Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.86.97.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37777
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.86.97.21.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 14:12:07 CST 2022
;; MSG SIZE  rcvd: 105
Host info
21.97.86.104.in-addr.arpa domain name pointer a104-86-97-21.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.97.86.104.in-addr.arpa	name = a104-86-97-21.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
212.64.57.124 attackbots
Repeated failed SSH attempt
2019-12-30 18:12:47
5.59.35.6 attackbots
[portscan] Port scan
2019-12-30 17:59:30
111.197.68.151 attackspam
Scanning
2019-12-30 17:54:56
73.6.13.91 attackbots
Dec 30 06:51:45 vpn01 sshd[23173]: Failed password for root from 73.6.13.91 port 33687 ssh2
...
2019-12-30 18:13:56
124.251.110.148 attackspambots
Dec 30 10:38:44 MK-Soft-Root1 sshd[14596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.251.110.148 
Dec 30 10:38:46 MK-Soft-Root1 sshd[14596]: Failed password for invalid user minecraft from 124.251.110.148 port 37094 ssh2
...
2019-12-30 17:51:18
217.103.68.77 attack
SSH/22 MH Probe, BF, Hack -
2019-12-30 18:06:47
195.39.140.129 attackspambots
F2B blocked SSH bruteforcing
2019-12-30 17:55:21
58.225.75.147 attackspam
Unauthorized connection attempt detected from IP address 58.225.75.147 to port 8545
2019-12-30 17:47:19
223.4.68.38 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.4.68.38  user=root
Failed password for root from 223.4.68.38 port 43090 ssh2
Invalid user kanserud from 223.4.68.38 port 45086
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.4.68.38
Failed password for invalid user kanserud from 223.4.68.38 port 45086 ssh2
2019-12-30 17:50:42
110.43.208.240 attackbots
firewall-block, port(s): 3390/tcp
2019-12-30 18:07:41
212.67.2.18 attackspambots
19/12/30@04:31:54: FAIL: Alarm-Network address from=212.67.2.18
19/12/30@04:31:54: FAIL: Alarm-Network address from=212.67.2.18
...
2019-12-30 17:56:19
189.210.135.218 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-30 18:13:12
192.95.23.128 attack
(mod_security) mod_security (id:920440) triggered by 192.95.23.128 (US/United States/ip128.ip-192-95-23.net): 5 in the last 3600 secs
2019-12-30 18:16:18
175.5.20.196 attack
Scanning
2019-12-30 18:09:56
111.177.32.83 attack
SSH auth scanning - multiple failed logins
2019-12-30 18:13:40

Recently Reported IPs

104.21.207.185 104.21.208.218 104.21.210.36 105.209.191.217
105.19.59.69 105.209.156.237 104.21.212.172 104.21.213.245
104.21.213.7 104.21.219.240 106.111.21.25 106.112.50.196
106.111.140.183 106.114.102.253 106.112.18.22 106.111.209.158
106.112.130.85 106.114.245.156 106.114.189.75 106.113.192.186