必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Sanaa

省份(region): Amanat Al Asimah

国家(country): Yemen

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       134.35.0.0 - 134.35.255.255
CIDR:           134.35.0.0/16
NetName:        RIPE
NetHandle:      NET-134-35-0-0-1
Parent:         NET134 (NET-134-0-0-0-0)
NetType:        Early Registrations, Transferred to RIPE NCC
OriginAS:       
Organization:   RIPE Network Coordination Centre (RIPE)
RegDate:        2016-03-09
Updated:        2025-02-10
Comment:        These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref:            https://rdap.arin.net/registry/ip/134.35.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.ripe.net


OrgName:        RIPE Network Coordination Centre
OrgId:          RIPE
Address:        P.O. Box 10096
City:           Amsterdam
StateProv:      
PostalCode:     1001EB
Country:        NL
RegDate:        
Updated:        2013-07-29
Ref:            https://rdap.arin.net/registry/entity/RIPE

ReferralServer:  whois.ripe.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgTechHandle: RNO29-ARIN
OrgTechName:   RIPE NCC Operations
OrgTechPhone:  +31 20 535 4444 
OrgTechEmail:  hostmaster@ripe.net
OrgTechRef:    https://rdap.arin.net/registry/entity/RNO29-ARIN

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName:   Abuse Contact
OrgAbusePhone:  +31205354444 
OrgAbuseEmail:  abuse@ripe.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3850-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.35.157.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4813
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.35.157.105.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042001 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 21 02:56:21 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 105.157.35.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.157.35.134.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.94.195.252 attackspam
Unauthorized connection attempt detected from IP address 222.94.195.252 to port 8123 [J]
2020-03-02 15:54:15
114.229.43.53 attack
Unauthorized connection attempt detected from IP address 114.229.43.53 to port 23 [J]
2020-03-02 15:37:35
13.90.143.248 attackspambots
Unauthorized connection attempt detected from IP address 13.90.143.248 to port 1433 [J]
2020-03-02 15:52:40
50.249.110.86 attackspambots
Unauthorized connection attempt detected from IP address 50.249.110.86 to port 23 [J]
2020-03-02 15:48:35
190.246.12.133 attack
Unauthorized connection attempt detected from IP address 190.246.12.133 to port 81 [J]
2020-03-02 15:59:06
114.33.224.32 attackspambots
Unauthorized connection attempt detected from IP address 114.33.224.32 to port 23 [J]
2020-03-02 15:38:17
114.35.222.183 attackbotsspam
Unauthorized connection attempt detected from IP address 114.35.222.183 to port 23 [J]
2020-03-02 15:37:57
177.23.183.6 attackbots
Unauthorized connection attempt detected from IP address 177.23.183.6 to port 23 [J]
2020-03-02 15:27:22
198.199.101.235 attackspam
Port 2525 scan denied
2020-03-02 15:22:20
59.127.129.111 attackbots
Unauthorized connection attempt detected from IP address 59.127.129.111 to port 4567 [J]
2020-03-02 15:47:35
162.246.212.102 attackspambots
Unauthorized connection attempt detected from IP address 162.246.212.102 to port 8080 [J]
2020-03-02 15:28:34
59.126.132.165 attackspambots
Unauthorized connection attempt detected from IP address 59.126.132.165 to port 23 [J]
2020-03-02 15:48:01
1.2.227.243 attackbots
Unauthorized connection attempt detected from IP address 1.2.227.243 to port 23 [J]
2020-03-02 15:53:33
120.150.152.201 attack
Unauthorized connection attempt detected from IP address 120.150.152.201 to port 81 [J]
2020-03-02 15:35:36
39.121.29.7 attackbots
Unauthorized connection attempt detected from IP address 39.121.29.7 to port 81 [J]
2020-03-02 15:15:32

最近上报的IP列表

172.238.19.179 2606:4700:10::ac43:875 2606:4700:10::6816:4117 2606:4700:10::ac43:2625
2606:4700:10::6816:2607 2606:4700:10::6816:1399 110.78.150.145 2606:4700:10::ac43:932
2606:4700:10::6814:4386 2606:4700:10::6816:2308 2606:4700:10::6816:3527 2606:4700:10::6816:983
2606:4700:10::6814:5806 161.35.3.45 195.70.3.118 2606:4700:10::6816:1679
2606:4700:10::6814:9593 2606:4700:10::6814:8233 213.199.33.232 14.213.49.160