City: unknown
Region: unknown
Country: Malaysia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 45.123.44.0 - 45.123.143.255
CIDR: 45.123.64.0/18, 45.123.48.0/20, 45.123.44.0/22, 45.123.128.0/20
NetName: APNIC
NetHandle: NET-45-123-44-0-1
Parent: NET45 (NET-45-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2014-09-05
Updated: 2021-11-08
Ref: https://rdap.arin.net/registry/ip/45.123.44.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois://whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: http://wq.apnic.net/whois-search/static/search.html
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '45.123.101.0 - 45.123.101.255'
% Abuse contact for '45.123.101.0 - 45.123.101.255' is 'abuse@isp.my'
inetnum: 45.123.101.0 - 45.123.101.255
netname: TTSSB-MY
descr: TM TECHNOLOGY SERVICES SDN. BHD. Internet Service Provider Kuala Lumpur, Malaysia
country: MY
admin-c: NNSB1-AP
tech-c: NNSB1-AP
abuse-c: AN791-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-NAXLEVEL-MY
mnt-irt: IRT-NAXLEVEL-MY
last-modified: 2024-11-14T03:21:54Z
source: APNIC
irt: IRT-NAXLEVEL-MY
address: B-3A-6, Kuchai Exchange, Jalan Kuchai Maju 13, 58200 KL Malaysia.
e-mail: west@isp.my
abuse-mailbox: abuse@isp.my
admin-c: NNSB1-AP
tech-c: NNSB1-AP
auth: # Filtered
remarks: west@isp.my was validated on 2026-02-26
remarks: abuse@isp.my was validated on 2026-02-27
mnt-by: MAINT-NAXLEVEL-MY
last-modified: 2026-02-27T03:02:23Z
source: APNIC
role: ABUSE NAXLEVELMY
country: ZZ
address: B-3A-6, Kuchai Exchange, Jalan Kuchai Maju 13, 58200 KL Malaysia.
phone: +000000000
e-mail: west@isp.my
admin-c: NNSB1-AP
tech-c: NNSB1-AP
nic-hdl: AN791-AP
remarks: Generated from irt object IRT-NAXLEVEL-MY
remarks: west@isp.my was validated on 2026-02-26
remarks: abuse@isp.my was validated on 2026-02-27
abuse-mailbox: abuse@isp.my
mnt-by: APNIC-ABUSE
last-modified: 2026-02-27T03:02:41Z
source: APNIC
role: NAXLEVEL NETWORK SDN BHD - network administrator
address: B-3A-6, Kuchai Exchange, Jalan Kuchai Maju 13, 58200 KL Malaysia.
country: MY
phone: +60377818733
e-mail: west@isp.my
admin-c: NNSB1-AP
tech-c: NNSB1-AP
nic-hdl: NNSB1-AP
mnt-by: MAINT-NAXLEVEL-MY
last-modified: 2012-05-16T05:09:09Z
source: APNIC
% Information related to '45.123.101.0/24AS5065'
route: 45.123.101.0/24
origin: AS5065
descr: NAXLEVEL Network Sdn. Bhd.
B-3A-6, Kuchai Exchange
Jalan Kuchai Maju 13
mnt-by: MAINT-NAXLEVEL-MY
last-modified: 2024-10-18T05:06:21Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.123.101.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2315
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.123.101.194. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040500 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 05 18:30:43 CST 2026
;; MSG SIZE rcvd: 107
Host 194.101.123.45.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 194.101.123.45.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 218.92.0.211 | attackbotsspam | 2019-11-30T09:37:51.441163abusebot-4.cloudsearch.cf sshd\[3046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211 user=root |
2019-11-30 17:56:10 |
| 81.26.130.133 | attack | Nov 29 20:22:16 web1 sshd\[24290\]: Invalid user edlin from 81.26.130.133 Nov 29 20:22:16 web1 sshd\[24290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.26.130.133 Nov 29 20:22:18 web1 sshd\[24290\]: Failed password for invalid user edlin from 81.26.130.133 port 36630 ssh2 Nov 29 20:26:20 web1 sshd\[24623\]: Invalid user dari from 81.26.130.133 Nov 29 20:26:20 web1 sshd\[24623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.26.130.133 |
2019-11-30 17:44:34 |
| 139.198.122.76 | attack | Oct 14 00:47:27 meumeu sshd[12941]: Failed password for root from 139.198.122.76 port 42364 ssh2 Oct 14 00:52:11 meumeu sshd[13609]: Failed password for root from 139.198.122.76 port 54040 ssh2 ... |
2019-11-30 18:12:02 |
| 200.40.135.214 | attackbots | Honeypot attack, port: 445, PTR: PTR record not found |
2019-11-30 17:47:43 |
| 159.89.134.64 | attackbotsspam | Nov 29 23:56:24 php1 sshd\[14580\]: Invalid user guest from 159.89.134.64 Nov 29 23:56:24 php1 sshd\[14580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.134.64 Nov 29 23:56:27 php1 sshd\[14580\]: Failed password for invalid user guest from 159.89.134.64 port 46624 ssh2 Nov 29 23:59:24 php1 sshd\[14834\]: Invalid user sassali from 159.89.134.64 Nov 29 23:59:24 php1 sshd\[14834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.134.64 |
2019-11-30 18:07:36 |
| 60.6.228.10 | attackbots | Nov 30 08:49:02 OPSO sshd\[16893\]: Invalid user 12344 from 60.6.228.10 port 49144 Nov 30 08:49:02 OPSO sshd\[16893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.6.228.10 Nov 30 08:49:03 OPSO sshd\[16893\]: Failed password for invalid user 12344 from 60.6.228.10 port 49144 ssh2 Nov 30 08:52:36 OPSO sshd\[17475\]: Invalid user q, from 60.6.228.10 port 34542 Nov 30 08:52:36 OPSO sshd\[17475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.6.228.10 |
2019-11-30 17:51:20 |
| 49.88.112.55 | attackbotsspam | Nov 30 14:58:28 gw1 sshd[24306]: Failed password for root from 49.88.112.55 port 14663 ssh2 Nov 30 14:58:41 gw1 sshd[24306]: error: maximum authentication attempts exceeded for root from 49.88.112.55 port 14663 ssh2 [preauth] ... |
2019-11-30 18:01:29 |
| 85.99.98.182 | attackbotsspam | firewall-block, port(s): 23/tcp |
2019-11-30 17:59:50 |
| 31.17.24.225 | attackbots | 2019-11-30T08:23:30.460299abusebot-5.cloudsearch.cf sshd\[6477\]: Invalid user commando from 31.17.24.225 port 33426 |
2019-11-30 18:13:53 |
| 196.196.217.50 | attack | Honeypot attack, port: 23, PTR: PTR record not found |
2019-11-30 17:51:50 |
| 129.204.38.136 | attackspambots | Apr 22 13:07:05 meumeu sshd[28236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.38.136 Apr 22 13:07:07 meumeu sshd[28236]: Failed password for invalid user field from 129.204.38.136 port 53706 ssh2 Apr 22 13:11:52 meumeu sshd[28725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.38.136 ... |
2019-11-30 17:55:46 |
| 178.45.192.133 | attackspam | Unauthorised access (Nov 30) SRC=178.45.192.133 LEN=52 TTL=115 ID=27948 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-30 17:38:17 |
| 152.67.1.55 | attack | Port scan on 2 port(s): 2375 4243 |
2019-11-30 17:53:04 |
| 51.75.67.69 | attackbots | Nov 30 10:16:40 SilenceServices sshd[7458]: Failed password for root from 51.75.67.69 port 44024 ssh2 Nov 30 10:19:41 SilenceServices sshd[8238]: Failed password for backup from 51.75.67.69 port 51160 ssh2 |
2019-11-30 17:42:40 |
| 218.92.0.145 | attackspambots | Nov 30 11:09:57 h2177944 sshd\[3750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145 user=root Nov 30 11:09:58 h2177944 sshd\[3750\]: Failed password for root from 218.92.0.145 port 58656 ssh2 Nov 30 11:10:02 h2177944 sshd\[3750\]: Failed password for root from 218.92.0.145 port 58656 ssh2 Nov 30 11:10:05 h2177944 sshd\[3750\]: Failed password for root from 218.92.0.145 port 58656 ssh2 ... |
2019-11-30 18:11:42 |