Loading...
[get complete service list]
Port Information
Protocol Service Name
tcp --- ---
Top IPs Scanning
Today Yesterday
45.142.193.107 (5)45.142.193.107 (7)
194.180.49.183 (1)89.248.163.188 (5)
109.205.213.5 (1)92.118.39.16 (4)
User Comments
Submitted By Date
Comment
2004-05-21 15:39:10
Here is an interception of traffic on destination port TCP/14059 done with the help of nc (netcat): Command used : echo ====== ; nc -l -n -p 14059 ; echo ====== It seems to be a Peer2Peer application based on Gnutella called BearShare. I added the lines made from "=" to mark start and stop of traffic. I assume that my PPP connection used to be the previous IP address of someone usnig this BearShare application. I edited the actual capture : I replaced my current IP address by xx.xx.xxx.xxx. Well I hope it help :) ================================================================================== GET /uri-res/N2R?urn:sha1:VEYYKVX5DZL7AT5LT4QY6RNHW3VZQO2Z HTTP/1.1 Connection: Keep-Alive Host: xx.xx.xxx.xxx:14059 User-Agent: BearShare 4.4.1.16 Range: bytes=147831901-168950743 Content-Disposition: inline; filename=TLF-GAME-11.30.03.Spellforce_Order_Of_Dawn-FLT-CD1-ENG.bin X-Queue: 0.1 X-Alt: 217.211.198.218,80.57.57.229:21927,213.132.131.181:32920 X-Gnutella-Content-URN: urn:bitprint:VEYYKVX5DZL7AT5LT4QY6RNHW3VZQO2Z.LXKQZ7AOIII4KMR7YT3W4QNHQC43GQFX4IQOPLA X-Connection-Type: T1 FP-1a: 128,p?0?6??cL]Ofj??FwX8???\g?A8??¿9!C FP-Auth-Challenge: 7PELWD3OZSVQNHP5GA5CDK23UUZRQYO5 X-Features: browse/1.0, queue/0.1 X-Node: 24.1.34.128:6346 ==================================================================================
CVE Links
CVE # Description