City: Jakarta
Region: Jakarta Raya
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
180.243.132.250 | attackspam | 1588391587 - 05/02/2020 05:53:07 Host: 180.243.132.250/180.243.132.250 Port: 445 TCP Blocked |
2020-05-02 16:04:49 |
180.243.134.77 | attackbotsspam | Sun, 21 Jul 2019 18:27:18 +0000 likely compromised host or open proxy. ddos rate spidering |
2019-07-22 08:20:56 |
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '180.243.0.0 - 180.243.63.255'
% Abuse contact for '180.243.0.0 - 180.243.63.255' is 'abuse@telkom.co.id'
inetnum: 180.243.0.0 - 180.243.63.255
netname: TLKM_BB_INF_180_243
descr: PT TELKOM INDONESIA
descr: Menara Multimedia Lt. 7
descr: Jl. Kebonsirih No.12
descr: JAKARTA
country: ID
admin-c: AZ163-AP
tech-c: FS370-AP
abuse-c: AI598-AP
status: ASSIGNED NON-PORTABLE
remarks: -----------------------------------------------------------
remarks: Broadband Service for Jakarta Timur Area.
remarks: ** These IP was used dinamically for end user. **
remarks: Send ABUSE and SPAM reports with plain ASCII text only to
remarks: to abuse@telkom.net.id.
remarks: The netname enclosed in square bracket is included in the subject.
remarks: -----------------------------------------------------------
mnt-by: MAINT-TELKOMNET
mnt-irt: IRT-IDTELKOM-ID
last-modified: 2021-01-26T22:07:12Z
source: APNIC
irt: IRT-IDTELKOM-ID
address: PT. TELKOM INDONESIA
address: Indibiz Experience Center 3rd Floor
address: Kebon Sirih No 36
address: Jakarta
e-mail: abuse@telkom.co.id
abuse-mailbox: abuse@telkom.co.id
admin-c: RFR2-AP
tech-c: TP630-AP
auth: # Filtered
remarks: abuse@telkom.co.id was validated on 2025-04-15
mnt-by: MAINT-TELKOMNET
last-modified: 2025-09-24T00:27:38Z
source: APNIC
role: ABUSE IDTELKOMID
country: ZZ
address: PT. TELKOM INDONESIA
address: Indibiz Experience Center 3rd Floor
address: Kebon Sirih No 36
address: Jakarta
phone: +000000000
e-mail: abuse@telkom.co.id
admin-c: RFR2-AP
tech-c: TP630-AP
nic-hdl: AI598-AP
remarks: Generated from irt object IRT-IDTELKOM-ID
remarks: abuse@telkom.co.id was validated on 2025-04-15
abuse-mailbox: abuse@telkom.co.id
mnt-by: APNIC-ABUSE
last-modified: 2025-04-15T06:33:12Z
source: APNIC
person: Akhmad Zaimi
address: GSD Lt.14 Jl. Kebon Sirih No.12
country: ID
phone: +62-21-3860500
e-mail: djimie@telkom.co.id
nic-hdl: AZ163-AP
mnt-by: MAINT-TELKOMNET
last-modified: 2010-12-20T01:33:46Z
source: APNIC
person: Febrian Setiadi
address: GSD Lt 14 Jl. Kebon Sirih No.12
country: ID
phone: +62-21-3860500
e-mail: febrian.setiadi@telkom.co.id
nic-hdl: FS370-AP
mnt-by: MAINT-TELKOMNET
last-modified: 2010-12-20T01:30:54Z
source: APNIC
% Information related to '180.243.13.0/24AS7713'
route: 180.243.13.0/24
origin: AS7713
descr: Telekomunikasi Indonesia (PT)
PT Telkom - Divisi Infratel
Gedung STO Gambir LT 3
Sub Divisi Resource Management & Operation
Jalan Merdeka Selatan No .12
mnt-by: MAINT-TELKOMNET
last-modified: 2021-08-24T18:33:28Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.243.13.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9900
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;180.243.13.117. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101500 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 16 01:30:27 CST 2025
;; MSG SIZE rcvd: 107
b'Host 117.13.243.180.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 180.243.13.117.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
182.18.188.132 | attackbots | Oct 7 01:27:33 sauna sshd[207995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.18.188.132 Oct 7 01:27:35 sauna sshd[207995]: Failed password for invalid user Bet@123 from 182.18.188.132 port 57300 ssh2 ... |
2019-10-07 06:43:03 |
138.197.78.121 | attackspambots | Oct 7 00:24:42 SilenceServices sshd[7383]: Failed password for root from 138.197.78.121 port 48430 ssh2 Oct 7 00:28:46 SilenceServices sshd[8565]: Failed password for root from 138.197.78.121 port 60282 ssh2 |
2019-10-07 06:59:36 |
178.73.215.171 | attack | Oct 6 22:16:14 *** sshd[31329]: Did not receive identification string from 178.73.215.171 |
2019-10-07 06:40:48 |
175.148.46.123 | attack | Unauthorised access (Oct 6) SRC=175.148.46.123 LEN=40 TTL=49 ID=18535 TCP DPT=8080 WINDOW=22024 SYN Unauthorised access (Oct 6) SRC=175.148.46.123 LEN=40 TTL=49 ID=30902 TCP DPT=8080 WINDOW=22024 SYN Unauthorised access (Oct 6) SRC=175.148.46.123 LEN=40 TTL=49 ID=36588 TCP DPT=8080 WINDOW=22024 SYN |
2019-10-07 06:42:38 |
106.111.210.71 | attackspam | [Aegis] @ 2019-10-06 20:48:32 0100 -> Sendmail rejected message. |
2019-10-07 07:10:13 |
109.199.0.22 | attackspambots | Automatic report - Port Scan Attack |
2019-10-07 06:42:14 |
178.32.215.89 | attackbots | Oct 6 12:30:03 sachi sshd\[32389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bg1.datarox.fr user=root Oct 6 12:30:06 sachi sshd\[32389\]: Failed password for root from 178.32.215.89 port 44362 ssh2 Oct 6 12:33:27 sachi sshd\[32664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bg1.datarox.fr user=root Oct 6 12:33:29 sachi sshd\[32664\]: Failed password for root from 178.32.215.89 port 55866 ssh2 Oct 6 12:36:36 sachi sshd\[496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bg1.datarox.fr user=root |
2019-10-07 06:38:47 |
80.211.115.16 | attack | 2019-10-06T22:41:54.004267abusebot-7.cloudsearch.cf sshd\[4773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.115.16 user=root |
2019-10-07 06:58:02 |
144.208.127.121 | attack | 2019-10-06T23:32:25.038648lon01.zurich-datacenter.net sshd\[9656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.208.127.121 user=root 2019-10-06T23:32:26.869677lon01.zurich-datacenter.net sshd\[9656\]: Failed password for root from 144.208.127.121 port 44044 ssh2 2019-10-06T23:36:48.383531lon01.zurich-datacenter.net sshd\[9733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.208.127.121 user=root 2019-10-06T23:36:50.319931lon01.zurich-datacenter.net sshd\[9733\]: Failed password for root from 144.208.127.121 port 56858 ssh2 2019-10-06T23:41:05.329489lon01.zurich-datacenter.net sshd\[9838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.208.127.121 user=root ... |
2019-10-07 06:47:44 |
178.153.44.51 | attackspambots | Oct 6 10:36:38 wbs sshd\[5595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.153.44.51 user=root Oct 6 10:36:40 wbs sshd\[5595\]: Failed password for root from 178.153.44.51 port 45379 ssh2 Oct 6 10:40:55 wbs sshd\[6116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.153.44.51 user=root Oct 6 10:40:57 wbs sshd\[6116\]: Failed password for root from 178.153.44.51 port 37909 ssh2 Oct 6 10:45:03 wbs sshd\[6535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.153.44.51 user=root |
2019-10-07 06:38:34 |
172.105.229.169 | attack | Brute force attempt |
2019-10-07 06:43:16 |
67.207.95.103 | attackspambots | Oct 7 03:26:42 areeb-Workstation sshd[13049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.95.103 Oct 7 03:26:45 areeb-Workstation sshd[13049]: Failed password for invalid user Club@123 from 67.207.95.103 port 45004 ssh2 ... |
2019-10-07 06:58:18 |
222.186.31.145 | attackbotsspam | Oct 6 19:03:39 TORMINT sshd\[3114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.145 user=root Oct 6 19:03:41 TORMINT sshd\[3114\]: Failed password for root from 222.186.31.145 port 39915 ssh2 Oct 6 19:10:38 TORMINT sshd\[3655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.145 user=root ... |
2019-10-07 07:12:43 |
222.186.173.238 | attack | $f2bV_matches |
2019-10-07 07:00:53 |
95.85.68.54 | attackbotsspam | B: Magento admin pass test (wrong country) |
2019-10-07 07:14:06 |