City: unknown
Region: unknown
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.172.186.0 - 103.172.187.255'
% Abuse contact for '103.172.186.0 - 103.172.187.255' is 'abuse@idteknologi.co.id'
inetnum: 103.172.186.0 - 103.172.187.255
netname: IDNIC-IDT-ID
descr: PT Inovasi Digital Telekomunikasi
descr: Corporate / Direct Member IDNIC
descr: Jl. TB. Simatupang No. 5, Ragunan
descr: Pasar Minggu, Jakarta Selatan 12550, Indonesia
admin-c: WS1652-AP
tech-c: WS1652-AP
remarks: Send Spam & Abuse Report to: abuse@idteknologi.co.id
country: ID
mnt-by: MNT-APJII-ID
mnt-lower: MAINT-ID-IDT
mnt-irt: IRT-IDT-ID
mnt-routes: MAINT-ID-IDT
status: ALLOCATED PORTABLE
last-modified: 2021-09-03T03:58:07Z
source: APNIC
irt: IRT-IDT-ID
address: PT INOVASI DIGITAL TELEKOMUNIKASI
address: Jl. TB. Simatupang No. 5, Ragunan
address: Pasar Minggu, Jakarta Selatan 12550, Indonesia
e-mail: noc@idteknologi.co.id
abuse-mailbox: abuse@idteknologi.co.id
admin-c: WS1652-AP
tech-c: WS1652-AP
auth: # Filtered
mnt-by: MAINT-ID-IDT
last-modified: 2026-03-09T15:38:38Z
source: APNIC
person: Wandi Saputra
address: PT INOVASI DIGITAL TELEKOMUNIKASI
address: Jl. TB. Simatupang No. 5, Ragunan
address: Pasar Minggu, Jakarta Selatan 12550, Indonesia
country: ID
e-mail: hostmaster@idtelekomunikasi.co.id
phone: +62-877-7198-1236
fax-no: +62-877-7198-1236
nic-hdl: WS1652-AP
mnt-by: MAINT-ID-IDT
last-modified: 2021-09-01T15:50:24Z
source: APNIC
% Information related to '103.172.186.0 - 103.172.187.255'
inetnum: 103.172.186.0 - 103.172.187.255
netname: IDNIC-IDT-ID
descr: PT Inovasi Digital Telekomunikasi
descr: Corporate / Direct Member IDNIC
descr: Jl. TB. Simatupang No. 5, Ragunan
descr: Pasar Minggu, Jakarta Selatan 12550, Indonesia
admin-c: WS1652-AP
tech-c: WS1652-AP
remarks: Send Spam & Abuse Report to: abuse@idtel.co.id
country: ID
mnt-by: MNT-APJII-ID
mnt-lower: MAINT-ID-IDT
mnt-irt: IRT-IDT-ID
mnt-routes: MAINT-ID-IDT
status: ALLOCATED PORTABLE
last-modified: 2022-08-11T09:56:07Z
source: IDNIC
irt: IRT-IDT-ID
address: PT INOVASI DIGITAL TELEKOMUNIKASI
address: Jl. TB. Simatupang No. 5, Ragunan
address: Pasar Minggu Jakarta Selatan 12550, Indonesia
e-mail: noc@idtel.co.id
e-mail: noc@idtel.net.id
abuse-mailbox: abuse@idtel.co.id
admin-c: WS1652-AP
tech-c: WS1652-AP
auth: # Filtered
mnt-by: MAINT-ID-IDT
last-modified: 2022-08-09T10:20:02Z
source: IDNIC
person: Wandi Saputra
address: PT INOVASI DIGITAL TELEKOMUNIKASI
address: Jl. TB. Simatupang No. 5 Ragunan
address: Pasar Minggu, Jakarta Selatan 12550 Indonesia
country: ID
e-mail: hostmaster@idtel.co.id
e-mail: noc@idtel.co.id
e-mail: noc@idtel.net.id
phone: +62 811-9760-0099
fax-no: +62 811-9760-0099
nic-hdl: WS1652-AP
mnt-by: MAINT-ID-IDT
last-modified: 2022-08-09T14:17:32Z
source: IDNIC
% Information related to '103.172.186.0/24AS142400'
route: 103.172.186.0/24
descr: PT Inovasi Digital Telekomunikasi
origin: AS142400
mnt-by: MAINT-ID-IDT
country: ID
last-modified: 2022-08-09T09:59:55Z
source: IDNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.172.186.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61933
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.172.186.157. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042501 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 26 10:31:23 CST 2026
;; MSG SIZE rcvd: 108
157.186.172.103.in-addr.arpa domain name pointer ip-186-157.idtel.net.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
157.186.172.103.in-addr.arpa name = ip-186-157.idtel.net.id.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 104.46.55.57 | attackspam | 2020-08-14 22:55:24 | |
| 8.210.73.35 | attack | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-08-14 23:20:42 |
| 218.92.0.247 | attack | Aug 14 17:12:30 PorscheCustomer sshd[19962]: Failed password for root from 218.92.0.247 port 33922 ssh2 Aug 14 17:12:45 PorscheCustomer sshd[19962]: error: maximum authentication attempts exceeded for root from 218.92.0.247 port 33922 ssh2 [preauth] Aug 14 17:12:54 PorscheCustomer sshd[19966]: Failed password for root from 218.92.0.247 port 62896 ssh2 ... |
2020-08-14 23:26:32 |
| 112.199.98.42 | attackspam | Aug 10 03:23:58 host2 sshd[4847]: reveeclipse mapping checking getaddrinfo for 42.98.199.112.clbrz.inet.static.eastern-tele.com [112.199.98.42] failed - POSSIBLE BREAK-IN ATTEMPT! Aug 10 03:23:58 host2 sshd[4847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.199.98.42 user=r.r Aug 10 03:24:00 host2 sshd[4847]: Failed password for r.r from 112.199.98.42 port 60962 ssh2 Aug 10 03:24:00 host2 sshd[4847]: Received disconnect from 112.199.98.42: 11: Bye Bye [preauth] Aug 10 03:33:11 host2 sshd[10240]: reveeclipse mapping checking getaddrinfo for 42.98.199.112.clbrz.inet.static.eastern-tele.com [112.199.98.42] failed - POSSIBLE BREAK-IN ATTEMPT! Aug 10 03:33:11 host2 sshd[10240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.199.98.42 user=r.r Aug 10 03:33:13 host2 sshd[10240]: Failed password for r.r from 112.199.98.42 port 38614 ssh2 Aug 10 03:33:14 host2 sshd[10240]: Received dis........ ------------------------------- |
2020-08-14 23:05:12 |
| 78.205.109.85 | attackspambots | 2020-08-14T12:25:37.523Z CLOSE host=78.205.109.85 port=63037 fd=4 time=20.017 bytes=13 ... |
2020-08-14 23:23:45 |
| 188.217.181.18 | attackspambots | Fail2Ban |
2020-08-14 23:27:34 |
| 199.19.73.18 | attack | Spam |
2020-08-14 23:18:53 |
| 23.231.110.180 | attackbotsspam | Spam |
2020-08-14 23:17:51 |
| 128.199.79.129 | attackbots | 2020-08-14 22:53:06 | |
| 104.168.21.186 | attack | 2020-08-14 23:01:33 | |
| 66.98.45.242 | attackspambots | Aug 14 11:56:42 firewall sshd[20798]: Failed password for root from 66.98.45.242 port 55224 ssh2 Aug 14 12:00:17 firewall sshd[20898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.98.45.242 user=root Aug 14 12:00:19 firewall sshd[20898]: Failed password for root from 66.98.45.242 port 54360 ssh2 ... |
2020-08-14 23:03:29 |
| 104.225.142.136 | attack | Spam |
2020-08-14 23:23:25 |
| 104.236.67.162 | attackbotsspam | 2020-08-14 22:59:10 | |
| 165.22.104.67 | attackspam | Aug 14 13:54:41 rush sshd[14071]: Failed password for root from 165.22.104.67 port 48948 ssh2 Aug 14 13:56:44 rush sshd[14142]: Failed password for root from 165.22.104.67 port 46058 ssh2 ... |
2020-08-14 23:39:56 |
| 103.205.68.2 | attackspambots | Aug 14 14:35:35 rush sshd[15339]: Failed password for root from 103.205.68.2 port 59472 ssh2 Aug 14 14:39:40 rush sshd[15483]: Failed password for root from 103.205.68.2 port 51536 ssh2 ... |
2020-08-14 23:33:58 |