Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kenya

Internet Service Provider: Airtel Networks Kenya Limited

Hostname: unknown

Organization: unknown

Usage Type: Mobile ISP

Comments:
Type Details Datetime
attack
TCP Port: 25 _    invalid blocked abuseat-org zen-spamhaus _  _  _ _ (229)
2019-07-22 11:21:18
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.155.108.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15965
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;154.155.108.48.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072101 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 22 11:21:09 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 48.108.155.154.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 48.108.155.154.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
89.244.191.159 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-09-13 19:35:51
162.142.125.34 attackspambots
SSH Bruteforce Attempt on Honeypot
2020-09-13 19:34:49
159.89.171.81 attackspam
Failed password for invalid user test from 159.89.171.81 port 44874 ssh2
2020-09-13 19:19:34
195.54.167.174 attack
 TCP (SYN) 195.54.167.174:58569 -> port 20392, len 44
2020-09-13 19:48:25
179.70.250.117 attack
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-12T16:48:33Z
2020-09-13 19:56:47
109.125.176.135 attackbotsspam
IP 109.125.176.135 attacked honeypot on port: 8080 at 9/12/2020 9:48:46 AM
2020-09-13 19:36:33
51.91.109.220 attack
Sep 13 10:42:17 jumpserver sshd[47162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.109.220  user=root
Sep 13 10:42:19 jumpserver sshd[47162]: Failed password for root from 51.91.109.220 port 51602 ssh2
Sep 13 10:46:13 jumpserver sshd[47368]: Invalid user zhou from 51.91.109.220 port 32946
...
2020-09-13 19:28:08
165.22.121.56 attack
2020-09-13T08:21:11.357021centos sshd[16270]: Failed password for invalid user yoyo from 165.22.121.56 port 59474 ssh2
2020-09-13T08:24:15.725551centos sshd[16453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.121.56  user=root
2020-09-13T08:24:17.508019centos sshd[16453]: Failed password for root from 165.22.121.56 port 51052 ssh2
...
2020-09-13 19:37:26
201.13.108.53 attackbotsspam
DATE:2020-09-12 18:48:32, IP:201.13.108.53, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-09-13 19:57:17
115.98.48.169 attackbots
Icarus honeypot on github
2020-09-13 19:44:15
69.174.91.32 attackbots
fell into ViewStateTrap:paris
2020-09-13 19:47:03
45.148.121.3 attackspambots
firewall-block, port(s): 5060/udp
2020-09-13 19:35:14
51.79.86.173 attack
SSH auth scanning - multiple failed logins
2020-09-13 19:26:48
103.82.80.32 attackbotsspam
Port Scan: TCP/443
2020-09-13 19:51:22
102.165.30.41 attackbots
SIP/5060 Probe, BF, Hack -
2020-09-13 19:50:16

Recently Reported IPs

162.210.196.97 200.116.198.136 154.72.78.190 91.221.176.13
87.109.252.56 27.72.165.83 82.200.99.150 107.219.123.167
182.61.166.11 146.0.87.85 132.145.204.58 81.14.209.234
5.202.93.155 41.41.14.210 185.171.233.141 131.221.185.114
114.47.168.140 95.38.79.52 103.92.153.69 177.130.9.212