Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Medellín

Region: Antioquia

Country: Colombia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-03-30 06:31:12 (-03 -03:00)

inetnum:     190.156.0.0/15
status:      allocated
aut-num:     N/A
owner:       Telmex Colombia S.A.
ownerid:     CO-ACSA-LACNIC
responsible: Operaciones Core IP
address:     CLARO FIJO COLOMBIA - Cra 68A No. 24B-10, 11111, 
address:     11111 - Bogota - DC
country:     CO
phone:       +57 01 7480000
owner-c:     ATI
tech-c:      ATI
abuse-c:     ATI
inetrev:     190.156.0.0/16
nserver:     NS3.TELMEXLA.NET.CO
nsstat:      20260326 AA
nslastaa:    20260326
nserver:     NS2.TELMEXLA.NET.CO
nsstat:      20260326 AA
nslastaa:    20260326
inetrev:     190.157.0.0/16
nserver:     NS3.TELMEXLA.NET.CO
nsstat:      20260330 AA
nslastaa:    20260330
nserver:     NS2.TELMEXLA.NET.CO
nsstat:      20260330 AA
nslastaa:    20260330
created:     20070316
changed:     20100305

nic-hdl:     ATI
person:      Network Security Team
e-mail:      ciro.mantilla@claro.com.co
address:     Carrera 68a #24b-10, 00, Plaza Claro
address:     111321 - Bogota - DC
country:     CO
phone:       +57  6017500300 [81966]
created:     20020909
changed:     20250218

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.157.85.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46036
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.157.85.3.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033000 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 17:31:13 CST 2026
;; MSG SIZE  rcvd: 105
Host info
3.85.157.190.in-addr.arpa domain name pointer dynamic-ip-190157853.cable.net.co.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
3.85.157.190.in-addr.arpa	name = dynamic-ip-190157853.cable.net.co.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
183.179.166.1 attackspambots
Unauthorized connection attempt detected from IP address 183.179.166.1 to port 5555 [T]
2020-08-16 01:15:22
80.139.85.185 attack
Tried sshing with brute force.
2020-08-16 00:44:15
176.105.16.206 attackspam
Unauthorized connection attempt detected from IP address 176.105.16.206 to port 4000 [T]
2020-08-16 01:17:23
198.143.133.154 attack
Unauthorized connection attempt detected from IP address 198.143.133.154 to port 587 [T]
2020-08-16 01:11:57
189.202.204.88 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-16 00:52:01
219.151.248.239 attack
Unauthorized connection attempt detected from IP address 219.151.248.239 to port 80 [T]
2020-08-16 01:09:08
196.52.43.123 attackbots
Unauthorized connection attempt detected from IP address 196.52.43.123 to port 5905 [T]
2020-08-16 01:13:14
51.91.116.150 attackbotsspam
Aug 15 19:51:17 hosting sshd[2945]: Invalid user git from 51.91.116.150 port 41058
...
2020-08-16 00:57:20
106.12.82.80 attackbots
Unauthorized SSH login attempts
2020-08-16 01:00:07
80.82.77.139 attack
 TCP (SYN) 80.82.77.139:29011 -> port 81, len 44
2020-08-16 01:06:54
183.89.65.12 attackspam
Unauthorized connection attempt detected from IP address 183.89.65.12 to port 9530 [T]
2020-08-16 01:16:35
218.253.26.156 attackbots
Unauthorized connection attempt detected from IP address 218.253.26.156 to port 5555 [T]
2020-08-16 01:02:05
185.132.53.11 attackspam
 TCP (SYN) 185.132.53.11:35630 -> port 22, len 44
2020-08-16 01:14:50
80.82.65.74 attackbots
firewall-block, port(s): 3316/tcp
2020-08-16 00:41:41
64.225.106.12 attack
prod6
...
2020-08-16 00:53:56

Recently Reported IPs

169.254.110.75 2606:4700:10::ac43:1778 2606:4700:10::6814:6639 2606:4700:10::ac43:2364
2606:4700:10::ac43:824 2606:4700:10::6816:709 2606:4700:10::ac43:1016 2606:4700:10::6814:9726
2606:4700:10::6814:5865 2606:4700:10::6814:9337 2606:4700:10::6816:2859 2606:4700:10::6816:3033
2606:4700:10::6814:7840 2606:4700:10::6816:1805 2606:4700:10::6816:4019 49.46.206.98
43.131.228.46 35.246.36.169 69.176.36.15 106.113.231.11