城市(city): Sanaa
省份(region): Amanat Al Asimah
国家(country): Yemen
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 134.35.0.0 - 134.35.255.255
CIDR: 134.35.0.0/16
NetName: RIPE
NetHandle: NET-134-35-0-0-1
Parent: NET134 (NET-134-0-0-0-0)
NetType: Early Registrations, Transferred to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2016-03-09
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/134.35.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net
OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE
ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.35.157.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16077
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.35.157.38. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033103 1800 900 604800 86400
;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 19:04:43 CST 2026
;; MSG SIZE rcvd: 106
Host 38.157.35.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 38.157.35.134.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 188.166.108.161 | attack | $f2bV_matches_ltvn |
2019-07-30 11:37:00 |
| 167.71.41.110 | attackspambots | Jul 29 23:14:16 xtremcommunity sshd\[16407\]: Invalid user administrator1 from 167.71.41.110 port 46888 Jul 29 23:14:16 xtremcommunity sshd\[16407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.41.110 Jul 29 23:14:17 xtremcommunity sshd\[16407\]: Failed password for invalid user administrator1 from 167.71.41.110 port 46888 ssh2 Jul 29 23:18:28 xtremcommunity sshd\[16585\]: Invalid user auditoria from 167.71.41.110 port 41858 Jul 29 23:18:28 xtremcommunity sshd\[16585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.41.110 ... |
2019-07-30 12:42:14 |
| 164.77.91.162 | attackbotsspam | 445/tcp 445/tcp 445/tcp [2019-07-05/29]3pkt |
2019-07-30 12:27:08 |
| 51.255.174.215 | attack | SSH Brute-Force reported by Fail2Ban |
2019-07-30 12:21:31 |
| 67.43.15.7 | attackspambots | 445/tcp 445/tcp 445/tcp... [2019-06-18/07-29]9pkt,1pt.(tcp) |
2019-07-30 12:33:35 |
| 49.88.112.65 | attackbots | Jul 29 23:19:44 plusreed sshd[12708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65 user=root Jul 29 23:19:47 plusreed sshd[12708]: Failed password for root from 49.88.112.65 port 27311 ssh2 ... |
2019-07-30 11:39:53 |
| 213.135.239.146 | attackspambots | Jul 30 03:26:51 localhost sshd\[56157\]: Invalid user db2fenc1 from 213.135.239.146 port 16906 Jul 30 03:26:51 localhost sshd\[56157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.135.239.146 Jul 30 03:26:53 localhost sshd\[56157\]: Failed password for invalid user db2fenc1 from 213.135.239.146 port 16906 ssh2 Jul 30 03:31:04 localhost sshd\[56243\]: Invalid user test1 from 213.135.239.146 port 44329 Jul 30 03:31:04 localhost sshd\[56243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.135.239.146 ... |
2019-07-30 11:52:03 |
| 61.219.171.213 | attack | Jul 29 22:31:33 aat-srv002 sshd[29053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.219.171.213 Jul 29 22:31:34 aat-srv002 sshd[29053]: Failed password for invalid user lilli from 61.219.171.213 port 40417 ssh2 Jul 29 22:36:42 aat-srv002 sshd[29124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.219.171.213 Jul 29 22:36:43 aat-srv002 sshd[29124]: Failed password for invalid user fop2 from 61.219.171.213 port 36989 ssh2 ... |
2019-07-30 12:24:37 |
| 195.208.108.71 | attackbots | 445/tcp 445/tcp 445/tcp... [2019-06-18/07-29]6pkt,1pt.(tcp) |
2019-07-30 11:36:28 |
| 77.247.109.150 | attackbotsspam | VoIP Brute Force - 77.247.109.150 - Auto Report ... |
2019-07-30 12:21:06 |
| 122.195.200.14 | attackbots | Jul 30 09:00:13 areeb-Workstation sshd\[2288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.195.200.14 user=root Jul 30 09:00:15 areeb-Workstation sshd\[2288\]: Failed password for root from 122.195.200.14 port 25153 ssh2 Jul 30 09:00:21 areeb-Workstation sshd\[2324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.195.200.14 user=root ... |
2019-07-30 11:47:05 |
| 62.234.206.12 | attackbots | Jul 30 05:24:47 legacy sshd[22048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.206.12 Jul 30 05:24:49 legacy sshd[22048]: Failed password for invalid user hadoop from 62.234.206.12 port 33374 ssh2 Jul 30 05:28:33 legacy sshd[22130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.206.12 ... |
2019-07-30 11:48:04 |
| 185.200.118.39 | attackbotsspam | 1723/tcp 1080/tcp 3128/tcp... [2019-05-30/07-29]32pkt,4pt.(tcp) |
2019-07-30 12:38:20 |
| 200.75.8.67 | attackbotsspam | 445/tcp 445/tcp 445/tcp... [2019-06-28/07-29]13pkt,1pt.(tcp) |
2019-07-30 11:40:25 |
| 188.165.250.228 | attackspam | frenzy |
2019-07-30 12:35:29 |