City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 134.8.0.0 - 134.8.255.255
CIDR: 134.8.0.0/16
NetName: ALTIUM-NET
NetHandle: NET-134-8-0-0-1
Parent: NET134 (NET-134-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: ALTIUM (ALTIUM)
RegDate: 1989-04-11
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/134.8.0.0
OrgName: ALTIUM
OrgId: ALTIUM
Address: 4225 Executive Square
Address: Suite 1000
City: La Jolla
StateProv: CA
PostalCode: 92037
Country: US
RegDate: 1989-04-11
Updated: 2025-02-12
Ref: https://rdap.arin.net/registry/entity/ALTIUM
OrgAbuseHandle: HAXHI1-ARIN
OrgAbuseName: Haxhijaha, Selman
OrgAbusePhone: +1-858-864-1530
OrgAbuseEmail: selman.haxhijaha@altium.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/HAXHI1-ARIN
OrgTechHandle: HAXHI1-ARIN
OrgTechName: Haxhijaha, Selman
OrgTechPhone: +1-858-864-1530
OrgTechEmail: selman.haxhijaha@altium.com
OrgTechRef: https://rdap.arin.net/registry/entity/HAXHI1-ARIN
OrgNOCHandle: HAXHI1-ARIN
OrgNOCName: Haxhijaha, Selman
OrgNOCPhone: +1-858-864-1530
OrgNOCEmail: selman.haxhijaha@altium.com
OrgNOCRef: https://rdap.arin.net/registry/entity/HAXHI1-ARIN
OrgNOCHandle: LOWER105-ARIN
OrgNOCName: Lowery, David
OrgNOCPhone: +1-469-200-6075
OrgNOCEmail: david.lowery@altium.com
OrgNOCRef: https://rdap.arin.net/registry/entity/LOWER105-ARIN
OrgTechHandle: LOWER105-ARIN
OrgTechName: Lowery, David
OrgTechPhone: +1-469-200-6075
OrgTechEmail: david.lowery@altium.com
OrgTechRef: https://rdap.arin.net/registry/entity/LOWER105-ARIN
OrgAbuseHandle: LOWER105-ARIN
OrgAbuseName: Lowery, David
OrgAbusePhone: +1-469-200-6075
OrgAbuseEmail: david.lowery@altium.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/LOWER105-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.8.20.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64844
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.8.20.222. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040101 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 11:10:46 CST 2026
;; MSG SIZE rcvd: 105
Host 222.20.8.134.in-addr.arpa not found: 2(SERVFAIL)
server can't find 134.8.20.222.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 198.199.92.246 | attack | 198.199.92.246 - - [17/Sep/2020:06:16:43 +0000] "GET / HTTP/1.1" 403 153 "-" "Mozilla/5.0 zgrab/0.x" |
2020-09-17 16:47:46 |
| 51.68.122.155 | attackspambots | SSH invalid-user multiple login attempts |
2020-09-17 16:45:52 |
| 164.132.46.14 | attackspam | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-09-17 17:02:01 |
| 87.231.73.54 | attackspam | php WP PHPmyadamin ABUSE blocked for 12h |
2020-09-17 17:09:33 |
| 115.160.242.186 | attackbots | Honeypot attack, port: 445, PTR: static-186.242.160.115-tataidc.co.in. |
2020-09-17 16:58:36 |
| 222.186.169.194 | attackspam | Sep 17 11:05:06 marvibiene sshd[25767]: Failed password for root from 222.186.169.194 port 8172 ssh2 Sep 17 11:05:11 marvibiene sshd[25767]: Failed password for root from 222.186.169.194 port 8172 ssh2 |
2020-09-17 17:13:20 |
| 111.229.227.125 | attackbots | (sshd) Failed SSH login from 111.229.227.125 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 17 03:44:19 server4 sshd[22752]: Invalid user rosenblum from 111.229.227.125 Sep 17 03:44:19 server4 sshd[22752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.227.125 Sep 17 03:44:21 server4 sshd[22752]: Failed password for invalid user rosenblum from 111.229.227.125 port 35558 ssh2 Sep 17 03:46:32 server4 sshd[24176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.227.125 user=root Sep 17 03:46:33 server4 sshd[24176]: Failed password for root from 111.229.227.125 port 53716 ssh2 |
2020-09-17 16:43:18 |
| 211.22.154.223 | attackbotsspam | Sep 17 08:53:38 scw-6657dc sshd[22315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.22.154.223 user=root Sep 17 08:53:38 scw-6657dc sshd[22315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.22.154.223 user=root Sep 17 08:53:39 scw-6657dc sshd[22315]: Failed password for root from 211.22.154.223 port 54850 ssh2 ... |
2020-09-17 17:07:00 |
| 197.5.145.88 | attack | Invalid user irma from 197.5.145.88 port 9146 |
2020-09-17 16:56:34 |
| 89.178.206.37 | attack |
|
2020-09-17 17:08:23 |
| 178.128.36.26 | attack | [Wed Sep 16 20:12:13.444379 2020] [php7:error] [pid 82746] [client 178.128.36.26:55123] script /Library/Server/Web/Data/Sites/customvisuals.com/wp-login.php not found or unable to stat, referer: http://mail.rhondaschienle.com/wp-login.php |
2020-09-17 16:35:01 |
| 167.114.113.141 | attackspam | Sep 17 10:54:52 cho sshd[3108869]: Invalid user ftp from 167.114.113.141 port 57278 Sep 17 10:54:52 cho sshd[3108869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.113.141 Sep 17 10:54:52 cho sshd[3108869]: Invalid user ftp from 167.114.113.141 port 57278 Sep 17 10:54:55 cho sshd[3108869]: Failed password for invalid user ftp from 167.114.113.141 port 57278 ssh2 Sep 17 10:59:18 cho sshd[3109081]: Invalid user rpc from 167.114.113.141 port 41686 ... |
2020-09-17 17:05:19 |
| 160.178.254.157 | attackbots | Unauthorized connection attempt from IP address 160.178.254.157 on Port 445(SMB) |
2020-09-17 17:05:31 |
| 79.166.186.140 | attackspambots | Hits on port : 23 |
2020-09-17 17:09:49 |
| 49.88.112.67 | attackbotsspam | Sep 17 08:30:48 localhost sshd[2773267]: Failed password for root from 49.88.112.67 port 52782 ssh2 Sep 17 08:30:44 localhost sshd[2773267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.67 user=root Sep 17 08:30:45 localhost sshd[2773267]: Failed password for root from 49.88.112.67 port 52782 ssh2 Sep 17 08:30:48 localhost sshd[2773267]: Failed password for root from 49.88.112.67 port 52782 ssh2 Sep 17 08:30:52 localhost sshd[2773267]: Failed password for root from 49.88.112.67 port 52782 ssh2 ... |
2020-09-17 16:51:38 |