Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kuala Lumpur

Region: Kuala Lumpur

Country: Malaysia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.116.46.0 - 103.116.46.255'

% Abuse contact for '103.116.46.0 - 103.116.46.255' is 'abuse@wawahost.com.my'

inetnum:        103.116.46.0 - 103.116.46.255
netname:        WAWAHOST-MY
descr:          World First Communication LTD
descr:          https://zerodesk.net/geofeed.csv
country:        MY
geoloc:         3.1495654 101.7062673
admin-c:        WTA1-AP
tech-c:         WTA1-AP
abuse-c:        AW1040-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-WAWAHOST-MY
mnt-irt:        IRT-WAWAHOST-MY
last-modified:  2025-08-12T11:05:02Z
source:         APNIC

irt:            IRT-WAWAHOST-MY
address:        NO 60, JALAN KRUBONG HEIGHT 11,
address:        TAMAN KRUBONG HEIGHT, 75250,
address:        MELAKA, MALAYSIA.
e-mail:         admin@wawahost.com.my
abuse-mailbox:  abuse@wawahost.com.my
admin-c:        WTA1-AP
tech-c:         WTA1-AP
auth:           # Filtered
remarks:        admin@wawahost.com.my was validated on 2025-12-30
remarks:        abuse@wawahost.com.my was validated on 2025-12-30
mnt-by:         MAINT-WAWAHOST-MY
last-modified:  2025-12-30T13:11:54Z
source:         APNIC

role:           ABUSE WAWAHOSTMY
country:        ZZ
address:        NO 60, JALAN KRUBONG HEIGHT 11,
address:        TAMAN KRUBONG HEIGHT, 75250,
address:        MELAKA, MALAYSIA.
phone:          +000000000
e-mail:         admin@wawahost.com.my
admin-c:        WTA1-AP
tech-c:         WTA1-AP
nic-hdl:        AW1040-AP
remarks:        Generated from irt object IRT-WAWAHOST-MY
remarks:        admin@wawahost.com.my was validated on 2025-12-30
remarks:        abuse@wawahost.com.my was validated on 2025-12-30
abuse-mailbox:  abuse@wawahost.com.my
mnt-by:         APNIC-ABUSE
last-modified:  2025-12-30T13:12:23Z
source:         APNIC

role:           WAWAHOST TECHNOLOGY Administrator
address:        NO 60, JALAN KRUBONG HEIGHT 11,
address:        TAMAN KRUBONG HEIGHT, 75250,
address:        MELAKA, MALAYSIA.
country:        MY
phone:          +60-105101111
e-mail:         abuse@wawahost.com.my
admin-c:        WTA1-AP
tech-c:         WTA1-AP
nic-hdl:        WTA1-AP
mnt-by:         MAINT-WAWAHOST-MY
last-modified:  2024-10-03T16:20:04Z
remarks:        -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
remarks:        This IP address is being used by WAWAHOST's Customer
remarks:        Please contact abuse@wawahost.com.my
remarks:        For any abuse activity originated from this IP address
remarks:        -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
source:         APNIC

% Information related to '103.116.46.0/24AS213607'

route:          103.116.46.0/24
origin:         AS213607
descr:          LIGHT CLOUD - ROUTE OBJECT
mnt-by:         MAINT-WAWAHOST-MY
last-modified:  2025-08-13T09:38:20Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.116.46.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40677
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.116.46.4.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040300 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 18:47:38 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 4.46.116.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 4.46.116.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.235.99.209 attackspam
Invalid user nano from 49.235.99.209 port 54916
2020-07-28 18:05:32
103.48.25.250 attack
20/7/27@23:51:01: FAIL: Alarm-Intrusion address from=103.48.25.250
...
2020-07-28 18:13:22
80.82.77.240 attackbotsspam
 TCP (SYN) 80.82.77.240:64344 -> port 5901, len 44
2020-07-28 18:40:01
73.38.202.71 attackspam
Port scan on 1 port(s): 22
2020-07-28 18:27:54
45.95.168.77 attackbots
2020-07-28 12:16:22 dovecot_login authenticator failed for slot0.banhats.com \(USER\) \[45.95.168.77\]: 535 Incorrect authentication data \(set_id=test@nopcommerce.it\)
2020-07-28 12:18:29 dovecot_login authenticator failed for slot0.banhats.com \(USER\) \[45.95.168.77\]: 535 Incorrect authentication data \(set_id=test@nophost.com\)
2020-07-28 12:18:29 dovecot_login authenticator failed for slot0.banhats.com \(USER\) \[45.95.168.77\]: 535 Incorrect authentication data \(set_id=test@opso.it\)
2020-07-28 12:23:02 dovecot_login authenticator failed for slot0.banhats.com \(USER\) \[45.95.168.77\]: 535 Incorrect authentication data \(set_id=test@nopcommerce.it\)
2020-07-28 12:25:10 dovecot_login authenticator failed for slot0.banhats.com \(USER\) \[45.95.168.77\]: 535 Incorrect authentication data \(set_id=test@opso.it\)
2020-07-28 12:25:10 dovecot_login authenticator failed for slot0.banhats.com \(USER\) \[45.95.168.77\]: 535 Incorrect authentication data \(set_id=test@nophost.com\)
2020-07-28 18:29:52
218.92.0.220 attack
Jul 28 12:15:42 vps sshd[1008265]: Failed password for root from 218.92.0.220 port 26662 ssh2
Jul 28 12:15:44 vps sshd[1008265]: Failed password for root from 218.92.0.220 port 26662 ssh2
Jul 28 12:15:46 vps sshd[1008891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.220  user=root
Jul 28 12:15:48 vps sshd[1008891]: Failed password for root from 218.92.0.220 port 48375 ssh2
Jul 28 12:15:50 vps sshd[1008891]: Failed password for root from 218.92.0.220 port 48375 ssh2
...
2020-07-28 18:25:15
121.123.148.211 attackbots
Invalid user flavio from 121.123.148.211 port 37416
2020-07-28 18:12:37
182.69.171.72 attackbots
Jul 28 09:59:13 PorscheCustomer sshd[25990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.69.171.72
Jul 28 09:59:16 PorscheCustomer sshd[25990]: Failed password for invalid user prerit from 182.69.171.72 port 48606 ssh2
Jul 28 10:03:33 PorscheCustomer sshd[26081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.69.171.72
...
2020-07-28 18:19:47
177.0.23.37 attackspambots
Jul 28 11:41:22 marvibiene sshd[14562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.0.23.37 
Jul 28 11:41:25 marvibiene sshd[14562]: Failed password for invalid user edl from 177.0.23.37 port 35442 ssh2
2020-07-28 18:36:50
45.181.228.1 attackspambots
Invalid user flume from 45.181.228.1 port 30452
2020-07-28 18:21:20
197.248.141.242 attackbots
Jul 28 12:14:58 zooi sshd[9754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.141.242
Jul 28 12:15:00 zooi sshd[9754]: Failed password for invalid user rizqi from 197.248.141.242 port 38004 ssh2
...
2020-07-28 18:36:29
117.211.126.230 attack
Invalid user new from 117.211.126.230 port 35224
2020-07-28 18:43:30
123.140.114.196 attackbots
Invalid user lihuanhuan from 123.140.114.196 port 39840
2020-07-28 18:34:59
165.22.43.225 attack
Invalid user sdt from 165.22.43.225 port 42836
2020-07-28 18:26:45
43.255.71.195 attackspam
SSH Brute-Force. Ports scanning.
2020-07-28 18:23:34

Recently Reported IPs

8.163.63.8 66.132.172.213 180.153.236.60 180.153.236.212
180.153.236.201 2606:4700:10::6816:2300 134.35.157.130 2606:4700:10::6814:6009
178.200.217.26 209.38.101.158 255.96.99.39 2606:4700:10::6816:3929
2606:4700:10::6814:7821 2606:4700:10::6816:1312 2606:4700:10::ac43:2087 2606:4700:10::6816:1355
134.35.157.157 2606:4700:10::6814:9311 2606:4700:10::6814:4811 2606:4700:10::6814:9804