City: Kuala Lumpur
Region: Kuala Lumpur
Country: Malaysia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 192.228.128.0 - 192.228.255.255
CIDR: 192.228.128.0/17
NetName: APNIC-ERX-192-228-128-0
NetHandle: NET-192-228-128-0-1
Parent: NET192 (NET-192-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2005-01-31
Updated: 2009-10-08
Comment: This IP address range is not registered in the ARIN database.
Comment: This range was transferred to the APNIC Whois Database as
Comment: part of the ERX (Early Registration Transfer) project.
Comment: For details, refer to the APNIC Whois Database via
Comment: WHOIS.APNIC.NET or http://wq.apnic.net/apnic-bin/whois.pl
Comment:
Comment: ** IMPORTANT NOTE: APNIC is the Regional Internet Registry
Comment: for the Asia Pacific region. APNIC does not operate networks
Comment: using this IP address range and is not able to investigate
Comment: spam or abuse reports relating to these addresses. For more
Comment: help, refer to http://www.apnic.net/apnic-info/whois_search2/abuse-and-spamming
Ref: https://rdap.arin.net/registry/ip/192.228.128.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: http://wq.apnic.net/whois-search/static/search.html
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '192.228.128.0 - 192.228.255.255'
% Abuse contact for '192.228.128.0 - 192.228.255.255' is 'abuse@time.com.my'
inetnum: 192.228.128.0 - 192.228.255.255
netname: TTDOTCOM-MY
descr: TT DOTCOM SDN BHD
descr: LOT 14, JALAN U1/26
descr: SEKSYEN U1
descr: HICOM GLENMARIE INDUSTRIAL PARK
descr: SHAH ALAM, SELANGOR 40150
country: MY
org: ORG-TDSB1-AP
admin-c: TDSB3-AP
tech-c: TDSB3-AP
abuse-c: AT1186-AP
status: ALLOCATED PORTABLE
mnt-by: APNIC-HM
mnt-lower: MAINT-TTDOTCOM-MY
mnt-routes: MAINT-TTDOTCOM-MY
mnt-irt: IRT-TTDOTCOM-MY
last-modified: 2020-10-20T00:58:48Z
source: APNIC
irt: IRT-TTDOTCOM-MY
address: LOT 14, JALAN U1/26, SEKSYEN U1, HICOM GLENMARIE INDUSTRIAL PARK, SHAH ALAM SELANGOR 40150
e-mail: abuse@time.com.my
abuse-mailbox: abuse@time.com.my
admin-c: TDSB3-AP
tech-c: TDSB3-AP
auth: # Filtered
remarks: abuse@time.com.my was validated on 2026-01-02
mnt-by: MAINT-TTDOTCOM-MY
last-modified: 2026-03-27T06:59:39Z
source: APNIC
organisation: ORG-TDSB1-AP
org-name: TT DOTCOM SDN BHD
org-type: LIR
country: MY
address: LOT 14, JALAN U1/26
address: SEKSYEN U1
address: HICOM GLENMARIE INDUSTRIAL PARK
phone: +60-3-5039-3000
fax-no: +60-3-5032-6353
e-mail: hostmaster@time.com.my
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:16:47Z
source: APNIC
role: ABUSE TTDOTCOMMY
country: ZZ
address: LOT 14, JALAN U1/26, SEKSYEN U1, HICOM GLENMARIE INDUSTRIAL PARK, SHAH ALAM SELANGOR 40150
phone: +000000000
e-mail: abuse@time.com.my
admin-c: TDSB3-AP
tech-c: TDSB3-AP
nic-hdl: AT1186-AP
remarks: Generated from irt object IRT-TTDOTCOM-MY
remarks: abuse@time.com.my was validated on 2026-01-02
abuse-mailbox: abuse@time.com.my
mnt-by: APNIC-ABUSE
last-modified: 2026-01-02T03:02:09Z
source: APNIC
role: TT DOTCOM SDN BHD administrator
address: LOT 14, JALAN U1/26, SEKSYEN U1, HICOM GLENMARIE INDUSTRIAL PARK, SHAH ALAM SELANGOR 40150
country: MY
phone: +60-3-5032-6000
fax-no: +60-3-5032-6000
e-mail: abuse@time.com.my
admin-c: TDSB3-AP
tech-c: TDSB3-AP
nic-hdl: TDSB3-AP
mnt-by: MAINT-TTDOTCOM-MY
last-modified: 2016-01-25T03:32:49Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.228.132.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61590
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;192.228.132.91. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042002 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 21 13:27:01 CST 2026
;; MSG SIZE rcvd: 107
91.132.228.192.in-addr.arpa domain name pointer broadband.time.net.my.
b'91.132.228.192.in-addr.arpa name = broadband.time.net.my.
Authoritative answers can be found from:
'
| IP | Type | Details | Datetime |
|---|---|---|---|
| 118.70.28.130 | attackbotsspam | Unauthorized connection attempt from IP address 118.70.28.130 on Port 445(SMB) |
2019-09-17 21:10:30 |
| 207.180.232.174 | attackspam | wget call in url |
2019-09-17 21:23:52 |
| 54.36.150.95 | attack | Automatic report - Banned IP Access |
2019-09-17 21:16:09 |
| 49.88.112.78 | attackbotsspam | Sep 17 15:54:10 minden010 sshd[1785]: Failed password for root from 49.88.112.78 port 61233 ssh2 Sep 17 15:59:18 minden010 sshd[3494]: Failed password for root from 49.88.112.78 port 35890 ssh2 Sep 17 15:59:21 minden010 sshd[3494]: Failed password for root from 49.88.112.78 port 35890 ssh2 ... |
2019-09-17 22:19:27 |
| 54.39.44.47 | attackbotsspam | Sep 17 03:30:46 auw2 sshd\[14444\]: Invalid user ubuntu from 54.39.44.47 Sep 17 03:30:46 auw2 sshd\[14444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=biznessexperts.net Sep 17 03:30:47 auw2 sshd\[14444\]: Failed password for invalid user ubuntu from 54.39.44.47 port 51892 ssh2 Sep 17 03:35:26 auw2 sshd\[14786\]: Invalid user login from 54.39.44.47 Sep 17 03:35:26 auw2 sshd\[14786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=biznessexperts.net |
2019-09-17 22:16:13 |
| 45.55.47.149 | attack | Sep 17 21:17:55 webhost01 sshd[28151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.47.149 Sep 17 21:17:58 webhost01 sshd[28151]: Failed password for invalid user colord from 45.55.47.149 port 36490 ssh2 ... |
2019-09-17 22:21:37 |
| 187.226.12.21 | attackspam | Brute forcing RDP port 3389 |
2019-09-17 21:59:30 |
| 138.68.4.8 | attackbotsspam | Sep 17 03:31:31 hpm sshd\[3859\]: Invalid user gw from 138.68.4.8 Sep 17 03:31:31 hpm sshd\[3859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.8 Sep 17 03:31:32 hpm sshd\[3859\]: Failed password for invalid user gw from 138.68.4.8 port 33328 ssh2 Sep 17 03:35:50 hpm sshd\[4232\]: Invalid user theodore from 138.68.4.8 Sep 17 03:35:50 hpm sshd\[4232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.8 |
2019-09-17 21:49:00 |
| 159.65.1.144 | attackspambots | Sep 17 15:35:36 lnxmysql61 sshd[6037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.1.144 |
2019-09-17 22:04:09 |
| 82.102.173.72 | attackbotsspam | 09/17/2019-09:35:11.226812 82.102.173.72 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 86 |
2019-09-17 22:33:07 |
| 181.123.9.3 | attack | Sep 17 03:47:16 lcprod sshd\[1432\]: Invalid user qhsupport from 181.123.9.3 Sep 17 03:47:16 lcprod sshd\[1432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.123.9.3 Sep 17 03:47:18 lcprod sshd\[1432\]: Failed password for invalid user qhsupport from 181.123.9.3 port 52760 ssh2 Sep 17 03:53:12 lcprod sshd\[1971\]: Invalid user centos from 181.123.9.3 Sep 17 03:53:12 lcprod sshd\[1971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.123.9.3 |
2019-09-17 21:55:02 |
| 14.186.253.253 | attack | 3389BruteforceFW21 |
2019-09-17 21:50:51 |
| 211.186.130.224 | attack | IP reached maximum auth failures for a one day block |
2019-09-17 21:58:33 |
| 178.128.100.244 | attackspam | Sep 17 15:31:06 lnxweb62 sshd[22603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.100.244 Sep 17 15:31:08 lnxweb62 sshd[22603]: Failed password for invalid user test from 178.128.100.244 port 47796 ssh2 Sep 17 15:35:58 lnxweb62 sshd[25315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.100.244 |
2019-09-17 21:40:11 |
| 111.231.204.127 | attackbots | Sep 17 10:12:37 saschabauer sshd[13800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.204.127 Sep 17 10:12:40 saschabauer sshd[13800]: Failed password for invalid user allan from 111.231.204.127 port 40714 ssh2 |
2019-09-17 21:11:57 |