Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Vinhedo

Region: Sao Paulo

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       129.121.0.0 - 129.121.255.255
CIDR:           129.121.0.0/16
NetName:        OGTIPS1-129-121
NetHandle:      NET-129-121-0-0-1
Parent:         NET129 (NET-129-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Oso Grande IP Services, LLC (OGISL)
RegDate:        1988-03-11
Updated:        2026-04-16
Comment:        OCITOKEN::129.121.32.0/22:cc7c27d7f667d6c52ee067a7972a4f2b92b00a4791306da0d3f485a5d8572e1c
Comment:        OCITOKEN::129.121.64.0/23:675603fbdfe90052619455238e113820abb7061dba71c369209c4af8547f610d
Comment:        OCITOKEN::129.121.72.0/22:1d3664745c87073aedb71dc6fe9f1b8c453594b459ee27d45082510e8536beae
Comment:        OCITOKEN::129.121.36.0/22:9e18327589fa1b8c7e4f9303e86a92f0f57604dc2bcef4cfa90f4cdecc50ccda
Comment:        OCITOKEN::129.121.40.0/22:aaad20ae303f1527b57465864d2062705118d31624812bde4cbbb7a72790b045
Comment:        OCITOKEN::129.121.44.0/22:293e0715b8cff10349a83dfc6c41c4350d3b37e21a7993973c110b27d60882ee
Comment:        OCITOKEN::129.121.76.0/22:a946ac52e9c38493fd22b4a1e78e08ba64b1969db85b8d03e7e2c1e1c22adc8b
Comment:        OCITOKEN::129.121.80.0/23:b0bf3648475a45d8311ecdca177659c00ab312b6d7673778de1c540a933ddd1e
Comment:        OCITOKEN::129.121.48.0/21:1a61a1e11b75c35dcf0f0529fd315fb01a51e5d038dd3d409bda17f7b532c1a2
Comment:        OCITOKEN::129.121.84.0/22:25a7c1cf5ff21b13e77f1c506b236ed2fa94bb89311a3800dd2123481445876c
Comment:        OCITOKEN::129.121.82.0/23:1e898c6a9f02d5bb26c5faf9c80b1eeeada28babbfa9538d5ff858e5173a3d10
Comment:        OCITOKEN::129.121.88.0/22:da957aec850f6cf9471ca01537639e580eec104cd4364bf39fda1e59eae14155
Comment:        OCITOKEN::129.121.56.0/22:11898f8829bb0c23f3e203c9166ec8838f0ebaa259f128c7c6e3765accd2fa0d
Comment:        OCITOKEN::129.121.60.0/22:8c8c2cc72e33c7a70673fe366b15e8d0fe0a08ee594ba5cbfd06e10682ad777f
Comment:        OCITOKEN::129.121.96.0/21:866b1ba1c96c3208ccf17357863e659d2d8c10daabd0e8a1f49fe24cdabf5930
Comment:        OCITOKEN::129.121.92.0/22:4ed8eb18309a39014c79229a73e545b7b44d661b58cac6027dedb0965e8ddbdb
Ref:            https://rdap.arin.net/registry/ip/129.121.0.0


OrgName:        Oso Grande IP Services, LLC
OrgId:          OGISL
Address:        C/O A Small Orange LLC
Address:        10 Corporate Drive
City:           Burlington
StateProv:      MA
PostalCode:     01803
Country:        US
RegDate:        2013-09-10
Updated:        2026-02-17
Ref:            https://rdap.arin.net/registry/entity/OGISL


OrgTechHandle: ENO74-ARIN
OrgTechName:   EIG Network Operations
OrgTechPhone:  +1-781-852-3200 
OrgTechEmail:  eig-net-team@endurance.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ENO74-ARIN

OrgAbuseHandle: EIGAB1-ARIN
OrgAbuseName:   EIG-Abuse Mitigation
OrgAbusePhone:  +1-877-659-6181 
OrgAbuseEmail:  IARPOC@Newfold.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/EIGAB1-ARIN

OrgNOCHandle: ENO74-ARIN
OrgNOCName:   EIG Network Operations
OrgNOCPhone:  +1-781-852-3200 
OrgNOCEmail:  eig-net-team@endurance.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ENO74-ARIN

RNOCHandle: NOC13063-ARIN
RNOCName:   Network Operations Center
RNOCPhone:  +1-919-408-7600 
RNOCEmail:  noc@asmallorange.com
RNOCRef:    https://rdap.arin.net/registry/entity/NOC13063-ARIN

RTechHandle: NOC13063-ARIN
RTechName:   Network Operations Center
RTechPhone:  +1-919-408-7600 
RTechEmail:  noc@asmallorange.com
RTechRef:    https://rdap.arin.net/registry/entity/NOC13063-ARIN

RAbuseHandle: ABUSE3681-ARIN
RAbuseName:   Abuse
RAbusePhone:  +1-877-659-6181 
RAbuseEmail:  IARPOC@Newfold.com
RAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3681-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.121.38.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4732
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.121.38.216.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042501 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 26 03:30:34 CST 2026
;; MSG SIZE  rcvd: 107
Host info
216.38.121.129.in-addr.arpa domain name pointer 129-121-38-216.unifiedlayer.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
216.38.121.129.in-addr.arpa	name = 129-121-38-216.unifiedlayer.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
85.105.170.111 attackspambots
Automatic report - Banned IP Access
2020-08-06 20:26:44
177.37.71.40 attackbotsspam
177.37.71.40 (BR/Brazil/177-37-71-40.ultrat.com.br), 12 distributed sshd attacks on account [root] in the last 3600 secs
2020-08-06 20:45:10
138.197.194.207 attackbots
plussize.fitness 138.197.194.207 [06/Aug/2020:13:33:33 +0200] "POST /wp-login.php HTTP/1.1" 200 5953 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
plussize.fitness 138.197.194.207 [06/Aug/2020:13:33:34 +0200] "POST /wp-login.php HTTP/1.1" 200 5909 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-06 20:57:49
181.53.251.199 attack
Failed password for root from 181.53.251.199 port 47490 ssh2
2020-08-06 20:47:55
218.92.0.206 attackspambots
Aug  6 12:22:39 santamaria sshd\[29968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.206  user=root
Aug  6 12:22:42 santamaria sshd\[29968\]: Failed password for root from 218.92.0.206 port 21069 ssh2
Aug  6 12:23:45 santamaria sshd\[29996\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.206  user=root
...
2020-08-06 20:34:12
178.128.248.121 attackspam
Aug  6 13:53:11 vps sshd[1937]: Failed password for root from 178.128.248.121 port 54268 ssh2
Aug  6 14:09:49 vps sshd[3031]: Failed password for root from 178.128.248.121 port 35050 ssh2
...
2020-08-06 20:48:27
46.101.135.189 attackspambots
Automatic report - Banned IP Access
2020-08-06 20:43:54
64.227.62.250 attackspam
sshd: Failed password for .... from 64.227.62.250 port 53310 ssh2 (8 attempts)
2020-08-06 20:57:20
85.209.0.252 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 83 - port: 22 proto: tcp cat: Misc Attackbytes: 74
2020-08-06 20:40:31
37.49.230.229 attack
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-08-06 20:20:24
113.162.73.124 attackbots
Aug  6 07:31:23 alx-lms-prod01 sshd\[29455\]: Invalid user netscreen from 113.162.73.124
Aug  6 07:32:07 alx-lms-prod01 sshd\[29488\]: Invalid user ubnt from 113.162.73.124
Aug  6 07:32:15 alx-lms-prod01 sshd\[30222\]: Invalid user osboxes from 113.162.73.124
...
2020-08-06 20:39:28
218.1.18.78 attack
2020-08-06T09:41:36.273074amanda2.illicoweb.com sshd\[41299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.1.18.78  user=root
2020-08-06T09:41:38.342782amanda2.illicoweb.com sshd\[41299\]: Failed password for root from 218.1.18.78 port 54347 ssh2
2020-08-06T09:48:01.868782amanda2.illicoweb.com sshd\[41690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.1.18.78  user=root
2020-08-06T09:48:04.124297amanda2.illicoweb.com sshd\[41690\]: Failed password for root from 218.1.18.78 port 24892 ssh2
2020-08-06T09:49:56.408818amanda2.illicoweb.com sshd\[41744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.1.18.78  user=root
...
2020-08-06 20:45:33
36.69.8.154 attack
1596691079 - 08/06/2020 07:17:59 Host: 36.69.8.154/36.69.8.154 Port: 445 TCP Blocked
2020-08-06 20:17:04
101.109.184.181 attack
1596691059 - 08/06/2020 07:17:39 Host: 101.109.184.181/101.109.184.181 Port: 445 TCP Blocked
2020-08-06 20:29:42
5.149.203.33 attackbots
20/8/6@08:06:18: FAIL: Alarm-Network address from=5.149.203.33
...
2020-08-06 20:32:52

Recently Reported IPs

218.106.207.221 2606:4700:10::6816:794 2606:4700:10::6816:165 2606:4700:10::6814:5423
2606:4700:10::6816:1659 165.140.238.64 160.119.76.21 159.223.38.45
25.217.185.55 234.193.57.221 193.24.123.118 110.78.150.155
2606:4700:10::6814:7899 2606:4700:10::6814:5571 14.212.68.129 118.193.40.131
147.185.133.212 43.230.106.23 124.198.131.220 54.242.178.61