Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bangkok

Region: Bangkok

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: True Internet Co.,Ltd.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 27.145.197.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53604
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;27.145.197.16.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082501 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Aug 26 01:48:21 CST 2019
;; MSG SIZE  rcvd: 117
Host info
16.197.145.27.in-addr.arpa domain name pointer cm-27-145-197-16.revip12.asianet.co.th.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
16.197.145.27.in-addr.arpa	name = cm-27-145-197-16.revip12.asianet.co.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
211.23.160.245 attackbots
SMB Server BruteForce Attack
2020-08-12 13:59:34
94.179.145.173 attackbotsspam
Aug 12 05:46:47 *** sshd[26880]: User root from 94.179.145.173 not allowed because not listed in AllowUsers
2020-08-12 13:48:36
31.28.4.193 attackbotsspam
20/8/11@23:53:30: FAIL: IoT-Telnet address from=31.28.4.193
...
2020-08-12 13:43:03
202.83.54.167 attack
Aug 12 07:55:57 plg sshd[28460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.54.167  user=root
Aug 12 07:55:58 plg sshd[28460]: Failed password for invalid user root from 202.83.54.167 port 58054 ssh2
Aug 12 07:58:44 plg sshd[28483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.54.167  user=root
Aug 12 07:58:46 plg sshd[28483]: Failed password for invalid user root from 202.83.54.167 port 41124 ssh2
Aug 12 08:01:34 plg sshd[28530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.54.167  user=root
Aug 12 08:01:36 plg sshd[28530]: Failed password for invalid user root from 202.83.54.167 port 52414 ssh2
...
2020-08-12 14:14:19
113.104.193.205 attackspambots
Failed password for root from 113.104.193.205 port 27898 ssh2
2020-08-12 13:58:20
119.236.238.93 attack
Aug 12 05:53:51 host-itldc-nl sshd[87132]: Invalid user guest from 119.236.238.93 port 44316
Aug 12 05:53:52 host-itldc-nl sshd[88123]: User root from 119.236.238.93 not allowed because not listed in AllowUsers
Aug 12 05:53:52 host-itldc-nl sshd[87438]: Invalid user pi from 119.236.238.93 port 44356
...
2020-08-12 13:22:15
106.55.9.175 attackspam
Aug 12 06:23:45 rocket sshd[5983]: Failed password for root from 106.55.9.175 port 56928 ssh2
Aug 12 06:29:10 rocket sshd[6714]: Failed password for root from 106.55.9.175 port 58756 ssh2
...
2020-08-12 14:12:36
94.102.49.159 attackspambots
Aug 12 07:32:26 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=94.102.49.159 DST=173.212.244.83 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=31922 PROTO=TCP SPT=45696 DPT=22155 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 12 07:36:34 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=94.102.49.159 DST=173.212.244.83 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=40285 PROTO=TCP SPT=45696 DPT=23777 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 12 07:40:18 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=94.102.49.159 DST=173.212.244.83 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=27065 PROTO=TCP SPT=45696 DPT=21878 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 12 07:41:19 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=94.102.49.159 DST=173.212.244.83 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=55397 PROTO=TCP SPT=45696 DPT=22548 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 12 07:45:30 
...
2020-08-12 14:01:16
165.22.216.238 attackbotsspam
Aug 12 06:59:11 vps639187 sshd\[26347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.216.238  user=root
Aug 12 06:59:13 vps639187 sshd\[26347\]: Failed password for root from 165.22.216.238 port 57208 ssh2
Aug 12 07:03:05 vps639187 sshd\[26422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.216.238  user=root
...
2020-08-12 13:26:32
36.239.3.191 attackbots
SMB Server BruteForce Attack
2020-08-12 13:50:04
106.225.155.224 attackbots
Aug 12 07:48:01 cosmoit sshd[8455]: Failed password for root from 106.225.155.224 port 35054 ssh2
2020-08-12 13:56:38
180.76.120.49 attack
Aug 12 05:53:51 mail sshd[2436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.120.49  user=root
Aug 12 05:53:53 mail sshd[2436]: Failed password for root from 180.76.120.49 port 35018 ssh2
...
2020-08-12 13:21:07
36.65.204.157 attackbotsspam
[Wed Aug 12 10:53:08.194534 2020] [:error] [pid 15117:tid 140440171935488] [client 36.65.204.157:64511] [client 36.65.204.157] ModSecurity: Access denied with code 403 (phase 4). Pattern match "^5\\\\d{2}$" at RESPONSE_STATUS. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/RESPONSE-950-DATA-LEAKAGES.conf"] [line "118"] [id "950100"] [msg "The Application Returned a 500-Level Status Code"] [data "Matched Data: 500 found within RESPONSE_STATUS: 500"] [severity "ERROR"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-disclosure"] [tag "WASCTC/WASC-13"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.6"] [tag "paranoia-level/2"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/prakiraan-iklim/prakiraan-bulanan/prakiraan-hujan-bulanan/prakiraan-curah-hujan-bulanan/555558122-prakiraan-bulanan-curah-hujan-bulan-juli-tahun-2020-update-dari-analisis-bulan-mei-2020-di-provinsi-jawa-timur"] [unique_id "XzNnpOYkKNO-T9KMmKzhFQA
...
2020-08-12 13:55:23
201.242.98.122 attackbots
SMB Server BruteForce Attack
2020-08-12 13:46:09
222.186.15.158 attackspam
Aug 12 15:46:29 localhost sshd[2078906]: Disconnected from 222.186.15.158 port 53105 [preauth]
...
2020-08-12 13:46:39

Recently Reported IPs

190.65.193.126 36.186.113.146 87.59.198.243 23.36.250.76
62.152.10.128 91.172.107.209 8.189.13.214 147.4.108.64
97.57.14.70 57.245.79.206 219.34.204.242 185.15.197.2
79.255.171.149 107.106.142.200 119.217.189.236 206.32.237.91
124.27.141.38 182.155.97.175 180.55.131.106 13.51.17.100