is an
Open Proxy
used by
100 %
Report Abuse
15attacks reported
2Brute-ForceMailserver Attack
1HackingPort Scan
1Port ScanHackingSpoofingBrute-ForceBad Web BotExploited HostWeb App Attack
1PhishingHackingExploited Host
1Fraud OrdersDDoS AttackFTP Brute-ForcePing of DeathPhishingFraud VoIPOpen ProxyWeb SpamEmail SpamBlog SpamVPN IPPort ScanHackingSQL InjectionSpoofingBrute-ForceBad Web BotExploited HostWeb App AttackSSHIoT Targeted
1Fraud OrdersDDoS AttackOpen ProxyWeb SpamEmail SpamPort ScanBrute-ForceBad Web BotExploited HostWeb App AttackSSHIoT Targeted
1Email Spam
7malware reported
1Exploited Host
1Exploited HostWeb App AttackDDoS AttackPort ScanBrute-ForceSSH
5reputation reported
3organizations reported
2abuse reported
2Email Spam
from 7 distinct reporters
and 7 distinct sources : hpHosts, Bambenek Consulting, BadIPs.com, Snort.org Labs, TalosIntel.com, FireHOL, AbuseIPDB was first signaled at 2017-12-03 05:59 and last record was at 2019-08-03 15:07.

Team Internet AG
NetRange : First & Last IP -
Network CIDR

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-06-11 21:41 malware Exploited Host AbuseIPDB  
2019-06-11 15:11 abuse Email Spam AbuseIPDB  
2019-06-11 04:35 attacks HackingPort Scan AbuseIPDB ISP/domain admins/uk/i.e. abroad/known/hacking.me - bold-whilst working in DE/local de lag locks/hacking.me A hacking.me MX 5 mail.h-emai
2019-04-28 08:31 attacks Port ScanHackingSpoofingBrute-Force AbuseIPDB *Blacklisted German WordPress Botnet
2019-02-12 03:54 attacks Hacking AbuseIPDB domain/? used to redirect/ Web Server Location Germany Last Updated: Feb 12, 2019 Website and Web Server Information Website Title questio
2018-12-19 22:03 attacks PhishingHackingExploited Host AbuseIPDB pretend to send a O365 update
2018-03-02 20:31 attacks Fraud OrdersDDoS AttackFTP Brute-ForcePing of Death AbuseIPDB  
2018-02-01 16:11 abuse Email Spam AbuseIPDB  
2017-12-03 08:23 attacks Fraud OrdersDDoS AttackOpen ProxyWeb Spam AbuseIPDB Terroristical activities and support
2017-12-03 05:59 malware Exploited HostWeb App AttackDDoS AttackPort Scan AbuseIPDB This IP address is consistently trying to do ???? I am not sure what is going on, not smart about this. I have Avast and keeps popping up Threat has b
2019-03-29 18:23 organizations coinbl_hosts  
2019-03-29 18:35 organizations hphosts_ats  
2019-03-29 18:35 malware Malware hphosts_emd hpHosts  
2019-03-29 18:35 reputation hphosts_fsa  
2019-03-29 18:35 reputation hphosts_mmt  
2019-03-29 18:35 reputation hphosts_pha  
2019-03-29 18:36 reputation hphosts_psh  
2019-03-29 18:36 reputation hphosts_wrz  
2019-03-29 18:42 malware Malware ransomware_feed  
2019-05-28 23:17 malware Malware bambenek_c2 Bambenek Consulting  
2019-05-28 23:17 malware Malware bambenek_suppobox Bambenek Consulting  
2019-05-28 23:26 organizations coinbl_hosts_browser  
2019-06-03 22:42 malware Malware bambenek_simda Bambenek Consulting  
2019-06-28 22:41 attacks bi_any_0_1d BadIPs.com  
2019-06-28 22:42 attacks bi_assp_0_1d BadIPs.com  
2019-06-28 22:42 attacks Brute-ForceMailserver Attack bi_mail_0_1d BadIPs.com  
2019-06-28 22:42 attacks Brute-ForceMailserver Attack bi_postfix_0_1d BadIPs.com  
2019-06-28 22:42 attacks Email Spam bi_spam_0_1d BadIPs.com  
2019-07-04 15:54 attacks snort_ipfilter Snort.org Labs  
2019-07-04 15:57 attacks talosintel_ipfilter TalosIntel.com  
2019-08-03 15:07 attacks firehol_level3 FireHOL  
2019-07-04 15:46 attacks firehol_level3 FireHOL  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware


inetnum: -
netname: DE-TEAMINTERNET-20140411
country: DE
admin-c: TI998-RIPE
tech-c: TI998-RIPE
mnt-by: TIA27-MNT
mnt-lower: IX1-MNT
mnt-lower: TIA27-MNT
mnt-routes: TIA27-MNT
mnt-routes: IX1-MNT
created: 2014-04-11T09:55:43Z
last-modified: 2016-09-25T17:30:07Z
source: RIPE # Filtered

organisation: ORG-TIA27-RIPE
org-name: Team Internet AG
org-type: LIR
address: Liebherrstr. 22
address: 80538
address: Muenchen
address: GERMANY
phone: +4989416146013
fax-no: +4989416146090
mnt-ref: TIA27-MNT
mnt-ref: RIPE-NCC-HM-MNT
mnt-by: TIA27-MNT
abuse-c: TI913-RIPE
created: 2014-03-25T15:08:20Z
last-modified: 2018-10-26T10:12:00Z
source: RIPE # Filtered

role: Network Operations Team
address: Team Internet AG
address: Network Operations
nic-hdl: TI998-RIPE
mnt-by: TIA27-MNT
created: 2015-03-09T10:55:22Z
last-modified: 2015-03-09T10:55:22Z
source: RIPE # Filtered

origin: AS61969
mnt-by: TIA27-MNT
mnt-by: IX1-MNT
created: 2014-04-14T16:00:29Z
last-modified: 2014-04-14T16:06:41Z
source: RIPE # Filtered
most specific ip range is highlighted
Updated : 2019-02-01