The GPF DNS Block List

The GPF DNS Block List

Look for an IP:

Filter list by reason:

Data Available for IP

Query this IP at: BlackListAlert.Org | Project Honey Pot | hpHosts Online | Stop Forum Spam | | IP-Lookup.Net

Date Added to Database:
Thu, 24 Sep 2015 15:41:09 -0400
Date Last Seen:
Thu, 24 Sep 2015 15:41:09 -0400
Date Record Expires:
Fri, 23 Sep 2016 21:41:09 -0400
Record Status:
Expired. The ban on this IP has been lifted and it should no longer appear in our generated block lists.
Reason for Ban:
Vulnerability Probe
Detailed Reason:
This IP has actively attempted to scan our scripts for vulnerabilities. While it did not actively attempt to inject code, it did make requests consistent with searching for scripts with known vulnerabilities.
Additional Comments:
Probe for Web-based database admin scripts. These are the only requests from this IP; no legitimate requests. Listed at, UCEPROTECT Level 1. User reports of similar behavior at Project Honey Pot. - - [21/Sep/2015:14:04:35 +0000] "GET /phpMyAdmin/scripts/setup.php HTTP/1.0" 404 14799 "-" "-" - - [22/Sep/2015:21:50:13 +0000] "GET /pma/scripts/setup.php HTTP/1.0" 404 14742 "-" "-" - - [24/Sep/2015:05:14:26 +0000] "GET /phpmyadmin2/scripts/setup.php HTTP/1.0" 404 14831 "-" "-"

No other IPs within the same Class C network were found.

Home | Bulk Query | FAQ | Worst Networks | Reason Key | Reason Rankings | Export

This site and its contents are © Copyright 2011-2020, Jeffrey T. Darlington. All rights reserved. It is provided as a service to the Internet community at large and is for informational purposes only. This site and its owner cannot be held responsible for any actions taken by others based on the data contained herein.