城市(city): unknown
省份(region): unknown
国家(country): Malaysia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 45.123.44.0 - 45.123.143.255
CIDR: 45.123.64.0/18, 45.123.44.0/22, 45.123.128.0/20, 45.123.48.0/20
NetName: APNIC
NetHandle: NET-45-123-44-0-1
Parent: NET45 (NET-45-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2014-09-05
Updated: 2021-11-08
Ref: https://rdap.arin.net/registry/ip/45.123.44.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois://whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: http://wq.apnic.net/whois-search/static/search.html
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '45.123.100.0 - 45.123.103.255'
% Abuse contact for '45.123.100.0 - 45.123.103.255' is 'abuse@isp.my'
inetnum: 45.123.100.0 - 45.123.103.255
netname: NAXLEVEL-MY
descr: NAXLEVEL Network Sdn. Bhd.
descr: B-3A-6, Kuchai Exchange
descr: Jalan Kuchai Maju 13
country: MY
org: ORG-NNSB1-AP
admin-c: NNSB1-AP
tech-c: NNSB1-AP
abuse-c: AN791-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-NAXLEVEL-MY
mnt-routes: MAINT-NAXLEVEL-MY
mnt-irt: IRT-NAXLEVEL-MY
last-modified: 2020-06-22T09:21:53Z
source: APNIC
irt: IRT-NAXLEVEL-MY
address: B-3A-6, Kuchai Exchange, Jalan Kuchai Maju 13, 58200 KL Malaysia.
e-mail: west@isp.my
abuse-mailbox: abuse@isp.my
admin-c: NNSB1-AP
tech-c: NNSB1-AP
auth: # Filtered
remarks: west@isp.my was validated on 2026-02-26
remarks: abuse@isp.my was validated on 2026-02-27
mnt-by: MAINT-NAXLEVEL-MY
last-modified: 2026-02-27T03:02:23Z
source: APNIC
organisation: ORG-NNSB1-AP
org-name: NAXLEVEL Network Sdn. Bhd.
org-type: LIR
country: MY
address: B-3A-6, Kuchai Exchange
address: Jalan Kuchai Maju 13
phone: +60125058733
e-mail: stenly@naxlevel.com.my
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:15:59Z
source: APNIC
role: ABUSE NAXLEVELMY
country: ZZ
address: B-3A-6, Kuchai Exchange, Jalan Kuchai Maju 13, 58200 KL Malaysia.
phone: +000000000
e-mail: west@isp.my
admin-c: NNSB1-AP
tech-c: NNSB1-AP
nic-hdl: AN791-AP
remarks: Generated from irt object IRT-NAXLEVEL-MY
remarks: west@isp.my was validated on 2026-02-26
remarks: abuse@isp.my was validated on 2026-02-27
abuse-mailbox: abuse@isp.my
mnt-by: APNIC-ABUSE
last-modified: 2026-02-27T03:02:41Z
source: APNIC
role: NAXLEVEL NETWORK SDN BHD - network administrator
address: B-3A-6, Kuchai Exchange, Jalan Kuchai Maju 13, 58200 KL Malaysia.
country: MY
phone: +60377818733
e-mail: west@isp.my
admin-c: NNSB1-AP
tech-c: NNSB1-AP
nic-hdl: NNSB1-AP
mnt-by: MAINT-NAXLEVEL-MY
last-modified: 2012-05-16T05:09:09Z
source: APNIC
% Information related to '45.123.100.0/24AS5065'
route: 45.123.100.0/24
origin: AS5065
descr: NAXLEVEL Network Sdn. Bhd.
B-3A-6, Kuchai Exchange
Jalan Kuchai Maju 13
mnt-by: MAINT-NAXLEVEL-MY
last-modified: 2025-05-18T16:02:14Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.123.100.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47674
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.123.100.143. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042700 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 28 01:01:02 CST 2026
;; MSG SIZE rcvd: 107
Host 143.100.123.45.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 143.100.123.45.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 104.248.124.109 | attackbots | 104.248.124.109 - - [14/Aug/2020:05:03:26 +0100] "POST /wp-login.php HTTP/1.1" 200 1791 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 104.248.124.109 - - [14/Aug/2020:05:03:28 +0100] "POST /wp-login.php HTTP/1.1" 200 1772 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 104.248.124.109 - - [14/Aug/2020:05:03:31 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-14 13:11:53 |
| 87.246.7.20 | attack | Brute Force attack - banned by Fail2Ban |
2020-08-14 13:17:11 |
| 104.168.194.225 | attackspambots | Mail contains malware |
2020-08-14 13:26:47 |
| 203.150.243.176 | attack | Aug 14 05:29:53 root sshd[25395]: Failed password for root from 203.150.243.176 port 41754 ssh2 Aug 14 05:35:58 root sshd[26198]: Failed password for root from 203.150.243.176 port 39966 ssh2 ... |
2020-08-14 13:48:55 |
| 138.197.66.68 | attackspam | $f2bV_matches |
2020-08-14 13:28:55 |
| 201.47.158.130 | attack | Aug 14 07:23:17 fhem-rasp sshd[19038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.47.158.130 user=root Aug 14 07:23:19 fhem-rasp sshd[19038]: Failed password for root from 201.47.158.130 port 44042 ssh2 ... |
2020-08-14 13:24:43 |
| 213.87.44.152 | attackspam | Aug 14 04:47:20 jumpserver sshd[146666]: Failed password for root from 213.87.44.152 port 59984 ssh2 Aug 14 04:51:41 jumpserver sshd[146749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.87.44.152 user=root Aug 14 04:51:44 jumpserver sshd[146749]: Failed password for root from 213.87.44.152 port 42946 ssh2 ... |
2020-08-14 13:42:04 |
| 51.195.148.18 | attackbotsspam | Invalid user admin from 51.195.148.18 port 43621 |
2020-08-14 13:25:32 |
| 103.98.176.188 | attackspam | Aug 14 05:33:50 piServer sshd[21790]: Failed password for root from 103.98.176.188 port 52670 ssh2 Aug 14 05:37:13 piServer sshd[22211]: Failed password for root from 103.98.176.188 port 44194 ssh2 ... |
2020-08-14 13:45:36 |
| 51.77.163.177 | attackbots | B: Abusive ssh attack |
2020-08-14 13:25:57 |
| 161.35.61.229 | attackbots | Aug 14 06:50:53 ns381471 sshd[28744]: Failed password for root from 161.35.61.229 port 52538 ssh2 |
2020-08-14 13:16:37 |
| 35.200.180.182 | attack | 35.200.180.182 - - [14/Aug/2020:04:40:45 +0100] "POST /wp-login.php HTTP/1.1" 200 1801 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 35.200.180.182 - - [14/Aug/2020:04:40:48 +0100] "POST /wp-login.php HTTP/1.1" 200 1779 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 35.200.180.182 - - [14/Aug/2020:04:40:51 +0100] "POST /wp-login.php HTTP/1.1" 200 1781 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-14 13:28:40 |
| 222.186.30.218 | attackbots | Aug 14 05:26:36 localhost sshd[94971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.218 user=root Aug 14 05:26:38 localhost sshd[94971]: Failed password for root from 222.186.30.218 port 13244 ssh2 Aug 14 05:26:41 localhost sshd[94971]: Failed password for root from 222.186.30.218 port 13244 ssh2 Aug 14 05:26:36 localhost sshd[94971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.218 user=root Aug 14 05:26:38 localhost sshd[94971]: Failed password for root from 222.186.30.218 port 13244 ssh2 Aug 14 05:26:41 localhost sshd[94971]: Failed password for root from 222.186.30.218 port 13244 ssh2 Aug 14 05:26:36 localhost sshd[94971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.218 user=root Aug 14 05:26:38 localhost sshd[94971]: Failed password for root from 222.186.30.218 port 13244 ssh2 Aug 14 05:26:41 localhost sshd[94971]: Fa ... |
2020-08-14 13:37:20 |
| 129.126.244.51 | attackbotsspam | Aug 14 05:35:07 serwer sshd\[3075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.126.244.51 user=root Aug 14 05:35:09 serwer sshd\[3075\]: Failed password for root from 129.126.244.51 port 36400 ssh2 Aug 14 05:40:18 serwer sshd\[3669\]: Invalid user 1qwerfv!@\#$ from 129.126.244.51 port 41846 Aug 14 05:40:18 serwer sshd\[3669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.126.244.51 ... |
2020-08-14 13:53:07 |
| 79.8.196.108 | attack | " " |
2020-08-14 13:50:07 |