Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.42.27.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59860
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;136.42.27.189.			IN	A

;; AUTHORITY SECTION:
.			561	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110100 1800 900 604800 86400

;; Query time: 350 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 01 20:01:11 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 189.27.42.136.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 189.27.42.136.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
92.118.37.74 attack
Jul 22 08:59:02 mail kernel: [4283783.920231] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=92.118.37.74 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=26373 PROTO=TCP SPT=46525 DPT=53118 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 22 09:01:01 mail kernel: [4283902.825376] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=92.118.37.74 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=59372 PROTO=TCP SPT=46525 DPT=39484 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 22 09:06:56 mail kernel: [4284257.897369] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=92.118.37.74 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=36131 PROTO=TCP SPT=46525 DPT=56062 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 22 09:07:35 mail kernel: [4284296.802540] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=92.118.37.74 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=63807 PROTO=TCP SPT=46525 DPT=33237 WINDOW=1024 RES=0x00 SYN
2019-07-22 17:15:36
36.85.189.96 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-22 02:54:28,368 INFO [amun_request_handler] PortScan Detected on Port: 445 (36.85.189.96)
2019-07-22 16:32:12
84.3.2.59 attackbotsspam
2019-07-22T08:00:36.380734abusebot-5.cloudsearch.cf sshd\[26008\]: Invalid user jerry from 84.3.2.59 port 57338
2019-07-22 16:30:59
106.52.26.30 attackspambots
Jul 22 10:35:18 tux-35-217 sshd\[15080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.26.30  user=www-data
Jul 22 10:35:21 tux-35-217 sshd\[15080\]: Failed password for www-data from 106.52.26.30 port 53524 ssh2
Jul 22 10:39:47 tux-35-217 sshd\[15084\]: Invalid user wendy from 106.52.26.30 port 37994
Jul 22 10:39:47 tux-35-217 sshd\[15084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.26.30
...
2019-07-22 16:56:14
103.129.221.62 attack
Jul 22 05:08:21 plusreed sshd[17044]: Invalid user jun from 103.129.221.62
...
2019-07-22 17:16:39
111.116.20.110 attack
Jul 22 08:53:03 mail sshd\[20988\]: Invalid user mike from 111.116.20.110 port 33856
Jul 22 08:53:03 mail sshd\[20988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.116.20.110
Jul 22 08:53:05 mail sshd\[20988\]: Failed password for invalid user mike from 111.116.20.110 port 33856 ssh2
Jul 22 08:58:42 mail sshd\[21763\]: Invalid user sampath from 111.116.20.110 port 57864
Jul 22 08:58:42 mail sshd\[21763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.116.20.110
2019-07-22 17:04:19
182.53.198.244 attackbots
Unauthorized connection attempt from IP address 182.53.198.244 on Port 445(SMB)
2019-07-22 16:55:22
182.61.184.47 attack
Jul 22 03:41:45 aat-srv002 sshd[6103]: Failed password for root from 182.61.184.47 port 38950 ssh2
Jul 22 03:46:57 aat-srv002 sshd[6209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.184.47
Jul 22 03:46:59 aat-srv002 sshd[6209]: Failed password for invalid user ab from 182.61.184.47 port 34622 ssh2
...
2019-07-22 17:08:21
202.51.110.214 attackspam
Jul 22 08:39:21 localhost sshd\[69371\]: Invalid user zte from 202.51.110.214 port 39201
Jul 22 08:39:21 localhost sshd\[69371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.110.214
Jul 22 08:39:23 localhost sshd\[69371\]: Failed password for invalid user zte from 202.51.110.214 port 39201 ssh2
Jul 22 08:45:06 localhost sshd\[69493\]: Invalid user lutz from 202.51.110.214 port 35337
Jul 22 08:45:06 localhost sshd\[69493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.110.214
...
2019-07-22 16:50:35
222.174.251.202 attackbots
[SMB remote code execution attempt: port tcp/445]
[scan/connect: 3 time(s)]
*(RWIN=8192)(07221037)
2019-07-22 16:46:56
223.16.97.114 attackspam
Unauthorized connection attempt from IP address 223.16.97.114 on Port 445(SMB)
2019-07-22 17:22:02
112.222.29.147 attackspambots
Jul 22 08:34:51 areeb-Workstation sshd\[25010\]: Invalid user hq from 112.222.29.147
Jul 22 08:34:51 areeb-Workstation sshd\[25010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.222.29.147
Jul 22 08:34:53 areeb-Workstation sshd\[25010\]: Failed password for invalid user hq from 112.222.29.147 port 50348 ssh2
...
2019-07-22 17:20:54
46.101.142.238 attackbots
Automatic report - Banned IP Access
2019-07-22 17:19:44
185.217.180.235 attackspambots
Unauthorized connection attempt from IP address 185.217.180.235 on Port 445(SMB)
2019-07-22 16:51:08
123.20.86.1 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-22 02:52:45,806 INFO [amun_request_handler] PortScan Detected on Port: 445 (123.20.86.1)
2019-07-22 17:23:09

Recently Reported IPs

138.46.187.142 202.135.44.218 255.223.129.77 175.8.37.242
115.151.39.183 128.215.146.201 39.137.12.43 88.5.48.74
241.160.20.152 149.168.250.149 184.196.192.224 189.183.8.103
137.52.171.29 90.225.121.129 138.98.116.229 116.49.181.202
110.151.159.188 158.0.151.63 172.17.210.200 221.229.66.188