Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shkodër

Region: Shkoder

Country: Albania

Internet Service Provider: ONE

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
80.78.68.57 attackspam
Telnetd brute force attack detected by fail2ban
2020-04-08 22:16:52
80.78.68.18 attackbotsspam
Unauthorized connection attempt detected from IP address 80.78.68.18 to port 23 [J]
2020-01-28 17:41:53
80.78.68.222 attackspambots
8080/tcp 8080/tcp
[2019-09-20/29]2pkt
2019-09-29 23:16:43
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.78.68.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13227
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.78.68.214.			IN	A

;; AUTHORITY SECTION:
.			270	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023021600 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 16 18:38:15 CST 2023
;; MSG SIZE  rcvd: 105
Host info
214.68.78.80.in-addr.arpa domain name pointer ptr.abcom.al.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.68.78.80.in-addr.arpa	name = ptr.abcom.al.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
193.232.218.12 attackbots
IP blocked
2020-03-19 13:12:51
130.162.64.72 attack
Mar 19 04:56:59 hcbbdb sshd\[31595\]: Invalid user paul from 130.162.64.72
Mar 19 04:56:59 hcbbdb sshd\[31595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-130-162-64-72.compute.oraclecloud.com
Mar 19 04:57:01 hcbbdb sshd\[31595\]: Failed password for invalid user paul from 130.162.64.72 port 42325 ssh2
Mar 19 05:01:22 hcbbdb sshd\[32068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-130-162-64-72.compute.oraclecloud.com  user=root
Mar 19 05:01:24 hcbbdb sshd\[32068\]: Failed password for root from 130.162.64.72 port 23292 ssh2
2020-03-19 13:22:24
164.132.225.229 attackbots
Mar 18 19:11:25 sachi sshd\[6720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=229.ip-164-132-225.eu  user=root
Mar 18 19:11:28 sachi sshd\[6720\]: Failed password for root from 164.132.225.229 port 52540 ssh2
Mar 18 19:15:36 sachi sshd\[7088\]: Invalid user test from 164.132.225.229
Mar 18 19:15:36 sachi sshd\[7088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=229.ip-164-132-225.eu
Mar 18 19:15:38 sachi sshd\[7088\]: Failed password for invalid user test from 164.132.225.229 port 45784 ssh2
2020-03-19 13:25:36
157.245.133.78 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-03-19 13:47:23
150.109.82.109 attackbotsspam
Mar 19 04:43:55 sip sshd[15601]: Failed password for root from 150.109.82.109 port 39290 ssh2
Mar 19 04:57:18 sip sshd[19041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.82.109
Mar 19 04:57:20 sip sshd[19041]: Failed password for invalid user monitor from 150.109.82.109 port 48348 ssh2
2020-03-19 13:16:37
82.200.65.218 attack
(sshd) Failed SSH login from 82.200.65.218 (RU/Russia/gw-bell-xen.ll-nsk.zsttk.ru): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 19 04:57:03 ubnt-55d23 sshd[1458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.200.65.218  user=root
Mar 19 04:57:05 ubnt-55d23 sshd[1458]: Failed password for root from 82.200.65.218 port 47916 ssh2
2020-03-19 13:33:36
172.105.79.165 attackspam
SSH login attempts.
2020-03-19 13:34:02
51.255.50.238 attack
Mar 19 03:57:21 work-partkepr sshd\[18050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.50.238  user=root
Mar 19 03:57:24 work-partkepr sshd\[18050\]: Failed password for root from 51.255.50.238 port 54316 ssh2
...
2020-03-19 13:18:01
90.145.244.188 attack
Mar 18 23:39:59 askasleikir sshd[16700]: Failed password for root from 90.145.244.188 port 58474 ssh2
2020-03-19 13:43:37
2.87.138.48 attack
firewall-block, port(s): 8080/tcp
2020-03-19 13:51:09
188.241.196.95 attackbotsspam
Port scan on 1 port(s): 23
2020-03-19 13:30:31
156.223.44.99 attackbots
SSH login attempts.
2020-03-19 13:54:02
46.101.253.249 attackspam
$f2bV_matches
2020-03-19 13:12:08
152.32.187.51 attackspambots
2020-03-19T03:48:52.615878abusebot-3.cloudsearch.cf sshd[27576]: Invalid user bot from 152.32.187.51 port 34226
2020-03-19T03:48:52.623033abusebot-3.cloudsearch.cf sshd[27576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.187.51
2020-03-19T03:48:52.615878abusebot-3.cloudsearch.cf sshd[27576]: Invalid user bot from 152.32.187.51 port 34226
2020-03-19T03:48:54.215103abusebot-3.cloudsearch.cf sshd[27576]: Failed password for invalid user bot from 152.32.187.51 port 34226 ssh2
2020-03-19T03:57:21.709760abusebot-3.cloudsearch.cf sshd[28107]: Invalid user oracle from 152.32.187.51 port 47104
2020-03-19T03:57:21.716577abusebot-3.cloudsearch.cf sshd[28107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.187.51
2020-03-19T03:57:21.709760abusebot-3.cloudsearch.cf sshd[28107]: Invalid user oracle from 152.32.187.51 port 47104
2020-03-19T03:57:23.855201abusebot-3.cloudsearch.cf sshd[28107]: Failed pas
...
2020-03-19 13:09:04
170.246.56.6 attack
firewall-block, port(s): 1433/tcp
2020-03-19 13:35:50

Recently Reported IPs

219.55.254.93 176.213.83.65 139.196.187.209 133.105.194.231
147.203.111.82 73.16.245.45 77.150.53.212 36.46.4.186
35.74.69.60 101.2.222.198 105.43.210.238 193.164.131.180
77.26.73.34 247.126.70.158 180.118.138.114 117.49.73.122
25.197.72.247 19.189.101.76 115.187.61.67 87.224.134.188