Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Osaka

Region: Ōsaka

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 27.134.242.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32963
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;27.134.242.1.			IN	A

;; AUTHORITY SECTION:
.			305	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112602 1800 900 604800 86400

;; Query time: 563 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 27 03:38:15 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 1.242.134.27.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 1.242.134.27.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
93.42.182.192 attack
SSH Bruteforce
2019-11-17 19:30:46
183.87.157.202 attackspam
Nov 17 12:30:32 eventyay sshd[28808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.87.157.202
Nov 17 12:30:34 eventyay sshd[28808]: Failed password for invalid user 4444444 from 183.87.157.202 port 60994 ssh2
Nov 17 12:34:51 eventyay sshd[28877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.87.157.202
...
2019-11-17 19:43:37
60.190.248.10 attack
3389BruteforceFW22
2019-11-17 19:27:02
195.231.1.162 attackspambots
CloudCIX Reconnaissance Scan Detected, PTR: host162-1-231-195.serverdedicati.aruba.it.
2019-11-17 19:11:37
87.81.169.74 attackbots
SSH Bruteforce
2019-11-17 19:47:14
104.236.169.213 attackspam
Automatic report - XMLRPC Attack
2019-11-17 19:24:17
94.231.136.154 attackbots
Nov 17 12:01:48 MK-Soft-VM6 sshd[30630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.231.136.154 
Nov 17 12:01:50 MK-Soft-VM6 sshd[30630]: Failed password for invalid user Elsi from 94.231.136.154 port 41206 ssh2
...
2019-11-17 19:23:34
146.0.209.72 attack
$f2bV_matches
2019-11-17 19:39:21
72.9.152.106 attack
Automatic report - XMLRPC Attack
2019-11-17 19:15:10
211.24.103.165 attackspam
Nov 17 12:08:35 MK-Soft-VM6 sshd[30667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.24.103.165 
Nov 17 12:08:38 MK-Soft-VM6 sshd[30667]: Failed password for invalid user nitzhe from 211.24.103.165 port 32790 ssh2
...
2019-11-17 19:47:38
173.201.196.114 attackspam
Automatic report - XMLRPC Attack
2019-11-17 19:17:11
68.183.84.213 attackbotsspam
Automatic report - Banned IP Access
2019-11-17 19:35:42
45.82.153.76 attackspam
IP: 45.82.153.76
ASN: AS202984 Chernyshov Aleksandr Aleksandrovich
Port: Message Submission 587
Found in one or more Blacklists
Date: 17/11/2019 11:20:17 AM UTC
2019-11-17 19:32:17
50.62.208.85 attackspambots
Automatic report - XMLRPC Attack
2019-11-17 19:28:35
89.176.31.78 attackspam
SSH Bruteforce
2019-11-17 19:45:15

Recently Reported IPs

87.3.251.52 72.139.103.132 101.239.78.128 174.134.52.190
129.25.12.213 159.138.150.119 42.254.125.230 129.10.166.206
122.51.37.26 218.205.38.37 211.222.172.186 159.75.138.242
101.73.58.207 171.43.31.43 107.24.10.92 63.95.74.72
75.58.143.110 13.215.230.184 157.25.248.71 17.235.93.96