城市(city): unknown
省份(region): unknown
国家(country): Thailand
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '112.142.0.0 - 112.143.255.255'
% Abuse contact for '112.142.0.0 - 112.143.255.255' is 'korapong.k@led.mail.go.th'
inetnum: 112.142.0.0 - 112.143.255.255
netname: TTTNET
descr: Maxnet, Internet Service Provider, Bangkok
descr: under management by TT&T co. ltd Thailand
country: TH
org: ORG-TCL7-AP
admin-c: mn236-AP
tech-c: mn236-AP
abuse-c: AT1381-AP
status: ALLOCATED PORTABLE
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-TH-WICHAI
mnt-routes: MAINT-TH-WICHAI
mnt-irt: IRT-TTT-TH
last-modified: 2021-01-06T01:34:10Z
source: APNIC
irt: IRT-TTT-TH
address: 252/30 Muang Thai Phatra Complex Tower 1, 22nd Fl., Ratchadaphisek Rd.,Huaykwang, Bangkok 10320 Thailand
e-mail: korapong.k@led.mail.go.th
abuse-mailbox: korapong.k@led.mail.go.th
admin-c: mn236-AP
tech-c: mn236-AP
auth: # Filtered
remarks: korapong.k@led.mail.go.th is invalid
mnt-by: MAINT-TH-WICHAI
last-modified: 2025-11-18T00:26:25Z
source: APNIC
organisation: ORG-TCL7-AP
org-name: TT&T Co., Ltd.
org-type: LIR
country: TH
address: 252/30 Muan Thai-Phatra Complex Tower 1
address: 24 Flr, Ratchadaphisek Road,
address: Huaykwang
phone: +66-8-9776-6614
fax-no: +66026932100
e-mail: wiriyas@ttt.co.th
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:14:58Z
source: APNIC
role: ABUSE TTTTH
country: ZZ
address: 252/30 Muang Thai Phatra Complex Tower 1, 22nd Fl., Ratchadaphisek Rd.,Huaykwang, Bangkok 10320 Thailand
phone: +000000000
e-mail: korapong.k@led.mail.go.th
admin-c: mn236-AP
tech-c: mn236-AP
nic-hdl: AT1381-AP
remarks: Generated from irt object IRT-TTT-TH
remarks: korapong.k@led.mail.go.th is invalid
abuse-mailbox: korapong.k@led.mail.go.th
mnt-by: APNIC-ABUSE
last-modified: 2025-09-04T18:13:28Z
source: APNIC
person: max net
nic-hdl: mn236-AP
e-mail: nic@ttt.co.th
address: 252/30 Muang Thai Phatra Complex Tower 1, 22nd Fl., Ratchadaphisek Rd.,Huaykwang, Bangkok 10320 Thailand
phone: +66-2-693-2100
fax-no: +66-2-693-2100
country: TH
mnt-by: MAINT-NEW
last-modified: 2012-07-25T08:25:37Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.143.3.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32901
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;112.143.3.1. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031302 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 14 11:05:35 CST 2026
;; MSG SIZE rcvd: 104
Host 1.3.143.112.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 1.3.143.112.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 82.64.153.14 | attack | Mar 27 19:57:16 mail sshd[4383]: Invalid user test from 82.64.153.14 Mar 27 19:57:16 mail sshd[4383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.153.14 Mar 27 19:57:16 mail sshd[4383]: Invalid user test from 82.64.153.14 Mar 27 19:57:17 mail sshd[4383]: Failed password for invalid user test from 82.64.153.14 port 39878 ssh2 Mar 27 20:01:05 mail sshd[5035]: Invalid user abw from 82.64.153.14 ... |
2020-03-28 03:48:22 |
| 106.12.186.74 | attack | Mar 27 20:47:09 DAAP sshd[20067]: Invalid user amar from 106.12.186.74 port 45920 Mar 27 20:47:09 DAAP sshd[20067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.186.74 Mar 27 20:47:09 DAAP sshd[20067]: Invalid user amar from 106.12.186.74 port 45920 Mar 27 20:47:11 DAAP sshd[20067]: Failed password for invalid user amar from 106.12.186.74 port 45920 ssh2 Mar 27 20:51:14 DAAP sshd[20155]: Invalid user chengjun from 106.12.186.74 port 46534 ... |
2020-03-28 04:03:26 |
| 156.202.47.246 | attackbots | SSH login attempts. |
2020-03-28 04:14:56 |
| 94.102.52.57 | attackspam | Port scan: Attack repeated for 24 hours |
2020-03-28 04:04:27 |
| 128.199.234.128 | attackspam | $f2bV_matches |
2020-03-28 04:02:31 |
| 193.56.28.90 | attackbots | Mar 27 20:51:12 host postfix/smtpd[24879]: warning: unknown[193.56.28.90]: SASL LOGIN authentication failed: authentication failure Mar 27 20:51:12 host postfix/smtpd[24879]: warning: unknown[193.56.28.90]: SASL LOGIN authentication failed: authentication failure Mar 27 20:51:12 host postfix/smtpd[24879]: warning: unknown[193.56.28.90]: SASL LOGIN authentication failed: authentication failure Mar 27 20:51:12 host postfix/smtpd[24879]: warning: unknown[193.56.28.90]: SASL LOGIN authentication failed: authentication failure Mar 27 20:51:12 host postfix/smtpd[24879]: warning: unknown[193.56.28.90]: SASL LOGIN authentication failed: authentication failure ... |
2020-03-28 03:56:46 |
| 52.172.185.244 | attackbots | SSH login attempts. |
2020-03-28 04:08:44 |
| 5.39.77.117 | attack | (sshd) Failed SSH login from 5.39.77.117 (FR/France/-/-/ns3262586.ip-5-39-77.eu/[AS16276 OVH SAS]): 1 in the last 3600 secs |
2020-03-28 03:48:56 |
| 106.12.109.33 | attack | Mar 27 20:49:37 ift sshd\[32851\]: Invalid user xzs from 106.12.109.33Mar 27 20:49:39 ift sshd\[32851\]: Failed password for invalid user xzs from 106.12.109.33 port 53520 ssh2Mar 27 20:51:06 ift sshd\[33403\]: Invalid user sirvine from 106.12.109.33Mar 27 20:51:09 ift sshd\[33403\]: Failed password for invalid user sirvine from 106.12.109.33 port 56982 ssh2Mar 27 20:57:05 ift sshd\[34063\]: Invalid user wgb from 106.12.109.33 ... |
2020-03-28 03:53:38 |
| 104.243.41.97 | attackspambots | detected by Fail2Ban |
2020-03-28 04:16:44 |
| 104.236.73.158 | attackbots | Mar 27 19:58:56 sigma sshd\[6848\]: Invalid user gyo from 104.236.73.158Mar 27 19:58:58 sigma sshd\[6848\]: Failed password for invalid user gyo from 104.236.73.158 port 36003 ssh2 ... |
2020-03-28 04:20:10 |
| 91.243.190.76 | attack | B: Magento admin pass test (wrong country) |
2020-03-28 03:44:50 |
| 94.139.160.112 | attack | SSH login attempts. |
2020-03-28 04:00:05 |
| 104.244.76.130 | attackspam | Mar 20 22:51:53 itv-usvr-01 sshd[7158]: Invalid user neena from 104.244.76.130 Mar 20 22:51:53 itv-usvr-01 sshd[7158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.76.130 Mar 20 22:51:53 itv-usvr-01 sshd[7158]: Invalid user neena from 104.244.76.130 Mar 20 22:51:55 itv-usvr-01 sshd[7158]: Failed password for invalid user neena from 104.244.76.130 port 42046 ssh2 Mar 20 22:56:58 itv-usvr-01 sshd[7358]: Invalid user buerocomputer from 104.244.76.130 |
2020-03-28 04:14:26 |
| 106.12.14.19 | attackbotsspam | Mar 21 02:15:40 itv-usvr-01 sshd[16209]: Invalid user codwaw from 106.12.14.19 Mar 21 02:15:40 itv-usvr-01 sshd[16209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.14.19 Mar 21 02:15:40 itv-usvr-01 sshd[16209]: Invalid user codwaw from 106.12.14.19 Mar 21 02:15:43 itv-usvr-01 sshd[16209]: Failed password for invalid user codwaw from 106.12.14.19 port 57290 ssh2 |
2020-03-28 03:41:47 |