Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Iowa

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       216.81.128.0 - 216.81.255.255
CIDR:           216.81.128.0/17
NetName:        LIGHTEDGE-BLK-001
NetHandle:      NET-216-81-128-0-1
Parent:         NET216 (NET-216-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   LightEdge Solutions (LIGHT-41)
RegDate:        1998-09-25
Updated:        2012-02-24
Comment:        ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref:            https://rdap.arin.net/registry/ip/216.81.128.0


OrgName:        LightEdge Solutions
OrgId:          LIGHT-41
Address:        909 Locust Street
Address:        Suite 301
City:           Des Moines
StateProv:      IA
PostalCode:     50309
Country:        US
RegDate:        2006-12-28
Updated:        2018-09-13
Ref:            https://rdap.arin.net/registry/entity/LIGHT-41

ReferralServer:  rwhois://rwhois.lh.net:4321

OrgTechHandle: IL68-ARIN
OrgTechName:   LightEdge Hostmaster
OrgTechPhone:  +1-515-471-1000 
OrgTechEmail:  hostmaster@lightedge.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IL68-ARIN

OrgNOCHandle: LIGHT71-ARIN
OrgNOCName:   LightEdge NOC
OrgNOCPhone:  +1-515-471-1000 
OrgNOCEmail:  support@lightedge.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/LIGHT71-ARIN

OrgAbuseHandle: LIGHT7-ARIN
OrgAbuseName:   LightEdge Abuse
OrgAbusePhone:  +1-515-471-1000 
OrgAbuseEmail:  abuse@lightedge.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LIGHT7-ARIN

# end


# start

NetRange:       216.81.245.0 - 216.81.245.255
CIDR:           216.81.245.0/24
NetName:        MASSEDCOMPUTE-05
NetHandle:      NET-216-81-245-0-1
Parent:         LIGHTEDGE-BLK-001 (NET-216-81-128-0-1)
NetType:        Reassigned
OriginAS:       
Organization:   Massed Compute (MCL-2382)
RegDate:        2026-03-09
Updated:        2026-03-09
Comment:        https://massedcompute.com/
Ref:            https://rdap.arin.net/registry/ip/216.81.245.0


OrgName:        Massed Compute
OrgId:          MCL-2382
Address:        101 Convention Center Dr., Suite 900
City:           Las Vegas
StateProv:      NV
PostalCode:     89109
Country:        US
RegDate:        2022-08-12
Updated:        2026-02-12
Ref:            https://rdap.arin.net/registry/entity/MCL-2382


OrgNOCHandle: TECHN2019-ARIN
OrgNOCName:   technical
OrgNOCPhone:  +1-316-210-1178 
OrgNOCEmail:  techadmin@massedcompute.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/TECHN2019-ARIN

OrgAbuseHandle: ABUSE9536-ARIN
OrgAbuseName:   abuse
OrgAbusePhone:  +1-316-210-1178 
OrgAbuseEmail:  abuse@massedcompute.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9536-ARIN

OrgTechHandle: TECHN2019-ARIN
OrgTechName:   technical
OrgTechPhone:  +1-316-210-1178 
OrgTechEmail:  techadmin@massedcompute.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TECHN2019-ARIN

OrgRoutingHandle: TECHN2019-ARIN
OrgRoutingName:   technical
OrgRoutingPhone:  +1-316-210-1178 
OrgRoutingEmail:  techadmin@massedcompute.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/TECHN2019-ARIN

OrgDNSHandle: TECHN2019-ARIN
OrgDNSName:   technical
OrgDNSPhone:  +1-316-210-1178 
OrgDNSEmail:  techadmin@massedcompute.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/TECHN2019-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.lh.net:4321.

%rwhois V-1.5 rwhois.lightedge.com (rwhoisd 0.4.1)
network:id:LIGHTEDGE-BLK-001
network:class-name:network
network:network-name:LIGHTEDGE-BLK-001
network:ip-network:216.81.128.0/17
network:org-name:LightEdge Solutions, Inc.
network:street-address:666 Walnut Street
network:city:Des Moines
network:state:IA
network:postal-code:50309
network:country-code:US
network:tech-contact:support@lightedge.com
network:created:20010101
network:updated:20030101
network:updated-by:support@lightedge.com

%ok
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.81.245.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35465
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.81.245.108.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041701 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 17 14:31:04 CST 2026
;; MSG SIZE  rcvd: 107
Host info
108.245.81.216.in-addr.arpa domain name pointer ip108.gazettecommunications.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
108.245.81.216.in-addr.arpa	name = ip108.gazettecommunications.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
196.0.113.214 attackbots
Aug 27 11:46:39 mail.srvfarm.net postfix/smtpd[1519780]: warning: unknown[196.0.113.214]: SASL PLAIN authentication failed: 
Aug 27 11:46:40 mail.srvfarm.net postfix/smtpd[1519780]: lost connection after AUTH from unknown[196.0.113.214]
Aug 27 11:49:24 mail.srvfarm.net postfix/smtpd[1519775]: warning: unknown[196.0.113.214]: SASL PLAIN authentication failed: 
Aug 27 11:49:25 mail.srvfarm.net postfix/smtpd[1519775]: lost connection after AUTH from unknown[196.0.113.214]
Aug 27 11:55:49 mail.srvfarm.net postfix/smtpd[1519776]: warning: unknown[196.0.113.214]: SASL PLAIN authentication failed:
2020-08-28 07:06:13
51.75.28.134 attackspambots
Invalid user ee from 51.75.28.134 port 41116
2020-08-28 06:59:24
213.195.222.60 attackspam
Aug 27 06:13:14 mail.srvfarm.net postfix/smtps/smtpd[1382760]: warning: unknown[213.195.222.60]: SASL PLAIN authentication failed: 
Aug 27 06:13:14 mail.srvfarm.net postfix/smtps/smtpd[1382760]: lost connection after AUTH from unknown[213.195.222.60]
Aug 27 06:13:57 mail.srvfarm.net postfix/smtps/smtpd[1382766]: warning: unknown[213.195.222.60]: SASL PLAIN authentication failed: 
Aug 27 06:13:57 mail.srvfarm.net postfix/smtps/smtpd[1382766]: lost connection after AUTH from unknown[213.195.222.60]
Aug 27 06:15:11 mail.srvfarm.net postfix/smtps/smtpd[1382747]: warning: unknown[213.195.222.60]: SASL PLAIN authentication failed:
2020-08-28 07:03:58
121.122.99.187 attackbots
Automatic report - Port Scan Attack
2020-08-28 06:46:04
222.186.169.192 attackbotsspam
Aug 27 22:30:29 rush sshd[5121]: Failed password for root from 222.186.169.192 port 15702 ssh2
Aug 27 22:30:33 rush sshd[5121]: Failed password for root from 222.186.169.192 port 15702 ssh2
Aug 27 22:30:36 rush sshd[5121]: Failed password for root from 222.186.169.192 port 15702 ssh2
Aug 27 22:30:40 rush sshd[5121]: Failed password for root from 222.186.169.192 port 15702 ssh2
...
2020-08-28 06:32:25
111.93.71.219 attack
2020-08-27T21:19:01.754911shield sshd\[21874\]: Invalid user deploy from 111.93.71.219 port 60682
2020-08-27T21:19:01.794423shield sshd\[21874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.71.219
2020-08-27T21:19:03.749817shield sshd\[21874\]: Failed password for invalid user deploy from 111.93.71.219 port 60682 ssh2
2020-08-27T21:22:58.973378shield sshd\[23106\]: Invalid user demo from 111.93.71.219 port 35226
2020-08-27T21:22:59.024381shield sshd\[23106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.71.219
2020-08-28 07:02:19
211.108.69.103 attackspam
Aug 28 00:25:15 santamaria sshd\[927\]: Invalid user sdk from 211.108.69.103
Aug 28 00:25:16 santamaria sshd\[927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.108.69.103
Aug 28 00:25:17 santamaria sshd\[927\]: Failed password for invalid user sdk from 211.108.69.103 port 60568 ssh2
...
2020-08-28 07:04:29
159.65.145.160 attack
C1,WP GET /tim-und-struppi/test/wp-login.php
2020-08-28 06:42:07
189.89.185.254 attackspambots
Port probing on unauthorized port 445
2020-08-28 06:48:20
203.249.17.86 attack
Aug 27 23:40:48 plg sshd[26959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.249.17.86 
Aug 27 23:40:49 plg sshd[26959]: Failed password for invalid user user from 203.249.17.86 port 58458 ssh2
Aug 27 23:44:15 plg sshd[26985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.249.17.86  user=root
Aug 27 23:44:17 plg sshd[26985]: Failed password for invalid user root from 203.249.17.86 port 46516 ssh2
Aug 27 23:47:34 plg sshd[27011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.249.17.86  user=root
Aug 27 23:47:36 plg sshd[27011]: Failed password for invalid user root from 203.249.17.86 port 34572 ssh2
...
2020-08-28 06:41:39
141.98.10.195 attackbotsspam
2020-08-27T02:27:49.614386correo.[domain] sshd[4647]: Invalid user 1234 from 141.98.10.195 port 56016 2020-08-27T02:27:52.155130correo.[domain] sshd[4647]: Failed password for invalid user 1234 from 141.98.10.195 port 56016 ssh2 2020-08-27T02:28:30.221792correo.[domain] sshd[4756]: Invalid user user from 141.98.10.195 port 43906 ...
2020-08-28 06:58:54
192.241.225.90 attackspam
Honeypot hit: [2020-08-28 00:07:44 +0300] Connected from 192.241.225.90 to (HoneypotIP):995
2020-08-28 06:38:50
190.194.152.238 attack
Invalid user josiane from 190.194.152.238 port 60234
2020-08-28 06:35:31
107.174.245.4 attackspambots
Aug 27 22:17:39 jumpserver sshd[58901]: Invalid user flf from 107.174.245.4 port 46714
Aug 27 22:17:41 jumpserver sshd[58901]: Failed password for invalid user flf from 107.174.245.4 port 46714 ssh2
Aug 27 22:22:56 jumpserver sshd[58953]: Invalid user xff from 107.174.245.4 port 53824
...
2020-08-28 06:40:35
161.35.193.16 attack
SSH Invalid Login
2020-08-28 06:44:39

Recently Reported IPs

2606:4700:10::6814:8297 2606:4700:10::6816:2612 2606:4700:10::6814:8986 2606:4700:10::6816:3393
110.77.226.6 2606:4700:10::6814:9100 83.89.180.168 109.162.246.133
2606:4700:10::ac43:1876 2606:4700:10::6814:5083 2606:4700:10::6816:2288 2606:4700:10::6816:2440
2606:4700:10::6814:8471 128.121.58.66 139.60.162.211 202.58.242.242
2606:4700:10::6814:8153 2606:4700:10::6816:2904 8.217.251.77 93.119.183.62