See: http://85.134.91.95/hall-of-shame/59.144.55.50/host
and http://85.134.91.95/hall-of-shame/59.144.55.50/nmap
Listed here: http://configuration.logfish.net/index.php/etc/hosts.deny
nServer:\x20Mbedthis-Appweb attack → https://books.google.nl/books?id=T6jzJkqNonkC&pg=PA202&lpg=PA202&dq=nServer:\x20Mbedthis-Appweb&source=bl&ots=oOd6_s27Zo&sig=7Ge_b7zvM_1vkKSDbKDc-LJb9Js&hl=nl&sa=X&ei=21KYVcejCu6p7AbYub7oAg&ved=0CCQQ6AEwAA#v=onepage&q=nServer%3A\x20Mbedthis-Appweb&f=false USB Switchblade sniff USB attack
Reported: http://www.abuseipdb.com/check/59.144.55.50 & http://www.abuseipdb.com/whois/59.144.55.50
& https://www.blocklist.de/en/view.html?ip=59.144.55.50 E-mail Spam → http://www.projecthoneypot.org/ip_59.144.54.171
2015/01/19-00:19:44 59.144.55.50 attacked MULTIPLE IPs : 22 7 times brute force password attack on users cisco
invalid_user ubnt unknown background info: http://goughlui.com/2015/04/27/experiment-ssh-honeypot-week-2/
59.144.55.50
Overall Reputation: Delisting: Clear IP history now!
ISP Location
Overall ReputationAuthority Data:
Reputation Score: 100/100
Reverse DNS: aes-static-050.55.144.59.airtel.in.
ISP Location: Bangalore, Karnataka, India
ISP: Itc
ReputationAuthority Data [Email]:
Clean: 5.41%
Viruses: 0%
Spam: 89.19%
Malformed Messages: 0%
Suspicious: 5.4%
Good Recipients: 100%
Bad Recipients: 0%
polonus