必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       134.8.0.0 - 134.8.255.255
CIDR:           134.8.0.0/16
NetName:        ALTIUM-NET
NetHandle:      NET-134-8-0-0-1
Parent:         NET134 (NET-134-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   ALTIUM (ALTIUM)
RegDate:        1989-04-11
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/134.8.0.0


OrgName:        ALTIUM
OrgId:          ALTIUM
Address:        4225 Executive Square
Address:        Suite 1000
City:           La Jolla
StateProv:      CA
PostalCode:     92037
Country:        US
RegDate:        1989-04-11
Updated:        2025-02-12
Ref:            https://rdap.arin.net/registry/entity/ALTIUM


OrgAbuseHandle: HAXHI1-ARIN
OrgAbuseName:   Haxhijaha, Selman 
OrgAbusePhone:  +1-858-864-1530 
OrgAbuseEmail:  selman.haxhijaha@altium.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/HAXHI1-ARIN

OrgTechHandle: HAXHI1-ARIN
OrgTechName:   Haxhijaha, Selman 
OrgTechPhone:  +1-858-864-1530 
OrgTechEmail:  selman.haxhijaha@altium.com
OrgTechRef:    https://rdap.arin.net/registry/entity/HAXHI1-ARIN

OrgNOCHandle: HAXHI1-ARIN
OrgNOCName:   Haxhijaha, Selman 
OrgNOCPhone:  +1-858-864-1530 
OrgNOCEmail:  selman.haxhijaha@altium.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/HAXHI1-ARIN

OrgNOCHandle: LOWER105-ARIN
OrgNOCName:   Lowery, David 
OrgNOCPhone:  +1-469-200-6075 
OrgNOCEmail:  david.lowery@altium.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/LOWER105-ARIN

OrgTechHandle: LOWER105-ARIN
OrgTechName:   Lowery, David 
OrgTechPhone:  +1-469-200-6075 
OrgTechEmail:  david.lowery@altium.com
OrgTechRef:    https://rdap.arin.net/registry/entity/LOWER105-ARIN

OrgAbuseHandle: LOWER105-ARIN
OrgAbuseName:   Lowery, David 
OrgAbusePhone:  +1-469-200-6075 
OrgAbuseEmail:  david.lowery@altium.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LOWER105-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.8.20.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64844
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.8.20.222.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040101 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 11:10:46 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 222.20.8.134.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 134.8.20.222.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.244.128.17 attack
Sep  7 14:46:48 db sshd[5180]: User root from 118.244.128.17 not allowed because none of user's groups are listed in AllowGroups
...
2020-09-08 03:03:51
45.55.41.113 attack
Sep  7 12:28:05 vps sshd[24205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.41.113 
Sep  7 12:28:07 vps sshd[24205]: Failed password for invalid user andcze from 45.55.41.113 port 36186 ssh2
Sep  7 12:32:33 vps sshd[24390]: Failed password for root from 45.55.41.113 port 43520 ssh2
...
2020-09-08 03:33:27
182.61.50.68 attackbotsspam
 TCP (SYN) 182.61.50.68:54195 -> port 1433, len 44
2020-09-08 03:23:48
49.233.53.111 attackspambots
SSH login attempts.
2020-09-08 03:01:32
66.249.66.219 attackspam
Automatic report - Banned IP Access
2020-09-08 03:08:18
159.89.9.84 attackbotsspam
SSH
2020-09-08 03:31:59
218.191.223.71 attackspambots
2020-09-07T17:31:01.776316luisaranguren sshd[783979]: Failed password for root from 218.191.223.71 port 38317 ssh2
2020-09-07T17:31:03.100659luisaranguren sshd[783979]: Connection closed by authenticating user root 218.191.223.71 port 38317 [preauth]
...
2020-09-08 03:17:29
103.56.17.89 attackbots
Sep  7 15:49:39 ns382633 sshd\[8995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.17.89  user=root
Sep  7 15:49:41 ns382633 sshd\[8995\]: Failed password for root from 103.56.17.89 port 45959 ssh2
Sep  7 15:58:16 ns382633 sshd\[10693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.17.89  user=root
Sep  7 15:58:18 ns382633 sshd\[10693\]: Failed password for root from 103.56.17.89 port 41767 ssh2
Sep  7 16:03:14 ns382633 sshd\[11463\]: Invalid user RPM from 103.56.17.89 port 44401
Sep  7 16:03:14 ns382633 sshd\[11463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.17.89
2020-09-08 03:27:19
34.74.147.229 attackspambots
viw-Joomla User : try to access forms...
2020-09-08 03:16:31
36.72.105.181 attackspam
1599410838 - 09/06/2020 18:47:18 Host: 36.72.105.181/36.72.105.181 Port: 445 TCP Blocked
2020-09-08 02:57:20
180.168.36.2 attackspam
Sep  7 11:57:35 ny01 sshd[4204]: Failed password for root from 180.168.36.2 port 20712 ssh2
Sep  7 11:59:30 ny01 sshd[4587]: Failed password for root from 180.168.36.2 port 31583 ssh2
2020-09-08 03:09:36
178.138.193.31 attackspam
1599410837 - 09/06/2020 18:47:17 Host: 178.138.193.31/178.138.193.31 Port: 445 TCP Blocked
2020-09-08 02:58:26
191.208.15.70 attack
Cluster member 67.227.229.95 (US/United States/host.cjthedj97.me) said, DENY 191.208.15.70, Reason:[(sshd) Failed SSH login from 191.208.15.70 (BR/Brazil/191-208-15-70.user.vivozap.com.br): 1 in the last 3600 secs]; Ports: *; Direction: inout; Trigger: LF_CLUSTER
2020-09-08 03:28:13
192.142.196.251 attackspambots
Cluster member 67.227.229.95 (US/United States/host.cjthedj97.me) said, DENY 192.142.196.251, Reason:[(sshd) Failed SSH login from 192.142.196.251 (ZA/South Africa/-): 1 in the last 3600 secs]; Ports: *; Direction: inout; Trigger: LF_CLUSTER
2020-09-08 03:20:26
51.178.52.245 attackspambots
Sep  7 20:48:03 vps639187 sshd\[31896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.52.245  user=root
Sep  7 20:48:05 vps639187 sshd\[31896\]: Failed password for root from 51.178.52.245 port 40660 ssh2
Sep  7 20:48:07 vps639187 sshd\[31896\]: Failed password for root from 51.178.52.245 port 40660 ssh2
...
2020-09-08 03:23:19

最近上报的IP列表

203.160.68.9 38.158.156.54 77.83.39.42 10.229.126.182
101.37.118.183 40.124.175.174 2606:4700:10::6814:8842 2606:4700:10::6816:2184
2606:4700:10::6816:3384 2606:4700:10::6814:8611 2606:4700:10::6814:9090 2606:4700:10::6814:7163
2606:4700:10::6816:224 2606:4700:10::6814:4560 2606:4700:10::6814:9160 148.72.33.109
154.36.167.92 61.171.235.22 3.239.1.167 203.189.7.94