Publishing of emails on our website carries informative function for you to know that some of your data are being used by cyber criminals for illegal actions. Owners of emails may not know that their emails are being used for spam.
You have to be careful in exposing of your email or else spammers will be able to know your email from open sources or hacked databases. We can only inform you that your email was used in spam activities. Use this link to delete your email from our list.
The log shows up to 50 last spam activitiesBlacklisted - a sender will be rejected by CleanTalk. Suspicious - a sender might be rejected by CleanTalk. The address will be included in Security FireWall if it is present in SpamFireWall and the option "Use CleanTalk database of dangerous IP addresses." is turned on in Security settings.
Publishing of emails on our website carries informative function for you to know that some of your data are being used by cyber criminals for illegal actions. Owners of emails may not know that their emails are being used for spam.
You have to be careful in exposing of your email or else spammers will be able to know your email from open sources or hacked databases. We can only inform you that your email was used in spam activities. Use this link to delete your email from our list.
We use cookies to provide our services and analyze site usage in accordance with our Privacy Policy. By choosing "Accept", you agree to the storage of all types of cookies used on the site. If you do not wish to use optional cookies, please read our Privacy Policy.
64.31.8.34 Comments
By Elwyn Shneiderfor 64.31.8.34(Spam)October 23, 2020
HTTP flood against my website. Contacted ISP+Organization for abuse, but no answers since 2 days. Just ban this IP.
07:03:52.765301 IP 202.43.183.210.33436 > 204.**.241.**.80: Flags [P.], seq 3986522759:3986523381, ack 2868939758, win 457, options [nop,nop,TS val 96294134 ecr 1417320683], length 622: HTTP: GET / HTTP/1.1
E(..._@.0.2q.+.....R...P.............P.....
..T.Tz..GET / HTTP/1.1
authority: 204.**.241.**
Cache-Control: no-cache
upgrade-insecure-requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; Touch; MAARJS; rv:11.0) like Gecko
Referer:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding: gzip, deflate, br
Accept-Language: en-US,en;q=0.9
sec-fetch-site: none
sec-fetch-mode: navigate
sec-fetch-user: ?1
sec-fetch-dest: document
dnt: 1
host: 204.**.241.**
X-Proxy-ID: 1722093513
X-Forwarded-For: 64.31.8.34
Via: 1.1 10.20.0.1 (Mikrotik HttpProxy)