Your iP is: 216.73.216.173
Near: United States
Near: United States
IP Lookup Details:
IP Information - 24.53.139.16
Host name: cm-24-53-139-16.buckeyecom.net
Country: United States
Country Code: US
Region: Ohio
City: Toledo
Latitude: 41.6572
Longitude: -83.5188
Whois information
NetRange: 24.53.128.0 - 24.53.191.255
CIDR: 24.53.128.0/18
NetName: BUCKEYE-CABLESYSTEM
NetHandle: NET-24-53-128-0-1
Parent: NET24 (NET-24-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Buckeye Cablevision, Inc. (BUCKEY-4)
RegDate: 2009-03-31
Updated: 2012-03-02
Ref: https://rdap.arin.net/registry/ip/24.53.128.0
OrgName: Buckeye Cablevision, Inc.
OrgId: BUCKEY-4
Address: 5566 Southwyck Blvd.
City: Toledo
StateProv: OH
PostalCode: 43614
Country: US
RegDate: 2000-11-10
Updated: 2025-10-27
Ref: https://rdap.arin.net/registry/entity/BUCKEY-4
ReferralServer: rwhois://rwhois.buckeyecom.net:4321
OrgTechHandle: INE20-ARIN
OrgTechName: IP Network Engineering
OrgTechPhone: +1-419-724-3884
OrgTechEmail: ss-noc@sharedsvcs.com
OrgTechRef: https://rdap.arin.net/registry/entity/INE20-ARIN
OrgNOCHandle: INE20-ARIN
OrgNOCName: IP Network Engineering
OrgNOCPhone: +1-419-724-3884
OrgNOCEmail: ss-noc@sharedsvcs.com
OrgNOCRef: https://rdap.arin.net/registry/entity/INE20-ARIN
OrgTechHandle: FINCH167-ARIN
OrgTechName: Finch, Derek
OrgTechPhone: +1-419-724-3710
OrgTechEmail: dfinch@buckeyebroadband.com
OrgTechRef: https://rdap.arin.net/registry/entity/FINCH167-ARIN
OrgAbuseHandle: ABUSE5855-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +1-419-724-3884
OrgAbuseEmail: abuse@bex.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE5855-ARIN
RNOCHandle: ZA107-ARIN
RNOCName: DNS-TECH
RNOCPhone: +1-419-724-3845
RNOCEmail: dns-tech@buckeye-access.com
RNOCRef: https://rdap.arin.net/registry/entity/ZA107-ARIN
RTechHandle: ZA107-ARIN
RTechName: DNS-TECH
RTechPhone: +1-419-724-3845
RTechEmail: dns-tech@buckeye-access.com
RTechRef: https://rdap.arin.net/registry/entity/ZA107-ARIN
RAbuseHandle: BAI-ARIN
RAbuseName: Buckeye Abuse Investigations
RAbusePhone: +1-419-724-3278
RAbuseEmail: abuse@buckeye-express.com
RAbuseRef: https://rdap.arin.net/registry/entity/BAI-ARIN
CIDR: 24.53.128.0/18
NetName: BUCKEYE-CABLESYSTEM
NetHandle: NET-24-53-128-0-1
Parent: NET24 (NET-24-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Buckeye Cablevision, Inc. (BUCKEY-4)
RegDate: 2009-03-31
Updated: 2012-03-02
Ref: https://rdap.arin.net/registry/ip/24.53.128.0
OrgName: Buckeye Cablevision, Inc.
OrgId: BUCKEY-4
Address: 5566 Southwyck Blvd.
City: Toledo
StateProv: OH
PostalCode: 43614
Country: US
RegDate: 2000-11-10
Updated: 2025-10-27
Ref: https://rdap.arin.net/registry/entity/BUCKEY-4
ReferralServer: rwhois://rwhois.buckeyecom.net:4321
OrgTechHandle: INE20-ARIN
OrgTechName: IP Network Engineering
OrgTechPhone: +1-419-724-3884
OrgTechEmail: ss-noc@sharedsvcs.com
OrgTechRef: https://rdap.arin.net/registry/entity/INE20-ARIN
OrgNOCHandle: INE20-ARIN
OrgNOCName: IP Network Engineering
OrgNOCPhone: +1-419-724-3884
OrgNOCEmail: ss-noc@sharedsvcs.com
OrgNOCRef: https://rdap.arin.net/registry/entity/INE20-ARIN
OrgTechHandle: FINCH167-ARIN
OrgTechName: Finch, Derek
OrgTechPhone: +1-419-724-3710
OrgTechEmail: dfinch@buckeyebroadband.com
OrgTechRef: https://rdap.arin.net/registry/entity/FINCH167-ARIN
OrgAbuseHandle: ABUSE5855-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +1-419-724-3884
OrgAbuseEmail: abuse@bex.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE5855-ARIN
RNOCHandle: ZA107-ARIN
RNOCName: DNS-TECH
RNOCPhone: +1-419-724-3845
RNOCEmail: dns-tech@buckeye-access.com
RNOCRef: https://rdap.arin.net/registry/entity/ZA107-ARIN
RTechHandle: ZA107-ARIN
RTechName: DNS-TECH
RTechPhone: +1-419-724-3845
RTechEmail: dns-tech@buckeye-access.com
RTechRef: https://rdap.arin.net/registry/entity/ZA107-ARIN
RAbuseHandle: BAI-ARIN
RAbuseName: Buckeye Abuse Investigations
RAbusePhone: +1-419-724-3278
RAbuseEmail: abuse@buckeye-express.com
RAbuseRef: https://rdap.arin.net/registry/entity/BAI-ARIN
Sasha
The IP tried to launch 'Dark Tequila' malware that steals banking information and login credentials from the server.
Reported on: 27th, Jan. 2025
