必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Farmington

省份(region): Missouri

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b'#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       64.82.192.0 - 64.82.255.255
CIDR:           64.82.192.0/18
NetName:        BIGRIVER-64-82-192-0
NetHandle:      NET-64-82-192-0-1
Parent:         NET64 (NET-64-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Big River Telephone Company, LLC (BRT-15)
RegDate:        2002-12-13
Updated:        2012-06-26
Comment:        IP Renumbering, replacing DN Servers.
Ref:            https://rdap.arin.net/registry/ip/64.82.192.0


OrgName:        Big River Telephone Company, LLC
OrgId:          BRT-15
Address:        24 South Minnesota
City:           Cape Girardeau
StateProv:      MO
PostalCode:     63702
Country:        US
RegDate:        2003-02-24
Updated:        2024-10-03
Ref:            https://rdap.arin.net/registry/entity/BRT-15

ReferralServer:  rwhois://rwhois.bigrivertel.net:4321

OrgRoutingHandle: SEABA2-ARIN
OrgRoutingName:   Seabaugh, Cory 
OrgRoutingPhone:  +1-314-225-2153 
OrgRoutingEmail:  cseabaugh@bigrivercom.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/SEABA2-ARIN

OrgDNSHandle: BRN1-ARIN
OrgDNSName:   Big River NOC
OrgDNSPhone:  +1-800-455-1201 
OrgDNSEmail:  noc@bigrivercom.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/BRN1-ARIN

OrgNOCHandle: BRN1-ARIN
OrgNOCName:   Big River NOC
OrgNOCPhone:  +1-800-455-1201 
OrgNOCEmail:  noc@bigrivercom.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/BRN1-ARIN

OrgAbuseHandle: CONTA428-ARIN
OrgAbuseName:   Contact, Abuse 
OrgAbusePhone:  +1-800-455-1201 
OrgAbuseEmail:  abuse@bigrivercom.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CONTA428-ARIN

OrgTechHandle: CRABT42-ARIN
OrgTechName:   Crabtree, Torrey 
OrgTechPhone:  +1-573-388-3768 
OrgTechEmail:  tcrabtree@bigrivercom.com
OrgTechRef:    https://rdap.arin.net/registry/entity/CRABT42-ARIN

OrgTechHandle: BRN1-ARIN
OrgTechName:   Big River NOC
OrgTechPhone:  +1-800-455-1201 
OrgTechEmail:  noc@bigrivercom.com
OrgTechRef:    https://rdap.arin.net/registry/entity/BRN1-ARIN

OrgTechHandle: SEABA2-ARIN
OrgTechName:   Seabaugh, Cory 
OrgTechPhone:  +1-314-225-2153 
OrgTechEmail:  cseabaugh@bigrivercom.com
OrgTechRef:    https://rdap.arin.net/registry/entity/SEABA2-ARIN

OrgAbuseHandle: BRN1-ARIN
OrgAbuseName:   Big River NOC
OrgAbusePhone:  +1-800-455-1201 
OrgAbuseEmail:  noc@bigrivercom.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/BRN1-ARIN

OrgRoutingHandle: CRABT42-ARIN
OrgRoutingName:   Crabtree, Torrey 
OrgRoutingPhone:  +1-573-388-3768 
OrgRoutingEmail:  tcrabtree@bigrivercom.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/CRABT42-ARIN

RNOCHandle: BRN1-ARIN
RNOCName:   Big River NOC
RNOCPhone:  +1-800-455-1201 
RNOCEmail:  noc@bigrivercom.com
RNOCRef:    https://rdap.arin.net/registry/entity/BRN1-ARIN

RAbuseHandle: ABUSE3453-ARIN
RAbuseName:   Abuse
RAbusePhone:  +1-573-651-3373 
RAbuseEmail:  abuse@bigrivertelephone.com
RAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3453-ARIN

RTechHandle: BRN1-ARIN
RTechName:   Big River NOC
RTechPhone:  +1-800-455-1201 
RTechEmail:  noc@bigrivercom.com
RTechRef:    https://rdap.arin.net/registry/entity/BRN1-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.bigrivertel.net:4321.'
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.82.228.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31790
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.82.228.45.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026022000 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 20 18:30:29 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
45.228.82.64.in-addr.arpa domain name pointer tf1.bigrivertel.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.228.82.64.in-addr.arpa	name = tf1.bigrivertel.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.56.153.231 attack
Sep 29 06:40:58 web1 sshd\[1375\]: Invalid user weblogic from 185.56.153.231
Sep 29 06:40:58 web1 sshd\[1375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.56.153.231
Sep 29 06:41:00 web1 sshd\[1375\]: Failed password for invalid user weblogic from 185.56.153.231 port 37482 ssh2
Sep 29 06:46:09 web1 sshd\[1944\]: Invalid user user from 185.56.153.231
Sep 29 06:46:09 web1 sshd\[1944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.56.153.231
2019-09-30 02:19:40
96.67.115.46 attackbotsspam
Sep 29 14:22:22 apollo sshd\[22490\]: Invalid user ubnt from 96.67.115.46Sep 29 14:22:24 apollo sshd\[22490\]: Failed password for invalid user ubnt from 96.67.115.46 port 59442 ssh2Sep 29 14:30:47 apollo sshd\[22594\]: Invalid user norm from 96.67.115.46
...
2019-09-30 02:34:27
139.159.27.62 attack
Sep 29 17:45:02 gw1 sshd[4556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.159.27.62
Sep 29 17:45:05 gw1 sshd[4556]: Failed password for invalid user spamfiltrer from 139.159.27.62 port 35702 ssh2
...
2019-09-30 02:11:45
205.185.120.190 attackbotsspam
2019-09-29T18:38:41.286540abusebot-5.cloudsearch.cf sshd\[32158\]: Invalid user 12345 from 205.185.120.190 port 33014
2019-09-30 02:38:50
221.8.151.227 attackspambots
(Sep 29)  LEN=40 TTL=49 ID=45888 TCP DPT=8080 WINDOW=27384 SYN 
 (Sep 29)  LEN=40 TTL=49 ID=50987 TCP DPT=8080 WINDOW=43308 SYN 
 (Sep 29)  LEN=40 TTL=49 ID=47442 TCP DPT=8080 WINDOW=43308 SYN 
 (Sep 29)  LEN=40 TTL=49 ID=62146 TCP DPT=8080 WINDOW=23229 SYN 
 (Sep 28)  LEN=40 TTL=49 ID=8667 TCP DPT=8080 WINDOW=43308 SYN 
 (Sep 28)  LEN=40 TTL=49 ID=7769 TCP DPT=8080 WINDOW=27384 SYN 
 (Sep 28)  LEN=40 TTL=49 ID=11100 TCP DPT=8080 WINDOW=23229 SYN 
 (Sep 27)  LEN=40 TTL=49 ID=41269 TCP DPT=8080 WINDOW=23229 SYN 
 (Sep 27)  LEN=40 TTL=49 ID=27566 TCP DPT=23 WINDOW=17061 SYN 
 (Sep 26)  LEN=40 TTL=49 ID=4025 TCP DPT=8080 WINDOW=27384 SYN 
 (Sep 26)  LEN=40 TTL=49 ID=23476 TCP DPT=8080 WINDOW=43308 SYN 
 (Sep 24)  LEN=40 TTL=48 ID=59979 TCP DPT=8080 WINDOW=27384 SYN 
 (Sep 24)  LEN=40 TTL=49 ID=16754 TCP DPT=8080 WINDOW=23229 SYN
2019-09-30 02:18:14
142.93.109.74 attack
Sep 29 05:35:42 wp sshd[19413]: Did not receive identification string from 142.93.109.74
Sep 29 05:37:43 wp sshd[19442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.109.74  user=r.r
Sep 29 05:37:44 wp sshd[19442]: Failed password for r.r from 142.93.109.74 port 43146 ssh2
Sep 29 05:37:44 wp sshd[19442]: Received disconnect from 142.93.109.74: 11: Normal Shutdown, Thank you for playing [preauth]
Sep 29 05:38:59 wp sshd[19454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.109.74  user=r.r
Sep 29 05:39:01 wp sshd[19454]: Failed password for r.r from 142.93.109.74 port 52818 ssh2
Sep 29 05:39:01 wp sshd[19454]: Received disconnect from 142.93.109.74: 11: Normal Shutdown, Thank you for playing [preauth]
Sep 29 05:40:12 wp sshd[19474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.109.74  user=r.r
Sep 29 05:40:14 wp sshd[19474]:........
-------------------------------
2019-09-30 02:40:33
116.68.127.12 attackspam
Unauthorized connection attempt from IP address 116.68.127.12 on Port 445(SMB)
2019-09-30 02:32:35
37.145.241.142 attackspam
Unauthorized connection attempt from IP address 37.145.241.142 on Port 445(SMB)
2019-09-30 02:37:20
102.114.39.70 attackbots
34567/tcp
[2019-09-29]1pkt
2019-09-30 02:38:26
183.134.199.68 attack
Sep 29 19:49:26 vps691689 sshd[17575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.199.68
Sep 29 19:49:28 vps691689 sshd[17575]: Failed password for invalid user grandpa from 183.134.199.68 port 57899 ssh2
...
2019-09-30 02:19:56
40.112.248.127 attackbotsspam
SSH Bruteforce attempt
2019-09-30 02:40:02
60.217.49.252 attackbotsspam
Automated reporting of FTP Brute Force
2019-09-30 02:08:15
83.4.196.180 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/83.4.196.180/ 
 PL - 1H : (293)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PL 
 NAME ASN : ASN5617 
 
 IP : 83.4.196.180 
 
 CIDR : 83.0.0.0/13 
 
 PREFIX COUNT : 183 
 
 UNIQUE IP COUNT : 5363456 
 
 
 WYKRYTE ATAKI Z ASN5617 :  
  1H - 1 
  3H - 6 
  6H - 17 
 12H - 29 
 24H - 82 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-30 02:32:10
222.186.180.41 attack
2019-09-29T20:10:36.023812lon01.zurich-datacenter.net sshd\[18631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
2019-09-29T20:10:37.995413lon01.zurich-datacenter.net sshd\[18631\]: Failed password for root from 222.186.180.41 port 27718 ssh2
2019-09-29T20:10:42.796245lon01.zurich-datacenter.net sshd\[18631\]: Failed password for root from 222.186.180.41 port 27718 ssh2
2019-09-29T20:10:47.296200lon01.zurich-datacenter.net sshd\[18631\]: Failed password for root from 222.186.180.41 port 27718 ssh2
2019-09-29T20:10:51.682708lon01.zurich-datacenter.net sshd\[18631\]: Failed password for root from 222.186.180.41 port 27718 ssh2
...
2019-09-30 02:15:18
114.38.41.238 attack
Port scan
2019-09-30 02:13:35

最近上报的IP列表

60.205.95.20 45.83.31.38 45.249.245.88 38.248.246.148
168.100.163.190 130.89.144.168 23.225.40.170 118.239.3.255
40.124.175.39 210.122.210.88 103.48.31.201 49.229.153.18
188.166.217.188 96.44.172.138 172.18.232.122 106.34.19.227
39.98.57.214 47.92.164.63 204.152.198.183 68.183.215.167