Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Meiringen

Region: Bern

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.120.45.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40093
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.120.45.78.			IN	A

;; AUTHORITY SECTION:
.			381	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021082900 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Aug 29 20:48:40 CST 2021
;; MSG SIZE  rcvd: 106
Host info
Host 78.45.120.212.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 78.45.120.212.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.223.204.179 attack
B: Magento admin pass test (wrong country)
2020-01-12 06:16:14
165.22.58.247 attackbotsspam
Jan 11 15:08:27 server sshd\[26165\]: Invalid user RX from 165.22.58.247
Jan 11 15:08:27 server sshd\[26165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.58.247 
Jan 11 15:08:29 server sshd\[26165\]: Failed password for invalid user RX from 165.22.58.247 port 45920 ssh2
Jan 12 00:07:23 server sshd\[515\]: Invalid user ubuntu from 165.22.58.247
Jan 12 00:07:23 server sshd\[515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.58.247 
...
2020-01-12 06:15:11
187.60.251.11 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-12 05:49:03
217.36.223.29 attack
Jan 11 21:07:36 work-partkepr sshd\[17326\]: Invalid user invoices from 217.36.223.29 port 51720
Jan 11 21:07:36 work-partkepr sshd\[17326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.36.223.29
...
2020-01-12 06:07:56
45.143.220.106 attackspam
scan z
2020-01-12 06:17:02
222.186.30.76 attack
Unauthorized connection attempt detected from IP address 222.186.30.76 to port 22 [T]
2020-01-12 05:55:03
212.170.50.203 attack
Jan 11 22:07:31 serwer sshd\[14630\]: Invalid user tomcat2 from 212.170.50.203 port 41758
Jan 11 22:07:31 serwer sshd\[14630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.170.50.203
Jan 11 22:07:33 serwer sshd\[14630\]: Failed password for invalid user tomcat2 from 212.170.50.203 port 41758 ssh2
...
2020-01-12 06:06:15
112.85.42.237 attackspambots
Jan 11 21:42:59 localhost sshd\[35502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
Jan 11 21:43:02 localhost sshd\[35502\]: Failed password for root from 112.85.42.237 port 34456 ssh2
Jan 11 21:43:04 localhost sshd\[35502\]: Failed password for root from 112.85.42.237 port 34456 ssh2
Jan 11 21:43:07 localhost sshd\[35502\]: Failed password for root from 112.85.42.237 port 34456 ssh2
Jan 11 21:44:19 localhost sshd\[35518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
...
2020-01-12 05:47:01
93.86.93.58 attackbotsspam
20/1/11@16:07:37: FAIL: Alarm-Network address from=93.86.93.58
20/1/11@16:07:37: FAIL: Alarm-Network address from=93.86.93.58
...
2020-01-12 06:04:00
185.176.27.122 attackbotsspam
01/11/2020-22:55:35.164053 185.176.27.122 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-12 06:00:34
61.154.197.245 attackbotsspam
2020-01-11 15:07:35 dovecot_login authenticator failed for (gxvxt) [61.154.197.245]:54565 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=lifangfang@lerctr.org)
2020-01-11 15:07:42 dovecot_login authenticator failed for (gslcm) [61.154.197.245]:54565 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=lifangfang@lerctr.org)
2020-01-11 15:07:54 dovecot_login authenticator failed for (mfefr) [61.154.197.245]:54565 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=lifangfang@lerctr.org)
...
2020-01-12 05:49:16
167.114.185.237 attack
Jan 11 21:07:14 localhost sshd\[6127\]: Invalid user minecraft from 167.114.185.237 port 55536
Jan 11 21:07:14 localhost sshd\[6127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.185.237
Jan 11 21:07:16 localhost sshd\[6127\]: Failed password for invalid user minecraft from 167.114.185.237 port 55536 ssh2
...
2020-01-12 06:22:08
85.26.232.125 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-12 05:59:59
138.204.235.170 attackbots
Honeypot attack, port: 445, PTR: static-170.nossaredetelecom.com.br.
2020-01-12 05:53:22
5.196.72.11 attackspambots
Jan 11 21:07:35 sigma sshd\[10125\]: Invalid user raf from 5.196.72.11Jan 11 21:07:36 sigma sshd\[10125\]: Failed password for invalid user raf from 5.196.72.11 port 52836 ssh2
...
2020-01-12 06:05:51

Recently Reported IPs

2.22.148.74 95.217.225.57 45.139.213.230 185.62.253.210
79.150.79.30 139.59.235.241 116.108.73.43 95.82.118.153
202.96.98.106 184.105.213.117 180.107.30.216 61.140.24.38
187.87.12.119 171.251.28.137 40.77.202.97 40.77.188.200
40.77.139.108 180.193.216.159 96.255.171.192 186.2.140.88