Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tacna

Region: Tacna

Country: Peru

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2025-11-06 11:31:59 (-03 -03:00)

inetnum:     181.64.0.0/19
status:      reallocated
aut-num:     AS6147
owner:       PE-TDPERX6-LACNIC
ownerid:     PE-PETD8-LACNIC
responsible: Telefonica del Peru
address:     Av. San Felipe 1144, 1144, Edi. A
address:     34 - Lima - 
country:     PE
phone:       +51 1 2106771
owner-c:     GRT2
tech-c:      GRT2
abuse-c:     GRT2
created:     20120418
changed:     20120418
inetnum-up:  181.64.0.0/17

nic-hdl:     GRT2
person:      Gestion Dir. IP Telefónica del Perú
e-mail:      tommy.tomaylla@telefonica.com
address:     Calle San Felipe 1144, 1144, 
address:     LI34 - Lima - LI
country:     PE
phone:       +51 1 2106771
created:     20021204
changed:     20240409

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 181.64.13.224
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35652
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;181.64.13.224.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 06 22:32:00 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 224.13.64.181.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 181.64.13.224.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
103.104.185.102 attackspambots
Telnet Server BruteForce Attack
2019-06-26 12:59:36
54.38.238.92 attackbotsspam
wp brute-force
2019-06-26 13:14:07
167.114.47.97 attackbots
Scanning and Vuln Attempts
2019-06-26 13:07:24
182.253.220.109 attackbotsspam
[ssh] SSH attack
2019-06-26 13:43:22
113.190.232.244 attack
Jun 26 06:52:14 srv-4 sshd\[1332\]: Invalid user admin from 113.190.232.244
Jun 26 06:52:14 srv-4 sshd\[1332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.190.232.244
Jun 26 06:52:16 srv-4 sshd\[1332\]: Failed password for invalid user admin from 113.190.232.244 port 57415 ssh2
...
2019-06-26 12:56:05
14.161.18.58 attackbotsspam
Unauthorized connection attempt from IP address 14.161.18.58 on Port 445(SMB)
2019-06-26 13:09:29
119.29.87.183 attackbotsspam
k+ssh-bruteforce
2019-06-26 13:01:04
95.85.8.215 attackbotsspam
Jun 26 07:30:21 SilenceServices sshd[3043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.8.215
Jun 26 07:30:23 SilenceServices sshd[3043]: Failed password for invalid user 123456 from 95.85.8.215 port 53793 ssh2
Jun 26 07:36:49 SilenceServices sshd[6904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.8.215
2019-06-26 13:47:16
123.231.9.44 attackbots
Attempt to run wp-login.php
2019-06-26 13:03:48
5.237.164.119 attackbots
Unauthorized connection attempt from IP address 5.237.164.119 on Port 445(SMB)
2019-06-26 13:25:44
36.67.120.234 attack
Jun 26 05:50:33 rpi sshd\[25186\]: Invalid user musicbot from 36.67.120.234 port 38584
Jun 26 05:50:33 rpi sshd\[25186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.120.234
Jun 26 05:50:35 rpi sshd\[25186\]: Failed password for invalid user musicbot from 36.67.120.234 port 38584 ssh2
2019-06-26 13:41:33
125.25.84.149 attack
Unauthorized connection attempt from IP address 125.25.84.149 on Port 445(SMB)
2019-06-26 13:15:44
81.192.159.130 attackbotsspam
Jun 26 06:59:00 dev sshd\[20187\]: Invalid user teamspeak from 81.192.159.130 port 43062
Jun 26 06:59:00 dev sshd\[20187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.192.159.130
...
2019-06-26 13:20:43
113.121.243.211 attackspam
$f2bV_matches
2019-06-26 13:14:58
180.106.139.112 attackbots
[portscan] Port scan
2019-06-26 13:38:51

Recently Reported IPs

74.222.3.186 112.155.39.176 106.244.42.175 192.53.64.128
95.214.53.153 2a0f:a440:0:53:ede6:93da:605f:275a 47.92.125.245 47.92.197.246
47.92.99.170 47.92.213.242 39.98.85.197 121.11.48.202
162.243.112.28 139.59.58.135 203.227.50.34 85.11.167.4
18.201.215.211 42.229.133.41 39.163.180.188 36.159.179.250