城市(city): Villeurbanne
省份(region): Auvergne-Rhône-Alpes
国家(country): France
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 134.212.0.0 - 134.214.255.255
CIDR: 134.212.0.0/15, 134.214.0.0/16
NetName: RIPE-ERX-134-212-0-0
NetHandle: NET-134-212-0-0-1
Parent: NET134 (NET-134-0-0-0-0)
NetType: Early Registrations, Transferred to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2003-11-26
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/134.212.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net
OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE
ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.214.57.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21320
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.214.57.86. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 08:36:58 CST 2026
;; MSG SIZE rcvd: 106
86.57.214.134.in-addr.arpa domain name pointer laval.univ-lyon1.fr.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
86.57.214.134.in-addr.arpa name = laval.univ-lyon1.fr.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 92.84.138.131 | attack | Unauthorized connection attempt detected from IP address 92.84.138.131 to port 4567 [J] |
2020-02-23 18:08:06 |
| 63.140.93.65 | attackspambots | Unauthorized connection attempt detected from IP address 63.140.93.65 to port 23 [J] |
2020-02-23 18:10:43 |
| 79.137.72.171 | attackspam | Unauthorized connection attempt detected from IP address 79.137.72.171 to port 2220 [J] |
2020-02-23 17:38:23 |
| 14.29.140.224 | attackspambots | Unauthorized connection attempt detected from IP address 14.29.140.224 to port 8088 [J] |
2020-02-23 17:46:22 |
| 106.1.199.96 | attackbots | Unauthorized connection attempt detected from IP address 106.1.199.96 to port 23 [J] |
2020-02-23 17:32:46 |
| 173.64.104.76 | attackspam | Unauthorized connection attempt detected from IP address 173.64.104.76 to port 5555 [J] |
2020-02-23 17:58:32 |
| 187.212.28.90 | attackspambots | Unauthorized connection attempt detected from IP address 187.212.28.90 to port 88 [J] |
2020-02-23 17:55:48 |
| 192.144.132.172 | attack | Unauthorized connection attempt detected from IP address 192.144.132.172 to port 2220 [J] |
2020-02-23 17:53:19 |
| 110.35.253.47 | attackspambots | Unauthorized connection attempt detected from IP address 110.35.253.47 to port 4567 [J] |
2020-02-23 18:05:02 |
| 210.16.115.117 | attackbotsspam | Unauthorized connection attempt detected from IP address 210.16.115.117 to port 23 [J] |
2020-02-23 17:51:57 |
| 138.122.74.147 | attackspambots | Unauthorized connection attempt detected from IP address 138.122.74.147 to port 23 [J] |
2020-02-23 18:00:34 |
| 111.241.190.206 | attackbotsspam | Unauthorized connection attempt detected from IP address 111.241.190.206 to port 23 [J] |
2020-02-23 18:04:40 |
| 110.7.168.117 | attackbots | Unauthorized connection attempt detected from IP address 110.7.168.117 to port 23 [J] |
2020-02-23 18:05:19 |
| 84.255.139.179 | attackbots | Unauthorized connection attempt detected from IP address 84.255.139.179 to port 23 [J] |
2020-02-23 17:37:11 |
| 42.118.104.24 | attackspam | Unauthorized connection attempt detected from IP address 42.118.104.24 to port 23 [J] |
2020-02-23 18:13:42 |