Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
27.124.43.196 attackspambots
PHP DIESCAN Information Disclosure Vulnerability
2019-10-14 02:53:35
27.124.43.69 attackbots
404 NOT FOUND
2019-09-29 13:29:17
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '27.124.40.0 - 27.124.47.255'

% Abuse contact for '27.124.40.0 - 27.124.47.255' is 'cs.mail@ctgserver.com'

inetnum:        27.124.40.0 - 27.124.47.255
netname:        CTG124-40-HK
descr:          CTG Server Ltd.
country:        HK
admin-c:        RCPL3-AP
tech-c:         RCPL3-AP
abuse-c:        AC2487-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-RCPL-SG
mnt-irt:        IRT-CTG-HK
last-modified:  2025-04-15T10:10:14Z
source:         APNIC

irt:            IRT-CTG-HK
address:        202 ,2/F Kam Sang BLDG 257,Des Voeux RD Central Hong Kong
e-mail:         cs.mail@ctgserver.com
abuse-mailbox:  cs.mail@ctgserver.com
admin-c:        RCPL3-AP
tech-c:         RCPL3-AP
auth:           # Filtered
remarks:        cs.mail@ctgserver.com
remarks:        cs.mail@ctgserver.com was validated on 2026-02-04
mnt-by:         MAINT-RCPL-SG
last-modified:  2026-02-04T04:07:26Z
source:         APNIC

role:           ABUSE CTGHK
country:        ZZ
address:        202 ,2/F Kam Sang BLDG 257,Des Voeux RD Central Hong Kong
phone:          +000000000
e-mail:         cs.mail@ctgserver.com
admin-c:        RCPL3-AP
tech-c:         RCPL3-AP
nic-hdl:        AC2487-AP
remarks:        Generated from irt object IRT-CTG-HK
remarks:        cs.mail@ctgserver.com was validated on 2026-02-04
abuse-mailbox:  cs.mail@ctgserver.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-04T04:07:58Z
source:         APNIC

role:           RACKIP CONSULTANCY PTE LTD administrator
address:        399 Chai Wan Road, Chai Wan, Hong Kong
country:        SG
phone:          +603-7806-1316
fax-no:         +603-7806-1316
e-mail:         abuse@rackip.com
admin-c:        RCPL3-AP
tech-c:         RCPL3-AP
nic-hdl:        RCPL3-AP
mnt-by:         MAINT-RCPL-SG
last-modified:  2021-08-30T06:13:42Z
source:         APNIC

% Information related to '27.124.43.0/24AS152194'

route:          27.124.43.0/24
origin:         AS152194
descr:          RACKIP CONSULTANCY PTE. LTD.
                No. 3, Pemimpin Drive, #07-04 Lip Hing, Industrial Building,
mnt-by:         MAINT-RCPL-SG
last-modified:  2024-03-31T12:52:12Z
source:         APNIC

% Information related to '27.124.43.0/24AS64050'

route:          27.124.43.0/24
origin:         AS64050
descr:          RACKIP CONSULTANCY PTE. LTD.
                No. 3, Pemimpin Drive, #07-04 Lip Hing, Industrial Building,
mnt-by:         MAINT-RCPL-SG
last-modified:  2023-10-04T06:22:41Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 27.124.43.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8741
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;27.124.43.215.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042101 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 22 05:00:05 CST 2026
;; MSG SIZE  rcvd: 106
Host info
b'Host 215.43.124.27.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 27.124.43.215.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
173.211.148.82 attack
Aug 18 17:06:05 borg sshd[47864]: Failed unknown for invalid user marifer from 173.211.148.82 port 51962 ssh2
Aug 18 17:06:07 borg sshd[47873]: Failed unknown for invalid user ezrena from 173.211.148.82 port 52064 ssh2
Aug 18 17:06:08 borg sshd[47922]: Failed unknown for invalid user maronique from 173.211.148.82 port 52274 ssh2
...
2019-08-19 12:00:17
46.101.243.40 attackspambots
Aug 18 12:33:58 aiointranet sshd\[24182\]: Invalid user koko from 46.101.243.40
Aug 18 12:33:58 aiointranet sshd\[24182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.243.40
Aug 18 12:34:00 aiointranet sshd\[24182\]: Failed password for invalid user koko from 46.101.243.40 port 58572 ssh2
Aug 18 12:38:02 aiointranet sshd\[24533\]: Invalid user user from 46.101.243.40
Aug 18 12:38:02 aiointranet sshd\[24533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.243.40
2019-08-19 11:56:56
191.53.238.84 attackspam
SASL PLAIN auth failed: ruser=...
2019-08-19 12:15:44
191.53.248.162 attack
SASL PLAIN auth failed: ruser=...
2019-08-19 12:15:25
191.53.236.191 attackspambots
SASL PLAIN auth failed: ruser=...
2019-08-19 12:16:27
191.53.254.167 attackspam
SASL PLAIN auth failed: ruser=...
2019-08-19 12:12:49
189.91.3.154 attack
SASL PLAIN auth failed: ruser=...
2019-08-19 12:43:55
191.37.203.55 attack
SASL PLAIN auth failed: ruser=...
2019-08-19 12:35:19
189.91.3.161 attackspam
SASL PLAIN auth failed: ruser=...
2019-08-19 12:43:21
191.53.220.188 attack
SASL PLAIN auth failed: ruser=...
2019-08-19 12:21:30
191.53.195.204 attack
SASL PLAIN auth failed: ruser=...
2019-08-19 12:27:30
191.53.222.134 attack
SASL PLAIN auth failed: ruser=...
2019-08-19 12:17:39
191.240.68.159 attackspam
Aug 18 18:22:16 web1 postfix/smtpd[19248]: warning: unknown[191.240.68.159]: SASL PLAIN authentication failed: authentication failure
...
2019-08-19 12:11:44
134.209.13.209 attackspam
Aug 19 02:16:16 rb06 sshd[9687]: Failed password for invalid user alberta from 134.209.13.209 port 59958 ssh2
Aug 19 02:16:16 rb06 sshd[9687]: Received disconnect from 134.209.13.209: 11: Bye Bye [preauth]
Aug 19 02:22:50 rb06 sshd[15884]: Failed password for invalid user haxor from 134.209.13.209 port 45134 ssh2
Aug 19 02:22:50 rb06 sshd[15884]: Received disconnect from 134.209.13.209: 11: Bye Bye [preauth]
Aug 19 02:26:52 rb06 sshd[16240]: Failed password for invalid user iwizservice from 134.209.13.209 port 36022 ssh2
Aug 19 02:26:53 rb06 sshd[16240]: Received disconnect from 134.209.13.209: 11: Bye Bye [preauth]
Aug 19 02:30:43 rb06 sshd[15912]: Failed password for invalid user tomek from 134.209.13.209 port 55144 ssh2
Aug 19 02:30:43 rb06 sshd[15912]: Received disconnect from 134.209.13.209: 11: Bye Bye [preauth]
Aug 19 02:34:48 rb06 sshd[26854]: Failed password for invalid user da from 134.209.13.209 port 46034 ssh2
Aug 19 02:34:48 rb06 sshd[26854]: Received disco........
-------------------------------
2019-08-19 11:54:41
138.122.202.200 attackbotsspam
Aug 18 17:52:40 kapalua sshd\[10533\]: Invalid user tomcat from 138.122.202.200
Aug 18 17:52:40 kapalua sshd\[10533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.122.202.200
Aug 18 17:52:42 kapalua sshd\[10533\]: Failed password for invalid user tomcat from 138.122.202.200 port 47782 ssh2
Aug 18 17:57:19 kapalua sshd\[10934\]: Invalid user deployer from 138.122.202.200
Aug 18 17:57:19 kapalua sshd\[10934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.122.202.200
2019-08-19 12:03:20

Recently Reported IPs

14.213.31.78 2606:4700:10::6814:5889 122.193.247.103 2606:4700:10::6814:5550
164.155.74.130 2606:4700:10::6814:9633 2606:4700:10::6814:9974 2606:4700:10::6816:271
2606:4700:10::6814:9587 2606:4700:10::6816:2764 2606:4700:10::ac43:2495 198.211.100.14
54.221.170.110 34.203.200.187 32.192.75.243 212.107.30.123
162.19.222.42 35.203.210.13 103.70.76.190 2606:4700:10::6814:5319