City: Guayaquil
Region: Guayas
Country: Ecuador
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% IP Client: 124.223.158.242
% Joint Whois - whois.lacnic.net
% This server accepts single ASN, IPv4 or IPv6 queries
% LACNIC resource: whois.lacnic.net
% Copyright LACNIC lacnic.net
% The data below is provided for information purposes
% and to assist persons in obtaining information about or
% related to AS and IP numbers registrations
% By submitting a whois query, you agree to use this data
% only for lawful purposes.
% 2026-04-07 18:00:33 (-03 -03:00)
inetnum: 181.199.41.104/29
status: reallocated
aut-num: N/A
owner: Netlife Ecuador
ownerid: EC-NEEC-LACNIC
responsible: Francisco Balarezo
address: Nunez de Vela y Av. Atahualpa, E3-13, Edf. Torre d
address: - Quito - P
country: EC
phone: +593 2 2265050 [5024]
owner-c: SEL
tech-c: SEL
abuse-c: SEL
created: 20160716
changed: 20171228
inetnum-up: 181.199.0.0/17
nic-hdl: SEL
person: Carlos Montero
e-mail: networking@telconet.ec
address: Kennedy Norte MZ, 109, Solar 21
address: 59342 - Guayaquil -
country: EC
phone: +593 46020650 [5011]
created: 20021004
changed: 20230724
% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 181.199.41.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56570
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;181.199.41.109. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040703 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 08 05:00:33 CST 2026
;; MSG SIZE rcvd: 107
109.41.199.181.in-addr.arpa domain name pointer host-181-199-41-109.ecua.net.ec.
b'109.41.199.181.in-addr.arpa name = host-181-199-41-109.ecua.net.ec.
Authoritative answers can be found from:
'
| IP | Type | Details | Datetime |
|---|---|---|---|
| 65.60.199.151 | attackspambots | k+ssh-bruteforce |
2019-08-28 00:32:46 |
| 118.69.54.87 | attackbotsspam | Unauthorized connection attempt from IP address 118.69.54.87 on Port 445(SMB) |
2019-08-27 23:49:56 |
| 104.148.70.72 | attack | 104.148.70.72 has been banned for [spam] ... |
2019-08-28 00:45:00 |
| 45.79.214.232 | attackbotsspam | " " |
2019-08-28 00:24:07 |
| 210.51.190.236 | attackspambots | SMB Server BruteForce Attack |
2019-08-28 00:17:12 |
| 177.139.18.185 | attack | Automatic report - Port Scan Attack |
2019-08-28 00:43:26 |
| 41.138.88.3 | attack | Aug 27 15:05:42 vps691689 sshd[3520]: Failed password for root from 41.138.88.3 port 49414 ssh2 Aug 27 15:10:52 vps691689 sshd[3620]: Failed password for root from 41.138.88.3 port 36784 ssh2 ... |
2019-08-27 23:53:01 |
| 209.141.52.141 | attackspambots | 2019-08-27T12:34:18.123081abusebot-6.cloudsearch.cf sshd\[27122\]: Invalid user server1 from 209.141.52.141 port 53642 |
2019-08-28 00:08:37 |
| 58.39.208.102 | attackbots | Unauthorized connection attempt from IP address 58.39.208.102 on Port 445(SMB) |
2019-08-28 00:33:07 |
| 82.85.18.169 | attackspam | Unauthorized connection attempt from IP address 82.85.18.169 on Port 445(SMB) |
2019-08-28 00:13:31 |
| 104.244.78.55 | attackbots | Aug 27 17:51:03 rpi sshd[31789]: Failed password for root from 104.244.78.55 port 41264 ssh2 Aug 27 17:51:07 rpi sshd[31789]: Failed password for root from 104.244.78.55 port 41264 ssh2 |
2019-08-28 00:31:32 |
| 128.199.83.29 | attack | Aug 27 13:27:47 lnxmail61 sshd[10990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.83.29 |
2019-08-28 00:05:06 |
| 46.242.60.165 | attack | Unauthorized connection attempt from IP address 46.242.60.165 on Port 445(SMB) |
2019-08-28 00:12:24 |
| 45.248.71.194 | attackspam | Reported by AbuseIPDB proxy server. |
2019-08-28 00:34:26 |
| 128.199.242.84 | attackbotsspam | Invalid user test from 128.199.242.84 port 50431 |
2019-08-28 00:51:06 |