City: Shanghai
Region: Shanghai
Country: China
Internet Service Provider: China Mobile
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '117.135.0.0 - 117.135.191.255'
% Abuse contact for '117.135.0.0 - 117.135.191.255' is 'idc-noc@sh.chinamobile.com'
inetnum: 117.135.0.0 - 117.135.191.255
netname: CMNET-shanghai
descr: China Mobile Communications Corporation - shanghai company
country: CN
admin-c: HL888-AP
tech-c: HL888-AP
abuse-c: AC2538-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-CN-CMCC-shanghai
mnt-irt: IRT-CMCC-SHANGHAI
last-modified: 2022-01-19T13:17:26Z
source: APNIC
irt: IRT-CMCC-SHANGHAI
address: 200 changshou Road Shanghai
phone: +86 13800210021
fax-no: +86 21 62776876
e-mail: idc-noc@sh.chinamobile.com
abuse-mailbox: idc-noc@sh.chinamobile.com
admin-c: HL888-AP
tech-c: HL888-AP
auth: # Filtered
remarks: idc-noc@sh.chinamobile.com is invalid
mnt-by: MAINT-CN-CMCC-SHANGHAI
last-modified: 2025-09-19T18:07:54Z
source: APNIC
role: ABUSE CMCCSHANGHAI
country: ZZ
address: 200 changshou Road Shanghai
phone: +86 13800210021
e-mail: idc-noc@sh.chinamobile.com
admin-c: HL888-AP
tech-c: HL888-AP
nic-hdl: AC2538-AP
remarks: Generated from irt object IRT-CMCC-SHANGHAI
remarks: idc-noc@sh.chinamobile.com is invalid
abuse-mailbox: idc-noc@sh.chinamobile.com
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T18:08:32Z
source: APNIC
person: haiyan li
nic-hdl: HL888-AP
e-mail: idc@sh.chinamobile.com
address: Rm.1306 No.200 Chang Shou Road,Shanghai,200060 China
phone: +86-021-32069999-1323
fax-no: +86-021-62776876
country: cn
mnt-by: MAINT-CN-CMCC-SHANGHAI
last-modified: 2009-10-11T09:51:26Z
source: APNIC
% Information related to '117.128.0.0/10AS9808'
route: 117.128.0.0/10
descr: China Mobile communications corporation
origin: AS9808
mnt-by: MAINT-CN-CMCC
last-modified: 2012-02-17T08:12:26Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.135.48.177
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21442
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;117.135.48.177. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101000 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 10 18:45:22 CST 2025
;; MSG SIZE rcvd: 107
177.48.135.117.in-addr.arpa domain name pointer .
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
177.48.135.117.in-addr.arpa name = .
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
2.86.32.7 | attackbots | IP 2.86.32.7 attacked honeypot on port: 22 at 10/7/2020 7:44:37 PM |
2020-10-08 13:32:05 |
159.203.114.189 | attack | Hacking |
2020-10-08 13:16:36 |
194.5.206.145 | attack | Oct 8 07:23:15 hosting sshd[29282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.5.206.145 user=root Oct 8 07:23:17 hosting sshd[29282]: Failed password for root from 194.5.206.145 port 50812 ssh2 ... |
2020-10-08 13:30:12 |
112.85.42.47 | attack | Oct 8 06:14:16 mavik sshd[20013]: Failed password for root from 112.85.42.47 port 42478 ssh2 Oct 8 06:14:20 mavik sshd[20013]: Failed password for root from 112.85.42.47 port 42478 ssh2 Oct 8 06:14:23 mavik sshd[20013]: Failed password for root from 112.85.42.47 port 42478 ssh2 Oct 8 06:14:26 mavik sshd[20013]: Failed password for root from 112.85.42.47 port 42478 ssh2 Oct 8 06:14:29 mavik sshd[20013]: Failed password for root from 112.85.42.47 port 42478 ssh2 ... |
2020-10-08 13:34:24 |
80.251.216.109 | attackspambots | 4183:Oct 6 02:24:54 kim5 sshd[28180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.251.216.109 user=r.r 4184:Oct 6 02:24:55 kim5 sshd[28180]: Failed password for r.r from 80.251.216.109 port 55404 ssh2 4185:Oct 6 02:24:57 kim5 sshd[28180]: Received disconnect from 80.251.216.109 port 55404:11: Bye Bye [preauth] 4186:Oct 6 02:24:57 kim5 sshd[28180]: Disconnected from authenticating user r.r 80.251.216.109 port 55404 [preauth] 4225:Oct 6 02:43:45 kim5 sshd[30202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.251.216.109 user=r.r 4226:Oct 6 02:43:47 kim5 sshd[30202]: Failed password for r.r from 80.251.216.109 port 55456 ssh2 4227:Oct 6 02:43:48 kim5 sshd[30202]: Received disconnect from 80.251.216.109 port 55456:11: Bye Bye [preauth] 4228:Oct 6 02:43:48 kim5 sshd[30202]: Disconnected from authenticating user r.r 80.251.216.109 port 55456 [preauth] 4241:Oct 6 02:52:54 kim5........ ------------------------------ |
2020-10-08 13:09:34 |
106.12.71.159 | attackspam | Oct 7 22:46:48 h2829583 sshd[21228]: Failed password for root from 106.12.71.159 port 41988 ssh2 |
2020-10-08 13:05:38 |
186.216.69.151 | attackspam | $f2bV_matches |
2020-10-08 13:16:14 |
201.138.65.241 | attackbotsspam | Icarus honeypot on github |
2020-10-08 13:41:09 |
178.128.242.233 | attackspam | Automatic report - Banned IP Access |
2020-10-08 13:29:27 |
141.98.80.22 | attack | tcp port scan |
2020-10-08 13:41:46 |
24.38.150.130 | attack | Unauthorized admin access - /admin/css/datepicker.css?v=913-new-social-icons033bdff474ed2c72 |
2020-10-08 13:13:15 |
50.81.211.43 | attack | SS5,Magento Bruteforce Login Attack POST /index.php/admin/ |
2020-10-08 13:48:00 |
118.101.192.62 | attackspambots | SSH login attempts. |
2020-10-08 13:03:27 |
112.85.42.91 | attack | $f2bV_matches |
2020-10-08 13:10:20 |
37.120.198.197 | attack | 2020-10-07 23:07:11 dovecot_login authenticator failed for \(WIN-25FFVSIPLS1\) \[37.120.198.197\]: 535 Incorrect authentication data \(set_id=infoeozo\) 2020-10-07 23:07:11 H=\(WIN-25FFVSIPLS1\) \[37.120.198.197\] sender verify fail for \ |
2020-10-08 13:14:28 |