Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       216.167.0.0 - 216.167.127.255
CIDR:           216.167.0.0/17
NetName:        NTTA-216-167
NetHandle:      NET-216-167-0-0-1
Parent:         NET216 (NET-216-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   NTT America, Inc. (NTTAM-1)
RegDate:        2001-02-06
Updated:        2023-10-04
Comment:        Geofeed https://geo.ip.gin.ntt.net/geofeeds/geofeeds.csv
Comment:        Reassignment information for this block is
Comment:        available at rwhois.gin.ntt.net port 4321
Ref:            https://rdap.arin.net/registry/ip/216.167.0.0


OrgName:        NTT America, Inc.
OrgId:          NTTAM-1
Address:        15809 Bear Creek Pkwy
Address:        Suite 320
City:           Redmond
StateProv:      WA
PostalCode:     98052
Country:        US
RegDate:        2005-12-08
Updated:        2024-03-04
Ref:            https://rdap.arin.net/registry/entity/NTTAM-1

ReferralServer:  rwhois://rwhois.gin.ntt.net:4321

OrgTechHandle: VIPAR-ARIN
OrgTechName:   VIPAR
OrgTechPhone:  +1-877-688-6625 
OrgTechEmail:  ipr@gin.ntt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/VIPAR-ARIN

OrgAbuseHandle: NAAC-ARIN
OrgAbuseName:   NTT America Abuse Contact
OrgAbusePhone:  +1-877-688-6625 
OrgAbuseEmail:  abuse@ntt.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NAAC-ARIN

OrgNOCHandle: NASC-ARIN
OrgNOCName:   NTT America Support Contact
OrgNOCPhone:  +1-877-688-6625 
OrgNOCEmail:  ce-support@gin.ntt.net
OrgNOCRef:    https://rdap.arin.net/registry/entity/NASC-ARIN

OrgTechHandle: CANDE70-ARIN
OrgTechName:   Candela, Massimo 
OrgTechPhone:  +1-214-915-1366 
OrgTechEmail:  massimo@ntt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/CANDE70-ARIN

OrgRoutingHandle: PEERI-ARIN
OrgRoutingName:   Peering
OrgRoutingPhone:  +1-877-688-6625 
OrgRoutingEmail:  peering@ntt.net
OrgRoutingRef:    https://rdap.arin.net/registry/entity/PEERI-ARIN

RTechHandle: VIA4-ORG-ARIN
RTechName:   VIPAR
RTechPhone:  +1-877-688-6625 
RTechEmail:  ipr@gin.ntt.net
RTechRef:    https://rdap.arin.net/registry/entity/VIA4-ORG-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.gin.ntt.net:4321.

%rwhois V-1.5:0078b6:00 rwhois.gin.ntt.net (Vipar 0.1a. Comments to ipr@gin.ntt.net)
network:Class-Name:network
network:Auth-Area:216.167.0.0/17
network:ID:NETBLK-USV4-216-167-000.127.0.0.1/32
network:Handle:NETBLK-USV4-216-167-000
network:Network-Name:USV4-216-167-000
network:IP-Network:216.167.0.0/17
network:In-Addr-Server;I:GIN1-HST.127.0.0.1/32
network:In-Addr-Server;I:GIN2-HST.127.0.0.1/32
network:In-Addr-Server;I:GIN3-HST.127.0.0.1/32
network:In-Addr-Server;I:GIN4-HST.127.0.0.1/32
network:In-Addr-Server;I:GIN5-HST.127.0.0.1/32
network:IP-Network-Block:216.167.0.0 - 216.167.127.255
network:Org-Name:NTT DATA
network:Street-Address:8300 E Maplewood Ave. Suite 400
network:City:Greenwood Village
network:State:CO
network:Postal-Code:80111
network:Country-Code:US
network:Tech-Contact;I:GIN-BBV4.127.0.0.1/32
network:Created:2000-05-23 06:26:41+00
network:Updated:2025-07-11 13:36:18.422828+00

%ok
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.167.69.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34852
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.167.69.64.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025100300 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 03 22:21:51 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 64.69.167.216.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 216.167.69.64.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
118.43.225.109 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 23:05:59
212.129.49.177 attack
Apr 19 01:06:05 ms-srv sshd[33496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.49.177  user=root
Apr 19 01:06:07 ms-srv sshd[33496]: Failed password for invalid user root from 212.129.49.177 port 30343 ssh2
2020-02-15 23:40:10
212.121.127.104 attackspam
Mar 27 01:25:11 ms-srv sshd[57775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.121.127.104
Mar 27 01:25:13 ms-srv sshd[57775]: Failed password for invalid user prospector from 212.121.127.104 port 36980 ssh2
2020-02-15 23:45:06
212.13.103.211 attackbots
Jan 24 20:56:24 ms-srv sshd[11693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.13.103.211
Jan 24 20:56:26 ms-srv sshd[11693]: Failed password for invalid user ubuntu from 212.13.103.211 port 57138 ssh2
2020-02-15 23:38:10
212.145.242.222 attackbotsspam
Apr 25 11:41:11 ms-srv sshd[48344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.242.222
Apr 25 11:41:13 ms-srv sshd[48344]: Failed password for invalid user user from 212.145.242.222 port 49913 ssh2
2020-02-15 23:35:11
91.235.198.211 attackbots
Fail2Ban Ban Triggered
2020-02-15 23:18:10
212.129.2.62 attack
Jan 27 13:02:04 ms-srv sshd[29683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.2.62
Jan 27 13:02:05 ms-srv sshd[29683]: Failed password for invalid user ftptest from 212.129.2.62 port 34271 ssh2
2020-02-15 23:41:36
118.43.218.131 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 23:14:37
222.186.175.151 attackbotsspam
Feb 15 15:55:57 legacy sshd[27586]: Failed password for root from 222.186.175.151 port 6352 ssh2
Feb 15 15:56:10 legacy sshd[27586]: error: maximum authentication attempts exceeded for root from 222.186.175.151 port 6352 ssh2 [preauth]
Feb 15 15:56:17 legacy sshd[27598]: Failed password for root from 222.186.175.151 port 10570 ssh2
...
2020-02-15 23:05:37
61.177.172.128 attack
Feb 15 15:46:36 vps647732 sshd[8689]: Failed password for root from 61.177.172.128 port 47980 ssh2
Feb 15 15:46:39 vps647732 sshd[8689]: Failed password for root from 61.177.172.128 port 47980 ssh2
...
2020-02-15 22:57:59
121.46.84.58 attack
Feb 15 16:50:13 server sshd\[7205\]: Invalid user oracle4 from 121.46.84.58
Feb 15 16:50:13 server sshd\[7205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.84.58 
Feb 15 16:50:15 server sshd\[7205\]: Failed password for invalid user oracle4 from 121.46.84.58 port 53602 ssh2
Feb 15 16:54:17 server sshd\[7426\]: Invalid user test2 from 121.46.84.58
Feb 15 16:54:17 server sshd\[7426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.84.58 
...
2020-02-15 22:56:04
163.172.82.142 attackbotsspam
163.172.82.142 was recorded 5 times by 5 hosts attempting to connect to the following ports: 37810. Incident counter (4h, 24h, all-time): 5, 11, 1727
2020-02-15 23:12:23
212.156.17.218 attackspam
Nov  7 16:20:02 ms-srv sshd[56555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.156.17.218  user=root
Nov  7 16:20:03 ms-srv sshd[56555]: Failed password for invalid user root from 212.156.17.218 port 36418 ssh2
2020-02-15 23:30:40
212.129.139.44 attackspambots
Jun 27 12:15:27 ms-srv sshd[12500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.139.44  user=root
Jun 27 12:15:30 ms-srv sshd[12500]: Failed password for invalid user root from 212.129.139.44 port 32790 ssh2
2020-02-15 23:43:08
220.165.15.228 attackbotsspam
Jan 28 17:30:59 ms-srv sshd[22565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.165.15.228
Jan 28 17:31:01 ms-srv sshd[22565]: Failed password for invalid user rajasi from 220.165.15.228 port 41364 ssh2
2020-02-15 23:42:43

Recently Reported IPs

161.35.65.199 157.245.148.140 142.93.173.235 59.65.255.134
59.65.255.131 59.65.255.24 217.160.202.182 59.173.133.138
211.137.77.21 138.68.104.121 103.151.122.169 14.213.29.151
183.10.0.221 183.10.0.185 106.227.26.35 112.124.14.220
183.7.18.55 107.170.76.150 20.168.120.227 116.204.26.12