Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Guayaquil

Region: Guayas

Country: Ecuador

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-04-07 18:00:33 (-03 -03:00)

inetnum:     181.199.41.104/29
status:      reallocated
aut-num:     N/A
owner:       Netlife Ecuador
ownerid:     EC-NEEC-LACNIC
responsible: Francisco Balarezo
address:     Nunez de Vela y Av. Atahualpa, E3-13, Edf. Torre d
address:      - Quito - P
country:     EC
phone:       +593 2 2265050 [5024]
owner-c:     SEL
tech-c:      SEL
abuse-c:     SEL
created:     20160716
changed:     20171228
inetnum-up:  181.199.0.0/17

nic-hdl:     SEL
person:      Carlos Montero
e-mail:      networking@telconet.ec
address:     Kennedy Norte MZ, 109, Solar 21
address:     59342 - Guayaquil - 
country:     EC
phone:       +593  46020650 [5011]
created:     20021004
changed:     20230724

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 181.199.41.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56570
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;181.199.41.109.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040703 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 08 05:00:33 CST 2026
;; MSG SIZE  rcvd: 107
Host info
109.41.199.181.in-addr.arpa domain name pointer host-181-199-41-109.ecua.net.ec.
Nslookup info:
b'109.41.199.181.in-addr.arpa	name = host-181-199-41-109.ecua.net.ec.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
65.60.199.151 attackspambots
k+ssh-bruteforce
2019-08-28 00:32:46
118.69.54.87 attackbotsspam
Unauthorized connection attempt from IP address 118.69.54.87 on Port 445(SMB)
2019-08-27 23:49:56
104.148.70.72 attack
104.148.70.72 has been banned for [spam]
...
2019-08-28 00:45:00
45.79.214.232 attackbotsspam
" "
2019-08-28 00:24:07
210.51.190.236 attackspambots
SMB Server BruteForce Attack
2019-08-28 00:17:12
177.139.18.185 attack
Automatic report - Port Scan Attack
2019-08-28 00:43:26
41.138.88.3 attack
Aug 27 15:05:42 vps691689 sshd[3520]: Failed password for root from 41.138.88.3 port 49414 ssh2
Aug 27 15:10:52 vps691689 sshd[3620]: Failed password for root from 41.138.88.3 port 36784 ssh2
...
2019-08-27 23:53:01
209.141.52.141 attackspambots
2019-08-27T12:34:18.123081abusebot-6.cloudsearch.cf sshd\[27122\]: Invalid user server1 from 209.141.52.141 port 53642
2019-08-28 00:08:37
58.39.208.102 attackbots
Unauthorized connection attempt from IP address 58.39.208.102 on Port 445(SMB)
2019-08-28 00:33:07
82.85.18.169 attackspam
Unauthorized connection attempt from IP address 82.85.18.169 on Port 445(SMB)
2019-08-28 00:13:31
104.244.78.55 attackbots
Aug 27 17:51:03 rpi sshd[31789]: Failed password for root from 104.244.78.55 port 41264 ssh2
Aug 27 17:51:07 rpi sshd[31789]: Failed password for root from 104.244.78.55 port 41264 ssh2
2019-08-28 00:31:32
128.199.83.29 attack
Aug 27 13:27:47 lnxmail61 sshd[10990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.83.29
2019-08-28 00:05:06
46.242.60.165 attack
Unauthorized connection attempt from IP address 46.242.60.165 on Port 445(SMB)
2019-08-28 00:12:24
45.248.71.194 attackspam
Reported by AbuseIPDB proxy server.
2019-08-28 00:34:26
128.199.242.84 attackbotsspam
Invalid user test from 128.199.242.84 port 50431
2019-08-28 00:51:06

Recently Reported IPs

43.134.73.5 162.216.150.134 2606:4700:10::ac43:979 2606:4700:10::6814:7601
2606:4700:10::6814:5340 2606:4700:10::ac43:2819 2606:4700:10::6814:6271 24.92.152.57
212.241.12.110 14.213.11.237 13.222.182.239 20.168.120.211
101.67.29.195 2606:4700:10::6816:3667 2606:4700:10::6814:7335 2606:4700:10::6814:4570
2606:4700:10::6816:2238 2606:4700:10::ac43:2762 2606:4700:10::6816:3943 2606:4700:10::6814:4612