User:ClueBot IV/WPA/Inconclusive
From Wikipedia, the free encyclopedia
This is a partial archive of WP:OP.
IP address | user | talk | edits | log | scan | block | Notes |
---|---|---|---|---|---|---|---|
125.128.2.161 | user | talk | edits | log | cwi-tor-google-nmap-whois | block-log | : Clerk note: Report page has been deleted. ClueBot IV 19:40, 23 October 2007 (UTC)
|
193.93.158.180 | user | talk | edits | log | cwi-tor-google-nmap-whois | block-log | Inconclusive evidence Again, lots of services running, but all secure. AmiDaniel (talk) 00:24, 24 October 2007 (UTC)
|
83.141.161.100 | user | talk | edits | log | cwi-tor-google-nmap-whois | block-log | Inconclusive evidence AmiDaniel (talk) 00:24, 24 October 2007 (UTC)
|
82.216.116.203 | user | talk | edits | log | cwi-tor-google-nmap-whois | block-log | : Clerk note: Report page has been deleted. ClueBot IV 19:17, 23 October 2007 (UTC)
|
123.176.84.27 | user | talk | edits | log | cwi-tor-google-nmap-whois | block-log | Reported on WP:ANI#Sockpuppets with open proxies. Dean Wormer 03:52, 22 October 2007 (UTC)
|
189.22.223.3 | user | talk | edits | log | cwi-tor-google-nmap-whois | block-log | Reported on WP:ANI#Sockpuppets with open proxies. Dean Wormer 03:46, 22 October 2007 (UTC)
|
116.71.31.136 | user | talk | edits | log | cwi-tor-google-nmap-whois | block-log | Another test. -- Avi 21:18, 17 October 2007 (UTC)
|
213.22.162.69 | user | talk | edits | log | cwi-tor-google-nmap-whois | block-log | -- Avi 21:01, 17 October 2007 (UTC)
|
64.124.150.42 | user | talk | edits | log | cwi-tor-google-nmap-whois | block-log | Funny issues with hostname resolution. -- Avi 20:34, 15 October 2007 (UTC)
|
203.192.91.4 | user | talk | edits | log | cwi-tor-google-nmap-whois | block-log | Apparent sock puppet of banned American user User:Polygamistx4 using an Australian IP address. - Jehochman Talk 05:03, 15 October 2007 (UTC)
|
64.62.138.14 | user | talk | edits | log | cwi-tor-google-nmap-whois | block-log | Edits look like a proxy ... if you google this IP, it apparently is being used for spam, so it is probably a compromised machine of some kind. --B 15:33, 5 October 2007 (UTC)
|
70.89.86.6 | user | talk | edits | log | cwi-tor-google-nmap-whois | block-log | I found the following types of open proxies on User:70.89.86.6 (Special:Contributions/70.89.86.6 | Special:Blockip/70.89.86.6) which I checked when they vandalized Paris: HTTP. ClueBot 16:30, 3 October 2007 (UTC)
C:\Program Files\Nmap>nmap -P0 -A -p 8080 70.89.86.6 Starting Nmap 4.20 ( http://insecure.org ) at 2007-10-03 13:04 Eastern Daylight Time Warning: OS detection for 70.89.86.6 will be MUCH less reliable because we did not find at least 1 open and 1 closed TCP port Warning: OS detection will be MUCH less reliable because we did not find at lea st 1 open and 1 closed TCP port Interesting ports on 70-89-86-6-smc-jax-fl.hfc.comcastbusiness.net (70.89.86.6): PORT STATE SERVICE VERSION 8080/tcp filtered http-proxy Device type: switch|broadband router|printer|load balancer|general purpose|route r Running: Bay Networks embedded, Billion embedded, Canon embedded, Cisco embedded , Linux 2.4.X|2.6.X, Microsoft Windows 2003/.NET|NT/2K/XP, RiverStone embedded, Sun Solaris 8 Too many fingerprints match this host to give specific OS details OS and Service detection performed. Please report any incorrect results at http: //insecure.org/nmap/submit/ . Nmap finished: 1 IP address (1 host up) scanned in 7.387 seconds |