Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boston

Region: Massachusetts

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.104.98.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1706
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.104.98.53.			IN	A

;; AUTHORITY SECTION:
.			159	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032100 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 21 17:18:30 CST 2022
;; MSG SIZE  rcvd: 106
Host info
53.98.104.104.in-addr.arpa domain name pointer a104-104-98-53.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.98.104.104.in-addr.arpa	name = a104-104-98-53.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
189.97.86.96 attack
Automatic report - Port Scan Attack
2020-01-02 00:31:32
128.199.95.60 attackspam
Jan  1 15:52:20 jane sshd[29196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.60 
Jan  1 15:52:22 jane sshd[29196]: Failed password for invalid user newadmin from 128.199.95.60 port 35068 ssh2
...
2020-01-02 00:23:10
185.175.93.21 attack
01/01/2020-09:51:21.211542 185.175.93.21 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-02 00:59:00
222.186.3.198 attackspam
$f2bV_matches
2020-01-02 00:29:51
35.160.48.160 attackspam
01/01/2020-17:44:20.688865 35.160.48.160 Protocol: 6 SURICATA TLS invalid record/traffic
2020-01-02 00:53:54
222.186.175.147 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.147  user=root
Failed password for root from 222.186.175.147 port 12034 ssh2
Failed password for root from 222.186.175.147 port 12034 ssh2
Failed password for root from 222.186.175.147 port 12034 ssh2
Failed password for root from 222.186.175.147 port 12034 ssh2
2020-01-02 00:24:09
46.38.144.17 attackspam
Jan  1 16:18:53 blackbee postfix/smtpd\[2608\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: authentication failure
Jan  1 16:20:25 blackbee postfix/smtpd\[2608\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: authentication failure
Jan  1 16:21:56 blackbee postfix/smtpd\[2608\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: authentication failure
Jan  1 16:23:25 blackbee postfix/smtpd\[2608\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: authentication failure
Jan  1 16:24:54 blackbee postfix/smtpd\[2608\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: authentication failure
...
2020-01-02 00:31:04
103.100.211.196 attackspambots
Brute forcing RDP port 3389
2020-01-02 00:43:37
182.61.46.62 attackbots
Jan  1 16:57:07 sso sshd[25331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.46.62
Jan  1 16:57:09 sso sshd[25331]: Failed password for invalid user ipul from 182.61.46.62 port 54636 ssh2
...
2020-01-02 00:54:54
189.212.125.40 attackbotsspam
scan r
2020-01-02 00:35:37
79.136.86.101 attackbots
Unauthorized connection attempt detected from IP address 79.136.86.101 to port 23
2020-01-02 00:32:17
50.67.178.164 attack
Jan  1 13:30:41 firewall sshd[25045]: Failed password for invalid user stocks from 50.67.178.164 port 60728 ssh2
Jan  1 13:34:42 firewall sshd[25122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.67.178.164  user=backup
Jan  1 13:34:44 firewall sshd[25122]: Failed password for backup from 50.67.178.164 port 34278 ssh2
...
2020-01-02 00:41:20
54.37.68.191 attack
2020-01-01T15:23:52.072771abusebot-3.cloudsearch.cf sshd[23245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-54-37-68.eu  user=root
2020-01-01T15:23:54.233380abusebot-3.cloudsearch.cf sshd[23245]: Failed password for root from 54.37.68.191 port 43004 ssh2
2020-01-01T15:27:42.089034abusebot-3.cloudsearch.cf sshd[23435]: Invalid user trescher from 54.37.68.191 port 45802
2020-01-01T15:27:42.096620abusebot-3.cloudsearch.cf sshd[23435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-54-37-68.eu
2020-01-01T15:27:42.089034abusebot-3.cloudsearch.cf sshd[23435]: Invalid user trescher from 54.37.68.191 port 45802
2020-01-01T15:27:44.166113abusebot-3.cloudsearch.cf sshd[23435]: Failed password for invalid user trescher from 54.37.68.191 port 45802 ssh2
2020-01-01T15:30:33.208670abusebot-3.cloudsearch.cf sshd[23628]: Invalid user peschke from 54.37.68.191 port 48544
...
2020-01-02 00:50:08
78.101.143.224 attackbots
Jan  1 15:52:14 grey postfix/smtpd\[24667\]: NOQUEUE: reject: RCPT from unknown\[78.101.143.224\]: 554 5.7.1 Service unavailable\; Client host \[78.101.143.224\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[78.101.143.224\]\; from=\ to=\ proto=ESMTP helo=\<\[78.101.143.224\]\>
...
2020-01-02 00:29:30
113.160.173.170 attackbots
1577890316 - 01/01/2020 15:51:56 Host: 113.160.173.170/113.160.173.170 Port: 445 TCP Blocked
2020-01-02 00:38:48

Recently Reported IPs

104.104.90.32 104.105.230.183 104.105.33.248 104.105.38.146
104.105.84.37 104.105.89.133 104.106.166.137 104.106.166.76
104.106.174.233 104.106.228.23 104.106.236.197 104.106.240.142
104.106.247.8 104.106.251.69 104.107.0.118 104.107.0.12
104.107.10.213 104.107.15.25 104.107.6.32 104.107.7.142