Property
ntp
Property Name |
Type |
Description |
Required |
clk_jitter |
number, string |
|
|
clk_wander |
number, string |
|
|
clock |
string
|
|
|
clock_offset |
number
|
|
Yes
|
delay |
number
|
|
Yes
|
frequency |
number, string |
|
|
jitter |
number, string |
|
|
leap |
integer, string |
|
Yes
|
mintc |
integer
|
|
|
monlist |
NtpMonlist
|
|
|
noise |
number, string |
|
|
offset |
number, string |
|
|
peer |
integer, string |
|
|
phase |
integer, string |
|
|
poll |
integer, string |
|
Yes
|
precision |
integer
|
|
Yes
|
processor |
string
|
|
|
refid |
string
|
|
Yes
|
reftime |
string
|
|
Yes
|
root_delay |
number, string |
|
Yes
|
root_dispersion |
number, string |
|
Yes
|
rootdelay |
number, string |
|
|
rootdisp |
number, string |
|
|
stability |
number, string |
|
|
state |
integer
|
|
|
stratum |
integer
|
|
Yes
|
sys_jitter |
number, string |
|
|
system |
string
|
|
|
tai |
integer, string |
|
|
tc |
integer
|
|
|
version |
string
|
|
Yes
|
NtpMonlist
Property Name |
Type |
Description |
Required |
connections |
array of string
|
|
Yes
|
more |
boolean
|
|
Yes
|
↑ TopSearch Queries
SearchNTP services that return a list of recent connections which can be abused in DDoS reflection attacksntp.ip_count:>0
{
"root_delay": 0.3518524169921875,
"rootdisp": 625.35,
"clock_offset": -624.0383052825928,
"stability": 0.527,
"frequency": -2.406,
"jitter": 265.991,
"leap": 0,
"poll": 9,
"clock": "0xdff16a70.6e838b56",
"system": "Linux/2.6.23.17",
"delay": 0.8453531265258789,
"state": 4,
"version": "ntpd 4.2.5p113@1.1720 Fri Jul 8 20:06:38 UTC 2016 (4)",
"rootdelay": 351.862,
"stratum": 2,
"noise": 36.629,
"precision": -14,
"reftime": "0xdff1679e.2dad2b63",
"offset": -116.195,
"peer": 20401,
"refid": "200.160.7.186",
"processor": "ppc",
"root_dispersion": 0.62530517578125,
"monlist": {
"connections": [
"0.124.91.39:38286",
"200.186.125.195:123",
"201.49.148.135:123",
"200.192.232.8:123",
"200.160.7.186:123"
],
"more": false
}
}