Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.47.27.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51323
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.47.27.4.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 10:10:27 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 4.27.47.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 4.27.47.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.82.70.239 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 76 - port: 7588 proto: TCP cat: Misc Attack
2019-11-25 04:39:17
51.38.42.39 attackspambots
51.38.42.39 - - \[24/Nov/2019:14:46:41 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
51.38.42.39 - - \[24/Nov/2019:14:46:42 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-25 04:44:58
222.127.53.107 attack
Nov 24 05:31:38 hanapaa sshd\[4668\]: Invalid user shell from 222.127.53.107
Nov 24 05:31:38 hanapaa sshd\[4668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.127.53.107
Nov 24 05:31:40 hanapaa sshd\[4668\]: Failed password for invalid user shell from 222.127.53.107 port 49852 ssh2
Nov 24 05:40:50 hanapaa sshd\[5478\]: Invalid user admin from 222.127.53.107
Nov 24 05:40:50 hanapaa sshd\[5478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.127.53.107
2019-11-25 05:03:15
194.51.211.89 attackspam
Unauthorized connection attempt from IP address 194.51.211.89 on Port 445(SMB)
2019-11-25 04:58:54
193.200.241.132 attackspam
Nov 24 17:22:24 mc1 kernel: \[5898781.778466\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=193.200.241.132 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=11225 PROTO=TCP SPT=61000 DPT=80 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 24 17:22:27 mc1 kernel: \[5898784.818794\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=193.200.241.132 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=11225 PROTO=TCP SPT=61000 DPT=80 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 24 17:22:30 mc1 kernel: \[5898787.921369\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=193.200.241.132 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=11225 PROTO=TCP SPT=61000 DPT=80 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-25 04:45:37
112.161.203.170 attackbots
Automatic report - Banned IP Access
2019-11-25 04:45:57
51.254.204.190 attack
3x Failed Password
2019-11-25 04:40:19
120.132.103.70 attack
REQUESTED PAGE: /TP/public/index.php
2019-11-25 05:15:03
43.247.4.52 attackbots
Lines containing failures of 43.247.4.52
Nov 24 07:36:34 shared09 sshd[15556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.247.4.52  user=r.r
Nov 24 07:36:36 shared09 sshd[15556]: Failed password for r.r from 43.247.4.52 port 2773 ssh2
Nov 24 07:36:36 shared09 sshd[15556]: Received disconnect from 43.247.4.52 port 2773:11: Bye Bye [preauth]
Nov 24 07:36:36 shared09 sshd[15556]: Disconnected from authenticating user r.r 43.247.4.52 port 2773 [preauth]
Nov 24 08:08:07 shared09 sshd[24775]: Connection closed by 43.247.4.52 port 2774 [preauth]
Nov 24 08:32:59 shared09 sshd[32301]: Invalid user costin from 43.247.4.52 port 2776
Nov 24 08:32:59 shared09 sshd[32301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.247.4.52
Nov 24 08:33:01 shared09 sshd[32301]: Failed password for invalid user costin from 43.247.4.52 port 2776 ssh2
Nov 24 08:33:01 shared09 sshd[32301]: Received disconnect f........
------------------------------
2019-11-25 05:16:53
111.53.204.218 attackbots
111.53.204.218 was recorded 262 times by 34 hosts attempting to connect to the following ports: 2376,2377,4243,2375. Incident counter (4h, 24h, all-time): 262, 1840, 2535
2019-11-25 04:47:10
113.108.151.253 attackspambots
Nov 24 21:10:06 jane sshd[14411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.108.151.253 
Nov 24 21:10:08 jane sshd[14411]: Failed password for invalid user mysql from 113.108.151.253 port 49630 ssh2
...
2019-11-25 05:01:28
212.92.97.23 attackbotsspam
Unauthorized connection attempt from IP address 212.92.97.23 on Port 445(SMB)
2019-11-25 05:10:33
99.244.195.58 attackspambots
$f2bV_matches
2019-11-25 04:49:37
103.45.177.87 attackbots
11/24/2019-13:50:00.034181 103.45.177.87 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-25 04:42:46
36.84.218.195 attack
Unauthorized connection attempt from IP address 36.84.218.195 on Port 445(SMB)
2019-11-25 05:04:37

Recently Reported IPs

231.123.237.81 61.208.139.213 7.226.175.113 144.72.38.210
138.132.41.106 180.103.173.199 222.205.144.45 221.8.165.44
200.235.221.117 196.122.138.150 69.121.180.64 228.182.158.167
225.5.112.223 168.185.208.197 117.84.126.49 147.52.4.82
92.155.183.254 66.44.5.17 164.114.243.129 41.163.131.207