Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.70.27.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55549
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;158.70.27.124.			IN	A

;; AUTHORITY SECTION:
.			572	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020012500 1800 900 604800 86400

;; Query time: 260 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 16:32:51 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 124.27.70.158.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 124.27.70.158.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.137.233.125 attack
Mar  3 05:59:38 debian-2gb-nbg1-2 kernel: \[5470758.400138\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.137.233.125 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=29397 PROTO=TCP SPT=41717 DPT=4005 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-03 13:00:16
61.5.45.22 attack
Honeypot attack, port: 81, PTR: ppp-jhr-b.telkom.net.id.
2020-03-03 10:02:00
81.21.212.76 attackbotsspam
Honeypot attack, port: 5555, PTR: 81-21-212-76.c-sam.se.
2020-03-03 10:06:38
201.87.47.14 attack
Unauthorized connection attempt detected from IP address 201.87.47.14 to port 23 [J]
2020-03-03 09:49:58
114.35.27.130 attackbotsspam
Unauthorized connection attempt detected from IP address 114.35.27.130 to port 23 [J]
2020-03-03 10:16:32
79.22.196.14 attackspam
"SSH brute force auth login attempt."
2020-03-03 10:02:45
177.223.49.73 attack
1583186327 - 03/02/2020 22:58:47 Host: 177.223.49.73/177.223.49.73 Port: 445 TCP Blocked
2020-03-03 10:18:13
80.211.240.50 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 69 - port: 5060 proto: UDP cat: Misc Attack
2020-03-03 09:58:54
103.114.244.114 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-03 10:03:16
122.116.115.56 attackbotsspam
Unauthorized connection attempt detected from IP address 122.116.115.56 to port 23 [J]
2020-03-03 10:06:53
14.161.44.52 attack
Mar  2 22:58:52 lnxded64 sshd[6357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.44.52
Mar  2 22:58:54 lnxded64 sshd[6357]: Failed password for invalid user admin from 14.161.44.52 port 56043 ssh2
Mar  2 22:58:58 lnxded64 sshd[6359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.44.52
2020-03-03 10:09:50
157.230.231.39 attack
Mar  3 02:56:38 vps691689 sshd[30203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.231.39
Mar  3 02:56:40 vps691689 sshd[30203]: Failed password for invalid user spark from 157.230.231.39 port 60172 ssh2
Mar  3 03:02:30 vps691689 sshd[30392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.231.39
...
2020-03-03 10:07:23
202.83.10.18 attackspambots
Mar  3 00:15:59 tuxlinux sshd[11140]: Invalid user test from 202.83.10.18 port 42594
Mar  3 00:15:59 tuxlinux sshd[11140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.10.18 
Mar  3 00:15:59 tuxlinux sshd[11140]: Invalid user test from 202.83.10.18 port 42594
Mar  3 00:15:59 tuxlinux sshd[11140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.10.18 
Mar  3 00:15:59 tuxlinux sshd[11140]: Invalid user test from 202.83.10.18 port 42594
Mar  3 00:15:59 tuxlinux sshd[11140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.10.18 
Mar  3 00:16:01 tuxlinux sshd[11140]: Failed password for invalid user test from 202.83.10.18 port 42594 ssh2
...
2020-03-03 09:47:16
36.250.229.115 attackbots
Mar  3 02:31:19 sd-53420 sshd\[22984\]: Invalid user test from 36.250.229.115
Mar  3 02:31:19 sd-53420 sshd\[22984\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.250.229.115
Mar  3 02:31:21 sd-53420 sshd\[22984\]: Failed password for invalid user test from 36.250.229.115 port 43708 ssh2
Mar  3 02:39:05 sd-53420 sshd\[23765\]: Invalid user jinhaoxuan from 36.250.229.115
Mar  3 02:39:05 sd-53420 sshd\[23765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.250.229.115
...
2020-03-03 09:48:58
168.196.42.122 attack
Mar  3 10:01:04 gw1 sshd[24733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.196.42.122
Mar  3 10:01:06 gw1 sshd[24733]: Failed password for invalid user hdfs from 168.196.42.122 port 46090 ssh2
...
2020-03-03 13:04:45

Recently Reported IPs

13.235.59.80 117.71.140.104 173.205.13.236 62.173.145.39
159.138.150.234 190.131.201.122 202.161.176.28 68.183.176.131
50.235.70.202 62.173.145.40 194.90.87.72 118.70.127.198
195.88.184.186 156.212.192.34 92.32.94.199 59.57.13.176
45.125.66.54 45.125.66.37 185.61.139.56 21.133.41.90