Go
0.0.0.0
is an
Open Proxy
used by
Hackers
100 %
Report Abuse
70attacks reported
36Port Scan
7Web App Attack
4Fraud OrdersDDoS AttackFTP Brute-ForcePing of DeathPhishingFraud VoIPOpen ProxyWeb SpamEmail SpamBlog SpamVPN IPPort ScanHackingSQL InjectionSpoofingBrute-ForceBad Web BotExploited HostWeb App AttackSSHIoT Targeted
3Hacking
2Fraud Orders
2Brute-ForceSSH
2DDoS AttackPort Scan
1Port ScanBrute-Force
1FTP Brute-Force
1Fraud OrdersFraud VoIPOpen ProxyVPN IPHackingSpoofing
...
6abuse reported
4Email Spam
1Bad Web Bot
1Email SpamVPN IPWeb App Attack
1anonymizers reported
1VPN IPHacking
1malware reported
1Exploited Host
1unroutable reported
1uncategorized
from 16 distinct reporters
and 2 distinct sources : VoIPBL.org, AbuseIPDB
0.0.0.0 was first signaled at 2018-02-25 09:00 and last record was at 2019-07-08 11:54.

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-07-02 23:41 attacks Port Scan AbuseIPDB Jul 3 10:40:50 mail kernel: \[1188793.190848\] \[UFW BLOCK\] IN=eth0 OUT= MAC=01:00:5e:00:00:01:70:54:d2:c5:5c:5a:08:00 SRC=0.0.0.0 DST=224.0.0.1 LEN=
2019-06-27 15:01 abuse Email Spam AbuseIPDB Spamassassin_0.0.0.0
2019-06-22 16:13 attacks Hacking AbuseIPDB Macmilllan in Norway -and GSTATIC IS PART OF IRA ALBA IE BBC AND CHANNEL 4
2019-06-10 10:36 anonymizers VPN IPHacking AbuseIPDB Jt
2019-06-03 01:32 abuse Email Spam AbuseIPDB  
2019-05-19 22:32 attacks Web App Attack AbuseIPDB diesunddas.net 2001:608:e00:72::233:0 \[20/May/2019:09:32:54 +0200\] "POST /wp-login.php HTTP/1.1" 200 5842 "-" "Mozilla/5.0
2019-05-15 13:47 attacks Web App Attack AbuseIPDB belitungshipwreck.org 2001:608:e00:72::233:0 \[16/May/2019:00:47:01 +0200\] "POST /wp-login.php HTTP/1.1" 200 5594 "-" "Mozil
2019-05-08 03:56 abuse Email Spam AbuseIPDB SMTP Hacking or SPAM Error=550
2019-05-07 17:19 attacks Web App Attack AbuseIPDB villaromeo.de 2001:8d8:847:45f4:8997:1716:4288:0 \[08/May/2019:04:19:40 +0200\] "POST /wp-login.php HTTP/1.1" 200 2057 "-" "M
2019-05-07 01:25 attacks Port Scan AbuseIPDB " "
2019-05-06 09:08 attacks Port Scan AbuseIPDB " "
2019-05-04 16:27 abuse Email Spam AbuseIPDB SMTP Hacking or SPAM Error=550
2019-04-26 23:42 attacks Web App Attack AbuseIPDB ft-1848-basketball.de 2403:cb00:cb02:101:100:204:11:0 \[27/Apr/2019:10:42:35 +0200\] "POST /wp-login.php HTTP/1.1" 200 2180 "-" &q
2019-04-13 05:51 attacks Fraud Orders AbuseIPDB Test
2019-04-07 20:25 attacks Brute-ForceSSH AbuseIPDB Fail2Ban Ban Triggered
2019-04-06 00:40 attacks Port ScanBrute-Force AbuseIPDB Trying to bruteforce random port using multiple packets
2019-04-02 20:45 attacks Web App Attack AbuseIPDB abasicmove.de 2001:8d8:978:8500:6f7:90e0:bf10:0 \[03/Apr/2019:07:44:59 +0200\] "POST /wp-login.php HTTP/1.1" 200 5766 "-" "Mo
2019-03-28 19:40 attacks Web App Attack AbuseIPDB michaelklotzbier.de 2001:8d8:888:8304:7196:cc67:61b0:0 \[29/Mar/2019:05:40:51 +0100\] "POST /wp-login.php HTTP/1.1" 200 5847 "-" &
2019-03-03 13:23 attacks FTP Brute-Force AbuseIPDB Test
2019-02-15 13:05 attacks Fraud OrdersFraud VoIPOpen ProxyVPN IP AbuseIPDB  
2019-02-13 21:58 abuse Bad Web Bot AbuseIPDB  
2019-02-12 08:20 attacks Fraud OrdersDDoS AttackFTP Brute-ForcePing of Death AbuseIPDB  
2019-01-26 18:25 attacks Fraud Orders AbuseIPDB  
2019-01-16 13:54 attacks AbuseIPDB  
2019-01-13 03:53 attacks Port Scan AbuseIPDB Jan 13 13:41:41 mail kernel: [3767896.599111] [UFW BLOCK] IN=eth0 OUT= MAC=01:00:5e:00:00:01:00:05:33:26:ef:e6:08:00 SRC=0.0.0.0 DST=224.0.0.1 LEN=32
2018-12-24 02:23 attacks Port Scan AbuseIPDB Dec 24 12:10:28 mail kernel: [2034436.223404] [UFW BLOCK] IN=eth0 OUT= MAC=01:00:5e:00:00:01:00:05:33:26:ef:e6:08:00 SRC=0.0.0.0 DST=224.0.0.1 LEN=32
2018-12-22 02:12 attacks Port Scan AbuseIPDB Dec 22 11:59:04 mail kernel: [1860953.418741] [UFW BLOCK] IN=eth0 OUT= MAC=01:00:5e:00:00:01:00:05:33:26:ef:e6:08:00 SRC=0.0.0.0 DST=224.0.0.1 LEN=32
2018-12-07 13:47 attacks DDoS AttackPort Scan AbuseIPDB DDoS Attack or Port Scan
2018-12-06 13:47 attacks DDoS AttackPort Scan AbuseIPDB DDoS Attack or Port Scan
2018-12-03 20:03 attacks Fraud VoIPHackingSpoofing AbuseIPDB  
2018-11-08 14:39 attacks Port Scan AbuseIPDB Hit our honeypot for 649 times at 67/UDP -- Resubmit, still active.
2018-11-08 02:29 attacks Port Scan AbuseIPDB Hit our honeypot for 631 times at 67/UDP -- Resubmit, still active.
2018-11-07 14:19 attacks Port Scan AbuseIPDB Hit our honeypot for 617 times at 67/UDP -- Resubmit, still active.
2018-11-07 02:09 attacks Port Scan AbuseIPDB Hit our honeypot for 599 times at 67/UDP -- Resubmit, still active.
2018-11-06 13:59 attacks Port Scan AbuseIPDB Hit our honeypot for 590 times at 67/UDP -- Resubmit, still active.
2018-11-06 01:49 attacks Port Scan AbuseIPDB Hit our honeypot for 550 times at 67/UDP -- Resubmit, still active.
2018-11-05 13:40 attacks Port Scan AbuseIPDB Hit our honeypot for 528 times at 67/UDP -- Resubmit, still active.
2018-11-05 01:30 attacks Port Scan AbuseIPDB Hit our honeypot for 508 times at 67/UDP -- Resubmit, still active.
2018-11-04 07:40 attacks Port Scan AbuseIPDB Hit our honeypot for 505 times at 67/UDP -- Resubmit, still active.
2018-11-03 20:29 attacks Port Scan AbuseIPDB Hit our honeypot for 493 times at 67/UDP -- Resubmit, still active.
2018-11-03 08:20 attacks Port Scan AbuseIPDB Hit our honeypot for 415 times at 67/UDP -- Resubmit, still active.
2018-11-02 20:10 attacks Port Scan AbuseIPDB Hit our honeypot for 399 times at 67/UDP -- Resubmit, still active.
2018-11-02 08:00 attacks Port Scan AbuseIPDB Hit our honeypot for 367 times at 67/UDP -- Resubmit, still active.
2018-11-01 19:50 attacks Port Scan AbuseIPDB Hit our honeypot for 343 times at 67/UDP -- Resubmit, still active.
2018-11-01 07:40 attacks Port Scan AbuseIPDB Hit our honeypot for 313 times at 67/UDP -- Resubmit, still active.
2018-11-01 04:21 attacks DDoS AttackWeb App Attack AbuseIPDB  
2018-10-31 14:29 attacks Port Scan AbuseIPDB Hit our honeypot for 294 times at 67/UDP -- Resubmit, still active.
2018-10-31 02:19 attacks Port Scan AbuseIPDB Hit our honeypot for 278 times at 67/UDP -- Resubmit, still active.
2018-10-30 14:09 attacks Port Scan AbuseIPDB Hit our honeypot for 262 times at 67/UDP -- Resubmit, still active.
2018-10-30 01:59 attacks Port Scan AbuseIPDB Hit our honeypot for 254 times at 67/UDP -- Resubmit, still active.
2018-02-25 09:00 abuse Email SpamVPN IPWeb App Attack AbuseIPDB  
2018-04-18 10:12 attacks Brute-Force AbuseIPDB  
2018-04-29 10:56 malware Exploited Host AbuseIPDB  
2018-05-15 00:14 attacks Hacking AbuseIPDB ruwet
2018-05-30 22:57 attacks DDoS Attack AbuseIPDB  
2018-06-03 09:21 attacks Fraud OrdersDDoS AttackFTP Brute-ForcePing of Death AbuseIPDB Comment
2018-06-08 21:51 attacks HackingBrute-Force AbuseIPDB  
2018-06-17 04:12 attacks Fraud OrdersDDoS AttackFTP Brute-ForcePing of Death AbuseIPDB  
2018-06-25 17:51 attacks Fraud OrdersDDoS AttackFTP Brute-ForcePing of Death AbuseIPDB  
2018-07-09 21:54 attacks Web App Attack AbuseIPDB wordpress exploit scan
2019-07-08 11:54 attacks Fraud VoIP voipbl VoIPBL.org  
2019-03-29 18:22 unroutable cidr_report_bogons  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

inetnum: 0.0.0.0 - 255.255.255.255
netname: IANA-BLK
descr: The whole IPv4 address space
country: EU # Country is really world wide
org: ORG-IANA1-AFRINIC
admin-c: IANA1-AFRINIC
tech-c: IANA1-AFRINIC
status: ALLOCATED UNSPECIFIED
remarks: The country is really worldwide.
remarks: This address space is assigned at various other places in
remarks: the world and might therefore not be in the RIPE database.
remarks: data has been transferred from RIPE Whois Database 20050221
mnt-by: AFRINIC-HM-MNT
mnt-lower: AFRINIC-HM-MNT
source: AFRINIC # Filtered
parent: 0.0.0.0 - 255.255.255.255

organisation: ORG-IANA1-AFRINIC
org-name: Internet Assigned Numbers Authority
org-type: IANA
country: EU # Country is really worldwide
address: see http://www.iana.org
remarks: The IANA allocates IP addresses and AS number blocks to RIRs
remarks: see http://www.iana.org/ipaddress/ip-addresses.htm
remarks: and http://www.iana.org/assignments/as-numbers
admin-c: IANA1-AFRINIC
tech-c: IANA1-AFRINIC
mnt-ref: AFRINIC-HM-MNT
mnt-by: AFRINIC-HM-MNT
remarks: data has been transferred from RIPE Whois Database 20050221
source: AFRINIC # Filtered

role: Internet Assigned Numbers Authority
address: see http://www.iana.org.
admin-c: TEAM-AFRINIC
tech-c: TEAM-AFRINIC
nic-hdl: IANA1-AFRINIC
remarks: For more information on IANA services
remarks: go to IANA web site at http://www.iana.org.
remarks: data has been transferred from RIPE Whois Database 20050221
mnt-by: AFRINIC-DB-MNT
source: AFRINIC # Filtered
most specific ip range is highlighted
Updated : 2019-08-23