城市(city): Tacna
省份(region): Tacna
国家(country): Peru
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% IP Client: 124.223.158.242
% Joint Whois - whois.lacnic.net
% This server accepts single ASN, IPv4 or IPv6 queries
% LACNIC resource: whois.lacnic.net
% Copyright LACNIC lacnic.net
% The data below is provided for information purposes
% and to assist persons in obtaining information about or
% related to AS and IP numbers registrations
% By submitting a whois query, you agree to use this data
% only for lawful purposes.
% 2025-11-06 11:31:59 (-03 -03:00)
inetnum: 181.64.0.0/19
status: reallocated
aut-num: AS6147
owner: PE-TDPERX6-LACNIC
ownerid: PE-PETD8-LACNIC
responsible: Telefonica del Peru
address: Av. San Felipe 1144, 1144, Edi. A
address: 34 - Lima -
country: PE
phone: +51 1 2106771
owner-c: GRT2
tech-c: GRT2
abuse-c: GRT2
created: 20120418
changed: 20120418
inetnum-up: 181.64.0.0/17
nic-hdl: GRT2
person: Gestion Dir. IP Telefónica del Perú
e-mail: tommy.tomaylla@telefonica.com
address: Calle San Felipe 1144, 1144,
address: LI34 - Lima - LI
country: PE
phone: +51 1 2106771
created: 20021204
changed: 20240409
% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 181.64.13.224
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35652
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;181.64.13.224. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025110600 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 06 22:32:00 CST 2025
;; MSG SIZE rcvd: 106
b'Host 224.13.64.181.in-addr.arpa. not found: 3(NXDOMAIN)
'
server can't find 181.64.13.224.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 112.251.196.47 | attackspam | 23/tcp [2019-07-21]1pkt |
2019-07-21 15:52:42 |
| 159.203.169.16 | attackspambots | Portscan or hack attempt detected by psad/fwsnort |
2019-07-21 15:55:08 |
| 156.209.69.171 | attack | Sat, 20 Jul 2019 21:53:42 +0000 likely compromised host or open proxy. ddos rate spidering |
2019-07-21 15:26:21 |
| 113.176.44.50 | attackspambots | Sat, 20 Jul 2019 21:53:42 +0000 likely compromised host or open proxy. ddos rate spidering |
2019-07-21 15:28:28 |
| 112.85.42.87 | attack | Jul 21 09:40:43 ubuntu-2gb-nbg1-dc3-1 sshd[26962]: Failed password for root from 112.85.42.87 port 47805 ssh2 Jul 21 09:40:48 ubuntu-2gb-nbg1-dc3-1 sshd[26962]: error: maximum authentication attempts exceeded for root from 112.85.42.87 port 47805 ssh2 [preauth] ... |
2019-07-21 15:50:13 |
| 185.24.233.14 | attackspambots | Jul 21 10:09:27 mail postfix/smtps/smtpd\[7484\]: warning: 14-233-24-185.static.servebyte.com\[185.24.233.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 21 10:13:58 mail postfix/smtps/smtpd\[7484\]: warning: 14-233-24-185.static.servebyte.com\[185.24.233.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 21 10:18:22 mail postfix/smtps/smtpd\[8221\]: warning: 14-233-24-185.static.servebyte.com\[185.24.233.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-07-21 16:26:52 |
| 27.157.91.183 | attack | 1433/tcp [2019-07-21]1pkt |
2019-07-21 15:43:56 |
| 77.88.87.74 | attackspambots | xmlrpc attack |
2019-07-21 15:55:33 |
| 107.170.202.91 | attackspam | RDP Scan |
2019-07-21 16:21:04 |
| 51.254.129.128 | attackspam | Jul 21 10:06:24 vps647732 sshd[21070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.129.128 Jul 21 10:06:27 vps647732 sshd[21070]: Failed password for invalid user elsje from 51.254.129.128 port 49117 ssh2 ... |
2019-07-21 16:22:41 |
| 2.28.210.158 | attackbots | Automatic report - Port Scan Attack |
2019-07-21 15:38:33 |
| 77.40.3.189 | attackspambots | failed_logins |
2019-07-21 16:09:27 |
| 1.10.208.100 | attack | Sat, 20 Jul 2019 21:53:41 +0000 likely compromised host or open proxy. ddos rate spidering |
2019-07-21 15:34:55 |
| 187.151.226.119 | attackspambots | Sat, 20 Jul 2019 21:53:39 +0000 likely compromised host or open proxy. ddos rate spidering |
2019-07-21 15:39:43 |
| 59.37.22.99 | attack | Port 1433 Scan |
2019-07-21 16:12:40 |