Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.86.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15110
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.86.48.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:08:44 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 48.86.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.86.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
189.208.239.44 attackbotsspam
SSH login attempts.
2020-05-28 12:28:01
132.232.29.131 attackbotsspam
SSH login attempts.
2020-05-28 12:40:19
13.92.22.106 attackspam
WordPress attacks
2020-05-28 12:53:35
168.90.89.35 attackspambots
leo_www
2020-05-28 12:30:51
222.186.175.216 attackspam
May 28 05:08:48 combo sshd[8725]: Failed password for root from 222.186.175.216 port 41270 ssh2
May 28 05:08:51 combo sshd[8725]: Failed password for root from 222.186.175.216 port 41270 ssh2
May 28 05:08:54 combo sshd[8725]: Failed password for root from 222.186.175.216 port 41270 ssh2
...
2020-05-28 12:17:21
103.66.16.18 attackspam
SSH login attempts.
2020-05-28 12:48:16
95.246.252.37 attackbots
SSH login attempts.
2020-05-28 12:34:59
46.229.173.67 attackbotsspam
Fail2Ban Ban Triggered
2020-05-28 12:22:21
113.21.122.60 attackspam
Dovecot Invalid User Login Attempt.
2020-05-28 12:45:31
47.105.164.116 attackspam
SSH login attempts.
2020-05-28 12:39:25
201.122.102.21 attackbotsspam
SSH login attempts.
2020-05-28 12:48:34
85.99.122.11 attackbotsspam
SSH login attempts.
2020-05-28 12:51:09
49.233.134.252 attackspam
May 28 07:27:39 journals sshd\[7839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.134.252  user=root
May 28 07:27:41 journals sshd\[7839\]: Failed password for root from 49.233.134.252 port 51414 ssh2
May 28 07:31:04 journals sshd\[8285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.134.252  user=root
May 28 07:31:06 journals sshd\[8285\]: Failed password for root from 49.233.134.252 port 33028 ssh2
May 28 07:34:31 journals sshd\[8773\]: Invalid user arbenz from 49.233.134.252
...
2020-05-28 12:51:24
36.91.76.171 attackspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-28 12:52:59
36.111.144.55 attackbots
SSH login attempts.
2020-05-28 12:49:59

Recently Reported IPs

104.21.86.44 104.21.86.49 104.21.86.5 104.21.86.50
104.21.86.55 104.21.86.51 104.21.86.53 104.21.86.46
104.21.86.56 104.21.86.52 104.21.86.57 104.21.86.6
104.21.86.58 104.21.86.62 51.111.204.239 104.21.86.64
104.21.86.68 104.21.86.73 104.21.86.74 104.21.86.77