Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.42.27.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41349
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.42.27.104.			IN	A

;; AUTHORITY SECTION:
.			386	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022102900 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 29 17:37:02 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 104.27.42.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.27.42.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
175.136.210.125 attackspambots
4567/tcp
[2020-01-29]1pkt
2020-01-30 02:43:19
81.214.38.173 attackbots
22/tcp
[2020-01-29]1pkt
2020-01-30 02:48:41
177.42.29.98 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 29-01-2020 19:05:32.
2020-01-30 03:19:47
91.209.128.165 attack
445/tcp
[2020-01-29]1pkt
2020-01-30 02:46:40
51.38.232.93 attackbots
Unauthorized connection attempt detected from IP address 51.38.232.93 to port 2220 [J]
2020-01-30 02:55:20
31.27.38.242 attack
Jan 29 08:57:49 eddieflores sshd\[30721\]: Invalid user jia from 31.27.38.242
Jan 29 08:57:49 eddieflores sshd\[30721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-31-27-38-242.cust.vodafonedsl.it
Jan 29 08:57:51 eddieflores sshd\[30721\]: Failed password for invalid user jia from 31.27.38.242 port 52604 ssh2
Jan 29 09:00:59 eddieflores sshd\[31120\]: Invalid user wjc from 31.27.38.242
Jan 29 09:00:59 eddieflores sshd\[31120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-31-27-38-242.cust.vodafonedsl.it
2020-01-30 03:15:10
168.121.79.178 attackbotsspam
445/tcp 445/tcp
[2019-12-20/2020-01-29]2pkt
2020-01-30 02:52:46
199.189.27.110 attackbots
2019-03-01 00:41:54 H=hatter.hasanhost.com \(hatter.reelreview.icu\) \[199.189.27.110\]:59809 I=\[193.107.88.166\]:25 sender verify fail for \: Unrouteable address
2019-03-01 00:41:54 H=hatter.hasanhost.com \(hatter.reelreview.icu\) \[199.189.27.110\]:59809 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-01 00:42:07 H=hatter.hasanhost.com \(hatter.reelreview.icu\) \[199.189.27.110\]:34137 I=\[193.107.88.166\]:25 sender verify fail for \: Unrouteable address
2019-03-01 00:42:07 H=hatter.hasanhost.com \(hatter.reelreview.icu\) \[199.189.27.110\]:34137 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-01 00:43:53 H=hatter.hasanhost.com \(hatter.reelreview.icu\) \[199.189.27.110\]:36996 I=\[193.107.90.29\]:25 sender verify fail for \
2020-01-30 02:51:54
111.229.144.67 attackbots
Jan 29 15:25:55 localhost sshd\[12372\]: Invalid user nishi from 111.229.144.67 port 55346
Jan 29 15:25:55 localhost sshd\[12372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.144.67
Jan 29 15:25:57 localhost sshd\[12372\]: Failed password for invalid user nishi from 111.229.144.67 port 55346 ssh2
2020-01-30 03:00:49
199.189.27.112 attackbots
2019-03-13 12:37:46 1h42Cg-0008N5-3y SMTP connection from seahorse.hasanhost.com \(seahorse.arzeshcompany.icu\) \[199.189.27.112\]:39485 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-13 12:38:07 1h42D0-0008NR-Uy SMTP connection from seahorse.hasanhost.com \(seahorse.arzeshcompany.icu\) \[199.189.27.112\]:38667 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-13 12:39:40 1h42EW-0008S3-LI SMTP connection from seahorse.hasanhost.com \(seahorse.arzeshcompany.icu\) \[199.189.27.112\]:42710 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-30 02:47:38
199.189.27.119 attackspam
2019-02-28 13:14:43 1gzKaJ-0006X3-Fi SMTP connection from windy.hasanhost.com \(windy.newsbasegh.icu\) \[199.189.27.119\]:60989 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-02-28 13:15:01 1gzKab-0006XY-G0 SMTP connection from windy.hasanhost.com \(windy.newsbasegh.icu\) \[199.189.27.119\]:49624 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-02-28 13:15:17 1gzKar-0006Yv-Jt SMTP connection from windy.hasanhost.com \(windy.newsbasegh.icu\) \[199.189.27.119\]:37419 I=\[193.107.90.29\]:25 closed by DROP in ACL
2019-03-15 00:30:28 1h4Znw-0006J3-Fq SMTP connection from windy.hasanhost.com \(windy.formasurabaya.icu\) \[199.189.27.119\]:59519 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-15 00:31:38 1h4Zp4-0006Kc-9k SMTP connection from windy.hasanhost.com \(windy.formasurabaya.icu\) \[199.189.27.119\]:56560 I=\[193.107.90.29\]:25 closed by DROP in ACL
2019-03-15 00:31:58 1h4ZpO-0006L2-Nh SMTP connection from windy.hasanhost.com \(windy.formasurabaya.icu\) \[199.189.27.119\]:6
...
2020-01-30 02:39:46
199.189.27.117 attack
2019-03-13 15:32:49 1h44w5-0005yl-3x SMTP connection from press.hasanhost.com \(press.asalmahbod.icu\) \[199.189.27.117\]:51336 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-13 15:34:09 1h44xN-00060r-MD SMTP connection from press.hasanhost.com \(press.asalmahbod.icu\) \[199.189.27.117\]:44778 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-13 15:35:59 1h44z9-000662-IS SMTP connection from press.hasanhost.com \(press.asalmahbod.icu\) \[199.189.27.117\]:39616 I=\[193.107.90.29\]:25 closed by DROP in ACL
2019-03-20 18:28:25 1h6f0r-0006VO-IJ SMTP connection from press.hasanhost.com \(press.uberadmedia.icu\) \[199.189.27.117\]:45161 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-20 18:29:10 1h6f1Z-0006Wv-Tw SMTP connection from press.hasanhost.com \(press.uberadmedia.icu\) \[199.189.27.117\]:45962 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-20 18:29:33 1h6f1x-0006XO-0R SMTP connection from press.hasanhost.com \(press.uberadmedia.icu\) \[199.189.27.117\]:58650 
...
2020-01-30 02:40:51
175.195.254.99 attackbots
Jan 29 19:20:13 vmd17057 sshd\[11540\]: Invalid user haramala from 175.195.254.99 port 49026
Jan 29 19:20:13 vmd17057 sshd\[11540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.195.254.99
Jan 29 19:20:15 vmd17057 sshd\[11540\]: Failed password for invalid user haramala from 175.195.254.99 port 49026 ssh2
...
2020-01-30 03:16:11
183.61.5.84 attackspam
Unauthorized connection attempt from IP address 183.61.5.84 on Port 445(SMB)
2020-01-30 02:52:28
77.76.52.142 attackbotsspam
Unauthorized connection attempt detected from IP address 77.76.52.142 to port 2220 [J]
2020-01-30 03:11:22

Recently Reported IPs

101.32.30.86 180.6.27.156 100.191.144.78 85.50.229.200
187.5.171.16 93.238.240.1 10.233.69.4 138.127.240.72
31.133.112.34 109.123.60.183 18.157.96.12 173.8.145.113
186.11.40.210 211.186.68.131 84.188.235.122 71.203.186.98
49.91.41.46 253.144.230.113 73.224.211.125 93.124.131.82