Whois information
NetRange: 217.0.0.0 - 217.255.255.255
CIDR: 217.0.0.0/8
NetName: 217-RIPE
NetHandle: NET-217-0-0-0-1
Parent: ()
NetType: Allocated to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2000-06-05
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/217.0.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net
OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE
ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
Most recent complaints
Please help us keep Internet safer and cleaner by leaving a descriptive comment about 217.106.239.101 IP address
DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.
WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.
** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.
Complaint by PK :
21:54:12 IDS proto parser : tcp data on syn segment (1 of 1) : 217.106.239.101 81.228.158.220 0129 TCP 7777->21620 [S.A...] seq 4211220576 ack 1832479090 win 25934 Jul 19 23:56:43 IDS proto parser : tcp data on syn segment (1 of 2) : 217.106.239.101 81.228.158.220 0126 TCP 7778->22666 [S.A...] seq 3462124701 ack 196844968 win 22225 Jul 20 00:51:38 IDS proto parser : tcp data on syn segment (1 of 1) : 217.106.239.101 81.228.158.220 0104 TCP 7777->12172 [S.A...] seq 232186029 ack 1598007791 win 28104 Jul 20 01:34:55 IDS proto parser : tcp data on syn segment (1 of 1) : 217.106.239.101 81.228.158.220 0137 TCP 7776->29586 [S.A...] seq 2762286963 ack 1313107493 win 26415 Jul 20 02:41:23 IDS proto parser : tcp data on syn segment (1 of 1) : 217.106.239.101 81.228.158.220 0102 TCP 7778->32110 [S.A...] seq 1640097895 ack 699179354 win 17558 Jul 20 03:26:05 IDS proto parser : tcp data on syn segment (1 of 1) : 217.106.239.101 81.228.158.220 0079 TCP 7776->15661 [S.A...] seq 2437046372 ack 645278170 win 24656
Complaint by ED :
I aint a hacker but somethings fishy with our logs latly. I saw like a ton of weird requests coming from that location nonstop day and night. its like someones running a botnet or tryna map out our system. dont know if its just kiddie prank or sumthing more serious. my gut is yelling danger but ive no proof yet. still i slid this up here so yall can keep ur eyes peeled. it might just be a glitch in the matrix or a real stalker snoopin around. if ur runnin any servers double check ur firewall and ssh keys. btw ive never felt so creeped out by a grunt of code b4. stay alert and share if u see any more spooky stuff poppin up.