Search: Results to retur 185.220.101.9 185.220.101.141 104.175.34.65 109.70.100.41 216.151.180.88 216.151.180.63 209.95.51.11 31.220.40.236 31.220.40.163 51.158.111.157 31.220.2.132 45.66.35.35 179.43.160.236 216.151.180.28 23.160.208.249 95.211.230.211 216.151.180.124 109.70.100.55 51.75.64.187 176.10.99.200 45.154.255.73 50.47.138.198 45.154.255.74 109.70.100.40 162.247.74.74 209.141.53.10 23.129.64.217 <>/ExtGState<>/XObject<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 15 0 R 16 0 R 24 0 R 37 0 R 38 0 R 39 0 R 40 0 R 41 0 R 42 0 R 43 0 R] /MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<>/Tabs/S/StructParents 0>> 216.151.180.93 51.91.102.49 We use specific rules in our honeypots to avoid false positive detections of legitimate IP addresses. 195.176.3.23 24.186.174.223 Tag: IP reputation lists. 104.244.72.115 62.210.37.82 45.129.56.200 51.83.131.234 185.220.100.248 77.247.181.163 The list is updated twice monthly. 51.83.187.201 31.220.40.241 185.121.69.16 185.220.101.205 185.220.101.134 216.151.180.219 216.151.180.64 5.199.130.188 51.195.148.18 199.188.237.243 51.91.8.125 198.54.128.78 109.70.100.38 <> 198.251.89.80 142.44.246.156 199.195.250.77 45.154.35.216 216.151.180.141 216.151.180.52 45.79.157.103 46.19.141.86 216.151.180.123 185.107.47.215 185.220.101.201 109.201.133.100 91.192.103.9 31.220.40.239 185.220.101.137 185.220.101.135 87.118.116.103 193.239.232.102 73.62.240.227 %���� 45.154.255.68 35.0.127.52 This service can be useful for threat intelligence and to help in the detection of malicious IP addresses. 185.220.101.1 51.195.150.139 185.38.175.71 31.220.0.202 216.151.180.135 185.220.101.138 216.151.180.238 Note from July 3, 2017: The solution in this post has been integrated into AWS WAF Security Automations, and AWS maintains up-to-date solution code in the companion GitHub repository. 205.185.117.149 185.220.100.251 185.220.102.248 66.146.193.33 216.151.180.159 185.12.45.115 A: IPs such as dynamic IPs may be listed because they generally should not be sending email directly to email servers. x��\Yo�J�~7��Џ����;yo �7��A�L&��`pfh-6Y�Ht|��oUus�E����¥�U]]]��E����|�M 192.42.116.16 51.195.166.160 209.141.38.163 51.178.83.144 185.220.102.253 31.220.2.222 104.244.76.245 51.79.86.180 It returns an IP Risk Score for any IP address, with a score from 0.01 to 99 indicating the likelihood that the user's IP address is high risk. 31.220.0.249 89.34.27.37 74.50.194.177 109.70.100.33 216.151.180.39 185.220.101.136 192.42.116.23 31.220.40.238 31.220.1.170 46.165.245.154 <>/Metadata 268 0 R/ViewerPreferences 269 0 R>> 67.205.238.70 185.100.87.243 68.197.64.252 185.220.101.19 185.220.102.249 185.220.101.2 In my case I am using two free IP lists to deny any connection from … 51.83.139.56 167.88.7.134 185.129.62.62 50.46.131.189 85.248.227.165 212.47.229.4 109.70.100.57 89.144.12.17 51.83.129.84 185.220.101.130 216.151.180.154 185.220.101.207 185.220.101.194 198.251.89.29 185.220.101.219 68.57.189.80 %PDF-1.7 If an IP address is on this list, it's possible that activity from that IP is fraudulent. If you do not know what you are doing here, it is recommended you leave right away. 185.220.101.199 185.220.101.202 Deploy threat data feed to a variety of third party platforms. 192.42.116.20 185.220.102.243 91.219.238.207 109.70.100.45 104.244.73.43 endobj 192.42.116.14 179.43.160.234 216.151.180.231 18.27.197.252 128.31.0.13 51.91.110.170 31.7.61.186 216.151.180.33 104.244.72.99 185.220.101.18 51.15.235.211 185.100.87.206 91.192.103.16 51.81.82.235 185.220.101.149 This page provides a list of some of the most used IP addresses in the minFraud network that have been identified as higher risk. 109.70.100.31 185.220.101.142 217.182.192.217. 185.220.101.200 Maximize Flexibility. 195.176.3.20 31.220.40.237 109.70.100.34 51.79.53.146 173.230.6.34 51.75.52.118 185.220.102.246 216.151.180.76 185.220.101.198 162.247.74.200 endobj 216.151.180.87 162.247.74.202 185.220.100.240 64.113.32.29 216.151.180.183 185.220.100.250 185.34.33.2 104.244.78.231 46.19.141.84 195.206.105.217 45.151.167.10 46.19.141.83 104.244.73.193 199.195.251.84 45.154.255.67 31.220.40.240 217.182.78.180 104.172.120.92 130.225.244.90 185.220.101.204 185.220.101.6 45.154.35.235 185.220.101.131 164.52.202.3 209.6.145.134 23.123.142.92 205.185.124.200 spam comments, postfix/imap scans, telnet scans and SSH brute force attacks, identified by our honeypots and spam traps. 46.38.235.14 192.42.116.15 Known malicious IP addresses:This list includes malicious IP addresses that are currently used almost exclusively by malicious actors for malware distribution, command-and-control, or for launching various attacks. 217.170.205.14 77.247.181.165 198.98.55.233 185.220.101.196 73.170.252.51 185.220.101.14 216.151.180.118 23.129.64.200 45.154.35.221 185.67.82.114 Block traffic to known malicious domain names and IP addresses with countermeasures. 192.42.116.27 178.17.170.88 Dynamic Malicious IP and Domain Lists . 51.210.241.102 85.248.227.163 Homepage | Forums | Recent Updates | RSS update feed | Contact us. 162.247.74.201 62.102.148.69 185.220.100.241 185.121.69.41 31.220.2.108 109.70.100.39 216.151.180.51 91.192.103.34 46.182.21.248 For a more precise assessment of the risk associated with an IP address, use the minFraud Score service. 54.38.22.61 151.80.237.96 Here is a list of websites and services that are providing up-to- date blocklist of domains with suspicious activities. 23.106.34.44 216.151.180.58 185.100.86.182 185.220.101.206 198.251.89.99 51.68.143.212 185.220.101.216 185.220.102.244 31.220.1.169 185.220.102.6 185.220.101.195 31.220.1.233 216.151.180.16 45.154.35.213 185.220.101.17 If an IP address is on this list, it's possible that activity from that IP is fraudulent.