Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Patchogue

Region: New York

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       198.72.8.0 - 198.72.12.255
CIDR:           198.72.8.0/22, 198.72.12.0/24
NetName:        NETBLK-SUNYSUFFOLK
NetHandle:      NET-198-72-8-0-1
Parent:         NET198 (NET-198-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Suffolk County Community College (SCC-3)
RegDate:        1993-02-19
Updated:        2023-12-20
Ref:            https://rdap.arin.net/registry/ip/198.72.8.0


OrgName:        Suffolk County Community College
OrgId:          SCC-3
Address:        533 College Road,
City:           Selden
StateProv:      NY
PostalCode:     11784
Country:        US
RegDate:        1993-02-19
Updated:        2024-01-17
Ref:            https://rdap.arin.net/registry/entity/SCC-3


OrgTechHandle: GANNO235-ARIN
OrgTechName:   Gannon, John 
OrgTechPhone:  +1-631-451-4286 
OrgTechEmail:  gannonj@sunysuffolk.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/GANNO235-ARIN

OrgAbuseHandle: GANNO235-ARIN
OrgAbuseName:   Gannon, John 
OrgAbusePhone:  +1-631-451-4286 
OrgAbuseEmail:  gannonj@sunysuffolk.edu
OrgAbuseRef:    https://rdap.arin.net/registry/entity/GANNO235-ARIN

RTechHandle: GANNO235-ARIN
RTechName:   Gannon, John 
RTechPhone:  +1-631-451-4286 
RTechEmail:  gannonj@sunysuffolk.edu
RTechRef:    https://rdap.arin.net/registry/entity/GANNO235-ARIN

RNOCHandle: GANNO235-ARIN
RNOCName:   Gannon, John 
RNOCPhone:  +1-631-451-4286 
RNOCEmail:  gannonj@sunysuffolk.edu
RNOCRef:    https://rdap.arin.net/registry/entity/GANNO235-ARIN

RAbuseHandle: GANNO235-ARIN
RAbuseName:   Gannon, John 
RAbusePhone:  +1-631-451-4286 
RAbuseEmail:  gannonj@sunysuffolk.edu
RAbuseRef:    https://rdap.arin.net/registry/entity/GANNO235-ARIN

# end


# start

NetRange:       198.72.9.0 - 198.72.9.255
CIDR:           198.72.9.0/24
NetName:        SUNYSUFFOLK9
NetHandle:      NET-198-72-9-0-1
Parent:         NETBLK-SUNYSUFFOLK (NET-198-72-8-0-1)
NetType:        Reassigned
OriginAS:       
Organization:   Suffolk County Community College (SCC-3)
RegDate:        1993-02-19
Updated:        2023-12-20
Ref:            https://rdap.arin.net/registry/ip/198.72.9.0



OrgName:        Suffolk County Community College
OrgId:          SCC-3
Address:        533 College Road,
City:           Selden
StateProv:      NY
PostalCode:     11784
Country:        US
RegDate:        1993-02-19
Updated:        2024-01-17
Ref:            https://rdap.arin.net/registry/entity/SCC-3


OrgTechHandle: GANNO235-ARIN
OrgTechName:   Gannon, John 
OrgTechPhone:  +1-631-451-4286 
OrgTechEmail:  gannonj@sunysuffolk.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/GANNO235-ARIN

OrgAbuseHandle: GANNO235-ARIN
OrgAbuseName:   Gannon, John 
OrgAbusePhone:  +1-631-451-4286 
OrgAbuseEmail:  gannonj@sunysuffolk.edu
OrgAbuseRef:    https://rdap.arin.net/registry/entity/GANNO235-ARIN

RTechHandle: GANNO235-ARIN
RTechName:   Gannon, John 
RTechPhone:  +1-631-451-4286 
RTechEmail:  gannonj@sunysuffolk.edu
RTechRef:    https://rdap.arin.net/registry/entity/GANNO235-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.72.9.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65321
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.72.9.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031801 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 19 01:34:35 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 139.9.72.198.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.9.72.198.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.162.166.6 attackspam
Aug  6 07:23:56 web1 postfix/smtpd[20327]: warning: unknown[188.162.166.6]: SASL LOGIN authentication failed: authentication failure
...
2019-08-06 20:45:29
93.56.21.228 attackspam
Aug  6 16:29:36 server sshd\[24223\]: Invalid user network from 93.56.21.228 port 48260
Aug  6 16:29:36 server sshd\[24223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.56.21.228
Aug  6 16:29:38 server sshd\[24223\]: Failed password for invalid user network from 93.56.21.228 port 48260 ssh2
Aug  6 16:36:22 server sshd\[27734\]: Invalid user remove from 93.56.21.228 port 42236
Aug  6 16:36:22 server sshd\[27734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.56.21.228
2019-08-06 21:40:22
149.56.44.47 attackspambots
" "
2019-08-06 21:36:53
87.97.76.16 attackbotsspam
Aug  6 12:07:57 localhost sshd\[14143\]: Invalid user cap from 87.97.76.16 port 46143
Aug  6 12:07:57 localhost sshd\[14143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.97.76.16
Aug  6 12:07:59 localhost sshd\[14143\]: Failed password for invalid user cap from 87.97.76.16 port 46143 ssh2
Aug  6 12:13:57 localhost sshd\[14367\]: Invalid user noob from 87.97.76.16 port 44091
Aug  6 12:13:57 localhost sshd\[14367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.97.76.16
...
2019-08-06 20:28:54
113.116.50.126 attackspam
Aug  6 16:05:21 www4 sshd\[35639\]: Invalid user mailman from 113.116.50.126
Aug  6 16:05:21 www4 sshd\[35639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.116.50.126
Aug  6 16:05:23 www4 sshd\[35639\]: Failed password for invalid user mailman from 113.116.50.126 port 49722 ssh2
...
2019-08-06 21:21:27
158.69.110.31 attackbots
Automatic report - Banned IP Access
2019-08-06 21:09:58
179.111.82.219 attack
port scan and connect, tcp 23 (telnet)
2019-08-06 21:22:34
41.90.8.14 attack
Aug  6 15:22:33 yabzik sshd[28593]: Failed password for irc from 41.90.8.14 port 37288 ssh2
Aug  6 15:29:16 yabzik sshd[30552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.90.8.14
Aug  6 15:29:19 yabzik sshd[30552]: Failed password for invalid user ts3 from 41.90.8.14 port 33532 ssh2
2019-08-06 20:33:42
23.129.64.191 attackbotsspam
" "
2019-08-06 20:55:17
27.10.28.197 attackspam
Aug  6 13:23:38 ubuntu-2gb-fsn1-1 sshd[21396]: Failed password for root from 27.10.28.197 port 51384 ssh2
Aug  6 13:23:51 ubuntu-2gb-fsn1-1 sshd[21396]: error: maximum authentication attempts exceeded for root from 27.10.28.197 port 51384 ssh2 [preauth]
...
2019-08-06 20:47:48
125.165.44.197 attackbots
Aug  6 13:23:29 [munged] sshd[4115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.165.44.197  user=support
Aug  6 13:23:31 [munged] sshd[4115]: Failed password for support from 125.165.44.197 port 59143 ssh2
2019-08-06 20:56:10
36.110.118.72 attackspambots
Aug  6 11:24:09 *** sshd[30015]: Invalid user ymg from 36.110.118.72
2019-08-06 20:37:40
164.39.34.228 attackbotsspam
" "
2019-08-06 20:31:56
5.249.144.206 attack
Aug  6 13:19:47 root sshd[17044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.144.206 
Aug  6 13:19:49 root sshd[17044]: Failed password for invalid user laureen from 5.249.144.206 port 56450 ssh2
Aug  6 13:24:09 root sshd[17079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.144.206 
...
2019-08-06 20:38:04
45.247.143.194 attackbots
3389BruteforceIDS
2019-08-06 20:54:58

Recently Reported IPs

45.156.129.195 51.91.165.10 198.202.255.217 82.27.17.146
56.42.185.171 110.77.187.11 2606:4700:10::ac43:173e 2606:4700:10::6814:8687
2606:4700:10::ac43:1115 2606:4700:10::6814:6218 110.77.248.39 2606:4700:10::6814:7273
2606:4700:10::6814:8526 2606:4700:10::6816:113 2606:4700:10::ac43:1256 2606:4700:10::6814:7673
14.207.194.70 2606:4700:10::6814:6081 109.167.82.38 2606:4700:10::6814:9757