City: unknown
Region: unknown
Country: Czech Republic
Internet Service Provider: Ales Krepela - KREPNET
Hostname: unknown
Organization: unknown
Usage Type: Fixed Line ISP
Type | Details | Datetime |
---|---|---|
attackbotsspam | Aug 27 11:22:42 mail.srvfarm.net postfix/smtps/smtpd[1499868]: warning: unknown[93.99.4.22]: SASL PLAIN authentication failed: Aug 27 11:22:42 mail.srvfarm.net postfix/smtps/smtpd[1499868]: lost connection after AUTH from unknown[93.99.4.22] Aug 27 11:24:17 mail.srvfarm.net postfix/smtps/smtpd[1499867]: warning: unknown[93.99.4.22]: SASL PLAIN authentication failed: Aug 27 11:24:17 mail.srvfarm.net postfix/smtps/smtpd[1499867]: lost connection after AUTH from unknown[93.99.4.22] Aug 27 11:30:04 mail.srvfarm.net postfix/smtpd[1488223]: warning: unknown[93.99.4.22]: SASL PLAIN authentication failed: |
2020-08-28 08:15:55 |
attackspambots | Jul 9 13:50:53 mail.srvfarm.net postfix/smtpd[3819465]: warning: unknown[93.99.4.22]: SASL PLAIN authentication failed: Jul 9 13:50:53 mail.srvfarm.net postfix/smtpd[3819465]: lost connection after AUTH from unknown[93.99.4.22] Jul 9 13:52:25 mail.srvfarm.net postfix/smtpd[3817751]: warning: unknown[93.99.4.22]: SASL PLAIN authentication failed: Jul 9 13:52:25 mail.srvfarm.net postfix/smtpd[3817751]: lost connection after AUTH from unknown[93.99.4.22] Jul 9 13:56:23 mail.srvfarm.net postfix/smtpd[3825207]: warning: unknown[93.99.4.22]: SASL PLAIN authentication failed: |
2020-07-10 01:07:15 |
attackspambots | (smtpauth) Failed SMTP AUTH login from 93.99.4.22 (CZ/Czechia/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-10 08:25:06 plain authenticator failed for ([93.99.4.22]) [93.99.4.22]: 535 Incorrect authentication data (set_id=sale@emad-security.com) |
2020-05-10 13:30:16 |
IP | Type | Details | Datetime |
---|---|---|---|
93.99.4.23 | attack | Sep 15 18:40:20 mail.srvfarm.net postfix/smtps/smtpd[2822043]: warning: unknown[93.99.4.23]: SASL PLAIN authentication failed: Sep 15 18:40:20 mail.srvfarm.net postfix/smtps/smtpd[2822043]: lost connection after AUTH from unknown[93.99.4.23] Sep 15 18:40:50 mail.srvfarm.net postfix/smtps/smtpd[2827555]: warning: unknown[93.99.4.23]: SASL PLAIN authentication failed: Sep 15 18:40:50 mail.srvfarm.net postfix/smtps/smtpd[2827555]: lost connection after AUTH from unknown[93.99.4.23] Sep 15 18:48:25 mail.srvfarm.net postfix/smtpd[2827929]: warning: unknown[93.99.4.23]: SASL PLAIN authentication failed: |
2020-09-17 02:39:58 |
93.99.4.23 | attack | Sep 15 18:40:20 mail.srvfarm.net postfix/smtps/smtpd[2822043]: warning: unknown[93.99.4.23]: SASL PLAIN authentication failed: Sep 15 18:40:20 mail.srvfarm.net postfix/smtps/smtpd[2822043]: lost connection after AUTH from unknown[93.99.4.23] Sep 15 18:40:50 mail.srvfarm.net postfix/smtps/smtpd[2827555]: warning: unknown[93.99.4.23]: SASL PLAIN authentication failed: Sep 15 18:40:50 mail.srvfarm.net postfix/smtps/smtpd[2827555]: lost connection after AUTH from unknown[93.99.4.23] Sep 15 18:48:25 mail.srvfarm.net postfix/smtpd[2827929]: warning: unknown[93.99.4.23]: SASL PLAIN authentication failed: |
2020-09-16 18:58:53 |
93.99.4.38 | attackbots | SASL PLAIN auth failed: ruser=... |
2020-07-17 06:37:07 |
93.99.4.23 | attack | Brute force attempt |
2020-05-24 01:29:57 |
93.99.49.50 | attackspambots | Unauthorized connection attempt detected from IP address 93.99.49.50 to port 23 [J] |
2020-01-22 23:34:06 |
93.99.42.18 | attack | Jul 15 08:16:01 rigel postfix/smtpd[31991]: warning: hostname 18pc.vranet.cz does not resolve to address 93.99.42.18 Jul 15 08:16:01 rigel postfix/smtpd[31991]: connect from unknown[93.99.42.18] Jul 15 08:16:02 rigel postfix/smtpd[31991]: warning: unknown[93.99.42.18]: SASL CRAM-MD5 authentication failed: authentication failure Jul 15 08:16:02 rigel postfix/smtpd[31991]: warning: unknown[93.99.42.18]: SASL PLAIN authentication failed: authentication failure Jul 15 08:16:02 rigel postfix/smtpd[31991]: warning: unknown[93.99.42.18]: SASL LOGIN authentication failed: authentication failure Jul 15 08:16:02 rigel postfix/smtpd[31991]: disconnect from unknown[93.99.42.18] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=93.99.42.18 |
2019-07-15 21:04:32 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.99.4.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9928
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;93.99.4.22. IN A
;; AUTHORITY SECTION:
. 306 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020050901 1800 900 604800 86400
;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 10 13:30:10 CST 2020
;; MSG SIZE rcvd: 114
Host 22.4.99.93.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 22.4.99.93.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
5.196.94.68 | attackbotsspam | Aug 13 07:36:34 sso sshd[19261]: Failed password for root from 5.196.94.68 port 57602 ssh2 ... |
2020-08-13 16:23:25 |
131.100.25.143 | attackspam | From send-alceu-1618-alkosa.com.br-8@viptop.com.br Thu Aug 13 02:25:14 2020 Received: from mm25-143.viptop.com.br ([131.100.25.143]:54427) |
2020-08-13 16:17:16 |
136.243.72.5 | attack | Aug 13 09:54:18 relay postfix/smtpd\[5850\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 13 09:54:18 relay postfix/smtpd\[5846\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 13 09:54:18 relay postfix/smtpd\[6704\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 13 09:54:18 relay postfix/smtpd\[6153\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 13 09:54:18 relay postfix/smtpd\[5868\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 13 09:54:18 relay postfix/smtpd\[5912\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 13 09:54:18 relay postfix/smtpd\[7262\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 13 09:54:18 relay postfix/smtpd\[7263\]: warning: mon.riss ... |
2020-08-13 15:57:05 |
141.98.9.161 | attackspambots | SSH Brute-Force attacks |
2020-08-13 15:55:37 |
195.243.132.248 | attackbotsspam | Aug 13 00:45:08 ws22vmsma01 sshd[31269]: Failed password for root from 195.243.132.248 port 35992 ssh2 ... |
2020-08-13 15:45:08 |
201.132.87.151 | attackbots | Symantec Web Gateway Remote Command Execution Vulnerability, PTR: customer-TXP-MCA-87-151.megared.net.mx. |
2020-08-13 16:20:06 |
223.149.187.206 | attackbots | Unauthorised access (Aug 13) SRC=223.149.187.206 LEN=60 TTL=50 ID=60323 DF TCP DPT=23 WINDOW=5440 SYN |
2020-08-13 15:49:57 |
106.13.37.213 | attackbots | failed root login |
2020-08-13 16:20:29 |
144.91.65.110 | attack | 2020-08-13T16:29:12.798268luisaranguren sshd[1483190]: Disconnected from 144.91.65.110 port 41574 [preauth] 2020-08-13T17:19:48.060359luisaranguren sshd[1501822]: Disconnected from 144.91.65.110 port 46818 [preauth] ... |
2020-08-13 15:57:30 |
190.167.71.4 | attackbots | Microsoft SQL Server User Authentication Brute Force Attempt , PTR: 4.71.167.190.d.dyn.codetel.net.do. |
2020-08-13 16:14:58 |
190.215.117.149 | attackbots | Microsoft SQL Server User Authentication Brute Force Attempt , PTR: static.190.215.117.149.gtdinternet.com. |
2020-08-13 16:22:52 |
192.248.81.93 | attackbotsspam | 2020-08-13T14:03:06.627954hostname sshd[114404]: Failed password for root from 192.248.81.93 port 49113 ssh2 2020-08-13T14:06:52.870036hostname sshd[114740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.248.81.93 user=root 2020-08-13T14:06:55.347603hostname sshd[114740]: Failed password for root from 192.248.81.93 port 39144 ssh2 ... |
2020-08-13 15:46:33 |
188.166.251.87 | attackspam | Aug 13 03:52:44 IngegnereFirenze sshd[2297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.251.87 user=root ... |
2020-08-13 15:49:01 |
139.155.11.173 | attackspambots | SSH auth scanning - multiple failed logins |
2020-08-13 16:00:11 |
60.174.228.220 | attack | IMAP |
2020-08-13 15:43:04 |