Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Jose

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       108.62.0.0 - 108.62.255.255
CIDR:           108.62.0.0/16
NetName:        NET-108-62-0-0-1
NetHandle:      NET-108-62-0-0-1
Parent:         NET108 (NET-108-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Leaseweb USA, Inc. (LU)
RegDate:        2010-12-13
Updated:        2021-02-15
Ref:            https://rdap.arin.net/registry/ip/108.62.0.0



OrgName:        Leaseweb USA, Inc.
OrgId:          LU
Address:        9480 Innovation Dr
City:           Manassas
StateProv:      VA
PostalCode:     20109
Country:        US
RegDate:        2010-09-13
Updated:        2024-11-25
Comment:        www.leaseweb.com
Ref:            https://rdap.arin.net/registry/entity/LU


OrgTechHandle: LEASE-ARIN
OrgTechName:   Leaseweb ARIN
OrgTechPhone:  +1-571-814-3777 
OrgTechEmail:  abuse@us.leaseweb.com
OrgTechRef:    https://rdap.arin.net/registry/entity/LEASE-ARIN

OrgAbuseHandle: LUAD3-ARIN
OrgAbuseName:   Leaseweb US abuse dept
OrgAbusePhone:  +1-571-814-3777 
OrgAbuseEmail:  abuse@us.leaseweb.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LUAD3-ARIN

OrgNOCHandle: LEASE-ARIN
OrgNOCName:   Leaseweb ARIN
OrgNOCPhone:  +1-571-814-3777 
OrgNOCEmail:  abuse@us.leaseweb.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/LEASE-ARIN

# end


# start

NetRange:       108.62.160.0 - 108.62.163.255
CIDR:           108.62.160.0/22
NetName:        64-64-24-0
NetHandle:      NET-108-62-160-0-1
Parent:         NET-108-62-0-0-1 (NET-108-62-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Leaseweb USA, Inc. (LU-76)
RegDate:        2022-03-27
Updated:        2022-03-27
Ref:            https://rdap.arin.net/registry/ip/108.62.160.0


OrgName:        Leaseweb USA, Inc.
OrgId:          LU-76
Address:        1735 Lundy Ave
City:           San Jose
StateProv:      CA
PostalCode:     95131
Country:        US
RegDate:        2015-07-30
Updated:        2016-03-15
Ref:            https://rdap.arin.net/registry/entity/LU-76


OrgAbuseHandle: LUAD3-ARIN
OrgAbuseName:   Leaseweb US abuse dept
OrgAbusePhone:  +1-571-814-3777 
OrgAbuseEmail:  abuse@us.leaseweb.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LUAD3-ARIN

OrgTechHandle: LEASE-ARIN
OrgTechName:   Leaseweb ARIN
OrgTechPhone:  +1-571-814-3777 
OrgTechEmail:  abuse@us.leaseweb.com
OrgTechRef:    https://rdap.arin.net/registry/entity/LEASE-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.62.160.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35285
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;108.62.160.244.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041500 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 15 20:44:58 CST 2026
;; MSG SIZE  rcvd: 107
Host info
244.160.62.108.in-addr.arpa domain name pointer 244.160.62.108.hosted.by.hostdzire.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
244.160.62.108.in-addr.arpa	name = 244.160.62.108.hosted.by.hostdzire.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
2.228.94.52 attackspam
Honeypot attack, port: 445, PTR: 2-228-94-52.ip190.fastwebnet.it.
2020-01-25 06:02:54
212.64.77.182 attackspam
Jan 24 22:52:42 MK-Soft-VM6 sshd[27842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.77.182 
Jan 24 22:52:45 MK-Soft-VM6 sshd[27842]: Failed password for invalid user abc from 212.64.77.182 port 46944 ssh2
...
2020-01-25 05:56:22
46.224.1.114 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-25 06:06:01
112.85.42.178 attackspam
Jan 24 16:50:52 plusreed sshd[32672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178  user=root
Jan 24 16:50:54 plusreed sshd[32672]: Failed password for root from 112.85.42.178 port 45941 ssh2
Jan 24 16:50:57 plusreed sshd[32672]: Failed password for root from 112.85.42.178 port 45941 ssh2
Jan 24 16:50:52 plusreed sshd[32672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178  user=root
Jan 24 16:50:54 plusreed sshd[32672]: Failed password for root from 112.85.42.178 port 45941 ssh2
Jan 24 16:50:57 plusreed sshd[32672]: Failed password for root from 112.85.42.178 port 45941 ssh2
Jan 24 16:50:52 plusreed sshd[32672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178  user=root
Jan 24 16:50:54 plusreed sshd[32672]: Failed password for root from 112.85.42.178 port 45941 ssh2
Jan 24 16:50:57 plusreed sshd[32672]: Failed password for root from 112.85.42.178
2020-01-25 05:52:35
27.49.160.7 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-25 05:51:37
78.107.185.171 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-25 05:40:38
118.35.137.118 attackspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-01-25 05:49:44
124.123.243.19 attackspambots
Jan 24 23:05:19 localhost sshd\[19044\]: Invalid user zong from 124.123.243.19 port 48880
Jan 24 23:05:19 localhost sshd\[19044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.123.243.19
Jan 24 23:05:22 localhost sshd\[19044\]: Failed password for invalid user zong from 124.123.243.19 port 48880 ssh2
2020-01-25 06:09:30
122.51.41.26 attackspam
Jan 24 21:52:13 lnxded64 sshd[7749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.41.26
2020-01-25 05:53:01
84.232.255.8 attackbots
Unauthorized connection attempt detected from IP address 84.232.255.8 to port 88 [J]
2020-01-25 05:35:32
36.91.37.13 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-25 05:53:45
83.97.20.33 attackbots
Unauthorized connection attempt detected from IP address 83.97.20.33 to port 1080 [J]
2020-01-25 05:51:22
114.242.117.12 attackspam
Unauthorized connection attempt detected from IP address 114.242.117.12 to port 2220 [J]
2020-01-25 06:04:42
119.28.176.26 attackbotsspam
Jan 24 23:52:04 hosting sshd[28451]: Invalid user dany from 119.28.176.26 port 37630
...
2020-01-25 05:59:32
14.187.35.217 attackspambots
Brute force attempt
2020-01-25 05:55:00

Recently Reported IPs

111.174.80.73 10.24.224.5 2606:4700:10::6814:8206 2606:4700:10::6816:3318
2606:4700:10::6814:8059 2606:4700:10::ac43:1971 2606:4700:10::6814:6859 2606:4700:10::ac43:927
2606:4700:10::6814:4620 2606:4700:10::ac43:1990 198.18.2.9 20.123.33.13
14.220.188.66 122.192.203.112 2606:4700:10::6816:1062 121.234.219.194
134.35.157.64 2606:4700:10::6814:7491 2606:4700:10::6814:6579 2409:8900:2a81:a087:cda7:d123:c726:f4f9