Share

IP Address Details

Whois information

NetRange: 192.162.0.0 - 192.162.255.255
CIDR: 192.162.0.0/16
NetName: RIPE-ERX-192-162-0-0
NetHandle: NET-192-162-0-0-1
Parent: NET192 (NET-192-0-0-0-0)
NetType: Early Registrations, Transferred to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2005-02-28
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/192.162.0.0

ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net

OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE

ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN

DNS BlackList results:

  • BL.SPAMCOP.NET Not Listed
  • SBL.SPAMHAUS.ORG Not Listed
  • B.BARRACUDACENTRAL.ORG Not Listed
  • SPAM.SPAMRATS.COM Not Listed
  • Z.MAILSPIKE.NET Not Listed
  • CBL.ABUSEAT.ORG Not Listed

Most recent complaints

Complaint by enas :

efe

Reported on: 26th, Oct. 2013

Complaint by mohamed :

Repeated attempts "SERVER-OTHER RealTek UDPServer command injection attempt" without any reverse DNS lookup or attempt to communicate with the server. In absence of knowledge of identity, can only assume this is a UDP injection attempt.

Reported on: 7th, Dec. 2013

Complaint by mohamad :

Been poking around the server logs and somethings up here. Looks like some unknown actor is prowling through our files like its a free buffet. Not sure if its just an innocent scanner or a sneaky backdoor attempt by some script kiddie. Either way its giving me weird vibes in the dead of night. Hope its just a sysadmin testing his l33t skills but this feels like trouble brewing. Dont wanna sound paranoid but i saw multiple failed login tries in a row and thats fishy. Might just lock everything down till i figure out whats actually happening. If its you messing around youre more than welcome to speak up or ill have to bring in big guns. Just know im watching u from the logs and so far im not impressed.

Reported on: 22nd, Feb. 2014

Complaint by admin :

This is a relentless spammer please report them to Russian police

Reported on: 25th, Sep. 2014

Complaint by magdy alam :

magdyalam

Reported on: 8th, Oct. 2014

Complaint by athon :

repeated attempt to attack my joomla site

Reported on: 25th, Jan. 2015

Complaint by 1234512345 :

blackmail

Reported on: 28th, Feb. 2015

Complaint by mona elgllad :

ahmed114

Reported on: 3rd, Mar. 2015

Complaint by wled :

Hacked my account and charged my credit card.

Reported on: 29th, Mar. 2015

Complaint by dodododo :

twice I have gotten emails from Google that this address was trying to use my google account

Reported on: 21st, Apr. 2015

Complaint by ahmed :

Blackhole Toolkit Activity 15 just tried to attack me from this IP.... dirty SOAB

Reported on: 4th, May. 2015

Complaint by amar :

Received email from this address claiming to be Navy Federal Credit Union asking me to update my account. I don't have an account with Navy Federal Credit Union. This is a spearfishing attack. The internet header is a dead giveaway since the return email is not the Navy Federal Credit Union but this address: mnfkjfhg@gmail.com You have been alerted!

Reported on: 27th, Jun. 2015

Complaint by amar :

the above mentioned ip address launched a denial of service attack on my computer, and I wish to prosecute, as this is a federal offense to interfere with telephony equipment.

Reported on: 27th, Jun. 2015

Complaint by awad :

I live here in Germany and have some resources to track this ******* down. WHEN I identify and track him down I will make sure he can never operate a computer again.

Reported on: 16th, Oct. 2015

Complaint by عوض :

عوض

Reported on: 19th, Oct. 2015

Complaint by Anonymous :

1150

Reported on: 7th, Dec. 2015

Complaint by emad :

malik

Reported on: 23rd, Dec. 2015

Please help us keep Internet safer and cleaner by leaving a descriptive comment about 192.162.0.254 IP address

DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.