City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 129.189.0.0 - 129.189.255.255
CIDR: 129.189.0.0/16
NetName: TDST
NetHandle: NET-129-189-0-0-1
Parent: NET129 (NET-129-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: TDS TELECOM (TDST)
RegDate: 2022-03-15
Updated: 2022-03-15
Ref: https://rdap.arin.net/registry/ip/129.189.0.0
OrgName: TDS TELECOM
OrgId: TDST
Address: 525 Junction Rd.
City: Madison
StateProv: WI
PostalCode: 53717
Country: US
RegDate: 1994-12-16
Updated: 2024-11-25
Comment: http://www.tdstelecom.com
Ref: https://rdap.arin.net/registry/entity/TDST
OrgAbuseHandle: ABUSE163-ARIN
OrgAbuseName: abuse
OrgAbusePhone: +1-800-358-3648
OrgAbuseEmail: abuse@tds.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE163-ARIN
OrgTechHandle: INE14-ARIN
OrgTechName: IP Network Engineering
OrgTechPhone: +1-800-358-3648
OrgTechEmail: IPRequests@tdstelecom.com
OrgTechRef: https://rdap.arin.net/registry/entity/INE14-ARIN
OrgTechHandle: SERVI6-ARIN
OrgTechName: Service Activation
OrgTechPhone: +1-800-358-3648
OrgTechEmail: serviceactivation@tdstelecom.com
OrgTechRef: https://rdap.arin.net/registry/entity/SERVI6-ARIN
OrgTechHandle: INO44-ARIN
OrgTechName: IP Network Operations
OrgTechPhone: +1-800-358-3648
OrgTechEmail: ispadmin@tdstelecom.com
OrgTechRef: https://rdap.arin.net/registry/entity/INO44-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.189.127.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43519
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.189.127.140. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041101 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 14:21:39 CST 2026
;; MSG SIZE rcvd: 108
140.127.189.129.in-addr.arpa domain name pointer h129-189-127-140.mdsnwi.tisp.static.tds.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
140.127.189.129.in-addr.arpa name = h129-189-127-140.mdsnwi.tisp.static.tds.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 93.146.237.163 | attackspam | Bruteforce detected by fail2ban |
2020-06-15 05:42:52 |
| 40.117.97.218 | attack | Jun 14 23:49:43 vps647732 sshd[20767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.117.97.218 Jun 14 23:49:45 vps647732 sshd[20767]: Failed password for invalid user mumble from 40.117.97.218 port 53708 ssh2 ... |
2020-06-15 06:04:53 |
| 13.77.204.243 | attackspam | /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php |
2020-06-15 05:48:01 |
| 222.186.175.169 | attackbotsspam | Jun 14 23:30:27 eventyay sshd[28490]: Failed password for root from 222.186.175.169 port 1490 ssh2 Jun 14 23:30:40 eventyay sshd[28490]: error: maximum authentication attempts exceeded for root from 222.186.175.169 port 1490 ssh2 [preauth] Jun 14 23:30:45 eventyay sshd[28498]: Failed password for root from 222.186.175.169 port 11942 ssh2 ... |
2020-06-15 05:52:40 |
| 129.28.186.100 | attackspambots | Jun 14 23:25:02 electroncash sshd[51182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.186.100 Jun 14 23:25:02 electroncash sshd[51182]: Invalid user mac from 129.28.186.100 port 32810 Jun 14 23:25:04 electroncash sshd[51182]: Failed password for invalid user mac from 129.28.186.100 port 32810 ssh2 Jun 14 23:28:58 electroncash sshd[52292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.186.100 user=root Jun 14 23:29:00 electroncash sshd[52292]: Failed password for root from 129.28.186.100 port 50796 ssh2 ... |
2020-06-15 05:34:02 |
| 200.188.19.31 | attack | Icarus honeypot on github |
2020-06-15 05:51:34 |
| 123.110.83.144 | attack | Firewall Dropped Connection |
2020-06-15 05:42:20 |
| 91.121.221.195 | attackbotsspam | Jun 14 23:19:40 prod4 sshd\[29638\]: Invalid user deploy from 91.121.221.195 Jun 14 23:19:43 prod4 sshd\[29638\]: Failed password for invalid user deploy from 91.121.221.195 port 42900 ssh2 Jun 14 23:28:59 prod4 sshd\[32592\]: Failed password for root from 91.121.221.195 port 54372 ssh2 ... |
2020-06-15 05:35:04 |
| 5.188.86.168 | attackbots | Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-14T17:03:58Z and 2020-06-14T17:24:50Z |
2020-06-15 05:29:09 |
| 200.17.114.215 | attackspam | Automatic report BANNED IP |
2020-06-15 06:06:15 |
| 51.210.70.97 | attackbotsspam | (sshd) Failed SSH login from 51.210.70.97 (FR/France/ip97.ip-51-210-70.eu): 5 in the last 3600 secs |
2020-06-15 06:02:13 |
| 218.92.0.145 | attackspam | Jun 14 23:40:07 ns381471 sshd[19278]: Failed password for root from 218.92.0.145 port 14519 ssh2 Jun 14 23:40:20 ns381471 sshd[19278]: error: maximum authentication attempts exceeded for root from 218.92.0.145 port 14519 ssh2 [preauth] |
2020-06-15 05:50:09 |
| 60.50.29.149 | attackspam | Invalid user cc from 60.50.29.149 port 34654 |
2020-06-15 05:59:45 |
| 99.229.179.186 | attackbotsspam | Automatic report - Banned IP Access |
2020-06-15 05:39:27 |
| 164.132.41.67 | attack | 2020-06-14T23:25:03.819458mail.broermann.family sshd[32551]: Invalid user thh from 164.132.41.67 port 34699 2020-06-14T23:25:03.824141mail.broermann.family sshd[32551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.ip-164-132-41.eu 2020-06-14T23:25:03.819458mail.broermann.family sshd[32551]: Invalid user thh from 164.132.41.67 port 34699 2020-06-14T23:25:06.208794mail.broermann.family sshd[32551]: Failed password for invalid user thh from 164.132.41.67 port 34699 ssh2 2020-06-14T23:28:33.818763mail.broermann.family sshd[356]: Invalid user school from 164.132.41.67 port 34997 ... |
2020-06-15 05:52:17 |