Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.83.66.85 proxy
VPN fraud
2023-05-25 12:40:34
45.83.66.88 attack
" "
2020-08-10 06:53:28
45.83.66.234 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.234 to port 110
2020-07-25 22:19:16
45.83.66.150 attackspambots
Unauthorized connection attempt detected from IP address 45.83.66.150 to port 443
2020-07-23 06:44:11
45.83.66.242 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.242 to port 102
2020-07-09 07:57:57
45.83.66.248 attack
Unauthorized connection attempt detected from IP address 45.83.66.248 to port 102
2020-07-09 07:57:32
45.83.66.71 attackspambots
Unauthorized connection attempt detected from IP address 45.83.66.71 to port 102
2020-07-09 06:53:39
45.83.66.171 attackspam
Unauthorized connection attempt detected from IP address 45.83.66.171 to port 102
2020-07-09 06:53:16
45.83.66.161 attackspam
Unauthorized connection attempt detected from IP address 45.83.66.161 to port 102
2020-07-09 05:07:07
45.83.66.36 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.36 to port 53
2020-07-07 04:59:16
45.83.66.79 attack
Unauthorized connection attempt detected from IP address 45.83.66.79 to port 22
2020-07-07 04:58:54
45.83.66.116 attack
Unauthorized connection attempt detected from IP address 45.83.66.116 to port 110
2020-05-31 04:29:30
45.83.66.185 attackbotsspam
Unauthorized connection attempt detected from IP address 45.83.66.185 to port 110
2020-05-31 02:41:14
45.83.66.17 attackbotsspam
Scanning
2020-05-11 21:31:22
45.83.66.150 attackbots
Hits on port : 2012
2020-04-14 17:06:02
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.83.66.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2618
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.83.66.7.			IN	A

;; AUTHORITY SECTION:
.			165	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 10:30:37 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 7.66.83.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 7.66.83.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
134.175.152.157 attack
$f2bV_matches
2019-12-02 20:11:00
113.172.191.34 attack
$f2bV_matches
2019-12-02 20:12:28
221.211.146.69 attackspam
5555/tcp
[2019-12-02]1pkt
2019-12-02 20:13:27
113.62.176.98 attackspam
Nov 14 19:05:24 vtv3 sshd[31732]: Failed password for invalid user ates from 113.62.176.98 port 24269 ssh2
Nov 14 19:14:32 vtv3 sshd[4857]: Invalid user guest from 113.62.176.98 port 58498
Nov 14 19:14:32 vtv3 sshd[4857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.62.176.98
Nov 14 19:27:44 vtv3 sshd[13748]: Invalid user lipowsky from 113.62.176.98 port 45160
Nov 14 19:27:44 vtv3 sshd[13748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.62.176.98
Nov 14 19:27:47 vtv3 sshd[13748]: Failed password for invalid user lipowsky from 113.62.176.98 port 45160 ssh2
Nov 14 19:33:50 vtv3 sshd[17565]: Invalid user aloradanna from 113.62.176.98 port 62802
Nov 14 19:33:50 vtv3 sshd[17565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.62.176.98
Dec  2 09:55:37 vtv3 sshd[15513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.62.176.98 
Dec  2
2019-12-02 19:41:18
54.38.184.208 attack
Dec  2 06:22:45 sshd: Connection from 54.38.184.208 port 39451
Dec  2 06:22:48 sshd: Failed password for root from 54.38.184.208 port 39451 ssh2
Dec  2 06:22:49 sshd: Received disconnect from 54.38.184.208: 11: Bye Bye [preauth]
2019-12-02 20:04:39
222.186.175.169 attackbotsspam
Dec  2 13:14:56 MainVPS sshd[19771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
Dec  2 13:14:58 MainVPS sshd[19771]: Failed password for root from 222.186.175.169 port 56084 ssh2
Dec  2 13:15:11 MainVPS sshd[19771]: error: maximum authentication attempts exceeded for root from 222.186.175.169 port 56084 ssh2 [preauth]
Dec  2 13:14:56 MainVPS sshd[19771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
Dec  2 13:14:58 MainVPS sshd[19771]: Failed password for root from 222.186.175.169 port 56084 ssh2
Dec  2 13:15:11 MainVPS sshd[19771]: error: maximum authentication attempts exceeded for root from 222.186.175.169 port 56084 ssh2 [preauth]
Dec  2 13:15:15 MainVPS sshd[20284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
Dec  2 13:15:17 MainVPS sshd[20284]: Failed password for root from 222.186.175.169 port
2019-12-02 20:17:40
46.101.43.224 attackspam
Dec  2 17:03:35 areeb-Workstation sshd[9152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.43.224 
Dec  2 17:03:38 areeb-Workstation sshd[9152]: Failed password for invalid user tree from 46.101.43.224 port 56309 ssh2
...
2019-12-02 19:43:45
140.143.208.132 attackspambots
2019-12-02T11:43:07.520733abusebot.cloudsearch.cf sshd\[15656\]: Invalid user webadmin from 140.143.208.132 port 43142
2019-12-02 20:10:05
114.67.82.150 attackspambots
Dec  2 11:59:54 v22018076622670303 sshd\[10359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.82.150  user=root
Dec  2 11:59:56 v22018076622670303 sshd\[10359\]: Failed password for root from 114.67.82.150 port 36870 ssh2
Dec  2 12:07:19 v22018076622670303 sshd\[10434\]: Invalid user knag from 114.67.82.150 port 44366
Dec  2 12:07:19 v22018076622670303 sshd\[10434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.82.150
...
2019-12-02 19:41:05
118.24.114.192 attackspambots
$f2bV_matches
2019-12-02 19:50:15
193.188.22.229 attackbotsspam
2019-12-02T11:35:24.708374abusebot.cloudsearch.cf sshd\[15566\]: Invalid user super from 193.188.22.229 port 49123
2019-12-02 20:17:53
58.182.45.219 attackspam
firewall-block, port(s): 7547/tcp
2019-12-02 20:04:07
51.75.202.218 attackbotsspam
Dec  2 09:47:44 meumeu sshd[15269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.202.218 
Dec  2 09:47:46 meumeu sshd[15269]: Failed password for invalid user bajada from 51.75.202.218 port 45338 ssh2
Dec  2 09:53:06 meumeu sshd[16228]: Failed password for root from 51.75.202.218 port 55500 ssh2
...
2019-12-02 19:54:41
85.185.238.216 attackspam
445/tcp 445/tcp
[2019-12-02]2pkt
2019-12-02 19:44:31
182.76.205.166 attack
445/tcp
[2019-12-02]1pkt
2019-12-02 20:01:27

Recently Reported IPs

120.230.114.30 49.204.178.138 5.44.168.94 54.71.68.47
5.114.228.56 170.106.51.85 2.51.46.116 102.189.226.250
182.184.77.107 120.43.30.66 108.174.198.137 177.92.82.110
95.80.163.2 137.184.39.68 200.71.124.189 203.76.108.44
103.102.153.153 187.170.118.138 186.91.102.107 124.120.109.132