City: unknown
Region: unknown
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.30.92.124 | attack | Unauthorized connection attempt from IP address 103.30.92.124 on Port 445(SMB) |
2020-06-10 03:25:42 |
| 103.30.92.35 | attackspambots | Unauthorized connection attempt from IP address 103.30.92.35 on Port 445(SMB) |
2020-03-17 12:09:36 |
| 103.30.92.91 | attack | Autoban 103.30.92.91 AUTH/CONNECT |
2019-11-18 18:35:23 |
| 103.30.92.124 | attack | Unauthorized connection attempt from IP address 103.30.92.124 on Port 445(SMB) |
2019-09-30 04:04:39 |
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.30.92.0 - 103.30.95.255'
% Abuse contact for '103.30.92.0 - 103.30.95.255' is 'abuse@idnic.net'
inetnum: 103.30.92.0 - 103.30.95.255
netname: IDNIC-NVZ-PRECISION-ID
descr: PT Precision Connexion
descr: Corporate / Direct Member IDNIC
descr: Hayam Wuruk I RST RT/RW: 007/002
descr: Jakarta Pusat 10120.
country: ID
admin-c: GAP6-AP
tech-c: GAP6-AP
remarks: Send Spam & Abuse Reports to abuse@idnic.net
mnt-by: MNT-APJII-ID
mnt-routes: MAINT-ID-NVZ-PRECISION
mnt-irt: IRT-IDNIC-ID
status: ASSIGNED PORTABLE
last-modified: 2019-05-07T04:46:38Z
source: APNIC
irt: IRT-IDNIC-ID
address: INDONESIA NETWORK INFORMATION CENTER
address: Cyber Building 11th Floor
address: Jl. Kuningan Barat No.8
address: Jakarta Selatan 12710
e-mail: abuse@idnic.net
abuse-mailbox: abuse@idnic.net
admin-c: IA55-AP
tech-c: IH123-AP
auth: # Filtered
mnt-by: MNT-APJII-ID
last-modified: 2025-11-17T23:08:35Z
source: APNIC
person: Gatot Ajie Prastowo
address: Graha Aktiva 2nd Floor
address: Jl. HR. Rasuna Said Blok X-1 Kav. 3
address: Jakarta 12950
country: ID
phone: +62-21-52921368
fax-no: +62-21-52921367
e-mail: abuse@idnic.net
nic-hdl: GAP6-AP
mnt-by: MNT-APJII-ID
last-modified: 2019-05-07T04:47:04Z
source: APNIC
% Information related to '103.30.92.0/22AS18103'
route: 103.30.92.0/22
descr: Route Object of Neuviz Net
origin: AS18103
country: ID
mnt-by: MAINT-ID-NVZ-PRECISION
mnt-by: MAINT-ID-INTER
last-modified: 2014-06-25T04:19:05Z
source: APNIC
% Information related to '103.30.92.0 - 103.30.95.255'
inetnum: 103.30.92.0 - 103.30.95.255
netname: IDNIC-NVZ-PRECISION-ID
descr: PT Precision Connexion
descr: Corporate / Direct Member IDNIC
descr: Hayam Wuruk I RST RT/RW: 007/002
descr: Jakarta Pusat 10120.
country: ID
admin-c: GAP6-AP
tech-c: GAP6-AP
remarks: Send Spam & Abuse Reports to gatot@neuviz.net.id
mnt-by: MNT-APJII-ID
mnt-routes: MAINT-ID-NVZ-PRECISION
mnt-irt: IRT-IDNIC-ID
status: ASSIGNED PORTABLE
last-modified: 2012-11-01T01:12:54Z
source: IDNIC
irt: IRT-IDNIC-ID
address: Kuningan Barat Gedung Cyber
address: Cyber Building
address: Jl. Kuningan Barat No.8
address: Jakarta Selatan 12710
e-mail: abuse@idnic.net
abuse-mailbox: abuse@idnic.net
admin-c: IA55-AP
tech-c: IH123-AP
auth: # Filtered
mnt-by: MNT-APJII-ID
last-modified: 2024-12-29T14:21:38Z
source: IDNIC
person: Gatot Ajie Prastowo
address: Graha Aktiva 2nd Floor
address: Jl. HR. Rasuna Said Blok X-1 Kav. 3
address: Jakarta 12950
country: ID
phone: +62-21-52921368
fax-no: +62-21-52921367
e-mail: gatot@neuviz.net.id
nic-hdl: GAP6-AP
mnt-by: MNT-APJII-ID
last-modified: 2012-10-30T10:26:01Z
source: IDNIC
% Information related to '103.30.92.0/24AS18103'
route: 103.30.92.0/24
descr: Route Object of Neuviz Net
origin: AS18103
mnt-by: MAINT-ID-INTER
country: ID
last-modified: 2024-04-30T19:47:37Z
source: IDNIC
% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.30.92.188
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32496
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.30.92.188. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025120201 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 03 09:30:56 CST 2025
;; MSG SIZE rcvd: 106
b'188.92.30.103.in-addr.arpa domain name pointer ip-188-92-30-103.neuviz.net.id.
'
Server: 183.60.82.98
Address: 183.60.82.98#53
Non-authoritative answer:
188.92.30.103.in-addr.arpa name = ip-188-92-30-103.neuviz.net.id.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 5.188.86.114 | attackspambots | Jun 25 21:45:37 h2177944 kernel: \[2835868.836820\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=5.188.86.114 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=27787 PROTO=TCP SPT=42373 DPT=30601 WINDOW=1024 RES=0x00 SYN URGP=0 Jun 25 22:04:39 h2177944 kernel: \[2837010.387240\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=5.188.86.114 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=23390 PROTO=TCP SPT=42373 DPT=34014 WINDOW=1024 RES=0x00 SYN URGP=0 Jun 25 22:17:19 h2177944 kernel: \[2837770.849450\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=5.188.86.114 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=54791 PROTO=TCP SPT=42373 DPT=26042 WINDOW=1024 RES=0x00 SYN URGP=0 Jun 25 22:32:16 h2177944 kernel: \[2838667.968558\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=5.188.86.114 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=64114 PROTO=TCP SPT=42373 DPT=3134 WINDOW=1024 RES=0x00 SYN URGP=0 Jun 25 22:45:48 h2177944 kernel: \[2839479.394854\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=5.188.86.114 DST=85.214.117.9 L |
2019-06-26 05:50:43 |
| 187.188.136.8 | attack | Unauthorised access (Jun 25) SRC=187.188.136.8 LEN=40 TTL=241 ID=15041 TCP DPT=445 WINDOW=1024 SYN |
2019-06-26 05:35:58 |
| 195.158.24.43 | attack | 445/tcp 445/tcp 445/tcp... [2019-06-14/25]4pkt,1pt.(tcp) |
2019-06-26 05:40:47 |
| 162.158.154.62 | attack | SS1,DEF GET /shop/downloader/index.php |
2019-06-26 05:50:10 |
| 118.45.130.170 | attackspam | Jun 25 19:06:05 unicornsoft sshd\[17664\]: Invalid user admin from 118.45.130.170 Jun 25 19:06:05 unicornsoft sshd\[17664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.45.130.170 Jun 25 19:06:07 unicornsoft sshd\[17664\]: Failed password for invalid user admin from 118.45.130.170 port 35581 ssh2 |
2019-06-26 06:05:42 |
| 217.125.101.178 | attackspambots | 23/tcp 23/tcp [2019-06-21/25]2pkt |
2019-06-26 05:30:05 |
| 183.90.238.12 | attack | http |
2019-06-26 05:48:32 |
| 141.101.107.97 | attackspam | SS1,DEF GET /store/downloader/index.php |
2019-06-26 05:53:42 |
| 154.48.254.226 | attackbots | 445/tcp 445/tcp 445/tcp... [2019-04-29/06-25]6pkt,1pt.(tcp) |
2019-06-26 05:32:42 |
| 201.159.52.237 | attack | libpam_shield report: forced login attempt |
2019-06-26 05:26:34 |
| 179.53.121.215 | attackbots | Unauthorized connection attempt from IP address 179.53.121.215 on Port 445(SMB) |
2019-06-26 05:29:50 |
| 218.92.0.199 | attackbotsspam | Jun 25 23:42:19 dev sshd\[32621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.199 user=root Jun 25 23:42:22 dev sshd\[32621\]: Failed password for root from 218.92.0.199 port 24801 ssh2 ... |
2019-06-26 05:47:04 |
| 61.191.220.250 | attackspam | imap. Unknown user |
2019-06-26 05:28:18 |
| 220.130.162.137 | attack | 445/tcp 445/tcp 445/tcp... [2019-04-28/06-25]10pkt,1pt.(tcp) |
2019-06-26 05:46:25 |
| 103.79.90.72 | attackbotsspam | Jun 25 21:04:39 nextcloud sshd\[26536\]: Invalid user jens from 103.79.90.72 Jun 25 21:04:39 nextcloud sshd\[26536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.79.90.72 Jun 25 21:04:41 nextcloud sshd\[26536\]: Failed password for invalid user jens from 103.79.90.72 port 60229 ssh2 ... |
2019-06-26 05:41:05 |