Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: China Telecom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.198.48.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 900
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.198.48.27.			IN	A

;; AUTHORITY SECTION:
.			402	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023090600 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 06 18:21:28 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 27.48.198.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 27.48.198.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.208.184.72 attack
Unauthorized connection attempt detected from IP address 91.208.184.72 to port 8088 [T]
2020-01-14 02:25:18
196.203.31.154 attackbots
Jan 13 19:13:32 MK-Soft-Root1 sshd[26358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.203.31.154 
Jan 13 19:13:33 MK-Soft-Root1 sshd[26358]: Failed password for invalid user postgres from 196.203.31.154 port 35336 ssh2
...
2020-01-14 02:29:48
61.147.103.168 attack
Unifi Ubiquiti threat management alert:

Attempted Administrator Privilege Gain. Signature ET EXPLOIT MVPower DVR Shell UCE. From: 61.147.103.168:1342, to: [mycloudkey]:8443, protocol: TCP
2020-01-14 02:45:55
189.112.68.193 attackbots
Honeypot attack, port: 445, PTR: 189-112-068-193.static.ctbctelecom.com.br.
2020-01-14 02:32:04
49.235.79.183 attackbotsspam
Jan 13 19:39:13 sxvn sshd[2070752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.79.183
2020-01-14 02:48:11
122.224.131.116 attackbots
Jan 13 18:24:04 vps58358 sshd\[8110\]: Invalid user usuario from 122.224.131.116Jan 13 18:24:06 vps58358 sshd\[8110\]: Failed password for invalid user usuario from 122.224.131.116 port 39226 ssh2Jan 13 18:27:45 vps58358 sshd\[8144\]: Invalid user testuser from 122.224.131.116Jan 13 18:27:48 vps58358 sshd\[8144\]: Failed password for invalid user testuser from 122.224.131.116 port 39486 ssh2Jan 13 18:31:16 vps58358 sshd\[8181\]: Invalid user sn from 122.224.131.116Jan 13 18:31:18 vps58358 sshd\[8181\]: Failed password for invalid user sn from 122.224.131.116 port 39746 ssh2
...
2020-01-14 02:24:43
83.97.20.200 attackspam
01/13/2020-19:44:55.263849 83.97.20.200 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-14 02:51:00
83.103.98.211 attackspambots
Unauthorized connection attempt detected from IP address 83.103.98.211 to port 22
2020-01-14 02:44:39
78.88.201.164 attackbots
Unauthorized connection attempt detected from IP address 78.88.201.164 to port 5555 [J]
2020-01-14 02:22:44
124.165.247.133 attackspambots
Jan 13 14:04:44 vpn01 sshd[21508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.165.247.133
Jan 13 14:04:46 vpn01 sshd[21508]: Failed password for invalid user aiden from 124.165.247.133 port 50068 ssh2
...
2020-01-14 02:28:45
117.3.70.255 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-14 02:33:33
46.130.54.111 attackbots
Unauthorized connection attempt detected from IP address 46.130.54.111 to port 1433 [J]
2020-01-14 02:37:39
123.207.167.185 attackbotsspam
Unauthorized connection attempt detected from IP address 123.207.167.185 to port 2220 [J]
2020-01-14 02:20:05
188.167.179.182 attack
3389BruteforceFW23
2020-01-14 02:55:35
202.166.164.126 attackspam
Honeypot attack, port: 445, PTR: 202-166-164-126.connectel.com.pk.
2020-01-14 02:47:26

Recently Reported IPs

104.28.221.149 185.225.28.7 103.157.49.40 43.133.44.4
95.214.24.246 213.55.96.77 213.55.96.17 213.55.96.177
206.248.22.246 45.67.229.111 187.147.85.44 13.233.173.91
204.36.99.192 238.70.147.73 42.12.191.73 226.107.54.105
172.81.61.208 172.81.61.161 80.81.73.71 85.105.233.65