Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Surabaya

Region: Jawa Timur

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
43.252.159.78 attackbotsspam
Automatic report - Port Scan Attack
2019-11-21 01:26:39
43.252.159.78 attackspambots
Unauthorized connection attempt from IP address 43.252.159.78 on Port 445(SMB)
2019-10-30 15:37:11
43.252.159.78 attackspam
Unauthorized connection attempt from IP address 43.252.159.78 on Port 445(SMB)
2019-09-09 22:49:53
43.252.159.80 attackbotsspam
Unauthorized connection attempt from IP address 43.252.159.80 on Port 445(SMB)
2019-08-30 20:56:27
43.252.159.11 attack
Unauthorized connection attempt from IP address 43.252.159.11 on Port 445(SMB)
2019-07-31 12:33:52
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '43.252.159.0 - 43.252.159.255'

% Abuse contact for '43.252.159.0 - 43.252.159.255' is 'abuse@gmedia.net.id'

inetnum:        43.252.159.0 - 43.252.159.255
netname:        GMEDIA-ID-BALI
descr:          PT Media Sarana Data
descr:          Internet Service Provider
descr:          Jl. Daradasih No. 11A
descr:          Patangpuluhan, Yogyakarta
descr:          DIY Yogyakarta, 55251
country:        ID
admin-c:        GH788-AP
tech-c:         GH788-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-ID-GMEDIA
mnt-irt:        IRT-GMEDIA-ID
last-modified:  2021-04-22T09:29:19Z
source:         APNIC

irt:            IRT-GMEDIA-ID
address:        Jl. Daradasih No. 11A
address:        Patangpuluhan, Yogyakarta
address:        DIY Yogyakarta, 55251
e-mail:         hostmaster@gmedia.net.id
abuse-mailbox:  abuse@gmedia.net.id
admin-c:        GH788-AP
tech-c:         GH788-AP
auth:           # Filtered
mnt-by:         MAINT-ID-GMEDIA
last-modified:  2026-03-09T15:38:33Z
source:         APNIC

person:         GMEDIA HOSTMASTER
address:        Jl. Daradasih No. 11A
address:        Patangpuluhan, Yogyakarta
address:        DIY Yogyakarta, 55251
country:        ID
phone:          +62-274-380345
fax-no:         +62-274-379593
e-mail:         hostmaster@gmedia.net.id
nic-hdl:        GH788-AP
notify:         agusr@gmedia.co.id
mnt-by:         MAINT-ID-GMEDIA
last-modified:  2011-02-28T19:00:02Z
source:         APNIC

% Information related to '43.252.159.0/24AS55666'

route:          43.252.159.0/24
descr:          PT Media Sarana Data
descr:          YOGYAKARTA
country:        ID
origin:         AS55666
mnt-by:         MAINT-ID-GMEDIA
last-modified:  2015-11-20T04:30:01Z
source:         APNIC

% Information related to '43.252.159.0 - 43.252.159.255'

inetnum:        43.252.159.0 - 43.252.159.255
netname:        BLIP-ID
descr:          PT Blip Integrator Provider
descr:          Internet Service Provider
descr:          Unit Komersial Blok Broadway 2 No. 11 Istana Kuta Galeria
descr:          Jl. Patih Jelantik Desa Legian
descr:          Kec. Kuta, Kab. Badung, Bali 80361
country:        ID
admin-c:        PBIP1-AP
tech-c:         PBIP1-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-ID-GMEDIA
mnt-irt:        IRT-GMEDIA-ID
remarks:        Send Spam& Abuse report to: abuse@gmedia.net.id
last-modified:  2023-02-22T05:22:16Z
source:         IDNIC

irt:            IRT-GMEDIA-ID
address:        Jl. Daradasih No. 11A
address:        Patangpuluhan, Yogyakarta
address:        DIY Yogyakarta, 55251
e-mail:         hostmaster@gmedia.net.id
abuse-mailbox:  abuse@gmedia.net.id
admin-c:        GH788-AP
tech-c:         GH788-AP
auth:           # Filtered
mnt-by:         MAINT-ID-GMEDIA
last-modified:  2011-02-25T10:06:50Z
source:         IDNIC

person:         PT BLIP INTEGRATOR PROVIDER
address:        Unit Komersial Blok Broadway 2 No. 11 Istana Kuta Galeria
address:        Jl. Patih Jelantik Desa Legian, Kec. Kuta, Kab. Badung, Bali
country:        ID
phone:          +62-361-6205157
e-mail:         info@blip.co.id
nic-hdl:        PBIP1-AP
mnt-by:         MAINT-ID-BLIP
last-modified:  2022-07-13T07:08:38Z
source:         IDNIC

% Information related to '43.252.159.0/24AS55666'

route:          43.252.159.0/24
descr:          PT Media Sarana Data
descr:          YOGYAKARTA
country:        ID
origin:         AS55666
mnt-by:         MAINT-ID-GMEDIA
last-modified:  2015-11-20T04:30:01Z
source:         IDNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 43.252.159.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62555
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;43.252.159.41.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026052400 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 24 16:01:00 CST 2026
;; MSG SIZE  rcvd: 106
Host info
41.159.252.43.in-addr.arpa domain name pointer ipv4-41-159-252.as55666.net.
Nslookup info:
b'41.159.252.43.in-addr.arpa	name = ipv4-41-159-252.as55666.net.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
178.154.200.96 attackbots
[Thu Apr 09 10:52:52.970854 2020] [:error] [pid 27383:tid 140306497861376] [client 178.154.200.96:45134] [client 178.154.200.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "Xo6cFOQ9Qq04NInh6KfNMwAAAh4"]
...
2020-04-09 16:09:17
107.160.240.229 attackspam
firewall-block, port(s): 11211/tcp
2020-04-09 15:52:21
103.13.133.70 attackspam
Apr  9 08:28:18 srv01 sshd[6472]: Invalid user user from 103.13.133.70 port 61829
Apr  9 08:28:18 srv01 sshd[6472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.133.70
Apr  9 08:28:18 srv01 sshd[6472]: Invalid user user from 103.13.133.70 port 61829
Apr  9 08:28:19 srv01 sshd[6472]: Failed password for invalid user user from 103.13.133.70 port 61829 ssh2
Apr  9 08:28:18 srv01 sshd[6472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.133.70
Apr  9 08:28:18 srv01 sshd[6472]: Invalid user user from 103.13.133.70 port 61829
Apr  9 08:28:19 srv01 sshd[6472]: Failed password for invalid user user from 103.13.133.70 port 61829 ssh2
...
2020-04-09 16:29:04
39.154.10.87 attackbots
04/08/2020-23:53:18.851624 39.154.10.87 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-04-09 15:43:56
45.133.99.14 attackspam
Apr  9 09:48:27 relay postfix/smtpd\[2921\]: warning: unknown\[45.133.99.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  9 09:48:45 relay postfix/smtpd\[8882\]: warning: unknown\[45.133.99.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  9 09:51:34 relay postfix/smtpd\[8882\]: warning: unknown\[45.133.99.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  9 09:51:52 relay postfix/smtpd\[31822\]: warning: unknown\[45.133.99.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  9 09:53:31 relay postfix/smtpd\[5616\]: warning: unknown\[45.133.99.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-09 15:54:11
49.234.24.108 attackspam
bruteforce detected
2020-04-09 15:43:25
67.205.153.16 attackbotsspam
Apr  9 09:53:06 server sshd\[21781\]: Invalid user ubuntu from 67.205.153.16
Apr  9 09:53:06 server sshd\[21781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=imap.vtigermail.com 
Apr  9 09:53:08 server sshd\[21781\]: Failed password for invalid user ubuntu from 67.205.153.16 port 35476 ssh2
Apr  9 10:04:02 server sshd\[24288\]: Invalid user testtest from 67.205.153.16
Apr  9 10:04:02 server sshd\[24288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=imap.vtigermail.com 
...
2020-04-09 16:13:53
119.10.114.92 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-04-09 16:03:38
152.32.240.76 attackbotsspam
2020-04-08T22:24:52.682351suse-nuc sshd[28629]: Invalid user kiosk from 152.32.240.76 port 49996
...
2020-04-09 16:28:19
222.186.15.158 attack
Found by fail2ban
2020-04-09 16:08:08
67.205.178.229 attackspam
Apr  9 02:43:56 firewall sshd[23050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.178.229
Apr  9 02:43:56 firewall sshd[23050]: Invalid user git from 67.205.178.229
Apr  9 02:43:58 firewall sshd[23050]: Failed password for invalid user git from 67.205.178.229 port 56166 ssh2
...
2020-04-09 16:02:10
201.249.169.210 attack
$lgm
2020-04-09 16:05:08
200.187.182.227 attack
Apr  9 06:40:20 ArkNodeAT sshd\[25652\]: Invalid user user from 200.187.182.227
Apr  9 06:40:20 ArkNodeAT sshd\[25652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.187.182.227
Apr  9 06:40:22 ArkNodeAT sshd\[25652\]: Failed password for invalid user user from 200.187.182.227 port 9179 ssh2
2020-04-09 16:10:09
106.12.191.160 attack
Apr  9 05:29:27 h2646465 sshd[1140]: Invalid user sonos from 106.12.191.160
Apr  9 05:29:27 h2646465 sshd[1140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.191.160
Apr  9 05:29:27 h2646465 sshd[1140]: Invalid user sonos from 106.12.191.160
Apr  9 05:29:29 h2646465 sshd[1140]: Failed password for invalid user sonos from 106.12.191.160 port 37534 ssh2
Apr  9 05:48:51 h2646465 sshd[3831]: Invalid user test1 from 106.12.191.160
Apr  9 05:48:51 h2646465 sshd[3831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.191.160
Apr  9 05:48:51 h2646465 sshd[3831]: Invalid user test1 from 106.12.191.160
Apr  9 05:48:53 h2646465 sshd[3831]: Failed password for invalid user test1 from 106.12.191.160 port 49642 ssh2
Apr  9 05:52:40 h2646465 sshd[4440]: Invalid user webmaster from 106.12.191.160
...
2020-04-09 16:20:09
114.112.72.130 attack
Telnet Server BruteForce Attack
2020-04-09 15:50:08

Recently Reported IPs

35.151.143.71 20.163.15.43 143.244.167.224 159.89.234.76
43.165.167.69 157.230.14.114 5.226.140.126 31.14.254.108
213.166.84.59 165.227.146.146 20.195.192.35 49.73.51.155
49.69.255.177 221.227.255.242 123.182.208.30 121.227.150.26
121.224.32.222 117.36.5.157 114.231.190.24 114.230.58.132