Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shah Alam

Region: Selangor

Country: Malaysia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '203.106.128.0 - 203.106.128.255'

% Abuse contact for '203.106.128.0 - 203.106.128.255' is 'abuse@tm.com.my'

inetnum:        203.106.128.0 - 203.106.128.255
netname:        INFRA-TMNET
descr:          TMNET
country:        MY
admin-c:        TA35-AP
tech-c:         TA35-AP
abuse-c:        AM2355-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-MY-WEBE
mnt-irt:        IRT-MY-WEBE
last-modified:  2023-06-30T00:02:10Z
source:         APNIC

irt:            IRT-MY-WEBE
address:        Menara TM, Jalan Pantai Baharu,
address:        59100 Kuala Lumpur, Wilayah Persekutuan Kuala Lumpur
address:        Malaysia
phone:          +601110001000
e-mail:         abuse@tm.com.my
abuse-mailbox:  abuse@tm.com.my
admin-c:        ICO1-AP
tech-c:         ICO1-AP
auth:           # Filtered
remarks:        TM AS4788 had recently installed RPKI validator and will be dropping the ????????????Invalid???????????? route by November 2023. Please update your ROA accordingly.
remarks:        abuse@tm.com.my was validated on 2025-12-17
mnt-by:         MAINT-MY-WEBE
last-modified:  2026-01-08T02:19:24Z
source:         APNIC

role:           ABUSE MYWEBE
country:        ZZ
address:        Menara TM, Jalan Pantai Baharu,
address:        59100 Kuala Lumpur, Wilayah Persekutuan Kuala Lumpur
address:        Malaysia
phone:          +601110001000
e-mail:         abuse@tm.com.my
admin-c:        ICO1-AP
tech-c:         ICO1-AP
nic-hdl:        AM2355-AP
remarks:        Generated from irt object IRT-MY-WEBE
remarks:        abuse@tm.com.my was validated on 2025-12-17
abuse-mailbox:  abuse@tm.com.my
mnt-by:         APNIC-ABUSE
last-modified:  2025-12-17T13:15:33Z
source:         APNIC

role:           TMNET IP Administrators
address:        Telekom Malaysia
address:        Jalan Pantai Baru, Kuala Lumpur.
country:        MY
phone:          +6-1800-88-2646
phone:          +603-22466646
fax-no:         +603-22402126
remarks:        dnsadm@tm.com.my [for DNS related]
remarks:        abuse@tm.com.my [for abuse case related]
remarks:        iptac@tm.com.my [for routing related]
e-mail:         abuse@tm.com.my
admin-c:        AS115-AP
tech-c:         SM135-AP
nic-hdl:        TA35-AP
mnt-by:         TM-NET-AP
last-modified:  2019-03-26T14:05:26Z
source:         APNIC

% Information related to '203.106.128.0/18AS4788'

route:          203.106.128.0/18
descr:          TMnet route object
origin:         AS4788
mnt-by:         MAINT-MY-WEBE
last-modified:  2023-07-01T06:29:36Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.106.128.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28969
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.106.128.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040400 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 04 18:23:32 CST 2026
;; MSG SIZE  rcvd: 106
Host info
b'2.128.106.203.in-addr.arpa domain name pointer jhb-hnet01-brf-oc48-so4-0-0.tm.net.my.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.128.106.203.in-addr.arpa	name = jhb-hnet01-brf-oc48-so4-0-0.tm.net.my.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
138.122.96.174 attackbotsspam
Unauthorized Brute Force Email Login Fail
2020-08-12 19:10:05
189.204.140.69 attack
Unauthorized connection attempt from IP address 189.204.140.69 on Port 445(SMB)
2020-08-12 19:44:56
122.51.251.253 attackspambots
Failed password for root from 122.51.251.253 port 40386 ssh2
2020-08-12 19:44:43
106.13.209.80 attackspam
Aug 12 05:11:19 Ubuntu-1404-trusty-64-minimal sshd\[2798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.209.80  user=root
Aug 12 05:11:21 Ubuntu-1404-trusty-64-minimal sshd\[2798\]: Failed password for root from 106.13.209.80 port 41158 ssh2
Aug 12 05:36:37 Ubuntu-1404-trusty-64-minimal sshd\[15155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.209.80  user=root
Aug 12 05:36:38 Ubuntu-1404-trusty-64-minimal sshd\[15155\]: Failed password for root from 106.13.209.80 port 40990 ssh2
Aug 12 05:46:36 Ubuntu-1404-trusty-64-minimal sshd\[22327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.209.80  user=root
2020-08-12 19:18:33
217.27.117.136 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-08-12 19:45:39
123.163.249.151 attack
Unauthorized connection attempt from IP address 123.163.249.151 on Port 445(SMB)
2020-08-12 19:12:56
118.71.117.212 attackbots
Unauthorized connection attempt from IP address 118.71.117.212 on Port 445(SMB)
2020-08-12 19:32:04
118.89.115.224 attack
2020-08-11 UTC: (9x) - root(9x)
2020-08-12 19:27:53
125.163.115.229 attack
Unauthorized connection attempt from IP address 125.163.115.229 on Port 445(SMB)
2020-08-12 19:32:59
180.246.148.212 attackspambots
Automatic report - Port Scan Attack
2020-08-12 19:20:57
187.192.45.1 attackbots
Unauthorized connection attempt from IP address 187.192.45.1 on Port 445(SMB)
2020-08-12 19:39:29
46.229.168.132 attackspam
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-08-12 19:01:53
120.78.53.133 attackbotsspam
2020-08-12 05:46:23,072 fail2ban.actions: WARNING [ssh] Ban 120.78.53.133
2020-08-12 19:31:37
106.51.64.29 attackspambots
Unauthorized connection attempt from IP address 106.51.64.29 on Port 445(SMB)
2020-08-12 19:42:54
118.71.152.60 attackspam
1597205894 - 08/12/2020 06:18:14 Host: 118.71.152.60/118.71.152.60 Port: 445 TCP Blocked
2020-08-12 19:19:04

Recently Reported IPs

2606:4700:10::6816:2843 2606:4700:10::ac43:1633 93.65.245.223 8.90.153.16
98.226.212.10 37.9.90.191 88.101.166.241 110.77.187.27
2606:4700:10::6816:4840 2606:4700:10::6814:6839 2606:4700:10::6816:3991 2606:4700:10::6816:2360
2606:4700:10::6814:7088 2606:4700:10::6816:4102 2606:4700:10::6816:692 27.9.45.87
92.200.96.82 3.115.4.165 66.132.186.164 223.73.11.110