Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 78.49.8.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60027
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;78.49.8.194.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 19:53:42 CST 2025
;; MSG SIZE  rcvd: 104
Host info
194.8.49.78.in-addr.arpa domain name pointer dynamic-078-049-008-194.78.49.pool.telefonica.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
194.8.49.78.in-addr.arpa	name = dynamic-078-049-008-194.78.49.pool.telefonica.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.145.66.221 attackbotsspam
" "
2020-06-29 20:43:57
14.171.39.143 attack
Unauthorized connection attempt from IP address 14.171.39.143 on Port 445(SMB)
2020-06-29 21:14:01
5.39.75.36 attack
Jun 29 14:27:07 vps687878 sshd\[18820\]: Failed password for invalid user apitest from 5.39.75.36 port 39388 ssh2
Jun 29 14:30:23 vps687878 sshd\[19048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.75.36  user=root
Jun 29 14:30:26 vps687878 sshd\[19048\]: Failed password for root from 5.39.75.36 port 39806 ssh2
Jun 29 14:33:36 vps687878 sshd\[19427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.75.36  user=root
Jun 29 14:33:38 vps687878 sshd\[19427\]: Failed password for root from 5.39.75.36 port 40184 ssh2
...
2020-06-29 20:35:41
62.60.135.237 attackspam
Jun 29 09:28:08 ws12vmsma01 sshd[30206]: Invalid user opus from 62.60.135.237
Jun 29 09:28:10 ws12vmsma01 sshd[30206]: Failed password for invalid user opus from 62.60.135.237 port 56809 ssh2
Jun 29 09:32:31 ws12vmsma01 sshd[30849]: Invalid user profe from 62.60.135.237
...
2020-06-29 21:20:21
183.56.203.81 attackbots
Jun 29 14:16:44 inter-technics sshd[15848]: Invalid user stanley from 183.56.203.81 port 47868
Jun 29 14:16:44 inter-technics sshd[15848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.56.203.81
Jun 29 14:16:44 inter-technics sshd[15848]: Invalid user stanley from 183.56.203.81 port 47868
Jun 29 14:16:46 inter-technics sshd[15848]: Failed password for invalid user stanley from 183.56.203.81 port 47868 ssh2
Jun 29 14:20:36 inter-technics sshd[16131]: Invalid user karim from 183.56.203.81 port 59130
...
2020-06-29 20:34:49
74.10.153.0 attackbots
Unauthorized connection attempt: SRC=74.10.153.0
...
2020-06-29 20:58:53
206.180.160.119 attackspambots
port scan and connect, tcp 1433 (ms-sql-s)
2020-06-29 21:00:21
78.128.113.22 attack
16 attempts against mh-mag-login-ban on comet
2020-06-29 20:53:38
45.180.156.3 attack
SMB Server BruteForce Attack
2020-06-29 20:50:45
213.227.251.212 attackspam
SMB Server BruteForce Attack
2020-06-29 20:58:21
193.189.77.133 attackspam
2020-06-29 12:41:28 plain_virtual_exim authenticator failed for ([193.189.77.133]) [193.189.77.133]: 535 Incorrect authentication data


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=193.189.77.133
2020-06-29 21:19:14
122.118.194.139 attackspam
Port probing on unauthorized port 23
2020-06-29 21:17:39
106.12.148.201 attackspam
(sshd) Failed SSH login from 106.12.148.201 (CN/China/-): 5 in the last 3600 secs
2020-06-29 20:48:05
114.33.62.81 attackspambots
Port probing on unauthorized port 88
2020-06-29 20:37:56
14.21.42.158 attack
SSH Brute Force
2020-06-29 20:57:50

Recently Reported IPs

212.228.107.176 59.207.244.232 29.31.200.245 126.95.193.248
197.243.76.72 203.138.92.207 41.220.128.128 124.174.32.39
57.240.75.92 170.101.247.75 252.10.41.49 202.89.200.67
230.182.236.77 78.126.175.100 64.202.136.105 211.24.42.76
232.245.103.187 169.243.38.37 192.15.214.142 41.154.91.242