Loading...
[get complete service list]
Port Information
Protocol Service Name
tcp --- ---
Top IPs Scanning
Today Yesterday
162.216.149.6 (2)35.203.210.164 (10)
190.83.84.216 (1)147.185.133.102 (8)
190.83.85.2 (1)147.185.133.186 (8)
190.83.86.108 (1)162.216.150.77 (7)
35.203.211.246 (1)147.185.132.167 (6)
190.83.85.44 (1)35.203.210.139 (6)
190.83.87.79 (1)35.203.211.213 (5)
190.83.87.47 (1)162.216.149.31 (5)
190.83.87.31 (1)185.208.158.103 (5)
190.83.86.151 (1)147.185.133.168 (4)
User Comments
Submitted By Date
Comment
Orazio Mistretta 2006-12-22 13:58:41
Kind of traffic seen in association with eDonkey 2000 and/or trojan activity: N. events conversations ======================== 216 tcp 10.1.6.100 -> 83.149.72.127(4661) eDonkey2000 Server Port 213 tcp 10.1.6.100 -> 213.251.161.103(4661) “ 213 tcp 10.1.6.100 -> 84.16.224.61(4661) “ 213 tcp 10.1.6.100 -> 83.149.72.197(22661) 212 tcp 10.1.6.100 -> 83.149.72.131(3661) eDonkey2000 Server Port 212 tcp 10.1.6.100 -> 213.186.45.91(4661) eDonkey2000 Server Port 212 udp 10.1.3.60 -> 255.255.255.255(2968) Symantec AV, Radmin trojan 210 tcp 10.1.6.100 -> 213.202.245.194(4661) eDonkey2000 Server Port 210 tcp 10.1.6.100 -> 83.149.72.187(9661) 210 tcp 10.1.6.100 -> 64.34.193.61(2345) 210 tcp 10.1.6.100 -> 84.16.224.50(4661) eDonkey2000 Server Port 210 tcp 10.1.6.100 -> 83.149.72.192(12661) 210 tcp 10.1.6.100 -> 83.149.72.193(13661) 210 tcp 10.1.6.100 -> 83.149.72.198(24661) 210 tcp 10.1.6.100 -> 61.234.11.22(4661) eDonkey2000 Server Port 210 tcp 10.1.6.100 -> 64.34.194.180(7632) 210 tcp 10.1.6.100 -> 83.149.72.133(7661) 210 tcp 10.1.6.100 -> 64.34.194.180(2672) 210 tcp 10.1.6.100 -> 80.239.200.104(3000) [trojan] InetSpy 210 tcp 10.1.6.100 -> 80.239.200.106(3000) “ 209 tcp 10.1.6.100 -> 80.239.200.105(3000) “
CVE Links
CVE # Description