Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: McAllen

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       129.113.0.0 - 129.113.255.255
CIDR:           129.113.0.0/16
NetName:        UTRGV129113
NetHandle:      NET-129-113-0-0-1
Parent:         NET129 (NET-129-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   University of Texas Rio Grande Valley (UTRGV)
RegDate:        1987-11-06
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/129.113.0.0


OrgName:        University of Texas Rio Grande Valley
OrgId:          UTRGV
Address:        1201 W. University Drive
City:           Edinburg
StateProv:      TX
PostalCode:     78539
Country:        US
RegDate:        2015-01-28
Updated:        2019-07-02
Ref:            https://rdap.arin.net/registry/entity/UTRGV


OrgTechHandle: ZU82-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-512-471-8530 
OrgTechEmail:  tech-contact@ots.utsystem.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/ZU82-ARIN

OrgTechHandle: KS1049-ARIN
OrgTechName:   Smith, Kelly 
OrgTechPhone:  +1-956-665-2355 
OrgTechEmail:  pablo.salinas@utrgv.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/KS1049-ARIN

OrgAbuseHandle: ABUSE3227-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-512-471-8530 
OrgAbuseEmail:  abuse@the.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3227-ARIN

OrgNOCHandle: NOC33001-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-956-882-7073 
OrgNOCEmail:  pine@utrgv.edu
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC33001-ARIN

OrgTechHandle: SALIN150-ARIN
OrgTechName:   Salinas, Pablo 
OrgTechPhone:  +1-956-882-7073 
OrgTechEmail:  Pablo.Salinas@utrgv.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/SALIN150-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.113.199.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40345
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.113.199.205.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040902 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 10 06:53:50 CST 2026
;; MSG SIZE  rcvd: 108
Host info
205.199.113.129.in-addr.arpa domain name pointer doesnotexist.utpa.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
205.199.113.129.in-addr.arpa	name = doesnotexist.utpa.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
101.96.113.50 attackbotsspam
Jul 10 19:15:00 l03 sshd[2813]: Invalid user marko from 101.96.113.50 port 42046
...
2020-07-11 05:05:17
45.234.60.40 attack
firewall-block, port(s): 80/tcp
2020-07-11 04:43:37
61.178.136.90 attackspam
Auto Detect Rule!
proto TCP (SYN), 61.178.136.90:50983->gjan.info:1433, len 52
2020-07-11 04:55:17
130.180.66.97 attackbots
Jul 10 16:39:48 XXXXXX sshd[57719]: Invalid user jinhaoxuan from 130.180.66.97 port 57954
2020-07-11 05:03:04
101.91.119.172 attack
2020-07-10T21:08:18.326321hostname sshd[55993]: Failed password for invalid user nicholle from 101.91.119.172 port 39852 ssh2
...
2020-07-11 04:30:03
51.68.152.140 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2020-07-11 04:45:57
222.186.52.78 attack
Jul 10 22:56:18 * sshd[13740]: Failed password for root from 222.186.52.78 port 36622 ssh2
2020-07-11 05:01:04
74.82.47.21 attackbotsspam
 TCP (SYN) 74.82.47.21:48188 -> port 5900, len 44
2020-07-11 04:38:33
109.24.144.69 attackspam
Invalid user zeiler from 109.24.144.69 port 57802
2020-07-11 04:28:20
139.59.85.41 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-07-11 04:56:02
190.104.149.194 attack
Jul 10 17:58:52 ncomp sshd[12735]: Invalid user gusiyu from 190.104.149.194
Jul 10 17:58:52 ncomp sshd[12735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.149.194
Jul 10 17:58:52 ncomp sshd[12735]: Invalid user gusiyu from 190.104.149.194
Jul 10 17:58:54 ncomp sshd[12735]: Failed password for invalid user gusiyu from 190.104.149.194 port 32782 ssh2
2020-07-11 05:06:25
88.247.208.25 attackspam
Unauthorized connection attempt from IP address 88.247.208.25 on Port 445(SMB)
2020-07-11 04:30:27
166.175.56.184 attackspambots
Brute forcing email accounts
2020-07-11 04:48:19
141.98.10.208 attackspambots
Jul 10 13:29:06 pixelmemory postfix/smtpd[864054]: warning: unknown[141.98.10.208]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 10 13:32:45 pixelmemory postfix/smtpd[874419]: warning: unknown[141.98.10.208]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 10 13:43:55 pixelmemory postfix/smtpd[905956]: warning: unknown[141.98.10.208]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 10 13:44:44 pixelmemory postfix/smtpd[908404]: warning: unknown[141.98.10.208]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 10 13:49:55 pixelmemory postfix/smtpd[920645]: warning: unknown[141.98.10.208]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-11 04:58:39
139.162.118.185 attackspambots
 TCP (SYN) 139.162.118.185:55252 -> port 22, len 40
2020-07-11 04:44:40

Recently Reported IPs

171.40.80.116 213.177.179.193 2606:4700:10::6814:6757 2606:4700:10::6814:7195
2606:4700:10::6816:1801 109.162.246.218 2606:4700:10::6816:2579 2606:4700:10::ac43:2306
240.33.32.222 105.190.91.81 125.119.67.2 43.157.213.212
104.37.191.3 103.215.80.68 2606:4700:10::6814:6183 2606:4700:10::6814:6115
2606:4700:10::ac43:890 2606:4700:10::6816:532 2606:4700:10::6814:9959 193.202.9.211