Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: Afrihost (Pty) Ltd

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
2020-08-23T05:06:53.968067shield sshd\[23479\]: Invalid user sonar from 154.0.161.99 port 40176
2020-08-23T05:06:53.974794shield sshd\[23479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=baymonitoring.dedicated.co.za
2020-08-23T05:06:56.320714shield sshd\[23479\]: Failed password for invalid user sonar from 154.0.161.99 port 40176 ssh2
2020-08-23T05:12:21.981373shield sshd\[24869\]: Invalid user ralf from 154.0.161.99 port 49512
2020-08-23T05:12:22.020383shield sshd\[24869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=baymonitoring.dedicated.co.za
2020-08-23 14:19:19
attackspam
Aug 19 17:32:07 db sshd[14408]: Invalid user sales from 154.0.161.99 port 37440
...
2020-08-20 02:04:49
attackbots
2020-08-16T12:35:46.067859shield sshd\[20770\]: Invalid user money from 154.0.161.99 port 41120
2020-08-16T12:35:46.077812shield sshd\[20770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=baymonitoring.dedicated.co.za
2020-08-16T12:35:47.683797shield sshd\[20770\]: Failed password for invalid user money from 154.0.161.99 port 41120 ssh2
2020-08-16T12:40:46.916053shield sshd\[21630\]: Invalid user ed from 154.0.161.99 port 50550
2020-08-16T12:40:46.924820shield sshd\[21630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=baymonitoring.dedicated.co.za
2020-08-16 21:13:21
attackbots
fail2ban
2020-08-13 22:56:58
attackbots
Aug  8 22:54:41 pkdns2 sshd\[17934\]: Failed password for root from 154.0.161.99 port 60670 ssh2Aug  8 22:56:53 pkdns2 sshd\[18051\]: Address 154.0.161.99 maps to peardev.dedicated.co.za, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Aug  8 22:56:55 pkdns2 sshd\[18051\]: Failed password for root from 154.0.161.99 port 32926 ssh2Aug  8 22:59:09 pkdns2 sshd\[18139\]: Address 154.0.161.99 maps to peardev.dedicated.co.za, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Aug  8 22:59:12 pkdns2 sshd\[18139\]: Failed password for root from 154.0.161.99 port 33414 ssh2Aug  8 23:01:31 pkdns2 sshd\[18255\]: Failed password for root from 154.0.161.99 port 33902 ssh2
...
2020-08-09 04:23:52
attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-19 20:48:00
Comments on same subnet:
IP Type Details Datetime
154.0.161.131 attackspambots
Wordpress_xmlrpc_attack
2020-05-25 22:26:10
154.0.161.239 attackbots
xmlrpc
2020-04-02 07:28:25
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.0.161.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29741
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;154.0.161.99.			IN	A

;; AUTHORITY SECTION:
.			467	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020071900 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jul 19 20:47:55 CST 2020
;; MSG SIZE  rcvd: 116
Host info
99.161.0.154.in-addr.arpa domain name pointer baymonitoring.dedicated.co.za.
99.161.0.154.in-addr.arpa domain name pointer gridfive01.dedicated.co.za.
99.161.0.154.in-addr.arpa domain name pointer peardev.dedicated.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.161.0.154.in-addr.arpa	name = gridfive01.dedicated.co.za.
99.161.0.154.in-addr.arpa	name = peardev.dedicated.co.za.
99.161.0.154.in-addr.arpa	name = baymonitoring.dedicated.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.35.83.46 attack
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-10-09 05:29:02
37.120.198.197 attackbots
2020-10-07 23:07:11 dovecot_login authenticator failed for \(WIN-25FFVSIPLS1\) \[37.120.198.197\]: 535 Incorrect authentication data \(set_id=infoeozo\)
2020-10-07 23:07:11 H=\(WIN-25FFVSIPLS1\) \[37.120.198.197\] sender verify fail for \: Unrouteable address
2020-10-07 23:07:11 H=\(WIN-25FFVSIPLS1\) \[37.120.198.197\] F=\ rejected RCPT \: Sender verify failed
2020-10-07 23:07:23 dovecot_login authenticator failed for \(WIN-25FFVSIPLS1\) \[37.120.198.197\]: 535 Incorrect authentication data \(set_id=info\)
2020-10-07 23:07:23 H=\(WIN-25FFVSIPLS1\) \[37.120.198.197\] F=\ rejected RCPT \: relay not permitted
2020-10-09 05:07:32
114.224.178.217 attack
Oct  8 10:17:39 Tower sshd[6296]: Connection from 114.224.178.217 port 60886 on 192.168.10.220 port 22 rdomain ""
Oct  8 10:17:43 Tower sshd[6296]: Failed password for root from 114.224.178.217 port 60886 ssh2
Oct  8 10:17:43 Tower sshd[6296]: Received disconnect from 114.224.178.217 port 60886:11: Bye Bye [preauth]
Oct  8 10:17:43 Tower sshd[6296]: Disconnected from authenticating user root 114.224.178.217 port 60886 [preauth]
2020-10-09 05:05:13
190.153.174.162 attackbots
Unauthorized connection attempt from IP address 190.153.174.162 on Port 445(SMB)
2020-10-09 05:14:51
181.57.148.194 attackspambots
20/10/8@00:40:38: FAIL: Alarm-Network address from=181.57.148.194
20/10/8@00:40:39: FAIL: Alarm-Network address from=181.57.148.194
...
2020-10-09 05:39:24
200.161.240.215 attackspam
Unauthorized connection attempt from IP address 200.161.240.215 on Port 445(SMB)
2020-10-09 05:43:09
60.167.177.172 attackspambots
Oct  7 16:34:22 lanister sshd[21890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.177.172  user=root
Oct  7 16:34:24 lanister sshd[21890]: Failed password for root from 60.167.177.172 port 36250 ssh2
Oct  7 16:46:32 lanister sshd[22095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.177.172  user=root
Oct  7 16:46:35 lanister sshd[22095]: Failed password for root from 60.167.177.172 port 42776 ssh2
2020-10-09 05:11:26
104.168.214.86 attack
Oct  8 11:05:14 mail postfix/smtpd[27643]: warning: hwsrv-786714.hostwindsdns.com[104.168.214.86]: SASL login authentication failed: authentication failure
2020-10-09 05:12:13
107.77.172.133 attackbots
Brute forcing email accounts
2020-10-09 05:25:51
62.217.186.28 attackspambots
Unauthorized connection attempt from IP address 62.217.186.28 on Port 445(SMB)
2020-10-09 05:16:26
115.76.105.13 attack
" "
2020-10-09 05:22:26
141.98.80.22 attackspambots
UTC 10/08/2020 18:12:24 - 83 - Security Services - Alert - 141.98.80.22, 65534, X1 - xxx.xxx.xxx.xxx, 8651, X1 - tcp - TCP scanned port list, 8691, 8611, 8671, 8601, 8661, 8641, 8681, 8631, 8621, 8651 - Probable port scan detected
2020-10-09 05:32:34
58.221.204.114 attackbots
Oct  8 22:31:54 nopemail auth.info sshd[29226]: Invalid user jamie from 58.221.204.114 port 53484
...
2020-10-09 05:37:42
200.37.35.228 attack
Oct  8 18:33:58 buvik sshd[10213]: Failed password for root from 200.37.35.228 port 41890 ssh2
Oct  8 18:36:34 buvik sshd[10693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.37.35.228  user=root
Oct  8 18:36:37 buvik sshd[10693]: Failed password for root from 200.37.35.228 port 52374 ssh2
...
2020-10-09 05:36:48
122.51.248.76 attack
Oct  8 20:58:40 sshgateway sshd\[19045\]: Invalid user ian from 122.51.248.76
Oct  8 20:58:40 sshgateway sshd\[19045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.248.76
Oct  8 20:58:42 sshgateway sshd\[19045\]: Failed password for invalid user ian from 122.51.248.76 port 34718 ssh2
2020-10-09 05:01:46

Recently Reported IPs

94.31.219.161 92.104.83.68 249.236.181.66 220.178.67.242
66.249.64.134 206.130.141.138 117.203.18.17 113.186.164.164
31.4.128.208 60.167.176.212 95.7.231.42 188.210.187.179
59.127.167.112 187.185.224.2 78.123.86.185 52.188.71.151
186.154.6.73 51.178.43.9 194.182.76.185 206.189.44.61