Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
80.66.83.48 attack
Malicious IP / Malware
2024-04-20 13:32:53
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '80.66.83.0 - 80.66.83.255'

% Abuse contact for '80.66.83.0 - 80.66.83.255' is 'abuse@net-host.org'

inetnum:        80.66.83.0 - 80.66.83.255
netname:        Bashinskii
org:            ORG-BVR4-RIPE
country:        FI
admin-c:        BV3757-RIPE
tech-c:         BV3757-RIPE
abuse-c:        BV3757-RIPE
status:         ASSIGNED PA
mnt-by:         ru-avm-1-mnt
mnt-by:         BASHIN-MNT
created:        2021-12-20T06:35:56Z
last-modified:  2026-03-04T08:53:18Z
source:         RIPE

organisation:   ORG-BVR4-RIPE
org-name:       Bashinskii Vadim Ruslanovich
org-type:       OTHER
address:        Kazakhstan, Almaty region, Almaty, Nazarbayev Avenue, 28A, apartment 98
country:        KZ
admin-c:        BV3757-RIPE
abuse-c:        BV3757-RIPE
mnt-ref:        BASHIN-MNT
mnt-by:         BASHIN-MNT
created:        2025-06-30T12:03:32Z
last-modified:  2025-06-30T12:10:26Z
source:         RIPE # Filtered

role:           Bashinskii Vadim
address:        Kazakhstan, Almaty region, Almaty, Nazarbayev Avenue, 28A, apartment 98
abuse-mailbox:  abuse@net-host.org
phone:          +77079812240
nic-hdl:        BV3757-RIPE
mnt-by:         BASHIN-MNT
created:        2025-06-30T11:48:58Z
last-modified:  2025-06-30T12:03:23Z
source:         RIPE # Filtered

% Information related to '80.66.83.0/24AS216473'

route:          80.66.83.0/24
origin:         AS216473
mnt-by:         BASHIN-MNT
created:        2025-07-15T11:42:37Z
last-modified:  2025-07-15T11:42:37Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121 (ABERDEEN)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.66.83.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.66.83.43.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031101 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 12 04:30:10 CST 2026
;; MSG SIZE  rcvd: 104
Host info
Host 43.83.66.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 43.83.66.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
157.230.19.72 attack
Jun 22 14:01:42 prod4 sshd\[5988\]: Invalid user user from 157.230.19.72
Jun 22 14:01:44 prod4 sshd\[5988\]: Failed password for invalid user user from 157.230.19.72 port 42400 ssh2
Jun 22 14:04:50 prod4 sshd\[7326\]: Invalid user ronan from 157.230.19.72
...
2020-06-22 23:40:22
188.173.80.134 attack
$f2bV_matches
2020-06-22 23:25:56
85.171.52.251 attackbotsspam
2020-06-22T14:18:45.396664abusebot-8.cloudsearch.cf sshd[4691]: Invalid user stone from 85.171.52.251 port 51576
2020-06-22T14:18:45.416317abusebot-8.cloudsearch.cf sshd[4691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85-171-52-251.rev.numericable.fr
2020-06-22T14:18:45.396664abusebot-8.cloudsearch.cf sshd[4691]: Invalid user stone from 85.171.52.251 port 51576
2020-06-22T14:18:47.778304abusebot-8.cloudsearch.cf sshd[4691]: Failed password for invalid user stone from 85.171.52.251 port 51576 ssh2
2020-06-22T14:25:30.740884abusebot-8.cloudsearch.cf sshd[5082]: Invalid user mc from 85.171.52.251 port 50736
2020-06-22T14:25:30.753046abusebot-8.cloudsearch.cf sshd[5082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85-171-52-251.rev.numericable.fr
2020-06-22T14:25:30.740884abusebot-8.cloudsearch.cf sshd[5082]: Invalid user mc from 85.171.52.251 port 50736
2020-06-22T14:25:32.048057abusebot-8.cloudsear
...
2020-06-22 23:19:39
218.92.0.172 attackspambots
Jun 22 17:03:22 pve1 sshd[22105]: Failed password for root from 218.92.0.172 port 16472 ssh2
Jun 22 17:03:27 pve1 sshd[22105]: Failed password for root from 218.92.0.172 port 16472 ssh2
...
2020-06-22 23:08:19
45.119.85.132 attackbots
Automatic report - Port Scan Attack
2020-06-22 23:24:23
106.52.135.239 attackspam
Attempted connection to port 25803.
2020-06-22 23:16:32
119.45.125.168 attack
21 attempts against mh-ssh on river
2020-06-22 23:37:30
46.38.145.4 attack
2020-06-22T09:05:52.158947linuxbox-skyline auth[89371]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=sirio rhost=46.38.145.4
...
2020-06-22 23:10:50
151.234.253.126 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-22 23:14:12
218.92.0.215 attackbotsspam
Jun 22 10:41:43 debian sshd[3423]: Unable to negotiate with 218.92.0.215 port 26843: no matching key exchange method found. Their offer: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
Jun 22 11:15:42 debian sshd[6795]: Unable to negotiate with 218.92.0.215 port 47080: no matching key exchange method found. Their offer: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
...
2020-06-22 23:17:26
216.218.206.96 attack
srv02 Mass scanning activity detected Target: 873(rsync) ..
2020-06-22 23:27:58
103.14.33.229 attackspambots
Jun 22 14:01:45 inter-technics sshd[26842]: Invalid user bos from 103.14.33.229 port 39074
Jun 22 14:01:45 inter-technics sshd[26842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.14.33.229
Jun 22 14:01:45 inter-technics sshd[26842]: Invalid user bos from 103.14.33.229 port 39074
Jun 22 14:01:47 inter-technics sshd[26842]: Failed password for invalid user bos from 103.14.33.229 port 39074 ssh2
Jun 22 14:04:06 inter-technics sshd[26969]: Invalid user sysadmin from 103.14.33.229 port 40844
...
2020-06-22 23:23:31
49.88.112.111 attack
Jun 22 08:05:52 dignus sshd[3327]: Failed password for root from 49.88.112.111 port 51268 ssh2
Jun 22 08:06:30 dignus sshd[3390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
Jun 22 08:06:32 dignus sshd[3390]: Failed password for root from 49.88.112.111 port 54793 ssh2
Jun 22 08:07:14 dignus sshd[3479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
Jun 22 08:07:16 dignus sshd[3479]: Failed password for root from 49.88.112.111 port 62510 ssh2
...
2020-06-22 23:21:12
192.35.168.243 attackbots
Unauthorized connection attempt detected from IP address 192.35.168.243 to port 8053 [T]
2020-06-22 23:49:00
147.0.22.179 attack
2020-06-22T10:00:38.5340661495-001 sshd[6252]: Invalid user liu from 147.0.22.179 port 55470
2020-06-22T10:00:38.5371201495-001 sshd[6252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=rrcs-147-0-22-179.central.biz.rr.com
2020-06-22T10:00:38.5340661495-001 sshd[6252]: Invalid user liu from 147.0.22.179 port 55470
2020-06-22T10:00:40.0021551495-001 sshd[6252]: Failed password for invalid user liu from 147.0.22.179 port 55470 ssh2
2020-06-22T10:03:11.3794601495-001 sshd[6442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=rrcs-147-0-22-179.central.biz.rr.com  user=root
2020-06-22T10:03:13.1809931495-001 sshd[6442]: Failed password for root from 147.0.22.179 port 55462 ssh2
...
2020-06-22 23:10:16

Recently Reported IPs

134.65.30.157 125.121.96.251 180.153.236.30 178.104.41.122
18.97.5.47 57.141.16.15 206.189.192.176 12.66.0.50
35.93.38.183 43.248.109.204 179.108.90.55 176.65.149.215
14.135.74.143 42.7.152.129 96.62.161.91 44.204.8.51
85.217.140.50 206.189.115.111 38.70.72.197 20.77.134.145