Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.27.2.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30339
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.27.2.244.			IN	A

;; AUTHORITY SECTION:
.			241	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 09:04:49 CST 2022
;; MSG SIZE  rcvd: 105
Host info
244.2.27.129.in-addr.arpa domain name pointer www.tugraz.at.
244.2.27.129.in-addr.arpa domain name pointer web-lb-prod.tugraz.at.
244.2.27.129.in-addr.arpa domain name pointer tu4u.tugraz.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
244.2.27.129.in-addr.arpa	name = web-lb-prod.tugraz.at.
244.2.27.129.in-addr.arpa	name = tu4u.tugraz.at.
244.2.27.129.in-addr.arpa	name = www.tugraz.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.192.255.228 attackbotsspam
Apr  6 19:29:44 marvibiene sshd[59242]: Invalid user developer from 122.192.255.228 port 17423
Apr  6 19:29:44 marvibiene sshd[59242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.192.255.228
Apr  6 19:29:44 marvibiene sshd[59242]: Invalid user developer from 122.192.255.228 port 17423
Apr  6 19:29:46 marvibiene sshd[59242]: Failed password for invalid user developer from 122.192.255.228 port 17423 ssh2
...
2020-04-07 04:06:17
197.232.6.91 attackbots
Microsoft SQL Server User Authentication Brute Force Attempt, PTR: PTR record not found
2020-04-07 03:59:13
195.110.34.149 attackspambots
Apr  6 18:03:48 legacy sshd[23736]: Failed password for root from 195.110.34.149 port 56176 ssh2
Apr  6 18:07:58 legacy sshd[23887]: Failed password for root from 195.110.34.149 port 36208 ssh2
...
2020-04-07 04:32:41
104.248.153.158 attackbots
Apr  6 21:03:59 XXX sshd[51452]: Invalid user arnaud from 104.248.153.158 port 57908
2020-04-07 04:29:17
104.248.132.55 attack
Port 22 Scan, PTR: None
2020-04-07 04:33:23
194.90.217.12 attack
Automatic report - Port Scan Attack
2020-04-07 04:05:18
115.44.243.152 attackbots
Jan 25 07:10:08 meumeu sshd[24229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.44.243.152 
Jan 25 07:10:09 meumeu sshd[24229]: Failed password for invalid user kbe from 115.44.243.152 port 42212 ssh2
Jan 25 07:13:22 meumeu sshd[24613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.44.243.152 
...
2020-04-07 04:10:24
201.159.113.6 attackspambots
Unauthorized connection attempt from IP address 201.159.113.6 on Port 445(SMB)
2020-04-07 04:04:53
185.220.101.143 attackbots
Triggered by Fail2Ban at Ares web server
2020-04-07 04:00:54
179.92.4.172 attack
SSH/22 MH Probe, BF, Hack -
2020-04-07 04:30:46
201.16.246.71 attack
Apr  6 18:35:59 server sshd[27045]: Failed password for root from 201.16.246.71 port 53976 ssh2
Apr  6 18:41:21 server sshd[28517]: Failed password for root from 201.16.246.71 port 36926 ssh2
Apr  6 18:46:46 server sshd[29927]: Failed password for root from 201.16.246.71 port 48106 ssh2
2020-04-07 03:55:31
178.128.247.181 attackspam
(sshd) Failed SSH login from 178.128.247.181 (NL/Netherlands/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  6 19:11:26 ubnt-55d23 sshd[23569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.247.181  user=root
Apr  6 19:11:28 ubnt-55d23 sshd[23569]: Failed password for root from 178.128.247.181 port 37666 ssh2
2020-04-07 03:53:19
103.119.141.157 attack
Unauthorized connection attempt from IP address 103.119.141.157 on Port 445(SMB)
2020-04-07 03:57:15
117.50.40.36 attack
Brute force attempt
2020-04-07 04:25:04
159.89.82.79 attackspam
CMS (WordPress or Joomla) login attempt.
2020-04-07 04:11:04

Recently Reported IPs

129.27.153.13 195.19.92.186 3.115.238.31 129.27.200.37
129.27.200.38 129.28.146.148 161.50.241.115 129.33.102.27
129.35.115.171 129.35.230.60 191.229.47.16 129.35.27.116
129.42.18.31 129.42.20.33 230.217.24.228 129.42.26.244
129.42.38.1 129.42.38.10 129.42.38.5 129.43.254.27