IP.CC
Search
IP range details
204.114.24.0/21
·Sanford Underground Laboratory at Homestake
IP range details
204.114.24.0/21
·Sanford Underground Laboratory at Homestake
  • Summary IP.CC
  • WHOIS Details
  • IP Address

Summary

  • Country
    United States
  • Country Code
    US
  • Asn
    AS26498
  • Registry
  • Hosted Ips
    0

WHOIS Details

# start

NetRange: 204.114.24.0 - 204.114.31.255
CIDR: 204.114.24.0/21
NetName: SANFORD-UNDERGROUND-LABORATORY-AT-HOMESTAKE
NetHandle: NET-204-114-24-0-1
Parent: NET204 (NET-204-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS26498
Organization: Sanford Underground Laboratory at Homestake (SOUTH-264)
RegDate: 2009-02-09
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/204.114.24.0


OrgName: Sanford Underground Laboratory at Homestake
OrgId: SOUTH-264
Address: 630 E. Summit
City: Lead
StateProv: SD
PostalCode: 57754
Country: US
RegDate: 2009-01-26
Updated: 2011-09-24
Ref: https://rdap.arin.net/registry/entity/SOUTH-264


OrgTechHandle: MRE132-ARIN
OrgTechName: Rechtenbaugh, Mike
OrgTechPhone: +1-605-376-3003
OrgTechEmail: [email protected]
OrgTechRef: https://rdap.arin.net/registry/entity/MRE132-ARIN

OrgAbuseHandle: MRE132-ARIN
OrgAbuseName: Rechtenbaugh, Mike
OrgAbusePhone: +1-605-376-3003
OrgAbuseEmail: [email protected]
OrgAbuseRef: https://rdap.arin.net/registry/entity/MRE132-ARIN


RTechHandle: MRE132-ARIN
RTechName: Rechtenbaugh, Mike
RTechPhone: +1-605-376-3003
RTechEmail: [email protected]
RTechRef: https://rdap.arin.net/registry/entity/MRE132-ARIN
# start

NetRange: 204.114.24.0 - 204.114.31.255
CIDR: 204.114.24.0/21
NetName: SANFORD-UNDERGROUND-LABORATORY-AT-HOMESTAKE
NetHandle: NET-204-114-24-0-1
Parent: NET204 (NET-204-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS26498
Organization: Sanford Underground Laboratory at Homestake (SOUTH-264)
RegDate: 2009-02-09
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/204.114.24.0


OrgName: Sanford Underground Laboratory at Homestake
OrgId: SOUTH-264
Address: 630 E. Summit
City: Lead
StateProv: SD
PostalCode: 57754
Country: US
RegDate: 2009-01-26
Updated: 2011-09-24
Ref: https://rdap.arin.net/registry/entity/SOUTH-264


OrgTechHandle: MRE132-ARIN
OrgTechName: Rechtenbaugh, Mike
OrgTechPhone: +1-605-376-3003
OrgTechEmail: [email protected]
OrgTechRef: https://rdap.arin.net/registry/entity/MRE132-ARIN

OrgAbuseHandle: MRE132-ARIN
OrgAbuseName: Rechtenbaugh, Mike
OrgAbusePhone: +1-605-376-3003
OrgAbuseEmail: [email protected]
OrgAbuseRef: https://rdap.arin.net/registry/entity/MRE132-ARIN


RTechHandle: MRE132-ARIN
RTechName: Rechtenbaugh, Mike
RTechPhone: +1-605-376-3003
RTechEmail: [email protected]
RTechRef: https://rdap.arin.net/registry/entity/MRE132-ARIN
IP.CC
Search
IP range details
204.114.24.0/21
·Sanford Underground Laboratory at Homestake
IP range details
204.114.24.0/21
·Sanford Underground Laboratory at Homestake

Summary

  • Country
    United States
  • Country Code
    US
  • Asn
    AS26498
  • Registry
  • Hosted Ips
    0

WHOIS Details

# start

NetRange: 204.114.24.0 - 204.114.31.255
CIDR: 204.114.24.0/21
NetName: SANFORD-UNDERGROUND-LABORATORY-AT-HOMESTAKE
NetHandle: NET-204-114-24-0-1
Parent: NET204 (NET-204-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS26498
Organization: Sanford Underground Laboratory at Homestake (SOUTH-264)
RegDate: 2009-02-09
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/204.114.24.0


OrgName: Sanford Underground Laboratory at Homestake
OrgId: SOUTH-264
Address: 630 E. Summit
City: Lead
StateProv: SD
PostalCode: 57754
Country: US
RegDate: 2009-01-26
Updated: 2011-09-24
Ref: https://rdap.arin.net/registry/entity/SOUTH-264


OrgTechHandle: MRE132-ARIN
OrgTechName: Rechtenbaugh, Mike
OrgTechPhone: +1-605-376-3003
OrgTechEmail: [email protected]
OrgTechRef: https://rdap.arin.net/registry/entity/MRE132-ARIN

OrgAbuseHandle: MRE132-ARIN
OrgAbuseName: Rechtenbaugh, Mike
OrgAbusePhone: +1-605-376-3003
OrgAbuseEmail: [email protected]
OrgAbuseRef: https://rdap.arin.net/registry/entity/MRE132-ARIN


RTechHandle: MRE132-ARIN
RTechName: Rechtenbaugh, Mike
RTechPhone: +1-605-376-3003
RTechEmail: [email protected]
RTechRef: https://rdap.arin.net/registry/entity/MRE132-ARIN
# start

NetRange: 204.114.24.0 - 204.114.31.255
CIDR: 204.114.24.0/21
NetName: SANFORD-UNDERGROUND-LABORATORY-AT-HOMESTAKE
NetHandle: NET-204-114-24-0-1
Parent: NET204 (NET-204-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS26498
Organization: Sanford Underground Laboratory at Homestake (SOUTH-264)
RegDate: 2009-02-09
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/204.114.24.0


OrgName: Sanford Underground Laboratory at Homestake
OrgId: SOUTH-264
Address: 630 E. Summit
City: Lead
StateProv: SD
PostalCode: 57754
Country: US
RegDate: 2009-01-26
Updated: 2011-09-24
Ref: https://rdap.arin.net/registry/entity/SOUTH-264


OrgTechHandle: MRE132-ARIN
OrgTechName: Rechtenbaugh, Mike
OrgTechPhone: +1-605-376-3003
OrgTechEmail: [email protected]
OrgTechRef: https://rdap.arin.net/registry/entity/MRE132-ARIN

OrgAbuseHandle: MRE132-ARIN
OrgAbuseName: Rechtenbaugh, Mike
OrgAbusePhone: +1-605-376-3003
OrgAbuseEmail: [email protected]
OrgAbuseRef: https://rdap.arin.net/registry/entity/MRE132-ARIN


RTechHandle: MRE132-ARIN
RTechName: Rechtenbaugh, Mike
RTechPhone: +1-605-376-3003
RTechEmail: [email protected]
RTechRef: https://rdap.arin.net/registry/entity/MRE132-ARIN

An API to build on security, web personalization, marketing, and more

For the financial services sector and FinTech companies, IP.CC is an invaluable tool. Our clients in the financial industry love what we do, and we're excited to show you why.
IP.CC

Our IP Tools

Explore all toolsIP.CC
  • IP.CCPing

    Ping is a free tool to help you find IP addresses that can be pinged using the ICMP protocol. You can either lookup up an IP address or a CIDR block.

    Try PingIP.CC
  • IP.CCDNS

    DNS is a technique used to determine the hostname associated with an IP address. This is done searching hostname registry and registrar tables for PTR records.

    Try DNSIP.CC
  • IP.CCPort

    Port is a free tool for detecting open ports on your device. It automatically detects IP-address and scans your device, identifying open and vulnerable ports through which hackers.

    Try PortIP.CC
Frequently Asked Question