Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c34b40258701751b2901751b2901751b2901751b29
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON download IPC$
Open service 5.35.114.210:445
2024-12-22 01:00
SMB NTLMSSP handshake results: Found Windows 6.1 build 1 NbComputerName: BILL NbDomainName: BILL DNSComputerName: BILL DNSDomainName: BILL
Open service 5.35.114.210:445
2024-12-20 00:35
SMB NTLMSSP handshake results: Found Windows 6.1 build 1 NbComputerName: BILL NbDomainName: BILL DNSComputerName: BILL DNSDomainName: BILL
Open service 5.35.114.210:445
2024-12-18 01:48
SMB NTLMSSP handshake results: Found Windows 6.1 build 1 NbComputerName: BILL NbDomainName: BILL DNSComputerName: BILL DNSDomainName: BILL
Open service 5.35.114.210:445
2024-12-15 23:54
SMB NTLMSSP handshake results: Found Windows 6.1 build 1 NbComputerName: BILL NbDomainName: BILL DNSComputerName: BILL DNSDomainName: BILL
Open service 5.35.114.210:445
2024-12-14 00:07
SMB NTLMSSP handshake results: Found Windows 6.1 build 1 NbComputerName: BILL NbDomainName: BILL DNSComputerName: BILL DNSDomainName: BILL
Open service 5.35.114.210:445
2024-12-12 01:04
SMB NTLMSSP handshake results: Found Windows 6.1 build 1 NbComputerName: BILL NbDomainName: BILL DNSComputerName: BILL DNSDomainName: BILL
Open service 5.35.114.210:445
2024-12-02 01:33
SMB NTLMSSP handshake results: Found Windows 6.1 build 1 NbComputerName: BILL NbDomainName: BILL DNSComputerName: BILL DNSDomainName: BILL
Open service 5.35.114.210:445
2024-11-30 00:47
SMB NTLMSSP handshake results: Found Windows 6.1 build 1 NbComputerName: BILL NbDomainName: BILL DNSComputerName: BILL DNSDomainName: BILL
Open service 5.35.114.210:445
2024-11-28 00:36
SMB NTLMSSP handshake results: Found Windows 6.1 build 1 NbComputerName: BILL NbDomainName: BILL DNSComputerName: BILL DNSDomainName: BILL