城市(city): Sanaa
省份(region): Amanat Al Asimah
国家(country): Yemen
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 134.35.0.0 - 134.35.255.255
CIDR: 134.35.0.0/16
NetName: RIPE
NetHandle: NET-134-35-0-0-1
Parent: NET134 (NET-134-0-0-0-0)
NetType: Early Registrations, Transferred to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2016-03-09
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/134.35.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net
OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE
ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.35.157.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24933
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.35.157.169. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026030301 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 04 12:01:57 CST 2026
;; MSG SIZE rcvd: 107
Host 169.157.35.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 169.157.35.134.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.75.126.115 | attackbotsspam | DATE:2020-03-01 17:26:52, IP:51.75.126.115, PORT:ssh SSH brute force auth (docker-dc) |
2020-03-02 00:30:43 |
| 190.56.108.214 | attackbotsspam | Honeypot attack, port: 445, PTR: 214.108.56.190.dynamic.intelnet.net.gt. |
2020-03-02 00:02:39 |
| 202.187.15.248 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-03-02 00:40:11 |
| 192.241.155.88 | attackbots | $f2bV_matches_ltvn |
2020-03-02 00:31:12 |
| 131.0.36.238 | attackbots | Automatic report - Port Scan Attack |
2020-03-02 00:36:52 |
| 188.227.59.34 | attackbotsspam | RDP Brute-Force (Grieskirchen RZ1) |
2020-03-02 00:05:35 |
| 91.233.42.38 | attackspambots | Mar 1 15:56:44 localhost sshd[33477]: Invalid user abdullah from 91.233.42.38 port 49121 Mar 1 15:56:44 localhost sshd[33477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.233.42.38 Mar 1 15:56:44 localhost sshd[33477]: Invalid user abdullah from 91.233.42.38 port 49121 Mar 1 15:56:46 localhost sshd[33477]: Failed password for invalid user abdullah from 91.233.42.38 port 49121 ssh2 Mar 1 16:05:50 localhost sshd[34414]: Invalid user news from 91.233.42.38 port 37233 ... |
2020-03-02 00:19:50 |
| 106.13.25.179 | attackspam | Mar 1 17:28:35 MK-Soft-VM3 sshd[4326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.25.179 Mar 1 17:28:37 MK-Soft-VM3 sshd[4326]: Failed password for invalid user ftpguest from 106.13.25.179 port 23043 ssh2 ... |
2020-03-02 00:35:13 |
| 200.94.197.149 | attack | Automatic report - Port Scan Attack |
2020-03-02 00:23:27 |
| 71.46.213.130 | attack | Mar 1 15:47:28 hcbbdb sshd\[7535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=asimail.aquasun.com user=backup Mar 1 15:47:31 hcbbdb sshd\[7535\]: Failed password for backup from 71.46.213.130 port 34062 ssh2 Mar 1 15:54:01 hcbbdb sshd\[8297\]: Invalid user sinusbot from 71.46.213.130 Mar 1 15:54:01 hcbbdb sshd\[8297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=asimail.aquasun.com Mar 1 15:54:03 hcbbdb sshd\[8297\]: Failed password for invalid user sinusbot from 71.46.213.130 port 53274 ssh2 |
2020-03-02 00:22:34 |
| 177.37.71.40 | attackspambots | Mar 1 16:54:52 silence02 sshd[15695]: Failed password for proxy from 177.37.71.40 port 50580 ssh2 Mar 1 17:00:10 silence02 sshd[15986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.37.71.40 Mar 1 17:00:12 silence02 sshd[15986]: Failed password for invalid user louis from 177.37.71.40 port 56965 ssh2 |
2020-03-02 00:10:04 |
| 106.12.38.175 | attack | Feb 28 19:59:58 fwweb01 sshd[22645]: Invalid user user from 106.12.38.175 Feb 28 19:59:58 fwweb01 sshd[22645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.38.175 Feb 28 20:00:00 fwweb01 sshd[22645]: Failed password for invalid user user from 106.12.38.175 port 54584 ssh2 Feb 28 20:00:00 fwweb01 sshd[22645]: Received disconnect from 106.12.38.175: 11: Bye Bye [preauth] Feb 28 20:03:47 fwweb01 sshd[22824]: Invalid user loyal from 106.12.38.175 Feb 28 20:03:47 fwweb01 sshd[22824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.38.175 Feb 28 20:03:49 fwweb01 sshd[22824]: Failed password for invalid user loyal from 106.12.38.175 port 43888 ssh2 Feb 28 20:03:49 fwweb01 sshd[22824]: Received disconnect from 106.12.38.175: 11: Bye Bye [preauth] Feb 28 20:07:11 fwweb01 sshd[22948]: Invalid user Ronald from 106.12.38.175 Feb 28 20:07:11 fwweb01 sshd[22948]: pam_unix(sshd:auth): au........ ------------------------------- |
2020-03-02 00:10:30 |
| 167.114.144.96 | attackspam | Mar 1 14:24:00 * sshd[30689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.144.96 Mar 1 14:24:01 * sshd[30689]: Failed password for invalid user ftpadmin from 167.114.144.96 port 58292 ssh2 |
2020-03-02 00:05:51 |
| 186.179.253.150 | attackbotsspam | Unauthorized connection attempt detected from IP address 186.179.253.150 to port 23 [J] |
2020-03-02 00:27:21 |
| 59.96.86.167 | attack | Unauthorized connection attempt detected from IP address 59.96.86.167 to port 8080 [J] |
2020-03-02 00:20:12 |