City: Santa Monica
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 38.0.0.0 - 38.255.255.255
CIDR: 38.0.0.0/8
NetName: COGENT-A
NetHandle: NET-38-0-0-0-1
Parent: ()
NetType: Direct Allocation
OriginAS:
Organization: Cogent Communications, LLC (COGC)
RegDate: 1991-04-16
Updated: 2025-09-23
Ref: https://rdap.arin.net/registry/ip/38.0.0.0
OrgName: Cogent Communications, LLC
OrgId: COGC
Address: 2450 N Street NW
City: Washington
StateProv: DC
PostalCode: 20037
Country: US
RegDate: 2000-05-30
Updated: 2025-09-23
Comment: Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref: https://rdap.arin.net/registry/entity/COGC
ReferralServer: rwhois://rwhois.cogentco.com:4321
OrgTechHandle: IPALL-ARIN
OrgTechName: IP Allocation
OrgTechPhone: +1-877-875-4311
OrgTechEmail: ipalloc@cogentco.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPALL-ARIN
OrgAbuseHandle: COGEN-ARIN
OrgAbuseName: Cogent Abuse
OrgAbusePhone: +1-877-875-4311
OrgAbuseEmail: abuse@cogentco.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/COGEN-ARIN
OrgNOCHandle: ZC108-ARIN
OrgNOCName: Cogent Communications
OrgNOCPhone: +1-877-875-4311
OrgNOCEmail: noc@cogentco.com
OrgNOCRef: https://rdap.arin.net/registry/entity/ZC108-ARIN
# end
# start
NetRange: 38.84.88.0 - 38.84.89.255
CIDR: 38.84.88.0/23
NetName: BRIX-CGNT-NET-19
NetHandle: NET-38-84-88-0-1
Parent: COGENT-A (NET-38-0-0-0-1)
NetType: Reallocated
OriginAS:
Organization: BasicBrix Cloud Pte Ltd (BCPL-16)
RegDate: 2024-05-31
Updated: 2024-05-31
Comment: Geofeed https://basicbrix.com/geofeed
Ref: https://rdap.arin.net/registry/ip/38.84.88.0
OrgName: BasicBrix Cloud Pte Ltd
OrgId: BCPL-16
Address: 300 Tampines Avenue 5, #09-02 Tampines Junction
City: Singapore
StateProv:
PostalCode: 529653
Country: SG
RegDate: 2024-04-23
Updated: 2024-04-26
Ref: https://rdap.arin.net/registry/entity/BCPL-16
OrgDNSHandle: NETWO10094-ARIN
OrgDNSName: Network Administrator
OrgDNSPhone: +6569577757
OrgDNSEmail: network@basicbrix.com
OrgDNSRef: https://rdap.arin.net/registry/entity/NETWO10094-ARIN
OrgAbuseHandle: ABUSE9004-ARIN
OrgAbuseName: Abuse Team
OrgAbusePhone: +6569577757
OrgAbuseEmail: abuse@basicbrix.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE9004-ARIN
OrgRoutingHandle: NETWO10094-ARIN
OrgRoutingName: Network Administrator
OrgRoutingPhone: +6569577757
OrgRoutingEmail: network@basicbrix.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/NETWO10094-ARIN
OrgTechHandle: NETWO10094-ARIN
OrgTechName: Network Administrator
OrgTechPhone: +6569577757
OrgTechEmail: network@basicbrix.com
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO10094-ARIN
OrgNOCHandle: NETWO10094-ARIN
OrgNOCName: Network Administrator
OrgNOCPhone: +6569577757
OrgNOCEmail: network@basicbrix.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NETWO10094-ARIN
# end
# start
NetRange: 38.84.89.0 - 38.84.89.255
CIDR: 38.84.89.0/24
NetName: BX-CGNT-A1-03
NetHandle: NET-38-84-89-0-1
Parent: BRIX-CGNT-NET-19 (NET-38-84-88-0-1)
NetType: Reassigned
OriginAS:
Customer: Cogent Communications (C10861596)
RegDate: 2024-06-02
Updated: 2024-06-02
Ref: https://rdap.arin.net/registry/ip/38.84.89.0
CustName: Cogent Communications
Address: 2947 Bradley Street
City: Pasadena
StateProv: CA
PostalCode: 91107
Country: US
RegDate: 2024-06-02
Updated: 2024-06-02
Ref: https://rdap.arin.net/registry/entity/C10861596
OrgDNSHandle: NETWO10094-ARIN
OrgDNSName: Network Administrator
OrgDNSPhone: +6569577757
OrgDNSEmail: network@basicbrix.com
OrgDNSRef: https://rdap.arin.net/registry/entity/NETWO10094-ARIN
OrgAbuseHandle: ABUSE9004-ARIN
OrgAbuseName: Abuse Team
OrgAbusePhone: +6569577757
OrgAbuseEmail: abuse@basicbrix.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE9004-ARIN
OrgRoutingHandle: NETWO10094-ARIN
OrgRoutingName: Network Administrator
OrgRoutingPhone: +6569577757
OrgRoutingEmail: network@basicbrix.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/NETWO10094-ARIN
OrgTechHandle: NETWO10094-ARIN
OrgTechName: Network Administrator
OrgTechPhone: +6569577757
OrgTechEmail: network@basicbrix.com
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO10094-ARIN
OrgNOCHandle: NETWO10094-ARIN
OrgNOCName: Network Administrator
OrgNOCPhone: +6569577757
OrgNOCEmail: network@basicbrix.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NETWO10094-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.cogentco.com:4321.
%rwhois V-1.5:0010b0:00 rwhois.cogentco.com (CGNT rwhoisd 1.2.2)
network:ID:NET4-2654580017
network:Network-Name:NET4-2654580017
network:IP-Network:38.84.88.0/23
network:Org-Name:BasicBrix Cloud Pte Ltd
network:Street-Address:2947 BRADLEY STREET
network:City:PASADENA
network:State:CA
network:Country:US
network:Postal-Code:91107
network:Tech-Contact:ZC108-ARIN
network:Updated:2025-07-15 14:51:28
%ok
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.84.89.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6658
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;38.84.89.239. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041100 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 11 18:55:21 CST 2026
;; MSG SIZE rcvd: 105
Host 239.89.84.38.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 239.89.84.38.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 89.28.32.203 | attackbots | email spam |
2020-05-02 16:52:25 |
| 106.13.80.186 | attackspambots | Invalid user steve from 106.13.80.186 port 33998 |
2020-05-02 16:31:32 |
| 130.239.163.188 | attack | (sshd) Failed SSH login from 130.239.163.188 (SE/Sweden/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 2 09:24:02 ubnt-55d23 sshd[3444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.239.163.188 user=root May 2 09:24:04 ubnt-55d23 sshd[3444]: Failed password for root from 130.239.163.188 port 34997 ssh2 |
2020-05-02 16:42:47 |
| 139.199.34.54 | attackbots | May 2 09:56:18 santamaria sshd\[22903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.34.54 user=root May 2 09:56:20 santamaria sshd\[22903\]: Failed password for root from 139.199.34.54 port 26637 ssh2 May 2 10:01:24 santamaria sshd\[22997\]: Invalid user vel from 139.199.34.54 May 2 10:01:24 santamaria sshd\[22997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.34.54 ... |
2020-05-02 16:24:21 |
| 94.23.212.137 | attackbotsspam | May 2 11:33:06 pkdns2 sshd\[16419\]: Invalid user ian from 94.23.212.137May 2 11:33:09 pkdns2 sshd\[16419\]: Failed password for invalid user ian from 94.23.212.137 port 51735 ssh2May 2 11:36:49 pkdns2 sshd\[16605\]: Invalid user admin from 94.23.212.137May 2 11:36:51 pkdns2 sshd\[16605\]: Failed password for invalid user admin from 94.23.212.137 port 47404 ssh2May 2 11:40:30 pkdns2 sshd\[16793\]: Invalid user usuario from 94.23.212.137May 2 11:40:32 pkdns2 sshd\[16793\]: Failed password for invalid user usuario from 94.23.212.137 port 41256 ssh2 ... |
2020-05-02 16:55:55 |
| 49.235.93.192 | attackspam | Invalid user tomcat from 49.235.93.192 port 40528 |
2020-05-02 16:51:01 |
| 162.243.232.174 | attack | Invalid user desktop from 162.243.232.174 port 41322 |
2020-05-02 16:17:40 |
| 71.6.233.9 | attackspam | Port scan: Attack repeated for 24 hours |
2020-05-02 16:28:10 |
| 137.74.119.50 | attackspam | (sshd) Failed SSH login from 137.74.119.50 (FR/France/50.ip-137-74-119.eu): 5 in the last 3600 secs |
2020-05-02 16:42:28 |
| 111.231.63.14 | attackspambots | May 2 15:30:56 webhost01 sshd[21814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.63.14 May 2 15:30:58 webhost01 sshd[21814]: Failed password for invalid user ubuntu from 111.231.63.14 port 51770 ssh2 ... |
2020-05-02 16:47:20 |
| 222.186.173.180 | attackbots | May 2 10:20:09 home sshd[15419]: Failed password for root from 222.186.173.180 port 29992 ssh2 May 2 10:20:24 home sshd[15419]: Failed password for root from 222.186.173.180 port 29992 ssh2 May 2 10:20:24 home sshd[15419]: error: maximum authentication attempts exceeded for root from 222.186.173.180 port 29992 ssh2 [preauth] ... |
2020-05-02 16:25:02 |
| 122.61.154.217 | attack | Sniffing for wp-login |
2020-05-02 16:53:44 |
| 106.13.95.100 | attackspam | Invalid user fs from 106.13.95.100 port 44192 |
2020-05-02 16:36:11 |
| 61.160.245.87 | attackspam | May 2 09:47:43 prox sshd[20880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.160.245.87 May 2 09:47:45 prox sshd[20880]: Failed password for invalid user postgres from 61.160.245.87 port 43500 ssh2 |
2020-05-02 16:38:23 |
| 138.68.95.204 | attackbotsspam | Invalid user wmc from 138.68.95.204 port 45416 |
2020-05-02 16:18:53 |