Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: South Tangerang

Region: Banten

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '36.64.0.0 - 36.95.255.255'

% Abuse contact for '36.64.0.0 - 36.95.255.255' is 'abuse@telkom.co.id'

inetnum:        36.64.0.0 - 36.95.255.255
netname:        TELKOMNET
descr:          PT Telekomunikasi Indonesia
descr:          Menara Multimedia Lt. 7
descr:          Jl. Kebon Sirih No. 12
descr:          JAKARTA - 10340
country:        ID
org:            ORG-TI10-AP
admin-c:        AZ163-AP
tech-c:         FS370-AP
abuse-c:        AI598-AP
status:         ALLOCATED PORTABLE
remarks:        For SPAM or ABUSE case, send to abuse@telkom.net.id
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-TELKOMNET
mnt-routes:     MAINT-TELKOMNET
mnt-irt:        IRT-IDTELKOM-ID
last-modified:  2020-07-29T13:14:29Z
source:         APNIC

irt:            IRT-IDTELKOM-ID
address:        PT. TELKOM INDONESIA
address:        Indibiz Experience Center 3rd Floor
address:        Kebon Sirih No 36
address:        Jakarta
e-mail:         abuse@telkom.co.id
abuse-mailbox:  abuse@telkom.co.id
admin-c:        RFR2-AP
tech-c:         TP630-AP
auth:           # Filtered
remarks:        abuse@telkom.co.id was validated on 2025-04-15
mnt-by:         MAINT-TELKOMNET
last-modified:  2025-09-24T00:27:38Z
source:         APNIC

organisation:   ORG-TI10-AP
org-name:       Telekomunikasi Indonesia (PT)
org-type:       LIR
country:        ID
address:        PT Telkom - Divisi Digital Connectivity Service
address:        Gedung Indibiz Experience Center 3rd Floor
address:        Sub Divisi Internet Product and Traffic Management Jalan Kebon Sirih No.36
address:        Jalan Merdeka Selatan No .12
phone:          +62-21-3447070
fax-no:         +62-21-3861215
e-mail:         peering@telin.net
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2025-02-26T13:00:34Z
source:         APNIC

role:           ABUSE IDTELKOMID
country:        ZZ
address:        PT. TELKOM INDONESIA
address:        Indibiz Experience Center 3rd Floor
address:        Kebon Sirih No 36
address:        Jakarta
phone:          +000000000
e-mail:         abuse@telkom.co.id
admin-c:        RFR2-AP
tech-c:         TP630-AP
nic-hdl:        AI598-AP
remarks:        Generated from irt object IRT-IDTELKOM-ID
remarks:        abuse@telkom.co.id was validated on 2025-04-15
abuse-mailbox:  abuse@telkom.co.id
mnt-by:         APNIC-ABUSE
last-modified:  2025-04-15T06:33:12Z
source:         APNIC

person:         Akhmad Zaimi
address:        GSD Lt.14 Jl. Kebon Sirih No.12
country:        ID
phone:          +62-21-3860500
e-mail:         djimie@telkom.co.id
nic-hdl:        AZ163-AP
mnt-by:         MAINT-TELKOMNET
last-modified:  2010-12-20T01:33:46Z
source:         APNIC

person:         Febrian Setiadi
address:        GSD Lt 14 Jl. Kebon Sirih No.12
country:        ID
phone:          +62-21-3860500
e-mail:         febrian.setiadi@telkom.co.id
nic-hdl:        FS370-AP
mnt-by:         MAINT-TELKOMNET
last-modified:  2010-12-20T01:30:54Z
source:         APNIC

% Information related to '36.95.121.0/24AS7713'

route:          36.95.121.0/24
origin:         AS7713
descr:          Telekomunikasi Indonesia (PT)
                PT Telkom - Divisi Digital Connectivity Service
                Gedung Indibiz Experience Center 3rd Floor
                Sub Divisi Internet Product and Traffic Management Jalan Kebon Sirih No.36
                Jalan Merdeka Selatan No .12
mnt-by:         MAINT-TELKOMNET
last-modified:  2025-04-30T16:14:15Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 36.95.121.235
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59882
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;36.95.121.235.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025101701 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 18 06:59:04 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 235.121.95.36.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 235.121.95.36.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
83.219.1.201 attackbots
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-01-31 13:28:13
114.35.237.73 attackspam
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-01-31 13:10:07
40.92.255.99 attackspambots
X-Original-Sender: sethiezfvtdc@outlook.com
2020-01-31 13:39:44
134.0.103.21 attackspam
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-01-31 13:15:29
49.235.76.69 attackspambots
Jan 31 05:59:25 debian-2gb-nbg1-2 kernel: \[2706025.550933\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=49.235.76.69 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=109 ID=20651 DF PROTO=TCP SPT=55011 DPT=33383 WINDOW=8192 RES=0x00 SYN URGP=0 
Jan 31 05:59:25 debian-2gb-nbg1-2 kernel: \[2706025.566164\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=49.235.76.69 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=109 ID=20652 DF PROTO=TCP SPT=55012 DPT=39563 WINDOW=8192 RES=0x00 SYN URGP=0
2020-01-31 13:05:57
80.78.194.165 attackspambots
1580446741 - 01/31/2020 05:59:01 Host: 80.78.194.165/80.78.194.165 Port: 445 TCP Blocked
2020-01-31 13:23:58
180.182.245.77 attackbots
Fail2Ban Ban Triggered
2020-01-31 13:46:41
58.182.248.129 attackspam
Unauthorized connection attempt detected from IP address 58.182.248.129 to port 21
2020-01-31 13:25:38
205.185.122.99 attackspam
Jan 31 05:59:24 debian64 sshd\[30608\]: Invalid user abhijaya from 205.185.122.99 port 51266
Jan 31 05:59:24 debian64 sshd\[30608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.122.99
Jan 31 05:59:26 debian64 sshd\[30608\]: Failed password for invalid user abhijaya from 205.185.122.99 port 51266 ssh2
...
2020-01-31 13:03:52
47.103.32.157 attack
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-01-31 13:42:19
80.66.146.84 attack
Unauthorized connection attempt detected from IP address 80.66.146.84 to port 2220 [J]
2020-01-31 13:30:02
95.216.9.239 attackbots
20 attempts against mh-misbehave-ban on float
2020-01-31 13:25:12
185.175.93.34 attack
01/30/2020-23:58:48.140673 185.175.93.34 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-31 13:36:34
106.12.108.32 attackspambots
Jan 30 18:56:08 eddieflores sshd\[24062\]: Invalid user damini from 106.12.108.32
Jan 30 18:56:08 eddieflores sshd\[24062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.108.32
Jan 30 18:56:10 eddieflores sshd\[24062\]: Failed password for invalid user damini from 106.12.108.32 port 34396 ssh2
Jan 30 18:59:16 eddieflores sshd\[24462\]: Invalid user amita from 106.12.108.32
Jan 30 18:59:16 eddieflores sshd\[24462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.108.32
2020-01-31 13:11:09
182.61.14.224 attackbots
Jan 31 05:49:18 OPSO sshd\[7452\]: Invalid user rekha from 182.61.14.224 port 52630
Jan 31 05:49:18 OPSO sshd\[7452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.14.224
Jan 31 05:49:20 OPSO sshd\[7452\]: Failed password for invalid user rekha from 182.61.14.224 port 52630 ssh2
Jan 31 05:59:14 OPSO sshd\[10387\]: Invalid user alina from 182.61.14.224 port 51258
Jan 31 05:59:14 OPSO sshd\[10387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.14.224
2020-01-31 13:11:29

Recently Reported IPs

233.40.82.231 54.91.92.202 54.82.51.94 54.196.51.168
206.189.29.148 15.235.226.164 13.222.1.25 54.234.97.40
171.127.130.219 162.216.149.152 15.235.225.83 35.203.211.152
198.235.24.171 211.64.240.48 192.168.202.100 194.187.176.32
139.5.0.113 8.152.197.30 167.99.191.65 125.122.13.182