Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Malaysia

Internet Service Provider: Maxis

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '58.71.128.0 - 58.71.255.255'

% Abuse contact for '58.71.128.0 - 58.71.255.255' is 'abuse@maxis.com.my'

inetnum:        58.71.128.0 - 58.71.255.255
netname:        MAXISNET
descr:          Maxis Broadband Sdn Bhd
descr:          Level 8, Block 1A, Plaza Sentral
descr:          Jalan Stesen Sentral 5
descr:          Kuala Lumpur Sentral
country:        MY
org:            ORG-MBS1-AP
admin-c:        MN167-AP
tech-c:         MO113-AP
abuse-c:        AM2470-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-MY-MAXIS
mnt-irt:        IRT-MAXISBROADBAND-MY
last-modified:  2020-06-15T04:03:47Z
source:         APNIC

irt:            IRT-MAXISBROADBAND-MY
address:        Level 19, Menara Maxis,
address:        KLCC, 50088 Kuala Lumpur
address:        Malaysia
e-mail:         abuse@maxis.com.my
abuse-mailbox:  abuse@maxis.com.my
admin-c:        KG360-AP
tech-c:         KG360-AP
auth:           # Filtered
remarks:        abuse@maxis.com.my is invalid
mnt-by:         MAINT-MY-MAXIS
last-modified:  2026-02-05T03:42:45Z
source:         APNIC

organisation:   ORG-MBS1-AP
org-name:       Maxis Broadband Sdn.Bhd
org-type:       LIR
country:        MY
address:        Level 14, Menara Maxis,
address:        Kuala Lumpur City Centre,
address:        Off Jalan Ampang
phone:          +60-3-2300-3000
fax-no:         +60-3-2300-0053
e-mail:         peering@maxis.com.my
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:14:52Z
source:         APNIC

role:           ABUSE MAXISBROADBANDMY
country:        ZZ
address:        Level 19, Menara Maxis,
address:        KLCC, 50088 Kuala Lumpur
address:        Malaysia
phone:          +000000000
e-mail:         abuse@maxis.com.my
admin-c:        KG360-AP
tech-c:         KG360-AP
nic-hdl:        AM2470-AP
remarks:        Generated from irt object IRT-MAXISBROADBAND-MY
remarks:        abuse@maxis.com.my is invalid
abuse-mailbox:  abuse@maxis.com.my
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-04T18:10:04Z
source:         APNIC

person:         Maheson Nadaraja
nic-hdl:        MN167-AP
e-mail:         nmaheso@maxis.com.my
address:        Plot 12155(Lot 13),
address:        Jalan Delima 1/1
address:        Subang Hi-Tech Industrial Park
address:        40000 Shah Alam, Selangor, Malaysia
phone:          +60-12-2000170
fax-no:         +60-3-58800225
country:        MY
mnt-by:         MAINT-MY-MAXIS
last-modified:  2008-09-04T07:29:52Z
source:         APNIC

person:         Maxis Network and Security Operations
nic-hdl:        MO113-AP
remarks:        Please send spam report, virus alert or any others
remarks:        abuse report trouble to abuse@maxis.com.my
e-mail:         abuse@maxis.com.my
address:        Level 19, Menara Maxis,
address:        KLCC, 50088 Kuala Lumpur
address:        Malaysia
phone:          +603-2330-7500
fax-no:         +603-2330-0587
country:        MY
mnt-by:         MAINT-MY-MAXIS
last-modified:  2008-11-07T08:55:51Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.71.239.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63999
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;58.71.239.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051300 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 13 21:40:24 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 99.239.71.58.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.239.71.58.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.22.52.46 attack
Unauthorized connection attempt from IP address 113.22.52.46 on Port 445(SMB)
2019-08-27 16:38:32
187.174.102.130 attackspambots
Unauthorized connection attempt from IP address 187.174.102.130 on Port 445(SMB)
2019-08-27 17:06:40
222.252.16.140 attack
Aug 27 05:05:39 ny01 sshd[23324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.16.140
Aug 27 05:05:41 ny01 sshd[23324]: Failed password for invalid user bsnl from 222.252.16.140 port 55462 ssh2
Aug 27 05:10:35 ny01 sshd[24164]: Failed password for root from 222.252.16.140 port 44576 ssh2
2019-08-27 17:12:00
62.210.149.143 attackbots
Aug 27 03:32:21 server2 sshd\[31456\]: Invalid user ismail from 62.210.149.143
Aug 27 03:32:21 server2 sshd\[31459\]: Invalid user jack from 62.210.149.143
Aug 27 03:32:22 server2 sshd\[31461\]: Invalid user james from 62.210.149.143
Aug 27 03:32:22 server2 sshd\[31463\]: Invalid user jaxson from 62.210.149.143
Aug 27 03:32:22 server2 sshd\[31465\]: Invalid user jean from 62.210.149.143
Aug 27 03:32:22 server2 sshd\[31467\]: Invalid user jeff from 62.210.149.143
2019-08-27 16:33:10
23.129.64.194 attackspambots
2019-08-27T10:39:02.904898  sshd[24951]: Invalid user user from 23.129.64.194 port 17629
2019-08-27T10:39:02.919149  sshd[24951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.194
2019-08-27T10:39:02.904898  sshd[24951]: Invalid user user from 23.129.64.194 port 17629
2019-08-27T10:39:05.154303  sshd[24951]: Failed password for invalid user user from 23.129.64.194 port 17629 ssh2
2019-08-27T10:39:02.919149  sshd[24951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.194
2019-08-27T10:39:02.904898  sshd[24951]: Invalid user user from 23.129.64.194 port 17629
2019-08-27T10:39:05.154303  sshd[24951]: Failed password for invalid user user from 23.129.64.194 port 17629 ssh2
2019-08-27T10:39:09.360365  sshd[24951]: Failed password for invalid user user from 23.129.64.194 port 17629 ssh2
...
2019-08-27 16:45:20
114.40.168.29 attackbotsspam
Unauthorised access (Aug 27) SRC=114.40.168.29 LEN=40 PREC=0x20 TTL=49 ID=14261 TCP DPT=23 WINDOW=36068 SYN
2019-08-27 17:05:29
153.126.129.65 attackspam
$f2bV_matches
2019-08-27 16:55:53
51.83.42.33 attack
Aug 27 06:03:27 rpi sshd[15271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.42.33 
Aug 27 06:03:28 rpi sshd[15271]: Failed password for invalid user sakura from 51.83.42.33 port 50672 ssh2
2019-08-27 16:39:07
167.71.96.195 attackbots
Invalid user admin from 167.71.96.195 port 53108
2019-08-27 16:58:32
221.122.115.61 attackbots
Automatic report - Banned IP Access
2019-08-27 16:39:38
148.70.63.163 attackbots
Aug 26 18:51:08 hiderm sshd\[2516\]: Invalid user premier from 148.70.63.163
Aug 26 18:51:08 hiderm sshd\[2516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.63.163
Aug 26 18:51:11 hiderm sshd\[2516\]: Failed password for invalid user premier from 148.70.63.163 port 52080 ssh2
Aug 26 18:56:18 hiderm sshd\[2921\]: Invalid user kumari from 148.70.63.163
Aug 26 18:56:18 hiderm sshd\[2921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.63.163
2019-08-27 16:34:10
104.248.174.126 attackspambots
Brute force SMTP login attempted.
...
2019-08-27 16:46:56
213.209.114.26 attackspam
Aug 27 11:10:30 lnxmail61 sshd[20480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.209.114.26
2019-08-27 17:14:59
164.132.56.243 attack
Invalid user bot from 164.132.56.243 port 44121
2019-08-27 16:43:46
211.152.62.14 attack
Invalid user ts3 from 211.152.62.14 port 57724
2019-08-27 16:42:26

Recently Reported IPs

39.100.81.231 74.48.144.143 149.56.160.175 66.132.172.178
176.65.139.231 198.199.104.186 2606:4700:10::6814:6640 2606:4700:10::6814:8896
49.175.36.22 74.41.154.158 182.187.88.177 212.73.148.41
43.128.73.132 39.98.88.157 39.173.105.161 122.193.247.161
5.226.140.10 31.14.254.42 185.216.145.172 139.135.60.0