The following IP addresses have been blacklisted on our servers due to excessive break-in attempts. If your internet service provider (ISP) or internet presence provider/web host (IPP) is on this list your servers (or desktop computer) will not be able to access any of the Cyber Sprocket servers or the servers we manage for our clients.
If your IP address is on this list and you wish to be removed send us a request via the Contact Us form requesting access to our servers, the reason for your access request, and the specific IP address that you want to use to talk to our servers. Each whitelist request will be considered on a case-by-case basis.
We also recommend that you contact your ISP/IPP and ask them to deal with the hackers that reside on their network. Many ISP/IPPs take a passive approach to these problems, even after we’ve sent them specific log reports showing detailed timestamps, dates, and IP addresses of the systems on their network that are responsible for the attack. Attacks originating from your ISP/IPP not only slow down your network but hamper open & productive communication for everyone on the Internet.
These are companies in North America that have been put on our blacklist for failure to address logged complaints. If you see your hosting or ISP company on this list, send them an email and ask them why they allow hackers to remain on their network after being notified of a coordinated or brute force attack.
Rackforce Hosting, Inc.
OrgName: RackForce Hosting Inc. OrgID: RACKF Address: Suite 210 Address: 1628 Dickson Avenue City: Kelowna StateProv: BC PostalCode: V1Y-9X1 Country: CA ReferralServer: rwhois://rwhois.rackforce.com:4321 NetRange: 18.104.22.168 - 22.214.171.124 CIDR: 126.96.36.199/19 NetName: RACKFORCE-3 NetHandle: NET-64-46-32-0-1 Parent: NET-64-0-0-0-0 NetType: Direct Allocation NameServer: NS1.RACKFORCE.COM NameServer: NS2.RACKFORCE.COM NameServer: NS3.RACKFORCE.COM Comment: rwhois.rackforce.com port 4321 RegDate: 2006-02-10 Updated: 2006-12-13 OrgTechHandle: RNO3-ARIN OrgTechName: Network Operations Center OrgTechPhone: +1-250-717-2340 OrgTechEmail: email@example.com
These are countries that have posted thousands of hacking attempts per month. While we’ve tried contacting nearly every ISP/IPP on this part of the list, we’ve never received a response. Many of the ISP/IPP agencies here are government sponsored agencies that do not police their network traffic or do not respond to private corporation requests to address hackers on their systems.
# China (59.151.* - 59.151.127.*) 188.8.131.52/17 # China (61.172.* - 61.173.*) 184.108.40.206/15 # Amsterdam 220.127.116.11/8 # Amsterdam 18.104.22.168/8 # Italy 22.214.171.124/20 # Netherlands 126.96.36.199/16 # Turkey 188.8.131.52/17 # Germany 184.108.40.206/24 # Amsterdam 220.127.116.11/8 # Australia 18.104.22.168/16 # Australia 22.214.171.124/16 # Australia 126.96.36.199/32 # Australia 188.8.131.52/32 # Columbia 184.108.40.206/14 # Ecuador 190.152.128/17 # Uruguay 220.127.116.11/8 # India (202.140.32.* - 202.140.63.*) 18.104.22.168/19 # ??? 22.214.171.124/19 # ??? 126.96.36.199/20 # Turkey 188.8.131.52/19 # Spain 184.108.40.206/24 # PanAmSat Corp (USA GA) 220.127.116.11/32 # China (222.32.* - 222.63.*) 18.104.22.168/11 # China (222.64.* - 222.79.*) 22.214.171.124/12 # China 126.96.36.199/16 # China 188.8.131.52/16 # China 184.108.40.206/16 # China 220.127.116.11/16 # China 18.104.22.168/16