Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.195.29.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23804
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;195.195.29.132.			IN	A

;; AUTHORITY SECTION:
.			422	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010800 1800 900 604800 86400

;; Query time: 259 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 08 18:18:32 CST 2020
;; MSG SIZE  rcvd: 118
Host info
132.29.195.195.in-addr.arpa is an alias for 132.128/25.29.195.195.in-addr.arpa.
132.128/25.29.195.195.in-addr.arpa domain name pointer no-reverse-defined.natstar.ac.uk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.29.195.195.in-addr.arpa	canonical name = 132.128/25.29.195.195.in-addr.arpa.
132.128/25.29.195.195.in-addr.arpa	name = no-reverse-defined.natstar.ac.uk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.38.128.30 attackbotsspam
Sep 20 12:59:44 meumeu sshd[76137]: Invalid user postgres from 51.38.128.30 port 51552
Sep 20 12:59:44 meumeu sshd[76137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.128.30 
Sep 20 12:59:44 meumeu sshd[76137]: Invalid user postgres from 51.38.128.30 port 51552
Sep 20 12:59:46 meumeu sshd[76137]: Failed password for invalid user postgres from 51.38.128.30 port 51552 ssh2
Sep 20 13:03:29 meumeu sshd[76356]: Invalid user webadmin from 51.38.128.30 port 35684
Sep 20 13:03:29 meumeu sshd[76356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.128.30 
Sep 20 13:03:29 meumeu sshd[76356]: Invalid user webadmin from 51.38.128.30 port 35684
Sep 20 13:03:32 meumeu sshd[76356]: Failed password for invalid user webadmin from 51.38.128.30 port 35684 ssh2
Sep 20 13:07:19 meumeu sshd[76601]: Invalid user steam from 51.38.128.30 port 48076
...
2020-09-20 20:04:26
207.244.117.125 attack
Massiver Kommentar-Spam
2020-09-20 19:27:44
184.105.247.211 attack
Found on   CINS badguys     / proto=17  .  srcport=7020  .  dstport=5351  .     (812)
2020-09-20 19:23:18
192.3.166.48 attackspambots
Massiver Kommentar-Spam.
2020-09-20 19:52:58
46.146.222.134 attackbots
Sep 20 13:50:49 pve1 sshd[2803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.146.222.134 
Sep 20 13:50:50 pve1 sshd[2803]: Failed password for invalid user test from 46.146.222.134 port 52558 ssh2
...
2020-09-20 19:54:03
178.32.197.87 attackspambots
Icarus honeypot on github
2020-09-20 19:49:53
119.28.75.179 attack
2020-09-20T10:47:19+0200 Failed SSH Authentication/Brute Force Attack. (Server 4)
2020-09-20 19:30:57
51.38.189.160 attackspam
DATE:2020-09-20 13:05:01, IP:51.38.189.160, PORT:ssh SSH brute force auth (docker-dc)
2020-09-20 19:23:05
192.241.218.40 attack
Sep 20 09:53:59 pve1 sshd[703]: Failed password for root from 192.241.218.40 port 34576 ssh2
Sep 20 10:02:25 pve1 sshd[4233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.218.40 
...
2020-09-20 19:52:25
134.73.73.117 attack
detected by Fail2Ban
2020-09-20 19:34:30
107.174.249.108 attackspambots
107.174.249.108 - - [19/Sep/2020:18:57:42 +0200] "GET /awstats.pl?config=register.transportscotland.gov.uk%2FSubscribe%2FWidgetSignup%3Furl%3Dhttps%3A%2F%2Fwww.linkedin.com%2Fshowcase%2Fdewapoker&lang=en&output=main HTTP/1.0" 404 280 "https://oraux.pnzone.net/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-20 19:54:25
104.206.128.42 attackspambots
Found on   CINS badguys     / proto=17  .  srcport=51289  .  dstport=161  .     (3700)
2020-09-20 19:42:00
106.54.119.121 attackbotsspam
DATE:2020-09-20 12:18:19, IP:106.54.119.121, PORT:ssh SSH brute force auth (docker-dc)
2020-09-20 19:37:44
199.19.226.35 attackspambots
Sep 20 03:44:51 pixelmemory sshd[321260]: Invalid user oracle from 199.19.226.35 port 37130
Sep 20 03:44:51 pixelmemory sshd[321259]: Invalid user ubuntu from 199.19.226.35 port 37124
Sep 20 03:44:51 pixelmemory sshd[321258]: Invalid user admin from 199.19.226.35 port 37122
Sep 20 03:44:51 pixelmemory sshd[321256]: Invalid user vagrant from 199.19.226.35 port 37126
Sep 20 03:44:51 pixelmemory sshd[321255]: Invalid user postgres from 199.19.226.35 port 37128
...
2020-09-20 19:32:16
119.45.58.111 attack
Bruteforce detected by fail2ban
2020-09-20 19:36:12

Recently Reported IPs

49.233.143.61 147.31.113.243 197.36.97.128 103.112.58.242
180.242.29.47 85.105.92.139 42.117.57.93 46.225.234.226
59.80.62.59 124.43.21.114 101.108.191.131 43.240.21.31
36.82.195.99 212.79.122.1 183.155.123.95 177.139.125.6
124.123.96.104 110.137.146.179 14.162.192.167 2.180.72.250