IP address: 94.102.51.95

Host rating:

2.0

out of 175 votes

Last update: 2020-11-17

Host details

no-reverse-dns-configured.com.
Netherlands
Amsterdam
AS29073 Quasi Networks LTD.
See comments

Reported breaches

  • Port scan
Report breach

Whois record

The publicly-available Whois record found at whois.ripe.net server.

% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '94.102.51.0 - 94.102.51.255'

% Abuse contact for '94.102.51.0 - 94.102.51.255' is '[email protected]'

inetnum:        94.102.51.0 - 94.102.51.255
netname:        NET-4-51
descr:          IPV NETBLOCK
country:        NL
geoloc:         52.370216 4.895168
org:            ORG-IVI1-RIPE
admin-c:        IVI24-RIPE
tech-c:         IVI24-RIPE
status:         ASSIGNED PA
mnt-by:         IPV
mnt-lower:      IPV
mnt-routes:     IPV
created:        2019-02-04T13:25:18Z
last-modified:  2019-02-04T13:25:18Z
source:         RIPE

% Information related to '94.102.51.0/24AS202425'

route:          94.102.51.0/24
origin:         AS202425
remarks:        +-----------------------------------------------
remarks:        | For abuse e-mail [email protected]
remarks:        | We do not always reply to abuse.
remarks:        | But we do take care your report is dealt with!
remarks:        +-----------------------------------------------
mnt-by:         IPV
created:        2019-02-08T16:09:55Z
last-modified:  2019-02-08T16:09:55Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.97.1 (BLAARKOP)


User comments

175 security incident(s) reported by users

BHD Honeypot
Port scan
2020-11-17

In the last 24h, the attacker (94.102.51.95) attempted to scan 332 ports.
The following ports have been scanned: 52176/tcp, 64821/tcp, 60182/tcp, 62597/tcp, 39644/tcp, 49640/tcp, 31841/tcp, 31837/tcp, 58135/tcp, 2589/tcp (quartus tcl), 28515/tcp, 39783/tcp, 6987/tcp, 1442/tcp (Cadis License Management), 46316/tcp, 46304/tcp, 39434/tcp, 11208/tcp (WiFree Service), 56636/tcp, 25021/tcp, 44220/tcp, 64922/tcp, 9000/tcp (CSlistener), 45953/tcp, 1585/tcp (intv), 46428/tcp, 51818/tcp, 40479/tcp, 60980/tcp, 39786/tcp, 19274/tcp, 15265/tcp, 54581/tcp, 10054/tcp, 14086/tcp, 59546/tcp, 40008/tcp, 52403/tcp, 11793/tcp, 2530/tcp (VR Commerce), 54961/tcp, 24169/tcp, 10895/tcp, 800/tcp (mdbs_daemon), 12921/tcp, 21494/tcp, 14725/tcp, 40749/tcp, 55028/tcp, 12445/tcp, 23114/tcp, 65332/tcp, 64769/tcp, 12020/tcp, 59304/tcp, 32687/tcp, 26584/tcp, 43254/tcp, 55837/tcp, 44919/tcp, 16998/tcp, 63779/tcp, 453/tcp (CreativeServer), 30650/tcp, 53969/tcp, 51674/tcp, 51719/tcp, 15249/tcp, 1102/tcp (ADOBE SERVER 1), 32078/tcp, 35790/tcp, 26881/tcp, 26471/tcp, 13522/tcp, 19438/tcp, 47513/tcp, 36781/tcp, 40622/tcp, 54740/tcp, 2515/tcp (Facsys Router), 22109/tcp, 60756/tcp, 57181/tcp, 17478/tcp, 37900/tcp, 40175/tcp, 39915/tcp, 43032/tcp, 62774/tcp, 19801/tcp, 19070/tcp, 62478/tcp, 21778/tcp, 60841/tcp, 27723/tcp, 15655/tcp, 55074/tcp, 57107/tcp, 9934/tcp, 1867/tcp (UDRIVE), 48426/tcp, 10205/tcp, 30275/tcp, 10874/tcp, 53199/tcp, 25382/tcp, 42003/tcp, 40678/tcp, 55475/tcp, 28231/tcp, 18932/tcp, 44743/tcp, 52552/tcp, 41894/tcp, 1783/tcp, 16752/tcp, 870/tcp, 55002/tcp, 64809/tcp, 54698/tcp, 12663/tcp, 28785/tcp, 38738/tcp, 27519/tcp, 43119/tcp, 11797/tcp, 21234/tcp, 4357/tcp (QSNet Conductor), 30067/tcp, 39290/tcp, 54382/tcp, 7238/tcp, 23499/tcp, 35448/tcp, 2032/tcp (blackboard), 675/tcp (DCTP), 27611/tcp, 6422/tcp, 60460/tcp, 62741/tcp, 51572/tcp, 47391/tcp, 51860/tcp, 60109/tcp, 26685/tcp, 12323/tcp, 57362/tcp, 8529/tcp, 63877/tcp, 2140/tcp (IAS-REG), 22821/tcp, 30507/tcp, 43223/tcp, 36516/tcp, 39757/tcp, 841/tcp, 12394/tcp, 53363/tcp, 54052/tcp, 24071/tcp, 50195/tcp, 63258/tcp, 39591/tcp, 30418/tcp, 47140/tcp, 21456/tcp, 14677/tcp, 51972/tcp, 41596/tcp, 39701/tcp, 3530/tcp (Grid Friendly), 54437/tcp, 61860/tcp, 59187/tcp, 50034/tcp, 4217/tcp, 43832/tcp, 17212/tcp, 11606/tcp, 51897/tcp, 10615/tcp, 17445/tcp, 36236/tcp, 49202/tcp, 64054/tcp, 16710/tcp, 54176/tcp, 54292/tcp, 13887/tcp, 45062/tcp, 3010/tcp (Telerate Workstation), 39711/tcp, 11242/tcp, 10707/tcp, 58820/tcp, 54772/tcp, 21148/tcp, 62961/tcp, 63956/tcp, 44059/tcp, 64262/tcp, 31092/tcp, 19858/tcp, 62965/tcp, 44500/tcp, 45924/tcp, 10158/tcp, 65272/tcp, 50821/tcp, 10590/tcp, 26910/tcp, 46368/tcp, 33540/tcp, 39122/tcp, 51930/tcp, 41055/tcp, 4831/tcp, 55540/tcp, 51816/tcp, 60691/tcp, 21527/tcp, 20130/tcp, 18804/tcp, 59555/tcp, 63621/tcp, 54112/tcp, 45107/tcp, 1469/tcp (Active Analysis Limited License Manager), 5443/tcp (Pearson HTTPS), 56852/tcp, 30462/tcp, 59858/tcp, 64450/tcp, 2239/tcp (Image Query), 18503/tcp, 12477/tcp, 10676/tcp, 1083/tcp (Anasoft License Manager), 43148/tcp, 46834/tcp, 45871/tcp, 27806/tcp, 18742/tcp, 11322/tcp, 18582/tcp, 40023/tcp, 63793/tcp, 11637/tcp, 15377/tcp, 56771/tcp, 1025/tcp (network blackjack), 30339/tcp, 29942/tcp, 47229/tcp, 7209/tcp, 1537/tcp (isi-lm), 2811/tcp (GSI FTP), 63811/tcp, 60063/tcp, 14779/tcp, 65040/tcp, 23866/tcp, 845/tcp, 47866/tcp, 40174/tcp, 60565/tcp, 52005/tcp, 29888/tcp, 49955/tcp, 35879/tcp, 2452/tcp (SnifferClient), 25494/tcp, 40261/tcp, 17695/tcp, 63183/tcp, 17351/tcp, 21377/tcp, 15858/tcp, 42631/tcp, 3629/tcp (ESC/VP.net), 13068/tcp, 44751/tcp, 37991/tcp, 32324/tcp, 31115/tcp, 11513/tcp, 13363/tcp, 59778/tcp, 52511/tcp, 36677/tcp, 15256/tcp, 15997/tcp, 61184/tcp, 40868/tcp, 15043/tcp, 14028/tcp, 21093/tcp, 60343/tcp, 44856/tcp, 1079/tcp (ASPROVATalk), 59383/tcp, 42282/tcp, 40314/tcp, 63370/tcp, 18700/tcp, 28620/tcp, 4134/tcp (NIFTY-Serve HMI protocol), 39704/tcp, 60900/tcp, 13614/tcp, 26551/tcp, 1935/tcp (Macromedia Flash Communications Server MX), 54939/tcp, 11803/tcp, 17612/tcp, 21635/tcp, 54197/tcp, 56754/tcp, 43330/tcp, 40981/tcp, 51418/tcp, 65243/tcp, 49387/tcp, 48918/tcp, 17361/tcp, 59992/tcp, 3051/tcp (Galaxy Server), 15216/tcp, 54918/tcp, 57550/tcp.
      
BHD Honeypot
Port scan
2020-11-16

In the last 24h, the attacker (94.102.51.95) attempted to scan 370 ports.
The following ports have been scanned: 65355/tcp, 37164/tcp, 52948/tcp, 35020/tcp, 50763/tcp, 54498/tcp, 64194/tcp, 63626/tcp, 14083/tcp, 60527/tcp, 1804/tcp (ENL), 54549/tcp, 36957/tcp, 9138/tcp, 4468/tcp, 29883/tcp, 62745/tcp, 52265/tcp, 50569/tcp, 5062/tcp (Localisation access), 39647/tcp, 39560/tcp, 11038/tcp, 54610/tcp, 47056/tcp, 35053/tcp, 39689/tcp, 5282/tcp (Marimba Transmitter Port), 9662/tcp, 12383/tcp, 21491/tcp, 18737/tcp, 40527/tcp, 51531/tcp, 26909/tcp, 54823/tcp, 49860/tcp, 54778/tcp, 13089/tcp, 51864/tcp, 10417/tcp, 11231/tcp, 13362/tcp, 17285/tcp, 60001/tcp, 42647/tcp, 38739/tcp, 55023/tcp, 1920/tcp (IBM Tivoli Directory Service - FERRET), 50916/tcp, 5084/tcp (EPCglobal Low-Level Reader Protocol), 265/tcp (X-Bone CTL), 21025/tcp, 7997/tcp, 39561/tcp, 10567/tcp, 13359/tcp, 41064/tcp, 10125/tcp, 2995/tcp (IDRS), 8487/tcp, 16572/tcp, 37305/tcp, 21601/tcp, 43765/tcp, 54628/tcp, 51783/tcp, 14700/tcp, 61285/tcp, 57772/tcp, 30227/tcp, 63025/tcp, 14684/tcp, 59500/tcp, 9086/tcp (Vesa Net2Display), 43729/tcp, 50206/tcp, 42899/tcp, 21854/tcp, 21233/tcp, 59676/tcp, 4164/tcp (Silver Peak Communication Protocol), 56228/tcp, 45281/tcp, 63762/tcp, 4724/tcp, 35763/tcp, 64826/tcp, 53595/tcp, 63230/tcp, 27128/tcp, 1096/tcp (Common Name Resolution Protocol), 16839/tcp, 42476/tcp, 56433/tcp, 21082/tcp, 29938/tcp, 47804/tcp, 21273/tcp, 20748/tcp, 21959/tcp, 64512/tcp, 21440/tcp, 32110/tcp, 63259/tcp, 48801/tcp, 9691/tcp, 64293/tcp, 27116/tcp, 4721/tcp, 55069/tcp, 46347/tcp, 13069/tcp, 61695/tcp, 11317/tcp, 41202/tcp, 37649/tcp, 58459/tcp, 60891/tcp, 58653/tcp, 30154/tcp, 27892/tcp, 63620/tcp, 40637/tcp, 41119/tcp, 64661/tcp, 60092/tcp, 62666/tcp, 24000/tcp (med-ltp), 40366/tcp, 19738/tcp, 30383/tcp, 30062/tcp, 3162/tcp (SFLM), 19387/tcp, 30777/tcp, 54330/tcp, 2531/tcp (ITO-E GUI), 62025/tcp, 59273/tcp, 30638/tcp, 63008/tcp, 55698/tcp, 22975/tcp, 43989/tcp, 10015/tcp, 41330/tcp, 2912/tcp (Epicon), 59495/tcp, 18032/tcp, 43111/tcp, 17045/tcp, 40728/tcp, 28510/tcp, 51307/tcp, 13845/tcp, 21516/tcp, 1971/tcp (NetOp School), 32713/tcp, 59215/tcp, 59829/tcp, 13159/tcp, 44860/tcp, 13471/tcp, 28149/tcp, 30964/tcp, 18493/tcp, 9026/tcp (Secure Web Access - 4), 4441/tcp, 21484/tcp, 8532/tcp, 60566/tcp, 21792/tcp, 18171/tcp, 19378/tcp, 64630/tcp, 46631/tcp, 19629/tcp, 50825/tcp, 43409/tcp, 43577/tcp, 60123/tcp, 47917/tcp, 609/tcp (npmp-trap), 65074/tcp, 30557/tcp, 10488/tcp, 2140/tcp (IAS-REG), 341/tcp, 13613/tcp, 15747/tcp, 4778/tcp, 46454/tcp, 2251/tcp (Distributed Framework Port), 13636/tcp, 28766/tcp, 43514/tcp, 2335/tcp (ACE Proxy), 30646/tcp, 64295/tcp, 3513/tcp (Adaptec Remote Protocol), 2470/tcp (taskman port), 54063/tcp, 58606/tcp, 54699/tcp, 2516/tcp (Main Control), 27252/tcp, 59872/tcp, 37391/tcp, 22026/tcp, 43357/tcp, 62760/tcp, 27386/tcp, 12450/tcp, 61943/tcp, 53423/tcp, 13040/tcp, 231/tcp, 55479/tcp, 60483/tcp, 11131/tcp, 18540/tcp, 12062/tcp, 55195/tcp, 57324/tcp, 49530/tcp, 59880/tcp, 58821/tcp, 62793/tcp, 62554/tcp, 51651/tcp, 27371/tcp, 39896/tcp, 64570/tcp, 54966/tcp, 17445/tcp, 40467/tcp, 31055/tcp, 19028/tcp, 1894/tcp (O2Server Port), 38380/tcp, 2828/tcp (ITM License Manager), 13515/tcp, 18976/tcp, 37286/tcp, 18856/tcp, 11178/tcp, 37895/tcp, 27479/tcp, 46434/tcp, 2283/tcp (LNVSTATUS), 18409/tcp, 49360/tcp, 41536/tcp, 21129/tcp, 59771/tcp, 30024/tcp, 13720/tcp (BPRD Protocol (VERITAS NetBackup)), 47420/tcp, 53749/tcp, 57218/tcp, 60316/tcp, 51675/tcp, 58837/tcp, 30183/tcp, 46778/tcp, 59132/tcp, 13272/tcp, 4055/tcp (CosmoCall Universe Communications Port 3), 14785/tcp, 51312/tcp, 42692/tcp, 45031/tcp, 27267/tcp, 26722/tcp, 59270/tcp, 42114/tcp, 32483/tcp (Access Point Manager Link), 44392/tcp, 30175/tcp, 51782/tcp, 55714/tcp, 7488/tcp, 23386/tcp, 54656/tcp, 33066/tcp, 47307/tcp, 64185/tcp, 37861/tcp, 41453/tcp, 13524/tcp, 39564/tcp, 5712/tcp, 65472/tcp, 36403/tcp, 32450/tcp, 62848/tcp, 54809/tcp, 29812/tcp, 60420/tcp, 41751/tcp, 47615/tcp, 33681/tcp, 6646/tcp, 11767/tcp, 63705/tcp, 51641/tcp, 40450/tcp, 27495/tcp, 2278/tcp (Simple Stacked Sequences Database), 37000/tcp, 31306/tcp, 16715/tcp, 51669/tcp, 54670/tcp, 568/tcp (microsoft shuttle), 35054/tcp, 63989/tcp, 63686/tcp, 1274/tcp (t1distproc), 41116/tcp, 39917/tcp, 17194/tcp, 59211/tcp, 57143/tcp, 4694/tcp, 40525/tcp, 16368/tcp (Network Serial Extension Ports Four), 59953/tcp, 50767/tcp, 10819/tcp, 14202/tcp, 52148/tcp, 13974/tcp, 22055/tcp, 63942/tcp, 1975/tcp (TCO Flash Agent), 27162/tcp, 48557/tcp, 49169/tcp, 8527/tcp, 29399/tcp, 51456/tcp, 52032/tcp, 59411/tcp, 11780/tcp, 44029/tcp, 45984/tcp, 2661/tcp (OLHOST), 4945/tcp, 14783/tcp, 63371/tcp, 19609/tcp, 26797/tcp, 23003/tcp (Inova LightLink Server Type 4), 41340/tcp, 17393/tcp, 21635/tcp, 18850/tcp, 16850/tcp, 16235/tcp, 42948/tcp, 37394/tcp, 7098/tcp, 55678/tcp, 39420/tcp, 54917/tcp, 51419/tcp.
      
BHD Honeypot
Port scan
2020-11-16

Port scan from IP: 94.102.51.95 detected by psad.
BHD Honeypot
Port scan
2020-11-15

In the last 24h, the attacker (94.102.51.95) attempted to scan 325 ports.
The following ports have been scanned: 37555/tcp, 51790/tcp, 62569/tcp, 55502/tcp, 23143/tcp, 60197/tcp, 32734/tcp, 51792/tcp, 52042/tcp, 1195/tcp (RSF-1 clustering), 1329/tcp (netdb-export), 42488/tcp, 15031/tcp, 42255/tcp, 11183/tcp, 51169/tcp, 8738/tcp, 43306/tcp, 51567/tcp, 10452/tcp, 54475/tcp, 27749/tcp, 54923/tcp, 1889/tcp (Unify Web Adapter Service), 37282/tcp, 15286/tcp, 25606/tcp, 60314/tcp, 1720/tcp (h323hostcall), 44303/tcp, 27331/tcp, 43772/tcp, 50805/tcp, 53187/tcp, 41061/tcp, 51160/tcp, 40228/tcp, 64852/tcp, 63511/tcp, 47359/tcp, 30980/tcp, 40928/tcp, 58709/tcp, 46526/tcp, 17583/tcp, 50570/tcp, 16054/tcp, 46792/tcp, 7462/tcp, 6986/tcp, 23508/tcp, 64513/tcp, 11090/tcp, 46698/tcp, 43481/tcp, 707/tcp (Borland DSJ), 20869/tcp, 50541/tcp, 63831/tcp, 41696/tcp, 28622/tcp, 55899/tcp, 62709/tcp, 27491/tcp, 18534/tcp, 16588/tcp, 4448/tcp (ASC Licence Manager), 39456/tcp, 39962/tcp, 60455/tcp, 11321/tcp (Arena Server Listen), 17779/tcp, 17807/tcp, 62131/tcp, 11777/tcp, 35682/tcp, 60080/tcp, 23978/tcp, 41028/tcp, 45820/tcp, 7574/tcp, 46949/tcp, 61859/tcp, 10727/tcp, 27914/tcp, 344/tcp (Prospero Data Access Protocol), 39674/tcp, 50116/tcp, 58964/tcp, 46806/tcp, 46973/tcp, 30143/tcp, 15003/tcp, 43660/tcp, 36246/tcp, 27727/tcp, 126/tcp (NXEdit), 37896/tcp, 56961/tcp, 60981/tcp, 12420/tcp, 59323/tcp, 28539/tcp, 64128/tcp, 37845/tcp, 12307/tcp, 40276/tcp, 38020/tcp, 40982/tcp, 56712/tcp, 56789/tcp, 43749/tcp, 39197/tcp, 55004/tcp, 54414/tcp, 60290/tcp, 28255/tcp, 27632/tcp, 17556/tcp, 43325/tcp, 54853/tcp, 12982/tcp, 52033/tcp, 1744/tcp (ncpm-ft), 18613/tcp, 37816/tcp, 30405/tcp, 40137/tcp, 46581/tcp, 11638/tcp, 11369/tcp, 57152/tcp, 10564/tcp, 27622/tcp, 2408/tcp (OptimaNet), 62270/tcp, 54665/tcp, 11795/tcp, 53188/tcp, 62857/tcp, 2056/tcp (OmniSky Port), 50250/tcp, 12148/tcp, 26829/tcp, 51130/tcp, 40035/tcp, 60432/tcp, 60109/tcp, 14970/tcp, 60466/tcp, 2587/tcp (MASC), 12842/tcp, 35529/tcp, 11202/tcp, 10563/tcp, 10164/tcp, 13623/tcp, 14285/tcp, 46223/tcp, 49770/tcp, 21412/tcp, 11840/tcp, 53438/tcp, 55051/tcp, 14089/tcp, 61317/tcp, 55507/tcp, 50345/tcp, 49308/tcp, 52542/tcp, 8496/tcp, 1441/tcp (Cadis License Management), 51868/tcp, 64150/tcp, 15080/tcp, 13494/tcp, 45057/tcp, 43075/tcp, 53973/tcp, 62710/tcp, 17113/tcp, 37284/tcp, 1064/tcp (JSTEL), 30163/tcp, 52174/tcp, 21575/tcp, 54576/tcp, 13034/tcp, 37645/tcp, 9466/tcp, 60235/tcp, 54741/tcp, 20759/tcp, 58307/tcp, 12810/tcp, 40617/tcp, 14959/tcp, 43724/tcp, 1036/tcp (Nebula Secure Segment Transfer Protocol), 51279/tcp, 43464/tcp, 3413/tcp (SpecView Networking), 785/tcp, 10284/tcp, 59997/tcp, 24713/tcp, 25188/tcp, 56535/tcp, 17474/tcp, 30395/tcp, 64188/tcp, 40037/tcp, 51670/tcp, 2615/tcp (firepower), 2363/tcp (Media Central NFSD), 51709/tcp, 50800/tcp, 28627/tcp, 13641/tcp, 62886/tcp, 49722/tcp, 39950/tcp, 7461/tcp, 14536/tcp, 20909/tcp, 62038/tcp, 37919/tcp, 18804/tcp, 64880/tcp, 60221/tcp, 47028/tcp, 43745/tcp, 60973/tcp, 48789/tcp, 485/tcp (Air Soft Power Burst), 54854/tcp, 52859/tcp, 37616/tcp, 51754/tcp, 51037/tcp, 41291/tcp, 49526/tcp, 22640/tcp, 59020/tcp, 59408/tcp, 41424/tcp, 36809/tcp, 48273/tcp, 60276/tcp, 16682/tcp, 55786/tcp, 21077/tcp, 44780/tcp, 21160/tcp, 2840/tcp (l3-exprt), 54782/tcp, 845/tcp, 43617/tcp, 44918/tcp, 26184/tcp, 43581/tcp, 2392/tcp (Tactical Auth), 55386/tcp, 41396/tcp, 21272/tcp, 51922/tcp, 18441/tcp, 39422/tcp, 28283/tcp, 11430/tcp, 26237/tcp, 59713/tcp, 40753/tcp, 40178/tcp, 53112/tcp, 8890/tcp (Desktop Data TCP 2), 51541/tcp, 51823/tcp, 40427/tcp, 13109/tcp, 11007/tcp, 26739/tcp, 10535/tcp, 49927/tcp, 17213/tcp, 375/tcp (Hassle), 21718/tcp, 23208/tcp, 50329/tcp, 42963/tcp, 39085/tcp, 63328/tcp, 17034/tcp, 5633/tcp (BE Operations Request Listener), 11780/tcp, 15063/tcp, 234/tcp, 49053/tcp, 49165/tcp, 27556/tcp, 42673/tcp, 21604/tcp, 51787/tcp, 46052/tcp, 54633/tcp, 63885/tcp, 38034/tcp, 50032/tcp, 32296/tcp, 27340/tcp, 11677/tcp, 23248/tcp, 57273/tcp, 478/tcp (spsc), 45174/tcp, 63177/tcp, 27023/tcp, 52649/tcp, 57247/tcp, 19299/tcp, 1065/tcp (SYSCOMLAN), 28488/tcp, 11099/tcp, 11071/tcp, 13113/tcp.
      
BHD Honeypot
Port scan
2020-11-14

In the last 24h, the attacker (94.102.51.95) attempted to scan 365 ports.
The following ports have been scanned: 51563/tcp, 26631/tcp, 6381/tcp, 19288/tcp, 64883/tcp, 65329/tcp, 9544/tcp, 5881/tcp, 3005/tcp (Genius License Manager), 37309/tcp, 17797/tcp, 43857/tcp, 39313/tcp, 49753/tcp, 56072/tcp, 14288/tcp, 60465/tcp, 51124/tcp, 12480/tcp, 54768/tcp, 54800/tcp, 52043/tcp, 39229/tcp, 5490/tcp, 2224/tcp (Easy Flexible Internet/Multiplayer Games), 61084/tcp, 42850/tcp, 1933/tcp (IBM LM MT Agent), 1660/tcp (skip-mc-gikreq), 18744/tcp, 52014/tcp, 59942/tcp, 58853/tcp, 64338/tcp, 23109/tcp, 52668/tcp, 30022/tcp, 50066/tcp, 51138/tcp, 13152/tcp, 28176/tcp, 57006/tcp, 15746/tcp, 63431/tcp, 54409/tcp, 60091/tcp, 42970/tcp, 18379/tcp, 238/tcp, 55419/tcp, 9440/tcp, 47145/tcp, 9578/tcp, 51343/tcp, 24488/tcp, 30683/tcp, 2279/tcp (xmquery), 59328/tcp, 25131/tcp, 32366/tcp, 40510/tcp, 35403/tcp, 53076/tcp, 51423/tcp, 37262/tcp, 42756/tcp, 52195/tcp, 28095/tcp, 5196/tcp, 16112/tcp, 50677/tcp, 40319/tcp, 14316/tcp, 814/tcp, 40840/tcp, 1666/tcp (netview-aix-6), 26345/tcp, 16711/tcp, 23391/tcp, 48445/tcp, 64016/tcp, 7103/tcp, 15068/tcp, 13594/tcp, 65470/tcp, 12844/tcp, 59044/tcp, 41513/tcp, 15691/tcp, 59548/tcp, 44534/tcp, 60359/tcp, 65477/tcp, 11594/tcp, 1995/tcp (cisco perf port), 51558/tcp, 48029/tcp, 15227/tcp, 51763/tcp, 12581/tcp, 37032/tcp, 46419/tcp, 51557/tcp, 12060/tcp, 27602/tcp, 12880/tcp, 44890/tcp, 8360/tcp, 24100/tcp, 28260/tcp, 63290/tcp, 59373/tcp, 27416/tcp, 42643/tcp, 64711/tcp, 3496/tcp (securitylayer over tls), 37080/tcp, 27349/tcp, 19083/tcp, 54972/tcp, 35080/tcp, 25105/tcp, 10313/tcp, 21232/tcp, 64345/tcp, 15339/tcp, 2027/tcp (shadowserver), 61503/tcp, 18329/tcp, 14730/tcp, 63915/tcp, 56994/tcp, 18883/tcp, 50001/tcp, 13291/tcp, 47963/tcp, 38697/tcp, 54377/tcp, 14653/tcp, 12338/tcp, 31213/tcp, 49883/tcp, 53605/tcp, 3613/tcp (Alaris Device Discovery), 26997/tcp, 61649/tcp, 14743/tcp, 61060/tcp, 43503/tcp, 23708/tcp, 54013/tcp, 54749/tcp, 54158/tcp, 49865/tcp, 10200/tcp (Trigence AE Soap Service), 13610/tcp, 21022/tcp, 63118/tcp, 23611/tcp, 60810/tcp, 35735/tcp, 63544/tcp, 51819/tcp, 4944/tcp, 9/tcp (Discard), 16193/tcp, 36888/tcp, 59157/tcp, 9774/tcp, 21747/tcp, 60334/tcp, 35421/tcp, 64161/tcp, 13753/tcp, 13542/tcp, 21803/tcp, 54442/tcp, 25580/tcp, 58367/tcp, 27635/tcp, 57457/tcp, 4413/tcp, 3055/tcp (Policy Server), 35163/tcp, 25217/tcp, 61290/tcp, 42776/tcp, 51451/tcp, 17444/tcp, 56268/tcp, 26851/tcp, 60363/tcp, 39554/tcp, 27359/tcp, 59553/tcp, 9791/tcp, 53610/tcp, 26767/tcp, 31361/tcp, 1919/tcp (IBM Tivoli Directory Service - DCH), 37279/tcp, 40163/tcp, 38973/tcp, 2726/tcp (TAMS), 58127/tcp, 54676/tcp, 21691/tcp, 59499/tcp, 40274/tcp, 28284/tcp, 58714/tcp, 59527/tcp, 37317/tcp, 63454/tcp, 64348/tcp, 12253/tcp, 18141/tcp, 32242/tcp, 59927/tcp, 50697/tcp, 47806/tcp (ALC Protocol), 21967/tcp, 21194/tcp, 28257/tcp, 59744/tcp, 174/tcp (MAILQ), 14680/tcp, 37506/tcp, 43175/tcp, 29703/tcp, 4587/tcp, 18458/tcp, 55045/tcp, 50429/tcp, 40730/tcp, 11246/tcp, 55982/tcp, 43960/tcp, 58954/tcp, 30976/tcp, 774/tcp (rpasswd), 2139/tcp (IAS-AUTH), 32715/tcp, 18548/tcp, 12818/tcp, 42539/tcp, 8106/tcp, 14785/tcp, 59435/tcp, 43218/tcp, 38871/tcp, 46861/tcp, 43598/tcp, 21302/tcp, 21047/tcp, 43510/tcp, 13403/tcp, 17915/tcp, 27886/tcp, 11033/tcp, 7856/tcp, 46777/tcp, 15190/tcp, 20249/tcp, 41625/tcp, 16698/tcp, 34075/tcp, 34941/tcp, 51277/tcp, 26938/tcp, 56977/tcp, 46051/tcp, 47247/tcp, 40980/tcp, 27887/tcp, 44310/tcp, 54543/tcp, 49854/tcp, 4719/tcp, 54973/tcp, 18817/tcp, 62900/tcp, 4581/tcp, 55749/tcp, 64156/tcp, 61926/tcp, 40540/tcp, 52537/tcp, 13637/tcp, 49012/tcp, 18250/tcp, 39336/tcp, 23259/tcp, 12231/tcp, 14787/tcp, 28163/tcp, 40195/tcp, 54782/tcp, 14897/tcp, 41345/tcp, 63937/tcp, 12007/tcp (Accuracer Database System � Server), 63682/tcp, 8704/tcp, 2616/tcp (appswitch-emp), 57106/tcp, 41911/tcp, 48773/tcp, 60114/tcp, 7242/tcp, 29872/tcp, 64236/tcp, 26296/tcp, 255/tcp, 14875/tcp, 29950/tcp, 44618/tcp, 2257/tcp (simple text/file transfer), 5192/tcp (AmericaOnline2), 40734/tcp, 8632/tcp, 10819/tcp, 15352/tcp, 27101/tcp, 7182/tcp, 41172/tcp, 39425/tcp, 59407/tcp, 1973/tcp (Data Link Switching Remote Access Protocol), 17168/tcp, 51756/tcp, 20861/tcp, 16480/tcp, 1142/tcp (User Discovery Service), 12731/tcp, 51420/tcp, 27813/tcp, 14565/tcp, 62590/tcp, 11940/tcp, 52344/tcp, 44806/tcp, 39898/tcp, 9222/tcp (QSC Team Coherence), 47582/tcp, 43970/tcp, 60506/tcp, 64049/tcp, 43473/tcp, 60698/tcp, 43877/tcp, 41183/tcp, 26188/tcp, 59750/tcp, 46117/tcp, 36782/tcp, 35183/tcp, 51319/tcp, 9976/tcp, 53689/tcp, 50138/tcp, 37448/tcp, 10702/tcp, 42646/tcp, 39958/tcp.
      
BHD Honeypot
Port scan
2020-11-13

In the last 24h, the attacker (94.102.51.95) attempted to scan 367 ports.
The following ports have been scanned: 43608/tcp, 37533/tcp, 15067/tcp, 39676/tcp, 15034/tcp, 37066/tcp, 26743/tcp, 47252/tcp, 3609/tcp (CPDI PIDAS Connection Mon), 28207/tcp, 12365/tcp, 17528/tcp, 53847/tcp, 55587/tcp, 19672/tcp, 45967/tcp, 37994/tcp, 477/tcp (ss7ns), 47749/tcp, 27498/tcp, 61578/tcp, 49748/tcp, 51931/tcp, 32350/tcp, 51978/tcp, 42868/tcp, 18725/tcp, 15179/tcp, 52720/tcp, 5490/tcp, 50437/tcp, 55388/tcp, 25718/tcp, 27861/tcp, 42898/tcp, 59049/tcp, 62160/tcp, 37626/tcp, 58541/tcp, 4129/tcp (NuFW authentication protocol), 10060/tcp, 60729/tcp, 29727/tcp, 26407/tcp, 43478/tcp, 58462/tcp, 42759/tcp, 1938/tcp (JetVWay Client Port), 37029/tcp, 26744/tcp, 40098/tcp, 5745/tcp (fcopy-server), 37336/tcp, 15181/tcp, 16614/tcp, 12308/tcp, 54849/tcp, 1498/tcp (Sybase SQL Any), 54521/tcp, 54168/tcp, 9148/tcp, 26380/tcp, 55727/tcp, 43185/tcp, 9651/tcp, 14796/tcp, 621/tcp (ESCP), 13264/tcp, 33300/tcp, 27120/tcp, 19532/tcp, 50729/tcp, 37028/tcp, 59984/tcp, 11706/tcp, 10899/tcp, 47001/tcp (Windows Remote Management Service), 43436/tcp, 38902/tcp, 23366/tcp, 63571/tcp, 62853/tcp, 39410/tcp, 9432/tcp, 64627/tcp, 15206/tcp, 46192/tcp, 43213/tcp, 55705/tcp, 18027/tcp, 40842/tcp (CSCCREDIR), 1190/tcp (CommLinx GPS / AVL System), 37210/tcp, 16599/tcp, 22533/tcp, 10674/tcp, 35622/tcp, 28484/tcp, 482/tcp (bgs-nsi), 40670/tcp, 27360/tcp, 9717/tcp, 65473/tcp, 27049/tcp, 58653/tcp, 42790/tcp, 41582/tcp, 35510/tcp, 53972/tcp, 28004/tcp, 11040/tcp, 18332/tcp, 25578/tcp, 19200/tcp, 44332/tcp, 40726/tcp, 18916/tcp, 37504/tcp, 44255/tcp, 36921/tcp, 26887/tcp, 4363/tcp, 51615/tcp, 47141/tcp, 64632/tcp, 13022/tcp, 14699/tcp, 64044/tcp, 30796/tcp, 4838/tcp (Varadero-1), 23610/tcp, 48117/tcp, 50479/tcp, 31823/tcp, 11680/tcp, 9946/tcp, 21568/tcp, 32490/tcp, 29816/tcp, 27607/tcp, 43474/tcp, 5452/tcp, 19211/tcp, 51460/tcp, 57681/tcp, 47033/tcp, 63402/tcp, 58848/tcp, 55102/tcp, 17249/tcp, 7599/tcp, 16000/tcp (Administration Server Access), 12372/tcp, 39548/tcp, 36917/tcp, 19055/tcp, 62681/tcp, 1964/tcp (SOLID E ENGINE), 2028/tcp (submitserver), 52258/tcp, 52035/tcp, 23820/tcp, 4890/tcp, 21496/tcp, 60805/tcp, 50489/tcp, 2092/tcp (Descent 3), 56123/tcp, 11309/tcp, 4330/tcp, 2140/tcp (IAS-REG), 9829/tcp, 44224/tcp, 12705/tcp, 47850/tcp, 26660/tcp, 13511/tcp, 26493/tcp, 56748/tcp, 53115/tcp, 50345/tcp, 42943/tcp, 59185/tcp, 59382/tcp, 38842/tcp, 11182/tcp, 51785/tcp, 55340/tcp, 10364/tcp, 26016/tcp, 49973/tcp, 38978/tcp, 37757/tcp, 36100/tcp, 5994/tcp, 23364/tcp, 54598/tcp, 58885/tcp, 12343/tcp, 42710/tcp, 1880/tcp (Gilat VSAT Control), 26735/tcp, 64601/tcp, 7995/tcp, 47833/tcp, 46555/tcp, 54655/tcp, 13515/tcp, 43135/tcp, 61235/tcp, 55648/tcp, 24885/tcp, 26300/tcp, 40559/tcp, 54325/tcp, 54660/tcp, 6135/tcp, 28646/tcp, 23062/tcp, 40063/tcp, 3888/tcp (Ciphire Services), 29893/tcp, 12706/tcp, 60726/tcp, 46218/tcp, 23424/tcp, 54362/tcp, 3497/tcp (ipEther232Port), 27017/tcp, 38980/tcp, 50319/tcp, 54832/tcp, 50906/tcp, 11294/tcp, 59132/tcp, 35388/tcp, 61419/tcp, 39234/tcp, 228/tcp, 52516/tcp, 56883/tcp, 2074/tcp (Vertel VMF SA), 37832/tcp, 32340/tcp, 39884/tcp, 12961/tcp, 13160/tcp (I-ZIPQD), 57521/tcp, 15062/tcp, 1639/tcp (cert-initiator), 8771/tcp, 60889/tcp, 57424/tcp, 59596/tcp, 40207/tcp, 18519/tcp, 26882/tcp, 2112/tcp (Idonix MetaNet), 53250/tcp, 17700/tcp, 58933/tcp, 28246/tcp, 50816/tcp, 2481/tcp (Oracle GIOP), 37527/tcp, 42980/tcp, 32228/tcp, 51753/tcp, 44673/tcp, 2474/tcp (Vital Analysis), 30005/tcp, 37989/tcp, 30256/tcp, 15007/tcp, 18522/tcp, 51288/tcp, 62397/tcp, 18302/tcp, 47861/tcp, 9552/tcp, 56939/tcp, 22724/tcp, 58708/tcp, 12210/tcp, 44575/tcp, 41233/tcp, 44539/tcp, 20216/tcp, 53801/tcp, 50971/tcp, 59053/tcp, 36637/tcp, 58904/tcp, 62067/tcp, 32970/tcp, 63683/tcp, 18262/tcp (GV NetConfig Service), 30187/tcp, 27241/tcp, 37112/tcp, 59494/tcp, 44672/tcp, 56996/tcp, 32746/tcp, 62485/tcp, 62054/tcp, 27921/tcp, 25360/tcp, 40861/tcp, 64018/tcp, 47862/tcp, 55558/tcp, 53251/tcp, 27610/tcp, 23945/tcp, 14704/tcp, 13343/tcp, 40554/tcp, 49888/tcp, 54794/tcp, 39405/tcp, 24668/tcp, 58234/tcp, 27199/tcp, 43940/tcp, 13789/tcp, 1533/tcp (Virtual Places Software), 5212/tcp, 35555/tcp, 31068/tcp, 56963/tcp, 11236/tcp, 55056/tcp, 13398/tcp, 32020/tcp, 64484/tcp, 40398/tcp, 58478/tcp, 11437/tcp, 14898/tcp, 57385/tcp, 32596/tcp, 58941/tcp, 57273/tcp, 926/tcp, 41592/tcp, 4561/tcp, 229/tcp, 49944/tcp, 27236/tcp, 28371/tcp, 29496/tcp, 4924/tcp, 3747/tcp (LXPRO.COM LinkTest SSL), 11860/tcp, 18418/tcp, 17891/tcp, 40778/tcp, 312/tcp (VSLMP), 43734/tcp, 37170/tcp, 42786/tcp, 61196/tcp, 23066/tcp, 56647/tcp.
      
BHD Honeypot
Port scan
2020-11-12

In the last 24h, the attacker (94.102.51.95) attempted to scan 171 ports.
The following ports have been scanned: 38668/tcp, 59818/tcp, 18692/tcp, 43137/tcp, 53702/tcp, 44486/tcp, 19533/tcp, 56905/tcp, 11038/tcp, 34912/tcp, 20091/tcp, 50590/tcp, 4195/tcp, 55410/tcp, 15717/tcp, 62932/tcp, 26909/tcp, 55362/tcp, 40633/tcp, 30047/tcp, 23472/tcp, 42767/tcp, 11153/tcp, 26352/tcp, 39511/tcp, 57944/tcp, 26985/tcp, 64195/tcp, 39956/tcp, 29874/tcp, 63146/tcp, 64629/tcp, 11181/tcp, 37783/tcp, 15302/tcp, 53717/tcp, 33383/tcp, 53326/tcp, 36653/tcp, 51866/tcp, 57041/tcp, 50111/tcp, 52908/tcp, 2214/tcp (RDQ Protocol Interface), 58311/tcp, 11555/tcp, 31576/tcp, 36691/tcp, 8013/tcp, 24066/tcp, 20120/tcp, 55698/tcp, 11006/tcp, 45178/tcp, 12482/tcp, 54270/tcp, 45604/tcp, 5769/tcp (x509solutions Internal CA), 760/tcp (ns), 15662/tcp, 38689/tcp, 13092/tcp, 14618/tcp, 49964/tcp, 3998/tcp (Distributed Nagios Executor Service), 27423/tcp, 33526/tcp, 23470/tcp, 44645/tcp, 8403/tcp (admind), 54739/tcp, 25242/tcp, 12119/tcp, 40666/tcp, 16748/tcp, 63844/tcp, 17880/tcp, 24935/tcp, 22896/tcp, 38112/tcp, 49574/tcp, 40087/tcp, 42506/tcp, 38978/tcp, 54319/tcp, 60591/tcp, 44694/tcp, 57600/tcp, 54181/tcp, 1262/tcp (QNTS-ORB), 36861/tcp, 1981/tcp (p2pQ), 31235/tcp, 56910/tcp, 21518/tcp, 64400/tcp, 23676/tcp, 14448/tcp, 35431/tcp, 40128/tcp, 58793/tcp, 43732/tcp, 30144/tcp, 31485/tcp, 2625/tcp (Blwnkl Port), 21216/tcp, 16559/tcp, 64445/tcp, 46968/tcp, 13382/tcp, 53857/tcp, 42692/tcp, 54342/tcp, 13095/tcp, 22473/tcp, 46498/tcp, 58562/tcp, 40558/tcp, 3145/tcp (CSI-LFAP), 37979/tcp, 64880/tcp, 15913/tcp, 4554/tcp (MS FRS Replication), 16727/tcp, 34717/tcp, 10276/tcp, 51726/tcp, 19267/tcp, 16080/tcp, 34803/tcp, 36749/tcp, 50653/tcp, 11066/tcp, 51455/tcp, 4582/tcp, 18891/tcp, 30546/tcp, 29765/tcp, 39710/tcp, 60097/tcp, 36804/tcp, 27599/tcp, 10339/tcp, 16970/tcp, 26630/tcp, 39478/tcp, 22845/tcp, 42263/tcp, 13883/tcp, 65413/tcp, 1288/tcp (NavBuddy), 33521/tcp, 27499/tcp, 13372/tcp, 6051/tcp, 12726/tcp, 32937/tcp, 15122/tcp, 60450/tcp, 54210/tcp, 27826/tcp, 49248/tcp, 17363/tcp, 26379/tcp, 34942/tcp, 51390/tcp, 51468/tcp, 26793/tcp, 43110/tcp, 27050/tcp.
      
BHD Honeypot
Port scan
2020-11-11

In the last 24h, the attacker (94.102.51.95) attempted to scan 255 ports.
The following ports have been scanned: 60704/tcp, 43774/tcp, 3468/tcp (TTCM Remote Controll), 9523/tcp, 46556/tcp, 50182/tcp, 51539/tcp, 58768/tcp, 1851/tcp (ctcd), 39284/tcp, 43761/tcp, 662/tcp (PFTP), 50556/tcp, 24825/tcp, 34579/tcp, 25606/tcp, 17969/tcp, 61721/tcp, 18541/tcp, 11231/tcp, 40698/tcp, 52122/tcp, 42436/tcp, 56909/tcp, 30031/tcp, 19129/tcp, 14818/tcp, 50107/tcp, 43607/tcp, 9550/tcp, 57118/tcp, 14649/tcp, 41089/tcp, 33656/tcp (SNIP Slave), 19323/tcp, 8348/tcp, 52697/tcp, 11806/tcp, 23384/tcp, 51502/tcp, 11321/tcp (Arena Server Listen), 44883/tcp, 53083/tcp, 24326/tcp, 1388/tcp (Objective Solutions DataBase Cache), 51979/tcp, 55146/tcp, 18193/tcp, 30545/tcp, 62194/tcp, 55335/tcp, 42972/tcp, 43513/tcp, 44668/tcp, 14881/tcp, 63985/tcp, 1665/tcp (netview-aix-5), 59016/tcp, 36501/tcp, 51671/tcp, 44431/tcp, 27238/tcp, 56726/tcp, 59717/tcp, 915/tcp, 46694/tcp, 27520/tcp, 57177/tcp, 27272/tcp, 10404/tcp, 40727/tcp, 11923/tcp, 2027/tcp (shadowserver), 13927/tcp, 47331/tcp, 35025/tcp, 63648/tcp, 37167/tcp, 51168/tcp, 43947/tcp, 20342/tcp, 51055/tcp, 48802/tcp, 23723/tcp, 12455/tcp, 29919/tcp, 43538/tcp, 50944/tcp, 14341/tcp, 49880/tcp, 60732/tcp, 21128/tcp, 35262/tcp, 5740/tcp, 4158/tcp (STAT Command Center), 43335/tcp, 34913/tcp, 26968/tcp, 26957/tcp, 23565/tcp, 24242/tcp (fileSphere), 50060/tcp, 2223/tcp (Rockwell CSP2), 59122/tcp, 59240/tcp, 19247/tcp, 34691/tcp, 26879/tcp, 17719/tcp, 45523/tcp, 9913/tcp, 34886/tcp, 14968/tcp, 50562/tcp, 24742/tcp, 12014/tcp, 27348/tcp, 15411/tcp, 38866/tcp, 18598/tcp, 55784/tcp, 51316/tcp, 55702/tcp, 9428/tcp, 64149/tcp, 49136/tcp, 64265/tcp, 4449/tcp (PrivateWire), 29540/tcp, 36458/tcp, 63315/tcp, 9762/tcp (WSO2 Tungsten HTTP), 36665/tcp, 803/tcp, 63932/tcp, 31655/tcp, 18833/tcp, 46443/tcp, 12993/tcp, 43621/tcp, 27293/tcp, 56867/tcp, 55536/tcp, 14816/tcp, 39454/tcp, 49693/tcp, 39688/tcp, 36920/tcp, 9174/tcp, 23808/tcp, 59327/tcp, 20954/tcp, 53856/tcp, 7572/tcp, 39800/tcp, 26071/tcp, 21921/tcp, 58670/tcp, 425/tcp (ICAD), 46331/tcp, 30517/tcp, 49982/tcp, 30352/tcp, 17573/tcp, 5155/tcp (Oracle asControl Agent), 43046/tcp, 57238/tcp, 36668/tcp, 46554/tcp, 63875/tcp, 32227/tcp, 38865/tcp, 53744/tcp, 64628/tcp, 11897/tcp, 23814/tcp, 3217/tcp (Unified IP & Telecom Environment), 34879/tcp, 10925/tcp, 55172/tcp, 23135/tcp, 32574/tcp, 52168/tcp, 44506/tcp, 9886/tcp, 39660/tcp, 54224/tcp, 18220/tcp, 40102/tcp, 65136/tcp, 43972/tcp, 18632/tcp, 60983/tcp, 25355/tcp, 61536/tcp, 55951/tcp, 55085/tcp, 65387/tcp, 27130/tcp, 58070/tcp, 29868/tcp, 50945/tcp, 14869/tcp, 10053/tcp, 12196/tcp, 11304/tcp, 31208/tcp, 44033/tcp, 54996/tcp, 39423/tcp, 43689/tcp, 39224/tcp, 54682/tcp, 53138/tcp, 46626/tcp, 58864/tcp, 59048/tcp, 43234/tcp, 44319/tcp, 58881/tcp, 55251/tcp, 20146/tcp, 56666/tcp, 23425/tcp, 53940/tcp, 37498/tcp, 10025/tcp, 56922/tcp, 1085/tcp (Web Objects), 39270/tcp, 59828/tcp, 62519/tcp, 11290/tcp, 34991/tcp, 60806/tcp, 8599/tcp, 20203/tcp, 35745/tcp, 61083/tcp, 65275/tcp, 45838/tcp, 7374/tcp, 2102/tcp (Zephyr server), 9803/tcp, 41260/tcp, 40324/tcp, 59568/tcp, 32479/tcp, 27661/tcp, 8766/tcp, 27115/tcp, 43748/tcp, 46414/tcp, 12776/tcp, 39633/tcp.
      
BHD Honeypot
Port scan
2020-11-11

Port scan from IP: 94.102.51.95 detected by psad.
BHD Honeypot
Port scan
2020-11-10

In the last 24h, the attacker (94.102.51.95) attempted to scan 95 ports.
The following ports have been scanned: 55396/tcp, 34885/tcp, 56755/tcp, 14347/tcp, 13687/tcp, 46665/tcp, 57153/tcp, 55368/tcp, 4365/tcp, 1610/tcp (taurus-wh), 60721/tcp, 55397/tcp, 62486/tcp, 17392/tcp, 50899/tcp, 43326/tcp, 23360/tcp, 58212/tcp, 39563/tcp, 54235/tcp, 50879/tcp, 17696/tcp, 50246/tcp, 5351/tcp (NAT Port Mapping Protocol), 46806/tcp, 43603/tcp, 50003/tcp, 11139/tcp, 1277/tcp (mqs), 13949/tcp, 52006/tcp, 37497/tcp, 36463/tcp, 18883/tcp, 1166/tcp (QSM RemoteExec), 20990/tcp, 22390/tcp, 59830/tcp, 40506/tcp, 523/tcp (IBM-DB2), 23459/tcp, 21429/tcp, 45860/tcp, 59632/tcp, 17802/tcp, 11776/tcp, 17280/tcp, 13436/tcp, 60366/tcp, 61312/tcp, 61316/tcp, 21743/tcp, 10787/tcp, 7853/tcp, 14864/tcp, 10426/tcp, 51552/tcp, 1380/tcp (Telesis Network License Manager), 61732/tcp, 11092/tcp, 16041/tcp, 5824/tcp, 8164/tcp, 10476/tcp, 57014/tcp, 260/tcp (Openport), 11382/tcp, 16734/tcp, 18779/tcp, 537/tcp (Networked Media Streaming Protocol), 1390/tcp (Storage Controller), 64879/tcp, 27830/tcp, 25327/tcp, 24739/tcp, 47147/tcp, 60917/tcp, 16631/tcp, 47142/tcp, 14139/tcp, 58318/tcp, 9678/tcp, 45940/tcp, 8879/tcp, 42741/tcp, 9425/tcp, 57629/tcp, 47109/tcp, 56743/tcp, 64139/tcp, 53075/tcp, 51056/tcp, 42866/tcp, 34829/tcp.
      
BHD Honeypot
Port scan
2020-11-09

In the last 24h, the attacker (94.102.51.95) attempted to scan 221 ports.
The following ports have been scanned: 11539/tcp, 59103/tcp, 14759/tcp, 59059/tcp, 40553/tcp, 50423/tcp, 59121/tcp, 41228/tcp, 63870/tcp, 7125/tcp, 21212/tcp, 15734/tcp, 22502/tcp, 45689/tcp, 10452/tcp, 57154/tcp, 43230/tcp, 19100/tcp, 26827/tcp, 13186/tcp, 19218/tcp, 8699/tcp (VNYX Primary Port), 57135/tcp, 24213/tcp, 12147/tcp, 11195/tcp, 38660/tcp, 47208/tcp, 26655/tcp, 61629/tcp, 42561/tcp, 42297/tcp, 46049/tcp, 52937/tcp, 26125/tcp, 63509/tcp, 11276/tcp, 59484/tcp, 35430/tcp, 36927/tcp, 27969/tcp, 31711/tcp, 30434/tcp, 42396/tcp, 56916/tcp, 38521/tcp, 37366/tcp, 57708/tcp, 29368/tcp, 3144/tcp (Tarantella), 10899/tcp, 4841/tcp (QUOSA Virtual Library Service), 48995/tcp, 31321/tcp, 43426/tcp, 20552/tcp, 36820/tcp, 27069/tcp, 59703/tcp, 49942/tcp, 58797/tcp, 61169/tcp, 49971/tcp, 36941/tcp, 11388/tcp, 39427/tcp, 56854/tcp, 22949/tcp, 57098/tcp, 4045/tcp (Network Paging Protocol), 1359/tcp (FTSRV), 27606/tcp, 12538/tcp, 18235/tcp, 27883/tcp, 18660/tcp, 64128/tcp, 44011/tcp, 5965/tcp, 60078/tcp, 27524/tcp, 14325/tcp, 26846/tcp, 1125/tcp (HP VMM Agent), 49220/tcp, 11707/tcp, 45827/tcp, 56372/tcp, 44320/tcp, 60984/tcp, 18520/tcp, 53968/tcp, 63794/tcp, 12260/tcp, 26517/tcp, 4310/tcp (Mir-RT exchange service), 51317/tcp, 58852/tcp, 27523/tcp, 19308/tcp, 15036/tcp, 51504/tcp, 13846/tcp, 57015/tcp, 38113/tcp, 287/tcp (K-BLOCK), 61710/tcp, 38409/tcp, 24629/tcp, 61971/tcp, 36290/tcp, 51336/tcp, 43214/tcp, 32464/tcp, 11919/tcp, 23667/tcp, 49977/tcp, 56527/tcp, 33603/tcp, 31396/tcp, 258/tcp, 11446/tcp, 33405/tcp, 12928/tcp, 57652/tcp, 29791/tcp, 49858/tcp, 27104/tcp, 22480/tcp, 8472/tcp (Overlay Transport Virtualization (OTV)), 65499/tcp, 65386/tcp, 17434/tcp, 4121/tcp (e-Builder Application Communication), 39010/tcp, 51374/tcp, 32686/tcp, 27214/tcp, 13817/tcp, 13887/tcp, 49497/tcp, 11082/tcp, 53718/tcp, 3682/tcp (EMC SmartPackets-MAPI), 58769/tcp, 27406/tcp, 30003/tcp, 27687/tcp, 51149/tcp, 43465/tcp, 17293/tcp, 46582/tcp, 54834/tcp, 8949/tcp, 11694/tcp, 37171/tcp, 57404/tcp, 60889/tcp, 3766/tcp, 30858/tcp, 33856/tcp, 28372/tcp, 50591/tcp, 51727/tcp, 60816/tcp, 45217/tcp, 57021/tcp, 30656/tcp, 57461/tcp, 29731/tcp, 34545/tcp, 11533/tcp, 37115/tcp, 15328/tcp, 57927/tcp, 52636/tcp, 22508/tcp, 24264/tcp, 23440/tcp, 4849/tcp (App Server - Admin HTTPS), 36970/tcp, 23077/tcp, 30382/tcp, 42392/tcp, 3312/tcp (Application Management Server), 22249/tcp, 6735/tcp, 24890/tcp, 14138/tcp, 21346/tcp, 52749/tcp, 51728/tcp, 61281/tcp, 13688/tcp, 20469/tcp, 1528/tcp, 60733/tcp, 45660/tcp, 26519/tcp, 46749/tcp, 22641/tcp, 3692/tcp (Brimstone IntelSync), 37361/tcp, 32966/tcp, 45323/tcp, 19994/tcp, 4451/tcp (CTI System Msg), 19416/tcp, 14276/tcp, 35011/tcp, 3947/tcp (Connect and Control Protocol for Consumer, Commercial, and Industrial Electronic Devices), 12692/tcp, 3721/tcp (Xsync), 33159/tcp, 18081/tcp, 33714/tcp, 11027/tcp, 16847/tcp, 52574/tcp, 18204/tcp.
      
BHD Honeypot
Port scan
2020-11-08

In the last 24h, the attacker (94.102.51.95) attempted to scan 135 ports.
The following ports have been scanned: 13550/tcp, 44161/tcp, 28893/tcp, 58877/tcp, 4598/tcp (A16 (AN-AN)), 30394/tcp, 35314/tcp, 50199/tcp, 59436/tcp, 5406/tcp (Systemics Sox), 22159/tcp, 20760/tcp, 44560/tcp, 27043/tcp, 55388/tcp, 12943/tcp, 12481/tcp, 11176/tcp, 46330/tcp, 18245/tcp, 22816/tcp, 12461/tcp, 4086/tcp, 14981/tcp, 27489/tcp, 59786/tcp, 48967/tcp, 51050/tcp, 46891/tcp, 15072/tcp, 27324/tcp, 39174/tcp, 9062/tcp, 19053/tcp, 49442/tcp, 44388/tcp, 24992/tcp, 61935/tcp, 38950/tcp, 19643/tcp, 14587/tcp, 21379/tcp, 19965/tcp, 37429/tcp, 39009/tcp, 59076/tcp, 57061/tcp, 16464/tcp, 45648/tcp, 44040/tcp, 34662/tcp, 3060/tcp (interserver), 12671/tcp, 50584/tcp, 27133/tcp, 43901/tcp, 17938/tcp, 34907/tcp, 11527/tcp, 56738/tcp, 23396/tcp, 45800/tcp, 61903/tcp, 50153/tcp, 40302/tcp, 26734/tcp, 31323/tcp, 14116/tcp, 17251/tcp, 42924/tcp, 889/tcp, 9539/tcp, 45602/tcp, 22779/tcp, 20258/tcp, 27669/tcp, 37038/tcp, 49882/tcp, 4486/tcp (Integrated Client Message Service), 50676/tcp, 58937/tcp, 11482/tcp, 51301/tcp, 7602/tcp, 30182/tcp, 33018/tcp, 55192/tcp, 44667/tcp, 35038/tcp, 50333/tcp, 59009/tcp, 12035/tcp, 34522/tcp, 19868/tcp, 35108/tcp, 26404/tcp, 21651/tcp, 57126/tcp, 12956/tcp, 24851/tcp, 37031/tcp, 30678/tcp, 46778/tcp, 55226/tcp, 18469/tcp, 998/tcp (busboy), 54459/tcp, 9064/tcp, 59715/tcp, 61182/tcp, 58770/tcp, 27808/tcp, 30009/tcp, 18665/tcp, 27580/tcp, 27493/tcp, 27130/tcp, 42712/tcp, 59148/tcp, 36591/tcp, 30912/tcp, 45927/tcp, 26603/tcp, 43202/tcp, 6819/tcp, 27827/tcp, 61430/tcp, 27097/tcp, 29943/tcp, 19559/tcp, 30427/tcp, 61709/tcp, 14673/tcp, 47617/tcp, 50227/tcp.
      
BHD Honeypot
Port scan
2020-11-07

In the last 24h, the attacker (94.102.51.95) attempted to scan 170 ports.
The following ports have been scanned: 29545/tcp, 31763/tcp, 17829/tcp, 31463/tcp, 48648/tcp, 22958/tcp, 21684/tcp, 19286/tcp, 50911/tcp, 51647/tcp, 29141/tcp, 50193/tcp, 45549/tcp, 47902/tcp, 1357/tcp (Electronic PegBoard), 42616/tcp, 39229/tcp, 56420/tcp, 5884/tcp, 30390/tcp, 23277/tcp, 3395/tcp (Dyna License Manager (Elam)), 37333/tcp, 51413/tcp, 27518/tcp, 61787/tcp, 60357/tcp, 4422/tcp, 30745/tcp, 15187/tcp, 57397/tcp, 15984/tcp, 47080/tcp, 18857/tcp, 54829/tcp, 34028/tcp, 22969/tcp, 53091/tcp, 43752/tcp, 30314/tcp, 52556/tcp, 20006/tcp, 37071/tcp, 32818/tcp, 36675/tcp, 33937/tcp, 13495/tcp, 19581/tcp, 50432/tcp, 60219/tcp, 52054/tcp, 14164/tcp, 15582/tcp, 5853/tcp, 54866/tcp, 27520/tcp, 18357/tcp, 22187/tcp, 27272/tcp, 9067/tcp, 44016/tcp, 56671/tcp, 17418/tcp, 21754/tcp, 2369/tcp, 38548/tcp, 14671/tcp, 4198/tcp, 1029/tcp (Solid Mux Server), 43635/tcp, 8291/tcp, 23165/tcp, 51475/tcp, 33928/tcp, 37701/tcp, 39639/tcp, 57714/tcp, 34730/tcp, 3384/tcp (Cluster Management Services), 52947/tcp, 5774/tcp, 61602/tcp, 16636/tcp, 30064/tcp, 9116/tcp, 27635/tcp, 23200/tcp, 5098/tcp, 25979/tcp, 8957/tcp, 30953/tcp, 34457/tcp, 57758/tcp, 38839/tcp, 38059/tcp, 52082/tcp, 58513/tcp, 60815/tcp, 17172/tcp, 40832/tcp, 61362/tcp, 36389/tcp, 42867/tcp, 12040/tcp, 43523/tcp, 43004/tcp, 21545/tcp, 27100/tcp, 27753/tcp, 31240/tcp, 43925/tcp, 42362/tcp, 45747/tcp, 11189/tcp, 42325/tcp, 60748/tcp, 52835/tcp, 29813/tcp, 40985/tcp, 27418/tcp, 61768/tcp, 32483/tcp (Access Point Manager Link), 33660/tcp, 30240/tcp, 12398/tcp, 56452/tcp, 24811/tcp, 27436/tcp, 50638/tcp, 59465/tcp, 26706/tcp, 21712/tcp, 42422/tcp, 59456/tcp, 6404/tcp (Business Objects Enterprise internal server), 49930/tcp, 50305/tcp, 31101/tcp, 38939/tcp, 52360/tcp, 18528/tcp, 38727/tcp, 59953/tcp, 31314/tcp, 11194/tcp, 1543/tcp (simba-cs), 25048/tcp, 50074/tcp, 56658/tcp, 19490/tcp, 7714/tcp, 31479/tcp, 51560/tcp, 13520/tcp, 56763/tcp, 18625/tcp, 37631/tcp, 50715/tcp, 30293/tcp, 20285/tcp, 59451/tcp, 38584/tcp, 52919/tcp, 914/tcp, 49607/tcp, 30621/tcp, 14464/tcp, 17026/tcp, 1009/tcp, 29034/tcp.
      
BHD Honeypot
Port scan
2020-11-06

In the last 24h, the attacker (94.102.51.95) attempted to scan 245 ports.
The following ports have been scanned: 56624/tcp, 37924/tcp, 50859/tcp, 57237/tcp, 21818/tcp, 16823/tcp, 45858/tcp, 19026/tcp, 1654/tcp (stargatealerts), 15929/tcp, 22271/tcp, 59939/tcp, 21400/tcp, 61261/tcp, 31100/tcp, 55700/tcp, 50687/tcp, 48630/tcp, 37254/tcp, 12796/tcp, 61378/tcp, 738/tcp, 56679/tcp, 52381/tcp, 8335/tcp, 30073/tcp, 1074/tcp (Warmspot Management Protocol), 18416/tcp, 34745/tcp, 49266/tcp, 17352/tcp, 55401/tcp, 24331/tcp, 1655/tcp (dec-mbadmin), 3697/tcp (NavisWorks License System), 51479/tcp, 59083/tcp, 59800/tcp, 46957/tcp, 15738/tcp, 61268/tcp, 57236/tcp, 54926/tcp, 52221/tcp, 34359/tcp, 46890/tcp, 61061/tcp, 56538/tcp, 60636/tcp, 60926/tcp, 3507/tcp (Nesh Broker Port), 36206/tcp, 57046/tcp, 766/tcp, 27548/tcp, 46950/tcp, 11443/tcp, 61517/tcp, 22566/tcp, 57821/tcp, 37205/tcp, 1400/tcp (Cadkey Tablet Daemon), 37008/tcp, 11278/tcp, 30147/tcp, 10596/tcp, 11192/tcp, 37166/tcp, 31228/tcp, 62342/tcp, 48087/tcp, 29433/tcp, 61405/tcp, 57076/tcp, 41574/tcp, 47017/tcp, 3882/tcp (DTS Service Port), 49167/tcp, 5657/tcp, 56601/tcp, 18770/tcp, 44436/tcp, 43160/tcp, 19671/tcp, 1292/tcp (dsdn), 16780/tcp, 52199/tcp, 56302/tcp, 11943/tcp, 21567/tcp, 26524/tcp, 52892/tcp, 44515/tcp, 1213/tcp (MPC LIFENET), 10061/tcp, 12256/tcp, 17939/tcp, 14213/tcp, 31367/tcp, 9430/tcp, 44264/tcp, 22350/tcp (CodeMeter Standard), 62398/tcp, 52097/tcp, 59966/tcp, 29151/tcp, 4986/tcp (Model Railway Interface Program), 63906/tcp, 12042/tcp, 27577/tcp, 30433/tcp, 33356/tcp, 16693/tcp, 13073/tcp, 44176/tcp, 49284/tcp, 51405/tcp, 10089/tcp, 46062/tcp, 2426/tcp, 50606/tcp, 61317/tcp, 17354/tcp, 38256/tcp, 61139/tcp, 49289/tcp, 18914/tcp, 17112/tcp, 17200/tcp, 11895/tcp, 9370/tcp, 1777/tcp (powerguardian), 18134/tcp, 61834/tcp, 25076/tcp, 3032/tcp (Redwood Chat), 57569/tcp, 49502/tcp, 51651/tcp, 45607/tcp, 42760/tcp, 20402/tcp, 44893/tcp, 19881/tcp, 60469/tcp, 7881/tcp, 42750/tcp, 32846/tcp, 18051/tcp, 56414/tcp, 51279/tcp, 64222/tcp, 45351/tcp, 10536/tcp, 19251/tcp, 9035/tcp, 42409/tcp, 3567/tcp (Object Access Protocol), 37524/tcp, 30706/tcp, 59300/tcp, 12047/tcp, 55337/tcp, 12585/tcp, 15722/tcp, 61055/tcp, 40587/tcp, 54186/tcp, 62989/tcp, 60190/tcp, 26622/tcp, 35927/tcp, 28554/tcp, 51507/tcp, 27920/tcp, 29701/tcp, 32323/tcp, 6707/tcp, 5272/tcp (PK), 38502/tcp, 38401/tcp, 14109/tcp, 61895/tcp, 57021/tcp, 47320/tcp, 27580/tcp, 61684/tcp, 29624/tcp, 3334/tcp (Direct TV Webcasting), 43468/tcp, 59102/tcp, 20763/tcp, 40402/tcp, 43297/tcp, 45970/tcp, 57346/tcp, 56703/tcp, 16101/tcp, 26046/tcp, 46195/tcp, 19895/tcp, 53323/tcp, 31490/tcp, 16930/tcp, 32488/tcp, 14169/tcp, 61429/tcp, 8923/tcp, 10397/tcp, 48338/tcp, 22974/tcp, 22797/tcp, 487/tcp (saft Simple Asynchronous File Transfer), 40554/tcp, 27813/tcp, 18444/tcp, 17636/tcp, 27640/tcp, 44367/tcp, 27304/tcp, 14534/tcp, 43687/tcp, 34415/tcp, 39216/tcp, 44998/tcp, 60188/tcp, 10841/tcp, 42895/tcp, 37135/tcp, 39388/tcp, 49752/tcp, 11650/tcp, 19859/tcp, 14312/tcp, 31652/tcp, 49150/tcp, 17464/tcp, 46080/tcp, 50960/tcp, 27553/tcp, 307/tcp, 18974/tcp, 29674/tcp, 42581/tcp, 38070/tcp.
      
BHD Honeypot
Port scan
2020-11-06

Port scan from IP: 94.102.51.95 detected by psad.
BHD Honeypot
Port scan
2020-11-05

In the last 24h, the attacker (94.102.51.95) attempted to scan 141 ports.
The following ports have been scanned: 36924/tcp, 635/tcp (RLZ DBase), 58546/tcp, 14288/tcp, 10453/tcp, 50902/tcp, 61177/tcp, 27326/tcp, 8503/tcp, 22606/tcp, 41666/tcp, 27278/tcp, 5981/tcp, 4936/tcp, 58463/tcp, 50371/tcp, 47012/tcp, 36680/tcp, 30321/tcp, 51915/tcp, 27048/tcp, 62371/tcp, 47317/tcp, 10821/tcp, 35066/tcp, 62258/tcp, 36565/tcp, 57428/tcp, 42365/tcp, 56347/tcp, 46984/tcp, 42438/tcp, 30320/tcp, 56/tcp (XNS Authentication), 56790/tcp, 56874/tcp, 47539/tcp, 15215/tcp, 29316/tcp, 5210/tcp, 47787/tcp, 65135/tcp, 62116/tcp, 60920/tcp, 52529/tcp, 30139/tcp, 50293/tcp, 27800/tcp, 64763/tcp, 26381/tcp, 23444/tcp, 61205/tcp, 146/tcp (ISO-IP0), 47575/tcp, 13885/tcp, 49741/tcp, 5411/tcp (ActNet), 64223/tcp, 48828/tcp, 42029/tcp, 37505/tcp, 5299/tcp (NLG Data Service), 29643/tcp, 48143/tcp, 59785/tcp, 19504/tcp, 42334/tcp, 57826/tcp, 16584/tcp, 45473/tcp, 50549/tcp, 1885/tcp (Veritas Trap Server), 33547/tcp, 47568/tcp, 1278/tcp (Dell Web Admin 1), 23086/tcp, 17631/tcp, 60759/tcp, 42349/tcp, 55614/tcp, 61822/tcp, 48635/tcp, 65246/tcp, 41889/tcp, 16465/tcp, 50069/tcp, 49809/tcp, 30423/tcp, 19165/tcp, 36457/tcp, 8520/tcp, 8978/tcp, 51039/tcp, 22723/tcp, 15550/tcp, 49228/tcp, 50925/tcp, 16977/tcp, 21321/tcp, 12400/tcp, 1165/tcp (QSM GUI Service), 59772/tcp, 1616/tcp (NetBill Product Server), 44375/tcp, 45610/tcp, 55806/tcp, 27786/tcp, 51642/tcp, 43244/tcp, 13324/tcp, 61577/tcp, 17744/tcp, 5239/tcp, 32141/tcp, 31736/tcp, 14837/tcp, 15483/tcp, 945/tcp, 55438/tcp, 37369/tcp, 16106/tcp, 10314/tcp, 18111/tcp, 29428/tcp, 21406/tcp, 22941/tcp, 50506/tcp, 15833/tcp, 36211/tcp, 61398/tcp, 56623/tcp, 11217/tcp, 55056/tcp, 59133/tcp, 42283/tcp, 32165/tcp, 40052/tcp, 44881/tcp, 6740/tcp, 33239/tcp.
      
BHD Honeypot
Port scan
2020-11-04

In the last 24h, the attacker (94.102.51.95) attempted to scan 337 ports.
The following ports have been scanned: 49853/tcp, 3799/tcp (RADIUS Dynamic Authorization), 43258/tcp, 41902/tcp, 32233/tcp, 52701/tcp, 19630/tcp, 43273/tcp, 60876/tcp, 56755/tcp, 18658/tcp, 63712/tcp, 49639/tcp, 39387/tcp, 56386/tcp, 64401/tcp, 49358/tcp, 32351/tcp, 59049/tcp, 58156/tcp, 38895/tcp, 38025/tcp, 6163/tcp (Precision Scribe Cnx Port), 42140/tcp, 41917/tcp, 47429/tcp, 46925/tcp, 50828/tcp, 30255/tcp, 42970/tcp, 43310/tcp, 51943/tcp, 55419/tcp, 21460/tcp, 48563/tcp, 62260/tcp, 48147/tcp, 48532/tcp, 42697/tcp, 6516/tcp, 62004/tcp, 32764/tcp, 25249/tcp, 16213/tcp, 34716/tcp, 38577/tcp, 25751/tcp, 38576/tcp, 56350/tcp, 30071/tcp, 24605/tcp, 56276/tcp, 53490/tcp, 49177/tcp, 55801/tcp, 60164/tcp, 35974/tcp, 29989/tcp, 16488/tcp, 51620/tcp, 414/tcp (InfoSeek), 52446/tcp, 19938/tcp, 16357/tcp, 16801/tcp, 18401/tcp, 17688/tcp, 17055/tcp, 21539/tcp, 12050/tcp, 45798/tcp, 11460/tcp, 3693/tcp, 45026/tcp, 42979/tcp, 56433/tcp, 49871/tcp, 52955/tcp, 33105/tcp, 30985/tcp, 6728/tcp, 7741/tcp (ScriptView Network), 3552/tcp (TeamAgenda Server Port), 18627/tcp, 59576/tcp, 30920/tcp, 57318/tcp, 21316/tcp, 48016/tcp, 18694/tcp, 38501/tcp, 1121/tcp (Datalode RMPP), 22782/tcp, 26627/tcp, 3428/tcp (2Wire CSS), 31032/tcp, 43901/tcp, 47009/tcp, 62339/tcp, 52823/tcp, 3813/tcp (Rhapsody Interface Protocol), 60921/tcp, 37004/tcp, 12356/tcp, 23471/tcp, 20189/tcp, 49332/tcp, 37730/tcp, 45110/tcp, 37871/tcp, 41379/tcp, 45421/tcp, 27771/tcp, 4021/tcp (Nexus Portal), 50480/tcp, 48979/tcp, 59372/tcp, 19198/tcp, 38046/tcp, 61471/tcp, 21829/tcp, 65219/tcp, 59654/tcp, 15730/tcp, 30568/tcp, 50823/tcp, 18050/tcp, 16553/tcp, 47779/tcp, 36700/tcp, 39639/tcp, 55522/tcp, 51356/tcp, 39011/tcp, 61434/tcp, 54665/tcp, 55364/tcp, 51363/tcp, 36229/tcp, 247/tcp (SUBNTBCST_TFTP), 51000/tcp, 48989/tcp, 3173/tcp (SERVERVIEW-ICC), 48267/tcp, 639/tcp (MSDP), 38084/tcp, 21435/tcp, 59240/tcp, 58434/tcp, 50181/tcp, 40720/tcp, 51144/tcp, 64187/tcp, 38648/tcp, 60250/tcp, 60665/tcp, 61089/tcp, 16460/tcp, 65163/tcp, 54883/tcp, 44886/tcp, 59467/tcp, 49957/tcp, 37803/tcp, 30988/tcp, 38643/tcp, 19139/tcp, 19057/tcp, 31444/tcp, 35150/tcp, 42378/tcp, 58430/tcp, 61290/tcp, 30792/tcp, 37529/tcp, 55507/tcp, 29225/tcp, 41462/tcp, 18152/tcp, 18011/tcp, 11440/tcp, 65327/tcp, 47975/tcp, 54662/tcp, 38282/tcp, 58842/tcp, 50344/tcp, 30674/tcp, 51293/tcp, 3674/tcp (WinINSTALL IPC Port), 15342/tcp, 50930/tcp, 42618/tcp, 49240/tcp, 57600/tcp, 17984/tcp, 65526/tcp, 30176/tcp, 27912/tcp, 44427/tcp, 19029/tcp, 60784/tcp, 21149/tcp, 36704/tcp, 46305/tcp, 2724/tcp (qotps), 29648/tcp, 44301/tcp, 49469/tcp, 42783/tcp, 49306/tcp, 42113/tcp, 54691/tcp, 43618/tcp, 46587/tcp, 36954/tcp, 10781/tcp, 21782/tcp, 51079/tcp, 19506/tcp, 11205/tcp, 30625/tcp, 17746/tcp, 36319/tcp, 22064/tcp, 36807/tcp, 56571/tcp, 6835/tcp, 11495/tcp, 33240/tcp, 15706/tcp, 55549/tcp, 50927/tcp, 61376/tcp, 8030/tcp, 43873/tcp, 63740/tcp, 60190/tcp, 16126/tcp, 32991/tcp, 60889/tcp, 37808/tcp, 49830/tcp, 18342/tcp, 59772/tcp, 11054/tcp, 3926/tcp (WINPort), 26742/tcp, 38357/tcp, 64003/tcp, 3418/tcp (Remote nmap), 43277/tcp, 60168/tcp, 61111/tcp, 65044/tcp, 29787/tcp, 53771/tcp, 61295/tcp, 49246/tcp, 17910/tcp, 19813/tcp, 1019/tcp, 15818/tcp, 18439/tcp, 49609/tcp, 19998/tcp (IEC 60870-5-104 process control - secure), 65020/tcp, 43118/tcp, 15386/tcp, 664/tcp (DMTF out-of-band secure web services management protocol), 24025/tcp, 10523/tcp, 33032/tcp, 40013/tcp, 29038/tcp, 31097/tcp, 57595/tcp, 16273/tcp, 15846/tcp, 44010/tcp, 30505/tcp, 29785/tcp, 1996/tcp (cisco Remote SRB port), 38058/tcp, 60669/tcp, 63253/tcp, 64154/tcp, 35822/tcp, 58579/tcp, 3301/tcp, 22831/tcp, 6511/tcp, 59778/tcp, 59976/tcp, 46081/tcp, 16851/tcp, 4064/tcp (Ice Firewall Traversal Service (SSL)), 30303/tcp, 43900/tcp, 29142/tcp, 28894/tcp, 50548/tcp, 36891/tcp, 31427/tcp, 34411/tcp, 36919/tcp, 41928/tcp, 34679/tcp, 22124/tcp, 42588/tcp, 57529/tcp, 36587/tcp, 45390/tcp, 56540/tcp, 25357/tcp, 54333/tcp, 4023/tcp (ESNM Zoning Port), 15957/tcp, 62077/tcp, 56308/tcp, 32277/tcp, 28867/tcp, 34959/tcp, 50593/tcp, 33858/tcp, 18347/tcp, 39900/tcp, 26469/tcp, 50368/tcp, 30209/tcp, 49838/tcp, 51330/tcp, 29925/tcp, 13734/tcp, 17209/tcp.
      
BHD Honeypot
Port scan
2020-11-03

In the last 24h, the attacker (94.102.51.95) attempted to scan 406 ports.
The following ports have been scanned: 27185/tcp, 45005/tcp, 2854/tcp (InfoMover), 33711/tcp, 55252/tcp, 55930/tcp, 30030/tcp, 59093/tcp, 65014/tcp, 17214/tcp, 7622/tcp, 19196/tcp, 53636/tcp, 56553/tcp, 50433/tcp, 58378/tcp, 18581/tcp, 38267/tcp, 21763/tcp, 47651/tcp, 50115/tcp, 27055/tcp, 17717/tcp, 52400/tcp, 29366/tcp, 32316/tcp, 50232/tcp, 33938/tcp, 55700/tcp, 14025/tcp, 16326/tcp, 59049/tcp, 47814/tcp, 58658/tcp, 58799/tcp, 42613/tcp, 55197/tcp, 17524/tcp, 48642/tcp, 46527/tcp, 40577/tcp, 20703/tcp, 43899/tcp, 33242/tcp, 54879/tcp, 53356/tcp, 33829/tcp, 38424/tcp, 65519/tcp, 27186/tcp, 41191/tcp, 24125/tcp, 36254/tcp, 35658/tcp, 57866/tcp, 53094/tcp, 58740/tcp, 59274/tcp, 2001/tcp (dc), 7203/tcp, 50201/tcp, 37459/tcp, 22778/tcp, 21349/tcp, 61263/tcp, 53464/tcp, 53244/tcp, 42507/tcp, 39882/tcp, 3868/tcp (DIAMETER), 8377/tcp (Cruise SWROUTE), 30226/tcp, 64652/tcp, 58911/tcp, 37792/tcp, 45463/tcp, 23666/tcp, 44194/tcp, 30039/tcp, 31072/tcp, 57316/tcp, 56321/tcp, 37888/tcp, 21209/tcp, 61071/tcp, 50575/tcp, 11672/tcp, 45072/tcp, 39133/tcp, 27390/tcp, 58440/tcp, 33574/tcp, 37920/tcp, 33322/tcp, 60023/tcp, 44181/tcp, 2374/tcp (Hydra RPC), 49697/tcp, 16069/tcp, 61424/tcp, 50861/tcp, 60313/tcp, 59243/tcp, 22080/tcp, 43616/tcp, 30531/tcp, 6068/tcp (GSMP), 37125/tcp, 49117/tcp, 42615/tcp, 30143/tcp, 1325/tcp (DX-Instrument), 35232/tcp, 51367/tcp, 11022/tcp, 23890/tcp, 50441/tcp, 41779/tcp, 37479/tcp, 51530/tcp, 64254/tcp, 21937/tcp, 56762/tcp, 6180/tcp, 42725/tcp, 58357/tcp, 41127/tcp, 30494/tcp, 18218/tcp, 11329/tcp, 11417/tcp, 56462/tcp, 19701/tcp, 51182/tcp, 62870/tcp, 62118/tcp, 54191/tcp, 39872/tcp, 61755/tcp, 20244/tcp, 33163/tcp, 11059/tcp, 65263/tcp, 16820/tcp, 63541/tcp, 29836/tcp, 29954/tcp, 52333/tcp, 63008/tcp, 56230/tcp, 37382/tcp, 56564/tcp, 30641/tcp, 60372/tcp, 21317/tcp, 44922/tcp, 55139/tcp, 38079/tcp, 24353/tcp, 51758/tcp, 16125/tcp, 32313/tcp, 17855/tcp, 7946/tcp, 59833/tcp, 37773/tcp, 58942/tcp, 58351/tcp, 33127/tcp, 53266/tcp, 58262/tcp, 49251/tcp, 18862/tcp, 3897/tcp (Simple Distributed Objects over SSH), 27329/tcp, 3818/tcp (Crinis Heartbeat), 54387/tcp, 38063/tcp, 28814/tcp, 23220/tcp, 22718/tcp, 973/tcp, 34555/tcp, 22236/tcp, 27311/tcp, 20541/tcp, 10831/tcp, 50342/tcp, 13806/tcp, 50221/tcp, 60386/tcp, 11053/tcp, 61070/tcp, 56149/tcp, 38039/tcp, 31105/tcp, 46203/tcp, 54963/tcp, 37664/tcp, 56467/tcp, 64082/tcp, 19311/tcp, 49191/tcp, 44082/tcp, 14786/tcp, 33409/tcp, 3152/tcp (FeiTian Port), 23747/tcp, 4148/tcp (HHB Handheld Client), 48379/tcp, 39901/tcp, 56343/tcp, 11463/tcp, 18611/tcp, 41457/tcp, 47426/tcp, 1856/tcp (Fiorano MsgSvc), 54265/tcp, 2590/tcp (idotdist), 62254/tcp, 6697/tcp, 49713/tcp, 48255/tcp, 22626/tcp, 51294/tcp, 19993/tcp, 16832/tcp, 8561/tcp, 36588/tcp, 19839/tcp, 44914/tcp, 46229/tcp, 2949/tcp (WAP PUSH SECURE), 3306/tcp (MySQL), 61093/tcp, 63284/tcp, 58764/tcp, 65159/tcp, 18996/tcp, 55326/tcp, 19608/tcp, 3194/tcp (Rockstorm MAG protocol), 58467/tcp, 41128/tcp, 7/tcp (Echo), 2943/tcp (TTNRepository), 28638/tcp, 39751/tcp, 15841/tcp, 10609/tcp, 12123/tcp, 59997/tcp, 36559/tcp, 54774/tcp, 419/tcp (Ariel 1), 32920/tcp, 15874/tcp, 35749/tcp, 60511/tcp, 3664/tcp (UPS Engine Port), 24049/tcp, 47173/tcp, 38054/tcp, 43943/tcp, 168/tcp (RSVD), 7523/tcp, 59021/tcp, 57602/tcp, 21825/tcp, 29882/tcp, 32275/tcp, 38151/tcp, 38030/tcp, 47013/tcp, 61347/tcp, 48615/tcp, 37289/tcp, 30881/tcp, 50481/tcp, 11617/tcp, 45840/tcp, 61508/tcp, 48863/tcp, 16720/tcp, 6874/tcp, 1321/tcp (PIP), 65520/tcp, 36998/tcp, 27441/tcp, 15967/tcp, 25388/tcp, 7770/tcp, 21657/tcp, 24188/tcp, 4181/tcp (MacBak), 44807/tcp, 39496/tcp, 38028/tcp, 51407/tcp, 38283/tcp, 64474/tcp, 49423/tcp, 6628/tcp (AFE Stock Channel M/C), 14165/tcp, 59465/tcp, 34382/tcp, 19900/tcp, 14646/tcp, 6595/tcp, 963/tcp, 18246/tcp, 61028/tcp, 57014/tcp, 58880/tcp, 34454/tcp, 62538/tcp, 49034/tcp, 32228/tcp, 37915/tcp, 531/tcp (chat), 41023/tcp, 51473/tcp, 65358/tcp, 48474/tcp, 24020/tcp, 59269/tcp, 51720/tcp, 45873/tcp, 59827/tcp, 47152/tcp, 21757/tcp, 58680/tcp, 34981/tcp, 22483/tcp, 15757/tcp, 37788/tcp, 60184/tcp, 36444/tcp, 43367/tcp, 8816/tcp, 21680/tcp, 30120/tcp, 1872/tcp (Cano Central 1), 59019/tcp, 35649/tcp, 61896/tcp, 29888/tcp, 53995/tcp, 23333/tcp (Emulex HBAnyware Remote Management), 60642/tcp, 65290/tcp, 33351/tcp, 24687/tcp, 4231/tcp, 2702/tcp (SMS XFER), 26991/tcp, 26008/tcp, 29562/tcp, 60340/tcp, 42464/tcp, 32282/tcp, 62255/tcp, 15850/tcp, 31064/tcp, 30191/tcp, 19714/tcp, 11575/tcp, 15678/tcp, 30142/tcp, 62590/tcp, 55129/tcp, 44854/tcp, 62506/tcp, 60247/tcp, 20034/tcp (NetBurner ID Port), 54466/tcp, 59431/tcp, 62085/tcp, 52736/tcp, 10090/tcp, 49359/tcp, 2231/tcp (WiMAX ASN Control Plane Protocol), 30865/tcp, 1769/tcp (bmc-net-adm), 21769/tcp, 19425/tcp, 36640/tcp, 59928/tcp, 59353/tcp, 57054/tcp, 30306/tcp, 41063/tcp, 8507/tcp, 30262/tcp, 60374/tcp, 58737/tcp, 52730/tcp, 15958/tcp, 56830/tcp, 10719/tcp, 18293/tcp, 59949/tcp.
      
BHD Honeypot
Port scan
2020-11-02

In the last 24h, the attacker (94.102.51.95) attempted to scan 391 ports.
The following ports have been scanned: 39810/tcp, 53943/tcp, 15566/tcp, 53547/tcp, 967/tcp, 23684/tcp, 28974/tcp, 3920/tcp (Exasoft IP Port), 32847/tcp, 48114/tcp, 60903/tcp, 21538/tcp, 51647/tcp, 55488/tcp, 56691/tcp, 51181/tcp, 38003/tcp, 6039/tcp, 58323/tcp, 48586/tcp, 43371/tcp, 17717/tcp, 36607/tcp, 56986/tcp, 26993/tcp, 52954/tcp, 39415/tcp, 18737/tcp, 38993/tcp, 595/tcp (CAB Protocol), 51544/tcp, 61433/tcp, 2530/tcp (VR Commerce), 42367/tcp, 18403/tcp, 59917/tcp, 18468/tcp, 51846/tcp, 25538/tcp, 16074/tcp, 30477/tcp, 1466/tcp (Ocean Software License Manager), 37739/tcp, 60625/tcp, 17578/tcp, 64012/tcp, 3836/tcp (MARKEM NEXTGEN DCP), 22734/tcp, 50720/tcp, 44553/tcp (REALbasic Remote Debug), 50553/tcp, 8014/tcp, 14079/tcp, 23383/tcp, 40801/tcp, 5363/tcp (Windows Network Projection), 49311/tcp, 62114/tcp, 15454/tcp, 36196/tcp, 24249/tcp (Vista 4GL), 10839/tcp, 30630/tcp, 57377/tcp, 48335/tcp, 19143/tcp, 33051/tcp, 39851/tcp, 35861/tcp, 43089/tcp, 16577/tcp, 16915/tcp, 17743/tcp, 11306/tcp, 17521/tcp, 64804/tcp, 51664/tcp, 64402/tcp, 61125/tcp, 57171/tcp, 60135/tcp, 51348/tcp, 3701/tcp (NetCelera), 17499/tcp, 5083/tcp (Qpur File Protocol), 57515/tcp, 38894/tcp, 36880/tcp, 26904/tcp, 37494/tcp, 30232/tcp, 37549/tcp, 16014/tcp, 54515/tcp, 461/tcp (DataRampSrv), 31244/tcp, 232/tcp, 40881/tcp, 37812/tcp, 48142/tcp, 47683/tcp, 58514/tcp, 56903/tcp, 37900/tcp, 50005/tcp, 10944/tcp, 4049/tcp (Wide Area File Services), 28564/tcp, 56637/tcp, 55914/tcp, 33381/tcp, 2953/tcp (OVALARMSRV), 60150/tcp, 37668/tcp, 11458/tcp, 7630/tcp (HA Web Konsole), 27674/tcp, 65486/tcp, 4059/tcp (DLMS/COSEM), 50584/tcp, 55979/tcp, 56934/tcp, 25532/tcp, 6435/tcp, 38756/tcp, 15930/tcp, 22033/tcp, 33680/tcp, 49006/tcp, 49938/tcp, 10729/tcp, 37411/tcp, 32196/tcp, 10285/tcp, 48917/tcp, 35989/tcp, 43799/tcp, 48753/tcp, 35515/tcp, 58743/tcp, 55602/tcp, 37983/tcp, 60905/tcp, 64657/tcp, 49782/tcp, 16338/tcp, 43981/tcp, 63965/tcp, 55706/tcp, 34444/tcp, 35762/tcp, 48758/tcp, 55769/tcp, 8171/tcp, 24240/tcp, 7031/tcp, 2484/tcp (Oracle TTC SSL), 21796/tcp, 30479/tcp, 60117/tcp, 49669/tcp, 37367/tcp, 14414/tcp (CA eTrust Web Update Service), 43088/tcp, 32848/tcp, 45978/tcp, 16186/tcp, 61459/tcp, 61960/tcp, 51112/tcp, 61201/tcp, 60824/tcp, 59245/tcp, 39695/tcp, 29280/tcp, 59216/tcp, 37003/tcp, 59577/tcp, 42218/tcp, 3669/tcp (CA SAN Switch Management), 9810/tcp, 6239/tcp, 21462/tcp, 52765/tcp, 49061/tcp, 44167/tcp, 11850/tcp, 60843/tcp, 6597/tcp, 42250/tcp, 61728/tcp, 6745/tcp, 25091/tcp, 40960/tcp, 37601/tcp, 12217/tcp, 58238/tcp, 47737/tcp, 40297/tcp, 56942/tcp, 24469/tcp, 55533/tcp, 37269/tcp, 8756/tcp, 63628/tcp, 42776/tcp, 18802/tcp, 6602/tcp (Windows WSS Communication Framework), 17275/tcp, 18156/tcp, 59185/tcp, 21573/tcp, 40151/tcp, 28778/tcp, 23856/tcp, 42506/tcp, 403/tcp (decap), 40246/tcp, 22621/tcp, 45316/tcp, 24438/tcp, 64373/tcp, 3450/tcp (CAStorProxy), 57395/tcp, 41713/tcp, 19342/tcp, 44921/tcp, 5585/tcp (BeInSync-sync), 64495/tcp, 21314/tcp, 24988/tcp, 44409/tcp, 16325/tcp, 23042/tcp, 55846/tcp, 52317/tcp, 48384/tcp, 31127/tcp, 54776/tcp, 61137/tcp, 38009/tcp, 24304/tcp, 4260/tcp, 31950/tcp, 37669/tcp, 42920/tcp, 37306/tcp, 37226/tcp, 60479/tcp, 26259/tcp, 59753/tcp, 59550/tcp, 44926/tcp, 40196/tcp, 56176/tcp, 17497/tcp, 57965/tcp, 37636/tcp, 25/tcp (Simple Mail Transfer), 61096/tcp, 45753/tcp, 56937/tcp, 55465/tcp, 56355/tcp, 21288/tcp, 62612/tcp, 16548/tcp, 29397/tcp, 62034/tcp, 53416/tcp, 19002/tcp, 10228/tcp, 60339/tcp, 53020/tcp, 46344/tcp, 21486/tcp, 51400/tcp, 33210/tcp, 34869/tcp, 15763/tcp, 33425/tcp, 7058/tcp, 204/tcp (AppleTalk Echo), 65300/tcp, 19062/tcp, 38476/tcp, 2967/tcp (SSC-AGENT), 39500/tcp, 22232/tcp, 21343/tcp, 58350/tcp, 47756/tcp, 56261/tcp, 41522/tcp, 59770/tcp, 21594/tcp, 27670/tcp, 12413/tcp, 27531/tcp, 21574/tcp, 17827/tcp, 59803/tcp, 45100/tcp, 63900/tcp, 51044/tcp, 21481/tcp, 61526/tcp, 20707/tcp, 62397/tcp, 60552/tcp, 58268/tcp, 64346/tcp, 32664/tcp, 60503/tcp, 61597/tcp, 38994/tcp, 6611/tcp, 35653/tcp, 23382/tcp, 17970/tcp, 18151/tcp, 31101/tcp, 53746/tcp, 21342/tcp, 37665/tcp, 37552/tcp, 37194/tcp, 46818/tcp, 52424/tcp, 49364/tcp, 38218/tcp, 48226/tcp, 3442/tcp (OC Connect Server), 6184/tcp, 30398/tcp, 41706/tcp, 56290/tcp, 37781/tcp, 18376/tcp, 58066/tcp, 42171/tcp, 42393/tcp, 21178/tcp, 57403/tcp, 32311/tcp, 39740/tcp, 58615/tcp, 59579/tcp, 51831/tcp, 33830/tcp, 40581/tcp, 30932/tcp, 3706/tcp (Real-Time Event Port), 50619/tcp, 31351/tcp, 38187/tcp, 2837/tcp (Repliweb), 27298/tcp, 2920/tcp (roboEDA), 990/tcp (ftp protocol, control, over TLS/SSL), 40214/tcp, 60781/tcp, 64496/tcp, 23332/tcp, 52769/tcp, 41749/tcp, 62367/tcp, 48100/tcp, 3692/tcp (Brimstone IntelSync), 11692/tcp, 58123/tcp, 54301/tcp, 61398/tcp, 15870/tcp, 57345/tcp, 37376/tcp, 53239/tcp, 30317/tcp, 48030/tcp, 42475/tcp, 30486/tcp, 37561/tcp, 47653/tcp, 44391/tcp, 22007/tcp, 31807/tcp, 64586/tcp, 8422/tcp, 49307/tcp, 42585/tcp.
      
BHD Honeypot
Port scan
2020-11-01

In the last 24h, the attacker (94.102.51.95) attempted to scan 381 ports.
The following ports have been scanned: 58355/tcp, 3574/tcp (DMAF Server), 55984/tcp, 62151/tcp, 31033/tcp, 57095/tcp, 15767/tcp, 48499/tcp, 49753/tcp, 61757/tcp, 39053/tcp, 10311/tcp, 36859/tcp, 39104/tcp, 37931/tcp, 59937/tcp, 41624/tcp, 51126/tcp, 42837/tcp, 13143/tcp, 52316/tcp, 22231/tcp, 65407/tcp, 35044/tcp, 4027/tcp (bitxpress), 907/tcp, 38965/tcp, 48391/tcp, 64964/tcp, 24812/tcp, 57157/tcp, 51176/tcp, 50271/tcp, 1889/tcp (Unify Web Adapter Service), 44530/tcp, 58960/tcp, 50365/tcp, 19454/tcp, 47073/tcp, 55689/tcp, 3390/tcp (Distributed Service Coordinator), 49096/tcp, 58991/tcp, 12155/tcp, 43827/tcp, 62007/tcp, 2136/tcp (APPWORXSRV), 55023/tcp, 58462/tcp, 15176/tcp, 18551/tcp, 61392/tcp, 40185/tcp, 55774/tcp, 22119/tcp, 49629/tcp, 53016/tcp, 30478/tcp, 30071/tcp, 41240/tcp, 10576/tcp, 35710/tcp, 1186/tcp (MySQL Cluster Manager), 17634/tcp, 45433/tcp, 30823/tcp, 18946/tcp, 28452/tcp, 44441/tcp, 36886/tcp, 56927/tcp, 34149/tcp, 1046/tcp (WebFilter Remote Monitor), 28559/tcp, 16488/tcp, 3407/tcp (LDAP admin server port), 62454/tcp, 49004/tcp, 43394/tcp, 47393/tcp, 23969/tcp, 60050/tcp, 51092/tcp, 20369/tcp, 25895/tcp, 22091/tcp, 51299/tcp, 58290/tcp, 59885/tcp, 17605/tcp, 23522/tcp, 23605/tcp, 37568/tcp, 61166/tcp, 19780/tcp, 57725/tcp, 37812/tcp, 50524/tcp, 48809/tcp, 7903/tcp (TNOS Secure DiaguardProtocol), 44668/tcp, 32246/tcp, 16632/tcp, 19481/tcp, 30929/tcp, 26006/tcp, 65025/tcp, 18718/tcp, 163/tcp (CMIP/TCP Manager), 42642/tcp, 44190/tcp, 8198/tcp, 22482/tcp, 42725/tcp, 39542/tcp, 55503/tcp, 22963/tcp, 38330/tcp, 53913/tcp, 64518/tcp, 14617/tcp, 46201/tcp, 39038/tcp, 28643/tcp, 19337/tcp, 53495/tcp, 4777/tcp, 18514/tcp, 50579/tcp, 17943/tcp, 41602/tcp, 59156/tcp, 63886/tcp, 26118/tcp, 31470/tcp, 65298/tcp, 17575/tcp, 26290/tcp, 11709/tcp, 31211/tcp, 16618/tcp, 31303/tcp, 47542/tcp, 30921/tcp, 1354/tcp (Five Across XSIP Network), 8058/tcp (Senomix Timesheets Client [1 year assignment]), 57710/tcp, 42942/tcp, 37553/tcp, 56906/tcp, 64069/tcp, 50483/tcp, 777/tcp (Multiling HTTP), 46789/tcp, 38043/tcp, 48240/tcp, 62841/tcp, 47751/tcp, 47724/tcp, 31415/tcp, 40213/tcp, 52596/tcp, 488/tcp (gss-http), 49992/tcp, 34459/tcp, 44101/tcp, 41378/tcp, 16855/tcp, 11408/tcp, 41607/tcp, 3675/tcp (CallTrax Data Port), 60194/tcp, 49614/tcp, 65015/tcp, 19476/tcp, 32960/tcp, 44559/tcp, 30737/tcp, 45540/tcp, 60341/tcp, 53391/tcp, 41060/tcp, 18831/tcp, 26397/tcp, 5251/tcp (CA eTrust VM Service), 59606/tcp, 15344/tcp, 55283/tcp, 1717/tcp (fj-hdnet), 26342/tcp, 49531/tcp, 42854/tcp, 41862/tcp, 51534/tcp, 59015/tcp, 17714/tcp, 38010/tcp, 53161/tcp, 3218/tcp (EMC SmartPackets), 23712/tcp, 45869/tcp, 11763/tcp, 14147/tcp, 33150/tcp, 3580/tcp (NATI-ServiceLocator), 15343/tcp, 28504/tcp, 6974/tcp, 4781/tcp, 49363/tcp, 7512/tcp, 18042/tcp, 41639/tcp, 57045/tcp, 15482/tcp, 30176/tcp, 21482/tcp, 58981/tcp, 42993/tcp, 50020/tcp, 40891/tcp, 7060/tcp, 39304/tcp, 64039/tcp, 57597/tcp, 55300/tcp, 39244/tcp, 6263/tcp, 56428/tcp, 50785/tcp, 43602/tcp, 47753/tcp, 43895/tcp, 17463/tcp, 32881/tcp, 50572/tcp, 26402/tcp, 11911/tcp, 59355/tcp, 20954/tcp, 20398/tcp, 2842/tcp (l3-hawk), 39528/tcp, 24047/tcp, 14526/tcp, 30669/tcp, 6836/tcp, 20118/tcp, 60618/tcp, 1800/tcp (ANSYS-License manager), 47037/tcp, 61900/tcp, 17072/tcp, 64995/tcp, 60009/tcp, 48615/tcp, 54834/tcp, 37069/tcp, 39526/tcp, 16994/tcp (Intel(R) AMT Redirection/TCP), 8453/tcp, 55395/tcp, 14591/tcp, 53662/tcp, 58200/tcp, 5975/tcp, 59950/tcp, 7170/tcp (Adaptive Name/Service Resolution), 37808/tcp, 3548/tcp (Interworld), 43362/tcp, 64684/tcp, 24159/tcp, 5900/tcp (Remote Framebuffer), 59977/tcp, 11424/tcp, 48307/tcp, 11512/tcp, 61869/tcp, 38536/tcp, 21455/tcp, 64916/tcp, 30764/tcp, 26146/tcp, 41638/tcp, 47727/tcp, 50818/tcp, 16688/tcp, 59474/tcp, 30539/tcp, 19844/tcp, 54695/tcp, 40548/tcp, 17827/tcp, 20077/tcp, 37926/tcp, 23825/tcp, 32513/tcp, 37259/tcp, 3087/tcp (Asoki SMA), 30930/tcp, 25342/tcp, 37606/tcp, 32710/tcp, 6377/tcp, 20958/tcp, 15684/tcp, 2135/tcp (Grid Resource Information Server), 37857/tcp, 48133/tcp, 57232/tcp, 33455/tcp, 45981/tcp, 16409/tcp, 55743/tcp, 55631/tcp, 53299/tcp, 30742/tcp, 32665/tcp, 31833/tcp, 42962/tcp, 16406/tcp, 3027/tcp (LiebDevMgmt_C), 58822/tcp, 49562/tcp, 52970/tcp, 6723/tcp, 51155/tcp, 59494/tcp, 65018/tcp, 55567/tcp, 42745/tcp, 38173/tcp, 37557/tcp, 53411/tcp, 52764/tcp, 64381/tcp, 34849/tcp, 44302/tcp, 64169/tcp, 11157/tcp, 11256/tcp, 33001/tcp, 40240/tcp, 59884/tcp, 1079/tcp (ASPROVATalk), 48641/tcp, 43970/tcp, 37966/tcp, 36017/tcp, 15093/tcp, 2270/tcp (starSchool), 38176/tcp, 5031/tcp, 37661/tcp, 2443/tcp (PowerClient Central Storage Facility), 40376/tcp, 42558/tcp, 60453/tcp, 53159/tcp, 60842/tcp, 22371/tcp, 63224/tcp, 52401/tcp, 48271/tcp, 3805/tcp (ThorGuard Server Port), 34966/tcp, 15315/tcp, 55690/tcp, 60021/tcp, 28676/tcp, 51042/tcp, 55952/tcp, 57487/tcp, 59821/tcp, 43570/tcp, 30738/tcp, 40415/tcp, 22826/tcp.
      

Blacklist

Near real-time, easy to use data feed containing IPs reported on our website.

Bronze

$3

Updated daily

Learn More

Silver

$15

Updated every hour

Learn More

Gold

$30

Updated every 10 minutes

Learn More

Remarks

Black hat directory contains this IP address, because Internet users reported it as an address making unsolicited, nagging requests. We make every effort to ensure that the information contained in the Black hat directory are correct and up to date. The database is developed and updated by Internet users and moderators.

If you have any reliable information regarding malicious activity originating from this IP address, please share it with others and fill in the 'Report breach' form. It is prohibited from adding personally identifiable information.

Below breach categories are used in the database:

  • Denial of service attack - this attack is accomplished by flooding the target with massive amount of requests in order to overload the targeted system
  • Brute force attack - this category encompasses attempts to login to machine by trying many passwords and usernames
  • Backdoor attack - this category represents bypassing authentication by hidden programs or services to obtain remote access to a computer or trojan activity
  • Port scan - represents attackers identifying running services on the targeted machine by probing a server for open ports
  • Malicious bot - this category encompasses all bots performing unsolicited requests or ignoring robots.txt file
  • Anonymous proxy - public proxies like Tor, I2P relays or anonymous VPNs are often used by attacker to hide his identity
  • Web attack - attempts to exploit web application security flaws
  • CMS attack - attempts to exploit CMS vulnerability
  • App vulnerability attack - attempts to exploit other applications vulnerability
  • Web spam - encompasses all kind of HTTP spamming
  • Email spam - encompasses all kind of E-mail spamming
  • Dodgy activity - this category encompasses superfluous, dodgy requests

Similar hosts

Hosts with the same ASN

Emerging threats

The most commonly reported IP addresses in the last 24 hours

Report breach!

Rate host 94.102.51.95