Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bangkok

Region: Bangkok

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '124.197.48.0 - 124.197.55.255'

% Abuse contact for '124.197.48.0 - 124.197.55.255' is 'system_team@uih.co.th'

inetnum:        124.197.48.0 - 124.197.55.255
netname:        UIH-TH
descr:          United Information Highway Co.,Ltd.
descr:          499 Benchachinda Bldg.
descr:          Kamphangphet 6 Rd., Ladyao
country:        TH
org:            ORG-UIHC1-AP
admin-c:        ST1220-AP
tech-c:         ST1220-AP
status:         ALLOCATED PORTABLE
abuse-c:        AU80-AP
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-TH-BENCHA
mnt-routes:     MAINT-TH-BENCHA
mnt-irt:        IRT-UIH-TH
last-modified:  2025-05-15T07:47:19Z
geofeed:        https://www.uih.co.th/geofeed/geofeed.csv
source:         APNIC

irt:            IRT-UIH-TH
address:        499 Benchachinda Bldg., Fl-4B
address:        Vibhavadi-Rangsit Rd.,
address:        Ladyao, Chatuchak 10900
e-mail:         system_team@uih.co.th
abuse-mailbox:  system_team@uih.co.th
admin-c:        ST1220-AP
tech-c:         ST1220-AP
auth:           # Filtered
remarks:        system_team@uih.co.th was validated on 2026-01-23
mnt-by:         MAINT-TH-BENCHA
last-modified:  2026-02-17T08:55:41Z
source:         APNIC

organisation:   ORG-UIHC1-AP
org-name:       United Information Highway Co.,Ltd.
org-type:       LIR
country:        TH
address:        499 Benchachinda Bldg.
address:        Kamphangphet 6 Rd., Ladyao
phone:          +66-28314888
fax-no:         +66-20165073
e-mail:         info@uih.co.th
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:15:23Z
source:         APNIC

role:           ABUSE UIHTH
country:        ZZ
address:        499 Benchachinda Bldg., Fl-4B
address:        Vibhavadi-Rangsit Rd.,
address:        Ladyao, Chatuchak 10900
phone:          +000000000
e-mail:         system_team@uih.co.th
admin-c:        ST1220-AP
tech-c:         ST1220-AP
nic-hdl:        AU80-AP
remarks:        Generated from irt object IRT-UIH-TH
remarks:        system_team@uih.co.th was validated on 2026-01-23
abuse-mailbox:  system_team@uih.co.th
mnt-by:         APNIC-ABUSE
last-modified:  2026-01-23T07:46:11Z
source:         APNIC

person:         System Team
address:        499 Benchachinda Building, Kamphaeng Phet 6 Road
country:        TH
phone:          +6620165111
e-mail:         system_team@uih.co.th
nic-hdl:        ST1220-AP
mnt-by:         MAINT-TH-BENCHA
last-modified:  2018-05-23T04:48:34Z
source:         APNIC

% Information related to '124.197.50.0/24AS38794'

route:          124.197.50.0/24
origin:         AS38794
descr:          United Information Highway Co.,Ltd.
                499 Benchachinda Bldg.
                Kamphangphet 6 Rd., Ladyao
mnt-by:         MAINT-TH-BENCHA
last-modified:  2025-05-13T03:09:29Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.197.50.183
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12765
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.197.50.183.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040600 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 06 20:29:33 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 183.50.197.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 183.50.197.124.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
91.232.4.149 attackspambots
Aug  2 14:33:26 vps333114 sshd[10417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.232.4.149  user=root
Aug  2 14:33:29 vps333114 sshd[10417]: Failed password for root from 91.232.4.149 port 49964 ssh2
...
2020-08-02 21:08:13
112.85.42.104 attack
2020-08-02T15:57:30.401330lavrinenko.info sshd[26163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.104  user=root
2020-08-02T15:57:32.662066lavrinenko.info sshd[26163]: Failed password for root from 112.85.42.104 port 11255 ssh2
2020-08-02T15:57:30.401330lavrinenko.info sshd[26163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.104  user=root
2020-08-02T15:57:32.662066lavrinenko.info sshd[26163]: Failed password for root from 112.85.42.104 port 11255 ssh2
2020-08-02T15:57:36.569621lavrinenko.info sshd[26163]: Failed password for root from 112.85.42.104 port 11255 ssh2
...
2020-08-02 21:02:23
194.26.29.134 attackspam
08/02/2020-08:13:22.382356 194.26.29.134 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-08-02 21:18:58
202.153.37.194 attackbotsspam
Aug  2 12:09:51 ip-172-31-61-156 sshd[30280]: Failed password for root from 202.153.37.194 port 52475 ssh2
Aug  2 12:09:50 ip-172-31-61-156 sshd[30280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.153.37.194  user=root
Aug  2 12:09:51 ip-172-31-61-156 sshd[30280]: Failed password for root from 202.153.37.194 port 52475 ssh2
Aug  2 12:13:23 ip-172-31-61-156 sshd[30451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.153.37.194  user=root
Aug  2 12:13:26 ip-172-31-61-156 sshd[30451]: Failed password for root from 202.153.37.194 port 43424 ssh2
...
2020-08-02 21:15:12
188.40.60.247 attack
Aug  2 14:05:58 inter-technics sshd[27835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.40.60.247  user=root
Aug  2 14:06:01 inter-technics sshd[27835]: Failed password for root from 188.40.60.247 port 44620 ssh2
Aug  2 14:09:42 inter-technics sshd[28223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.40.60.247  user=root
Aug  2 14:09:44 inter-technics sshd[28223]: Failed password for root from 188.40.60.247 port 56000 ssh2
Aug  2 14:13:27 inter-technics sshd[28475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.40.60.247  user=root
Aug  2 14:13:29 inter-technics sshd[28475]: Failed password for root from 188.40.60.247 port 39150 ssh2
...
2020-08-02 21:11:33
45.232.73.83 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-02 21:23:39
110.39.194.58 attackbots
Brute force attempt
2020-08-02 21:23:16
222.186.190.14 attack
Aug  2 08:58:44 plusreed sshd[15432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.14  user=root
Aug  2 08:58:46 plusreed sshd[15432]: Failed password for root from 222.186.190.14 port 10314 ssh2
...
2020-08-02 21:14:15
132.232.68.26 attackbots
2020-08-02T12:25:32.675776shield sshd\[31087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.68.26  user=root
2020-08-02T12:25:34.294606shield sshd\[31087\]: Failed password for root from 132.232.68.26 port 54642 ssh2
2020-08-02T12:29:05.777805shield sshd\[31627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.68.26  user=root
2020-08-02T12:29:07.637754shield sshd\[31627\]: Failed password for root from 132.232.68.26 port 37326 ssh2
2020-08-02T12:32:41.106156shield sshd\[32615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.68.26  user=root
2020-08-02 21:06:12
111.229.61.82 attackspam
Aug  2 14:13:31 rancher-0 sshd[723742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.61.82  user=root
Aug  2 14:13:33 rancher-0 sshd[723742]: Failed password for root from 111.229.61.82 port 53800 ssh2
...
2020-08-02 21:06:47
51.103.27.114 attackspambots
20 attempts against mh-ssh on wind
2020-08-02 21:02:55
191.240.100.11 attackspambots
20/8/2@08:14:02: FAIL: Alarm-Intrusion address from=191.240.100.11
...
2020-08-02 20:46:18
195.24.207.114 attack
Aug  2 14:08:26 marvibiene sshd[16597]: Failed password for root from 195.24.207.114 port 60694 ssh2
2020-08-02 21:09:41
222.220.157.241 attackspambots
Unauthorised access (Aug  2) SRC=222.220.157.241 LEN=40 TTL=49 ID=32792 TCP DPT=8080 WINDOW=48202 SYN
2020-08-02 21:01:22
91.121.89.189 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-02 20:44:30

Recently Reported IPs

47.245.61.244 135.148.120.46 111.230.192.128 204.141.243.14
151.164.187.79 65.157.113.252 99.171.169.2 197.248.225.253
15.205.38.135 69.17.68.137 2606:4700:10::ac43:2226 2606:4700:10::6814:5763
2606:4700:10::6816:1317 2606:4700:10::6814:7736 2606:4700:10::6816:1601 2606:4700:10::6814:5582
2606:4700:10::6814:7550 2606:4700:10::6816:4383 2606:4700:10::6816:1165 2606:4700:10::6816:2781