City: unknown
Region: unknown
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.163.87.0 - 103.163.87.255'
% Abuse contact for '103.163.87.0 - 103.163.87.255' is 'abuse@telkomsat.co.id'
inetnum: 103.163.87.0 - 103.163.87.255
netname: TELKOMSAT-ID
descr: PT Telkom Satelit Indonesia
descr: Internet Service Provider
descr: Jl. K. H. Sholeh Iskandar KM. 6, Cibadak
descr: Bogor, Jawa Barat, 16166
descr: Tanah Sareal, Bogor
country: ID
admin-c: HT667-AP
tech-c: HT667-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MNT-APJII-ID
mnt-irt: IRT-TELKOMSAT-ID
mnt-lower: MAINT-ID-TELKOMSAT
mnt-routes: MAINT-ID-TELKOMSAT
remarks: Send Spam & Abuse Reports to: admin@telkomsat.co.id
last-modified: 2023-12-27T04:51:20Z
source: APNIC
irt: IRT-TELKOMSAT-ID
address: TELKOMSAT
address: PT Telkom Satelit Indonesia
address: Jl. K. H. Sholeh Iskandar KM. 6, Cibadak
address: Bogor, Jawa Barat, 16166
e-mail: admin@telkomsat.co.id
abuse-mailbox: abuse@telkomsat.co.id
admin-c: HT667-AP
tech-c: HT667-AP
auth: # Filtered
remarks: admin@telkomsat.co.id was validated on 2023-10-18
mnt-by: MAINT-ID-TELKOMSAT
last-modified: 2026-03-09T15:39:22Z
source: APNIC
person: Hostmaster TELKOMSAT
address: Jl. K. H. Sholeh Iskandar KM.6, Cibadak, Bogor
address: Jawa Barat - Indonesia
country: ID
phone: +62-2518305400
e-mail: hostmaster@telkomsat.co.id
nic-hdl: HT667-AP
mnt-by: MAINT-ID-TELKOMSAT
fax-no: +62-2518305430
last-modified: 2022-08-30T04:54:17Z
source: APNIC
% Information related to '103.163.87.0/24AS10137'
route: 103.163.87.0/24
descr: Route Object of PATRA TELEKOMUNIKASI INDONESIA
descr: Kwarnas Building 17th Floor Merdeka Timur no.6 Jakarta 10110
origin: AS10137
mnt-by: MAINT-ID-PATRANET
last-modified: 2021-02-26T08:39:48Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.163.87.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57864
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.163.87.201. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040602 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 07 07:23:15 CST 2026
;; MSG SIZE rcvd: 107
Host 201.87.163.103.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 201.87.163.103.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 35.187.2.55 | attackspam | TCP port 10000: Scan and connection |
2020-07-18 16:19:45 |
| 52.233.184.83 | attackspam | Jul 18 09:42:44 dev sshd\[30862\]: Invalid user admin from 52.233.184.83 port 58525 Jul 18 09:42:44 dev sshd\[30862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.233.184.83 Jul 18 09:42:45 dev sshd\[30862\]: Failed password for invalid user admin from 52.233.184.83 port 58525 ssh2 |
2020-07-18 16:00:15 |
| 218.92.0.219 | attack | Jul 18 01:03:30 dignus sshd[6263]: Failed password for root from 218.92.0.219 port 39403 ssh2 Jul 18 01:03:32 dignus sshd[6263]: Failed password for root from 218.92.0.219 port 39403 ssh2 Jul 18 01:03:36 dignus sshd[6299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.219 user=root Jul 18 01:03:38 dignus sshd[6299]: Failed password for root from 218.92.0.219 port 47821 ssh2 Jul 18 01:03:41 dignus sshd[6299]: Failed password for root from 218.92.0.219 port 47821 ssh2 ... |
2020-07-18 16:11:57 |
| 168.61.51.224 | attackspambots | Jul 18 10:02:33 jane sshd[10848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.61.51.224 Jul 18 10:02:35 jane sshd[10848]: Failed password for invalid user admin from 168.61.51.224 port 5437 ssh2 ... |
2020-07-18 16:12:27 |
| 89.248.168.2 | attack | 2020-07-18T01:24:00.367893linuxbox-skyline auth[55377]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=info rhost=89.248.168.2 ... |
2020-07-18 15:46:54 |
| 216.126.58.139 | attackspambots | Invalid user jean from 216.126.58.139 port 50234 |
2020-07-18 16:17:21 |
| 218.92.0.195 | attackspam | Jul 18 10:04:14 dcd-gentoo sshd[668]: User root from 218.92.0.195 not allowed because none of user's groups are listed in AllowGroups Jul 18 10:04:17 dcd-gentoo sshd[668]: error: PAM: Authentication failure for illegal user root from 218.92.0.195 Jul 18 10:04:17 dcd-gentoo sshd[668]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.195 port 58718 ssh2 ... |
2020-07-18 16:08:24 |
| 35.186.173.231 | attackbots | Automatic report - XMLRPC Attack |
2020-07-18 16:02:30 |
| 185.63.253.26 | attackspam | 185.63.253.26 - - [18/Jul/2020:11:23:14 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2" ... |
2020-07-18 15:51:48 |
| 82.221.105.7 | attackbotsspam |
|
2020-07-18 16:10:06 |
| 168.61.52.106 | attackbots | Jul 18 07:37:38 marvibiene sshd[39093]: Invalid user admin from 168.61.52.106 port 46733 Jul 18 07:37:38 marvibiene sshd[39093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.61.52.106 Jul 18 07:37:38 marvibiene sshd[39093]: Invalid user admin from 168.61.52.106 port 46733 Jul 18 07:37:40 marvibiene sshd[39093]: Failed password for invalid user admin from 168.61.52.106 port 46733 ssh2 ... |
2020-07-18 15:45:36 |
| 144.217.94.188 | attackbots | Jul 18 06:53:42 vlre-nyc-1 sshd\[11978\]: Invalid user meng from 144.217.94.188 Jul 18 06:53:42 vlre-nyc-1 sshd\[11978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.94.188 Jul 18 06:53:44 vlre-nyc-1 sshd\[11978\]: Failed password for invalid user meng from 144.217.94.188 port 45802 ssh2 Jul 18 06:57:30 vlre-nyc-1 sshd\[12054\]: Invalid user telegraf from 144.217.94.188 Jul 18 06:57:30 vlre-nyc-1 sshd\[12054\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.94.188 ... |
2020-07-18 16:16:51 |
| 40.115.187.141 | attackbots | Jul 18 04:47:20 vps46666688 sshd[9952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.115.187.141 Jul 18 04:47:22 vps46666688 sshd[9952]: Failed password for invalid user admin from 40.115.187.141 port 43556 ssh2 ... |
2020-07-18 15:54:03 |
| 103.238.69.138 | attack | Jul 17 18:43:40 hanapaa sshd\[1579\]: Invalid user bs from 103.238.69.138 Jul 17 18:43:40 hanapaa sshd\[1579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.238.69.138 Jul 17 18:43:42 hanapaa sshd\[1579\]: Failed password for invalid user bs from 103.238.69.138 port 35056 ssh2 Jul 17 18:47:54 hanapaa sshd\[1960\]: Invalid user szd from 103.238.69.138 Jul 17 18:47:54 hanapaa sshd\[1960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.238.69.138 |
2020-07-18 16:08:06 |
| 51.254.156.114 | attackbots | firewall-block, port(s): 11579/tcp |
2020-07-18 16:19:21 |