Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: HKBN - Corporate User

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbots
$f2bV_matches
2020-10-12 02:30:21
attack
Oct 11 11:05:27 haigwepa sshd[20506]: Failed password for root from 61.93.240.18 port 19531 ssh2
Oct 11 11:08:01 haigwepa sshd[20597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.18 
...
2020-10-11 18:21:41
attack
Invalid user ftpadmin from 61.93.240.18 port 24388
2020-09-24 23:12:54
attackspambots
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "rosa" at 2020-09-24T04:28:59Z
2020-09-24 15:00:33
attack
Triggered by Fail2Ban at Ares web server
2020-09-24 06:27:04
attackbotsspam
$f2bV_matches
2020-09-20 01:10:45
attackbots
Sep 19 08:39:12 piServer sshd[6357]: Failed password for root from 61.93.240.18 port 34001 ssh2
Sep 19 08:42:41 piServer sshd[6748]: Failed password for root from 61.93.240.18 port 34141 ssh2
...
2020-09-19 16:59:40
attackbotsspam
Sep 18 05:55:49 l02a sshd[15462]: Invalid user webapp from 61.93.240.18
Sep 18 05:55:50 l02a sshd[15462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=061093240018.static.ctinets.com 
Sep 18 05:55:49 l02a sshd[15462]: Invalid user webapp from 61.93.240.18
Sep 18 05:55:51 l02a sshd[15462]: Failed password for invalid user webapp from 61.93.240.18 port 50860 ssh2
2020-09-18 13:13:58
attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-17T17:06:11Z and 2020-09-17T17:13:09Z
2020-09-18 03:28:09
attack
SSH login attempts.
2020-08-26 22:53:08
attackbotsspam
2020-08-24T23:15:32.081708ionos.janbro.de sshd[67283]: Failed password for root from 61.93.240.18 port 31467 ssh2
2020-08-24T23:18:20.092096ionos.janbro.de sshd[67305]: Invalid user comercial from 61.93.240.18 port 20486
2020-08-24T23:18:20.269646ionos.janbro.de sshd[67305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.18
2020-08-24T23:18:20.092096ionos.janbro.de sshd[67305]: Invalid user comercial from 61.93.240.18 port 20486
2020-08-24T23:18:21.709626ionos.janbro.de sshd[67305]: Failed password for invalid user comercial from 61.93.240.18 port 20486 ssh2
2020-08-24T23:21:10.114084ionos.janbro.de sshd[67323]: Invalid user sama from 61.93.240.18 port 13666
2020-08-24T23:21:10.300283ionos.janbro.de sshd[67323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.18
2020-08-24T23:21:10.114084ionos.janbro.de sshd[67323]: Invalid user sama from 61.93.240.18 port 13666
2020-08-24T23:21:12.0782
...
2020-08-25 07:43:18
attackbots
Aug 22 10:25:30 gw1 sshd[30325]: Failed password for root from 61.93.240.18 port 20591 ssh2
...
2020-08-22 14:59:52
attackbotsspam
[SID2] Fail2ban detected 5 failed SSH login attempts within 30 minutes. This report was submitted automatically.
2020-08-20 08:57:39
attackbots
2020-07-31T03:47:48.554298abusebot-2.cloudsearch.cf sshd[4048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=061093240018.static.ctinets.com  user=root
2020-07-31T03:47:50.867508abusebot-2.cloudsearch.cf sshd[4048]: Failed password for root from 61.93.240.18 port 5414 ssh2
2020-07-31T03:50:38.249734abusebot-2.cloudsearch.cf sshd[4061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=061093240018.static.ctinets.com  user=root
2020-07-31T03:50:40.232492abusebot-2.cloudsearch.cf sshd[4061]: Failed password for root from 61.93.240.18 port 59592 ssh2
2020-07-31T03:53:17.372546abusebot-2.cloudsearch.cf sshd[4067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=061093240018.static.ctinets.com  user=root
2020-07-31T03:53:19.851008abusebot-2.cloudsearch.cf sshd[4067]: Failed password for root from 61.93.240.18 port 5953 ssh2
2020-07-31T03:56:00.673278abusebot-2.cloudsearch
...
2020-07-31 13:07:34
attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-20 05:57:12
attack
Jul 17 05:55:09 rotator sshd\[22386\]: Invalid user jk from 61.93.240.18Jul 17 05:55:11 rotator sshd\[22386\]: Failed password for invalid user jk from 61.93.240.18 port 31458 ssh2Jul 17 05:58:29 rotator sshd\[23009\]: Invalid user florian from 61.93.240.18Jul 17 05:58:31 rotator sshd\[23009\]: Failed password for invalid user florian from 61.93.240.18 port 26217 ssh2Jul 17 06:01:48 rotator sshd\[23790\]: Invalid user vrm from 61.93.240.18Jul 17 06:01:50 rotator sshd\[23790\]: Failed password for invalid user vrm from 61.93.240.18 port 30924 ssh2
...
2020-07-17 12:36:09
attackbotsspam
1403. On Jul 15 2020 experienced a Brute Force SSH login attempt -> 2 unique times by 61.93.240.18.
2020-07-16 06:43:25
attack
Jul 13 08:32:50 ns382633 sshd\[29891\]: Invalid user nya from 61.93.240.18 port 42362
Jul 13 08:32:50 ns382633 sshd\[29891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.18
Jul 13 08:32:52 ns382633 sshd\[29891\]: Failed password for invalid user nya from 61.93.240.18 port 42362 ssh2
Jul 13 08:47:06 ns382633 sshd\[32581\]: Invalid user yangzhengwu from 61.93.240.18 port 56365
Jul 13 08:47:06 ns382633 sshd\[32581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.18
2020-07-13 16:50:08
attackspambots
Jun 27 04:54:58 scw-6657dc sshd[21832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.18
Jun 27 04:54:58 scw-6657dc sshd[21832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.18
Jun 27 04:55:00 scw-6657dc sshd[21832]: Failed password for invalid user ct from 61.93.240.18 port 46872 ssh2
...
2020-06-27 13:53:20
attack
Failed password for invalid user admin from 61.93.240.18 port 46808 ssh2
Invalid user jimmy from 61.93.240.18 port 17480
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.18
Failed password for invalid user jimmy from 61.93.240.18 port 17480 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.18  user=root
2020-06-23 15:55:18
attackbots
Jun  9 14:04:55 localhost sshd\[5381\]: Invalid user centos from 61.93.240.18
Jun  9 14:04:55 localhost sshd\[5381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.18
Jun  9 14:04:57 localhost sshd\[5381\]: Failed password for invalid user centos from 61.93.240.18 port 46304 ssh2
Jun  9 14:07:59 localhost sshd\[5690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.18  user=root
Jun  9 14:08:00 localhost sshd\[5690\]: Failed password for root from 61.93.240.18 port 35344 ssh2
...
2020-06-09 21:21:50
attack
Jun  4 22:13:25 vps sshd[13723]: Failed password for root from 61.93.240.18 port 16194 ssh2
Jun  4 22:17:33 vps sshd[13949]: Failed password for root from 61.93.240.18 port 44039 ssh2
...
2020-06-05 08:16:18
attackbots
Jun  3 21:04:09 web9 sshd\[5422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.18  user=root
Jun  3 21:04:10 web9 sshd\[5422\]: Failed password for root from 61.93.240.18 port 13425 ssh2
Jun  3 21:06:42 web9 sshd\[5803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.18  user=root
Jun  3 21:06:44 web9 sshd\[5803\]: Failed password for root from 61.93.240.18 port 64633 ssh2
Jun  3 21:09:17 web9 sshd\[6235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.18  user=root
2020-06-04 15:14:14
Comments on same subnet:
IP Type Details Datetime
61.93.240.65 attackspam
2020-09-21T20:24:36.935004paragon sshd[263447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.65
2020-09-21T20:24:36.930957paragon sshd[263447]: Invalid user tony from 61.93.240.65 port 51432
2020-09-21T20:24:39.163055paragon sshd[263447]: Failed password for invalid user tony from 61.93.240.65 port 51432 ssh2
2020-09-21T20:28:41.835522paragon sshd[263556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.65  user=root
2020-09-21T20:28:44.031907paragon sshd[263556]: Failed password for root from 61.93.240.65 port 53962 ssh2
...
2020-09-22 01:05:39
61.93.240.65 attackspam
$f2bV_matches
2020-09-21 16:46:27
61.93.240.65 attackbotsspam
$f2bV_matches
2020-09-17 20:25:14
61.93.240.65 attackspambots
2020-09-17T04:26:24.653735vps1033 sshd[19884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=061093240065.static.ctinets.com
2020-09-17T04:26:24.642232vps1033 sshd[19884]: Invalid user sys from 61.93.240.65 port 58833
2020-09-17T04:26:26.916885vps1033 sshd[19884]: Failed password for invalid user sys from 61.93.240.65 port 58833 ssh2
2020-09-17T04:31:11.845644vps1033 sshd[29785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=061093240065.static.ctinets.com  user=root
2020-09-17T04:31:19.273163vps1033 sshd[29785]: Failed password for root from 61.93.240.65 port 36555 ssh2
...
2020-09-17 12:36:18
61.93.240.65 attackbots
DATE:2020-09-15 10:17:09,IP:61.93.240.65,MATCHES:10,PORT:ssh
2020-09-15 22:53:13
61.93.240.65 attackspam
Tried sshing with brute force.
2020-09-15 14:47:53
61.93.240.65 attackbots
Bruteforce detected by fail2ban
2020-09-15 06:55:35
61.93.240.65 attack
SSH Brute Force
2020-08-28 15:06:23
61.93.240.65 attack
Invalid user iz from 61.93.240.65 port 59738
2020-08-26 02:26:23
61.93.240.65 attackbotsspam
Aug 25 01:58:30 marvibiene sshd[16470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.65 
Aug 25 01:58:32 marvibiene sshd[16470]: Failed password for invalid user ftpuser from 61.93.240.65 port 40545 ssh2
Aug 25 02:03:02 marvibiene sshd[16745]: Failed password for root from 61.93.240.65 port 46153 ssh2
2020-08-25 08:06:06
61.93.240.65 attackbots
Aug 13 00:46:06 NPSTNNYC01T sshd[21652]: Failed password for root from 61.93.240.65 port 43566 ssh2
Aug 13 00:49:53 NPSTNNYC01T sshd[22234]: Failed password for root from 61.93.240.65 port 43456 ssh2
...
2020-08-13 13:02:00
61.93.240.65 attack
Aug 10 14:01:18 marvibiene sshd[27009]: Failed password for root from 61.93.240.65 port 36432 ssh2
Aug 10 14:05:27 marvibiene sshd[27513]: Failed password for root from 61.93.240.65 port 41570 ssh2
2020-08-10 20:14:45
61.93.240.65 attackbots
2020-08-07T20:41:56.006945shield sshd\[29545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=061093240065.static.ctinets.com  user=root
2020-08-07T20:41:57.733210shield sshd\[29545\]: Failed password for root from 61.93.240.65 port 58016 ssh2
2020-08-07T20:46:23.724386shield sshd\[30058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=061093240065.static.ctinets.com  user=root
2020-08-07T20:46:25.907790shield sshd\[30058\]: Failed password for root from 61.93.240.65 port 35215 ssh2
2020-08-07T20:50:44.560818shield sshd\[30773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=061093240065.static.ctinets.com  user=root
2020-08-08 05:01:28
61.93.240.65 attack
Jul 30 23:41:11 game-panel sshd[16526]: Failed password for root from 61.93.240.65 port 44602 ssh2
Jul 30 23:45:31 game-panel sshd[16681]: Failed password for root from 61.93.240.65 port 50329 ssh2
2020-07-31 07:56:45
61.93.240.65 attackbots
Invalid user ibmadm from 61.93.240.65 port 49108
2020-07-23 18:49:16
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.93.240.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11398
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;61.93.240.18.			IN	A

;; AUTHORITY SECTION:
.			196	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060400 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 04 15:14:10 CST 2020
;; MSG SIZE  rcvd: 116
Host info
18.240.93.61.in-addr.arpa domain name pointer 061093240018.static.ctinets.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.240.93.61.in-addr.arpa	name = 061093240018.static.ctinets.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.107.17.134 attackbots
2019-08-28T20:01:42.287615abusebot-8.cloudsearch.cf sshd\[7960\]: Invalid user zanni from 103.107.17.134 port 34008
2019-08-29 04:11:02
196.27.115.50 attackspambots
Aug 28 10:04:24 web1 sshd\[5664\]: Invalid user richard from 196.27.115.50
Aug 28 10:04:24 web1 sshd\[5664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.27.115.50
Aug 28 10:04:26 web1 sshd\[5664\]: Failed password for invalid user richard from 196.27.115.50 port 57174 ssh2
Aug 28 10:09:24 web1 sshd\[6176\]: Invalid user server from 196.27.115.50
Aug 28 10:09:24 web1 sshd\[6176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.27.115.50
2019-08-29 04:14:45
58.97.115.164 attack
Aug 28 20:15:16 localhost sshd\[1444\]: Invalid user anonymous from 58.97.115.164 port 45908
Aug 28 20:15:16 localhost sshd\[1444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.97.115.164
Aug 28 20:15:18 localhost sshd\[1444\]: Failed password for invalid user anonymous from 58.97.115.164 port 45908 ssh2
...
2019-08-29 04:29:16
103.9.159.59 attackbotsspam
Aug 28 15:07:57 game-panel sshd[31153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.9.159.59
Aug 28 15:08:00 game-panel sshd[31153]: Failed password for invalid user lilly from 103.9.159.59 port 46833 ssh2
Aug 28 15:14:05 game-panel sshd[31489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.9.159.59
2019-08-29 04:41:16
27.223.118.148 attack
Invalid user admin from 27.223.118.148 port 53025
2019-08-29 04:20:38
62.167.15.204 attackspambots
Aug2816:10:53server2dovecot:imap-login:Abortedlogin\(authfailed\,1attemptsin2secs\):user=\\,method=PLAIN\,rip=62.167.15.204\,lip=81.17.25.230\,session=\Aug2816:10:59server2dovecot:imap-login:Abortedlogin\(authfailed\,1attemptsin6secs\):user=\\,method=PLAIN\,rip=62.167.15.204\,lip=81.17.25.230\,session=\Aug2816:11:11server2dovecot:imap-login:Abortedlogin\(authfailed\,1attemptsin6secs\):user=\\,method=PLAIN\,rip=62.167.15.204\,lip=81.17.25.230\,session=\Aug2816:11:13server2dovecot:imap-login:Abortedlogin\(authfailed\,1attemptsin2secs\):user=\\,method=PLAIN\,rip=62.167.15.204\,lip=81.17.25.230\,session=\Aug2816:14:09server2dovecot:imap-login:Abortedlogin\(authfailed\,1attemptsin2secs\):user=\\,method=PLAIN\,rip=62.167.15.204\,lip=81.17.25.230\,session=\<75yKAC6RWMs pw/M\>Aug2816:14:15server2dovecot:imap-login:Abortedlogin\(authfailed\,1attemptsin6secs\):user=\
2019-08-29 04:45:32
185.176.27.174 attackspambots
Port scan on 11 port(s): 19936 19937 19938 25618 25619 25620 32134 32135 32136 50696 50697
2019-08-29 04:25:12
37.76.144.17 attackbots
Aug 28 23:41:43 lcl-usvr-02 sshd[21599]: Invalid user admin from 37.76.144.17 port 47705
Aug 28 23:41:43 lcl-usvr-02 sshd[21599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.76.144.17
Aug 28 23:41:43 lcl-usvr-02 sshd[21599]: Invalid user admin from 37.76.144.17 port 47705
Aug 28 23:41:45 lcl-usvr-02 sshd[21599]: Failed password for invalid user admin from 37.76.144.17 port 47705 ssh2
Aug 28 23:41:43 lcl-usvr-02 sshd[21599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.76.144.17
Aug 28 23:41:43 lcl-usvr-02 sshd[21599]: Invalid user admin from 37.76.144.17 port 47705
Aug 28 23:41:45 lcl-usvr-02 sshd[21599]: Failed password for invalid user admin from 37.76.144.17 port 47705 ssh2
Aug 28 23:41:48 lcl-usvr-02 sshd[21599]: Failed password for invalid user admin from 37.76.144.17 port 47705 ssh2
...
2019-08-29 04:05:27
5.226.138.5 attackspambots
08/28/2019-10:15:20.773212 5.226.138.5 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-29 04:07:02
124.92.142.47 attack
Automatic report - Port Scan Attack
2019-08-29 04:32:30
187.87.13.110 attackspambots
failed_logins
2019-08-29 04:07:54
35.180.132.183 attack
Hit on /admin/images/cal_date_over.gif
2019-08-29 04:34:58
46.101.63.40 attack
Aug 28 22:25:41 vps691689 sshd[10559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.63.40
Aug 28 22:25:43 vps691689 sshd[10559]: Failed password for invalid user lois from 46.101.63.40 port 53860 ssh2
...
2019-08-29 04:47:21
84.111.60.71 attack
This IP address was blacklisted for the following reason:  /nl/jobs/%20and%201%3E1 @ 2019-08-26T06:12:55+02:00.
2019-08-29 04:21:23
94.176.76.230 attackspambots
(Aug 28)  LEN=40 TTL=245 ID=43929 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 28)  LEN=40 TTL=245 ID=19419 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 28)  LEN=40 TTL=245 ID=37331 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 28)  LEN=40 TTL=245 ID=30915 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 28)  LEN=40 TTL=245 ID=34101 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 28)  LEN=40 TTL=245 ID=60352 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 28)  LEN=40 TTL=245 ID=47067 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 28)  LEN=40 TTL=245 ID=3240 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 28)  LEN=40 TTL=245 ID=2070 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 28)  LEN=40 TTL=245 ID=3573 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 28)  LEN=40 TTL=245 ID=26307 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 28)  LEN=40 TTL=245 ID=42517 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 28)  LEN=40 TTL=245 ID=32358 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 28)  LEN=40 TTL=245 ID=33710 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 28)  LEN=40 TTL=245 ID=65020 DF TCP DPT=23 WINDOW=14600 SYN...
2019-08-29 04:44:09

Recently Reported IPs

86.34.135.235 177.74.182.206 73.200.119.141 104.244.225.99
193.169.252.21 195.54.160.7 77.42.82.27 177.154.236.29
212.83.158.206 203.73.219.150 186.96.199.132 156.96.114.195
177.91.87.106 138.83.132.91 84.21.188.225 170.238.78.119
192.36.24.93 182.122.13.110 129.213.161.37 104.243.19.63