Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.200.83.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40444
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;154.200.83.145.			IN	A

;; AUTHORITY SECTION:
.			294	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020080604 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Aug 07 08:34:30 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 145.83.200.154.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.83.200.154.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
107.180.120.68 attackspambots
Automatic report - XMLRPC Attack
2020-02-23 02:06:44
49.234.6.105 attackspam
Feb 22 17:43:10 srv-ubuntu-dev3 sshd[88697]: Invalid user qdgw from 49.234.6.105
Feb 22 17:43:10 srv-ubuntu-dev3 sshd[88697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.6.105
Feb 22 17:43:10 srv-ubuntu-dev3 sshd[88697]: Invalid user qdgw from 49.234.6.105
Feb 22 17:43:11 srv-ubuntu-dev3 sshd[88697]: Failed password for invalid user qdgw from 49.234.6.105 port 40348 ssh2
Feb 22 17:46:41 srv-ubuntu-dev3 sshd[88950]: Invalid user cpanelrrdtool from 49.234.6.105
Feb 22 17:46:41 srv-ubuntu-dev3 sshd[88950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.6.105
Feb 22 17:46:41 srv-ubuntu-dev3 sshd[88950]: Invalid user cpanelrrdtool from 49.234.6.105
Feb 22 17:46:43 srv-ubuntu-dev3 sshd[88950]: Failed password for invalid user cpanelrrdtool from 49.234.6.105 port 35312 ssh2
Feb 22 17:50:05 srv-ubuntu-dev3 sshd[89192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh rus
...
2020-02-23 01:58:15
173.201.196.203 attackspam
Automatic report - XMLRPC Attack
2020-02-23 02:26:29
74.208.235.29 attackbotsspam
Feb 22 18:32:10 lnxded64 sshd[7344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.235.29
2020-02-23 02:11:00
182.61.26.157 attackspam
suspicious action Sat, 22 Feb 2020 13:49:39 -0300
2020-02-23 02:25:05
118.178.186.214 attackspam
firewall-block, port(s): 1433/tcp
2020-02-23 01:56:44
122.51.75.72 attack
Port scan detected on ports: 1433[TCP], 1433[TCP], 65529[TCP]
2020-02-23 02:18:20
141.98.10.137 attackspam
Feb 22 18:39:07 srv01 postfix/smtpd\[22549\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 22 18:43:35 srv01 postfix/smtpd\[3024\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 22 18:46:24 srv01 postfix/smtpd\[3024\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 22 18:47:00 srv01 postfix/smtpd\[3024\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 22 18:55:17 srv01 postfix/smtpd\[22549\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-02-23 01:58:44
203.109.118.116 attack
suspicious action Sat, 22 Feb 2020 13:49:49 -0300
2020-02-23 02:17:03
185.202.1.240 attack
Fail2Ban - SSH Bruteforce Attempt
2020-02-23 02:08:17
85.186.63.251 attackbots
Automatic report - Port Scan Attack
2020-02-23 01:57:08
54.169.175.115 attack
Automatic report - XMLRPC Attack
2020-02-23 01:55:43
185.52.24.245 attackspambots
Automatic report - XMLRPC Attack
2020-02-23 01:52:46
64.225.41.232 attackbotsspam
Feb 22 18:34:31 MK-Soft-VM5 sshd[7574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.41.232 
Feb 22 18:34:33 MK-Soft-VM5 sshd[7574]: Failed password for invalid user musikbot from 64.225.41.232 port 34738 ssh2
...
2020-02-23 02:19:17
104.206.128.54 attackspambots
02/22/2020-12:36:41.923766 104.206.128.54 Protocol: 6 ET SCAN Suspicious inbound to mySQL port 3306
2020-02-23 01:59:15

Recently Reported IPs

123.12.193.27 79.13.195.233 63.9.77.126 212.184.172.1
124.181.7.33 219.162.29.168 24.16.194.218 3.84.233.27
196.7.104.70 213.88.145.74 42.98.33.180 34.232.213.237
122.211.189.42 182.113.165.2 188.72.137.92 147.192.110.26
12.135.198.231 201.43.91.73 97.86.182.105 66.69.135.157