Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.67.213.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55491
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.67.213.80.			IN	A

;; AUTHORITY SECTION:
.			420	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 23:48:59 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 80.213.67.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.213.67.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.127.39.158 attackspambots
SSH brutforce
2020-05-07 15:55:51
46.28.163.15 attackspam
2020-05-0705:53:001jWXam-00071Q-2o\<=info@whatsup2013.chH=\(localhost\)[46.28.163.15]:44236P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3116id=86a851b8b3984dbe9d6395c6cd19200c2fc55bc694@whatsup2013.chT="Icouldbeyourgoodfriend"fortfarr523@icloud.commonyet1966@yahoo.com2020-05-0705:51:431jWXZV-0006vu-0Z\<=info@whatsup2013.chH=\(localhost\)[113.190.218.109]:40161P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3053id=ae05ed2f240fda290af402515a8eb79bb85287ee0b@whatsup2013.chT="I'mjustinlovewithyou"forcobbtyler13@gmail.comlazarogarbey96@gmail.com2020-05-0705:51:271jWXZG-0006tT-H9\<=info@whatsup2013.chH=\(localhost\)[182.140.133.153]:38394P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3085id=2a04b2e1eac1ebe37f7acc60877359450598d4@whatsup2013.chT="NewlikefromNeely"forltjolsen@hotmail.comdillonbrisbin@gmail.com2020-05-0705:51:501jWXZd-0006x5-Ua\<=info@whatsup2013.chH=\(localhost\)
2020-05-07 15:53:32
213.32.78.219 attack
2020-05-07T06:19:20.729715abusebot-4.cloudsearch.cf sshd[21137]: Invalid user go from 213.32.78.219 port 55446
2020-05-07T06:19:20.737068abusebot-4.cloudsearch.cf sshd[21137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.78.219
2020-05-07T06:19:20.729715abusebot-4.cloudsearch.cf sshd[21137]: Invalid user go from 213.32.78.219 port 55446
2020-05-07T06:19:22.596744abusebot-4.cloudsearch.cf sshd[21137]: Failed password for invalid user go from 213.32.78.219 port 55446 ssh2
2020-05-07T06:23:23.015499abusebot-4.cloudsearch.cf sshd[21472]: Invalid user sinha from 213.32.78.219 port 42694
2020-05-07T06:23:23.022957abusebot-4.cloudsearch.cf sshd[21472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.78.219
2020-05-07T06:23:23.015499abusebot-4.cloudsearch.cf sshd[21472]: Invalid user sinha from 213.32.78.219 port 42694
2020-05-07T06:23:24.240577abusebot-4.cloudsearch.cf sshd[21472]: Failed password
...
2020-05-07 15:49:43
209.97.160.105 attackspambots
May  7 01:42:54 NPSTNNYC01T sshd[9561]: Failed password for root from 209.97.160.105 port 41874 ssh2
May  7 01:46:28 NPSTNNYC01T sshd[9895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.160.105
May  7 01:46:30 NPSTNNYC01T sshd[9895]: Failed password for invalid user wgr from 209.97.160.105 port 34096 ssh2
...
2020-05-07 15:39:02
122.51.211.249 attackspambots
$f2bV_matches
2020-05-07 16:14:46
111.231.238.83 attackspam
May  7 08:07:12 server sshd[25024]: Failed password for invalid user erik from 111.231.238.83 port 54670 ssh2
May  7 08:11:13 server sshd[27913]: Failed password for root from 111.231.238.83 port 37602 ssh2
May  7 08:14:54 server sshd[30625]: Failed password for root from 111.231.238.83 port 48766 ssh2
2020-05-07 15:54:38
151.80.67.240 attackspambots
May  7 06:53:15 OPSO sshd\[12353\]: Invalid user qcj from 151.80.67.240 port 57847
May  7 06:53:15 OPSO sshd\[12353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.67.240
May  7 06:53:17 OPSO sshd\[12353\]: Failed password for invalid user qcj from 151.80.67.240 port 57847 ssh2
May  7 06:57:01 OPSO sshd\[13889\]: Invalid user ks from 151.80.67.240 port 33880
May  7 06:57:01 OPSO sshd\[13889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.67.240
2020-05-07 16:08:09
112.85.42.178 attack
May  7 08:08:42 pve1 sshd[31998]: Failed password for root from 112.85.42.178 port 55584 ssh2
May  7 08:08:47 pve1 sshd[31998]: Failed password for root from 112.85.42.178 port 55584 ssh2
...
2020-05-07 16:10:34
51.255.172.198 attackbots
$f2bV_matches
2020-05-07 16:04:56
222.186.30.112 attackbots
May  7 03:48:57 plusreed sshd[3824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
May  7 03:49:00 plusreed sshd[3824]: Failed password for root from 222.186.30.112 port 15035 ssh2
...
2020-05-07 15:54:08
222.186.15.246 attack
May  7 10:01:28 v22018053744266470 sshd[1304]: Failed password for root from 222.186.15.246 port 57702 ssh2
May  7 10:04:59 v22018053744266470 sshd[1558]: Failed password for root from 222.186.15.246 port 11821 ssh2
...
2020-05-07 16:07:40
156.197.247.19 attack
SSH brutforce
2020-05-07 16:11:27
49.165.96.21 attackspambots
$f2bV_matches
2020-05-07 16:17:06
106.54.114.248 attack
$f2bV_matches
2020-05-07 16:09:29
159.65.4.147 attack
May  7 09:19:39 srv-ubuntu-dev3 sshd[89238]: Invalid user garry from 159.65.4.147
May  7 09:19:39 srv-ubuntu-dev3 sshd[89238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.4.147
May  7 09:19:39 srv-ubuntu-dev3 sshd[89238]: Invalid user garry from 159.65.4.147
May  7 09:19:41 srv-ubuntu-dev3 sshd[89238]: Failed password for invalid user garry from 159.65.4.147 port 49876 ssh2
May  7 09:23:58 srv-ubuntu-dev3 sshd[89973]: Invalid user prueba from 159.65.4.147
May  7 09:23:58 srv-ubuntu-dev3 sshd[89973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.4.147
May  7 09:23:58 srv-ubuntu-dev3 sshd[89973]: Invalid user prueba from 159.65.4.147
May  7 09:24:00 srv-ubuntu-dev3 sshd[89973]: Failed password for invalid user prueba from 159.65.4.147 port 58998 ssh2
May  7 09:28:12 srv-ubuntu-dev3 sshd[90693]: Invalid user sc from 159.65.4.147
...
2020-05-07 15:57:45

Recently Reported IPs

23.238.161.229 60.243.160.188 114.119.138.239 141.237.251.177
5.227.203.247 186.91.169.139 165.3.122.196 94.152.193.202
27.255.90.105 87.80.127.143 219.153.20.218 223.149.231.134
134.236.97.113 45.199.130.98 186.48.141.192 102.65.223.165
222.223.115.237 110.254.235.175 167.172.129.156 187.177.35.21