Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: Afrihost (Pty) Ltd

Hostname: unknown

Organization: Afrihost

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspambots
Jul 10 21:06:19 tux-35-217 sshd\[24105\]: Invalid user ircd from 154.0.164.73 port 56422
Jul 10 21:06:19 tux-35-217 sshd\[24105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.0.164.73
Jul 10 21:06:21 tux-35-217 sshd\[24105\]: Failed password for invalid user ircd from 154.0.164.73 port 56422 ssh2
Jul 10 21:09:52 tux-35-217 sshd\[24118\]: Invalid user ftpu from 154.0.164.73 port 54772
Jul 10 21:09:52 tux-35-217 sshd\[24118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.0.164.73
...
2019-07-11 03:25:53
attackbotsspam
SSH brute force
2019-06-28 22:28:59
Comments on same subnet:
IP Type Details Datetime
154.0.164.181 attackspam
xmlrpc attack
2019-08-09 21:04:57
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.0.164.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21523
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;154.0.164.73.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060100 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 01 19:27:11 CST 2019
;; MSG SIZE  rcvd: 116

Host info
73.164.0.154.in-addr.arpa domain name pointer antonand.dedicated.co.za.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
73.164.0.154.in-addr.arpa	name = antonand.dedicated.co.za.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
45.119.82.251 attack
SSH Brute-Force reported by Fail2Ban
2020-02-11 22:43:58
49.233.183.155 attack
Feb 11 09:19:55 plusreed sshd[28901]: Invalid user jad from 49.233.183.155
...
2020-02-11 22:26:41
200.89.178.39 attackbotsspam
2020-02-11T06:48:43.258310-07:00 suse-nuc sshd[3008]: Invalid user ooj from 200.89.178.39 port 56536
...
2020-02-11 22:15:13
182.203.78.168 attackbots
Automatic report - Port Scan Attack
2020-02-11 22:15:35
49.88.112.112 attackbotsspam
February 11 2020, 14:22:14 [sshd] - Banned from the Cipher Host hosting platform by Fail2ban.
2020-02-11 22:33:58
222.186.31.83 attackspambots
Feb 11 14:57:53 MK-Soft-VM5 sshd[15350]: Failed password for root from 222.186.31.83 port 33262 ssh2
Feb 11 14:57:56 MK-Soft-VM5 sshd[15350]: Failed password for root from 222.186.31.83 port 33262 ssh2
...
2020-02-11 22:08:49
188.253.239.171 attackspam
Automatic report - XMLRPC Attack
2020-02-11 22:09:15
186.193.131.29 attack
Automatic report - Port Scan Attack
2020-02-11 22:27:52
189.213.37.201 attack
Automatic report - Port Scan Attack
2020-02-11 22:33:14
139.99.116.27 attack
Feb 11 07:49:01 nemesis sshd[23204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.116.27  user=r.r
Feb 11 07:49:03 nemesis sshd[23204]: Failed password for r.r from 139.99.116.27 port 41752 ssh2
Feb 11 07:49:03 nemesis sshd[23204]: Received disconnect from 139.99.116.27: 11: Bye Bye [preauth]
Feb 11 07:49:05 nemesis sshd[23208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.116.27  user=r.r
Feb 11 07:49:07 nemesis sshd[23208]: Failed password for r.r from 139.99.116.27 port 47514 ssh2
Feb 11 07:49:07 nemesis sshd[23208]: Received disconnect from 139.99.116.27: 11: Bye Bye [preauth]
Feb 11 07:49:08 nemesis sshd[23214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.116.27  user=r.r
Feb 11 07:49:11 nemesis sshd[23214]: Failed password for r.r from 139.99.116.27 port 52570 ssh2
Feb 11 07:49:11 nemesis sshd[23214]: Received disco........
-------------------------------
2020-02-11 22:14:57
62.234.83.50 attackspambots
$f2bV_matches
2020-02-11 22:41:55
45.76.49.215 attackspambots
RDP Bruteforce
2020-02-11 22:42:40
106.13.184.174 attackspambots
Feb 11 14:48:45  sshd\[28889\]: Invalid user vsk from 106.13.184.174Feb 11 14:48:48  sshd\[28889\]: Failed password for invalid user vsk from 106.13.184.174 port 45814 ssh2
...
2020-02-11 22:12:50
114.35.63.5 attack
Telnet/23 MH Probe, BF, Hack -
2020-02-11 22:37:55
115.55.29.68 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2020-02-11 22:32:02

Recently Reported IPs

98.42.227.223 197.232.14.186 8.42.160.113 122.249.20.49
5.125.155.153 183.90.196.234 112.20.98.130 165.227.41.91
55.31.83.22 40.65.76.90 135.103.147.127 71.213.66.229
3.14.254.187 175.134.211.102 62.47.210.143 52.241.142.153
75.125.105.213 93.92.182.184 88.242.86.164 121.210.171.78