Go
116.68.249.19
is a
Hacker
100 %
Indonesia
Report Abuse
1013attacks reported
812Brute-ForceSSH
82Brute-Force
52SSH
25Port ScanBrute-ForceSSH
18HackingBrute-ForceSSH
6Hacking
5uncategorized
4Port ScanHackingBrute-ForceWeb App AttackSSH
1Port ScanHacking
1Port ScanBrute-Force
...
from 160 distinct reporters
and 7 distinct sources : BadIPs.com, Blocklist.de, darklist.de, FireHOL, Charles Haley, NoThink.org, AbuseIPDB
116.68.249.19 was first signaled at 2018-11-02 20:20 and last record was at 2019-06-16 10:28.
IP

116.68.249.19

Organization
PT. Cross Network Indonesia
Localisation
Indonesia
Jawa Timur, Surabaya
NetRange : First & Last IP
116.68.249.0 - 116.68.249.255
Network CIDR
116.68.249.0/24

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-04-06 12:39 attacks Brute-ForceSSH AbuseIPDB Apr 6 23:39:13 pornomens sshd\[27294\]: Invalid user pn from 116.68.249.19 port 55114 Apr 6 23:39:13 pornomens sshd\[27294\]: pam_unix\(sshd:auth\): a
2019-04-06 07:37 attacks Brute-ForceSSH AbuseIPDB Apr 6 18:37:23 mail sshd[18089]: Invalid user virus from 116.68.249.19 Apr 6 18:37:23 mail sshd[18089]: pam_unix(sshd:auth): authentication failure; l
2019-04-06 01:18 attacks Brute-ForceSSH AbuseIPDB many_ssh_attempts
2019-04-06 00:37 attacks Brute-ForceSSH AbuseIPDB ssh_attempt
2019-04-06 00:22 attacks Port ScanHacking AbuseIPDB SSH/RDP/Plesk/Webmin sniffing
2019-04-05 23:56 attacks Brute-ForceSSH AbuseIPDB  
2019-04-05 19:14 attacks Brute-ForceSSH AbuseIPDB Apr 6 05:14:54 debian sshd\[10380\]: Invalid user dean from 116.68.249.19 port 49854 Apr 6 05:14:54 debian sshd\[10380\]: pam_unix\(sshd:auth\): authe
2019-04-05 16:05 attacks Brute-Force AbuseIPDB Apr 6 01:05:52 marvibiene sshd[7957]: Invalid user mailnull from 116.68.249.19 port 45520 Apr 6 01:05:52 marvibiene sshd[7957]: pam_unix(sshd:auth): a
2019-04-05 11:15 attacks Brute-ForceSSH AbuseIPDB Apr 5 23:15:14 srv-4 sshd\[7883\]: Invalid user pgsql from 116.68.249.19 Apr 5 23:15:14 srv-4 sshd\[7883\]: pam_unix\(sshd:auth\): authentication fail
2019-04-05 11:12 attacks Brute-ForceSSH AbuseIPDB Apr 5 22:12:29 vpn01 sshd\[7988\]: Invalid user pgsql from 116.68.249.19 Apr 5 22:12:29 vpn01 sshd\[7988\]: pam_unix\(sshd:auth\): authentication fail
2019-04-05 09:43 attacks Brute-ForceSSH AbuseIPDB Apr 5 20:43:36 [host] sshd[22034]: Invalid user adm from 116.68.249.19 Apr 5 20:43:36 [host] sshd[22034]: pam_unix(sshd:auth): authentication failure;
2019-04-05 04:08 attacks Brute-ForceSSH AbuseIPDB SSH Brute-Force reported by Fail2Ban
2019-04-05 03:48 attacks Brute-ForceSSH AbuseIPDB Tried sshing with brute force.
2019-04-04 21:56 attacks Brute-ForceSSH AbuseIPDB Apr 5 07:56:47 debian sshd\[29882\]: Invalid user ftpuser from 116.68.249.19 port 55460 Apr 5 07:56:47 debian sshd\[29882\]: pam_unix\(sshd:auth\): au
2019-04-04 20:39 attacks Brute-ForceSSH AbuseIPDB Apr 5 07:39:28 [host] sshd[7429]: Invalid user zabbix from 116.68.249.19 Apr 5 07:39:28 [host] sshd[7429]: pam_unix(sshd:auth): authentication failure
2019-04-04 17:41 attacks Brute-ForceSSH AbuseIPDB Apr 5 08:11:45 tanzim-HP-Z238-Microtower-Workstation sshd\[19642\]: Invalid user ftpuser1 from 116.68.249.19 Apr 5 08:11:45 tanzim-HP-Z238-Microtower-
2019-04-04 13:26 attacks Brute-ForceSSH AbuseIPDB Apr 4 22:26:12 *** sshd[19887]: Invalid user staff from 116.68.249.19
2019-04-04 12:21 attacks Brute-ForceSSH AbuseIPDB  
2019-04-04 11:03 attacks Brute-ForceSSH AbuseIPDB Apr 3 16:20:28 *** sshd[26194]: Failed password for invalid user support from 116.68.249.19 port 35248 ssh2 Apr 3 16:28:46 *** sshd[26373]: Failed pas
2019-04-04 10:27 attacks Brute-ForceSSH AbuseIPDB Apr 4 19:27:43 MK-Soft-VM4 sshd\[27687\]: Invalid user locate from 116.68.249.19 port 52338 Apr 4 19:27:43 MK-Soft-VM4 sshd\[27687\]: pam_unix\(sshd:a
2019-04-04 10:04 attacks Brute-ForceSSH AbuseIPDB Apr 4 21:04:29 ncomp sshd[15996]: Invalid user mike from 116.68.249.19 Apr 4 21:04:29 ncomp sshd[15996]: pam_unix(sshd:auth): authentication failure;
2019-04-03 23:23 attacks HackingBrute-ForceSSH AbuseIPDB Attempts against SSH
2019-04-03 23:22 attacks Brute-ForceSSH AbuseIPDB Apr 4 13:52:52 tanzim-HP-Z238-Microtower-Workstation sshd\[20519\]: Invalid user sysop from 116.68.249.19 Apr 4 13:52:52 tanzim-HP-Z238-Microtower-Wor
2019-04-03 21:19 attacks Brute-ForceSSH AbuseIPDB  
2019-04-03 18:18 attacks Brute-ForceSSH AbuseIPDB Apr 3 23:18:13 TORMINT sshd\[25983\]: Invalid user ambari-qa from 116.68.249.19 Apr 3 23:18:13 TORMINT sshd\[25983\]: pam_unix\(sshd:auth\): authentic
2019-04-03 14:58 attacks Brute-ForceSSH AbuseIPDB Apr 4 01:58:35 ArkNodeAT sshd\[11077\]: Invalid user ftpusr from 116.68.249.19 Apr 4 01:58:35 ArkNodeAT sshd\[11077\]: pam_unix\(sshd:auth\): authenti
2019-04-03 13:45 attacks Brute-ForceSSH AbuseIPDB SSH Bruteforce Attack
2019-04-03 13:15 attacks Brute-ForceSSH AbuseIPDB Apr 4 00:15:33 v22018076622670303 sshd\[24795\]: Invalid user popa3d from 116.68.249.19 port 54276 Apr 4 00:15:33 v22018076622670303 sshd\[24795\]: pa
2019-04-03 11:05 attacks Brute-ForceSSH AbuseIPDB Apr 3 16:20:28 *** sshd[26194]: Failed password for invalid user support from 116.68.249.19 port 35248 ssh2 Apr 3 16:28:46 *** sshd[26373]: Failed pas
2019-04-03 09:56 attacks Brute-ForceSSH AbuseIPDB Apr 3 21:56:54 srv-4 sshd\[31864\]: Invalid user uv from 116.68.249.19 Apr 3 21:56:54 srv-4 sshd\[31864\]: pam_unix\(sshd:auth\): authentication failu
2019-04-03 03:42 attacks Brute-ForceSSH AbuseIPDB Apr 3 08:31:03 debian sshd[4433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.68.249.19 Apr 3 08:31:05
2019-04-03 03:38 attacks Brute-ForceSSH AbuseIPDB SSH Brute-Force reported by Fail2Ban
2019-04-03 03:31 attacks Brute-ForceSSH AbuseIPDB Apr 3 19:31:02 itv-usvr-01 sshd[29560]: Invalid user tr from 116.68.249.19 port 46144 Apr 3 19:31:02 itv-usvr-01 sshd[29560]: pam_unix(sshd:auth): aut
2019-04-03 01:53 attacks Brute-ForceSSH AbuseIPDB F2B jail: sshd. Time: 2019-04-03 12:53:15, Reported by: VKReport
2019-04-03 01:46 attacks Brute-ForceSSH AbuseIPDB Apr 3 12:45:59 srv206 sshd[8049]: Invalid user ox from 116.68.249.19 Apr 3 12:45:59 srv206 sshd[8049]: pam_unix(sshd:auth): authentication failure; lo
2019-04-03 01:25 attacks Brute-ForceSSH AbuseIPDB Apr 3 19:15:54 martinbaileyphotography sshd\[7655\]: Invalid user sc from 116.68.249.19 port 53358 Apr 3 19:15:54 martinbaileyphotography sshd\[7655\]
2019-04-02 05:54 attacks Brute-ForceSSH AbuseIPDB Distributed SSH attack
2019-04-02 05:09 attacks Brute-ForceSSH AbuseIPDB Triggered by Fail2Ban at Ares web server
2019-04-02 03:43 attacks Brute-ForceSSH AbuseIPDB Apr 2 12:42:45 MK-Soft-VM3 sshd\[3682\]: Invalid user rizal from 116.68.249.19 port 33538 Apr 2 12:42:45 MK-Soft-VM3 sshd\[3682\]: pam_unix\(sshd:auth
2019-04-01 13:52 attacks Brute-ForceSSH AbuseIPDB Apr 1 23:46:24 marquez sshd[30846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.68.249.19 Apr 1 23:46:
2019-04-01 13:07 attacks Brute-ForceSSH AbuseIPDB Apr 2 00:03:30 SilenceServices sshd[17309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.68.249.19 Apr
2019-04-01 13:04 attacks Brute-ForceSSH AbuseIPDB Multiple failed SSH logins
2019-04-01 12:08 attacks Brute-ForceSSH AbuseIPDB Apr 1 21:02:02 mail sshd\[25796\]: Invalid user cg from 116.68.249.19 port 36456 Apr 1 21:02:02 mail sshd\[25796\]: pam_unix\(sshd:auth\): authenticat
2019-04-01 11:43 attacks Brute-ForceSSH AbuseIPDB Apr 1 16:32:07 debian sshd[5097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.68.249.19 Apr 1 16:32:09
2019-04-01 11:40 attacks Brute-ForceSSH AbuseIPDB Brute force attempt
2019-04-01 11:40 attacks Brute-ForceSSH AbuseIPDB Apr 2 03:32:07 itv-usvr-01 sshd[1126]: Invalid user dk from 116.68.249.19 port 41684 Apr 2 03:32:07 itv-usvr-01 sshd[1126]: pam_unix(sshd:auth): authe
2019-04-01 04:42 attacks Brute-ForceSSH AbuseIPDB  
2019-03-31 15:47 attacks Brute-ForceSSH AbuseIPDB SSH-BruteForce
2019-03-31 07:00 attacks Brute-ForceSSH AbuseIPDB Mar 31 17:52:14 meumeu sshd[1010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.68.249.19 Mar 31 17:52
2019-03-31 06:26 attacks Brute-ForceSSH AbuseIPDB Mar 13 10:05:52 localhost sshd[11879]: Invalid user postgres from 116.68.249.19 port 37656
2018-11-02 20:20 attacks Brute-ForceSSH AbuseIPDB Nov 3 06:20:27 cvbmail sshd\[27279\]: Invalid user log from 116.68.249.19 Nov 3 06:20:27 cvbmail sshd\[27279\]: pam_unix\(sshd:auth\): authentication
2018-11-03 04:14 attacks Brute-ForceSSH AbuseIPDB Nov 3 14:14:50 mail sshd\[31702\]: Invalid user jose from 116.68.249.19 Nov 3 14:14:50 mail sshd\[31702\]: pam_unix\(sshd:auth\): authentication failu
2018-11-03 08:06 attacks Brute-ForceSSH AbuseIPDB Nov 3 18:06:12 mail sshd\[8115\]: Invalid user toro from 116.68.249.19 Nov 3 18:06:12 mail sshd\[8115\]: pam_unix\(sshd:auth\): authentication failure
2018-11-03 10:50 attacks FTP Brute-ForceHacking AbuseIPDB Nov 2 21:20:30 m2 sshd[30786]: Invalid user weblogic from 116.68.249.19 Nov 2 21:20:31 m2 sshd[30786]: Failed password for invalid user weblogic from
2018-11-03 20:29 attacks Brute-ForceSSH AbuseIPDB SSH-Bruteforce
2018-11-04 10:16 attacks Brute-ForceSSH AbuseIPDB Nov 4 20:16:15 *** sshd[32056]: Invalid user admin from 116.68.249.19
2018-11-04 11:27 attacks Brute-ForceSSH AbuseIPDB Nov 4 21:27:21 *** sshd[32382]: Invalid user kafka from 116.68.249.19
2018-11-04 12:37 attacks Brute-ForceSSH AbuseIPDB Nov 4 22:37:52 *** sshd[32712]: Invalid user glassfish from 116.68.249.19
2018-12-24 05:48 attacks Brute-ForceSSH AbuseIPDB Dec 24 16:48:42 cvbmail sshd\[26408\]: Invalid user direction from 116.68.249.19 Dec 24 16:48:42 cvbmail sshd\[26408\]: pam_unix\(sshd:auth\): authent
2018-12-24 07:27 attacks Brute-ForceSSH AbuseIPDB Dec 24 18:20:17 *** sshd\[741\]: Invalid user test from 116.68.249.19 port 56480 Dec 24 18:20:17 *** sshd\[741\]: pam_unix\(sshd:auth\): authenticatio
2019-03-29 18:18 attacks bi_any_0_1d BadIPs.com  
2019-03-29 18:20 attacks SSH bi_sshd_0_1d BadIPs.com  
2019-03-29 18:20 attacks SSH bi_ssh_0_1d BadIPs.com  
2019-03-29 18:21 attacks blocklist_de Blocklist.de  
2019-03-29 18:21 attacks SSH blocklist_de_ssh Blocklist.de  
2019-03-29 18:23 attacks darklist_de darklist.de  
2019-03-29 18:27 attacks firehol_level2 FireHOL  
2019-03-29 18:27 attacks firehol_level4 FireHOL  
2019-03-29 18:34 attacks SSH haley_ssh Charles Haley  
2019-05-30 09:29 attacks Bad Web Bot bi_badbots_0_1d BadIPs.com  
2019-05-30 09:29 attacks Brute-Force bi_bruteforce_0_1d BadIPs.com  
2019-06-03 22:59 attacks SSH nt_ssh_7d NoThink.org  
2019-06-16 10:28 attacks Fraud VoIP blocklist_de_sip Blocklist.de  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

inetnum: 116.68.248.0 - 116.68.255.255
netname: CROSSNET-ID
descr: PT. Cross Network Indonesia
descr: Internet Service Provider
descr: Surabaya - Jawa Timur
country: ID
admin-c: MA1133-AP
tech-c: MA1133-AP
status: ALLOCATED PORTABLE
remarks: Send Spam& Abuse report to: abuse@cross.net.id
mnt-by: MNT-APJII-ID
mnt-lower: MAINT-ID-CROSSNET
mnt-routes: MAINT-ID-CROSSNET
mnt-irt: IRT-CROSSNET-ID
last-modified: 2017-06-15T04:49:55Z
source: APNIC

irt: IRT-CROSSNET-ID
address: PT. Cross Network Indonesia
address: Jl. Panglima Sudirman 101-103
address: Wisma Dharmala Lt.10 Suite 1D
address: Surabaya - 60271
e-mail: abuse@cross.net.id
abuse-mailbox: abuse@cross.net.id
admin-c: NA171-AP
tech-c: NA171-AP
auth: # Filtered
mnt-by: MAINT-ID-CROSSNET
last-modified: 2018-05-31T22:29:28Z
source: APNIC

person: Muhammad Ali
address: Intiland Tower 10th floor Suite 1D
address: Jl. Panglima Sudirman 101-103
address: Surabaya - Indonesia
country: ID
phone: +62-31-5458000
e-mail: muhammad_ali@cross.net.id
nic-hdl: MA1133-AP
mnt-by: MAINT-AP-ASIAKOMNET
fax-no: +62-31-5933600
last-modified: 2017-06-13T03:13:26Z
source: APNIC

inetnum: 116.68.249.0 - 116.68.249.255
netname: CROSS-IIX-ONLY-ID
descr: CROSSNET IIX Only IP Block
descr: PT. Cross Network Indonesia
descr: Surabaya
country: ID
admin-c: BD132-AP
tech-c: TA150-AP
remarks: ns1.cross.net.id
remarks: ns2.cross.net.id
status: ASSIGNED NON-PORTABLE
remarks: =======================================
remarks: Send spam & abuse to abuse@cross.net.id
remarks: =======================================
notify: hostmaster@cross.net.id
mnt-by: MAINT-ID-CROSSNET
last-modified: 2011-11-03T02:17:21Z
source: IDNIC

person: Baskoro Dwi Tjahjono
nic-hdl: BD132-AP
e-mail: baskoro@cross.net.id
address: PT. Cross Network Indonesia
address: Jl. Panglima Sudirman 101-103
address: Wisma Dharmala Lt.10 Suite 1D
address: Surabaya - 60271
phone: +62-31-532-9235
fax-no: +62-31-535-6000
country: ID
mnt-by: MAINT-ID-CROSSNET
last-modified: 2008-09-04T07:47:07Z
source: IDNIC

person: Taufan Aries
nic-hdl: TA150-AP
e-mail: taufan_aries@cross.net.id
address: PT. Cross Network Indonesia
address: Jl. Panglima Sudirman 101-103
address: Wisma Dharmala Lt.10 Suite 1D
address: Surabaya - 60271
phone: +62-31-532-9235
fax-no: +62-31-535-6000
country: ID
mnt-by: MAINT-ID-CROSSNET
last-modified: 2008-09-04T07:47:07Z
source: IDNIC
most specific ip range is highlighted
Updated : 2019-02-01