City: unknown
Region: unknown
Country: Thailand
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '14.207.128.0 - 14.207.255.255'
% Abuse contact for '14.207.128.0 - 14.207.255.255' is 'ipadmin@3bbmail.com'
inetnum: 14.207.128.0 - 14.207.255.255
netname: TTBP-TH
descr: Triple T Broadband Public Company Limited
country: TH
admin-c: TTBP1-AP
tech-c: TTBP1-AP
abuse-c: AT1597-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-TTBP-TH
mnt-irt: IRT-TTBP-TH
last-modified: 2021-12-22T02:33:28Z
source: APNIC
irt: IRT-TTBP-TH
address: 89 , Cosmo Office Park Building , Popular Road Ban Mai Subdistrict , Pakkret 11120
e-mail: ipadmin@3bbmail.com
abuse-mailbox: ipadmin@3bbmail.com
admin-c: TTBP1-AP
tech-c: TTBP1-AP
auth: # Filtered
remarks: ipadmin@3bbmail.com was validated on 2025-09-11
mnt-by: MAINT-TTBP-TH
last-modified: 2026-02-13T04:33:50Z
source: APNIC
role: ABUSE TTBPTH
country: ZZ
address: 89 , Cosmo Office Park Building , Popular Road Ban Mai Subdistrict , Pakkret 11120
phone: +000000000
e-mail: ipadmin@3bbmail.com
admin-c: TTBP1-AP
tech-c: TTBP1-AP
nic-hdl: AT1597-AP
remarks: Generated from irt object IRT-TTBP-TH
remarks: ipadmin@3bbmail.com was validated on 2025-09-11
abuse-mailbox: ipadmin@3bbmail.com
mnt-by: APNIC-ABUSE
last-modified: 2025-09-11T08:48:08Z
source: APNIC
role: Triple T Broadband PCL administrator
address: Jasmine International Public Company Limited, Pakkret Nonthaburi 11120
country: TH
phone: +6621008552
e-mail: wanchai.ti@jasmine.com
admin-c: TTBP1-AP
tech-c: TTBP1-AP
nic-hdl: TTBP1-AP
mnt-by: MAINT-TTBP-TH
last-modified: 2021-07-27T02:31:01Z
source: APNIC
% Information related to '14.207.194.0/24AS138422'
route: 14.207.194.0/24
origin: AS138422
descr: Triple T Broadband Public Company Limited
89 , Cosmo Office Park Building , Popular Road
Ban Mai Subdistrict ,
mnt-by: MAINT-TTBP-TH
last-modified: 2026-01-28T04:39:47Z
source: APNIC
% Information related to '14.207.194.0/24AS45458'
route: 14.207.194.0/24
origin: AS45458
descr: Triple T Broadband Public Company Limited
Jasmine International Tower 200 Moo 4 Chaengwattana Rd.
mnt-by: MAINT-TTBP-TH
last-modified: 2025-08-14T06:46:16Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.194.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7830
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.207.194.66. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032601 1800 900 604800 86400
;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 27 11:06:35 CST 2026
;; MSG SIZE rcvd: 106
b'Host 66.194.207.14.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 14.207.194.66.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 165.22.69.62 | attack | PBX: blocked for too many failed authentications; User-Agent: 3CXPhoneSystem |
2019-10-23 17:30:48 |
| 132.232.86.7 | attackbots | 2019-10-23T09:54:36.696943 sshd[8449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.86.7 user=root 2019-10-23T09:54:38.534839 sshd[8449]: Failed password for root from 132.232.86.7 port 36282 ssh2 2019-10-23T10:00:06.917492 sshd[8530]: Invalid user qc from 132.232.86.7 port 52576 2019-10-23T10:00:06.928148 sshd[8530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.86.7 2019-10-23T10:00:06.917492 sshd[8530]: Invalid user qc from 132.232.86.7 port 52576 2019-10-23T10:00:08.735979 sshd[8530]: Failed password for invalid user qc from 132.232.86.7 port 52576 ssh2 ... |
2019-10-23 17:17:08 |
| 27.151.115.81 | attackspambots | 10/22/2019-23:50:32.821390 27.151.115.81 Protocol: 1 GPL SCAN PING NMAP |
2019-10-23 17:09:56 |
| 103.198.172.4 | attackbotsspam | Sending SPAM email |
2019-10-23 17:23:59 |
| 119.102.154.36 | attack | firewall-block, port(s): 23/tcp |
2019-10-23 17:27:31 |
| 120.237.161.130 | attackbots | " " |
2019-10-23 17:14:12 |
| 103.219.187.55 | attack | Autoban 103.219.187.55 AUTH/CONNECT |
2019-10-23 17:24:40 |
| 1.170.110.104 | attackbots | " " |
2019-10-23 17:28:37 |
| 187.59.116.196 | attackspambots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/187.59.116.196/ BR - 1H : (250) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : BR NAME ASN : ASN18881 IP : 187.59.116.196 CIDR : 187.59.96.0/19 PREFIX COUNT : 938 UNIQUE IP COUNT : 4233472 ATTACKS DETECTED ASN18881 : 1H - 1 3H - 4 6H - 7 12H - 12 24H - 23 DateTime : 2019-10-23 05:49:46 INFO : HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN - data recovery |
2019-10-23 17:35:49 |
| 182.254.148.72 | attackspambots | Lines containing failures of 182.254.148.72 Oct 21 20:05:42 shared04 sshd[19686]: Invalid user applmgr from 182.254.148.72 port 24542 Oct 21 20:05:42 shared04 sshd[19686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.148.72 Oct 21 20:05:44 shared04 sshd[19686]: Failed password for invalid user applmgr from 182.254.148.72 port 24542 ssh2 Oct 21 20:05:44 shared04 sshd[19686]: Received disconnect from 182.254.148.72 port 24542:11: Normal Shutdown, Thank you for playing [preauth] Oct 21 20:05:44 shared04 sshd[19686]: Disconnected from invalid user applmgr 182.254.148.72 port 24542 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=182.254.148.72 |
2019-10-23 17:13:58 |
| 185.100.87.129 | attackspam | Oct 23 08:57:41 vpn01 sshd[26668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.100.87.129 Oct 23 08:57:43 vpn01 sshd[26668]: Failed password for invalid user minecraft from 185.100.87.129 port 37745 ssh2 ... |
2019-10-23 17:28:20 |
| 66.70.189.209 | attackbotsspam | leo_www |
2019-10-23 17:33:24 |
| 174.138.18.157 | attackbots | Oct 23 06:05:25 vps691689 sshd[520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.18.157 Oct 23 06:05:28 vps691689 sshd[520]: Failed password for invalid user 123!@# from 174.138.18.157 port 40198 ssh2 ... |
2019-10-23 16:56:58 |
| 101.110.45.156 | attackspam | Oct 23 07:07:56 www sshd\[24159\]: Invalid user cafeuser from 101.110.45.156 Oct 23 07:07:56 www sshd\[24159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.110.45.156 Oct 23 07:07:58 www sshd\[24159\]: Failed password for invalid user cafeuser from 101.110.45.156 port 49959 ssh2 ... |
2019-10-23 16:59:35 |
| 51.255.199.33 | attackbotsspam | Oct 23 06:08:15 firewall sshd[8447]: Failed password for invalid user test from 51.255.199.33 port 44890 ssh2 Oct 23 06:11:51 firewall sshd[8507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.199.33 user=root Oct 23 06:11:53 firewall sshd[8507]: Failed password for root from 51.255.199.33 port 55688 ssh2 ... |
2019-10-23 17:27:49 |