Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.155.69.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63971
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.155.69.152.			IN	A

;; AUTHORITY SECTION:
.			131	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020601 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 12:10:33 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 152.69.155.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 152.69.155.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
216.10.245.150 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-03-06 01:05:13
206.189.203.221 attackbots
CMS (WordPress or Joomla) login attempt.
2020-03-06 00:44:39
114.103.18.234 attackspambots
Attempts against SMTP/SSMTP
2020-03-06 00:53:38
85.140.7.246 attack
Honeypot attack, port: 445, PTR: 246.mtsnet.ru.
2020-03-06 01:10:11
14.53.67.51 attackbots
Port 5555 scan denied
2020-03-06 00:43:46
2401:5f80:5001:3:2000::215 attackbotsspam
\n
2020-03-06 01:06:15
180.253.27.157 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-06 01:03:01
177.82.85.203 attackbotsspam
5555/tcp
[2020-03-05]1pkt
2020-03-06 00:41:47
37.53.131.100 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-06 00:36:44
217.138.76.66 attack
Nov 16 04:43:58 odroid64 sshd\[11956\]: Invalid user abdullah from 217.138.76.66
Nov 16 04:43:58 odroid64 sshd\[11956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.138.76.66
Feb  2 01:14:10 odroid64 sshd\[21961\]: Invalid user user from 217.138.76.66
Feb  2 01:14:10 odroid64 sshd\[21961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.138.76.66
...
2020-03-06 00:49:58
165.227.47.1 attackbotsspam
Lines containing failures of 165.227.47.1
Mar  2 15:14:29 mellenthin sshd[32018]: Invalid user lux-et-umbra from 165.227.47.1 port 45674
Mar  2 15:14:29 mellenthin sshd[32018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.47.1
Mar  2 15:14:30 mellenthin sshd[32018]: Failed password for invalid user lux-et-umbra from 165.227.47.1 port 45674 ssh2
Mar  2 15:14:30 mellenthin sshd[32018]: Received disconnect from 165.227.47.1 port 45674:11: Normal Shutdown [preauth]
Mar  2 15:14:30 mellenthin sshd[32018]: Disconnected from invalid user lux-et-umbra 165.227.47.1 port 45674 [preauth]
Mar  2 15:17:28 mellenthin sshd[32111]: Invalid user postgres from 165.227.47.1 port 43442
Mar  2 15:17:28 mellenthin sshd[32111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.47.1


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=165.227.47.1
2020-03-06 00:35:57
165.227.41.202 attackbotsspam
Oct 27 05:41:15 odroid64 sshd\[29928\]: Invalid user admin from 165.227.41.202
Oct 27 05:41:15 odroid64 sshd\[29928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.41.202
Oct 27 05:41:15 odroid64 sshd\[29928\]: Invalid user admin from 165.227.41.202
Oct 27 05:41:15 odroid64 sshd\[29928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.41.202
Oct 27 05:41:17 odroid64 sshd\[29928\]: Failed password for invalid user admin from 165.227.41.202 port 45660 ssh2
Nov 12 18:40:57 odroid64 sshd\[2847\]: Invalid user rijk from 165.227.41.202
Nov 12 18:40:57 odroid64 sshd\[2847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.41.202
...
2020-03-06 00:39:21
197.248.157.246 attackbotsspam
suspicious action Thu, 05 Mar 2020 10:34:08 -0300
2020-03-06 00:47:49
180.76.144.95 attack
Mar  5 11:29:06 plusreed sshd[5237]: Invalid user kristofvps from 180.76.144.95
...
2020-03-06 00:45:00
79.103.80.140 attackbotsspam
23/tcp
[2020-03-05]1pkt
2020-03-06 00:49:00

Recently Reported IPs

122.51.147.169 161.35.234.0 104.236.136.200 162.142.125.83
49.232.210.62 74.211.102.126 203.151.152.149 113.120.32.202
54.36.148.103 183.156.225.0 181.143.128.11 14.97.28.218
59.94.195.133 137.184.78.118 73.158.5.3 124.7.14.1
43.133.56.228 103.253.41.98 80.116.179.195 115.236.65.194