City: Tijuana
Region: Baja California
Country: Mexico
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% IP Client: 124.223.158.242
% Joint Whois - whois.lacnic.net
% This server accepts single ASN, IPv4 or IPv6 queries
% LACNIC resource: whois.lacnic.net
% Copyright LACNIC lacnic.net
% The data below is provided for information purposes
% and to assist persons in obtaining information about or
% related to AS and IP numbers registrations
% By submitting a whois query, you agree to use this data
% only for lawful purposes.
% 2026-04-03 12:32:19 (-03 -03:00)
inetnum: 189.223.0.0/17
status: reallocated
aut-num: N/A
owner: Telefonos del Noroeste, S.A. de C.V.
ownerid: MX-TNSC1-LACNIC
responsible: Dasaev Rangel Davila
address: Pio Pico, 1525, Zona Centro
address: 22000 - Tijuana - BC
country: MX
phone: +52 6646332260
owner-c: LEZ7
tech-c: LRG
abuse-c: LRG
created: 20101007
changed: 20130423
inetnum-up: 189.222.0.0/15
nic-hdl: LEZ7
person: LUIS ENRIQUE HERNANDEZ ZAZUETA
e-mail: luhe@telnor.com
address: NARCISO MENDOZA, 503, BAHIA
address: 22880 - ENSENADA - BC
country: MX
phone: +52 6461823530
created: 20230112
changed: 20230112
nic-hdl: LRG
person: Jefatura de Datos
e-mail: txd_telnor@telnor.com
address: Pio Pico, 1525, Zona Centro
address: 22000 - Tijuana - BC
country: MX
phone: +52 6646332264
created: 20021209
changed: 20250912
% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.223.105.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13343
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;189.223.105.56. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040300 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 23:11:45 CST 2026
;; MSG SIZE rcvd: 107
56.105.223.189.in-addr.arpa domain name pointer 189.223.105.56.dsl.dyn.telnor.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
56.105.223.189.in-addr.arpa name = 189.223.105.56.dsl.dyn.telnor.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 124.89.89.150 | attackbots | Unauthorized connection attempt detected from IP address 124.89.89.150 to port 8123 [J] |
2020-01-16 06:34:31 |
| 196.218.133.35 | attackbotsspam | Unauthorized connection attempt from IP address 196.218.133.35 on Port 445(SMB) |
2020-01-16 06:31:00 |
| 103.100.209.108 | attack | Port scan on 1 port(s): 22 |
2020-01-16 06:37:29 |
| 94.187.53.235 | attackbotsspam | Dec 6 00:06:22 odroid64 sshd\[24471\]: Invalid user admin from 94.187.53.235 Dec 6 00:06:22 odroid64 sshd\[24471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.187.53.235 ... |
2020-01-16 06:22:09 |
| 101.12.113.244 | attackbotsspam | Unauthorized connection attempt from IP address 101.12.113.244 on Port 445(SMB) |
2020-01-16 06:20:38 |
| 164.160.161.90 | attack | firewall-block, port(s): 1433/tcp |
2020-01-16 06:06:37 |
| 99.185.76.161 | attackbotsspam | 2020-01-15 17:00:42,942 fail2ban.actions [1799]: NOTICE [sshd] Ban 99.185.76.161 |
2020-01-16 06:09:26 |
| 125.141.139.9 | attack | SSHD brute force attack detected by fail2ban |
2020-01-16 06:20:19 |
| 101.50.116.28 | attack | Unauthorized connection attempt detected from IP address 101.50.116.28 to port 445 |
2020-01-16 06:08:39 |
| 37.49.230.105 | attackbotsspam | [2020-01-15 15:31:01] NOTICE[2175][C-00002e50] chan_sip.c: Call from '' (37.49.230.105:7819) to extension '1374662884' rejected because extension not found in context 'public'. [2020-01-15 15:31:01] SECURITY[2212] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-15T15:31:01.187-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="1374662884",SessionID="0x7f5ac400f638",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.105/7819",ACLName="no_extension_match" [2020-01-15 15:31:01] NOTICE[2175][C-00002e51] chan_sip.c: Call from '' (37.49.230.105:7819) to extension '0' rejected because extension not found in context 'public'. [2020-01-15 15:31:01] SECURITY[2212] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-15T15:31:01.286-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="0",SessionID="0x7f5ac4318668",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.105/7819",ACLName="no_extension ... |
2020-01-16 06:08:23 |
| 51.15.43.15 | attackspam | Unauthorized connection attempt detected from IP address 51.15.43.15 to port 2220 [J] |
2020-01-16 06:39:51 |
| 104.131.97.47 | attackspam | SSH Login Bruteforce |
2020-01-16 06:37:03 |
| 206.214.154.166 | attack | Unauthorized connection attempt detected from IP address 206.214.154.166 to port 8080 [J] |
2020-01-16 06:43:39 |
| 221.213.75.49 | attack | Unauthorized connection attempt detected from IP address 221.213.75.49 to port 8123 [J] |
2020-01-16 06:42:16 |
| 123.148.217.207 | attackspambots | WordPress brute force |
2020-01-16 06:21:27 |