城市(city): unknown
省份(region): unknown
国家(country): Thailand
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '14.207.128.0 - 14.207.255.255'
% Abuse contact for '14.207.128.0 - 14.207.255.255' is 'ipadmin@3bbmail.com'
inetnum: 14.207.128.0 - 14.207.255.255
netname: TTBP-TH
descr: Triple T Broadband Public Company Limited
country: TH
admin-c: TTBP1-AP
tech-c: TTBP1-AP
abuse-c: AT1597-AP
status: ALLOCATED NON-PORTABLE
mnt-by: MAINT-TTBP-TH
mnt-irt: IRT-TTBP-TH
last-modified: 2021-12-22T02:33:28Z
source: APNIC
irt: IRT-TTBP-TH
address: 89 , Cosmo Office Park Building , Popular Road Ban Mai Subdistrict , Pakkret 11120
e-mail: ipadmin@3bbmail.com
abuse-mailbox: ipadmin@3bbmail.com
admin-c: TTBP1-AP
tech-c: TTBP1-AP
auth: # Filtered
remarks: ipadmin@3bbmail.com was validated on 2025-09-11
mnt-by: MAINT-TTBP-TH
last-modified: 2026-02-13T04:33:50Z
source: APNIC
role: ABUSE TTBPTH
country: ZZ
address: 89 , Cosmo Office Park Building , Popular Road Ban Mai Subdistrict , Pakkret 11120
phone: +000000000
e-mail: ipadmin@3bbmail.com
admin-c: TTBP1-AP
tech-c: TTBP1-AP
nic-hdl: AT1597-AP
remarks: Generated from irt object IRT-TTBP-TH
remarks: ipadmin@3bbmail.com was validated on 2025-09-11
abuse-mailbox: ipadmin@3bbmail.com
mnt-by: APNIC-ABUSE
last-modified: 2025-09-11T08:48:08Z
source: APNIC
role: Triple T Broadband PCL administrator
address: Jasmine International Public Company Limited, Pakkret Nonthaburi 11120
country: TH
phone: +6621008552
e-mail: wanchai.ti@jasmine.com
admin-c: TTBP1-AP
tech-c: TTBP1-AP
nic-hdl: TTBP1-AP
mnt-by: MAINT-TTBP-TH
last-modified: 2021-07-27T02:31:01Z
source: APNIC
% Information related to '14.207.194.0/24AS138422'
route: 14.207.194.0/24
origin: AS138422
descr: Triple T Broadband Public Company Limited
89 , Cosmo Office Park Building , Popular Road
Ban Mai Subdistrict ,
mnt-by: MAINT-TTBP-TH
last-modified: 2026-01-28T04:39:47Z
source: APNIC
% Information related to '14.207.194.0/24AS45458'
route: 14.207.194.0/24
origin: AS45458
descr: Triple T Broadband Public Company Limited
Jasmine International Tower 200 Moo 4 Chaengwattana Rd.
mnt-by: MAINT-TTBP-TH
last-modified: 2025-08-14T06:46:16Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.194.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53672
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.207.194.94. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 06:09:12 CST 2026
;; MSG SIZE rcvd: 106
Host 94.194.207.14.in-addr.arpa not found: 2(SERVFAIL)
server can't find 14.207.194.94.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 84.204.209.221 | attack | prod3 ... |
2020-04-28 23:09:41 |
| 141.98.81.107 | attackspambots | $f2bV_matches |
2020-04-28 23:22:12 |
| 94.231.136.137 | attack | Unauthorised access (Apr 28) SRC=94.231.136.137 LEN=52 TTL=120 ID=8030 DF TCP DPT=445 WINDOW=8192 SYN |
2020-04-28 23:23:00 |
| 35.225.211.175 | attackbotsspam | Apr 28 09:57:57 ny01 sshd[24601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.225.211.175 Apr 28 09:57:59 ny01 sshd[24601]: Failed password for invalid user git from 35.225.211.175 port 59950 ssh2 Apr 28 10:01:54 ny01 sshd[25228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.225.211.175 |
2020-04-28 23:34:55 |
| 134.209.238.83 | attackbotsspam | Fail2Ban Ban Triggered |
2020-04-28 23:27:38 |
| 195.54.201.12 | attackbots | Apr 28 15:03:56 electroncash sshd[46879]: Invalid user sea from 195.54.201.12 port 41808 Apr 28 15:03:56 electroncash sshd[46879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.54.201.12 Apr 28 15:03:56 electroncash sshd[46879]: Invalid user sea from 195.54.201.12 port 41808 Apr 28 15:03:58 electroncash sshd[46879]: Failed password for invalid user sea from 195.54.201.12 port 41808 ssh2 Apr 28 15:07:54 electroncash sshd[47963]: Invalid user dior from 195.54.201.12 port 52054 ... |
2020-04-28 23:09:18 |
| 127.0.0.1 | attack | Test Connectivity |
2020-04-28 23:28:54 |
| 190.85.145.162 | attackbots | Unauthorized connection attempt detected from IP address 190.85.145.162 to port 9673 |
2020-04-28 22:57:35 |
| 110.83.51.25 | attack | Port scan: Attack repeated for 24 hours |
2020-04-28 23:03:51 |
| 183.89.214.150 | attackbotsspam | Dovecot Invalid User Login Attempt. |
2020-04-28 23:02:20 |
| 185.202.2.132 | attackspambots | Unauthorized connection attempt detected from IP address 185.202.2.132 to port 3389 |
2020-04-28 22:56:01 |
| 160.153.234.236 | attack | Apr 28 17:21:07 rotator sshd\[30387\]: Failed password for root from 160.153.234.236 port 54274 ssh2Apr 28 17:23:45 rotator sshd\[30402\]: Invalid user samy from 160.153.234.236Apr 28 17:23:47 rotator sshd\[30402\]: Failed password for invalid user samy from 160.153.234.236 port 44100 ssh2Apr 28 17:26:28 rotator sshd\[31186\]: Invalid user oracle from 160.153.234.236Apr 28 17:26:30 rotator sshd\[31186\]: Failed password for invalid user oracle from 160.153.234.236 port 33934 ssh2Apr 28 17:29:05 rotator sshd\[31219\]: Invalid user venus from 160.153.234.236 ... |
2020-04-28 23:38:07 |
| 112.35.27.97 | attack | Apr 28 14:25:55 localhost sshd[106008]: Invalid user user7 from 112.35.27.97 port 41840 Apr 28 14:25:55 localhost sshd[106008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.27.97 Apr 28 14:25:55 localhost sshd[106008]: Invalid user user7 from 112.35.27.97 port 41840 Apr 28 14:25:57 localhost sshd[106008]: Failed password for invalid user user7 from 112.35.27.97 port 41840 ssh2 Apr 28 14:31:43 localhost sshd[106489]: Invalid user ts3 from 112.35.27.97 port 40354 ... |
2020-04-28 23:42:21 |
| 5.126.176.91 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-04-28 23:41:52 |
| 162.243.129.195 | attackbots | scans once in preceeding hours on the ports (in chronological order) 4840 resulting in total of 25 scans from 162.243.0.0/16 block. |
2020-04-28 22:58:05 |