Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chapel Hill

Region: North Carolina

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       157.98.0.0 - 157.98.255.255
CIDR:           157.98.0.0/16
NetName:        NIEHS
NetHandle:      NET-157-98-0-0-1
Parent:         NET157 (NET-157-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   National Institute of Environmental Health Sciences (NIEHS)
RegDate:        1991-12-19
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/157.98.0.0


OrgName:        National Institute of Environmental Health Sciences
OrgId:          NIEHS
Address:        111 Alexander Drive
City:           Research Triangle Park
StateProv:      NC
PostalCode:     27709
Country:        US
RegDate:        1991-12-19
Updated:        2020-04-27
Ref:            https://rdap.arin.net/registry/entity/NIEHS


OrgTechHandle: NIEHS2-ARIN
OrgTechName:   NIEHS Networks
OrgTechPhone:  +1-336-214-0753 
OrgTechEmail:  matthew.may@nih.gov
OrgTechRef:    https://rdap.arin.net/registry/entity/NIEHS2-ARIN

OrgAbuseHandle: NIEHS2-ARIN
OrgAbuseName:   NIEHS Networks
OrgAbusePhone:  +1-336-214-0753 
OrgAbuseEmail:  matthew.may@nih.gov
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NIEHS2-ARIN

RTechHandle: CT1893-ARIN
RTechName:   Tate, Charlie 
RTechPhone:  +1-919-815-7251 
RTechEmail:  tate@nih.gov
RTechRef:    https://rdap.arin.net/registry/entity/CT1893-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.98.38.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56866
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.98.38.192.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041000 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 10 19:42:25 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 192.38.98.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 192.38.98.157.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
181.176.161.151 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2019-08-16 13:06:00
119.29.104.238 attack
Invalid user jen from 119.29.104.238 port 35850
2019-08-16 13:07:06
220.143.87.163 attackspambots
23/tcp
[2019-08-16]1pkt
2019-08-16 13:28:53
113.123.117.132 attackspam
81/tcp
[2019-08-15]1pkt
2019-08-16 13:06:23
164.132.74.78 attack
Invalid user rmt from 164.132.74.78 port 38624
2019-08-16 13:08:58
218.250.1.81 attackbotsspam
[portscan] Port scan
2019-08-16 13:25:46
179.113.118.141 attackbots
23/tcp
[2019-08-16]1pkt
2019-08-16 13:56:33
27.73.50.96 attack
Unauthorised access (Aug 15) SRC=27.73.50.96 LEN=44 TTL=44 ID=24459 TCP DPT=8080 WINDOW=44569 SYN
2019-08-16 13:08:40
182.162.143.16 attack
Aug 16 01:38:51 TORMINT sshd\[30724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.162.143.16  user=root
Aug 16 01:38:53 TORMINT sshd\[30724\]: Failed password for root from 182.162.143.16 port 50770 ssh2
Aug 16 01:43:59 TORMINT sshd\[31071\]: Invalid user amssys from 182.162.143.16
Aug 16 01:43:59 TORMINT sshd\[31071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.162.143.16
...
2019-08-16 13:51:54
159.65.174.81 attackbots
Aug 16 07:18:00 eventyay sshd[8317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.174.81
Aug 16 07:18:02 eventyay sshd[8317]: Failed password for invalid user nathan from 159.65.174.81 port 56708 ssh2
Aug 16 07:23:36 eventyay sshd[9692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.174.81
...
2019-08-16 13:49:05
51.159.28.59 attack
Splunk® : Brute-Force login attempt on SSH:
Aug 16 01:23:46 testbed sshd[25915]: Disconnected from 51.159.28.59 port 46913 [preauth]
2019-08-16 13:27:45
76.98.206.47 attackbotsspam
5555/tcp 5555/tcp 5555/tcp
[2019-08-15]3pkt
2019-08-16 13:21:13
24.7.159.76 attackbots
Aug 16 05:40:08 db sshd\[10342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-24-7-159-76.hsd1.ca.comcast.net  user=root
Aug 16 05:40:09 db sshd\[10342\]: Failed password for root from 24.7.159.76 port 39596 ssh2
Aug 16 05:44:31 db sshd\[10381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-24-7-159-76.hsd1.ca.comcast.net  user=root
Aug 16 05:44:34 db sshd\[10381\]: Failed password for root from 24.7.159.76 port 58486 ssh2
Aug 16 05:48:46 db sshd\[10429\]: Invalid user wade from 24.7.159.76
Aug 16 05:48:46 db sshd\[10429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-24-7-159-76.hsd1.ca.comcast.net 
...
2019-08-16 13:50:24
170.0.126.185 attackbots
namecheap spam
2019-08-16 13:00:54
222.186.15.101 attack
2019-08-16T05:33:30.439204abusebot-2.cloudsearch.cf sshd\[31119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.101  user=root
2019-08-16 13:47:03

Recently Reported IPs

105.255.217.210 65.108.72.208 88.238.241.198 2606:4700:10::ac43:259e
2606:4700:10::6816:345 2606:4700:10::6816:3122 2606:4700:10::6814:8461 74.224.157.99
2606:4700:10::6814:4794 2606:4700:10::ac43:2759 219.4.115.164 34.241.126.135
3.252.105.30 213.155.143.66 79.129.248.85 96.236.59.90
133.179.60.210 2606:4700:10::ac43:2951 2606:4700:10::6814:8193 2606:4700:10::6814:9977