城市(city): unknown
省份(region): unknown
国家(country): Thailand
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '112.142.0.0 - 112.143.255.255'
% Abuse contact for '112.142.0.0 - 112.143.255.255' is 'korapong.k@led.mail.go.th'
inetnum: 112.142.0.0 - 112.143.255.255
netname: TTTNET
descr: Maxnet, Internet Service Provider, Bangkok
descr: under management by TT&T co. ltd Thailand
country: TH
org: ORG-TCL7-AP
admin-c: mn236-AP
tech-c: mn236-AP
abuse-c: AT1381-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-TH-WICHAI
mnt-routes: MAINT-TH-WICHAI
mnt-irt: IRT-TTT-TH
last-modified: 2021-01-06T01:34:10Z
source: APNIC
irt: IRT-TTT-TH
address: 252/30 Muang Thai Phatra Complex Tower 1, 22nd Fl., Ratchadaphisek Rd.,Huaykwang, Bangkok 10320 Thailand
e-mail: korapong.k@led.mail.go.th
abuse-mailbox: korapong.k@led.mail.go.th
admin-c: mn236-AP
tech-c: mn236-AP
auth: # Filtered
remarks: korapong.k@led.mail.go.th is invalid
mnt-by: MAINT-TH-WICHAI
last-modified: 2025-11-18T00:26:25Z
source: APNIC
organisation: ORG-TCL7-AP
org-name: TT&T Co., Ltd.
org-type: LIR
country: TH
address: 252/30 Muan Thai-Phatra Complex Tower 1
address: 24 Flr, Ratchadaphisek Road,
address: Huaykwang
phone: +66-8-9776-6614
fax-no: +66026932100
e-mail: wiriyas@ttt.co.th
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:14:58Z
source: APNIC
role: ABUSE TTTTH
country: ZZ
address: 252/30 Muang Thai Phatra Complex Tower 1, 22nd Fl., Ratchadaphisek Rd.,Huaykwang, Bangkok 10320 Thailand
phone: +000000000
e-mail: korapong.k@led.mail.go.th
admin-c: mn236-AP
tech-c: mn236-AP
nic-hdl: AT1381-AP
remarks: Generated from irt object IRT-TTT-TH
remarks: korapong.k@led.mail.go.th is invalid
abuse-mailbox: korapong.k@led.mail.go.th
mnt-by: APNIC-ABUSE
last-modified: 2025-09-04T18:13:28Z
source: APNIC
person: max net
nic-hdl: mn236-AP
e-mail: nic@ttt.co.th
address: 252/30 Muang Thai Phatra Complex Tower 1, 22nd Fl., Ratchadaphisek Rd.,Huaykwang, Bangkok 10320 Thailand
phone: +66-2-693-2100
fax-no: +66-2-693-2100
country: TH
mnt-by: MAINT-NEW
last-modified: 2012-07-25T08:25:37Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.143.2.179
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23525
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;112.143.2.179. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031500 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 15 20:52:19 CST 2026
;; MSG SIZE rcvd: 106
Host 179.2.143.112.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.82.98, trying next server
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 179.2.143.112.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 213.32.10.219 | attackbots | Port scan on 1 port(s): 139 |
2020-03-30 05:29:39 |
| 194.28.115.252 | attackspam | Potential Directory Traversal Attempt. |
2020-03-30 05:30:52 |
| 124.117.250.190 | attack | Mar 29 23:26:26 vps sshd[687115]: Failed password for invalid user celia from 124.117.250.190 port 47206 ssh2 Mar 29 23:30:19 vps sshd[710701]: Invalid user uqk from 124.117.250.190 port 40210 Mar 29 23:30:19 vps sshd[710701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.117.250.190 Mar 29 23:30:21 vps sshd[710701]: Failed password for invalid user uqk from 124.117.250.190 port 40210 ssh2 Mar 29 23:34:12 vps sshd[729377]: Invalid user jigodie from 124.117.250.190 port 33214 ... |
2020-03-30 05:43:03 |
| 114.67.81.251 | attackspam | SSH Login Bruteforce |
2020-03-30 05:39:36 |
| 222.186.52.139 | attack | Mar 29 23:38:10 plex sshd[14048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.139 user=root Mar 29 23:38:12 plex sshd[14048]: Failed password for root from 222.186.52.139 port 16533 ssh2 |
2020-03-30 05:40:38 |
| 27.126.191.129 | attack | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2020-03-30 05:48:53 |
| 113.137.33.40 | attackbotsspam | Mar 29 23:34:00 tuxlinux sshd[27990]: Invalid user ltn from 113.137.33.40 port 56911 Mar 29 23:34:00 tuxlinux sshd[27990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.137.33.40 Mar 29 23:34:00 tuxlinux sshd[27990]: Invalid user ltn from 113.137.33.40 port 56911 Mar 29 23:34:00 tuxlinux sshd[27990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.137.33.40 Mar 29 23:34:00 tuxlinux sshd[27990]: Invalid user ltn from 113.137.33.40 port 56911 Mar 29 23:34:00 tuxlinux sshd[27990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.137.33.40 Mar 29 23:34:02 tuxlinux sshd[27990]: Failed password for invalid user ltn from 113.137.33.40 port 56911 ssh2 ... |
2020-03-30 05:49:24 |
| 142.44.240.12 | attackbots | SSH invalid-user multiple login try |
2020-03-30 06:02:32 |
| 103.66.96.230 | attackbotsspam | Fail2Ban Ban Triggered |
2020-03-30 05:50:15 |
| 106.75.72.100 | attackbotsspam | $f2bV_matches |
2020-03-30 06:00:05 |
| 114.6.29.30 | attackspam | SSH Invalid Login |
2020-03-30 05:47:31 |
| 212.100.155.154 | attackbotsspam | SSH bruteforce |
2020-03-30 05:38:45 |
| 51.255.173.222 | attackspambots | 2020-03-29T17:34:19.905097sorsha.thespaminator.com sshd[21590]: Invalid user gsu from 51.255.173.222 port 34772 2020-03-29T17:34:22.212992sorsha.thespaminator.com sshd[21590]: Failed password for invalid user gsu from 51.255.173.222 port 34772 ssh2 ... |
2020-03-30 05:35:13 |
| 121.239.149.118 | attackbots | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2020-03-30 05:52:07 |
| 106.13.144.78 | attackbots | SSH Invalid Login |
2020-03-30 05:47:51 |