Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '202.58.242.0 - 202.58.243.255'

% Abuse contact for '202.58.242.0 - 202.58.243.255' is 'abuse@pc24.net.id'

inetnum:        202.58.242.0 - 202.58.243.255
netname:        PC24NET-ID
descr:          PT PC24 Telekomunikasi Indonesia
descr:          Internet Service Provider
descr:          Kompleks Ruko Kebayoran Centre Blok A/5
descr:          Jl.Raya Kebayoran Baru
descr:          JAKARTA SELATAN
country:        ID
admin-c:        PH465-AP
tech-c:         PH465-AP
remarks:        Send Spam & Abuse Reports to: abuse@pc24.net.id
mnt-by:         MNT-APJII-ID
mnt-routes:     MAINT-ID-PC24NET
status:         ALLOCATED PORTABLE
mnt-irt:        IRT-PC24NET-ID
last-modified:  2015-10-23T08:20:49Z
source:         APNIC

irt:            IRT-PC24NET-ID
address:        Kompleks Ruko Kebayoran Centre Blok A/5
address:        Jl.Raya Kebayoran Baru, Jakarta Selatan.
e-mail:         abuse@pc24.net.id
abuse-mailbox:  abuse@pc24.net.id
admin-c:        PH465-AP
tech-c:         PH465-AP
auth:           # Filtered
mnt-by:         MAINT-ID-PC24NET
last-modified:  2026-03-09T15:39:05Z
source:         APNIC

role:           PC24NET Hostmasters
address:        PT PC24 Telekomunikasi Indonesia
address:        Kompleks Ruko Kebayoran Centre Blok A/5
address:        Jl.Raya Kebayoran Baru
address:        JAKARTA SELATAN
country:        ID
phone:          +62-21-7223411
fax-no:         +62-21-7223412
e-mail:         hostmaster@pc24.net.id
admin-c:        NI62-AP
tech-c:         NI62-AP
nic-hdl:        PH465-AP
remarks:        spam and abuse report : abuse@pc24.net.id
remarks:        technical and routing : support@pc24.net.id
remarks:        administrative request : admin@pc24.net.id
notify:         hostmaster@pc24.net.id
mnt-by:         MAINT-ID-PC24NET
last-modified:  2013-03-07T04:07:50Z
source:         APNIC

% Information related to '202.58.242.0 - 202.58.242.255'

inetnum:        202.58.242.0 - 202.58.242.255
netname:        IDNIC-DISKOMPROVJABAR-ID
descr:          Dinas Komunikasi Provinsi Jawa Barat
country:        ID
admin-c:        LHR1-AP
tech-c:         LHR1-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MNT-APJII-ID
mnt-irt:        IRT-DISKOMPROVJABAR-ID
last-modified:  2025-08-13T05:33:14Z
source:         IDNIC

irt:            IRT-DISKOMPROVJABAR-ID
address:        Diskominfo Pemprov Jabar
address:        Jl. Tamansari No.55
address:        Bandung, Jawa Barat 40132
e-mail:         abuse@jabarprov.go.id
abuse-mailbox:  abuse@jabarprov.go.id
admin-c:        BIR1-AP
tech-c:         BIR1-AP
auth:           # Filtered
mnt-by:         MAINT-ID-DISKOMPROVJABAR
last-modified:  2026-02-19T15:37:58Z
source:         IDNIC

person:         Lutfi Hanafiah Ramadhan
address:        Jl. Tamansari No.55
address:        Bandung, Jawa Barat 40132
country:        ID
phone:          +62-22-2502598
e-mail:         hanafiah.ramadhan@jabarprov.go.id
nic-hdl:        LHR1-AP
mnt-by:         MAINT-ID-DISKOMPROVJABAR
last-modified:  2024-12-31T02:48:53Z
source:         IDNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.58.242.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13330
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.58.242.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041701 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 17 15:01:04 CST 2026
;; MSG SIZE  rcvd: 107
Host info
242.242.58.202.in-addr.arpa domain name pointer 242-242-58-202.jabarprov.go.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.242.58.202.in-addr.arpa	name = 242-242-58-202.jabarprov.go.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.15.239 attackspambots
Found on   CINS badguys     / proto=6  .  srcport=46861  .  dstport=24040  .     (2257)
2020-09-28 04:18:27
161.35.37.241 attackspam
Sep 26 21:39:22 ip-172-31-16-56 sshd\[13158\]: Invalid user user1 from 161.35.37.241\
Sep 26 21:39:24 ip-172-31-16-56 sshd\[13158\]: Failed password for invalid user user1 from 161.35.37.241 port 49546 ssh2\
Sep 26 21:43:20 ip-172-31-16-56 sshd\[13196\]: Invalid user oscar from 161.35.37.241\
Sep 26 21:43:22 ip-172-31-16-56 sshd\[13196\]: Failed password for invalid user oscar from 161.35.37.241 port 35110 ssh2\
Sep 26 21:47:15 ip-172-31-16-56 sshd\[13265\]: Invalid user cristina from 161.35.37.241\
2020-09-28 04:17:57
192.35.169.20 attackbotsspam
 TCP (SYN) 192.35.169.20:64085 -> port 110, len 44
2020-09-28 04:08:20
54.39.215.38 attackbots
27-Sep-2020 14:43:30.765 client @0x7f352c0a25f0 54.39.215.38#58427 (pizzaseo.com): query (cache) 'pizzaseo.com/RRSIG/IN' denied
2020-09-28 04:12:53
163.172.51.180 attack
blocked asn
2020-09-28 04:30:54
222.186.30.57 attack
Sep 27 23:29:53 dignus sshd[25891]: Failed password for root from 222.186.30.57 port 27762 ssh2
Sep 27 23:29:56 dignus sshd[25891]: Failed password for root from 222.186.30.57 port 27762 ssh2
Sep 27 23:30:09 dignus sshd[25937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57  user=root
Sep 27 23:30:12 dignus sshd[25937]: Failed password for root from 222.186.30.57 port 23216 ssh2
Sep 27 23:30:14 dignus sshd[25937]: Failed password for root from 222.186.30.57 port 23216 ssh2
...
2020-09-28 04:31:34
164.68.105.165 attack
Found on Block CINS-badguys  / proto=6  .  srcport=41861  .  dstport=5038  .     (2483)
2020-09-28 04:30:37
61.177.172.168 attack
Sep 27 22:16:14 OPSO sshd\[9956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.168  user=root
Sep 27 22:16:16 OPSO sshd\[9956\]: Failed password for root from 61.177.172.168 port 27363 ssh2
Sep 27 22:16:20 OPSO sshd\[9956\]: Failed password for root from 61.177.172.168 port 27363 ssh2
Sep 27 22:16:23 OPSO sshd\[9956\]: Failed password for root from 61.177.172.168 port 27363 ssh2
Sep 27 22:16:26 OPSO sshd\[9956\]: Failed password for root from 61.177.172.168 port 27363 ssh2
2020-09-28 04:37:36
114.67.110.126 attackbotsspam
2020-09-27T17:51:46.389137server.espacesoutien.com sshd[28127]: Invalid user tst from 114.67.110.126 port 53518
2020-09-27T17:51:46.402666server.espacesoutien.com sshd[28127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.110.126
2020-09-27T17:51:46.389137server.espacesoutien.com sshd[28127]: Invalid user tst from 114.67.110.126 port 53518
2020-09-27T17:51:48.243501server.espacesoutien.com sshd[28127]: Failed password for invalid user tst from 114.67.110.126 port 53518 ssh2
...
2020-09-28 04:29:52
106.53.234.72 attackbots
$f2bV_matches
2020-09-28 04:12:26
79.44.15.157 attackspam
3x Failed Password
2020-09-28 04:12:37
94.51.25.1 attackspambots
 TCP (SYN) 94.51.25.1:52731 -> port 1080, len 52
2020-09-28 04:21:09
139.59.129.44 attackspambots
Sep 27 13:21:48 ws24vmsma01 sshd[26749]: Failed password for root from 139.59.129.44 port 59012 ssh2
...
2020-09-28 04:20:40
162.243.232.174 attackspambots
firewall-block, port(s): 10741/tcp
2020-09-28 04:34:27
186.4.136.153 attackbotsspam
Sep 27 19:08:05 rocket sshd[30308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.136.153
Sep 27 19:08:07 rocket sshd[30308]: Failed password for invalid user wang from 186.4.136.153 port 42851 ssh2
...
2020-09-28 04:33:37

Recently Reported IPs

139.60.162.211 2606:4700:10::6814:8153 2606:4700:10::6816:2904 8.217.251.77
93.119.183.62 45.230.66.106 163.245.209.242 2606:4700:10::ac43:1122
2606:4700:10::6816:4645 2606:4700:10::6816:477 2606:4700:10::6814:7693 121.230.89.67
2606:4700:10::6814:9851 2606:4700:10::6816:1689 2606:4700:10::ac43:2122 2606:4700:10::6814:6017
2606:4700:10::6814:9123 2606:4700:10::6814:6431 2606:4700:10::ac43:239e 132.120.54.38