City: Sainte Genevieve
Region: Missouri
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 64.82.192.0 - 64.82.255.255
CIDR: 64.82.192.0/18
NetName: BIGRIVER-64-82-192-0
NetHandle: NET-64-82-192-0-1
Parent: NET64 (NET-64-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Big River Telephone Company, LLC (BRT-15)
RegDate: 2002-12-13
Updated: 2012-06-26
Comment: IP Renumbering, replacing DN Servers.
Ref: https://rdap.arin.net/registry/ip/64.82.192.0
OrgName: Big River Telephone Company, LLC
OrgId: BRT-15
Address: 24 South Minnesota
City: Cape Girardeau
StateProv: MO
PostalCode: 63702
Country: US
RegDate: 2003-02-24
Updated: 2024-10-03
Ref: https://rdap.arin.net/registry/entity/BRT-15
ReferralServer: rwhois://rwhois.bigrivertel.net:4321
OrgTechHandle: BRN1-ARIN
OrgTechName: Big River NOC
OrgTechPhone: +1-800-455-1201
OrgTechEmail: noc@bigrivercom.com
OrgTechRef: https://rdap.arin.net/registry/entity/BRN1-ARIN
OrgTechHandle: SEABA2-ARIN
OrgTechName: Seabaugh, Cory
OrgTechPhone: +1-573-768-5302
OrgTechEmail: cseabaugh@bigrivercom.com
OrgTechRef: https://rdap.arin.net/registry/entity/SEABA2-ARIN
OrgAbuseHandle: BRN1-ARIN
OrgAbuseName: Big River NOC
OrgAbusePhone: +1-800-455-1201
OrgAbuseEmail: noc@bigrivercom.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/BRN1-ARIN
OrgRoutingHandle: CRABT42-ARIN
OrgRoutingName: Crabtree, Torrey
OrgRoutingPhone: +1-573-718-7745
OrgRoutingEmail: tcrabtree@bigrivercom.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/CRABT42-ARIN
OrgRoutingHandle: SEABA2-ARIN
OrgRoutingName: Seabaugh, Cory
OrgRoutingPhone: +1-573-768-5302
OrgRoutingEmail: cseabaugh@bigrivercom.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/SEABA2-ARIN
OrgNOCHandle: BRN1-ARIN
OrgNOCName: Big River NOC
OrgNOCPhone: +1-800-455-1201
OrgNOCEmail: noc@bigrivercom.com
OrgNOCRef: https://rdap.arin.net/registry/entity/BRN1-ARIN
OrgTechHandle: CRABT42-ARIN
OrgTechName: Crabtree, Torrey
OrgTechPhone: +1-573-718-7745
OrgTechEmail: tcrabtree@bigrivercom.com
OrgTechRef: https://rdap.arin.net/registry/entity/CRABT42-ARIN
OrgAbuseHandle: CONTA428-ARIN
OrgAbuseName: Contact, Abuse
OrgAbusePhone: +1-800-455-1201
OrgAbuseEmail: abuse@bigrivercom.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/CONTA428-ARIN
OrgDNSHandle: BRN1-ARIN
OrgDNSName: Big River NOC
OrgDNSPhone: +1-800-455-1201
OrgDNSEmail: noc@bigrivercom.com
OrgDNSRef: https://rdap.arin.net/registry/entity/BRN1-ARIN
RAbuseHandle: ABUSE3453-ARIN
RAbuseName: Abuse
RAbusePhone: +1-573-651-3373
RAbuseEmail: abuse@bigrivertelephone.com
RAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3453-ARIN
RNOCHandle: BRN1-ARIN
RNOCName: Big River NOC
RNOCPhone: +1-800-455-1201
RNOCEmail: noc@bigrivercom.com
RNOCRef: https://rdap.arin.net/registry/entity/BRN1-ARIN
RTechHandle: BRN1-ARIN
RTechName: Big River NOC
RTechPhone: +1-800-455-1201
RTechEmail: noc@bigrivercom.com
RTechRef: https://rdap.arin.net/registry/entity/BRN1-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.bigrivertel.net:4321.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.82.206.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45121
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;64.82.206.195. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026013101 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 01 02:00:07 CST 2026
;; MSG SIZE rcvd: 106
Host 195.206.82.64.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 195.206.82.64.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.12.86.205 | attackspam | Nov 11 11:30:28 gw1 sshd[13730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.86.205 Nov 11 11:30:30 gw1 sshd[13730]: Failed password for invalid user test12345678 from 106.12.86.205 port 51448 ssh2 ... |
2019-11-11 21:50:08 |
| 1.34.134.61 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:24. |
2019-11-11 21:33:16 |
| 37.187.0.20 | attackspam | Nov 11 09:35:54 server sshd\[14747\]: Invalid user keyna from 37.187.0.20 Nov 11 09:35:54 server sshd\[14747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3323025.ip-37-187-0.eu Nov 11 09:35:56 server sshd\[14747\]: Failed password for invalid user keyna from 37.187.0.20 port 56400 ssh2 Nov 11 09:44:39 server sshd\[16721\]: Invalid user admin from 37.187.0.20 Nov 11 09:44:39 server sshd\[16721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3323025.ip-37-187-0.eu ... |
2019-11-11 21:43:22 |
| 103.76.252.6 | attack | Nov 11 02:09:04 ny01 sshd[2258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.252.6 Nov 11 02:09:06 ny01 sshd[2258]: Failed password for invalid user ytrewq from 103.76.252.6 port 25410 ssh2 Nov 11 02:13:37 ny01 sshd[2678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.252.6 |
2019-11-11 21:45:22 |
| 186.39.4.56 | attack | Automatic report - Port Scan Attack |
2019-11-11 21:44:44 |
| 180.252.213.217 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:36. |
2019-11-11 21:09:51 |
| 185.175.93.25 | attack | 11/11/2019-13:29:25.424449 185.175.93.25 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-11-11 21:37:27 |
| 171.251.29.248 | attack | Nov 11 18:38:42 gw1 sshd[24562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.251.29.248 Nov 11 18:38:44 gw1 sshd[24562]: Failed password for invalid user admin from 171.251.29.248 port 31160 ssh2 ... |
2019-11-11 21:49:40 |
| 178.62.236.68 | attackspambots | C1,WP GET /suche/wp-login.php |
2019-11-11 21:23:28 |
| 101.109.24.90 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:25. |
2019-11-11 21:31:11 |
| 125.162.21.149 | attack | Unauthorized connection attempt from IP address 125.162.21.149 on Port 445(SMB) |
2019-11-11 21:20:11 |
| 219.143.218.163 | attackbots | Automatic report - Banned IP Access |
2019-11-11 21:36:29 |
| 125.161.77.168 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:31. |
2019-11-11 21:20:43 |
| 185.143.223.135 | attack | Nov 11 13:08:59 dcd-gentoo sshd[11235]: User operator from 185.143.223.135 not allowed because none of user's groups are listed in AllowGroups Nov 11 13:09:01 dcd-gentoo sshd[11235]: error: PAM: Authentication failure for illegal user operator from 185.143.223.135 Nov 11 13:08:59 dcd-gentoo sshd[11235]: User operator from 185.143.223.135 not allowed because none of user's groups are listed in AllowGroups Nov 11 13:09:01 dcd-gentoo sshd[11235]: error: PAM: Authentication failure for illegal user operator from 185.143.223.135 Nov 11 13:08:59 dcd-gentoo sshd[11235]: User operator from 185.143.223.135 not allowed because none of user's groups are listed in AllowGroups Nov 11 13:09:01 dcd-gentoo sshd[11235]: error: PAM: Authentication failure for illegal user operator from 185.143.223.135 Nov 11 13:09:01 dcd-gentoo sshd[11235]: Failed keyboard-interactive/pam for invalid user operator from 185.143.223.135 port 39924 ssh2 ... |
2019-11-11 21:37:55 |
| 118.24.87.168 | attack | Invalid user wasboe from 118.24.87.168 port 49268 |
2019-11-11 21:46:20 |