城市(city): Montevideo
省份(region): Montevideo
国家(country): Uruguay
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% IP Client: 124.223.158.242
% Joint Whois - whois.lacnic.net
% This server accepts single ASN, IPv4 or IPv6 queries
% LACNIC resource: whois.lacnic.net
% Copyright LACNIC lacnic.net
% The data below is provided for information purposes
% and to assist persons in obtaining information about or
% related to AS and IP numbers registrations
% By submitting a whois query, you agree to use this data
% only for lawful purposes.
% 2026-04-10 16:00:23 (-03 -03:00)
inetnum: 186.52.0.0/14
status: allocated
aut-num: AS6057
owner: Administracion Nacional de Telecomunicaciones
ownerid: UY-ANTA-LACNIC
responsible: ANTEL URUGUAY
address: Guatemala, 1075, Torre de las Telecomunicaciones
address: 11800 - Montevideo - Montevideo
country: UY
phone: +598 29280000 [0000]
owner-c: IIA17
tech-c: ANU
abuse-c: ANU
inetrev: 186.52.0.0/16
nserver: NS1.ANTELDATA.COM.UY
nsstat: 20260406 AA
nslastaa: 20260406
nserver: NS2.ANTELDATA.COM.UY
nsstat: 20260406 AA
nslastaa: 20260406
inetrev: 186.53.0.0/16
nserver: NS1.ANTELDATA.COM.UY
nsstat: 20260410 AA
nslastaa: 20260410
nserver: NS2.ANTELDATA.COM.UY
nsstat: 20260410 AA
nslastaa: 20260410
inetrev: 186.54.0.0/16
nserver: NS1.ANTELDATA.COM.UY
nsstat: 20260409 AA
nslastaa: 20260409
nserver: NS2.ANTELDATA.COM.UY
nsstat: 20260409 AA
nslastaa: 20260409
inetrev: 186.55.0.0/16
nserver: NS1.ANTELDATA.COM.UY
nsstat: 20260409 AA
nslastaa: 20260409
nserver: NS2.ANTELDATA.COM.UY
nsstat: 20260409 AA
nslastaa: 20260409
created: 20111011
changed: 20111011
nic-hdl: IIA17
person: IngenierÃa Internacional Antel
e-mail: uai@antel.com.uy
address: Guatemala, 1075, Torre de las Telecomunicaciones
address: 11800 - Montevideo - Montevideo
country: UY
phone: +598 29280000 [0000]
created: 20240118
changed: 20260128
nic-hdl: ANU
person: ANTEL URUGUAY
e-mail: ipadmin@antel.net.uy
address: Mercedes, 876, P. 2
address: 11100 - Montevideo -
country: UY
phone: +598 29002877 [0000]
created: 20020910
changed: 20240117
% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 186.55.7.178
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41269
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;186.55.7.178. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041001 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 11 03:00:23 CST 2026
;; MSG SIZE rcvd: 105
178.7.55.186.in-addr.arpa domain name pointer r186-55-7-178.dialup.adsl.anteldata.net.uy.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
178.7.55.186.in-addr.arpa name = r186-55-7-178.dialup.adsl.anteldata.net.uy.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 62.210.206.78 | attackspambots | Apr 19 05:23:46 powerpi2 sshd[15155]: Invalid user la from 62.210.206.78 port 53364 Apr 19 05:23:49 powerpi2 sshd[15155]: Failed password for invalid user la from 62.210.206.78 port 53364 ssh2 Apr 19 05:29:15 powerpi2 sshd[15426]: Invalid user au from 62.210.206.78 port 38918 ... |
2020-04-19 15:26:39 |
| 104.239.168.149 | attack | $f2bV_matches |
2020-04-19 15:45:00 |
| 172.93.220.103 | attackbots | MAIL: User Login Brute Force Attempt |
2020-04-19 15:41:58 |
| 49.234.122.94 | attackspambots | ssh brute force |
2020-04-19 15:24:31 |
| 222.186.180.223 | attackbotsspam | 2020-04-19T07:40:51.475358abusebot-4.cloudsearch.cf sshd[23175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223 user=root 2020-04-19T07:40:52.908176abusebot-4.cloudsearch.cf sshd[23175]: Failed password for root from 222.186.180.223 port 25736 ssh2 2020-04-19T07:40:56.032488abusebot-4.cloudsearch.cf sshd[23175]: Failed password for root from 222.186.180.223 port 25736 ssh2 2020-04-19T07:40:51.475358abusebot-4.cloudsearch.cf sshd[23175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223 user=root 2020-04-19T07:40:52.908176abusebot-4.cloudsearch.cf sshd[23175]: Failed password for root from 222.186.180.223 port 25736 ssh2 2020-04-19T07:40:56.032488abusebot-4.cloudsearch.cf sshd[23175]: Failed password for root from 222.186.180.223 port 25736 ssh2 2020-04-19T07:40:51.475358abusebot-4.cloudsearch.cf sshd[23175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... |
2020-04-19 15:48:09 |
| 222.186.173.142 | attack | Apr 19 09:42:08 server sshd[26199]: Failed none for root from 222.186.173.142 port 29226 ssh2 Apr 19 09:42:11 server sshd[26199]: Failed password for root from 222.186.173.142 port 29226 ssh2 Apr 19 09:42:16 server sshd[26199]: Failed password for root from 222.186.173.142 port 29226 ssh2 |
2020-04-19 16:01:19 |
| 212.64.54.49 | attackspam | 2020-04-19T07:36:33.782178rocketchat.forhosting.nl sshd[19615]: Invalid user gh from 212.64.54.49 port 34410 2020-04-19T07:36:35.698529rocketchat.forhosting.nl sshd[19615]: Failed password for invalid user gh from 212.64.54.49 port 34410 ssh2 2020-04-19T07:51:56.263964rocketchat.forhosting.nl sshd[19956]: Invalid user postgres from 212.64.54.49 port 56396 ... |
2020-04-19 15:20:59 |
| 106.13.73.210 | attackbots | (sshd) Failed SSH login from 106.13.73.210 (CN/China/-): 5 in the last 3600 secs |
2020-04-19 15:32:49 |
| 45.4.219.213 | attackbots | Automatic report - Port Scan Attack |
2020-04-19 15:30:03 |
| 141.98.81.99 | attackspambots | Apr 19 09:26:43 host sshd[24556]: Invalid user Administrator from 141.98.81.99 port 40573 ... |
2020-04-19 15:31:55 |
| 45.67.235.65 | attackbots | [ 📨 ] From devolvido@planodisponivel.live Sun Apr 19 00:52:59 2020 Received: from nochost-mx2.planodisponivel.live ([45.67.235.65]:59995) |
2020-04-19 15:26:59 |
| 218.161.18.17 | attackbots | " " |
2020-04-19 15:36:53 |
| 73.36.232.192 | attackspambots | (imapd) Failed IMAP login from 73.36.232.192 (US/United States/c-73-36-232-192.hsd1.mi.comcast.net): 1 in the last 3600 secs |
2020-04-19 15:33:10 |
| 182.61.5.109 | attackspam | Invalid user git from 182.61.5.109 port 44626 |
2020-04-19 15:50:47 |
| 128.199.162.108 | attackbots | SSH Brute-Force attacks |
2020-04-19 15:56:53 |