Go
117.121.214.50
is a
Hacker
100 %
Thailand
Report Abuse
763attacks reported
590Brute-ForceSSH
93Brute-Force
31SSH
12HackingBrute-ForceSSH
10Web App Attack
8uncategorized
4Port ScanSSH
3Brute-ForceFraud VoIP
2Port ScanBrute-ForceSSH
2Hacking
...
1abuse reported
1Bad Web BotExploited Host
1reputation reported
1uncategorized
from 171 distinct reporters
and 7 distinct sources : BadIPs.com, Blocklist.de, FireHOL, Charles Haley, darklist.de, GreenSnow.co, AbuseIPDB
117.121.214.50 was first signaled at 2019-05-05 10:03 and last record was at 2020-08-01 13:35.
IP

117.121.214.50

Organization
United Information Highway Co.,Ltd.
Localisation
Thailand
Khon Kaen, Bangkok
NetRange : First & Last IP
117.121.208.0 - 117.121.223.255
Network CIDR
117.121.208.0/20

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2020-08-01 13:35 attacks Brute-ForceSSH AbuseIPDB $f2bV_matches
2020-08-01 13:31 attacks Brute-ForceSSH AbuseIPDB $f2bV_matches
2020-08-01 13:00 attacks Brute-ForceSSH AbuseIPDB Invalid user docker from 117.121.214.50 port 47962
2020-08-01 10:20 attacks Brute-Force AbuseIPDB $f2bV_matches
2020-08-01 08:44 attacks Brute-ForceSSH AbuseIPDB 2020-08-01T19:36:07.502742vps773228.ovh.net sshd[14729]: Failed password for root from 117.121.214.50 port 58268 ssh2 2020-08-01T19:40:15.479458vps773
2020-08-01 07:29 attacks SSH AbuseIPDB sshd
2020-08-01 07:27 attacks Brute-ForceSSH AbuseIPDB 2020-08-01T18:18:48.276875vps773228.ovh.net sshd[14089]: Failed password for root from 117.121.214.50 port 48710 ssh2 2020-08-01T18:23:22.592379vps773
2020-08-01 07:19 attacks Brute-ForceSSH AbuseIPDB Aug 1 18:03:17 Ubuntu-1404-trusty-64-minimal sshd\[483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1
2020-08-01 04:18 attacks Brute-ForceSSH AbuseIPDB Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-01T13:09:45Z and 2020-08-01T13:18:21Z
2020-08-01 01:05 attacks Brute-ForceSSH AbuseIPDB Aug 1 12:01:23 mail sshd[468763]: Failed password for root from 117.121.214.50 port 59354 ssh2 Aug 1 12:05:41 mail sshd[468943]: pam_unix(sshd:auth):
2020-07-31 21:47 attacks Brute-ForceSSH AbuseIPDB Bruteforce detected by fail2ban
2020-07-31 18:19 attacks Brute-ForceSSH AbuseIPDB Aug 1 03:12:13 game-panel sshd[5867]: Failed password for root from 117.121.214.50 port 56306 ssh2 Aug 1 03:16:00 game-panel sshd[6042]: Failed passwo
2020-07-31 18:01 attacks Brute-ForceSSH AbuseIPDB Aug 1 02:55:16 game-panel sshd[5014]: Failed password for root from 117.121.214.50 port 52774 ssh2 Aug 1 02:58:33 game-panel sshd[5102]: Failed passwo
2020-07-31 17:45 attacks Brute-ForceSSH AbuseIPDB Aug 1 02:38:18 game-panel sshd[4123]: Failed password for root from 117.121.214.50 port 49294 ssh2 Aug 1 02:41:38 game-panel sshd[4389]: Failed passwo
2020-07-31 17:24 attacks Brute-ForceSSH AbuseIPDB Aug 1 02:18:19 game-panel sshd[2432]: Failed password for root from 117.121.214.50 port 50808 ssh2 Aug 1 02:21:31 game-panel sshd[3411]: Failed passwo
2020-07-31 17:08 attacks Brute-ForceSSH AbuseIPDB Aug 1 02:01:11 game-panel sshd[1585]: Failed password for root from 117.121.214.50 port 47338 ssh2 Aug 1 02:04:33 game-panel sshd[1735]: Failed passwo
2020-07-31 16:48 attacks Brute-ForceSSH AbuseIPDB Aug 1 01:41:39 game-panel sshd[686]: Failed password for root from 117.121.214.50 port 48880 ssh2 Aug 1 01:45:00 game-panel sshd[817]: Failed password
2020-07-31 16:28 attacks Brute-ForceSSH AbuseIPDB Aug 1 01:22:13 game-panel sshd[32249]: Failed password for root from 117.121.214.50 port 50404 ssh2 Aug 1 01:25:30 game-panel sshd[32393]: Failed pass
2020-07-31 16:09 attacks Brute-ForceSSH AbuseIPDB Aug 1 01:02:39 game-panel sshd[31385]: Failed password for root from 117.121.214.50 port 51856 ssh2 Aug 1 01:06:09 game-panel sshd[31545]: Failed pass
2020-07-31 15:49 attacks Brute-ForceSSH AbuseIPDB Aug 1 00:41:18 game-panel sshd[30613]: Failed password for root from 117.121.214.50 port 35668 ssh2 Aug 1 00:46:17 game-panel sshd[30783]: Failed pass
2020-07-31 15:36 attacks SSH AbuseIPDB Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-31 12:53 attacks Brute-ForceSSH AbuseIPDB Jul 31 23:49:04 saturn sshd[497153]: Failed password for root from 117.121.214.50 port 52402 ssh2 Jul 31 23:53:17 saturn sshd[497308]: pam_unix(sshd:a
2020-07-31 12:49 attacks Brute-ForceSSH AbuseIPDB Brute-force attempt banned
2020-07-31 08:04 attacks Brute-ForceSSH AbuseIPDB $f2bV_matches
2020-07-31 07:54 attacks Brute-ForceSSH AbuseIPDB $f2bV_matches
2020-07-31 05:01 attacks Brute-ForceSSH AbuseIPDB sshd jail - ssh hack attempt
2020-07-31 05:00 attacks Brute-ForceSSH AbuseIPDB Jul 31 15:54:03 ns382633 sshd\[3387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.214.50 user=
2020-07-31 00:03 attacks Brute-ForceSSH AbuseIPDB sshd: Failed password for invalid user .... from 117.121.214.50 port 42470 ssh2 (6 attempts)
2020-07-30 11:38 attacks Brute-ForceSSH AbuseIPDB Jul 31 03:29:19 itv-usvr-01 sshd[3967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.214.50 user=ro
2020-07-30 11:17 attacks Brute-ForceSSH AbuseIPDB Jul 30 23:17:23 hosting sshd[31250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.214.50 user=root
2020-07-30 08:10 attacks Brute-ForceSSH AbuseIPDB SSH Brute-Force attacks
2020-07-30 08:10 attacks Brute-Force AbuseIPDB $f2bV_matches
2020-07-30 05:34 attacks Brute-ForceSSH AbuseIPDB SSH Brute-Forcing (server1)
2020-07-30 04:55 attacks Brute-ForceSSH AbuseIPDB Jul 30 16:55:42 hosting sshd[25296]: Invalid user virtualbox from 117.121.214.50 port 37982
2020-07-30 04:07 attacks Brute-ForceSSH AbuseIPDB 2020-07-30T09:02:42.258165vps2034 sshd[6204]: Invalid user root2 from 117.121.214.50 port 56414 2020-07-30T09:02:42.262048vps2034 sshd[6204]: pam_unix
2020-07-30 03:31 attacks Brute-ForceSSH AbuseIPDB Jul 30 15:31:28 hosting sshd[17749]: Invalid user linguanghe from 117.121.214.50 port 33028
2020-07-30 02:57 attacks Brute-ForceSSH AbuseIPDB 2020-07-30T07:53:23.101430vps2034 sshd[27124]: Invalid user hive from 117.121.214.50 port 37096 2020-07-30T07:53:23.104637vps2034 sshd[27124]: pam_uni
2020-07-30 02:52 attacks Brute-ForceSSH AbuseIPDB prod11
2020-07-30 02:50 attacks Brute-ForceSSH AbuseIPDB Jul 30 14:24:11 hosting sshd[10332]: Invalid user gibson from 117.121.214.50 port 39638 Jul 30 14:24:11 hosting sshd[10332]: pam_unix(sshd:auth): auth
2020-07-29 20:17 attacks Brute-Force AbuseIPDB Fail2Ban Ban Triggered (2)
2020-07-29 20:08 attacks Brute-ForceSSH AbuseIPDB Bruteforce detected by fail2ban
2020-07-29 16:23 attacks Brute-ForceSSH AbuseIPDB Invalid user gengjiao from 117.121.214.50 port 40240
2020-07-29 15:46 attacks Brute-ForceSSH AbuseIPDB SSH-BruteForce
2020-07-29 14:09 attacks FTP Brute-ForceHackingBrute-ForceSSH AbuseIPDB SSH brute-force attempt
2020-07-29 10:17 attacks Brute-ForceSSH AbuseIPDB 2020-07-29T21:17:54.209098ks3355764 sshd[2229]: Invalid user walber from 117.121.214.50 port 47296 2020-07-29T21:17:55.964980ks3355764 sshd[2229]: Fai
2020-07-29 08:18 attacks Brute-ForceSSH AbuseIPDB bruteforce detected
2020-07-29 08:13 attacks Brute-ForceSSH AbuseIPDB 2020-07-29T19:13:45.133517ks3355764 sshd[30640]: Invalid user zhaohong from 117.121.214.50 port 16735 2020-07-29T19:13:47.269388ks3355764 sshd[30640]:
2020-07-29 06:43 attacks Brute-ForceSSH AbuseIPDB Jul 29 17:39:18 vserver sshd\[7105\]: Invalid user mouzj from 117.121.214.50Jul 29 17:39:20 vserver sshd\[7105\]: Failed password for invalid user mou
2020-07-29 05:31 attacks Brute-ForceSSH AbuseIPDB Jul 29 17:30:16 lukav-desktop sshd\[13829\]: Invalid user lihuanhuan from 117.121.214.50 Jul 29 17:30:16 lukav-desktop sshd\[13829\]: pam_unix\(sshd:a
2020-07-29 04:29 attacks Brute-ForceSSH AbuseIPDB Jul 29 16:27:20 lukav-desktop sshd\[2462\]: Invalid user gengjiao from 117.121.214.50 Jul 29 16:27:20 lukav-desktop sshd\[2462\]: pam_unix\(sshd:auth\
2019-05-05 10:03 attacks Brute-ForceSSH AbuseIPDB ssh failed login
2019-05-05 10:06 attacks HackingBrute-ForceSSH AbuseIPDB SSH authentication failure x 7 reported by Fail2Ban
2019-05-05 10:43 attacks FTP Brute-ForceHacking AbuseIPDB Lines containing failures of 117.121.214.50 May 5 21:22:20 install sshd[24217]: Invalid user phion from 117.121.214.50 port 32916 May 5 21:22:20 insta
2019-05-05 11:07 attacks FTP Brute-ForceHacking AbuseIPDB Lines containing failures of 117.121.214.50 May 5 21:22:20 install sshd[24217]: Invalid user phion from 117.121.214.50 port 32916 May 5 21:22:20 insta
2019-05-05 11:09 attacks Brute-ForceSSH AbuseIPDB May 5 22:09:09 tuxlinux sshd[46688]: Invalid user admin from 117.121.214.50 port 35198 May 5 22:09:09 tuxlinux sshd[46688]: pam_unix(sshd:auth): authe
2019-05-05 11:43 attacks Brute-ForceSSH AbuseIPDB May 5 21:43:02 debian sshd\[3330\]: Invalid user zabbix from 117.121.214.50 port 59372 May 5 21:43:02 debian sshd\[3330\]: pam_unix\(sshd:auth\): auth
2019-05-05 12:00 attacks HackingBrute-ForceSSH AbuseIPDB May 5 20:35:06 XXX sshd[3778]: Invalid user support from 117.121.214.50 port 45762
2019-05-05 12:17 attacks Brute-Force AbuseIPDB $f2bV_matches
2019-05-05 12:17 attacks Brute-Force AbuseIPDB $f2bV_matches
2019-05-05 12:31 attacks Brute-ForceSSH AbuseIPDB May 5 23:31:22 * sshd[15297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.214.50 May 5 23:31:24 *
2019-05-30 09:30 attacks SSH bi_sshd_0_1d BadIPs.com  
2019-05-30 09:30 attacks SSH bi_ssh_0_1d BadIPs.com  
2019-05-30 09:30 attacks blocklist_de Blocklist.de  
2019-05-30 09:31 attacks SSH blocklist_de_ssh Blocklist.de  
2019-05-30 09:37 attacks firehol_level2 FireHOL  
2019-06-03 22:43 attacks bi_any_0_1d BadIPs.com  
2019-06-03 22:43 attacks Bad Web Bot bi_badbots_0_1d BadIPs.com  
2019-06-03 22:43 attacks Brute-Force bi_bruteforce_0_1d BadIPs.com  
2019-06-08 17:29 attacks Brute-Force blocklist_de_bruteforce Blocklist.de  
2019-06-10 16:07 attacks firehol_level4 FireHOL  
2019-06-11 15:29 attacks SSH haley_ssh Charles Haley  
2019-07-28 21:01 attacks darklist_de darklist.de  
2019-08-04 13:54 attacks bi_default_0_1d BadIPs.com  
2019-08-04 13:55 attacks bi_unknown_0_1d BadIPs.com  
2019-08-20 17:43 reputation turris_greylist  
2020-07-31 16:10 attacks greensnow GreenSnow.co  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

inetnum: 117.121.208.0 - 117.121.223.255
netname: UIH-TH
descr: United Information Highway Co.,Ltd.
descr: 499 Benchachinda Bldg.
descr: Kamphangphet 6 Rd., Ladyao
country: TH
org: ORG-UIHC1-AP
admin-c: ST1220-AP
tech-c: ST1220-AP
status: ALLOCATED PORTABLE
mnt-by: APNIC-HM
mnt-lower: MAINT-TH-BENCHA
mnt-routes: MAINT-TH-BENCHA
mnt-irt: IRT-UIH-TH
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
last-modified: 2018-11-27T06:55:45Z
source: APNIC

irt: IRT-UIH-TH
address: 499 Benchachinda Bldg., Fl-4B
address: Vibhavadi-Rangsit Rd.,
address: Ladyao, Chatuchak 10900
e-mail: system_team@uih.co.th
abuse-mailbox: system_team@uih.co.th
admin-c: ST1220-AP
tech-c: ST1220-AP
auth: # Filtered
remarks: system_team@uih.co.th was validated on 2019-11-01
mnt-by: MAINT-TH-BENCHA
last-modified: 2019-11-01T05:14:16Z
source: APNIC

organisation: ORG-UIHC1-AP
org-name: United Information Highway Co.,Ltd.
country: TH
address: 499 Benchachinda Bldg.
address: Kamphangphet 6 Rd., Ladyao
phone: +66-28314888
fax-no: +66-20165073
e-mail: info@uih.co.th
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2017-08-20T22:55:44Z
source: APNIC

person: System Team
address: 499 Benchachinda Building, Kamphaeng Phet 6 Road
country: TH
phone: +6620165111
e-mail: system_team@uih.co.th
nic-hdl: ST1220-AP
mnt-by: MAINT-TH-BENCHA
last-modified: 2018-05-23T04:48:34Z
source: APNIC
most specific ip range is highlighted
Updated : 2020-04-25