Phishing Warning! This IP is listed in 34 DNS blacklists. LISTED 1ms abuse.ch combined zone LISTED 1ms abuse.ch spam blacklist LISTED 0ms Barracuda Reputation Block List LISTED 0ms Barracuda Reputation Block List (for SpamAssassin) LISTED 0ms Mailspike Blacklist LISTED 1ms Mailspike Zero-hour Data LISTED 157ms inps.de-DNSBL LISTED 152ms KISA-RBL LISTED 1ms nsZones.com Dyn LISTED 1ms nsZones.com SBL+Dyn LISTED 167ms NiX Spam DNSBL LISTED 1ms SORBS Aggregate zone LISTED 1ms SORBS Aggregate zone (problems) LISTED 1ms SORBS Aggregate zone (safe) LISTED 1ms SORBS Spamhost (any time) LISTED 0ms SORBS Spamhost (last 28 days) LISTED 0ms SORBS Spamhost (last 48 hours) LISTED 0ms SORBS Spamhost (last year) LISTED 0ms SORBS Vulnerable formmailers LISTED 886ms CBL LISTED 90ms SenderScore LISTED 84ms Spam Eating Monkey SEM-BLACK LISTED 175ms SpamCop Blocking List LISTED 146ms Spamhaus SBL-XBL Combined Block List LISTED 148ms Spamhaus XBL Exploits Block List LISTED 162ms Spamhaus ZEN Combined Block List LISTED 211ms Spamhaus PBL Policy Block List LISTED 32ms GBUdb Truncate LISTED 1ms UCEPROTECT Level 1 LISTED 1ms UCEPROTECT Level 2 LISTED 1ms UCEPROTECT Level 3 LISTED 32ms Unsubscribe Blacklist UBL LISTED 50ms WPBL - Weighted Private Block List LISTED 1282ms PSBL (Passive Spam Block List)
Please help us keep Internet safer and cleaner by leaving a descriptive comment about 126.96.36.199 IP address
DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.
WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.
** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.