The Return of POP3: When Hackers Time-Travel to Steal Your Passwords!
Spotted in the wild: a blast from the past! The username “pop3user” is making a comeback in telnet/ssh logs. While the world has moved on to IMAP and webmail, one persistent hacker is betting on someone still clinging to POP3. The IP culprit? Part of AS47890, a network aptly managed by “Unmanaged.”

Hot Take:
Whoa, talk about a blast from the past! The “pop3user” username is making a comeback like bell-bottom jeans, and it looks like cyber attackers are trying to party like it’s 1999. Apparently, they’re banking on someone still using POP3 to retrieve emails, which is about as likely as finding a rotary phone in the wild. But hey, kudos to them for bringing retro back, one hack attempt at a time! It’s also amusing to find this exuberantly unmanaged network, managed by a company that seems to be taking its name a bit too literally. If only their humor matched their network security prowess!
Key Points:
- The “pop3user” username is being targeted in recent telnet/SSH logs.
- Classic passwords like “pop3user” and “123456” are being attempted.
- IP address 193.32.162.157 is responsible for the scanning activity.
- The IP is part of AS47890, managed by a supposedly unmanaged network.
- The network’s website is as blank as your mind during a pop quiz.