The Shadowserver Foundation Vulnerable Netis Router Scanning Project

Vulnerable Netis Router Scanning Project. If you are looking at this page, then more than likely, you noticed a scan coming from this server across your network andor poking at port 53413udp. As was recently reported by Trend Micro. A backdoor on port 53413udp is present on many routers produced by Netcore under the Netis brand name. Information on these vulnerable devices has been incorporated into our reports. And are being reported on a daily basis. We are querying all computers with routable IPv4 .

OVERVIEW

The website netisscan.shadowserver.org currently has a traffic ranking of zero (the smaller the better). We have parsed three pages within the site netisscan.shadowserver.org and found two websites referencing netisscan.shadowserver.org.
Pages Parsed
3
Links to this site
2

NETISSCAN.SHADOWSERVER.ORG TRAFFIC

The website netisscan.shadowserver.org has seen varying quantities of traffic through the year.
Traffic for netisscan.shadowserver.org

Date Range

1 week
1 month
3 months
This Year
Last Year
All time
Traffic ranking (by month) for netisscan.shadowserver.org

Date Range

All time
This Year
Last Year
Traffic ranking by day of the week for netisscan.shadowserver.org

Date Range

All time
This Year
Last Year
Last Month

LINKS TO WEBSITE

WHAT DOES NETISSCAN.SHADOWSERVER.ORG LOOK LIKE?

Desktop Screenshot of netisscan.shadowserver.org Mobile Screenshot of netisscan.shadowserver.org Tablet Screenshot of netisscan.shadowserver.org

NETISSCAN.SHADOWSERVER.ORG SERVER

I detected that the main page on netisscan.shadowserver.org took two hundred and three milliseconds to download. I observed a SSL certificate, so in conclusion I consider this site secure.
Load time
0.203 sec
SSL
SECURE
IP
184.105.143.133

SERVER SOFTWARE

We identified that this website is implementing the Apache/2.4.18 (Ubuntu) server.

SITE TITLE

The Shadowserver Foundation Vulnerable Netis Router Scanning Project

DESCRIPTION

Vulnerable Netis Router Scanning Project. If you are looking at this page, then more than likely, you noticed a scan coming from this server across your network andor poking at port 53413udp. As was recently reported by Trend Micro. A backdoor on port 53413udp is present on many routers produced by Netcore under the Netis brand name. Information on these vulnerable devices has been incorporated into our reports. And are being reported on a daily basis. We are querying all computers with routable IPv4 .

PARSED CONTENT

The website netisscan.shadowserver.org states the following, "If you are looking at this page, then more than likely, you noticed a scan coming from this server across your network andor poking at port 53413udp." I analyzed that the website said " As was recently reported by Trend Micro." They also stated " A backdoor on port 53413udp is present on many routers produced by Netcore under the Netis brand name. Information on these vulnerable devices has been incorporated into our reports. And are being reported on a daily basis. We are querying all computers with routable IPv4 ."

ANALYZE OTHER WEBSITES

The Shadowserver Foundation NTP Monitor Mode 7 Scanning Project

The Shadowserver Foundation is currently undertaking a project to search for publicly accessible devices that have NTP running and answering Mode 7 queries for MON GET LIST. The goal of this project is to identify openly accessible NTP services and report them back to the network owners for remediation. If you would like t.

The Shadowserver Foundation Quote of the Day Service Scanning Project

Open Quote of the Day Service Scanning Project. These devices have the potential to be used in UDP amplification attacks and if at all possible, we would like to see these services made un-available to miscreants that would misuse these resources. Servers that are configured this way have been incorporated into our reports.

The Shadowserver Foundation Redis key-value Store Scanning Project

Open Redis Key-Value Store Scanning Project. The Shadowserver Foundation is currently undertaking a project to search for publicly accessible devices that have the Redis service running. The goal of this project is to identify openly accessible systems that have Redis running and report them back to the network owners for remediation.

The Shadowserver Foundation SNMP Scanning Project

The Shadowserver Foundation is currently undertaking a project to search for publicly accessible devices that have SNMP running. The goal of this project is to identify openly accessible SNMP services and report them back to the network owners for remediation. Servers that are configured this way will be incorporated into our reports.

App Builders Switzerland 2017

A Conference about mobile technologies in the heart of Europe. Learn from great thinkers, that are part of the community. Get inspired by talks from the best gurus and professionals of the mobile industry. All day long you can participate in sessions on iOS and Android and meet other professionals, creating a priceless network of contacts. Learn about the latest advancements in Apple and Google technologies. Meet our delightful panel of speakers. Every year he learns a new pro.