城市(city): Warsaw
省份(region): Mazowieckie
国家(country): Poland
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 34.64.0.0 - 34.127.255.255
CIDR: 34.64.0.0/10
NetName: GOOGL-2
NetHandle: NET-34-64-0-0-1
Parent: NET34 (NET-34-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Google LLC (GOOGL-2)
RegDate: 2018-09-28
Updated: 2018-09-28
Ref: https://rdap.arin.net/registry/ip/34.64.0.0
OrgName: Google LLC
OrgId: GOOGL-2
Address: 1600 Amphitheatre Parkway
City: Mountain View
StateProv: CA
PostalCode: 94043
Country: US
RegDate: 2006-09-29
Updated: 2019-11-01
Comment: *** The IP addresses under this Org-ID are in use by Google Cloud customers ***
Comment:
Comment: Direct all copyright and legal complaints to
Comment: https://support.google.com/legal/go/report
Comment:
Comment: Direct all spam and abuse complaints to
Comment: https://support.google.com/code/go/gce_abuse_report
Comment:
Comment: For fastest response, use the relevant forms above.
Comment:
Comment: Complaints can also be sent to the GC Abuse desk
Comment: (google-cloud-compliance@google.com)
Comment: but may have longer turnaround times.
Comment:
Comment: Complaints sent to any other POC will be ignored.
Ref: https://rdap.arin.net/registry/entity/GOOGL-2
OrgAbuseHandle: GCABU-ARIN
OrgAbuseName: GC Abuse
OrgAbusePhone: +1-650-253-0000
OrgAbuseEmail: google-cloud-compliance@google.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/GCABU-ARIN
OrgTechHandle: ZG39-ARIN
OrgTechName: Google LLC
OrgTechPhone: +1-650-253-0000
OrgTechEmail: arin-contact@google.com
OrgTechRef: https://rdap.arin.net/registry/entity/ZG39-ARIN
OrgNOCHandle: GCABU-ARIN
OrgNOCName: GC Abuse
OrgNOCPhone: +1-650-253-0000
OrgNOCEmail: google-cloud-compliance@google.com
OrgNOCRef: https://rdap.arin.net/registry/entity/GCABU-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.118.32.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11576
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;34.118.32.54. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032800 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 28 22:31:09 CST 2026
;; MSG SIZE rcvd: 105
54.32.118.34.in-addr.arpa domain name pointer 54.32.118.34.bc.googleusercontent.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
54.32.118.34.in-addr.arpa name = 54.32.118.34.bc.googleusercontent.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.255.170.237 | attack | 51.255.170.237 - - [23/Feb/2020:04:49:19 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2" ... |
2020-02-23 08:52:32 |
| 222.186.175.169 | attack | $f2bV_matches |
2020-02-23 09:04:00 |
| 94.254.125.44 | attackspambots | Feb 22 14:47:47 kapalua sshd\[31192\]: Invalid user www from 94.254.125.44 Feb 22 14:47:47 kapalua sshd\[31192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=h-125-44.a400.priv.bahnhof.se Feb 22 14:47:49 kapalua sshd\[31192\]: Failed password for invalid user www from 94.254.125.44 port 55608 ssh2 Feb 22 14:49:12 kapalua sshd\[31316\]: Invalid user oracle from 94.254.125.44 Feb 22 14:49:12 kapalua sshd\[31316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=h-125-44.a400.priv.bahnhof.se |
2020-02-23 08:54:16 |
| 185.176.27.2 | attack | 02/22/2020-18:45:38.865102 185.176.27.2 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-02-23 08:43:11 |
| 198.108.67.86 | attack | ET DROP Dshield Block Listed Source group 1 - port: 9000 proto: TCP cat: Misc Attack |
2020-02-23 08:39:15 |
| 112.85.42.174 | attackbotsspam | IP blocked |
2020-02-23 08:29:45 |
| 222.186.175.202 | attackbots | Feb 23 01:49:08 ns381471 sshd[15968]: Failed password for root from 222.186.175.202 port 26680 ssh2 Feb 23 01:49:23 ns381471 sshd[15968]: error: maximum authentication attempts exceeded for root from 222.186.175.202 port 26680 ssh2 [preauth] |
2020-02-23 08:51:04 |
| 198.108.67.88 | attackspam | 02/22/2020-17:49:29.607793 198.108.67.88 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-02-23 08:38:44 |
| 101.89.110.204 | attack | Invalid user jetty from 101.89.110.204 port 44092 |
2020-02-23 08:32:23 |
| 218.92.0.201 | attackspam | Feb 23 01:46:28 silence02 sshd[14206]: Failed password for root from 218.92.0.201 port 44465 ssh2 Feb 23 01:47:48 silence02 sshd[14278]: Failed password for root from 218.92.0.201 port 47478 ssh2 |
2020-02-23 08:56:14 |
| 51.255.84.223 | attackspam | 2020-02-23T00:48:10.959368vps773228.ovh.net sshd[9390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3038619.ip-51-255-84.eu 2020-02-23T00:48:10.944429vps773228.ovh.net sshd[9390]: Invalid user pgadmin from 51.255.84.223 port 34402 2020-02-23T00:48:12.882677vps773228.ovh.net sshd[9390]: Failed password for invalid user pgadmin from 51.255.84.223 port 34402 ssh2 2020-02-23T01:48:44.815012vps773228.ovh.net sshd[9479]: Invalid user web from 51.255.84.223 port 49086 2020-02-23T01:48:44.838481vps773228.ovh.net sshd[9479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3038619.ip-51-255-84.eu 2020-02-23T01:48:44.815012vps773228.ovh.net sshd[9479]: Invalid user web from 51.255.84.223 port 49086 2020-02-23T01:48:46.977932vps773228.ovh.net sshd[9479]: Failed password for invalid user web from 51.255.84.223 port 49086 ssh2 2020-02-23T01:49:05.019621vps773228.ovh.net sshd[9481]: Invalid user web from 51.255.84 ... |
2020-02-23 09:00:17 |
| 185.216.140.31 | attackbotsspam | Scanning random ports - tries to find possible vulnerable services |
2020-02-23 08:41:31 |
| 85.93.20.70 | attackbots | ET SCAN MS Terminal Server Traffic on Non-standard Port - port: 443 proto: TCP cat: Attempted Information Leak |
2020-02-23 08:48:54 |
| 187.188.129.165 | attack | firewall-block, port(s): 1433/tcp |
2020-02-23 09:04:27 |
| 120.52.120.166 | attackspam | $f2bV_matches |
2020-02-23 08:57:56 |