City: Kuala Lumpur
Region: Kuala Lumpur
Country: Malaysia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '61.4.104.0 - 61.4.107.255'
% Abuse contact for '61.4.104.0 - 61.4.107.255' is 'abuse@thegigabit.com'
inetnum: 61.4.104.0 - 61.4.107.255
netname: GIGABIT-MY
descr: Gigabit Hosting Sdn Bhd
descr: 26-1 Jalan Awan Mamkur
descr: Taman OUG Square
country: MY
org: ORG-GHSB1-AP
admin-c: GHSB1-AP
tech-c: GHSB1-AP
abuse-c: AG708-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-GIGABIT-MY
mnt-routes: MAINT-GIGABIT-MY
mnt-irt: IRT-GIGABIT-MY
last-modified: 2021-11-11T06:23:34Z
source: APNIC
irt: IRT-GIGABIT-MY
address: 26-1, Jalan Awan Makmur, Taman OUG Square, 58100, Kuala Lumpur, Malaysia
e-mail: abuse@thegigabit.com
abuse-mailbox: abuse@thegigabit.com
admin-c: GHSB1-AP
tech-c: GHSB1-AP
auth: # Filtered
remarks: abuse@thegigabit.com was validated on 2025-06-24
mnt-by: MAINT-GIGABIT-MY
last-modified: 2025-09-04T05:48:23Z
source: APNIC
organisation: ORG-GHSB1-AP
org-name: Gigabit Hosting Sdn Bhd
org-type: LIR
country: MY
address: 5-2, 3rd Mile Square
address: 151, Jalan Klang Lama
phone: +603-7927-9149
e-mail: abuse@thegigabit.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:15:41Z
source: APNIC
role: ABUSE GIGABITMY
country: ZZ
address: 26-1, Jalan Awan Makmur, Taman OUG Square, 58100, Kuala Lumpur, Malaysia
phone: +000000000
e-mail: abuse@thegigabit.com
admin-c: GHSB1-AP
tech-c: GHSB1-AP
nic-hdl: AG708-AP
remarks: Generated from irt object IRT-GIGABIT-MY
remarks: abuse@thegigabit.com was validated on 2025-06-24
abuse-mailbox: abuse@thegigabit.com
mnt-by: APNIC-ABUSE
last-modified: 2025-06-24T13:08:28Z
source: APNIC
role: GIGABIT HOSTING SDN BHD - Network Administrator
address: 26-1, Jalan Awan Makmur, Taman OUG Square, 58100, Kuala Lumpur, Malaysia
country: MY
phone: +603-77818733
e-mail: support@thegigabit.com
admin-c: GHSB1-AP
tech-c: GHSB1-AP
nic-hdl: GHSB1-AP
mnt-by: MAINT-GIGABIT-MY
last-modified: 2010-08-16T07:59:29Z
source: APNIC
% Information related to '61.4.105.0/24AS55720'
route: 61.4.105.0/24
origin: AS55720
descr: Gigabit Hosting Sdn Bhd
5-2, 3rd Mile Square
151, Jalan Klang Lama
mnt-by: MAINT-GIGABIT-MY
last-modified: 2021-11-30T13:26:27Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.4.105.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14062
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;61.4.105.50. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101400 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 14 15:10:01 CST 2025
;; MSG SIZE rcvd: 104
Host 50.105.4.61.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 50.105.4.61.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
122.51.187.118 | attackbots | SSH Invalid Login |
2020-10-02 06:38:35 |
51.255.168.254 | attackbots | 2020-10-01T16:07:39.9920301495-001 sshd[13096]: Failed password for invalid user git from 51.255.168.254 port 45142 ssh2 2020-10-01T16:11:20.1553441495-001 sshd[13246]: Invalid user ftpsecure from 51.255.168.254 port 54852 2020-10-01T16:11:20.1639341495-001 sshd[13246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=254.ip-51-255-168.eu 2020-10-01T16:11:20.1553441495-001 sshd[13246]: Invalid user ftpsecure from 51.255.168.254 port 54852 2020-10-01T16:11:22.4693641495-001 sshd[13246]: Failed password for invalid user ftpsecure from 51.255.168.254 port 54852 ssh2 2020-10-01T16:15:08.8156971495-001 sshd[13388]: Invalid user laravel from 51.255.168.254 port 36330 ... |
2020-10-02 06:42:56 |
117.28.25.50 | attackbotsspam | Oct 2 01:12:42 pkdns2 sshd\[52390\]: Invalid user user from 117.28.25.50Oct 2 01:12:43 pkdns2 sshd\[52390\]: Failed password for invalid user user from 117.28.25.50 port 8686 ssh2Oct 2 01:16:58 pkdns2 sshd\[52604\]: Invalid user bitbucket from 117.28.25.50Oct 2 01:17:00 pkdns2 sshd\[52604\]: Failed password for invalid user bitbucket from 117.28.25.50 port 8707 ssh2Oct 2 01:20:59 pkdns2 sshd\[52786\]: Invalid user scan from 117.28.25.50Oct 2 01:21:01 pkdns2 sshd\[52786\]: Failed password for invalid user scan from 117.28.25.50 port 8721 ssh2 ... |
2020-10-02 06:33:22 |
158.69.0.38 | attackspam | SSH Invalid Login |
2020-10-02 06:07:57 |
194.87.138.211 | attackbotsspam | frenzy |
2020-10-02 06:21:27 |
185.58.195.232 | attackspambots | 2020-10-01T20:27:34.730837mail.broermann.family sshd[28589]: Failed password for invalid user private from 185.58.195.232 port 34815 ssh2 2020-10-01T20:31:05.423076mail.broermann.family sshd[28977]: Invalid user luis from 185.58.195.232 port 43202 2020-10-01T20:31:05.428327mail.broermann.family sshd[28977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.58.195.232 2020-10-01T20:31:05.423076mail.broermann.family sshd[28977]: Invalid user luis from 185.58.195.232 port 43202 2020-10-01T20:31:06.980544mail.broermann.family sshd[28977]: Failed password for invalid user luis from 185.58.195.232 port 43202 ssh2 ... |
2020-10-02 06:17:58 |
203.66.14.161 | attack | Oct 1 11:48:13 vps46666688 sshd[14450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.66.14.161 Oct 1 11:48:15 vps46666688 sshd[14450]: Failed password for invalid user botuser from 203.66.14.161 port 46376 ssh2 ... |
2020-10-02 06:43:18 |
164.90.181.196 | attack | 164.90.181.196 - - [01/Oct/2020:22:07:17 +0100] "POST /wp-login.php HTTP/1.1" 200 2596 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 164.90.181.196 - - [01/Oct/2020:22:07:23 +0100] "POST /wp-login.php HTTP/1.1" 200 2597 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 164.90.181.196 - - [01/Oct/2020:22:07:23 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-10-02 06:18:11 |
112.78.11.50 | attackspam | prod8 ... |
2020-10-02 06:13:44 |
49.88.112.73 | attackspambots | Oct 1 21:56:43 game-panel sshd[28987]: Failed password for root from 49.88.112.73 port 39609 ssh2 Oct 1 21:56:44 game-panel sshd[28987]: Failed password for root from 49.88.112.73 port 39609 ssh2 Oct 1 21:56:46 game-panel sshd[28987]: Failed password for root from 49.88.112.73 port 39609 ssh2 |
2020-10-02 06:17:23 |
106.13.75.154 | attackspambots | Oct 1 23:41:47 inter-technics sshd[19218]: Invalid user cam from 106.13.75.154 port 58380 Oct 1 23:41:47 inter-technics sshd[19218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.75.154 Oct 1 23:41:47 inter-technics sshd[19218]: Invalid user cam from 106.13.75.154 port 58380 Oct 1 23:41:50 inter-technics sshd[19218]: Failed password for invalid user cam from 106.13.75.154 port 58380 ssh2 Oct 1 23:43:39 inter-technics sshd[19305]: Invalid user prueba1 from 106.13.75.154 port 57942 ... |
2020-10-02 06:10:43 |
210.86.239.186 | attack | Oct 2 00:14:07 vps647732 sshd[32018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.86.239.186 Oct 2 00:14:08 vps647732 sshd[32018]: Failed password for invalid user skaner from 210.86.239.186 port 46032 ssh2 ... |
2020-10-02 06:32:20 |
42.194.143.72 | attackspam | Sep 30 19:53:01 vps46666688 sshd[26805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.194.143.72 Sep 30 19:53:03 vps46666688 sshd[26805]: Failed password for invalid user mike from 42.194.143.72 port 18845 ssh2 ... |
2020-10-02 06:22:54 |
177.124.201.61 | attackspam | Invalid user net from 177.124.201.61 port 50500 |
2020-10-02 06:31:48 |
66.41.236.80 | attack | [f2b] sshd bruteforce, retries: 1 |
2020-10-02 06:30:41 |