Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T Corp.

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspam
2020-06-29T16:32:38.615558mail.standpoint.com.ua sshd[2944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45-16-78-215.lightspeed.tukrga.sbcglobal.net
2020-06-29T16:32:38.612682mail.standpoint.com.ua sshd[2944]: Invalid user postgres from 45.16.78.215 port 40752
2020-06-29T16:32:40.634600mail.standpoint.com.ua sshd[2944]: Failed password for invalid user postgres from 45.16.78.215 port 40752 ssh2
2020-06-29T16:35:47.683388mail.standpoint.com.ua sshd[3419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45-16-78-215.lightspeed.tukrga.sbcglobal.net  user=root
2020-06-29T16:35:49.662465mail.standpoint.com.ua sshd[3419]: Failed password for root from 45.16.78.215 port 40058 ssh2
...
2020-06-30 00:11:03
attack
Jun 25 20:20:04 dev0-dcde-rnet sshd[16987]: Failed password for root from 45.16.78.215 port 58724 ssh2
Jun 25 20:26:01 dev0-dcde-rnet sshd[17050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.16.78.215
Jun 25 20:26:03 dev0-dcde-rnet sshd[17050]: Failed password for invalid user user1 from 45.16.78.215 port 56308 ssh2
2020-06-26 03:40:32
attackspam
SSH invalid-user multiple login try
2020-06-21 22:59:38
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.16.78.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31561
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.16.78.215.			IN	A

;; AUTHORITY SECTION:
.			476	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020062100 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 21 22:59:32 CST 2020
;; MSG SIZE  rcvd: 116
Host info
215.78.16.45.in-addr.arpa domain name pointer 45-16-78-215.lightspeed.tukrga.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
215.78.16.45.in-addr.arpa	name = 45-16-78-215.lightspeed.tukrga.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
157.36.216.219 attack
1433/tcp
[2019-11-16]1pkt
2019-11-17 01:30:48
103.86.111.158 attackbots
1024/tcp
[2019-11-16]1pkt
2019-11-17 01:06:39
210.56.20.181 attackspam
Nov 16 16:36:51 XXX sshd[17999]: Invalid user earl from 210.56.20.181 port 34304
2019-11-17 01:26:35
85.96.196.219 attackspambots
Automatic report - Banned IP Access
2019-11-17 01:22:59
45.146.203.36 attackspambots
Autoban   45.146.203.36 AUTH/CONNECT
2019-11-17 01:41:41
13.81.69.78 attackbots
fire
2019-11-17 00:57:59
185.67.178.250 attackspam
MYH,DEF GET /downloader/
2019-11-17 01:29:39
128.199.73.22 attackbotsspam
fire
2019-11-17 00:58:29
128.199.55.17 attack
fire
2019-11-17 00:59:55
168.194.154.110 attackspam
9000/tcp
[2019-11-16]1pkt
2019-11-17 01:09:18
103.22.250.194 attack
LAMP,DEF GET /wp-login.php
2019-11-17 01:29:02
122.180.48.29 attackspambots
Nov 16 11:46:29 firewall sshd[22300]: Invalid user vx from 122.180.48.29
Nov 16 11:46:31 firewall sshd[22300]: Failed password for invalid user vx from 122.180.48.29 port 54696 ssh2
Nov 16 11:51:21 firewall sshd[22413]: Invalid user ubu from 122.180.48.29
...
2019-11-17 01:31:47
201.190.217.166 attackbots
23/tcp
[2019-11-16]1pkt
2019-11-17 00:56:54
181.129.14.218 attackspam
Nov 16 17:17:41 eventyay sshd[6301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.14.218
Nov 16 17:17:42 eventyay sshd[6301]: Failed password for invalid user zejing from 181.129.14.218 port 54486 ssh2
Nov 16 17:22:09 eventyay sshd[6416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.14.218
...
2019-11-17 01:08:10
201.150.109.105 attackspambots
scan z
2019-11-17 01:00:47

Recently Reported IPs

203.78.119.254 54.160.254.115 166.208.11.127 227.255.52.140
150.78.201.16 146.130.129.2 57.106.154.230 176.98.65.43
180.141.140.50 237.221.47.99 184.22.113.207 135.88.253.251
92.206.38.116 67.79.62.91 96.248.160.43 131.238.136.33
189.57.198.41 55.201.199.236 180.202.74.216 45.153.242.163