Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bangkok

Region: Bangkok

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '2001:44c8::/32'

% Abuse contact for '2001:44c8::/32' is 'abuseIPv4@ais.co.th'

inet6num:       2001:44c8::/32
netname:        AWN-CO-LTD-TH
descr:          408/60 PHP Bld. 15th Fl Phaholyothin Rd Samsen Nai Phayathai
country:        TH
org:            ORG-AWNC1-AP
admin-c:        AWNC1-AP
tech-c:         AWNC1-AP
abuse-c:        AA1419-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-AWN-CO-LTD-TH
mnt-routes:     MAINT-AWN-CO-LTD-TH
mnt-irt:        IRT-AWN-CO-LTD-TH
last-modified:  2021-05-26T03:44:26Z
source:         APNIC

irt:            IRT-AWN-CO-LTD-TH
address:        414 Phaholyothin Rd Samsen Nai Phayathai Thailand Bangkok 10400
e-mail:         abuseIPv4@ais.co.th
abuse-mailbox:  abuseIPv4@ais.co.th
admin-c:        AWNC1-AP
tech-c:         AWNC1-AP
auth:           # Filtered
remarks:        abuseipv4@ais.co.th was validated on 2026-02-27
mnt-by:         MAINT-AWN-CO-LTD-TH
last-modified:  2026-02-27T03:34:38Z
source:         APNIC

organisation:   ORG-AWNC1-AP
org-name:       ADVANCED WIRELESS NETWORK COMPANY LIMITED
org-type:       LIR
country:        TH
address:        414 Phaholyothin Rd Samsen Nai Phayathai
phone:          +6626153984
e-mail:         abuseIPv4@ais.co.th
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:16:29Z
source:         APNIC

role:           ABUSE AWNCOLTDTH
country:        ZZ
address:        414 Phaholyothin Rd Samsen Nai Phayathai Thailand Bangkok 10400
phone:          +000000000
e-mail:         abuseIPv4@ais.co.th
admin-c:        AWNC1-AP
tech-c:         AWNC1-AP
nic-hdl:        AA1419-AP
remarks:        Generated from irt object IRT-AWN-CO-LTD-TH
remarks:        abuseipv4@ais.co.th was validated on 2026-02-27
abuse-mailbox:  abuseIPv4@ais.co.th
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-27T03:34:53Z
source:         APNIC

role:           ADVANCED WIRELESS NETWORK COMPANY LIMITED administ
address:        414 Phaholyothin Rd Samsen Nai Phayathai, Thailand Bangkok 10400
country:        TH
phone:          +6626153984
fax-no:         +6626153984
e-mail:         abuseIPv4@ais.co.th
admin-c:        AWNC1-AP
tech-c:         AWNC1-AP
nic-hdl:        AWNC1-AP
mnt-by:         MAINT-AWN-CO-LTD-TH
last-modified:  2020-07-16T07:24:17Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2001:44c8:414e:887:1:1:ccd5:7f63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 40853
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2001:44c8:414e:887:1:1:ccd5:7f63. IN	A

;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Wed May 06 22:38:38 CST 2026
;; MSG SIZE  rcvd: 61

'
Host info
Host 3.6.f.7.5.d.c.c.1.0.0.0.1.0.0.0.7.8.8.0.e.4.1.4.8.c.4.4.1.0.0.2.ip6.arpa not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 3.6.f.7.5.d.c.c.1.0.0.0.1.0.0.0.7.8.8.0.e.4.1.4.8.c.4.4.1.0.0.2.ip6.arpa: NXDOMAIN
Related comments:
IP Type Details Datetime
167.71.184.168 attackbots
2019-09-27T00:51:00.526489abusebot-7.cloudsearch.cf sshd\[23216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.184.168  user=root
2019-09-27 08:51:23
13.94.57.155 attackbotsspam
Sep 26 14:41:52 aiointranet sshd\[19391\]: Invalid user demo from 13.94.57.155
Sep 26 14:41:52 aiointranet sshd\[19391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.94.57.155
Sep 26 14:41:54 aiointranet sshd\[19391\]: Failed password for invalid user demo from 13.94.57.155 port 33292 ssh2
Sep 26 14:47:11 aiointranet sshd\[19861\]: Invalid user vagrant3 from 13.94.57.155
Sep 26 14:47:11 aiointranet sshd\[19861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.94.57.155
2019-09-27 08:47:41
62.213.30.142 attack
Sep 27 02:40:58 eventyay sshd[29094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.213.30.142
Sep 27 02:41:00 eventyay sshd[29094]: Failed password for invalid user test from 62.213.30.142 port 47586 ssh2
Sep 27 02:44:51 eventyay sshd[29191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.213.30.142
...
2019-09-27 09:16:14
5.94.125.87 attackbotsspam
Hits on port : 2323
2019-09-27 08:52:40
190.221.50.90 attack
Sep 26 14:31:27 tdfoods sshd\[31947\]: Invalid user fen from 190.221.50.90
Sep 26 14:31:27 tdfoods sshd\[31947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.221.50.90
Sep 26 14:31:28 tdfoods sshd\[31947\]: Failed password for invalid user fen from 190.221.50.90 port 30376 ssh2
Sep 26 14:36:50 tdfoods sshd\[32454\]: Invalid user ts from 190.221.50.90
Sep 26 14:36:50 tdfoods sshd\[32454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.221.50.90
2019-09-27 08:46:51
211.142.116.198 attackspambots
ssh failed login
2019-09-27 08:59:56
60.248.51.155 attackspambots
SSH-bruteforce attempts
2019-09-27 09:00:25
120.52.152.18 attackbotsspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-09-27 09:14:33
91.215.244.12 attackspambots
Sep 26 23:20:12 apollo sshd\[5628\]: Invalid user spike from 91.215.244.12Sep 26 23:20:14 apollo sshd\[5628\]: Failed password for invalid user spike from 91.215.244.12 port 35993 ssh2Sep 26 23:24:13 apollo sshd\[5632\]: Invalid user admin from 91.215.244.12
...
2019-09-27 09:24:53
45.80.65.80 attackbotsspam
2019-09-27T01:06:06.024185abusebot-3.cloudsearch.cf sshd\[1018\]: Invalid user git from 45.80.65.80 port 42650
2019-09-27 09:12:35
172.245.139.190 attackbots
Unauthorised access (Sep 27) SRC=172.245.139.190 LEN=40 TOS=0x10 PREC=0x40 TTL=236 ID=54321 TCP DPT=23 WINDOW=65535 SYN 
Unauthorised access (Sep 23) SRC=172.245.139.190 LEN=40 TOS=0x10 PREC=0x40 TTL=236 ID=54321 TCP DPT=23 WINDOW=65535 SYN
2019-09-27 08:51:08
164.132.192.253 attack
Sep 26 14:59:36 auw2 sshd\[10859\]: Invalid user po from 164.132.192.253
Sep 26 14:59:36 auw2 sshd\[10859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=253.ip-164-132-192.eu
Sep 26 14:59:38 auw2 sshd\[10859\]: Failed password for invalid user po from 164.132.192.253 port 57982 ssh2
Sep 26 15:03:50 auw2 sshd\[11173\]: Invalid user emilie from 164.132.192.253
Sep 26 15:03:50 auw2 sshd\[11173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=253.ip-164-132-192.eu
2019-09-27 09:05:06
125.212.192.201 attack
Sep 27 01:09:12 nextcloud sshd\[9697\]: Invalid user admin from 125.212.192.201
Sep 27 01:09:12 nextcloud sshd\[9697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.192.201
Sep 27 01:09:14 nextcloud sshd\[9697\]: Failed password for invalid user admin from 125.212.192.201 port 47880 ssh2
...
2019-09-27 08:47:15
41.239.90.151 attackbotsspam
Chat Spam
2019-09-27 09:21:09
218.246.5.112 attack
Sep 26 14:52:10 tdfoods sshd\[1577\]: Invalid user ftpuser from 218.246.5.112
Sep 26 14:52:10 tdfoods sshd\[1577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.246.5.112
Sep 26 14:52:12 tdfoods sshd\[1577\]: Failed password for invalid user ftpuser from 218.246.5.112 port 41176 ssh2
Sep 26 14:56:48 tdfoods sshd\[2069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.246.5.112  user=root
Sep 26 14:56:50 tdfoods sshd\[2069\]: Failed password for root from 218.246.5.112 port 51020 ssh2
2019-09-27 09:01:11

Recently Reported IPs

8.145.53.115 158.219.158.158 119.19.34.27 95.88.254.186
243.162.122.167 111.181.113.0 111.181.113.229 111.181.113.109
68.64.135.108 20.65.154.237 121.234.219.132 2606:4700:10::6814:6745
206.189.5.43 54.209.32.184 23.175.145.36 193.111.77.109
121.230.89.25 2606:4700:10::ac43:1013 2606:4700:10::6816:3931 2606:4700:10::6816:2890