Go
103.23.102.3
is a
Hacker
100 %
Indonesia
Report Abuse
1016attacks reported
814Brute-ForceSSH
76Brute-Force
61SSH
20Port ScanBrute-ForceSSH
16HackingBrute-ForceSSH
7uncategorized
6Hacking
4DDoS Attack
4Port ScanHackingBrute-ForceWeb App AttackSSH
2DDoS AttackSSH
...
1abuse reported
1Email Spam
from 152 distinct reporters
and 10 distinct sources : darklist.de, FireHOL, Charles Haley, BadIPs.com, NoThink.org, Blocklist.de, blocklist.net.ua, VoIPBL.org, GreenSnow.co, AbuseIPDB
103.23.102.3 was first signaled at 2018-01-02 10:02 and last record was at 2020-08-02 14:28.
IP

103.23.102.3

Organization
Universitas Negeri Semarang
Localisation
Indonesia
Jawa Tengah, Semarang
NetRange : First & Last IP
103.23.100.0 - 103.23.103.255
Network CIDR
103.23.100.0/22

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-03-28 12:34 attacks Brute-Force AbuseIPDB Jan 16 21:25:43 localhost sshd\[16042\]: Invalid user ralph from 103.23.102.3 Jan 16 21:25:43 localhost sshd\[16042\]: pam_unix\(sshd:auth\): authenti
2019-03-25 04:34 attacks Brute-Force AbuseIPDB Jan 16 21:25:43 localhost sshd\[16042\]: Invalid user ralph from 103.23.102.3 Jan 16 21:25:43 localhost sshd\[16042\]: pam_unix\(sshd:auth\): authenti
2019-03-23 19:37 attacks Brute-Force AbuseIPDB Jan 16 21:25:43 localhost sshd\[16042\]: Invalid user ralph from 103.23.102.3 Jan 16 21:25:43 localhost sshd\[16042\]: pam_unix\(sshd:auth\): authenti
2019-03-19 10:26 attacks Brute-Force AbuseIPDB Jan 16 21:25:43 localhost sshd\[16042\]: Invalid user ralph from 103.23.102.3 Jan 16 21:25:43 localhost sshd\[16042\]: pam_unix\(sshd:auth\): authenti
2019-03-18 18:33 attacks Brute-ForceSSH AbuseIPDB $f2bV_matches
2019-03-12 18:15 attacks Brute-Force AbuseIPDB Jan 16 21:25:43 localhost sshd\[16042\]: Invalid user ralph from 103.23.102.3 Jan 16 21:25:43 localhost sshd\[16042\]: pam_unix\(sshd:auth\): authenti
2019-03-07 15:27 attacks Brute-ForceSSH AbuseIPDB vps1:pam-generic
2019-03-07 13:28 attacks Brute-Force AbuseIPDB Jan 16 21:25:43 localhost sshd\[16042\]: Invalid user ralph from 103.23.102.3 Jan 16 21:25:43 localhost sshd\[16042\]: pam_unix\(sshd:auth\): authenti
2019-03-07 07:36 attacks Brute-ForceSSH AbuseIPDB vps1:pam-generic
2019-03-05 16:02 attacks Brute-Force AbuseIPDB Jan 16 21:25:43 localhost sshd\[16042\]: Invalid user ralph from 103.23.102.3 Jan 16 21:25:43 localhost sshd\[16042\]: pam_unix\(sshd:auth\): authenti
2019-03-04 09:36 attacks Brute-Force AbuseIPDB Jan 16 21:25:43 localhost sshd\[16042\]: Invalid user ralph from 103.23.102.3 Jan 16 21:25:43 localhost sshd\[16042\]: pam_unix\(sshd:auth\): authenti
2019-03-03 08:27 attacks Brute-ForceSSH AbuseIPDB $f2bV_matches
2019-03-03 02:44 attacks Brute-ForceSSH AbuseIPDB  
2019-03-01 18:51 attacks Brute-Force AbuseIPDB Jan 16 21:25:43 localhost sshd\[16042\]: Invalid user ralph from 103.23.102.3 Jan 16 21:25:43 localhost sshd\[16042\]: pam_unix\(sshd:auth\): authenti
2019-02-28 00:14 attacks Brute-Force AbuseIPDB Jan 16 21:25:43 localhost sshd\[16042\]: Invalid user ralph from 103.23.102.3 Jan 16 21:25:43 localhost sshd\[16042\]: pam_unix\(sshd:auth\): authenti
2019-02-23 15:25 attacks Brute-Force AbuseIPDB Jan 16 21:25:43 localhost sshd\[16042\]: Invalid user ralph from 103.23.102.3 Jan 16 21:25:43 localhost sshd\[16042\]: pam_unix\(sshd:auth\): authenti
2019-02-23 06:39 attacks Brute-ForceSSH AbuseIPDB ssh_attempt
2019-02-22 04:14 attacks Brute-ForceSSH AbuseIPDB Nov 30 16:28:24 mail sshd\[30661\]: Invalid user ahe from 103.23.102.3 port 54077 Nov 30 16:28:24 mail sshd\[30661\]: pam_unix\(sshd:auth\): authentic
2019-02-22 03:52 attacks Brute-ForceSSH AbuseIPDB Nov 30 16:28:24 mail sshd\[30661\]: Invalid user ahe from 103.23.102.3 port 54077 Nov 30 16:28:24 mail sshd\[30661\]: pam_unix\(sshd:auth\): authentic
2019-02-21 23:58 attacks Brute-Force AbuseIPDB Jan 16 21:25:43 localhost sshd\[16042\]: Invalid user ralph from 103.23.102.3 Jan 16 21:25:43 localhost sshd\[16042\]: pam_unix\(sshd:auth\): authenti
2019-02-21 05:36 attacks Brute-ForceSSH AbuseIPDB IP involved in SSH attack
2019-02-19 10:05 attacks Port ScanBrute-ForceSSH AbuseIPDB $f2bV_matches
2019-02-19 07:54 attacks Brute-Force AbuseIPDB Jan 16 21:25:43 localhost sshd\[16042\]: Invalid user ralph from 103.23.102.3 Jan 16 21:25:43 localhost sshd\[16042\]: pam_unix\(sshd:auth\): authenti
2019-02-19 05:35 attacks Brute-ForceSSH AbuseIPDB Feb 19 10:35:36 debian sshd\[24877\]: Invalid user mpool from 103.23.102.3 port 56401 Feb 19 10:35:36 debian sshd\[24877\]: pam_unix\(sshd:auth\): aut
2019-02-19 05:18 attacks SSH AbuseIPDB  
2019-02-19 05:14 attacks Brute-ForceSSH AbuseIPDB  
2019-02-19 04:35 attacks DDoS AttackSSH AbuseIPDB Feb 13 19:06:16 l02a sshd\[13962\]: Invalid user minecraft from 103.23.102.3 Feb 13 19:06:16 l02a sshd\[13962\]: pam_unix\(sshd:auth\): authentication
2019-02-19 03:57 attacks Brute-ForceSSH AbuseIPDB $f2bV_matches
2019-02-18 23:34 attacks Brute-ForceSSH AbuseIPDB 2019-02-19T10:34:24.686357centos sshd\[14172\]: Invalid user bill from 103.23.102.3 port 37787 2019-02-19T10:34:24.693729centos sshd\[14172\]: pam_uni
2019-02-18 22:47 attacks Brute-ForceSSH AbuseIPDB Feb 19 09:47:09 srv1-bit sshd[15304]: Invalid user carlos from 103.23.102.3
2019-02-18 20:15 attacks Brute-ForceSSH AbuseIPDB Feb 19 07:15:01 HiS01 sshd\[6714\]: Invalid user zbomc from 103.23.102.3 Feb 19 07:15:01 HiS01 sshd\[6714\]: pam_unix\(sshd:auth\): authentication fai
2019-02-18 19:39 attacks Brute-ForceSSH AbuseIPDB Feb 19 05:34:22 ip-172-31-1-72 sshd\[6888\]: Invalid user username from 103.23.102.3 Feb 19 05:34:22 ip-172-31-1-72 sshd\[6888\]: pam_unix\(sshd:auth\
2019-02-18 19:29 attacks Brute-ForceSSH AbuseIPDB Feb 19 06:29:17 ubuntu-2gb-nbg1-dc3-1 sshd[24689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.102.
2019-02-18 18:33 attacks Brute-ForceSSH AbuseIPDB Feb 19 07:23:07 isp-ru sshd\[19723\]: Invalid user users from 103.23.102.3 port 37856 Feb 19 07:23:07 isp-ru sshd\[19723\]: pam_unix\(sshd:auth\): aut
2019-02-18 18:28 attacks Brute-ForceSSH AbuseIPDB  
2019-02-18 13:52 attacks Brute-ForceSSH AbuseIPDB Feb 19 00:45:01 apollo sshd\[14797\]: Invalid user hadoop from 103.23.102.3Feb 19 00:45:03 apollo sshd\[14797\]: Failed password for invalid user hado
2019-02-18 13:31 attacks Brute-ForceSSH AbuseIPDB Feb 19 00:23:02 tux-35-217 sshd\[29510\]: Invalid user tf from 103.23.102.3 port 45139 Feb 19 00:23:02 tux-35-217 sshd\[29510\]: pam_unix\(sshd:auth\)
2019-02-18 11:32 attacks Brute-ForceSSH AbuseIPDB Feb 18 21:32:47 MK-Soft-VM4 sshd\[25465\]: Invalid user vitalina from 103.23.102.3 port 46365 Feb 18 21:32:47 MK-Soft-VM4 sshd\[25465\]: pam_unix\(ssh
2019-02-18 10:01 attacks Brute-ForceSSH AbuseIPDB Feb 17 23:56:27 *** sshd[27724]: Failed password for invalid user team from 103.23.102.3 port 50062 ssh2 Feb 18 00:01:43 *** sshd[27785]: Failed passw
2019-02-18 08:54 attacks SSH AbuseIPDB $f2bV_matches
2019-02-18 08:48 attacks Brute-Force AbuseIPDB Feb 18 18:48:09 localhost sshd\[9224\]: Invalid user devol from 103.23.102.3 port 47311 Feb 18 18:48:09 localhost sshd\[9224\]: pam_unix\(sshd:auth\):
2019-02-18 08:12 attacks Brute-ForceSSH AbuseIPDB Feb 18 18:07:49 marquez sshd[18505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.102.3 Feb 18 18:07
2019-02-18 08:10 attacks Brute-ForceSSH AbuseIPDB Feb 18 19:04:52 meumeu sshd[6919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.102.3 Feb 18 19:04:
2019-02-18 06:07 attacks Brute-ForceSSH AbuseIPDB Feb 18 17:06:57 icinga sshd[12782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.102.3 Feb 18 17:06:
2019-02-18 05:19 attacks Port ScanBrute-ForceSSH AbuseIPDB Feb 18 16:08:34 server sshd[35968]: Failed password for invalid user rails from 103.23.102.3 port 34027 ssh2 Feb 18 16:14:26 server sshd[37524]: Faile
2019-02-18 03:01 attacks Brute-ForceSSH AbuseIPDB many_ssh_attempts
2019-02-18 02:56 attacks Brute-ForceSSH AbuseIPDB 2019-02-18T13:54:34.967621stark.klein-stark.info sshd\[22198\]: Invalid user amp from 103.23.102.3 port 36866 2019-02-18T13:54:34.973743stark.klein-st
2019-02-18 02:35 attacks SSH AbuseIPDB 2019-02-19T20:03:14.796836enmeeting.mahidol.ac.th sshd\[8599\]: User root from 103.23.102.3 not allowed because not listed in AllowUsers 2019-02-19T20
2019-02-18 01:26 attacks Brute-ForceSSH AbuseIPDB ssh_attempt
2019-02-18 01:16 attacks Brute-Force AbuseIPDB Feb 18 11:16:59 work-partkepr sshd\[25720\]: Invalid user svt from 103.23.102.3 port 33496 Feb 18 11:16:59 work-partkepr sshd\[25720\]: pam_unix\(sshd
2018-01-02 10:02 attacks Brute-ForceSSH AbuseIPDB SSH/22 MH Probe, BF -
2018-11-15 06:18 attacks Brute-ForceSSH AbuseIPDB Nov 15 17:18:25 *** sshd\[17695\]: Invalid user maslogor from 103.23.102.3 port 55844 Nov 15 17:18:25 *** sshd\[17695\]: pam_unix\(sshd:auth\): authen
2018-11-15 06:39 attacks Brute-ForceSSH AbuseIPDB Nov 15 17:39:01 *** sshd\[18821\]: Invalid user eugenie from 103.23.102.3 port 52153 Nov 15 17:39:01 *** sshd\[18821\]: pam_unix\(sshd:auth\): authent
2018-11-15 07:19 attacks HackingBrute-ForceSSH AbuseIPDB SSH authentication failure x 6 reported by Fail2Ban
2018-11-15 08:20 attacks SSH AbuseIPDB Nov 15 23:20:13 2684444 sshd[4987]: Invalid user ts3srv from 103.23.102.3 Nov 15 23:20:13 2684444 sshd[4987]: pam_unix(sshd:auth): authentication fail
2018-11-15 08:38 attacks SSH AbuseIPDB Nov 15 23:38:56 2684444 sshd[5180]: Invalid user fog from 103.23.102.3 Nov 15 23:38:56 2684444 sshd[5180]: pam_unix(sshd:auth): authentication failure
2018-11-15 08:55 attacks Brute-ForceSSH AbuseIPDB  
2018-11-15 09:05 attacks Brute-ForceSSH AbuseIPDB Nov 15 19:05:21 ip-172-31-45-46 sshd\[2653\]: Invalid user server from 103.23.102.3 Nov 15 19:05:23 ip-172-31-45-46 sshd\[2655\]: Invalid user jwgblog
2018-11-15 10:06 attacks Brute-ForceSSH AbuseIPDB Nov 15 20:06:40 ns3041690 sshd[22522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.102.3 Nov 15 20:
2018-11-15 10:32 attacks Brute-ForceSSH AbuseIPDB Nov 15 20:32:05 1 sshd[4953]: Invalid user jeanmarc from 103.23.102.3 Nov 15 20:32:05 1 sshd[4953]: pam_unix(sshd:auth): authentication failure; logna
2019-03-29 18:23 attacks darklist_de darklist.de  
2019-03-29 18:27 attacks firehol_level4 FireHOL  
2019-03-29 18:34 attacks SSH haley_ssh Charles Haley  
2019-05-28 23:18 attacks bi_any_0_1d BadIPs.com  
2019-05-28 23:19 attacks SSH bi_sshd_0_1d BadIPs.com  
2019-05-28 23:19 attacks SSH bi_ssh_0_1d BadIPs.com  
2019-05-30 09:29 attacks Bad Web Bot bi_badbots_0_1d BadIPs.com  
2019-05-30 09:29 attacks Brute-Force bi_bruteforce_0_1d BadIPs.com  
2019-06-03 22:59 attacks SSH nt_ssh_7d NoThink.org  
2020-07-31 15:56 attacks SSH bi_ssh-ddos_0_1d BadIPs.com  
2020-07-31 15:57 attacks blocklist_de Blocklist.de  
2020-07-31 15:57 attacks SSH blocklist_de_ssh Blocklist.de  
2020-07-31 15:57 attacks blocklist_de_strongips Blocklist.de  
2020-07-31 15:57 abuse Email Spam blocklist_net_ua blocklist.net.ua  
2020-07-31 16:01 attacks firehol_level2 FireHOL  
2020-07-31 16:24 attacks Fraud VoIP voipbl VoIPBL.org  
2020-08-02 14:28 attacks greensnow GreenSnow.co  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

inetnum: 103.23.100.0 - 103.23.103.255
netname: UNNES-ID
descr: Universitas Negeri Semarang
descr: University / Direct Member IDNIC
descr: Kampus Sekaran, Gunungpati
descr: Semarang 50229
country: ID
admin-c: MS1303-AP
tech-c: MS1303-AP
remarks: Send Spam& Abuse Reports to
remarks: abuse@it.unnes.ac.id
mnt-by: MNT-APJII-ID
mnt-routes: MAINT-ID-UNNES
mnt-irt: IRT-UNNES-ID
status: ASSIGNED PORTABLE
last-modified: 2011-11-18T01:44:33Z
source: APNIC

irt: IRT-UNNES-ID
address: Universitas Negeri Semarang
address: Kampus Sekaran, Gunungpati
address: Semarang 50229
e-mail: abuse@it.unnes.ac.id
abuse-mailbox: abuse@it.unnes.ac.id
admin-c: MS1303-AP
tech-c: MS1303-AP
auth: # Filtered
mnt-by: MAINT-ID-UNNES
last-modified: 2018-05-31T22:29:32Z
source: APNIC

person: Mona Subagja
address: BPTIK Universitas Negeri Semarang
address: Kampus Sekaran, Gunungpati Semarang
address: Semarang - Indonesia
country: ID
phone: +62-24-8508083
fax-no: +62-24-8508001
e-mail: mona@unnes.ac.id
nic-hdl: MS1303-AP
mnt-by: MAINT-ID-UNNES
last-modified: 2011-11-04T06:51:25Z
source: APNIC

inetnum: 103.23.100.0 - 103.23.103.255
netname: UNNES-ID
descr: Universitas Negeri Semarang
descr: University / Direct Member IDNIC
descr: Kampus Sekaran, Gunungpati
descr: Semarang 50229
country: ID
admin-c: MS1303-AP
tech-c: MS1303-AP
remarks: Send Spam& Abuse Reports to
remarks: abuse@it.unnes.ac.id
mnt-by: MNT-APJII-ID
mnt-routes: MAINT-ID-UNNES
mnt-irt: IRT-UNNES-ID
status: ASSIGNED PORTABLE
last-modified: 2011-11-18T01:44:33Z
source: IDNIC

irt: IRT-UNNES-ID
address: Universitas Negeri Semarang
address: Kampus Sekaran, Gunungpati
address: Semarang 50229
e-mail: abuse@it.unnes.ac.id
abuse-mailbox: abuse@it.unnes.ac.id
admin-c: MS1303-AP
tech-c: MS1303-AP
auth: # Filtered
mnt-by: MAINT-ID-UNNES
last-modified: 2011-11-17T03:17:50Z
source: IDNIC

person: Mona Subagja
address: BPTIK Universitas Negeri Semarang
address: Kampus Sekaran, Gunungpati Semarang
address: Semarang - Indonesia
country: ID
phone: +62-24-8508083
fax-no: +62-24-8508001
e-mail: mona@unnes.ac.id
nic-hdl: MS1303-AP
mnt-by: MAINT-ID-UNNES
last-modified: 2011-11-04T06:51:25Z
source: IDNIC
most specific ip range is highlighted
Updated : 2020-06-05