必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Toronto

省份(region): Ontario

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       134.195.196.0 - 134.195.199.255
CIDR:           134.195.196.0/22
NetName:        GTHOST
NetHandle:      NET-134-195-196-0-1
Parent:         NET134 (NET-134-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   GLOBALTELEHOST Corp. (GC-152)
RegDate:        2020-06-26
Updated:        2025-11-18
Comment:        Geofeed https://lg-tor.gthost.com/geo-feed.csv
Ref:            https://rdap.arin.net/registry/ip/134.195.196.0


OrgName:        GLOBALTELEHOST Corp.
OrgId:          GC-152
Address:        95 Mural Street, 6th Floor
City:           Richmond Hill
StateProv:      ON
PostalCode:     L4B 3G2
Country:        CA
RegDate:        2013-02-12
Updated:        2025-12-24
Ref:            https://rdap.arin.net/registry/entity/GC-152


OrgAbuseHandle: ABUSE9420-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-855-550-1010 
OrgAbuseEmail:  abuse@globaltelehost.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9420-ARIN

OrgNOCHandle: ADMIN6532-ARIN
OrgNOCName:   Admin
OrgNOCPhone:  +1-855-550-1010 
OrgNOCEmail:  noc@globaltelehost.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ADMIN6532-ARIN

OrgTechHandle: ADMIN6532-ARIN
OrgTechName:   Admin
OrgTechPhone:  +1-855-550-1010 
OrgTechEmail:  noc@globaltelehost.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ADMIN6532-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.195.196.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9016
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.195.196.125.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020400 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 04 22:19:30 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
125.196.195.134.in-addr.arpa domain name pointer 125-196-195-134.clients.gthost.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
125.196.195.134.in-addr.arpa	name = 125-196-195-134.clients.gthost.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
121.15.140.178 attack
Oct  6 07:56:33 icinga sshd[17880]: Failed password for root from 121.15.140.178 port 42830 ssh2
...
2019-10-06 16:59:15
45.55.224.209 attackbotsspam
$f2bV_matches
2019-10-06 17:10:24
134.175.241.163 attackspam
Oct  6 09:59:52 MK-Soft-VM6 sshd[11085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.241.163 
Oct  6 09:59:53 MK-Soft-VM6 sshd[11085]: Failed password for invalid user Motdepasse12# from 134.175.241.163 port 32184 ssh2
...
2019-10-06 17:05:50
189.46.77.102 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-10-06 16:56:42
95.111.59.210 attack
Oct  6 08:38:27 ns3110291 sshd\[21552\]: Invalid user pi from 95.111.59.210
Oct  6 08:38:27 ns3110291 sshd\[21553\]: Invalid user pi from 95.111.59.210
Oct  6 08:38:27 ns3110291 sshd\[21552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.111.59.210 
Oct  6 08:38:27 ns3110291 sshd\[21553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.111.59.210 
Oct  6 08:38:29 ns3110291 sshd\[21552\]: Failed password for invalid user pi from 95.111.59.210 port 57270 ssh2
...
2019-10-06 16:54:24
122.15.82.83 attack
Oct  6 11:02:59 legacy sshd[8391]: Failed password for root from 122.15.82.83 port 53418 ssh2
Oct  6 11:07:52 legacy sshd[8540]: Failed password for root from 122.15.82.83 port 35008 ssh2
...
2019-10-06 17:13:35
118.89.35.168 attack
Oct  6 08:32:26 lnxded64 sshd[4965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.35.168
2019-10-06 16:51:19
213.194.170.5 attackbots
Repeated brute force against a port
2019-10-06 16:42:55
185.175.93.78 attackspam
10/06/2019-03:48:33.565271 185.175.93.78 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-06 16:41:18
159.65.30.66 attackspambots
Oct  6 07:45:48 mail sshd\[1698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.30.66  user=root
Oct  6 07:45:50 mail sshd\[1698\]: Failed password for root from 159.65.30.66 port 42126 ssh2
Oct  6 08:00:32 mail sshd\[2666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.30.66  user=root
2019-10-06 17:06:51
122.143.37.218 attack
Unauthorised access (Oct  6) SRC=122.143.37.218 LEN=40 TTL=49 ID=6977 TCP DPT=8080 WINDOW=16314 SYN
2019-10-06 16:48:39
103.40.235.215 attackspam
Oct  5 21:26:45 web9 sshd\[17553\]: Invalid user Aero2017 from 103.40.235.215
Oct  5 21:26:45 web9 sshd\[17553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.40.235.215
Oct  5 21:26:47 web9 sshd\[17553\]: Failed password for invalid user Aero2017 from 103.40.235.215 port 60907 ssh2
Oct  5 21:31:15 web9 sshd\[18330\]: Invalid user Heslo_111 from 103.40.235.215
Oct  5 21:31:15 web9 sshd\[18330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.40.235.215
2019-10-06 16:40:23
129.211.128.20 attackbots
Oct  6 07:43:20 dedicated sshd[20702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.128.20  user=root
Oct  6 07:43:22 dedicated sshd[20702]: Failed password for root from 129.211.128.20 port 38271 ssh2
2019-10-06 16:52:00
51.75.22.154 attackbots
DATE:2019-10-06 06:25:38,IP:51.75.22.154,MATCHES:10,PORT:ssh
2019-10-06 16:53:30
51.38.152.200 attackspam
Oct  6 10:22:24 MK-Soft-VM3 sshd[19537]: Failed password for root from 51.38.152.200 port 8207 ssh2
...
2019-10-06 17:00:20

最近上报的IP列表

17.241.219.4 107.158.19.79 70.39.176.172 109.87.124.239
199.45.155.65 109.160.82.77 72.11.155.223 46.191.187.107
12.233.136.191 103.217.194.20 204.252.117.113 47.92.138.117
31.134.6.192 193.56.20.182 140.235.171.199 82.147.84.31
45.145.131.181 27.158.131.108 175.178.184.98 54.152.127.68