Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Iowa

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b'#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       216.81.128.0 - 216.81.255.255
CIDR:           216.81.128.0/17
NetName:        LIGHTEDGE-BLK-001
NetHandle:      NET-216-81-128-0-1
Parent:         NET216 (NET-216-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   LightEdge Solutions (LIGHT-41)
RegDate:        1998-09-25
Updated:        2012-02-24
Comment:        ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref:            https://rdap.arin.net/registry/ip/216.81.128.0


OrgName:        LightEdge Solutions
OrgId:          LIGHT-41
Address:        909 Locust Street
Address:        Suite 301
City:           Des Moines
StateProv:      IA
PostalCode:     50309
Country:        US
RegDate:        2006-12-28
Updated:        2018-09-13
Ref:            https://rdap.arin.net/registry/entity/LIGHT-41

ReferralServer:  rwhois://rwhois.lh.net:4321

OrgNOCHandle: LIGHT71-ARIN
OrgNOCName:   LightEdge NOC
OrgNOCPhone:  +1-515-471-1000 
OrgNOCEmail:  support@lightedge.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/LIGHT71-ARIN

OrgAbuseHandle: LIGHT7-ARIN
OrgAbuseName:   LightEdge Abuse
OrgAbusePhone:  +1-515-471-1000 
OrgAbuseEmail:  abuse@lightedge.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LIGHT7-ARIN

OrgTechHandle: IL68-ARIN
OrgTechName:   LightEdge Hostmaster
OrgTechPhone:  +1-515-471-1000 
OrgTechEmail:  hostmaster@lightedge.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IL68-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.lh.net:4321.

%rwhois V-1.5 rwhois.lightedge.com (rwhoisd 0.4.1)
network:id:LIGHTEDGE-BLK-001
network:class-name:network
network:network-name:LIGHTEDGE-BLK-001
network:ip-network:216.81.128.0/17
network:org-name:LightEdge Solutions, Inc.
network:street-address:666 Walnut Street
network:city:Des Moines
network:state:IA
network:postal-code:50309
network:country-code:US
network:tech-contact:support@lightedge.com
network:created:20010101
network:updated:20030101
network:updated-by:support@lightedge.com

%ok'
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.81.248.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30287
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.81.248.205.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030801 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 09 14:30:52 CST 2026
;; MSG SIZE  rcvd: 107
Host info
205.248.81.216.in-addr.arpa domain name pointer ip205.kcy.lh-nap.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
205.248.81.216.in-addr.arpa	name = ip205.kcy.lh-nap.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
95.211.236.105 attackspam
Brute force SMTP login attempted.
...
2020-04-05 09:31:14
46.38.145.5 attackspam
(smtpauth) Failed SMTP AUTH login from 46.38.145.5 (GB/United Kingdom/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SMTPAUTH; Logs: 2020-04-05 03:56:24 login authenticator failed for (User) [46.38.145.5]: 535 Incorrect authentication data (set_id=li@forhosting.nl)
2020-04-05 03:56:30 login authenticator failed for (User) [46.38.145.5]: 535 Incorrect authentication data (set_id=li@forhosting.nl)
2020-04-05 03:56:53 login authenticator failed for (User) [46.38.145.5]: 535 Incorrect authentication data (set_id=zhambyl@forhosting.nl)
2020-04-05 03:57:00 login authenticator failed for (User) [46.38.145.5]: 535 Incorrect authentication data (set_id=zhambyl@forhosting.nl)
2020-04-05 03:57:23 login authenticator failed for (User) [46.38.145.5]: 535 Incorrect authentication data (set_id=honda@forhosting.nl)
2020-04-05 10:07:17
162.243.132.6 attack
trying to access non-authorized port
2020-04-05 09:57:55
159.203.27.146 attack
Apr  4 21:53:40 NPSTNNYC01T sshd[31093]: Failed password for root from 159.203.27.146 port 60276 ssh2
Apr  4 21:56:33 NPSTNNYC01T sshd[31414]: Failed password for root from 159.203.27.146 port 56826 ssh2
...
2020-04-05 10:00:37
196.52.43.95 attack
Brute force attack stopped by firewall
2020-04-05 09:40:25
209.17.96.74 attackspambots
Brute force attack stopped by firewall
2020-04-05 09:34:13
199.249.230.117 attackspam
Brute force attack stopped by firewall
2020-04-05 10:03:18
195.142.115.111 attack
Apr  5 02:22:10 debian-2gb-nbg1-2 kernel: \[8305163.327973\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.142.115.111 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=52835 DPT=8080 WINDOW=65535 RES=0x00 SYN URGP=0
2020-04-05 09:41:28
188.143.169.29 attack
Brute force attack stopped by firewall
2020-04-05 10:08:01
14.29.250.133 attack
SSH / Telnet Brute Force Attempts on Honeypot
2020-04-05 10:05:13
89.234.157.254 attack
Apr  5 01:59:00 ip-172-31-62-245 sshd\[27943\]: Invalid user 12345 from 89.234.157.254\
Apr  5 01:59:02 ip-172-31-62-245 sshd\[27943\]: Failed password for invalid user 12345 from 89.234.157.254 port 45933 ssh2\
Apr  5 01:59:04 ip-172-31-62-245 sshd\[27945\]: Invalid user 1234 from 89.234.157.254\
Apr  5 01:59:07 ip-172-31-62-245 sshd\[27945\]: Failed password for invalid user 1234 from 89.234.157.254 port 40600 ssh2\
Apr  5 01:59:09 ip-172-31-62-245 sshd\[27949\]: Invalid user 1502 from 89.234.157.254\
2020-04-05 10:02:49
183.99.171.104 attackbots
firewall-block, port(s): 23/tcp
2020-04-05 09:32:16
180.101.125.226 attackspam
Apr  5 00:41:29 v22019038103785759 sshd\[6680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.125.226  user=root
Apr  5 00:41:31 v22019038103785759 sshd\[6680\]: Failed password for root from 180.101.125.226 port 50630 ssh2
Apr  5 00:47:51 v22019038103785759 sshd\[7193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.125.226  user=root
Apr  5 00:47:53 v22019038103785759 sshd\[7193\]: Failed password for root from 180.101.125.226 port 53526 ssh2
Apr  5 00:49:50 v22019038103785759 sshd\[7346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.125.226  user=root
...
2020-04-05 10:05:42
148.66.145.30 attack
Attempt to hack Wordpress Login, XMLRPC or other login
2020-04-05 10:08:25
197.33.121.202 attackspam
"SERVER-WEBAPP MVPower DVR Shell arbitrary command execution attempt"
2020-04-05 09:40:56

Recently Reported IPs

196.136.176.118 216.235.211.1 216.235.211.167 83.168.95.86
23.225.40.239 14.127.35.238 116.4.37.32 47.163.56.200
209.116.190.9 212.28.183.214 205.169.39.49 10.149.255.7
34.65.244.188 167.148.71.85 2408:8220:345:67e0:ee5d:3e84:e681:4f5c 42.179.166.16
165.154.59.168 34.123.93.94 52.2.130.179 18.171.37.113