Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.156.130.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.156.130.46.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025033101 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 01 07:00:22 CST 2025
;; MSG SIZE  rcvd: 106
Host info
46.130.156.45.in-addr.arpa domain name pointer sh-phx-us-gd11-wk102b.internet-census.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
46.130.156.45.in-addr.arpa	name = sh-phx-us-gd11-wk102b.internet-census.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
120.92.89.30 attackbots
$f2bV_matches
2020-06-08 03:32:40
116.196.89.78 attackspambots
Jun  7 14:14:57 legacy sshd[5573]: Failed password for root from 116.196.89.78 port 45562 ssh2
Jun  7 14:19:52 legacy sshd[5766]: Failed password for root from 116.196.89.78 port 34572 ssh2
...
2020-06-08 03:11:33
105.112.123.4 attackspambots
Unauthorized connection attempt from IP address 105.112.123.4 on Port 445(SMB)
2020-06-08 03:20:23
81.215.235.243 attackbotsspam
Unauthorized connection attempt from IP address 81.215.235.243 on Port 445(SMB)
2020-06-08 03:31:48
79.11.249.33 attack
Telnet Honeypot -> Telnet Bruteforce / Login
2020-06-08 03:42:17
42.112.94.208 attackspambots
Unauthorized connection attempt from IP address 42.112.94.208 on Port 445(SMB)
2020-06-08 03:38:08
45.55.231.94 attack
Jun  7 19:39:03 srv sshd[7794]: Failed password for root from 45.55.231.94 port 47314 ssh2
2020-06-08 03:25:25
216.218.206.125 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-06-08 03:38:21
196.27.127.61 attackspambots
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-08 03:28:39
212.1.118.170 attack
Unauthorized connection attempt from IP address 212.1.118.170 on Port 445(SMB)
2020-06-08 03:43:10
200.38.224.162 attackbotsspam
[H1.VM1] Blocked by UFW
2020-06-08 03:11:21
101.89.197.232 attackspambots
Jun  7 13:53:37 prod4 sshd\[26631\]: Failed password for root from 101.89.197.232 port 54964 ssh2
Jun  7 13:56:07 prod4 sshd\[27298\]: Failed password for root from 101.89.197.232 port 46950 ssh2
Jun  7 14:01:53 prod4 sshd\[30105\]: Failed password for root from 101.89.197.232 port 59180 ssh2
...
2020-06-08 03:40:45
185.234.216.214 attackbotsspam
2020-06-07 20:14:14 auth_plain authenticator failed for (User) [185.234.216.214]: 535 Incorrect authentication data
2020-06-07 22:11:06 auth_plain authenticator failed for (User) [185.234.216.214]: 535 Incorrect authentication data (set_id=data@lavrinenko.info,)
...
2020-06-08 03:32:18
120.132.14.42 attackbots
$f2bV_matches
2020-06-08 03:45:29
223.85.222.14 attack
Jun  7 13:51:28 mail sshd[16220]: Failed password for root from 223.85.222.14 port 35704 ssh2
...
2020-06-08 03:14:53

Recently Reported IPs

159.89.12.50 45.156.130.4 45.156.129.132 124.156.226.179
114.35.174.39 113.61.243.40 152.176.238.215 71.236.157.233
48.142.0.104 96.133.75.141 7.179.69.231 250.34.155.119
97.36.75.39 189.100.122.254 85.203.34.117 48.222.2.101
173.225.174.6 37.213.77.25 140.243.130.70 6.5.227.13