城市(city): Boerne
省份(region): Texas
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 216.177.160.0 - 216.177.191.255
CIDR: 216.177.160.0/19
NetName: GVTC-1BLK
NetHandle: NET-216-177-160-0-1
Parent: NET216 (NET-216-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Guadalupe Valley Telephone Cooperative, Inc. (GVTC)
RegDate: 2001-01-12
Updated: 2012-02-24
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://rdap.arin.net/registry/ip/216.177.160.0
OrgName: Guadalupe Valley Telephone Cooperative, Inc.
OrgId: GVTC
Address: 36101 FM 3159
City: New Braunfels
StateProv: TX
PostalCode: 78132-5900
Country: US
RegDate: 2001-01-12
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/GVTC
OrgAbuseHandle: ABUSE668-ARIN
OrgAbuseName: Abuse Management
OrgAbusePhone: +1-800-367-4882
OrgAbuseEmail: abuse@gvtc.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE668-ARIN
OrgTechHandle: NETWO618-ARIN
OrgTechName: Network Operations
OrgTechPhone: +1-830-885-8415
OrgTechEmail: chris.cooley@gvtc.net
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO618-ARIN
# end
# start
NetRange: 216.177.162.0 - 216.177.167.255
CIDR: 216.177.162.0/23, 216.177.164.0/22
NetName: 216-177-162-0---THROUGH---216-177-167-255
NetHandle: NET-216-177-162-0-1
Parent: GVTC-1BLK (NET-216-177-160-0-1)
NetType: Reassigned
OriginAS:
Customer: GVTC-ADSL-STATIC-POOL (C00427805)
RegDate: 2002-12-06
Updated: 2002-12-06
Ref: https://rdap.arin.net/registry/ip/216.177.162.0
CustName: GVTC-ADSL-STATIC-POOL
Address: 36101 FM 3159
City: Smithson Valley
StateProv: TX
PostalCode: 78132
Country: US
RegDate: 2002-12-06
Updated: 2011-03-19
Ref: https://rdap.arin.net/registry/entity/C00427805
OrgAbuseHandle: ABUSE668-ARIN
OrgAbuseName: Abuse Management
OrgAbusePhone: +1-800-367-4882
OrgAbuseEmail: abuse@gvtc.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE668-ARIN
OrgTechHandle: NETWO618-ARIN
OrgTechName: Network Operations
OrgTechPhone: +1-830-885-8415
OrgTechEmail: chris.cooley@gvtc.net
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO618-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.177.164.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32931
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;216.177.164.220. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033102 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 03:01:54 CST 2026
;; MSG SIZE rcvd: 108
220.164.177.216.in-addr.arpa domain name pointer 216-177-164-220.block0.gvtc.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
220.164.177.216.in-addr.arpa name = 216-177-164-220.block0.gvtc.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.148.10.56 | attack | Postfix DNSBL listed. Trying to send SPAM. |
2019-10-22 05:50:24 |
| 51.254.220.20 | attackbots | Oct 21 22:01:03 DAAP sshd[20870]: Invalid user ethos from 51.254.220.20 port 33932 Oct 21 22:01:03 DAAP sshd[20870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.220.20 Oct 21 22:01:03 DAAP sshd[20870]: Invalid user ethos from 51.254.220.20 port 33932 Oct 21 22:01:05 DAAP sshd[20870]: Failed password for invalid user ethos from 51.254.220.20 port 33932 ssh2 Oct 21 22:04:49 DAAP sshd[20893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.220.20 user=root Oct 21 22:04:51 DAAP sshd[20893]: Failed password for root from 51.254.220.20 port 53455 ssh2 ... |
2019-10-22 05:55:04 |
| 222.186.175.140 | attackbots | Oct 21 17:46:43 ny01 sshd[4357]: Failed password for root from 222.186.175.140 port 8288 ssh2 Oct 21 17:47:01 ny01 sshd[4357]: error: maximum authentication attempts exceeded for root from 222.186.175.140 port 8288 ssh2 [preauth] Oct 21 17:47:11 ny01 sshd[4391]: Failed password for root from 222.186.175.140 port 5876 ssh2 |
2019-10-22 05:52:43 |
| 80.28.238.53 | attackspambots | Oct 21 22:04:50 MK-Soft-VM5 sshd[26935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.28.238.53 Oct 21 22:04:52 MK-Soft-VM5 sshd[26935]: Failed password for invalid user user from 80.28.238.53 port 47302 ssh2 ... |
2019-10-22 05:54:46 |
| 101.50.92.179 | attackspam | 2019-10-21 x@x 2019-10-21 21:16:11 unexpected disconnection while reading SMTP command from (ntl-50-92-179.nayatel.com) [101.50.92.179]:22124 I=[10.100.18.21]:25 (error: Connection reset by peer) 2019-10-21 x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=101.50.92.179 |
2019-10-22 05:36:40 |
| 117.103.2.226 | attackbotsspam | Oct 22 01:04:51 gw1 sshd[2004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.103.2.226 Oct 22 01:04:53 gw1 sshd[2004]: Failed password for invalid user craig from 117.103.2.226 port 50458 ssh2 ... |
2019-10-22 05:51:57 |
| 142.93.248.5 | attackspam | Oct 21 19:55:34 marvibiene sshd[7451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.248.5 user=root Oct 21 19:55:35 marvibiene sshd[7451]: Failed password for root from 142.93.248.5 port 32782 ssh2 Oct 21 20:04:52 marvibiene sshd[7504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.248.5 user=root Oct 21 20:04:54 marvibiene sshd[7504]: Failed password for root from 142.93.248.5 port 60308 ssh2 ... |
2019-10-22 05:50:07 |
| 45.234.11.118 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 21-10-2019 21:05:24. |
2019-10-22 05:28:40 |
| 20.184.24.172 | attack | (From caridad.gatenby@googlemail.com) Do you want more people to visit your website? Get hundreds of people who are ready to buy sent directly to your website. Boost revenues fast. Start seeing results in as little as 48 hours. For more info send a reply to: george4633wil@gmail.com |
2019-10-22 05:35:28 |
| 129.28.177.29 | attackbotsspam | 2019-10-21T20:37:08.549731abusebot-3.cloudsearch.cf sshd\[24008\]: Invalid user caonima124 from 129.28.177.29 port 34628 |
2019-10-22 05:38:46 |
| 106.12.84.115 | attackbots | 2019-10-21T20:05:17.465297abusebot-6.cloudsearch.cf sshd\[8298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.84.115 user=root |
2019-10-22 05:34:39 |
| 193.32.160.152 | attack | Oct 21 22:05:01 relay postfix/smtpd\[5545\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.152\]: 554 5.7.1 \ |
2019-10-22 05:43:41 |
| 69.171.79.217 | attack | $f2bV_matches |
2019-10-22 05:43:56 |
| 43.249.194.245 | attackbotsspam | 2019-10-21T21:37:00.322877abusebot-5.cloudsearch.cf sshd\[9541\]: Invalid user lee from 43.249.194.245 port 22064 |
2019-10-22 05:37:40 |
| 94.23.70.116 | attack | 2019-10-21T21:41:27.481160abusebot.cloudsearch.cf sshd\[13896\]: Invalid user hz from 94.23.70.116 port 40200 2019-10-21T21:41:27.485751abusebot.cloudsearch.cf sshd\[13896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.70.116 |
2019-10-22 05:52:28 |