Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.156.130.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45643
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.156.130.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025081501 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 16 04:00:14 CST 2025
;; MSG SIZE  rcvd: 106
Host info
40.130.156.45.in-addr.arpa domain name pointer sh-phx-us-gp6-wk104.internet-census.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.130.156.45.in-addr.arpa	name = sh-phx-us-gp6-wk104.internet-census.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.185.27.249 attackspam
Icarus honeypot on github
2020-06-19 07:40:44
51.38.238.165 attack
Invalid user ubuntu from 51.38.238.165 port 47232
2020-06-19 07:22:49
143.106.140.97 attackbotsspam
WordPress brute force
2020-06-19 07:07:40
64.227.67.106 attackspam
(sshd) Failed SSH login from 64.227.67.106 (US/United States/-): 5 in the last 3600 secs
2020-06-19 07:15:42
139.59.87.229 attack
WordPress brute force
2020-06-19 07:09:21
51.91.108.98 attack
2020-06-19T00:51:36.582809rocketchat.forhosting.nl sshd[4844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.108.98
2020-06-19T00:51:36.579940rocketchat.forhosting.nl sshd[4844]: Invalid user appletv from 51.91.108.98 port 42580
2020-06-19T00:51:38.402038rocketchat.forhosting.nl sshd[4844]: Failed password for invalid user appletv from 51.91.108.98 port 42580 ssh2
...
2020-06-19 07:18:25
218.92.0.220 attackbotsspam
Jun 19 01:26:27 * sshd[7569]: Failed password for root from 218.92.0.220 port 58404 ssh2
2020-06-19 07:29:06
93.145.115.206 attackspambots
Jun 19 05:27:28 itv-usvr-02 sshd[23782]: Invalid user CHANGED from 93.145.115.206 port 32495
Jun 19 05:27:28 itv-usvr-02 sshd[23782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.145.115.206
Jun 19 05:27:28 itv-usvr-02 sshd[23782]: Invalid user CHANGED from 93.145.115.206 port 32495
Jun 19 05:27:31 itv-usvr-02 sshd[23782]: Failed password for invalid user CHANGED from 93.145.115.206 port 32495 ssh2
Jun 19 05:31:49 itv-usvr-02 sshd[23940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.145.115.206  user=root
Jun 19 05:31:51 itv-usvr-02 sshd[23940]: Failed password for root from 93.145.115.206 port 57967 ssh2
2020-06-19 07:35:18
162.250.122.203 attackspam
WordPress brute force
2020-06-19 07:04:13
167.249.168.102 attack
Jun 18 15:26:28 askasleikir sshd[43769]: Failed password for invalid user marius from 167.249.168.102 port 29903 ssh2
Jun 18 15:33:19 askasleikir sshd[43786]: Failed password for root from 167.249.168.102 port 17666 ssh2
Jun 18 15:36:56 askasleikir sshd[43794]: Failed password for root from 167.249.168.102 port 32404 ssh2
2020-06-19 07:29:30
180.76.53.230 attackspam
Fail2Ban Ban Triggered
2020-06-19 07:37:32
157.245.133.78 attack
WP login BF
2020-06-19 07:18:54
61.133.232.248 attack
Invalid user deploy from 61.133.232.248 port 27840
2020-06-19 07:25:18
13.234.4.176 attack
Invalid user gh from 13.234.4.176 port 59774
2020-06-19 07:30:54
1.9.78.242 attackbots
Jun 18 18:14:29 ny01 sshd[25409]: Failed password for root from 1.9.78.242 port 54118 ssh2
Jun 18 18:18:04 ny01 sshd[25819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.9.78.242
Jun 18 18:18:06 ny01 sshd[25819]: Failed password for invalid user patrick from 1.9.78.242 port 53709 ssh2
2020-06-19 07:34:19

Recently Reported IPs

47.237.73.50 8.44.59.106 13.214.162.55 183.6.86.109
47.122.125.78 72.129.52.201 104.237.78.156 103.181.254.123
199.45.154.120 185.247.137.238 112.4.101.61 106.75.100.73
106.75.66.75 147.185.133.13 66.11.117.92 35.216.145.137
135.237.125.122 43.248.108.211 112.112.212.156 50.226.220.210