Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Albania

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '78.159.131.0 - 78.159.131.255'

% Abuse contact for '78.159.131.0 - 78.159.131.255' is 'abuse@globconnex.com'

inetnum:        78.159.131.0 - 78.159.131.255
abuse-c:        ACRO55365-RIPE
org:            ORG-GCSL7-RIPE
netname:        GCS_SER-NET
country:        AL
admin-c:        EM14633-RIPE
tech-c:         EM14633-RIPE
status:         ASSIGNED PA
mnt-by:         mnt-bg-eurocrypt-1
created:        2025-07-17T08:05:02Z
last-modified:  2025-07-17T08:05:02Z
source:         RIPE

organisation:   ORG-GCSL7-RIPE
descr:          Global Connectivity Solutions
org-name:       GLOBAL CONNECTIVITY SOLUTIONS LLP
country:        GB
org-type:       OTHER
address:        Suite 310, 21 Hill Street, Haverfordwest, Pembrokeshire, SA61 1QQ
reg-nr:         OC450701
abuse-c:        ACRO55365-RIPE
remarks:        -----CONTACT-----
remarks:        abuse: abuse@globconnex.com
remarks:        support: support@globconnex.com
remarks:        -------END-------
mnt-ref:        GIRnet-mnt
remarks:        -----CUSTOMERS-----
mnt-ref:        AM-VDS
mnt-ref:        INETTECH-MNT
mnt-ref:        ru-avm-1-mnt
mnt-ref:        ru-pev-1-mnt
mnt-ref:        PROEKT-MNT
mnt-ref:        proxy-six-mnt
mnt-ref:        IPSMAIN
mnt-ref:        IEAG
mnt-ref:        MNT-DGTL
mnt-ref:        MNT-INTERLAN
mnt-ref:        AZERONLINE-MNT
mnt-ref:        lir-ru-powernet-1-MNT
mnt-ref:        lir-ru-llclorien-1-MNT
mnt-ref:        ru-permtelecom-1-mnt
mnt-ref:        DATAMAX-M
mnt-ref:        IVC-MNT
mnt-ref:        FREENET-MNT
mnt-ref:        BG-MNT
mnt-ref:        ru-quasar-1-mnt
mnt-ref:        voldeta-mnt
mnt-ref:        interlir-mnt
mnt-ref:        mnt-ru-ipdenisova-1
mnt-ref:        MNT-STRL
mnt-ref:        MNT-GCX
mnt-ref:        ROSNIIROS-MNT
mnt-ref:        IPMAGNAT-MNT
mnt-ref:        VPSVILLE-mnt
mnt-ref:        lir-ae-royal-1-MNT
mnt-ref:        MNT-NETERRA
mnt-ref:        SVT-RIPE-MNT
mnt-ref:        mnt-ru-am-1
mnt-ref:        us-coreip-1-mnt
mnt-ref:        mnt-bg-eurocrypt-1
mnt-ref:        lir-ae-technology-1-MNT
mnt-ref:        sc-rapidseedbox-1-mnt
mnt-ref:        sistemaltd-mnt
mnt-ref:        mnt-hr-maxko-1
mnt-ref:        MNT-TIGRIS
mnt-ref:        mnt-yuglink
mnt-ref:        ru-ip84-1-mnt
mnt-ref:        ru-avm-1-mnt
mnt-ref:        IROST-MNT
mnt-ref:        AS12890-MNT
mnt-ref:        sistemaltd-mnt
mnt-ref:        zanemint-mnt
mnt-ref:        ftel-mnt
mnt-ref:        tr-hopes-1-mnt
remarks:        --------END--------
mnt-by:         GCS-MNT
created:        2024-01-25T10:49:19Z
last-modified:  2026-04-29T07:26:07Z
source:         RIPE # Filtered

person:         Global Connectivity Solutions
address:        Suite 310, 21 Hill Street, Haverfordwest, Pembrokeshire, SA61 1QQ
remarks:        -----CONTACT-----
remarks:        -------END-------
phone:          +44 117 409 0977
nic-hdl:        EM14633-RIPE
mnt-by:         GCS-MNT
created:        2024-01-25T10:42:56Z
last-modified:  2024-10-26T14:02:57Z
source:         RIPE # Filtered

% Information related to '78.159.131.0/24AS215540'

route:          78.159.131.0/24
origin:         AS215540
mnt-by:         mnt-bg-eurocrypt-1
created:        2025-02-14T07:48:14Z
last-modified:  2025-02-14T07:48:14Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (ABERDEEN)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 78.159.131.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22391
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;78.159.131.56.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042900 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 29 22:00:16 CST 2026
;; MSG SIZE  rcvd: 106
Host info
56.131.159.78.in-addr.arpa domain name pointer 42957.ip-ptr.tech.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
56.131.159.78.in-addr.arpa	name = 42957.ip-ptr.tech.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
149.28.66.30 attackbotsspam
SS1,DEF GET /wp-login.php
2019-10-31 03:18:07
31.173.87.83 attackbotsspam
Переходите на сайт, чтобы узнать подробнее про предложение  http://agressor-seo.ru. Денис.

--
Mozilla/5.0 (Windows NT 6.3; WOW64; rv:52.59.12) Gecko/20160044 Firefox/52.59.12
2019-10-31 03:26:43
112.78.179.124 attack
Unauthorized connection attempt from IP address 112.78.179.124 on Port 445(SMB)
2019-10-31 03:24:59
140.210.9.80 attack
'Fail2Ban'
2019-10-31 03:43:13
193.227.49.2 attack
Unauthorized connection attempt from IP address 193.227.49.2 on Port 445(SMB)
2019-10-31 03:35:05
185.220.101.70 attack
Oct 30 05:29:23 tdfoods sshd\[24581\]: Invalid user 22 from 185.220.101.70
Oct 30 05:29:23 tdfoods sshd\[24581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.70
Oct 30 05:29:25 tdfoods sshd\[24581\]: Failed password for invalid user 22 from 185.220.101.70 port 43959 ssh2
Oct 30 05:29:29 tdfoods sshd\[24586\]: Invalid user 266344 from 185.220.101.70
Oct 30 05:29:29 tdfoods sshd\[24586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.70
2019-10-31 03:42:42
103.129.99.72 attack
http://....com/.../?locale=en1111111111111'%20UNION%20SELECT%20CHAR(45,120,49,45,81,45),CHAR(45,120,50,45,81,45)--%20%20
2019-10-31 03:10:09
189.212.121.158 attackbots
Automatic report - Port Scan Attack
2019-10-31 03:28:19
45.225.216.80 attackspambots
2019-10-30T13:55:38.871198abusebot-4.cloudsearch.cf sshd\[31983\]: Invalid user deanca from 45.225.216.80 port 43578
2019-10-31 03:41:34
163.172.158.86 attack
Lines containing failures of 163.172.158.86
Oct 30 12:39:54 mx-in-01 sshd[21801]: Did not receive identification string from 163.172.158.86 port 44092
Oct 30 12:39:56 mx-in-01 sshd[21802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.158.86  user=r.r
Oct 30 12:39:58 mx-in-01 sshd[21802]: Failed password for r.r from 163.172.158.86 port 44098 ssh2
Oct 30 12:40:01 mx-in-01 sshd[21804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.158.86  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=163.172.158.86
2019-10-31 03:17:38
106.12.60.185 attackbots
2019-10-28 22:55:22 server sshd[17382]: Failed password for invalid user root from 106.12.60.185 port 34304 ssh2
2019-10-31 03:34:30
111.26.163.176 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-10-31 03:43:37
167.71.212.242 attack
2019-10-30T13:40:10.843975tmaserv sshd\[4405\]: Invalid user 12345678 from 167.71.212.242 port 51818
2019-10-30T13:40:10.850306tmaserv sshd\[4405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.212.242
2019-10-30T13:40:12.175639tmaserv sshd\[4405\]: Failed password for invalid user 12345678 from 167.71.212.242 port 51818 ssh2
2019-10-30T13:44:46.734466tmaserv sshd\[4634\]: Invalid user member from 167.71.212.242 port 38736
2019-10-30T13:44:46.740721tmaserv sshd\[4634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.212.242
2019-10-30T13:44:48.623010tmaserv sshd\[4634\]: Failed password for invalid user member from 167.71.212.242 port 38736 ssh2
...
2019-10-31 03:13:33
5.160.130.2 attackbotsspam
Unauthorized connection attempt from IP address 5.160.130.2 on Port 445(SMB)
2019-10-31 03:44:36
118.24.99.161 attack
Automatic report - Banned IP Access
2019-10-31 03:16:06

Recently Reported IPs

5.175.178.6 163.192.193.212 37.188.212.42 8.210.202.117
95.216.194.80 46.101.100.23 2606:4700:10::6816:1016 2606:4700:10::6816:4674
27.220.145.179 36.54.111.11 66.132.172.136 74.7.242.63
2606:4700:10::6816:2570 2606:4700:10::6814:7424 2606:4700:10::6814:5110 2606:4700:10::6814:7256
187.46.82.171 114.140.113.122 185.93.89.191 185.93.89.190