必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Sanaa

省份(region): Amanat Al Asimah

国家(country): Yemen

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       134.35.0.0 - 134.35.255.255
CIDR:           134.35.0.0/16
NetName:        RIPE
NetHandle:      NET-134-35-0-0-1
Parent:         NET134 (NET-134-0-0-0-0)
NetType:        Early Registrations, Transferred to RIPE NCC
OriginAS:       
Organization:   RIPE Network Coordination Centre (RIPE)
RegDate:        2016-03-09
Updated:        2025-02-10
Comment:        These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref:            https://rdap.arin.net/registry/ip/134.35.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.ripe.net


OrgName:        RIPE Network Coordination Centre
OrgId:          RIPE
Address:        P.O. Box 10096
City:           Amsterdam
StateProv:      
PostalCode:     1001EB
Country:        NL
RegDate:        
Updated:        2013-07-29
Ref:            https://rdap.arin.net/registry/entity/RIPE

ReferralServer:  whois.ripe.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName:   Abuse Contact
OrgAbusePhone:  +31205354444 
OrgAbuseEmail:  abuse@ripe.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

OrgTechHandle: RNO29-ARIN
OrgTechName:   RIPE NCC Operations
OrgTechPhone:  +31 20 535 4444 
OrgTechEmail:  hostmaster@ripe.net
OrgTechRef:    https://rdap.arin.net/registry/entity/RNO29-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.35.157.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.35.157.59.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042702 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 28 09:02:49 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 59.157.35.134.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 59.157.35.134.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.143.223.246 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 3389 proto: TCP cat: Misc Attack
2020-03-02 09:33:02
185.175.93.18 attackspambots
03/01/2020-19:01:04.635981 185.175.93.18 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-02 09:29:00
185.176.27.102 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 09:24:24
185.246.90.100 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 09:12:11
185.209.0.90 attackspam
03/01/2020-20:08:04.042698 185.209.0.90 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-02 09:15:06
186.93.197.246 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 09:10:14
185.132.53.48 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 09:34:07
185.162.131.60 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 09:30:58
186.138.153.202 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 09:09:14
186.42.182.37 attackspambots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 09:10:45
185.176.27.2 attack
03/01/2020-20:03:01.668833 185.176.27.2 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-02 09:27:20
185.219.114.58 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 09:12:55
186.101.170.45 attackspambots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 09:09:43
185.209.0.91 attack
03/01/2020-19:39:00.901927 185.209.0.91 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-02 09:14:43
185.173.235.105 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2020-03-02 09:29:18

最近上报的IP列表

66.132.172.176 140.249.235.22 20.65.193.190 2606:4700:10::6814:7946
2606:4700:10::6816:4434 64.62.156.196 43.110.28.253 92.63.197.22
2606:4700:10::ac43:180e 2606:4700:10::6816:1802 2606:4700:10::6816:503 2606:4700:10::ac43:2869
214.34.11.246 85.217.149.33 10.11.37.154 2606:4700:10::6816:2778
2606:4700:10::6814:7408 2606:4700:10::6814:8560 139.116.96.132 35.187.125.183