City: unknown
Region: unknown
Country: Venezuela
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% IP Client: 124.223.158.242
% Joint Whois - whois.lacnic.net
% This server accepts single ASN, IPv4 or IPv6 queries
% LACNIC resource: whois.lacnic.net
% Copyright LACNIC lacnic.net
% The data below is provided for information purposes
% and to assist persons in obtaining information about or
% related to AS and IP numbers registrations
% By submitting a whois query, you agree to use this data
% only for lawful purposes.
% 2026-04-13 13:51:35 (-03 -03:00)
inetnum: 201.208.0.0/14
status: allocated
aut-num: AS8048
owner: CANTV Servicios, Venezuela
ownerid: VE-CSVE-LACNIC
responsible: CANTV GSR
address: Segunda Avenida de los Palos Grandes, 000, Entre Av. Fr
address: 1060 - Caracas - MI
country: VE
phone: +58 2095685 [0000]
owner-c: LUM
tech-c: LUM
abuse-c: LUM
inetrev: 201.208.0.0/14
nserver: NS1.CANTV.NET
nsstat: 20260409 AA
nslastaa: 20260409
nserver: NS2.CANTV.NET
nsstat: 20260409 AA
nslastaa: 20260409
nserver: DNS1.CANTV.NET
nsstat: 20260409 AA
nslastaa: 20260409
nserver: DNS2.CANTV.NET
nsstat: 20260409 AA
nslastaa: 20260409
created: 20050809
changed: 20050809
nic-hdl: LUM
person: Ger Sop
e-mail: ipadmin@cantv.com.ve
address: CANTV COR Los Palos Grandes Chacao Caracas Venezuela, 000, -
address: 1060 - Caracas - MI
country: VE
phone: +58 02125000000 [0000]
created: 20020911
changed: 20240809
% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.211.174.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16961
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;201.211.174.99. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041300 1800 900 604800 86400
;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 14 00:51:35 CST 2026
;; MSG SIZE rcvd: 107
b'99.174.211.201.in-addr.arpa domain name pointer 201-211-174-99-cnt-07-p79.cantv.net.
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
99.174.211.201.in-addr.arpa name = 201-211-174-99-cnt-07-p79.cantv.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 220.85.104.202 | attackbotsspam | Jun 12 14:00:03 server sshd[11039]: Failed password for invalid user admin from 220.85.104.202 port 42889 ssh2 Jun 12 14:03:58 server sshd[17944]: Failed password for root from 220.85.104.202 port 30610 ssh2 Jun 12 14:07:49 server sshd[24720]: Failed password for invalid user murai1 from 220.85.104.202 port 53471 ssh2 |
2020-06-12 21:50:15 |
| 88.202.190.141 | attackspam | Jun 12 14:07:47 debian-2gb-nbg1-2 kernel: \[14222388.722485\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=88.202.190.141 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=54321 PROTO=TCP SPT=3001 DPT=3001 WINDOW=65535 RES=0x00 SYN URGP=0 |
2020-06-12 21:50:54 |
| 200.105.183.118 | attack | Jun 12 13:04:08 web8 sshd\[14287\]: Invalid user 8 from 200.105.183.118 Jun 12 13:04:08 web8 sshd\[14287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.105.183.118 Jun 12 13:04:10 web8 sshd\[14287\]: Failed password for invalid user 8 from 200.105.183.118 port 55617 ssh2 Jun 12 13:08:11 web8 sshd\[16586\]: Invalid user hasegawa from 200.105.183.118 Jun 12 13:08:11 web8 sshd\[16586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.105.183.118 |
2020-06-12 21:52:18 |
| 204.48.19.178 | attack | Jun 12 15:08:47 * sshd[11059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.19.178 Jun 12 15:08:49 * sshd[11059]: Failed password for invalid user rachel from 204.48.19.178 port 46002 ssh2 |
2020-06-12 22:02:17 |
| 129.126.221.19 | attackspam | US_Asia_<177>1591963660 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2]: |
2020-06-12 21:56:31 |
| 186.226.6.190 | attackspam | Unauthorized connection attempt from IP address 186.226.6.190 on port 587 |
2020-06-12 21:51:38 |
| 120.70.100.89 | attackspam | Jun 12 13:57:36 meumeu sshd[324274]: Invalid user hadoop from 120.70.100.89 port 37528 Jun 12 13:57:36 meumeu sshd[324274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.100.89 Jun 12 13:57:36 meumeu sshd[324274]: Invalid user hadoop from 120.70.100.89 port 37528 Jun 12 13:57:38 meumeu sshd[324274]: Failed password for invalid user hadoop from 120.70.100.89 port 37528 ssh2 Jun 12 14:01:00 meumeu sshd[324729]: Invalid user vertige from 120.70.100.89 port 53009 Jun 12 14:01:00 meumeu sshd[324729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.100.89 Jun 12 14:01:00 meumeu sshd[324729]: Invalid user vertige from 120.70.100.89 port 53009 Jun 12 14:01:01 meumeu sshd[324729]: Failed password for invalid user vertige from 120.70.100.89 port 53009 ssh2 Jun 12 14:07:34 meumeu sshd[325077]: Invalid user sv1 from 120.70.100.89 port 55748 ... |
2020-06-12 22:02:45 |
| 36.73.215.104 | attack | Automatic report - Port Scan Attack |
2020-06-12 22:18:21 |
| 78.128.113.114 | attack | Jun 12 14:51:45 mail postfix/smtpd\[16711\]: warning: unknown\[78.128.113.114\]: SASL PLAIN authentication failed: \ Jun 12 14:52:05 mail postfix/smtpd\[16663\]: warning: unknown\[78.128.113.114\]: SASL PLAIN authentication failed: \ Jun 12 15:40:27 mail postfix/smtpd\[18765\]: warning: unknown\[78.128.113.114\]: SASL PLAIN authentication failed: \ Jun 12 15:40:47 mail postfix/smtpd\[18765\]: warning: unknown\[78.128.113.114\]: SASL PLAIN authentication failed: \ |
2020-06-12 22:00:34 |
| 49.234.147.154 | attack | Jun 12 16:10:07 santamaria sshd\[25415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.147.154 user=root Jun 12 16:10:09 santamaria sshd\[25415\]: Failed password for root from 49.234.147.154 port 56824 ssh2 Jun 12 16:14:31 santamaria sshd\[25477\]: Invalid user xiaoping from 49.234.147.154 Jun 12 16:14:31 santamaria sshd\[25477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.147.154 ... |
2020-06-12 22:23:39 |
| 91.241.19.42 | attack | 20/6/12@10:06:02: FAIL: Alarm-SSH address from=91.241.19.42 ... |
2020-06-12 22:10:42 |
| 106.13.116.203 | attackbotsspam | invalid login attempt (teamspeak) |
2020-06-12 21:59:40 |
| 84.52.82.124 | attackbots | Jun 10 22:05:14 cumulus sshd[10089]: Invalid user wdk from 84.52.82.124 port 54576 Jun 10 22:05:14 cumulus sshd[10089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.52.82.124 Jun 10 22:05:15 cumulus sshd[10089]: Failed password for invalid user wdk from 84.52.82.124 port 54576 ssh2 Jun 10 22:05:15 cumulus sshd[10089]: Received disconnect from 84.52.82.124 port 54576:11: Bye Bye [preauth] Jun 10 22:05:15 cumulus sshd[10089]: Disconnected from 84.52.82.124 port 54576 [preauth] Jun 10 22:11:18 cumulus sshd[10851]: Invalid user juliejung from 84.52.82.124 port 46734 Jun 10 22:11:18 cumulus sshd[10851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.52.82.124 Jun 10 22:11:20 cumulus sshd[10851]: Failed password for invalid user juliejung from 84.52.82.124 port 46734 ssh2 Jun 10 22:11:21 cumulus sshd[10851]: Received disconnect from 84.52.82.124 port 46734:11: Bye Bye [preauth] Jun 10 22........ ------------------------------- |
2020-06-12 21:57:56 |
| 222.180.162.8 | attack | Jun 12 15:08:14 ovpn sshd\[2991\]: Invalid user nivinform from 222.180.162.8 Jun 12 15:08:14 ovpn sshd\[2991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.180.162.8 Jun 12 15:08:16 ovpn sshd\[2991\]: Failed password for invalid user nivinform from 222.180.162.8 port 33892 ssh2 Jun 12 15:15:04 ovpn sshd\[4635\]: Invalid user jhartley from 222.180.162.8 Jun 12 15:15:04 ovpn sshd\[4635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.180.162.8 |
2020-06-12 22:09:58 |
| 112.85.42.89 | attackbots | . |
2020-06-12 21:47:31 |