Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kuala Lumpur

Region: Kuala Lumpur

Country: Malaysia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       192.228.128.0 - 192.228.255.255
CIDR:           192.228.128.0/17
NetName:        APNIC-ERX-192-228-128-0
NetHandle:      NET-192-228-128-0-1
Parent:         NET192 (NET-192-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2005-01-31
Updated:        2009-10-08
Comment:        This IP address range is not registered in the ARIN database.
Comment:        This range was transferred to the APNIC Whois Database as
Comment:        part of the ERX (Early Registration Transfer) project.
Comment:        For details, refer to the APNIC Whois Database via
Comment:        WHOIS.APNIC.NET or http://wq.apnic.net/apnic-bin/whois.pl
Comment:        
Comment:        ** IMPORTANT NOTE: APNIC is the Regional Internet Registry
Comment:        for the Asia Pacific region.  APNIC does not operate networks
Comment:        using this IP address range and is not able to investigate
Comment:        spam or abuse reports relating to these addresses.  For more
Comment:        help, refer to http://www.apnic.net/apnic-info/whois_search2/abuse-and-spamming
Ref:            https://rdap.arin.net/registry/ip/192.228.128.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '192.228.128.0 - 192.228.255.255'

% Abuse contact for '192.228.128.0 - 192.228.255.255' is 'abuse@time.com.my'

inetnum:        192.228.128.0 - 192.228.255.255
netname:        TTDOTCOM-MY
descr:          TT DOTCOM SDN BHD
descr:          LOT 14, JALAN U1/26
descr:          SEKSYEN U1
descr:          HICOM GLENMARIE INDUSTRIAL PARK
descr:          SHAH ALAM, SELANGOR 40150
country:        MY
org:            ORG-TDSB1-AP
admin-c:        TDSB3-AP
tech-c:         TDSB3-AP
abuse-c:        AT1186-AP
status:         ALLOCATED PORTABLE
mnt-by:         APNIC-HM
mnt-lower:      MAINT-TTDOTCOM-MY
mnt-routes:     MAINT-TTDOTCOM-MY
mnt-irt:        IRT-TTDOTCOM-MY
last-modified:  2020-10-20T00:58:48Z
source:         APNIC

irt:            IRT-TTDOTCOM-MY
address:        LOT 14, JALAN U1/26, SEKSYEN U1, HICOM GLENMARIE INDUSTRIAL PARK, SHAH ALAM SELANGOR 40150
e-mail:         abuse@time.com.my
abuse-mailbox:  abuse@time.com.my
admin-c:        TDSB3-AP
tech-c:         TDSB3-AP
auth:           # Filtered
remarks:        abuse@time.com.my was validated on 2026-01-02
mnt-by:         MAINT-TTDOTCOM-MY
last-modified:  2026-03-27T06:59:39Z
source:         APNIC

organisation:   ORG-TDSB1-AP
org-name:       TT DOTCOM SDN BHD
org-type:       LIR
country:        MY
address:        LOT 14, JALAN U1/26
address:        SEKSYEN U1
address:        HICOM GLENMARIE INDUSTRIAL PARK
phone:          +60-3-5039-3000
fax-no:         +60-3-5032-6353
e-mail:         hostmaster@time.com.my
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:16:47Z
source:         APNIC

role:           ABUSE TTDOTCOMMY
country:        ZZ
address:        LOT 14, JALAN U1/26, SEKSYEN U1, HICOM GLENMARIE INDUSTRIAL PARK, SHAH ALAM SELANGOR 40150
phone:          +000000000
e-mail:         abuse@time.com.my
admin-c:        TDSB3-AP
tech-c:         TDSB3-AP
nic-hdl:        AT1186-AP
remarks:        Generated from irt object IRT-TTDOTCOM-MY
remarks:        abuse@time.com.my was validated on 2026-01-02
abuse-mailbox:  abuse@time.com.my
mnt-by:         APNIC-ABUSE
last-modified:  2026-01-02T03:02:09Z
source:         APNIC

role:           TT DOTCOM SDN BHD administrator
address:        LOT 14, JALAN U1/26, SEKSYEN U1, HICOM  GLENMARIE INDUSTRIAL PARK, SHAH ALAM SELANGOR 40150
country:        MY
phone:          +60-3-5032-6000
fax-no:         +60-3-5032-6000
e-mail:         abuse@time.com.my
admin-c:        TDSB3-AP
tech-c:         TDSB3-AP
nic-hdl:        TDSB3-AP
mnt-by:         MAINT-TTDOTCOM-MY
last-modified:  2016-01-25T03:32:49Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.228.132.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61590
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;192.228.132.91.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042002 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 21 13:27:01 CST 2026
;; MSG SIZE  rcvd: 107
Host info
91.132.228.192.in-addr.arpa domain name pointer broadband.time.net.my.
Nslookup info:
b'91.132.228.192.in-addr.arpa	name = broadband.time.net.my.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
118.70.28.130 attackbotsspam
Unauthorized connection attempt from IP address 118.70.28.130 on Port 445(SMB)
2019-09-17 21:10:30
207.180.232.174 attackspam
wget call in url
2019-09-17 21:23:52
54.36.150.95 attack
Automatic report - Banned IP Access
2019-09-17 21:16:09
49.88.112.78 attackbotsspam
Sep 17 15:54:10 minden010 sshd[1785]: Failed password for root from 49.88.112.78 port 61233 ssh2
Sep 17 15:59:18 minden010 sshd[3494]: Failed password for root from 49.88.112.78 port 35890 ssh2
Sep 17 15:59:21 minden010 sshd[3494]: Failed password for root from 49.88.112.78 port 35890 ssh2
...
2019-09-17 22:19:27
54.39.44.47 attackbotsspam
Sep 17 03:30:46 auw2 sshd\[14444\]: Invalid user ubuntu from 54.39.44.47
Sep 17 03:30:46 auw2 sshd\[14444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=biznessexperts.net
Sep 17 03:30:47 auw2 sshd\[14444\]: Failed password for invalid user ubuntu from 54.39.44.47 port 51892 ssh2
Sep 17 03:35:26 auw2 sshd\[14786\]: Invalid user login from 54.39.44.47
Sep 17 03:35:26 auw2 sshd\[14786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=biznessexperts.net
2019-09-17 22:16:13
45.55.47.149 attack
Sep 17 21:17:55 webhost01 sshd[28151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.47.149
Sep 17 21:17:58 webhost01 sshd[28151]: Failed password for invalid user colord from 45.55.47.149 port 36490 ssh2
...
2019-09-17 22:21:37
187.226.12.21 attackspam
Brute forcing RDP port 3389
2019-09-17 21:59:30
138.68.4.8 attackbotsspam
Sep 17 03:31:31 hpm sshd\[3859\]: Invalid user gw from 138.68.4.8
Sep 17 03:31:31 hpm sshd\[3859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.8
Sep 17 03:31:32 hpm sshd\[3859\]: Failed password for invalid user gw from 138.68.4.8 port 33328 ssh2
Sep 17 03:35:50 hpm sshd\[4232\]: Invalid user theodore from 138.68.4.8
Sep 17 03:35:50 hpm sshd\[4232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.8
2019-09-17 21:49:00
159.65.1.144 attackspambots
Sep 17 15:35:36 lnxmysql61 sshd[6037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.1.144
2019-09-17 22:04:09
82.102.173.72 attackbotsspam
09/17/2019-09:35:11.226812 82.102.173.72 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 86
2019-09-17 22:33:07
181.123.9.3 attack
Sep 17 03:47:16 lcprod sshd\[1432\]: Invalid user qhsupport from 181.123.9.3
Sep 17 03:47:16 lcprod sshd\[1432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.123.9.3
Sep 17 03:47:18 lcprod sshd\[1432\]: Failed password for invalid user qhsupport from 181.123.9.3 port 52760 ssh2
Sep 17 03:53:12 lcprod sshd\[1971\]: Invalid user centos from 181.123.9.3
Sep 17 03:53:12 lcprod sshd\[1971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.123.9.3
2019-09-17 21:55:02
14.186.253.253 attack
3389BruteforceFW21
2019-09-17 21:50:51
211.186.130.224 attack
IP reached maximum auth failures for a one day block
2019-09-17 21:58:33
178.128.100.244 attackspam
Sep 17 15:31:06 lnxweb62 sshd[22603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.100.244
Sep 17 15:31:08 lnxweb62 sshd[22603]: Failed password for invalid user test from 178.128.100.244 port 47796 ssh2
Sep 17 15:35:58 lnxweb62 sshd[25315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.100.244
2019-09-17 21:40:11
111.231.204.127 attackbots
Sep 17 10:12:37 saschabauer sshd[13800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.204.127
Sep 17 10:12:40 saschabauer sshd[13800]: Failed password for invalid user allan from 111.231.204.127 port 40714 ssh2
2019-09-17 21:11:57

Recently Reported IPs

197.234.31.61 170.64.134.120 177.43.228.50 162.131.32.42
143.58.223.1 38.60.254.174 220.167.233.234 182.119.228.76
110.78.154.184 2606:4700:10::6814:5105 2606:4700:10::6816:2114 110.78.150.124
2606:4700:10::6814:5513 2606:4700:10::6814:9016 164.155.74.88 2606:4700:10::6814:8095
2606:4700:10::6814:6906 107.175.229.91 135.82.153.98 125.37.162.218