IP: 138.163.0.43 United States Location: Arizona, United States
Region:
Arizona
Country:
United States
Latitude:
33.4475
Longitude:
-112.0866
NetRange: 138.163.0.0 - 138.163.255.255
CIDR: 138.163.0.0/16
NetName: NMCI-NET-SAN
NetHandle: NET-138-163-0-0-1
Parent: NET138 (NET-138-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Navy Network Information Center (NNIC) (NNICN-1)
RegDate: 1990-05-07
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/138.163.0.0

OrgName: Navy Network Information Center (NNIC)
OrgId: NNICN-1
Address: 2465 GUADALCANAL ROAD
Address: BLDG 1265
City: VIRGINIA BEACH
StateProv: VA
PostalCode: 23459
Country: US
RegDate: 2006-09-21
Updated: 2020-09-01
Ref: https://rdap.arin.net/registry/entity/NNICN-1

OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef: https://rdap.arin.net/registry/entity/REGIS10-ARIN

OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName: Registration
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef: https://rdap.arin.net/registry/entity/REGIS10-ARIN
DNS BlackList results:
Most recent complaints on 138.163.0.43
Complaint by Shavonne Goutier :

A fraudulent credit application for the purchase of a new vehicle was submitted from this IP address on 4/10/2013. The application was submitted in my name fraudulently and was discovered when an alert was sent to me stating that a company by the name of ” Quality Leads USA, LLC” made an inquiry on my credit report. After the BBB in Texas contacted this company, the response from the business included a copy of the application submitted along with the IP address and my personal information (Identity Theft). This IP address belongs to NNIC. The Host is “gate3-sandiego.nmci.navy.mil”. What is also troubling is that the fraudulent application listed my last employer(Booz Allen Hamilton) and while working for this employer, I had an NMCI email account(navy.mil) while working for BAH supporting Space and Naval Warfare Systems Command (SPAWAR) in San Diego, CA.

Reported on: 24th, Apr. 2013
Complaint by Peggy :

My husband just got a alert about them too...it seems funny that is all I see all over about this company! Did they take inquiry off your file!

Reported on: 6th, May. 2013

Please help us keep Internet safer and cleaner by leaving a descriptive comment about 138.163.0.43 IP address


DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.