Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Wyoming

Region: Illinois

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       198.100.48.0 - 198.100.63.255
CIDR:           198.100.48.0/20
NetName:        NEXTLINK
NetHandle:      NET-198-100-48-0-1
Parent:         NET198 (NET-198-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Nextlink Broadband (ATIGL)
RegDate:        2012-07-05
Updated:        2026-03-24
Comment:        Geofeed: https://geofeed2.nxlink.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/ip/198.100.48.0


OrgName:        Nextlink Broadband
OrgId:          ATIGL
Address:        95 Parker Oaks Lane
City:           Hudson Oaks
StateProv:      TX
PostalCode:     76087
Country:        US
RegDate:        2012-04-04
Updated:        2025-09-10
Ref:            https://rdap.arin.net/registry/entity/ATIGL


OrgDNSHandle: PMR12-ARIN
OrgDNSName:   Robbins, Peter Michael
OrgDNSPhone:  +1-855-698-5465 
OrgDNSEmail:  probbins@team.nxlink.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/PMR12-ARIN

OrgAbuseHandle: ABUSE5264-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-855-698-5465 
OrgAbuseEmail:  abuse@team.nxlink.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE5264-ARIN

OrgTechHandle: ANDER2361-ARIN
OrgTechName:   Anderson, Cody 
OrgTechPhone:  +1-817-771-6540 
OrgTechEmail:  canderson@team.nxlink.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ANDER2361-ARIN

OrgRoutingHandle: PMR12-ARIN
OrgRoutingName:   Robbins, Peter Michael
OrgRoutingPhone:  +1-855-698-5465 
OrgRoutingEmail:  probbins@team.nxlink.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/PMR12-ARIN

OrgTechHandle: PMR12-ARIN
OrgTechName:   Robbins, Peter Michael
OrgTechPhone:  +1-855-698-5465 
OrgTechEmail:  probbins@team.nxlink.com
OrgTechRef:    https://rdap.arin.net/registry/entity/PMR12-ARIN

OrgRoutingHandle: ANDER2361-ARIN
OrgRoutingName:   Anderson, Cody 
OrgRoutingPhone:  +1-817-771-6540 
OrgRoutingEmail:  canderson@team.nxlink.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ANDER2361-ARIN

OrgNOCHandle: DNO96-ARIN
OrgNOCName:   Director of network operations
OrgNOCPhone:  +1-855-698-5465 
OrgNOCEmail:  netops@team.nxlink.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/DNO96-ARIN

OrgTechHandle: DNO96-ARIN
OrgTechName:   Director of network operations
OrgTechPhone:  +1-855-698-5465 
OrgTechEmail:  netops@team.nxlink.com
OrgTechRef:    https://rdap.arin.net/registry/entity/DNO96-ARIN

OrgNOCHandle: PMR12-ARIN
OrgNOCName:   Robbins, Peter Michael
OrgNOCPhone:  +1-855-698-5465 
OrgNOCEmail:  probbins@team.nxlink.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/PMR12-ARIN

OrgDNSHandle: ANDER2361-ARIN
OrgDNSName:   Anderson, Cody 
OrgDNSPhone:  +1-817-771-6540 
OrgDNSEmail:  canderson@team.nxlink.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/ANDER2361-ARIN

OrgTechHandle: CCK6-ARIN
OrgTechName:   Kilton, Cameron C
OrgTechPhone:  +1-207-210-3654 
OrgTechEmail:  cam@nextlink.team
OrgTechRef:    https://rdap.arin.net/registry/entity/CCK6-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.100.58.65
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62781
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.100.58.65.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051301 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 14 07:24:40 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 65.58.100.198.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 65.58.100.198.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
118.24.121.240 attack
Nov 15 04:23:58 eddieflores sshd\[10505\]: Invalid user 2w3e4r from 118.24.121.240
Nov 15 04:23:58 eddieflores sshd\[10505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.121.240
Nov 15 04:23:59 eddieflores sshd\[10505\]: Failed password for invalid user 2w3e4r from 118.24.121.240 port 44316 ssh2
Nov 15 04:29:48 eddieflores sshd\[10987\]: Invalid user harben from 118.24.121.240
Nov 15 04:29:48 eddieflores sshd\[10987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.121.240
2019-11-15 22:36:51
189.213.123.237 attackbotsspam
Automatic report - Port Scan Attack
2019-11-15 23:09:17
159.203.43.127 attack
Scanning
2019-11-15 22:52:30
185.5.250.203 attackspambots
Nov 15 14:43:57   TCP Attack: SRC=185.5.250.203 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=243  PROTO=TCP SPT=50192 DPT=3039 WINDOW=1024 RES=0x00 SYN URGP=0
2019-11-15 22:57:51
164.132.47.139 attackbots
Nov 15 13:32:35 ns382633 sshd\[7750\]: Invalid user varlet from 164.132.47.139 port 36640
Nov 15 13:32:35 ns382633 sshd\[7750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.47.139
Nov 15 13:32:37 ns382633 sshd\[7750\]: Failed password for invalid user varlet from 164.132.47.139 port 36640 ssh2
Nov 15 13:56:41 ns382633 sshd\[12222\]: Invalid user katlin from 164.132.47.139 port 35606
Nov 15 13:56:41 ns382633 sshd\[12222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.47.139
2019-11-15 22:47:52
27.50.162.82 attack
Nov 15 15:45:51 vmanager6029 sshd\[26610\]: Invalid user zd from 27.50.162.82 port 48994
Nov 15 15:45:51 vmanager6029 sshd\[26610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.50.162.82
Nov 15 15:45:54 vmanager6029 sshd\[26610\]: Failed password for invalid user zd from 27.50.162.82 port 48994 ssh2
2019-11-15 22:57:10
180.120.231.97 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/180.120.231.97/ 
 
 CN - 1H : (786)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 180.120.231.97 
 
 CIDR : 180.120.0.0/14 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 ATTACKS DETECTED ASN4134 :  
  1H - 14 
  3H - 30 
  6H - 75 
 12H - 173 
 24H - 342 
 
 DateTime : 2019-11-15 15:45:59 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-15 22:50:18
46.101.206.205 attack
Nov 15 20:29:54 vibhu-HP-Z238-Microtower-Workstation sshd\[2517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.206.205  user=root
Nov 15 20:29:56 vibhu-HP-Z238-Microtower-Workstation sshd\[2517\]: Failed password for root from 46.101.206.205 port 36360 ssh2
Nov 15 20:34:51 vibhu-HP-Z238-Microtower-Workstation sshd\[2854\]: Invalid user vcsa from 46.101.206.205
Nov 15 20:34:51 vibhu-HP-Z238-Microtower-Workstation sshd\[2854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.206.205
Nov 15 20:34:52 vibhu-HP-Z238-Microtower-Workstation sshd\[2854\]: Failed password for invalid user vcsa from 46.101.206.205 port 44382 ssh2
...
2019-11-15 23:06:43
138.197.199.249 attack
Nov 15 15:42:42 meumeu sshd[10060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.199.249 
Nov 15 15:42:45 meumeu sshd[10060]: Failed password for invalid user thorsteinsen from 138.197.199.249 port 48292 ssh2
Nov 15 15:45:58 meumeu sshd[10479]: Failed password for root from 138.197.199.249 port 37908 ssh2
...
2019-11-15 22:49:04
203.210.84.117 attackbots
Unauthorized connection attempt from IP address 203.210.84.117 on Port 445(SMB)
2019-11-15 23:08:45
36.73.33.207 attackbotsspam
Unauthorized connection attempt from IP address 36.73.33.207 on Port 445(SMB)
2019-11-15 22:43:40
62.234.74.29 attackbots
Nov 15 04:40:22 hpm sshd\[13160\]: Invalid user alf from 62.234.74.29
Nov 15 04:40:22 hpm sshd\[13160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.74.29
Nov 15 04:40:24 hpm sshd\[13160\]: Failed password for invalid user alf from 62.234.74.29 port 35841 ssh2
Nov 15 04:45:52 hpm sshd\[13565\]: Invalid user sylviane from 62.234.74.29
Nov 15 04:45:52 hpm sshd\[13565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.74.29
2019-11-15 23:00:09
36.65.107.189 attackbots
Unauthorized connection attempt from IP address 36.65.107.189 on Port 445(SMB)
2019-11-15 22:39:08
27.155.83.174 attackspam
Nov 15 15:45:54 v22018076622670303 sshd\[30634\]: Invalid user guest3 from 27.155.83.174 port 57574
Nov 15 15:45:54 v22018076622670303 sshd\[30634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.155.83.174
Nov 15 15:45:56 v22018076622670303 sshd\[30634\]: Failed password for invalid user guest3 from 27.155.83.174 port 57574 ssh2
...
2019-11-15 22:54:59
110.39.165.81 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-15 23:06:03

Recently Reported IPs

156.235.89.236 2606:4700:10::6814:6303 172.86.114.117 103.152.113.33
43.156.55.246 2606:4700:10::ac43:1805 2606:4700:10::6814:4396 2606:4700:10::ac43:1634
218.151.38.93 172.236.15.113 91.231.89.47 91.231.89.46
91.196.152.239 47.95.192.145 192.109.200.204 2606:4700:10::6816:3970
2606:4700:10::6814:4474 2606:4700:10::6816:4236 39.100.84.10 216.180.246.12