Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.29.168.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57439
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.29.168.158.			IN	A

;; AUTHORITY SECTION:
.			381	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021123000 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 30 14:00:43 CST 2021
;; MSG SIZE  rcvd: 106
Host info
Host 158.168.29.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 158.168.29.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.87.145 attackspambots
SSH login attempts @ 2020-03-10 11:39:51
2020-03-22 04:43:18
106.12.150.188 attackbots
Invalid user rstudio from 106.12.150.188 port 45448
2020-03-22 04:45:03
68.48.240.245 attack
Mar 21 21:38:25 host01 sshd[1579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.48.240.245 
Mar 21 21:38:27 host01 sshd[1579]: Failed password for invalid user aleigha from 68.48.240.245 port 42202 ssh2
Mar 21 21:43:12 host01 sshd[2588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.48.240.245 
...
2020-03-22 04:57:43
79.137.77.131 attack
Invalid user ptao from 79.137.77.131 port 52054
2020-03-22 04:55:59
165.227.200.161 attack
Invalid user download from 165.227.200.161 port 43704
2020-03-22 04:26:11
116.2.175.217 attackspambots
Mar 21 10:44:26 mail sshd\[9852\]: Invalid user henny from 116.2.175.217
Mar 21 10:44:26 mail sshd\[9852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.2.175.217
...
2020-03-22 04:40:43
95.85.30.24 attack
SSH login attempts @ 2020-03-08 17:30:48
2020-03-22 04:50:59
94.102.49.82 attack
Invalid user admin from 94.102.49.82 port 62568
2020-03-22 04:52:23
104.248.170.45 attackbots
Invalid user fuminori from 104.248.170.45 port 48660
2020-03-22 04:46:41
144.172.70.234 attack
blocked after repeated ssh login attempts
2020-03-22 04:30:31
103.75.101.59 attackspambots
SSH login attempts @ 2020-03-09 23:16:03
2020-03-22 04:48:39
104.41.167.130 attackbotsspam
Invalid user yueyimin from 104.41.167.130 port 40382
2020-03-22 04:47:39
120.88.46.226 attackspam
Invalid user ubuntu from 120.88.46.226 port 35754
2020-03-22 04:36:37
167.71.202.235 attack
Mar 21 16:06:57 ny01 sshd[3917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.202.235
Mar 21 16:06:59 ny01 sshd[3917]: Failed password for invalid user coco from 167.71.202.235 port 60834 ssh2
Mar 21 16:13:15 ny01 sshd[6527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.202.235
2020-03-22 04:25:51
94.181.181.120 attackspam
Mar 21 20:33:28 vpn01 sshd[16985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.181.181.120
Mar 21 20:33:31 vpn01 sshd[16985]: Failed password for invalid user bow from 94.181.181.120 port 37826 ssh2
...
2020-03-22 04:52:07

Recently Reported IPs

4.216.255.170 68.185.146.81 222.182.129.248 76.78.62.116
106.173.126.82 48.82.16.107 58.39.213.6 28.130.122.76
212.218.134.65 135.199.222.222 184.201.85.32 170.84.229.143
192.243.120.138 56.70.140.56 246.54.187.182 62.174.34.135
18.41.93.234 103.88.113.162 117.129.134.134 24.74.150.50