Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sainte Genevieve

Region: Missouri

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       64.82.192.0 - 64.82.255.255
CIDR:           64.82.192.0/18
NetName:        BIGRIVER-64-82-192-0
NetHandle:      NET-64-82-192-0-1
Parent:         NET64 (NET-64-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Big River Telephone Company, LLC (BRT-15)
RegDate:        2002-12-13
Updated:        2012-06-26
Comment:        IP Renumbering, replacing DN Servers.
Ref:            https://rdap.arin.net/registry/ip/64.82.192.0


OrgName:        Big River Telephone Company, LLC
OrgId:          BRT-15
Address:        24 South Minnesota
City:           Cape Girardeau
StateProv:      MO
PostalCode:     63702
Country:        US
RegDate:        2003-02-24
Updated:        2024-10-03
Ref:            https://rdap.arin.net/registry/entity/BRT-15

ReferralServer:  rwhois://rwhois.bigrivertel.net:4321

OrgTechHandle: BRN1-ARIN
OrgTechName:   Big River NOC
OrgTechPhone:  +1-800-455-1201 
OrgTechEmail:  noc@bigrivercom.com
OrgTechRef:    https://rdap.arin.net/registry/entity/BRN1-ARIN

OrgTechHandle: SEABA2-ARIN
OrgTechName:   Seabaugh, Cory 
OrgTechPhone:  +1-573-768-5302 
OrgTechEmail:  cseabaugh@bigrivercom.com
OrgTechRef:    https://rdap.arin.net/registry/entity/SEABA2-ARIN

OrgAbuseHandle: BRN1-ARIN
OrgAbuseName:   Big River NOC
OrgAbusePhone:  +1-800-455-1201 
OrgAbuseEmail:  noc@bigrivercom.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/BRN1-ARIN

OrgRoutingHandle: CRABT42-ARIN
OrgRoutingName:   Crabtree, Torrey 
OrgRoutingPhone:  +1-573-718-7745 
OrgRoutingEmail:  tcrabtree@bigrivercom.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/CRABT42-ARIN

OrgRoutingHandle: SEABA2-ARIN
OrgRoutingName:   Seabaugh, Cory 
OrgRoutingPhone:  +1-573-768-5302 
OrgRoutingEmail:  cseabaugh@bigrivercom.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/SEABA2-ARIN

OrgNOCHandle: BRN1-ARIN
OrgNOCName:   Big River NOC
OrgNOCPhone:  +1-800-455-1201 
OrgNOCEmail:  noc@bigrivercom.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/BRN1-ARIN

OrgTechHandle: CRABT42-ARIN
OrgTechName:   Crabtree, Torrey 
OrgTechPhone:  +1-573-718-7745 
OrgTechEmail:  tcrabtree@bigrivercom.com
OrgTechRef:    https://rdap.arin.net/registry/entity/CRABT42-ARIN

OrgAbuseHandle: CONTA428-ARIN
OrgAbuseName:   Contact, Abuse 
OrgAbusePhone:  +1-800-455-1201 
OrgAbuseEmail:  abuse@bigrivercom.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CONTA428-ARIN

OrgDNSHandle: BRN1-ARIN
OrgDNSName:   Big River NOC
OrgDNSPhone:  +1-800-455-1201 
OrgDNSEmail:  noc@bigrivercom.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/BRN1-ARIN

RAbuseHandle: ABUSE3453-ARIN
RAbuseName:   Abuse
RAbusePhone:  +1-573-651-3373 
RAbuseEmail:  abuse@bigrivertelephone.com
RAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3453-ARIN

RNOCHandle: BRN1-ARIN
RNOCName:   Big River NOC
RNOCPhone:  +1-800-455-1201 
RNOCEmail:  noc@bigrivercom.com
RNOCRef:    https://rdap.arin.net/registry/entity/BRN1-ARIN

RTechHandle: BRN1-ARIN
RTechName:   Big River NOC
RTechPhone:  +1-800-455-1201 
RTechEmail:  noc@bigrivercom.com
RTechRef:    https://rdap.arin.net/registry/entity/BRN1-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.bigrivertel.net:4321.
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.82.206.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45121
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.82.206.195.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026013101 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 01 02:00:07 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 195.206.82.64.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 195.206.82.64.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.86.205 attackspam
Nov 11 11:30:28 gw1 sshd[13730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.86.205
Nov 11 11:30:30 gw1 sshd[13730]: Failed password for invalid user test12345678 from 106.12.86.205 port 51448 ssh2
...
2019-11-11 21:50:08
1.34.134.61 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:24.
2019-11-11 21:33:16
37.187.0.20 attackspam
Nov 11 09:35:54 server sshd\[14747\]: Invalid user keyna from 37.187.0.20
Nov 11 09:35:54 server sshd\[14747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3323025.ip-37-187-0.eu 
Nov 11 09:35:56 server sshd\[14747\]: Failed password for invalid user keyna from 37.187.0.20 port 56400 ssh2
Nov 11 09:44:39 server sshd\[16721\]: Invalid user admin from 37.187.0.20
Nov 11 09:44:39 server sshd\[16721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3323025.ip-37-187-0.eu 
...
2019-11-11 21:43:22
103.76.252.6 attack
Nov 11 02:09:04 ny01 sshd[2258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.252.6
Nov 11 02:09:06 ny01 sshd[2258]: Failed password for invalid user ytrewq from 103.76.252.6 port 25410 ssh2
Nov 11 02:13:37 ny01 sshd[2678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.252.6
2019-11-11 21:45:22
186.39.4.56 attack
Automatic report - Port Scan Attack
2019-11-11 21:44:44
180.252.213.217 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:36.
2019-11-11 21:09:51
185.175.93.25 attack
11/11/2019-13:29:25.424449 185.175.93.25 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-11 21:37:27
171.251.29.248 attack
Nov 11 18:38:42 gw1 sshd[24562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.251.29.248
Nov 11 18:38:44 gw1 sshd[24562]: Failed password for invalid user admin from 171.251.29.248 port 31160 ssh2
...
2019-11-11 21:49:40
178.62.236.68 attackspambots
C1,WP GET /suche/wp-login.php
2019-11-11 21:23:28
101.109.24.90 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:25.
2019-11-11 21:31:11
125.162.21.149 attack
Unauthorized connection attempt from IP address 125.162.21.149 on Port 445(SMB)
2019-11-11 21:20:11
219.143.218.163 attackbots
Automatic report - Banned IP Access
2019-11-11 21:36:29
125.161.77.168 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 11-11-2019 06:20:31.
2019-11-11 21:20:43
185.143.223.135 attack
Nov 11 13:08:59 dcd-gentoo sshd[11235]: User operator from 185.143.223.135 not allowed because none of user's groups are listed in AllowGroups
Nov 11 13:09:01 dcd-gentoo sshd[11235]: error: PAM: Authentication failure for illegal user operator from 185.143.223.135
Nov 11 13:08:59 dcd-gentoo sshd[11235]: User operator from 185.143.223.135 not allowed because none of user's groups are listed in AllowGroups
Nov 11 13:09:01 dcd-gentoo sshd[11235]: error: PAM: Authentication failure for illegal user operator from 185.143.223.135
Nov 11 13:08:59 dcd-gentoo sshd[11235]: User operator from 185.143.223.135 not allowed because none of user's groups are listed in AllowGroups
Nov 11 13:09:01 dcd-gentoo sshd[11235]: error: PAM: Authentication failure for illegal user operator from 185.143.223.135
Nov 11 13:09:01 dcd-gentoo sshd[11235]: Failed keyboard-interactive/pam for invalid user operator from 185.143.223.135 port 39924 ssh2
...
2019-11-11 21:37:55
118.24.87.168 attack
Invalid user wasboe from 118.24.87.168 port 49268
2019-11-11 21:46:20

Recently Reported IPs

80.94.92.111 27.9.178.164 102.69.167.14 135.237.123.246
162.216.149.201 235.148.2.192 68.183.219.141 165.232.113.71
164.92.161.240 104.248.130.58 218.3.40.210 176.65.139.16
100.27.169.19 165.232.100.219 180.153.236.160 151.235.33.146
117.72.204.78 93.158.91.33 93.158.90.53 34.205.74.42