City: Vinhedo
Region: Sao Paulo
Country: Brazil
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 129.121.0.0 - 129.121.255.255
CIDR: 129.121.0.0/16
NetName: OGTIPS1-129-121
NetHandle: NET-129-121-0-0-1
Parent: NET129 (NET-129-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Oso Grande IP Services, LLC (OGISL)
RegDate: 1988-03-11
Updated: 2026-04-16
Comment: OCITOKEN::129.121.32.0/22:cc7c27d7f667d6c52ee067a7972a4f2b92b00a4791306da0d3f485a5d8572e1c
Comment: OCITOKEN::129.121.64.0/23:675603fbdfe90052619455238e113820abb7061dba71c369209c4af8547f610d
Comment: OCITOKEN::129.121.72.0/22:1d3664745c87073aedb71dc6fe9f1b8c453594b459ee27d45082510e8536beae
Comment: OCITOKEN::129.121.36.0/22:9e18327589fa1b8c7e4f9303e86a92f0f57604dc2bcef4cfa90f4cdecc50ccda
Comment: OCITOKEN::129.121.40.0/22:aaad20ae303f1527b57465864d2062705118d31624812bde4cbbb7a72790b045
Comment: OCITOKEN::129.121.44.0/22:293e0715b8cff10349a83dfc6c41c4350d3b37e21a7993973c110b27d60882ee
Comment: OCITOKEN::129.121.76.0/22:a946ac52e9c38493fd22b4a1e78e08ba64b1969db85b8d03e7e2c1e1c22adc8b
Comment: OCITOKEN::129.121.80.0/23:b0bf3648475a45d8311ecdca177659c00ab312b6d7673778de1c540a933ddd1e
Comment: OCITOKEN::129.121.48.0/21:1a61a1e11b75c35dcf0f0529fd315fb01a51e5d038dd3d409bda17f7b532c1a2
Comment: OCITOKEN::129.121.84.0/22:25a7c1cf5ff21b13e77f1c506b236ed2fa94bb89311a3800dd2123481445876c
Comment: OCITOKEN::129.121.82.0/23:1e898c6a9f02d5bb26c5faf9c80b1eeeada28babbfa9538d5ff858e5173a3d10
Comment: OCITOKEN::129.121.88.0/22:da957aec850f6cf9471ca01537639e580eec104cd4364bf39fda1e59eae14155
Comment: OCITOKEN::129.121.56.0/22:11898f8829bb0c23f3e203c9166ec8838f0ebaa259f128c7c6e3765accd2fa0d
Comment: OCITOKEN::129.121.60.0/22:8c8c2cc72e33c7a70673fe366b15e8d0fe0a08ee594ba5cbfd06e10682ad777f
Comment: OCITOKEN::129.121.96.0/21:866b1ba1c96c3208ccf17357863e659d2d8c10daabd0e8a1f49fe24cdabf5930
Comment: OCITOKEN::129.121.92.0/22:4ed8eb18309a39014c79229a73e545b7b44d661b58cac6027dedb0965e8ddbdb
Ref: https://rdap.arin.net/registry/ip/129.121.0.0
OrgName: Oso Grande IP Services, LLC
OrgId: OGISL
Address: C/O A Small Orange LLC
Address: 10 Corporate Drive
City: Burlington
StateProv: MA
PostalCode: 01803
Country: US
RegDate: 2013-09-10
Updated: 2026-02-17
Ref: https://rdap.arin.net/registry/entity/OGISL
OrgTechHandle: ENO74-ARIN
OrgTechName: EIG Network Operations
OrgTechPhone: +1-781-852-3200
OrgTechEmail: eig-net-team@endurance.com
OrgTechRef: https://rdap.arin.net/registry/entity/ENO74-ARIN
OrgAbuseHandle: EIGAB1-ARIN
OrgAbuseName: EIG-Abuse Mitigation
OrgAbusePhone: +1-877-659-6181
OrgAbuseEmail: IARPOC@Newfold.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/EIGAB1-ARIN
OrgNOCHandle: ENO74-ARIN
OrgNOCName: EIG Network Operations
OrgNOCPhone: +1-781-852-3200
OrgNOCEmail: eig-net-team@endurance.com
OrgNOCRef: https://rdap.arin.net/registry/entity/ENO74-ARIN
RNOCHandle: NOC13063-ARIN
RNOCName: Network Operations Center
RNOCPhone: +1-919-408-7600
RNOCEmail: noc@asmallorange.com
RNOCRef: https://rdap.arin.net/registry/entity/NOC13063-ARIN
RTechHandle: NOC13063-ARIN
RTechName: Network Operations Center
RTechPhone: +1-919-408-7600
RTechEmail: noc@asmallorange.com
RTechRef: https://rdap.arin.net/registry/entity/NOC13063-ARIN
RAbuseHandle: ABUSE3681-ARIN
RAbuseName: Abuse
RAbusePhone: +1-877-659-6181
RAbuseEmail: IARPOC@Newfold.com
RAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3681-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.121.38.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4732
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.121.38.216. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042501 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 26 03:30:34 CST 2026
;; MSG SIZE rcvd: 107
216.38.121.129.in-addr.arpa domain name pointer 129-121-38-216.unifiedlayer.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
216.38.121.129.in-addr.arpa name = 129-121-38-216.unifiedlayer.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 85.105.170.111 | attackspambots | Automatic report - Banned IP Access |
2020-08-06 20:26:44 |
| 177.37.71.40 | attackbotsspam | 177.37.71.40 (BR/Brazil/177-37-71-40.ultrat.com.br), 12 distributed sshd attacks on account [root] in the last 3600 secs |
2020-08-06 20:45:10 |
| 138.197.194.207 | attackbots | plussize.fitness 138.197.194.207 [06/Aug/2020:13:33:33 +0200] "POST /wp-login.php HTTP/1.1" 200 5953 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" plussize.fitness 138.197.194.207 [06/Aug/2020:13:33:34 +0200] "POST /wp-login.php HTTP/1.1" 200 5909 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-08-06 20:57:49 |
| 181.53.251.199 | attack | Failed password for root from 181.53.251.199 port 47490 ssh2 |
2020-08-06 20:47:55 |
| 218.92.0.206 | attackspambots | Aug 6 12:22:39 santamaria sshd\[29968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.206 user=root Aug 6 12:22:42 santamaria sshd\[29968\]: Failed password for root from 218.92.0.206 port 21069 ssh2 Aug 6 12:23:45 santamaria sshd\[29996\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.206 user=root ... |
2020-08-06 20:34:12 |
| 178.128.248.121 | attackspam | Aug 6 13:53:11 vps sshd[1937]: Failed password for root from 178.128.248.121 port 54268 ssh2 Aug 6 14:09:49 vps sshd[3031]: Failed password for root from 178.128.248.121 port 35050 ssh2 ... |
2020-08-06 20:48:27 |
| 46.101.135.189 | attackspambots | Automatic report - Banned IP Access |
2020-08-06 20:43:54 |
| 64.227.62.250 | attackspam | sshd: Failed password for .... from 64.227.62.250 port 53310 ssh2 (8 attempts) |
2020-08-06 20:57:20 |
| 85.209.0.252 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 83 - port: 22 proto: tcp cat: Misc Attackbytes: 74 |
2020-08-06 20:40:31 |
| 37.49.230.229 | attack | Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-08-06 20:20:24 |
| 113.162.73.124 | attackbots | Aug 6 07:31:23 alx-lms-prod01 sshd\[29455\]: Invalid user netscreen from 113.162.73.124 Aug 6 07:32:07 alx-lms-prod01 sshd\[29488\]: Invalid user ubnt from 113.162.73.124 Aug 6 07:32:15 alx-lms-prod01 sshd\[30222\]: Invalid user osboxes from 113.162.73.124 ... |
2020-08-06 20:39:28 |
| 218.1.18.78 | attack | 2020-08-06T09:41:36.273074amanda2.illicoweb.com sshd\[41299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.1.18.78 user=root 2020-08-06T09:41:38.342782amanda2.illicoweb.com sshd\[41299\]: Failed password for root from 218.1.18.78 port 54347 ssh2 2020-08-06T09:48:01.868782amanda2.illicoweb.com sshd\[41690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.1.18.78 user=root 2020-08-06T09:48:04.124297amanda2.illicoweb.com sshd\[41690\]: Failed password for root from 218.1.18.78 port 24892 ssh2 2020-08-06T09:49:56.408818amanda2.illicoweb.com sshd\[41744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.1.18.78 user=root ... |
2020-08-06 20:45:33 |
| 36.69.8.154 | attack | 1596691079 - 08/06/2020 07:17:59 Host: 36.69.8.154/36.69.8.154 Port: 445 TCP Blocked |
2020-08-06 20:17:04 |
| 101.109.184.181 | attack | 1596691059 - 08/06/2020 07:17:39 Host: 101.109.184.181/101.109.184.181 Port: 445 TCP Blocked |
2020-08-06 20:29:42 |
| 5.149.203.33 | attackbots | 20/8/6@08:06:18: FAIL: Alarm-Network address from=5.149.203.33 ... |
2020-08-06 20:32:52 |