Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Essen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 78.48.171.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6568
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;78.48.171.55.			IN	A

;; AUTHORITY SECTION:
.			442	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010200 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 02 23:18:28 CST 2020
;; MSG SIZE  rcvd: 116
Host info
55.171.48.78.in-addr.arpa domain name pointer x4e30ab37.dyn.telefonica.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.171.48.78.in-addr.arpa	name = x4e30ab37.dyn.telefonica.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.69.250 attack
Port scan: Attack repeated for 24 hours
2020-10-07 00:48:52
211.23.114.197 attackspam
445/tcp 445/tcp
[2020-08-06/10-05]2pkt
2020-10-07 01:05:32
91.144.21.81 attackbotsspam
445/tcp 445/tcp
[2020-09-12/10-05]2pkt
2020-10-07 01:17:24
35.186.145.141 attackspambots
2 SSH login attempts.
2020-10-07 00:41:52
111.229.60.6 attack
(sshd) Failed SSH login from 111.229.60.6 (CN/China/-): 5 in the last 3600 secs
2020-10-07 00:49:57
161.35.11.118 attack
Oct  6 09:50:25 vlre-nyc-1 sshd\[4858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.11.118  user=root
Oct  6 09:50:27 vlre-nyc-1 sshd\[4858\]: Failed password for root from 161.35.11.118 port 44538 ssh2
Oct  6 09:55:30 vlre-nyc-1 sshd\[4975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.11.118  user=root
Oct  6 09:55:31 vlre-nyc-1 sshd\[4975\]: Failed password for root from 161.35.11.118 port 44002 ssh2
Oct  6 09:57:33 vlre-nyc-1 sshd\[5038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.11.118  user=root
...
2020-10-07 01:05:16
192.241.239.218 attackspambots
TCP port : 7199
2020-10-07 00:50:58
62.140.0.108 attackspambots
Automatic report - Banned IP Access
2020-10-07 01:09:41
177.23.150.66 attack
445/tcp 445/tcp
[2020-08-06/10-05]2pkt
2020-10-07 01:11:26
140.255.122.159 attack
Found on   CINS badguys     / proto=6  .  srcport=54823  .  dstport=23 Telnet  .     (1723)
2020-10-07 01:09:23
103.140.127.227 attackbotsspam
1433/tcp 445/tcp 1433/tcp
[2020-10-02/05]3pkt
2020-10-07 00:57:18
118.123.173.18 attackbots
Icarus honeypot on github
2020-10-07 01:02:59
24.50.250.99 attackspambots
1601930394 - 10/05/2020 22:39:54 Host: 24.50.250.99/24.50.250.99 Port: 445 TCP Blocked
...
2020-10-07 00:42:50
175.125.95.160 attackbots
Oct  6 19:05:07 buvik sshd[16504]: Failed password for root from 175.125.95.160 port 54548 ssh2
Oct  6 19:09:29 buvik sshd[17172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.125.95.160  user=root
Oct  6 19:09:31 buvik sshd[17172]: Failed password for root from 175.125.95.160 port 33636 ssh2
...
2020-10-07 01:10:31
104.168.47.109 attack
File does not exist%3a %2fhome%2fschoenbrun.com%2fpublic_html%2f.env
2020-10-07 00:49:14

Recently Reported IPs

15.11.70.38 112.166.113.147 157.119.3.70 42.140.17.244
186.151.187.179 71.225.29.46 211.137.239.56 3.239.194.245
132.19.107.251 204.206.130.197 196.149.17.178 95.230.87.136
130.155.223.58 78.210.106.130 89.4.249.25 212.200.36.219
179.165.242.136 72.176.49.153 212.166.108.176 46.126.165.45