Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Teresina

Region: Piaui

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% IP Client: 124.223.158.242
 % Copyright (c) Nic.br - Use of this data is governed by the Use and
% Privacy Policy at https://registro.br/upp . Distribution,
% commercialization, reproduction, and use for advertising or similar
% purposes are expressly prohibited.
% 2026-04-26T03:38:17-03:00 - 124.223.158.242

inetnum:     189.26.0.0/15
aut-num:     AS18881
abuse-c:     CSTBR
owner:       TELEF�NICA BRASIL S.A
ownerid:     02.558.157/0001-62
responsible: Diretoria de Planejamento e Tecnologia
owner-c:     ARITE
tech-c:      GVO6
inetrev:     189.27.128.0/18
nserver:     dns1.gvt.net.br
nsstat:      20260425 AA
nslastaa:    20260425
nserver:     dns2.gvt.net.br
nsstat:      20260425 AA
nslastaa:    20260425
nserver:     dns3.gvt.net.br
nsstat:      20260425 AA
nslastaa:    20260425
created:     20070223
changed:     20160909

nic-hdl-br:  ARITE
person:      Administra��o Rede IP Telesp
created:     20080407
changed:     20230629

nic-hdl-br:  CSTBR
person:      CSIRT TELEFONICA BR
created:     20180713
changed:     20180713

nic-hdl-br:  GVO6
person:      GVT Operacao
created:     20010613
changed:     20220331

% Security and mail abuse issues should also be addressed to cert.br,
% respectivelly to cert@cert.br and mail-abuse@cert.br
%
% whois.registro.br only accepts exact match queries for domains,
% registrants, contacts, tickets, providers, IPs, and ASNs.
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.27.136.224
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47999
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;189.27.136.224.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042600 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 26 14:38:18 CST 2026
;; MSG SIZE  rcvd: 107
Host info
224.136.27.189.in-addr.arpa domain name pointer 189.27.136.224.dynamic.adsl.gvt.net.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
224.136.27.189.in-addr.arpa	name = 189.27.136.224.dynamic.adsl.gvt.net.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.166.181.139 attackbots
Brute-force general attack.
2020-03-31 01:44:25
140.246.225.169 attackbots
SSH invalid-user multiple login attempts
2020-03-31 01:32:51
80.82.77.86 attackbotsspam
Port 161 scan denied
2020-03-31 01:31:24
93.170.36.5 attack
Mar 30 06:51:23 mockhub sshd[17481]: Failed password for root from 93.170.36.5 port 37422 ssh2
...
2020-03-31 01:25:30
92.118.38.82 attackspam
Mar 30 19:17:39 srv01 postfix/smtpd\[19015\]: warning: unknown\[92.118.38.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 30 19:17:41 srv01 postfix/smtpd\[22703\]: warning: unknown\[92.118.38.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 30 19:17:52 srv01 postfix/smtpd\[19015\]: warning: unknown\[92.118.38.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 30 19:18:00 srv01 postfix/smtpd\[22927\]: warning: unknown\[92.118.38.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 30 19:18:06 srv01 postfix/smtpd\[7013\]: warning: unknown\[92.118.38.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-03-31 01:20:21
113.1.40.18 attackbotsspam
(ftpd) Failed FTP login from 113.1.40.18 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Mar 30 18:25:11 ir1 pure-ftpd: (?@113.1.40.18) [WARNING] Authentication failed for user [anonymous]
2020-03-31 01:28:34
118.69.181.205 attack
Attempt to login to my email March 30, 2020 6:44:42 AM PDT 	chrome, windows nt 	
Vietnam

118.69.181.205
2020-03-31 01:26:00
35.188.137.50 attackspambots
$f2bV_matches
2020-03-31 02:02:10
223.197.125.10 attack
Brute force SMTP login attempted.
...
2020-03-31 01:47:21
223.202.201.138 attackspambots
Brute force SMTP login attempted.
...
2020-03-31 01:29:08
51.254.120.159 attack
SSH Brute-Force reported by Fail2Ban
2020-03-31 01:49:35
118.36.101.60 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-31 01:59:25
109.255.108.166 attack
Mar 30 16:58:25 nextcloud sshd\[26799\]: Invalid user webmin1234 from 109.255.108.166
Mar 30 16:58:25 nextcloud sshd\[26799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.255.108.166
Mar 30 16:58:26 nextcloud sshd\[26799\]: Failed password for invalid user webmin1234 from 109.255.108.166 port 55362 ssh2
2020-03-31 01:22:59
223.17.33.191 attackspam
Brute force SMTP login attempted.
...
2020-03-31 01:59:44
165.22.186.178 attackspambots
SSH brute force attempt
2020-03-31 01:42:25

Recently Reported IPs

139.206.109.17 2606:4700:10::6814:8249 144.242.191.16 34.62.117.196
35.241.166.100 20.80.83.115 140.216.186.94 2606:4700:10::6816:661
2606:4700:10::6816:2272 43.138.5.244 91.230.168.54 34.52.173.82
172.233.243.85 42.236.157.238 223.90.8.210 183.93.15.91
183.211.135.176 176.65.149.18 175.44.116.245 175.42.160.93