City: Sanaa
Region: Amanat Al Asimah
Country: Yemen
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 134.35.0.0 - 134.35.255.255
CIDR: 134.35.0.0/16
NetName: RIPE
NetHandle: NET-134-35-0-0-1
Parent: NET134 (NET-134-0-0-0-0)
NetType: Early Registrations, Transferred to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2016-03-09
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/134.35.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net
OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE
ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.35.157.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28756
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.35.157.112. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031800 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 18 16:02:44 CST 2026
;; MSG SIZE rcvd: 107
Host 112.157.35.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 112.157.35.134.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.12.73.236 | attackbotsspam | Jul 18 01:41:29 aat-srv002 sshd[2286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.73.236 Jul 18 01:41:31 aat-srv002 sshd[2286]: Failed password for invalid user nfsnobody from 106.12.73.236 port 43676 ssh2 Jul 18 01:47:34 aat-srv002 sshd[2378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.73.236 Jul 18 01:47:36 aat-srv002 sshd[2378]: Failed password for invalid user prueba from 106.12.73.236 port 41154 ssh2 ... |
2019-07-18 15:05:41 |
| 185.142.236.35 | attackspambots | Honeypot hit. |
2019-07-18 15:15:35 |
| 204.62.193.57 | attack | SMB Server BruteForce Attack |
2019-07-18 15:09:51 |
| 170.83.202.17 | attackbots | firewall-block, port(s): 80/tcp |
2019-07-18 14:38:22 |
| 146.185.157.31 | attackbots | firewall-block, port(s): 2519/tcp |
2019-07-18 14:39:49 |
| 200.21.57.62 | attackbotsspam | Jul 18 08:34:11 eventyay sshd[31534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.21.57.62 Jul 18 08:34:13 eventyay sshd[31534]: Failed password for invalid user alex from 200.21.57.62 port 44078 ssh2 Jul 18 08:39:53 eventyay sshd[32749]: Failed password for root from 200.21.57.62 port 43998 ssh2 ... |
2019-07-18 14:41:32 |
| 164.68.101.155 | attackbots | firewall-block, port(s): 8080/tcp |
2019-07-18 14:32:57 |
| 87.120.36.238 | attack | Jul 18 02:01:52 web1 postfix/smtpd[29384]: warning: guard.webcare360.net[87.120.36.238]: SASL LOGIN authentication failed: authentication failure ... |
2019-07-18 14:27:53 |
| 179.238.220.230 | attackbotsspam | Jul 18 08:52:21 h2177944 sshd\[9665\]: Invalid user unix from 179.238.220.230 port 57814 Jul 18 08:52:21 h2177944 sshd\[9665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.238.220.230 Jul 18 08:52:22 h2177944 sshd\[9665\]: Failed password for invalid user unix from 179.238.220.230 port 57814 ssh2 Jul 18 08:57:56 h2177944 sshd\[9773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.238.220.230 user=root ... |
2019-07-18 15:03:48 |
| 2.134.204.20 | attack | fell into ViewStateTrap:wien2018 |
2019-07-18 15:03:28 |
| 185.137.111.188 | attackspambots | Jul 18 07:56:03 mail postfix/smtpd\[24708\]: warning: unknown\[185.137.111.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jul 18 07:56:26 mail postfix/smtpd\[25090\]: warning: unknown\[185.137.111.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jul 18 08:26:29 mail postfix/smtpd\[25405\]: warning: unknown\[185.137.111.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jul 18 08:26:59 mail postfix/smtpd\[26193\]: warning: unknown\[185.137.111.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2019-07-18 14:55:01 |
| 142.93.58.123 | attackbotsspam | Jul 18 08:33:59 icinga sshd[9522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.58.123 Jul 18 08:34:01 icinga sshd[9522]: Failed password for invalid user teamspeak3 from 142.93.58.123 port 44746 ssh2 ... |
2019-07-18 15:12:21 |
| 111.231.132.188 | attack | Jul 18 07:38:59 mail sshd\[7899\]: Invalid user student01 from 111.231.132.188\ Jul 18 07:39:01 mail sshd\[7899\]: Failed password for invalid user student01 from 111.231.132.188 port 37642 ssh2\ Jul 18 07:42:43 mail sshd\[7953\]: Invalid user test from 111.231.132.188\ Jul 18 07:42:45 mail sshd\[7953\]: Failed password for invalid user test from 111.231.132.188 port 44908 ssh2\ Jul 18 07:46:36 mail sshd\[7965\]: Invalid user camera from 111.231.132.188\ Jul 18 07:46:37 mail sshd\[7965\]: Failed password for invalid user camera from 111.231.132.188 port 52184 ssh2\ |
2019-07-18 14:57:06 |
| 119.160.218.2 | attackbotsspam | firewall-block, port(s): 445/tcp |
2019-07-18 14:42:12 |
| 221.133.39.107 | attackbots | firewall-block, port(s): 445/tcp |
2019-07-18 14:33:19 |