Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Las Condes

Region: Region Metropolitana (RM)

Country: Chile

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-04-07 09:39:46 (-03 -03:00)

inetnum:     190.215.0.0/17
status:      allocated
aut-num:     N/A
owner:       Gtd Internet S.A.
ownerid:     CL-GISA-LACNIC
responsible: Manuel Suanez Berrios
address:     Moneda, 920, Piso 11
address:     6500712 - Santiago - RM
country:     CL
phone:       +56 02 3809193
owner-c:     MAS309
tech-c:      MAS309
abuse-c:     MAS309
inetrev:     190.215.0.0/19
nserver:     NS.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
inetrev:     190.215.32.0/20
nserver:     NS.GTDINTERNET.COM
nsstat:      20260406 AA
nslastaa:    20260406
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260406 AA
nslastaa:    20260406
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260406 AA
nslastaa:    20260406
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260406 AA
nslastaa:    20260406
inetrev:     190.215.60.0/22
nserver:     NS.GTDINTERNET.COM
nsstat:      20260405 AA
nslastaa:    20260405
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260405 AA
nslastaa:    20260405
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260405 AA
nslastaa:    20260405
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260405 AA
nslastaa:    20260405
inetrev:     190.215.58.0/23
nserver:     NS.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
inetrev:     190.215.57.0/24
nserver:     NS.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
inetrev:     190.215.52.0/22
nserver:     NS.GTDINTERNET.COM
nsstat:      20260404 AA
nslastaa:    20260404
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260404 AA
nslastaa:    20260404
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260404 AA
nslastaa:    20260404
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260404 AA
nslastaa:    20260404
inetrev:     190.215.48.0/23
nserver:     NS.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
inetrev:     190.215.50.0/24
nserver:     NS.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260403 AA
nslastaa:    20260403
inetrev:     190.215.64.0/19
nserver:     NS.GTDINTERNET.COM
nsstat:      20260406 AA
nslastaa:    20260406
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260406 AA
nslastaa:    20260406
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260406 AA
nslastaa:    20260406
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260406 AA
nslastaa:    20260406
inetrev:     190.215.112.0/20
nserver:     NS.GTDINTERNET.COM
nsstat:      20260402 AA
nslastaa:    20260402
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260402 AA
nslastaa:    20260402
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260402 AA
nslastaa:    20260402
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260402 AA
nslastaa:    20260402
inetrev:     190.215.104.0/21
nserver:     NS.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
inetrev:     190.215.96.0/21
nserver:     NS.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS2.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS3.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
nserver:     NS4.GTDINTERNET.COM
nsstat:      20260407 AA
nslastaa:    20260407
created:     20100818
changed:     20140707

nic-hdl:     MAS309
person:      Manuel Suanez Berrios
e-mail:      netadmin@grupogtd.com
address:     Moneda, 920, -
address:     NONE - Santiago - SA
country:     CL
phone:       +56  224139000 [0000]
created:     20140204
changed:     20220228

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.215.95.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14262
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.215.95.120.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040700 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 07 20:39:47 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 120.95.215.190.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 120.95.215.190.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
27.8.228.133 attackbots
Found on   CINS badguys     / proto=6  .  srcport=42475  .  dstport=23  .     (3088)
2020-09-23 21:13:18
45.168.57.102 attackspam
Sep 22 17:04:59 email sshd\[3327\]: Invalid user admin from 45.168.57.102
Sep 22 17:05:00 email sshd\[3327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.168.57.102
Sep 22 17:05:01 email sshd\[3327\]: Failed password for invalid user admin from 45.168.57.102 port 39881 ssh2
Sep 22 17:05:05 email sshd\[3351\]: Invalid user admin from 45.168.57.102
Sep 22 17:05:06 email sshd\[3351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.168.57.102
...
2020-09-23 20:48:25
139.198.191.86 attack
$f2bV_matches
2020-09-23 21:09:42
49.234.126.244 attack
Sep 23 00:27:43 r.ca sshd[20595]: Failed password for invalid user applmgr from 49.234.126.244 port 41424 ssh2
2020-09-23 21:06:26
62.234.127.234 attackspambots
Sep 23 07:15:36 ns382633 sshd\[16280\]: Invalid user user1 from 62.234.127.234 port 49946
Sep 23 07:15:36 ns382633 sshd\[16280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.127.234
Sep 23 07:15:38 ns382633 sshd\[16280\]: Failed password for invalid user user1 from 62.234.127.234 port 49946 ssh2
Sep 23 07:24:32 ns382633 sshd\[17466\]: Invalid user julien from 62.234.127.234 port 45596
Sep 23 07:24:32 ns382633 sshd\[17466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.127.234
2020-09-23 21:11:08
198.251.89.136 attackbots
[MK-VM4] SSH login failed
2020-09-23 21:16:54
142.93.18.203 attackbots
142.93.18.203 - - [23/Sep/2020:05:20:14 +0200] "POST /xmlrpc.php HTTP/1.1" 403 16732 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.18.203 - - [23/Sep/2020:05:48:05 +0200] "POST /xmlrpc.php HTTP/1.1" 403 613 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-23 20:49:08
49.231.238.162 attack
Automatic Fail2ban report - Trying login SSH
2020-09-23 21:19:03
222.186.15.115 attack
Sep 23 15:16:03 vm1 sshd[32271]: Failed password for root from 222.186.15.115 port 16985 ssh2
...
2020-09-23 21:20:02
222.186.173.226 attack
Sep 23 14:38:56 vpn01 sshd[29105]: Failed password for root from 222.186.173.226 port 26735 ssh2
Sep 23 14:38:59 vpn01 sshd[29105]: Failed password for root from 222.186.173.226 port 26735 ssh2
...
2020-09-23 20:42:40
148.243.119.242 attackspam
Sep 23 11:25:30 *** sshd[12587]: Invalid user git from 148.243.119.242
2020-09-23 20:50:28
79.120.118.82 attackspam
2020-09-23T16:50:54.984749paragon sshd[330628]: Failed password for invalid user user from 79.120.118.82 port 37826 ssh2
2020-09-23T16:54:52.316642paragon sshd[330696]: Invalid user mexico from 79.120.118.82 port 41882
2020-09-23T16:54:52.320868paragon sshd[330696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.120.118.82
2020-09-23T16:54:52.316642paragon sshd[330696]: Invalid user mexico from 79.120.118.82 port 41882
2020-09-23T16:54:54.418802paragon sshd[330696]: Failed password for invalid user mexico from 79.120.118.82 port 41882 ssh2
...
2020-09-23 21:05:17
128.201.100.84 attackbots
$f2bV_matches
2020-09-23 20:57:49
163.172.121.98 attackspam
Sep 23 08:31:01 ny01 sshd[26751]: Failed password for root from 163.172.121.98 port 48808 ssh2
Sep 23 08:34:46 ny01 sshd[27204]: Failed password for root from 163.172.121.98 port 57174 ssh2
2020-09-23 20:52:23
178.128.217.135 attack
Sep 22 19:34:22 serwer sshd\[2758\]: Invalid user jamil from 178.128.217.135 port 33734
Sep 22 19:34:22 serwer sshd\[2758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.135
Sep 22 19:34:25 serwer sshd\[2758\]: Failed password for invalid user jamil from 178.128.217.135 port 33734 ssh2
Sep 22 19:38:17 serwer sshd\[3282\]: Invalid user william from 178.128.217.135 port 42102
Sep 22 19:38:17 serwer sshd\[3282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.135
Sep 22 19:38:19 serwer sshd\[3282\]: Failed password for invalid user william from 178.128.217.135 port 42102 ssh2
Sep 22 19:42:01 serwer sshd\[3796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.135  user=admin
Sep 22 19:42:03 serwer sshd\[3796\]: Failed password for admin from 178.128.217.135 port 50404 ssh2
Sep 22 19:45:38 serwer sshd\[4243\]: pam_unix\(ssh
...
2020-09-23 20:54:21

Recently Reported IPs

209.38.39.234 159.203.176.26 206.189.139.116 78.107.216.39
2606:4700:10::6814:8520 2606:4700:10::6814:8617 2606:4700:10::ac43:2428 2606:4700:10::ac43:2393
2606:4700:10::6814:9824 122.192.203.69 2606:4700:10::6814:6889 2606:4700:10::ac43:1315
2606:4700:10::6814:6928 47.92.143.56 47.92.35.184 39.98.86.162
39.103.132.239 2606:4700:10::6816:2108 2606:4700:10::6814:7710 2606:4700:10::ac43:639