Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Jose

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       38.0.0.0 - 38.255.255.255
CIDR:           38.0.0.0/8
NetName:        COGENT-A
NetHandle:      NET-38-0-0-0-1
Parent:          ()
NetType:        Direct Allocation
OriginAS:       
Organization:   Cogent Communications, LLC (COGC)
RegDate:        1991-04-16
Updated:        2025-09-23
Ref:            https://rdap.arin.net/registry/ip/38.0.0.0



OrgName:        Cogent Communications, LLC
OrgId:          COGC
Address:        2450 N Street NW
City:           Washington
StateProv:      DC
PostalCode:     20037
Country:        US
RegDate:        2000-05-30
Updated:        2025-09-23
Comment:        Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/COGC

ReferralServer:  rwhois://rwhois.cogentco.com:4321

OrgTechHandle: IPALL-ARIN
OrgTechName:   IP Allocation
OrgTechPhone:  +1-877-875-4311 
OrgTechEmail:  ipalloc@cogentco.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPALL-ARIN

OrgAbuseHandle: COGEN-ARIN
OrgAbuseName:   Cogent Abuse
OrgAbusePhone:  +1-877-875-4311 
OrgAbuseEmail:  abuse@cogentco.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/COGEN-ARIN

OrgNOCHandle: ZC108-ARIN
OrgNOCName:   Cogent Communications
OrgNOCPhone:  +1-877-875-4311 
OrgNOCEmail:  noc@cogentco.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ZC108-ARIN

# end


# start

NetRange:       38.54.0.0 - 38.54.127.255
CIDR:           38.54.0.0/17
NetName:        KAOPU-CGNT-NET-1
NetHandle:      NET-38-54-0-0-1
Parent:         COGENT-A (NET-38-0-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Kaopu Cloud HK Limited (KCHL-3)
RegDate:        2022-05-04
Updated:        2022-05-04
Ref:            https://rdap.arin.net/registry/ip/38.54.0.0


OrgName:        Kaopu Cloud HK Limited
OrgId:          KCHL-3
Address:        LEVEL 54 HOPEWELL CENTRE 183 QUEEN'S ROAD EAST HK
City:           HK
StateProv:      
PostalCode:     
Country:        HK
RegDate:        2022-04-13
Updated:        2023-11-21
Comment:        Geofeed https://www.kaopucloud.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/KCHL-3


OrgTechHandle: MANAG489-ARIN
OrgTechName:   Manager
OrgTechPhone:  +852 94159695 
OrgTechEmail:  whois@kaopucloud.com
OrgTechRef:    https://rdap.arin.net/registry/entity/MANAG489-ARIN

OrgAbuseHandle: MANAG489-ARIN
OrgAbuseName:   Manager
OrgAbusePhone:  +852 94159695 
OrgAbuseEmail:  whois@kaopucloud.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MANAG489-ARIN

# end


# start

NetRange:       38.54.50.0 - 38.54.50.255
CIDR:           38.54.50.0/24
NetName:        LIGHTNODE-JP
NetHandle:      NET-38-54-50-0-1
Parent:         KAOPU-CGNT-NET-1 (NET-38-54-0-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Lightnode-JP (C08476904)
RegDate:        2022-05-25
Updated:        2022-05-25
Ref:            https://rdap.arin.net/registry/ip/38.54.50.0


CustName:       Lightnode-JP
Address:        JP
City:           JP
StateProv:      
PostalCode:     
Country:        JP
RegDate:        2022-05-25
Updated:        2022-05-25
Ref:            https://rdap.arin.net/registry/entity/C08476904

OrgTechHandle: MANAG489-ARIN
OrgTechName:   Manager
OrgTechPhone:  +852 94159695 
OrgTechEmail:  whois@kaopucloud.com
OrgTechRef:    https://rdap.arin.net/registry/entity/MANAG489-ARIN

OrgAbuseHandle: MANAG489-ARIN
OrgAbuseName:   Manager
OrgAbusePhone:  +852 94159695 
OrgAbuseEmail:  whois@kaopucloud.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MANAG489-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.cogentco.com:4321.

%rwhois V-1.5:0010b0:00 rwhois.cogentco.com (CGNT rwhoisd 1.2.2)
network:ID:NET4-2636000011
network:Network-Name:NET4-2636000011
network:IP-Network:38.54.0.0/17
network:Org-Name:KAOPU CLOUD HK LIMITED
network:Street-Address:11 GREAT OAKS BLVD
network:City:SAN JOSE
network:State:CA
network:Country:US
network:Postal-Code:95119
network:Tech-Contact:ZC108-ARIN
network:Updated:2025-05-06 14:14:32
%ok
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.54.50.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52131
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;38.54.50.116.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040401 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 05 04:30:12 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 116.50.54.38.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 38.54.50.116.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
81.22.45.176 attackbots
Oct 21 03:49:23   TCP Attack: SRC=81.22.45.176 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=240  PROTO=TCP SPT=55873 DPT=4098 WINDOW=1024 RES=0x00 SYN URGP=0
2019-10-21 14:18:54
178.128.68.121 attackbots
C1,DEF GET /wp-login.php
2019-10-21 14:30:01
103.121.26.150 attackspambots
Oct 21 02:11:36 plusreed sshd[6213]: Invalid user criminal from 103.121.26.150
...
2019-10-21 14:31:41
27.19.27.104 attack
Automatic report - Port Scan
2019-10-21 14:14:36
106.12.84.112 attackspambots
Oct 21 08:08:55 pkdns2 sshd\[428\]: Invalid user connect from 106.12.84.112Oct 21 08:08:57 pkdns2 sshd\[428\]: Failed password for invalid user connect from 106.12.84.112 port 47870 ssh2Oct 21 08:13:22 pkdns2 sshd\[648\]: Invalid user jdeleon from 106.12.84.112Oct 21 08:13:25 pkdns2 sshd\[648\]: Failed password for invalid user jdeleon from 106.12.84.112 port 55720 ssh2Oct 21 08:17:40 pkdns2 sshd\[859\]: Invalid user tijeun from 106.12.84.112Oct 21 08:17:42 pkdns2 sshd\[859\]: Failed password for invalid user tijeun from 106.12.84.112 port 35336 ssh2
...
2019-10-21 13:58:57
183.238.233.110 attackspambots
Oct 21 07:14:21 vps691689 sshd[22966]: Failed password for root from 183.238.233.110 port 46688 ssh2
Oct 21 07:18:41 vps691689 sshd[23085]: Failed password for root from 183.238.233.110 port 40352 ssh2
...
2019-10-21 14:34:28
118.89.62.112 attackspam
2019-10-21T06:02:05.324304abusebot-5.cloudsearch.cf sshd\[32207\]: Invalid user alm from 118.89.62.112 port 35076
2019-10-21 14:11:44
193.70.33.75 attack
Oct 21 06:46:53 SilenceServices sshd[11035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.33.75
Oct 21 06:46:56 SilenceServices sshd[11035]: Failed password for invalid user luke from 193.70.33.75 port 54278 ssh2
Oct 21 06:50:40 SilenceServices sshd[12090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.33.75
2019-10-21 14:02:30
141.98.81.111 attackspambots
Invalid user admin from 141.98.81.111 port 53297
2019-10-21 14:10:32
118.172.214.151 attackspambots
scan r
2019-10-21 14:19:53
121.165.66.226 attackbots
Oct 21 06:58:38 MK-Soft-VM4 sshd[21663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.165.66.226 
Oct 21 06:58:40 MK-Soft-VM4 sshd[21663]: Failed password for invalid user ulbrechT from 121.165.66.226 port 52332 ssh2
...
2019-10-21 14:02:59
164.132.54.246 attackspam
Oct 21 06:46:01 www sshd\[61184\]: Failed password for root from 164.132.54.246 port 41818 ssh2Oct 21 06:52:24 www sshd\[61476\]: Invalid user mika from 164.132.54.246Oct 21 06:52:25 www sshd\[61476\]: Failed password for invalid user mika from 164.132.54.246 port 33441 ssh2
...
2019-10-21 14:35:27
173.56.119.71 attack
Honeypot attack, port: 23, PTR: static-173-56-119-71.nycmny.fios.verizon.net.
2019-10-21 14:24:30
36.227.130.104 attack
Honeypot attack, port: 23, PTR: 36-227-130-104.dynamic-ip.hinet.net.
2019-10-21 14:38:31
123.187.203.125 attackbotsspam
Automatic report - FTP Brute Force
2019-10-21 14:38:00

Recently Reported IPs

2606:4700:10::6814:7005 156.245.207.207 76.34.15.108 54.87.12.131
54.221.33.251 35.171.19.100 34.201.143.237 2606:4700:10::6814:7676
2606:4700:10::6814:8642 2606:4700:10::6814:9888 2606:4700:10::6814:5373 2606:4700:10::6816:2027
110.77.248.201 2606:4700:10::6816:1490 212.85.13.85 2606:4700:10::ac43:2885
2606:4700:10::6814:9766 2606:4700:10::6814:8415 2606:4700:10::6816:655 2606:4700:10::6814:5116