User marten_o , the webmaster of blumental-server.de, joined AbuseIPDB in January 2024 and has reported 40,668 IP addresses.

Standing (weight) is good.

ACTIVE USER WEBMASTER SUPPORTER
IP Date Comment Categories
194.191.24.22
SASL LOGIN authentication failed:
Hacking Brute-Force
41.192.154.218
SASL LOGIN authentication failed:
Hacking Brute-Force
95.52.199.137
SASL LOGIN authentication failed:
Hacking Brute-Force
95.165.128.197
SASL LOGIN authentication failed:
Hacking Brute-Force
94.204.140.87
SASL LOGIN authentication failed:
Hacking Brute-Force
92.118.93.205
SASL LOGIN authentication failed:
Hacking Brute-Force
91.185.40.201
SASL LOGIN authentication failed:
Hacking Brute-Force
81.22.58.215
SASL LOGIN authentication failed:
Hacking Brute-Force
80.241.253.238
SASL LOGIN authentication failed:
Hacking Brute-Force
78.188.102.28
SASL LOGIN authentication failed:
Hacking Brute-Force
77.66.184.117
SASL LOGIN authentication failed:
Hacking Brute-Force
68.80.112.245
SASL LOGIN authentication failed:
Hacking Brute-Force
65.20.204.164
SASL LOGIN authentication failed:
Hacking Brute-Force
65.20.193.23
SASL LOGIN authentication failed:
Hacking Brute-Force
65.20.185.116
SASL LOGIN authentication failed:
Hacking Brute-Force
60.184.33.14
SASL LOGIN authentication failed:
Hacking Brute-Force
58.84.61.13
SASL LOGIN authentication failed:
Hacking Brute-Force
58.69.17.18
SASL LOGIN authentication failed:
Hacking Brute-Force
58.242.71.220
SASL LOGIN authentication failed:
Hacking Brute-Force
58.19.75.103
SASL LOGIN authentication failed:
Hacking Brute-Force
58.115.60.116
SASL LOGIN authentication failed:
Hacking Brute-Force
49.124.149.49
SASL LOGIN authentication failed:
Hacking Brute-Force
47.106.111.17
SASL LOGIN authentication failed:
Hacking Brute-Force
45.64.224.97
SASL LOGIN authentication failed:
Hacking Brute-Force
43.133.185.200
SASL LOGIN authentication failed:
Hacking Brute-Force