Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '27.254.83.0 - 27.254.83.127'

% Abuse contact for '27.254.83.0 - 27.254.83.127' is 'csl-ip-admin@ais.co.th'

inetnum:        27.254.83.0 - 27.254.83.127
netname:        idc-csloxinfo
descr:          IDC-CBW Customer
country:        TH
admin-c:        LIA1-AP
tech-c:         LIA1-AP
abuse-c:        AC1613-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         LOXINFO-IS
mnt-irt:        IRT-CSLOXINFO-TH
last-modified:  2025-05-26T17:42:43Z
source:         APNIC

irt:            IRT-CSLOXINFO-TH
address:        CW Tower
address:        Ratchadapisek Road, Huai Khwang, Bangkok 10310
phone:          +66 2 2638000
fax-no:         +66 2 2638790
e-mail:         csl-ip-admin@ais.co.th
abuse-mailbox:  csl-ip-admin@ais.co.th
admin-c:        LIA1-AP
tech-c:         LIA1-AP
auth:           # Filtered
remarks:        csl-ip-admin@ais.co.th was validated on 2025-09-04
mnt-by:         CSLOXINFO-IS
last-modified:  2025-11-18T10:47:13Z
source:         APNIC

role:           ABUSE CSLOXINFOTH
country:        ZZ
address:        CW Tower
address:        Ratchadapisek Road, Huai Khwang, Bangkok 10310
phone:          +66 2 2638000
e-mail:         csl-ip-admin@ais.co.th
admin-c:        LIA1-AP
tech-c:         LIA1-AP
nic-hdl:        AC1613-AP
remarks:        Generated from irt object IRT-CSLOXINFO-TH
remarks:        csl-ip-admin@ais.co.th was validated on 2025-09-04
abuse-mailbox:  csl-ip-admin@ais.co.th
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-04T22:49:47Z
source:         APNIC

role:           Loxinfo IP Admins
remarks:        CS LOXINFO PUBLIC COMPANY LIMITED
address:        CW Tower
address:        Ratchadapisek Road, Huai Khwang, Bangkok 10310
country:        TH
phone:          +66-2263-8000
fax-no:         +66-2263-8790
e-mail:         csl-ip-admin@ais.co.th
admin-c:        LIA1-AP
tech-c:         LIA1-AP
nic-hdl:        LIA1-AP
mnt-by:         CSLOXINFO-IS
last-modified:  2026-01-12T02:24:09Z
source:         APNIC

% Information related to '27.254.83.0/24AS9891'

route:          27.254.83.0/24
origin:         AS9891
descr:          CS Loxinfo Public Company Limited
                90 CW Tower A 17-20th floor
                Ratchadapisek Rd
                Huai Kwang
mnt-by:         LOXINFO-IS
last-modified:  2025-05-23T16:11:08Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 27.254.83.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52563
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;27.254.83.119.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041402 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 15 09:53:47 CST 2026
;; MSG SIZE  rcvd: 106
Host info
119.83.254.27.in-addr.arpa domain name pointer 119.servertoday.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
119.83.254.27.in-addr.arpa	name = 119.servertoday.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
93.108.242.157 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 02-01-2020 23:05:40.
2020-01-03 08:41:48
27.49.232.9 attack
firewall-block, port(s): 1433/tcp
2020-01-03 08:31:23
90.84.45.38 attackspam
Too many connections or unauthorized access detected from Arctic banned ip
2020-01-03 08:35:36
14.162.69.123 attackbots
SASL PLAIN auth failed: ruser=...
2020-01-03 08:30:50
223.112.69.58 attack
Jan  3 00:57:28 srv-ubuntu-dev3 sshd[118118]: Invalid user vps from 223.112.69.58
Jan  3 00:57:28 srv-ubuntu-dev3 sshd[118118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.112.69.58
Jan  3 00:57:28 srv-ubuntu-dev3 sshd[118118]: Invalid user vps from 223.112.69.58
Jan  3 00:57:30 srv-ubuntu-dev3 sshd[118118]: Failed password for invalid user vps from 223.112.69.58 port 56860 ssh2
Jan  3 01:00:43 srv-ubuntu-dev3 sshd[118342]: Invalid user pokemon from 223.112.69.58
Jan  3 01:00:43 srv-ubuntu-dev3 sshd[118342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.112.69.58
Jan  3 01:00:43 srv-ubuntu-dev3 sshd[118342]: Invalid user pokemon from 223.112.69.58
Jan  3 01:00:45 srv-ubuntu-dev3 sshd[118342]: Failed password for invalid user pokemon from 223.112.69.58 port 53754 ssh2
Jan  3 01:04:02 srv-ubuntu-dev3 sshd[118598]: Invalid user db2inst from 223.112.69.58
...
2020-01-03 08:21:34
113.161.37.172 attack
SASL PLAIN auth failed: ruser=...
2020-01-03 08:27:49
183.87.125.126 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 02-01-2020 23:05:29.
2020-01-03 08:58:36
83.154.242.236 attackspam
2020-01-03T00:05:29.379691vps751288.ovh.net sshd\[24112\]: Invalid user pi from 83.154.242.236 port 56152
2020-01-03T00:05:29.391417vps751288.ovh.net sshd\[24113\]: Invalid user pi from 83.154.242.236 port 56154
2020-01-03T00:05:29.434924vps751288.ovh.net sshd\[24112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=otp31-1-83-154-242-236.fbx.proxad.net
2020-01-03T00:05:29.441449vps751288.ovh.net sshd\[24113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=otp31-1-83-154-242-236.fbx.proxad.net
2020-01-03T00:05:32.190329vps751288.ovh.net sshd\[24112\]: Failed password for invalid user pi from 83.154.242.236 port 56152 ssh2
2020-01-03 08:58:49
113.162.186.254 attackspambots
SASL PLAIN auth failed: ruser=...
2020-01-03 08:27:16
148.70.106.160 attack
Jan  1 11:39:58 kmh-wmh-002-nbg03 sshd[9484]: Invalid user vargant from 148.70.106.160 port 49106
Jan  1 11:39:58 kmh-wmh-002-nbg03 sshd[9484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.106.160
Jan  1 11:40:00 kmh-wmh-002-nbg03 sshd[9484]: Failed password for invalid user vargant from 148.70.106.160 port 49106 ssh2
Jan  1 11:40:01 kmh-wmh-002-nbg03 sshd[9484]: Received disconnect from 148.70.106.160 port 49106:11: Bye Bye [preauth]
Jan  1 11:40:01 kmh-wmh-002-nbg03 sshd[9484]: Disconnected from 148.70.106.160 port 49106 [preauth]
Jan  1 11:53:14 kmh-wmh-002-nbg03 sshd[10992]: Invalid user webmaster from 148.70.106.160 port 37108
Jan  1 11:53:14 kmh-wmh-002-nbg03 sshd[10992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.106.160
Jan  1 11:53:16 kmh-wmh-002-nbg03 sshd[10992]: Failed password for invalid user webmaster from 148.70.106.160 port 37108 ssh2
Jan  1 11:53:17 km........
-------------------------------
2020-01-03 08:32:53
149.129.104.140 attackbots
01/03/2020-00:05:36.201606 149.129.104.140 Protocol: 6 ET POLICY Cleartext WordPress Login
2020-01-03 08:53:26
79.147.192.240 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 02-01-2020 23:05:39.
2020-01-03 08:42:42
113.173.218.245 attackspambots
SASL PLAIN auth failed: ruser=...
2020-01-03 08:26:41
106.13.142.115 attack
$f2bV_matches
2020-01-03 08:37:54
106.52.93.188 attackbotsspam
$f2bV_matches
2020-01-03 08:32:24

Recently Reported IPs

20.48.184.58 2606:4700:10::ac43:137e 2606:4700:10::6816:2833 2606:4700:10::6814:7814
2606:4700:10::6814:6959 2606:4700:10::ac43:2280 2606:4700:10::6814:6749 66.132.224.232
142.93.115.5 202.61.75.125 35.223.241.4 121.199.172.227
2606:4700:10::6814:5094 2606:4700:10::6814:5012 2606:4700:10::6814:9258 2606:4700:10::6816:2592
2606:4700:10::6814:7504 121.234.219.139 2606:4700:10::6814:6536 113.142.81.115