Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Malaysia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       45.123.44.0 - 45.123.143.255
CIDR:           45.123.64.0/18, 45.123.48.0/20, 45.123.44.0/22, 45.123.128.0/20
NetName:        APNIC
NetHandle:      NET-45-123-44-0-1
Parent:         NET45 (NET-45-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2014-09-05
Updated:        2021-11-08
Ref:            https://rdap.arin.net/registry/ip/45.123.44.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois://whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '45.123.101.0 - 45.123.101.255'

% Abuse contact for '45.123.101.0 - 45.123.101.255' is 'abuse@isp.my'

inetnum:        45.123.101.0 - 45.123.101.255
netname:        TTSSB-MY
descr:          TM TECHNOLOGY SERVICES SDN. BHD. Internet Service Provider Kuala Lumpur, Malaysia
country:        MY
admin-c:        NNSB1-AP
tech-c:         NNSB1-AP
abuse-c:        AN791-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-NAXLEVEL-MY
mnt-irt:        IRT-NAXLEVEL-MY
last-modified:  2024-11-14T03:21:54Z
source:         APNIC

irt:            IRT-NAXLEVEL-MY
address:        B-3A-6, Kuchai Exchange, Jalan Kuchai Maju 13, 58200 KL Malaysia.
e-mail:         west@isp.my
abuse-mailbox:  abuse@isp.my
admin-c:        NNSB1-AP
tech-c:         NNSB1-AP
auth:           # Filtered
remarks:        west@isp.my was validated on 2026-02-26
remarks:        abuse@isp.my was validated on 2026-02-27
mnt-by:         MAINT-NAXLEVEL-MY
last-modified:  2026-02-27T03:02:23Z
source:         APNIC

role:           ABUSE NAXLEVELMY
country:        ZZ
address:        B-3A-6, Kuchai Exchange, Jalan Kuchai Maju 13, 58200 KL Malaysia.
phone:          +000000000
e-mail:         west@isp.my
admin-c:        NNSB1-AP
tech-c:         NNSB1-AP
nic-hdl:        AN791-AP
remarks:        Generated from irt object IRT-NAXLEVEL-MY
remarks:        west@isp.my was validated on 2026-02-26
remarks:        abuse@isp.my was validated on 2026-02-27
abuse-mailbox:  abuse@isp.my
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-27T03:02:41Z
source:         APNIC

role:           NAXLEVEL NETWORK SDN BHD - network administrator
address:        B-3A-6, Kuchai Exchange, Jalan Kuchai Maju 13, 58200 KL Malaysia.
country:        MY
phone:          +60377818733
e-mail:         west@isp.my
admin-c:        NNSB1-AP
tech-c:         NNSB1-AP
nic-hdl:        NNSB1-AP
mnt-by:         MAINT-NAXLEVEL-MY
last-modified:  2012-05-16T05:09:09Z
source:         APNIC

% Information related to '45.123.101.0/24AS5065'

route:          45.123.101.0/24
origin:         AS5065
descr:          NAXLEVEL Network Sdn. Bhd.
                B-3A-6, Kuchai Exchange
                Jalan Kuchai Maju 13
mnt-by:         MAINT-NAXLEVEL-MY
last-modified:  2024-10-18T05:06:21Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.123.101.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2315
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.123.101.194.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040500 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 05 18:30:43 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 194.101.123.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.101.123.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.211 attackbotsspam
2019-11-30T09:37:51.441163abusebot-4.cloudsearch.cf sshd\[3046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211  user=root
2019-11-30 17:56:10
81.26.130.133 attack
Nov 29 20:22:16 web1 sshd\[24290\]: Invalid user edlin from 81.26.130.133
Nov 29 20:22:16 web1 sshd\[24290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.26.130.133
Nov 29 20:22:18 web1 sshd\[24290\]: Failed password for invalid user edlin from 81.26.130.133 port 36630 ssh2
Nov 29 20:26:20 web1 sshd\[24623\]: Invalid user dari from 81.26.130.133
Nov 29 20:26:20 web1 sshd\[24623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.26.130.133
2019-11-30 17:44:34
139.198.122.76 attack
Oct 14 00:47:27 meumeu sshd[12941]: Failed password for root from 139.198.122.76 port 42364 ssh2
Oct 14 00:52:11 meumeu sshd[13609]: Failed password for root from 139.198.122.76 port 54040 ssh2
...
2019-11-30 18:12:02
200.40.135.214 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2019-11-30 17:47:43
159.89.134.64 attackbotsspam
Nov 29 23:56:24 php1 sshd\[14580\]: Invalid user guest from 159.89.134.64
Nov 29 23:56:24 php1 sshd\[14580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.134.64
Nov 29 23:56:27 php1 sshd\[14580\]: Failed password for invalid user guest from 159.89.134.64 port 46624 ssh2
Nov 29 23:59:24 php1 sshd\[14834\]: Invalid user sassali from 159.89.134.64
Nov 29 23:59:24 php1 sshd\[14834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.134.64
2019-11-30 18:07:36
60.6.228.10 attackbots
Nov 30 08:49:02 OPSO sshd\[16893\]: Invalid user 12344 from 60.6.228.10 port 49144
Nov 30 08:49:02 OPSO sshd\[16893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.6.228.10
Nov 30 08:49:03 OPSO sshd\[16893\]: Failed password for invalid user 12344 from 60.6.228.10 port 49144 ssh2
Nov 30 08:52:36 OPSO sshd\[17475\]: Invalid user q, from 60.6.228.10 port 34542
Nov 30 08:52:36 OPSO sshd\[17475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.6.228.10
2019-11-30 17:51:20
49.88.112.55 attackbotsspam
Nov 30 14:58:28 gw1 sshd[24306]: Failed password for root from 49.88.112.55 port 14663 ssh2
Nov 30 14:58:41 gw1 sshd[24306]: error: maximum authentication attempts exceeded for root from 49.88.112.55 port 14663 ssh2 [preauth]
...
2019-11-30 18:01:29
85.99.98.182 attackbotsspam
firewall-block, port(s): 23/tcp
2019-11-30 17:59:50
31.17.24.225 attackbots
2019-11-30T08:23:30.460299abusebot-5.cloudsearch.cf sshd\[6477\]: Invalid user commando from 31.17.24.225 port 33426
2019-11-30 18:13:53
196.196.217.50 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-30 17:51:50
129.204.38.136 attackspambots
Apr 22 13:07:05 meumeu sshd[28236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.38.136 
Apr 22 13:07:07 meumeu sshd[28236]: Failed password for invalid user field from 129.204.38.136 port 53706 ssh2
Apr 22 13:11:52 meumeu sshd[28725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.38.136 
...
2019-11-30 17:55:46
178.45.192.133 attackspam
Unauthorised access (Nov 30) SRC=178.45.192.133 LEN=52 TTL=115 ID=27948 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-30 17:38:17
152.67.1.55 attack
Port scan on 2 port(s): 2375 4243
2019-11-30 17:53:04
51.75.67.69 attackbots
Nov 30 10:16:40 SilenceServices sshd[7458]: Failed password for root from 51.75.67.69 port 44024 ssh2
Nov 30 10:19:41 SilenceServices sshd[8238]: Failed password for backup from 51.75.67.69 port 51160 ssh2
2019-11-30 17:42:40
218.92.0.145 attackspambots
Nov 30 11:09:57 h2177944 sshd\[3750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
Nov 30 11:09:58 h2177944 sshd\[3750\]: Failed password for root from 218.92.0.145 port 58656 ssh2
Nov 30 11:10:02 h2177944 sshd\[3750\]: Failed password for root from 218.92.0.145 port 58656 ssh2
Nov 30 11:10:05 h2177944 sshd\[3750\]: Failed password for root from 218.92.0.145 port 58656 ssh2
...
2019-11-30 18:11:42

Recently Reported IPs

121.41.164.100 227.29.166.28 2606:4700:10::ac43:1276 2606:4700:10::6814:6274
2606:4700:10::6814:8154 2606:4700:10::6816:1428 2606:4700:10::ac43:1697 2606:4700:10::6814:9184
149.119.188.112 206.81.11.95 187.33.144.19 134.35.157.150
2606:4700:10::6816:1827 164.155.74.42 2606:4700:10::6816:1257 2606:4700:10::ac43:1765
2606:4700:10::6816:4038 2606:4700:10::6814:7150 2606:4700:10::6814:4840 2606:4700:10::6814:9944