City: unknown
Region: unknown
Country: Singapore
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '203.208.160.0 - 203.208.191.255'
% Abuse contact for '203.208.160.0 - 203.208.191.255' is 'g-stixnoc@singtel.com'
inetnum: 203.208.160.0 - 203.208.191.255
netname: SINGTEL-IX
descr: SingTel Internet Exchange
descr: Telepark
descr: 5 Tampines Central 6
descr: # 07-03
descr: Singapore 529482
country: SG
org: ORG-STIE1-AP
admin-c: KELL1-AP
tech-c: KELL1-AP
abuse-c: AS2790-AP
status: ALLOCATED PORTABLE
notify: tkho@singtel.com
notify: dayan_ng@singtel.com
mnt-by: APNIC-HM
mnt-lower: MAINT-SINGTEL-IX
mnt-routes: MAINT-SINGTEL-IX
mnt-irt: IRT-SINGTEL-IX-AP
last-modified: 2025-05-11T23:39:37Z
source: APNIC
irt: IRT-SINGTEL-IX-AP
address: Telepark
address: 5 Tampines Central 6
address:
address: Singapore 529482
e-mail: g-stixnoc@singtel.com
abuse-mailbox: g-stixnoc@singtel.com
admin-c: KELL1-AP
admin-c: TYM27-AP
tech-c: KELL1-AP
tech-c: TYM27-AP
auth: # Filtered
remarks: g-stixnoc@singtel.com is invalid
mnt-by: MAINT-SINGTEL-IX
last-modified: 2025-11-18T00:26:29Z
source: APNIC
organisation: ORG-STIE1-AP
org-name: Singapore Telecommunications (SINGTEL Internet Exchange)
org-type: LIR
country: SG
address: Singtel Serangoon Hub
address: 1 Serangoon North Ave 5
address: Singapore
phone: +65-6838-6145
e-mail: g-stixnoc@singtel.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2024-08-20T12:56:14Z
source: APNIC
role: ABUSE SINGTELIXAP
country: ZZ
address: Telepark
address: 5 Tampines Central 6
address: # 02-00
address: Singapore 529482
phone: +000000000
e-mail: g-stixnoc@singtel.com
admin-c: KELL1-AP
admin-c: TYM27-AP
tech-c: KELL1-AP
tech-c: TYM27-AP
nic-hdl: AS2790-AP
remarks: Generated from irt object IRT-SINGTEL-IX-AP
remarks: g-stixnoc@singtel.com is invalid
abuse-mailbox: g-stixnoc@singtel.com
mnt-by: APNIC-ABUSE
last-modified: 2025-08-22T22:54:49Z
source: APNIC
person: Koh Enk Liang Leon
address: Singapore
country: SG
phone: +65 6838 3029
e-mail: leonkoh@singtel.com
nic-hdl: KELL1-AP
mnt-by: MAINT-SINGTEL-IX
last-modified: 2011-05-12T03:56:28Z
source: APNIC
% Information related to '203.208.160.0/19AS7473'
route: 203.208.160.0/19
descr:
origin: AS7473
mnt-by: MAINT-SINGTEL-IX
last-modified: 2025-05-16T09:37:02Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.208.187.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51105
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;203.208.187.69. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026012900 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 30 00:04:28 CST 2026
;; MSG SIZE rcvd: 107
Host 69.187.208.203.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 69.187.208.203.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 175.213.185.129 | attackspam | [Aegis] @ 2019-10-05 06:11:52 0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack |
2019-10-05 16:21:09 |
| 139.59.59.187 | attackbotsspam | IP attempted unauthorised action |
2019-10-05 16:15:33 |
| 171.248.155.239 | attackbotsspam | port scan and connect, tcp 23 (telnet) |
2019-10-05 16:44:18 |
| 200.187.173.114 | attack | Automatic report - Port Scan Attack |
2019-10-05 16:24:39 |
| 60.166.89.173 | attackspambots | CN China - Failures: 20 ftpd |
2019-10-05 16:44:49 |
| 81.22.45.202 | attackspam | 10/05/2019-06:55:52.930142 81.22.45.202 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-10-05 16:39:35 |
| 177.69.237.49 | attackbotsspam | $f2bV_matches |
2019-10-05 16:47:25 |
| 115.159.149.136 | attack | Oct 5 09:08:57 root sshd[18235]: Failed password for root from 115.159.149.136 port 44208 ssh2 Oct 5 09:13:22 root sshd[18347]: Failed password for root from 115.159.149.136 port 49804 ssh2 ... |
2019-10-05 16:13:54 |
| 143.208.181.34 | attackbotsspam | Automatic report - Banned IP Access |
2019-10-05 16:35:54 |
| 104.143.83.242 | attackspam | Port scan attempt detected by AWS-CCS, CTS, India |
2019-10-05 16:17:36 |
| 112.84.91.35 | attack | Brute force attempt |
2019-10-05 16:50:17 |
| 149.28.60.197 | attackbots | Oct 5 10:10:05 [host] sshd[13007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.28.60.197 user=root Oct 5 10:10:08 [host] sshd[13007]: Failed password for root from 149.28.60.197 port 46162 ssh2 Oct 5 10:13:58 [host] sshd[13081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.28.60.197 user=root |
2019-10-05 16:39:04 |
| 51.38.179.179 | attackspam | Oct 5 07:01:13 www5 sshd\[48269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.179.179 user=root Oct 5 07:01:15 www5 sshd\[48269\]: Failed password for root from 51.38.179.179 port 32952 ssh2 Oct 5 07:04:59 www5 sshd\[48557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.179.179 user=root ... |
2019-10-05 16:43:45 |
| 210.157.255.252 | attackbotsspam | Oct 5 07:47:58 dedicated sshd[11192]: Invalid user 123Jack from 210.157.255.252 port 47774 |
2019-10-05 16:41:22 |
| 123.206.81.59 | attack | $f2bV_matches |
2019-10-05 16:18:01 |