Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Malaysia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       45.123.44.0 - 45.123.143.255
CIDR:           45.123.64.0/18, 45.123.44.0/22, 45.123.128.0/20, 45.123.48.0/20
NetName:        APNIC
NetHandle:      NET-45-123-44-0-1
Parent:         NET45 (NET-45-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2014-09-05
Updated:        2021-11-08
Ref:            https://rdap.arin.net/registry/ip/45.123.44.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois://whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '45.123.100.0 - 45.123.103.255'

% Abuse contact for '45.123.100.0 - 45.123.103.255' is 'abuse@isp.my'

inetnum:        45.123.100.0 - 45.123.103.255
netname:        NAXLEVEL-MY
descr:          NAXLEVEL Network Sdn. Bhd.
descr:          B-3A-6, Kuchai Exchange
descr:          Jalan Kuchai Maju 13
country:        MY
org:            ORG-NNSB1-AP
admin-c:        NNSB1-AP
tech-c:         NNSB1-AP
abuse-c:        AN791-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-NAXLEVEL-MY
mnt-routes:     MAINT-NAXLEVEL-MY
mnt-irt:        IRT-NAXLEVEL-MY
last-modified:  2020-06-22T09:21:53Z
source:         APNIC

irt:            IRT-NAXLEVEL-MY
address:        B-3A-6, Kuchai Exchange, Jalan Kuchai Maju 13, 58200 KL Malaysia.
e-mail:         west@isp.my
abuse-mailbox:  abuse@isp.my
admin-c:        NNSB1-AP
tech-c:         NNSB1-AP
auth:           # Filtered
remarks:        west@isp.my was validated on 2026-02-26
remarks:        abuse@isp.my was validated on 2026-02-27
mnt-by:         MAINT-NAXLEVEL-MY
last-modified:  2026-02-27T03:02:23Z
source:         APNIC

organisation:   ORG-NNSB1-AP
org-name:       NAXLEVEL Network Sdn. Bhd.
org-type:       LIR
country:        MY
address:        B-3A-6, Kuchai Exchange
address:        Jalan Kuchai Maju 13
phone:          +60125058733
e-mail:         stenly@naxlevel.com.my
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:15:59Z
source:         APNIC

role:           ABUSE NAXLEVELMY
country:        ZZ
address:        B-3A-6, Kuchai Exchange, Jalan Kuchai Maju 13, 58200 KL Malaysia.
phone:          +000000000
e-mail:         west@isp.my
admin-c:        NNSB1-AP
tech-c:         NNSB1-AP
nic-hdl:        AN791-AP
remarks:        Generated from irt object IRT-NAXLEVEL-MY
remarks:        west@isp.my was validated on 2026-02-26
remarks:        abuse@isp.my was validated on 2026-02-27
abuse-mailbox:  abuse@isp.my
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-27T03:02:41Z
source:         APNIC

role:           NAXLEVEL NETWORK SDN BHD - network administrator
address:        B-3A-6, Kuchai Exchange, Jalan Kuchai Maju 13, 58200 KL Malaysia.
country:        MY
phone:          +60377818733
e-mail:         west@isp.my
admin-c:        NNSB1-AP
tech-c:         NNSB1-AP
nic-hdl:        NNSB1-AP
mnt-by:         MAINT-NAXLEVEL-MY
last-modified:  2012-05-16T05:09:09Z
source:         APNIC

% Information related to '45.123.100.0/24AS5065'

route:          45.123.100.0/24
origin:         AS5065
descr:          NAXLEVEL Network Sdn. Bhd.
                B-3A-6, Kuchai Exchange
                Jalan Kuchai Maju 13
mnt-by:         MAINT-NAXLEVEL-MY
last-modified:  2025-05-18T16:02:14Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.123.100.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47674
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.123.100.143.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042700 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 28 01:01:02 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 143.100.123.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 143.100.123.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.186.28.201 attackbots
2019-10-21 x@x
2019-10-21 13:17:47 unexpected disconnection while reading SMTP command from (static.vnpt.vn) [113.186.28.201]:22593 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-10-21 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.186.28.201
2019-10-21 22:13:41
103.217.216.130 attackbots
WordPress wp-login brute force :: 103.217.216.130 0.056 BYPASS [22/Oct/2019:00:33:25  1100] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-21 22:23:32
184.154.189.93 attackspambots
Port Scan
2019-10-21 22:12:10
105.40.249.50 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2019-10-21 22:33:34
146.185.25.168 attackbots
Port Scan
2019-10-21 22:01:35
220.67.154.76 attack
Oct 21 03:35:02 auw2 sshd\[439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.67.154.76  user=root
Oct 21 03:35:05 auw2 sshd\[439\]: Failed password for root from 220.67.154.76 port 41044 ssh2
Oct 21 03:39:59 auw2 sshd\[1064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.67.154.76  user=root
Oct 21 03:40:01 auw2 sshd\[1064\]: Failed password for root from 220.67.154.76 port 51858 ssh2
Oct 21 03:44:56 auw2 sshd\[1513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.67.154.76  user=root
2019-10-21 22:03:41
2.139.48.197 attack
2019-10-21 x@x
2019-10-21 12:52:27 unexpected disconnection while reading SMTP command from 197.red-2-139-48.dynamicip.rima-tde.net [2.139.48.197]:25889 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-10-21 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=2.139.48.197
2019-10-21 22:02:34
59.178.89.208 attackspambots
2019-10-21 x@x
2019-10-21 11:32:18 unexpected disconnection while reading SMTP command from (triband-del-59.178.89.208.bol.net.in) [59.178.89.208]:61038 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-10-21 x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=59.178.89.208
2019-10-21 21:53:18
81.178.225.245 attack
port scan and connect, tcp 8080 (http-proxy)
2019-10-21 21:51:53
2.90.148.34 attackspam
2019-10-21 x@x
2019-10-21 12:22:54 unexpected disconnection while reading SMTP command from ([2.90.148.34]) [2.90.148.34]:42291 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-10-21 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=2.90.148.34
2019-10-21 21:59:45
45.141.84.29 attackbots
Port Scan
2019-10-21 21:55:03
51.68.227.49 attackbots
$f2bV_matches
2019-10-21 22:04:42
60.249.21.129 attack
Oct 21 12:37:16 unicornsoft sshd\[19035\]: Invalid user test from 60.249.21.129
Oct 21 12:37:16 unicornsoft sshd\[19035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.249.21.129
Oct 21 12:37:17 unicornsoft sshd\[19035\]: Failed password for invalid user test from 60.249.21.129 port 36796 ssh2
2019-10-21 22:26:02
195.123.237.41 attackbots
Oct 21 04:03:41 hanapaa sshd\[3255\]: Invalid user 1234 from 195.123.237.41
Oct 21 04:03:41 hanapaa sshd\[3255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.123.237.41
Oct 21 04:03:42 hanapaa sshd\[3255\]: Failed password for invalid user 1234 from 195.123.237.41 port 47438 ssh2
Oct 21 04:08:52 hanapaa sshd\[3677\]: Invalid user WW22 from 195.123.237.41
Oct 21 04:08:52 hanapaa sshd\[3677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.123.237.41
2019-10-21 22:10:09
146.185.25.186 attackbotsspam
Port Scan
2019-10-21 22:06:51

Recently Reported IPs

54.146.44.123 2606:4700:10::6814:8139 2606:4700:10::6814:7250 101.51.66.97
200.193.85.59 124.158.169.208 85.217.149.72 116.76.36.213
111.172.5.8 54.215.45.83 2606:4700:10::6814:5646 2606:4700:10::6814:9673
2606:4700:10::ac43:2190 13.228.196.60 166.88.26.169 2606:4700:10::ac43:2741
140.84.175.241 216.118.251.138 14.220.182.103 2606:4700:10::6816:3697