Threat Level: green Handler on Duty: Xavier Mertens

SANS ISC: Port 1194 (tcp/udp) Attack Activity Port 1194 (tcp/udp) Attack Activity


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Loading...
[get complete service list]
Port Information
Protocol Service Name
tcp openvpn OpenVPN
Top IPs Scanning
TodayYesterday
204.15.110.167 (28298)45.121.208.211 (25050)
66.70.235.15 (3101)185.157.246.248 (14656)
51.89.135.167 (3065)172.96.166.138 (11615)
51.161.105.91 (2653)170.238.55.1 (7744)
35.211.145.71 (2374)67.55.77.188 (5547)
192.95.52.29 (2262)67.21.32.117 (5119)
167.114.125.229 (2240)98.110.48.83 (4424)
54.39.201.101 (2238)192.99.226.10 (4148)
51.89.208.88 (2173)217.146.82.102 (4025)
167.114.103.158 (2090)145.239.205.26 (3788)
User Comments
Submitted By Date
Comment
Kay Wischkony 2005-04-14 17:54:14
Recently registered by IANA for OpenVPN. See <http://www.openvpn.org/>
Add a comment
CVE Links
CVE # Description
CVE-2014-0160 The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
CVE-2014-0160 The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.