Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kampala

Region: Central

Country: Uganda

Internet Service Provider: Airtel

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.228.252.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50854
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;154.228.252.242.		IN	A

;; AUTHORITY SECTION:
.			202	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022110701 1800 900 604800 86400

;; Query time: 185 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 08 17:52:11 CST 2022
;; MSG SIZE  rcvd: 108
Host info
242.252.228.154.in-addr.arpa domain name pointer 242-252-228-154.r.airtel.ug.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.252.228.154.in-addr.arpa	name = 242-252-228-154.r.airtel.ug.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.94.201.56 attack
SSH invalid-user multiple login attempts
2020-09-26 19:33:16
51.210.250.102 attackspam
Hammered multiple accounts simultaneously (128 times) driving up server load.
2020-09-26 19:21:49
118.89.231.121 attackbots
SSH Brute-Force attacks
2020-09-26 19:45:34
64.227.10.134 attackspam
Sep 26 11:39:52 localhost sshd\[25129\]: Invalid user user8 from 64.227.10.134
Sep 26 11:39:52 localhost sshd\[25129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.10.134
Sep 26 11:39:55 localhost sshd\[25129\]: Failed password for invalid user user8 from 64.227.10.134 port 32940 ssh2
Sep 26 11:41:45 localhost sshd\[25357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.10.134  user=root
Sep 26 11:41:47 localhost sshd\[25357\]: Failed password for root from 64.227.10.134 port 58026 ssh2
...
2020-09-26 19:12:36
34.70.66.188 attackbotsspam
Sep 26 08:43:07 icinga sshd[7496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.70.66.188 
Sep 26 08:43:09 icinga sshd[7496]: Failed password for invalid user bpoint from 34.70.66.188 port 39502 ssh2
Sep 26 08:57:37 icinga sshd[29911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.70.66.188 
...
2020-09-26 19:36:11
150.136.127.89 attackbotsspam
(sshd) Failed SSH login from 150.136.127.89 (US/United States/Virginia/Reston/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 26 06:02:11 atlas sshd[21669]: Invalid user dario from 150.136.127.89 port 57502
Sep 26 06:02:13 atlas sshd[21669]: Failed password for invalid user dario from 150.136.127.89 port 57502 ssh2
Sep 26 06:07:11 atlas sshd[22772]: Invalid user dis from 150.136.127.89 port 40449
Sep 26 06:07:13 atlas sshd[22772]: Failed password for invalid user dis from 150.136.127.89 port 40449 ssh2
Sep 26 06:11:00 atlas sshd[23465]: Invalid user firefart from 150.136.127.89 port 17961
2020-09-26 19:07:46
119.45.198.117 attack
Sep 26 08:23:11 staging sshd[105571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.198.117 
Sep 26 08:23:11 staging sshd[105571]: Invalid user upload from 119.45.198.117 port 53226
Sep 26 08:23:13 staging sshd[105571]: Failed password for invalid user upload from 119.45.198.117 port 53226 ssh2
Sep 26 08:28:08 staging sshd[105606]: Invalid user git from 119.45.198.117 port 48292
...
2020-09-26 19:28:45
112.133.207.66 attackbots
2020-09-25 UTC: (30x) - alpha,ana,bounce,chandra,eoffice,internet,iroda,login,openerp,phoenix,root(11x),sav,scanner,setup,steam,svn,toni,ubuntu,user1,vpn
2020-09-26 19:39:44
49.233.200.37 attackbotsspam
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-09-26 19:32:27
178.34.190.34 attackbots
2020-09-26T10:47:14.276110vps1033 sshd[19933]: Invalid user server from 178.34.190.34 port 23674
2020-09-26T10:47:14.280937vps1033 sshd[19933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.34.190.34
2020-09-26T10:47:14.276110vps1033 sshd[19933]: Invalid user server from 178.34.190.34 port 23674
2020-09-26T10:47:16.376272vps1033 sshd[19933]: Failed password for invalid user server from 178.34.190.34 port 23674 ssh2
2020-09-26T10:51:14.487088vps1033 sshd[28298]: Invalid user erick from 178.34.190.34 port 9729
...
2020-09-26 19:10:17
213.141.131.22 attack
2020-09-26T11:33:35+0200 Failed SSH Authentication/Brute Force Attack. (Server 4)
2020-09-26 19:07:12
5.15.114.149 attackspam
Automatic report - Port Scan Attack
2020-09-26 19:15:56
49.233.90.200 attackspam
Sep 26 11:47:15 h2646465 sshd[9327]: Invalid user lw from 49.233.90.200
Sep 26 11:47:15 h2646465 sshd[9327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.90.200
Sep 26 11:47:15 h2646465 sshd[9327]: Invalid user lw from 49.233.90.200
Sep 26 11:47:17 h2646465 sshd[9327]: Failed password for invalid user lw from 49.233.90.200 port 34974 ssh2
Sep 26 11:54:15 h2646465 sshd[10041]: Invalid user dell from 49.233.90.200
Sep 26 11:54:15 h2646465 sshd[10041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.90.200
Sep 26 11:54:15 h2646465 sshd[10041]: Invalid user dell from 49.233.90.200
Sep 26 11:54:17 h2646465 sshd[10041]: Failed password for invalid user dell from 49.233.90.200 port 53014 ssh2
Sep 26 12:01:48 h2646465 sshd[11660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.90.200  user=root
Sep 26 12:01:50 h2646465 sshd[11660]: Failed password for root from 49.233.90.200
2020-09-26 19:20:28
194.87.138.202 attack
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "ubnt" at 2020-09-26T11:15:08Z
2020-09-26 19:23:16
89.186.28.20 attack
Blocked by Sophos UTM Network Protection . /    / proto=17  .  srcport=64545  .  dstport=49976  .     (3505)
2020-09-26 19:34:55

Recently Reported IPs

164.68.98.62 47.166.72.33 240.126.234.57 81.132.181.89
138.209.144.254 78.27.103.159 124.79.164.22 211.84.193.31
214.183.63.103 150.194.139.39 103.109.56.134 15.210.94.244
189.6.235.179 52.158.169.203 14.212.94.107 244.4.105.84
168.188.55.135 237.61.245.41 98.136.240.234 252.133.45.166