City: Miranda
Region: Miranda
Country: Venezuela
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 190.202.192.182 | attackspambots | 445/tcp [2020-10-03]1pkt |
2020-10-05 08:00:51 |
| 190.202.192.182 | attack | 445/tcp [2020-10-03]1pkt |
2020-10-05 00:22:11 |
| 190.202.192.182 | attack | 445/tcp [2020-10-03]1pkt |
2020-10-04 16:05:17 |
| 190.202.198.25 | attackbotsspam | Unauthorized connection attempt from IP address 190.202.198.25 on Port 445(SMB) |
2020-04-02 23:56:41 |
| 190.202.197.136 | attackbotsspam | 1583273293 - 03/03/2020 23:08:13 Host: 190.202.197.136/190.202.197.136 Port: 445 TCP Blocked |
2020-03-04 08:25:38 |
| 190.202.19.26 | attack | SSH bruteforce |
2020-02-11 02:56:56 |
| 190.202.194.93 | attack | unauthorized connection attempt |
2020-01-08 16:18:42 |
| 190.202.19.26 | attackspambots | Unauthorized connection attempt from IP address 190.202.19.26 on Port 445(SMB) |
2019-11-25 23:57:02 |
| 190.202.19.26 | attackspambots | Unauthorized connection attempt from IP address 190.202.19.26 on Port 445(SMB) |
2019-11-15 23:27:30 |
| 190.202.196.150 | attackbotsspam | Unauthorized connection attempt from IP address 190.202.196.150 on Port 445(SMB) |
2019-08-18 04:43:24 |
| 190.202.19.26 | attackbotsspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 02:14:07,610 INFO [shellcode_manager] (190.202.19.26) no match, writing hexdump (b65b48f1c56327718e29bc636e883e6d :2051695) - MS17010 (EternalBlue) |
2019-06-27 11:18:28 |
% IP Client: 124.223.158.242
% Joint Whois - whois.lacnic.net
% This server accepts single ASN, IPv4 or IPv6 queries
% LACNIC resource: whois.lacnic.net
% Copyright LACNIC lacnic.net
% The data below is provided for information purposes
% and to assist persons in obtaining information about or
% related to AS and IP numbers registrations
% By submitting a whois query, you agree to use this data
% only for lawful purposes.
% 2026-05-15 11:51:29 (-03 -03:00)
inetnum: 190.200.0.0/13
status: allocated
aut-num: AS8048
owner: CANTV Servicios, Venezuela
ownerid: VE-CSVE-LACNIC
responsible: CANTV GSR
address: Segunda Avenida de los Palos Grandes, 000, Entre Av. Fr
address: 1060 - Caracas - MI
country: VE
phone: +58 2095685 [0000]
owner-c: LUM
tech-c: LUM
abuse-c: LUM
inetrev: 190.202.0.0/16
nserver: NS1.CANTV.NET
nsstat: 20260514 AA
nslastaa: 20260514
nserver: NS2.CANTV.NET
nsstat: 20260514 AA
nslastaa: 20260514
nserver: DNS1.CANTV.NET
nsstat: 20260514 AA
nslastaa: 20260514
nserver: DNS2.CANTV.NET
nsstat: 20260514 AA
nslastaa: 20260514
inetrev: 190.200.0.0/15
nserver: NS1.CANTV.NET
nsstat: 20260511 AA
nslastaa: 20260511
nserver: NS2.CANTV.NET
nsstat: 20260511 AA
nslastaa: 20260511
nserver: DNS1.CANTV.NET
nsstat: 20260511 AA
nslastaa: 20260511
nserver: DNS2.CANTV.NET
nsstat: 20260511 AA
nslastaa: 20260511
inetrev: 190.203.0.0/16
nserver: NS1.CANTV.NET
nsstat: 20260515 AA
nslastaa: 20260515
nserver: NS2.CANTV.NET
nsstat: 20260515 AA
nslastaa: 20260515
nserver: DNS1.CANTV.NET
nsstat: 20260515 AA
nslastaa: 20260515
nserver: DNS2.CANTV.NET
nsstat: 20260515 AA
nslastaa: 20260515
inetrev: 190.204.0.0/14
nserver: NS1.CANTV.NET
nsstat: 20260514 AA
nslastaa: 20260514
nserver: NS2.CANTV.NET
nsstat: 20260514 AA
nslastaa: 20260514
nserver: DNS1.CANTV.NET
nsstat: 20260514 AA
nslastaa: 20260514
nserver: DNS2.CANTV.NET
nsstat: 20260514 AA
nslastaa: 20260514
created: 20070613
changed: 20070613
nic-hdl: LUM
person: Ger Sop
e-mail: ipadmin@cantv.com.ve
address: CANTV COR Los Palos Grandes Chacao Caracas Venezuela, 000, -
address: 1060 - Caracas - MI
country: VE
phone: +58 02125000000 [0000]
created: 20020911
changed: 20240809
% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.202.19.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64601
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;190.202.19.89. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051500 1800 900 604800 86400
;; Query time: 143 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 15 22:51:30 CST 2026
;; MSG SIZE rcvd: 106
89.19.202.190.in-addr.arpa domain name pointer 190-202-19-89.chc-00.rai.cantv.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
89.19.202.190.in-addr.arpa name = 190-202-19-89.chc-00.rai.cantv.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 149.129.227.48 | attackspambots | " " |
2019-07-10 21:20:16 |
| 185.33.203.190 | attack | 445/tcp 445/tcp 445/tcp... [2019-06-18/07-10]6pkt,1pt.(tcp) |
2019-07-10 21:13:00 |
| 177.130.161.0 | attackbots | failed_logins |
2019-07-10 21:25:06 |
| 197.57.47.160 | attackspambots | Unauthorised SSH connection attempt. |
2019-07-10 21:22:42 |
| 104.248.42.231 | attackspambots | 5500/tcp 5500/tcp [2019-07-08/10]2pkt |
2019-07-10 21:10:55 |
| 139.59.44.60 | attackbots | 22/tcp 22/tcp 22/tcp... [2019-06-25/07-10]19pkt,1pt.(tcp) |
2019-07-10 21:19:22 |
| 43.245.140.190 | attack | Autoban 43.245.140.190 AUTH/CONNECT |
2019-07-10 21:46:43 |
| 117.247.188.41 | attack | 445/tcp 445/tcp 445/tcp [2019-06-18/07-10]3pkt |
2019-07-10 21:05:46 |
| 5.89.10.81 | attackbots | Jul 8 02:14:08 typhoon sshd[8921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-5-89-10-81.cust.vodafonedsl.hostname Jul 8 02:14:10 typhoon sshd[8921]: Failed password for invalid user monika from 5.89.10.81 port 48222 ssh2 Jul 8 02:14:10 typhoon sshd[8921]: Received disconnect from 5.89.10.81: 11: Bye Bye [preauth] Jul 8 02:16:45 typhoon sshd[8930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-5-89-10-81.cust.vodafonedsl.hostname Jul 8 02:16:48 typhoon sshd[8930]: Failed password for invalid user ftpuser from 5.89.10.81 port 39316 ssh2 Jul 8 02:16:48 typhoon sshd[8930]: Received disconnect from 5.89.10.81: 11: Bye Bye [preauth] Jul 8 02:19:05 typhoon sshd[8977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-5-89-10-81.cust.vodafonedsl.hostname Jul 8 02:19:07 typhoon sshd[8977]: Failed password for invalid user ajmal from 5......... ------------------------------- |
2019-07-10 21:56:36 |
| 212.140.166.211 | attackbots | Jul 8 01:06:34 cloud sshd[10119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.140.166.211 user=r.r Jul 8 01:06:36 cloud sshd[10119]: Failed password for r.r from 212.140.166.211 port 54168 ssh2 Jul 8 01:06:36 cloud sshd[10119]: Received disconnect from 212.140.166.211 port 54168:11: Bye Bye [preauth] Jul 8 01:06:36 cloud sshd[10119]: Disconnected from 212.140.166.211 port 54168 [preauth] Jul 8 01:09:20 cloud sshd[10200]: Invalid user admin from 212.140.166.211 port 41939 Jul 8 01:09:22 cloud sshd[10200]: Failed password for invalid user admin from 212.140.166.211 port 41939 ssh2 Jul 8 01:09:22 cloud sshd[10200]: Received disconnect from 212.140.166.211 port 41939:11: Bye Bye [preauth] Jul 8 01:09:22 cloud sshd[10200]: Disconnected from 212.140.166.211 port 41939 [preauth] Jul 8 01:10:48 cloud sshd[10281]: Invalid user sebastian from 212.140.166.211 port 50705 Jul 8 01:10:50 cloud sshd[10281]: Failed password for........ ------------------------------- |
2019-07-10 21:46:05 |
| 125.212.201.29 | attackspambots | 445/tcp 445/tcp 445/tcp... [2019-05-10/07-10]10pkt,1pt.(tcp) |
2019-07-10 21:24:29 |
| 42.228.146.85 | attack | 23/tcp 23/tcp 23/tcp [2019-07-02/10]3pkt |
2019-07-10 21:53:02 |
| 37.252.10.48 | attackspam | 445/tcp 445/tcp 445/tcp... [2019-06-22/07-10]9pkt,1pt.(tcp) |
2019-07-10 21:27:25 |
| 121.200.48.162 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2019-07-10 21:20:45 |
| 92.118.160.29 | attackspambots | 2019-07-10 19:08:39 notice Firewall Match default rule, DROP 92.118.160.29:57167 192.168.3.108:2483 ACCESS BLOCK |
2019-07-10 21:18:50 |