City: Renca
Region: Region Metropolitana (RM)
Country: Chile
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% IP Client: 124.223.158.242
% Joint Whois - whois.lacnic.net
% This server accepts single ASN, IPv4 or IPv6 queries
% LACNIC resource: whois.lacnic.net
% Copyright LACNIC lacnic.net
% The data below is provided for information purposes
% and to assist persons in obtaining information about or
% related to AS and IP numbers registrations
% By submitting a whois query, you agree to use this data
% only for lawful purposes.
% 2026-02-03 09:46:38 (-03 -03:00)
inetnum: 200.27.0.0/16
status: allocated
aut-num: N/A
owner: Telmex Chile Internet S.A.
ownerid: CL-ACIS-LACNIC
responsible: Administrador Claro
address: Rinconada El Salto, 202, Huechuraba
address: 56 - Santiago - RM
country: CL
phone: +56 025825712 [0000]
owner-c: CIC
tech-c: CIC
abuse-c: CIC
inetrev: 200.27.0.0/16
nserver: NS.TELMEXCHILE.CL
nsstat: 20260201 AA
nslastaa: 20260201
nserver: NS2.TELMEXCHILE.CL
nsstat: 20260201 AA
nslastaa: 20260201
created: 20010419
changed: 20010420
nic-hdl: CIC
person: Core Internet Telmex Chile
e-mail: netadmin@ip.telmexchile.cl
address: El Condor, 844, 2
address: NONE - Santiago - M
country: CL
phone: +56 02 5825590
created: 20020927
changed: 20220119
% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.27.126.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64113
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;200.27.126.91. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026020300 1800 900 604800 86400
;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 03 20:46:38 CST 2026
;; MSG SIZE rcvd: 106
b'Host 91.126.27.200.in-addr.arpa. not found: 3(NXDOMAIN)
'
server can't find 200.27.126.91.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 90.255.105.218 | attackbots | Email rejected due to spam filtering |
2020-08-02 03:23:19 |
| 41.212.111.85 | attack | Email rejected due to spam filtering |
2020-08-02 03:38:21 |
| 218.29.219.20 | attackspambots | Aug 1 17:27:42 ns382633 sshd\[31482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.29.219.20 user=root Aug 1 17:27:44 ns382633 sshd\[31482\]: Failed password for root from 218.29.219.20 port 49054 ssh2 Aug 1 17:44:06 ns382633 sshd\[1803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.29.219.20 user=root Aug 1 17:44:08 ns382633 sshd\[1803\]: Failed password for root from 218.29.219.20 port 55194 ssh2 Aug 1 17:49:48 ns382633 sshd\[2983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.29.219.20 user=root |
2020-08-02 03:41:38 |
| 182.232.116.56 | attack | Email rejected due to spam filtering |
2020-08-02 03:58:19 |
| 14.161.44.69 | attackbotsspam | Unauthorized connection attempt from IP address 14.161.44.69 on Port 445(SMB) |
2020-08-02 03:45:00 |
| 14.45.254.20 | attackbots | Email rejected due to spam filtering |
2020-08-02 04:01:13 |
| 189.5.176.150 | attack | Email rejected due to spam filtering |
2020-08-02 03:55:36 |
| 41.13.220.11 | attack | Email rejected due to spam filtering |
2020-08-02 03:54:44 |
| 34.249.222.232 | attackspam | Telnet Honeypot -> Telnet Bruteforce / Login |
2020-08-02 03:26:34 |
| 103.81.87.124 | attackspambots | Port Scan ... |
2020-08-02 03:49:52 |
| 154.79.242.178 | attackbotsspam | Dovecot Invalid User Login Attempt. |
2020-08-02 03:45:17 |
| 91.126.196.23 | attackspambots | Email rejected due to spam filtering |
2020-08-02 03:23:33 |
| 124.123.190.1 | attack | 1596284175 - 08/01/2020 14:16:15 Host: 124.123.190.1/124.123.190.1 Port: 445 TCP Blocked |
2020-08-02 03:39:57 |
| 202.44.40.193 | attackbotsspam | SSH Brute Force |
2020-08-02 03:31:42 |
| 200.89.154.99 | attackbots | Aug 1 21:36:20 havingfunrightnow sshd[3640]: Failed password for root from 200.89.154.99 port 51761 ssh2 Aug 1 21:42:05 havingfunrightnow sshd[3829]: Failed password for root from 200.89.154.99 port 56603 ssh2 ... |
2020-08-02 03:48:38 |