City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 129.19.0.0 - 129.19.255.255
CIDR: 129.19.0.0/16
NetName: WESTNET
NetHandle: NET-129-19-0-0-1
Parent: NET129 (NET-129-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Colorado State University (CSU-2-Z)
RegDate: 1987-07-08
Updated: 2023-07-29
Ref: https://rdap.arin.net/registry/ip/129.19.0.0
OrgName: Colorado State University
OrgId: CSU-2-Z
Address: Academic Computing and Networking Services
Address: Colorado State University
Address: 1018 Campus Delivery
City: Fort Collins
StateProv: CO
PostalCode: 80523
Country: US
RegDate: 2023-01-16
Updated: 2025-09-29
Ref: https://rdap.arin.net/registry/entity/CSU-2-Z
OrgTechHandle: DNSAD191-ARIN
OrgTechName: DNS Administrator
OrgTechPhone: +1-970-491-1958
OrgTechEmail: dns.admin@colostate.edu
OrgTechRef: https://rdap.arin.net/registry/entity/DNSAD191-ARIN
OrgDNSHandle: MPW-ARIN
OrgDNSName: Willard, Michael Patrick
OrgDNSPhone: +1-970-491-4651
OrgDNSEmail: mike.willard@colostate.edu
OrgDNSRef: https://rdap.arin.net/registry/entity/MPW-ARIN
OrgRoutingHandle: HERNA1265-ARIN
OrgRoutingName: Hernandez, John
OrgRoutingPhone: +1-303-497-1280
OrgRoutingEmail: jph@ucar.edu
OrgRoutingRef: https://rdap.arin.net/registry/entity/HERNA1265-ARIN
OrgAbuseHandle: DNSAD191-ARIN
OrgAbuseName: DNS Administrator
OrgAbusePhone: +1-970-491-1958
OrgAbuseEmail: dns.admin@colostate.edu
OrgAbuseRef: https://rdap.arin.net/registry/entity/DNSAD191-ARIN
OrgDNSHandle: DNSAD191-ARIN
OrgDNSName: DNS Administrator
OrgDNSPhone: +1-970-491-1958
OrgDNSEmail: dns.admin@colostate.edu
OrgDNSRef: https://rdap.arin.net/registry/entity/DNSAD191-ARIN
OrgRoutingHandle: ADLER49-ARIN
OrgRoutingName: Adler, Matt
OrgRoutingPhone: +1-303-497-1279
OrgRoutingEmail: adler@ucar.edu
OrgRoutingRef: https://rdap.arin.net/registry/entity/ADLER49-ARIN
OrgTechHandle: MPW-ARIN
OrgTechName: Willard, Michael Patrick
OrgTechPhone: +1-970-491-4651
OrgTechEmail: mike.willard@colostate.edu
OrgTechRef: https://rdap.arin.net/registry/entity/MPW-ARIN
OrgDNSHandle: HERNA1265-ARIN
OrgDNSName: Hernandez, John
OrgDNSPhone: +1-303-497-1280
OrgDNSEmail: jph@ucar.edu
OrgDNSRef: https://rdap.arin.net/registry/entity/HERNA1265-ARIN
OrgDNSHandle: ADLER49-ARIN
OrgDNSName: Adler, Matt
OrgDNSPhone: +1-303-497-1279
OrgDNSEmail: adler@ucar.edu
OrgDNSRef: https://rdap.arin.net/registry/entity/ADLER49-ARIN
# end
# start
NetRange: 129.19.64.0 - 129.19.127.255
CIDR: 129.19.64.0/18
NetName: FRGP-PARTICIPANT-ASSIGNMENTS-02
NetHandle: NET-129-19-64-0-1
Parent: WESTNET (NET-129-19-0-0-1)
NetType: Reallocated
OriginAS:
Organization: University Corporation for Atmospheric Research (UCAR-1)
RegDate: 2019-01-15
Updated: 2024-02-07
Ref: https://rdap.arin.net/registry/ip/129.19.64.0
OrgName: University Corporation for Atmospheric Research
OrgId: UCAR-1
Address: 3090 Center Green Drive
City: Boulder
StateProv: CO
PostalCode: 80301
Country: US
RegDate: 1988-05-26
Updated: 2026-02-19
Ref: https://rdap.arin.net/registry/entity/UCAR-1
OrgAbuseHandle: ABUSE18-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-307-996-4300
OrgAbuseEmail: abuse@ucar.edu
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE18-ARIN
OrgNOCHandle: ZN10-ARIN
OrgNOCName: National Center for Atmospheric Research
OrgNOCPhone: +1-307-996-4300
OrgNOCEmail: ne@ucar.edu
OrgNOCRef: https://rdap.arin.net/registry/entity/ZN10-ARIN
OrgTechHandle: ADLER49-ARIN
OrgTechName: Adler, Matt
OrgTechPhone: +1-303-497-1279
OrgTechEmail: adler@ucar.edu
OrgTechRef: https://rdap.arin.net/registry/entity/ADLER49-ARIN
OrgTechHandle: HERNA1265-ARIN
OrgTechName: Hernandez, John
OrgTechPhone: +1-303-497-1280
OrgTechEmail: jph@ucar.edu
OrgTechRef: https://rdap.arin.net/registry/entity/HERNA1265-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.19.104.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4140
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.19.104.124. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 02:13:20 CST 2026
;; MSG SIZE rcvd: 107
Host 124.104.19.129.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 124.104.19.129.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 219.246.34.120 | attackbots | /var/log/messages:Jul 10 20:12:27 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1562789547.377:2086): pid=24615 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-server cipher=aes256-ctr ksize=256 mac=hmac-sha1 pfs=ecdh-sha2-nistp256 spid=24616 suid=74 rport=46920 laddr=104.167.106.93 lport=22 exe="/usr/sbin/sshd" hostname=? addr=219.246.34.120 terminal=? res=success' /var/log/messages:Jul 10 20:12:27 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1562789547.381:2087): pid=24615 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-client cipher=aes256-ctr ksize=256 mac=hmac-sha1 pfs=ecdh-sha2-nistp256 spid=24616 suid=74 rport=46920 laddr=104.167.106.93 lport=22 exe="/usr/sbin/sshd" hostname=? addr=219.246.34.120 terminal=? res=success' /var/log/messages:Jul 10 20:12:28 sanyalnet-cloud-vps fail2ban.filter[5325]: INFO [sshd] Found........ ------------------------------- |
2019-07-12 03:05:05 |
| 92.119.160.125 | attackspambots | 11.07.2019 18:44:53 Connection to port 3694 blocked by firewall |
2019-07-12 03:18:11 |
| 148.72.40.221 | attack | Apr 18 13:30:19 server sshd\[151017\]: Invalid user oracle from 148.72.40.221 Apr 18 13:30:19 server sshd\[151017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.40.221 Apr 18 13:30:21 server sshd\[151017\]: Failed password for invalid user oracle from 148.72.40.221 port 45938 ssh2 ... |
2019-07-12 03:22:35 |
| 147.46.78.126 | attackspambots | May 6 17:01:02 server sshd\[162102\]: Invalid user test5 from 147.46.78.126 May 6 17:01:02 server sshd\[162102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.46.78.126 May 6 17:01:04 server sshd\[162102\]: Failed password for invalid user test5 from 147.46.78.126 port 43810 ssh2 ... |
2019-07-12 03:47:47 |
| 218.92.0.180 | attack | SSH bruteforce (Triggered fail2ban) |
2019-07-12 03:40:35 |
| 177.11.42.110 | attackspambots | Jul 10 07:04:58 *** sshd[13636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.11.42.110 user=r.r Jul 10 07:05:00 *** sshd[13636]: Failed password for r.r from 177.11.42.110 port 52018 ssh2 Jul 10 07:05:02 *** sshd[13636]: Failed password for r.r from 177.11.42.110 port 52018 ssh2 Jul 10 07:05:04 *** sshd[13636]: Failed password for r.r from 177.11.42.110 port 52018 ssh2 Jul 10 07:05:07 *** sshd[13636]: Failed password for r.r from 177.11.42.110 port 52018 ssh2 Jul 10 07:05:08 *** sshd[13636]: Failed password for r.r from 177.11.42.110 port 52018 ssh2 Jul 10 07:05:11 *** sshd[13636]: Failed password for r.r from 177.11.42.110 port 52018 ssh2 Jul 10 07:05:11 *** sshd[13636]: error: maximum authentication attempts exceeded for r.r from 177.11.42.110 port 52018 ssh2 [preauth] Jul 10 07:05:11 *** sshd[13636]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.11.42.110 user=r.r ........ ---------------------------------------------- |
2019-07-12 03:33:33 |
| 139.59.18.103 | attack | VNC brute force attack detected by fail2ban |
2019-07-12 03:13:40 |
| 216.221.46.159 | attackspambots | firewall-block, port(s): 23/tcp |
2019-07-12 03:38:09 |
| 148.70.23.121 | attack | May 23 11:01:07 server sshd\[128896\]: Invalid user desiree from 148.70.23.121 May 23 11:01:07 server sshd\[128896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.23.121 May 23 11:01:09 server sshd\[128896\]: Failed password for invalid user desiree from 148.70.23.121 port 48624 ssh2 ... |
2019-07-12 03:32:09 |
| 190.122.20.235 | attackspambots | Jul 10 13:45:37 rigel postfix/smtpd[4635]: connect from unknown[190.122.20.235] Jul 10 13:45:41 rigel postfix/smtpd[4635]: warning: unknown[190.122.20.235]: SASL CRAM-MD5 authentication failed: authentication failure Jul 10 13:45:42 rigel postfix/smtpd[4635]: warning: unknown[190.122.20.235]: SASL PLAIN authentication failed: authentication failure Jul 10 13:45:43 rigel postfix/smtpd[4635]: warning: unknown[190.122.20.235]: SASL LOGIN authentication failed: authentication failure ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=190.122.20.235 |
2019-07-12 03:44:55 |
| 141.98.81.77 | attackspambots | Port scan on 5 port(s): 8324 8326 8344 8353 8361 |
2019-07-12 03:28:45 |
| 54.149.191.238 | attackspambots | TCP src-port=5287 dst-port=25 spam-sorbs (455) |
2019-07-12 03:14:36 |
| 82.64.129.94 | attackbotsspam | Jul 11 18:51:53 localhost sshd\[6565\]: Invalid user pi from 82.64.129.94 port 55082 Jul 11 18:51:53 localhost sshd\[6565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.129.94 Jul 11 18:51:53 localhost sshd\[6567\]: Invalid user pi from 82.64.129.94 port 55096 |
2019-07-12 03:17:08 |
| 151.237.83.65 | attack | Jul 7 07:51:30 server sshd\[39164\]: Invalid user user1 from 151.237.83.65 Jul 7 07:51:30 server sshd\[39164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.237.83.65 Jul 7 07:51:32 server sshd\[39164\]: Failed password for invalid user user1 from 151.237.83.65 port 46420 ssh2 ... |
2019-07-12 03:06:10 |
| 185.176.27.30 | attackbots | firewall-block, port(s): 18995/tcp, 18996/tcp |
2019-07-12 03:45:21 |