Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Santa Monica

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       38.0.0.0 - 38.255.255.255
CIDR:           38.0.0.0/8
NetName:        COGENT-A
NetHandle:      NET-38-0-0-0-1
Parent:          ()
NetType:        Direct Allocation
OriginAS:       
Organization:   Cogent Communications, LLC (COGC)
RegDate:        1991-04-16
Updated:        2025-09-23
Ref:            https://rdap.arin.net/registry/ip/38.0.0.0



OrgName:        Cogent Communications, LLC
OrgId:          COGC
Address:        2450 N Street NW
City:           Washington
StateProv:      DC
PostalCode:     20037
Country:        US
RegDate:        2000-05-30
Updated:        2025-09-23
Comment:        Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/COGC

ReferralServer:  rwhois://rwhois.cogentco.com:4321

OrgTechHandle: IPALL-ARIN
OrgTechName:   IP Allocation
OrgTechPhone:  +1-877-875-4311 
OrgTechEmail:  ipalloc@cogentco.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPALL-ARIN

OrgAbuseHandle: COGEN-ARIN
OrgAbuseName:   Cogent Abuse
OrgAbusePhone:  +1-877-875-4311 
OrgAbuseEmail:  abuse@cogentco.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/COGEN-ARIN

OrgNOCHandle: ZC108-ARIN
OrgNOCName:   Cogent Communications
OrgNOCPhone:  +1-877-875-4311 
OrgNOCEmail:  noc@cogentco.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ZC108-ARIN

# end


# start

NetRange:       38.84.88.0 - 38.84.89.255
CIDR:           38.84.88.0/23
NetName:        BRIX-CGNT-NET-19
NetHandle:      NET-38-84-88-0-1
Parent:         COGENT-A (NET-38-0-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   BasicBrix Cloud Pte Ltd (BCPL-16)
RegDate:        2024-05-31
Updated:        2024-05-31
Comment:        Geofeed https://basicbrix.com/geofeed
Ref:            https://rdap.arin.net/registry/ip/38.84.88.0


OrgName:        BasicBrix Cloud Pte Ltd
OrgId:          BCPL-16
Address:        300 Tampines Avenue 5, #09-02 Tampines Junction
City:           Singapore
StateProv:      
PostalCode:     529653
Country:        SG
RegDate:        2024-04-23
Updated:        2024-04-26
Ref:            https://rdap.arin.net/registry/entity/BCPL-16


OrgDNSHandle: NETWO10094-ARIN
OrgDNSName:   Network Administrator
OrgDNSPhone:  +6569577757 
OrgDNSEmail:  network@basicbrix.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/NETWO10094-ARIN

OrgAbuseHandle: ABUSE9004-ARIN
OrgAbuseName:   Abuse Team
OrgAbusePhone:  +6569577757 
OrgAbuseEmail:  abuse@basicbrix.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9004-ARIN

OrgRoutingHandle: NETWO10094-ARIN
OrgRoutingName:   Network Administrator
OrgRoutingPhone:  +6569577757 
OrgRoutingEmail:  network@basicbrix.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/NETWO10094-ARIN

OrgTechHandle: NETWO10094-ARIN
OrgTechName:   Network Administrator
OrgTechPhone:  +6569577757 
OrgTechEmail:  network@basicbrix.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NETWO10094-ARIN

OrgNOCHandle: NETWO10094-ARIN
OrgNOCName:   Network Administrator
OrgNOCPhone:  +6569577757 
OrgNOCEmail:  network@basicbrix.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NETWO10094-ARIN

# end


# start

NetRange:       38.84.89.0 - 38.84.89.255
CIDR:           38.84.89.0/24
NetName:        BX-CGNT-A1-03
NetHandle:      NET-38-84-89-0-1
Parent:         BRIX-CGNT-NET-19 (NET-38-84-88-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Cogent Communications (C10861596)
RegDate:        2024-06-02
Updated:        2024-06-02
Ref:            https://rdap.arin.net/registry/ip/38.84.89.0


CustName:       Cogent Communications
Address:        2947 Bradley Street
City:           Pasadena
StateProv:      CA
PostalCode:     91107
Country:        US
RegDate:        2024-06-02
Updated:        2024-06-02
Ref:            https://rdap.arin.net/registry/entity/C10861596

OrgDNSHandle: NETWO10094-ARIN
OrgDNSName:   Network Administrator
OrgDNSPhone:  +6569577757 
OrgDNSEmail:  network@basicbrix.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/NETWO10094-ARIN

OrgAbuseHandle: ABUSE9004-ARIN
OrgAbuseName:   Abuse Team
OrgAbusePhone:  +6569577757 
OrgAbuseEmail:  abuse@basicbrix.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9004-ARIN

OrgRoutingHandle: NETWO10094-ARIN
OrgRoutingName:   Network Administrator
OrgRoutingPhone:  +6569577757 
OrgRoutingEmail:  network@basicbrix.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/NETWO10094-ARIN

OrgTechHandle: NETWO10094-ARIN
OrgTechName:   Network Administrator
OrgTechPhone:  +6569577757 
OrgTechEmail:  network@basicbrix.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NETWO10094-ARIN

OrgNOCHandle: NETWO10094-ARIN
OrgNOCName:   Network Administrator
OrgNOCPhone:  +6569577757 
OrgNOCEmail:  network@basicbrix.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NETWO10094-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.cogentco.com:4321.

%rwhois V-1.5:0010b0:00 rwhois.cogentco.com (CGNT rwhoisd 1.2.2)
network:ID:NET4-2654580017
network:Network-Name:NET4-2654580017
network:IP-Network:38.84.88.0/23
network:Org-Name:BasicBrix Cloud Pte Ltd
network:Street-Address:2947 BRADLEY STREET
network:City:PASADENA
network:State:CA
network:Country:US
network:Postal-Code:91107
network:Tech-Contact:ZC108-ARIN
network:Updated:2025-07-15 14:51:28
%ok
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.84.89.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6658
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;38.84.89.239.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041100 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 11 18:55:21 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 239.89.84.38.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 239.89.84.38.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.28.32.203 attackbots
email spam
2020-05-02 16:52:25
106.13.80.186 attackspambots
Invalid user steve from 106.13.80.186 port 33998
2020-05-02 16:31:32
130.239.163.188 attack
(sshd) Failed SSH login from 130.239.163.188 (SE/Sweden/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May  2 09:24:02 ubnt-55d23 sshd[3444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.239.163.188  user=root
May  2 09:24:04 ubnt-55d23 sshd[3444]: Failed password for root from 130.239.163.188 port 34997 ssh2
2020-05-02 16:42:47
139.199.34.54 attackbots
May  2 09:56:18 santamaria sshd\[22903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.34.54  user=root
May  2 09:56:20 santamaria sshd\[22903\]: Failed password for root from 139.199.34.54 port 26637 ssh2
May  2 10:01:24 santamaria sshd\[22997\]: Invalid user vel from 139.199.34.54
May  2 10:01:24 santamaria sshd\[22997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.34.54
...
2020-05-02 16:24:21
94.23.212.137 attackbotsspam
May  2 11:33:06 pkdns2 sshd\[16419\]: Invalid user ian from 94.23.212.137May  2 11:33:09 pkdns2 sshd\[16419\]: Failed password for invalid user ian from 94.23.212.137 port 51735 ssh2May  2 11:36:49 pkdns2 sshd\[16605\]: Invalid user admin from 94.23.212.137May  2 11:36:51 pkdns2 sshd\[16605\]: Failed password for invalid user admin from 94.23.212.137 port 47404 ssh2May  2 11:40:30 pkdns2 sshd\[16793\]: Invalid user usuario from 94.23.212.137May  2 11:40:32 pkdns2 sshd\[16793\]: Failed password for invalid user usuario from 94.23.212.137 port 41256 ssh2
...
2020-05-02 16:55:55
49.235.93.192 attackspam
Invalid user tomcat from 49.235.93.192 port 40528
2020-05-02 16:51:01
162.243.232.174 attack
Invalid user desktop from 162.243.232.174 port 41322
2020-05-02 16:17:40
71.6.233.9 attackspam
Port scan: Attack repeated for 24 hours
2020-05-02 16:28:10
137.74.119.50 attackspam
(sshd) Failed SSH login from 137.74.119.50 (FR/France/50.ip-137-74-119.eu): 5 in the last 3600 secs
2020-05-02 16:42:28
111.231.63.14 attackspambots
May  2 15:30:56 webhost01 sshd[21814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.63.14
May  2 15:30:58 webhost01 sshd[21814]: Failed password for invalid user ubuntu from 111.231.63.14 port 51770 ssh2
...
2020-05-02 16:47:20
222.186.173.180 attackbots
May  2 10:20:09 home sshd[15419]: Failed password for root from 222.186.173.180 port 29992 ssh2
May  2 10:20:24 home sshd[15419]: Failed password for root from 222.186.173.180 port 29992 ssh2
May  2 10:20:24 home sshd[15419]: error: maximum authentication attempts exceeded for root from 222.186.173.180 port 29992 ssh2 [preauth]
...
2020-05-02 16:25:02
122.61.154.217 attack
Sniffing for wp-login
2020-05-02 16:53:44
106.13.95.100 attackspam
Invalid user fs from 106.13.95.100 port 44192
2020-05-02 16:36:11
61.160.245.87 attackspam
May  2 09:47:43 prox sshd[20880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.160.245.87 
May  2 09:47:45 prox sshd[20880]: Failed password for invalid user postgres from 61.160.245.87 port 43500 ssh2
2020-05-02 16:38:23
138.68.95.204 attackbotsspam
Invalid user wmc from 138.68.95.204 port 45416
2020-05-02 16:18:53

Recently Reported IPs

62.210.198.189 2606:4700:10::ac43:2253 2606:4700:10::6814:6980 2606:4700:10::ac43:1889
2606:4700:10::ac43:1441 2606:4700:10::6814:5510 110.78.138.83 2606:4700:10::ac43:1331
168.173.203.103 66.132.224.79 2606:4700:10::6814:4549 2606:4700:10::6814:9110
2606:4700:10::6814:8256 2606:4700:10::6816:4735 2606:4700:10::6816:4284 2606:4700:10::6816:1223
218.70.115.164 171.253.242.253 42.114.94.57 10.101.104.98