IP address: 81.22.45.202

Host rating:

2.0

out of 26 votes

Last update: 2019-10-13

Host details

Unknown
Russia
Unknown
Unknown
See comments

Reported breaches

  • Port scan
Report breach

Whois record

The publicly-available Whois record found at whois.ripe.net server.

% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '81.22.45.0 - 81.22.45.255'

% Abuse contact for '81.22.45.0 - 81.22.45.255' is '[email protected]'

inetnum:        81.22.45.0 - 81.22.45.255
netname:        RU-INFOTECH-20181015
country:        RU
org:            ORG-ITL54-RIPE
admin-c:        LD5832-RIPE
tech-c:         LD5832-RIPE
status:         ASSIGNED PA
mnt-by:         IP-RIPE
mnt-routes:     ru-informtech-1-mnt
mnt-routes:     MNT-SELECTEL
created:        2018-10-15T14:52:53Z
last-modified:  2019-04-08T18:52:43Z
source:         RIPE

% Information related to '81.22.45.0/24AS49505'

route:          81.22.45.0/24
descr:          Selectel Customer
origin:         AS49505
mnt-by:         MNT-SELECTEL
created:        2018-11-23T13:48:16Z
last-modified:  2018-11-23T13:48:16Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.94.1 (HEREFORD)


User comments

26 security incident(s) reported by users

BHD Honeypot
Port scan
2019-10-13

Port scan from IP: 81.22.45.202 detected by psad.
BHD Honeypot
Port scan
2019-10-09

In the last 24h, the attacker (81.22.45.202) attempted to scan 303 ports.
The following ports have been scanned: 3118/tcp (PKAgent), 3205/tcp (iSNS Server Port), 3175/tcp (T1_E1_Over_IP), 3282/tcp (Datusorb), 3136/tcp (Grub Server Port), 3305/tcp (ODETTE-FTP), 3134/tcp (Extensible Code Protocol), 3368/tcp, 3398/tcp (Mercantile), 3123/tcp (EDI Translation Protocol), 3167/tcp (Now Contact Public Server), 3219/tcp (WMS Messenger), 3252/tcp (DHE port), 3396/tcp (Printer Agent), 3204/tcp (Network Watcher DB Access), 3358/tcp (Mp Sys Rmsvr), 3359/tcp (WG NetForce), 3293/tcp (fg-fps), 3262/tcp (NECP), 3323/tcp, 3216/tcp (Ferrari electronic FOAM), 3321/tcp (VNSSTR), 3390/tcp (Distributed Service Coordinator), 3395/tcp (Dyna License Manager (Elam)), 3364/tcp (Creative Server), 3299/tcp (pdrncs), 3127/tcp (CTX Bridge Port), 3303/tcp (OP Session Client), 3317/tcp (VSAI PORT), 3356/tcp (UPNOTIFYPS), 3109/tcp (Personnel protocol), 3208/tcp (PFU PR Callback), 3126/tcp, 3248/tcp (PROCOS LM), 3345/tcp (Influence), 3256/tcp (Compaq RPM Agent Port), 3195/tcp (Network Control Unit), 3213/tcp (NEON 24X7 Mission Control), 3344/tcp (BNT Manager), 3318/tcp (Swith to Swith Routing Information Protocol), 3107/tcp (Business protocol), 3161/tcp (DOC1 License Manager), 3158/tcp (SmashTV Protocol), 3263/tcp (E-Color Enterprise Imager), 3236/tcp (appareNet Test Server), 3343/tcp (MS Cluster Net), 3245/tcp (VIEO Fabric Executive), 3184/tcp (ApogeeX Port), 3383/tcp (Enterprise Software Products License Manager), 3124/tcp (Beacon Port), 3163/tcp (RES-SAP), 3363/tcp (NATI Vi Server), 3143/tcp (Sea View), 3144/tcp (Tarantella), 3225/tcp (FCIP), 3202/tcp (IntraIntra), 3120/tcp (D2000 Webserver Port), 3320/tcp (Office Link 2000), 3100/tcp (OpCon/xps), 3387/tcp (Back Room Net), 3210/tcp (Flamenco Networks Proxy), 3330/tcp (MCS Calypso ICF), 3197/tcp (Embrace Device Protocol Server), 3277/tcp (AWG Proxy), 3369/tcp, 3234/tcp (Alchemy Server), 3187/tcp (Open Design Listen Port), 3159/tcp (NavegaWeb Tarification), 3214/tcp (JMQ Daemon Port 1), 3254/tcp (PDA System), 3339/tcp (OMF data l), 3151/tcp (NetMike Assessor), 3129/tcp (NetPort Discovery Port), 3315/tcp (CDID), 3224/tcp (AES Discovery Port), 3379/tcp (SOCORFS), 3292/tcp (Cart O Rama), 3314/tcp (Unify Object Host), 3271/tcp (CSoft Prev Port), 3199/tcp (DMOD WorkSpace), 3113/tcp (CS-Authenticate Svr Port), 3122/tcp (MTI VTR Emulator port), 3169/tcp (SERVERVIEW-AS), 3142/tcp (RDC WH EOS), 3162/tcp (SFLM), 3348/tcp (Pangolin Laser), 3349/tcp (Chevin Services), 3302/tcp (MCS Fastmail), 3246/tcp (DVT SYSTEM PORT), 3174/tcp (ARMI Server), 3155/tcp (JpegMpeg Port), 3332/tcp (MCS Mail Server), 3121/tcp, 3188/tcp (Broadcom Port), 3297/tcp (Cytel License Manager), 3376/tcp (CD Broker), 3373/tcp (Lavenir License Manager), 3251/tcp (Sys Scanner), 3347/tcp (Phoenix RPC), 3372/tcp (TIP 2), 3160/tcp (TIP Application Server), 3137/tcp (rtnt-1 data packets), 3198/tcp (Embrace Device Protocol Client), 3212/tcp (Survey Instrument), 3111/tcp (Web Synchronous Services), 3146/tcp (bears-02), 3154/tcp (ON RMI Registry), 3222/tcp (Gateway Load Balancing Pr), 3112/tcp (KDE System Guard), 3311/tcp (MCNS Tel Ret), 3170/tcp (SERVERVIEW-ASN), 3384/tcp (Cluster Management Services), 3173/tcp (SERVERVIEW-ICC), 3310/tcp (Dyna Access), 3243/tcp (Timelot Port), 3329/tcp (HP Device Disc), 3328/tcp (Eaglepoint License Manager), 3168/tcp (Now Up-to-Date Public Server), 3281/tcp (SYSOPT), 3125/tcp (A13-AN Interface), 3290/tcp (CAPS LOGISTICS TOOLKIT - LM), 3337/tcp (Direct TV Data Catalog), 3393/tcp (D2K Tapestry Client to Server), 3131/tcp (Net Book Mark), 3226/tcp (ISI Industry Software IRP), 3230/tcp (Software Distributor Port), 3148/tcp (NetMike Game Administrator), 3153/tcp (S8Cargo Client Port), 3228/tcp (DiamondWave MSG Server), 3242/tcp (Session Description ID), 3196/tcp (Network Control Unit), 3209/tcp (HP OpenView Network Path Engine Server), 3152/tcp (FeiTian Port), 3206/tcp (IronMail POP Proxy), 3327/tcp (BBARS), 3378/tcp (WSICOPY), 3275/tcp (SAMD), 3351/tcp (Btrieve port), 3276/tcp (Maxim ASICs), 3394/tcp (D2K Tapestry Server to Server), 3218/tcp (EMC SmartPackets), 3295/tcp (Dynamic IP Lookup), 3255/tcp (Semaphore Connection Port), 3220/tcp (XML NM over SSL), 3316/tcp (AICC/CMI), 3284/tcp (4Talk), 3335/tcp (Direct TV Software Updates), 3183/tcp (COPS/TLS), 3371/tcp, 3128/tcp (Active API Server Port), 3306/tcp (MySQL), 3147/tcp (RFIO), 3211/tcp (Avocent Secure Management), 3346/tcp (Trnsprnt Proxy), 3260/tcp (iSCSI port), 3353/tcp (FATPIPE), 3391/tcp (SAVANT), 3278/tcp (LKCM Server), 3300/tcp, 3194/tcp (Rockstorm MAG protocol), 3238/tcp (appareNet Analysis Server), 3261/tcp (winShadow), 3180/tcp (Millicent Broker Server), 3279/tcp (admind), 3291/tcp (S A Holditch & Associates - LM), 3114/tcp (CCM AutoDiscover), 3313/tcp (Unify Object Broker), 3193/tcp (SpanDataPort), 3115/tcp (MCTET Master), 3232/tcp (MDT port), 3340/tcp (OMF data m), 3331/tcp (MCS Messaging), 3221/tcp (XML NM over TCP), 3355/tcp (Ordinox Dbase), 3190/tcp (ConServR Proxy), 3269/tcp (Microsoft Global Catalog with LDAP/SSL), 3338/tcp (OMF data b), 3350/tcp (FINDVIATV), 3354/tcp (SUITJD), 3110/tcp (simulator control port), 3101/tcp (HP PolicyXpert PIB Server), 3362/tcp (DJ ILM), 3273/tcp (Simple Extensible Multiplexed Protocol), 3157/tcp (CCC Listener Port), 3304/tcp (OP Session Server), 3179/tcp (H2GF W.2m Handover prot.), 3298/tcp (DeskView), 3336/tcp (Direct TV Tickers), 3325/tcp, 3381/tcp (Geneous), 3217/tcp (Unified IP & Telecom Environment), 3102/tcp (SoftlinK Slave Mon Port), 3203/tcp (Network Watcher Monitor), 3360/tcp (KV Server), 3247/tcp (DVT DATA LINK), 3287/tcp (DIRECTVDATA), 3166/tcp (Quest Spotlight Out-Of-Process Collector), 3357/tcp (Adtech Test IP), 3172/tcp (SERVERVIEW-RM), 3367/tcp (-3371  Satellite Video Data Link), 3244/tcp (OneSAF), 3233/tcp (WhiskerControl main port), 3231/tcp (VidiGo communication (previous was: Delta Solutions Direct)), 3201/tcp (CPQ-TaskSmart), 3307/tcp (OP Session Proxy), 3370/tcp, 3334/tcp (Direct TV Webcasting), 3258/tcp (Ivecon Server Port), 3133/tcp (Prism Deploy User Port), 3268/tcp (Microsoft Global Catalog), 3366/tcp (Creative Partner), 3341/tcp (OMF data h), 3186/tcp (IIW Monitor User Port), 3312/tcp (Application Management Server), 3138/tcp (rtnt-2 data packets), 3182/tcp (BMC Patrol Rendezvous), 3365/tcp (Content Server), 3132/tcp (Microsoft Business Rule Engine Update Service), 3342/tcp (WebTIE), 3185/tcp (SuSE Meta PPPD), 3301/tcp, 3361/tcp (KV Agent), 3189/tcp (Pinnacle Sys InfEx Port), 3397/tcp (Cloanto License Manager), 3285/tcp (Plato), 3274/tcp (Ordinox Server), 3399/tcp (CSMS), 3171/tcp (SERVERVIEW-GF), 3139/tcp (Incognito Rendez-Vous), 3272/tcp (Fujitsu User Manager), 3375/tcp (VSNM Agent), 3250/tcp (HMS hicp port), 3135/tcp (PeerBook Port), 3150/tcp (NetMike Assessor Administrator), 3289/tcp (ENPC), 3259/tcp (Epson Network Common Devi), 3296/tcp (Rib License Manager), 3108/tcp (Geolocate protocol), 3319/tcp (SDT License Manager), 3149/tcp (NetMike Game Server), 3388/tcp (CB Server), 3239/tcp (appareNet User Interface), 3106/tcp (Cardbox HTTP), 3283/tcp (Net Assistant), 3207/tcp (Veritas Authentication Port), 3249/tcp (State Sync Protocol).
      
BHD Honeypot
Port scan
2019-10-08

In the last 24h, the attacker (81.22.45.202) attempted to scan 11 ports.
The following ports have been scanned: 3352/tcp (Scalable SQL), 3324/tcp, 3363/tcp (NATI Vi Server), 3373/tcp (Lavenir License Manager), 3294/tcp (fg-gip), 3351/tcp (Btrieve port), 3130/tcp (ICPv2), 3367/tcp (-3371  Satellite Video Data Link), 3286/tcp (E-Net), 3342/tcp (WebTIE).
      
BHD Honeypot
Port scan
2019-10-08

Port scan from IP: 81.22.45.202 detected by psad.
BHD Honeypot
Port scan
2019-10-07

In the last 24h, the attacker (81.22.45.202) attempted to scan 10 ports.
The following ports have been scanned: 3398/tcp (Mercantile), 3396/tcp (Printer Agent), 3317/tcp (VSAI PORT), 3344/tcp (BNT Manager), 3328/tcp (Eaglepoint License Manager), 3335/tcp (Direct TV Software Updates), 3338/tcp (OMF data b), 3381/tcp (Geneous), 3366/tcp (Creative Partner), 3361/tcp (KV Agent).
      
BHD Honeypot
Port scan
2019-10-06

In the last 24h, the attacker (81.22.45.202) attempted to scan 25 ports.
The following ports have been scanned: 3359/tcp (WG NetForce), 3364/tcp (Creative Server), 3303/tcp (OP Session Client), 3345/tcp (Influence), 3344/tcp (BNT Manager), 3320/tcp (Office Link 2000), 3387/tcp (Back Room Net), 3369/tcp, 3315/tcp (CDID), 3348/tcp (Pangolin Laser), 3332/tcp (MCS Mail Server), 3386/tcp (GPRS Data), 3392/tcp (EFI License Management), 3351/tcp (Btrieve port), 3353/tcp (FATPIPE), 3300/tcp, 3331/tcp (MCS Messaging), 3350/tcp (FINDVIATV), 3333/tcp (DEC Notes), 3370/tcp, 3341/tcp (OMF data h), 3312/tcp (Application Management Server), 3301/tcp.
      
BHD Honeypot
Port scan
2019-10-05

In the last 24h, the attacker (81.22.45.202) attempted to scan 5 ports.
The following ports have been scanned: 3385/tcp (qnxnetman), 3335/tcp (Direct TV Software Updates), 3391/tcp (SAVANT), 3365/tcp (Content Server), 3399/tcp (CSMS).
      
BHD Honeypot
Port scan
2019-10-04

In the last 24h, the attacker (81.22.45.202) attempted to scan 25 ports.
The following ports have been scanned: 3352/tcp (Scalable SQL), 3368/tcp, 3321/tcp (VNSSTR), 3390/tcp (Distributed Service Coordinator), 3303/tcp (OP Session Client), 3345/tcp (Influence), 3363/tcp (NATI Vi Server), 3320/tcp (Office Link 2000), 3330/tcp (MCS Calypso ICF), 3315/tcp (CDID), 3302/tcp (MCS Fastmail), 3373/tcp (Lavenir License Manager), 3309/tcp (TNS ADV), 3378/tcp (WSICOPY), 3346/tcp (Trnsprnt Proxy), 3300/tcp, 3350/tcp (FINDVIATV), 3304/tcp (OP Session Server), 3336/tcp (Direct TV Tickers), 3360/tcp (KV Server), 3367/tcp (-3371  Satellite Video Data Link), 3307/tcp (OP Session Proxy), 3380/tcp (SNS Channels).
      
BHD Honeypot
Port scan
2019-10-03

In the last 24h, the attacker (81.22.45.202) attempted to scan 71 ports.
The following ports have been scanned: 3305/tcp (ODETTE-FTP), 3398/tcp (Mercantile), 3358/tcp (Mp Sys Rmsvr), 3359/tcp (WG NetForce), 3321/tcp (VNSSTR), 3390/tcp (Distributed Service Coordinator), 3395/tcp (Dyna License Manager (Elam)), 3324/tcp, 3356/tcp (UPNOTIFYPS), 3377/tcp (Cogsys Network License Manager), 3318/tcp (Swith to Swith Routing Information Protocol), 3343/tcp (MS Cluster Net), 3383/tcp (Enterprise Software Products License Manager), 3363/tcp (NATI Vi Server), 3387/tcp (Back Room Net), 3330/tcp (MCS Calypso ICF), 3379/tcp (SOCORFS), 3314/tcp (Unify Object Host), 3349/tcp (Chevin Services), 3332/tcp (MCS Mail Server), 3376/tcp (CD Broker), 3373/tcp (Lavenir License Manager), 3372/tcp (TIP 2), 3386/tcp (GPRS Data), 3310/tcp (Dyna Access), 3337/tcp (Direct TV Data Catalog), 3392/tcp (EFI License Management), 3327/tcp (BBARS), 3378/tcp (WSICOPY), 3351/tcp (Btrieve port), 3394/tcp (D2K Tapestry Server to Server), 3371/tcp, 3353/tcp (FATPIPE), 3391/tcp (SAVANT), 3300/tcp, 3313/tcp (Unify Object Broker), 3340/tcp (OMF data m), 3355/tcp (Ordinox Dbase), 3326/tcp (SFTU), 3338/tcp (OMF data b), 3350/tcp (FINDVIATV), 3362/tcp (DJ ILM), 3374/tcp (Cluster Disc), 3304/tcp (OP Session Server), 3381/tcp (Geneous), 3360/tcp (KV Server), 3357/tcp (Adtech Test IP), 3367/tcp (-3371  Satellite Video Data Link), 3333/tcp (DEC Notes), 3307/tcp (OP Session Proxy), 3370/tcp, 3334/tcp (Direct TV Webcasting), 3366/tcp (Creative Partner), 3301/tcp, 3319/tcp (SDT License Manager), 3322/tcp (-3325  Active Networks).
      
BHD Honeypot
Port scan
2019-10-03

Port scan from IP: 81.22.45.202 detected by psad.
BHD Honeypot
Port scan
2019-10-02

In the last 24h, the attacker (81.22.45.202) attempted to scan 51 ports.
The following ports have been scanned: 3305/tcp (ODETTE-FTP), 3368/tcp, 3396/tcp (Printer Agent), 3395/tcp (Dyna License Manager (Elam)), 3317/tcp (VSAI PORT), 3345/tcp (Influence), 3318/tcp (Swith to Swith Routing Information Protocol), 3383/tcp (Enterprise Software Products License Manager), 3363/tcp (NATI Vi Server), 3387/tcp (Back Room Net), 3330/tcp (MCS Calypso ICF), 3369/tcp, 3339/tcp (OMF data l), 3315/tcp (CDID), 3348/tcp (Pangolin Laser), 3373/tcp (Lavenir License Manager), 3372/tcp (TIP 2), 3385/tcp (qnxnetman), 3384/tcp (Cluster Management Services), 3310/tcp (Dyna Access), 3328/tcp (Eaglepoint License Manager), 3393/tcp (D2K Tapestry Client to Server), 3309/tcp (TNS ADV), 3327/tcp (BBARS), 3378/tcp (WSICOPY), 3394/tcp (D2K Tapestry Server to Server), 3316/tcp (AICC/CMI), 3306/tcp (MySQL), 3346/tcp (Trnsprnt Proxy), 3353/tcp (FATPIPE), 3300/tcp, 3331/tcp (MCS Messaging), 3338/tcp (OMF data b), 3350/tcp (FINDVIATV), 3354/tcp (SUITJD), 3325/tcp, 3357/tcp (Adtech Test IP), 3307/tcp (OP Session Proxy), 3334/tcp (Direct TV Webcasting), 3341/tcp (OMF data h), 3380/tcp (SNS Channels), 3397/tcp (Cloanto License Manager), 3382/tcp (Fujitsu Network Enhanced Antitheft function), 3319/tcp (SDT License Manager).
      
BHD Honeypot
Port scan
2019-10-01

In the last 24h, the attacker (81.22.45.202) attempted to scan 87 ports.
The following ports have been scanned: 3352/tcp (Scalable SQL), 3396/tcp (Printer Agent), 3359/tcp (WG NetForce), 3321/tcp (VNSSTR), 3395/tcp (Dyna License Manager (Elam)), 3324/tcp, 3364/tcp (Creative Server), 3389/tcp (MS WBT Server), 3356/tcp (UPNOTIFYPS), 3345/tcp (Influence), 3377/tcp (Cogsys Network License Manager), 3344/tcp (BNT Manager), 3343/tcp (MS Cluster Net), 3383/tcp (Enterprise Software Products License Manager), 3363/tcp (NATI Vi Server), 3330/tcp (MCS Calypso ICF), 3369/tcp, 3339/tcp (OMF data l), 3315/tcp (CDID), 3348/tcp (Pangolin Laser), 3302/tcp (MCS Fastmail), 3332/tcp (MCS Mail Server), 3376/tcp (CD Broker), 3373/tcp (Lavenir License Manager), 3372/tcp (TIP 2), 3386/tcp (GPRS Data), 3385/tcp (qnxnetman), 3311/tcp (MCNS Tel Ret), 3384/tcp (Cluster Management Services), 3310/tcp (Dyna Access), 3329/tcp (HP Device Disc), 3337/tcp (Direct TV Data Catalog), 3393/tcp (D2K Tapestry Client to Server), 3392/tcp (EFI License Management), 3309/tcp (TNS ADV), 3327/tcp (BBARS), 3378/tcp (WSICOPY), 3316/tcp (AICC/CMI), 3335/tcp (Direct TV Software Updates), 3371/tcp, 3306/tcp (MySQL), 3346/tcp (Trnsprnt Proxy), 3353/tcp (FATPIPE), 3391/tcp (SAVANT), 3308/tcp (TNS Server), 3313/tcp (Unify Object Broker), 3340/tcp (OMF data m), 3331/tcp (MCS Messaging), 3355/tcp (Ordinox Dbase), 3350/tcp (FINDVIATV), 3374/tcp (Cluster Disc), 3304/tcp (OP Session Server), 3336/tcp (Direct TV Tickers), 3381/tcp (Geneous), 3360/tcp (KV Server), 3357/tcp (Adtech Test IP), 3367/tcp (-3371  Satellite Video Data Link), 3307/tcp (OP Session Proxy), 3370/tcp, 3334/tcp (Direct TV Webcasting), 3366/tcp (Creative Partner), 3341/tcp (OMF data h), 3312/tcp (Application Management Server), 3365/tcp (Content Server), 3361/tcp (KV Agent), 3380/tcp (SNS Channels), 3399/tcp (CSMS), 3319/tcp (SDT License Manager), 3388/tcp (CB Server), 3322/tcp (-3325  Active Networks).
      
BHD Honeypot
Port scan
2019-09-29

In the last 24h, the attacker (81.22.45.202) attempted to scan 239 ports.
The following ports have been scanned: 3352/tcp (Scalable SQL), 3305/tcp (ODETTE-FTP), 3368/tcp, 3398/tcp (Mercantile), 3396/tcp (Printer Agent), 3358/tcp (Mp Sys Rmsvr), 3359/tcp (WG NetForce), 3323/tcp, 3321/tcp (VNSSTR), 3390/tcp (Distributed Service Coordinator), 3395/tcp (Dyna License Manager (Elam)), 3324/tcp, 3364/tcp (Creative Server), 3389/tcp (MS WBT Server), 3303/tcp (OP Session Client), 3317/tcp (VSAI PORT), 3356/tcp (UPNOTIFYPS), 3345/tcp (Influence), 3377/tcp (Cogsys Network License Manager), 3344/tcp (BNT Manager), 3318/tcp (Swith to Swith Routing Information Protocol), 3383/tcp (Enterprise Software Products License Manager), 3363/tcp (NATI Vi Server), 3320/tcp (Office Link 2000), 3387/tcp (Back Room Net), 3330/tcp (MCS Calypso ICF), 3369/tcp, 3339/tcp (OMF data l), 3315/tcp (CDID), 3379/tcp (SOCORFS), 3314/tcp (Unify Object Host), 3348/tcp (Pangolin Laser), 3349/tcp (Chevin Services), 3302/tcp (MCS Fastmail), 3332/tcp (MCS Mail Server), 3376/tcp (CD Broker), 3373/tcp (Lavenir License Manager), 3347/tcp (Phoenix RPC), 3372/tcp (TIP 2), 3386/tcp (GPRS Data), 3385/tcp (qnxnetman), 3311/tcp (MCNS Tel Ret), 3384/tcp (Cluster Management Services), 3310/tcp (Dyna Access), 3329/tcp (HP Device Disc), 3328/tcp (Eaglepoint License Manager), 3337/tcp (Direct TV Data Catalog), 3393/tcp (D2K Tapestry Client to Server), 3392/tcp (EFI License Management), 3309/tcp (TNS ADV), 3327/tcp (BBARS), 3378/tcp (WSICOPY), 3351/tcp (Btrieve port), 3394/tcp (D2K Tapestry Server to Server), 3316/tcp (AICC/CMI), 3335/tcp (Direct TV Software Updates), 3371/tcp, 3306/tcp (MySQL), 3346/tcp (Trnsprnt Proxy), 3353/tcp (FATPIPE), 3391/tcp (SAVANT), 3300/tcp, 3308/tcp (TNS Server), 3340/tcp (OMF data m), 3331/tcp (MCS Messaging), 3355/tcp (Ordinox Dbase), 3326/tcp (SFTU), 3338/tcp (OMF data b), 3350/tcp (FINDVIATV), 3354/tcp (SUITJD), 3362/tcp (DJ ILM), 3374/tcp (Cluster Disc), 3304/tcp (OP Session Server), 3336/tcp (Direct TV Tickers), 3325/tcp, 3381/tcp (Geneous), 3360/tcp (KV Server), 3357/tcp (Adtech Test IP), 3367/tcp (-3371  Satellite Video Data Link), 3333/tcp (DEC Notes), 3307/tcp (OP Session Proxy), 3370/tcp, 3334/tcp (Direct TV Webcasting), 3366/tcp (Creative Partner), 3341/tcp (OMF data h), 3312/tcp (Application Management Server), 3365/tcp (Content Server), 3342/tcp (WebTIE), 3301/tcp, 3361/tcp (KV Agent), 3380/tcp (SNS Channels), 3397/tcp (Cloanto License Manager), 3399/tcp (CSMS), 3375/tcp (VSNM Agent), 3382/tcp (Fujitsu Network Enhanced Antitheft function), 3319/tcp (SDT License Manager), 3388/tcp (CB Server), 3322/tcp (-3325  Active Networks).
      
BHD Honeypot
Port scan
2019-09-28

In the last 24h, the attacker (81.22.45.202) attempted to scan 145 ports.
The following ports have been scanned: 3352/tcp (Scalable SQL), 3305/tcp (ODETTE-FTP), 3368/tcp, 3398/tcp (Mercantile), 3396/tcp (Printer Agent), 3358/tcp (Mp Sys Rmsvr), 3359/tcp (WG NetForce), 3323/tcp, 3390/tcp (Distributed Service Coordinator), 3364/tcp (Creative Server), 3389/tcp (MS WBT Server), 3303/tcp (OP Session Client), 3317/tcp (VSAI PORT), 3356/tcp (UPNOTIFYPS), 3345/tcp (Influence), 3377/tcp (Cogsys Network License Manager), 3344/tcp (BNT Manager), 3318/tcp (Swith to Swith Routing Information Protocol), 3343/tcp (MS Cluster Net), 3363/tcp (NATI Vi Server), 3320/tcp (Office Link 2000), 3387/tcp (Back Room Net), 3330/tcp (MCS Calypso ICF), 3369/tcp, 3339/tcp (OMF data l), 3315/tcp (CDID), 3379/tcp (SOCORFS), 3314/tcp (Unify Object Host), 3348/tcp (Pangolin Laser), 3349/tcp (Chevin Services), 3302/tcp (MCS Fastmail), 3332/tcp (MCS Mail Server), 3347/tcp (Phoenix RPC), 3372/tcp (TIP 2), 3311/tcp (MCNS Tel Ret), 3384/tcp (Cluster Management Services), 3310/tcp (Dyna Access), 3329/tcp (HP Device Disc), 3328/tcp (Eaglepoint License Manager), 3337/tcp (Direct TV Data Catalog), 3392/tcp (EFI License Management), 3309/tcp (TNS ADV), 3327/tcp (BBARS), 3378/tcp (WSICOPY), 3351/tcp (Btrieve port), 3394/tcp (D2K Tapestry Server to Server), 3316/tcp (AICC/CMI), 3335/tcp (Direct TV Software Updates), 3371/tcp, 3306/tcp (MySQL), 3353/tcp (FATPIPE), 3391/tcp (SAVANT), 3308/tcp (TNS Server), 3313/tcp (Unify Object Broker), 3340/tcp (OMF data m), 3331/tcp (MCS Messaging), 3355/tcp (Ordinox Dbase), 3326/tcp (SFTU), 3338/tcp (OMF data b), 3350/tcp (FINDVIATV), 3362/tcp (DJ ILM), 3374/tcp (Cluster Disc), 3304/tcp (OP Session Server), 3336/tcp (Direct TV Tickers), 3325/tcp, 3381/tcp (Geneous), 3367/tcp (-3371  Satellite Video Data Link), 3333/tcp (DEC Notes), 3307/tcp (OP Session Proxy), 3366/tcp (Creative Partner), 3341/tcp (OMF data h), 3365/tcp (Content Server), 3342/tcp (WebTIE), 3301/tcp, 3361/tcp (KV Agent), 3380/tcp (SNS Channels), 3397/tcp (Cloanto License Manager), 3375/tcp (VSNM Agent), 3382/tcp (Fujitsu Network Enhanced Antitheft function), 3319/tcp (SDT License Manager), 3388/tcp (CB Server), 3322/tcp (-3325  Active Networks).
      
BHD Honeypot
Port scan
2019-09-28

Port scan from IP: 81.22.45.202 detected by psad.
BHD Honeypot
Port scan
2019-09-26

In the last 24h, the attacker (81.22.45.202) attempted to scan 5 ports.
The following ports have been scanned: 3344/tcp (BNT Manager), 3353/tcp (FATPIPE), 3341/tcp (OMF data h), 3375/tcp (VSNM Agent), 3322/tcp (-3325  Active Networks).
      
BHD Honeypot
Port scan
2019-09-25

In the last 24h, the attacker (81.22.45.202) attempted to scan 5 ports.
The following ports have been scanned: 3396/tcp (Printer Agent), 3351/tcp (Btrieve port), 3354/tcp (SUITJD), 3360/tcp (KV Server), 3342/tcp (WebTIE).
      
BHD Honeypot
Port scan
2019-09-22

In the last 24h, the attacker (81.22.45.202) attempted to scan 168 ports.
The following ports have been scanned: 3352/tcp (Scalable SQL), 3368/tcp, 3398/tcp (Mercantile), 3396/tcp (Printer Agent), 3358/tcp (Mp Sys Rmsvr), 3359/tcp (WG NetForce), 3321/tcp (VNSSTR), 3390/tcp (Distributed Service Coordinator), 3395/tcp (Dyna License Manager (Elam)), 3324/tcp, 3364/tcp (Creative Server), 3389/tcp (MS WBT Server), 3356/tcp (UPNOTIFYPS), 3377/tcp (Cogsys Network License Manager), 3344/tcp (BNT Manager), 3343/tcp (MS Cluster Net), 3383/tcp (Enterprise Software Products License Manager), 3363/tcp (NATI Vi Server), 3320/tcp (Office Link 2000), 3387/tcp (Back Room Net), 3330/tcp (MCS Calypso ICF), 3369/tcp, 3339/tcp (OMF data l), 3379/tcp (SOCORFS), 3348/tcp (Pangolin Laser), 3349/tcp (Chevin Services), 3332/tcp (MCS Mail Server), 3376/tcp (CD Broker), 3373/tcp (Lavenir License Manager), 3347/tcp (Phoenix RPC), 3372/tcp (TIP 2), 3386/tcp (GPRS Data), 3385/tcp (qnxnetman), 3384/tcp (Cluster Management Services), 3329/tcp (HP Device Disc), 3328/tcp (Eaglepoint License Manager), 3337/tcp (Direct TV Data Catalog), 3393/tcp (D2K Tapestry Client to Server), 3392/tcp (EFI License Management), 3327/tcp (BBARS), 3378/tcp (WSICOPY), 3351/tcp (Btrieve port), 3394/tcp (D2K Tapestry Server to Server), 3335/tcp (Direct TV Software Updates), 3346/tcp (Trnsprnt Proxy), 3353/tcp (FATPIPE), 3391/tcp (SAVANT), 3340/tcp (OMF data m), 3331/tcp (MCS Messaging), 3355/tcp (Ordinox Dbase), 3326/tcp (SFTU), 3338/tcp (OMF data b), 3350/tcp (FINDVIATV), 3354/tcp (SUITJD), 3362/tcp (DJ ILM), 3374/tcp (Cluster Disc), 3336/tcp (Direct TV Tickers), 3325/tcp, 3381/tcp (Geneous), 3360/tcp (KV Server), 3357/tcp (Adtech Test IP), 3367/tcp (-3371  Satellite Video Data Link), 3333/tcp (DEC Notes), 3370/tcp, 3334/tcp (Direct TV Webcasting), 3366/tcp (Creative Partner), 3365/tcp (Content Server), 3342/tcp (WebTIE), 3361/tcp (KV Agent), 3380/tcp (SNS Channels), 3397/tcp (Cloanto License Manager), 3399/tcp (CSMS), 3375/tcp (VSNM Agent), 3382/tcp (Fujitsu Network Enhanced Antitheft function), 3388/tcp (CB Server).
      
BHD Honeypot
Port scan
2019-09-21

In the last 24h, the attacker (81.22.45.202) attempted to scan 30 ports.
The following ports have been scanned: 3398/tcp (Mercantile), 3359/tcp (WG NetForce), 3323/tcp, 3390/tcp (Distributed Service Coordinator), 3324/tcp, 3364/tcp (Creative Server), 3345/tcp (Influence), 3344/tcp (BNT Manager), 3320/tcp (Office Link 2000), 3369/tcp, 3339/tcp (OMF data l), 3348/tcp (Pangolin Laser), 3376/tcp (CD Broker), 3337/tcp (Direct TV Data Catalog), 3378/tcp (WSICOPY), 3371/tcp, 3331/tcp (MCS Messaging), 3374/tcp (Cluster Disc), 3336/tcp (Direct TV Tickers), 3357/tcp (Adtech Test IP), 3370/tcp, 3334/tcp (Direct TV Webcasting), 3341/tcp (OMF data h), 3365/tcp (Content Server), 3361/tcp (KV Agent), 3399/tcp (CSMS), 3375/tcp (VSNM Agent), 3388/tcp (CB Server).
      
BHD Honeypot
Port scan
2019-09-21

Port scan from IP: 81.22.45.202 detected by psad.

Blacklist

Near real-time, easy to use data feed containing IPs reported on our website.

Bronze

$3

Updated daily

Learn More

Silver

$15

Updated every hour

Learn More

Gold

$30

Updated every 10 minutes

Learn More

Remarks

Black hat directory contains this IP address, because Internet users reported it as an address making unsolicited, nagging requests. We make every effort to ensure that the information contained in the Black hat directory are correct and up to date. The database is developed and updated by Internet users and moderators.

If you have any reliable information regarding malicious activity originating from this IP address, please share it with others and fill in the 'Report breach' form. It is prohibited from adding personally identifiable information.

Below breach categories are used in the database:

  • Denial of service attack - this attack is accomplished by flooding the target with massive amount of requests in order to overload the targeted system
  • Brute force attack - this category encompasses attempts to login to machine by trying many passwords and usernames
  • Backdoor attack - this category represents bypassing authentication by hidden programs or services to obtain remote access to a computer or trojan activity
  • Port scan - represents attackers identifying running services on the targeted machine by probing a server for open ports
  • Malicious bot - this category encompasses all bots performing unsolicited requests or ignoring robots.txt file
  • Anonymous proxy - public proxies like Tor, I2P relays or anonymous VPNs are often used by attacker to hide his identity
  • Web attack - attempts to exploit web application security flaws
  • CMS attack - attempts to exploit CMS vulnerability
  • App vulnerability attack - attempts to exploit other applications vulnerability
  • Web spam - encompasses all kind of HTTP spamming
  • Email spam - encompasses all kind of E-mail spamming
  • Dodgy activity - this category encompasses superfluous, dodgy requests

Report breach!

Rate host 81.22.45.202