The GPF DNS Block List

The GPF DNS Block List

Look for an IP:

Filter list by reason:

Data Available for IP

Query this IP at: BlackListAlert.Org | Project Honey Pot | hpHosts Online | Stop Forum Spam | | IP-Lookup.Net

Date Added to Database:
Mon, 03 Feb 2014 09:29:03 -0500
Date Last Seen:
Mon, 03 Feb 2014 09:29:03 -0500
Date Record Expires:
Tue, 03 Feb 2015 15:29:03 -0500
Record Status:
Expired. The ban on this IP has been lifted and it should no longer appear in our generated block lists.
Reason for Ban:
Detailed Reason:
IPs flagged with this reason have made mysterious requests in the form of "GET /" or something similar. These always result in 404 (Not Found) errors since we do not have any such pages or scripts on our sites. The exact nature of these requests is still unclear, but most of the sources we've been able to find indicate that it is likely a DLink vulnerability scan looking for exploits. The inclusion of "ISC.SANS" has also been rumored to be a "reputation attack" against the Internet Storm Center at the SANS Technology Institute. Because of the nature of these requests, we assume the host making the request cannot be trusted and it is now our policy to block all IPs that make such requests.
Additional Comments: - - [02/Feb/2014:22:00:35 +0000] "GET / HTTP/1.1" 400 385 "-" "-" - - [02/Feb/2014:22:01:59 +0000] "GET / HTTP/1.1" 400 385 "-" "-" - - [03/Feb/2014:13:37:48 +0000] "GET / HTTP/1.1" 400 385 "-" "-"

No other IPs within the same Class C network were found.

Home | Bulk Query | FAQ | Worst Networks | Reason Key | Reason Rankings | Export

This site and its contents are © Copyright 2011-2020, Jeffrey T. Darlington. All rights reserved. It is provided as a service to the Internet community at large and is for informational purposes only. This site and its owner cannot be held responsible for any actions taken by others based on the data contained herein.