Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.86.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29439
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.86.130.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:08:00 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 130.86.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.86.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.45.101.7 attackbots
Invalid user admin from 103.45.101.7 port 44420
2020-04-30 01:43:54
34.89.69.68 attackspambots
Failed password for root from 34.89.69.68 port 53088 ssh2
2020-04-30 01:08:40
139.59.18.197 attack
Apr 29 19:04:12 icinga sshd[2726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.18.197 
Apr 29 19:04:13 icinga sshd[2726]: Failed password for invalid user taiga from 139.59.18.197 port 35214 ssh2
Apr 29 19:13:20 icinga sshd[18471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.18.197 
...
2020-04-30 01:30:16
49.233.134.252 attack
5x Failed Password
2020-04-30 01:05:24
51.38.186.180 attack
Apr 29 18:33:35 lukav-desktop sshd\[7458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.180  user=mysql
Apr 29 18:33:37 lukav-desktop sshd\[7458\]: Failed password for mysql from 51.38.186.180 port 36252 ssh2
Apr 29 18:37:42 lukav-desktop sshd\[9945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.180  user=root
Apr 29 18:37:45 lukav-desktop sshd\[9945\]: Failed password for root from 51.38.186.180 port 41948 ssh2
Apr 29 18:41:47 lukav-desktop sshd\[12701\]: Invalid user carla from 51.38.186.180
2020-04-30 01:50:46
98.4.41.184 attack
Apr 29 15:57:05 prox sshd[29720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.4.41.184 
Apr 29 15:57:07 prox sshd[29720]: Failed password for invalid user ln from 98.4.41.184 port 52568 ssh2
2020-04-30 01:44:42
157.120.241.130 attack
Failed password for root from 157.120.241.130 port 59308 ssh2
2020-04-30 01:28:53
106.75.130.166 attackbots
Brute-force attempt banned
2020-04-30 01:39:15
51.89.164.153 attackspam
Failed password for root from 51.89.164.153 port 41262 ssh2
2020-04-30 01:49:25
186.147.236.4 attackspambots
$f2bV_matches
2020-04-30 01:22:59
210.186.122.28 attackspam
Invalid user ob from 210.186.122.28 port 57137
2020-04-30 01:17:43
118.24.48.163 attack
Invalid user admin from 118.24.48.163 port 36632
2020-04-30 01:35:14
118.25.27.67 attackbots
$f2bV_matches
2020-04-30 01:34:53
103.219.112.48 attackbots
leo_www
2020-04-30 01:43:26
61.133.232.249 attackbotsspam
Invalid user box from 61.133.232.249 port 58281
2020-04-30 01:49:04

Recently Reported IPs

104.21.86.133 104.21.86.134 104.21.86.135 104.21.86.141
104.21.86.142 104.21.86.136 104.21.86.138 104.21.86.147
104.21.86.149 104.21.86.15 104.21.86.148 104.21.86.143
104.21.86.150 104.21.86.151 104.21.86.152 104.21.86.155
104.21.86.156 104.21.86.153 104.21.86.154 104.21.86.161