CF1760634883906-tsm20251016114356

WWW.RTSAK.COM - abuse.sh

Search for IP or hostnames:

abuse.sh checked at 2025-10-16T17:14:43.893Z 334ms 68/68/68 100% R:13

abuse.sh

NSns1.dyna-ns.net
A2400:cb00:2049:1::a29f:1a5c 🇺🇸 Cloudflare
A2400:cb00:2049:1::a29f:1b9e 🇺🇸 Cloudflare
A162.159.26.92 Cloudflare
A162.159.27.158 Cloudflare
NSns2.dyna-ns.net
A2400:cb00:2049:1::a29f:1805 🇺🇸 Cloudflare
PTRdns1.namecheaphosting.com
A2400:cb00:2049:1::a29f:1905 🇺🇸 Cloudflare
PTRdns2.namecheaphosting.com
A162.159.24.5 Cloudflare
PTRdns1.namecheaphosting.com
A162.159.25.5 Cloudflare
PTRdns2.namecheaphosting.com
A199.59.243.228🇺🇸 Amazon

sh

NSa0.nic.sh
NSa2.nic.sh
NSb0.nic.sh
NSc0.nic.sh

Starts with same word

Starts similarily

AI analysis

abuse.sh resolves to a single IP address: 199.59.243.228.

Other host names including rarbghd.com, walled.it, ovo4.com, realhouse.it and watchword.co.uk share IP numbers with abuse.sh.

abuse.sh's delegation uses two name servers, ns1.dyna-ns.net and ns2.dyna-ns.net.

abuse.sh shares the same name server setup as other domains, for example 12l.cc, homeowninsurance.com, dmitours.com, 4bankmell.buzz and gamiv.com.

Host names with four IP numbers:

ns1.dyna-ns.net points to 2400:cb00:2049:1::a29f:1a5c, 2400:cb00:2049:1::a29f:1b9e, 162.159.26.92 and 162.159.27.158.

ns2.dyna-ns.net points to 2400:cb00:2049:1::a29f:1805, 2400:cb00:2049:1::a29f:1905, 162.159.24.5 and 162.159.25.5.

Perform reverse DNS lookup as well as normal forward DNS. Check Autonomous System Numbers (ASNs) and BGP connections between Internet Service Providers.
dbq

IPGlzlk CF johedugfp 2025-10-16