Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Celorico de Basto

Region: Braga

Country: Portugal

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 78.137.219.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32639
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;78.137.219.139.			IN	A

;; AUTHORITY SECTION:
.			218	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070701 1800 900 604800 86400

;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jul 08 08:51:00 CST 2020
;; MSG SIZE  rcvd: 118
Host info
139.219.137.78.in-addr.arpa domain name pointer 139.219.137.78.rev.vodafone.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.219.137.78.in-addr.arpa	name = 139.219.137.78.rev.vodafone.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.191.49.38 attack
Jul  8 00:46:46 meumeu sshd[3630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.49.38 
Jul  8 00:46:48 meumeu sshd[3630]: Failed password for invalid user t from 94.191.49.38 port 33644 ssh2
Jul  8 00:49:04 meumeu sshd[4153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.49.38 
...
2019-07-08 07:05:32
78.96.32.178 attackspambots
ssh failed login
2019-07-08 06:44:49
209.85.217.104 attackspam
Return-Path: 
2019-07-08 06:46:28
102.165.39.56 attackbots
\[2019-07-07 19:14:21\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-07T19:14:21.924-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00441274066078",SessionID="0x7f02f89969f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/102.165.39.56/54611",ACLName="no_extension_match"
\[2019-07-07 19:14:37\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-07T19:14:37.207-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00441134900374",SessionID="0x7f02f821ae38",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/102.165.39.56/52617",ACLName="no_extension_match"
\[2019-07-07 19:14:54\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-07T19:14:54.110-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00441902933938",SessionID="0x7f02f89969f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/102.165.39.56/54564",ACLName="no_ext
2019-07-08 07:23:39
174.135.136.106 attackbots
Attempted to connect 3 times to port 3389 TCP
2019-07-08 07:19:28
89.252.182.2 attackbots
xmlrpc attack
2019-07-08 06:55:30
60.51.89.172 attackbots
Telnet Server BruteForce Attack
2019-07-08 07:06:28
111.224.85.132 attackspam
Lines containing failures of 111.224.85.132
/var/log/apache/pucorp.org.log:2019-07-07T01:19:31.877853+01:00 ticdesk sshd[22068]: Invalid user admin from 111.224.85.132 port 37448
/var/log/apache/pucorp.org.log:2019-07-07T01:19:31.894221+01:00 ticdesk sshd[22068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.224.85.132 
/var/log/apache/pucorp.org.log:2019-07-07T01:19:31.906569+01:00 ticdesk sshd[22068]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.224.85.132 user=admin
/var/log/apache/pucorp.org.log:2019-07-07T01:19:33.669092+01:00 ticdesk sshd[22068]: Failed password for invalid user admin from 111.224.85.132 port 37448 ssh2
/var/log/apache/pucorp.org.log:2019-07-07T01:19:34.326265+01:00 ticdesk sshd[22068]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.224.85.132 user=admin
/var/log/apache/pucorp.org.log:2019-07-07T01:19:36.500507+01:........
------------------------------
2019-07-08 06:59:13
134.255.233.10 attackspam
Jul  7 15:10:54 tux postfix/smtpd[17275]: warning: hostname vps-zap428766-2.zap-srv.com does not resolve to address 134.255.233.10: Name or service not known
Jul  7 15:10:54 tux postfix/smtpd[17275]: connect from unknown[134.255.233.10]
Jul  7 15:10:54 tux postfix/smtpd[17275]: NOQUEUE: reject: RCPT from unknown[134.255.233.10]: 554 5.7.1 Service unavailable; Client host [134.255.233.10] blocked using ix.dnsbl.xxxxxx.net; Your e-mail service was detected by spam.over.port25.me (NiX Spam) as spamming at Sun, 07 Jul 2019 15:08:55 +0200. Your admin should vishostname hxxp://www.dnsbl.xxxxxx.net/lookup.php?value=134.255.233.10; from=x@x helo=
Jul  7 15:10:54 tux postfix/smtpd[17653]: warning: hostname vps-zap428766-2.zap-srv.com does not resolve to address 134.255.233.10: Name or service not known
Jul  7 15:10:54 tux postfix/smtpd[17653]: connect from unknown[134.255.233.10]
Jul  7 15:10:54 tux postfix/smtpd[17275]: disconnect from unknown[134.255.233.10]
J........
-------------------------------
2019-07-08 07:16:59
5.188.115.188 attackbotsspam
RDP Brute-Force (Grieskirchen RZ1)
2019-07-08 06:56:15
79.72.10.213 attackbots
Attempted to connect 3 times to port 23 TCP
2019-07-08 07:21:04
125.78.166.134 attack
Jul  7 15:22:51 localhost postfix/smtpd\[13653\]: warning: unknown\[125.78.166.134\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 15:23:06 localhost postfix/smtpd\[13653\]: warning: unknown\[125.78.166.134\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 15:23:20 localhost postfix/smtpd\[13653\]: warning: unknown\[125.78.166.134\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 15:23:40 localhost postfix/smtpd\[13653\]: warning: unknown\[125.78.166.134\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 15:23:52 localhost postfix/smtpd\[13653\]: warning: unknown\[125.78.166.134\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-07-08 06:52:30
93.67.73.188 attack
Unauthorised access (Jul  7) SRC=93.67.73.188 LEN=44 TTL=54 ID=12428 TCP DPT=8080 WINDOW=55311 SYN 
Unauthorised access (Jul  7) SRC=93.67.73.188 LEN=44 TTL=54 ID=59368 TCP DPT=8080 WINDOW=15335 SYN 
Unauthorised access (Jul  6) SRC=93.67.73.188 LEN=44 TTL=54 ID=65527 TCP DPT=8080 WINDOW=15335 SYN 
Unauthorised access (Jul  6) SRC=93.67.73.188 LEN=44 TTL=54 ID=29931 TCP DPT=8080 WINDOW=55311 SYN 
Unauthorised access (Jul  6) SRC=93.67.73.188 LEN=44 TTL=54 ID=34643 TCP DPT=8080 WINDOW=55311 SYN 
Unauthorised access (Jul  4) SRC=93.67.73.188 LEN=44 TTL=54 ID=61252 TCP DPT=8080 WINDOW=15335 SYN 
Unauthorised access (Jul  4) SRC=93.67.73.188 LEN=44 TTL=54 ID=6967 TCP DPT=8080 WINDOW=55311 SYN 
Unauthorised access (Jul  4) SRC=93.67.73.188 LEN=44 TTL=54 ID=47662 TCP DPT=8080 WINDOW=55311 SYN 
Unauthorised access (Jul  3) SRC=93.67.73.188 LEN=44 TTL=54 ID=47578 TCP DPT=8080 WINDOW=55311 SYN
2019-07-08 07:14:23
94.176.77.67 attackbotsspam
(Jul  8)  LEN=40 TTL=244 ID=62205 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  7)  LEN=40 TTL=244 ID=46086 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  7)  LEN=40 TTL=244 ID=1207 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  7)  LEN=40 TTL=244 ID=52125 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  7)  LEN=40 TTL=244 ID=30129 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  7)  LEN=40 TTL=244 ID=48395 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  7)  LEN=40 TTL=244 ID=14627 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  7)  LEN=40 TTL=244 ID=33554 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  7)  LEN=40 TTL=244 ID=3974 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  6)  LEN=40 TTL=244 ID=18593 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  6)  LEN=40 TTL=244 ID=32133 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  6)  LEN=40 TTL=244 ID=28070 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  6)  LEN=40 TTL=244 ID=50149 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  6)  LEN=40 TTL=244 ID=16528 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  6)  LEN=40 TTL=244 ID=9102 DF TCP DPT=23 WINDOW=14600 SYN...
2019-07-08 06:57:37
1.27.137.218 attackbots
Jul  7 20:23:56 itv-usvr-01 sshd[13559]: Invalid user admin from 1.27.137.218
Jul  7 20:23:56 itv-usvr-01 sshd[13559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.27.137.218
Jul  7 20:23:56 itv-usvr-01 sshd[13559]: Invalid user admin from 1.27.137.218
Jul  7 20:23:58 itv-usvr-01 sshd[13559]: Failed password for invalid user admin from 1.27.137.218 port 38076 ssh2
Jul  7 20:23:56 itv-usvr-01 sshd[13559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.27.137.218
Jul  7 20:23:56 itv-usvr-01 sshd[13559]: Invalid user admin from 1.27.137.218
Jul  7 20:23:58 itv-usvr-01 sshd[13559]: Failed password for invalid user admin from 1.27.137.218 port 38076 ssh2
Jul  7 20:24:00 itv-usvr-01 sshd[13559]: Failed password for invalid user admin from 1.27.137.218 port 38076 ssh2
2019-07-08 06:50:03

Recently Reported IPs

182.87.254.132 74.63.215.76 190.78.190.50 74.83.127.250
36.86.24.90 86.9.64.148 58.216.176.206 31.154.9.211
94.140.186.183 188.180.24.239 159.69.114.253 193.180.229.70
120.15.76.76 105.128.242.170 116.203.229.60 149.35.130.169
12.120.28.39 185.252.147.231 217.105.115.96 174.97.9.254