IP address: 80.82.70.106

Host rating:

2.0

out of 24 votes

Last update: 2020-01-22

Host details

no-reverse-dns-configured.com.
Seychelles
Anse aux Pins
AS29073 Quasi Networks LTD.
See comments

Reported breaches

  • Port scan
Report breach

Whois record

The publicly-available Whois record found at whois.afrinic.net server.

% This is the AfriNIC Whois server.

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% The WHOIS is temporary unable to query RIPENCC for the requested resource. Please try again later.


User comments

24 security incident(s) reported by users

BHD Honeypot
Port scan
2020-01-22

In the last 24h, the attacker (80.82.70.106) attempted to scan 446 ports.
The following ports have been scanned: 14145/tcp (GCM Application), 6804/tcp, 57572/tcp, 14146/tcp, 53687/tcp, 58612/tcp, 63634/tcp, 9371/tcp, 3031/tcp (Remote AppleEvents/PPC Toolbox), 15156/tcp, 38721/tcp, 51512/tcp, 19196/tcp, 16167/tcp, 21218/tcp, 36104/tcp, 64689/tcp, 57253/tcp, 53531/tcp, 1117/tcp (ARDUS Multicast Transfer), 19896/tcp, 25256/tcp, 30588/tcp, 57935/tcp, 62222/tcp, 56503/tcp, 8668/tcp, 15555/tcp (Cisco Stateful NAT), 56568/tcp, 15458/tcp, 16934/tcp, 5116/tcp, 50277/tcp, 46465/tcp, 12673/tcp, 16034/tcp, 36680/tcp, 18747/tcp, 17867/tcp, 117/tcp (UUCP Path Service), 54546/tcp, 51516/tcp, 7997/tcp, 12635/tcp, 2111/tcp (DSATP), 20116/tcp, 989/tcp (ftp protocol, data, over TLS/SSL), 48967/tcp, 55345/tcp, 226/tcp, 53333/tcp, 544/tcp (krcmd), 17580/tcp, 24249/tcp (Vista 4GL), 63509/tcp, 977/tcp, 34348/tcp, 3663/tcp (DIRECWAY Tunnel Protocol), 787/tcp, 388/tcp (Unidata LDM), 8687/tcp, 49541/tcp, 8448/tcp, 56066/tcp, 15192/tcp, 442/tcp (cvc_hostd), 36365/tcp, 60135/tcp, 30301/tcp, 48876/tcp, 17178/tcp, 12281/tcp, 11113/tcp, 64644/tcp, 9293/tcp (StorView Client), 60189/tcp, 64645/tcp, 21213/tcp, 171/tcp (Network Innovations Multiplex), 48022/tcp, 63637/tcp, 23309/tcp, 55155/tcp, 44447/tcp, 11119/tcp, 42570/tcp, 62622/tcp, 50507/tcp, 47472/tcp, 441/tcp (decvms-sysmgt), 13135/tcp, 4884/tcp (HiveStor Distributed File System), 55255/tcp, 61260/tcp, 48489/tcp, 49079/tcp, 55566/tcp, 4367/tcp, 56792/tcp, 7131/tcp, 464/tcp (kpasswd), 24244/tcp, 44544/tcp, 799/tcp, 63073/tcp, 12222/tcp, 12465/tcp, 52526/tcp, 21283/tcp, 50504/tcp, 22744/tcp, 11938/tcp, 59684/tcp, 3940/tcp (XeCP Node Service), 41411/tcp, 35354/tcp, 18900/tcp, 54542/tcp, 767/tcp (phone), 55559/tcp, 55031/tcp, 46923/tcp, 4076/tcp (Seraph DCS), 933/tcp, 50503/tcp, 17556/tcp, 44442/tcp, 22223/tcp, 20314/tcp, 22288/tcp, 45937/tcp, 20208/tcp, 49458/tcp, 2795/tcp (LiveStats), 18004/tcp, 855/tcp, 11314/tcp, 7654/tcp, 8586/tcp, 646/tcp (LDP), 44508/tcp, 543/tcp (klogin), 23553/tcp, 62089/tcp, 3111/tcp (Web Synchronous Services), 9091/tcp (xmltec-xmlmail), 22522/tcp, 4441/tcp, 61615/tcp, 54140/tcp, 62024/tcp, 23623/tcp, 3112/tcp (KDE System Guard), 13137/tcp, 48168/tcp, 20497/tcp, 53532/tcp, 7111/tcp, 56591/tcp, 57789/tcp, 919/tcp, 11118/tcp, 28288/tcp, 36060/tcp, 115/tcp (Simple File Transfer Protocol), 7475/tcp, 38505/tcp, 2442/tcp (Netangel), 8998/tcp, 21923/tcp, 939/tcp, 9512/tcp, 41362/tcp, 12122/tcp, 13080/tcp, 49495/tcp, 15021/tcp, 59185/tcp, 42224/tcp, 15988/tcp, 22896/tcp, 11877/tcp, 959/tcp, 61618/tcp, 9798/tcp, 7677/tcp (Sun App Server - HTTPS), 7772/tcp, 53533/tcp, 18028/tcp, 9339/tcp, 63730/tcp, 2627/tcp (Moshe Beeri), 18330/tcp, 45451/tcp, 58885/tcp, 56561/tcp, 17301/tcp, 49636/tcp, 49994/tcp, 7021/tcp (DP Serve Admin), 22255/tcp, 949/tcp, 20396/tcp, 765/tcp (webster), 55544/tcp, 558/tcp (SDNSKMP), 20981/tcp, 9596/tcp (Mercury Discovery), 12505/tcp, 19194/tcp (UserAuthority SecureAgent), 47800/tcp, 22422/tcp, 47925/tcp, 61494/tcp, 45459/tcp, 32222/tcp, 881/tcp, 56567/tcp, 62627/tcp, 17051/tcp, 11213/tcp, 62628/tcp, 12515/tcp, 64898/tcp, 64649/tcp, 56609/tcp, 22322/tcp, 59207/tcp, 5014/tcp, 47522/tcp, 884/tcp, 14536/tcp, 17176/tcp, 63631/tcp, 36998/tcp, 47479/tcp, 21365/tcp, 11599/tcp, 52382/tcp, 52225/tcp, 28519/tcp, 18888/tcp (APCNECMP), 44054/tcp, 929/tcp, 424/tcp (IBM Operations Planning and Control Track), 24246/tcp, 63883/tcp, 19589/tcp, 25253/tcp, 64648/tcp, 4554/tcp (MS FRS Replication), 2772/tcp (auris), 747/tcp (Fujitsu Device Control), 661/tcp (HAP), 54485/tcp, 1116/tcp (ARDUS Control), 9394/tcp, 322/tcp (RTSPS), 48487/tcp, 566/tcp (streettalk), 12173/tcp, 733/tcp, 727/tcp, 668/tcp (MeComm), 59594/tcp, 987/tcp, 53537/tcp, 18186/tcp (Occupational Health SC), 11686/tcp, 32325/tcp, 51159/tcp, 18632/tcp, 88/tcp (Kerberos), 50161/tcp, 8118/tcp (Privoxy HTTP proxy), 52716/tcp, 19195/tcp, 3993/tcp (BindView-Agent), 35129/tcp, 39460/tcp, 577/tcp (vnas), 62117/tcp, 16999/tcp, 13757/tcp, 664/tcp (DMTF out-of-band secure web services management protocol), 21802/tcp, 1551/tcp (HECMTL-DB), 8955/tcp, 60607/tcp, 21214/tcp, 50842/tcp, 17539/tcp, 25251/tcp, 5768/tcp (OpenMail CMTS Server), 47487/tcp, 50508/tcp, 53311/tcp, 5453/tcp (SureBox), 62176/tcp, 3443/tcp (OpenView Network Node Manager WEB Server), 55556/tcp, 37076/tcp, 3058/tcp (videobeans), 23077/tcp, 48192/tcp, 20501/tcp, 23333/tcp (Emulex HBAnyware Remote Management), 2353/tcp (pspserver), 255/tcp, 47777/tcp, 59598/tcp, 29554/tcp, 1103/tcp (ADOBE SERVER 2), 8182/tcp (VMware Fault Domain Manager), 599/tcp (Aeolon Core Protocol), 988/tcp, 969/tcp, 54444/tcp, 55573/tcp, 20039/tcp, 64260/tcp, 52524/tcp, 2869/tcp (ICSLAP), 10840/tcp, 55558/tcp, 45456/tcp, 57608/tcp, 22229/tcp, 56569/tcp, 59591/tcp, 1771/tcp (vaultbase), 44422/tcp, 877/tcp, 16412/tcp, 9899/tcp (SCTP TUNNELING), 22225/tcp, 47348/tcp, 16860/tcp, 61614/tcp, 56130/tcp, 61148/tcp, 13932/tcp, 27273/tcp, 55450/tcp, 59599/tcp, 18754/tcp, 16163/tcp, 47554/tcp, 43109/tcp, 1115/tcp (ARDUS Transfer), 41038/tcp, 511/tcp (PassGo), 54544/tcp, 8416/tcp (eSpeech Session Protocol), 2229/tcp (DataLens Service), 38385/tcp, 3782/tcp (Secure ISO TP0 port), 16452/tcp, 11415/tcp, 44443/tcp, 48485/tcp, 1193/tcp (Five Across Server), 63745/tcp, 49496/tcp.
      
BHD Honeypot
Port scan
2020-01-21

In the last 24h, the attacker (80.82.70.106) attempted to scan 376 ports.
The following ports have been scanned: 6804/tcp, 12125/tcp, 58612/tcp, 41838/tcp, 44966/tcp, 9371/tcp, 63381/tcp, 58378/tcp, 36104/tcp, 53372/tcp, 58584/tcp, 23238/tcp, 56636/tcp, 63633/tcp, 636/tcp (ldap protocol over TLS/SSL (was sldap)), 52222/tcp, 57935/tcp, 61569/tcp, 64813/tcp, 393/tcp (Meta5), 62222/tcp, 565/tcp (whoami), 45788/tcp, 8668/tcp, 55755/tcp, 611/tcp (npmp-gui), 52903/tcp, 15186/tcp, 63307/tcp, 48734/tcp, 5859/tcp (WHEREHOO), 54546/tcp, 50570/tcp, 64643/tcp, 64446/tcp, 54398/tcp, 27546/tcp, 32328/tcp, 33757/tcp, 62649/tcp, 22314/tcp, 22611/tcp, 64470/tcp, 55511/tcp, 22228/tcp, 27275/tcp, 787/tcp, 466/tcp (digital-vrc), 29298/tcp, 388/tcp (Unidata LDM), 48877/tcp, 8687/tcp, 48679/tcp, 49541/tcp, 51620/tcp, 22226/tcp, 29255/tcp, 56066/tcp, 7576/tcp, 5119/tcp, 48876/tcp, 7980/tcp (Quest Vista), 16164/tcp, 37371/tcp, 49125/tcp, 60189/tcp, 33322/tcp, 64645/tcp, 47454/tcp, 7117/tcp, 171/tcp (Network Innovations Multiplex), 45455/tcp, 52894/tcp, 55855/tcp, 334/tcp, 22068/tcp, 13597/tcp, 11119/tcp, 822/tcp, 54124/tcp, 50507/tcp, 47471/tcp, 24247/tcp, 21671/tcp, 18187/tcp (OPSEC ELA), 34087/tcp, 40095/tcp, 7273/tcp (OMA Roaming Location), 77/tcp (any private RJE service), 9119/tcp (MXit Instant Messaging), 62584/tcp, 464/tcp (kpasswd), 21982/tcp, 34931/tcp, 47555/tcp, 47830/tcp, 44544/tcp, 63073/tcp, 885/tcp, 52526/tcp, 30308/tcp, 678/tcp (GNU Generation Foundation NCP), 17177/tcp, 63891/tcp, 35354/tcp, 55031/tcp, 46923/tcp, 6402/tcp (boe-eventsrv), 45520/tcp, 1091/tcp (FF System Management), 119/tcp (Network News Transfer Protocol), 38386/tcp, 50503/tcp, 17556/tcp, 42426/tcp, 61500/tcp, 46701/tcp, 45937/tcp, 20208/tcp, 2795/tcp (LiveStats), 39059/tcp, 21219/tcp, 9351/tcp, 33429/tcp, 4994/tcp, 53638/tcp, 50052/tcp, 363/tcp (RSVP Tunnel), 7557/tcp, 211/tcp (Texas Instruments 914C/G Terminal), 53930/tcp, 889/tcp, 24245/tcp, 7625/tcp, 11280/tcp, 55522/tcp, 45730/tcp, 3112/tcp (KDE System Guard), 34192/tcp, 20497/tcp, 2829/tcp (silkp1), 53532/tcp, 39820/tcp, 11408/tcp, 919/tcp, 5447/tcp, 21111/tcp, 112/tcp (McIDAS Data Transmission Protocol), 22338/tcp, 51394/tcp, 343/tcp, 2442/tcp (Netangel), 8998/tcp, 449/tcp (AS Server Mapper), 24734/tcp, 434/tcp (MobileIP-Agent), 9512/tcp, 50716/tcp, 45555/tcp, 49388/tcp, 6768/tcp (BMC PERFORM MGRD), 43878/tcp, 522/tcp (ULP), 23214/tcp, 34342/tcp, 62498/tcp, 38387/tcp, 33377/tcp, 42224/tcp, 28588/tcp, 811/tcp, 40409/tcp, 11877/tcp, 24168/tcp, 48339/tcp, 8344/tcp, 23140/tcp, 58218/tcp, 665/tcp (Sun DR), 1661/tcp (netview-aix-1), 9798/tcp, 30563/tcp, 161/tcp (SNMP), 9339/tcp, 52606/tcp, 63730/tcp, 3817/tcp (Yosemite Tech Tapeware), 10328/tcp, 47476/tcp, 28284/tcp, 58885/tcp, 56657/tcp, 18473/tcp, 336/tcp, 4142/tcp (Document Server), 9889/tcp (Port for Cable network related data proxy or repeater), 7021/tcp (DP Serve Admin), 7682/tcp, 45553/tcp, 64230/tcp, 949/tcp, 54541/tcp, 55544/tcp, 50964/tcp, 64354/tcp, 778/tcp, 24248/tcp, 59597/tcp, 19194/tcp (UserAuthority SecureAgent), 14148/tcp, 49498/tcp, 56782/tcp, 25257/tcp, 26394/tcp, 9111/tcp, 10019/tcp, 455/tcp (CreativePartnr), 62628/tcp, 20546/tcp, 51612/tcp, 14282/tcp, 64649/tcp, 13480/tcp, 59207/tcp, 36639/tcp, 50502/tcp, 17176/tcp, 63631/tcp, 47479/tcp, 58200/tcp, 686/tcp (Hardware Control Protocol Wismar), 424/tcp (IBM Operations Planning and Control Track), 63883/tcp, 545/tcp (appleqtcsrvr), 292/tcp, 44455/tcp, 6336/tcp, 27652/tcp, 21824/tcp, 23628/tcp, 733/tcp, 35357/tcp, 11686/tcp, 60101/tcp, 18632/tcp, 88/tcp (Kerberos), 8118/tcp (Privoxy HTTP proxy), 51730/tcp, 14576/tcp, 55786/tcp, 331/tcp, 32335/tcp, 26267/tcp, 52716/tcp, 51513/tcp, 62625/tcp, 552/tcp (DeviceShare), 335/tcp, 58457/tcp, 62117/tcp, 15158/tcp, 557/tcp (openvms-sysipc), 57574/tcp, 17539/tcp, 776/tcp (wpages), 353/tcp (NDSAUTH), 19756/tcp, 48486/tcp, 62176/tcp, 38103/tcp, 47777/tcp, 8182/tcp (VMware Fault Domain Manager), 446/tcp (DDM-Remote Relational Database Access), 44488/tcp, 20039/tcp, 5132/tcp, 50877/tcp, 35300/tcp, 46467/tcp, 32324/tcp, 10840/tcp, 494/tcp (POV-Ray), 57608/tcp, 46463/tcp, 797/tcp, 688/tcp (ApplianceWare managment protocol), 52522/tcp, 877/tcp, 16412/tcp, 46468/tcp, 22225/tcp, 47348/tcp, 7887/tcp (Universal Broker), 61614/tcp, 9449/tcp, 51519/tcp, 61148/tcp, 13932/tcp, 47774/tcp, 7374/tcp, 7337/tcp, 53640/tcp, 43491/tcp, 36179/tcp, 3536/tcp (SNAC), 59599/tcp, 16163/tcp, 14687/tcp, 52527/tcp, 54544/tcp, 19403/tcp, 2229/tcp (DataLens Service), 3782/tcp (Secure ISO TP0 port), 16452/tcp, 866/tcp, 26515/tcp, 49496/tcp.
      
BHD Honeypot
Port scan
2020-01-20

In the last 24h, the attacker (80.82.70.106) attempted to scan 351 ports.
The following ports have been scanned: 31974/tcp, 56340/tcp, 399/tcp (ISO Transport Class 2 Non-Control over TCP), 7362/tcp, 54900/tcp, 56612/tcp, 19199/tcp, 54549/tcp, 63381/tcp, 34433/tcp, 8228/tcp, 24444/tcp, 52528/tcp, 58584/tcp, 53725/tcp, 49595/tcp, 636/tcp (ldap protocol over TLS/SSL (was sldap)), 52222/tcp, 25256/tcp, 63670/tcp, 393/tcp (Meta5), 62222/tcp, 17175/tcp, 595/tcp (CAB Protocol), 565/tcp (whoami), 252/tcp, 34883/tcp, 37736/tcp, 44156/tcp, 60603/tcp, 50277/tcp, 3883/tcp (VR Peripheral Network), 16034/tcp, 36680/tcp, 17317/tcp, 64446/tcp, 35452/tcp, 63638/tcp, 226/tcp, 33948/tcp, 55932/tcp, 43435/tcp, 55511/tcp, 1114/tcp (Mini SQL), 377/tcp (NEC Corporation), 1881/tcp (IBM WebSphere MQ Everyplace), 544/tcp (krcmd), 447/tcp (DDM-Distributed File Management), 27275/tcp, 242/tcp (Direct), 17180/tcp, 28034/tcp, 466/tcp (digital-vrc), 44441/tcp, 30366/tcp, 18182/tcp (OPSEC UFP), 8687/tcp, 22234/tcp, 63176/tcp, 49541/tcp, 51620/tcp, 414/tcp (InfoSeek), 766/tcp, 22226/tcp, 39035/tcp, 37574/tcp, 56066/tcp, 32112/tcp, 24090/tcp, 212/tcp (ATEXSSTR), 23231/tcp, 36367/tcp, 7117/tcp, 45455/tcp, 55855/tcp, 433/tcp (NNSP), 44447/tcp, 232/tcp, 56289/tcp, 30417/tcp, 64685/tcp, 32927/tcp, 51514/tcp, 38457/tcp, 441/tcp (decvms-sysmgt), 18887/tcp, 49079/tcp, 12466/tcp, 77/tcp (any private RJE service), 6191/tcp, 46466/tcp, 3604/tcp (BMC JMX Port), 44544/tcp, 50504/tcp, 21439/tcp, 53653/tcp, 13134/tcp, 54434/tcp, 56063/tcp, 876/tcp, 6221/tcp, 767/tcp (phone), 55031/tcp, 25472/tcp, 25941/tcp, 48702/tcp, 45520/tcp, 99/tcp (Metagram Relay), 1091/tcp (FF System Management), 1331/tcp (intersan), 13022/tcp, 56564/tcp, 44442/tcp, 58589/tcp, 22288/tcp, 45937/tcp, 3862/tcp (GIGA-POCKET), 39059/tcp, 7654/tcp, 19198/tcp, 9351/tcp, 4994/tcp, 28266/tcp, 39538/tcp, 22224/tcp, 64062/tcp, 38888/tcp, 34814/tcp, 26374/tcp, 181/tcp (Unify), 64647/tcp, 61615/tcp, 55599/tcp, 55522/tcp, 23233/tcp, 5995/tcp, 338/tcp, 4546/tcp (SF License Manager (Sentinel)), 13137/tcp, 48168/tcp, 2829/tcp (silkp1), 51974/tcp, 57789/tcp, 5447/tcp, 33987/tcp, 32119/tcp, 112/tcp (McIDAS Data Transmission Protocol), 37566/tcp, 5665/tcp, 28288/tcp, 53594/tcp, 11516/tcp, 50952/tcp, 60803/tcp, 553/tcp (pirp), 115/tcp (Simple File Transfer Protocol), 266/tcp (SCSI on ST), 2442/tcp (Netangel), 33338/tcp, 24734/tcp, 944/tcp, 50716/tcp, 36666/tcp, 34833/tcp, 6768/tcp (BMC PERFORM MGRD), 13080/tcp, 51002/tcp, 484/tcp (Integra Software Management Environment), 49495/tcp, 38387/tcp, 59185/tcp, 33377/tcp, 43852/tcp, 4148/tcp (HHB Handheld Client), 20201/tcp, 959/tcp, 28289/tcp, 28888/tcp, 63773/tcp, 244/tcp (inbusiness), 53533/tcp, 2400/tcp (OpEquus Server), 161/tcp (SNMP), 9339/tcp, 17179/tcp, 26029/tcp, 8778/tcp, 20205/tcp, 55455/tcp, 36636/tcp, 8283/tcp, 5498/tcp, 46469/tcp, 13564/tcp, 4142/tcp (Document Server), 18894/tcp, 26781/tcp, 11116/tcp, 54541/tcp, 19479/tcp, 20981/tcp, 24248/tcp, 57777/tcp, 47800/tcp, 30304/tcp, 25257/tcp, 20325/tcp, 26394/tcp, 24406/tcp, 455/tcp (CreativePartnr), 11213/tcp, 62628/tcp, 27811/tcp, 64898/tcp, 228/tcp, 64649/tcp, 50213/tcp, 35258/tcp, 5014/tcp, 61508/tcp, 62715/tcp, 47479/tcp, 50666/tcp, 33130/tcp, 58200/tcp, 424/tcp (IBM Operations Planning and Control Track), 545/tcp (appleqtcsrvr), 27867/tcp, 64648/tcp, 58943/tcp, 10/tcp, 40408/tcp, 292/tcp, 44455/tcp, 64094/tcp, 6364/tcp, 566/tcp (streettalk), 52274/tcp, 1221/tcp (SweetWARE Apps), 36935/tcp, 30686/tcp, 35357/tcp, 60101/tcp, 23947/tcp, 63333/tcp, 331/tcp, 26267/tcp, 14149/tcp (Veritas Traffic Director), 46280/tcp, 44039/tcp, 47320/tcp, 51513/tcp, 39460/tcp, 41312/tcp, 552/tcp (DeviceShare), 50780/tcp, 20209/tcp, 58457/tcp, 664/tcp (DMTF out-of-band secure web services management protocol), 557/tcp (openvms-sysipc), 17539/tcp, 15154/tcp, 22122/tcp, 776/tcp (wpages), 47487/tcp, 33697/tcp, 48486/tcp, 3443/tcp (OpenView Network Node Manager WEB Server), 55556/tcp, 48192/tcp, 993/tcp (imap4 protocol over TLS/SSL), 59598/tcp, 8788/tcp, 8182/tcp (VMware Fault Domain Manager), 969/tcp, 6664/tcp, 8497/tcp, 55573/tcp, 20847/tcp, 23236/tcp, 2869/tcp (ICSLAP), 45255/tcp, 53538/tcp, 818/tcp, 50506/tcp, 688/tcp (ApplianceWare managment protocol), 40407/tcp, 54123/tcp, 45453/tcp, 22225/tcp, 32327/tcp, 61148/tcp, 20203/tcp, 55450/tcp, 7337/tcp, 26914/tcp, 54228/tcp, 221/tcp (Berkeley rlogind with SPX auth), 37272/tcp, 51511/tcp, 37437/tcp, 53536/tcp, 52527/tcp, 511/tcp (PassGo), 40385/tcp, 34341/tcp, 38385/tcp, 32393/tcp, 25218/tcp.
      
BHD Honeypot
Port scan
2020-01-19

In the last 24h, the attacker (80.82.70.106) attempted to scan 304 ports.
The following ports have been scanned: 131/tcp (cisco TNATIVE), 18188/tcp, 57572/tcp, 42587/tcp, 56612/tcp, 626/tcp (ASIA), 18183/tcp (OPSEC SAM), 54549/tcp, 38721/tcp, 19196/tcp, 772/tcp (cycleserv2), 45096/tcp, 23238/tcp, 49595/tcp, 57673/tcp, 611/tcp (npmp-gui), 52903/tcp, 16934/tcp, 711/tcp (Cisco TDP), 63632/tcp, 56139/tcp, 18747/tcp, 17317/tcp, 5859/tcp (WHEREHOO), 54546/tcp, 30302/tcp, 20116/tcp, 18867/tcp, 2047/tcp (dls), 61344/tcp, 22611/tcp, 64470/tcp, 42360/tcp, 1114/tcp (Mini SQL), 1881/tcp (IBM WebSphere MQ Everyplace), 35349/tcp, 55168/tcp, 57576/tcp, 242/tcp (Direct), 466/tcp (digital-vrc), 18536/tcp, 22266/tcp, 32329/tcp, 30366/tcp, 31311/tcp, 18789/tcp, 22234/tcp, 766/tcp, 22226/tcp, 37574/tcp, 48666/tcp, 7576/tcp, 30301/tcp, 16164/tcp, 49125/tcp, 5152/tcp (ESRI SDE Instance Discovery), 212/tcp (ATEXSSTR), 14548/tcp, 57125/tcp, 13597/tcp, 44447/tcp, 54124/tcp, 56289/tcp, 62622/tcp, 61613/tcp, 39398/tcp, 30417/tcp, 344/tcp (Prospero Data Access Protocol), 51514/tcp, 23956/tcp, 24247/tcp, 62624/tcp, 46806/tcp, 22785/tcp, 30692/tcp, 62584/tcp, 21982/tcp, 30210/tcp, 37896/tcp, 799/tcp, 63073/tcp, 844/tcp, 50504/tcp, 21439/tcp, 62623/tcp, 11938/tcp, 767/tcp (phone), 38552/tcp, 48702/tcp, 57577/tcp, 45520/tcp, 36362/tcp, 15159/tcp, 35736/tcp, 15155/tcp, 2795/tcp (LiveStats), 32154/tcp, 18004/tcp, 227/tcp, 55557/tcp, 22224/tcp, 44508/tcp, 211/tcp (Texas Instruments 914C/G Terminal), 53930/tcp, 55588/tcp, 15163/tcp, 34814/tcp, 38381/tcp, 3111/tcp (Web Synchronous Services), 44477/tcp, 21688/tcp, 38883/tcp, 22522/tcp, 45480/tcp, 29683/tcp, 58549/tcp, 60602/tcp, 27720/tcp, 23623/tcp, 3112/tcp (KDE System Guard), 38384/tcp, 16035/tcp, 4546/tcp (SF License Manager (Sentinel)), 20497/tcp, 60045/tcp, 57789/tcp, 55955/tcp, 112/tcp (McIDAS Data Transmission Protocol), 50952/tcp, 60803/tcp, 55239/tcp, 266/tcp (SCSI on ST), 2442/tcp (Netangel), 33338/tcp, 21923/tcp, 53363/tcp, 35345/tcp, 588/tcp (CAL), 54632/tcp, 56563/tcp, 30628/tcp, 484/tcp (Integra Software Management Environment), 575/tcp (VEMMI), 17174/tcp, 64641/tcp, 62498/tcp, 32321/tcp, 585/tcp, 28289/tcp, 58218/tcp, 31609/tcp, 61617/tcp, 54356/tcp, 18028/tcp, 17172/tcp, 52606/tcp, 37372/tcp, 3817/tcp (Yosemite Tech Tapeware), 55455/tcp, 58885/tcp, 5753/tcp, 8283/tcp, 40234/tcp, 29295/tcp, 49636/tcp, 35008/tcp, 18894/tcp, 26781/tcp, 54541/tcp, 64354/tcp, 55554/tcp, 116/tcp (ANSA REX Notify), 38593/tcp, 59597/tcp, 616/tcp (SCO System Administration Server), 774/tcp (rpasswd), 37589/tcp, 61494/tcp, 24406/tcp, 62627/tcp, 23419/tcp, 228/tcp, 19355/tcp, 42490/tcp, 50213/tcp, 26361/tcp, 18185/tcp (OPSEC OMI), 15574/tcp, 5014/tcp, 50502/tcp, 884/tcp, 21365/tcp, 52382/tcp, 33130/tcp, 424/tcp (IBM Operations Planning and Control Track), 19589/tcp, 64648/tcp, 62621/tcp, 2772/tcp (auris), 58943/tcp, 20206/tcp, 25861/tcp, 32322/tcp, 225/tcp, 699/tcp (Access Network), 661/tcp (HAP), 12447/tcp, 17777/tcp (SolarWinds Orion), 64094/tcp, 54543/tcp, 48487/tcp, 33497/tcp, 61111/tcp, 60101/tcp, 63793/tcp, 32335/tcp, 44652/tcp, 14142/tcp (IceWall Cert Protocol), 14149/tcp (Veritas Traffic Director), 39460/tcp, 25555/tcp, 18250/tcp, 20209/tcp, 55553/tcp, 36505/tcp, 57097/tcp, 448/tcp (DDM-Remote DB Access Using Secure Sockets), 5453/tcp (SureBox), 28283/tcp, 20726/tcp, 55556/tcp, 34346/tcp, 898/tcp, 993/tcp (imap4 protocol over TLS/SSL), 599/tcp (Aeolon Core Protocol), 26459/tcp, 55573/tcp, 23236/tcp, 58582/tcp, 56666/tcp, 46463/tcp, 23425/tcp, 63639/tcp, 877/tcp, 26265/tcp, 63635/tcp, 16412/tcp, 9899/tcp (SCTP TUNNELING), 23844/tcp, 64541/tcp, 56562/tcp, 56130/tcp, 828/tcp (itm-mcell-s), 55450/tcp, 54228/tcp, 3536/tcp (SNAC), 62987/tcp, 62849/tcp, 37272/tcp, 755/tcp, 18754/tcp, 14687/tcp, 21215/tcp, 64602/tcp, 34341/tcp, 19403/tcp, 28063/tcp, 1113/tcp (Licklider Transmission Protocol), 26737/tcp, 63745/tcp.
      
BHD Honeypot
Port scan
2020-01-18

Port scan from IP: 80.82.70.106 detected by psad.
BHD Honeypot
Port scan
2020-01-18

In the last 24h, the attacker (80.82.70.106) attempted to scan 266 ports.
The following ports have been scanned: 18188/tcp, 26090/tcp, 54900/tcp, 44966/tcp, 56612/tcp, 19199/tcp, 18183/tcp (OPSEC SAM), 22920/tcp, 33205/tcp, 15156/tcp, 19196/tcp, 772/tcp (cycleserv2), 669/tcp (MeRegister), 33812/tcp, 36104/tcp, 57253/tcp, 1117/tcp (ARDUS Multicast Transfer), 22922/tcp, 191/tcp (Prospero Directory Service), 59592/tcp, 61569/tcp, 64813/tcp, 50556/tcp, 56503/tcp, 35355/tcp, 15186/tcp, 12673/tcp, 16034/tcp, 61949/tcp, 22938/tcp, 57571/tcp, 533/tcp (for emergency broadcasts), 33757/tcp, 2047/tcp (dls), 16123/tcp, 63638/tcp, 226/tcp, 61344/tcp, 22822/tcp, 57576/tcp, 744/tcp (Flexible License Manager), 466/tcp (digital-vrc), 33344/tcp, 30307/tcp, 13489/tcp, 18536/tcp, 29298/tcp, 22266/tcp, 18182/tcp (OPSEC UFP), 31311/tcp, 26264/tcp, 37777/tcp, 22234/tcp, 282/tcp (Cable Port A/X), 49541/tcp, 878/tcp, 16594/tcp, 15192/tcp, 32112/tcp, 11594/tcp, 48876/tcp, 28270/tcp, 454/tcp (ContentServer), 60189/tcp, 4647/tcp, 23805/tcp, 171/tcp (Network Innovations Multiplex), 37323/tcp, 37436/tcp, 433/tcp (NNSP), 44447/tcp, 822/tcp, 64685/tcp, 38457/tcp, 887/tcp (ICL coNETion server info), 54334/tcp, 40343/tcp, 22785/tcp, 12466/tcp, 46466/tcp, 24243/tcp, 24244/tcp, 799/tcp, 22221/tcp, 722/tcp, 885/tcp, 23052/tcp, 5657/tcp, 62623/tcp, 29286/tcp, 11938/tcp, 61619/tcp, 17177/tcp, 33632/tcp, 28286/tcp, 32272/tcp, 34443/tcp, 36362/tcp, 1331/tcp (intersan), 567/tcp (banyan-rpc), 39395/tcp, 13333/tcp, 58589/tcp, 11314/tcp, 9632/tcp, 7654/tcp, 19198/tcp, 525/tcp (timeserver), 55557/tcp, 53045/tcp, 27931/tcp, 38888/tcp, 838/tcp, 15163/tcp, 34814/tcp, 55655/tcp, 60442/tcp, 55599/tcp, 59216/tcp, 53532/tcp, 39394/tcp, 38637/tcp, 53594/tcp, 15153/tcp, 42586/tcp, 21923/tcp, 55533/tcp, 29543/tcp, 55992/tcp, 34833/tcp, 49388/tcp, 19178/tcp, 56563/tcp, 48481/tcp, 38387/tcp, 13671/tcp, 28588/tcp, 15988/tcp, 40409/tcp, 474/tcp (tn-tl-w1), 2526/tcp (EMA License Manager), 21211/tcp, 23140/tcp, 61618/tcp, 60647/tcp, 665/tcp (Sun DR), 63773/tcp, 61617/tcp, 52398/tcp, 14147/tcp, 244/tcp (inbusiness), 161/tcp (SNMP), 29294/tcp, 25747/tcp, 37372/tcp, 45731/tcp, 38012/tcp, 18473/tcp, 64444/tcp, 16652/tcp, 29295/tcp, 35008/tcp, 57801/tcp, 20396/tcp, 49491/tcp, 64354/tcp, 116/tcp (ANSA REX Notify), 58583/tcp, 26394/tcp, 23419/tcp, 890/tcp, 22322/tcp, 50213/tcp, 15574/tcp, 998/tcp (busboy), 884/tcp, 28519/tcp, 19197/tcp, 11605/tcp, 51517/tcp, 39993/tcp, 25253/tcp, 64648/tcp, 10031/tcp, 699/tcp (Access Network), 52523/tcp, 661/tcp (HAP), 1116/tcp (ARDUS Control), 36663/tcp, 64094/tcp, 38448/tcp, 36935/tcp, 53537/tcp, 32772/tcp (FileNET Process Analyzer), 63793/tcp, 63333/tcp, 35750/tcp, 14142/tcp (IceWall Cert Protocol), 3993/tcp (BindView-Agent), 20209/tcp, 39336/tcp, 55553/tcp, 14564/tcp, 19193/tcp, 28048/tcp, 23235/tcp, 557/tcp (openvms-sysipc), 15824/tcp, 21214/tcp, 14389/tcp, 34346/tcp, 15234/tcp, 47477/tcp, 58588/tcp, 61611/tcp, 9495/tcp, 23239/tcp, 62226/tcp, 797/tcp, 29296/tcp, 27276/tcp, 23844/tcp, 22622/tcp, 16860/tcp, 56562/tcp, 14159/tcp, 7374/tcp, 3536/tcp (SNAC), 221/tcp (Berkeley rlogind with SPX auth), 556/tcp (rfs server), 37437/tcp, 456/tcp (macon-tcp), 15739/tcp, 13966/tcp, 58586/tcp, 16452/tcp.
      
BHD Honeypot
Port scan
2020-01-17

In the last 24h, the attacker (80.82.70.106) attempted to scan 225 ports.
The following ports have been scanned: 37159/tcp, 26090/tcp, 995/tcp (pop3 protocol over TLS/SSL (was spop3)), 53687/tcp, 25832/tcp, 28953/tcp, 25254/tcp, 757/tcp, 626/tcp (ASIA), 19196/tcp, 24444/tcp, 33812/tcp, 27271/tcp, 233/tcp, 59592/tcp, 662/tcp (PFTP), 57489/tcp, 62222/tcp, 332/tcp, 252/tcp, 711/tcp (Cisco TDP), 61949/tcp, 833/tcp (NETCONF for SOAP over BEEP), 13136/tcp, 17867/tcp, 37375/tcp, 22938/tcp, 6162/tcp (PATROL Collector), 56493/tcp, 54398/tcp, 27546/tcp, 2111/tcp (DSATP), 13138/tcp, 18867/tcp, 28662/tcp, 16123/tcp, 22314/tcp, 49492/tcp, 544/tcp (krcmd), 977/tcp, 3663/tcp (DIRECWAY Tunnel Protocol), 30307/tcp, 34264/tcp, 388/tcp (Unidata LDM), 16594/tcp, 36365/tcp, 26666/tcp, 11594/tcp, 47943/tcp, 23805/tcp, 58112/tcp, 61245/tcp, 55855/tcp, 13597/tcp, 42570/tcp, 344/tcp (Prospero Data Access Protocol), 887/tcp (ICL coNETion server info), 60601/tcp, 62624/tcp, 31274/tcp, 55355/tcp, 35923/tcp, 13123/tcp, 44544/tcp, 722/tcp, 12222/tcp, 21283/tcp, 30308/tcp, 29286/tcp, 61619/tcp, 50641/tcp, 33366/tcp, 55559/tcp, 25472/tcp, 57577/tcp, 32272/tcp, 1091/tcp (FF System Management), 21335/tcp, 35736/tcp, 8432/tcp, 15155/tcp, 7654/tcp, 39538/tcp, 27931/tcp, 646/tcp (LDP), 24245/tcp, 37773/tcp, 50501/tcp, 19893/tcp, 33744/tcp, 34345/tcp, 38384/tcp, 31318/tcp, 39394/tcp, 15153/tcp, 115/tcp (Simple File Transfer Protocol), 44563/tcp, 29543/tcp, 13080/tcp, 54632/tcp, 30628/tcp, 1441/tcp (Cadis License Management), 21211/tcp, 48339/tcp, 28289/tcp, 27802/tcp, 14147/tcp, 17172/tcp, 42233/tcp, 29294/tcp, 29293/tcp, 64444/tcp, 13564/tcp, 28285/tcp, 57801/tcp, 949/tcp, 57633/tcp, 49491/tcp, 50964/tcp, 558/tcp (SDNSKMP), 19194/tcp (UserAuthority SecureAgent), 22422/tcp, 25257/tcp, 36068/tcp, 12515/tcp, 64649/tcp, 31401/tcp, 14536/tcp, 21365/tcp, 141/tcp (EMFIS Control Service), 11599/tcp, 19831/tcp, 2662/tcp (BinTec-CAPI), 17689/tcp, 20249/tcp, 27867/tcp, 25253/tcp, 12472/tcp, 20206/tcp, 25861/tcp, 661/tcp (HAP), 17777/tcp (SolarWinds Orion), 48525/tcp, 27234/tcp, 38448/tcp, 899/tcp, 56039/tcp, 50161/tcp, 63793/tcp, 16166/tcp, 28197/tcp, 3233/tcp (WhiskerControl main port), 51513/tcp, 577/tcp (vnas), 25555/tcp, 61283/tcp, 664/tcp (DMTF out-of-band secure web services management protocol), 27279/tcp, 36086/tcp, 26266/tcp, 14564/tcp, 19193/tcp, 23235/tcp, 557/tcp (openvms-sysipc), 30852/tcp, 40661/tcp, 776/tcp (wpages), 37374/tcp, 33697/tcp, 5453/tcp (SureBox), 20726/tcp, 43333/tcp, 23077/tcp, 23333/tcp (Emulex HBAnyware Remote Management), 38103/tcp, 898/tcp, 40178/tcp, 40839/tcp, 61611/tcp, 8788/tcp, 10819/tcp, 26459/tcp, 57494/tcp, 48095/tcp, 28281/tcp, 494/tcp (POV-Ray), 56569/tcp, 59591/tcp, 773/tcp (submit), 234/tcp, 26686/tcp, 60608/tcp, 7890/tcp, 7887/tcp (Universal Broker), 51519/tcp, 14159/tcp, 62987/tcp, 39397/tcp, 37437/tcp, 26268/tcp, 21215/tcp, 511/tcp (PassGo), 3782/tcp (Secure ISO TP0 port), 58586/tcp, 58532/tcp, 40778/tcp, 63745/tcp.
      
BHD Honeypot
Port scan
2020-01-16

In the last 24h, the attacker (80.82.70.106) attempted to scan 267 ports.
The following ports have been scanned: 6804/tcp, 399/tcp (ISO Transport Class 2 Non-Control over TCP), 7879/tcp, 26090/tcp, 57572/tcp, 25254/tcp, 28525/tcp, 41768/tcp, 27271/tcp, 61569/tcp, 57489/tcp, 33551/tcp, 252/tcp, 56568/tcp, 12673/tcp, 833/tcp (NETCONF for SOAP over BEEP), 676/tcp (VPPS Via), 54546/tcp, 11629/tcp, 22938/tcp, 34344/tcp, 26215/tcp, 33757/tcp, 48967/tcp, 33798/tcp, 42360/tcp, 51554/tcp, 34348/tcp, 42083/tcp, 32753/tcp, 17180/tcp, 33344/tcp, 13489/tcp, 18536/tcp, 26820/tcp, 34264/tcp, 34106/tcp, 383/tcp (hp performance data alarm manager), 26264/tcp, 24363/tcp, 414/tcp (InfoSeek), 878/tcp, 766/tcp, 36365/tcp, 7576/tcp, 16164/tcp, 43436/tcp, 31795/tcp, 36367/tcp, 171/tcp (Network Innovations Multiplex), 1118/tcp (SACRED), 61245/tcp, 63637/tcp, 23309/tcp, 56289/tcp, 26278/tcp, 30417/tcp, 12126/tcp, 40343/tcp, 55355/tcp, 6191/tcp, 24243/tcp, 7131/tcp, 33337/tcp, 722/tcp, 12222/tcp, 22744/tcp, 678/tcp (GNU Generation Foundation NCP), 43432/tcp, 29286/tcp, 61619/tcp, 54434/tcp, 50641/tcp, 50807/tcp, 33366/tcp, 55031/tcp, 25941/tcp, 32272/tcp, 1091/tcp (FF System Management), 50503/tcp, 61500/tcp, 8432/tcp, 34444/tcp, 36053/tcp, 18004/tcp, 855/tcp, 9632/tcp, 33429/tcp, 422/tcp (Ariel 3), 39538/tcp, 22224/tcp, 50052/tcp, 543/tcp (klogin), 24245/tcp, 838/tcp, 37773/tcp, 3111/tcp (Web Synchronous Services), 26374/tcp, 21688/tcp, 63490/tcp, 50509/tcp, 41418/tcp, 27720/tcp, 23233/tcp, 3112/tcp (KDE System Guard), 51974/tcp, 2223/tcp (Rockwell CSP2), 57789/tcp, 46462/tcp, 11408/tcp, 47277/tcp, 38505/tcp, 4114/tcp (JomaMQMonitor), 434/tcp (MobileIP-Agent), 12122/tcp, 36666/tcp, 49466/tcp, 33377/tcp, 811/tcp, 7388/tcp, 1441/tcp (Cadis License Management), 20201/tcp, 22612/tcp, 28289/tcp, 27802/tcp, 1661/tcp (netview-aix-1), 9798/tcp, 18046/tcp, 7772/tcp, 52790/tcp, 9339/tcp, 34352/tcp, 25747/tcp, 22244/tcp, 29293/tcp, 45731/tcp, 23589/tcp, 663/tcp (PureNoise), 39715/tcp, 16652/tcp, 35008/tcp, 49497/tcp, 22255/tcp, 26269/tcp, 18894/tcp, 26781/tcp, 49491/tcp, 19479/tcp, 64354/tcp, 9596/tcp (Mercury Discovery), 24248/tcp, 19194/tcp (UserAuthority SecureAgent), 37589/tcp, 28405/tcp, 32222/tcp, 3553/tcp (Red Box Recorder ADP), 41419/tcp, 23419/tcp, 455/tcp (CreativePartnr), 27811/tcp, 890/tcp, 30514/tcp, 2662/tcp (BinTec-CAPI), 686/tcp (Hardware Control Protocol Wismar), 11605/tcp, 32326/tcp, 775/tcp (entomb), 225/tcp, 52523/tcp, 6336/tcp, 27652/tcp, 899/tcp, 727/tcp, 33497/tcp, 535/tcp (iiop), 27777/tcp, 8118/tcp (Privoxy HTTP proxy), 26267/tcp, 35359/tcp, 58457/tcp, 13757/tcp, 664/tcp (DMTF out-of-band secure web services management protocol), 35351/tcp, 45736/tcp, 23235/tcp, 35252/tcp, 25251/tcp, 776/tcp (wpages), 53311/tcp, 23333/tcp (Emulex HBAnyware Remote Management), 40405/tcp, 61611/tcp, 3435/tcp (Pacom Security User Port), 29554/tcp, 26459/tcp, 44488/tcp, 5775/tcp, 5132/tcp, 52524/tcp, 62226/tcp, 32324/tcp, 28281/tcp, 55558/tcp, 48559/tcp, 49655/tcp, 35356/tcp, 29024/tcp, 818/tcp, 56666/tcp, 63639/tcp, 234/tcp, 40407/tcp, 26265/tcp, 63635/tcp, 27276/tcp, 47348/tcp, 5082/tcp (Qpur Communication Protocol), 7887/tcp (Universal Broker), 51519/tcp, 47774/tcp, 27273/tcp, 47475/tcp, 883/tcp, 26914/tcp, 34654/tcp, 26268/tcp, 17047/tcp, 42423/tcp, 64602/tcp, 47473/tcp, 58532/tcp, 32393/tcp, 25218/tcp, 23284/tcp, 26737/tcp, 48485/tcp, 26515/tcp, 25286/tcp, 49496/tcp.
      
BHD Honeypot
Port scan
2020-01-15

In the last 24h, the attacker (80.82.70.106) attempted to scan 345 ports.
The following ports have been scanned: 18188/tcp, 399/tcp (ISO Transport Class 2 Non-Control over TCP), 7879/tcp, 25832/tcp, 25254/tcp, 29297/tcp, 31759/tcp, 2227/tcp (DI Messaging Service), 47642/tcp, 54765/tcp, 8558/tcp, 23238/tcp, 28179/tcp, 191/tcp (Prospero Directory Service), 57935/tcp, 64813/tcp, 30810/tcp, 42912/tcp, 42429/tcp, 52903/tcp, 16034/tcp, 48734/tcp, 14118/tcp, 56493/tcp, 57571/tcp, 43697/tcp, 31316/tcp, 989/tcp (ftp protocol, data, over TLS/SSL), 55345/tcp, 48270/tcp, 63638/tcp, 33798/tcp, 53333/tcp, 43435/tcp, 49492/tcp, 4041/tcp (Rocketeer-Houston), 46049/tcp, 35349/tcp, 17580/tcp, 34348/tcp, 32753/tcp, 242/tcp (Direct), 744/tcp (Flexible License Manager), 28034/tcp, 466/tcp (digital-vrc), 33344/tcp, 34106/tcp, 388/tcp (Unidata LDM), 48877/tcp, 13674/tcp, 31971/tcp, 24363/tcp, 37777/tcp, 22234/tcp, 414/tcp (InfoSeek), 766/tcp, 29255/tcp, 37574/tcp, 551/tcp (cybercash), 7576/tcp, 11113/tcp, 16164/tcp, 454/tcp (ContentServer), 31795/tcp, 57579/tcp, 9664/tcp, 36367/tcp, 64787/tcp, 37323/tcp, 23309/tcp, 37436/tcp, 334/tcp, 39398/tcp, 50507/tcp, 64685/tcp, 441/tcp (decvms-sysmgt), 13135/tcp, 34087/tcp, 40343/tcp, 46806/tcp, 922/tcp, 9119/tcp (MXit Instant Messaging), 24244/tcp, 44671/tcp, 58983/tcp, 25602/tcp, 47830/tcp, 31605/tcp, 62623/tcp, 29286/tcp, 3940/tcp (XeCP Node Service), 61619/tcp, 35354/tcp, 50641/tcp, 18900/tcp, 876/tcp, 58888/tcp, 46923/tcp, 4076/tcp (Seraph DCS), 1091/tcp (FF System Management), 46664/tcp, 119/tcp (Network News Transfer Protocol), 15159/tcp, 38386/tcp, 47243/tcp, 13022/tcp, 48234/tcp, 31724/tcp, 27177/tcp, 50744/tcp, 2795/tcp (LiveStats), 855/tcp, 8586/tcp, 53045/tcp, 27931/tcp, 53638/tcp, 50052/tcp, 64062/tcp, 211/tcp (Texas Instruments 914C/G Terminal), 24241/tcp, 34814/tcp, 3111/tcp (Web Synchronous Services), 4334/tcp, 19893/tcp, 11280/tcp, 34192/tcp, 338/tcp, 779/tcp, 2223/tcp (Rockwell CSP2), 53114/tcp, 56591/tcp, 46462/tcp, 919/tcp, 38909/tcp, 47277/tcp, 22338/tcp, 51394/tcp, 5665/tcp, 28288/tcp, 2442/tcp (Netangel), 633/tcp (Service Status update (Sterling Software)), 654/tcp (AODV), 24734/tcp, 44563/tcp, 50716/tcp, 33311/tcp, 55992/tcp, 17174/tcp, 4148/tcp (HHB Handheld Client), 22896/tcp, 4128/tcp (NuFW decision delegation protocol), 2526/tcp (EMA License Manager), 11877/tcp, 24168/tcp, 959/tcp, 1876/tcp (ewcappsrv), 60647/tcp, 14147/tcp, 53533/tcp, 64466/tcp, 17179/tcp, 52606/tcp, 64642/tcp, 45731/tcp, 64444/tcp, 35055/tcp, 49994/tcp, 46666/tcp, 6263/tcp, 55544/tcp, 2882/tcp (NDTP), 558/tcp (SDNSKMP), 9596/tcp (Mercury Discovery), 116/tcp (ANSA REX Notify), 24248/tcp, 50358/tcp, 47800/tcp, 37589/tcp, 29275/tcp, 24193/tcp, 47925/tcp, 24406/tcp, 10019/tcp, 5051/tcp (ITA Agent), 64898/tcp, 228/tcp, 345/tcp (Perf Analysis Workbench), 29155/tcp, 355/tcp (DATEX-ASN), 42490/tcp, 16376/tcp, 26361/tcp, 14364/tcp, 40933/tcp, 5014/tcp, 50502/tcp, 299/tcp, 17176/tcp, 33355/tcp, 929/tcp, 11605/tcp, 32326/tcp, 775/tcp (entomb), 4554/tcp (MS FRS Replication), 25861/tcp, 747/tcp (Fujitsu Device Control), 225/tcp, 12447/tcp, 4326/tcp (Cadcorp GeognoSIS Service), 322/tcp (RTSPS), 48525/tcp, 27234/tcp, 27652/tcp, 6776/tcp, 23628/tcp, 1221/tcp (SweetWARE Apps), 53537/tcp, 5034/tcp, 32772/tcp (FileNET Process Analyzer), 32325/tcp, 4581/tcp, 18632/tcp, 88/tcp (Kerberos), 331/tcp, 46461/tcp, 16166/tcp, 3233/tcp (WhiskerControl main port), 44039/tcp, 12124/tcp, 118/tcp (SQL Services), 37227/tcp, 54979/tcp, 51513/tcp, 3993/tcp (BindView-Agent), 35129/tcp, 30264/tcp, 335/tcp, 50780/tcp, 48482/tcp, 24911/tcp, 39336/tcp, 664/tcp (DMTF out-of-band secure web services management protocol), 21802/tcp, 151/tcp (HEMS), 55068/tcp, 35252/tcp, 12127/tcp, 50842/tcp, 25251/tcp, 776/tcp (wpages), 49507/tcp, 57578/tcp, 47487/tcp, 353/tcp (NDSAUTH), 7814/tcp, 34346/tcp, 898/tcp, 61611/tcp, 31314/tcp, 1103/tcp (ADOBE SERVER 2), 5432/tcp (PostgreSQL Database), 8497/tcp, 48095/tcp, 50877/tcp, 656/tcp (SPMP), 52524/tcp, 32223/tcp, 44872/tcp, 53538/tcp, 2552/tcp (Call Logging), 54123/tcp, 27276/tcp, 26686/tcp, 7887/tcp (Universal Broker), 2324/tcp (Cosmocall), 61614/tcp, 51519/tcp, 20203/tcp, 47774/tcp, 883/tcp, 24817/tcp, 53640/tcp, 3536/tcp (SNAC), 2804/tcp (March Networks Digital Video Recorders and Enterprise Service Manager products), 3738/tcp (versaTalk Server Port), 51511/tcp, 229/tcp, 54544/tcp, 58532/tcp, 40778/tcp, 25218/tcp, 22722/tcp, 44443/tcp, 26515/tcp, 44844/tcp, 25286/tcp, 1193/tcp (Five Across Server).
      
BHD Honeypot
Port scan
2020-01-14

In the last 24h, the attacker (80.82.70.106) attempted to scan 166 ports.
The following ports have been scanned: 6804/tcp, 3031/tcp (Remote AppleEvents/PPC Toolbox), 16167/tcp, 58584/tcp, 45096/tcp, 191/tcp (Prospero Directory Service), 63670/tcp, 56503/tcp, 61949/tcp, 17867/tcp, 57571/tcp, 28662/tcp, 989/tcp (ftp protocol, data, over TLS/SSL), 14144/tcp, 51870/tcp, 53333/tcp, 46049/tcp, 1881/tcp (IBM WebSphere MQ Everyplace), 544/tcp (krcmd), 63509/tcp, 35430/tcp, 30307/tcp, 44456/tcp, 56066/tcp, 53050/tcp, 33322/tcp, 64645/tcp, 44083/tcp, 48022/tcp, 44447/tcp, 4884/tcp (HiveStor Distributed File System), 62584/tcp, 44671/tcp, 30210/tcp, 63073/tcp, 22221/tcp, 14201/tcp, 30308/tcp, 994/tcp (irc protocol over TLS/SSL), 50641/tcp, 55559/tcp, 55031/tcp, 99/tcp (Metagram Relay), 50503/tcp, 48234/tcp, 58589/tcp, 46701/tcp, 34349/tcp, 9351/tcp, 50501/tcp, 181/tcp (Unify), 41111/tcp (Foursticks QoS Protocol), 60602/tcp, 3112/tcp (KDE System Guard), 58854/tcp, 5111/tcp (TAEP AS service), 886/tcp (ICL coNETion locate server), 31315/tcp, 51974/tcp, 22227/tcp, 5447/tcp, 32119/tcp, 31318/tcp, 51394/tcp, 11516/tcp, 44344/tcp, 2442/tcp (Netangel), 54548/tcp, 50716/tcp, 36666/tcp, 53534/tcp, 4148/tcp (HHB Handheld Client), 22896/tcp, 27802/tcp, 44446/tcp, 63773/tcp, 21217/tcp, 52790/tcp, 30563/tcp, 22244/tcp, 10328/tcp, 19522/tcp, 45451/tcp, 8283/tcp, 54547/tcp, 38012/tcp, 39715/tcp, 49497/tcp, 11116/tcp, 858/tcp, 57633/tcp, 55544/tcp, 9596/tcp (Mercury Discovery), 61465/tcp, 11704/tcp, 57777/tcp, 47800/tcp, 44457/tcp, 28405/tcp, 3553/tcp (Red Box Recorder ADP), 41419/tcp, 29299/tcp, 10019/tcp, 62627/tcp, 17051/tcp, 64898/tcp, 43431/tcp, 43438/tcp, 36998/tcp, 30782/tcp, 56422/tcp, 54543/tcp, 771/tcp (rtip), 966/tcp, 48487/tcp, 12173/tcp, 47463/tcp, 10371/tcp, 30263/tcp, 59593/tcp, 52592/tcp, 118/tcp (SQL Services), 577/tcp (vnas), 25259/tcp, 58587/tcp, 16273/tcp, 12007/tcp (Accuracer Database System � Server), 992/tcp (telnet protocol over TLS/SSL), 29291/tcp, 3058/tcp (videobeans), 993/tcp (imap4 protocol over TLS/SSL), 31314/tcp, 12879/tcp, 3119/tcp (D2000 Kernel Port), 57494/tcp, 8497/tcp, 3132/tcp (Microsoft Business Rule Engine Update Service), 656/tcp (SPMP), 52524/tcp, 48559/tcp, 58458/tcp, 22229/tcp, 56569/tcp, 44448/tcp, 5960/tcp, 2552/tcp (Call Logging), 25847/tcp, 35555/tcp, 22622/tcp, 9449/tcp, 16162/tcp (Solaris Audit - secure remote audit log), 51511/tcp, 53536/tcp, 229/tcp, 34341/tcp, 63745/tcp.
      
BHD Honeypot
Port scan
2020-01-13

Port scan from IP: 80.82.70.106 detected by psad.
BHD Honeypot
Port scan
2020-01-04

In the last 24h, the attacker (80.82.70.106) attempted to scan 38 ports.
The following ports have been scanned: 42089/tcp, 13139/tcp, 14339/tcp, 31089/tcp, 13339/tcp, 10011/tcp, 19089/tcp, 37089/tcp, 41089/tcp, 43089/tcp, 10112/tcp, 11089/tcp, 28089/tcp, 11839/tcp, 36089/tcp, 12439/tcp, 13839/tcp, 14039/tcp, 18089/tcp, 10089/tcp, 13939/tcp, 22089/tcp, 11939/tcp, 13739/tcp, 25089/tcp, 27089/tcp, 39089/tcp, 12139/tcp, 12639/tcp, 23089/tcp, 13239/tcp, 12239/tcp, 12939/tcp, 40089/tcp, 12339/tcp, 14439/tcp, 34089/tcp, 12039/tcp.
      
BHD Honeypot
Port scan
2020-01-03

In the last 24h, the attacker (80.82.70.106) attempted to scan 33 ports.
The following ports have been scanned: 13139/tcp, 9292/tcp (ArmTech Daemon), 8181/tcp, 9090/tcp (WebSM), 11839/tcp, 12839/tcp, 9595/tcp (Ping Discovery Service), 12439/tcp, 12739/tcp, 8787/tcp (Message Server), 8080/tcp (HTTP Alternate (see port 80)), 13639/tcp, 8585/tcp, 9494/tcp, 11939/tcp, 12139/tcp, 12639/tcp, 7979/tcp (Micromuse-ncps), 7777/tcp (cbt), 12239/tcp, 13439/tcp, 8484/tcp, 8888/tcp (NewsEDGE server TCP (TCP 1)), 13539/tcp, 8282/tcp, 12939/tcp, 12339/tcp, 7878/tcp, 8383/tcp (M2m Services), 9191/tcp (Sun AppSvr JPDA), 12539/tcp.
      
BHD Honeypot
Port scan
2020-01-02

In the last 24h, the attacker (80.82.70.106) attempted to scan 62 ports.
The following ports have been scanned: 2525/tcp (MS V-Worlds), 9292/tcp (ArmTech Daemon), 4646/tcp, 5858/tcp, 9090/tcp (WebSM), 1414/tcp (IBM MQSeries), 9696/tcp, 5555/tcp (Personal Agent), 7474/tcp, 7575/tcp, 7272/tcp (WatchMe Monitoring 7272), 6666/tcp, 7070/tcp (ARCP), 9898/tcp (MonkeyCom), 7373/tcp, 6565/tcp, 5151/tcp (ESRI SDE Instance), 5656/tcp, 3535/tcp (MS-LA), 6969/tcp (acmsoda), 8989/tcp (Sun Web Server SSL Admin Service), 6767/tcp (BMC PERFORM AGENT), 9595/tcp (Ping Discovery Service), 6464/tcp, 5454/tcp (APC 5454), 7171/tcp (Discovery and Retention Mgt Production), 4141/tcp (Workflow Server), 1313/tcp (BMC_PATROLDB), 8787/tcp (Message Server), 1717/tcp (fj-hdnet), 8585/tcp, 6262/tcp, 6060/tcp, 1010/tcp (surf), 9494/tcp, 9797/tcp, 5959/tcp, 5757/tcp (OpenMail X.500 Directory Server), 2323/tcp (3d-nfsd), 4242/tcp, 3039/tcp (Cogitate, Inc.), 2424/tcp (KOFAX-SVR), 7979/tcp (Micromuse-ncps), 1111/tcp (LM Social Server), 7777/tcp (cbt), 2121/tcp (SCIENTIA-SSDB), 9393/tcp, 8484/tcp, 6868/tcp (Acctopus Command Channel), 6363/tcp, 2020/tcp (xinupageserver), 7878/tcp, 6161/tcp (PATROL Internet Srv Mgr), 8383/tcp (M2m Services), 9999/tcp (distinct), 9191/tcp (Sun AppSvr JPDA), 5252/tcp (Movaz SSC).
      
BHD Honeypot
Port scan
2019-12-31

In the last 24h, the attacker (80.82.70.106) attempted to scan 61 ports.
The following ports have been scanned: 3305/tcp (ODETTE-FTP), 3368/tcp, 3321/tcp (VNSSTR), 3364/tcp (Creative Server), 3303/tcp (OP Session Client), 3317/tcp (VSAI PORT), 3377/tcp (Cogsys Network License Manager), 3318/tcp (Swith to Swith Routing Information Protocol), 3320/tcp (Office Link 2000), 3339/tcp (OMF data l), 3315/tcp (CDID), 3379/tcp (SOCORFS), 3314/tcp (Unify Object Host), 3302/tcp (MCS Fastmail), 3376/tcp (CD Broker), 3373/tcp (Lavenir License Manager), 3372/tcp (TIP 2), 3311/tcp (MCNS Tel Ret), 3310/tcp (Dyna Access), 3328/tcp (Eaglepoint License Manager), 3337/tcp (Direct TV Data Catalog), 3378/tcp (WSICOPY), 3316/tcp (AICC/CMI), 3371/tcp, 3306/tcp (MySQL), 3300/tcp, 3308/tcp (TNS Server), 3313/tcp (Unify Object Broker), 3362/tcp (DJ ILM), 3374/tcp (Cluster Disc), 3325/tcp, 3360/tcp (KV Server), 3367/tcp (-3371  Satellite Video Data Link), 3333/tcp (DEC Notes), 3307/tcp (OP Session Proxy), 3370/tcp, 3334/tcp (Direct TV Webcasting), 3366/tcp (Creative Partner), 3312/tcp (Application Management Server), 3365/tcp (Content Server), 3301/tcp, 3361/tcp (KV Agent), 3375/tcp (VSNM Agent), 3319/tcp (SDT License Manager), 3322/tcp (-3325  Active Networks).
      
BHD Honeypot
Port scan
2019-12-30

Port scan from IP: 80.82.70.106 detected by psad.
BHD Honeypot
Port scan
2019-12-28

In the last 24h, the attacker (80.82.70.106) attempted to scan 17 ports.
The following ports have been scanned: 31089/tcp, 64089/tcp, 37089/tcp, 65089/tcp, 29089/tcp, 62089/tcp, 63089/tcp, 38089/tcp, 61089/tcp, 21089/tcp, 24089/tcp, 22089/tcp, 27089/tcp, 23089/tcp, 26089/tcp, 40089/tcp.
      
BHD Honeypot
Port scan
2019-12-26

In the last 24h, the attacker (80.82.70.106) attempted to scan 266 ports.
The following ports have been scanned: 7636/tcp, 7901/tcp (TNOS Service Protocol), 7927/tcp, 7128/tcp (intelligent data manager), 7333/tcp, 7633/tcp (PMDF Management), 7712/tcp, 7255/tcp, 7679/tcp, 7502/tcp, 7700/tcp (EM7 Secure Communications), 7622/tcp, 7935/tcp, 7933/tcp (Tier 2 Business Rules Manager), 7882/tcp, 7939/tcp, 7125/tcp, 7676/tcp (iMQ Broker Rendezvous), 7057/tcp, 7910/tcp, 7139/tcp, 7764/tcp, 7899/tcp, 7124/tcp, 7339/tcp, 7762/tcp, 7661/tcp, 7401/tcp (RTPS Data-Distribution User-Traffic), 7046/tcp, 7513/tcp, 7885/tcp, 7519/tcp, 7531/tcp, 7056/tcp, 7535/tcp, 7898/tcp, 7894/tcp, 7705/tcp, 7629/tcp (OpenXDAS Wire Protocol), 7775/tcp, 7937/tcp, 7320/tcp, 7674/tcp (iMQ SSL tunnel), 7336/tcp, 7533/tcp, 7167/tcp (CA SRM Agent), 7579/tcp, 7708/tcp (scientia.net), 7577/tcp, 7240/tcp, 7778/tcp (Interwise), 7126/tcp, 7571/tcp, 7773/tcp, 7053/tcp, 7414/tcp, 7047/tcp, 7719/tcp, 7518/tcp, 7163/tcp (CA Connection Broker), 7768/tcp, 7525/tcp, 7332/tcp, 7522/tcp, 7922/tcp, 7623/tcp, 7574/tcp, 7505/tcp, 7891/tcp, 7121/tcp (Virtual Prototypes License Manager), 7514/tcp, 7675/tcp (iMQ Tunnel), 7903/tcp (TNOS Secure DiaguardProtocol), 7043/tcp, 7702/tcp, 7632/tcp, 7241/tcp, 7131/tcp, 7245/tcp, 7630/tcp (HA Web Konsole), 7889/tcp, 7507/tcp, 7402/tcp (RTPS Data-Distribution Meta-Traffic), 7628/tcp (Primary Agent Work Notification), 7639/tcp, 7511/tcp (pafec-lm), 7624/tcp (Instrument Neutral Distributed Interface), 7160/tcp, 7515/tcp, 7884/tcp, 7763/tcp, 7635/tcp, 7176/tcp, 7524/tcp, 7915/tcp, 7761/tcp, 7247/tcp, 7324/tcp, 7322/tcp, 7706/tcp, 7625/tcp, 7500/tcp (Silhouette User), 7503/tcp, 7130/tcp, 7620/tcp, 7537/tcp, 7171/tcp (Discovery and Retention Mgt Production), 7403/tcp, 7911/tcp, 7048/tcp, 7404/tcp, 7919/tcp, 7938/tcp, 7779/tcp (VSTAT), 7405/tcp, 7244/tcp, 7631/tcp (TESLA System Messaging), 7888/tcp, 7164/tcp (File System Repository Agent), 7052/tcp, 7338/tcp, 7765/tcp, 7504/tcp, 7127/tcp, 7323/tcp, 7670/tcp, 7539/tcp, 7508/tcp, 7926/tcp, 7567/tcp, 7565/tcp, 7179/tcp, 7924/tcp, 7931/tcp, 7134/tcp, 7677/tcp (Sun App Server - HTTPS), 7250/tcp, 7772/tcp, 7904/tcp, 7400/tcp (RTPS Discovery), 7050/tcp, 7896/tcp, 7913/tcp (QuickObjects secure port), 7512/tcp, 7667/tcp, 7331/tcp, 7412/tcp, 7321/tcp, 7328/tcp, 7526/tcp, 7893/tcp, 7257/tcp, 7415/tcp, 7776/tcp, 7419/tcp, 7934/tcp, 7902/tcp (TNOS shell Protocol), 7662/tcp, 7664/tcp, 7051/tcp, 7627/tcp (SOAP Service Port), 7527/tcp, 7912/tcp, 7133/tcp, 7042/tcp, 7506/tcp, 7252/tcp, 7771/tcp, 7921/tcp, 7570/tcp (Aries Kfinder), 7510/tcp (HP OpenView Application Server), 7621/tcp, 7672/tcp (iMQ STOMP Server), 7767/tcp, 7325/tcp, 7886/tcp, 7129/tcp (Catalog Content Search), 7258/tcp, 7710/tcp, 7329/tcp, 7916/tcp, 7327/tcp, 7660/tcp, 7774/tcp, 7770/tcp, 7917/tcp, 7563/tcp, 7334/tcp, 7717/tcp, 7174/tcp (Clutild), 7170/tcp (Adaptive Name/Service Resolution), 7058/tcp, 7243/tcp, 7407/tcp, 7517/tcp, 7634/tcp, 7918/tcp, 7777/tcp (cbt), 7123/tcp, 7516/tcp, 7561/tcp, 7920/tcp, 7137/tcp, 7529/tcp, 7769/tcp, 7122/tcp, 7766/tcp, 7638/tcp, 7044/tcp, 7335/tcp, 7136/tcp, 7162/tcp (CA Storage Manager), 7242/tcp, 7326/tcp, 7663/tcp, 7041/tcp, 7760/tcp, 7538/tcp, 7671/tcp, 7520/tcp, 7059/tcp, 7055/tcp, 7880/tcp (Pearson), 7883/tcp, 7718/tcp, 7900/tcp (Multicast Event), 7665/tcp, 7259/tcp, 7895/tcp, 7714/tcp, 7248/tcp, 7045/tcp, 7410/tcp (Ionix Network Monitor), 7501/tcp (HP OpenView Bus Daemon), 7560/tcp (Sniffer Command Protocol), 7626/tcp (SImple Middlebox COnfiguration (SIMCO) Server), 7509/tcp (ACPLT - process automation service), 7890/tcp, 7887/tcp (Universal Broker), 7637/tcp, 7337/tcp, 7703/tcp, 7330/tcp, 7707/tcp (EM7 Dynamic Updates), 7418/tcp, 7578/tcp, 7120/tcp.
      
BHD Honeypot
Port scan
2019-12-24

In the last 24h, the attacker (80.82.70.106) attempted to scan 257 ports.
The following ports have been scanned: 2697/tcp (Oce SNMP Trap Port), 2761/tcp (DICOM ISCL), 2420/tcp (DSL Remote Management), 2296/tcp (Theta License Manager (Rainbow)), 2985/tcp (HPIDSAGENT), 2370/tcp (L3-HBMon), 2559/tcp (LSTP), 2799/tcp (ICON Discover), 2376/tcp, 2378/tcp, 2280/tcp (LNVPOLLER), 2540/tcp (LonWorks), 2222/tcp (EtherNet/IP I/O), 2690/tcp (HP NNM Embedded Database), 2960/tcp (DFOXSERVER), 2973/tcp (SV Networks), 2649/tcp (VPSIPPORT), 2794/tcp, 2282/tcp (LNVALARM), 2284/tcp (LNVMAPS), 2362/tcp (digiman), 2832/tcp (silkp4), 2479/tcp (SecurSight Event Logging Server (SSL)), 2545/tcp (sis-emt), 2372/tcp (LanMessenger), 2682/tcp, 2204/tcp (b2 License Server), 2779/tcp (LBC Sync), 2082/tcp (Infowave Mobility Server), 2617/tcp (Clinical Context Managers), 2773/tcp (RBackup Remote Backup), 2652/tcp (InterPathPanel), 2460/tcp (ms-theater), 2290/tcp (Sonus Logging Services), 2975/tcp (Fujitsu Configuration Management Service), 2976/tcp (CNS Server Port), 2999/tcp (RemoteWare Unassigned), 2695/tcp (VSPREAD), 2093/tcp (NBX CC), 2431/tcp (venus-se), 2789/tcp (Media Agent), 2281/tcp (LNVCONSOLE), 2221/tcp (Rockwell CSP1), 2643/tcp (GTE-SAMP), 2360/tcp (NexstorIndLtd), 2780/tcp (LBC Control), 2986/tcp (STONEFALLS), 2694/tcp (pwrsevent), 2835/tcp (EVTP-DATA), 2555/tcp (Compaq WCP), 2791/tcp (MT Port Registrator), 2698/tcp (MCK-IVPIP), 2782/tcp (everydayrc), 2215/tcp (IPCore.co.za GPRS), 2379/tcp, 2374/tcp (Hydra RPC), 2994/tcp (VERITAS VIS2), 2833/tcp (glishd), 2435/tcp (OptiLogic), 2659/tcp (SNS Query), 2610/tcp (VersaTek), 2686/tcp (mpnjsomg), 2684/tcp (mpnjsosv), 2549/tcp (IPASS), 2644/tcp (Travsoft IPX Tunnel), 2687/tcp (pq-lic-mgmt), 2225/tcp (Resource Connection Initiation Protocol), 2983/tcp (NETPLAN), 2428/tcp (One Way Trip Time), 2098/tcp (Dialog Port), 2798/tcp (TMESIS-UPShot), 2080/tcp (Autodesk NLM (FLEXlm)), 2211/tcp (EMWIN), 2653/tcp (Sonus), 2369/tcp, 2558/tcp (PCLE Multi Media), 2542/tcp (uDraw(Graph)), 2461/tcp (qadmifoper), 2365/tcp (dbref), 2298/tcp (D2K DataMover 2), 2557/tcp (nicetec-mgmt), 2285/tcp (LNVMAILMON), 2979/tcp (H.263 Video Streaming), 2375/tcp, 2777/tcp (Ridgeway Systems & Software), 2475/tcp (ACE Server), 2095/tcp (NBX SER), 2683/tcp (NCDLoadBalance), 2600/tcp (HPSTGMGR), 2477/tcp (SecurSight Certificate Valifation Service), 2603/tcp (Service Meter), 2618/tcp (Priority E-Com), 2783/tcp (AISES), 2654/tcp (Corel VNC Admin), 2966/tcp (IDP-INFOTRIEVE), 2838/tcp (Starbot), 2368/tcp (OpenTable), 2688/tcp (md-cf-http), 2212/tcp (LeeCO POS Server Service), 2824/tcp (CQG Net/LAN 1), 2829/tcp (silkp1), 2820/tcp (UniVision), 2642/tcp (Tragic), 2971/tcp (NetClip clipboard daemon), 2208/tcp (HP I/O Backend), 2219/tcp (NetIQ NCAP Protocol), 2092/tcp (Descent 3), 2831/tcp (silkp3), 2361/tcp (TL1), 2692/tcp (Admins LMS), 2655/tcp (UNIX Nt Glue), 2200/tcp (ICI), 2094/tcp (NBX AU), 2426/tcp, 2604/tcp (NSC CCS), 2466/tcp (Load Balance Forwarding), 2230/tcp (MetaSoft Job Queue Administration Service), 2993/tcp (VERITAS VIS1), 2233/tcp (INFOCRYPT), 2797/tcp (esp-encap), 2646/tcp (AND License Manager), 2778/tcp (Gwen-Sonya), 2364/tcp (OI-2000), 2556/tcp (nicetec-nmsvc), 2427/tcp (Media Gateway Control Protocol Gateway), 2989/tcp (ZARKOV Intelligent Agent Communication), 2693/tcp, 2465/tcp (Load Balance Management), 2432/tcp (codasrv), 2553/tcp (efidiningport), 2767/tcp (UADTC), 2968/tcp (ENPP), 2550/tcp (ADS), 2081/tcp (KME PRINTER TRAP PORT), 2651/tcp (EBInSite), 2464/tcp (DirecPC SI), 2367/tcp (Service Control), 2764/tcp (Data Insurance), 2828/tcp (ITM License Manager), 2554/tcp (VCnet-Link v10), 2097/tcp (Jet Form Preview), 2774/tcp (RBackup Remote Backup), 2614/tcp (Never Offline), 2203/tcp (b2 Runtime Protocol), 2680/tcp (pxc-sapxom), 2283/tcp (LNVSTATUS), 2544/tcp (Management Daemon Refresh), 2286/tcp (NAS-Metering), 2961/tcp (BOLDSOFT-LM), 2299/tcp (PC Telecommute), 2998/tcp (Real Secure), 2547/tcp (vytalvaultvsmp), 2202/tcp (Int. Multimedia Teleconferencing Cosortium), 2965/tcp (BULLANT RAP), 2086/tcp (GNUnet), 2970/tcp (INDEX-NET), 2821/tcp (VERITAS Authentication Service), 2963/tcp (IPH-POLICY-ADM), 2615/tcp (firepower), 2546/tcp (vytalvaultbrtp), 2297/tcp (D2K DataMover 1), 2834/tcp (EVTP), 2377/tcp, 2363/tcp (Media Central NFSD), 2238/tcp (AVIVA SNA SERVER), 2974/tcp (Signal), 2689/tcp (FastLynx), 2471/tcp (SeaODBC), 2691/tcp (ITInternet ISM Server), 2612/tcp (Qpasa Agent), 2424/tcp (KOFAX-SVR), 2962/tcp (IPH-POLICY-CLI), 2429/tcp (FT-ROLE), 2366/tcp (qip-login), 2681/tcp (mpnjsomb), 2295/tcp (Advant License Manager), 2772/tcp (auris), 2218/tcp (Bounzza IRC Proxy), 2606/tcp (Dell Netmon), 2825/tcp, 2371/tcp (Compaq WorldWire Port), 2685/tcp (mpnjsocl), 2421/tcp (G-Talk), 2239/tcp (Image Query), 2969/tcp (ESSP), 2827/tcp (slc ctrlrloops), 2981/tcp (MYLXAMPORT), 2967/tcp (SSC-AGENT), 2217/tcp (GoToDevice Device Management), 2826/tcp (slc systemlog), 2980/tcp (Instant Messaging Service), 2433/tcp (codasrv-se), 2207/tcp (HP Status and Services), 2099/tcp (H.225.0 Annex G), 2696/tcp (Unify Admin), 2287/tcp (DNA), 2373/tcp (Remograph License Manager), 2601/tcp (discp client), 2771/tcp (Vergence CM), 2436/tcp (TOP/X), 2830/tcp (silkp2), 2760/tcp (Saba MS), 2978/tcp (TTCs Enterprise Test Access Protocol - DS), 2822/tcp (ka0wuc), 2992/tcp (Avenyo Server), 2991/tcp (WKSTN-MON), 2439/tcp (SybaseDBSynch), 2977/tcp (TTCs Enterprise Test Access Protocol - NS), 2640/tcp (Sabbagh Associates Licence Manager), 2645/tcp (Novell IPX CMD), 2548/tcp (vytalvaultpipe), 2611/tcp (LIONHEAD), 2619/tcp (bruce), 2201/tcp (Advanced Training System Program), 2541/tcp (LonWorks2), 2438/tcp (MSP), 2836/tcp (catalyst), 2775/tcp (SMPP), 2469/tcp (MTI-TCS-COMM), 2796/tcp (ac-tech), 2608/tcp (Wag Service), 2437/tcp (UniControl), 2657/tcp (SNS Dispatcher), 2088/tcp (IP Busy Lamp Field), 2292/tcp (Sonus Element Management Services), 2837/tcp (Repliweb), 2434/tcp (pxc-epmap), 2085/tcp (ADA Control), 2430/tcp (venus), 2792/tcp (f5-globalsite), 2552/tcp (Call Logging), 2423/tcp (RNRP), 2228/tcp (eHome Message Server), 2213/tcp (Kali), 2220/tcp (NetIQ End2End), 2658/tcp (SNS Admin), 2605/tcp (NSC POSA), 2641/tcp (HDL Server), 2089/tcp (Security Encapsulation Protocol - SEP), 2823/tcp (CQG Net/LAN), 2422/tcp (CRMSBITS), 2226/tcp (Digital Instinct DRM), 2964/tcp (BULLANT SRAP), 2229/tcp (DataLens Service), 2699/tcp (Csoft Plus Client), 2478/tcp (SecurSight Authentication Server (SSL)), 2543/tcp (REFTEK), 2237/tcp (Optech Port1 License Manager), 2839/tcp (NMSigPort).
      
BHD Honeypot
Port scan
2019-12-23

Port scan from IP: 80.82.70.106 detected by psad.

Blacklist

Near real-time, easy to use data feed containing IPs reported on our website.

Bronze

$3

Updated daily

Learn More

Silver

$15

Updated every hour

Learn More

Gold

$30

Updated every 10 minutes

Learn More

Remarks

Black hat directory contains this IP address, because Internet users reported it as an address making unsolicited, nagging requests. We make every effort to ensure that the information contained in the Black hat directory are correct and up to date. The database is developed and updated by Internet users and moderators.

If you have any reliable information regarding malicious activity originating from this IP address, please share it with others and fill in the 'Report breach' form. It is prohibited from adding personally identifiable information.

Below breach categories are used in the database:

  • Denial of service attack - this attack is accomplished by flooding the target with massive amount of requests in order to overload the targeted system
  • Brute force attack - this category encompasses attempts to login to machine by trying many passwords and usernames
  • Backdoor attack - this category represents bypassing authentication by hidden programs or services to obtain remote access to a computer or trojan activity
  • Port scan - represents attackers identifying running services on the targeted machine by probing a server for open ports
  • Malicious bot - this category encompasses all bots performing unsolicited requests or ignoring robots.txt file
  • Anonymous proxy - public proxies like Tor, I2P relays or anonymous VPNs are often used by attacker to hide his identity
  • Web attack - attempts to exploit web application security flaws
  • CMS attack - attempts to exploit CMS vulnerability
  • App vulnerability attack - attempts to exploit other applications vulnerability
  • Web spam - encompasses all kind of HTTP spamming
  • Email spam - encompasses all kind of E-mail spamming
  • Dodgy activity - this category encompasses superfluous, dodgy requests

Similar hosts

Hosts with the same ASN

Report breach!

Rate host 80.82.70.106