Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Norman

Region: Oklahoma

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: University of Oklahoma

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.15.104.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6128
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.15.104.92.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060200 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 02 23:24:15 CST 2019
;; MSG SIZE  rcvd: 117

Host info
92.104.15.129.in-addr.arpa domain name pointer d-ip-129-15-104-92.lib.ou.edu.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
92.104.15.129.in-addr.arpa	name = d-ip-129-15-104-92.lib.ou.edu.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
167.99.15.137 attackspam
23/tcp
[2019-07-10]1pkt
2019-07-11 02:24:58
42.112.90.203 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-10 11:44:05,432 INFO [amun_request_handler] PortScan Detected on Port: 445 (42.112.90.203)
2019-07-11 02:54:30
80.240.18.187 attackspambots
445/tcp
[2019-07-10]1pkt
2019-07-11 02:38:05
218.3.139.85 attack
Jul 10 06:12:39 plusreed sshd[23117]: Invalid user vnc from 218.3.139.85
Jul 10 06:12:39 plusreed sshd[23117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.3.139.85
Jul 10 06:12:39 plusreed sshd[23117]: Invalid user vnc from 218.3.139.85
Jul 10 06:12:42 plusreed sshd[23117]: Failed password for invalid user vnc from 218.3.139.85 port 55469 ssh2
Jul 10 06:16:20 plusreed sshd[24803]: Invalid user vic from 218.3.139.85
...
2019-07-11 02:46:51
216.204.174.226 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-10 09:59:50,759 INFO [amun_request_handler] PortScan Detected on Port: 445 (216.204.174.226)
2019-07-11 02:37:40
78.221.115.22 attackbotsspam
Jul 10 18:54:54 ns341937 sshd[6572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.221.115.22
Jul 10 18:54:54 ns341937 sshd[6571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.221.115.22
Jul 10 18:54:56 ns341937 sshd[6572]: Failed password for invalid user pi from 78.221.115.22 port 57616 ssh2
Jul 10 18:54:56 ns341937 sshd[6571]: Failed password for invalid user pi from 78.221.115.22 port 57614 ssh2
...
2019-07-11 02:51:07
212.92.108.124 attack
Jul 10 08:41:38   TCP Attack: SRC=212.92.108.124 DST=[Masked] LEN=66 TOS=0x08 PREC=0x20 TTL=118  DF PROTO=TCP SPT=65408 DPT=80 WINDOW=260 RES=0x00 ACK PSH URGP=0
2019-07-11 02:37:23
23.245.194.2 attackspambots
445/tcp
[2019-07-10]1pkt
2019-07-11 02:49:59
124.118.129.5 attackspambots
Automatic report - Web App Attack
2019-07-11 02:56:00
198.108.67.107 attack
3389BruteforceFW23
2019-07-11 02:58:54
36.227.126.63 attack
37215/tcp
[2019-07-10]1pkt
2019-07-11 02:44:12
122.172.111.101 attack
Hit on /wp-login.php
2019-07-11 02:45:54
185.222.211.2 attackbotsspam
Jul  8 12:57:10 server postfix/smtpd[26771]: NOQUEUE: reject: RCPT from unknown[185.222.211.2]: 554 5.7.1 Service unavailable; Client host [185.222.211.2] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBL442573 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=<[185.222.211.2]>
Jul  8 12:57:10 server postfix/smtpd[26771]: NOQUEUE: reject: RCPT from unknown[185.222.211.2]: 554 5.7.1 Service unavailable; Client host [185.222.211.2] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBL442573 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=<[185.222.211.2]>
2019-07-11 02:44:36
36.230.185.83 attackspambots
37215/tcp
[2019-07-10]1pkt
2019-07-11 02:27:07
175.165.10.70 attackbots
23/tcp
[2019-07-10]1pkt
2019-07-11 02:39:27

Recently Reported IPs

2.223.133.205 75.135.176.57 70.124.118.123 221.252.22.42
131.29.79.6 80.81.46.206 76.17.149.128 210.200.27.202
201.196.157.183 55.21.213.193 13.233.158.92 45.23.105.31
104.131.179.45 153.125.69.61 149.76.226.239 171.85.145.86
58.255.133.46 97.103.76.169 152.235.111.163 99.234.122.36