Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       134.8.0.0 - 134.8.255.255
CIDR:           134.8.0.0/16
NetName:        ALTIUM-NET
NetHandle:      NET-134-8-0-0-1
Parent:         NET134 (NET-134-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   ALTIUM (ALTIUM)
RegDate:        1989-04-11
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/134.8.0.0


OrgName:        ALTIUM
OrgId:          ALTIUM
Address:        4225 Executive Square
Address:        Suite 1000
City:           La Jolla
StateProv:      CA
PostalCode:     92037
Country:        US
RegDate:        1989-04-11
Updated:        2025-02-12
Ref:            https://rdap.arin.net/registry/entity/ALTIUM


OrgAbuseHandle: HAXHI1-ARIN
OrgAbuseName:   Haxhijaha, Selman 
OrgAbusePhone:  +1-858-864-1530 
OrgAbuseEmail:  selman.haxhijaha@altium.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/HAXHI1-ARIN

OrgTechHandle: HAXHI1-ARIN
OrgTechName:   Haxhijaha, Selman 
OrgTechPhone:  +1-858-864-1530 
OrgTechEmail:  selman.haxhijaha@altium.com
OrgTechRef:    https://rdap.arin.net/registry/entity/HAXHI1-ARIN

OrgNOCHandle: HAXHI1-ARIN
OrgNOCName:   Haxhijaha, Selman 
OrgNOCPhone:  +1-858-864-1530 
OrgNOCEmail:  selman.haxhijaha@altium.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/HAXHI1-ARIN

OrgNOCHandle: LOWER105-ARIN
OrgNOCName:   Lowery, David 
OrgNOCPhone:  +1-469-200-6075 
OrgNOCEmail:  david.lowery@altium.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/LOWER105-ARIN

OrgTechHandle: LOWER105-ARIN
OrgTechName:   Lowery, David 
OrgTechPhone:  +1-469-200-6075 
OrgTechEmail:  david.lowery@altium.com
OrgTechRef:    https://rdap.arin.net/registry/entity/LOWER105-ARIN

OrgAbuseHandle: LOWER105-ARIN
OrgAbuseName:   Lowery, David 
OrgAbusePhone:  +1-469-200-6075 
OrgAbuseEmail:  david.lowery@altium.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LOWER105-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.8.20.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64844
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.8.20.222.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040101 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 11:10:46 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 222.20.8.134.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 134.8.20.222.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
198.199.92.246 attack
198.199.92.246 - - [17/Sep/2020:06:16:43 +0000] "GET / HTTP/1.1" 403 153 "-" "Mozilla/5.0 zgrab/0.x"
2020-09-17 16:47:46
51.68.122.155 attackspambots
SSH invalid-user multiple login attempts
2020-09-17 16:45:52
164.132.46.14 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-17 17:02:01
87.231.73.54 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-09-17 17:09:33
115.160.242.186 attackbots
Honeypot attack, port: 445, PTR: static-186.242.160.115-tataidc.co.in.
2020-09-17 16:58:36
222.186.169.194 attackspam
Sep 17 11:05:06 marvibiene sshd[25767]: Failed password for root from 222.186.169.194 port 8172 ssh2
Sep 17 11:05:11 marvibiene sshd[25767]: Failed password for root from 222.186.169.194 port 8172 ssh2
2020-09-17 17:13:20
111.229.227.125 attackbots
(sshd) Failed SSH login from 111.229.227.125 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 17 03:44:19 server4 sshd[22752]: Invalid user rosenblum from 111.229.227.125
Sep 17 03:44:19 server4 sshd[22752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.227.125 
Sep 17 03:44:21 server4 sshd[22752]: Failed password for invalid user rosenblum from 111.229.227.125 port 35558 ssh2
Sep 17 03:46:32 server4 sshd[24176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.227.125  user=root
Sep 17 03:46:33 server4 sshd[24176]: Failed password for root from 111.229.227.125 port 53716 ssh2
2020-09-17 16:43:18
211.22.154.223 attackbotsspam
Sep 17 08:53:38 scw-6657dc sshd[22315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.22.154.223  user=root
Sep 17 08:53:38 scw-6657dc sshd[22315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.22.154.223  user=root
Sep 17 08:53:39 scw-6657dc sshd[22315]: Failed password for root from 211.22.154.223 port 54850 ssh2
...
2020-09-17 17:07:00
197.5.145.88 attack
Invalid user irma from 197.5.145.88 port 9146
2020-09-17 16:56:34
89.178.206.37 attack
 TCP (SYN) 89.178.206.37:48182 -> port 8080, len 44
2020-09-17 17:08:23
178.128.36.26 attack
[Wed Sep 16 20:12:13.444379 2020] [php7:error] [pid 82746] [client 178.128.36.26:55123] script /Library/Server/Web/Data/Sites/customvisuals.com/wp-login.php not found or unable to stat, referer: http://mail.rhondaschienle.com/wp-login.php
2020-09-17 16:35:01
167.114.113.141 attackspam
Sep 17 10:54:52 cho sshd[3108869]: Invalid user ftp from 167.114.113.141 port 57278
Sep 17 10:54:52 cho sshd[3108869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.113.141 
Sep 17 10:54:52 cho sshd[3108869]: Invalid user ftp from 167.114.113.141 port 57278
Sep 17 10:54:55 cho sshd[3108869]: Failed password for invalid user ftp from 167.114.113.141 port 57278 ssh2
Sep 17 10:59:18 cho sshd[3109081]: Invalid user rpc from 167.114.113.141 port 41686
...
2020-09-17 17:05:19
160.178.254.157 attackbots
Unauthorized connection attempt from IP address 160.178.254.157 on Port 445(SMB)
2020-09-17 17:05:31
79.166.186.140 attackspambots
Hits on port : 23
2020-09-17 17:09:49
49.88.112.67 attackbotsspam
Sep 17 08:30:48 localhost sshd[2773267]: Failed password for root from 49.88.112.67 port 52782 ssh2
Sep 17 08:30:44 localhost sshd[2773267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.67  user=root
Sep 17 08:30:45 localhost sshd[2773267]: Failed password for root from 49.88.112.67 port 52782 ssh2
Sep 17 08:30:48 localhost sshd[2773267]: Failed password for root from 49.88.112.67 port 52782 ssh2
Sep 17 08:30:52 localhost sshd[2773267]: Failed password for root from 49.88.112.67 port 52782 ssh2
...
2020-09-17 16:51:38

Recently Reported IPs

203.160.68.9 38.158.156.54 77.83.39.42 10.229.126.182
101.37.118.183 40.124.175.174 2606:4700:10::6814:8842 2606:4700:10::6816:2184
2606:4700:10::6816:3384 2606:4700:10::6814:8611 2606:4700:10::6814:9090 2606:4700:10::6814:7163
2606:4700:10::6816:224 2606:4700:10::6814:4560 2606:4700:10::6814:9160 148.72.33.109
154.36.167.92 61.171.235.22 3.239.1.167 203.189.7.94