City: Tacna
Region: Tacna
Country: Peru
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% IP Client: 124.223.158.242
% Joint Whois - whois.lacnic.net
% This server accepts single ASN, IPv4 or IPv6 queries
% LACNIC resource: whois.lacnic.net
% Copyright LACNIC lacnic.net
% The data below is provided for information purposes
% and to assist persons in obtaining information about or
% related to AS and IP numbers registrations
% By submitting a whois query, you agree to use this data
% only for lawful purposes.
% 2025-11-06 11:31:59 (-03 -03:00)
inetnum: 181.64.0.0/19
status: reallocated
aut-num: AS6147
owner: PE-TDPERX6-LACNIC
ownerid: PE-PETD8-LACNIC
responsible: Telefonica del Peru
address: Av. San Felipe 1144, 1144, Edi. A
address: 34 - Lima -
country: PE
phone: +51 1 2106771
owner-c: GRT2
tech-c: GRT2
abuse-c: GRT2
created: 20120418
changed: 20120418
inetnum-up: 181.64.0.0/17
nic-hdl: GRT2
person: Gestion Dir. IP Telefónica del Perú
e-mail: tommy.tomaylla@telefonica.com
address: Calle San Felipe 1144, 1144,
address: LI34 - Lima - LI
country: PE
phone: +51 1 2106771
created: 20021204
changed: 20240409
% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 181.64.13.224
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35652
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;181.64.13.224. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025110600 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 06 22:32:00 CST 2025
;; MSG SIZE rcvd: 106
b'Host 224.13.64.181.in-addr.arpa. not found: 3(NXDOMAIN)
'
server can't find 181.64.13.224.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.104.185.102 | attackspambots | Telnet Server BruteForce Attack |
2019-06-26 12:59:36 |
| 54.38.238.92 | attackbotsspam | wp brute-force |
2019-06-26 13:14:07 |
| 167.114.47.97 | attackbots | Scanning and Vuln Attempts |
2019-06-26 13:07:24 |
| 182.253.220.109 | attackbotsspam | [ssh] SSH attack |
2019-06-26 13:43:22 |
| 113.190.232.244 | attack | Jun 26 06:52:14 srv-4 sshd\[1332\]: Invalid user admin from 113.190.232.244 Jun 26 06:52:14 srv-4 sshd\[1332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.190.232.244 Jun 26 06:52:16 srv-4 sshd\[1332\]: Failed password for invalid user admin from 113.190.232.244 port 57415 ssh2 ... |
2019-06-26 12:56:05 |
| 14.161.18.58 | attackbotsspam | Unauthorized connection attempt from IP address 14.161.18.58 on Port 445(SMB) |
2019-06-26 13:09:29 |
| 119.29.87.183 | attackbotsspam | k+ssh-bruteforce |
2019-06-26 13:01:04 |
| 95.85.8.215 | attackbotsspam | Jun 26 07:30:21 SilenceServices sshd[3043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.8.215 Jun 26 07:30:23 SilenceServices sshd[3043]: Failed password for invalid user 123456 from 95.85.8.215 port 53793 ssh2 Jun 26 07:36:49 SilenceServices sshd[6904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.8.215 |
2019-06-26 13:47:16 |
| 123.231.9.44 | attackbots | Attempt to run wp-login.php |
2019-06-26 13:03:48 |
| 5.237.164.119 | attackbots | Unauthorized connection attempt from IP address 5.237.164.119 on Port 445(SMB) |
2019-06-26 13:25:44 |
| 36.67.120.234 | attack | Jun 26 05:50:33 rpi sshd\[25186\]: Invalid user musicbot from 36.67.120.234 port 38584 Jun 26 05:50:33 rpi sshd\[25186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.120.234 Jun 26 05:50:35 rpi sshd\[25186\]: Failed password for invalid user musicbot from 36.67.120.234 port 38584 ssh2 |
2019-06-26 13:41:33 |
| 125.25.84.149 | attack | Unauthorized connection attempt from IP address 125.25.84.149 on Port 445(SMB) |
2019-06-26 13:15:44 |
| 81.192.159.130 | attackbotsspam | Jun 26 06:59:00 dev sshd\[20187\]: Invalid user teamspeak from 81.192.159.130 port 43062 Jun 26 06:59:00 dev sshd\[20187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.192.159.130 ... |
2019-06-26 13:20:43 |
| 113.121.243.211 | attackspam | $f2bV_matches |
2019-06-26 13:14:58 |
| 180.106.139.112 | attackbots | [portscan] Port scan |
2019-06-26 13:38:51 |