Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Softcom Internet Communications, Inc

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       67.200.0.0 - 67.200.127.255
CIDR:           67.200.0.0/17
NetName:        RGS-BLK12
NetHandle:      NET-67-200-0-0-1
Parent:         NET67 (NET-67-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   GTT Americas, LLC (GAL-104)
RegDate:        2007-08-16
Updated:        2025-05-07
Ref:            https://rdap.arin.net/registry/ip/67.200.0.0



OrgName:        GTT Americas, LLC
OrgId:          GAL-104
Address:        4201 Wilson Blvd -Suite 504
City:           Arlington
StateProv:      VA
PostalCode:     22203
Country:        US
RegDate:        2025-02-11
Updated:        2025-07-08
Ref:            https://rdap.arin.net/registry/entity/GAL-104


OrgTechHandle: GLD5-ARIN
OrgTechName:   GTT Legal Departement
OrgTechPhone:  +359886606 
OrgTechEmail:  alexander.mutafchiyski@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/GLD5-ARIN

OrgNOCHandle: GNOC16-ARIN
OrgNOCName:   GTT Network Operations Center
OrgNOCPhone:  +1-703-442-5500 
OrgNOCEmail:  noc@gtt.net
OrgNOCRef:    https://rdap.arin.net/registry/entity/GNOC16-ARIN

OrgTechHandle: AS3251-ARIN
OrgTechName:   AS3257 Netguard
OrgTechPhone:  +49 69 48007422 
OrgTechEmail:  netguard@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AS3251-ARIN

OrgTechHandle: GIT5-ARIN
OrgTechName:   GTT IPAM Team
OrgTechPhone:  +1-703-442-5500 
OrgTechEmail:  netguard@gtt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/GIT5-ARIN

OrgAbuseHandle: GAD46-ARIN
OrgAbuseName:   GTT Abuse Department
OrgAbusePhone:  +1-703-442-5501 
OrgAbuseEmail:  abuse@gtt.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/GAD46-ARIN

# end


# start

NetRange:       67.200.104.0 - 67.200.111.255
CIDR:           67.200.104.0/21
NetName:        RACKDOG-GTT
NetHandle:      NET-67-200-104-0-1
Parent:         RGS-BLK12 (NET-67-200-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Rackdog, LLC (RL-859)
RegDate:        2025-04-25
Updated:        2025-04-25
Ref:            https://rdap.arin.net/registry/ip/67.200.104.0


OrgName:        Rackdog, LLC
OrgId:          RL-859
Address:        1013 Centre Rd. Suite 403-A
City:           Wilmington
StateProv:      DE
PostalCode:     19805
Country:        US
RegDate:        2020-06-10
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/RL-859


OrgAbuseHandle: ADMIN7476-ARIN
OrgAbuseName:   Administrator
OrgAbusePhone:  +1-833-722-5364 
OrgAbuseEmail:  contact@rackdog.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ADMIN7476-ARIN

OrgTechHandle: ADMIN7476-ARIN
OrgTechName:   Administrator
OrgTechPhone:  +1-833-722-5364 
OrgTechEmail:  contact@rackdog.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ADMIN7476-ARIN

# end


# start

NetRange:       67.200.104.0 - 67.200.111.255
CIDR:           67.200.104.0/21
NetName:        NORTHERN-CABLE
NetHandle:      NET-67-200-104-0-2
Parent:         RACKDOG-GTT (NET-67-200-104-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   NORTHERN CABLE AND FIBER, LLC (NCFL-7)
RegDate:        2025-04-25
Updated:        2025-04-25
Ref:            https://rdap.arin.net/registry/ip/67.200.104.0


OrgName:        NORTHERN CABLE AND FIBER, LLC
OrgId:          NCFL-7
Address:        651 N BROAD ST SUITE 206
City:           MIDDLETOWN
StateProv:      DE
PostalCode:     19709
Country:        US
RegDate:        2020-09-15
Updated:        2020-09-15
Ref:            https://rdap.arin.net/registry/entity/NCFL-7


OrgAbuseHandle: ABUSE7989-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-302-894-8922 
OrgAbuseEmail:  abuse@northerncablefiber.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE7989-ARIN

OrgTechHandle: IPSER9-ARIN
OrgTechName:   IP Services
OrgTechPhone:  +1-302-894-8922 
OrgTechEmail:  ipservices@northerncablefiber.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPSER9-ARIN

# end


# start

NetRange:       67.200.104.0 - 67.200.111.255
CIDR:           67.200.104.0/21
NetName:        WAVE-BROADBAND
NetHandle:      NET-67-200-104-0-3
Parent:         NORTHERN-CABLE (NET-67-200-104-0-2)
NetType:        Reassigned
OriginAS:       
Customer:       Wave Broadband (C11185432)
RegDate:        2025-04-25
Updated:        2025-04-25
Ref:            https://rdap.arin.net/registry/ip/67.200.104.0


CustName:       Wave Broadband
Address:        900 N Alameda St Suite 200
City:           Los Angeles
StateProv:      CA
PostalCode:     90012
Country:        US
RegDate:        2025-04-25
Updated:        2025-04-25
Ref:            https://rdap.arin.net/registry/entity/C11185432

OrgAbuseHandle: ABUSE7989-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-302-894-8922 
OrgAbuseEmail:  abuse@northerncablefiber.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE7989-ARIN

OrgTechHandle: IPSER9-ARIN
OrgTechName:   IP Services
OrgTechPhone:  +1-302-894-8922 
OrgTechEmail:  ipservices@northerncablefiber.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPSER9-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 67.200.104.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59519
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;67.200.104.218.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051802 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 19 11:20:57 CST 2026
;; MSG SIZE  rcvd: 107
Host info
b'Host 218.104.200.67.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 67.200.104.218.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
37.59.50.84 attackspambots
Invalid user zbsoong from 37.59.50.84 port 43384
2020-07-29 07:08:04
1.179.185.50 attackbotsspam
Jul 29 00:18:10 marvibiene sshd[2825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.185.50 
Jul 29 00:18:12 marvibiene sshd[2825]: Failed password for invalid user cjt from 1.179.185.50 port 37380 ssh2
2020-07-29 07:10:39
109.116.196.174 attackbots
Jul 28 17:33:45 NPSTNNYC01T sshd[13744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.116.196.174
Jul 28 17:33:47 NPSTNNYC01T sshd[13744]: Failed password for invalid user xulei from 109.116.196.174 port 46996 ssh2
Jul 28 17:37:58 NPSTNNYC01T sshd[14133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.116.196.174
...
2020-07-29 07:07:07
122.227.159.84 attackbotsspam
Jul 29 00:18:40 jane sshd[30097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.227.159.84 
Jul 29 00:18:42 jane sshd[30097]: Failed password for invalid user helong from 122.227.159.84 port 39435 ssh2
...
2020-07-29 07:10:12
183.36.125.220 attackbotsspam
Jul 28 23:02:50 rocket sshd[3849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.36.125.220
Jul 28 23:02:52 rocket sshd[3849]: Failed password for invalid user webstaff from 183.36.125.220 port 41282 ssh2
Jul 28 23:06:05 rocket sshd[4554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.36.125.220
...
2020-07-29 07:14:03
106.51.86.204 attack
Jul 29 00:41:16 ip106 sshd[14530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.86.204 
Jul 29 00:41:18 ip106 sshd[14530]: Failed password for invalid user gry from 106.51.86.204 port 53660 ssh2
...
2020-07-29 07:04:43
51.83.33.202 attackspam
2020-07-28T20:53:53.797625shield sshd\[398\]: Invalid user chenlw from 51.83.33.202 port 57888
2020-07-28T20:53:53.807183shield sshd\[398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-3076ac11.vps.ovh.net
2020-07-28T20:53:55.948764shield sshd\[398\]: Failed password for invalid user chenlw from 51.83.33.202 port 57888 ssh2
2020-07-28T21:01:27.414786shield sshd\[3448\]: Invalid user ljl from 51.83.33.202 port 44344
2020-07-28T21:01:27.421228shield sshd\[3448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-3076ac11.vps.ovh.net
2020-07-29 06:37:51
212.70.149.51 attackbotsspam
Jul 29 01:11:01 relay postfix/smtpd\[12152\]: warning: unknown\[212.70.149.51\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 01:11:13 relay postfix/smtpd\[8325\]: warning: unknown\[212.70.149.51\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 01:11:28 relay postfix/smtpd\[12152\]: warning: unknown\[212.70.149.51\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 01:11:40 relay postfix/smtpd\[13729\]: warning: unknown\[212.70.149.51\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 01:11:56 relay postfix/smtpd\[11711\]: warning: unknown\[212.70.149.51\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-29 07:14:50
114.235.87.43 attack
Failed password for invalid user teng from 114.235.87.43 port 46300 ssh2
2020-07-29 06:50:58
117.158.175.167 attackspam
Jul 28 23:59:10 jane sshd[13565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.158.175.167 
Jul 28 23:59:12 jane sshd[13565]: Failed password for invalid user iizuka from 117.158.175.167 port 38524 ssh2
...
2020-07-29 06:40:19
85.192.138.149 attack
Invalid user pgadmin from 85.192.138.149 port 42838
2020-07-29 06:52:19
49.235.165.128 attackbotsspam
$f2bV_matches
2020-07-29 06:58:44
116.106.178.28 attack
Automatic report - Port Scan Attack
2020-07-29 06:35:35
175.138.108.78 attackspam
Jul 28 20:14:23 XXX sshd[5138]: Invalid user lzy from 175.138.108.78 port 37382
2020-07-29 07:09:23
222.221.248.242 attack
Jul 29 00:34:33 piServer sshd[4975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.221.248.242 
Jul 29 00:34:35 piServer sshd[4975]: Failed password for invalid user fgj from 222.221.248.242 port 35534 ssh2
Jul 29 00:38:33 piServer sshd[5471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.221.248.242 
...
2020-07-29 06:47:20

Recently Reported IPs

143.198.222.250 156.239.42.95 107.172.153.123 133.32.129.203
2606:4700:10::6814:9512 2606:4700:10::6816:4580 2606:4700:10::6814:6800 45.156.129.163
45.156.129.161 45.156.129.160 45.156.129.162 121.14.11.50
69.5.169.214 43.156.51.128 120.232.251.11 2606:4700:10::6814:9165
2606:4700:10::6814:9335 103.236.86.94 104.16.254.120 104.16.253.120