Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.83.66.85 proxy
VPN fraud
2023-05-25 12:40:34
45.83.66.88 attack
" "
2020-08-10 06:53:28
45.83.66.234 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.234 to port 110
2020-07-25 22:19:16
45.83.66.150 attackspambots
Unauthorized connection attempt detected from IP address 45.83.66.150 to port 443
2020-07-23 06:44:11
45.83.66.242 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.242 to port 102
2020-07-09 07:57:57
45.83.66.248 attack
Unauthorized connection attempt detected from IP address 45.83.66.248 to port 102
2020-07-09 07:57:32
45.83.66.71 attackspambots
Unauthorized connection attempt detected from IP address 45.83.66.71 to port 102
2020-07-09 06:53:39
45.83.66.171 attackspam
Unauthorized connection attempt detected from IP address 45.83.66.171 to port 102
2020-07-09 06:53:16
45.83.66.161 attackspam
Unauthorized connection attempt detected from IP address 45.83.66.161 to port 102
2020-07-09 05:07:07
45.83.66.36 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.36 to port 53
2020-07-07 04:59:16
45.83.66.79 attack
Unauthorized connection attempt detected from IP address 45.83.66.79 to port 22
2020-07-07 04:58:54
45.83.66.116 attack
Unauthorized connection attempt detected from IP address 45.83.66.116 to port 110
2020-05-31 04:29:30
45.83.66.185 attackbotsspam
Unauthorized connection attempt detected from IP address 45.83.66.185 to port 110
2020-05-31 02:41:14
45.83.66.17 attackbotsspam
Scanning
2020-05-11 21:31:22
45.83.66.150 attackbots
Hits on port : 2012
2020-04-14 17:06:02
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.83.66.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8830
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.83.66.14.			IN	A

;; AUTHORITY SECTION:
.			285	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 10:19:35 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 14.66.83.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.66.83.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
189.51.103.74 attack
Brute force attempt
2020-06-07 07:16:29
192.99.54.117 attack
k+ssh-bruteforce
2020-06-07 07:28:05
140.143.183.71 attack
$f2bV_matches
2020-06-07 06:54:51
80.211.243.108 attackbots
2020-06-06T22:41:26+0000 Failed SSH Authentication/Brute Force Attack. (Server 6)
2020-06-07 07:05:18
106.12.218.171 attackspam
reported through recidive - multiple failed attempts(SSH)
2020-06-07 06:57:22
77.42.78.45 attackspam
Automatic report - Port Scan Attack
2020-06-07 07:01:09
185.220.103.8 attackspam
Automatic report - Banned IP Access
2020-06-07 07:17:14
150.95.31.150 attackbots
Jun  7 01:08:26 server sshd[7812]: Failed password for root from 150.95.31.150 port 32972 ssh2
Jun  7 01:11:45 server sshd[8353]: Failed password for root from 150.95.31.150 port 55808 ssh2
...
2020-06-07 07:21:37
117.50.20.11 attack
Jun  7 00:33:29 server sshd[3968]: Failed password for root from 117.50.20.11 port 37144 ssh2
Jun  7 00:36:48 server sshd[4264]: Failed password for root from 117.50.20.11 port 32882 ssh2
...
2020-06-07 07:14:23
142.93.182.7 attackbots
Automatic report - XMLRPC Attack
2020-06-07 07:06:37
103.105.128.194 attack
Jun  7 00:21:48 vps sshd[397815]: Failed password for root from 103.105.128.194 port 62059 ssh2
Jun  7 00:23:08 vps sshd[402656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.105.128.194  user=root
Jun  7 00:23:10 vps sshd[402656]: Failed password for root from 103.105.128.194 port 23722 ssh2
Jun  7 00:24:33 vps sshd[407748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.105.128.194  user=root
Jun  7 00:24:35 vps sshd[407748]: Failed password for root from 103.105.128.194 port 34535 ssh2
...
2020-06-07 07:19:01
106.13.66.103 attackbots
Jun  6 23:54:35 home sshd[4318]: Failed password for root from 106.13.66.103 port 51654 ssh2
Jun  6 23:58:03 home sshd[4731]: Failed password for root from 106.13.66.103 port 50930 ssh2
...
2020-06-07 07:16:45
203.106.184.5 attackbotsspam
Automatic report - Port Scan Attack
2020-06-07 07:13:30
89.248.174.193 attack
port
2020-06-07 07:22:08
106.12.6.195 attackspam
reported through recidive - multiple failed attempts(SSH)
2020-06-07 06:58:06

Recently Reported IPs

119.86.251.25 82.177.138.9 201.150.117.97 197.32.236.145
36.154.71.173 42.237.59.206 190.49.10.10 60.248.49.68
45.15.94.171 194.35.226.31 1.62.36.109 41.215.216.24
59.8.33.99 125.227.17.212 60.27.191.11 113.220.28.208
41.193.196.189 93.160.4.137 89.248.165.21 200.194.5.12