Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.78.66.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27693
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.78.66.139.			IN	A

;; AUTHORITY SECTION:
.			341	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:30:38 CST 2023
;; MSG SIZE  rcvd: 106
Host info
139.66.78.104.in-addr.arpa domain name pointer a104-78-66-139.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.66.78.104.in-addr.arpa	name = a104-78-66-139.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.173.201 attackspam
Jun 15 00:09:07 prod4 sshd\[12558\]: Failed password for root from 222.186.173.201 port 9630 ssh2
Jun 15 00:09:10 prod4 sshd\[12558\]: Failed password for root from 222.186.173.201 port 9630 ssh2
Jun 15 00:09:13 prod4 sshd\[12558\]: Failed password for root from 222.186.173.201 port 9630 ssh2
...
2020-06-15 06:11:09
167.60.120.84 attack
20/6/14@17:28:28: FAIL: Alarm-Network address from=167.60.120.84
...
2020-06-15 05:59:03
123.124.71.106 attack
IP 123.124.71.106 attacked honeypot on port: 1433 at 6/14/2020 10:27:26 PM
2020-06-15 06:30:01
95.255.14.141 attackspambots
1022. On Jun 14 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 95.255.14.141.
2020-06-15 06:34:55
198.23.192.147 attack
Jun 15 00:03:42 debian-2gb-nbg1-2 kernel: \[14430932.694956\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.23.192.147 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=14875 PROTO=TCP SPT=46132 DPT=3390 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-15 06:39:32
34.93.211.49 attackbots
Jun 14 21:31:15 django-0 sshd\[12113\]: Invalid user testmail from 34.93.211.49Jun 14 21:31:17 django-0 sshd\[12113\]: Failed password for invalid user testmail from 34.93.211.49 port 35728 ssh2Jun 14 21:34:58 django-0 sshd\[12219\]: Invalid user temp from 34.93.211.49
...
2020-06-15 06:10:09
5.196.75.47 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-06-15 06:19:59
45.95.168.126 attackbots
reported_by_cryptodad
2020-06-15 06:14:40
116.92.213.114 attack
Jun 14 23:27:32 vmd26974 sshd[32693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.92.213.114
Jun 14 23:27:34 vmd26974 sshd[32693]: Failed password for invalid user ubuntu from 116.92.213.114 port 46274 ssh2
...
2020-06-15 06:36:46
86.57.247.26 attackspam
Brute forcing RDP port 3389
2020-06-15 05:59:30
14.162.50.44 attackbots
Unauthorized IMAP connection attempt
2020-06-15 06:03:41
122.51.230.155 attackspam
Invalid user lefty from 122.51.230.155 port 49026
2020-06-15 06:32:37
192.35.169.35 attackbots
Jun 14 23:28:17 debian-2gb-nbg1-2 kernel: \[14428807.974030\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=192.35.169.35 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=34 ID=48803 PROTO=TCP SPT=46559 DPT=12246 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-15 06:04:24
223.100.167.105 attackbots
SSH Invalid Login
2020-06-15 06:00:58
185.195.237.118 attack
2020-06-14T21:28:13+0000 Failed SSH Authentication/Brute Force Attack. (Server 6)
2020-06-15 06:09:09

Recently Reported IPs

104.78.33.229 104.78.251.132 104.79.116.176 104.78.68.221
104.79.134.120 104.79.110.235 104.78.47.194 104.79.130.185
104.78.29.117 104.78.49.118 104.78.45.148 104.78.97.95
104.79.145.215 104.79.121.170 104.78.96.11 104.79.160.22
104.78.90.16 104.79.204.184 104.79.101.142 104.79.17.14