City: Atlanta
Region: Georgia
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 38.0.0.0 - 38.255.255.255
CIDR: 38.0.0.0/8
NetName: COGENT-A
NetHandle: NET-38-0-0-0-1
Parent: ()
NetType: Direct Allocation
OriginAS:
Organization: Cogent Communications, LLC (COGC)
RegDate: 1991-04-16
Updated: 2025-09-23
Ref: https://rdap.arin.net/registry/ip/38.0.0.0
OrgName: Cogent Communications, LLC
OrgId: COGC
Address: 2450 N Street NW
City: Washington
StateProv: DC
PostalCode: 20037
Country: US
RegDate: 2000-05-30
Updated: 2025-09-23
Comment: Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref: https://rdap.arin.net/registry/entity/COGC
ReferralServer: rwhois://rwhois.cogentco.com:4321
OrgTechHandle: IPALL-ARIN
OrgTechName: IP Allocation
OrgTechPhone: +1-877-875-4311
OrgTechEmail: ipalloc@cogentco.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPALL-ARIN
OrgNOCHandle: ZC108-ARIN
OrgNOCName: Cogent Communications
OrgNOCPhone: +1-877-875-4311
OrgNOCEmail: noc@cogentco.com
OrgNOCRef: https://rdap.arin.net/registry/entity/ZC108-ARIN
OrgAbuseHandle: COGEN-ARIN
OrgAbuseName: Cogent Abuse
OrgAbusePhone: +1-877-875-4311
OrgAbuseEmail: abuse@cogentco.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/COGEN-ARIN
# end
# start
NetRange: 38.110.46.0 - 38.110.46.255
CIDR: 38.110.46.0/24
NetName: SLR-GT-CGNT-NET-1
NetHandle: NET-38-110-46-0-1
Parent: COGENT-A (NET-38-0-0-0-1)
NetType: Reassigned
OriginAS:
Organization: Georgia Institute of Technology (GIT-Z)
RegDate: 2023-09-01
Updated: 2024-02-29
Ref: https://rdap.arin.net/registry/ip/38.110.46.0
OrgName: Georgia Institute of Technology
OrgId: GIT-Z
Address: 756 W Peachtree ST
City: Atlanta
StateProv: GA
PostalCode: 30308
Country: US
RegDate: 2010-10-21
Updated: 2020-03-27
Comment: https://www.gatech.edu
Ref: https://rdap.arin.net/registry/entity/GIT-Z
OrgNOCHandle: NETWO653-ARIN
OrgNOCName: Network Operations
OrgNOCPhone: +1-404-894-4669
OrgNOCEmail: noc@gatech.edu
OrgNOCRef: https://rdap.arin.net/registry/entity/NETWO653-ARIN
OrgAbuseHandle: GATEC-ARIN
OrgAbuseName: Gatech Abuse
OrgAbusePhone: +1-404-385-5555
OrgAbuseEmail: abuse@gatech.edu
OrgAbuseRef: https://rdap.arin.net/registry/entity/GATEC-ARIN
OrgTechHandle: NETWO653-ARIN
OrgTechName: Network Operations
OrgTechPhone: +1-404-894-4669
OrgTechEmail: noc@gatech.edu
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO653-ARIN
RAbuseHandle: GITCC-ARIN
RAbuseName: GIT-CC-Network-Measurement
RAbusePhone: +1-404-894-4669
RAbuseEmail: Scp-network-measurement@cc.gatech.edu
RAbuseRef: https://rdap.arin.net/registry/entity/GITCC-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.cogentco.com:4321.
%rwhois V-1.5:0010b0:00 rwhois.cogentco.com (CGNT rwhoisd 1.2.1)
network:ID:NET4-266E2E0018
network:Network-Name:NET4-266E2E0018
network:IP-Network:38.110.46.0/24
network:Org-Name:Southern Light Rail, LLC
network:Street-Address:345 COURTLAND ST NE
network:City:ATLANTA
network:State:GA
network:Country:US
network:Postal-Code:30308
network:Tech-Contact:ZC108-ARIN
network:Updated:2025-08-01 11:44:29
%ok
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.110.46.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9585
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;38.110.46.239. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025092901 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 30 02:00:06 CST 2025
;; MSG SIZE rcvd: 106
239.46.110.38.in-addr.arpa domain name pointer researchscan239.cc.gatech.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
239.46.110.38.in-addr.arpa name = researchscan239.cc.gatech.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
106.13.63.202 | attackbotsspam | Nov 25 01:21:46 ny01 sshd[15545]: Failed password for root from 106.13.63.202 port 60064 ssh2 Nov 25 01:29:52 ny01 sshd[16766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.63.202 Nov 25 01:29:55 ny01 sshd[16766]: Failed password for invalid user admin from 106.13.63.202 port 36444 ssh2 |
2019-11-25 16:10:21 |
138.117.109.103 | attackbotsspam | Nov 25 08:34:37 * sshd[15743]: Failed password for root from 138.117.109.103 port 41963 ssh2 |
2019-11-25 15:55:49 |
159.203.201.183 | attackbotsspam | Honeypot hit. |
2019-11-25 16:16:17 |
89.165.116.163 | attack | " " |
2019-11-25 16:00:09 |
139.59.59.187 | attack | Nov 24 14:02:36 server sshd\[2338\]: Failed password for invalid user applmgr from 139.59.59.187 port 51890 ssh2 Nov 25 06:29:17 server sshd\[31661\]: Invalid user webmaster from 139.59.59.187 Nov 25 06:29:17 server sshd\[31661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.59.187 Nov 25 06:29:20 server sshd\[31661\]: Failed password for invalid user webmaster from 139.59.59.187 port 33346 ssh2 Nov 25 09:41:11 server sshd\[15635\]: Invalid user support from 139.59.59.187 Nov 25 09:41:11 server sshd\[15635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.59.187 ... |
2019-11-25 16:18:17 |
180.68.177.15 | attack | Nov 25 14:39:38 webhost01 sshd[21115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.68.177.15 Nov 25 14:39:39 webhost01 sshd[21115]: Failed password for invalid user quickert from 180.68.177.15 port 45886 ssh2 ... |
2019-11-25 15:43:18 |
106.53.90.75 | attackbotsspam | SSH brute-force: detected 7 distinct usernames within a 24-hour window. |
2019-11-25 15:58:46 |
61.55.158.84 | attackspambots | Unauthorised access (Nov 25) SRC=61.55.158.84 LEN=44 TTL=234 ID=11340 TCP DPT=1433 WINDOW=1024 SYN |
2019-11-25 15:47:13 |
139.155.74.38 | attackspambots | $f2bV_matches |
2019-11-25 16:14:50 |
66.249.79.127 | attack | Automatic report - Banned IP Access |
2019-11-25 16:06:14 |
171.61.129.253 | attackbots | Automatic report - Port Scan Attack |
2019-11-25 16:07:20 |
122.51.113.137 | attackspam | Nov 25 08:34:30 vpn01 sshd[4953]: Failed password for root from 122.51.113.137 port 56110 ssh2 ... |
2019-11-25 15:45:25 |
36.37.131.14 | attackbots | Unauthorized connection attempt from IP address 36.37.131.14 on Port 445(SMB) |
2019-11-25 16:07:02 |
202.96.137.99 | attack | Port Scan 1433 |
2019-11-25 15:41:08 |
190.7.128.74 | attack | 2019-11-25T07:33:11.688509abusebot-4.cloudsearch.cf sshd\[17091\]: Invalid user lisa from 190.7.128.74 port 18707 |
2019-11-25 15:51:19 |