Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: Afrihost (Pty) Ltd

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 07:54:44,872 INFO [amun_request_handler] PortScan Detected on Port: 445 (154.0.173.85)
2019-07-08 23:34:05
attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 01:22:49,651 INFO [shellcode_manager] (154.0.173.85) no match, writing hexdump (ea84f5d4a40f6b9ddd7a7981d52afdec :2098627) - MS17010 (EternalBlue)
2019-06-27 02:01:39
Comments on same subnet:
IP Type Details Datetime
154.0.173.95 attack
Automatic report - Banned IP Access
2020-10-14 05:55:17
154.0.173.83 attackbots
CMS (WordPress or Joomla) login attempt.
2020-10-06 03:05:40
154.0.173.83 attackspam
CMS (WordPress or Joomla) login attempt.
2020-10-05 18:56:44
154.0.173.83 attack
154.0.173.83 - - [07/Sep/2020:07:15:30 +0100] "POST /wp-login.php HTTP/1.1" 200 1877 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
154.0.173.83 - - [07/Sep/2020:07:15:48 +0100] "POST /wp-login.php HTTP/1.1" 200 1858 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
154.0.173.83 - - [07/Sep/2020:07:15:54 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-07 16:48:58
154.0.173.95 attack
154.0.173.95 - - [31/Aug/2020:19:30:46 +0100] "POST /wp-login.php HTTP/1.1" 200 2254 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
154.0.173.95 - - [31/Aug/2020:19:31:04 +0100] "POST /wp-login.php HTTP/1.1" 200 2204 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
154.0.173.95 - - [31/Aug/2020:19:31:23 +0100] "POST /wp-login.php HTTP/1.1" 200 2259 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-01 03:48:55
154.0.173.16 attackspam
C1,WP GET /suche/wp-login.php
2020-07-29 19:29:22
154.0.173.66 attackbots
Wordpress attack
2020-07-14 14:20:35
154.0.173.66 attack
Automatic report - XMLRPC Attack
2020-06-26 22:29:53
154.0.173.141 attackspam
154.0.173.141 - - [04/Feb/2020:22:00:10 +0000] "POST /wp-login.php HTTP/1.1" 200 6409 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
154.0.173.141 - - [04/Feb/2020:22:00:12 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-02-05 07:01:59
154.0.173.166 attack
Unauthorized connection attempt from IP address 154.0.173.166 on Port 3389(RDP)
2019-12-27 07:45:05
154.0.173.166 attack
Unauthorized connection attempt from IP address 154.0.173.166 on Port 3389(RDP)
2019-12-25 03:15:41
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.0.173.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30812
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;154.0.173.85.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050600 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon May 06 18:00:55 +08 2019
;; MSG SIZE  rcvd: 116

Host info
85.173.0.154.in-addr.arpa domain name pointer snpmaonnoika.hosted.co.za.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
85.173.0.154.in-addr.arpa	name = snpmaonnoika.hosted.co.za.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
222.186.190.2 attackspam
Failed password for invalid user from 222.186.190.2 port 4030 ssh2
2020-09-12 05:16:10
103.99.201.99 attack
Port Scan
...
2020-09-12 04:47:31
118.244.128.4 attack
Sep 11 22:26:22 sshgateway sshd\[23515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.244.128.4  user=root
Sep 11 22:26:25 sshgateway sshd\[23515\]: Failed password for root from 118.244.128.4 port 23999 ssh2
Sep 11 22:28:15 sshgateway sshd\[23757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.244.128.4  user=root
2020-09-12 05:23:58
210.22.78.74 attack
Sep 11 21:04:44 minden010 sshd[8884]: Failed password for root from 210.22.78.74 port 56768 ssh2
Sep 11 21:07:08 minden010 sshd[9865]: Failed password for root from 210.22.78.74 port 51392 ssh2
...
2020-09-12 04:45:43
5.188.62.14 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-11T19:26:08Z and 2020-09-11T19:59:18Z
2020-09-12 05:19:00
116.108.187.49 attackbotsspam
Automatic report - Port Scan Attack
2020-09-12 04:44:32
178.128.226.2 attack
Port scan: Attack repeated for 24 hours
2020-09-12 05:02:23
219.84.10.238 attack
IP 219.84.10.238 attacked honeypot on port: 1433 at 9/11/2020 9:57:43 AM
2020-09-12 05:10:13
106.52.12.21 attackspam
Sep 11 18:50:31 sshgateway sshd\[26820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.12.21  user=root
Sep 11 18:50:33 sshgateway sshd\[26820\]: Failed password for root from 106.52.12.21 port 39682 ssh2
Sep 11 18:57:51 sshgateway sshd\[27879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.12.21  user=root
2020-09-12 05:15:16
60.191.230.173 attackspambots
Unauthorised access (Sep 11) SRC=60.191.230.173 LEN=52 TTL=114 ID=4467 DF TCP DPT=445 WINDOW=8192 SYN
2020-09-12 05:07:41
61.177.172.54 attack
Sep 11 22:41:54 router sshd[31350]: Failed password for root from 61.177.172.54 port 47055 ssh2
Sep 11 22:41:57 router sshd[31350]: Failed password for root from 61.177.172.54 port 47055 ssh2
Sep 11 22:42:01 router sshd[31350]: Failed password for root from 61.177.172.54 port 47055 ssh2
Sep 11 22:42:05 router sshd[31350]: Failed password for root from 61.177.172.54 port 47055 ssh2
...
2020-09-12 04:48:32
191.217.170.33 attack
Sep 11 21:35:59 ns3164893 sshd[598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.217.170.33  user=root
Sep 11 21:36:01 ns3164893 sshd[598]: Failed password for root from 191.217.170.33 port 51731 ssh2
...
2020-09-12 05:24:33
124.193.224.11 attackbotsspam
$f2bV_matches
2020-09-12 05:06:40
164.132.103.232 attackbotsspam
Sep 11 22:25:29 rancher-0 sshd[1540350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.103.232  user=root
Sep 11 22:25:31 rancher-0 sshd[1540350]: Failed password for root from 164.132.103.232 port 53776 ssh2
...
2020-09-12 05:03:13
91.232.4.149 attackspambots
ssh brute force
2020-09-12 05:22:49

Recently Reported IPs

88.202.190.137 103.54.93.98 200.229.156.144 82.212.77.34
173.249.49.34 41.200.36.113 96.233.79.179 44.51.241.167
182.93.231.57 101.99.12.205 66.227.85.158 173.44.41.234
185.244.25.232 124.123.59.16 108.167.74.91 51.252.196.15
199.111.128.147 141.98.81.90 110.98.146.191 151.38.99.18