Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kenya

Internet Service Provider: unknown

Hostname: unknown

Organization: CKL1-ASN

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.153.147.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59300
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;154.153.147.97.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061200 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 12 18:39:33 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 97.147.153.154.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 97.147.153.154.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
113.163.50.7 attack
Unauthorized connection attempt from IP address 113.163.50.7 on Port 445(SMB)
2020-06-05 02:54:44
187.57.157.3 attackbots
Unauthorized connection attempt from IP address 187.57.157.3 on Port 445(SMB)
2020-06-05 03:10:18
178.239.147.197 attack
Jun  4 13:57:39 mail.srvfarm.net postfix/smtps/smtpd[2499183]: warning: unknown[178.239.147.197]: SASL PLAIN authentication failed: 
Jun  4 13:57:40 mail.srvfarm.net postfix/smtps/smtpd[2499183]: lost connection after AUTH from unknown[178.239.147.197]
Jun  4 13:58:36 mail.srvfarm.net postfix/smtps/smtpd[2499186]: warning: unknown[178.239.147.197]: SASL PLAIN authentication failed: 
Jun  4 13:58:39 mail.srvfarm.net postfix/smtps/smtpd[2499186]: lost connection after AUTH from unknown[178.239.147.197]
Jun  4 14:01:35 mail.srvfarm.net postfix/smtpd[2504252]: warning: unknown[178.239.147.197]: SASL PLAIN authentication failed:
2020-06-05 02:47:08
138.204.74.42 attack
Icarus honeypot on github
2020-06-05 03:02:42
201.91.44.206 attackbots
Unauthorized connection attempt from IP address 201.91.44.206 on Port 445(SMB)
2020-06-05 02:44:31
212.12.17.254 attack
Unauthorized connection attempt from IP address 212.12.17.254 on Port 445(SMB)
2020-06-05 03:06:39
128.199.141.33 attackbotsspam
5x Failed Password
2020-06-05 03:08:58
186.38.79.53 attackbotsspam
Jun  4 13:39:34 mail.srvfarm.net postfix/smtps/smtpd[2499183]: warning: unknown[186.38.79.53]: SASL PLAIN authentication failed: 
Jun  4 13:39:35 mail.srvfarm.net postfix/smtps/smtpd[2499183]: lost connection after AUTH from unknown[186.38.79.53]
Jun  4 13:43:29 mail.srvfarm.net postfix/smtps/smtpd[2499183]: warning: unknown[186.38.79.53]: SASL PLAIN authentication failed: 
Jun  4 13:43:30 mail.srvfarm.net postfix/smtps/smtpd[2499183]: lost connection after AUTH from unknown[186.38.79.53]
Jun  4 13:44:20 mail.srvfarm.net postfix/smtps/smtpd[2499237]: warning: unknown[186.38.79.53]: SASL PLAIN authentication failed:
2020-06-05 03:22:41
180.120.214.36 attackspambots
smtp brute force login
2020-06-05 03:05:01
194.33.45.101 attackspam
Bad crawling causing excessive 404 errors
2020-06-05 03:04:46
201.40.244.146 attackspambots
Jun  4 15:01:06 melroy-server sshd[28237]: Failed password for root from 201.40.244.146 port 60568 ssh2
...
2020-06-05 02:48:46
193.169.212.65 attackspam
SpamScore above: 10.0
2020-06-05 02:59:17
64.225.107.31 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 62 - port: 5038 proto: TCP cat: Misc Attack
2020-06-05 03:09:53
106.13.27.156 attackbotsspam
Jun  4 14:22:08 ny01 sshd[20893]: Failed password for root from 106.13.27.156 port 43728 ssh2
Jun  4 14:25:36 ny01 sshd[21664]: Failed password for root from 106.13.27.156 port 37848 ssh2
2020-06-05 02:39:58
119.96.171.162 attackbots
Jun  4 20:33:46 home sshd[19439]: Failed password for root from 119.96.171.162 port 36104 ssh2
Jun  4 20:36:29 home sshd[19703]: Failed password for root from 119.96.171.162 port 36428 ssh2
...
2020-06-05 02:54:13

Recently Reported IPs

37.210.63.142 104.68.228.106 209.39.42.150 59.150.34.42
51.223.159.66 103.35.74.59 163.183.44.106 92.102.196.160
89.33.195.46 32.23.72.34 115.123.167.22 47.114.47.52
35.198.139.238 177.68.84.82 192.99.222.137 177.73.6.154
137.170.84.163 154.70.94.69 63.203.137.73 67.162.167.254