Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.54.27.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49518
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.54.27.42.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 18:39:52 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 42.27.54.166.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 166.54.27.42.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
106.13.148.104 attackbots
May 22 14:39:54 home sshd[31246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.148.104
May 22 14:39:56 home sshd[31246]: Failed password for invalid user ics from 106.13.148.104 port 51206 ssh2
May 22 14:44:25 home sshd[31918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.148.104
...
2020-05-22 23:58:57
223.151.99.70 attack
Fail2Ban Ban Triggered
2020-05-22 23:54:56
45.14.150.51 attackbots
May 22 12:14:31 ws26vmsma01 sshd[190419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.150.51
May 22 12:14:34 ws26vmsma01 sshd[190419]: Failed password for invalid user kdv from 45.14.150.51 port 34852 ssh2
...
2020-05-22 23:31:27
222.186.31.83 attackbotsspam
Unauthorized connection attempt detected from IP address 222.186.31.83 to port 22 [T]
2020-05-22 23:30:47
159.65.216.161 attackspambots
May 22 15:39:58 vps333114 sshd[10168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.216.161
May 22 15:40:00 vps333114 sshd[10168]: Failed password for invalid user swa from 159.65.216.161 port 41228 ssh2
...
2020-05-22 23:59:55
219.153.31.186 attackbots
Invalid user zjz from 219.153.31.186 port 36687
2020-05-22 23:59:25
46.229.173.68 attackspam
Fail2Ban Ban Triggered
2020-05-22 23:19:57
118.200.46.74 attackspambots
Automatic report - Banned IP Access
2020-05-22 23:58:32
80.211.243.183 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-22 23:33:14
27.78.14.83 attackbots
Fail2Ban Ban Triggered
2020-05-22 23:26:32
195.54.166.180 attack
Port scan on 51 port(s): 10 28 46 47 53 85 112 114 192 206 252 290 296 320 324 334 348 405 415 420 435 462 485 504 530 564 597 606 624 645 648 659 664 683 720 745 750 755 797 821 829 863 883 958 988 5563 5692 5766 5786 5788 5818
2020-05-22 23:45:32
84.214.176.227 attack
May 22 16:02:58 jane sshd[27190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.214.176.227 
May 22 16:03:00 jane sshd[27190]: Failed password for invalid user wanlh from 84.214.176.227 port 56070 ssh2
...
2020-05-22 23:56:46
195.154.187.136 attack
20 attempts against mh-misbehave-ban on twig
2020-05-22 23:42:49
77.42.118.203 attackbots
Port probing on unauthorized port 23
2020-05-22 23:45:10
80.82.77.86 attack
scans once in preceeding hours on the ports (in chronological order) 49153 resulting in total of 45 scans from 80.82.64.0/20 block.
2020-05-22 23:19:27

Recently Reported IPs

4.69.50.140 195.68.21.189 132.239.177.186 39.95.6.58
199.84.32.165 242.214.31.29 92.145.169.49 243.78.246.54
47.223.39.245 236.237.32.180 66.181.15.147 94.88.57.228
131.118.68.151 162.77.250.187 92.251.178.62 163.101.185.165
65.20.215.104 251.170.16.149 182.163.252.4 137.125.19.159