Thinking...
[get complete service list]
Port Information
Protocol Service Name
tcp --- ---
Top IPs Scanning
Today Yesterday
176.65.148.58 (4)81.19.219.197 (2)
184.72.36.250 (3)79.124.62.122 (2)
3.13.12.246 (3)146.19.24.57 (2)
18.211.176.129 (3)81.19.219.241 (2)
100.27.42.216 (2)176.65.148.92 (2)
160.119.76.200 (1)168.144.23.229 (2)
176.65.148.92 (1)167.94.146.43 (1)
61.157.98.99 (1)69.5.169.32 (1)
146.19.24.57 (1)207.90.244.26 (1)
3.131.209.36 (1)176.65.148.70 (1)
User Comments
Submitted By Date
Comment
2004-05-21 15:39:10
Here is an interception of traffic on destination port TCP/14059 done with the help of nc (netcat): Command used : echo ====== ; nc -l -n -p 14059 ; echo ====== It seems to be a Peer2Peer application based on Gnutella called BearShare. I added the lines made from "=" to mark start and stop of traffic. I assume that my PPP connection used to be the previous IP address of someone usnig this BearShare application. I edited the actual capture : I replaced my current IP address by xx.xx.xxx.xxx. Well I hope it help :) ================================================================================== GET /uri-res/N2R?urn:sha1:VEYYKVX5DZL7AT5LT4QY6RNHW3VZQO2Z HTTP/1.1 Connection: Keep-Alive Host: xx.xx.xxx.xxx:14059 User-Agent: BearShare 4.4.1.16 Range: bytes=147831901-168950743 Content-Disposition: inline; filename=TLF-GAME-11.30.03.Spellforce_Order_Of_Dawn-FLT-CD1-ENG.bin X-Queue: 0.1 X-Alt: 217.211.198.218,80.57.57.229:21927,213.132.131.181:32920 X-Gnutella-Content-URN: urn:bitprint:VEYYKVX5DZL7AT5LT4QY6RNHW3VZQO2Z.LXKQZ7AOIII4KMR7YT3W4QNHQC43GQFX4IQOPLA X-Connection-Type: T1 FP-1a: 128,p?0?6??cL]Ofj??FwX8???\g?A8??�9!C FP-Auth-Challenge: 7PELWD3OZSVQNHP5GA5CDK23UUZRQYO5 X-Features: browse/1.0, queue/0.1 X-Node: 24.1.34.128:6346 ==================================================================================
CVE Links
CVE # Description