城市(city): Bangkok
省份(region): Bangkok
国家(country): Thailand
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '116.204.183.0 - 116.204.183.255'
% Abuse contact for '116.204.183.0 - 116.204.183.255' is 'abuse@bangmod.cloud'
inetnum: 116.204.183.0 - 116.204.183.255
netname: BANGMOD-TH
descr: Bangmod Enterprise Co., Ltd.
country: TH
admin-c: BEA2-AP
tech-c: BEA2-AP
abuse-c: AB1114-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-BANGMODENTERPRISE-TH
mnt-irt: IRT-BANGMODENTERPRISE-TH
last-modified: 2023-11-30T06:39:55Z
source: APNIC
irt: IRT-BANGMODENTERPRISE-TH
address: Bangmod Enterprise Co., Ltd.
e-mail: support@bangmod.co.th
abuse-mailbox: abuse@bangmod.cloud
admin-c: BEA2-AP
tech-c: BEA2-AP
auth: # Filtered
remarks: support@bangmod.co.th was validated on 2026-01-21
remarks: abuse@bangmod.cloud was validated on 2026-02-25
mnt-by: MAINT-BANGMODENTERPRISE-TH
last-modified: 2026-04-08T15:24:57Z
source: APNIC
role: ABUSE BANGMODENTERPRISETH
country: ZZ
address: Bangmod Enterprise Co., Ltd.
phone: +000000000
e-mail: support@bangmod.co.th
admin-c: BEA2-AP
tech-c: BEA2-AP
nic-hdl: AB1114-AP
remarks: Generated from irt object IRT-BANGMODENTERPRISE-TH
remarks: support@bangmod.co.th was validated on 2026-01-21
remarks: abuse@bangmod.cloud was validated on 2026-02-25
abuse-mailbox: abuse@bangmod.cloud
mnt-by: APNIC-ABUSE
last-modified: 2026-02-25T04:27:52Z
source: APNIC
role: Bangmod Enterprise administrator
address: 145/18-19 Hong Tower FL.2 Room A.201 Bangkhuntian-Chaitalay Rd., Samaedum, Bangkhuntian, Bangkok 10150
country: TH
phone: +6621054417
e-mail: abuse@bangmod.cloud
admin-c: BEA2-AP
tech-c: BEA2-AP
nic-hdl: BEA2-AP
mnt-by: MAINT-BANGMODENTERPRISE-TH
last-modified: 2025-08-20T17:37:12Z
source: APNIC
% Information related to '116.204.183.0/24AS58955'
route: 116.204.183.0/24
descr: Bangmod Enterprise Co., Ltd.
origin: AS58955
mnt-by: MAINT-BANGMODENTERPRISE-TH
last-modified: 2023-12-02T08:19:13Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.204.183.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52339
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;116.204.183.163. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041800 1800 900 604800 86400
;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 19 01:11:37 CST 2026
;; MSG SIZE rcvd: 108
b'163.183.204.116.in-addr.arpa domain name pointer 116-204-183-163.static.bangmod-idc.com.
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
163.183.204.116.in-addr.arpa name = 116-204-183-163.static.bangmod-idc.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 167.172.171.234 | attackspambots | $f2bV_matches |
2020-03-05 16:48:43 |
| 136.233.21.27 | attackspam | Unauthorized connection attempt from IP address 136.233.21.27 on Port 445(SMB) |
2020-03-05 16:37:57 |
| 46.21.100.222 | attack | " " |
2020-03-05 16:04:43 |
| 159.203.30.120 | attackspam | " " |
2020-03-05 16:33:29 |
| 94.96.115.148 | attack | Email rejected due to spam filtering |
2020-03-05 16:15:46 |
| 92.63.194.32 | attackbotsspam | Mar 5 09:12:11 localhost sshd\[22819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.32 user=root Mar 5 09:12:13 localhost sshd\[22819\]: Failed password for root from 92.63.194.32 port 41875 ssh2 Mar 5 09:12:35 localhost sshd\[22906\]: Invalid user admin from 92.63.194.32 Mar 5 09:12:35 localhost sshd\[22906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.32 Mar 5 09:12:37 localhost sshd\[22906\]: Failed password for invalid user admin from 92.63.194.32 port 44437 ssh2 ... |
2020-03-05 16:16:54 |
| 96.64.149.69 | attack | Mar 5 05:47:26 rotator sshd\[32068\]: Invalid user admin from 96.64.149.69Mar 5 05:47:28 rotator sshd\[32068\]: Failed password for invalid user admin from 96.64.149.69 port 52080 ssh2Mar 5 05:48:54 rotator sshd\[32080\]: Invalid user ubuntu from 96.64.149.69Mar 5 05:48:57 rotator sshd\[32080\]: Failed password for invalid user ubuntu from 96.64.149.69 port 52148 ssh2Mar 5 05:50:22 rotator sshd\[32754\]: Invalid user pi from 96.64.149.69Mar 5 05:50:24 rotator sshd\[32754\]: Failed password for invalid user pi from 96.64.149.69 port 52210 ssh2 ... |
2020-03-05 16:23:16 |
| 71.6.158.166 | attack | 71.6.158.166 - - [05/Mar/2020:09:06:32 +0800] "quit" 400 150 "-" "-" "-" |
2020-03-05 16:13:23 |
| 165.22.33.32 | attack | Mar 5 08:46:40 sd-53420 sshd\[13615\]: Invalid user qdxx from 165.22.33.32 Mar 5 08:46:40 sd-53420 sshd\[13615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.33.32 Mar 5 08:46:42 sd-53420 sshd\[13615\]: Failed password for invalid user qdxx from 165.22.33.32 port 56404 ssh2 Mar 5 08:52:49 sd-53420 sshd\[14159\]: Invalid user wangyu from 165.22.33.32 Mar 5 08:52:49 sd-53420 sshd\[14159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.33.32 ... |
2020-03-05 16:10:45 |
| 92.63.194.59 | attackbotsspam | (sshd) Failed SSH login from 92.63.194.59 (NL/Netherlands/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 5 09:05:33 ubnt-55d23 sshd[7270]: Invalid user admin from 92.63.194.59 port 37267 Mar 5 09:05:35 ubnt-55d23 sshd[7270]: Failed password for invalid user admin from 92.63.194.59 port 37267 ssh2 |
2020-03-05 16:11:07 |
| 31.173.243.25 | attack | Email rejected due to spam filtering |
2020-03-05 16:05:54 |
| 112.85.42.182 | attackbots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.182 user=root Failed password for root from 112.85.42.182 port 38551 ssh2 Failed password for root from 112.85.42.182 port 38551 ssh2 Failed password for root from 112.85.42.182 port 38551 ssh2 Failed password for root from 112.85.42.182 port 38551 ssh2 |
2020-03-05 16:13:01 |
| 222.186.175.217 | attack | Mar 5 09:25:31 [host] sshd[10453]: pam_unix(sshd: Mar 5 09:25:33 [host] sshd[10453]: Failed passwor Mar 5 09:25:37 [host] sshd[10453]: Failed passwor |
2020-03-05 16:26:43 |
| 222.73.44.71 | attack | firewall-block, port(s): 445/tcp |
2020-03-05 16:28:48 |
| 217.87.186.164 | attackspambots | Mar 5 06:18:03 roki sshd[18294]: Invalid user pi from 217.87.186.164 Mar 5 06:18:03 roki sshd[18294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.87.186.164 Mar 5 06:18:05 roki sshd[18294]: Failed password for invalid user pi from 217.87.186.164 port 60436 ssh2 Mar 5 06:21:19 roki sshd[18502]: Invalid user pi from 217.87.186.164 Mar 5 06:21:19 roki sshd[18502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.87.186.164 ... |
2020-03-05 16:31:24 |