Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: Data Centre Solutions Limited Liability Company

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attackspambots
Tried sshing with brute force.
2020-03-20 21:23:48
attack
Mar 19 10:49:44 itv-usvr-01 sshd[12729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.1  user=root
Mar 19 10:49:46 itv-usvr-01 sshd[12729]: Failed password for root from 45.80.65.1 port 44544 ssh2
Mar 19 10:56:15 itv-usvr-01 sshd[12965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.1  user=root
Mar 19 10:56:17 itv-usvr-01 sshd[12965]: Failed password for root from 45.80.65.1 port 34536 ssh2
Mar 19 10:58:23 itv-usvr-01 sshd[13059]: Invalid user dev from 45.80.65.1
2020-03-19 14:24:51
attack
Mar 11 23:55:40 DAAP sshd[7681]: Invalid user vmail from 45.80.65.1 port 37274
Mar 11 23:55:40 DAAP sshd[7681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.1
Mar 11 23:55:40 DAAP sshd[7681]: Invalid user vmail from 45.80.65.1 port 37274
Mar 11 23:55:42 DAAP sshd[7681]: Failed password for invalid user vmail from 45.80.65.1 port 37274 ssh2
Mar 12 00:03:29 DAAP sshd[7761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.1  user=root
Mar 12 00:03:31 DAAP sshd[7761]: Failed password for root from 45.80.65.1 port 42286 ssh2
...
2020-03-12 07:20:06
attack
Mar 10 00:36:23 server sshd\[23022\]: Failed password for invalid user tanxjian from 45.80.65.1 port 34586 ssh2
Mar 10 06:42:46 server sshd\[2276\]: Invalid user openfiler from 45.80.65.1
Mar 10 06:42:46 server sshd\[2276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.1 
Mar 10 06:42:49 server sshd\[2276\]: Failed password for invalid user openfiler from 45.80.65.1 port 48380 ssh2
Mar 10 06:51:02 server sshd\[3935\]: Invalid user xguest from 45.80.65.1
Mar 10 06:51:02 server sshd\[3935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.1 
...
2020-03-10 16:04:06
attackbots
Mar  6 01:02:23 MainVPS sshd[24297]: Invalid user gitlab-psql from 45.80.65.1 port 35776
Mar  6 01:02:23 MainVPS sshd[24297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.1
Mar  6 01:02:23 MainVPS sshd[24297]: Invalid user gitlab-psql from 45.80.65.1 port 35776
Mar  6 01:02:25 MainVPS sshd[24297]: Failed password for invalid user gitlab-psql from 45.80.65.1 port 35776 ssh2
Mar  6 01:09:05 MainVPS sshd[4858]: Invalid user bia from 45.80.65.1 port 37054
...
2020-03-06 09:17:19
attackbotsspam
Unauthorized connection attempt detected from IP address 45.80.65.1 to port 2220 [J]
2020-02-04 20:21:27
attackspam
Unauthorized connection attempt detected from IP address 45.80.65.1 to port 2220 [J]
2020-01-30 03:30:26
attackspam
Unauthorized connection attempt detected from IP address 45.80.65.1 to port 2220 [J]
2020-01-13 07:15:12
attackspam
Dec 30 01:16:29 nbi-636 sshd[1962]: Invalid user rpc from 45.80.65.1 port 35730
Dec 30 01:16:31 nbi-636 sshd[1962]: Failed password for invalid user rpc from 45.80.65.1 port 35730 ssh2
Dec 30 01:16:31 nbi-636 sshd[1962]: Received disconnect from 45.80.65.1 port 35730:11: Bye Bye [preauth]
Dec 30 01:16:31 nbi-636 sshd[1962]: Disconnected from 45.80.65.1 port 35730 [preauth]
Dec 30 01:25:12 nbi-636 sshd[3959]: User r.r from 45.80.65.1 not allowed because not listed in AllowUsers
Dec 30 01:25:12 nbi-636 sshd[3959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.1  user=r.r
Dec 30 01:25:13 nbi-636 sshd[3959]: Failed password for invalid user r.r from 45.80.65.1 port 37078 ssh2
Dec 30 01:25:13 nbi-636 sshd[3959]: Received disconnect from 45.80.65.1 port 37078:11: Bye Bye [preauth]
Dec 30 01:25:13 nbi-636 sshd[3959]: Disconnected from 45.80.65.1 port 37078 [preauth]
Dec 30 01:27:38 nbi-636 sshd[4359]: Invalid user nanett from ........
-------------------------------
2020-01-02 17:00:24
attackspambots
"SSH brute force auth login attempt."
2019-12-29 13:54:37
attackspambots
Dec 28 15:28:16 lnxweb61 sshd[28732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.1
2019-12-29 00:32:23
attackbotsspam
Dec 24 05:04:10 h2034429 sshd[8987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.1  user=r.r
Dec 24 05:04:12 h2034429 sshd[8987]: Failed password for r.r from 45.80.65.1 port 53542 ssh2
Dec 24 05:04:12 h2034429 sshd[8987]: Received disconnect from 45.80.65.1 port 53542:11: Bye Bye [preauth]
Dec 24 05:04:12 h2034429 sshd[8987]: Disconnected from 45.80.65.1 port 53542 [preauth]
Dec 24 05:08:51 h2034429 sshd[9015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.1  user=r.r
Dec 24 05:08:53 h2034429 sshd[9015]: Failed password for r.r from 45.80.65.1 port 57344 ssh2
Dec 24 05:08:53 h2034429 sshd[9015]: Received disconnect from 45.80.65.1 port 57344:11: Bye Bye [preauth]
Dec 24 05:08:53 h2034429 sshd[9015]: Disconnected from 45.80.65.1 port 57344 [preauth]
Dec 24 05:10:42 h2034429 sshd[9068]: Invalid user niemila from 45.80.65.1
Dec 24 05:10:42 h2034429 sshd[9068]: pam_unix(........
-------------------------------
2019-12-28 08:56:02
Comments on same subnet:
IP Type Details Datetime
45.80.65.82 attackspambots
Invalid user mike from 45.80.65.82 port 38116
2020-10-04 06:25:55
45.80.65.82 attackbotsspam
2020-10-03T12:34:29.313181abusebot.cloudsearch.cf sshd[26610]: Invalid user svnroot from 45.80.65.82 port 35392
2020-10-03T12:34:29.318278abusebot.cloudsearch.cf sshd[26610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.82
2020-10-03T12:34:29.313181abusebot.cloudsearch.cf sshd[26610]: Invalid user svnroot from 45.80.65.82 port 35392
2020-10-03T12:34:32.001366abusebot.cloudsearch.cf sshd[26610]: Failed password for invalid user svnroot from 45.80.65.82 port 35392 ssh2
2020-10-03T12:40:20.408356abusebot.cloudsearch.cf sshd[26641]: Invalid user mcserver from 45.80.65.82 port 41802
2020-10-03T12:40:20.414330abusebot.cloudsearch.cf sshd[26641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.82
2020-10-03T12:40:20.408356abusebot.cloudsearch.cf sshd[26641]: Invalid user mcserver from 45.80.65.82 port 41802
2020-10-03T12:40:22.951649abusebot.cloudsearch.cf sshd[26641]: Failed password for inva
...
2020-10-03 22:30:46
45.80.65.82 attack
Sep 15 20:03:34 router sshd[9140]: Failed password for root from 45.80.65.82 port 51044 ssh2
Sep 15 20:09:32 router sshd[9226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.82 
Sep 15 20:09:34 router sshd[9226]: Failed password for invalid user guillaume from 45.80.65.82 port 35604 ssh2
...
2020-09-16 02:43:58
45.80.65.82 attack
Sep 14 22:40:55 php1 sshd\[8683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.82  user=root
Sep 14 22:40:57 php1 sshd\[8683\]: Failed password for root from 45.80.65.82 port 58698 ssh2
Sep 14 22:46:34 php1 sshd\[9181\]: Invalid user admin from 45.80.65.82
Sep 14 22:46:34 php1 sshd\[9181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.82
Sep 14 22:46:37 php1 sshd\[9181\]: Failed password for invalid user admin from 45.80.65.82 port 42856 ssh2
2020-09-15 18:42:22
45.80.65.82 attackbotsspam
web-1 [ssh] SSH Attack
2020-08-18 19:03:58
45.80.65.82 attack
Jul 29 14:24:28 minden010 sshd[19051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.82
Jul 29 14:24:30 minden010 sshd[19051]: Failed password for invalid user fujino from 45.80.65.82 port 36040 ssh2
Jul 29 14:30:49 minden010 sshd[21234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.82
...
2020-07-29 21:08:23
45.80.65.82 attack
Unauthorized SSH login attempts
2020-07-27 05:10:35
45.80.65.82 attackbots
Invalid user kanishk from 45.80.65.82 port 38362
2020-07-18 23:33:27
45.80.65.82 attackspam
(sshd) Failed SSH login from 45.80.65.82 (RU/Russia/-): 5 in the last 3600 secs
2020-07-17 15:43:41
45.80.65.82 attackbots
Jul 16 10:15:14 Host-KLAX-C sshd[20620]: Invalid user general from 45.80.65.82 port 52096
...
2020-07-17 04:41:52
45.80.65.82 attackbotsspam
$f2bV_matches
2020-07-10 23:21:54
45.80.65.82 attackspam
Jun 30 17:30:04 ns381471 sshd[22839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.82
Jun 30 17:30:06 ns381471 sshd[22839]: Failed password for invalid user oc from 45.80.65.82 port 45404 ssh2
2020-06-30 23:31:21
45.80.65.82 attack
Jun 25 14:48:44 xeon sshd[60351]: Failed password for invalid user test from 45.80.65.82 port 34528 ssh2
2020-06-25 23:41:58
45.80.65.82 attack
(sshd) Failed SSH login from 45.80.65.82 (RU/Russia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 15 23:07:03 amsweb01 sshd[14765]: Invalid user ts from 45.80.65.82 port 35952
Jun 15 23:07:05 amsweb01 sshd[14765]: Failed password for invalid user ts from 45.80.65.82 port 35952 ssh2
Jun 15 23:22:02 amsweb01 sshd[16660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.82  user=root
Jun 15 23:22:04 amsweb01 sshd[16660]: Failed password for root from 45.80.65.82 port 33344 ssh2
Jun 15 23:27:16 amsweb01 sshd[17441]: Invalid user chenwk from 45.80.65.82 port 60332
2020-06-16 06:51:52
45.80.65.82 attackspam
" "
2020-06-08 18:03:22
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.80.65.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32799
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.80.65.1.			IN	A

;; AUTHORITY SECTION:
.			247	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122702 1800 900 604800 86400

;; Query time: 117 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 28 08:55:58 CST 2019
;; MSG SIZE  rcvd: 114
Host info
Host 1.65.80.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 1.65.80.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.173.67.119 attackbotsspam
$f2bV_matches
2020-05-31 05:03:00
221.235.79.162 attackbots
Unauthorized connection attempt detected from IP address 221.235.79.162 to port 8080
2020-05-31 04:36:13
45.83.67.25 attackbotsspam
Unauthorized connection attempt detected from IP address 45.83.67.25 to port 110
2020-05-31 04:29:07
222.189.68.2 attackbots
Unauthorized connection attempt detected from IP address 222.189.68.2 to port 9530
2020-05-31 04:35:42
180.76.108.118 attackspam
2020-05-30T20:27:13.586200abusebot.cloudsearch.cf sshd[20432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.108.118  user=root
2020-05-30T20:27:15.703320abusebot.cloudsearch.cf sshd[20432]: Failed password for root from 180.76.108.118 port 52050 ssh2
2020-05-30T20:31:16.019388abusebot.cloudsearch.cf sshd[20674]: Invalid user nagios from 180.76.108.118 port 44558
2020-05-30T20:31:16.026671abusebot.cloudsearch.cf sshd[20674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.108.118
2020-05-30T20:31:16.019388abusebot.cloudsearch.cf sshd[20674]: Invalid user nagios from 180.76.108.118 port 44558
2020-05-30T20:31:18.503279abusebot.cloudsearch.cf sshd[20674]: Failed password for invalid user nagios from 180.76.108.118 port 44558 ssh2
2020-05-30T20:34:18.379304abusebot.cloudsearch.cf sshd[20888]: Invalid user kfranklin from 180.76.108.118 port 59342
...
2020-05-31 04:36:53
192.99.4.63 attack
(CT) IP 192.99.4.63 (CA/Canada/ns511543.ip-192-99-4.net) found to have 376 connections
2020-05-31 05:02:17
45.74.18.11 attack
Unauthorized connection attempt from IP address 45.74.18.11 on Port 445(SMB)
2020-05-31 04:51:15
134.175.231.167 attackbots
(sshd) Failed SSH login from 134.175.231.167 (CN/China/-): 5 in the last 3600 secs
2020-05-31 05:05:39
151.73.95.67 attackspam
Automatic report - Port Scan Attack
2020-05-31 04:58:51
131.255.236.182 attackspambots
Unauthorized connection attempt from IP address 131.255.236.182 on Port 445(SMB)
2020-05-31 04:59:03
106.13.147.69 attackspam
May 30 13:24:05 pixelmemory sshd[332175]: Failed password for root from 106.13.147.69 port 48676 ssh2
May 30 13:28:05 pixelmemory sshd[345628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.147.69  user=root
May 30 13:28:07 pixelmemory sshd[345628]: Failed password for root from 106.13.147.69 port 45216 ssh2
May 30 13:31:56 pixelmemory sshd[352699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.147.69  user=root
May 30 13:31:58 pixelmemory sshd[352699]: Failed password for root from 106.13.147.69 port 41728 ssh2
...
2020-05-31 04:59:56
51.75.66.142 attackspam
May 30 22:42:42 piServer sshd[12597]: Failed password for root from 51.75.66.142 port 44222 ssh2
May 30 22:46:12 piServer sshd[12936]: Failed password for root from 51.75.66.142 port 50200 ssh2
...
2020-05-31 04:56:43
222.186.169.192 attackbotsspam
2020-05-30T23:47:40.152455afi-git.jinr.ru sshd[6992]: Failed password for root from 222.186.169.192 port 57090 ssh2
2020-05-30T23:47:43.745122afi-git.jinr.ru sshd[6992]: Failed password for root from 222.186.169.192 port 57090 ssh2
2020-05-30T23:47:46.751468afi-git.jinr.ru sshd[6992]: Failed password for root from 222.186.169.192 port 57090 ssh2
2020-05-30T23:47:46.751625afi-git.jinr.ru sshd[6992]: error: maximum authentication attempts exceeded for root from 222.186.169.192 port 57090 ssh2 [preauth]
2020-05-30T23:47:46.751639afi-git.jinr.ru sshd[6992]: Disconnecting: Too many authentication failures [preauth]
...
2020-05-31 04:54:23
162.243.76.161 attackbotsspam
$f2bV_matches
2020-05-31 04:49:17
91.107.87.127 attackbotsspam
May 30 22:31:47 * sshd[32356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.107.87.127
May 30 22:31:49 * sshd[32356]: Failed password for invalid user nazih from 91.107.87.127 port 53184 ssh2
2020-05-31 04:55:37

Recently Reported IPs

46.214.10.107 213.150.117.22 134.209.249.210 140.132.208.20
43.182.15.165 238.43.149.6 70.237.45.118 201.91.47.32
182.77.133.5 133.20.152.205 142.102.180.62 238.142.1.10
135.21.77.248 155.172.191.208 185.152.133.31 47.164.186.140
39.230.199.223 155.124.178.140 102.13.146.18 215.173.44.118