Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.151.144.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48830
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.151.144.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 07:23:07 CST 2025
;; MSG SIZE  rcvd: 107
Host info
54.144.151.164.in-addr.arpa domain name pointer 164.151.144.54.static.gov.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.144.151.164.in-addr.arpa	name = 164.151.144.54.static.gov.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
220.246.99.135 attackspambots
Port 22 Scan, PTR: None
2020-01-04 05:14:52
139.59.87.47 attackbotsspam
Invalid user mundschau from 139.59.87.47 port 55144
2020-01-04 05:24:34
191.30.252.157 attack
Automatic report - Port Scan Attack
2020-01-04 05:40:49
78.139.216.116 attack
Unauthorized SSH login attempts
2020-01-04 05:07:06
69.70.67.146 attack
Jan  3 22:22:55 plex sshd[17979]: Invalid user fvd from 69.70.67.146 port 13437
Jan  3 22:22:55 plex sshd[17979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.70.67.146
Jan  3 22:22:55 plex sshd[17979]: Invalid user fvd from 69.70.67.146 port 13437
Jan  3 22:22:57 plex sshd[17979]: Failed password for invalid user fvd from 69.70.67.146 port 13437 ssh2
Jan  3 22:24:46 plex sshd[18042]: Invalid user gmodserver from 69.70.67.146 port 24184
2020-01-04 05:31:03
220.173.55.8 attackspambots
Invalid user apache from 220.173.55.8 port 36974
2020-01-04 05:15:20
201.212.10.33 attackbots
Jan  3 22:24:37 mail sshd\[5673\]: Invalid user ftpuser from 201.212.10.33
Jan  3 22:24:37 mail sshd\[5673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.212.10.33
Jan  3 22:24:38 mail sshd\[5673\]: Failed password for invalid user ftpuser from 201.212.10.33 port 34624 ssh2
...
2020-01-04 05:34:56
190.107.57.166 attackbots
$f2bV_matches
2020-01-04 05:29:48
40.83.170.197 attackspambots
Invalid user 1925 from 40.83.170.197 port 45284
2020-01-04 05:12:24
51.159.55.44 attack
Fail2Ban Ban Triggered
2020-01-04 05:28:57
124.81.67.114 attack
Automatic report - XMLRPC Attack
2020-01-04 05:27:50
91.121.222.204 attack
ssh failed login
2020-01-04 05:38:04
193.70.37.140 attack
Jan  3 18:24:52 ws24vmsma01 sshd[43318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.37.140
Jan  3 18:24:53 ws24vmsma01 sshd[43318]: Failed password for invalid user ftp from 193.70.37.140 port 49852 ssh2
...
2020-01-04 05:26:34
51.77.195.1 attack
Invalid user savannah from 51.77.195.1 port 49624
2020-01-04 05:09:49
106.75.86.217 attack
Invalid user devnani from 106.75.86.217 port 43448
2020-01-04 05:05:05

Recently Reported IPs

129.106.66.211 226.124.182.9 255.7.158.126 180.248.35.65
23.185.131.107 116.141.233.199 206.253.153.224 20.8.132.52
226.94.127.167 224.246.64.121 123.240.119.133 93.202.47.252
196.71.167.234 133.60.212.172 26.0.137.139 150.53.25.136
76.16.184.182 235.62.31.231 218.114.29.199 90.78.166.226