Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cincinnati

Region: Ohio

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b'#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       208.102.0.0 - 208.102.255.255
CIDR:           208.102.0.0/16
NetName:        FUSE-NET-BLK-8
NetHandle:      NET-208-102-0-0-1
Parent:         NET208 (NET-208-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Altafiber (FIAI)
RegDate:        2006-03-01
Updated:        2012-03-02
Comment:        *** For Abuse Issues Call 513.565.9707 or Email abuse@fuse.net Please see rwhois.fuse.net:4321 for IP assignments. ***
Ref:            https://rdap.arin.net/registry/ip/208.102.0.0


OrgName:        Altafiber
OrgId:          FIAI
Address:        209 W. Seventh St.
City:           Cincinnati
StateProv:      OH
PostalCode:     45202
Country:        US
RegDate:        1998-09-11
Updated:        2025-07-09
Comment:        *** For Abuse Issues Call 513.565.9707 or Email
Comment:        abuse@fuse.net ****
Ref:            https://rdap.arin.net/registry/entity/FIAI

ReferralServer:  rwhois://rwhois.fuse.net:4321

OrgTechHandle: DPM35-ARIN
OrgTechName:   Murray, Daniel Patrick
OrgTechPhone:  +1-513-608-7126 
OrgTechEmail:  dan.murray@altafiber.com
OrgTechRef:    https://rdap.arin.net/registry/entity/DPM35-ARIN

OrgTechHandle: FIA-ORG-ARIN
OrgTechName:   Fuse Internet Access Operations Center
OrgTechPhone:  +1-800-387-3638 
OrgTechEmail:  hostmaster@fuse.net
OrgTechRef:    https://rdap.arin.net/registry/entity/FIA-ORG-ARIN

OrgTechHandle: MONAG27-ARIN
OrgTechName:   Monaghan, Robert 
OrgTechPhone:  +1-513-238-4723 
OrgTechEmail:  robert.monaghan@altafiber.com
OrgTechRef:    https://rdap.arin.net/registry/entity/MONAG27-ARIN

OrgNOCHandle: FIA-ORG-ARIN
OrgNOCName:   Fuse Internet Access Operations Center
OrgNOCPhone:  +1-800-387-3638 
OrgNOCEmail:  hostmaster@fuse.net
OrgNOCRef:    https://rdap.arin.net/registry/entity/FIA-ORG-ARIN

OrgTechHandle: MORRI1305-ARIN
OrgTechName:   Morris, William 
OrgTechPhone:  +1-513-835-0412 
OrgTechEmail:  william.morris@altafiber.com
OrgTechRef:    https://rdap.arin.net/registry/entity/MORRI1305-ARIN

OrgTechHandle: RONAN14-ARIN
OrgTechName:   Ronan, Eric 
OrgTechPhone:  +1-513-509-2517 
OrgTechEmail:  eric.ronan@altafiber.com
OrgTechRef:    https://rdap.arin.net/registry/entity/RONAN14-ARIN

OrgTechHandle: GOODW273-ARIN
OrgTechName:   Goodwin, Eric 
OrgTechPhone:  +1-513-265-2769 
OrgTechEmail:  eric.goodwin@altafiber.com
OrgTechRef:    https://rdap.arin.net/registry/entity/GOODW273-ARIN

OrgTechHandle: GSP36-ARIN
OrgTechName:   Pennington, Gregory Scott
OrgTechPhone:  +1-513-608-7516 
OrgTechEmail:  scott.pennington@cinbell.com
OrgTechRef:    https://rdap.arin.net/registry/entity/GSP36-ARIN

OrgAbuseHandle: FAT-ARIN
OrgAbuseName:   Fuse Internet Access Abuse Team
OrgAbusePhone:  +1-513-397-6598 
OrgAbuseEmail:  abuse@fuse.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/FAT-ARIN

RTechHandle: RW855-ARIN
RTechName:   Wagner, Rick 
RTechPhone:  +1-513-397-9796 
RTechEmail:  wagner@fuse.net
RTechRef:    https://rdap.arin.net/registry/entity/RW855-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.fuse.net:4321.

%rwhois V-1.5:003fff:00 rwhois.fuse.net (by Network Solutions, Inc. V-1.5.9.6)
network:Auth-Area:208.102.0.0/16
network:Class-Name:network
network:Network-Name:FUSE-BLK-208.102.112.0/20
network:IP-Network:208.102.112.0/20
network:IP-Network-Block:208.102.112.0 - 208.102.127.255
network:Org-Name:CINCINNATI BELL
network:Tech-Contact:FIA-ORG-ARIN
network:Street-Address:221 E 4TH ST
network:City:CINCINNATI
network:State:OH
network:Postal-Code:45202
network:Country-Code:US
network:Created:20230615203000
network:Updated:20230615203000
network:Updated-By:hostmaster@fuse.net

network:Auth-Area:208.102.0.0/16
network:Class-Name:network
network:Network-Name:FUSE-BLK-208.102.0.0/16
network:IP-Network:208.102.0.0/16
network:IP-Network-Block:208.102.0.0 - 208.102.255.255
network:Org-Name:Fuse Internet Access
network:Tech-Contact:FIA-ORG-ARIN
network:Street-Address:209 W 7th St - MS 121-550
network:City:Cincinnati
network:State:OH
network:Postal-Code:45202
network:Country-Code:US
network:Created:20070111140700
network:Updated:20070111140700
network:Updated-By:hostmaster@fuse.net

%referral rwhois://rwhois.fuse.net:4321/auth-area=208.102.0.0/16
%ok'
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.102.118.101
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42288
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;208.102.118.101.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041101 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 12:52:23 CST 2026
;; MSG SIZE  rcvd: 108
Host info
101.118.102.208.in-addr.arpa domain name pointer ip-208-102-118-101.dynamic.fuse.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
101.118.102.208.in-addr.arpa	name = ip-208-102-118-101.dynamic.fuse.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
173.252.127.41 attackbotsspam
[Wed Apr 01 04:30:35.810336 2020] [:error] [pid 20361:tid 140247698454272] [client 173.252.127.41:42494] [client 173.252.127.41] ModSecurity: Access denied with code 403 (phase 2). Match of "eq 0" against "&REQUEST_HEADERS:Transfer-Encoding" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "202"] [id "920171"] [msg "GET or HEAD Request with Transfer-Encoding."] [data "1"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/INVALID_HREQ"] [tag "CAPEC-272"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/image-loader-worker-v1.js"] [unique_id "XoO2e7FPZ-2JTpeNU@LYuQAAAAE"]
...
2020-04-01 06:54:38
190.199.71.42 attack
Unauthorized connection attempt from IP address 190.199.71.42 on Port 445(SMB)
2020-04-01 07:02:51
167.99.71.160 attackbots
Invalid user unk from 167.99.71.160 port 36096
2020-04-01 07:01:46
111.200.62.30 attack
Brute force SMTP login attempted.
...
2020-04-01 06:54:54
190.218.67.50 attack
port scan and connect, tcp 23 (telnet)
2020-04-01 07:02:05
14.215.47.223 attack
$f2bV_matches
2020-04-01 06:56:21
123.16.72.163 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 31-03-2020 22:30:18.
2020-04-01 07:21:28
222.186.175.23 attackspambots
03/31/2020-19:12:36.012391 222.186.175.23 Protocol: 6 ET SCAN Potential SSH Scan
2020-04-01 07:15:09
85.208.96.69 attackbotsspam
Automatic report - Banned IP Access
2020-04-01 06:50:14
138.68.250.76 attackspambots
Mar 31 23:30:25 debian-2gb-nbg1-2 kernel: \[7949276.993853\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=138.68.250.76 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=46785 PROTO=TCP SPT=50249 DPT=9401 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-01 07:08:15
139.99.105.138 attack
Invalid user jktest from 139.99.105.138 port 50762
2020-04-01 06:51:31
102.89.2.34 attack
(pop3d) Failed POP3 login from 102.89.2.34 (NG/Nigeria/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr  1 02:00:35 ir1 dovecot[566034]: pop3-login: Disconnected (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=102.89.2.34, lip=5.63.12.44, session=
2020-04-01 06:55:48
111.203.152.87 attackbotsspam
Brute force SMTP login attempted.
...
2020-04-01 06:52:00
220.132.202.210 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 31-03-2020 22:30:19.
2020-04-01 07:19:36
111.204.164.82 attackspam
Brute force SMTP login attempted.
...
2020-04-01 06:49:43

Recently Reported IPs

127.155.230.172 2606:4700:10::6814:7834 2606:4700:10::6814:5186 2606:4700:10::ac43:2186
2606:4700:10::6816:4011 2606:4700:10::6814:6950 2606:4700:10::6814:9893 2606:4700:10::6814:4370
122.192.203.137 2606:4700:10::6816:389 2606:4700:10::6814:9680 2606:4700:10::6814:8068
110.78.154.143 2606:4700:10::6814:8944 2606:4700:10::6814:6754 110.78.158.117
88.101.166.248 129.189.127.140 194.136.156.225 167.53.71.61