City: Atlanta
Region: Georgia
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 38.0.0.0 - 38.255.255.255
CIDR: 38.0.0.0/8
NetName: COGENT-A
NetHandle: NET-38-0-0-0-1
Parent: ()
NetType: Direct Allocation
OriginAS:
Organization: Cogent Communications, LLC (COGC)
RegDate: 1991-04-16
Updated: 2025-09-23
Ref: https://rdap.arin.net/registry/ip/38.0.0.0
OrgName: Cogent Communications, LLC
OrgId: COGC
Address: 2450 N Street NW
City: Washington
StateProv: DC
PostalCode: 20037
Country: US
RegDate: 2000-05-30
Updated: 2025-09-23
Comment: Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref: https://rdap.arin.net/registry/entity/COGC
ReferralServer: rwhois://rwhois.cogentco.com:4321
OrgTechHandle: IPALL-ARIN
OrgTechName: IP Allocation
OrgTechPhone: +1-877-875-4311
OrgTechEmail: ipalloc@cogentco.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPALL-ARIN
OrgAbuseHandle: COGEN-ARIN
OrgAbuseName: Cogent Abuse
OrgAbusePhone: +1-877-875-4311
OrgAbuseEmail: abuse@cogentco.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/COGEN-ARIN
OrgNOCHandle: ZC108-ARIN
OrgNOCName: Cogent Communications
OrgNOCPhone: +1-877-875-4311
OrgNOCEmail: noc@cogentco.com
OrgNOCRef: https://rdap.arin.net/registry/entity/ZC108-ARIN
# end
# start
NetRange: 38.110.46.0 - 38.110.46.255
CIDR: 38.110.46.0/24
NetName: SLR-GT-CGNT-NET-1
NetHandle: NET-38-110-46-0-1
Parent: COGENT-A (NET-38-0-0-0-1)
NetType: Reassigned
OriginAS:
Organization: Georgia Institute of Technology (GIT-Z)
RegDate: 2023-09-01
Updated: 2024-02-29
Ref: https://rdap.arin.net/registry/ip/38.110.46.0
OrgName: Georgia Institute of Technology
OrgId: GIT-Z
Address: 756 W Peachtree ST
City: Atlanta
StateProv: GA
PostalCode: 30308
Country: US
RegDate: 2010-10-21
Updated: 2020-03-27
Comment: https://www.gatech.edu
Ref: https://rdap.arin.net/registry/entity/GIT-Z
OrgAbuseHandle: GATEC-ARIN
OrgAbuseName: Gatech Abuse
OrgAbusePhone: +1-404-385-5555
OrgAbuseEmail: abuse@gatech.edu
OrgAbuseRef: https://rdap.arin.net/registry/entity/GATEC-ARIN
OrgTechHandle: NETWO653-ARIN
OrgTechName: Network Operations
OrgTechPhone: +1-404-894-4669
OrgTechEmail: noc@gatech.edu
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO653-ARIN
OrgNOCHandle: NETWO653-ARIN
OrgNOCName: Network Operations
OrgNOCPhone: +1-404-894-4669
OrgNOCEmail: noc@gatech.edu
OrgNOCRef: https://rdap.arin.net/registry/entity/NETWO653-ARIN
RAbuseHandle: GITCC-ARIN
RAbuseName: GIT-CC-Network-Measurement
RAbusePhone: +1-404-894-4669
RAbuseEmail: Scp-network-measurement@cc.gatech.edu
RAbuseRef: https://rdap.arin.net/registry/entity/GITCC-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.cogentco.com:4321.
%rwhois V-1.5:0010b0:00 rwhois.cogentco.com (CGNT rwhoisd 1.2.1)
network:ID:NET4-266E2E0018
network:Network-Name:NET4-266E2E0018
network:IP-Network:38.110.46.0/24
network:Org-Name:Southern Light Rail, LLC
network:Street-Address:345 COURTLAND ST NE
network:City:ATLANTA
network:State:GA
network:Country:US
network:Postal-Code:30308
network:Tech-Contact:ZC108-ARIN
network:Updated:2025-08-01 11:44:29
%ok
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.110.46.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2855
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;38.110.46.242. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101301 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 14 12:31:04 CST 2025
;; MSG SIZE rcvd: 106
242.46.110.38.in-addr.arpa domain name pointer researchscan242.cc.gatech.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
242.46.110.38.in-addr.arpa name = researchscan242.cc.gatech.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
45.80.64.230 | attackbots | Sep 23 17:04:23 IngegnereFirenze sshd[27731]: Failed password for invalid user tmp from 45.80.64.230 port 55926 ssh2 ... |
2020-09-24 05:35:31 |
83.48.101.184 | attackspambots | (sshd) Failed SSH login from 83.48.101.184 (ES/Spain/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 23 12:52:15 server4 sshd[22708]: Invalid user System from 83.48.101.184 Sep 23 12:52:17 server4 sshd[22708]: Failed password for invalid user System from 83.48.101.184 port 44631 ssh2 Sep 23 12:59:42 server4 sshd[27430]: Invalid user ftptest from 83.48.101.184 Sep 23 12:59:44 server4 sshd[27430]: Failed password for invalid user ftptest from 83.48.101.184 port 27341 ssh2 Sep 23 13:03:45 server4 sshd[30015]: Invalid user vertica from 83.48.101.184 |
2020-09-24 06:07:45 |
118.25.0.193 | attackspam | fail2ban detected brute force |
2020-09-24 05:37:35 |
181.36.244.84 | attackspam | Automatic report - Banned IP Access |
2020-09-24 05:49:50 |
24.180.198.215 | attack | 24.180.198.215 (US/United States/024-180-198-215.res.spectrum.com), 4 distributed sshd attacks on account [admin] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 23 13:02:06 internal2 sshd[1901]: Invalid user admin from 217.136.171.122 port 37274 Sep 23 13:04:19 internal2 sshd[3662]: Invalid user admin from 24.180.198.215 port 51519 Sep 23 13:02:07 internal2 sshd[1940]: Invalid user admin from 217.136.171.122 port 37342 Sep 23 13:02:09 internal2 sshd[1961]: Invalid user admin from 217.136.171.122 port 37372 IP Addresses Blocked: 217.136.171.122 (BE/Belgium/122.171-136-217.adsl-static.isp.belgacom.be) |
2020-09-24 05:38:29 |
180.109.34.240 | attackbots | 2020-09-23 22:46:31,527 fail2ban.actions: WARNING [ssh] Ban 180.109.34.240 |
2020-09-24 05:42:07 |
186.155.19.178 | attackbotsspam | Icarus honeypot on github |
2020-09-24 05:39:39 |
167.172.164.37 | attackbotsspam | Brute-force attempt banned |
2020-09-24 06:04:14 |
185.120.6.170 | attack | sew-(visforms) : try to access forms... |
2020-09-24 06:10:02 |
94.102.57.181 | attackspam | Port scan on 15 port(s): 23140 23159 23247 23251 23266 23332 23501 23527 23536 23712 23724 23725 23792 23794 23972 |
2020-09-24 06:02:16 |
195.154.174.175 | attack | 2020-09-24T00:46:17.994225mail.standpoint.com.ua sshd[19666]: Invalid user ts3server from 195.154.174.175 port 33342 2020-09-24T00:46:17.997546mail.standpoint.com.ua sshd[19666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-154-174-175.rev.poneytelecom.eu 2020-09-24T00:46:17.994225mail.standpoint.com.ua sshd[19666]: Invalid user ts3server from 195.154.174.175 port 33342 2020-09-24T00:46:20.361204mail.standpoint.com.ua sshd[19666]: Failed password for invalid user ts3server from 195.154.174.175 port 33342 ssh2 2020-09-24T00:49:48.217977mail.standpoint.com.ua sshd[20112]: Invalid user vtcbikes from 195.154.174.175 port 43336 ... |
2020-09-24 05:58:20 |
177.22.126.149 | attackbots | Sep 23 13:16:00 NPSTNNYC01T sshd[28691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.22.126.149 Sep 23 13:16:02 NPSTNNYC01T sshd[28691]: Failed password for invalid user manu from 177.22.126.149 port 33068 ssh2 Sep 23 13:19:58 NPSTNNYC01T sshd[29046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.22.126.149 ... |
2020-09-24 05:42:26 |
52.188.7.154 | attackbots | Sep 23 23:31:29 raspberrypi sshd[1169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.188.7.154 user=root Sep 23 23:31:30 raspberrypi sshd[1169]: Failed password for invalid user root from 52.188.7.154 port 56956 ssh2 ... |
2020-09-24 05:51:30 |
60.12.221.84 | attackbotsspam | Sep 23 20:01:35 santamaria sshd\[3807\]: Invalid user ivan from 60.12.221.84 Sep 23 20:01:35 santamaria sshd\[3807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.12.221.84 Sep 23 20:01:37 santamaria sshd\[3807\]: Failed password for invalid user ivan from 60.12.221.84 port 50053 ssh2 ... |
2020-09-24 06:08:16 |
40.71.233.57 | attackbots | 2020-09-23T15:28:32.084101linuxbox-skyline sshd[100579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.71.233.57 user=root 2020-09-23T15:28:34.227249linuxbox-skyline sshd[100579]: Failed password for root from 40.71.233.57 port 12269 ssh2 ... |
2020-09-24 06:10:48 |