Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lamar

Region: Missouri

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       69.27.128.0 - 69.27.159.255
CIDR:           69.27.128.0/19
NetName:        K-POWERNET
NetHandle:      NET-69-27-128-0-1
Parent:         NET69 (NET-69-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   KAMO Electric Cooperative, Inc. (KEC-140)
RegDate:        2003-02-28
Updated:        2012-02-24
Ref:            https://rdap.arin.net/registry/ip/69.27.128.0


OrgName:        KAMO Electric Cooperative, Inc.
OrgId:          KEC-140
Address:        500 South KAMO Drive
City:           Vinita
StateProv:      OK
PostalCode:     74301
Country:        US
RegDate:        2007-04-04
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/KEC-140


OrgTechHandle: CSG7-ARIN
OrgTechName:   Commputer Systems Group
OrgTechPhone:  +1-918-256-5551 
OrgTechEmail:  abuse@kamopower.com
OrgTechRef:    https://rdap.arin.net/registry/entity/CSG7-ARIN

OrgAbuseHandle: CSG7-ARIN
OrgAbuseName:   Commputer Systems Group
OrgAbusePhone:  +1-918-256-5551 
OrgAbuseEmail:  abuse@kamopower.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CSG7-ARIN

OrgTechHandle: VANGK10-ARIN
OrgTechName:   Vang, Keng 
OrgTechPhone:  +1-918-526-1840 
OrgTechEmail:  kvang@kamopower.com
OrgTechRef:    https://rdap.arin.net/registry/entity/VANGK10-ARIN

OrgTechHandle: HAYJO1-ARIN
OrgTechName:   Hay, Josh 
OrgTechPhone:  +1-918-256-5551 
OrgTechEmail:  jhay@kamopower.com
OrgTechRef:    https://rdap.arin.net/registry/entity/HAYJO1-ARIN

OrgTechHandle: KAWTI2-ARIN
OrgTechName:   Kawtikwar, Abhishek 
OrgTechPhone:  +1-918-256-5551 
OrgTechEmail:  akawtikwar@kamopower.com
OrgTechRef:    https://rdap.arin.net/registry/entity/KAWTI2-ARIN

# end


# start

NetRange:       69.27.134.192 - 69.27.134.255
CIDR:           69.27.134.192/26
NetName:        K-POWERNET-WI-FI
NetHandle:      NET-69-27-134-192-1
Parent:         K-POWERNET (NET-69-27-128-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       KAMO Power (C02208264)
RegDate:        2009-04-19
Updated:        2009-04-19
Ref:            https://rdap.arin.net/registry/ip/69.27.134.192


CustName:       KAMO Power
Address:        500 S KAMO Dr
City:           Vinita
StateProv:      OK
PostalCode:     74503
Country:        US
RegDate:        2009-04-19
Updated:        2011-03-19
Ref:            https://rdap.arin.net/registry/entity/C02208264

OrgTechHandle: CSG7-ARIN
OrgTechName:   Commputer Systems Group
OrgTechPhone:  +1-918-256-5551 
OrgTechEmail:  abuse@kamopower.com
OrgTechRef:    https://rdap.arin.net/registry/entity/CSG7-ARIN

OrgAbuseHandle: CSG7-ARIN
OrgAbuseName:   Commputer Systems Group
OrgAbusePhone:  +1-918-256-5551 
OrgAbuseEmail:  abuse@kamopower.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CSG7-ARIN

OrgTechHandle: VANGK10-ARIN
OrgTechName:   Vang, Keng 
OrgTechPhone:  +1-918-526-1840 
OrgTechEmail:  kvang@kamopower.com
OrgTechRef:    https://rdap.arin.net/registry/entity/VANGK10-ARIN

OrgTechHandle: HAYJO1-ARIN
OrgTechName:   Hay, Josh 
OrgTechPhone:  +1-918-256-5551 
OrgTechEmail:  jhay@kamopower.com
OrgTechRef:    https://rdap.arin.net/registry/entity/HAYJO1-ARIN

OrgTechHandle: KAWTI2-ARIN
OrgTechName:   Kawtikwar, Abhishek 
OrgTechPhone:  +1-918-256-5551 
OrgTechEmail:  akawtikwar@kamopower.com
OrgTechRef:    https://rdap.arin.net/registry/entity/KAWTI2-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.27.134.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21143
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;69.27.134.199.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025082400 1800 900 604800 86400

;; Query time: 139 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Aug 25 00:30:04 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 199.134.27.69.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 199.134.27.69.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
103.79.143.225 attack
01/23/2020-10:00:50.989899 103.79.143.225 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-01-24 00:01:03
79.103.83.154 attackbotsspam
20/1/23@02:46:49: FAIL: Alarm-Telnet address from=79.103.83.154
...
2020-01-24 00:02:00
210.213.251.146 attack
Unauthorized connection attempt from IP address 210.213.251.146 on Port 445(SMB)
2020-01-23 23:47:41
218.78.54.84 attackbots
Unauthorized connection attempt detected from IP address 218.78.54.84 to port 2220 [J]
2020-01-23 23:53:20
222.186.175.154 attackspam
Jan 23 16:14:48 localhost sshd\[14566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Jan 23 16:14:50 localhost sshd\[14566\]: Failed password for root from 222.186.175.154 port 50346 ssh2
Jan 23 16:14:53 localhost sshd\[14566\]: Failed password for root from 222.186.175.154 port 50346 ssh2
...
2020-01-24 00:15:48
202.125.159.113 attackbotsspam
Unauthorized connection attempt from IP address 202.125.159.113 on Port 445(SMB)
2020-01-23 23:54:23
145.44.235.233 attackspam
Invalid user admin from 145.44.235.233 port 59462
2020-01-23 23:44:22
222.186.30.218 attackbots
Jan 23 16:36:07 vpn01 sshd[21574]: Failed password for root from 222.186.30.218 port 11580 ssh2
Jan 23 16:36:09 vpn01 sshd[21574]: Failed password for root from 222.186.30.218 port 11580 ssh2
...
2020-01-23 23:43:50
180.244.202.190 attack
Unauthorized connection attempt from IP address 180.244.202.190 on Port 445(SMB)
2020-01-24 00:00:34
83.171.107.216 attackspam
Invalid user refat from 83.171.107.216 port 34081
2020-01-24 00:06:54
79.2.24.44 attackbots
Unauthorized connection attempt detected from IP address 79.2.24.44 to port 4567 [J]
2020-01-24 00:10:31
112.85.42.174 attackspambots
ssh bruteforce
2020-01-24 00:14:39
185.176.27.110 attackbotsspam
[portscan] Port scan
2020-01-24 00:25:09
177.184.140.150 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-24 00:24:40
106.208.24.0 attackbots
1579765603 - 01/23/2020 08:46:43 Host: 106.208.24.0/106.208.24.0 Port: 445 TCP Blocked
2020-01-24 00:06:16

Recently Reported IPs

106.55.255.73 42.194.245.125 42.194.128.82 106.52.146.234
42.194.226.88 129.204.31.216 81.71.94.236 42.194.192.36
81.70.0.33 112.9.108.17 113.215.188.62 213.136.76.19
14.153.217.203 114.119.167.190 61.129.155.195 193.44.239.130
20.83.173.252 54.83.179.41 18.205.243.147 167.99.69.81