Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: E-Gate Communications Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.242.148.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52624
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.242.148.78.			IN	A

;; AUTHORITY SECTION:
.			3571	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050600 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon May 06 23:42:57 +08 2019
;; MSG SIZE  rcvd: 118

Host info
Host 78.148.242.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 78.148.242.104.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
110.77.216.178 attack
Jun 29 09:13:16 master sshd[23684]: Failed password for invalid user admin from 110.77.216.178 port 36805 ssh2
2019-06-29 18:14:24
111.2.16.242 attackspam
" "
2019-06-29 18:44:31
114.235.161.106 attackspambots
Brute force SMTP login attempts.
2019-06-29 18:52:15
198.108.67.98 attackbotsspam
2220/tcp 9091/tcp 8085/tcp...
[2019-04-28/06-29]122pkt,118pt.(tcp)
2019-06-29 18:21:18
190.113.91.50 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.113.91.50
Failed password for invalid user hadoop from 190.113.91.50 port 42429 ssh2
Invalid user cai from 190.113.91.50 port 51577
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.113.91.50
Failed password for invalid user cai from 190.113.91.50 port 51577 ssh2
2019-06-29 18:42:09
171.241.228.193 attackbots
Jun 29 07:53:12 master sshd[23575]: Failed password for invalid user admin from 171.241.228.193 port 47238 ssh2
2019-06-29 18:40:09
138.68.146.186 attack
SSH bruteforce (Triggered fail2ban)
2019-06-29 18:31:26
49.83.254.160 attackspam
Jun 29 07:04:30 master sshd[23509]: Failed password for root from 49.83.254.160 port 55658 ssh2
Jun 29 07:04:34 master sshd[23509]: Failed password for root from 49.83.254.160 port 55658 ssh2
Jun 29 07:04:38 master sshd[23509]: Failed password for root from 49.83.254.160 port 55658 ssh2
2019-06-29 18:51:45
167.99.186.116 attackbots
Automatic report - Web App Attack
2019-06-29 18:24:46
77.247.109.30 attackspambots
29.06.2019 08:51:59 Connection to port 4789 blocked by firewall
2019-06-29 18:35:42
14.226.228.166 attackspam
Jun 29 07:00:18 master sshd[23507]: Failed password for invalid user admin from 14.226.228.166 port 48868 ssh2
2019-06-29 18:54:58
138.68.20.158 attack
ssh failed login
2019-06-29 18:43:14
213.149.103.132 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-06-29 18:23:38
212.64.71.126 attack
ECShop Remote Code Execution Vulnerability, PTR: PTR record not found
2019-06-29 18:20:43
183.87.35.162 attackspam
Jun 29 10:49:10 *** sshd[6383]: User root from 183.87.35.162 not allowed because not listed in AllowUsers
2019-06-29 18:50:53

Recently Reported IPs

103.207.1.248 221.204.170.130 37.217.12.42 103.126.215.130
39.221.56.38 178.154.48.209 91.203.103.134 103.12.163.217
67.0.64.149 164.140.249.224 102.135.10.171 190.96.232.145
103.116.25.13 40.81.102.116 150.135.170.30 185.214.76.86
103.109.57.246 70.191.13.237 79.101.41.129 102.137.46.195