城市(city): Sainte Genevieve
省份(region): Missouri
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 64.82.192.0 - 64.82.255.255
CIDR: 64.82.192.0/18
NetName: BIGRIVER-64-82-192-0
NetHandle: NET-64-82-192-0-1
Parent: NET64 (NET-64-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Big River Telephone Company, LLC (BRT-15)
RegDate: 2002-12-13
Updated: 2012-06-26
Comment: IP Renumbering, replacing DN Servers.
Ref: https://rdap.arin.net/registry/ip/64.82.192.0
OrgName: Big River Telephone Company, LLC
OrgId: BRT-15
Address: 24 South Minnesota
City: Cape Girardeau
StateProv: MO
PostalCode: 63702
Country: US
RegDate: 2003-02-24
Updated: 2024-10-03
Ref: https://rdap.arin.net/registry/entity/BRT-15
ReferralServer: rwhois://rwhois.bigrivertel.net:4321
OrgTechHandle: BRN1-ARIN
OrgTechName: Big River NOC
OrgTechPhone: +1-800-455-1201
OrgTechEmail: noc@bigrivercom.com
OrgTechRef: https://rdap.arin.net/registry/entity/BRN1-ARIN
OrgTechHandle: SEABA2-ARIN
OrgTechName: Seabaugh, Cory
OrgTechPhone: +1-573-768-5302
OrgTechEmail: cseabaugh@bigrivercom.com
OrgTechRef: https://rdap.arin.net/registry/entity/SEABA2-ARIN
OrgAbuseHandle: BRN1-ARIN
OrgAbuseName: Big River NOC
OrgAbusePhone: +1-800-455-1201
OrgAbuseEmail: noc@bigrivercom.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/BRN1-ARIN
OrgRoutingHandle: CRABT42-ARIN
OrgRoutingName: Crabtree, Torrey
OrgRoutingPhone: +1-573-718-7745
OrgRoutingEmail: tcrabtree@bigrivercom.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/CRABT42-ARIN
OrgRoutingHandle: SEABA2-ARIN
OrgRoutingName: Seabaugh, Cory
OrgRoutingPhone: +1-573-768-5302
OrgRoutingEmail: cseabaugh@bigrivercom.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/SEABA2-ARIN
OrgNOCHandle: BRN1-ARIN
OrgNOCName: Big River NOC
OrgNOCPhone: +1-800-455-1201
OrgNOCEmail: noc@bigrivercom.com
OrgNOCRef: https://rdap.arin.net/registry/entity/BRN1-ARIN
OrgTechHandle: CRABT42-ARIN
OrgTechName: Crabtree, Torrey
OrgTechPhone: +1-573-718-7745
OrgTechEmail: tcrabtree@bigrivercom.com
OrgTechRef: https://rdap.arin.net/registry/entity/CRABT42-ARIN
OrgAbuseHandle: CONTA428-ARIN
OrgAbuseName: Contact, Abuse
OrgAbusePhone: +1-800-455-1201
OrgAbuseEmail: abuse@bigrivercom.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/CONTA428-ARIN
OrgDNSHandle: BRN1-ARIN
OrgDNSName: Big River NOC
OrgDNSPhone: +1-800-455-1201
OrgDNSEmail: noc@bigrivercom.com
OrgDNSRef: https://rdap.arin.net/registry/entity/BRN1-ARIN
RAbuseHandle: ABUSE3453-ARIN
RAbuseName: Abuse
RAbusePhone: +1-573-651-3373
RAbuseEmail: abuse@bigrivertelephone.com
RAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3453-ARIN
RNOCHandle: BRN1-ARIN
RNOCName: Big River NOC
RNOCPhone: +1-800-455-1201
RNOCEmail: noc@bigrivercom.com
RNOCRef: https://rdap.arin.net/registry/entity/BRN1-ARIN
RTechHandle: BRN1-ARIN
RTechName: Big River NOC
RTechPhone: +1-800-455-1201
RTechEmail: noc@bigrivercom.com
RTechRef: https://rdap.arin.net/registry/entity/BRN1-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.bigrivertel.net:4321.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.82.206.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45121
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;64.82.206.195. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026013101 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 01 02:00:07 CST 2026
;; MSG SIZE rcvd: 106
Host 195.206.82.64.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 195.206.82.64.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 83.172.105.112 | attackspam | DATE:2019-09-14 08:44:13, IP:83.172.105.112, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc) |
2019-09-15 00:27:52 |
| 77.42.123.144 | attackspambots | Automatic report - Port Scan Attack |
2019-09-15 00:28:38 |
| 120.52.152.16 | attackbotsspam | firewall-block, port(s): 520/tcp, 5985/tcp |
2019-09-14 23:21:14 |
| 43.229.88.193 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2019-09-15 00:29:38 |
| 202.120.37.100 | attack | Failed password for invalid user 0racle from 202.120.37.100 port 31026 ssh2 Invalid user ptf from 202.120.37.100 port 47456 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.120.37.100 Failed password for invalid user ptf from 202.120.37.100 port 47456 ssh2 Invalid user jjjj from 202.120.37.100 port 63731 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.120.37.100 |
2019-09-14 23:25:56 |
| 202.83.172.249 | attackbots | Automatic report - Banned IP Access |
2019-09-14 23:52:59 |
| 159.65.99.232 | attack | Sep 14 16:35:00 vps691689 sshd[11275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.99.232 Sep 14 16:35:03 vps691689 sshd[11275]: Failed password for invalid user maie from 159.65.99.232 port 38316 ssh2 ... |
2019-09-15 00:17:35 |
| 180.168.198.142 | attackbots | SSH Brute-Forcing (ownc) |
2019-09-15 00:05:16 |
| 221.127.3.98 | attack | Sep 14 01:44:54 dallas01 sshd[19016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.127.3.98 Sep 14 01:44:54 dallas01 sshd[19018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.127.3.98 Sep 14 01:44:56 dallas01 sshd[19016]: Failed password for invalid user pi from 221.127.3.98 port 47928 ssh2 |
2019-09-14 23:25:18 |
| 148.70.139.15 | attackbotsspam | $f2bV_matches |
2019-09-14 23:43:19 |
| 103.69.216.27 | attackspambots | port 23 attempt blocked |
2019-09-14 23:49:44 |
| 41.230.23.169 | attackspambots | Sep 14 03:03:02 plusreed sshd[6711]: Invalid user janice from 41.230.23.169 ... |
2019-09-14 23:39:46 |
| 149.202.214.11 | attack | F2B jail: sshd. Time: 2019-09-14 14:16:32, Reported by: VKReport |
2019-09-15 00:09:27 |
| 139.59.84.111 | attack | Automatic report - Banned IP Access |
2019-09-14 23:19:37 |
| 68.183.234.12 | attack | Sep 14 04:00:53 php1 sshd\[16058\]: Invalid user test from 68.183.234.12 Sep 14 04:00:53 php1 sshd\[16058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.234.12 Sep 14 04:00:54 php1 sshd\[16058\]: Failed password for invalid user test from 68.183.234.12 port 49224 ssh2 Sep 14 04:05:16 php1 sshd\[16484\]: Invalid user billy from 68.183.234.12 Sep 14 04:05:16 php1 sshd\[16484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.234.12 |
2019-09-15 00:06:48 |