Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.42.27.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48658
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.42.27.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031600 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 16 17:38:59 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 159.27.42.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.27.42.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.182 attackbotsspam
$f2bV_matches_ltvn
2019-12-10 15:14:49
222.186.180.41 attackspambots
Dec  9 20:41:53 auw2 sshd\[28730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
Dec  9 20:41:55 auw2 sshd\[28730\]: Failed password for root from 222.186.180.41 port 23724 ssh2
Dec  9 20:41:59 auw2 sshd\[28730\]: Failed password for root from 222.186.180.41 port 23724 ssh2
Dec  9 20:42:02 auw2 sshd\[28730\]: Failed password for root from 222.186.180.41 port 23724 ssh2
Dec  9 20:42:05 auw2 sshd\[28730\]: Failed password for root from 222.186.180.41 port 23724 ssh2
2019-12-10 14:42:32
222.186.175.151 attack
Dec 10 07:54:42 localhost sshd\[24884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151  user=root
Dec 10 07:54:44 localhost sshd\[24884\]: Failed password for root from 222.186.175.151 port 39416 ssh2
Dec 10 07:54:47 localhost sshd\[24884\]: Failed password for root from 222.186.175.151 port 39416 ssh2
2019-12-10 15:05:53
178.128.42.36 attack
2019-12-10T06:30:44.203535abusebot.cloudsearch.cf sshd\[22148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.42.36  user=lp
2019-12-10 14:48:59
39.64.22.61 attack
12/10/2019-01:32:04.883508 39.64.22.61 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-10 14:56:37
222.186.190.2 attackbots
2019-12-10T07:02:13.985516shield sshd\[23469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
2019-12-10T07:02:15.671766shield sshd\[23469\]: Failed password for root from 222.186.190.2 port 4270 ssh2
2019-12-10T07:02:18.682451shield sshd\[23469\]: Failed password for root from 222.186.190.2 port 4270 ssh2
2019-12-10T07:02:21.437264shield sshd\[23469\]: Failed password for root from 222.186.190.2 port 4270 ssh2
2019-12-10T07:02:25.278756shield sshd\[23469\]: Failed password for root from 222.186.190.2 port 4270 ssh2
2019-12-10 15:04:57
103.129.222.207 attackbots
Dec  9 21:02:49 web1 sshd\[16520\]: Invalid user stephane from 103.129.222.207
Dec  9 21:02:49 web1 sshd\[16520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.222.207
Dec  9 21:02:51 web1 sshd\[16520\]: Failed password for invalid user stephane from 103.129.222.207 port 41932 ssh2
Dec  9 21:09:22 web1 sshd\[17272\]: Invalid user tomcat from 103.129.222.207
Dec  9 21:09:22 web1 sshd\[17272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.222.207
2019-12-10 15:15:10
220.133.95.68 attack
Dec 10 09:38:31 server sshd\[4619\]: Invalid user test from 220.133.95.68
Dec 10 09:38:31 server sshd\[4619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-133-95-68.hinet-ip.hinet.net 
Dec 10 09:38:32 server sshd\[4619\]: Failed password for invalid user test from 220.133.95.68 port 47456 ssh2
Dec 10 09:45:46 server sshd\[7072\]: Invalid user oracle from 220.133.95.68
Dec 10 09:45:46 server sshd\[7072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-133-95-68.hinet-ip.hinet.net 
...
2019-12-10 15:06:37
222.186.3.249 attackbots
Dec 10 02:18:53 ny01 sshd[4170]: Failed password for root from 222.186.3.249 port 60083 ssh2
Dec 10 02:20:04 ny01 sshd[4284]: Failed password for root from 222.186.3.249 port 37558 ssh2
Dec 10 02:20:07 ny01 sshd[4284]: Failed password for root from 222.186.3.249 port 37558 ssh2
2019-12-10 15:20:32
116.1.149.196 attack
F2B jail: sshd. Time: 2019-12-10 08:01:40, Reported by: VKReport
2019-12-10 15:02:17
218.92.0.179 attackbots
Dec  9 20:30:52 sachi sshd\[16045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.179  user=root
Dec  9 20:30:54 sachi sshd\[16045\]: Failed password for root from 218.92.0.179 port 34455 ssh2
Dec  9 20:30:57 sachi sshd\[16045\]: Failed password for root from 218.92.0.179 port 34455 ssh2
Dec  9 20:31:09 sachi sshd\[16081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.179  user=root
Dec  9 20:31:12 sachi sshd\[16081\]: Failed password for root from 218.92.0.179 port 6807 ssh2
2019-12-10 14:43:58
222.186.173.180 attack
Dec 10 08:04:18 sd-53420 sshd\[24474\]: User root from 222.186.173.180 not allowed because none of user's groups are listed in AllowGroups
Dec 10 08:04:18 sd-53420 sshd\[24474\]: Failed none for invalid user root from 222.186.173.180 port 38768 ssh2
Dec 10 08:04:18 sd-53420 sshd\[24474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180  user=root
Dec 10 08:04:21 sd-53420 sshd\[24474\]: Failed password for invalid user root from 222.186.173.180 port 38768 ssh2
Dec 10 08:04:24 sd-53420 sshd\[24474\]: Failed password for invalid user root from 222.186.173.180 port 38768 ssh2
...
2019-12-10 15:06:15
117.73.9.42 attackspam
Brute force attempt
2019-12-10 14:51:20
193.188.22.188 attackspambots
Too many connections or unauthorized access detected from Yankee banned ip
2019-12-10 14:46:55
222.186.180.147 attack
SSH Brute Force, server-1 sshd[8689]: Failed password for root from 222.186.180.147 port 35402 ssh2
2019-12-10 14:57:37

Recently Reported IPs

108.225.65.124 216.54.155.119 250.35.199.123 201.225.12.162
191.84.102.209 210.250.49.65 142.226.172.210 202.104.127.0
55.131.17.77 79.200.41.155 50.238.48.7 204.81.71.7
221.90.144.164 236.17.103.106 187.70.246.36 57.7.232.247
61.74.146.49 88.12.14.24 137.206.36.165 17.145.224.213