· 6 years ago · Mar 02, 2020, 05:48 PM
1#######################################################################################################################################
2=======================================================================================================================================
3Hostname www.reciclaccion.cl ISP ZAM LTDA.
4Continent South America Flag
5CL
6Country Chile Country Code CL
7Region Unknown Local time 02 Mar 2020 12:58 -03
8City Unknown Postal Code Unknown
9IP Address 186.64.118.40 Latitude -33.439
10 Longitude -70.643
11=====================================================================================================================================
12####################################################################################################################################
13> www.reciclaccion.cl
14Server: 10.101.0.243
15Address: 10.101.0.243#53
16
17Non-authoritative answer:
18www.reciclaccion.cl canonical name = reciclaccion.cl.
19Name: reciclaccion.cl
20Address: 186.64.118.40
21>
22####################################################################################################################################
23Domain name: reciclaccion.cl
24Registrant name: ADRIANA GARCIA HUIDOBRO ZANARTU
25Registrant organisation:
26Registrar name: NIC Chile
27Registrar URL: https://www.nic.cl
28Creation date: 2004-01-21 20:54:35 CLST
29Expiration date: 2023-02-15 17:54:35 CLST
30Name server: ns1.dnsmisitio.net
31Name server: ns2.dnsmisitio.net
32Name server: ns3.dnsmisitio.net
33####################################################################################################################################
34[+] Target : www.reciclaccion.cl
35
36[+] IP Address : 186.64.118.40
37
38[+] Headers :
39
40[+] Date : Mon, 02 Mar 2020 16:22:43 GMT
41[+] Server : Apache
42[+] Link : <http://www.reciclaccion.cl/wp-json/>; rel="https://api.w.org/"
43[+] Set-Cookie : apbct_timestamp=1583166163; path=/; domain=www.reciclaccion.cl; httponly, apbct_site_landing_ts=1583166163; path=/; domain=www.reciclaccion.cl; httponly, apbct_page_hits=1; path=/; domain=www.reciclaccion.cl; httponly, apbct_cookies_test=%257B%2522cookies_names%2522%253A%255B%2522apbct_timestamp%2522%252C%2522apbct_site_landing_ts%2522%252C%2522apbct_page_hits%2522%255D%252C%2522check_value%2522%253A%252203c106f949fdbcb409fa7f5e5d25b9af%2522%257D; path=/; domain=www.reciclaccion.cl; httponly, ct_sfw_pass_key=efea61177e6ab9585b469da6c6f7e842; expires=Wed, 01-Apr-2020 16:22:43 GMT; Max-Age=2592000; path=/; domain=www.reciclaccion.cl
44[+] Strict-Transport-Security : max-age=63072000; includeSubdomains;
45[+] Upgrade : h2,h2c
46[+] Connection : Upgrade, Keep-Alive
47[+] Cache-Control : max-age=0, public
48[+] Expires : Mon, 02 Mar 2020 16:22:43 GMT
49[+] Vary : Accept-Encoding
50[+] Content-Encoding : gzip
51[+] Keep-Alive : timeout=2, max=1000
52[+] Transfer-Encoding : chunked
53[+] Content-Type : text/html; charset=UTF-8
54
55[+] SSL Certificate Information :
56
57[+] commonName : reciclaccion.cl
58[+] countryName : US
59[+] organizationName : Let's Encrypt
60[+] commonName : Let's Encrypt Authority X3
61[+] Version : 3
62[+] Serial Number : 04213A0A7DF42D370FF7449100FB35770829
63[+] Not Before : Feb 13 09:48:49 2020 GMT
64[+] Not After : May 13 09:48:49 2020 GMT
65[+] OCSP : ('http://ocsp.int-x3.letsencrypt.org',)
66[+] subject Alt Name : (('DNS', 'autodiscover.reciclaccion.cl'), ('DNS', 'cpanel.reciclaccion.cl'), ('DNS', 'mail.reciclaccion.cl'), ('DNS', 'reciclaccion.cl'), ('DNS', 'webdisk.reciclaccion.cl'), ('DNS', 'webmail.reciclaccion.cl'), ('DNS', 'www.reciclaccion.cl'))
67[+] CA Issuers : ('http://cert.int-x3.letsencrypt.org/',)
68
69[+] Whois Lookup :
70
71[+] NIR : None
72[+] ASN Registry : lacnic
73[+] ASN : 52368
74[+] ASN CIDR : 186.64.112.0/21
75[+] ASN Country Code : CL
76[+] ASN Date : 2012-11-26
77[+] ASN Description : ZAM LTDA., CL
78[+] cidr : 186.64.112.0/21
79[+] name : None
80[+] handle : CCF3
81[+] range : 186.64.112/21
82[+] description : ZAM LTDA.
83[+] country : CL
84[+] state : None
85[+] city : None
86[+] address : None
87[+] postal_code : None
88[+] emails : ['chan@HAULMER.COM', 'noc@HAULMER.COM']
89[+] created : 20121126
90[+] updated : 20181206
91
92[+] Crawling Target...
93
94[+] Looking for robots.txt........[ Found ]
95[+] Extracting robots Links.......[ 2 ]
96[+] Looking for sitemap.xml.......[ Found ]
97[+] Extracting sitemap Links......[ 7 ]
98[+] Extracting CSS Links..........[ 2 ]
99[+] Extracting Javascript Links...[ 5 ]
100[+] Extracting Internal Links.....[ 84 ]
101[+] Extracting External Links.....[ 5 ]
102[+] Extracting Images.............[ 8 ]
103
104[+] Total Links Extracted : 113
105
106[+] Dumping Links in /opt/FinalRecon/dumps/www.reciclaccion.cl.dump
107[+] Completed!
108####################################################################################################################################
109[i] Scanning Site: http://www.reciclaccion.cl
110
111
112
113B A S I C I N F O
114====================
115
116
117[+] Site Title: Reciclacción - Por una ciudad limpia y pura, reciclemos la basura.
118[+] IP address: 186.64.118.40
119[+] Web Server: Apache
120[+] CMS: WordPress
121[+] Cloudflare: Not Detected
122[+] Robots File: Found
123
124-------------[ contents ]----------------
125User-agent: *
126Disallow: /wp-admin/
127Allow: /wp-admin/admin-ajax.php
128
129-----------[end of contents]-------------
130
131
132
133W H O I S L O O K U P
134========================
135
136 %%
137%% This is the NIC Chile Whois server (whois.nic.cl).
138%%
139%% Rights restricted by copyright.
140%% See https://www.nic.cl/normativa/politica-publicacion-de-datos-cl.pdf
141%%
142
143Domain name: reciclaccion.cl
144Registrant name: ADRIANA GARCIA HUIDOBRO ZANARTU
145Registrant organisation:
146Registrar name: NIC Chile
147Registrar URL: https://www.nic.cl
148Creation date: 2004-01-21 20:54:35 CLST
149Expiration date: 2023-02-15 17:54:35 CLST
150Name server: ns1.dnsmisitio.net
151Name server: ns2.dnsmisitio.net
152Name server: ns3.dnsmisitio.net
153
154%%
155%% For communication with domain contacts please use website.
156%% See https://www.nic.cl/registry/Whois.do?d=reciclaccion.cl
157%%
158
159
160
161
162G E O I P L O O K U P
163=========================
164
165[i] IP Address: 186.64.118.40
166[i] Country: Chile
167[i] State:
168[i] City:
169[i] Latitude: -33.4378
170[i] Longitude: -70.6503
171
172
173
174
175H T T P H E A D E R S
176=======================
177
178
179[i] HTTP/1.1 200 OK
180[i] Date: Mon, 02 Mar 2020 16:23:21 GMT
181[i] Server: Apache
182[i] Link: <http://www.reciclaccion.cl/wp-json/>; rel="https://api.w.org/"
183[i] Set-Cookie: apbct_timestamp=1583166201; path=/; domain=www.reciclaccion.cl; httponly
184[i] Set-Cookie: apbct_site_landing_ts=1583166201; path=/; domain=www.reciclaccion.cl; httponly
185[i] Set-Cookie: apbct_page_hits=1; path=/; domain=www.reciclaccion.cl; httponly
186[i] Set-Cookie: apbct_cookies_test=%257B%2522cookies_names%2522%253A%255B%2522apbct_timestamp%2522%252C%2522apbct_site_landing_ts%2522%252C%2522apbct_page_hits%2522%255D%252C%2522check_value%2522%253A%2522cf4a4f5d59e9118d4c9286721a678fe4%2522%257D; path=/; domain=www.reciclaccion.cl; httponly
187[i] Set-Cookie: ct_sfw_pass_key=efea61177e6ab9585b469da6c6f7e842; expires=Wed, 01-Apr-2020 16:23:21 GMT; Max-Age=2592000; path=/; domain=www.reciclaccion.cl
188[i] Strict-Transport-Security: max-age=63072000; includeSubdomains;
189[i] Upgrade: h2,h2c
190[i] Connection: Upgrade, close
191[i] Cache-Control: max-age=0, public
192[i] Expires: Mon, 02 Mar 2020 16:23:21 GMT
193[i] Vary: Accept-Encoding
194[i] Content-Type: text/html; charset=UTF-8
195
196
197
198
199D N S L O O K U P
200===================
201
202reciclaccion.cl. 14399 IN TXT "v=spf1 ip4:186.64.118.40 +a +mx +ip4:186.64.114.5 +ip4:186.64.114.6 +ip4:186.64.114.7 ~all"
203reciclaccion.cl. 21599 IN SOA ns1.dnsmisitio.net. notificaciones_whm.haulmer.net. 2020021301 3600 7200 1209600 86400
204reciclaccion.cl. 21599 IN NS ns2.dnsmisitio.net.
205reciclaccion.cl. 21599 IN NS ns3.dnsmisitio.net.
206reciclaccion.cl. 21599 IN NS ns1.dnsmisitio.net.
207reciclaccion.cl. 14399 IN A 186.64.118.40
208reciclaccion.cl. 14399 IN MX 0 mail.reciclaccion.cl.
209
210
211
212
213S U B N E T C A L C U L A T I O N
214====================================
215
216Address = 186.64.118.40
217Network = 186.64.118.40 / 32
218Netmask = 255.255.255.255
219Broadcast = not needed on Point-to-Point links
220Wildcard Mask = 0.0.0.0
221Hosts Bits = 0
222Max. Hosts = 1 (2^0 - 0)
223Host Range = { 186.64.118.40 - 186.64.118.40 }
224
225
226
227N M A P P O R T S C A N
228============================
229
230Starting Nmap 7.70 ( https://nmap.org ) at 2020-03-02 16:23 UTC
231Nmap scan report for reciclaccion.cl (186.64.118.40)
232Host is up (0.17s latency).
233rDNS record for 186.64.118.40: blue127.dnsmisitio.net
234
235PORT STATE SERVICE
23621/tcp open ftp
23722/tcp closed ssh
23880/tcp open http
239443/tcp open https
240
241Nmap done: 1 IP address (1 host up) scanned in 1.15 seconds
242
243
244
245S U B - D O M A I N F I N D E R
246==================================
247
248
249[i] Total Subdomains Found : 4
250
251[+] Subdomain: cpanel.reciclaccion.cl
252[-] IP: 186.64.118.40
253
254[+] Subdomain: mail.reciclaccion.cl
255[-] IP: 186.64.118.40
256
257[+] Subdomain: webmail.reciclaccion.cl
258[-] IP: 186.64.118.40
259
260[+] Subdomain: autodiscover.reciclaccion.cl
261[-] IP: 186.64.114.5
262####################################################################################################################################
263[+] Starting At 2020-03-02 11:23:36.128383
264[+] Collecting Information On: http://www.reciclaccion.cl/
265[#] Status: 200
266--------------------------------------------------
267[#] Web Server Detected: Apache
268[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
269- Date: Mon, 02 Mar 2020 16:23:33 GMT
270- Server: Apache
271- Link: <http://www.reciclaccion.cl/wp-json/>; rel="https://api.w.org/"
272- Set-Cookie: apbct_timestamp=1583166213; path=/; domain=www.reciclaccion.cl; httponly, apbct_site_landing_ts=1583166213; path=/; domain=www.reciclaccion.cl; httponly, apbct_page_hits=1; path=/; domain=www.reciclaccion.cl; httponly, apbct_cookies_test=%257B%2522cookies_names%2522%253A%255B%2522apbct_timestamp%2522%252C%2522apbct_site_landing_ts%2522%252C%2522apbct_page_hits%2522%255D%252C%2522check_value%2522%253A%25228dc5275653453eb0f3452cd1fad2a449%2522%257D; path=/; domain=www.reciclaccion.cl; httponly, ct_sfw_pass_key=efea61177e6ab9585b469da6c6f7e842; expires=Wed, 01-Apr-2020 16:23:33 GMT; Max-Age=2592000; path=/; domain=www.reciclaccion.cl
273- Strict-Transport-Security: max-age=63072000; includeSubdomains;
274- Upgrade: h2,h2c
275- Connection: Upgrade, Keep-Alive
276- Cache-Control: max-age=0, public
277- Expires: Mon, 02 Mar 2020 16:23:33 GMT
278- Vary: Accept-Encoding
279- Content-Encoding: gzip
280- Keep-Alive: timeout=2, max=1000
281- Transfer-Encoding: chunked
282- Content-Type: text/html; charset=UTF-8
283--------------------------------------------------
284[#] Finding Location..!
285[#] status: success
286[#] country: Chile
287[#] countryCode: CL
288[#] region: ML
289[#] regionName: Maule Region
290[#] city: Curicó
291[#] zip:
292[#] lat: -34.9839
293[#] lon: -71.2425
294[#] timezone: America/Santiago
295[#] isp: ZAM LTDA.
296[#] org: ZAM LTDA.
297[#] as: AS52368 ZAM LTDA.
298[#] query: 186.64.118.40
299--------------------------------------------------
300[x] Didn't Detect WAF Presence on: http://www.reciclaccion.cl/
301--------------------------------------------------
302[#] Starting Reverse DNS
303[-] Failed ! Fail
304--------------------------------------------------
305[!] Scanning Open Port
306[#] 21/tcp open ftp
307[#] 25/tcp open smtp
308[#] 80/tcp open http
309[#] 110/tcp open pop3
310[#] 143/tcp open imap
311[#] 443/tcp open https
312[#] 465/tcp open smtps
313[#] 587/tcp open submission
314[#] 993/tcp open imaps
315[#] 995/tcp open pop3s
316--------------------------------------------------
317[+] Getting SSL Info
318{'OCSP': ('http://ocsp.int-x3.letsencrypt.org',),
319 'caIssuers': ('http://cert.int-x3.letsencrypt.org/',),
320 'issuer': ((('countryName', 'US'),),
321 (('organizationName', "Let's Encrypt"),),
322 (('commonName', "Let's Encrypt Authority X3"),)),
323 'notAfter': 'May 13 09:48:49 2020 GMT',
324 'notBefore': 'Feb 13 09:48:49 2020 GMT',
325 'serialNumber': '04213A0A7DF42D370FF7449100FB35770829',
326 'subject': ((('commonName', 'reciclaccion.cl'),),),
327 'subjectAltName': (('DNS', 'autodiscover.reciclaccion.cl'),
328 ('DNS', 'cpanel.reciclaccion.cl'),
329 ('DNS', 'mail.reciclaccion.cl'),
330 ('DNS', 'reciclaccion.cl'),
331 ('DNS', 'webdisk.reciclaccion.cl'),
332 ('DNS', 'webmail.reciclaccion.cl'),
333 ('DNS', 'www.reciclaccion.cl')),
334 'version': 3}
335-----BEGIN CERTIFICATE-----
336MIIG2TCCBcGgAwIBAgIQNBCG9k3JNE7gYwoDMGtR0DANBgkqhkiG9w0BAQsFADCB
337kDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G
338A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxNjA0BgNV
339BAMTLUNPTU9ETyBSU0EgRG9tYWluIFZhbGlkYXRpb24gU2VjdXJlIFNlcnZlciBD
340QTAeFw0xODA4MDgwMDAwMDBaFw0yMDA4MDcyMzU5NTlaMF0xITAfBgNVBAsTGERv
341bWFpbiBDb250cm9sIFZhbGlkYXRlZDEdMBsGA1UECxMUUG9zaXRpdmVTU0wgV2ls
342ZGNhcmQxGTAXBgNVBAMMECouZG5zbWlzaXRpby5uZXQwggEiMA0GCSqGSIb3DQEB
343AQUAA4IBDwAwggEKAoIBAQC9o/Jvoe4LrO24tkvAy1HGnVUEDgcSM7I3Gu4ii8WM
344ENCziLJeHRj4BMLuzoF9nSbdhhQyJVltJzW2CKt87S0NqG78nZZiidyHP3rMpLgP
345M/urunis5z10c0g9/BBMbeKL8G1UZF/Qyx1uZkqlq+8omokb3lft433YU3lL89d/
346oAny0pSlM7DJq6tRSYnls7yYUDPS/iMAHX4dWLwzbNJxaSE4g1nK0lJVft+dTrlY
347XYeamMiwG3J5d5zCVPXfohopaqynAD9b63JaSpLcWx9LhT0XrfFUtsiYPDh+2wAw
3488SwbRyVR9uLjnjWyTdQLWyY+K6PY0m51BTn4KRr/H/oDAgMBAAGjggNfMIIDWzAf
349BgNVHSMEGDAWgBSQr2o6lFoL2JDqElZz30O0Oija5zAdBgNVHQ4EFgQUVHl+Js0g
3500suuWjiZnfX+BjEtOy4wDgYDVR0PAQH/BAQDAgWgMAwGA1UdEwEB/wQCMAAwHQYD
351VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCME8GA1UdIARIMEYwOgYLKwYBBAGy
352MQECAgcwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLmNvbS9D
353UFMwCAYGZ4EMAQIBMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly9jcmwuY29tb2Rv
354Y2EuY29tL0NPTU9ET1JTQURvbWFpblZhbGlkYXRpb25TZWN1cmVTZXJ2ZXJDQS5j
355cmwwgYUGCCsGAQUFBwEBBHkwdzBPBggrBgEFBQcwAoZDaHR0cDovL2NydC5jb21v
356ZG9jYS5jb20vQ09NT0RPUlNBRG9tYWluVmFsaWRhdGlvblNlY3VyZVNlcnZlckNB
357LmNydDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuY29tb2RvY2EuY29tMCsGA1Ud
358EQQkMCKCECouZG5zbWlzaXRpby5uZXSCDmRuc21pc2l0aW8ubmV0MIIBfgYKKwYB
359BAHWeQIEAgSCAW4EggFqAWgAdQDuS723dc5guuFCaR+r4Z5mow9+X7By2IMAxHuJ
360eqj9ywAAAWUaDuyjAAAEAwBGMEQCIEcEqNM5gVR3fVlhk0wJPEwbM/MZ8AZ9kRxY
361Z7ahN47QAiAorU1Oi8FNaUNG11PBxFmEWmaVPWno7XeM2Xh+6+sUrQB2AF6nc/nf
362VsDntTZIfdBJ4DJ6kZoMhKESEoQYdZaBcUVYAAABZRoO7OQAAAQDAEcwRQIhAJ6s
363GhVJ3F6YG37kxAVgwpsc9JUuvQkIGCd+DGvOSPfzAiBJi6l8nkJObAGrxMH8Ti6T
364XymMLL996JJf8ufj8ADkygB3AFWB1MIWkDYBSuoLm1c8U/DA5Dh4cCUIFy+jqh0H
365E9MMAAABZRoO7MkAAAQDAEgwRgIhAKcGU43JxYlI1SVKpA5y7yNrQ5EYlXjfd4QI
366gTZZAPteAiEAnYuRxDcGs5/p7QSccXEMvcMfea/4Fz/FYwh0O/teGKYwDQYJKoZI
367hvcNAQELBQADggEBAHj3hYN4WySpbl0TmlgU+P6LlRxN5Rpv42H6pW1ihT21Lfo0
3688LcpIQllN2YoNbpK6LKyDR82bknUQR+nmBY3DhS1i9vVdNYDDix83nYNQCvXvOsw
369SkT+WAyVEgCBFTbkQ/nhG2dy5QdyK8dtuGUADABWG2N7k7MuJigrkmTXRAite0/a
370Cm+JvVWNUIfhX6WGnuAxfVLsM0MLzRnVldXqBcdFhnT/Dg4KiU5R+lSys5haemK+
371PtJAfpIfNt7asoNOGsxWbupiiGwE9De5sGnzvsiB2bLOnz56Mz5Ud4s+g7JGK17y
372OuLboyrA+vqbhbrMAdt2Ognp6ODh6bpQ5OQcCuo=
373-----END CERTIFICATE-----
374
375--------------------------------------------------
376[+] Collecting Information Disclosure!
377[#] Detecting sitemap.xml file
378[!] sitemap.xml File Found: http://www.reciclaccion.cl/sitemap_index.xml
379[#] Detecting robots.txt file
380[!] robots.txt File Found: http://www.reciclaccion.cl//robots.txt
381[#] Detecting GNU Mailman
382[!] GNU Mailman App Detected: http://www.reciclaccion.cl//mailman/admin
383[!] version: 2.1.29
384--------------------------------------------------
385[+] Crawling Url Parameter On: http://www.reciclaccion.cl/
386--------------------------------------------------
387[#] Searching Html Form !
388[+] Html Form Discovered
389[#] action: None
390[#] class: ['mc4wp-form', 'mc4wp-form-1927']
391[#] id: mc4wp-form-1
392[#] method: post
393--------------------------------------------------
394[!] Found 2 dom parameter
395[#] http://www.reciclaccion.cl//#content
396[#] http://www.reciclaccion.cl//#
397--------------------------------------------------
398[!] 19 Internal Dynamic Parameter Discovered
399[+] http://www.reciclaccion.cl/xmlrpc.php?rsd
400[+] https://www.addtoany.com/add_to/facebook?linkurl=http%3A%2F%2Fwww.reciclaccion.cl%2Fnoticias%2Fformas-para-reproducir-arboles-y-plantas%2F&linkname=Formas%20para%20reproducir%20%C3%A1rboles%20y%20plantas
401[+] https://www.addtoany.com/add_to/twitter?linkurl=http%3A%2F%2Fwww.reciclaccion.cl%2Fnoticias%2Fformas-para-reproducir-arboles-y-plantas%2F&linkname=Formas%20para%20reproducir%20%C3%A1rboles%20y%20plantas
402[+] https://www.addtoany.com/add_to/email?linkurl=http%3A%2F%2Fwww.reciclaccion.cl%2Fnoticias%2Fformas-para-reproducir-arboles-y-plantas%2F&linkname=Formas%20para%20reproducir%20%C3%A1rboles%20y%20plantas
403[+] https://www.addtoany.com/add_to/facebook?linkurl=http%3A%2F%2Fwww.reciclaccion.cl%2Fnoticias%2Fpasiflora-una-planta-para-un-mejor-sueno%2F&linkname=Pasiflora%20una%20planta%20para%20un%20mejor%20sue%C3%B1o
404[+] https://www.addtoany.com/add_to/twitter?linkurl=http%3A%2F%2Fwww.reciclaccion.cl%2Fnoticias%2Fpasiflora-una-planta-para-un-mejor-sueno%2F&linkname=Pasiflora%20una%20planta%20para%20un%20mejor%20sue%C3%B1o
405[+] https://www.addtoany.com/add_to/email?linkurl=http%3A%2F%2Fwww.reciclaccion.cl%2Fnoticias%2Fpasiflora-una-planta-para-un-mejor-sueno%2F&linkname=Pasiflora%20una%20planta%20para%20un%20mejor%20sue%C3%B1o
406[+] https://www.addtoany.com/add_to/facebook?linkurl=http%3A%2F%2Fwww.reciclaccion.cl%2Fnoticias%2Fekuwun-el-nuevo-reciclador-para-la-region-de-los-lagos%2F&linkname=Ekuw%C3%BCn%20el%20nuevo%20reciclador%20para%20la%20Regi%C3%B3n%20de%20los%20Lagos
407[+] https://www.addtoany.com/add_to/twitter?linkurl=http%3A%2F%2Fwww.reciclaccion.cl%2Fnoticias%2Fekuwun-el-nuevo-reciclador-para-la-region-de-los-lagos%2F&linkname=Ekuw%C3%BCn%20el%20nuevo%20reciclador%20para%20la%20Regi%C3%B3n%20de%20los%20Lagos
408[+] https://www.addtoany.com/add_to/email?linkurl=http%3A%2F%2Fwww.reciclaccion.cl%2Fnoticias%2Fekuwun-el-nuevo-reciclador-para-la-region-de-los-lagos%2F&linkname=Ekuw%C3%BCn%20el%20nuevo%20reciclador%20para%20la%20Regi%C3%B3n%20de%20los%20Lagos
409[+] https://www.addtoany.com/add_to/facebook?linkurl=http%3A%2F%2Fwww.reciclaccion.cl%2Fnoticias%2Freutiliza-las-cajas-de-huevos%2F&linkname=Reutiliza%20las%20cajas%20de%20huevos
410[+] https://www.addtoany.com/add_to/twitter?linkurl=http%3A%2F%2Fwww.reciclaccion.cl%2Fnoticias%2Freutiliza-las-cajas-de-huevos%2F&linkname=Reutiliza%20las%20cajas%20de%20huevos
411[+] https://www.addtoany.com/add_to/email?linkurl=http%3A%2F%2Fwww.reciclaccion.cl%2Fnoticias%2Freutiliza-las-cajas-de-huevos%2F&linkname=Reutiliza%20las%20cajas%20de%20huevos
412[+] https://www.addtoany.com/add_to/facebook?linkurl=http%3A%2F%2Fwww.reciclaccion.cl%2Fnoticias%2Fdi-no-a-las-bombillas-plasticas%2F&linkname=Di%20%C2%ABNO%C2%BB%20a%20las%20bombillas%20pl%C3%A1sticas
413[+] https://www.addtoany.com/add_to/twitter?linkurl=http%3A%2F%2Fwww.reciclaccion.cl%2Fnoticias%2Fdi-no-a-las-bombillas-plasticas%2F&linkname=Di%20%C2%ABNO%C2%BB%20a%20las%20bombillas%20pl%C3%A1sticas
414[+] https://www.addtoany.com/add_to/email?linkurl=http%3A%2F%2Fwww.reciclaccion.cl%2Fnoticias%2Fdi-no-a-las-bombillas-plasticas%2F&linkname=Di%20%C2%ABNO%C2%BB%20a%20las%20bombillas%20pl%C3%A1sticas
415[+] https://www.addtoany.com/add_to/facebook?linkurl=http%3A%2F%2Fwww.reciclaccion.cl%2Fnoticias%2Fmetodos-para-potabilizar-el-agua%2F&linkname=M%C3%A9todos%20para%20potabilizar%20el%20agua
416[+] https://www.addtoany.com/add_to/twitter?linkurl=http%3A%2F%2Fwww.reciclaccion.cl%2Fnoticias%2Fmetodos-para-potabilizar-el-agua%2F&linkname=M%C3%A9todos%20para%20potabilizar%20el%20agua
417[+] https://www.addtoany.com/add_to/email?linkurl=http%3A%2F%2Fwww.reciclaccion.cl%2Fnoticias%2Fmetodos-para-potabilizar-el-agua%2F&linkname=M%C3%A9todos%20para%20potabilizar%20el%20agua
418--------------------------------------------------
419[-] No external Dynamic Paramter Found!?
420--------------------------------------------------
421[!] 140 Internal links Discovered
422[+] http://www.reciclaccion.cl/xmlrpc.php
423[+] http://www.reciclaccion.cl/wp-content/uploads/2016/08/cropped-logo-horizontal-01.png
424[+] http://www.reciclaccion.cl/wp-content/cache/autoptimize/css/autoptimize_023e7229fa9aad6f4bebb40fbe542529.css
425[+] http://www.reciclaccion.cl/
426[+] http://www.reciclaccion.cl/page/2/
427[+] http://www.reciclaccion.cl/feed/
428[+] http://www.reciclaccion.cl/comments/feed/
429[+] http://www.reciclaccion.cl/wp-includes/wlwmanifest.xml
430[+] http://www.reciclaccion.cl/wp-content/plugins/js_composer/assets/css/vc_lte_ie9.min.css
431[+] http://www.reciclaccion.cl/wp-content/uploads/2016/07/cropped-logo_recicla-1-32x32.png
432[+] http://www.reciclaccion.cl/wp-content/uploads/2016/07/cropped-logo_recicla-1-192x192.png
433[+] http://www.reciclaccion.cl/wp-content/uploads/2016/07/cropped-logo_recicla-1-180x180.png
434[+] http://www.reciclaccion.cl/noticias/formas-para-reproducir-arboles-y-plantas/
435[+] http://www.reciclaccion.cl/noticias/pasiflora-una-planta-para-un-mejor-sueno/
436[+] http://www.reciclaccion.cl/noticias/ekuwun-el-nuevo-reciclador-para-la-region-de-los-lagos/
437[+] http://www.reciclaccion.cl/noticias/reutiliza-las-cajas-de-huevos/
438[+] http://www.reciclaccion.cl/noticias/di-no-a-las-bombillas-plasticas/
439[+] http://www.reciclaccion.cl/noticias/metodos-para-potabilizar-el-agua/
440[+] http://www.reciclaccion.cl/noticias/regalar-comprar-o-llevar-la-propia-bolsa-para-las-compras/
441[+] http://www.reciclaccion.cl/noticias/automovil-electrico-que-tan-amigable-es-para-el-planeta/
442[+] http://www.reciclaccion.cl/noticias/freemet-te-ayuda-a-ser-mas-amigable-con-el-planeta/
443[+] http://www.reciclaccion.cl/noticias/bambu-un-recurso-ecologico-y-sustentable/
444[+] http://www.reciclaccion.cl/
445[+] http://www.reciclaccion.cl/quienes-somos/
446[+] http://www.reciclaccion.cl/preguntas-frecuentes/sabias-que/
447[+] http://www.reciclaccion.cl/./hagalo-usted-mismo/
448[+] http://www.reciclaccion.cl/mundo-reciclaje/quien-se-beneficia/
449[+] http://www.reciclaccion.cl/preguntas-frecuentes/instituciones-que-reciclan/
450[+] http://www.reciclaccion.cl/puntos-limpios/
451[+] http://www.reciclaccion.cl/cuidado-del-medioambiente/
452[+] http://www.reciclaccion.cl/calendario-medioambiental/
453[+] http://www.reciclaccion.cl/siempre-es-bueno-saber-de-ti/
454[+] http://www.reciclaccion.cl/noticias/formas-para-reproducir-arboles-y-plantas/
455[+] http://www.reciclaccion.cl/noticias/formas-para-reproducir-arboles-y-plantas/
456[+] http://www.reciclaccion.cl/noticias/pasiflora-una-planta-para-un-mejor-sueno/
457[+] http://www.reciclaccion.cl/noticias/pasiflora-una-planta-para-un-mejor-sueno/
458[+] http://www.reciclaccion.cl/noticias/ekuwun-el-nuevo-reciclador-para-la-region-de-los-lagos/
459[+] http://www.reciclaccion.cl/noticias/ekuwun-el-nuevo-reciclador-para-la-region-de-los-lagos/
460[+] http://www.reciclaccion.cl/noticias/reutiliza-las-cajas-de-huevos/
461[+] http://www.reciclaccion.cl/noticias/reutiliza-las-cajas-de-huevos/
462[+] http://www.reciclaccion.cl/noticias/di-no-a-las-bombillas-plasticas/
463[+] http://www.reciclaccion.cl/noticias/di-no-a-las-bombillas-plasticas/
464[+] http://www.reciclaccion.cl/noticias/metodos-para-potabilizar-el-agua/
465[+] http://www.reciclaccion.cl/noticias/metodos-para-potabilizar-el-agua/
466[+] http://www.reciclaccion.cl/page/2/
467[+] http://www.reciclaccion.cl/agua/
468[+] http://www.reciclaccion.cl/ahorro-energetico/
469[+] http://www.reciclaccion.cl/aire/
470[+] http://www.reciclaccion.cl/alimentos/
471[+] http://www.reciclaccion.cl/app/
472[+] http://www.reciclaccion.cl/basura/
473[+] http://www.reciclaccion.cl/bolsas-plasticas/
474[+] http://www.reciclaccion.cl/botellas-de-vidrio/
475[+] http://www.reciclaccion.cl/botellas-plasticas/
476[+] http://www.reciclaccion.cl/calentamiento-global/
477[+] http://www.reciclaccion.cl/cartones/
478[+] http://www.reciclaccion.cl/cartridges/
479[+] http://www.reciclaccion.cl/compost/
480[+] http://www.reciclaccion.cl/contaminacion-2/
481[+] http://www.reciclaccion.cl/diarios/
482[+] http://www.reciclaccion.cl/diy-hagalo-usted-mismo/
483[+] http://www.reciclaccion.cl/energia/
484[+] http://www.reciclaccion.cl/envases/
485[+] http://www.reciclaccion.cl/ewaste/
486[+] http://www.reciclaccion.cl/latas/
487[+] http://www.reciclaccion.cl/macetero/
488[+] http://www.reciclaccion.cl/medio-ambiente/
489[+] http://www.reciclaccion.cl/metal/
490[+] http://www.reciclaccion.cl/naturaleza/
491[+] http://www.reciclaccion.cl/neumaticos/
492[+] http://www.reciclaccion.cl/papeles/
493[+] http://www.reciclaccion.cl/pet/
494[+] http://www.reciclaccion.cl/pilas/
495[+] http://www.reciclaccion.cl/plantas/
496[+] http://www.reciclaccion.cl/plumavit/
497[+] http://www.reciclaccion.cl/plasticos/
498[+] http://www.reciclaccion.cl/reciclaje/
499[+] http://www.reciclaccion.cl/reciclar/
500[+] http://www.reciclaccion.cl/reducir/
501[+] http://www.reciclaccion.cl/residuos/
502[+] http://www.reciclaccion.cl/residuos-cocina/
503[+] http://www.reciclaccion.cl/residuos-organicos/
504[+] http://www.reciclaccion.cl/reutilizar/
505[+] http://www.reciclaccion.cl/salud/
506[+] http://www.reciclaccion.cl/sustentabilidad/
507[+] http://www.reciclaccion.cl/tapitas-plasticas/
508[+] http://www.reciclaccion.cl/tierra-de-hoja/
509[+] http://www.reciclaccion.cl/tonners/
510[+] http://www.reciclaccion.cl/vidrios/
511[+] http://www.reciclaccion.cl/arbol/
512[+] http://www.reciclaccion.cl/noticias/formas-para-reproducir-arboles-y-plantas/
513[+] http://www.reciclaccion.cl/noticias/pasiflora-una-planta-para-un-mejor-sueno/
514[+] http://www.reciclaccion.cl/noticias/ekuwun-el-nuevo-reciclador-para-la-region-de-los-lagos/
515[+] http://www.reciclaccion.cl/noticias/reutiliza-las-cajas-de-huevos/
516[+] http://www.reciclaccion.cl/noticias/di-no-a-las-bombillas-plasticas/
517[+] http://www.reciclaccion.cl/agua/
518[+] http://www.reciclaccion.cl/ahorro-energetico/
519[+] http://www.reciclaccion.cl/aire/
520[+] http://www.reciclaccion.cl/alimentos/
521[+] http://www.reciclaccion.cl/app/
522[+] http://www.reciclaccion.cl/basura/
523[+] http://www.reciclaccion.cl/bolsas-plasticas/
524[+] http://www.reciclaccion.cl/botellas-de-vidrio/
525[+] http://www.reciclaccion.cl/botellas-plasticas/
526[+] http://www.reciclaccion.cl/calentamiento-global/
527[+] http://www.reciclaccion.cl/cartones/
528[+] http://www.reciclaccion.cl/cartridges/
529[+] http://www.reciclaccion.cl/compost/
530[+] http://www.reciclaccion.cl/contaminacion-2/
531[+] http://www.reciclaccion.cl/diarios/
532[+] http://www.reciclaccion.cl/diy-hagalo-usted-mismo/
533[+] http://www.reciclaccion.cl/energia/
534[+] http://www.reciclaccion.cl/envases/
535[+] http://www.reciclaccion.cl/ewaste/
536[+] http://www.reciclaccion.cl/latas/
537[+] http://www.reciclaccion.cl/macetero/
538[+] http://www.reciclaccion.cl/medio-ambiente/
539[+] http://www.reciclaccion.cl/metal/
540[+] http://www.reciclaccion.cl/naturaleza/
541[+] http://www.reciclaccion.cl/neumaticos/
542[+] http://www.reciclaccion.cl/papeles/
543[+] http://www.reciclaccion.cl/pet/
544[+] http://www.reciclaccion.cl/pilas/
545[+] http://www.reciclaccion.cl/plantas/
546[+] http://www.reciclaccion.cl/plumavit/
547[+] http://www.reciclaccion.cl/plasticos/
548[+] http://www.reciclaccion.cl/reciclaje/
549[+] http://www.reciclaccion.cl/reciclar/
550[+] http://www.reciclaccion.cl/reducir/
551[+] http://www.reciclaccion.cl/residuos/
552[+] http://www.reciclaccion.cl/residuos-cocina/
553[+] http://www.reciclaccion.cl/residuos-organicos/
554[+] http://www.reciclaccion.cl/reutilizar/
555[+] http://www.reciclaccion.cl/salud/
556[+] http://www.reciclaccion.cl/sustentabilidad/
557[+] http://www.reciclaccion.cl/tapitas-plasticas/
558[+] http://www.reciclaccion.cl/tierra-de-hoja/
559[+] http://www.reciclaccion.cl/tonners/
560[+] http://www.reciclaccion.cl/vidrios/
561[+] http://www.reciclaccion.cl/arbol/
562--------------------------------------------------
563[!] 15 External links Discovered
564[#] http://gmpg.org/xfn/11
565[#] https://www.addtoany.com/share
566[#] https://www.addtoany.com/share
567[#] https://www.addtoany.com/share
568[#] https://www.addtoany.com/share
569[#] https://www.addtoany.com/share
570[#] https://www.addtoany.com/share
571[#] https://www.facebook.com/Reciclaccion
572[#] https://twitter.com/reciclaccion
573[#] http://www.instagram.com/reciclaccion/
574[#] https://www.pinterest.cl/reciclaccion/
575[#] https://www.facebook.com/Reciclaccion
576[#] https://twitter.com/reciclaccion
577[#] http://www.instagram.com/reciclaccion/
578[#] https://www.pinterest.cl/reciclaccion/
579--------------------------------------------------
580[#] Mapping Subdomain..
581[!] Found 5 Subdomain
582- webdisk.reciclaccion.cl
583- cpanel.reciclaccion.cl
584- mail.reciclaccion.cl
585- webmail.reciclaccion.cl
586- autodiscover.reciclaccion.cl
587--------------------------------------------------
588[!] Done At 2020-03-02 11:24:23.434445
589#####################################################################################################################################
590rying "reciclaccion.cl"
591;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38167
592;; flags: qr rd ra; QUERY: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 3
593
594;; QUESTION SECTION:
595;reciclaccion.cl. IN ANY
596
597;; ANSWER SECTION:
598reciclaccion.cl. 14400 IN MX 0 mail.reciclaccion.cl.
599reciclaccion.cl. 14400 IN A 186.64.118.40
600reciclaccion.cl. 43200 IN SOA ns1.dnsmisitio.net. notificaciones_whm.haulmer.net. 2020021301 3600 7200 1209600 86400
601reciclaccion.cl. 14400 IN TXT "v=spf1 ip4:186.64.118.40 +a +mx +ip4:186.64.114.5 +ip4:186.64.114.6 +ip4:186.64.114.7 ~all"
602reciclaccion.cl. 2696 IN NS ns3.dnsmisitio.net.
603reciclaccion.cl. 2696 IN NS ns1.dnsmisitio.net.
604reciclaccion.cl. 2696 IN NS ns2.dnsmisitio.net.
605
606;; ADDITIONAL SECTION:
607ns2.dnsmisitio.net. 32529 IN A 45.79.214.161
608ns1.dnsmisitio.net. 32529 IN A 186.64.112.73
609ns3.dnsmisitio.net. 32529 IN A 144.217.14.213
610
611Received 352 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 42 ms
612####################################################################################################################################
613; <<>> DiG 9.11.16-2-Debian <<>> +trace reciclaccion.cl any
614;; global options: +cmd
615. 8404 IN NS e.root-servers.net.
616. 8404 IN NS c.root-servers.net.
617. 8404 IN NS k.root-servers.net.
618. 8404 IN NS i.root-servers.net.
619. 8404 IN NS d.root-servers.net.
620. 8404 IN NS f.root-servers.net.
621. 8404 IN NS b.root-servers.net.
622. 8404 IN NS g.root-servers.net.
623. 8404 IN NS a.root-servers.net.
624. 8404 IN NS m.root-servers.net.
625. 8404 IN NS l.root-servers.net.
626. 8404 IN NS j.root-servers.net.
627. 8404 IN NS h.root-servers.net.
628. 8404 IN RRSIG NS 8 0 518400 20200315050000 20200302040000 33853 . WY2XH1mx0qJdgLPqqJsOrKLKZkq+UTgHnjYvvqDL5h0P45QRA5EtbMeu xYcvz6yJG+0ymJHxA42xE6VzE2qPzJXhJoivrNom2WpvTzSfvbjmLdom Uyy6bnRMuJPkNed9N+NAadwwRP8r+lLE1fhpM/pglUW9oYNC3wVEH/7m QteblRJ0aNBngoTveaMPyNRisU10PjuI4JrcvCB87lj6bSQzVomSfw1O pazeO7C1z9yWxJnflVl1DbhbZBGo2vC4y386bfT59do1vTn69KHDOiMq Izfhcogs3IBk63S63geeBezwXFZgLHPXsOb7Pu7eIlylBUXfrVZ9CllY S7kP5A==
629;; Received 525 bytes from 10.101.0.243#53(10.101.0.243) in 391 ms
630
631cl. 172800 IN NS a.nic.cl.
632cl. 172800 IN NS b.nic.cl.
633cl. 172800 IN NS c.nic.cl.
634cl. 172800 IN NS cl1.dnsnode.net.
635cl. 172800 IN NS cl-ns.anycast.pch.net.
636cl. 172800 IN NS cl1-tld.d-zone.ca.
637cl. 172800 IN NS cl2-tld.d-zone.ca.
638cl. 86400 IN DS 21199 8 2 7D756DFFAB6D3CD9C786FF5C659954C22944FAEF9433EEE26F1D84EB 5370B394
639cl. 86400 IN RRSIG DS 8 1 86400 20200315050000 20200302040000 33853 . G0bZV3jJxEWAc7s5hDCUZltj1aBtpvUUda5C9R5Vd3y65GcPhGI7lnjH 4EX2cXoS0cf2QfQsTtklQCUQ8TTNlt07a6AwfNY6QzkDHjZadAowdcrX y5lRietI0UN7kaQWQPVV46SeEse52K+F02B7CcYx3EDLuecfbCLtRqav V1vZuJ9n6kkIQxOt1xi4FMdmBI6+Yu6ZA7ZTZF5eRySvo+eYwILa++ww z/NkcidZrn3w8WS3aTCS4MQhmoAZdQyfSIglLSygqinyzxC6mg8pq5uf tl/ADCCdojiHl9oRQa5f062Z9G3k12CKtGbmSj1Hws6ZmVekrROZW9TQ HQq01Q==
640;; Received 825 bytes from 2001:500:2d::d#53(d.root-servers.net) in 29 ms
641
642reciclaccion.cl. 3600 IN NS ns1.dnsmisitio.net.
643reciclaccion.cl. 3600 IN NS ns2.dnsmisitio.net.
644reciclaccion.cl. 3600 IN NS ns3.dnsmisitio.net.
645qpmshennmlkkd1kg1ncol4ogqf5g3gsi.cl. 900 IN NSEC3 1 1 2 05320594F252489EFF8BE62F4D5DCDDB QSOI55U8SQE4ONOK6MJS9UJ3NBDM1BB1 NS SOA TXT RRSIG DNSKEY NSEC3PARAM
646qpmshennmlkkd1kg1ncol4ogqf5g3gsi.cl. 900 IN RRSIG NSEC3 8 2 900 20200414230419 20200302150023 24384 cl. iPVr9FpqggIOQf2ppi9MZqka4ofloC+0U0SIXGYb9zWj8F54kW+qDxwF wVDBIZdck3v5ILiPAHn1hcnunQvun5RLh2weqwEmtw95H1JwqKirxAta cz0GeWIWFoeGF5Ld5KaRe744UX8ZHUAmo+LP1gD2GopnT+99GuDPkBI5 5JI=
647ech5d29usl62c0156ncl0bl4u1fjqq0h.cl. 900 IN NSEC3 1 1 2 05320594F252489EFF8BE62F4D5DCDDB EFHNA87AA3U90RGP1KP2HSKD1KBJ4LG4 NS DS RRSIG
648ech5d29usl62c0156ncl0bl4u1fjqq0h.cl. 900 IN RRSIG NSEC3 8 2 900 20200413144958 20200302150023 24384 cl. TEQrm81vqukrj7PckN3nDkUm9k9glIGt5cvl3XUhYOEGnI910gF4R2/+ fBk08qSt92B1VtdusvJ1iWtfGYNJ75vaxOKy+C/0n9dqPqj+B1ujXAYX 8mvnY6ENYImeT/nUEt16Q6YIFxpw8V/C80bPvFQQhy+/+kk1Gj74MP3b Sn8=
649;; Received 627 bytes from 200.7.4.7#53(b.nic.cl) in 361 ms
650
651reciclaccion.cl. 14400 IN TXT "v=spf1 ip4:186.64.118.40 +a +mx +ip4:186.64.114.5 +ip4:186.64.114.6 +ip4:186.64.114.7 ~all"
652reciclaccion.cl. 86400 IN SOA ns1.dnsmisitio.net. notificaciones_whm.haulmer.net. 2020021301 3600 7200 1209600 86400
653reciclaccion.cl. 86400 IN NS ns1.dnsmisitio.net.
654reciclaccion.cl. 86400 IN NS ns3.dnsmisitio.net.
655reciclaccion.cl. 86400 IN NS ns2.dnsmisitio.net.
656reciclaccion.cl. 14400 IN A 186.64.118.40
657reciclaccion.cl. 14400 IN MX 0 mail.reciclaccion.cl.
658;; Received 379 bytes from 186.64.112.73#53(ns1.dnsmisitio.net) in 485 ms
659####################################################################################################################################
660 AVAILABLE PLUGINS
661 -----------------
662
663 EarlyDataPlugin
664 HeartbleedPlugin
665 RobotPlugin
666 OpenSslCipherSuitesPlugin
667 OpenSslCcsInjectionPlugin
668 SessionResumptionPlugin
669 SessionRenegotiationPlugin
670 CertificateInfoPlugin
671 CompressionPlugin
672 FallbackScsvPlugin
673 HttpHeadersPlugin
674
675
676
677 CHECKING HOST(S) AVAILABILITY
678 -----------------------------
679
680 186.64.118.40:443 => 186.64.118.40
681
682
683
684
685 SCAN RESULTS FOR 186.64.118.40:443 - 186.64.118.40
686 --------------------------------------------------
687
688 * OpenSSL Heartbleed:
689 OK - Not vulnerable to Heartbleed
690
691 * TLSV1_3 Cipher Suites:
692 Forward Secrecy OK - Supported
693 RC4 OK - Not Supported
694
695 Preferred:
696 TLS_AES_256_GCM_SHA384 256 bits HTTP 200 OK
697 Accepted:
698 TLS_CHACHA20_POLY1305_SHA256 256 bits HTTP 200 OK
699 TLS_AES_256_GCM_SHA384 256 bits HTTP 200 OK
700 TLS_AES_128_GCM_SHA256 128 bits HTTP 200 OK
701
702 * Certificate Information:
703 Content
704 SHA1 Fingerprint: 3ceb21dda396e1b5d07f4504a12375c935bf89e0
705 Common Name: *.dnsmisitio.net
706 Issuer: COMODO RSA Domain Validation Secure Server CA
707 Serial Number: 69205669887640637329976347842153501136
708 Not Before: 2018-08-08 00:00:00
709 Not After: 2020-08-07 23:59:59
710 Signature Algorithm: sha256
711 Public Key Algorithm: RSA
712 Key Size: 2048
713 Exponent: 65537 (0x10001)
714 DNS Subject Alternative Names: ['*.dnsmisitio.net', 'dnsmisitio.net']
715
716 Trust
717 Hostname Validation: FAILED - Certificate does NOT match 186.64.118.40
718 Android CA Store (9.0.0_r9): OK - Certificate is trusted
719 Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):OK - Certificate is trusted
720 Java CA Store (jdk-12.0.1): OK - Certificate is trusted
721 Mozilla CA Store (2019-03-14): OK - Certificate is trusted
722 Windows CA Store (2019-05-27): OK - Certificate is trusted
723 Symantec 2018 Deprecation: WARNING: Certificate distrusted by Google and Mozilla on September 2018
724 Received Chain: *.dnsmisitio.net --> COMODO RSA Domain Validation Secure Server CA --> COMODO RSA Certification Authority
725 Verified Chain: *.dnsmisitio.net --> COMODO RSA Domain Validation Secure Server CA --> COMODO RSA Certification Authority
726 Received Chain Contains Anchor: OK - Anchor certificate not sent
727 Received Chain Order: OK - Order is valid
728 Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
729
730 Extensions
731 OCSP Must-Staple: NOT SUPPORTED - Extension not found
732 Certificate Transparency: OK - 3 SCTs included
733
734 OCSP Stapling
735 OCSP Response Status: successful
736 Validation w/ Mozilla Store: OK - Response is trusted
737 Responder Id: 90AF6A3A945A0BD890EA125673DF43B43A28DAE7
738 Cert Status: good
739 Cert Serial Number: 341086F64DC9344EE0630A03306B51D0
740 This Update: Feb 28 22:16:51 2020 GMT
741 Next Update: Mar 6 22:16:51 2020 GMT
742
743 * OpenSSL CCS Injection:
744 OK - Not vulnerable to OpenSSL CCS injection
745
746 * TLSV1_1 Cipher Suites:
747 Forward Secrecy OK - Supported
748 RC4 OK - Not Supported
749
750 Preferred:
751 None - Server followed client cipher suite preference.
752 Accepted:
753 TLS_RSA_WITH_SEED_CBC_SHA 128 bits HTTP 200 OK
754 TLS_RSA_WITH_IDEA_CBC_SHA 128 bits HTTP 200 OK
755 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
756 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
757 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
758 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
759 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
760 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
761 TLS_DHE_RSA_WITH_SEED_CBC_SHA 128 bits HTTP 200 OK
762 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
763 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
764 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
765 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
766
767 * TLS 1.2 Session Resumption Support:
768 With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
769 With TLS Tickets: OK - Supported
770
771 * TLSV1_2 Cipher Suites:
772 Forward Secrecy OK - Supported
773 RC4 OK - Not Supported
774
775 Preferred:
776 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
777 Accepted:
778 TLS_RSA_WITH_SEED_CBC_SHA 128 bits HTTP 200 OK
779 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 256 bits HTTP 200 OK
780 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
781 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 128 bits HTTP 200 OK
782 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
783 TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
784 TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
785 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
786 TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
787 TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
788 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
789 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 256 bits HTTP 200 OK
790 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 256 bits HTTP 200 OK
791 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 128 bits HTTP 200 OK
792 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
793 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 200 OK
794 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
795 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
796 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
797 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
798 TLS_DHE_RSA_WITH_SEED_CBC_SHA 128 bits HTTP 200 OK
799 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 256 bits HTTP 200 OK
800 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 256 bits HTTP 200 OK
801 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
802 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 128 bits HTTP 200 OK
803 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
804 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
805 TLS_DHE_RSA_WITH_AES_256_CCM 256 bits HTTP 200 OK
806 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
807 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
808 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
809 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
810 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
811 RSA_WITH_AES_256_CCM_8 256 bits HTTP 200 OK
812 RSA_WITH_AES_256_CCM 256 bits HTTP 200 OK
813 RSA_WITH_AES_128_CCM_8 128 bits HTTP 200 OK
814 RSA_WITH_AES_128_CCM 128 bits HTTP 200 OK
815 ECDHE-ARIA256-GCM-SHA384 256 bits HTTP 200 OK
816 ECDHE-ARIA128-GCM-SHA256 128 bits HTTP 200 OK
817 DHE_RSA_WITH_AES_256_CCM_8 256 bits HTTP 200 OK
818 DHE_RSA_WITH_AES_128_CCM_8 128 bits HTTP 200 OK
819 DHE_RSA_WITH_AES_128_CCM 128 bits HTTP 200 OK
820 DHE-RSA-ARIA256-GCM-SHA384 256 bits HTTP 200 OK
821 DHE-RSA-ARIA128-GCM-SHA256 128 bits HTTP 200 OK
822 ARIA256-GCM-SHA384 256 bits HTTP 200 OK
823 ARIA128-GCM-SHA256 128 bits HTTP 200 OK
824
825 * TLSV1 Cipher Suites:
826 Forward Secrecy OK - Supported
827 RC4 OK - Not Supported
828
829 Preferred:
830 None - Server followed client cipher suite preference.
831 Accepted:
832 TLS_RSA_WITH_SEED_CBC_SHA 128 bits HTTP 200 OK
833 TLS_RSA_WITH_IDEA_CBC_SHA 128 bits HTTP 200 OK
834 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
835 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
836 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
837 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
838 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
839 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
840 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
841 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
842 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
843 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
844 Undefined - An unexpected error happened:
845 TLS_DHE_RSA_WITH_SEED_CBC_SHA timeout - timed out
846
847 * Session Renegotiation:
848 Client-initiated Renegotiation: OK - Rejected
849 Secure Renegotiation: OK - Supported
850
851 * Deflate Compression:
852 OK - Compression disabled
853
854 * Downgrade Attacks:
855 TLS_FALLBACK_SCSV: OK - Supported
856
857 * ROBOT Attack:
858 UNKNOWN - Received inconsistent results
859
860 * SSLV2 Cipher Suites:
861 Server rejected all cipher suites.
862
863 * SSLV3 Cipher Suites:
864 Server rejected all cipher suites.
865
866
867 SCAN COMPLETED IN 40.91 S
868 -------------------------
869####################################################################################################################################
870traceroute to www.reciclaccion.cl (186.64.118.40), 30 hops max, 60 byte packets
871 1 _gateway (10.202.7.1) 119.872 ms 278.500 ms 278.508 ms
872 2 unn-84-17-52-126.cdn77.com (84.17.52.126) 278.485 ms 278.467 ms 278.453 ms
873 3 5.56.20.161 (5.56.20.161) 278.429 ms 278.416 ms 278.396 ms
874 4 ae15-2029.fra30.core-backbone.com (81.95.15.70) 278.390 ms 278.316 ms 278.325 ms
875 5 * * *
876 6 * 190.211.161.121 (190.211.161.121) 372.358 ms 622.026 ms
877 7 190.211.161.122 (190.211.161.122) 622.012 ms 621.994 ms 461.922 ms
878 8 * * *
879 9 fw-101.haulmer.net (168.232.164.68) 621.825 ms 621.762 ms 621.766 ms
880####################################################################################################################################
881Domains still to check: 1
882 Checking if the hostname reciclaccion.cl. given is in fact a domain...
883
884Analyzing domain: reciclaccion.cl.
885 Checking NameServers using system default resolver...
886 IP: 45.79.214.161 (United States)
887 HostName: ns2.dnsmisitio.net Type: NS
888 HostName: serverdns2.dnsmisitio.net Type: PTR
889 IP: 186.64.112.73 (Chile)
890 HostName: ns1.dnsmisitio.net Type: NS
891 HostName: serverdns1.dnsmisitio.net Type: PTR
892 IP: 144.217.14.213 (Canada)
893 HostName: ns3.dnsmisitio.net Type: NS
894 HostName: serverdns3.dnsmisitio.net Type: PTR
895
896 Checking MailServers using system default resolver...
897 IP: 186.64.118.40 (Chile)
898 HostName: mail.reciclaccion.cl Type: MX
899 HostName: blue127.dnsmisitio.net Type: PTR
900
901 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
902 No zone transfer found on nameserver 186.64.112.73
903 No zone transfer found on nameserver 144.217.14.213
904 No zone transfer found on nameserver 45.79.214.161
905
906 Checking SPF record...
907 New IP found: 186.64.114.5
908 New IP found: 186.64.114.6
909 New IP found: 186.64.114.7
910
911 Checking 192 most common hostnames using system default resolver...
912 IP: 186.64.118.40 (Chile)
913 HostName: mail.reciclaccion.cl Type: MX
914 HostName: blue127.dnsmisitio.net Type: PTR
915 Type: SPF
916 HostName: www.reciclaccion.cl. Type: A
917 IP: 186.64.118.40 (Chile)
918 HostName: mail.reciclaccion.cl Type: MX
919 HostName: blue127.dnsmisitio.net Type: PTR
920 Type: SPF
921 HostName: www.reciclaccion.cl. Type: A
922 HostName: ftp.reciclaccion.cl. Type: A
923 IP: 186.64.118.40 (Chile)
924 HostName: mail.reciclaccion.cl Type: MX
925 HostName: blue127.dnsmisitio.net Type: PTR
926 Type: SPF
927 HostName: www.reciclaccion.cl. Type: A
928 HostName: ftp.reciclaccion.cl. Type: A
929 HostName: mail.reciclaccion.cl. Type: A
930 IP: 186.64.118.40 (Chile)
931 HostName: mail.reciclaccion.cl Type: MX
932 HostName: blue127.dnsmisitio.net Type: PTR
933 Type: SPF
934 HostName: www.reciclaccion.cl. Type: A
935 HostName: ftp.reciclaccion.cl. Type: A
936 HostName: mail.reciclaccion.cl. Type: A
937 HostName: webmail.reciclaccion.cl. Type: A
938
939 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
940 Checking netblock 186.64.112.0
941 Checking netblock 144.217.14.0
942 Checking netblock 45.79.214.0
943 Checking netblock 186.64.114.0
944 Checking netblock 186.64.118.0
945
946 Searching for reciclaccion.cl. emails in Google
947
948 Checking 7 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
949 Host 186.64.112.73 is up (echo-reply ttl 54)
950 Host 144.217.14.213 is up (echo-reply ttl 49)
951 Host 45.79.214.161 is up (echo-reply ttl 51)
952 Host 186.64.114.7 is down
953 Host 186.64.114.6 is down
954 Host 186.64.114.5 is down
955 Host 186.64.118.40 is up (echo-reply ttl 45)
956
957 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
958 Scanning ip 186.64.112.73 (serverdns1.dnsmisitio.net (PTR)):
959 53/tcp open domain syn-ack ttl 54 ISC BIND
960 Device type: general purpose|firewall|storage-misc|VoIP phone
961 Running (JUST GUESSING): Linux 2.6.X|3.X (91%), WatchGuard Fireware 11.X (91%), Synology DiskStation Manager 5.X (90%), Grandstream embedded (85%)
962 Scanning ip 144.217.14.213 (serverdns3.dnsmisitio.net (PTR)):
963 53/tcp open domain syn-ack ttl 49 ISC BIND
964 Device type: general purpose|storage-misc|firewall|VoIP phone
965 Running (JUST GUESSING): Linux 2.6.X|3.X (91%), Synology DiskStation Manager 5.X (90%), WatchGuard Fireware 11.X (89%), Grandstream embedded (85%)
966 Scanning ip 45.79.214.161 (serverdns2.dnsmisitio.net (PTR)):
967 53/tcp open domain syn-ack ttl 50 ISC BIND
968 Scanning ip 186.64.118.40 (webmail.reciclaccion.cl.):
969 21/tcp open ftp syn-ack ttl 45 Pure-FTPd
970 | ssl-cert: Subject: commonName=blue127.dnsmisitio.net
971 | Subject Alternative Name: DNS:blue127.dnsmisitio.net, DNS:www.blue127.dnsmisitio.net
972 | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
973 | Public Key type: rsa
974 | Public Key bits: 2048
975 | Signature Algorithm: sha256WithRSAEncryption
976 | Not valid before: 2019-11-20T00:00:00
977 | Not valid after: 2020-11-19T23:59:59
978 | MD5: 1218 e2a8 065a ac60 2523 57c8 c88a a373
979 |_SHA-1: c937 c36f 1d17 4036 1ce4 f249 96a7 4ade b1b8 1e65
980 25/tcp open smtp? syn-ack ttl 45
981 |_smtp-commands: Couldn't establish connection on port 25
982 110/tcp open pop3 syn-ack ttl 45 Dovecot pop3d
983 |_pop3-capabilities: RESP-CODES CAPA TOP SASL(PLAIN LOGIN) AUTH-RESP-CODE UIDL PIPELINING USER STLS
984 | ssl-cert: Subject: commonName=*.dnsmisitio.net
985 | Subject Alternative Name: DNS:*.dnsmisitio.net, DNS:dnsmisitio.net
986 | Issuer: commonName=COMODO RSA Domain Validation Secure Server CA/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
987 | Public Key type: rsa
988 | Public Key bits: 2048
989 | Signature Algorithm: sha256WithRSAEncryption
990 | Not valid before: 2018-08-08T00:00:00
991 | Not valid after: 2020-08-07T23:59:59
992 | MD5: 7d61 d119 54dd eee2 5d8a 8e30 3bb7 8d08
993 |_SHA-1: 3ceb 21dd a396 e1b5 d07f 4504 a123 75c9 35bf 89e0
994 |_ssl-date: TLS randomness does not represent time
995 143/tcp open imap syn-ack ttl 45 Dovecot imapd
996 |_imap-capabilities: Pre-login STARTTLS post-login have NAMESPACE OK ID IMAP4rev1 LITERAL+ AUTH=LOGINA0001 AUTH=PLAIN listed more SASL-IR ENABLE capabilities IDLE LOGIN-REFERRALS
997 | ssl-cert: Subject: commonName=*.dnsmisitio.net
998 | Subject Alternative Name: DNS:*.dnsmisitio.net, DNS:dnsmisitio.net
999 | Issuer: commonName=COMODO RSA Domain Validation Secure Server CA/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1000 | Public Key type: rsa
1001 | Public Key bits: 2048
1002 | Signature Algorithm: sha256WithRSAEncryption
1003 | Not valid before: 2018-08-08T00:00:00
1004 | Not valid after: 2020-08-07T23:59:59
1005 | MD5: 7d61 d119 54dd eee2 5d8a 8e30 3bb7 8d08
1006 |_SHA-1: 3ceb 21dd a396 e1b5 d07f 4504 a123 75c9 35bf 89e0
1007 |_ssl-date: TLS randomness does not represent time
1008 465/tcp open ssl/smtp syn-ack ttl 45 Exim smtpd 4.92
1009 | smtp-commands: blue127.dnsmisitio.net Hello nmap.scanme.org [84.17.52.69], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
1010 |_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1011 | ssl-cert: Subject: commonName=*.dnsmisitio.net
1012 | Subject Alternative Name: DNS:*.dnsmisitio.net, DNS:dnsmisitio.net
1013 | Issuer: commonName=COMODO RSA Domain Validation Secure Server CA/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1014 | Public Key type: rsa
1015 | Public Key bits: 2048
1016 | Signature Algorithm: sha256WithRSAEncryption
1017 | Not valid before: 2018-08-08T00:00:00
1018 | Not valid after: 2020-08-07T23:59:59
1019 | MD5: 7d61 d119 54dd eee2 5d8a 8e30 3bb7 8d08
1020 |_SHA-1: 3ceb 21dd a396 e1b5 d07f 4504 a123 75c9 35bf 89e0
1021 |_ssl-date: TLS randomness does not represent time
1022 587/tcp open smtp syn-ack ttl 45 Exim smtpd 4.92
1023 | smtp-commands: blue127.dnsmisitio.net Hello nmap.scanme.org [84.17.52.69], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
1024 |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1025 | ssl-cert: Subject: commonName=*.dnsmisitio.net
1026 | Subject Alternative Name: DNS:*.dnsmisitio.net, DNS:dnsmisitio.net
1027 | Issuer: commonName=COMODO RSA Domain Validation Secure Server CA/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1028 | Public Key type: rsa
1029 | Public Key bits: 2048
1030 | Signature Algorithm: sha256WithRSAEncryption
1031 | Not valid before: 2018-08-08T00:00:00
1032 | Not valid after: 2020-08-07T23:59:59
1033 | MD5: 7d61 d119 54dd eee2 5d8a 8e30 3bb7 8d08
1034 |_SHA-1: 3ceb 21dd a396 e1b5 d07f 4504 a123 75c9 35bf 89e0
1035 993/tcp open ssl/imap syn-ack ttl 45 Dovecot imapd
1036 |_imap-capabilities: Pre-login post-login have NAMESPACE OK ID IMAP4rev1 LITERAL+ AUTH=LOGINA0001 AUTH=PLAIN listed more SASL-IR ENABLE capabilities IDLE LOGIN-REFERRALS
1037 | ssl-cert: Subject: commonName=*.dnsmisitio.net
1038 | Subject Alternative Name: DNS:*.dnsmisitio.net, DNS:dnsmisitio.net
1039 | Issuer: commonName=COMODO RSA Domain Validation Secure Server CA/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1040 | Public Key type: rsa
1041 | Public Key bits: 2048
1042 | Signature Algorithm: sha256WithRSAEncryption
1043 | Not valid before: 2018-08-08T00:00:00
1044 | Not valid after: 2020-08-07T23:59:59
1045 | MD5: 7d61 d119 54dd eee2 5d8a 8e30 3bb7 8d08
1046 |_SHA-1: 3ceb 21dd a396 e1b5 d07f 4504 a123 75c9 35bf 89e0
1047 |_ssl-date: TLS randomness does not represent time
1048 995/tcp open ssl/pop3 syn-ack ttl 45 Dovecot pop3d
1049 | ssl-cert: Subject: commonName=*.dnsmisitio.net
1050 | Subject Alternative Name: DNS:*.dnsmisitio.net, DNS:dnsmisitio.net
1051 | Issuer: commonName=COMODO RSA Domain Validation Secure Server CA/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1052 | Public Key type: rsa
1053 | Public Key bits: 2048
1054 | Signature Algorithm: sha256WithRSAEncryption
1055 | Not valid before: 2018-08-08T00:00:00
1056 | Not valid after: 2020-08-07T23:59:59
1057 | MD5: 7d61 d119 54dd eee2 5d8a 8e30 3bb7 8d08
1058 |_SHA-1: 3ceb 21dd a396 e1b5 d07f 4504 a123 75c9 35bf 89e0
1059 |_ssl-date: TLS randomness does not represent time
1060 Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (92%)
1061 OS Info: Service Info: Host: blue127.dnsmisitio.net
1062 WebCrawling domain's web servers... up to 50 max links.
1063--Finished--
1064Summary information for domain reciclaccion.cl.
1065-----------------------------------------
1066
1067 Domain Ips Information:
1068 IP: 186.64.112.73
1069 HostName: ns1.dnsmisitio.net Type: NS
1070 HostName: serverdns1.dnsmisitio.net Type: PTR
1071 Country: Chile
1072 Is Active: True (echo-reply ttl 54)
1073 Port: 53/tcp open domain syn-ack ttl 54 ISC BIND
1074 Script Info: Device type: general purpose|firewall|storage-misc|VoIP phone
1075 Script Info: Running (JUST GUESSING): Linux 2.6.X|3.X (91%), WatchGuard Fireware 11.X (91%), Synology DiskStation Manager 5.X (90%), Grandstream embedded (85%)
1076 IP: 144.217.14.213
1077 HostName: ns3.dnsmisitio.net Type: NS
1078 HostName: serverdns3.dnsmisitio.net Type: PTR
1079 Country: Canada
1080 Is Active: True (echo-reply ttl 49)
1081 Port: 53/tcp open domain syn-ack ttl 49 ISC BIND
1082 Script Info: Device type: general purpose|storage-misc|firewall|VoIP phone
1083 Script Info: Running (JUST GUESSING): Linux 2.6.X|3.X (91%), Synology DiskStation Manager 5.X (90%), WatchGuard Fireware 11.X (89%), Grandstream embedded (85%)
1084 IP: 45.79.214.161
1085 HostName: ns2.dnsmisitio.net Type: NS
1086 HostName: serverdns2.dnsmisitio.net Type: PTR
1087 Country: United States
1088 Is Active: True (echo-reply ttl 51)
1089 Port: 53/tcp open domain syn-ack ttl 50 ISC BIND
1090 IP: 186.64.114.7
1091 Type: SPF
1092 Is Active: False
1093 IP: 186.64.114.6
1094 Type: SPF
1095 Is Active: False
1096 IP: 186.64.114.5
1097 Type: SPF
1098 Is Active: False
1099 IP: 186.64.118.40
1100 HostName: mail.reciclaccion.cl Type: MX
1101 HostName: blue127.dnsmisitio.net Type: PTR
1102 Type: SPF
1103 HostName: www.reciclaccion.cl. Type: A
1104 HostName: ftp.reciclaccion.cl. Type: A
1105 HostName: mail.reciclaccion.cl. Type: A
1106 HostName: webmail.reciclaccion.cl. Type: A
1107 Country: Chile
1108 Is Active: True (echo-reply ttl 45)
1109 Port: 21/tcp open ftp syn-ack ttl 45 Pure-FTPd
1110 Script Info: | ssl-cert: Subject: commonName=blue127.dnsmisitio.net
1111 Script Info: | Subject Alternative Name: DNS:blue127.dnsmisitio.net, DNS:www.blue127.dnsmisitio.net
1112 Script Info: | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
1113 Script Info: | Public Key type: rsa
1114 Script Info: | Public Key bits: 2048
1115 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1116 Script Info: | Not valid before: 2019-11-20T00:00:00
1117 Script Info: | Not valid after: 2020-11-19T23:59:59
1118 Script Info: | MD5: 1218 e2a8 065a ac60 2523 57c8 c88a a373
1119 Script Info: |_SHA-1: c937 c36f 1d17 4036 1ce4 f249 96a7 4ade b1b8 1e65
1120 Port: 25/tcp open smtp? syn-ack ttl 45
1121 Script Info: |_smtp-commands: Couldn't establish connection on port 25
1122 Port: 110/tcp open pop3 syn-ack ttl 45 Dovecot pop3d
1123 Script Info: |_pop3-capabilities: RESP-CODES CAPA TOP SASL(PLAIN LOGIN) AUTH-RESP-CODE UIDL PIPELINING USER STLS
1124 Script Info: | ssl-cert: Subject: commonName=*.dnsmisitio.net
1125 Script Info: | Subject Alternative Name: DNS:*.dnsmisitio.net, DNS:dnsmisitio.net
1126 Script Info: | Issuer: commonName=COMODO RSA Domain Validation Secure Server CA/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1127 Script Info: | Public Key type: rsa
1128 Script Info: | Public Key bits: 2048
1129 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1130 Script Info: | Not valid before: 2018-08-08T00:00:00
1131 Script Info: | Not valid after: 2020-08-07T23:59:59
1132 Script Info: | MD5: 7d61 d119 54dd eee2 5d8a 8e30 3bb7 8d08
1133 Script Info: |_SHA-1: 3ceb 21dd a396 e1b5 d07f 4504 a123 75c9 35bf 89e0
1134 Script Info: |_ssl-date: TLS randomness does not represent time
1135 Port: 143/tcp open imap syn-ack ttl 45 Dovecot imapd
1136 Script Info: |_imap-capabilities: Pre-login STARTTLS post-login have NAMESPACE OK ID IMAP4rev1 LITERAL+ AUTH=LOGINA0001 AUTH=PLAIN listed more SASL-IR ENABLE capabilities IDLE LOGIN-REFERRALS
1137 Script Info: | ssl-cert: Subject: commonName=*.dnsmisitio.net
1138 Script Info: | Subject Alternative Name: DNS:*.dnsmisitio.net, DNS:dnsmisitio.net
1139 Script Info: | Issuer: commonName=COMODO RSA Domain Validation Secure Server CA/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1140 Script Info: | Public Key type: rsa
1141 Script Info: | Public Key bits: 2048
1142 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1143 Script Info: | Not valid before: 2018-08-08T00:00:00
1144 Script Info: | Not valid after: 2020-08-07T23:59:59
1145 Script Info: | MD5: 7d61 d119 54dd eee2 5d8a 8e30 3bb7 8d08
1146 Script Info: |_SHA-1: 3ceb 21dd a396 e1b5 d07f 4504 a123 75c9 35bf 89e0
1147 Script Info: |_ssl-date: TLS randomness does not represent time
1148 Port: 465/tcp open ssl/smtp syn-ack ttl 45 Exim smtpd 4.92
1149 Script Info: | smtp-commands: blue127.dnsmisitio.net Hello nmap.scanme.org [84.17.52.69], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
1150 Script Info: |_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1151 Script Info: | ssl-cert: Subject: commonName=*.dnsmisitio.net
1152 Script Info: | Subject Alternative Name: DNS:*.dnsmisitio.net, DNS:dnsmisitio.net
1153 Script Info: | Issuer: commonName=COMODO RSA Domain Validation Secure Server CA/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1154 Script Info: | Public Key type: rsa
1155 Script Info: | Public Key bits: 2048
1156 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1157 Script Info: | Not valid before: 2018-08-08T00:00:00
1158 Script Info: | Not valid after: 2020-08-07T23:59:59
1159 Script Info: | MD5: 7d61 d119 54dd eee2 5d8a 8e30 3bb7 8d08
1160 Script Info: |_SHA-1: 3ceb 21dd a396 e1b5 d07f 4504 a123 75c9 35bf 89e0
1161 Script Info: |_ssl-date: TLS randomness does not represent time
1162 Port: 587/tcp open smtp syn-ack ttl 45 Exim smtpd 4.92
1163 Script Info: | smtp-commands: blue127.dnsmisitio.net Hello nmap.scanme.org [84.17.52.69], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
1164 Script Info: |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1165 Script Info: | ssl-cert: Subject: commonName=*.dnsmisitio.net
1166 Script Info: | Subject Alternative Name: DNS:*.dnsmisitio.net, DNS:dnsmisitio.net
1167 Script Info: | Issuer: commonName=COMODO RSA Domain Validation Secure Server CA/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1168 Script Info: | Public Key type: rsa
1169 Script Info: | Public Key bits: 2048
1170 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1171 Script Info: | Not valid before: 2018-08-08T00:00:00
1172 Script Info: | Not valid after: 2020-08-07T23:59:59
1173 Script Info: | MD5: 7d61 d119 54dd eee2 5d8a 8e30 3bb7 8d08
1174 Script Info: |_SHA-1: 3ceb 21dd a396 e1b5 d07f 4504 a123 75c9 35bf 89e0
1175 Port: 993/tcp open ssl/imap syn-ack ttl 45 Dovecot imapd
1176 Script Info: |_imap-capabilities: Pre-login post-login have NAMESPACE OK ID IMAP4rev1 LITERAL+ AUTH=LOGINA0001 AUTH=PLAIN listed more SASL-IR ENABLE capabilities IDLE LOGIN-REFERRALS
1177 Script Info: | ssl-cert: Subject: commonName=*.dnsmisitio.net
1178 Script Info: | Subject Alternative Name: DNS:*.dnsmisitio.net, DNS:dnsmisitio.net
1179 Script Info: | Issuer: commonName=COMODO RSA Domain Validation Secure Server CA/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1180 Script Info: | Public Key type: rsa
1181 Script Info: | Public Key bits: 2048
1182 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1183 Script Info: | Not valid before: 2018-08-08T00:00:00
1184 Script Info: | Not valid after: 2020-08-07T23:59:59
1185 Script Info: | MD5: 7d61 d119 54dd eee2 5d8a 8e30 3bb7 8d08
1186 Script Info: |_SHA-1: 3ceb 21dd a396 e1b5 d07f 4504 a123 75c9 35bf 89e0
1187 Script Info: |_ssl-date: TLS randomness does not represent time
1188 Port: 995/tcp open ssl/pop3 syn-ack ttl 45 Dovecot pop3d
1189 Script Info: | ssl-cert: Subject: commonName=*.dnsmisitio.net
1190 Script Info: | Subject Alternative Name: DNS:*.dnsmisitio.net, DNS:dnsmisitio.net
1191 Script Info: | Issuer: commonName=COMODO RSA Domain Validation Secure Server CA/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1192 Script Info: | Public Key type: rsa
1193 Script Info: | Public Key bits: 2048
1194 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1195 Script Info: | Not valid before: 2018-08-08T00:00:00
1196 Script Info: | Not valid after: 2020-08-07T23:59:59
1197 Script Info: | MD5: 7d61 d119 54dd eee2 5d8a 8e30 3bb7 8d08
1198 Script Info: |_SHA-1: 3ceb 21dd a396 e1b5 d07f 4504 a123 75c9 35bf 89e0
1199 Script Info: |_ssl-date: TLS randomness does not represent time
1200 Script Info: Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (92%)
1201 Os Info: Host: blue127.dnsmisitio.net
1202
1203--------------End Summary --------------
1204-----------------------------------------
1205#####################################################################################################################################
1206----- reciclaccion.cl -----
1207
1208
1209Host's addresses:
1210__________________
1211
1212reciclaccion.cl. 14341 IN A 186.64.118.40
1213
1214
1215Name Servers:
1216______________
1217
1218ns1.dnsmisitio.net. 13839 IN A 186.64.112.73
1219ns2.dnsmisitio.net. 10387 IN A 45.79.214.161
1220ns3.dnsmisitio.net. 13839 IN A 144.217.14.213
1221
1222
1223Mail (MX) Servers:
1224___________________
1225
1226mail.reciclaccion.cl. 14400 IN A 186.64.118.40
1227
1228
1229Brute forcing with /usr/share/dnsenum/dns.txt:
1230_______________________________________________
1231
1232ftp.reciclaccion.cl. 14050 IN A 186.64.118.40
1233mail.reciclaccion.cl. 13832 IN A 186.64.118.40
1234webmail.reciclaccion.cl. 14400 IN A 186.64.118.40
1235www.reciclaccion.cl. 13389 IN CNAME reciclaccion.cl.
1236reciclaccion.cl. 13496 IN A 186.64.118.40
1237
1238
1239Launching Whois Queries:
1240_________________________
1241
1242 whois ip result: 186.64.118.0 -> 186.64.112.0/21
1243
1244
1245reciclaccion.cl_______________
1246
1247 186.64.112.0/21
1248#####################################################################################################################################
1249dnsenum VERSION:1.2.6
1250
1251----- www.reciclaccion.cl -----
1252
1253
1254Host's addresses:
1255__________________
1256
1257reciclaccion.cl. 14234 IN A 186.64.118.40
1258
1259
1260Name Servers:
1261______________
1262
1263ns1.dnsmisitio.net. 14400 IN A 186.64.112.73
1264ns3.dnsmisitio.net. 14400 IN A 144.217.14.213
1265ns2.dnsmisitio.net. 10947 IN A 45.79.214.161
1266
1267
1268Mail (MX) Servers:
1269___________________
1270
1271mail.reciclaccion.cl. 14400 IN A 186.64.118.40
1272
1273
1274Trying Zone Transfers and getting Bind Versions:
1275_________________________________________________
1276
1277
1278Trying Zone Transfer for www.reciclaccion.cl on ns1.dnsmisitio.net ...
1279
1280Trying Zone Transfer for www.reciclaccion.cl on ns3.dnsmisitio.net ...
1281
1282Trying Zone Transfer for www.reciclaccion.cl on ns2.dnsmisitio.net ...
1283
1284
1285Brute forcing with /usr/share/sniper/wordlists/vhosts.txt:
1286___________________________________________________________
1287
1288
1289
1290www.reciclaccion.cl class C netranges:
1291_______________________________________
1292
1293
1294
1295www.reciclaccion.cl ip blocks:
1296_______________________________
1297
1298 /32
1299
1300done.
1301####################################################################################################################################
1302URLCrazy Domain Report
1303Domain : www.reciclaccion.cl
1304Keyboard : qwerty
1305At : 2020-03-02 11:28:56 -0500
1306
1307# Please wait. 222 hostnames to process
1308
1309Typo Type Typo DNS-A CC-A DNS-MX Extn
1310--------------------------------------------------------------------------------------------------------
1311Character Omission ww.reciclaccion.cl ? cl
1312Character Omission www.eciclaccion.cl ? cl
1313Character Omission www.rciclaccion.cl ? cl
1314Character Omission www.recclaccion.cl ? cl
1315Character Omission www.recicaccion.cl ? cl
1316Character Omission www.reciclaccin.cl ? cl
1317Character Omission www.reciclaccio.cl ? cl
1318Character Omission www.reciclaccon.cl ? cl
1319Character Omission www.reciclacion.cl ? cl
1320Character Omission www.reciclccion.cl ? cl
1321Character Omission www.recilaccion.cl ? cl
1322Character Omission www.reiclaccion.cl ? cl
1323Character Omission wwwreciclaccion.cl ? cl
1324Character Repeat www.recciclaccion.cl ? cl
1325Character Repeat www.recicclaccion.cl ? cl
1326Character Repeat www.reciclaaccion.cl ? cl
1327Character Repeat www.reciclacccion.cl ? cl
1328Character Repeat www.reciclacciion.cl ? cl
1329Character Repeat www.reciclaccionn.cl ? cl
1330Character Repeat www.reciclaccioon.cl ? cl
1331Character Repeat www.recicllaccion.cl ? cl
1332Character Repeat www.reciiclaccion.cl ? cl
1333Character Repeat www.reeciclaccion.cl ? cl
1334Character Repeat www.rreciclaccion.cl ? cl
1335Character Repeat wwww.reciclaccion.cl ? cl
1336Character Swap ww.wreciclaccion.cl ? cl
1337Character Swap www.erciclaccion.cl ? cl
1338Character Swap www.rceiclaccion.cl ? cl
1339Character Swap www.reccilaccion.cl ? cl
1340Character Swap www.recicalccion.cl ? cl
1341Character Swap www.reciclaccino.cl ? cl
1342Character Swap www.reciclaccion.lc ? lc
1343Character Swap www.reciclaccoin.cl ? cl
1344Character Swap www.reciclacicon.cl ? cl
1345Character Swap www.reciclcacion.cl ? cl
1346Character Swap www.recilcaccion.cl ? cl
1347Character Swap www.reicclaccion.cl ? cl
1348Character Swap wwwr.eciclaccion.cl ? cl
1349Character Replacement eww.reciclaccion.cl ? cl
1350Character Replacement qww.reciclaccion.cl ? cl
1351Character Replacement wew.reciclaccion.cl ? cl
1352Character Replacement wqw.reciclaccion.cl ? cl
1353Character Replacement wwe.reciclaccion.cl ? cl
1354Character Replacement wwq.reciclaccion.cl ? cl
1355Character Replacement www.eeciclaccion.cl ? cl
1356Character Replacement www.recickaccion.cl ? cl
1357Character Replacement www.reciclacciin.cl ? cl
1358Character Replacement www.reciclacciob.cl ? cl
1359Character Replacement www.reciclacciom.cl ? cl
1360Character Replacement www.reciclaccipn.cl ? cl
1361Character Replacement www.reciclaccoon.cl ? cl
1362Character Replacement www.reciclaccuon.cl ? cl
1363Character Replacement www.reciclacvion.cl ? cl
1364Character Replacement www.reciclacxion.cl ? cl
1365Character Replacement www.reciclavcion.cl ? cl
1366Character Replacement www.reciclaxcion.cl ? cl
1367Character Replacement www.reciclsccion.cl ? cl
1368Character Replacement www.recivlaccion.cl ? cl
1369Character Replacement www.recixlaccion.cl ? cl
1370Character Replacement www.recoclaccion.cl ? cl
1371Character Replacement www.recuclaccion.cl ? cl
1372Character Replacement www.reviclaccion.cl ? cl
1373Character Replacement www.rexiclaccion.cl ? cl
1374Character Replacement www.rrciclaccion.cl ? cl
1375Character Replacement www.rwciclaccion.cl ? cl
1376Character Replacement www.teciclaccion.cl ? cl
1377Double Character Replacement eew.reciclaccion.cl ? cl
1378Double Character Replacement qqw.reciclaccion.cl ? cl
1379Double Character Replacement wee.reciclaccion.cl ? cl
1380Double Character Replacement wqq.reciclaccion.cl ? cl
1381Double Character Replacement www.reciclavvion.cl ? cl
1382Double Character Replacement www.reciclaxxion.cl ? cl
1383Character Insertion weww.reciclaccion.cl ? cl
1384Character Insertion wqww.reciclaccion.cl ? cl
1385Character Insertion wwew.reciclaccion.cl ? cl
1386Character Insertion wwqw.reciclaccion.cl ? cl
1387Character Insertion www.reciclaccioin.cl ? cl
1388Character Insertion www.reciclaccionb.cl ? cl
1389Character Insertion www.reciclaccionm.cl ? cl
1390Character Insertion www.reciclacciopn.cl ? cl
1391Character Insertion www.reciclacciuon.cl ? cl
1392Character Insertion www.reciclaccvion.cl ? cl
1393Character Insertion www.reciclaccxion.cl ? cl
1394Character Insertion www.reciclacvcion.cl ? cl
1395Character Insertion www.reciclacxcion.cl ? cl
1396Character Insertion www.reciclasccion.cl ? cl
1397Character Insertion www.reciclkaccion.cl ? cl
1398Character Insertion www.recicvlaccion.cl ? cl
1399Character Insertion www.recicxlaccion.cl ? cl
1400Character Insertion www.recioclaccion.cl ? cl
1401Character Insertion www.reciuclaccion.cl ? cl
1402Character Insertion www.recviclaccion.cl ? cl
1403Character Insertion www.recxiclaccion.cl ? cl
1404Character Insertion www.rerciclaccion.cl ? cl
1405Character Insertion www.rewciclaccion.cl ? cl
1406Character Insertion www.rteciclaccion.cl ? cl
1407Character Insertion wwwe.reciclaccion.cl ? cl
1408Character Insertion wwwq.reciclaccion.cl ? cl
1409Missing Dot wwwwww.reciclaccion.cl ? cl
1410Singular or Pluralise reciclaccion.cl 186.64.118.40 mail.reciclaccion.cl cl
1411Singular or Pluralise reciclaccions.cl ? cl
1412Vowel Swap www.raciclaccion.cl ? cl
1413Vowel Swap www.recaclaccaon.cl ? cl
1414Vowel Swap www.receclacceon.cl ? cl
1415Vowel Swap www.reciclaccian.cl ? cl
1416Vowel Swap www.reciclaccien.cl ? cl
1417Vowel Swap www.reciclacciun.cl ? cl
1418Vowel Swap www.recicleccion.cl ? cl
1419Vowel Swap www.recicliccion.cl ? cl
1420Vowel Swap www.recicloccion.cl ? cl
1421Vowel Swap www.recicluccion.cl ? cl
1422Vowel Swap www.recoclaccoon.cl ? cl
1423Vowel Swap www.recuclaccuon.cl ? cl
1424Vowel Swap www.riciclaccion.cl ? cl
1425Vowel Swap www.rociclaccion.cl ? cl
1426Vowel Swap www.ruciclaccion.cl ? cl
1427Homophones www.recayeclaccayeon.cl ? cl
1428Homophones www.receyeclacceyeon.cl ? cl
1429Bit Flipping 7ww.reciclaccion.cl ? cl
1430Bit Flipping gww.reciclaccion.cl ? cl
1431Bit Flipping sww.reciclaccion.cl ? cl
1432Bit Flipping uww.reciclaccion.cl ? cl
1433Bit Flipping vww.reciclaccion.cl ? cl
1434Bit Flipping w7w.reciclaccion.cl ? cl
1435Bit Flipping wgw.reciclaccion.cl ? cl
1436Bit Flipping wsw.reciclaccion.cl ? cl
1437Bit Flipping wuw.reciclaccion.cl ? cl
1438Bit Flipping wvw.reciclaccion.cl ? cl
1439Bit Flipping ww7.reciclaccion.cl ? cl
1440Bit Flipping wwg.reciclaccion.cl ? cl
1441Bit Flipping wws.reciclaccion.cl ? cl
1442Bit Flipping wwu.reciclaccion.cl ? cl
1443Bit Flipping wwv.reciclaccion.cl ? cl
1444Bit Flipping www.2eciclaccion.cl ? cl
1445Bit Flipping www.beciclaccion.cl ? cl
1446Bit Flipping www.peciclaccion.cl ? cl
1447Bit Flipping www.rdciclaccion.cl ? cl
1448Bit Flipping www.reaiclaccion.cl ? cl
1449Bit Flipping www.rebiclaccion.cl ? cl
1450Bit Flipping www.recaclaccion.cl ? cl
1451Bit Flipping www.rechclaccion.cl ? cl
1452Bit Flipping www.recialaccion.cl ? cl
1453Bit Flipping www.reciblaccion.cl ? cl
1454Bit Flipping www.recicdaccion.cl ? cl
1455Bit Flipping www.recichaccion.cl ? cl
1456Bit Flipping www.reciclaacion.cl ? cl
1457Bit Flipping www.reciclabcion.cl ? cl
1458Bit Flipping www.reciclacaion.cl ? cl
1459Bit Flipping www.reciclacbion.cl ? cl
1460Bit Flipping www.reciclaccaon.cl ? cl
1461Bit Flipping www.reciclacchon.cl ? cl
1462Bit Flipping www.reciclaccign.cl ? cl
1463Bit Flipping www.reciclaccikn.cl ? cl
1464Bit Flipping www.reciclaccimn.cl ? cl
1465Bit Flipping www.reciclaccinn.cl ? cl
1466Bit Flipping www.reciclacciof.cl ? cl
1467Bit Flipping www.reciclaccioj.cl ? cl
1468Bit Flipping www.reciclacciol.cl ? cl
1469Bit Flipping www.reciclaccion.cd ? cd
1470Bit Flipping www.reciclaccion.ch ? ch
1471Bit Flipping www.reciclaccion.cm ? cm
1472Bit Flipping www.reciclaccion.cn ? cn
1473Bit Flipping www.reciclaccion.gl ? gl
1474Bit Flipping www.reciclaccion.sl ? sl
1475Bit Flipping www.reciclaccioo.cl ? cl
1476Bit Flipping www.reciclacckon.cl ? cl
1477Bit Flipping www.reciclaccmon.cl ? cl
1478Bit Flipping www.reciclaccyon.cl ? cl
1479Bit Flipping www.reciclacgion.cl ? cl
1480Bit Flipping www.reciclackion.cl ? cl
1481Bit Flipping www.reciclacsion.cl ? cl
1482Bit Flipping www.reciclagcion.cl ? cl
1483Bit Flipping www.reciclakcion.cl ? cl
1484Bit Flipping www.reciclascion.cl ? cl
1485Bit Flipping www.reciclcccion.cl ? cl
1486Bit Flipping www.reciclqccion.cl ? cl
1487Bit Flipping www.recicmaccion.cl ? cl
1488Bit Flipping www.recicnaccion.cl ? cl
1489Bit Flipping www.reciglaccion.cl ? cl
1490Bit Flipping www.reciklaccion.cl ? cl
1491Bit Flipping www.recislaccion.cl ? cl
1492Bit Flipping www.reckclaccion.cl ? cl
1493Bit Flipping www.recmclaccion.cl ? cl
1494Bit Flipping www.recyclaccion.cl ? cl
1495Bit Flipping www.regiclaccion.cl ? cl
1496Bit Flipping www.rekiclaccion.cl ? cl
1497Bit Flipping www.resiclaccion.cl ? cl
1498Bit Flipping www.rgciclaccion.cl ? cl
1499Bit Flipping www.rmciclaccion.cl ? cl
1500Bit Flipping www.seciclaccion.cl ? cl
1501Bit Flipping www.veciclaccion.cl ? cl
1502Bit Flipping www.zeciclaccion.cl ? cl
1503Bit Flipping wwwnreciclaccion.cl ? cl
1504Homoglyphs vvvvvv.reciclaccion.cl ? cl
1505Homoglyphs vvvvw.reciclaccion.cl ? cl
1506Homoglyphs vvwvv.reciclaccion.cl ? cl
1507Homoglyphs vvww.reciclaccion.cl ? cl
1508Homoglyphs wvvvv.reciclaccion.cl ? cl
1509Homoglyphs wvvw.reciclaccion.cl ? cl
1510Homoglyphs wwvv.reciclaccion.cl ? cl
1511Homoglyphs www.recic1accion.cl ? cl
1512Homoglyphs www.reciclacci0n.cl ? cl
1513Homoglyphs www.reciclacclon.cl ? cl
1514Homoglyphs www.recidaccion.cl ? cl
1515Homoglyphs www.reclclaccion.cl ? cl
1516Homoglyphs www.reclclacclon.cl ? cl
1517Wrong TLD reciclaccion.ca ? ca
1518Wrong TLD reciclaccion.ch ? ch
1519Wrong TLD reciclaccion.com ? com
1520Wrong TLD reciclaccion.de ? de
1521Wrong TLD reciclaccion.edu ? edu
1522Wrong TLD reciclaccion.es ? es
1523Wrong TLD reciclaccion.fr ? fr
1524Wrong TLD reciclaccion.it ? it
1525Wrong TLD reciclaccion.jp ? jp
1526Wrong TLD reciclaccion.net ? net
1527Wrong TLD reciclaccion.nl ? nl
1528Wrong TLD reciclaccion.no ? no
1529Wrong TLD reciclaccion.org ? org
1530Wrong TLD reciclaccion.ru ? ru
1531Wrong TLD reciclaccion.se ? se
1532Wrong TLD reciclaccion.us ? us
1533####################################################################################################################################
1534[*] Processing domain www.reciclaccion.cl
1535[*] Using system resolvers ['10.101.0.243', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
1536[+] Getting nameservers
1537186.64.112.73 - ns1.dnsmisitio.net
1538144.217.14.213 - ns3.dnsmisitio.net
153945.79.214.161 - ns2.dnsmisitio.net
1540[-] Zone transfer failed
1541
1542[+] TXT records found
1543"v=spf1 ip4:186.64.118.40 +a +mx +ip4:186.64.114.5 +ip4:186.64.114.6 +ip4:186.64.114.7 ~all"
1544
1545[+] MX records found, added to target list
15460 mail.reciclaccion.cl.
1547
1548[*] Scanning www.reciclaccion.cl for A records
1549186.64.118.40 - www.reciclaccion.cl
1550###################################################################################################################################
1551[*] Found SPF record:
1552[*] v=spf1 ip4:186.64.118.40 +a +mx +ip4:186.64.114.5 +ip4:186.64.114.6 +ip4:186.64.114.7 ~all
1553[*] SPF record contains an All item: ~all
1554[*] No DMARC record found. Looking for organizational record
1555[*] Found organizational DMARC record:
1556[*] v=DMARC1; p=none; rua=mailto:postmaster@reciclaccion.cl
1557[*] No explicit organizational subdomain policy. Defaulting to organizational policy
1558[+] DMARC policy set to none
1559[+] Spoofing possible for www.reciclaccion.cl!
1560###################################################################################################################################
1561WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
1562Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 11:43 EST
1563Nmap scan report for www.reciclaccion.cl (186.64.118.40)
1564Host is up (0.46s latency).
1565rDNS record for 186.64.118.40: blue127.dnsmisitio.net
1566Not shown: 422 filtered ports, 65 closed ports
1567Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
1568PORT STATE SERVICE
156921/tcp open ftp
157025/tcp open smtp
1571110/tcp open pop3
1572143/tcp open imap
1573465/tcp open smtps
1574587/tcp open submission
1575993/tcp open imaps
1576995/tcp open pop3s
157710050/tcp open zabbix-agent
1578
1579Nmap done: 1 IP address (1 host up) scanned in 11.78 seconds
1580####################################################################################################################################
1581Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 11:43 EST
1582Nmap scan report for www.reciclaccion.cl (186.64.118.40)
1583Host is up (0.52s latency).
1584rDNS record for 186.64.118.40: blue127.dnsmisitio.net
1585Not shown: 1 closed port
1586PORT STATE SERVICE
158767/udp open|filtered dhcps
158868/udp open|filtered dhcpc
158969/udp open|filtered tftp
159088/udp open|filtered kerberos-sec
1591123/udp open|filtered ntp
1592137/udp open|filtered netbios-ns
1593138/udp open|filtered netbios-dgm
1594139/udp open|filtered netbios-ssn
1595161/udp open|filtered snmp
1596162/udp open|filtered snmptrap
1597389/udp open|filtered ldap
1598500/udp open|filtered isakmp
1599520/udp open|filtered route
16002049/udp open|filtered nfs
1601
1602Nmap done: 1 IP address (1 host up) scanned in 7.91 seconds
1603####################################################################################################################################
1604Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 11:43 EST
1605NSE: Loaded 54 scripts for scanning.
1606NSE: Script Pre-scanning.
1607Initiating NSE at 11:43
1608Completed NSE at 11:43, 0.00s elapsed
1609Initiating NSE at 11:43
1610Completed NSE at 11:43, 0.00s elapsed
1611Initiating Parallel DNS resolution of 1 host. at 11:43
1612Completed Parallel DNS resolution of 1 host. at 11:43, 0.03s elapsed
1613Initiating SYN Stealth Scan at 11:43
1614Scanning www.reciclaccion.cl (186.64.118.40) [1 port]
1615Discovered open port 21/tcp on 186.64.118.40
1616Completed SYN Stealth Scan at 11:43, 0.55s elapsed (1 total ports)
1617Initiating Service scan at 11:43
1618Scanning 1 service on www.reciclaccion.cl (186.64.118.40)
1619Completed Service scan at 11:43, 0.89s elapsed (1 service on 1 host)
1620Initiating OS detection (try #1) against www.reciclaccion.cl (186.64.118.40)
1621Retrying OS detection (try #2) against www.reciclaccion.cl (186.64.118.40)
1622Initiating Traceroute at 11:43
1623Completed Traceroute at 11:43, 3.00s elapsed
1624Initiating Parallel DNS resolution of 8 hosts. at 11:43
1625Completed Parallel DNS resolution of 8 hosts. at 11:43, 0.26s elapsed
1626NSE: Script scanning 186.64.118.40.
1627Initiating NSE at 11:43
1628NSE Timing: About 72.73% done; ETC: 11:45 (0:00:30 remaining)
1629Completed NSE at 11:45, 90.28s elapsed
1630Initiating NSE at 11:45
1631Completed NSE at 11:45, 0.05s elapsed
1632Nmap scan report for www.reciclaccion.cl (186.64.118.40)
1633Host is up (0.51s latency).
1634rDNS record for 186.64.118.40: mail.blue127.dnsmisitio.net
1635
1636PORT STATE SERVICE VERSION
163721/tcp open ftp Pure-FTPd
1638Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
1639Aggressive OS guesses: Linux 4.4 (92%), Linux 3.10 - 3.12 (91%), Linux 2.6.18 - 2.6.22 (90%), Linux 4.9 (90%), Linux 4.0 (88%), Linux 2.6.18 (87%), Linux 3.10 - 3.16 (87%), Linux 3.10 - 4.11 (87%), Linux 3.11 - 4.1 (87%), Linux 3.18 (87%)
1640No exact OS matches for host (test conditions non-ideal).
1641Uptime guess: 38.209 days (since Fri Jan 24 06:43:53 2020)
1642Network Distance: 10 hops
1643TCP Sequence Prediction: Difficulty=258 (Good luck!)
1644IP ID Sequence Generation: All zeros
1645
1646TRACEROUTE (using port 21/tcp)
1647HOP RTT ADDRESS
16481 342.65 ms 10.202.7.1
16492 342.69 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
16503 342.71 ms 5.56.20.161
16514 342.73 ms ae15-2029.fra30.core-backbone.com (81.95.15.70)
16525 ...
16536 458.79 ms 190.211.161.121
16547 575.03 ms 190.211.161.122
16558 ...
16569 458.83 ms fw-101.haulmer.net (168.232.164.68)
165710 575.05 ms mail.blue127.dnsmisitio.net (186.64.118.40)
1658
1659NSE: Script Post-scanning.
1660Initiating NSE at 11:45
1661Completed NSE at 11:45, 0.00s elapsed
1662Initiating NSE at 11:45
1663Completed NSE at 11:45, 0.00s elapsed
1664####################################################################################################################################
1665Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 11:46 EST
1666NSE: Loaded 55 scripts for scanning.
1667NSE: Script Pre-scanning.
1668Initiating NSE at 11:46
1669Completed NSE at 11:46, 0.00s elapsed
1670Initiating NSE at 11:46
1671Completed NSE at 11:46, 0.00s elapsed
1672Initiating Parallel DNS resolution of 1 host. at 11:46
1673Completed Parallel DNS resolution of 1 host. at 11:46, 0.02s elapsed
1674Initiating SYN Stealth Scan at 11:46
1675Scanning www.reciclaccion.cl (186.64.118.40) [1 port]
1676Discovered open port 25/tcp on 186.64.118.40
1677Completed SYN Stealth Scan at 11:46, 0.39s elapsed (1 total ports)
1678Initiating Service scan at 11:46
1679Scanning 1 service on www.reciclaccion.cl (186.64.118.40)
1680Completed Service scan at 11:49, 180.43s elapsed (1 service on 1 host)
1681Initiating OS detection (try #1) against www.reciclaccion.cl (186.64.118.40)
1682Retrying OS detection (try #2) against www.reciclaccion.cl (186.64.118.40)
1683Initiating Traceroute at 11:49
1684Completed Traceroute at 11:49, 3.01s elapsed
1685Initiating Parallel DNS resolution of 7 hosts. at 11:49
1686Completed Parallel DNS resolution of 7 hosts. at 11:49, 0.34s elapsed
1687NSE: Script scanning 186.64.118.40.
1688Initiating NSE at 11:49
1689Completed NSE at 11:50, 30.68s elapsed
1690Initiating NSE at 11:50
1691Completed NSE at 11:50, 2.40s elapsed
1692Nmap scan report for www.reciclaccion.cl (186.64.118.40)
1693Host is up (0.51s latency).
1694rDNS record for 186.64.118.40: mail.blue127.dnsmisitio.net
1695
1696PORT STATE SERVICE VERSION
169725/tcp open smtp?
1698|_smtp-commands: Couldn't establish connection on port 25
1699| smtp-enum-users:
1700|_ Couldn't establish connection on port 25
1701|_smtp-open-relay: Couldn't establish connection on port 25
1702Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
1703Device type: general purpose|storage-misc|firewall
1704Running (JUST GUESSING): Linux 4.X|2.6.X|3.X (91%), Synology DiskStation Manager 5.X (87%), WatchGuard Fireware 11.X (85%), FreeBSD 6.X (85%)
1705OS CPE: cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/o:watchguard:fireware:11.8 cpe:/o:freebsd:freebsd:6.2
1706Aggressive OS guesses: Linux 4.4 (91%), Linux 2.6.18 - 2.6.22 (90%), Linux 4.9 (90%), Linux 3.10 - 3.12 (90%), Linux 4.0 (88%), Linux 3.10 - 3.16 (87%), Linux 3.10 - 4.11 (87%), Linux 3.11 - 4.1 (87%), Linux 3.2 - 4.9 (87%), Linux 2.6.32 (87%)
1707No exact OS matches for host (test conditions non-ideal).
1708Uptime guess: 38.213 days (since Fri Jan 24 06:43:52 2020)
1709Network Distance: 10 hops
1710TCP Sequence Prediction: Difficulty=265 (Good luck!)
1711IP ID Sequence Generation: All zeros
1712
1713TRACEROUTE (using port 25/tcp)
1714HOP RTT ADDRESS
17151 233.27 ms 10.202.7.1
17162 349.68 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
17173 349.71 ms 5.56.20.161
17184 349.73 ms ae15-2029.fra30.core-backbone.com (81.95.15.70)
17195 ... 6
17207 581.61 ms 190.211.161.122
17218 ...
17229 581.69 ms fw-101.haulmer.net (168.232.164.68)
172310 465.40 ms mail.blue127.dnsmisitio.net (186.64.118.40)
1724
1725NSE: Script Post-scanning.
1726Initiating NSE at 11:50
1727Completed NSE at 11:50, 0.00s elapsed
1728Initiating NSE at 11:50
1729Completed NSE at 11:50, 0.00s elapsed
1730####################################################################################################################################
1731Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 11:50 EST
1732NSE: Loaded 49 scripts for scanning.
1733NSE: Script Pre-scanning.
1734Initiating NSE at 11:50
1735Completed NSE at 11:50, 0.00s elapsed
1736Initiating NSE at 11:50
1737Completed NSE at 11:50, 0.00s elapsed
1738Initiating Ping Scan at 11:50
1739Scanning www.reciclaccion.cl (186.64.118.40) [4 ports]
1740Completed Ping Scan at 11:50, 0.41s elapsed (1 total hosts)
1741Initiating Parallel DNS resolution of 1 host. at 11:50
1742Completed Parallel DNS resolution of 1 host. at 11:50, 0.02s elapsed
1743Initiating SYN Stealth Scan at 11:50
1744Scanning www.reciclaccion.cl (186.64.118.40) [1 port]
1745Discovered open port 110/tcp on 186.64.118.40
1746Completed SYN Stealth Scan at 11:50, 0.39s elapsed (1 total ports)
1747Initiating Service scan at 11:50
1748Scanning 1 service on www.reciclaccion.cl (186.64.118.40)
1749Completed Service scan at 11:50, 0.79s elapsed (1 service on 1 host)
1750Initiating OS detection (try #1) against www.reciclaccion.cl (186.64.118.40)
1751Retrying OS detection (try #2) against www.reciclaccion.cl (186.64.118.40)
1752Initiating Traceroute at 11:51
1753Completed Traceroute at 11:51, 3.01s elapsed
1754Initiating Parallel DNS resolution of 8 hosts. at 11:51
1755Completed Parallel DNS resolution of 8 hosts. at 11:51, 0.25s elapsed
1756NSE: Script scanning 186.64.118.40.
1757Initiating NSE at 11:51
1758NSE Timing: About 68.66% done; ETC: 11:52 (0:00:30 remaining)
1759Completed NSE at 11:52, 91.17s elapsed
1760Initiating NSE at 11:52
1761Completed NSE at 11:52, 0.05s elapsed
1762Nmap scan report for www.reciclaccion.cl (186.64.118.40)
1763Host is up (0.44s latency).
1764rDNS record for 186.64.118.40: mail.blue127.dnsmisitio.net
1765
1766PORT STATE SERVICE VERSION
1767110/tcp open pop3 Dovecot pop3d
1768|_pop3-capabilities: STLS TOP RESP-CODES UIDL CAPA AUTH-RESP-CODE USER SASL(PLAIN LOGIN) PIPELINING
1769Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
1770Device type: general purpose|storage-misc|firewall
1771Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (92%), Synology DiskStation Manager 5.X (87%), WatchGuard Fireware 11.X (87%), FreeBSD 6.X (85%)
1772OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/o:watchguard:fireware:11.8 cpe:/o:freebsd:freebsd:6.2
1773Aggressive OS guesses: Linux 3.10 - 3.12 (92%), Linux 4.4 (92%), Linux 2.6.18 - 2.6.22 (90%), Linux 4.9 (90%), Linux 2.6.18 (87%), Linux 3.10 - 3.16 (87%), Linux 3.10 - 4.11 (87%), Linux 3.11 - 4.1 (87%), Linux 3.2 - 4.9 (87%), Linux 4.0 (87%)
1774No exact OS matches for host (test conditions non-ideal).
1775Uptime guess: 38.215 days (since Fri Jan 24 06:43:53 2020)
1776Network Distance: 10 hops
1777TCP Sequence Prediction: Difficulty=260 (Good luck!)
1778IP ID Sequence Generation: All zeros
1779
1780TRACEROUTE (using port 110/tcp)
1781HOP RTT ADDRESS
17821 230.81 ms 10.202.7.1
17832 342.53 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
17843 342.56 ms 5.56.20.161
17854 342.58 ms ae15-2029.fra30.core-backbone.com (81.95.15.70)
17865 ...
17876 570.45 ms 190.211.161.121
17887 570.41 ms 190.211.161.122
17898 ...
17909 570.47 ms fw-101.haulmer.net (168.232.164.68)
179110 455.47 ms mail.blue127.dnsmisitio.net (186.64.118.40)
1792
1793NSE: Script Post-scanning.
1794Initiating NSE at 11:52
1795Completed NSE at 11:52, 0.00s elapsed
1796Initiating NSE at 11:52
1797Completed NSE at 11:52, 0.00s elapsed
1798####################################################################################################################################
1799Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 11:28 EST
1800Warning: 186.64.118.40 giving up on port because retransmission cap hit (2).
1801Nmap scan report for mail.blue127.dnsmisitio.net (186.64.118.40)
1802Host is up (0.34s latency).
1803Not shown: 400 filtered ports, 65 closed ports
1804Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
1805PORT STATE SERVICE VERSION
180621/tcp open ftp Pure-FTPd
1807| ssl-cert: Subject: commonName=blue127.dnsmisitio.net
1808| Subject Alternative Name: DNS:blue127.dnsmisitio.net, DNS:www.blue127.dnsmisitio.net
1809| Not valid before: 2019-11-20T00:00:00
1810|_Not valid after: 2020-11-19T23:59:59
1811|_ssl-date: TLS randomness does not represent time
181225/tcp open smtp?
1813|_smtp-commands: Couldn't establish connection on port 25
181480/tcp open http Apache httpd
1815|_http-title: 403 Forbidden
1816110/tcp open pop3 Dovecot pop3d
1817|_pop3-capabilities: TOP RESP-CODES PIPELINING CAPA SASL(PLAIN LOGIN) AUTH-RESP-CODE USER UIDL STLS
1818| ssl-cert: Subject: commonName=*.dnsmisitio.net
1819| Subject Alternative Name: DNS:*.dnsmisitio.net, DNS:dnsmisitio.net
1820| Not valid before: 2018-08-08T00:00:00
1821|_Not valid after: 2020-08-07T23:59:59
1822|_ssl-date: TLS randomness does not represent time
1823143/tcp open imap Dovecot imapd
1824|_imap-capabilities: STARTTLS SASL-IR have IDLE AUTH=LOGINA0001 AUTH=PLAIN LITERAL+ LOGIN-REFERRALS capabilities OK NAMESPACE post-login listed Pre-login IMAP4rev1 ENABLE ID more
1825| ssl-cert: Subject: commonName=*.dnsmisitio.net
1826| Subject Alternative Name: DNS:*.dnsmisitio.net, DNS:dnsmisitio.net
1827| Not valid before: 2018-08-08T00:00:00
1828|_Not valid after: 2020-08-07T23:59:59
1829|_ssl-date: TLS randomness does not represent time
1830443/tcp open ssl/http Apache httpd
1831|_http-title: 400 Bad Request
1832465/tcp open ssl/smtp Exim smtpd 4.92
1833| smtp-commands: blue127.dnsmisitio.net Hello mail.blue127.dnsmisitio.net [84.17.52.69], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
1834|_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1835| ssl-cert: Subject: commonName=*.dnsmisitio.net
1836| Subject Alternative Name: DNS:*.dnsmisitio.net, DNS:dnsmisitio.net
1837| Not valid before: 2018-08-08T00:00:00
1838|_Not valid after: 2020-08-07T23:59:59
1839|_ssl-date: TLS randomness does not represent time
1840587/tcp open smtp Exim smtpd 4.92
1841| smtp-commands: blue127.dnsmisitio.net Hello mail.blue127.dnsmisitio.net [84.17.52.69], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
1842|_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1843| ssl-cert: Subject: commonName=*.dnsmisitio.net
1844| Subject Alternative Name: DNS:*.dnsmisitio.net, DNS:dnsmisitio.net
1845| Not valid before: 2018-08-08T00:00:00
1846|_Not valid after: 2020-08-07T23:59:59
1847|_ssl-date: TLS randomness does not represent time
1848993/tcp open ssl/imap Dovecot imapd
1849| ssl-cert: Subject: commonName=*.dnsmisitio.net
1850| Subject Alternative Name: DNS:*.dnsmisitio.net, DNS:dnsmisitio.net
1851| Not valid before: 2018-08-08T00:00:00
1852|_Not valid after: 2020-08-07T23:59:59
1853|_ssl-date: TLS randomness does not represent time
1854995/tcp open ssl/pop3 Dovecot pop3d
1855| ssl-cert: Subject: commonName=*.dnsmisitio.net
1856| Subject Alternative Name: DNS:*.dnsmisitio.net, DNS:dnsmisitio.net
1857| Not valid before: 2018-08-08T00:00:00
1858|_Not valid after: 2020-08-07T23:59:59
1859|_ssl-date: TLS randomness does not represent time
186010050/tcp open zabbix-agent?
1861Device type: general purpose|storage-misc|firewall
1862Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (91%), Synology DiskStation Manager 5.X (87%), FreeBSD 6.X (86%), WatchGuard Fireware 11.X (86%)
1863OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/o:freebsd:freebsd:6.2 cpe:/o:watchguard:fireware:11.8
1864Aggressive OS guesses: Linux 3.10 - 3.12 (91%), Linux 4.4 (91%), Linux 4.9 (90%), Linux 3.10 - 3.16 (88%), Linux 4.0 (88%), Linux 3.11 - 4.1 (87%), Linux 2.6.32 (87%), Linux 3.4 (87%), Linux 3.5 (87%), Synology DiskStation Manager 5.1 (87%)
1865No exact OS matches for host (test conditions non-ideal).
1866Network Distance: 10 hops
1867Service Info: Host: blue127.dnsmisitio.net
1868
1869TRACEROUTE (using port 995/tcp)
1870HOP RTT ADDRESS
18711 221.19 ms 10.202.7.1
18722 221.22 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
18733 221.24 ms 5.56.20.161
18744 340.78 ms ae15-2029.fra30.core-backbone.com (81.95.15.70)
18755 ...
18766 539.43 ms 190.211.161.121
18777 504.72 ms 190.211.161.122
18788 ...
18799 504.75 ms fw-101.haulmer.net (168.232.164.68)
188010 504.55 ms mail.blue127.dnsmisitio.net (186.64.118.40)
1881####################################################################################################################################
1882Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 11:33 EST
1883Nmap scan report for mail.blue127.dnsmisitio.net (186.64.118.40)
1884Host is up (0.33s latency).
1885Not shown: 14 filtered ports, 1 closed port
1886Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
1887PORT STATE SERVICE VERSION
188867/udp open|filtered dhcps
188968/udp open|filtered dhcpc
189069/udp open|filtered tftp
189188/udp open|filtered kerberos-sec
1892123/udp open|filtered ntp
1893137/udp open|filtered netbios-ns
1894138/udp open|filtered netbios-dgm
1895139/udp open|filtered netbios-ssn
1896161/udp open|filtered snmp
1897162/udp open|filtered snmptrap
1898389/udp open|filtered ldap
1899520/udp open|filtered route
19002049/udp open|filtered nfs
1901Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
1902Device type: WAP|broadband router|specialized
1903Running (JUST GUESSING): 3Com embedded (96%), Aastra embedded (96%), Acorp embedded (96%), Actiontec embedded (96%), Adtran embedded (96%), Aerohive HiveOS 3.X|5.X|6.X|7.X (96%), AirMagnet embedded (96%)
1904OS CPE: cpe:/h:3com:officeconnect_3crwer100-75 cpe:/h:actiontec:gt701 cpe:/h:adtran:424rg cpe:/o:aerohive:hiveos:3.4 cpe:/o:aerohive:hiveos:5.1 cpe:/o:aerohive:hiveos:6.1 cpe:/o:aerohive:hiveos:7.1 cpe:/h:airmagnet:smartedge
1905Aggressive OS guesses: 3Com OfficeConnect 3CRWER100-75 wireless broadband router (96%), 3Com OfficeConnect 3CRWER100-75 wireless router (96%), Aastra RFP L32 IP DECT WAP (96%), Acorp W400G or W422G wireless ADSL modem (MontaVista embedded Linux 2.4.17) (96%), Actiontec GT701 DSL modem (96%), Adtran 424RG FTTH gateway (96%), Aerohive HiveOS 3.4 (96%), Aerohive HiveOS 5.1 (96%), Aerohive HiveOS 6.1 (96%), Aerohive HiveOS 6.8 (96%)
1906No exact OS matches for host (test conditions non-ideal).
1907Network Distance: 10 hops
1908
1909TRACEROUTE (using port 53/udp)
1910HOP RTT ADDRESS
19111 193.01 ms 10.202.7.1
19122 318.90 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
19133 318.94 ms 5.56.20.161
19144 318.95 ms ae15-2029.fra30.core-backbone.com (81.95.15.70)
19155 ...
19166 429.80 ms 190.211.161.121
19177 429.84 ms 190.211.161.122
19188 ...
19199 553.11 ms fw-101.haulmer.net (168.232.164.68)
192010 429.92 ms mail.blue127.dnsmisitio.net (186.64.118.40)
1921####################################################################################################################################
1922Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 11:38 EST
1923Nmap scan report for blue127.dnsmisitio.net (186.64.118.40)
1924Host is up (0.16s latency).
1925
1926PORT STATE SERVICE VERSION
192721/tcp filtered ftp
1928Too many fingerprints match this host to give specific OS details
1929Network Distance: 10 hops
1930
1931TRACEROUTE (using proto 1/icmp)
1932HOP RTT ADDRESS
19331 251.52 ms 10.202.7.1
19342 251.55 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
19353 251.56 ms 5.56.20.161
19364 251.58 ms ae15-2029.fra30.core-backbone.com (81.95.15.70)
19375 ...
19386 499.02 ms 190.211.161.121
19397 483.18 ms 190.211.161.122
19408 ...
19419 483.23 ms fw-101.haulmer.net (168.232.164.68)
194210 483.26 ms blue127.dnsmisitio.net (186.64.118.40)
1943####################################################################################################################################
1944Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 11:40 EST
1945Nmap scan report for blue127.dnsmisitio.net (186.64.118.40)
1946Host is up (0.45s latency).
1947
1948PORT STATE SERVICE VERSION
194925/tcp open smtp?
1950|_smtp-commands: Couldn't establish connection on port 25
1951| smtp-enum-users:
1952|_ Couldn't establish connection on port 25
1953|_smtp-open-relay: Couldn't establish connection on port 25
1954Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
1955Device type: general purpose|storage-misc|firewall
1956Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (92%), Synology DiskStation Manager 5.X (86%), WatchGuard Fireware 11.X (86%), FreeBSD 6.X (85%)
1957OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/o:watchguard:fireware:11.8 cpe:/o:freebsd:freebsd:6.2
1958Aggressive OS guesses: Linux 3.10 - 3.12 (92%), Linux 4.4 (92%), Linux 4.9 (91%), Linux 2.6.18 - 2.6.22 (90%), Linux 3.10 (87%), Linux 3.10 - 3.16 (87%), Linux 4.0 (87%), Linux 2.6.18 (86%), Linux 3.10 - 4.11 (86%), Linux 3.11 - 4.1 (86%)
1959No exact OS matches for host (test conditions non-ideal).
1960Network Distance: 11 hops
1961
1962TRACEROUTE (using port 25/tcp)
1963HOP RTT ADDRESS
19641 316.71 ms 10.202.7.1
19652 316.74 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
19663 316.76 ms 5.56.20.161
19674 316.77 ms ae15-2029.fra30.core-backbone.com (81.95.15.70)
19685 ...
19696 433.55 ms 190.211.161.121
19707 549.49 ms 190.211.161.122
19718 ...
19729 449.33 ms fw-101.haulmer.net (168.232.164.68)
197310 ...
197411 585.70 ms blue127.dnsmisitio.net (186.64.118.40)
1975#####################################################################################################################################
1976Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 11:44 EST
1977Nmap scan report for blue127.dnsmisitio.net (186.64.118.40)
1978Host is up (0.24s latency).
1979
1980PORT STATE SERVICE VERSION
198167/tcp filtered dhcps
198267/udp open|filtered dhcps
1983|_dhcp-discover: ERROR: Script execution failed (use -d to debug)
1984Too many fingerprints match this host to give specific OS details
1985Network Distance: 10 hops
1986
1987TRACEROUTE (using proto 1/icmp)
1988HOP RTT ADDRESS
19891 333.51 ms 10.202.7.1
19902 333.55 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
19913 333.57 ms 5.56.20.161
19924 333.59 ms ae15-2029.fra30.core-backbone.com (81.95.15.70)
19935 ...
19946 566.20 ms 190.211.161.121
19957 566.24 ms 190.211.161.122
19968 ...
19979 566.27 ms fw-101.haulmer.net (168.232.164.68)
199810 566.32 ms blue127.dnsmisitio.net (186.64.118.40)
1999#####################################################################################################################################
2000Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 11:46 EST
2001Nmap scan report for mail.blue127.dnsmisitio.net (186.64.118.40)
2002Host is up (0.19s latency).
2003
2004PORT STATE SERVICE VERSION
200568/tcp filtered dhcpc
200668/udp open|filtered dhcpc
2007Too many fingerprints match this host to give specific OS details
2008Network Distance: 10 hops
2009
2010TRACEROUTE (using proto 1/icmp)
2011HOP RTT ADDRESS
20121 232.72 ms 10.202.7.1
20132 352.55 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
20143 352.57 ms 5.56.20.161
20154 352.58 ms ae15-2029.fra30.core-backbone.com (81.95.15.70)
20165 ...
20176 584.89 ms 190.211.161.121
20187 584.94 ms 190.211.161.122
20198 ...
20209 584.97 ms fw-101.haulmer.net (168.232.164.68)
202110 468.35 ms mail.blue127.dnsmisitio.net (186.64.118.40)
2022####################################################################################################################################
2023Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 11:47 EST
2024Nmap scan report for mail.blue127.dnsmisitio.net (186.64.118.40)
2025Host is up (0.18s latency).
2026
2027PORT STATE SERVICE VERSION
202869/tcp filtered tftp
202969/udp open|filtered tftp
2030Too many fingerprints match this host to give specific OS details
2031Network Distance: 10 hops
2032
2033TRACEROUTE (using proto 1/icmp)
2034HOP RTT ADDRESS
20351 232.80 ms 10.202.7.1
20362 348.37 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
20373 348.43 ms 5.56.20.161
20384 348.45 ms ae15-2029.fra30.core-backbone.com (81.95.15.70)
20395 ... 6
20407 580.04 ms 190.211.161.122
20418 ...
20429 580.11 ms fw-101.haulmer.net (168.232.164.68)
204310 464.46 ms mail.blue127.dnsmisitio.net (186.64.118.40)
2044####################################################################################################################################
2045Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 11:53 EST
2046NSE: [pop3-brute] usernames: Time limit 3m00s exceeded.
2047NSE: [pop3-brute] usernames: Time limit 3m00s exceeded.
2048NSE: [pop3-brute] passwords: Time limit 3m00s exceeded.
2049Nmap scan report for mail.blue127.dnsmisitio.net (186.64.118.40)
2050Host is up (0.29s latency).
2051
2052PORT STATE SERVICE VERSION
2053110/tcp open pop3 Dovecot pop3d
2054| pop3-brute:
2055| Accounts: No valid accounts found
2056|_ Statistics: Performed 206 guesses in 195 seconds, average tps: 1.0
2057|_pop3-capabilities: STLS SASL(PLAIN LOGIN) PIPELINING UIDL RESP-CODES CAPA USER TOP AUTH-RESP-CODE
2058Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2059Device type: general purpose|storage-misc
2060Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (90%), Synology DiskStation Manager 5.X (86%), FreeBSD 6.X (85%)
2061OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/o:freebsd:freebsd:6.2
2062Aggressive OS guesses: Linux 3.10 - 3.12 (90%), Linux 4.4 (90%), Linux 2.6.18 - 2.6.22 (90%), Linux 4.9 (89%), Linux 3.10 - 3.16 (87%), Linux 4.0 (87%), Linux 2.6.18 (86%), Linux 3.10 - 4.11 (86%), Linux 3.11 - 4.1 (86%), Linux 3.2 - 4.9 (86%)
2063No exact OS matches for host (test conditions non-ideal).
2064Network Distance: 10 hops
2065
2066TRACEROUTE (using port 110/tcp)
2067HOP RTT ADDRESS
20681 199.69 ms 10.202.7.1
20692 313.01 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
20703 313.06 ms 5.56.20.161
20714 313.08 ms ae15-2029.fra30.core-backbone.com (81.95.15.70)
20725 ...
20736 431.04 ms 190.211.161.121
20747 543.54 ms 190.211.161.122
20758 ...
20769 543.64 ms fw-101.haulmer.net (168.232.164.68)
207710 543.67 ms mail.blue127.dnsmisitio.net (186.64.118.40)
2078#####################################################################################################################################
2079Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 11:56 EST
2080Nmap scan report for blue127.dnsmisitio.net (186.64.118.40)
2081Host is up (0.16s latency).
2082
2083PORT STATE SERVICE VERSION
2084123/tcp filtered ntp
2085123/udp open|filtered ntp
2086Too many fingerprints match this host to give specific OS details
2087Network Distance: 10 hops
2088
2089TRACEROUTE (using proto 1/icmp)
2090HOP RTT ADDRESS
20911 225.47 ms 10.202.7.1
20922 337.47 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
20933 337.49 ms 5.56.20.161
20944 337.51 ms ae15-2029.fra30.core-backbone.com (81.95.15.70)
20955 ...
20966 561.31 ms 190.211.161.121
20977 561.36 ms 190.211.161.122
20988 ...
20999 525.11 ms fw-101.haulmer.net (168.232.164.68)
210010 449.48 ms blue127.dnsmisitio.net (186.64.118.40)
2101#####################################################################################################################################
2102Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 12:20 EST
2103Nmap scan report for blue127.dnsmisitio.net (186.64.118.40)
2104Host is up (0.30s latency).
2105
2106PORT STATE SERVICE VERSION
210753/tcp filtered domain
210867/tcp filtered dhcps
210968/tcp filtered dhcpc
211069/tcp filtered tftp
211188/tcp filtered kerberos-sec
2112123/tcp filtered ntp
2113137/tcp filtered netbios-ns
2114138/tcp filtered netbios-dgm
2115139/tcp filtered netbios-ssn
2116161/tcp filtered snmp
2117162/tcp filtered snmptrap
2118389/tcp filtered ldap
2119520/tcp filtered efs
21202049/tcp closed nfs
212153/udp closed domain
212267/udp open|filtered dhcps
212368/udp open|filtered dhcpc
212469/udp open|filtered tftp
212588/udp open|filtered kerberos-sec
2126123/udp open|filtered ntp
2127137/udp open|filtered netbios-ns
2128138/udp open|filtered netbios-dgm
2129139/udp open|filtered netbios-ssn
2130161/udp open|filtered snmp
2131162/udp open|filtered snmptrap
2132389/udp open|filtered ldap
2133520/udp open|filtered route
21342049/udp open|filtered nfs
2135Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2136Aggressive OS guesses: Acorp W400G or W422G wireless ADSL modem (MontaVista embedded Linux 2.4.17) (96%), Actiontec GT701 DSL modem (96%), Aerohive HiveOS 6.8 (96%), AT&T NetGate SG8100 router (96%), AVM FRITZ!Box FON WLAN 7050, Linksys WAG200G, or Netgear DG834GT wireless broadband router (96%), AVM FRITZ!Box FON WLAN 7170 WAP (96%), Axceint Uptiva backup appliance (96%), Check Point UTM-1 Edge X firewall (96%), Cisco NME-NAM-80S network analysis module (96%), Cisco Unified Communications Manager VoIP adapter (96%)
2137No exact OS matches for host (test conditions non-ideal).
2138Network Distance: 10 hops
2139
2140TRACEROUTE (using port 2049/tcp)
2141HOP RTT ADDRESS
21421 195.68 ms 10.202.7.1
21432 195.71 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
21443 195.73 ms 5.56.20.161
21454 195.74 ms ae15-2029.fra30.core-backbone.com (81.95.15.70)
21465 ...
21476 411.28 ms 190.211.161.121
21487 523.80 ms 190.211.161.122
21498 ...
21509 523.78 ms fw-101.haulmer.net (168.232.164.68)
215110 523.84 ms blue127.dnsmisitio.net (186.64.118.40)
2152#####################################################################################################################################
2153Hosts
2154=====
2155
2156address mac name os_name os_flavor os_sp purpose info comments
2157------- --- ---- ------- --------- ----- ------- ---- --------
215834.236.0.217 ec2-34-236-0-217.compute-1.amazonaws.com Linux 3.X server
215937.1.207.121 teens-sins.net 2-Series 3.X device
216043.245.223.4 Linux 2.6.X server
216145.60.47.218 Linux 3.X server
216245.88.202.111 Linux 3.X server
216352.1.174.10 ec2-52-1-174-10.compute-1.amazonaws.com Linux 3.X server
216454.85.59.109 ec2-54-85-59-109.compute-1.amazonaws.com Linux 3.X server
216564.69.94.253 Unknown device
216669.163.233.4 ps54052.dreamhostps.com Linux 14.04 server
216774.117.180.192 embedded device
216882.94.222.131 Unknown device
216992.123.250.35 a92-123-250-35.deploy.static.akamaitechnologies.com embedded device
217092.123.250.65 a92-123-250-65.deploy.static.akamaitechnologies.com Linux 3.X server
2171104.244.73.40 Unknown device
2172104.244.76.231 Linux 3.X server
2173104.244.77.188 Linux 3.X server
2174104.244.79.89 Linux 3.X server
2175111.90.145.39 web16.support-emilid.com Linux 2.6.X server
2176143.95.110.248 ip-143-95-110-248.iplocal Linux 3.X server
2177149.126.72.220 149.126.72.220.ip.incapdns.net Linux 3.X server
2178151.106.38.107 ns3152160.ip-151-106-38.eu embedded device
2179158.69.13.254 ip254.ip-158-69-13.net 2-Series 2.6.X device
2180162.244.35.13 xnlog.com FreeBSD 7.X device
2181169.239.218.20 cp10.domains.co.za Linux 2.6.X server
2182173.214.244.169 173.214.244.169.serverel.net Unknown device
2183174.142.53.51 mail.marineland.ca Linux 3.X server
2184186.64.118.40 mail.blue127.dnsmisitio.net embedded device
2185190.98.209.37 static.190.98.209.37.gtdinternet.com Unknown device
2186190.153.209.187 static.190.153.209.187.gtdinternet.com Unknown device
2187190.153.219.254 mail.evopoli.cl Linux 3.X server
2188200.2.249.28 Linux 3.X server
2189200.29.0.33 cp33.puntoweb.cl Unknown device
2190200.55.198.228 Linux 2.4.X server
2191200.68.34.99 Unknown device
2192200.73.54.34 mail.maxtel.cl Linux 2.6.X server
2193204.93.193.141 suzuka.mochahost.com Unknown device
2194206.48.140.40 Unknown device
2195207.246.147.189 2-Series device
2196207.246.147.190 Linux 4.X server
2197207.246.147.247 Linux 4.X server
2198207.246.147.248 Linux 4.X server
2199211.13.196.135 sv3.isle.ne.jp Linux 2.6.X server
2200212.174.0.150 Windows 2012 server
2201218.45.5.97 www.town.koya.wakayama.jp Linux 2.6.X server
2202####################################################################################################################################
2203Services
2204========
2205
2206host port proto name state info
2207---- ---- ----- ---- ----- ----
220834.236.0.217 53 tcp domain filtered
220934.236.0.217 53 udp domain unknown
221034.236.0.217 67 tcp dhcps filtered
221134.236.0.217 67 udp dhcps unknown
221234.236.0.217 68 tcp dhcpc filtered
221334.236.0.217 68 udp dhcpc unknown
221434.236.0.217 69 tcp tftp filtered
221534.236.0.217 69 udp tftp unknown
221634.236.0.217 80 tcp http open nginx
221734.236.0.217 88 tcp kerberos-sec filtered
221834.236.0.217 88 udp kerberos-sec unknown
221934.236.0.217 123 tcp ntp filtered
222034.236.0.217 123 udp ntp unknown
222134.236.0.217 137 tcp netbios-ns filtered
222234.236.0.217 137 udp netbios-ns unknown
222334.236.0.217 138 tcp netbios-dgm filtered
222434.236.0.217 138 udp netbios-dgm unknown
222534.236.0.217 139 tcp netbios-ssn filtered
222634.236.0.217 139 udp netbios-ssn unknown
222734.236.0.217 161 tcp snmp filtered
222834.236.0.217 161 udp snmp unknown
222934.236.0.217 162 tcp snmptrap filtered
223034.236.0.217 162 udp snmptrap unknown
223134.236.0.217 389 tcp ldap filtered
223234.236.0.217 389 udp ldap unknown
223334.236.0.217 443 tcp ssl/http open nginx
223434.236.0.217 520 tcp efs filtered
223534.236.0.217 520 udp route unknown
223634.236.0.217 2049 tcp nfs filtered
223734.236.0.217 2049 udp nfs unknown
223837.1.207.121 53 tcp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
223937.1.207.121 53 udp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
224037.1.207.121 67 tcp dhcps filtered
224137.1.207.121 67 udp dhcps unknown
224237.1.207.121 68 tcp dhcpc filtered
224337.1.207.121 68 udp dhcpc filtered
224437.1.207.121 69 tcp tftp filtered
224537.1.207.121 69 udp tftp unknown
224637.1.207.121 88 tcp kerberos-sec filtered
224737.1.207.121 88 udp kerberos-sec filtered
224837.1.207.121 123 tcp ntp filtered
224937.1.207.121 123 udp ntp unknown
225037.1.207.121 137 tcp netbios-ns filtered
225137.1.207.121 137 udp netbios-ns unknown
225237.1.207.121 138 tcp netbios-dgm filtered
225337.1.207.121 138 udp netbios-dgm unknown
225437.1.207.121 139 tcp netbios-ssn filtered
225537.1.207.121 139 udp netbios-ssn unknown
225637.1.207.121 161 tcp snmp filtered
225737.1.207.121 161 udp snmp unknown
225837.1.207.121 162 tcp snmptrap filtered
225937.1.207.121 162 udp snmptrap unknown
226037.1.207.121 389 tcp ldap filtered
226137.1.207.121 389 udp ldap unknown
226237.1.207.121 520 tcp efs filtered
226337.1.207.121 520 udp route unknown
226437.1.207.121 2049 tcp nfs filtered
226537.1.207.121 2049 udp nfs filtered
226643.245.223.4 80 tcp http open nginx
226743.245.223.4 443 tcp ssl/http open nginx
226843.245.223.4 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
226945.60.47.218 25 tcp http open Incapsula CDN httpd
227045.60.47.218 53 tcp domain open
227145.60.47.218 53 udp domain open
227245.60.47.218 67 udp dhcps unknown
227345.60.47.218 68 udp dhcpc unknown
227445.60.47.218 69 udp tftp unknown
227545.60.47.218 80 tcp http open Incapsula CDN httpd
227645.60.47.218 81 tcp http open Incapsula CDN httpd
227745.60.47.218 85 tcp http open Incapsula CDN httpd
227845.60.47.218 88 tcp http open Incapsula CDN httpd
227945.60.47.218 88 udp kerberos-sec unknown
228045.60.47.218 123 udp ntp unknown
228145.60.47.218 137 udp netbios-ns unknown
228245.60.47.218 138 udp netbios-dgm unknown
228345.60.47.218 139 udp netbios-ssn unknown
228445.60.47.218 161 udp snmp unknown
228545.60.47.218 162 udp snmptrap unknown
228645.60.47.218 389 tcp ssl/http open Incapsula CDN httpd
228745.60.47.218 389 udp ldap unknown
228845.60.47.218 443 tcp ssl/http open Incapsula CDN httpd
228945.60.47.218 444 tcp ssl/http open Incapsula CDN httpd
229045.60.47.218 445 tcp ssl/http open Incapsula CDN httpd
229145.60.47.218 446 tcp http open Incapsula CDN httpd
229245.60.47.218 520 udp route unknown
229345.60.47.218 587 tcp http open Incapsula CDN httpd
229445.60.47.218 631 tcp http open Incapsula CDN httpd
229545.60.47.218 888 tcp http open Incapsula CDN httpd
229645.60.47.218 995 tcp ssl/http open Incapsula CDN httpd
229745.60.47.218 998 tcp ssl/http open Incapsula CDN httpd
229845.60.47.218 999 tcp http open Incapsula CDN httpd
229945.60.47.218 1000 tcp http open Incapsula CDN httpd
230045.60.47.218 1024 tcp http open Incapsula CDN httpd
230145.60.47.218 1103 tcp http open Incapsula CDN httpd
230245.60.47.218 1234 tcp http open Incapsula CDN httpd
230345.60.47.218 1433 tcp http open Incapsula CDN httpd
230445.60.47.218 1494 tcp http open Incapsula CDN httpd
230545.60.47.218 2000 tcp ssl/http open Incapsula CDN httpd
230645.60.47.218 2001 tcp http open Incapsula CDN httpd
230745.60.47.218 2049 tcp http open Incapsula CDN httpd
230845.60.47.218 2049 udp nfs unknown
230945.60.47.218 2067 tcp http open Incapsula CDN httpd
231045.60.47.218 2100 tcp ssl/http open Incapsula CDN httpd
231145.60.47.218 2222 tcp http open Incapsula CDN httpd
231245.60.47.218 2598 tcp http open Incapsula CDN httpd
231345.60.47.218 3000 tcp http open Incapsula CDN httpd
231445.60.47.218 3050 tcp http open Incapsula CDN httpd
231545.60.47.218 3057 tcp http open Incapsula CDN httpd
231645.60.47.218 3299 tcp http open Incapsula CDN httpd
231745.60.47.218 3306 tcp ssl/http open Incapsula CDN httpd
231845.60.47.218 3333 tcp http open Incapsula CDN httpd
231945.60.47.218 3389 tcp ssl/http open Incapsula CDN httpd
232045.60.47.218 3500 tcp http open Incapsula CDN httpd
232145.60.47.218 3790 tcp http open Incapsula CDN httpd
232245.60.47.218 4000 tcp http open Incapsula CDN httpd
232345.60.47.218 4444 tcp ssl/http open Incapsula CDN httpd
232445.60.47.218 4445 tcp ssl/http open Incapsula CDN httpd
232545.60.47.218 4848 tcp http open Incapsula CDN httpd
232645.60.47.218 5000 tcp http open Incapsula CDN httpd
232745.60.47.218 5009 tcp http open Incapsula CDN httpd
232845.60.47.218 5051 tcp ssl/http open Incapsula CDN httpd
232945.60.47.218 5060 tcp ssl/http open Incapsula CDN httpd
233045.60.47.218 5061 tcp ssl/http open Incapsula CDN httpd
233145.60.47.218 5227 tcp ssl/http open Incapsula CDN httpd
233245.60.47.218 5247 tcp ssl/http open Incapsula CDN httpd
233345.60.47.218 5250 tcp ssl/http open Incapsula CDN httpd
233445.60.47.218 5555 tcp http open Incapsula CDN httpd
233545.60.47.218 5900 tcp http open Incapsula CDN httpd
233645.60.47.218 5901 tcp ssl/http open Incapsula CDN httpd
233745.60.47.218 5902 tcp ssl/http open Incapsula CDN httpd
233845.60.47.218 5903 tcp ssl/http open Incapsula CDN httpd
233945.60.47.218 5904 tcp ssl/http open Incapsula CDN httpd
234045.60.47.218 5905 tcp ssl/http open Incapsula CDN httpd
234145.60.47.218 5906 tcp ssl/http open Incapsula CDN httpd
234245.60.47.218 5907 tcp ssl/http open Incapsula CDN httpd
234345.60.47.218 5908 tcp ssl/http open Incapsula CDN httpd
234445.60.47.218 5909 tcp ssl/http open Incapsula CDN httpd
234545.60.47.218 5910 tcp ssl/http open Incapsula CDN httpd
234645.60.47.218 5920 tcp ssl/http open Incapsula CDN httpd
234745.60.47.218 5984 tcp ssl/http open Incapsula CDN httpd
234845.60.47.218 5985 tcp http open Incapsula CDN httpd
234945.60.47.218 5986 tcp ssl/http open Incapsula CDN httpd
235045.60.47.218 5999 tcp ssl/http open Incapsula CDN httpd
235145.60.47.218 6000 tcp http open Incapsula CDN httpd
235245.60.47.218 6060 tcp http open Incapsula CDN httpd
235345.60.47.218 6161 tcp http open Incapsula CDN httpd
235445.60.47.218 6379 tcp http open Incapsula CDN httpd
235545.60.47.218 6661 tcp ssl/http open Incapsula CDN httpd
235645.60.47.218 6789 tcp http open Incapsula CDN httpd
235745.60.47.218 7000 tcp ssl/http open Incapsula CDN httpd
235845.60.47.218 7001 tcp http open Incapsula CDN httpd
235945.60.47.218 7021 tcp http open Incapsula CDN httpd
236045.60.47.218 7071 tcp ssl/http open Incapsula CDN httpd
236145.60.47.218 7080 tcp http open Incapsula CDN httpd
236245.60.47.218 7272 tcp ssl/http open Incapsula CDN httpd
236345.60.47.218 7443 tcp ssl/http open Incapsula CDN httpd
236445.60.47.218 7700 tcp http open Incapsula CDN httpd
236545.60.47.218 7777 tcp http open Incapsula CDN httpd
236645.60.47.218 7778 tcp http open Incapsula CDN httpd
236745.60.47.218 8000 tcp http open Incapsula CDN httpd
236845.60.47.218 8001 tcp http open Incapsula CDN httpd
236945.60.47.218 8008 tcp http open Incapsula CDN httpd
237045.60.47.218 8014 tcp http open Incapsula CDN httpd
237145.60.47.218 8020 tcp http open Incapsula CDN httpd
237245.60.47.218 8023 tcp http open Incapsula CDN httpd
237345.60.47.218 8028 tcp http open Incapsula CDN httpd
237445.60.47.218 8030 tcp http open Incapsula CDN httpd
237545.60.47.218 8050 tcp http open Incapsula CDN httpd
237645.60.47.218 8051 tcp http open Incapsula CDN httpd
237745.60.47.218 8080 tcp http open Incapsula CDN httpd
237845.60.47.218 8081 tcp http open Incapsula CDN httpd
237945.60.47.218 8082 tcp http open Incapsula CDN httpd
238045.60.47.218 8085 tcp http open Incapsula CDN httpd
238145.60.47.218 8086 tcp http open Incapsula CDN httpd
238245.60.47.218 8087 tcp http open Incapsula CDN httpd
238345.60.47.218 8088 tcp http open Incapsula CDN httpd
238445.60.47.218 8090 tcp http open Incapsula CDN httpd
238545.60.47.218 8091 tcp http open Incapsula CDN httpd
238645.60.47.218 8095 tcp http open Incapsula CDN httpd
238745.60.47.218 8101 tcp http open Incapsula CDN httpd
238845.60.47.218 8161 tcp http open Incapsula CDN httpd
238945.60.47.218 8180 tcp http open Incapsula CDN httpd
239045.60.47.218 8222 tcp http open Incapsula CDN httpd
239145.60.47.218 8333 tcp http open Incapsula CDN httpd
239245.60.47.218 8443 tcp ssl/http open Incapsula CDN httpd
239345.60.47.218 8444 tcp http open Incapsula CDN httpd
239445.60.47.218 8445 tcp http open Incapsula CDN httpd
239545.60.47.218 8503 tcp ssl/http open Incapsula CDN httpd
239645.60.47.218 8686 tcp http open Incapsula CDN httpd
239745.60.47.218 8701 tcp ssl/http open Incapsula CDN httpd
239845.60.47.218 8787 tcp http open Incapsula CDN httpd
239945.60.47.218 8800 tcp http open Incapsula CDN httpd
240045.60.47.218 8812 tcp http open Incapsula CDN httpd
240145.60.47.218 8834 tcp http open Incapsula CDN httpd
240245.60.47.218 8880 tcp http open Incapsula CDN httpd
240345.60.47.218 8888 tcp http open Incapsula CDN httpd
240445.60.47.218 8889 tcp http open Incapsula CDN httpd
240545.60.47.218 8890 tcp http open Incapsula CDN httpd
240645.60.47.218 8899 tcp http open Incapsula CDN httpd
240745.60.47.218 8901 tcp http open Incapsula CDN httpd
240845.60.47.218 8902 tcp http open Incapsula CDN httpd
240945.60.47.218 8999 tcp http open Incapsula CDN httpd
241045.60.47.218 9000 tcp http open Incapsula CDN httpd
241145.60.47.218 9001 tcp http open Incapsula CDN httpd
241245.60.47.218 9002 tcp http open Incapsula CDN httpd
241345.60.47.218 9003 tcp http open Incapsula CDN httpd
241445.60.47.218 9004 tcp http open Incapsula CDN httpd
241545.60.47.218 9005 tcp http open Incapsula CDN httpd
241645.60.47.218 9010 tcp http open Incapsula CDN httpd
241745.60.47.218 9050 tcp http open Incapsula CDN httpd
241845.60.47.218 9080 tcp http open Incapsula CDN httpd
241945.60.47.218 9081 tcp ssl/http open Incapsula CDN httpd
242045.60.47.218 9084 tcp http open Incapsula CDN httpd
242145.60.47.218 9090 tcp http open Incapsula CDN httpd
242245.60.47.218 9099 tcp http open Incapsula CDN httpd
242345.60.47.218 9100 tcp jetdirect open
242445.60.47.218 9111 tcp http open Incapsula CDN httpd
242545.60.47.218 9200 tcp http open Incapsula CDN httpd
242645.60.47.218 9300 tcp http open Incapsula CDN httpd
242745.60.47.218 9500 tcp http open Incapsula CDN httpd
242845.60.47.218 9711 tcp ssl/http open Incapsula CDN httpd
242945.60.47.218 9991 tcp http open Incapsula CDN httpd
243045.60.47.218 9999 tcp http open Incapsula CDN httpd
243145.60.47.218 10000 tcp http open Incapsula CDN httpd
243245.60.47.218 10001 tcp http open Incapsula CDN httpd
243345.60.47.218 10008 tcp http open Incapsula CDN httpd
243445.60.47.218 10443 tcp ssl/http open Incapsula CDN httpd
243545.60.47.218 11001 tcp ssl/http open Incapsula CDN httpd
243645.60.47.218 12174 tcp http open Incapsula CDN httpd
243745.60.47.218 12203 tcp http open Incapsula CDN httpd
243845.60.47.218 12221 tcp http open Incapsula CDN httpd
243945.60.47.218 12345 tcp http open Incapsula CDN httpd
244045.60.47.218 12397 tcp http open Incapsula CDN httpd
244145.60.47.218 12401 tcp http open Incapsula CDN httpd
244245.60.47.218 14330 tcp http open Incapsula CDN httpd
244345.60.47.218 16000 tcp http open Incapsula CDN httpd
244445.60.47.218 20000 tcp http open Incapsula CDN httpd
244545.60.47.218 20010 tcp ssl/http open Incapsula CDN httpd
244645.60.47.218 25000 tcp ssl/http open Incapsula CDN httpd
244745.60.47.218 30000 tcp http open Incapsula CDN httpd
244845.60.47.218 44334 tcp ssl/http open Incapsula CDN httpd
244945.60.47.218 50000 tcp http open Incapsula CDN httpd
245045.60.47.218 50001 tcp ssl/http open Incapsula CDN httpd
245145.60.47.218 50050 tcp ssl/http open Incapsula CDN httpd
245245.88.202.111 22 tcp ssh open OpenSSH 7.9p1 Debian 10+deb10u1 protocol 2.0
245345.88.202.111 53 tcp domain open PowerDNS Authoritative Server 4.2.0-rc3
245445.88.202.111 53 udp domain open PowerDNS Authoritative Server 4.2.0-rc3
245545.88.202.111 67 tcp dhcps closed
245645.88.202.111 67 udp dhcps unknown
245745.88.202.111 68 tcp dhcpc closed
245845.88.202.111 68 udp dhcpc unknown
245945.88.202.111 69 tcp tftp closed
246045.88.202.111 69 udp tftp closed
246145.88.202.111 80 tcp http open nginx
246245.88.202.111 88 tcp kerberos-sec closed
246345.88.202.111 88 udp kerberos-sec unknown
246445.88.202.111 123 tcp ntp closed
246545.88.202.111 123 udp ntp closed
246645.88.202.111 137 tcp netbios-ns closed
246745.88.202.111 137 udp netbios-ns filtered
246845.88.202.111 138 tcp netbios-dgm closed
246945.88.202.111 138 udp netbios-dgm filtered
247045.88.202.111 139 tcp netbios-ssn closed
247145.88.202.111 139 udp netbios-ssn closed
247245.88.202.111 161 tcp snmp closed
247345.88.202.111 161 udp snmp closed
247445.88.202.111 162 tcp snmptrap closed
247545.88.202.111 162 udp snmptrap closed
247645.88.202.111 179 tcp bgp filtered
247745.88.202.111 389 tcp ldap closed
247845.88.202.111 389 udp ldap unknown
247945.88.202.111 443 tcp ssl/http open nginx
248045.88.202.111 520 tcp efs closed
248145.88.202.111 520 udp route unknown
248245.88.202.111 2049 tcp nfs closed
248345.88.202.111 2049 udp nfs closed
248445.88.202.111 10050 tcp tcpwrapped open
248552.1.174.10 53 tcp domain filtered
248652.1.174.10 53 udp domain unknown
248752.1.174.10 67 tcp dhcps filtered
248852.1.174.10 67 udp dhcps unknown
248952.1.174.10 68 tcp dhcpc filtered
249052.1.174.10 68 udp dhcpc unknown
249152.1.174.10 69 tcp tftp filtered
249252.1.174.10 69 udp tftp unknown
249352.1.174.10 80 tcp http open nginx
249452.1.174.10 88 tcp kerberos-sec filtered
249552.1.174.10 88 udp kerberos-sec unknown
249652.1.174.10 123 tcp ntp filtered
249752.1.174.10 123 udp ntp unknown
249852.1.174.10 137 tcp netbios-ns filtered
249952.1.174.10 137 udp netbios-ns unknown
250052.1.174.10 138 tcp netbios-dgm filtered
250152.1.174.10 138 udp netbios-dgm unknown
250252.1.174.10 139 tcp netbios-ssn filtered
250352.1.174.10 139 udp netbios-ssn unknown
250452.1.174.10 161 tcp snmp filtered
250552.1.174.10 161 udp snmp unknown
250652.1.174.10 162 tcp snmptrap filtered
250752.1.174.10 162 udp snmptrap unknown
250852.1.174.10 389 tcp ldap filtered
250952.1.174.10 389 udp ldap unknown
251052.1.174.10 443 tcp ssl/http open nginx
251152.1.174.10 520 tcp efs filtered
251252.1.174.10 520 udp route unknown
251352.1.174.10 2049 tcp nfs filtered
251452.1.174.10 2049 udp nfs unknown
251554.85.59.109 53 tcp domain filtered
251654.85.59.109 53 udp domain unknown
251754.85.59.109 67 tcp dhcps filtered
251854.85.59.109 67 udp dhcps unknown
251954.85.59.109 68 tcp dhcpc filtered
252054.85.59.109 68 udp dhcpc unknown
252154.85.59.109 69 tcp tftp filtered
252254.85.59.109 69 udp tftp unknown
252354.85.59.109 80 tcp http open nginx
252454.85.59.109 88 tcp kerberos-sec filtered
252554.85.59.109 88 udp kerberos-sec unknown
252654.85.59.109 123 tcp ntp filtered
252754.85.59.109 123 udp ntp unknown
252854.85.59.109 137 tcp netbios-ns filtered
252954.85.59.109 137 udp netbios-ns unknown
253054.85.59.109 138 tcp netbios-dgm filtered
253154.85.59.109 138 udp netbios-dgm unknown
253254.85.59.109 139 tcp netbios-ssn filtered
253354.85.59.109 139 udp netbios-ssn unknown
253454.85.59.109 161 tcp snmp filtered
253554.85.59.109 161 udp snmp unknown
253654.85.59.109 162 tcp snmptrap filtered
253754.85.59.109 162 udp snmptrap unknown
253854.85.59.109 389 tcp ldap filtered
253954.85.59.109 389 udp ldap unknown
254054.85.59.109 443 tcp ssl/http open nginx
254154.85.59.109 520 tcp efs filtered
254254.85.59.109 520 udp route unknown
254354.85.59.109 2049 tcp nfs filtered
254454.85.59.109 2049 udp nfs unknown
254564.69.94.253 53 tcp domain filtered
254664.69.94.253 53 udp domain unknown
254764.69.94.253 67 tcp dhcps filtered
254864.69.94.253 67 udp dhcps unknown
254964.69.94.253 68 tcp dhcpc filtered
255064.69.94.253 68 udp dhcpc unknown
255164.69.94.253 69 tcp tftp filtered
255264.69.94.253 69 udp tftp unknown
255364.69.94.253 88 tcp kerberos-sec filtered
255464.69.94.253 88 udp kerberos-sec unknown
255564.69.94.253 123 tcp ntp filtered
255664.69.94.253 123 udp ntp unknown
255764.69.94.253 137 tcp netbios-ns filtered
255864.69.94.253 137 udp netbios-ns unknown
255964.69.94.253 138 tcp netbios-dgm filtered
256064.69.94.253 138 udp netbios-dgm unknown
256164.69.94.253 139 tcp netbios-ssn filtered
256264.69.94.253 139 udp netbios-ssn unknown
256364.69.94.253 161 tcp snmp filtered
256464.69.94.253 161 udp snmp unknown
256564.69.94.253 162 tcp snmptrap filtered
256664.69.94.253 162 udp snmptrap unknown
256764.69.94.253 389 tcp ldap filtered
256864.69.94.253 389 udp ldap unknown
256964.69.94.253 520 tcp efs filtered
257064.69.94.253 520 udp route unknown
257164.69.94.253 2049 tcp nfs filtered
257264.69.94.253 2049 udp nfs unknown
257369.163.233.4 21 tcp ftp open 220 DreamHost FTP Server\x0d\x0a
257469.163.233.4 22 tcp ssh open SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.13
257569.163.233.4 25 tcp open
257669.163.233.4 53 tcp domain closed
257769.163.233.4 53 udp domain unknown
257869.163.233.4 67 tcp dhcps closed
257969.163.233.4 67 udp dhcps closed
258069.163.233.4 68 tcp dhcpc closed
258169.163.233.4 68 udp dhcpc unknown
258269.163.233.4 69 tcp tftp closed
258369.163.233.4 69 udp tftp closed
258469.163.233.4 88 tcp kerberos-sec closed
258569.163.233.4 88 udp kerberos-sec unknown
258669.163.233.4 123 tcp ntp closed
258769.163.233.4 123 udp ntp unknown
258869.163.233.4 137 tcp netbios-ns closed
258969.163.233.4 137 udp netbios-ns closed
259069.163.233.4 138 tcp netbios-dgm closed
259169.163.233.4 138 udp netbios-dgm closed
259269.163.233.4 139 tcp netbios-ssn closed
259369.163.233.4 139 udp netbios-ssn unknown
259469.163.233.4 161 tcp snmp closed
259569.163.233.4 161 udp snmp closed
259669.163.233.4 162 tcp snmptrap closed
259769.163.233.4 162 udp snmptrap closed
259869.163.233.4 389 tcp ldap closed
259969.163.233.4 389 udp ldap unknown
260069.163.233.4 520 tcp efs closed
260169.163.233.4 520 udp route closed
260269.163.233.4 2049 tcp nfs closed
260369.163.233.4 2049 udp nfs unknown
260474.117.180.192 21 tcp ftp filtered 220 Hello.\x0d\x0a
260574.117.180.192 22 tcp ssh filtered
260674.117.180.192 25 tcp smtp filtered
260774.117.180.192 53 tcp domain closed
260874.117.180.192 53 udp domain unknown
260974.117.180.192 67 tcp dhcps closed
261074.117.180.192 67 udp dhcps unknown
261174.117.180.192 68 tcp dhcpc closed
261274.117.180.192 68 udp dhcpc closed
261374.117.180.192 69 tcp tftp closed
261474.117.180.192 69 udp tftp closed
261574.117.180.192 80 tcp http filtered
261674.117.180.192 88 tcp kerberos-sec closed
261774.117.180.192 88 udp kerberos-sec closed
261874.117.180.192 110 tcp pop3 filtered
261974.117.180.192 111 tcp rpcbind filtered
262074.117.180.192 123 tcp ntp closed
262174.117.180.192 123 udp ntp unknown
262274.117.180.192 137 tcp netbios-ns closed
262374.117.180.192 137 udp netbios-ns closed
262474.117.180.192 138 tcp netbios-dgm closed
262574.117.180.192 138 udp netbios-dgm unknown
262674.117.180.192 139 tcp netbios-ssn closed
262774.117.180.192 139 udp netbios-ssn unknown
262874.117.180.192 143 tcp imap filtered
262974.117.180.192 161 tcp snmp closed
263074.117.180.192 161 udp snmp closed
263174.117.180.192 162 tcp snmptrap closed
263274.117.180.192 162 udp snmptrap unknown
263374.117.180.192 323 tcp rpki-rtr filtered
263474.117.180.192 389 tcp ldap closed
263574.117.180.192 389 udp ldap closed
263674.117.180.192 443 tcp https filtered
263774.117.180.192 465 tcp ssl/smtp open Exim smtpd 4.92.3
263874.117.180.192 520 tcp efs closed
263974.117.180.192 520 udp route unknown
264074.117.180.192 587 tcp submission filtered
264174.117.180.192 873 tcp rsync filtered
264274.117.180.192 993 tcp imaps filtered
264374.117.180.192 995 tcp pop3s filtered
264474.117.180.192 2049 tcp nfs closed
264574.117.180.192 2049 udp nfs closed
264674.117.180.192 2525 tcp smtp open Exim smtpd
264774.117.180.192 3306 tcp mysql filtered
264874.117.180.192 4949 tcp tcpwrapped open
264974.117.180.192 5666 tcp tcpwrapped open
265074.117.180.192 6380 tcp filtered
265174.117.180.192 9306 tcp sphinx-search open Sphinx Search daemon 2.1.5-id64-release
265274.117.180.192 11211 tcp memcache filtered
265382.94.222.131 53 udp domain unknown
265482.94.222.131 67 udp dhcps unknown
265582.94.222.131 68 udp dhcpc unknown
265682.94.222.131 69 udp tftp unknown
265782.94.222.131 88 udp kerberos-sec unknown
265882.94.222.131 123 udp ntp unknown
265982.94.222.131 137 udp netbios-ns unknown
266082.94.222.131 138 udp netbios-dgm unknown
266182.94.222.131 139 udp netbios-ssn unknown
266282.94.222.131 161 udp snmp unknown
266382.94.222.131 162 udp snmptrap unknown
266482.94.222.131 389 udp ldap unknown
266582.94.222.131 520 udp route unknown
266682.94.222.131 2049 udp nfs unknown
266792.123.250.35 53 tcp domain closed
266892.123.250.35 53 udp domain closed
266992.123.250.35 67 tcp dhcps filtered
267092.123.250.35 67 udp dhcps unknown
267192.123.250.35 68 tcp dhcpc filtered
267292.123.250.35 68 udp dhcpc unknown
267392.123.250.35 69 tcp tftp filtered
267492.123.250.35 69 udp tftp unknown
267592.123.250.35 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
267692.123.250.35 88 tcp kerberos-sec filtered
267792.123.250.35 88 udp kerberos-sec unknown
267892.123.250.35 123 tcp ntp filtered
267992.123.250.35 123 udp ntp unknown
268092.123.250.35 137 tcp netbios-ns filtered
268192.123.250.35 137 udp netbios-ns unknown
268292.123.250.35 138 tcp netbios-dgm filtered
268392.123.250.35 138 udp netbios-dgm unknown
268492.123.250.35 139 tcp netbios-ssn filtered
268592.123.250.35 139 udp netbios-ssn unknown
268692.123.250.35 161 tcp snmp filtered
268792.123.250.35 161 udp snmp unknown
268892.123.250.35 162 tcp snmptrap filtered
268992.123.250.35 162 udp snmptrap unknown
269092.123.250.35 389 tcp ldap filtered
269192.123.250.35 389 udp ldap unknown
269292.123.250.35 443 tcp ssl/https open
269392.123.250.35 520 tcp efs filtered
269492.123.250.35 520 udp route unknown
269592.123.250.35 2049 tcp nfs filtered
269692.123.250.35 2049 udp nfs unknown
269792.123.250.35 8883 tcp secure-mqtt open
269892.123.250.65 53 tcp domain filtered
269992.123.250.65 53 udp domain unknown
270092.123.250.65 67 tcp dhcps filtered
270192.123.250.65 67 udp dhcps unknown
270292.123.250.65 68 tcp dhcpc filtered
270392.123.250.65 68 udp dhcpc unknown
270492.123.250.65 69 tcp tftp filtered
270592.123.250.65 69 udp tftp unknown
270692.123.250.65 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
270792.123.250.65 88 tcp kerberos-sec filtered
270892.123.250.65 88 udp kerberos-sec unknown
270992.123.250.65 123 tcp ntp filtered
271092.123.250.65 123 udp ntp unknown
271192.123.250.65 137 tcp netbios-ns filtered
271292.123.250.65 137 udp netbios-ns unknown
271392.123.250.65 138 tcp netbios-dgm filtered
271492.123.250.65 138 udp netbios-dgm unknown
271592.123.250.65 139 tcp netbios-ssn filtered
271692.123.250.65 139 udp netbios-ssn unknown
271792.123.250.65 161 tcp snmp filtered
271892.123.250.65 161 udp snmp unknown
271992.123.250.65 162 tcp snmptrap filtered
272092.123.250.65 162 udp snmptrap unknown
272192.123.250.65 389 tcp ldap filtered
272292.123.250.65 389 udp ldap unknown
272392.123.250.65 443 tcp ssl/https open
272492.123.250.65 520 tcp efs filtered
272592.123.250.65 520 udp route unknown
272692.123.250.65 2049 tcp nfs filtered
272792.123.250.65 2049 udp nfs unknown
272892.123.250.65 8883 tcp secure-mqtt open
2729104.244.73.40 53 udp domain unknown
2730104.244.73.40 67 udp dhcps unknown
2731104.244.73.40 68 udp dhcpc unknown
2732104.244.73.40 69 udp tftp unknown
2733104.244.73.40 88 udp kerberos-sec unknown
2734104.244.73.40 123 udp ntp unknown
2735104.244.73.40 137 udp netbios-ns unknown
2736104.244.73.40 138 udp netbios-dgm unknown
2737104.244.73.40 139 udp netbios-ssn unknown
2738104.244.73.40 161 udp snmp unknown
2739104.244.73.40 162 udp snmptrap unknown
2740104.244.73.40 389 udp ldap unknown
2741104.244.73.40 520 udp route unknown
2742104.244.73.40 2049 udp nfs unknown
2743104.244.76.231 53 tcp domain filtered
2744104.244.76.231 53 udp domain unknown
2745104.244.76.231 67 tcp dhcps filtered
2746104.244.76.231 67 udp dhcps unknown
2747104.244.76.231 68 tcp dhcpc filtered
2748104.244.76.231 68 udp dhcpc unknown
2749104.244.76.231 69 tcp tftp filtered
2750104.244.76.231 69 udp tftp unknown
2751104.244.76.231 80 tcp http open nginx
2752104.244.76.231 88 tcp kerberos-sec filtered
2753104.244.76.231 88 udp kerberos-sec unknown
2754104.244.76.231 123 tcp ntp filtered
2755104.244.76.231 123 udp ntp unknown
2756104.244.76.231 137 tcp netbios-ns filtered
2757104.244.76.231 137 udp netbios-ns unknown
2758104.244.76.231 138 tcp netbios-dgm filtered
2759104.244.76.231 138 udp netbios-dgm unknown
2760104.244.76.231 139 tcp netbios-ssn filtered
2761104.244.76.231 139 udp netbios-ssn unknown
2762104.244.76.231 161 tcp snmp filtered
2763104.244.76.231 161 udp snmp unknown
2764104.244.76.231 162 tcp snmptrap filtered
2765104.244.76.231 162 udp snmptrap unknown
2766104.244.76.231 389 tcp ldap filtered
2767104.244.76.231 389 udp ldap unknown
2768104.244.76.231 443 tcp ssl/http open nginx
2769104.244.76.231 520 tcp efs filtered
2770104.244.76.231 520 udp route unknown
2771104.244.76.231 2049 tcp nfs filtered
2772104.244.76.231 2049 udp nfs unknown
2773104.244.76.231 5040 tcp unknown closed
2774104.244.76.231 16001 tcp ssl/http open MiniServ 1.910 Webmin httpd
2775104.244.76.231 16221 tcp closed
2776104.244.76.231 23022 tcp closed
2777104.244.76.231 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
2778104.244.77.188 53 tcp domain filtered
2779104.244.77.188 53 udp domain unknown
2780104.244.77.188 67 tcp dhcps filtered
2781104.244.77.188 67 udp dhcps unknown
2782104.244.77.188 68 tcp dhcpc filtered
2783104.244.77.188 68 udp dhcpc unknown
2784104.244.77.188 69 tcp tftp filtered
2785104.244.77.188 69 udp tftp unknown
2786104.244.77.188 80 tcp http open nginx
2787104.244.77.188 88 tcp kerberos-sec filtered
2788104.244.77.188 88 udp kerberos-sec unknown
2789104.244.77.188 123 tcp ntp filtered
2790104.244.77.188 123 udp ntp unknown
2791104.244.77.188 137 tcp netbios-ns filtered
2792104.244.77.188 137 udp netbios-ns unknown
2793104.244.77.188 138 tcp netbios-dgm filtered
2794104.244.77.188 138 udp netbios-dgm unknown
2795104.244.77.188 139 tcp netbios-ssn filtered
2796104.244.77.188 139 udp netbios-ssn unknown
2797104.244.77.188 161 tcp snmp filtered
2798104.244.77.188 161 udp snmp unknown
2799104.244.77.188 162 tcp snmptrap filtered
2800104.244.77.188 162 udp snmptrap unknown
2801104.244.77.188 389 tcp ldap filtered
2802104.244.77.188 389 udp ldap unknown
2803104.244.77.188 443 tcp ssl/http open nginx
2804104.244.77.188 520 tcp efs filtered
2805104.244.77.188 520 udp route unknown
2806104.244.77.188 2049 tcp nfs filtered
2807104.244.77.188 2049 udp nfs unknown
2808104.244.77.188 5040 tcp unknown closed
2809104.244.77.188 16001 tcp ssl/http open MiniServ 1.910 Webmin httpd
2810104.244.77.188 16221 tcp closed
2811104.244.77.188 23022 tcp closed
2812104.244.77.188 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
2813104.244.79.89 53 tcp domain filtered
2814104.244.79.89 53 udp domain unknown
2815104.244.79.89 67 tcp dhcps filtered
2816104.244.79.89 67 udp dhcps unknown
2817104.244.79.89 68 tcp dhcpc filtered
2818104.244.79.89 68 udp dhcpc unknown
2819104.244.79.89 69 tcp tftp filtered
2820104.244.79.89 69 udp tftp unknown
2821104.244.79.89 80 tcp http open nginx
2822104.244.79.89 88 tcp kerberos-sec filtered
2823104.244.79.89 88 udp kerberos-sec unknown
2824104.244.79.89 123 tcp ntp filtered
2825104.244.79.89 123 udp ntp unknown
2826104.244.79.89 137 tcp netbios-ns filtered
2827104.244.79.89 137 udp netbios-ns unknown
2828104.244.79.89 138 tcp netbios-dgm filtered
2829104.244.79.89 138 udp netbios-dgm unknown
2830104.244.79.89 139 tcp netbios-ssn filtered
2831104.244.79.89 139 udp netbios-ssn unknown
2832104.244.79.89 161 tcp snmp filtered
2833104.244.79.89 161 udp snmp unknown
2834104.244.79.89 162 tcp snmptrap filtered
2835104.244.79.89 162 udp snmptrap unknown
2836104.244.79.89 389 tcp ldap filtered
2837104.244.79.89 389 udp ldap unknown
2838104.244.79.89 443 tcp ssl/http open nginx
2839104.244.79.89 520 tcp efs filtered
2840104.244.79.89 520 udp route unknown
2841104.244.79.89 2049 tcp nfs filtered
2842104.244.79.89 2049 udp nfs unknown
2843104.244.79.89 7910 tcp ssl/http open nginx
2844104.244.79.89 7920 tcp unknown closed
2845104.244.79.89 7930 tcp closed
2846104.244.79.89 16001 tcp http open MiniServ 1.930 Webmin httpd
2847104.244.79.89 16010 tcp ssl/http open nginx
2848104.244.79.89 16221 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
2849104.244.79.89 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
2850111.90.145.39 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 15:04. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
2851111.90.145.39 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
2852111.90.145.39 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
2853111.90.145.39 67 tcp dhcps closed
2854111.90.145.39 67 udp dhcps closed
2855111.90.145.39 68 tcp dhcpc closed
2856111.90.145.39 68 udp dhcpc unknown
2857111.90.145.39 69 tcp tftp closed
2858111.90.145.39 69 udp tftp unknown
2859111.90.145.39 88 tcp kerberos-sec closed
2860111.90.145.39 88 udp kerberos-sec unknown
2861111.90.145.39 123 tcp ntp closed
2862111.90.145.39 123 udp ntp closed
2863111.90.145.39 137 tcp netbios-ns closed
2864111.90.145.39 137 udp netbios-ns unknown
2865111.90.145.39 138 tcp netbios-dgm closed
2866111.90.145.39 138 udp netbios-dgm unknown
2867111.90.145.39 139 tcp netbios-ssn filtered
2868111.90.145.39 139 udp netbios-ssn closed
2869111.90.145.39 161 tcp snmp closed
2870111.90.145.39 161 udp snmp unknown
2871111.90.145.39 162 tcp snmptrap closed
2872111.90.145.39 162 udp snmptrap closed
2873111.90.145.39 389 tcp ldap closed
2874111.90.145.39 389 udp ldap unknown
2875111.90.145.39 520 tcp efs closed
2876111.90.145.39 520 udp route closed
2877111.90.145.39 2049 tcp nfs closed
2878111.90.145.39 2049 udp nfs closed
2879143.95.110.248 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 150 allowed.\x0d\x0a220-Local time is now 05:55. Server port: 21.\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
2880143.95.110.248 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
2881143.95.110.248 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
2882143.95.110.248 67 tcp dhcps closed
2883143.95.110.248 67 udp dhcps unknown
2884143.95.110.248 68 tcp dhcpc closed
2885143.95.110.248 68 udp dhcpc unknown
2886143.95.110.248 69 tcp tftp closed
2887143.95.110.248 69 udp tftp unknown
2888143.95.110.248 88 tcp kerberos-sec closed
2889143.95.110.248 88 udp kerberos-sec unknown
2890143.95.110.248 123 tcp ntp closed
2891143.95.110.248 123 udp ntp unknown
2892143.95.110.248 137 tcp netbios-ns closed
2893143.95.110.248 137 udp netbios-ns unknown
2894143.95.110.248 138 tcp netbios-dgm closed
2895143.95.110.248 138 udp netbios-dgm closed
2896143.95.110.248 139 tcp netbios-ssn closed
2897143.95.110.248 139 udp netbios-ssn unknown
2898143.95.110.248 161 tcp snmp closed
2899143.95.110.248 161 udp snmp closed
2900143.95.110.248 162 tcp snmptrap closed
2901143.95.110.248 162 udp snmptrap unknown
2902143.95.110.248 389 tcp ldap closed
2903143.95.110.248 389 udp ldap closed
2904143.95.110.248 520 tcp efs closed
2905143.95.110.248 520 udp route unknown
2906143.95.110.248 2049 tcp nfs closed
2907143.95.110.248 2049 udp nfs unknown
2908149.126.72.220 25 tcp smtp closed
2909149.126.72.220 51 tcp tcpwrapped open
2910149.126.72.220 53 tcp domain open
2911149.126.72.220 53 udp domain open
2912149.126.72.220 65 tcp tcpwrapped open
2913149.126.72.220 66 tcp tcpwrapped open
2914149.126.72.220 67 tcp dhcps filtered
2915149.126.72.220 67 udp dhcps unknown
2916149.126.72.220 68 tcp dhcpc filtered
2917149.126.72.220 68 udp dhcpc unknown
2918149.126.72.220 69 tcp tftp filtered
2919149.126.72.220 69 udp tftp unknown
2920149.126.72.220 80 tcp tcpwrapped open
2921149.126.72.220 81 tcp tcpwrapped open
2922149.126.72.220 82 tcp tcpwrapped open
2923149.126.72.220 83 tcp tcpwrapped open
2924149.126.72.220 84 tcp tcpwrapped open
2925149.126.72.220 85 tcp tcpwrapped open
2926149.126.72.220 86 tcp tcpwrapped open
2927149.126.72.220 88 tcp http open Incapsula CDN httpd
2928149.126.72.220 88 udp kerberos-sec unknown
2929149.126.72.220 89 tcp tcpwrapped open
2930149.126.72.220 90 tcp tcpwrapped open
2931149.126.72.220 91 tcp tcpwrapped open
2932149.126.72.220 92 tcp tcpwrapped open
2933149.126.72.220 98 tcp tcpwrapped open
2934149.126.72.220 99 tcp tcpwrapped open
2935149.126.72.220 123 tcp ntp filtered
2936149.126.72.220 123 udp ntp unknown
2937149.126.72.220 137 tcp netbios-ns filtered
2938149.126.72.220 137 udp netbios-ns filtered
2939149.126.72.220 138 tcp netbios-dgm filtered
2940149.126.72.220 138 udp netbios-dgm filtered
2941149.126.72.220 139 tcp netbios-ssn closed
2942149.126.72.220 139 udp netbios-ssn unknown
2943149.126.72.220 160 tcp sgmp-traps closed
2944149.126.72.220 161 tcp snmp filtered
2945149.126.72.220 161 udp snmp unknown
2946149.126.72.220 162 tcp snmptrap filtered
2947149.126.72.220 162 udp snmptrap unknown
2948149.126.72.220 189 tcp tcpwrapped open
2949149.126.72.220 190 tcp tcpwrapped open
2950149.126.72.220 192 tcp tcpwrapped open
2951149.126.72.220 243 tcp tcpwrapped open
2952149.126.72.220 285 tcp tcpwrapped open
2953149.126.72.220 314 tcp tcpwrapped open
2954149.126.72.220 343 tcp tcpwrapped open
2955149.126.72.220 347 tcp tcpwrapped open
2956149.126.72.220 385 tcp tcpwrapped open
2957149.126.72.220 389 tcp ssl/http open Incapsula CDN httpd
2958149.126.72.220 389 udp ldap unknown
2959149.126.72.220 400 tcp tcpwrapped open
2960149.126.72.220 440 tcp tcpwrapped open
2961149.126.72.220 441 tcp tcpwrapped open
2962149.126.72.220 442 tcp tcpwrapped open
2963149.126.72.220 443 tcp ssl/tcpwrapped open
2964149.126.72.220 444 tcp tcpwrapped open
2965149.126.72.220 445 tcp microsoft-ds closed
2966149.126.72.220 446 tcp tcpwrapped open
2967149.126.72.220 447 tcp tcpwrapped open
2968149.126.72.220 448 tcp tcpwrapped open
2969149.126.72.220 449 tcp tcpwrapped open
2970149.126.72.220 452 tcp tcpwrapped open
2971149.126.72.220 461 tcp tcpwrapped open
2972149.126.72.220 462 tcp tcpwrapped open
2973149.126.72.220 480 tcp tcpwrapped open
2974149.126.72.220 485 tcp tcpwrapped open
2975149.126.72.220 487 tcp tcpwrapped open
2976149.126.72.220 488 tcp tcpwrapped open
2977149.126.72.220 491 tcp tcpwrapped open
2978149.126.72.220 520 tcp efs filtered
2979149.126.72.220 520 udp route unknown
2980149.126.72.220 555 tcp tcpwrapped open
2981149.126.72.220 556 tcp tcpwrapped open
2982149.126.72.220 587 tcp tcpwrapped open
2983149.126.72.220 631 tcp tcpwrapped open
2984149.126.72.220 632 tcp tcpwrapped open
2985149.126.72.220 636 tcp tcpwrapped open
2986149.126.72.220 743 tcp tcpwrapped open
2987149.126.72.220 772 tcp tcpwrapped open
2988149.126.72.220 777 tcp tcpwrapped open
2989149.126.72.220 782 tcp tcpwrapped open
2990149.126.72.220 785 tcp tcpwrapped open
2991149.126.72.220 800 tcp tcpwrapped open
2992149.126.72.220 801 tcp tcpwrapped open
2993149.126.72.220 805 tcp tcpwrapped open
2994149.126.72.220 806 tcp tcpwrapped open
2995149.126.72.220 809 tcp tcpwrapped open
2996149.126.72.220 843 tcp tcpwrapped open
2997149.126.72.220 853 tcp tcpwrapped open
2998149.126.72.220 885 tcp tcpwrapped open
2999149.126.72.220 886 tcp tcpwrapped open
3000149.126.72.220 887 tcp tcpwrapped open
3001149.126.72.220 888 tcp tcpwrapped open
3002149.126.72.220 943 tcp tcpwrapped open
3003149.126.72.220 947 tcp tcpwrapped open
3004149.126.72.220 953 tcp tcpwrapped open
3005149.126.72.220 990 tcp tcpwrapped open
3006149.126.72.220 995 tcp tcpwrapped open
3007149.126.72.220 998 tcp tcpwrapped open
3008149.126.72.220 999 tcp tcpwrapped open
3009149.126.72.220 1000 tcp tcpwrapped open
3010149.126.72.220 1002 tcp tcpwrapped open
3011149.126.72.220 1024 tcp tcpwrapped open
3012149.126.72.220 1025 tcp tcpwrapped open
3013149.126.72.220 1028 tcp tcpwrapped open
3014149.126.72.220 1080 tcp tcpwrapped open
3015149.126.72.220 1103 tcp tcpwrapped open
3016149.126.72.220 1111 tcp tcpwrapped open
3017149.126.72.220 1180 tcp tcpwrapped open
3018149.126.72.220 1181 tcp tcpwrapped open
3019149.126.72.220 1207 tcp tcpwrapped open
3020149.126.72.220 1234 tcp tcpwrapped open
3021149.126.72.220 1250 tcp tcpwrapped open
3022149.126.72.220 1283 tcp tcpwrapped open
3023149.126.72.220 1291 tcp tcpwrapped open
3024149.126.72.220 1292 tcp tcpwrapped open
3025149.126.72.220 1293 tcp tcpwrapped open
3026149.126.72.220 1337 tcp tcpwrapped open
3027149.126.72.220 1344 tcp tcpwrapped open
3028149.126.72.220 1355 tcp tcpwrapped open
3029149.126.72.220 1364 tcp tcpwrapped open
3030149.126.72.220 1366 tcp tcpwrapped open
3031149.126.72.220 1377 tcp tcpwrapped open
3032149.126.72.220 1387 tcp tcpwrapped open
3033149.126.72.220 1388 tcp tcpwrapped open
3034149.126.72.220 1433 tcp tcpwrapped open
3035149.126.72.220 1443 tcp tcpwrapped open
3036149.126.72.220 1447 tcp tcpwrapped open
3037149.126.72.220 1450 tcp tcpwrapped open
3038149.126.72.220 1451 tcp tcpwrapped open
3039149.126.72.220 1452 tcp tcpwrapped open
3040149.126.72.220 1453 tcp tcpwrapped open
3041149.126.72.220 1454 tcp tcpwrapped open
3042149.126.72.220 1455 tcp tcpwrapped open
3043149.126.72.220 1456 tcp tcpwrapped open
3044149.126.72.220 1457 tcp tcpwrapped open
3045149.126.72.220 1458 tcp tcpwrapped open
3046149.126.72.220 1459 tcp tcpwrapped open
3047149.126.72.220 1460 tcp tcpwrapped open
3048149.126.72.220 1494 tcp tcpwrapped open
3049149.126.72.220 1935 tcp tcpwrapped open
3050149.126.72.220 1950 tcp tcpwrapped open
3051149.126.72.220 1951 tcp tcpwrapped open
3052149.126.72.220 1952 tcp tcpwrapped open
3053149.126.72.220 1953 tcp tcpwrapped open
3054149.126.72.220 1954 tcp tcpwrapped open
3055149.126.72.220 1955 tcp tcpwrapped open
3056149.126.72.220 1956 tcp tcpwrapped open
3057149.126.72.220 1957 tcp tcpwrapped open
3058149.126.72.220 1958 tcp tcpwrapped open
3059149.126.72.220 1959 tcp tcpwrapped open
3060149.126.72.220 1960 tcp tcpwrapped open
3061149.126.72.220 1964 tcp tcpwrapped open
3062149.126.72.220 1965 tcp tcpwrapped open
3063149.126.72.220 1966 tcp tcpwrapped open
3064149.126.72.220 1967 tcp tcpwrapped open
3065149.126.72.220 1968 tcp tcpwrapped open
3066149.126.72.220 1969 tcp tcpwrapped open
3067149.126.72.220 1970 tcp tcpwrapped open
3068149.126.72.220 1971 tcp tcpwrapped open
3069149.126.72.220 1972 tcp tcpwrapped open
3070149.126.72.220 1973 tcp tcpwrapped open
3071149.126.72.220 1974 tcp tcpwrapped open
3072149.126.72.220 1975 tcp tcpwrapped open
3073149.126.72.220 1976 tcp tcpwrapped open
3074149.126.72.220 1977 tcp tcpwrapped open
3075149.126.72.220 1978 tcp tcpwrapped open
3076149.126.72.220 1979 tcp tcpwrapped open
3077149.126.72.220 1980 tcp tcpwrapped open
3078149.126.72.220 1981 tcp tcpwrapped open
3079149.126.72.220 1982 tcp tcpwrapped open
3080149.126.72.220 1983 tcp tcpwrapped open
3081149.126.72.220 1984 tcp tcpwrapped open
3082149.126.72.220 1985 tcp tcpwrapped open
3083149.126.72.220 1986 tcp tcpwrapped open
3084149.126.72.220 1987 tcp tcpwrapped open
3085149.126.72.220 1988 tcp tcpwrapped open
3086149.126.72.220 1989 tcp tcpwrapped open
3087149.126.72.220 2000 tcp tcpwrapped open
3088149.126.72.220 2001 tcp tcpwrapped open
3089149.126.72.220 2006 tcp tcpwrapped open
3090149.126.72.220 2012 tcp tcpwrapped open
3091149.126.72.220 2020 tcp tcpwrapped open
3092149.126.72.220 2048 tcp tcpwrapped open
3093149.126.72.220 2049 tcp http open Incapsula CDN httpd
3094149.126.72.220 2049 udp nfs unknown
3095149.126.72.220 2050 tcp tcpwrapped open
3096149.126.72.220 2051 tcp tcpwrapped open
3097149.126.72.220 2052 tcp tcpwrapped open
3098149.126.72.220 2053 tcp tcpwrapped open
3099149.126.72.220 2054 tcp tcpwrapped open
3100149.126.72.220 2055 tcp tcpwrapped open
3101149.126.72.220 2056 tcp tcpwrapped open
3102149.126.72.220 2057 tcp tcpwrapped open
3103149.126.72.220 2058 tcp tcpwrapped open
3104149.126.72.220 2059 tcp tcpwrapped open
3105149.126.72.220 2060 tcp tcpwrapped open
3106149.126.72.220 2061 tcp tcpwrapped open
3107149.126.72.220 2062 tcp tcpwrapped open
3108149.126.72.220 2063 tcp tcpwrapped open
3109149.126.72.220 2064 tcp tcpwrapped open
3110149.126.72.220 2065 tcp tcpwrapped open
3111149.126.72.220 2066 tcp tcpwrapped open
3112149.126.72.220 2067 tcp tcpwrapped open
3113149.126.72.220 2068 tcp tcpwrapped open
3114149.126.72.220 2069 tcp tcpwrapped open
3115149.126.72.220 2070 tcp tcpwrapped open
3116149.126.72.220 2072 tcp tcpwrapped open
3117149.126.72.220 2082 tcp tcpwrapped open
3118149.126.72.220 2083 tcp tcpwrapped open
3119149.126.72.220 2087 tcp tcpwrapped open
3120149.126.72.220 2096 tcp tcpwrapped open
3121149.126.72.220 2100 tcp tcpwrapped open
3122149.126.72.220 2108 tcp tcpwrapped open
3123149.126.72.220 2200 tcp tcpwrapped open
3124149.126.72.220 2209 tcp tcpwrapped open
3125149.126.72.220 2222 tcp tcpwrapped open
3126149.126.72.220 2226 tcp tcpwrapped open
3127149.126.72.220 2248 tcp tcpwrapped open
3128149.126.72.220 2344 tcp tcpwrapped open
3129149.126.72.220 2345 tcp tcpwrapped open
3130149.126.72.220 2353 tcp tcpwrapped open
3131149.126.72.220 2363 tcp tcpwrapped open
3132149.126.72.220 2423 tcp tcpwrapped open
3133149.126.72.220 2433 tcp tcpwrapped open
3134149.126.72.220 2435 tcp tcpwrapped open
3135149.126.72.220 2443 tcp tcpwrapped open
3136149.126.72.220 2453 tcp tcpwrapped open
3137149.126.72.220 2480 tcp tcpwrapped open
3138149.126.72.220 2548 tcp tcpwrapped open
3139149.126.72.220 2549 tcp tcpwrapped open
3140149.126.72.220 2550 tcp tcpwrapped open
3141149.126.72.220 2551 tcp tcpwrapped open
3142149.126.72.220 2552 tcp tcpwrapped open
3143149.126.72.220 2553 tcp tcpwrapped open
3144149.126.72.220 2554 tcp tcpwrapped open
3145149.126.72.220 2555 tcp tcpwrapped open
3146149.126.72.220 2556 tcp tcpwrapped open
3147149.126.72.220 2557 tcp tcpwrapped open
3148149.126.72.220 2558 tcp tcpwrapped open
3149149.126.72.220 2559 tcp tcpwrapped open
3150149.126.72.220 2560 tcp tcpwrapped open
3151149.126.72.220 2561 tcp tcpwrapped open
3152149.126.72.220 2562 tcp tcpwrapped open
3153149.126.72.220 2563 tcp tcpwrapped open
3154149.126.72.220 2566 tcp tcpwrapped open
3155149.126.72.220 2567 tcp tcpwrapped open
3156149.126.72.220 2568 tcp tcpwrapped open
3157149.126.72.220 2569 tcp tcpwrapped open
3158149.126.72.220 2570 tcp tcpwrapped open
3159149.126.72.220 2572 tcp tcpwrapped open
3160149.126.72.220 2598 tcp tcpwrapped open
3161149.126.72.220 2599 tcp tcpwrapped open
3162149.126.72.220 2850 tcp tcpwrapped open
3163149.126.72.220 2985 tcp tcpwrapped open
3164149.126.72.220 2995 tcp tcpwrapped open
3165149.126.72.220 3000 tcp tcpwrapped open
3166149.126.72.220 3001 tcp tcpwrapped open
3167149.126.72.220 3002 tcp tcpwrapped open
3168149.126.72.220 3003 tcp tcpwrapped open
3169149.126.72.220 3004 tcp tcpwrapped open
3170149.126.72.220 3005 tcp tcpwrapped open
3171149.126.72.220 3006 tcp tcpwrapped open
3172149.126.72.220 3007 tcp tcpwrapped open
3173149.126.72.220 3008 tcp tcpwrapped open
3174149.126.72.220 3009 tcp tcpwrapped open
3175149.126.72.220 3010 tcp tcpwrapped open
3176149.126.72.220 3011 tcp tcpwrapped open
3177149.126.72.220 3012 tcp tcpwrapped open
3178149.126.72.220 3013 tcp tcpwrapped open
3179149.126.72.220 3014 tcp tcpwrapped open
3180149.126.72.220 3015 tcp tcpwrapped open
3181149.126.72.220 3016 tcp tcpwrapped open
3182149.126.72.220 3017 tcp tcpwrapped open
3183149.126.72.220 3018 tcp tcpwrapped open
3184149.126.72.220 3019 tcp tcpwrapped open
3185149.126.72.220 3020 tcp tcpwrapped open
3186149.126.72.220 3021 tcp tcpwrapped open
3187149.126.72.220 3022 tcp tcpwrapped open
3188149.126.72.220 3030 tcp tcpwrapped open
3189149.126.72.220 3047 tcp tcpwrapped open
3190149.126.72.220 3048 tcp tcpwrapped open
3191149.126.72.220 3049 tcp tcpwrapped open
3192149.126.72.220 3050 tcp tcpwrapped open
3193149.126.72.220 3051 tcp tcpwrapped open
3194149.126.72.220 3052 tcp tcpwrapped open
3195149.126.72.220 3053 tcp tcpwrapped open
3196149.126.72.220 3054 tcp tcpwrapped open
3197149.126.72.220 3055 tcp tcpwrapped open
3198149.126.72.220 3056 tcp tcpwrapped open
3199149.126.72.220 3057 tcp tcpwrapped open
3200149.126.72.220 3058 tcp tcpwrapped open
3201149.126.72.220 3059 tcp tcpwrapped open
3202149.126.72.220 3060 tcp tcpwrapped open
3203149.126.72.220 3061 tcp tcpwrapped open
3204149.126.72.220 3062 tcp tcpwrapped open
3205149.126.72.220 3063 tcp tcpwrapped open
3206149.126.72.220 3064 tcp tcpwrapped open
3207149.126.72.220 3065 tcp tcpwrapped open
3208149.126.72.220 3066 tcp tcpwrapped open
3209149.126.72.220 3067 tcp tcpwrapped open
3210149.126.72.220 3068 tcp tcpwrapped open
3211149.126.72.220 3069 tcp tcpwrapped open
3212149.126.72.220 3070 tcp tcpwrapped open
3213149.126.72.220 3071 tcp tcpwrapped open
3214149.126.72.220 3072 tcp tcpwrapped open
3215149.126.72.220 3073 tcp tcpwrapped open
3216149.126.72.220 3074 tcp tcpwrapped open
3217149.126.72.220 3075 tcp tcpwrapped open
3218149.126.72.220 3076 tcp tcpwrapped open
3219149.126.72.220 3077 tcp tcpwrapped open
3220149.126.72.220 3078 tcp tcpwrapped open
3221149.126.72.220 3079 tcp tcpwrapped open
3222149.126.72.220 3080 tcp tcpwrapped open
3223149.126.72.220 3081 tcp tcpwrapped open
3224149.126.72.220 3082 tcp tcpwrapped open
3225149.126.72.220 3083 tcp tcpwrapped open
3226149.126.72.220 3084 tcp tcpwrapped open
3227149.126.72.220 3085 tcp tcpwrapped open
3228149.126.72.220 3086 tcp tcpwrapped open
3229149.126.72.220 3087 tcp tcpwrapped open
3230149.126.72.220 3088 tcp tcpwrapped open
3231149.126.72.220 3089 tcp tcpwrapped open
3232149.126.72.220 3090 tcp tcpwrapped open
3233149.126.72.220 3091 tcp tcpwrapped open
3234149.126.72.220 3092 tcp tcpwrapped open
3235149.126.72.220 3093 tcp tcpwrapped open
3236149.126.72.220 3094 tcp tcpwrapped open
3237149.126.72.220 3095 tcp tcpwrapped open
3238149.126.72.220 3096 tcp tcpwrapped open
3239149.126.72.220 3097 tcp tcpwrapped open
3240149.126.72.220 3098 tcp tcpwrapped open
3241149.126.72.220 3099 tcp tcpwrapped open
3242149.126.72.220 3100 tcp tcpwrapped open
3243149.126.72.220 3101 tcp tcpwrapped open
3244149.126.72.220 3102 tcp tcpwrapped open
3245149.126.72.220 3103 tcp tcpwrapped open
3246149.126.72.220 3104 tcp tcpwrapped open
3247149.126.72.220 3105 tcp tcpwrapped open
3248149.126.72.220 3106 tcp tcpwrapped open
3249149.126.72.220 3107 tcp tcpwrapped open
3250149.126.72.220 3108 tcp tcpwrapped open
3251149.126.72.220 3109 tcp tcpwrapped open
3252149.126.72.220 3110 tcp tcpwrapped open
3253149.126.72.220 3111 tcp tcpwrapped open
3254149.126.72.220 3112 tcp tcpwrapped open
3255149.126.72.220 3113 tcp tcpwrapped open
3256149.126.72.220 3114 tcp tcpwrapped open
3257149.126.72.220 3115 tcp tcpwrapped open
3258149.126.72.220 3116 tcp tcpwrapped open
3259149.126.72.220 3117 tcp tcpwrapped open
3260149.126.72.220 3118 tcp tcpwrapped open
3261149.126.72.220 3119 tcp tcpwrapped open
3262149.126.72.220 3120 tcp tcpwrapped open
3263149.126.72.220 3121 tcp tcpwrapped open
3264149.126.72.220 3150 tcp tcpwrapped open
3265149.126.72.220 3155 tcp tcpwrapped open
3266149.126.72.220 3160 tcp tcpwrapped open
3267149.126.72.220 3165 tcp tcpwrapped open
3268149.126.72.220 3270 tcp tcpwrapped open
3269149.126.72.220 3299 tcp tcpwrapped open
3270149.126.72.220 3306 tcp tcpwrapped open
3271149.126.72.220 3333 tcp tcpwrapped open
3272149.126.72.220 3389 tcp tcpwrapped open
3273149.126.72.220 3391 tcp tcpwrapped open
3274149.126.72.220 3400 tcp tcpwrapped open
3275149.126.72.220 3401 tcp tcpwrapped open
3276149.126.72.220 3402 tcp tcpwrapped open
3277149.126.72.220 3403 tcp tcpwrapped open
3278149.126.72.220 3404 tcp tcpwrapped open
3279149.126.72.220 3405 tcp tcpwrapped open
3280149.126.72.220 3406 tcp tcpwrapped open
3281149.126.72.220 3407 tcp tcpwrapped open
3282149.126.72.220 3408 tcp tcpwrapped open
3283149.126.72.220 3409 tcp tcpwrapped open
3284149.126.72.220 3410 tcp tcpwrapped open
3285149.126.72.220 3412 tcp tcpwrapped open
3286149.126.72.220 3443 tcp tcpwrapped open
3287149.126.72.220 3500 tcp tcpwrapped open
3288149.126.72.220 3510 tcp tcpwrapped open
3289149.126.72.220 3521 tcp tcpwrapped open
3290149.126.72.220 3522 tcp tcpwrapped open
3291149.126.72.220 3523 tcp tcpwrapped open
3292149.126.72.220 3524 tcp tcpwrapped open
3293149.126.72.220 3530 tcp tcpwrapped open
3294149.126.72.220 3531 tcp tcpwrapped open
3295149.126.72.220 3540 tcp tcpwrapped open
3296149.126.72.220 3548 tcp tcpwrapped open
3297149.126.72.220 3549 tcp tcpwrapped open
3298149.126.72.220 3550 tcp tcpwrapped open
3299149.126.72.220 3551 tcp tcpwrapped open
3300149.126.72.220 3552 tcp tcpwrapped open
3301149.126.72.220 3553 tcp tcpwrapped open
3302149.126.72.220 3554 tcp tcpwrapped open
3303149.126.72.220 3555 tcp tcpwrapped open
3304149.126.72.220 3556 tcp tcpwrapped open
3305149.126.72.220 3557 tcp tcpwrapped open
3306149.126.72.220 3558 tcp tcpwrapped open
3307149.126.72.220 3559 tcp tcpwrapped open
3308149.126.72.220 3560 tcp tcpwrapped open
3309149.126.72.220 3561 tcp tcpwrapped open
3310149.126.72.220 3562 tcp tcpwrapped open
3311149.126.72.220 3563 tcp tcpwrapped open
3312149.126.72.220 3566 tcp tcpwrapped open
3313149.126.72.220 3567 tcp tcpwrapped open
3314149.126.72.220 3568 tcp tcpwrapped open
3315149.126.72.220 3569 tcp tcpwrapped open
3316149.126.72.220 3570 tcp tcpwrapped open
3317149.126.72.220 3572 tcp tcpwrapped open
3318149.126.72.220 3580 tcp tcpwrapped open
3319149.126.72.220 3590 tcp tcpwrapped open
3320149.126.72.220 3790 tcp tcpwrapped open
3321149.126.72.220 3791 tcp tcpwrapped open
3322149.126.72.220 3792 tcp tcpwrapped open
3323149.126.72.220 3793 tcp tcpwrapped open
3324149.126.72.220 3794 tcp tcpwrapped open
3325149.126.72.220 3838 tcp tcpwrapped open
3326149.126.72.220 3841 tcp tcpwrapped open
3327149.126.72.220 3842 tcp tcpwrapped open
3328149.126.72.220 3950 tcp tcpwrapped open
3329149.126.72.220 3951 tcp tcpwrapped open
3330149.126.72.220 3952 tcp tcpwrapped open
3331149.126.72.220 3953 tcp tcpwrapped open
3332149.126.72.220 3954 tcp adrep open
3333149.126.72.220 4000 tcp tcpwrapped open
3334149.126.72.220 4001 tcp newoak open
3335149.126.72.220 4002 tcp mlchat-proxy open
3336149.126.72.220 4021 tcp nexus-portal open
3337149.126.72.220 4022 tcp dnox open
3338149.126.72.220 4023 tcp esnm-zoning open
3339149.126.72.220 4043 tcp nirp open
3340149.126.72.220 4072 tcp zieto-sock open
3341149.126.72.220 4080 tcp lorica-in open
3342149.126.72.220 4085 tcp ezmessagesrv open
3343149.126.72.220 4120 tcp minirem open
3344149.126.72.220 4147 tcp vrxpservman open
3345149.126.72.220 4148 tcp hhb-handheld open
3346149.126.72.220 4150 tcp poweralert-nsa open
3347149.126.72.220 4155 tcp bzr open
3348149.126.72.220 4160 tcp jini-discovery open
3349149.126.72.220 4165 tcp altcp open
3350149.126.72.220 4172 tcp pcoip open
3351149.126.72.220 4243 tcp vrml-multi-use open
3352149.126.72.220 4244 tcp vrml-multi-use open
3353149.126.72.220 4250 tcp vrml-multi-use open
3354149.126.72.220 4300 tcp corelccam open
3355149.126.72.220 4333 tcp msql open
3356149.126.72.220 4343 tcp unicall open
3357149.126.72.220 4344 tcp vinainstall open
3358149.126.72.220 4400 tcp ds-srv open
3359149.126.72.220 4401 tcp tcpwrapped open
3360149.126.72.220 4402 tcp tcpwrapped open
3361149.126.72.220 4430 tcp tcpwrapped open
3362149.126.72.220 4431 tcp tcpwrapped open
3363149.126.72.220 4432 tcp tcpwrapped open
3364149.126.72.220 4434 tcp tcpwrapped open
3365149.126.72.220 4435 tcp tcpwrapped open
3366149.126.72.220 4436 tcp tcpwrapped open
3367149.126.72.220 4437 tcp tcpwrapped open
3368149.126.72.220 4439 tcp tcpwrapped open
3369149.126.72.220 4440 tcp tcpwrapped open
3370149.126.72.220 4443 tcp tcpwrapped open
3371149.126.72.220 4444 tcp tcpwrapped open
3372149.126.72.220 4445 tcp tcpwrapped open
3373149.126.72.220 4451 tcp tcpwrapped open
3374149.126.72.220 4455 tcp tcpwrapped open
3375149.126.72.220 4457 tcp tcpwrapped open
3376149.126.72.220 4459 tcp tcpwrapped open
3377149.126.72.220 4461 tcp tcpwrapped open
3378149.126.72.220 4463 tcp tcpwrapped open
3379149.126.72.220 4477 tcp tcpwrapped open
3380149.126.72.220 4482 tcp tcpwrapped open
3381149.126.72.220 4500 tcp tcpwrapped open
3382149.126.72.220 4502 tcp tcpwrapped open
3383149.126.72.220 4505 tcp tcpwrapped open
3384149.126.72.220 4572 tcp tcpwrapped open
3385149.126.72.220 4602 tcp tcpwrapped open
3386149.126.72.220 4620 tcp tcpwrapped open
3387149.126.72.220 4643 tcp tcpwrapped open
3388149.126.72.220 4848 tcp tcpwrapped open
3389149.126.72.220 4933 tcp tcpwrapped open
3390149.126.72.220 4993 tcp tcpwrapped open
3391149.126.72.220 5000 tcp tcpwrapped open
3392149.126.72.220 5001 tcp tcpwrapped open
3393149.126.72.220 5002 tcp tcpwrapped open
3394149.126.72.220 5003 tcp tcpwrapped open
3395149.126.72.220 5004 tcp tcpwrapped open
3396149.126.72.220 5005 tcp tcpwrapped open
3397149.126.72.220 5006 tcp tcpwrapped open
3398149.126.72.220 5007 tcp tcpwrapped open
3399149.126.72.220 5008 tcp tcpwrapped open
3400149.126.72.220 5009 tcp tcpwrapped open
3401149.126.72.220 5010 tcp tcpwrapped open
3402149.126.72.220 5011 tcp tcpwrapped open
3403149.126.72.220 5022 tcp tcpwrapped open
3404149.126.72.220 5050 tcp tcpwrapped open
3405149.126.72.220 5053 tcp tcpwrapped open
3406149.126.72.220 5060 tcp tcpwrapped open
3407149.126.72.220 5061 tcp tcpwrapped open
3408149.126.72.220 5080 tcp tcpwrapped open
3409149.126.72.220 5083 tcp tcpwrapped open
3410149.126.72.220 5089 tcp tcpwrapped open
3411149.126.72.220 5090 tcp tcpwrapped open
3412149.126.72.220 5100 tcp tcpwrapped open
3413149.126.72.220 5105 tcp tcpwrapped open
3414149.126.72.220 5119 tcp tcpwrapped open
3415149.126.72.220 5120 tcp tcpwrapped open
3416149.126.72.220 5130 tcp tcpwrapped open
3417149.126.72.220 5140 tcp tcpwrapped open
3418149.126.72.220 5150 tcp tcpwrapped open
3419149.126.72.220 5160 tcp tcpwrapped open
3420149.126.72.220 5180 tcp tcpwrapped open
3421149.126.72.220 5201 tcp tcpwrapped open
3422149.126.72.220 5222 tcp tcpwrapped open
3423149.126.72.220 5223 tcp tcpwrapped open
3424149.126.72.220 5224 tcp tcpwrapped open
3425149.126.72.220 5225 tcp tcpwrapped open
3426149.126.72.220 5226 tcp tcpwrapped open
3427149.126.72.220 5227 tcp tcpwrapped open
3428149.126.72.220 5228 tcp tcpwrapped open
3429149.126.72.220 5229 tcp tcpwrapped open
3430149.126.72.220 5230 tcp tcpwrapped open
3431149.126.72.220 5231 tcp tcpwrapped open
3432149.126.72.220 5232 tcp tcpwrapped open
3433149.126.72.220 5233 tcp tcpwrapped open
3434149.126.72.220 5234 tcp tcpwrapped open
3435149.126.72.220 5235 tcp tcpwrapped open
3436149.126.72.220 5236 tcp tcpwrapped open
3437149.126.72.220 5237 tcp tcpwrapped open
3438149.126.72.220 5238 tcp tcpwrapped open
3439149.126.72.220 5239 tcp tcpwrapped open
3440149.126.72.220 5240 tcp tcpwrapped open
3441149.126.72.220 5241 tcp tcpwrapped open
3442149.126.72.220 5242 tcp tcpwrapped open
3443149.126.72.220 5243 tcp tcpwrapped open
3444149.126.72.220 5244 tcp tcpwrapped open
3445149.126.72.220 5245 tcp tcpwrapped open
3446149.126.72.220 5246 tcp tcpwrapped open
3447149.126.72.220 5247 tcp tcpwrapped open
3448149.126.72.220 5248 tcp tcpwrapped open
3449149.126.72.220 5249 tcp tcpwrapped open
3450149.126.72.220 5250 tcp tcpwrapped open
3451149.126.72.220 5251 tcp tcpwrapped open
3452149.126.72.220 5252 tcp tcpwrapped open
3453149.126.72.220 5253 tcp tcpwrapped open
3454149.126.72.220 5254 tcp tcpwrapped open
3455149.126.72.220 5255 tcp tcpwrapped open
3456149.126.72.220 5256 tcp tcpwrapped open
3457149.126.72.220 5257 tcp tcpwrapped open
3458149.126.72.220 5258 tcp tcpwrapped open
3459149.126.72.220 5259 tcp tcpwrapped open
3460149.126.72.220 5260 tcp tcpwrapped open
3461149.126.72.220 5261 tcp tcpwrapped open
3462149.126.72.220 5262 tcp tcpwrapped open
3463149.126.72.220 5263 tcp tcpwrapped open
3464149.126.72.220 5264 tcp tcpwrapped open
3465149.126.72.220 5265 tcp tcpwrapped open
3466149.126.72.220 5266 tcp tcpwrapped open
3467149.126.72.220 5267 tcp tcpwrapped open
3468149.126.72.220 5268 tcp tcpwrapped open
3469149.126.72.220 5269 tcp tcpwrapped open
3470149.126.72.220 5270 tcp tcpwrapped open
3471149.126.72.220 5271 tcp tcpwrapped open
3472149.126.72.220 5272 tcp tcpwrapped open
3473149.126.72.220 5273 tcp tcpwrapped open
3474149.126.72.220 5274 tcp tcpwrapped open
3475149.126.72.220 5275 tcp tcpwrapped open
3476149.126.72.220 5276 tcp tcpwrapped open
3477149.126.72.220 5277 tcp tcpwrapped open
3478149.126.72.220 5278 tcp tcpwrapped open
3479149.126.72.220 5279 tcp tcpwrapped open
3480149.126.72.220 5280 tcp tcpwrapped open
3481149.126.72.220 5440 tcp tcpwrapped open
3482149.126.72.220 5443 tcp tcpwrapped open
3483149.126.72.220 5456 tcp tcpwrapped open
3484149.126.72.220 5494 tcp tcpwrapped open
3485149.126.72.220 5495 tcp tcpwrapped open
3486149.126.72.220 5500 tcp tcpwrapped open
3487149.126.72.220 5503 tcp tcpwrapped open
3488149.126.72.220 5552 tcp tcpwrapped open
3489149.126.72.220 5555 tcp tcpwrapped open
3490149.126.72.220 5556 tcp tcpwrapped open
3491149.126.72.220 5557 tcp tcpwrapped open
3492149.126.72.220 5567 tcp tcpwrapped open
3493149.126.72.220 5568 tcp tcpwrapped open
3494149.126.72.220 5569 tcp tcpwrapped open
3495149.126.72.220 5590 tcp tcpwrapped open
3496149.126.72.220 5591 tcp tcpwrapped open
3497149.126.72.220 5592 tcp tcpwrapped open
3498149.126.72.220 5593 tcp tcpwrapped open
3499149.126.72.220 5594 tcp tcpwrapped open
3500149.126.72.220 5595 tcp tcpwrapped open
3501149.126.72.220 5596 tcp tcpwrapped open
3502149.126.72.220 5597 tcp tcpwrapped open
3503149.126.72.220 5598 tcp tcpwrapped open
3504149.126.72.220 5599 tcp tcpwrapped open
3505149.126.72.220 5600 tcp tcpwrapped open
3506149.126.72.220 5601 tcp tcpwrapped open
3507149.126.72.220 5602 tcp tcpwrapped open
3508149.126.72.220 5603 tcp tcpwrapped open
3509149.126.72.220 5604 tcp tcpwrapped open
3510149.126.72.220 5605 tcp tcpwrapped open
3511149.126.72.220 5606 tcp tcpwrapped open
3512149.126.72.220 5607 tcp tcpwrapped open
3513149.126.72.220 5608 tcp tcpwrapped open
3514149.126.72.220 5609 tcp tcpwrapped open
3515149.126.72.220 5613 tcp tcpwrapped open
3516149.126.72.220 5614 tcp tcpwrapped open
3517149.126.72.220 5620 tcp tcpwrapped open
3518149.126.72.220 5630 tcp tcpwrapped open
3519149.126.72.220 5640 tcp tcpwrapped open
3520149.126.72.220 5650 tcp tcpwrapped open
3521149.126.72.220 5660 tcp tcpwrapped open
3522149.126.72.220 5671 tcp tcpwrapped open
3523149.126.72.220 5672 tcp tcpwrapped open
3524149.126.72.220 5673 tcp tcpwrapped open
3525149.126.72.220 5680 tcp tcpwrapped open
3526149.126.72.220 5696 tcp tcpwrapped open
3527149.126.72.220 5698 tcp tcpwrapped open
3528149.126.72.220 5701 tcp tcpwrapped open
3529149.126.72.220 5721 tcp tcpwrapped open
3530149.126.72.220 5900 tcp tcpwrapped open
3531149.126.72.220 5901 tcp tcpwrapped open
3532149.126.72.220 5902 tcp tcpwrapped open
3533149.126.72.220 5903 tcp tcpwrapped open
3534149.126.72.220 5904 tcp tcpwrapped open
3535149.126.72.220 5905 tcp tcpwrapped open
3536149.126.72.220 5906 tcp tcpwrapped open
3537149.126.72.220 5907 tcp tcpwrapped open
3538149.126.72.220 5908 tcp tcpwrapped open
3539149.126.72.220 5909 tcp tcpwrapped open
3540149.126.72.220 5910 tcp tcpwrapped open
3541149.126.72.220 5911 tcp tcpwrapped open
3542149.126.72.220 5912 tcp tcpwrapped open
3543149.126.72.220 5913 tcp tcpwrapped open
3544149.126.72.220 5914 tcp tcpwrapped open
3545149.126.72.220 5915 tcp tcpwrapped open
3546149.126.72.220 5916 tcp tcpwrapped open
3547149.126.72.220 5917 tcp tcpwrapped open
3548149.126.72.220 5918 tcp tcpwrapped open
3549149.126.72.220 5919 tcp tcpwrapped open
3550149.126.72.220 5920 tcp tcpwrapped open
3551149.126.72.220 5984 tcp tcpwrapped open
3552149.126.72.220 5985 tcp tcpwrapped open
3553149.126.72.220 5986 tcp tcpwrapped open
3554149.126.72.220 5987 tcp tcpwrapped open
3555149.126.72.220 5988 tcp tcpwrapped open
3556149.126.72.220 5989 tcp tcpwrapped open
3557149.126.72.220 5990 tcp tcpwrapped open
3558149.126.72.220 5991 tcp tcpwrapped open
3559149.126.72.220 5992 tcp tcpwrapped open
3560149.126.72.220 5993 tcp tcpwrapped open
3561149.126.72.220 5994 tcp tcpwrapped open
3562149.126.72.220 5995 tcp tcpwrapped open
3563149.126.72.220 5996 tcp tcpwrapped open
3564149.126.72.220 5997 tcp tcpwrapped open
3565149.126.72.220 5998 tcp tcpwrapped open
3566149.126.72.220 5999 tcp tcpwrapped open
3567149.126.72.220 6000 tcp tcpwrapped open
3568149.126.72.220 6001 tcp tcpwrapped open
3569149.126.72.220 6002 tcp tcpwrapped open
3570149.126.72.220 6003 tcp tcpwrapped open
3571149.126.72.220 6004 tcp tcpwrapped open
3572149.126.72.220 6005 tcp tcpwrapped open
3573149.126.72.220 6006 tcp tcpwrapped open
3574149.126.72.220 6007 tcp tcpwrapped open
3575149.126.72.220 6008 tcp tcpwrapped open
3576149.126.72.220 6009 tcp tcpwrapped open
3577149.126.72.220 6010 tcp tcpwrapped open
3578149.126.72.220 6011 tcp tcpwrapped open
3579149.126.72.220 6021 tcp tcpwrapped open
3580149.126.72.220 6060 tcp tcpwrapped open
3581149.126.72.220 6061 tcp tcpwrapped open
3582149.126.72.220 6081 tcp tcpwrapped open
3583149.126.72.220 6100 tcp tcpwrapped open
3584149.126.72.220 6102 tcp tcpwrapped open
3585149.126.72.220 6134 tcp tcpwrapped open
3586149.126.72.220 6161 tcp tcpwrapped open
3587149.126.72.220 6331 tcp tcpwrapped open
3588149.126.72.220 6348 tcp tcpwrapped open
3589149.126.72.220 6379 tcp tcpwrapped open
3590149.126.72.220 6380 tcp tcpwrapped open
3591149.126.72.220 6433 tcp tcpwrapped open
3592149.126.72.220 6440 tcp tcpwrapped open
3593149.126.72.220 6443 tcp tcpwrapped open
3594149.126.72.220 6488 tcp tcpwrapped open
3595149.126.72.220 6500 tcp tcpwrapped open
3596149.126.72.220 6505 tcp tcpwrapped open
3597149.126.72.220 6510 tcp tcpwrapped open
3598149.126.72.220 6511 tcp tcpwrapped open
3599149.126.72.220 6512 tcp tcpwrapped open
3600149.126.72.220 6514 tcp tcpwrapped open
3601149.126.72.220 6543 tcp tcpwrapped open
3602149.126.72.220 6544 tcp tcpwrapped open
3603149.126.72.220 6560 tcp tcpwrapped open
3604149.126.72.220 6561 tcp tcpwrapped open
3605149.126.72.220 6565 tcp tcpwrapped open
3606149.126.72.220 6580 tcp tcpwrapped open
3607149.126.72.220 6581 tcp tcpwrapped open
3608149.126.72.220 6590 tcp tcpwrapped open
3609149.126.72.220 6601 tcp tcpwrapped open
3610149.126.72.220 6603 tcp tcpwrapped open
3611149.126.72.220 6605 tcp tcpwrapped open
3612149.126.72.220 6661 tcp tcpwrapped open
3613149.126.72.220 6662 tcp tcpwrapped open
3614149.126.72.220 6666 tcp tcpwrapped open
3615149.126.72.220 6686 tcp tcpwrapped open
3616149.126.72.220 6688 tcp tcpwrapped open
3617149.126.72.220 6700 tcp tcpwrapped open
3618149.126.72.220 6755 tcp tcpwrapped open
3619149.126.72.220 6775 tcp tcpwrapped open
3620149.126.72.220 6779 tcp tcpwrapped open
3621149.126.72.220 6789 tcp tcpwrapped open
3622149.126.72.220 6799 tcp tcpwrapped open
3623149.126.72.220 7000 tcp tcpwrapped open
3624149.126.72.220 7001 tcp tcpwrapped open
3625149.126.72.220 7002 tcp tcpwrapped open
3626149.126.72.220 7003 tcp tcpwrapped open
3627149.126.72.220 7004 tcp tcpwrapped open
3628149.126.72.220 7005 tcp tcpwrapped open
3629149.126.72.220 7007 tcp tcpwrapped open
3630149.126.72.220 7010 tcp tcpwrapped open
3631149.126.72.220 7011 tcp tcpwrapped open
3632149.126.72.220 7021 tcp tcpwrapped open
3633149.126.72.220 7070 tcp tcpwrapped open
3634149.126.72.220 7071 tcp tcpwrapped open
3635149.126.72.220 7079 tcp tcpwrapped open
3636149.126.72.220 7080 tcp tcpwrapped open
3637149.126.72.220 7081 tcp tcpwrapped open
3638149.126.72.220 7082 tcp tcpwrapped open
3639149.126.72.220 7083 tcp tcpwrapped open
3640149.126.72.220 7084 tcp tcpwrapped open
3641149.126.72.220 7085 tcp tcpwrapped open
3642149.126.72.220 7086 tcp tcpwrapped open
3643149.126.72.220 7087 tcp tcpwrapped open
3644149.126.72.220 7088 tcp tcpwrapped open
3645149.126.72.220 7090 tcp tcpwrapped open
3646149.126.72.220 7171 tcp tcpwrapped open
3647149.126.72.220 7172 tcp tcpwrapped open
3648149.126.72.220 7272 tcp tcpwrapped open
3649149.126.72.220 7348 tcp tcpwrapped open
3650149.126.72.220 7403 tcp tcpwrapped open
3651149.126.72.220 7433 tcp tcpwrapped open
3652149.126.72.220 7441 tcp tcpwrapped open
3653149.126.72.220 7443 tcp tcpwrapped open
3654149.126.72.220 7444 tcp tcpwrapped open
3655149.126.72.220 7445 tcp tcpwrapped open
3656149.126.72.220 7473 tcp tcpwrapped open
3657149.126.72.220 7500 tcp tcpwrapped open
3658149.126.72.220 7537 tcp tcpwrapped open
3659149.126.72.220 7687 tcp tcpwrapped open
3660149.126.72.220 7700 tcp tcpwrapped open
3661149.126.72.220 7771 tcp tcpwrapped open
3662149.126.72.220 7773 tcp tcpwrapped open
3663149.126.72.220 7774 tcp tcpwrapped open
3664149.126.72.220 7775 tcp tcpwrapped open
3665149.126.72.220 7776 tcp tcpwrapped open
3666149.126.72.220 7777 tcp tcpwrapped open
3667149.126.72.220 7778 tcp tcpwrapped open
3668149.126.72.220 7779 tcp tcpwrapped open
3669149.126.72.220 7788 tcp tcpwrapped open
3670149.126.72.220 7799 tcp tcpwrapped open
3671149.126.72.220 7998 tcp tcpwrapped open
3672149.126.72.220 7999 tcp tcpwrapped open
3673149.126.72.220 8000 tcp tcpwrapped open
3674149.126.72.220 8001 tcp tcpwrapped open
3675149.126.72.220 8002 tcp tcpwrapped open
3676149.126.72.220 8003 tcp tcpwrapped open
3677149.126.72.220 8004 tcp tcpwrapped open
3678149.126.72.220 8005 tcp tcpwrapped open
3679149.126.72.220 8006 tcp tcpwrapped open
3680149.126.72.220 8007 tcp tcpwrapped open
3681149.126.72.220 8008 tcp tcpwrapped open
3682149.126.72.220 8009 tcp tcpwrapped open
3683149.126.72.220 8010 tcp tcpwrapped open
3684149.126.72.220 8011 tcp tcpwrapped open
3685149.126.72.220 8012 tcp tcpwrapped open
3686149.126.72.220 8013 tcp tcpwrapped open
3687149.126.72.220 8014 tcp tcpwrapped open
3688149.126.72.220 8015 tcp tcpwrapped open
3689149.126.72.220 8016 tcp tcpwrapped open
3690149.126.72.220 8017 tcp tcpwrapped open
3691149.126.72.220 8018 tcp tcpwrapped open
3692149.126.72.220 8019 tcp tcpwrapped open
3693149.126.72.220 8020 tcp tcpwrapped open
3694149.126.72.220 8021 tcp tcpwrapped open
3695149.126.72.220 8022 tcp tcpwrapped open
3696149.126.72.220 8023 tcp tcpwrapped open
3697149.126.72.220 8024 tcp tcpwrapped open
3698149.126.72.220 8025 tcp tcpwrapped open
3699149.126.72.220 8026 tcp tcpwrapped open
3700149.126.72.220 8027 tcp tcpwrapped open
3701149.126.72.220 8028 tcp tcpwrapped open
3702149.126.72.220 8029 tcp tcpwrapped open
3703149.126.72.220 8030 tcp tcpwrapped open
3704149.126.72.220 8031 tcp tcpwrapped open
3705149.126.72.220 8032 tcp tcpwrapped open
3706149.126.72.220 8033 tcp tcpwrapped open
3707149.126.72.220 8034 tcp tcpwrapped open
3708149.126.72.220 8035 tcp tcpwrapped open
3709149.126.72.220 8036 tcp tcpwrapped open
3710149.126.72.220 8037 tcp tcpwrapped open
3711149.126.72.220 8038 tcp tcpwrapped open
3712149.126.72.220 8039 tcp tcpwrapped open
3713149.126.72.220 8040 tcp tcpwrapped open
3714149.126.72.220 8041 tcp tcpwrapped open
3715149.126.72.220 8042 tcp tcpwrapped open
3716149.126.72.220 8043 tcp tcpwrapped open
3717149.126.72.220 8044 tcp tcpwrapped open
3718149.126.72.220 8045 tcp tcpwrapped open
3719149.126.72.220 8046 tcp tcpwrapped open
3720149.126.72.220 8047 tcp tcpwrapped open
3721149.126.72.220 8048 tcp tcpwrapped open
3722149.126.72.220 8049 tcp tcpwrapped open
3723149.126.72.220 8050 tcp tcpwrapped open
3724149.126.72.220 8051 tcp tcpwrapped open
3725149.126.72.220 8052 tcp tcpwrapped open
3726149.126.72.220 8053 tcp tcpwrapped open
3727149.126.72.220 8054 tcp tcpwrapped open
3728149.126.72.220 8055 tcp tcpwrapped open
3729149.126.72.220 8056 tcp tcpwrapped open
3730149.126.72.220 8057 tcp tcpwrapped open
3731149.126.72.220 8058 tcp tcpwrapped open
3732149.126.72.220 8060 tcp tcpwrapped open
3733149.126.72.220 8064 tcp tcpwrapped open
3734149.126.72.220 8065 tcp tcpwrapped open
3735149.126.72.220 8069 tcp tcpwrapped open
3736149.126.72.220 8070 tcp tcpwrapped open
3737149.126.72.220 8071 tcp tcpwrapped open
3738149.126.72.220 8072 tcp tcpwrapped open
3739149.126.72.220 8074 tcp tcpwrapped open
3740149.126.72.220 8079 tcp tcpwrapped open
3741149.126.72.220 8080 tcp tcpwrapped open
3742149.126.72.220 8081 tcp tcpwrapped open
3743149.126.72.220 8082 tcp tcpwrapped open
3744149.126.72.220 8083 tcp tcpwrapped open
3745149.126.72.220 8084 tcp tcpwrapped open
3746149.126.72.220 8085 tcp tcpwrapped open
3747149.126.72.220 8086 tcp tcpwrapped open
3748149.126.72.220 8087 tcp tcpwrapped open
3749149.126.72.220 8088 tcp tcpwrapped open
3750149.126.72.220 8089 tcp tcpwrapped open
3751149.126.72.220 8090 tcp tcpwrapped open
3752149.126.72.220 8091 tcp tcpwrapped open
3753149.126.72.220 8092 tcp tcpwrapped open
3754149.126.72.220 8093 tcp tcpwrapped open
3755149.126.72.220 8094 tcp tcpwrapped open
3756149.126.72.220 8095 tcp tcpwrapped open
3757149.126.72.220 8096 tcp tcpwrapped open
3758149.126.72.220 8097 tcp tcpwrapped open
3759149.126.72.220 8098 tcp tcpwrapped open
3760149.126.72.220 8099 tcp tcpwrapped open
3761149.126.72.220 8100 tcp tcpwrapped open
3762149.126.72.220 8101 tcp tcpwrapped open
3763149.126.72.220 8102 tcp tcpwrapped open
3764149.126.72.220 8103 tcp tcpwrapped open
3765149.126.72.220 8104 tcp tcpwrapped open
3766149.126.72.220 8105 tcp tcpwrapped open
3767149.126.72.220 8106 tcp tcpwrapped open
3768149.126.72.220 8107 tcp tcpwrapped open
3769149.126.72.220 8108 tcp tcpwrapped open
3770149.126.72.220 8109 tcp tcpwrapped open
3771149.126.72.220 8110 tcp tcpwrapped open
3772149.126.72.220 8113 tcp tcpwrapped open
3773149.126.72.220 8114 tcp tcpwrapped open
3774149.126.72.220 8115 tcp tcpwrapped open
3775149.126.72.220 8118 tcp tcpwrapped open
3776149.126.72.220 8119 tcp tcpwrapped open
3777149.126.72.220 8120 tcp tcpwrapped open
3778149.126.72.220 8121 tcp tcpwrapped open
3779149.126.72.220 8123 tcp tcpwrapped open
3780149.126.72.220 8125 tcp tcpwrapped open
3781149.126.72.220 8126 tcp tcpwrapped open
3782149.126.72.220 8128 tcp tcpwrapped open
3783149.126.72.220 8129 tcp tcpwrapped open
3784149.126.72.220 8130 tcp tcpwrapped open
3785149.126.72.220 8131 tcp tcpwrapped open
3786149.126.72.220 8132 tcp tcpwrapped open
3787149.126.72.220 8133 tcp tcpwrapped open
3788149.126.72.220 8136 tcp tcpwrapped open
3789149.126.72.220 8140 tcp tcpwrapped open
3790149.126.72.220 8142 tcp tcpwrapped open
3791149.126.72.220 8143 tcp tcpwrapped open
3792149.126.72.220 8144 tcp tcpwrapped open
3793149.126.72.220 8147 tcp tcpwrapped open
3794149.126.72.220 8148 tcp tcpwrapped open
3795149.126.72.220 8149 tcp tcpwrapped open
3796149.126.72.220 8150 tcp tcpwrapped open
3797149.126.72.220 8154 tcp tcpwrapped open
3798149.126.72.220 8156 tcp tcpwrapped open
3799149.126.72.220 8157 tcp tcpwrapped open
3800149.126.72.220 8158 tcp tcpwrapped open
3801149.126.72.220 8160 tcp tcpwrapped open
3802149.126.72.220 8161 tcp tcpwrapped open
3803149.126.72.220 8162 tcp tcpwrapped open
3804149.126.72.220 8163 tcp tcpwrapped open
3805149.126.72.220 8164 tcp tcpwrapped open
3806149.126.72.220 8165 tcp tcpwrapped open
3807149.126.72.220 8166 tcp tcpwrapped open
3808149.126.72.220 8167 tcp tcpwrapped open
3809149.126.72.220 8168 tcp tcpwrapped open
3810149.126.72.220 8169 tcp tcpwrapped open
3811149.126.72.220 8170 tcp tcpwrapped open
3812149.126.72.220 8171 tcp tcpwrapped open
3813149.126.72.220 8172 tcp tcpwrapped open
3814149.126.72.220 8173 tcp tcpwrapped open
3815149.126.72.220 8175 tcp tcpwrapped open
3816149.126.72.220 8176 tcp tcpwrapped open
3817149.126.72.220 8178 tcp tcpwrapped open
3818149.126.72.220 8179 tcp tcpwrapped open
3819149.126.72.220 8180 tcp tcpwrapped open
3820149.126.72.220 8181 tcp tcpwrapped open
3821149.126.72.220 8182 tcp tcpwrapped open
3822149.126.72.220 8183 tcp tcpwrapped open
3823149.126.72.220 8184 tcp tcpwrapped open
3824149.126.72.220 8185 tcp tcpwrapped open
3825149.126.72.220 8186 tcp tcpwrapped open
3826149.126.72.220 8187 tcp tcpwrapped open
3827149.126.72.220 8188 tcp tcpwrapped open
3828149.126.72.220 8189 tcp tcpwrapped open
3829149.126.72.220 8190 tcp tcpwrapped open
3830149.126.72.220 8191 tcp tcpwrapped open
3831149.126.72.220 8192 tcp tcpwrapped open
3832149.126.72.220 8193 tcp tcpwrapped open
3833149.126.72.220 8194 tcp tcpwrapped open
3834149.126.72.220 8195 tcp tcpwrapped open
3835149.126.72.220 8198 tcp tcpwrapped open
3836149.126.72.220 8199 tcp tcpwrapped open
3837149.126.72.220 8200 tcp tcpwrapped open
3838149.126.72.220 8203 tcp tcpwrapped open
3839149.126.72.220 8222 tcp tcpwrapped open
3840149.126.72.220 8230 tcp tcpwrapped open
3841149.126.72.220 8236 tcp tcpwrapped open
3842149.126.72.220 8237 tcp tcpwrapped open
3843149.126.72.220 8238 tcp tcpwrapped open
3844149.126.72.220 8239 tcp tcpwrapped open
3845149.126.72.220 8241 tcp tcpwrapped open
3846149.126.72.220 8243 tcp tcpwrapped open
3847149.126.72.220 8248 tcp tcpwrapped open
3848149.126.72.220 8249 tcp tcpwrapped open
3849149.126.72.220 8250 tcp tcpwrapped open
3850149.126.72.220 8251 tcp tcpwrapped open
3851149.126.72.220 8252 tcp tcpwrapped open
3852149.126.72.220 8280 tcp tcpwrapped open
3853149.126.72.220 8282 tcp tcpwrapped open
3854149.126.72.220 8333 tcp tcpwrapped open
3855149.126.72.220 8340 tcp tcpwrapped open
3856149.126.72.220 8343 tcp tcpwrapped open
3857149.126.72.220 8350 tcp tcpwrapped open
3858149.126.72.220 8381 tcp tcpwrapped open
3859149.126.72.220 8382 tcp tcpwrapped open
3860149.126.72.220 8383 tcp tcpwrapped open
3861149.126.72.220 8384 tcp tcpwrapped open
3862149.126.72.220 8385 tcp tcpwrapped open
3863149.126.72.220 8388 tcp tcpwrapped open
3864149.126.72.220 8393 tcp tcpwrapped open
3865149.126.72.220 8401 tcp tcpwrapped open
3866149.126.72.220 8402 tcp tcpwrapped open
3867149.126.72.220 8403 tcp tcpwrapped open
3868149.126.72.220 8404 tcp tcpwrapped open
3869149.126.72.220 8405 tcp tcpwrapped open
3870149.126.72.220 8406 tcp tcpwrapped open
3871149.126.72.220 8407 tcp tcpwrapped open
3872149.126.72.220 8408 tcp tcpwrapped open
3873149.126.72.220 8409 tcp tcpwrapped open
3874149.126.72.220 8410 tcp tcpwrapped open
3875149.126.72.220 8411 tcp tcpwrapped open
3876149.126.72.220 8412 tcp tcpwrapped open
3877149.126.72.220 8413 tcp tcpwrapped open
3878149.126.72.220 8414 tcp tcpwrapped open
3879149.126.72.220 8415 tcp tcpwrapped open
3880149.126.72.220 8416 tcp tcpwrapped open
3881149.126.72.220 8417 tcp tcpwrapped open
3882149.126.72.220 8418 tcp tcpwrapped open
3883149.126.72.220 8419 tcp tcpwrapped open
3884149.126.72.220 8420 tcp tcpwrapped open
3885149.126.72.220 8421 tcp tcpwrapped open
3886149.126.72.220 8422 tcp tcpwrapped open
3887149.126.72.220 8423 tcp tcpwrapped open
3888149.126.72.220 8424 tcp tcpwrapped open
3889149.126.72.220 8425 tcp tcpwrapped open
3890149.126.72.220 8426 tcp tcpwrapped open
3891149.126.72.220 8427 tcp tcpwrapped open
3892149.126.72.220 8428 tcp tcpwrapped open
3893149.126.72.220 8429 tcp tcpwrapped open
3894149.126.72.220 8430 tcp tcpwrapped open
3895149.126.72.220 8431 tcp tcpwrapped open
3896149.126.72.220 8432 tcp tcpwrapped open
3897149.126.72.220 8433 tcp tcpwrapped open
3898149.126.72.220 8435 tcp tcpwrapped open
3899149.126.72.220 8440 tcp tcpwrapped open
3900149.126.72.220 8441 tcp tcpwrapped open
3901149.126.72.220 8442 tcp tcpwrapped open
3902149.126.72.220 8443 tcp tcpwrapped open
3903149.126.72.220 8444 tcp tcpwrapped open
3904149.126.72.220 8445 tcp tcpwrapped open
3905149.126.72.220 8446 tcp tcpwrapped open
3906149.126.72.220 8447 tcp tcpwrapped open
3907149.126.72.220 8448 tcp tcpwrapped open
3908149.126.72.220 8449 tcp tcpwrapped open
3909149.126.72.220 8450 tcp tcpwrapped open
3910149.126.72.220 8451 tcp tcpwrapped open
3911149.126.72.220 8452 tcp tcpwrapped open
3912149.126.72.220 8453 tcp tcpwrapped open
3913149.126.72.220 8454 tcp tcpwrapped open
3914149.126.72.220 8455 tcp tcpwrapped open
3915149.126.72.220 8456 tcp tcpwrapped open
3916149.126.72.220 8457 tcp tcpwrapped open
3917149.126.72.220 8458 tcp tcpwrapped open
3918149.126.72.220 8459 tcp tcpwrapped open
3919149.126.72.220 8460 tcp tcpwrapped open
3920149.126.72.220 8461 tcp tcpwrapped open
3921149.126.72.220 8462 tcp tcpwrapped open
3922149.126.72.220 8463 tcp tcpwrapped open
3923149.126.72.220 8464 tcp tcpwrapped open
3924149.126.72.220 8465 tcp tcpwrapped open
3925149.126.72.220 8466 tcp tcpwrapped open
3926149.126.72.220 8467 tcp tcpwrapped open
3927149.126.72.220 8470 tcp tcpwrapped open
3928149.126.72.220 8472 tcp tcpwrapped open
3929149.126.72.220 8473 tcp tcpwrapped open
3930149.126.72.220 8475 tcp tcpwrapped open
3931149.126.72.220 8480 tcp tcpwrapped open
3932149.126.72.220 8481 tcp tcpwrapped open
3933149.126.72.220 8482 tcp tcpwrapped open
3934149.126.72.220 8484 tcp tcpwrapped open
3935149.126.72.220 8485 tcp tcpwrapped open
3936149.126.72.220 8488 tcp tcpwrapped open
3937149.126.72.220 8493 tcp tcpwrapped open
3938149.126.72.220 8494 tcp tcpwrapped open
3939149.126.72.220 8500 tcp tcpwrapped open
3940149.126.72.220 8502 tcp tcpwrapped open
3941149.126.72.220 8503 tcp tcpwrapped open
3942149.126.72.220 8504 tcp tcpwrapped open
3943149.126.72.220 8505 tcp tcpwrapped open
3944149.126.72.220 8506 tcp tcpwrapped open
3945149.126.72.220 8510 tcp tcpwrapped open
3946149.126.72.220 8513 tcp tcpwrapped open
3947149.126.72.220 8514 tcp tcpwrapped open
3948149.126.72.220 8515 tcp tcpwrapped open
3949149.126.72.220 8519 tcp tcpwrapped open
3950149.126.72.220 8520 tcp tcpwrapped open
3951149.126.72.220 8521 tcp tcpwrapped open
3952149.126.72.220 8523 tcp tcpwrapped open
3953149.126.72.220 8524 tcp tcpwrapped open
3954149.126.72.220 8525 tcp tcpwrapped open
3955149.126.72.220 8526 tcp tcpwrapped open
3956149.126.72.220 8528 tcp tcpwrapped open
3957149.126.72.220 8529 tcp tcpwrapped open
3958149.126.72.220 8530 tcp tcpwrapped open
3959149.126.72.220 8531 tcp tcpwrapped open
3960149.126.72.220 8532 tcp tcpwrapped open
3961149.126.72.220 8533 tcp tcpwrapped open
3962149.126.72.220 8536 tcp tcpwrapped open
3963149.126.72.220 8540 tcp tcpwrapped open
3964149.126.72.220 8543 tcp tcpwrapped open
3965149.126.72.220 8544 tcp tcpwrapped open
3966149.126.72.220 8548 tcp tcpwrapped open
3967149.126.72.220 8549 tcp tcpwrapped open
3968149.126.72.220 8550 tcp tcpwrapped open
3969149.126.72.220 8551 tcp tcpwrapped open
3970149.126.72.220 8553 tcp tcpwrapped open
3971149.126.72.220 8556 tcp tcpwrapped open
3972149.126.72.220 8557 tcp tcpwrapped open
3973149.126.72.220 8558 tcp tcpwrapped open
3974149.126.72.220 8560 tcp tcpwrapped open
3975149.126.72.220 8561 tcp tcpwrapped open
3976149.126.72.220 8562 tcp tcpwrapped open
3977149.126.72.220 8563 tcp tcpwrapped open
3978149.126.72.220 8564 tcp tcpwrapped open
3979149.126.72.220 8565 tcp tcpwrapped open
3980149.126.72.220 8566 tcp tcpwrapped open
3981149.126.72.220 8567 tcp tcpwrapped open
3982149.126.72.220 8568 tcp tcpwrapped open
3983149.126.72.220 8569 tcp tcpwrapped open
3984149.126.72.220 8570 tcp tcpwrapped open
3985149.126.72.220 8571 tcp tcpwrapped open
3986149.126.72.220 8573 tcp tcpwrapped open
3987149.126.72.220 8574 tcp tcpwrapped open
3988149.126.72.220 8575 tcp tcpwrapped open
3989149.126.72.220 8576 tcp tcpwrapped open
3990149.126.72.220 8577 tcp tcpwrapped open
3991149.126.72.220 8578 tcp tcpwrapped open
3992149.126.72.220 8579 tcp tcpwrapped open
3993149.126.72.220 8580 tcp tcpwrapped open
3994149.126.72.220 8581 tcp tcpwrapped open
3995149.126.72.220 8582 tcp tcpwrapped open
3996149.126.72.220 8583 tcp tcpwrapped open
3997149.126.72.220 8585 tcp tcpwrapped open
3998149.126.72.220 8586 tcp tcpwrapped open
3999149.126.72.220 8588 tcp tcpwrapped open
4000149.126.72.220 8589 tcp tcpwrapped open
4001149.126.72.220 8590 tcp tcpwrapped open
4002149.126.72.220 8591 tcp tcpwrapped open
4003149.126.72.220 8592 tcp tcpwrapped open
4004149.126.72.220 8593 tcp tcpwrapped open
4005149.126.72.220 8594 tcp tcpwrapped open
4006149.126.72.220 8595 tcp tcpwrapped open
4007149.126.72.220 8596 tcp tcpwrapped open
4008149.126.72.220 8597 tcp tcpwrapped open
4009149.126.72.220 8598 tcp tcpwrapped open
4010149.126.72.220 8599 tcp tcpwrapped open
4011149.126.72.220 8600 tcp tcpwrapped open
4012149.126.72.220 8601 tcp tcpwrapped open
4013149.126.72.220 8605 tcp tcpwrapped open
4014149.126.72.220 8606 tcp tcpwrapped open
4015149.126.72.220 8630 tcp tcpwrapped open
4016149.126.72.220 8640 tcp tcpwrapped open
4017149.126.72.220 8641 tcp tcpwrapped open
4018149.126.72.220 8643 tcp tcpwrapped open
4019149.126.72.220 8663 tcp tcpwrapped open
4020149.126.72.220 8666 tcp tcpwrapped open
4021149.126.72.220 8686 tcp tcpwrapped open
4022149.126.72.220 8688 tcp tcpwrapped open
4023149.126.72.220 8700 tcp tcpwrapped open
4024149.126.72.220 8701 tcp tcpwrapped open
4025149.126.72.220 8702 tcp tcpwrapped open
4026149.126.72.220 8703 tcp tcpwrapped open
4027149.126.72.220 8704 tcp tcpwrapped open
4028149.126.72.220 8705 tcp tcpwrapped open
4029149.126.72.220 8706 tcp tcpwrapped open
4030149.126.72.220 8707 tcp tcpwrapped open
4031149.126.72.220 8708 tcp tcpwrapped open
4032149.126.72.220 8709 tcp tcpwrapped open
4033149.126.72.220 8723 tcp tcpwrapped open
4034149.126.72.220 8724 tcp tcpwrapped open
4035149.126.72.220 8731 tcp tcpwrapped open
4036149.126.72.220 8732 tcp tcpwrapped open
4037149.126.72.220 8764 tcp tcpwrapped open
4038149.126.72.220 8765 tcp tcpwrapped open
4039149.126.72.220 8766 tcp tcpwrapped open
4040149.126.72.220 8767 tcp tcpwrapped open
4041149.126.72.220 8771 tcp tcpwrapped open
4042149.126.72.220 8787 tcp tcpwrapped open
4043149.126.72.220 8788 tcp tcpwrapped open
4044149.126.72.220 8789 tcp tcpwrapped open
4045149.126.72.220 8790 tcp tcpwrapped open
4046149.126.72.220 8791 tcp tcpwrapped open
4047149.126.72.220 8800 tcp tcpwrapped open
4048149.126.72.220 8801 tcp tcpwrapped open
4049149.126.72.220 8802 tcp tcpwrapped open
4050149.126.72.220 8803 tcp tcpwrapped open
4051149.126.72.220 8804 tcp tcpwrapped open
4052149.126.72.220 8805 tcp tcpwrapped open
4053149.126.72.220 8806 tcp tcpwrapped open
4054149.126.72.220 8807 tcp tcpwrapped open
4055149.126.72.220 8808 tcp tcpwrapped open
4056149.126.72.220 8809 tcp tcpwrapped open
4057149.126.72.220 8810 tcp tcpwrapped open
4058149.126.72.220 8811 tcp tcpwrapped open
4059149.126.72.220 8812 tcp tcpwrapped open
4060149.126.72.220 8813 tcp tcpwrapped open
4061149.126.72.220 8814 tcp tcpwrapped open
4062149.126.72.220 8815 tcp tcpwrapped open
4063149.126.72.220 8816 tcp tcpwrapped open
4064149.126.72.220 8817 tcp tcpwrapped open
4065149.126.72.220 8818 tcp tcpwrapped open
4066149.126.72.220 8819 tcp tcpwrapped open
4067149.126.72.220 8820 tcp tcpwrapped open
4068149.126.72.220 8821 tcp tcpwrapped open
4069149.126.72.220 8822 tcp tcpwrapped open
4070149.126.72.220 8823 tcp tcpwrapped open
4071149.126.72.220 8824 tcp tcpwrapped open
4072149.126.72.220 8825 tcp tcpwrapped open
4073149.126.72.220 8826 tcp tcpwrapped open
4074149.126.72.220 8827 tcp tcpwrapped open
4075149.126.72.220 8828 tcp tcpwrapped open
4076149.126.72.220 8829 tcp tcpwrapped open
4077149.126.72.220 8830 tcp tcpwrapped open
4078149.126.72.220 8831 tcp tcpwrapped open
4079149.126.72.220 8832 tcp tcpwrapped open
4080149.126.72.220 8833 tcp tcpwrapped open
4081149.126.72.220 8834 tcp tcpwrapped open
4082149.126.72.220 8835 tcp tcpwrapped open
4083149.126.72.220 8836 tcp tcpwrapped open
4084149.126.72.220 8837 tcp tcpwrapped open
4085149.126.72.220 8838 tcp tcpwrapped open
4086149.126.72.220 8839 tcp tcpwrapped open
4087149.126.72.220 8840 tcp tcpwrapped open
4088149.126.72.220 8841 tcp tcpwrapped open
4089149.126.72.220 8842 tcp tcpwrapped open
4090149.126.72.220 8843 tcp tcpwrapped open
4091149.126.72.220 8844 tcp tcpwrapped open
4092149.126.72.220 8845 tcp tcpwrapped open
4093149.126.72.220 8846 tcp tcpwrapped open
4094149.126.72.220 8847 tcp tcpwrapped open
4095149.126.72.220 8848 tcp tcpwrapped open
4096149.126.72.220 8849 tcp tcpwrapped open
4097149.126.72.220 8850 tcp tcpwrapped open
4098149.126.72.220 8851 tcp tcpwrapped open
4099149.126.72.220 8852 tcp tcpwrapped open
4100149.126.72.220 8853 tcp tcpwrapped open
4101149.126.72.220 8854 tcp tcpwrapped open
4102149.126.72.220 8855 tcp tcpwrapped open
4103149.126.72.220 8856 tcp tcpwrapped open
4104149.126.72.220 8857 tcp tcpwrapped open
4105149.126.72.220 8858 tcp tcpwrapped open
4106149.126.72.220 8859 tcp tcpwrapped open
4107149.126.72.220 8860 tcp tcpwrapped open
4108149.126.72.220 8861 tcp tcpwrapped open
4109149.126.72.220 8862 tcp tcpwrapped open
4110149.126.72.220 8863 tcp tcpwrapped open
4111149.126.72.220 8864 tcp tcpwrapped open
4112149.126.72.220 8865 tcp tcpwrapped open
4113149.126.72.220 8866 tcp tcpwrapped open
4114149.126.72.220 8867 tcp tcpwrapped open
4115149.126.72.220 8868 tcp tcpwrapped open
4116149.126.72.220 8869 tcp tcpwrapped open
4117149.126.72.220 8870 tcp tcpwrapped open
4118149.126.72.220 8871 tcp tcpwrapped open
4119149.126.72.220 8872 tcp tcpwrapped open
4120149.126.72.220 8873 tcp tcpwrapped open
4121149.126.72.220 8874 tcp tcpwrapped open
4122149.126.72.220 8875 tcp tcpwrapped open
4123149.126.72.220 8876 tcp tcpwrapped open
4124149.126.72.220 8877 tcp tcpwrapped open
4125149.126.72.220 8878 tcp tcpwrapped open
4126149.126.72.220 8879 tcp tcpwrapped open
4127149.126.72.220 8880 tcp tcpwrapped open
4128149.126.72.220 8881 tcp tcpwrapped open
4129149.126.72.220 8882 tcp tcpwrapped open
4130149.126.72.220 8883 tcp tcpwrapped open
4131149.126.72.220 8884 tcp tcpwrapped open
4132149.126.72.220 8885 tcp tcpwrapped open
4133149.126.72.220 8887 tcp tcpwrapped open
4134149.126.72.220 8888 tcp tcpwrapped open
4135149.126.72.220 8889 tcp tcpwrapped open
4136149.126.72.220 8890 tcp tcpwrapped open
4137149.126.72.220 8891 tcp tcpwrapped open
4138149.126.72.220 8899 tcp tcpwrapped open
4139149.126.72.220 8900 tcp tcpwrapped open
4140149.126.72.220 8901 tcp tcpwrapped open
4141149.126.72.220 8902 tcp tcpwrapped open
4142149.126.72.220 8905 tcp tcpwrapped open
4143149.126.72.220 8906 tcp tcpwrapped open
4144149.126.72.220 8907 tcp tcpwrapped open
4145149.126.72.220 8908 tcp tcpwrapped open
4146149.126.72.220 8910 tcp tcpwrapped open
4147149.126.72.220 8911 tcp tcpwrapped open
4148149.126.72.220 8912 tcp tcpwrapped open
4149149.126.72.220 8913 tcp tcpwrapped open
4150149.126.72.220 8915 tcp tcpwrapped open
4151149.126.72.220 8916 tcp tcpwrapped open
4152149.126.72.220 8935 tcp tcpwrapped open
4153149.126.72.220 8943 tcp tcpwrapped open
4154149.126.72.220 8969 tcp tcpwrapped open
4155149.126.72.220 8988 tcp tcpwrapped open
4156149.126.72.220 8989 tcp tcpwrapped open
4157149.126.72.220 8999 tcp tcpwrapped open
4158149.126.72.220 9000 tcp tcpwrapped open
4159149.126.72.220 9001 tcp tcpwrapped open
4160149.126.72.220 9002 tcp tcpwrapped open
4161149.126.72.220 9003 tcp tcpwrapped open
4162149.126.72.220 9004 tcp tcpwrapped open
4163149.126.72.220 9005 tcp tcpwrapped open
4164149.126.72.220 9006 tcp tcpwrapped open
4165149.126.72.220 9007 tcp tcpwrapped open
4166149.126.72.220 9008 tcp tcpwrapped open
4167149.126.72.220 9009 tcp tcpwrapped open
4168149.126.72.220 9010 tcp tcpwrapped open
4169149.126.72.220 9011 tcp tcpwrapped open
4170149.126.72.220 9012 tcp tcpwrapped open
4171149.126.72.220 9013 tcp tcpwrapped open
4172149.126.72.220 9014 tcp tcpwrapped open
4173149.126.72.220 9015 tcp tcpwrapped open
4174149.126.72.220 9016 tcp tcpwrapped open
4175149.126.72.220 9017 tcp tcpwrapped open
4176149.126.72.220 9018 tcp tcpwrapped open
4177149.126.72.220 9019 tcp tcpwrapped open
4178149.126.72.220 9020 tcp tcpwrapped open
4179149.126.72.220 9021 tcp tcpwrapped open
4180149.126.72.220 9022 tcp tcpwrapped open
4181149.126.72.220 9023 tcp tcpwrapped open
4182149.126.72.220 9024 tcp tcpwrapped open
4183149.126.72.220 9025 tcp tcpwrapped open
4184149.126.72.220 9026 tcp tcpwrapped open
4185149.126.72.220 9027 tcp tcpwrapped open
4186149.126.72.220 9028 tcp tcpwrapped open
4187149.126.72.220 9029 tcp tcpwrapped open
4188149.126.72.220 9030 tcp tcpwrapped open
4189149.126.72.220 9031 tcp tcpwrapped open
4190149.126.72.220 9032 tcp tcpwrapped open
4191149.126.72.220 9033 tcp tcpwrapped open
4192149.126.72.220 9034 tcp tcpwrapped open
4193149.126.72.220 9035 tcp tcpwrapped open
4194149.126.72.220 9036 tcp tcpwrapped open
4195149.126.72.220 9037 tcp tcpwrapped open
4196149.126.72.220 9038 tcp tcpwrapped open
4197149.126.72.220 9039 tcp tcpwrapped open
4198149.126.72.220 9040 tcp tcpwrapped open
4199149.126.72.220 9041 tcp tcpwrapped open
4200149.126.72.220 9042 tcp tcpwrapped open
4201149.126.72.220 9043 tcp tcpwrapped open
4202149.126.72.220 9044 tcp tcpwrapped open
4203149.126.72.220 9045 tcp tcpwrapped open
4204149.126.72.220 9046 tcp tcpwrapped open
4205149.126.72.220 9047 tcp tcpwrapped open
4206149.126.72.220 9048 tcp tcpwrapped open
4207149.126.72.220 9049 tcp tcpwrapped open
4208149.126.72.220 9050 tcp tcpwrapped open
4209149.126.72.220 9051 tcp tcpwrapped open
4210149.126.72.220 9052 tcp tcpwrapped open
4211149.126.72.220 9058 tcp tcpwrapped open
4212149.126.72.220 9060 tcp tcpwrapped open
4213149.126.72.220 9061 tcp tcpwrapped open
4214149.126.72.220 9070 tcp tcpwrapped open
4215149.126.72.220 9080 tcp tcpwrapped open
4216149.126.72.220 9081 tcp tcpwrapped open
4217149.126.72.220 9082 tcp tcpwrapped open
4218149.126.72.220 9084 tcp tcpwrapped open
4219149.126.72.220 9085 tcp tcpwrapped open
4220149.126.72.220 9086 tcp tcpwrapped open
4221149.126.72.220 9088 tcp tcpwrapped open
4222149.126.72.220 9089 tcp tcpwrapped open
4223149.126.72.220 9090 tcp tcpwrapped open
4224149.126.72.220 9091 tcp tcpwrapped open
4225149.126.72.220 9092 tcp tcpwrapped open
4226149.126.72.220 9093 tcp tcpwrapped open
4227149.126.72.220 9094 tcp tcpwrapped open
4228149.126.72.220 9095 tcp tcpwrapped open
4229149.126.72.220 9096 tcp tcpwrapped open
4230149.126.72.220 9097 tcp tcpwrapped open
4231149.126.72.220 9098 tcp tcpwrapped open
4232149.126.72.220 9099 tcp tcpwrapped open
4233149.126.72.220 9100 tcp jetdirect open
4234149.126.72.220 9101 tcp jetdirect open
4235149.126.72.220 9102 tcp jetdirect open
4236149.126.72.220 9103 tcp jetdirect open
4237149.126.72.220 9104 tcp jetdirect open
4238149.126.72.220 9105 tcp jetdirect open
4239149.126.72.220 9106 tcp jetdirect open
4240149.126.72.220 9107 tcp jetdirect open
4241149.126.72.220 9108 tcp tcpwrapped open
4242149.126.72.220 9109 tcp tcpwrapped open
4243149.126.72.220 9110 tcp tcpwrapped open
4244149.126.72.220 9111 tcp tcpwrapped open
4245149.126.72.220 9136 tcp tcpwrapped open
4246149.126.72.220 9143 tcp tcpwrapped open
4247149.126.72.220 9189 tcp tcpwrapped open
4248149.126.72.220 9199 tcp tcpwrapped open
4249149.126.72.220 9200 tcp tcpwrapped open
4250149.126.72.220 9201 tcp tcpwrapped open
4251149.126.72.220 9202 tcp tcpwrapped open
4252149.126.72.220 9203 tcp tcpwrapped open
4253149.126.72.220 9204 tcp tcpwrapped open
4254149.126.72.220 9205 tcp tcpwrapped open
4255149.126.72.220 9206 tcp tcpwrapped open
4256149.126.72.220 9207 tcp tcpwrapped open
4257149.126.72.220 9208 tcp tcpwrapped open
4258149.126.72.220 9209 tcp tcpwrapped open
4259149.126.72.220 9210 tcp tcpwrapped open
4260149.126.72.220 9211 tcp tcpwrapped open
4261149.126.72.220 9212 tcp tcpwrapped open
4262149.126.72.220 9213 tcp tcpwrapped open
4263149.126.72.220 9214 tcp tcpwrapped open
4264149.126.72.220 9215 tcp tcpwrapped open
4265149.126.72.220 9216 tcp tcpwrapped open
4266149.126.72.220 9217 tcp tcpwrapped open
4267149.126.72.220 9218 tcp tcpwrapped open
4268149.126.72.220 9219 tcp tcpwrapped open
4269149.126.72.220 9220 tcp tcpwrapped open
4270149.126.72.220 9221 tcp tcpwrapped open
4271149.126.72.220 9236 tcp tcpwrapped open
4272149.126.72.220 9251 tcp tcpwrapped open
4273149.126.72.220 9289 tcp tcpwrapped open
4274149.126.72.220 9299 tcp tcpwrapped open
4275149.126.72.220 9300 tcp tcpwrapped open
4276149.126.72.220 9301 tcp tcpwrapped open
4277149.126.72.220 9302 tcp tcpwrapped open
4278149.126.72.220 9303 tcp tcpwrapped open
4279149.126.72.220 9304 tcp tcpwrapped open
4280149.126.72.220 9305 tcp tcpwrapped open
4281149.126.72.220 9306 tcp tcpwrapped open
4282149.126.72.220 9307 tcp tcpwrapped open
4283149.126.72.220 9308 tcp tcpwrapped open
4284149.126.72.220 9309 tcp tcpwrapped open
4285149.126.72.220 9310 tcp tcpwrapped open
4286149.126.72.220 9311 tcp tcpwrapped open
4287149.126.72.220 9350 tcp tcpwrapped open
4288149.126.72.220 9383 tcp tcpwrapped open
4289149.126.72.220 9387 tcp tcpwrapped open
4290149.126.72.220 9389 tcp tcpwrapped open
4291149.126.72.220 9433 tcp tcpwrapped open
4292149.126.72.220 9443 tcp tcpwrapped open
4293149.126.72.220 9444 tcp tcpwrapped open
4294149.126.72.220 9446 tcp tcpwrapped open
4295149.126.72.220 9447 tcp tcpwrapped open
4296149.126.72.220 9500 tcp tcpwrapped open
4297149.126.72.220 9510 tcp tcpwrapped open
4298149.126.72.220 9530 tcp tcpwrapped open
4299149.126.72.220 9550 tcp tcpwrapped open
4300149.126.72.220 9600 tcp tcpwrapped open
4301149.126.72.220 9663 tcp tcpwrapped open
4302149.126.72.220 9690 tcp tcpwrapped open
4303149.126.72.220 9704 tcp tcpwrapped open
4304149.126.72.220 9710 tcp tcpwrapped open
4305149.126.72.220 9711 tcp tcpwrapped open
4306149.126.72.220 9765 tcp tcpwrapped open
4307149.126.72.220 9773 tcp tcpwrapped open
4308149.126.72.220 9779 tcp tcpwrapped open
4309149.126.72.220 9800 tcp tcpwrapped open
4310149.126.72.220 9803 tcp tcpwrapped open
4311149.126.72.220 9804 tcp tcpwrapped open
4312149.126.72.220 9950 tcp tcpwrapped open
4313149.126.72.220 9991 tcp tcpwrapped open
4314149.126.72.220 9992 tcp tcpwrapped open
4315149.126.72.220 9993 tcp tcpwrapped open
4316149.126.72.220 9994 tcp tcpwrapped open
4317149.126.72.220 9997 tcp tcpwrapped open
4318149.126.72.220 9998 tcp tcpwrapped open
4319149.126.72.220 9999 tcp tcpwrapped open
4320149.126.72.220 10000 tcp tcpwrapped open
4321149.126.72.220 10001 tcp tcpwrapped open
4322149.126.72.220 10002 tcp tcpwrapped open
4323149.126.72.220 10003 tcp tcpwrapped open
4324149.126.72.220 10004 tcp tcpwrapped open
4325149.126.72.220 10005 tcp tcpwrapped open
4326149.126.72.220 10006 tcp tcpwrapped open
4327149.126.72.220 10007 tcp tcpwrapped open
4328149.126.72.220 10008 tcp tcpwrapped open
4329149.126.72.220 10009 tcp tcpwrapped open
4330149.126.72.220 10010 tcp tcpwrapped open
4331149.126.72.220 10011 tcp tcpwrapped open
4332149.126.72.220 10012 tcp tcpwrapped open
4333149.126.72.220 10013 tcp tcpwrapped open
4334149.126.72.220 10014 tcp tcpwrapped open
4335149.126.72.220 10015 tcp tcpwrapped open
4336149.126.72.220 10016 tcp tcpwrapped open
4337149.126.72.220 10017 tcp tcpwrapped open
4338149.126.72.220 10018 tcp tcpwrapped open
4339149.126.72.220 10019 tcp tcpwrapped open
4340149.126.72.220 10020 tcp tcpwrapped open
4341149.126.72.220 10021 tcp tcpwrapped open
4342149.126.72.220 10022 tcp tcpwrapped open
4343149.126.72.220 10023 tcp tcpwrapped open
4344149.126.72.220 10024 tcp tcpwrapped open
4345149.126.72.220 10025 tcp tcpwrapped open
4346149.126.72.220 10026 tcp tcpwrapped open
4347149.126.72.220 10027 tcp tcpwrapped open
4348149.126.72.220 10028 tcp tcpwrapped open
4349149.126.72.220 10029 tcp tcpwrapped open
4350149.126.72.220 10030 tcp tcpwrapped open
4351149.126.72.220 10031 tcp tcpwrapped open
4352149.126.72.220 10032 tcp tcpwrapped open
4353149.126.72.220 10033 tcp tcpwrapped open
4354149.126.72.220 10034 tcp tcpwrapped open
4355149.126.72.220 10035 tcp tcpwrapped open
4356149.126.72.220 10036 tcp tcpwrapped open
4357149.126.72.220 10037 tcp tcpwrapped open
4358149.126.72.220 10038 tcp tcpwrapped open
4359149.126.72.220 10039 tcp tcpwrapped open
4360149.126.72.220 10040 tcp tcpwrapped open
4361149.126.72.220 10041 tcp tcpwrapped open
4362149.126.72.220 10042 tcp tcpwrapped open
4363149.126.72.220 10043 tcp tcpwrapped open
4364149.126.72.220 10044 tcp tcpwrapped open
4365149.126.72.220 10045 tcp tcpwrapped open
4366149.126.72.220 10046 tcp tcpwrapped open
4367149.126.72.220 10047 tcp tcpwrapped open
4368149.126.72.220 10048 tcp tcpwrapped open
4369149.126.72.220 10049 tcp tcpwrapped open
4370149.126.72.220 10065 tcp tcpwrapped open
4371149.126.72.220 10071 tcp tcpwrapped open
4372149.126.72.220 10075 tcp tcpwrapped open
4373149.126.72.220 10082 tcp tcpwrapped open
4374149.126.72.220 10084 tcp tcpwrapped open
4375149.126.72.220 10100 tcp tcpwrapped open
4376149.126.72.220 10123 tcp tcpwrapped open
4377149.126.72.220 10200 tcp tcpwrapped open
4378149.126.72.220 10443 tcp tcpwrapped open
4379149.126.72.220 10444 tcp tcpwrapped open
4380149.126.72.220 10892 tcp tcpwrapped open
4381149.126.72.220 10894 tcp tcpwrapped open
4382149.126.72.220 11001 tcp tcpwrapped open
4383149.126.72.220 11002 tcp tcpwrapped open
4384149.126.72.220 11007 tcp tcpwrapped open
4385149.126.72.220 11027 tcp tcpwrapped open
4386149.126.72.220 11065 tcp tcpwrapped open
4387149.126.72.220 11075 tcp tcpwrapped open
4388149.126.72.220 11082 tcp tcpwrapped open
4389149.126.72.220 11084 tcp tcpwrapped open
4390149.126.72.220 11110 tcp tcpwrapped open
4391149.126.72.220 11182 tcp tcpwrapped open
4392149.126.72.220 11184 tcp tcpwrapped open
4393149.126.72.220 11443 tcp tcpwrapped open
4394149.126.72.220 12016 tcp tcpwrapped open
4395149.126.72.220 12082 tcp tcpwrapped open
4396149.126.72.220 12084 tcp tcpwrapped open
4397149.126.72.220 12103 tcp tcpwrapped open
4398149.126.72.220 12104 tcp tcpwrapped open
4399149.126.72.220 12105 tcp tcpwrapped open
4400149.126.72.220 12106 tcp tcpwrapped open
4401149.126.72.220 12107 tcp tcpwrapped open
4402149.126.72.220 12108 tcp tcpwrapped open
4403149.126.72.220 12109 tcp tcpwrapped open
4404149.126.72.220 12110 tcp tcpwrapped open
4405149.126.72.220 12111 tcp tcpwrapped open
4406149.126.72.220 12112 tcp tcpwrapped open
4407149.126.72.220 12113 tcp tcpwrapped open
4408149.126.72.220 12114 tcp tcpwrapped open
4409149.126.72.220 12115 tcp tcpwrapped open
4410149.126.72.220 12116 tcp tcpwrapped open
4411149.126.72.220 12117 tcp tcpwrapped open
4412149.126.72.220 12118 tcp tcpwrapped open
4413149.126.72.220 12119 tcp tcpwrapped open
4414149.126.72.220 12120 tcp tcpwrapped open
4415149.126.72.220 12121 tcp tcpwrapped open
4416149.126.72.220 12122 tcp tcpwrapped open
4417149.126.72.220 12123 tcp tcpwrapped open
4418149.126.72.220 12124 tcp tcpwrapped open
4419149.126.72.220 12125 tcp tcpwrapped open
4420149.126.72.220 12126 tcp tcpwrapped open
4421149.126.72.220 12127 tcp tcpwrapped open
4422149.126.72.220 12128 tcp tcpwrapped open
4423149.126.72.220 12129 tcp tcpwrapped open
4424149.126.72.220 12130 tcp tcpwrapped open
4425149.126.72.220 12131 tcp tcpwrapped open
4426149.126.72.220 12132 tcp tcpwrapped open
4427149.126.72.220 12133 tcp tcpwrapped open
4428149.126.72.220 12134 tcp tcpwrapped open
4429149.126.72.220 12135 tcp tcpwrapped open
4430149.126.72.220 12136 tcp tcpwrapped open
4431149.126.72.220 12137 tcp tcpwrapped open
4432149.126.72.220 12138 tcp tcpwrapped open
4433149.126.72.220 12139 tcp tcpwrapped open
4434149.126.72.220 12140 tcp tcpwrapped open
4435149.126.72.220 12141 tcp tcpwrapped open
4436149.126.72.220 12142 tcp tcpwrapped open
4437149.126.72.220 12143 tcp tcpwrapped open
4438149.126.72.220 12144 tcp tcpwrapped open
4439149.126.72.220 12145 tcp tcpwrapped open
4440149.126.72.220 12146 tcp tcpwrapped open
4441149.126.72.220 12147 tcp tcpwrapped open
4442149.126.72.220 12148 tcp tcpwrapped open
4443149.126.72.220 12149 tcp tcpwrapped open
4444149.126.72.220 12150 tcp tcpwrapped open
4445149.126.72.220 12151 tcp tcpwrapped open
4446149.126.72.220 12152 tcp tcpwrapped open
4447149.126.72.220 12153 tcp tcpwrapped open
4448149.126.72.220 12154 tcp tcpwrapped open
4449149.126.72.220 12155 tcp tcpwrapped open
4450149.126.72.220 12156 tcp tcpwrapped open
4451149.126.72.220 12157 tcp tcpwrapped open
4452149.126.72.220 12158 tcp tcpwrapped open
4453149.126.72.220 12159 tcp tcpwrapped open
4454149.126.72.220 12160 tcp tcpwrapped open
4455149.126.72.220 12161 tcp tcpwrapped open
4456149.126.72.220 12162 tcp tcpwrapped open
4457149.126.72.220 12163 tcp tcpwrapped open
4458149.126.72.220 12164 tcp tcpwrapped open
4459149.126.72.220 12165 tcp tcpwrapped open
4460149.126.72.220 12166 tcp tcpwrapped open
4461149.126.72.220 12167 tcp tcpwrapped open
4462149.126.72.220 12168 tcp tcpwrapped open
4463149.126.72.220 12169 tcp tcpwrapped open
4464149.126.72.220 12170 tcp tcpwrapped open
4465149.126.72.220 12171 tcp tcpwrapped open
4466149.126.72.220 12172 tcp tcpwrapped open
4467149.126.72.220 12173 tcp tcpwrapped open
4468149.126.72.220 12174 tcp tcpwrapped open
4469149.126.72.220 12175 tcp tcpwrapped open
4470149.126.72.220 12176 tcp tcpwrapped open
4471149.126.72.220 12177 tcp tcpwrapped open
4472149.126.72.220 12178 tcp tcpwrapped open
4473149.126.72.220 12179 tcp tcpwrapped open
4474149.126.72.220 12180 tcp tcpwrapped open
4475149.126.72.220 12181 tcp tcpwrapped open
4476149.126.72.220 12182 tcp tcpwrapped open
4477149.126.72.220 12183 tcp tcpwrapped open
4478149.126.72.220 12184 tcp tcpwrapped open
4479149.126.72.220 12185 tcp tcpwrapped open
4480149.126.72.220 12186 tcp tcpwrapped open
4481149.126.72.220 12187 tcp tcpwrapped open
4482149.126.72.220 12188 tcp tcpwrapped open
4483149.126.72.220 12189 tcp tcpwrapped open
4484149.126.72.220 12190 tcp tcpwrapped open
4485149.126.72.220 12191 tcp tcpwrapped open
4486149.126.72.220 12192 tcp tcpwrapped open
4487149.126.72.220 12193 tcp tcpwrapped open
4488149.126.72.220 12194 tcp tcpwrapped open
4489149.126.72.220 12195 tcp tcpwrapped open
4490149.126.72.220 12196 tcp tcpwrapped open
4491149.126.72.220 12197 tcp tcpwrapped open
4492149.126.72.220 12198 tcp tcpwrapped open
4493149.126.72.220 12199 tcp tcpwrapped open
4494149.126.72.220 12200 tcp tcpwrapped open
4495149.126.72.220 12201 tcp tcpwrapped open
4496149.126.72.220 12202 tcp tcpwrapped open
4497149.126.72.220 12203 tcp tcpwrapped open
4498149.126.72.220 12204 tcp tcpwrapped open
4499149.126.72.220 12205 tcp tcpwrapped open
4500149.126.72.220 12206 tcp tcpwrapped open
4501149.126.72.220 12207 tcp tcpwrapped open
4502149.126.72.220 12208 tcp tcpwrapped open
4503149.126.72.220 12209 tcp tcpwrapped open
4504149.126.72.220 12210 tcp tcpwrapped open
4505149.126.72.220 12211 tcp tcpwrapped open
4506149.126.72.220 12212 tcp tcpwrapped open
4507149.126.72.220 12213 tcp tcpwrapped open
4508149.126.72.220 12214 tcp tcpwrapped open
4509149.126.72.220 12215 tcp tcpwrapped open
4510149.126.72.220 12216 tcp tcpwrapped open
4511149.126.72.220 12217 tcp tcpwrapped open
4512149.126.72.220 12218 tcp tcpwrapped open
4513149.126.72.220 12219 tcp tcpwrapped open
4514149.126.72.220 12220 tcp tcpwrapped open
4515149.126.72.220 12221 tcp tcpwrapped open
4516149.126.72.220 12222 tcp tcpwrapped open
4517149.126.72.220 12223 tcp tcpwrapped open
4518149.126.72.220 12224 tcp tcpwrapped open
4519149.126.72.220 12225 tcp tcpwrapped open
4520149.126.72.220 12226 tcp tcpwrapped open
4521149.126.72.220 12227 tcp tcpwrapped open
4522149.126.72.220 12228 tcp tcpwrapped open
4523149.126.72.220 12229 tcp tcpwrapped open
4524149.126.72.220 12230 tcp tcpwrapped open
4525149.126.72.220 12231 tcp tcpwrapped open
4526149.126.72.220 12232 tcp tcpwrapped open
4527149.126.72.220 12233 tcp tcpwrapped open
4528149.126.72.220 12234 tcp tcpwrapped open
4529149.126.72.220 12235 tcp tcpwrapped open
4530149.126.72.220 12236 tcp tcpwrapped open
4531149.126.72.220 12237 tcp tcpwrapped open
4532149.126.72.220 12238 tcp tcpwrapped open
4533149.126.72.220 12239 tcp tcpwrapped open
4534149.126.72.220 12240 tcp tcpwrapped open
4535149.126.72.220 12241 tcp tcpwrapped open
4536149.126.72.220 12242 tcp tcpwrapped open
4537149.126.72.220 12243 tcp tcpwrapped open
4538149.126.72.220 12244 tcp tcpwrapped open
4539149.126.72.220 12245 tcp tcpwrapped open
4540149.126.72.220 12246 tcp tcpwrapped open
4541149.126.72.220 12247 tcp tcpwrapped open
4542149.126.72.220 12248 tcp tcpwrapped open
4543149.126.72.220 12249 tcp tcpwrapped open
4544149.126.72.220 12250 tcp tcpwrapped open
4545149.126.72.220 12251 tcp tcpwrapped open
4546149.126.72.220 12252 tcp tcpwrapped open
4547149.126.72.220 12253 tcp tcpwrapped open
4548149.126.72.220 12254 tcp tcpwrapped open
4549149.126.72.220 12255 tcp tcpwrapped open
4550149.126.72.220 12256 tcp tcpwrapped open
4551149.126.72.220 12257 tcp tcpwrapped open
4552149.126.72.220 12258 tcp tcpwrapped open
4553149.126.72.220 12259 tcp tcpwrapped open
4554149.126.72.220 12260 tcp tcpwrapped open
4555149.126.72.220 12261 tcp tcpwrapped open
4556149.126.72.220 12262 tcp tcpwrapped open
4557149.126.72.220 12263 tcp tcpwrapped open
4558149.126.72.220 12264 tcp tcpwrapped open
4559149.126.72.220 12265 tcp tcpwrapped open
4560149.126.72.220 12266 tcp tcpwrapped open
4561149.126.72.220 12267 tcp tcpwrapped open
4562149.126.72.220 12268 tcp tcpwrapped open
4563149.126.72.220 12269 tcp tcpwrapped open
4564149.126.72.220 12270 tcp tcpwrapped open
4565149.126.72.220 12271 tcp tcpwrapped open
4566149.126.72.220 12272 tcp tcpwrapped open
4567149.126.72.220 12273 tcp tcpwrapped open
4568149.126.72.220 12274 tcp tcpwrapped open
4569149.126.72.220 12275 tcp tcpwrapped open
4570149.126.72.220 12276 tcp tcpwrapped open
4571149.126.72.220 12277 tcp tcpwrapped open
4572149.126.72.220 12278 tcp tcpwrapped open
4573149.126.72.220 12279 tcp tcpwrapped open
4574149.126.72.220 12280 tcp tcpwrapped open
4575149.126.72.220 12281 tcp tcpwrapped open
4576149.126.72.220 12282 tcp tcpwrapped open
4577149.126.72.220 12283 tcp tcpwrapped open
4578149.126.72.220 12284 tcp tcpwrapped open
4579149.126.72.220 12285 tcp tcpwrapped open
4580149.126.72.220 12286 tcp tcpwrapped open
4581149.126.72.220 12287 tcp tcpwrapped open
4582149.126.72.220 12288 tcp tcpwrapped open
4583149.126.72.220 12289 tcp tcpwrapped open
4584149.126.72.220 12290 tcp tcpwrapped open
4585149.126.72.220 12291 tcp tcpwrapped open
4586149.126.72.220 12292 tcp tcpwrapped open
4587149.126.72.220 12293 tcp tcpwrapped open
4588149.126.72.220 12294 tcp tcpwrapped open
4589149.126.72.220 12295 tcp tcpwrapped open
4590149.126.72.220 12296 tcp tcpwrapped open
4591149.126.72.220 12297 tcp tcpwrapped open
4592149.126.72.220 12298 tcp tcpwrapped open
4593149.126.72.220 12299 tcp tcpwrapped open
4594149.126.72.220 12300 tcp tcpwrapped open
4595149.126.72.220 12301 tcp tcpwrapped open
4596149.126.72.220 12302 tcp tcpwrapped open
4597149.126.72.220 12303 tcp tcpwrapped open
4598149.126.72.220 12304 tcp tcpwrapped open
4599149.126.72.220 12305 tcp tcpwrapped open
4600149.126.72.220 12306 tcp tcpwrapped open
4601149.126.72.220 12307 tcp tcpwrapped open
4602149.126.72.220 12308 tcp tcpwrapped open
4603149.126.72.220 12309 tcp tcpwrapped open
4604149.126.72.220 12310 tcp tcpwrapped open
4605149.126.72.220 12311 tcp tcpwrapped open
4606149.126.72.220 12312 tcp tcpwrapped open
4607149.126.72.220 12313 tcp tcpwrapped open
4608149.126.72.220 12314 tcp tcpwrapped open
4609149.126.72.220 12315 tcp tcpwrapped open
4610149.126.72.220 12316 tcp tcpwrapped open
4611149.126.72.220 12317 tcp tcpwrapped open
4612149.126.72.220 12318 tcp tcpwrapped open
4613149.126.72.220 12319 tcp tcpwrapped open
4614149.126.72.220 12320 tcp tcpwrapped open
4615149.126.72.220 12321 tcp tcpwrapped open
4616149.126.72.220 12322 tcp tcpwrapped open
4617149.126.72.220 12323 tcp tcpwrapped open
4618149.126.72.220 12324 tcp tcpwrapped open
4619149.126.72.220 12325 tcp tcpwrapped open
4620149.126.72.220 12326 tcp tcpwrapped open
4621149.126.72.220 12327 tcp tcpwrapped open
4622149.126.72.220 12328 tcp tcpwrapped open
4623149.126.72.220 12329 tcp tcpwrapped open
4624149.126.72.220 12330 tcp tcpwrapped open
4625149.126.72.220 12331 tcp tcpwrapped open
4626149.126.72.220 12332 tcp tcpwrapped open
4627149.126.72.220 12333 tcp tcpwrapped open
4628149.126.72.220 12334 tcp tcpwrapped open
4629149.126.72.220 12335 tcp tcpwrapped open
4630149.126.72.220 12336 tcp tcpwrapped open
4631149.126.72.220 12337 tcp tcpwrapped open
4632149.126.72.220 12338 tcp tcpwrapped open
4633149.126.72.220 12339 tcp tcpwrapped open
4634149.126.72.220 12340 tcp tcpwrapped open
4635149.126.72.220 12341 tcp tcpwrapped open
4636149.126.72.220 12342 tcp tcpwrapped open
4637149.126.72.220 12343 tcp tcpwrapped open
4638149.126.72.220 12344 tcp tcpwrapped open
4639149.126.72.220 12345 tcp tcpwrapped open
4640149.126.72.220 12346 tcp tcpwrapped open
4641149.126.72.220 12347 tcp tcpwrapped open
4642149.126.72.220 12348 tcp tcpwrapped open
4643149.126.72.220 12349 tcp tcpwrapped open
4644149.126.72.220 12350 tcp tcpwrapped open
4645149.126.72.220 12351 tcp tcpwrapped open
4646149.126.72.220 12352 tcp tcpwrapped open
4647149.126.72.220 12353 tcp tcpwrapped open
4648149.126.72.220 12354 tcp tcpwrapped open
4649149.126.72.220 12355 tcp tcpwrapped open
4650149.126.72.220 12356 tcp tcpwrapped open
4651149.126.72.220 12357 tcp tcpwrapped open
4652149.126.72.220 12358 tcp tcpwrapped open
4653149.126.72.220 12359 tcp tcpwrapped open
4654149.126.72.220 12360 tcp tcpwrapped open
4655149.126.72.220 12361 tcp tcpwrapped open
4656149.126.72.220 12362 tcp tcpwrapped open
4657149.126.72.220 12363 tcp tcpwrapped open
4658149.126.72.220 12364 tcp tcpwrapped open
4659149.126.72.220 12365 tcp tcpwrapped open
4660149.126.72.220 12366 tcp tcpwrapped open
4661149.126.72.220 12367 tcp tcpwrapped open
4662149.126.72.220 12368 tcp tcpwrapped open
4663149.126.72.220 12369 tcp tcpwrapped open
4664149.126.72.220 12370 tcp tcpwrapped open
4665149.126.72.220 12371 tcp tcpwrapped open
4666149.126.72.220 12372 tcp tcpwrapped open
4667149.126.72.220 12373 tcp tcpwrapped open
4668149.126.72.220 12374 tcp tcpwrapped open
4669149.126.72.220 12375 tcp tcpwrapped open
4670149.126.72.220 12376 tcp tcpwrapped open
4671149.126.72.220 12377 tcp tcpwrapped open
4672149.126.72.220 12378 tcp tcpwrapped open
4673149.126.72.220 12379 tcp tcpwrapped open
4674149.126.72.220 12380 tcp tcpwrapped open
4675149.126.72.220 12381 tcp tcpwrapped open
4676149.126.72.220 12382 tcp tcpwrapped open
4677149.126.72.220 12383 tcp tcpwrapped open
4678149.126.72.220 12384 tcp tcpwrapped open
4679149.126.72.220 12385 tcp tcpwrapped open
4680149.126.72.220 12386 tcp tcpwrapped open
4681149.126.72.220 12387 tcp tcpwrapped open
4682149.126.72.220 12388 tcp tcpwrapped open
4683149.126.72.220 12389 tcp tcpwrapped open
4684149.126.72.220 12390 tcp tcpwrapped open
4685149.126.72.220 12391 tcp tcpwrapped open
4686149.126.72.220 12392 tcp tcpwrapped open
4687149.126.72.220 12393 tcp tcpwrapped open
4688149.126.72.220 12394 tcp tcpwrapped open
4689149.126.72.220 12395 tcp tcpwrapped open
4690149.126.72.220 12396 tcp tcpwrapped open
4691149.126.72.220 12397 tcp tcpwrapped open
4692149.126.72.220 12398 tcp tcpwrapped open
4693149.126.72.220 12399 tcp tcpwrapped open
4694149.126.72.220 12400 tcp tcpwrapped open
4695149.126.72.220 12401 tcp tcpwrapped open
4696149.126.72.220 12402 tcp tcpwrapped open
4697149.126.72.220 12403 tcp tcpwrapped open
4698149.126.72.220 12404 tcp tcpwrapped open
4699149.126.72.220 12405 tcp tcpwrapped open
4700149.126.72.220 12406 tcp tcpwrapped open
4701149.126.72.220 12407 tcp tcpwrapped open
4702149.126.72.220 12408 tcp tcpwrapped open
4703149.126.72.220 12409 tcp tcpwrapped open
4704149.126.72.220 12410 tcp tcpwrapped open
4705149.126.72.220 12411 tcp tcpwrapped open
4706149.126.72.220 12412 tcp tcpwrapped open
4707149.126.72.220 12413 tcp tcpwrapped open
4708149.126.72.220 12414 tcp tcpwrapped open
4709149.126.72.220 12415 tcp tcpwrapped open
4710149.126.72.220 12416 tcp tcpwrapped open
4711149.126.72.220 12417 tcp tcpwrapped open
4712149.126.72.220 12418 tcp tcpwrapped open
4713149.126.72.220 12419 tcp tcpwrapped open
4714149.126.72.220 12420 tcp tcpwrapped open
4715149.126.72.220 12421 tcp tcpwrapped open
4716149.126.72.220 12422 tcp tcpwrapped open
4717149.126.72.220 12423 tcp tcpwrapped open
4718149.126.72.220 12424 tcp tcpwrapped open
4719149.126.72.220 12425 tcp tcpwrapped open
4720149.126.72.220 12426 tcp tcpwrapped open
4721149.126.72.220 12427 tcp tcpwrapped open
4722149.126.72.220 12428 tcp tcpwrapped open
4723149.126.72.220 12429 tcp tcpwrapped open
4724149.126.72.220 12430 tcp tcpwrapped open
4725149.126.72.220 12431 tcp tcpwrapped open
4726149.126.72.220 12432 tcp tcpwrapped open
4727149.126.72.220 12433 tcp tcpwrapped open
4728149.126.72.220 12434 tcp tcpwrapped open
4729149.126.72.220 12435 tcp tcpwrapped open
4730149.126.72.220 12436 tcp tcpwrapped open
4731149.126.72.220 12437 tcp tcpwrapped open
4732149.126.72.220 12438 tcp tcpwrapped open
4733149.126.72.220 12439 tcp tcpwrapped open
4734149.126.72.220 12440 tcp tcpwrapped open
4735149.126.72.220 12441 tcp tcpwrapped open
4736149.126.72.220 12442 tcp tcpwrapped open
4737149.126.72.220 12443 tcp tcpwrapped open
4738149.126.72.220 12444 tcp tcpwrapped open
4739149.126.72.220 12445 tcp tcpwrapped open
4740149.126.72.220 12446 tcp tcpwrapped open
4741149.126.72.220 12447 tcp tcpwrapped open
4742149.126.72.220 12448 tcp tcpwrapped open
4743149.126.72.220 12449 tcp tcpwrapped open
4744149.126.72.220 12450 tcp tcpwrapped open
4745149.126.72.220 12451 tcp tcpwrapped open
4746149.126.72.220 12452 tcp tcpwrapped open
4747149.126.72.220 12453 tcp tcpwrapped open
4748149.126.72.220 12454 tcp tcpwrapped open
4749149.126.72.220 12455 tcp tcpwrapped open
4750149.126.72.220 12456 tcp tcpwrapped open
4751149.126.72.220 12457 tcp tcpwrapped open
4752149.126.72.220 12458 tcp tcpwrapped open
4753149.126.72.220 12459 tcp tcpwrapped open
4754149.126.72.220 12460 tcp tcpwrapped open
4755149.126.72.220 12461 tcp tcpwrapped open
4756149.126.72.220 12462 tcp tcpwrapped open
4757149.126.72.220 12463 tcp tcpwrapped open
4758149.126.72.220 12464 tcp tcpwrapped open
4759149.126.72.220 12465 tcp tcpwrapped open
4760149.126.72.220 12466 tcp tcpwrapped open
4761149.126.72.220 12467 tcp tcpwrapped open
4762149.126.72.220 12468 tcp tcpwrapped open
4763149.126.72.220 12469 tcp tcpwrapped open
4764149.126.72.220 12470 tcp tcpwrapped open
4765149.126.72.220 12471 tcp tcpwrapped open
4766149.126.72.220 12472 tcp tcpwrapped open
4767149.126.72.220 12473 tcp tcpwrapped open
4768149.126.72.220 12474 tcp tcpwrapped open
4769149.126.72.220 12475 tcp tcpwrapped open
4770149.126.72.220 12476 tcp tcpwrapped open
4771149.126.72.220 12477 tcp tcpwrapped open
4772149.126.72.220 12478 tcp tcpwrapped open
4773149.126.72.220 12479 tcp tcpwrapped open
4774149.126.72.220 12480 tcp tcpwrapped open
4775149.126.72.220 12481 tcp tcpwrapped open
4776149.126.72.220 12482 tcp tcpwrapped open
4777149.126.72.220 12483 tcp tcpwrapped open
4778149.126.72.220 12484 tcp tcpwrapped open
4779149.126.72.220 12485 tcp tcpwrapped open
4780149.126.72.220 12486 tcp tcpwrapped open
4781149.126.72.220 12487 tcp tcpwrapped open
4782149.126.72.220 12488 tcp tcpwrapped open
4783149.126.72.220 12489 tcp tcpwrapped open
4784149.126.72.220 12490 tcp tcpwrapped open
4785149.126.72.220 12491 tcp tcpwrapped open
4786149.126.72.220 12492 tcp tcpwrapped open
4787149.126.72.220 12493 tcp tcpwrapped open
4788149.126.72.220 12494 tcp tcpwrapped open
4789149.126.72.220 12495 tcp tcpwrapped open
4790149.126.72.220 12496 tcp tcpwrapped open
4791149.126.72.220 12497 tcp tcpwrapped open
4792149.126.72.220 12498 tcp tcpwrapped open
4793149.126.72.220 12499 tcp tcpwrapped open
4794149.126.72.220 12500 tcp tcpwrapped open
4795149.126.72.220 12501 tcp tcpwrapped open
4796149.126.72.220 12502 tcp tcpwrapped open
4797149.126.72.220 12503 tcp tcpwrapped open
4798149.126.72.220 12504 tcp tcpwrapped open
4799149.126.72.220 12505 tcp tcpwrapped open
4800149.126.72.220 12506 tcp tcpwrapped open
4801149.126.72.220 12507 tcp tcpwrapped open
4802149.126.72.220 12508 tcp tcpwrapped open
4803149.126.72.220 12509 tcp tcpwrapped open
4804149.126.72.220 12510 tcp tcpwrapped open
4805149.126.72.220 12511 tcp tcpwrapped open
4806149.126.72.220 12512 tcp tcpwrapped open
4807149.126.72.220 12513 tcp tcpwrapped open
4808149.126.72.220 12514 tcp tcpwrapped open
4809149.126.72.220 12515 tcp tcpwrapped open
4810149.126.72.220 12516 tcp tcpwrapped open
4811149.126.72.220 12517 tcp tcpwrapped open
4812149.126.72.220 12518 tcp tcpwrapped open
4813149.126.72.220 12519 tcp tcpwrapped open
4814149.126.72.220 12520 tcp tcpwrapped open
4815149.126.72.220 12521 tcp tcpwrapped open
4816149.126.72.220 12522 tcp tcpwrapped open
4817149.126.72.220 12523 tcp tcpwrapped open
4818149.126.72.220 12524 tcp tcpwrapped open
4819149.126.72.220 12525 tcp tcpwrapped open
4820149.126.72.220 12526 tcp tcpwrapped open
4821149.126.72.220 12527 tcp tcpwrapped open
4822149.126.72.220 12528 tcp tcpwrapped open
4823149.126.72.220 12529 tcp tcpwrapped open
4824149.126.72.220 12530 tcp tcpwrapped open
4825149.126.72.220 12531 tcp tcpwrapped open
4826149.126.72.220 12532 tcp tcpwrapped open
4827149.126.72.220 12533 tcp tcpwrapped open
4828149.126.72.220 12534 tcp tcpwrapped open
4829149.126.72.220 12535 tcp tcpwrapped open
4830149.126.72.220 12536 tcp tcpwrapped open
4831149.126.72.220 12537 tcp tcpwrapped open
4832149.126.72.220 12538 tcp tcpwrapped open
4833149.126.72.220 12539 tcp tcpwrapped open
4834149.126.72.220 12540 tcp tcpwrapped open
4835149.126.72.220 12541 tcp tcpwrapped open
4836149.126.72.220 12542 tcp tcpwrapped open
4837149.126.72.220 12543 tcp tcpwrapped open
4838149.126.72.220 12544 tcp tcpwrapped open
4839149.126.72.220 12545 tcp tcpwrapped open
4840149.126.72.220 12546 tcp tcpwrapped open
4841149.126.72.220 12547 tcp tcpwrapped open
4842149.126.72.220 12548 tcp tcpwrapped open
4843149.126.72.220 12549 tcp tcpwrapped open
4844149.126.72.220 12550 tcp tcpwrapped open
4845149.126.72.220 12551 tcp tcpwrapped open
4846149.126.72.220 12552 tcp tcpwrapped open
4847149.126.72.220 12553 tcp tcpwrapped open
4848149.126.72.220 12554 tcp tcpwrapped open
4849149.126.72.220 12555 tcp tcpwrapped open
4850149.126.72.220 12556 tcp tcpwrapped open
4851149.126.72.220 12557 tcp tcpwrapped open
4852149.126.72.220 12558 tcp tcpwrapped open
4853149.126.72.220 12559 tcp tcpwrapped open
4854149.126.72.220 12560 tcp tcpwrapped open
4855149.126.72.220 12561 tcp tcpwrapped open
4856149.126.72.220 12562 tcp tcpwrapped open
4857149.126.72.220 12563 tcp tcpwrapped open
4858149.126.72.220 12564 tcp tcpwrapped open
4859149.126.72.220 12565 tcp tcpwrapped open
4860149.126.72.220 12566 tcp tcpwrapped open
4861149.126.72.220 12567 tcp tcpwrapped open
4862149.126.72.220 12568 tcp tcpwrapped open
4863149.126.72.220 12569 tcp tcpwrapped open
4864149.126.72.220 12570 tcp tcpwrapped open
4865149.126.72.220 12571 tcp tcpwrapped open
4866149.126.72.220 12572 tcp tcpwrapped open
4867149.126.72.220 12573 tcp tcpwrapped open
4868149.126.72.220 12574 tcp tcpwrapped open
4869149.126.72.220 12575 tcp tcpwrapped open
4870149.126.72.220 12576 tcp tcpwrapped open
4871149.126.72.220 12577 tcp tcpwrapped open
4872149.126.72.220 12578 tcp tcpwrapped open
4873149.126.72.220 12579 tcp tcpwrapped open
4874149.126.72.220 12580 tcp tcpwrapped open
4875149.126.72.220 12581 tcp tcpwrapped open
4876149.126.72.220 12582 tcp tcpwrapped open
4877149.126.72.220 12583 tcp tcpwrapped open
4878149.126.72.220 12584 tcp tcpwrapped open
4879149.126.72.220 12585 tcp tcpwrapped open
4880149.126.72.220 12586 tcp tcpwrapped open
4881149.126.72.220 12587 tcp tcpwrapped open
4882149.126.72.220 12588 tcp tcpwrapped open
4883149.126.72.220 12589 tcp tcpwrapped open
4884149.126.72.220 12590 tcp tcpwrapped open
4885149.126.72.220 13082 tcp tcpwrapped open
4886149.126.72.220 13084 tcp tcpwrapped open
4887149.126.72.220 13333 tcp tcpwrapped open
4888149.126.72.220 13443 tcp tcpwrapped open
4889149.126.72.220 14006 tcp tcpwrapped open
4890149.126.72.220 14082 tcp tcpwrapped open
4891149.126.72.220 14084 tcp tcpwrapped open
4892149.126.72.220 14104 tcp tcpwrapped open
4893149.126.72.220 14130 tcp tcpwrapped open
4894149.126.72.220 14182 tcp tcpwrapped open
4895149.126.72.220 14184 tcp tcpwrapped open
4896149.126.72.220 14330 tcp tcpwrapped open
4897149.126.72.220 14443 tcp tcpwrapped open
4898149.126.72.220 14825 tcp tcpwrapped open
4899149.126.72.220 15002 tcp tcpwrapped open
4900149.126.72.220 15006 tcp tcpwrapped open
4901149.126.72.220 15082 tcp tcpwrapped open
4902149.126.72.220 15084 tcp tcpwrapped open
4903149.126.72.220 15151 tcp tcpwrapped open
4904149.126.72.220 15555 tcp tcpwrapped open
4905149.126.72.220 16000 tcp tcpwrapped open
4906149.126.72.220 16001 tcp tcpwrapped open
4907149.126.72.220 16015 tcp tcpwrapped open
4908149.126.72.220 16016 tcp tcpwrapped open
4909149.126.72.220 16017 tcp tcpwrapped open
4910149.126.72.220 16082 tcp tcpwrapped open
4911149.126.72.220 16084 tcp tcpwrapped open
4912149.126.72.220 16311 tcp tcpwrapped open
4913149.126.72.220 16316 tcp tcpwrapped open
4914149.126.72.220 16443 tcp tcpwrapped open
4915149.126.72.220 16800 tcp tcpwrapped open
4916149.126.72.220 16888 tcp tcpwrapped open
4917149.126.72.220 17082 tcp tcpwrapped open
4918149.126.72.220 17084 tcp tcpwrapped open
4919149.126.72.220 17182 tcp tcpwrapped open
4920149.126.72.220 17184 tcp tcpwrapped open
4921149.126.72.220 17770 tcp tcpwrapped open
4922149.126.72.220 17771 tcp tcpwrapped open
4923149.126.72.220 17772 tcp tcpwrapped open
4924149.126.72.220 17773 tcp tcpwrapped open
4925149.126.72.220 17774 tcp tcpwrapped open
4926149.126.72.220 17775 tcp tcpwrapped open
4927149.126.72.220 17776 tcp tcpwrapped open
4928149.126.72.220 17777 tcp tcpwrapped open
4929149.126.72.220 17778 tcp tcpwrapped open
4930149.126.72.220 17779 tcp tcpwrapped open
4931149.126.72.220 17780 tcp tcpwrapped open
4932149.126.72.220 18000 tcp tcpwrapped open
4933149.126.72.220 18001 tcp tcpwrapped open
4934149.126.72.220 18002 tcp tcpwrapped open
4935149.126.72.220 18003 tcp tcpwrapped open
4936149.126.72.220 18004 tcp tcpwrapped open
4937149.126.72.220 18005 tcp tcpwrapped open
4938149.126.72.220 18006 tcp tcpwrapped open
4939149.126.72.220 18007 tcp tcpwrapped open
4940149.126.72.220 18008 tcp tcpwrapped open
4941149.126.72.220 18009 tcp tcpwrapped open
4942149.126.72.220 18010 tcp tcpwrapped open
4943149.126.72.220 18011 tcp tcpwrapped open
4944149.126.72.220 18012 tcp tcpwrapped open
4945149.126.72.220 18013 tcp tcpwrapped open
4946149.126.72.220 18014 tcp tcpwrapped open
4947149.126.72.220 18015 tcp tcpwrapped open
4948149.126.72.220 18016 tcp tcpwrapped open
4949149.126.72.220 18017 tcp tcpwrapped open
4950149.126.72.220 18018 tcp tcpwrapped open
4951149.126.72.220 18019 tcp tcpwrapped open
4952149.126.72.220 18020 tcp tcpwrapped open
4953149.126.72.220 18021 tcp tcpwrapped open
4954149.126.72.220 18022 tcp tcpwrapped open
4955149.126.72.220 18023 tcp tcpwrapped open
4956149.126.72.220 18024 tcp tcpwrapped open
4957149.126.72.220 18025 tcp tcpwrapped open
4958149.126.72.220 18026 tcp tcpwrapped open
4959149.126.72.220 18027 tcp tcpwrapped open
4960149.126.72.220 18028 tcp tcpwrapped open
4961149.126.72.220 18029 tcp tcpwrapped open
4962149.126.72.220 18030 tcp tcpwrapped open
4963149.126.72.220 18031 tcp tcpwrapped open
4964149.126.72.220 18032 tcp tcpwrapped open
4965149.126.72.220 18033 tcp tcpwrapped open
4966149.126.72.220 18034 tcp tcpwrapped open
4967149.126.72.220 18035 tcp tcpwrapped open
4968149.126.72.220 18036 tcp tcpwrapped open
4969149.126.72.220 18037 tcp tcpwrapped open
4970149.126.72.220 18038 tcp tcpwrapped open
4971149.126.72.220 18039 tcp tcpwrapped open
4972149.126.72.220 18040 tcp tcpwrapped open
4973149.126.72.220 18041 tcp tcpwrapped open
4974149.126.72.220 18042 tcp tcpwrapped open
4975149.126.72.220 18043 tcp tcpwrapped open
4976149.126.72.220 18044 tcp tcpwrapped open
4977149.126.72.220 18045 tcp tcpwrapped open
4978149.126.72.220 18046 tcp tcpwrapped open
4979149.126.72.220 18047 tcp tcpwrapped open
4980149.126.72.220 18048 tcp tcpwrapped open
4981149.126.72.220 18049 tcp tcpwrapped open
4982149.126.72.220 18050 tcp tcpwrapped open
4983149.126.72.220 18051 tcp tcpwrapped open
4984149.126.72.220 18052 tcp tcpwrapped open
4985149.126.72.220 18053 tcp tcpwrapped open
4986149.126.72.220 18054 tcp tcpwrapped open
4987149.126.72.220 18055 tcp tcpwrapped open
4988149.126.72.220 18056 tcp tcpwrapped open
4989149.126.72.220 18057 tcp tcpwrapped open
4990149.126.72.220 18058 tcp tcpwrapped open
4991149.126.72.220 18059 tcp tcpwrapped open
4992149.126.72.220 18060 tcp tcpwrapped open
4993149.126.72.220 18061 tcp tcpwrapped open
4994149.126.72.220 18062 tcp tcpwrapped open
4995149.126.72.220 18063 tcp tcpwrapped open
4996149.126.72.220 18064 tcp tcpwrapped open
4997149.126.72.220 18065 tcp tcpwrapped open
4998149.126.72.220 18066 tcp tcpwrapped open
4999149.126.72.220 18067 tcp tcpwrapped open
5000149.126.72.220 18068 tcp tcpwrapped open
5001149.126.72.220 18069 tcp tcpwrapped open
5002149.126.72.220 18070 tcp tcpwrapped open
5003149.126.72.220 18071 tcp tcpwrapped open
5004149.126.72.220 18072 tcp tcpwrapped open
5005149.126.72.220 18073 tcp tcpwrapped open
5006149.126.72.220 18074 tcp tcpwrapped open
5007149.126.72.220 18075 tcp tcpwrapped open
5008149.126.72.220 18076 tcp tcpwrapped open
5009149.126.72.220 18077 tcp tcpwrapped open
5010149.126.72.220 18078 tcp tcpwrapped open
5011149.126.72.220 18079 tcp tcpwrapped open
5012149.126.72.220 18080 tcp tcpwrapped open
5013149.126.72.220 18081 tcp tcpwrapped open
5014149.126.72.220 18082 tcp tcpwrapped open
5015149.126.72.220 18083 tcp tcpwrapped open
5016149.126.72.220 18084 tcp tcpwrapped open
5017149.126.72.220 18085 tcp tcpwrapped open
5018149.126.72.220 18086 tcp tcpwrapped open
5019149.126.72.220 18087 tcp tcpwrapped open
5020149.126.72.220 18088 tcp tcpwrapped open
5021149.126.72.220 18089 tcp tcpwrapped open
5022149.126.72.220 18090 tcp tcpwrapped open
5023149.126.72.220 18091 tcp tcpwrapped open
5024149.126.72.220 18092 tcp tcpwrapped open
5025149.126.72.220 18093 tcp tcpwrapped open
5026149.126.72.220 18094 tcp tcpwrapped open
5027149.126.72.220 18095 tcp tcpwrapped open
5028149.126.72.220 18096 tcp tcpwrapped open
5029149.126.72.220 18097 tcp tcpwrapped open
5030149.126.72.220 18098 tcp tcpwrapped open
5031149.126.72.220 18099 tcp tcpwrapped open
5032149.126.72.220 18100 tcp tcpwrapped open
5033149.126.72.220 18101 tcp tcpwrapped open
5034149.126.72.220 18102 tcp tcpwrapped open
5035149.126.72.220 18103 tcp tcpwrapped open
5036149.126.72.220 18104 tcp tcpwrapped open
5037149.126.72.220 18105 tcp tcpwrapped open
5038149.126.72.220 18106 tcp tcpwrapped open
5039149.126.72.220 18107 tcp tcpwrapped open
5040149.126.72.220 18108 tcp tcpwrapped open
5041149.126.72.220 18109 tcp tcpwrapped open
5042149.126.72.220 18110 tcp tcpwrapped open
5043149.126.72.220 18111 tcp tcpwrapped open
5044149.126.72.220 18112 tcp tcpwrapped open
5045149.126.72.220 18113 tcp tcpwrapped open
5046149.126.72.220 18200 tcp tcpwrapped open
5047149.126.72.220 18239 tcp tcpwrapped open
5048149.126.72.220 18443 tcp tcpwrapped open
5049149.126.72.220 18802 tcp tcpwrapped open
5050149.126.72.220 19013 tcp tcpwrapped open
5051149.126.72.220 19014 tcp tcpwrapped open
5052149.126.72.220 19015 tcp tcpwrapped open
5053149.126.72.220 19016 tcp tcpwrapped open
5054149.126.72.220 19017 tcp tcpwrapped open
5055149.126.72.220 19022 tcp tcpwrapped open
5056149.126.72.220 19080 tcp tcpwrapped open
5057149.126.72.220 19082 tcp tcpwrapped open
5058149.126.72.220 19084 tcp tcpwrapped open
5059149.126.72.220 19443 tcp tcpwrapped open
5060149.126.72.220 20000 tcp tcpwrapped open
5061149.126.72.220 20001 tcp tcpwrapped open
5062149.126.72.220 20010 tcp tcpwrapped open
5063149.126.72.220 20020 tcp tcpwrapped open
5064149.126.72.220 20030 tcp tcpwrapped open
5065149.126.72.220 20040 tcp tcpwrapped open
5066149.126.72.220 20050 tcp tcpwrapped open
5067149.126.72.220 20053 tcp tcpwrapped open
5068149.126.72.220 20060 tcp tcpwrapped open
5069149.126.72.220 20070 tcp tcpwrapped open
5070149.126.72.220 20080 tcp tcpwrapped open
5071149.126.72.220 20082 tcp tcpwrapped open
5072149.126.72.220 20084 tcp tcpwrapped open
5073149.126.72.220 20090 tcp tcpwrapped open
5074149.126.72.220 20100 tcp tcpwrapped open
5075149.126.72.220 20106 tcp tcpwrapped open
5076149.126.72.220 20107 tcp tcpwrapped open
5077149.126.72.220 20110 tcp tcpwrapped open
5078149.126.72.220 20150 tcp tcpwrapped open
5079149.126.72.220 20182 tcp tcpwrapped open
5080149.126.72.220 20184 tcp tcpwrapped open
5081149.126.72.220 20185 tcp tcpwrapped open
5082149.126.72.220 20200 tcp tcpwrapped open
5083149.126.72.220 20208 tcp tcpwrapped open
5084149.126.72.220 20325 tcp tcpwrapped open
5085149.126.72.220 20500 tcp tcpwrapped open
5086149.126.72.220 20512 tcp tcpwrapped open
5087149.126.72.220 20600 tcp tcpwrapped open
5088149.126.72.220 20800 tcp tcpwrapped open
5089149.126.72.220 20892 tcp tcpwrapped open
5090149.126.72.220 20894 tcp tcpwrapped open
5091149.126.72.220 20900 tcp tcpwrapped open
5092149.126.72.220 21081 tcp tcpwrapped open
5093149.126.72.220 21082 tcp tcpwrapped open
5094149.126.72.220 21083 tcp tcpwrapped open
5095149.126.72.220 21084 tcp tcpwrapped open
5096149.126.72.220 21100 tcp tcpwrapped open
5097149.126.72.220 21200 tcp tcpwrapped open
5098149.126.72.220 21300 tcp tcpwrapped open
5099149.126.72.220 21357 tcp tcpwrapped open
5100149.126.72.220 21381 tcp tcpwrapped open
5101149.126.72.220 21400 tcp tcpwrapped open
5102149.126.72.220 21500 tcp tcpwrapped open
5103149.126.72.220 21935 tcp tcpwrapped open
5104149.126.72.220 22082 tcp tcpwrapped open
5105149.126.72.220 22084 tcp tcpwrapped open
5106149.126.72.220 22103 tcp tcpwrapped open
5107149.126.72.220 22107 tcp tcpwrapped open
5108149.126.72.220 22206 tcp tcpwrapped open
5109149.126.72.220 22345 tcp tcpwrapped open
5110149.126.72.220 22403 tcp tcpwrapped open
5111149.126.72.220 22609 tcp tcpwrapped open
5112149.126.72.220 22703 tcp tcpwrapped open
5113149.126.72.220 22705 tcp tcpwrapped open
5114149.126.72.220 23082 tcp tcpwrapped open
5115149.126.72.220 23084 tcp tcpwrapped open
5116149.126.72.220 23182 tcp tcpwrapped open
5117149.126.72.220 23184 tcp tcpwrapped open
5118149.126.72.220 24082 tcp tcpwrapped open
5119149.126.72.220 24084 tcp tcpwrapped open
5120149.126.72.220 24472 tcp tcpwrapped open
5121149.126.72.220 24510 tcp tcpwrapped open
5122149.126.72.220 25000 tcp tcpwrapped open
5123149.126.72.220 25001 tcp tcpwrapped open
5124149.126.72.220 25002 tcp tcpwrapped open
5125149.126.72.220 25003 tcp tcpwrapped open
5126149.126.72.220 25004 tcp tcpwrapped open
5127149.126.72.220 25005 tcp tcpwrapped open
5128149.126.72.220 25006 tcp tcpwrapped open
5129149.126.72.220 25007 tcp tcpwrapped open
5130149.126.72.220 25008 tcp tcpwrapped open
5131149.126.72.220 25009 tcp tcpwrapped open
5132149.126.72.220 25010 tcp tcpwrapped open
5133149.126.72.220 25082 tcp tcpwrapped open
5134149.126.72.220 25084 tcp tcpwrapped open
5135149.126.72.220 25782 tcp tcpwrapped open
5136149.126.72.220 25952 tcp tcpwrapped open
5137149.126.72.220 27571 tcp tcpwrapped open
5138149.126.72.220 28001 tcp tcpwrapped open
5139149.126.72.220 28080 tcp tcpwrapped open
5140149.126.72.220 28818 tcp tcpwrapped open
5141149.126.72.220 29798 tcp tcpwrapped open
5142149.126.72.220 29799 tcp tcpwrapped open
5143149.126.72.220 30000 tcp tcpwrapped open
5144149.126.72.220 30001 tcp tcpwrapped open
5145149.126.72.220 30003 tcp tcpwrapped open
5146149.126.72.220 30005 tcp tcpwrapped open
5147149.126.72.220 30007 tcp tcpwrapped open
5148149.126.72.220 30009 tcp tcpwrapped open
5149149.126.72.220 30011 tcp tcpwrapped open
5150149.126.72.220 30013 tcp tcpwrapped open
5151149.126.72.220 30015 tcp tcpwrapped open
5152149.126.72.220 30017 tcp tcpwrapped open
5153149.126.72.220 30019 tcp tcpwrapped open
5154149.126.72.220 30021 tcp tcpwrapped open
5155149.126.72.220 30050 tcp tcpwrapped open
5156149.126.72.220 30106 tcp tcpwrapped open
5157149.126.72.220 30110 tcp tcpwrapped open
5158149.126.72.220 30111 tcp tcpwrapped open
5159149.126.72.220 30112 tcp tcpwrapped open
5160149.126.72.220 30113 tcp tcpwrapped open
5161149.126.72.220 30120 tcp tcpwrapped open
5162149.126.72.220 30121 tcp tcpwrapped open
5163149.126.72.220 30122 tcp tcpwrapped open
5164149.126.72.220 30123 tcp tcpwrapped open
5165149.126.72.220 30452 tcp tcpwrapped open
5166149.126.72.220 30468 tcp tcpwrapped open
5167149.126.72.220 30473 tcp tcpwrapped open
5168149.126.72.220 30479 tcp tcpwrapped open
5169149.126.72.220 30501 tcp tcpwrapped open
5170149.126.72.220 30700 tcp tcpwrapped open
5171149.126.72.220 30701 tcp tcpwrapped open
5172149.126.72.220 30892 tcp tcpwrapped open
5173149.126.72.220 30894 tcp tcpwrapped open
5174149.126.72.220 31337 tcp tcpwrapped open
5175149.126.72.220 32101 tcp tcpwrapped open
5176149.126.72.220 32102 tcp tcpwrapped open
5177149.126.72.220 32202 tcp tcpwrapped open
5178149.126.72.220 32303 tcp tcpwrapped open
5179149.126.72.220 32443 tcp tcpwrapped open
5180149.126.72.220 32444 tcp tcpwrapped open
5181149.126.72.220 32746 tcp tcpwrapped open
5182149.126.72.220 32800 tcp tcpwrapped open
5183149.126.72.220 34225 tcp tcpwrapped open
5184149.126.72.220 34500 tcp tcpwrapped open
5185149.126.72.220 35522 tcp tcpwrapped open
5186149.126.72.220 35524 tcp tcpwrapped open
5187149.126.72.220 35531 tcp tcpwrapped open
5188149.126.72.220 35554 tcp tcpwrapped open
5189149.126.72.220 35559 tcp tcpwrapped open
5190149.126.72.220 35560 tcp tcpwrapped open
5191149.126.72.220 36982 tcp tcpwrapped open
5192149.126.72.220 36983 tcp tcpwrapped open
5193149.126.72.220 36984 tcp tcpwrapped open
5194149.126.72.220 37080 tcp tcpwrapped open
5195149.126.72.220 38880 tcp tcpwrapped open
5196149.126.72.220 39001 tcp tcpwrapped open
5197149.126.72.220 40070 tcp tcpwrapped open
5198149.126.72.220 40099 tcp tcpwrapped open
5199149.126.72.220 40892 tcp tcpwrapped open
5200149.126.72.220 40894 tcp tcpwrapped open
5201149.126.72.220 42208 tcp tcpwrapped open
5202149.126.72.220 42424 tcp tcpwrapped open
5203149.126.72.220 42901 tcp tcpwrapped open
5204149.126.72.220 43008 tcp tcpwrapped open
5205149.126.72.220 43009 tcp tcpwrapped open
5206149.126.72.220 43200 tcp tcpwrapped open
5207149.126.72.220 44100 tcp tcpwrapped open
5208149.126.72.220 44300 tcp tcpwrapped open
5209149.126.72.220 44301 tcp tcpwrapped open
5210149.126.72.220 44302 tcp tcpwrapped open
5211149.126.72.220 44303 tcp tcpwrapped open
5212149.126.72.220 44304 tcp tcpwrapped open
5213149.126.72.220 44305 tcp tcpwrapped open
5214149.126.72.220 44306 tcp tcpwrapped open
5215149.126.72.220 44307 tcp tcpwrapped open
5216149.126.72.220 44308 tcp tcpwrapped open
5217149.126.72.220 44309 tcp tcpwrapped open
5218149.126.72.220 44310 tcp tcpwrapped open
5219149.126.72.220 44320 tcp tcpwrapped open
5220149.126.72.220 44332 tcp tcpwrapped open
5221149.126.72.220 44333 tcp tcpwrapped open
5222149.126.72.220 44334 tcp tcpwrapped open
5223149.126.72.220 44336 tcp tcpwrapped open
5224149.126.72.220 44337 tcp tcpwrapped open
5225149.126.72.220 44340 tcp tcpwrapped open
5226149.126.72.220 44341 tcp tcpwrapped open
5227149.126.72.220 44345 tcp tcpwrapped open
5228149.126.72.220 44400 tcp tcpwrapped open
5229149.126.72.220 44410 tcp tcpwrapped open
5230149.126.72.220 44420 tcp tcpwrapped open
5231149.126.72.220 45000 tcp tcpwrapped open
5232149.126.72.220 45555 tcp tcpwrapped open
5233149.126.72.220 45666 tcp tcpwrapped open
5234149.126.72.220 45667 tcp tcpwrapped open
5235149.126.72.220 45668 tcp tcpwrapped open
5236149.126.72.220 45677 tcp tcpwrapped open
5237149.126.72.220 45777 tcp tcpwrapped open
5238149.126.72.220 45788 tcp tcpwrapped open
5239149.126.72.220 45821 tcp tcpwrapped open
5240149.126.72.220 45886 tcp tcpwrapped open
5241149.126.72.220 45888 tcp tcpwrapped open
5242149.126.72.220 46000 tcp tcpwrapped open
5243149.126.72.220 46443 tcp tcpwrapped open
5244149.126.72.220 46862 tcp tcpwrapped open
5245149.126.72.220 47000 tcp tcpwrapped open
5246149.126.72.220 47080 tcp tcpwrapped open
5247149.126.72.220 47534 tcp tcpwrapped open
5248149.126.72.220 48888 tcp tcpwrapped open
5249149.126.72.220 48889 tcp tcpwrapped open
5250149.126.72.220 49200 tcp tcpwrapped open
5251149.126.72.220 49210 tcp tcpwrapped open
5252149.126.72.220 49443 tcp tcpwrapped open
5253149.126.72.220 49682 tcp tcpwrapped open
5254149.126.72.220 49684 tcp tcpwrapped open
5255149.126.72.220 49686 tcp tcpwrapped open
5256149.126.72.220 49688 tcp tcpwrapped open
5257149.126.72.220 49690 tcp tcpwrapped open
5258149.126.72.220 49692 tcp tcpwrapped open
5259149.126.72.220 49694 tcp tcpwrapped open
5260149.126.72.220 50000 tcp tcpwrapped open
5261149.126.72.220 50001 tcp tcpwrapped open
5262149.126.72.220 50042 tcp tcpwrapped open
5263149.126.72.220 50050 tcp tcpwrapped open
5264149.126.72.220 50073 tcp tcpwrapped open
5265149.126.72.220 50085 tcp tcpwrapped open
5266149.126.72.220 50101 tcp tcpwrapped open
5267149.126.72.220 50102 tcp tcpwrapped open
5268149.126.72.220 50103 tcp tcpwrapped open
5269149.126.72.220 50104 tcp tcpwrapped open
5270149.126.72.220 50105 tcp tcpwrapped open
5271149.126.72.220 50106 tcp tcpwrapped open
5272149.126.72.220 50107 tcp tcpwrapped open
5273149.126.72.220 50112 tcp tcpwrapped open
5274149.126.72.220 50113 tcp tcpwrapped open
5275149.126.72.220 50122 tcp tcpwrapped open
5276149.126.72.220 50160 tcp tcpwrapped open
5277149.126.72.220 50443 tcp tcpwrapped open
5278149.126.72.220 51002 tcp tcpwrapped open
5279149.126.72.220 51003 tcp tcpwrapped open
5280149.126.72.220 51434 tcp tcpwrapped open
5281149.126.72.220 52010 tcp tcpwrapped open
5282149.126.72.220 52230 tcp tcpwrapped open
5283149.126.72.220 52311 tcp tcpwrapped open
5284149.126.72.220 52536 tcp tcpwrapped open
5285149.126.72.220 53480 tcp tcpwrapped open
5286149.126.72.220 53481 tcp tcpwrapped open
5287149.126.72.220 53482 tcp tcpwrapped open
5288149.126.72.220 53483 tcp tcpwrapped open
5289149.126.72.220 53484 tcp tcpwrapped open
5290149.126.72.220 53485 tcp tcpwrapped open
5291149.126.72.220 53490 tcp tcpwrapped open
5292149.126.72.220 53805 tcp tcpwrapped open
5293149.126.72.220 53806 tcp tcpwrapped open
5294149.126.72.220 54327 tcp tcpwrapped open
5295149.126.72.220 54490 tcp tcpwrapped open
5296149.126.72.220 54545 tcp tcpwrapped open
5297149.126.72.220 55055 tcp tcpwrapped open
5298149.126.72.220 55080 tcp tcpwrapped open
5299149.126.72.220 55081 tcp tcpwrapped open
5300149.126.72.220 55350 tcp tcpwrapped open
5301149.126.72.220 55388 tcp tcpwrapped open
5302149.126.72.220 55470 tcp tcpwrapped open
5303149.126.72.220 55475 tcp tcpwrapped open
5304149.126.72.220 55481 tcp tcpwrapped open
5305149.126.72.220 55490 tcp tcpwrapped open
5306149.126.72.220 57778 tcp tcpwrapped open
5307149.126.72.220 57779 tcp tcpwrapped open
5308149.126.72.220 57780 tcp tcpwrapped open
5309149.126.72.220 57781 tcp tcpwrapped open
5310149.126.72.220 57782 tcp tcpwrapped open
5311149.126.72.220 57783 tcp tcpwrapped open
5312149.126.72.220 57784 tcp tcpwrapped open
5313149.126.72.220 57785 tcp tcpwrapped open
5314149.126.72.220 57786 tcp tcpwrapped open
5315149.126.72.220 57787 tcp tcpwrapped open
5316149.126.72.220 57788 tcp tcpwrapped open
5317149.126.72.220 58443 tcp tcpwrapped open
5318149.126.72.220 58585 tcp tcpwrapped open
5319149.126.72.220 59012 tcp tcpwrapped open
5320149.126.72.220 59443 tcp tcpwrapped open
5321149.126.72.220 60021 tcp tcpwrapped open
5322149.126.72.220 60023 tcp tcpwrapped open
5323149.126.72.220 60443 tcp tcpwrapped open
5324149.126.72.220 62080 tcp tcpwrapped open
5325149.126.72.220 62237 tcp tcpwrapped open
5326149.126.72.220 62443 tcp tcpwrapped open
5327149.126.72.220 62865 tcp tcpwrapped open
5328149.126.72.220 63443 tcp tcpwrapped open
5329149.126.72.220 64477 tcp tcpwrapped open
5330149.126.72.220 64671 tcp tcpwrapped open
5331151.106.38.107 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 12:11. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
5332151.106.38.107 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
5333151.106.38.107 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
5334151.106.38.107 67 tcp dhcps filtered
5335151.106.38.107 67 udp dhcps unknown
5336151.106.38.107 68 tcp dhcpc filtered
5337151.106.38.107 68 udp dhcpc unknown
5338151.106.38.107 69 tcp tftp filtered
5339151.106.38.107 69 udp tftp unknown
5340151.106.38.107 88 tcp kerberos-sec filtered
5341151.106.38.107 88 udp kerberos-sec unknown
5342151.106.38.107 123 tcp ntp filtered
5343151.106.38.107 123 udp ntp unknown
5344151.106.38.107 137 tcp netbios-ns filtered
5345151.106.38.107 137 udp netbios-ns unknown
5346151.106.38.107 138 tcp netbios-dgm filtered
5347151.106.38.107 138 udp netbios-dgm unknown
5348151.106.38.107 139 tcp netbios-ssn filtered
5349151.106.38.107 139 udp netbios-ssn unknown
5350151.106.38.107 161 tcp snmp filtered
5351151.106.38.107 161 udp snmp unknown
5352151.106.38.107 162 tcp snmptrap filtered
5353151.106.38.107 162 udp snmptrap unknown
5354151.106.38.107 389 tcp ldap filtered
5355151.106.38.107 389 udp ldap unknown
5356151.106.38.107 520 tcp efs filtered
5357151.106.38.107 520 udp route unknown
5358151.106.38.107 2049 tcp nfs filtered
5359151.106.38.107 2049 udp nfs unknown
5360158.69.13.254 22 tcp ssh open OpenSSH 7.4 protocol 2.0
5361158.69.13.254 25 tcp smtp open Exim smtpd 4.92.3
5362158.69.13.254 53 tcp domain open unknown banner: get lost
5363158.69.13.254 53 udp domain open unknown banner: get lost
5364158.69.13.254 67 tcp dhcps filtered
5365158.69.13.254 67 udp dhcps unknown
5366158.69.13.254 68 tcp dhcpc filtered
5367158.69.13.254 68 udp dhcpc unknown
5368158.69.13.254 69 tcp tftp filtered
5369158.69.13.254 69 udp tftp unknown
5370158.69.13.254 80 tcp http open nginx
5371158.69.13.254 88 tcp kerberos-sec filtered
5372158.69.13.254 88 udp kerberos-sec unknown
5373158.69.13.254 123 tcp ntp filtered
5374158.69.13.254 123 udp ntp unknown
5375158.69.13.254 137 tcp netbios-ns filtered
5376158.69.13.254 137 udp netbios-ns unknown
5377158.69.13.254 138 tcp netbios-dgm filtered
5378158.69.13.254 138 udp netbios-dgm unknown
5379158.69.13.254 139 tcp netbios-ssn filtered
5380158.69.13.254 139 udp netbios-ssn unknown
5381158.69.13.254 161 tcp snmp filtered
5382158.69.13.254 161 udp snmp unknown
5383158.69.13.254 162 tcp snmptrap filtered
5384158.69.13.254 162 udp snmptrap unknown
5385158.69.13.254 389 tcp ldap filtered
5386158.69.13.254 389 udp ldap unknown
5387158.69.13.254 443 tcp ssl/http open nginx
5388158.69.13.254 465 tcp ssl/smtp open Exim smtpd 4.92.3
5389158.69.13.254 520 tcp efs filtered
5390158.69.13.254 520 udp route unknown
5391158.69.13.254 587 tcp smtp open Exim smtpd 4.92.3
5392158.69.13.254 2049 tcp nfs filtered
5393158.69.13.254 2049 udp nfs unknown
5394158.69.13.254 2525 tcp smtp open Exim smtpd 4.92.3
5395158.69.13.254 3306 tcp mysql open MySQL blocked - too many connection errors
5396162.244.35.13 22 tcp ssh open SSH-2.0-OpenSSH_7.2 FreeBSD-20160310
5397162.244.35.13 25 tcp open
5398162.244.35.13 53 tcp domain open ISC BIND 9.10.6
5399162.244.35.13 53 udp domain open ISC BIND 9.10.6
5400162.244.35.13 67 tcp dhcps closed
5401162.244.35.13 67 udp dhcps closed
5402162.244.35.13 68 tcp dhcpc closed
5403162.244.35.13 68 udp dhcpc closed
5404162.244.35.13 69 tcp tftp closed
5405162.244.35.13 69 udp tftp closed
5406162.244.35.13 88 tcp kerberos-sec closed
5407162.244.35.13 88 udp kerberos-sec closed
5408162.244.35.13 123 tcp ntp closed
5409162.244.35.13 123 udp ntp closed
5410162.244.35.13 137 tcp netbios-ns filtered
5411162.244.35.13 137 udp netbios-ns unknown
5412162.244.35.13 138 tcp netbios-dgm filtered
5413162.244.35.13 138 udp netbios-dgm unknown
5414162.244.35.13 139 tcp netbios-ssn filtered
5415162.244.35.13 139 udp netbios-ssn unknown
5416162.244.35.13 161 tcp snmp closed
5417162.244.35.13 161 udp snmp closed
5418162.244.35.13 162 tcp snmptrap closed
5419162.244.35.13 162 udp snmptrap closed
5420162.244.35.13 389 tcp ldap closed
5421162.244.35.13 389 udp ldap closed
5422162.244.35.13 520 tcp efs closed
5423162.244.35.13 520 udp route closed
5424162.244.35.13 2049 tcp nfs closed
5425162.244.35.13 2049 udp nfs closed
5426169.239.218.20 25 tcp smtp closed
5427169.239.218.20 53 tcp domain filtered
5428169.239.218.20 53 udp domain unknown
5429169.239.218.20 67 tcp dhcps filtered
5430169.239.218.20 67 udp dhcps unknown
5431169.239.218.20 68 tcp dhcpc filtered
5432169.239.218.20 68 udp dhcpc unknown
5433169.239.218.20 69 tcp tftp filtered
5434169.239.218.20 69 udp tftp unknown
5435169.239.218.20 88 tcp kerberos-sec filtered
5436169.239.218.20 88 udp kerberos-sec unknown
5437169.239.218.20 113 tcp ident closed
5438169.239.218.20 123 tcp ntp filtered
5439169.239.218.20 123 udp ntp unknown
5440169.239.218.20 137 tcp netbios-ns filtered
5441169.239.218.20 137 udp netbios-ns filtered
5442169.239.218.20 138 tcp netbios-dgm filtered
5443169.239.218.20 138 udp netbios-dgm filtered
5444169.239.218.20 139 tcp netbios-ssn closed
5445169.239.218.20 139 udp netbios-ssn unknown
5446169.239.218.20 161 tcp snmp filtered
5447169.239.218.20 161 udp snmp unknown
5448169.239.218.20 162 tcp snmptrap filtered
5449169.239.218.20 162 udp snmptrap unknown
5450169.239.218.20 389 tcp ldap filtered
5451169.239.218.20 389 udp ldap unknown
5452169.239.218.20 445 tcp microsoft-ds closed
5453169.239.218.20 520 tcp efs filtered
5454169.239.218.20 520 udp route unknown
5455169.239.218.20 2049 tcp nfs filtered
5456169.239.218.20 2049 udp nfs unknown
5457169.239.218.20 8008 tcp tcpwrapped open
5458173.214.244.169 53 tcp domain filtered
5459173.214.244.169 53 udp domain unknown
5460173.214.244.169 67 tcp dhcps filtered
5461173.214.244.169 67 udp dhcps unknown
5462173.214.244.169 68 tcp dhcpc filtered
5463173.214.244.169 68 udp dhcpc unknown
5464173.214.244.169 69 tcp tftp filtered
5465173.214.244.169 69 udp tftp unknown
5466173.214.244.169 88 tcp kerberos-sec filtered
5467173.214.244.169 88 udp kerberos-sec unknown
5468173.214.244.169 123 tcp ntp filtered
5469173.214.244.169 123 udp ntp unknown
5470173.214.244.169 137 tcp netbios-ns filtered
5471173.214.244.169 137 udp netbios-ns unknown
5472173.214.244.169 138 tcp netbios-dgm filtered
5473173.214.244.169 138 udp netbios-dgm unknown
5474173.214.244.169 139 tcp netbios-ssn filtered
5475173.214.244.169 139 udp netbios-ssn unknown
5476173.214.244.169 161 tcp snmp filtered
5477173.214.244.169 161 udp snmp unknown
5478173.214.244.169 162 tcp snmptrap filtered
5479173.214.244.169 162 udp snmptrap unknown
5480173.214.244.169 389 tcp ldap filtered
5481173.214.244.169 389 udp ldap unknown
5482173.214.244.169 520 tcp efs filtered
5483173.214.244.169 520 udp route unknown
5484173.214.244.169 2049 tcp nfs filtered
5485173.214.244.169 2049 udp nfs unknown
5486174.142.53.51 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 13:59. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
5487174.142.53.51 22 tcp ssh open SSH-2.0-OpenSSH_7.4
5488174.142.53.51 25 tcp smtp closed
5489174.142.53.51 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
5490174.142.53.51 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
5491174.142.53.51 67 tcp dhcps filtered
5492174.142.53.51 67 udp dhcps unknown
5493174.142.53.51 68 tcp dhcpc filtered
5494174.142.53.51 68 udp dhcpc unknown
5495174.142.53.51 69 tcp tftp filtered
5496174.142.53.51 69 udp tftp unknown
5497174.142.53.51 88 tcp kerberos-sec filtered
5498174.142.53.51 88 udp kerberos-sec unknown
5499174.142.53.51 123 tcp ntp filtered
5500174.142.53.51 123 udp ntp unknown
5501174.142.53.51 137 tcp netbios-ns filtered
5502174.142.53.51 137 udp netbios-ns filtered
5503174.142.53.51 138 tcp netbios-dgm filtered
5504174.142.53.51 138 udp netbios-dgm filtered
5505174.142.53.51 139 tcp netbios-ssn closed
5506174.142.53.51 139 udp netbios-ssn unknown
5507174.142.53.51 161 tcp snmp filtered
5508174.142.53.51 161 udp snmp unknown
5509174.142.53.51 162 tcp snmptrap filtered
5510174.142.53.51 162 udp snmptrap unknown
5511174.142.53.51 389 tcp ldap filtered
5512174.142.53.51 389 udp ldap unknown
5513174.142.53.51 445 tcp microsoft-ds closed
5514174.142.53.51 520 tcp efs filtered
5515174.142.53.51 520 udp route unknown
5516174.142.53.51 2049 tcp nfs filtered
5517174.142.53.51 2049 udp nfs unknown
5518186.64.118.40 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 100 allowed.\x0d\x0a220-Local time is now 13:39. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 10 minutes of inactivity.\x0d\x0a
5519186.64.118.40 53 tcp domain filtered
5520186.64.118.40 53 udp domain closed
5521186.64.118.40 67 tcp dhcps filtered
5522186.64.118.40 67 udp dhcps unknown
5523186.64.118.40 68 tcp dhcpc filtered
5524186.64.118.40 68 udp dhcpc unknown
5525186.64.118.40 69 tcp tftp filtered
5526186.64.118.40 69 udp tftp unknown
5527186.64.118.40 88 tcp kerberos-sec filtered
5528186.64.118.40 88 udp kerberos-sec unknown
5529186.64.118.40 123 tcp ntp filtered
5530186.64.118.40 123 udp ntp unknown
5531186.64.118.40 137 tcp netbios-ns filtered
5532186.64.118.40 137 udp netbios-ns unknown
5533186.64.118.40 138 tcp netbios-dgm filtered
5534186.64.118.40 138 udp netbios-dgm unknown
5535186.64.118.40 139 tcp netbios-ssn filtered
5536186.64.118.40 139 udp netbios-ssn unknown
5537186.64.118.40 161 tcp snmp filtered
5538186.64.118.40 161 udp snmp unknown
5539186.64.118.40 162 tcp snmptrap filtered
5540186.64.118.40 162 udp snmptrap unknown
5541186.64.118.40 389 tcp ldap filtered
5542186.64.118.40 389 udp ldap unknown
5543186.64.118.40 520 tcp efs filtered
5544186.64.118.40 520 udp route unknown
5545186.64.118.40 2049 tcp nfs closed
5546186.64.118.40 2049 udp nfs unknown
5547190.98.209.37 53 tcp domain filtered
5548190.98.209.37 53 udp domain unknown
5549190.98.209.37 67 tcp dhcps filtered
5550190.98.209.37 67 udp dhcps unknown
5551190.98.209.37 68 tcp dhcpc filtered
5552190.98.209.37 68 udp dhcpc unknown
5553190.98.209.37 69 tcp tftp filtered
5554190.98.209.37 69 udp tftp unknown
5555190.98.209.37 88 tcp kerberos-sec filtered
5556190.98.209.37 88 udp kerberos-sec unknown
5557190.98.209.37 123 tcp ntp filtered
5558190.98.209.37 123 udp ntp unknown
5559190.98.209.37 137 tcp netbios-ns filtered
5560190.98.209.37 137 udp netbios-ns unknown
5561190.98.209.37 138 tcp netbios-dgm filtered
5562190.98.209.37 138 udp netbios-dgm unknown
5563190.98.209.37 139 tcp netbios-ssn filtered
5564190.98.209.37 139 udp netbios-ssn unknown
5565190.98.209.37 161 tcp snmp filtered
5566190.98.209.37 161 udp snmp unknown
5567190.98.209.37 162 tcp snmptrap filtered
5568190.98.209.37 162 udp snmptrap unknown
5569190.98.209.37 389 tcp ldap filtered
5570190.98.209.37 389 udp ldap unknown
5571190.98.209.37 520 tcp efs filtered
5572190.98.209.37 520 udp route unknown
5573190.98.209.37 2049 tcp nfs filtered
5574190.98.209.37 2049 udp nfs unknown
5575190.153.209.187 53 tcp domain filtered
5576190.153.209.187 53 udp domain unknown
5577190.153.209.187 67 tcp dhcps filtered
5578190.153.209.187 67 udp dhcps unknown
5579190.153.209.187 68 tcp dhcpc filtered
5580190.153.209.187 68 udp dhcpc unknown
5581190.153.209.187 69 tcp tftp filtered
5582190.153.209.187 69 udp tftp unknown
5583190.153.209.187 88 tcp kerberos-sec filtered
5584190.153.209.187 88 udp kerberos-sec unknown
5585190.153.209.187 123 tcp ntp filtered
5586190.153.209.187 123 udp ntp unknown
5587190.153.209.187 137 tcp netbios-ns filtered
5588190.153.209.187 137 udp netbios-ns unknown
5589190.153.209.187 138 tcp netbios-dgm filtered
5590190.153.209.187 138 udp netbios-dgm unknown
5591190.153.209.187 139 tcp netbios-ssn filtered
5592190.153.209.187 139 udp netbios-ssn unknown
5593190.153.209.187 161 tcp snmp filtered
5594190.153.209.187 161 udp snmp unknown
5595190.153.209.187 162 tcp snmptrap filtered
5596190.153.209.187 162 udp snmptrap unknown
5597190.153.209.187 389 tcp ldap filtered
5598190.153.209.187 389 udp ldap unknown
5599190.153.209.187 520 tcp efs filtered
5600190.153.209.187 520 udp route unknown
5601190.153.209.187 2049 tcp nfs filtered
5602190.153.209.187 2049 udp nfs unknown
5603190.153.219.254 22 tcp ssh open SSH-2.0-OpenSSH_7.4
5604190.153.219.254 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
5605190.153.219.254 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
5606190.153.219.254 67 tcp dhcps filtered
5607190.153.219.254 67 udp dhcps unknown
5608190.153.219.254 68 tcp dhcpc filtered
5609190.153.219.254 68 udp dhcpc unknown
5610190.153.219.254 69 tcp tftp filtered
5611190.153.219.254 69 udp tftp unknown
5612190.153.219.254 88 tcp kerberos-sec filtered
5613190.153.219.254 88 udp kerberos-sec unknown
5614190.153.219.254 123 tcp ntp filtered
5615190.153.219.254 123 udp ntp unknown
5616190.153.219.254 137 tcp netbios-ns filtered
5617190.153.219.254 137 udp netbios-ns unknown
5618190.153.219.254 138 tcp netbios-dgm filtered
5619190.153.219.254 138 udp netbios-dgm unknown
5620190.153.219.254 139 tcp netbios-ssn filtered
5621190.153.219.254 139 udp netbios-ssn unknown
5622190.153.219.254 161 tcp snmp filtered
5623190.153.219.254 161 udp snmp unknown
5624190.153.219.254 162 tcp snmptrap filtered
5625190.153.219.254 162 udp snmptrap unknown
5626190.153.219.254 389 tcp ldap filtered
5627190.153.219.254 389 udp ldap unknown
5628190.153.219.254 520 tcp efs filtered
5629190.153.219.254 520 udp route unknown
5630190.153.219.254 2049 tcp nfs filtered
5631190.153.219.254 2049 udp nfs unknown
5632200.2.249.28 21 tcp ftp open vsftpd 3.0.2
5633200.2.249.28 53 udp domain unknown
5634200.2.249.28 67 udp dhcps unknown
5635200.2.249.28 68 udp dhcpc unknown
5636200.2.249.28 69 udp tftp unknown
5637200.2.249.28 80 tcp http open Oracle Application Server 10g httpd 10.1.3.5.0
5638200.2.249.28 88 udp kerberos-sec unknown
5639200.2.249.28 123 udp ntp unknown
5640200.2.249.28 137 udp netbios-ns unknown
5641200.2.249.28 138 udp netbios-dgm unknown
5642200.2.249.28 139 tcp netbios-ssn open Samba smbd 4.8.3 workgroup: SAMBA
5643200.2.249.28 139 udp netbios-ssn unknown
5644200.2.249.28 161 udp snmp unknown
5645200.2.249.28 162 udp snmptrap unknown
5646200.2.249.28 389 udp ldap unknown
5647200.2.249.28 445 tcp netbios-ssn open Samba smbd 4.8.3 workgroup: SAMBA
5648200.2.249.28 520 udp route unknown
5649200.2.249.28 2049 udp nfs unknown
5650200.29.0.33 53 tcp domain filtered
5651200.29.0.33 53 udp domain unknown
5652200.29.0.33 67 tcp dhcps filtered
5653200.29.0.33 67 udp dhcps unknown
5654200.29.0.33 68 tcp dhcpc filtered
5655200.29.0.33 68 udp dhcpc unknown
5656200.29.0.33 69 tcp tftp filtered
5657200.29.0.33 69 udp tftp unknown
5658200.29.0.33 88 tcp kerberos-sec filtered
5659200.29.0.33 88 udp kerberos-sec unknown
5660200.29.0.33 123 tcp ntp filtered
5661200.29.0.33 123 udp ntp unknown
5662200.29.0.33 137 tcp netbios-ns filtered
5663200.29.0.33 137 udp netbios-ns unknown
5664200.29.0.33 138 tcp netbios-dgm filtered
5665200.29.0.33 138 udp netbios-dgm unknown
5666200.29.0.33 139 tcp netbios-ssn filtered
5667200.29.0.33 139 udp netbios-ssn unknown
5668200.29.0.33 161 tcp snmp filtered
5669200.29.0.33 161 udp snmp unknown
5670200.29.0.33 162 tcp snmptrap filtered
5671200.29.0.33 162 udp snmptrap unknown
5672200.29.0.33 389 tcp ldap filtered
5673200.29.0.33 389 udp ldap unknown
5674200.29.0.33 520 tcp efs filtered
5675200.29.0.33 520 udp route unknown
5676200.29.0.33 2049 tcp nfs filtered
5677200.29.0.33 2049 udp nfs unknown
5678200.55.198.228 22 tcp ssh open SSH-2.0-OpenSSH_7.4p1 Debian-11.0nosystemd1
5679200.55.198.228 53 tcp domain open
5680200.55.198.228 53 udp domain open
5681200.55.198.228 67 tcp dhcps filtered
5682200.55.198.228 67 udp dhcps unknown
5683200.55.198.228 68 tcp dhcpc filtered
5684200.55.198.228 68 udp dhcpc unknown
5685200.55.198.228 69 tcp tftp filtered
5686200.55.198.228 69 udp tftp unknown
5687200.55.198.228 88 tcp kerberos-sec filtered
5688200.55.198.228 88 udp kerberos-sec unknown
5689200.55.198.228 123 tcp ntp filtered
5690200.55.198.228 123 udp ntp unknown
5691200.55.198.228 137 tcp netbios-ns filtered
5692200.55.198.228 137 udp netbios-ns unknown
5693200.55.198.228 138 tcp netbios-dgm filtered
5694200.55.198.228 138 udp netbios-dgm unknown
5695200.55.198.228 139 tcp netbios-ssn filtered
5696200.55.198.228 139 udp netbios-ssn unknown
5697200.55.198.228 161 tcp snmp filtered
5698200.55.198.228 161 udp snmp unknown
5699200.55.198.228 162 tcp snmptrap filtered
5700200.55.198.228 162 udp snmptrap unknown
5701200.55.198.228 389 tcp ldap filtered
5702200.55.198.228 389 udp ldap unknown
5703200.55.198.228 520 tcp efs filtered
5704200.55.198.228 520 udp route closed
5705200.55.198.228 2049 tcp nfs filtered
5706200.55.198.228 2049 udp nfs unknown
5707200.68.34.99 53 tcp domain filtered
5708200.68.34.99 53 udp domain unknown
5709200.68.34.99 67 tcp dhcps filtered
5710200.68.34.99 67 udp dhcps unknown
5711200.68.34.99 68 tcp dhcpc filtered
5712200.68.34.99 68 udp dhcpc unknown
5713200.68.34.99 69 tcp tftp filtered
5714200.68.34.99 69 udp tftp unknown
5715200.68.34.99 88 tcp kerberos-sec filtered
5716200.68.34.99 88 udp kerberos-sec unknown
5717200.68.34.99 123 tcp ntp filtered
5718200.68.34.99 123 udp ntp unknown
5719200.68.34.99 137 tcp netbios-ns filtered
5720200.68.34.99 137 udp netbios-ns unknown
5721200.68.34.99 138 tcp netbios-dgm filtered
5722200.68.34.99 138 udp netbios-dgm unknown
5723200.68.34.99 139 tcp netbios-ssn filtered
5724200.68.34.99 139 udp netbios-ssn unknown
5725200.68.34.99 161 tcp snmp filtered
5726200.68.34.99 161 udp snmp unknown
5727200.68.34.99 162 tcp snmptrap filtered
5728200.68.34.99 162 udp snmptrap unknown
5729200.68.34.99 389 tcp ldap filtered
5730200.68.34.99 389 udp ldap unknown
5731200.68.34.99 520 tcp efs filtered
5732200.68.34.99 520 udp route unknown
5733200.68.34.99 2049 tcp nfs filtered
5734200.68.34.99 2049 udp nfs unknown
5735200.73.54.34 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
5736200.73.54.34 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
5737200.73.54.34 67 tcp dhcps filtered
5738200.73.54.34 67 udp dhcps unknown
5739200.73.54.34 68 tcp dhcpc filtered
5740200.73.54.34 68 udp dhcpc unknown
5741200.73.54.34 69 tcp tftp filtered
5742200.73.54.34 69 udp tftp unknown
5743200.73.54.34 88 tcp kerberos-sec filtered
5744200.73.54.34 88 udp kerberos-sec unknown
5745200.73.54.34 123 tcp ntp filtered
5746200.73.54.34 123 udp ntp unknown
5747200.73.54.34 137 tcp netbios-ns filtered
5748200.73.54.34 137 udp netbios-ns unknown
5749200.73.54.34 138 tcp netbios-dgm filtered
5750200.73.54.34 138 udp netbios-dgm unknown
5751200.73.54.34 139 tcp netbios-ssn filtered
5752200.73.54.34 139 udp netbios-ssn unknown
5753200.73.54.34 161 tcp snmp filtered
5754200.73.54.34 161 udp snmp unknown
5755200.73.54.34 162 tcp snmptrap filtered
5756200.73.54.34 162 udp snmptrap unknown
5757200.73.54.34 389 tcp ldap filtered
5758200.73.54.34 389 udp ldap unknown
5759200.73.54.34 520 tcp efs filtered
5760200.73.54.34 520 udp route unknown
5761200.73.54.34 2049 tcp nfs filtered
5762200.73.54.34 2049 udp nfs unknown
5763204.93.193.141 21 tcp ftp open Your connection to this server has been blocked.\x0d\x0a\x0d\x0aYou are most likely being blocked due to use of incorrect user/pass combination. Please, check all of your computers/devices to make sure that they are using the correct login credentials, including your email clients. You may also get blocked due to too many POP3/IMAP logins in 1 minute interval, please adjust your email client settings.\x0d\x0a
5764204.93.193.141 53 tcp domain filtered
5765204.93.193.141 53 udp domain unknown
5766204.93.193.141 67 tcp dhcps filtered
5767204.93.193.141 67 udp dhcps unknown
5768204.93.193.141 68 tcp dhcpc filtered
5769204.93.193.141 68 udp dhcpc unknown
5770204.93.193.141 69 tcp tftp filtered
5771204.93.193.141 69 udp tftp unknown
5772204.93.193.141 88 tcp kerberos-sec filtered
5773204.93.193.141 88 udp kerberos-sec unknown
5774204.93.193.141 123 tcp ntp filtered
5775204.93.193.141 123 udp ntp unknown
5776204.93.193.141 137 tcp netbios-ns filtered
5777204.93.193.141 137 udp netbios-ns unknown
5778204.93.193.141 138 tcp netbios-dgm filtered
5779204.93.193.141 138 udp netbios-dgm unknown
5780204.93.193.141 139 tcp netbios-ssn filtered
5781204.93.193.141 139 udp netbios-ssn unknown
5782204.93.193.141 161 tcp snmp filtered
5783204.93.193.141 161 udp snmp unknown
5784204.93.193.141 162 tcp snmptrap filtered
5785204.93.193.141 162 udp snmptrap unknown
5786204.93.193.141 389 tcp ldap filtered
5787204.93.193.141 389 udp ldap unknown
5788204.93.193.141 520 tcp efs filtered
5789204.93.193.141 520 udp route unknown
5790204.93.193.141 2049 tcp nfs filtered
5791204.93.193.141 2049 udp nfs unknown
5792206.48.140.40 53 tcp domain filtered
5793206.48.140.40 53 udp domain unknown
5794206.48.140.40 67 tcp dhcps filtered
5795206.48.140.40 67 udp dhcps unknown
5796206.48.140.40 68 tcp dhcpc filtered
5797206.48.140.40 68 udp dhcpc unknown
5798206.48.140.40 69 tcp tftp filtered
5799206.48.140.40 69 udp tftp unknown
5800206.48.140.40 88 tcp kerberos-sec filtered
5801206.48.140.40 88 udp kerberos-sec unknown
5802206.48.140.40 123 tcp ntp filtered
5803206.48.140.40 123 udp ntp unknown
5804206.48.140.40 137 tcp netbios-ns filtered
5805206.48.140.40 137 udp netbios-ns unknown
5806206.48.140.40 138 tcp netbios-dgm filtered
5807206.48.140.40 138 udp netbios-dgm unknown
5808206.48.140.40 139 tcp netbios-ssn filtered
5809206.48.140.40 139 udp netbios-ssn unknown
5810206.48.140.40 161 tcp snmp filtered
5811206.48.140.40 161 udp snmp unknown
5812206.48.140.40 162 tcp snmptrap filtered
5813206.48.140.40 162 udp snmptrap unknown
5814206.48.140.40 389 tcp ldap filtered
5815206.48.140.40 389 udp ldap unknown
5816206.48.140.40 520 tcp efs filtered
5817206.48.140.40 520 udp route unknown
5818206.48.140.40 2049 tcp nfs filtered
5819206.48.140.40 2049 udp nfs unknown
5820207.246.147.189 53 tcp domain filtered
5821207.246.147.189 53 udp domain unknown
5822207.246.147.189 67 tcp dhcps filtered
5823207.246.147.189 67 udp dhcps unknown
5824207.246.147.189 68 tcp dhcpc filtered
5825207.246.147.189 68 udp dhcpc unknown
5826207.246.147.189 69 tcp tftp filtered
5827207.246.147.189 69 udp tftp unknown
5828207.246.147.189 80 tcp http open nginx
5829207.246.147.189 88 tcp kerberos-sec filtered
5830207.246.147.189 88 udp kerberos-sec unknown
5831207.246.147.189 123 tcp ntp filtered
5832207.246.147.189 123 udp ntp unknown
5833207.246.147.189 137 tcp netbios-ns filtered
5834207.246.147.189 137 udp netbios-ns unknown
5835207.246.147.189 138 tcp netbios-dgm filtered
5836207.246.147.189 138 udp netbios-dgm unknown
5837207.246.147.189 139 tcp netbios-ssn filtered
5838207.246.147.189 139 udp netbios-ssn unknown
5839207.246.147.189 161 tcp snmp filtered
5840207.246.147.189 161 udp snmp unknown
5841207.246.147.189 162 tcp snmptrap filtered
5842207.246.147.189 162 udp snmptrap unknown
5843207.246.147.189 389 tcp ldap filtered
5844207.246.147.189 389 udp ldap unknown
5845207.246.147.189 443 tcp ssl/http open nginx
5846207.246.147.189 520 tcp efs filtered
5847207.246.147.189 520 udp route unknown
5848207.246.147.189 2049 tcp nfs filtered
5849207.246.147.189 2049 udp nfs unknown
5850207.246.147.190 53 tcp domain filtered
5851207.246.147.190 53 udp domain unknown
5852207.246.147.190 67 tcp dhcps filtered
5853207.246.147.190 67 udp dhcps unknown
5854207.246.147.190 68 tcp dhcpc filtered
5855207.246.147.190 68 udp dhcpc unknown
5856207.246.147.190 69 tcp tftp filtered
5857207.246.147.190 69 udp tftp unknown
5858207.246.147.190 80 tcp http open nginx
5859207.246.147.190 88 tcp kerberos-sec filtered
5860207.246.147.190 88 udp kerberos-sec unknown
5861207.246.147.190 123 tcp ntp filtered
5862207.246.147.190 123 udp ntp unknown
5863207.246.147.190 137 tcp netbios-ns filtered
5864207.246.147.190 137 udp netbios-ns unknown
5865207.246.147.190 138 tcp netbios-dgm filtered
5866207.246.147.190 138 udp netbios-dgm filtered
5867207.246.147.190 139 tcp netbios-ssn filtered
5868207.246.147.190 139 udp netbios-ssn unknown
5869207.246.147.190 161 tcp snmp filtered
5870207.246.147.190 161 udp snmp unknown
5871207.246.147.190 162 tcp snmptrap filtered
5872207.246.147.190 162 udp snmptrap unknown
5873207.246.147.190 389 tcp ldap filtered
5874207.246.147.190 389 udp ldap unknown
5875207.246.147.190 443 tcp ssl/http open nginx
5876207.246.147.190 520 tcp efs filtered
5877207.246.147.190 520 udp route unknown
5878207.246.147.190 2049 tcp nfs filtered
5879207.246.147.190 2049 udp nfs unknown
5880207.246.147.247 53 tcp domain filtered
5881207.246.147.247 53 udp domain filtered
5882207.246.147.247 67 tcp dhcps filtered
5883207.246.147.247 67 udp dhcps unknown
5884207.246.147.247 68 tcp dhcpc filtered
5885207.246.147.247 68 udp dhcpc unknown
5886207.246.147.247 69 tcp tftp filtered
5887207.246.147.247 69 udp tftp unknown
5888207.246.147.247 80 tcp http open nginx
5889207.246.147.247 88 tcp kerberos-sec filtered
5890207.246.147.247 88 udp kerberos-sec unknown
5891207.246.147.247 123 tcp ntp filtered
5892207.246.147.247 123 udp ntp unknown
5893207.246.147.247 137 tcp netbios-ns filtered
5894207.246.147.247 137 udp netbios-ns filtered
5895207.246.147.247 138 tcp netbios-dgm filtered
5896207.246.147.247 138 udp netbios-dgm unknown
5897207.246.147.247 139 tcp netbios-ssn filtered
5898207.246.147.247 139 udp netbios-ssn unknown
5899207.246.147.247 161 tcp snmp filtered
5900207.246.147.247 161 udp snmp unknown
5901207.246.147.247 162 tcp snmptrap filtered
5902207.246.147.247 162 udp snmptrap unknown
5903207.246.147.247 389 tcp ldap filtered
5904207.246.147.247 389 udp ldap unknown
5905207.246.147.247 443 tcp ssl/http open nginx
5906207.246.147.247 520 tcp efs filtered
5907207.246.147.247 520 udp route unknown
5908207.246.147.247 2049 tcp nfs filtered
5909207.246.147.247 2049 udp nfs unknown
5910207.246.147.248 53 tcp domain filtered
5911207.246.147.248 53 udp domain unknown
5912207.246.147.248 67 tcp dhcps filtered
5913207.246.147.248 67 udp dhcps unknown
5914207.246.147.248 68 tcp dhcpc filtered
5915207.246.147.248 68 udp dhcpc unknown
5916207.246.147.248 69 tcp tftp filtered
5917207.246.147.248 69 udp tftp unknown
5918207.246.147.248 80 tcp http open nginx
5919207.246.147.248 88 tcp kerberos-sec filtered
5920207.246.147.248 88 udp kerberos-sec unknown
5921207.246.147.248 123 tcp ntp filtered
5922207.246.147.248 123 udp ntp unknown
5923207.246.147.248 137 tcp netbios-ns filtered
5924207.246.147.248 137 udp netbios-ns unknown
5925207.246.147.248 138 tcp netbios-dgm filtered
5926207.246.147.248 138 udp netbios-dgm unknown
5927207.246.147.248 139 tcp netbios-ssn filtered
5928207.246.147.248 139 udp netbios-ssn unknown
5929207.246.147.248 161 tcp snmp filtered
5930207.246.147.248 161 udp snmp unknown
5931207.246.147.248 162 tcp snmptrap filtered
5932207.246.147.248 162 udp snmptrap unknown
5933207.246.147.248 389 tcp ldap filtered
5934207.246.147.248 389 udp ldap unknown
5935207.246.147.248 443 tcp ssl/http open nginx
5936207.246.147.248 520 tcp efs filtered
5937207.246.147.248 520 udp route unknown
5938207.246.147.248 2049 tcp nfs filtered
5939207.246.147.248 2049 udp nfs unknown
5940211.13.196.135 25 tcp smtp closed
5941211.13.196.135 53 tcp domain filtered
5942211.13.196.135 53 udp domain unknown
5943211.13.196.135 67 tcp dhcps filtered
5944211.13.196.135 67 udp dhcps unknown
5945211.13.196.135 68 tcp dhcpc filtered
5946211.13.196.135 68 udp dhcpc unknown
5947211.13.196.135 69 tcp tftp filtered
5948211.13.196.135 69 udp tftp unknown
5949211.13.196.135 80 tcp http open Apache httpd
5950211.13.196.135 88 tcp kerberos-sec filtered
5951211.13.196.135 88 udp kerberos-sec unknown
5952211.13.196.135 113 tcp ident closed
5953211.13.196.135 123 tcp ntp filtered
5954211.13.196.135 123 udp ntp unknown
5955211.13.196.135 137 tcp netbios-ns filtered
5956211.13.196.135 137 udp netbios-ns filtered
5957211.13.196.135 138 tcp netbios-dgm filtered
5958211.13.196.135 138 udp netbios-dgm filtered
5959211.13.196.135 139 tcp netbios-ssn closed
5960211.13.196.135 139 udp netbios-ssn unknown
5961211.13.196.135 161 tcp snmp filtered
5962211.13.196.135 161 udp snmp unknown
5963211.13.196.135 162 tcp snmptrap filtered
5964211.13.196.135 162 udp snmptrap unknown
5965211.13.196.135 389 tcp ldap filtered
5966211.13.196.135 389 udp ldap unknown
5967211.13.196.135 443 tcp ssl/http open Apache httpd
5968211.13.196.135 445 tcp microsoft-ds closed
5969211.13.196.135 520 tcp efs filtered
5970211.13.196.135 520 udp route unknown
5971211.13.196.135 2049 tcp nfs filtered
5972211.13.196.135 2049 udp nfs unknown
5973212.174.0.150 53 tcp domain filtered
5974212.174.0.150 53 udp domain unknown
5975212.174.0.150 67 tcp dhcps filtered
5976212.174.0.150 67 udp dhcps unknown
5977212.174.0.150 68 tcp dhcpc filtered
5978212.174.0.150 68 udp dhcpc unknown
5979212.174.0.150 69 tcp tftp filtered
5980212.174.0.150 69 udp tftp unknown
5981212.174.0.150 80 tcp http open Microsoft IIS httpd 8.5
5982212.174.0.150 88 tcp kerberos-sec filtered
5983212.174.0.150 88 udp kerberos-sec unknown
5984212.174.0.150 123 tcp ntp filtered
5985212.174.0.150 123 udp ntp unknown
5986212.174.0.150 137 tcp netbios-ns filtered
5987212.174.0.150 137 udp netbios-ns unknown
5988212.174.0.150 138 tcp netbios-dgm filtered
5989212.174.0.150 138 udp netbios-dgm unknown
5990212.174.0.150 139 tcp netbios-ssn filtered
5991212.174.0.150 139 udp netbios-ssn unknown
5992212.174.0.150 161 tcp snmp filtered
5993212.174.0.150 161 udp snmp unknown
5994212.174.0.150 162 tcp snmptrap filtered
5995212.174.0.150 162 udp snmptrap unknown
5996212.174.0.150 389 tcp ldap filtered
5997212.174.0.150 389 udp ldap unknown
5998212.174.0.150 520 tcp efs filtered
5999212.174.0.150 520 udp route unknown
6000212.174.0.150 2049 tcp nfs filtered
6001212.174.0.150 2049 udp nfs unknown
6002218.45.5.97 25 tcp smtp closed
6003218.45.5.97 53 tcp domain filtered
6004218.45.5.97 53 udp domain unknown
6005218.45.5.97 67 tcp dhcps filtered
6006218.45.5.97 67 udp dhcps unknown
6007218.45.5.97 68 tcp dhcpc filtered
6008218.45.5.97 68 udp dhcpc unknown
6009218.45.5.97 69 tcp tftp filtered
6010218.45.5.97 69 udp tftp unknown
6011218.45.5.97 80 tcp http open Apache httpd 2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.15
6012218.45.5.97 88 tcp kerberos-sec filtered
6013218.45.5.97 88 udp kerberos-sec unknown
6014218.45.5.97 113 tcp ident closed
6015218.45.5.97 123 tcp ntp filtered
6016218.45.5.97 123 udp ntp unknown
6017218.45.5.97 137 tcp netbios-ns filtered
6018218.45.5.97 137 udp netbios-ns filtered
6019218.45.5.97 138 tcp netbios-dgm filtered
6020218.45.5.97 138 udp netbios-dgm filtered
6021218.45.5.97 139 tcp netbios-ssn closed
6022218.45.5.97 139 udp netbios-ssn unknown
6023218.45.5.97 161 tcp snmp filtered
6024218.45.5.97 161 udp snmp unknown
6025218.45.5.97 162 tcp snmptrap filtered
6026218.45.5.97 162 udp snmptrap unknown
6027218.45.5.97 389 tcp ldap filtered
6028218.45.5.97 389 udp ldap unknown
6029218.45.5.97 443 tcp ssl/http open Apache httpd 2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.15
6030218.45.5.97 445 tcp microsoft-ds closed
6031218.45.5.97 520 tcp efs filtered
6032218.45.5.97 520 udp route unknown
6033218.45.5.97 2049 tcp nfs filtered
6034218.45.5.97 2049 udp nfs unknown
6035####################################################################################################################################
6036Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 11:32 EST
6037Nmap scan report for blue127.dnsmisitio.net (186.64.118.40)
6038Host is up (0.44s latency).
6039Not shown: 882 filtered ports, 110 closed ports
6040PORT STATE SERVICE VERSION
604121/tcp open ftp Pure-FTPd
6042| vulscan: VulDB - https://vuldb.com:
6043| [102925] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface pureftpd.passwd HTTP Request privilege escalation
6044| [57510] Pureftpd Pure-FTPd up to 0.x Memory Consumption denial of service
6045| [57504] Pureftpd Pure-FTPd up to 0.x ftp_parser.c Cleartext unknown vulnerability
6046|
6047| MITRE CVE - https://cve.mitre.org:
6048| [CVE-2004-0656] The accept_client function in PureFTPd 1.0.18 and earlier allows remote attackers to cause a denial of service by exceeding the maximum number of connections.
6049|
6050| SecurityFocus - https://www.securityfocus.com/bid/:
6051| [10664] PureFTPd Accept_Client Remote Denial of Service Vulnerability
6052|
6053| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6054| No findings
6055|
6056| Exploit-DB - https://www.exploit-db.com:
6057| No findings
6058|
6059| OpenVAS (Nessus) - http://www.openvas.org:
6060| No findings
6061|
6062| SecurityTracker - https://www.securitytracker.com:
6063| [1010701] PureFTPd Logic Bug in accept_client() Lets Remote Users Crash the FTP Daemon
6064| [1008135] (Claim is Retracted) PureFTPd Buffer Overflow in displayrate() Lets Remote Users Crash the Service
6065| [1002993] PurePostPro Script Add-on for PureFTPd and MySQL Allows Remote Users to Execute SQL Commands on the Server
6066| [1001126] PureFTPd May Allow Remote Users to Deny Service on the Server
6067|
6068| OSVDB - http://www.osvdb.org:
6069| No findings
6070|_
607125/tcp open smtp?
6072110/tcp open pop3 Dovecot pop3d
6073| vulscan: VulDB - https://vuldb.com:
6074| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
6075| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
6076| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
6077| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
6078| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
6079| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
6080| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
6081| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
6082| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
6083| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
6084| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
6085| [69835] Dovecot 2.2.0/2.2.1 denial of service
6086| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
6087| [65684] Dovecot up to 2.2.6 unknown vulnerability
6088| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
6089| [63692] Dovecot up to 2.0.15 spoofing
6090| [7062] Dovecot 2.1.10 mail-search.c denial of service
6091| [57517] Dovecot up to 2.0.12 Login directory traversal
6092| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
6093| [57515] Dovecot up to 2.0.12 Crash denial of service
6094| [54944] Dovecot up to 1.2.14 denial of service
6095| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
6096| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
6097| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
6098| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
6099| [53277] Dovecot up to 1.2.10 denial of service
6100| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
6101| [45256] Dovecot up to 1.1.5 directory traversal
6102| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
6103| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
6104| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
6105| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
6106| [40356] Dovecot 1.0.9 Cache unknown vulnerability
6107| [38222] Dovecot 1.0.2 directory traversal
6108| [36376] Dovecot up to 1.0.x directory traversal
6109| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
6110|
6111| MITRE CVE - https://cve.mitre.org:
6112| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
6113| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
6114| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
6115| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
6116| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
6117| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
6118| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
6119| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
6120| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
6121| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
6122| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
6123| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
6124| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
6125| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
6126| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
6127| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
6128| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
6129| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
6130| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
6131| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
6132| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
6133| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
6134| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
6135| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
6136| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
6137| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
6138| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
6139| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
6140| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
6141| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
6142| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
6143| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
6144| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
6145| [CVE-2002-0925] Format string vulnerability in mmsyslog function allows remote attackers to execute arbitrary code via (1) the USER command to mmpop3d for mmmail 0.0.13 and earlier, (2) the HELO command to mmsmtpd for mmmail 0.0.13 and earlier, or (3) the USER command to mmftpd 0.0.7 and earlier.
6146| [CVE-2001-0143] vpop3d program in linuxconf 1.23r and earlier allows local users to overwrite arbitrary files via a symlink attack.
6147| [CVE-2000-1197] POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes.
6148| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
6149|
6150| SecurityFocus - https://www.securityfocus.com/bid/:
6151| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
6152| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
6153| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
6154| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
6155| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
6156| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
6157| [67306] Dovecot Denial of Service Vulnerability
6158| [67219] akpop3d 'pszQuery' Remote Memory Corruption Vulnerability
6159| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
6160| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
6161| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
6162| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
6163| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
6164| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
6165| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
6166| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
6167| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
6168| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
6169| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
6170| [39838] tpop3d Remote Denial of Service Vulnerability
6171| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
6172| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
6173| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
6174| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
6175| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
6176| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
6177| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
6178| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
6179| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
6180| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
6181| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
6182| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
6183| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
6184| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
6185| [17961] Dovecot Remote Information Disclosure Vulnerability
6186| [16672] Dovecot Double Free Denial of Service Vulnerability
6187| [8495] akpop3d User Name SQL Injection Vulnerability
6188| [8473] Vpop3d Remote Denial Of Service Vulnerability
6189| [3990] ZPop3D Bad Login Logging Failure Vulnerability
6190| [2781] DynFX MailServer POP3d Denial of Service Vulnerability
6191|
6192| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6193| [86382] Dovecot POP3 Service denial of service
6194| [84396] Dovecot IMAP APPEND denial of service
6195| [80453] Dovecot mail-search.c denial of service
6196| [71354] Dovecot SSL Common Name (CN) weak security
6197| [67675] Dovecot script-login security bypass
6198| [67674] Dovecot script-login directory traversal
6199| [67589] Dovecot header name denial of service
6200| [63267] Apple Mac OS X Dovecot information disclosure
6201| [62340] Dovecot mailbox security bypass
6202| [62339] Dovecot IMAP or POP3 denial of service
6203| [62256] Dovecot mailbox security bypass
6204| [62255] Dovecot ACL entry security bypass
6205| [60639] Dovecot ACL plugin weak security
6206| [57267] Apple Mac OS X Dovecot Kerberos security bypass
6207| [56763] Dovecot header denial of service
6208| [54363] Dovecot base_dir privilege escalation
6209| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
6210| [46323] Dovecot dovecot.conf information disclosure
6211| [46227] Dovecot message parsing denial of service
6212| [45669] Dovecot ACL mailbox security bypass
6213| [45667] Dovecot ACL plugin rights security bypass
6214| [41085] Dovecot TAB characters authentication bypass
6215| [41009] Dovecot mail_extra_groups option unauthorized access
6216| [39342] Dovecot LDAP auth cache configuration security bypass
6217| [35767] Dovecot ACL plugin security bypass
6218| [34082] Dovecot mbox-storage.c directory traversal
6219| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
6220| [26578] Cyrus IMAP pop3d buffer overflow
6221| [26536] Dovecot IMAP LIST information disclosure
6222| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
6223| [24709] Dovecot APPEND command denial of service
6224| [13018] akpop3d authentication code SQL injection
6225| [7345] Slackware Linux imapd and ipop3d core dump
6226| [6269] imap, ipop2d and ipop3d buffer overflows
6227| [5923] Linuxconf vpop3d symbolic link
6228| [4918] IPOP3D, Buffer overflow attack
6229| [1560] IPOP3D, user login successful
6230| [1559] IPOP3D user login to remote host successful
6231| [1525] IPOP3D, user logout
6232| [1524] IPOP3D, user auto-logout
6233| [1523] IPOP3D, user login failure
6234| [1522] IPOP3D, brute force attack
6235| [1521] IPOP3D, user kiss of death logout
6236| [418] pop3d mktemp creates insecure temporary files
6237|
6238| Exploit-DB - https://www.exploit-db.com:
6239| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
6240| [23053] Vpop3d Remote Denial of Service Vulnerability
6241| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
6242| [11893] tPop3d 1.5.3 DoS
6243| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
6244| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
6245| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
6246| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
6247|
6248| OpenVAS (Nessus) - http://www.openvas.org:
6249| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
6250| [901025] Dovecot Version Detection
6251| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
6252| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
6253| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
6254| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
6255| [870607] RedHat Update for dovecot RHSA-2011:0600-01
6256| [870471] RedHat Update for dovecot RHSA-2011:1187-01
6257| [870153] RedHat Update for dovecot RHSA-2008:0297-02
6258| [863272] Fedora Update for dovecot FEDORA-2011-7612
6259| [863115] Fedora Update for dovecot FEDORA-2011-7258
6260| [861525] Fedora Update for dovecot FEDORA-2007-664
6261| [861394] Fedora Update for dovecot FEDORA-2007-493
6262| [861333] Fedora Update for dovecot FEDORA-2007-1485
6263| [860845] Fedora Update for dovecot FEDORA-2008-9202
6264| [860663] Fedora Update for dovecot FEDORA-2008-2475
6265| [860169] Fedora Update for dovecot FEDORA-2008-2464
6266| [860089] Fedora Update for dovecot FEDORA-2008-9232
6267| [840950] Ubuntu Update for dovecot USN-1295-1
6268| [840668] Ubuntu Update for dovecot USN-1143-1
6269| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
6270| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
6271| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
6272| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
6273| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
6274| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
6275| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
6276| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
6277| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
6278| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
6279| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
6280| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
6281| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
6282| [70259] FreeBSD Ports: dovecot
6283| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
6284| [66522] FreeBSD Ports: dovecot
6285| [65010] Ubuntu USN-838-1 (dovecot)
6286| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
6287| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
6288| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
6289| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
6290| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
6291| [62854] FreeBSD Ports: dovecot-managesieve
6292| [61916] FreeBSD Ports: dovecot
6293| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
6294| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
6295| [60528] FreeBSD Ports: dovecot
6296| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
6297| [60089] FreeBSD Ports: dovecot
6298| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
6299| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
6300|
6301| SecurityTracker - https://www.securitytracker.com:
6302| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
6303| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
6304| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
6305|
6306| OSVDB - http://www.osvdb.org:
6307| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
6308| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
6309| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
6310| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
6311| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
6312| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
6313| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
6314| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
6315| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
6316| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
6317| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
6318| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
6319| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
6320| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
6321| [66113] Dovecot Mail Root Directory Creation Permission Weakness
6322| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
6323| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
6324| [66110] Dovecot Multiple Unspecified Buffer Overflows
6325| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
6326| [64783] Dovecot E-mail Message Header Unspecified DoS
6327| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
6328| [62796] Dovecot mbox Format Email Header Handling DoS
6329| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
6330| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
6331| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
6332| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
6333| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
6334| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
6335| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
6336| [43137] Dovecot mail_extra_groups Symlink File Manipulation
6337| [42979] Dovecot passdbs Argument Injection Authentication Bypass
6338| [39876] Dovecot LDAP Auth Cache Security Bypass
6339| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
6340| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
6341| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
6342| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
6343| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
6344| [23281] Dovecot imap/pop3-login dovecot-auth DoS
6345| [23280] Dovecot Malformed APPEND Command DoS
6346| [14459] mmmail mmpop3d USER Command mmsyslog Function Format String
6347| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
6348| [5857] Linux pop3d Arbitrary Mail File Access
6349| [2471] akpop3d username SQL Injection
6350|_
6351143/tcp open imap Dovecot imapd
6352| vulscan: VulDB - https://vuldb.com:
6353| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
6354| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
6355| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
6356| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
6357| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
6358| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
6359| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
6360| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
6361| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
6362| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
6363| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
6364| [69835] Dovecot 2.2.0/2.2.1 denial of service
6365| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
6366| [65684] Dovecot up to 2.2.6 unknown vulnerability
6367| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
6368| [63692] Dovecot up to 2.0.15 spoofing
6369| [7062] Dovecot 2.1.10 mail-search.c denial of service
6370| [59792] Cyrus IMAPd 2.4.11 weak authentication
6371| [57517] Dovecot up to 2.0.12 Login directory traversal
6372| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
6373| [57515] Dovecot up to 2.0.12 Crash denial of service
6374| [54944] Dovecot up to 1.2.14 denial of service
6375| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
6376| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
6377| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
6378| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
6379| [53277] Dovecot up to 1.2.10 denial of service
6380| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
6381| [45256] Dovecot up to 1.1.5 directory traversal
6382| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
6383| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
6384| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
6385| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
6386| [40356] Dovecot 1.0.9 Cache unknown vulnerability
6387| [38222] Dovecot 1.0.2 directory traversal
6388| [37927] Ipswitch Ipswitch Collaboration Suite up to 2006.1 IMAP Service imapd32.exe memory corruption
6389| [36376] Dovecot up to 1.0.x directory traversal
6390| [35759] Atrium MERCUR IMAPD IMAP4 mcrimap4.exe memory corruption
6391| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
6392|
6393| MITRE CVE - https://cve.mitre.org:
6394| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
6395| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
6396| [CVE-2011-3481] The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message.
6397| [CVE-2011-3372] imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command.
6398| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
6399| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
6400| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
6401| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
6402| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
6403| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
6404| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
6405| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
6406| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
6407| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
6408| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
6409| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
6410| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
6411| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
6412| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
6413| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
6414| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
6415| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
6416| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
6417| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
6418| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
6419| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
6420| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
6421| [CVE-2007-5740] The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism.
6422| [CVE-2007-5018] Stack-based buffer overflow in IMAPD in Mercury/32 4.52 allows remote authenticated users to execute arbitrary code via a long argument in a SEARCH ON command. NOTE: this issue might overlap with CVE-2004-1211.
6423| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
6424| [CVE-2007-3925] Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.
6425| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
6426| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
6427| [CVE-2007-1579] Stack-based buffer overflow in Atrium MERCUR IMAPD allows remote attackers to have an unknown impact via a certain SUBSCRIBE command.
6428| [CVE-2007-1578] Multiple integer signedness errors in the NTLM implementation in Atrium MERCUR IMAPD (mcrimap4.exe) 5.00.14, with SP4, allow remote attackers to execute arbitrary code via a long NTLMSSP argument that triggers a stack-based buffer overflow.
6429| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
6430| [CVE-2006-6762] The IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to cause a denial of service via an APPEND command with a single "(" (parenthesis) in the argument.
6431| [CVE-2006-6761] Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command.
6432| [CVE-2006-6425] Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via unspecified vectors involving the APPEND command.
6433| [CVE-2006-6424] Multiple buffer overflows in Novell NetMail before 3.52e FTF2 allow remote attackers to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow
6434| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
6435| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
6436| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
6437| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
6438| [CVE-2005-2278] Stack-based buffer overflow in the IMAP daemon (imapd) in MailEnable Professional 1.54 allows remote authenticated users to execute arbitrary code via the status command with a long mailbox name.
6439| [CVE-2005-1256] Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name.
6440| [CVE-2005-1249] The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop.
6441| [CVE-2005-1015] Buffer overflow in MailEnable Imapd (MEIMAP.exe) allows remote attackers to execute arbitrary code via a long LOGIN command.
6442| [CVE-2005-0546] Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd.
6443| [CVE-2003-1322] Multiple stack-based buffer overflows in Atrium MERCUR IMAPD in MERCUR Mailserver before 4.2.15.0 allow remote attackers to execute arbitrary code via a long (1) EXAMINE, (2) DELETE, (3) SUBSCRIBE, (4) RENAME, (5) UNSUBSCRIBE, (6) LIST, (7) LSUB, (8) STATUS, (9) LOGIN, (10) CREATE, or (11) SELECT command.
6444| [CVE-2002-1782] The default configuration of University of Washington IMAP daemon (wu-imapd), when running on a system that does not allow shell access, allows a local user with a valid IMAP account to read arbitrary files as that user.
6445| [CVE-2002-1604] Multiple buffer overflows in HP Tru64 UNIX allow local and possibly remote attackers to execute arbitrary code via a long NLSPATH environment variable to (1) csh, (2) dtsession, (3) dxsysinfo, (4) imapd, (5) inc, (6) uucp, (7) uux, (8) rdist, or (9) deliver.
6446| [CVE-2002-0997] Buffer overflows in IMAP Agent (imapd) for Novell NetMail (NIMS) 3.0.3 before 3.0.3A allows remote attackers to cause a denial of service.
6447| [CVE-2002-0379] Buffer overflow in University of Washington imap server (uw-imapd) imap-2001 (imapd 2001.315) and imap-2001a (imapd 2001.315) with legacy RFC 1730 support, and imapd 2000.287 and earlier, allows remote authenticated users to execute arbitrary code via a long BODY request.
6448| [CVE-2001-0691] Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations.
6449| [CVE-2000-0284] Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.
6450| [CVE-1999-1557] Buffer overflow in the login functions in IMAP server (imapd) in Ipswitch IMail 5.0 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long user name or (2) a long password.
6451| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
6452| [CVE-1999-1224] IMAP 4.1 BETA, and possibly other versions, does not properly handle the SIGABRT (abort) signal, which allows local users to crash the server (imapd) via certain sequences of commands, which causes a core dump that may contain sensitive password information.
6453|
6454| SecurityFocus - https://www.securityfocus.com/bid/:
6455| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
6456| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
6457| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
6458| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
6459| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
6460| [84478] imapd CVE-1999-1224 Denial-Of-Service Vulnerability
6461| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
6462| [67306] Dovecot Denial of Service Vulnerability
6463| [65650] Eudora WorldMail imapd 'UID' Command Buffer Overflow Vulnerability
6464| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
6465| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
6466| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
6467| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
6468| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
6469| [51403] Eudora WorldMail imapd 'LIST' Command Buffer Overflow Vulnerability
6470| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
6471| [49949] Cyrus IMAPd NTTP Logic Error Authentication Bypass Vulnerability
6472| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
6473| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
6474| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
6475| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
6476| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
6477| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
6478| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
6479| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
6480| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
6481| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
6482| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
6483| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
6484| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
6485| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
6486| [26270] Perdition IMAPD __STR_VWRITE Remote Format String Vulnerability
6487| [25733] Mercury/32 IMAPD SEARCH Command Remote Stack Buffer Overflow Vulnerability
6488| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
6489| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
6490| [23058] Atrium Mercur IMapD NTLM Buffer Overflow Vulnerability
6491| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
6492| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
6493| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
6494| [17961] Dovecot Remote Information Disclosure Vulnerability
6495| [16672] Dovecot Double Free Denial of Service Vulnerability
6496| [15980] Qualcomm WorldMail IMAPD Buffer Overflow Vulnerability
6497| [15753] Ipswitch Collaboration Suite and IMail Server IMAPD LIST Command Denial Of Service Vulnerability
6498| [12636] Cyrus IMAPD Multiple Remote Buffer Overflow Vulnerabilities
6499| [11738] Cyrus IMAPD Multiple Remote Unspecified Vulnerabilities
6500| [11729] Cyrus IMAPD Multiple Remote Vulnerabilities
6501| [6298] Cyrus IMAPD Pre-Login Heap Corruption Vulnerability
6502| [4713] Wu-imapd Partial Mailbox Attribute Remote Buffer Overflow Vulnerability
6503| [2856] Imapd 'Local' Buffer Overflow Vulnerabilities
6504| [1110] Univ. Of Washington imapd Buffer Overflow Vulnerabilities
6505| [502] NT IMail Imapd Buffer Overflow DoS Vulnerability
6506| [130] imapd Buffer Overflow Vulnerability
6507|
6508| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6509| [86382] Dovecot POP3 Service denial of service
6510| [84396] Dovecot IMAP APPEND denial of service
6511| [80453] Dovecot mail-search.c denial of service
6512| [71354] Dovecot SSL Common Name (CN) weak security
6513| [70325] Cyrus IMAPd NNTP security bypass
6514| [67675] Dovecot script-login security bypass
6515| [67674] Dovecot script-login directory traversal
6516| [67589] Dovecot header name denial of service
6517| [63267] Apple Mac OS X Dovecot information disclosure
6518| [62340] Dovecot mailbox security bypass
6519| [62339] Dovecot IMAP or POP3 denial of service
6520| [62256] Dovecot mailbox security bypass
6521| [62255] Dovecot ACL entry security bypass
6522| [60639] Dovecot ACL plugin weak security
6523| [57267] Apple Mac OS X Dovecot Kerberos security bypass
6524| [56763] Dovecot header denial of service
6525| [54363] Dovecot base_dir privilege escalation
6526| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
6527| [47526] UW-imapd rfc822_output_char() denial of service
6528| [46323] Dovecot dovecot.conf information disclosure
6529| [46227] Dovecot message parsing denial of service
6530| [45669] Dovecot ACL mailbox security bypass
6531| [45667] Dovecot ACL plugin rights security bypass
6532| [41085] Dovecot TAB characters authentication bypass
6533| [41009] Dovecot mail_extra_groups option unauthorized access
6534| [39342] Dovecot LDAP auth cache configuration security bypass
6535| [35767] Dovecot ACL plugin security bypass
6536| [34082] Dovecot mbox-storage.c directory traversal
6537| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
6538| [26536] Dovecot IMAP LIST information disclosure
6539| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
6540| [24709] Dovecot APPEND command denial of service
6541| [22629] RHSA-2005:408 updates for cyrus-imapd not installed
6542| [19460] Cyrus IMAP imapd buffer overflow
6543| [19455] Cyrus IMAP imapd extension off-by-one buffer overflow
6544| [18492] Novell NetMail IMAPD 101_mEna buffer overflow
6545| [10803] UW IMAP (wu-imapd) authenticated user buffer overflow
6546| [9238] UW IMAP (wu-imapd) could allow a remote attacker to access arbitrary files
6547| [9055] UW IMAP (wu-imapd) partial mailbox attributes to request buffer overflow
6548| [7345] Slackware Linux imapd and ipop3d core dump
6549| [573] Imapd denial of service
6550|
6551| Exploit-DB - https://www.exploit-db.com:
6552| [30724] Perdition 1.17 IMAPD __STR_VWRITE Remote Format String Vulnerability
6553| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
6554| [22061] Cyrus IMAPD 1.4/1.5.19/2.0.12/2.0.16/2.1.9/2.1.10 Pre-Login Heap Corruption Vulnerability
6555| [21443] Wu-imapd 2000/2001 Partial Mailbox Attribute Remote Buffer Overflow Vulnerability (2)
6556| [21442] Wu-imapd 2000/2001 Partial Mailbox Attribute Remote Buffer Overflow Vulnerability (1)
6557| [19849] UoW imapd 10.234/12.264 COPY Buffer Overflow (meta)
6558| [19848] UoW imapd 10.234/12.264 LSUB Buffer Overflow (meta)
6559| [19847] UoW imapd 10.234/12.264 Buffer Overflow Vulnerabilities
6560| [19377] Ipswitch IMail 5.0 Imapd Buffer Overflow DoS Vulnerability
6561| [19107] Netscape Messaging Server 3.55,University of Washington imapd 10.234 Buffer Overflow Vulnerability
6562| [18354] WorldMail imapd 3.0 SEH overflow (egg hunter)
6563| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
6564| [16485] MailEnable IMAPD 1.54 - STATUS Request Buffer Overflow
6565| [16482] MDaemon 9.6.4 IMAPD FETCH Buffer Overflow
6566| [16480] MailEnable IMAPD W3C Logging Buffer Overflow
6567| [16477] Mdaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow
6568| [16475] MailEnable IMAPD (2.35) Login Request Buffer Overflow
6569| [16474] Qualcomm WorldMail 3.0 IMAPD LIST Buffer Overflow
6570| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
6571| [4429] Mercury/32 4.52 IMAPD SEARCH command Post-Auth Overflow Exploit
6572| [3627] IPSwitch IMail Server <= 8.20 IMAPD Remote Buffer Overflow Exploit
6573| [3527] Mercur IMAPD 5.00.14 Remote Denial of Service Exploit (win32)
6574| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
6575| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
6576| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
6577| [1380] Eudora Qualcomm WorldMail 3.0 (IMAPd) Remote Overflow Exploit
6578| [1332] MailEnable 1.54 Pro Universal IMAPD W3C Logging BoF Exploit
6579| [1327] FTGate4 Groupware Mail Server 4.1 (imapd) Remote Buffer Overflow PoC
6580| [1151] MDaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow Exploit
6581| [1124] IPSwitch IMail Server <= 8.15 IMAPD Remote Root Exploit
6582| [915] MailEnable Enterprise 1.x Imapd Remote Exploit
6583| [903] Cyrus imapd 2.2.4 - 2.2.8 (imapmagicplus) Remote Exploit
6584| [340] Linux imapd Remote Overflow File Retrieve Exploit
6585|
6586| OpenVAS (Nessus) - http://www.openvas.org:
6587| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
6588| [901025] Dovecot Version Detection
6589| [881425] CentOS Update for cyrus-imapd CESA-2011:1508 centos5 x86_64
6590| [881403] CentOS Update for cyrus-imapd CESA-2011:0859 centos5 x86_64
6591| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
6592| [881397] CentOS Update for cyrus-imapd CESA-2011:1317 centos4 x86_64
6593| [881370] CentOS Update for cyrus-imapd CESA-2011:1508 centos4 x86_64
6594| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
6595| [881318] CentOS Update for cyrus-imapd CESA-2011:0859 centos4 x86_64
6596| [881255] CentOS Update for cyrus-imapd CESA-2011:1317 centos5 x86_64
6597| [881050] CentOS Update for cyrus-imapd CESA-2011:1508 centos5 i386
6598| [881049] CentOS Update for cyrus-imapd CESA-2011:1508 centos4 i386
6599| [881007] CentOS Update for cyrus-imapd CESA-2011:1317 centos5 i386
6600| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
6601| [880978] CentOS Update for cyrus-imapd CESA-2011:1317 centos4 i386
6602| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
6603| [880958] CentOS Update for cyrus-imapd CESA-2011:0859 centos4 i386
6604| [880905] CentOS Update for cyrus-imapd CESA-2009:1459 centos4 i386
6605| [880864] CentOS Update for cyrus-imapd CESA-2009:1459 centos5 i386
6606| [880826] CentOS Update for cyrus-imapd CESA-2009:1116 centos5 i386
6607| [880536] CentOS Update for cyrus-imapd CESA-2011:0859 centos5 i386
6608| [870607] RedHat Update for dovecot RHSA-2011:0600-01
6609| [870520] RedHat Update for cyrus-imapd RHSA-2011:1508-01
6610| [870489] RedHat Update for cyrus-imapd RHSA-2011:1317-01
6611| [870471] RedHat Update for dovecot RHSA-2011:1187-01
6612| [870443] RedHat Update for cyrus-imapd RHSA-2011:0859-01
6613| [870153] RedHat Update for dovecot RHSA-2008:0297-02
6614| [864075] Fedora Update for cyrus-imapd FEDORA-2011-13832
6615| [863585] Fedora Update for cyrus-imapd FEDORA-2011-13869
6616| [863579] Fedora Update for cyrus-imapd FEDORA-2011-13860
6617| [863281] Fedora Update for cyrus-imapd FEDORA-2011-7193
6618| [863273] Fedora Update for cyrus-imapd FEDORA-2011-7217
6619| [863272] Fedora Update for dovecot FEDORA-2011-7612
6620| [863115] Fedora Update for dovecot FEDORA-2011-7258
6621| [861525] Fedora Update for dovecot FEDORA-2007-664
6622| [861394] Fedora Update for dovecot FEDORA-2007-493
6623| [861333] Fedora Update for dovecot FEDORA-2007-1485
6624| [860845] Fedora Update for dovecot FEDORA-2008-9202
6625| [860663] Fedora Update for dovecot FEDORA-2008-2475
6626| [860169] Fedora Update for dovecot FEDORA-2008-2464
6627| [860089] Fedora Update for dovecot FEDORA-2008-9232
6628| [840950] Ubuntu Update for dovecot USN-1295-1
6629| [840668] Ubuntu Update for dovecot USN-1143-1
6630| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
6631| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
6632| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
6633| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
6634| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
6635| [831590] Mandriva Update for cyrus-imapd MDVSA-2012:037 (cyrus-imapd)
6636| [831468] Mandriva Update for cyrus-imapd MDVSA-2011:149 (cyrus-imapd)
6637| [831410] Mandriva Update for cyrus-imapd MDVSA-2011:100 (cyrus-imapd)
6638| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
6639| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
6640| [831207] Mandriva Update for cyrus-imapd MDVA-2010:208 (cyrus-imapd)
6641| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
6642| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
6643| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
6644| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
6645| [800149] UW-imapd tmail and dmail BOF Vulnerabilities (Linux)
6646| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
6647| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
6648| [70696] Debian Security Advisory DSA 2377-1 (cyrus-imapd-2.2)
6649| [70407] Debian Security Advisory DSA 2318-1 (cyrus-imapd-2.2)
6650| [70259] FreeBSD Ports: dovecot
6651| [69965] Debian Security Advisory DSA 2258-1 (kolab-cyrus-imapd)
6652| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
6653| [69740] Debian Security Advisory DSA 2242-1 (cyrus-imapd-2.2)
6654| [66522] FreeBSD Ports: dovecot
6655| [66416] Mandriva Security Advisory MDVSA-2009:229-1 (cyrus-imapd)
6656| [66233] SLES10: Security update for Cyrus IMAPD
6657| [66226] SLES11: Security update for Cyrus IMAPD
6658| [66222] SLES9: Security update for Cyrus IMAPD
6659| [65938] SLES10: Security update for Cyrus IMAPD
6660| [65723] SLES11: Security update for Cyrus IMAPD
6661| [65523] SLES9: Security update for Cyrus IMAPD
6662| [65479] SLES9: Security update for cyrus-imapd
6663| [65094] SLES9: Security update for cyrus-imapd
6664| [65010] Ubuntu USN-838-1 (dovecot)
6665| [64989] CentOS Security Advisory CESA-2009:1459 (cyrus-imapd)
6666| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
6667| [64977] Debian Security Advisory DSA 1893-1 (cyrus-imapd-2.2 kolab-cyrus-imapd)
6668| [64965] Fedora Core 11 FEDORA-2009-9901 (cyrus-imapd)
6669| [64963] Fedora Core 10 FEDORA-2009-9869 (cyrus-imapd)
6670| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
6671| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
6672| [64898] FreeBSD Ports: cyrus-imapd
6673| [64864] Debian Security Advisory DSA 1881-1 (cyrus-imapd-2.2)
6674| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
6675| [64847] Fedora Core 10 FEDORA-2009-9428 (cyrus-imapd)
6676| [64846] Fedora Core 11 FEDORA-2009-9417 (cyrus-imapd)
6677| [64838] Mandrake Security Advisory MDVSA-2009:229 (cyrus-imapd)
6678| [64271] CentOS Security Advisory CESA-2009:1116 (cyrus-imapd)
6679| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
6680| [62854] FreeBSD Ports: dovecot-managesieve
6681| [61916] FreeBSD Ports: dovecot
6682| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
6683| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
6684| [60528] FreeBSD Ports: dovecot
6685| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
6686| [60089] FreeBSD Ports: dovecot
6687| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
6688| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
6689| [55807] Slackware Advisory SSA:2005-310-06 imapd
6690| [54861] Gentoo Security Advisory GLSA 200502-29 (cyrus-imapd)
6691| [54755] Gentoo Security Advisory GLSA 200411-34 (cyrus-imapd)
6692| [53739] Debian Security Advisory DSA 215-1 (cyrus-imapd)
6693| [53288] Debian Security Advisory DSA 597-1 (cyrus-imapd)
6694| [52297] FreeBSD Ports: cyrus-imapd
6695| [52296] FreeBSD Ports: cyrus-imapd
6696| [52295] FreeBSD Ports: cyrus-imapd
6697| [52294] FreeBSD Ports: cyrus-imapd
6698| [52172] FreeBSD Ports: cyrus-imapd
6699|
6700| SecurityTracker - https://www.securitytracker.com:
6701| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
6702| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
6703| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
6704| [1013278] Cyrus IMAPd Buffer Overflows in Annotate Extension, Cached Header, and Fetchnews May Let Remote Users Execute Arbitrary Code
6705|
6706| OSVDB - http://www.osvdb.org:
6707| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
6708| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
6709| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
6710| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
6711| [78304] Eudora WorldMail imapd SEH LIST Command Parsing Remote Overflow
6712| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
6713| [75445] Cyrus IMAP Server imapd index.c index_get_ids Function References Header NULL Dereference Remote DoS
6714| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
6715| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
6716| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
6717| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
6718| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
6719| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
6720| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
6721| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
6722| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
6723| [66113] Dovecot Mail Root Directory Creation Permission Weakness
6724| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
6725| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
6726| [66110] Dovecot Multiple Unspecified Buffer Overflows
6727| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
6728| [64783] Dovecot E-mail Message Header Unspecified DoS
6729| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
6730| [62796] Dovecot mbox Format Email Header Handling DoS
6731| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
6732| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
6733| [57843] Cyrus IMAP Server (cyrus-imapd) SIEVE Script Component (sieve/script.c) Crafted Script Handling Overflow
6734| [57681] UoW imap Server (uw-imapd) Arbitrary Remote File Access
6735| [52906] UW-imapd c-client Initial Request Remote Format String
6736| [52905] UW-imapd c-client Library RFC822BUFFER Routines rfc822_output_char Function Off-by-one
6737| [52456] UW-imapd on Debian Linux LOGIN Command Remote DoS
6738| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
6739| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
6740| [49485] UW-imapd dmail Utility Mailbox Name Handling Overflow
6741| [49484] UW-imapd tmail Utility Mailbox Name Handling Overflow
6742| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
6743| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
6744| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
6745| [43137] Dovecot mail_extra_groups Symlink File Manipulation
6746| [42979] Dovecot passdbs Argument Injection Authentication Bypass
6747| [42004] Perdition Mail Retrieval Proxy IMAPD IMAP Tag Remote Format String Arbitrary Code Execution
6748| [39876] Dovecot LDAP Auth Cache Security Bypass
6749| [39670] Mercury Mail Transport System IMAPD SEARCH Command Remote Overflow
6750| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
6751| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
6752| [31362] Novell NetMail IMAP Daemon (IMAPD) APPEND Command Remote Overflow
6753| [31361] Novell NetMail IMAP Daemon (IMAPD) APPEND Command DoS
6754| [31360] Novell NetMail IMAP Daemon (IMAPD) SUBSCRIBE Command Remote Overflow
6755| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
6756| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
6757| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
6758| [23281] Dovecot imap/pop3-login dovecot-auth DoS
6759| [23280] Dovecot Malformed APPEND Command DoS
6760| [18179] HP Tru64 UNIX imapd NLSPATH Environment Variable Local Overflow
6761| [13242] UW-imapd CRAM-MD5 Authentication Bypass
6762| [12385] Novell NetMail IMAPD 101_mEna Script Remote Overflow
6763| [12042] UoW imapd Multiple Unspecified Overflows
6764| [12037] UoW imapd (UW-IMAP) Multiple Command Remote Overflows
6765| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
6766| [911] UoW imapd AUTHENTICATE Command Remote Overflow
6767| [790] UoW imap Server (uw-imapd) BODY Request Remote Overflow
6768| [519] UoW imapd SIGABRT Signal Forced Crash Information Disclosure
6769|_
6770465/tcp open ssl/smtp Exim smtpd 4.92
6771| vulscan: VulDB - https://vuldb.com:
6772| [141327] Exim up to 4.92.1 Backslash privilege escalation
6773| [138827] Exim up to 4.92 Expansion Code Execution
6774| [135932] Exim up to 4.92 privilege escalation
6775| [113048] Exim up to 4.90 SMTP Listener Message memory corruption
6776|
6777| MITRE CVE - https://cve.mitre.org:
6778| [CVE-2012-5671] Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.
6779| [CVE-2012-0478] The texImage2D implementation in the WebGL subsystem in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 does not properly restrict JSVAL_TO_OBJECT casts, which might allow remote attackers to execute arbitrary code via a crafted web page.
6780| [CVE-2011-1764] Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character.
6781| [CVE-2011-1407] The DKIM implementation in Exim 4.7x before 4.76 permits matching for DKIM identities to apply to lookup items, instead of only strings, which allows remote attackers to execute arbitrary code or access a filesystem via a crafted identity.
6782| [CVE-2011-0017] The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.
6783| [CVE-2010-4345] Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
6784| [CVE-2010-4344] Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.
6785| [CVE-2010-2024] transports/appendfile.c in Exim before 4.72, when MBX locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/.
6786| [CVE-2010-2023] transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user's file.
6787| [CVE-2006-1251] Argument injection vulnerability in greylistclean.cron in sa-exim 4.2 allows remote attackers to delete arbitrary files via an email with a To field that contains a filename separated by whitespace, which is not quoted when greylistclean.cron provides the argument to the rm command.
6788| [CVE-2005-0022] Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.
6789| [CVE-2005-0021] Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function.
6790| [CVE-2004-0400] Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.
6791| [CVE-2004-0399] Stack-based buffer overflow in Exim 3.35, and other versions before 4, when the sender_verify option is true, allows remote attackers to cause a denial of service and possibly execute arbitrary code during sender verification.
6792| [CVE-2003-0743] Heap-based buffer overflow in smtp_in.c for Exim 3 (exim3) before 3.36 and Exim 4 (exim4) before 4.21 may allow remote attackers to execute arbitrary code via an invalid (1) HELO or (2) EHLO argument with a large number of spaces followed by a NULL character and a newline, which is not properly trimmed before the "(no argument given)" string is appended to the buffer.
6793| [CVE-2002-1381] Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
6794|
6795| SecurityFocus - https://www.securityfocus.com/bid/:
6796| [103049] Exim 'base64d()' Function Buffer Overflow Vulnerability
6797| [99252] Exim CVE-2017-1000369 Local Privilege Escalation Vulnerability
6798| [94947] Exim CVE-2016-9963 Unspecified Information Disclosure Vulnerability
6799| [84132] Exim CVE-2016-1531 Local Privilege Escalation Vulnerability
6800| [68857] Exim CVE-2014-2972 Local Privilege Escalation Vulnerability
6801| [67695] Exim 'dmarc.c' Remote Code Execution Vulnerability
6802| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
6803| [56285] Exim DKIM DNS Decoding CVE-2012-5671 Remote Buffer Overflow Vulnerability
6804| [47836] Exim DKIM CVE-2011-1407 Remote Code Execution Vulnerability
6805| [47736] Exim 'dkim_exim_verify_finish()' Remote Format String Vulnerability
6806| [46065] Exim 'log.c' Local Privilege Escalation Vulnerability
6807| [45341] Exim ALT_CONFIG_ROOT_ONLY 'exim' User Local Privilege Escalation Vulnerability
6808| [45308] Exim Crafted Header Remote Code Execution Vulnerability
6809| [40454] Exim MBX Locking Insecure Temporary File Creation Vulnerability
6810| [40451] Exim Sticky Mail Directory Local Privilege Escalation Vulnerability
6811| [36181] ikiwiki 'teximg' Plugin Insecure TeX Commands Information Disclosure Vulnerability
6812| [23977] Exim SpamAssassin Reply Remote Buffer Overflow Vulnerability
6813| [17110] sa-exim Unauthorized File Access Vulnerability
6814| [12268] Exim IP Address Command Line Argument Local Buffer Overflow Vulnerability
6815| [12188] Exim SPA Authentication Remote Buffer Overflow Vulnerability
6816| [12185] Exim Illegal IPv6 Address Buffer Overflow Vulnerability
6817| [10291] Exim Header Syntax Checking Remote Stack Buffer Overrun Vulnerability
6818| [10290] Exim Sender Verification Remote Stack Buffer Overrun Vulnerability
6819| [8518] Exim EHLO/HELO Remote Heap Corruption Vulnerability
6820| [6314] Exim Internet Mailer Format String Vulnerability
6821| [4096] Exim Configuration File Argument Command Line Buffer Overflow Vulnerability
6822| [3728] Exim Pipe Hostname Arbitrary Command Execution Vulnerability
6823| [2828] Exim Format String Vulnerability
6824| [1859] Exim Buffer Overflow Vulnerability
6825|
6826| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6827| [84758] Exim sender_address parameter command execution
6828| [84015] Exim command execution
6829| [80186] Mozilla Firefox, Thunderbird, and SeaMonkey copyTexImage2D code execution
6830| [80184] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D calls code execution
6831| [79615] Exim dkim_exim_query_dns_txt() buffer overflow
6832| [75155] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D denial of service
6833| [67455] Exim DKIM processing code execution
6834| [67299] Exim dkim_exim_verify_finish() format string
6835| [65028] Exim open_log privilege escalation
6836| [63967] Exim config file privilege escalation
6837| [63960] Exim header buffer overflow
6838| [59043] Exim mail directory privilege escalation
6839| [59042] Exim MBX symlink
6840| [52922] ikiwiki teximg plugin information disclosure
6841| [34265] Exim spamd buffer overflow
6842| [25286] Sa-exim greylistclean.cron file deletion
6843| [22687] RHSA-2005:025 updates for exim not installed
6844| [18901] Exim dns_build_reverse buffer overflow
6845| [18764] Exim spa_base64_to_bits function buffer overflow
6846| [18763] Exim host_aton buffer overflow
6847| [16079] Exim require_verify buffer overflow
6848| [16077] Exim header_check_syntax buffer overflow
6849| [16075] Exim sender_verify buffer overflow
6850| [13067] Exim HELO or EHLO command heap overflow
6851| [10761] Exim daemon.c format string
6852| [8194] Exim configuration file -c command-line argument buffer overflow
6853| [7738] Exim allows attacker to hide commands in localhost names using pipes
6854| [6671] Exim "
6855| [1893] Exim MTA allows local users to gain root privileges
6856|
6857| Exploit-DB - https://www.exploit-db.com:
6858| [16925] Exim4 <= 4.69 - string_format Function Heap Buffer Overflow
6859| [15725] Exim 4.63 Remote Root Exploit
6860| [1009] Exim <= 4.41 dns_build_reverse Local Exploit
6861| [812] Exim <= 4.43 auth_spa_server() Remote PoC Exploit
6862| [796] Exim <= 4.42 Local Root Exploit
6863| [756] Exim <= 4.41 dns_build_reverse Local Exploit PoC
6864|
6865| OpenVAS (Nessus) - http://www.openvas.org:
6866| [100663] Exim < 4.72 RC2 Multiple Vulnerabilities
6867|
6868| SecurityTracker - https://www.securitytracker.com:
6869| [1025539] Exim DKIM Processing Flaw Lets Remote Users Execute Arbitrary Code
6870| [1025504] Exim DKIM Signature Format String Flaw Lets Remote Users Execute Arbitrary Code
6871| [1024859] Exim Configuration File Capability Lets Local Users Gain Elevated Privileges
6872| [1024858] Exim Buffer Overfow in string_format() Lets Remote Users Execute Arbitrary Code
6873| [1012904] Exim Buffer Overflow in dns_build_reverse() Lets Local Users Obtain Elevated Privileges
6874| [1012771] Exim Buffer Overflows in host_aton() and spa_base64_to_bits() May Let Local Users Gain Elevated Privileges
6875| [1010081] Exim Buffer Overflows in 'accept.c' and 'verify.c' Let Remote Users Execute Arbitrary Code
6876| [1007609] Exim Heap Overflow in 'smtp_in.c' May Allow Remote Arbitrary Code Execution
6877| [1005756] Exim Mail Server Format String Bug Lets Local Exim Administrators Execute Arbitrary Code With Root Privileges
6878| [1003547] Potential Bug in Exim Mail Server May Let Local Users Execute Code With Root Privileges
6879| [1003014] Exim Mail Server Pipe Address Validation Error May Let Remote Users Execute Arbitrary Code With Root Privileges in a Certain Configuration
6880| [1001694] Exim Mail Server May Allow Remote Users to Execute Arbitrary Code with Root-Level Privileges on the Server
6881|
6882| OSVDB - http://www.osvdb.org:
6883| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
6884| [87599] Mozilla Multiple Product copyTexImage2D Call Image Dimension Handling Memory Corruption
6885| [87581] Mozilla Multiple Product texImage2D Call Handling Memory Corruption
6886| [86616] Exim src/dkim.c dkim_exim_query_dns_txt() Function DNS Record Parsing Remote Overflow
6887| [81523] Mozilla Multiple Product WebGL texImage2D() Function JSVAL_TO_OBJECT Remote Code Execution
6888| [72642] Exim DKIM Identity Lookup Item Remote Code Execution
6889| [72156] Exim src/dkim.c dkim_exim_verify_finish() Function DKIM-Signature Header Format String
6890| [70696] Exim log.c open_log() Function Local Privilege Escalation
6891| [69860] Exim exim User Account Configuration File Directive Local Privilege Escalation
6892| [69685] Exim string_format Function Remote Overflow
6893| [65159] Exim transports/appendfile.c MBX Locking Race Condition Permission Modification
6894| [65158] Exim transports/appendfile.c Hardlink Handling Arbitrary File Overwrite
6895| [57575] teximg Plugin for ikiwiki TEX Command Arbitrary File Local Disclosure
6896| [23849] sa-exim greylistclean.cron Arbitrary File Deletion
6897| [13073] Oracle Database Server Advanced Queuing Component dbms_transform_eximp Unspecified Security Issue
6898| [12946] Exim -bh Command Line Option dns_build_reverse Function Local Overflow
6899| [12727] Exim SPA Authentication spa_base64_to_bits Function Remote Overflow
6900| [12726] Exim -be Command Line Option host_aton Function Local Overflow
6901| [10877] Exim smtp_in.c HELO/EHLO Remote Overflow
6902| [10360] Exim daemon.c pid_file_path Variable Manipulation Arbitrary Command Execution
6903| [10032] libXpm CreateXImage Function Integer Overflow
6904| [7160] Exim .forward :include: Option Privilege Escalation
6905| [6479] Vexim COOKIE Authentication Credential Disclosure
6906| [6478] Vexim Multiple Parameter SQL Injection
6907| [5930] Exim Parenthesis File Name Filter Bypass
6908| [5897] Exim header_syntax Function Remote Overflow
6909| [5896] Exim sender_verify Function Remote Overflow
6910| [5530] Exim Localhost Name Arbitrary Command Execution
6911| [5330] Exim Configuration File Variable Overflow
6912| [1855] Exim Batched SMTP Mail Header Format String
6913|_
6914587/tcp open smtp Exim smtpd 4.92
6915| vulscan: VulDB - https://vuldb.com:
6916| [141327] Exim up to 4.92.1 Backslash privilege escalation
6917| [138827] Exim up to 4.92 Expansion Code Execution
6918| [135932] Exim up to 4.92 privilege escalation
6919| [113048] Exim up to 4.90 SMTP Listener Message memory corruption
6920|
6921| MITRE CVE - https://cve.mitre.org:
6922| [CVE-2012-5671] Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.
6923| [CVE-2012-0478] The texImage2D implementation in the WebGL subsystem in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 does not properly restrict JSVAL_TO_OBJECT casts, which might allow remote attackers to execute arbitrary code via a crafted web page.
6924| [CVE-2011-1764] Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character.
6925| [CVE-2011-1407] The DKIM implementation in Exim 4.7x before 4.76 permits matching for DKIM identities to apply to lookup items, instead of only strings, which allows remote attackers to execute arbitrary code or access a filesystem via a crafted identity.
6926| [CVE-2011-0017] The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.
6927| [CVE-2010-4345] Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
6928| [CVE-2010-4344] Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.
6929| [CVE-2010-2024] transports/appendfile.c in Exim before 4.72, when MBX locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/.
6930| [CVE-2010-2023] transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user's file.
6931| [CVE-2006-1251] Argument injection vulnerability in greylistclean.cron in sa-exim 4.2 allows remote attackers to delete arbitrary files via an email with a To field that contains a filename separated by whitespace, which is not quoted when greylistclean.cron provides the argument to the rm command.
6932| [CVE-2005-0022] Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.
6933| [CVE-2005-0021] Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function.
6934| [CVE-2004-0400] Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.
6935| [CVE-2004-0399] Stack-based buffer overflow in Exim 3.35, and other versions before 4, when the sender_verify option is true, allows remote attackers to cause a denial of service and possibly execute arbitrary code during sender verification.
6936| [CVE-2003-0743] Heap-based buffer overflow in smtp_in.c for Exim 3 (exim3) before 3.36 and Exim 4 (exim4) before 4.21 may allow remote attackers to execute arbitrary code via an invalid (1) HELO or (2) EHLO argument with a large number of spaces followed by a NULL character and a newline, which is not properly trimmed before the "(no argument given)" string is appended to the buffer.
6937| [CVE-2002-1381] Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
6938|
6939| SecurityFocus - https://www.securityfocus.com/bid/:
6940| [103049] Exim 'base64d()' Function Buffer Overflow Vulnerability
6941| [99252] Exim CVE-2017-1000369 Local Privilege Escalation Vulnerability
6942| [94947] Exim CVE-2016-9963 Unspecified Information Disclosure Vulnerability
6943| [84132] Exim CVE-2016-1531 Local Privilege Escalation Vulnerability
6944| [68857] Exim CVE-2014-2972 Local Privilege Escalation Vulnerability
6945| [67695] Exim 'dmarc.c' Remote Code Execution Vulnerability
6946| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
6947| [56285] Exim DKIM DNS Decoding CVE-2012-5671 Remote Buffer Overflow Vulnerability
6948| [47836] Exim DKIM CVE-2011-1407 Remote Code Execution Vulnerability
6949| [47736] Exim 'dkim_exim_verify_finish()' Remote Format String Vulnerability
6950| [46065] Exim 'log.c' Local Privilege Escalation Vulnerability
6951| [45341] Exim ALT_CONFIG_ROOT_ONLY 'exim' User Local Privilege Escalation Vulnerability
6952| [45308] Exim Crafted Header Remote Code Execution Vulnerability
6953| [40454] Exim MBX Locking Insecure Temporary File Creation Vulnerability
6954| [40451] Exim Sticky Mail Directory Local Privilege Escalation Vulnerability
6955| [36181] ikiwiki 'teximg' Plugin Insecure TeX Commands Information Disclosure Vulnerability
6956| [23977] Exim SpamAssassin Reply Remote Buffer Overflow Vulnerability
6957| [17110] sa-exim Unauthorized File Access Vulnerability
6958| [12268] Exim IP Address Command Line Argument Local Buffer Overflow Vulnerability
6959| [12188] Exim SPA Authentication Remote Buffer Overflow Vulnerability
6960| [12185] Exim Illegal IPv6 Address Buffer Overflow Vulnerability
6961| [10291] Exim Header Syntax Checking Remote Stack Buffer Overrun Vulnerability
6962| [10290] Exim Sender Verification Remote Stack Buffer Overrun Vulnerability
6963| [8518] Exim EHLO/HELO Remote Heap Corruption Vulnerability
6964| [6314] Exim Internet Mailer Format String Vulnerability
6965| [4096] Exim Configuration File Argument Command Line Buffer Overflow Vulnerability
6966| [3728] Exim Pipe Hostname Arbitrary Command Execution Vulnerability
6967| [2828] Exim Format String Vulnerability
6968| [1859] Exim Buffer Overflow Vulnerability
6969|
6970| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6971| [84758] Exim sender_address parameter command execution
6972| [84015] Exim command execution
6973| [80186] Mozilla Firefox, Thunderbird, and SeaMonkey copyTexImage2D code execution
6974| [80184] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D calls code execution
6975| [79615] Exim dkim_exim_query_dns_txt() buffer overflow
6976| [75155] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D denial of service
6977| [67455] Exim DKIM processing code execution
6978| [67299] Exim dkim_exim_verify_finish() format string
6979| [65028] Exim open_log privilege escalation
6980| [63967] Exim config file privilege escalation
6981| [63960] Exim header buffer overflow
6982| [59043] Exim mail directory privilege escalation
6983| [59042] Exim MBX symlink
6984| [52922] ikiwiki teximg plugin information disclosure
6985| [34265] Exim spamd buffer overflow
6986| [25286] Sa-exim greylistclean.cron file deletion
6987| [22687] RHSA-2005:025 updates for exim not installed
6988| [18901] Exim dns_build_reverse buffer overflow
6989| [18764] Exim spa_base64_to_bits function buffer overflow
6990| [18763] Exim host_aton buffer overflow
6991| [16079] Exim require_verify buffer overflow
6992| [16077] Exim header_check_syntax buffer overflow
6993| [16075] Exim sender_verify buffer overflow
6994| [13067] Exim HELO or EHLO command heap overflow
6995| [10761] Exim daemon.c format string
6996| [8194] Exim configuration file -c command-line argument buffer overflow
6997| [7738] Exim allows attacker to hide commands in localhost names using pipes
6998| [6671] Exim "
6999| [1893] Exim MTA allows local users to gain root privileges
7000|
7001| Exploit-DB - https://www.exploit-db.com:
7002| [16925] Exim4 <= 4.69 - string_format Function Heap Buffer Overflow
7003| [15725] Exim 4.63 Remote Root Exploit
7004| [1009] Exim <= 4.41 dns_build_reverse Local Exploit
7005| [812] Exim <= 4.43 auth_spa_server() Remote PoC Exploit
7006| [796] Exim <= 4.42 Local Root Exploit
7007| [756] Exim <= 4.41 dns_build_reverse Local Exploit PoC
7008|
7009| OpenVAS (Nessus) - http://www.openvas.org:
7010| [100663] Exim < 4.72 RC2 Multiple Vulnerabilities
7011|
7012| SecurityTracker - https://www.securitytracker.com:
7013| [1025539] Exim DKIM Processing Flaw Lets Remote Users Execute Arbitrary Code
7014| [1025504] Exim DKIM Signature Format String Flaw Lets Remote Users Execute Arbitrary Code
7015| [1024859] Exim Configuration File Capability Lets Local Users Gain Elevated Privileges
7016| [1024858] Exim Buffer Overfow in string_format() Lets Remote Users Execute Arbitrary Code
7017| [1012904] Exim Buffer Overflow in dns_build_reverse() Lets Local Users Obtain Elevated Privileges
7018| [1012771] Exim Buffer Overflows in host_aton() and spa_base64_to_bits() May Let Local Users Gain Elevated Privileges
7019| [1010081] Exim Buffer Overflows in 'accept.c' and 'verify.c' Let Remote Users Execute Arbitrary Code
7020| [1007609] Exim Heap Overflow in 'smtp_in.c' May Allow Remote Arbitrary Code Execution
7021| [1005756] Exim Mail Server Format String Bug Lets Local Exim Administrators Execute Arbitrary Code With Root Privileges
7022| [1003547] Potential Bug in Exim Mail Server May Let Local Users Execute Code With Root Privileges
7023| [1003014] Exim Mail Server Pipe Address Validation Error May Let Remote Users Execute Arbitrary Code With Root Privileges in a Certain Configuration
7024| [1001694] Exim Mail Server May Allow Remote Users to Execute Arbitrary Code with Root-Level Privileges on the Server
7025|
7026| OSVDB - http://www.osvdb.org:
7027| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
7028| [87599] Mozilla Multiple Product copyTexImage2D Call Image Dimension Handling Memory Corruption
7029| [87581] Mozilla Multiple Product texImage2D Call Handling Memory Corruption
7030| [86616] Exim src/dkim.c dkim_exim_query_dns_txt() Function DNS Record Parsing Remote Overflow
7031| [81523] Mozilla Multiple Product WebGL texImage2D() Function JSVAL_TO_OBJECT Remote Code Execution
7032| [72642] Exim DKIM Identity Lookup Item Remote Code Execution
7033| [72156] Exim src/dkim.c dkim_exim_verify_finish() Function DKIM-Signature Header Format String
7034| [70696] Exim log.c open_log() Function Local Privilege Escalation
7035| [69860] Exim exim User Account Configuration File Directive Local Privilege Escalation
7036| [69685] Exim string_format Function Remote Overflow
7037| [65159] Exim transports/appendfile.c MBX Locking Race Condition Permission Modification
7038| [65158] Exim transports/appendfile.c Hardlink Handling Arbitrary File Overwrite
7039| [57575] teximg Plugin for ikiwiki TEX Command Arbitrary File Local Disclosure
7040| [23849] sa-exim greylistclean.cron Arbitrary File Deletion
7041| [13073] Oracle Database Server Advanced Queuing Component dbms_transform_eximp Unspecified Security Issue
7042| [12946] Exim -bh Command Line Option dns_build_reverse Function Local Overflow
7043| [12727] Exim SPA Authentication spa_base64_to_bits Function Remote Overflow
7044| [12726] Exim -be Command Line Option host_aton Function Local Overflow
7045| [10877] Exim smtp_in.c HELO/EHLO Remote Overflow
7046| [10360] Exim daemon.c pid_file_path Variable Manipulation Arbitrary Command Execution
7047| [10032] libXpm CreateXImage Function Integer Overflow
7048| [7160] Exim .forward :include: Option Privilege Escalation
7049| [6479] Vexim COOKIE Authentication Credential Disclosure
7050| [6478] Vexim Multiple Parameter SQL Injection
7051| [5930] Exim Parenthesis File Name Filter Bypass
7052| [5897] Exim header_syntax Function Remote Overflow
7053| [5896] Exim sender_verify Function Remote Overflow
7054| [5530] Exim Localhost Name Arbitrary Command Execution
7055| [5330] Exim Configuration File Variable Overflow
7056| [1855] Exim Batched SMTP Mail Header Format String
7057|_
7058993/tcp open ssl/imap Dovecot imapd
7059| vulscan: VulDB - https://vuldb.com:
7060| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
7061| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
7062| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
7063| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
7064| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
7065| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
7066| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
7067| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
7068| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
7069| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
7070| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
7071| [69835] Dovecot 2.2.0/2.2.1 denial of service
7072| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
7073| [65684] Dovecot up to 2.2.6 unknown vulnerability
7074| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
7075| [63692] Dovecot up to 2.0.15 spoofing
7076| [7062] Dovecot 2.1.10 mail-search.c denial of service
7077| [59792] Cyrus IMAPd 2.4.11 weak authentication
7078| [57517] Dovecot up to 2.0.12 Login directory traversal
7079| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
7080| [57515] Dovecot up to 2.0.12 Crash denial of service
7081| [54944] Dovecot up to 1.2.14 denial of service
7082| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
7083| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
7084| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
7085| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
7086| [53277] Dovecot up to 1.2.10 denial of service
7087| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
7088| [45256] Dovecot up to 1.1.5 directory traversal
7089| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
7090| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
7091| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
7092| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
7093| [40356] Dovecot 1.0.9 Cache unknown vulnerability
7094| [38222] Dovecot 1.0.2 directory traversal
7095| [37927] Ipswitch Ipswitch Collaboration Suite up to 2006.1 IMAP Service imapd32.exe memory corruption
7096| [36376] Dovecot up to 1.0.x directory traversal
7097| [35759] Atrium MERCUR IMAPD IMAP4 mcrimap4.exe memory corruption
7098| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
7099|
7100| MITRE CVE - https://cve.mitre.org:
7101| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
7102| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
7103| [CVE-2011-3481] The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message.
7104| [CVE-2011-3372] imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command.
7105| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
7106| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
7107| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
7108| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
7109| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
7110| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
7111| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
7112| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
7113| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
7114| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
7115| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
7116| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
7117| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
7118| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
7119| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
7120| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
7121| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
7122| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
7123| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
7124| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
7125| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
7126| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
7127| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
7128| [CVE-2007-5740] The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism.
7129| [CVE-2007-5018] Stack-based buffer overflow in IMAPD in Mercury/32 4.52 allows remote authenticated users to execute arbitrary code via a long argument in a SEARCH ON command. NOTE: this issue might overlap with CVE-2004-1211.
7130| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
7131| [CVE-2007-3925] Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.
7132| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
7133| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
7134| [CVE-2007-1579] Stack-based buffer overflow in Atrium MERCUR IMAPD allows remote attackers to have an unknown impact via a certain SUBSCRIBE command.
7135| [CVE-2007-1578] Multiple integer signedness errors in the NTLM implementation in Atrium MERCUR IMAPD (mcrimap4.exe) 5.00.14, with SP4, allow remote attackers to execute arbitrary code via a long NTLMSSP argument that triggers a stack-based buffer overflow.
7136| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
7137| [CVE-2006-6762] The IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to cause a denial of service via an APPEND command with a single "(" (parenthesis) in the argument.
7138| [CVE-2006-6761] Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command.
7139| [CVE-2006-6425] Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via unspecified vectors involving the APPEND command.
7140| [CVE-2006-6424] Multiple buffer overflows in Novell NetMail before 3.52e FTF2 allow remote attackers to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow
7141| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
7142| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
7143| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
7144| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
7145| [CVE-2005-2278] Stack-based buffer overflow in the IMAP daemon (imapd) in MailEnable Professional 1.54 allows remote authenticated users to execute arbitrary code via the status command with a long mailbox name.
7146| [CVE-2005-1256] Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name.
7147| [CVE-2005-1249] The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop.
7148| [CVE-2005-1015] Buffer overflow in MailEnable Imapd (MEIMAP.exe) allows remote attackers to execute arbitrary code via a long LOGIN command.
7149| [CVE-2005-0546] Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd.
7150| [CVE-2003-1322] Multiple stack-based buffer overflows in Atrium MERCUR IMAPD in MERCUR Mailserver before 4.2.15.0 allow remote attackers to execute arbitrary code via a long (1) EXAMINE, (2) DELETE, (3) SUBSCRIBE, (4) RENAME, (5) UNSUBSCRIBE, (6) LIST, (7) LSUB, (8) STATUS, (9) LOGIN, (10) CREATE, or (11) SELECT command.
7151| [CVE-2002-1782] The default configuration of University of Washington IMAP daemon (wu-imapd), when running on a system that does not allow shell access, allows a local user with a valid IMAP account to read arbitrary files as that user.
7152| [CVE-2002-1604] Multiple buffer overflows in HP Tru64 UNIX allow local and possibly remote attackers to execute arbitrary code via a long NLSPATH environment variable to (1) csh, (2) dtsession, (3) dxsysinfo, (4) imapd, (5) inc, (6) uucp, (7) uux, (8) rdist, or (9) deliver.
7153| [CVE-2002-0997] Buffer overflows in IMAP Agent (imapd) for Novell NetMail (NIMS) 3.0.3 before 3.0.3A allows remote attackers to cause a denial of service.
7154| [CVE-2002-0379] Buffer overflow in University of Washington imap server (uw-imapd) imap-2001 (imapd 2001.315) and imap-2001a (imapd 2001.315) with legacy RFC 1730 support, and imapd 2000.287 and earlier, allows remote authenticated users to execute arbitrary code via a long BODY request.
7155| [CVE-2001-0691] Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations.
7156| [CVE-2000-0284] Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.
7157| [CVE-1999-1557] Buffer overflow in the login functions in IMAP server (imapd) in Ipswitch IMail 5.0 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long user name or (2) a long password.
7158| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
7159| [CVE-1999-1224] IMAP 4.1 BETA, and possibly other versions, does not properly handle the SIGABRT (abort) signal, which allows local users to crash the server (imapd) via certain sequences of commands, which causes a core dump that may contain sensitive password information.
7160|
7161| SecurityFocus - https://www.securityfocus.com/bid/:
7162| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
7163| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
7164| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
7165| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
7166| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
7167| [84478] imapd CVE-1999-1224 Denial-Of-Service Vulnerability
7168| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
7169| [67306] Dovecot Denial of Service Vulnerability
7170| [65650] Eudora WorldMail imapd 'UID' Command Buffer Overflow Vulnerability
7171| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
7172| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
7173| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
7174| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
7175| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
7176| [51403] Eudora WorldMail imapd 'LIST' Command Buffer Overflow Vulnerability
7177| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
7178| [49949] Cyrus IMAPd NTTP Logic Error Authentication Bypass Vulnerability
7179| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
7180| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
7181| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
7182| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
7183| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
7184| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
7185| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
7186| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
7187| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
7188| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
7189| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
7190| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
7191| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
7192| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
7193| [26270] Perdition IMAPD __STR_VWRITE Remote Format String Vulnerability
7194| [25733] Mercury/32 IMAPD SEARCH Command Remote Stack Buffer Overflow Vulnerability
7195| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
7196| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
7197| [23058] Atrium Mercur IMapD NTLM Buffer Overflow Vulnerability
7198| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
7199| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
7200| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
7201| [17961] Dovecot Remote Information Disclosure Vulnerability
7202| [16672] Dovecot Double Free Denial of Service Vulnerability
7203| [15980] Qualcomm WorldMail IMAPD Buffer Overflow Vulnerability
7204| [15753] Ipswitch Collaboration Suite and IMail Server IMAPD LIST Command Denial Of Service Vulnerability
7205| [12636] Cyrus IMAPD Multiple Remote Buffer Overflow Vulnerabilities
7206| [11738] Cyrus IMAPD Multiple Remote Unspecified Vulnerabilities
7207| [11729] Cyrus IMAPD Multiple Remote Vulnerabilities
7208| [6298] Cyrus IMAPD Pre-Login Heap Corruption Vulnerability
7209| [4713] Wu-imapd Partial Mailbox Attribute Remote Buffer Overflow Vulnerability
7210| [2856] Imapd 'Local' Buffer Overflow Vulnerabilities
7211| [1110] Univ. Of Washington imapd Buffer Overflow Vulnerabilities
7212| [502] NT IMail Imapd Buffer Overflow DoS Vulnerability
7213| [130] imapd Buffer Overflow Vulnerability
7214|
7215| IBM X-Force - https://exchange.xforce.ibmcloud.com:
7216| [86382] Dovecot POP3 Service denial of service
7217| [84396] Dovecot IMAP APPEND denial of service
7218| [80453] Dovecot mail-search.c denial of service
7219| [71354] Dovecot SSL Common Name (CN) weak security
7220| [70325] Cyrus IMAPd NNTP security bypass
7221| [67675] Dovecot script-login security bypass
7222| [67674] Dovecot script-login directory traversal
7223| [67589] Dovecot header name denial of service
7224| [63267] Apple Mac OS X Dovecot information disclosure
7225| [62340] Dovecot mailbox security bypass
7226| [62339] Dovecot IMAP or POP3 denial of service
7227| [62256] Dovecot mailbox security bypass
7228| [62255] Dovecot ACL entry security bypass
7229| [60639] Dovecot ACL plugin weak security
7230| [57267] Apple Mac OS X Dovecot Kerberos security bypass
7231| [56763] Dovecot header denial of service
7232| [54363] Dovecot base_dir privilege escalation
7233| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
7234| [47526] UW-imapd rfc822_output_char() denial of service
7235| [46323] Dovecot dovecot.conf information disclosure
7236| [46227] Dovecot message parsing denial of service
7237| [45669] Dovecot ACL mailbox security bypass
7238| [45667] Dovecot ACL plugin rights security bypass
7239| [41085] Dovecot TAB characters authentication bypass
7240| [41009] Dovecot mail_extra_groups option unauthorized access
7241| [39342] Dovecot LDAP auth cache configuration security bypass
7242| [35767] Dovecot ACL plugin security bypass
7243| [34082] Dovecot mbox-storage.c directory traversal
7244| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
7245| [26536] Dovecot IMAP LIST information disclosure
7246| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
7247| [24709] Dovecot APPEND command denial of service
7248| [22629] RHSA-2005:408 updates for cyrus-imapd not installed
7249| [19460] Cyrus IMAP imapd buffer overflow
7250| [19455] Cyrus IMAP imapd extension off-by-one buffer overflow
7251| [18492] Novell NetMail IMAPD 101_mEna buffer overflow
7252| [10803] UW IMAP (wu-imapd) authenticated user buffer overflow
7253| [9238] UW IMAP (wu-imapd) could allow a remote attacker to access arbitrary files
7254| [9055] UW IMAP (wu-imapd) partial mailbox attributes to request buffer overflow
7255| [7345] Slackware Linux imapd and ipop3d core dump
7256| [573] Imapd denial of service
7257|
7258| Exploit-DB - https://www.exploit-db.com:
7259| [30724] Perdition 1.17 IMAPD __STR_VWRITE Remote Format String Vulnerability
7260| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
7261| [22061] Cyrus IMAPD 1.4/1.5.19/2.0.12/2.0.16/2.1.9/2.1.10 Pre-Login Heap Corruption Vulnerability
7262| [21443] Wu-imapd 2000/2001 Partial Mailbox Attribute Remote Buffer Overflow Vulnerability (2)
7263| [21442] Wu-imapd 2000/2001 Partial Mailbox Attribute Remote Buffer Overflow Vulnerability (1)
7264| [19849] UoW imapd 10.234/12.264 COPY Buffer Overflow (meta)
7265| [19848] UoW imapd 10.234/12.264 LSUB Buffer Overflow (meta)
7266| [19847] UoW imapd 10.234/12.264 Buffer Overflow Vulnerabilities
7267| [19377] Ipswitch IMail 5.0 Imapd Buffer Overflow DoS Vulnerability
7268| [19107] Netscape Messaging Server 3.55,University of Washington imapd 10.234 Buffer Overflow Vulnerability
7269| [18354] WorldMail imapd 3.0 SEH overflow (egg hunter)
7270| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
7271| [16485] MailEnable IMAPD 1.54 - STATUS Request Buffer Overflow
7272| [16482] MDaemon 9.6.4 IMAPD FETCH Buffer Overflow
7273| [16480] MailEnable IMAPD W3C Logging Buffer Overflow
7274| [16477] Mdaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow
7275| [16475] MailEnable IMAPD (2.35) Login Request Buffer Overflow
7276| [16474] Qualcomm WorldMail 3.0 IMAPD LIST Buffer Overflow
7277| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
7278| [4429] Mercury/32 4.52 IMAPD SEARCH command Post-Auth Overflow Exploit
7279| [3627] IPSwitch IMail Server <= 8.20 IMAPD Remote Buffer Overflow Exploit
7280| [3527] Mercur IMAPD 5.00.14 Remote Denial of Service Exploit (win32)
7281| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
7282| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
7283| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
7284| [1380] Eudora Qualcomm WorldMail 3.0 (IMAPd) Remote Overflow Exploit
7285| [1332] MailEnable 1.54 Pro Universal IMAPD W3C Logging BoF Exploit
7286| [1327] FTGate4 Groupware Mail Server 4.1 (imapd) Remote Buffer Overflow PoC
7287| [1151] MDaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow Exploit
7288| [1124] IPSwitch IMail Server <= 8.15 IMAPD Remote Root Exploit
7289| [915] MailEnable Enterprise 1.x Imapd Remote Exploit
7290| [903] Cyrus imapd 2.2.4 - 2.2.8 (imapmagicplus) Remote Exploit
7291| [340] Linux imapd Remote Overflow File Retrieve Exploit
7292|
7293| OpenVAS (Nessus) - http://www.openvas.org:
7294| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
7295| [901025] Dovecot Version Detection
7296| [881425] CentOS Update for cyrus-imapd CESA-2011:1508 centos5 x86_64
7297| [881403] CentOS Update for cyrus-imapd CESA-2011:0859 centos5 x86_64
7298| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
7299| [881397] CentOS Update for cyrus-imapd CESA-2011:1317 centos4 x86_64
7300| [881370] CentOS Update for cyrus-imapd CESA-2011:1508 centos4 x86_64
7301| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
7302| [881318] CentOS Update for cyrus-imapd CESA-2011:0859 centos4 x86_64
7303| [881255] CentOS Update for cyrus-imapd CESA-2011:1317 centos5 x86_64
7304| [881050] CentOS Update for cyrus-imapd CESA-2011:1508 centos5 i386
7305| [881049] CentOS Update for cyrus-imapd CESA-2011:1508 centos4 i386
7306| [881007] CentOS Update for cyrus-imapd CESA-2011:1317 centos5 i386
7307| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
7308| [880978] CentOS Update for cyrus-imapd CESA-2011:1317 centos4 i386
7309| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
7310| [880958] CentOS Update for cyrus-imapd CESA-2011:0859 centos4 i386
7311| [880905] CentOS Update for cyrus-imapd CESA-2009:1459 centos4 i386
7312| [880864] CentOS Update for cyrus-imapd CESA-2009:1459 centos5 i386
7313| [880826] CentOS Update for cyrus-imapd CESA-2009:1116 centos5 i386
7314| [880536] CentOS Update for cyrus-imapd CESA-2011:0859 centos5 i386
7315| [870607] RedHat Update for dovecot RHSA-2011:0600-01
7316| [870520] RedHat Update for cyrus-imapd RHSA-2011:1508-01
7317| [870489] RedHat Update for cyrus-imapd RHSA-2011:1317-01
7318| [870471] RedHat Update for dovecot RHSA-2011:1187-01
7319| [870443] RedHat Update for cyrus-imapd RHSA-2011:0859-01
7320| [870153] RedHat Update for dovecot RHSA-2008:0297-02
7321| [864075] Fedora Update for cyrus-imapd FEDORA-2011-13832
7322| [863585] Fedora Update for cyrus-imapd FEDORA-2011-13869
7323| [863579] Fedora Update for cyrus-imapd FEDORA-2011-13860
7324| [863281] Fedora Update for cyrus-imapd FEDORA-2011-7193
7325| [863273] Fedora Update for cyrus-imapd FEDORA-2011-7217
7326| [863272] Fedora Update for dovecot FEDORA-2011-7612
7327| [863115] Fedora Update for dovecot FEDORA-2011-7258
7328| [861525] Fedora Update for dovecot FEDORA-2007-664
7329| [861394] Fedora Update for dovecot FEDORA-2007-493
7330| [861333] Fedora Update for dovecot FEDORA-2007-1485
7331| [860845] Fedora Update for dovecot FEDORA-2008-9202
7332| [860663] Fedora Update for dovecot FEDORA-2008-2475
7333| [860169] Fedora Update for dovecot FEDORA-2008-2464
7334| [860089] Fedora Update for dovecot FEDORA-2008-9232
7335| [840950] Ubuntu Update for dovecot USN-1295-1
7336| [840668] Ubuntu Update for dovecot USN-1143-1
7337| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
7338| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
7339| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
7340| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
7341| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
7342| [831590] Mandriva Update for cyrus-imapd MDVSA-2012:037 (cyrus-imapd)
7343| [831468] Mandriva Update for cyrus-imapd MDVSA-2011:149 (cyrus-imapd)
7344| [831410] Mandriva Update for cyrus-imapd MDVSA-2011:100 (cyrus-imapd)
7345| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
7346| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
7347| [831207] Mandriva Update for cyrus-imapd MDVA-2010:208 (cyrus-imapd)
7348| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
7349| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
7350| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
7351| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
7352| [800149] UW-imapd tmail and dmail BOF Vulnerabilities (Linux)
7353| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
7354| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
7355| [70696] Debian Security Advisory DSA 2377-1 (cyrus-imapd-2.2)
7356| [70407] Debian Security Advisory DSA 2318-1 (cyrus-imapd-2.2)
7357| [70259] FreeBSD Ports: dovecot
7358| [69965] Debian Security Advisory DSA 2258-1 (kolab-cyrus-imapd)
7359| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
7360| [69740] Debian Security Advisory DSA 2242-1 (cyrus-imapd-2.2)
7361| [66522] FreeBSD Ports: dovecot
7362| [66416] Mandriva Security Advisory MDVSA-2009:229-1 (cyrus-imapd)
7363| [66233] SLES10: Security update for Cyrus IMAPD
7364| [66226] SLES11: Security update for Cyrus IMAPD
7365| [66222] SLES9: Security update for Cyrus IMAPD
7366| [65938] SLES10: Security update for Cyrus IMAPD
7367| [65723] SLES11: Security update for Cyrus IMAPD
7368| [65523] SLES9: Security update for Cyrus IMAPD
7369| [65479] SLES9: Security update for cyrus-imapd
7370| [65094] SLES9: Security update for cyrus-imapd
7371| [65010] Ubuntu USN-838-1 (dovecot)
7372| [64989] CentOS Security Advisory CESA-2009:1459 (cyrus-imapd)
7373| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
7374| [64977] Debian Security Advisory DSA 1893-1 (cyrus-imapd-2.2 kolab-cyrus-imapd)
7375| [64965] Fedora Core 11 FEDORA-2009-9901 (cyrus-imapd)
7376| [64963] Fedora Core 10 FEDORA-2009-9869 (cyrus-imapd)
7377| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
7378| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
7379| [64898] FreeBSD Ports: cyrus-imapd
7380| [64864] Debian Security Advisory DSA 1881-1 (cyrus-imapd-2.2)
7381| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
7382| [64847] Fedora Core 10 FEDORA-2009-9428 (cyrus-imapd)
7383| [64846] Fedora Core 11 FEDORA-2009-9417 (cyrus-imapd)
7384| [64838] Mandrake Security Advisory MDVSA-2009:229 (cyrus-imapd)
7385| [64271] CentOS Security Advisory CESA-2009:1116 (cyrus-imapd)
7386| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
7387| [62854] FreeBSD Ports: dovecot-managesieve
7388| [61916] FreeBSD Ports: dovecot
7389| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
7390| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
7391| [60528] FreeBSD Ports: dovecot
7392| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
7393| [60089] FreeBSD Ports: dovecot
7394| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
7395| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
7396| [55807] Slackware Advisory SSA:2005-310-06 imapd
7397| [54861] Gentoo Security Advisory GLSA 200502-29 (cyrus-imapd)
7398| [54755] Gentoo Security Advisory GLSA 200411-34 (cyrus-imapd)
7399| [53739] Debian Security Advisory DSA 215-1 (cyrus-imapd)
7400| [53288] Debian Security Advisory DSA 597-1 (cyrus-imapd)
7401| [52297] FreeBSD Ports: cyrus-imapd
7402| [52296] FreeBSD Ports: cyrus-imapd
7403| [52295] FreeBSD Ports: cyrus-imapd
7404| [52294] FreeBSD Ports: cyrus-imapd
7405| [52172] FreeBSD Ports: cyrus-imapd
7406|
7407| SecurityTracker - https://www.securitytracker.com:
7408| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
7409| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
7410| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
7411| [1013278] Cyrus IMAPd Buffer Overflows in Annotate Extension, Cached Header, and Fetchnews May Let Remote Users Execute Arbitrary Code
7412|
7413| OSVDB - http://www.osvdb.org:
7414| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
7415| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
7416| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
7417| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
7418| [78304] Eudora WorldMail imapd SEH LIST Command Parsing Remote Overflow
7419| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
7420| [75445] Cyrus IMAP Server imapd index.c index_get_ids Function References Header NULL Dereference Remote DoS
7421| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
7422| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
7423| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
7424| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
7425| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
7426| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
7427| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
7428| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
7429| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
7430| [66113] Dovecot Mail Root Directory Creation Permission Weakness
7431| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
7432| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
7433| [66110] Dovecot Multiple Unspecified Buffer Overflows
7434| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
7435| [64783] Dovecot E-mail Message Header Unspecified DoS
7436| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
7437| [62796] Dovecot mbox Format Email Header Handling DoS
7438| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
7439| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
7440| [57843] Cyrus IMAP Server (cyrus-imapd) SIEVE Script Component (sieve/script.c) Crafted Script Handling Overflow
7441| [57681] UoW imap Server (uw-imapd) Arbitrary Remote File Access
7442| [52906] UW-imapd c-client Initial Request Remote Format String
7443| [52905] UW-imapd c-client Library RFC822BUFFER Routines rfc822_output_char Function Off-by-one
7444| [52456] UW-imapd on Debian Linux LOGIN Command Remote DoS
7445| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
7446| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
7447| [49485] UW-imapd dmail Utility Mailbox Name Handling Overflow
7448| [49484] UW-imapd tmail Utility Mailbox Name Handling Overflow
7449| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
7450| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
7451| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
7452| [43137] Dovecot mail_extra_groups Symlink File Manipulation
7453| [42979] Dovecot passdbs Argument Injection Authentication Bypass
7454| [42004] Perdition Mail Retrieval Proxy IMAPD IMAP Tag Remote Format String Arbitrary Code Execution
7455| [39876] Dovecot LDAP Auth Cache Security Bypass
7456| [39670] Mercury Mail Transport System IMAPD SEARCH Command Remote Overflow
7457| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
7458| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
7459| [31362] Novell NetMail IMAP Daemon (IMAPD) APPEND Command Remote Overflow
7460| [31361] Novell NetMail IMAP Daemon (IMAPD) APPEND Command DoS
7461| [31360] Novell NetMail IMAP Daemon (IMAPD) SUBSCRIBE Command Remote Overflow
7462| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
7463| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
7464| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
7465| [23281] Dovecot imap/pop3-login dovecot-auth DoS
7466| [23280] Dovecot Malformed APPEND Command DoS
7467| [18179] HP Tru64 UNIX imapd NLSPATH Environment Variable Local Overflow
7468| [13242] UW-imapd CRAM-MD5 Authentication Bypass
7469| [12385] Novell NetMail IMAPD 101_mEna Script Remote Overflow
7470| [12042] UoW imapd Multiple Unspecified Overflows
7471| [12037] UoW imapd (UW-IMAP) Multiple Command Remote Overflows
7472| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
7473| [911] UoW imapd AUTHENTICATE Command Remote Overflow
7474| [790] UoW imap Server (uw-imapd) BODY Request Remote Overflow
7475| [519] UoW imapd SIGABRT Signal Forced Crash Information Disclosure
7476|_
7477995/tcp open ssl/pop3 Dovecot pop3d
7478| vulscan: VulDB - https://vuldb.com:
7479| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
7480| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
7481| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
7482| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
7483| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
7484| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
7485| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
7486| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
7487| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
7488| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
7489| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
7490| [69835] Dovecot 2.2.0/2.2.1 denial of service
7491| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
7492| [65684] Dovecot up to 2.2.6 unknown vulnerability
7493| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
7494| [63692] Dovecot up to 2.0.15 spoofing
7495| [7062] Dovecot 2.1.10 mail-search.c denial of service
7496| [57517] Dovecot up to 2.0.12 Login directory traversal
7497| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
7498| [57515] Dovecot up to 2.0.12 Crash denial of service
7499| [54944] Dovecot up to 1.2.14 denial of service
7500| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
7501| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
7502| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
7503| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
7504| [53277] Dovecot up to 1.2.10 denial of service
7505| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
7506| [45256] Dovecot up to 1.1.5 directory traversal
7507| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
7508| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
7509| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
7510| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
7511| [40356] Dovecot 1.0.9 Cache unknown vulnerability
7512| [38222] Dovecot 1.0.2 directory traversal
7513| [36376] Dovecot up to 1.0.x directory traversal
7514| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
7515|
7516| MITRE CVE - https://cve.mitre.org:
7517| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
7518| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
7519| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
7520| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
7521| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
7522| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
7523| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
7524| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
7525| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
7526| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
7527| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
7528| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
7529| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
7530| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
7531| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
7532| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
7533| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
7534| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
7535| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
7536| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
7537| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
7538| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
7539| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
7540| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
7541| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
7542| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
7543| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
7544| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
7545| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
7546| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
7547| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
7548| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
7549| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
7550| [CVE-2002-0925] Format string vulnerability in mmsyslog function allows remote attackers to execute arbitrary code via (1) the USER command to mmpop3d for mmmail 0.0.13 and earlier, (2) the HELO command to mmsmtpd for mmmail 0.0.13 and earlier, or (3) the USER command to mmftpd 0.0.7 and earlier.
7551| [CVE-2001-0143] vpop3d program in linuxconf 1.23r and earlier allows local users to overwrite arbitrary files via a symlink attack.
7552| [CVE-2000-1197] POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes.
7553| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
7554|
7555| SecurityFocus - https://www.securityfocus.com/bid/:
7556| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
7557| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
7558| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
7559| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
7560| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
7561| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
7562| [67306] Dovecot Denial of Service Vulnerability
7563| [67219] akpop3d 'pszQuery' Remote Memory Corruption Vulnerability
7564| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
7565| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
7566| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
7567| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
7568| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
7569| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
7570| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
7571| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
7572| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
7573| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
7574| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
7575| [39838] tpop3d Remote Denial of Service Vulnerability
7576| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
7577| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
7578| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
7579| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
7580| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
7581| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
7582| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
7583| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
7584| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
7585| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
7586| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
7587| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
7588| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
7589| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
7590| [17961] Dovecot Remote Information Disclosure Vulnerability
7591| [16672] Dovecot Double Free Denial of Service Vulnerability
7592| [8495] akpop3d User Name SQL Injection Vulnerability
7593| [8473] Vpop3d Remote Denial Of Service Vulnerability
7594| [3990] ZPop3D Bad Login Logging Failure Vulnerability
7595| [2781] DynFX MailServer POP3d Denial of Service Vulnerability
7596|
7597| IBM X-Force - https://exchange.xforce.ibmcloud.com:
7598| [86382] Dovecot POP3 Service denial of service
7599| [84396] Dovecot IMAP APPEND denial of service
7600| [80453] Dovecot mail-search.c denial of service
7601| [71354] Dovecot SSL Common Name (CN) weak security
7602| [67675] Dovecot script-login security bypass
7603| [67674] Dovecot script-login directory traversal
7604| [67589] Dovecot header name denial of service
7605| [63267] Apple Mac OS X Dovecot information disclosure
7606| [62340] Dovecot mailbox security bypass
7607| [62339] Dovecot IMAP or POP3 denial of service
7608| [62256] Dovecot mailbox security bypass
7609| [62255] Dovecot ACL entry security bypass
7610| [60639] Dovecot ACL plugin weak security
7611| [57267] Apple Mac OS X Dovecot Kerberos security bypass
7612| [56763] Dovecot header denial of service
7613| [54363] Dovecot base_dir privilege escalation
7614| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
7615| [46323] Dovecot dovecot.conf information disclosure
7616| [46227] Dovecot message parsing denial of service
7617| [45669] Dovecot ACL mailbox security bypass
7618| [45667] Dovecot ACL plugin rights security bypass
7619| [41085] Dovecot TAB characters authentication bypass
7620| [41009] Dovecot mail_extra_groups option unauthorized access
7621| [39342] Dovecot LDAP auth cache configuration security bypass
7622| [35767] Dovecot ACL plugin security bypass
7623| [34082] Dovecot mbox-storage.c directory traversal
7624| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
7625| [26578] Cyrus IMAP pop3d buffer overflow
7626| [26536] Dovecot IMAP LIST information disclosure
7627| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
7628| [24709] Dovecot APPEND command denial of service
7629| [13018] akpop3d authentication code SQL injection
7630| [7345] Slackware Linux imapd and ipop3d core dump
7631| [6269] imap, ipop2d and ipop3d buffer overflows
7632| [5923] Linuxconf vpop3d symbolic link
7633| [4918] IPOP3D, Buffer overflow attack
7634| [1560] IPOP3D, user login successful
7635| [1559] IPOP3D user login to remote host successful
7636| [1525] IPOP3D, user logout
7637| [1524] IPOP3D, user auto-logout
7638| [1523] IPOP3D, user login failure
7639| [1522] IPOP3D, brute force attack
7640| [1521] IPOP3D, user kiss of death logout
7641| [418] pop3d mktemp creates insecure temporary files
7642|
7643| Exploit-DB - https://www.exploit-db.com:
7644| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
7645| [23053] Vpop3d Remote Denial of Service Vulnerability
7646| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
7647| [11893] tPop3d 1.5.3 DoS
7648| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
7649| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
7650| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
7651| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
7652|
7653| OpenVAS (Nessus) - http://www.openvas.org:
7654| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
7655| [901025] Dovecot Version Detection
7656| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
7657| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
7658| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
7659| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
7660| [870607] RedHat Update for dovecot RHSA-2011:0600-01
7661| [870471] RedHat Update for dovecot RHSA-2011:1187-01
7662| [870153] RedHat Update for dovecot RHSA-2008:0297-02
7663| [863272] Fedora Update for dovecot FEDORA-2011-7612
7664| [863115] Fedora Update for dovecot FEDORA-2011-7258
7665| [861525] Fedora Update for dovecot FEDORA-2007-664
7666| [861394] Fedora Update for dovecot FEDORA-2007-493
7667| [861333] Fedora Update for dovecot FEDORA-2007-1485
7668| [860845] Fedora Update for dovecot FEDORA-2008-9202
7669| [860663] Fedora Update for dovecot FEDORA-2008-2475
7670| [860169] Fedora Update for dovecot FEDORA-2008-2464
7671| [860089] Fedora Update for dovecot FEDORA-2008-9232
7672| [840950] Ubuntu Update for dovecot USN-1295-1
7673| [840668] Ubuntu Update for dovecot USN-1143-1
7674| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
7675| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
7676| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
7677| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
7678| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
7679| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
7680| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
7681| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
7682| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
7683| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
7684| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
7685| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
7686| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
7687| [70259] FreeBSD Ports: dovecot
7688| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
7689| [66522] FreeBSD Ports: dovecot
7690| [65010] Ubuntu USN-838-1 (dovecot)
7691| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
7692| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
7693| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
7694| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
7695| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
7696| [62854] FreeBSD Ports: dovecot-managesieve
7697| [61916] FreeBSD Ports: dovecot
7698| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
7699| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
7700| [60528] FreeBSD Ports: dovecot
7701| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
7702| [60089] FreeBSD Ports: dovecot
7703| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
7704| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
7705|
7706| SecurityTracker - https://www.securitytracker.com:
7707| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
7708| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
7709| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
7710|
7711| OSVDB - http://www.osvdb.org:
7712| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
7713| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
7714| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
7715| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
7716| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
7717| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
7718| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
7719| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
7720| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
7721| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
7722| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
7723| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
7724| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
7725| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
7726| [66113] Dovecot Mail Root Directory Creation Permission Weakness
7727| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
7728| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
7729| [66110] Dovecot Multiple Unspecified Buffer Overflows
7730| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
7731| [64783] Dovecot E-mail Message Header Unspecified DoS
7732| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
7733| [62796] Dovecot mbox Format Email Header Handling DoS
7734| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
7735| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
7736| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
7737| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
7738| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
7739| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
7740| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
7741| [43137] Dovecot mail_extra_groups Symlink File Manipulation
7742| [42979] Dovecot passdbs Argument Injection Authentication Bypass
7743| [39876] Dovecot LDAP Auth Cache Security Bypass
7744| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
7745| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
7746| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
7747| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
7748| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
7749| [23281] Dovecot imap/pop3-login dovecot-auth DoS
7750| [23280] Dovecot Malformed APPEND Command DoS
7751| [14459] mmmail mmpop3d USER Command mmsyslog Function Format String
7752| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
7753| [5857] Linux pop3d Arbitrary Mail File Access
7754| [2471] akpop3d username SQL Injection
7755####################################################################################################################################
7756[+] URL: http://www.reciclaccion.cl/
7757[+] Started: Mon Mar 2 11:04:25 2020
7758
7759Interesting Finding(s):
7760
7761[+] http://www.reciclaccion.cl/
7762 | Interesting Entries:
7763 | - Server: Apache
7764 | - Upgrade: h2,h2c
7765 | Found By: Headers (Passive Detection)
7766 | Confidence: 100%
7767
7768[+] http://www.reciclaccion.cl/robots.txt
7769 | Interesting Entries:
7770 | - /wp-admin/
7771 | - /wp-admin/admin-ajax.php
7772 | Found By: Robots Txt (Aggressive Detection)
7773 | Confidence: 100%
7774
7775[+] http://www.reciclaccion.cl/xmlrpc.php
7776 | Found By: Link Tag (Passive Detection)
7777 | Confidence: 100%
7778 | Confirmed By: Direct Access (Aggressive Detection), 100% confidence
7779 | References:
7780 | - http://codex.wordpress.org/XML-RPC_Pingback_API
7781 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
7782 | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
7783 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
7784 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
7785
7786[+] http://www.reciclaccion.cl/readme.html
7787 | Found By: Direct Access (Aggressive Detection)
7788 | Confidence: 100%
7789
7790[+] Upload directory has listing enabled: http://www.reciclaccion.cl/wp-content/uploads/
7791 | Found By: Direct Access (Aggressive Detection)
7792 | Confidence: 100%
7793
7794[+] http://www.reciclaccion.cl/wp-cron.php
7795 | Found By: Direct Access (Aggressive Detection)
7796 | Confidence: 60%
7797 | References:
7798 | - https://www.iplocation.net/defend-wordpress-from-ddos
7799 | - https://github.com/wpscanteam/wpscan/issues/1299
7800
7801[+] WordPress version 5.0.8 identified (Latest, released on 2019-12-12).
7802 | Found By: Rss Generator (Passive Detection)
7803 | - http://www.reciclaccion.cl/feed/, <generator>https://wordpress.org/?v=5.0.8</generator>
7804 | - http://www.reciclaccion.cl/comments/feed/, <generator>https://wordpress.org/?v=5.0.8</generator>
7805
7806[i] The main theme could not be detected.
7807
7808[+] Enumerating All Plugins (via Passive Methods)
7809[+] Checking Plugin Versions (via Passive and Aggressive Methods)
7810
7811[i] Plugin(s) Identified:
7812
7813[+] instagram-feed
7814 | Location: http://www.reciclaccion.cl/wp-content/plugins/instagram-feed/
7815 | Latest Version: 2.2 (up to date)
7816 | Last Updated: 2020-02-13T22:22:00.000Z
7817 |
7818 | Found By: Javascript Var (Passive Detection)
7819 |
7820 | Version: 2.2 (100% confidence)
7821 | Found By: Readme - Stable Tag (Aggressive Detection)
7822 | - http://www.reciclaccion.cl/wp-content/plugins/instagram-feed/README.txt
7823 | Confirmed By: Readme - ChangeLog Section (Aggressive Detection)
7824 | - http://www.reciclaccion.cl/wp-content/plugins/instagram-feed/README.txt
7825
7826[+] js_composer
7827 | Location: http://www.reciclaccion.cl/wp-content/plugins/js_composer/
7828 |
7829 | Found By: Body Tag (Passive Detection)
7830 |
7831 | Version: 5.4.7 (60% confidence)
7832 | Found By: Body Tag (Passive Detection)
7833 | - http://www.reciclaccion.cl/, Match: 'js-comp-ver-5.4.7'
7834
7835[+] wd-google-maps-marker-clustering
7836 | Location: http://www.reciclaccion.cl/wp-content/plugins/wd-google-maps-marker-clustering/
7837 |
7838 | Found By: Urls In Homepage (Passive Detection)
7839 | Confirmed By: Urls In 404 Page (Passive Detection)
7840 |
7841 | The version could not be determined.
7842
7843[+] wordpress-23-related-posts-plugin
7844 | Location: http://www.reciclaccion.cl/wp-content/plugins/wordpress-23-related-posts-plugin/
7845 | Latest Version: 3.6.4 (up to date)
7846 | Last Updated: 2018-05-25T11:00:00.000Z
7847 |
7848 | Found By: Javascript Var (Passive Detection)
7849 |
7850 | Version: 3.6.5 (100% confidence)
7851 | Found By: Readme - Stable Tag (Aggressive Detection)
7852 | - http://www.reciclaccion.cl/wp-content/plugins/wordpress-23-related-posts-plugin/readme.txt
7853 | Confirmed By: Readme - ChangeLog Section (Aggressive Detection)
7854 | - http://www.reciclaccion.cl/wp-content/plugins/wordpress-23-related-posts-plugin/readme.txt
7855
7856[+] Enumerating Config Backups (via Passive and Aggressive Methods)
7857 Checking Config Backups - Time: 00:00:16 <=============> (21 / 21) 100.00% Time: 00:00:16
7858
7859[i] No Config Backups Found.
7860
7861[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
7862[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up
7863
7864[+] Finished: Mon Mar 2 11:05:36 2020
7865[+] Requests Done: 58
7866[+] Cached Requests: 7
7867[+] Data Sent: 40.791 KB
7868[+] Data Received: 335.147 KB
7869[+] Memory used: 157.973 MB
7870[+] Elapsed time: 00:01:10
7871###################################################################################################################################
7872[+] URL: http://www.reciclaccion.cl/
7873[+] Started: Mon Mar 2 11:04:32 2020
7874
7875Interesting Finding(s):
7876
7877[+] http://www.reciclaccion.cl/
7878 | Interesting Entries:
7879 | - Server: Apache
7880 | - Upgrade: h2,h2c
7881 | Found By: Headers (Passive Detection)
7882 | Confidence: 100%
7883
7884[+] http://www.reciclaccion.cl/robots.txt
7885 | Interesting Entries:
7886 | - /wp-admin/
7887 | - /wp-admin/admin-ajax.php
7888 | Found By: Robots Txt (Aggressive Detection)
7889 | Confidence: 100%
7890
7891[+] http://www.reciclaccion.cl/xmlrpc.php
7892 | Found By: Link Tag (Passive Detection)
7893 | Confidence: 100%
7894 | Confirmed By: Direct Access (Aggressive Detection), 100% confidence
7895 | References:
7896 | - http://codex.wordpress.org/XML-RPC_Pingback_API
7897 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
7898 | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
7899 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
7900 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
7901
7902[+] http://www.reciclaccion.cl/readme.html
7903 | Found By: Direct Access (Aggressive Detection)
7904 | Confidence: 100%
7905
7906[+] Upload directory has listing enabled: http://www.reciclaccion.cl/wp-content/uploads/
7907 | Found By: Direct Access (Aggressive Detection)
7908 | Confidence: 100%
7909
7910[+] http://www.reciclaccion.cl/wp-cron.php
7911 | Found By: Direct Access (Aggressive Detection)
7912 | Confidence: 60%
7913 | References:
7914 | - https://www.iplocation.net/defend-wordpress-from-ddos
7915 | - https://github.com/wpscanteam/wpscan/issues/1299
7916
7917[+] WordPress version 5.0.8 identified (Latest, released on 2019-12-12).
7918 | Found By: Rss Generator (Passive Detection)
7919 | - http://www.reciclaccion.cl/feed/, <generator>https://wordpress.org/?v=5.0.8</generator>
7920 | - http://www.reciclaccion.cl/comments/feed/, <generator>https://wordpress.org/?v=5.0.8</generator>
7921
7922[i] The main theme could not be detected.
7923
7924[+] Enumerating Users (via Passive and Aggressive Methods)
7925 Brute Forcing Author IDs - Time: 00:00:14 <==> (10 / 10) 100.00% Time: 00:00:14
7926
7927[i] User(s) Identified:
7928
7929[+] caco
7930 | Found By: Author Posts - Author Pattern (Passive Detection)
7931 | Confirmed By: Wp Json Api (Aggressive Detection)
7932 | - http://www.reciclaccion.cl/wp-json/wp/v2/users/?per_page=100&page=1
7933
7934[+] Caco Fuentes Aliaga
7935 | Found By: Rss Generator (Passive Detection)
7936 | Confirmed By: Rss Generator (Aggressive Detection)
7937
7938[+] adriana
7939 | Found By: Wp Json Api (Aggressive Detection)
7940 | - http://www.reciclaccion.cl/wp-json/wp/v2/users/?per_page=100&page=1
7941
7942[+] reciclaccion
7943 | Found By: Wp Json Api (Aggressive Detection)
7944 | - http://www.reciclaccion.cl/wp-json/wp/v2/users/?per_page=100&page=1
7945
7946[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
7947[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up
7948
7949[+] Finished: Mon Mar 2 11:06:07 2020
7950[+] Requests Done: 41
7951[+] Cached Requests: 19
7952[+] Data Sent: 31.842 KB
7953[+] Data Received: 548.905 KB
7954[+] Memory used: 89.641 MB
7955[+] Elapsed time: 00:01:35
7956####################################################################################################################################
7957
7958[+] URL: http://www.reciclaccion.cl/
7959[+] Started: Mon Mar 2 11:08:50 2020
7960
7961Interesting Finding(s):
7962
7963[+] http://www.reciclaccion.cl/
7964 | Interesting Entries:
7965 | - Server: Apache
7966 | - Upgrade: h2,h2c
7967 | Found By: Headers (Passive Detection)
7968 | Confidence: 100%
7969
7970[+] http://www.reciclaccion.cl/robots.txt
7971 | Interesting Entries:
7972 | - /wp-admin/
7973 | - /wp-admin/admin-ajax.php
7974 | Found By: Robots Txt (Aggressive Detection)
7975 | Confidence: 100%
7976
7977[+] http://www.reciclaccion.cl/xmlrpc.php
7978 | Found By: Link Tag (Passive Detection)
7979 | Confidence: 30%
7980 | References:
7981 | - http://codex.wordpress.org/XML-RPC_Pingback_API
7982 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
7983 | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
7984 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
7985 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
7986
7987[+] http://www.reciclaccion.cl/readme.html
7988 | Found By: Direct Access (Aggressive Detection)
7989 | Confidence: 100%
7990
7991[+] Upload directory has listing enabled: http://www.reciclaccion.cl/wp-content/uploads/
7992 | Found By: Direct Access (Aggressive Detection)
7993 | Confidence: 100%
7994
7995[+] http://www.reciclaccion.cl/wp-cron.php
7996 | Found By: Direct Access (Aggressive Detection)
7997 | Confidence: 60%
7998 | References:
7999 | - https://www.iplocation.net/defend-wordpress-from-ddos
8000 | - https://github.com/wpscanteam/wpscan/issues/1299
8001
8002[+] WordPress version 5.0.8 identified (Latest, released on 2019-12-12).
8003 | Found By: Rss Generator (Passive Detection)
8004 | - http://www.reciclaccion.cl/feed/, <generator>https://wordpress.org/?v=5.0.8</generator>
8005 | - http://www.reciclaccion.cl/comments/feed/, <generator>https://wordpress.org/?v=5.0.8</generator>
8006
8007[i] The main theme could not be detected.
8008
8009[+] Enumerating Users (via Passive and Aggressive Methods)
8010 Brute Forcing Author IDs - Time: 00:01:00 <============> (10 / 10) 100.00% Time: 00:01:00
8011
8012[i] User(s) Identified:
8013
8014[+] caco
8015 | Found By: Author Posts - Author Pattern (Passive Detection)
8016
8017[+] Caco Fuentes Aliaga
8018 | Found By: Rss Generator (Passive Detection)
8019 | Confirmed By: Rss Generator (Aggressive Detection)
8020
8021[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
8022[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up
8023
8024[+] Finished: Mon Mar 2 11:13:04 2020
8025[+] Requests Done: 14
8026[+] Cached Requests: 39
8027[+] Data Sent: 0 B
8028[+] Data Received: 0 B
8029[+] Memory used: 89.258 MB
8030[+] Elapsed time: 00:04:13
8031#####################################################################################################################################
8032[INFO] ------TARGET info------
8033[*] TARGET: http://www.reciclaccion.cl/
8034[*] TARGET IP: 186.64.118.40
8035[INFO] NO load balancer detected for www.reciclaccion.cl...
8036[*] DNS servers: reciclaccion.cl.
8037[*] TARGET server:
8038[*] CC: CL
8039[*] Country: Chile
8040[*] RegionCode: ML
8041[*] RegionName: Maule Region
8042[*] City: Curicó
8043[*] ASN: AS52368
8044[*] BGP_PREFIX: 186.64.112.0/21
8045[*] ISP: ZAM LTDA., CL
8046[INFO] DNS enumeration:
8047[*] ftp.reciclaccion.cl 186.64.118.40
8048[*] mail.reciclaccion.cl 186.64.118.40
8049[*] webmail.reciclaccion.cl 186.64.118.40
8050[INFO] Possible abuse mails are:
8051[*] abuse@reciclaccion.cl
8052[*] abuse@www.reciclaccion.cl
8053[*] noc@haulmer.com
8054[INFO] NO PAC (Proxy Auto Configuration) file FOUND
8055[INFO] Starting FUZZing in http://www.reciclaccion.cl/FUzZzZzZzZz...
8056[INFO] Status code Folders
8057[INFO] NO passwords found in source code
8058[INFO] SAME content in http://www.reciclaccion.cl/ AND http://186.64.118.40/
8059
8060Recherche www.reciclaccion.cl
8061Connexion HTTP à www.reciclaccion.cl
8062Alerte ! : Impossible d’établir une connexion à l’hôte distant.
8063
8064lynx : accès impossible au fichier de départ http://www.reciclaccion.cl/
8065[INFO] Links found from http://www.reciclaccion.cl/:
8066cut: intervalle de champ incorrecte
8067Saisissez « cut --help » pour plus d'informations.
8068[INFO] BING shows 186.64.118.40 is shared with 10,400 hosts/vhosts
8069[INFO] Shodan detected the following opened ports on 186.64.118.40:
8070[*] 1
8071[*] 110
8072[*] 143
8073[*] 2082
8074[*] 2083
8075[*] 2087
8076[*] 2095
8077[*] 2096
8078[*] 21
8079[*] 4
8080[*] 443
8081[*] 587
8082[*] 80
8083[*] 993
8084[*] 995
8085[INFO] ------VirusTotal SECTION------
8086[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
8087[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
8088[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
8089[INFO] ------Alexa Rank SECTION------
8090[INFO] Percent of Visitors Rank in Country:
8091[INFO] Percent of Search Traffic:
8092[INFO] Percent of Unique Visits:
8093[INFO] Total Sites Linking In:
8094[*] Total Sites
8095[INFO] Useful links related to www.reciclaccion.cl - 186.64.118.40:
8096[*] https://www.virustotal.com/pt/ip-address/186.64.118.40/information/
8097[*] https://www.hybrid-analysis.com/search?host=186.64.118.40
8098[*] https://www.shodan.io/host/186.64.118.40
8099[*] https://www.senderbase.org/lookup/?search_string=186.64.118.40
8100[*] https://www.alienvault.com/open-threat-exchange/ip/186.64.118.40
8101[*] http://pastebin.com/search?q=186.64.118.40
8102[*] http://urlquery.net/search.php?q=186.64.118.40
8103[*] http://www.alexa.com/siteinfo/www.reciclaccion.cl
8104[*] http://www.google.com/safebrowsing/diagnostic?site=www.reciclaccion.cl
8105[*] https://censys.io/ipv4/186.64.118.40
8106[*] https://www.abuseipdb.com/check/186.64.118.40
8107[*] https://urlscan.io/search/#186.64.118.40
8108[*] https://github.com/search?q=186.64.118.40&type=Code
8109[INFO] Useful links related to AS52368 - 186.64.112.0/21:
8110[*] http://www.google.com/safebrowsing/diagnostic?site=AS:52368
8111[*] https://www.senderbase.org/lookup/?search_string=186.64.112.0/21
8112[*] http://bgp.he.net/AS52368
8113[*] https://stat.ripe.net/AS52368
8114[INFO] Date: 02/03/20 | Time: 11:18:48
8115[INFO] Total time: 9 minute(s) and 56 second(s)
8116######################################################################################################################################
8117 Anonymous JTSEC #OpChili Full Recon #46