Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Buenos Aires Province

Country: Argentina

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-03-20 23:36:25 (-03 -03:00)

inetnum:     190.30.99.0/24
status:      reallocated
aut-num:     AS7303
owner:       Apolo -Gold-Telecom-Per
ownerid:     AR-APGO-LACNIC
responsible: Aseguramiento de Datos
address:     Dorrego, 2520, piso 3°
address:     1425 - Capital Federal - 
country:     AR
phone:       +54 11 4968-7975
owner-c:     ADI2
tech-c:      ADI2
abuse-c:     ADI2
created:     20061124
changed:     20241226
inetnum-up:  190.30.0.0/16

nic-hdl:     ADI2
person:      Administrador IP
e-mail:      abuse@teco.com.ar
address:     Dorrego, 2502, piso 11
address:     1425 - Buenos Aires - 
country:     AR
phone:       +54 11 4968 [4975]
created:     20020909
changed:     20211227

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.30.99.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44676
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.30.99.229.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032002 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 21 10:36:25 CST 2026
;; MSG SIZE  rcvd: 106
Host info
b'229.99.30.190.in-addr.arpa domain name pointer host229.190-30-99.telecom.net.ar.
'
Nslookup info:
b'229.99.30.190.in-addr.arpa	name = host229.190-30-99.telecom.net.ar.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
139.199.165.189 attack
5x Failed Password
2020-09-21 21:34:31
111.231.119.93 attack
 TCP (SYN) 111.231.119.93:42644 -> port 30728, len 44
2020-09-21 21:22:48
103.82.80.104 attackbotsspam
2020-09-20 11:58:37.535178-0500  localhost smtpd[52512]: NOQUEUE: reject: RCPT from unknown[103.82.80.104]: 554 5.7.1 Service unavailable; Client host [103.82.80.104] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/103.82.80.104 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=<[103.82.80.104]>
2020-09-21 21:14:46
190.145.254.138 attackspambots
Sep 21 09:32:15 scw-6657dc sshd[6223]: Failed password for root from 190.145.254.138 port 49930 ssh2
Sep 21 09:32:15 scw-6657dc sshd[6223]: Failed password for root from 190.145.254.138 port 49930 ssh2
Sep 21 09:34:29 scw-6657dc sshd[6327]: Invalid user user from 190.145.254.138 port 40827
...
2020-09-21 21:33:32
27.6.185.17 attack
Port Scan detected!
...
2020-09-21 21:35:36
123.206.174.21 attackspambots
Invalid user serverpilot from 123.206.174.21 port 53408
2020-09-21 21:32:13
117.247.95.246 attack
Unauthorised access (Sep 20) SRC=117.247.95.246 LEN=48 TTL=110 ID=23735 DF TCP DPT=445 WINDOW=8192 SYN
2020-09-21 21:27:30
223.19.119.152 attack
DATE:2020-09-21 11:10:39, IP:223.19.119.152, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-21 21:33:03
203.217.105.57 attackspambots
...
2020-09-21 21:17:23
120.59.125.26 attackspam
port scan and connect, tcp 23 (telnet)
2020-09-21 21:29:10
181.143.228.170 attack
SSH BruteForce Attack
2020-09-21 21:31:41
58.233.240.94 attackbotsspam
invalid user
2020-09-21 21:38:26
162.243.128.94 attackspambots
firewall-block, port(s): 83/tcp
2020-09-21 21:08:15
91.134.231.81 attackbots
2020-09-20 14:29:47.280093-0500  localhost smtpd[65370]: NOQUEUE: reject: RCPT from unknown[91.134.231.81]: 450 4.7.25 Client host rejected: cannot find your hostname, [91.134.231.81]; from= to= proto=ESMTP helo=
2020-09-21 21:15:03
79.124.62.74 attackbots
Port scan on 10 port(s): 121 2200 2372 2500 3009 3307 3763 14891 33240 53390
2020-09-21 21:23:12

Recently Reported IPs

42.193.36.38 19.53.104.159 2606:4700:10::6814:6574 2606:4700:10::6814:6389
2606:4700:10::6816:4103 2606:4700:10::6814:6034 2606:4700:10::6814:4861 2606:4700:10::ac43:1131
2606:4700:10::6816:1618 2606:4700:10::6816:128 2606:4700:10::6816:844 2606:4700:10::6814:7536
2606:4700:10::6816:129 110.78.138.233 172.16.125.150 13.212.174.23
110.77.187.18 2606:4700:10::6814:4992 2606:4700:10::6816:95 2606:4700:10::6814:8588