City: Jakarta
Region: Jakarta Raya
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '202.158.32.0 - 202.158.63.255'
% Abuse contact for '202.158.32.0 - 202.158.63.255' is 'abuse@idnic.net'
inetnum: 202.158.32.0 - 202.158.63.255
netname: ADITAMA5-ID
descr: PT. Cyberindo Aditama
descr: Manggala Wanabakti IV, Suite 808A
descr: Jl. Gatot Subroto, Jakarta
country: ID
admin-c: CH57-AP
tech-c: CH57-AP
notify: hostmaster@cbn.net.id
mnt-by: MNT-APJII-ID
mnt-irt: IRT-IDNIC-ID
mnt-lower: NOC-MAINT-CBN-APNIC
status: ALLOCATED PORTABLE
remarks: spam and abuse report : abuse@apjii.or.id, abuse@cbn.net.id
last-modified: 2015-12-01T22:28:10Z
source: APNIC
irt: IRT-IDNIC-ID
address: INDONESIA NETWORK INFORMATION CENTER
address: Cyber Building 11th Floor
address: Jl. Kuningan Barat No.8
address: Jakarta Selatan 12710
e-mail: abuse@idnic.net
abuse-mailbox: abuse@idnic.net
admin-c: IA55-AP
tech-c: IH123-AP
auth: # Filtered
mnt-by: MNT-APJII-ID
last-modified: 2025-09-04T04:51:41Z
source: APNIC
person: CBNnet Hostmaster
nic-hdl: CH57-AP
e-mail: hostmaster@cbn.net.id
address: PT. Cyberindo Aditama
address: Cyber 2 Tower 33rd Floor
address: Jl. HR. Rasuna Said X5 No.13
address: Jakarta 12950 - Indonesia
phone: +62-21-2996-4900
fax-no: +62-21-574-2481
country: ID
mnt-by: NOC-MAINT-CBN-APNIC
last-modified: 2015-06-24T04:07:08Z
source: APNIC
% Information related to '202.158.32.0/19AS4787'
route: 202.158.32.0/19
descr: PT. Cyberindo Aditama
descr: Internet Service Provider
descr: Cyber 2 Tower, 33rd Floor
descr: Jl. HR. Rasuna Said Blok X5 No. 13
descr: Jakarta 12950
origin: AS4787
country: ID
mnt-by: NOC-MAINT-CBN-APNIC
last-modified: 2012-01-04T04:19:38Z
source: APNIC
% Information related to '202.158.54.0 - 202.158.54.255'
inetnum: 202.158.54.0 - 202.158.54.255
netname: CBN-JKTADMIN-NETBLOCK
country: ID
descr: PT. Cyberindo Aditama
descr: Jakarta 10270
admin-c: CH57-AP
tech-c: CH57-AP
status: ASSIGNED NON-PORTABLE
mnt-by: NOC-MAINT-CBN-APNIC
last-modified: 2008-09-04T06:50:34Z
source: IDNIC
person: CBNnet Hostmaster
nic-hdl: CH57-AP
e-mail: hostmaster@cbn.net.id
address: PT. Cyberindo Aditama
address: Cyber 2 Tower 33rd Floor
address: Jl. HR. Rasuna Said X5 No.13
address: Jakarta 12950 - Indonesia
phone: +62-21-2996-4900
fax-no: +62-21-574-2481
country: ID
mnt-by: NOC-MAINT-CBN-APNIC
last-modified: 2024-07-30T02:01:00Z
source: IDNIC
% Information related to '202.158.32.0/19AS4787'
route: 202.158.32.0/19
descr: PT. Cyberindo Aditama
descr: Internet Service Provider
descr: Cyber 2 Tower, 33rd Floor
descr: Jl. HR. Rasuna Said Blok X5 No. 13
descr: Jakarta 12950
origin: AS4787
country: ID
mnt-by: NOC-MAINT-CBN-APNIC
last-modified: 2012-01-04T04:19:38Z
source: IDNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.158.54.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33393
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;202.158.54.161. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025091801 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 19 03:09:30 CST 2025
;; MSG SIZE rcvd: 107
161.54.158.202.in-addr.arpa domain name pointer ip54-161.cbn.net.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
161.54.158.202.in-addr.arpa name = ip54-161.cbn.net.id.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
41.39.188.163 | attackbots | suspicious action Fri, 28 Feb 2020 10:33:10 -0300 |
2020-02-28 22:07:04 |
42.117.246.98 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-28 22:16:41 |
189.158.120.111 | attack | Automatic report - Port Scan Attack |
2020-02-28 21:56:17 |
77.42.74.128 | attack | Automatic report - Port Scan Attack |
2020-02-28 21:43:33 |
143.0.200.75 | attackspam | RCPT from unknown[143.0.200.75]: |
2020-02-28 22:16:11 |
69.162.111.232 | attackspam | Automatic report - XMLRPC Attack |
2020-02-28 21:45:37 |
189.234.57.15 | attackspambots | suspicious action Fri, 28 Feb 2020 10:33:19 -0300 |
2020-02-28 21:55:27 |
185.176.27.178 | attack | Feb 28 14:38:31 debian-2gb-nbg1-2 kernel: \[5156302.408805\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.178 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=33232 PROTO=TCP SPT=53722 DPT=59865 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-02-28 22:09:05 |
218.92.0.212 | attackspam | port scan and connect, tcp 22 (ssh) |
2020-02-28 22:10:43 |
2001:41d0:a:f94a::1 | attackbotsspam | [munged]::443 2001:41d0:a:f94a::1 - - [28/Feb/2020:14:32:54 +0100] "POST /[munged]: HTTP/1.1" 200 7207 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::443 2001:41d0:a:f94a::1 - - [28/Feb/2020:14:32:58 +0100] "POST /[munged]: HTTP/1.1" 200 7081 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::443 2001:41d0:a:f94a::1 - - [28/Feb/2020:14:33:00 +0100] "POST /[munged]: HTTP/1.1" 200 7079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::443 2001:41d0:a:f94a::1 - - [28/Feb/2020:14:33:04 +0100] "POST /[munged]: HTTP/1.1" 200 7079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::443 2001:41d0:a:f94a::1 - - [28/Feb/2020:14:33:06 +0100] "POST /[munged]: HTTP/1.1" 200 7078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::443 2001:41d0:a:f94a::1 - - [28/Feb/2020:14:33:09 +0100] "POST /[munged]: HTTP/1.1" |
2020-02-28 21:53:53 |
111.42.88.103 | attackspambots | scan r |
2020-02-28 22:02:39 |
222.186.3.249 | attackbotsspam | Feb 28 14:32:20 vps691689 sshd[22121]: Failed password for root from 222.186.3.249 port 60834 ssh2 Feb 28 14:32:25 vps691689 sshd[22121]: Failed password for root from 222.186.3.249 port 60834 ssh2 ... |
2020-02-28 21:39:48 |
197.157.195.15 | attackbotsspam | 02/27/2020-23:47:22.846733 197.157.195.15 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-02-28 21:35:27 |
103.228.53.17 | attack | suspicious action Fri, 28 Feb 2020 10:33:32 -0300 |
2020-02-28 21:40:20 |
222.186.173.142 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142 user=root Failed password for root from 222.186.173.142 port 56818 ssh2 Failed password for root from 222.186.173.142 port 56818 ssh2 Failed password for root from 222.186.173.142 port 56818 ssh2 Failed password for root from 222.186.173.142 port 56818 ssh2 |
2020-02-28 21:49:08 |