Go
93.61.108.20
is an
Open Proxy
used by
Hackers
100 %
Italy
Report Abuse
111attacks reported
38Brute-Force
20Brute-ForceWeb App Attack
13Web App Attack
10Brute-ForceSSH
7uncategorized
6HackingBrute-Force
4Brute-ForceMailserver Attack
3Brute-ForceExploited Host
2Hacking
2SSH
...
14abuse reported
7Web SpamForum Spam
3uncategorized
2Email SpamBrute-Force
1Bad Web Bot
1Email Spam
2spam reported
1uncategorized
1Email Spam
1anonymizers reported
1Open ProxyVPN IPHackingSpoofingExploited HostWeb App Attack
from 41 distinct reporters
and 8 distinct sources : blocklist.net.ua, FireHOL, GPF Comics, VoIPBL.org, BadIPs.com, Blocklist.de, StopForumSpam.com, AbuseIPDB
93.61.108.20 was first signaled at 2017-12-13 22:41 and last record was at 2020-08-03 12:52.
IP

93.61.108.20

Organization
Internet Assigned Numbers Authority
Localisation
Italy
Puglia, Orta Nova
NetRange : First & Last IP
0.0.0.0 - 255.255.255.255
Network CIDR
0.0.0.0/0

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-06-10 22:10 attacks Brute-Force AbuseIPDB POP
2019-06-09 16:22 attacks Brute-Force AbuseIPDB IMAP brute force
2019-06-09 10:52 attacks Brute-Force AbuseIPDB $f2bV_matches
2019-06-04 00:38 attacks Brute-ForceExploited Host AbuseIPDB Brute force attempt
2019-06-04 00:21 attacks Brute-Force AbuseIPDB (imapd) Failed IMAP login from 93.61.108.20 (IT/Italy/93-61-108-20.ip146.fastwebnet.it): 1 in the last 3600 secs
2019-06-02 19:09 attacks HackingBrute-Force AbuseIPDB 03.06.2019 06:09:31 - Login Fail on hMailserver Detected by ELinOX-hMail-A2F
2019-06-02 03:24 abuse Email SpamBrute-Force AbuseIPDB imap. Unknown user
2019-06-02 03:00 attacks Brute-Force AbuseIPDB Unauthorized connection attempt from IP address 93.61.108.20 on Port 143(IMAP)
2019-06-01 23:44 attacks Brute-Force AbuseIPDB IMAP brute force
2019-05-27 05:29 attacks Brute-Force AbuseIPDB May 27 09:29:13 mailman dovecot: imap-login: Disconnected (auth failed, 1 attempts): user=<[munged]@[munged]>, method=PLAIN, rip=93.61.108.20, l
2019-05-23 23:57 attacks Brute-Force AbuseIPDB IMAP
2019-05-23 01:33 attacks Brute-ForceExploited Host AbuseIPDB Brute force attempt
2019-05-22 20:30 attacks Brute-Force AbuseIPDB Unauthorized connection attempt from IP address 93.61.108.20 on Port 143(IMAP)
2019-05-18 21:54 attacks Brute-Force AbuseIPDB (imapd) Failed IMAP login from 93.61.108.20 (IT/Italy/93-61-108-20.ip146.fastwebnet.it): 1 in the last 3600 secs
2019-05-17 13:59 attacks HackingBrute-Force AbuseIPDB 2019/05/15 02:30:26 \[error\] 5809\#0: \*2922 An error occurred in mail zmauth: user not found:[email protected] while SSL handshaking to lookup
2019-05-17 12:10 attacks Brute-Force AbuseIPDB (imapd) Failed IMAP login from 93.61.108.20 (IT/Italy/93-61-108-20.ip146.fastwebnet.it): 1 in the last 3600 secs
2019-05-16 08:12 attacks Brute-Force AbuseIPDB (imapd) Failed IMAP login from 93.61.108.20 (IT/Italy/93-61-108-20.ip146.fastwebnet.it): 1 in the last 3600 secs
2019-05-14 17:30 attacks HackingBrute-Force AbuseIPDB 2019/05/15 02:30:26 \[error\] 5809\#0: \*2922 An error occurred in mail zmauth: user not found:[email protected] while SSL handshaking to lookup
2019-05-14 00:33 attacks HackingBrute-Force AbuseIPDB 14.05.2019 11:32:52 - Login Fail on hMailserver Detected by ELinOX-hMail-A2F
2019-05-04 21:42 attacks Brute-Force AbuseIPDB (imapd) Failed IMAP login from 93.61.108.20 (IT/Italy/93-61-108-20.ip146.fastwebnet.it): 1 in the last 3600 secs
2019-05-04 12:43 attacks Brute-Force AbuseIPDB (imapd) Failed IMAP login from 93.61.108.20 (IT/Italy/93-61-108-20.ip146.fastwebnet.it): 1 in the last 3600 secs
2019-05-03 12:12 attacks Brute-Force AbuseIPDB (imapd) Failed IMAP login from 93.61.108.20 (IT/Italy/93-61-108-20.ip146.fastwebnet.it): 1 in the last 3600 secs
2019-05-02 13:21 attacks Brute-Force AbuseIPDB (imapd) Failed IMAP login from 93.61.108.20 (IT/Italy/93-61-108-20.ip146.fastwebnet.it): 1 in the last 3600 secs
2019-05-01 17:45 attacks Brute-ForceWeb App Attack AbuseIPDB 93.61.108.20 - - \[02/May/2019:04:45:52 +0200\] "POST /wp-login.php HTTP/1.1" 200 4187 "-" "Mozilla/5.0 \(Windows NT 6.1\; rv
2019-05-01 13:55 attacks Brute-ForceSSH AbuseIPDB SSH invalid-user multiple login try
2019-05-01 09:48 attacks Brute-Force AbuseIPDB (imapd) Failed IMAP login from 93.61.108.20 (IT/Italy/93-61-108-20.ip146.fastwebnet.it): 1 in the last 3600 secs
2019-04-30 07:08 attacks Brute-Force AbuseIPDB (imapd) Failed IMAP login from 93.61.108.20 (IT/Italy/93-61-108-20.ip146.fastwebnet.it): 1 in the last 3600 secs
2019-04-28 19:38 attacks Brute-Force AbuseIPDB  
2019-04-28 08:34 attacks Brute-Force AbuseIPDB (imapd) Failed IMAP login from 93.61.108.20 (IT/Italy/93-61-108-20.ip146.fastwebnet.it): 1 in the last 3600 secs
2019-04-23 10:33 attacks Brute-Force AbuseIPDB 93.61.108.20 - - \[23/Apr/2019:22:33:02 +0300\] \"POST /wp-login.php HTTP/1.1\" 200 3496 93.61.108.20 - - \[23/Apr/2019:22:33:03 +0300\] \&q
2019-04-19 10:16 abuse Email SpamBrute-Force AbuseIPDB proto=tcp . spt=51718 . dpt=25 . (listed on Blocklist de Apr 19 18:33) (768)
2019-04-18 07:23 attacks Brute-ForceWeb App Attack AbuseIPDB Attempts at hacking WordPress user password.
2019-04-15 11:33 attacks HackingBrute-Force AbuseIPDB 2019/04/15 20:33:23 \[error\] 28648\#0: \*616 An error occurred in mail zmauth: user not found:[email protected] while SSL handshaking to lookup
2019-04-13 01:24 attacks HackingBrute-Force AbuseIPDB 13.04.2019 12:24:50 - Login Fail on hMailserver Detected by ELinOX-hMail-A2F
2019-04-12 01:16 attacks Brute-Force AbuseIPDB (imapd) Failed IMAP login from 93.61.108.20 (IT/Italy/93-61-108-20.ip146.fastwebnet.it): 1 in the last 3600 secs
2019-04-10 05:42 attacks Brute-Force AbuseIPDB (imapd) Failed IMAP login from 93.61.108.20 (IT/Italy/93-61-108-20.ip146.fastwebnet.it): 1 in the last 3600 secs
2019-04-09 09:55 attacks Brute-ForceWeb App Attack AbuseIPDB [munged]::443 93.61.108.20 - - [09/Apr/2019:20:55:37 +0200] "POST /[munged]: HTTP/1.1" 200 17348 "-" "Mozilla/5.0 (Windows NT
2019-04-07 16:04 attacks Brute-Force AbuseIPDB (imapd) Failed IMAP login from 93.61.108.20 (IT/Italy/93-61-108-20.ip146.fastwebnet.it): 1 in the last 3600 secs
2019-04-06 12:32 attacks Brute-Force AbuseIPDB (imapd) Failed IMAP login from 93.61.108.20 (IT/Italy/93-61-108-20.ip146.fastwebnet.it): 1 in the last 3600 secs
2019-04-02 13:01 attacks Brute-Force AbuseIPDB (imapd) Failed IMAP login from 93.61.108.20 (IT/Italy/93-61-108-20.ip146.fastwebnet.it): 1 in the last 3600 secs
2019-03-25 18:02 attacks Brute-Force AbuseIPDB (imapd) Failed IMAP login from 93.61.108.20 (IT/Italy/93-61-108-20.ip146.fastwebnet.it): 1 in the last 3600 secs
2019-02-27 19:16 attacks Brute-Force AbuseIPDB (imapd) Failed IMAP login from 93.61.108.20 (IT/Italy/93-61-108-20.ip146.fastwebnet.it): 1 in the last 3600 secs
2019-02-12 03:15 attacks Brute-Force AbuseIPDB Wordpress Admin Login attack
2019-02-12 00:37 attacks Brute-ForceWeb App Attack AbuseIPDB WP Authentication failure
2019-02-07 10:48 attacks Brute-ForceSSH AbuseIPDB Feb 7 21:48:12 nextcloud sshd\[8726\]: Invalid user admin from 93.61.108.20 Feb 7 21:48:12 nextcloud sshd\[8726\]: pam_unix\(sshd:auth\): authenticati
2019-02-01 14:33 attacks Brute-ForceWeb App Attack AbuseIPDB 93.61.108.20 - - \[02/Feb/2019:01:33:41 +0100\] "POST /wp-login.php HTTP/1.1" 302 5 "-" "Mozilla/5.0 \(Windows NT 6.1\; rv:52
2019-01-31 01:47 anonymizers Open ProxyVPN IPHackingSpoofing AbuseIPDB  
2019-01-29 21:22 attacks Brute-ForceWeb App Attack AbuseIPDB 93.61.108.20 - - \[30/Jan/2019:08:21:52 +0100\] "POST /wp-login.php HTTP/1.1" 200 4465 "-" "Mozilla/5.0 \(Windows NT 6.1\; rv
2019-01-16 22:31 attacks Brute-ForceSSH AbuseIPDB  
2019-01-05 00:02 abuse Bad Web Bot AbuseIPDB BadRequests
2017-12-13 22:41 attacks FTP Brute-ForceHacking AbuseIPDB Dec 14 09:22:14 barkel sshd[31390]: Invalid user admin from 93.61.108.20 port 55874 Dec 14 09:22:14 barkel sshd[31390]: pam_unix(sshd:auth): authentic
2017-12-29 09:34 attacks AbuseIPDB unauthorized ssh connection attempt
2018-02-05 18:11 attacks Brute-Force AbuseIPDB Fail2Ban Ban Triggered (2)
2018-05-13 13:16 attacks Brute-ForceSSH AbuseIPDB  
2018-05-21 02:07 attacks Port Scan AbuseIPDB port scan and connect, tcp 22 (ssh)
2018-05-21 07:06 attacks Brute-ForceSSH AbuseIPDB  
2018-06-27 10:43 attacks Fraud OrdersDDoS AttackBrute-ForceExploited Host AbuseIPDB Automated Account Creation Attack
2018-08-13 18:17 attacks Brute-Force AbuseIPDB  
2018-08-22 16:23 attacks Web App Attack AbuseIPDB entzueckt.de 93.61.108.20 \[23/Aug/2018:03:23:36 +0200\] "POST /wp-login.php HTTP/1.1" 200 6918 "-" "Mozilla/5.0 \(Windows NT
2018-08-24 05:43 attacks Web App Attack AbuseIPDB www.pfaffenroth-photographie.de 93.61.108.20 \[24/Aug/2018:16:43:53 +0200\] "POST /wp-login.php HTTP/1.1" 200 7846 "-" "Mozil
2019-03-29 18:21 abuse Email Spam blocklist_net_ua blocklist.net.ua  
2019-03-29 18:27 attacks firehol_level4 FireHOL  
2019-03-29 18:34 abuse gpf_comics GPF Comics  
2019-03-29 18:38 spam lashback_ubl  
2019-03-29 18:53 attacks Fraud VoIP voipbl VoIPBL.org  
2019-05-28 23:18 attacks bi_any_1_7d BadIPs.com  
2019-05-28 23:18 attacks bi_any_2_30d BadIPs.com  
2019-05-28 23:18 attacks bi_any_2_7d BadIPs.com  
2019-05-28 23:19 attacks SSH bi_ssh_1_7d BadIPs.com  
2019-05-28 23:19 attacks SSH bi_ssh_2_30d BadIPs.com  
2019-05-30 09:29 attacks bi_any_0_1d BadIPs.com  
2019-05-30 09:30 attacks Brute-ForceMailserver Attack bi_dovecot-pop3imap_0_1d BadIPs.com  
2019-05-30 09:30 attacks Brute-ForceMailserver Attack bi_mail_0_1d BadIPs.com  
2019-06-05 20:34 attacks blocklist_de Blocklist.de  
2019-06-05 20:35 attacks Brute-ForceMailserver Attack blocklist_de_imap Blocklist.de  
2019-06-05 20:35 attacks Brute-ForceMailserver Attack blocklist_de_mail Blocklist.de  
2019-06-05 20:41 attacks firehol_level2 FireHOL  
2019-07-17 02:10 spam Email Spam nixspam  
2020-07-31 16:00 abuse firehol_abusers_1d FireHOL  
2020-07-31 16:17 abuse Web SpamForum Spam stopforumspam_180d StopForumSpam.com  
2020-07-31 16:18 abuse Web SpamForum Spam stopforumspam_1d StopForumSpam.com  
2020-07-31 16:18 abuse Web SpamForum Spam stopforumspam_30d StopForumSpam.com  
2020-08-01 14:59 abuse firehol_abusers_30d FireHOL  
2020-08-01 15:10 abuse Web SpamForum Spam stopforumspam StopForumSpam.com  
2020-08-01 15:12 abuse Web SpamForum Spam stopforumspam_365d StopForumSpam.com  
2020-08-01 15:13 abuse Web SpamForum Spam stopforumspam_7d StopForumSpam.com  
2020-08-01 15:14 abuse Web SpamForum Spam stopforumspam_90d StopForumSpam.com  
2020-08-03 12:52 attacks Web App AttackApache Attack blocklist_de_apache Blocklist.de  
2020-08-03 12:52 attacks Brute-Force blocklist_de_bruteforce Blocklist.de  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

inetnum: 0.0.0.0 - 255.255.255.255
netname: IANA-BLK
descr: The whole IPv4 address space
country: EU # Country field is actually all countries in the world and not just EU countries
org: ORG-IANA1-RIPE
admin-c: IANA1-RIPE
tech-c: IANA1-RIPE
status: ALLOCATED UNSPECIFIED
remarks: This object represents all IPv4 addresses.
remarks: If you see this object as a result of a single IP query, it
remarks: means that the IP address you are querying is currently not
remarks: assigned to any organisation.
mnt-by: RIPE-NCC-HM-MNT
mnt-lower: RIPE-NCC-HM-MNT
created: 2002-06-25T14:19:09Z
last-modified: 2018-11-23T10:30:34Z
source: RIPE

organisation: ORG-IANA1-RIPE
org-name: Internet Assigned Numbers Authority
org-type: IANA
address: see http://www.iana.org
remarks: The IANA allocates IP addresses and AS number blocks to RIRs
remarks: see http://www.iana.org/numbers
admin-c: IANA1-RIPE
tech-c: IANA1-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-by: RIPE-NCC-HM-MNT
created: 2004-04-17T09:57:29Z
last-modified: 2013-07-22T12:03:42Z
source: RIPE # Filtered

role: Internet Assigned Numbers Authority
address: see http://www.iana.org.
admin-c: IANA1-RIPE
tech-c: IANA1-RIPE
nic-hdl: IANA1-RIPE
remarks: For more information on IANA services
remarks: go to IANA web site at http://www.iana.org.
mnt-by: RIPE-NCC-MNT
created: 1970-01-01T00:00:00Z
last-modified: 2001-09-22T09:31:27Z
source: RIPE # Filtered
most specific ip range is highlighted
Updated : 2020-08-08