Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Odessa

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       24.155.0.0 - 24.155.255.255
CIDR:           24.155.0.0/16
NetName:        GRANDECOM-03
NetHandle:      NET-24-155-0-0-1
Parent:         NET24 (NET-24-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Grande Communications Networks, LLC (GCNI)
RegDate:        2000-04-03
Updated:        2012-02-24
Ref:            https://rdap.arin.net/registry/ip/24.155.0.0


OrgName:        Grande Communications Networks, LLC
OrgId:          GCNI
Address:        401 Carlson Cir
City:           San Marcos
StateProv:      TX
PostalCode:     78666
Country:        US
RegDate:        2001-03-29
Updated:        2015-06-30
Ref:            https://rdap.arin.net/registry/entity/GCNI


OrgAbuseHandle: ABUSE153-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-512-878-4000 
OrgAbuseEmail:  abuse@grandecom.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE153-ARIN

OrgTechHandle: IPSER2-ARIN
OrgTechName:   IP Services
OrgTechPhone:  +1-512-878-4000 
OrgTechEmail:  ipservices@astound.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPSER2-ARIN

# end


# start

NetRange:       24.155.32.0 - 24.155.33.255
CIDR:           24.155.32.0/23
NetName:        GRANDECOM-MARKET02-01
NetHandle:      NET-24-155-32-0-1
Parent:         GRANDECOM-03 (NET-24-155-0-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Grande Communications AUSTIN HUB 1 (C05115235)
RegDate:        2014-06-19
Updated:        2014-06-19
Ref:            https://rdap.arin.net/registry/ip/24.155.32.0


CustName:       Grande Communications AUSTIN HUB 1
Address:        401 Carlson Circle
City:           San Marcos
StateProv:      TX
PostalCode:     78666
Country:        US
RegDate:        2014-06-19
Updated:        2014-06-19
Ref:            https://rdap.arin.net/registry/entity/C05115235

OrgAbuseHandle: ABUSE153-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-512-878-4000 
OrgAbuseEmail:  abuse@grandecom.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE153-ARIN

OrgTechHandle: IPSER2-ARIN
OrgTechName:   IP Services
OrgTechPhone:  +1-512-878-4000 
OrgTechEmail:  ipservices@astound.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPSER2-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 24.155.33.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21780
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;24.155.33.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040600 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 06 19:27:29 CST 2026
;; MSG SIZE  rcvd: 106
Host info
136.33.155.24.in-addr.arpa domain name pointer 24-155-33-136.dyn.grandenetworks.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.33.155.24.in-addr.arpa	name = 24-155-33-136.dyn.grandenetworks.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.192.61.19 attackbotsspam
Jan 20 08:06:49 Tower sshd[14566]: Connection from 103.192.61.19 port 51828 on 192.168.10.220 port 22 rdomain ""
Jan 20 08:06:51 Tower sshd[14566]: Invalid user client from 103.192.61.19 port 51828
Jan 20 08:06:51 Tower sshd[14566]: error: Could not get shadow information for NOUSER
Jan 20 08:06:51 Tower sshd[14566]: Failed password for invalid user client from 103.192.61.19 port 51828 ssh2
Jan 20 08:06:51 Tower sshd[14566]: Received disconnect from 103.192.61.19 port 51828:11: Bye Bye [preauth]
Jan 20 08:06:51 Tower sshd[14566]: Disconnected from invalid user client 103.192.61.19 port 51828 [preauth]
2020-01-20 22:19:01
69.181.180.81 attackspambots
Unauthorized connection attempt detected from IP address 69.181.180.81 to port 2220 [J]
2020-01-20 22:31:33
103.90.227.164 attackspambots
Unauthorized connection attempt detected from IP address 103.90.227.164 to port 2220 [J]
2020-01-20 22:35:56
103.133.105.146 attackbots
" "
2020-01-20 22:30:12
122.51.198.248 attackspambots
Jan 20 16:19:24 server sshd\[2164\]: Invalid user teamspeak3 from 122.51.198.248
Jan 20 16:19:24 server sshd\[2164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.198.248 
Jan 20 16:19:26 server sshd\[2164\]: Failed password for invalid user teamspeak3 from 122.51.198.248 port 40474 ssh2
Jan 20 16:33:20 server sshd\[5734\]: Invalid user sbserver from 122.51.198.248
Jan 20 16:33:20 server sshd\[5734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.198.248 
...
2020-01-20 22:35:33
80.73.89.111 attack
Unauthorised access (Jan 20) SRC=80.73.89.111 LEN=52 PREC=0x20 TTL=116 ID=26476 DF TCP DPT=445 WINDOW=8192 SYN
2020-01-20 22:33:48
174.255.132.202 attack
I suspect this IP address is being used by my ex and associates.,aka fellow convicts, it is with Verizon which seems to be the carrier always used.
it was inconclusive on location, is that something you can assist with? 
Sincerely
Jeanie Smith 
8175834552
2020-01-20 22:47:51
174.255.132.202 attack
I suspect this IP address is being used by my ex and associates.,aka fellow convicts, it is with Verizon which seems to be the carrier always used.
it was inconclusive on location, is that something you can assist with? 
Sincerely
Jeanie Smith 
8175834552
2020-01-20 22:49:13
185.80.174.196 attackbotsspam
Port scan on 1 port(s): 8080
2020-01-20 22:11:30
66.249.75.219 attackspam
WEB_SERVER 403 Forbidden
2020-01-20 22:47:26
190.223.41.18 attack
Unauthorized connection attempt detected from IP address 190.223.41.18 to port 2220 [J]
2020-01-20 22:26:50
62.173.149.89 attackbotsspam
Jan 20 13:54:51 h2177944 kernel: \[2723232.744129\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=62.173.149.89 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=12398 DF PROTO=TCP SPT=20004 DPT=9080 WINDOW=512 RES=0x00 SYN URGP=0 
Jan 20 13:54:51 h2177944 kernel: \[2723232.744142\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=62.173.149.89 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=12398 DF PROTO=TCP SPT=20004 DPT=9080 WINDOW=512 RES=0x00 SYN URGP=0 
Jan 20 14:01:54 h2177944 kernel: \[2723655.878110\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=62.173.149.89 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=12398 DF PROTO=TCP SPT=20002 DPT=8092 WINDOW=512 RES=0x00 SYN URGP=0 
Jan 20 14:01:54 h2177944 kernel: \[2723655.878126\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=62.173.149.89 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=12398 DF PROTO=TCP SPT=20002 DPT=8092 WINDOW=512 RES=0x00 SYN URGP=0 
Jan 20 14:07:09 h2177944 kernel: \[2723970.615836\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=62.173.149.89 DST=85.2
2020-01-20 22:12:56
66.249.69.69 attackbots
Automatic report - Banned IP Access
2020-01-20 22:08:49
202.179.91.193 attack
Automatic report - Port Scan Attack
2020-01-20 22:14:18
35.189.172.158 attackbotsspam
Jan 20 10:06:32 vps46666688 sshd[25185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.189.172.158
Jan 20 10:06:35 vps46666688 sshd[25185]: Failed password for invalid user user from 35.189.172.158 port 53032 ssh2
...
2020-01-20 22:38:41

Recently Reported IPs

183.74.53.142 112.124.52.14 154.159.246.244 121.43.118.248
120.137.205.50 249.138.116.28 34.79.216.126 109.105.210.62
35.189.255.7 144.91.127.12 109.105.210.63 20.199.97.195
111.55.74.138 124.197.50.183 34.94.255.248 47.245.61.244
135.148.120.46 111.230.192.128 204.141.243.14 151.164.187.79