Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kazakhstan

Internet Service Provider: Kcell

Hostname: unknown

Organization: Kcell JSC

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.27.53.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57433
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;149.27.53.207.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070401 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jul 05 02:03:42 CST 2019
;; MSG SIZE  rcvd: 117
Host info
207.53.27.149.in-addr.arpa domain name pointer 149-27-53-207.kcell.kz.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
207.53.27.149.in-addr.arpa	name = 149-27-53-207.kcell.kz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.185.52 attackspam
$f2bV_matches
2020-03-21 03:55:39
218.92.0.212 attackbotsspam
Mar 20 16:26:58 firewall sshd[12901]: Failed password for root from 218.92.0.212 port 13139 ssh2
Mar 20 16:27:02 firewall sshd[12901]: Failed password for root from 218.92.0.212 port 13139 ssh2
Mar 20 16:27:05 firewall sshd[12901]: Failed password for root from 218.92.0.212 port 13139 ssh2
...
2020-03-21 03:59:16
106.51.98.159 attackspambots
Automatic report - Port Scan
2020-03-21 04:07:36
192.141.68.18 attack
Mar 20 13:14:16 askasleikir sshd[81778]: Failed password for invalid user test from 192.141.68.18 port 33989 ssh2
2020-03-21 03:59:54
213.74.85.54 attack
C1,WP GET /wp-login.php
2020-03-21 04:13:46
200.144.255.236 attack
Mar 20 15:41:58 plusreed sshd[6360]: Invalid user danger from 200.144.255.236
...
2020-03-21 03:58:30
106.253.177.150 attackbots
Mar 20 17:04:34 firewall sshd[15795]: Invalid user bluma from 106.253.177.150
Mar 20 17:04:36 firewall sshd[15795]: Failed password for invalid user bluma from 106.253.177.150 port 59778 ssh2
Mar 20 17:06:54 firewall sshd[16061]: Invalid user maurice from 106.253.177.150
...
2020-03-21 04:08:43
106.12.209.117 attack
2020-03-20T18:58:12.497572abusebot-4.cloudsearch.cf sshd[9200]: Invalid user sr from 106.12.209.117 port 44722
2020-03-20T18:58:12.503664abusebot-4.cloudsearch.cf sshd[9200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.209.117
2020-03-20T18:58:12.497572abusebot-4.cloudsearch.cf sshd[9200]: Invalid user sr from 106.12.209.117 port 44722
2020-03-20T18:58:14.449684abusebot-4.cloudsearch.cf sshd[9200]: Failed password for invalid user sr from 106.12.209.117 port 44722 ssh2
2020-03-20T19:07:23.684458abusebot-4.cloudsearch.cf sshd[9784]: Invalid user kr from 106.12.209.117 port 43254
2020-03-20T19:07:23.689871abusebot-4.cloudsearch.cf sshd[9784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.209.117
2020-03-20T19:07:23.684458abusebot-4.cloudsearch.cf sshd[9784]: Invalid user kr from 106.12.209.117 port 43254
2020-03-20T19:07:25.610986abusebot-4.cloudsearch.cf sshd[9784]: Failed password for in
...
2020-03-21 04:15:33
49.231.5.51 attackspambots
Mar 20 20:40:26 jane sshd[2893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.231.5.51 
Mar 20 20:40:29 jane sshd[2893]: Failed password for invalid user eppc from 49.231.5.51 port 36938 ssh2
...
2020-03-21 03:43:51
103.145.255.162 attackspambots
Mar 20 16:13:18 lnxmail61 postfix/smtpd[8498]: warning: unknown[103.145.255.162]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 20 16:13:18 lnxmail61 postfix/smtpd[8498]: lost connection after AUTH from unknown[103.145.255.162]
Mar 20 16:13:18 lnxmail61 postfix/smtpd[8498]: lost connection after AUTH from unknown[103.145.255.162]
2020-03-21 03:43:03
77.181.122.77 attackbotsspam
SSH Brute-Force reported by Fail2Ban
2020-03-21 04:12:17
189.114.160.32 attackbots
1584709657 - 03/20/2020 14:07:37 Host: 189.114.160.32/189.114.160.32 Port: 445 TCP Blocked
2020-03-21 03:40:12
35.181.91.36 attackspam
Attempted connection to ports 22, 443, 80.
2020-03-21 04:06:18
118.70.117.156 attackbotsspam
Invalid user david from 118.70.117.156 port 33092
2020-03-21 04:19:02
95.213.202.227 attackbots
2020-03-20T18:29:49.761853abusebot-4.cloudsearch.cf sshd[7231]: Invalid user circ from 95.213.202.227 port 33680
2020-03-20T18:29:49.768621abusebot-4.cloudsearch.cf sshd[7231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.213.202.227
2020-03-20T18:29:49.761853abusebot-4.cloudsearch.cf sshd[7231]: Invalid user circ from 95.213.202.227 port 33680
2020-03-20T18:29:52.256811abusebot-4.cloudsearch.cf sshd[7231]: Failed password for invalid user circ from 95.213.202.227 port 33680 ssh2
2020-03-20T18:34:53.438616abusebot-4.cloudsearch.cf sshd[7580]: Invalid user reagan from 95.213.202.227 port 52564
2020-03-20T18:34:53.445769abusebot-4.cloudsearch.cf sshd[7580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.213.202.227
2020-03-20T18:34:53.438616abusebot-4.cloudsearch.cf sshd[7580]: Invalid user reagan from 95.213.202.227 port 52564
2020-03-20T18:34:55.332181abusebot-4.cloudsearch.cf sshd[7580]: Failed p
...
2020-03-21 03:36:03

Recently Reported IPs

222.184.179.130 122.182.157.117 107.172.143.141 46.187.17.167
99.43.73.68 193.124.129.130 113.78.99.225 124.38.232.87
120.78.170.123 130.202.90.14 201.177.218.187 185.196.180.206
219.149.200.50 57.43.216.80 175.125.51.138 96.201.232.166
89.100.15.11 39.48.47.150 74.23.183.69 1.201.193.66