Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jakarta

Region: Jakarta Raya

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '202.158.32.0 - 202.158.63.255'

% Abuse contact for '202.158.32.0 - 202.158.63.255' is 'abuse@idnic.net'

inetnum:        202.158.32.0 - 202.158.63.255
netname:        ADITAMA5-ID
descr:          PT. Cyberindo Aditama
descr:          Manggala Wanabakti IV, Suite 808A
descr:          Jl. Gatot Subroto, Jakarta
country:        ID
admin-c:        CH57-AP
tech-c:         CH57-AP
notify:         hostmaster@cbn.net.id
mnt-by:         MNT-APJII-ID
mnt-irt:        IRT-IDNIC-ID
mnt-lower:      NOC-MAINT-CBN-APNIC
status:         ALLOCATED PORTABLE
remarks:        spam and abuse report : abuse@apjii.or.id, abuse@cbn.net.id
last-modified:  2015-12-01T22:28:10Z
source:         APNIC

irt:            IRT-IDNIC-ID
address:        INDONESIA NETWORK INFORMATION CENTER
address:        Cyber Building 11th Floor
address:        Jl. Kuningan Barat No.8
address:        Jakarta Selatan 12710
e-mail:         abuse@idnic.net
abuse-mailbox:  abuse@idnic.net
admin-c:        IA55-AP
tech-c:         IH123-AP
auth:           # Filtered
mnt-by:         MNT-APJII-ID
last-modified:  2025-09-04T04:51:41Z
source:         APNIC

person:         CBNnet Hostmaster
nic-hdl:        CH57-AP
e-mail:         hostmaster@cbn.net.id
address:        PT. Cyberindo Aditama
address:        Cyber 2 Tower 33rd Floor
address:        Jl. HR. Rasuna Said X5 No.13
address:        Jakarta 12950 - Indonesia
phone:          +62-21-2996-4900
fax-no:         +62-21-574-2481
country:        ID
mnt-by:         NOC-MAINT-CBN-APNIC
last-modified:  2015-06-24T04:07:08Z
source:         APNIC

% Information related to '202.158.32.0/19AS4787'

route:          202.158.32.0/19
descr:          PT. Cyberindo Aditama
descr:          Internet Service Provider
descr:          Cyber 2 Tower, 33rd Floor
descr:          Jl. HR. Rasuna Said Blok X5 No. 13
descr:          Jakarta 12950
origin:         AS4787
country:        ID
mnt-by:         NOC-MAINT-CBN-APNIC
last-modified:  2012-01-04T04:19:38Z
source:         APNIC

% Information related to '202.158.54.0 - 202.158.54.255'

inetnum:        202.158.54.0 - 202.158.54.255
netname:        CBN-JKTADMIN-NETBLOCK
country:        ID
descr:          PT. Cyberindo Aditama
descr:          Jakarta 10270
admin-c:        CH57-AP
tech-c:         CH57-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         NOC-MAINT-CBN-APNIC
last-modified:  2008-09-04T06:50:34Z
source:         IDNIC

person:         CBNnet Hostmaster
nic-hdl:        CH57-AP
e-mail:         hostmaster@cbn.net.id
address:        PT. Cyberindo Aditama
address:        Cyber 2 Tower 33rd Floor
address:        Jl. HR. Rasuna Said X5 No.13
address:        Jakarta 12950 - Indonesia
phone:          +62-21-2996-4900
fax-no:         +62-21-574-2481
country:        ID
mnt-by:         NOC-MAINT-CBN-APNIC
last-modified:  2024-07-30T02:01:00Z
source:         IDNIC

% Information related to '202.158.32.0/19AS4787'

route:          202.158.32.0/19
descr:          PT. Cyberindo Aditama
descr:          Internet Service Provider
descr:          Cyber 2 Tower, 33rd Floor
descr:          Jl. HR. Rasuna Said Blok X5 No. 13
descr:          Jakarta 12950
origin:         AS4787
country:        ID
mnt-by:         NOC-MAINT-CBN-APNIC
last-modified:  2012-01-04T04:19:38Z
source:         IDNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.158.54.230
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19311
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.158.54.230.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025092500 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 25 20:10:58 CST 2025
;; MSG SIZE  rcvd: 107
Host info
230.54.158.202.in-addr.arpa domain name pointer ip54-230.cbn.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
230.54.158.202.in-addr.arpa	name = ip54-230.cbn.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.15.245.32 attackbots
Mar  7 07:00:38 ns381471 sshd[21999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.245.32
Mar  7 07:00:40 ns381471 sshd[21999]: Failed password for invalid user lhl from 51.15.245.32 port 33358 ssh2
2020-03-07 14:06:05
185.123.2.170 attack
Chat Spam
2020-03-07 14:24:45
92.118.37.83 attack
Mar  7 07:26:18 debian-2gb-nbg1-2 kernel: \[5821540.366052\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.83 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=26156 PROTO=TCP SPT=52895 DPT=20029 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-07 14:47:32
168.243.91.19 attackbots
2020-03-07T05:54:44.577490ns386461 sshd\[2068\]: Invalid user pi from 168.243.91.19 port 38582
2020-03-07T05:54:44.582143ns386461 sshd\[2068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.243.91.19
2020-03-07T05:54:46.135106ns386461 sshd\[2068\]: Failed password for invalid user pi from 168.243.91.19 port 38582 ssh2
2020-03-07T05:57:44.289851ns386461 sshd\[5039\]: Invalid user thomson from 168.243.91.19 port 59984
2020-03-07T05:57:44.294402ns386461 sshd\[5039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.243.91.19
...
2020-03-07 14:05:31
222.186.169.192 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-03-07 14:08:37
220.135.118.36 attackspam
Honeypot attack, port: 81, PTR: 220-135-118-36.HINET-IP.hinet.net.
2020-03-07 14:54:23
51.77.220.127 attack
51.77.220.127 - - [07/Mar/2020:08:56:32 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-03-07 14:57:26
112.85.42.173 attackspambots
Mar  7 07:00:48 server sshd[677785]: Failed none for root from 112.85.42.173 port 18773 ssh2
Mar  7 07:00:50 server sshd[677785]: Failed password for root from 112.85.42.173 port 18773 ssh2
Mar  7 07:00:54 server sshd[677785]: Failed password for root from 112.85.42.173 port 18773 ssh2
2020-03-07 14:07:18
222.186.173.180 attack
Mar  7 07:50:28 [host] sshd[28936]: pam_unix(sshd:
Mar  7 07:50:32 [host] sshd[28936]: Failed passwor
Mar  7 07:50:33 [host] sshd[28936]: Failed passwor
2020-03-07 14:53:49
181.53.251.181 attackbotsspam
2020-03-07T06:44:41.991307upcloud.m0sh1x2.com sshd[24730]: Invalid user zyy from 181.53.251.181 port 44414
2020-03-07 15:02:36
222.186.175.216 attackbots
Mar  7 01:05:24 NPSTNNYC01T sshd[3713]: Failed password for root from 222.186.175.216 port 4008 ssh2
Mar  7 01:05:34 NPSTNNYC01T sshd[3713]: Failed password for root from 222.186.175.216 port 4008 ssh2
Mar  7 01:05:37 NPSTNNYC01T sshd[3713]: Failed password for root from 222.186.175.216 port 4008 ssh2
Mar  7 01:05:37 NPSTNNYC01T sshd[3713]: error: maximum authentication attempts exceeded for root from 222.186.175.216 port 4008 ssh2 [preauth]
...
2020-03-07 14:06:55
178.33.216.187 attackspam
2020-03-06T22:35:06.999899linuxbox-skyline sshd[15193]: Invalid user sync from 178.33.216.187 port 40493
...
2020-03-07 14:49:39
14.186.106.3 attack
Mar  7 06:33:02 xeon sshd[57155]: Failed password for invalid user ubuntu from 14.186.106.3 port 50754 ssh2
2020-03-07 14:15:24
134.209.102.95 attack
Mar  7 00:59:55 plusreed sshd[10203]: Invalid user hduser from 134.209.102.95
...
2020-03-07 14:10:27
117.22.228.62 attackbots
Mar  7 01:48:24 www sshd\[12289\]: Invalid user user from 117.22.228.62
Mar  7 01:55:59 www sshd\[12788\]: Invalid user freakshowindustries from 117.22.228.62
...
2020-03-07 15:03:30

Recently Reported IPs

88.210.63.67 165.154.239.178 206.189.208.160 40.124.175.29
38.30.240.191 46.101.172.157 91.196.152.64 91.196.152.47
182.44.12.37 103.203.48.150 47.90.17.27 119.188.29.47
91.196.152.78 91.230.168.244 91.230.168.196 196.251.81.89
113.215.188.105 108.181.23.123 170.64.153.106 14.189.176.125