City: Miranda
Region: Miranda
Country: Venezuela
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 190.202.147.253 | attackspam | $f2bV_matches |
2020-10-12 01:41:21 |
| 190.202.147.253 | attack | SSH Brute-Force Attack |
2020-10-11 17:32:51 |
% IP Client: 124.223.158.242
% Joint Whois - whois.lacnic.net
% This server accepts single ASN, IPv4 or IPv6 queries
% LACNIC resource: whois.lacnic.net
% Copyright LACNIC lacnic.net
% The data below is provided for information purposes
% and to assist persons in obtaining information about or
% related to AS and IP numbers registrations
% By submitting a whois query, you agree to use this data
% only for lawful purposes.
% 2026-03-07 10:42:44 (-03 -03:00)
inetnum: 190.200.0.0/13
status: allocated
aut-num: AS8048
owner: CANTV Servicios, Venezuela
ownerid: VE-CSVE-LACNIC
responsible: CANTV GSR
address: Segunda Avenida de los Palos Grandes, 000, Entre Av. Fr
address: 1060 - Caracas - MI
country: VE
phone: +58 2095685 [0000]
owner-c: LUM
tech-c: LUM
abuse-c: LUM
inetrev: 190.202.0.0/16
nserver: NS1.CANTV.NET
nsstat: 20260306 AA
nslastaa: 20260306
nserver: NS2.CANTV.NET
nsstat: 20260306 AA
nslastaa: 20260306
nserver: DNS1.CANTV.NET
nsstat: 20260306 AA
nslastaa: 20260306
nserver: DNS2.CANTV.NET
nsstat: 20260306 AA
nslastaa: 20260306
inetrev: 190.200.0.0/15
nserver: NS1.CANTV.NET
nsstat: 20260307 AA
nslastaa: 20260307
nserver: NS2.CANTV.NET
nsstat: 20260307 AA
nslastaa: 20260307
nserver: DNS1.CANTV.NET
nsstat: 20260307 AA
nslastaa: 20260307
nserver: DNS2.CANTV.NET
nsstat: 20260307 AA
nslastaa: 20260307
inetrev: 190.203.0.0/16
nserver: NS1.CANTV.NET
nsstat: 20260306 AA
nslastaa: 20260306
nserver: NS2.CANTV.NET
nsstat: 20260306 AA
nslastaa: 20260306
nserver: DNS1.CANTV.NET
nsstat: 20260306 AA
nslastaa: 20260306
nserver: DNS2.CANTV.NET
nsstat: 20260306 AA
nslastaa: 20260306
inetrev: 190.204.0.0/14
nserver: NS1.CANTV.NET
nsstat: 20260306 AA
nslastaa: 20260306
nserver: NS2.CANTV.NET
nsstat: 20260306 AA
nslastaa: 20260306
nserver: DNS1.CANTV.NET
nsstat: 20260306 AA
nslastaa: 20260306
nserver: DNS2.CANTV.NET
nsstat: 20260306 AA
nslastaa: 20260306
created: 20070613
changed: 20070613
nic-hdl: LUM
person: Ger Sop
e-mail: ipadmin@cantv.com.ve
address: CANTV COR Los Palos Grandes Chacao Caracas Venezuela, 000, -
address: 1060 - Caracas - MI
country: VE
phone: +58 02125000000 [0000]
created: 20020911
changed: 20240809
% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.202.14.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23289
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;190.202.14.169. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026030700 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 07 21:42:44 CST 2026
;; MSG SIZE rcvd: 107
b'169.14.202.190.in-addr.arpa domain name pointer 190-202-14-169.chc-00.rai.cantv.net.
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
169.14.202.190.in-addr.arpa name = 190-202-14-169.chc-00.rai.cantv.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 122.233.151.242 | attackspam | 2019-06-24 dovecot_login authenticator failed for \(uvhpaotm.com\) \[122.233.151.242\]: 535 Incorrect authentication data \(set_id=**REMOVED****REMOVED****REMOVED**_perl@**REMOVED**.de\) 2019-06-24 dovecot_login authenticator failed for \(uvhpaotm.com\) \[122.233.151.242\]: 535 Incorrect authentication data \(set_id=**REMOVED****REMOVED****REMOVED**_perl@**REMOVED**.de\) 2019-06-24 dovecot_login authenticator failed for \(uvhpaotm.com\) \[122.233.151.242\]: 535 Incorrect authentication data \(set_id=**REMOVED****REMOVED****REMOVED**_perl@**REMOVED**.de\) |
2019-06-24 16:36:27 |
| 171.22.27.100 | attack | 20 attempts against mh-ssh on cold.magehost.pro |
2019-06-24 16:21:45 |
| 193.56.28.116 | attack | scan z |
2019-06-24 16:45:42 |
| 190.36.82.25 | attack | 3389BruteforceFW21 |
2019-06-24 16:31:30 |
| 218.92.0.200 | attackspambots | Jun 24 06:50:25 dev sshd\[3032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.200 user=root Jun 24 06:50:27 dev sshd\[3032\]: Failed password for root from 218.92.0.200 port 10805 ssh2 ... |
2019-06-24 16:44:20 |
| 191.53.57.103 | attackbots | failed_logins |
2019-06-24 16:34:18 |
| 183.171.101.33 | attackbotsspam | SS5,WP GET /wp-login.php |
2019-06-24 16:20:53 |
| 14.190.121.20 | attackspambots | Automatic report - Web App Attack |
2019-06-24 16:27:41 |
| 51.77.2.7 | attackspambots | 10 attempts against mh-misc-ban on heat.magehost.pro |
2019-06-24 16:52:52 |
| 118.25.186.197 | attack | 21 attempts against mh-ssh on wave.magehost.pro |
2019-06-24 16:36:55 |
| 157.230.97.97 | attack | Jun 24 06:32:46 mxgate1 postfix/postscreen[17882]: CONNECT from [157.230.97.97]:60202 to [176.31.12.44]:25 Jun 24 06:32:46 mxgate1 postfix/dnsblog[18156]: addr 157.230.97.97 listed by domain cbl.abuseat.org as 127.0.0.2 Jun 24 06:32:46 mxgate1 postfix/dnsblog[18157]: addr 157.230.97.97 listed by domain zen.spamhaus.org as 127.0.0.4 Jun 24 06:32:46 mxgate1 postfix/dnsblog[18157]: addr 157.230.97.97 listed by domain zen.spamhaus.org as 127.0.0.3 Jun 24 06:32:46 mxgate1 postfix/dnsblog[18159]: addr 157.230.97.97 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Jun 24 06:32:46 mxgate1 postfix/dnsblog[18155]: addr 157.230.97.97 listed by domain bl.spamcop.net as 127.0.0.2 Jun 24 06:32:46 mxgate1 postfix/dnsblog[18158]: addr 157.230.97.97 listed by domain b.barracudacentral.org as 127.0.0.2 Jun 24 06:32:52 mxgate1 postfix/postscreen[17882]: DNSBL rank 6 for [157.230.97.97]:60202 Jun 24 06:32:52 mxgate1 postfix/postscreen[17882]: NOQUEUE: reject: RCPT from [157.230.97.97]:602........ ------------------------------- |
2019-06-24 16:28:16 |
| 84.235.87.241 | attackbotsspam | 19/6/24@00:51:00: FAIL: Alarm-Intrusion address from=84.235.87.241 ... |
2019-06-24 16:32:30 |
| 202.182.48.86 | attackspam | Unauthorized access detected from banned ip |
2019-06-24 16:33:52 |
| 1.179.137.10 | attackspambots | Triggered by Fail2Ban at Vostok web server |
2019-06-24 16:28:55 |
| 103.94.124.82 | attackbots | firewall-block, port(s): 23/tcp |
2019-06-24 16:57:52 |