必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Sainte Genevieve

省份(region): Missouri

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       64.82.192.0 - 64.82.255.255
CIDR:           64.82.192.0/18
NetName:        BIGRIVER-64-82-192-0
NetHandle:      NET-64-82-192-0-1
Parent:         NET64 (NET-64-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Big River Telephone Company, LLC (BRT-15)
RegDate:        2002-12-13
Updated:        2012-06-26
Comment:        IP Renumbering, replacing DN Servers.
Ref:            https://rdap.arin.net/registry/ip/64.82.192.0


OrgName:        Big River Telephone Company, LLC
OrgId:          BRT-15
Address:        24 South Minnesota
City:           Cape Girardeau
StateProv:      MO
PostalCode:     63702
Country:        US
RegDate:        2003-02-24
Updated:        2024-10-03
Ref:            https://rdap.arin.net/registry/entity/BRT-15

ReferralServer:  rwhois://rwhois.bigrivertel.net:4321

OrgTechHandle: BRN1-ARIN
OrgTechName:   Big River NOC
OrgTechPhone:  +1-800-455-1201 
OrgTechEmail:  noc@bigrivercom.com
OrgTechRef:    https://rdap.arin.net/registry/entity/BRN1-ARIN

OrgTechHandle: SEABA2-ARIN
OrgTechName:   Seabaugh, Cory 
OrgTechPhone:  +1-573-768-5302 
OrgTechEmail:  cseabaugh@bigrivercom.com
OrgTechRef:    https://rdap.arin.net/registry/entity/SEABA2-ARIN

OrgAbuseHandle: BRN1-ARIN
OrgAbuseName:   Big River NOC
OrgAbusePhone:  +1-800-455-1201 
OrgAbuseEmail:  noc@bigrivercom.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/BRN1-ARIN

OrgRoutingHandle: CRABT42-ARIN
OrgRoutingName:   Crabtree, Torrey 
OrgRoutingPhone:  +1-573-718-7745 
OrgRoutingEmail:  tcrabtree@bigrivercom.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/CRABT42-ARIN

OrgRoutingHandle: SEABA2-ARIN
OrgRoutingName:   Seabaugh, Cory 
OrgRoutingPhone:  +1-573-768-5302 
OrgRoutingEmail:  cseabaugh@bigrivercom.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/SEABA2-ARIN

OrgNOCHandle: BRN1-ARIN
OrgNOCName:   Big River NOC
OrgNOCPhone:  +1-800-455-1201 
OrgNOCEmail:  noc@bigrivercom.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/BRN1-ARIN

OrgTechHandle: CRABT42-ARIN
OrgTechName:   Crabtree, Torrey 
OrgTechPhone:  +1-573-718-7745 
OrgTechEmail:  tcrabtree@bigrivercom.com
OrgTechRef:    https://rdap.arin.net/registry/entity/CRABT42-ARIN

OrgAbuseHandle: CONTA428-ARIN
OrgAbuseName:   Contact, Abuse 
OrgAbusePhone:  +1-800-455-1201 
OrgAbuseEmail:  abuse@bigrivercom.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CONTA428-ARIN

OrgDNSHandle: BRN1-ARIN
OrgDNSName:   Big River NOC
OrgDNSPhone:  +1-800-455-1201 
OrgDNSEmail:  noc@bigrivercom.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/BRN1-ARIN

RAbuseHandle: ABUSE3453-ARIN
RAbuseName:   Abuse
RAbusePhone:  +1-573-651-3373 
RAbuseEmail:  abuse@bigrivertelephone.com
RAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3453-ARIN

RNOCHandle: BRN1-ARIN
RNOCName:   Big River NOC
RNOCPhone:  +1-800-455-1201 
RNOCEmail:  noc@bigrivercom.com
RNOCRef:    https://rdap.arin.net/registry/entity/BRN1-ARIN

RTechHandle: BRN1-ARIN
RTechName:   Big River NOC
RTechPhone:  +1-800-455-1201 
RTechEmail:  noc@bigrivercom.com
RTechRef:    https://rdap.arin.net/registry/entity/BRN1-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.bigrivertel.net:4321.
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.82.206.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45121
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.82.206.195.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026013101 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 01 02:00:07 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 195.206.82.64.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 195.206.82.64.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
83.172.105.112 attackspam
DATE:2019-09-14 08:44:13, IP:83.172.105.112, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-09-15 00:27:52
77.42.123.144 attackspambots
Automatic report - Port Scan Attack
2019-09-15 00:28:38
120.52.152.16 attackbotsspam
firewall-block, port(s): 520/tcp, 5985/tcp
2019-09-14 23:21:14
43.229.88.193 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-09-15 00:29:38
202.120.37.100 attack
Failed password for invalid user 0racle from 202.120.37.100 port 31026 ssh2
Invalid user ptf from 202.120.37.100 port 47456
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.120.37.100
Failed password for invalid user ptf from 202.120.37.100 port 47456 ssh2
Invalid user jjjj from 202.120.37.100 port 63731
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.120.37.100
2019-09-14 23:25:56
202.83.172.249 attackbots
Automatic report - Banned IP Access
2019-09-14 23:52:59
159.65.99.232 attack
Sep 14 16:35:00 vps691689 sshd[11275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.99.232
Sep 14 16:35:03 vps691689 sshd[11275]: Failed password for invalid user maie from 159.65.99.232 port 38316 ssh2
...
2019-09-15 00:17:35
180.168.198.142 attackbots
SSH Brute-Forcing (ownc)
2019-09-15 00:05:16
221.127.3.98 attack
Sep 14 01:44:54 dallas01 sshd[19016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.127.3.98
Sep 14 01:44:54 dallas01 sshd[19018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.127.3.98
Sep 14 01:44:56 dallas01 sshd[19016]: Failed password for invalid user pi from 221.127.3.98 port 47928 ssh2
2019-09-14 23:25:18
148.70.139.15 attackbotsspam
$f2bV_matches
2019-09-14 23:43:19
103.69.216.27 attackspambots
port 23 attempt blocked
2019-09-14 23:49:44
41.230.23.169 attackspambots
Sep 14 03:03:02 plusreed sshd[6711]: Invalid user janice from 41.230.23.169
...
2019-09-14 23:39:46
149.202.214.11 attack
F2B jail: sshd. Time: 2019-09-14 14:16:32, Reported by: VKReport
2019-09-15 00:09:27
139.59.84.111 attack
Automatic report - Banned IP Access
2019-09-14 23:19:37
68.183.234.12 attack
Sep 14 04:00:53 php1 sshd\[16058\]: Invalid user test from 68.183.234.12
Sep 14 04:00:53 php1 sshd\[16058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.234.12
Sep 14 04:00:54 php1 sshd\[16058\]: Failed password for invalid user test from 68.183.234.12 port 49224 ssh2
Sep 14 04:05:16 php1 sshd\[16484\]: Invalid user billy from 68.183.234.12
Sep 14 04:05:16 php1 sshd\[16484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.234.12
2019-09-15 00:06:48

最近上报的IP列表

80.94.92.111 27.9.178.164 102.69.167.14 135.237.123.246
162.216.149.201 235.148.2.192 68.183.219.141 165.232.113.71
164.92.161.240 104.248.130.58 218.3.40.210 176.65.139.16
100.27.169.19 165.232.100.219 180.153.236.160 151.235.33.146
117.72.204.78 93.158.91.33 93.158.90.53 34.205.74.42