Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kenya

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
197.248.52.46 attack
Attempted connection to port 23.
2020-09-08 04:10:12
197.248.52.46 attack
Attempted connection to port 23.
2020-09-07 19:46:23
197.248.51.74 attackspambots
Unauthorized connection attempt detected from IP address 197.248.51.74 to port 23
2020-03-17 22:24:43
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.248.5.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20551
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.248.5.29.			IN	A

;; AUTHORITY SECTION:
.			336	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 22:43:30 CST 2022
;; MSG SIZE  rcvd: 105
Host info
29.5.248.197.in-addr.arpa domain name pointer host29.safaricombusiness.co.ke.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
29.5.248.197.in-addr.arpa	name = host29.safaricombusiness.co.ke.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
43.224.130.146 attack
Apr  9 20:07:16 vps333114 sshd[1305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.224.130.146
Apr  9 20:07:19 vps333114 sshd[1305]: Failed password for invalid user dev from 43.224.130.146 port 15542 ssh2
...
2020-04-10 03:14:23
219.143.182.178 attackbots
(eximsyntax) Exim syntax errors from 219.143.182.178 (CN/China/178.182.143.219.broad.bj.bj.dynamic.163data.com.cn): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-09 17:29:03 SMTP call from [219.143.182.178] dropped: too many syntax or protocol errors (last command was "?\034?\032?\027?\031?\034?\033?\030?\032?\026?\016?\r?\v?\f?	?")
2020-04-10 03:12:54
114.119.165.154 attack
20 attempts against mh-misbehave-ban on milky
2020-04-10 03:20:08
200.129.246.10 attack
2020-04-09T20:58:59.855704cyberdyne sshd[1175846]: Invalid user deploy from 200.129.246.10 port 32868
2020-04-09T20:58:59.861767cyberdyne sshd[1175846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.129.246.10
2020-04-09T20:58:59.855704cyberdyne sshd[1175846]: Invalid user deploy from 200.129.246.10 port 32868
2020-04-09T20:59:01.565305cyberdyne sshd[1175846]: Failed password for invalid user deploy from 200.129.246.10 port 32868 ssh2
...
2020-04-10 03:03:45
41.193.122.77 attackspambots
Apr  9 18:15:18 vserver sshd\[31993\]: Invalid user pi from 41.193.122.77Apr  9 18:15:18 vserver sshd\[31995\]: Invalid user pi from 41.193.122.77Apr  9 18:15:20 vserver sshd\[31995\]: Failed password for invalid user pi from 41.193.122.77 port 47966 ssh2Apr  9 18:15:20 vserver sshd\[31993\]: Failed password for invalid user pi from 41.193.122.77 port 47958 ssh2
...
2020-04-10 03:04:21
190.85.71.129 attack
2020-04-09T13:13:00.697512shield sshd\[25419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.71.129  user=root
2020-04-09T13:13:02.885736shield sshd\[25419\]: Failed password for root from 190.85.71.129 port 42721 ssh2
2020-04-09T13:17:37.407393shield sshd\[26161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.71.129  user=root
2020-04-09T13:17:38.953561shield sshd\[26161\]: Failed password for root from 190.85.71.129 port 48245 ssh2
2020-04-09T13:22:18.521016shield sshd\[26735\]: Invalid user haohuoyanxuan from 190.85.71.129 port 56852
2020-04-10 03:07:23
61.216.17.26 attack
Apr  9 20:46:00 ns381471 sshd[20432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.216.17.26
Apr  9 20:46:02 ns381471 sshd[20432]: Failed password for invalid user hate from 61.216.17.26 port 58683 ssh2
2020-04-10 03:22:36
134.175.32.95 attackspam
Apr  9 18:22:44 ns382633 sshd\[4448\]: Invalid user licongcong from 134.175.32.95 port 55714
Apr  9 18:22:44 ns382633 sshd\[4448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.32.95
Apr  9 18:22:46 ns382633 sshd\[4448\]: Failed password for invalid user licongcong from 134.175.32.95 port 55714 ssh2
Apr  9 18:29:39 ns382633 sshd\[5775\]: Invalid user postgres from 134.175.32.95 port 41438
Apr  9 18:29:39 ns382633 sshd\[5775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.32.95
2020-04-10 02:58:57
123.143.3.45 attackbotsspam
Apr  9 15:24:06 ws22vmsma01 sshd[16532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.143.3.45
Apr  9 15:24:08 ws22vmsma01 sshd[16532]: Failed password for invalid user test from 123.143.3.45 port 44048 ssh2
...
2020-04-10 03:32:30
169.57.207.243 attackspam
Brute force attempt
2020-04-10 03:20:32
76.214.112.45 attackbotsspam
Apr  9 17:39:38 jupiter sshd[11796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.214.112.45
Apr  9 17:39:40 jupiter sshd[11796]: Failed password for invalid user time from 76.214.112.45 port 24532 ssh2
...
2020-04-10 03:16:25
124.65.18.102 attack
SSH Server BruteForce Attack
2020-04-10 02:59:16
194.26.29.119 attackspam
Apr  9 21:05:00 debian-2gb-nbg1-2 kernel: \[8718111.517436\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.119 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=22482 PROTO=TCP SPT=59952 DPT=1413 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-10 03:11:09
218.21.240.24 attackspambots
web-1 [ssh] SSH Attack
2020-04-10 03:22:11
51.137.98.76 attack
Apr  9 20:52:59 vps sshd[737024]: Failed password for invalid user admin from 51.137.98.76 port 1920 ssh2
Apr  9 20:56:48 vps sshd[759096]: Invalid user deploy from 51.137.98.76 port 1920
Apr  9 20:56:48 vps sshd[759096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.137.98.76
Apr  9 20:56:51 vps sshd[759096]: Failed password for invalid user deploy from 51.137.98.76 port 1920 ssh2
Apr  9 21:00:55 vps sshd[782548]: Invalid user admin from 51.137.98.76 port 1920
...
2020-04-10 03:06:24

Recently Reported IPs

197.248.193.179 197.248.174.65 197.248.85.202 197.248.5.5
197.248.98.123 197.248.5.17 197.248.5.13 197.251.147.50
197.249.28.158 197.25.168.182 197.248.5.26 197.251.192.67
197.250.3.233 197.251.16.132 197.251.255.209 197.251.193.44
197.251.254.82 197.251.98.235 197.251.192.86 197.253.199.238