Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       129.19.0.0 - 129.19.255.255
CIDR:           129.19.0.0/16
NetName:        WESTNET
NetHandle:      NET-129-19-0-0-1
Parent:         NET129 (NET-129-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Colorado State University (CSU-2-Z)
RegDate:        1987-07-08
Updated:        2023-07-29
Ref:            https://rdap.arin.net/registry/ip/129.19.0.0


OrgName:        Colorado State University
OrgId:          CSU-2-Z
Address:        Academic Computing and Networking Services
Address:        Colorado State University
Address:        1018 Campus Delivery
City:           Fort Collins
StateProv:      CO
PostalCode:     80523
Country:        US
RegDate:        2023-01-16
Updated:        2025-09-29
Ref:            https://rdap.arin.net/registry/entity/CSU-2-Z


OrgTechHandle: DNSAD191-ARIN
OrgTechName:   DNS Administrator
OrgTechPhone:  +1-970-491-1958 
OrgTechEmail:  dns.admin@colostate.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/DNSAD191-ARIN

OrgDNSHandle: MPW-ARIN
OrgDNSName:   Willard, Michael Patrick
OrgDNSPhone:  +1-970-491-4651 
OrgDNSEmail:  mike.willard@colostate.edu
OrgDNSRef:    https://rdap.arin.net/registry/entity/MPW-ARIN

OrgRoutingHandle: HERNA1265-ARIN
OrgRoutingName:   Hernandez, John 
OrgRoutingPhone:  +1-303-497-1280 
OrgRoutingEmail:  jph@ucar.edu
OrgRoutingRef:    https://rdap.arin.net/registry/entity/HERNA1265-ARIN

OrgAbuseHandle: DNSAD191-ARIN
OrgAbuseName:   DNS Administrator
OrgAbusePhone:  +1-970-491-1958 
OrgAbuseEmail:  dns.admin@colostate.edu
OrgAbuseRef:    https://rdap.arin.net/registry/entity/DNSAD191-ARIN

OrgDNSHandle: DNSAD191-ARIN
OrgDNSName:   DNS Administrator
OrgDNSPhone:  +1-970-491-1958 
OrgDNSEmail:  dns.admin@colostate.edu
OrgDNSRef:    https://rdap.arin.net/registry/entity/DNSAD191-ARIN

OrgRoutingHandle: ADLER49-ARIN
OrgRoutingName:   Adler, Matt 
OrgRoutingPhone:  +1-303-497-1279 
OrgRoutingEmail:  adler@ucar.edu
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ADLER49-ARIN

OrgTechHandle: MPW-ARIN
OrgTechName:   Willard, Michael Patrick
OrgTechPhone:  +1-970-491-4651 
OrgTechEmail:  mike.willard@colostate.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/MPW-ARIN

OrgDNSHandle: HERNA1265-ARIN
OrgDNSName:   Hernandez, John 
OrgDNSPhone:  +1-303-497-1280 
OrgDNSEmail:  jph@ucar.edu
OrgDNSRef:    https://rdap.arin.net/registry/entity/HERNA1265-ARIN

OrgDNSHandle: ADLER49-ARIN
OrgDNSName:   Adler, Matt 
OrgDNSPhone:  +1-303-497-1279 
OrgDNSEmail:  adler@ucar.edu
OrgDNSRef:    https://rdap.arin.net/registry/entity/ADLER49-ARIN

# end


# start

NetRange:       129.19.64.0 - 129.19.127.255
CIDR:           129.19.64.0/18
NetName:        FRGP-PARTICIPANT-ASSIGNMENTS-02
NetHandle:      NET-129-19-64-0-1
Parent:         WESTNET (NET-129-19-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   University Corporation for Atmospheric Research (UCAR-1)
RegDate:        2019-01-15
Updated:        2024-02-07
Ref:            https://rdap.arin.net/registry/ip/129.19.64.0


OrgName:        University Corporation for Atmospheric Research
OrgId:          UCAR-1
Address:        3090 Center Green Drive
City:           Boulder
StateProv:      CO
PostalCode:     80301
Country:        US
RegDate:        1988-05-26
Updated:        2026-02-19
Ref:            https://rdap.arin.net/registry/entity/UCAR-1


OrgAbuseHandle: ABUSE18-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-307-996-4300 
OrgAbuseEmail:  abuse@ucar.edu
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE18-ARIN

OrgNOCHandle: ZN10-ARIN
OrgNOCName:   National Center for Atmospheric Research
OrgNOCPhone:  +1-307-996-4300 
OrgNOCEmail:  ne@ucar.edu
OrgNOCRef:    https://rdap.arin.net/registry/entity/ZN10-ARIN

OrgTechHandle: ADLER49-ARIN
OrgTechName:   Adler, Matt 
OrgTechPhone:  +1-303-497-1279 
OrgTechEmail:  adler@ucar.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/ADLER49-ARIN

OrgTechHandle: HERNA1265-ARIN
OrgTechName:   Hernandez, John 
OrgTechPhone:  +1-303-497-1280 
OrgTechEmail:  jph@ucar.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/HERNA1265-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.19.104.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4140
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.19.104.124.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 02:13:20 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 124.104.19.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 124.104.19.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
219.246.34.120 attackbots
/var/log/messages:Jul 10 20:12:27 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1562789547.377:2086): pid=24615 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-server cipher=aes256-ctr ksize=256 mac=hmac-sha1 pfs=ecdh-sha2-nistp256 spid=24616 suid=74 rport=46920 laddr=104.167.106.93 lport=22  exe="/usr/sbin/sshd" hostname=? addr=219.246.34.120 terminal=? res=success'
/var/log/messages:Jul 10 20:12:27 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1562789547.381:2087): pid=24615 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-client cipher=aes256-ctr ksize=256 mac=hmac-sha1 pfs=ecdh-sha2-nistp256 spid=24616 suid=74 rport=46920 laddr=104.167.106.93 lport=22  exe="/usr/sbin/sshd" hostname=? addr=219.246.34.120 terminal=? res=success'
/var/log/messages:Jul 10 20:12:28 sanyalnet-cloud-vps fail2ban.filter[5325]: INFO [sshd] Found........
-------------------------------
2019-07-12 03:05:05
92.119.160.125 attackspambots
11.07.2019 18:44:53 Connection to port 3694 blocked by firewall
2019-07-12 03:18:11
148.72.40.221 attack
Apr 18 13:30:19 server sshd\[151017\]: Invalid user oracle from 148.72.40.221
Apr 18 13:30:19 server sshd\[151017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.40.221
Apr 18 13:30:21 server sshd\[151017\]: Failed password for invalid user oracle from 148.72.40.221 port 45938 ssh2
...
2019-07-12 03:22:35
147.46.78.126 attackspambots
May  6 17:01:02 server sshd\[162102\]: Invalid user test5 from 147.46.78.126
May  6 17:01:02 server sshd\[162102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.46.78.126
May  6 17:01:04 server sshd\[162102\]: Failed password for invalid user test5 from 147.46.78.126 port 43810 ssh2
...
2019-07-12 03:47:47
218.92.0.180 attack
SSH bruteforce (Triggered fail2ban)
2019-07-12 03:40:35
177.11.42.110 attackspambots
Jul 10 07:04:58 *** sshd[13636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.11.42.110  user=r.r
Jul 10 07:05:00 *** sshd[13636]: Failed password for r.r from 177.11.42.110 port 52018 ssh2
Jul 10 07:05:02 *** sshd[13636]: Failed password for r.r from 177.11.42.110 port 52018 ssh2
Jul 10 07:05:04 *** sshd[13636]: Failed password for r.r from 177.11.42.110 port 52018 ssh2
Jul 10 07:05:07 *** sshd[13636]: Failed password for r.r from 177.11.42.110 port 52018 ssh2
Jul 10 07:05:08 *** sshd[13636]: Failed password for r.r from 177.11.42.110 port 52018 ssh2
Jul 10 07:05:11 *** sshd[13636]: Failed password for r.r from 177.11.42.110 port 52018 ssh2
Jul 10 07:05:11 *** sshd[13636]: error: maximum authentication attempts exceeded for r.r from 177.11.42.110 port 52018 ssh2 [preauth]
Jul 10 07:05:11 *** sshd[13636]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.11.42.110  user=r.r


........
----------------------------------------------
2019-07-12 03:33:33
139.59.18.103 attack
VNC brute force attack detected by fail2ban
2019-07-12 03:13:40
216.221.46.159 attackspambots
firewall-block, port(s): 23/tcp
2019-07-12 03:38:09
148.70.23.121 attack
May 23 11:01:07 server sshd\[128896\]: Invalid user desiree from 148.70.23.121
May 23 11:01:07 server sshd\[128896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.23.121
May 23 11:01:09 server sshd\[128896\]: Failed password for invalid user desiree from 148.70.23.121 port 48624 ssh2
...
2019-07-12 03:32:09
190.122.20.235 attackspambots
Jul 10 13:45:37 rigel postfix/smtpd[4635]: connect from unknown[190.122.20.235]
Jul 10 13:45:41 rigel postfix/smtpd[4635]: warning: unknown[190.122.20.235]: SASL CRAM-MD5 authentication failed: authentication failure
Jul 10 13:45:42 rigel postfix/smtpd[4635]: warning: unknown[190.122.20.235]: SASL PLAIN authentication failed: authentication failure
Jul 10 13:45:43 rigel postfix/smtpd[4635]: warning: unknown[190.122.20.235]: SASL LOGIN authentication failed: authentication failure


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=190.122.20.235
2019-07-12 03:44:55
141.98.81.77 attackspambots
Port scan on 5 port(s): 8324 8326 8344 8353 8361
2019-07-12 03:28:45
54.149.191.238 attackspambots
TCP src-port=5287   dst-port=25    spam-sorbs         (455)
2019-07-12 03:14:36
82.64.129.94 attackbotsspam
Jul 11 18:51:53 localhost sshd\[6565\]: Invalid user pi from 82.64.129.94 port 55082
Jul 11 18:51:53 localhost sshd\[6565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.129.94
Jul 11 18:51:53 localhost sshd\[6567\]: Invalid user pi from 82.64.129.94 port 55096
2019-07-12 03:17:08
151.237.83.65 attack
Jul  7 07:51:30 server sshd\[39164\]: Invalid user user1 from 151.237.83.65
Jul  7 07:51:30 server sshd\[39164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.237.83.65
Jul  7 07:51:32 server sshd\[39164\]: Failed password for invalid user user1 from 151.237.83.65 port 46420 ssh2
...
2019-07-12 03:06:10
185.176.27.30 attackbots
firewall-block, port(s): 18995/tcp, 18996/tcp
2019-07-12 03:45:21

Recently Reported IPs

111.194.178.246 58.152.194.52 35.204.109.104 2606:4700:10::6816:3930
110.77.187.43 2606:4700:10::6816:1645 2606:4700:10::6814:5302 2606:4700:10::6816:993
110.78.156.173 2606:4700:10::6814:8722 110.78.150.173 2606:4700:10::6816:135
2606:4700:10::6816:4306 2606:4700:10::ac43:2355 2606:4700:10::6816:778 2606:4700:10::6814:7977
2606:4700:10::ac43:2380 2606:4700:10::6816:3436 2606:4700:10::6816:2521 2606:4700:10::6814:6429