Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 43.70.27.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6211
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;43.70.27.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 15:59:53 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 12.27.70.43.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.27.70.43.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
27.151.66.244 attack
Fail2Ban - FTP Abuse Attempt
2019-11-11 16:56:25
112.21.191.253 attack
Nov 11 07:54:40 myhostname sshd[16176]: Invalid user webadmin from 112.21.191.253
Nov 11 07:54:40 myhostname sshd[16176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.21.191.253
Nov 11 07:54:42 myhostname sshd[16176]: Failed password for invalid user webadmin from 112.21.191.253 port 45926 ssh2
Nov 11 07:54:43 myhostname sshd[16176]: Received disconnect from 112.21.191.253 port 45926:11: Bye Bye [preauth]
Nov 11 07:54:43 myhostname sshd[16176]: Disconnected from 112.21.191.253 port 45926 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=112.21.191.253
2019-11-11 17:12:44
34.82.242.55 attack
WordPress wp-login brute force :: 34.82.242.55 0.204 BYPASS [11/Nov/2019:08:13:09  0000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 1561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-11-11 17:07:56
151.80.45.126 attackspambots
2019-11-11T08:34:46.208811hub.schaetter.us sshd\[30584\]: Invalid user aageviken from 151.80.45.126 port 51218
2019-11-11T08:34:46.216850hub.schaetter.us sshd\[30584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3004314.ip-151-80-45.eu
2019-11-11T08:34:48.025587hub.schaetter.us sshd\[30584\]: Failed password for invalid user aageviken from 151.80.45.126 port 51218 ssh2
2019-11-11T08:38:32.606314hub.schaetter.us sshd\[30640\]: Invalid user asterisk from 151.80.45.126 port 59744
2019-11-11T08:38:32.623711hub.schaetter.us sshd\[30640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3004314.ip-151-80-45.eu
...
2019-11-11 16:58:01
101.231.86.36 attackspambots
$f2bV_matches
2019-11-11 17:28:39
217.182.193.61 attackspambots
$f2bV_matches
2019-11-11 17:11:36
190.102.140.7 attackbotsspam
Nov 11 08:23:12 mail sshd\[16111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.102.140.7  user=mail
Nov 11 08:23:13 mail sshd\[16111\]: Failed password for mail from 190.102.140.7 port 50116 ssh2
Nov 11 08:27:20 mail sshd\[16184\]: Invalid user zybala from 190.102.140.7
Nov 11 08:27:20 mail sshd\[16184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.102.140.7
...
2019-11-11 17:26:16
139.59.108.237 attackbots
Nov 11 09:28:39 cp sshd[8280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.108.237
2019-11-11 17:13:12
187.131.165.156 attackspambots
Honeypot attack, port: 23, PTR: dsl-187-131-165-156-dyn.prod-infinitum.com.mx.
2019-11-11 17:12:02
106.13.4.150 attackspam
Nov 11 09:30:13 pornomens sshd\[31384\]: Invalid user aries from 106.13.4.150 port 47525
Nov 11 09:30:13 pornomens sshd\[31384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.4.150
Nov 11 09:30:15 pornomens sshd\[31384\]: Failed password for invalid user aries from 106.13.4.150 port 47525 ssh2
...
2019-11-11 17:12:28
158.69.192.35 attack
web-1 [ssh] SSH Attack
2019-11-11 17:16:06
62.164.176.194 attack
jannisjulius.de 62.164.176.194 \[11/Nov/2019:08:26:17 +0100\] "POST /wp-login.php HTTP/1.1" 200 6117 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
jannisjulius.de 62.164.176.194 \[11/Nov/2019:08:26:18 +0100\] "POST /wp-login.php HTTP/1.1" 200 6077 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-11 17:00:37
89.248.168.217 attackspambots
11/11/2019-09:54:43.454032 89.248.168.217 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2019-11-11 17:15:20
23.254.229.232 attackbotsspam
Nov 11 06:08:38 firewall sshd[20408]: Invalid user herngje from 23.254.229.232
Nov 11 06:08:40 firewall sshd[20408]: Failed password for invalid user herngje from 23.254.229.232 port 60896 ssh2
Nov 11 06:12:21 firewall sshd[20512]: Invalid user azlan from 23.254.229.232
...
2019-11-11 17:17:43
216.57.227.2 attack
WordPress wp-login brute force :: 216.57.227.2 0.136 BYPASS [11/Nov/2019:06:27:15  0000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 1561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-11-11 17:04:09

Recently Reported IPs

121.213.111.252 135.68.118.95 219.17.56.160 136.195.247.246
109.156.89.129 162.28.17.209 136.95.167.241 134.131.22.80
155.150.71.81 37.102.48.218 196.107.16.95 82.27.179.40
163.121.142.255 120.70.155.164 133.105.113.251 131.208.110.79
32.115.120.66 199.132.222.209 225.20.84.66 136.98.106.239