城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 134.8.0.0 - 134.8.255.255
CIDR: 134.8.0.0/16
NetName: ALTIUM-NET
NetHandle: NET-134-8-0-0-1
Parent: NET134 (NET-134-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: ALTIUM (ALTIUM)
RegDate: 1989-04-11
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/134.8.0.0
OrgName: ALTIUM
OrgId: ALTIUM
Address: 4225 Executive Square
Address: Suite 1000
City: La Jolla
StateProv: CA
PostalCode: 92037
Country: US
RegDate: 1989-04-11
Updated: 2025-02-12
Ref: https://rdap.arin.net/registry/entity/ALTIUM
OrgAbuseHandle: HAXHI1-ARIN
OrgAbuseName: Haxhijaha, Selman
OrgAbusePhone: +1-858-864-1530
OrgAbuseEmail: selman.haxhijaha@altium.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/HAXHI1-ARIN
OrgTechHandle: HAXHI1-ARIN
OrgTechName: Haxhijaha, Selman
OrgTechPhone: +1-858-864-1530
OrgTechEmail: selman.haxhijaha@altium.com
OrgTechRef: https://rdap.arin.net/registry/entity/HAXHI1-ARIN
OrgNOCHandle: HAXHI1-ARIN
OrgNOCName: Haxhijaha, Selman
OrgNOCPhone: +1-858-864-1530
OrgNOCEmail: selman.haxhijaha@altium.com
OrgNOCRef: https://rdap.arin.net/registry/entity/HAXHI1-ARIN
OrgNOCHandle: LOWER105-ARIN
OrgNOCName: Lowery, David
OrgNOCPhone: +1-469-200-6075
OrgNOCEmail: david.lowery@altium.com
OrgNOCRef: https://rdap.arin.net/registry/entity/LOWER105-ARIN
OrgTechHandle: LOWER105-ARIN
OrgTechName: Lowery, David
OrgTechPhone: +1-469-200-6075
OrgTechEmail: david.lowery@altium.com
OrgTechRef: https://rdap.arin.net/registry/entity/LOWER105-ARIN
OrgAbuseHandle: LOWER105-ARIN
OrgAbuseName: Lowery, David
OrgAbusePhone: +1-469-200-6075
OrgAbuseEmail: david.lowery@altium.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/LOWER105-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.8.20.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64844
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.8.20.222. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040101 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 11:10:46 CST 2026
;; MSG SIZE rcvd: 105
Host 222.20.8.134.in-addr.arpa not found: 2(SERVFAIL)
server can't find 134.8.20.222.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 118.244.128.17 | attack | Sep 7 14:46:48 db sshd[5180]: User root from 118.244.128.17 not allowed because none of user's groups are listed in AllowGroups ... |
2020-09-08 03:03:51 |
| 45.55.41.113 | attack | Sep 7 12:28:05 vps sshd[24205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.41.113 Sep 7 12:28:07 vps sshd[24205]: Failed password for invalid user andcze from 45.55.41.113 port 36186 ssh2 Sep 7 12:32:33 vps sshd[24390]: Failed password for root from 45.55.41.113 port 43520 ssh2 ... |
2020-09-08 03:33:27 |
| 182.61.50.68 | attackbotsspam |
|
2020-09-08 03:23:48 |
| 49.233.53.111 | attackspambots | SSH login attempts. |
2020-09-08 03:01:32 |
| 66.249.66.219 | attackspam | Automatic report - Banned IP Access |
2020-09-08 03:08:18 |
| 159.89.9.84 | attackbotsspam | SSH |
2020-09-08 03:31:59 |
| 218.191.223.71 | attackspambots | 2020-09-07T17:31:01.776316luisaranguren sshd[783979]: Failed password for root from 218.191.223.71 port 38317 ssh2 2020-09-07T17:31:03.100659luisaranguren sshd[783979]: Connection closed by authenticating user root 218.191.223.71 port 38317 [preauth] ... |
2020-09-08 03:17:29 |
| 103.56.17.89 | attackbots | Sep 7 15:49:39 ns382633 sshd\[8995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.17.89 user=root Sep 7 15:49:41 ns382633 sshd\[8995\]: Failed password for root from 103.56.17.89 port 45959 ssh2 Sep 7 15:58:16 ns382633 sshd\[10693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.17.89 user=root Sep 7 15:58:18 ns382633 sshd\[10693\]: Failed password for root from 103.56.17.89 port 41767 ssh2 Sep 7 16:03:14 ns382633 sshd\[11463\]: Invalid user RPM from 103.56.17.89 port 44401 Sep 7 16:03:14 ns382633 sshd\[11463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.17.89 |
2020-09-08 03:27:19 |
| 34.74.147.229 | attackspambots | viw-Joomla User : try to access forms... |
2020-09-08 03:16:31 |
| 36.72.105.181 | attackspam | 1599410838 - 09/06/2020 18:47:18 Host: 36.72.105.181/36.72.105.181 Port: 445 TCP Blocked |
2020-09-08 02:57:20 |
| 180.168.36.2 | attackspam | Sep 7 11:57:35 ny01 sshd[4204]: Failed password for root from 180.168.36.2 port 20712 ssh2 Sep 7 11:59:30 ny01 sshd[4587]: Failed password for root from 180.168.36.2 port 31583 ssh2 |
2020-09-08 03:09:36 |
| 178.138.193.31 | attackspam | 1599410837 - 09/06/2020 18:47:17 Host: 178.138.193.31/178.138.193.31 Port: 445 TCP Blocked |
2020-09-08 02:58:26 |
| 191.208.15.70 | attack | Cluster member 67.227.229.95 (US/United States/host.cjthedj97.me) said, DENY 191.208.15.70, Reason:[(sshd) Failed SSH login from 191.208.15.70 (BR/Brazil/191-208-15-70.user.vivozap.com.br): 1 in the last 3600 secs]; Ports: *; Direction: inout; Trigger: LF_CLUSTER |
2020-09-08 03:28:13 |
| 192.142.196.251 | attackspambots | Cluster member 67.227.229.95 (US/United States/host.cjthedj97.me) said, DENY 192.142.196.251, Reason:[(sshd) Failed SSH login from 192.142.196.251 (ZA/South Africa/-): 1 in the last 3600 secs]; Ports: *; Direction: inout; Trigger: LF_CLUSTER |
2020-09-08 03:20:26 |
| 51.178.52.245 | attackspambots | Sep 7 20:48:03 vps639187 sshd\[31896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.52.245 user=root Sep 7 20:48:05 vps639187 sshd\[31896\]: Failed password for root from 51.178.52.245 port 40660 ssh2 Sep 7 20:48:07 vps639187 sshd\[31896\]: Failed password for root from 51.178.52.245 port 40660 ssh2 ... |
2020-09-08 03:23:19 |