Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: London

Region: Ontario

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: Rogers Communications Canada Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
99.244.220.125 attackspambots
port scan and connect, tcp 23 (telnet)
2020-04-17 15:56:23
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.244.22.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15626
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;99.244.22.27.			IN	A

;; AUTHORITY SECTION:
.			2815	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042500 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu Apr 25 23:09:18 +08 2019
;; MSG SIZE  rcvd: 116

Host info
27.22.244.99.in-addr.arpa domain name pointer CPEf0f2494a2d23-CMf0f2494a2d20.cpe.net.cable.rogers.com.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
27.22.244.99.in-addr.arpa	name = CPEf0f2494a2d23-CMf0f2494a2d20.cpe.net.cable.rogers.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
106.55.9.175 attackbotsspam
Bruteforce detected by fail2ban
2020-07-09 04:31:48
185.126.205.92 attack
Unauthorized connection attempt detected from IP address 185.126.205.92 to port 80
2020-07-09 04:40:44
180.76.240.102 attackbotsspam
Jul  8 22:30:05 vps sshd[421726]: Failed password for invalid user wangjie from 180.76.240.102 port 57648 ssh2
Jul  8 22:31:50 vps sshd[432778]: Invalid user huajun from 180.76.240.102 port 43968
Jul  8 22:31:50 vps sshd[432778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.240.102
Jul  8 22:31:52 vps sshd[432778]: Failed password for invalid user huajun from 180.76.240.102 port 43968 ssh2
Jul  8 22:33:57 vps sshd[441605]: Invalid user molk from 180.76.240.102 port 58664
...
2020-07-09 04:39:20
134.209.107.160 attack
firewall-block, port(s): 2742/tcp
2020-07-09 04:58:16
72.17.4.190 attackbots
Unauthorized connection attempt detected from IP address 72.17.4.190 to port 9530
2020-07-09 04:45:11
218.255.148.182 attack
Unauthorized connection attempt detected from IP address 218.255.148.182 to port 445
2020-07-09 04:48:18
151.234.40.114 attack
Unauthorized connection attempt detected from IP address 151.234.40.114 to port 23
2020-07-09 04:56:53
168.232.14.38 attack
Unauthorized connection attempt detected from IP address 168.232.14.38 to port 80
2020-07-09 04:56:18
170.82.115.52 attack
Unauthorized connection attempt detected from IP address 170.82.115.52 to port 8081
2020-07-09 04:41:32
60.161.23.117 attackbots
Unauthorized connection attempt detected from IP address 60.161.23.117 to port 445
2020-07-09 04:46:05
125.129.74.248 attack
Unauthorized connection attempt detected from IP address 125.129.74.248 to port 8080
2020-07-09 04:42:14
73.131.10.88 attackspam
Unauthorized connection attempt detected from IP address 73.131.10.88 to port 23
2020-07-09 04:44:52
189.0.39.101 attack
Unauthorized connection attempt detected from IP address 189.0.39.101 to port 80
2020-07-09 04:54:21
187.64.10.193 attack
Unauthorized connection attempt detected from IP address 187.64.10.193 to port 23
2020-07-09 04:54:41
200.151.226.166 attack
Unauthorized connection attempt detected from IP address 200.151.226.166 to port 23
2020-07-09 04:51:42

Recently Reported IPs

105.19.51.42 57.56.115.57 158.83.209.21 131.225.83.215
132.246.124.30 217.227.82.215 200.75.7.34 18.210.252.88
57.70.52.233 119.27.162.23 114.125.196.32 91.60.235.47
142.58.187.100 49.210.62.241 37.39.154.75 223.104.74.19
196.226.175.248 37.1.208.164 180.71.56.200 144.107.77.152