"Passwords are like toothbrushes. They are best when new and should never be shared."
When it comes to cybersecurity, prevention is better than cure.
'To catch a (cyber) thief'.
marketing space for rent
Jeroen Steeman Cybersecurity Summary Reports

Cybersecurity

Cybersecurity is the collection of processes, practices, techniques and technologies designed to protect computer systems, programs, networks and data from damage, attack or unauthorized access and abuse.

In general cybersecurity is quietly dealt with by governments with relative success, it poses big problems for companies and small businesses and even worse for private individuals. In the latter case I all to often see irresponsible use of Internet facing open source software making it lucrative and easy to attack and undermine millions of computer systems on the Internet at any one time.

Recent Studies show PHP and WordPress are favourite for school kid hackers (SciptyBoys) as well as more hardened and focused attackers.

Present here is an array of Internet Protocol addresses that have been detected undertaking activities caught by the reactive cybersecurity system processes. (only listed after activity is detected and confirmed)

Don't scratch where it don't itch!

Bad BotDeploying a diverse selection of agile detection methods, the results of a few years of monitoring inbound data on various Internet facing network interfaces. These lists do not contain specific details of the activity undertaken to have received the honour of being detected, blocked, tagged and exposed, nor how, besides in the general catagories.

AngelIf you find your IP address in any of these lists and know that your systems are safe, you will need to contact me directly to have it/them removed. Until then they will be shared and exposed for others to take heed of.

NOTE: Data provided below comes from a live feed and this service has a low priority, this means it is relatively slow in fetching and showing the data. Please DO NOT AUTOMATE against this data.

As from July 2013 the Internet Security and Acceleration data sets are no longer maintained nor updated. They are provided here for historic purposes.

Blocked IP addresses registered during 2008 - 2010 (7106)

Search for IP address in this range


Running Microsoft Forefront Threat Management Gateway 2010? Download the 'Computer Set' BlockList2008.xml for use as you see fit.

Using Internet Security and Acceleration server 2006? Get the 'Computer Set' ISA-BlockList2008(no longer maintained) here.

A plain text version is also available for the 2008 - 2010 IP Block List.


Untrustworthy IP address 1.1.1.1 Blacklisted!

Untrustworthy IP address 108.68.18.66 Blacklisted!

Untrustworthy IP address 109.104.76.142 Blacklisted!

Untrustworthy IP address 109.104.92.13 Blacklisted!

Untrustworthy IP address 109.194.129.159 Blacklisted!

Untrustworthy IP address 109.196.18.155 Blacklisted!

Untrustworthy IP address 109.201.17.182 Blacklisted!

Untrustworthy IP address 109.230.213.123 Blacklisted!

Untrustworthy IP address 109.33.191.75 Blacklisted!

Untrustworthy IP address 109.62.160.158 Blacklisted!

Untrustworthy IP address 109.62.162.35 Blacklisted!

Untrustworthy IP address 109.68.232.210 Blacklisted!

Untrustworthy IP address 110.1.42.20 Blacklisted!

Untrustworthy IP address 110.136.190.132 Blacklisted!

Untrustworthy IP address 110.137.27.33 Blacklisted!

Untrustworthy IP address 111.1.32.23 Blacklisted!

Untrustworthy IP address 111.1.32.24 Blacklisted!

Untrustworthy IP address 111.160.68.15 Blacklisted!

Untrustworthy IP address 111.160.68.16 Blacklisted!

Untrustworthy IP address 111.160.68.19 Blacklisted!

123...