Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.145.52.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48519
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;152.145.52.169.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 06:48:55 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 169.52.145.152.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.52.145.152.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.204.95.39 attack
Nov  4 08:59:01 server sshd\[21615\]: Failed password for root from 129.204.95.39 port 48818 ssh2
Nov  5 07:39:02 server sshd\[19952\]: Invalid user harold from 129.204.95.39
Nov  5 07:39:02 server sshd\[19952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.95.39 
Nov  5 07:39:04 server sshd\[19952\]: Failed password for invalid user harold from 129.204.95.39 port 44656 ssh2
Nov  5 07:54:52 server sshd\[23891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.95.39  user=root
...
2019-11-05 13:06:42
45.148.10.40 attackspambots
Bad user agent
2019-11-05 13:15:57
128.199.145.205 attackspam
2019-11-05T04:54:50.207344abusebot-3.cloudsearch.cf sshd\[26550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.145.205  user=root
2019-11-05 13:07:46
118.122.124.78 attackbots
Nov  4 22:49:48 dallas01 sshd[32676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.122.124.78
Nov  4 22:49:50 dallas01 sshd[32676]: Failed password for invalid user admin from 118.122.124.78 port 58264 ssh2
Nov  4 22:54:28 dallas01 sshd[919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.122.124.78
2019-11-05 13:18:52
118.24.193.176 attack
Automatic report - Banned IP Access
2019-11-05 08:58:34
157.230.42.76 attackbotsspam
Nov  4 18:48:27 web1 sshd\[4185\]: Invalid user 123qwe from 157.230.42.76
Nov  4 18:48:27 web1 sshd\[4185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.42.76
Nov  4 18:48:29 web1 sshd\[4185\]: Failed password for invalid user 123qwe from 157.230.42.76 port 52813 ssh2
Nov  4 18:54:57 web1 sshd\[4844\]: Invalid user 1qaz2xsw from 157.230.42.76
Nov  4 18:54:57 web1 sshd\[4844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.42.76
2019-11-05 13:03:37
80.211.249.177 attackspambots
Nov  5 01:39:21 vserver sshd\[1707\]: Failed password for root from 80.211.249.177 port 60276 ssh2Nov  5 01:45:10 vserver sshd\[1745\]: Failed password for root from 80.211.249.177 port 53306 ssh2Nov  5 01:48:31 vserver sshd\[1771\]: Invalid user gmod from 80.211.249.177Nov  5 01:48:33 vserver sshd\[1771\]: Failed password for invalid user gmod from 80.211.249.177 port 33924 ssh2
...
2019-11-05 08:54:56
191.34.162.186 attack
2019-11-05T04:48:51.963054shield sshd\[16649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.34.162.186  user=root
2019-11-05T04:48:54.582928shield sshd\[16649\]: Failed password for root from 191.34.162.186 port 49460 ssh2
2019-11-05T04:53:19.633939shield sshd\[17200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.34.162.186  user=root
2019-11-05T04:53:20.713026shield sshd\[17200\]: Failed password for root from 191.34.162.186 port 46221 ssh2
2019-11-05T04:57:43.687045shield sshd\[17962\]: Invalid user owen from 191.34.162.186 port 42662
2019-11-05 13:11:03
89.108.105.34 attackspam
Nov  4 23:00:20 ryanobeirne sshd\[24464\]: Invalid user user2 from 89.108.105.34
Nov  4 23:00:37 ryanobeirne sshd\[24467\]: Invalid user web3 from 89.108.105.34
Nov  4 23:00:54 ryanobeirne sshd\[24471\]: Invalid user admin from 89.108.105.34
Nov  4 23:01:10 ryanobeirne sshd\[24474\]: Invalid user user from 89.108.105.34
Nov  4 23:01:46 ryanobeirne sshd\[24481\]: Invalid user guest from 89.108.105.34
...
2019-11-05 08:54:28
114.26.189.78 attackbotsspam
Honeypot attack, port: 23, PTR: 114-26-189-78.dynamic-ip.hinet.net.
2019-11-05 08:59:31
85.93.37.151 attack
[portscan] Port scan
2019-11-05 13:08:29
187.16.96.35 attackspambots
Nov  4 19:08:07 auw2 sshd\[19972\]: Invalid user lukasz from 187.16.96.35
Nov  4 19:08:07 auw2 sshd\[19972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mvx-187-16-96-35.mundivox.com
Nov  4 19:08:09 auw2 sshd\[19972\]: Failed password for invalid user lukasz from 187.16.96.35 port 54776 ssh2
Nov  4 19:12:44 auw2 sshd\[20502\]: Invalid user klx from 187.16.96.35
Nov  4 19:12:44 auw2 sshd\[20502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mvx-187-16-96-35.mundivox.com
2019-11-05 13:20:14
175.161.93.163 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/175.161.93.163/ 
 
 CN - 1H : (627)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4837 
 
 IP : 175.161.93.163 
 
 CIDR : 175.160.0.0/12 
 
 PREFIX COUNT : 1262 
 
 UNIQUE IP COUNT : 56665856 
 
 
 ATTACKS DETECTED ASN4837 :  
  1H - 9 
  3H - 31 
  6H - 75 
 12H - 138 
 24H - 223 
 
 DateTime : 2019-11-05 05:54:45 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-05 13:11:46
197.50.150.170 attack
Unauthorised access (Nov  5) SRC=197.50.150.170 LEN=52 TOS=0x02 TTL=113 ID=16853 DF TCP DPT=445 WINDOW=8192 CWR ECE SYN
2019-11-05 08:52:01
49.236.195.48 attackspambots
Nov  4 19:40:34 plusreed sshd[25578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.236.195.48  user=root
Nov  4 19:40:35 plusreed sshd[25578]: Failed password for root from 49.236.195.48 port 49904 ssh2
...
2019-11-05 09:00:53

Recently Reported IPs

251.129.46.157 132.161.85.233 143.186.134.168 75.34.119.164
191.99.144.192 184.246.121.163 58.199.78.32 165.211.72.207
85.226.124.134 199.123.186.3 67.73.103.76 154.221.184.128
243.44.50.147 67.193.11.68 52.102.192.199 21.139.187.205
39.171.85.191 66.156.241.110 48.243.138.197 26.150.105.63