Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bayan Lepas

Region: Pinang

Country: Malaysia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '202.170.48.0 - 202.170.63.255'

% Abuse contact for '202.170.48.0 - 202.170.63.255' is 'irham@usm.my'

inetnum:        202.170.48.0 - 202.170.63.255
netname:        USMNET
descr:          Universiti Sains Malaysia, Penang, Malaysia
country:        MY
org:            ORG-USM1-AP
admin-c:        AY223-AP
tech-c:         AY223-AP
abuse-c:        AU87-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-MY-UNISAINS
mnt-routes:     MAINT-MY-UNISAINS
mnt-irt:        IRT-UNISAINS-MY
last-modified:  2020-10-20T00:57:31Z
source:         APNIC

irt:            IRT-UNISAINS-MY
address:        Universiti Sains Malaysia,
address:        Center for Knowledge, Communication and Technology,
address:        11800 Pulau Pinang, MALAYSIA
e-mail:         irham@usm.my
abuse-mailbox:  irham@usm.my
admin-c:        AY223-AP
tech-c:         AY223-AP
auth:           # Filtered
remarks:        irham@usm.my was validated on 2025-12-15
mnt-by:         MAINT-MY-UNISAINS
last-modified:  2025-12-15T00:57:33Z
source:         APNIC

organisation:   ORG-USM1-AP
org-name:       Universiti Sains Malaysia
org-type:       LIR
country:        MY
address:        Center for Knowledge, Communication and Technology
address:        Universiti Sains Malaysia
phone:          +6046533782
fax-no:         +6046569117
e-mail:         ppkt@usm.my
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:15:06Z
source:         APNIC

role:           ABUSE UNISAINSMY
country:        ZZ
address:        Universiti Sains Malaysia,
address:        Center for Knowledge, Communication and Technology,
address:        11800 Pulau Pinang, MALAYSIA
phone:          +000000000
e-mail:         irham@usm.my
admin-c:        AY223-AP
tech-c:         AY223-AP
nic-hdl:        AU87-AP
remarks:        Generated from irt object IRT-UNISAINS-MY
remarks:        irham@usm.my was validated on 2025-12-15
abuse-mailbox:  irham@usm.my
mnt-by:         APNIC-ABUSE
last-modified:  2025-12-15T00:57:51Z
source:         APNIC

person:         Ahmad Fadhlul Irham Yusoff
nic-hdl:        AY223-AP
e-mail:         irham@usm.my
address:        Universiti Sains Malaysia,
address:        Center for Knowledge, Communication and Technology,
address:        11800 Pulau Pinang, MALAYSIA
phone:          +604-653-3782
fax-no:         +604-653-9177
country:        MY
mnt-by:         MAINT-MY-UNISAINS
last-modified:  2008-09-04T07:29:24Z
source:         APNIC

% Information related to '202.170.48.0/24AS24090'

route:          202.170.48.0/24
origin:         AS24090
descr:          Universiti Sains Malaysia
                Center for Knowledge, Communication and Technology
                Universiti Sains Malaysia
mnt-by:         MAINT-MY-UNISAINS
last-modified:  2020-09-23T07:35:33Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.170.48.250
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56547
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.170.48.250.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020502 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 06 01:58:01 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 250.48.170.202.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 250.48.170.202.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
2.92.159.63 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-06 08:33:56
67.143.192.177 attackbots
Attempted connection to port 445.
2020-09-06 08:30:54
186.167.64.162 attackspam
Attempted connection to port 445.
2020-09-06 08:38:39
190.255.222.73 attackspam
Sep  5 16:58:20 pixelmemory sshd[3944700]: Failed password for root from 190.255.222.73 port 52740 ssh2
Sep  5 17:01:04 pixelmemory sshd[3945004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.255.222.73  user=root
Sep  5 17:01:06 pixelmemory sshd[3945004]: Failed password for root from 190.255.222.73 port 38688 ssh2
Sep  5 17:03:49 pixelmemory sshd[3945311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.255.222.73  user=root
Sep  5 17:03:51 pixelmemory sshd[3945311]: Failed password for root from 190.255.222.73 port 52872 ssh2
...
2020-09-06 08:49:27
78.85.5.247 attackbotsspam
Unauthorized connection attempt from IP address 78.85.5.247 on Port 445(SMB)
2020-09-06 09:02:37
134.17.94.214 attackbots
2020-09-05T18:36:53.6528811495-001 sshd[3694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.94.214  user=root
2020-09-05T18:36:55.9206541495-001 sshd[3694]: Failed password for root from 134.17.94.214 port 6093 ssh2
2020-09-05T18:40:38.5061461495-001 sshd[3897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.94.214  user=root
2020-09-05T18:40:40.3275101495-001 sshd[3897]: Failed password for root from 134.17.94.214 port 6094 ssh2
2020-09-05T18:44:29.3727101495-001 sshd[4070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.94.214  user=root
2020-09-05T18:44:31.9063911495-001 sshd[4070]: Failed password for root from 134.17.94.214 port 6095 ssh2
...
2020-09-06 08:32:55
88.251.52.216 attackspam
Attempted connection to port 445.
2020-09-06 09:07:16
116.22.197.224 attackspambots
$f2bV_matches
2020-09-06 08:44:19
127.0.0.1 attack
Test Connectivity
2020-09-06 09:04:50
45.155.205.164 attackspambots
Port Scan: TCP/53039
2020-09-06 08:32:26
85.209.0.253 attack
Sep  6 02:06:39 theomazars sshd[21543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.0.253  user=root
Sep  6 02:06:41 theomazars sshd[21543]: Failed password for root from 85.209.0.253 port 1558 ssh2
2020-09-06 08:42:17
218.102.106.61 attack
Honeypot attack, port: 5555, PTR: pcd574061.netvigator.com.
2020-09-06 08:46:48
103.194.242.254 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-09-06 08:29:04
194.99.105.206 attackbotsspam
Attempt to access VoIP server
2020-09-06 08:36:18
45.155.205.151 attackbotsspam
Port Scan: TCP/16487
2020-09-06 08:55:53

Recently Reported IPs

27.45.39.56 40.104.20.40 103.122.164.65 5.236.105.164
18.141.222.233 172.217.26.83 202.170.48.150 163.47.11.89
158.178.225.76 142.250.197.243 40.99.8.200 13.250.123.91
13.107.246.73 66.33.60.193 111.221.45.79 170.64.239.106
20.163.13.196 10.212.177.214 10.212.177.224 47.32.133.153