IP address: 194.26.29.82

Host rating:

2.0

out of 22 votes

Last update: 2020-08-03

Host details

Unknown
Unknown
Unknown
Unknown
See comments

Reported breaches

  • Port scan
Report breach

User comments

22 security incident(s) reported by users

BHD Honeypot
Port scan
2020-08-03

In the last 24h, the attacker (194.26.29.82) attempted to scan 51 ports.
The following ports have been scanned: 93/tcp (Device Control Protocol), 1814/tcp (TDP Suite), 1504/tcp (EVB Software Engineering License Manager), 1057/tcp (STARTRON), 1408/tcp (Sophia License Manager), 296/tcp, 1790/tcp (Narrative Media Streaming Protocol), 143/tcp (Internet Message Access Protocol), 1463/tcp (Nucleus), 1422/tcp (Autodesk License Manager), 162/tcp (SNMPTRAP), 1292/tcp (dsdn), 1347/tcp (multi media conferencing), 362/tcp (SRS Send), 1596/tcp (radio-sm), 1306/tcp (RE-Conn-Proto), 434/tcp (MobileIP-Agent), 20/tcp (File Transfer [Default Data]), 258/tcp, 1092/tcp (Open Business Reporting Protocol), 503/tcp (Intrinsa), 1484/tcp (Confluent License Manager), 1073/tcp (Bridge Control), 1901/tcp (Fujitsu ICL Terminal Emulator Program A), 1026/tcp (Calendar Access Protocol), 1573/tcp (itscomm-ns), 1047/tcp (Sun's NEO Object Request Broker), 52/tcp (XNS Time Protocol), 774/tcp (rpasswd), 1731/tcp (MSICCP), 1809/tcp (Oracle-VP1), 1913/tcp (armadp), 2/tcp (Management Utility), 132/tcp (cisco SYSMAINT), 1918/tcp (IBM Tivole Directory Service - NDS), 1316/tcp (Exbit-ESCP), 335/tcp, 712/tcp (TBRPF), 448/tcp (DDM-Remote DB Access Using Secure Sockets), 1483/tcp (AFS License Manager), 1225/tcp (SLINKYSEARCH), 1175/tcp (Dossier Server), 1759/tcp (SPSS License Manager), 1751/tcp (SwiftNet), 1078/tcp (Avocent Proxy Protocol), 1554/tcp (CACI Products Company License Manager), 1533/tcp (Virtual Places Software), 755/tcp, 1115/tcp (ARDUS Transfer), 976/tcp.
      
BHD Honeypot
Port scan
2020-08-02

In the last 24h, the attacker (194.26.29.82) attempted to scan 55 ports.
The following ports have been scanned: 124/tcp (ANSA REX Trader), 1609/tcp (isysg-lm), 662/tcp (PFTP), 1732/tcp (proxim), 1720/tcp (h323hostcall), 1936/tcp (JetCmeServer Server Port), 1414/tcp (IBM MQSeries), 1373/tcp (Chromagrafx), 676/tcp (VPPS Via), 982/tcp, 716/tcp, 707/tcp (Borland DSJ), 1549/tcp (Shiva Hose), 1161/tcp (Health Polling), 1690/tcp (ng-umds), 1567/tcp (jlicelmd), 62/tcp (ACA Services), 606/tcp (Cray Unified Resource Manager), 1990/tcp (cisco STUN Priority 1 port), 1039/tcp (Streamlined Blackhole), 1354/tcp (Five Across XSIP Network), 1689/tcp (firefox), 1351/tcp (Digital Tool Works (MIT)), 1636/tcp (ISP shared public data control), 246/tcp (Display Systems Protocol), 706/tcp (SILC), 920/tcp, 348/tcp (Cabletron Management Protocol), 575/tcp (VEMMI), 928/tcp, 1423/tcp (Essbase Arbor Software), 277/tcp, 1247/tcp (VisionPyramid), 420/tcp (SMPTE), 965/tcp, 424/tcp (IBM Operations Planning and Control Track), 1639/tcp (cert-initiator), 1494/tcp (ica), 1282/tcp (Emperion), 733/tcp, 1558/tcp (xingmpeg), 1111/tcp (LM Social Server), 51/tcp (IMP Logical Address Maintenance), 19/tcp (Character Generator), 1211/tcp (Groove DPP), 66/tcp (Oracle SQL*NET), 1392/tcp (Print Manager), 417/tcp (Onmux), 353/tcp (NDSAUTH), 734/tcp, 1349/tcp (Registration Network Protocol), 1218/tcp (AeroFlight-ADs), 1394/tcp (Network Log Client), 1445/tcp (Proxima License Manager), 1511/tcp (3l-l1).
      
BHD Honeypot
Port scan
2020-08-01

In the last 24h, the attacker (194.26.29.82) attempted to scan 35 ports.
The following ports have been scanned: 1886/tcp (Leonardo over IP), 794/tcp, 1042/tcp (Subnet Roaming), 1927/tcp (Videte CIPC Port), 820/tcp, 892/tcp, 562/tcp (chcmd), 1045/tcp (Fingerprint Image Transfer Protocol), 847/tcp (dhcp-failover 2), 1536/tcp (ampr-inter), 922/tcp, 1395/tcp (PC Workstation Manager software), 76/tcp (Distributed External Object Store), 1318/tcp (krb5gatekeeper), 1231/tcp (menandmice-lpm), 1828/tcp (itm-mcell-u), 47/tcp (NI FTP), 1066/tcp (FPO-FNS), 1796/tcp (Vocaltec Server Administration), 633/tcp (Service Status update (Sterling Software)), 78/tcp (vettcp), 785/tcp, 1342/tcp (ESBroker), 925/tcp, 26/tcp, 535/tcp (iiop), 587/tcp (Submission), 1975/tcp (TCO Flash Agent), 801/tcp (device), 1767/tcp (cft-6), 1449/tcp (PEport), 1798/tcp (Event Transfer Protocol), 456/tcp (macon-tcp), 128/tcp (GSS X License Verification), 1330/tcp (StreetPerfect).
      
BHD Honeypot
Port scan
2020-08-01

Port scan from IP: 194.26.29.82 detected by psad.
BHD Honeypot
Port scan
2020-07-31

In the last 24h, the attacker (194.26.29.82) attempted to scan 26 ports.
The following ports have been scanned: 240/tcp, 1667/tcp (netview-aix-7), 1789/tcp (hello), 745/tcp, 1198/tcp (cajo reference discovery), 751/tcp (pump), 1272/tcp (CSPMLockMgr), 903/tcp (self documenting Telnet Panic Door), 639/tcp (MSDP), 872/tcp, 166/tcp (Sirius Systems), 1243/tcp (SerialGateway), 1405/tcp (IBM Remote Execution Starter), 1322/tcp (Novation), 618/tcp (DEI-ICDA), 699/tcp (Access Network), 1620/tcp (faxportwinport), 319/tcp (PTP Event), 329/tcp, 281/tcp (Personal Link), 216/tcp (Computer Associates Int'l License Server), 1738/tcp (GameGen1), 1255/tcp (de-cache-query), 720/tcp, 560/tcp (rmonitord).
      
BHD Honeypot
Port scan
2020-07-30

In the last 24h, the attacker (194.26.29.82) attempted to scan 40 ports.
The following ports have been scanned: 570/tcp (demon), 1230/tcp (Periscope), 1301/tcp (CI3-Software-1), 1052/tcp (Dynamic DNS Tools), 1386/tcp (CheckSum License Manager), 1937/tcp (JetVWay Server Port), 517/tcp (like tenex link, but across), 1617/tcp (Nimrod Inter-Agent Communication), 430/tcp (UTMPSD), 1622/tcp (ontime), 460/tcp (skronk), 659/tcp, 110/tcp (Post Office Protocol - Version 3), 409/tcp (Prospero Resource Manager Node Man.), 1634/tcp (Log On America Probe), 955/tcp, 1332/tcp (PCIA RXP-B), 1143/tcp (Infomatryx Exchange), 779/tcp, 48/tcp (Digital Audit Daemon), 940/tcp, 491/tcp (go-login), 1180/tcp (Millicent Client Proxy), 901/tcp (SMPNAMERES), 1393/tcp (Network Log Server), 673/tcp (CIMPLEX), 1810/tcp (Jerand License Manager), 1972/tcp (Cache), 1939/tcp (JetVision Server Port), 1008/tcp, 929/tcp, 417/tcp (Onmux), 375/tcp (Hassle), 1672/tcp (netview-aix-12), 439/tcp (dasp      Thomas Obermair), 548/tcp (AFP over TCP), 1280/tcp (Pictrography), 605/tcp (SOAP over BEEP), 152/tcp (Background File Transfer Program), 1960/tcp (Merit DAC NASmanager).
      
BHD Honeypot
Port scan
2020-07-29

In the last 24h, the attacker (194.26.29.82) attempted to scan 17 ports.
The following ports have been scanned: 1704/tcp (bcs-broker), 635/tcp (RLZ DBase), 1804/tcp (ENL), 555/tcp (dsf), 1373/tcp (Chromagrafx), 1471/tcp (csdmbase), 414/tcp (InfoSeek), 1411/tcp (AudioFile), 857/tcp, 1091/tcp (FF System Management), 838/tcp, 1723/tcp (pptp), 1861/tcp (LeCroy VICP), 66/tcp (Oracle SQL*NET), 969/tcp.
      
BHD Honeypot
Port scan
2020-07-28

In the last 24h, the attacker (194.26.29.82) attempted to scan 10 ports.
The following ports have been scanned: 233/tcp, 1624/tcp (udp-sr-port), 1421/tcp (Gandalf License Manager), 277/tcp, 1144/tcp (Fusion Script), 228/tcp, 998/tcp (busboy), 1321/tcp (PIP), 236/tcp, 726/tcp.
      
BHD Honeypot
Port scan
2020-07-27

In the last 24h, the attacker (194.26.29.82) attempted to scan 45 ports.
The following ports have been scanned: 1187/tcp (Alias Service), 1934/tcp (IBM LM Appl Agent), 1621/tcp (softdataphone), 1470/tcp (Universal Analytics), 1637/tcp (ISP shared local data control), 1586/tcp (ibm-abtact), 1895/tcp, 1093/tcp (PROOFD), 892/tcp, 1995/tcp (cisco perf port), 1823/tcp (Unisys Natural Language License Manager), 1004/tcp, 1618/tcp (skytelnet), 1325/tcp (DX-Instrument), 1581/tcp (MIL-2045-47001), 1590/tcp (gemini-lm), 1857/tcp (DataCaptor), 149/tcp (AED 512 Emulation Service), 1029/tcp (Solid Mux Server), 534/tcp (windream Admin), 386/tcp (ASA Message Router Object Def.), 247/tcp (SUBNTBCST_TFTP), 366/tcp (ODMR), 1306/tcp (RE-Conn-Proto), 1027/tcp, 1376/tcp (IBM Person to Person Software), 328/tcp, 1568/tcp (tsspmap), 1278/tcp (Dell Web Admin 1), 1275/tcp (ivcollector), 1953/tcp (Rapid Base), 424/tcp (IBM Operations Planning and Control Track), 91/tcp (MIT Dover Spooler), 1426/tcp (Satellite-data Acquisition System 1), 1175/tcp (Dossier Server), 1256/tcp (de-server), 917/tcp, 1795/tcp (dpi-proxy), 1244/tcp (isbconference1), 1063/tcp (KyoceraNetDev), 6/tcp, 1736/tcp (street-stream), 1750/tcp (Simple Socket Library's PortMaster), 304/tcp, 1721/tcp (caicci).
      
BHD Honeypot
Port scan
2020-07-27

Port scan from IP: 194.26.29.82 detected by psad.
BHD Honeypot
Port scan
2020-07-26

In the last 24h, the attacker (194.26.29.82) attempted to scan 40 ports.
The following ports have been scanned: 1108/tcp (ratio-adp), 1574/tcp (mvel-lm), 1569/tcp (ets), 1588/tcp (triquest-lm), 1853/tcp (VIDS-AVTP), 1127/tcp (KWDB Remote Communication), 981/tcp, 1479/tcp (dberegister), 1902/tcp (Fujitsu ICL Terminal Emulator Program B), 1118/tcp (SACRED), 1177/tcp (DKMessenger Protocol), 264/tcp (BGMP), 1883/tcp (IBM MQSeries SCADA), 384/tcp (A Remote Network Server System), 1645/tcp (SightLine), 731/tcp (IBM NetView DM/6000 receive/tcp), 1964/tcp (SOLID E ENGINE), 1068/tcp (Installation Bootstrap Proto. Cli.), 1348/tcp (multi media conferencing), 1429/tcp (Hypercom NMS), 1802/tcp (ConComp1), 324/tcp, 1247/tcp (VisionPyramid), 1765/tcp (cft-4), 1189/tcp (Unet Connection), 164/tcp (CMIP/TCP Agent), 1239/tcp (NMSD), 1921/tcp (NoAdmin), 1840/tcp (netopia-vo2), 1639/tcp (cert-initiator), 775/tcp (entomb), 1011/tcp, 1304/tcp (Boomerang), 992/tcp (telnet protocol over TLS/SSL), 173/tcp (Xyplex), 1402/tcp (Prospero Resource Manager), 85/tcp (MIT ML Device), 1346/tcp (Alta Analytics License Manager), 653/tcp (RepCmd), 1855/tcp (Fiorano RtrSvc).
      
BHD Honeypot
Port scan
2020-07-25

In the last 24h, the attacker (194.26.29.82) attempted to scan 35 ports.
The following ports have been scanned: 1863/tcp (MSNP), 1223/tcp (TrulyGlobal Protocol), 1252/tcp (bspne-pcc), 407/tcp (Timbuktu), 1931/tcp (AMD SCHED), 624/tcp (Crypto Admin), 1012/tcp, 1044/tcp (Dev Consortium Utility), 1715/tcp (houdini-lm), 1930/tcp (Drive AppServer), 1646/tcp (sa-msg-port), 1204/tcp (Log Request Listener), 1370/tcp (Unix Shell to GlobalView), 809/tcp, 1990/tcp (cisco STUN Priority 1 port), 1912/tcp (rhp-iibp), 1080/tcp (Socks), 777/tcp (Multiling HTTP), 675/tcp (DCTP), 1899/tcp (MC2Studios), 1106/tcp (ISOIPSIGPORT-1), 540/tcp (uucpd), 920/tcp, 1606/tcp (Salutation Manager (SLM-API)), 1461/tcp (IBM Wireless LAN), 1850/tcp (GSI), 438/tcp (dsfgw), 1165/tcp (QSM GUI Service), 727/tcp, 1176/tcp (Indigo Home Server), 924/tcp, 365/tcp (DTK), 1126/tcp (HP VMM Agent), 912/tcp (APEX relay-relay service), 1768/tcp (cft-7).
      
BHD Honeypot
Port scan
2020-07-24

In the last 24h, the attacker (194.26.29.82) attempted to scan 28 ports.
The following ports have been scanned: 399/tcp (ISO Transport Class 2 Non-Control over TCP), 943/tcp, 1515/tcp (ifor-protocol), 1684/tcp (SnareSecure), 512/tcp (remote process execution;), 75/tcp (any private dial out service), 1991/tcp (cisco STUN Priority 2 port), 1357/tcp (Electronic PegBoard), 1246/tcp (payrouter), 143/tcp (Internet Message Access Protocol), 1536/tcp (ampr-inter), 1185/tcp (Catchpole port), 162/tcp (SNMPTRAP), 867/tcp, 817/tcp, 1286/tcp (netuitive), 724/tcp, 1860/tcp (SunSCALAR Services), 1573/tcp (itscomm-ns), 1167/tcp (Cisco IP SLAs Control Protocol), 418/tcp (Hyper-G), 1235/tcp (mosaicsyssvc1), 1288/tcp (NavBuddy), 436/tcp (DNA-CML), 312/tcp (VSLMP).
      
BHD Honeypot
Port scan
2020-07-23

In the last 24h, the attacker (194.26.29.82) attempted to scan 25 ports.
The following ports have been scanned: 72/tcp (Remote Job Service), 636/tcp (ldap protocol over TLS/SSL (was sldap)), 611/tcp (npmp-gui), 1099/tcp (RMI Registry), 1865/tcp (ENTP), 1259/tcp (Open Network Library Voice), 1124/tcp (HP VMM Control), 385/tcp (IBM Application), 1982/tcp (Evidentiary Timestamp), 165/tcp (Xerox), 1640/tcp (cert-responder), 1308/tcp (Optical Domain Service Interconnect (ODSI)), 905/tcp, 1264/tcp (PRAT), 25/tcp (Simple Mail Transfer), 632/tcp (bmpp), 896/tcp, 485/tcp (Air Soft Power Burst), 1233/tcp (Universal App Server), 865/tcp, 694/tcp (ha-cluster), 243/tcp (Survey Measurement), 1087/tcp (CPL Scrambler Internal), 1067/tcp (Installation Bootstrap Proto. Serv.), 1113/tcp (Licklider Transmission Protocol).
      
BHD Honeypot
Port scan
2020-07-22

In the last 24h, the attacker (194.26.29.82) attempted to scan 41 ports.
The following ports have been scanned: 178/tcp (NextStep Window Server), 1006/tcp, 1851/tcp (ctcd), 795/tcp, 1372/tcp (Fujitsu Config Protocol), 117/tcp (UUCP Path Service), 466/tcp (digital-vrc), 79/tcp (Finger), 1046/tcp (WebFilter Remote Monitor), 1071/tcp (BSQUARE-VOIP), 847/tcp (dhcp-failover 2), 1371/tcp (Fujitsu Config Protocol), 804/tcp, 885/tcp, 1183/tcp (LL Surfup HTTP), 371/tcp (Clearcase), 1356/tcp (CuillaMartin Company), 29/tcp (MSG ICP), 683/tcp (CORBA IIOP), 1831/tcp (Myrtle), 1841/tcp (netopia-vo3), 1200/tcp (SCOL), 1758/tcp (tftp-mcast), 1638/tcp (ISP shared management control), 1834/tcp (ARDUS Unicast), 1026/tcp (Calendar Access Protocol), 355/tcp (DATEX-ASN), 41/tcp (Graphics), 1719/tcp (h323gatestat), 516/tcp (videotex), 1234/tcp (Infoseek Search Agent), 537/tcp (Networked Media Streaming Protocol), 1556/tcp (VERITAS Private Branch Exchange), 1283/tcp (Product Information), 1225/tcp (SLINKYSEARCH), 1996/tcp (cisco Remote SRB port), 1806/tcp (Musiconline), 313/tcp (Magenta Logic), 1015/tcp, 614/tcp (SSLshell).
      
BHD Honeypot
Port scan
2020-07-21

Port scan from IP: 194.26.29.82 detected by psad.
BHD Honeypot
Port scan
2020-07-21

In the last 24h, the attacker (194.26.29.82) attempted to scan 25 ports.
The following ports have been scanned: 1814/tcp (TDP Suite), 718/tcp, 1408/tcp (Sophia License Manager), 1310/tcp (Husky), 620/tcp (SCO WebServer Manager), 352/tcp (bhoedap4 (added 5/21/97)), 1163/tcp (SmartDialer Data Protocol), 1397/tcp (Audio Active Mail), 464/tcp (kpasswd), 1284/tcp (IEE-QFX), 1134/tcp (MicroAPL APLX), 1688/tcp (nsjtp-data), 980/tcp, 1119/tcp (Battle.net Chat/Game Protocol), 1088/tcp (CPL Scrambler Alarm Log), 919/tcp, 1681/tcp (sd-elmd), 792/tcp, 522/tcp (ULP), 1438/tcp (Eicon Security Agent/Server), 1184/tcp (LL Surfup HTTPS), 1669/tcp (netview-aix-9), 846/tcp, 1774/tcp (global-dtserv), 1584/tcp (tn-tl-fd2).
      
BHD Honeypot
Port scan
2020-07-20

In the last 24h, the attacker (194.26.29.82) attempted to scan 52 ports.
The following ports have been scanned: 1741/tcp (cisco-net-mgmt), 1527/tcp (oracle), 1296/tcp (dproxy), 1610/tcp (taurus-wh), 1398/tcp (Video Active Mail), 1531/tcp (rap-listen), 1708/tcp (gat-lmd), 253/tcp, 1161/tcp (Health Polling), 1178/tcp (SGI Storage Manager), 1263/tcp (dka), 1035/tcp (MX-XR RPC), 1907/tcp (IntraSTAR), 754/tcp (send), 832/tcp (NETCONF for SOAP over HTTPS), 268/tcp (Tobit David Replica), 1988/tcp (cisco RSRB Priority 2 port), 1453/tcp (Genie License Manager), 947/tcp, 578/tcp (ipdd), 99/tcp (Metagram Relay), 1192/tcp (caids sensors channel), 146/tcp (ISO-IP0), 9/tcp (Discard), 888/tcp (CD Database Protocol), 187/tcp (Application Communication Interface), 1128/tcp (SAPHostControl over SOAP/HTTP), 1140/tcp (AutoNOC Network Operations Protocol), 403/tcp (decap), 1427/tcp (mloadd monitoring tool), 1047/tcp (Sun's NEO Object Request Broker), 616/tcp (SCO System Administration Server), 1417/tcp (Timbuktu Service 1 Port), 597/tcp (PTC Name Service), 691/tcp (MS Exchange Routing), 672/tcp (VPPS-QUA), 1779/tcp (pharmasoft), 747/tcp (Fujitsu Device Control), 535/tcp (iiop), 353/tcp (NDSAUTH), 1041/tcp (AK2 Product), 1648/tcp (concurrent-lm), 330/tcp, 1363/tcp (Network DataMover Requester), 415/tcp (BNet), 1873/tcp (Fjmpjps), 607/tcp (nqs), 1843/tcp (netopia-vo5), 1503/tcp (Databeam), 473/tcp (hybrid-pop).
      
BHD Honeypot
Port scan
2020-07-19

In the last 24h, the attacker (194.26.29.82) attempted to scan 45 ports.
The following ports have been scanned: 251/tcp, 757/tcp, 1954/tcp (ABR-API (diskbridge)), 1999/tcp (cisco identification port), 1109/tcp, 1495/tcp (cvc), 1879/tcp (NettGain NMS), 1792/tcp (ibm-dt-2), 442/tcp (cvc_hostd), 56/tcp (XNS Authentication), 1859/tcp (Gamma Fetcher Server), 1780/tcp (dpkeyserv), 49/tcp (Login Host Protocol (TACACS)), 1985/tcp (Hot Standby Router Protocol), 1526/tcp (Prospero Data Access Prot non-priv), 1778/tcp (prodigy-internet), 994/tcp (irc protocol over TLS/SSL), 180/tcp (Intergraph), 106/tcp (3COM-TSMUX), 933/tcp, 1744/tcp (ncpm-ft), 107/tcp (Remote Telnet Service), 523/tcp (IBM-DB2), 1122/tcp (availant-mgr), 1156/tcp (iasControl OMS), 959/tcp, 1815/tcp (MMPFT), 300/tcp, 426/tcp (smartsdp), 1010/tcp (surf), 1968/tcp (LIPSinc), 1809/tcp (Oracle-VP1), 1825/tcp (DirecPC Video), 963/tcp, 916/tcp, 1845/tcp (altalink), 1377/tcp (Cichlid License Manager), 27/tcp (NSW User System FE), 1975/tcp (TCO Flash Agent), 818/tcp, 1085/tcp (Web Objects), 622/tcp (Collaborator), 883/tcp, 1698/tcp (RSVP-ENCAPSULATION-1), 1222/tcp (SNI R&D network).
      
BHD Honeypot
Port scan
2020-07-18

In the last 24h, the attacker (194.26.29.82) attempted to scan 35 ports.
The following ports have been scanned: 103/tcp (Genesis Point-to-Point Trans Net), 1206/tcp (Anthony Data), 311/tcp (AppleShare IP WebAdmin), 1663/tcp (netview-aix-3), 544/tcp (krcmd), 584/tcp (Key Server), 171/tcp (Network Innovations Multiplex), 1998/tcp (cisco X.25 service (XOT)), 1978/tcp (UniSQL), 753/tcp (rrh), 1395/tcp (PC Workstation Manager software), 844/tcp, 1805/tcp (ENL-Name), 1241/tcp (nessus), 784/tcp, 1967/tcp (SNS Quote), 202/tcp (AppleTalk Name Binding), 1302/tcp (CI3-Software-2), 50/tcp (Remote Mail Checking Protocol), 1339/tcp (kjtsiteserver), 1817/tcp (RKB-OSCS), 1917/tcp (nOAgent), 322/tcp (RTSPS), 1740/tcp (encore), 1389/tcp (Document Manager), 151/tcp (HEMS), 1697/tcp (rrisat), 776/tcp (wpages), 868/tcp, 643/tcp (SANity), 446/tcp (DDM-Remote Relational Database Access), 1078/tcp (Avocent Proxy Protocol), 340/tcp, 688/tcp (ApplianceWare managment protocol), 221/tcp (Berkeley rlogind with SPX auth).
      

Blacklist

Near real-time, easy to use data feed containing IPs reported on our website.

Bronze

$3

Updated daily

Learn More

Silver

$15

Updated every hour

Learn More

Gold

$30

Updated every 10 minutes

Learn More

Remarks

Black hat directory contains this IP address, because Internet users reported it as an address making unsolicited, nagging requests. We make every effort to ensure that the information contained in the Black hat directory are correct and up to date. The database is developed and updated by Internet users and moderators.

If you have any reliable information regarding malicious activity originating from this IP address, please share it with others and fill in the 'Report breach' form. It is prohibited from adding personally identifiable information.

Below breach categories are used in the database:

  • Denial of service attack - this attack is accomplished by flooding the target with massive amount of requests in order to overload the targeted system
  • Brute force attack - this category encompasses attempts to login to machine by trying many passwords and usernames
  • Backdoor attack - this category represents bypassing authentication by hidden programs or services to obtain remote access to a computer or trojan activity
  • Port scan - represents attackers identifying running services on the targeted machine by probing a server for open ports
  • Malicious bot - this category encompasses all bots performing unsolicited requests or ignoring robots.txt file
  • Anonymous proxy - public proxies like Tor, I2P relays or anonymous VPNs are often used by attacker to hide his identity
  • Web attack - attempts to exploit web application security flaws
  • CMS attack - attempts to exploit CMS vulnerability
  • App vulnerability attack - attempts to exploit other applications vulnerability
  • Web spam - encompasses all kind of HTTP spamming
  • Email spam - encompasses all kind of E-mail spamming
  • Dodgy activity - this category encompasses superfluous, dodgy requests

Report breach!

Rate host 194.26.29.82