Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Montgomery

Region: Alabama

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.12.27.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53690
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;132.12.27.42.			IN	A

;; AUTHORITY SECTION:
.			310	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110100 1800 900 604800 86400

;; Query time: 258 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 01 23:06:48 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 42.27.12.132.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.27.12.132.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.140.131.43 attackbots
14.140.131.43 was recorded 5 times by 2 hosts attempting to connect to the following ports: 22. Incident counter (4h, 24h, all-time): 5, 5, 27
2019-11-26 02:35:03
177.91.200.7 attack
SSH invalid-user multiple login try
2019-11-26 02:57:14
184.66.225.102 attackbots
2019-11-25T18:42:32.178929abusebot.cloudsearch.cf sshd\[17119\]: Failed password for invalid user siegel from 184.66.225.102 port 51076 ssh2
2019-11-26 02:44:34
218.92.0.138 attack
Nov 25 19:28:27 legacy sshd[25483]: Failed password for root from 218.92.0.138 port 36047 ssh2
Nov 25 19:28:41 legacy sshd[25483]: error: maximum authentication attempts exceeded for root from 218.92.0.138 port 36047 ssh2 [preauth]
Nov 25 19:28:46 legacy sshd[25489]: Failed password for root from 218.92.0.138 port 1190 ssh2
...
2019-11-26 02:29:38
83.143.133.77 attackspam
Harmful URL. Webapp attack
2019-11-26 02:33:12
103.250.144.244 attack
Automatic report - Port Scan Attack
2019-11-26 02:26:31
111.6.79.189 attackbots
TCP Port Scanning
2019-11-26 02:32:52
61.135.169.125 attack
25.11.2019 17:38:29 Recursive DNS scan
2019-11-26 02:51:21
185.213.169.138 attackspam
Fail2Ban Ban Triggered
2019-11-26 02:16:21
180.76.120.152 attackspam
180.76.120.152 - - [25/Nov/2019:16:01:17 +0100] "GET /scripts/setup.php HTTP/1.1" 301 162 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:57.0) Gecko/20100101 Firefox/57.0"
180.76.120.152 - - [25/Nov/2019:16:01:17 +0100] "GET /MyAdmin/scripts/setup.php HTTP/1.1" 301 162 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:57.0) Gecko/20100101 Firefox/57.0"
...
2019-11-26 02:28:07
223.247.223.39 attackspam
$f2bV_matches
2019-11-26 02:52:40
31.173.111.46 attack
fraudulent SSH attempt
2019-11-26 02:41:58
125.124.147.117 attackbotsspam
Automatic report - Banned IP Access
2019-11-26 02:50:39
188.166.108.161 attackspambots
Nov 25 17:42:46 MK-Soft-VM7 sshd[4402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.108.161 
Nov 25 17:42:47 MK-Soft-VM7 sshd[4402]: Failed password for invalid user simanskis from 188.166.108.161 port 33694 ssh2
...
2019-11-26 02:43:48
216.151.184.182 attackbots
1574692562 - 11/25/2019 15:36:02 Host: 216.151.184.182/216.151.184.182 Port: 5060 UDP Blocked
2019-11-26 02:23:59

Recently Reported IPs

232.96.123.140 70.194.16.175 75.100.196.120 137.210.27.8
66.66.42.212 50.11.119.148 159.2.68.84 170.83.125.18
114.248.150.191 4.186.104.125 95.53.169.45 113.234.212.180
16.235.218.44 39.72.56.91 65.70.177.26 0.114.127.11
144.70.204.128 224.134.7.195 159.203.166.181 95.247.187.22