IP Address Inspector

ATTENTION
  • This IP has not seen any suspicious activity within the last 3 months. This IP is most likely clean and trustworthy now. (This record will remain public for historical purposes, however.)

216.104.15.130

The Project Honey Pot system has detected behavior from the IP address consistent with that of a comment spammer. Below we've reported some other data associated with this IP. This interrelated data helps map spammers' networks and aids in law enforcement efforts. If you know something about this IP, please leave a comment.

Lookup IP In: Domain Tools | SpamHaus | Spamcop | SenderBase | Google Groups | Google

Geographic Location United States United States (Texas)
Spider First Seen approximately 15 years, 4 weeks ago
Spider Last Seen within 11 years, 7 months, 2 weeks
Spider Sightings 1,180 visit(s)
User-Agents seen with 1 user-agent(s)

First Post On approximately 13 years, 10 months, 2 weeks ago
Last Post On within 13 years, 9 months, 4 weeks
Form Posts 5 web post submission(s) sent from this IP

IPs In The Neighborhood
216.104.14.234 United States
216.104.15.0 United States
216.104.15.12 United States
216.104.15.13 United States
216.104.15.15 United States
216.104.15.30 United States
216.104.15.34 United States
216.104.15.99 United States
216.104.15.110 United States
216.104.15.129 United States
216.104.15.131 United States
216.104.15.132 United States
216.104.15.133 United States
216.104.15.134 | CR United States
216.104.15.135 United States
216.104.15.136 United States
216.104.15.137 United States
216.104.15.138 | CR United States
216.104.15.139 United States
216.104.15.140 United States
216.104.15.142 | CR United States
216.104.15.144 United States
216.104.15.148 United States
216.104.15.150 United States
216.104.15.255 United States
Sample Spam URLs & Keywords Posted From 216.104.15.130
Domain: xnxxe3.weebly.com
URL: http://xnxxe3.weebly.com
Keywords: xnxx
216.104.15.130's User Agent Strings
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
F.F6 commented...
i think it's their antivirus for desktops
November 05 2011 12:45 AM

L.Nicolai commented...
I blocked in .htaccess:
deny from 150.70.0.0/16 #Japan Trent Micro
deny from 216.104.0.0/19 #USA Trent Micro
deny from 220.255.252.144 #Singapore Trent

and also:
RewriteCond %{REMOTE_HOST} ^.*sdi\.trendnet.* [NC,OR]
RewriteCond %{REMOTE_HOST} ^.*\.sjdc$ [NC]
RewriteRule ^.* – [F,L]

It seems to work fine
October 27 2011 02:40 PM

T.J. commented...
216.104.15.130 - - [04/Sep/2011:11:17:42 +0200] "GET /js/popup.js HTTP/1.0" 200 2538 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)"
September 04 2011 06:10 AM

C.Chan3 commented...
do you think we can just block this range out in .htaccess?

216.104.0.0/19

Or will that block legitimate users also?
May 25 2011 11:41 AM

C.Chan3 commented...
216.104.15.130, still harvesting.
May 25 2011 11:40 AM

WEBSupport commented...
Another Brute Force Bot by Trend Micro
More Info: http://www.projecthoneypot.org/ip_216.104.15.138
More Info: http://en.wikipedia.org/wiki/Trend_Micro
May 19 2011 07:08 AM

M.Hell2 commented...
These 'Trend Micro' attack bots seem to be trying to DDOS my sites from a number of different IP's.

216.104.15.130
216.104.15.134
216.104.15.138
216.104.15.142

Even though they are blocked in htaccess, that doesn't stop them from constantly requesting pages every second and filling up my logs.

So I'm thinking, since just blocking the Trend Micro attack bots doesn't seem to be enough, maybe suing them for non stop abuse will get their attention.

Anyone else having this problem ?
March 26 2011 12:02 PM

C.Guldin commented...
Broke no access rules in .htaccess............trying to access user logs
March 22 2011 11:48 AM

F.Heinzmann commented...
trying to access my photo gallery security log
216.104.15.130 - - [30/Jan/2011:22:35:19 -0600] "GET /gallery/viewlog.php HTTP/1.0" 200 5796 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)"
January 31 2011 11:50 AM

C.Hill3 commented...
spammer
July 19 2010 10:49 AM

H.User5922 commented...
Yep - this IP is from Trend Micro (anti virus). I thought they fixed this bug but now it's coming back. I have a chat board and what happens is Trend Micro is caching outbound data up to its servers and then a few minutes later, re-posting them. To me this is a serious security and personal privacy flaw. They have hundreds of IP addresses and I had a bunch in my deny list until they fixed it. Now it's time to start adding them again.
March 16 2010 08:12 AM

A.E4 commented...
Associated with 216.104.15.134 and 216.104.15.142

So check out what those IP's are saying about it as well. They also mention TrendMicro's Web Protection Add-on and RUBotted and Trend Micro Smart Protection Network cloud solution.

Once I saw all my logs in my forum I uninstalled the program! Forget that! I wanted security! Not more of a problem!!
January 16 2010 09:40 AM

A.E4 commented...
walnawqe
envvzi@ucnxed.com
Guilty of Malicious Activity on our site
?action=ban;sa=edit;sort=name;bg=48

After banning it it actually tries to access the ban list. Wtf?!
January 16 2010 09:15 AM

J.Brisebois commented...
Pain all right...send it back to where it came from.

RewriteCond %{REMOTE_HOST} 216\.104\.0\.0/19
RewriteRule \.php$ http://trendmicro\.com/ [R=301,L]
December 31 2009 01:18 AM

P.Smith15 commented...
Trend Micro,,Real pain!!
December 27 2009 11:36 AM

T.Kramer2 commented...
This IP and others on the same subnet have tried to access my admin panel. They have been blocked in my .htaccess now.
October 17 2009 05:38 AM

A.Bolchis commented...
Comment Spammer
July 26 2009 08:33 PM

Page generated on: May 05 2024 05:28:14 PM
marcgrossman262@yahoo.com megangoodman535@gmail.com randylin362@yahoo.com ceciliaschumacher299@gmail.com
do not follow this link

Privacy Policy | Terms of Use | About Project Honey Pot | FAQ | Cloudflare Site Protection | Contact Us

Copyright © 2004–24, Unspam Technologies, Inc. All rights reserved.

Advertisements displayed on this page are not necessarily endorsed by Project Honey Pot

contact | wiki | email