必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Sanaa

省份(region): Amanat Al Asimah

国家(country): Yemen

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       134.35.0.0 - 134.35.255.255
CIDR:           134.35.0.0/16
NetName:        RIPE
NetHandle:      NET-134-35-0-0-1
Parent:         NET134 (NET-134-0-0-0-0)
NetType:        Early Registrations, Transferred to RIPE NCC
OriginAS:       
Organization:   RIPE Network Coordination Centre (RIPE)
RegDate:        2016-03-09
Updated:        2025-02-10
Comment:        These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref:            https://rdap.arin.net/registry/ip/134.35.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.ripe.net


OrgName:        RIPE Network Coordination Centre
OrgId:          RIPE
Address:        P.O. Box 10096
City:           Amsterdam
StateProv:      
PostalCode:     1001EB
Country:        NL
RegDate:        
Updated:        2013-07-29
Ref:            https://rdap.arin.net/registry/entity/RIPE

ReferralServer:  whois.ripe.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName:   Abuse Contact
OrgAbusePhone:  +31205354444 
OrgAbuseEmail:  abuse@ripe.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

OrgTechHandle: RNO29-ARIN
OrgTechName:   RIPE NCC Operations
OrgTechPhone:  +31 20 535 4444 
OrgTechEmail:  hostmaster@ripe.net
OrgTechRef:    https://rdap.arin.net/registry/entity/RNO29-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.35.157.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42592
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.35.157.100.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041901 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 20 06:07:27 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 100.157.35.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 100.157.35.134.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
5.188.153.248 attackspambots
Unauthorized connection attempt from IP address 5.188.153.248 on Port 445(SMB)
2020-03-28 08:38:19
140.82.30.170 attackbots
$f2bV_matches
2020-03-28 08:40:30
183.56.199.51 attackbots
Scanned 3 times in the last 24 hours on port 22
2020-03-28 08:17:44
104.248.237.238 attack
Invalid user delma from 104.248.237.238 port 50354
2020-03-28 08:30:50
168.197.31.14 attackbots
Mar 28 00:02:49 vps647732 sshd[5079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.197.31.14
Mar 28 00:02:51 vps647732 sshd[5079]: Failed password for invalid user vwy from 168.197.31.14 port 36922 ssh2
...
2020-03-28 08:42:12
89.3.212.129 attackbotsspam
Invalid user pisica from 89.3.212.129 port 36178
2020-03-28 08:31:36
49.88.112.113 attackbots
March 28 2020, 00:31:47 [sshd] - Banned from the Cipher Host hosting platform by Fail2ban.
2020-03-28 08:38:45
122.116.201.171 attack
400 BAD REQUEST
2020-03-28 08:47:04
110.164.189.53 attack
Mar 27 23:59:44 legacy sshd[3073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.164.189.53
Mar 27 23:59:46 legacy sshd[3073]: Failed password for invalid user trial from 110.164.189.53 port 50434 ssh2
Mar 28 00:04:25 legacy sshd[3125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.164.189.53
...
2020-03-28 08:33:53
58.53.146.36 attackspam
WordPress brute force
2020-03-28 08:52:07
190.236.195.230 attack
Unauthorized connection attempt from IP address 190.236.195.230 on Port 445(SMB)
2020-03-28 08:25:40
93.170.115.10 attack
Unauthorized connection attempt from IP address 93.170.115.10 on Port 445(SMB)
2020-03-28 08:15:07
129.28.154.240 attack
Invalid user demos from 129.28.154.240 port 45028
2020-03-28 08:34:33
212.172.74.14 attack
WordPress brute force
2020-03-28 08:53:19
106.12.204.156 attackbots
404 NOT FOUND
2020-03-28 08:50:14

最近上报的IP列表

2606:4700:10::6814:6117 54.211.193.79 54.172.51.23 185.210.154.83
2606:4700:10::6814:6315 2606:4700:10::6816:4133 2606:4700:10::6816:442d 18.183.175.177
217.174.231.246 88.151.32.216 2606:4700:10::6816:3351 2606:4700:10::6814:6547
2606:4700:10::6816:457 2606:4700:10::6816:3534 2606:4700:10::6814:7742 2606:4700:10::6814:5925
2606:4700:10::6814:8623 14.207.194.107 147.185.132.170 211.47.66.63