Loading...
[get complete service list]
Port Information
Protocol Service Name
tcp NetController [trojan] Net Controller
tcp ntp Network Time Protocol
udp ntp Network Time Protocol
Top IPs Scanning
Today Yesterday
3.143.152.247 (312)162.55.168.236 (1894)
185.196.220.81 (254)198.98.53.199 (1154)
198.98.49.237 (234)198.98.53.92 (795)
194.50.16.198 (94)85.117.241.25 (773)
162.55.168.236 (93)198.98.53.231 (747)
198.98.53.231 (88)185.157.247.125 (654)
45.95.147.219 (78)185.196.220.81 (653)
94.156.105.167 (73)169.197.120.114 (330)
85.199.214.100 (35)194.50.16.198 (330)
80.76.51.249 (31)45.221.98.89 (299)
User Comments
Submitted By Date
Comment
2014-07-05 00:42:34
ntp can be used for amplificating ddos attacks: http://nsfocusblog.com/2014/06/24/nsfocus-releases-ntp-amplification-threat-update/
Kutbuddin Trunkwala 2005-04-19 15:50:12
Two more vulnerabilities pertaining to NTP. http://www.securityfocus.com/bid/6356 Only HP-UX is vulnerable http://www.securityfocus.com/bid/10980 Several Microsoft products/versions affected
Derek Shull - Christian Cyber Security Service Owner 2005-03-26 02:48:26
This is used by Sobig virus. http://www.microsoft.com/isaserver/support/prevent/sobig.asp#aa
CVE Links
CVE # Description
CVE-2015-7703
CVE-2016-9042 An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.