城市(city): Sanaa
省份(region): Amanat Al Asimah
国家(country): Yemen
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 134.35.0.0 - 134.35.255.255
CIDR: 134.35.0.0/16
NetName: RIPE
NetHandle: NET-134-35-0-0-1
Parent: NET134 (NET-134-0-0-0-0)
NetType: Early Registrations, Transferred to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2016-03-09
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/134.35.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net
OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE
ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.35.157.183
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57016
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.35.157.183. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032000 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 20 21:03:26 CST 2026
;; MSG SIZE rcvd: 107
Host 183.157.35.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 183.157.35.134.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 222.186.175.215 | attack | Jan 6 22:14:42 root sshd[17759]: Failed password for root from 222.186.175.215 port 25802 ssh2 Jan 6 22:14:47 root sshd[17759]: Failed password for root from 222.186.175.215 port 25802 ssh2 Jan 6 22:14:50 root sshd[17759]: Failed password for root from 222.186.175.215 port 25802 ssh2 Jan 6 22:14:54 root sshd[17759]: Failed password for root from 222.186.175.215 port 25802 ssh2 ... |
2020-01-07 05:16:35 |
| 167.71.255.193 | attackbots | wordpress attack |
2020-01-07 05:12:14 |
| 42.118.105.238 | attack | Unauthorized connection attempt detected from IP address 42.118.105.238 to port 1022 [T] |
2020-01-07 04:44:29 |
| 45.134.179.20 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-01-07 05:15:59 |
| 42.113.229.166 | attackbotsspam | Unauthorized connection attempt detected from IP address 42.113.229.166 to port 23 [T] |
2020-01-07 04:45:39 |
| 92.118.38.56 | attackbotsspam | Jan 6 21:53:31 vmanager6029 postfix/smtpd\[6345\]: warning: unknown\[92.118.38.56\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jan 6 21:54:03 vmanager6029 postfix/smtpd\[6345\]: warning: unknown\[92.118.38.56\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-01-07 05:03:34 |
| 82.223.77.7 | attackspambots | Mail sent to address hacked/leaked from atari.st |
2020-01-07 05:09:15 |
| 222.186.175.155 | attackbotsspam | Jan 6 15:59:48 plusreed sshd[26006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155 user=root Jan 6 15:59:50 plusreed sshd[26006]: Failed password for root from 222.186.175.155 port 36752 ssh2 Jan 6 15:59:53 plusreed sshd[26006]: Failed password for root from 222.186.175.155 port 36752 ssh2 Jan 6 15:59:48 plusreed sshd[26006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155 user=root Jan 6 15:59:50 plusreed sshd[26006]: Failed password for root from 222.186.175.155 port 36752 ssh2 Jan 6 15:59:53 plusreed sshd[26006]: Failed password for root from 222.186.175.155 port 36752 ssh2 ... |
2020-01-07 05:01:45 |
| 80.127.116.96 | attackspam | xmlrpc attack |
2020-01-07 05:15:48 |
| 202.98.38.149 | attackspam | Unauthorized connection attempt detected from IP address 202.98.38.149 to port 1433 [T] |
2020-01-07 04:51:38 |
| 222.186.42.136 | attackbotsspam | 01/06/2020-15:46:51.928788 222.186.42.136 Protocol: 6 ET SCAN Potential SSH Scan |
2020-01-07 04:48:09 |
| 183.192.240.176 | attackspam | Unauthorized connection attempt detected from IP address 183.192.240.176 to port 23 [J] |
2020-01-07 04:52:55 |
| 58.250.27.18 | attackbotsspam | Unauthorized connection attempt detected from IP address 58.250.27.18 to port 1433 [T] |
2020-01-07 04:40:50 |
| 152.67.67.89 | attackspambots | (sshd) Failed SSH login from 152.67.67.89 (CH/Switzerland/Zurich/Zurich/-/[AS31898 Oracle Corporation]): 1 in the last 3600 secs |
2020-01-07 05:02:01 |
| 27.128.233.104 | attackspam | Jan 6 21:54:05 MK-Soft-Root2 sshd[10523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.233.104 Jan 6 21:54:07 MK-Soft-Root2 sshd[10523]: Failed password for invalid user twh from 27.128.233.104 port 41546 ssh2 ... |
2020-01-07 04:58:57 |