Go
95.213.244.42
is an
Open Proxy
used by
Hackers
100 %
Russian Federation
Report Abuse
498attacks reported
363Port Scan
109Web App Attack
16Port ScanExploited Host
4HackingWeb App Attack
4uncategorized
1HackingBrute-Force
1DDoS Attack
7anonymizers reported
7Open ProxyExploited Host
3abuse reported
2uncategorized
1Bad Web Bot
from 12 distinct reporters
and 4 distinct sources : NormShield.com, FireHOL, MyIP.ms, AbuseIPDB
95.213.244.42 was first signaled at 2018-01-04 13:36 and last record was at 2019-09-26 16:41.
IP

95.213.244.42

Organization
OOO Network of data-centers Selectel
Localisation
Russian Federation
NetRange : First & Last IP
95.213.244.0 - 95.213.245.255
Network CIDR
95.213.244.0/23

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-09-26 16:41 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-26 15:21 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-25 13:18 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-24 10:30 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-23 11:17 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-22 07:51 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-21 03:32 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-20 03:18 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-19 01:45 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-18 03:03 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-17 02:07 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-15 22:19 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-14 20:21 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-13 20:01 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-12 17:32 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-11 12:18 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-10 09:10 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-09 05:38 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-08 02:35 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-07 02:18 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-06 00:52 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-05 01:13 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-04 00:41 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-02 21:54 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-02 18:08 attacks HackingWeb App Attack AbuseIPDB [Tue Sep 03 04:43:07.648744 2019] [:error] [pid 4784:tid 139805203556096] [client 95.213.244.42:58258] [client 95.213.244.42] ModSecurity: Access deni
2019-09-01 19:52 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-09-01 16:17 attacks HackingWeb App Attack AbuseIPDB [Wed Aug 28 15:48:22.407305 2019] [:error] [pid 20127:tid 139847675139840] [client 95.213.244.42:41638] [client 95.213.244.42] ModSecurity: Access den
2019-08-31 20:20 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-08-30 16:37 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-08-29 18:36 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-08-28 17:33 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-08-27 23:48 attacks HackingWeb App Attack AbuseIPDB [Wed Aug 28 15:48:22.407305 2019] [:error] [pid 20127:tid 139847675139840] [client 95.213.244.42:41638] [client 95.213.244.42] ModSecurity: Access den
2019-08-27 17:32 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-08-26 16:23 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-08-25 16:19 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-08-24 14:30 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-08-23 13:30 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-08-22 09:51 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-08-21 06:24 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-08-20 04:17 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-08-18 02:52 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-08-17 00:03 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-08-16 19:40 attacks HackingWeb App Attack AbuseIPDB [Fri Aug 16 18:04:25.852725 2019] [:error] [pid 20611:tid 139947138868992] [client 95.213.244.42:37086] [client 95.213.244.42] ModSecurity: Access den
2019-08-15 22:27 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-08-14 23:10 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-08-13 20:02 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-08-12 19:40 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-08-11 20:08 attacks Port Scan AbuseIPDB [portscan] Port scan
2019-08-11 11:55 attacks Web App Attack AbuseIPDB 400 BAD REQUEST
2019-08-11 03:25 attacks Web App Attack AbuseIPDB 400 BAD REQUEST
2018-01-04 13:36 anonymizers Open ProxyExploited Host AbuseIPDB  
2018-01-04 14:09 anonymizers Open ProxyExploited Host AbuseIPDB  
2018-01-04 14:39 anonymizers Open ProxyExploited Host AbuseIPDB  
2018-01-04 14:59 anonymizers Open ProxyExploited Host AbuseIPDB  
2018-01-04 17:47 anonymizers Open ProxyExploited Host AbuseIPDB  
2018-01-04 18:05 anonymizers Open ProxyExploited Host AbuseIPDB  
2018-01-04 20:09 anonymizers Open ProxyExploited Host AbuseIPDB  
2018-01-15 15:18 attacks DDoS Attack AbuseIPDB  
2018-03-06 14:29 attacks Port Scan AbuseIPDB TCP_IN 2018-03-06 13:26:51 {"0":"808*","*":"*080"} TCP_IN 2018-03-06 13:23:09 {"0":"808*",
2018-03-08 17:03 attacks Port Scan AbuseIPDB TCP_IN 2018-03-08 17:46:25 ["**28"] TCP_IN 2018-03-08 17:37:42 {"0":"**28","*":"8080","**"
2019-03-29 18:41 attacks normshield_all_attack NormShield.com  
2019-03-29 18:41 abuse normshield_all_suspicious NormShield.com  
2019-03-29 18:41 attacks normshield_high_attack NormShield.com  
2019-03-29 18:41 abuse normshield_high_suspicious NormShield.com  
2019-07-17 02:05 attacks firehol_level3 FireHOL  
2019-07-17 02:08 attacks firehol_webserver FireHOL  
2019-07-17 02:10 abuse Bad Web Bot myip MyIP.ms  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

inetnum: 95.213.244.0 - 95.213.245.255
netname: SELECTEL-NET
descr: Selectel
country: RU
admin-c: CMH-RIPE
admin-c: KS9134-RIPE
tech-c: SA32710-RIPE
status: ASSIGNED PA
remarks:
mnt-by: MNT-SELECTEL
created: 2016-03-21T03:46:29Z
last-modified: 2018-01-24T09:10:55Z
source: RIPE

role: SELECTEL-NOC
address: Russia, Saint-Petersburg, Cvetochnaya st. 21
admin-c: CMH-RIPE
admin-c: KS9134-RIPE
tech-c: CMH-RIPE
tech-c: KS9134-RIPE
nic-hdl: SA32710-RIPE
mnt-by: mnt-selectel
created: 2015-01-19T15:40:16Z
last-modified: 2019-04-15T10:47:55Z
source: RIPE # Filtered

person: Cyrill Malevanov
address: Selectel Ltd
address: Cvetochnaya st. 21
address: 190000, Saint-Petersburg
address: Russia
phone: +78126778036
fax-no: +78126778036
nic-hdl: CMH-RIPE
mnt-by: mnt-selectel
created: 2005-10-24T12:00:08Z
last-modified: 2015-01-19T15:37:28Z
source: RIPE # Filtered

person: Kirill Sizov
address: 190000, Russia, Saint-Petersburg, Tsvetochnaya 21A
phone: +78126778036
org: ORG-SL223-RIPE
nic-hdl: KS9134-RIPE
mnt-by: MNT-SELECTEL
created: 2017-04-17T17:07:36Z
last-modified: 2017-04-17T17:07:36Z
source: RIPE # Filtered

route: 95.213.244.0/24
descr: SELECTEL-NET
origin: AS49505
mnt-by: MNT-SELECTEL
created: 2018-12-13T13:16:01Z
last-modified: 2018-12-13T13:16:01Z
source: RIPE
most specific ip range is highlighted
Updated : 2019-09-16