City: Pekalongan
Region: Jawa Tengah
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
36.68.53.193 | attack | Unauthorized connection attempt from IP address 36.68.53.193 on Port 445(SMB) |
2020-03-17 12:49:29 |
36.68.53.152 | attackbotsspam | Unauthorised access (Mar 9) SRC=36.68.53.152 LEN=52 TTL=118 ID=3207 DF TCP DPT=445 WINDOW=8192 SYN |
2020-03-09 15:54:24 |
36.68.53.240 | attackbotsspam | unauthorized connection attempt |
2020-02-19 17:19:37 |
36.68.53.80 | attackspam | 20/1/28@23:51:26: FAIL: Alarm-Network address from=36.68.53.80 ... |
2020-01-29 16:25:52 |
36.68.53.232 | attackspambots | Unauthorized IMAP connection attempt |
2019-12-23 01:07:35 |
36.68.53.128 | attackbots | php WP PHPmyadamin ABUSE blocked for 12h |
2019-10-20 17:06:44 |
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '36.68.48.0 - 36.68.63.255'
% Abuse contact for '36.68.48.0 - 36.68.63.255' is 'abuse@telkom.co.id'
inetnum: 36.68.48.0 - 36.68.63.255
netname: TLKM_BB_SERVICE_36_68_DIVRE1
descr: PT TELKOM INDONESIA
descr: STO Gambir 3rd Floor
descr: Jl. Medan Merdeka Selatan No. 12
descr: Jakarta 10110
country: ID
admin-c: AR165-AP
tech-c: HM444-AP
abuse-c: AI598-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-TELKOMNET
mnt-irt: IRT-IDTELKOM-ID
last-modified: 2021-01-26T22:07:13Z
source: APNIC
irt: IRT-IDTELKOM-ID
address: PT. TELKOM INDONESIA
address: Indibiz Experience Center 3rd Floor
address: Kebon Sirih No 36
address: Jakarta
e-mail: abuse@telkom.co.id
abuse-mailbox: abuse@telkom.co.id
admin-c: RFR2-AP
tech-c: TP630-AP
auth: # Filtered
remarks: abuse@telkom.co.id was validated on 2025-04-15
mnt-by: MAINT-TELKOMNET
last-modified: 2025-09-24T00:27:38Z
source: APNIC
role: ABUSE IDTELKOMID
country: ZZ
address: PT. TELKOM INDONESIA
address: Indibiz Experience Center 3rd Floor
address: Kebon Sirih No 36
address: Jakarta
phone: +000000000
e-mail: abuse@telkom.co.id
admin-c: RFR2-AP
tech-c: TP630-AP
nic-hdl: AI598-AP
remarks: Generated from irt object IRT-IDTELKOM-ID
remarks: abuse@telkom.co.id was validated on 2025-04-15
abuse-mailbox: abuse@telkom.co.id
mnt-by: APNIC-ABUSE
last-modified: 2025-04-15T06:33:12Z
source: APNIC
role: PT Telkom Indonesia APNIC Resources Management
address: PT. TELKOM INDONESIA
address: Menara Multimedia Lt. 7
address: Jl. Kebonsirih No.12
address: JAKARTA
country: ID
phone: +62-21-3860500
fax-no: +62-21-3861215
e-mail: ip-admin@telkom.net.id
admin-c: HM444-AP
tech-c: HM444-AP
nic-hdl: AR165-AP
notify: hostmaster@telkom.net.id
mnt-by: MAINT-TELKOMNET
last-modified: 2008-09-04T07:54:16Z
source: APNIC
person: PT Telkom Indonesia Hostmaster
nic-hdl: HM444-AP
e-mail: hostmaster@telkom.net.id
address: PT. TELKOM INDONESIA
address: Menara Multimedia Lt. 7
address: Jl. Kebonsirih No.12
address: JAKARTA
phone: +62-21-3860500
fax-no: +62-21-3861215
country: ID
notify: hostmaster@telkom.net.id
mnt-by: MAINT-TELKOMNET
last-modified: 2008-09-04T07:29:40Z
source: APNIC
% Information related to '36.68.52.0/22AS7713'
route: 36.68.52.0/22
descr: Telkom
origin: AS7713
mnt-by: MAINT-TELKOMNET
last-modified: 2024-08-08T06:15:24Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 36.68.53.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64314
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;36.68.53.95. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025100302 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 04 12:00:51 CST 2025
;; MSG SIZE rcvd: 104
Host 95.53.68.36.in-addr.arpa not found: 2(SERVFAIL)
server can't find 36.68.53.95.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
5.121.169.78 | attack | 20/1/13@08:09:35: FAIL: Alarm-Network address from=5.121.169.78 20/1/13@08:09:35: FAIL: Alarm-Network address from=5.121.169.78 ... |
2020-01-13 21:37:47 |
119.29.197.54 | attackbotsspam | Jan 13 14:53:40 vps691689 sshd[10194]: Failed password for root from 119.29.197.54 port 37039 ssh2 Jan 13 14:58:17 vps691689 sshd[10298]: Failed password for root from 119.29.197.54 port 64167 ssh2 ... |
2020-01-13 22:12:16 |
213.34.208.90 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-01-13 22:01:55 |
138.197.152.112 | attack | Unauthorized connection attempt detected from IP address 138.197.152.112 to port 2220 [J] |
2020-01-13 21:51:10 |
185.176.27.122 | attack | 01/13/2020-08:44:23.209960 185.176.27.122 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-01-13 21:57:11 |
94.89.40.90 | attackspam | Unauthorized connection attempt detected from IP address 94.89.40.90 to port 80 [J] |
2020-01-13 22:03:42 |
45.119.212.105 | attackspam | k+ssh-bruteforce |
2020-01-13 22:09:39 |
114.119.130.43 | attackspam | badbot |
2020-01-13 21:38:49 |
118.26.65.226 | attack | Jan 13 13:47:20 mail1 sshd\[736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.65.226 user=root Jan 13 13:47:22 mail1 sshd\[736\]: Failed password for root from 118.26.65.226 port 43326 ssh2 Jan 13 14:07:58 mail1 sshd\[5588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.65.226 user=root Jan 13 14:07:59 mail1 sshd\[5588\]: Failed password for root from 118.26.65.226 port 59242 ssh2 Jan 13 14:09:37 mail1 sshd\[6038\]: Invalid user developer from 118.26.65.226 port 43498 Jan 13 14:09:37 mail1 sshd\[6038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.65.226 ... |
2020-01-13 21:34:01 |
154.70.99.187 | attackbotsspam | Unauthorized connection attempt detected from IP address 154.70.99.187 to port 445 |
2020-01-13 21:58:28 |
197.156.80.225 | attackbots | Unauthorised access (Jan 13) SRC=197.156.80.225 LEN=52 TTL=112 ID=26036 DF TCP DPT=445 WINDOW=8192 SYN |
2020-01-13 21:33:00 |
139.59.23.68 | attackspam | Unauthorized connection attempt detected from IP address 139.59.23.68 to port 2220 [J] |
2020-01-13 21:50:31 |
123.148.244.35 | attack | multiple requests to xmlrpc.php |
2020-01-13 21:48:05 |
114.119.135.113 | attackspambots | badbot |
2020-01-13 21:34:35 |
182.73.222.82 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-01-13 21:53:05 |