Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.83.66.85 proxy
VPN fraud
2023-05-25 12:40:34
45.83.66.88 attack
" "
2020-08-10 06:53:28
45.83.66.234 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.234 to port 110
2020-07-25 22:19:16
45.83.66.150 attackspambots
Unauthorized connection attempt detected from IP address 45.83.66.150 to port 443
2020-07-23 06:44:11
45.83.66.242 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.242 to port 102
2020-07-09 07:57:57
45.83.66.248 attack
Unauthorized connection attempt detected from IP address 45.83.66.248 to port 102
2020-07-09 07:57:32
45.83.66.71 attackspambots
Unauthorized connection attempt detected from IP address 45.83.66.71 to port 102
2020-07-09 06:53:39
45.83.66.171 attackspam
Unauthorized connection attempt detected from IP address 45.83.66.171 to port 102
2020-07-09 06:53:16
45.83.66.161 attackspam
Unauthorized connection attempt detected from IP address 45.83.66.161 to port 102
2020-07-09 05:07:07
45.83.66.36 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.36 to port 53
2020-07-07 04:59:16
45.83.66.79 attack
Unauthorized connection attempt detected from IP address 45.83.66.79 to port 22
2020-07-07 04:58:54
45.83.66.116 attack
Unauthorized connection attempt detected from IP address 45.83.66.116 to port 110
2020-05-31 04:29:30
45.83.66.185 attackbotsspam
Unauthorized connection attempt detected from IP address 45.83.66.185 to port 110
2020-05-31 02:41:14
45.83.66.17 attackbotsspam
Scanning
2020-05-11 21:31:22
45.83.66.150 attackbots
Hits on port : 2012
2020-04-14 17:06:02
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.83.66.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64082
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.83.66.56.			IN	A

;; AUTHORITY SECTION:
.			271	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 07:55:45 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 56.66.83.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.66.83.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
208.93.152.5 attackspambots
Host Scan
2020-09-28 02:07:27
42.224.237.218 attackspam
DATE:2020-09-26 22:33:26, IP:42.224.237.218, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-28 01:51:17
210.14.142.85 attack
Invalid user usuario from 210.14.142.85 port 47568
2020-09-28 01:33:27
211.90.108.185 attack
Automatic report - Port Scan Attack
2020-09-28 01:42:51
31.170.59.35 attack
$f2bV_matches
2020-09-28 02:08:00
129.28.12.228 attackspam
Sep 27 18:21:28 ip106 sshd[26301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.12.228 
Sep 27 18:21:30 ip106 sshd[26301]: Failed password for invalid user teamspeak from 129.28.12.228 port 60602 ssh2
...
2020-09-28 02:07:08
218.92.0.223 attack
Sep 27 19:54:06 OPSO sshd\[14437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.223  user=root
Sep 27 19:54:08 OPSO sshd\[14437\]: Failed password for root from 218.92.0.223 port 26535 ssh2
Sep 27 19:54:12 OPSO sshd\[14437\]: Failed password for root from 218.92.0.223 port 26535 ssh2
Sep 27 19:54:14 OPSO sshd\[14437\]: Failed password for root from 218.92.0.223 port 26535 ssh2
Sep 27 19:54:18 OPSO sshd\[14437\]: Failed password for root from 218.92.0.223 port 26535 ssh2
2020-09-28 01:59:01
182.23.3.226 attackspam
Sep 27 17:56:42 game-panel sshd[2210]: Failed password for root from 182.23.3.226 port 35152 ssh2
Sep 27 18:00:58 game-panel sshd[2369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.23.3.226
Sep 27 18:01:00 game-panel sshd[2369]: Failed password for invalid user cod4server from 182.23.3.226 port 40222 ssh2
2020-09-28 02:04:00
47.63.19.91 attack
Automatic report - Port Scan Attack
2020-09-28 01:41:46
62.112.11.90 attackspambots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-27T14:40:29Z and 2020-09-27T14:49:34Z
2020-09-28 01:29:23
207.191.162.50 attack
port scan and connect, tcp 23 (telnet)
2020-09-28 01:45:31
52.188.63.59 attackspam
Invalid user 222 from 52.188.63.59 port 57235
2020-09-28 01:57:36
51.68.190.223 attackbotsspam
Sep 27 15:24:31 email sshd\[22276\]: Invalid user test2 from 51.68.190.223
Sep 27 15:24:31 email sshd\[22276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.190.223
Sep 27 15:24:33 email sshd\[22276\]: Failed password for invalid user test2 from 51.68.190.223 port 45388 ssh2
Sep 27 15:28:38 email sshd\[23033\]: Invalid user mysql from 51.68.190.223
Sep 27 15:28:38 email sshd\[23033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.190.223
...
2020-09-28 01:43:17
178.128.247.181 attack
2020-09-24 19:15:48 server sshd[66875]: Failed password for invalid user bb from 178.128.247.181 port 36644 ssh2
2020-09-28 01:43:45
51.210.40.91 attackbotsspam
Sep 27 17:48:25 localhost sshd[3671]: Invalid user admin from 51.210.40.91 port 49977
Sep 27 17:48:26 localhost sshd[3671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-3ddd41f1.vps.ovh.net
Sep 27 17:48:25 localhost sshd[3671]: Invalid user admin from 51.210.40.91 port 49977
Sep 27 17:48:27 localhost sshd[3671]: Failed password for invalid user admin from 51.210.40.91 port 49977 ssh2
Sep 27 17:55:07 localhost sshd[4670]: Invalid user deploy from 51.210.40.91 port 43280
...
2020-09-28 02:00:31

Recently Reported IPs

222.79.48.253 152.169.207.201 134.17.16.19 197.63.133.36
14.161.17.133 60.181.79.254 36.95.150.101 182.117.157.216
222.214.118.169 219.141.53.134 117.195.85.214 79.127.50.74
185.46.218.55 223.166.74.180 46.28.161.138 96.32.28.144
115.79.201.240 45.83.64.92 113.75.160.34 154.202.102.253