Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.156.129.32 attack
Malicious IP
2024-06-11 21:03:25
45.156.129.23 attack
hacking
2024-02-21 16:21:38
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.156.129.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31513
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.156.129.52.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025042902 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 30 12:00:19 CST 2025
;; MSG SIZE  rcvd: 106
Host info
52.129.156.45.in-addr.arpa domain name pointer sh-chi-us-gd10-wk101a.internet-census.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
52.129.156.45.in-addr.arpa	name = sh-chi-us-gd10-wk101a.internet-census.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.14.248.108 attackspam
Fail2Ban Ban Triggered
2020-06-29 02:29:08
142.93.52.3 attack
Jun 28 17:24:04 ns382633 sshd\[11870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.52.3  user=root
Jun 28 17:24:07 ns382633 sshd\[11870\]: Failed password for root from 142.93.52.3 port 44448 ssh2
Jun 28 17:38:41 ns382633 sshd\[14687\]: Invalid user deploy from 142.93.52.3 port 44512
Jun 28 17:38:41 ns382633 sshd\[14687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.52.3
Jun 28 17:38:43 ns382633 sshd\[14687\]: Failed password for invalid user deploy from 142.93.52.3 port 44512 ssh2
2020-06-29 02:03:53
78.128.113.62 attackbotsspam
1 attempts against mh-modsecurity-ban on milky
2020-06-29 02:04:18
94.102.51.117 attack
Unauthorized connection attempt detected from IP address 94.102.51.117 to port 5901
2020-06-29 02:39:54
171.250.162.11 attackbots
Unauthorized connection attempt detected from IP address 171.250.162.11 to port 23
2020-06-29 02:32:30
103.145.12.145 attackbots
Triggered: repeated knocking on closed ports.
2020-06-29 02:08:57
210.236.113.124 attackspambots
Triggered by Fail2Ban at Ares web server
2020-06-29 02:27:37
80.174.46.114 attack
Unauthorized connection attempt detected from IP address 80.174.46.114 to port 81
2020-06-29 02:23:16
1.23.150.142 attackbotsspam
Automatic report - XMLRPC Attack
2020-06-29 02:13:35
13.78.140.10 attackspam
2020-06-28 12:06:56.956687-0500  localhost sshd[14065]: Failed password for root from 13.78.140.10 port 15525 ssh2
2020-06-29 02:04:43
138.94.192.135 attack
Unauthorized connection attempt detected from IP address 138.94.192.135 to port 2323
2020-06-29 02:35:43
106.225.219.144 attackbotsspam
Unauthorized connection attempt detected from IP address 106.225.219.144 to port 445
2020-06-29 02:20:48
178.33.45.156 attackbots
2020-06-28T19:47:36.009928vps773228.ovh.net sshd[19028]: Failed password for invalid user gitlab from 178.33.45.156 port 50626 ssh2
2020-06-28T19:52:10.571383vps773228.ovh.net sshd[19058]: Invalid user msi from 178.33.45.156 port 50246
2020-06-28T19:52:10.592968vps773228.ovh.net sshd[19058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip156.ip-178-33-45.eu
2020-06-28T19:52:10.571383vps773228.ovh.net sshd[19058]: Invalid user msi from 178.33.45.156 port 50246
2020-06-28T19:52:12.821023vps773228.ovh.net sshd[19058]: Failed password for invalid user msi from 178.33.45.156 port 50246 ssh2
...
2020-06-29 02:03:38
177.86.145.182 attackspambots
Unauthorized connection attempt detected from IP address 177.86.145.182 to port 88
2020-06-29 02:31:28
122.51.34.64 attackspambots
Unauthorized connection attempt detected from IP address 122.51.34.64 to port 11046
2020-06-29 02:36:36

Recently Reported IPs

205.210.31.250 20.65.193.195 113.215.188.103 176.65.149.188
84.17.43.244 243.167.65.19 207.56.221.239 126.130.230.41
49.204.59.87 171.63.186.38 47.251.93.227 117.20.54.190
115.126.76.2 183.247.162.85 191.22.247.106 91.201.54.7
10.75.223.165 146.190.223.218 73.67.0.234 59.120.60.100