Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: Afrihost (Pty) Ltd

Hostname: unknown

Organization: Afrihost

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Lines containing failures of 169.0.78.22


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=169.0.78.22
2019-07-29 02:03:55
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.0.78.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37063
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;169.0.78.22.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072800 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 29 02:03:49 CST 2019
;; MSG SIZE  rcvd: 115
Host info
22.78.0.169.in-addr.arpa domain name pointer 169-0-78-22.ip.afrihost.co.za.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
22.78.0.169.in-addr.arpa	name = 169-0-78-22.ip.afrihost.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.166.8.178 attackspam
May  1 06:21:31 markkoudstaal sshd[27623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.8.178
May  1 06:21:32 markkoudstaal sshd[27623]: Failed password for invalid user mpw from 188.166.8.178 port 34804 ssh2
May  1 06:25:14 markkoudstaal sshd[28401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.8.178
2020-05-01 12:26:02
95.77.177.113 attack
Automatic report - Port Scan Attack
2020-05-01 12:19:36
37.61.176.231 attack
Invalid user logs from 37.61.176.231 port 44286
2020-05-01 12:24:06
115.135.82.250 attackspambots
2020-05-01T04:20:02.867947homeassistant sshd[15350]: Invalid user vicki from 115.135.82.250 port 37150
2020-05-01T04:20:02.874336homeassistant sshd[15350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.135.82.250
...
2020-05-01 12:33:15
35.223.194.11 attack
prod3
...
2020-05-01 12:44:02
121.227.102.73 attackbots
Invalid user postgresql from 121.227.102.73 port 44980
2020-05-01 12:30:37
113.31.102.157 attackbotsspam
Wordpress malicious attack:[sshd]
2020-05-01 12:17:26
178.33.66.88 attackspam
Invalid user admin from 178.33.66.88 port 47478
2020-05-01 12:46:28
31.40.27.254 attackbots
Invalid user ts3 from 31.40.27.254 port 59068
2020-05-01 12:24:25
104.236.142.200 attack
Invalid user ir from 104.236.142.200 port 47740
2020-05-01 12:35:33
49.235.87.213 attackbots
ssh brute force
2020-05-01 12:51:02
175.118.126.18 attack
$f2bV_matches
2020-05-01 12:46:45
58.221.204.114 attack
May  1 06:27:16 meumeu sshd[27260]: Failed password for root from 58.221.204.114 port 42419 ssh2
May  1 06:31:00 meumeu sshd[27926]: Failed password for root from 58.221.204.114 port 36419 ssh2
...
2020-05-01 12:55:45
83.12.171.68 attack
Invalid user user1 from 83.12.171.68 port 15959
2020-05-01 12:20:11
222.66.154.98 attackbots
Invalid user ts6 from 222.66.154.98 port 58405
2020-05-01 12:25:05

Recently Reported IPs

156.158.107.171 178.134.186.159 37.159.225.47 110.167.113.54
226.195.207.18 88.162.91.44 116.215.158.182 71.118.9.247
2.153.107.208 165.22.175.109 154.252.185.155 20.221.255.236
103.119.25.176 26.88.197.222 53.18.111.225 230.104.231.132
150.202.244.206 65.81.184.185 100.101.235.229 5.188.62.9