Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.83.66.85 proxy
VPN fraud
2023-05-25 12:40:34
45.83.66.88 attack
" "
2020-08-10 06:53:28
45.83.66.234 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.234 to port 110
2020-07-25 22:19:16
45.83.66.150 attackspambots
Unauthorized connection attempt detected from IP address 45.83.66.150 to port 443
2020-07-23 06:44:11
45.83.66.242 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.242 to port 102
2020-07-09 07:57:57
45.83.66.248 attack
Unauthorized connection attempt detected from IP address 45.83.66.248 to port 102
2020-07-09 07:57:32
45.83.66.71 attackspambots
Unauthorized connection attempt detected from IP address 45.83.66.71 to port 102
2020-07-09 06:53:39
45.83.66.171 attackspam
Unauthorized connection attempt detected from IP address 45.83.66.171 to port 102
2020-07-09 06:53:16
45.83.66.161 attackspam
Unauthorized connection attempt detected from IP address 45.83.66.161 to port 102
2020-07-09 05:07:07
45.83.66.36 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.36 to port 53
2020-07-07 04:59:16
45.83.66.79 attack
Unauthorized connection attempt detected from IP address 45.83.66.79 to port 22
2020-07-07 04:58:54
45.83.66.116 attack
Unauthorized connection attempt detected from IP address 45.83.66.116 to port 110
2020-05-31 04:29:30
45.83.66.185 attackbotsspam
Unauthorized connection attempt detected from IP address 45.83.66.185 to port 110
2020-05-31 02:41:14
45.83.66.17 attackbotsspam
Scanning
2020-05-11 21:31:22
45.83.66.150 attackbots
Hits on port : 2012
2020-04-14 17:06:02
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.83.66.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5170
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.83.66.134.			IN	A

;; AUTHORITY SECTION:
.			438	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 04:10:38 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 134.66.83.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.66.83.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.128.62.22 attackbotsspam
RDP Bruteforce
2020-09-15 21:30:08
114.99.18.131 attackbotsspam
spam (f2b h2)
2020-09-15 21:15:51
38.109.219.159 attackbots
Invalid user bimba from 38.109.219.159 port 35802
2020-09-15 21:48:18
213.87.44.152 attackbotsspam
Sep 15 13:58:07 rancher-0 sshd[63332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.87.44.152  user=root
Sep 15 13:58:09 rancher-0 sshd[63332]: Failed password for root from 213.87.44.152 port 37916 ssh2
...
2020-09-15 21:38:08
93.149.180.144 attack
Invalid user bp1123 from 93.149.180.144 port 55042
2020-09-15 21:32:00
167.99.6.106 attackbotsspam
Invalid user postgres from 167.99.6.106 port 50960
2020-09-15 21:25:20
93.76.71.130 attackspambots
RDP Bruteforce
2020-09-15 21:17:43
120.53.117.206 attackspambots
RDP Bruteforce
2020-09-15 21:12:42
47.57.181.13 attackbotsspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-15 21:37:43
131.1.241.85 attackspambots
2020-09-14T06:22:50.998940morrigan.ad5gb.com sshd[1919774]: Disconnected from authenticating user root 131.1.241.85 port 35058 [preauth]
2020-09-15 21:27:21
198.211.31.168 attackbots
5x Failed Password
2020-09-15 21:46:09
89.219.10.74 attackbotsspam
RDP Bruteforce
2020-09-15 21:17:55
177.124.23.152 attackbots
Sep 14 18:54:44 xeon postfix/smtpd[61629]: warning: 177-124-23-152.altinformatica.com.br[177.124.23.152]: SASL PLAIN authentication failed: authentication failure
2020-09-15 21:24:21
84.216.26.136 attackbotsspam
Port 22 Scan, PTR: None
2020-09-15 21:32:28
113.161.64.22 attackspambots
Invalid user sybase from 113.161.64.22 port 43387
2020-09-15 21:34:35

Recently Reported IPs

64.62.197.123 76.69.231.79 187.178.71.125 89.113.127.105
45.180.251.13 187.162.75.185 27.40.77.214 119.145.140.78
119.6.122.72 5.152.86.46 115.148.152.49 218.22.93.6
124.238.181.1 177.67.10.15 113.161.72.144 82.157.146.116
172.69.237.69 114.26.95.119 95.213.197.2 103.87.89.23