Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boerne

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       216.177.160.0 - 216.177.191.255
CIDR:           216.177.160.0/19
NetName:        GVTC-1BLK
NetHandle:      NET-216-177-160-0-1
Parent:         NET216 (NET-216-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Guadalupe Valley Telephone Cooperative, Inc. (GVTC)
RegDate:        2001-01-12
Updated:        2012-02-24
Comment:        ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref:            https://rdap.arin.net/registry/ip/216.177.160.0


OrgName:        Guadalupe Valley Telephone Cooperative, Inc.
OrgId:          GVTC
Address:        36101 FM 3159
City:           New Braunfels
StateProv:      TX
PostalCode:     78132-5900
Country:        US
RegDate:        2001-01-12
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/GVTC


OrgAbuseHandle: ABUSE668-ARIN
OrgAbuseName:   Abuse Management
OrgAbusePhone:  +1-800-367-4882 
OrgAbuseEmail:  abuse@gvtc.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE668-ARIN

OrgTechHandle: NETWO618-ARIN
OrgTechName:   Network Operations
OrgTechPhone:  +1-830-885-8415 
OrgTechEmail:  chris.cooley@gvtc.net
OrgTechRef:    https://rdap.arin.net/registry/entity/NETWO618-ARIN

# end


# start

NetRange:       216.177.162.0 - 216.177.167.255
CIDR:           216.177.162.0/23, 216.177.164.0/22
NetName:        216-177-162-0---THROUGH---216-177-167-255
NetHandle:      NET-216-177-162-0-1
Parent:         GVTC-1BLK (NET-216-177-160-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       GVTC-ADSL-STATIC-POOL (C00427805)
RegDate:        2002-12-06
Updated:        2002-12-06
Ref:            https://rdap.arin.net/registry/ip/216.177.162.0


CustName:       GVTC-ADSL-STATIC-POOL
Address:        36101 FM 3159
City:           Smithson Valley
StateProv:      TX
PostalCode:     78132
Country:        US
RegDate:        2002-12-06
Updated:        2011-03-19
Ref:            https://rdap.arin.net/registry/entity/C00427805

OrgAbuseHandle: ABUSE668-ARIN
OrgAbuseName:   Abuse Management
OrgAbusePhone:  +1-800-367-4882 
OrgAbuseEmail:  abuse@gvtc.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE668-ARIN

OrgTechHandle: NETWO618-ARIN
OrgTechName:   Network Operations
OrgTechPhone:  +1-830-885-8415 
OrgTechEmail:  chris.cooley@gvtc.net
OrgTechRef:    https://rdap.arin.net/registry/entity/NETWO618-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.177.164.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32931
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.177.164.220.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033102 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 03:01:54 CST 2026
;; MSG SIZE  rcvd: 108
Host info
220.164.177.216.in-addr.arpa domain name pointer 216-177-164-220.block0.gvtc.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
220.164.177.216.in-addr.arpa	name = 216-177-164-220.block0.gvtc.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.140.188.6 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 07:06:31
103.30.180.145 attackspambots
Invalid user freeswitch from 103.30.180.145 port 41808
2020-03-18 07:24:45
222.209.85.197 attack
Mar 17 19:16:11 ns3042688 sshd\[23650\]: Invalid user db2fenc1 from 222.209.85.197
Mar 17 19:16:11 ns3042688 sshd\[23650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.209.85.197 
Mar 17 19:16:13 ns3042688 sshd\[23650\]: Failed password for invalid user db2fenc1 from 222.209.85.197 port 57398 ssh2
Mar 17 19:18:18 ns3042688 sshd\[23793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.209.85.197  user=root
Mar 17 19:18:19 ns3042688 sshd\[23793\]: Failed password for root from 222.209.85.197 port 58546 ssh2
...
2020-03-18 06:46:41
222.186.169.192 attackbots
SSH Authentication Attempts Exceeded
2020-03-18 07:37:04
222.186.180.41 attackbotsspam
Multiple SSH login attempts.
2020-03-18 07:02:28
62.109.26.125 attackspambots
Mar 17 22:54:26 cloud sshd[23857]: Failed password for root from 62.109.26.125 port 53994 ssh2
2020-03-18 07:01:29
213.148.223.38 attackspambots
Mar 17 23:49:31 h2779839 sshd[12957]: Invalid user squid from 213.148.223.38 port 50322
Mar 17 23:49:31 h2779839 sshd[12957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.148.223.38
Mar 17 23:49:31 h2779839 sshd[12957]: Invalid user squid from 213.148.223.38 port 50322
Mar 17 23:49:33 h2779839 sshd[12957]: Failed password for invalid user squid from 213.148.223.38 port 50322 ssh2
Mar 17 23:52:49 h2779839 sshd[12996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.148.223.38  user=root
Mar 17 23:52:51 h2779839 sshd[12996]: Failed password for root from 213.148.223.38 port 33816 ssh2
Mar 17 23:56:02 h2779839 sshd[13239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.148.223.38  user=root
Mar 17 23:56:05 h2779839 sshd[13239]: Failed password for root from 213.148.223.38 port 45558 ssh2
Mar 17 23:59:17 h2779839 sshd[13301]: pam_unix(sshd:auth): authentic
...
2020-03-18 07:17:16
186.4.123.139 attack
Invalid user ubuntu from 186.4.123.139 port 46381
2020-03-18 07:08:42
122.51.212.213 attack
sshd jail - ssh hack attempt
2020-03-18 06:48:17
31.20.193.52 attack
Mar 17 18:30:07 web8 sshd\[24516\]: Invalid user vagrant from 31.20.193.52
Mar 17 18:30:07 web8 sshd\[24516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.20.193.52
Mar 17 18:30:09 web8 sshd\[24516\]: Failed password for invalid user vagrant from 31.20.193.52 port 41700 ssh2
Mar 17 18:33:07 web8 sshd\[26012\]: Invalid user admin1 from 31.20.193.52
Mar 17 18:33:08 web8 sshd\[26012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.20.193.52
2020-03-18 07:07:50
200.17.114.215 attackspambots
SSH brute-force: detected 7 distinct usernames within a 24-hour window.
2020-03-18 07:08:06
139.162.123.103 attack
SIP/5060 Probe, BF, Hack -
2020-03-18 07:12:02
92.63.194.32 attackbotsspam
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-03-18 06:52:51
180.167.118.178 attackbotsspam
2020-03-17T22:56:10.410077shield sshd\[9510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.167.118.178  user=root
2020-03-17T22:56:12.496850shield sshd\[9510\]: Failed password for root from 180.167.118.178 port 57175 ssh2
2020-03-17T23:00:43.510284shield sshd\[10100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.167.118.178  user=root
2020-03-17T23:00:45.075097shield sshd\[10100\]: Failed password for root from 180.167.118.178 port 37479 ssh2
2020-03-17T23:05:47.665849shield sshd\[10773\]: Invalid user icmsectest from 180.167.118.178 port 46022
2020-03-18 07:09:59
104.206.128.70 attackspambots
03/17/2020-14:17:44.717284 104.206.128.70 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-03-18 07:31:11

Recently Reported IPs

2606:4700:10::6816:4127 2606:4700:10::6816:2831 190.194.63.89 83.214.180.73
79.101.59.22 94.74.71.128 133.175.179.150 56.119.49.73
35.203.211.190 192.253.248.169 189.236.124.17 110.77.248.163
2606:4700:10::ac43:85e 2606:4700:10::ac43:1391 2606:4700:10::6814:9378 2606:4700:10::ac43:2790
2606:4700:10::6816:1348 2606:4700:10::6814:4556 2606:4700:10::6816:4611 2606:4700:10::6816:1837