Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '202.58.242.0 - 202.58.243.255'

% Abuse contact for '202.58.242.0 - 202.58.243.255' is 'abuse@pc24.net.id'

inetnum:        202.58.242.0 - 202.58.243.255
netname:        PC24NET-ID
descr:          PT PC24 Telekomunikasi Indonesia
descr:          Internet Service Provider
descr:          Kompleks Ruko Kebayoran Centre Blok A/5
descr:          Jl.Raya Kebayoran Baru
descr:          JAKARTA SELATAN
country:        ID
admin-c:        PH465-AP
tech-c:         PH465-AP
remarks:        Send Spam & Abuse Reports to: abuse@pc24.net.id
mnt-by:         MNT-APJII-ID
mnt-routes:     MAINT-ID-PC24NET
status:         ALLOCATED PORTABLE
mnt-irt:        IRT-PC24NET-ID
last-modified:  2015-10-23T08:20:49Z
source:         APNIC

irt:            IRT-PC24NET-ID
address:        Kompleks Ruko Kebayoran Centre Blok A/5
address:        Jl.Raya Kebayoran Baru, Jakarta Selatan.
e-mail:         abuse@pc24.net.id
abuse-mailbox:  abuse@pc24.net.id
admin-c:        PH465-AP
tech-c:         PH465-AP
auth:           # Filtered
mnt-by:         MAINT-ID-PC24NET
last-modified:  2026-03-09T15:39:05Z
source:         APNIC

role:           PC24NET Hostmasters
address:        PT PC24 Telekomunikasi Indonesia
address:        Kompleks Ruko Kebayoran Centre Blok A/5
address:        Jl.Raya Kebayoran Baru
address:        JAKARTA SELATAN
country:        ID
phone:          +62-21-7223411
fax-no:         +62-21-7223412
e-mail:         hostmaster@pc24.net.id
admin-c:        NI62-AP
tech-c:         NI62-AP
nic-hdl:        PH465-AP
remarks:        spam and abuse report : abuse@pc24.net.id
remarks:        technical and routing : support@pc24.net.id
remarks:        administrative request : admin@pc24.net.id
notify:         hostmaster@pc24.net.id
mnt-by:         MAINT-ID-PC24NET
last-modified:  2013-03-07T04:07:50Z
source:         APNIC

% Information related to '202.58.242.0 - 202.58.242.255'

inetnum:        202.58.242.0 - 202.58.242.255
netname:        IDNIC-DISKOMPROVJABAR-ID
descr:          Dinas Komunikasi Provinsi Jawa Barat
country:        ID
admin-c:        LHR1-AP
tech-c:         LHR1-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MNT-APJII-ID
mnt-irt:        IRT-DISKOMPROVJABAR-ID
last-modified:  2025-08-13T05:33:14Z
source:         IDNIC

irt:            IRT-DISKOMPROVJABAR-ID
address:        Diskominfo Pemprov Jabar
address:        Jl. Tamansari No.55
address:        Bandung, Jawa Barat 40132
e-mail:         abuse@jabarprov.go.id
abuse-mailbox:  abuse@jabarprov.go.id
admin-c:        BIR1-AP
tech-c:         BIR1-AP
auth:           # Filtered
mnt-by:         MAINT-ID-DISKOMPROVJABAR
last-modified:  2026-02-19T15:37:58Z
source:         IDNIC

person:         Lutfi Hanafiah Ramadhan
address:        Jl. Tamansari No.55
address:        Bandung, Jawa Barat 40132
country:        ID
phone:          +62-22-2502598
e-mail:         hanafiah.ramadhan@jabarprov.go.id
nic-hdl:        LHR1-AP
mnt-by:         MAINT-ID-DISKOMPROVJABAR
last-modified:  2024-12-31T02:48:53Z
source:         IDNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.58.242.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21018
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.58.242.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032501 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 04:30:21 CST 2026
;; MSG SIZE  rcvd: 106
Host info
20.242.58.202.in-addr.arpa domain name pointer 20-242-58-202.jabarprov.go.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.242.58.202.in-addr.arpa	name = 20-242-58-202.jabarprov.go.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
189.124.8.7 attack
Fail2Ban Ban Triggered
2020-06-21 00:25:37
106.13.34.131 attackspam
Jun 20 09:00:41 mockhub sshd[13785]: Failed password for root from 106.13.34.131 port 16390 ssh2
...
2020-06-21 00:33:27
104.198.16.231 attackspambots
$f2bV_matches
2020-06-21 00:27:14
58.228.159.253 attack
KR_MNT-KRNIC-AP_<177>1592665797 [1:2403380:58145] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 41 [Classification: Misc Attack] [Priority: 2]:  {TCP} 58.228.159.253:59333
2020-06-21 00:52:48
52.152.165.149 attackspambots
Time:     Sat Jun 20 09:08:39 2020 -0300
IP:       52.152.165.149 (US/United States/-)
Failures: 5 (mod_security)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-06-21 00:20:16
116.247.81.100 attackbotsspam
2020-06-20T14:49:50.620024abusebot-2.cloudsearch.cf sshd[11558]: Invalid user app from 116.247.81.100 port 39666
2020-06-20T14:49:50.628273abusebot-2.cloudsearch.cf sshd[11558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.247.81.100
2020-06-20T14:49:50.620024abusebot-2.cloudsearch.cf sshd[11558]: Invalid user app from 116.247.81.100 port 39666
2020-06-20T14:49:52.254294abusebot-2.cloudsearch.cf sshd[11558]: Failed password for invalid user app from 116.247.81.100 port 39666 ssh2
2020-06-20T14:58:36.078858abusebot-2.cloudsearch.cf sshd[11669]: Invalid user postgres from 116.247.81.100 port 50099
2020-06-20T14:58:36.086551abusebot-2.cloudsearch.cf sshd[11669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.247.81.100
2020-06-20T14:58:36.078858abusebot-2.cloudsearch.cf sshd[11669]: Invalid user postgres from 116.247.81.100 port 50099
2020-06-20T14:58:38.254727abusebot-2.cloudsearch.cf sshd[11669]:
...
2020-06-21 00:52:08
182.254.162.72 attackspam
Jun 20 13:10:06 vps46666688 sshd[27064]: Failed password for root from 182.254.162.72 port 52072 ssh2
Jun 20 13:13:55 vps46666688 sshd[27306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.162.72
...
2020-06-21 00:27:58
41.170.84.122 attackspambots
Jun 20 02:11:52 php1 sshd\[28737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.170.84.122  user=root
Jun 20 02:11:53 php1 sshd\[28737\]: Failed password for root from 41.170.84.122 port 60626 ssh2
Jun 20 02:16:16 php1 sshd\[29101\]: Invalid user roy from 41.170.84.122
Jun 20 02:16:16 php1 sshd\[29101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.170.84.122
Jun 20 02:16:18 php1 sshd\[29101\]: Failed password for invalid user roy from 41.170.84.122 port 32838 ssh2
2020-06-21 00:24:09
162.12.210.74 attackspam
Unauthorized connection attempt from IP address 162.12.210.74 on Port 445(SMB)
2020-06-21 00:50:49
104.129.5.49 attackbots
Jun 18 10:07:44 our-server-hostname sshd[22531]: Address 104.129.5.49 maps to 104.129.5.49.static.quadranet.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jun 18 10:07:44 our-server-hostname sshd[22531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.129.5.49  user=r.r
Jun 18 10:07:46 our-server-hostname sshd[22531]: Failed password for r.r from 104.129.5.49 port 56645 ssh2
Jun 18 10:24:08 our-server-hostname sshd[26662]: Address 104.129.5.49 maps to 104.129.5.49.static.quadranet.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jun 18 10:24:08 our-server-hostname sshd[26662]: Invalid user hy from 104.129.5.49
Jun 18 10:24:08 our-server-hostname sshd[26662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.129.5.49 
Jun 18 10:24:11 our-server-hostname sshd[26662]: Failed password for invalid user hy from 104.129.5.49 port 46546 s........
-------------------------------
2020-06-21 00:38:43
49.206.23.39 attackbotsspam
Unauthorized connection attempt from IP address 49.206.23.39 on Port 445(SMB)
2020-06-21 00:55:15
181.48.46.195 attack
Jun 20 14:05:43 mail sshd[12850]: Failed password for root from 181.48.46.195 port 39754 ssh2
...
2020-06-21 00:59:00
183.159.114.148 attackbots
MAIL: User Login Brute Force Attempt
2020-06-21 01:05:34
80.210.61.186 attackspambots
Unauthorized connection attempt from IP address 80.210.61.186 on Port 445(SMB)
2020-06-21 00:45:06
152.136.128.105 attack
Invalid user livechat from 152.136.128.105 port 49730
2020-06-21 00:59:12

Recently Reported IPs

205.169.39.29 66.132.186.202 120.124.229.26 44.204.184.42
44.202.13.116 3.90.5.174 20.74.212.144 185.242.3.64
110.78.156.191 2606:4700:10::6814:7662 2606:4700:10::6814:7215 2606:4700:10::6816:3590
2606:4700:10::6816:476 2606:4700:10::6814:5572 110.78.138.189 2606:4700:10::6814:4926
2606:4700:10::6816:4581 2606:4700:10::6814:9702 2606:4700:10::6816:3123 2606:4700:10::ac43:2864