City: unknown
Region: unknown
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '202.58.242.0 - 202.58.243.255'
% Abuse contact for '202.58.242.0 - 202.58.243.255' is 'abuse@pc24.net.id'
inetnum: 202.58.242.0 - 202.58.243.255
netname: PC24NET-ID
descr: PT PC24 Telekomunikasi Indonesia
descr: Internet Service Provider
descr: Kompleks Ruko Kebayoran Centre Blok A/5
descr: Jl.Raya Kebayoran Baru
descr: JAKARTA SELATAN
country: ID
admin-c: PH465-AP
tech-c: PH465-AP
remarks: Send Spam & Abuse Reports to: abuse@pc24.net.id
mnt-by: MNT-APJII-ID
mnt-routes: MAINT-ID-PC24NET
status: ALLOCATED PORTABLE
mnt-irt: IRT-PC24NET-ID
last-modified: 2015-10-23T08:20:49Z
source: APNIC
irt: IRT-PC24NET-ID
address: Kompleks Ruko Kebayoran Centre Blok A/5
address: Jl.Raya Kebayoran Baru, Jakarta Selatan.
e-mail: abuse@pc24.net.id
abuse-mailbox: abuse@pc24.net.id
admin-c: PH465-AP
tech-c: PH465-AP
auth: # Filtered
mnt-by: MAINT-ID-PC24NET
last-modified: 2026-03-09T15:39:05Z
source: APNIC
role: PC24NET Hostmasters
address: PT PC24 Telekomunikasi Indonesia
address: Kompleks Ruko Kebayoran Centre Blok A/5
address: Jl.Raya Kebayoran Baru
address: JAKARTA SELATAN
country: ID
phone: +62-21-7223411
fax-no: +62-21-7223412
e-mail: hostmaster@pc24.net.id
admin-c: NI62-AP
tech-c: NI62-AP
nic-hdl: PH465-AP
remarks: spam and abuse report : abuse@pc24.net.id
remarks: technical and routing : support@pc24.net.id
remarks: administrative request : admin@pc24.net.id
notify: hostmaster@pc24.net.id
mnt-by: MAINT-ID-PC24NET
last-modified: 2013-03-07T04:07:50Z
source: APNIC
% Information related to '202.58.242.0 - 202.58.242.255'
inetnum: 202.58.242.0 - 202.58.242.255
netname: IDNIC-DISKOMPROVJABAR-ID
descr: Dinas Komunikasi Provinsi Jawa Barat
country: ID
admin-c: LHR1-AP
tech-c: LHR1-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MNT-APJII-ID
mnt-irt: IRT-DISKOMPROVJABAR-ID
last-modified: 2025-08-13T05:33:14Z
source: IDNIC
irt: IRT-DISKOMPROVJABAR-ID
address: Diskominfo Pemprov Jabar
address: Jl. Tamansari No.55
address: Bandung, Jawa Barat 40132
e-mail: abuse@jabarprov.go.id
abuse-mailbox: abuse@jabarprov.go.id
admin-c: BIR1-AP
tech-c: BIR1-AP
auth: # Filtered
mnt-by: MAINT-ID-DISKOMPROVJABAR
last-modified: 2026-02-19T15:37:58Z
source: IDNIC
person: Lutfi Hanafiah Ramadhan
address: Jl. Tamansari No.55
address: Bandung, Jawa Barat 40132
country: ID
phone: +62-22-2502598
e-mail: hanafiah.ramadhan@jabarprov.go.id
nic-hdl: LHR1-AP
mnt-by: MAINT-ID-DISKOMPROVJABAR
last-modified: 2024-12-31T02:48:53Z
source: IDNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.58.242.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13330
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;202.58.242.242. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041701 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 17 15:01:04 CST 2026
;; MSG SIZE rcvd: 107
242.242.58.202.in-addr.arpa domain name pointer 242-242-58-202.jabarprov.go.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
242.242.58.202.in-addr.arpa name = 242-242-58-202.jabarprov.go.id.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.12.15.239 | attackspambots | Found on CINS badguys / proto=6 . srcport=46861 . dstport=24040 . (2257) |
2020-09-28 04:18:27 |
| 161.35.37.241 | attackspam | Sep 26 21:39:22 ip-172-31-16-56 sshd\[13158\]: Invalid user user1 from 161.35.37.241\ Sep 26 21:39:24 ip-172-31-16-56 sshd\[13158\]: Failed password for invalid user user1 from 161.35.37.241 port 49546 ssh2\ Sep 26 21:43:20 ip-172-31-16-56 sshd\[13196\]: Invalid user oscar from 161.35.37.241\ Sep 26 21:43:22 ip-172-31-16-56 sshd\[13196\]: Failed password for invalid user oscar from 161.35.37.241 port 35110 ssh2\ Sep 26 21:47:15 ip-172-31-16-56 sshd\[13265\]: Invalid user cristina from 161.35.37.241\ |
2020-09-28 04:17:57 |
| 192.35.169.20 | attackbotsspam |
|
2020-09-28 04:08:20 |
| 54.39.215.38 | attackbots | 27-Sep-2020 14:43:30.765 client @0x7f352c0a25f0 54.39.215.38#58427 (pizzaseo.com): query (cache) 'pizzaseo.com/RRSIG/IN' denied |
2020-09-28 04:12:53 |
| 163.172.51.180 | attack | blocked asn |
2020-09-28 04:30:54 |
| 222.186.30.57 | attack | Sep 27 23:29:53 dignus sshd[25891]: Failed password for root from 222.186.30.57 port 27762 ssh2 Sep 27 23:29:56 dignus sshd[25891]: Failed password for root from 222.186.30.57 port 27762 ssh2 Sep 27 23:30:09 dignus sshd[25937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57 user=root Sep 27 23:30:12 dignus sshd[25937]: Failed password for root from 222.186.30.57 port 23216 ssh2 Sep 27 23:30:14 dignus sshd[25937]: Failed password for root from 222.186.30.57 port 23216 ssh2 ... |
2020-09-28 04:31:34 |
| 164.68.105.165 | attack | Found on Block CINS-badguys / proto=6 . srcport=41861 . dstport=5038 . (2483) |
2020-09-28 04:30:37 |
| 61.177.172.168 | attack | Sep 27 22:16:14 OPSO sshd\[9956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.168 user=root Sep 27 22:16:16 OPSO sshd\[9956\]: Failed password for root from 61.177.172.168 port 27363 ssh2 Sep 27 22:16:20 OPSO sshd\[9956\]: Failed password for root from 61.177.172.168 port 27363 ssh2 Sep 27 22:16:23 OPSO sshd\[9956\]: Failed password for root from 61.177.172.168 port 27363 ssh2 Sep 27 22:16:26 OPSO sshd\[9956\]: Failed password for root from 61.177.172.168 port 27363 ssh2 |
2020-09-28 04:37:36 |
| 114.67.110.126 | attackbotsspam | 2020-09-27T17:51:46.389137server.espacesoutien.com sshd[28127]: Invalid user tst from 114.67.110.126 port 53518 2020-09-27T17:51:46.402666server.espacesoutien.com sshd[28127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.110.126 2020-09-27T17:51:46.389137server.espacesoutien.com sshd[28127]: Invalid user tst from 114.67.110.126 port 53518 2020-09-27T17:51:48.243501server.espacesoutien.com sshd[28127]: Failed password for invalid user tst from 114.67.110.126 port 53518 ssh2 ... |
2020-09-28 04:29:52 |
| 106.53.234.72 | attackbots | $f2bV_matches |
2020-09-28 04:12:26 |
| 79.44.15.157 | attackspam | 3x Failed Password |
2020-09-28 04:12:37 |
| 94.51.25.1 | attackspambots |
|
2020-09-28 04:21:09 |
| 139.59.129.44 | attackspambots | Sep 27 13:21:48 ws24vmsma01 sshd[26749]: Failed password for root from 139.59.129.44 port 59012 ssh2 ... |
2020-09-28 04:20:40 |
| 162.243.232.174 | attackspambots | firewall-block, port(s): 10741/tcp |
2020-09-28 04:34:27 |
| 186.4.136.153 | attackbotsspam | Sep 27 19:08:05 rocket sshd[30308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.136.153 Sep 27 19:08:07 rocket sshd[30308]: Failed password for invalid user wang from 186.4.136.153 port 42851 ssh2 ... |
2020-09-28 04:33:37 |