Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shanghai

Region: Shanghai

Country: China

Internet Service Provider: China Mobile

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '117.135.0.0 - 117.135.191.255'

% Abuse contact for '117.135.0.0 - 117.135.191.255' is 'idc-noc@sh.chinamobile.com'

inetnum:        117.135.0.0 - 117.135.191.255
netname:        CMNET-shanghai
descr:          China Mobile Communications Corporation - shanghai company
country:        CN
admin-c:        HL888-AP
tech-c:         HL888-AP
abuse-c:        AC2538-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-CN-CMCC-shanghai
mnt-irt:        IRT-CMCC-SHANGHAI
last-modified:  2022-01-19T13:17:26Z
source:         APNIC

irt:            IRT-CMCC-SHANGHAI
address:        200 changshou Road Shanghai
phone:          +86 13800210021
fax-no:         +86 21 62776876
e-mail:         idc-noc@sh.chinamobile.com
abuse-mailbox:  idc-noc@sh.chinamobile.com
admin-c:        HL888-AP
tech-c:         HL888-AP
auth:           # Filtered
remarks:        idc-noc@sh.chinamobile.com is invalid
mnt-by:         MAINT-CN-CMCC-SHANGHAI
last-modified:  2025-09-19T18:07:54Z
source:         APNIC

role:           ABUSE CMCCSHANGHAI
country:        ZZ
address:        200 changshou Road Shanghai
phone:          +86 13800210021
e-mail:         idc-noc@sh.chinamobile.com
admin-c:        HL888-AP
tech-c:         HL888-AP
nic-hdl:        AC2538-AP
remarks:        Generated from irt object IRT-CMCC-SHANGHAI
remarks:        idc-noc@sh.chinamobile.com is invalid
abuse-mailbox:  idc-noc@sh.chinamobile.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-19T18:08:32Z
source:         APNIC

person:         haiyan li
nic-hdl:        HL888-AP
e-mail:         idc@sh.chinamobile.com
address:        Rm.1306 No.200 Chang Shou Road,Shanghai,200060 China
phone:          +86-021-32069999-1323
fax-no:         +86-021-62776876
country:        cn
mnt-by:         MAINT-CN-CMCC-SHANGHAI
last-modified:  2009-10-11T09:51:26Z
source:         APNIC

% Information related to '117.128.0.0/10AS9808'

route:          117.128.0.0/10
descr:          China Mobile communications corporation
origin:         AS9808
mnt-by:         MAINT-CN-CMCC
last-modified:  2012-02-17T08:12:26Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.135.48.177
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21442
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.135.48.177.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025101000 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 10 18:45:22 CST 2025
;; MSG SIZE  rcvd: 107
Host info
177.48.135.117.in-addr.arpa domain name pointer .
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
177.48.135.117.in-addr.arpa	name = .

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
2.86.32.7 attackbots
IP 2.86.32.7 attacked honeypot on port: 22 at 10/7/2020 7:44:37 PM
2020-10-08 13:32:05
159.203.114.189 attack
Hacking
2020-10-08 13:16:36
194.5.206.145 attack
Oct  8 07:23:15 hosting sshd[29282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.5.206.145  user=root
Oct  8 07:23:17 hosting sshd[29282]: Failed password for root from 194.5.206.145 port 50812 ssh2
...
2020-10-08 13:30:12
112.85.42.47 attack
Oct  8 06:14:16 mavik sshd[20013]: Failed password for root from 112.85.42.47 port 42478 ssh2
Oct  8 06:14:20 mavik sshd[20013]: Failed password for root from 112.85.42.47 port 42478 ssh2
Oct  8 06:14:23 mavik sshd[20013]: Failed password for root from 112.85.42.47 port 42478 ssh2
Oct  8 06:14:26 mavik sshd[20013]: Failed password for root from 112.85.42.47 port 42478 ssh2
Oct  8 06:14:29 mavik sshd[20013]: Failed password for root from 112.85.42.47 port 42478 ssh2
...
2020-10-08 13:34:24
80.251.216.109 attackspambots
4183:Oct  6 02:24:54 kim5 sshd[28180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.251.216.109  user=r.r
4184:Oct  6 02:24:55 kim5 sshd[28180]: Failed password for r.r from 80.251.216.109 port 55404 ssh2
4185:Oct  6 02:24:57 kim5 sshd[28180]: Received disconnect from 80.251.216.109 port 55404:11: Bye Bye [preauth]
4186:Oct  6 02:24:57 kim5 sshd[28180]: Disconnected from authenticating user r.r 80.251.216.109 port 55404 [preauth]
4225:Oct  6 02:43:45 kim5 sshd[30202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.251.216.109  user=r.r
4226:Oct  6 02:43:47 kim5 sshd[30202]: Failed password for r.r from 80.251.216.109 port 55456 ssh2
4227:Oct  6 02:43:48 kim5 sshd[30202]: Received disconnect from 80.251.216.109 port 55456:11: Bye Bye [preauth]
4228:Oct  6 02:43:48 kim5 sshd[30202]: Disconnected from authenticating user r.r 80.251.216.109 port 55456 [preauth]
4241:Oct  6 02:52:54 kim5........
------------------------------
2020-10-08 13:09:34
106.12.71.159 attackspam
Oct  7 22:46:48 h2829583 sshd[21228]: Failed password for root from 106.12.71.159 port 41988 ssh2
2020-10-08 13:05:38
186.216.69.151 attackspam
$f2bV_matches
2020-10-08 13:16:14
201.138.65.241 attackbotsspam
Icarus honeypot on github
2020-10-08 13:41:09
178.128.242.233 attackspam
Automatic report - Banned IP Access
2020-10-08 13:29:27
141.98.80.22 attack
tcp port scan
2020-10-08 13:41:46
24.38.150.130 attack
Unauthorized admin access - /admin/css/datepicker.css?v=913-new-social-icons033bdff474ed2c72
2020-10-08 13:13:15
50.81.211.43 attack
SS5,Magento Bruteforce Login Attack POST /index.php/admin/
2020-10-08 13:48:00
118.101.192.62 attackspambots
SSH login attempts.
2020-10-08 13:03:27
112.85.42.91 attack
$f2bV_matches
2020-10-08 13:10:20
37.120.198.197 attack
2020-10-07 23:07:11 dovecot_login authenticator failed for \(WIN-25FFVSIPLS1\) \[37.120.198.197\]: 535 Incorrect authentication data \(set_id=infoeozo\)
2020-10-07 23:07:11 H=\(WIN-25FFVSIPLS1\) \[37.120.198.197\] sender verify fail for \: Unrouteable address
2020-10-07 23:07:11 H=\(WIN-25FFVSIPLS1\) \[37.120.198.197\] F=\ rejected RCPT \: Sender verify failed
2020-10-07 23:07:23 dovecot_login authenticator failed for \(WIN-25FFVSIPLS1\) \[37.120.198.197\]: 535 Incorrect authentication data \(set_id=info\)
2020-10-07 23:07:23 H=\(WIN-25FFVSIPLS1\) \[37.120.198.197\] F=\ rejected RCPT \: relay not permitted
2020-10-08 13:14:28

Recently Reported IPs

103.105.208.136 14.212.70.3 8.138.152.0 34.22.151.143
66.131.120.255 106.119.57.69 195.175.254.2 167.94.138.161
180.153.197.104 20.169.108.13 206.42.225.250 58.212.237.216
124.31.104.181 159.0.75.209 159.0.75.81 159.0.75.76
43.199.229.129 54.83.151.136 52.72.114.140 42.236.17.214