Login Bruteforce attempts against intelx.io

Published on November 21, 2019 by

Minutes ago (evening of November 21, 2019) we just stopped an unsuccessful login bruteforce attack. The attacker’s email address is primeday@protonmail.com and the IPs used in the attack are 163.172.225.39 (a NordVPN IP), 94.36.97.33 and 87.0.205.119.

There were 27,601 login attempts from those IPs before stopped by Intelligence X staff.

As clearly stated in our Terms of Service, we are sharing information about attacks with the public and law enforcement.

Additional Information

The IP address 163.172.225.39 is associated with NordVPN – the domain fr253.nordvpn.com resolves to that IP address.

The email primeday@protonmail.com has an user account at https://demonforums.net/ with the nickname “asd666”.

On November 22, 2019 an additional attempt was made from the IP 209.107.196.128 making 591 login requests.

Related articles

List of buckets

Published on May 5, 2022 by

At Intelligence X we categorize data sources into buckets. Buckets can be used as filters and to broadly identify the source of individual search results. For example, the bucket “Darknet Tor” indicates the result origins from some a Tor hidden service (.onion domain) and was collected by our Tor crawler. Buckets have human readable names


Adding support for new top-level domains

Published on April 6, 2022 by

We just added support for an additional 152 top-level domains (TLDs), increasing the support to 511 TLDs in total. Support means that you can search for those domains across intelx.io and APIs, and internally that our backend supports processing them. While you can start searching for them immediately, it will take some time until our


A word of #OPSEC @theguardian

Published on March 7, 2022 by

Earlier today at 11:24 The Guardian Journalist Shaun Walker posted the security procedure and the security token used to pass makeshift checkpoints in Ukraine related to the Russian Ukrainian war: This is a reminder to journalists – and the public – to take OPSEC (operations security) seriously and not endanger people on the ground. Posting


Search the blog: