Loading...
[get complete service list]
Port Information
Protocol Service Name
tcp https HTTP protocol over TLS SSL
udp https HTTP protocol over TLS/SSL
TCP [ICS] OPC UA XML [ICS] OPC UA XML
Top IPs Scanning
Today Yesterday
3.75.75.221 (24067)3.75.75.221 (37907)
74.50.49.39 (10474)74.50.49.39 (14601)
23.106.39.233 (3331)176.124.222.226 (13044)
15.184.38.61 (3250)23.106.39.233 (10339)
45.148.10.86 (3169)23.161.168.55 (6796)
45.85.0.157 (2118)45.85.0.157 (6551)
66.249.64.132 (2039)103.77.224.85 (5993)
95.179.217.27 (1633)34.34.25.238 (4329)
45.76.32.119 (1551)172.65.239.124 (3578)
103.229.73.213 (1517)104.234.224.62 (3202)
Port diary mentions
URL
LSASS exploit, SSL PCT exploits, port 559 (tcp) proxy hunter, Bagle.Z
Increased SSL Activity; Exploits for MS04-022; Mailbag
Quiet Day;TCP443; Firefox GIF image handling heap overflow exploit; MS javaprxy.dll update
port 443 https increase
[Guest Diary] Dissecting DarkGate: Modular Malware Delivery and Persistence as a Service.
[Guest Diary] Dissecting DarkGate: Modular Malware Delivery and Persistence as a Service.
User Comments
Submitted By Date
Comment
Sunny Dhbahai 2013-03-05 13:43:50
Redis Server Port which client can run queries. Default Port Exposed to Internet Could Face Brute Force Attacks. Nmap Brute Force Script For Radis: http://nmap.org/nsedoc/scripts/redis-brute.html
Alexander Dupuy 2010-11-23 14:17:15
UDP/443 is typically Skype traffic. From http://download.skype.com/share/business/guides/skype-it-administrators-guide.pdf (p.10 section 2.1.2 Operations): "It also uses UDP 443 to test network connectivity." These network probes typically have 18 byte payloads from the client (dst port UDP/443) and 26 byte payloads from the server (src port UDP/443)
CVE Links
CVE # Description
CVE-2014-0160 The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
CVE-2014-0224 OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
CVE-2014-6321
CVE-2016-8610 A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.