Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.83.64.255 proxy
45.83.64.255
2023-06-08 13:14:10
45.83.64.235 attackbotsspam
port scan and connect, tcp 80 (http)
2020-09-29 02:48:45
45.83.64.235 attackspambots
port scan and connect, tcp 80 (http)
2020-09-28 18:55:56
45.83.64.178 attackspambots
Port Scan detected!
...
2020-08-30 04:30:20
45.83.64.26 attack
port scan and connect, tcp 143 (imap)
2020-08-23 07:44:39
45.83.64.148 attack
Honeypot hit.
2020-08-17 06:37:32
45.83.64.18 attackbots
Unauthorised access (Aug 11) SRC=45.83.64.18 LEN=40 TOS=0x10 PREC=0x40 TTL=57 ID=1337 DF TCP DPT=21 WINDOW=0 SYN
2020-08-12 03:56:16
45.83.64.174 attack
Unauthorized connection attempt detected from IP address 45.83.64.174 to port 110
2020-07-25 21:58:00
45.83.64.190 attack
Unauthorized connection attempt detected from IP address 45.83.64.190 to port 110
2020-07-25 21:11:17
45.83.64.22 attackbots
Hit honeypot r.
2020-07-18 03:28:54
45.83.64.138 attackbots
Port scan denied
2020-07-13 23:06:08
45.83.64.229 attack
Unauthorized connection attempt detected from IP address 45.83.64.229 to port 102
2020-07-09 07:37:55
45.83.64.177 attack
Unauthorized connection attempt detected from IP address 45.83.64.177 to port 102
2020-07-09 06:09:37
45.83.64.232 attack
Unauthorized connection attempt detected from IP address 45.83.64.232 to port 102
2020-07-09 05:48:12
45.83.64.101 attackspambots
Unauthorized connection attempt detected from IP address 45.83.64.101 to port 102
2020-07-09 05:28:19
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.83.64.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31671
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.83.64.150.			IN	A

;; AUTHORITY SECTION:
.			282	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 17:47:37 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 150.64.83.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.64.83.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.244.74.13 attackbotsspam
1579150103 - 01/16/2020 05:48:23 Host: 91.244.74.13/91.244.74.13 Port: 445 TCP Blocked
2020-01-16 17:16:00
103.218.110.210 attackspambots
Automatic report - Banned IP Access
2020-01-16 17:41:29
202.175.46.170 attackbotsspam
Unauthorized connection attempt detected from IP address 202.175.46.170 to port 2220 [J]
2020-01-16 17:16:27
58.27.215.37 attackbotsspam
1579150075 - 01/16/2020 05:47:55 Host: 58.27.215.37/58.27.215.37 Port: 445 TCP Blocked
2020-01-16 17:34:51
198.46.214.3 attackbotsspam
(From eric@talkwithcustomer.com) 
Hi,

Let’s take a quick trip to Tomorrow-land.

I’m not talking about a theme park, I’m talking about your business’s future…

Don’t worry, we won’t even need a crystal ball.  

Just imagine… 

… a future where the money you invest in driving traffic to your site andoverspinecenter.com pays off with tons of calls from qualified leads.
 
And the difference between what you experienced in the past is staggering – you’re seeing 10X, 20X, 50X, even up to a 100X more leads coming from your website andoverspinecenter.com.  Leads that are already engaged with what you have to offer and are ready to learn more and even open their wallets.

Seeing all this taking place in your business, you think back: What did I do only a short time ago that made such a huge difference?

And then it hits you: You took advantage of a free 14 day Test Drive of TalkWithCustomer.

You installed TalkWithCustomer on andoverspinecenter.com – it was a snap.

And practically overnight cus
2020-01-16 17:24:36
106.54.2.191 attackspambots
Unauthorized connection attempt detected from IP address 106.54.2.191 to port 2220 [J]
2020-01-16 17:42:18
80.99.180.169 attackbots
Jan 16 07:40:37 meumeu sshd[13642]: Failed password for root from 80.99.180.169 port 59724 ssh2
Jan 16 07:46:48 meumeu sshd[14722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.99.180.169 
Jan 16 07:46:50 meumeu sshd[14722]: Failed password for invalid user ht from 80.99.180.169 port 46106 ssh2
...
2020-01-16 17:32:00
180.76.238.69 attackbotsspam
Jan 14 07:53:49 penfold sshd[29310]: Invalid user vasile from 180.76.238.69 port 32588
Jan 14 07:53:49 penfold sshd[29310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.238.69 
Jan 14 07:53:51 penfold sshd[29310]: Failed password for invalid user vasile from 180.76.238.69 port 32588 ssh2
Jan 14 07:54:08 penfold sshd[29310]: Received disconnect from 180.76.238.69 port 32588:11: Bye Bye [preauth]
Jan 14 07:54:08 penfold sshd[29310]: Disconnected from 180.76.238.69 port 32588 [preauth]
Jan 14 08:25:07 penfold sshd[31212]: Invalid user backups from 180.76.238.69 port 40706
Jan 14 08:25:07 penfold sshd[31212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.238.69 
Jan 14 08:25:10 penfold sshd[31212]: Failed password for invalid user backups from 180.76.238.69 port 40706 ssh2
Jan 14 08:25:10 penfold sshd[31212]: Received disconnect from 180.76.238.69 port 40706:11: Bye Bye [preau........
-------------------------------
2020-01-16 17:30:19
200.160.111.44 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.160.111.44  user=root
Failed password for root from 200.160.111.44 port 7404 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.160.111.44  user=root
Failed password for root from 200.160.111.44 port 20276 ssh2
Invalid user user2 from 200.160.111.44 port 33140
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.160.111.44
2020-01-16 17:47:49
101.91.242.119 attackspambots
Jan 16 05:47:55 mout sshd[18444]: Invalid user student8 from 101.91.242.119 port 51596
2020-01-16 17:33:56
80.28.122.241 attackbotsspam
(sshd) Failed SSH login from 80.28.122.241 (ES/Spain/241.red-80-28-122.staticip.rima-tde.net): 10 in the last 3600 secs
2020-01-16 17:38:53
49.233.183.7 attackbots
Unauthorized connection attempt detected from IP address 49.233.183.7 to port 2220 [J]
2020-01-16 17:43:35
54.88.56.16 attack
Port scan on 1 port(s): 53
2020-01-16 17:43:19
72.22.132.120 attackbots
Automatic report - Port Scan Attack
2020-01-16 17:15:23
2001:bc8:6010:206:ae1f:6bff:fe27:2d70 attack
WordPress wp-login brute force :: 2001:bc8:6010:206:ae1f:6bff:fe27:2d70 0.084 BYPASS [16/Jan/2020:04:48:19  0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2287 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-01-16 17:19:32

Recently Reported IPs

103.36.121.27 106.111.128.164 103.79.112.107 58.234.116.197
80.98.246.105 101.34.72.9 46.100.11.1 125.117.55.241
42.114.46.141 178.62.119.91 177.53.70.125 182.52.30.158
119.117.159.212 171.224.180.123 165.232.182.72 183.83.38.135
34.77.162.27 192.241.202.20 58.186.85.94 192.24.46.94