Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 78.94.109.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59229
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;78.94.109.139.			IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020091001 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 11 06:19:50 CST 2020
;; MSG SIZE  rcvd: 117
Host info
139.109.94.78.in-addr.arpa domain name pointer b2b-78-94-109-139.unitymedia.biz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.109.94.78.in-addr.arpa	name = b2b-78-94-109-139.unitymedia.biz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.64.179.148 attackspambots
Apr  9 05:48:26 ns382633 sshd\[15725\]: Invalid user jsclient from 49.64.179.148 port 51158
Apr  9 05:48:26 ns382633 sshd\[15725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.64.179.148
Apr  9 05:48:28 ns382633 sshd\[15725\]: Failed password for invalid user jsclient from 49.64.179.148 port 51158 ssh2
Apr  9 05:56:10 ns382633 sshd\[17410\]: Invalid user localhost from 49.64.179.148 port 56172
Apr  9 05:56:10 ns382633 sshd\[17410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.64.179.148
2020-04-09 12:47:14
188.166.208.131 attackspam
SSH Bruteforce attack
2020-04-09 12:56:52
122.51.211.249 attackbots
Apr  8 18:47:18 hanapaa sshd\[21849\]: Invalid user test from 122.51.211.249
Apr  8 18:47:18 hanapaa sshd\[21849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.211.249
Apr  8 18:47:20 hanapaa sshd\[21849\]: Failed password for invalid user test from 122.51.211.249 port 44182 ssh2
Apr  8 18:50:23 hanapaa sshd\[22037\]: Invalid user sonny from 122.51.211.249
Apr  8 18:50:23 hanapaa sshd\[22037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.211.249
2020-04-09 13:16:21
157.230.240.34 attackspambots
SSH auth scanning - multiple failed logins
2020-04-09 12:35:27
190.66.3.92 attackspam
5x Failed Password
2020-04-09 13:15:12
180.76.190.221 attackbots
Apr  9 06:44:30 lock-38 sshd[767397]: Invalid user admin from 180.76.190.221 port 53024
Apr  9 06:44:30 lock-38 sshd[767397]: Failed password for invalid user admin from 180.76.190.221 port 53024 ssh2
Apr  9 06:47:55 lock-38 sshd[767514]: Invalid user josemaria from 180.76.190.221 port 59222
Apr  9 06:47:55 lock-38 sshd[767514]: Invalid user josemaria from 180.76.190.221 port 59222
Apr  9 06:47:55 lock-38 sshd[767514]: Failed password for invalid user josemaria from 180.76.190.221 port 59222 ssh2
...
2020-04-09 13:04:26
118.89.108.152 attack
Apr  9 05:31:05 h2646465 sshd[1758]: Invalid user zyg from 118.89.108.152
Apr  9 05:31:05 h2646465 sshd[1758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.108.152
Apr  9 05:31:05 h2646465 sshd[1758]: Invalid user zyg from 118.89.108.152
Apr  9 05:31:07 h2646465 sshd[1758]: Failed password for invalid user zyg from 118.89.108.152 port 35330 ssh2
Apr  9 05:52:11 h2646465 sshd[4429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.108.152  user=root
Apr  9 05:52:12 h2646465 sshd[4429]: Failed password for root from 118.89.108.152 port 36402 ssh2
Apr  9 05:56:12 h2646465 sshd[5031]: Invalid user teamspeak3 from 118.89.108.152
Apr  9 05:56:12 h2646465 sshd[5031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.108.152
Apr  9 05:56:12 h2646465 sshd[5031]: Invalid user teamspeak3 from 118.89.108.152
Apr  9 05:56:14 h2646465 sshd[5031]: Failed password for invalid user teams
2020-04-09 12:43:25
139.59.79.202 attack
Apr  9 06:32:04 debian-2gb-nbg1-2 kernel: \[8665738.510488\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=139.59.79.202 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=53688 PROTO=TCP SPT=55535 DPT=20628 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-09 12:55:33
165.227.26.69 attackspambots
*Port Scan* detected from 165.227.26.69 (US/United States/California/Santa Clara/-). 4 hits in the last 50 seconds
2020-04-09 12:30:09
180.76.240.54 attack
k+ssh-bruteforce
2020-04-09 12:40:00
210.97.77.161 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-04-09 12:58:24
87.248.231.195 attackbotsspam
Apr  9 05:47:58 icinga sshd[6509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.248.231.195 
Apr  9 05:48:00 icinga sshd[6509]: Failed password for invalid user amal from 87.248.231.195 port 59898 ssh2
Apr  9 05:56:02 icinga sshd[19248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.248.231.195 
...
2020-04-09 13:04:59
187.190.188.140 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-04-09 12:53:38
113.175.123.145 attackbots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-04-09 12:31:35
51.158.99.151 attack
Port probing on unauthorized port 23
2020-04-09 12:38:30

Recently Reported IPs

85.234.166.93 69.192.31.215 41.234.187.91 122.156.232.197
195.54.161.246 220.134.214.250 70.44.144.225 218.191.190.121
109.219.42.63 119.247.94.100 108.212.50.239 170.90.148.207
91.219.239.85 191.71.217.50 79.30.149.58 177.173.188.124
109.182.64.172 144.247.206.17 68.71.20.138 91.240.143.251