Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chula Vista

Region: California

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.199.27.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36460
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;162.199.27.42.			IN	A

;; AUTHORITY SECTION:
.			430	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102801 1800 900 604800 86400

;; Query time: 99 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 29 03:30:10 CST 2019
;; MSG SIZE  rcvd: 117
Host info
42.27.199.162.in-addr.arpa domain name pointer 162-199-27-42.lightspeed.sndgca.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.27.199.162.in-addr.arpa	name = 162-199-27-42.lightspeed.sndgca.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
73.15.91.251 attackspambots
Apr 30 19:03:29 kapalua sshd\[31728\]: Invalid user redmine from 73.15.91.251
Apr 30 19:03:29 kapalua sshd\[31728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-15-91-251.hsd1.ca.comcast.net
Apr 30 19:03:32 kapalua sshd\[31728\]: Failed password for invalid user redmine from 73.15.91.251 port 58102 ssh2
Apr 30 19:05:16 kapalua sshd\[31890\]: Invalid user syc from 73.15.91.251
Apr 30 19:05:16 kapalua sshd\[31890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-15-91-251.hsd1.ca.comcast.net
2020-05-01 14:33:01
128.199.81.42 attack
Invalid user patrol from 128.199.81.42 port 58900
2020-05-01 15:04:43
35.232.77.114 attackbots
Fail2Ban Ban Triggered
2020-05-01 14:43:31
95.85.38.127 attack
prod8
...
2020-05-01 14:30:31
219.250.188.165 attackbots
Fail2Ban - SSH Bruteforce Attempt
2020-05-01 14:47:33
170.244.232.90 attackspambots
May  1 08:11:44 roki-contabo sshd\[9672\]: Invalid user temp from 170.244.232.90
May  1 08:11:44 roki-contabo sshd\[9672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.244.232.90
May  1 08:11:46 roki-contabo sshd\[9672\]: Failed password for invalid user temp from 170.244.232.90 port 48562 ssh2
May  1 08:15:46 roki-contabo sshd\[9694\]: Invalid user danb from 170.244.232.90
May  1 08:15:46 roki-contabo sshd\[9694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.244.232.90
...
2020-05-01 14:57:31
180.76.97.180 attack
hit -> srv3:22
2020-05-01 14:55:13
36.67.32.45 attack
Invalid user nada from 36.67.32.45 port 42686
2020-05-01 14:43:10
149.56.172.224 attackbots
Invalid user info from 149.56.172.224 port 45166
2020-05-01 15:02:17
179.191.65.98 attackbots
Spammer
2020-05-01 14:55:46
181.123.177.150 attackspambots
hit -> srv3:22
2020-05-01 14:53:54
64.62.184.174 attack
Unauthorized connection attempt detected from IP address 64.62.184.174 to port 80
2020-05-01 14:34:52
125.124.117.226 attack
Invalid user direccion from 125.124.117.226 port 40739
2020-05-01 15:05:43
51.137.145.183 attackbotsspam
hit -> srv3:22
2020-05-01 14:37:39
73.167.160.49 attack
Invalid user hexin from 73.167.160.49 port 49164
2020-05-01 14:32:37

Recently Reported IPs

73.236.76.99 101.173.108.231 81.23.181.239 172.63.66.123
167.71.9.186 219.208.1.123 120.235.197.81 93.81.186.75
52.208.233.56 14.84.148.30 180.250.18.87 155.128.160.61
25.44.9.12 248.47.154.5 229.103.38.0 181.164.38.39
245.61.220.226 14.62.118.29 95.53.34.229 157.98.34.7