Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seoul

Region: Seoul

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.20.27.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54560
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.20.27.189.			IN	A

;; AUTHORITY SECTION:
.			211	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120301 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 04 02:37:35 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 189.27.20.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 189.27.20.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.173.142 attack
SSH scan ::
2019-09-26 07:40:35
117.135.131.123 attackspambots
Sep 26 02:02:57 tux-35-217 sshd\[24945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.135.131.123  user=root
Sep 26 02:03:00 tux-35-217 sshd\[24945\]: Failed password for root from 117.135.131.123 port 53798 ssh2
Sep 26 02:06:13 tux-35-217 sshd\[24958\]: Invalid user pos from 117.135.131.123 port 37592
Sep 26 02:06:13 tux-35-217 sshd\[24958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.135.131.123
...
2019-09-26 08:09:04
88.217.116.165 attack
Sep 26 02:41:35 server sshd\[15969\]: Invalid user dstat from 88.217.116.165 port 39810
Sep 26 02:41:35 server sshd\[15969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.217.116.165
Sep 26 02:41:37 server sshd\[15969\]: Failed password for invalid user dstat from 88.217.116.165 port 39810 ssh2
Sep 26 02:49:44 server sshd\[15166\]: User root from 88.217.116.165 not allowed because listed in DenyUsers
Sep 26 02:49:44 server sshd\[15166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.217.116.165  user=root
2019-09-26 07:51:38
49.88.112.78 attack
2019-09-25T23:47:37.798693abusebot-7.cloudsearch.cf sshd\[15862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.78  user=root
2019-09-26 07:48:40
185.46.121.194 attack
php WP PHPmyadamin ABUSE blocked for 12h
2019-09-26 07:41:14
43.241.145.101 attack
Sep 25 18:30:40 Tower sshd[29320]: Connection from 43.241.145.101 port 25904 on 192.168.10.220 port 22
Sep 25 18:30:44 Tower sshd[29320]: Invalid user sentry from 43.241.145.101 port 25904
Sep 25 18:30:44 Tower sshd[29320]: error: Could not get shadow information for NOUSER
Sep 25 18:30:44 Tower sshd[29320]: Failed password for invalid user sentry from 43.241.145.101 port 25904 ssh2
Sep 25 18:30:44 Tower sshd[29320]: Received disconnect from 43.241.145.101 port 25904:11: Bye Bye [preauth]
Sep 25 18:30:44 Tower sshd[29320]: Disconnected from invalid user sentry 43.241.145.101 port 25904 [preauth]
2019-09-26 07:47:48
78.128.113.58 attackspambots
20 attempts against mh_ha-misbehave-ban on lb.any-lamp.com
2019-09-26 08:11:03
91.134.248.253 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-09-26 07:40:05
151.80.36.188 attackspam
Sep 26 02:56:52 server sshd\[8260\]: Invalid user ra from 151.80.36.188 port 55068
Sep 26 02:56:52 server sshd\[8260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.36.188
Sep 26 02:56:55 server sshd\[8260\]: Failed password for invalid user ra from 151.80.36.188 port 55068 ssh2
Sep 26 03:00:54 server sshd\[24585\]: Invalid user clark from 151.80.36.188 port 41186
Sep 26 03:00:54 server sshd\[24585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.36.188
2019-09-26 08:06:47
14.177.92.58 attackspambots
Chat Spam
2019-09-26 08:12:39
150.107.103.64 attackbotsspam
2019-09-25 15:53:55 H=(lucanatractors.it) [150.107.103.64]:53786 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3, 127.0.0.11) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-09-25 15:53:56 H=(lucanatractors.it) [150.107.103.64]:53786 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.11, 127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/150.107.103.64)
2019-09-25 15:53:56 H=(lucanatractors.it) [150.107.103.64]:53786 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.11, 127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/150.107.103.64)
...
2019-09-26 07:43:35
59.124.104.157 attack
Sep 26 00:50:58 OPSO sshd\[10027\]: Invalid user pc from 59.124.104.157 port 42483
Sep 26 00:50:58 OPSO sshd\[10027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.124.104.157
Sep 26 00:51:01 OPSO sshd\[10027\]: Failed password for invalid user pc from 59.124.104.157 port 42483 ssh2
Sep 26 00:58:05 OPSO sshd\[10926\]: Invalid user help123 from 59.124.104.157 port 33618
Sep 26 00:58:05 OPSO sshd\[10926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.124.104.157
2019-09-26 07:47:05
150.95.52.70 attackbotsspam
10 attempts against mh-misc-ban on heat.magehost.pro
2019-09-26 08:13:39
18.188.140.237 attack
Sep 26 00:56:49 MK-Soft-VM3 sshd[31676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.188.140.237 
Sep 26 00:56:51 MK-Soft-VM3 sshd[31676]: Failed password for invalid user ftpuser from 18.188.140.237 port 41524 ssh2
...
2019-09-26 07:41:47
97.74.234.17 attack
fail2ban honeypot
2019-09-26 07:57:19

Recently Reported IPs

65.0.187.234 31.5.37.115 175.73.182.7 150.209.217.140
219.168.135.34 72.243.69.95 46.69.38.57 160.248.194.161
190.225.211.79 79.200.181.31 36.53.210.101 201.177.191.173
121.231.69.2 74.141.196.187 182.138.53.59 40.136.143.4
32.40.187.179 221.32.167.147 108.251.87.195 44.214.231.221