Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Montevideo

Region: Montevideo

Country: Uruguay

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-04-10 16:00:23 (-03 -03:00)

inetnum:     186.52.0.0/14
status:      allocated
aut-num:     AS6057
owner:       Administracion Nacional de Telecomunicaciones
ownerid:     UY-ANTA-LACNIC
responsible: ANTEL URUGUAY
address:     Guatemala, 1075, Torre de las Telecomunicaciones
address:     11800 - Montevideo - Montevideo
country:     UY
phone:       +598  29280000 [0000]
owner-c:     IIA17
tech-c:      ANU
abuse-c:     ANU
inetrev:     186.52.0.0/16
nserver:     NS1.ANTELDATA.COM.UY
nsstat:      20260406 AA
nslastaa:    20260406
nserver:     NS2.ANTELDATA.COM.UY
nsstat:      20260406 AA
nslastaa:    20260406
inetrev:     186.53.0.0/16
nserver:     NS1.ANTELDATA.COM.UY
nsstat:      20260410 AA
nslastaa:    20260410
nserver:     NS2.ANTELDATA.COM.UY
nsstat:      20260410 AA
nslastaa:    20260410
inetrev:     186.54.0.0/16
nserver:     NS1.ANTELDATA.COM.UY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS2.ANTELDATA.COM.UY
nsstat:      20260409 AA
nslastaa:    20260409
inetrev:     186.55.0.0/16
nserver:     NS1.ANTELDATA.COM.UY
nsstat:      20260409 AA
nslastaa:    20260409
nserver:     NS2.ANTELDATA.COM.UY
nsstat:      20260409 AA
nslastaa:    20260409
created:     20111011
changed:     20111011

nic-hdl:     IIA17
person:      Ingeniería Internacional Antel
e-mail:      uai@antel.com.uy
address:     Guatemala, 1075, Torre de las Telecomunicaciones
address:     11800 - Montevideo - Montevideo
country:     UY
phone:       +598  29280000 [0000]
created:     20240118
changed:     20260128

nic-hdl:     ANU
person:      ANTEL URUGUAY
e-mail:      ipadmin@antel.net.uy
address:     Mercedes, 876, P. 2
address:     11100 - Montevideo - 
country:     UY
phone:       +598  29002877 [0000]
created:     20020910
changed:     20240117

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 186.55.7.178
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41269
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;186.55.7.178.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041001 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 11 03:00:23 CST 2026
;; MSG SIZE  rcvd: 105
Host info
178.7.55.186.in-addr.arpa domain name pointer r186-55-7-178.dialup.adsl.anteldata.net.uy.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
178.7.55.186.in-addr.arpa	name = r186-55-7-178.dialup.adsl.anteldata.net.uy.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.33.191.243 attackbots
Unauthorized connection attempt from IP address 41.33.191.243 on Port 445(SMB)
2020-08-11 05:19:39
210.212.29.215 attackbotsspam
Aug 10 22:43:40 eventyay sshd[19816]: Failed password for root from 210.212.29.215 port 53706 ssh2
Aug 10 22:46:46 eventyay sshd[19902]: Failed password for root from 210.212.29.215 port 39480 ssh2
...
2020-08-11 05:04:12
183.89.221.37 attackspam
Unauthorized connection attempt from IP address 183.89.221.37 on Port 445(SMB)
2020-08-11 04:51:50
196.219.188.169 attackbotsspam
Unauthorized connection attempt from IP address 196.219.188.169 on Port 445(SMB)
2020-08-11 05:04:31
181.49.254.230 attackspam
frenzy
2020-08-11 05:24:46
68.183.89.147 attack
Aug 10 22:12:53 vps sshd[24320]: Failed password for root from 68.183.89.147 port 46948 ssh2
Aug 10 22:27:35 vps sshd[25016]: Failed password for root from 68.183.89.147 port 59854 ssh2
...
2020-08-11 04:55:13
31.43.31.64 attack
Unauthorized connection attempt from IP address 31.43.31.64 on Port 445(SMB)
2020-08-11 05:17:02
193.27.229.47 attackbots
firewall-block, port(s): 62461/tcp, 62465/tcp, 62488/tcp, 62495/tcp
2020-08-11 05:02:07
59.127.95.214 attackspambots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-11 05:13:32
185.153.199.185 attackbotsspam
Aug 10 22:19:13 [host] kernel: [2757769.623724] [U
Aug 10 22:24:26 [host] kernel: [2758082.654987] [U
Aug 10 22:27:58 [host] kernel: [2758294.458162] [U
Aug 10 22:36:15 [host] kernel: [2758791.550905] [U
Aug 10 22:37:28 [host] kernel: [2758864.681577] [U
Aug 10 22:46:33 [host] kernel: [2759408.869504] [U
2020-08-11 05:03:43
222.124.202.179 attackbotsspam
Unauthorized connection attempt from IP address 222.124.202.179 on Port 445(SMB)
2020-08-11 05:11:46
141.98.10.196 attackspambots
Automatic report - Banned IP Access
2020-08-11 05:14:47
187.188.107.235 attackbotsspam
Unauthorized connection attempt from IP address 187.188.107.235 on Port 445(SMB)
2020-08-11 04:50:02
164.132.98.75 attackspam
Aug 10 22:43:59 eventyay sshd[19821]: Failed password for root from 164.132.98.75 port 40751 ssh2
Aug 10 22:47:56 eventyay sshd[19947]: Failed password for root from 164.132.98.75 port 45687 ssh2
...
2020-08-11 04:59:19
113.89.12.21 attack
Aug 10 23:44:10 journals sshd\[102681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.89.12.21  user=root
Aug 10 23:44:12 journals sshd\[102681\]: Failed password for root from 113.89.12.21 port 42375 ssh2
Aug 10 23:46:40 journals sshd\[102932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.89.12.21  user=root
Aug 10 23:46:42 journals sshd\[102932\]: Failed password for root from 113.89.12.21 port 59839 ssh2
Aug 10 23:49:09 journals sshd\[103195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.89.12.21  user=root
...
2020-08-11 04:58:00

Recently Reported IPs

162.216.149.40 49.60.118.205 45.230.74.42 2606:4700:10::6814:9922
2606:4700:10::6814:6834 2606:4700:10::ac43:2586 2606:4700:10::6816:556 2606:4700:10::6814:8812
2606:4700:10::6814:4458 164.155.74.139 197.36.59.203 199.7.230.241
91.230.168.143 195.184.76.197 161.102.40.32 152.108.255.10
120.171.54.136 110.77.187.63 2606:4700:10::6814:7456 2606:4700:10::6816:57