Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Colombia

Internet Service Provider: Claro

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b'% IP Client: 8.214.16.196
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-04-17 07:22:28 (-03 -03:00)

inetnum:     191.64.0.0/12
status:      allocated
aut-num:     N/A
owner:       COMUNICACIxc3x83xc2x93N CELULAR S.A. COMCEL S.A.
ownerid:     CO-COSA8-LACNIC
responsible: COMCEL S.A.
address:     Carrera 68 A Numero 24 B-10, T1P10, -
address:     110931 - Bogota - Not Available
country:     CO
phone:       +57  6017429797 [0000]
owner-c:     IEP
tech-c:      IEP
abuse-c:     ATI
created:     20131127
changed:     20211025

nic-hdl:     IEP
person:      Ciro Mauricio Mantilla
e-mail:      ciro.mantilla@claro.com.co
address:     Cra 68A 24B-10, 10, Plaza Claro
address:     110931 - Bogota - Not Available
country:     CO
phone:       +57  6017429797 [0]
created:     20120903
changed:     20260325

nic-hdl:     ATI
person:      Network Security Team
e-mail:      ciro.mantilla@claro.com.co
address:     Carrera 68a #24b-10, 00, Plaza Claro
address:     111321 - Bogota - DC
country:     CO
phone:       +57  6017500300 [81966]
created:     20020909
changed:     20250218

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.'
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 191.79.218.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62035
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;191.79.218.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041701 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 17 18:05:26 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 214.218.79.191.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.218.79.191.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
60.249.188.118 attack
SSH Brute Force, server-1 sshd[17526]: Failed password for root from 60.249.188.118 port 37612 ssh2
2019-11-16 05:51:28
196.52.43.58 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-16 05:47:37
221.132.17.75 attackbotsspam
Nov 15 16:41:27 ovpn sshd\[6823\]: Invalid user aaaaa from 221.132.17.75
Nov 15 16:41:27 ovpn sshd\[6823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.17.75
Nov 15 16:41:29 ovpn sshd\[6823\]: Failed password for invalid user aaaaa from 221.132.17.75 port 33012 ssh2
Nov 15 17:00:06 ovpn sshd\[10774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.17.75  user=games
Nov 15 17:00:08 ovpn sshd\[10774\]: Failed password for games from 221.132.17.75 port 55182 ssh2
2019-11-16 06:09:05
106.53.66.103 attackspambots
no
2019-11-16 06:01:26
193.31.24.113 attackbotsspam
11/15/2019-22:58:46.701267 193.31.24.113 Protocol: 6 ET GAMES MINECRAFT Server response outbound
2019-11-16 06:00:50
185.234.216.173 attack
Connection by 185.234.216.173 on port: 25 got caught by honeypot at 11/15/2019 8:27:49 PM
2019-11-16 05:37:29
52.34.24.33 attackspam
Bad bot/spoofed identity
2019-11-16 05:48:41
109.197.192.18 attackspam
Nov 15 15:36:15 ArkNodeAT sshd\[18961\]: Invalid user tom from 109.197.192.18
Nov 15 15:36:15 ArkNodeAT sshd\[18961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.197.192.18
Nov 15 15:36:17 ArkNodeAT sshd\[18961\]: Failed password for invalid user tom from 109.197.192.18 port 55570 ssh2
2019-11-16 05:45:51
128.199.55.13 attackspam
$f2bV_matches
2019-11-16 05:38:57
92.118.161.57 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-16 05:43:51
148.66.146.22 attack
Automatic report - XMLRPC Attack
2019-11-16 06:11:10
61.133.232.254 attackspam
Nov 15 10:00:31 tdfoods sshd\[20770\]: Invalid user admin from 61.133.232.254
Nov 15 10:00:31 tdfoods sshd\[20770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.254
Nov 15 10:00:33 tdfoods sshd\[20770\]: Failed password for invalid user admin from 61.133.232.254 port 54333 ssh2
Nov 15 10:08:49 tdfoods sshd\[21421\]: Invalid user louise from 61.133.232.254
Nov 15 10:08:49 tdfoods sshd\[21421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.254
2019-11-16 05:52:32
192.166.47.75 attack
Automatic report - XMLRPC Attack
2019-11-16 05:41:18
92.118.161.61 attackspambots
2019-11-15T18:21:09.736Z CLOSE host=92.118.161.61 port=63898 fd=4 time=40.038 bytes=45
...
2019-11-16 05:41:51
36.90.21.190 attackspam
11/15/2019-15:36:27.530156 36.90.21.190 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-16 05:38:40

Recently Reported IPs

162.216.150.206 2606:4700:10::ac43:1445 2606:4700:10::6816:4031 2606:4700:10::ac43:1249
2606:4700:10::6814:5276 2606:4700:10::ac43:856 2606:4700:10::6814:8088 164.155.74.84
139.177.194.152 108.157.0.0 34.78.67.0 103.153.183.126
94.231.206.105 100.115.230.38 213.222.235.132 2606:4700:10::ac43:2340
2606:4700:10::6814:6847 2606:4700:10::ac43:2363 2606:4700:10::6814:5015 2606:4700:10::ac43:938