城市(city): Kuala Lumpur
省份(region): Kuala Lumpur
国家(country): Malaysia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 161.142.0.0 - 161.143.255.255
CIDR: 161.142.0.0/15
NetName: APNIC-ERX-161-142-0-0
NetHandle: NET-161-142-0-0-1
Parent: NET161 (NET-161-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2004-02-18
Updated: 2009-10-08
Comment: This IP address range is not registered in the ARIN database.
Comment: This range was transferred to the APNIC Whois Database as
Comment: part of the ERX (Early Registration Transfer) project.
Comment: For details, refer to the APNIC Whois Database via
Comment: WHOIS.APNIC.NET or http://wq.apnic.net/apnic-bin/whois.pl
Comment:
Comment: ** IMPORTANT NOTE: APNIC is the Regional Internet Registry
Comment: for the Asia Pacific region. APNIC does not operate networks
Comment: using this IP address range and is not able to investigate
Comment: spam or abuse reports relating to these addresses. For more
Comment: help, refer to http://www.apnic.net/apnic-info/whois_search2/abuse-and-spamming
Ref: https://rdap.arin.net/registry/ip/161.142.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: http://wq.apnic.net/whois-search/static/search.html
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '161.142.0.0 - 161.142.255.255'
% Abuse contact for '161.142.0.0 - 161.142.255.255' is 'abuse@time.com.my'
inetnum: 161.142.0.0 - 161.142.255.255
netname: TTDOTCOM-MY
descr: TT DOTCOM SDN BHD
descr: LOT 14, JALAN U1/26
descr: SEKSYEN U1
descr: HICOM GLENMARIE INDUSTRIAL PARK
descr: SHAH ALAM, SELANGOR 40150
country: MY
org: ORG-TDSB1-AP
admin-c: TDSB3-AP
tech-c: TDSB3-AP
abuse-c: AT1186-AP
status: ALLOCATED PORTABLE
mnt-by: APNIC-HM
mnt-lower: MAINT-TTDOTCOM-MY
mnt-routes: MAINT-TTDOTCOM-MY
mnt-irt: IRT-TTDOTCOM-MY
last-modified: 2020-10-20T00:58:48Z
source: APNIC
irt: IRT-TTDOTCOM-MY
address: LOT 14, JALAN U1/26, SEKSYEN U1, HICOM GLENMARIE INDUSTRIAL PARK, SHAH ALAM SELANGOR 40150
e-mail: abuse@time.com.my
abuse-mailbox: abuse@time.com.my
admin-c: TDSB3-AP
tech-c: TDSB3-AP
auth: # Filtered
remarks: abuse@time.com.my was validated on 2026-01-02
mnt-by: MAINT-TTDOTCOM-MY
last-modified: 2026-03-27T06:59:39Z
source: APNIC
organisation: ORG-TDSB1-AP
org-name: TT DOTCOM SDN BHD
org-type: LIR
country: MY
address: LOT 14, JALAN U1/26
address: SEKSYEN U1
address: HICOM GLENMARIE INDUSTRIAL PARK
phone: +60-3-5039-3000
fax-no: +60-3-5032-6353
e-mail: hostmaster@time.com.my
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:16:47Z
source: APNIC
role: ABUSE TTDOTCOMMY
country: ZZ
address: LOT 14, JALAN U1/26, SEKSYEN U1, HICOM GLENMARIE INDUSTRIAL PARK, SHAH ALAM SELANGOR 40150
phone: +000000000
e-mail: abuse@time.com.my
admin-c: TDSB3-AP
tech-c: TDSB3-AP
nic-hdl: AT1186-AP
remarks: Generated from irt object IRT-TTDOTCOM-MY
remarks: abuse@time.com.my was validated on 2026-01-02
abuse-mailbox: abuse@time.com.my
mnt-by: APNIC-ABUSE
last-modified: 2026-01-02T03:02:09Z
source: APNIC
role: TT DOTCOM SDN BHD administrator
address: LOT 14, JALAN U1/26, SEKSYEN U1, HICOM GLENMARIE INDUSTRIAL PARK, SHAH ALAM SELANGOR 40150
country: MY
phone: +60-3-5032-6000
fax-no: +60-3-5032-6000
e-mail: abuse@time.com.my
admin-c: TDSB3-AP
tech-c: TDSB3-AP
nic-hdl: TDSB3-AP
mnt-by: MAINT-TTDOTCOM-MY
last-modified: 2016-01-25T03:32:49Z
source: APNIC
% Information related to '161.142.128.0/19AS9930'
route: 161.142.128.0/19
origin: AS9930
descr: TT DOTCOM SDN BHD
LOT 14, JALAN U1/26
SEKSYEN U1
HICOM GLENMARIE INDUSTRIAL PARK
mnt-by: MAINT-TTDOTCOM-MY
last-modified: 2019-09-17T00:46:12Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.142.151.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36459
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;161.142.151.234. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040501 1800 900 604800 86400
;; Query time: 4 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 06 14:00:59 CST 2026
;; MSG SIZE rcvd: 108
Host 234.151.142.161.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 234.151.142.161.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 170.254.73.54 | attackspam | Unauthorized connection attempt detected from IP address 170.254.73.54 to port 80 |
2020-01-03 15:46:37 |
| 61.94.102.72 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 03-01-2020 04:50:11. |
2020-01-03 15:55:48 |
| 128.199.132.137 | attackspam | Fail2Ban Ban Triggered |
2020-01-03 15:47:51 |
| 125.16.97.246 | attackbotsspam | Jan 3 07:39:10 server sshd\[4460\]: Invalid user arma3server from 125.16.97.246 Jan 3 07:39:10 server sshd\[4460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.16.97.246 Jan 3 07:39:12 server sshd\[4460\]: Failed password for invalid user arma3server from 125.16.97.246 port 36792 ssh2 Jan 3 07:50:40 server sshd\[7436\]: Invalid user gaz from 125.16.97.246 Jan 3 07:50:40 server sshd\[7436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.16.97.246 ... |
2020-01-03 15:40:31 |
| 180.247.47.130 | attack | 1578027011 - 01/03/2020 05:50:11 Host: 180.247.47.130/180.247.47.130 Port: 445 TCP Blocked |
2020-01-03 15:48:38 |
| 148.66.135.152 | attack | Automatic report - XMLRPC Attack |
2020-01-03 15:25:07 |
| 125.164.224.245 | attackspam | 1578027028 - 01/03/2020 05:50:28 Host: 125.164.224.245/125.164.224.245 Port: 445 TCP Blocked |
2020-01-03 15:48:07 |
| 85.95.175.15 | attack | Jan 3 08:35:19 sd-53420 sshd\[8297\]: Invalid user wls from 85.95.175.15 Jan 3 08:35:19 sd-53420 sshd\[8297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.95.175.15 Jan 3 08:35:22 sd-53420 sshd\[8297\]: Failed password for invalid user wls from 85.95.175.15 port 49893 ssh2 Jan 3 08:37:34 sd-53420 sshd\[8961\]: Invalid user thaiset from 85.95.175.15 Jan 3 08:37:34 sd-53420 sshd\[8961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.95.175.15 ... |
2020-01-03 15:50:07 |
| 154.73.203.132 | attackspambots | Brute force SMTP login attempts. |
2020-01-03 15:35:23 |
| 114.219.56.219 | attackbots | Port scan on 1 port(s): 22 |
2020-01-03 15:55:24 |
| 119.29.242.48 | attack | Invalid user sakshi from 119.29.242.48 port 37520 |
2020-01-03 15:51:50 |
| 91.106.170.33 | attack | Automatic report - Port Scan Attack |
2020-01-03 15:25:57 |
| 218.245.2.231 | attackspam | Unauthorised access (Jan 3) SRC=218.245.2.231 LEN=40 TTL=243 ID=54563 TCP DPT=1433 WINDOW=1024 SYN |
2020-01-03 15:44:55 |
| 24.126.198.9 | attackspambots | firewall-block, port(s): 5555/tcp |
2020-01-03 16:02:09 |
| 36.71.54.191 | attack | 1578027056 - 01/03/2020 05:50:56 Host: 36.71.54.191/36.71.54.191 Port: 445 TCP Blocked |
2020-01-03 15:30:12 |