Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Avellaneda

Region: Buenos Aires Province

Country: Argentina

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
190.194.63.162 spambotsattackproxynormal
?????????????
2026-04-10 21:54:57
190.194.63.162 spambotsattackproxynormal
?????????????
2026-04-10 21:54:54
Whois info:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-05-01 09:01:00 (-03 -03:00)

inetnum:     190.194.0.0/15
status:      allocated
aut-num:     N/A
owner:       Telecom Argentina S.A.
ownerid:     AR-TAST-LACNIC
responsible: Administrador IP
address:     Dorrego, 2520, Piso 11
address:     1425 - Buenos Aires - 
country:     AR
phone:       +54  1149684975 [0000]
owner-c:     ADI2
tech-c:      ADI2
abuse-c:     ADI2
inetrev:     190.194.0.0/15
nserver:     O200.PRIMA.COM.AR
nsstat:      20260429 AA
nslastaa:    20260429
nserver:     O2000.PRIMA.COM.AR
nsstat:      20260429 AA
nslastaa:    20260429
created:     20100511
changed:     20180529

nic-hdl:     ADI2
person:      Administrador IP
e-mail:      abuse@telcoar.com
address:     Dorrego, 2502, piso 11
address:     1425 - Buenos Aires - 
country:     AR
phone:       +54  114968 [4975]
created:     20020909
changed:     20260326

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.194.63.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62327
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.194.63.105.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050100 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 01 20:01:00 CST 2026
;; MSG SIZE  rcvd: 107
Host info
105.63.194.190.in-addr.arpa domain name pointer 105-63-194-190.cab.prima.net.ar.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
105.63.194.190.in-addr.arpa	name = 105-63-194-190.cab.prima.net.ar.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
124.104.181.222 attackbots
124.104.181.222 - - [09/Sep/2020:17:31:29 +0000] "POST /xmlrpc.php HTTP/1.1" 200 415 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
124.104.181.222 - - [09/Sep/2020:17:32:30 +0000] "POST /xmlrpc.php HTTP/1.1" 200 415 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
124.104.181.222 - - [09/Sep/2020:17:33:31 +0000] "POST /xmlrpc.php HTTP/1.1" 200 415 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
124.104.181.222 - - [09/Sep/2020:17:34:34 +0000] "POST /xmlrpc.php HTTP/1.1" 503 19382 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
124.104.181.222 - - [09/Sep/2020:17:34:35 +0000] "POST /wp-login.php HTTP/1.1" 503 19240 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
2020-09-10 20:05:31
95.46.140.49 attackspam
Automatic report - WordPress Brute Force
2020-09-10 20:09:05
113.161.33.36 attackspam
Unauthorized connection attempt from IP address 113.161.33.36 on Port 445(SMB)
2020-09-10 19:35:12
179.6.214.62 attack
Attempted connection to port 445.
2020-09-10 19:49:52
45.238.121.157 attackbots
Dovecot Invalid User Login Attempt.
2020-09-10 19:47:50
51.91.136.28 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-09-10 20:00:12
222.162.9.171 attackbotsspam
Unauthorised access (Sep  9) SRC=222.162.9.171 LEN=40 TTL=46 ID=4485 TCP DPT=8080 WINDOW=11602 SYN
2020-09-10 19:30:55
159.203.192.134 attackbots
TCP port : 18347
2020-09-10 19:37:10
173.13.119.49 attackspambots
Attempted connection to port 8080.
2020-09-10 19:55:27
122.168.196.12 attack
Attempted connection to port 1433.
2020-09-10 19:57:37
172.98.193.62 attackspam
(mod_security) mod_security (id:210492) triggered by 172.98.193.62 (US/United States/relay2.backplanedns.org): 5 in the last 3600 secs
2020-09-10 19:33:30
45.33.72.173 attackbots
Port scan denied
2020-09-10 19:47:30
129.28.169.185 attackspam
$f2bV_matches
2020-09-10 19:46:50
190.38.208.134 attackspambots
Attempted connection to port 445.
2020-09-10 19:45:21
51.77.150.203 attackspambots
$f2bV_matches
2020-09-10 19:51:39

Recently Reported IPs

121.41.167.222 104.248.137.13 2606:4700:10::6816:4788 111.183.128.10
250.17.4.35 190.194.63.137 190.194.63.214 2606:4700:10::ac43:1952
2606:4700:10::6816:3867 2606:4700:10::6814:4791 121.234.219.106 66.132.195.118
73.190.161.230 244.137.108.193 105.91.115.55 2606:4700:10::6814:9611
54.83.23.103 192.168.10.41 2606:4700:10::ac43:1823 42.247.85.194