IP Address Inspector
81.169.144.135 
The Project Honey Pot system has detected behavior from the IP address consistent with that of a spam harvester, comment spammer and rule breaker. Below we've reported some other data associated with this IP. This interrelated data helps map spammers' networks and aids in law enforcement efforts. If you know something about this IP, please leave a comment.
Lookup IP In: Domain Tools | SpamHaus | Spamcop | SenderBase | Google Groups | Google
Geographic Location |
![]() |
Harvester First Seen | approximately 11 years, 2 months, 5 weeks ago |
Harvester Last Seen | within 1 week |
Harvester Sightings | 1,750 visit(s) |
Harvester Results |
2.534 messages per visit 4,434 message(s) resulting from harvests - First: approximately 10 years, 10 months, 3 weeks ago - Last: approximately 2 years, 9 months, 4 weeks ago 1 email address(es) harvested - First: approximately 10 years, 10 months, 4 weeks ago - Last: Fri, 02 Nov 2012 13:49:28 -0400 |
First Post On | approximately 8 years, 5 months, 1 week ago |
Last Post On | within 7 years, 11 months, 1 week |
Form Posts | 3 web post submission(s) sent from this IP |
First Rule-Break On | approximately 9 years, 11 months, 2 weeks ago |
Last Rule-Break On | within 9 years, 8 months, 2 weeks |
Rule Breaks | 2 web page navigation rule(s) broken by this IP |
11 comment(s) - Comment on this IP | Collapse All
|
W.Backslash AG commented...
still active
October 21 2019 09:21 AM |
Bot Busters commented...
WhoIS You Gonna Block: 81.169.144.135 (fo-p00-ob.rzone.de)
Evil Banished: (Malicious Activities) AS6724 81.169.128.0/17 Strato AG strato.de Banished Another Evil strato.de Bot/Hacker Attacks Various WordPress CMS, XML, PHP Exploits - Malicious URL Probing, Disobeys robots.txt, Changes ID/IP! WordPress Botnet! /wp-admin/ /old/wp-admin/ /xmlrpc.php?rsd wlwmanifest.xml strato.de Blacklisted! cbl.abuseat.org FAIL dnsbl.sorbs.net FAIL spam.dnsbl.sorbs.net FAIL web.dnsbl.sorbs.net FAIL xbl.spamhaus.org FAIL zen.spamhaus.org FAIL Malicious Bot - No User Agent (Always Up To No Good!) Malicious Bot - Mozilla/5.0 (X11; U; Linux i686; pt-BR; rv:1.9.0.15) Gecko/2009102815 Ubuntu/9.04 (jaunty) Firefox/3.0.15 Malicious Bot - Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1 Bot Bustin' Evil Makes You Feel Good! November 24 2018 02:50 PM |
P.Cruse commented...
Looking for WP exploits.
January 20 2018 01:42 PM |
W.Backslash AG commented...
SQL Injection
February 11 2016 07:12 AM |
J.Humphrey31 commented...
Still scanning fopr exploits:
Berlin, Germany IP: 81.169.144.135 Reason: Accessed a banned URL. Hostname: fo-p00-ob.rzone.de January 06 2016 07:28 AM |
I.Stigsson commented...
SQL injection attakcs
December 26 2015 04:18 PM |
M.Hatzis commented...
Admin Attack on a non wp site (bellow the log extract)
81.169.144.135 - - [26/Apr/2015:03:00:40 +0300] "GET /wp-admin/ HTTP/1.1" 301 536 "-" "-" April 27 2015 06:20 AM |
H.User7152 commented...
200x Russian and Ukranian referrer spam.
March 27 2015 01:00 PM |
J.Zunich commented...
[Mon Jun 30 08:32:08 2014] [error] [client 81.169.144.135] File does not exist: /home/xxxx/public_html/wordpress
Found snooping for wordpress install. June 30 2014 11:21 AM |
K.Kirby commented...
Scanning for wordpress site:
"81.169.144.135" - - [04/Feb/2014:03:21:08 -0500] "GET /wp/wp-admin/ HTTP/1.1" 404 294 "-" "-" February 04 2014 11:20 AM |
R.Clauss commented...
The Server is run by STRATO AG (a division of German Telekom AG) in Berlin. This server was observed, trying to login to Joomla! Backends by using a dictionary attack.
July 31 2013 02:33 AM |
Page generated on: October 01 2023 05:16:29 PM
Privacy Policy | Terms of Use | About Project Honey Pot | FAQ | Cloudflare Site Protection | Contact Us
Copyright © 2004–23, Unspam Technologies, Inc. All rights reserved.
Advertisements displayed on this page are not necessarily endorsed by Project Honey Pot