城市(city): unknown
省份(region): unknown
国家(country): Indonesia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 103.82.74.122 | attack | unauthorized connection attempt |
2020-02-16 18:47:04 |
| 103.82.79.231 | attackspam | Looking for resource vulnerabilities |
2019-08-11 04:02:23 |
| 103.82.78.244 | attackbots | Wednesday, July 24, 2019 4:46 AM Received from: 103.82.78.244 From: sophie@get-online-visibility.com Google ranking India SEO form spam bot |
2019-07-27 13:18:07 |
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.82.7.0 - 103.82.7.255'
% Abuse contact for '103.82.7.0 - 103.82.7.255' is 'abuse@sqiva.com'
inetnum: 103.82.7.0 - 103.82.7.255
netname: IDNIC-SQIVA-ID
descr: PT Sqiva Sistem
descr: Corporate / Direct Member IDNIC
descr: Jl. Gatot Subroto Kav 50-52
descr: Jakarta
admin-c: AW772-AP
tech-c: AW772-AP
country: ID
mnt-by: MNT-APJII-ID
mnt-irt: IRT-SQIVA-ID
mnt-routes: MAINT-ID-SQIVA
status: ASSIGNED PORTABLE
last-modified: 2016-12-23T07:52:23Z
source: APNIC
irt: IRT-SQIVA-ID
address: PT Sqiva Sistem
address: Jl. Gatot Subroto Kav 50-52
address: Jakarta
e-mail: sni@sqiva.com
abuse-mailbox: abuse@sqiva.com
admin-c: AW772-AP
tech-c: AW772-AP
auth: # Filtered
mnt-by: MAINT-ID-SQIVA
last-modified: 2026-03-09T15:39:19Z
source: APNIC
person: Alexander Warman
address: Jl. Gatot Subroto Kav 50-52
address: Jakarta 10260, Indonesia
country: ID
phone: +62-21-30051300
e-mail: w-alex@sqiva.com
nic-hdl: AW772-AP
mnt-by: MNT-APJII-ID
last-modified: 2016-12-23T07:31:28Z
source: APNIC
% Information related to '103.82.7.0 - 103.82.7.255'
inetnum: 103.82.7.0 - 103.82.7.255
netname: IDNIC-SQIVA-ID
descr: PT Sqiva Sistem
descr: Corporate / Direct Member IDNIC
descr: Jl. Gatot Subroto Kav 50-52
descr: Jakarta
admin-c: AW772-AP
tech-c: AW772-AP
country: ID
mnt-by: MNT-APJII-ID
mnt-irt: IRT-SQIVA-ID
mnt-routes: MAINT-ID-SQIVA
status: ASSIGNED PORTABLE
last-modified: 2016-12-23T07:52:23Z
source: IDNIC
irt: IRT-SQIVA-ID
address: PT Sqiva Sistem
address: Jl. Gatot Subroto Kav 50-52
address: Jakarta
e-mail: sni@sqiva.com
abuse-mailbox: abuse@sqiva.com
admin-c: AW772-AP
tech-c: AW772-AP
auth: # Filtered
mnt-by: MAINT-ID-SQIVA
last-modified: 2016-12-23T07:47:03Z
source: IDNIC
person: Alexander Warman
address: Jl. Gatot Subroto Kav 50-52
address: Jakarta 10260, Indonesia
country: ID
phone: +62-21-30051300
e-mail: w-alex@sqiva.com
nic-hdl: AW772-AP
mnt-by: MNT-APJII-ID
last-modified: 2016-12-23T07:31:28Z
source: IDNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.82.7.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59363
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.82.7.216. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032300 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 20:38:08 CST 2026
;; MSG SIZE rcvd: 105
Host 216.7.82.103.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 216.7.82.103.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 181.30.28.120 | attackbotsspam | Apr 19 23:56:49 mail sshd\[65143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.28.120 user=root ... |
2020-04-20 15:00:54 |
| 49.235.234.94 | attack | Apr 20 09:05:04 server sshd[12592]: Failed password for invalid user ap from 49.235.234.94 port 44638 ssh2 Apr 20 09:09:16 server sshd[13805]: Failed password for invalid user ubuntu from 49.235.234.94 port 34780 ssh2 Apr 20 09:13:38 server sshd[15036]: Failed password for invalid user el from 49.235.234.94 port 53162 ssh2 |
2020-04-20 15:19:21 |
| 163.172.230.4 | attackbots | [2020-04-20 02:34:00] NOTICE[1170][C-00002b21] chan_sip.c: Call from '' (163.172.230.4:58427) to extension '44011972592277524' rejected because extension not found in context 'public'. [2020-04-20 02:34:00] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-20T02:34:00.268-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="44011972592277524",SessionID="0x7f6c0825cda8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.230.4/58427",ACLName="no_extension_match" [2020-04-20 02:34:18] NOTICE[1170][C-00002b24] chan_sip.c: Call from '' (163.172.230.4:58757) to extension '66011972592277524' rejected because extension not found in context 'public'. [2020-04-20 02:34:18] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-20T02:34:18.906-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="66011972592277524",SessionID="0x7f6c0824ccd8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="I ... |
2020-04-20 14:51:07 |
| 104.236.142.89 | attackbotsspam | *Port Scan* detected from 104.236.142.89 (US/United States/California/San Francisco/-). 4 hits in the last 35 seconds |
2020-04-20 15:00:08 |
| 51.254.16.233 | attack | GB - - [19 Apr 2020:20:12:37 +0300] "POST wp-login.php?action=register HTTP 1.1" 302 - "-" "Mozilla 5.0 Windows NT 6.1; Win64; x64; rv:66.0 Gecko 20100101 Firefox 66.0" |
2020-04-20 15:17:32 |
| 5.135.94.191 | attack | Invalid user admin from 5.135.94.191 port 47192 |
2020-04-20 14:49:15 |
| 200.73.128.100 | attackspam | Invalid user jp from 200.73.128.100 port 51782 |
2020-04-20 15:22:27 |
| 222.187.81.130 | attack | Port probing on unauthorized port 5555 |
2020-04-20 15:05:32 |
| 129.211.59.87 | attackbotsspam | 2020-04-19T23:53:30.679425linuxbox-skyline sshd[266094]: Invalid user wi from 129.211.59.87 port 59712 ... |
2020-04-20 15:15:15 |
| 51.75.203.178 | attack | 18641/tcp [2020-04-20]1pkt |
2020-04-20 15:19:39 |
| 128.199.155.218 | attack | 2020-04-20T04:46:22.600402shield sshd\[19915\]: Invalid user admin from 128.199.155.218 port 47834 2020-04-20T04:46:22.604073shield sshd\[19915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.155.218 2020-04-20T04:46:25.041114shield sshd\[19915\]: Failed password for invalid user admin from 128.199.155.218 port 47834 ssh2 2020-04-20T04:50:57.808129shield sshd\[21111\]: Invalid user tu from 128.199.155.218 port 52679 2020-04-20T04:50:57.812256shield sshd\[21111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.155.218 |
2020-04-20 14:53:31 |
| 179.52.22.104 | attack | (smtpauth) Failed SMTP AUTH login from 179.52.22.104 (DO/Dominican Republic/104.22.52.179.d.dyn.claro.net.do): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-20 08:26:27 login authenticator failed for (ADMIN) [179.52.22.104]: 535 Incorrect authentication data (set_id=heidari@safanicu.com) |
2020-04-20 15:20:50 |
| 106.12.6.136 | attackspam | $f2bV_matches |
2020-04-20 14:57:53 |
| 106.12.27.11 | attackspambots | $f2bV_matches |
2020-04-20 14:45:15 |
| 164.132.197.108 | attackspambots | Apr 20 07:49:31 server sshd[25864]: Failed password for invalid user hi from 164.132.197.108 port 42724 ssh2 Apr 20 07:53:12 server sshd[26547]: Failed password for root from 164.132.197.108 port 40596 ssh2 Apr 20 07:55:47 server sshd[27022]: Failed password for invalid user test123 from 164.132.197.108 port 46040 ssh2 |
2020-04-20 14:40:32 |