Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.156.129.32 attack
Malicious IP
2024-06-11 21:03:25
45.156.129.23 attack
hacking
2024-02-21 16:21:38
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.156.129.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43903
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.156.129.199.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026022602 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 27 11:00:50 CST 2026
;; MSG SIZE  rcvd: 107
Host info
199.129.156.45.in-addr.arpa domain name pointer sh-chi-us-gd18-wk101c.internet-census.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
199.129.156.45.in-addr.arpa	name = sh-chi-us-gd18-wk101c.internet-census.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
115.159.115.17 attackbotsspam
Jun  1 09:30:02 xeon sshd[55929]: Failed password for root from 115.159.115.17 port 52230 ssh2
2020-06-01 17:42:49
202.137.155.212 attackbotsspam
(imapd) Failed IMAP login from 202.137.155.212 (LA/Laos/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jun  1 14:30:46 ir1 dovecot[2885757]: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=202.137.155.212, lip=5.63.12.44, TLS: Connection closed, session=
2020-06-01 18:03:15
183.144.15.116 attackbots
Port Scan detected!
...
2020-06-01 17:36:18
193.112.48.79 attack
$f2bV_matches
2020-06-01 17:39:49
103.233.86.106 attackspam
Trolling for resource vulnerabilities
2020-06-01 17:46:28
112.85.42.238 attackspambots
Jun  1 06:11:32 web01 sshd[31504]: Failed password for root from 112.85.42.238 port 44038 ssh2
Jun  1 06:11:35 web01 sshd[31504]: Failed password for root from 112.85.42.238 port 44038 ssh2
...
2020-06-01 17:40:14
203.210.244.178 attack
Unauthorized connection attempt from IP address 203.210.244.178 on Port 445(SMB)
2020-06-01 18:10:25
191.241.242.71 attackbotsspam
Unauthorized connection attempt from IP address 191.241.242.71 on Port 445(SMB)
2020-06-01 18:04:46
120.253.11.135 attackbots
2020-06-01T11:08:08.230165centos sshd[15885]: Failed password for root from 120.253.11.135 port 8865 ssh2
2020-06-01T11:13:59.657531centos sshd[16232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.253.11.135  user=root
2020-06-01T11:14:01.146384centos sshd[16232]: Failed password for root from 120.253.11.135 port 53611 ssh2
...
2020-06-01 17:38:12
35.196.37.206 attackbotsspam
xmlrpc attack
2020-06-01 18:11:05
190.190.230.159 attackbotsspam
port 23
2020-06-01 17:53:14
173.245.239.241 attackspambots
(imapd) Failed IMAP login from 173.245.239.241 (US/United States/-): 1 in the last 3600 secs
2020-06-01 17:36:45
162.243.136.134 attackbots
7474/tcp 30977/tcp 2375/tcp...
[2020-04-29/06-01]25pkt,20pt.(tcp),2pt.(udp)
2020-06-01 17:34:49
81.213.76.177 attack
Port Scan detected!
...
2020-06-01 17:32:52
71.6.158.166 attackbots
4840/tcp 2379/tcp 1521/tcp...
[2020-03-31/06-01]324pkt,180pt.(tcp),22pt.(udp)
2020-06-01 17:32:28

Recently Reported IPs

106.75.249.134 101.36.118.177 88.101.166.60 153.35.209.42
47.98.153.122 159.223.72.38 45.156.129.188 21.113.38.251
61.228.203.46 163.61.73.38 154.19.241.75 34.229.36.79
118.184.173.208 192.168.0.159 1.95.134.14 35.94.154.63
20.168.122.62 118.173.4.169 45.153.34.68 41.98.25.168