City: unknown
Region: unknown
Country: Thailand
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '14.207.128.0 - 14.207.255.255'
% Abuse contact for '14.207.128.0 - 14.207.255.255' is 'ipadmin@3bbmail.com'
inetnum: 14.207.128.0 - 14.207.255.255
netname: TTBP-TH
descr: Triple T Broadband Public Company Limited
country: TH
admin-c: TTBP1-AP
tech-c: TTBP1-AP
abuse-c: AT1597-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-TTBP-TH
mnt-irt: IRT-TTBP-TH
last-modified: 2021-12-22T02:33:28Z
source: APNIC
irt: IRT-TTBP-TH
address: 89 , Cosmo Office Park Building , Popular Road Ban Mai Subdistrict , Pakkret 11120
e-mail: ipadmin@3bbmail.com
abuse-mailbox: ipadmin@3bbmail.com
admin-c: TTBP1-AP
tech-c: TTBP1-AP
auth: # Filtered
remarks: ipadmin@3bbmail.com was validated on 2025-09-11
mnt-by: MAINT-TTBP-TH
last-modified: 2026-02-13T04:33:50Z
source: APNIC
role: ABUSE TTBPTH
country: ZZ
address: 89 , Cosmo Office Park Building , Popular Road Ban Mai Subdistrict , Pakkret 11120
phone: +000000000
e-mail: ipadmin@3bbmail.com
admin-c: TTBP1-AP
tech-c: TTBP1-AP
nic-hdl: AT1597-AP
remarks: Generated from irt object IRT-TTBP-TH
remarks: ipadmin@3bbmail.com was validated on 2025-09-11
abuse-mailbox: ipadmin@3bbmail.com
mnt-by: APNIC-ABUSE
last-modified: 2025-09-11T08:48:08Z
source: APNIC
role: Triple T Broadband PCL administrator
address: Jasmine International Public Company Limited, Pakkret Nonthaburi 11120
country: TH
phone: +6621008552
e-mail: wanchai.ti@jasmine.com
admin-c: TTBP1-AP
tech-c: TTBP1-AP
nic-hdl: TTBP1-AP
mnt-by: MAINT-TTBP-TH
last-modified: 2021-07-27T02:31:01Z
source: APNIC
% Information related to '14.207.194.0/24AS138422'
route: 14.207.194.0/24
origin: AS138422
descr: Triple T Broadband Public Company Limited
89 , Cosmo Office Park Building , Popular Road
Ban Mai Subdistrict ,
mnt-by: MAINT-TTBP-TH
last-modified: 2026-01-28T04:39:47Z
source: APNIC
% Information related to '14.207.194.0/24AS45458'
route: 14.207.194.0/24
origin: AS45458
descr: Triple T Broadband Public Company Limited
Jasmine International Tower 200 Moo 4 Chaengwattana Rd.
mnt-by: MAINT-TTBP-TH
last-modified: 2025-08-14T06:46:16Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.194.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15789
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.207.194.154. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032502 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 11:04:25 CST 2026
;; MSG SIZE rcvd: 107
Host 154.194.207.14.in-addr.arpa not found: 2(SERVFAIL)
server can't find 14.207.194.154.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 178.62.28.79 | attackspambots | Nov 27 23:58:14 lnxweb62 sshd[27478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.28.79 |
2019-11-28 08:08:25 |
| 222.186.52.86 | attack | Nov 27 23:57:49 * sshd[24276]: Failed password for root from 222.186.52.86 port 23327 ssh2 |
2019-11-28 07:43:19 |
| 112.85.42.227 | attack | Nov 27 19:00:32 TORMINT sshd\[18574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227 user=root Nov 27 19:00:35 TORMINT sshd\[18574\]: Failed password for root from 112.85.42.227 port 23068 ssh2 Nov 27 19:05:55 TORMINT sshd\[18904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227 user=root ... |
2019-11-28 08:16:30 |
| 203.172.66.216 | attack | Nov 27 23:56:52 tux-35-217 sshd\[22004\]: Invalid user zandwijken from 203.172.66.216 port 42602 Nov 27 23:56:52 tux-35-217 sshd\[22004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.172.66.216 Nov 27 23:56:54 tux-35-217 sshd\[22004\]: Failed password for invalid user zandwijken from 203.172.66.216 port 42602 ssh2 Nov 28 00:04:15 tux-35-217 sshd\[22041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.172.66.216 user=root ... |
2019-11-28 07:55:00 |
| 106.13.117.96 | attackbotsspam | Nov 27 23:50:52 vps666546 sshd\[21976\]: Invalid user Cheese from 106.13.117.96 port 50126 Nov 27 23:50:52 vps666546 sshd\[21976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.117.96 Nov 27 23:50:54 vps666546 sshd\[21976\]: Failed password for invalid user Cheese from 106.13.117.96 port 50126 ssh2 Nov 27 23:58:01 vps666546 sshd\[22228\]: Invalid user helme from 106.13.117.96 port 56414 Nov 27 23:58:01 vps666546 sshd\[22228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.117.96 ... |
2019-11-28 08:15:43 |
| 159.203.201.150 | attack | " " |
2019-11-28 08:18:58 |
| 195.29.105.125 | attack | 2019-11-27T23:25:15.939787abusebot-6.cloudsearch.cf sshd\[5502\]: Invalid user pcap from 195.29.105.125 port 40718 |
2019-11-28 07:59:37 |
| 111.231.89.197 | attackspambots | Automatic report - Banned IP Access |
2019-11-28 08:01:35 |
| 188.166.229.205 | attackspam | Invalid user backuppc from 188.166.229.205 port 43918 |
2019-11-28 08:23:27 |
| 112.85.42.171 | attack | Nov 28 02:03:59 sauna sshd[58200]: Failed password for root from 112.85.42.171 port 37798 ssh2 Nov 28 02:04:13 sauna sshd[58200]: error: maximum authentication attempts exceeded for root from 112.85.42.171 port 37798 ssh2 [preauth] ... |
2019-11-28 08:13:16 |
| 46.38.144.32 | attack | Nov 28 00:58:46 vmanager6029 postfix/smtpd\[2073\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 28 00:59:58 vmanager6029 postfix/smtpd\[2073\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-11-28 08:02:47 |
| 106.12.74.238 | attack | Nov 28 00:52:31 OPSO sshd\[28782\]: Invalid user hewage from 106.12.74.238 port 42026 Nov 28 00:52:31 OPSO sshd\[28782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.74.238 Nov 28 00:52:33 OPSO sshd\[28782\]: Failed password for invalid user hewage from 106.12.74.238 port 42026 ssh2 Nov 28 00:59:19 OPSO sshd\[29944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.74.238 user=root Nov 28 00:59:21 OPSO sshd\[29944\]: Failed password for root from 106.12.74.238 port 47756 ssh2 |
2019-11-28 08:11:57 |
| 41.86.34.52 | attackbotsspam | Nov 28 00:30:02 sd-53420 sshd\[2561\]: User root from 41.86.34.52 not allowed because none of user's groups are listed in AllowGroups Nov 28 00:30:02 sd-53420 sshd\[2561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.86.34.52 user=root Nov 28 00:30:05 sd-53420 sshd\[2561\]: Failed password for invalid user root from 41.86.34.52 port 38657 ssh2 Nov 28 00:34:52 sd-53420 sshd\[3344\]: Invalid user kerxhalli from 41.86.34.52 Nov 28 00:34:52 sd-53420 sshd\[3344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.86.34.52 ... |
2019-11-28 07:48:38 |
| 104.254.92.54 | attackbots | HTTP contact form spam |
2019-11-28 07:57:20 |
| 222.186.175.163 | attackspam | Nov 28 01:03:08 meumeu sshd[16521]: Failed password for root from 222.186.175.163 port 46790 ssh2 Nov 28 01:03:21 meumeu sshd[16521]: Failed password for root from 222.186.175.163 port 46790 ssh2 Nov 28 01:03:24 meumeu sshd[16521]: Failed password for root from 222.186.175.163 port 46790 ssh2 Nov 28 01:03:25 meumeu sshd[16521]: error: maximum authentication attempts exceeded for root from 222.186.175.163 port 46790 ssh2 [preauth] ... |
2019-11-28 08:04:42 |