Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.83.64.255 proxy
45.83.64.255
2023-06-08 13:14:10
45.83.64.235 attackbotsspam
port scan and connect, tcp 80 (http)
2020-09-29 02:48:45
45.83.64.235 attackspambots
port scan and connect, tcp 80 (http)
2020-09-28 18:55:56
45.83.64.178 attackspambots
Port Scan detected!
...
2020-08-30 04:30:20
45.83.64.26 attack
port scan and connect, tcp 143 (imap)
2020-08-23 07:44:39
45.83.64.148 attack
Honeypot hit.
2020-08-17 06:37:32
45.83.64.18 attackbots
Unauthorised access (Aug 11) SRC=45.83.64.18 LEN=40 TOS=0x10 PREC=0x40 TTL=57 ID=1337 DF TCP DPT=21 WINDOW=0 SYN
2020-08-12 03:56:16
45.83.64.174 attack
Unauthorized connection attempt detected from IP address 45.83.64.174 to port 110
2020-07-25 21:58:00
45.83.64.190 attack
Unauthorized connection attempt detected from IP address 45.83.64.190 to port 110
2020-07-25 21:11:17
45.83.64.22 attackbots
Hit honeypot r.
2020-07-18 03:28:54
45.83.64.138 attackbots
Port scan denied
2020-07-13 23:06:08
45.83.64.229 attack
Unauthorized connection attempt detected from IP address 45.83.64.229 to port 102
2020-07-09 07:37:55
45.83.64.177 attack
Unauthorized connection attempt detected from IP address 45.83.64.177 to port 102
2020-07-09 06:09:37
45.83.64.232 attack
Unauthorized connection attempt detected from IP address 45.83.64.232 to port 102
2020-07-09 05:48:12
45.83.64.101 attackspambots
Unauthorized connection attempt detected from IP address 45.83.64.101 to port 102
2020-07-09 05:28:19
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.83.64.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.83.64.109.			IN	A

;; AUTHORITY SECTION:
.			289	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 16:23:32 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 109.64.83.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 109.64.83.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.197.214.199 attackbotsspam
Invalid user sysmanager from 62.197.214.199 port 55480
2019-10-29 07:21:07
222.186.175.167 attack
Oct 28 23:54:07 apollo sshd\[26562\]: Failed password for root from 222.186.175.167 port 52782 ssh2Oct 28 23:54:11 apollo sshd\[26562\]: Failed password for root from 222.186.175.167 port 52782 ssh2Oct 28 23:54:16 apollo sshd\[26562\]: Failed password for root from 222.186.175.167 port 52782 ssh2
...
2019-10-29 07:01:40
94.191.79.156 attackspam
Invalid user benedito from 94.191.79.156 port 45084
2019-10-29 07:18:06
176.199.253.177 attackspam
Invalid user alex from 176.199.253.177 port 49565
2019-10-29 07:08:44
106.12.113.223 attackspambots
Oct 29 01:15:39 sauna sshd[61190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.113.223
Oct 29 01:15:41 sauna sshd[61190]: Failed password for invalid user bodiesel from 106.12.113.223 port 35950 ssh2
...
2019-10-29 07:16:07
140.211.37.108 attack
Invalid user pi from 140.211.37.108 port 27366
2019-10-29 07:32:11
173.18.23.60 attack
$f2bV_matches
2019-10-29 07:29:06
207.6.1.11 attack
Invalid user pvp from 207.6.1.11 port 44572
2019-10-29 07:03:58
174.138.58.149 attack
Invalid user Admin from 174.138.58.149 port 55420
2019-10-29 07:09:06
54.39.246.33 attackspam
Oct 28 23:54:03 ns41 sshd[28810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.246.33
2019-10-29 07:22:46
41.214.20.60 attack
Invalid user matt from 41.214.20.60 port 60112
2019-10-29 07:00:21
197.61.47.178 attack
Invalid user admin from 197.61.47.178 port 47352
2019-10-29 07:05:43
46.105.122.62 attack
Invalid user user from 46.105.122.62 port 49227
2019-10-29 06:59:07
191.34.74.55 attackspam
Invalid user kofoed from 191.34.74.55 port 60250
2019-10-29 07:06:16
213.6.8.38 attack
Invalid user iz from 213.6.8.38 port 45842
2019-10-29 07:02:55

Recently Reported IPs

189.91.4.198 125.122.23.83 171.236.69.79 115.55.100.96
125.213.204.210 203.206.211.112 118.70.182.216 187.162.37.195
206.189.2.6 193.92.185.12 177.249.171.41 186.225.189.8
109.67.64.26 180.242.158.170 1.0.154.62 93.235.200.132
58.11.42.158 125.166.154.93 177.204.11.0 3.12.49.241