Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.83.67.243 attackbots
Unauthorized access to SSH at 25/Sep/2020:20:33:58 +0000.
Received:  (SSH-2.0-ZGrab ZGrab SSH Survey)
2020-09-27 03:08:33
45.83.67.243 attackspam
Unauthorized access to SSH at 25/Sep/2020:20:33:58 +0000.
Received:  (SSH-2.0-ZGrab ZGrab SSH Survey)
2020-09-26 19:06:18
45.83.67.90 attackspam
29-Aug-2020 07:09:32.275 client @0x7fbd981150c0 45.83.67.90#55500 (localhost): zone transfer 'localhost/AXFR/IN' denied
2020-08-29 23:10:28
45.83.67.230 attack
port scan and connect, tcp 23 (telnet)
2020-08-17 02:54:10
45.83.67.157 attackspam
Aug 15 14:15:58 nxxxxxxx sshd[2323]: refused connect from 45.83.67.157 (45.8=
3.67.157)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.83.67.157
2020-08-15 23:15:19
45.83.67.95 attackbotsspam
Aug  7 00:52:05 mertcangokgoz-v4-main kernel: [367662.554694] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:5a:6b:04:d2:74:7f:6e:37:e3:08:00 SRC=45.83.67.95 DST=94.130.96.165 LEN=65 TOS=0x00 PREC=0x00 TTL=56 ID=1337 DF PROTO=UDP SPT=40679 DPT=47808 LEN=45
2020-08-07 08:27:38
45.83.67.26 attack
Tried to connect (66653x) -
2020-08-01 23:58:01
45.83.67.73 attackspambots
 TCP (SYN) 45.83.67.73:9376 -> port 110, len 44
2020-07-25 23:06:59
45.83.67.81 attack
Unauthorized connection attempt detected from IP address 45.83.67.81 to port 110
2020-07-25 22:18:42
45.83.67.142 attack
Unauthorized connection attempt detected from IP address 45.83.67.142 to port 110
2020-07-25 20:19:50
45.83.67.102 attackspambots
Unauthorized connection attempt detected from IP address 45.83.67.102 to port 102
2020-07-09 07:57:07
45.83.67.231 attackbotsspam
Unauthorized connection attempt detected from IP address 45.83.67.231 to port 102
2020-07-09 07:56:33
45.83.67.200 attackspambots
Unauthorized connection attempt detected from IP address 45.83.67.200 to port 102
2020-07-09 07:37:40
45.83.67.244 attackspambots
Hit honeypot r.
2020-07-08 13:22:14
45.83.67.76 attackbots
Unauthorized connection attempt detected from IP address 45.83.67.76 to port 22
2020-07-07 04:33:00
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.83.67.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33040
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.83.67.148.			IN	A

;; AUTHORITY SECTION:
.			124	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 18:31:40 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 148.67.83.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.67.83.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.197.37 attackbotsspam
Invalid user support1 from 106.12.197.37 port 34940
2020-10-14 03:36:36
159.89.133.144 attackbots
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-14 03:24:39
211.112.18.37 attack
Oct 13 19:14:20 marvibiene sshd[26911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.112.18.37 
Oct 13 19:14:23 marvibiene sshd[26911]: Failed password for invalid user aprosinia from 211.112.18.37 port 8706 ssh2
2020-10-14 03:32:40
139.59.94.200 attack
2020-10-13T17:43:54+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-10-14 03:49:51
45.143.221.103 attack
[2020-10-13 15:19:26] NOTICE[1182] chan_sip.c: Registration from '"301" ' failed for '45.143.221.103:5683' - Wrong password
[2020-10-13 15:19:26] SECURITY[1204] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-10-13T15:19:26.829-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="301",SessionID="0x7f22f80ac0a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.221.103/5683",Challenge="7a628e30",ReceivedChallenge="7a628e30",ReceivedHash="0119f7e30ee57384234432f30b70c098"
[2020-10-13 15:19:26] NOTICE[1182] chan_sip.c: Registration from '"301" ' failed for '45.143.221.103:5683' - Wrong password
[2020-10-13 15:19:26] SECURITY[1204] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-10-13T15:19:26.966-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="301",SessionID="0x7f22f840cf98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.14
...
2020-10-14 03:40:29
61.145.48.94 attackbotsspam
Invalid user in from 61.145.48.94 port 51912
2020-10-14 03:28:13
122.224.168.22 attack
Oct 13 19:17:02 email sshd\[6897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.168.22  user=root
Oct 13 19:17:04 email sshd\[6897\]: Failed password for root from 122.224.168.22 port 47234 ssh2
Oct 13 19:20:18 email sshd\[7600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.168.22  user=root
Oct 13 19:20:20 email sshd\[7600\]: Failed password for root from 122.224.168.22 port 45659 ssh2
Oct 13 19:23:39 email sshd\[8276\]: Invalid user florian from 122.224.168.22
Oct 13 19:23:39 email sshd\[8276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.168.22
...
2020-10-14 03:29:45
165.22.101.100 attackbotsspam
165.22.101.100 - - \[13/Oct/2020:19:56:15 +0200\] "POST /wp-login.php HTTP/1.0" 200 8625 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
165.22.101.100 - - \[13/Oct/2020:19:56:17 +0200\] "POST /wp-login.php HTTP/1.0" 200 8409 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
165.22.101.100 - - \[13/Oct/2020:19:56:18 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-10-14 03:35:10
106.124.143.24 attack
fail2ban detected bruce force on ssh iptables
2020-10-14 03:26:23
198.245.50.154 attackspambots
as always with OVH    Don’t ever register domain names at ovh !!!!!!!!! 
All domain names registered at ovh are attacked
2020-10-14 03:13:35
79.137.36.108 attackbots
Oct 13 20:38:35 server sshd[7777]: Failed password for root from 79.137.36.108 port 36850 ssh2
Oct 13 20:42:32 server sshd[9985]: Failed password for invalid user casillas from 79.137.36.108 port 41080 ssh2
Oct 13 20:46:40 server sshd[12669]: Failed password for invalid user madhuri from 79.137.36.108 port 45334 ssh2
2020-10-14 03:12:48
195.154.188.108 attackbotsspam
2020-10-12T16:52:09.546367hostname sshd[53688]: Failed password for root from 195.154.188.108 port 36148 ssh2
...
2020-10-14 03:37:31
193.29.15.169 attackspambots
 UDP 193.29.15.169:51245 -> port 53, len 64
2020-10-14 03:23:12
161.35.207.11 attack
Oct 13 18:55:52 host1 sshd[126009]: Invalid user 1234 from 161.35.207.11 port 56280
...
2020-10-14 03:14:22
129.204.254.71 attackspam
Invalid user patrickc from 129.204.254.71 port 45702
2020-10-14 03:21:32

Recently Reported IPs

166.201.196.21 172.68.220.149 212.231.197.205 183.24.156.44
113.215.42.104 196.50.200.99 45.169.5.238 77.211.31.96
59.95.67.156 75.103.200.193 172.87.134.62 194.150.225.18
122.102.27.202 182.61.5.72 115.230.122.136 103.114.0.3
211.115.228.142 34.69.232.239 223.91.192.216 14.232.163.52