城市(city): Jakarta
省份(region): Jakarta Raya
国家(country): Indonesia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 124.158.169.178 | attack | Unauthorized connection attempt from IP address 124.158.169.178 on Port 445(SMB) |
2020-08-19 22:31:25 |
| 124.158.169.178 | attackspambots | Port Scanner |
2020-07-05 20:02:37 |
| 124.158.169.178 | attackbotsspam | Port Scanner |
2020-06-04 12:52:59 |
| 124.158.169.226 | attack | 1582174649 - 02/20/2020 05:57:29 Host: 124.158.169.226/124.158.169.226 Port: 445 TCP Blocked |
2020-02-20 13:06:03 |
| 124.158.169.34 | attackbotsspam | Unauthorized connection attempt from IP address 124.158.169.34 on Port 445(SMB) |
2020-01-03 18:53:29 |
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '124.158.160.0 - 124.158.175.255'
% Abuse contact for '124.158.160.0 - 124.158.175.255' is 'abuse@iconpln.net.id'
inetnum: 124.158.160.0 - 124.158.175.255
netname: ICONPLN-ID
descr: PT Indonesia Comnets Plus
descr: Internet Service Provider
descr: JL PLN EHV Desa Gandul Cinere
descr: Depok 16512
country: ID
admin-c: CA48-AP
tech-c: CH274-AP
abuse-c: AI847-AP
status: ALLOCATED PORTABLE
remarks: Send Spam & Abuse report to: admin@iconpln.net.id
mnt-by: MNT-APJII-ID
mnt-lower: MAINT-ID-ICONPLN
mnt-routes: MAINT-ID-ICONPLN
mnt-irt: IRT-ICON-ID
last-modified: 2021-12-22T13:08:42Z
source: APNIC
irt: IRT-ICON-ID
address: PT Indonesia Comnets Plus
address: JL PLN EHV Gandul Cinere
address: Depok 16512
e-mail: admin@iconpln.net.id
abuse-mailbox: abuse@iconpln.net.id
admin-c: CA48-AP
tech-c: CH274-AP
auth: # Filtered
remarks: admin@iconpln.net.id was validated on 2025-11-17
remarks: abuse@iconpln.net.id is invalid
mnt-by: MAINT-ID-ICONPLN
last-modified: 2026-04-08T13:10:35Z
source: APNIC
role: ABUSE ICONID
country: ZZ
address: PT Indonesia Comnets Plus
address: JL PLN EHV Gandul Cinere
address: Depok 16512
phone: +000000000
e-mail: admin@iconpln.net.id
admin-c: CA48-AP
tech-c: CH274-AP
nic-hdl: AI847-AP
remarks: Generated from irt object IRT-ICON-ID
remarks: admin@iconpln.net.id was validated on 2025-11-17
remarks: abuse@iconpln.net.id is invalid
abuse-mailbox: abuse@iconpln.net.id
mnt-by: APNIC-ABUSE
last-modified: 2026-04-08T13:16:42Z
source: APNIC
person: Comnets Admin
address: PT INDONESIA COMNETS PLUS
address: Jl. EHV Gandul Limo - Depok
country: ID
phone: +62-21-753-2488
fax-no: +62-21-754-1259
e-mail: admin@iconpln.net.id
nic-hdl: CA48-AP
mnt-by: MAINT-ID-ICONPLN
last-modified: 2008-09-04T07:29:20Z
source: APNIC
person: Comnets Hostmaster
address: PT INDONESIA COMNETS PLUS
address: Jl. EHV Gandul Limo - Depok
country: ID
phone: +62-21-753-2488
fax-no: +62-21-754-1259
e-mail: hostmaster@iconpln.net.id
nic-hdl: CH274-AP
mnt-by: MAINT-ID-ICONPLN
last-modified: 2008-09-04T07:29:20Z
source: APNIC
% Information related to '124.158.160.0/20AS9341'
route: 124.158.160.0/20
descr: Route Object for ICON+
descr: PT Indonesia Comnets Plus
descr: Jl PLN EHV Gandul Cinere
descr: Depok 16512
origin: AS9341
mnt-by: MAINT-ID-ICONPLN
last-modified: 2018-09-19T03:39:31Z
source: APNIC
% Information related to '124.158.160.0 - 124.158.175.255'
inetnum: 124.158.160.0 - 124.158.175.255
netname: ICONPLN-ID
descr: PT Indonesia Comnets Plus
descr: Internet Service Provider
descr: JL PLN EHV Desa Gandul Cinere
descr: Depok 16512
country: ID
admin-c: CA48-AP
tech-c: CH274-AP
remarks: Send Spam & Abuse report to: admin@iconpln.net.id
mnt-by: MNT-APJII-ID
mnt-irt: IRT-ICON-ID
mnt-lower: MAINT-ID-ICONPLN
status: ALLOCATED PORTABLE
last-modified: 2018-08-23T18:08:37Z
mnt-routes: MAINT-ID-ICONPLN
source: IDNIC
irt: IRT-ICON-ID
address: PT Indonesia Comnets Plus
address: JL PLN EHV Gandul Cinere
address: Depok 16512
e-mail: admin@iconpln.net.id
abuse-mailbox: abuse@iconpln.net.id
admin-c: CA48-AP
tech-c: CH274-AP
auth: # Filtered
mnt-by: MAINT-ID-ICONPLN
last-modified: 2011-03-07T08:55:21Z
source: IDNIC
person: Comnets Admin
address: PT INDONESIA COMNETS PLUS
address: Jl. EHV Gandul Limo - Depok
country: ID
phone: +62-21-753-2488
fax-no: +62-21-754-1259
e-mail: admin@iconpln.net.id
nic-hdl: CA48-AP
mnt-by: MAINT-ID-ICONPLN
last-modified: 2008-09-04T07:29:20Z
source: IDNIC
person: Comnets Hostmaster
address: PT INDONESIA COMNETS PLUS
address: Jl. EHV Gandul Limo - Depok
country: ID
phone: +62-21-753-2488
fax-no: +62-21-754-1259
e-mail: hostmaster@iconpln.net.id
nic-hdl: CH274-AP
mnt-by: MAINT-ID-ICONPLN
last-modified: 2008-09-04T07:29:20Z
source: IDNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.158.169.208
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24287
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;124.158.169.208. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042700 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 28 00:59:40 CST 2026
;; MSG SIZE rcvd: 108
Host 208.169.158.124.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 208.169.158.124.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 188.226.185.116 | attackspam | Jun 30 05:37:51 localhost sshd\[30318\]: Invalid user casen from 188.226.185.116 Jun 30 05:37:51 localhost sshd\[30318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.185.116 Jun 30 05:37:53 localhost sshd\[30318\]: Failed password for invalid user casen from 188.226.185.116 port 34592 ssh2 Jun 30 05:40:21 localhost sshd\[30526\]: Invalid user redhat from 188.226.185.116 Jun 30 05:40:21 localhost sshd\[30526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.185.116 ... |
2019-06-30 16:21:45 |
| 62.234.139.150 | attack | Jun 30 06:46:03 lnxweb61 sshd[19717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.139.150 Jun 30 06:46:03 lnxweb61 sshd[19717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.139.150 |
2019-06-30 16:16:42 |
| 69.60.21.172 | attackbots | 2019-06-30T05:04:35.415294abusebot-8.cloudsearch.cf sshd\[390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.60.21.172 user=root |
2019-06-30 16:12:14 |
| 170.238.120.126 | attackbots | 445/tcp [2019-06-30]1pkt |
2019-06-30 15:53:46 |
| 139.199.228.133 | attack | 2019-06-30T04:11:18.345709abusebot-4.cloudsearch.cf sshd\[23381\]: Invalid user teeworlds from 139.199.228.133 port 62444 |
2019-06-30 16:35:39 |
| 54.38.82.14 | attackbots | Jun 30 04:19:48 vps200512 sshd\[31485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=root Jun 30 04:19:50 vps200512 sshd\[31485\]: Failed password for root from 54.38.82.14 port 55224 ssh2 Jun 30 04:19:51 vps200512 sshd\[31487\]: Invalid user admin from 54.38.82.14 Jun 30 04:19:51 vps200512 sshd\[31487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 Jun 30 04:19:53 vps200512 sshd\[31487\]: Failed password for invalid user admin from 54.38.82.14 port 35904 ssh2 |
2019-06-30 16:37:38 |
| 111.45.123.117 | attackspam | Jun 30 05:25:59 MK-Soft-VM3 sshd\[8277\]: Invalid user ftpuser from 111.45.123.117 port 49798 Jun 30 05:25:59 MK-Soft-VM3 sshd\[8277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.45.123.117 Jun 30 05:26:01 MK-Soft-VM3 sshd\[8277\]: Failed password for invalid user ftpuser from 111.45.123.117 port 49798 ssh2 ... |
2019-06-30 16:00:16 |
| 102.250.4.76 | attackspam | Hit on /xmlrpc.php |
2019-06-30 15:50:49 |
| 173.12.26.97 | attackbots | RDP Scan |
2019-06-30 15:55:09 |
| 191.53.194.61 | attackspambots | libpam_shield report: forced login attempt |
2019-06-30 16:09:47 |
| 110.45.145.178 | attack | $f2bV_matches |
2019-06-30 16:32:42 |
| 159.65.245.203 | attackspambots | $f2bV_matches |
2019-06-30 16:38:03 |
| 123.206.66.49 | attack | Jun 30 10:35:53 itv-usvr-02 sshd[17213]: Invalid user hadoop from 123.206.66.49 port 37200 Jun 30 10:35:53 itv-usvr-02 sshd[17213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.66.49 Jun 30 10:35:53 itv-usvr-02 sshd[17213]: Invalid user hadoop from 123.206.66.49 port 37200 Jun 30 10:35:55 itv-usvr-02 sshd[17213]: Failed password for invalid user hadoop from 123.206.66.49 port 37200 ssh2 Jun 30 10:40:31 itv-usvr-02 sshd[17308]: Invalid user myftp from 123.206.66.49 port 48420 |
2019-06-30 16:14:52 |
| 104.128.69.146 | attackspambots | Jun 30 06:31:59 cvbmail sshd\[16096\]: Invalid user jn from 104.128.69.146 Jun 30 06:31:59 cvbmail sshd\[16096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.128.69.146 Jun 30 06:32:01 cvbmail sshd\[16096\]: Failed password for invalid user jn from 104.128.69.146 port 56028 ssh2 |
2019-06-30 16:22:19 |
| 159.65.159.3 | attack | 2019-06-30T03:40:31.289221abusebot-4.cloudsearch.cf sshd\[23274\]: Invalid user redis from 159.65.159.3 port 32846 |
2019-06-30 16:15:23 |