Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.165.145.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37692
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.165.145.152.			IN	A

;; AUTHORITY SECTION:
.			166	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 17:58:05 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 152.145.165.52.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 152.145.165.52.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.229.78.120 attack
2020-05-04T01:12:45.563631ns386461 sshd\[23059\]: Invalid user bun from 111.229.78.120 port 45570
2020-05-04T01:12:45.567847ns386461 sshd\[23059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.78.120
2020-05-04T01:12:47.698481ns386461 sshd\[23059\]: Failed password for invalid user bun from 111.229.78.120 port 45570 ssh2
2020-05-04T01:30:34.775476ns386461 sshd\[6958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.78.120  user=root
2020-05-04T01:30:36.328991ns386461 sshd\[6958\]: Failed password for root from 111.229.78.120 port 60168 ssh2
...
2020-05-04 08:27:52
168.138.144.172 attackspambots
Hacking
2020-05-04 08:21:01
195.144.21.56 attack
May  4 02:49:34 debian-2gb-nbg1-2 kernel: \[10812276.170733\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.144.21.56 DST=195.201.40.59 LEN=32 TOS=0x08 PREC=0x00 TTL=116 ID=38891 PROTO=UDP SPT=27221 DPT=7 LEN=12
2020-05-04 08:53:15
80.82.77.240 attack
May  4 02:44:50 debian-2gb-nbg1-2 kernel: \[10811992.178011\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.77.240 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=60942 PROTO=TCP SPT=64344 DPT=6464 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-04 08:56:27
218.78.79.147 attack
May  4 01:13:11 lock-38 sshd[1889071]: Disconnected from authenticating user root 218.78.79.147 port 40380 [preauth]
May  4 01:38:32 lock-38 sshd[1889904]: Invalid user steam from 218.78.79.147 port 39874
May  4 01:38:32 lock-38 sshd[1889904]: Invalid user steam from 218.78.79.147 port 39874
May  4 01:38:32 lock-38 sshd[1889904]: Failed password for invalid user steam from 218.78.79.147 port 39874 ssh2
May  4 01:38:32 lock-38 sshd[1889904]: Disconnected from invalid user steam 218.78.79.147 port 39874 [preauth]
...
2020-05-04 08:47:44
180.76.174.39 attack
May  3 15:52:17 XXX sshd[4486]: Invalid user tu from 180.76.174.39 port 34986
2020-05-04 08:35:25
220.181.108.119 attack
Automatic report - Banned IP Access
2020-05-04 08:26:02
134.122.16.19 attackbotsspam
" "
2020-05-04 08:29:04
198.108.67.97 attackbotsspam
firewall-block, port(s): 3270/tcp
2020-05-04 08:49:31
129.204.205.125 attackbotsspam
k+ssh-bruteforce
2020-05-04 09:02:14
91.215.222.66 attackspam
445/tcp 445/tcp 445/tcp...
[2020-04-27/05-03]5pkt,1pt.(tcp)
2020-05-04 09:02:35
49.232.51.60 attack
May  4 01:51:45 mail1 sshd\[31268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.51.60  user=root
May  4 01:51:48 mail1 sshd\[31268\]: Failed password for root from 49.232.51.60 port 52040 ssh2
May  4 01:57:10 mail1 sshd\[31331\]: Invalid user trash from 49.232.51.60 port 59082
May  4 01:57:10 mail1 sshd\[31331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.51.60
May  4 01:57:13 mail1 sshd\[31331\]: Failed password for invalid user trash from 49.232.51.60 port 59082 ssh2
...
2020-05-04 08:31:00
165.22.58.93 attackbots
May  4 00:04:35 home sshd[31751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.58.93
May  4 00:04:37 home sshd[31751]: Failed password for invalid user lcp from 165.22.58.93 port 39790 ssh2
May  4 00:09:39 home sshd[624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.58.93
...
2020-05-04 08:19:12
45.143.223.103 attackspam
Brute forcing email accounts
2020-05-04 08:32:30
171.240.1.47 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 03-05-2020 21:35:14.
2020-05-04 09:05:11

Recently Reported IPs

103.80.14.31 171.38.146.169 77.13.18.216 177.86.161.148
184.168.123.174 1.54.165.127 43.224.152.124 12.147.30.6
167.86.78.234 180.188.251.112 183.0.141.189 103.75.197.51
45.129.18.74 89.237.36.129 188.148.174.103 162.62.219.205
167.57.48.140 31.183.165.79 46.71.20.84 42.239.104.242