City: Phnom Penh
Region: Phnom Penh
Country: Cambodia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 144.48.84.0 - 144.48.191.255
CIDR: 144.48.84.0/22, 144.48.128.0/18, 144.48.96.0/19, 144.48.88.0/21
NetName: APNIC-ERX-144-48-64-0
NetHandle: NET-144-48-84-0-1
Parent: NET144 (NET-144-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2018-05-23
Updated: 2023-09-05
Ref: https://rdap.arin.net/registry/ip/144.48.84.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois://whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '144.48.136.0 - 144.48.139.255'
% Abuse contact for '144.48.136.0 - 144.48.139.255' is 'sokleap@yes.com.kh'
inetnum: 144.48.136.0 - 144.48.139.255
netname: SEATELECOM-KH
descr: SOUTH EAST ASIA TELECOM (Cambodia) Co., LTD
descr: # 149,St 432,Village 5,Sangkat Boeung Trabek,Khan Charmkamorn
country: KH
org: ORG-SEAT1-AP
admin-c: SEAT1-AP
tech-c: SEAT1-AP
abuse-c: AK1177-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-KH-SEATELECOM
mnt-routes: MAINT-KH-SEATELECOM
mnt-irt: IRT-KH-SEATELECOM
last-modified: 2020-07-16T02:10:55Z
source: APNIC
irt: IRT-KH-SEATELECOM
address:
e-mail: sokleap@yes.com.kh
abuse-mailbox: sokleap@yes.com.kh
admin-c: SEAT1-AP
tech-c: SEAT1-AP
auth: # Filtered
remarks: sokleap@yes.com.kh is invalid
mnt-by: MAINT-KH-SEATELECOM
last-modified: 2025-09-04T06:59:43Z
source: APNIC
organisation: ORG-SEAT1-AP
org-name: SOUTH EAST ASIA TELECOM (Cambodia) Co., LTD
org-type: LIR
country: KH
address: # 149,St 432,Village 5,Sangkat Boeung Trabek,Khan Charmkamorn
phone: +855-18-9800-800
e-mail: ipteam@yes.com.kh
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:16:13Z
source: APNIC
role: ABUSE KHSEATELECOM
country: ZZ
address: # 149, St 432, Village 5, Sangkat Boeung Trabek, Khan Chamkarmorn, Phnom Penh, Kingdom of Cambodia
phone: +000000000
e-mail: sokleap@yes.com.kh
admin-c: SEAT1-AP
tech-c: SEAT1-AP
nic-hdl: AK1177-AP
remarks: Generated from irt object IRT-KH-SEATELECOM
remarks: sokleap@yes.com.kh is invalid
abuse-mailbox: sokleap@yes.com.kh
mnt-by: APNIC-ABUSE
last-modified: 2025-05-14T13:06:04Z
source: APNIC
role: SOUTH EAST ASIA TELECOM Cambodia Co LTD administrator
address: #149, St 432, Village 5, Sangkat Boeung Trabek, Khan Chamkarmorn, Phnom Penh, Kingdom of Cambodia
country: KH
phone: +855 18 9700 198
fax-no: +855 18 9700 198
e-mail: sokleap.chin@seatelgroup.com
admin-c: SEAT1-AP
tech-c: SEAT1-AP
nic-hdl: SEAT1-AP
mnt-by: MAINT-KH-SEATELECOM
last-modified: 2018-01-25T04:10:53Z
source: APNIC
% Information related to '144.48.136.0/24AS55769'
route: 144.48.136.0/24
origin: AS55769
descr: SOUTH EAST ASIA TELECOM (Cambodia) Co., LTD
#149,St 432,Village 5,Sangkat Boeung Trabek,Khan Charmkamorn
mnt-by: MAINT-KH-SEATELECOM
last-modified: 2021-11-04T10:53:03Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.48.136.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50129
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;144.48.136.5. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025092400 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 24 18:26:18 CST 2025
;; MSG SIZE rcvd: 105
Host 5.136.48.144.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 5.136.48.144.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
111.67.198.206 | attack | Apr 11 14:10:32 meumeu sshd[31500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.198.206 Apr 11 14:10:34 meumeu sshd[31500]: Failed password for invalid user parts from 111.67.198.206 port 36196 ssh2 Apr 11 14:11:47 meumeu sshd[31678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.198.206 ... |
2020-04-12 04:25:20 |
178.22.41.5 | attackbotsspam | Automatic report - Port Scan Attack |
2020-04-12 04:01:17 |
94.25.238.173 | attackbots | 1586607105 - 04/11/2020 14:11:45 Host: 94.25.238.173/94.25.238.173 Port: 445 TCP Blocked |
2020-04-12 04:27:14 |
178.136.235.119 | attackspambots | Apr 11 22:25:40 debian64 sshd[15955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.136.235.119 Apr 11 22:25:43 debian64 sshd[15955]: Failed password for invalid user max from 178.136.235.119 port 45781 ssh2 ... |
2020-04-12 04:31:33 |
45.119.84.254 | attack | 21 attempts against mh-ssh on cloud |
2020-04-12 04:41:07 |
111.229.134.68 | attackbotsspam | (sshd) Failed SSH login from 111.229.134.68 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 11 08:00:30 localhost sshd[4056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.134.68 user=root Apr 11 08:00:33 localhost sshd[4056]: Failed password for root from 111.229.134.68 port 41670 ssh2 Apr 11 08:05:23 localhost sshd[4433]: Invalid user admin from 111.229.134.68 port 58916 Apr 11 08:05:25 localhost sshd[4433]: Failed password for invalid user admin from 111.229.134.68 port 58916 ssh2 Apr 11 08:11:35 localhost sshd[4817]: Invalid user lisa from 111.229.134.68 port 44354 |
2020-04-12 04:31:53 |
81.169.179.211 | attack | Apr 11 19:08:11 cvbnet sshd[29619]: Failed password for root from 81.169.179.211 port 22536 ssh2 ... |
2020-04-12 04:02:12 |
159.65.219.210 | attack | Apr 11 11:34:57 server1 sshd\[25798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.219.210 user=root Apr 11 11:34:59 server1 sshd\[25798\]: Failed password for root from 159.65.219.210 port 46928 ssh2 Apr 11 11:38:45 server1 sshd\[26859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.219.210 user=root Apr 11 11:38:47 server1 sshd\[26859\]: Failed password for root from 159.65.219.210 port 54832 ssh2 Apr 11 11:42:24 server1 sshd\[27864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.219.210 user=root ... |
2020-04-12 04:32:48 |
61.177.172.128 | attackspambots | $f2bV_matches |
2020-04-12 04:09:43 |
222.186.175.151 | attack | Apr 12 03:20:08 webhost01 sshd[23687]: Failed password for root from 222.186.175.151 port 6344 ssh2 Apr 12 03:20:11 webhost01 sshd[23687]: Failed password for root from 222.186.175.151 port 6344 ssh2 ... |
2020-04-12 04:24:53 |
196.220.34.80 | attackbots | Icarus honeypot on github |
2020-04-12 04:00:11 |
180.76.179.77 | attackspambots | Apr 11 22:16:46 legacy sshd[28764]: Failed password for root from 180.76.179.77 port 52066 ssh2 Apr 11 22:24:07 legacy sshd[28976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.179.77 Apr 11 22:24:09 legacy sshd[28976]: Failed password for invalid user admin from 180.76.179.77 port 50618 ssh2 ... |
2020-04-12 04:29:35 |
186.10.125.209 | attackbots | 2020-04-11T21:26:20.047550vps773228.ovh.net sshd[24130]: Failed password for invalid user test1 from 186.10.125.209 port 10572 ssh2 2020-04-11T21:29:10.121882vps773228.ovh.net sshd[25185]: Invalid user admin from 186.10.125.209 port 13690 2020-04-11T21:29:10.140408vps773228.ovh.net sshd[25185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.125.209 2020-04-11T21:29:10.121882vps773228.ovh.net sshd[25185]: Invalid user admin from 186.10.125.209 port 13690 2020-04-11T21:29:12.224952vps773228.ovh.net sshd[25185]: Failed password for invalid user admin from 186.10.125.209 port 13690 ssh2 ... |
2020-04-12 04:34:22 |
138.68.26.48 | attackspam | Brute-force attempt banned |
2020-04-12 04:13:36 |
36.37.128.126 | attackspam | Automatic report - Port Scan Attack |
2020-04-12 04:38:27 |