Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Uganda

Internet Service Provider: unknown

Hostname: unknown

Organization: ZAINUGAS

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.229.83.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59255
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;154.229.83.201.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070302 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jul 04 02:00:31 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 201.83.229.154.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 201.83.229.154.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.51.8.104 attack
Jun  3 06:56:05 debian kernel: [59130.575294] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=49.51.8.104 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=54321 PROTO=TCP SPT=34919 DPT=9002 WINDOW=65535 RES=0x00 SYN URGP=0
2020-06-03 14:28:45
194.26.29.116 attackspam
06/03/2020-01:27:49.345936 194.26.29.116 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-03 14:39:21
96.127.179.156 attackspambots
Jun  3 06:27:29 nas sshd[31983]: Failed password for root from 96.127.179.156 port 55128 ssh2
Jun  3 06:31:55 nas sshd[32244]: Failed password for root from 96.127.179.156 port 42420 ssh2
...
2020-06-03 14:28:23
115.29.246.243 attackspam
Jun  3 12:29:46 webhost01 sshd[1959]: Failed password for root from 115.29.246.243 port 49272 ssh2
...
2020-06-03 14:28:11
184.70.244.67 attackbots
2020-06-03T06:56:09.612961+02:00  sshd[8432]: Failed password for root from 184.70.244.67 port 57212 ssh2
2020-06-03 14:24:39
120.253.11.135 attackspambots
Jun  3 06:22:29 vps687878 sshd\[10178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.253.11.135  user=root
Jun  3 06:22:31 vps687878 sshd\[10178\]: Failed password for root from 120.253.11.135 port 49932 ssh2
Jun  3 06:26:09 vps687878 sshd\[11032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.253.11.135  user=root
Jun  3 06:26:10 vps687878 sshd\[11032\]: Failed password for root from 120.253.11.135 port 14245 ssh2
Jun  3 06:30:08 vps687878 sshd\[11666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.253.11.135  user=root
...
2020-06-03 14:46:09
101.87.120.13 attackspambots
Port probing on unauthorized port 445
2020-06-03 14:22:58
141.98.81.84 attackspam
Jun  3 08:16:29 ucs sshd\[26030\]: Invalid user admin from 141.98.81.84 port 42789
Jun  3 08:16:50 ucs sshd\[2585\]: Invalid user Admin from 141.98.81.84 port 46255
Jun  3 08:17:42 ucs sshd\[2792\]: Invalid user admin from 141.98.81.84 port 42063
...
2020-06-03 14:19:58
200.54.51.124 attack
Jun  3 05:42:57 roki-contabo sshd\[7819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.54.51.124  user=root
Jun  3 05:42:59 roki-contabo sshd\[7819\]: Failed password for root from 200.54.51.124 port 60364 ssh2
Jun  3 05:53:19 roki-contabo sshd\[7925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.54.51.124  user=root
Jun  3 05:53:21 roki-contabo sshd\[7925\]: Failed password for root from 200.54.51.124 port 36540 ssh2
Jun  3 05:55:50 roki-contabo sshd\[7933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.54.51.124  user=root
...
2020-06-03 14:36:58
222.186.180.41 attackbotsspam
Jun  3 08:39:22 melroy-server sshd[19336]: Failed password for root from 222.186.180.41 port 21948 ssh2
Jun  3 08:39:25 melroy-server sshd[19336]: Failed password for root from 222.186.180.41 port 21948 ssh2
...
2020-06-03 14:40:33
178.154.200.176 attackbots
[Wed Jun 03 10:55:49.008779 2020] [:error] [pid 11958:tid 140348133574400] [client 178.154.200.176:40704] [client 178.154.200.176] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "XtcfRRwRYQSwlDKZy31rEAAAAe8"]
...
2020-06-03 14:38:27
134.209.186.27 attackbotsspam
(sshd) Failed SSH login from 134.209.186.27 (GB/United Kingdom/london.scsvoice.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun  3 09:25:49 srv sshd[17017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.186.27  user=root
Jun  3 09:25:51 srv sshd[17017]: Failed password for root from 134.209.186.27 port 60828 ssh2
Jun  3 09:36:27 srv sshd[17144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.186.27  user=root
Jun  3 09:36:30 srv sshd[17144]: Failed password for root from 134.209.186.27 port 45078 ssh2
Jun  3 09:41:41 srv sshd[17218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.186.27  user=root
2020-06-03 14:54:16
150.109.120.253 attackbots
Bruteforce detected by fail2ban
2020-06-03 14:22:40
37.232.191.183 attackspambots
" "
2020-06-03 14:40:53
193.70.112.6 attackbotsspam
3x Failed Password
2020-06-03 14:30:28

Recently Reported IPs

141.50.45.14 140.246.136.238 157.119.28.25 102.165.42.84
23.226.181.18 89.38.145.79 58.61.38.85 45.171.46.150
1.25.153.97 32.194.110.166 41.236.226.31 201.207.149.226
155.217.8.33 182.93.89.100 125.166.112.3 68.62.248.154
70.40.221.225 191.206.117.1 157.55.39.136 188.47.168.187