Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Lithuania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 78.62.74.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52082
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;78.62.74.138.			IN	A

;; AUTHORITY SECTION:
.			81	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032602 1800 900 604800 86400

;; Query time: 102 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 27 03:18:00 CST 2022
;; MSG SIZE  rcvd: 105
Host info
138.74.62.78.in-addr.arpa domain name pointer 78-62-74-138.static.zebra.lt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.74.62.78.in-addr.arpa	name = 78-62-74-138.static.zebra.lt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
142.44.185.242 attack
Invalid user ubuntu from 142.44.185.242 port 51396
2020-04-24 14:21:47
123.58.5.243 attack
Invalid user test from 123.58.5.243 port 44391
2020-04-24 13:48:00
171.221.244.26 attackspam
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-04-24 14:06:23
59.26.237.138 attackbotsspam
trying to access non-authorized port
2020-04-24 13:50:32
78.186.112.235 attack
SpamScore above: 10.0
2020-04-24 13:55:57
117.173.67.119 attack
Apr 24 05:55:11 pornomens sshd\[13690\]: Invalid user la from 117.173.67.119 port 2573
Apr 24 05:55:11 pornomens sshd\[13690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.173.67.119
Apr 24 05:55:13 pornomens sshd\[13690\]: Failed password for invalid user la from 117.173.67.119 port 2573 ssh2
...
2020-04-24 14:14:41
145.239.91.88 attack
Wordpress malicious attack:[sshd]
2020-04-24 13:41:32
41.38.157.225 attackbots
Automatic report - Port Scan Attack
2020-04-24 14:07:29
98.143.148.45 attack
Apr 23 20:01:18 tdfoods sshd\[24030\]: Invalid user oracle from 98.143.148.45
Apr 23 20:01:18 tdfoods sshd\[24030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.143.148.45
Apr 23 20:01:21 tdfoods sshd\[24030\]: Failed password for invalid user oracle from 98.143.148.45 port 49904 ssh2
Apr 23 20:07:07 tdfoods sshd\[24456\]: Invalid user sz from 98.143.148.45
Apr 23 20:07:08 tdfoods sshd\[24456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.143.148.45
2020-04-24 14:11:23
118.25.104.48 attack
Apr 24 05:55:31 sxvn sshd[422049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.104.48
2020-04-24 14:02:48
194.26.29.212 attack
Apr 24 07:43:12 debian-2gb-nbg1-2 kernel: \[9965938.615540\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.212 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=36403 PROTO=TCP SPT=55761 DPT=7165 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-24 13:58:32
46.142.79.120 attackspambots
Lines containing failures of 46.142.79.120
Apr 23 20:53:00 server-name sshd[13260]: Invalid user admin from 46.142.79.120 port 37256
Apr 23 20:53:00 server-name sshd[13260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.142.79.120 
Apr 23 20:53:02 server-name sshd[13260]: Failed password for invalid user admin from 46.142.79.120 port 37256 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=46.142.79.120
2020-04-24 13:42:05
177.84.77.115 attack
Apr 24 07:41:42 vpn01 sshd[19617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.84.77.115
Apr 24 07:41:44 vpn01 sshd[19617]: Failed password for invalid user io from 177.84.77.115 port 47202 ssh2
...
2020-04-24 14:13:55
118.148.30.13 attack
vvbc
2020-04-24 13:41:09
144.217.34.148 attackbotsspam
srv02 Mass scanning activity detected Target: 5093  ..
2020-04-24 14:21:04

Recently Reported IPs

66.21.84.154 1.238.192.170 125.157.33.76 33.144.11.88
4.57.196.86 116.238.12.79 136.148.111.208 185.146.221.159
72.1.117.225 242.117.21.21 23.21.85.180 242.106.207.17
40.71.159.101 57.238.224.49 6.73.127.138 120.26.164.7
90.5.189.246 116.37.2.194 11.180.130.226 3.129.201.83