Loading...
[get complete service list]
Port Information
Protocol Service Name
tcp isakmp VPN Key Exchange
udp isakmp VPN Key Exchange
Top IPs Scanning
Today Yesterday
46.23.108.21 (197)188.143.55.28 (545)
88.5.70.68 (196)212.15.62.163 (291)
102.223.33.73 (36)152.58.192.248 (200)
5.101.6.131 (32)85.209.11.189 (101)
45.33.40.18 (32)36.236.229.152 (82)
89.215.221.153 (29)80.82.70.133 (82)
89.248.163.205 (29)146.88.241.190 (79)
80.82.70.133 (28)212.185.50.242 (76)
199.45.155.94 (24)146.88.241.30 (71)
202.142.150.52 (24)89.248.163.205 (61)
Port diary mentions
URL
Critical Cisco ASA IKEv1v2 Vulnerability. Active Scanning Detected
User Comments
Submitted By Date
Comment
PC.Tech 2016-02-13 01:42:50
Per: - https://www.kb.cert.org/vuls/id/327976 11 Feb 2016 - "... Note that Cisco ASA versions 7.2, 8.2, 8.3, and 8.6 are affected but no-longer-supported by the vendor. Users of these versions should strongly consider migrating to a supported solution..." //
2016-02-11 01:32:24
CVE-2016-1287 - Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability For details see https://blog.exodusintel.com/2016/01/26/firewall-hacking/ or https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike
Javier Fernandez-Sanguino 2003-05-11 03:20:54
This port might be used by vulnerability CAN-2003-0108 (affects tcpdump) and CAN-2002-1103 (affects the Cisco VPN concentrator) There seems to be increasing scanning in this port (as described in http://cert.uni-stuttgart.de/archive/intrusions/2003/01/msg00374.html) which might be related to the release of a new tool (ike-scan, see http://cert.uni-stuttgart.de/archive/intrusions/2003/01/msg00354.html)
CVE Links
CVE # Description
CVE-2016-1287
CVE-2017-5205