City: unknown
Region: unknown
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '202.154.0.0 - 202.154.63.255'
% Abuse contact for '202.154.0.0 - 202.154.63.255' is 'hostmaster@rad.net.id'
inetnum: 202.154.0.0 - 202.154.63.255
netname: RADNET-ID
descr: PT Rahajasa Media Internet
descr: Plaza 89, Suite 601
descr: Jl. HR Rasuna Said Kav.X-7 No.6
descr: Jakarta 12940
country: ID
admin-c: MNAA2-AP
tech-c: MNAA2-AP
notify: hostmaster@rad.net.id
mnt-by: MNT-APJII-ID
mnt-irt: IRT-RAD-NET-ID
mnt-lower: MAINT-RAD-NET-AP
status: ALLOCATED PORTABLE
remarks: spam and abuse report : hostmaster@rad.net.id
remarks: internet service provider
remarks: allocated on 19960609
last-modified: 2026-03-02T02:11:47Z
source: APNIC
irt: IRT-RAD-NET-ID
address: PT Rahajasa Media Internet
address: Plaza 89, Suite 601
address: Jl. HR Rasuna Said Kav.X-7 No.6
address: Jakarta 12940
e-mail: hostmaster@rad.net.id
abuse-mailbox: hostmaster@rad.net.id
admin-c: RH243-AP
tech-c: RH243-AP
auth: # Filtered
mnt-by: MAINT-RAD-NET-AP
last-modified: 2026-03-09T15:39:11Z
source: APNIC
person: Moh Noor Al Azam
address: Intiland Tower Suites Level 3
address: Jl. Panglima Sudirman Kav. 101-103,
address: Surabaya 60271
country: ID
phone: +628155044434
e-mail: hostmaster@rad.net.id
nic-hdl: MNAA2-AP
mnt-by: MNT-APJII-ID
last-modified: 2026-03-02T02:10:46Z
source: APNIC
% Information related to '202.154.0.0 - 202.154.63.255'
inetnum: 202.154.0.0 - 202.154.63.255
netname: RADNET-ID
descr: PT Rahajasa Media Internet
descr: Plaza 89, Suite 601
descr: Jl. HR Rasuna Said Kav.X-7 No.6
descr: Jakarta 12940
country: ID
admin-c: IB1910
tech-c: IB1910
tech-c: AR68
notify: hostmaster@rad.net.id
mnt-by: MNT-APJII-ID
mnt-irt: IRT-RAD-NET-ID
mnt-lower: MAINT-RAD-NET-AP
status: ALLOCATED PORTABLE
remarks: spam and abuse report : hostmaster@rad.net.id
remarks: internet service provider
remarks: allocated on 19960609
last-modified: 2016-02-04T04:09:23Z
source: IDNIC
irt: IRT-RAD-NET-ID
address: PT Rahajasa Media Internet
address: Plaza 89, Suite 601
address: Jl. HR Rasuna Said Kav.X-7 No.6
address: Jakarta 12940
e-mail: hostmaster@rad.net.id
abuse-mailbox: hostmaster@rad.net.id
admin-c: RH243-AP
tech-c: RH243-AP
auth: # Filtered
mnt-by: MAINT-RAD-NET-AP
last-modified: 2013-11-15T08:01:41Z
source: IDNIC
person: Adhitya Rachmadi
address: PT Rahajasa Media Internet (RADNET)
address: Plaza 89, Suite 601, 6th Floor
address: Jl. H.R. Rasuna Said Kav X-7/6
address: Jakarta, Indonesia 12940
country: ID
phone: +62 21 252 6363
fax-no: +62 21 252 4777
e-mail: silver68@rad.net.id
nic-hdl: AR68
notify: hostmaster@rad.net.id
mnt-by: MAINT-RAD-NET-AP
last-modified: 2008-09-04T07:29:54Z
source: IDNIC
person: Iwan Bambang
address: PT Rahajasa Media Internet (RADNET)
address: Plaza 89, Suite 601, 6th Floor
address: Jl. H.R. Rasuna Said Kav X-7/6
address: Jakarta, Indonesia 12940
country: ID
phone: +62 21 252 6363
fax-no: +62 21 252 4777
e-mail: iwe@rad.net.id
nic-hdl: IB1910
notify: hostmaster@rad.net.id
mnt-by: MAINT-RAD-NET-AP
last-modified: 2008-09-04T07:29:54Z
source: IDNIC
% Information related to '202.154.37.0/24AS141607'
route: 202.154.37.0/24
descr: Route object for 202.154.37.0/24
origin: AS141607
mnt-by: MAINT-RAD-NET-AP
country: ID
last-modified: 2023-02-07T08:44:20Z
source: IDNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.154.37.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10443
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;202.154.37.22. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032502 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 11:00:24 CST 2026
;; MSG SIZE rcvd: 106
b'Host 22.37.154.202.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 202.154.37.22.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 87.56.82.178 | attack | Hit honeypot r. |
2020-06-11 15:42:45 |
| 165.22.31.24 | attackspam | LGS,WP GET /wp-login.php |
2020-06-11 15:44:47 |
| 31.167.150.226 | attackspam | 2020-06-11T10:21:47.141072afi-git.jinr.ru sshd[19356]: Invalid user jrg from 31.167.150.226 port 48228 2020-06-11T10:21:47.144180afi-git.jinr.ru sshd[19356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.167.150.226 2020-06-11T10:21:47.141072afi-git.jinr.ru sshd[19356]: Invalid user jrg from 31.167.150.226 port 48228 2020-06-11T10:21:49.264191afi-git.jinr.ru sshd[19356]: Failed password for invalid user jrg from 31.167.150.226 port 48228 ssh2 2020-06-11T10:25:32.888932afi-git.jinr.ru sshd[20250]: Invalid user keithtan from 31.167.150.226 port 50338 ... |
2020-06-11 15:58:42 |
| 142.93.203.168 | attackspambots | 142.93.203.168 - - [11/Jun/2020:08:51:59 +0200] "GET /wp-login.php HTTP/1.1" 200 5861 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.203.168 - - [11/Jun/2020:08:52:00 +0200] "POST /wp-login.php HTTP/1.1" 200 6166 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.203.168 - - [11/Jun/2020:08:52:02 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-06-11 16:13:57 |
| 139.59.87.250 | attackspam | 2020-06-11 07:52:44,460 fail2ban.actions: WARNING [ssh] Ban 139.59.87.250 |
2020-06-11 15:50:32 |
| 178.62.79.227 | attackbots | 2020-06-11T08:20:42.886907struts4.enskede.local sshd\[22329\]: Invalid user ac from 178.62.79.227 port 50964 2020-06-11T08:20:42.894583struts4.enskede.local sshd\[22329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.79.227 2020-06-11T08:20:46.369740struts4.enskede.local sshd\[22329\]: Failed password for invalid user ac from 178.62.79.227 port 50964 ssh2 2020-06-11T08:25:09.016135struts4.enskede.local sshd\[22348\]: Invalid user testing from 178.62.79.227 port 54456 2020-06-11T08:25:09.023200struts4.enskede.local sshd\[22348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.79.227 ... |
2020-06-11 15:52:54 |
| 104.236.228.230 | attack | Jun 11 14:13:30 webhost01 sshd[8129]: Failed password for root from 104.236.228.230 port 43882 ssh2 ... |
2020-06-11 15:50:17 |
| 94.102.56.215 | attack | Jun 11 09:32:49 debian-2gb-nbg1-2 kernel: \[14119496.490022\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.56.215 DST=195.201.40.59 LEN=57 TOS=0x00 PREC=0x00 TTL=247 ID=54321 PROTO=UDP SPT=50406 DPT=7623 LEN=37 |
2020-06-11 16:09:02 |
| 187.23.135.185 | attack | Jun 11 07:14:28 ns37 sshd[24156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.23.135.185 |
2020-06-11 16:14:57 |
| 159.89.180.30 | attackbots | Jun 11 07:24:42 piServer sshd[305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.180.30 Jun 11 07:24:44 piServer sshd[305]: Failed password for invalid user hung from 159.89.180.30 port 52128 ssh2 Jun 11 07:27:47 piServer sshd[736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.180.30 ... |
2020-06-11 15:54:56 |
| 192.35.168.225 | attack |
|
2020-06-11 15:55:15 |
| 43.243.75.49 | attackspam | Jun 11 08:33:44 vps639187 sshd\[20758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.243.75.49 user=root Jun 11 08:33:47 vps639187 sshd\[20758\]: Failed password for root from 43.243.75.49 port 59663 ssh2 Jun 11 08:37:11 vps639187 sshd\[20812\]: Invalid user root-db from 43.243.75.49 port 60188 Jun 11 08:37:11 vps639187 sshd\[20812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.243.75.49 ... |
2020-06-11 16:17:10 |
| 51.91.165.3 | attack | [portscan] tcp/1433 [MsSQL] [scan/connect: 2 time(s)] *(RWIN=8192)(06110859) |
2020-06-11 16:04:16 |
| 106.12.160.220 | attackbots | Jun 11 06:08:10 localhost sshd\[13296\]: Invalid user ubuntu from 106.12.160.220 Jun 11 06:08:10 localhost sshd\[13296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.160.220 Jun 11 06:08:12 localhost sshd\[13296\]: Failed password for invalid user ubuntu from 106.12.160.220 port 33312 ssh2 Jun 11 06:13:34 localhost sshd\[13571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.160.220 user=root Jun 11 06:13:36 localhost sshd\[13571\]: Failed password for root from 106.12.160.220 port 53667 ssh2 ... |
2020-06-11 15:42:02 |
| 205.185.113.140 | attackspam | Jun 11 07:51:57 sigma sshd\[21141\]: Failed password for root from 205.185.113.140 port 36766 ssh2Jun 11 08:07:43 sigma sshd\[21388\]: Invalid user beginner from 205.185.113.140 ... |
2020-06-11 16:19:12 |