City: unknown
Region: unknown
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '202.58.242.0 - 202.58.243.255'
% Abuse contact for '202.58.242.0 - 202.58.243.255' is 'abuse@pc24.net.id'
inetnum: 202.58.242.0 - 202.58.243.255
netname: PC24NET-ID
descr: PT PC24 Telekomunikasi Indonesia
descr: Internet Service Provider
descr: Kompleks Ruko Kebayoran Centre Blok A/5
descr: Jl.Raya Kebayoran Baru
descr: JAKARTA SELATAN
country: ID
admin-c: PH465-AP
tech-c: PH465-AP
remarks: Send Spam & Abuse Reports to: abuse@pc24.net.id
mnt-by: MNT-APJII-ID
mnt-routes: MAINT-ID-PC24NET
status: ALLOCATED PORTABLE
mnt-irt: IRT-PC24NET-ID
last-modified: 2015-10-23T08:20:49Z
source: APNIC
irt: IRT-PC24NET-ID
address: Kompleks Ruko Kebayoran Centre Blok A/5
address: Jl.Raya Kebayoran Baru, Jakarta Selatan.
e-mail: abuse@pc24.net.id
abuse-mailbox: abuse@pc24.net.id
admin-c: PH465-AP
tech-c: PH465-AP
auth: # Filtered
mnt-by: MAINT-ID-PC24NET
last-modified: 2026-03-09T15:39:05Z
source: APNIC
role: PC24NET Hostmasters
address: PT PC24 Telekomunikasi Indonesia
address: Kompleks Ruko Kebayoran Centre Blok A/5
address: Jl.Raya Kebayoran Baru
address: JAKARTA SELATAN
country: ID
phone: +62-21-7223411
fax-no: +62-21-7223412
e-mail: hostmaster@pc24.net.id
admin-c: NI62-AP
tech-c: NI62-AP
nic-hdl: PH465-AP
remarks: spam and abuse report : abuse@pc24.net.id
remarks: technical and routing : support@pc24.net.id
remarks: administrative request : admin@pc24.net.id
notify: hostmaster@pc24.net.id
mnt-by: MAINT-ID-PC24NET
last-modified: 2013-03-07T04:07:50Z
source: APNIC
% Information related to '202.58.242.0 - 202.58.242.255'
inetnum: 202.58.242.0 - 202.58.242.255
netname: IDNIC-DISKOMPROVJABAR-ID
descr: Dinas Komunikasi Provinsi Jawa Barat
country: ID
admin-c: LHR1-AP
tech-c: LHR1-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MNT-APJII-ID
mnt-irt: IRT-DISKOMPROVJABAR-ID
last-modified: 2025-08-13T05:33:14Z
source: IDNIC
irt: IRT-DISKOMPROVJABAR-ID
address: Diskominfo Pemprov Jabar
address: Jl. Tamansari No.55
address: Bandung, Jawa Barat 40132
e-mail: abuse@jabarprov.go.id
abuse-mailbox: abuse@jabarprov.go.id
admin-c: BIR1-AP
tech-c: BIR1-AP
auth: # Filtered
mnt-by: MAINT-ID-DISKOMPROVJABAR
last-modified: 2026-02-19T15:37:58Z
source: IDNIC
person: Lutfi Hanafiah Ramadhan
address: Jl. Tamansari No.55
address: Bandung, Jawa Barat 40132
country: ID
phone: +62-22-2502598
e-mail: hanafiah.ramadhan@jabarprov.go.id
nic-hdl: LHR1-AP
mnt-by: MAINT-ID-DISKOMPROVJABAR
last-modified: 2024-12-31T02:48:53Z
source: IDNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.58.242.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21018
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;202.58.242.20. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032501 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 04:30:21 CST 2026
;; MSG SIZE rcvd: 106
20.242.58.202.in-addr.arpa domain name pointer 20-242-58-202.jabarprov.go.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
20.242.58.202.in-addr.arpa name = 20-242-58-202.jabarprov.go.id.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 189.124.8.7 | attack | Fail2Ban Ban Triggered |
2020-06-21 00:25:37 |
| 106.13.34.131 | attackspam | Jun 20 09:00:41 mockhub sshd[13785]: Failed password for root from 106.13.34.131 port 16390 ssh2 ... |
2020-06-21 00:33:27 |
| 104.198.16.231 | attackspambots | $f2bV_matches |
2020-06-21 00:27:14 |
| 58.228.159.253 | attack | KR_MNT-KRNIC-AP_<177>1592665797 [1:2403380:58145] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 41 [Classification: Misc Attack] [Priority: 2]: |
2020-06-21 00:52:48 |
| 52.152.165.149 | attackspambots | Time: Sat Jun 20 09:08:39 2020 -0300 IP: 52.152.165.149 (US/United States/-) Failures: 5 (mod_security) Interval: 3600 seconds Blocked: Permanent Block |
2020-06-21 00:20:16 |
| 116.247.81.100 | attackbotsspam | 2020-06-20T14:49:50.620024abusebot-2.cloudsearch.cf sshd[11558]: Invalid user app from 116.247.81.100 port 39666 2020-06-20T14:49:50.628273abusebot-2.cloudsearch.cf sshd[11558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.247.81.100 2020-06-20T14:49:50.620024abusebot-2.cloudsearch.cf sshd[11558]: Invalid user app from 116.247.81.100 port 39666 2020-06-20T14:49:52.254294abusebot-2.cloudsearch.cf sshd[11558]: Failed password for invalid user app from 116.247.81.100 port 39666 ssh2 2020-06-20T14:58:36.078858abusebot-2.cloudsearch.cf sshd[11669]: Invalid user postgres from 116.247.81.100 port 50099 2020-06-20T14:58:36.086551abusebot-2.cloudsearch.cf sshd[11669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.247.81.100 2020-06-20T14:58:36.078858abusebot-2.cloudsearch.cf sshd[11669]: Invalid user postgres from 116.247.81.100 port 50099 2020-06-20T14:58:38.254727abusebot-2.cloudsearch.cf sshd[11669]: ... |
2020-06-21 00:52:08 |
| 182.254.162.72 | attackspam | Jun 20 13:10:06 vps46666688 sshd[27064]: Failed password for root from 182.254.162.72 port 52072 ssh2 Jun 20 13:13:55 vps46666688 sshd[27306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.162.72 ... |
2020-06-21 00:27:58 |
| 41.170.84.122 | attackspambots | Jun 20 02:11:52 php1 sshd\[28737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.170.84.122 user=root Jun 20 02:11:53 php1 sshd\[28737\]: Failed password for root from 41.170.84.122 port 60626 ssh2 Jun 20 02:16:16 php1 sshd\[29101\]: Invalid user roy from 41.170.84.122 Jun 20 02:16:16 php1 sshd\[29101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.170.84.122 Jun 20 02:16:18 php1 sshd\[29101\]: Failed password for invalid user roy from 41.170.84.122 port 32838 ssh2 |
2020-06-21 00:24:09 |
| 162.12.210.74 | attackspam | Unauthorized connection attempt from IP address 162.12.210.74 on Port 445(SMB) |
2020-06-21 00:50:49 |
| 104.129.5.49 | attackbots | Jun 18 10:07:44 our-server-hostname sshd[22531]: Address 104.129.5.49 maps to 104.129.5.49.static.quadranet.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Jun 18 10:07:44 our-server-hostname sshd[22531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.129.5.49 user=r.r Jun 18 10:07:46 our-server-hostname sshd[22531]: Failed password for r.r from 104.129.5.49 port 56645 ssh2 Jun 18 10:24:08 our-server-hostname sshd[26662]: Address 104.129.5.49 maps to 104.129.5.49.static.quadranet.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Jun 18 10:24:08 our-server-hostname sshd[26662]: Invalid user hy from 104.129.5.49 Jun 18 10:24:08 our-server-hostname sshd[26662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.129.5.49 Jun 18 10:24:11 our-server-hostname sshd[26662]: Failed password for invalid user hy from 104.129.5.49 port 46546 s........ ------------------------------- |
2020-06-21 00:38:43 |
| 49.206.23.39 | attackbotsspam | Unauthorized connection attempt from IP address 49.206.23.39 on Port 445(SMB) |
2020-06-21 00:55:15 |
| 181.48.46.195 | attack | Jun 20 14:05:43 mail sshd[12850]: Failed password for root from 181.48.46.195 port 39754 ssh2 ... |
2020-06-21 00:59:00 |
| 183.159.114.148 | attackbots | MAIL: User Login Brute Force Attempt |
2020-06-21 01:05:34 |
| 80.210.61.186 | attackspambots | Unauthorized connection attempt from IP address 80.210.61.186 on Port 445(SMB) |
2020-06-21 00:45:06 |
| 152.136.128.105 | attack | Invalid user livechat from 152.136.128.105 port 49730 |
2020-06-21 00:59:12 |