City: Ashburn
Region: Virginia
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 130.35.0.0 - 130.35.255.255
CIDR: 130.35.0.0/16
NetName: ORACLE-CORP-TMP
NetHandle: NET-130-35-0-0-1
Parent: NET130 (NET-130-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Oracle Corporation (ORACLE-4-Z)
RegDate: 1988-04-29
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/130.35.0.0
OrgName: Oracle Corporation
OrgId: ORACLE-4-Z
Address: 500 Oracle Parkway
Address: Attn: Domain Administrator
City: Redwood Shores
StateProv: CA
PostalCode: 94065
Country: US
RegDate: 2013-08-21
Updated: 2021-01-13
Ref: https://rdap.arin.net/registry/entity/ORACLE-4-Z
OrgRoutingHandle: ORACL2-ARIN
OrgRoutingName: ORACLEROUTING
OrgRoutingPhone: +1-800-392-2999
OrgRoutingEmail: network-contact_ww@oracle.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/ORACL2-ARIN
OrgAbuseHandle: NISAM-ARIN
OrgAbuseName: Network Information Systems Abuse Management
OrgAbusePhone: +1-800-633-0738
OrgAbuseEmail: abuse@oracleemaildelivery.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/NISAM-ARIN
OrgTechHandle: ORACL1-ARIN
OrgTechName: ORACLE NIS
OrgTechPhone: +1-800-633-0738
OrgTechEmail: domain-contact_ww_grp@oracle.com
OrgTechRef: https://rdap.arin.net/registry/entity/ORACL1-ARIN
RTechHandle: DNSAD45-ARIN
RTechName: DNSADMIN
RTechPhone: +1-650-506-2220
RTechEmail: network-contact_ww@oracle.com
RTechRef: https://rdap.arin.net/registry/entity/DNSAD45-ARIN
RAbuseHandle: NISAM-ARIN
RAbuseName: Network Information Systems Abuse Management
RAbusePhone: +1-800-633-0738
RAbuseEmail: abuse@oracleemaildelivery.com
RAbuseRef: https://rdap.arin.net/registry/entity/NISAM-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.35.228.35
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48402
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;130.35.228.35. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025091800 1800 900 604800 86400
;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 19 00:32:23 CST 2025
;; MSG SIZE rcvd: 106
35.228.35.130.in-addr.arpa domain name pointer us07-sts.oraclemicros.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
35.228.35.130.in-addr.arpa name = us07-sts.oraclemicros.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
74.82.206.228 | attackbotsspam | Invalid user wy from 74.82.206.228 port 59124 |
2019-07-27 23:16:00 |
213.109.160.61 | attackbotsspam | SSH/22 MH Probe, BF, Hack - |
2019-07-27 22:31:06 |
123.20.14.162 | attackspam | Invalid user admin from 123.20.14.162 port 60546 |
2019-07-27 22:41:37 |
81.92.58.29 | attackspam | Telnet Server BruteForce Attack |
2019-07-27 22:33:54 |
31.127.219.209 | attackspam | Invalid user su from 31.127.219.209 port 33048 |
2019-07-27 23:24:17 |
188.134.98.156 | attackspam | Invalid user pi from 188.134.98.156 port 49432 |
2019-07-27 22:37:21 |
84.55.65.13 | attackbotsspam | Invalid user guest from 84.55.65.13 port 43908 |
2019-07-27 23:13:38 |
148.70.76.34 | attackbotsspam | Jul 27 06:35:30 cvbmail sshd\[25001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.76.34 user=root Jul 27 06:35:32 cvbmail sshd\[25001\]: Failed password for root from 148.70.76.34 port 44658 ssh2 Jul 27 06:59:44 cvbmail sshd\[25112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.76.34 user=root |
2019-07-27 22:23:35 |
41.39.145.138 | attackbotsspam | Invalid user admin from 41.39.145.138 port 38782 |
2019-07-27 22:50:01 |
180.126.236.92 | attackspambots | $f2bV_matches |
2019-07-27 22:39:03 |
46.20.47.29 | attack | Jul 27 09:32:06 mailman sshd[11279]: Invalid user VM from 46.20.47.29 Jul 27 09:32:06 mailman sshd[11279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.20.47.29 Jul 27 09:32:07 mailman sshd[11279]: Failed password for invalid user VM from 46.20.47.29 port 59776 ssh2 |
2019-07-27 22:49:36 |
176.215.254.162 | attack | scan z |
2019-07-27 22:25:25 |
123.201.52.122 | attack | Invalid user UBNT from 123.201.52.122 port 42825 |
2019-07-27 23:04:08 |
49.144.250.165 | attackspam | Invalid user dircreate from 49.144.250.165 port 54128 |
2019-07-27 22:48:10 |
201.250.156.145 | attackbots | Invalid user admin from 201.250.156.145 port 33918 |
2019-07-27 22:53:24 |