城市(city): unknown
省份(region): unknown
国家(country): Indonesia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.107.4.0 - 103.107.7.255'
% Abuse contact for '103.107.4.0 - 103.107.7.255' is 'noc@itb.ac.id'
inetnum: 103.107.4.0 - 103.107.7.255
netname: BANDUNG-ID
descr: Institute of Technology Bandung
country: ID
org: ORG-IOTB1-AP
admin-c: BS1407-AP
tech-c: BS1407-AP
abuse-c: AB1357-AP
status: ASSIGNED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-routes: MAINT-BANDUNG-AP
mnt-irt: IRT-BANDUNG-ID
last-modified: 2025-10-09T08:06:33Z
source: APNIC
irt: IRT-BANDUNG-ID
address: Computer Network Research Group
address: Institute of Technology Bandung
address: Bandung
e-mail: noc@itb.ac.id
abuse-mailbox: noc@itb.ac.id
admin-c: BS1407-AP
tech-c: BS1407-AP
auth: # Filtered
remarks: noc@itb.ac.id was validated on 2025-10-16
mnt-by: MAINT-BANDUNG-AP
last-modified: 2025-11-18T00:26:32Z
source: APNIC
organisation: ORG-IOTB1-AP
org-name: Institute of Technology Bandung
org-type: LIR
country: ID
address: JL Ganesha 10
phone: +62-22-86010037
fax-no: +62-22-250-0935
e-mail: noc@itb.ac.id
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:14:43Z
source: APNIC
role: ABUSE BANDUNGID
country: ZZ
address: Computer Network Research Group
address: Institute of Technology Bandung
address: Bandung
phone: +000000000
e-mail: noc@itb.ac.id
admin-c: BS1407-AP
tech-c: BS1407-AP
nic-hdl: AB1357-AP
remarks: Generated from irt object IRT-BANDUNG-ID
remarks: noc@itb.ac.id was validated on 2025-10-16
abuse-mailbox: noc@itb.ac.id
mnt-by: APNIC-ABUSE
last-modified: 2025-10-16T04:19:57Z
source: APNIC
person: Basuki Suhardiman
address: jl ganesha 10 bandung
country: ID
phone: +62-22-86010037
e-mail: basuki@itb.ac.id
nic-hdl: BS1407-AP
mnt-by: MAINT-BANDUNG-AP
last-modified: 2025-10-09T07:53:36Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.107.4.60
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38187
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.107.4.60. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040901 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 10 04:30:45 CST 2026
;; MSG SIZE rcvd: 105
60.4.107.103.in-addr.arpa domain name pointer new103-60.itb.ac.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
60.4.107.103.in-addr.arpa name = new103-60.itb.ac.id.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 190.64.213.155 | attackbots | $f2bV_matches | Triggered by Fail2Ban at Vostok web server |
2020-03-31 18:44:27 |
| 185.234.219.23 | attackbotsspam | 2020-03-31T05:19:19.244155MailD postfix/smtpd[24262]: warning: unknown[185.234.219.23]: SASL LOGIN authentication failed: authentication failure 2020-03-31T06:09:28.920074MailD postfix/smtpd[27551]: warning: unknown[185.234.219.23]: SASL LOGIN authentication failed: authentication failure 2020-03-31T06:59:41.344919MailD postfix/smtpd[30624]: warning: unknown[185.234.219.23]: SASL LOGIN authentication failed: authentication failure |
2020-03-31 18:40:10 |
| 82.240.54.37 | attackbots | Mar 31 12:52:13 ns382633 sshd\[5723\]: Invalid user emalls1 from 82.240.54.37 port 54705 Mar 31 12:52:13 ns382633 sshd\[5723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.240.54.37 Mar 31 12:52:15 ns382633 sshd\[5723\]: Failed password for invalid user emalls1 from 82.240.54.37 port 54705 ssh2 Mar 31 13:02:49 ns382633 sshd\[7795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.240.54.37 user=root Mar 31 13:02:51 ns382633 sshd\[7795\]: Failed password for root from 82.240.54.37 port 23833 ssh2 |
2020-03-31 19:03:06 |
| 116.98.120.15 | attackspambots | 1585626601 - 03/31/2020 05:50:01 Host: 116.98.120.15/116.98.120.15 Port: 445 TCP Blocked |
2020-03-31 19:02:09 |
| 61.52.96.201 | attackbots | Scanning |
2020-03-31 19:08:37 |
| 46.38.145.4 | attack | Mail Bruteforce |
2020-03-31 19:12:13 |
| 185.36.81.57 | attackbots | Mar 31 10:32:08 mail postfix/smtpd\[22742\]: warning: unknown\[185.36.81.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Mar 31 10:55:45 mail postfix/smtpd\[23287\]: warning: unknown\[185.36.81.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Mar 31 11:43:02 mail postfix/smtpd\[24558\]: warning: unknown\[185.36.81.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Mar 31 12:06:39 mail postfix/smtpd\[25158\]: warning: unknown\[185.36.81.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2020-03-31 18:39:28 |
| 45.190.220.6 | attack | Mar 30 22:50:35 mailman postfix/smtpd[31610]: NOQUEUE: reject: RCPT from unknown[45.190.220.6]: 554 5.7.1 Service unavailable; Client host [45.190.220.6] blocked using sbl-xbl.spamhaus.org; https://www.spamhaus.org/query/ip/45.190.220.6 / https://www.spamhaus.org/sbl/query/SBLCSS; from= |
2020-03-31 18:33:05 |
| 202.191.200.227 | attack | 2020-03-30 UTC: (30x) - ch,curt,dkp,edwin,fgh,gbj,geri,gv,it,jye,kacper,mzk,nginx,nproc,nvt,pramod,qah,qvf,rsl,rzk,tatjana,teamcity,uto,uuj,val,wk,wsk,xen,y,zhonghaoxi |
2020-03-31 18:36:20 |
| 36.70.121.210 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 31-03-2020 04:50:16. |
2020-03-31 18:49:41 |
| 203.147.76.146 | attackspam | (imapd) Failed IMAP login from 203.147.76.146 (NC/New Caledonia/host-203-147-76-146.h29.canl.nc): 1 in the last 3600 secs |
2020-03-31 18:47:21 |
| 206.189.193.135 | attackbotsspam | SSH Brute-Force Attack |
2020-03-31 18:53:43 |
| 223.71.167.164 | attackbots | Unauthorized connection attempt detected from IP address 223.71.167.164 to port 2083 |
2020-03-31 18:26:46 |
| 180.242.223.243 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 31-03-2020 04:50:15. |
2020-03-31 18:50:37 |
| 27.54.51.69 | attackbots | firewall-block, port(s): 81/tcp |
2020-03-31 19:01:04 |