城市(city): Sanaa
省份(region): Amanat Al Asimah
国家(country): Yemen
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 134.35.0.0 - 134.35.255.255
CIDR: 134.35.0.0/16
NetName: RIPE
NetHandle: NET-134-35-0-0-1
Parent: NET134 (NET-134-0-0-0-0)
NetType: Early Registrations, Transferred to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2016-03-09
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/134.35.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net
OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE
ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.35.157.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44578
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.35.157.52. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040201 1800 900 604800 86400
;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 05:04:19 CST 2026
;; MSG SIZE rcvd: 106
Host 52.157.35.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 52.157.35.134.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.158.31.179 | attackbots | brute force or DOS on voip |
2020-09-18 03:00:51 |
| 45.95.168.130 | attackbotsspam | 2020-09-17T18:15:00.443212abusebot-2.cloudsearch.cf sshd[19464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.168.130 user=root 2020-09-17T18:15:02.505257abusebot-2.cloudsearch.cf sshd[19464]: Failed password for root from 45.95.168.130 port 36940 ssh2 2020-09-17T18:15:10.702281abusebot-2.cloudsearch.cf sshd[19466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.168.130 user=root 2020-09-17T18:15:12.468469abusebot-2.cloudsearch.cf sshd[19466]: Failed password for root from 45.95.168.130 port 54736 ssh2 2020-09-17T18:15:18.775464abusebot-2.cloudsearch.cf sshd[19468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.168.130 user=root 2020-09-17T18:15:21.309149abusebot-2.cloudsearch.cf sshd[19468]: Failed password for root from 45.95.168.130 port 44750 ssh2 2020-09-17T18:16:58.043978abusebot-2.cloudsearch.cf sshd[19470]: Invalid user oracle from 4 ... |
2020-09-18 03:01:18 |
| 37.29.35.190 | attackbots | SMTP Brute-Force |
2020-09-18 03:02:34 |
| 171.247.188.3 | attackbots | Automatic report - Port Scan Attack |
2020-09-18 03:29:38 |
| 79.132.77.123 | attack | Sep 17 14:01:33 logopedia-1vcpu-1gb-nyc1-01 sshd[377205]: Failed password for root from 79.132.77.123 port 46146 ssh2 ... |
2020-09-18 03:35:38 |
| 218.149.178.64 | attackbots | Sep 17 17:07:20 roki-contabo sshd\[11450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.149.178.64 user=root Sep 17 17:07:22 roki-contabo sshd\[11450\]: Failed password for root from 218.149.178.64 port 55346 ssh2 Sep 17 19:01:47 roki-contabo sshd\[15263\]: Invalid user guest from 218.149.178.64 Sep 17 19:01:48 roki-contabo sshd\[15263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.149.178.64 Sep 17 19:01:49 roki-contabo sshd\[15263\]: Failed password for invalid user guest from 218.149.178.64 port 51042 ssh2 ... |
2020-09-18 03:17:12 |
| 212.64.68.71 | attack | Sep 17 20:40:58 mout sshd[27862]: Invalid user rs from 212.64.68.71 port 49350 |
2020-09-18 03:08:34 |
| 111.231.226.68 | attackbots | Sep 17 19:01:55 gamehost-one sshd[13603]: Failed password for root from 111.231.226.68 port 54102 ssh2 Sep 17 19:25:19 gamehost-one sshd[15310]: Failed password for root from 111.231.226.68 port 47872 ssh2 ... |
2020-09-18 03:04:05 |
| 114.227.111.107 | attackbots | Brute forcing email accounts |
2020-09-18 03:10:14 |
| 58.87.127.16 | attack | Brute-Force,SSH |
2020-09-18 03:07:57 |
| 79.127.116.82 | attackbots | Unauthorized connection attempt from IP address 79.127.116.82 on Port 445(SMB) |
2020-09-18 03:19:14 |
| 175.182.188.172 | attackspambots | Unauthorized connection attempt from IP address 175.182.188.172 on Port 445(SMB) |
2020-09-18 03:32:29 |
| 189.50.119.116 | attackbotsspam | Unauthorized connection attempt from IP address 189.50.119.116 on Port 445(SMB) |
2020-09-18 03:23:11 |
| 111.93.203.206 | attackbots | ssh brute force |
2020-09-18 03:34:31 |
| 61.183.158.70 | attackbots | Sep 17 19:48:22 srv-ubuntu-dev3 sshd[9801]: Invalid user lab5 from 61.183.158.70 Sep 17 19:48:22 srv-ubuntu-dev3 sshd[9801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.183.158.70 Sep 17 19:48:22 srv-ubuntu-dev3 sshd[9801]: Invalid user lab5 from 61.183.158.70 Sep 17 19:48:24 srv-ubuntu-dev3 sshd[9801]: Failed password for invalid user lab5 from 61.183.158.70 port 31813 ssh2 Sep 17 19:51:22 srv-ubuntu-dev3 sshd[10179]: Invalid user k23.cn from 61.183.158.70 Sep 17 19:51:22 srv-ubuntu-dev3 sshd[10179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.183.158.70 Sep 17 19:51:22 srv-ubuntu-dev3 sshd[10179]: Invalid user k23.cn from 61.183.158.70 Sep 17 19:51:24 srv-ubuntu-dev3 sshd[10179]: Failed password for invalid user k23.cn from 61.183.158.70 port 44881 ssh2 Sep 17 19:54:27 srv-ubuntu-dev3 sshd[10528]: Invalid user ubnt from 61.183.158.70 ... |
2020-09-18 03:20:57 |