Minutes ago (evening of November 21, 2019) we just stopped an unsuccessful login bruteforce attack. The attacker’s email address is email@example.com and the IPs used in the attack are 188.8.131.52 (a NordVPN IP), 184.108.40.206 and 220.127.116.11.
There were 27,601 login attempts from those IPs before stopped by Intelligence X staff.
As clearly stated in our Terms of Service, we are sharing information about attacks with the public and law enforcement.
The IP address 18.104.22.168 is associated with NordVPN – the domain fr253.nordvpn.com resolves to that IP address.
The email firstname.lastname@example.org has an user account at https://demonforums.net/ with the nickname “asd666”.
On November 22, 2019 an additional attempt was made from the IP 22.214.171.124 making 591 login requests.
The domain weleakinfo.com was seized yesterday by the FBI. The website shows a takedown notice and shows the logos of NCA, Politie, Police Service Northern Ireland, Department of Justice and Bundeskriminalamt. The note writes: This domain has been seizedThe domain for WELEAKINFO has been seized by the Federal Bureau of Investigation pursuant to a seizure
January 2020: OSINT Tool Update & Latest News 🕵🏻 OSINT Tools: Reverse Hash Lookup We have added a reverse hash lookup: https://intelx.io/tools?tab=hash The lookup takes as input a hash of type MD5, SHA1, SHA256, or SHA512. It then redirects the user to 3rd party sites which perform the reverse lookup. Potentially, it can be used
We are constantly indexing the latest whois data for our whois category. “Whois” data contains information about domain ownership. We recently indexed the whois data for October, November, and December 2019 which resulted in 21,168,724 selectors. We analyzed a small sample set (1 day, 2019-11-29) and these are the results: 75% of the data is