Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kuala Lumpur

Region: Kuala Lumpur

Country: Malaysia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       45.192.0.0 - 45.222.255.255
CIDR:           45.220.0.0/15, 45.208.0.0/13, 45.216.0.0/14, 45.192.0.0/12, 45.222.0.0/16
NetName:        AFRINIC
NetHandle:      NET-45-192-0-0-1
Parent:         NET45 (NET-45-0-0-0-0)
NetType:        Transferred to AfriNIC
OriginAS:       
Organization:   African Network Information Center (AFRINIC)
RegDate:        2014-05-22
Updated:        2015-02-26
Ref:            https://rdap.arin.net/registry/ip/45.192.0.0

ResourceLink:  http://afrinic.net/en/services/whois-query
ResourceLink:  whois.afrinic.net


OrgName:        African Network Information Center
OrgId:          AFRINIC
Address:        Level 11ABC
Address:        Raffles Tower
Address:        Lot 19, Cybercity
City:           Ebene
StateProv:      
PostalCode:     
Country:        MU
RegDate:        2004-05-17
Updated:        2015-05-04
Comment:        AfriNIC - http://www.afrinic.net
Comment:        The African & Indian Ocean Internet Registry
Ref:            https://rdap.arin.net/registry/entity/AFRINIC

ReferralServer:  whois://whois.afrinic.net
ResourceLink:  http://afrinic.net/en/services/whois-query

OrgAbuseHandle: GENER11-ARIN
OrgAbuseName:   Generic POC
OrgAbusePhone:  +230 4666616 
OrgAbuseEmail:  abusepoc@afrinic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/GENER11-ARIN

OrgTechHandle: GENER11-ARIN
OrgTechName:   Generic POC
OrgTechPhone:  +230 4666616 
OrgTechEmail:  abusepoc@afrinic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/GENER11-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.afrinic.net.

% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '45.203.61.0 - 45.203.61.255'

% No abuse contact registered for 45.203.61.0 - 45.203.61.255

inetnum:        45.203.61.0 - 45.203.61.255
netname:        NeoFiber_Communications_inc
descr:          NeoFiber Communications inc.
country:        MY
admin-c:        CIS1-AFRINIC
tech-c:         CIS1-AFRINIC
status:         ASSIGNED PA
remarks:        Geofeed https://ariskisp.com/rfc8805.csv
mnt-by:         CIL1-MNT
mnt-by:         LARUS-SERVICE-MNT
source:         AFRINIC # Filtered
parent:         45.192.0.0 - 45.207.255.255

person:         Cloud Innovation Support
address:        Ebene
address:        MU
address:        Mahe
address:        Seychelles
phone:          tel:+248-4-610-795
nic-hdl:        CIS1-AFRINIC
abuse-mailbox:  abuse@cloudinnovation.org
mnt-by:         CIL1-MNT
source:         AFRINIC # Filtered

% Information related to '45.203.61.0/24AS214143'

route:          45.203.61.0/24
origin:         AS214143
descr:          NUUK COMMUNICATIONS PTE. LTD.
mnt-by:         LARUS-SERVICE-MNT
source:         AFRINIC # Filtered

% Information related to '45.203.61.0/24AS32043'

route:          45.203.61.0/24
origin:         AS32043
descr:          Nuuk communication PTE LTD
mnt-by:         LARUS-SERVICE-MNT
source:         AFRINIC # Filtered

% Information related to '45.203.61.0/24AS395793'

route:          45.203.61.0/24
origin:         AS395793
descr:          Nuuk communication PTE LTD
mnt-by:         LARUS-SERVICE-MNT
source:         AFRINIC # Filtered
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.203.61.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65016
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.203.61.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025092601 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 27 12:26:19 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 2.61.203.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.61.203.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
27.255.79.226 attackbotsspam
Feb 10 01:04:29 game-panel sshd[16745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.255.79.226
Feb 10 01:04:31 game-panel sshd[16745]: Failed password for invalid user yux from 27.255.79.226 port 46972 ssh2
Feb 10 01:08:20 game-panel sshd[17015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.255.79.226
2020-02-10 09:21:03
114.32.250.195 attack
Honeypot attack, port: 81, PTR: 114-32-250-195.HINET-IP.hinet.net.
2020-02-10 09:56:33
62.210.167.202 attackspam
[2020-02-09 20:33:15] NOTICE[1148][C-0000776a] chan_sip.c: Call from '' (62.210.167.202:64818) to extension '+13608428184' rejected because extension not found in context 'public'.
[2020-02-09 20:33:15] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-09T20:33:15.980-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="+13608428184",SessionID="0x7fd82c459918",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.167.202/64818",ACLName="no_extension_match"
[2020-02-09 20:34:14] NOTICE[1148][C-0000776b] chan_sip.c: Call from '' (62.210.167.202:49383) to extension '00013608428184' rejected because extension not found in context 'public'.
[2020-02-09 20:34:14] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-09T20:34:14.543-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="00013608428184",SessionID="0x7fd82c590bc8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.21
...
2020-02-10 09:36:31
171.249.223.158 attack
Telnet/23 MH Probe, BF, Hack -
2020-02-10 09:31:11
182.110.18.94 attack
Unauthorized connection attempt from IP address 182.110.18.94 on Port 445(SMB)
2020-02-10 09:48:08
112.85.42.180 attackbotsspam
IP blocked
2020-02-10 09:37:34
104.237.130.237 attack
firewall-block, port(s): 17/tcp
2020-02-10 09:24:55
49.88.112.70 attackspambots
2020-02-10T01:30:59.987690shield sshd\[9091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.70  user=root
2020-02-10T01:31:01.997454shield sshd\[9091\]: Failed password for root from 49.88.112.70 port 14766 ssh2
2020-02-10T01:31:04.660223shield sshd\[9091\]: Failed password for root from 49.88.112.70 port 14766 ssh2
2020-02-10T01:31:06.928828shield sshd\[9091\]: Failed password for root from 49.88.112.70 port 14766 ssh2
2020-02-10T01:33:27.474251shield sshd\[9624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.70  user=root
2020-02-10 09:39:15
162.243.10.55 attackbotsspam
Feb  9 15:33:28 php1 sshd\[16776\]: Invalid user jom from 162.243.10.55
Feb  9 15:33:28 php1 sshd\[16776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.10.55
Feb  9 15:33:31 php1 sshd\[16776\]: Failed password for invalid user jom from 162.243.10.55 port 36632 ssh2
Feb  9 15:38:43 php1 sshd\[17150\]: Invalid user ehx from 162.243.10.55
Feb  9 15:38:43 php1 sshd\[17150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.10.55
2020-02-10 09:57:14
59.127.131.149 attackspam
Honeypot attack, port: 81, PTR: 59-127-131-149.HINET-IP.hinet.net.
2020-02-10 09:47:05
119.236.95.229 attackbots
Honeypot attack, port: 5555, PTR: n11923695229.netvigator.com.
2020-02-10 09:34:37
175.24.135.131 attackbotsspam
Feb 10 02:48:30 cvbnet sshd[24361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.135.131 
Feb 10 02:48:31 cvbnet sshd[24361]: Failed password for invalid user xtl from 175.24.135.131 port 59558 ssh2
...
2020-02-10 09:58:47
183.57.150.222 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-10 09:37:05
171.244.10.218 attackspam
firewall-block, port(s): 1433/tcp
2020-02-10 09:22:36
218.29.108.186 attackbots
Brute force attempt
2020-02-10 09:30:38

Recently Reported IPs

171.13.14.37 54.151.57.110 101.43.45.77 2408:846c:4a70:4b0b:ad14:4135:d6ab:c095
195.178.110.199 54.219.56.105 194.180.49.186 149.87.180.133
20.64.104.65 113.95.140.91 143.20.229.185 107.148.227.139
182.137.208.39 40.124.186.100 20.64.105.112 46.232.123.10
216.180.246.173 47.121.121.203 159.65.232.224 144.172.94.30