Fonctionner aigu fragment 52869 port Maryanne Jones Incarner Fontaine
UPnProxyPot:
Darknet - Satori strikes again | SISSDEN
Darknet - early observations of Satori botnet | SISSDEN
Greifswald | Hanseatic City, Baltic Sea, University | Britannica
JPCERT/CC Internet Threat Monitoring Report [January 1, 2019 ~ March 31 , 2019]
Front PAIR Disc Brake Calipers for 2010-2018 Mercedes-Benz Sprinter 2500 ( 52869) | eBay
When Cameras and Routers attack Phones. Spike in CVE-2014-8361 Exploits Against Port 52869 - SANS Internet Storm Center
ZXHN H108N have port 52869 open · Issue #650 · threat9/routersploit · GitHub
Analyzing TCP port scan | D4 Project
Client talks on udp 9944 but server listens on 9943 · Issue #628 · polygraphene/ALVR · GitHub
Satori Adds Known Exploit Chain to Enslave Wireless IP Cameras
Warning: Satori, a Mirai Branch Is Spreading in Worm Style on Port 37215 and 52869
ZXHN H108N have port 52869 open · Issue #650 · threat9/routersploit · GitHub
Rise of One More Mirai Worm Variant
ZXHN H108N have port 52869 open · Issue #650 · threat9/routersploit · GitHub
Analyzing TCP port scan | D4 Project
Warning: Satori, a Mirai Branch Is Spreading in Worm Style on Port 37215 and 52869
Protect the Network: Threat Intelligence
What is Shodan? Diving into the Google of IoT Devices
Masafumi Negishi on Twitter: "Another moobot variant has been scanning 9530/tcp since May 25, mostly infected in Japan. The threat actor exploited CVE-2014-8361 on 52869/tcp. Many home routers in Japan remain vulnerable