City: Jakarta
Region: Jakarta Raya
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 124.158.169.178 | attack | Unauthorized connection attempt from IP address 124.158.169.178 on Port 445(SMB) |
2020-08-19 22:31:25 |
| 124.158.169.178 | attackspambots | Port Scanner |
2020-07-05 20:02:37 |
| 124.158.169.178 | attackbotsspam | Port Scanner |
2020-06-04 12:52:59 |
| 124.158.169.226 | attack | 1582174649 - 02/20/2020 05:57:29 Host: 124.158.169.226/124.158.169.226 Port: 445 TCP Blocked |
2020-02-20 13:06:03 |
| 124.158.169.34 | attackbotsspam | Unauthorized connection attempt from IP address 124.158.169.34 on Port 445(SMB) |
2020-01-03 18:53:29 |
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '124.158.160.0 - 124.158.175.255'
% Abuse contact for '124.158.160.0 - 124.158.175.255' is 'abuse@iconpln.net.id'
inetnum: 124.158.160.0 - 124.158.175.255
netname: ICONPLN-ID
descr: PT Indonesia Comnets Plus
descr: Internet Service Provider
descr: JL PLN EHV Desa Gandul Cinere
descr: Depok 16512
country: ID
admin-c: CA48-AP
tech-c: CH274-AP
abuse-c: AI847-AP
status: ALLOCATED PORTABLE
remarks: Send Spam & Abuse report to: admin@iconpln.net.id
mnt-by: MNT-APJII-ID
mnt-lower: MAINT-ID-ICONPLN
mnt-routes: MAINT-ID-ICONPLN
mnt-irt: IRT-ICON-ID
last-modified: 2021-12-22T13:08:42Z
source: APNIC
irt: IRT-ICON-ID
address: PT Indonesia Comnets Plus
address: JL PLN EHV Gandul Cinere
address: Depok 16512
e-mail: admin@iconpln.net.id
abuse-mailbox: abuse@iconpln.net.id
admin-c: CA48-AP
tech-c: CH274-AP
auth: # Filtered
remarks: admin@iconpln.net.id was validated on 2025-11-17
remarks: abuse@iconpln.net.id is invalid
mnt-by: MAINT-ID-ICONPLN
last-modified: 2026-04-08T13:10:35Z
source: APNIC
role: ABUSE ICONID
country: ZZ
address: PT Indonesia Comnets Plus
address: JL PLN EHV Gandul Cinere
address: Depok 16512
phone: +000000000
e-mail: admin@iconpln.net.id
admin-c: CA48-AP
tech-c: CH274-AP
nic-hdl: AI847-AP
remarks: Generated from irt object IRT-ICON-ID
remarks: admin@iconpln.net.id was validated on 2025-11-17
remarks: abuse@iconpln.net.id is invalid
abuse-mailbox: abuse@iconpln.net.id
mnt-by: APNIC-ABUSE
last-modified: 2026-04-08T13:16:42Z
source: APNIC
person: Comnets Admin
address: PT INDONESIA COMNETS PLUS
address: Jl. EHV Gandul Limo - Depok
country: ID
phone: +62-21-753-2488
fax-no: +62-21-754-1259
e-mail: admin@iconpln.net.id
nic-hdl: CA48-AP
mnt-by: MAINT-ID-ICONPLN
last-modified: 2008-09-04T07:29:20Z
source: APNIC
person: Comnets Hostmaster
address: PT INDONESIA COMNETS PLUS
address: Jl. EHV Gandul Limo - Depok
country: ID
phone: +62-21-753-2488
fax-no: +62-21-754-1259
e-mail: hostmaster@iconpln.net.id
nic-hdl: CH274-AP
mnt-by: MAINT-ID-ICONPLN
last-modified: 2008-09-04T07:29:20Z
source: APNIC
% Information related to '124.158.160.0/20AS9341'
route: 124.158.160.0/20
descr: Route Object for ICON+
descr: PT Indonesia Comnets Plus
descr: Jl PLN EHV Gandul Cinere
descr: Depok 16512
origin: AS9341
mnt-by: MAINT-ID-ICONPLN
last-modified: 2018-09-19T03:39:31Z
source: APNIC
% Information related to '124.158.160.0 - 124.158.175.255'
inetnum: 124.158.160.0 - 124.158.175.255
netname: ICONPLN-ID
descr: PT Indonesia Comnets Plus
descr: Internet Service Provider
descr: JL PLN EHV Desa Gandul Cinere
descr: Depok 16512
country: ID
admin-c: CA48-AP
tech-c: CH274-AP
remarks: Send Spam & Abuse report to: admin@iconpln.net.id
mnt-by: MNT-APJII-ID
mnt-irt: IRT-ICON-ID
mnt-lower: MAINT-ID-ICONPLN
status: ALLOCATED PORTABLE
last-modified: 2018-08-23T18:08:37Z
mnt-routes: MAINT-ID-ICONPLN
source: IDNIC
irt: IRT-ICON-ID
address: PT Indonesia Comnets Plus
address: JL PLN EHV Gandul Cinere
address: Depok 16512
e-mail: admin@iconpln.net.id
abuse-mailbox: abuse@iconpln.net.id
admin-c: CA48-AP
tech-c: CH274-AP
auth: # Filtered
mnt-by: MAINT-ID-ICONPLN
last-modified: 2011-03-07T08:55:21Z
source: IDNIC
person: Comnets Admin
address: PT INDONESIA COMNETS PLUS
address: Jl. EHV Gandul Limo - Depok
country: ID
phone: +62-21-753-2488
fax-no: +62-21-754-1259
e-mail: admin@iconpln.net.id
nic-hdl: CA48-AP
mnt-by: MAINT-ID-ICONPLN
last-modified: 2008-09-04T07:29:20Z
source: IDNIC
person: Comnets Hostmaster
address: PT INDONESIA COMNETS PLUS
address: Jl. EHV Gandul Limo - Depok
country: ID
phone: +62-21-753-2488
fax-no: +62-21-754-1259
e-mail: hostmaster@iconpln.net.id
nic-hdl: CH274-AP
mnt-by: MAINT-ID-ICONPLN
last-modified: 2008-09-04T07:29:20Z
source: IDNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.158.169.208
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24287
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;124.158.169.208. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042700 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 28 00:59:40 CST 2026
;; MSG SIZE rcvd: 108
Host 208.169.158.124.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 208.169.158.124.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 220.134.171.195 | attackbots | 2 more HTTP hits without headers : 1 with length 14, 1 with length 4 |
2020-07-17 21:03:55 |
| 103.224.49.34 | attack | Dovecot Invalid User Login Attempt. |
2020-07-17 20:57:01 |
| 43.243.214.42 | attackbots | Jul 17 14:25:04 buvik sshd[12230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.243.214.42 Jul 17 14:25:06 buvik sshd[12230]: Failed password for invalid user test from 43.243.214.42 port 40752 ssh2 Jul 17 14:30:15 buvik sshd[13013]: Invalid user norberto from 43.243.214.42 ... |
2020-07-17 20:46:59 |
| 123.136.128.13 | attackspam | Jul 17 15:00:21 eventyay sshd[29270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.136.128.13 Jul 17 15:00:23 eventyay sshd[29270]: Failed password for invalid user toxic from 123.136.128.13 port 48220 ssh2 Jul 17 15:06:11 eventyay sshd[29431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.136.128.13 ... |
2020-07-17 21:07:35 |
| 194.182.75.170 | attackspambots | CMS (WordPress or Joomla) login attempt. |
2020-07-17 20:53:19 |
| 138.197.171.66 | attack | 138.197.171.66 has been banned for [WebApp Attack] ... |
2020-07-17 20:52:35 |
| 134.17.94.214 | attackspam | 2020-07-17T14:14:47.384520ks3355764 sshd[17105]: Invalid user samp from 134.17.94.214 port 7394 2020-07-17T14:14:49.364017ks3355764 sshd[17105]: Failed password for invalid user samp from 134.17.94.214 port 7394 ssh2 ... |
2020-07-17 20:44:24 |
| 178.62.11.53 | attackbots | Jul 17 13:22:19 gospond sshd[22062]: Invalid user alison from 178.62.11.53 port 41658 Jul 17 13:22:21 gospond sshd[22062]: Failed password for invalid user alison from 178.62.11.53 port 41658 ssh2 Jul 17 13:26:29 gospond sshd[22105]: Invalid user ian from 178.62.11.53 port 59234 ... |
2020-07-17 21:14:15 |
| 106.13.229.254 | attackspam | Jul 17 14:58:27 OPSO sshd\[1451\]: Invalid user yosef from 106.13.229.254 port 56100 Jul 17 14:58:27 OPSO sshd\[1451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.229.254 Jul 17 14:58:29 OPSO sshd\[1451\]: Failed password for invalid user yosef from 106.13.229.254 port 56100 ssh2 Jul 17 15:03:58 OPSO sshd\[2976\]: Invalid user mzd from 106.13.229.254 port 32966 Jul 17 15:03:58 OPSO sshd\[2976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.229.254 |
2020-07-17 21:14:40 |
| 200.54.170.198 | attack | Brute-force attempt banned |
2020-07-17 21:04:49 |
| 52.80.232.181 | attackbotsspam | Jul 17 19:24:42 itv-usvr-02 sshd[4244]: Invalid user gamemaster from 52.80.232.181 port 59754 Jul 17 19:24:43 itv-usvr-02 sshd[4244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.80.232.181 Jul 17 19:24:42 itv-usvr-02 sshd[4244]: Invalid user gamemaster from 52.80.232.181 port 59754 Jul 17 19:24:44 itv-usvr-02 sshd[4244]: Failed password for invalid user gamemaster from 52.80.232.181 port 59754 ssh2 Jul 17 19:28:55 itv-usvr-02 sshd[4374]: Invalid user yuki from 52.80.232.181 port 40120 |
2020-07-17 20:40:46 |
| 79.120.54.174 | attackspambots | 2020-07-17T19:24:04.445505hostname sshd[22747]: Invalid user pb from 79.120.54.174 port 54284 2020-07-17T19:24:06.560939hostname sshd[22747]: Failed password for invalid user pb from 79.120.54.174 port 54284 ssh2 2020-07-17T19:28:22.351532hostname sshd[24809]: Invalid user rajan from 79.120.54.174 port 42908 ... |
2020-07-17 21:00:14 |
| 101.51.10.229 | attackspam | Automatic report - Port Scan Attack |
2020-07-17 21:20:28 |
| 187.11.124.60 | attack | Jul 17 19:16:02 itv-usvr-02 sshd[3914]: Invalid user minni from 187.11.124.60 port 40120 Jul 17 19:16:02 itv-usvr-02 sshd[3914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.11.124.60 Jul 17 19:16:02 itv-usvr-02 sshd[3914]: Invalid user minni from 187.11.124.60 port 40120 Jul 17 19:16:04 itv-usvr-02 sshd[3914]: Failed password for invalid user minni from 187.11.124.60 port 40120 ssh2 |
2020-07-17 21:05:09 |
| 218.78.105.98 | attack | Jul 17 14:14:17 melroy-server sshd[8470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.105.98 Jul 17 14:14:19 melroy-server sshd[8470]: Failed password for invalid user boss from 218.78.105.98 port 42964 ssh2 ... |
2020-07-17 21:18:16 |