Go
103.17.55.200
is a
Hacker
100 %
Indonesia
Report Abuse
1025attacks reported
707Brute-Force
248Brute-ForceSSH
21SSH
11HackingBrute-ForceSSH
8uncategorized
7Port ScanBrute-ForceSSH
3
3FTP Brute-ForceHacking
3Brute-ForceMailserver Attack
2Port ScanHackingBrute-ForceWeb App AttackSSH
...
from 118 distinct reporters
and 8 distinct sources : BadIPs.com, Blocklist.de, FireHOL, NormShield.com, darklist.de, VoIPBL.org, AbuseIPDB, ip-46.com
103.17.55.200 was first signaled at 2019-02-27 00:31 and last record was at 2019-09-02 04:47.
IP

103.17.55.200

Organization
PT. Bit Technology Nusantara
Localisation
Indonesia
Jawa Barat, Bandung
NetRange : First & Last IP
103.17.52.0 - 103.17.55.255
Network CIDR
103.17.52.0/22

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-04-06 11:01 attacks Brute-ForceSSH AbuseIPDB Apr 3 06:01:20 *** sshd[14274]: Failed password for invalid user ftp from 103.17.55.200 port 50193 ssh2 Apr 3 06:05:29 *** sshd[14420]: Failed passwor
2019-04-06 10:05 attacks Brute-ForceSSH AbuseIPDB Apr 6 21:05:14 mail sshd\[2596\]: Invalid user ibm from 103.17.55.200 port 38879 Apr 6 21:05:14 mail sshd\[2596\]: Disconnected from 103.17.55.200 por
2019-04-06 08:58 attacks Port Scan AbuseIPDB SSH/RDP/Plesk/Webmin sniffing
2019-04-06 06:55 attacks Brute-ForceSSH AbuseIPDB  
2019-04-06 06:26 attacks Brute-ForceSSH AbuseIPDB Apr 6 15:26:22 *** sshd[24024]: Invalid user dms from 103.17.55.200
2019-04-06 04:46 attacks Brute-ForceSSH AbuseIPDB 2019-04-06T15:46:10.433111stark.klein-stark.info sshd\[7042\]: Invalid user vnc from 103.17.55.200 port 43571 2019-04-06T15:46:10.439430stark.klein-st
2019-04-06 04:06 attacks Brute-ForceSSH AbuseIPDB Apr 6 09:06:39 TORMINT sshd\[13382\]: Invalid user brett from 103.17.55.200 Apr 6 09:06:39 TORMINT sshd\[13382\]: pam_unix\(sshd:auth\): authenticatio
2019-04-06 02:29 attacks SSH AbuseIPDB 2019-04-06T18:29:17.872043enmeeting.mahidol.ac.th sshd\[9171\]: Invalid user tomcat from 103.17.55.200 port 40602 2019-04-06T18:29:17.886397enmeeting.
2019-04-06 00:53 attacks Brute-ForceSSH AbuseIPDB Apr 6 04:23:16 v22018086721571380 sshd[10442]: Invalid user hcat from 103.17.55.200 Apr 6 04:23:16 v22018086721571380 sshd[10442]: pam_unix(sshd:auth)
2019-04-05 20:27 attacks Brute-Force AbuseIPDB Apr 6 05:27:54 work-partkepr sshd\[21349\]: Invalid user jay from 103.17.55.200 port 43515 Apr 6 05:27:54 work-partkepr sshd\[21349\]: pam_unix\(sshd:
2019-04-05 19:39 attacks Brute-ForceSSH AbuseIPDB  
2019-04-05 17:26 attacks Brute-ForceSSH AbuseIPDB SSH bruteforce (Triggered fail2ban)
2019-04-05 16:55 attacks Brute-ForceSSH AbuseIPDB Apr 6 03:55:41 ncomp sshd[25783]: Invalid user test from 103.17.55.200 Apr 6 03:55:41 ncomp sshd[25783]: pam_unix(sshd:auth): authentication failure;
2019-04-05 10:13 attacks Port ScanHacking AbuseIPDB SSH/RDP/Plesk/Webmin
2019-04-05 09:31 attacks Brute-Force AbuseIPDB $f2bV_matches
2019-04-05 08:00 attacks SSH AbuseIPDB Apr 5 16:59:40 sshgateway sshd\[13034\]: Invalid user ftp1 from 103.17.55.200 Apr 5 16:59:40 sshgateway sshd\[13034\]: pam_unix\(sshd:auth\): authenti
2019-04-05 07:45 attacks Brute-ForceSSH AbuseIPDB Apr 5 19:45:27 server01 sshd\[32363\]: Invalid user matt from 103.17.55.200 Apr 5 19:45:27 server01 sshd\[32363\]: pam_unix\(sshd:auth\): authenticati
2019-04-05 07:45 attacks SSH AbuseIPDB Apr 5 16:45:00 thevastnessof sshd[20848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.17.55.200
2019-04-05 04:04 attacks Brute-ForceSSH AbuseIPDB Apr 5 15:04:26 vps647732 sshd[5937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.17.55.200 Apr 5 15:04
2019-04-05 01:57 attacks Brute-ForceSSH AbuseIPDB Apr 5 16:27:39 tanzim-HP-Z238-Microtower-Workstation sshd\[9589\]: Invalid user ftpuser from 103.17.55.200 Apr 5 16:27:39 tanzim-HP-Z238-Microtower-Wo
2019-04-04 22:36 attacks Brute-ForceSSH AbuseIPDB Apr 5 03:36:12 debian sshd\[6474\]: Invalid user shop from 103.17.55.200 port 60856 Apr 5 03:36:12 debian sshd\[6474\]: pam_unix\(sshd:auth\): authent
2019-04-04 20:24 attacks Brute-ForceSSH AbuseIPDB Apr 5 07:23:42 host sshd\[48577\]: Invalid user sysadmin from 103.17.55.200 port 36790 Apr 5 07:23:42 host sshd\[48577\]: pam_unix\(sshd:auth\): authe
2019-04-04 08:58 attacks Brute-ForceSSH AbuseIPDB Apr 4 19:58:22 mail sshd\[26236\]: Invalid user applmgr from 103.17.55.200 port 56548 Apr 4 19:58:22 mail sshd\[26236\]: Disconnected from 103.17.55.2
2019-04-04 08:38 attacks Brute-ForceSSH AbuseIPDB Triggered by Fail2Ban
2019-04-04 08:34 attacks Brute-ForceSSH AbuseIPDB  
2019-04-04 06:06 attacks Brute-ForceSSH AbuseIPDB SSH Bruteforce Attack
2019-04-04 03:32 attacks Brute-ForceSSH AbuseIPDB  
2019-04-04 03:26 attacks Brute-ForceSSH AbuseIPDB SSH Brute-Force reported by Fail2Ban
2019-04-03 23:47 attacks Brute-ForceSSH AbuseIPDB  
2019-04-03 18:07 attacks Brute-ForceSSH AbuseIPDB Apr 4 05:07:13 ns37 sshd[4394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.17.55.200 Apr 4 05:07:13 n
2019-04-03 11:05 attacks Brute-ForceSSH AbuseIPDB Attempted SSH login
2019-04-03 11:02 attacks Brute-ForceSSH AbuseIPDB Apr 3 06:01:20 *** sshd[14274]: Failed password for invalid user ftp from 103.17.55.200 port 50193 ssh2 Apr 3 06:05:29 *** sshd[14420]: Failed passwor
2019-04-03 08:44 attacks Port ScanHackingBrute-ForceWeb App Attack AbuseIPDB 2019-04-03T19:36:55.788211lon01.zurich-datacenter.net sshd\[29912\]: Invalid user kafka from 103.17.55.200 port 48093 2019-04-03T19:36:55.792813lon01.
2019-04-03 07:37 attacks Brute-Force AbuseIPDB Apr 3 16:37:00 localhost sshd\[16991\]: Invalid user tanya from 103.17.55.200 port 54171 Apr 3 16:37:00 localhost sshd\[16991\]: pam_unix\(sshd:auth\)
2019-04-03 06:30 attacks Brute-ForceSSH AbuseIPDB Multiple failed SSH logins
2019-04-03 06:26 attacks Brute-ForceSSH AbuseIPDB Apr 3 17:26:52 MK-Soft-Root1 sshd\[23625\]: Invalid user ib from 103.17.55.200 port 34387 Apr 3 17:26:52 MK-Soft-Root1 sshd\[23625\]: pam_unix\(sshd:a
2019-04-03 03:32 attacks HackingBrute-ForceSSH AbuseIPDB SSH authentication failure x 6 reported by Fail2Ban
2019-04-03 02:15 attacks Brute-ForceSSH AbuseIPDB (sshd) Failed SSH login from 103.17.55.200 (-): 5 in the last 3600 secs
2019-04-03 02:07 attacks Brute-ForceSSH AbuseIPDB many_ssh_attempts
2019-04-03 01:41 attacks Brute-ForceSSH AbuseIPDB ssh_attempt
2019-04-03 00:58 attacks Brute-ForceSSH AbuseIPDB Apr 3 11:51:06 lnxded63 sshd[17234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.17.55.200 Apr 3 11:51
2019-04-02 21:40 attacks Brute-ForceSSH AbuseIPDB Apr 3 08:32:24 Ubuntu-1404-trusty-64-minimal sshd\[32565\]: Invalid user adrc from 103.17.55.200 Apr 3 08:32:24 Ubuntu-1404-trusty-64-minimal sshd\[32
2019-04-02 18:48 attacks Brute-ForceSSH AbuseIPDB Apr 3 06:48:14 srv-4 sshd\[3773\]: Invalid user oracle from 103.17.55.200 Apr 3 06:48:14 srv-4 sshd\[3773\]: pam_unix\(sshd:auth\): authentication fai
2019-04-02 18:46 attacks Brute-ForceSSH AbuseIPDB Apr 3 05:46:22 vpn01 sshd\[16794\]: Invalid user oracle from 103.17.55.200 Apr 3 05:46:22 vpn01 sshd\[16794\]: pam_unix\(sshd:auth\): authentication f
2019-04-02 17:19 attacks Brute-ForceSSH AbuseIPDB 2019-04-03T02:13:55.883157hubschaetterus sshd\[18622\]: Invalid user delta from 103.17.55.200 2019-04-03T02:13:55.918033hubschaetterus sshd\[18622\]:
2019-04-02 16:53 attacks Brute-ForceSSH AbuseIPDB Apr 3 03:46:58 ns37 sshd[13908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.17.55.200 Apr 3 03:47:00
2019-04-02 14:06 attacks Brute-ForceSSH AbuseIPDB SSH-Bruteforce
2019-04-02 13:30 attacks Brute-ForceSSH AbuseIPDB SSH-BruteForce
2019-04-02 08:53 attacks Brute-ForceSSH AbuseIPDB  
2019-04-02 02:37 attacks Brute-Force AbuseIPDB Apr 2 11:37:37 localhost sshd\[15687\]: Invalid user ec from 103.17.55.200 port 37585 Apr 2 11:37:37 localhost sshd\[15687\]: pam_unix\(sshd:auth\): a
2019-02-27 00:31 attacks AbuseIPDB Feb 27 10:14:43 vps466218 sshd[28655]: Invalid user cm from 103.17.55.200 port 55588 Feb 27 10:14:43 vps466218 sshd[28655]: pam_unix(sshd:auth): authe
2019-02-27 01:30 attacks Brute-ForceSSH AbuseIPDB Feb 27 12:30:19 HiS01 sshd\[13554\]: Invalid user fn from 103.17.55.200 Feb 27 12:30:19 HiS01 sshd\[13554\]: pam_unix\(sshd:auth\): authentication fai
2019-02-27 02:41 attacks Brute-ForceSSH AbuseIPDB  
2019-02-27 07:47 attacks Brute-ForceSSH AbuseIPDB Feb 27 18:47:51 ArkNodeAT sshd\[29377\]: Invalid user jf from 103.17.55.200 Feb 27 18:47:51 ArkNodeAT sshd\[29377\]: pam_unix\(sshd:auth\): authentica
2019-02-27 09:13 attacks Brute-ForceSSH AbuseIPDB Feb 27 19:48:49 db sshd\[29573\]: Invalid user ftpuser from 103.17.55.200 Feb 27 19:48:49 db sshd\[29573\]: pam_unix\(sshd:auth\): authentication fail
2019-02-27 12:50 attacks FTP Brute-ForceHacking AbuseIPDB Feb 27 10:39:09 shared04 sshd[13958]: Invalid user sysop from 103.17.55.200 Feb 27 10:39:09 shared04 sshd[13958]: pam_unix(sshd:auth): authentication
2019-02-27 18:30 attacks Brute-ForceSSH AbuseIPDB Feb 28 05:21:01 apollo sshd\[18519\]: Invalid user teamspeak from 103.17.55.200Feb 28 05:21:03 apollo sshd\[18519\]: Failed password for invalid user
2019-02-27 20:18 attacks Brute-ForceSSH AbuseIPDB Feb 28 13:08:37 itv-usvr-01 sshd[3726]: Invalid user freund from 103.17.55.200 Feb 28 13:08:37 itv-usvr-01 sshd[3726]: pam_unix(sshd:auth): authentica
2019-02-27 22:06 attacks SSH AbuseIPDB 2019-02-28T15:06:21.623788enmeeting.mahidol.ac.th sshd\[23639\]: Invalid user xv from 103.17.55.200 port 39653 2019-02-28T15:06:21.642572enmeeting.mah
2019-02-27 22:35 attacks Brute-ForceSSH AbuseIPDB SSH Bruteforce
2019-03-29 18:18 attacks bi_any_0_1d BadIPs.com  
2019-03-29 18:20 attacks SSH bi_ssh_0_1d BadIPs.com  
2019-03-29 18:21 attacks blocklist_de Blocklist.de  
2019-03-29 18:21 attacks SSH blocklist_de_ssh Blocklist.de  
2019-03-29 18:27 attacks firehol_level2 FireHOL  
2019-03-29 18:41 attacks Brute-Force normshield_all_bruteforce NormShield.com  
2019-03-29 18:41 attacks Brute-Force normshield_high_bruteforce NormShield.com  
2019-05-28 23:19 attacks SSH bi_sshd_0_1d BadIPs.com  
2019-06-03 22:50 attacks darklist_de darklist.de  
2019-06-07 19:19 attacks Bad Web Bot bi_badbots_0_1d BadIPs.com  
2019-06-07 19:19 attacks Brute-Force bi_bruteforce_0_1d BadIPs.com  
2019-06-18 08:29 attacks bi_default_0_1d BadIPs.com  
2019-06-18 08:29 attacks bi_unknown_0_1d BadIPs.com  
2019-06-20 06:26 attacks Fraud VoIP blocklist_de_sip Blocklist.de  
2019-07-26 23:08 attacks Web App AttackApache Attack blocklist_de_apache Blocklist.de  
2019-07-26 23:08 attacks Brute-Force blocklist_de_bruteforce Blocklist.de  
2019-08-20 17:43 attacks Fraud VoIP voipbl VoIPBL.org  
2019-08-21 16:17 attacks Brute-ForceMailserver Attack bi_mail_0_1d BadIPs.com  
2019-08-21 16:18 attacks Mailserver Attack bi_sasl_0_1d BadIPs.com  
2019-08-21 16:18 attacks Email Spam bi_spam_0_1d BadIPs.com  
2019-08-21 16:19 attacks Brute-ForceMailserver Attack blocklist_de_imap Blocklist.de  
2019-08-21 16:19 attacks Brute-ForceMailserver Attack blocklist_de_mail Blocklist.de  
2019-08-29 09:07 attacks normshield_all_webscan NormShield.com  
2019-08-29 09:07 attacks normshield_high_webscan NormShield.com  
2019-09-02 04:47 attacks Mailserver Attack ip-46.com  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

inetnum: 103.17.52.0 - 103.17.55.255
netname: BITEK-ID
descr: PT. Bit Technology Nusantara
descr: Internet Service Provider
descr: Jakarta
admin-c: AF342-AP
tech-c: AF342-AP
remarks: Send Spam & Abuse report to: hostmaster@bitek.net.id
country: ID
mnt-by: MNT-APJII-ID
mnt-lower: MAINT-ID-BITEK
mnt-irt: IRT-BITEK-ID
status: ALLOCATED PORTABLE
mnt-routes: MAINT-ID-BITEK
last-modified: 2017-09-12T09:00:41Z
source: APNIC

irt: IRT-BITEK-ID
address: PT. Bit Teknologi Nusantara
address: Internet Service Provider
address: Jakarta
e-mail: hostmaster@bitek.net.id
abuse-mailbox: hostmaster@bitek.net.id
admin-c: DNS10-AP
tech-c: DNS10-AP
auth: # Filtered
mnt-by: MAINT-ID-BITEK
last-modified: 2018-05-31T22:29:54Z
source: APNIC

person: Ahmad Farisy
address: Rukan Permata Senayan Blok A2
address: Jl. Tentara Pelajar, Jakarta 12210
country: ID
phone: +62-21-57940688
e-mail: hostmaster@bitek.net.id
nic-hdl: AF342-AP
mnt-by: MAINT-ID-BITEK
fax-no: +62-21-57950077
last-modified: 2017-09-11T06:55:24Z
source: APNIC

inetnum: 103.17.52.0 - 103.17.55.255
netname: BITEK-ID
descr: PT. Bit Technology Nusantara
descr: Internet Service Provider
descr: Jakarta
admin-c: AF342-AP
tech-c: AF342-AP
remarks: Send Spam & Abuse report to: hostmaster@bitek.net.id
country: ID
mnt-by: MNT-APJII-ID
mnt-lower: MAINT-ID-BITEK
mnt-irt: IRT-BITEK-ID
status: ALLOCATED PORTABLE
mnt-routes: MAINT-ID-BITEK
last-modified: 2017-09-12T09:00:41Z
source: IDNIC

irt: IRT-BITEK-ID
address: PT. Bit Teknologi Nusantara
address: Internet Service Provider
address: Jakarta
e-mail: hostmaster@bitek.net.id
abuse-mailbox: hostmaster@bitek.net.id
admin-c: DNS10-AP
tech-c: DNS10-AP
auth: # Filtered
mnt-by: MAINT-ID-BITEK
last-modified: 2018-02-27T03:02:08Z
source: IDNIC

person: Ahmad Farisy
address: Rukan Permata Senayan Blok A2
address: Jl. Tentara Pelajar, Jakarta 12210
country: ID
phone: +62-21-57940688
e-mail: hostmaster@bitek.net.id
nic-hdl: AF342-AP
mnt-by: MAINT-ID-BITEK
fax-no: +62-21-57950077
last-modified: 2017-09-11T06:55:24Z
source: IDNIC
most specific ip range is highlighted
Updated : 2019-09-02