IP: 208.64.202.85 United States Location: Redmond, Washington, United States
City:
Redmond
Region:
Washington
Country:
United States
Postal Code:
98052
Latitude:
47.6722
Longitude:
-122.1257
NetRange: 208.64.200.0 - 208.64.203.255
CIDR: 208.64.200.0/22
NetName: VALVE-V4-1
NetHandle: NET-208-64-200-0-1
Parent: NET208 (NET-208-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS32590
Organization: Valve Corporation (VC-2)
RegDate: 2011-03-25
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/208.64.200.0

OrgName: Valve Corporation
OrgId: VC-2
Address: 10400 NE 4th St, Suite 1400
City: Bellevue
StateProv: WA
PostalCode: 98004
Country: US
RegDate: 2010-11-12
Updated: 2018-01-19
Ref: https://rdap.arin.net/registry/entity/VC-2

OrgNOCHandle: NGANM-ARIN
OrgNOCName: Ngan, Milton
OrgNOCPhone: +1-425-889-9642
OrgNOCEmail: milton@valvesoftware.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NGANM-ARIN

OrgTechHandle: NGANM-ARIN
OrgTechName: Ngan, Milton
OrgTechPhone: +1-425-889-9642
OrgTechEmail: milton@valvesoftware.com
OrgTechRef: https://rdap.arin.net/registry/entity/NGANM-ARIN

OrgAbuseHandle: NGANM-ARIN
OrgAbuseName: Ngan, Milton
OrgAbusePhone: +1-425-889-9642
OrgAbuseEmail: milton@valvesoftware.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/NGANM-ARIN
DNS BlackList results:
Most recent complaints on 208.64.202.85
Complaint by prefer not to say :

5 1/2 hr ack scan [DoS attack: ACK Scan] attack packets in last 20 sec from ip [208.64.202.85], Saturday, Jan 10,2015 11:33:04 - - - - [DoS attack: ACK Scan] attack packets in last 20 sec from ip [208.64.202.85], Saturday, Jan 10,2015 06:07:04

Reported on: 10th, Jan. 2015
Complaint by MonkeyBoy :

Getting a lot of hits from this address. Router blocking it as a DOS Attack: Friday, May 08, 2015 04:54:48 [DoS Attack: ACK Scan] from source: 208.64.202.85, port 80, Friday, May 08, 2015 04:54:30 [DoS Attack: ACK Scan] from source: 208.64.202.85, port 443, Friday, May 08, 2015 04:54:26 [DoS Attack: ACK Scan] from source: 208.64.202.85, port 80, Friday, May 08, 2015 04:54:26 [DoS Attack: ACK Scan] from source: 208.64.202.85, port 443, Friday, May 08, 2015 04:54:26 [DoS Attack: ACK Scan] from source: 208.64.202.85, port 80, Friday, May 08, 2015 04:54:26 [DoS Attack: ACK Scan] from source: 208.64.202.85, port 443, Friday, May 08, 2015 04:54:25 [DoS Attack: ACK Scan] from source: 208.64.202.85, port 80, Friday, May 08, 2015 04:54:25 [DoS Attack: ACK Scan] from source: 208.64.202.85, port 443, Friday, May 08, 2015 04:54:25 [DoS Attack: ACK Scan] from source: 208.64.202.85, port 80, Friday, May 08, 2015 04:54:25 [DoS Attack: ACK Scan] from source: 208.64.202.85, port 443, Friday, May 08, 2015 04:54:21 [DoS Attack: ACK Scan] from source: 208.64.202.85, port 80, Friday, May 08, 2015 04:54:21 [DoS Attack: ACK Scan] from source: 208.64.202.85, port 443, Friday, May 08, 2015 04:54:21

Reported on: 8th, May. 2015

Please help us keep Internet safer and cleaner by leaving a descriptive comment about 208.64.202.85 IP address


DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.