ipcheck.proofpoint.com Open in urlscan Pro
103.28.249.135  Public Scan

URL: https://ipcheck.proofpoint.com/?ip=185.58.85.171
Submission: On May 25 via manual from SG — Scanned from SG

Form analysis 2 forms found in the DOM

/us

<form action="/us" data-region="us" data-language="en"> <input type="text" name="search_block_form" placeholder="Search"> <input type="submit"> </form>

POST /?ip=185.58.85.171

<form class="ipcheck-tool-form" data-drupal-selector="ipcheck-tool-form" action="/?ip=185.58.85.171" method="post" id="ipcheck-tool-form" accept-charset="UTF-8" novalidate="novalidate">
  <div class="content">
    <div class="row">
      <div class="container">
        <div class="content col-md-12 col-sm-12 col-lg-12">
          <h4>Check Your IP Address Here</h4>
          <p>If your IP address is currently on our IP blocklist, or your IP is experiencing sending delays, this lookup will provide a means to submit information about your IP to Proofpoint.</p>
          <div class="" style="background-color: #f4f3f0;padding:3px 7px 0px 8px;margin-left:-8px;">
            <h3 class="block-text-cols__title">For Proofpoint Clients</h3>
            <p><strong><a href="https://proofpointcommunities.force.com/support/cts_pdr_lookup?retURL=%2Fsupport%2F500%2Fo">If you are a Proofpoint client, please click here for an expedited response.</a></strong></p>
          </div>
          <div class="js-form-item form-item js-form-type-textfield form-item-ip js-form-item-ip">
            <label for="edit-ip" class="js-form-required form-required">IP Address</label>
            <input data-drupal-selector="edit-ip" type="text" id="edit-ip" name="ip" value="" size="60" maxlength="128" placeholder="Enter IP Address" class="form-text required" required="required" aria-required="true">
          </div>
          <div id="ip-recaptcha" class="g-recaptcha">
            <div style="width: 304px; height: 78px;">
              <div><iframe title="reCAPTCHA"
                  src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6LcQrhITAAAAAN-lxEEybTOObGzl3Z13gEJ9ciHP&amp;co=aHR0cHM6Ly9pcGNoZWNrLnByb29mcG9pbnQuY29tOjQ0Mw..&amp;hl=zh-CN&amp;v=CDFvp7CXAHw7k3HxO47Gm1O9&amp;size=normal&amp;cb=s8bo6ikqbge4"
                  width="304" height="78" role="presentation" name="a-dohqom5gfsgl" frameborder="0" scrolling="no"
                  sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe></div><textarea id="g-recaptcha-response" name="g-recaptcha-response"
                class="g-recaptcha-response" style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
            </div><iframe style="display: none;"></iframe>
          </div>
          <script type="text/javascript">
            var IPCaptchaCallback = function() {
              var IPRecaptchaFieldContainer;
              IPRecaptchaFieldContainer = grecaptcha.render("ip-recaptcha", {
                "sitekey": "6LcQrhITAAAAAN-lxEEybTOObGzl3Z13gEJ9ciHP",
                "callback": IPVerifyCallback
              });
            };
            var IPVerifyCallback = function(response) {
              var _ipSubmit = document.getElementsByClassName("js-ip-submit");
              _ipSubmit[0].setAttribute("disabled", false);
              _ipSubmit[0].removeAttribute("disabled");
            };
          </script>
          <script src="//www.google.com/recaptcha/api.js?onload=IPCaptchaCallback&amp;render=explicit" async="" defer=""></script><input class="ip-submit js-ip-submit button js-form-submit form-submit" data-drupal-selector="edit-submit" type="submit"
            id="edit-submit" name="op" value="Lookup IP" disabled="">
          <input autocomplete="off" data-drupal-selector="form-hzxtt-sui-zjknlxr-yewazgb9secdithpiucpuhbrs" type="hidden" name="form_build_id" value="form-HZXTt_SUI_ZJknLXr_YEwAzGB9secdItHPiuCPuHBRs">
          <input data-drupal-selector="edit-ipcheck-tool-form" type="hidden" name="form_id" value="ipcheck_tool_form">
          <p>&nbsp;</p>
          <h4>About Proofpoint<sup>®</sup> Dynamic Reputation (PDR)</h4>
          <p>Dynamic Reputation leverages Proofpoint's machine-learning driven content classification system to determine which IPs may be compromised to send spam (i.e. part of a botnet). The purpose of IP reputation is to delay or block IPs
            identified as being part of a botnet or under the control of spammers. We do not intend to delay or block legitimate email that our customers are expecting. For more information, please read our
            <a href="https://www.proofpoint.com/us/ip-blocked-frequently-asked-questions">Frequently Asked Questions</a> | <a href="https://www.proofpoint.com/jp/support-services/ip-blocked-faq">よくあるご質問(日本語)</a>.</p>
        </div>
      </div>
    </div>
  </div>
</form>

Text Content

Skip to main content
Products Solutions Partners Resources Company ContactLanguages
Support Log-in Digital Risk Portal Email Fraud Defense ET Intelligence
Proofpoint Essentials Sendmail Support Log-in
Main Menu

AEGIS THREAT PROTECTION PLATFORM

Disarm BEC, phishing, ransomware, supply chain threats and more.

SIGMA INFORMATION PROTECTION PLATFORM

Defend your data from careless, compromised and malicious users.

IDENTITY THREAT DEFENSE PLATFORM

Prevent identity risks, detect lateral movement and remediate identity threats
in real time.

INTELLIGENT COMPLIANCE PLATFORM

Reduce risk, control costs and improve data visibility to ensure compliance.

PREMIUM SERVICES

Leverage proactive expertise, operational continuity and deeper insights from
our skilled experts.


NEW THREAT PROTECTION SOLUTION BUNDLES WITH FLEXIBLE DEPLOYMENT OPTIONS

AI-powered protection against BEC, ransomware, phishing, supplier risk and more
with inline+API or MX-based deployment

Learn More


SOLUTIONS BY TOPIC

COMBAT EMAIL AND CLOUD THREATS

Protect your people from email and cloud threats with an intelligent and
holistic approach.

CHANGE USER BEHAVIOR

Help your employees identify, resist and report attacks before the damage is
done.

COMBAT DATA LOSS AND INSIDER RISK

Prevent data loss via negligent, compromised and malicious insiders by
correlating content, behavior and threats.

MODERNIZE COMPLIANCE AND ARCHIVING

Manage risk and data retention needs with a modern compliance and archiving
solution.

PROTECT CLOUD APPS

Keep your people and their cloud apps secure by eliminating threats, avoiding
data loss and mitigating compliance risk.

PREVENT LOSS FROM RANSOMWARE

Learn about this growing threat and stop attacks by securing today’s top
ransomware vector: email.

SECURE MICROSOFT 365

Implement the very best security and compliance solution for your Microsoft 365
collaboration suite.

DEFEND YOUR REMOTE WORKFORCE WITH CLOUD EDGE

Secure access to corporate resources and ensure business continuity for your
remote workers.

WHY PROOFPOINT

Today’s cyber attacks target people. Learn about our unique people-centric
approach to protection.


SOLUTIONS BY INDUSTRY

Federal Government State and Local Government Higher Education Financial
Services Healthcare Mobile Operators Internet Service Providers Small and Medium
Businesses


PARTNER PROGRAMS

CHANNEL PARTNERS

Become a channel partner. Deliver Proofpoint solutions to your customers and
grow your business.

ARCHIVE EXTRACTION PARTNERS

Learn about the benefits of becoming a Proofpoint Extraction Partner.

GLOBAL SYSTEM INTEGRATOR (GSI) AND MANAGED SERVICE PROVIDER (MSP) PARTNERS

Learn about our global consulting and services partners that deliver fully
managed and integrated solutions.

TECHNOLOGY AND ALLIANCE PARTNERS

Learn about our relationships with industry-leading firms to help protect your
people, data and brand.

SOCIAL MEDIA PROTECTION PARTNERS

Learn about the technology and alliance partners in our Social Media Protection
Partner program.

PROOFPOINT ESSENTIALS PARTNER PROGRAMS

Small Business Solutions for channel partners and MSPs.


PARTNER TOOLS

Become a Channel Partner Channel Partner Portal

RESOURCE LIBRARY

Find the information you're looking for in our library of videos, data sheets,
white papers and more.

BLOG

Keep up with the latest news and happenings in the ever‑evolving cybersecurity
landscape.

PODCASTS

Learn about the human side of cybersecurity. Episodes feature insights from
experts and executives.

NEW PERIMETERS MAGAZINE

Get the latest cybersecurity insights in your hands – featuring valuable
knowledge from our own industry experts.

THREAT GLOSSARY

Learn about the latest security threats and how to protect your people, data,
and brand.

EVENTS

Connect with us at events to learn how to protect your people and data from
ever‑evolving threats.

CUSTOMER STORIES

Read how Proofpoint customers around the globe solve their most pressing
cybersecurity challenges.

WEBINARS

Browse our webinar library to learn about the latest threats, trends and issues
in cybersecurity.

Watch now to earn your CPE credits


SECURITY HUBS

Get free research and resources to help you protect against threats, build a
security culture, and stop ransomware in its tracks.

Threat Hub
CISO Hub
Cybersecurity Awareness Hub
Ransomware Hub
Insider Threat Management Hub

ABOUT PROOFPOINT

Proofpoint is a leading cybersecurity company that protects organizations'
greatest assets and biggest risks: their people.

WHY PROOFPOINT

Today’s cyber attacks target people. Learn about our unique people-centric
approach to protection.

CAREERS

Stand out and make a difference at one of the world's leading cybersecurity
companies.

NEWS CENTER

Read the latest press releases, news stories and media highlights about
Proofpoint.

PRIVACY AND TRUST

Learn about how we handle data and make commitments to privacy and other
regulations.

ENVIRONMENTAL, SOCIAL, AND GOVERNANCE

Learn about our people-centric principles and how we implement them to
positively impact our global community.


SUPPORT

Access the full range of Proofpoint support services.

Learn More
English (Americas) English (Europe, Middle East, Africa) English (Asia-Pacific)
Español Deutsch Français Italiano Português 日本語 한국어
Products
Overview

EMAIL SECURITY AND PROTECTION

Email Protection Email Fraud Defense Secure Email Relay Threat Response
Auto-Pull Sendmail Open Source Essentials for Small Business


ADVANCED THREAT PROTECTION

Targeted Attack Protection in Email Email Isolation Threat Response Emerging
Threats Intelligence


SECURITY AWARENESS TRAINING

Assess Change Behavior Evaluate
Overview

INFORMATION PROTECTION

Enterprise Data Loss Prevention (DLP) Insider Threat Management Intelligent
Classification and Protection Endpoint Data Loss Prevention (DLP) Email Data
Loss Prevention (DLP) Email Encryption Data Discover


CLOUD SECURITY

Browser Isolation Cloud Account Defense Cloud App Security Broker Web Security
Overview

IDENTITY THREAT DETECTION AND RESPONSE

Spotlight Shadow
Overview

COMPLIANCE AND ARCHIVING

Automate Capture Patrol Track Archive Discover Supervision


DIGITAL RISK PROTECTION

Social Media Protection Domain Fraud Monitoring Executive and Location Threat
Monitoring
Overview

PREMIUM SERVICES

Managed Email Threat Protection Services Managed Information Protection Services
Managed Security Awareness Services Recurring Consultative Services Technical
Account Managers Threat Intelligence Services People-Centric Security Program
Products Solutions Partners Resources Company
English (Americas) English (Europe, Middle East, Africa) English (Asia-Pacific)
Español Deutsch Français Italiano Português 日本語 한국어
Login
Support Log-in Digital Risk Portal Email Fraud Defense ET Intelligence
Proofpoint Essentials Sendmail Support Log-in
Contact


AEGIS THREAT PROTECTION PLATFORM

Disarm BEC, phishing, ransomware, supply chain threats and more.

SIGMA INFORMATION PROTECTION PLATFORM

Defend your data from careless, compromised and malicious users.

IDENTITY THREAT DEFENSE PLATFORM

Prevent identity risks, detect lateral movement and remediate identity threats
in real time.

INTELLIGENT COMPLIANCE PLATFORM

Reduce risk, control costs and improve data visibility to ensure compliance.

PREMIUM SERVICES

Leverage proactive expertise, operational continuity and deeper insights from
our skilled experts.



Overview

EMAIL SECURITY AND PROTECTION

Email Protection Email Fraud Defense Secure Email Relay Threat Response
Auto-Pull Sendmail Open Source Essentials for Small Business


ADVANCED THREAT PROTECTION

Targeted Attack Protection in Email Email Isolation Threat Response Emerging
Threats Intelligence


SECURITY AWARENESS TRAINING

Assess Change Behavior Evaluate
Overview

INFORMATION PROTECTION

Enterprise Data Loss Prevention (DLP) Insider Threat Management Intelligent
Classification and Protection Endpoint Data Loss Prevention (DLP) Email Data
Loss Prevention (DLP) Email Encryption Data Discover


CLOUD SECURITY

Browser Isolation Cloud Account Defense Cloud App Security Broker Web Security
Overview

IDENTITY THREAT DETECTION AND RESPONSE

Spotlight Shadow
Overview

COMPLIANCE AND ARCHIVING

Automate Capture Patrol Track Archive Discover Supervision


DIGITAL RISK PROTECTION

Social Media Protection Domain Fraud Monitoring Executive and Location Threat
Monitoring
Overview

PREMIUM SERVICES

Managed Email Threat Protection Services Managed Information Protection Services
Managed Security Awareness Services Recurring Consultative Services Technical
Account Managers Threat Intelligence Services People-Centric Security Program




NEW THREAT PROTECTION SOLUTION BUNDLES WITH FLEXIBLE DEPLOYMENT OPTIONS

AI-powered protection against BEC, ransomware, phishing, supplier risk and more
with inline+API or MX-based deployment

Learn More




SOLUTIONS BY TOPIC

COMBAT EMAIL AND CLOUD THREATS

Protect your people from email and cloud threats with an intelligent and
holistic approach.

CHANGE USER BEHAVIOR

Help your employees identify, resist and report attacks before the damage is
done.

COMBAT DATA LOSS AND INSIDER RISK

Prevent data loss via negligent, compromised and malicious insiders by
correlating content, behavior and threats.

MODERNIZE COMPLIANCE AND ARCHIVING

Manage risk and data retention needs with a modern compliance and archiving
solution.

PROTECT CLOUD APPS

Keep your people and their cloud apps secure by eliminating threats, avoiding
data loss and mitigating compliance risk.

PREVENT LOSS FROM RANSOMWARE

Learn about this growing threat and stop attacks by securing today’s top
ransomware vector: email.

SECURE MICROSOFT 365

Implement the very best security and compliance solution for your Microsoft 365
collaboration suite.

DEFEND YOUR REMOTE WORKFORCE WITH CLOUD EDGE

Secure access to corporate resources and ensure business continuity for your
remote workers.

WHY PROOFPOINT

Today’s cyber attacks target people. Learn about our unique people-centric
approach to protection.


SOLUTIONS BY INDUSTRY

Federal Government State and Local Government Higher Education Financial
Services Healthcare Mobile Operators Internet Service Providers Small and Medium
Businesses


PARTNER PROGRAMS

CHANNEL PARTNERS

Become a channel partner. Deliver Proofpoint solutions to your customers and
grow your business.

ARCHIVE EXTRACTION PARTNERS

Learn about the benefits of becoming a Proofpoint Extraction Partner.

GLOBAL SYSTEM INTEGRATOR (GSI) AND MANAGED SERVICE PROVIDER (MSP) PARTNERS

Learn about our global consulting and services partners that deliver fully
managed and integrated solutions.

TECHNOLOGY AND ALLIANCE PARTNERS

Learn about our relationships with industry-leading firms to help protect your
people, data and brand.

SOCIAL MEDIA PROTECTION PARTNERS

Learn about the technology and alliance partners in our Social Media Protection
Partner program.

PROOFPOINT ESSENTIALS PARTNER PROGRAMS

Small Business Solutions for channel partners and MSPs.


PARTNER TOOLS

Become a Channel Partner Channel Partner Portal

RESOURCE LIBRARY

Find the information you're looking for in our library of videos, data sheets,
white papers and more.

BLOG

Keep up with the latest news and happenings in the ever‑evolving cybersecurity
landscape.

PODCASTS

Learn about the human side of cybersecurity. Episodes feature insights from
experts and executives.

NEW PERIMETERS MAGAZINE

Get the latest cybersecurity insights in your hands – featuring valuable
knowledge from our own industry experts.

THREAT GLOSSARY

Learn about the latest security threats and how to protect your people, data,
and brand.

EVENTS

Connect with us at events to learn how to protect your people and data from
ever‑evolving threats.

CUSTOMER STORIES

Read how Proofpoint customers around the globe solve their most pressing
cybersecurity challenges.

WEBINARS

Browse our webinar library to learn about the latest threats, trends and issues
in cybersecurity.

Watch now to earn your CPE credits


SECURITY HUBS

Get free research and resources to help you protect against threats, build a
security culture, and stop ransomware in its tracks.

Threat Hub
CISO Hub
Cybersecurity Awareness Hub
Ransomware Hub
Insider Threat Management Hub

ABOUT PROOFPOINT

Proofpoint is a leading cybersecurity company that protects organizations'
greatest assets and biggest risks: their people.

WHY PROOFPOINT

Today’s cyber attacks target people. Learn about our unique people-centric
approach to protection.

CAREERS

Stand out and make a difference at one of the world's leading cybersecurity
companies.

NEWS CENTER

Read the latest press releases, news stories and media highlights about
Proofpoint.

PRIVACY AND TRUST

Learn about how we handle data and make commitments to privacy and other
regulations.

ENVIRONMENTAL, SOCIAL, AND GOVERNANCE

Learn about our people-centric principles and how we implement them to
positively impact our global community.


SUPPORT

Access the full range of Proofpoint support services.

Learn More



DYNAMIC REPUTATION IP LOOKUP

CHECK YOUR IP ADDRESS HERE

If your IP address is currently on our IP blocklist, or your IP is experiencing
sending delays, this lookup will provide a means to submit information about
your IP to Proofpoint.


FOR PROOFPOINT CLIENTS

If you are a Proofpoint client, please click here for an expedited response.

IP Address


 

ABOUT PROOFPOINT® DYNAMIC REPUTATION (PDR)

Dynamic Reputation leverages Proofpoint's machine-learning driven content
classification system to determine which IPs may be compromised to send spam
(i.e. part of a botnet). The purpose of IP reputation is to delay or block IPs
identified as being part of a botnet or under the control of spammers. We do not
intend to delay or block legitimate email that our customers are expecting. For
more information, please read our Frequently Asked Questions | よくあるご質問(日本語).

 * Facebook
 * Twitter
 * linkedin
 * Youtube

 * English (US)
 * English (UK)
 * English (AU)
 * Español
 * Deutsch
 * Français
 * Italiano
 * Português
 * 日本語
 * 한국어

© 2023. All rights reserved. Terms and conditions Privacy Policy Sitemap