Share

IP Address Details

Whois information

NetRange: 189.0.0.0 - 189.255.255.255
CIDR: 189.0.0.0/8
NetName: NET189
NetHandle: NET-189-0-0-0-1
Parent: ()
NetType: Allocated to LACNIC
OriginAS:
Organization: Latin American and Caribbean IP address Regional Registry (LACNIC)
RegDate: 2005-06-17
Updated: 2010-07-21
Comment: This IP address range is under LACNIC responsibility for further
Comment: allocations to users in LACNIC region.
Comment: Please see http://www.lacnic.net/ for further details, or check the
Comment: WHOIS server located at http://whois.lacnic.net
Ref: https://rdap.arin.net/registry/ip/189.0.0.0

ResourceLink: http://lacnic.net/cgi-bin/lacnic/whois
ResourceLink: whois.lacnic.net

OrgName: Latin American and Caribbean IP address Regional Registry
OrgId: LACNIC
Address: Rambla Republica de Mexico 6125
City: Montevideo
StateProv:
PostalCode: 11400
Country: UY
RegDate: 2002-07-27
Updated: 2018-03-15
Ref: https://rdap.arin.net/registry/entity/LACNIC

ReferralServer: whois://whois.lacnic.net
ResourceLink: http://lacnic.net/cgi-bin/lacnic/whois

OrgAbuseHandle: LWI100-ARIN
OrgAbuseName: LACNIC Whois Info
OrgAbusePhone: +598-2604-2222
OrgAbuseEmail: abuse@lacnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/LWI100-ARIN

OrgTechHandle: LACNIC-ARIN
OrgTechName: LACNIC Whois Info
OrgTechPhone: +598-2604-2222
OrgTechEmail: whois-contact@lacnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/LACNIC-ARIN

DNS BlackList results:

  • BL.SPAMCOP.NET Not Listed
  • SBL.SPAMHAUS.ORG Not Listed
  • B.BARRACUDACENTRAL.ORG Not Listed
  • SPAM.SPAMRATS.COM Not Listed
  • Z.MAILSPIKE.NET Not Listed
  • CBL.ABUSEAT.ORG Not Listed

Most recent complaints

Complaint by tracey :

Just digging through the access logs from last night and found somethign realy odd. Looks like there was a sneaky login attempt from a remote adress tryna guess root password. Ive never seen that many failed auths in such a short span before. Feels like a bot or some bored script kiddie playing with my server. The doors are locked but someone is def banging on the walls. I poked around the headers and saw weird user agent string handeling. Might just be a false alarm but my spider senses are tingling. Better keep an eye on this cause yesterday it was one request then it was too late. It has all the hallmarks of someone mapping the network with reckless abandon. Im caffeinated and ready for round two if they try to come back.

Reported on: 5th, May. 2012

Please help us keep Internet safer and cleaner by leaving a descriptive comment about 189.131.17.73 IP address

DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.