City: unknown
Region: unknown
Country: Colombia
Internet Service Provider: Claro
Hostname: unknown
Organization: unknown
Usage Type: unknown
b'% IP Client: 8.214.16.196
% Joint Whois - whois.lacnic.net
% This server accepts single ASN, IPv4 or IPv6 queries
% LACNIC resource: whois.lacnic.net
% Copyright LACNIC lacnic.net
% The data below is provided for information purposes
% and to assist persons in obtaining information about or
% related to AS and IP numbers registrations
% By submitting a whois query, you agree to use this data
% only for lawful purposes.
% 2026-04-17 07:22:28 (-03 -03:00)
inetnum: 191.64.0.0/12
status: allocated
aut-num: N/A
owner: COMUNICACIxc3x83xc2x93N CELULAR S.A. COMCEL S.A.
ownerid: CO-COSA8-LACNIC
responsible: COMCEL S.A.
address: Carrera 68 A Numero 24 B-10, T1P10, -
address: 110931 - Bogota - Not Available
country: CO
phone: +57 6017429797 [0000]
owner-c: IEP
tech-c: IEP
abuse-c: ATI
created: 20131127
changed: 20211025
nic-hdl: IEP
person: Ciro Mauricio Mantilla
e-mail: ciro.mantilla@claro.com.co
address: Cra 68A 24B-10, 10, Plaza Claro
address: 110931 - Bogota - Not Available
country: CO
phone: +57 6017429797 [0]
created: 20120903
changed: 20260325
nic-hdl: ATI
person: Network Security Team
e-mail: ciro.mantilla@claro.com.co
address: Carrera 68a #24b-10, 00, Plaza Claro
address: 111321 - Bogota - DC
country: CO
phone: +57 6017500300 [81966]
created: 20020909
changed: 20250218
% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.'
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 191.79.218.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62035
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;191.79.218.214. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041701 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 17 18:05:26 CST 2026
;; MSG SIZE rcvd: 107
Host 214.218.79.191.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 214.218.79.191.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 60.249.188.118 | attack | SSH Brute Force, server-1 sshd[17526]: Failed password for root from 60.249.188.118 port 37612 ssh2 |
2019-11-16 05:51:28 |
| 196.52.43.58 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-16 05:47:37 |
| 221.132.17.75 | attackbotsspam | Nov 15 16:41:27 ovpn sshd\[6823\]: Invalid user aaaaa from 221.132.17.75 Nov 15 16:41:27 ovpn sshd\[6823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.17.75 Nov 15 16:41:29 ovpn sshd\[6823\]: Failed password for invalid user aaaaa from 221.132.17.75 port 33012 ssh2 Nov 15 17:00:06 ovpn sshd\[10774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.17.75 user=games Nov 15 17:00:08 ovpn sshd\[10774\]: Failed password for games from 221.132.17.75 port 55182 ssh2 |
2019-11-16 06:09:05 |
| 106.53.66.103 | attackspambots | no |
2019-11-16 06:01:26 |
| 193.31.24.113 | attackbotsspam | 11/15/2019-22:58:46.701267 193.31.24.113 Protocol: 6 ET GAMES MINECRAFT Server response outbound |
2019-11-16 06:00:50 |
| 185.234.216.173 | attack | Connection by 185.234.216.173 on port: 25 got caught by honeypot at 11/15/2019 8:27:49 PM |
2019-11-16 05:37:29 |
| 52.34.24.33 | attackspam | Bad bot/spoofed identity |
2019-11-16 05:48:41 |
| 109.197.192.18 | attackspam | Nov 15 15:36:15 ArkNodeAT sshd\[18961\]: Invalid user tom from 109.197.192.18 Nov 15 15:36:15 ArkNodeAT sshd\[18961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.197.192.18 Nov 15 15:36:17 ArkNodeAT sshd\[18961\]: Failed password for invalid user tom from 109.197.192.18 port 55570 ssh2 |
2019-11-16 05:45:51 |
| 128.199.55.13 | attackspam | $f2bV_matches |
2019-11-16 05:38:57 |
| 92.118.161.57 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-16 05:43:51 |
| 148.66.146.22 | attack | Automatic report - XMLRPC Attack |
2019-11-16 06:11:10 |
| 61.133.232.254 | attackspam | Nov 15 10:00:31 tdfoods sshd\[20770\]: Invalid user admin from 61.133.232.254 Nov 15 10:00:31 tdfoods sshd\[20770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.254 Nov 15 10:00:33 tdfoods sshd\[20770\]: Failed password for invalid user admin from 61.133.232.254 port 54333 ssh2 Nov 15 10:08:49 tdfoods sshd\[21421\]: Invalid user louise from 61.133.232.254 Nov 15 10:08:49 tdfoods sshd\[21421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.254 |
2019-11-16 05:52:32 |
| 192.166.47.75 | attack | Automatic report - XMLRPC Attack |
2019-11-16 05:41:18 |
| 92.118.161.61 | attackspambots | 2019-11-15T18:21:09.736Z CLOSE host=92.118.161.61 port=63898 fd=4 time=40.038 bytes=45 ... |
2019-11-16 05:41:51 |
| 36.90.21.190 | attackspam | 11/15/2019-15:36:27.530156 36.90.21.190 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2019-11-16 05:38:40 |