City: Lamphun
Region: Lamphun
Country: Thailand
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '110.78.128.0 - 110.78.191.255'
% Abuse contact for '110.78.128.0 - 110.78.191.255' is 'pitoon.p@ntplc.co.th'
inetnum: 110.78.128.0 - 110.78.191.255
netname: CAT-BB-NET
descr: 10 Fl. 72. CAT TELECOM TOWER Bangrak Bangkok Thailand
country: TH
admin-c: TU38-AP
tech-c: WP273-AP
tech-c: PD452-AP
tech-c: CB840-AP
abuse-c: AN3307-AP
status: ALLOCATED NON-PORTABLE
remarks: Personal contact # PS474-AP WP273-AP AS1145-AP
notify: pankaew@cat.net.th
mnt-by: MAINT-NTPCL-TH
mnt-lower: MAINT-NTPCL-TH
mnt-routes: MAINT-NTPCL-TH
mnt-irt: IRT-NTPCL-TH
last-modified: 2025-11-19T23:59:29Z
source: APNIC
irt: IRT-NTPCL-TH
address: 99 Chaengwattana Road, Thung Song Hong Subdistrict, Luk Si, Luksi Bangkok 10210
e-mail: pitoon.p@ntplc.co.th
abuse-mailbox: pitoon.p@ntplc.co.th
admin-c: NTPC2-AP
tech-c: NTPC2-AP
auth: # Filtered
mnt-by: MAINT-NTPCL-TH
last-modified: 2026-02-02T07:21:59Z
source: APNIC
role: ABUSE NTPCLTH
country: ZZ
address: 99 Chaengwattana Road, Thung Song Hong Subdistrict, Luk Si, Luksi Bangkok 10210
phone: +000000000
e-mail: pitoon.p@ntplc.co.th
admin-c: NTPC2-AP
tech-c: NTPC2-AP
nic-hdl: AN3307-AP
remarks: Generated from irt object IRT-NTPCL-TH
abuse-mailbox: pitoon.p@ntplc.co.th
mnt-by: APNIC-ABUSE
last-modified: 2025-11-19T01:51:42Z
source: APNIC
person: CAT Broadband
address: 10 Fl. 72. CAT TELECOM TOWER Bangrak Bangkok Thailand
country: TH
phone: +66-261-42138
e-mail: nmc@cat.net.th
nic-hdl: CB840-AP
mnt-by: MAINT-TH-THIX-CAT
last-modified: 2018-02-07T08:56:35Z
source: APNIC
person: Passanon dumsood
address: 10 Fl. 72. CAT TELECOM TOWER Bangrak Bangkok Thailand
country: TH
phone: +66-261-42138
e-mail: passanon.d@cat.net.th
nic-hdl: PD452-AP
mnt-by: MAINT-TH-THIX-CAT
last-modified: 2017-06-13T04:19:50Z
source: APNIC
person: Theerachai Udomkitpanya
address: 10 Fl. 72. CAT TELECOM TOWER Bangrak Bangkok
country: TH
phone: +66-261-42918
e-mail: theerachai.u@cattelecom.com
nic-hdl: TU38-AP
mnt-by: MAINT-TH-THIX-CAT
last-modified: 2017-11-23T10:20:25Z
source: APNIC
person: Weerapong Pankaew
nic-hdl: WP273-AP
e-mail: pankaew@cat.net.th
address: CAT-BB-NET
address: 10 Fl. 72. CAT TELECOM TOWER Bangrak Bangkok Thailand
phone: +66-261-42138
fax-no: +66-261-42682
country: TH
mnt-by: MAINT-NEW
last-modified: 2008-09-25T12:45:58Z
source: APNIC
% Information related to '110.78.150.0/24AS131090'
route: 110.78.150.0/24
origin: AS131090
descr: CAT Telecom Public Company Limited
13th CAT TELECOM TOWER
NEW ROAD SRIPHRAYA BANGRAK
BANGKOK
THAILAND
mnt-by: MAINT-NTPCL-TH
last-modified: 2025-11-19T01:51:54Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 110.78.150.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61325
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;110.78.150.130. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032900 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 29 16:06:02 CST 2026
;; MSG SIZE rcvd: 107
Host 130.150.78.110.in-addr.arpa. not found: 3(NXDOMAIN)
server can't find 110.78.150.130.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.88.104.99 | attackspambots | Jul 18 07:23:47 45.88.104.99 PROTO=TCP SPT=54508 DPT=3960 Jul 18 09:49:46 45.88.104.99 PROTO=TCP SPT=40255 DPT=3853 Jul 18 10:43:43 45.88.104.99 PROTO=TCP SPT=46002 DPT=5253 Jul 18 12:59:01 45.88.104.99 PROTO=TCP SPT=51748 DPT=7170 Jul 18 14:18:30 45.88.104.99 PROTO=TCP SPT=57493 DPT=7232 Jul 18 15:38:28 45.88.104.99 PROTO=TCP SPT=43239 DPT=2993 |
2020-07-20 05:28:08 |
| 102.182.250.23 | attackbots | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-07-20 05:31:46 |
| 185.143.73.119 | attackspam | 2020-07-19 22:54:19 dovecot_login authenticator failed for \(User\) \[185.143.73.119\]: 535 Incorrect authentication data \(set_id=cp-hk-4@no-server.de\) 2020-07-19 22:54:37 dovecot_login authenticator failed for \(User\) \[185.143.73.119\]: 535 Incorrect authentication data \(set_id=serv2@no-server.de\) 2020-07-19 22:54:47 dovecot_login authenticator failed for \(User\) \[185.143.73.119\]: 535 Incorrect authentication data \(set_id=serv2@no-server.de\) 2020-07-19 22:54:56 dovecot_login authenticator failed for \(User\) \[185.143.73.119\]: 535 Incorrect authentication data \(set_id=serv2@no-server.de\) 2020-07-19 22:55:00 dovecot_login authenticator failed for \(User\) \[185.143.73.119\]: 535 Incorrect authentication data \(set_id=balboa@no-server.de\) ... |
2020-07-20 05:14:11 |
| 183.3.222.51 | attackbotsspam | 445/tcp 1433/tcp... [2020-05-19/07-19]8pkt,2pt.(tcp) |
2020-07-20 05:14:42 |
| 92.18.18.37 | attack | 5555/tcp 2323/tcp [2020-06-27/07-19]2pkt |
2020-07-20 05:05:50 |
| 206.189.200.15 | attackbotsspam | 2020-07-19T23:19:57.002861lavrinenko.info sshd[30931]: Invalid user nagios from 206.189.200.15 port 33056 2020-07-19T23:19:57.014464lavrinenko.info sshd[30931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.200.15 2020-07-19T23:19:57.002861lavrinenko.info sshd[30931]: Invalid user nagios from 206.189.200.15 port 33056 2020-07-19T23:19:59.370270lavrinenko.info sshd[30931]: Failed password for invalid user nagios from 206.189.200.15 port 33056 ssh2 2020-07-19T23:23:01.500973lavrinenko.info sshd[31164]: Invalid user tushar from 206.189.200.15 port 46476 ... |
2020-07-20 05:08:06 |
| 185.200.118.56 | attackbotsspam | 3389/tcp 1194/udp... [2020-05-26/07-19]10pkt,1pt.(tcp),1pt.(udp) |
2020-07-20 05:39:09 |
| 182.68.226.230 | attack | 1595174588 - 07/19/2020 18:03:08 Host: 182.68.226.230/182.68.226.230 Port: 445 TCP Blocked |
2020-07-20 05:12:45 |
| 42.159.121.246 | attackspam | Jul 19 21:30:07 ns382633 sshd\[25140\]: Invalid user splunk from 42.159.121.246 port 40870 Jul 19 21:30:07 ns382633 sshd\[25140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.121.246 Jul 19 21:30:09 ns382633 sshd\[25140\]: Failed password for invalid user splunk from 42.159.121.246 port 40870 ssh2 Jul 19 21:38:45 ns382633 sshd\[26657\]: Invalid user qsc from 42.159.121.246 port 57186 Jul 19 21:38:45 ns382633 sshd\[26657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.121.246 |
2020-07-20 05:38:15 |
| 185.142.236.35 | attackbots |
|
2020-07-20 05:15:33 |
| 110.139.171.35 | attackbotsspam | 1433/tcp 445/tcp... [2020-06-11/07-18]6pkt,2pt.(tcp) |
2020-07-20 05:27:04 |
| 58.20.27.142 | attackbotsspam | Jul 19 15:46:02 vps46666688 sshd[1294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.20.27.142 Jul 19 15:46:04 vps46666688 sshd[1294]: Failed password for invalid user boss from 58.20.27.142 port 2058 ssh2 ... |
2020-07-20 05:35:01 |
| 118.89.140.16 | attackbotsspam | Invalid user manu from 118.89.140.16 port 50664 |
2020-07-20 05:13:50 |
| 60.190.249.121 | attackbotsspam | 445/tcp 1433/tcp... [2020-05-26/07-19]8pkt,2pt.(tcp) |
2020-07-20 05:23:53 |
| 222.186.180.8 | attack | Jul 19 23:29:04 ns381471 sshd[30526]: Failed password for root from 222.186.180.8 port 12128 ssh2 Jul 19 23:29:17 ns381471 sshd[30526]: error: maximum authentication attempts exceeded for root from 222.186.180.8 port 12128 ssh2 [preauth] |
2020-07-20 05:30:00 |