Author Topic: Attack IP blocked? POODLE vulnerable! PHISHing, Malware, Spam address!  (Read 1066 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33904
  • malware fighter
See: http://dnsbl.inps.de/query.cgi?lang=en&ip=83.12.139.178
See: http://toolbar.netcraft.com/site_report?url=gfj178.internetdsl.tpnet.pl
Risk status: 7 out of 10 red.
Mail server and disctionnairy attacker: http://www.projecthoneypot.org/ip_83.12.139.178
Cert. Authority - privacy endangered: htxps://gfj178.internetdsl.tpnet.pl/
http://toolbar.netcraft.com/site_report?url=https://gfj178.internetdsl.tpnet.pl
Scanning target:  gfj178.internetdsl.tpnet.pl on port 443 ...

Found 1 servers with port 443 open
Checking for SSLv3 POODLE vulnerability...

IP address   Hostname   Status   Vulnerable ciphers
83.12.139.178   gfj178.internetdsl.tpnet.pl   Vulnerable   SSLv3

SSL verification issue (Possibly mis-matched URL or bad intermediate cert.). Details:
ERROR: certificate common name 'Lab' doesn't match requested host name 'gfj178.internetdsl.tpnet.pl'.

Certificate valid through: Feb 8 19:07:08 2032 GMT
Certificate Issuer: NZOZ Prosmed

SSL Protocols Supported: SSLv3 TLSv1 TLSv1.1 TLSv1.2
   Server supports SSLv3, may be vulnerable to POODLE attack. It is suggested to disable the SSLv3 protocol.
Server certificate
   All 1 items called securely!
Encryption (HTTPS) (1)
Communication is encrypted

Phishing, Malware, Spam: https://www.mywot.com/en/scorecard/gfj178.internetdsl.tpnet.pl?utm_source=addon&utm_content=rw-viewsc

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!