City: Lamphun
Region: Lamphun
Country: Thailand
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 110.78.156.6 | attackspam | Unauthorized connection attempt from IP address 110.78.156.6 on Port 445(SMB) |
2019-11-09 05:31:40 |
| 110.78.156.97 | attackbots | Unauthorized connection attempt from IP address 110.78.156.97 on Port 445(SMB) |
2019-08-01 12:43:33 |
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '110.78.128.0 - 110.78.191.255'
% Abuse contact for '110.78.128.0 - 110.78.191.255' is 'pitoon.p@ntplc.co.th'
inetnum: 110.78.128.0 - 110.78.191.255
netname: CAT-BB-NET
descr: 10 Fl. 72. CAT TELECOM TOWER Bangrak Bangkok Thailand
country: TH
admin-c: TU38-AP
tech-c: WP273-AP
tech-c: PD452-AP
tech-c: CB840-AP
abuse-c: AN3307-AP
status: ALLOCATED NON-PORTABLE
remarks: Personal contact # PS474-AP WP273-AP AS1145-AP
notify: pankaew@cat.net.th
mnt-by: MAINT-NTPCL-TH
mnt-lower: MAINT-NTPCL-TH
mnt-routes: MAINT-NTPCL-TH
mnt-irt: IRT-NTPCL-TH
last-modified: 2025-11-19T23:59:29Z
source: APNIC
irt: IRT-NTPCL-TH
address: 99 Chaengwattana Road, Thung Song Hong Subdistrict, Luk Si, Luksi Bangkok 10210
e-mail: pitoon.p@ntplc.co.th
abuse-mailbox: pitoon.p@ntplc.co.th
admin-c: NTPC2-AP
tech-c: NTPC2-AP
auth: # Filtered
mnt-by: MAINT-NTPCL-TH
last-modified: 2026-02-02T07:21:59Z
source: APNIC
role: ABUSE NTPCLTH
country: ZZ
address: 99 Chaengwattana Road, Thung Song Hong Subdistrict, Luk Si, Luksi Bangkok 10210
phone: +000000000
e-mail: pitoon.p@ntplc.co.th
admin-c: NTPC2-AP
tech-c: NTPC2-AP
nic-hdl: AN3307-AP
remarks: Generated from irt object IRT-NTPCL-TH
abuse-mailbox: pitoon.p@ntplc.co.th
mnt-by: APNIC-ABUSE
last-modified: 2025-11-19T01:51:42Z
source: APNIC
person: CAT Broadband
address: 10 Fl. 72. CAT TELECOM TOWER Bangrak Bangkok Thailand
country: TH
phone: +66-261-42138
e-mail: nmc@cat.net.th
nic-hdl: CB840-AP
mnt-by: MAINT-TH-THIX-CAT
last-modified: 2018-02-07T08:56:35Z
source: APNIC
person: Passanon dumsood
address: 10 Fl. 72. CAT TELECOM TOWER Bangrak Bangkok Thailand
country: TH
phone: +66-261-42138
e-mail: passanon.d@cat.net.th
nic-hdl: PD452-AP
mnt-by: MAINT-TH-THIX-CAT
last-modified: 2017-06-13T04:19:50Z
source: APNIC
person: Theerachai Udomkitpanya
address: 10 Fl. 72. CAT TELECOM TOWER Bangrak Bangkok
country: TH
phone: +66-261-42918
e-mail: theerachai.u@cattelecom.com
nic-hdl: TU38-AP
mnt-by: MAINT-TH-THIX-CAT
last-modified: 2017-11-23T10:20:25Z
source: APNIC
person: Weerapong Pankaew
nic-hdl: WP273-AP
e-mail: pankaew@cat.net.th
address: CAT-BB-NET
address: 10 Fl. 72. CAT TELECOM TOWER Bangrak Bangkok Thailand
phone: +66-261-42138
fax-no: +66-261-42682
country: TH
mnt-by: MAINT-NEW
last-modified: 2008-09-25T12:45:58Z
source: APNIC
% Information related to '110.78.156.0/24AS131090'
route: 110.78.156.0/24
origin: AS131090
descr: CAT Telecom Public Company Limited
13th CAT TELECOM TOWER
NEW ROAD SRIPHRAYA BANGRAK
BANGKOK
THAILAND
mnt-by: MAINT-NTPCL-TH
last-modified: 2025-11-19T01:51:54Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 110.78.156.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8608
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;110.78.156.95. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032002 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 21 12:07:52 CST 2026
;; MSG SIZE rcvd: 106
b'Host 95.156.78.110.in-addr.arpa. not found: 3(NXDOMAIN)
'
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 95.156.78.110.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 197.251.69.4 | attackbotsspam | (sshd) Failed SSH login from 197.251.69.4 (-): 5 in the last 3600 secs |
2019-11-04 14:52:09 |
| 222.186.169.194 | attackspam | Nov 4 07:47:39 dcd-gentoo sshd[25247]: User root from 222.186.169.194 not allowed because none of user's groups are listed in AllowGroups Nov 4 07:47:42 dcd-gentoo sshd[25247]: error: PAM: Authentication failure for illegal user root from 222.186.169.194 Nov 4 07:47:39 dcd-gentoo sshd[25247]: User root from 222.186.169.194 not allowed because none of user's groups are listed in AllowGroups Nov 4 07:47:42 dcd-gentoo sshd[25247]: error: PAM: Authentication failure for illegal user root from 222.186.169.194 Nov 4 07:47:39 dcd-gentoo sshd[25247]: User root from 222.186.169.194 not allowed because none of user's groups are listed in AllowGroups Nov 4 07:47:42 dcd-gentoo sshd[25247]: error: PAM: Authentication failure for illegal user root from 222.186.169.194 Nov 4 07:47:42 dcd-gentoo sshd[25247]: Failed keyboard-interactive/pam for invalid user root from 222.186.169.194 port 45458 ssh2 ... |
2019-11-04 14:55:37 |
| 68.183.171.232 | attack | Nov 4 06:50:55 hcbbdb sshd\[28288\]: Invalid user user from 68.183.171.232 Nov 4 06:50:55 hcbbdb sshd\[28288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.171.232 Nov 4 06:50:57 hcbbdb sshd\[28288\]: Failed password for invalid user user from 68.183.171.232 port 33414 ssh2 Nov 4 06:55:13 hcbbdb sshd\[28710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.171.232 user=root Nov 4 06:55:15 hcbbdb sshd\[28710\]: Failed password for root from 68.183.171.232 port 44190 ssh2 |
2019-11-04 15:03:00 |
| 88.229.71.187 | attack | Automatic report - Banned IP Access |
2019-11-04 14:54:05 |
| 52.57.110.116 | attack | 11/04/2019-01:44:42.562050 52.57.110.116 Protocol: 6 ET SCAN Potential SSH Scan |
2019-11-04 14:46:05 |
| 151.233.53.22 | attackbotsspam | Automatic report - Port Scan Attack |
2019-11-04 15:10:32 |
| 203.160.91.226 | attackspambots | 2019-11-04T06:39:53.672627abusebot-5.cloudsearch.cf sshd\[12369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.160.91.226 user=root |
2019-11-04 14:46:48 |
| 201.76.0.132 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 04-11-2019 04:55:29. |
2019-11-04 14:27:31 |
| 54.37.136.189 | attackspambots | Nov 4 07:54:53 SilenceServices sshd[18359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.136.189 Nov 4 07:54:56 SilenceServices sshd[18359]: Failed password for invalid user admin from 54.37.136.189 port 39228 ssh2 Nov 4 07:55:33 SilenceServices sshd[18576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.136.189 |
2019-11-04 15:04:47 |
| 222.186.175.154 | attackspambots | Nov 4 01:41:38 TORMINT sshd\[24431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154 user=root Nov 4 01:41:40 TORMINT sshd\[24431\]: Failed password for root from 222.186.175.154 port 63846 ssh2 Nov 4 01:42:07 TORMINT sshd\[24444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154 user=root ... |
2019-11-04 14:55:05 |
| 173.212.223.101 | attack | Nov 4 07:36:22 vps01 sshd[17621]: Failed password for root from 173.212.223.101 port 54328 ssh2 |
2019-11-04 14:57:39 |
| 106.13.98.148 | attack | Nov 4 00:57:50 debian sshd\[14750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.98.148 user=root Nov 4 00:57:53 debian sshd\[14750\]: Failed password for root from 106.13.98.148 port 48416 ssh2 Nov 4 01:03:35 debian sshd\[14779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.98.148 user=root ... |
2019-11-04 14:22:48 |
| 107.170.235.19 | attackbotsspam | 2019-11-04T07:36:06.871576 sshd[18379]: Invalid user kurt from 107.170.235.19 port 53714 2019-11-04T07:36:06.886197 sshd[18379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.235.19 2019-11-04T07:36:06.871576 sshd[18379]: Invalid user kurt from 107.170.235.19 port 53714 2019-11-04T07:36:08.703324 sshd[18379]: Failed password for invalid user kurt from 107.170.235.19 port 53714 ssh2 2019-11-04T07:40:10.612272 sshd[18403]: Invalid user ftpuser from 107.170.235.19 port 37442 ... |
2019-11-04 15:00:00 |
| 222.186.173.154 | attackspambots | SSH brutforce |
2019-11-04 15:08:13 |
| 124.47.14.14 | attackbots | 2019-11-04T06:39:08.223454abusebot-5.cloudsearch.cf sshd\[12358\]: Invalid user test from 124.47.14.14 port 44072 |
2019-11-04 15:12:13 |