Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.158.151.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6077
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.158.151.45.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 89 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 03:14:53 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 45.151.158.2.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.151.158.2.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.140.188.50 attack
Unauthorized connection attempt detected from IP address 104.140.188.50 to port 5432
2020-05-01 02:02:37
118.172.207.53 attackbots
[portscan] tcp/23 [TELNET]
*(RWIN=60399)(04301449)
2020-05-01 01:36:40
162.243.138.190 attackspam
scans once in preceeding hours on the ports (in chronological order) 7002 resulting in total of 71 scans from 162.243.0.0/16 block.
2020-05-01 01:31:21
162.243.139.167 attackspambots
" "
2020-05-01 01:30:24
165.22.192.244 attackbots
[portscan] tcp/22 [SSH]
[scan/connect: 2 time(s)]
in blocklist.de:'listed [ssh]'
*(RWIN=65535)(04301449)
2020-05-01 01:57:05
121.61.15.24 attackbotsspam
[portscan] tcp/23 [TELNET]
*(RWIN=62362)(04301449)
2020-05-01 01:36:04
78.84.115.162 attackspambots
Port 23 (Telnet) access denied
2020-05-01 01:40:56
123.201.115.11 attackspam
[portscan] tcp/23 [TELNET]
*(RWIN=42516)(04301449)
2020-05-01 01:59:57
158.140.138.160 attack
[portscan] tcp/23 [TELNET]
in sorbs:'listed [spam]'
*(RWIN=39772)(04301449)
2020-05-01 01:32:57
45.143.222.196 attackbotsspam
SSH Bruteforce attack
2020-05-01 01:45:20
23.95.89.80 attackbots
[portscan] tcp/23 [TELNET]
[scan/connect: 2 time(s)]
*(RWIN=65535)(04301449)
2020-05-01 01:48:44
176.58.132.197 attackbotsspam
[portscan] tcp/23 [TELNET]
*(RWIN=28002)(04301449)
2020-05-01 01:26:56
162.243.138.240 attack
Port scan(s) denied
2020-05-01 01:30:46
118.200.72.27 attack
[portscan] tcp/23 [TELNET]
*(RWIN=51891)(04301449)
2020-05-01 02:00:45
162.243.136.102 attackspam
Apr 30 19:13:27 h2034429 sshd[21226]: Did not receive identification string from 162.243.136.102
Apr 30 19:15:03 h2034429 sshd[21241]: Did not receive identification string from 162.243.136.102


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=162.243.136.102
2020-05-01 01:32:00

Recently Reported IPs

75.39.53.103 151.227.14.218 37.20.35.7 227.199.165.105
226.209.139.169 88.222.117.157 208.73.252.148 154.216.86.116
54.104.136.142 247.182.110.34 127.233.24.148 233.36.162.247
230.228.74.51 151.77.70.74 169.104.154.21 246.22.102.110
6.237.16.173 70.16.35.49 54.212.144.191 97.58.241.97