Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.218.13.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19845
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.218.13.78.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:39:51 CST 2022
;; MSG SIZE  rcvd: 106
Host info
78.13.218.104.in-addr.arpa domain name pointer server.naibuzz.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
78.13.218.104.in-addr.arpa	name = server.naibuzz.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
212.64.0.183 attackbots
Feb  3 01:57:25 ms-srv sshd[34892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.0.183
Feb  3 01:57:27 ms-srv sshd[34892]: Failed password for invalid user sammy from 212.64.0.183 port 42034 ssh2
2020-03-09 02:20:35
180.116.62.159 attack
Brute force blocker - service: proftpd1 - aantal: 95 - Sun Apr 22 01:00:20 2018
2020-03-09 02:17:19
212.64.56.177 attack
Aug  2 19:26:44 ms-srv sshd[49319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.56.177
Aug  2 19:26:46 ms-srv sshd[49319]: Failed password for invalid user abc from 212.64.56.177 port 43590 ssh2
2020-03-09 01:55:39
128.199.207.45 attackspambots
$f2bV_matches
2020-03-09 01:50:30
111.59.124.151 attack
Brute force blocker - service: proftpd1 - aantal: 29 - Sat Apr 21 04:00:15 2018
2020-03-09 02:25:31
212.64.32.162 attackspam
Aug 10 16:34:44 ms-srv sshd[22051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.32.162
Aug 10 16:34:46 ms-srv sshd[22051]: Failed password for invalid user git from 212.64.32.162 port 33380 ssh2
2020-03-09 02:00:48
112.16.80.154 attack
Brute force blocker - service: proftpd1 - aantal: 115 - Sat Apr 21 04:05:14 2018
2020-03-09 02:22:14
198.108.67.19 attack
Honeypot attack, port: 81, PTR: worker-16.sfj.corp.censys.io.
2020-03-09 02:21:26
115.49.126.195 attackbotsspam
Brute force blocker - service: proftpd1, proftpd2 - aantal: 25 - Sun Apr 22 15:45:16 2018
2020-03-09 02:09:53
212.58.114.84 attackbots
Jan  1 06:50:59 ms-srv sshd[21421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.58.114.84  user=root
Jan  1 06:51:01 ms-srv sshd[21421]: Failed password for invalid user root from 212.58.114.84 port 11934 ssh2
2020-03-09 02:23:56
186.139.218.8 attackbotsspam
Mar  8 16:21:41 h1745522 sshd[11307]: Invalid user test from 186.139.218.8 port 51296
Mar  8 16:21:41 h1745522 sshd[11307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.139.218.8
Mar  8 16:21:41 h1745522 sshd[11307]: Invalid user test from 186.139.218.8 port 51296
Mar  8 16:21:43 h1745522 sshd[11307]: Failed password for invalid user test from 186.139.218.8 port 51296 ssh2
Mar  8 16:23:59 h1745522 sshd[11373]: Invalid user gameserver from 186.139.218.8 port 37062
Mar  8 16:23:59 h1745522 sshd[11373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.139.218.8
Mar  8 16:23:59 h1745522 sshd[11373]: Invalid user gameserver from 186.139.218.8 port 37062
Mar  8 16:24:01 h1745522 sshd[11373]: Failed password for invalid user gameserver from 186.139.218.8 port 37062 ssh2
Mar  8 16:26:12 h1745522 sshd[11478]: Invalid user air from 186.139.218.8 port 6426
...
2020-03-09 02:12:36
212.64.40.86 attackspambots
Dec 28 01:25:51 ms-srv sshd[19703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.40.86  user=root
Dec 28 01:25:53 ms-srv sshd[19703]: Failed password for invalid user root from 212.64.40.86 port 53432 ssh2
2020-03-09 02:00:21
212.64.77.182 attack
Feb  1 03:07:14 ms-srv sshd[48186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.77.182
Feb  1 03:07:15 ms-srv sshd[48186]: Failed password for invalid user webmaster from 212.64.77.182 port 52797 ssh2
2020-03-09 01:49:13
212.64.109.175 attackbotsspam
Dec 29 18:32:46 ms-srv sshd[21796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.109.175
Dec 29 18:32:48 ms-srv sshd[21796]: Failed password for invalid user cui from 212.64.109.175 port 41160 ssh2
2020-03-09 02:15:01
112.114.234.190 attackspam
Brute force blocker - service: proftpd1 - aantal: 155 - Sun Apr 22 02:30:14 2018
2020-03-09 02:13:22

Recently Reported IPs

104.216.54.230 104.218.14.27 104.217.249.158 104.217.56.67
104.216.9.126 104.217.19.108 104.216.93.61 104.218.53.78
104.218.50.220 104.218.52.137 104.218.235.68 104.194.240.116
104.194.244.136 104.194.248.18 104.22.10.157 104.22.10.109
104.22.10.170 104.22.10.130 104.22.10.134 104.22.1.67