Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.83.66.85 proxy
VPN fraud
2023-05-25 12:40:34
45.83.66.88 attack
" "
2020-08-10 06:53:28
45.83.66.234 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.234 to port 110
2020-07-25 22:19:16
45.83.66.150 attackspambots
Unauthorized connection attempt detected from IP address 45.83.66.150 to port 443
2020-07-23 06:44:11
45.83.66.242 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.242 to port 102
2020-07-09 07:57:57
45.83.66.248 attack
Unauthorized connection attempt detected from IP address 45.83.66.248 to port 102
2020-07-09 07:57:32
45.83.66.71 attackspambots
Unauthorized connection attempt detected from IP address 45.83.66.71 to port 102
2020-07-09 06:53:39
45.83.66.171 attackspam
Unauthorized connection attempt detected from IP address 45.83.66.171 to port 102
2020-07-09 06:53:16
45.83.66.161 attackspam
Unauthorized connection attempt detected from IP address 45.83.66.161 to port 102
2020-07-09 05:07:07
45.83.66.36 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.36 to port 53
2020-07-07 04:59:16
45.83.66.79 attack
Unauthorized connection attempt detected from IP address 45.83.66.79 to port 22
2020-07-07 04:58:54
45.83.66.116 attack
Unauthorized connection attempt detected from IP address 45.83.66.116 to port 110
2020-05-31 04:29:30
45.83.66.185 attackbotsspam
Unauthorized connection attempt detected from IP address 45.83.66.185 to port 110
2020-05-31 02:41:14
45.83.66.17 attackbotsspam
Scanning
2020-05-11 21:31:22
45.83.66.150 attackbots
Hits on port : 2012
2020-04-14 17:06:02
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.83.66.37
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56947
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.83.66.37.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 06:39:06 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 37.66.83.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 37.66.83.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
157.230.140.180 attackbots
Jul 28 08:54:34 server sshd\[14616\]: Invalid user roger1 from 157.230.140.180 port 59336
Jul 28 08:54:34 server sshd\[14616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.140.180
Jul 28 08:54:36 server sshd\[14616\]: Failed password for invalid user roger1 from 157.230.140.180 port 59336 ssh2
Jul 28 08:59:59 server sshd\[10057\]: Invalid user huangniu from 157.230.140.180 port 54450
Jul 28 08:59:59 server sshd\[10057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.140.180
2019-07-28 15:38:05
141.105.102.155 attackbots
Port scan and direct access per IP instead of hostname
2019-07-28 16:12:49
145.255.22.59 attackbotsspam
1,24-06/33 [bc10/m115] concatform PostRequest-Spammer scoring: Durban02
2019-07-28 15:36:59
45.231.31.252 attack
10 attempts against mh_ha-misc-ban on pole.magehost.pro
2019-07-28 15:57:09
176.215.254.233 attack
Port scan and direct access per IP instead of hostname
2019-07-28 15:44:39
159.89.169.109 attackbots
SSH invalid-user multiple login try
2019-07-28 15:33:17
123.22.245.87 attack
port scan and connect, tcp 22 (ssh)
2019-07-28 16:41:24
140.143.16.158 attackspam
GET /thinkphp/html/public/index.php HTTP/1.1
2019-07-28 16:13:13
107.170.237.222 attackbots
port scan and connect, tcp 81 (hosts2-ns)
2019-07-28 15:47:56
142.93.32.146 attack
Jul 28 06:22:41 apollo sshd\[4910\]: Failed password for root from 142.93.32.146 port 36136 ssh2Jul 28 06:26:42 apollo sshd\[5194\]: Failed password for root from 142.93.32.146 port 58288 ssh2Jul 28 06:30:46 apollo sshd\[5196\]: Failed password for root from 142.93.32.146 port 52214 ssh2
...
2019-07-28 16:02:20
203.153.46.89 attackspambots
Jul 28 04:38:42 host sshd\[50838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.153.46.89  user=root
Jul 28 04:38:44 host sshd\[50838\]: Failed password for root from 203.153.46.89 port 57406 ssh2
...
2019-07-28 15:45:15
165.22.26.134 attackbotsspam
Jul 28 10:18:19 vps65 sshd\[24431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.26.134  user=root
Jul 28 10:18:22 vps65 sshd\[24431\]: Failed password for root from 165.22.26.134 port 55024 ssh2
...
2019-07-28 16:21:05
178.19.109.66 attackspambots
Automatic report - Banned IP Access
2019-07-28 15:42:27
104.206.128.78 attackspambots
3389BruteforceFW22
2019-07-28 15:33:38
78.110.159.40 attackbots
" "
2019-07-28 16:07:04

Recently Reported IPs

41.33.31.81 165.22.230.160 163.125.0.180 115.63.35.167
85.115.232.230 112.17.145.84 112.248.82.249 46.149.187.93
183.82.152.249 103.126.161.99 14.240.133.119 49.82.156.57
1.55.177.25 186.224.248.98 104.43.219.249 161.35.126.102
105.158.42.201 1.15.133.216 87.27.216.43 170.205.147.147