IP: 153.2.228.50 United States Location: United States
NetRange: 153.2.0.0 - 153.2.255.255
CIDR: 153.2.0.0/16
NetName: UPS
NetHandle: NET-153-2-0-0-1
Parent: APNIC-ERX-153 (NET-153-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: UNITED PARCEL SERVICE (UPS-9)
RegDate: 1991-09-12
Updated: 2021-12-14
Ref: https://rdap.arin.net/registry/ip/153.2.0.0

OrgName: UNITED PARCEL SERVICE
OrgId: UPS-9
Address: 340 MACARTHUR BOULEVARD
City: MAHWAH
StateProv: NJ
PostalCode: 07430
Country: US
RegDate: 1991-09-12
Updated: 2011-07-28
Ref: https://rdap.arin.net/registry/entity/UPS-9

OrgTechHandle: UITG-ARIN
OrgTechName: UPS Internet Tech - GJ
OrgTechPhone: +1-201-828-4503
OrgTechEmail: network@ups.com
OrgTechRef: https://rdap.arin.net/registry/entity/UITG-ARIN

OrgAbuseHandle: UIA7-ARIN
OrgAbuseName: UPS Internet Admin
OrgAbusePhone: +1-201-828-7610
OrgAbuseEmail: network@ups.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/UIA7-ARIN

OrgTechHandle: UITA-ARIN
OrgTechName: UPS Internet Tech - AG
OrgTechPhone: +1-201-828-7190
OrgTechEmail: network@ups.com
OrgTechRef: https://rdap.arin.net/registry/entity/UITA-ARIN
DNS BlackList results:
Most recent complaints on 153.2.228.50
Complaint by Paul Howe :

This IP address is sending spam phishing email to addresses at the University of Arizona.

Reported on: 14th, Aug. 2011
Complaint by Anita :

This IP is sending viruses! ======== VIRUS ALERT Our content checker found virus: Suspect.Bredozip-zippwd-10 in an email to you from probably faked sender: ?@[153.2.228.50] claiming to be: <info.9@ups.com> Content type: Virus Our internal reference code for your message is 09631-19/tRWwvxyXCfZZ First upstream SMTP client IP address: [123.20.232.208] According to a 'Received:' trace, the message apparently originated at: [153.2.228.50], ups.com [153.2.228.50] Return-Path: <info.9@ups.com> From: "info 9" <info.9@ups.com> Message-ID: <000e01cc519c$aad90880$d0e8147b@ups.com> X-Mailer: Microsoft Outlook Express 6.00.2800.1409 Subject: UPS notification The message has been quarantined as: virus-tRWwvxyXCfZZ Please contact your system administrator for details.

Reported on: 16th, Aug. 2011
Complaint by Michael :

Complaint on by Anita : This IP is sending viruses! ======== VIRUS ALERT Our content checker found virus: Suspect.Bredozip-zippwd-10 in an email to you from probably faked sender: ?@[153.2.228.50] claiming to be: <info.9@ups.com> Content type: Virus Our internal reference code for your message is 09631-19/tRWwvxyXCfZZ First upstream SMTP client IP address: [123.20.232.208] According to a 'Received:' trace, the message apparently originated at: [153.2.228.50], ups.com [153.2.228.50] Return-Path: <info.9@ups.com> From: "info 9" <info.9@ups.com> Message-ID: <000e01cc519c$aad90880$d0e8147b@ups.com> X-Mailer: Microsoft Outlook Express 6.00.2800.1409 Subject: UPS notification The message has been quarantined as: virus-tRWwvxyXCfZZ Please contact your system administrator for details. Reported on:

Reported on: 23rd, Aug. 2011
Complaint by Maurik :

This IP is sending viruses often.

Reported on: 23rd, Aug. 2011
Complaint by art mann :

This ip is sending fake UPS.COM email with viruses

Reported on: 23rd, Aug. 2011
Complaint by rolf :

This IP is sending viruses to random addresses.

Reported on: 24th, Aug. 2011
Complaint by Riker :

This email address has sent me a dozen infected fake "packages to be delivered" emails. Let's make fraud a capital offense.

Reported on: 25th, Aug. 2011

Please help us keep Internet safer and cleaner by leaving a descriptive comment about 153.2.228.50 IP address


DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.