Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kuala Lumpur

Region: Kuala Lumpur

Country: Malaysia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.82.228.0 - 103.82.228.255'

% Abuse contact for '103.82.228.0 - 103.82.228.255' is 'net.abuse@rocksoft.net'

inetnum:        103.82.228.0 - 103.82.228.255
netname:        ROCKSOFTSDNBHD-MY
descr:          WISDOM CLOUD INTERNET TECHNOLOGY PTE. LTD
country:        SG
admin-c:        RSBA1-AP
tech-c:         RSBA1-AP
abuse-c:        AR983-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-ROCKSOFTSDNBHD-MY
mnt-irt:        IRT-ROCKSOFTSDNBHD-MY
last-modified:  2026-02-02T06:45:31Z
source:         APNIC

irt:            IRT-ROCKSOFTSDNBHD-MY
address:        LG-01, SME Technopreneur Centre 3 ,, Block 3740 Persiaran APEC Cyber 8 ,, Cyberjaya Selangor 63500
e-mail:         net.abuse@rocksoft.net
abuse-mailbox:  net.abuse@rocksoft.net
admin-c:        RSBA1-AP
tech-c:         RSBA1-AP
auth:           # Filtered
remarks:        net.abuse@rocksoft.net was validated on 2025-10-01
mnt-by:         MAINT-ROCKSOFTSDNBHD-MY
last-modified:  2025-11-18T00:31:21Z
source:         APNIC

role:           ABUSE ROCKSOFTSDNBHDMY
country:        ZZ
address:        LG-01, SME Technopreneur Centre 3 ,, Block 3740 Persiaran APEC Cyber 8 ,, Cyberjaya Selangor 63500
phone:          +000000000
e-mail:         net.abuse@rocksoft.net
admin-c:        RSBA1-AP
tech-c:         RSBA1-AP
nic-hdl:        AR983-AP
remarks:        Generated from irt object IRT-ROCKSOFTSDNBHD-MY
remarks:        net.abuse@rocksoft.net was validated on 2025-10-01
abuse-mailbox:  net.abuse@rocksoft.net
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-01T09:18:50Z
source:         APNIC

role:           RockSoft Sdn Bhd administrator
address:        LG-01, SME Technopreneur Centre 3 ,, Block 3740 Persiaran APEC Cyber 8 ,, Cyberjaya Selangor 63500
country:        MY
phone:          +603-8319-3615
fax-no:         +603-8319-3615
e-mail:         net.abuse@rocksoft.net
admin-c:        RSBA1-AP
tech-c:         RSBA1-AP
nic-hdl:        RSBA1-AP
mnt-by:         MAINT-ROCKSOFTSDNBHD-MY
last-modified:  2017-01-04T05:32:36Z
source:         APNIC

% Information related to '103.82.228.0/24AS197537'

route:          103.82.228.0/24
origin:         AS197537
descr:          WISDOM CLOUD INTERNET TECHNOLOGY PTE. LTD
mnt-by:         MAINT-ROCKSOFTSDNBHD-MY
last-modified:  2026-02-13T07:13:35Z
source:         APNIC

% Information related to '103.82.228.0/24AS202736'

route:          103.82.228.0/24
origin:         AS202736
descr:          WISDOM CLOUD INTERNET TECHNOLOGY PTE. LTD
mnt-by:         MAINT-ROCKSOFTSDNBHD-MY
last-modified:  2026-02-13T07:12:57Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.82.228.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23922
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.82.228.55.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042102 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 22 12:12:47 CST 2026
;; MSG SIZE  rcvd: 106
Host info
b'Host 55.228.82.103.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 103.82.228.55.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
182.52.134.179 attackbots
Dec  5 08:38:19 sauna sshd[89489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.52.134.179
Dec  5 08:38:21 sauna sshd[89489]: Failed password for invalid user server from 182.52.134.179 port 40824 ssh2
...
2019-12-05 14:40:40
190.144.45.108 attack
Dec  5 06:19:06 localhost sshd\[6018\]: Invalid user froberg from 190.144.45.108 port 23694
Dec  5 06:19:06 localhost sshd\[6018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.45.108
Dec  5 06:19:08 localhost sshd\[6018\]: Failed password for invalid user froberg from 190.144.45.108 port 23694 ssh2
2019-12-05 14:29:51
81.101.253.42 attackspam
Dec  5 11:39:16 gw1 sshd[29994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.101.253.42
Dec  5 11:39:19 gw1 sshd[29994]: Failed password for invalid user wwwrun from 81.101.253.42 port 52212 ssh2
...
2019-12-05 14:43:34
185.4.132.220 attackbotsspam
12/05/2019-02:08:03.102271 185.4.132.220 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-05 15:17:24
40.124.4.131 attack
Dec  5 07:32:11 localhost sshd\[15253\]: Invalid user kodi from 40.124.4.131 port 50908
Dec  5 07:32:11 localhost sshd\[15253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.124.4.131
Dec  5 07:32:13 localhost sshd\[15253\]: Failed password for invalid user kodi from 40.124.4.131 port 50908 ssh2
2019-12-05 15:11:21
221.2.158.54 attackbots
Dec  5 06:47:33 hcbbdb sshd\[10319\]: Invalid user eleonora from 221.2.158.54
Dec  5 06:47:33 hcbbdb sshd\[10319\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.2.158.54
Dec  5 06:47:35 hcbbdb sshd\[10319\]: Failed password for invalid user eleonora from 221.2.158.54 port 44389 ssh2
Dec  5 06:55:26 hcbbdb sshd\[11281\]: Invalid user dovecot from 221.2.158.54
Dec  5 06:55:26 hcbbdb sshd\[11281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.2.158.54
2019-12-05 15:02:33
138.197.73.215 attackbotsspam
Dec  5 08:32:43 sauna sshd[89382]: Failed password for root from 138.197.73.215 port 38838 ssh2
...
2019-12-05 14:54:27
148.70.201.162 attackspam
Dec  4 20:08:45 web1 sshd\[10782\]: Invalid user yoyo from 148.70.201.162
Dec  4 20:08:45 web1 sshd\[10782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.201.162
Dec  4 20:08:47 web1 sshd\[10782\]: Failed password for invalid user yoyo from 148.70.201.162 port 47224 ssh2
Dec  4 20:17:16 web1 sshd\[11727\]: Invalid user keiko from 148.70.201.162
Dec  4 20:17:16 web1 sshd\[11727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.201.162
2019-12-05 14:29:18
92.81.12.14 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-05 15:08:30
106.12.176.3 attackbots
Dec  5 11:39:23 gw1 sshd[29998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.176.3
Dec  5 11:39:25 gw1 sshd[29998]: Failed password for invalid user varley from 106.12.176.3 port 58162 ssh2
...
2019-12-05 14:42:29
196.34.32.164 attack
Dec  5 07:48:25 legacy sshd[1293]: Failed password for root from 196.34.32.164 port 53838 ssh2
Dec  5 07:55:28 legacy sshd[1536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.34.32.164
Dec  5 07:55:30 legacy sshd[1536]: Failed password for invalid user orangedev from 196.34.32.164 port 37144 ssh2
...
2019-12-05 15:16:42
222.186.173.183 attackspam
2019-12-05T08:13:30.668509vps751288.ovh.net sshd\[4777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
2019-12-05T08:13:32.553260vps751288.ovh.net sshd\[4777\]: Failed password for root from 222.186.173.183 port 31782 ssh2
2019-12-05T08:13:35.740190vps751288.ovh.net sshd\[4777\]: Failed password for root from 222.186.173.183 port 31782 ssh2
2019-12-05T08:13:38.670718vps751288.ovh.net sshd\[4777\]: Failed password for root from 222.186.173.183 port 31782 ssh2
2019-12-05T08:13:42.342009vps751288.ovh.net sshd\[4777\]: Failed password for root from 222.186.173.183 port 31782 ssh2
2019-12-05 15:14:00
14.29.207.59 attackbotsspam
Dec  5 09:32:31 hosting sshd[19714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.207.59  user=backup
Dec  5 09:32:33 hosting sshd[19714]: Failed password for backup from 14.29.207.59 port 42910 ssh2
...
2019-12-05 15:12:33
51.38.238.22 attackspam
Dec  5 07:33:09 vmanager6029 sshd\[7511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.238.22  user=teamspeak3
Dec  5 07:33:11 vmanager6029 sshd\[7511\]: Failed password for teamspeak3 from 51.38.238.22 port 38138 ssh2
Dec  5 07:38:44 vmanager6029 sshd\[7633\]: Invalid user vesanto from 51.38.238.22 port 47846
Dec  5 07:38:44 vmanager6029 sshd\[7633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.238.22
2019-12-05 14:59:39
93.208.34.159 attackspambots
Dec  5 07:49:26 mail postfix/smtpd[12325]: warning: p5DD0229F.dip0.t-ipconnect.de[93.208.34.159]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  5 07:51:50 mail postfix/smtpd[14027]: warning: p5DD0229F.dip0.t-ipconnect.de[93.208.34.159]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  5 07:52:31 mail postfix/smtpd[13872]: warning: p5DD0229F.dip0.t-ipconnect.de[93.208.34.159]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-12-05 14:57:34

Recently Reported IPs

2606:4700:10::6816:2511 240e:454:412c:1355:2c44:c2ff:fe1d:4e6f 66.132.195.92 178.128.114.205
45.207.221.17 111.33.154.219 103.152.175.227 2606:4700:10::ac43:2566
2606:4700:10::ac43:1684 2606:4700:10::ac43:181e 2606:4700:10::ac43:1900 2606:4700:10::6814:7321
2606:4700:10::6814:9486 2606:4700:10::6816:2190 2606:4700:10::6814:8199 2606:4700:10::6816:2131
2606:4700:10::ac43:1141 2606:4700:10::6816:1084 2606:4700:10::6816:849 14.207.194.153