Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       216.132.0.0 - 216.133.223.255
CIDR:           216.133.192.0/19, 216.133.0.0/17, 216.133.128.0/18, 216.132.0.0/16
NetName:        MEGAPATH-BLK-11
NetHandle:      NET-216-132-0-0-1
Parent:         NET216 (NET-216-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   GTT Americas, LLC (GAL-104)
RegDate:        1998-11-18
Updated:        2025-05-07
Ref:            https://rdap.arin.net/registry/ip/216.132.0.0


OrgName:        GTT Americas, LLC
OrgId:          GAL-104
Address:        4201 Wilson Blvd -Suite 504
City:           Arlington
StateProv:      VA
PostalCode:     22203
Country:        US
RegDate:        2025-02-11
Updated:        2025-07-08
Ref:            https://rdap.arin.net/registry/entity/GAL-104


OrgTechHandle: GLD5-ARIN
OrgTechName:   GTT Legal Departement
OrgTechPhone:  +359886606 
OrgTechEmail:  alexander.mutafchiyski@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/GLD5-ARIN

OrgNOCHandle: GNOC16-ARIN
OrgNOCName:   GTT Network Operations Center
OrgNOCPhone:  +1-703-442-5500 
OrgNOCEmail:  noc@gtt.net
OrgNOCRef:    https://rdap.arin.net/registry/entity/GNOC16-ARIN

OrgTechHandle: AS3251-ARIN
OrgTechName:   AS3257 Netguard
OrgTechPhone:  +49 69 48007422 
OrgTechEmail:  netguard@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AS3251-ARIN

OrgTechHandle: GIT5-ARIN
OrgTechName:   GTT IPAM Team
OrgTechPhone:  +1-703-442-5500 
OrgTechEmail:  netguard@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/GIT5-ARIN

OrgAbuseHandle: GAD46-ARIN
OrgAbuseName:   GTT Abuse Department
OrgAbusePhone:  +1-703-442-5501 
OrgAbuseEmail:  abuse@gtt.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/GAD46-ARIN

# end


# start

NetRange:       216.133.148.0 - 216.133.148.255
CIDR:           216.133.148.0/24
NetName:        BUNNY1-ARIN-GTT
NetHandle:      NET-216-133-148-0-1
Parent:         MEGAPATH-BLK-11 (NET-216-132-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Bunny Communications (BCL-435)
RegDate:        2025-05-28
Updated:        2026-03-26
Comment:        Geofeed https://bunnycommunications.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/ip/216.133.148.0


OrgName:        Bunny Communications
OrgId:          BCL-435
Address:        5 Brewster Street,#2039
City:           Glen Cove
StateProv:      NY
PostalCode:     11542
Country:        US
RegDate:        2021-05-26
Updated:        2025-09-27
Ref:            https://rdap.arin.net/registry/entity/BCL-435


OrgTechHandle: BUNNY1-ARIN
OrgTechName:   Bunny Communications 
OrgTechPhone:  +1-424-230-4992 
OrgTechEmail:  admin@bunnycommunications.com
OrgTechRef:    https://rdap.arin.net/registry/entity/BUNNY1-ARIN

OrgRoutingHandle: BUNNY1-ARIN
OrgRoutingName:   Bunny Communications 
OrgRoutingPhone:  +1-424-230-4992 
OrgRoutingEmail:  admin@bunnycommunications.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/BUNNY1-ARIN

OrgNOCHandle: BUNNY1-ARIN
OrgNOCName:   Bunny Communications 
OrgNOCPhone:  +1-424-230-4992 
OrgNOCEmail:  admin@bunnycommunications.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/BUNNY1-ARIN

OrgDNSHandle: BUNNY1-ARIN
OrgDNSName:   Bunny Communications 
OrgDNSPhone:  +1-424-230-4992 
OrgDNSEmail:  admin@bunnycommunications.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/BUNNY1-ARIN

OrgAbuseHandle: ABUSE9421-ARIN
OrgAbuseName:   abuse
OrgAbusePhone:  +1-310-728-7815 
OrgAbuseEmail:  abuse@bunnycommunications.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9421-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.133.148.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51090
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.133.148.253.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041400 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 14 18:26:41 CST 2026
;; MSG SIZE  rcvd: 108
Host info
b'Host 253.148.133.216.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 253.148.133.216.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
198.143.155.140 attackbotsspam
Port scan: Attack repeated for 24 hours
2020-06-01 08:09:50
222.255.114.251 attackspambots
Jun  1 01:26:14 OPSO sshd\[27111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.255.114.251  user=root
Jun  1 01:26:16 OPSO sshd\[27111\]: Failed password for root from 222.255.114.251 port 25009 ssh2
Jun  1 01:28:33 OPSO sshd\[27664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.255.114.251  user=root
Jun  1 01:28:35 OPSO sshd\[27664\]: Failed password for root from 222.255.114.251 port 25538 ssh2
Jun  1 01:30:56 OPSO sshd\[28292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.255.114.251  user=root
2020-06-01 08:20:09
187.12.181.106 attackspambots
5x Failed Password
2020-06-01 08:10:35
61.91.164.142 attackspambots
(imapd) Failed IMAP login from 61.91.164.142 (TH/Thailand/61-91-164-142.static.asianet.co.th): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jun  1 00:52:53 ir1 dovecot[2885757]: imap-login: Disconnected (auth failed, 1 attempts in 53 secs): user=, method=PLAIN, rip=61.91.164.142, lip=5.63.12.44, session=
2020-06-01 07:52:59
45.95.168.177 attackspam
SmallBizIT.US 1 packets to tcp(23)
2020-06-01 07:59:32
123.16.193.41 attackbotsspam
2020-05-3122:21:151jfUSG-0005m0-5T\<=info@whatsup2013.chH=\(localhost\)[123.21.250.86]:1341P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3010id=8d0fecbfb49f4a46612492c135f278744716e7e0@whatsup2013.chT="tokraiglumley420"forkraiglumley420@gmail.comarthurusstock2001@yahoo.comkc413906@gmail.com2020-05-3122:21:361jfUSd-0005pA-1V\<=info@whatsup2013.chH=\(localhost\)[123.20.185.185]:59805P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3037id=821ea8fbf0dbf1f96560d67a9de9c3df7703b4@whatsup2013.chT="toheronemus19"forheronemus19@gmail.comddixonpres@outlook.comgodwinagaba33@gmail.com2020-05-3122:20:281jfURU-0005gY-Fv\<=info@whatsup2013.chH=\(localhost\)[123.16.193.41]:50307P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3016id=05ac44171c37e2eec98c3a699d5ad0dcefddb3fc@whatsup2013.chT="tosiaslina422"forsiaslina422@gmail.commatthewjones.15@gmail.commoncef38annaba@gmail.com2020-05-3122:22:4
2020-06-01 07:58:48
134.175.219.41 attackspam
2020-05-31T22:16:11.979733tekno.at sshd[6668]: Failed password for root from 134.175.219.41 port 23312 ssh2
2020-05-31T22:21:54.648969tekno.at sshd[7196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.219.41  user=root
2020-05-31T22:21:56.856118tekno.at sshd[7196]: Failed password for root from 134.175.219.41 port 27125 ssh2
...
2020-06-01 08:24:28
122.226.134.41 attack
May 31 16:00:57 mockhub sshd[21709]: Failed password for root from 122.226.134.41 port 40907 ssh2
...
2020-06-01 07:45:52
163.172.60.213 attack
Automatic report - XMLRPC Attack
2020-06-01 08:19:35
138.68.253.149 attackbots
SASL PLAIN auth failed: ruser=...
2020-06-01 08:19:54
106.13.107.13 attack
SSH/22 MH Probe, BF, Hack -
2020-06-01 08:25:12
185.176.27.162 attack
05/31/2020-19:51:31.643074 185.176.27.162 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-01 08:08:35
149.56.44.101 attack
409. On May 31 2020 experienced a Brute Force SSH login attempt -> 2 unique times by 149.56.44.101.
2020-06-01 08:12:49
61.211.199.115 attack
Port probing on unauthorized port 23
2020-06-01 07:47:50
222.186.30.218 attackbotsspam
Jun  1 02:22:35 home sshd[3407]: Failed password for root from 222.186.30.218 port 48791 ssh2
Jun  1 02:22:38 home sshd[3407]: Failed password for root from 222.186.30.218 port 48791 ssh2
Jun  1 02:22:40 home sshd[3407]: Failed password for root from 222.186.30.218 port 48791 ssh2
...
2020-06-01 08:25:47

Recently Reported IPs

121.234.219.94 2606:4700:10::6816:2726 2606:4700:10::ac43:931 20.251.194.232
207.2.120.253 35.241.211.198 2606:4700:10::6814:7204 2606:4700:10::6816:3903
2606:4700:10::6814:5746 2606:4700:10::6816:2760 2606:4700:10::6814:4460 2606:4700:10::6814:4394
2606:4700:10::6816:1024 98.223.229.9 38.54.3.108 120.82.65.217
44.209.43.227 20.168.127.123 110.78.158.159 2606:4700:10::ac43:688