City: Lamphun
Region: Lamphun
Country: Thailand
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 110.78.158.91 | attackbotsspam | Jun 26 16:13:51 srv-4 sshd\[29521\]: Invalid user admin from 110.78.158.91 Jun 26 16:13:51 srv-4 sshd\[29521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.78.158.91 Jun 26 16:13:53 srv-4 sshd\[29521\]: Failed password for invalid user admin from 110.78.158.91 port 50956 ssh2 ... |
2019-06-26 23:52:05 |
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '110.78.128.0 - 110.78.191.255'
% Abuse contact for '110.78.128.0 - 110.78.191.255' is 'pitoon.p@ntplc.co.th'
inetnum: 110.78.128.0 - 110.78.191.255
netname: CAT-BB-NET
descr: 10 Fl. 72. CAT TELECOM TOWER Bangrak Bangkok Thailand
country: TH
admin-c: TU38-AP
tech-c: WP273-AP
tech-c: PD452-AP
tech-c: CB840-AP
abuse-c: AN3307-AP
status: ALLOCATED NON-PORTABLE
remarks: Personal contact # PS474-AP WP273-AP AS1145-AP
notify: pankaew@cat.net.th
mnt-by: MAINT-NTPCL-TH
mnt-lower: MAINT-NTPCL-TH
mnt-routes: MAINT-NTPCL-TH
mnt-irt: IRT-NTPCL-TH
last-modified: 2025-11-19T23:59:29Z
source: APNIC
irt: IRT-NTPCL-TH
address: 99 Chaengwattana Road, Thung Song Hong Subdistrict, Luk Si, Luksi Bangkok 10210
e-mail: pitoon.p@ntplc.co.th
abuse-mailbox: pitoon.p@ntplc.co.th
admin-c: NTPC2-AP
tech-c: NTPC2-AP
auth: # Filtered
mnt-by: MAINT-NTPCL-TH
last-modified: 2026-02-02T07:21:59Z
source: APNIC
role: ABUSE NTPCLTH
country: ZZ
address: 99 Chaengwattana Road, Thung Song Hong Subdistrict, Luk Si, Luksi Bangkok 10210
phone: +000000000
e-mail: pitoon.p@ntplc.co.th
admin-c: NTPC2-AP
tech-c: NTPC2-AP
nic-hdl: AN3307-AP
remarks: Generated from irt object IRT-NTPCL-TH
abuse-mailbox: pitoon.p@ntplc.co.th
mnt-by: APNIC-ABUSE
last-modified: 2025-11-19T01:51:42Z
source: APNIC
person: CAT Broadband
address: 10 Fl. 72. CAT TELECOM TOWER Bangrak Bangkok Thailand
country: TH
phone: +66-261-42138
e-mail: nmc@cat.net.th
nic-hdl: CB840-AP
mnt-by: MAINT-TH-THIX-CAT
last-modified: 2018-02-07T08:56:35Z
source: APNIC
person: Passanon dumsood
address: 10 Fl. 72. CAT TELECOM TOWER Bangrak Bangkok Thailand
country: TH
phone: +66-261-42138
e-mail: passanon.d@cat.net.th
nic-hdl: PD452-AP
mnt-by: MAINT-TH-THIX-CAT
last-modified: 2017-06-13T04:19:50Z
source: APNIC
person: Theerachai Udomkitpanya
address: 10 Fl. 72. CAT TELECOM TOWER Bangrak Bangkok
country: TH
phone: +66-261-42918
e-mail: theerachai.u@cattelecom.com
nic-hdl: TU38-AP
mnt-by: MAINT-TH-THIX-CAT
last-modified: 2017-11-23T10:20:25Z
source: APNIC
person: Weerapong Pankaew
nic-hdl: WP273-AP
e-mail: pankaew@cat.net.th
address: CAT-BB-NET
address: 10 Fl. 72. CAT TELECOM TOWER Bangrak Bangkok Thailand
phone: +66-261-42138
fax-no: +66-261-42682
country: TH
mnt-by: MAINT-NEW
last-modified: 2008-09-25T12:45:58Z
source: APNIC
% Information related to '110.78.158.0/24AS131090'
route: 110.78.158.0/24
origin: AS131090
descr: CAT Telecom Public Company Limited
13th CAT TELECOM TOWER
NEW ROAD SRIPHRAYA BANGRAK
BANGKOK
THAILAND
mnt-by: MAINT-NTPCL-TH
last-modified: 2025-11-19T01:51:54Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 110.78.158.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4900
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;110.78.158.120. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042201 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 23 04:08:58 CST 2026
;; MSG SIZE rcvd: 107
Host 120.158.78.110.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 120.158.78.110.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 13.68.252.36 | attackspam | Jul 16 18:56:35 *hidden* sshd[53564]: Failed password for *hidden* from 13.68.252.36 port 37250 ssh2 |
2020-07-17 03:56:20 |
| 223.93.185.204 | attackspambots | $f2bV_matches |
2020-07-17 04:24:41 |
| 61.144.96.20 | attackbots | Jul 16 05:42:22 h2034429 sshd[10765]: Invalid user dropbox from 61.144.96.20 Jul 16 05:42:22 h2034429 sshd[10765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.144.96.20 Jul 16 05:42:23 h2034429 sshd[10765]: Failed password for invalid user dropbox from 61.144.96.20 port 54334 ssh2 Jul 16 05:42:24 h2034429 sshd[10765]: Received disconnect from 61.144.96.20 port 54334:11: Bye Bye [preauth] Jul 16 05:42:24 h2034429 sshd[10765]: Disconnected from 61.144.96.20 port 54334 [preauth] Jul 16 06:08:52 h2034429 sshd[11161]: Connection closed by 61.144.96.20 port 50206 [preauth] Jul 16 06:12:49 h2034429 sshd[11295]: Invalid user dhis from 61.144.96.20 Jul 16 06:12:49 h2034429 sshd[11295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.144.96.20 Jul 16 06:12:52 h2034429 sshd[11295]: Failed password for invalid user dhis from 61.144.96.20 port 52042 ssh2 Jul 16 06:12:52 h2034429 sshd[11295]: Re........ ------------------------------- |
2020-07-17 03:58:00 |
| 195.154.179.3 | attackspam | Mailserver and mailaccount attacks |
2020-07-17 04:14:02 |
| 138.68.44.236 | attackbotsspam | Jul 16 21:42:51 h2779839 sshd[10093]: Invalid user xum from 138.68.44.236 port 36462 Jul 16 21:42:51 h2779839 sshd[10093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.44.236 Jul 16 21:42:51 h2779839 sshd[10093]: Invalid user xum from 138.68.44.236 port 36462 Jul 16 21:42:54 h2779839 sshd[10093]: Failed password for invalid user xum from 138.68.44.236 port 36462 ssh2 Jul 16 21:47:08 h2779839 sshd[10153]: Invalid user admin5 from 138.68.44.236 port 53850 Jul 16 21:47:08 h2779839 sshd[10153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.44.236 Jul 16 21:47:08 h2779839 sshd[10153]: Invalid user admin5 from 138.68.44.236 port 53850 Jul 16 21:47:10 h2779839 sshd[10153]: Failed password for invalid user admin5 from 138.68.44.236 port 53850 ssh2 Jul 16 21:51:23 h2779839 sshd[10218]: Invalid user leonidas from 138.68.44.236 port 43006 ... |
2020-07-17 04:25:25 |
| 120.92.34.203 | attack | Jul 16 16:32:40 piServer sshd[1524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.34.203 Jul 16 16:32:42 piServer sshd[1524]: Failed password for invalid user syslog from 120.92.34.203 port 54154 ssh2 Jul 16 16:38:06 piServer sshd[2210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.34.203 ... |
2020-07-17 04:22:12 |
| 61.177.172.41 | attackbotsspam | 2020-07-16T22:16:23.847290vps773228.ovh.net sshd[12966]: Failed password for root from 61.177.172.41 port 3597 ssh2 2020-07-16T22:16:27.700065vps773228.ovh.net sshd[12966]: Failed password for root from 61.177.172.41 port 3597 ssh2 2020-07-16T22:16:34.856336vps773228.ovh.net sshd[12966]: Failed password for root from 61.177.172.41 port 3597 ssh2 2020-07-16T22:16:38.703277vps773228.ovh.net sshd[12966]: Failed password for root from 61.177.172.41 port 3597 ssh2 2020-07-16T22:16:42.477248vps773228.ovh.net sshd[12966]: Failed password for root from 61.177.172.41 port 3597 ssh2 ... |
2020-07-17 04:21:11 |
| 139.155.79.110 | attack | Jul 16 20:53:45 rocket sshd[29525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.79.110 Jul 16 20:53:47 rocket sshd[29525]: Failed password for invalid user hata from 139.155.79.110 port 56392 ssh2 Jul 16 21:01:09 rocket sshd[30978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.79.110 ... |
2020-07-17 04:07:28 |
| 49.206.17.36 | attack | Jul 16 13:57:19 server1 sshd\[22566\]: Invalid user vendas from 49.206.17.36 Jul 16 13:57:19 server1 sshd\[22566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.206.17.36 Jul 16 13:57:22 server1 sshd\[22566\]: Failed password for invalid user vendas from 49.206.17.36 port 58342 ssh2 Jul 16 13:59:31 server1 sshd\[23182\]: Invalid user wpc from 49.206.17.36 Jul 16 13:59:31 server1 sshd\[23182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.206.17.36 ... |
2020-07-17 04:19:03 |
| 202.88.154.70 | attack | 2020-07-16T20:48:09.193565scmdmz1 sshd[12942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.88.154.70 2020-07-16T20:48:09.189479scmdmz1 sshd[12942]: Invalid user lihuanhuan from 202.88.154.70 port 55158 2020-07-16T20:48:10.416847scmdmz1 sshd[12942]: Failed password for invalid user lihuanhuan from 202.88.154.70 port 55158 ssh2 ... |
2020-07-17 03:52:08 |
| 95.213.132.163 | attackbotsspam | apache exploit attempt |
2020-07-17 03:52:59 |
| 115.127.82.138 | attack | 1594907089 - 07/16/2020 15:44:49 Host: 115.127.82.138/115.127.82.138 Port: 445 TCP Blocked |
2020-07-17 04:09:27 |
| 119.163.196.146 | attackspambots | 2020-07-16T18:04:35.483377amanda2.illicoweb.com sshd\[10008\]: Invalid user jayani from 119.163.196.146 port 13980 2020-07-16T18:04:35.488451amanda2.illicoweb.com sshd\[10008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.163.196.146 2020-07-16T18:04:37.420797amanda2.illicoweb.com sshd\[10008\]: Failed password for invalid user jayani from 119.163.196.146 port 13980 ssh2 2020-07-16T18:07:59.110481amanda2.illicoweb.com sshd\[10368\]: Invalid user holger from 119.163.196.146 port 17452 2020-07-16T18:07:59.112992amanda2.illicoweb.com sshd\[10368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.163.196.146 ... |
2020-07-17 04:22:43 |
| 94.25.164.150 | attackspambots | 1594907094 - 07/16/2020 15:44:54 Host: 94.25.164.150/94.25.164.150 Port: 445 TCP Blocked |
2020-07-17 04:06:26 |
| 208.91.198.55 | attackbotsspam | Phishing Website |
2020-07-17 04:01:05 |