IP address: 81.22.45.53

Host rating:

2.0

out of 23 votes

Last update: 2019-10-13

Host details

Unknown
Russia
Unknown
Unknown
See comments

Reported breaches

  • Port scan
Report breach

Whois record

The publicly-available Whois record found at whois.ripe.net server.

% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '81.22.45.0 - 81.22.45.255'

% Abuse contact for '81.22.45.0 - 81.22.45.255' is '[email protected]'

inetnum:        81.22.45.0 - 81.22.45.255
netname:        RU-INFOTECH-20181015
country:        RU
org:            ORG-ITL54-RIPE
admin-c:        LD5832-RIPE
tech-c:         LD5832-RIPE
status:         ASSIGNED PA
mnt-by:         IP-RIPE
mnt-routes:     ru-informtech-1-mnt
mnt-routes:     MNT-SELECTEL
created:        2018-10-15T14:52:53Z
last-modified:  2019-04-08T18:52:43Z
source:         RIPE

% Information related to '81.22.45.0/24AS49505'

route:          81.22.45.0/24
descr:          Selectel Customer
origin:         AS49505
mnt-by:         MNT-SELECTEL
created:        2018-11-23T13:48:16Z
last-modified:  2018-11-23T13:48:16Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.94 (BLAARKOP)


User comments

23 security incident(s) reported by users

BHD Honeypot
Port scan
2019-10-13

In the last 24h, the attacker (81.22.45.53) attempted to scan 103 ports.
The following ports have been scanned: 2266/tcp (M-Files Server), 29792/tcp, 3175/tcp (T1_E1_Over_IP), 36036/tcp, 1560/tcp (ASCI-RemoteSHADOW), 10685/tcp, 4145/tcp (VVR Control), 7540/tcp, 38083/tcp, 10730/tcp, 10380/tcp, 4848/tcp (App Server - Admin HTTP), 31613/tcp, 61061/tcp, 10640/tcp, 7474/tcp, 29992/tcp, 2580/tcp (Tributary), 33033/tcp, 10530/tcp, 5590/tcp, 59095/tcp, 14141/tcp (VCS Application), 33733/tcp, 63136/tcp, 6565/tcp, 5151/tcp (ESRI SDE Instance), 2389/tcp (OpenView Session Mgr), 54054/tcp, 11611/tcp, 10285/tcp, 4530/tcp, 61416/tcp, 51615/tcp, 3155/tcp (JpegMpeg Port), 41814/tcp, 8060/tcp, 10875/tcp, 10705/tcp, 63736/tcp, 13013/tcp, 33/tcp (Display Support Protocol), 10465/tcp, 10880/tcp, 5454/tcp (APC 5454), 3939/tcp (Anti-virus Application Management Port), 2140/tcp (IAS-REG), 10480/tcp, 9055/tcp, 10815/tcp, 3001/tcp, 11511/tcp, 1540/tcp (rds), 34034/tcp, 58058/tcp, 10335/tcp, 44044/tcp, 10230/tcp, 6262/tcp, 10750/tcp, 10255/tcp, 61316/tcp, 10820/tcp, 5757/tcp (OpenMail X.500 Directory Server), 4135/tcp (Classic Line Database Server Attach), 10400/tcp, 10590/tcp, 29029/tcp, 10470/tcp, 51815/tcp, 6035/tcp, 10560/tcp, 43134/tcp, 10860/tcp (Helix Client/Server), 28082/tcp, 2287/tcp (DNA), 2900/tcp (QUICKSUITE), 16161/tcp (Solaris SEA Port), 31413/tcp, 39039/tcp, 8484/tcp, 5577/tcp, 6868/tcp (Acctopus Command Channel), 4105/tcp (ShofarPlayer), 7055/tcp, 2929/tcp (AMX-WEBADMIN), 8590/tcp, 1987/tcp (cisco RSRB Priority 1 port), 10520/tcp, 10510/tcp, 7560/tcp (Sniffer Command Protocol), 10910/tcp, 3150/tcp (NetMike Assessor Administrator), 61516/tcp, 1986/tcp (cisco license management).
      
BHD Honeypot
Port scan
2019-10-12

In the last 24h, the attacker (81.22.45.53) attempted to scan 144 ports.
The following ports have been scanned: 56056/tcp, 53935/tcp, 3175/tcp (T1_E1_Over_IP), 28782/tcp, 6530/tcp, 28028/tcp, 8181/tcp, 6590/tcp, 37037/tcp, 49094/tcp, 4422/tcp, 15151/tcp, 10125/tcp, 53035/tcp, 61061/tcp, 2281/tcp (LNVCONSOLE), 10345/tcp, 10135/tcp, 4545/tcp (WorldScores), 10640/tcp, 82/tcp (XFER Utility), 2580/tcp (Tributary), 3120/tcp (D2000 Webserver Port), 10675/tcp, 33433/tcp, 10780/tcp, 10790/tcp, 25352/tcp, 33733/tcp, 63136/tcp, 64046/tcp, 11611/tcp, 43634/tcp, 33533/tcp, 2277/tcp (Bt device control proxy), 2155/tcp (Bridge Protocol), 6540/tcp, 3636/tcp (SerVistaITSM), 5656/tcp, 51615/tcp, 10870/tcp, 8060/tcp, 10185/tcp, 8050/tcp, 10260/tcp (Axis WIMP Port), 10875/tcp, 10320/tcp, 10600/tcp, 47074/tcp, 6085/tcp (konspire2b p2p network), 29092/tcp, 57075/tcp, 6560/tcp, 46046/tcp, 53053/tcp, 3170/tcp (SERVERVIEW-ASN), 10200/tcp (Trigence AE Soap Service), 62026/tcp, 8025/tcp (CA Audit Distribution Agent), 3939/tcp (Anti-virus Application Management Port), 7015/tcp (Talon Webserver), 2289/tcp (Lookup dict server), 1199/tcp (DMIDI), 8787/tcp (Message Server), 10815/tcp, 44/tcp (MPM FLAGS Protocol), 10275/tcp, 3530/tcp (Grid Friendly), 11011/tcp, 44044/tcp, 10230/tcp, 10140/tcp, 46064/tcp, 9797/tcp, 10175/tcp, 10190/tcp, 53435/tcp, 8520/tcp, 7550/tcp, 27672/tcp, 51415/tcp, 3110/tcp (simulator control port), 10155/tcp, 3145/tcp (CSI-LFAP), 1120/tcp (Battle.net File Transfer Protocol), 2115/tcp (Key Distribution Manager), 7979/tcp (Micromuse-ncps), 63536/tcp, 10630/tcp, 2301/tcp (Compaq HTTP), 2900/tcp (QUICKSUITE), 17171/tcp, 53135/tcp, 41514/tcp, 26662/tcp, 35035/tcp, 2273/tcp (MySQL Instance Manager), 5577/tcp, 993/tcp (imap4 protocol over TLS/SSL), 10655/tcp, 10250/tcp, 10115/tcp (NetIQ Endpoint), 4105/tcp (ShofarPlayer), 6363/tcp, 10360/tcp, 2929/tcp (AMX-WEBADMIN), 47047/tcp, 7045/tcp, 43043/tcp, 10985/tcp, 10510/tcp, 41614/tcp, 27072/tcp, 10245/tcp, 3004/tcp (Csoft Agent), 41914/tcp, 4477/tcp, 27027/tcp, 10755/tcp, 10775/tcp, 7040/tcp, 37373/tcp, 5252/tcp (Movaz SSC).
      
BHD Honeypot
Port scan
2019-10-11

In the last 24h, the attacker (81.22.45.53) attempted to scan 55 ports.
The following ports have been scanned: 53935/tcp, 10735/tcp, 6530/tcp, 21212/tcp, 12012/tcp (Vipera Messaging Service), 10070/tcp, 2165/tcp (X-Bone API), 10665/tcp, 11211/tcp (Memory cache service), 7272/tcp (WatchMe Monitoring 7272), 10670/tcp, 9020/tcp (TAMBORA), 10150/tcp, 31031/tcp, 1185/tcp (Catchpole port), 5151/tcp (ESRI SDE Instance), 27272/tcp, 51615/tcp, 8060/tcp, 1125/tcp (HP VMM Agent), 6767/tcp (BMC PERFORM AGENT), 46046/tcp, 41214/tcp, 62026/tcp, 8025/tcp (CA Audit Distribution Agent), 2381/tcp (Compaq HTTPS), 1139/tcp (Enterprise Virtual Manager), 4540/tcp, 11155/tcp, 10475/tcp, 24024/tcp, 1170/tcp (AT+C License Manager), 6025/tcp, 7510/tcp (HP OpenView Application Server), 6644/tcp, 8520/tcp, 7722/tcp, 43334/tcp, 10095/tcp, 3006/tcp (Instant Internet Admin), 24342/tcp, 26/tcp, 6015/tcp, 11/tcp (Active Users), 29492/tcp, 8484/tcp, 19191/tcp (OPSEC UAA), 10115/tcp (NetIQ Endpoint), 4105/tcp (ShofarPlayer), 6688/tcp (CleverView for TCP/IP Message Service), 10520/tcp, 10090/tcp, 41914/tcp, 8085/tcp.
      
BHD Honeypot
Port scan
2019-10-10

In the last 24h, the attacker (81.22.45.53) attempted to scan 71 ports.
The following ports have been scanned: 10740/tcp, 10690/tcp, 7676/tcp (iMQ Broker Rendezvous), 11122/tcp, 12121/tcp (NuPaper Session Service), 63236/tcp, 28982/tcp, 12012/tcp (Vipera Messaging Service), 4848/tcp (App Server - Admin HTTP), 10665/tcp, 10825/tcp, 25552/tcp, 10135/tcp, 10440/tcp, 10410/tcp, 1185/tcp (Catchpole port), 14141/tcp (VCS Application), 10285/tcp, 8075/tcp, 10930/tcp, 10870/tcp, 8050/tcp, 10765/tcp, 9065/tcp, 6622/tcp (Multicast FTP), 46046/tcp, 33/tcp (Display Support Protocol), 11711/tcp, 5454/tcp (APC 5454), 10145/tcp, 11144/tcp, 8580/tcp, 2590/tcp (idotdist), 10335/tcp, 10275/tcp, 10615/tcp, 10265/tcp, 25152/tcp, 11911/tcp, 3115/tcp (MCTET Master), 4135/tcp (Classic Line Database Server Attach), 9966/tcp (OKI Data Network Setting Protocol), 10075/tcp, 4110/tcp (G2 RFID Tag Telemetry Data), 2115/tcp (Key Distribution Manager), 33933/tcp, 63536/tcp, 10630/tcp, 34043/tcp, 26026/tcp, 8484/tcp, 19191/tcp (OPSEC UAA), 1510/tcp (Midland Valley Exploration Ltd. Lic. Man.), 10220/tcp, 9933/tcp, 10490/tcp, 10805/tcp (LUCIA Pareja Data Group), 10985/tcp, 10370/tcp, 10225/tcp, 10755/tcp, 10775/tcp, 10900/tcp, 10210/tcp, 5533/tcp, 8833/tcp.
      
BHD Honeypot
Port scan
2019-10-10

Port scan from IP: 81.22.45.53 detected by psad.
BHD Honeypot
Port scan
2019-10-09

In the last 24h, the attacker (81.22.45.53) attempted to scan 136 ports.
The following ports have been scanned: 2266/tcp (M-Files Server), 2185/tcp (OnBase Distributed Disk Services), 6520/tcp, 10855/tcp, 9944/tcp, 11133/tcp, 35053/tcp, 36063/tcp, 8181/tcp, 4145/tcp (VVR Control), 2530/tcp (VR Commerce), 6590/tcp, 36363/tcp, 10730/tcp, 12012/tcp (Vipera Messaging Service), 5353/tcp (Multicast DNS), 10160/tcp (QB Database Server), 26262/tcp (K3 Software-Server), 3570/tcp (MCC Web Server Port), 2290/tcp (Sonus Logging Services), 10610/tcp, 10570/tcp, 7030/tcp (ObjectPlanet probe), 23432/tcp, 4545/tcp (WorldScores), 6510/tcp (MCER Port), 29992/tcp, 3120/tcp (D2000 Webserver Port), 1190/tcp (CommLinx GPS / AVL System), 41714/tcp, 4560/tcp, 10515/tcp, 7373/tcp, 6580/tcp (Parsec Masterserver), 10865/tcp, 33133/tcp, 64046/tcp, 10995/tcp, 1177/tcp (DKMessenger Protocol), 10330/tcp, 10285/tcp, 8075/tcp, 10930/tcp, 10945/tcp, 10870/tcp, 8060/tcp, 10195/tcp, 10745/tcp, 8510/tcp, 6560/tcp, 6622/tcp (Multicast FTP), 6767/tcp (BMC PERFORM AGENT), 10835/tcp, 10940/tcp, 14014/tcp, 2381/tcp (Compaq HTTPS), 24742/tcp, 11144/tcp, 8040/tcp (Ampify Messaging Protocol), 3520/tcp (Netvion Galileo Log Port), 12/tcp, 4540/tcp, 4510/tcp, 9922/tcp, 10505/tcp, 10980/tcp, 2590/tcp (idotdist), 10720/tcp, 10615/tcp, 6080/tcp, 61916/tcp, 3232/tcp (MDT port), 2323/tcp (3d-nfsd), 4580/tcp, 10590/tcp, 9010/tcp (Secure Data Replicator Protocol), 10420/tcp, 10575/tcp, 43334/tcp, 4120/tcp, 11166/tcp, 1616/tcp (NetBill Product Server), 10560/tcp, 41314/tcp, 6015/tcp, 8070/tcp, 10955/tcp, 64064/tcp, 10455/tcp, 2900/tcp (QUICKSUITE), 16161/tcp (Solaris SEA Port), 66/tcp (Oracle SQL*NET), 11/tcp (Active Users), 41514/tcp, 8811/tcp, 35353/tcp, 35035/tcp, 51715/tcp, 58085/tcp, 993/tcp (imap4 protocol over TLS/SSL), 10650/tcp, 10535/tcp, 3737/tcp (XPanel Daemon), 10360/tcp, 8590/tcp, 3560/tcp (INIServe port), 63836/tcp, 28182/tcp, 10520/tcp, 3007/tcp (Lotus Mail Tracking Agent Protocol), 7560/tcp (Sniffer Command Protocol), 63336/tcp, 10910/tcp, 10370/tcp, 55/tcp (ISI Graphics Language), 10715/tcp, 1986/tcp (cisco license management), 7075/tcp, 5533/tcp.
      
BHD Honeypot
Port scan
2019-10-08

In the last 24h, the attacker (81.22.45.53) attempted to scan 121 ports.
The following ports have been scanned: 2185/tcp (OnBase Distributed Disk Services), 10735/tcp, 9944/tcp, 10680/tcp, 39093/tcp, 2540/tcp (LonWorks), 11122/tcp, 36063/tcp, 2300/tcp (CVMMON), 8530/tcp, 36363/tcp, 10665/tcp, 2290/tcp (Sonus Logging Services), 10125/tcp, 2281/tcp (LNVCONSOLE), 2255/tcp (VRTP - ViRtue Transfer Protocol), 6510/tcp (MCER Port), 6030/tcp, 10425/tcp, 8866/tcp, 1988/tcp (cisco RSRB Priority 2 port), 5590/tcp, 10515/tcp, 10410/tcp, 33133/tcp, 10375/tcp, 1177/tcp (DKMessenger Protocol), 54054/tcp, 27272/tcp, 43634/tcp, 52025/tcp, 33533/tcp, 10990/tcp (Auxiliary RMI Port), 2277/tcp (Bt device control proxy), 2130/tcp (XDS), 3636/tcp (SerVistaITSM), 10195/tcp, 10705/tcp, 10660/tcp, 2285/tcp (LNVMAILMON), 47074/tcp, 18181/tcp (OPSEC CVP), 6464/tcp, 10200/tcp (Trigence AE Soap Service), 2381/tcp (Compaq HTTPS), 10145/tcp, 9055/tcp, 49049/tcp, 63063/tcp, 33233/tcp, 7580/tcp, 10625/tcp, 12/tcp, 9922/tcp, 10335/tcp, 2288/tcp (NETML), 9030/tcp, 10720/tcp, 10275/tcp, 23032/tcp, 10595/tcp, 1180/tcp (Millicent Client Proxy), 10365/tcp, 42/tcp (Host Name Server), 3180/tcp (Millicent Broker Server), 5959/tcp, 1130/tcp (CAC App Service Protocol), 2323/tcp (3d-nfsd), 10590/tcp, 9010/tcp (Secure Data Replicator Protocol), 27672/tcp, 23232/tcp, 2150/tcp (DYNAMIC3D), 29029/tcp, 3110/tcp (simulator control port), 24442/tcp, 3020/tcp (CIFS), 4110/tcp (G2 RFID Tag Telemetry Data), 6035/tcp, 1616/tcp (NetBill Product Server), 23532/tcp, 10560/tcp, 26962/tcp, 64064/tcp, 10485/tcp, 35353/tcp, 4590/tcp (RID over HTTP/TLS), 10905/tcp, 58085/tcp, 29592/tcp, 10650/tcp, 9933/tcp, 10535/tcp, 28182/tcp, 10130/tcp, 6688/tcp (CleverView for TCP/IP Message Service), 6161/tcp (PATROL Internet Srv Mgr), 1155/tcp (Network File Access), 8383/tcp (M2m Services), 10405/tcp, 26162/tcp, 41914/tcp, 28582/tcp, 61516/tcp, 37373/tcp, 43034/tcp, 5533/tcp, 9955/tcp, 10435/tcp.
      
BHD Honeypot
Port scan
2019-10-07

In the last 24h, the attacker (81.22.45.53) attempted to scan 147 ports.
The following ports have been scanned: 6520/tcp, 41414/tcp, 8560/tcp, 39093/tcp, 10450/tcp, 1560/tcp (ASCI-RemoteSHADOW), 10390/tcp, 51915/tcp, 7530/tcp, 53035/tcp, 61061/tcp, 4130/tcp (FRONET message protocol), 7474/tcp, 23632/tcp, 33433/tcp, 10305/tcp, 2160/tcp (APC 2160), 1145/tcp (X9 iCue Show Control), 41714/tcp, 10300/tcp, 6580/tcp (Parsec Masterserver), 10410/tcp, 1185/tcp (Catchpole port), 31713/tcp, 63136/tcp, 25752/tcp, 5151/tcp (ESRI SDE Instance), 41014/tcp, 10205/tcp, 10330/tcp, 8075/tcp, 2155/tcp (Bridge Protocol), 3636/tcp (SerVistaITSM), 4530/tcp, 8050/tcp, 10875/tcp, 10600/tcp, 6085/tcp (konspire2b p2p network), 4155/tcp (Bazaar version control system), 32023/tcp, 29092/tcp, 10950/tcp, 4520/tcp, 6464/tcp, 11711/tcp, 3170/tcp (SERVERVIEW-ASN), 9085/tcp (IBM Remote System Console), 6570/tcp, 3939/tcp (Anti-virus Application Management Port), 10915/tcp, 10280/tcp, 10480/tcp, 6633/tcp, 25852/tcp, 63063/tcp, 3001/tcp, 3520/tcp (Netvion Galileo Log Port), 7065/tcp, 19019/tcp, 28382/tcp, 51515/tcp, 4510/tcp, 10635/tcp, 34034/tcp, 10830/tcp, 8580/tcp, 28482/tcp, 6262/tcp, 6040/tcp, 1150/tcp (Blaze File Server), 13131/tcp, 42/tcp (Host Name Server), 8015/tcp, 3115/tcp (MCTET Master), 3232/tcp (MDT port), 4135/tcp (Classic Line Database Server Attach), 6644/tcp, 9010/tcp (Secure Data Replicator Protocol), 8520/tcp, 7550/tcp, 10420/tcp, 10075/tcp, 52052/tcp, 10215/tcp, 11166/tcp, 3165/tcp (Newgenpay Engine Service), 10770/tcp, 41314/tcp, 26962/tcp, 61816/tcp, 8020/tcp (Intuit Entitlement Service and Discovery), 6015/tcp, 4570/tcp, 51315/tcp, 34043/tcp, 55055/tcp, 41514/tcp, 8822/tcp, 39039/tcp, 29592/tcp, 28882/tcp, 6868/tcp (Acctopus Command Channel), 8282/tcp, 10165/tcp, 7520/tcp, 7055/tcp, 10360/tcp, 61216/tcp, 10840/tcp, 43234/tcp, 3560/tcp (INIServe port), 63836/tcp, 7878/tcp, 10130/tcp, 43043/tcp, 7560/tcp (Sniffer Command Protocol), 41614/tcp, 6161/tcp (PATROL Internet Srv Mgr), 8065/tcp, 3004/tcp (Csoft Agent), 10405/tcp, 10225/tcp, 53235/tcp, 43034/tcp, 1986/tcp (cisco license management), 2520/tcp (Pervasive Listener), 43734/tcp, 9955/tcp, 8833/tcp.
      
BHD Honeypot
Port scan
2019-10-06

In the last 24h, the attacker (81.22.45.53) attempted to scan 110 ports.
The following ports have been scanned: 10855/tcp, 10965/tcp, 36036/tcp, 6530/tcp, 6075/tcp (Microsoft DPM Access Control Manager), 2540/tcp (LonWorks), 27572/tcp, 7540/tcp, 37037/tcp, 10070/tcp, 51915/tcp, 3570/tcp (MCC Web Server Port), 10085/tcp, 4422/tcp, 25652/tcp, 7530/tcp, 10935/tcp, 2255/tcp (VRTP - ViRtue Transfer Protocol), 4545/tcp (WorldScores), 3140/tcp (Arilia Multiplexor), 10670/tcp, 24642/tcp, 1145/tcp (X9 iCue Show Control), 23023/tcp, 10150/tcp, 22022/tcp, 10645/tcp, 6580/tcp (Parsec Masterserver), 59095/tcp, 25052/tcp, 41014/tcp, 10205/tcp, 61116/tcp, 7755/tcp, 56065/tcp, 41814/tcp, 26462/tcp, 10600/tcp, 47074/tcp, 6085/tcp (konspire2b p2p network), 57075/tcp, 10110/tcp (NMEA-0183 Navigational Data), 24242/tcp (fileSphere), 3170/tcp (SERVERVIEW-ASN), 8025/tcp (CA Audit Distribution Agent), 3939/tcp (Anti-virus Application Management Port), 10480/tcp, 6633/tcp, 10725/tcp, 10635/tcp, 8686/tcp (Sun App Server - JMX/RMI), 44/tcp (MPM FLAGS Protocol), 2288/tcp (NETML), 10265/tcp, 10140/tcp, 7060/tcp, 27372/tcp, 15/tcp, 11177/tcp, 42/tcp (Host Name Server), 8015/tcp, 3180/tcp (Millicent Broker Server), 1130/tcp (CAC App Service Protocol), 3232/tcp (MDT port), 4135/tcp (Classic Line Database Server Attach), 54045/tcp, 10215/tcp, 7979/tcp (Micromuse-ncps), 33933/tcp, 10770/tcp, 41314/tcp, 26962/tcp, 2500/tcp (Resource Tracking system server), 48084/tcp, 9070/tcp, 51315/tcp, 24042/tcp, 43934/tcp, 6868/tcp (Acctopus Command Channel), 10650/tcp, 10890/tcp, 3185/tcp (SuSE Meta PPPD), 2929/tcp (AMX-WEBADMIN), 43234/tcp, 10845/tcp, 7878/tcp, 28182/tcp, 10130/tcp, 10805/tcp (LUCIA Pareja Data Group), 41614/tcp, 63336/tcp, 10405/tcp, 3135/tcp (PeerBook Port), 3150/tcp (NetMike Assessor Administrator), 10385/tcp.
      
BHD Honeypot
Port scan
2019-10-05

In the last 24h, the attacker (81.22.45.53) attempted to scan 143 ports.
The following ports have been scanned: 10740/tcp, 8005/tcp (MXI Generation II for z/OS), 2185/tcp (OnBase Distributed Disk Services), 10920/tcp, 10855/tcp, 3175/tcp (T1_E1_Over_IP), 28782/tcp, 39093/tcp, 28028/tcp, 12121/tcp (NuPaper Session Service), 8181/tcp, 6065/tcp (WinPharaoh), 1560/tcp (ASCI-RemoteSHADOW), 8530/tcp, 2530/tcp (VR Commerce), 21021/tcp, 10895/tcp, 10730/tcp, 49094/tcp, 3570/tcp (MCC Web Server Port), 2165/tcp (X-Bone API), 25652/tcp, 26762/tcp, 2290/tcp (Sonus Logging Services), 31613/tcp, 10825/tcp, 11211/tcp (Memory cache service), 3140/tcp (Arilia Multiplexor), 3105/tcp (Cardbox), 3120/tcp (D2000 Webserver Port), 10440/tcp, 23632/tcp, 24642/tcp, 9898/tcp (MonkeyCom), 10780/tcp, 33033/tcp, 23023/tcp, 10530/tcp, 41714/tcp, 25352/tcp, 8866/tcp, 33833/tcp, 10415/tcp, 32032/tcp, 1988/tcp (cisco RSRB Priority 2 port), 16016/tcp, 33133/tcp, 10375/tcp, 25752/tcp, 10285/tcp, 8075/tcp, 33533/tcp, 2130/tcp (XDS), 10930/tcp, 56065/tcp, 10745/tcp, 3160/tcp (TIP Application Server), 1580/tcp (tn-tl-r1), 11811/tcp, 32023/tcp, 10765/tcp, 10950/tcp, 10880/tcp, 53053/tcp, 7711/tcp, 10710/tcp, 9085/tcp (IBM Remote System Console), 6570/tcp, 8025/tcp (CA Audit Distribution Agent), 7035/tcp, 10280/tcp, 10445/tcp, 10850/tcp, 38038/tcp, 9025/tcp (Secure Web Access - 3), 10540/tcp (MOS Media Object Metadata Port), 8787/tcp (Message Server), 24942/tcp, 10625/tcp, 8550/tcp, 53835/tcp, 2550/tcp (ADS), 10265/tcp, 61316/tcp, 11177/tcp, 24024/tcp, 10175/tcp, 7085/tcp, 13131/tcp, 8015/tcp, 61916/tcp, 9045/tcp, 10760/tcp, 45045/tcp, 23132/tcp, 33933/tcp, 3006/tcp (Instant Internet Admin), 32323/tcp, 10560/tcp, 63536/tcp, 48084/tcp, 2301/tcp (Compaq HTTP), 10955/tcp, 10525/tcp, 28082/tcp, 9070/tcp, 2287/tcp (DNA), 6045/tcp, 2135/tcp (Grid Resource Information Server), 53135/tcp, 26026/tcp, 8822/tcp, 8484/tcp, 29292/tcp, 8570/tcp, 1510/tcp (Midland Valley Exploration Ltd. Lic. Man.), 7520/tcp, 10845/tcp, 43043/tcp, 23332/tcp, 63336/tcp, 27072/tcp, 3004/tcp (Csoft Agent), 2010/tcp (search), 51051/tcp, 31913/tcp.
      
BHD Honeypot
Port scan
2019-10-05

Port scan from IP: 81.22.45.53 detected by psad.
BHD Honeypot
Port scan
2019-10-04

In the last 24h, the attacker (81.22.45.53) attempted to scan 87 ports.
The following ports have been scanned: 8005/tcp (MXI Generation II for z/OS), 2525/tcp (MS V-Worlds), 65056/tcp, 10395/tcp, 27572/tcp, 2300/tcp (CVMMON), 28982/tcp, 1160/tcp (DB Lite Mult-User Server), 26262/tcp (K3 Software-Server), 26762/tcp, 31613/tcp, 10125/tcp, 11411/tcp, 11211/tcp (Memory cache service), 7030/tcp (ObjectPlanet probe), 10345/tcp, 2332/tcp (RCC Host), 23432/tcp, 10120/tcp, 23632/tcp, 2160/tcp (APC 2160), 1190/tcp (CommLinx GPS / AVL System), 1530/tcp (rap-service), 6580/tcp (Parsec Masterserver), 16016/tcp, 33733/tcp, 6565/tcp, 25052/tcp, 25752/tcp, 2389/tcp (OpenView Session Mgr), 10235/tcp, 6550/tcp (fg-sysupdate), 61416/tcp, 1990/tcp (cisco STUN Priority 1 port), 10195/tcp, 10885/tcp, 10705/tcp, 1166/tcp (QSM RemoteExec), 18181/tcp (OPSEC CVP), 10880/tcp, 6464/tcp, 7711/tcp, 1570/tcp (orbixd), 39393/tcp, 10280/tcp, 2140/tcp (IAS-REG), 49049/tcp, 3001/tcp, 19019/tcp, 10625/tcp, 12/tcp, 1139/tcp (Enterprise Virtual Manager), 10635/tcp, 10980/tcp, 2590/tcp (idotdist), 2570/tcp (HS Port), 23032/tcp, 24024/tcp, 10190/tcp, 10580/tcp, 2150/tcp (DYNAMIC3D), 10155/tcp, 10975/tcp, 10095/tcp, 1120/tcp (Battle.net File Transfer Protocol), 3165/tcp (Newgenpay Engine Service), 61816/tcp, 1984/tcp (BB), 63436/tcp, 9393/tcp, 19191/tcp (OPSEC UAA), 62062/tcp, 25952/tcp, 7520/tcp, 3002/tcp (RemoteWare Server), 1986/tcp (cisco license management), 2520/tcp (Pervasive Listener), 25025/tcp.
      
BHD Honeypot
Port scan
2019-10-03

In the last 24h, the attacker (81.22.45.53) attempted to scan 80 ports.
The following ports have been scanned: 10920/tcp, 10855/tcp, 29792/tcp, 9944/tcp, 2525/tcp (MS V-Worlds), 2598/tcp (Citrix MA Client), 28028/tcp, 11122/tcp, 12121/tcp (NuPaper Session Service), 4646/tcp, 10450/tcp, 25452/tcp, 63936/tcp, 10730/tcp, 5353/tcp (Multicast DNS), 10270/tcp, 26262/tcp (K3 Software-Server), 4848/tcp (App Server - Admin HTTP), 25652/tcp, 51115/tcp, 27472/tcp, 2332/tcp (RCC Host), 27772/tcp, 23632/tcp, 7373/tcp, 10995/tcp, 61116/tcp, 8075/tcp, 6090/tcp, 10870/tcp, 15015/tcp, 8510/tcp, 2381/tcp (Compaq HTTPS), 10480/tcp, 10700/tcp, 24742/tcp, 9025/tcp (Secure Web Access - 3), 33233/tcp, 61616/tcp, 4540/tcp, 2288/tcp (NETML), 9030/tcp, 44044/tcp, 10265/tcp, 46064/tcp, 61316/tcp, 27372/tcp, 1144/tcp (Fusion Script), 23932/tcp, 9035/tcp, 1130/tcp (CAC App Service Protocol), 9966/tcp (OKI Data Network Setting Protocol), 23232/tcp, 29029/tcp, 24442/tcp, 10470/tcp, 23132/tcp, 10325/tcp, 10630/tcp, 63436/tcp, 55055/tcp, 51715/tcp, 28882/tcp, 10220/tcp, 3737/tcp (XPanel Daemon), 48048/tcp, 10805/tcp (LUCIA Pareja Data Group), 8065/tcp, 55/tcp (ISI Graphics Language), 10090/tcp, 53235/tcp, 27027/tcp, 10755/tcp, 27872/tcp, 61516/tcp, 2010/tcp (search).
      
BHD Honeypot
Port scan
2019-10-02

In the last 24h, the attacker (81.22.45.53) attempted to scan 15 ports.
The following ports have been scanned: 27472/tcp, 10670/tcp, 1530/tcp (rap-service), 1988/tcp (cisco RSRB Priority 2 port), 14141/tcp (VCS Application), 54054/tcp, 6550/tcp (fg-sysupdate), 1990/tcp (cisco STUN Priority 1 port), 10185/tcp, 57075/tcp, 2175/tcp (Microsoft Desktop AirSync Protocol), 35/tcp (any private printer server), 26026/tcp, 10535/tcp, 61216/tcp.
      
BHD Honeypot
Port scan
2019-10-01

In the last 24h, the attacker (81.22.45.53) attempted to scan 10 ports.
The following ports have been scanned: 10690/tcp, 36363/tcp, 52025/tcp, 53053/tcp, 10350/tcp, 7060/tcp, 2500/tcp (Resource Tracking system server), 4590/tcp (RID over HTTP/TLS), 10840/tcp, 5533/tcp.
      
BHD Honeypot
Port scan
2019-09-30

In the last 24h, the attacker (81.22.45.53) attempted to scan 5 ports.
The following ports have been scanned: 9020/tcp (TAMBORA), 33733/tcp, 57075/tcp, 8040/tcp (Ampify Messaging Protocol), 8085/tcp.
      
BHD Honeypot
Port scan
2019-09-30

Port scan from IP: 81.22.45.53 detected by psad.
BHD Honeypot
Port scan
2019-06-13

In the last 24h, the attacker (81.22.45.53) attempted to scan 25 ports.
The following ports have been scanned: 1357/tcp (Electronic PegBoard), 350/tcp (MATIP Type A), 1720/tcp (h323hostcall), 1936/tcp (JetCmeServer Server Port), 679/tcp (MRM), 2105/tcp (MiniPay), 1431/tcp (Reverse Gossip Transport), 989/tcp (ftp protocol, data, over TLS/SSL), 732/tcp, 2894/tcp (ABACUS-REMOTE), 2461/tcp (qadmifoper), 1811/tcp (Scientia-SDB), 886/tcp (ICL coNETion locate server), 2831/tcp (silkp3), 1897/tcp (MetaAgent), 1662/tcp (netview-aix-2), 3211/tcp (Avocent Secure Management), 3221/tcp (XML NM over TCP), 1615/tcp (NetBill Authorization Server), 1151/tcp (Unizensus Login Server), 2115/tcp (Key Distribution Manager), 3201/tcp (CPQ-TaskSmart), 2391/tcp (3COM Net Management), 1584/tcp (tn-tl-fd2), 1467/tcp (CSDMBASE).
      
BHD Honeypot
Port scan
2019-06-12

In the last 24h, the attacker (81.22.45.53) attempted to scan 15 ports.
The following ports have been scanned: 288/tcp, 1378/tcp (Elan License Manager), 1387/tcp (Computer Aided Design Software Inc LM), 2810/tcp (Active Net Steward), 670/tcp (VACDSM-SWS), 3311/tcp (MCNS Tel Ret), 305/tcp, 2094/tcp (NBX AU), 3284/tcp (4Talk), 1962/tcp (BIAP-MP), 582/tcp (SCC Security), 2635/tcp (Back Burner), 625/tcp (DEC DLM), 1171/tcp (AT+C FmiApplicationServer), 911/tcp (xact-backup).
      
BHD Honeypot
Port scan
2019-06-11

In the last 24h, the attacker (81.22.45.53) attempted to scan 25 ports.
The following ports have been scanned: 1223/tcp (TrulyGlobal Protocol), 1109/tcp, 2395/tcp (LAN900 Remote), 3358/tcp (Mp Sys Rmsvr), 1208/tcp (SEAGULL AIS), 1938/tcp (JetVWay Client Port), 814/tcp, 2075/tcp (Newlix ServerWare Engine), 3008/tcp (Midnight Technologies), 1080/tcp (Socks), 237/tcp, 1180/tcp (Millicent Client Proxy), 1518/tcp (Virtual Places Video data), 904/tcp, 450/tcp (Computer Supported Telecomunication Applications), 3102/tcp (SoftlinK Slave Mon Port), 3287/tcp (DIRECTVDATA), 2433/tcp (codasrv-se), 505/tcp (mailbox-lm), 1439/tcp (Eicon X25/SNA Gateway), 2392/tcp (Tactical Auth), 2640/tcp (Sabbagh Associates Licence Manager), 2216/tcp (VTU data service), 2437/tcp (UniControl), 514/tcp (cmd).
      

Blacklist

Near real-time, easy to use data feed containing IPs reported on our website.

Bronze

$3

Updated daily

Learn More

Silver

$15

Updated every hour

Learn More

Gold

$30

Updated every 10 minutes

Learn More

Remarks

Black hat directory contains this IP address, because Internet users reported it as an address making unsolicited, nagging requests. We make every effort to ensure that the information contained in the Black hat directory are correct and up to date. The database is developed and updated by Internet users and moderators.

If you have any reliable information regarding malicious activity originating from this IP address, please share it with others and fill in the 'Report breach' form. It is prohibited from adding personally identifiable information.

Below breach categories are used in the database:

  • Denial of service attack - this attack is accomplished by flooding the target with massive amount of requests in order to overload the targeted system
  • Brute force attack - this category encompasses attempts to login to machine by trying many passwords and usernames
  • Backdoor attack - this category represents bypassing authentication by hidden programs or services to obtain remote access to a computer or trojan activity
  • Port scan - represents attackers identifying running services on the targeted machine by probing a server for open ports
  • Malicious bot - this category encompasses all bots performing unsolicited requests or ignoring robots.txt file
  • Anonymous proxy - public proxies like Tor, I2P relays or anonymous VPNs are often used by attacker to hide his identity
  • Web attack - attempts to exploit web application security flaws
  • CMS attack - attempts to exploit CMS vulnerability
  • App vulnerability attack - attempts to exploit other applications vulnerability
  • Web spam - encompasses all kind of HTTP spamming
  • Email spam - encompasses all kind of E-mail spamming
  • Dodgy activity - this category encompasses superfluous, dodgy requests

Report breach!

Rate host 81.22.45.53