Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Highland

Region: California

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       162.224.0.0 - 162.239.255.255
CIDR:           162.224.0.0/12
NetName:        SIS-80-5-10-2013
NetHandle:      NET-162-224-0-0-1
Parent:         NET162 (NET-162-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   AT&T Enterprises, LLC (AEL-360)
RegDate:        2013-05-21
Updated:        2024-12-05
Ref:            https://rdap.arin.net/registry/ip/162.224.0.0



OrgName:        AT&T Enterprises, LLC
OrgId:          AEL-360
Address:        208 S. Akard St.
City:           Dallas
StateProv:      TX
PostalCode:     75202
Country:        US
RegDate:        2024-11-22
Updated:        2025-10-29
Ref:            https://rdap.arin.net/registry/entity/AEL-360


OrgTechHandle: ICC-ARIN
OrgTechName:   IP Team
OrgTechPhone:  +1-888-876-2382 
OrgTechEmail:  rm-ipspecialist@att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ICC-ARIN

OrgAbuseHandle: ABUSE7-ARIN
OrgAbuseName:   abuse
OrgAbusePhone:  +1-919-319-8167 
OrgAbuseEmail:  abuse@att.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE7-ARIN

OrgTechHandle: ZS44-ARIN
OrgTechName:   IPAdmin-ATT Internet Services
OrgTechPhone:  +1-888-510-5545 
OrgTechEmail:  ipadmin@semail.att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ZS44-ARIN

OrgRoutingHandle: ROUTI59-ARIN
OrgRoutingName:   Routing POC
OrgRoutingPhone:  +1-999-999-9999 
OrgRoutingEmail:  routing_poc@att.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ROUTI59-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.233.246.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51483
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;162.233.246.199.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031900 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 19 19:23:01 CST 2026
;; MSG SIZE  rcvd: 108
Host info
199.246.233.162.in-addr.arpa domain name pointer 162-233-246-199.lightspeed.irvnca.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
199.246.233.162.in-addr.arpa	name = 162-233-246-199.lightspeed.irvnca.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
110.169.80.155 attackbots
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 05:26:10
83.48.29.116 attack
Aug  5 21:09:22 tuxlinux sshd[13554]: Invalid user suroy from 83.48.29.116 port 34638
Aug  5 21:09:22 tuxlinux sshd[13554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.48.29.116 
Aug  5 21:09:22 tuxlinux sshd[13554]: Invalid user suroy from 83.48.29.116 port 34638
Aug  5 21:09:22 tuxlinux sshd[13554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.48.29.116 
Aug  5 21:09:22 tuxlinux sshd[13554]: Invalid user suroy from 83.48.29.116 port 34638
Aug  5 21:09:22 tuxlinux sshd[13554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.48.29.116 
Aug  5 21:09:24 tuxlinux sshd[13554]: Failed password for invalid user suroy from 83.48.29.116 port 34638 ssh2
...
2019-08-06 05:19:48
110.50.84.133 attackbotsspam
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 05:18:03
159.65.255.153 attack
Aug  5 17:54:16 MK-Soft-VM7 sshd\[12393\]: Invalid user oleg from 159.65.255.153 port 48248
Aug  5 17:54:16 MK-Soft-VM7 sshd\[12393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.255.153
Aug  5 17:54:18 MK-Soft-VM7 sshd\[12393\]: Failed password for invalid user oleg from 159.65.255.153 port 48248 ssh2
...
2019-08-06 05:20:23
109.224.11.170 attackspam
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 05:34:16
110.74.222.102 attackbots
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 05:14:24
109.188.79.159 attackspambots
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 05:36:56
110.232.83.115 attackspam
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 05:08:17
110.74.221.75 attack
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 05:15:39
110.50.86.45 attackspam
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 05:17:15
109.229.45.146 attackspam
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 05:32:56
110.76.149.22 attackbots
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 05:13:17
110.44.112.166 attack
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 05:18:18
110.74.143.218 attackspambots
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 05:16:17
110.17.188.30 attack
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 05:28:04

Recently Reported IPs

2606:4700:10::6814:9865 219.156.176.247 161.156.135.44 159.226.56.62
158.42.246.155 202.47.56.144 2606:4700:10::6814:8859 2606:4700:10::ac43:1565
2606:4700:10::6814:7448 2606:4700:10::6816:4921 2606:4700:10::6814:7901 2606:4700:10::6814:4496
2606:4700:10::6816:3042 2606:4700:10::6816:270 2606:4700:10::6816:411d 2606:4700:10::6814:9510
2606:4700:10::6814:9314 2606:4700:10::6816:4237 164.155.74.140 157.250.228.126