Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ada

Region: Oklahoma

Country: United States

Internet Service Provider: Aire Networks del Mediterráneo, S.L.U.

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       149.18.0.0 - 149.18.255.255
CIDR:           149.18.0.0/16
NetName:        COGENT-149-18-16
NetHandle:      NET-149-18-0-0-1
Parent:         NET149 (NET-149-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Cogent Communications, LLC (COGC)
RegDate:        1992-01-28
Updated:        2025-09-23
Ref:            https://rdap.arin.net/registry/ip/149.18.0.0



OrgName:        Cogent Communications, LLC
OrgId:          COGC
Address:        2450 N Street NW
City:           Washington
StateProv:      DC
PostalCode:     20037
Country:        US
RegDate:        2000-05-30
Updated:        2025-09-23
Comment:        Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/COGC

ReferralServer:  rwhois://rwhois.cogentco.com:4321

OrgTechHandle: IPALL-ARIN
OrgTechName:   IP Allocation
OrgTechPhone:  +1-877-875-4311 
OrgTechEmail:  ipalloc@cogentco.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPALL-ARIN

OrgAbuseHandle: COGEN-ARIN
OrgAbuseName:   Cogent Abuse
OrgAbusePhone:  +1-877-875-4311 
OrgAbuseEmail:  abuse@cogentco.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/COGEN-ARIN

OrgNOCHandle: ZC108-ARIN
OrgNOCName:   Cogent Communications
OrgNOCPhone:  +1-877-875-4311 
OrgNOCEmail:  noc@cogentco.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ZC108-ARIN

# end


# start

NetRange:       149.18.0.0 - 149.18.255.255
CIDR:           149.18.0.0/16
NetName:        LOGICWEB
NetHandle:      NET-149-18-0-0-2
Parent:         COGENT-149-18-16 (NET-149-18-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   LogicWeb Inc. (LOGIC-25)
RegDate:        2021-06-01
Updated:        2024-07-15
Ref:            https://rdap.arin.net/registry/ip/149.18.0.0



OrgName:        LogicWeb Inc.
OrgId:          LOGIC-25
Address:        55 Broadway
Address:        #686
City:           Greenlawn
StateProv:      NY
PostalCode:     11740
Country:        US
RegDate:        2007-12-10
Updated:        2024-11-25
Comment:        ABUSE / SUBPOENAS
Comment:        ------------------------
Comment:        Send to: abuse@logicweb.com (no other email is valid for abuse complaints).
Ref:            https://rdap.arin.net/registry/entity/LOGIC-25


OrgAbuseHandle: ABUSE1808-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-347-212-5047 
OrgAbuseEmail:  abuse@logicweb.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE1808-ARIN

OrgTechHandle: TECH277-ARIN
OrgTechName:   Tech
OrgTechPhone:  +1-347-212-5047 
OrgTechEmail:  chad@logicweb.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TECH277-ARIN

# end


# start

NetRange:       149.18.46.0 - 149.18.47.255
CIDR:           149.18.46.0/23
NetName:        BLS-BROADBAND-LLC
NetHandle:      NET-149-18-46-0-1
Parent:         LOGICWEB (NET-149-18-0-0-2)
NetType:        Reassigned
OriginAS:       
Customer:       BLS Broadband LLC (C10651810)
RegDate:        2024-01-19
Updated:        2024-01-19
Ref:            https://rdap.arin.net/registry/ip/149.18.46.0


CustName:       BLS Broadband LLC
Address:        11720 CR 3570
City:           Ada
StateProv:      OK
PostalCode:     74820
Country:        US
RegDate:        2024-01-19
Updated:        2024-01-19
Ref:            https://rdap.arin.net/registry/entity/C10651810

OrgAbuseHandle: ABUSE1808-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-347-212-5047 
OrgAbuseEmail:  abuse@logicweb.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE1808-ARIN

OrgTechHandle: TECH277-ARIN
OrgTechName:   Tech
OrgTechPhone:  +1-347-212-5047 
OrgTechEmail:  chad@logicweb.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TECH277-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.cogentco.com:4321.

%rwhois V-1.5:0010b0:00 rwhois.cogentco.com (CGNT rwhoisd 1.2.2)
network:ID:NET4-9512000010
network:Network-Name:NET4-9512000010
network:IP-Network:149.18.0.0/16
network:Org-Name:LogicWeb Inc.
network:Street-Address:3003 WOODBRIDGE AVENUE
network:City:EDISON
network:State:NJ
network:Country:US
network:Postal-Code:08837
network:Tech-Contact:ZC108-ARIN
network:Updated:2025-09-05 13:19:21
%ok
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.18.47.24
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59874
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.18.47.24.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026052101 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 21 23:23:04 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 24.47.18.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 24.47.18.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.241.37.82 attack
Invalid user toshia from 200.241.37.82 port 43387
2020-04-04 05:24:11
113.199.41.211 attackbotsspam
SSH Invalid Login
2020-04-04 05:48:35
50.255.64.233 attackbotsspam
SSH Invalid Login
2020-04-04 05:59:00
179.40.48.167 attack
Invalid user bqe from 179.40.48.167 port 40417
2020-04-04 05:32:10
203.130.242.68 attack
Apr  3 13:46:51 main sshd[25748]: Failed password for invalid user student from 203.130.242.68 port 43009 ssh2
Apr  3 14:08:50 main sshd[26208]: Failed password for invalid user stream from 203.130.242.68 port 51527 ssh2
Apr  3 14:17:42 main sshd[26430]: Failed password for invalid user tor from 203.130.242.68 port 54926 ssh2
Apr  3 14:37:17 main sshd[27136]: Failed password for invalid user ey from 203.130.242.68 port 48442 ssh2
2020-04-04 05:23:09
159.65.41.159 attackbots
SSH Invalid Login
2020-04-04 05:53:42
218.78.91.140 attackbotsspam
Apr  3 23:13:42 smtp sshd[18090]: Failed password for r.r from 218.78.91.140 port 47412 ssh2
Apr  3 23:27:16 smtp sshd[20187]: Invalid user changem from 218.78.91.140
Apr  3 23:27:18 smtp sshd[20187]: Failed password for invalid user changem from 218.78.91.140 port 56216 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=218.78.91.140
2020-04-04 05:48:57
185.69.24.243 attack
web-1 [ssh] SSH Attack
2020-04-04 05:29:10
124.236.22.12 attack
k+ssh-bruteforce
2020-04-04 05:44:03
139.59.108.237 attackspambots
2020-04-03T20:44:45.976924abusebot-8.cloudsearch.cf sshd[11448]: Invalid user zll from 139.59.108.237 port 56906
2020-04-03T20:44:45.985787abusebot-8.cloudsearch.cf sshd[11448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.108.237
2020-04-03T20:44:45.976924abusebot-8.cloudsearch.cf sshd[11448]: Invalid user zll from 139.59.108.237 port 56906
2020-04-03T20:44:47.923662abusebot-8.cloudsearch.cf sshd[11448]: Failed password for invalid user zll from 139.59.108.237 port 56906 ssh2
2020-04-03T20:50:22.027796abusebot-8.cloudsearch.cf sshd[11835]: Invalid user ea from 139.59.108.237 port 40156
2020-04-03T20:50:22.034870abusebot-8.cloudsearch.cf sshd[11835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.108.237
2020-04-03T20:50:22.027796abusebot-8.cloudsearch.cf sshd[11835]: Invalid user ea from 139.59.108.237 port 40156
2020-04-03T20:50:24.238421abusebot-8.cloudsearch.cf sshd[11835]: Failed pass
...
2020-04-04 05:41:19
159.65.8.221 attackbots
Automatic report - XMLRPC Attack
2020-04-04 05:55:05
182.52.30.55 attackbotsspam
Invalid user test from 182.52.30.55 port 48590
2020-04-04 05:30:39
222.59.9.17 attack
port scan and connect, tcp 23 (telnet)
2020-04-04 05:48:09
189.18.243.210 attackbotsspam
Invalid user ph from 189.18.243.210 port 55013
2020-04-04 05:27:43
185.194.49.132 attackbotsspam
SSH bruteforce
2020-04-04 05:28:31

Recently Reported IPs

111.208.79.78 110.17.84.222 134.35.157.102 3.87.31.169
2606:4700:10::6816:3332 110.78.153.77 111.208.78.115 111.208.80.115
66.132.172.197 42.48.38.47 195.96.139.15 171.105.76.96
2606:4700:10::ac43:1959 10.101.111.112 125.123.70.203 20.102.116.167
169.150.196.106 66.132.172.106 208.84.100.117 2606:4700:10::6816:2795