City: unknown
Region: unknown
Country: Thailand
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.14.164.0 - 103.14.164.255'
% Abuse contact for '103.14.164.0 - 103.14.164.255' is 'abuse@siam-ns.net'
inetnum: 103.14.164.0 - 103.14.164.255
netname: TRUE-Corporate
descr: TRUE INTERNET CO.,LTD.
country: TH
admin-c: BW1011-AP
tech-c: BW1011-AP
abuse-c: BW1011-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-SIAM-NET-TH
mnt-irt: IRT-SIAM-NET-TH
last-modified: 2025-05-06T21:49:27Z
remarks: Geofeed http://bunnycommunications.com/geofeed.csv
source: APNIC
irt: IRT-SIAM-NET-TH
address: 94/99(Room No.709),Floor7,Ratchada City,Condo,Pratcharachbumpen,Huay-kwang,Bangkok,10310,Thailand
e-mail: info@siam-ns.net
abuse-mailbox: abuse@siam-ns.net
admin-c: SNSC1-AP
tech-c: SNSC1-AP
auth: # Filtered
remarks: info@siam-ns.net was validated on 2026-02-17
remarks: abuse@siam-ns.net was validated on 2026-02-17
mnt-by: MAINT-SIAM-NET-TH
last-modified: 2026-02-17T21:46:59Z
source: APNIC
person: Bunny Wu
address: 5 Brewster Street, #2039, Glen Cove, NY 11542
country: US
phone: +1-4246668389
e-mail: wu@bunnycommunications.com
nic-hdl: BW1011-AP
mnt-by: MAINT-DIL-JP
last-modified: 2025-04-13T10:10:52Z
source: APNIC
% Information related to '103.14.164.0/24AS38082'
route: 103.14.164.0/24
origin: AS38082
descr: SIAM NETWORK SERVICE CO., LTD.
94/99(Room No.709),Floor7,
Ratchada City,Condo,
Pratcharachbumpen
mnt-by: MAINT-SIAM-NET-TH
last-modified: 2024-11-06T23:34:23Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.14.164.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50624
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.14.164.114. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026030201 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 03 12:26:23 CST 2026
;; MSG SIZE rcvd: 107
Host 114.164.14.103.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 114.164.14.103.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 157.55.39.29 | attackbots | Automatic report - Banned IP Access |
2020-05-02 22:06:56 |
| 69.28.234.137 | attackspam | May 2 15:31:34 server sshd[32517]: Failed password for invalid user user from 69.28.234.137 port 34749 ssh2 May 2 15:45:44 server sshd[1144]: Failed password for invalid user mai from 69.28.234.137 port 51066 ssh2 May 2 15:59:50 server sshd[1719]: Failed password for invalid user mn from 69.28.234.137 port 39247 ssh2 |
2020-05-02 22:17:32 |
| 141.98.9.137 | attackspam | Brute-force attempt banned |
2020-05-02 22:21:53 |
| 106.12.55.112 | attackbots | May 2 17:13:35 gw1 sshd[15945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.55.112 May 2 17:13:37 gw1 sshd[15945]: Failed password for invalid user ofsaa from 106.12.55.112 port 48764 ssh2 ... |
2020-05-02 22:27:54 |
| 106.38.241.145 | attackbots | Automatic report - Banned IP Access |
2020-05-02 22:45:12 |
| 195.154.133.163 | attackspambots | 195.154.133.163 - - [02/May/2020:18:07:35 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2" ... |
2020-05-02 22:11:27 |
| 64.227.37.54 | attackspam | SSH-bruteforce attempts |
2020-05-02 22:29:09 |
| 118.27.24.127 | attackbotsspam | leo_www |
2020-05-02 22:47:16 |
| 139.59.17.33 | attack | May 2 14:45:16 [host] sshd[22168]: Invalid user a May 2 14:45:16 [host] sshd[22168]: pam_unix(sshd: May 2 14:45:18 [host] sshd[22168]: Failed passwor |
2020-05-02 22:46:22 |
| 190.85.54.158 | attackbots | May 2 14:27:24 inter-technics sshd[20464]: Invalid user test from 190.85.54.158 port 41169 May 2 14:27:24 inter-technics sshd[20464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.54.158 May 2 14:27:24 inter-technics sshd[20464]: Invalid user test from 190.85.54.158 port 41169 May 2 14:27:26 inter-technics sshd[20464]: Failed password for invalid user test from 190.85.54.158 port 41169 ssh2 May 2 14:31:58 inter-technics sshd[21446]: Invalid user teapot from 190.85.54.158 port 46098 ... |
2020-05-02 22:26:22 |
| 5.39.75.36 | attack | May 2 13:53:36 *** sshd[8292]: Invalid user sistema from 5.39.75.36 |
2020-05-02 22:48:29 |
| 104.236.112.52 | attack | 2020-05-02T14:08:10.015291randservbullet-proofcloud-66.localdomain sshd[16075]: Invalid user ijc from 104.236.112.52 port 48216 2020-05-02T14:08:10.019643randservbullet-proofcloud-66.localdomain sshd[16075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.112.52 2020-05-02T14:08:10.015291randservbullet-proofcloud-66.localdomain sshd[16075]: Invalid user ijc from 104.236.112.52 port 48216 2020-05-02T14:08:11.893954randservbullet-proofcloud-66.localdomain sshd[16075]: Failed password for invalid user ijc from 104.236.112.52 port 48216 ssh2 ... |
2020-05-02 22:41:47 |
| 106.13.162.168 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-05-02 22:32:14 |
| 89.39.208.21 | attack | xmlrpc attack |
2020-05-02 22:44:25 |
| 151.177.154.199 | attackbots | Port probing on unauthorized port 23 |
2020-05-02 22:32:47 |