Attack IP blocked? POODLE vulnerable! PHISHing, Malware, Spam address!

See: http://dnsbl.inps.de/query.cgi?lang=en&ip=83.12.139.178
See: http://toolbar.netcraft.com/site_report?url=gfj178.internetdsl.tpnet.pl
Risk status: 7 out of 10 red.
Mail server and disctionnairy attacker: http://www.projecthoneypot.org/ip_83.12.139.178
Cert. Authority - privacy endangered: htxps://gfj178.internetdsl.tpnet.pl/
http://toolbar.netcraft.com/site_report?url=https://gfj178.internetdsl.tpnet.pl
Scanning target: gfj178.internetdsl.tpnet.pl on port 443 …

Found 1 servers with port 443 open
Checking for SSLv3 POODLE vulnerability…

IP address Hostname Status Vulnerable ciphers
83.12.139.178 gfj178.internetdsl.tpnet.pl Vulnerable SSLv3

SSL verification issue (Possibly mis-matched URL or bad intermediate cert.). Details:
ERROR: certificate common name ‘Lab’ doesn’t match requested host name ‘gfj178.internetdsl.tpnet.pl’.

Certificate valid through: Feb 8 19:07:08 2032 GMT
Certificate Issuer: NZOZ Prosmed

SSL Protocols Supported: SSLv3 TLSv1 TLSv1.1 TLSv1.2
Server supports SSLv3, may be vulnerable to POODLE attack. It is suggested to disable the SSLv3 protocol.
Server certificate
All 1 items called securely!
Encryption (HTTPS) (1)
Communication is encrypted

Phishing, Malware, Spam: https://www.mywot.com/en/scorecard/gfj178.internetdsl.tpnet.pl?utm_source=addon&utm_content=rw-viewsc

polonus