Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shanghai

Region: Shanghai

Country: China

Internet Service Provider: China Mobile

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '183.192.0.0 - 183.193.255.255'

% Abuse contact for '183.192.0.0 - 183.193.255.255' is 'idc-noc@sh.chinamobile.com'

inetnum:        183.192.0.0 - 183.193.255.255
netname:        CMNET-shanghai
descr:          China Mobile Communications Corporation - shanghai company
country:        CN
admin-c:        HL888-AP
tech-c:         HL888-AP
abuse-c:        AC2538-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-CN-CMCC-shanghai
mnt-irt:        IRT-CMCC-SHANGHAI
last-modified:  2022-01-19T13:17:26Z
source:         APNIC

irt:            IRT-CMCC-SHANGHAI
address:        200 changshou Road Shanghai
phone:          +86 13800210021
fax-no:         +86 21 62776876
e-mail:         idc-noc@sh.chinamobile.com
abuse-mailbox:  idc-noc@sh.chinamobile.com
admin-c:        HL888-AP
tech-c:         HL888-AP
auth:           # Filtered
remarks:        idc-noc@sh.chinamobile.com was validated on 2026-03-23
mnt-by:         MAINT-CN-CMCC-SHANGHAI
last-modified:  2026-03-23T09:37:47Z
source:         APNIC

role:           ABUSE CMCCSHANGHAI
country:        ZZ
address:        200 changshou Road Shanghai
phone:          +86 13800210021
e-mail:         idc-noc@sh.chinamobile.com
admin-c:        HL888-AP
tech-c:         HL888-AP
nic-hdl:        AC2538-AP
remarks:        Generated from irt object IRT-CMCC-SHANGHAI
remarks:        idc-noc@sh.chinamobile.com was validated on 2026-03-23
abuse-mailbox:  idc-noc@sh.chinamobile.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-03-23T09:38:20Z
source:         APNIC

person:         haiyan li
nic-hdl:        HL888-AP
e-mail:         idc@sh.chinamobile.com
address:        Rm.1306 No.200 Chang Shou Road,Shanghai,200060 China
phone:          +86-021-32069999-1323
fax-no:         +86-021-62776876
country:        cn
mnt-by:         MAINT-CN-CMCC-SHANGHAI
last-modified:  2009-10-11T09:51:26Z
source:         APNIC

% Information related to '183.192.0.0/11AS9808'

route:          183.192.0.0/11
descr:          China Mobile communications corporation
origin:         AS9808
mnt-by:         MAINT-CN-CMCC
last-modified:  2010-12-08T08:06:16Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 183.193.255.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65469
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;183.193.255.107.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032901 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 13:42:19 CST 2026
;; MSG SIZE  rcvd: 108
Host info
107.255.193.183.in-addr.arpa domain name pointer .
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
107.255.193.183.in-addr.arpa	name = .

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.233.195.154 attackbots
SSH login attempts.
2020-06-06 15:50:20
185.175.93.37 attackbotsspam
 TCP (SYN) 185.175.93.37:57796 -> port 9999, len 40
2020-06-06 15:43:23
79.147.25.174 attackspambots
Unauthorized connection attempt detected from IP address 79.147.25.174 to port 22
2020-06-06 16:12:51
74.124.24.114 attackbots
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-06-06 15:56:58
99.31.169.37 attack
[MK-VM6] Blocked by UFW
2020-06-06 16:12:28
185.156.73.65 attackspam
06/06/2020-01:22:20.616164 185.156.73.65 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-06 15:54:51
140.143.243.27 attackspambots
Jun  6 07:24:12 [host] sshd[25695]: pam_unix(sshd:
Jun  6 07:24:14 [host] sshd[25695]: Failed passwor
Jun  6 07:28:08 [host] sshd[25891]: pam_unix(sshd:
2020-06-06 15:45:16
177.73.68.190 attackspam
Jun  6 06:37:56 localhost sshd[82700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.73.68.190  user=root
Jun  6 06:37:59 localhost sshd[82700]: Failed password for root from 177.73.68.190 port 51108 ssh2
Jun  6 06:41:51 localhost sshd[83110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.73.68.190  user=root
Jun  6 06:41:53 localhost sshd[83110]: Failed password for root from 177.73.68.190 port 51018 ssh2
Jun  6 06:45:37 localhost sshd[83510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.73.68.190  user=root
Jun  6 06:45:39 localhost sshd[83510]: Failed password for root from 177.73.68.190 port 54182 ssh2
...
2020-06-06 15:51:51
183.136.225.45 attackspam
Jun  6 10:47:10 debian kernel: [332190.828519] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=183.136.225.45 DST=89.252.131.35 LEN=44 TOS=0x00 PREC=0x00 TTL=110 ID=41080 PROTO=TCP SPT=62613 DPT=8009 WINDOW=29200 RES=0x00 SYN URGP=0
2020-06-06 16:09:24
150.109.150.77 attack
Jun  6 07:46:28 mail sshd[6463]: Failed password for root from 150.109.150.77 port 39644 ssh2
Jun  6 07:54:40 mail sshd[7379]: Failed password for root from 150.109.150.77 port 34410 ssh2
Jun  6 07:58:16 mail sshd[7854]: Failed password for root from 150.109.150.77 port 38732 ssh2
...
2020-06-06 15:56:01
51.77.212.235 attackspam
Jun  6 08:22:02 sso sshd[4184]: Failed password for root from 51.77.212.235 port 49740 ssh2
...
2020-06-06 16:16:02
165.22.186.178 attack
Jun  6 01:28:48 mail sshd\[37938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.186.178  user=root
...
2020-06-06 15:54:01
185.153.196.126 attackbots
 TCP (SYN) 185.153.196.126:59218 -> port 3389, len 44
2020-06-06 16:04:37
54.37.154.248 attackbots
Jun  6 06:10:38 server sshd[32700]: Failed password for root from 54.37.154.248 port 44156 ssh2
Jun  6 06:14:07 server sshd[445]: Failed password for root from 54.37.154.248 port 47710 ssh2
...
2020-06-06 15:39:57
37.49.226.249 attack
honeypot 22 port
2020-06-06 15:57:24

Recently Reported IPs

161.182.53.232 155.242.138.216 142.100.121.6 126.40.250.142
10.39.15.11 10.234.26.137 10.227.23.12 10.192.3.217
10.10.51.174 2606:4700:10::6814:9987 2606:4700:10::6814:8482 2606:4700:10::6814:4646
2606:4700:10::6816:4373 14.207.194.104 2606:4700:10::6814:6528 2606:4700:10::6814:8645
164.155.74.59 2606:4700:10::6816:501 122.192.203.58 210.182.22.112