Go
12.218.209.130
is an
Open Proxy
used by
Abusers
100 %
United States
Report Abuse
38abuse reported
11Email Spam
8Bad Web BotWeb SpamBlog Spam
7Web SpamForum Spam
5Email SpamBrute-Force
3Bad Web Bot
3uncategorized
1Web SpamBad Web BotBlog SpamForum Spam
30attacks reported
6uncategorized
5Web App Attack
4Brute-ForceMailserver Attack
3HackingBrute-Force
3DDoS AttackWeb App Attack
2DDoS AttackPing of DeathPort ScanHackingBrute-ForceExploited HostWeb App Attack
2Hacking
1DDoS Attack
1Fraud OrdersSSH
1HackingWeb App Attack
...
21anonymizers reported
21Open Proxy
2spam reported
1uncategorized
1Email Spam
1malware reported
1Malware
1organizations reported
1uncategorized
from 32 distinct reporters
and 14 distinct sources : BotScout.com, FireHOL, ProxyLists.net, ProxyRSS.com, ProxZ.com, sblam.com, Free Proxy List, StopForumSpam.com, CleanTalk, GPF Comics, Blocklist.de, BadIPs.com, MaxMind.com, AbuseIPDB
12.218.209.130 was first signaled at 2018-11-10 19:41 and last record was at 2019-08-11 07:32.
IP

12.218.209.130

Organization
INSTITUTIONAL VENTURE PARTNERS
Localisation
United States
NetRange : First & Last IP
12.218.209.0 - 12.218.209.15
Network CIDR
12.218.209.0/28

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-08-06 01:28 abuse Email SpamBrute-Force AbuseIPDB proto=tcp . spt=49020 . dpt=25 . (listed on Github Combined on 3 lists ) (649)
2019-07-31 12:02 abuse Email Spam AbuseIPDB  
2019-07-27 23:14 abuse Email Spam AbuseIPDB  
2019-07-25 22:35 abuse Email SpamBrute-Force AbuseIPDB 2019-07-26 02:35:52 H=(lparchitects.it) [12.218.209.130]:42470 I=[192.147.25.65]:25 F=<[email protected]> rejected RCPT <[email pro
2019-07-16 13:02 abuse Email Spam AbuseIPDB  
2019-07-16 12:16 abuse Email SpamBrute-Force AbuseIPDB proto=tcp . spt=60962 . dpt=25 . (listed on Blocklist de Jul 16) (596)
2019-07-15 08:47 attacks DDoS Attack AbuseIPDB  
2019-07-03 14:16 abuse Email Spam AbuseIPDB  
2019-07-01 01:07 abuse Email Spam AbuseIPDB Jul 1 07:23:33 our-server-hostname postfix/smtpd[3801]: connect from unknown[12.218.209.130] Jul [email protected] Jul [email protected] Jul
2019-06-30 18:31 abuse Email Spam AbuseIPDB Jul 1 07:23:33 our-server-hostname postfix/smtpd[3801]: connect from unknown[12.218.209.130] Jul [email protected] Jul [email protected] Jul
2019-06-30 00:44 attacks DDoS AttackPing of DeathPort ScanHacking AbuseIPDB NAME : ENGINEER751-2-16 CIDR : 12.37.2.16/28 DDoS attack USA - Wisconsin - block certain countries :) IP: 12.218.209.130 Denial-of-Service Attack (DoS
2019-06-23 04:24 attacks Web App Attack AbuseIPDB Automatic report - Web App Attack
2019-06-23 04:24 attacks Web App Attack AbuseIPDB Automatic report - Web App Attack
2019-06-18 11:07 abuse Email Spam AbuseIPDB  
2019-06-17 20:11 abuse Email SpamBrute-Force AbuseIPDB TCP src-port=47939 dst-port=25 dnsbl-sorbs abuseat-org barracuda (Project Honey Pot rated Suspicious
2019-06-14 02:20 abuse Email Spam AbuseIPDB  
2019-06-11 20:50 abuse Email Spam AbuseIPDB Sending SPAM email
2019-06-10 06:22 abuse Email Spam AbuseIPDB SPF Fail sender not permitted to send mail for @luxexcess.it
2019-06-07 06:20 abuse Email SpamBrute-Force AbuseIPDB proto=tcp . spt=47745 . dpt=25 . (listed on Blocklist de Jun 06) (660)
2019-06-06 06:22 abuse Email Spam AbuseIPDB  
2019-05-06 17:25 attacks Web App Attack AbuseIPDB Automatic report generated by Wazuh
2019-04-25 11:29 attacks Hacking AbuseIPDB Blocked user enumeration attempt
2019-04-16 01:28 attacks DDoS AttackPing of DeathPort ScanHacking AbuseIPDB NAME : NEXTEV524-229-64 CIDR : 12.38.229.64/27 DDoS attack USA - California - block certain countries :) IP: 12.218.209.130 Denial-of-Service Attack (
2019-04-15 09:11 attacks Hacking AbuseIPDB  
2019-04-09 08:20 attacks Fraud OrdersSSH AbuseIPDB  
2019-04-06 20:26 attacks HackingWeb App Attack AbuseIPDB IP: 12.218.209.130 ASN: AS7018 AT
2019-04-02 04:18 attacks HackingBrute-Force AbuseIPDB Feb 19 09:10:56 mercury auth[13720]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot [email protected] rhost=12
2019-03-12 21:11 attacks Brute-Force AbuseIPDB Rude login attack (2 tries in 1d)
2019-03-05 08:18 attacks HackingBrute-Force AbuseIPDB Feb 19 09:10:56 mercury auth[13720]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot [email protected] rhost=12
2019-02-18 23:10 attacks HackingBrute-Force AbuseIPDB Feb 19 09:10:56 mercury auth[13720]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot [email protected] rhost=12
2019-01-24 23:38 attacks DDoS AttackWeb App Attack AbuseIPDB xmlrpc attack
2019-01-05 07:01 attacks DDoS AttackWeb App Attack AbuseIPDB xmlrpc attack
2019-01-02 05:49 attacks DDoS AttackWeb App Attack AbuseIPDB xmlrpc attack
2018-12-30 22:36 attacks Web App Attack AbuseIPDB POST //xmlrpc.php HTTP/1.1
2018-11-10 19:41 attacks Web App Attack AbuseIPDB GET //wp-login.php HTTP/1.1
2019-03-29 18:21 abuse Bad Web Bot botscout_30d BotScout.com  
2019-03-29 18:22 abuse Bad Web Bot botscout_7d BotScout.com  
2019-03-29 18:24 abuse firehol_abusers_1d FireHOL  
2019-03-29 18:24 abuse firehol_abusers_30d FireHOL  
2019-03-29 18:27 attacks firehol_level4 FireHOL  
2019-03-29 18:28 anonymizers Open Proxy firehol_proxies FireHOL  
2019-03-29 18:36 spam lashback_ubl  
2019-03-29 18:41 spam Email Spam nixspam  
2019-03-29 18:41 anonymizers Open Proxy proxylists ProxyLists.net  
2019-03-29 18:42 anonymizers Open Proxy proxylists_1d ProxyLists.net  
2019-03-29 18:42 anonymizers Open Proxy proxylists_30d ProxyLists.net  
2019-03-29 18:42 anonymizers Open Proxy proxylists_7d ProxyLists.net  
2019-03-29 18:42 anonymizers Open Proxy proxyrss_1d ProxyRSS.com  
2019-03-29 18:42 anonymizers Open Proxy proxyrss_30d ProxyRSS.com  
2019-03-29 18:42 anonymizers Open Proxy proxyrss_7d ProxyRSS.com  
2019-03-29 18:42 anonymizers Open Proxy proxz_30d ProxZ.com  
2019-03-29 18:42 anonymizers Open Proxy proxz_7d ProxZ.com  
2019-03-29 18:42 abuse Web SpamBad Web BotBlog SpamForum Spam sblam sblam.com  
2019-03-29 18:42 anonymizers Open Proxy socks_proxy_30d Free Proxy List  
2019-03-29 18:43 anonymizers Open Proxy sslproxies_30d Free Proxy List  
2019-03-29 18:43 anonymizers Open Proxy sslproxies_7d Free Proxy List  
2019-03-29 18:43 abuse Web SpamForum Spam stopforumspam StopForumSpam.com  
2019-03-29 18:45 abuse Web SpamForum Spam stopforumspam_180d StopForumSpam.com  
2019-03-29 18:47 abuse Web SpamForum Spam stopforumspam_1d StopForumSpam.com  
2019-03-29 18:47 abuse Web SpamForum Spam stopforumspam_30d StopForumSpam.com  
2019-03-29 18:48 abuse Web SpamForum Spam stopforumspam_365d StopForumSpam.com  
2019-03-29 18:51 abuse Web SpamForum Spam stopforumspam_7d StopForumSpam.com  
2019-03-29 18:51 abuse Web SpamForum Spam stopforumspam_90d StopForumSpam.com  
2019-05-28 23:21 abuse Bad Web BotWeb SpamBlog Spam cleantalk_30d CleanTalk  
2019-05-28 23:23 abuse Bad Web BotWeb SpamBlog Spam cleantalk_7d CleanTalk  
2019-05-28 23:26 abuse Bad Web BotWeb SpamBlog Spam cleantalk_updated_30d CleanTalk  
2019-05-28 23:26 abuse Bad Web BotWeb SpamBlog Spam cleantalk_updated_7d CleanTalk  
2019-05-28 23:34 abuse gpf_comics GPF Comics  
2019-05-28 23:40 anonymizers Open Proxy socks_proxy_1d Free Proxy List  
2019-05-28 23:40 anonymizers Open Proxy socks_proxy_7d Free Proxy List  
2019-05-28 23:40 anonymizers Open Proxy sslproxies_1d Free Proxy List  
2019-05-30 09:43 anonymizers Open Proxy proxyrss ProxyRSS.com  
2019-05-30 09:43 anonymizers Open Proxy proxz ProxZ.com  
2019-05-30 09:43 anonymizers Open Proxy proxz_1d ProxZ.com  
2019-05-30 09:44 anonymizers Open Proxy sslproxies Free Proxy List  
2019-06-03 22:45 abuse Bad Web BotWeb SpamBlog Spam cleantalk_1d CleanTalk  
2019-06-03 22:49 abuse Bad Web BotWeb SpamBlog Spam cleantalk_updated_1d CleanTalk  
2019-06-06 19:11 attacks blocklist_de Blocklist.de  
2019-06-06 19:11 attacks Brute-ForceMailserver Attack blocklist_de_mail Blocklist.de  
2019-06-06 19:17 attacks firehol_level2 FireHOL  
2019-06-09 17:19 attacks bi_any_0_1d BadIPs.com  
2019-06-09 17:20 attacks Brute-ForceMailserver Attack bi_mail_0_1d BadIPs.com  
2019-06-09 17:20 attacks Brute-ForceMailserver Attack bi_qmail-smtp_0_1d BadIPs.com  
2019-06-12 12:55 attacks Brute-ForceMailserver Attack bi_postfix_0_1d BadIPs.com  
2019-06-15 09:59 attacks Email Spam bi_spam_0_1d BadIPs.com  
2019-06-29 20:33 abuse Bad Web Bot botscout_1d BotScout.com  
2019-07-26 23:14 attacks firehol_level3 FireHOL  
2019-07-26 23:20 malware Malware firehol_webclient FireHOL  
2019-07-26 23:20 attacks firehol_webserver FireHOL  
2019-07-26 23:24 anonymizers Open Proxy maxmind_proxy_fraud MaxMind.com  
2019-08-11 07:32 abuse Bad Web BotWeb SpamBlog Spam cleantalk CleanTalk  
2019-08-11 07:32 abuse Bad Web BotWeb SpamBlog Spam cleantalk_updated CleanTalk  
2019-03-29 18:36 organizations iblocklist_isp_att  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

NetRange: 12.218.0.0 - 12.218.255.255
CIDR: 12.218.0.0/16
NetName: ATTWORLD40
NetHandle: NET-12-218-0-0-1
Parent: ATT (NET-12-0-0-0-1)
NetType: Reallocated
OriginAS: AS7018
Organization: AT&T Services, Inc. (ATTW)
RegDate: 2011-02-02
Updated: 2011-02-02
Comment: This block is static, not dynamic.
Ref: https://rdap.arin.net/registry/ip/12.218.0.0

OrgName: AT&T Services, Inc.
OrgId: ATTW
Address: 200 S. Laurel AVE.
City: MIDDLETOWN
StateProv: NJ
PostalCode: 07748
Country: US
RegDate:
Updated: 2017-01-28
Comment: Contact AT&T Abuse ( abuse@att.net ) for policy abuse issues.
Comment: All policy abuse issues sent to other POCs will be disregarded.
Ref: https://rdap.arin.net/registry/entity/ATTW

OrgTechHandle: IPSWI-ARIN
OrgTechName: IP SWIP
OrgTechPhone: +1-888-613-6330
OrgTechEmail: help@ip.att.net
OrgTechRef: https://rdap.arin.net/registry/entity/IPSWI-ARIN

OrgTechHandle: ICC-ARIN
OrgTechName: IP Team
OrgTechPhone: +1-888-613-6330
OrgTechEmail: rs5219@intl.att.com
OrgTechRef: https://rdap.arin.net/registry/entity/ICC-ARIN

OrgAbuseHandle: ATTAB-ARIN
OrgAbuseName: ATT Abuse
OrgAbusePhone: +1-919-319-8130
OrgAbuseEmail: abuse@att.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ATTAB-ARIN

OrgTechHandle: JB3310-ARIN
OrgTechName: Borkenhagen, Jay C.
OrgTechPhone: +1-732-420-2526
OrgTechEmail: jb3310-arin@oz.mt.att.com
OrgTechRef: https://rdap.arin.net/registry/entity/JB3310-ARIN


NetRange: 12.218.209.0 - 12.218.209.15
CIDR: 12.218.209.0/28
NetName: INSTITUT71-209-0
NetHandle: NET-12-218-209-0-1
Parent: ATTWORLD40 (NET-12-218-0-0-1)
NetType: Reassigned
OriginAS:
Organization: INSTITUTIONAL VENTURE PARTNERS (INSTI-16)
RegDate: 2014-01-14
Updated: 2014-01-14
Ref: https://rdap.arin.net/registry/ip/ 12.218.209.0

OrgName: INSTITUTIONAL VENTURE PARTNERS
OrgId: INSTI-16
Address: 3000 SAND HILL RD
City: MNLO PK
StateProv: CA
PostalCode: 94025
Country: US
RegDate: 2008-11-18
Updated: 2011-09-24
Ref: https://rdap.arin.net/registry/entity/INSTI-16

OrgAbuseHandle: LSH42-ARIN
OrgAbuseName: Shoberg, Luke
OrgAbusePhone: +1-650-854-0132
OrgAbuseEmail: att@ivp.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/LSH42-ARIN

OrgTechHandle: LSH42-ARIN
OrgTechName: Shoberg, Luke
OrgTechPhone: +1-650-854-0132
OrgTechEmail: att@ivp.com
OrgTechRef: https://rdap.arin.net/registry/entity/LSH42-ARIN


NetRange: 12.0.0.0 - 12.255.255.255
CIDR: 12.0.0.0/8
NetName: ATT
NetHandle: NET-12-0-0-0-1
Parent: NET12 (NET-12-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: AT&T Services, Inc. (ATTW-Z)
RegDate: 1983-08-22
Updated: 2013-12-19
Comment: For abuse issues contact abuse@att.net
Ref: https://rdap.arin.net/registry/ip/12.0.0.0

OrgName: AT&T Services, Inc.
OrgId: ATTW-Z
Address: 200 S. Laurel AVE.
City: MIDDLETOWN
StateProv: NJ
PostalCode: 07748
Country: US
RegDate: 2009-12-18
Updated: 2018-09-24
Comment: Contact AT&T Abuse ( abuse@att.net ) for policy abuse issues.
Comment: All policy abuse issues sent to other POCs will be disregarded.
Ref: https://rdap.arin.net/registry/entity/ATTW-Z

OrgTechHandle: HKO3-ARIN
OrgTechName: KOSAL, HALUK
OrgTechPhone: +1-732-420-4259
OrgTechEmail: hk2514@att.com
OrgTechRef: https://rdap.arin.net/registry/entity/HKO3-ARIN

OrgTechHandle: IPSWI-ARIN
OrgTechName: IP SWIP
OrgTechPhone: +1-888-613-6330
OrgTechEmail: help@ip.att.net
OrgTechRef: https://rdap.arin.net/registry/entity/IPSWI-ARIN

OrgAbuseHandle: ATTAB-ARIN
OrgAbuseName: ATT Abuse
OrgAbusePhone: +1-919-319-8130
OrgAbuseEmail: abuse@att.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ATTAB-ARIN

OrgTechHandle: ICC-ARIN
OrgTechName: IP Team
OrgTechPhone: +1-888-613-6330
OrgTechEmail: rs5219@intl.att.com
OrgTechRef: https://rdap.arin.net/registry/entity/ICC-ARIN

OrgTechHandle: JB3310-ARIN
OrgTechName: Borkenhagen, Jay C.
OrgTechPhone: +1-732-420-2526
OrgTechEmail: jb3310-arin@oz.mt.att.com
OrgTechRef: https://rdap.arin.net/registry/entity/JB3310-ARIN

RTechHandle: IAA17-ARIN
RTechName: IP Address Administration
RTechPhone: +1-732-420-2071
RTechEmail: addrmgt@qsun.att.com
RTechRef: https://rdap.arin.net/registry/entity/IAA17-ARIN
most specific ip range is highlighted
Updated : 2019-01-29