Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       100.64.0.0 - 100.127.255.255
CIDR:           100.64.0.0/10
NetName:        SHARED-ADDRESS-SPACE-RFC6598-IANA-RESERVED
NetHandle:      NET-100-64-0-0-1
Parent:         NET100 (NET-100-0-0-0-0)
NetType:        IANA Special Use
OriginAS:       
Organization:   Internet Assigned Numbers Authority (IANA)
RegDate:        2012-03-13
Updated:        2024-05-24
Comment:        This block is used as Shared Address Space. Traffic from these addresses does not come from IANA. IANA has simply reserved these numbers in its database and does not use or operate them. We are not the source of activity you may see on logs or in e-mail records. Please refer to http://www.iana.org/abuse/ 
Comment:        
Comment:        Shared Address Space can only be used in Service Provider networks or on routing equipment that is able to do address translation across router interfaces when addresses are identical on two different interfaces. 
Comment:        
Comment:        This block was assigned by the IETF in the Best Current Practice document, 
Comment:        RFC 6598 which can be found at: 
Comment:        http://tools.ietf.org/html/rfc6598
Ref:            https://rdap.arin.net/registry/ip/100.64.0.0



OrgName:        Internet Assigned Numbers Authority
OrgId:          IANA
Address:        12025 Waterfront Drive
Address:        Suite 300
City:           Los Angeles
StateProv:      CA
PostalCode:     90292
Country:        US
RegDate:        
Updated:        2024-05-24
Ref:            https://rdap.arin.net/registry/entity/IANA


OrgTechHandle: IANA-IP-ARIN
OrgTechName:   ICANN
OrgTechPhone:  +1-310-301-5820 
OrgTechEmail:  abuse@iana.org
OrgTechRef:    https://rdap.arin.net/registry/entity/IANA-IP-ARIN

OrgAbuseHandle: IANA-IP-ARIN
OrgAbuseName:   ICANN
OrgAbusePhone:  +1-310-301-5820 
OrgAbuseEmail:  abuse@iana.org
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IANA-IP-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.90.150.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46045
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;100.90.150.108.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025091901 1800 900 604800 86400

;; Query time: 199 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 20 03:25:00 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 108.150.90.100.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 108.150.90.100.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.15.209.128 attackspambots
2019-07-25T12:59:35.112342wiz-ks3 sshd[19091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor-exit-1.droideka.ovh  user=root
2019-07-25T12:59:36.948074wiz-ks3 sshd[19091]: Failed password for root from 51.15.209.128 port 56482 ssh2
2019-07-25T12:59:38.572655wiz-ks3 sshd[19091]: Failed password for root from 51.15.209.128 port 56482 ssh2
2019-07-25T12:59:35.112342wiz-ks3 sshd[19091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor-exit-1.droideka.ovh  user=root
2019-07-25T12:59:36.948074wiz-ks3 sshd[19091]: Failed password for root from 51.15.209.128 port 56482 ssh2
2019-07-25T12:59:38.572655wiz-ks3 sshd[19091]: Failed password for root from 51.15.209.128 port 56482 ssh2
2019-07-25T12:59:35.112342wiz-ks3 sshd[19091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor-exit-1.droideka.ovh  user=root
2019-07-25T12:59:36.948074wiz-ks3 sshd[19091]: Failed password for root from 51.15.209
2019-08-16 11:37:21
113.104.128.187 attack
Port Scan: TCP/23
2019-08-16 11:59:20
218.155.189.208 attackbots
Aug 16 03:08:28 web8 sshd\[30497\]: Invalid user jose from 218.155.189.208
Aug 16 03:08:28 web8 sshd\[30497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.155.189.208
Aug 16 03:08:30 web8 sshd\[30497\]: Failed password for invalid user jose from 218.155.189.208 port 33310 ssh2
Aug 16 03:14:03 web8 sshd\[975\]: Invalid user sheila from 218.155.189.208
Aug 16 03:14:03 web8 sshd\[975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.155.189.208
2019-08-16 11:25:50
42.112.208.52 attack
" "
2019-08-16 11:35:49
60.250.164.169 attackbots
Aug 16 02:14:30 dedicated sshd[22627]: Invalid user teamspeak5 from 60.250.164.169 port 60494
2019-08-16 11:30:14
180.250.115.215 attack
Aug 16 05:29:28 [host] sshd[7997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.115.215  user=root
Aug 16 05:29:30 [host] sshd[7997]: Failed password for root from 180.250.115.215 port 38129 ssh2
Aug 16 05:34:52 [host] sshd[8139]: Invalid user amp from 180.250.115.215
2019-08-16 11:43:03
87.109.191.232 attackbots
445/tcp 445/tcp 445/tcp
[2019-08-15]3pkt
2019-08-16 11:47:52
103.75.166.94 attackbots
23/tcp
[2019-08-15]1pkt
2019-08-16 11:21:52
134.209.170.193 attackbots
Invalid user simona from 134.209.170.193 port 33716
2019-08-16 11:36:38
198.71.224.63 attackspambots
MYH,DEF GET /old/wp-admin/
2019-08-16 11:18:48
195.154.189.51 attack
Invalid user gregg from 195.154.189.51 port 51734
2019-08-16 11:23:20
113.116.91.40 attackspambots
port scan and connect, tcp 23 (telnet)
2019-08-16 11:44:09
106.52.106.61 attackspam
SSH Bruteforce attack
2019-08-16 12:06:30
68.183.124.53 attackbots
Aug 16 04:29:56 MK-Soft-Root1 sshd\[22670\]: Invalid user mt from 68.183.124.53 port 49852
Aug 16 04:29:56 MK-Soft-Root1 sshd\[22670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.124.53
Aug 16 04:29:58 MK-Soft-Root1 sshd\[22670\]: Failed password for invalid user mt from 68.183.124.53 port 49852 ssh2
...
2019-08-16 11:43:23
77.247.108.170 attackspam
08/15/2019-23:01:47.116090 77.247.108.170 Protocol: 17 ET CINS Active Threat Intelligence Poor Reputation IP group 75
2019-08-16 11:25:28

Recently Reported IPs

64.62.156.142 187.189.87.96 18.158.232.199 160.202.35.24
3.92.197.210 54.242.109.237 34.66.73.92 185.255.91.107
165.154.125.226 94.156.152.44 132.255.211.243 92.3.81.183
64.62.156.27 211.75.210.20 35.203.211.123 162.216.150.228
2001:0:2851:b9f0:188a:895b:20a4:c46b 182.44.2.148 176.65.149.21 167.71.13.91