Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Eshowe

Region: KwaZulu-Natal

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.89.42.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53793
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.89.42.254.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100601 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 02:08:26 CST 2022
;; MSG SIZE  rcvd: 106
Host info
254.42.89.197.in-addr.arpa domain name pointer 197-89-42-254.dsl.mweb.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
254.42.89.197.in-addr.arpa	name = 197-89-42-254.dsl.mweb.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.99.167.136 attackspam
Aug 19 14:06:46 pkdns2 sshd\[1855\]: Invalid user postgres from 192.99.167.136Aug 19 14:06:48 pkdns2 sshd\[1855\]: Failed password for invalid user postgres from 192.99.167.136 port 52864 ssh2Aug 19 14:11:11 pkdns2 sshd\[2082\]: Invalid user testing from 192.99.167.136Aug 19 14:11:13 pkdns2 sshd\[2082\]: Failed password for invalid user testing from 192.99.167.136 port 42646 ssh2Aug 19 14:15:25 pkdns2 sshd\[2282\]: Invalid user md from 192.99.167.136Aug 19 14:15:28 pkdns2 sshd\[2282\]: Failed password for invalid user md from 192.99.167.136 port 60656 ssh2
...
2019-08-19 20:45:48
185.254.120.6 attackbotsspam
Aug 18 19:02:04 master sshd[16136]: Did not receive identification string from 185.254.120.6
Aug 18 20:33:00 master sshd[17612]: Did not receive identification string from 185.254.120.6
Aug 18 20:43:16 master sshd[17631]: Did not receive identification string from 185.254.120.6
Aug 19 12:05:52 master sshd[1261]: Failed password for root from 185.254.120.6 port 35990 ssh2
Aug 19 12:05:56 master sshd[1263]: Failed password for invalid user anonymous from 185.254.120.6 port 36422 ssh2
Aug 19 12:06:02 master sshd[1265]: Failed password for invalid user admin from 185.254.120.6 port 36844 ssh2
Aug 19 12:06:11 master sshd[1267]: Failed password for invalid user user from 185.254.120.6 port 37840 ssh2
Aug 19 12:06:16 master sshd[1269]: Failed password for root from 185.254.120.6 port 38469 ssh2
Aug 19 12:06:19 master sshd[1271]: Failed password for invalid user admin from 185.254.120.6 port 38954 ssh2
Aug 19 12:06:24 master sshd[1273]: Failed password for invalid user mother from 185.254.120.6 port 39283 ssh2
Aug 19
2019-08-19 19:48:51
191.53.57.96 attack
$f2bV_matches
2019-08-19 20:23:01
120.0.139.225 attack
Unauthorised access (Aug 19) SRC=120.0.139.225 LEN=40 TTL=49 ID=56531 TCP DPT=8080 WINDOW=4406 SYN 
Unauthorised access (Aug 18) SRC=120.0.139.225 LEN=40 TTL=49 ID=59934 TCP DPT=8080 WINDOW=4406 SYN
2019-08-19 20:35:44
176.57.116.173 attackspam
Honeypot attack, port: 23, PTR: res-bies14665.ppp.twt.it.
2019-08-19 20:19:25
200.196.249.170 attack
Aug 19 17:41:36 areeb-Workstation sshd\[18072\]: Invalid user sammy from 200.196.249.170
Aug 19 17:41:36 areeb-Workstation sshd\[18072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.196.249.170
Aug 19 17:41:38 areeb-Workstation sshd\[18072\]: Failed password for invalid user sammy from 200.196.249.170 port 33554 ssh2
...
2019-08-19 20:29:10
94.130.177.236 attackbots
Aug 19 10:57:30 web8 sshd\[17915\]: Invalid user tty from 94.130.177.236
Aug 19 10:57:30 web8 sshd\[17915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.130.177.236
Aug 19 10:57:31 web8 sshd\[17915\]: Failed password for invalid user tty from 94.130.177.236 port 37908 ssh2
Aug 19 11:01:24 web8 sshd\[19837\]: Invalid user admin from 94.130.177.236
Aug 19 11:01:24 web8 sshd\[19837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.130.177.236
2019-08-19 20:05:37
113.174.28.94 attackspam
19/8/19@03:37:47: FAIL: Alarm-Intrusion address from=113.174.28.94
...
2019-08-19 20:14:16
220.134.144.96 attackbotsspam
Aug 19 14:04:46 dedicated sshd[13002]: Invalid user zabbix from 220.134.144.96 port 51350
2019-08-19 20:08:05
111.122.181.250 attackspambots
Aug 19 03:33:23 vps200512 sshd\[25440\]: Invalid user mktg2 from 111.122.181.250
Aug 19 03:33:23 vps200512 sshd\[25440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.122.181.250
Aug 19 03:33:25 vps200512 sshd\[25440\]: Failed password for invalid user mktg2 from 111.122.181.250 port 2123 ssh2
Aug 19 03:37:54 vps200512 sshd\[25557\]: Invalid user 12345678 from 111.122.181.250
Aug 19 03:37:54 vps200512 sshd\[25557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.122.181.250
2019-08-19 20:06:45
59.127.1.126 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-19 19:59:17
42.157.130.18 attack
F2B jail: sshd. Time: 2019-08-19 10:42:32, Reported by: VKReport
2019-08-19 20:22:16
132.232.82.244 attackbotsspam
Aug 19 12:23:52 game-panel sshd[19744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.82.244
Aug 19 12:23:53 game-panel sshd[19744]: Failed password for invalid user potsdam from 132.232.82.244 port 50914 ssh2
Aug 19 12:29:13 game-panel sshd[19992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.82.244
2019-08-19 20:35:12
183.136.239.74 attackspambots
19/8/19@08:17:10: FAIL: IoT-SSH address from=183.136.239.74
...
2019-08-19 20:22:41
186.251.208.120 attack
$f2bV_matches
2019-08-19 20:32:05

Recently Reported IPs

191.202.248.243 193.8.1.179 216.126.65.108 188.164.194.167
185.183.9.108 122.17.163.147 192.241.118.208 179.125.122.146
180.180.25.26 180.183.32.28 104.28.239.215 189.93.41.187
189.142.98.144 128.90.174.122 114.227.84.110 192.227.128.152
194.32.120.148 194.110.150.143 43.139.18.173 43.152.213.112