必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kuala Lumpur

省份(region): Kuala Lumpur

国家(country): Malaysia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.9.148.0 - 103.9.151.255'

% Abuse contact for '103.9.148.0 - 103.9.151.255' is 'abuse@isp.my'

inetnum:        103.9.148.0 - 103.9.151.255
netname:        NAXLEVEL-MY
descr:          B-3A-6, Kuchai Exchange
descr:          Jalan Kuchai Maju 13
country:        MY
org:            ORG-NNSB1-AP
admin-c:        NNSB1-AP
tech-c:         NNSB1-AP
abuse-c:        AN791-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-NAXLEVEL-MY
mnt-routes:     MAINT-NAXLEVEL-MY
mnt-irt:        IRT-NAXLEVEL-MY
last-modified:  2024-11-15T00:59:09Z
source:         APNIC

irt:            IRT-NAXLEVEL-MY
address:        B-3A-6, Kuchai Exchange, Jalan Kuchai Maju 13, 58200 KL Malaysia.
e-mail:         west@isp.my
abuse-mailbox:  abuse@isp.my
admin-c:        NNSB1-AP
tech-c:         NNSB1-AP
auth:           # Filtered
remarks:        west@isp.my was validated on 2026-02-26
remarks:        abuse@isp.my was validated on 2026-02-27
mnt-by:         MAINT-NAXLEVEL-MY
last-modified:  2026-02-27T03:02:23Z
source:         APNIC

organisation:   ORG-NNSB1-AP
org-name:       NAXLEVEL Network Sdn. Bhd.
org-type:       LIR
country:        MY
address:        B-3A-6, Kuchai Exchange
address:        Jalan Kuchai Maju 13
phone:          +60125058733
e-mail:         stenly@naxlevel.com.my
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:15:59Z
source:         APNIC

role:           ABUSE NAXLEVELMY
country:        ZZ
address:        B-3A-6, Kuchai Exchange, Jalan Kuchai Maju 13, 58200 KL Malaysia.
phone:          +000000000
e-mail:         west@isp.my
admin-c:        NNSB1-AP
tech-c:         NNSB1-AP
nic-hdl:        AN791-AP
remarks:        Generated from irt object IRT-NAXLEVEL-MY
remarks:        west@isp.my was validated on 2026-02-26
remarks:        abuse@isp.my was validated on 2026-02-27
abuse-mailbox:  abuse@isp.my
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-27T03:02:41Z
source:         APNIC

role:           NAXLEVEL NETWORK SDN BHD - network administrator
address:        B-3A-6, Kuchai Exchange, Jalan Kuchai Maju 13, 58200 KL Malaysia.
country:        MY
phone:          +60377818733
e-mail:         west@isp.my
admin-c:        NNSB1-AP
tech-c:         NNSB1-AP
nic-hdl:        NNSB1-AP
mnt-by:         MAINT-NAXLEVEL-MY
last-modified:  2012-05-16T05:09:09Z
source:         APNIC

% Information related to '103.9.150.0/24AS5065'

route:          103.9.150.0/24
origin:         AS5065
descr:          NAXLEVEL Network Sdn. Bhd.
                B-3A-6, Kuchai Exchange
                Jalan Kuchai Maju 13
mnt-by:         MAINT-NAXLEVEL-MY
last-modified:  2025-05-18T16:02:13Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.9.150.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14558
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.9.150.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042601 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 27 04:06:05 CST 2026
;; MSG SIZE  rcvd: 104
HOST信息:
Host 1.150.9.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 1.150.9.103.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
76.10.14.25 attack
2020-01-29T23:49:36.254811suse-nuc sshd[15706]: Invalid user puspotkata from 76.10.14.25 port 34332
...
2020-02-18 08:51:59
176.59.49.254 attackspambots
20/2/17@18:02:56: FAIL: Alarm-Network address from=176.59.49.254
20/2/17@18:02:56: FAIL: Alarm-Network address from=176.59.49.254
...
2020-02-18 08:32:40
77.117.145.133 attackspam
2020-01-29T13:49:21.308066suse-nuc sshd[23317]: Invalid user lucas from 77.117.145.133 port 54836
...
2020-02-18 08:37:36
139.155.55.30 attack
Feb 17 23:30:50 vpn01 sshd[11711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.55.30
Feb 17 23:30:52 vpn01 sshd[11711]: Failed password for invalid user nam from 139.155.55.30 port 49686 ssh2
...
2020-02-18 08:33:08
77.194.59.160 attack
2019-12-06T09:16:49.348635suse-nuc sshd[28422]: Invalid user pi from 77.194.59.160 port 36174
...
2020-02-18 08:30:04
91.203.193.85 attack
2020-02-18 08:39:14
159.65.7.153 attackbots
02/17/2020-23:09:50.171339 159.65.7.153 Protocol: 6 ET POLICY Cleartext WordPress Login
2020-02-18 08:23:57
80.227.12.38 attackspam
Feb 18 00:48:33 *** sshd[11397]: Invalid user test from 80.227.12.38
2020-02-18 08:52:47
138.99.216.112 attackspam
SMTP Brute-Force
2020-02-18 08:53:32
77.205.41.39 attackbotsspam
2020-02-01T08:07:57.524566suse-nuc sshd[29363]: Invalid user devuser from 77.205.41.39 port 48808
...
2020-02-18 08:23:14
77.12.68.123 attackbots
2019-12-24T17:12:44.322122suse-nuc sshd[29899]: Invalid user pi from 77.12.68.123 port 50248
2019-12-24T17:12:44.486997suse-nuc sshd[29900]: Invalid user pi from 77.12.68.123 port 50250
...
2020-02-18 08:38:04
37.117.226.110 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 08:48:07
185.51.202.237 attackbots
port scan and connect, tcp 1433 (ms-sql-s)
2020-02-18 08:31:08
106.12.47.171 attack
Feb 18 01:01:15 legacy sshd[3547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.47.171
Feb 18 01:01:18 legacy sshd[3547]: Failed password for invalid user jeremy from 106.12.47.171 port 33914 ssh2
Feb 18 01:04:25 legacy sshd[3801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.47.171
...
2020-02-18 08:16:52
77.202.192.113 attackbots
Feb 18 00:21:53 sd-126173 sshd[12120]: Invalid user pi from 77.202.192.113 port 43612
Feb 18 00:21:53 sd-126173 sshd[12119]: Invalid user pi from 77.202.192.113 port 43610
2020-02-18 08:24:56

最近上报的IP列表

14.207.194.168 104.243.35.104 147.224.137.108 98.81.162.40
58.19.28.39 39.154.8.110 27.196.194.45 223.90.8.140
223.73.0.40 162.216.149.130 120.235.41.87 120.230.14.41
116.132.47.254 112.51.215.98 112.20.22.132 101.26.28.132
122.193.247.160 121.230.89.64 2606:4700:10::6814:8393 2606:4700:10::6814:4414