Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Phnom Penh

Region: Phnom Penh

Country: Cambodia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       144.48.84.0 - 144.48.191.255
CIDR:           144.48.84.0/22, 144.48.128.0/18, 144.48.96.0/19, 144.48.88.0/21
NetName:        APNIC-ERX-144-48-64-0
NetHandle:      NET-144-48-84-0-1
Parent:         NET144 (NET-144-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2018-05-23
Updated:        2023-09-05
Ref:            https://rdap.arin.net/registry/ip/144.48.84.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois://whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '144.48.136.0 - 144.48.139.255'

% Abuse contact for '144.48.136.0 - 144.48.139.255' is 'sokleap@yes.com.kh'

inetnum:        144.48.136.0 - 144.48.139.255
netname:        SEATELECOM-KH
descr:          SOUTH EAST ASIA TELECOM (Cambodia) Co., LTD
descr:          # 149,St 432,Village 5,Sangkat Boeung Trabek,Khan Charmkamorn
country:        KH
org:            ORG-SEAT1-AP
admin-c:        SEAT1-AP
tech-c:         SEAT1-AP
abuse-c:        AK1177-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-KH-SEATELECOM
mnt-routes:     MAINT-KH-SEATELECOM
mnt-irt:        IRT-KH-SEATELECOM
last-modified:  2020-07-16T02:10:55Z
source:         APNIC

irt:            IRT-KH-SEATELECOM
address:
e-mail:         sokleap@yes.com.kh
abuse-mailbox:  sokleap@yes.com.kh
admin-c:        SEAT1-AP
tech-c:         SEAT1-AP
auth:           # Filtered
remarks:        sokleap@yes.com.kh is invalid
mnt-by:         MAINT-KH-SEATELECOM
last-modified:  2025-09-04T06:59:43Z
source:         APNIC

organisation:   ORG-SEAT1-AP
org-name:       SOUTH EAST ASIA TELECOM (Cambodia) Co., LTD
org-type:       LIR
country:        KH
address:        # 149,St 432,Village 5,Sangkat Boeung Trabek,Khan Charmkamorn
phone:          +855-18-9800-800
e-mail:         ipteam@yes.com.kh
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:16:13Z
source:         APNIC

role:           ABUSE KHSEATELECOM
country:        ZZ
address:        # 149, St 432, Village 5, Sangkat Boeung Trabek, Khan Chamkarmorn, Phnom Penh, Kingdom of Cambodia
phone:          +000000000
e-mail:         sokleap@yes.com.kh
admin-c:        SEAT1-AP
tech-c:         SEAT1-AP
nic-hdl:        AK1177-AP
remarks:        Generated from irt object IRT-KH-SEATELECOM
remarks:        sokleap@yes.com.kh is invalid
abuse-mailbox:  sokleap@yes.com.kh
mnt-by:         APNIC-ABUSE
last-modified:  2025-05-14T13:06:04Z
source:         APNIC

role:           SOUTH EAST ASIA TELECOM Cambodia Co LTD administrator
address:        #149, St 432, Village 5, Sangkat Boeung Trabek, Khan Chamkarmorn, Phnom Penh, Kingdom of Cambodia
country:        KH
phone:          +855 18 9700 198
fax-no:         +855 18 9700 198
e-mail:         sokleap.chin@seatelgroup.com
admin-c:        SEAT1-AP
tech-c:         SEAT1-AP
nic-hdl:        SEAT1-AP
mnt-by:         MAINT-KH-SEATELECOM
last-modified:  2018-01-25T04:10:53Z
source:         APNIC

% Information related to '144.48.136.0/24AS55769'

route:          144.48.136.0/24
origin:         AS55769
descr:          SOUTH EAST ASIA TELECOM (Cambodia) Co., LTD
                #149,St 432,Village 5,Sangkat Boeung Trabek,Khan Charmkamorn
mnt-by:         MAINT-KH-SEATELECOM
last-modified:  2021-11-04T10:53:03Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.48.136.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50129
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;144.48.136.5.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025092400 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 24 18:26:18 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 5.136.48.144.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.136.48.144.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.67.198.206 attack
Apr 11 14:10:32 meumeu sshd[31500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.198.206 
Apr 11 14:10:34 meumeu sshd[31500]: Failed password for invalid user parts from 111.67.198.206 port 36196 ssh2
Apr 11 14:11:47 meumeu sshd[31678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.198.206 
...
2020-04-12 04:25:20
178.22.41.5 attackbotsspam
Automatic report - Port Scan Attack
2020-04-12 04:01:17
94.25.238.173 attackbots
1586607105 - 04/11/2020 14:11:45 Host: 94.25.238.173/94.25.238.173 Port: 445 TCP Blocked
2020-04-12 04:27:14
178.136.235.119 attackspambots
Apr 11 22:25:40 debian64 sshd[15955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.136.235.119 
Apr 11 22:25:43 debian64 sshd[15955]: Failed password for invalid user max from 178.136.235.119 port 45781 ssh2
...
2020-04-12 04:31:33
45.119.84.254 attack
21 attempts against mh-ssh on cloud
2020-04-12 04:41:07
111.229.134.68 attackbotsspam
(sshd) Failed SSH login from 111.229.134.68 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 11 08:00:30 localhost sshd[4056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.134.68  user=root
Apr 11 08:00:33 localhost sshd[4056]: Failed password for root from 111.229.134.68 port 41670 ssh2
Apr 11 08:05:23 localhost sshd[4433]: Invalid user admin from 111.229.134.68 port 58916
Apr 11 08:05:25 localhost sshd[4433]: Failed password for invalid user admin from 111.229.134.68 port 58916 ssh2
Apr 11 08:11:35 localhost sshd[4817]: Invalid user lisa from 111.229.134.68 port 44354
2020-04-12 04:31:53
81.169.179.211 attack
Apr 11 19:08:11 cvbnet sshd[29619]: Failed password for root from 81.169.179.211 port 22536 ssh2
...
2020-04-12 04:02:12
159.65.219.210 attack
Apr 11 11:34:57 server1 sshd\[25798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.219.210  user=root
Apr 11 11:34:59 server1 sshd\[25798\]: Failed password for root from 159.65.219.210 port 46928 ssh2
Apr 11 11:38:45 server1 sshd\[26859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.219.210  user=root
Apr 11 11:38:47 server1 sshd\[26859\]: Failed password for root from 159.65.219.210 port 54832 ssh2
Apr 11 11:42:24 server1 sshd\[27864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.219.210  user=root
...
2020-04-12 04:32:48
61.177.172.128 attackspambots
$f2bV_matches
2020-04-12 04:09:43
222.186.175.151 attack
Apr 12 03:20:08 webhost01 sshd[23687]: Failed password for root from 222.186.175.151 port 6344 ssh2
Apr 12 03:20:11 webhost01 sshd[23687]: Failed password for root from 222.186.175.151 port 6344 ssh2
...
2020-04-12 04:24:53
196.220.34.80 attackbots
Icarus honeypot on github
2020-04-12 04:00:11
180.76.179.77 attackspambots
Apr 11 22:16:46 legacy sshd[28764]: Failed password for root from 180.76.179.77 port 52066 ssh2
Apr 11 22:24:07 legacy sshd[28976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.179.77
Apr 11 22:24:09 legacy sshd[28976]: Failed password for invalid user admin from 180.76.179.77 port 50618 ssh2
...
2020-04-12 04:29:35
186.10.125.209 attackbots
2020-04-11T21:26:20.047550vps773228.ovh.net sshd[24130]: Failed password for invalid user test1 from 186.10.125.209 port 10572 ssh2
2020-04-11T21:29:10.121882vps773228.ovh.net sshd[25185]: Invalid user admin from 186.10.125.209 port 13690
2020-04-11T21:29:10.140408vps773228.ovh.net sshd[25185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.125.209
2020-04-11T21:29:10.121882vps773228.ovh.net sshd[25185]: Invalid user admin from 186.10.125.209 port 13690
2020-04-11T21:29:12.224952vps773228.ovh.net sshd[25185]: Failed password for invalid user admin from 186.10.125.209 port 13690 ssh2
...
2020-04-12 04:34:22
138.68.26.48 attackspam
Brute-force attempt banned
2020-04-12 04:13:36
36.37.128.126 attackspam
Automatic report - Port Scan Attack
2020-04-12 04:38:27

Recently Reported IPs

194.187.179.199 185.151.33.105 7.56.45.228 7.56.45.199
159.251.56.221 9.234.8.67 117.18.45.24 238.179.165.189
152.16.164.134 223.244.35.77 39.101.172.197 92.118.39.235
47.115.33.233 185.247.137.244 39.107.105.252 49.112.136.3
152.32.160.252 188.138.158.71 10.11.1.18 102.186.132.169