Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Madrid

Region: Cundinamarca

Country: Colombia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-04-10 07:00:43 (-03 -03:00)

inetnum:     190.144.0.0/14
status:      allocated
aut-num:     AS14080
aut-num:     AS10620
owner:       Telmex Colombia S.A.
ownerid:     CO-ACSA-LACNIC
responsible: Operaciones Core IP
address:     CLARO FIJO COLOMBIA - Cra 68A No. 24B-10, 11111, 
address:     11111 - Bogota - DC
country:     CO
phone:       +57 01 7480000
owner-c:     ATI
tech-c:      ATI
abuse-c:     ATI
inetrev:     190.146.0.0/16
nserver:     NS3.TELMEXLA.NET.CO
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS2.TELMEXLA.NET.CO
nsstat:      20260408 AA
nslastaa:    20260408
inetrev:     190.147.0.0/16
nserver:     NS3.TELMEXLA.NET.CO
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS2.TELMEXLA.NET.CO
nsstat:      20260408 AA
nslastaa:    20260408
inetrev:     190.144.0.0/16
nserver:     NS3.TELMEXLA.NET.CO
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS2.TELMEXLA.NET.CO
nsstat:      20260408 AA
nslastaa:    20260408
inetrev:     190.145.0.0/16
nserver:     NS3.TELMEXLA.NET.CO
nsstat:      20260408 AA
nslastaa:    20260408
nserver:     NS2.TELMEXLA.NET.CO
nsstat:      20260408 AA
nslastaa:    20260408
created:     20070111
changed:     20070111

nic-hdl:     ATI
person:      Network Security Team
e-mail:      ciro.mantilla@claro.com.co
address:     Carrera 68a #24b-10, 00, Plaza Claro
address:     111321 - Bogota - DC
country:     CO
phone:       +57  6017500300 [81966]
created:     20020909
changed:     20250218

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.145.240.184
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10000
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.145.240.184.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041000 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 10 18:00:44 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 184.240.145.190.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 184.240.145.190.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.182.6.40 attackspambots
fail2ban - Attack against Apache (too many 404s)
2019-12-24 07:28:06
23.97.53.81 attack
SSH auth scanning - multiple failed logins
2019-12-24 08:03:25
139.199.87.233 attack
Automatic report - Banned IP Access
2019-12-24 07:31:51
223.25.101.74 attackbotsspam
Dec 23 13:01:01 php1 sshd\[22403\]: Invalid user gluster from 223.25.101.74
Dec 23 13:01:01 php1 sshd\[22403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.25.101.74
Dec 23 13:01:04 php1 sshd\[22403\]: Failed password for invalid user gluster from 223.25.101.74 port 44578 ssh2
Dec 23 13:07:31 php1 sshd\[22928\]: Invalid user fo from 223.25.101.74
Dec 23 13:07:31 php1 sshd\[22928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.25.101.74
2019-12-24 07:36:59
112.30.133.241 attackbotsspam
Dec 23 17:35:38 plusreed sshd[19625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.30.133.241  user=mysql
Dec 23 17:35:40 plusreed sshd[19625]: Failed password for mysql from 112.30.133.241 port 50336 ssh2
Dec 23 17:48:27 plusreed sshd[23109]: Invalid user tirocu from 112.30.133.241
Dec 23 17:48:27 plusreed sshd[23109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.30.133.241
Dec 23 17:48:27 plusreed sshd[23109]: Invalid user tirocu from 112.30.133.241
Dec 23 17:48:29 plusreed sshd[23109]: Failed password for invalid user tirocu from 112.30.133.241 port 50685 ssh2
...
2019-12-24 07:30:27
222.186.175.183 attackspambots
Dec 23 23:53:19 sshgateway sshd\[28761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
Dec 23 23:53:21 sshgateway sshd\[28761\]: Failed password for root from 222.186.175.183 port 10350 ssh2
Dec 23 23:53:34 sshgateway sshd\[28761\]: error: maximum authentication attempts exceeded for root from 222.186.175.183 port 10350 ssh2 \[preauth\]
2019-12-24 07:56:24
45.63.31.80 attack
Automatic report - XMLRPC Attack
2019-12-24 08:04:07
113.190.40.122 attackspambots
Unauthorized connection attempt detected from IP address 113.190.40.122 to port 445
2019-12-24 07:41:18
194.44.246.130 attack
Automatic report - SSH Brute-Force Attack
2019-12-24 07:45:44
189.49.159.204 attack
Lines containing failures of 189.49.159.204
Dec 23 23:24:01 shared01 sshd[2545]: Invalid user mcj from 189.49.159.204 port 42437
Dec 23 23:24:01 shared01 sshd[2545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.49.159.204
Dec 23 23:24:03 shared01 sshd[2545]: Failed password for invalid user mcj from 189.49.159.204 port 42437 ssh2
Dec 23 23:24:03 shared01 sshd[2545]: Received disconnect from 189.49.159.204 port 42437:11: Bye Bye [preauth]
Dec 23 23:24:03 shared01 sshd[2545]: Disconnected from invalid user mcj 189.49.159.204 port 42437 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=189.49.159.204
2019-12-24 07:49:18
200.90.86.196 attackspam
SQL APT Attack
Reported by and Credit to nic@wlink.biz from IP 118.69.71.82
2019-12-24 07:30:53
49.88.112.62 attackbotsspam
2019-12-23T23:46:00.652483abusebot-5.cloudsearch.cf sshd[13597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.62  user=root
2019-12-23T23:46:02.589915abusebot-5.cloudsearch.cf sshd[13597]: Failed password for root from 49.88.112.62 port 64255 ssh2
2019-12-23T23:46:05.482609abusebot-5.cloudsearch.cf sshd[13597]: Failed password for root from 49.88.112.62 port 64255 ssh2
2019-12-23T23:46:00.652483abusebot-5.cloudsearch.cf sshd[13597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.62  user=root
2019-12-23T23:46:02.589915abusebot-5.cloudsearch.cf sshd[13597]: Failed password for root from 49.88.112.62 port 64255 ssh2
2019-12-23T23:46:05.482609abusebot-5.cloudsearch.cf sshd[13597]: Failed password for root from 49.88.112.62 port 64255 ssh2
2019-12-23T23:46:00.652483abusebot-5.cloudsearch.cf sshd[13597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rho
...
2019-12-24 07:48:59
185.84.6.103 attackbotsspam
SSH Bruteforce attempt
2019-12-24 07:55:16
80.82.77.139 attackbotsspam
" "
2019-12-24 07:29:07
223.197.125.10 attackspam
Dec 24 06:21:37 itv-usvr-02 sshd[8207]: Invalid user zhouh from 223.197.125.10 port 57346
Dec 24 06:21:37 itv-usvr-02 sshd[8207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.125.10
Dec 24 06:21:37 itv-usvr-02 sshd[8207]: Invalid user zhouh from 223.197.125.10 port 57346
Dec 24 06:21:39 itv-usvr-02 sshd[8207]: Failed password for invalid user zhouh from 223.197.125.10 port 57346 ssh2
Dec 24 06:29:22 itv-usvr-02 sshd[8459]: Invalid user brengle from 223.197.125.10 port 47196
2019-12-24 07:41:33

Recently Reported IPs

92.118.39.194 34.243.42.11 2606:4700:10::ac43:1830 109.162.246.27
2606:4700:10::ac43:2701 2606:4700:10::6814:4615 2606:4700:10::6816:4667 2606:4700:10::6814:4761
2606:4700:10::6816:3297 2606:4700:10::6814:8001 33.244.28.36 195.33.81.114
20.197.215.150 35.203.211.178 160.119.76.40 134.35.157.125
2606:4700:10::6816:2743 2606:4700:10::6816:1121 2606:4700:10::6814:7444 2606:4700:10::6816:4539