Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.78.45.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31371
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;189.78.45.135.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 02:32:52 CST 2025
;; MSG SIZE  rcvd: 106
Host info
135.45.78.189.in-addr.arpa domain name pointer 189-78-45-135.dsl.telesp.net.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
135.45.78.189.in-addr.arpa	name = 189-78-45-135.dsl.telesp.net.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.120.224.222 attack
SSH bruteforce (Triggered fail2ban)
2020-03-12 23:51:55
84.38.180.130 attack
SSH brute-force: detected 6 distinct usernames within a 24-hour window.
2020-03-12 23:53:24
92.116.134.222 attackspambots
2019-11-01T06:05:22.554Z CLOSE host=92.116.134.222 port=33412 fd=4 time=30.031 bytes=50
...
2020-03-12 23:08:34
86.98.35.59 attackspam
2020-02-22T07:57:54.467Z CLOSE host=86.98.35.59 port=49892 fd=4 time=20.010 bytes=31
...
2020-03-12 23:41:47
186.209.39.94 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-12 23:43:12
190.145.34.226 attackbots
Unauthorized connection attempt from IP address 190.145.34.226 on Port 445(SMB)
2020-03-12 23:34:42
91.185.6.94 attackbots
2019-12-25T19:45:10.701Z CLOSE host=91.185.6.94 port=58760 fd=4 time=1050.506 bytes=1851
...
2020-03-12 23:15:23
77.40.95.115 attackspam
(smtpauth) Failed SMTP AUTH login from 77.40.95.115 (RU/Russia/115.95.pppoe.mari-el.ru): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-03-12 16:00:40 plain authenticator failed for (localhost) [77.40.95.115]: 535 Incorrect authentication data (set_id=career@mehrbaft.com)
2020-03-12 23:05:21
103.209.1.150 attackbots
Unauthorized connection attempt from IP address 103.209.1.150 on Port 445(SMB)
2020-03-12 23:24:47
103.70.155.99 attackspambots
suspicious action Thu, 12 Mar 2020 09:30:33 -0300
2020-03-12 23:25:03
92.116.164.245 attackbotsspam
2019-12-08T04:45:39.012Z CLOSE host=92.116.164.245 port=45410 fd=4 time=30.023 bytes=34
...
2020-03-12 23:07:48
141.98.10.141 attack
Mar 12 15:18:29 mail postfix/smtpd[55468]: warning: unknown[141.98.10.141]: SASL LOGIN authentication failed: generic failure
Mar 12 15:19:38 mail postfix/smtpd[55468]: warning: unknown[141.98.10.141]: SASL LOGIN authentication failed: generic failure
Mar 12 15:28:25 mail postfix/smtpd[55549]: warning: unknown[141.98.10.141]: SASL LOGIN authentication failed: generic failure
...
2020-03-12 23:29:58
90.154.160.24 attackspambots
2020-02-09T15:48:02.657Z CLOSE host=90.154.160.24 port=49195 fd=4 time=20.013 bytes=27
...
2020-03-12 23:18:12
101.53.6.195 attack
Unauthorized connection attempt from IP address 101.53.6.195 on Port 445(SMB)
2020-03-12 23:50:29
129.211.43.36 attack
Invalid user zhuht from 129.211.43.36 port 41164
2020-03-12 23:50:05

Recently Reported IPs

26.184.169.227 162.92.105.39 45.46.40.237 70.209.65.0
12.87.240.101 52.53.139.22 197.134.144.64 174.190.113.127
52.170.117.104 160.238.6.92 211.63.50.85 89.105.54.34
173.95.73.179 153.123.9.71 14.31.58.12 41.209.63.222
45.79.8.190 117.246.138.79 138.81.110.93 44.43.25.9