Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Jose

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       38.0.0.0 - 38.255.255.255
CIDR:           38.0.0.0/8
NetName:        COGENT-A
NetHandle:      NET-38-0-0-0-1
Parent:          ()
NetType:        Direct Allocation
OriginAS:       
Organization:   Cogent Communications, LLC (COGC)
RegDate:        1991-04-16
Updated:        2025-09-23
Ref:            https://rdap.arin.net/registry/ip/38.0.0.0



OrgName:        Cogent Communications, LLC
OrgId:          COGC
Address:        2450 N Street NW
City:           Washington
StateProv:      DC
PostalCode:     20037
Country:        US
RegDate:        2000-05-30
Updated:        2025-09-23
Comment:        Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/COGC

ReferralServer:  rwhois://rwhois.cogentco.com:4321

OrgTechHandle: IPALL-ARIN
OrgTechName:   IP Allocation
OrgTechPhone:  +1-877-875-4311 
OrgTechEmail:  ipalloc@cogentco.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPALL-ARIN

OrgAbuseHandle: COGEN-ARIN
OrgAbuseName:   Cogent Abuse
OrgAbusePhone:  +1-877-875-4311 
OrgAbuseEmail:  abuse@cogentco.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/COGEN-ARIN

OrgNOCHandle: ZC108-ARIN
OrgNOCName:   Cogent Communications
OrgNOCPhone:  +1-877-875-4311 
OrgNOCEmail:  noc@cogentco.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ZC108-ARIN

# end


# start

NetRange:       38.54.0.0 - 38.54.127.255
CIDR:           38.54.0.0/17
NetName:        KAOPU-CGNT-NET-1
NetHandle:      NET-38-54-0-0-1
Parent:         COGENT-A (NET-38-0-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Kaopu Cloud HK Limited (KCHL-3)
RegDate:        2022-05-04
Updated:        2022-05-04
Ref:            https://rdap.arin.net/registry/ip/38.54.0.0


OrgName:        Kaopu Cloud HK Limited
OrgId:          KCHL-3
Address:        LEVEL 54 HOPEWELL CENTRE 183 QUEEN'S ROAD EAST HK
City:           HK
StateProv:      
PostalCode:     
Country:        HK
RegDate:        2022-04-13
Updated:        2023-11-21
Comment:        Geofeed https://www.kaopucloud.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/KCHL-3


OrgTechHandle: MANAG489-ARIN
OrgTechName:   Manager
OrgTechPhone:  +852 94159695 
OrgTechEmail:  whois@kaopucloud.com
OrgTechRef:    https://rdap.arin.net/registry/entity/MANAG489-ARIN

OrgAbuseHandle: MANAG489-ARIN
OrgAbuseName:   Manager
OrgAbusePhone:  +852 94159695 
OrgAbuseEmail:  whois@kaopucloud.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MANAG489-ARIN

# end


# start

NetRange:       38.54.95.0 - 38.54.95.255
CIDR:           38.54.95.0/24
NetName:        LIGHTNODE-US
NetHandle:      NET-38-54-95-0-1
Parent:         KAOPU-CGNT-NET-1 (NET-38-54-0-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       LightNode-US (C08809473)
RegDate:        2022-08-10
Updated:        2022-08-10
Ref:            https://rdap.arin.net/registry/ip/38.54.95.0


CustName:       LightNode-US
Address:        US,Washington
City:           Washington
StateProv:      DC
PostalCode:     20237
Country:        US
RegDate:        2022-08-10
Updated:        2022-08-10
Ref:            https://rdap.arin.net/registry/entity/C08809473

OrgTechHandle: MANAG489-ARIN
OrgTechName:   Manager
OrgTechPhone:  +852 94159695 
OrgTechEmail:  whois@kaopucloud.com
OrgTechRef:    https://rdap.arin.net/registry/entity/MANAG489-ARIN

OrgAbuseHandle: MANAG489-ARIN
OrgAbuseName:   Manager
OrgAbusePhone:  +852 94159695 
OrgAbuseEmail:  whois@kaopucloud.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MANAG489-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.54.95.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45358
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;38.54.95.4.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050700 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 07 22:30:46 CST 2026
;; MSG SIZE  rcvd: 103
Host info
b'Host 4.95.54.38.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 38.54.95.4.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
217.165.85.231 attackbots
Unauthorized connection attempt detected from IP address 217.165.85.231 to port 8000 [J]
2020-01-19 19:24:33
138.197.137.39 attackbotsspam
Jan 19 03:15:26 ny01 sshd[10764]: Failed password for root from 138.197.137.39 port 52436 ssh2
Jan 19 03:17:29 ny01 sshd[10984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.137.39
Jan 19 03:17:31 ny01 sshd[10984]: Failed password for invalid user assem from 138.197.137.39 port 45760 ssh2
2020-01-19 19:32:32
68.183.169.251 attack
Unauthorized connection attempt detected from IP address 68.183.169.251 to port 2220 [J]
2020-01-19 19:41:20
222.208.244.254 attackspambots
Unauthorized connection attempt detected from IP address 222.208.244.254 to port 23 [J]
2020-01-19 19:46:38
94.71.43.200 attack
Unauthorized connection attempt detected from IP address 94.71.43.200 to port 81 [J]
2020-01-19 19:38:33
200.115.142.10 attackbots
Unauthorized connection attempt detected from IP address 200.115.142.10 to port 80 [J]
2020-01-19 19:25:16
47.144.12.28 attackbotsspam
Unauthorized connection attempt detected from IP address 47.144.12.28 to port 80 [J]
2020-01-19 19:18:29
181.28.142.182 attack
unauthorized connection attempt
2020-01-19 19:27:42
50.34.23.177 attackspambots
Unauthorized connection attempt detected from IP address 50.34.23.177 to port 9000 [J]
2020-01-19 19:42:04
188.210.191.43 attack
Unauthorized connection attempt detected from IP address 188.210.191.43 to port 23 [J]
2020-01-19 19:52:18
124.234.139.144 attackspam
Unauthorized connection attempt detected from IP address 124.234.139.144 to port 23 [J]
2020-01-19 19:33:02
121.154.67.139 attack
Unauthorized connection attempt detected from IP address 121.154.67.139 to port 23 [J]
2020-01-19 19:34:17
116.203.156.230 attack
Unauthorized connection attempt detected from IP address 116.203.156.230 to port 2220 [J]
2020-01-19 19:36:47
68.173.1.34 attackspam
Unauthorized connection attempt detected from IP address 68.173.1.34 to port 4567 [J]
2020-01-19 19:16:41
72.27.161.181 attack
Unauthorized connection attempt detected from IP address 72.27.161.181 to port 23 [J]
2020-01-19 19:16:19

Recently Reported IPs

135.237.126.219 2606:4700:10::6814:9108 47.94.138.70 143.244.145.240
223.104.41.107 104.28.235.57 223.86.52.157 193.29.193.187
193.29.139.137 190.194.63.209 43.162.103.213 159.223.206.234
2606:4700:10::6814:6114 2606:4700:10::6814:7014 2606:4700:10::6814:4492 2606:4700:10::6814:4520
54.192.18.114 15.156.231.53 13.33.183.19 18.65.216.36