Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.69.45.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1900
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.69.45.4.			IN	A

;; AUTHORITY SECTION:
.			492	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 05:14:00 CST 2022
;; MSG SIZE  rcvd: 104
Host info
b'4.45.69.159.in-addr.arpa domain name pointer srv1.ldmultimedia.it.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
4.45.69.159.in-addr.arpa	name = srv1.ldmultimedia.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
91.238.162.44 attackspambots
Unauthorized connection attempt detected from IP address 91.238.162.44 to port 1433
2019-12-29 16:23:43
159.203.33.24 attack
Unauthorized connection attempt detected from IP address 159.203.33.24 to port 2004
2019-12-29 16:35:57
145.236.68.181 attack
Unauthorized connection attempt detected from IP address 145.236.68.181 to port 8000
2019-12-29 16:37:31
200.100.36.24 attackbots
Unauthorized connection attempt detected from IP address 200.100.36.24 to port 83
2019-12-29 16:20:52
189.240.224.250 attack
Honeypot attack, port: 445, PTR: customer-189-240-224-250.uninet-ide.com.mx.
2019-12-29 16:30:12
109.87.11.42 attackbotsspam
Unauthorized connection attempt detected from IP address 109.87.11.42 to port 5555
2019-12-29 16:42:28
210.245.89.85 attackspam
Dec 29 09:09:17 dedicated sshd[5300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.89.85  user=root
Dec 29 09:09:19 dedicated sshd[5300]: Failed password for root from 210.245.89.85 port 52215 ssh2
2019-12-29 16:20:01
138.121.100.90 attackspam
Unauthorized connection attempt detected from IP address 138.121.100.90 to port 445
2019-12-29 16:38:27
89.239.32.17 attackbots
Unauthorized connection attempt detected from IP address 89.239.32.17 to port 22
2019-12-29 16:46:11
200.57.192.129 attackbotsspam
Unauthorized connection attempt detected from IP address 200.57.192.129 to port 23
2019-12-29 16:28:10
196.221.147.17 attackbots
Unauthorized connection attempt detected from IP address 196.221.147.17 to port 445
2019-12-29 16:59:59
201.150.28.210 attackspambots
Unauthorized connection attempt detected from IP address 201.150.28.210 to port 1433
2019-12-29 16:59:10
211.34.178.95 attack
Unauthorized connection attempt detected from IP address 211.34.178.95 to port 5555
2019-12-29 16:58:05
189.235.18.5 attackbotsspam
Unauthorized connection attempt detected from IP address 189.235.18.5 to port 88
2019-12-29 17:01:48
197.44.91.190 attackbots
Unauthorized connection attempt detected from IP address 197.44.91.190 to port 445
2019-12-29 16:29:03

Recently Reported IPs

159.69.41.40 159.69.43.195 159.69.56.246 159.69.59.224
159.69.61.180 159.69.56.225 159.69.63.195 159.69.60.110
159.69.69.38 159.69.69.11 159.69.67.170 159.69.7.252
159.69.76.171 159.69.83.163 159.69.84.171 159.69.84.21
159.69.82.252 159.69.92.234 159.69.89.48 159.75.202.132