Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.83.64.255 proxy
45.83.64.255
2023-06-08 13:14:10
45.83.64.235 attackbotsspam
port scan and connect, tcp 80 (http)
2020-09-29 02:48:45
45.83.64.235 attackspambots
port scan and connect, tcp 80 (http)
2020-09-28 18:55:56
45.83.64.178 attackspambots
Port Scan detected!
...
2020-08-30 04:30:20
45.83.64.26 attack
port scan and connect, tcp 143 (imap)
2020-08-23 07:44:39
45.83.64.148 attack
Honeypot hit.
2020-08-17 06:37:32
45.83.64.18 attackbots
Unauthorised access (Aug 11) SRC=45.83.64.18 LEN=40 TOS=0x10 PREC=0x40 TTL=57 ID=1337 DF TCP DPT=21 WINDOW=0 SYN
2020-08-12 03:56:16
45.83.64.174 attack
Unauthorized connection attempt detected from IP address 45.83.64.174 to port 110
2020-07-25 21:58:00
45.83.64.190 attack
Unauthorized connection attempt detected from IP address 45.83.64.190 to port 110
2020-07-25 21:11:17
45.83.64.22 attackbots
Hit honeypot r.
2020-07-18 03:28:54
45.83.64.138 attackbots
Port scan denied
2020-07-13 23:06:08
45.83.64.229 attack
Unauthorized connection attempt detected from IP address 45.83.64.229 to port 102
2020-07-09 07:37:55
45.83.64.177 attack
Unauthorized connection attempt detected from IP address 45.83.64.177 to port 102
2020-07-09 06:09:37
45.83.64.232 attack
Unauthorized connection attempt detected from IP address 45.83.64.232 to port 102
2020-07-09 05:48:12
45.83.64.101 attackspambots
Unauthorized connection attempt detected from IP address 45.83.64.101 to port 102
2020-07-09 05:28:19
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.83.64.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49418
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.83.64.158.			IN	A

;; AUTHORITY SECTION:
.			232	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 00:17:20 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 158.64.83.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 158.64.83.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.129.97.48 attackbots
Unauthorized connection attempt detected from IP address 139.129.97.48 to port 8545
2020-02-16 23:43:31
85.192.138.149 attackbots
T: f2b ssh aggressive 3x
2020-02-17 00:29:19
88.247.69.115 attackbotsspam
Unauthorized connection attempt from IP address 88.247.69.115 on Port 445(SMB)
2020-02-17 00:07:05
211.144.12.75 attack
Feb 16 16:20:32 sd-53420 sshd\[25894\]: Invalid user hadoop from 211.144.12.75
Feb 16 16:20:32 sd-53420 sshd\[25894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.144.12.75
Feb 16 16:20:35 sd-53420 sshd\[25894\]: Failed password for invalid user hadoop from 211.144.12.75 port 12504 ssh2
Feb 16 16:24:10 sd-53420 sshd\[26204\]: Invalid user testuser from 211.144.12.75
Feb 16 16:24:10 sd-53420 sshd\[26204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.144.12.75
...
2020-02-16 23:50:33
92.118.38.41 attackspambots
2020-02-16 16:57:16 dovecot_login authenticator failed for \(User\) \[92.118.38.41\]: 535 Incorrect authentication data \(set_id=uncredited@no-server.de\)
2020-02-16 16:57:32 dovecot_login authenticator failed for \(User\) \[92.118.38.41\]: 535 Incorrect authentication data \(set_id=earls@no-server.de\)
2020-02-16 16:57:37 dovecot_login authenticator failed for \(User\) \[92.118.38.41\]: 535 Incorrect authentication data \(set_id=earls@no-server.de\)
2020-02-16 16:57:38 dovecot_login authenticator failed for \(User\) \[92.118.38.41\]: 535 Incorrect authentication data \(set_id=earls@no-server.de\)
2020-02-16 16:57:47 dovecot_login authenticator failed for \(User\) \[92.118.38.41\]: 535 Incorrect authentication data \(set_id=earls@no-server.de\)
...
2020-02-16 23:58:46
34.92.106.23 attackbotsspam
3306/tcp 3306/tcp
[2020-02-16]2pkt
2020-02-17 00:00:33
222.186.180.130 attackspam
Feb 16 16:40:09 MK-Soft-VM8 sshd[28248]: Failed password for root from 222.186.180.130 port 32841 ssh2
Feb 16 16:40:12 MK-Soft-VM8 sshd[28248]: Failed password for root from 222.186.180.130 port 32841 ssh2
...
2020-02-16 23:49:33
45.238.232.42 attackbotsspam
Feb 16 10:44:35 plusreed sshd[24081]: Invalid user salman123 from 45.238.232.42
...
2020-02-16 23:45:25
43.243.127.176 attack
Feb 16 05:44:32 web1 sshd\[8497\]: Invalid user D13HH\[ from 43.243.127.176
Feb 16 05:44:32 web1 sshd\[8497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.243.127.176
Feb 16 05:44:34 web1 sshd\[8497\]: Failed password for invalid user D13HH\[ from 43.243.127.176 port 46984 ssh2
Feb 16 05:49:04 web1 sshd\[8891\]: Invalid user r8_fusion from 43.243.127.176
Feb 16 05:49:04 web1 sshd\[8891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.243.127.176
2020-02-16 23:52:13
104.200.144.166 attack
Feb 16 05:12:15 sachi sshd\[2133\]: Invalid user roz from 104.200.144.166
Feb 16 05:12:15 sachi sshd\[2133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.200.144.166
Feb 16 05:12:17 sachi sshd\[2133\]: Failed password for invalid user roz from 104.200.144.166 port 60464 ssh2
Feb 16 05:15:14 sachi sshd\[2427\]: Invalid user spencer from 104.200.144.166
Feb 16 05:15:14 sachi sshd\[2427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.200.144.166
2020-02-16 23:43:58
141.98.10.137 attack
Root attacks.
2020-02-17 00:32:48
51.68.44.13 attackbots
SSH Brute-Forcing (server2)
2020-02-17 00:12:21
185.110.244.108 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 00:11:56
129.28.106.99 attackbots
Feb 16 16:48:46 server sshd\[5699\]: Invalid user oracle from 129.28.106.99
Feb 16 16:48:46 server sshd\[5699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.106.99 
Feb 16 16:48:47 server sshd\[5699\]: Failed password for invalid user oracle from 129.28.106.99 port 37850 ssh2
Feb 16 16:49:18 server sshd\[5748\]: Invalid user oracle from 129.28.106.99
Feb 16 16:49:18 server sshd\[5748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.106.99 
...
2020-02-17 00:08:36
104.248.21.242 attackspam
Feb 16 04:11:57 web9 sshd\[11360\]: Invalid user cafeuser from 104.248.21.242
Feb 16 04:11:57 web9 sshd\[11360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.21.242
Feb 16 04:11:59 web9 sshd\[11360\]: Failed password for invalid user cafeuser from 104.248.21.242 port 49536 ssh2
Feb 16 04:13:18 web9 sshd\[11579\]: Invalid user kettelson from 104.248.21.242
Feb 16 04:13:18 web9 sshd\[11579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.21.242
2020-02-17 00:22:44

Recently Reported IPs

211.167.230.42 199.59.243.200 98.127.129.145 189.162.16.249
217.226.122.5 123.9.188.163 35.234.88.215 150.158.136.38
151.243.235.86 192.177.188.150 218.72.192.246 189.211.234.210
212.119.44.220 156.200.229.43 203.150.128.84 31.129.82.203
151.243.36.88 110.7.34.150 221.15.199.178 204.48.17.13