103.145.161.53 Threat Intelligence and Host Information

Share on:

General

This page was generated as a result of this host being detected actively attacking or scanning another host. See below for information related to the host network, location, number of days noticed, protocols attacked and other information including reverse DNS and whois.

Host and Network Information

  • Mitre ATT&CK IDs: T1078 - Valid Accounts, T1083 - File and Directory Discovery, T1098.004 - SSH Authorized Keys, T1105 - Ingress Tool Transfer, T1110 - Brute Force, T1110.004 - Credential Stuffing
  • Tags: Brute-Force, Bruteforce, Nextray, SSH, aws, cowrie, cyber security, ioc, malicious, phishing, scanners, ssh, vultr
  • View other sources: Spamhaus VirusTotal

  • Country: Indonesia
  • Network: AS9341 pt indonesia comnets plus
  • Noticed: 50 times
  • Protcols Attacked: ssh
  • Countries Attacked: Canada, Czechia, Denmark, Estonia, France, Germany, Latvia, Lithuania, Norway, Poland, Romania, Singapore, Turkey, Ukraine, United Kingdom of Great Britain and Northern Ireland, United States of America
  • Passive DNS Results: synoinstall-iglppym4azcs7jyu.direct.quickconnect.to synoinstall-7uytjjebvw7q4ag3.direct.quickconnect.to jtd-e.3cx.asia dbshare.delameta.com

Open Ports Detected

161 1701 1723 443 80

Map

Whois Information

  • inetnum: 103.145.160.0 - 103.145.161.255
  • netname: IDNIC-ANGGADA-ID
  • descr: CV PUJAKESUMA WAHYU ANGGADA
  • descr: Corporate / Direct Member IDNIC
  • descr: JL.MAKMUR 6B,LT.1,R6,RT.003,RW.006
  • descr: PETUKANGAN SELATAN,PESANGGRAHAN
  • descr: JAKARTA SELATAN 12270
  • admin-c: NSW4-AP
  • tech-c: NSW4-AP
  • country: ID
  • mnt-by: MNT-APJII-ID
  • mnt-irt: IRT-ANGGADA-ID
  • mnt-routes: MAINT-ID-ANGGADA
  • status: ASSIGNED PORTABLE
  • last-modified: 2021-01-25T13:51:24Z
  • irt: IRT-ANGGADA-ID
  • address: CV PUJAKESUMA WAHYU ANGGADA
  • address: JL.MAKMUR 6B,LT.1,R6,RT.003,RW.006
  • address: PETUKANGAN SELATAN,PESANGGRAHAN
  • address: JAKARTA SELATAN 12270
  • e-mail: [email protected]
  • abuse-mailbox: [email protected]
  • admin-c: NSW4-AP
  • tech-c: NSW4-AP
  • mnt-by: MAINT-ID-ANGGADA
  • last-modified: 2019-11-26T03:52:07Z
  • person: Neni Suri Wahyuni
  • address: JL.MAKMUR 6B,LT.1,R6,RT.003,RW.006
  • address: PETUKANGAN SELATAN,PESANGGRAHAN
  • address: JAKARTA SELATAN 12270
  • country: ID
  • phone: +62-82122649932
  • e-mail: [email protected]
  • nic-hdl: NSW4-AP
  • mnt-by: MNT-APJII-ID
  • last-modified: 2019-11-23T17:28:52Z
  • inetnum: 103.145.161.0 - 103.145.161.255
  • netname: ICONPLN-ID
  • descr: PT Indonesia Comnets Plus
  • descr: JL PLN EHV Gandul Cinere
  • descr: Depok 16512
  • country: ID
  • admin-c: CA48-AP
  • tech-c: CH274-AP
  • status: ASSIGNED NON-PORTABLE
  • mnt-by: MNT-APJII-ID
  • mnt-by: MAINT-ID-ICONPLN
  • mnt-irt: IRT-ICON-ID
  • last-modified: 2019-11-26T12:28:11Z
  • irt: IRT-ICON-ID
  • address: PT Indonesia Comnets Plus
  • address: JL PLN EHV Gandul Cinere
  • address: Depok 16512
  • e-mail: [email protected]
  • abuse-mailbox: [email protected]
  • admin-c: CA48-AP
  • tech-c: CH274-AP
  • mnt-by: MAINT-ID-ICONPLN
  • last-modified: 2011-03-07T08:55:21Z
  • person: Comnets Admin
  • address: PT INDONESIA COMNETS PLUS
  • address: Jl. EHV Gandul Limo - Depok
  • country: ID
  • phone: +62-21-753-2488
  • fax-no: +62-21-754-1259
  • e-mail: [email protected]
  • nic-hdl: CA48-AP
  • mnt-by: MAINT-ID-ICONPLN
  • last-modified: 2008-09-04T07:29:20Z
  • person: Comnets Hostmaster
  • address: PT INDONESIA COMNETS PLUS
  • address: Jl. EHV Gandul Limo - Depok
  • country: ID
  • phone: +62-21-753-2488
  • fax-no: +62-21-754-1259
  • e-mail: [email protected]
  • nic-hdl: CH274-AP
  • mnt-by: MAINT-ID-ICONPLN
  • last-modified: 2008-09-04T07:29:20Z
  • route: 103.145.161.0/24
  • descr: Route Object of PT. Indonesia Comnets Plus
  • descr: ISP
  • descr: Jakarta
  • origin: AS9341
  • mnt-by: MAINT-ID-ICONPLN
  • last-modified: 2019-11-26T12:51:49Z

Links to attack logs

dofrank-ssh-bruteforce-ip-list-2022-08-13 vultrwarsaw-ssh-bruteforce-ip-list-2022-10-03 vultrwarsaw-ssh-bruteforce-ip-list-2022-10-14 bruteforce-ip-list-2022-10-15 dolondon-ssh-bruteforce-ip-list-2022-09-09 bruteforce-ip-list-2022-04-29 vultrmadrid-ssh-bruteforce-ip-list-2022-10-05 vultrwarsaw-ssh-bruteforce-ip-list-2022-10-07 vultrparis-ssh-bruteforce-ip-list-2022-10-12 bruteforce-ip-list-2022-06-08 bruteforce-ip-list-2022-06-11 dolondon-ssh-bruteforce-ip-list-2022-07-15 dosing-ssh-bruteforce-ip-list-2022-08-15 bruteforce-ip-list-2022-06-14 dolondon-ssh-bruteforce-ip-list-2022-06-16 dosing-ssh-bruteforce-ip-list-2022-09-06 dolondon-ssh-bruteforce-ip-list-2022-09-10 vultrparis-ssh-bruteforce-ip-list-2022-06-20 vultrwarsaw-ssh-bruteforce-ip-list-2022-08-02 vultrmadrid-ssh-bruteforce-ip-list-2022-09-09 bruteforce-ip-list-2022-07-30 vultrmadrid-ssh-bruteforce-ip-list-2022-07-30 vultrmadrid-ssh-bruteforce-ip-list-2022-08-07 dolondon-ssh-bruteforce-ip-list-2022-08-13 dosing-ssh-bruteforce-ip-list-2022-09-30

Links to attack logs

dofrank-ssh-bruteforce-ip-list-2022-08-13 vultrwarsaw-ssh-bruteforce-ip-list-2022-10-03 vultrwarsaw-ssh-bruteforce-ip-list-2022-10-14 bruteforce-ip-list-2022-10-15 dolondon-ssh-bruteforce-ip-list-2022-09-09 bruteforce-ip-list-2022-04-29 vultrmadrid-ssh-bruteforce-ip-list-2022-10-05 vultrwarsaw-ssh-bruteforce-ip-list-2022-10-07 vultrparis-ssh-bruteforce-ip-list-2022-10-12 bruteforce-ip-list-2022-06-08 bruteforce-ip-list-2022-06-11 dolondon-ssh-bruteforce-ip-list-2022-07-15 dosing-ssh-bruteforce-ip-list-2022-08-15 bruteforce-ip-list-2022-06-14 dolondon-ssh-bruteforce-ip-list-2022-06-16 dosing-ssh-bruteforce-ip-list-2022-09-06 dolondon-ssh-bruteforce-ip-list-2022-09-10 vultrparis-ssh-bruteforce-ip-list-2022-06-20 vultrwarsaw-ssh-bruteforce-ip-list-2022-08-02 vultrmadrid-ssh-bruteforce-ip-list-2022-09-09 bruteforce-ip-list-2022-07-30 vultrmadrid-ssh-bruteforce-ip-list-2022-07-30 vultrmadrid-ssh-bruteforce-ip-list-2022-08-07 dolondon-ssh-bruteforce-ip-list-2022-08-13 dosing-ssh-bruteforce-ip-list-2022-09-30