Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.156.130.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59229
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.156.130.4.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025033101 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 01 07:00:23 CST 2025
;; MSG SIZE  rcvd: 105
Host info
4.130.156.45.in-addr.arpa domain name pointer sh-phx-us-gd11-wk102a.internet-census.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
4.130.156.45.in-addr.arpa	name = sh-phx-us-gd11-wk102a.internet-census.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
157.55.39.36 attack
Automatic report - Banned IP Access
2020-03-26 03:43:12
180.164.50.89 attack
Unauthorized connection attempt from IP address 180.164.50.89 on Port 445(SMB)
2020-03-26 03:39:21
102.134.164.150 attackbotsspam
2020-03-25T17:59:27.608187whonock.onlinehub.pt sshd[30922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.164.150  user=nobody
2020-03-25T17:59:30.043451whonock.onlinehub.pt sshd[30922]: Failed password for nobody from 102.134.164.150 port 55260 ssh2
2020-03-25T18:10:24.123043whonock.onlinehub.pt sshd[2701]: Invalid user american from 102.134.164.150 port 48964
2020-03-25T18:10:24.126012whonock.onlinehub.pt sshd[2701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.164.150
2020-03-25T18:10:24.123043whonock.onlinehub.pt sshd[2701]: Invalid user american from 102.134.164.150 port 48964
2020-03-25T18:10:26.418770whonock.onlinehub.pt sshd[2701]: Failed password for invalid user american from 102.134.164.150 port 48964 ssh2
2020-03-25T18:16:38.774546whonock.onlinehub.pt sshd[5105]: Invalid user celena from 102.134.164.150 port 34166
2020-03-25T18:16:38.777788whonock.onlinehub.pt sshd[5105]: pa
...
2020-03-26 03:40:30
134.255.131.197 attackbots
Unauthorized connection attempt from IP address 134.255.131.197 on Port 445(SMB)
2020-03-26 03:34:50
94.23.216.112 attackspam
Invalid user jcj from 94.23.216.112 port 38084
2020-03-26 03:05:21
36.78.152.167 attack
Unauthorized connection attempt from IP address 36.78.152.167 on Port 445(SMB)
2020-03-26 03:46:50
111.172.6.228 attackspambots
Mar 25 18:23:51 *** sshd[13470]: Invalid user vq from 111.172.6.228
2020-03-26 03:08:09
49.213.214.210 attack
Honeypot attack, port: 81, PTR: 210-214-213-49.tinp.net.tw.
2020-03-26 03:12:33
202.29.80.133 attack
-
2020-03-26 03:42:49
91.134.248.253 attack
CMS (WordPress or Joomla) login attempt.
2020-03-26 03:35:09
92.190.153.246 attackbots
(sshd) Failed SSH login from 92.190.153.246 (ES/Spain/-): 5 in the last 3600 secs
2020-03-26 03:21:06
115.77.184.79 attackbots
Unauthorized connection attempt from IP address 115.77.184.79 on Port 445(SMB)
2020-03-26 03:32:56
141.98.10.137 attackspambots
Mar 25 19:45:37 srv01 postfix/smtpd\[10535\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 25 19:46:13 srv01 postfix/smtpd\[10535\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 25 19:46:30 srv01 postfix/smtpd\[19330\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 25 20:02:02 srv01 postfix/smtpd\[27006\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 25 20:04:12 srv01 postfix/smtpd\[27006\]: warning: unknown\[141.98.10.137\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-03-26 03:06:27
140.143.211.94 attackspambots
Mar 25 18:41:32 vlre-nyc-1 sshd\[27436\]: Invalid user christian from 140.143.211.94
Mar 25 18:41:32 vlre-nyc-1 sshd\[27436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.211.94
Mar 25 18:41:34 vlre-nyc-1 sshd\[27436\]: Failed password for invalid user christian from 140.143.211.94 port 59578 ssh2
Mar 25 18:46:11 vlre-nyc-1 sshd\[27557\]: Invalid user mali from 140.143.211.94
Mar 25 18:46:11 vlre-nyc-1 sshd\[27557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.211.94
...
2020-03-26 03:24:41
138.68.243.208 attack
Mar 25 16:34:53 game-panel sshd[6704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.243.208
Mar 25 16:34:55 game-panel sshd[6704]: Failed password for invalid user farrell from 138.68.243.208 port 51648 ssh2
Mar 25 16:38:53 game-panel sshd[6790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.243.208
2020-03-26 03:13:44

Recently Reported IPs

45.156.130.46 45.156.129.132 124.156.226.179 114.35.174.39
113.61.243.40 152.176.238.215 71.236.157.233 48.142.0.104
96.133.75.141 7.179.69.231 250.34.155.119 97.36.75.39
189.100.122.254 85.203.34.117 48.222.2.101 173.225.174.6
37.213.77.25 140.243.130.70 6.5.227.13 117.210.205.165