Share

IP Address Details

Whois information

NetRange: 192.162.0.0 - 192.162.255.255
CIDR: 192.162.0.0/16
NetName: RIPE-ERX-192-162-0-0
NetHandle: NET-192-162-0-0-1
Parent: NET192 (NET-192-0-0-0-0)
NetType: Early Registrations, Transferred to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2005-02-28
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/192.162.0.0

ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net

OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE

ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query

OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

DNS BlackList results:

  • BL.SPAMCOP.NET Not Listed
  • SBL.SPAMHAUS.ORG Not Listed
  • B.BARRACUDACENTRAL.ORG Not Listed
  • SPAM.SPAMRATS.COM Not Listed
  • Z.MAILSPIKE.NET Not Listed
  • CBL.ABUSEAT.ORG Not Listed

Most recent complaints

Complaint by Vladimir Tiron :

The Tue Jul 10 13:03:10 2012 has been detected an attack to your blog from the following remote computer : IP Address : 192.162.19.193} Username : Rererer : http://vvtiron.ru/mir-otnosheni/treebovaniya-k-muzhchine-prodolzhenie User-Agent : Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0; T312461) Attack details follow : - Variable 'comment' of the POST method triggered the filter 'obfuscated script tags and XML wrapped HTML' for the content '<a href=http://solidpaydayloanonlinehere.com/#bvvtiron.ru>payday loan online</a> - <a href=http://solidpaydayloanonlinehere.com/#avvtiron.ru>payday loan online</a> , http://solidpaydayloanonlinehere.com/#svvtiron.ru payday loan online'.

Reported on: 10th, Jul. 2012

Complaint by Vladimir Tiron :

The Sun Jul 15 06:16:37 2012 has been detected an attack to your blog from the following remote computer : IP Address : 192.162.19.193} Username : Rererer : http://vvtiron.ru/mir-otnosheni/treebovaniya-k-muzhchine-prodolzhenie User-Agent : Mozilla/0.6 Beta (Windows) Attack details follow : - Variable 'comment' of the POST method triggered the filter 'obfuscated script tags and XML wrapped HTML' for the content '<a href=http://trustypaydayloanhere.com/#bvvtiron.ru>payday loan</a> - <a href=http://trustypaydayloanhere.com/#avvtiron.ru>payday loan</a> , http://trustypaydayloanhere.com/#svvtiron.ru payday loan'.

Reported on: 15th, Jul. 2012

Complaint by Vladimir Tiron :

The Wed Jul 18 23:43:34 2012 has been detected an attack to your blog from the following remote computer : IP Address : 192.162.19.193} Username : Rererer : http://vvtiron.ru/mir-otnosheni/treebovaniya-k-muzhchine-prodolzhenie User-Agent : Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; MRA 4.6 (build 01425); MRSPUTNIK 1, 5, 0, 19 SW) Attack details follow : - Variable 'comment' of the POST method triggered the filter 'obfuscated script tags and XML wrapped HTML' for the content '<a href=http://casinohereonline.com/#8356>casino online</a> - <a href=http://casinohereonline.com/#15019>play casino online</a> , http://casinohereonline.com/#5027 casino online'.

Reported on: 19th, Jul. 2012

Complaint by Vladimir Tiron :

The Sat Jul 21 13:13:48 2012 has been detected an attack to your blog from the following remote computer : IP Address : 192.162.19.193} Username : Rererer : http://vvtiron.ru/mir-otnosheni/treebovaniya-k-muzhchine-prodolzhenie User-Agent : Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322) Attack details follow : - Variable 'comment' of the POST method triggered the filter 'obfuscated script tags and XML wrapped HTML' for the content '<a href=http://loyalpaydayloanonlinetoday.com/?p=bvvtiron.ru>payday loan online</a> - <a href=http://loyalpaydayloanonlinetoday.com/?p=avvtiron.ru>payday loan online</a> , http://loyalpaydayloanonlinetoday.com/?p=svvtiron.ru payday loan online'.

Reported on: 21st, Jul. 2012

Complaint by Vladimir Tiron :

The Fri Jul 27 16:29:37 2012 has been detected an attack to your blog from the following remote computer : IP Address : 192.162.19.193} Username : Rererer : http://vvtiron.ru/mir-otnosheni/treebovaniya-k-muzhchine-prodolzhenie User-Agent : Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727) Attack details follow : - Variable 'comment' of the POST method triggered the filter 'obfuscated script tags and XML wrapped HTML' for the content '<a href=http://safepaydayloanonlinetoday.com/#6522>payday loan online</a> - <a href=http://safepaydayloanonlinetoday.com/#12640>payday loan online</a> , http://safepaydayloanonlinetoday.com/#8627 payday loan online'.

Reported on: 27th, Jul. 2012

Complaint by Tize :

Trying to hack in to server

Reported on: 17th, Nov. 2012

Please help us keep Internet safer and cleaner by leaving a descriptive comment about 192.162.19.193 IP address

DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.