City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 104.129.18.0 - 104.129.63.255
CIDR: 104.129.18.0/23, 104.129.24.0/21, 104.129.32.0/19, 104.129.20.0/22
NetName: HOSTP-7
NetHandle: NET-104-129-18-0-2
Parent: NET104 (NET-104-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: HostPapa (HOSTP-7)
RegDate: 2025-01-30
Updated: 2025-01-30
Ref: https://rdap.arin.net/registry/ip/104.129.18.0
OrgName: HostPapa
OrgId: HOSTP-7
Address: 325 Delaware Avenue
Address: Suite 300
City: Buffalo
StateProv: NY
PostalCode: 14202
Country: US
RegDate: 2016-06-06
Updated: 2025-10-05
Ref: https://rdap.arin.net/registry/entity/HOSTP-7
OrgAbuseHandle: NETAB23-ARIN
OrgAbuseName: NETABUSE
OrgAbusePhone: +1-905-315-3455
OrgAbuseEmail: net-abuse-global@hostpapa.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/NETAB23-ARIN
OrgTechHandle: NETTE9-ARIN
OrgTechName: NETTECH
OrgTechPhone: +1-905-315-3455
OrgTechEmail: net-tech-global@hostpapa.com
OrgTechRef: https://rdap.arin.net/registry/entity/NETTE9-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.129.23.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49037
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.129.23.103. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041300 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 22:32:01 CST 2026
;; MSG SIZE rcvd: 107
Host 103.23.129.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 103.23.129.104.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 125.167.78.124 | attackbotsspam | Unauthorized connection attempt from IP address 125.167.78.124 on Port 445(SMB) |
2019-11-17 23:20:22 |
| 182.160.108.210 | attack | Nov 17 08:30:30 mailman postfix/smtpd[7066]: NOQUEUE: reject: RCPT from smtp.iomltd.com[182.160.108.210]: 554 5.7.1 Service unavailable; Client host [182.160.108.210] blocked using sbl-xbl.spamhaus.org; https://www.spamhaus.org/query/ip/182.160.108.210; from= |
2019-11-17 23:32:41 |
| 82.194.17.33 | attackbots | FTP brute force ... |
2019-11-17 23:34:30 |
| 115.79.252.223 | attackbots | $f2bV_matches |
2019-11-17 23:41:16 |
| 87.101.153.22 | attack | Automatic report - Banned IP Access |
2019-11-17 23:09:28 |
| 77.40.108.20 | attack | 11/17/2019-15:45:42.006723 77.40.108.20 Protocol: 6 SURICATA SMTP tls rejected |
2019-11-17 23:13:41 |
| 58.250.27.18 | attack | Port Scan 1433 |
2019-11-17 23:42:54 |
| 51.255.168.127 | attackspambots | fail2ban |
2019-11-17 23:21:33 |
| 117.23.120.21 | attackbots | 23/tcp [2019-11-17]1pkt |
2019-11-17 23:08:57 |
| 103.73.96.153 | attackspambots | Unauthorized connection attempt from IP address 103.73.96.153 on Port 445(SMB) |
2019-11-17 23:25:12 |
| 200.188.0.250 | attackbotsspam | Unauthorized connection attempt from IP address 200.188.0.250 on Port 445(SMB) |
2019-11-17 23:32:26 |
| 195.140.213.102 | attack | [portscan] Port scan |
2019-11-17 23:43:28 |
| 179.99.122.212 | attackbots | Unauthorized connection attempt from IP address 179.99.122.212 on Port 445(SMB) |
2019-11-17 23:42:43 |
| 119.2.51.6 | attackspambots | Unauthorized connection attempt from IP address 119.2.51.6 on Port 445(SMB) |
2019-11-17 23:14:03 |
| 27.70.153.187 | attack | $f2bV_matches |
2019-11-17 23:38:29 |