Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: Unitymedia NRW GmbH

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
Unauthorized connection attempt detected from IP address 78.94.94.122 to port 2220 [J]
2020-01-27 01:15:16
attack
1578113326 - 01/04/2020 05:48:46 Host: 78.94.94.122/78.94.94.122 Port: 22 TCP Blocked
2020-01-04 17:51:17
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 78.94.94.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17175
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;78.94.94.122.			IN	A

;; AUTHORITY SECTION:
.			495	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010400 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 04 17:51:13 CST 2020
;; MSG SIZE  rcvd: 116
Host info
122.94.94.78.in-addr.arpa domain name pointer b2b-78-94-94-122.unitymedia.biz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
122.94.94.78.in-addr.arpa	name = b2b-78-94-94-122.unitymedia.biz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
219.159.83.164 attackspam
Invalid user smbread from 219.159.83.164 port 38315
2020-07-18 21:41:39
218.28.244.242 attack
Invalid user saman from 218.28.244.242 port 52070
2020-07-18 21:42:25
14.116.222.146 attack
Invalid user dana from 14.116.222.146 port 41862
2020-07-18 21:40:45
122.144.212.144 attack
Invalid user harry from 122.144.212.144 port 38838
2020-07-18 21:17:56
104.248.209.204 attack
Invalid user admin from 104.248.209.204 port 44532
2020-07-18 21:22:53
82.221.100.91 attackbots
Invalid user godfrey from 82.221.100.91 port 33476
2020-07-18 21:27:54
129.226.117.160 attackspam
Invalid user cf from 129.226.117.160 port 59452
2020-07-18 21:17:04
223.4.66.84 attack
2020-07-18T15:02:07.349731sd-86998 sshd[10565]: Invalid user intranet from 223.4.66.84 port 12044
2020-07-18T15:02:07.351997sd-86998 sshd[10565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.4.66.84
2020-07-18T15:02:07.349731sd-86998 sshd[10565]: Invalid user intranet from 223.4.66.84 port 12044
2020-07-18T15:02:09.078822sd-86998 sshd[10565]: Failed password for invalid user intranet from 223.4.66.84 port 12044 ssh2
2020-07-18T15:05:44.509308sd-86998 sshd[10959]: Invalid user notes from 223.4.66.84 port 55041
...
2020-07-18 21:40:57
201.116.194.210 attack
SSH BruteForce Attack
2020-07-18 21:46:21
85.66.249.123 attackbotsspam
Invalid user pi from 85.66.249.123 port 53198
2020-07-18 21:27:23
60.167.178.4 attackbotsspam
Invalid user jamil from 60.167.178.4 port 33666
2020-07-18 21:33:42
51.255.173.70 attackbots
Invalid user mehrdad from 51.255.173.70 port 53260
2020-07-18 21:35:21
219.249.62.179 attackspam
Invalid user roshan from 219.249.62.179 port 35944
2020-07-18 21:41:19
58.87.97.166 attackspam
Invalid user user001 from 58.87.97.166 port 53810
2020-07-18 21:34:16
104.248.149.130 attack
Jul 18 13:59:38 rocket sshd[24150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.149.130
Jul 18 13:59:40 rocket sshd[24150]: Failed password for invalid user postgres from 104.248.149.130 port 42092 ssh2
...
2020-07-18 21:23:09

Recently Reported IPs

177.137.230.166 42.112.255.151 59.46.70.107 2.84.250.192
66.70.188.67 65.52.198.85 61.73.231.221 124.78.10.184
83.221.121.5 2606:4700:30::6812:35bf 152.238.247.28 202.154.182.198
177.224.242.76 5.235.94.50 114.143.162.53 17.179.128.46
93.117.162.126 125.60.98.102 182.2.178.222 71.253.123.2