City: Phnom Penh
Region: Phnom Penh
Country: Cambodia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '116.212.130.0 - 116.212.130.255'
% Abuse contact for '116.212.130.0 - 116.212.130.255' is 'abuse@corp.mekongnet.com.kh'
inetnum: 116.212.130.0 - 116.212.130.255
netname: MEKONGNET-PVN
descr: MekongNet, Internet Service Provider (ISP), Internet Exchange Provider (IXP) and Internet Data Exchange Center (IDX)
country: KH
admin-c: TC1075-AP
tech-c: TC1075-AP
abuse-c: AM2376-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-KH-MEKONGNET
mnt-irt: IRT-MEKONGNET-KH
last-modified: 2022-08-25T06:55:07Z
source: APNIC
irt: IRT-MEKONGNET-KH
address: AnAnA Building,
e-mail: ty.chan@corp.mekongnet.com.kh
abuse-mailbox: abuse@corp.mekongnet.com.kh
admin-c: TC1075-AP
tech-c: TC1075-AP
auth: # Filtered
remarks: ty.chan@corp.mekongnet.com.kh was validated on 2025-08-13
remarks: abuse@corp.mekongnet.com.kh is invalid
mnt-by: MAINT-KH-MEKONGNET
last-modified: 2025-09-10T13:06:56Z
source: APNIC
role: ABUSE MEKONGNETKH
country: ZZ
address: AnAnA Building,
phone: +000000000
e-mail: ty.chan@corp.mekongnet.com.kh
admin-c: TC1075-AP
tech-c: TC1075-AP
nic-hdl: AM2376-AP
remarks: Generated from irt object IRT-MEKONGNET-KH
remarks: ty.chan@corp.mekongnet.com.kh was validated on 2025-08-13
remarks: abuse@corp.mekongnet.com.kh is invalid
abuse-mailbox: abuse@corp.mekongnet.com.kh
mnt-by: APNIC-ABUSE
last-modified: 2025-09-10T13:08:03Z
source: APNIC
person: Ty Chan
address: #95, Norodom Blvd.
country: KH
phone: +85512316858
e-mail: ty.chan@corp.mekongnet.com.kh
nic-hdl: TC1075-AP
mnt-by: MAINT-KH-MEKONGNET
last-modified: 2022-08-25T06:40:07Z
source: APNIC
% Information related to '116.212.130.0/24AS38235'
route: 116.212.130.0/24
descr: MekongNet-NET, This is non-portable space.
origin: AS38235
country: KH
remarks: This is MekongNet IP Address Ranges
notify: sarith@corp.mekongnet.com.kh
mnt-lower: MAINT-KH-MEKONGNET
mnt-routes: MAINT-KH-MEKONGNET
mnt-by: MAINT-KH-MEKONGNET
last-modified: 2016-12-01T07:33:31Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.212.130.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45870
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;116.212.130.221. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101300 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 13 15:19:25 CST 2025
;; MSG SIZE rcvd: 108
Host 221.130.212.116.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 221.130.212.116.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
49.235.202.65 | attack | Mar 26 07:30:13 srv206 sshd[8938]: Invalid user bcampion from 49.235.202.65 Mar 26 07:30:13 srv206 sshd[8938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.202.65 Mar 26 07:30:13 srv206 sshd[8938]: Invalid user bcampion from 49.235.202.65 Mar 26 07:30:15 srv206 sshd[8938]: Failed password for invalid user bcampion from 49.235.202.65 port 37670 ssh2 ... |
2020-03-26 19:17:31 |
51.38.186.47 | attackspambots | 2020-03-26T09:00:41.432060shield sshd\[8416\]: Invalid user gb from 51.38.186.47 port 53780 2020-03-26T09:00:41.441425shield sshd\[8416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.ip-51-38-186.eu 2020-03-26T09:00:43.296550shield sshd\[8416\]: Failed password for invalid user gb from 51.38.186.47 port 53780 ssh2 2020-03-26T09:04:04.151197shield sshd\[9237\]: Invalid user st from 51.38.186.47 port 39664 2020-03-26T09:04:04.154875shield sshd\[9237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.ip-51-38-186.eu |
2020-03-26 19:16:30 |
167.114.4.204 | attackspam | (sshd) Failed SSH login from 167.114.4.204 (PL/Poland/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 26 10:50:42 ubnt-55d23 sshd[13872]: Invalid user test from 167.114.4.204 port 45726 Mar 26 10:50:44 ubnt-55d23 sshd[13872]: Failed password for invalid user test from 167.114.4.204 port 45726 ssh2 |
2020-03-26 18:50:10 |
50.53.179.3 | attackspambots | Invalid user administrator from 50.53.179.3 port 33010 |
2020-03-26 19:06:10 |
162.243.132.30 | attackspambots | Unauthorized connection attempt detected from IP address 162.243.132.30 to port 435 |
2020-03-26 18:52:50 |
93.170.36.2 | attack | Invalid user oraprod from 93.170.36.2 port 56139 |
2020-03-26 18:56:16 |
209.141.41.96 | attackbots | Mar 26 11:54:45 tuxlinux sshd[49293]: Invalid user tty from 209.141.41.96 port 42942 Mar 26 11:54:45 tuxlinux sshd[49293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.41.96 Mar 26 11:54:45 tuxlinux sshd[49293]: Invalid user tty from 209.141.41.96 port 42942 Mar 26 11:54:45 tuxlinux sshd[49293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.41.96 Mar 26 11:54:45 tuxlinux sshd[49293]: Invalid user tty from 209.141.41.96 port 42942 Mar 26 11:54:45 tuxlinux sshd[49293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.41.96 Mar 26 11:54:48 tuxlinux sshd[49293]: Failed password for invalid user tty from 209.141.41.96 port 42942 ssh2 ... |
2020-03-26 19:03:30 |
140.207.81.233 | attack | DATE:2020-03-26 09:43:25, IP:140.207.81.233, PORT:ssh SSH brute force auth (docker-dc) |
2020-03-26 19:01:17 |
167.86.103.125 | attack | 2020-03-26T01:39:28.604586xentho-1 sshd[84350]: Invalid user usuario from 167.86.103.125 port 45494 2020-03-26T01:39:30.716878xentho-1 sshd[84350]: Failed password for invalid user usuario from 167.86.103.125 port 45494 ssh2 2020-03-26T01:41:26.317688xentho-1 sshd[84382]: Invalid user vagrant from 167.86.103.125 port 45728 2020-03-26T01:41:26.324782xentho-1 sshd[84382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.86.103.125 2020-03-26T01:41:26.317688xentho-1 sshd[84382]: Invalid user vagrant from 167.86.103.125 port 45728 2020-03-26T01:41:28.631766xentho-1 sshd[84382]: Failed password for invalid user vagrant from 167.86.103.125 port 45728 ssh2 2020-03-26T01:43:32.160286xentho-1 sshd[84404]: Invalid user vcr from 167.86.103.125 port 45964 2020-03-26T01:43:32.168015xentho-1 sshd[84404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.86.103.125 2020-03-26T01:43:32.160286xentho-1 sshd[84404]: Inva ... |
2020-03-26 19:05:25 |
41.214.152.106 | attackspam | Unauthorized connection attempt detected from IP address 41.214.152.106 to port 445 |
2020-03-26 19:07:00 |
116.206.28.7 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 26-03-2020 03:50:14. |
2020-03-26 18:45:03 |
116.171.245.47 | attackspambots | firewall-block, port(s): 1433/tcp |
2020-03-26 18:50:57 |
140.143.183.71 | attackspambots | Mar 26 11:15:44 serwer sshd\[30392\]: Invalid user ad from 140.143.183.71 port 35430 Mar 26 11:15:44 serwer sshd\[30392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.183.71 Mar 26 11:15:46 serwer sshd\[30392\]: Failed password for invalid user ad from 140.143.183.71 port 35430 ssh2 ... |
2020-03-26 19:24:39 |
46.219.3.139 | attackspambots | k+ssh-bruteforce |
2020-03-26 19:09:28 |
78.26.80.32 | attack | firewall-block, port(s): 80/tcp |
2020-03-26 19:00:35 |