Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tijuana

Region: Baja California

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-04-03 12:32:19 (-03 -03:00)

inetnum:     189.223.0.0/17
status:      reallocated
aut-num:     N/A
owner:       Telefonos del Noroeste, S.A. de C.V.
ownerid:     MX-TNSC1-LACNIC
responsible: Dasaev Rangel Davila
address:     Pio Pico, 1525, Zona Centro
address:     22000 - Tijuana - BC
country:     MX
phone:       +52  6646332260
owner-c:     LEZ7
tech-c:      LRG
abuse-c:     LRG
created:     20101007
changed:     20130423
inetnum-up:  189.222.0.0/15

nic-hdl:     LEZ7
person:      LUIS ENRIQUE HERNANDEZ ZAZUETA
e-mail:      luhe@telnor.com
address:     NARCISO MENDOZA, 503, BAHIA
address:     22880 - ENSENADA - BC
country:     MX
phone:       +52  6461823530
created:     20230112
changed:     20230112

nic-hdl:     LRG
person:      Jefatura de Datos
e-mail:      txd_telnor@telnor.com
address:     Pio Pico, 1525, Zona Centro
address:     22000 - Tijuana - BC
country:     MX
phone:       +52  6646332264
created:     20021209
changed:     20250912

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.223.105.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13343
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;189.223.105.56.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040300 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 23:11:45 CST 2026
;; MSG SIZE  rcvd: 107
Host info
56.105.223.189.in-addr.arpa domain name pointer 189.223.105.56.dsl.dyn.telnor.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
56.105.223.189.in-addr.arpa	name = 189.223.105.56.dsl.dyn.telnor.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
124.89.89.150 attackbots
Unauthorized connection attempt detected from IP address 124.89.89.150 to port 8123 [J]
2020-01-16 06:34:31
196.218.133.35 attackbotsspam
Unauthorized connection attempt from IP address 196.218.133.35 on Port 445(SMB)
2020-01-16 06:31:00
103.100.209.108 attack
Port scan on 1 port(s): 22
2020-01-16 06:37:29
94.187.53.235 attackbotsspam
Dec  6 00:06:22 odroid64 sshd\[24471\]: Invalid user admin from 94.187.53.235
Dec  6 00:06:22 odroid64 sshd\[24471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.187.53.235
...
2020-01-16 06:22:09
101.12.113.244 attackbotsspam
Unauthorized connection attempt from IP address 101.12.113.244 on Port 445(SMB)
2020-01-16 06:20:38
164.160.161.90 attack
firewall-block, port(s): 1433/tcp
2020-01-16 06:06:37
99.185.76.161 attackbotsspam
2020-01-15 17:00:42,942 fail2ban.actions        [1799]: NOTICE  [sshd] Ban 99.185.76.161
2020-01-16 06:09:26
125.141.139.9 attack
SSHD brute force attack detected by fail2ban
2020-01-16 06:20:19
101.50.116.28 attack
Unauthorized connection attempt detected from IP address 101.50.116.28 to port 445
2020-01-16 06:08:39
37.49.230.105 attackbotsspam
[2020-01-15 15:31:01] NOTICE[2175][C-00002e50] chan_sip.c: Call from '' (37.49.230.105:7819) to extension '1374662884' rejected because extension not found in context 'public'.
[2020-01-15 15:31:01] SECURITY[2212] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-15T15:31:01.187-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="1374662884",SessionID="0x7f5ac400f638",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.105/7819",ACLName="no_extension_match"
[2020-01-15 15:31:01] NOTICE[2175][C-00002e51] chan_sip.c: Call from '' (37.49.230.105:7819) to extension '0' rejected because extension not found in context 'public'.
[2020-01-15 15:31:01] SECURITY[2212] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-15T15:31:01.286-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="0",SessionID="0x7f5ac4318668",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.105/7819",ACLName="no_extension
...
2020-01-16 06:08:23
51.15.43.15 attackspam
Unauthorized connection attempt detected from IP address 51.15.43.15 to port 2220 [J]
2020-01-16 06:39:51
104.131.97.47 attackspam
SSH Login Bruteforce
2020-01-16 06:37:03
206.214.154.166 attack
Unauthorized connection attempt detected from IP address 206.214.154.166 to port 8080 [J]
2020-01-16 06:43:39
221.213.75.49 attack
Unauthorized connection attempt detected from IP address 221.213.75.49 to port 8123 [J]
2020-01-16 06:42:16
123.148.217.207 attackspambots
WordPress brute force
2020-01-16 06:21:27

Recently Reported IPs

2606:4700:10::6814:8413 2606:4700:10::6814:5473 2606:4700:10::6816:1688 204.244.88.209
224.121.3.72 3.85.49.138 133.106.125.10 110.77.226.227
2606:4700:10::6816:3211 2606:4700:10::6814:7493 2606:4700:10::6814:5910 2606:4700:10::6814:9621
2606:4700:10::6814:9646 14.207.194.109 2606:4700:10::6814:6482 190.194.63.254
158.158.32.192 194.88.98.82 45.142.154.64 194.88.98.93