Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nairobi

Region: Nairobi

Country: Kenya

Internet Service Provider: Airtel

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '154.159.0.0 - 154.159.255.255'

% No abuse contact registered for 154.159.0.0 - 154.159.255.255

inetnum:        154.159.0.0 - 154.159.255.255
netname:        Mobile_Data_3G_LTE_8
descr:          Mobile Data 3G_LTE Block 8
country:        KE
admin-c:        PH3-AFRINIC
tech-c:         PM14-AFRINIC
status:         ASSIGNED PA
mnt-by:         AIRTEL-KE
source:         AFRINIC # Filtered
parent:         154.152.0.0 - 154.159.255.255

person:         Partner Helpdesk
address:        P. O. Box 73146, 00200
address:        Parkside Towers, Mombasa Road
address:        NAIROBI,  KENYA
phone:          tel:+254-734-110000
nic-hdl:        PH3-AFRINIC
mnt-by:         GENERATED-LUYS1HXX5VHYGXETR1UHSK3QB8GBM3RG-MNT
source:         AFRINIC # Filtered

person:         Patrick Muiruri
address:        P. O. Box 73146, 00200
address:        Parkside Towers, Mombasa Road
address:        NAIROBI,  KENYA
phone:          tel:+254-733-332172
phone:          tel:+254-734-110044
nic-hdl:        PM14-AFRINIC
mnt-by:         GENERATED-HEVJSMGQFVLP9VYX5ENQHVXKELSSM7QW-MNT
source:         AFRINIC # Filtered

% Information related to '154.159.246.0/24AS36926'

route:          154.159.246.0/24
descr:          Airtel KE Mobile & Fixed Internet
origin:         AS36926
mnt-by:         AIRTEL-KE
source:         AFRINIC # Filtered
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.159.246.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36755
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;154.159.246.244.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040600 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 06 18:01:40 CST 2026
;; MSG SIZE  rcvd: 108
Host info
244.246.159.154.in-addr.arpa domain name pointer 244-246-159-154.r.airtelkenya.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
244.246.159.154.in-addr.arpa	name = 244-246-159-154.r.airtelkenya.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
150.109.229.30 attackspambots
Unauthorized connection attempt detected from IP address 150.109.229.30 to port 36
2020-07-11 18:45:17
194.180.224.134 attackbots
Unauthorized connection attempt detected from IP address 194.180.224.134 to port 22
2020-07-11 18:43:07
15.236.64.81 attackbotsspam
20/7/10@23:50:05: FAIL: Alarm-Telnet address from=15.236.64.81
...
2020-07-11 18:30:35
94.102.51.31 attackbotsspam
Jul 11 12:52:28 debian-2gb-nbg1-2 kernel: \[16723333.250374\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.51.31 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=60453 PROTO=TCP SPT=45288 DPT=24664 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-11 19:00:15
54.38.81.231 attackbots
$f2bV_matches
2020-07-11 18:25:51
183.11.237.53 attack
Jul 11 01:49:29 Tower sshd[18019]: Connection from 183.11.237.53 port 25414 on 192.168.10.220 port 22 rdomain ""
Jul 11 01:49:31 Tower sshd[18019]: Invalid user yonghee from 183.11.237.53 port 25414
Jul 11 01:49:31 Tower sshd[18019]: error: Could not get shadow information for NOUSER
Jul 11 01:49:31 Tower sshd[18019]: Failed password for invalid user yonghee from 183.11.237.53 port 25414 ssh2
Jul 11 01:49:31 Tower sshd[18019]: Received disconnect from 183.11.237.53 port 25414:11: Bye Bye [preauth]
Jul 11 01:49:31 Tower sshd[18019]: Disconnected from invalid user yonghee 183.11.237.53 port 25414 [preauth]
2020-07-11 18:51:21
167.71.218.149 attackspam
ENG,DEF GET /wp-login.php
2020-07-11 18:29:00
129.150.72.6 attack
Unauthorized connection attempt detected from IP address 129.150.72.6 to port 6443
2020-07-11 18:25:29
187.1.55.18 attackspam
$f2bV_matches
2020-07-11 18:48:24
204.110.52.105 attackbotsspam
/login/?login_only=1
No UA
2020-07-11 18:54:34
194.26.29.32 attack
Jul 11 12:35:20 debian-2gb-nbg1-2 kernel: \[16722304.891935\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.32 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=45094 PROTO=TCP SPT=59659 DPT=3875 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-11 18:41:04
161.189.140.115 attackbotsspam
Jul 11 08:51:47 rancher-0 sshd[247964]: Invalid user test from 161.189.140.115 port 53554
Jul 11 08:51:48 rancher-0 sshd[247964]: Failed password for invalid user test from 161.189.140.115 port 53554 ssh2
...
2020-07-11 19:01:21
78.110.50.131 attackbotsspam
chaangnoifulda.de 78.110.50.131 [11/Jul/2020:05:49:29 +0200] "POST /wp-login.php HTTP/1.1" 200 6006 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
chaangnoifulda.de 78.110.50.131 [11/Jul/2020:05:49:29 +0200] "POST /wp-login.php HTTP/1.1" 200 5963 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-11 18:52:44
37.32.41.221 attackspambots
Automatic report - Port Scan Attack
2020-07-11 18:49:32
106.54.205.236 attackspam
Jul 11 12:16:16 server sshd[8241]: Failed password for invalid user web from 106.54.205.236 port 40766 ssh2
Jul 11 12:18:16 server sshd[10321]: Failed password for invalid user eleanor from 106.54.205.236 port 36508 ssh2
Jul 11 12:20:27 server sshd[12855]: Failed password for invalid user feng from 106.54.205.236 port 60502 ssh2
2020-07-11 18:41:33

Recently Reported IPs

35.236.242.155 3.6.34.235 77.237.236.95 19.82.98.56
8.212.164.106 183.74.53.142 112.124.52.14 121.43.118.248
120.137.205.50 249.138.116.28 34.79.216.126 109.105.210.62
35.189.255.7 144.91.127.12 109.105.210.63 20.199.97.195
24.155.33.136 111.55.74.138 124.197.50.183 34.94.255.248