City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b'#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 29.0.0.0 - 29.255.255.255
CIDR: 29.0.0.0/8
NetName: DNIC-SNET-029
NetHandle: NET-29-0-0-0-1
Parent: ()
NetType: Direct Allocation
OriginAS:
Organization: United States Department of Defense (DoD) (USDDD)
RegDate: 1991-07-01
Updated: 2025-09-05
Ref: https://rdap.arin.net/registry/ip/29.0.0.0
OrgName: United States Department of Defense (DoD)
OrgId: USDDD
Address: 3990 E. Broad Street
City: Columbus
StateProv: OH
PostalCode: 43218
Country: US
RegDate: 2007-01-12
Updated: 2025-03-13
Ref: https://rdap.arin.net/registry/entity/USDDD
OrgAbuseHandle: MIL-HSTMST-ARIN
OrgAbuseName: Network DoD
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgAbuseRef: https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN
OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName: Network DoD
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef: https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN
OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef: https://rdap.arin.net/registry/entity/REGIS10-ARIN
OrgNOCHandle: MIL-HSTMST-ARIN
OrgNOCName: Network DoD
OrgNOCPhone: +1-844-347-2457
OrgNOCEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgNOCRef: https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN
# end
# start
NetRange: 29.0.0.0 - 29.255.255.255
CIDR: 29.0.0.0/8
NetName: DNIC-SNET-029
NetHandle: NET-29-0-0-0-2
Parent: DNIC-SNET-029 (NET-29-0-0-0-1)
NetType: Reallocated
OriginAS:
Organization: DoD Network Information Center (DNIC)
RegDate: 2025-09-05
Updated: 2025-09-05
Ref: https://rdap.arin.net/registry/ip/29.0.0.0
OrgName: DoD Network Information Center
OrgId: DNIC
Address: 3990 E. Broad Street
City: Columbus
StateProv: OH
PostalCode: 43218
Country: US
RegDate:
Updated: 2025-03-13
Ref: https://rdap.arin.net/registry/entity/DNIC
OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName: Registration
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef: https://rdap.arin.net/registry/entity/REGIS10-ARIN
OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName: Network DoD
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef: https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN
OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef: https://rdap.arin.net/registry/entity/REGIS10-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#'
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.179.169.233
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23299
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;29.179.169.233. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041500 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 16 00:20:15 CST 2026
;; MSG SIZE rcvd: 107
Host 233.169.179.29.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 233.169.179.29.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 27.68.33.85 | attack | Brute-Force |
2020-05-10 21:23:25 |
| 27.100.13.140 | attack | Unauthorized connection attempt from IP address 27.100.13.140 on Port 445(SMB) |
2020-05-10 21:25:49 |
| 79.124.8.95 | attackspambots | Port scan on 5 port(s): 40054 40062 40095 40139 40154 |
2020-05-10 21:18:01 |
| 123.59.195.245 | attack | May 10 15:28:04 buvik sshd[27624]: Invalid user account from 123.59.195.245 May 10 15:28:04 buvik sshd[27624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.59.195.245 May 10 15:28:06 buvik sshd[27624]: Failed password for invalid user account from 123.59.195.245 port 45830 ssh2 ... |
2020-05-10 21:50:00 |
| 180.76.103.63 | attack | May 10 15:10:42 vps647732 sshd[15766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.103.63 May 10 15:10:45 vps647732 sshd[15766]: Failed password for invalid user ryan from 180.76.103.63 port 55582 ssh2 ... |
2020-05-10 21:30:38 |
| 162.243.136.232 | attackspam | Unauthorized SSH login attempts |
2020-05-10 21:27:30 |
| 165.22.107.44 | attackbotsspam | May 10 14:46:48 web01 sshd[4568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.107.44 May 10 14:46:50 web01 sshd[4568]: Failed password for invalid user employee from 165.22.107.44 port 55362 ssh2 ... |
2020-05-10 21:58:48 |
| 51.77.150.203 | attack | May 10 14:21:17 ArkNodeAT sshd\[17455\]: Invalid user joshua from 51.77.150.203 May 10 14:21:17 ArkNodeAT sshd\[17455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.150.203 May 10 14:21:19 ArkNodeAT sshd\[17455\]: Failed password for invalid user joshua from 51.77.150.203 port 57868 ssh2 |
2020-05-10 21:16:22 |
| 148.72.212.161 | attackspam | 2020-05-10T15:16:07.853695sd-86998 sshd[4806]: Invalid user taiga from 148.72.212.161 port 41066 2020-05-10T15:16:07.859399sd-86998 sshd[4806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-148-72-212-161.ip.secureserver.net 2020-05-10T15:16:07.853695sd-86998 sshd[4806]: Invalid user taiga from 148.72.212.161 port 41066 2020-05-10T15:16:10.056290sd-86998 sshd[4806]: Failed password for invalid user taiga from 148.72.212.161 port 41066 ssh2 2020-05-10T15:19:26.336693sd-86998 sshd[5249]: Invalid user zelalem from 148.72.212.161 port 33222 ... |
2020-05-10 21:52:32 |
| 106.0.6.33 | attackspambots | port scan and connect, tcp 1433 (ms-sql-s) |
2020-05-10 21:50:43 |
| 18.197.204.193 | attackspambots | [Wed Apr 29 13:33:04 2020] - DDoS Attack From IP: 18.197.204.193 Port: 22 |
2020-05-10 21:55:35 |
| 103.60.214.110 | attackspam | prod6 ... |
2020-05-10 21:38:15 |
| 201.108.102.70 | attack | Automatic report - Port Scan Attack |
2020-05-10 21:30:07 |
| 45.249.91.194 | attack | [2020-05-10 09:25:56] NOTICE[1157][C-0000278d] chan_sip.c: Call from '' (45.249.91.194:51991) to extension '901146812410858' rejected because extension not found in context 'public'. [2020-05-10 09:25:56] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-10T09:25:56.443-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="901146812410858",SessionID="0x7f5f10905838",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.249.91.194/51991",ACLName="no_extension_match" [2020-05-10 09:26:56] NOTICE[1157][C-0000278f] chan_sip.c: Call from '' (45.249.91.194:57555) to extension '9138011442037694942' rejected because extension not found in context 'public'. [2020-05-10 09:26:56] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-10T09:26:56.574-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9138011442037694942",SessionID="0x7f5f108161e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="I ... |
2020-05-10 21:45:00 |
| 211.157.179.38 | attackspam | SSH bruteforce |
2020-05-10 21:14:23 |