Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Uzbekistan

Internet Service Provider: unknown

Hostname: unknown

Organization: Uzbektelekom Joint Stock Company

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
195.158.29.222 attackbots
SSH BruteForce Attack
2020-09-21 22:25:12
195.158.29.222 attackspam
Port scan followed by SSH.
2020-09-21 14:11:26
195.158.29.222 attackspambots
Port scan followed by SSH.
2020-09-21 06:01:37
195.158.29.222 attackspambots
Triggered by Fail2Ban at Ares web server
2020-04-07 13:21:17
195.158.29.222 attackspambots
3x Failed Password
2020-04-05 17:42:13
195.158.29.222 attack
Mar 29 16:34:16 mailman sshd[25792]: Invalid user ubuntu from 195.158.29.222
Mar 29 16:34:16 mailman sshd[25792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.158.29.222 
Mar 29 16:34:18 mailman sshd[25792]: Failed password for invalid user ubuntu from 195.158.29.222 port 36200 ssh2
2020-03-30 05:37:38
195.158.29.222 attackspam
B: f2b ssh aggressive 3x
2020-03-27 05:27:47
195.158.29.222 attack
Mar 24 17:53:41 firewall sshd[11773]: Invalid user mysql from 195.158.29.222
Mar 24 17:53:43 firewall sshd[11773]: Failed password for invalid user mysql from 195.158.29.222 port 54587 ssh2
Mar 24 17:55:39 firewall sshd[11865]: Invalid user test from 195.158.29.222
...
2020-03-25 05:01:29
195.158.29.222 attackbots
(sshd) Failed SSH login from 195.158.29.222 (UZ/Uzbekistan/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 19 11:47:17 ubnt-55d23 sshd[16493]: Invalid user ubuntu from 195.158.29.222 port 44314
Mar 19 11:47:20 ubnt-55d23 sshd[16493]: Failed password for invalid user ubuntu from 195.158.29.222 port 44314 ssh2
2020-03-19 19:13:33
195.158.29.222 attackspam
Invalid user user from 195.158.29.222 port 57527
2020-03-14 02:13:17
195.158.29.222 attackspambots
Invalid user pixelmove1234 from 195.158.29.222 port 49992
2020-03-12 07:11:49
195.158.29.222 attackspambots
$f2bV_matches
2020-03-11 18:33:14
195.158.29.222 attackbots
$f2bV_matches
2020-03-08 03:54:50
195.158.29.222 attackspambots
Banned by Fail2Ban.
2020-03-06 13:51:14
195.158.29.222 attackbots
Mar  3 00:49:13 php1 sshd\[11282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.158.29.222  user=bhayman
Mar  3 00:49:15 php1 sshd\[11282\]: Failed password for bhayman from 195.158.29.222 port 49175 ssh2
Mar  3 00:53:18 php1 sshd\[11686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.158.29.222  user=bhayman
Mar  3 00:53:20 php1 sshd\[11686\]: Failed password for bhayman from 195.158.29.222 port 34210 ssh2
Mar  3 00:57:20 php1 sshd\[12087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.158.29.222  user=mysql
2020-03-03 18:58:35
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.158.29.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11751
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;195.158.29.66.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040301 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu Apr 04 12:39:27 +08 2019
;; MSG SIZE  rcvd: 117

Host info
Host 66.29.158.195.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 66.29.158.195.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
183.56.201.142 attackbots
2020-04-04T08:20:02.755857librenms sshd[24763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.56.201.142
2020-04-04T08:20:02.737925librenms sshd[24763]: Invalid user wyk from 183.56.201.142 port 56290
2020-04-04T08:20:04.284532librenms sshd[24763]: Failed password for invalid user wyk from 183.56.201.142 port 56290 ssh2
...
2020-04-04 16:29:28
62.234.92.111 attackbotsspam
Invalid user iqg from 62.234.92.111 port 38646
2020-04-04 17:02:15
182.151.34.106 attackbots
$f2bV_matches
2020-04-04 16:30:04
96.92.113.85 attackbots
SSH Authentication Attempts Exceeded
2020-04-04 16:58:40
141.98.81.37 attackspam
Apr  4 09:32:23 vpn01 sshd[6300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.37
Apr  4 09:32:25 vpn01 sshd[6300]: Failed password for invalid user admin from 141.98.81.37 port 13118 ssh2
...
2020-04-04 16:58:06
106.13.98.132 attackspam
$f2bV_matches
2020-04-04 16:46:01
148.235.82.68 attackspambots
SSH login attempts.
2020-04-04 16:35:43
139.99.219.208 attackspambots
Invalid user zjh from 139.99.219.208 port 39210
2020-04-04 16:38:12
195.181.216.5 attack
Lines containing failures of 195.181.216.5
Apr  3 14:51:18 www sshd[23692]: Invalid user zhangkaili from 195.181.216.5 port 48282
Apr  3 14:51:18 www sshd[23692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.181.216.5
Apr  3 14:51:20 www sshd[23692]: Failed password for invalid user zhangkaili from 195.181.216.5 port 48282 ssh2
Apr  3 14:51:20 www sshd[23692]: Received disconnect from 195.181.216.5 port 48282:11: Bye Bye [preauth]
Apr  3 14:51:20 www sshd[23692]: Disconnected from invalid user zhangkaili 195.181.216.5 port 48282 [preauth]
Apr  3 15:12:50 www sshd[26682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.181.216.5  user=r.r
Apr  3 15:12:52 www sshd[26682]: Failed password for r.r from 195.181.216.5 port 48752 ssh2
Apr  3 15:12:52 www sshd[26682]: Received disconnect from 195.181.216.5 port 48752:11: Bye Bye [preauth]
Apr  3 15:12:52 www sshd[26682]: Disconnected from ........
------------------------------
2020-04-04 17:14:59
14.29.232.82 attack
Invalid user xuming from 14.29.232.82 port 45603
2020-04-04 16:51:30
42.101.46.118 attackbots
Invalid user bfc from 42.101.46.118 port 46462
2020-04-04 17:09:25
115.84.91.63 attack
Invalid user hxo from 115.84.91.63 port 51738
2020-04-04 16:42:15
103.126.56.22 attack
Apr  4 09:47:46 haigwepa sshd[17352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.126.56.22 
Apr  4 09:47:48 haigwepa sshd[17352]: Failed password for invalid user mi from 103.126.56.22 port 34452 ssh2
...
2020-04-04 16:50:14
139.199.1.166 attackspam
Apr  4 07:19:41 vps647732 sshd[12668]: Failed password for root from 139.199.1.166 port 47454 ssh2
...
2020-04-04 17:12:56
181.48.120.219 attackbotsspam
IP blocked
2020-04-04 16:31:18

Recently Reported IPs

110.53.202.20 112.197.82.120 221.126.225.184 193.70.90.132
164.132.230.244 58.64.157.163 177.11.244.4 103.85.66.114
58.56.174.74 1.9.21.100 93.39.116.254 195.88.16.155
118.169.73.221 114.113.221.162 103.207.37.148 192.200.122.226
37.212.29.192 187.193.94.91 192.154.108.146 159.192.107.238