Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: Vodafone Kabel Deutschland GmbH

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspambots
1585485954 - 03/29/2020 19:45:54 Host: ipb21bc3c2.dynamic.kabel-deutschland.de/178.27.195.194 Port: 11 TCP Blocked
...
2020-03-30 00:21:03
Comments on same subnet:
IP Type Details Datetime
178.27.195.1 attackspam
Feb 12 23:20:27 debian-2gb-nbg1-2 kernel: \[3805256.806451\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=178.27.195.1 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=116 ID=57852 DF PROTO=TCP SPT=38961 DPT=60 WINDOW=64240 RES=0x00 CWR ECE SYN URGP=0
2020-02-13 06:51:06
178.27.195.1 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2019-07-29 15:39:24
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 178.27.195.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60749
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;178.27.195.194.			IN	A

;; AUTHORITY SECTION:
.			333	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032900 1800 900 604800 86400

;; Query time: 136 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 00:20:56 CST 2020
;; MSG SIZE  rcvd: 118
Host info
194.195.27.178.in-addr.arpa domain name pointer ipb21bc3c2.dynamic.kabel-deutschland.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
194.195.27.178.in-addr.arpa	name = ipb21bc3c2.dynamic.kabel-deutschland.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.138.77.58 attack
Unauthorized connection attempt detected from IP address 123.138.77.58 to port 2087
2019-12-31 08:50:52
42.187.121.111 attack
Unauthorized connection attempt detected from IP address 42.187.121.111 to port 445
2019-12-31 09:02:36
112.80.138.223 attackbots
Unauthorized connection attempt detected from IP address 112.80.138.223 to port 2095
2019-12-31 08:57:15
118.145.22.254 attackbotsspam
Unauthorized connection attempt detected from IP address 118.145.22.254 to port 1433
2019-12-31 08:53:02
116.58.186.101 attackbots
Unauthorized connection attempt detected from IP address 116.58.186.101 to port 22
2019-12-31 08:55:46
182.138.137.163 attackbots
Unauthorized connection attempt detected from IP address 182.138.137.163 to port 2095
2019-12-31 08:46:03
110.80.153.1 attack
Unauthorized connection attempt detected from IP address 110.80.153.1 to port 2095
2019-12-31 09:23:46
118.68.185.159 attackspambots
Unauthorized connection attempt detected from IP address 118.68.185.159 to port 23
2019-12-31 08:53:35
1.54.88.49 attack
Unauthorized connection attempt detected from IP address 1.54.88.49 to port 23
2019-12-31 09:05:24
202.101.102.194 attack
Unauthorized connection attempt detected from IP address 202.101.102.194 to port 1433
2019-12-31 08:44:33
58.48.128.120 attack
Unauthorized connection attempt detected from IP address 58.48.128.120 to port 2095
2019-12-31 09:01:54
223.71.167.163 attack
Unauthorized connection attempt detected from IP address 223.71.167.163 to port 14147
2019-12-31 09:06:31
124.235.138.131 attackspam
Unauthorized connection attempt detected from IP address 124.235.138.131 to port 2086
2019-12-31 08:47:39
118.70.113.1 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-12-31 09:19:04
95.83.154.242 attack
Unauthorized connection attempt detected from IP address 95.83.154.242 to port 88
2019-12-31 09:00:42

Recently Reported IPs

70.78.168.146 49.58.23.135 37.6.69.207 56.31.214.230
62.98.253.112 184.252.204.113 223.239.147.169 22.121.2.66
253.163.61.78 167.71.100.198 58.185.166.133 82.76.19.190
30.52.160.159 40.94.112.40 33.94.196.228 148.255.80.245
51.38.115.161 75.143.115.103 91.1.189.14 41.220.193.1