On Tue, Sep 07, 2021 at 02:50:09PM -0400, Viktor Dukhovni wrote:

>     inetnum:        77.247.110.0 - 77.247.110.255
>     netname:        PEENQ-NL-TLN-VPS-01
>     country:        NL
>     geoloc:         52.370216 4.895168
>     admin-c:        PA10298-RIPE
>     tech-c:         PA10298-RIPE
>     org:            ORG-PNQ1-RIPE
>     status:         ASSIGNED PA
>     mnt-by:         MNT-PEENQ
>     created:        2019-03-01T16:28:00Z
>     last-modified:  2021-02-05T10:53:28Z
>     source:         RIPE
> 
>     organisation:   ORG-PNQ1-RIPE
>     org-name:       PEENQ.NL
>     org-type:       OTHER
>     address:        Netherlands
> 
> You could try reaching out to the network provider, web site says:
> 
>     info (at) peenq (dot) nl

Also, the reverse (PTR) zone points back to "estoxy.com":

    110.247.77.in-addr.arpa. SOA rdns1.estoxy.com. estoxy.gmail.com. 2021080901 
28800 7200 604800 86400

who have an abuse reporting page at:

    https://panel.estoxy.com/submitticket.php?step=2&deptid=4

That said, SASL credential brute-force attempts use compromised botnet
nodes from all over the planet, so ultimately you're playing
whack-a-mole.  Hence if any one IP address is sourcing large enough
batches of AUTH attempts, fail2ban can help cap the oracle response
rate.

-- 
    VIktor.

Reply via email to