Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.119.41.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49556
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.119.41.78.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021100 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 11 14:43:07 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 78.41.119.212.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 78.41.119.212.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
5.40.131.80 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 21:19:48,035 INFO [shellcode_manager] (5.40.131.80) no match, writing hexdump (8ee098392833ee6222b537ee8744b400 :46842) - MS17010 (EternalBlue)
2019-07-10 14:17:34
185.212.171.150 attackbots
(From timasteixeira@yahoo.com) Cryptocurrency Trading & Investing Strategy for 2019. Receive passive income of $ 70,000 per month: https://hec.su/jTCn?iM5HFQ
2019-07-10 13:59:22
78.46.75.251 attackbots
Many RDP login attempts detected by IDS script
2019-07-10 14:34:13
200.57.73.170 attackbots
Jul 10 01:05:06 web1 postfix/smtpd[24085]: warning: unknown[200.57.73.170]: SASL LOGIN authentication failed: authentication failure
...
2019-07-10 14:27:40
141.98.10.53 attackspam
Rude login attack (19 tries in 1d)
2019-07-10 14:15:58
141.98.10.52 attackspambots
Rude login attack (18 tries in 1d)
2019-07-10 14:21:02
61.177.172.158 attack
2019-07-10T05:23:39.311986abusebot-8.cloudsearch.cf sshd\[18558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.158  user=root
2019-07-10 14:11:15
140.143.206.137 attackspam
Jul 10 02:19:55 server sshd[42675]: Failed password for invalid user sonar from 140.143.206.137 port 38166 ssh2
Jul 10 02:40:59 server sshd[46830]: Failed password for root from 140.143.206.137 port 39284 ssh2
Jul 10 02:42:28 server sshd[47132]: Failed password for invalid user admin from 140.143.206.137 port 52748 ssh2
2019-07-10 14:20:35
198.71.231.14 attack
xmlrpc attack
2019-07-10 14:16:47
183.88.8.12 attackspam
SSHD brute force attack detected by fail2ban
2019-07-10 13:49:54
132.232.40.86 attack
Jul 10 06:32:51 pornomens sshd\[30819\]: Invalid user pavbras from 132.232.40.86 port 56762
Jul 10 06:32:51 pornomens sshd\[30819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.40.86
Jul 10 06:32:53 pornomens sshd\[30819\]: Failed password for invalid user pavbras from 132.232.40.86 port 56762 ssh2
...
2019-07-10 14:12:31
106.75.3.52 attackbotsspam
port scan and connect, tcp 1521 (oracle-old)
2019-07-10 14:30:08
168.205.110.147 attackspam
failed_logins
2019-07-10 14:00:15
34.80.24.133 attackspambots
Tried sshing with brute force.
2019-07-10 14:29:41
159.65.242.16 attackspambots
Reported by AbuseIPDB proxy server.
2019-07-10 14:06:40

Recently Reported IPs

212.119.41.34 212.119.41.49 212.119.44.152 212.119.41.83
212.119.44.168 212.174.171.22 212.192.241.10 212.193.30.42
212.200.149.242 212.193.30.165 212.234.17.49 212.243.9.107
212.60.20.92 212.39.170.152 213.108.1.209 213.108.1.142
213.108.1.11 213.108.1.218 213.108.1.159 213.108.1.109