Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bangkok

Region: Bangkok

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
203.155.29.221 attack
Lines containing failures of 203.155.29.221
Oct 14 13:39:02 shared11 sshd[3084]: Invalid user aw from 203.155.29.221 port 44952
Oct 14 13:39:02 shared11 sshd[3084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.155.29.221
Oct 14 13:39:04 shared11 sshd[3084]: Failed password for invalid user aw from 203.155.29.221 port 44952 ssh2
Oct 14 13:39:04 shared11 sshd[3084]: Received disconnect from 203.155.29.221 port 44952:11: Bye Bye [preauth]
Oct 14 13:39:04 shared11 sshd[3084]: Disconnected from invalid user aw 203.155.29.221 port 44952 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=203.155.29.221
2019-10-15 00:17:04
203.155.29.221 attackspam
Brute force SMTP login attempted.
...
2019-09-27 06:58:23
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '203.155.0.0 - 203.155.255.255'

% Abuse contact for '203.155.0.0 - 203.155.255.255' is 'abuse-ip@ksc.net'

inetnum:        203.155.0.0 - 203.155.255.255
netname:        COMNET-TH
descr:          KSC Commercial Internet Co. Ltd.
descr:          2/4 Samaggi Insurance Tower 10th Fl.,
descr:          Viphavadee-Rangsit RD
descr:          Thungsonghong, Laksi
descr:          Bangkok 10210
country:        TH
org:            ORG-KCIC1-AP
admin-c:        TOC1-AP
tech-c:         TOC1-AP
abuse-c:        AK1137-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        Delegate small blocks to /16 block
mnt-by:         APNIC-HM
mnt-lower:      KSC-ADMIN
mnt-routes:     KSC-ADMIN
mnt-irt:        IRT-KSC-TH
last-modified:  2020-10-20T00:56:49Z
source:         APNIC

irt:            IRT-KSC-TH
address:        KSC Commercial Internet Co.,Ltd.
address:        Operation Department
address:        2/4 Chubb Tower 10th Fl., Viphavadee-Rangsit Rd.,
address:        Thungsonghong, Laksi, BKK, 10210. TH.
e-mail:         abuse-ip@ksc.net
abuse-mailbox:  abuse-ip@ksc.net
admin-c:        TOC1-AP
tech-c:         TOC1-AP
auth:           # Filtered
remarks:        abuse-ip@ksc.net was validated on 2026-02-18
mnt-by:         KSC-ADMIN
last-modified:  2026-02-18T04:09:44Z
source:         APNIC

organisation:   ORG-KCIC1-AP
org-name:       KSC Commercial Internet Co.Ltd.
org-type:       LIR
country:        TH
address:        2/4 Chubb Tower, 10th Floor
address:        Vibhavadee-Rangist Road
address:        Thungsonghong
phone:          +66-2-779-7777
fax-no:         +662-779-7111
e-mail:         cservice@ksc.net
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:14:43Z
source:         APNIC

role:           ABUSE KSCTH
country:        ZZ
address:        KSC Commercial Internet Co.,Ltd.
address:        Operation Department
address:        2/4 Chubb Tower 10th Fl., Viphavadee-Rangsit Rd.,
address:        Thungsonghong, Laksi, BKK, 10210. TH.
phone:          +000000000
e-mail:         abuse-ip@ksc.net
admin-c:        TOC1-AP
tech-c:         TOC1-AP
nic-hdl:        AK1137-AP
remarks:        Generated from irt object IRT-KSC-TH
remarks:        abuse-ip@ksc.net was validated on 2026-02-18
abuse-mailbox:  abuse-ip@ksc.net
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-18T04:09:54Z
source:         APNIC

person:         Technical Operation Center
address:        KSC Commercial Internet Co.,Ltd.
address:        Operation Department
address:        2/4 Samaggi Insurance Tower 10th Fl., Viphavadee-Rangsit Rd.,
address:        Thungsonghong, Laksi
address:        Bangkok 10210
country:        TH
phone:          +66-2-9797777 ext. 8428
e-mail:         netadmin@ns.ksc.co.th
nic-hdl:        TOC1-AP
mnt-by:         KSC-ADMIN
last-modified:  2008-09-04T07:29:15Z
source:         APNIC

% Information related to '203.155.16.0/20AS7693'

route:          203.155.16.0/20
origin:         AS7693
descr:          KSC Commercial Internet Co.Ltd.
                2/4 Chubb Tower, 10th Floor
                Vibhavadee-Rangist Road
                Thungsonghong
mnt-by:         KSC-ADMIN
last-modified:  2019-06-25T09:55:28Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.155.29.79
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35343
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.155.29.79.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032400 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 21:39:13 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 79.29.155.203.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 79.29.155.203.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.143.72.34 attackspam
Jun 22 17:47:53 relay postfix/smtpd\[18207\]: warning: unknown\[185.143.72.34\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 17:48:11 relay postfix/smtpd\[24424\]: warning: unknown\[185.143.72.34\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 17:48:43 relay postfix/smtpd\[22174\]: warning: unknown\[185.143.72.34\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 17:49:01 relay postfix/smtpd\[24424\]: warning: unknown\[185.143.72.34\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 17:49:33 relay postfix/smtpd\[23671\]: warning: unknown\[185.143.72.34\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-22 23:52:45
23.129.64.210 attackbots
Jun 22 14:03:59 santamaria sshd\[4905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.210  user=sshd
Jun 22 14:04:01 santamaria sshd\[4905\]: Failed password for sshd from 23.129.64.210 port 58369 ssh2
Jun 22 14:04:04 santamaria sshd\[4905\]: Failed password for sshd from 23.129.64.210 port 58369 ssh2
...
2020-06-23 00:28:21
103.74.122.214 attack
Invalid user test2 from 103.74.122.214 port 57774
2020-06-23 00:29:52
118.98.127.138 attackspambots
$f2bV_matches
2020-06-23 00:13:11
94.191.83.249 attackspam
Jun 22 14:00:32 localhost sshd\[26771\]: Invalid user netapp from 94.191.83.249
Jun 22 14:00:32 localhost sshd\[26771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.83.249
Jun 22 14:00:33 localhost sshd\[26771\]: Failed password for invalid user netapp from 94.191.83.249 port 44480 ssh2
Jun 22 14:04:12 localhost sshd\[26957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.83.249  user=root
Jun 22 14:04:15 localhost sshd\[26957\]: Failed password for root from 94.191.83.249 port 60208 ssh2
...
2020-06-23 00:18:35
129.204.235.104 attackbots
Jun 22 17:44:42 piServer sshd[23749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.235.104 
Jun 22 17:44:44 piServer sshd[23749]: Failed password for invalid user juanita from 129.204.235.104 port 53428 ssh2
Jun 22 17:49:06 piServer sshd[24209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.235.104 
...
2020-06-23 00:02:50
119.236.86.236 attackbotsspam
Honeypot attack, port: 81, PTR: n11923686236.netvigator.com.
2020-06-23 00:16:12
144.172.73.37 attackbots
...
2020-06-23 00:01:39
92.154.18.142 attackspambots
2020-06-22T16:55:56.221137amanda2.illicoweb.com sshd\[32817\]: Invalid user informix from 92.154.18.142 port 36374
2020-06-22T16:55:56.224371amanda2.illicoweb.com sshd\[32817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=lstlambert-657-1-107-142.w92-154.abo.wanadoo.fr
2020-06-22T16:55:58.526986amanda2.illicoweb.com sshd\[32817\]: Failed password for invalid user informix from 92.154.18.142 port 36374 ssh2
2020-06-22T16:59:20.173639amanda2.illicoweb.com sshd\[32873\]: Invalid user dummy from 92.154.18.142 port 35426
2020-06-22T16:59:20.175956amanda2.illicoweb.com sshd\[32873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=lstlambert-657-1-107-142.w92-154.abo.wanadoo.fr
...
2020-06-23 00:02:03
192.241.154.168 attackbotsspam
20 attempts against mh-ssh on hill
2020-06-23 00:12:20
94.25.169.221 attackbotsspam
Honeypot attack, port: 445, PTR: client.yota.ru.
2020-06-23 00:28:57
210.245.92.228 attackspam
Jun 22 14:26:16 abendstille sshd\[18135\]: Invalid user inspur from 210.245.92.228
Jun 22 14:26:16 abendstille sshd\[18135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.92.228
Jun 22 14:26:18 abendstille sshd\[18135\]: Failed password for invalid user inspur from 210.245.92.228 port 45006 ssh2
Jun 22 14:31:42 abendstille sshd\[23400\]: Invalid user lwy from 210.245.92.228
Jun 22 14:31:43 abendstille sshd\[23400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.92.228
...
2020-06-23 00:00:52
49.247.128.68 attack
Jun 22 14:28:23 eventyay sshd[22177]: Failed password for root from 49.247.128.68 port 47298 ssh2
Jun 22 14:32:42 eventyay sshd[22367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.128.68
Jun 22 14:32:45 eventyay sshd[22367]: Failed password for invalid user oem from 49.247.128.68 port 51990 ssh2
...
2020-06-22 23:51:43
197.253.19.74 attack
Auto Fail2Ban report, multiple SSH login attempts.
2020-06-23 00:21:52
175.107.0.70 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-23 00:27:04

Recently Reported IPs

2606:4700:10::6816:3723 2606:4700:10::6814:8900 14.207.194.16 2606:4700:10::6816:3680
2606:4700:10::6814:8923 2606:4700:10::6814:8868 2606:4700:10::ac43:1271 2606:4700:10::ac43:915
205.174.99.185 10.220.65.199 205.10.17.134 64.235.100.81
155.193.33.54 106.114.199.174 91.224.92.125 49.76.204.196
49.67.89.34 220.185.85.118 171.213.223.4 171.114.231.250