The GPF DNS Block List

The GPF DNS Block List

Look for an IP:

Filter list by reason:

Data Available for IP 115.28.38.69:

Query this IP at: BlackListAlert.Org | Project Honey Pot | hpHosts Online | Stop Forum Spam | BotScout.com | IP-Lookup.Net

Date Added to Database:
Fri, 29 Aug 2014 10:16:59 -0400
Date Last Seen:
Fri, 29 Aug 2014 10:16:59 -0400
Date Record Expires:
Sat, 29 Aug 2015 16:16:59 -0400
Record Status:
Expired. The ban on this IP has been lifted and it should no longer appear in our generated block lists.
Reason for Ban:
Proxy Attempt
Detailed Reason:
IPs in this category have attempted to use one of our servers as an HTTP or HTTPS proxy to access a third, unrelated server. While we recognize that there are legitimate uses for such tools, we do not use proxying internally so this service is turned off in all of our servers. Thus all attempts to use us as a proxy must come outsiders. In our experience, this is usually a means to redirect an attack on the third-party server and hide the original attacker's true location, making it appear that the attack originated from us. IPs that attempt to make proxy requests through our servers are banned.
Additional Comments:
Possible probe for open proxies. Possible code injection attempt. These are the only requests from this IP; no legitimate requests. Chinese IP listed at CBL.AbuseAt.org, UCEPROTECT Level 1, APEWS.org ("Spambot / Botted or Rooted PC or Server / Spammer / Scanner in CIDR").

115.28.38.69 - - [29/Aug/2014:07:06:42 +0000] "GET http://hotel.qunar.com/render/hoteldiv.jsp?&__jscallback=XQScript_4 HTTP/1.1" 301 436 "http://hotel.qunar.com/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.114 Safari/537.36"
115.28.38.69 - - [29/Aug/2014:07:06:43 +0000] "GET http://www.hotel.qunar.com/render/hoteldiv.jsp?&__jscallback=XQScript_4 HTTP/1.1" 404 4617 "http://hotel.qunar.com/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.114 Safari/537.36"

No other IPs within the same Class C network were found.

Home | Bulk Query | FAQ | Worst Networks | Reason Key | Reason Rankings | Export

This site and its contents are © Copyright 2011-2019, Jeffrey T. Darlington. All rights reserved. It is provided as a service to the Internet community at large and is for informational purposes only. This site and its owner cannot be held responsible for any actions taken by others based on the data contained herein.