City: unknown
Region: unknown
Country: Myanmar
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.47.185.0 - 103.47.185.255'
% Abuse contact for '103.47.185.0 - 103.47.185.255' is 'support@mtg.com.mm'
inetnum: 103.47.185.0 - 103.47.185.255
netname: MTGCL-MM
descr: Myanmar Technology Gateway Co., Ltd
country: MM
admin-c: MTGC2-AP
tech-c: MTGC2-AP
abuse-c: AM2415-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-MTGCL-MM
mnt-irt: IRT-MTGCL-MM
last-modified: 2021-11-26T02:43:54Z
source: APNIC
irt: IRT-MTGCL-MM
address: No 560, Kabaraye Pagoda Road., Yangon Yangon
e-mail: support@mtg.com.mm
abuse-mailbox: support@mtg.com.mm
admin-c: MTGC2-AP
tech-c: MTGC2-AP
auth: # Filtered
remarks: support@mtg.com.mm was validated on 2025-11-13
mnt-by: MAINT-MTGCL-MM
last-modified: 2025-11-18T00:29:34Z
source: APNIC
role: ABUSE MTGCLMM
country: ZZ
address: No 560, Kabaraye Pagoda Road., Yangon Yangon
phone: +000000000
e-mail: support@mtg.com.mm
admin-c: MTGC2-AP
tech-c: MTGC2-AP
nic-hdl: AM2415-AP
remarks: Generated from irt object IRT-MTGCL-MM
remarks: support@mtg.com.mm was validated on 2025-11-13
abuse-mailbox: support@mtg.com.mm
mnt-by: APNIC-ABUSE
last-modified: 2025-11-13T06:56:58Z
source: APNIC
role: Myanmar Technology Gateway Co Ltd administrator
address: No 560, Kabaraye Pagoda Road., Yangon Yangon
country: MM
phone: +9595000263
fax-no: +9595000263
e-mail: support@mtg.com.mm
admin-c: MTGC2-AP
tech-c: MTGC2-AP
nic-hdl: MTGC2-AP
mnt-by: MAINT-MTGCL-MM
last-modified: 2014-12-29T01:32:30Z
source: APNIC
% Information related to '103.47.185.0/24AS135149'
route: 103.47.185.0/24
descr: route object for 103.47.185.0/24
origin: AS135149
mnt-by: MAINT-MTGCL-MM
country: MM
last-modified: 2021-11-26T02:29:53Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.47.185.226
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57506
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.47.185.226. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032600 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 21:48:03 CST 2026
;; MSG SIZE rcvd: 107
b'226.185.47.103.in-addr.arpa domain name pointer ncddmis.com.
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
226.185.47.103.in-addr.arpa name = ncddmis.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.77.211.94 | attack | Nov 18 23:01:37 server2 sshd\[30127\]: Invalid user jharrison from 51.77.211.94 Nov 18 23:02:15 server2 sshd\[30158\]: Invalid user jharrison from 51.77.211.94 Nov 18 23:02:19 server2 sshd\[30160\]: Invalid user jharrison from 51.77.211.94 Nov 18 23:04:16 server2 sshd\[30264\]: Invalid user jharrison from 51.77.211.94 Nov 18 23:04:33 server2 sshd\[30270\]: Invalid user jharrison from 51.77.211.94 Nov 18 23:05:25 server2 sshd\[30467\]: Invalid user pswart from 51.77.211.94 |
2019-11-19 05:37:05 |
| 81.30.212.14 | attackspambots | SSH Brute Force, server-1 sshd[25628]: Failed password for invalid user webmaster from 81.30.212.14 port 55108 ssh2 |
2019-11-19 05:22:43 |
| 222.186.175.161 | attack | IP blocked |
2019-11-19 05:24:41 |
| 70.89.88.1 | attackspam | Nov 18 15:30:24 extapp sshd[25277]: Invalid user petersons from 70.89.88.1 Nov 18 15:30:26 extapp sshd[25277]: Failed password for invalid user petersons from 70.89.88.1 port 26146 ssh2 Nov 18 15:31:52 extapp sshd[25603]: Failed password for r.r from 70.89.88.1 port 29843 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=70.89.88.1 |
2019-11-19 05:53:39 |
| 45.95.33.49 | attack | Nov 18 14:36:52 web01 postfix/smtpd[13192]: connect from building.poesiaypasion.com[45.95.33.49] Nov 18 14:36:52 web01 policyd-spf[14755]: None; identhostnamey=helo; client-ip=45.95.33.49; helo=building.toddsearles.com; envelope-from=x@x Nov 18 14:36:52 web01 policyd-spf[14755]: Pass; identhostnamey=mailfrom; client-ip=45.95.33.49; helo=building.toddsearles.com; envelope-from=x@x Nov x@x Nov 18 14:36:52 web01 postfix/smtpd[13192]: disconnect from building.poesiaypasion.com[45.95.33.49] Nov 18 14:38:32 web01 postfix/smtpd[13332]: connect from building.poesiaypasion.com[45.95.33.49] Nov 18 14:38:32 web01 policyd-spf[14828]: None; identhostnamey=helo; client-ip=45.95.33.49; helo=building.toddsearles.com; envelope-from=x@x Nov 18 14:38:32 web01 policyd-spf[14828]: Pass; identhostnamey=mailfrom; client-ip=45.95.33.49; helo=building.toddsearles.com; envelope-from=x@x Nov x@x Nov 18 14:38:32 web01 postfix/smtpd[13332]: disconnect from building.poesiaypasion.com[45.95.33.49] No........ ------------------------------- |
2019-11-19 05:43:34 |
| 58.126.201.20 | attackbots | Nov 18 15:43:04 ws22vmsma01 sshd[91175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.126.201.20 Nov 18 15:43:06 ws22vmsma01 sshd[91175]: Failed password for invalid user ax400 from 58.126.201.20 port 38350 ssh2 ... |
2019-11-19 05:39:25 |
| 203.148.84.118 | attackspam | Unauthorized connection attempt from IP address 203.148.84.118 on Port 445(SMB) |
2019-11-19 05:37:25 |
| 81.241.235.191 | attackbotsspam | invalid user |
2019-11-19 05:29:47 |
| 34.212.161.145 | attackspam | 11/18/2019-21:56:02.749128 34.212.161.145 Protocol: 6 SURICATA TLS invalid record/traffic |
2019-11-19 05:39:12 |
| 188.254.0.183 | attackspambots | Nov 18 18:59:05 root sshd[20260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.183 Nov 18 18:59:06 root sshd[20260]: Failed password for invalid user QWERTY from 188.254.0.183 port 45024 ssh2 Nov 18 19:03:00 root sshd[20296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.183 ... |
2019-11-19 05:54:59 |
| 132.232.108.149 | attack | Automatic report - Banned IP Access |
2019-11-19 05:19:33 |
| 117.239.219.62 | attack | Unauthorized connection attempt from IP address 117.239.219.62 on Port 445(SMB) |
2019-11-19 05:40:11 |
| 124.235.171.114 | attackbots | Automatic report - Banned IP Access |
2019-11-19 05:21:42 |
| 129.28.88.51 | attack | Nov 18 16:50:58 MK-Soft-VM7 sshd[23019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.88.51 Nov 18 16:51:00 MK-Soft-VM7 sshd[23019]: Failed password for invalid user danling from 129.28.88.51 port 41006 ssh2 ... |
2019-11-19 05:27:51 |
| 148.240.238.91 | attackbots | Lines containing failures of 148.240.238.91 Nov 18 19:25:43 shared03 sshd[31326]: Invalid user informix from 148.240.238.91 port 46278 Nov 18 19:25:43 shared03 sshd[31326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.240.238.91 Nov 18 19:25:45 shared03 sshd[31326]: Failed password for invalid user informix from 148.240.238.91 port 46278 ssh2 Nov 18 19:25:46 shared03 sshd[31326]: Received disconnect from 148.240.238.91 port 46278:11: Bye Bye [preauth] Nov 18 19:25:46 shared03 sshd[31326]: Disconnected from invalid user informix 148.240.238.91 port 46278 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=148.240.238.91 |
2019-11-19 05:27:23 |