Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Monroe

Region: Louisiana

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       76.165.0.0 - 76.165.255.255
CIDR:           76.165.0.0/16
NetName:        LONI
NetHandle:      NET-76-165-0-0-1
Parent:         NET76 (NET-76-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Louisiana Board of Regents/Louisiana Optical Network Initiative (LONI) (LOUIS-3)
RegDate:        2006-09-29
Updated:        2018-06-19
Ref:            https://rdap.arin.net/registry/ip/76.165.0.0


OrgName:        Louisiana Board of Regents/Louisiana Optical Network Initiative (LONI)
OrgId:          LOUIS-3
Address:        200 Computing Services Center
City:           Baton Rouge
StateProv:      LA
PostalCode:     70803
Country:        US
RegDate:        2005-08-03
Updated:        2025-05-05
Ref:            https://rdap.arin.net/registry/entity/LOUIS-3


OrgTechHandle: SOILE30-ARIN
OrgTechName:   Soileau, Chad 
OrgTechPhone:  +1-225-578-1995 
OrgTechEmail:  chadsoileau@lsu.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/SOILE30-ARIN

OrgTechHandle: AYDEL1-ARIN
OrgTechName:   Aydell, Preston 
OrgTechPhone:  +1-317-278-0149 
OrgTechEmail:  preston@loni.org
OrgTechRef:    https://rdap.arin.net/registry/entity/AYDEL1-ARIN

OrgAbuseHandle: LONIN-ARIN
OrgAbuseName:   LONI NOC
OrgAbusePhone:  +1-317-278-0149 
OrgAbuseEmail:  noc@loni.org
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LONIN-ARIN

OrgTechHandle: FITTS34-ARIN
OrgTechName:   Fitts, Heath 
OrgTechPhone:  +1-225-317-7805 
OrgTechEmail:  heath@loni.org
OrgTechRef:    https://rdap.arin.net/registry/entity/FITTS34-ARIN

OrgTechHandle: GRANT227-ARIN
OrgTechName:   Grant, James 
OrgTechPhone:  +1-225-278-0629 
OrgTechEmail:  jdgran@lsu.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/GRANT227-ARIN

OrgTechHandle: MUMPH-ARIN
OrgTechName:   Mumphrey, Gary 
OrgTechPhone:  +1-225-715-3421 
OrgTechEmail:  gary@lsu.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/MUMPH-ARIN

OrgRoutingHandle: LONIN-ARIN
OrgRoutingName:   LONI NOC
OrgRoutingPhone:  +1-317-278-0149 
OrgRoutingEmail:  noc@loni.org
OrgRoutingRef:    https://rdap.arin.net/registry/entity/LONIN-ARIN

OrgNOCHandle: LONIN-ARIN
OrgNOCName:   LONI NOC
OrgNOCPhone:  +1-317-278-0149 
OrgNOCEmail:  noc@loni.org
OrgNOCRef:    https://rdap.arin.net/registry/entity/LONIN-ARIN

OrgTechHandle: STOTT23-ARIN
OrgTechName:   Stott, Philip 
OrgTechPhone:  +1-225-317-7934 
OrgTechEmail:  pstott@loni.org
OrgTechRef:    https://rdap.arin.net/registry/entity/STOTT23-ARIN

OrgTechHandle: KKV3-ARIN
OrgTechName:   VINCE, KELLY KELLY
OrgTechPhone:  +1-985-768-2511 
OrgTechEmail:  kelly@loni.org
OrgTechRef:    https://rdap.arin.net/registry/entity/KKV3-ARIN

OrgDNSHandle: LONIN-ARIN
OrgDNSName:   LONI NOC
OrgDNSPhone:  +1-317-278-0149 
OrgDNSEmail:  noc@loni.org
OrgDNSRef:    https://rdap.arin.net/registry/entity/LONIN-ARIN

OrgTechHandle: LLO10-ARIN
OrgTechName:   Leger, Lonnie 
OrgTechPhone:  +1-225-341-1832 
OrgTechEmail:  lonnie@loni.org
OrgTechRef:    https://rdap.arin.net/registry/entity/LLO10-ARIN

OrgTechHandle: CROUS25-ARIN
OrgTechName:   Crouse, Adrianne 
OrgTechPhone:  +1-225-636-0675 
OrgTechEmail:  adrianne@loni.org
OrgTechRef:    https://rdap.arin.net/registry/entity/CROUS25-ARIN

# end


# start

NetRange:       76.165.44.0 - 76.165.47.255
CIDR:           76.165.44.0/22
NetName:        ULMA-76-165-44-0-22
NetHandle:      NET-76-165-44-0-1
Parent:         LONI (NET-76-165-0-0-1)
NetType:        Reassigned
OriginAS:       
Organization:   Northeast Louisiana University (NLU-1)
RegDate:        2020-02-26
Updated:        2020-02-26
Ref:            https://rdap.arin.net/registry/ip/76.165.44.0


OrgName:        Northeast Louisiana University
OrgId:          NLU-1
Address:        700 University Avenue
City:           Monroe
StateProv:      LA
PostalCode:     71209
Country:        US
RegDate:        1991-12-11
Updated:        2011-09-24
Ref:            https://rdap.arin.net/registry/entity/NLU-1


OrgTechHandle: CE65-ARIN
OrgTechName:   Eppinette, Chance 
OrgTechPhone:  +1-318-342-5015 
OrgTechEmail:  eppinette@ulm.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/CE65-ARIN

OrgAbuseHandle: CE65-ARIN
OrgAbuseName:   Eppinette, Chance 
OrgAbusePhone:  +1-318-342-5015 
OrgAbuseEmail:  eppinette@ulm.edu
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CE65-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 76.165.46.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;76.165.46.150.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025092200 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 22 21:09:48 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 150.46.165.76.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.46.165.76.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
34.83.160.109 attackbotsspam
Jun 24 11:37:33 dhoomketu sshd[1000316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.83.160.109 
Jun 24 11:37:33 dhoomketu sshd[1000316]: Invalid user brian from 34.83.160.109 port 33276
Jun 24 11:37:35 dhoomketu sshd[1000316]: Failed password for invalid user brian from 34.83.160.109 port 33276 ssh2
Jun 24 11:41:04 dhoomketu sshd[1000428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.83.160.109  user=root
Jun 24 11:41:07 dhoomketu sshd[1000428]: Failed password for root from 34.83.160.109 port 34168 ssh2
...
2020-06-24 16:20:53
185.175.93.14 attackbots
 TCP (SYN) 185.175.93.14:44192 -> port 3340, len 44
2020-06-24 16:46:20
101.99.7.255 attack
Unauthorised access (Jun 24) SRC=101.99.7.255 LEN=52 TTL=48 ID=17027 DF TCP DPT=445 WINDOW=8192 SYN
2020-06-24 16:11:24
117.192.91.36 attackspam
DATE:2020-06-24 05:53:01, IP:117.192.91.36, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-06-24 16:34:14
176.31.180.117 attackbotsspam
Jun 24 09:56:19 ns381471 sshd[6762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.180.117
Jun 24 09:56:21 ns381471 sshd[6762]: Failed password for invalid user student from 176.31.180.117 port 33674 ssh2
2020-06-24 16:26:09
49.235.107.14 attackbots
Unauthorized connection attempt detected from IP address 49.235.107.14 to port 7241
2020-06-24 16:45:01
164.132.46.14 attackbots
Jun 23 19:24:12 tdfoods sshd\[8561\]: Invalid user india from 164.132.46.14
Jun 23 19:24:12 tdfoods sshd\[8561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.46.14
Jun 23 19:24:14 tdfoods sshd\[8561\]: Failed password for invalid user india from 164.132.46.14 port 60980 ssh2
Jun 23 19:27:45 tdfoods sshd\[8820\]: Invalid user oracle from 164.132.46.14
Jun 23 19:27:45 tdfoods sshd\[8820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.46.14
2020-06-24 16:03:52
103.105.128.194 attackbots
Jun 24 12:53:51 itv-usvr-02 sshd[25220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.105.128.194  user=root
Jun 24 12:53:52 itv-usvr-02 sshd[25220]: Failed password for root from 103.105.128.194 port 39350 ssh2
Jun 24 13:03:29 itv-usvr-02 sshd[25484]: Invalid user andi from 103.105.128.194 port 64982
Jun 24 13:03:29 itv-usvr-02 sshd[25484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.105.128.194
Jun 24 13:03:29 itv-usvr-02 sshd[25484]: Invalid user andi from 103.105.128.194 port 64982
Jun 24 13:03:31 itv-usvr-02 sshd[25484]: Failed password for invalid user andi from 103.105.128.194 port 64982 ssh2
2020-06-24 16:09:11
175.205.122.30 attackspam
175.205.122.30 - - \[24/Jun/2020:06:38:55 +0200\] "POST /wp-login.php HTTP/1.0" 200 5508 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
175.205.122.30 - - \[24/Jun/2020:06:39:00 +0200\] "POST /wp-login.php HTTP/1.0" 200 5345 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
175.205.122.30 - - \[24/Jun/2020:06:39:05 +0200\] "POST /wp-login.php HTTP/1.0" 200 5385 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-06-24 16:34:44
139.199.108.83 attackbotsspam
Jun 24 08:50:47 vps sshd[3851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.108.83 
Jun 24 08:50:49 vps sshd[3851]: Failed password for invalid user yar from 139.199.108.83 port 37722 ssh2
Jun 24 08:56:16 vps sshd[4118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.108.83 
...
2020-06-24 16:25:03
190.128.175.6 attackbots
Jun 23 23:56:05 propaganda sshd[14610]: Connection from 190.128.175.6 port 34930 on 10.0.0.160 port 22 rdomain ""
Jun 23 23:56:05 propaganda sshd[14610]: Connection closed by 190.128.175.6 port 34930 [preauth]
2020-06-24 16:06:23
198.98.60.164 attack
Invalid user admin from 198.98.60.164 port 55878
2020-06-24 16:19:05
79.183.125.174 attackspam
firewall-block, port(s): 123/udp
2020-06-24 16:26:44
64.202.189.187 attack
Automatic report - XMLRPC Attack
2020-06-24 16:46:57
94.102.51.110 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 3605 proto: TCP cat: Misc Attack
2020-06-24 16:25:28

Recently Reported IPs

35.216.192.168 201.202.10.30 14.128.63.60 2607:fcc8:9684:5300:d461:cd54:4d95:7ffe
2804:14c:65e2:451e:1968:c011:cd1:9dc6 35.233.95.0 2402:3a80:92a:e1b4:9822:ff5f:5ba8:9f20 85.215.230.243
193.32.221.30 81.31.232.81 60.255.186.92 18.163.195.107
43.156.79.153 43.156.79.157 211.158.138.116 192.165.198.130
94.120.14.202 38.68.134.13 34.6.166.247 221.219.112.97