Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nanjing

Region: Jiangsu

Country: China

Internet Service Provider: China Mobile

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '112.0.0.0 - 112.63.255.255'

% Abuse contact for '112.0.0.0 - 112.63.255.255' is 'abuse@chinamobile.com'

inetnum:        112.0.0.0 - 112.63.255.255
netname:        CMNET
descr:          China Mobile Communications Corporation
descr:          Mobile Communications Network Operator in China
descr:          Internet Service Provider in China
country:        CN
org:            ORG-CMCC1-AP
admin-c:        ct74-AP
tech-c:         HL1318-AP
abuse-c:        AC1895-AP
status:         ALLOCATED PORTABLE
remarks:        service provider
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CN-CMCC
mnt-routes:     MAINT-CN-CMCC
mnt-irt:        IRT-CHINAMOBILE2-CN
last-modified:  2020-12-15T02:55:47Z
source:         APNIC

irt:            IRT-CHINAMOBILE2-CN
address:        China Mobile Communications Corporation
address:        29, Jinrong Ave., Xicheng District, Beijing, 100032
e-mail:         abuse@chinamobile.com
abuse-mailbox:  abuse@chinamobile.com
admin-c:        ct74-AP
tech-c:         CT74-AP
auth:           # Filtered
remarks:        abuse@chinamobile.com was validated on 2025-09-15
mnt-by:         MAINT-CN-CMCC
last-modified:  2025-09-15T02:19:36Z
source:         APNIC

organisation:   ORG-CMCC1-AP
org-name:       China Mobile Communications Corporation
org-type:       LIR
country:        CN
address:        29,Jinrong Ave.,
address:        Xicheng District,
phone:          +861052686688
fax-no:         +861052616187
e-mail:         hostmaster@chinamobile.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:14:58Z
source:         APNIC

role:           ABUSE CHINAMOBILE2CN
country:        ZZ
address:        China Mobile Communications Corporation
address:        29, Jinrong Ave., Xicheng District, Beijing, 100032
phone:          +000000000
e-mail:         abuse@chinamobile.com
admin-c:        ct74-AP
tech-c:         CT74-AP
nic-hdl:        AC1895-AP
remarks:        Generated from irt object IRT-CHINAMOBILE2-CN
remarks:        abuse@chinamobile.com was validated on 2025-09-15
abuse-mailbox:  abuse@chinamobile.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-15T02:20:14Z
source:         APNIC

role:           chinamobile tech
address:        29, Jinrong Ave.,Xicheng district
address:        Beijing
country:        CN
phone:          +86 5268 6688
fax-no:         +86 5261 6187
e-mail:         hostmaster@chinamobile.com
admin-c:        HL1318-AP
tech-c:         HL1318-AP
nic-hdl:        ct74-AP
notify:         hostmaster@chinamobile.com
mnt-by:         MAINT-cn-cmcc
abuse-mailbox:  abuse@chinamobile.com
last-modified:  2016-11-29T09:37:27Z
source:         APNIC

person:         haijun li
nic-hdl:        HL1318-AP
e-mail:         hostmaster@chinamobile.com
address:        29,Jinrong Ave, Xicheng district,beijing,100032
phone:          +86 1052686688
fax-no:         +86 10 52616187
country:        CN
mnt-by:         MAINT-CN-CMCC
abuse-mailbox:  abuse@chinamobile.com
last-modified:  2016-11-29T09:38:38Z
source:         APNIC

% Information related to '112.16.0.0/13AS9808'

route:          112.16.0.0/13
descr:          China Mobile communications corporation
origin:         AS9808
mnt-by:         MAINT-CN-CMCC
last-modified:  2009-10-20T06:48:13Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.21.98.87
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35444
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.21.98.87.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025092800 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 28 22:29:49 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 87.98.21.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 87.98.21.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
167.172.175.9 attackbots
2020-04-05T19:45:34.168505  sshd[20884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.175.9  user=root
2020-04-05T19:45:35.945987  sshd[20884]: Failed password for root from 167.172.175.9 port 50578 ssh2
2020-04-05T19:58:29.583918  sshd[21122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.175.9  user=root
2020-04-05T19:58:31.420648  sshd[21122]: Failed password for root from 167.172.175.9 port 39802 ssh2
...
2020-04-06 03:15:16
203.86.7.110 attack
[ssh] SSH attack
2020-04-06 03:19:08
39.117.42.31 attackbotsspam
SSH_attack
2020-04-06 03:23:33
109.12.217.42 attackspam
$f2bV_matches
2020-04-06 03:37:29
61.140.235.87 attack
2020-04-05T15:33:26.034421abusebot-4.cloudsearch.cf sshd[17515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.140.235.87  user=root
2020-04-05T15:33:28.103598abusebot-4.cloudsearch.cf sshd[17515]: Failed password for root from 61.140.235.87 port 48228 ssh2
2020-04-05T15:35:11.608166abusebot-4.cloudsearch.cf sshd[17616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.140.235.87  user=root
2020-04-05T15:35:13.757866abusebot-4.cloudsearch.cf sshd[17616]: Failed password for root from 61.140.235.87 port 41346 ssh2
2020-04-05T15:36:55.833050abusebot-4.cloudsearch.cf sshd[17769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.140.235.87  user=root
2020-04-05T15:36:57.259991abusebot-4.cloudsearch.cf sshd[17769]: Failed password for root from 61.140.235.87 port 34446 ssh2
2020-04-05T15:41:12.891520abusebot-4.cloudsearch.cf sshd[18071]: pam_unix(sshd:auth): authe
...
2020-04-06 03:42:53
89.248.160.150 attack
firewall-block, port(s): 41127/udp
2020-04-06 03:41:31
211.83.111.191 attackspambots
Apr  5 19:56:29 ns382633 sshd\[2119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.83.111.191  user=root
Apr  5 19:56:31 ns382633 sshd\[2119\]: Failed password for root from 211.83.111.191 port 31216 ssh2
Apr  5 20:10:52 ns382633 sshd\[6023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.83.111.191  user=root
Apr  5 20:10:55 ns382633 sshd\[6023\]: Failed password for root from 211.83.111.191 port 20687 ssh2
Apr  5 20:16:15 ns382633 sshd\[7526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.83.111.191  user=root
2020-04-06 03:20:15
46.101.1.131 attack
2020-04-05T18:58:45.441003Z 224d22f047ec New connection: 46.101.1.131:38243 (172.17.0.4:2222) [session: 224d22f047ec]
2020-04-05T19:00:32.996538Z c7226b9d0f83 New connection: 46.101.1.131:48242 (172.17.0.4:2222) [session: c7226b9d0f83]
2020-04-06 03:29:56
45.227.253.62 attackspam
21 attempts against mh-misbehave-ban on ice
2020-04-06 03:18:21
182.61.40.214 attack
(sshd) Failed SSH login from 182.61.40.214 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  5 19:54:25 amsweb01 sshd[10982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.40.214  user=root
Apr  5 19:54:27 amsweb01 sshd[10982]: Failed password for root from 182.61.40.214 port 52590 ssh2
Apr  5 20:00:05 amsweb01 sshd[11711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.40.214  user=root
Apr  5 20:00:07 amsweb01 sshd[11711]: Failed password for root from 182.61.40.214 port 44730 ssh2
Apr  5 20:01:04 amsweb01 sshd[12030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.40.214  user=root
2020-04-06 03:38:40
182.50.132.110 attackbotsspam
xmlrpc attack
2020-04-06 03:44:47
190.153.249.99 attackspambots
Apr  5 21:13:52 silence02 sshd[32758]: Failed password for root from 190.153.249.99 port 56267 ssh2
Apr  5 21:20:38 silence02 sshd[670]: Failed password for root from 190.153.249.99 port 41614 ssh2
2020-04-06 03:39:47
83.134.192.199 attack
SSH login attempts brute force.
2020-04-06 03:45:07
180.249.180.195 attack
1586090323 - 04/05/2020 14:38:43 Host: 180.249.180.195/180.249.180.195 Port: 445 TCP Blocked
2020-04-06 03:48:58
62.210.114.58 attack
SSH Brute-Forcing (server1)
2020-04-06 03:32:42

Recently Reported IPs

20.64.104.164 124.198.131.145 111.152.74.88 103.60.12.71
65.71.105.81 167.71.63.188 142.93.163.233 165.154.199.196
64.226.76.243 165.227.2.139 138.68.69.57 60.9.138.32
39.149.42.73 39.149.34.154 223.101.182.18 183.251.33.232
183.251.116.135 183.199.180.159 183.197.74.189 120.85.126.24