Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kenya

Internet Service Provider: Airtel

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.157.212.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15189
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;154.157.212.59.			IN	A

;; AUTHORITY SECTION:
.			129	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090901 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 10 08:15:36 CST 2020
;; MSG SIZE  rcvd: 118
Host info
59.212.157.154.in-addr.arpa domain name pointer 59-212-157-154.r.airtelkenya.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
59.212.157.154.in-addr.arpa	name = 59-212-157-154.r.airtelkenya.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
87.101.72.81 attackbots
Jun 22 15:03:16 eventyay sshd[23536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.101.72.81
Jun 22 15:03:18 eventyay sshd[23536]: Failed password for invalid user rsync from 87.101.72.81 port 50203 ssh2
Jun 22 15:07:56 eventyay sshd[23686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.101.72.81
...
2020-06-23 03:11:49
94.153.35.42 attackbotsspam
SSH Brute-Forcing (server2)
2020-06-23 03:01:15
159.192.143.249 attackspam
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-06-23 03:18:35
106.12.222.60 attackspambots
Jun 22 13:49:54 sip sshd[17013]: Failed password for root from 106.12.222.60 port 35870 ssh2
Jun 22 14:02:03 sip sshd[21523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.222.60
Jun 22 14:02:04 sip sshd[21523]: Failed password for invalid user joy from 106.12.222.60 port 39936 ssh2
2020-06-23 02:47:29
106.52.135.166 attack
Jun 22 17:48:53 inter-technics sshd[9109]: Invalid user michael from 106.52.135.166 port 48242
Jun 22 17:48:53 inter-technics sshd[9109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.135.166
Jun 22 17:48:53 inter-technics sshd[9109]: Invalid user michael from 106.52.135.166 port 48242
Jun 22 17:48:54 inter-technics sshd[9109]: Failed password for invalid user michael from 106.52.135.166 port 48242 ssh2
Jun 22 17:50:17 inter-technics sshd[9217]: Invalid user ocp from 106.52.135.166 port 34286
...
2020-06-23 02:55:59
115.79.7.153 attackspam
Unauthorized connection attempt from IP address 115.79.7.153 on Port 445(SMB)
2020-06-23 02:59:29
81.215.204.24 attack
Automatic report - Port Scan Attack
2020-06-23 03:21:58
103.81.115.71 attackspam
Unauthorized connection attempt detected from IP address 103.81.115.71 to port 445
2020-06-23 02:56:31
129.213.150.225 attackspam
Tried to find non-existing directory/file on the server
2020-06-23 03:03:36
106.12.77.32 attackbots
2020-06-22T19:33:10.784929+02:00  sshd[7968]: Failed password for root from 106.12.77.32 port 33464 ssh2
2020-06-23 02:46:34
111.229.68.113 attack
Jun 21 00:42:49 mail sshd[18374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.68.113 
Jun 21 00:42:51 mail sshd[18374]: Failed password for invalid user wetserver from 111.229.68.113 port 59772 ssh2
...
2020-06-23 03:11:16
202.38.183.150 attackbots
Unauthorized connection attempt from IP address 202.38.183.150 on Port 445(SMB)
2020-06-23 03:16:25
61.1.99.203 attackspambots
Unauthorized connection attempt from IP address 61.1.99.203 on Port 445(SMB)
2020-06-23 03:02:04
61.246.37.240 attackbotsspam
Honeypot attack, port: 445, PTR: abts-north-static-240.37.246.61.airtelbroadband.in.
2020-06-23 02:46:57
14.232.243.10 attackspambots
Brute-force attempt banned
2020-06-23 03:10:37

Recently Reported IPs

80.248.119.78 49.151.178.229 64.101.213.35 251.252.87.80
220.195.194.111 2.149.69.5 213.198.130.188 165.235.74.90
195.181.161.7 175.32.242.36 172.221.52.21 34.224.87.134
172.84.211.161 192.99.11.177 118.206.6.14 27.65.232.107
27.155.46.224 2.222.183.106 167.248.59.137 115.132.114.221