Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Brno

Region: South Moravian Region (Jihomoravsky kraj)

Country: Czechia

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 78.45.134.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38156
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;78.45.134.2.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023053102 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 01 08:08:37 CST 2023
;; MSG SIZE  rcvd: 104
Host info
2.134.45.78.in-addr.arpa domain name pointer ip-78-45-134-2.bb.vodafone.cz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.134.45.78.in-addr.arpa	name = ip-78-45-134-2.bb.vodafone.cz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
110.80.17.26 attack
Oct 14 16:10:03 vmd17057 sshd\[31709\]: Invalid user cmd from 110.80.17.26 port 44366
Oct 14 16:10:03 vmd17057 sshd\[31709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.80.17.26
Oct 14 16:10:05 vmd17057 sshd\[31709\]: Failed password for invalid user cmd from 110.80.17.26 port 44366 ssh2
...
2019-10-14 23:41:13
137.74.158.143 attackspambots
[munged]::443 137.74.158.143 - - [14/Oct/2019:15:40:54 +0200] "POST /[munged]: HTTP/1.1" 200 6665 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-14 23:51:12
110.74.222.145 attackbots
Automatic report - XMLRPC Attack
2019-10-14 23:59:29
69.90.16.116 attackbotsspam
Oct 14 12:58:21 microserver sshd[62248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.90.16.116  user=root
Oct 14 12:58:23 microserver sshd[62248]: Failed password for root from 69.90.16.116 port 32836 ssh2
Oct 14 13:02:40 microserver sshd[62906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.90.16.116  user=root
Oct 14 13:02:42 microserver sshd[62906]: Failed password for root from 69.90.16.116 port 44462 ssh2
Oct 14 13:07:02 microserver sshd[63562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.90.16.116  user=root
Oct 14 13:20:00 microserver sshd[65021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.90.16.116  user=root
Oct 14 13:20:02 microserver sshd[65021]: Failed password for root from 69.90.16.116 port 34490 ssh2
Oct 14 13:24:26 microserver sshd[437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ss
2019-10-14 23:38:14
201.150.5.14 attackbotsspam
Lines containing failures of 201.150.5.14
Oct 14 10:52:58 nxxxxxxx sshd[32322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.150.5.14  user=r.r
Oct 14 10:53:00 nxxxxxxx sshd[32322]: Failed password for r.r from 201.150.5.14 port 60238 ssh2
Oct 14 10:53:00 nxxxxxxx sshd[32322]: Received disconnect from 201.150.5.14 port 60238:11: Bye Bye [preauth]
Oct 14 10:53:00 nxxxxxxx sshd[32322]: Disconnected from authenticating user r.r 201.150.5.14 port 60238 [preauth]
Oct 14 11:24:00 nxxxxxxx sshd[3537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.150.5.14  user=r.r
Oct 14 11:24:02 nxxxxxxx sshd[3537]: Failed password for r.r from 201.150.5.14 port 51656 ssh2
Oct 14 11:24:02 nxxxxxxx sshd[3537]: Received disconnect from 201.150.5.14 port 51656:11: Bye Bye [preauth]
Oct 14 11:24:02 nxxxxxxx sshd[3537]: Disconnected from authenticating user r.r 201.150.5.14 port 51656 [preauth]
Oct 14 11:2........
------------------------------
2019-10-15 00:03:26
62.234.91.204 attack
Oct 14 13:33:10 microserver sshd[1770]: Invalid user contrasena1q from 62.234.91.204 port 48386
Oct 14 13:33:10 microserver sshd[1770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.91.204
Oct 14 13:33:12 microserver sshd[1770]: Failed password for invalid user contrasena1q from 62.234.91.204 port 48386 ssh2
Oct 14 13:38:19 microserver sshd[2420]: Invalid user Admin2013 from 62.234.91.204 port 39105
Oct 14 13:38:19 microserver sshd[2420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.91.204
Oct 14 13:48:38 microserver sshd[3781]: Invalid user C3NT0S@2018 from 62.234.91.204 port 48772
Oct 14 13:48:38 microserver sshd[3781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.91.204
Oct 14 13:48:40 microserver sshd[3781]: Failed password for invalid user C3NT0S@2018 from 62.234.91.204 port 48772 ssh2
Oct 14 13:53:51 microserver sshd[4457]: Invalid user ZaQXsWCdE from 62.23
2019-10-14 23:29:08
92.119.160.107 attack
Excessive Port-Scanning
2019-10-14 23:40:49
34.253.231.151 attackspam
Automatic report - XMLRPC Attack
2019-10-14 23:32:09
104.41.41.14 attack
www.geburtshaus-fulda.de 104.41.41.14 \[14/Oct/2019:13:48:40 +0200\] "POST /wp-login.php HTTP/1.1" 200 5786 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.geburtshaus-fulda.de 104.41.41.14 \[14/Oct/2019:13:48:42 +0200\] "POST /wp-login.php HTTP/1.1" 200 5790 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-10-15 00:02:29
149.56.109.57 attackbots
Triggered by Fail2Ban at Ares web server
2019-10-14 23:35:19
157.230.240.34 attack
Automatic report - Banned IP Access
2019-10-14 23:44:01
81.22.45.107 attackspam
2019-10-14T17:58:46.117179+02:00 lumpi kernel: [891137.171045] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.107 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=39348 PROTO=TCP SPT=48649 DPT=7222 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-15 00:00:14
142.44.211.229 attack
Oct 14 13:45:38 SilenceServices sshd[31195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.211.229
Oct 14 13:45:39 SilenceServices sshd[31195]: Failed password for invalid user Rolls2017 from 142.44.211.229 port 59734 ssh2
Oct 14 13:49:35 SilenceServices sshd[32264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.211.229
2019-10-14 23:35:34
106.12.126.42 attackbotsspam
Oct 14 13:43:41 icinga sshd[24444]: Failed password for root from 106.12.126.42 port 44380 ssh2
...
2019-10-14 23:53:05
185.36.81.243 attackbotsspam
Oct 14 06:56:08 mail postfix/postscreen[237734]: PREGREET 11 after 0.17 from [185.36.81.243]:49001: EHLO User

...
2019-10-14 23:52:39

Recently Reported IPs

34.230.114.15 41.99.199.86 139.28.252.89 177.33.141.201
196.112.247.218 12.228.16.45 118.92.244.25 45.13.39.1
30.20.166.150 188.119.65.58 136.143.189.62 13.100.42.245
83.166.247.83 44.233.93.254 84.51.107.41 190.121.219.162
52.28.119.229 83.245.142.229 181.121.174.226 189.41.184.2