Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Atlanta

Region: Georgia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       38.0.0.0 - 38.255.255.255
CIDR:           38.0.0.0/8
NetName:        COGENT-A
NetHandle:      NET-38-0-0-0-1
Parent:          ()
NetType:        Direct Allocation
OriginAS:       
Organization:   Cogent Communications, LLC (COGC)
RegDate:        1991-04-16
Updated:        2025-09-23
Ref:            https://rdap.arin.net/registry/ip/38.0.0.0



OrgName:        Cogent Communications, LLC
OrgId:          COGC
Address:        2450 N Street NW
City:           Washington
StateProv:      DC
PostalCode:     20037
Country:        US
RegDate:        2000-05-30
Updated:        2025-09-23
Comment:        Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/COGC

ReferralServer:  rwhois://rwhois.cogentco.com:4321

OrgTechHandle: IPALL-ARIN
OrgTechName:   IP Allocation
OrgTechPhone:  +1-877-875-4311 
OrgTechEmail:  ipalloc@cogentco.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPALL-ARIN

OrgNOCHandle: ZC108-ARIN
OrgNOCName:   Cogent Communications
OrgNOCPhone:  +1-877-875-4311 
OrgNOCEmail:  noc@cogentco.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ZC108-ARIN

OrgAbuseHandle: COGEN-ARIN
OrgAbuseName:   Cogent Abuse
OrgAbusePhone:  +1-877-875-4311 
OrgAbuseEmail:  abuse@cogentco.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/COGEN-ARIN

# end


# start

NetRange:       38.110.46.0 - 38.110.46.255
CIDR:           38.110.46.0/24
NetName:        SLR-GT-CGNT-NET-1
NetHandle:      NET-38-110-46-0-1
Parent:         COGENT-A (NET-38-0-0-0-1)
NetType:        Reassigned
OriginAS:       
Organization:   Georgia Institute of Technology (GIT-Z)
RegDate:        2023-09-01
Updated:        2024-02-29
Ref:            https://rdap.arin.net/registry/ip/38.110.46.0


OrgName:        Georgia Institute of Technology
OrgId:          GIT-Z
Address:        756 W Peachtree ST
City:           Atlanta
StateProv:      GA
PostalCode:     30308
Country:        US
RegDate:        2010-10-21
Updated:        2020-03-27
Comment:        https://www.gatech.edu
Ref:            https://rdap.arin.net/registry/entity/GIT-Z


OrgNOCHandle: NETWO653-ARIN
OrgNOCName:   Network Operations
OrgNOCPhone:  +1-404-894-4669 
OrgNOCEmail:  noc@gatech.edu
OrgNOCRef:    https://rdap.arin.net/registry/entity/NETWO653-ARIN

OrgAbuseHandle: GATEC-ARIN
OrgAbuseName:   Gatech Abuse
OrgAbusePhone:  +1-404-385-5555 
OrgAbuseEmail:  abuse@gatech.edu
OrgAbuseRef:    https://rdap.arin.net/registry/entity/GATEC-ARIN

OrgTechHandle: NETWO653-ARIN
OrgTechName:   Network Operations
OrgTechPhone:  +1-404-894-4669 
OrgTechEmail:  noc@gatech.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/NETWO653-ARIN

RAbuseHandle: GITCC-ARIN
RAbuseName:   GIT-CC-Network-Measurement
RAbusePhone:  +1-404-894-4669 
RAbuseEmail:  Scp-network-measurement@cc.gatech.edu
RAbuseRef:    https://rdap.arin.net/registry/entity/GITCC-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.cogentco.com:4321.

%rwhois V-1.5:0010b0:00 rwhois.cogentco.com (CGNT rwhoisd 1.2.1)
network:ID:NET4-266E2E0018
network:Network-Name:NET4-266E2E0018
network:IP-Network:38.110.46.0/24
network:Org-Name:Southern Light Rail, LLC
network:Street-Address:345 COURTLAND ST NE
network:City:ATLANTA
network:State:GA
network:Country:US
network:Postal-Code:30308
network:Tech-Contact:ZC108-ARIN
network:Updated:2025-08-01 11:44:29
%ok
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.110.46.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9585
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;38.110.46.239.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025092901 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 30 02:00:06 CST 2025
;; MSG SIZE  rcvd: 106
Host info
239.46.110.38.in-addr.arpa domain name pointer researchscan239.cc.gatech.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
239.46.110.38.in-addr.arpa	name = researchscan239.cc.gatech.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.63.202 attackbotsspam
Nov 25 01:21:46 ny01 sshd[15545]: Failed password for root from 106.13.63.202 port 60064 ssh2
Nov 25 01:29:52 ny01 sshd[16766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.63.202
Nov 25 01:29:55 ny01 sshd[16766]: Failed password for invalid user admin from 106.13.63.202 port 36444 ssh2
2019-11-25 16:10:21
138.117.109.103 attackbotsspam
Nov 25 08:34:37 * sshd[15743]: Failed password for root from 138.117.109.103 port 41963 ssh2
2019-11-25 15:55:49
159.203.201.183 attackbotsspam
Honeypot hit.
2019-11-25 16:16:17
89.165.116.163 attack
" "
2019-11-25 16:00:09
139.59.59.187 attack
Nov 24 14:02:36 server sshd\[2338\]: Failed password for invalid user applmgr from 139.59.59.187 port 51890 ssh2
Nov 25 06:29:17 server sshd\[31661\]: Invalid user webmaster from 139.59.59.187
Nov 25 06:29:17 server sshd\[31661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.59.187 
Nov 25 06:29:20 server sshd\[31661\]: Failed password for invalid user webmaster from 139.59.59.187 port 33346 ssh2
Nov 25 09:41:11 server sshd\[15635\]: Invalid user support from 139.59.59.187
Nov 25 09:41:11 server sshd\[15635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.59.187 
...
2019-11-25 16:18:17
180.68.177.15 attack
Nov 25 14:39:38 webhost01 sshd[21115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.68.177.15
Nov 25 14:39:39 webhost01 sshd[21115]: Failed password for invalid user quickert from 180.68.177.15 port 45886 ssh2
...
2019-11-25 15:43:18
106.53.90.75 attackbotsspam
SSH brute-force: detected 7 distinct usernames within a 24-hour window.
2019-11-25 15:58:46
61.55.158.84 attackspambots
Unauthorised access (Nov 25) SRC=61.55.158.84 LEN=44 TTL=234 ID=11340 TCP DPT=1433 WINDOW=1024 SYN
2019-11-25 15:47:13
139.155.74.38 attackspambots
$f2bV_matches
2019-11-25 16:14:50
66.249.79.127 attack
Automatic report - Banned IP Access
2019-11-25 16:06:14
171.61.129.253 attackbots
Automatic report - Port Scan Attack
2019-11-25 16:07:20
122.51.113.137 attackspam
Nov 25 08:34:30 vpn01 sshd[4953]: Failed password for root from 122.51.113.137 port 56110 ssh2
...
2019-11-25 15:45:25
36.37.131.14 attackbots
Unauthorized connection attempt from IP address 36.37.131.14 on Port 445(SMB)
2019-11-25 16:07:02
202.96.137.99 attack
Port Scan 1433
2019-11-25 15:41:08
190.7.128.74 attack
2019-11-25T07:33:11.688509abusebot-4.cloudsearch.cf sshd\[17091\]: Invalid user lisa from 190.7.128.74 port 18707
2019-11-25 15:51:19

Recently Reported IPs

89.190.159.134 180.163.31.163 3.86.167.90 138.97.233.212
195.178.110.109 98.81.221.17 152.32.207.234 45.149.173.227
180.153.236.40 107.197.177.173 183.7.145.164 66.132.153.114
120.77.83.14 240e:43d:20:11ba:343d:eaff:fe5f:fd02 2409:8924:4c7b:7f11:24f2:fe4:68ec:fb25 167.172.103.6
113.215.188.169 165.154.125.148 167.71.32.8 147.185.132.85