必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Shanghai

省份(region): Shanghai

国家(country): China

运营商(isp): China Mobile

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '183.192.0.0 - 183.193.255.255'

% Abuse contact for '183.192.0.0 - 183.193.255.255' is 'idc-noc@sh.chinamobile.com'

inetnum:        183.192.0.0 - 183.193.255.255
netname:        CMNET-shanghai
descr:          China Mobile Communications Corporation - shanghai company
country:        CN
admin-c:        HL888-AP
tech-c:         HL888-AP
abuse-c:        AC2538-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-CN-CMCC-shanghai
mnt-irt:        IRT-CMCC-SHANGHAI
last-modified:  2022-01-19T13:17:26Z
source:         APNIC

irt:            IRT-CMCC-SHANGHAI
address:        200 changshou Road Shanghai
phone:          +86 13800210021
fax-no:         +86 21 62776876
e-mail:         idc-noc@sh.chinamobile.com
abuse-mailbox:  idc-noc@sh.chinamobile.com
admin-c:        HL888-AP
tech-c:         HL888-AP
auth:           # Filtered
remarks:        idc-noc@sh.chinamobile.com was validated on 2026-03-23
mnt-by:         MAINT-CN-CMCC-SHANGHAI
last-modified:  2026-03-23T09:37:47Z
source:         APNIC

role:           ABUSE CMCCSHANGHAI
country:        ZZ
address:        200 changshou Road Shanghai
phone:          +86 13800210021
e-mail:         idc-noc@sh.chinamobile.com
admin-c:        HL888-AP
tech-c:         HL888-AP
nic-hdl:        AC2538-AP
remarks:        Generated from irt object IRT-CMCC-SHANGHAI
remarks:        idc-noc@sh.chinamobile.com was validated on 2026-03-23
abuse-mailbox:  idc-noc@sh.chinamobile.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-03-23T09:38:20Z
source:         APNIC

person:         haiyan li
nic-hdl:        HL888-AP
e-mail:         idc@sh.chinamobile.com
address:        Rm.1306 No.200 Chang Shou Road,Shanghai,200060 China
phone:          +86-021-32069999-1323
fax-no:         +86-021-62776876
country:        cn
mnt-by:         MAINT-CN-CMCC-SHANGHAI
last-modified:  2009-10-11T09:51:26Z
source:         APNIC

% Information related to '183.192.0.0/11AS9808'

route:          183.192.0.0/11
descr:          China Mobile communications corporation
origin:         AS9808
mnt-by:         MAINT-CN-CMCC
last-modified:  2010-12-08T08:06:16Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 183.193.255.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65469
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;183.193.255.107.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032901 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 13:42:19 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
107.255.193.183.in-addr.arpa domain name pointer .
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
107.255.193.183.in-addr.arpa	name = .

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
23.240.188.5 attackspambots
web Attack on Website at 2020-02-05.
2020-02-06 15:09:52
5.232.252.1 attack
web Attack on Website at 2020-02-05.
2020-02-06 14:47:41
222.186.180.1 attack
SSH login attempts with user root at 2020-02-05.
2020-02-06 15:23:16
36.68.54.200 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 06-02-2020 04:55:21.
2020-02-06 15:37:51
117.6.130.78 attackspam
1580964945 - 02/06/2020 05:55:45 Host: 117.6.130.78/117.6.130.78 Port: 445 TCP Blocked
2020-02-06 14:59:07
217.20.65.1 attack
web Attack on Website at 2020-02-05.
2020-02-06 15:29:31
222.186.42.7 attackspam
Feb  6 12:23:48 areeb-Workstation sshd[31584]: Failed password for root from 222.186.42.7 port 19368 ssh2
Feb  6 12:23:52 areeb-Workstation sshd[31584]: Failed password for root from 222.186.42.7 port 19368 ssh2
...
2020-02-06 15:15:19
42.117.20.1 attackbots
web Attack on Website at 2020-02-05.
2020-02-06 14:58:07
77.42.124.36 attack
Automatic report - Port Scan Attack
2020-02-06 15:22:46
41.203.212.1 attackbots
web Attack on Website at 2020-02-05.
2020-02-06 15:00:21
117.211.200.81 attackbotsspam
1580964944 - 02/06/2020 05:55:44 Host: 117.211.200.81/117.211.200.81 Port: 445 TCP Blocked
2020-02-06 15:02:09
222.137.137.1 attackbots
web Attack on Website at 2020-02-05.
2020-02-06 15:24:41
46.245.38.2 attackbots
web Attack on Website at 2020-02-05.
2020-02-06 14:54:16
94.102.56.215 attack
94.102.56.215 was recorded 20 times by 11 hosts attempting to connect to the following ports: 41083,41047,41057. Incident counter (4h, 24h, all-time): 20, 146, 2639
2020-02-06 14:50:55
213.248.144.4 attackspambots
web Attack on Website at 2020-02-05.
2020-02-06 15:31:28

最近上报的IP列表

161.182.53.232 155.242.138.216 142.100.121.6 126.40.250.142
10.39.15.11 10.234.26.137 10.227.23.12 10.192.3.217
10.10.51.174 2606:4700:10::6814:9987 2606:4700:10::6814:8482 2606:4700:10::6814:4646
2606:4700:10::6816:4373 14.207.194.104 2606:4700:10::6814:6528 2606:4700:10::6814:8645
164.155.74.59 2606:4700:10::6816:501 122.192.203.58 210.182.22.112