City: Boerne
Region: Texas
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 216.177.160.0 - 216.177.191.255
CIDR: 216.177.160.0/19
NetName: GVTC-1BLK
NetHandle: NET-216-177-160-0-1
Parent: NET216 (NET-216-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Guadalupe Valley Telephone Cooperative, Inc. (GVTC)
RegDate: 2001-01-12
Updated: 2012-02-24
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://rdap.arin.net/registry/ip/216.177.160.0
OrgName: Guadalupe Valley Telephone Cooperative, Inc.
OrgId: GVTC
Address: 36101 FM 3159
City: New Braunfels
StateProv: TX
PostalCode: 78132-5900
Country: US
RegDate: 2001-01-12
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/GVTC
OrgAbuseHandle: ABUSE668-ARIN
OrgAbuseName: Abuse Management
OrgAbusePhone: +1-800-367-4882
OrgAbuseEmail: abuse@gvtc.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE668-ARIN
OrgTechHandle: NETWO618-ARIN
OrgTechName: Network Operations
OrgTechPhone: +1-830-885-8415
OrgTechEmail: chris.cooley@gvtc.net
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO618-ARIN
# end
# start
NetRange: 216.177.162.0 - 216.177.167.255
CIDR: 216.177.162.0/23, 216.177.164.0/22
NetName: 216-177-162-0---THROUGH---216-177-167-255
NetHandle: NET-216-177-162-0-1
Parent: GVTC-1BLK (NET-216-177-160-0-1)
NetType: Reassigned
OriginAS:
Customer: GVTC-ADSL-STATIC-POOL (C00427805)
RegDate: 2002-12-06
Updated: 2002-12-06
Ref: https://rdap.arin.net/registry/ip/216.177.162.0
CustName: GVTC-ADSL-STATIC-POOL
Address: 36101 FM 3159
City: Smithson Valley
StateProv: TX
PostalCode: 78132
Country: US
RegDate: 2002-12-06
Updated: 2011-03-19
Ref: https://rdap.arin.net/registry/entity/C00427805
OrgAbuseHandle: ABUSE668-ARIN
OrgAbuseName: Abuse Management
OrgAbusePhone: +1-800-367-4882
OrgAbuseEmail: abuse@gvtc.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE668-ARIN
OrgTechHandle: NETWO618-ARIN
OrgTechName: Network Operations
OrgTechPhone: +1-830-885-8415
OrgTechEmail: chris.cooley@gvtc.net
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO618-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.177.164.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32931
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;216.177.164.220. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033102 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 03:01:54 CST 2026
;; MSG SIZE rcvd: 108
220.164.177.216.in-addr.arpa domain name pointer 216-177-164-220.block0.gvtc.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
220.164.177.216.in-addr.arpa name = 216-177-164-220.block0.gvtc.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 104.140.188.6 | attackspam | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-03-18 07:06:31 |
| 103.30.180.145 | attackspambots | Invalid user freeswitch from 103.30.180.145 port 41808 |
2020-03-18 07:24:45 |
| 222.209.85.197 | attack | Mar 17 19:16:11 ns3042688 sshd\[23650\]: Invalid user db2fenc1 from 222.209.85.197 Mar 17 19:16:11 ns3042688 sshd\[23650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.209.85.197 Mar 17 19:16:13 ns3042688 sshd\[23650\]: Failed password for invalid user db2fenc1 from 222.209.85.197 port 57398 ssh2 Mar 17 19:18:18 ns3042688 sshd\[23793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.209.85.197 user=root Mar 17 19:18:19 ns3042688 sshd\[23793\]: Failed password for root from 222.209.85.197 port 58546 ssh2 ... |
2020-03-18 06:46:41 |
| 222.186.169.192 | attackbots | SSH Authentication Attempts Exceeded |
2020-03-18 07:37:04 |
| 222.186.180.41 | attackbotsspam | Multiple SSH login attempts. |
2020-03-18 07:02:28 |
| 62.109.26.125 | attackspambots | Mar 17 22:54:26 cloud sshd[23857]: Failed password for root from 62.109.26.125 port 53994 ssh2 |
2020-03-18 07:01:29 |
| 213.148.223.38 | attackspambots | Mar 17 23:49:31 h2779839 sshd[12957]: Invalid user squid from 213.148.223.38 port 50322 Mar 17 23:49:31 h2779839 sshd[12957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.148.223.38 Mar 17 23:49:31 h2779839 sshd[12957]: Invalid user squid from 213.148.223.38 port 50322 Mar 17 23:49:33 h2779839 sshd[12957]: Failed password for invalid user squid from 213.148.223.38 port 50322 ssh2 Mar 17 23:52:49 h2779839 sshd[12996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.148.223.38 user=root Mar 17 23:52:51 h2779839 sshd[12996]: Failed password for root from 213.148.223.38 port 33816 ssh2 Mar 17 23:56:02 h2779839 sshd[13239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.148.223.38 user=root Mar 17 23:56:05 h2779839 sshd[13239]: Failed password for root from 213.148.223.38 port 45558 ssh2 Mar 17 23:59:17 h2779839 sshd[13301]: pam_unix(sshd:auth): authentic ... |
2020-03-18 07:17:16 |
| 186.4.123.139 | attack | Invalid user ubuntu from 186.4.123.139 port 46381 |
2020-03-18 07:08:42 |
| 122.51.212.213 | attack | sshd jail - ssh hack attempt |
2020-03-18 06:48:17 |
| 31.20.193.52 | attack | Mar 17 18:30:07 web8 sshd\[24516\]: Invalid user vagrant from 31.20.193.52 Mar 17 18:30:07 web8 sshd\[24516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.20.193.52 Mar 17 18:30:09 web8 sshd\[24516\]: Failed password for invalid user vagrant from 31.20.193.52 port 41700 ssh2 Mar 17 18:33:07 web8 sshd\[26012\]: Invalid user admin1 from 31.20.193.52 Mar 17 18:33:08 web8 sshd\[26012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.20.193.52 |
2020-03-18 07:07:50 |
| 200.17.114.215 | attackspambots | SSH brute-force: detected 7 distinct usernames within a 24-hour window. |
2020-03-18 07:08:06 |
| 139.162.123.103 | attack | SIP/5060 Probe, BF, Hack - |
2020-03-18 07:12:02 |
| 92.63.194.32 | attackbotsspam | $f2bV_matches | Triggered by Fail2Ban at Vostok web server |
2020-03-18 06:52:51 |
| 180.167.118.178 | attackbotsspam | 2020-03-17T22:56:10.410077shield sshd\[9510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.167.118.178 user=root 2020-03-17T22:56:12.496850shield sshd\[9510\]: Failed password for root from 180.167.118.178 port 57175 ssh2 2020-03-17T23:00:43.510284shield sshd\[10100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.167.118.178 user=root 2020-03-17T23:00:45.075097shield sshd\[10100\]: Failed password for root from 180.167.118.178 port 37479 ssh2 2020-03-17T23:05:47.665849shield sshd\[10773\]: Invalid user icmsectest from 180.167.118.178 port 46022 |
2020-03-18 07:09:59 |
| 104.206.128.70 | attackspambots | 03/17/2020-14:17:44.717284 104.206.128.70 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-03-18 07:31:11 |