220 18058 tcp tcpwrapped open
7522149.126.72.220 18059 tcp tcpwrapped open
7523149.126.72.220 18060 tcp tcpwrapped open
7524149.126.72.220 18061 tcp tcpwrapped open
7525149.126.72.220 18062 tcp tcpwrapped open
7526149.126.72.220 18063 tcp tcpwrapped open
7527149.126.72.220 18064 tcp tcpwrapped open
7528149.126.72.220 18065 tcp tcpwrapped open
7529149.126.72.220 18066 tcp tcpwrapped open
7530149.126.72.220 18067 tcp tcpwrapped open
7531149.126.72.220 18068 tcp tcpwrapped open
7532149.126.72.220 18069 tcp tcpwrapped open
7533149.126.72.220 18070 tcp tcpwrapped open
7534149.126.72.220 18071 tcp tcpwrapped open
7535149.126.72.220 18072 tcp tcpwrapped open
7536149.126.72.220 18073 tcp tcpwrapped open
7537149.126.72.220 18074 tcp tcpwrapped open
7538149.126.72.220 18075 tcp tcpwrapped open
7539149.126.72.220 18076 tcp tcpwrapped open
7540149.126.72.220 18077 tcp tcpwrapped open
7541149.126.72.220 18078 tcp tcpwrapped open
7542149.126.72.220 18079 tcp tcpwrapped open
7543149.126.72.220 18080 tcp tcpwrapped open
7544149.126.72.220 18081 tcp tcpwrapped open
7545149.126.72.220 18082 tcp tcpwrapped open
7546149.126.72.220 18083 tcp tcpwrapped open
7547149.126.72.220 18084 tcp tcpwrapped open
7548149.126.72.220 18085 tcp tcpwrapped open
7549149.126.72.220 18086 tcp tcpwrapped open
7550149.126.72.220 18087 tcp tcpwrapped open
7551149.126.72.220 18088 tcp tcpwrapped open
7552149.126.72.220 18089 tcp tcpwrapped open
7553149.126.72.220 18090 tcp tcpwrapped open
7554149.126.72.220 18091 tcp tcpwrapped open
7555149.126.72.220 18092 tcp tcpwrapped open
7556149.126.72.220 18093 tcp tcpwrapped open
7557149.126.72.220 18094 tcp tcpwrapped open
7558149.126.72.220 18095 tcp tcpwrapped open
7559149.126.72.220 18096 tcp tcpwrapped open
7560149.126.72.220 18097 tcp tcpwrapped open
7561149.126.72.220 18098 tcp tcpwrapped open
7562149.126.72.220 18099 tcp tcpwrapped open
7563149.126.72.220 18100 tcp tcpwrapped open
7564149.126.72.220 18101 tcp tcpwrapped open
7565149.126.72.220 18102 tcp tcpwrapped open
7566149.126.72.220 18103 tcp tcpwrapped open
7567149.126.72.220 18104 tcp tcpwrapped open
7568149.126.72.220 18105 tcp tcpwrapped open
7569149.126.72.220 18106 tcp tcpwrapped open
7570149.126.72.220 18107 tcp tcpwrapped open
7571149.126.72.220 18108 tcp tcpwrapped open
7572149.126.72.220 18109 tcp tcpwrapped open
7573149.126.72.220 18110 tcp tcpwrapped open
7574149.126.72.220 18111 tcp tcpwrapped open
7575149.126.72.220 18112 tcp tcpwrapped open
7576149.126.72.220 18113 tcp tcpwrapped open
7577149.126.72.220 18200 tcp tcpwrapped open
7578149.126.72.220 18239 tcp tcpwrapped open
7579149.126.72.220 18443 tcp tcpwrapped open
7580149.126.72.220 18802 tcp tcpwrapped open
7581149.126.72.220 19013 tcp tcpwrapped open
7582149.126.72.220 19014 tcp tcpwrapped open
7583149.126.72.220 19015 tcp tcpwrapped open
7584149.126.72.220 19016 tcp tcpwrapped open
7585149.126.72.220 19017 tcp tcpwrapped open
7586149.126.72.220 19022 tcp tcpwrapped open
7587149.126.72.220 19080 tcp tcpwrapped open
7588149.126.72.220 19082 tcp tcpwrapped open
7589149.126.72.220 19084 tcp tcpwrapped open
7590149.126.72.220 19443 tcp tcpwrapped open
7591149.126.72.220 20000 tcp tcpwrapped open
7592149.126.72.220 20001 tcp tcpwrapped open
7593149.126.72.220 20010 tcp tcpwrapped open
7594149.126.72.220 20020 tcp tcpwrapped open
7595149.126.72.220 20030 tcp tcpwrapped open
7596149.126.72.220 20040 tcp tcpwrapped open
7597149.126.72.220 20050 tcp tcpwrapped open
7598149.126.72.220 20053 tcp tcpwrapped open
7599149.126.72.220 20060 tcp tcpwrapped open
7600149.126.72.220 20070 tcp tcpwrapped open
7601149.126.72.220 20080 tcp tcpwrapped open
7602149.126.72.220 20082 tcp tcpwrapped open
7603149.126.72.220 20084 tcp tcpwrapped open
7604149.126.72.220 20090 tcp tcpwrapped open
7605149.126.72.220 20100 tcp tcpwrapped open
7606149.126.72.220 20106 tcp tcpwrapped open
7607149.126.72.220 20107 tcp tcpwrapped open
7608149.126.72.220 20110 tcp tcpwrapped open
7609149.126.72.220 20150 tcp tcpwrapped open
7610149.126.72.220 20182 tcp tcpwrapped open
7611149.126.72.220 20184 tcp tcpwrapped open
7612149.126.72.220 20185 tcp tcpwrapped open
7613149.126.72.220 20200 tcp tcpwrapped open
7614149.126.72.220 20208 tcp tcpwrapped open
7615149.126.72.220 20325 tcp tcpwrapped open
7616149.126.72.220 20500 tcp tcpwrapped open
7617149.126.72.220 20512 tcp tcpwrapped open
7618149.126.72.220 20600 tcp tcpwrapped open
7619149.126.72.220 20800 tcp tcpwrapped open
7620149.126.72.220 20892 tcp tcpwrapped open
7621149.126.72.220 20894 tcp tcpwrapped open
7622149.126.72.220 20900 tcp tcpwrapped open
7623149.126.72.220 21081 tcp tcpwrapped open
7624149.126.72.220 21082 tcp tcpwrapped open
7625149.126.72.220 21083 tcp tcpwrapped open
7626149.126.72.220 21084 tcp tcpwrapped open
7627149.126.72.220 21100 tcp tcpwrapped open
7628149.126.72.220 21200 tcp tcpwrapped open
7629149.126.72.220 21300 tcp tcpwrapped open
7630149.126.72.220 21357 tcp tcpwrapped open
7631149.126.72.220 21381 tcp tcpwrapped open
7632149.126.72.220 21400 tcp tcpwrapped open
7633149.126.72.220 21500 tcp tcpwrapped open
7634149.126.72.220 21935 tcp tcpwrapped open
7635149.126.72.220 22082 tcp tcpwrapped open
7636149.126.72.220 22084 tcp tcpwrapped open
7637149.126.72.220 22103 tcp tcpwrapped open
7638149.126.72.220 22107 tcp tcpwrapped open
7639149.126.72.220 22206 tcp tcpwrapped open
7640149.126.72.220 22345 tcp tcpwrapped open
7641149.126.72.220 22403 tcp tcpwrapped open
7642149.126.72.220 22609 tcp tcpwrapped open
7643149.126.72.220 22703 tcp tcpwrapped open
7644149.126.72.220 22705 tcp tcpwrapped open
7645149.126.72.220 23082 tcp tcpwrapped open
7646149.126.72.220 23084 tcp tcpwrapped open
7647149.126.72.220 23182 tcp tcpwrapped open
7648149.126.72.220 23184 tcp tcpwrapped open
7649149.126.72.220 24082 tcp tcpwrapped open
7650149.126.72.220 24084 tcp tcpwrapped open
7651149.126.72.220 24472 tcp tcpwrapped open
7652149.126.72.220 24510 tcp tcpwrapped open
7653149.126.72.220 25000 tcp tcpwrapped open
7654149.126.72.220 25001 tcp tcpwrapped open
7655149.126.72.220 25002 tcp tcpwrapped open
7656149.126.72.220 25003 tcp tcpwrapped open
7657149.126.72.220 25004 tcp tcpwrapped open
7658149.126.72.220 25005 tcp tcpwrapped open
7659149.126.72.220 25006 tcp tcpwrapped open
7660149.126.72.220 25007 tcp tcpwrapped open
7661149.126.72.220 25008 tcp tcpwrapped open
7662149.126.72.220 25009 tcp tcpwrapped open
7663149.126.72.220 25010 tcp tcpwrapped open
7664149.126.72.220 25082 tcp tcpwrapped open
7665149.126.72.220 25084 tcp tcpwrapped open
7666149.126.72.220 25782 tcp tcpwrapped open
7667149.126.72.220 25952 tcp tcpwrapped open
7668149.126.72.220 27571 tcp tcpwrapped open
7669149.126.72.220 28001 tcp tcpwrapped open
7670149.126.72.220 28080 tcp tcpwrapped open
7671149.126.72.220 28818 tcp tcpwrapped open
7672149.126.72.220 29798 tcp tcpwrapped open
7673149.126.72.220 29799 tcp tcpwrapped open
7674149.126.72.220 30000 tcp tcpwrapped open
7675149.126.72.220 30001 tcp tcpwrapped open
7676149.126.72.220 30003 tcp tcpwrapped open
7677149.126.72.220 30005 tcp tcpwrapped open
7678149.126.72.220 30007 tcp tcpwrapped open
7679149.126.72.220 30009 tcp tcpwrapped open
7680149.126.72.220 30011 tcp tcpwrapped open
7681149.126.72.220 30013 tcp tcpwrapped open
7682149.126.72.220 30015 tcp tcpwrapped open
7683149.126.72.220 30017 tcp tcpwrapped open
7684149.126.72.220 30019 tcp tcpwrapped open
7685149.126.72.220 30021 tcp tcpwrapped open
7686149.126.72.220 30050 tcp tcpwrapped open
7687149.126.72.220 30106 tcp tcpwrapped open
7688149.126.72.220 30110 tcp tcpwrapped open
7689149.126.72.220 30111 tcp tcpwrapped open
7690149.126.72.220 30112 tcp tcpwrapped open
7691149.126.72.220 30113 tcp tcpwrapped open
7692149.126.72.220 30120 tcp tcpwrapped open
7693149.126.72.220 30121 tcp tcpwrapped open
7694149.126.72.220 30122 tcp tcpwrapped open
7695149.126.72.220 30123 tcp tcpwrapped open
7696149.126.72.220 30452 tcp tcpwrapped open
7697149.126.72.220 30468 tcp tcpwrapped open
7698149.126.72.220 30473 tcp tcpwrapped open
7699149.126.72.220 30479 tcp tcpwrapped open
7700149.126.72.220 30501 tcp tcpwrapped open
7701149.126.72.220 30700 tcp tcpwrapped open
7702149.126.72.220 30701 tcp tcpwrapped open
7703149.126.72.220 30892 tcp tcpwrapped open
7704149.126.72.220 30894 tcp tcpwrapped open
7705149.126.72.220 31337 tcp tcpwrapped open
7706149.126.72.220 32101 tcp tcpwrapped open
7707149.126.72.220 32102 tcp tcpwrapped open
7708149.126.72.220 32202 tcp tcpwrapped open
7709149.126.72.220 32303 tcp tcpwrapped open
7710149.126.72.220 32443 tcp tcpwrapped open
7711149.126.72.220 32444 tcp tcpwrapped open
7712149.126.72.220 32746 tcp tcpwrapped open
7713149.126.72.220 32800 tcp tcpwrapped open
7714149.126.72.220 34225 tcp tcpwrapped open
7715149.126.72.220 34500 tcp tcpwrapped open
7716149.126.72.220 35522 tcp tcpwrapped open
7717149.126.72.220 35524 tcp tcpwrapped open
7718149.126.72.220 35531 tcp tcpwrapped open
7719149.126.72.220 35554 tcp tcpwrapped open
7720149.126.72.220 35559 tcp tcpwrapped open
7721149.126.72.220 35560 tcp tcpwrapped open
7722149.126.72.220 36982 tcp tcpwrapped open
7723149.126.72.220 36983 tcp tcpwrapped open
7724149.126.72.220 36984 tcp tcpwrapped open
7725149.126.72.220 37080 tcp tcpwrapped open
7726149.126.72.220 38880 tcp tcpwrapped open
7727149.126.72.220 39001 tcp tcpwrapped open
7728149.126.72.220 40070 tcp tcpwrapped open
7729149.126.72.220 40099 tcp tcpwrapped open
7730149.126.72.220 40892 tcp tcpwrapped open
7731149.126.72.220 40894 tcp tcpwrapped open
7732149.126.72.220 42208 tcp tcpwrapped open
7733149.126.72.220 42424 tcp tcpwrapped open
7734149.126.72.220 42901 tcp tcpwrapped open
7735149.126.72.220 43008 tcp tcpwrapped open
7736149.126.72.220 43009 tcp tcpwrapped open
7737149.126.72.220 43200 tcp tcpwrapped open
7738149.126.72.220 44100 tcp tcpwrapped open
7739149.126.72.220 44300 tcp tcpwrapped open
7740149.126.72.220 44301 tcp tcpwrapped open
7741149.126.72.220 44302 tcp tcpwrapped open
7742149.126.72.220 44303 tcp tcpwrapped open
7743149.126.72.220 44304 tcp tcpwrapped open
7744149.126.72.220 44305 tcp tcpwrapped open
7745149.126.72.220 44306 tcp tcpwrapped open
7746149.126.72.220 44307 tcp tcpwrapped open
7747149.126.72.220 44308 tcp tcpwrapped open
7748149.126.72.220 44309 tcp tcpwrapped open
7749149.126.72.220 44310 tcp tcpwrapped open
7750149.126.72.220 44320 tcp tcpwrapped open
7751149.126.72.220 44332 tcp tcpwrapped open
7752149.126.72.220 44333 tcp tcpwrapped open
7753149.126.72.220 44334 tcp tcpwrapped open
7754149.126.72.220 44336 tcp tcpwrapped open
7755149.126.72.220 44337 tcp tcpwrapped open
7756149.126.72.220 44340 tcp tcpwrapped open
7757149.126.72.220 44341 tcp tcpwrapped open
7758149.126.72.220 44345 tcp tcpwrapped open
7759149.126.72.220 44400 tcp tcpwrapped open
7760149.126.72.220 44410 tcp tcpwrapped open
7761149.126.72.220 44420 tcp tcpwrapped open
7762149.126.72.220 45000 tcp tcpwrapped open
7763149.126.72.220 45555 tcp tcpwrapped open
7764149.126.72.220 45666 tcp tcpwrapped open
7765149.126.72.220 45667 tcp tcpwrapped open
7766149.126.72.220 45668 tcp tcpwrapped open
7767149.126.72.220 45677 tcp tcpwrapped open
7768149.126.72.220 45777 tcp tcpwrapped open
7769149.126.72.220 45788 tcp tcpwrapped open
7770149.126.72.220 45821 tcp tcpwrapped open
7771149.126.72.220 45886 tcp tcpwrapped open
7772149.126.72.220 45888 tcp tcpwrapped open
7773149.126.72.220 46000 tcp tcpwrapped open
7774149.126.72.220 46443 tcp tcpwrapped open
7775149.126.72.220 46862 tcp tcpwrapped open
7776149.126.72.220 47000 tcp tcpwrapped open
7777149.126.72.220 47080 tcp tcpwrapped open
7778149.126.72.220 47534 tcp tcpwrapped open
7779149.126.72.220 48888 tcp tcpwrapped open
7780149.126.72.220 48889 tcp tcpwrapped open
7781149.126.72.220 49200 tcp tcpwrapped open
7782149.126.72.220 49210 tcp tcpwrapped open
7783149.126.72.220 49443 tcp tcpwrapped open
7784149.126.72.220 49682 tcp tcpwrapped open
7785149.126.72.220 49684 tcp tcpwrapped open
7786149.126.72.220 49686 tcp tcpwrapped open
7787149.126.72.220 49688 tcp tcpwrapped open
7788149.126.72.220 49690 tcp tcpwrapped open
7789149.126.72.220 49692 tcp tcpwrapped open
7790149.126.72.220 49694 tcp tcpwrapped open
7791149.126.72.220 50000 tcp tcpwrapped open
7792149.126.72.220 50001 tcp tcpwrapped open
7793149.126.72.220 50042 tcp tcpwrapped open
7794149.126.72.220 50050 tcp tcpwrapped open
7795149.126.72.220 50073 tcp tcpwrapped open
7796149.126.72.220 50085 tcp tcpwrapped open
7797149.126.72.220 50101 tcp tcpwrapped open
7798149.126.72.220 50102 tcp tcpwrapped open
7799149.126.72.220 50103 tcp tcpwrapped open
7800149.126.72.220 50104 tcp tcpwrapped open
7801149.126.72.220 50105 tcp tcpwrapped open
7802149.126.72.220 50106 tcp tcpwrapped open
7803149.126.72.220 50107 tcp tcpwrapped open
7804149.126.72.220 50112 tcp tcpwrapped open
7805149.126.72.220 50113 tcp tcpwrapped open
7806149.126.72.220 50122 tcp tcpwrapped open
7807149.126.72.220 50160 tcp tcpwrapped open
7808149.126.72.220 50443 tcp tcpwrapped open
7809149.126.72.220 51002 tcp tcpwrapped open
7810149.126.72.220 51003 tcp tcpwrapped open
7811149.126.72.220 51434 tcp tcpwrapped open
7812149.126.72.220 52010 tcp tcpwrapped open
7813149.126.72.220 52230 tcp tcpwrapped open
7814149.126.72.220 52311 tcp tcpwrapped open
7815149.126.72.220 52536 tcp tcpwrapped open
7816149.126.72.220 53480 tcp tcpwrapped open
7817149.126.72.220 53481 tcp tcpwrapped open
7818149.126.72.220 53482 tcp tcpwrapped open
7819149.126.72.220 53483 tcp tcpwrapped open
7820149.126.72.220 53484 tcp tcpwrapped open
7821149.126.72.220 53485 tcp tcpwrapped open
7822149.126.72.220 53490 tcp tcpwrapped open
7823149.126.72.220 53805 tcp tcpwrapped open
7824149.126.72.220 53806 tcp tcpwrapped open
7825149.126.72.220 54327 tcp tcpwrapped open
7826149.126.72.220 54490 tcp tcpwrapped open
7827149.126.72.220 54545 tcp tcpwrapped open
7828149.126.72.220 55055 tcp tcpwrapped open
7829149.126.72.220 55080 tcp tcpwrapped open
7830149.126.72.220 55081 tcp tcpwrapped open
7831149.126.72.220 55350 tcp tcpwrapped open
7832149.126.72.220 55388 tcp tcpwrapped open
7833149.126.72.220 55470 tcp tcpwrapped open
7834149.126.72.220 55475 tcp tcpwrapped open
7835149.126.72.220 55481 tcp tcpwrapped open
7836149.126.72.220 55490 tcp tcpwrapped open
7837149.126.72.220 57778 tcp tcpwrapped open
7838149.126.72.220 57779 tcp tcpwrapped open
7839149.126.72.220 57780 tcp tcpwrapped open
7840149.126.72.220 57781 tcp tcpwrapped open
7841149.126.72.220 57782 tcp tcpwrapped open
7842149.126.72.220 57783 tcp tcpwrapped open
7843149.126.72.220 57784 tcp tcpwrapped open
7844149.126.72.220 57785 tcp tcpwrapped open
7845149.126.72.220 57786 tcp tcpwrapped open
7846149.126.72.220 57787 tcp tcpwrapped open
7847149.126.72.220 57788 tcp tcpwrapped open
7848149.126.72.220 58443 tcp tcpwrapped open
7849149.126.72.220 58585 tcp tcpwrapped open
7850149.126.72.220 59012 tcp tcpwrapped open
7851149.126.72.220 59443 tcp tcpwrapped open
7852149.126.72.220 60021 tcp tcpwrapped open
7853149.126.72.220 60023 tcp tcpwrapped open
7854149.126.72.220 60443 tcp tcpwrapped open
7855149.126.72.220 62080 tcp tcpwrapped open
7856149.126.72.220 62237 tcp tcpwrapped open
7857149.126.72.220 62443 tcp tcpwrapped open
7858149.126.72.220 62865 tcp tcpwrapped open
7859149.126.72.220 63443 tcp tcpwrapped open
7860149.126.72.220 64477 tcp tcpwrapped open
7861149.126.72.220 64671 tcp tcpwrapped open
7862151.106.38.107 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 12:11. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
7863151.106.38.107 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
7864151.106.38.107 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
7865151.106.38.107 67 tcp dhcps filtered
7866151.106.38.107 67 udp dhcps unknown
7867151.106.38.107 68 tcp dhcpc filtered
7868151.106.38.107 68 udp dhcpc unknown
7869151.106.38.107 69 tcp tftp filtered
7870151.106.38.107 69 udp tftp unknown
7871151.106.38.107 88 tcp kerberos-sec filtered
7872151.106.38.107 88 udp kerberos-sec unknown
7873151.106.38.107 123 tcp ntp filtered
7874151.106.38.107 123 udp ntp unknown
7875151.106.38.107 137 tcp netbios-ns filtered
7876151.106.38.107 137 udp netbios-ns unknown
7877151.106.38.107 138 tcp netbios-dgm filtered
7878151.106.38.107 138 udp netbios-dgm unknown
7879151.106.38.107 139 tcp netbios-ssn filtered
7880151.106.38.107 139 udp netbios-ssn unknown
7881151.106.38.107 161 tcp snmp filtered
7882151.106.38.107 161 udp snmp unknown
7883151.106.38.107 162 tcp snmptrap filtered
7884151.106.38.107 162 udp snmptrap unknown
7885151.106.38.107 389 tcp ldap filtered
7886151.106.38.107 389 udp ldap unknown
7887151.106.38.107 520 tcp efs filtered
7888151.106.38.107 520 udp route unknown
7889151.106.38.107 2049 tcp nfs filtered
7890151.106.38.107 2049 udp nfs unknown
7891158.69.13.254 22 tcp ssh open OpenSSH 7.4 protocol 2.0
7892158.69.13.254 25 tcp smtp open Exim smtpd 4.92.3
7893158.69.13.254 53 tcp domain open unknown banner: get lost
7894158.69.13.254 53 udp domain open unknown banner: get lost
7895158.69.13.254 67 tcp dhcps filtered
7896158.69.13.254 67 udp dhcps unknown
7897158.69.13.254 68 tcp dhcpc filtered
7898158.69.13.254 68 udp dhcpc unknown
7899158.69.13.254 69 tcp tftp filtered
7900158.69.13.254 69 udp tftp unknown
7901158.69.13.254 80 tcp http open nginx
7902158.69.13.254 88 tcp kerberos-sec filtered
7903158.69.13.254 88 udp kerberos-sec unknown
7904158.69.13.254 123 tcp ntp filtered
7905158.69.13.254 123 udp ntp unknown
7906158.69.13.254 137 tcp netbios-ns filtered
7907158.69.13.254 137 udp netbios-ns unknown
7908158.69.13.254 138 tcp netbios-dgm filtered
7909158.69.13.254 138 udp netbios-dgm unknown
7910158.69.13.254 139 tcp netbios-ssn filtered
7911158.69.13.254 139 udp netbios-ssn unknown
7912158.69.13.254 161 tcp snmp filtered
7913158.69.13.254 161 udp snmp unknown
7914158.69.13.254 162 tcp snmptrap filtered
7915158.69.13.254 162 udp snmptrap unknown
7916158.69.13.254 389 tcp ldap filtered
7917158.69.13.254 389 udp ldap unknown
7918158.69.13.254 443 tcp ssl/http open nginx
7919158.69.13.254 465 tcp ssl/smtp open Exim smtpd 4.92.3
7920158.69.13.254 520 tcp efs filtered
7921158.69.13.254 520 udp route unknown
7922158.69.13.254 587 tcp smtp open Exim smtpd 4.92.3
7923158.69.13.254 2049 tcp nfs filtered
7924158.69.13.254 2049 udp nfs unknown
7925158.69.13.254 2525 tcp smtp open Exim smtpd 4.92.3
7926158.69.13.254 3306 tcp mysql open MySQL blocked - too many connection errors
7927162.244.35.13 22 tcp ssh open SSH-2.0-OpenSSH_7.2 FreeBSD-20160310
7928162.244.35.13 25 tcp open
7929162.244.35.13 53 tcp domain open ISC BIND 9.10.6
7930162.244.35.13 53 udp domain open ISC BIND 9.10.6
7931162.244.35.13 67 tcp dhcps closed
7932162.244.35.13 67 udp dhcps closed
7933162.244.35.13 68 tcp dhcpc closed
7934162.244.35.13 68 udp dhcpc closed
7935162.244.35.13 69 tcp tftp closed
7936162.244.35.13 69 udp tftp closed
7937162.244.35.13 88 tcp kerberos-sec closed
7938162.244.35.13 88 udp kerberos-sec closed
7939162.244.35.13 123 tcp ntp closed
7940162.244.35.13 123 udp ntp closed
7941162.244.35.13 137 tcp netbios-ns filtered
7942162.244.35.13 137 udp netbios-ns unknown
7943162.244.35.13 138 tcp netbios-dgm filtered
7944162.244.35.13 138 udp netbios-dgm unknown
7945162.244.35.13 139 tcp netbios-ssn filtered
7946162.244.35.13 139 udp netbios-ssn unknown
7947162.244.35.13 161 tcp snmp closed
7948162.244.35.13 161 udp snmp closed
7949162.244.35.13 162 tcp snmptrap closed
7950162.244.35.13 162 udp snmptrap closed
7951162.244.35.13 389 tcp ldap closed
7952162.244.35.13 389 udp ldap closed
7953162.244.35.13 520 tcp efs closed
7954162.244.35.13 520 udp route closed
7955162.244.35.13 2049 tcp nfs closed
7956162.244.35.13 2049 udp nfs closed
7957169.239.218.20 25 tcp smtp closed
7958169.239.218.20 53 tcp domain filtered
7959169.239.218.20 53 udp domain unknown
7960169.239.218.20 67 tcp dhcps filtered
7961169.239.218.20 67 udp dhcps unknown
7962169.239.218.20 68 tcp dhcpc filtered
7963169.239.218.20 68 udp dhcpc unknown
7964169.239.218.20 69 tcp tftp filtered
7965169.239.218.20 69 udp tftp unknown
7966169.239.218.20 88 tcp kerberos-sec filtered
7967169.239.218.20 88 udp kerberos-sec unknown
7968169.239.218.20 113 tcp ident closed
7969169.239.218.20 123 tcp ntp filtered
7970169.239.218.20 123 udp ntp unknown
7971169.239.218.20 137 tcp netbios-ns filtered
7972169.239.218.20 137 udp netbios-ns filtered
7973169.239.218.20 138 tcp netbios-dgm filtered
7974169.239.218.20 138 udp netbios-dgm filtered
7975169.239.218.20 139 tcp netbios-ssn closed
7976169.239.218.20 139 udp netbios-ssn unknown
7977169.239.218.20 161 tcp snmp filtered
7978169.239.218.20 161 udp snmp unknown
7979169.239.218.20 162 tcp snmptrap filtered
7980169.239.218.20 162 udp snmptrap unknown
7981169.239.218.20 389 tcp ldap filtered
7982169.239.218.20 389 udp ldap unknown
7983169.239.218.20 445 tcp microsoft-ds closed
7984169.239.218.20 520 tcp efs filtered
7985169.239.218.20 520 udp route unknown
7986169.239.218.20 2049 tcp nfs filtered
7987169.239.218.20 2049 udp nfs unknown
7988169.239.218.20 8008 tcp tcpwrapped open
7989173.214.244.169 53 tcp domain filtered
7990173.214.244.169 53 udp domain unknown
7991173.214.244.169 67 tcp dhcps filtered
7992173.214.244.169 67 udp dhcps unknown
7993173.214.244.169 68 tcp dhcpc filtered
7994173.214.244.169 68 udp dhcpc unknown
7995173.214.244.169 69 tcp tftp filtered
7996173.214.244.169 69 udp tftp unknown
7997173.214.244.169 88 tcp kerberos-sec filtered
7998173.214.244.169 88 udp kerberos-sec unknown
7999173.214.244.169 123 tcp ntp filtered
8000173.214.244.169 123 udp ntp unknown
8001173.214.244.169 137 tcp netbios-ns filtered
8002173.214.244.169 137 udp netbios-ns unknown
8003173.214.244.169 138 tcp netbios-dgm filtered
8004173.214.244.169 138 udp netbios-dgm unknown
8005173.214.244.169 139 tcp netbios-ssn filtered
8006173.214.244.169 139 udp netbios-ssn unknown
8007173.214.244.169 161 tcp snmp filtered
8008173.214.244.169 161 udp snmp unknown
8009173.214.244.169 162 tcp snmptrap filtered
8010173.214.244.169 162 udp snmptrap unknown
8011173.214.244.169 389 tcp ldap filtered
8012173.214.244.169 389 udp ldap unknown
8013173.214.244.169 520 tcp efs filtered
8014173.214.244.169 520 udp route unknown
8015173.214.244.169 2049 tcp nfs filtered
8016173.214.244.169 2049 udp nfs unknown
8017174.142.53.51 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 13:59. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
8018174.142.53.51 22 tcp ssh open SSH-2.0-OpenSSH_7.4
8019174.142.53.51 25 tcp smtp closed
8020174.142.53.51 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
8021174.142.53.51 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
8022174.142.53.51 67 tcp dhcps filtered
8023174.142.53.51 67 udp dhcps unknown
8024174.142.53.51 68 tcp dhcpc filtered
8025174.142.53.51 68 udp dhcpc unknown
8026174.142.53.51 69 tcp tftp filtered
8027174.142.53.51 69 udp tftp unknown
8028174.142.53.51 88 tcp kerberos-sec filtered
8029174.142.53.51 88 udp kerberos-sec unknown
8030174.142.53.51 123 tcp ntp filtered
8031174.142.53.51 123 udp ntp unknown
8032174.142.53.51 137 tcp netbios-ns filtered
8033174.142.53.51 137 udp netbios-ns filtered
8034174.142.53.51 138 tcp netbios-dgm filtered
8035174.142.53.51 138 udp netbios-dgm filtered
8036174.142.53.51 139 tcp netbios-ssn closed
8037174.142.53.51 139 udp netbios-ssn unknown
8038174.142.53.51 161 tcp snmp filtered
8039174.142.53.51 161 udp snmp unknown
8040174.142.53.51 162 tcp snmptrap filtered
8041174.142.53.51 162 udp snmptrap unknown
8042174.142.53.51 389 tcp ldap filtered
8043174.142.53.51 389 udp ldap unknown
8044174.142.53.51 445 tcp microsoft-ds closed
8045174.142.53.51 520 tcp efs filtered
8046174.142.53.51 520 udp route unknown
8047174.142.53.51 2049 tcp nfs filtered
8048174.142.53.51 2049 udp nfs unknown
8049186.64.118.40 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 100 allowed.\x0d\x0a220-Local time is now 13:39. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 10 minutes of inactivity.\x0d\x0a
8050186.64.118.40 53 tcp domain filtered
8051186.64.118.40 53 udp domain closed
8052186.64.118.40 67 tcp dhcps filtered
8053186.64.118.40 67 udp dhcps unknown
8054186.64.118.40 68 tcp dhcpc filtered
8055186.64.118.40 68 udp dhcpc unknown
8056186.64.118.40 69 tcp tftp filtered
8057186.64.118.40 69 udp tftp unknown
8058186.64.118.40 88 tcp kerberos-sec filtered
8059186.64.118.40 88 udp kerberos-sec unknown
8060186.64.118.40 123 tcp ntp filtered
8061186.64.118.40 123 udp ntp unknown
8062186.64.118.40 137 tcp netbios-ns filtered
8063186.64.118.40 137 udp netbios-ns unknown
8064186.64.118.40 138 tcp netbios-dgm filtered
8065186.64.118.40 138 udp netbios-dgm unknown
8066186.64.118.40 139 tcp netbios-ssn filtered
8067186.64.118.40 139 udp netbios-ssn unknown
8068186.64.118.40 161 tcp snmp filtered
8069186.64.118.40 161 udp snmp unknown
8070186.64.118.40 162 tcp snmptrap filtered
8071186.64.118.40 162 udp snmptrap unknown
8072186.64.118.40 389 tcp ldap filtered
8073186.64.118.40 389 udp ldap unknown
8074186.64.118.40 520 tcp efs filtered
8075186.64.118.40 520 udp route unknown
8076186.64.118.40 2049 tcp nfs closed
8077186.64.118.40 2049 udp nfs unknown
8078190.98.209.37 53 tcp domain filtered
8079190.98.209.37 53 udp domain unknown
8080190.98.209.37 67 tcp dhcps filtered
8081190.98.209.37 67 udp dhcps unknown
8082190.98.209.37 68 tcp dhcpc filtered
8083190.98.209.37 68 udp dhcpc unknown
8084190.98.209.37 69 tcp tftp filtered
8085190.98.209.37 69 udp tftp unknown
8086190.98.209.37 88 tcp kerberos-sec filtered
8087190.98.209.37 88 udp kerberos-sec unknown
8088190.98.209.37 123 tcp ntp filtered
8089190.98.209.37 123 udp ntp unknown
8090190.98.209.37 137 tcp netbios-ns filtered
8091190.98.209.37 137 udp netbios-ns unknown
8092190.98.209.37 138 tcp netbios-dgm filtered
8093190.98.209.37 138 udp netbios-dgm unknown
8094190.98.209.37 139 tcp netbios-ssn filtered
8095190.98.209.37 139 udp netbios-ssn unknown
8096190.98.209.37 161 tcp snmp filtered
8097190.98.209.37 161 udp snmp unknown
8098190.98.209.37 162 tcp snmptrap filtered
8099190.98.209.37 162 udp snmptrap unknown
8100190.98.209.37 389 tcp ldap filtered
8101190.98.209.37 389 udp ldap unknown
8102190.98.209.37 520 tcp efs filtered
8103190.98.209.37 520 udp route unknown
8104190.98.209.37 2049 tcp nfs filtered
8105190.98.209.37 2049 udp nfs unknown
8106190.107.177.35 53 tcp domain filtered ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
8107190.107.177.35 53 udp domain unknown ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
8108190.107.177.35 67 tcp dhcps filtered
8109190.107.177.35 67 udp dhcps unknown
8110190.107.177.35 68 tcp dhcpc filtered
8111190.107.177.35 68 udp dhcpc unknown
8112190.107.177.35 69 tcp tftp filtered
8113190.107.177.35 69 udp tftp unknown
8114190.107.177.35 88 tcp kerberos-sec filtered
8115190.107.177.35 88 udp kerberos-sec unknown
8116190.107.177.35 123 tcp ntp filtered
8117190.107.177.35 123 udp ntp unknown
8118190.107.177.35 137 tcp netbios-ns filtered
8119190.107.177.35 137 udp netbios-ns unknown
8120190.107.177.35 138 tcp netbios-dgm filtered
8121190.107.177.35 138 udp netbios-dgm unknown
8122190.107.177.35 139 tcp netbios-ssn filtered
8123190.107.177.35 139 udp netbios-ssn unknown
8124190.107.177.35 161 tcp snmp filtered
8125190.107.177.35 161 udp snmp unknown
8126190.107.177.35 162 tcp snmptrap filtered
8127190.107.177.35 162 udp snmptrap unknown
8128190.107.177.35 389 tcp ldap filtered
8129190.107.177.35 389 udp ldap unknown
8130190.107.177.35 520 tcp efs filtered
8131190.107.177.35 520 udp route unknown
8132190.107.177.35 2049 tcp nfs filtered
8133190.107.177.35 2049 udp nfs unknown
8134190.110.121.175 53 tcp domain filtered
8135190.110.121.175 53 udp domain unknown
8136190.110.121.175 67 tcp dhcps filtered
8137190.110.121.175 67 udp dhcps unknown
8138190.110.121.175 68 tcp dhcpc filtered
8139190.110.121.175 68 udp dhcpc unknown
8140190.110.121.175 69 tcp tftp filtered
8141190.110.121.175 69 udp tftp unknown
8142190.110.121.175 88 tcp kerberos-sec filtered
8143190.110.121.175 88 udp kerberos-sec unknown
8144190.110.121.175 123 tcp ntp filtered
8145190.110.121.175 123 udp ntp unknown
8146190.110.121.175 137 tcp netbios-ns filtered
8147190.110.121.175 137 udp netbios-ns unknown
8148190.110.121.175 138 tcp netbios-dgm filtered
8149190.110.121.175 138 udp netbios-dgm unknown
8150190.110.121.175 139 tcp netbios-ssn filtered
8151190.110.121.175 139 udp netbios-ssn unknown
8152190.110.121.175 161 tcp snmp filtered
8153190.110.121.175 161 udp snmp unknown
8154190.110.121.175 162 tcp snmptrap filtered
8155190.110.121.175 162 udp snmptrap unknown
8156190.110.121.175 389 tcp ldap filtered
8157190.110.121.175 389 udp ldap unknown
8158190.110.121.175 520 tcp efs filtered
8159190.110.121.175 520 udp route unknown
8160190.110.121.175 2049 tcp nfs filtered
8161190.110.121.175 2049 udp nfs unknown
8162190.153.209.187 53 tcp domain filtered
8163190.153.209.187 53 udp domain unknown
8164190.153.209.187 67 tcp dhcps filtered
8165190.153.209.187 67 udp dhcps unknown
8166190.153.209.187 68 tcp dhcpc filtered
8167190.153.209.187 68 udp dhcpc unknown
8168190.153.209.187 69 tcp tftp filtered
8169190.153.209.187 69 udp tftp unknown
8170190.153.209.187 88 tcp kerberos-sec filtered
8171190.153.209.187 88 udp kerberos-sec unknown
8172190.153.209.187 123 tcp ntp filtered
8173190.153.209.187 123 udp ntp unknown
8174190.153.209.187 137 tcp netbios-ns filtered
8175190.153.209.187 137 udp netbios-ns unknown
8176190.153.209.187 138 tcp netbios-dgm filtered
8177190.153.209.187 138 udp netbios-dgm unknown
8178190.153.209.187 139 tcp netbios-ssn filtered
8179190.153.209.187 139 udp netbios-ssn unknown
8180190.153.209.187 161 tcp snmp filtered
8181190.153.209.187 161 udp snmp unknown
8182190.153.209.187 162 tcp snmptrap filtered
8183190.153.209.187 162 udp snmptrap unknown
8184190.153.209.187 389 tcp ldap filtered
8185190.153.209.187 389 udp ldap unknown
8186190.153.209.187 520 tcp efs filtered
8187190.153.209.187 520 udp route unknown
8188190.153.209.187 2049 tcp nfs filtered
8189190.153.209.187 2049 udp nfs unknown
8190190.153.219.254 22 tcp ssh open SSH-2.0-OpenSSH_7.4
8191190.153.219.254 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
8192190.153.219.254 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
8193190.153.219.254 67 tcp dhcps filtered
8194190.153.219.254 67 udp dhcps unknown
8195190.153.219.254 68 tcp dhcpc filtered
8196190.153.219.254 68 udp dhcpc unknown
8197190.153.219.254 69 tcp tftp filtered
8198190.153.219.254 69 udp tftp unknown
8199190.153.219.254 88 tcp kerberos-sec filtered
8200190.153.219.254 88 udp kerberos-sec unknown
8201190.153.219.254 123 tcp ntp filtered
8202190.153.219.254 123 udp ntp unknown
8203190.153.219.254 137 tcp netbios-ns filtered
8204190.153.219.254 137 udp netbios-ns unknown
8205190.153.219.254 138 tcp netbios-dgm filtered
8206190.153.219.254 138 udp netbios-dgm unknown
8207190.153.219.254 139 tcp netbios-ssn filtered
8208190.153.219.254 139 udp netbios-ssn unknown
8209190.153.219.254 161 tcp snmp filtered
8210190.153.219.254 161 udp snmp unknown
8211190.153.219.254 162 tcp snmptrap filtered
8212190.153.219.254 162 udp snmptrap unknown
8213190.153.219.254 389 tcp ldap filtered
8214190.153.219.254 389 udp ldap unknown
8215190.153.219.254 520 tcp efs filtered
8216190.153.219.254 520 udp route unknown
8217190.153.219.254 2049 tcp nfs filtered
8218190.153.219.254 2049 udp nfs unknown
8219192.185.134.58 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 2 of 150 allowed.\x0d\x0a220-Local time is now 22:31. Server port: 21.\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
8220192.185.134.58 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
8221192.185.134.58 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
8222192.185.134.58 67 tcp dhcps closed
8223192.185.134.58 67 udp dhcps unknown
8224192.185.134.58 68 tcp dhcpc closed
8225192.185.134.58 68 udp dhcpc unknown
8226192.185.134.58 69 tcp tftp closed
8227192.185.134.58 69 udp tftp closed
8228192.185.134.58 88 tcp kerberos-sec closed
8229192.185.134.58 88 udp kerberos-sec closed
8230192.185.134.58 123 tcp ntp closed
8231192.185.134.58 123 udp ntp unknown
8232192.185.134.58 137 tcp netbios-ns closed
8233192.185.134.58 137 udp netbios-ns closed
8234192.185.134.58 138 tcp netbios-dgm closed
8235192.185.134.58 138 udp netbios-dgm closed
8236192.185.134.58 139 tcp netbios-ssn closed
8237192.185.134.58 139 udp netbios-ssn closed
8238192.185.134.58 161 tcp snmp closed
8239192.185.134.58 161 udp snmp unknown
8240192.185.134.58 162 tcp snmptrap closed
8241192.185.134.58 162 udp snmptrap closed
8242192.185.134.58 389 tcp ldap closed
8243192.185.134.58 389 udp ldap unknown
8244192.185.134.58 520 tcp efs closed
8245192.185.134.58 520 udp route unknown
8246192.185.134.58 2049 tcp nfs closed
8247192.185.134.58 2049 udp nfs unknown
8248200.2.249.28 21 tcp ftp open vsftpd 3.0.2
8249200.2.249.28 53 udp domain unknown
8250200.2.249.28 67 udp dhcps unknown
8251200.2.249.28 68 udp dhcpc unknown
8252200.2.249.28 69 udp tftp unknown
8253200.2.249.28 80 tcp http open Oracle Application Server 10g httpd 10.1.3.5.0
8254200.2.249.28 88 udp kerberos-sec unknown
8255200.2.249.28 123 udp ntp unknown
8256200.2.249.28 137 udp netbios-ns unknown
8257200.2.249.28 138 udp netbios-dgm unknown
8258200.2.249.28 139 tcp netbios-ssn open Samba smbd 4.8.3 workgroup: SAMBA
8259200.2.249.28 139 udp netbios-ssn unknown
8260200.2.249.28 161 udp snmp unknown
8261200.2.249.28 162 udp snmptrap unknown
8262200.2.249.28 389 udp ldap unknown
8263200.2.249.28 445 tcp netbios-ssn open Samba smbd 4.8.3 workgroup: SAMBA
8264200.2.249.28 520 udp route unknown
8265200.2.249.28 2049 udp nfs unknown
8266200.29.0.33 53 tcp domain filtered
8267200.29.0.33 53 udp domain unknown
8268200.29.0.33 67 tcp dhcps filtered
8269200.29.0.33 67 udp dhcps unknown
8270200.29.0.33 68 tcp dhcpc filtered
8271200.29.0.33 68 udp dhcpc unknown
8272200.29.0.33 69 tcp tftp filtered
8273200.29.0.33 69 udp tftp unknown
8274200.29.0.33 88 tcp kerberos-sec filtered
8275200.29.0.33 88 udp kerberos-sec unknown
8276200.29.0.33 123 tcp ntp filtered
8277200.29.0.33 123 udp ntp unknown
8278200.29.0.33 137 tcp netbios-ns filtered
8279200.29.0.33 137 udp netbios-ns unknown
8280200.29.0.33 138 tcp netbios-dgm filtered
8281200.29.0.33 138 udp netbios-dgm unknown
8282200.29.0.33 139 tcp netbios-ssn filtered
8283200.29.0.33 139 udp netbios-ssn unknown
8284200.29.0.33 161 tcp snmp filtered
8285200.29.0.33 161 udp snmp unknown
8286200.29.0.33 162 tcp snmptrap filtered
8287200.29.0.33 162 udp snmptrap unknown
8288200.29.0.33 389 tcp ldap filtered
8289200.29.0.33 389 udp ldap unknown
8290200.29.0.33 520 tcp efs filtered
8291200.29.0.33 520 udp route unknown
8292200.29.0.33 2049 tcp nfs filtered
8293200.29.0.33 2049 udp nfs unknown
8294200.54.92.108 21 tcp ftp open 220 (vsFTPd 3.0.3)\x0d\x0a
8295200.54.92.108 22 tcp ssh open SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u7
8296200.54.92.108 53 tcp domain closed
8297200.54.92.108 53 udp domain unknown
8298200.54.92.108 67 tcp dhcps closed
8299200.54.92.108 67 udp dhcps unknown
8300200.54.92.108 68 tcp dhcpc closed
8301200.54.92.108 68 udp dhcpc unknown
8302200.54.92.108 69 tcp tftp closed
8303200.54.92.108 69 udp tftp unknown
8304200.54.92.108 88 tcp kerberos-sec closed
8305200.54.92.108 88 udp kerberos-sec unknown
8306200.54.92.108 123 tcp ntp closed
8307200.54.92.108 123 udp ntp unknown
8308200.54.92.108 137 tcp netbios-ns closed
8309200.54.92.108 137 udp netbios-ns unknown
8310200.54.92.108 138 tcp netbios-dgm closed
8311200.54.92.108 138 udp netbios-dgm unknown
8312200.54.92.108 139 tcp netbios-ssn closed
8313200.54.92.108 139 udp netbios-ssn unknown
8314200.54.92.108 161 tcp snmp closed
8315200.54.92.108 161 udp snmp unknown
8316200.54.92.108 162 tcp snmptrap closed
8317200.54.92.108 162 udp snmptrap unknown
8318200.54.92.108 389 tcp ldap closed
8319200.54.92.108 389 udp ldap unknown
8320200.54.92.108 520 tcp efs closed
8321200.54.92.108 520 udp route unknown
8322200.54.92.108 2049 tcp nfs closed
8323200.54.92.108 2049 udp nfs unknown
8324200.55.198.228 22 tcp ssh open SSH-2.0-OpenSSH_7.4p1 Debian-11.0nosystemd1
8325200.55.198.228 53 tcp domain open
8326200.55.198.228 53 udp domain open
8327200.55.198.228 67 tcp dhcps filtered
8328200.55.198.228 67 udp dhcps unknown
8329200.55.198.228 68 tcp dhcpc filtered
8330200.55.198.228 68 udp dhcpc unknown
8331200.55.198.228 69 tcp tftp filtered
8332200.55.198.228 69 udp tftp unknown
8333200.55.198.228 88 tcp kerberos-sec filtered
8334200.55.198.228 88 udp kerberos-sec unknown
8335200.55.198.228 123 tcp ntp filtered
8336200.55.198.228 123 udp ntp unknown
8337200.55.198.228 137 tcp netbios-ns filtered
8338200.55.198.228 137 udp netbios-ns unknown
8339200.55.198.228 138 tcp netbios-dgm filtered
8340200.55.198.228 138 udp netbios-dgm unknown
8341200.55.198.228 139 tcp netbios-ssn filtered
8342200.55.198.228 139 udp netbios-ssn unknown
8343200.55.198.228 161 tcp snmp filtered
8344200.55.198.228 161 udp snmp unknown
8345200.55.198.228 162 tcp snmptrap filtered
8346200.55.198.228 162 udp snmptrap unknown
8347200.55.198.228 389 tcp ldap filtered
8348200.55.198.228 389 udp ldap unknown
8349200.55.198.228 520 tcp efs filtered
8350200.55.198.228 520 udp route closed
8351200.55.198.228 2049 tcp nfs filtered
8352200.55.198.228 2049 udp nfs unknown
8353200.68.34.99 53 tcp domain filtered
8354200.68.34.99 53 udp domain unknown
8355200.68.34.99 67 tcp dhcps filtered
8356200.68.34.99 67 udp dhcps unknown
8357200.68.34.99 68 tcp dhcpc filtered
8358200.68.34.99 68 udp dhcpc unknown
8359200.68.34.99 69 tcp tftp filtered
8360200.68.34.99 69 udp tftp unknown
8361200.68.34.99 88 tcp kerberos-sec filtered
8362200.68.34.99 88 udp kerberos-sec unknown
8363200.68.34.99 123 tcp ntp filtered
8364200.68.34.99 123 udp ntp unknown
8365200.68.34.99 137 tcp netbios-ns filtered
8366200.68.34.99 137 udp netbios-ns unknown
8367200.68.34.99 138 tcp netbios-dgm filtered
8368200.68.34.99 138 udp netbios-dgm unknown
8369200.68.34.99 139 tcp netbios-ssn filtered
8370200.68.34.99 139 udp netbios-ssn unknown
8371200.68.34.99 161 tcp snmp filtered
8372200.68.34.99 161 udp snmp unknown
8373200.68.34.99 162 tcp snmptrap filtered
8374200.68.34.99 162 udp snmptrap unknown
8375200.68.34.99 389 tcp ldap filtered
8376200.68.34.99 389 udp ldap unknown
8377200.68.34.99 520 tcp efs filtered
8378200.68.34.99 520 udp route unknown
8379200.68.34.99 2049 tcp nfs filtered
8380200.68.34.99 2049 udp nfs unknown
8381200.73.54.34 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
8382200.73.54.34 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
8383200.73.54.34 67 tcp dhcps filtered
8384200.73.54.34 67 udp dhcps unknown
8385200.73.54.34 68 tcp dhcpc filtered
8386200.73.54.34 68 udp dhcpc unknown
8387200.73.54.34 69 tcp tftp filtered
8388200.73.54.34 69 udp tftp unknown
8389200.73.54.34 88 tcp kerberos-sec filtered
8390200.73.54.34 88 udp kerberos-sec unknown
8391200.73.54.34 123 tcp ntp filtered
8392200.73.54.34 123 udp ntp unknown
8393200.73.54.34 137 tcp netbios-ns filtered
8394200.73.54.34 137 udp netbios-ns unknown
8395200.73.54.34 138 tcp netbios-dgm filtered
8396200.73.54.34 138 udp netbios-dgm unknown
8397200.73.54.34 139 tcp netbios-ssn filtered
8398200.73.54.34 139 udp netbios-ssn unknown
8399200.73.54.34 161 tcp snmp filtered
8400200.73.54.34 161 udp snmp unknown
8401200.73.54.34 162 tcp snmptrap filtered
8402200.73.54.34 162 udp snmptrap unknown
8403200.73.54.34 389 tcp ldap filtered
8404200.73.54.34 389 udp ldap unknown
8405200.73.54.34 520 tcp efs filtered
8406200.73.54.34 520 udp route unknown
8407200.73.54.34 2049 tcp nfs filtered
8408200.73.54.34 2049 udp nfs unknown
8409200.91.40.252 53 tcp domain filtered
8410200.91.40.252 53 udp domain unknown
8411200.91.40.252 67 tcp dhcps filtered
8412200.91.40.252 67 udp dhcps unknown
8413200.91.40.252 68 tcp dhcpc filtered
8414200.91.40.252 68 udp dhcpc unknown
8415200.91.40.252 69 tcp tftp filtered
8416200.91.40.252 69 udp tftp unknown
8417200.91.40.252 88 tcp kerberos-sec filtered
8418200.91.40.252 88 udp kerberos-sec unknown
8419200.91.40.252 123 tcp ntp filtered
8420200.91.40.252 123 udp ntp unknown
8421200.91.40.252 137 tcp netbios-ns filtered
8422200.91.40.252 137 udp netbios-ns unknown
8423200.91.40.252 138 tcp netbios-dgm filtered
8424200.91.40.252 138 udp netbios-dgm unknown
8425200.91.40.252 139 tcp netbios-ssn filtered
8426200.91.40.252 139 udp netbios-ssn unknown
8427200.91.40.252 161 tcp snmp filtered
8428200.91.40.252 161 udp snmp unknown
8429200.91.40.252 162 tcp snmptrap filtered
8430200.91.40.252 162 udp snmptrap unknown
8431200.91.40.252 389 tcp ldap filtered
8432200.91.40.252 389 udp ldap unknown
8433200.91.40.252 520 tcp efs filtered
8434200.91.40.252 520 udp route unknown
8435200.91.40.252 2049 tcp nfs filtered
8436200.91.40.252 2049 udp nfs unknown
8437201.159.170.136 53 tcp domain filtered
8438201.159.170.136 53 udp domain unknown
8439201.159.170.136 67 tcp dhcps filtered
8440201.159.170.136 67 udp dhcps unknown
8441201.159.170.136 68 tcp dhcpc filtered
8442201.159.170.136 68 udp dhcpc unknown
8443201.159.170.136 69 tcp tftp filtered
8444201.159.170.136 69 udp tftp unknown
8445201.159.170.136 88 tcp kerberos-sec filtered
8446201.159.170.136 88 udp kerberos-sec unknown
8447201.159.170.136 123 tcp ntp filtered
8448201.159.170.136 123 udp ntp unknown
8449201.159.170.136 137 tcp netbios-ns filtered
8450201.159.170.136 137 udp netbios-ns unknown
8451201.159.170.136 138 tcp netbios-dgm filtered
8452201.159.170.136 138 udp netbios-dgm unknown
8453201.159.170.136 139 tcp netbios-ssn filtered
8454201.159.170.136 139 udp netbios-ssn unknown
8455201.159.170.136 161 tcp snmp filtered
8456201.159.170.136 161 udp snmp unknown
8457201.159.170.136 162 tcp snmptrap filtered
8458201.159.170.136 162 udp snmptrap unknown
8459201.159.170.136 389 tcp ldap filtered
8460201.159.170.136 389 udp ldap unknown
8461201.159.170.136 520 tcp efs filtered
8462201.159.170.136 520 udp route unknown
8463201.159.170.136 2049 tcp nfs filtered
8464201.159.170.136 2049 udp nfs unknown
8465204.93.193.141 21 tcp ftp open Your connection to this server has been blocked.\x0d\x0a\x0d\x0aYou are most likely being blocked due to use of incorrect user/pass combination. Please, check all of your computers/devices to make sure that they are using the correct login credentials, including your email clients. You may also get blocked due to too many POP3/IMAP logins in 1 minute interval, please adjust your email client settings.\x0d\x0a
8466204.93.193.141 53 tcp domain filtered
8467204.93.193.141 53 udp domain unknown
8468204.93.193.141 67 tcp dhcps filtered
8469204.93.193.141 67 udp dhcps unknown
8470204.93.193.141 68 tcp dhcpc filtered
8471204.93.193.141 68 udp dhcpc unknown
8472204.93.193.141 69 tcp tftp filtered
8473204.93.193.141 69 udp tftp unknown
8474204.93.193.141 88 tcp kerberos-sec filtered
8475204.93.193.141 88 udp kerberos-sec unknown
8476204.93.193.141 123 tcp ntp filtered
8477204.93.193.141 123 udp ntp unknown
8478204.93.193.141 137 tcp netbios-ns filtered
8479204.93.193.141 137 udp netbios-ns unknown
8480204.93.193.141 138 tcp netbios-dgm filtered
8481204.93.193.141 138 udp netbios-dgm unknown
8482204.93.193.141 139 tcp netbios-ssn filtered
8483204.93.193.141 139 udp netbios-ssn unknown
8484204.93.193.141 161 tcp snmp filtered
8485204.93.193.141 161 udp snmp unknown
8486204.93.193.141 162 tcp snmptrap filtered
8487204.93.193.141 162 udp snmptrap unknown
8488204.93.193.141 389 tcp ldap filtered
8489204.93.193.141 389 udp ldap unknown
8490204.93.193.141 520 tcp efs filtered
8491204.93.193.141 520 udp route unknown
8492204.93.193.141 2049 tcp nfs filtered
8493204.93.193.141 2049 udp nfs unknown
8494206.48.140.40 53 tcp domain filtered
8495206.48.140.40 53 udp domain unknown
8496206.48.140.40 67 tcp dhcps filtered
8497206.48.140.40 67 udp dhcps unknown
8498206.48.140.40 68 tcp dhcpc filtered
8499206.48.140.40 68 udp dhcpc unknown
8500206.48.140.40 69 tcp tftp filtered
8501206.48.140.40 69 udp tftp unknown
8502206.48.140.40 88 tcp kerberos-sec filtered
8503206.48.140.40 88 udp kerberos-sec unknown
8504206.48.140.40 123 tcp ntp filtered
8505206.48.140.40 123 udp ntp unknown
8506206.48.140.40 137 tcp netbios-ns filtered
8507206.48.140.40 137 udp netbios-ns unknown
8508206.48.140.40 138 tcp netbios-dgm filtered
8509206.48.140.40 138 udp netbios-dgm unknown
8510206.48.140.40 139 tcp netbios-ssn filtered
8511206.48.140.40 139 udp netbios-ssn unknown
8512206.48.140.40 161 tcp snmp filtered
8513206.48.140.40 161 udp snmp unknown
8514206.48.140.40 162 tcp snmptrap filtered
8515206.48.140.40 162 udp snmptrap unknown
8516206.48.140.40 389 tcp ldap filtered
8517206.48.140.40 389 udp ldap unknown
8518206.48.140.40 520 tcp efs filtered
8519206.48.140.40 520 udp route unknown
8520206.48.140.40 2049 tcp nfs filtered
8521206.48.140.40 2049 udp nfs unknown
8522207.246.147.189 53 tcp domain filtered
8523207.246.147.189 53 udp domain unknown
8524207.246.147.189 67 tcp dhcps filtered
8525207.246.147.189 67 udp dhcps unknown
8526207.246.147.189 68 tcp dhcpc filtered
8527207.246.147.189 68 udp dhcpc unknown
8528207.246.147.189 69 tcp tftp filtered
8529207.246.147.189 69 udp tftp unknown
8530207.246.147.189 80 tcp http open nginx
8531207.246.147.189 88 tcp kerberos-sec filtered
8532207.246.147.189 88 udp kerberos-sec unknown
8533207.246.147.189 123 tcp ntp filtered
8534207.246.147.189 123 udp ntp unknown
8535207.246.147.189 137 tcp netbios-ns filtered
8536207.246.147.189 137 udp netbios-ns unknown
8537207.246.147.189 138 tcp netbios-dgm filtered
8538207.246.147.189 138 udp netbios-dgm unknown
8539207.246.147.189 139 tcp netbios-ssn filtered
8540207.246.147.189 139 udp netbios-ssn unknown
8541207.246.147.189 161 tcp snmp filtered
8542207.246.147.189 161 udp snmp unknown
8543207.246.147.189 162 tcp snmptrap filtered
8544207.246.147.189 162 udp snmptrap unknown
8545207.246.147.189 389 tcp ldap filtered
8546207.246.147.189 389 udp ldap unknown
8547207.246.147.189 443 tcp ssl/http open nginx
8548207.246.147.189 520 tcp efs filtered
8549207.246.147.189 520 udp route unknown
8550207.246.147.189 2049 tcp nfs filtered
8551207.246.147.189 2049 udp nfs unknown
8552207.246.147.190 53 tcp domain filtered
8553207.246.147.190 53 udp domain unknown
8554207.246.147.190 67 tcp dhcps filtered
8555207.246.147.190 67 udp dhcps unknown
8556207.246.147.190 68 tcp dhcpc filtered
8557207.246.147.190 68 udp dhcpc unknown
8558207.246.147.190 69 tcp tftp filtered
8559207.246.147.190 69 udp tftp unknown
8560207.246.147.190 80 tcp http open nginx
8561207.246.147.190 88 tcp kerberos-sec filtered
8562207.246.147.190 88 udp kerberos-sec unknown
8563207.246.147.190 123 tcp ntp filtered
8564207.246.147.190 123 udp ntp unknown
8565207.246.147.190 137 tcp netbios-ns filtered
8566207.246.147.190 137 udp netbios-ns unknown
8567207.246.147.190 138 tcp netbios-dgm filtered
8568207.246.147.190 138 udp netbios-dgm filtered
8569207.246.147.190 139 tcp netbios-ssn filtered
8570207.246.147.190 139 udp netbios-ssn unknown
8571207.246.147.190 161 tcp snmp filtered
8572207.246.147.190 161 udp snmp unknown
8573207.246.147.190 162 tcp snmptrap filtered
8574207.246.147.190 162 udp snmptrap unknown
8575207.246.147.190 389 tcp ldap filtered
8576207.246.147.190 389 udp ldap unknown
8577207.246.147.190 443 tcp ssl/http open nginx
8578207.246.147.190 520 tcp efs filtered
8579207.246.147.190 520 udp route unknown
8580207.246.147.190 2049 tcp nfs filtered
8581207.246.147.190 2049 udp nfs unknown
8582207.246.147.247 53 tcp domain filtered
8583207.246.147.247 53 udp domain filtered
8584207.246.147.247 67 tcp dhcps filtered
8585207.246.147.247 67 udp dhcps unknown
8586207.246.147.247 68 tcp dhcpc filtered
8587207.246.147.247 68 udp dhcpc unknown
8588207.246.147.247 69 tcp tftp filtered
8589207.246.147.247 69 udp tftp unknown
8590207.246.147.247 80 tcp http open nginx
8591207.246.147.247 88 tcp kerberos-sec filtered
8592207.246.147.247 88 udp kerberos-sec unknown
8593207.246.147.247 123 tcp ntp filtered
8594207.246.147.247 123 udp ntp unknown
8595207.246.147.247 137 tcp netbios-ns filtered
8596207.246.147.247 137 udp netbios-ns filtered
8597207.246.147.247 138 tcp netbios-dgm filtered
8598207.246.147.247 138 udp netbios-dgm unknown
8599207.246.147.247 139 tcp netbios-ssn filtered
8600207.246.147.247 139 udp netbios-ssn unknown
8601207.246.147.247 161 tcp snmp filtered
8602207.246.147.247 161 udp snmp unknown
8603207.246.147.247 162 tcp snmptrap filtered
8604207.246.147.247 162 udp snmptrap unknown
8605207.246.147.247 389 tcp ldap filtered
8606207.246.147.247 389 udp ldap unknown
8607207.246.147.247 443 tcp ssl/http open nginx
8608207.246.147.247 520 tcp efs filtered
8609207.246.147.247 520 udp route unknown
8610207.246.147.247 2049 tcp nfs filtered
8611207.246.147.247 2049 udp nfs unknown
8612207.246.147.248 53 tcp domain filtered
8613207.246.147.248 53 udp domain unknown
8614207.246.147.248 67 tcp dhcps filtered
8615207.246.147.248 67 udp dhcps unknown
8616207.246.147.248 68 tcp dhcpc filtered
8617207.246.147.248 68 udp dhcpc unknown
8618207.246.147.248 69 tcp tftp filtered
8619207.246.147.248 69 udp tftp unknown
8620207.246.147.248 80 tcp http open nginx
8621207.246.147.248 88 tcp kerberos-sec filtered
8622207.246.147.248 88 udp kerberos-sec unknown
8623207.246.147.248 123 tcp ntp filtered
8624207.246.147.248 123 udp ntp unknown
8625207.246.147.248 137 tcp netbios-ns filtered
8626207.246.147.248 137 udp netbios-ns unknown
8627207.246.147.248 138 tcp netbios-dgm filtered
8628207.246.147.248 138 udp netbios-dgm unknown
8629207.246.147.248 139 tcp netbios-ssn filtered
8630207.246.147.248 139 udp netbios-ssn unknown
8631207.246.147.248 161 tcp snmp filtered
8632207.246.147.248 161 udp snmp unknown
8633207.246.147.248 162 tcp snmptrap filtered
8634207.246.147.248 162 udp snmptrap unknown
8635207.246.147.248 389 tcp ldap filtered
8636207.246.147.248 389 udp ldap unknown
8637207.246.147.248 443 tcp ssl/http open nginx
8638207.246.147.248 520 tcp efs filtered
8639207.246.147.248 520 udp route unknown
8640207.246.147.248 2049 tcp nfs filtered
8641207.246.147.248 2049 udp nfs unknown
8642211.13.196.135 25 tcp smtp closed
8643211.13.196.135 53 tcp domain filtered
8644211.13.196.135 53 udp domain unknown
8645211.13.196.135 67 tcp dhcps filtered
8646211.13.196.135 67 udp dhcps unknown
8647211.13.196.135 68 tcp dhcpc filtered
8648211.13.196.135 68 udp dhcpc unknown
8649211.13.196.135 69 tcp tftp filtered
8650211.13.196.135 69 udp tftp unknown
8651211.13.196.135 80 tcp http open Apache httpd
8652211.13.196.135 88 tcp kerberos-sec filtered
8653211.13.196.135 88 udp kerberos-sec unknown
8654211.13.196.135 113 tcp ident closed
8655211.13.196.135 123 tcp ntp filtered
8656211.13.196.135 123 udp ntp unknown
8657211.13.196.135 137 tcp netbios-ns filtered
8658211.13.196.135 137 udp netbios-ns filtered
8659211.13.196.135 138 tcp netbios-dgm filtered
8660211.13.196.135 138 udp netbios-dgm filtered
8661211.13.196.135 139 tcp netbios-ssn closed
8662211.13.196.135 139 udp netbios-ssn unknown
8663211.13.196.135 161 tcp snmp filtered
8664211.13.196.135 161 udp snmp unknown
8665211.13.196.135 162 tcp snmptrap filtered
8666211.13.196.135 162 udp snmptrap unknown
8667211.13.196.135 389 tcp ldap filtered
8668211.13.196.135 389 udp ldap unknown
8669211.13.196.135 443 tcp ssl/http open Apache httpd
8670211.13.196.135 445 tcp microsoft-ds closed
8671211.13.196.135 520 tcp efs filtered
8672211.13.196.135 520 udp route unknown
8673211.13.196.135 2049 tcp nfs filtered
8674211.13.196.135 2049 udp nfs unknown
8675212.174.0.150 53 tcp domain filtered
8676212.174.0.150 53 udp domain unknown
8677212.174.0.150 67 tcp dhcps filtered
8678212.174.0.150 67 udp dhcps unknown
8679212.174.0.150 68 tcp dhcpc filtered
8680212.174.0.150 68 udp dhcpc unknown
8681212.174.0.150 69 tcp tftp filtered
8682212.174.0.150 69 udp tftp unknown
8683212.174.0.150 80 tcp http open Microsoft IIS httpd 8.5
8684212.174.0.150 88 tcp kerberos-sec filtered
8685212.174.0.150 88 udp kerberos-sec unknown
8686212.174.0.150 123 tcp ntp filtered
8687212.174.0.150 123 udp ntp unknown
8688212.174.0.150 137 tcp netbios-ns filtered
8689212.174.0.150 137 udp netbios-ns unknown
8690212.174.0.150 138 tcp netbios-dgm filtered
8691212.174.0.150 138 udp netbios-dgm unknown
8692212.174.0.150 139 tcp netbios-ssn filtered
8693212.174.0.150 139 udp netbios-ssn unknown
8694212.174.0.150 161 tcp snmp filtered
8695212.174.0.150 161 udp snmp unknown
8696212.174.0.150 162 tcp snmptrap filtered
8697212.174.0.150 162 udp snmptrap unknown
8698212.174.0.150 389 tcp ldap filtered
8699212.174.0.150 389 udp ldap unknown
8700212.174.0.150 520 tcp efs filtered
8701212.174.0.150 520 udp route unknown
8702212.174.0.150 2049 tcp nfs filtered
8703212.174.0.150 2049 udp nfs unknown
8704216.172.184.117 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 5 of 150 allowed.\x0d\x0a220-Local time is now 01:41. Server port: 21.\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
8705216.172.184.117 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
8706216.172.184.117 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
8707216.172.184.117 67 tcp dhcps closed
8708216.172.184.117 67 udp dhcps closed
8709216.172.184.117 68 tcp dhcpc closed
8710216.172.184.117 68 udp dhcpc unknown
8711216.172.184.117 69 tcp tftp closed
8712216.172.184.117 69 udp tftp unknown
8713216.172.184.117 88 tcp kerberos-sec closed
8714216.172.184.117 88 udp kerberos-sec unknown
8715216.172.184.117 123 tcp ntp closed
8716216.172.184.117 123 udp ntp unknown
8717216.172.184.117 137 tcp netbios-ns closed
8718216.172.184.117 137 udp netbios-ns unknown
8719216.172.184.117 138 tcp netbios-dgm closed
8720216.172.184.117 138 udp netbios-dgm closed
8721216.172.184.117 139 tcp netbios-ssn closed
8722216.172.184.117 139 udp netbios-ssn closed
8723216.172.184.117 161 tcp snmp closed
8724216.172.184.117 161 udp snmp unknown
8725216.172.184.117 162 tcp snmptrap closed
8726216.172.184.117 162 udp snmptrap closed
8727216.172.184.117 389 tcp ldap closed
8728216.172.184.117 389 udp ldap closed
8729216.172.184.117 520 tcp efs closed
8730216.172.184.117 520 udp route closed
8731216.172.184.117 2049 tcp nfs closed
8732216.172.184.117 2049 udp nfs unknown
8733218.45.5.97 25 tcp smtp closed
8734218.45.5.97 53 tcp domain filtered
8735218.45.5.97 53 udp domain unknown
8736218.45.5.97 67 tcp dhcps filtered
8737218.45.5.97 67 udp dhcps unknown
8738218.45.5.97 68 tcp dhcpc filtered
8739218.45.5.97 68 udp dhcpc unknown
8740218.45.5.97 69 tcp tftp filtered
8741218.45.5.97 69 udp tftp unknown
8742218.45.5.97 80 tcp http open Apache httpd 2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.15
8743218.45.5.97 88 tcp kerberos-sec filtered
8744218.45.5.97 88 udp kerberos-sec unknown
8745218.45.5.97 113 tcp ident closed
8746218.45.5.97 123 tcp ntp filtered
8747218.45.5.97 123 udp ntp unknown
8748218.45.5.97 137 tcp netbios-ns filtered
8749218.45.5.97 137 udp netbios-ns filtered
8750218.45.5.97 138 tcp netbios-dgm filtered
8751218.45.5.97 138 udp netbios-dgm filtered
8752218.45.5.97 139 tcp netbios-ssn closed
8753218.45.5.97 139 udp netbios-ssn unknown
8754218.45.5.97 161 tcp snmp filtered
8755218.45.5.97 161 udp snmp unknown
8756218.45.5.97 162 tcp snmptrap filtered
8757218.45.5.97 162 udp snmptrap unknown
8758218.45.5.97 389 tcp ldap filtered
8759218.45.5.97 389 udp ldap unknown
8760218.45.5.97 443 tcp ssl/http open Apache httpd 2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.15
8761218.45.5.97 445 tcp microsoft-ds closed
8762218.45.5.97 520 tcp efs filtered
8763218.45.5.97 520 udp route unknown
8764218.45.5.97 2049 tcp nfs filtered
8765218.45.5.97 2049 udp nfs unknown
8766#######################################################################################################################################
8767Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-05 22:43 EST
8768Nmap scan report for ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
8769Host is up (0.32s latency).
8770Not shown: 998 filtered ports
8771PORT STATE SERVICE VERSION
877280/tcp open http Apache httpd 2.2.34
8773|_http-server-header: Apache/2.2.34 (Amazon)
8774| vulscan: VulDB - https://vuldb.com:
8775| [106777] Apache HTTP Server up to 2.2.34/2.4.27 Limit Directive ap_limit_section HTTP Request information disclosure
8776| [134248] Apache Archiva up to 2.2.3 Artifact Upload directory traversal
8777| [134247] Apache Archiva up to 2.2.3 Artifact Upload directory traversal
8778| [122889] Apache HTTP Server up to 2.2.31/2.4.23 mod_userdir HTTP Response Splitting privilege escalation
8779| [103520] Apache HTTP Server up to 2.2.33/2.4.26 mod_auth_digest Authorization Header memory corruption
8780| [102698] Apache HTTP Server up to 2.2.32/2.4.25 mod_mime Content-Type memory corruption
8781| [102690] Apache HTTP Server up to 2.2.32/2.4.25 mod_ssl ap_hook_process_connection() denial of service
8782| [102689] Apache HTTP Server up to 2.2.32/2.4.25 ap_get_basic_auth_pw weak authentication
8783| [12291] Apache Struts up to 2.2.3 DebuggingInterceptor privilege escalation
8784| [64485] Apache Struts up to 2.2.3.0 privilege escalation
8785| [64457] Apache Struts up to 2.2.3.0 cross site scripting
8786| [60352] Apache Struts up to 2.2.3 memory corruption
8787| [59902] Apache Struts up to 2.2.3 Interfaces unknown vulnerability
8788| [4528] Apache Struts up to 2.2.3 DebuggingInterceptor privilege escalation
8789| [4527] Apache Struts up to 2.2.3 ExceptionDelegator cross site scripting
8790| [4512] Apache Struts up to 2.2.3 CookieInterceptor privilege escalation
8791|
8792| MITRE CVE - https://cve.mitre.org:
8793| [CVE-2012-1006] Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.0.14 and 2.2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) lastName parameter to struts2-showcase/person/editPerson.action, or the (3) clientName parameter to struts2-rest-showcase/orders.
8794| [CVE-2012-0838] Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.
8795| [CVE-2012-0391] The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter.
8796| [CVE-2011-2087] Multiple cross-site scripting (XSS) vulnerabilities in component handlers in the javatemplates (aka Java Templates) plugin in Apache Struts 2.x before 2.2.3 allow remote attackers to inject arbitrary web script or HTML via an arbitrary parameter value to a .action URI, related to improper handling of value attributes in (1) FileHandler.java, (2) HiddenHandler.java, (3) PasswordHandler.java, (4) RadioHandler.java, (5) ResetHandler.java, (6) SelectHandler.java, (7) SubmitHandler.java, and (8) TextFieldHandler.java.
8797| [CVE-2011-1772] Multiple cross-site scripting (XSS) vulnerabilities in XWork in Apache Struts 2.x before 2.2.3, and OpenSymphony XWork in OpenSymphony WebWork, allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) an action name, (2) the action attribute of an s:submit element, or (3) the method attribute of an s:submit element.
8798| [CVE-2007-1743] suexec in Apache HTTP Server (httpd) 2.2.3 does not verify combinations of user and group IDs on the command line, which might allow local users to leverage other vulnerabilities to create arbitrary UID/GID owned files if /proc is mounted. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root." In addition, because this is dependent on other vulnerabilities, perhaps this is resultant and should not be included in CVE.
8799| [CVE-2007-1742] suexec in Apache HTTP Server (httpd) 2.2.3 uses a partial comparison for verifying whether the current directory is within the document root, which might allow local users to perform unauthorized operations on incorrect directories, as demonstrated using "html_backup" and "htmleditor" under an "html" directory. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root."
8800| [CVE-2007-1741] Multiple race conditions in suexec in Apache HTTP Server (httpd) 2.2.3 between directory and file validation, and their usage, allow local users to gain privileges and execute arbitrary code by renaming directories or performing symlink attacks. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root."
8801| [CVE-2013-1896] mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.
8802| [CVE-2013-1862] mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator.
8803| [CVE-2013-1768] The BrokerFactory functionality in Apache OpenJPA 1.x before 1.2.3 and 2.x before 2.2.2 creates local executable JSP files containing logging trace data produced during deserialization of certain crafted OpenJPA objects, which makes it easier for remote attackers to execute arbitrary code by creating a serialized object and leveraging improperly secured server programs.
8804| [CVE-2013-1048] The Debian apache2ctl script in the apache2 package squeeze before 2.2.16-6+squeeze11, wheezy before 2.2.22-13, and sid before 2.2.22-13 for the Apache HTTP Server on Debian GNU/Linux does not properly create the /var/lock/apache2 lock directory, which allows local users to gain privileges via an unspecified symlink attack.
8805| [CVE-2012-4558] Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.
8806| [CVE-2012-4557] The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.
8807| [CVE-2012-3499] Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
8808| [CVE-2012-0216] The default configuration of the apache2 package in Debian GNU/Linux squeeze before 2.2.16-6+squeeze7, wheezy before 2.2.22-4, and sid before 2.2.22-4, when mod_php or mod_rivet is used, provides example scripts under the doc/ URI, which might allow local users to conduct cross-site scripting (XSS) attacks, gain privileges, or obtain sensitive information via vectors involving localhost HTTP requests to the Apache HTTP Server.
8809| [CVE-2012-0053] protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.
8810| [CVE-2012-0031] scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.
8811| [CVE-2012-0021] The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.
8812| [CVE-2011-5034] Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.
8813| [CVE-2011-4668] IBM Tivoli Netcool/Reporter 2.2 before 2.2.0.8 allows remote attackers to execute arbitrary code via vectors related to an unspecified CGI program used with the Apache HTTP Server.
8814| [CVE-2011-4415] The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the "len +=" statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607.
8815| [CVE-2011-4317] The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
8816| [CVE-2011-3639] The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
8817| [CVE-2011-3607] Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.
8818| [CVE-2011-3368] The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.
8819| [CVE-2011-3348] The mod_proxy_ajp module in the Apache HTTP Server before 2.2.21, when used with mod_proxy_balancer in certain configurations, allows remote attackers to cause a denial of service (temporary "error state" in the backend server) via a malformed HTTP request.
8820| [CVE-2011-3192] The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
8821| [CVE-2011-2088] XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3.
8822| [CVE-2011-1928] The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used. NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.
8823| [CVE-2011-1176] The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk Multi-Processing Module 2.2.11-01 and 2.2.11-02 for the Apache HTTP Server does not properly handle certain configuration sections that specify NiceValue but not AssignUserID, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.
8824| [CVE-2011-0419] Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
8825| [CVE-2010-4476] The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
8826| [CVE-2010-2791] mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. NOTE: this is the same issue as CVE-2010-2068, but for a different OS and set of affected versions.
8827| [CVE-2010-2076] Apache CXF 2.0.x before 2.0.13, 2.1.x before 2.1.10, and 2.2.x before 2.2.9, as used in Apache ServiceMix, Apache Camel, Apache Chemistry, Apache jUDDI, Apache Geronimo, and other products, does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via a crafted DTD, as demonstrated by an entity declaration in a request to samples/wsdl_first_pure_xml, a similar issue to CVE-2010-1632.
8828| [CVE-2010-2068] mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.
8829| [CVE-2010-1452] The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.
8830| [CVE-2010-0434] The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
8831| [CVE-2010-0425] modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers."
8832| [CVE-2010-0408] The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.
8833| [CVE-2009-3555] The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
8834| [CVE-2009-3094] The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
8835| [CVE-2009-2699] The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows remote attackers to cause a denial of service (daemon hang) via unspecified HTTP requests, related to the prefork and event MPMs.
8836| [CVE-2009-1891] The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
8837| [CVE-2009-1195] The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.
8838| [CVE-2009-1191] mod_proxy_ajp.c in the mod_proxy_ajp module in the Apache HTTP Server 2.2.11 allows remote attackers to obtain sensitive response data, intended for a client that sent an earlier POST request with no request body, via an HTTP request.
8839| [CVE-2008-3666] Unspecified vulnerability in Sun Solaris 10 and OpenSolaris before snv_96 allows (1) context-dependent attackers to cause a denial of service (panic) via vectors involving creation of a crafted file and use of the sendfilev system call, as demonstrated by a file served by an Apache 2.2.x web server with EnableSendFile configured
8840| [CVE-2008-2939] Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.
8841| [CVE-2008-2364] The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.
8842| [CVE-2008-2168] Cross-site scripting (XSS) vulnerability in Apache 2.2.6 and earlier allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded URLs that are not properly handled when displaying the 403 Forbidden error page.
8843| [CVE-2008-0456] CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.
8844| [CVE-2008-0455] Cross-site scripting (XSS) vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary web script or HTML by uploading a file with a name containing XSS sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.
8845| [CVE-2008-0005] mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.
8846| [CVE-2007-6750] The Apache HTTP Server 1.x and 2.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris, related to the lack of the mod_reqtimeout module in versions before 2.2.15.
8847| [CVE-2007-6423] ** DISPUTED ** Unspecified vulnerability in mod_proxy_balancer for Apache HTTP Server 2.2.x before 2.2.7-dev, when running on Windows, allows remote attackers to trigger memory corruption via a long URL. NOTE: the vendor could not reproduce this issue.
8848| [CVE-2007-6422] The balancer_handler function in mod_proxy_balancer in the Apache HTTP Server 2.2.0 through 2.2.6, when a threaded Multi-Processing Module is used, allows remote authenticated users to cause a denial of service (child process crash) via an invalid bb variable.
8849| [CVE-2007-6421] Cross-site scripting (XSS) vulnerability in balancer-manager in mod_proxy_balancer in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) ss, (2) wr, or (3) rr parameters, or (4) the URL.
8850| [CVE-2007-6420] Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.
8851| [CVE-2007-6388] Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
8852| [CVE-2007-6203] Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header from an HTTP request when it is reflected back in a "413 Request Entity Too Large" error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated via an HTTP request containing an invalid Content-length value, a similar issue to CVE-2006-3918.
8853| [CVE-2007-5000] Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
8854| [CVE-2007-4465] Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset. NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.
8855| [CVE-2007-3304] Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka "SIGUSR1 killer."
8856| [CVE-2007-3303] Apache httpd 2.0.59 and 2.2.4, with the Prefork MPM module, allows local users to cause a denial of service via certain code sequences executed in a worker process that (1) stop request processing by killing all worker processes and preventing creation of replacements or (2) hang the system by forcing the master process to fork an arbitrarily large number of worker processes. NOTE: This might be an inherent design limitation of Apache with respect to worker processes in hosted environments.
8857| [CVE-2007-1862] The recall_headers function in mod_mem_cache in Apache 2.2.4 does not properly copy all levels of header data, which can cause Apache to return HTTP headers containing previously used data, which could be used by remote attackers to obtain potentially sensitive information.
8858| [CVE-2007-0792] The mod_perl initialization script in Bugzilla 2.23.3 does not set the Bugzilla Apache configuration to allow .htaccess permissions to override file permissions, which allows remote attackers to obtain the database username and password via a direct request for the localconfig file.
8859| [CVE-2006-4110] Apache 2.2.2, when running on Windows, allows remote attackers to read source code of CGI programs via a request that contains uppercase (or alternate case) characters that bypass the case-sensitive ScriptAlias directive, but allow access to the file on case-insensitive file systems.
8860| [CVE-2006-3918] http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.
8861| [CVE-2006-3747] Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.
8862| [CVE-2006-2806] The SMTP server in Apache Java Mail Enterprise Server (aka Apache James) 2.2.0 allows remote attackers to cause a denial of service (CPU consumption) via a long argument to the MAIL command.
8863| [CVE-2006-1292] Directory traversal vulnerability in Jim Hu and Chad Little PHP iCalendar 2.21 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences and a NUL (%00) character in the phpicalendar[cookie_language] and phpicalendar[cookie_style] cookies, as demonstrated by injecting PHP sequences into an Apache access_log file, which is then included by day.php.
8864| [CVE-2006-1079] htpasswd, as used in Acme thttpd 2.25b and possibly other products such as Apache, might allow local users to gain privileges via shell metacharacters in a command line argument, which is used in a call to the system function. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common products that access htpasswd remotely, then perhaps it should be included.
8865| [CVE-2006-1078] Multiple buffer overflows in htpasswd, as used in Acme thttpd 2.25b, and possibly other products such as Apache, might allow local users to gain privileges via (1) a long command line argument and (2) a long line in a file. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common products that access htpasswd remotely, then perhaps it should be included.
8866| [CVE-2004-2650] Spooler in Apache Foundation James 2.2.0 allows local users to cause a denial of service (memory consumption) by triggering various error conditions in the retrieve function, which prevents a lock from being released and causes a memory leak.
8867| [CVE-2003-1172] Directory traversal vulnerability in the view-source sample file in Apache Software Foundation Cocoon 2.1 and 2.2 allows remote attackers to access arbitrary files via a .. (dot dot) in the filename parameter.
8868| [CVE-2002-1233] A regression error in the Debian distributions of the apache-ssl package (before 1.3.9 on Debian 2.2, and before 1.3.26 on Debian 3.0), for Apache 1.3.27 and earlier, allows local users to read or modify the Apache password file via a symlink attack on temporary files when the administrator runs (1) htpasswd or (2) htdigest, a re-introduction of a vulnerability that was originally identified and addressed by CVE-2001-0131.
8869|
8870| SecurityFocus - https://www.securityfocus.com/bid/:
8871| [42102] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
8872| [27237] Apache HTTP Server 2.2.6, 2.0.61 and 1.3.39 'mod_status' Cross-Site Scripting Vulnerability
8873|
8874| IBM X-Force - https://exchange.xforce.ibmcloud.com:
8875| [75211] Debian GNU/Linux apache 2 cross-site scripting
8876|
8877| Exploit-DB - https://www.exploit-db.com:
8878| [2237] Apache < 1.3.37, 2.0.59, 2.2.3 (mod_rewrite) Remote Overflow PoC
8879| [31052] Apache <= 2.2.6 'mod_negotiation' HTML Injection and HTTP Response Splitting Vulnerability
8880| [30901] Apache HTTP Server 2.2.6 Windows Share PHP File Extension Mapping Information Disclosure Vulnerability
8881| [30835] Apache HTTP Server <= 2.2.4 413 Error HTTP Request Method Cross-Site Scripting Weakness
8882| [28365] Apache 2.2.2 CGI Script Source Code Information Disclosure Vulnerability
8883| [27915] Apache James 2.2 SMTP Denial of Service Vulnerability
8884| [18984] Apache Struts <= 2.2.1.1 - Remote Command Execution
8885| [17691] Apache Struts < 2.2.0 - Remote Command Execution
8886| [15319] Apache 2.2 (Windows) Local Denial of Service
8887| [11650] Apache 2.2.14 mod_isapi Dangling Pointer Remote SYSTEM Exploit
8888|
8889| OpenVAS (Nessus) - http://www.openvas.org:
8890| [100858] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
8891|
8892| SecurityTracker - https://www.securitytracker.com:
8893| [1008196] Apache 2.x on Windows May Return Unexpected Files For URLs Ending With Certain Characters
8894| [1007143] Apache 2.0 Web Server May Use a Weaker Encryption Implementation Than Specified in Some Cases
8895| [1006444] Apache 2.0 Web Server Line Feed Buffer Allocation Flaw Lets Remote Users Deny Service
8896| [1005963] Apache Web Server 2.x Windows Device Access Flaw Lets Remote Users Crash the Server or Possibly Execute Arbitrary Code
8897| [1004770] Apache 2.x Web Server ap_log_rerror() Function May Disclose Full Installation Path to Remote Users
8898|
8899| OSVDB - http://www.osvdb.org:
8900| [20897] PHP w/ Apache 2 SAPI virtual() Function Unspecified INI Setting Disclosure
8901|_
8902443/tcp open ssl/http Apache Tomcat/Coyote JSP engine 1.1
8903|_http-server-header: Apache/2.2.34 (Amazon)
8904| vulscan: VulDB - https://vuldb.com:
8905| [93735] Zoho ManageEngine OpManager 12100/12200 Notes index.jsp cross site scripting
8906| [93734] Zoho ManageEngine OpManager 12100/12200 Packet Loss Graph index.jsp cross site scripting
8907| [93733] Zoho ManageEngine OpManager 12100/12200 index.jsp cross site scripting
8908| [140234] Zoho ManageEngine Application Manager up to 14.2 NewThresholdConfiguration.jsp Parameter sql injection
8909| [140233] Zoho ManageEngine ManageEngine OpManager up to 12.4x NewThresholdConfiguration.jsp Parameter sql injection
8910| [139385] Apache Tika 1.19/1.20/1.21 SAXParsers Hang denial of service
8911| [136646] Apache Allura up to 1.10.x Dropdown Selector Stored cross site scripting
8912| [135390] Zoho ManageEngine Application Manager 13.1 Build 13100 Alarm File Upload privilege escalation
8913| [135389] Zoho ManageEngine Application Manager 13.1 Build 13100 Widget cross site scripting
8914| [135388] Zoho ManageEngine Application Manager 13.1 Build 13100 /auditLogAction.do sql injection
8915| [133984] Zoho ManageEngine Applications Manager 12.x/13.x/14 FaultTemplateOptions.jsp sql injection
8916| [133955] Zoho ManageEngine Applications Manager 11.x/12.x/13.x/14.0 Popup_SLA.jsp sql injection
8917| [133315] Apache Airflow up to 1.10.2 HTTP Endpoint cross site request forgery
8918| [133314] Apache Airflow up to 1.10.2 Metadata Database cross site scripting
8919| [131236] Apache Airflow up to 1.10.1 Metadata Database cross site scripting
8920| [130529] Apache Subversion 1.10.0/1.10.1/1.10.2/1.10.3/1.11.0 mod_dav_svn Directory Crash denial of service
8921| [130212] Apache Airflow up to 1.10.0 LDAP Auth Backend Certificate weak authentication
8922| [128109] Apache NiFi 1.8.0 Error Page message-page.jsp Request Header cross site scripting
8923| [127981] Apache OFBiz 16.11.01/16.11.02/16.11.03/16.11.04 HTTP Engine httpService GET Request privilege escalation
8924| [127794] Pippo 1.11.0 jaxb/JaxbEngine.java XML External Entity
8925| [125261] Pippo up to 1.11.0 XstreamEngine Code Execution
8926| [125133] Apache Tika up to 1.19 XML Parser reset() denial of service
8927| [124876] Apache Ranger up to 1.1.x UnixAuthenticationService Stack-based memory corruption
8928| [124286] Apache Tika up to 1.18 IptcAnpaParser Loop denial of service
8929| [122802] Plex Media Server 1.13.2.5154 XML Parsing Engine XML External Entity
8930| [122455] Apache Tomcat Native up to 1.1.34/1.2.16 OSCP Revoked Certificate weak authentication
8931| [122454] Apache Tomcat Native up to 1.1.34/1.2.16 OSCP Responder Revoked Certificate weak authentication
8932| [122103] Battle for Wesnoth up to 1.14.3 Lua Scripting Engine Code Execution
8933| [117117] Apache Tika up to 1.17 ChmParser Loop denial of service
8934| [117116] Apache Tika up to 1.17 BPGParser Loop denial of service
8935| [117115] Apache Tika up to 1.17 tika-server command injection
8936| [114717] Apache Commons 1.11/1.12/1.13/1.14/1.15 ZIP Archive ZipFile/ZipArchiveInputStream denial of service
8937| [112841] JSP Tickets 1.1 on Joomla Parameter sql injection
8938| [112677] Apache Tomcat Native Connector up to 1.1.34/1.2.14 OCSP Checker Client weak authentication
8939| [112510] brace-expansion up to 1.1.6 Regular Expression index.jsp denial of service
8940| [112314] NetGain Enterprise Manager 7.2.730 Build 1034 org.apache.jsp.u.jsp.tools.exec_jsp Servlet Parameter privilege escalation
8941| [110785] Apache Drill up to 1.11.0 Query Page unknown vulnerability
8942| [108781] Apache jUDDI up to 1.x happyjuddi.jsp Parameter cross site scripting
8943| [108780] Apache jUDDI up to 1.x Log File uddiget.jsp spoofing
8944| [107266] Apache Tika up to 1.12 XML Parser XML External Entity
8945| [107262] Apache Mesos up to 1.1.2/1.2.1/1.3.0/1.4.0-dev libprocess HTTP Request Crash denial of service
8946| [107258] Apache Mesos up to 1.1.2/1.2.1/1.3.0/1.4.0-dev libprocess HTTP Request Crash denial of service
8947| [106739] puppetlabs-apache up to 1.11.0/2.0.x weak authentication
8948| [106101] Zoho ManageEngine Firewall Analyzer 12200 Group Chat shell.jsp PHP File privilege escalation
8949| [105980] Apache Engine 16.11.01 Parameter Reflected unknown vulnerability
8950| [104983] Apache Wink up to 1.1.1 XML Document xxe privilege escalation
8951| [102783] Microsoft Malware Protection Engine up to 1.1.13804.0 on 32-bit mpengine.dll memory corruption
8952| [102070] Apache CXF Fediz up to 1.1.2/1.2.0 Application Plugin denial of service
8953| [100422] Reporting Module 1.12.0 on OpenMRS manageReports.jsp cross site request forgery
8954| [99299] Apache Geode up to 1.1.0 Pulse OQL Query privilege escalation
8955| [93736] Zoho ManageEngine OpManager 12100/12200 Cookie weak encryption
8956| [93732] Zoho ManageEngine OpManager 12100/12200 DNS Name cross site scripting
8957| [93731] Zoho ManageEngine OpManager 12100/12200 EncryptPassword API denial of service
8958| [80638] Hospira LifeCare PCA Infusion System up to 1.1 Communication Engine Stack-Based memory corruption
8959| [77949] Newphoria Applican Framework up to 1.12.2 on Android/iOS Runtime Engine whitelist.xml privilege escalation
8960| [76654] Cisco Identity Services Engine 1.1(4.1)/1.3(106.146)/1.3(120.135) Web Interface Clickjacking privilege escalation
8961| [67911] Oracle Retail Clearance Optimization Engine 13.3/13.4/14.0 Apache commons-beanutils-1.8.0.jar memory corruption
8962| [70338] Apache Syncope up to 1.1.7 unknown vulnerability
8963| [29831] Microsoft Malware Protection Engine up to 1.1.10600.0 denial of service
8964| [69385] Apache Syncope up to 1.1.6 unknown vulnerability
8965| [65346] Cisco Identity Services Engine Software up to 1.1.2 privilege escalation
8966| [65051] Little CMS Color Engine up to 1.19 Utility Stack-based memory corruption
8967| [64172] Jspautsch FirstLastNames 1.1.1 cross site scripting
8968| [8747] Microsoft Malware Protection Engine 1.1.9402.0 File Scan memory corruption
8969| [6517] Cisco Identity Services Engine up to 1.1.1 cross site request forgery
8970| [53368] Apache MyFaces 1.1.7/1.2.8 cross site scripting
8971| [46004] Apache Jackrabbit 1.4/1.5.0 search.jsp cross site scripting
8972| [45272] Little cms color engine up to 1.10 cmsAllocGamma memory corruption
8973| [45271] Little cms color engine up to 1.10 ReadEmbeddedTextTag memory corruption
8974| [44575] CafeEngine Easycafeengine 1.1 dish.php sql injection
8975| [44574] CafeEngine Easycafeengine 1.1 index.php sql injection
8976| [42328] Microsoft Windows Live Onecare 1.1.3520.0 Malware Protection Engine mpengine.dll denial of service
8977| [42327] Microsoft Windows Live Onecare 1.1.3520.0 Malware Protection Engine mpengine.dll denial of service
8978| [39385] Mozilla SeaMonkey 1.1.4 Javascript Engine memory corruption
8979| [3310] Apache OpenOffice 1.1.3/2.0.4/2.2.1 TIFF Image Parser Heap-based memory corruption
8980| [37320] Apache MyFaces Tomahawk up to 1.1.4 cross site scripting
8981|
8982| MITRE CVE - https://cve.mitre.org:
8983| [CVE-2012-3908] Multiple cross-site request forgery (CSRF) vulnerabilities in the ISE Administrator user interface (aka the Apache Tomcat interface) on Cisco Identity Services Engine (ISE) 3300 series appliances before 1.1.0.665 Cumulative Patch 1 allow remote attackers to hijack the authentication of administrators, aka Bug ID CSCty46684.
8984| [CVE-2010-3863] Apache Shiro before 1.1.0, and JSecurity 0.9.x, does not canonicalize URI paths before comparing them to entries in the shiro.ini file, which allows remote attackers to bypass intended access restrictions via a crafted request, as demonstrated by the /./account/index.jsp URI.
8985| [CVE-2009-1305] The JavaScript engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving JSOP_DEFVAR and properties that lack the JSPROP_PERMANENT attribute.
8986| [CVE-2005-1753] ** DISPUTED ** ReadMessage.jsp in JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to view other users' e-mail attachments via a direct request to /mailboxesdir/username@domainname. NOTE: Sun and Apache dispute this issue. Sun states: "The report makes references to source code and files that do not exist in the mentioned products."
8987| [CVE-2013-1768] The BrokerFactory functionality in Apache OpenJPA 1.x before 1.2.3 and 2.x before 2.2.2 creates local executable JSP files containing logging trace data produced during deserialization of certain crafted OpenJPA objects, which makes it easier for remote attackers to execute arbitrary code by creating a serialized object and leveraging improperly secured server programs.
8988| [CVE-2013-1346] mpengine.dll in Microsoft Malware Protection Engine before 1.1.9506.0 on x64 platforms allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted file.
8989| [CVE-2012-6117] Aeolus Configuration Server, as used in Red Hat CloudForms Cloud Engine before 1.1.2, uses world-readable permissions for /var/log/aeolus-configserver/configserver.log, which allows local users to read plaintext passwords by reading the log file.
8990| [CVE-2012-5509] aeolus-configserver-setup in the Aeolas Configuration Server, as used in Red Hat CloudForms Cloud Engine before 1.1.2, uses world-readable permissions for a temporary file in /tmp, which allows local users to read credentials by reading this file.
8991| [CVE-2012-2379] Apache CXF 2.4.x before 2.4.8, 2.5.x before 2.5.4, and 2.6.x before 2.6.1, when a Supporting Token specifies a child WS-SecurityPolicy 1.1 or 1.2 policy, does not properly ensure that an XML element is signed or encrypted, which has unspecified impact and attack vectors.
8992| [CVE-2012-2378] Apache CXF 2.4.5 through 2.4.7, 2.5.1 through 2.5.3, and 2.6.x before 2.6.1, does not properly enforce child policies of a WS-SecurityPolicy 1.1 SupportingToken policy on the client side, which allows remote attackers to bypass the (1) AlgorithmSuite, (2) SignedParts, (3) SignedElements, (4) EncryptedParts, and (5) EncryptedElements policies.
8993| [CVE-2012-1462] The ZIP file parser in AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, Quick Heal (aka Cat QuickHeal) 11.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, Norman Antivirus 6.06.12, Sophos Anti-Virus 4.61.0, and AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11 allows remote attackers to bypass malware detection via a ZIP file containing an invalid block of data at the beginning. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ZIP parser implementations.
8994| [CVE-2012-1461] The Gzip file parser in AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, and VBA32 3.12.14.2 allows remote attackers to bypass malware detection via a .tar.gz file with multiple compressed streams. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Gzip parser implementations.
8995| [CVE-2012-1459] The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
8996| [CVE-2012-1457] The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
8997| [CVE-2012-1456] The TAR file parser in AVG Anti-Virus 10.0.0.1190, Quick Heal (aka Cat QuickHeal) 11.00, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, and Trend Micro HouseCall 9.120.0.1004 allows remote attackers to bypass malware detection via a TAR file with an appended ZIP file. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
8998| [CVE-2012-1453] The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.
8999| [CVE-2012-1443] The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations.
9000| [CVE-2012-1429] The ELF file parser in Bitdefender 7.2, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, and nProtect Anti-Virus 2011-01-17.01 allows remote attackers to bypass malware detection via an ELF file with a ustar character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
9001| [CVE-2012-1425] The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, Quick Heal (aka Cat QuickHeal) 11.00, Emsisoft Anti-Malware 5.1.0.1, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, and Trend Micro HouseCall 9.120.0.1004 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \50\4B\03\04 character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
9002| [CVE-2012-1420] The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \7fELF character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
9003| [CVE-2011-3012] The ioQuake3 engine, as used in World of Padman 1.2 and earlier, Tremulous 1.1.0, and ioUrbanTerror 2007-12-20, does not check for dangerous file extensions before writing to the quake3 directory, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file, a different vulnerability than CVE-2011-2764.
9004| [CVE-2011-0533] Cross-site scripting (XSS) vulnerability in Apache Continuum 1.1 through 1.2.3.1, 1.3.6, and 1.4.0 Beta
9005| [CVE-2011-0037] Microsoft Malware Protection Engine before 1.1.6603.0, as used in Microsoft Malicious Software Removal Tool (MSRT), Windows Defender, Security Essentials, Forefront Client Security, Forefront Endpoint Protection 2010, and Windows Live OneCare, allows local users to gain privileges via a crafted value of an unspecified user registry key.
9006| [CVE-2010-4408] Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1 does not require entry of the administrator's password at the time of modifying a user account, which makes it easier for context-dependent attackers to gain privileges by leveraging a (1) unattended workstation or (2) cross-site request forgery (CSRF) vulnerability, a related issue to CVE-2010-3449.
9007| [CVE-2010-3449] Cross-site request forgery (CSRF) vulnerability in Redback before 1.2.4, as used in Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1
9008| [CVE-2010-2086] Apache MyFaces 1.1.7 and 1.2.8, as used in IBM WebSphere Application Server and other applications, does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors that involve modifying the serialized view object.
9009| [CVE-2010-2057] shared/util/StateUtils.java in Apache MyFaces 1.1.x before 1.1.8, 1.2.x before 1.2.9, and 2.0.x before 2.0.1 uses an encrypted View State without a Message Authentication Code (MAC), which makes it easier for remote attackers to perform successful modifications of the View State via a padding oracle attack.
9010| [CVE-2009-5120] The default configuration of Apache Tomcat in Websense Manager in Websense Web Security 7.0 and Web Filter 7.0 allows connections to TCP port 1812 from arbitrary source IP addresses, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via UTF-7 text to the 404 error page of a Project Woodstock service on this port.
9011| [CVE-2009-3075] Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.2, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to use of mutable strings in the js_StringReplaceHelper function in js/src/jsstr.cpp, and unknown vectors.
9012| [CVE-2009-3072] Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.3, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the BinHex decoder in netwerk/streamconv/converters/nsBinHexDecoder.cpp, and unknown vectors.
9013| [CVE-2009-1833] The JavaScript engine in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) js_LeaveSharpObject, (2) ParseXMLSource, and (3) a certain assertion in jsinterp.c
9014| [CVE-2009-1392] The browser engine in Mozilla Firefox 3 before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) nsEventStateManager::GetContentState and nsNativeTheme::CheckBooleanAttr
9015| [CVE-2009-1304] The JavaScript engine in Mozilla Firefox 3.x before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving (1) js_FindPropertyHelper, related to the definitions of Math and Date
9016| [CVE-2009-1303] The browser engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to nsSVGElement::BindToTree.
9017| [CVE-2009-1302] The browser engine in Mozilla Firefox 3.x before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to (1) nsAsyncInstantiateEvent::Run, (2) nsStyleContext::Destroy, (3) nsComputedDOMStyle::GetWidth, (4) the xslt_attributeset_ImportSameName.html test case for the XSLT stylesheet compiler, (5) nsXULDocument::SynchronizeBroadcastListener, (6) IsBindingAncestor, (7) PL_DHashTableOperate and nsEditor::EndUpdateViewBatch, and (8) gfxSkipCharsIterator::SetOffsets, and other vectors.
9018| [CVE-2009-0774] The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to gczeal, a different vulnerability than CVE-2009-0773.
9019| [CVE-2009-0773] The JavaScript engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a splice of an array that contains "some non-set elements," which causes jsarray.cpp to pass an incorrect argument to the ResizeSlots function, which triggers memory corruption
9020| [CVE-2009-0772] The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to nsCSSStyleSheet::GetOwnerNode, events, and garbage collection, which triggers memory corruption.
9021| [CVE-2009-0771] The layout engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption and assertion failures.
9022| [CVE-2009-0353] Unspecified vulnerability in Mozilla Firefox 3.x before 3.0.6, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine.
9023| [CVE-2009-0352] Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.6, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the layout engine and destruction of arbitrary layout objects by the nsViewManager::Composite function.
9024| [CVE-2009-0026] Multiple cross-site scripting (XSS) vulnerabilities in Apache Jackrabbit before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via the q parameter to (1) search.jsp or (2) swr.jsp.
9025| [CVE-2008-7015] Unreal engine 3, as used in Unreal Tournament 3 1.3, Frontlines: Fuel of War 1.1.1, and other products, allows remote attackers to cause a denial of service (server exit) via a packet with a large length value that triggers a memory allocation failure.
9026| [CVE-2008-6282] SQL injection vulnerability in engine/users/users_edit_pub.inc in CMS Ortus 1.13 and earlier allows remote authenticated users to execute arbitrary SQL commands via the city parameter in a users_edit_pub action to index.php.
9027| [CVE-2008-5720] Cross-site scripting (XSS) vulnerability in Mayaa before 1.1.23 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving the default error page for the org.seasar.mayaa.impl.engine.PageNotFoundException exception and possibly other exceptions.
9028| [CVE-2008-5502] The layout engine in Mozilla Firefox 3.x before 3.0.5, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) via vectors that trigger memory corruption, related to the GetXMLEntity and FastAppendChar functions.
9029| [CVE-2008-5501] The layout engine in Mozilla Firefox 3.x before 3.0.5, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service via vectors that trigger an assertion failure.
9030| [CVE-2008-5500] The layout engine in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to (1) a reachable assertion or (2) an integer overflow.
9031| [CVE-2008-5317] Integer signedness error in the cmsAllocGamma function in src/cmsgamma.c in Little cms color engine (aka lcms) before 1.17 allows attackers to have an unknown impact via a file containing a certain "number of entries" value, which is interpreted improperly, leading to an allocation of insufficient memory.
9032| [CVE-2008-5316] Buffer overflow in the ReadEmbeddedTextTag function in src/cmsio1.c in Little cms color engine (aka lcms) before 1.16 allows attackers to have an unknown impact via vectors related to a length parameter inconsistency involving the contents of "the input file," a different vulnerability than CVE-2007-2741.
9033| [CVE-2008-5052] The AppendAttributeValue function in the JavaScript engine in Mozilla Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger memory corruption, as demonstrated by e4x/extensions/regress-410192.js.
9034| [CVE-2008-5018] The JavaScript engine in Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via vectors related to "insufficient class checking" in the Date class.
9035| [CVE-2008-5017] Integer overflow in xpcom/io/nsEscape.cpp in the browser engine in Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via unknown vectors.
9036| [CVE-2008-5016] The layout engine in Mozilla Firefox 3.x before 3.0.4, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via multiple vectors that trigger an assertion failure or other consequences.
9037| [CVE-2008-4604] SQL injection vulnerability in index.php in Easy CafeEngine 1.1 allows remote attackers to execute arbitrary SQL commands via the itemid parameter.
9038| [CVE-2008-4062] Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine and (1) misinterpretation of the characteristics of Namespace and QName in jsxml.c, (2) misuse of signed integers in the nsEscapeCount function in nsEscape.cpp, and (3) interaction of JavaScript garbage collection with certain use of an NPObject in the nsNPObjWrapper::GetNewOrUsed function in nsJSNPRuntime.cpp.
9039| [CVE-2008-4061] Integer overflow in the MathML component in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via an mtd element with a large integer value in the rowspan attribute, related to the layout engine.
9040| [CVE-2008-3257] Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and earlier allows remote attackers to execute arbitrary code via a long HTTP version string, as demonstrated by a string after "POST /.jsp" in an HTTP request.
9041| [CVE-2008-2799] Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown vectors related to the JavaScript engine.
9042| [CVE-2008-2798] Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown vectors related to the layout engine.
9043| [CVE-2008-2131] Cross-site scripting (XSS) vulnerability in mvnForum 1.1 GA allows remote authenticated users to inject arbitrary web script or HTML via the topic field, which is later displayed by user/viewthread.jsp through use of the "quick reply button."
9044| [CVE-2008-1438] Unspecified vulnerability in Microsoft Malware Protection Engine (mpengine.dll) 1.1.3520.0 and 0.1.13.192, as used in multiple Microsoft products, allows context-dependent attackers to cause a denial of service (disk space exhaustion) via a file with "crafted data structures" that trigger the creation of large temporary files, a different vulnerability than CVE-2008-1437.
9045| [CVE-2008-1437] Unspecified vulnerability in Microsoft Malware Protection Engine (mpengine.dll) 1.1.3520.0 and 0.1.13.192, as used in multiple Microsoft products, allows context-dependent attackers to cause a denial of service (engine hang and restart) via a crafted file, a different vulnerability than CVE-2008-1438.
9046| [CVE-2008-1380] The JavaScript engine in Mozilla Firefox before 2.0.0.14, Thunderbird before 2.0.0.14, and SeaMonkey before 1.1.10 allows remote attackers to cause a denial of service (garbage collector crash) and possibly have other impacts via a crafted web page. NOTE: this is due to an incorrect fix for CVE-2008-1237.
9047| [CVE-2008-1237] Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the JavaScript engine.
9048| [CVE-2008-1236] Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the layout engine.
9049| [CVE-2008-0413] The JavaScript engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via (1) a large switch statement, (2) certain uses of watch and eval, (3) certain uses of the mousedown event listener, and other vectors.
9050| [CVE-2008-0412] The browser engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to the (1) nsTableFrame::GetFrameAtOrBefore, (2) nsAccessibilityService::GetAccessible, (3) nsBindingManager::GetNestedInsertionPoint, (4) nsXBLPrototypeBinding::AttributeChanged, (5) nsColumnSetFrame::GetContentInsertionFrame, and (6) nsLineLayout::TrimTrailingWhiteSpaceIn methods, and other vectors.
9051| [CVE-2007-5340] Multiple vulnerabilities in the Javascript engine in Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allow remote attackers to cause a denial of service (crash) via crafted HTML that triggers memory corruption.
9052| [CVE-2007-5249] Multiple buffer overflows in the logging function in the Unreal engine, as used by America's Army and America's Army Special Forces 2.8.2 and earlier, when Punkbuster (PB) is enabled, allow remote attackers to cause a denial of service (daemon crash) via a long (1) PB_Y packet to the YPG server on UDP port 1716 or (2) PB_U packet to UCON on UDP port 1716, different vectors than CVE-2007-4442. NOTE: this issue might be in Punkbuster itself, but there are insufficient details to be certain.
9053| [CVE-2007-4508] Stack-based buffer overflow in Rebellion Asura engine, as used for the server in Rogue Trooper 1.0 and earlier and Prism 1.1.1.0 and earlier, allows remote attackers to execute arbitrary code via a long string in a 0xf007 packet for the challenge B query.
9054| [CVE-2007-3101] Multiple cross-site scripting (XSS) vulnerabilities in certain JSF applications in Apache MyFaces Tomahawk before 1.1.6 allow remote attackers to inject arbitrary web script via the autoscroll parameter, which is injected into Javascript that is sent to the client.
9055| [CVE-2007-2868] Multiple vulnerabilities in the JavaScript engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger memory corruption.
9056| [CVE-2007-2867] Multiple vulnerabilities in the layout engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) via vectors related to dangling pointers, heap corruption, signed/unsigned, and other issues.
9057| [CVE-2006-6445] Directory traversal vulnerability in error.php in Envolution 1.1.0 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the PNSVlang (PNSV lang) parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by error.php.
9058| [CVE-2006-3747] Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.
9059| [CVE-2006-1143] Cross-site scripting (XSS) vulnerability in FTPoed Blog Engine 1.1 allows remote attackers to inject arbitrary web script or HTML via the comment_body parameter, as used by the comment field, when posting a comment.
9060| [CVE-2006-0254] Multiple cross-site scripting (XSS) vulnerabilities in Apache Geronimo 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) time parameter to cal2.jsp and (2) any invalid parameter, which causes an XSS when the log file is viewed by the Web-Access-Log viewer.
9061| [CVE-2005-4284] Cross-site scripting (XSS) vulnerability in StaticStore Search Engine 1.189A and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified parameters to search.cgi, possibly the keywords parameter. NOTE: this issue was originally disputed by the vendor, but it has since been acknowledged.
9062| [CVE-2005-1754] ** DISPUTED ** JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to read arbitrary files via a full pathname in the argument to the Download parameter. NOTE: Sun and Apache dispute this issue. Sun states: "The report makes references to source code and files that do not exist in the mentioned products."
9063| [CVE-2004-1395] The Lithtech engine, as used in (1) Contract Jack 1.1 and earlier, (2) No one lives forever 2 1.3 and earlier, (3) Tron 2.0 1.042 and earlier, (4) F.E.A.R. (First Encounter Assault and Recon), and possibly other games, allows remote attackers to cause a denial of service (connection refused) via a UDP packet that causes recvfrom to generate a return code that causes the listening loop to exit, as demonstrated using zero byte packets or packets between 8193 and 12280 bytes, which result in conditions that are not "Operation would block."
9064| [CVE-2004-0700] Format string vulnerability in the mod_proxy hook functions function in ssl_engine_log.c in mod_ssl before 2.8.19 for Apache before 1.3.31 may allow remote attackers to execute arbitrary messages via format string specifiers in certain log messages for HTTPS that are handled by the ssl_log function.
9065| [CVE-2004-0608] The Unreal Engine, as used in DeusEx 1.112fm and earlier, Devastation 390 and earlier, Mobile Forces 20000 and earlier, Nerf Arena Blast 1.2 and earlier, Postal 2 1337 and earlier, Rune 107 and earlier, Tactical Ops 3.4.0 and earlier, Unreal 1 226f and earlier, Unreal II XMP 7710 and earlier, Unreal Tournament 451b and earlier, Unreal Tournament 2003 2225 and earlier, Unreal Tournament 2004 before 3236, Wheel of Time 333b and earlier, and X-com Enforcer, allows remote attackers to execute arbitrary code via a UDP packet containing a secure query with a long value, which overwrites memory.
9066| [CVE-2003-1498] Cross-site scripting (XSS) vulnerability in search.php for WRENSOFT Zoom Search Engine 2.0 Build 1018 and earlier allows remote attackers to inject arbitrary web script or HTML via the zoom_query parameter.
9067| [CVE-2003-0658] Docview before 1.1-18 in Caldera OpenLinux 3.1.1, SCO Linux 4.0, OpenServer 5.0.7, configures the Apache web server in a way that allows remote attackers to read arbitrary publicly readable files via a certain URL, possibly related to rewrite rules.
9068| [CVE-2002-0259] InstantServers MiniPortal 1.1.5 and earlier stores sensitive login and account data in plaintext in (1) .pwd files in the miniportal/apache directory, or (2) mplog.txt, which could allow local users to gain privileges.
9069| [CVE-2001-0591] Directory traversal vulnerability in Oracle JSP 1.0.x through 1.1.1 and Oracle 8.1.7 iAS Release 1.0.2 can allow a remote attacker to read or execute arbitrary .jsp files via a '..' (dot dot) attack.
9070| [CVE-2000-1247] The default configuration of the jserv-status handler in jserv.conf in Apache JServ 1.1.2 includes an "allow from 127.0.0.1" line, which allows local users to discover JDBC passwords or other sensitive information via a direct request to the jserv/ URI.
9071| [CVE-1999-0071] Apache httpd cookie buffer overflow for versions 1.1.1 and earlier.
9072|
9073| SecurityFocus - https://www.securityfocus.com/bid/:
9074| [94941] Huawei CloudEngine 12800 CVE-2016-8782 Denial of Service Vulnerability
9075| [37966] Apache 1.3 mod_proxy HTTP Chunked Encoding Integer Overflow Vulnerability
9076| [27237] Apache HTTP Server 2.2.6, 2.0.61 and 1.3.39 'mod_status' Cross-Site Scripting Vulnerability
9077| [4995] Apache Tomcat JSP Engine Denial of Service Vulnerability
9078| [1986] Caucho Technology Resin 1.2 JSP Source Disclosure Vulnerability
9079| [72299] ManageEngine ServiceDesk Plus 'CreateReportTable.jsp' SQL Injection Vulnerability
9080| [65935] Apache Shiro 'login.jsp' Authentication Bypass Vulnerability
9081| [35630] ManageEngine NetFlow Analyzer 'jspui/index.jsp' Cross Site Scripting Vulnerability
9082| [26368] ManageEngine OpManager JSP/Login.DO Multiple Cross Site Scripting Vulnerabilities
9083| [25531] Apache Tomcat Cal2.JSP Cross-Site Scripting Vulnerability
9084| [24476] Apache Tomcat JSP Example Web Applications Cross Site Scripting Vulnerability
9085| [17604] Cisco Wireless Lan Solution Engine ArchiveApplyDisplay.JSP Cross-Site Scripting Vulnerability
9086| [15687] Java Search Engine Search.JSP Cross-Site Scripting Vulnerability
9087| [12537] IBM WebSphere Application Server JSP Engine Source Code Disclosure Vulnerability
9088| [11803] Apache Jakarta Results.JSP Remote Cross-Site Scripting Vulnerability
9089| [5542] Apache Tomcat 4.1 JSP Request Cross Site Scripting Vulnerability
9090| [4997] Macromedia JRun JSP Engine Denial Of Service Vulnerability
9091| [4878] Apache Tomcat RealPath.JSP Malformed Request Information Disclosure Vulnerability
9092| [4876] Apache Tomcat Source.JSP Malformed Request Information Disclosure Vulnerability
9093|
9094| IBM X-Force - https://exchange.xforce.ibmcloud.com:
9095| [12667] SurfControl E-mail Filter for SMTP rules engine 16 or more .zip files filter bypass
9096| [79407] ManageEngine Support Center Plus UploadImage.jsp file upload
9097| [68164] ManageEngine ServiceDesk Plus FileDownload.jsp directory traversal
9098| [67532] IBM WebSphere Application Server org.apache.jasper.runtime.JspWriterImpl.response denial of service
9099| [63422] Apache Tomcat sessionsList.jsp cross-site scripting
9100| [61940] IBM FileNet Application Engine .jsp cross-site scripting
9101| [61070] Apache Jackrabbit search.jsp SQL injection
9102| [58056] Apache ActiveMQ .jsp source code disclosure
9103| [53997] Mozilla Firefox browser engine unspecified code execution variant 1
9104| [51630] ManageEngine Netflow Analyzer index.jsp cross-site scripting
9105| [49213] Apache Tomcat cal2.jsp cross-site scripting
9106| [48110] Apache Jackrabbit search.jsp and swr.jsp cross-site scripting
9107| [45351] Multiple Mozilla products layout engine code execution variant 1
9108| [42915] Apache Tomcat JSP files path disclosure
9109| [36467] Apache Tomcat functions.jsp cross-site scripting
9110| [34869] Apache Tomcat JSP example Web application cross-site scripting
9111| [34377] Apache Tomcat hello.jsp cross-site scripting
9112| [34207] Apache Tomcat implicit-objects.jsp cross-site scripting
9113| [24158] Apache Geronimo jsp-examples cross-site scripting
9114| [23410] Java Search Engine search.jsp allows cross-site scripting
9115| [22109] Apache HTTP Server ssl_engine_kernel client certificate validation
9116| [13254] Apache Tomcat .jsp cross-site scripting
9117| [9339] Multiple vendor JSP Engine WPrinterJob() denial of service
9118| [6971] Apache Jakarta Tomcat may reveal JSP source code with missing HTTP protocol specification
9119| [6316] Apache Jakarta Tomcat may reveal JSP source code
9120|
9121| Exploit-DB - https://www.exploit-db.com:
9122| [30191] Apache MyFaces Tomahawk JSF Framework 1.1.5 Autoscroll Parameter Cross Site Scripting Vulnerability
9123| [27095] Apache Tomcat / Geronimo 1.0 Sample Script cal2.jsp time Parameter XSS
9124| [23244] WrenSoft Zoom Search Engine 2.0 Build: 1018 Cross-Site Scripting Vulnerability
9125| [19536] Apache <= 1.1,NCSA httpd <= 1.5.2,Netscape Server 1.12/1.1/2.0 a nph-test-cgi Vulnerability
9126| [30983] ExpressionEngine 1.2.1 HTTP Response Splitting and Cross Site Scripting Vulnerabilities
9127| [30980] AwesomeTemplateEngine 1 Multiple Cross-Site Scripting Vulnerabilities
9128| [30543] Doomsday Engine 1.8.6/1.9 - Multiple Remote Vulnerabilities
9129| [29930] Apache AXIS 1.0 Non-Existent WSDL Path Information Disclosure Vulnerability
9130| [29012] DMXReady Site Engine Manager 1.0 Index.ASP SQL Injection Vulnerability
9131| [28874] Exhibit Engine 1.22 fstyles.php toroot Parameter Remote File Inclusion
9132| [28873] Exhibit Engine 1.22 fetchsettings.php toroot Parameter Remote File Inclusion
9133| [27980] Alex DownloadEngine 1.4.1 Comments.PHP SQL Injection Vulnerability
9134| [27823] OpenEngine 1.7/1.8 Template Unauthorized Access Vulnerability
9135| [27574] Basic Analysis and Security Engine 1.2.4 PrintFreshPage Cross-Site Scripting Vulnerability
9136| [27127] PMachine ExpressionEngine 1.4.1 HTTP Referrer HTML Injection Vulnerability
9137| [27096] Apache Geronimo 1.0 Error Page XSS
9138| [26542] Apache Struts 1.2.7 Error Response Cross-Site Scripting Vulnerability
9139| [26395] Basic Analysis And Security Engine 1.2 Base_qry_main.PHP SQL Injection Vulnerability
9140| [25625] Apache 1.3.x HTDigest Realm Command Line Argument Buffer Overflow Vulnerability (2)
9141| [25624] Apache 1.3.x HTDigest Realm Command Line Argument Buffer Overflow Vulnerability (1)
9142| [24694] Apache 1.3.x mod_include Local Buffer Overflow Vulnerability
9143| [23752] Digital Reality Game Engine 1.0.x Remote Denial of Service Vulnerability
9144| [23751] Apache Cygwin 1.3.x/2.0.x Directory Traversal Vulnerability
9145| [23314] Serious Sam Engine 1.0.5 - Remote Denial of Service Vulnerability
9146| [22961] Gallery 1.2/1.3.x Search Engine Cross-Site Scripting Vulnerability
9147| [22505] Apache Mod_Access_Referer 1.0.2 NULL Pointer Dereference Denial of Service Vulnerability
9148| [22068] Apache 1.3.x,Tomcat 4.0.x/4.1.x Mod_JK Chunked Encoding Denial of Service Vulnerability
9149| [21885] Apache 1.3/2.0.x Server Side Include Cross Site Scripting Vulnerability
9150| [21560] Apache 1.x/2.0.x Chunked-Encoding Memory Corruption Vulnerability (2)
9151| [21559] Apache 1.x/2.0.x Chunked-Encoding Memory Corruption Vulnerability (1)
9152| [21534] Apache Tomcat 3/4 JSP Engine Denial of Service Vulnerability
9153| [21350] Apache Win32 1.3.x/2.0.x Batch File Remote Command Execution Vulnerability
9154| [21295] GNUJSP 1.0 File Disclosure Vulnerability
9155| [21257] AHG Search Engine 1.0 Search.CGI Arbitrary Command Execution Vulnerability
9156| [21204] Apache 1.3.20 Win32 PHP.EXE Remote File Disclosure Vulnerability
9157| [21067] Apache 1.0/1.2/1.3 Server Address Disclosure Vulnerability
9158| [21002] Apache 1.3 Possible Directory Index Disclosure Vulnerability
9159| [20911] Apache 1.3.14 Mac File Protection Bypass Vulnerability
9160| [20695] Apache 1.3 Artificially Long Slash Path Directory Listing Vulnerability (4)
9161| [20694] Apache 1.3 Artificially Long Slash Path Directory Listing Vulnerability (3)
9162| [20693] Apache 1.3 Artificially Long Slash Path Directory Listing Vulnerability (2)
9163| [20692] Apache 1.3 Artificially Long Slash Path Directory Listing Vulnerability (1)
9164| [20595] NCSA 1.3/1.4.x/1.5,Apache httpd 0.8.11/0.8.14 ScriptAlias Source Retrieval Vulnerability
9165| [20558] Apache 1.2 Web Server DoS Vulnerability
9166| [20466] Apache 1.3 Web Server with Php 3 File Disclosure Vulnerability
9167| [20457] Microsoft SQL Server 7.0/2000,Data Engine 1.0/2000 xp_peekqueue Buffer Overflow Vulnerability
9168| [20456] Microsoft SQL Server 7.0/2000,Data Engine 1.0/2000 xp_showcolv Buffer Overflow Vulnerability
9169| [20451] Microsoft SQL Server 7.0/2000,Data Engine 1.0/2000 xp_displayparamstmt Buffer Overflow Vulnerability
9170| [20435] Apache 0.8.x/1.0.x,NCSA httpd 1.x test-cgi Directory Listing Vulnerability
9171| [20429] Caucho Technology Resin 1.2 JSP Source Disclosure Vulnerability
9172| [20272] Apache 1.2.5/1.3.1,UnityMail 2.0 MIME Header DoS Vulnerability
9173| [20210] Apache 1.3.12 WebDAV Directory Listings Vulnerability
9174| [20172] ManageEngine Mobile Application Manager 10 - SQL Injection
9175| [20171] ManageEngine Application Manager 10 - Multiple Vulnerabilities
9176| [19975] Apache 1.3.6/1.3.9/1.3.11/1.3.12/1.3.20 Root Directory Access Vulnerability
9177| [18031] phpLDAPadmin <= 1.2.1.1 (query_engine) Remote PHP Code Injection
9178| [18021] phpLDAPadmin <= 1.2.1.1 (query_engine) Remote PHP Code Injection Exploit
9179| [17639] XpressEngine 1.4.5.7 Persistent XSS Vulnerability
9180| [16798] Apache mod_jk 1.2.20 Buffer Overflow
9181| [15710] Apache Archiva 1.0 - 1.3.1 CSRF Vulnerability
9182| [15557] openEngine 2.0 100226 LFI and XSS Vulnerabilities
9183| [12721] Apache Axis2 1.4.1 - Local File Inclusion Vulnerability
9184| [12550] Netvidade engine 1.0 - Multiple Vulnerabilities
9185| [8994] AWScripts Gallery Search Engine 1.x Insecure Cookie Vulnerability
9186| [8414] XEngineSoft PMS/MGS/NM/AMS 1.0 (Auth Bypass) SQL Injection Vulns
9187| [8408] X10Media Mp3 Search Engine < 1.6.2 Admin Access Vulnerability
9188| [7158] Alex Article-Engine 1.3.0 (fckeditor) Arbitrary File Upload Vulnerability
9189| [7157] Alex News-Engine 1.5.1 - Remote Arbitrary File Upload Vulnerability
9190| [7074] X10media Mp3 Search Engine <= 1.6 - Remote File Disclosure Vulnerability
9191| [6480] x10media mp3 search engine 1.5.5 - Remote File Inclusion Vulnerability
9192| [6239] Ruby <= 1.9 (regex engine) Remote Socket Memory Leak Exploit
9193| [6100] Apache mod_jk 1.2.19 Remote Buffer Overflow Exploit (win32)
9194| [5834] Comparison Engine Power 1.0 - Blind SQL Injection Exploit
9195| [4093] Apache mod_jk 1.2.19/1.2.20 Remote Buffer Overflow Exploit
9196| [3605] Picture-Engine <= 1.2.0 (wall.php cat) Remote SQL Injection Exploit
9197| [3384] Ubuntu/Debian Apache 1.3.33/1.3.34 (CGI TTY) Local Root Exploit
9198| [3104] PPC Search Engine 1.61 (INC) Multiple Remote File Include Vulnerabilities
9199| [2850] Exhibit Engine <= 1.22 (styles.php) Remote File Include Vulnerability
9200| [2521] Download-Engine <= 1.4.2 (spaw) Remote File Include Vulnerability
9201| [2509] Exhibit Engine <= 1.5 RC 4 (photo_comment.php) File Include Exploit
9202| [2480] phpBB Security Suite Mod 1.0.0 (logger_engine.php) Remote File Include
9203| [2237] Apache < 1.3.37, 2.0.59, 2.2.3 (mod_rewrite) Remote Overflow PoC
9204| [1750] Quake 3 Engine 1.32b R_RemapShader() Remote Client BoF Exploit
9205| [587] Apache <= 1.3.31 mod_include Local Buffer Overflow Exploit
9206| [466] htpasswd Apache 1.3.31 - Local Exploit
9207| [132] Apache 1.3.x - 2.0.48 - mod_userdir Remote Users Disclosure Exploit
9208| [126] Apache mod_gzip (with debug_mode) <= 1.2.26.1a Remote Exploit
9209| [67] Apache 1.3.x mod_mylo Remote Code Execution Exploit
9210|
9211| OpenVAS (Nessus) - http://www.openvas.org:
9212| [64251] Debian Security Advisory DSA 1816-1 (apache2)
9213| [58360] Debian Security Advisory DSA 1312-1 (libapache-mod-jk)
9214| [53848] Debian Security Advisory DSA 131-1 (apache)
9215| [53433] Debian Security Advisory DSA 181-1 (libapache-mod-ssl)
9216| [855821] Solaris Update for Apache 1.3 122912-19
9217| [855812] Solaris Update for Apache 1.3 122911-19
9218| [855737] Solaris Update for Apache 1.3 122911-17
9219| [855731] Solaris Update for Apache 1.3 122912-17
9220| [855695] Solaris Update for Apache 1.3 122911-16
9221| [855645] Solaris Update for Apache 1.3 122912-16
9222| [855587] Solaris Update for kernel update and Apache 108529-29
9223| [855566] Solaris Update for Apache 116973-07
9224| [855531] Solaris Update for Apache 116974-07
9225| [855524] Solaris Update for Apache 2 120544-14
9226| [855494] Solaris Update for Apache 1.3 122911-15
9227| [855478] Solaris Update for Apache Security 114145-11
9228| [855472] Solaris Update for Apache Security 113146-12
9229| [855179] Solaris Update for Apache 1.3 122912-15
9230| [855147] Solaris Update for kernel update and Apache 108528-29
9231| [855077] Solaris Update for Apache 2 120543-14
9232| [64559] Debian Security Advisory DSA 1834-2 (apache2)
9233| [64423] Debian Security Advisory DSA 1834-1 (apache2)
9234| [57788] Debian Security Advisory DSA 1247-1 (libapache-mod-auth-kerb)
9235| [57335] Debian Security Advisory DSA 1167-1 (apache)
9236| [57201] Debian Security Advisory DSA 1131-1 (apache)
9237| [57200] Debian Security Advisory DSA 1132-1 (apache2)
9238| [53851] Debian Security Advisory DSA 135-1 (libapache-mod-ssl)
9239| [53849] Debian Security Advisory DSA 132-1 (apache-ssl)
9240| [53738] Debian Security Advisory DSA 195-1 (apache-perl)
9241| [53737] Debian Security Advisory DSA 188-1 (apache-ssl)
9242| [53735] Debian Security Advisory DSA 187-1 (apache)
9243| [53577] Debian Security Advisory DSA 120-1 (libapache-mod-ssl, apache-ssl)
9244| [53393] Debian Security Advisory DSA 114-1 (gnujsp)
9245| [14771] Apache <= 1.3.33 htpasswd local overflow
9246|
9247| SecurityTracker - https://www.securitytracker.com:
9248| [1024764] Apache Tomcat Manager Input Validation Hole in 'sessionList.jsp' Permits Cross-Site Scripting Attacks
9249| [1005410] Apache Tomcat Java Servlet Engine Can Be Crashed Via Multiple Requests for DOS Device Names
9250| [1005290] Apache Tomcat Java Server Default Servlet Returns JSP Source Code to Remote Users
9251| [1004578] Jakarta Tomcat JSP Engine Can Be Crashed in a Multi-user Environment By One User's Malicious Code
9252| [1003602] GNUJSP Java Server Pages Implementation Discloses Web Files and Source Code to Remote Users and Bypasses Apache Access Control Restrictions
9253| [1028865] Apache Struts Bugs Permit Remote Code Execution and URL Redirection Attacks
9254| [1028864] Apache Struts Wildcard Matching and Expression Evaluation Bugs Let Remote Users Execute Arbitrary Code
9255| [1028837] Cisco Identity Services Engine Flaw in Firewall Implementation Lets Remote Users Deny Service
9256| [1028824] Apache mod_dav_svn URI Processing Flaw Lets Remote Users Deny Service
9257| [1028823] Apache Unspecified Flaw in mod_session_dbd Has Unspecified Impact
9258| [1028738] Cisco Identity Services Engine Input Validation Hole in Search Form Permits Cross-Site Scripting Attacks
9259| [1028724] (HP Issues Fix for HP-UX) Apache Web Server Bugs Permit Cross-Site Scripting and Information Disclosure Attacks
9260| [1028722] (Red Hat Issues Fix for JBoss) Apache Tomcat Lets Remote Users Conduct DIGEST Authentication Replay Attacks
9261| [1028693] (Red Hat Issues Fix) Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks
9262| [1028622] Apache Struts 'includeParams' Bugs Permit Remote Command Execution and Cross-Site Scripting Attacks
9263| [1028621] Apache Subversion Bugs Let Remote Authenticated Users Execute Arbitrary Commands and Deny Service
9264| [1028568] Cisco Integrated Services Routers Crypto Engine Memory Management Flaw Lets Local Users Deny Service
9265| [1028557] Microsoft Malware Protection Engine Flaw Lets Remote Users Execute Arbitrary Code
9266| [1028540] Apache mod_rewrite Input Validation Flaw Lets Remote Users Execute Arbitrary Commands
9267| [1028534] Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks
9268| [1028533] Apache Tomcat Lack of Chunked Transfer Encoding Extension Size Limit Lets Remote Users Deny Service
9269| [1028532] Apache Tomcat AsyncListeners Bug May Disclose Information from One Request to Another User
9270| [1028515] Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges
9271| [1028457] Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information
9272| [1028287] Apache CXF WSS4JInInterceptor Grants Service Access to Remote Users
9273| [1028286] Apache CXF WS-Security UsernameToken Processing Flaw Lets Remote Users Bypass Authentication
9274| [1028252] Apache Commons FileUpload Unsafe Temporary File Lets Local Users Gain Elevated Privileges
9275| [1028207] Apache Input Validation Bugs Permit Cross-Site Scripting Attacks
9276| [1028152] Cisco Identity Services Engine Software Command Line Interface Flaw Lets Local Users Gain Root Privileges
9277| [1027836] Apache Tomcat Connection Processing Bug Lets Remote Users Deny Service
9278| [1027834] Apache Tomcat Bug Lets Remote Users Bypass Cross-Site Request Forgery Prevention Filter
9279| [1027833] Apache Tomcat Bug Lets Remote Users Bypass Security Constraints
9280| [1027729] Apache Tomcat Header Processing Bug Lets Remote Users Deny Service
9281| [1027728] Apache Tomcat Lets Remote Users Conduct DIGEST Authentication Replay Attacks
9282| [1027554] Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions
9283| [1027508] Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks
9284| [1027421] Apache Web Server Bugs Permit Cross-Site Scripting and Information Disclosure Attacks
9285| [1027392] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
9286| [1027188] Cisco Application Control Engine IP Address Overlap May Let Remote Authenticated Administrators Login to the Incorrect Context
9287| [1027096] Apache Commons Compress BZip2CompressorOutputStream() Sorting Algorithm Lets Remote or Local Users Deny Service
9288| [1026950] Oracle Grid Engine Lets Local Users and Remote Authenticated Users Gain Root Privileges
9289| [1026932] Apache LD_LIBRARY_PATH Processing Lets Local Users Gain Elevated Privileges
9290| [1026928] Apache OFBiz Unspecified Flaw Lets Remote Users Execute Arbitrary Code
9291| [1026927] Apache OFBiz Input Validation Flaws Permit Cross-Site Scripting Attacks
9292| [1026847] Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service
9293| [1026846] Apache Wicket Discloses Hidden Application Files to Remote Users
9294| [1026839] Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks
9295| [1026616] Apache Bugs Let Remote Users Deny Service and Obtain Cookie Data
9296| [1026575] Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands
9297| [1026484] Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code
9298| [1026477] Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service
9299| [1026433] Owl Intranet Engine Authentication Flaw Lets Remote Users Gain Administrative Access
9300| [1026402] Apache Struts Conversion Error Lets Remote Users Inject Arbitrary Commands
9301| [1026353] Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers
9302| [1026295] Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges
9303| [1026267] Apache .htaccess File Integer Overflow Lets Local Users Execute Arbitrary Code
9304| [1026144] Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers
9305| [1026095] Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks
9306| [1026075] Cisco Identity Services Engine Default Credentials Let Remote Users Gain Administrative Access
9307| [1026062] Crystal Reports Input Validation Flaw in 'pubDBLogon.jsp' Permits Cross-Site Scripting Attacks
9308| [1026054] Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service
9309| [1025993] Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information
9310| [1025976] Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks
9311| [1025969] Cisco Intercompany Media Engine Bugs Let Remote Users Deny Service
9312| [1025960] Apache httpd Byterange Filter Processing Error Lets Remote Users Deny Service
9313| [1025925] Apache Tomcat Commons Daemon jsvc Lets Local Users Gain Elevated Privileges
9314| [1025924] Apache Tomcat XML Validation Flaw Lets Applications Obtain Potentially Sensitive Information
9315| [1025788] Apache Tomcat Lets Malicious Applications Obtain Information and Deny Service
9316| [1025755] Apache Santuario Buffer Overflow Lets Remote Users Deny Service
9317| [1025712] Apache Tomcat Discloses Passwords to Local Users in Certain Cases
9318| [1025590] Cisco Media Experience Engine Default Credentials Grant Root Access to Remote Users
9319| [1025577] Apache Archiva Input Validation Hole Permits Cross-Site Scripting Attacks
9320| [1025576] Apache Archiva Request Validation Flaw Permits Cross-Site Request Forgery Attacks
9321| [1025527] Apache APR Library apr_fnmatch() Flaw Lets Remote Users Execute Arbitrary Code
9322| [1025333] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
9323| [1025303] Apache Tomcat HTTP BIO Connector Error Discloses Information From Different Requests to Remote Users
9324| [1025215] Apache Tomcat May Ignore @ServletSecurity Annotation Protections
9325| [1025117] Microsoft Malware Protection Engine Registry Processing Error Lets Local Users Gain Elevated Privileges
9326| [1025066] Apache Continuum Input Validation Flaw Permits Cross-Site Request Forgery Attacks
9327| [1025065] Apache Continuum Input Validation Hole Permits Cross-Site Scripting Attacks
9328| [1025027] Apache Tomcat maxHttpHeaderSize Parsing Error Lets Remote Users Deny Service
9329| [1025026] Apache Tomcat Manager Input Validation Hole Permits Cross-Site Scripting Attacks
9330| [1025025] Apache Tomcat Security Manager Lets Local Users Bypass File Permissions
9331| [1024932] Windows Graphics Rendering Engine Stack Overflow in Processing Thumbnail Images Lets Remote Users Execute Arbitrary Code
9332| [1024544] Windows Embedded OpenType Font Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
9333| [1024456] IBM FileNet Application Engine URL-based Session IDs May Let Remote Users Hijack User Sessions
9334| [1024455] IBM FileNet Application Engine Input Validation Hole Permits Cross-Site Scripting Attacks
9335| [1024417] Apache Traffic Server Insufficient Randomization Lets Remote Users Poison the DNS Cache
9336| [1024332] Apache mod_cache and mod_dav Request Processing Flaw Lets Remote Users Deny Service
9337| [1024322] Cisco Application Control Engine RTSP/SIP/SSL Inspection Flaws Let Remote Users Deny Service
9338| [1024283] FreeType 2 Font Rendering Engine Stack Overflows Let Remote Users Execute Arbitrary Code
9339| [1024240] Qt Memory Corruption Error in QTextEngine::LayoutData::reallocate() May Let Remote Users Execute Arbitrary Code
9340| [1024214] SAP J2EE Engine Input Validation Flaw in Web Services Navigator Permits Cross-Site Scripting Attacks
9341| [1024180] Apache Tomcat 'Transfer-Encoding' Header Processing Flaw Lets Remote Users Deny Service and Obtain Potentially Sensitive Information
9342| [1024168] Cisco Application Control Engine Newline Processing Flaw May Let Remote Users Modify HTTP Headers
9343| [1024114] SAP J2EE Engine Telnet Interface Lets Remote Authenticated Users Bypass Some Administrative Access Controls
9344| [1024096] Apache mod_proxy_http May Return Results for a Different Request
9345| [1023942] Apache mod_proxy_ajp Error Condition Lets Remote Users Deny Service
9346| [1023941] Apache ap_read_request() Memory Error May Let Remote Users Access Potentially Sensitive Information
9347| [1023781] Mozilla Thunderbird Browser Engine Bugs Let Remote Users Execute Arbitrary Code
9348| [1023778] Apache ActiveMQ Input Validation Flaw Permits Cross-Site Scripting Attacks
9349| [1023775] Mozilla Firefox Browser Engine Bugs Let Remote Users Execute Arbitrary Code
9350| [1023701] Apache mod_isapi Error Processing Flaw May Let Remote Users Deny Service
9351| [1023668] Windows VBScript Script Engine Flaw in Processing Windows Help Files Lets Remote Users Execute Arbitrary Code
9352| [1023660] IBM WebSphere Portal Input Validation Hole in 'login.jsp' Permits Cross-Site Scripting Attacks
9353| [1023632] Mozilla Thunderbird Browser Engine Bugs Let Remote Users Execute Arbitrary Code
9354| [1023610] Mozilla Firefox Browser Engine Bugs Let Remote Users Execute Arbitrary Code
9355| [1023533] Apache mod_proxy Integer Overflow May Let Remote Users Execute Arbitrary Code
9356| [1023432] Microsoft Embedded OpenType Font Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
9357| [1023334] Mozilla Seamonkey Bugs in JavaScript Engine and Browser Engine Let Remote Users Execute Arbitrary Code
9358| [1023333] Mozilla Firefox Bugs in JavaScript Engine and Browser Engine Let Remote Users Execute Arbitrary Code
9359| [1023303] CA Service Desk Input Validation Flaws in 'webengine' and 'freeaccess.spl' Permit Cross-Site Scripting Attacks
9360| [1023206] CiscoWorks Wireless LAN Solution Engine (WLSE) Protocol Flaw in SSL Renegotiation May Let Remote Users Conduct Man-in-the-Middle Attacks
9361| [1023205] Cisco Application Control Engine Protocol Flaw in SSL Renegotiation May Let Remote Users Conduct Man-in-the-Middle Attacks
9362| [1023090] Mozilla Firefox Bugs in JavaScript Engine, Browser Engine, and Other Components Let Remote Users Execute Arbitrary Code
9363| [1022988] Apache Solaris Support Code Bug Lets Remote Users Deny Service
9364| [1022949] Cisco Application Control Engine XML Gateway Discloses Internal IP Addresses to Remote Users
9365| [1022876] Mozilla Firefox Bugs in JavaScript Engine and Browser Engine Let Remote Users Execute Arbitrary Code
9366| [1022842] Microsoft JScript Scripting Engine Memory Corruption Error Lets Remote Users Execute Arbitrary Code
9367| [1022585] Mozilla Firefox Bugs in JavaScript Engine and Browser Engine Let Remote Users Execute Arbitrary Code
9368| [1022543] Windows Embedded OpenType (EOT) Font Engine Buffer Overflow Lets Remote Users Execute Arbitrary Code
9369| [1022529] Apache mod_deflate Connection State Bug Lets Remote Users Deny Service
9370| [1022511] Sun Java System Web Server Discloses JSP Source Code to Remote Users
9371| [1022509] Apache mod_proxy stream_reqbody_cl() Infinite Loop Lets Remote Users Deny Service
9372| [1022405] CA ARCserve Backup Input Validation Flaw in Message Engine Lets Remote Users Deny Service
9373| [1022376] Mozilla Firefox Bugs in JavaScript Engine and Browser Engine May Let Remote Users Execute Arbitrary Code
9374| [1022357] Windows RPC Marshalling Engine Memory Error Lets Local Users Gain Elevated Privileges
9375| [1022296] Apache IncludesNoExec Options Restrictions Can Be Bypass By Local Users
9376| [1022264] Apache mod_proxy_ajp Bug May Disclose Another User's Response Data
9377| [1022090] Mozilla Firefox JavaScript and Browser Engine Memory Corruption Bugs May Let Remote Users Execute Arbitrary Code
9378| [1022001] Apache Tomcat mod_jk May Disclose Responses to the Wrong User
9379| [1021988] mod_perl Input Validation Flaw in Apache::Status and Apache2::Status Permits Cross-Site Scripting Attacks
9380| [1021795] Mozilla Firefox JavaScript and Layout Engine Memory Corruption Bugs May Let Remote Users Execute Arbitrary Code
9381| [1021769] Cisco Application Control Engine SNMP Processing Flaw Lets Remote Authenticated Users Deny Service
9382| [1021768] Cisco Application Control Engine SSH Processing Flaw Lets Remote Users Deny Service
9383| [1021762] Cisco Application Control Engine Default Passwords Let Remote Users Access the System
9384| [1021761] Cisco Application Control Engine Lets Remote Authenticated Users Gain Elevated Privileges
9385| [1021663] Mozilla Firefox Bugs in JavaScript Engine and Layout Engine May Let Remote Users Execute Arbitrary Code
9386| [1021530] Cisco Application Control Engine Global Site Selector DNS Bug Lets Remote Users Deny Service
9387| [1021417] Mozilla Firefox Bugs in JavaScript Engine and Layout Engine May Let Remote Users Execute Arbitrary Code
9388| [1021358] Solaris OpenSSL PKCS#11 Engine Session Cache Bug Lets Remote or Local Users Deny Service
9389| [1021350] NetWare Bug Lets Remote Users Access the ApacheAdmin Console
9390| [1021183] Mozilla Firefox Bugs in Browser Engine Let Remote Users Execute Arbitrary Code
9391| [1020933] Cisco IOS Intrusion Prevention System Bug in 'SERVICE.DNS' Signature Engine Lets Remote Users Deny Service
9392| [1020916] Mozilla Firefox JavaScript Layout Engine Memory Corruption Bugs May Let Remote Users Execute Arbitrary Code
9393| [1020849] Cisco Application Control Engine Predictable Source Port Address Translation May Leave DNS Servers Vulnerable to Recent Cache Poisoning Attack
9394| [1020635] Apache Input Validation Hole in mod_proxy_ftp Permits Cross-Site Scripting Attacks
9395| [1020606] Mac OS X Data Detectors Engine Resource Consumption Bug Lets Users Deny Service
9396| [1020520] Oracle WebLogic Apache Connector Lets Remote Users Execute Arbitrary Code
9397| [1020267] Apache mod_proxy Interim Response Process Bug Lets Remote Users Deny Service
9398| [1020181] Cisco ASA Bug in IM Inspection Engine Lets Remote Users Deny Service
9399| [1020180] Cisco PIX Firewall Bug in IM Inspection Engine Lets Remote Users Deny Service
9400| [1020074] Cisco Service Control Engine SSH Server Bugs Let Remote Users Deny Service
9401| [1020016] Microsoft Malware Protection Engine Lets Remote Users Deny Service
9402| [1019986] Sun Java System Application Server Discloses JSP Source Code to Remote Users
9403| [1019985] Sun Java System Web Server Discloses JSP Source Code to Remote Users
9404| [1019894] IBM WebSphere Unspecified Flaw in Servlet Engine Has Unspecified Impact
9405| [1019830] Sun Grid Engine Bug in Qmaster Daemon Lets Local Users Deny Service
9406| [1019799] Windows VBScript and JScript Scripting Engine Bug Lets Remote Users Execute Arbitrary Code
9407| [1019784] Apache-SSL Certificate Processing Bug May Let Remote Users View Portions of Kernel Memory
9408| [1019695] Mozilla Firefox Bugs in JavaScript Engine and Layout Engine May Let Remote Users Execute Arbitrary Code
9409| [1019321] Mozilla Firefox Bugs in JavaScript Engine Let Remote Users Execute Arbitrary Code
9410| [1019320] Mozilla Firefox Bugs in Browser Engine Let Remote Users Execute Arbitrary Code
9411| [1019305] EMC Documentum 'dmclTrace.jsp' Bug Lets Remote Users Upload Arbitrary Files and Execute Arbitrary Code
9412| [1019256] Apache mod_negotiation Input Validation Hole Permits Cross-Site Scripting Attacks
9413| [1019194] Apache Input Validation Hole in Mod_AutoIndex When the Character Set is Undefined May Permit Cross-Site Scripting Attacks
9414| [1019185] Apache Input Validation Hole in mod_proxy_ftp Permits Cross-Site Scripting Attacks
9415| [1019154] Apache Input Validation Hole in mod_status Permits Cross-Site Scripting Attacks
9416| [1019093] Apache Input Validation Hole in mod_imap Permits Cross-Site Scripting Attacks
9417| [1019030] Apache Input Validation Hole in Default HTTP 413 Error Page Permits Cross-Site Scripting Attacks
9418| [1018976] Microsoft Jet Engine Stack Overflow May Let Remote Users Execute Arbitrary Code
9419| [1018863] Trend Micro Scan Engine Buffer Overflow in 'Tmxpflt.sys' Lets Local Users Gain Elevated Privileges
9420| [1018633] Apache mod_proxy Bug Lets Remote Users Deny Service
9421| [1018452] Sun Java System Application Server Discloses JSP Source Code to Remote Users
9422| [1018408] Mozilla Firefox Bugs in Browser and Javascript Engines May Let Remote Users Execute Arbitrary Code
9423| [1018304] Apache HTTPD scoreboard Protection Flaw Lets Local Users Terminate Arbitrary Processes
9424| [1018303] Apache HTTPD mod_cache May Let Remote Users Deny Service
9425| [1018302] Apache mod_status Input Validation Hole Permits Cross-Site Scripting Attacks
9426| [1018269] Apache Tomcat Input Validation Hole in Processing Accept-Language Header Permits Cross-Site Scripting Attacks
9427| [1018245] Tomcat Input Validation Holes in the JSP Examples, Manager, and Host Manager Permit Cross-Site Scripting Attacks
9428| [1018153] Mozilla Seamonkey Bugs in Layout and Javascript Engines May Let Remote Users Execute Arbitrary Code
9429| [1018152] Mozilla Thunderbird Bugs in Javascript Engines May Let Remote Users Execute Arbitrary Code
9430| [1018151] Mozilla Firefox Bugs in Layout and Javascript Engines May Let Remote Users Execute Arbitrary Code
9431| [1017982] Trillian IRC and Display Engine Heap Overflows Let Remote Users Execute Arbitrary Code
9432| [1017960] Cisco NetFlow Collection Engine Default Passwords Let Remote Users Access the System
9433| [1017904] Apache suEXEC Bugs May Let Local Users Gain Elevated Privileges
9434| [1017719] Apache Tomcat JK Web Server Connector Buffer Overflow in map_uri_to_worker() Lets Remote Users Execute Arbitrary Code
9435| [1017698] Mozilla Firefox Memory Corruption in Layout Engine, SVG, and Javascript Engine May Let Remote Users Execute Arbitrary Code
9436| [1017506] BrightStor ARCserve Backup Bugs in Tape Engine, Mediasvr, and ASCORE.DLL Let Remote Users Execute Arbitrary Code
9437| [1017476] Kaspersky Anti-Virus Scanning Engine PE File Infinite Loop Lets Remote Users Deny Service
9438| [1017406] Mozilla Thunderbird Memory Corruption in Layout Engine and Javascript Engine May Let Remote Users Execute Arbitrary Code
9439| [1017405] Mozilla Seamonkey Memory Corruption in Layout Engine and Javascript Engine May Let Remote Users Execute Arbitrary Code
9440| [1017398] Mozilla Firefox Memory Corruption in Layout Engine and Javascript Engine May Let Remote Users Execute Arbitrary Code
9441| [1017268] BrightStor ARCserve Tape Engine Buffer Overflow Lets Remote Users Execute Arbitrary Code
9442| [1017179] Mozilla Firefox Layout Engine, XML Method, and JavaScript Engine Memory Errors May Let Remote Users Execute Arbitrary Code
9443| [1017178] Mozilla Thunderbird Layout Engine, XML Method, and JavaScript Engine Memory Errors May Let Remote Users Execute Arbitrary Code
9444| [1017177] Mozilla Seamonkey Layout Engine, XML Method, and JavaScript Engine Memory Errors May Let Remote Users Execute Arbitrary Code
9445| [1017062] Apache mod_tcl Format String Bug in set_var() Function May Let Remote Users Execute Arbitrary Code
9446| [1017026] Docmint Include File Flaw in 'MY_ENV[BASE_ENGINE_LOC]' Parameter Lets Remote Users Execute Arbitrary Code
9447| [1017006] CA Business Protection Suite Buffer Overflows in Backup Agent, Job Engine and Discovery Services Let Remote Users Execute Arbitrary Code
9448| [1017005] CA Server Protection Suite Buffer Overflows in Backup Agent, Job Engine and Discovery Services Let Remote Users Execute Arbitrary Code
9449| [1017004] BrightStor Enterprise Backup Buffer Overflows in Backup Agent, Job Engine and Discovery Services Let Remote Users Execute Arbitrary Code
9450| [1017003] BrightStor ARCserve Buffer Overflows in Backup Agent, Job Engine and Discovery Services Let Remote Users Execute Arbitrary Code
9451| [1016999] Symantec Scan Engine NAVEX15/NAVENG Device Drivers Let Local Users Gain Kernel Level Privileges
9452| [1016607] Sun N1 Grid Engine Buffer Overflows Let Local Users Shutdown the Grid Service or Gain Elevated Privileges
9453| [1016601] Apache mod_rewrite Off-by-one Error Lets Remote Users Execute Arbitrary Code
9454| [1016576] Apache Tomcat Discloses Directory Listings to Remote Users
9455| [1016286] Microsoft Windows 98 Graphics Rendering Engine Buffer Overflow in Processing WMF Images Lets Remote Users Execute Arbitrary Code
9456| [1016247] Sun Grid Engine CSP Flaws Let Local Denial of Service or Access the Grid Service
9457| [1016100] WebLogic JSP Compilation Error May Allow Remote Users to View JSP Source Code
9458| [1015974] Symantec Scan Engine Lets Remote Users Access the System and Download Files
9459| [1015965] CiscoWorks Wireless LAN Solution Engine Cross-Site Scripting Flaw Yields Administrative Privileges and Command Line Bug Lets Remote Authenticated Users Gain Shell Access
9460| [1015860] Doomsday Engine Format String Bugs in Con_Message() and Con_Printf() Let Remote Users Execute Arbitrary Code
9461| [1015837] Blazix Server Discloses JSP Source Code to Remote Users
9462| [1015835] Sun Grid Engine 'rsh' Bug Lets Local Users Obtain Root Privileges
9463| [1015823] Orion Application Server Discloses JSP Source Code to Remote Users
9464| [1015822] IBM Tivoli Business Systems Manager Input Validation Flaw in 'apwc_win_main.jsp' Permits Cross-Site Scripting Attacks
9465| [1015785] Veritas Backup Exec for Windows Servers Media Server Format String Bug in BENGINE May Let Remote Users Execute Arbitrary Code
9466| [1015779] Dwarf HTTP Server Discloses JSP Source Code and Permits Cross-Site Scripting Attacks
9467| [1015725] FTPoed Blog Engine Comment Section Input Validation Flaw Permits Cross-Site Scripting Attacks
9468| [1015576] KDE kpdf Heap Overflow in Splash Rasterizer Engine Lets Remote Users Execute Arbitrary Code
9469| [1015531] Grid Engine Bug in 'rsh' Lets Local Users Gain Elevated Privileges
9470| [1015512] KDE kjs Engine Buffer Overflow Lets Remote Users Execute Arbitrary Code
9471| [1015453] Microsoft Windows Graphics Rendering Engine WMF File Memory Access Error Lets Remote Users Execute Arbitrary Code
9472| [1015447] Apache mod_ssl Null Pointer Dereference May Let Remote Users Deny Service
9473| [1015413] Spb Kiosk Engine Discloses Administrative Password to Local Users
9474| [1015344] Apache mod_imap Input Validation Flaw in Referer Field Lets Remote Users Conduct Cross-Site Scripting Attacks
9475| [1015168] Microsoft Windows Buffer Overflows in Graphics Rendering Engine Lets Remote Users Execute Arbitrary Code
9476| [1015148] F-Prot Antivirus Lets Remote Users Bypass the Scanning Engine with Specially Crafted ZIP Files
9477| [1015093] Apache Memory Leak in MPM 'worker.c' Code May Let Remote Users Deny Service
9478| [1015047] Sun Java System Application Server May Disclose JSP Source Code to Remote Users
9479| [1015001] Symantec Anti Virus Scan Engine Buffer Overflow in Web Service Lets Remote Users Execute Arbitrary Code
9480| [1014996] ApacheTop Unsafe Temporary File May Let Local Users Gain Elevated Privileges
9481| [1014833] Apache ssl_hook_Access() Function May Fail to Verify Client Certificates
9482| [1014826] Apache Memory Leak in 'byterange filter' Lets Remote Users Deny Service
9483| [1014575] Apache mod_ssl Off-by-one Buffer Overflow in Processing CRLs May Let Remote Users Deny Service
9484| [1014488] Sophos Anti-Virus Engine Infinite Loop in Processing BZIP2 Archives Lets Remote Users Deny Service
9485| [1014323] Apache Chunked Transfer-Encoding and Content-Length Processing Lets Remote Users Smuggle HTTP Requests
9486| [1013743] Firefox Browser XPInstall Engine May Let Remote Users Execute Arbitrary Code
9487| [1013742] Mozilla Browser XPInstall Engine May Let Remote Users Execute Arbitrary Code
9488| [1013697] IBM WebSphere May Disclose JSP Source to Remote Users Sending Invalid Host Headers
9489| [1013361] Carsten's 3D Engine Format String Flaw Lets Remote Users Execute Arbitrary Code
9490| [1013156] Apache mod_python Publisher Handler Discloses Information to Remote Users
9491| [1012829] Apache mod_auth_radius radcpy() Integer Overflow Lets Remote Users Deny Service in Certain Cases
9492| [1012709] Owl Intranet Engine Has Unspecified Input Validation Holes That Permit SQL Injection and Cross-Site Scripting Attacks
9493| [1012420] Jakarta Lucene Input Validation Hole in 'results.jsp' Lets Remote Users Conduct Cross-Site Scripting Attacks
9494| [1012416] Apache on Apple OS X Lets Remote Users Bypass Apache File Handlers and Directly Access Files
9495| [1012415] Apache on Apple HFS+ Filesystems May Disclose '.DS_Store' Files to Remote Users
9496| [1012414] Apache mod_digest_apple Lets Remote Users Replay Authentication Credentials
9497| [1012344] Games Using the Serious Engine Can Be Crashed By Remote Users
9498| [1012313] JSPWiki Input Validation Hole in 'search.php' Lets Remote Users Conduct Cross-Site Scripting Attacks
9499| [1012098] LithTech Engine Format String Bug Lets Remote Users Crash the Game Server
9500| [1012083] Apache Web Server Error in Processing Requests With Many Space Characters Lets Remote Users Deny Service
9501| [1011783] Apache mod_include Buffer Overflow Lets Local Users Execute Arbitrary Code
9502| [1011640] Microsoft IE Buffer Overflow in Install Engine Lets Remote Users Execute Arbitrary Code
9503| [1011557] Apache mod_ssl SSLCipherSuite Directive Can By Bypassed in Certain Cases
9504| [1011421] Web Wiz Internet Search Engine Discloses Database to Remote Users
9505| [1011385] Apache Satsify Directive Error May Let Remote Users Access Restricted Resources
9506| [1011340] Apache SSL Connection Abort State Error Lets Remote Users Deny Service
9507| [1011303] Apache ap_resolve_env() Buffer Overflow in Reading Configuration Files May Let Local Users Gain Elevated Privileges
9508| [1011299] Apache IPv6 Address Parsing Flaw May Let Remote Users Deny Service
9509| [1011248] Apache mod_dav LOCK Method Error May Let Remote Users Deny Service
9510| [1011213] Apache mod_ssl Can Be Crashed By Remote Users When Reverse Proxying SSL Connections
9511| [1010910] Cfengine Buffer Overflow in AuthenticationDialogue() Lets Remote Users Execute Arbitrary Code
9512| [1010717] mod_ssl Format String Error in 'ssl_engine_ext' May Let Remote Users Execute Arbitrary Code
9513| [1010674] Apache Can Be Crashed By PHP Code Invoking Nested Remote Sockets
9514| [1010619] NetScreen 5GT Input Validation Bug in Anti-Virus Engine Lets Remote Users Conduct Cross-Site Scripting Attacks
9515| [1010611] Juniper JUNOS Packet Forwarding Engine Can Be Crashed By IPv6 Packets
9516| [1010599] Apache httpd Header Line Memory Allocation Lets Remote Users Crash the Server
9517| [1010535] Unreal Game Engine Has Buffer Overflow in 'Secure' Query That May Let Remote Users Execute Arbitrary Code
9518| [1010462] Apache mod_proxy Buffer Overflow May Let Remote Users Execute Arbitrary Code
9519| [1010322] Apache mod_ssl Stack Overflow in ssl_util_uuencode_binary() May Let Remote Users Execute Arbitrary Code
9520| [1010270] cPanel Apache mod_phpsuexec Options Let Local Users Gain Elevated Privileges
9521| [1009934] Apache Web Server Has Buffer Overflow in ebcdic2ascii() on Older Processor Architectures
9522| [1009923] Unreal Game Engine UMOD '..\' Input Validation Flaw Lets Remote Users Overwrite Files on the Target System
9523| [1009757] Microsoft Jet Database Engine 'msjet40.dll' Buffer Overflow Lets Remote Users Execute Arbitrary Code
9524| [1009696] Wireless LAN Solution Engine (WLSE) Hardcoded User Account Grants Full Access to Remote Users
9525| [1009695] Cisco Hosting Solution Engine (HSE) Hardcoded User Account Grants Full Access to Remote Users
9526| [1009516] Apache mod_survey HTML Report Format Lets Remote Users Conduct Cross-Site Scripting Attacks
9527| [1009509] Apache mod_disk_cache Stores Authentication Credentials on Disk
9528| [1009495] Apache Web Server Socket Starvation Flaw May Let Remote Users Deny Service
9529| [1009417] GroupWise WebAccess With Apache on NetWare Has Configuration Flaw That May Grant Web Access to Remote Users
9530| [1009372] Unreal Game Engine Format String Flaw May Let Remote Users Execute Arbitrary Code
9531| [1009338] Apache mod_access Parsing Flaw May Fail to Enforce Allow/Deny Rules
9532| [1009337] Apache mod_ssl Memory Leak Lets Remote Users Crash the Daemon
9533| [1009296] SPAex Search Engine Input Validation Flaw Permits Cross-Site Scripting Attacks
9534| [1009182] Apache for Cygwin '..%5C' Input Validation Flaw Discloses Files to Remote Users
9535| [1009076] Symantec AntiVirus Scan Engine for Red Hat Linux Has Temporary File Flaws That May Yield Root Privileges to Local Users
9536| [1009003] Resin Web Server Discloses JSP Source Code to Remote Users
9537| [1008973] PHP May Apply Incorrect php_admin_* Settings To Requests for Apache Virtual Hosts
9538| [1008967] Apache-SSL 'SSLFakeBasicAuth' Lets Remote Users Forge Client Certificates to Be Authenticated
9539| [1008920] Apache mod_digest May Validate Replayed Client Responses
9540| [1008828] Apache mod_python String Processing Bug Still Lets Remote Users Crash the Web Server
9541| [1008822] Apache mod_perl File Descriptor Leak May Let Local Users Hijack the http and https Services
9542| [1008675] mod_auth_shadow Apache Module Authenticates Expired Passwords
9543| [1008559] Apache mod_php File Descriptor Leak May Let Local Users Hijack the https Service
9544| [1008335] Apache mod_python String Processing Bug Lets Remote Users Crash the Web Server
9545| [1008196] Apache 2.x on Windows May Return Unexpected Files For URLs Ending With Certain Characters
9546| [1008030] Apache mod_rewrite Contains a Buffer Overflow
9547| [1008029] Apache mod_alias Contains a Buffer Overflow
9548| [1008028] Apache mod_cgid May Disclose CGI Output to Another Client
9549| [1007995] Apache Cocoon Forms May Let Remote Users Execute Arbitrary Java Code on the System
9550| [1007993] Apache Cocoon 'view-source' Sample Script Discloses Files to Remote Users
9551| [1007955] Vivisimo Clustering Engine Input Validation Flaw Permits Remote Cross-Site Scripting Attacks
9552| [1007923] Wrensoft Zoom Search Engine Input Validation Flaw Lets Remote Users Conduct Cross-Site Scripting Attacks
9553| [1007823] Apache Web Server mod_cgi Error May Let Malicious CGI Scripts Crash the Web Service
9554| [1007817] Cfengine Buffer Overflow in 'cfservd' Lets Remote Users Execute Arbitrary Code
9555| [1007664] Apache::Gallery Unsafe Temporary Files May Let Local Users Gain Apache Web Server Privileges
9556| [1007557] Apache Web Server Does Not Filter Terminal Escape Sequences From Log Files
9557| [1007280] Microsoft Data/Desktop Engine Named Pipe and LPC Flaws Let Local Users Execute Arbitrary Code
9558| [1007230] Apache HTTP Server 'rotatelogs' Bug on Win32 and OS/2 May Cause the Logging to Stop
9559| [1007172] Microsoft Jet Database Engine Buffer Overflow May Let Remote Users Execute Arbitrary Code
9560| [1007146] Apache HTTP Server FTP Proxy Bug May Cause Denial of Service Conditions
9561| [1007145] Apache 'accept()' Errors May Cause Denial of Service Conditions
9562| [1007144] Apache Web Server 'type-map' File Error Permits Local Denial of Service Attacks
9563| [1007143] Apache 2.0 Web Server May Use a Weaker Encryption Implementation Than Specified in Some Cases
9564| [1006899] JBoss Application Server Discloses JSP Source Code to Remote Users
9565| [1006864] Apache Web Server Can Be Crashed By Remote Users Via mod_dav Flaws and Also Via Basic Authentication
9566| [1006858] Sun ONE Application Server Discloses JSP Source Code to Remote Users and Passwords to Local Users
9567| [1006763] Owl Intranet Engine 'browse.php' Script Fails to Authenticate Remote Users
9568| [1006723] Verilink (Polycom) NetEngine 6100-4 Router Can Be Crashed By Remote Users
9569| [1006709] Apache mod_survey Input Validation Flaw Lets Remote Users Fill Up Disk Space
9570| [1006614] Apache mod_ntlm Buffer Overflow and Format String Flaw Let Remote Users Execute Arbitary Code
9571| [1006591] Apache mod_access_referer Module Null Pointer Dereference May Faciliate Denial of Service Attacks
9572| [1006444] Apache 2.0 Web Server Line Feed Buffer Allocation Flaw Lets Remote Users Deny Service
9573| [1006323] Microsoft Windows Buffer Overflow in Windows Script Engine JScript.DLL Lets Remote Users Execute Arbitrary Code
9574| [1006021] Apache Tomcat Server URL Parsing Error May Disclose Otherwise Inaccessible Web Directory Listings and Files to Remote Users
9575| [1005963] Apache Web Server 2.x Windows Device Access Flaw Lets Remote Users Crash the Server or Possibly Execute Arbitrary Code
9576| [1005962] Apache Web Server Path Parsing Flaw May Allow Remote Users to Execute Code in Certain Configurations
9577| [1005848] Apache 'printenv' Script Input Validation Bugs in Older Versions May Let Remote Users Conduct Cross-Site Scripting Attacks
9578| [1005765] Apache mod_jk Module Processing Bug When Used With Tomcat May Disclose Information to Remote Users or Crash
9579| [1005548] Apache mod_php Module May Allow Local Users to Gain Control of the Web Port
9580| [1005499] Apache Web Server (2.0.42) May Disclose CGI Source Code to Remote Users When Used With WebDAV
9581| [1005436] Microsoft Data Engine/Desktop Engine (MSDE) Bugs Let Remote Authenticated Users Create/Delete/Execute Web Tasks With SQL Server Agent Privileges
9582| [1005351] Apache Web Server (1.3.x) Shared Memory Scoreboard Bug Lets Certain Local Users Issue Signals With Root Privileges
9583| [1005338] Microsoft Data/Desktop Engine (MSDE) Buffer Overflow Lets Remote Users Execute Arbitrary Code
9584| [1005331] Apache Web Server (2.x) SSI Server Signature Filtering Hole Lets Remote Users Conduct Cross-Site Scripting Attacks
9585| [1005317] ASTAware SearchDisc Search Engine in SunONE Starter Kit Discloses Files to Remote Users
9586| [1005285] Apache Web Server 'mod_dav' Has Null Pointer Bug That May Allow Remote Users to Cause Denial of Service Conditions
9587| [1005135] Blazix Java Application Server Input Validation Hole Discloses JSP Source Code and Password-Protected Directory Listings to Remote Users
9588| [1005067] Microsoft Desktop Engine (MSDE) Extended Stored Procedures May Let Local Users Execute Commands With Database Administrator Privileges
9589| [1005049] Oracle 9i Application Server Oracle Java Server Page (OJSP) Demos Have Input Validation Flaws That Enable Remote Users to Conduct Cross-site Scripting Attacks Against Application Server Users
9590| [1005010] Apache Web Server (2.0) Has Unspecified Flaw That Allows Remote Users to Obtain Sensitive Data and Cause Denial of Service Conditions
9591| [1004831] Microsoft Data Engine (MSDE) Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
9592| [1004770] Apache 2.x Web Server ap_log_rerror() Function May Disclose Full Installation Path to Remote Users
9593| [1004745] Apache Tomcat Java Server Allows Cross-Site Scripting Attacks
9594| [1004743] Fluid Dynamics Search Engine Input Validation Bug in 'Rank' Variable Lets Remote Users Conduct Cross-site Scripting Attacks
9595| [1004739] Microsoft SQL Server Desktop Engine (MSDE) Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
9596| [1004666] Macromedia JRun Server Bug in Processing Unicode Null Characters in URL Discloses JSP Source Code to Remote Users
9597| [1004661] ht://Dig Search Engine Software May Allow Cross-Site Scripting Attacks
9598| [1004636] Apache mod_ssl 'Off-by-One' Bug May Let Local Users Crash the Web Server or Possibly Execute Arbitrary Code
9599| [1004617] Verity Search97 Search Engine Input Validation Flaw Lets Remote Users Conduct Cross-site Scripting Attacks Against Users of Web Sites Running Search97
9600| [1004602] Apache Tomcat Java Server for Windows Can Be Crashed By Remote Users Sending Malicious Requests to Hang All Available Working Threads
9601| [1004586] Apache Tomcat Java Server May Disclose the Installation Path to Remote Users
9602| [1004579] Macromedia JRun Java Engine Can Be Crashed in a Multi-user Environment By One User's Malicious Code
9603| [1004555] Apache Web Server Chunked Encoding Flaw May Let Remote Users Execute Arbitrary Code on the Server
9604| [1004539] BODYBuilder Java-based Site Building Engine Input Validation Hole Lets Remote Users Execute Arbitrary SQL Commands on the Database
9605| [1004535] Macromedia ColdFusion May Let One User's JSP Code Gain Unauthorized Access to Another User's Data on a Shared Server
9606| [1004361] Microsoft Date Engine (MSDE) Default Configuration Leaves Blank Password for System Administrator Account
9607| [1004360] Opty-Way Enterprise Glassworks Management Application Installs Microsoft Data Engine Insecurely, Allowing Remote Users to Execute Commands on the System
9608| [1004298] Cisco ACNS Content Software (Running on Cache Engines and Content Engines) May Let Remote Users Open Unauthorized Connections to Arbitrary Ports and Addresses
9609| [1004282] mnoGoSearch SQL-based Search Engine Software Has Heap Overflow That Lets Remote Users Execute Arbitrary Code with the Privileges of the Web Server
9610| [1004257] Ecometry's SGDynamo Web Application Engine Allows Remote Users to Conduct Cross-Site Scripting Attacks
9611| [1004219] Webglimpse Search Engine Filtering Flaw May Allow Remote Users to Conduct Cross-Site Scripting Attacks Against Users of Sites Running Webglimpse
9612| [1004209] Apache 'mod_python' Python Language Interpreter Bug in Publisher Handler May Allow Remote Users to Modify Files on the System
9613| [1004182] BEA Weblogic URL Parsing Flaw Lets Remote Users View .JSP Source Code or the Physical Installation Path and Cause Denial of Service Conditions
9614| [1004103] Linker Search Engine Software Has Input Validation Flaw That Lets Remote Users View Files on the System and Gain Administrative Access to the Search Engine
9615| [1004036] StepWeb Search (SWS) Perl-based Search Engine Inadequate Access Controls Lets Remote Users Gain Administrative Access to the Search Engine
9616| [1003921] WWWIsis Search Engine CGI Allows Remote Users to Execute Commands and View Files on the System
9617| [1003913] ht://Dig Search Engine Bug Lets Remote Users Determine the Configuration File Directory Path
9618| [1003900] csSearch Perl-based Search Engine Software Lets Remote Users Execute Arbitrary Perl Scripts on the System
9619| [1003874] Apache Web Server for Windows Has Batch File Processing Hole That Lets Remote Users Execute Commands on the System
9620| [1003767] 'mod_frontpage' Module for Apache Web Server Has Buffer Overlow in 'fpexec.c' That Allows Remote Users to Execute Arbitrary Code on the System with Root Privileges
9621| [1003739] Tomcat Java Server Lets Malicious Java Servlets or JSP Pages Access Any File on the Server
9622| [1003723] Apache-SSL for Apache Web Server Has Buffer Overflow That Can Be Triggered By Remote Users
9623| [1003664] 'mod_ssl' Security Package for Apache Web Server Has Buffer Overflow That Can Be Triggered By Remote Users
9624| [1003570] Lasso Web Data Engine May Allow Remote Users to Crash the Web Server
9625| [1003465] PHP for Apache Web Server May Disclose Installation Path Information to Remote Users Making 'OPTIONS' Requests
9626| [1003453] Oracle Application Server OracleJSP Flaw Discloses JSP Source Code Contents to Remote Users
9627| [1003451] Oracle Application Server PL/SQL Module for Apache Has Buffer Overflows That Allow Remote Users to Execute Arbitrary Code and Gain Access to the Server
9628| [1003368] AHG's 'search.cgi' Search Engine Input Validation Flaw Lets Remote Users Execute Arbitrary Commands on the Web Server
9629| [1003307] WikkiTikkiTavi PHP-based Wiki Engine Lets Remote Users Execute Arbitrary PHP Code on the Server
9630| [1003131] Apache Web Server in Virtual Hosting Mode Can Be Crashed By a Local User Removing a Log Directory
9631| [1003104] PHP.EXE Windows CGI for Apache Web Server May Let Remote Users View Files on the Server Due to Configuration Error
9632| [1003008] Apache 'mod_bf' Module Lets Remote Users Execute Arbitrary Code
9633| [1002984] Webglimpse Search Engine Software May Allow Remote Users to Execute Arbitrary Code on the Server
9634| [1002981] Namazu Search Engine Software Allows Cross-Site Scripting Attacks
9635| [1002838] Allaire's JRun Java Server Discloses JSP Source Code to Remote Users When Used As a Connector With Commercial Web Servers
9636| [1002837] Allaire JRun Java Server Discloses Web Server Directory Contents to Remote Users Requesting URLs Containing '%3f.jsp'
9637| [1002629] Apache suEXEC Wrapper Fails to Observe Minimum Group ID Security Settings in Certain Situations
9638| [1002542] Apache Web Server Virtual Hosting Split-Logfile Function Lets Remote Users Write Log Entries to Arbitrary Files on the System
9639| [1002525] ht://Dig Search Engine Software Has Remote Denial of Service and Local Information Disclosure Bugs in htsearch
9640| [1002423] Oracle Application Server Discloses Full Path to Remote Users in Response to Requests for Non-existent JSP Files
9641| [1002400] Apache mod_gzip Module Has Buffer Overflow That Can Be Exploited By Local Users to Gain Elevated Privileges
9642| [1002303] Several 3rd Party Apache Authentication Modules Allow Remote Users to Execute Arbitrary Code to Gain Access to the System or Execute Stored Procedures to Obtain Arbitrary Database Information
9643| [1002193] Macromedia JRun Java Server Discloses JSP Source Code to Remote Users
9644| [1002188] Apache Web Server Discloses Internal IP Addresses to Remote Users in Certain Configurations
9645| [1001989] Apache Web Server May Disclose Directory Contents Even If an Index.html File is Present in the Directory
9646| [1001915] LiteWebServer Discloses JSP Source Code to Remote Users
9647| [1001719] Apache Web Server on Mac OS X Client Fails to Enforce File and Directory Access Protections, Giving Remote Users Access to Restricted Pages
9648| [1001623] SpearHead's NetGAP Security Appliance Allows Remote Users to Bypass the Web Content Filtering Engine
9649| [1001572] Apache Web Server on Microsoft Windows Platforms Allows Remote Users to Crash the Web Server
9650| [1001304] Apache Web Server for Windows Lets Remote Users Crash the Web Server Application
9651| [1001234] Resin Web Servlet and Java Engine Discloses JavaBean Contents to Remote Users
9652| [1001115] ASPSeek CGI-based Search Engine May Execute Arbitrary Code Supplied By Remote Users
9653| [1001083] Apache Web Server May Display Directory Index Listings Even if Directory Listings Are Disabled
9654| [1000942] Resin Web Servlet and Java Engine Allows Unauthorized Access to Directories and Files Outside of the Web Root Directory
9655|
9656| OSVDB - http://www.osvdb.org:
9657| [82782] Apache CXF WS-SecurityPolicy 1.1 SupportingToken Policy Bypass
9658| [90864] Apache Batik 1xx Redirect Script Origin Restriction Bypass
9659| [73550] Foxit Reader FreeType Engine Type 1 Font Decoder Overflow
9660| [6630] Apache Tomcat Java Server Pages (JSP) Engine WPrinterJob() DoS
9661|_
9662Service Info: Host: inversionistas.antarchile.cl
9663#######################################################################################################################################
9664 Anonymous JTSEC #OpChili Full Recon #55