City: Atlanta
Region: Georgia
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 38.0.0.0 - 38.255.255.255
CIDR: 38.0.0.0/8
NetName: COGENT-A
NetHandle: NET-38-0-0-0-1
Parent: ()
NetType: Direct Allocation
OriginAS:
Organization: Cogent Communications, LLC (COGC)
RegDate: 1991-04-16
Updated: 2025-09-23
Ref: https://rdap.arin.net/registry/ip/38.0.0.0
OrgName: Cogent Communications, LLC
OrgId: COGC
Address: 2450 N Street NW
City: Washington
StateProv: DC
PostalCode: 20037
Country: US
RegDate: 2000-05-30
Updated: 2025-09-23
Comment: Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref: https://rdap.arin.net/registry/entity/COGC
ReferralServer: rwhois://rwhois.cogentco.com:4321
OrgNOCHandle: ZC108-ARIN
OrgNOCName: Cogent Communications
OrgNOCPhone: +1-877-875-4311
OrgNOCEmail: noc@cogentco.com
OrgNOCRef: https://rdap.arin.net/registry/entity/ZC108-ARIN
OrgAbuseHandle: COGEN-ARIN
OrgAbuseName: Cogent Abuse
OrgAbusePhone: +1-877-875-4311
OrgAbuseEmail: abuse@cogentco.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/COGEN-ARIN
OrgTechHandle: IPALL-ARIN
OrgTechName: IP Allocation
OrgTechPhone: +1-877-875-4311
OrgTechEmail: ipalloc@cogentco.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPALL-ARIN
# end
# start
NetRange: 38.110.46.0 - 38.110.46.255
CIDR: 38.110.46.0/24
NetName: SLR-GT-CGNT-NET-1
NetHandle: NET-38-110-46-0-1
Parent: COGENT-A (NET-38-0-0-0-1)
NetType: Reassigned
OriginAS:
Organization: Georgia Institute of Technology (GIT-Z)
RegDate: 2023-09-01
Updated: 2024-02-29
Ref: https://rdap.arin.net/registry/ip/38.110.46.0
OrgName: Georgia Institute of Technology
OrgId: GIT-Z
Address: 756 W Peachtree ST
City: Atlanta
StateProv: GA
PostalCode: 30308
Country: US
RegDate: 2010-10-21
Updated: 2020-03-27
Comment: https://www.gatech.edu
Ref: https://rdap.arin.net/registry/entity/GIT-Z
OrgTechHandle: NETWO653-ARIN
OrgTechName: Network Operations
OrgTechPhone: +1-404-894-4669
OrgTechEmail: noc@gatech.edu
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO653-ARIN
OrgAbuseHandle: GATEC-ARIN
OrgAbuseName: Gatech Abuse
OrgAbusePhone: +1-404-385-5555
OrgAbuseEmail: abuse@gatech.edu
OrgAbuseRef: https://rdap.arin.net/registry/entity/GATEC-ARIN
OrgNOCHandle: NETWO653-ARIN
OrgNOCName: Network Operations
OrgNOCPhone: +1-404-894-4669
OrgNOCEmail: noc@gatech.edu
OrgNOCRef: https://rdap.arin.net/registry/entity/NETWO653-ARIN
RAbuseHandle: GITCC-ARIN
RAbuseName: GIT-CC-Network-Measurement
RAbusePhone: +1-404-894-4669
RAbuseEmail: Scp-network-measurement@cc.gatech.edu
RAbuseRef: https://rdap.arin.net/registry/entity/GITCC-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.cogentco.com:4321.
%rwhois V-1.5:0010b0:00 rwhois.cogentco.com (CGNT rwhoisd 1.2.1)
network:ID:NET4-266E2E0018
network:Network-Name:NET4-266E2E0018
network:IP-Network:38.110.46.0/24
network:Org-Name:Southern Light Rail, LLC
network:Street-Address:345 COURTLAND ST NE
network:City:ATLANTA
network:State:GA
network:Country:US
network:Postal-Code:30308
network:Tech-Contact:ZC108-ARIN
network:Updated:2025-08-01 11:44:29
%ok
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.110.46.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4432
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;38.110.46.241. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025100600 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 06 15:31:14 CST 2025
;; MSG SIZE rcvd: 106
241.46.110.38.in-addr.arpa domain name pointer researchscan241.cc.gatech.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
241.46.110.38.in-addr.arpa name = researchscan241.cc.gatech.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
111.67.194.109 | attackbots | Feb 23 05:47:32 game-panel sshd[3767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.194.109 Feb 23 05:47:34 game-panel sshd[3767]: Failed password for invalid user uno85 from 111.67.194.109 port 46142 ssh2 Feb 23 05:49:58 game-panel sshd[3810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.194.109 |
2020-02-23 14:11:06 |
122.51.246.89 | attackbots | Feb 23 02:57:50 firewall sshd[23496]: Invalid user plex from 122.51.246.89 Feb 23 02:57:53 firewall sshd[23496]: Failed password for invalid user plex from 122.51.246.89 port 37694 ssh2 Feb 23 03:02:35 firewall sshd[23613]: Invalid user yaohuachao from 122.51.246.89 ... |
2020-02-23 14:25:19 |
39.105.74.166 | attack | Feb 23 06:01:25 vps670341 sshd[24330]: Invalid user test from 39.105.74.166 port 18185 |
2020-02-23 14:24:30 |
222.186.30.167 | attackspam | Feb 23 11:48:01 areeb-Workstation sshd[26569]: Failed password for root from 222.186.30.167 port 16393 ssh2 Feb 23 11:48:03 areeb-Workstation sshd[26569]: Failed password for root from 222.186.30.167 port 16393 ssh2 ... |
2020-02-23 14:18:24 |
94.232.124.233 | attack | Feb 23 07:09:14 markkoudstaal sshd[23811]: Failed password for root from 94.232.124.233 port 49248 ssh2 Feb 23 07:12:18 markkoudstaal sshd[24349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.232.124.233 Feb 23 07:12:20 markkoudstaal sshd[24349]: Failed password for invalid user test from 94.232.124.233 port 35313 ssh2 |
2020-02-23 14:14:29 |
34.93.188.33 | attackspambots | POST /wp-login.php HTTP/1.1 200 2442 Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0 |
2020-02-23 14:47:42 |
101.200.48.80 | attack | Feb 23 06:51:00 journals dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 3 secs\): user=\ |
2020-02-23 14:27:45 |
45.143.221.49 | attackbotsspam | Trying ports that it shouldn't be. |
2020-02-23 14:05:51 |
77.93.126.12 | attackbotsspam | Feb 22 20:02:28 tdfoods sshd\[13686\]: Invalid user nitish from 77.93.126.12 Feb 22 20:02:28 tdfoods sshd\[13686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.93.126.12 Feb 22 20:02:29 tdfoods sshd\[13686\]: Failed password for invalid user nitish from 77.93.126.12 port 37560 ssh2 Feb 22 20:06:25 tdfoods sshd\[13947\]: Invalid user nitish from 77.93.126.12 Feb 22 20:06:25 tdfoods sshd\[13947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.93.126.12 |
2020-02-23 14:19:07 |
172.105.192.195 | attack | Feb 23 05:55:39 debian-2gb-nbg1-2 kernel: \[4692943.772197\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=172.105.192.195 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=45918 DPT=9999 WINDOW=65535 RES=0x00 SYN URGP=0 |
2020-02-23 14:46:08 |
176.12.64.118 | attack | Unauthorized connection attempt detected from IP address 176.12.64.118 to port 23 [J] |
2020-02-23 14:49:42 |
141.212.122.137 | attackbotsspam | Feb 23 05:56:43 debian-2gb-nbg1-2 kernel: \[4693007.577083\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=141.212.122.137 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=236 ID=54321 PROTO=TCP SPT=45392 DPT=63029 WINDOW=65535 RES=0x00 SYN URGP=0 |
2020-02-23 14:06:15 |
93.39.104.224 | attack | Unauthorized connection attempt detected from IP address 93.39.104.224 to port 2220 [J] |
2020-02-23 14:13:24 |
141.98.80.173 | attack | Feb 23 06:55:31 ns3042688 sshd\[29690\]: Invalid user admin from 141.98.80.173 Feb 23 06:55:31 ns3042688 sshd\[29690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.80.173 Feb 23 06:55:33 ns3042688 sshd\[29690\]: Failed password for invalid user admin from 141.98.80.173 port 38698 ssh2 Feb 23 06:55:35 ns3042688 sshd\[29692\]: Invalid user ubnt from 141.98.80.173 Feb 23 06:55:35 ns3042688 sshd\[29692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.80.173 ... |
2020-02-23 14:43:45 |
203.158.166.6 | attackbotsspam | TH_APNIC-HM_<177>1582433769 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 203.158.166.6:56634 |
2020-02-23 14:28:38 |