Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.83.66.85 proxy
VPN fraud
2023-05-25 12:40:34
45.83.66.88 attack
" "
2020-08-10 06:53:28
45.83.66.234 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.234 to port 110
2020-07-25 22:19:16
45.83.66.150 attackspambots
Unauthorized connection attempt detected from IP address 45.83.66.150 to port 443
2020-07-23 06:44:11
45.83.66.242 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.242 to port 102
2020-07-09 07:57:57
45.83.66.248 attack
Unauthorized connection attempt detected from IP address 45.83.66.248 to port 102
2020-07-09 07:57:32
45.83.66.71 attackspambots
Unauthorized connection attempt detected from IP address 45.83.66.71 to port 102
2020-07-09 06:53:39
45.83.66.171 attackspam
Unauthorized connection attempt detected from IP address 45.83.66.171 to port 102
2020-07-09 06:53:16
45.83.66.161 attackspam
Unauthorized connection attempt detected from IP address 45.83.66.161 to port 102
2020-07-09 05:07:07
45.83.66.36 attackbots
Unauthorized connection attempt detected from IP address 45.83.66.36 to port 53
2020-07-07 04:59:16
45.83.66.79 attack
Unauthorized connection attempt detected from IP address 45.83.66.79 to port 22
2020-07-07 04:58:54
45.83.66.116 attack
Unauthorized connection attempt detected from IP address 45.83.66.116 to port 110
2020-05-31 04:29:30
45.83.66.185 attackbotsspam
Unauthorized connection attempt detected from IP address 45.83.66.185 to port 110
2020-05-31 02:41:14
45.83.66.17 attackbotsspam
Scanning
2020-05-11 21:31:22
45.83.66.150 attackbots
Hits on port : 2012
2020-04-14 17:06:02
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.83.66.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30572
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.83.66.72.			IN	A

;; AUTHORITY SECTION:
.			512	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 21:27:28 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 72.66.83.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 72.66.83.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
221.214.9.91 attack
Oct  5 07:06:38 site1 sshd\[56164\]: Invalid user Qwerty123!@\# from 221.214.9.91Oct  5 07:06:40 site1 sshd\[56164\]: Failed password for invalid user Qwerty123!@\# from 221.214.9.91 port 41290 ssh2Oct  5 07:10:35 site1 sshd\[56911\]: Invalid user Stick2017 from 221.214.9.91Oct  5 07:10:36 site1 sshd\[56911\]: Failed password for invalid user Stick2017 from 221.214.9.91 port 47536 ssh2Oct  5 07:14:31 site1 sshd\[57397\]: Invalid user Respect@2017 from 221.214.9.91Oct  5 07:14:32 site1 sshd\[57397\]: Failed password for invalid user Respect@2017 from 221.214.9.91 port 53788 ssh2
...
2019-10-05 15:53:40
182.61.58.166 attackbotsspam
Oct  4 21:30:19 hanapaa sshd\[19020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.58.166  user=root
Oct  4 21:30:21 hanapaa sshd\[19020\]: Failed password for root from 182.61.58.166 port 36638 ssh2
Oct  4 21:35:07 hanapaa sshd\[19411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.58.166  user=root
Oct  4 21:35:09 hanapaa sshd\[19411\]: Failed password for root from 182.61.58.166 port 41748 ssh2
Oct  4 21:39:51 hanapaa sshd\[19910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.58.166  user=root
2019-10-05 15:56:25
104.143.83.242 attackspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-10-05 16:17:36
46.101.187.76 attack
Invalid user pat from 46.101.187.76 port 50098
2019-10-05 15:45:16
49.234.42.79 attackbotsspam
Oct  5 04:07:43 www_kotimaassa_fi sshd[29763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.42.79
Oct  5 04:07:45 www_kotimaassa_fi sshd[29763]: Failed password for invalid user 1234@QWER from 49.234.42.79 port 38453 ssh2
...
2019-10-05 15:50:56
106.12.77.199 attack
SSH brutforce
2019-10-05 16:05:16
185.209.0.90 attackspam
10/05/2019-10:00:56.364056 185.209.0.90 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-05 16:06:05
179.185.30.83 attack
Invalid user ansible from 179.185.30.83 port 61324
2019-10-05 16:01:12
186.24.40.226 attackbotsspam
firewall-block, port(s): 445/tcp
2019-10-05 16:08:13
222.186.175.182 attackbots
2019-10-05T09:32:20.169060lon01.zurich-datacenter.net sshd\[27604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2019-10-05T09:32:22.723866lon01.zurich-datacenter.net sshd\[27604\]: Failed password for root from 222.186.175.182 port 30380 ssh2
2019-10-05T09:32:26.430008lon01.zurich-datacenter.net sshd\[27604\]: Failed password for root from 222.186.175.182 port 30380 ssh2
2019-10-05T09:32:30.354833lon01.zurich-datacenter.net sshd\[27604\]: Failed password for root from 222.186.175.182 port 30380 ssh2
2019-10-05T09:32:35.163674lon01.zurich-datacenter.net sshd\[27604\]: Failed password for root from 222.186.175.182 port 30380 ssh2
...
2019-10-05 15:46:09
206.189.162.87 attack
Invalid user ebook from 206.189.162.87 port 46652
2019-10-05 16:05:38
188.131.223.181 attackbotsspam
Oct  5 07:08:45 www2 sshd\[6264\]: Invalid user Jelszo!2 from 188.131.223.181Oct  5 07:08:47 www2 sshd\[6264\]: Failed password for invalid user Jelszo!2 from 188.131.223.181 port 54916 ssh2Oct  5 07:13:07 www2 sshd\[6825\]: Invalid user o09iu87yt65re43wq2 from 188.131.223.181
...
2019-10-05 15:59:08
120.92.102.121 attackspam
SSH brutforce
2019-10-05 16:06:26
182.61.183.31 attackbotsspam
2019-10-05T07:24:03.882264abusebot-2.cloudsearch.cf sshd\[15316\]: Invalid user Isabella_123 from 182.61.183.31 port 41893
2019-10-05 15:57:58
116.118.237.93 attackspam
xmlrpc attack
2019-10-05 15:58:24

Recently Reported IPs

191.53.132.255 116.177.238.8 101.251.194.61 27.4.2.79
47.111.166.111 125.99.163.246 110.185.142.254 81.22.46.227
13.93.164.147 116.228.65.70 103.157.82.51 36.81.11.137
159.89.27.131 61.56.182.81 113.69.38.111 187.163.66.114
168.227.144.194 171.230.169.8 111.38.103.122 1.247.210.82