Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Irvine

Region: California

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       108.64.0.0 - 108.95.255.255
CIDR:           108.64.0.0/11
NetName:        SBCIS-SBIS
NetHandle:      NET-108-64-0-0-1
Parent:         NET108 (NET-108-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   AT&T Enterprises, LLC (AEL-360)
RegDate:        2009-10-29
Updated:        2024-12-05
Ref:            https://rdap.arin.net/registry/ip/108.64.0.0



OrgName:        AT&T Enterprises, LLC
OrgId:          AEL-360
Address:        208 S. Akard St.
City:           Dallas
StateProv:      TX
PostalCode:     75202
Country:        US
RegDate:        2024-11-22
Updated:        2025-10-29
Ref:            https://rdap.arin.net/registry/entity/AEL-360


OrgRoutingHandle: ROUTI59-ARIN
OrgRoutingName:   Routing POC
OrgRoutingPhone:  +1-999-999-9999 
OrgRoutingEmail:  routing_poc@att.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ROUTI59-ARIN

OrgTechHandle: ZS44-ARIN
OrgTechName:   IPAdmin-ATT Internet Services
OrgTechPhone:  +1-888-510-5545 
OrgTechEmail:  ipadmin@semail.att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ZS44-ARIN

OrgAbuseHandle: ABUSE7-ARIN
OrgAbuseName:   abuse
OrgAbusePhone:  +1-919-319-8167 
OrgAbuseEmail:  abuse@att.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE7-ARIN

OrgTechHandle: ICC-ARIN
OrgTechName:   IP Team
OrgTechPhone:  +1-888-876-2382 
OrgTechEmail:  rm-ipspecialist@att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ICC-ARIN

# end


# start

NetRange:       108.85.203.248 - 108.85.203.255
CIDR:           108.85.203.248/29
NetName:        SBC-108-85-203-248-29-1103141014
NetHandle:      NET-108-85-203-248-1
Parent:         SBCIS-SBIS (NET-108-64-0-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Debbie Olmstead03142011161008195 (C02717781)
RegDate:        2011-03-14
Updated:        2011-03-14
Ref:            https://rdap.arin.net/registry/ip/108.85.203.248


CustName:       Debbie Olmstead03142011161008195
Address:        2701 N. Central Expwy
City:           Richardson
StateProv:      TX
PostalCode:     75080
Country:        US
RegDate:        2011-03-14
Updated:        2018-07-19
Ref:            https://rdap.arin.net/registry/entity/C02717781

OrgRoutingHandle: ROUTI59-ARIN
OrgRoutingName:   Routing POC
OrgRoutingPhone:  +1-999-999-9999 
OrgRoutingEmail:  routing_poc@att.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ROUTI59-ARIN

OrgTechHandle: ZS44-ARIN
OrgTechName:   IPAdmin-ATT Internet Services
OrgTechPhone:  +1-888-510-5545 
OrgTechEmail:  ipadmin@semail.att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ZS44-ARIN

OrgAbuseHandle: ABUSE7-ARIN
OrgAbuseName:   abuse
OrgAbusePhone:  +1-919-319-8167 
OrgAbuseEmail:  abuse@att.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE7-ARIN

OrgTechHandle: ICC-ARIN
OrgTechName:   IP Team
OrgTechPhone:  +1-888-876-2382 
OrgTechEmail:  rm-ipspecialist@att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ICC-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.85.203.251
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57362
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;108.85.203.251.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040300 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 16:20:40 CST 2026
;; MSG SIZE  rcvd: 107
Host info
251.203.85.108.in-addr.arpa domain name pointer 108-85-203-251.lightspeed.irvnca.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
251.203.85.108.in-addr.arpa	name = 108-85-203-251.lightspeed.irvnca.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
120.31.71.235 attackbots
Feb 22 13:13:47 plusreed sshd[17090]: Invalid user ts3 from 120.31.71.235
...
2020-02-23 02:16:20
222.186.175.167 attackspam
Feb 22 19:14:32 amit sshd\[29765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
Feb 22 19:14:34 amit sshd\[29765\]: Failed password for root from 222.186.175.167 port 20998 ssh2
Feb 22 19:14:53 amit sshd\[29767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
...
2020-02-23 02:23:19
46.101.103.191 attack
Invalid user oracle from 46.101.103.191 port 60560
2020-02-23 02:03:40
27.77.140.87 attackbots
Port probing on unauthorized port 26
2020-02-23 02:03:11
141.212.122.187 attack
8013/tcp 8013/tcp
[2020-02-22]2pkt
2020-02-23 01:53:52
193.31.40.36 attackspambots
firewall-block, port(s): 389/tcp
2020-02-23 01:43:41
192.3.178.162 attackbots
Automatic report - Port Scan
2020-02-23 02:11:45
82.64.193.16 attackspam
$f2bV_matches
2020-02-23 02:10:29
198.167.140.152 attackspambots
Invalid user storm from 198.167.140.152 port 52827
2020-02-23 01:43:56
61.216.248.233 attackspam
Unauthorised access (Feb 22) SRC=61.216.248.233 LEN=52 TTL=108 ID=20809 DF TCP DPT=445 WINDOW=8192 SYN
2020-02-23 01:48:37
180.139.114.218 attackspam
firewall-block, port(s): 2444/tcp
2020-02-23 01:46:12
218.92.0.178 attackbotsspam
Feb 22 12:52:12 NPSTNNYC01T sshd[7300]: Failed password for root from 218.92.0.178 port 23450 ssh2
Feb 22 12:52:24 NPSTNNYC01T sshd[7300]: error: maximum authentication attempts exceeded for root from 218.92.0.178 port 23450 ssh2 [preauth]
Feb 22 12:52:29 NPSTNNYC01T sshd[7332]: Failed password for root from 218.92.0.178 port 54306 ssh2
...
2020-02-23 01:59:44
222.186.180.142 attackspam
02/22/2020-13:22:54.606066 222.186.180.142 Protocol: 6 ET SCAN Potential SSH Scan
2020-02-23 02:24:01
141.212.122.197 attack
10028/tcp 10028/tcp
[2020-02-22]2pkt
2020-02-23 01:53:02
201.52.32.249 attackbots
$f2bV_matches
2020-02-23 02:04:19

Recently Reported IPs

149.194.130.148 202.141.39.29 50.7.158.114 80.95.207.198
147.226.234.22 20.29.58.2 120.169.152.189 110.78.156.132
2606:4700:10::6816:1701 2606:4700:10::6814:9575 110.77.248.160 2606:4700:10::6816:4942
2606:4700:10::6814:8190 2606:4700:10::6816:1584 2606:4700:10::6816:998 121.234.219.138
2606:4700:10::6816:2140 164.155.74.48 2606:4700:10::ac43:823 109.162.246.59