Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Phnom Penh

Region: Phnom Penh

Country: Cambodia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '119.13.56.0 - 119.13.63.255'

% Abuse contact for '119.13.56.0 - 119.13.63.255' is 'yennp@viettel.com.vn'

inetnum:        119.13.56.0 - 119.13.63.255
netname:        VIETTEL-CAMBODIA
descr:          VIETTEL (CAMBODIA) PTE., LTD
descr:          # 199, Mao Tse Toung St.(245)
country:        KH
org:            ORG-VPL4-AP
admin-c:        VAT6-AP
tech-c:         VAT6-AP
status:         ALLOCATED PORTABLE
abuse-c:        AV489-AP
mnt-by:         APNIC-HM
mnt-lower:      MAINT-KH-VIETTELCAMBODIA
mnt-routes:     MAINT-KH-VIETTELCAMBODIA
mnt-irt:        IRT-VIETTEL-CAMBODIA-KH
last-modified:  2022-08-10T00:13:49Z
source:         APNIC

irt:            IRT-VIETTEL-CAMBODIA-KH
address:
e-mail:         yennp@viettel.com.vn
abuse-mailbox:  yennp@viettel.com.vn
admin-c:        VAT6-AP
tech-c:         VAT6-AP
auth:           # Filtered
remarks:        yennp@viettel.com.vn was validated on 2026-02-26
mnt-by:         MAINT-KH-VIETTELCAMBODIA
last-modified:  2026-02-26T10:34:08Z
source:         APNIC

organisation:   ORG-VPL4-AP
org-name:       VIETTEL (CAMBODIA) PTE., LTD
org-type:       LIR
country:        KH
address:        VIETTEL (Cambodia) PTE.,LTD
address:        # 199, Mao Tse Toung St.(245)
phone:          +855-236-2000-18
fax-no:         +855-236-2000-18
e-mail:         yennp@viettel.com.vn
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2025-03-26T12:56:13Z
source:         APNIC

role:           ABUSE VIETTELCAMBODIAKH
country:        ZZ
address:
phone:          +000000000
e-mail:         yennp@viettel.com.vn
admin-c:        VAT6-AP
tech-c:         VAT6-AP
nic-hdl:        AV489-AP
remarks:        Generated from irt object IRT-VIETTEL-CAMBODIA-KH
remarks:        yennp@viettel.com.vn was validated on 2026-02-26
abuse-mailbox:  yennp@viettel.com.vn
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-26T10:34:48Z
source:         APNIC

person:         Vo Anh Tu
address:        #42, STR 242, SANGKAT CHATUMUK, KHAN DAUN PENH, PHNOM PENH.
country:        KH
phone:          +855 977068079
e-mail:         tuva1@viettel.com.vn
nic-hdl:        VAT6-AP
mnt-by:         MAINT-NEW
last-modified:  2011-01-27T07:25:27Z
source:         APNIC

% Information related to '119.13.61.0/24AS38623'

route:          119.13.61.0/24
origin:         AS38623
descr:          VIETTEL (CAMBODIA) PTE., LTD
                VIETTEL (Cambodia) PTE.,LTD
                #199, Mao Tse Toung St.(245)
mnt-by:         MAINT-KH-VIETTELCAMBODIA
last-modified:  2022-11-26T09:24:56Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.13.61.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16118
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.13.61.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032302 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 10:49:45 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 12.61.13.119.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.61.13.119.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
119.123.101.27 attack
Feb 11 23:04:45 mail1 sshd[26366]: Invalid user iemergen from 119.123.101.27 port 55214
Feb 11 23:04:45 mail1 sshd[26366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.123.101.27
Feb 11 23:04:48 mail1 sshd[26366]: Failed password for invalid user iemergen from 119.123.101.27 port 55214 ssh2
Feb 11 23:04:48 mail1 sshd[26366]: Received disconnect from 119.123.101.27 port 55214:11: Bye Bye [preauth]
Feb 11 23:04:48 mail1 sshd[26366]: Disconnected from 119.123.101.27 port 55214 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=119.123.101.27
2020-02-12 09:45:08
92.139.143.251 attackspam
Lines containing failures of 92.139.143.251
Feb 10 04:41:11 ariston sshd[11535]: Invalid user wjk from 92.139.143.251 port 49332
Feb 10 04:41:11 ariston sshd[11535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.139.143.251
Feb 10 04:41:14 ariston sshd[11535]: Failed password for invalid user wjk from 92.139.143.251 port 49332 ssh2
Feb 10 04:41:14 ariston sshd[11535]: Received disconnect from 92.139.143.251 port 49332:11: Bye Bye [preauth]
Feb 10 04:41:14 ariston sshd[11535]: Disconnected from invalid user wjk 92.139.143.251 port 49332 [preauth]
Feb 10 04:56:35 ariston sshd[13484]: Invalid user bhv from 92.139.143.251 port 53400
Feb 10 04:56:35 ariston sshd[13484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.139.143.251
Feb 10 04:56:37 ariston sshd[13484]: Failed password for invalid user bhv from 92.139.143.251 port 53400 ssh2
Feb 10 04:56:38 ariston sshd[13484]: Received disconn........
------------------------------
2020-02-12 10:25:20
74.125.24.101 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-12 10:24:59
185.143.221.55 attack
02/12/2020-02:34:29.928789 185.143.221.55 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-12 09:58:42
156.96.63.238 attackbots
[2020-02-11 20:39:08] NOTICE[1148][C-00008327] chan_sip.c: Call from '' (156.96.63.238:53500) to extension '+0048221530247' rejected because extension not found in context 'public'.
[2020-02-11 20:39:08] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-11T20:39:08.228-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="+0048221530247",SessionID="0x7fd82c31abc8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/156.96.63.238/53500",ACLName="no_extension_match"
[2020-02-11 20:39:45] NOTICE[1148][C-00008328] chan_sip.c: Call from '' (156.96.63.238:60150) to extension '0-048221530247' rejected because extension not found in context 'public'.
[2020-02-11 20:39:45] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-11T20:39:45.893-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="0-048221530247",SessionID="0x7fd82c31abc8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/156.
...
2020-02-12 09:42:22
137.74.171.160 attackspam
Invalid user bmm from 137.74.171.160 port 41322
2020-02-12 09:57:28
106.54.180.39 attackspam
Feb 11 23:20:31 mxgate1 postfix/postscreen[3558]: CONNECT from [106.54.180.39]:57470 to [176.31.12.44]:25
Feb 11 23:20:31 mxgate1 postfix/dnsblog[3561]: addr 106.54.180.39 listed by domain zen.spamhaus.org as 127.0.0.3
Feb 11 23:20:31 mxgate1 postfix/dnsblog[3561]: addr 106.54.180.39 listed by domain zen.spamhaus.org as 127.0.0.4
Feb 11 23:20:31 mxgate1 postfix/dnsblog[3560]: addr 106.54.180.39 listed by domain cbl.abuseat.org as 127.0.0.2
Feb 11 23:20:37 mxgate1 postfix/postscreen[3558]: DNSBL rank 3 for [106.54.180.39]:57470
Feb x@x
Feb 11 23:20:38 mxgate1 postfix/postscreen[3558]: DISCONNECT [106.54.180.39]:57470


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.54.180.39
2020-02-12 10:18:49
116.108.237.195 attackspam
Automatic report - Port Scan Attack
2020-02-12 09:45:24
142.93.235.47 attackbots
*Port Scan* detected from 142.93.235.47 (NL/Netherlands/-). 4 hits in the last 215 seconds
2020-02-12 10:03:28
200.61.190.81 attackbotsspam
Feb 12 01:14:02 legacy sshd[15760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.61.190.81
Feb 12 01:14:04 legacy sshd[15760]: Failed password for invalid user theking from 200.61.190.81 port 47220 ssh2
Feb 12 01:18:07 legacy sshd[16122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.61.190.81
...
2020-02-12 10:05:09
49.235.108.92 attack
Feb 12 02:26:38 dedicated sshd[25478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.108.92  user=root
Feb 12 02:26:40 dedicated sshd[25478]: Failed password for root from 49.235.108.92 port 52236 ssh2
2020-02-12 10:02:22
80.230.80.143 attackbots
TCP Port Scanning
2020-02-12 10:13:13
70.79.253.243 attackspambots
Feb 11 23:24:55 debian-2gb-nbg1-2 kernel: \[3719126.581638\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=70.79.253.243 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=46 ID=41479 PROTO=TCP SPT=25440 DPT=37215 WINDOW=29040 RES=0x00 SYN URGP=0
2020-02-12 10:13:36
121.178.212.67 attackspam
2020-02-12T01:29:37.451629vps773228.ovh.net sshd[9481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.178.212.67
2020-02-12T01:29:37.438656vps773228.ovh.net sshd[9481]: Invalid user musikbot from 121.178.212.67 port 49077
2020-02-12T01:29:39.416478vps773228.ovh.net sshd[9481]: Failed password for invalid user musikbot from 121.178.212.67 port 49077 ssh2
2020-02-12T02:31:55.447447vps773228.ovh.net sshd[9703]: Invalid user sklad from 121.178.212.67 port 44017
2020-02-12T02:31:55.464435vps773228.ovh.net sshd[9703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.178.212.67
2020-02-12T02:31:55.447447vps773228.ovh.net sshd[9703]: Invalid user sklad from 121.178.212.67 port 44017
2020-02-12T02:31:56.590075vps773228.ovh.net sshd[9703]: Failed password for invalid user sklad from 121.178.212.67 port 44017 ssh2
2020-02-12T02:36:57.137377vps773228.ovh.net sshd[9716]: Invalid user cib from 121.178.212.67 por
...
2020-02-12 09:48:16
178.128.21.38 attack
Hacking
2020-02-12 09:44:33

Recently Reported IPs

146.124.184.66 10.133.174.137 2606:4700:10::6816:1903 2606:4700:10::ac43:2398
2606:4700:10::6814:9396 2606:4700:10::6814:6181 2606:4700:10::6816:894 2606:4700:10::6816:2054
2606:4700:10::ac43:1010 2606:4700:10::6814:4963 118.55.26.156 103.208.33.229
131.24.199.74 202.160.91.71 114.230.196.177 10.108.79.200
196.16.81.173 30.40.59.167 210.116.247.203 10.220.153.35