IP address: 193.27.228.154

Host rating:

2.0

out of 27 votes

Last update: 2020-10-25

Host details

Unknown
Unknown
Unknown
Unknown
See comments

Reported breaches

  • Port scan
Report breach

User comments

27 security incident(s) reported by users

BHD Honeypot
Port scan
2020-10-25

In the last 24h, the attacker (193.27.228.154) attempted to scan 5 ports.
The following ports have been scanned: 4973/tcp, 3753/tcp (NattyServer Port), 3696/tcp (Telnet Com Port Control), 4969/tcp (CCSS QMessageMonitor), 4339/tcp.
      
BHD Honeypot
Port scan
2020-10-23

In the last 24h, the attacker (193.27.228.154) attempted to scan 25 ports.
The following ports have been scanned: 4810/tcp, 4979/tcp, 5545/tcp, 4833/tcp, 3697/tcp (NavisWorks License System), 3836/tcp (MARKEM NEXTGEN DCP), 3710/tcp (PortGate Authentication), 3615/tcp (Start Messaging Network), 4826/tcp, 5481/tcp, 4136/tcp (Classic Line Database Server Request), 5011/tcp (TelepathAttack), 3979/tcp (Smith Micro Wide Area Network Service), 3585/tcp (Emprise License Server), 3635/tcp (Simple Distributed Objects), 3966/tcp (BuildForge Lock Manager), 4992/tcp, 3594/tcp (MediaSpace), 3835/tcp (Spectar Database Rights Service), 5012/tcp (NetOnTap Service), 4249/tcp, 5124/tcp, 4811/tcp, 5165/tcp (ife_1corp), 3947/tcp (Connect and Control Protocol for Consumer, Commercial, and Industrial Electronic Devices).
      
BHD Honeypot
Port scan
2020-10-22

Port scan from IP: 193.27.228.154 detected by psad.
BHD Honeypot
Port scan
2020-10-12

In the last 24h, the attacker (193.27.228.154) attempted to scan 5 ports.
The following ports have been scanned: 5431/tcp (PARK AGENT), 3693/tcp, 5376/tcp, 4441/tcp, 5024/tcp (SCPI-TELNET).
      
BHD Honeypot
Port scan
2020-10-12

Port scan from IP: 193.27.228.154 detected by psad.
BHD Honeypot
Port scan
2020-10-11

In the last 24h, the attacker (193.27.228.154) attempted to scan 5 ports.
The following ports have been scanned: 4720/tcp, 4433/tcp, 3735/tcp (Password Distribution), 3962/tcp (SBI Agent Protocol), 4065/tcp (Avanti Common Data).
      
BHD Honeypot
Port scan
2020-10-09

In the last 24h, the attacker (193.27.228.154) attempted to scan 5 ports.
The following ports have been scanned: 4039/tcp (Fazzt Administration), 5324/tcp, 4302/tcp (Diagnostic Data Control), 3842/tcp (NHCI status port), 4944/tcp.
      
BHD Honeypot
Port scan
2020-10-08

In the last 24h, the attacker (193.27.228.154) attempted to scan 10 ports.
The following ports have been scanned: 5387/tcp, 3700/tcp (LRS NetPage), 4768/tcp, 5101/tcp (Talarian_TCP), 4045/tcp (Network Paging Protocol), 4512/tcp, 5386/tcp, 3968/tcp (iAnywhere DBNS), 5455/tcp (APC 5455), 5483/tcp.
      
BHD Honeypot
Port scan
2020-10-07

In the last 24h, the attacker (193.27.228.154) attempted to scan 5 ports.
The following ports have been scanned: 4156/tcp (STAT Results), 3708/tcp (Sun App Svr - Naming), 3577/tcp (Configuration Port), 4351/tcp (PLCY Net Services), 5468/tcp.
      
BHD Honeypot
Port scan
2020-10-06

Port scan from IP: 193.27.228.154 detected by psad.
BHD Honeypot
Port scan
2020-10-04

In the last 24h, the attacker (193.27.228.154) attempted to scan 5 ports.
The following ports have been scanned: 4974/tcp, 5409/tcp (Salient Data Server), 5521/tcp, 3576/tcp (Coalsere CMC Port), 4831/tcp.
      
BHD Honeypot
Port scan
2020-10-03

In the last 24h, the attacker (193.27.228.154) attempted to scan 5 ports.
The following ports have been scanned: 3819/tcp (EPL Sequ Layer Protocol), 3687/tcp (simple-push), 5128/tcp, 3735/tcp (Password Distribution), 4761/tcp.
      
BHD Honeypot
Port scan
2020-10-02

In the last 24h, the attacker (193.27.228.154) attempted to scan 10 ports.
The following ports have been scanned: 5518/tcp, 4275/tcp, 4624/tcp, 4133/tcp (NUTS Bootp Server), 4377/tcp (Cambridge Pixel SPx Server), 5475/tcp, 4032/tcp (VERITAS Authorization Service), 3707/tcp (Real-Time Event Secure Port), 4823/tcp, 4243/tcp.
      
BHD Honeypot
Port scan
2020-10-01

In the last 24h, the attacker (193.27.228.154) attempted to scan 20 ports.
The following ports have been scanned: 4311/tcp (P6R Secure Server Management Console), 4199/tcp (EIMS ADMIN), 4424/tcp, 5469/tcp, 5023/tcp (Htuil Server for PLD2), 4608/tcp, 5229/tcp, 4429/tcp (OMV Investigation Agent-Server), 5427/tcp (SCO-PEER-TTA), 3600/tcp (text relay-answer), 5462/tcp (TTL Publisher), 4053/tcp (CosmoCall Universe Communications Port 1), 4569/tcp (Inter-Asterisk eXchange), 3569/tcp (Meinberg Control Service), 5014/tcp, 5388/tcp, 4802/tcp (Icona License System Server), 5453/tcp (SureBox), 5222/tcp (XMPP Client Connection), 4816/tcp.
      
BHD Honeypot
Port scan
2020-09-30

Port scan from IP: 193.27.228.154 detected by psad.
BHD Honeypot
Port scan
2020-09-30

In the last 24h, the attacker (193.27.228.154) attempted to scan 10 ports.
The following ports have been scanned: 5043/tcp (ShopWorX Administration), 4617/tcp, 4797/tcp, 4874/tcp, 4538/tcp (Software Data Exchange Gateway), 4838/tcp (Varadero-1), 4860/tcp, 4337/tcp, 5178/tcp, 4499/tcp.
      
BHD Honeypot
Port scan
2020-09-29

In the last 24h, the attacker (193.27.228.154) attempted to scan 10 ports.
The following ports have been scanned: 4507/tcp, 5259/tcp, 4615/tcp, 4267/tcp, 5504/tcp (fcp-cics-gw1), 3912/tcp (Global Maintech Stars), 4269/tcp, 3705/tcp (Adobe Server 5), 4743/tcp (openhpi HPI service), 4718/tcp.
      
BHD Honeypot
Port scan
2020-09-28

In the last 24h, the attacker (193.27.228.154) attempted to scan 10 ports.
The following ports have been scanned: 4119/tcp (Assuria Log Manager), 5358/tcp (WS for Devices Secured), 5010/tcp (TelepathStart), 5299/tcp (NLG Data Service), 4732/tcp, 4767/tcp, 4256/tcp, 4992/tcp, 4414/tcp, 4105/tcp (ShofarPlayer).
      
BHD Honeypot
Port scan
2020-09-27

In the last 24h, the attacker (193.27.228.154) attempted to scan 25 ports.
The following ports have been scanned: 3799/tcp (RADIUS Dynamic Authorization), 4703/tcp (Network Performance Quality Evaluation System Test Service), 5017/tcp, 4567/tcp (TRAM), 4016/tcp (Talarian Mcast), 4546/tcp (SF License Manager (Sentinel)), 4413/tcp, 5088/tcp, 4043/tcp (Neighbour Identity Resolution), 4472/tcp, 5089/tcp, 4885/tcp (ABBS), 5455/tcp (APC 5455), 5331/tcp, 4450/tcp (Camp), 3788/tcp (SPACEWAY Routing port), 5388/tcp, 3631/tcp (C&S Web Services Port), 4964/tcp, 5349/tcp (STUN Behavior Discovery over TLS), 3824/tcp (Compute Pool Policy), 3891/tcp (Oracle RTC-PM port), 5535/tcp, 4174/tcp, 4914/tcp (Bones Remote Control).
      
BHD Honeypot
Port scan
2020-09-26

In the last 24h, the attacker (193.27.228.154) attempted to scan 5 ports.
The following ports have been scanned: 5244/tcp, 4713/tcp, 5232/tcp, 4565/tcp, 5471/tcp.
      

Blacklist

Near real-time, easy to use data feed containing IPs reported on our website.

Bronze

$3

Updated daily

Learn More

Silver

$15

Updated every hour

Learn More

Gold

$30

Updated every 10 minutes

Learn More

Remarks

Black hat directory contains this IP address, because Internet users reported it as an address making unsolicited, nagging requests. We make every effort to ensure that the information contained in the Black hat directory are correct and up to date. The database is developed and updated by Internet users and moderators.

If you have any reliable information regarding malicious activity originating from this IP address, please share it with others and fill in the 'Report breach' form. It is prohibited from adding personally identifiable information.

Below breach categories are used in the database:

  • Denial of service attack - this attack is accomplished by flooding the target with massive amount of requests in order to overload the targeted system
  • Brute force attack - this category encompasses attempts to login to machine by trying many passwords and usernames
  • Backdoor attack - this category represents bypassing authentication by hidden programs or services to obtain remote access to a computer or trojan activity
  • Port scan - represents attackers identifying running services on the targeted machine by probing a server for open ports
  • Malicious bot - this category encompasses all bots performing unsolicited requests or ignoring robots.txt file
  • Anonymous proxy - public proxies like Tor, I2P relays or anonymous VPNs are often used by attacker to hide his identity
  • Web attack - attempts to exploit web application security flaws
  • CMS attack - attempts to exploit CMS vulnerability
  • App vulnerability attack - attempts to exploit other applications vulnerability
  • Web spam - encompasses all kind of HTTP spamming
  • Email spam - encompasses all kind of E-mail spamming
  • Dodgy activity - this category encompasses superfluous, dodgy requests

Emerging threats

The most commonly reported IP addresses in the last 24 hours

Report breach!

Rate host 193.27.228.154