Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: Afrihost (Pty) Ltd

Hostname: unknown

Organization: Afrihost

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspambots
Jul 10 21:06:19 tux-35-217 sshd\[24105\]: Invalid user ircd from 154.0.164.73 port 56422
Jul 10 21:06:19 tux-35-217 sshd\[24105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.0.164.73
Jul 10 21:06:21 tux-35-217 sshd\[24105\]: Failed password for invalid user ircd from 154.0.164.73 port 56422 ssh2
Jul 10 21:09:52 tux-35-217 sshd\[24118\]: Invalid user ftpu from 154.0.164.73 port 54772
Jul 10 21:09:52 tux-35-217 sshd\[24118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.0.164.73
...
2019-07-11 03:25:53
attackbotsspam
SSH brute force
2019-06-28 22:28:59
Comments on same subnet:
IP Type Details Datetime
154.0.164.181 attackspam
xmlrpc attack
2019-08-09 21:04:57
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.0.164.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21523
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;154.0.164.73.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060100 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 01 19:27:11 CST 2019
;; MSG SIZE  rcvd: 116

Host info
73.164.0.154.in-addr.arpa domain name pointer antonand.dedicated.co.za.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
73.164.0.154.in-addr.arpa	name = antonand.dedicated.co.za.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
185.50.149.25 attackspam
May 11 07:30:39 mail.srvfarm.net postfix/smtpd[3315814]: warning: unknown[185.50.149.25]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 11 07:30:39 mail.srvfarm.net postfix/smtpd[3314884]: warning: unknown[185.50.149.25]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 11 07:30:39 mail.srvfarm.net postfix/smtpd[3315515]: warning: unknown[185.50.149.25]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 11 07:30:39 mail.srvfarm.net postfix/smtpd[3313725]: warning: unknown[185.50.149.25]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 11 07:30:39 mail.srvfarm.net postfix/smtpd[3313725]: lost connection after AUTH from unknown[185.50.149.25]
2020-05-11 13:58:05
63.240.240.74 attackbots
SSH login attempts.
2020-05-11 13:24:25
122.228.19.80 attackspam
May 11 06:19:00 debian-2gb-nbg1-2 kernel: \[11429608.878810\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=122.228.19.80 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=109 ID=26586 PROTO=TCP SPT=32004 DPT=2080 WINDOW=29200 RES=0x00 SYN URGP=0
2020-05-11 13:34:38
49.88.112.55 attack
Brute force attempt
2020-05-11 14:08:23
46.101.139.105 attackbotsspam
Invalid user user from 46.101.139.105 port 52960
2020-05-11 13:52:44
203.99.60.214 attack
2020-05-10 22:54:14.488206-0500  localhost sshd[23533]: Failed password for root from 203.99.60.214 port 51256 ssh2
2020-05-11 13:36:01
157.245.64.140 attack
Invalid user nagios from 157.245.64.140 port 54626
2020-05-11 13:28:45
190.141.119.163 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-11 13:50:22
190.29.112.209 attackspam
May 11 05:54:59 mail sshd[2979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.29.112.209 
May 11 05:55:00 mail sshd[2979]: Failed password for invalid user admin from 190.29.112.209 port 47059 ssh2
...
2020-05-11 13:40:49
37.61.176.231 attack
2020-05-11T07:59:28.501605sd-86998 sshd[35713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.61.176.231  user=elasticsearch
2020-05-11T07:59:29.912835sd-86998 sshd[35713]: Failed password for elasticsearch from 37.61.176.231 port 41550 ssh2
2020-05-11T08:01:26.122519sd-86998 sshd[35981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.61.176.231  user=postgres
2020-05-11T08:01:28.732607sd-86998 sshd[35981]: Failed password for postgres from 37.61.176.231 port 42832 ssh2
2020-05-11T08:03:19.980834sd-86998 sshd[36182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.61.176.231  user=root
2020-05-11T08:03:21.437406sd-86998 sshd[36182]: Failed password for root from 37.61.176.231 port 44116 ssh2
...
2020-05-11 14:04:41
159.89.166.91 attack
20 attempts against mh-ssh on install-test
2020-05-11 13:37:33
222.186.173.154 attack
prod3
...
2020-05-11 13:25:02
176.31.251.192 attackspam
port scan and connect, tcp 22 (ssh)
2020-05-11 13:56:44
209.141.44.67 attackspam
$f2bV_matches
2020-05-11 13:30:57
118.25.46.60 attack
Invalid user upload from 118.25.46.60 port 40714
2020-05-11 13:38:44

Recently Reported IPs

98.42.227.223 197.232.14.186 8.42.160.113 122.249.20.49
5.125.155.153 183.90.196.234 112.20.98.130 165.227.41.91
55.31.83.22 40.65.76.90 135.103.147.127 71.213.66.229
3.14.254.187 175.134.211.102 62.47.210.143 52.241.142.153
75.125.105.213 93.92.182.184 88.242.86.164 121.210.171.78