城市(city): Kuala Lumpur
省份(region): Kuala Lumpur
国家(country): Malaysia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.9.148.0 - 103.9.151.255'
% Abuse contact for '103.9.148.0 - 103.9.151.255' is 'abuse@isp.my'
inetnum: 103.9.148.0 - 103.9.151.255
netname: NAXLEVEL-MY
descr: B-3A-6, Kuchai Exchange
descr: Jalan Kuchai Maju 13
country: MY
org: ORG-NNSB1-AP
admin-c: NNSB1-AP
tech-c: NNSB1-AP
abuse-c: AN791-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-NAXLEVEL-MY
mnt-routes: MAINT-NAXLEVEL-MY
mnt-irt: IRT-NAXLEVEL-MY
last-modified: 2024-11-15T00:59:09Z
source: APNIC
irt: IRT-NAXLEVEL-MY
address: B-3A-6, Kuchai Exchange, Jalan Kuchai Maju 13, 58200 KL Malaysia.
e-mail: west@isp.my
abuse-mailbox: abuse@isp.my
admin-c: NNSB1-AP
tech-c: NNSB1-AP
auth: # Filtered
remarks: west@isp.my was validated on 2026-02-26
remarks: abuse@isp.my was validated on 2026-02-27
mnt-by: MAINT-NAXLEVEL-MY
last-modified: 2026-02-27T03:02:23Z
source: APNIC
organisation: ORG-NNSB1-AP
org-name: NAXLEVEL Network Sdn. Bhd.
org-type: LIR
country: MY
address: B-3A-6, Kuchai Exchange
address: Jalan Kuchai Maju 13
phone: +60125058733
e-mail: stenly@naxlevel.com.my
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:15:59Z
source: APNIC
role: ABUSE NAXLEVELMY
country: ZZ
address: B-3A-6, Kuchai Exchange, Jalan Kuchai Maju 13, 58200 KL Malaysia.
phone: +000000000
e-mail: west@isp.my
admin-c: NNSB1-AP
tech-c: NNSB1-AP
nic-hdl: AN791-AP
remarks: Generated from irt object IRT-NAXLEVEL-MY
remarks: west@isp.my was validated on 2026-02-26
remarks: abuse@isp.my was validated on 2026-02-27
abuse-mailbox: abuse@isp.my
mnt-by: APNIC-ABUSE
last-modified: 2026-02-27T03:02:41Z
source: APNIC
role: NAXLEVEL NETWORK SDN BHD - network administrator
address: B-3A-6, Kuchai Exchange, Jalan Kuchai Maju 13, 58200 KL Malaysia.
country: MY
phone: +60377818733
e-mail: west@isp.my
admin-c: NNSB1-AP
tech-c: NNSB1-AP
nic-hdl: NNSB1-AP
mnt-by: MAINT-NAXLEVEL-MY
last-modified: 2012-05-16T05:09:09Z
source: APNIC
% Information related to '103.9.150.0/24AS5065'
route: 103.9.150.0/24
origin: AS5065
descr: NAXLEVEL Network Sdn. Bhd.
B-3A-6, Kuchai Exchange
Jalan Kuchai Maju 13
mnt-by: MAINT-NAXLEVEL-MY
last-modified: 2025-05-18T16:02:13Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.9.150.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14558
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.9.150.1. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042601 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 27 04:06:05 CST 2026
;; MSG SIZE rcvd: 104
Host 1.150.9.103.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 1.150.9.103.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 76.10.14.25 | attack | 2020-01-29T23:49:36.254811suse-nuc sshd[15706]: Invalid user puspotkata from 76.10.14.25 port 34332 ... |
2020-02-18 08:51:59 |
| 176.59.49.254 | attackspambots | 20/2/17@18:02:56: FAIL: Alarm-Network address from=176.59.49.254 20/2/17@18:02:56: FAIL: Alarm-Network address from=176.59.49.254 ... |
2020-02-18 08:32:40 |
| 77.117.145.133 | attackspam | 2020-01-29T13:49:21.308066suse-nuc sshd[23317]: Invalid user lucas from 77.117.145.133 port 54836 ... |
2020-02-18 08:37:36 |
| 139.155.55.30 | attack | Feb 17 23:30:50 vpn01 sshd[11711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.55.30 Feb 17 23:30:52 vpn01 sshd[11711]: Failed password for invalid user nam from 139.155.55.30 port 49686 ssh2 ... |
2020-02-18 08:33:08 |
| 77.194.59.160 | attack | 2019-12-06T09:16:49.348635suse-nuc sshd[28422]: Invalid user pi from 77.194.59.160 port 36174 ... |
2020-02-18 08:30:04 |
| 91.203.193.85 | attack | 2020-02-18 08:39:14 | |
| 159.65.7.153 | attackbots | 02/17/2020-23:09:50.171339 159.65.7.153 Protocol: 6 ET POLICY Cleartext WordPress Login |
2020-02-18 08:23:57 |
| 80.227.12.38 | attackspam | Feb 18 00:48:33 *** sshd[11397]: Invalid user test from 80.227.12.38 |
2020-02-18 08:52:47 |
| 138.99.216.112 | attackspam | SMTP Brute-Force |
2020-02-18 08:53:32 |
| 77.205.41.39 | attackbotsspam | 2020-02-01T08:07:57.524566suse-nuc sshd[29363]: Invalid user devuser from 77.205.41.39 port 48808 ... |
2020-02-18 08:23:14 |
| 77.12.68.123 | attackbots | 2019-12-24T17:12:44.322122suse-nuc sshd[29899]: Invalid user pi from 77.12.68.123 port 50248 2019-12-24T17:12:44.486997suse-nuc sshd[29900]: Invalid user pi from 77.12.68.123 port 50250 ... |
2020-02-18 08:38:04 |
| 37.117.226.110 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-18 08:48:07 |
| 185.51.202.237 | attackbots | port scan and connect, tcp 1433 (ms-sql-s) |
2020-02-18 08:31:08 |
| 106.12.47.171 | attack | Feb 18 01:01:15 legacy sshd[3547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.47.171 Feb 18 01:01:18 legacy sshd[3547]: Failed password for invalid user jeremy from 106.12.47.171 port 33914 ssh2 Feb 18 01:04:25 legacy sshd[3801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.47.171 ... |
2020-02-18 08:16:52 |
| 77.202.192.113 | attackbots | Feb 18 00:21:53 sd-126173 sshd[12120]: Invalid user pi from 77.202.192.113 port 43612 Feb 18 00:21:53 sd-126173 sshd[12119]: Invalid user pi from 77.202.192.113 port 43610 |
2020-02-18 08:24:56 |