City: unknown
Region: unknown
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.82.74.122 | attack | unauthorized connection attempt |
2020-02-16 18:47:04 |
| 103.82.79.231 | attackspam | Looking for resource vulnerabilities |
2019-08-11 04:02:23 |
| 103.82.78.244 | attackbots | Wednesday, July 24, 2019 4:46 AM Received from: 103.82.78.244 From: sophie@get-online-visibility.com Google ranking India SEO form spam bot |
2019-07-27 13:18:07 |
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.82.7.0 - 103.82.7.255'
% Abuse contact for '103.82.7.0 - 103.82.7.255' is 'abuse@sqiva.com'
inetnum: 103.82.7.0 - 103.82.7.255
netname: IDNIC-SQIVA-ID
descr: PT Sqiva Sistem
descr: Corporate / Direct Member IDNIC
descr: Jl. Gatot Subroto Kav 50-52
descr: Jakarta
admin-c: AW772-AP
tech-c: AW772-AP
country: ID
mnt-by: MNT-APJII-ID
mnt-irt: IRT-SQIVA-ID
mnt-routes: MAINT-ID-SQIVA
status: ASSIGNED PORTABLE
last-modified: 2016-12-23T07:52:23Z
source: APNIC
irt: IRT-SQIVA-ID
address: PT Sqiva Sistem
address: Jl. Gatot Subroto Kav 50-52
address: Jakarta
e-mail: sni@sqiva.com
abuse-mailbox: abuse@sqiva.com
admin-c: AW772-AP
tech-c: AW772-AP
auth: # Filtered
mnt-by: MAINT-ID-SQIVA
last-modified: 2026-03-09T15:39:19Z
source: APNIC
person: Alexander Warman
address: Jl. Gatot Subroto Kav 50-52
address: Jakarta 10260, Indonesia
country: ID
phone: +62-21-30051300
e-mail: w-alex@sqiva.com
nic-hdl: AW772-AP
mnt-by: MNT-APJII-ID
last-modified: 2016-12-23T07:31:28Z
source: APNIC
% Information related to '103.82.7.0 - 103.82.7.255'
inetnum: 103.82.7.0 - 103.82.7.255
netname: IDNIC-SQIVA-ID
descr: PT Sqiva Sistem
descr: Corporate / Direct Member IDNIC
descr: Jl. Gatot Subroto Kav 50-52
descr: Jakarta
admin-c: AW772-AP
tech-c: AW772-AP
country: ID
mnt-by: MNT-APJII-ID
mnt-irt: IRT-SQIVA-ID
mnt-routes: MAINT-ID-SQIVA
status: ASSIGNED PORTABLE
last-modified: 2016-12-23T07:52:23Z
source: IDNIC
irt: IRT-SQIVA-ID
address: PT Sqiva Sistem
address: Jl. Gatot Subroto Kav 50-52
address: Jakarta
e-mail: sni@sqiva.com
abuse-mailbox: abuse@sqiva.com
admin-c: AW772-AP
tech-c: AW772-AP
auth: # Filtered
mnt-by: MAINT-ID-SQIVA
last-modified: 2016-12-23T07:47:03Z
source: IDNIC
person: Alexander Warman
address: Jl. Gatot Subroto Kav 50-52
address: Jakarta 10260, Indonesia
country: ID
phone: +62-21-30051300
e-mail: w-alex@sqiva.com
nic-hdl: AW772-AP
mnt-by: MNT-APJII-ID
last-modified: 2016-12-23T07:31:28Z
source: IDNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.82.7.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59363
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.82.7.216. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032300 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 20:38:08 CST 2026
;; MSG SIZE rcvd: 105
Host 216.7.82.103.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 216.7.82.103.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 200.219.243.150 | attackbots | Unauthorized connection attempt from IP address 200.219.243.150 on Port 445(SMB) |
2020-04-25 03:40:47 |
| 89.43.12.3 | attack | Unauthorized connection attempt from IP address 89.43.12.3 on Port 445(SMB) |
2020-04-25 03:18:54 |
| 178.128.183.90 | attack | Invalid user git from 178.128.183.90 port 43680 |
2020-04-25 03:21:40 |
| 14.253.207.93 | attackbotsspam | Unauthorized connection attempt from IP address 14.253.207.93 on Port 445(SMB) |
2020-04-25 03:22:09 |
| 106.12.12.127 | attackbots | Apr 24 19:12:38 vmd17057 sshd[10498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.12.127 Apr 24 19:12:40 vmd17057 sshd[10498]: Failed password for invalid user yf from 106.12.12.127 port 35868 ssh2 ... |
2020-04-25 03:11:43 |
| 49.228.51.133 | attack | 1587729679 - 04/24/2020 14:01:19 Host: 49.228.51.133/49.228.51.133 Port: 445 TCP Blocked |
2020-04-25 03:23:40 |
| 103.125.189.140 | attack | SSH bruteforce |
2020-04-25 03:09:58 |
| 121.128.200.146 | attack | Apr 24 14:11:39 web8 sshd\[2612\]: Invalid user 111\\r from 121.128.200.146 Apr 24 14:11:39 web8 sshd\[2612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.128.200.146 Apr 24 14:11:41 web8 sshd\[2612\]: Failed password for invalid user 111\\r from 121.128.200.146 port 49102 ssh2 Apr 24 14:13:53 web8 sshd\[3781\]: Invalid user 123456\\r from 121.128.200.146 Apr 24 14:13:53 web8 sshd\[3781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.128.200.146 |
2020-04-25 03:38:45 |
| 222.116.11.150 | attackbotsspam | Honeypot attack, port: 81, PTR: PTR record not found |
2020-04-25 03:03:05 |
| 191.193.176.104 | attackbotsspam | 1587729665 - 04/24/2020 14:01:05 Host: 191.193.176.104/191.193.176.104 Port: 445 TCP Blocked |
2020-04-25 03:39:30 |
| 92.222.67.68 | attackspambots | SSH bruteforce |
2020-04-25 03:33:12 |
| 139.59.136.254 | attack | Invalid user server from 139.59.136.254 port 43142 |
2020-04-25 03:37:37 |
| 159.203.107.212 | attackspam | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-04-25 03:13:25 |
| 27.79.55.5 | attackspam | Honeypot attack, port: 445, PTR: localhost. |
2020-04-25 03:40:04 |
| 190.94.18.2 | attack | Invalid user nagios from 190.94.18.2 port 42484 |
2020-04-25 03:10:54 |