Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.59.234.0 - 103.59.235.255'

% Abuse contact for '103.59.234.0 - 103.59.235.255' is 'admin@indikaenergy.co.id'

inetnum:        103.59.234.0 - 103.59.235.255
netname:        INDIKAENERGY-ID
descr:          PT. Indika Energy Tbk
descr:          Corporate / Direct Member IDNIC
descr:          Jl. Jendral Gatot Subroto Kav.21 RT 003/002
descr:          Karet Semanggi, Setiabudi,Jakarta Selatan 12930
admin-c:        FH416-AP
tech-c:         FH416-AP
remarks:        Send Spam & Abuse Reports to
remarks:        admin@indikaenergy.co.id
country:        ID
mnt-by:         MNT-APJII-ID
mnt-irt:        IRT-INDIKAENERGY-ID
mnt-routes:     MAINT-ID-INDIKAENERGY
status:         ASSIGNED PORTABLE
last-modified:  2015-06-09T10:16:10Z
source:         APNIC

irt:            IRT-INDIKAENERGY-ID
address:        PT. Indika Energy Tbk
address:        Jl. Jendral Gatot Subroto Kav.21 RT 003/002
address:        Karet Semanggi, Setiabudi,Jakarta Selatan 12930
e-mail:         admin@indikaenergy.co.id
abuse-mailbox:  admin@indikaenergy.co.id
admin-c:        FH416-AP
tech-c:         FH416-AP
auth:           # Filtered
mnt-by:         MAINT-ID-INDIKAENERGY
last-modified:  2026-03-09T15:38:39Z
source:         APNIC

person:         Frans Hutabarat
address:        Jl. Jendral Gatot Subroto Kav.21 RT 003/002
address:        Karet Semanggi, Setiabudi,Jakarta Selatan 12930
country:        ID
phone:          +62-21-25579888
fax-no:         +62-21-25579800
e-mail:         hostmaster@indikaenergy.co.id
nic-hdl:        FH416-AP
mnt-by:         MAINT-ID-INDIKAENERGY
last-modified:  2011-09-09T10:04:43Z
source:         APNIC

% Information related to '103.59.234.0 - 103.59.235.255'

inetnum:        103.59.234.0 - 103.59.235.255
netname:        INDIKAENERGY-ID
descr:          PT. Indika Energy Tbk
descr:          Corporate / Direct Member IDNIC
descr:          Jl. Jendral Gatot Subroto Kav.21 RT 003/002
descr:          Karet Semanggi, Setiabudi,Jakarta Selatan 12930
admin-c:        FH416-AP
tech-c:         FH416-AP
remarks:        Send Spam & Abuse Reports to
remarks:        admin@indikaenergy.co.id
country:        ID
mnt-by:         MNT-APJII-ID
mnt-irt:        IRT-INDIKAENERGY-ID
mnt-routes:     MAINT-ID-INDIKAENERGY
status:         ASSIGNED PORTABLE
last-modified:  2015-06-09T10:16:10Z
source:         IDNIC

irt:            IRT-INDIKAENERGY-ID
address:        PT. Indika Energy Tbk
address:        Jl. Jendral Gatot Subroto Kav.21 RT 003/002
address:        Karet Semanggi, Setiabudi,Jakarta Selatan 12930
e-mail:         admin@indikaenergy.co.id
abuse-mailbox:  admin@indikaenergy.co.id
admin-c:        FH416-AP
tech-c:         FH416-AP
auth:           # Filtered
mnt-by:         MAINT-ID-INDIKAENERGY
last-modified:  2011-10-04T04:43:33Z
source:         IDNIC

person:         Frans Hutabarat
address:        Jl. Jendral Gatot Subroto Kav.21 RT 003/002
address:        Karet Semanggi, Setiabudi,Jakarta Selatan 12930
country:        ID
phone:          +62-21-25579888
fax-no:         +62-21-25579800
e-mail:         hostmaster@indikaenergy.co.id
nic-hdl:        FH416-AP
mnt-by:         MAINT-ID-INDIKAENERGY
last-modified:  2011-09-09T10:04:43Z
source:         IDNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.59.234.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.59.234.132.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033000 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 18:22:01 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 132.234.59.103.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 103.59.234.132.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
165.22.114.208 attackbotsspam
MYH,DEF GET /2020/wp-login.php
2020-06-12 14:44:33
94.124.93.33 attack
reported through recidive - multiple failed attempts(SSH)
2020-06-12 14:43:12
111.229.134.68 attackbots
Jun 12 07:59:49 jane sshd[9679]: Failed password for root from 111.229.134.68 port 39112 ssh2
Jun 12 08:09:01 jane sshd[17312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.134.68 
...
2020-06-12 14:50:29
51.75.83.77 attackbots
Jun 11 20:07:40 web9 sshd\[19804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.83.77  user=root
Jun 11 20:07:42 web9 sshd\[19804\]: Failed password for root from 51.75.83.77 port 43188 ssh2
Jun 11 20:11:09 web9 sshd\[20268\]: Invalid user monitor from 51.75.83.77
Jun 11 20:11:09 web9 sshd\[20268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.83.77
Jun 11 20:11:11 web9 sshd\[20268\]: Failed password for invalid user monitor from 51.75.83.77 port 46172 ssh2
2020-06-12 14:25:45
106.52.148.196 attackbotsspam
Jun 12 00:11:58 Host-KLAX-C sshd[12002]: User root from 106.52.148.196 not allowed because not listed in AllowUsers
...
2020-06-12 14:54:39
74.208.84.152 attack
Attempted WordPress login: "GET /wp-login.php"
2020-06-12 14:37:20
111.230.219.156 attackbotsspam
Jun 12 06:35:14 minden010 sshd[23521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.219.156
Jun 12 06:35:16 minden010 sshd[23521]: Failed password for invalid user xe from 111.230.219.156 port 55666 ssh2
Jun 12 06:40:53 minden010 sshd[26543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.219.156
...
2020-06-12 14:36:11
45.94.108.99 attackbotsspam
Brute force attempt
2020-06-12 14:28:23
112.85.42.174 attack
odoo8
...
2020-06-12 14:57:24
60.246.0.164 attack
Dovecot Invalid User Login Attempt.
2020-06-12 14:14:33
202.175.46.170 attackspambots
2020-06-12T04:59:58.335535shield sshd\[10414\]: Invalid user admin from 202.175.46.170 port 54272
2020-06-12T04:59:58.338418shield sshd\[10414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=z46l170.static.ctm.net
2020-06-12T05:00:00.209852shield sshd\[10414\]: Failed password for invalid user admin from 202.175.46.170 port 54272 ssh2
2020-06-12T05:00:24.138687shield sshd\[10633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=z46l170.static.ctm.net  user=root
2020-06-12T05:00:25.911879shield sshd\[10633\]: Failed password for root from 202.175.46.170 port 57570 ssh2
2020-06-12 14:57:03
103.58.100.56 attack
Jun 11 22:07:11 mockhub sshd[3466]: Failed password for root from 103.58.100.56 port 39902 ssh2
...
2020-06-12 14:30:04
2607:f298:5:110b::658:603b attack
MYH,DEF GET /2020/wp-login.php
2020-06-12 14:50:59
122.51.79.83 attack
Jun 12 00:55:00 firewall sshd[18726]: Failed password for invalid user ox from 122.51.79.83 port 38780 ssh2
Jun 12 00:56:33 firewall sshd[18784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.79.83  user=root
Jun 12 00:56:34 firewall sshd[18784]: Failed password for root from 122.51.79.83 port 56820 ssh2
...
2020-06-12 14:17:46
51.68.94.177 attackbots
Invalid user araujo from 51.68.94.177 port 53544
2020-06-12 14:39:54

Recently Reported IPs

119.201.163.180 66.132.172.33 110.78.158.157 14.207.194.197
110.77.248.53 110.77.248.83 2606:4700:10::6816:1419 109.167.82.70
109.162.246.151 2606:4700:10::6814:6544 2606:4700:10::ac43:1159 2606:4700:10::6814:7695
2606:4700:10::6816:4219 2606:4700:10::ac43:2881 93.81.87.208 164.102.58.199
51.77.114.100 8.77.135.154 93.236.24.49 226.41.4.177