This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.

Summary

DS-1122
ISP Abuse E-Mail Feed
External Dataset
External Data Source
Webiron
Unknown
Unknown
55 (lowest rank is 55)

Category & Restrictions

Other
malware, unsolicited emails
Unrestricted
Unknown

Description


Abuse e-mail feed contains a log of our abuse reports and status of the issue reported.

This feed is filterable by e-mail address, IP address, or ASN number. This is the master feed for the Twitter "bad abuse" feed and is pulled from live data.
URLs
https://www.webiron.com/abuse_feed/
https://www.webiron.com/abuse_feed/ [ip'>https://www.webiron.com/abuse_feed/ [ip address]
https://www.webiron.com/abuse_feed/ [asn'>https://www.webiron.com/abuse_feed/ [asn number]
https://www.webiron.com/abuse_feed/ [e-mail'>https://www.webiron.com/abuse_feed/ [e-mail address]
Fields
Log Entry Type - Contains the action. This is either, report sent, report opened, report or if the host has replied with a resolved statement.
Log Time - Time action was done
Attacker IP - The IP reported for issues (lookup link forwards to IP lookup page). The "IP" link filters the feed by the IP while the "lookup" provides more detailed information on the IP
Logged E-Mails - These are either a list of e-mail addresses reported to for the attacker IP or the address that responded to a resolved or opened event. Clicking on an e-mail will filter the feed by that e-mail address.
Log Message - The list of issues reported or an action message
Deliverable - Was the e-mail accepted by the host (this can lead the IP space being added to the BABL RBL)
Days Unresolved - The number of days the issue since the issue was reported to the host
Incidents Reported - The number of incidents reported. Some bots use thousands of nodes rather than heavier concentrations from fewer hosts. The damages are the same however.
;

Additional Details

N/A
false
false
uniform resource identifier, img college, hypertext transfer protocol, email address, inferlink corporation, communication protocol, cryptographic protocol, application layer protocols, secure communication, transport layer security, external data source, history of computing, twitter, virginia tech hokies, isp abuse e-mail feed, social media accounts, social networking websites, ip address, 1122, internet protocol, data uri scheme, email