必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): New York City

省份(region): New York

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       134.195.88.0 - 134.195.91.255
CIDR:           134.195.88.0/22
NetName:        HOSTHATCH-V4
NetHandle:      NET-134-195-88-0-1
Parent:         NET134 (NET-134-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   HostHatch, LLC (HOSTH-2)
RegDate:        2020-06-25
Updated:        2020-06-25
Ref:            https://rdap.arin.net/registry/ip/134.195.88.0


OrgName:        HostHatch, LLC
OrgId:          HOSTH-2
Address:        4830 W Kennedy Blvd
Address:        Suite 600
City:           Tampa
StateProv:      FL
PostalCode:     33609
Country:        US
RegDate:        2014-04-07
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/HOSTH-2


OrgAbuseHandle: ABUSE4663-ARIN
OrgAbuseName:   Abuse Department
OrgAbusePhone:  +1-813-688-1997 
OrgAbuseEmail:  abuse@hosthatch.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE4663-ARIN

OrgTechHandle: JOENS1-ARIN
OrgTechName:   Joensson, Emil 
OrgTechPhone:  +1-813-688-1997 
OrgTechEmail:  emil@hosthatch.com
OrgTechRef:    https://rdap.arin.net/registry/entity/JOENS1-ARIN

# end


# start

NetRange:       134.195.90.0 - 134.195.90.255
CIDR:           134.195.90.0/24
NetName:        HOSTHATCH-NY
NetHandle:      NET-134-195-90-0-1
Parent:         HOSTHATCH-V4 (NET-134-195-88-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       HostHatch LLC (C07699001)
RegDate:        2020-12-02
Updated:        2020-12-02
Ref:            https://rdap.arin.net/registry/ip/134.195.90.0


CustName:       HostHatch LLC
Address:        100 S. Ashley Drive
Address:        Suite 600
City:           Tampa
StateProv:      FL
PostalCode:     33602
Country:        US
RegDate:        2020-12-02
Updated:        2020-12-02
Ref:            https://rdap.arin.net/registry/entity/C07699001

OrgAbuseHandle: ABUSE4663-ARIN
OrgAbuseName:   Abuse Department
OrgAbusePhone:  +1-813-688-1997 
OrgAbuseEmail:  abuse@hosthatch.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE4663-ARIN

OrgTechHandle: JOENS1-ARIN
OrgTechName:   Joensson, Emil 
OrgTechPhone:  +1-813-688-1997 
OrgTechEmail:  emil@hosthatch.com
OrgTechRef:    https://rdap.arin.net/registry/entity/JOENS1-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.195.90.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23535
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.195.90.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031302 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 14 08:30:51 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 13.90.195.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.90.195.134.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
194.61.24.250 attackspambots
Dec 29 03:56:42 wbs sshd\[30341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.61.24.250  user=root
Dec 29 03:56:44 wbs sshd\[30341\]: Failed password for root from 194.61.24.250 port 28870 ssh2
Dec 29 03:56:47 wbs sshd\[30351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.61.24.250  user=root
Dec 29 03:56:49 wbs sshd\[30351\]: Failed password for root from 194.61.24.250 port 29547 ssh2
Dec 29 03:56:53 wbs sshd\[30356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.61.24.250  user=root
2019-12-29 22:07:38
159.203.197.28 attackspambots
[portscan] tcp/5357 [wsdapi]
*(RWIN=65535)(12291354)
2019-12-29 22:15:05
159.203.201.39 attack
12/29/2019-07:24:03.385117 159.203.201.39 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-29 22:29:08
178.33.12.237 attackbotsspam
Dec 29 14:01:34 ks10 sshd[928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.12.237 
Dec 29 14:01:36 ks10 sshd[928]: Failed password for invalid user deyke from 178.33.12.237 port 36197 ssh2
...
2019-12-29 22:11:42
201.249.9.50 attackbots
Scanning
2019-12-29 22:33:40
181.57.192.246 attackspam
Dec 29 15:13:14 DAAP sshd[32405]: Invalid user andr from 181.57.192.246 port 35996
Dec 29 15:13:14 DAAP sshd[32405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.57.192.246
Dec 29 15:13:14 DAAP sshd[32405]: Invalid user andr from 181.57.192.246 port 35996
Dec 29 15:13:16 DAAP sshd[32405]: Failed password for invalid user andr from 181.57.192.246 port 35996 ssh2
Dec 29 15:23:10 DAAP sshd[32544]: Invalid user nfs from 181.57.192.246 port 42020
...
2019-12-29 22:35:04
119.194.4.157 attackbots
Automatic report - Port Scan Attack
2019-12-29 22:26:43
119.29.87.183 attack
2019-12-29T08:29:34.209445shield sshd\[6991\]: Invalid user rpc from 119.29.87.183 port 54970
2019-12-29T08:29:34.213833shield sshd\[6991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.87.183
2019-12-29T08:29:35.823285shield sshd\[6991\]: Failed password for invalid user rpc from 119.29.87.183 port 54970 ssh2
2019-12-29T08:36:16.110407shield sshd\[8668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.87.183  user=root
2019-12-29T08:36:18.241617shield sshd\[8668\]: Failed password for root from 119.29.87.183 port 40302 ssh2
2019-12-29 22:29:42
186.159.115.70 attack
Esta IP ha intentado entrar en mi correo , es hack.
2019-12-29 22:13:27
223.150.154.167 attack
FTP Brute Force
2019-12-29 22:07:07
164.132.196.98 attackspam
Dec 29 00:59:25 server sshd\[5271\]: Invalid user kstroich from 164.132.196.98
Dec 29 00:59:25 server sshd\[5271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.ip-164-132-196.eu 
Dec 29 00:59:27 server sshd\[5271\]: Failed password for invalid user kstroich from 164.132.196.98 port 39201 ssh2
Dec 29 09:24:29 server sshd\[20655\]: Invalid user rpm from 164.132.196.98
Dec 29 09:24:29 server sshd\[20655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.ip-164-132-196.eu 
...
2019-12-29 22:09:08
125.128.122.221 attackbots
Telnet Server BruteForce Attack
2019-12-29 22:19:13
122.152.197.6 attackspam
2019-12-29T17:23:53.347766luisaranguren sshd[3229829]: Connection from 122.152.197.6 port 55784 on 10.10.10.6 port 22 rdomain ""
2019-12-29T17:23:55.454267luisaranguren sshd[3229829]: Invalid user esvall from 122.152.197.6 port 55784
2019-12-29T17:23:55.458396luisaranguren sshd[3229829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.197.6
2019-12-29T17:23:53.347766luisaranguren sshd[3229829]: Connection from 122.152.197.6 port 55784 on 10.10.10.6 port 22 rdomain ""
2019-12-29T17:23:55.454267luisaranguren sshd[3229829]: Invalid user esvall from 122.152.197.6 port 55784
2019-12-29T17:23:57.093995luisaranguren sshd[3229829]: Failed password for invalid user esvall from 122.152.197.6 port 55784 ssh2
...
2019-12-29 22:35:27
61.19.27.253 attack
Dec 29 13:47:51 sxvn sshd[1981902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.19.27.253
2019-12-29 22:35:59
5.9.141.8 attackbotsspam
20 attempts against mh-misbehave-ban on pluto.magehost.pro
2019-12-29 22:23:13

最近上报的IP列表

160.119.76.45 46.101.167.100 165.227.168.43 69.171.231.9
44.220.188.18 121.199.174.33 106.75.15.156 216.180.246.137
121.40.41.46 47.99.115.6 109.52.34.230 20.49.161.128
193.26.115.13 101.35.252.169 45.156.129.112 45.156.129.110
45.156.129.111 45.156.129.113 178.208.94.76 123.184.97.13