Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.156.129.32 attack
Malicious IP
2024-06-11 21:03:25
45.156.129.23 attack
hacking
2024-02-21 16:21:38
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       45.154.220.0 - 45.157.167.255
CIDR:           45.155.0.0/16, 45.156.0.0/16, 45.157.160.0/21, 45.157.128.0/19, 45.157.0.0/17, 45.154.220.0/22, 45.154.224.0/19
NetName:        RIPE
NetHandle:      NET-45-154-220-0-1
Parent:         NET45 (NET-45-0-0-0-0)
NetType:        Early Registrations, Transferred to RIPE NCC
OriginAS:       
Organization:   RIPE Network Coordination Centre (RIPE)
RegDate:        2014-05-22
Updated:        2025-02-10
Comment:        These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref:            https://rdap.arin.net/registry/ip/45.154.220.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.ripe.net


OrgName:        RIPE Network Coordination Centre
OrgId:          RIPE
Address:        P.O. Box 10096
City:           Amsterdam
StateProv:      
PostalCode:     1001EB
Country:        NL
RegDate:        
Updated:        2013-07-29
Ref:            https://rdap.arin.net/registry/entity/RIPE

ReferralServer:  whois.ripe.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName:   Abuse Contact
OrgAbusePhone:  +31205354444 
OrgAbuseEmail:  abuse@ripe.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

OrgTechHandle: RNO29-ARIN
OrgTechName:   RIPE NCC Operations
OrgTechPhone:  +31 20 535 4444 
OrgTechEmail:  hostmaster@ripe.net
OrgTechRef:    https://rdap.arin.net/registry/entity/RNO29-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.156.129.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15135
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.156.129.73.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030300 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 03 16:30:50 CST 2026
;; MSG SIZE  rcvd: 106
Host info
73.129.156.45.in-addr.arpa domain name pointer sh-chi-us-gp1-wk103d.internet-census.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
73.129.156.45.in-addr.arpa	name = sh-chi-us-gp1-wk103d.internet-census.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
176.214.236.117 attackbots
Unauthorized connection attempt detected from IP address 176.214.236.117 to port 8080
2020-06-22 07:27:17
49.51.161.183 attack
Unauthorized connection attempt detected from IP address 49.51.161.183 to port 6001
2020-06-22 06:53:21
190.190.27.126 attackbotsspam
Unauthorized connection attempt detected from IP address 190.190.27.126 to port 23
2020-06-22 07:01:45
185.139.137.35 attackbotsspam
Unauthorized connection attempt detected from IP address 185.139.137.35 to port 5900
2020-06-22 07:24:11
189.68.34.17 attack
Unauthorized connection attempt detected from IP address 189.68.34.17 to port 23
2020-06-22 07:02:17
178.62.47.158 attackbots
Jun 22 01:23:30 debian-2gb-nbg1-2 kernel: \[15040488.555808\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=178.62.47.158 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=37005 PROTO=TCP SPT=32767 DPT=8545 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-22 07:24:58
177.67.9.224 attackspambots
Unauthorized connection attempt detected from IP address 177.67.9.224 to port 80
2020-06-22 07:26:15
92.246.76.210 attackspambots
Unauthorized connection attempt detected from IP address 92.246.76.210 to port 14444
2020-06-22 07:10:17
200.232.64.50 attackbots
Unauthorized connection attempt detected from IP address 200.232.64.50 to port 23
2020-06-22 07:00:28
185.172.111.211 attackbotsspam
Unauthorized connection attempt detected from IP address 185.172.111.211 to port 2323
2020-06-22 07:23:42
87.226.165.143 attackbotsspam
Jun 21 21:10:44 onepixel sshd[223849]: Invalid user admin from 87.226.165.143 port 59880
Jun 21 21:10:44 onepixel sshd[223849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.226.165.143 
Jun 21 21:10:44 onepixel sshd[223849]: Invalid user admin from 87.226.165.143 port 59880
Jun 21 21:10:46 onepixel sshd[223849]: Failed password for invalid user admin from 87.226.165.143 port 59880 ssh2
Jun 21 21:14:22 onepixel sshd[225782]: Invalid user webadmin from 87.226.165.143 port 33888
2020-06-22 07:11:07
81.207.99.201 attack
Unauthorized IMAP connection attempt
2020-06-22 07:11:26
178.22.113.16 attackspam
Unauthorized connection attempt detected from IP address 178.22.113.16 to port 80
2020-06-22 07:25:12
223.155.177.93 attackbotsspam
Unauthorized connection attempt detected from IP address 223.155.177.93 to port 23
2020-06-22 07:19:46
199.212.57.244 attackbotsspam
Unauthorized connection attempt detected from IP address 199.212.57.244 to port 3001
2020-06-22 07:00:55

Recently Reported IPs

110.78.138.105 130.61.17.31 120.238.85.131 2606:4700:10::6816:4193
2606:4700:10::6816:104 122.193.247.171 121.230.89.90 2606:4700:10::ac43:1185
2606:4700:10::6814:6609 2606:4700:10::6814:4435 2606:4700:10::6816:3751 2606:4700:10::6814:5410
2606:4700:10::ac43:2700 2606:4700:10::6814:5722 103.118.42.58 94.231.206.156
83.142.209.48 34.79.181.63 216.36.121.76 20.104.233.159