City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 2600:1400:: - 2600:14FF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF
CIDR: 2600:1400::/24
NetName: AKAMAI
NetHandle: NET6-2600-1400-1
Parent: NET6-2600 (NET6-2600-1)
NetType: Direct Allocation
OriginAS:
Organization: Akamai Technologies, Inc. (AKAMAI)
RegDate: 2010-04-21
Updated: 2020-01-29
Ref: https://rdap.arin.net/registry/ip/2600:1400::
OrgName: Akamai Technologies, Inc.
OrgId: AKAMAI
Address: 145 Broadway
City: Cambridge
StateProv: MA
PostalCode: 02142
Country: US
RegDate: 1999-01-21
Updated: 2023-10-24
Ref: https://rdap.arin.net/registry/entity/AKAMAI
OrgTechHandle: IPADM11-ARIN
OrgTechName: ipadmin
OrgTechPhone: +1-617-444-0017
OrgTechEmail: ip-admin@akamai.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPADM11-ARIN
OrgAbuseHandle: NUS-ARIN
OrgAbuseName: NOC United States
OrgAbusePhone: +1-617-444-2535
OrgAbuseEmail: abuse@akamai.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/NUS-ARIN
OrgTechHandle: SJS98-ARIN
OrgTechName: Schecter, Steven Jay
OrgTechPhone: +1-617-274-7134
OrgTechEmail: ip-admin@akamai.com
OrgTechRef: https://rdap.arin.net/registry/entity/SJS98-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2600:140e:6::6854:969c
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 61598
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2600:140e:6::6854:969c. IN A
;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Thu Mar 12 15:20:36 CST 2026
;; MSG SIZE rcvd: 51
'
c.9.6.9.4.5.8.6.0.0.0.0.0.0.0.0.0.0.0.0.6.0.0.0.e.0.4.1.0.0.6.2.ip6.arpa domain name pointer g2600-140e-0006-0000-0000-0000-6854-969c.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
c.9.6.9.4.5.8.6.0.0.0.0.0.0.0.0.0.0.0.0.6.0.0.0.e.0.4.1.0.0.6.2.ip6.arpa name = g2600-140e-0006-0000-0000-0000-6854-969c.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 119.162.80.57 | attack | Unauthorized connection attempt detected from IP address 119.162.80.57 to port 5555 [T] |
2020-04-15 03:18:02 |
| 92.63.194.11 | attack | $f2bV_matches |
2020-04-15 03:29:00 |
| 113.61.221.58 | attack | Unauthorized connection attempt detected from IP address 113.61.221.58 to port 5555 [T] |
2020-04-15 03:21:32 |
| 221.201.251.242 | attackspambots | Unauthorized connection attempt detected from IP address 221.201.251.242 to port 23 [T] |
2020-04-15 03:05:49 |
| 69.197.161.210 | attackspam | Unauthorized connection attempt detected from IP address 69.197.161.210 to port 3389 |
2020-04-15 03:30:47 |
| 222.240.238.58 | attack | Unauthorized connection attempt detected from IP address 222.240.238.58 to port 1433 [T] |
2020-04-15 03:34:51 |
| 49.88.175.126 | attackbots | Unauthorized connection attempt detected from IP address 49.88.175.126 to port 5555 [T] |
2020-04-15 02:59:58 |
| 45.136.108.68 | attackbotsspam | Unauthorized connection attempt detected from IP address 45.136.108.68 to port 12515 [T] |
2020-04-15 03:34:24 |
| 222.222.209.149 | attack | Unauthorized connection attempt detected from IP address 222.222.209.149 to port 1433 [T] |
2020-04-15 03:04:35 |
| 83.101.139.170 | attackbotsspam | Unauthorized connection attempt detected from IP address 83.101.139.170 to port 8089 [T] |
2020-04-15 02:56:13 |
| 121.123.84.122 | attack | Unauthorized connection attempt detected from IP address 121.123.84.122 to port 9530 [T] |
2020-04-15 03:16:42 |
| 180.95.200.231 | attackbots | Unauthorized connection attempt detected from IP address 180.95.200.231 to port 1433 [T] |
2020-04-15 03:10:22 |
| 77.247.109.5 | attackspam | Unauthorized connection attempt detected from IP address 77.247.109.5 to port 80 [T] |
2020-04-15 02:56:59 |
| 49.172.105.220 | attack | Unauthorized connection attempt detected from IP address 49.172.105.220 to port 80 [T] |
2020-04-15 02:59:35 |
| 123.235.67.236 | attack | Unauthorized connection attempt detected from IP address 123.235.67.236 to port 23 [T] |
2020-04-15 03:13:26 |