City: Santiago
Region: Region Metropolitana (RM)
Country: Chile
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 138.84.32.0 - 138.84.63.255
CIDR: 138.84.32.0/19
NetName: LACNIC
NetHandle: NET-138-84-32-0-1
Parent: NET138 (NET-138-0-0-0-0)
NetType: Transferred to LACNIC
OriginAS:
Organization: Latin American and Caribbean IP address Regional Registry (LACNIC)
RegDate: 2021-12-30
Updated: 2021-12-30
Ref: https://rdap.arin.net/registry/ip/138.84.32.0
ResourceLink: http://lacnic.net/cgi-bin/lacnic/whois
ResourceLink: whois://whois.lacnic.net
OrgName: Latin American and Caribbean IP address Regional Registry
OrgId: LACNIC
Address: Rambla Republica de Mexico 6125
City: Montevideo
StateProv:
PostalCode: 11400
Country: UY
RegDate: 2002-07-27
Updated: 2018-03-15
Ref: https://rdap.arin.net/registry/entity/LACNIC
ReferralServer: whois://whois.lacnic.net
ResourceLink: http://lacnic.net/cgi-bin/lacnic/whois
OrgTechHandle: LACNIC-ARIN
OrgTechName: LACNIC Whois Info
OrgTechPhone: +598-2604-2222
OrgTechEmail: whois-contact@lacnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/LACNIC-ARIN
OrgAbuseHandle: LWI100-ARIN
OrgAbuseName: LACNIC Whois Info
OrgAbusePhone: +598-2604-2222
OrgAbuseEmail: abuse@lacnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/LWI100-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.lacnic.net.
% IP Client: 124.223.158.242
% Joint Whois - whois.lacnic.net
% This server accepts single ASN, IPv4 or IPv6 queries
% LACNIC resource: whois.lacnic.net
% Copyright LACNIC lacnic.net
% The data below is provided for information purposes
% and to assist persons in obtaining information about or
% related to AS and IP numbers registrations
% By submitting a whois query, you agree to use this data
% only for lawful purposes.
% 2025-11-10 11:32:02 (-03 -03:00)
inetnum: 138.84.34.0/24
status: reallocated
aut-num: AS14593
owner: Starlink Chile SpA
ownerid: CL-SCSP6-LACNIC
responsible: Luis Anzola
address: Av. Andres Bello 2457, Piso 19, 0,
address: 7510689 - Region Metropolitana - Providencia
country: CL
phone: +1 3103636000
owner-c: SKH4
tech-c: SKH4
abuse-c: SKH4
created: 20251016
changed: 20251016
inetnum-up: 138.84.32.0/19
nic-hdl: SKH4
person: Reyan Pina
e-mail: abhishek.kattuparambil@spacex.com
address: 1 Rocket Rd, 1, -
address: 90250 - Hawthorne - CA
country: US
phone: +1 3103636000 [0000]
created: 20200813
changed: 20250715
% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.84.34.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43730
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.84.34.126. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025111000 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 10 22:23:36 CST 2025
;; MSG SIZE rcvd: 106
Host 126.34.84.138.in-addr.arpa. not found: 3(NXDOMAIN)
server can't find 138.84.34.126.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 194.180.224.124 | attackspam | firewall-block, port(s): 23/tcp |
2020-01-11 23:47:42 |
| 139.59.169.37 | attack | $f2bV_matches |
2020-01-12 00:05:45 |
| 139.199.122.210 | attack | $f2bV_matches |
2020-01-12 00:20:17 |
| 139.170.149.161 | attack | $f2bV_matches |
2020-01-12 00:27:37 |
| 159.203.189.152 | attackbots | Jan 11 17:11:28 dedicated sshd[18233]: Failed password for invalid user oana from 159.203.189.152 port 50056 ssh2 Jan 11 17:11:27 dedicated sshd[18233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.189.152 Jan 11 17:11:27 dedicated sshd[18233]: Invalid user oana from 159.203.189.152 port 50056 Jan 11 17:11:28 dedicated sshd[18233]: Failed password for invalid user oana from 159.203.189.152 port 50056 ssh2 Jan 11 17:14:30 dedicated sshd[18796]: Invalid user csmi from 159.203.189.152 port 51268 |
2020-01-12 00:21:29 |
| 139.198.18.120 | attackbots | $f2bV_matches |
2020-01-12 00:25:24 |
| 86.238.30.51 | attack | $f2bV_matches |
2020-01-11 23:54:11 |
| 139.59.34.17 | attackbotsspam | $f2bV_matches |
2020-01-12 00:01:16 |
| 139.217.96.76 | attackspam | Unauthorized connection attempt detected from IP address 139.217.96.76 to port 2220 [J] |
2020-01-12 00:10:15 |
| 14.116.187.107 | attackbots | $f2bV_matches |
2020-01-11 23:45:38 |
| 49.88.112.69 | attackbots | Jan 11 15:38:04 hcbbdb sshd\[31406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.69 user=root Jan 11 15:38:06 hcbbdb sshd\[31406\]: Failed password for root from 49.88.112.69 port 46359 ssh2 Jan 11 15:39:27 hcbbdb sshd\[31531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.69 user=root Jan 11 15:39:28 hcbbdb sshd\[31531\]: Failed password for root from 49.88.112.69 port 25517 ssh2 Jan 11 15:40:47 hcbbdb sshd\[31660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.69 user=root |
2020-01-12 00:09:43 |
| 207.97.174.134 | attackspam | MONDIAL RELAY - COLIS |
2020-01-12 00:14:09 |
| 139.155.86.144 | attackbotsspam | Unauthorized connection attempt detected from IP address 139.155.86.144 to port 2220 [J] |
2020-01-12 00:27:51 |
| 139.59.38.169 | attack | $f2bV_matches |
2020-01-12 00:00:20 |
| 139.199.219.235 | attackspam | $f2bV_matches |
2020-01-12 00:16:12 |