Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.22.78.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63651
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.22.78.114.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 10:55:51 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 114.78.22.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.78.22.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
125.211.217.25 attackbots
port scan and connect, tcp 1433 (ms-sql-s)
2019-11-13 20:42:53
144.217.161.22 attackspambots
144.217.161.22 - - [13/Nov/2019:13:27:05 +0100] "POST /wp-login.php HTTP/1.1" 200 3126 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
144.217.161.22 - - [13/Nov/2019:13:27:09 +0100] "POST /wp-login.php HTTP/1.1" 200 3105 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-11-13 21:04:26
113.224.128.34 attackbotsspam
3 failed ftp login attempts in 3600s
2019-11-13 20:40:35
178.128.223.243 attackbots
Nov 13 11:54:30 localhost sshd\[80356\]: Invalid user lewicki from 178.128.223.243 port 33112
Nov 13 11:54:30 localhost sshd\[80356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.223.243
Nov 13 11:54:32 localhost sshd\[80356\]: Failed password for invalid user lewicki from 178.128.223.243 port 33112 ssh2
Nov 13 11:58:59 localhost sshd\[80468\]: Invalid user admin from 178.128.223.243 port 42140
Nov 13 11:58:59 localhost sshd\[80468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.223.243
...
2019-11-13 20:30:47
178.128.55.52 attackbots
Nov 13 13:41:58 XXX sshd[60212]: Invalid user ofsaa from 178.128.55.52 port 59872
2019-11-13 21:06:50
123.195.161.47 attack
Port scan
2019-11-13 21:03:11
106.12.6.74 attackbotsspam
Nov 13 08:52:10 firewall sshd[24635]: Invalid user teamspeak5 from 106.12.6.74
Nov 13 08:52:12 firewall sshd[24635]: Failed password for invalid user teamspeak5 from 106.12.6.74 port 55596 ssh2
Nov 13 08:56:43 firewall sshd[24724]: Invalid user mobile from 106.12.6.74
...
2019-11-13 21:02:48
122.224.203.228 attack
Nov 13 07:16:29 meumeu sshd[944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.203.228 
Nov 13 07:16:31 meumeu sshd[944]: Failed password for invalid user zig from 122.224.203.228 port 39178 ssh2
Nov 13 07:21:11 meumeu sshd[1503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.203.228 
...
2019-11-13 20:36:52
18.200.228.94 attackspam
Distributed brute force attack
2019-11-13 20:36:35
14.63.194.162 attackspambots
Nov 13 07:30:58 game-panel sshd[17292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.194.162
Nov 13 07:31:00 game-panel sshd[17292]: Failed password for invalid user cool from 14.63.194.162 port 50792 ssh2
Nov 13 07:35:27 game-panel sshd[17422]: Failed password for root from 14.63.194.162 port 31051 ssh2
2019-11-13 20:54:50
54.37.131.131 attack
Distributed brute force attack
2019-11-13 20:57:37
131.161.85.130 attackbots
Automatic report - Port Scan Attack
2019-11-13 20:52:18
45.143.221.15 attack
\[2019-11-13 07:13:41\] NOTICE\[2601\] chan_sip.c: Registration from '"704" \' failed for '45.143.221.15:5808' - Wrong password
\[2019-11-13 07:13:41\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-13T07:13:41.071-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="704",SessionID="0x7fdf2ccecc48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.221.15/5808",Challenge="284f4920",ReceivedChallenge="284f4920",ReceivedHash="7751d46053bc9833297c15b8e716a824"
\[2019-11-13 07:13:41\] NOTICE\[2601\] chan_sip.c: Registration from '"704" \' failed for '45.143.221.15:5808' - Wrong password
\[2019-11-13 07:13:41\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-13T07:13:41.213-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="704",SessionID="0x7fdf2cd1cd48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.1
2019-11-13 20:27:48
118.24.201.132 attackspam
leo_www
2019-11-13 20:46:24
117.157.78.2 attackspam
firewall-block, port(s): 1433/tcp
2019-11-13 21:04:39

Recently Reported IPs

246.37.201.181 161.155.244.189 122.168.11.11 43.167.217.165
173.92.27.146 62.197.3.76 140.47.180.6 91.50.3.251
189.121.140.223 234.184.86.184 57.58.254.114 118.106.213.132
155.213.177.20 232.32.23.43 247.33.225.32 4.119.35.0
30.43.194.177 5.132.96.90 22.221.56.135 137.43.37.249