必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       134.195.43.0 - 134.195.43.255
CIDR:           134.195.43.0/24
NetName:        NCDS-NET2
NetHandle:      NET-134-195-43-0-1
Parent:         NET134 (NET-134-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   NCDS CANADA (NC-717)
RegDate:        2020-06-25
Updated:        2020-06-25
Ref:            https://rdap.arin.net/registry/ip/134.195.43.0


OrgName:        NCDS CANADA
OrgId:          NC-717
Address:        440 Laurier Ave., W., Suite 200
City:           Ottawa
StateProv:      ON
PostalCode:     K1R 7X6
Country:        CA
RegDate:        2018-03-15
Updated:        2025-08-21
Ref:            https://rdap.arin.net/registry/entity/NC-717


OrgRoutingHandle: IST36-ARIN
OrgRoutingName:   IPXO Support Team
OrgRoutingPhone:  +1 (650) 564-3425  
OrgRoutingEmail:  support@ipxo.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/IST36-ARIN

OrgAbuseHandle: PENNE65-ARIN
OrgAbuseName:   Penney, Jay 
OrgAbusePhone:  +1-613-703-3133 
OrgAbuseEmail:  jpenney@ncds.ca
OrgAbuseRef:    https://rdap.arin.net/registry/entity/PENNE65-ARIN

OrgTechHandle: PENNE65-ARIN
OrgTechName:   Penney, Jay 
OrgTechPhone:  +1-613-703-3133 
OrgTechEmail:  jpenney@ncds.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/PENNE65-ARIN

OrgNOCHandle: PENNE65-ARIN
OrgNOCName:   Penney, Jay 
OrgNOCPhone:  +1-613-703-3133 
OrgNOCEmail:  jpenney@ncds.ca
OrgNOCRef:    https://rdap.arin.net/registry/entity/PENNE65-ARIN

OrgRoutingHandle: PENNE65-ARIN
OrgRoutingName:   Penney, Jay 
OrgRoutingPhone:  +1-613-703-3133 
OrgRoutingEmail:  jpenney@ncds.ca
OrgRoutingRef:    https://rdap.arin.net/registry/entity/PENNE65-ARIN

# end


# start

NetRange:       134.195.43.0 - 134.195.43.255
CIDR:           134.195.43.0/24
NetName:        IP-NET
NetHandle:      NET-134-195-43-0-2
Parent:         NCDS-NET2 (NET-134-195-43-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   IPXO LLC (IL-845)
RegDate:        2024-01-19
Updated:        2024-01-19
Ref:            https://rdap.arin.net/registry/ip/134.195.43.0


OrgName:        IPXO LLC
OrgId:          IL-845
Address:        3132 State Street
City:           Dallas
StateProv:      TX
PostalCode:     75204-3500
Country:        US
RegDate:        2021-03-25
Updated:        2025-09-10
Comment:        Geofeed https://geofeed.ipxo.com/geofeed.txt
Ref:            https://rdap.arin.net/registry/entity/IL-845


OrgAbuseHandle: IAMT1-ARIN
OrgAbuseName:   IPXO Abuse Management Team
OrgAbusePhone:  +1 (650) 934-1667 
OrgAbuseEmail:  abuse@ipxo.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IAMT1-ARIN

OrgDNSHandle: IST36-ARIN
OrgDNSName:   IPXO Support Team
OrgDNSPhone:  +1 (650) 564-3425  
OrgDNSEmail:  support@ipxo.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/IST36-ARIN

OrgTechHandle: IST36-ARIN
OrgTechName:   IPXO Support Team
OrgTechPhone:  +1 (650) 564-3425  
OrgTechEmail:  support@ipxo.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IST36-ARIN

# end


# start

NetRange:       134.195.43.0 - 134.195.43.255
CIDR:           134.195.43.0/24
NetName:        NETUTILS
NetHandle:      NET-134-195-43-0-3
Parent:         IP-NET (NET-134-195-43-0-2)
NetType:        Reallocated
OriginAS:       
Organization:   Internet Utilities NA LLC (DCL-577)
RegDate:        2025-01-07
Updated:        2025-01-07
Ref:            https://rdap.arin.net/registry/ip/134.195.43.0



OrgName:        Internet Utilities NA LLC
OrgId:          DCL-577
Address:        2711 Centerville Road
City:           Wilmington
StateProv:      DE
PostalCode:     19808
Country:        US
RegDate:        2015-11-18
Updated:        2024-08-23
Ref:            https://rdap.arin.net/registry/entity/DCL-577


OrgTechHandle: IUS-ARIN
OrgTechName:   Internet Utilities Support
OrgTechPhone:  +1-650-564-3425 
OrgTechEmail:  support@netutils.io
OrgTechRef:    https://rdap.arin.net/registry/entity/IUS-ARIN

OrgAbuseHandle: IUA-ARIN
OrgAbuseName:   Internet Utilities Abuse
OrgAbusePhone:  +1-650-934-1667 
OrgAbuseEmail:  report@abuseradar.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IUA-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.195.43.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50463
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.195.43.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040501 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 06 03:03:34 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 13.43.195.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.43.195.134.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.79.155.52 attackbots
Unauthorized connection attempt from IP address 190.79.155.52 on Port 445(SMB)
2020-08-24 09:24:19
188.166.211.194 attackbotsspam
Aug 23 21:10:17 vps46666688 sshd[21993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.211.194
Aug 23 21:10:18 vps46666688 sshd[21993]: Failed password for invalid user b2 from 188.166.211.194 port 52383 ssh2
...
2020-08-24 08:54:58
45.248.71.169 attackspambots
2020-08-23T21:27:34.519281abusebot-5.cloudsearch.cf sshd[7451]: Invalid user sysgames from 45.248.71.169 port 40932
2020-08-23T21:27:34.526099abusebot-5.cloudsearch.cf sshd[7451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.71.169
2020-08-23T21:27:34.519281abusebot-5.cloudsearch.cf sshd[7451]: Invalid user sysgames from 45.248.71.169 port 40932
2020-08-23T21:27:36.369967abusebot-5.cloudsearch.cf sshd[7451]: Failed password for invalid user sysgames from 45.248.71.169 port 40932 ssh2
2020-08-23T21:33:33.771261abusebot-5.cloudsearch.cf sshd[7506]: Invalid user admin from 45.248.71.169 port 48346
2020-08-23T21:33:33.778071abusebot-5.cloudsearch.cf sshd[7506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.71.169
2020-08-23T21:33:33.771261abusebot-5.cloudsearch.cf sshd[7506]: Invalid user admin from 45.248.71.169 port 48346
2020-08-23T21:33:36.239081abusebot-5.cloudsearch.cf sshd[7506]: Faile
...
2020-08-24 09:15:58
222.186.173.142 attackspam
Aug 24 02:59:43 santamaria sshd\[7461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Aug 24 02:59:45 santamaria sshd\[7461\]: Failed password for root from 222.186.173.142 port 36028 ssh2
Aug 24 02:59:49 santamaria sshd\[7461\]: Failed password for root from 222.186.173.142 port 36028 ssh2
...
2020-08-24 09:01:14
118.89.108.37 attackspam
Aug 24 02:41:59 vps647732 sshd[8688]: Failed password for root from 118.89.108.37 port 59630 ssh2
Aug 24 02:45:40 vps647732 sshd[8778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.108.37
...
2020-08-24 09:03:24
142.93.246.42 attack
'Fail2Ban'
2020-08-24 09:25:39
211.157.179.38 attack
Brute-force attempt banned
2020-08-24 09:01:34
186.206.129.189 attack
Aug 24 00:00:55 eventyay sshd[24964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.129.189
Aug 24 00:00:58 eventyay sshd[24964]: Failed password for invalid user kyh from 186.206.129.189 port 37286 ssh2
Aug 24 00:06:11 eventyay sshd[25207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.129.189
...
2020-08-24 09:06:51
31.146.41.199 attackspambots
Unauthorized connection attempt from IP address 31.146.41.199 on Port 445(SMB)
2020-08-24 09:01:50
186.229.16.220 attackbots
1598214700 - 08/23/2020 22:31:40 Host: 186.229.16.220/186.229.16.220 Port: 445 TCP Blocked
2020-08-24 08:52:48
112.64.32.118 attack
Aug 23 21:04:36 XXX sshd[34563]: Invalid user test from 112.64.32.118 port 60866
2020-08-24 08:56:47
150.109.52.213 attackbots
Aug 24 07:38:20 webhost01 sshd[10956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.52.213
Aug 24 07:38:23 webhost01 sshd[10956]: Failed password for invalid user jesse from 150.109.52.213 port 57682 ssh2
...
2020-08-24 09:10:39
77.104.102.230 attack
Unauthorized connection attempt from IP address 77.104.102.230 on Port 445(SMB)
2020-08-24 08:58:35
91.134.185.81 attackspam
Automatic report - Banned IP Access
2020-08-24 09:18:42
167.114.86.47 attackspambots
Auto Fail2Ban report, multiple SSH login attempts.
2020-08-24 09:22:26

最近上报的IP列表

2606:4700:10::6816:2410 235.109.20.87 216.118.251.170 164.92.103.98
124.165.80.232 69.3.141.153 192.6.246.43 134.59.154.3
2606:4700:10::6814:7577 2606:4700:10::6814:8984 2606:4700:10::6814:8753 2606:4700:10::6816:2281
2606:4700:10::6814:8707 2606:4700:10::ac43:2788 4.5.179.181 87.251.64.73
3.80.27.62 34.238.240.3 211.49.227.234 2606:4700:10::6814:4922