必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Sanaa

省份(region): Amanat Al Asimah

国家(country): Yemen

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       134.35.0.0 - 134.35.255.255
CIDR:           134.35.0.0/16
NetName:        RIPE
NetHandle:      NET-134-35-0-0-1
Parent:         NET134 (NET-134-0-0-0-0)
NetType:        Early Registrations, Transferred to RIPE NCC
OriginAS:       
Organization:   RIPE Network Coordination Centre (RIPE)
RegDate:        2016-03-09
Updated:        2025-02-10
Comment:        These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref:            https://rdap.arin.net/registry/ip/134.35.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.ripe.net


OrgName:        RIPE Network Coordination Centre
OrgId:          RIPE
Address:        P.O. Box 10096
City:           Amsterdam
StateProv:      
PostalCode:     1001EB
Country:        NL
RegDate:        
Updated:        2013-07-29
Ref:            https://rdap.arin.net/registry/entity/RIPE

ReferralServer:  whois.ripe.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgTechHandle: RNO29-ARIN
OrgTechName:   RIPE NCC Operations
OrgTechPhone:  +31 20 535 4444 
OrgTechEmail:  hostmaster@ripe.net
OrgTechRef:    https://rdap.arin.net/registry/entity/RNO29-ARIN

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName:   Abuse Contact
OrgAbusePhone:  +31205354444 
OrgAbuseEmail:  abuse@ripe.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3850-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.35.157.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46414
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.35.157.118.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030401 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 05 05:06:46 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 118.157.35.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 118.157.35.134.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.52.84.117 attack
Lines containing failures of 106.52.84.117
Feb  7 19:45:58 mx-in-02 sshd[4608]: Invalid user wz from 106.52.84.117 port 45754
Feb  7 19:45:58 mx-in-02 sshd[4608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.84.117 
Feb  7 19:45:59 mx-in-02 sshd[4608]: Failed password for invalid user wz from 106.52.84.117 port 45754 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.52.84.117
2020-02-10 08:54:16
162.243.130.190 attack
2323/tcp 138/tcp 36498/tcp...
[2020-02-02/09]11pkt,11pt.(tcp)
2020-02-10 08:24:38
203.130.242.68 attackbots
Feb  7 06:34:20 host sshd[7871]: reveeclipse mapping checking getaddrinfo for txxxxxxx4.techscape.co.id [203.130.242.68] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb  7 06:34:20 host sshd[7871]: Invalid user qly from 203.130.242.68
Feb  7 06:34:20 host sshd[7871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.130.242.68 
Feb  7 06:34:21 host sshd[7871]: Failed password for invalid user qly from 203.130.242.68 port 47326 ssh2
Feb  7 06:34:22 host sshd[7871]: Received disconnect from 203.130.242.68: 11: Bye Bye [preauth]
Feb  7 06:55:14 host sshd[5658]: reveeclipse mapping checking getaddrinfo for txxxxxxx4.techscape.co.id [203.130.242.68] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb  7 06:55:14 host sshd[5658]: Invalid user mrv from 203.130.242.68
Feb  7 06:55:14 host sshd[5658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.130.242.68 
Feb  7 06:55:16 host sshd[5658]: Failed password for i........
-------------------------------
2020-02-10 08:51:05
101.51.32.81 attackbots
Honeypot attack, port: 81, PTR: node-6dt.pool-101-51.dynamic.totinternet.net.
2020-02-10 08:38:46
218.92.0.184 attack
2020-02-10T01:14:30.807454vps751288.ovh.net sshd\[1386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184  user=root
2020-02-10T01:14:32.492719vps751288.ovh.net sshd\[1386\]: Failed password for root from 218.92.0.184 port 62864 ssh2
2020-02-10T01:14:36.170874vps751288.ovh.net sshd\[1386\]: Failed password for root from 218.92.0.184 port 62864 ssh2
2020-02-10T01:14:39.404524vps751288.ovh.net sshd\[1386\]: Failed password for root from 218.92.0.184 port 62864 ssh2
2020-02-10T01:14:43.047508vps751288.ovh.net sshd\[1386\]: Failed password for root from 218.92.0.184 port 62864 ssh2
2020-02-10 08:19:46
196.52.43.62 attack
Port scan: Attack repeated for 24 hours
2020-02-10 08:55:58
5.102.225.145 attackbots
Automatic report - Port Scan Attack
2020-02-10 08:26:44
114.242.17.88 attackbots
'IP reached maximum auth failures for a one day block'
2020-02-10 09:02:24
172.90.10.68 attackspam
Automatic report - Banned IP Access
2020-02-10 08:14:41
110.78.23.131 attackspam
Feb 10 01:01:43 cp sshd[11772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.78.23.131
Feb 10 01:01:45 cp sshd[11772]: Failed password for invalid user bzt from 110.78.23.131 port 51635 ssh2
Feb 10 01:08:23 cp sshd[15584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.78.23.131
2020-02-10 08:22:55
222.186.180.130 attackbots
Feb 10 01:26:22 h2177944 sshd\[6459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
Feb 10 01:26:24 h2177944 sshd\[6459\]: Failed password for root from 222.186.180.130 port 24600 ssh2
Feb 10 01:26:25 h2177944 sshd\[6459\]: Failed password for root from 222.186.180.130 port 24600 ssh2
Feb 10 01:26:27 h2177944 sshd\[6459\]: Failed password for root from 222.186.180.130 port 24600 ssh2
...
2020-02-10 08:48:18
222.186.30.187 attack
Feb 10 05:41:54 areeb-Workstation sshd[18839]: Failed password for root from 222.186.30.187 port 61826 ssh2
Feb 10 05:41:58 areeb-Workstation sshd[18839]: Failed password for root from 222.186.30.187 port 61826 ssh2
...
2020-02-10 08:16:56
222.186.42.136 attack
Feb 10 05:11:27 gw1 sshd[13353]: Failed password for root from 222.186.42.136 port 37594 ssh2
...
2020-02-10 08:27:46
99.149.128.234 attackbotsspam
Feb  9 22:29:18 ns382633 sshd\[19401\]: Invalid user qpz from 99.149.128.234 port 50756
Feb  9 22:29:18 ns382633 sshd\[19401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.149.128.234
Feb  9 22:29:20 ns382633 sshd\[19401\]: Failed password for invalid user qpz from 99.149.128.234 port 50756 ssh2
Feb  9 23:06:41 ns382633 sshd\[26017\]: Invalid user skw from 99.149.128.234 port 60858
Feb  9 23:06:41 ns382633 sshd\[26017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.149.128.234
2020-02-10 08:47:35
51.79.94.190 attackbotsspam
10.02.2020 00:52:22 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-02-10 08:40:28

最近上报的IP列表

2606:4700:10::6816:2211 2606:4700:10::6814:6997 110.78.138.153 2606:4700:10::ac43:1907
2606:4700:10::ac43:2009 2606:4700:10::6814:5607 2606:4700:10::6816:1450 2606:4700:10::6814:8609
2606:4700:10::6816:4567 35.203.210.132 35.182.29.15 45.205.1.8
2606:4700:10::ac43:631 2606:4700:10::ac43:630 2606:4700:10::6814:7879 2606:4700:10::6814:6509
2606:4700:10::ac43:1431 2606:4700:10::6816:647 2606:4700:10::6814:7132 2606:4700:10::6814:4593