City: Montevideo
Region: Montevideo
Country: Uruguay
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% IP Client: 124.223.158.242
% Joint Whois - whois.lacnic.net
% This server accepts single ASN, IPv4 or IPv6 queries
% LACNIC resource: whois.lacnic.net
% Copyright LACNIC lacnic.net
% The data below is provided for information purposes
% and to assist persons in obtaining information about or
% related to AS and IP numbers registrations
% By submitting a whois query, you agree to use this data
% only for lawful purposes.
% 2026-04-10 16:00:23 (-03 -03:00)
inetnum: 186.52.0.0/14
status: allocated
aut-num: AS6057
owner: Administracion Nacional de Telecomunicaciones
ownerid: UY-ANTA-LACNIC
responsible: ANTEL URUGUAY
address: Guatemala, 1075, Torre de las Telecomunicaciones
address: 11800 - Montevideo - Montevideo
country: UY
phone: +598 29280000 [0000]
owner-c: IIA17
tech-c: ANU
abuse-c: ANU
inetrev: 186.52.0.0/16
nserver: NS1.ANTELDATA.COM.UY
nsstat: 20260406 AA
nslastaa: 20260406
nserver: NS2.ANTELDATA.COM.UY
nsstat: 20260406 AA
nslastaa: 20260406
inetrev: 186.53.0.0/16
nserver: NS1.ANTELDATA.COM.UY
nsstat: 20260410 AA
nslastaa: 20260410
nserver: NS2.ANTELDATA.COM.UY
nsstat: 20260410 AA
nslastaa: 20260410
inetrev: 186.54.0.0/16
nserver: NS1.ANTELDATA.COM.UY
nsstat: 20260409 AA
nslastaa: 20260409
nserver: NS2.ANTELDATA.COM.UY
nsstat: 20260409 AA
nslastaa: 20260409
inetrev: 186.55.0.0/16
nserver: NS1.ANTELDATA.COM.UY
nsstat: 20260409 AA
nslastaa: 20260409
nserver: NS2.ANTELDATA.COM.UY
nsstat: 20260409 AA
nslastaa: 20260409
created: 20111011
changed: 20111011
nic-hdl: IIA17
person: IngenierÃa Internacional Antel
e-mail: uai@antel.com.uy
address: Guatemala, 1075, Torre de las Telecomunicaciones
address: 11800 - Montevideo - Montevideo
country: UY
phone: +598 29280000 [0000]
created: 20240118
changed: 20260128
nic-hdl: ANU
person: ANTEL URUGUAY
e-mail: ipadmin@antel.net.uy
address: Mercedes, 876, P. 2
address: 11100 - Montevideo -
country: UY
phone: +598 29002877 [0000]
created: 20020910
changed: 20240117
% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 186.55.7.178
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41269
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;186.55.7.178. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041001 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 11 03:00:23 CST 2026
;; MSG SIZE rcvd: 105
178.7.55.186.in-addr.arpa domain name pointer r186-55-7-178.dialup.adsl.anteldata.net.uy.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
178.7.55.186.in-addr.arpa name = r186-55-7-178.dialup.adsl.anteldata.net.uy.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 41.33.191.243 | attackbots | Unauthorized connection attempt from IP address 41.33.191.243 on Port 445(SMB) |
2020-08-11 05:19:39 |
| 210.212.29.215 | attackbotsspam | Aug 10 22:43:40 eventyay sshd[19816]: Failed password for root from 210.212.29.215 port 53706 ssh2 Aug 10 22:46:46 eventyay sshd[19902]: Failed password for root from 210.212.29.215 port 39480 ssh2 ... |
2020-08-11 05:04:12 |
| 183.89.221.37 | attackspam | Unauthorized connection attempt from IP address 183.89.221.37 on Port 445(SMB) |
2020-08-11 04:51:50 |
| 196.219.188.169 | attackbotsspam | Unauthorized connection attempt from IP address 196.219.188.169 on Port 445(SMB) |
2020-08-11 05:04:31 |
| 181.49.254.230 | attackspam | frenzy |
2020-08-11 05:24:46 |
| 68.183.89.147 | attack | Aug 10 22:12:53 vps sshd[24320]: Failed password for root from 68.183.89.147 port 46948 ssh2 Aug 10 22:27:35 vps sshd[25016]: Failed password for root from 68.183.89.147 port 59854 ssh2 ... |
2020-08-11 04:55:13 |
| 31.43.31.64 | attack | Unauthorized connection attempt from IP address 31.43.31.64 on Port 445(SMB) |
2020-08-11 05:17:02 |
| 193.27.229.47 | attackbots | firewall-block, port(s): 62461/tcp, 62465/tcp, 62488/tcp, 62495/tcp |
2020-08-11 05:02:07 |
| 59.127.95.214 | attackspambots | [N10.H2.VM2] Port Scanner Detected Blocked by UFW |
2020-08-11 05:13:32 |
| 185.153.199.185 | attackbotsspam | Aug 10 22:19:13 [host] kernel: [2757769.623724] [U Aug 10 22:24:26 [host] kernel: [2758082.654987] [U Aug 10 22:27:58 [host] kernel: [2758294.458162] [U Aug 10 22:36:15 [host] kernel: [2758791.550905] [U Aug 10 22:37:28 [host] kernel: [2758864.681577] [U Aug 10 22:46:33 [host] kernel: [2759408.869504] [U |
2020-08-11 05:03:43 |
| 222.124.202.179 | attackbotsspam | Unauthorized connection attempt from IP address 222.124.202.179 on Port 445(SMB) |
2020-08-11 05:11:46 |
| 141.98.10.196 | attackspambots | Automatic report - Banned IP Access |
2020-08-11 05:14:47 |
| 187.188.107.235 | attackbotsspam | Unauthorized connection attempt from IP address 187.188.107.235 on Port 445(SMB) |
2020-08-11 04:50:02 |
| 164.132.98.75 | attackspam | Aug 10 22:43:59 eventyay sshd[19821]: Failed password for root from 164.132.98.75 port 40751 ssh2 Aug 10 22:47:56 eventyay sshd[19947]: Failed password for root from 164.132.98.75 port 45687 ssh2 ... |
2020-08-11 04:59:19 |
| 113.89.12.21 | attack | Aug 10 23:44:10 journals sshd\[102681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.89.12.21 user=root Aug 10 23:44:12 journals sshd\[102681\]: Failed password for root from 113.89.12.21 port 42375 ssh2 Aug 10 23:46:40 journals sshd\[102932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.89.12.21 user=root Aug 10 23:46:42 journals sshd\[102932\]: Failed password for root from 113.89.12.21 port 59839 ssh2 Aug 10 23:49:09 journals sshd\[103195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.89.12.21 user=root ... |
2020-08-11 04:58:00 |