91.163.33.252 Fraud Risk

Very high Risk
← Lowest Risk
Highest Risk →
0
Fraud Score: 99
100
We consider ​web traffic​ from IP address ​91.163.33.252​ to present a potentially very high fraud risk. This IP address is operated by Free whose web traffic we ​consider to present a potentially ​medium​ fraud risk, and is owned by ​Free SAS​ whose web traffic we​ also consider to present a potentially ​medium​ fraud risk. In each of these cases, non-web traffic may present a different risk or no risk at all. According to our most recent port scan, the IP address points to a server running the SSH server OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0) on port 22. Scamalytics see high levels of web traffic from this IP address across our global network, ​almost all of which we suspect to be potentially fraudulent. Considering only the web traffic where we have visibility, we apply a risk score of 99​/100 to 91.163.33.252​, which reflects the proportion of this traffic which we suspect to be potentially fraudulent. If you see web traffic from this IP address there is potentially a very high risk that it is criminals engaged in fraudulent activity. Other types of traffic may present a different risk or no risk.
IP Fraud Risk API
{
  "ip":"91.163.33.252",
  "score":"99",
  "risk":"very high"
}
        
Click here for details of our free usage tier, free trial, and pricing information.
Operator
Hostname 91-163-33-252.subs.proxad.net
ASN 12322 - PROXAD
ISP Name Free SAS
Organization Name Free
Connection type dsl
Location
Country Name France
Country Code FR
Region ÃŽle-de-France
City Paris
Postal Code 75000
Metro Code n/a
Area Code n/a
Latitude 48.8566
Longitude 2.3522
Port Scan
TCP
179/bgp
Filtered
TCP
21/ftp
Open
ProFTPD
TCP
25/smtp
Open
Postfix smtpd
TCP
80/http
Open
Apache httpd (PHP/5.4.45-0+deb7u14)
TCP
113/ident
Closed
TCP
443/ssl/http
Open
Apache httpd
TCP
49152/unknown
Closed
TCP
49153/unknown
Closed
TCP
49154/unknown
Closed
TCP
49155/unknown
Closed
TCP
49156/unknown
Closed
TCP
49157/unknown
Closed
TCP
5060/sip
Closed
TCP
22/ssh
Open
OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0)
TCP
53/domain
Closed
TCP
135/msrpc
Filtered
TCP
139/netbios-ssn
Filtered
TCP
445/microsoft-ds
Filtered
TCP
1723/pptp
Filtered
TCP
3128/squid-http
Filtered
TCP
3389/ms-wbt-server
Open
Microsoft Terminal Services
TCP
5000/upnp
Filtered
TCP
5009/airport-admin
Filtered
TCP
5051/ida-agent
Filtered
TCP
5101/admdog
Filtered
TCP
5190/aol
Filtered
TCP
5357/http
Open
Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
TCP
5432/postgresql
Filtered
TCP
5631/pcanywheredata
Filtered
TCP
5666/nrpe
Filtered
TCP
5800/vnc-http
Filtered
TCP
5900/vnc
Filtered
TCP
6000/X11
Filtered
TCP
8080/http
Open
SonicWALL firewall http config
TCP
554/rtsp?
Open
TCP
548/afp
Filtered
TCP
587/submission
Filtered
TCP
6001/X11:1
Filtered
TCP
6646/unknown
Filtered
TCP
7070/realserver
Filtered
TCP
8000/http-alt
Filtered
TCP
8008/http
Filtered
TCP
8009/ajp13
Filtered
TCP
8081/blackice-icecap
Filtered
TCP
143/imap
Open
Microsoft Exchange 2007-2010 imapd
TCP
111/rpcbind
Closed
TCP
1720/h323q931
Closed
TCP
23/telnet
Open
Proxies
Anonymizing VPN
No
Tor Exit Node
No
Server
No
Public Proxy
No
Web Proxy
No
Search Engine Robot
No
Domain Names
91-163-33-252.subs.proxad.net

IP Address data partner DB-IP.com:

Proxy data sponsored by IP2Proxy:

IMPORTANT: Scamalytics Ltd operate a fraud-detection network with visibility into many millions of internet users per month. We do not have visibility into the entire internet. The statements on this page represent our opinion based on the limited information we have available to us, and specifically only cover web connections made by internet users to websites and applications, not other connections such as server to server connections.