City: unknown
Region: unknown
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.207.96.0 - 103.207.99.255'
% Abuse contact for '103.207.96.0 - 103.207.99.255' is 'abuse@jks.co.id'
inetnum: 103.207.96.0 - 103.207.99.255
netname: JKSNET-ID
descr: PT Jaya Kartha Solusindo
descr: Internet Service Provider
descr: Jl. Tegal Dukuh Selatan No.88X
descr: Padangsambian, Denpasar Barat
descr: Denpasar, Bali, 80117
admin-c: JT1398-AP
tech-c: JT1398-AP
country: ID
mnt-by: MNT-APJII-ID
mnt-lower: MAINT-ID-JKS
mnt-irt: IRT-JKS-ID
mnt-routes: MAINT-ID-JKS
status: ALLOCATED PORTABLE
last-modified: 2016-01-25T07:18:37Z
source: APNIC
irt: IRT-JKS-ID
address: PT Jaya Kartha Solusindo
address: Jl. Tegal Dukuh Selatan No.88X
address: Padangsambian, Denpasar Barat
address: Denpasar, Bali, 80117
e-mail: info@jks.co.id
abuse-mailbox: abuse@jks.co.id
admin-c: JT1398-AP
tech-c: JT1398-AP
auth: # Filtered
mnt-by: MAINT-ID-JKS
last-modified: 2025-09-04T04:54:23Z
source: APNIC
person: Jeschae Thosuly
address: Jl. Tegal Dukuh Selatan No.88X
address: Bali 80117, Indonesia
country: ID
phone: +62-361-9005077
e-mail: jetho@jks.co.id
nic-hdl: JT1398-AP
mnt-by: MAINT-ID-JKS
fax-no: +62-361-9005077
last-modified: 2016-01-25T07:24:55Z
source: APNIC
% Information related to '103.207.96.0/22AS134643'
route: 103.207.96.0/22
descr: Route Object for JKSNET
descr: Internet Service Provider
descr: Jl. Tegal Dukuh Selatan No.88X
descr: Padangsambian, Denpasar Barat
descr: Denpasar, Bali, 80117
origin: AS134643
mnt-by: MAINT-ID-JKS
last-modified: 2016-01-28T04:03:04Z
source: APNIC
% Information related to '103.207.96.0 - 103.207.99.255'
inetnum: 103.207.96.0 - 103.207.99.255
netname: JKSNET-ID
descr: PT Jaya Kartha Solusindo
descr: Internet Service Provider
descr: Jl. Tegal Dukuh Selatan No.88X
descr: Padangsambian, Denpasar Barat
descr: Denpasar, Bali, 80117
admin-c: JT1398-AP
tech-c: JT1398-AP
country: ID
mnt-by: MNT-APJII-ID
mnt-lower: MAINT-ID-JKS
mnt-irt: IRT-JKS-ID
mnt-routes: MAINT-ID-JKS
status: ALLOCATED PORTABLE
last-modified: 2016-01-25T07:18:37Z
source: IDNIC
irt: IRT-JKS-ID
address: PT Jaya Kartha Solusindo
address: Jl. Tegal Dukuh Selatan No.88X
address: Padangsambian, Denpasar Barat
address: Denpasar, Bali, 80117
e-mail: info@jks.co.id
abuse-mailbox: abuse@jks.co.id
admin-c: JT1398-AP
tech-c: JT1398-AP
auth: # Filtered
mnt-by: MAINT-ID-JKS
last-modified: 2016-01-05T07:16:50Z
source: IDNIC
person: Jeschae Thosuly
address: Jl. Tegal Dukuh Selatan No.88X
address: Bali 80117, Indonesia
country: ID
phone: +62-361-9005077
e-mail: jetho@jks.co.id
nic-hdl: JT1398-AP
mnt-by: MAINT-ID-JKS
fax-no: +62-361-9005077
last-modified: 2016-01-25T07:24:55Z
source: IDNIC
% Information related to '103.207.96.0/22AS134643'
route: 103.207.96.0/22
descr: Route Object for JKSNET
descr: Internet Service Provider
descr: Jl. Tegal Dukuh Selatan No.88X
descr: Padangsambian, Denpasar Barat
descr: Denpasar, Bali, 80117
origin: AS134643
mnt-by: MAINT-ID-JKS
last-modified: 2016-01-28T04:03:04Z
source: IDNIC
% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.207.99.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18135
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.207.99.1. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025110601 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 07 05:31:06 CST 2025
;; MSG SIZE rcvd: 105
b'Host 1.99.207.103.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 103.207.99.1.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 159.203.203.64 | attackspam | port scan and connect, tcp 143 (imap) |
2019-09-06 12:08:56 |
| 49.81.231.186 | attackbots | Brute force attempt |
2019-09-06 11:54:35 |
| 110.88.25.14 | attackspam | Fail2Ban - FTP Abuse Attempt |
2019-09-06 12:30:53 |
| 112.85.42.177 | attackbotsspam | $f2bV_matches |
2019-09-06 11:54:17 |
| 54.38.185.87 | attackbotsspam | Sep 6 06:12:28 markkoudstaal sshd[13046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.185.87 Sep 6 06:12:30 markkoudstaal sshd[13046]: Failed password for invalid user 1 from 54.38.185.87 port 46828 ssh2 Sep 6 06:16:51 markkoudstaal sshd[13396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.185.87 |
2019-09-06 12:24:34 |
| 205.185.125.82 | attackbotsspam | Fail2Ban - SSH Bruteforce Attempt |
2019-09-06 11:56:14 |
| 46.101.255.104 | attackbotsspam | Sep 5 16:01:38 hcbb sshd\[27141\]: Invalid user ftpadmin from 46.101.255.104 Sep 5 16:01:38 hcbb sshd\[27141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.255.104 Sep 5 16:01:40 hcbb sshd\[27141\]: Failed password for invalid user ftpadmin from 46.101.255.104 port 36360 ssh2 Sep 5 16:10:52 hcbb sshd\[28360\]: Invalid user sysop from 46.101.255.104 Sep 5 16:10:52 hcbb sshd\[28360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.255.104 |
2019-09-06 11:49:17 |
| 14.63.165.49 | attack | Sep 5 19:17:40 aat-srv002 sshd[32607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.165.49 Sep 5 19:17:42 aat-srv002 sshd[32607]: Failed password for invalid user 1234567890 from 14.63.165.49 port 49610 ssh2 Sep 5 19:22:50 aat-srv002 sshd[32750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.165.49 Sep 5 19:22:53 aat-srv002 sshd[32750]: Failed password for invalid user root123 from 14.63.165.49 port 43505 ssh2 ... |
2019-09-06 11:54:55 |
| 140.143.157.33 | attack | Sep 5 22:36:48 aat-srv002 sshd[6171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.157.33 Sep 5 22:36:50 aat-srv002 sshd[6171]: Failed password for invalid user mumbleserver from 140.143.157.33 port 44046 ssh2 Sep 5 22:41:01 aat-srv002 sshd[6315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.157.33 Sep 5 22:41:03 aat-srv002 sshd[6315]: Failed password for invalid user svnuser from 140.143.157.33 port 54390 ssh2 ... |
2019-09-06 11:57:11 |
| 111.177.32.83 | attackbots | Sep 6 06:50:07 intra sshd\[35940\]: Invalid user ansible from 111.177.32.83Sep 6 06:50:10 intra sshd\[35940\]: Failed password for invalid user ansible from 111.177.32.83 port 34308 ssh2Sep 6 06:55:00 intra sshd\[36029\]: Invalid user demo from 111.177.32.83Sep 6 06:55:02 intra sshd\[36029\]: Failed password for invalid user demo from 111.177.32.83 port 49618 ssh2Sep 6 06:59:52 intra sshd\[36081\]: Invalid user nagios from 111.177.32.83Sep 6 06:59:54 intra sshd\[36081\]: Failed password for invalid user nagios from 111.177.32.83 port 36676 ssh2 ... |
2019-09-06 12:10:07 |
| 138.118.123.248 | attackspambots | Automatic report - Port Scan Attack |
2019-09-06 12:21:33 |
| 61.37.82.220 | attack | Sep 5 18:13:29 sachi sshd\[31624\]: Invalid user vncuser from 61.37.82.220 Sep 5 18:13:29 sachi sshd\[31624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.37.82.220 Sep 5 18:13:32 sachi sshd\[31624\]: Failed password for invalid user vncuser from 61.37.82.220 port 51500 ssh2 Sep 5 18:18:10 sachi sshd\[32053\]: Invalid user test from 61.37.82.220 Sep 5 18:18:10 sachi sshd\[32053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.37.82.220 |
2019-09-06 12:25:01 |
| 81.174.227.27 | attackspambots | Sep 5 23:55:05 ny01 sshd[1854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.174.227.27 Sep 5 23:55:07 ny01 sshd[1854]: Failed password for invalid user odoo from 81.174.227.27 port 50790 ssh2 Sep 5 23:59:25 ny01 sshd[2725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.174.227.27 |
2019-09-06 12:01:42 |
| 157.230.7.0 | attack | Sep 5 23:46:58 plusreed sshd[11888]: Invalid user sinusbot1 from 157.230.7.0 ... |
2019-09-06 11:59:45 |
| 94.191.47.240 | attackbotsspam | Sep 5 20:52:42 mail sshd\[15264\]: Invalid user ts2 from 94.191.47.240 port 43002 Sep 5 20:52:42 mail sshd\[15264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.47.240 Sep 5 20:52:45 mail sshd\[15264\]: Failed password for invalid user ts2 from 94.191.47.240 port 43002 ssh2 Sep 5 20:56:36 mail sshd\[15722\]: Invalid user testuser from 94.191.47.240 port 35464 Sep 5 20:56:36 mail sshd\[15722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.47.240 |
2019-09-06 11:57:44 |