Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Guatemala City

Region: Guatemala

Country: Guatemala

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2025-12-02 19:52:01 (-03 -03:00)

inetnum:     190.149.0.0/17
status:      allocated
aut-num:     AS14754
owner:       TELECOMUNICACIONES DE GUATEMALA, SOCIEDAD ANONIMA
ownerid:     GT-TESA-LACNIC
responsible: Claro Guatemala
address:     7 Avenida 12-39 Zona 1, na, 
address:     01001 - guatemala - 
country:     GT
phone:       +502  24206174
owner-c:     HES3
tech-c:      HES3
abuse-c:     HES3
inetrev:     190.149.55.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251201 AA
nslastaa:    20251201
nserver:     NS.COMTECH.NET.GT
nsstat:      20251201 AA
nslastaa:    20251201
inetrev:     190.149.97.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251201 AA
nslastaa:    20251201
nserver:     NS.COMTECH.NET.GT
nsstat:      20251201 AA
nslastaa:    20251201
inetrev:     190.149.72.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251202 AA
nslastaa:    20251202
nserver:     NS.COMTECH.NET.GT
nsstat:      20251202 AA
nslastaa:    20251202
inetrev:     190.149.64.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251201 AA
nslastaa:    20251201
nserver:     NS.COMTECH.NET.GT
nsstat:      20251201 AA
nslastaa:    20251201
inetrev:     190.149.67.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251129 AA
nslastaa:    20251129
nserver:     NS.COMTECH.NET.GT
nsstat:      20251129 AA
nslastaa:    20251129
inetrev:     190.149.73.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251126 AA
nslastaa:    20251126
nserver:     NS.COMTECH.NET.GT
nsstat:      20251126 AA
nslastaa:    20251126
inetrev:     190.149.62.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251202 AA
nslastaa:    20251202
nserver:     NS.COMTECH.NET.GT
nsstat:      20251202 AA
nslastaa:    20251202
inetrev:     190.149.70.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251201 AA
nslastaa:    20251201
nserver:     NS.COMTECH.NET.GT
nsstat:      20251201 AA
nslastaa:    20251201
inetrev:     190.149.60.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251202 AA
nslastaa:    20251202
nserver:     NS.COMTECH.NET.GT
nsstat:      20251202 AA
nslastaa:    20251202
inetrev:     190.149.69.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251202 AA
nslastaa:    20251202
nserver:     NS.COMTECH.NET.GT
nsstat:      20251202 AA
nslastaa:    20251202
inetrev:     190.149.74.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251129 AA
nslastaa:    20251129
nserver:     NS.COMTECH.NET.GT
nsstat:      20251129 AA
nslastaa:    20251129
inetrev:     190.149.56.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251201 AA
nslastaa:    20251201
nserver:     NS.COMTECH.NET.GT
nsstat:      20251201 AA
nslastaa:    20251201
inetrev:     190.149.66.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251201 AA
nslastaa:    20251201
nserver:     NS.COMTECH.NET.GT
nsstat:      20251201 AA
nslastaa:    20251201
inetrev:     190.149.7.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251129 AA
nslastaa:    20251129
nserver:     NS.COMTECH.NET.GT
nsstat:      20251129 AA
nslastaa:    20251129
inetrev:     190.149.59.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251129 AA
nslastaa:    20251129
nserver:     NS.COMTECH.NET.GT
nsstat:      20251129 AA
nslastaa:    20251129
inetrev:     190.149.63.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251201 AA
nslastaa:    20251201
nserver:     NS.COMTECH.NET.GT
nsstat:      20251201 AA
nslastaa:    20251201
inetrev:     190.149.71.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251202 AA
nslastaa:    20251202
nserver:     NS.COMTECH.NET.GT
nsstat:      20251202 AA
nslastaa:    20251202
inetrev:     190.149.6.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251127 AA
nslastaa:    20251127
nserver:     NS.COMTECH.NET.GT
nsstat:      20251127 AA
nslastaa:    20251127
inetrev:     190.149.57.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251201 AA
nslastaa:    20251201
nserver:     NS.COMTECH.NET.GT
nsstat:      20251201 AA
nslastaa:    20251201
inetrev:     190.149.96.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251130 AA
nslastaa:    20251130
nserver:     NS.COMTECH.NET.GT
nsstat:      20251130 AA
nslastaa:    20251130
inetrev:     190.149.20.0/24
nserver:     NS.TELGUA.COM.GT
nsstat:      20251202 AA
nslastaa:    20251202
nserver:     NS.COMTECH.NET.GT
nsstat:      20251202 AA
nslastaa:    20251202
created:     20090225
changed:     20210618

nic-hdl:     HES3
person:      Claro Guatemala
e-mail:      gestion.seguridad@claro.com.gt
address:     Diagonal 15, Avenida la castellana 38-40 zona 8, Edificio Torre Telgua., na, 
address:     01008 - Guatemala - 
country:     GT
phone:       +502  24217633
created:     20030624
changed:     20211231

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.149.90.177
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2330
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.149.90.177.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025120201 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 03 06:52:01 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 177.90.149.190.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 177.90.149.190.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
195.208.116.246 attackbotsspam
Sep  8 10:00:26 lcprod sshd\[10273\]: Invalid user appuser@123 from 195.208.116.246
Sep  8 10:00:26 lcprod sshd\[10273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.208.116.246
Sep  8 10:00:27 lcprod sshd\[10273\]: Failed password for invalid user appuser@123 from 195.208.116.246 port 51288 ssh2
Sep  8 10:04:21 lcprod sshd\[10747\]: Invalid user 123123 from 195.208.116.246
Sep  8 10:04:21 lcprod sshd\[10747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.208.116.246
2019-09-09 09:23:57
158.69.192.200 attack
2019-08-12T16:02:41.639809wiz-ks3 sshd[31615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.ip-158-69-192.net  user=root
2019-08-12T16:02:43.534643wiz-ks3 sshd[31615]: Failed password for root from 158.69.192.200 port 43628 ssh2
2019-08-12T16:02:45.447541wiz-ks3 sshd[31615]: Failed password for root from 158.69.192.200 port 43628 ssh2
2019-08-12T16:02:41.639809wiz-ks3 sshd[31615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.ip-158-69-192.net  user=root
2019-08-12T16:02:43.534643wiz-ks3 sshd[31615]: Failed password for root from 158.69.192.200 port 43628 ssh2
2019-08-12T16:02:45.447541wiz-ks3 sshd[31615]: Failed password for root from 158.69.192.200 port 43628 ssh2
2019-08-12T16:02:41.639809wiz-ks3 sshd[31615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.ip-158-69-192.net  user=root
2019-08-12T16:02:43.534643wiz-ks3 sshd[31615]: Failed password for root from 158.69.192.
2019-09-09 10:17:10
14.192.193.162 attack
Automatic report - Port Scan Attack
2019-09-09 10:03:00
46.101.77.58 attack
Sep  8 20:53:05 ny01 sshd[21576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.77.58
Sep  8 20:53:07 ny01 sshd[21576]: Failed password for invalid user admin from 46.101.77.58 port 58896 ssh2
Sep  8 21:01:09 ny01 sshd[23458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.77.58
2019-09-09 09:16:50
190.141.37.72 attackbotsspam
port scan/probe/communication attempt
2019-09-09 09:47:12
190.24.15.228 attackbotsspam
port scan/probe/communication attempt
2019-09-09 10:05:27
36.66.42.3 attackspambots
445/tcp 445/tcp
[2019-07-19/09-08]2pkt
2019-09-09 09:27:03
60.32.182.85 attack
Unauthorised access (Sep  8) SRC=60.32.182.85 LEN=44 TOS=0x10 PREC=0x40 TTL=238 ID=36193 TCP DPT=445 WINDOW=1024 SYN
2019-09-09 09:48:19
37.228.90.143 attack
23/tcp 23/tcp 23/tcp...
[2019-07-14/09-08]10pkt,1pt.(tcp)
2019-09-09 10:04:02
195.29.233.0 attack
Chat Spam
2019-09-09 09:24:35
37.144.148.124 attackbotsspam
2019-09-08 14:28:38 H=37-144-148-124.broadband.corbina.ru [37.144.148.124]:57469 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4, 127.0.0.11) (https://www.spamhaus.org/query/ip/37.144.148.124)
2019-09-08 14:28:39 H=37-144-148-124.broadband.corbina.ru [37.144.148.124]:57469 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.11, 127.0.0.4) (https://www.spamhaus.org/query/ip/37.144.148.124)
2019-09-08 14:28:39 H=37-144-148-124.broadband.corbina.ru [37.144.148.124]:57469 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.11, 127.0.0.4) (https://www.spamhaus.org/query/ip/37.144.148.124)
...
2019-09-09 09:32:29
89.19.180.249 attackbotsspam
23/tcp 23/tcp
[2019-07-10/09-08]2pkt
2019-09-09 09:20:18
68.183.234.12 attack
Sep  8 15:16:51 friendsofhawaii sshd\[3861\]: Invalid user teamspeak3 from 68.183.234.12
Sep  8 15:16:51 friendsofhawaii sshd\[3861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.234.12
Sep  8 15:16:53 friendsofhawaii sshd\[3861\]: Failed password for invalid user teamspeak3 from 68.183.234.12 port 53220 ssh2
Sep  8 15:23:00 friendsofhawaii sshd\[4342\]: Invalid user test1 from 68.183.234.12
Sep  8 15:23:00 friendsofhawaii sshd\[4342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.234.12
2019-09-09 09:37:29
42.112.213.140 attack
445/tcp 445/tcp 445/tcp...
[2019-07-27/09-08]6pkt,1pt.(tcp)
2019-09-09 09:31:54
103.21.228.3 attack
Sep  9 03:01:02 SilenceServices sshd[26970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.228.3
Sep  9 03:01:04 SilenceServices sshd[26970]: Failed password for invalid user ubuntu from 103.21.228.3 port 41335 ssh2
Sep  9 03:06:30 SilenceServices sshd[31023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.228.3
2019-09-09 09:37:56

Recently Reported IPs

180.153.236.171 10.40.202.209 38.157.254.107 192.168.7.162
103.30.92.188 195.24.236.148 180.163.64.52 120.231.182.119
38.60.89.45 67.205.179.196 34.122.105.182 10.95.224.139
113.215.188.173 115.45.40.214 38.71.24.72 143.110.165.7
107.170.190.202 3.253.195.116 170.114.45.39 60.21.160.66