Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.83.66.85 proxy
VPN fraud
2023-05-25 12:40:34
45.83.66.88 attack
" "
2020-08-10 06:53:28
45.83.66.234 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.234 to port 110
2020-07-25 22:19:16
45.83.66.150 attackspambots
Unauthorized connection attempt detected from IP address 45.83.66.150 to port 443
2020-07-23 06:44:11
45.83.66.242 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.242 to port 102
2020-07-09 07:57:57
45.83.66.248 attack
Unauthorized connection attempt detected from IP address 45.83.66.248 to port 102
2020-07-09 07:57:32
45.83.66.71 attackspambots
Unauthorized connection attempt detected from IP address 45.83.66.71 to port 102
2020-07-09 06:53:39
45.83.66.171 attackspam
Unauthorized connection attempt detected from IP address 45.83.66.171 to port 102
2020-07-09 06:53:16
45.83.66.161 attackspam
Unauthorized connection attempt detected from IP address 45.83.66.161 to port 102
2020-07-09 05:07:07
45.83.66.36 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.36 to port 53
2020-07-07 04:59:16
45.83.66.79 attack
Unauthorized connection attempt detected from IP address 45.83.66.79 to port 22
2020-07-07 04:58:54
45.83.66.116 attack
Unauthorized connection attempt detected from IP address 45.83.66.116 to port 110
2020-05-31 04:29:30
45.83.66.185 attackbotsspam
Unauthorized connection attempt detected from IP address 45.83.66.185 to port 110
2020-05-31 02:41:14
45.83.66.17 attackbotsspam
Scanning
2020-05-11 21:31:22
45.83.66.150 attackbots
Hits on port : 2012
2020-04-14 17:06:02
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.83.66.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46326
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.83.66.42.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 07:56:16 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 42.66.83.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.66.83.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.49.207.240 attackspam
May 22 15:33:19 vps687878 sshd\[10617\]: Failed password for invalid user mkq from 37.49.207.240 port 42224 ssh2
May 22 15:37:29 vps687878 sshd\[11130\]: Invalid user pvg from 37.49.207.240 port 49190
May 22 15:37:29 vps687878 sshd\[11130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.207.240
May 22 15:37:31 vps687878 sshd\[11130\]: Failed password for invalid user pvg from 37.49.207.240 port 49190 ssh2
May 22 15:41:42 vps687878 sshd\[11825\]: Invalid user gsr from 37.49.207.240 port 56158
May 22 15:41:42 vps687878 sshd\[11825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.207.240
...
2020-05-22 21:42:56
116.236.168.141 attack
May 22 15:13:05 vps sshd[661067]: Failed password for invalid user gow from 116.236.168.141 port 33923 ssh2
May 22 15:16:35 vps sshd[679206]: Invalid user rzt from 116.236.168.141 port 33856
May 22 15:16:35 vps sshd[679206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.168.141
May 22 15:16:37 vps sshd[679206]: Failed password for invalid user rzt from 116.236.168.141 port 33856 ssh2
May 22 15:20:05 vps sshd[694364]: Invalid user ode from 116.236.168.141 port 33672
...
2020-05-22 21:34:15
23.94.166.6 attack
(From claudiauclement@yahoo.com) Hi, We are wondering if you would be interested in our service, where we can provide you with a dofollow link from Amazon (DA 96) back to familychiropractorsofridgewood.com?

The price is just $77 per link, via Paypal.

To explain what DA is and the benefit for your website, along with a sample of an existing link, please read here: https://justpaste.it/4fnds

If you'd be interested in learning more, reply to this email but please make sure you include the word INTERESTED in the subject line field, so we can get to your reply sooner.

Kind Regards,
Claudia
2020-05-22 21:32:25
152.136.102.131 attack
Repeated brute force against a port
2020-05-22 21:45:53
157.245.219.63 attack
2020-05-22T15:01:04.966671galaxy.wi.uni-potsdam.de sshd[7510]: Invalid user wmo from 157.245.219.63 port 38218
2020-05-22T15:01:04.971428galaxy.wi.uni-potsdam.de sshd[7510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.219.63
2020-05-22T15:01:04.966671galaxy.wi.uni-potsdam.de sshd[7510]: Invalid user wmo from 157.245.219.63 port 38218
2020-05-22T15:01:07.116167galaxy.wi.uni-potsdam.de sshd[7510]: Failed password for invalid user wmo from 157.245.219.63 port 38218 ssh2
2020-05-22T15:03:18.197701galaxy.wi.uni-potsdam.de sshd[7736]: Invalid user ygj from 157.245.219.63 port 45840
2020-05-22T15:03:18.202700galaxy.wi.uni-potsdam.de sshd[7736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.219.63
2020-05-22T15:03:18.197701galaxy.wi.uni-potsdam.de sshd[7736]: Invalid user ygj from 157.245.219.63 port 45840
2020-05-22T15:03:20.076585galaxy.wi.uni-potsdam.de sshd[7736]: Failed password for inval
...
2020-05-22 21:40:47
14.204.136.125 attackbotsspam
Invalid user uhw from 14.204.136.125 port 18744
2020-05-22 21:59:12
88.248.13.196 attackbotsspam
Automatic report - Banned IP Access
2020-05-22 21:37:58
171.100.220.19 attack
Spam detected 2020.05.18 05:31:58
blocked until 2020.06.12 02:03:21
2020-05-22 22:06:12
117.240.60.34 attackspambots
Spam detected 2020.05.18 08:12:22
blocked until 2020.06.12 04:43:45
2020-05-22 22:08:55
69.94.131.43 attackbots
Spam detected 2020.05.18 08:09:20
blocked until 2020.06.12 04:40:43
2020-05-22 22:14:00
51.255.168.254 attack
May 22 15:14:33 mail sshd[27412]: Invalid user fut from 51.255.168.254
...
2020-05-22 22:14:16
222.186.15.10 attackspam
May 22 15:57:12 dev0-dcde-rnet sshd[17974]: Failed password for root from 222.186.15.10 port 47510 ssh2
May 22 15:57:21 dev0-dcde-rnet sshd[17976]: Failed password for root from 222.186.15.10 port 51404 ssh2
May 22 15:57:24 dev0-dcde-rnet sshd[17976]: Failed password for root from 222.186.15.10 port 51404 ssh2
2020-05-22 21:58:14
211.150.70.204 attack
Spam detected 2020.05.18 09:24:22
blocked until 2020.05.21 09:24:22
2020-05-22 22:00:34
89.40.73.249 attack
[Fri May 22 18:54:27.969794 2020] [:error] [pid 17334:tid 140533709563648] [client 89.40.73.249:61470] [client 89.40.73.249] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "Xse9c2NHAVP8-kBLHCfUfQAAAko"]
...
2020-05-22 21:44:32
183.88.243.109 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-05-22 21:38:23

Recently Reported IPs

117.176.251.110 87.237.41.187 106.15.186.167 109.206.8.121
45.138.103.133 49.51.191.4 200.53.28.199 190.111.200.40
116.99.40.136 101.35.6.240 85.202.169.121 219.155.193.0
103.122.108.44 141.154.15.133 203.204.232.18 72.217.158.197
24.57.240.70 103.236.252.227 200.57.104.134 118.97.119.98