Whois information
                                            NetRange:       192.3.0.0 - 192.3.255.255
CIDR:           192.3.0.0/16
NetName:        CC-15
NetHandle:      NET-192-3-0-0-1
Parent:         NET192 (NET-192-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   HostPapa (HOSTP-7)
RegDate:        2013-06-07
Updated:        2024-02-02
Comment:        Geofeed https://geofeeds.oniaas.io/geofeeds.csv
Ref:            https://rdap.arin.net/registry/ip/192.3.0.0
OrgName:        HostPapa
OrgId:          HOSTP-7
Address:        325 Delaware Avenue
Address:        Suite 300
City:           Buffalo
StateProv:      NY
PostalCode:     14202
Country:        US
RegDate:        2016-06-06
Updated:        2025-10-05
Ref:            https://rdap.arin.net/registry/entity/HOSTP-7
OrgAbuseHandle: NETAB23-ARIN
OrgAbuseName:   NETABUSE
OrgAbusePhone:  +1-905-315-3455 
OrgAbuseEmail:  net-abuse-global@hostpapa.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NETAB23-ARIN
OrgTechHandle: NETTE9-ARIN
OrgTechName:   NETTECH
OrgTechPhone:  +1-905-315-3455 
OrgTechEmail:  net-tech-global@hostpapa.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NETTE9-ARIN
RAbuseHandle: NETAB27-ARIN
RAbuseName:   NETABUSE-COLOCROSSING
RAbusePhone:  +1-800-518-9716 
RAbuseEmail:  abuse@colocrossing.com
RAbuseRef:    https://rdap.arin.net/registry/entity/NETAB27-ARIN
RTechHandle: NETTE11-ARIN
RTechName:   NETTECH-COLOCROSSING
RTechPhone:  +1-800-518-9716 
RTechEmail:  support@colocrossing.com
RTechRef:    https://rdap.arin.net/registry/entity/NETTE11-ARIN
NetRange:       192.3.96.64 - 192.3.96.95
CIDR:           192.3.96.64/27
NetName:        CC-192-3-96-64-27
NetHandle:      NET-192-3-96-64-1
Parent:         CC-15 (NET-192-3-0-0-1)
NetType:        Reassigned
OriginAS:       
Organization:   WindowsVPS.Host (WINDO-22)
RegDate:        2024-11-22
Updated:        2024-11-22
Ref:            https://rdap.arin.net/registry/ip/192.3.96.64
OrgName:        WindowsVPS.Host
OrgId:          WINDO-22
Address:        71 Antonia PDE
City:           Schofileds
StateProv:      NSW
PostalCode:     2762
Country:        AU
RegDate:        2019-10-01
Updated:        2024-04-14
Ref:            https://rdap.arin.net/registry/entity/WINDO-22
OrgTechHandle: STEVE1061-ARIN
OrgTechName:   Steve, Lee 
OrgTechPhone:  +65-6295-0702 
OrgTechEmail:  steve.lee@windowsvps.host
OrgTechRef:    https://rdap.arin.net/registry/entity/STEVE1061-ARIN
OrgAbuseHandle: STEVE1061-ARIN
OrgAbuseName:   Steve, Lee 
OrgAbusePhone:  +65-6295-0702 
OrgAbuseEmail:  steve.lee@windowsvps.host
OrgAbuseRef:    https://rdap.arin.net/registry/entity/STEVE1061-ARIN
Most recent complaints
Please help us keep Internet safer and cleaner by leaving a descriptive comment about 192.3.96.73 IP address
DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.
WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.
** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.

 
    


Complaint by Annoymous :
i gotta say that log from earlier was creepy as **** it looked like someone or something was scanning every single port for like an eternity. maybe u forgot to hide ur open ports or u got hacked by a caffeinated malware that cant code properly. now i feel like im babysitting a digital ghost in my server logs