Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.228.101.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1501
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.228.101.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031201 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 08:58:47 CST 2025
;; MSG SIZE  rcvd: 107
Host info
54.101.228.197.in-addr.arpa domain name pointer 8ta-228-101-54.telkomadsl.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.101.228.197.in-addr.arpa	name = 8ta-228-101-54.telkomadsl.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
80.82.70.118 attack
05/01/2020-09:25:49.095868 80.82.70.118 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-01 21:27:59
193.112.139.159 attackspam
Invalid user shahrin from 193.112.139.159 port 52300
2020-05-01 21:29:23
178.33.66.88 attackspam
Invalid user claire from 178.33.66.88 port 38680
2020-05-01 21:37:49
161.35.23.174 attack
Unknown connection
2020-05-01 21:51:16
183.89.211.241 attackbots
May  1 13:38:34 xeon postfix/smtpd[9129]: warning: unknown[183.89.211.241]: SASL PLAIN authentication failed: authentication failure
2020-05-01 21:34:46
89.238.21.169 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-01 21:51:44
197.211.61.183 attackbotsspam
Apr 30 11:48:00 mail sshd[10907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.211.61.183 
Apr 30 11:48:01 mail sshd[10907]: Failed password for invalid user user from 197.211.61.183 port 12331 ssh2
...
2020-05-01 21:18:46
71.6.147.254 attackbotsspam
1588340636 - 05/01/2020 15:43:56 Host: 71.6.147.254/71.6.147.254 Port: 69 UDP Blocked
2020-05-01 21:44:24
124.118.129.5 attack
Invalid user england from 124.118.129.5 port 40644
2020-05-01 21:42:18
222.186.173.180 attack
May  1 15:14:45 inter-technics sshd[1918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180  user=root
May  1 15:14:47 inter-technics sshd[1918]: Failed password for root from 222.186.173.180 port 61228 ssh2
May  1 15:14:52 inter-technics sshd[1918]: Failed password for root from 222.186.173.180 port 61228 ssh2
May  1 15:14:45 inter-technics sshd[1918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180  user=root
May  1 15:14:47 inter-technics sshd[1918]: Failed password for root from 222.186.173.180 port 61228 ssh2
May  1 15:14:52 inter-technics sshd[1918]: Failed password for root from 222.186.173.180 port 61228 ssh2
May  1 15:14:45 inter-technics sshd[1918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180  user=root
May  1 15:14:47 inter-technics sshd[1918]: Failed password for root from 222.186.173.180 port 61228 ssh2
M
...
2020-05-01 21:18:24
196.246.216.25 attack
2020-05-01T13:49:59.989777+02:00 lumpi kernel: [13623536.631155] INPUT:DROP:SPAMHAUS_DROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=196.246.216.25 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=64 ID=13497 DF PROTO=TCP SPT=55720 DPT=443 WINDOW=29200 RES=0x00 SYN URGP=0 
...
2020-05-01 21:36:31
5.44.197.24 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-01 21:49:39
164.132.73.220 attackbotsspam
Port scan(s) denied
2020-05-01 21:48:22
109.202.107.20 attackspambots
probing for vulnerabilities
2020-05-01 21:49:01
159.89.181.213 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-01 21:26:18

Recently Reported IPs

45.161.208.154 25.75.122.59 16.87.16.235 8.235.100.176
200.134.74.81 201.141.227.190 48.138.142.218 186.101.8.70
75.42.246.38 43.119.156.59 85.30.136.26 220.164.66.6
59.247.184.155 34.180.25.167 124.93.204.220 177.21.116.110
85.39.77.247 253.128.30.27 21.188.14.67 52.254.65.159