Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Czech Republic

Internet Service Provider: Ales Krepela - KREPNET

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbotsspam
Aug 27 11:22:42 mail.srvfarm.net postfix/smtps/smtpd[1499868]: warning: unknown[93.99.4.22]: SASL PLAIN authentication failed: 
Aug 27 11:22:42 mail.srvfarm.net postfix/smtps/smtpd[1499868]: lost connection after AUTH from unknown[93.99.4.22]
Aug 27 11:24:17 mail.srvfarm.net postfix/smtps/smtpd[1499867]: warning: unknown[93.99.4.22]: SASL PLAIN authentication failed: 
Aug 27 11:24:17 mail.srvfarm.net postfix/smtps/smtpd[1499867]: lost connection after AUTH from unknown[93.99.4.22]
Aug 27 11:30:04 mail.srvfarm.net postfix/smtpd[1488223]: warning: unknown[93.99.4.22]: SASL PLAIN authentication failed:
2020-08-28 08:15:55
attackspambots
Jul  9 13:50:53 mail.srvfarm.net postfix/smtpd[3819465]: warning: unknown[93.99.4.22]: SASL PLAIN authentication failed: 
Jul  9 13:50:53 mail.srvfarm.net postfix/smtpd[3819465]: lost connection after AUTH from unknown[93.99.4.22]
Jul  9 13:52:25 mail.srvfarm.net postfix/smtpd[3817751]: warning: unknown[93.99.4.22]: SASL PLAIN authentication failed: 
Jul  9 13:52:25 mail.srvfarm.net postfix/smtpd[3817751]: lost connection after AUTH from unknown[93.99.4.22]
Jul  9 13:56:23 mail.srvfarm.net postfix/smtpd[3825207]: warning: unknown[93.99.4.22]: SASL PLAIN authentication failed:
2020-07-10 01:07:15
attackspambots
(smtpauth) Failed SMTP AUTH login from 93.99.4.22 (CZ/Czechia/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-10 08:25:06 plain authenticator failed for ([93.99.4.22]) [93.99.4.22]: 535 Incorrect authentication data (set_id=sale@emad-security.com)
2020-05-10 13:30:16
Comments on same subnet:
IP Type Details Datetime
93.99.4.23 attack
Sep 15 18:40:20 mail.srvfarm.net postfix/smtps/smtpd[2822043]: warning: unknown[93.99.4.23]: SASL PLAIN authentication failed: 
Sep 15 18:40:20 mail.srvfarm.net postfix/smtps/smtpd[2822043]: lost connection after AUTH from unknown[93.99.4.23]
Sep 15 18:40:50 mail.srvfarm.net postfix/smtps/smtpd[2827555]: warning: unknown[93.99.4.23]: SASL PLAIN authentication failed: 
Sep 15 18:40:50 mail.srvfarm.net postfix/smtps/smtpd[2827555]: lost connection after AUTH from unknown[93.99.4.23]
Sep 15 18:48:25 mail.srvfarm.net postfix/smtpd[2827929]: warning: unknown[93.99.4.23]: SASL PLAIN authentication failed:
2020-09-17 02:39:58
93.99.4.23 attack
Sep 15 18:40:20 mail.srvfarm.net postfix/smtps/smtpd[2822043]: warning: unknown[93.99.4.23]: SASL PLAIN authentication failed: 
Sep 15 18:40:20 mail.srvfarm.net postfix/smtps/smtpd[2822043]: lost connection after AUTH from unknown[93.99.4.23]
Sep 15 18:40:50 mail.srvfarm.net postfix/smtps/smtpd[2827555]: warning: unknown[93.99.4.23]: SASL PLAIN authentication failed: 
Sep 15 18:40:50 mail.srvfarm.net postfix/smtps/smtpd[2827555]: lost connection after AUTH from unknown[93.99.4.23]
Sep 15 18:48:25 mail.srvfarm.net postfix/smtpd[2827929]: warning: unknown[93.99.4.23]: SASL PLAIN authentication failed:
2020-09-16 18:58:53
93.99.4.38 attackbots
SASL PLAIN auth failed: ruser=...
2020-07-17 06:37:07
93.99.4.23 attack
Brute force attempt
2020-05-24 01:29:57
93.99.49.50 attackspambots
Unauthorized connection attempt detected from IP address 93.99.49.50 to port 23 [J]
2020-01-22 23:34:06
93.99.42.18 attack
Jul 15 08:16:01 rigel postfix/smtpd[31991]: warning: hostname 18pc.vranet.cz does not resolve to address 93.99.42.18
Jul 15 08:16:01 rigel postfix/smtpd[31991]: connect from unknown[93.99.42.18]
Jul 15 08:16:02 rigel postfix/smtpd[31991]: warning: unknown[93.99.42.18]: SASL CRAM-MD5 authentication failed: authentication failure
Jul 15 08:16:02 rigel postfix/smtpd[31991]: warning: unknown[93.99.42.18]: SASL PLAIN authentication failed: authentication failure
Jul 15 08:16:02 rigel postfix/smtpd[31991]: warning: unknown[93.99.42.18]: SASL LOGIN authentication failed: authentication failure
Jul 15 08:16:02 rigel postfix/smtpd[31991]: disconnect from unknown[93.99.42.18]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=93.99.42.18
2019-07-15 21:04:32
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.99.4.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9928
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;93.99.4.22.			IN	A

;; AUTHORITY SECTION:
.			306	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050901 1800 900 604800 86400

;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 10 13:30:10 CST 2020
;; MSG SIZE  rcvd: 114
Host info
Host 22.4.99.93.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 22.4.99.93.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
5.196.94.68 attackbotsspam
Aug 13 07:36:34 sso sshd[19261]: Failed password for root from 5.196.94.68 port 57602 ssh2
...
2020-08-13 16:23:25
131.100.25.143 attackspam
From send-alceu-1618-alkosa.com.br-8@viptop.com.br Thu Aug 13 02:25:14 2020
Received: from mm25-143.viptop.com.br ([131.100.25.143]:54427)
2020-08-13 16:17:16
136.243.72.5 attack
Aug 13 09:54:18 relay postfix/smtpd\[5850\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 13 09:54:18 relay postfix/smtpd\[5846\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 13 09:54:18 relay postfix/smtpd\[6704\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 13 09:54:18 relay postfix/smtpd\[6153\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 13 09:54:18 relay postfix/smtpd\[5868\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 13 09:54:18 relay postfix/smtpd\[5912\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 13 09:54:18 relay postfix/smtpd\[7262\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 13 09:54:18 relay postfix/smtpd\[7263\]: warning: mon.riss
...
2020-08-13 15:57:05
141.98.9.161 attackspambots
SSH Brute-Force attacks
2020-08-13 15:55:37
195.243.132.248 attackbotsspam
Aug 13 00:45:08 ws22vmsma01 sshd[31269]: Failed password for root from 195.243.132.248 port 35992 ssh2
...
2020-08-13 15:45:08
201.132.87.151 attackbots
Symantec Web Gateway Remote Command Execution Vulnerability, PTR: customer-TXP-MCA-87-151.megared.net.mx.
2020-08-13 16:20:06
223.149.187.206 attackbots
Unauthorised access (Aug 13) SRC=223.149.187.206 LEN=60 TTL=50 ID=60323 DF TCP DPT=23 WINDOW=5440 SYN
2020-08-13 15:49:57
106.13.37.213 attackbots
failed root login
2020-08-13 16:20:29
144.91.65.110 attack
2020-08-13T16:29:12.798268luisaranguren sshd[1483190]: Disconnected from 144.91.65.110 port 41574 [preauth]
2020-08-13T17:19:48.060359luisaranguren sshd[1501822]: Disconnected from 144.91.65.110 port 46818 [preauth]
...
2020-08-13 15:57:30
190.167.71.4 attackbots
Microsoft SQL Server User Authentication Brute Force Attempt , PTR: 4.71.167.190.d.dyn.codetel.net.do.
2020-08-13 16:14:58
190.215.117.149 attackbots
Microsoft SQL Server User Authentication Brute Force Attempt , PTR: static.190.215.117.149.gtdinternet.com.
2020-08-13 16:22:52
192.248.81.93 attackbotsspam
2020-08-13T14:03:06.627954hostname sshd[114404]: Failed password for root from 192.248.81.93 port 49113 ssh2
2020-08-13T14:06:52.870036hostname sshd[114740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.248.81.93  user=root
2020-08-13T14:06:55.347603hostname sshd[114740]: Failed password for root from 192.248.81.93 port 39144 ssh2
...
2020-08-13 15:46:33
188.166.251.87 attackspam
Aug 13 03:52:44 IngegnereFirenze sshd[2297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.251.87  user=root
...
2020-08-13 15:49:01
139.155.11.173 attackspambots
SSH auth scanning - multiple failed logins
2020-08-13 16:00:11
60.174.228.220 attack
IMAP
2020-08-13 15:43:04

Recently Reported IPs

140.143.125.241 119.28.143.95 180.241.45.249 84.17.43.99
2001:41d0:8:e77e::1 142.93.10.247 177.156.226.147 130.90.134.131
36.228.81.28 113.170.207.92 13.90.44.92 36.68.5.190
69.30.223.2 36.6.56.35 0.179.241.230 101.27.61.110
8.6.134.137 60.135.116.159 176.28.13.152 14.54.29.225