Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kenya

Internet Service Provider: Airtel

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.155.0.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64492
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;154.155.0.54.			IN	A

;; AUTHORITY SECTION:
.			373	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032601 1800 900 604800 86400

;; Query time: 94 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 27 06:55:50 CST 2020
;; MSG SIZE  rcvd: 116
Host info
54.0.155.154.in-addr.arpa domain name pointer 54-0-155-154.mbroadband.r.airtelkenya.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.0.155.154.in-addr.arpa	name = 54-0-155-154.mbroadband.r.airtelkenya.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
186.251.180.236 attack
Automatic report - Port Scan Attack
2020-09-26 14:29:24
78.128.113.121 attack
Sep 26 07:41:03 mail.srvfarm.net postfix/smtpd[356792]: warning: unknown[78.128.113.121]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 26 07:41:03 mail.srvfarm.net postfix/smtpd[356792]: lost connection after AUTH from unknown[78.128.113.121]
Sep 26 07:41:08 mail.srvfarm.net postfix/smtpd[356809]: lost connection after AUTH from unknown[78.128.113.121]
Sep 26 07:41:12 mail.srvfarm.net postfix/smtpd[357084]: lost connection after AUTH from unknown[78.128.113.121]
Sep 26 07:41:17 mail.srvfarm.net postfix/smtpd[357083]: lost connection after AUTH from unknown[78.128.113.121]
2020-09-26 14:09:07
81.70.39.239 attackbotsspam
(sshd) Failed SSH login from 81.70.39.239 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 26 00:58:44 server sshd[922]: Invalid user leo from 81.70.39.239 port 51168
Sep 26 00:58:46 server sshd[922]: Failed password for invalid user leo from 81.70.39.239 port 51168 ssh2
Sep 26 01:10:51 server sshd[4185]: Invalid user user from 81.70.39.239 port 49594
Sep 26 01:10:53 server sshd[4185]: Failed password for invalid user user from 81.70.39.239 port 49594 ssh2
Sep 26 01:16:00 server sshd[5532]: Invalid user test from 81.70.39.239 port 44532
2020-09-26 14:18:39
1.10.143.75 attackspambots
2020-08-25T22:47:09.826504suse-nuc sshd[32420]: Invalid user daisy from 1.10.143.75 port 49432
...
2020-09-26 13:59:31
80.82.77.227 attackspambots
 TCP (SYN) 80.82.77.227:59220 -> port 49152, len 44
2020-09-26 14:06:48
20.193.64.26 attack
Sep 26 06:08:58 localhost sshd\[4457\]: Invalid user admin from 20.193.64.26 port 43910
Sep 26 06:08:58 localhost sshd\[4457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.64.26
Sep 26 06:08:59 localhost sshd\[4457\]: Failed password for invalid user admin from 20.193.64.26 port 43910 ssh2
...
2020-09-26 14:10:09
106.2.45.15 attackspambots
1433/tcp 1433/tcp 1433/tcp...
[2020-08-27/09-25]4pkt,1pt.(tcp)
2020-09-26 13:46:07
1.162.229.75 attackspam
2020-08-22T12:03:12.574478suse-nuc sshd[30352]: User root from 1.162.229.75 not allowed because listed in DenyUsers
...
2020-09-26 13:48:29
1.1.192.221 attackspam
2020-09-14T21:17:26.139038suse-nuc sshd[19525]: Invalid user admin1 from 1.1.192.221 port 49686
...
2020-09-26 14:04:27
218.92.0.250 attack
(sshd) Failed SSH login from 218.92.0.250 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 26 02:22:09 optimus sshd[29157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.250  user=root
Sep 26 02:22:09 optimus sshd[29162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.250  user=root
Sep 26 02:22:10 optimus sshd[29159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.250  user=root
Sep 26 02:22:12 optimus sshd[29157]: Failed password for root from 218.92.0.250 port 42882 ssh2
Sep 26 02:22:12 optimus sshd[29162]: Failed password for root from 218.92.0.250 port 40459 ssh2
2020-09-26 14:26:48
1.10.177.202 attackbotsspam
2019-10-14T17:34:50.405060suse-nuc sshd[28654]: Invalid user omu from 1.10.177.202 port 10044
...
2020-09-26 13:59:06
46.37.188.139 attack
$f2bV_matches
2020-09-26 14:07:37
20.55.4.26 attack
Sep 26 05:33:50 scw-focused-cartwright sshd[13887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.55.4.26
Sep 26 05:33:52 scw-focused-cartwright sshd[13887]: Failed password for invalid user admin from 20.55.4.26 port 11737 ssh2
2020-09-26 13:47:31
54.37.19.185 attackbotsspam
Automatic report - Banned IP Access
2020-09-26 14:07:15
52.172.220.153 attackbotsspam
Sep 26 07:54:57 fhem-rasp sshd[23536]: Failed password for root from 52.172.220.153 port 56429 ssh2
Sep 26 07:54:57 fhem-rasp sshd[23536]: Disconnected from authenticating user root 52.172.220.153 port 56429 [preauth]
...
2020-09-26 14:06:05

Recently Reported IPs

124.155.119.10 169.38.76.21 132.232.68.76 96.60.190.116
179.76.215.189 64.254.30.54 54.181.131.59 61.141.95.245
192.151.150.107 32.191.53.97 122.144.208.228 106.12.186.121
39.12.76.21 46.44.221.96 1.148.253.254 177.226.250.184
46.101.94.224 93.202.120.219 109.14.86.38 108.31.242.166