Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Asunción

Region: Asuncion

Country: Paraguay

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-04-09 21:47:20 (-03 -03:00)

inetnum:     181.94.224.0/21
status:      allocated
aut-num:     N/A
owner:       Núcleo S.A.
ownerid:     PY-NUSA-LACNIC
responsible: Omar Monges
address:     Maximo Lira, 522, 
address:     8605 - Asuncion - CE
country:     PY
phone:       +595 21 2199000
owner-c:     SES52
tech-c:      SES52
abuse-c:     SES52
inetrev:     181.94.224.0/24
nserver:     NS1.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS2.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS3.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS4.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
inetrev:     181.94.225.0/24
nserver:     NS1.PERSONAL.NET.PY
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS2.PERSONAL.NET.PY
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS3.PERSONAL.NET.PY
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS4.PERSONAL.NET.PY
nsstat:      20260407 AA
nslastaa:    20260407
inetrev:     181.94.226.0/24
nserver:     NS1.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS2.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS3.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS4.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
inetrev:     181.94.227.0/24
nserver:     NS1.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS2.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS3.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS4.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
inetrev:     181.94.228.0/24
nserver:     NS1.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS2.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS3.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS4.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
inetrev:     181.94.229.0/24
nserver:     NS1.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS2.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS3.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS4.PERSONAL.NET.PY
nsstat:      20260408 AA
nslastaa:    20260408
inetrev:     181.94.230.0/24
nserver:     NS1.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS2.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS3.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS4.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
inetrev:     181.94.231.0/24
nserver:     NS1.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS2.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS3.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS4.PERSONAL.NET.PY
nsstat:      20260409 AA
nslastaa:    20260409
created:     20110919
changed:     20231207

nic-hdl:     SES52
person:      Sergio Da Silva
e-mail:      sergio.dasilva@personal.com.py
address:     Maximo Lira, 522, 
address:     0000 - Asuncion - Ce
country:     PY
phone:       +595 21 2199225
created:     20140805
changed:     20211228

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 181.94.229.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58332
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;181.94.229.11.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040902 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 10 08:31:04 CST 2026
;; MSG SIZE  rcvd: 106
Host info
11.229.94.181.in-addr.arpa domain name pointer host-11.personal.net.py.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
11.229.94.181.in-addr.arpa	name = host-11.personal.net.py.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
42.2.201.57 attackspambots
unauthorized connection attempt
2020-02-16 20:35:11
176.114.231.2 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 20:07:20
31.154.87.145 attack
Automatic report - Port Scan Attack
2020-02-16 20:38:43
222.186.175.140 attackbotsspam
Feb 16 02:05:38 auw2 sshd\[15145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.140  user=root
Feb 16 02:05:41 auw2 sshd\[15145\]: Failed password for root from 222.186.175.140 port 48456 ssh2
Feb 16 02:05:44 auw2 sshd\[15145\]: Failed password for root from 222.186.175.140 port 48456 ssh2
Feb 16 02:06:00 auw2 sshd\[15175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.140  user=root
Feb 16 02:06:02 auw2 sshd\[15175\]: Failed password for root from 222.186.175.140 port 50762 ssh2
2020-02-16 20:08:13
59.126.200.2 attackbotsspam
unauthorized connection attempt
2020-02-16 20:06:13
2.183.95.226 attackspambots
unauthorized connection attempt
2020-02-16 20:18:53
46.39.230.13 attackspambots
unauthorized connection attempt
2020-02-16 20:38:23
106.39.84.154 attackbotsspam
unauthorized connection attempt
2020-02-16 20:05:00
62.60.206.159 attackspam
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-02-16 20:17:35
42.177.224.19 attackspam
unauthorized connection attempt
2020-02-16 20:34:46
118.35.52.121 attackbotsspam
unauthorized connection attempt
2020-02-16 20:37:06
168.121.139.170 attack
unauthorized connection attempt
2020-02-16 20:44:17
218.103.244.120 attackspambots
unauthorized connection attempt
2020-02-16 20:39:15
220.134.77.86 attack
unauthorized connection attempt
2020-02-16 20:15:34
111.16.123.44 attackspam
unauthorized connection attempt
2020-02-16 20:12:55

Recently Reported IPs

2606:4700:10::6816:532 2606:4700:10::6814:9959 193.202.9.211 17.239.194.181
64.23.180.195 38.250.187.139 122.192.203.117 2606:4700:10::6814:4745
2606:4700:10::6814:6660 2606:4700:10::6816:4263 2606:4700:10::ac43:1989 2606:4700:10::6816:2488
2606:4700:10::6814:9773 110.78.138.160 142.250.69.174 2606:4700:10::6814:6927
2606:4700:10::6814:6622 110.78.153.143 2606:4700:10::6816:1825 38.248.192.53