IP: 178.137.160.135 Ukraine Location: Lviv, Lviv Oblast, Ukraine
City:
Lviv
Region:
Lviv Oblast
Country:
Ukraine
Postal Code:
79071
Latitude:
49.839
Longitude:
24.0191
NetRange: 178.0.0.0 - 178.255.255.255
CIDR: 178.0.0.0/8
NetName: 178-RIPE
NetHandle: NET-178-0-0-0-1
Parent: ()
NetType: Allocated to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2009-01-30
Updated: 2009-05-18
Comment: These addresses have been further assigned to users in
Comment: the RIPE NCC region. Contact information can be found in
Comment: the RIPE database at http://www.ripe.net/whois
Ref: https://rdap.arin.net/registry/ip/178.0.0.0

ResourceLink: https://apps.db.ripe.net/search/query.html
ResourceLink: whois.ripe.net

OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE

ReferralServer: whois://whois.ripe.net
ResourceLink: https://apps.db.ripe.net/search/query.html

OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
DNS BlackList results:
Most recent complaints on 178.137.160.135
Complaint by Vladimir Tiron :

The Fri Jun 15 10:55:11 2012 has been detected an attack to your blog from the following remote computer : IP Address : 178.137.160.135} Username : Rererer : http://vvtiron.ru/mir-otnosheni/zhenshhina-hochet-znat User-Agent : Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.1.4322) Attack details follow : - Variable 'comment' of the POST method triggered the filter 'obfuscated script tags and XML wrapped HTML' for the content '<a href="http://defur.info/">defur.info</a> <a href="http://bobur.info/">bobur.info</a> http://rabur.info/ - rabur.info http://bobur.info/ - bobur.info'. - Variable 'comment' of the POST method triggered the filter 'basic SQL authentication bypass attempts 2/3' for the content '<a href="http://defur.info/">defur.info</a> <a href="http://bobur.info/">bobur.info</a> http://rabur.info/ - rabur.info http://bobur.info/ - bobur.info'.

Reported on: 30th, Jun. 2012
Complaint by Vladimir Tiron :

he Sun Jul 15 08:43:39 2012 has been detected an attack to your blog from the following remote computer : IP Address : 178.137.160.135} Username : Rererer : http://vvtiron.ru/mir-otnosheni/kak-ponyat-namereniya-muzhchinyi User-Agent : Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322) Babya Discoverer 8.0: Attack details follow : - Variable 'comment' of the POST method triggered the filter 'obfuscated script tags and XML wrapped HTML' for the content '<a href="http://bafur.info/">bafur.info</a> <a href="http://fiin.info/">fiin.info</a> http://fiin.info/ - fiin.info http://bombur.info/ - bombur.info'. - Variable 'comment' of the POST method triggered the filter 'basic SQL authentication bypass attempts 2/3' for the content '<a href="http://bafur.info/">bafur.info</a> <a href="http://fiin.info/">fiin.info</a> http://fiin.info/ - fiin.info http://bombur.info/ - bombur.info'.

Reported on: 15th, Jul. 2012
Complaint by Vladimir Tiron :

The Sun Jul 29 05:28:09 2012 has been detected an attack to your blog from the following remote computer : IP Address : 178.137.160.135} Username : Rererer : http://vvtiron.ru/mir-otnosheni/kak-ponyat-namereniya-muzhchinyi User-Agent : Mozilla/5.0 (Windows NT 5.1; U; en) Opera 8.01 Attack details follow : - Variable 'comment' of the POST method triggered the filter 'obfuscated script tags and XML wrapped HTML' for the content '<a href="http://www.partgame.ru/"> </a> http://www.partgame.ru/

Reported on: 29th, Jul. 2012

Please help us keep Internet safer and cleaner by leaving a descriptive comment about 178.137.160.135 IP address


DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.