The GPF DNS Block List

The GPF DNS Block List

Look for an IP:

Filter list by reason:

Data Available for IP

Query this IP at: BlackListAlert.Org | Project Honey Pot | hpHosts Online | Stop Forum Spam | | IP-Lookup.Net

Date Added to Database:
Thu, 24 Sep 2015 15:29:06 -0400
Date Last Seen:
Thu, 24 Sep 2015 15:29:06 -0400
Date Record Expires:
Fri, 23 Sep 2016 21:29:06 -0400
Record Status:
Expired. The ban on this IP has been lifted and it should no longer appear in our generated block lists.
Reason for Ban:
Vulnerability Probe
Detailed Reason:
This IP has actively attempted to scan our scripts for vulnerabilities. While it did not actively attempt to inject code, it did make requests consistent with searching for scripts with known vulnerabilities.
Additional Comments:
Probe for non-existent FCKeditor installations, likely looking for vulnerabilities. References below are representatives; all IPs in this list exhibit similar attack behavior. - - [21/Sep/2015:10:35:46 +0000] "GET /FCKeditor/editor/filemanager/connectors/aspx/connector.aspx HTTP/1.1" 404 14830 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" - - [21/Sep/2015:00:55:37 +0000] "HEAD /admin/fckeditor/editor/ HTTP/1.1" 200 - "-" "-" - - [23/Sep/2015:08:46:46 +0000] "GET /FCKeditor/editor/filemanager/connectors/php/connector.php HTTP/1.1" 404 14806 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)"

No other IPs within the same Class C network were found.

Home | Bulk Query | FAQ | Worst Networks | Reason Key | Reason Rankings | Export

This site and its contents are © Copyright 2011-2020, Jeffrey T. Darlington. All rights reserved. It is provided as a service to the Internet community at large and is for informational purposes only. This site and its owner cannot be held responsible for any actions taken by others based on the data contained herein.