City: Las Condes
Region: Region Metropolitana (RM)
Country: Chile
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% IP Client: 124.223.158.242
% Joint Whois - whois.lacnic.net
% This server accepts single ASN, IPv4 or IPv6 queries
% LACNIC resource: whois.lacnic.net
% Copyright LACNIC lacnic.net
% The data below is provided for information purposes
% and to assist persons in obtaining information about or
% related to AS and IP numbers registrations
% By submitting a whois query, you agree to use this data
% only for lawful purposes.
% 2026-04-07 09:39:46 (-03 -03:00)
inetnum: 190.215.0.0/17
status: allocated
aut-num: N/A
owner: Gtd Internet S.A.
ownerid: CL-GISA-LACNIC
responsible: Manuel Suanez Berrios
address: Moneda, 920, Piso 11
address: 6500712 - Santiago - RM
country: CL
phone: +56 02 3809193
owner-c: MAS309
tech-c: MAS309
abuse-c: MAS309
inetrev: 190.215.0.0/19
nserver: NS.GTDINTERNET.COM
nsstat: 20260403 AA
nslastaa: 20260403
nserver: NS2.GTDINTERNET.COM
nsstat: 20260403 AA
nslastaa: 20260403
nserver: NS3.GTDINTERNET.COM
nsstat: 20260403 AA
nslastaa: 20260403
nserver: NS4.GTDINTERNET.COM
nsstat: 20260403 AA
nslastaa: 20260403
inetrev: 190.215.32.0/20
nserver: NS.GTDINTERNET.COM
nsstat: 20260406 AA
nslastaa: 20260406
nserver: NS2.GTDINTERNET.COM
nsstat: 20260406 AA
nslastaa: 20260406
nserver: NS3.GTDINTERNET.COM
nsstat: 20260406 AA
nslastaa: 20260406
nserver: NS4.GTDINTERNET.COM
nsstat: 20260406 AA
nslastaa: 20260406
inetrev: 190.215.60.0/22
nserver: NS.GTDINTERNET.COM
nsstat: 20260405 AA
nslastaa: 20260405
nserver: NS2.GTDINTERNET.COM
nsstat: 20260405 AA
nslastaa: 20260405
nserver: NS3.GTDINTERNET.COM
nsstat: 20260405 AA
nslastaa: 20260405
nserver: NS4.GTDINTERNET.COM
nsstat: 20260405 AA
nslastaa: 20260405
inetrev: 190.215.58.0/23
nserver: NS.GTDINTERNET.COM
nsstat: 20260407 AA
nslastaa: 20260407
nserver: NS2.GTDINTERNET.COM
nsstat: 20260407 AA
nslastaa: 20260407
nserver: NS3.GTDINTERNET.COM
nsstat: 20260407 AA
nslastaa: 20260407
nserver: NS4.GTDINTERNET.COM
nsstat: 20260407 AA
nslastaa: 20260407
inetrev: 190.215.57.0/24
nserver: NS.GTDINTERNET.COM
nsstat: 20260403 AA
nslastaa: 20260403
nserver: NS2.GTDINTERNET.COM
nsstat: 20260403 AA
nslastaa: 20260403
nserver: NS3.GTDINTERNET.COM
nsstat: 20260403 AA
nslastaa: 20260403
nserver: NS4.GTDINTERNET.COM
nsstat: 20260403 AA
nslastaa: 20260403
inetrev: 190.215.52.0/22
nserver: NS.GTDINTERNET.COM
nsstat: 20260404 AA
nslastaa: 20260404
nserver: NS2.GTDINTERNET.COM
nsstat: 20260404 AA
nslastaa: 20260404
nserver: NS3.GTDINTERNET.COM
nsstat: 20260404 AA
nslastaa: 20260404
nserver: NS4.GTDINTERNET.COM
nsstat: 20260404 AA
nslastaa: 20260404
inetrev: 190.215.48.0/23
nserver: NS.GTDINTERNET.COM
nsstat: 20260407 AA
nslastaa: 20260407
nserver: NS2.GTDINTERNET.COM
nsstat: 20260407 AA
nslastaa: 20260407
nserver: NS3.GTDINTERNET.COM
nsstat: 20260407 AA
nslastaa: 20260407
nserver: NS4.GTDINTERNET.COM
nsstat: 20260407 AA
nslastaa: 20260407
inetrev: 190.215.50.0/24
nserver: NS.GTDINTERNET.COM
nsstat: 20260403 AA
nslastaa: 20260403
nserver: NS2.GTDINTERNET.COM
nsstat: 20260403 AA
nslastaa: 20260403
nserver: NS3.GTDINTERNET.COM
nsstat: 20260403 AA
nslastaa: 20260403
nserver: NS4.GTDINTERNET.COM
nsstat: 20260403 AA
nslastaa: 20260403
inetrev: 190.215.64.0/19
nserver: NS.GTDINTERNET.COM
nsstat: 20260406 AA
nslastaa: 20260406
nserver: NS2.GTDINTERNET.COM
nsstat: 20260406 AA
nslastaa: 20260406
nserver: NS3.GTDINTERNET.COM
nsstat: 20260406 AA
nslastaa: 20260406
nserver: NS4.GTDINTERNET.COM
nsstat: 20260406 AA
nslastaa: 20260406
inetrev: 190.215.112.0/20
nserver: NS.GTDINTERNET.COM
nsstat: 20260402 AA
nslastaa: 20260402
nserver: NS2.GTDINTERNET.COM
nsstat: 20260402 AA
nslastaa: 20260402
nserver: NS3.GTDINTERNET.COM
nsstat: 20260402 AA
nslastaa: 20260402
nserver: NS4.GTDINTERNET.COM
nsstat: 20260402 AA
nslastaa: 20260402
inetrev: 190.215.104.0/21
nserver: NS.GTDINTERNET.COM
nsstat: 20260407 AA
nslastaa: 20260407
nserver: NS2.GTDINTERNET.COM
nsstat: 20260407 AA
nslastaa: 20260407
nserver: NS3.GTDINTERNET.COM
nsstat: 20260407 AA
nslastaa: 20260407
nserver: NS4.GTDINTERNET.COM
nsstat: 20260407 AA
nslastaa: 20260407
inetrev: 190.215.96.0/21
nserver: NS.GTDINTERNET.COM
nsstat: 20260407 AA
nslastaa: 20260407
nserver: NS2.GTDINTERNET.COM
nsstat: 20260407 AA
nslastaa: 20260407
nserver: NS3.GTDINTERNET.COM
nsstat: 20260407 AA
nslastaa: 20260407
nserver: NS4.GTDINTERNET.COM
nsstat: 20260407 AA
nslastaa: 20260407
created: 20100818
changed: 20140707
nic-hdl: MAS309
person: Manuel Suanez Berrios
e-mail: netadmin@grupogtd.com
address: Moneda, 920, -
address: NONE - Santiago - SA
country: CL
phone: +56 224139000 [0000]
created: 20140204
changed: 20220228
% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.215.95.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14262
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;190.215.95.120. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040700 1800 900 604800 86400
;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 07 20:39:47 CST 2026
;; MSG SIZE rcvd: 107
Host 120.95.215.190.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 120.95.215.190.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 27.8.228.133 | attackbots | Found on CINS badguys / proto=6 . srcport=42475 . dstport=23 . (3088) |
2020-09-23 21:13:18 |
| 45.168.57.102 | attackspam | Sep 22 17:04:59 email sshd\[3327\]: Invalid user admin from 45.168.57.102 Sep 22 17:05:00 email sshd\[3327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.168.57.102 Sep 22 17:05:01 email sshd\[3327\]: Failed password for invalid user admin from 45.168.57.102 port 39881 ssh2 Sep 22 17:05:05 email sshd\[3351\]: Invalid user admin from 45.168.57.102 Sep 22 17:05:06 email sshd\[3351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.168.57.102 ... |
2020-09-23 20:48:25 |
| 139.198.191.86 | attack | $f2bV_matches |
2020-09-23 21:09:42 |
| 49.234.126.244 | attack | Sep 23 00:27:43 r.ca sshd[20595]: Failed password for invalid user applmgr from 49.234.126.244 port 41424 ssh2 |
2020-09-23 21:06:26 |
| 62.234.127.234 | attackspambots | Sep 23 07:15:36 ns382633 sshd\[16280\]: Invalid user user1 from 62.234.127.234 port 49946 Sep 23 07:15:36 ns382633 sshd\[16280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.127.234 Sep 23 07:15:38 ns382633 sshd\[16280\]: Failed password for invalid user user1 from 62.234.127.234 port 49946 ssh2 Sep 23 07:24:32 ns382633 sshd\[17466\]: Invalid user julien from 62.234.127.234 port 45596 Sep 23 07:24:32 ns382633 sshd\[17466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.127.234 |
2020-09-23 21:11:08 |
| 198.251.89.136 | attackbots | [MK-VM4] SSH login failed |
2020-09-23 21:16:54 |
| 142.93.18.203 | attackbots | 142.93.18.203 - - [23/Sep/2020:05:20:14 +0200] "POST /xmlrpc.php HTTP/1.1" 403 16732 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.18.203 - - [23/Sep/2020:05:48:05 +0200] "POST /xmlrpc.php HTTP/1.1" 403 613 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-09-23 20:49:08 |
| 49.231.238.162 | attack | Automatic Fail2ban report - Trying login SSH |
2020-09-23 21:19:03 |
| 222.186.15.115 | attack | Sep 23 15:16:03 vm1 sshd[32271]: Failed password for root from 222.186.15.115 port 16985 ssh2 ... |
2020-09-23 21:20:02 |
| 222.186.173.226 | attack | Sep 23 14:38:56 vpn01 sshd[29105]: Failed password for root from 222.186.173.226 port 26735 ssh2 Sep 23 14:38:59 vpn01 sshd[29105]: Failed password for root from 222.186.173.226 port 26735 ssh2 ... |
2020-09-23 20:42:40 |
| 148.243.119.242 | attackspam | Sep 23 11:25:30 *** sshd[12587]: Invalid user git from 148.243.119.242 |
2020-09-23 20:50:28 |
| 79.120.118.82 | attackspam | 2020-09-23T16:50:54.984749paragon sshd[330628]: Failed password for invalid user user from 79.120.118.82 port 37826 ssh2 2020-09-23T16:54:52.316642paragon sshd[330696]: Invalid user mexico from 79.120.118.82 port 41882 2020-09-23T16:54:52.320868paragon sshd[330696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.120.118.82 2020-09-23T16:54:52.316642paragon sshd[330696]: Invalid user mexico from 79.120.118.82 port 41882 2020-09-23T16:54:54.418802paragon sshd[330696]: Failed password for invalid user mexico from 79.120.118.82 port 41882 ssh2 ... |
2020-09-23 21:05:17 |
| 128.201.100.84 | attackbots | $f2bV_matches |
2020-09-23 20:57:49 |
| 163.172.121.98 | attackspam | Sep 23 08:31:01 ny01 sshd[26751]: Failed password for root from 163.172.121.98 port 48808 ssh2 Sep 23 08:34:46 ny01 sshd[27204]: Failed password for root from 163.172.121.98 port 57174 ssh2 |
2020-09-23 20:52:23 |
| 178.128.217.135 | attack | Sep 22 19:34:22 serwer sshd\[2758\]: Invalid user jamil from 178.128.217.135 port 33734 Sep 22 19:34:22 serwer sshd\[2758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.135 Sep 22 19:34:25 serwer sshd\[2758\]: Failed password for invalid user jamil from 178.128.217.135 port 33734 ssh2 Sep 22 19:38:17 serwer sshd\[3282\]: Invalid user william from 178.128.217.135 port 42102 Sep 22 19:38:17 serwer sshd\[3282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.135 Sep 22 19:38:19 serwer sshd\[3282\]: Failed password for invalid user william from 178.128.217.135 port 42102 ssh2 Sep 22 19:42:01 serwer sshd\[3796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.135 user=admin Sep 22 19:42:03 serwer sshd\[3796\]: Failed password for admin from 178.128.217.135 port 50404 ssh2 Sep 22 19:45:38 serwer sshd\[4243\]: pam_unix\(ssh ... |
2020-09-23 20:54:21 |