Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Lithuania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.129.0.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59597
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;158.129.0.52.			IN	A

;; AUTHORITY SECTION:
.			583	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 13:33:11 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 52.0.129.158.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.0.129.158.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
110.185.106.47 attack
Oct 16 23:26:26 sauna sshd[2587]: Failed password for root from 110.185.106.47 port 38024 ssh2
...
2019-10-17 04:32:34
165.227.123.226 attackbots
(sshd) Failed SSH login from 165.227.123.226 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 16 21:07:52 server2 sshd[2095]: Invalid user char from 165.227.123.226 port 33792
Oct 16 21:07:53 server2 sshd[2095]: Failed password for invalid user char from 165.227.123.226 port 33792 ssh2
Oct 16 21:24:52 server2 sshd[3932]: Invalid user akee from 165.227.123.226 port 59918
Oct 16 21:24:54 server2 sshd[3932]: Failed password for invalid user akee from 165.227.123.226 port 59918 ssh2
Oct 16 21:28:19 server2 sshd[4343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.123.226  user=root
2019-10-17 04:32:04
185.250.47.79 attack
Name: 'gekllokjwer'
Street: 'wBNmmryJLPqUs'
City: 'xlGIGrxwEWmajz'
Zip: 'wiHreTwnjO'
Message: 'âàæíî âàæíî âàæíî Áàä-Èøëü âàæíî Êðàáè, Òàèëàíä Àíãàðñê Ìåíîðêà Òàëäûêîðãàí, Êàçàõñòàí
2019-10-17 04:11:08
54.37.136.87 attack
2019-10-16T19:59:39.060026abusebot.cloudsearch.cf sshd\[32623\]: Invalid user joop from 54.37.136.87 port 41976
2019-10-17 04:05:49
101.110.45.156 attackspambots
2019-10-16T22:18:55.852652tmaserv sshd\[23930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.110.45.156  user=root
2019-10-16T22:18:57.202388tmaserv sshd\[23930\]: Failed password for root from 101.110.45.156 port 46567 ssh2
2019-10-16T22:23:25.989228tmaserv sshd\[24102\]: Invalid user dooruser from 101.110.45.156 port 38190
2019-10-16T22:23:25.994777tmaserv sshd\[24102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.110.45.156
2019-10-16T22:23:28.412975tmaserv sshd\[24102\]: Failed password for invalid user dooruser from 101.110.45.156 port 38190 ssh2
2019-10-16T22:27:49.287478tmaserv sshd\[24282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.110.45.156  user=root
...
2019-10-17 04:15:34
192.210.134.2 attackbots
Port Scan
2019-10-17 04:07:34
168.232.62.178 attackbotsspam
Automatic report - Port Scan Attack
2019-10-17 04:18:04
89.164.38.16 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/89.164.38.16/ 
 HR - 1H : (7)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : HR 
 NAME ASN : ASN13046 
 
 IP : 89.164.38.16 
 
 CIDR : 89.164.0.0/18 
 
 PREFIX COUNT : 64 
 
 UNIQUE IP COUNT : 125696 
 
 
 WYKRYTE ATAKI Z ASN13046 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-16 21:29:02 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-17 04:05:32
47.97.117.182 attackbotsspam
Port Scan
2019-10-17 04:13:57
212.237.63.28 attack
Oct 16 10:27:52 php1 sshd\[12234\]: Invalid user asdf123\$ from 212.237.63.28
Oct 16 10:27:52 php1 sshd\[12234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.63.28
Oct 16 10:27:54 php1 sshd\[12234\]: Failed password for invalid user asdf123\$ from 212.237.63.28 port 55710 ssh2
Oct 16 10:31:51 php1 sshd\[12572\]: Invalid user 123456 from 212.237.63.28
Oct 16 10:31:51 php1 sshd\[12572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.63.28
2019-10-17 04:33:51
178.128.254.163 attackbots
Oct 16 20:22:50 vm6 sshd[27027]: Did not receive identification string from 178.128.254.163 port 37660
Oct 16 20:24:18 vm6 sshd[27202]: Invalid user erajkot from 178.128.254.163 port 41518
Oct 16 20:24:18 vm6 sshd[27202]: Received disconnect from 178.128.254.163 port 41518:11: Normal Shutdown, Thank you for playing [preauth]
Oct 16 20:24:18 vm6 sshd[27202]: Disconnected from 178.128.254.163 port 41518 [preauth]
Oct 16 20:24:42 vm6 sshd[27244]: Invalid user abhinish from 178.128.254.163 port 36060
Oct 16 20:24:42 vm6 sshd[27244]: Received disconnect from 178.128.254.163 port 36060:11: Normal Shutdown, Thank you for playing [preauth]
Oct 16 20:24:42 vm6 sshd[27244]: Disconnected from 178.128.254.163 port 36060 [preauth]
Oct 16 20:25:05 vm6 sshd[27289]: Invalid user opusmonk from 178.128.254.163 port 58784
Oct 16 20:25:05 vm6 sshd[27289]: Received disconnect from 178.128.254.163 port 58784:11: Normal Shutdown, Thank you for playing [preauth]
Oct 16 20:25:05 vm6 sshd[27289]........
-------------------------------
2019-10-17 04:29:38
82.208.122.74 attackbots
Automatic report - Port Scan Attack
2019-10-17 04:26:43
77.68.9.210 attackspambots
Automatic report - XMLRPC Attack
2019-10-17 04:15:07
121.233.49.146 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/121.233.49.146/ 
 CN - 1H : (473)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 121.233.49.146 
 
 CIDR : 121.232.0.0/14 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 WYKRYTE ATAKI Z ASN4134 :  
  1H - 11 
  3H - 27 
  6H - 47 
 12H - 113 
 24H - 171 
 
 DateTime : 2019-10-16 21:28:10 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-17 04:38:47
128.199.199.113 attackbotsspam
Aug 20 20:26:42 vtv3 sshd\[425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.199.113  user=root
Aug 20 20:26:44 vtv3 sshd\[425\]: Failed password for root from 128.199.199.113 port 50604 ssh2
Aug 20 20:30:30 vtv3 sshd\[2463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.199.113  user=root
Aug 20 20:30:33 vtv3 sshd\[2463\]: Failed password for root from 128.199.199.113 port 55868 ssh2
Aug 20 20:34:52 vtv3 sshd\[4456\]: Invalid user todds from 128.199.199.113 port 33202
Aug 30 12:26:39 vtv3 sshd\[14450\]: Invalid user app from 128.199.199.113 port 53670
Aug 30 12:26:39 vtv3 sshd\[14450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.199.113
Aug 30 12:26:41 vtv3 sshd\[14450\]: Failed password for invalid user app from 128.199.199.113 port 53670 ssh2
Aug 30 12:32:43 vtv3 sshd\[17588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 eui
2019-10-17 04:28:00

Recently Reported IPs

158.132.82.94 158.129.51.79 158.140.103.204 158.140.163.214
158.136.1.77 158.135.1.242 158.140.174.2 158.140.163.44
158.140.171.40 158.140.171.57 158.140.187.36 158.140.183.153
158.140.184.175 158.140.65.202 158.140.236.6 158.144.1.22
158.146.1.229 158.146.1.232 158.140.92.146 158.162.0.40