Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Diego

Region: California

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       64.160.0.0 - 64.175.255.255
CIDR:           64.160.0.0/12
NetName:        SBCIS-SIS80
NetHandle:      NET-64-160-0-0-1
Parent:         NET64 (NET-64-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   AT&T Enterprises, LLC (AEL-360)
RegDate:        2000-06-02
Updated:        2024-12-05
Ref:            https://rdap.arin.net/registry/ip/64.160.0.0



OrgName:        AT&T Enterprises, LLC
OrgId:          AEL-360
Address:        208 S. Akard St.
City:           Dallas
StateProv:      TX
PostalCode:     75202
Country:        US
RegDate:        2024-11-22
Updated:        2025-10-29
Ref:            https://rdap.arin.net/registry/entity/AEL-360


OrgRoutingHandle: ROUTI59-ARIN
OrgRoutingName:   Routing POC
OrgRoutingPhone:  +1-999-999-9999 
OrgRoutingEmail:  routing_poc@att.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ROUTI59-ARIN

OrgTechHandle: ZS44-ARIN
OrgTechName:   IPAdmin-ATT Internet Services
OrgTechPhone:  +1-888-510-5545 
OrgTechEmail:  ipadmin@att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ZS44-ARIN

OrgAbuseHandle: ABUSE7-ARIN
OrgAbuseName:   abuse
OrgAbusePhone:  +1-919-319-8167 
OrgAbuseEmail:  abuse@att.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE7-ARIN

OrgTechHandle: ICC-ARIN
OrgTechName:   IP Team
OrgTechPhone:  +1-888-876-2382 
OrgTechEmail:  rm-ipspecialist@att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ICC-ARIN

# end


# start

NetRange:       64.167.172.192 - 64.167.172.199
CIDR:           64.167.172.192/29
NetName:        SBC-64-167-172-192-29-1104011654
NetHandle:      NET-64-167-172-192-1
Parent:         SBCIS-SIS80 (NET-64-160-0-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       COMPLETE FOOD SERVICE-110401131608 (C02728755)
RegDate:        2011-04-01
Updated:        2011-04-01
Ref:            https://rdap.arin.net/registry/ip/64.167.172.192


CustName:       COMPLETE FOOD SERVICE-110401131608
Address:        Private Address
City:           Plano
StateProv:      TX
PostalCode:     75075
Country:        US
RegDate:        2011-04-01
Updated:        2018-07-19
Ref:            https://rdap.arin.net/registry/entity/C02728755

OrgRoutingHandle: ROUTI59-ARIN
OrgRoutingName:   Routing POC
OrgRoutingPhone:  +1-999-999-9999 
OrgRoutingEmail:  routing_poc@att.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/ROUTI59-ARIN

OrgTechHandle: ZS44-ARIN
OrgTechName:   IPAdmin-ATT Internet Services
OrgTechPhone:  +1-888-510-5545 
OrgTechEmail:  ipadmin@att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ZS44-ARIN

OrgAbuseHandle: ABUSE7-ARIN
OrgAbuseName:   abuse
OrgAbusePhone:  +1-919-319-8167 
OrgAbuseEmail:  abuse@att.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE7-ARIN

OrgTechHandle: ICC-ARIN
OrgTechName:   IP Team
OrgTechPhone:  +1-888-876-2382 
OrgTechEmail:  rm-ipspecialist@att.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ICC-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.167.172.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19758
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.167.172.194.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040101 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 10:50:44 CST 2026
;; MSG SIZE  rcvd: 107
Host info
194.172.167.64.in-addr.arpa domain name pointer adsl-64-167-172-194.dsl.sndg02.pacbell.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
194.172.167.64.in-addr.arpa	name = adsl-64-167-172-194.dsl.sndg02.pacbell.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.89.4.30 attackbotsspam
Netgear DGN Device Remote Command Execution Vulnerability
2020-01-05 02:05:32
212.71.252.230 attack
Unauthorized connection attempt detected from IP address 212.71.252.230 to port 5008 [J]
2020-01-05 02:10:22
34.85.102.54 attack
Jan  4 19:36:33 master sshd[30035]: Failed password for invalid user zabbix from 34.85.102.54 port 42306 ssh2
Jan  4 19:39:45 master sshd[30047]: Failed password for invalid user phion from 34.85.102.54 port 34140 ssh2
2020-01-05 02:29:57
178.176.105.82 attackbotsspam
Unauthorized connection attempt detected from IP address 178.176.105.82 to port 2220 [J]
2020-01-05 02:14:22
177.126.161.114 attackbotsspam
Unauthorized connection attempt detected from IP address 177.126.161.114 to port 1433 [J]
2020-01-05 02:14:58
189.213.42.182 attackspam
Unauthorized connection attempt detected from IP address 189.213.42.182 to port 23 [J]
2020-01-05 02:36:02
95.220.135.142 attack
Unauthorized connection attempt detected from IP address 95.220.135.142 to port 80 [J]
2020-01-05 02:00:34
187.162.142.244 attackbotsspam
Unauthorized connection attempt detected from IP address 187.162.142.244 to port 23 [J]
2020-01-05 02:12:55
223.255.127.75 attackspam
Unauthorized connection attempt detected from IP address 223.255.127.75 to port 9200 [T]
2020-01-05 02:32:22
106.105.163.140 attackbotsspam
Unauthorized connection attempt detected from IP address 106.105.163.140 to port 23 [J]
2020-01-05 02:20:59
148.70.121.210 attackbotsspam
Unauthorized connection attempt detected from IP address 148.70.121.210 to port 2220 [J]
2020-01-05 02:16:56
221.176.177.46 attackspam
Unauthorized connection attempt detected from IP address 221.176.177.46 to port 1433 [J]
2020-01-05 02:09:38
106.13.191.19 attackbotsspam
Unauthorized connection attempt detected from IP address 106.13.191.19 to port 2220 [J]
2020-01-05 02:21:26
223.244.83.13 attack
Unauthorized connection attempt detected from IP address 223.244.83.13 to port 2220 [J]
2020-01-05 02:32:35
187.162.33.225 attackspambots
Unauthorized connection attempt detected from IP address 187.162.33.225 to port 23 [J]
2020-01-05 02:13:22

Recently Reported IPs

223.242.208.65 66.132.195.75 2606:4700:10::6816:739 2606:4700:10::6814:6254
2606:4700:10::6814:6092 2606:4700:10::6816:2853 203.160.68.79 203.160.68.9
134.8.20.222 38.158.156.54 77.83.39.42 10.229.126.182
101.37.118.183 40.124.175.174 2606:4700:10::6814:8842 2606:4700:10::6816:2184
2606:4700:10::6816:3384 2606:4700:10::6814:8611 2606:4700:10::6814:9090 2606:4700:10::6814:7163