IP: 188.54.112.200 Saudi Arabia Location: Saudi Arabia
Country:
Saudi Arabia
Latitude:
25
Longitude:
45
NetRange: 188.0.0.0 - 188.255.255.255
CIDR: 188.0.0.0/8
NetName: 188-RIPE
NetHandle: NET-188-0-0-0-1
Parent: ()
NetType: Allocated to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate:
Updated: 2004-03-16
Comment: These addresses have been further assigned to users in
Comment: the RIPE NCC region. Contact information can be found in
Comment: the RIPE database at http://www.ripe.net/whois
Ref: https://rdap.arin.net/registry/ip/188.0.0.0

ResourceLink: https://apps.db.ripe.net/search/query.html
ResourceLink: whois.ripe.net

OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE

ReferralServer: whois://whois.ripe.net
ResourceLink: https://apps.db.ripe.net/search/query.html

OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
DNS BlackList results:
Most recent complaints on 188.54.112.200
Complaint by P.Litmaath :

See log: 2014-02-23 18:14:13 alert PortScan ATTACK:SRC=60.53.71.50 DST=82.168.106.27 5 2014-02-23 18:10:49 alert PortScan ATTACK:SRC=188.54.112.200 DST=82.168.106.27 6 2014-02-23 14:27:53 info Time initialized by NTP server 7 2014-02-23 14:27:46 info NTP new time: February 23 14:27:53 8 2014-02-23 14:27:46 info Re-sync with NTP server ... 9 2014-02-22 14:27:45 info Time initialized by NTP server 10 2014-02-22 14:27:39 info NTP new time: February 22 14:27:45 11 2014-02-22 14:27:39 info Re-sync with NTP server ... 12 2014-02-21 14:27:38 info Time initialized by NTP server 13 2014-02-21 14:27:32 info NTP new time: February 21 14:27:38 14 2014-02-21 14:27:32 info Re-sync with NTP server ... 15 2014-02-20 14:52:25 alert SYN_FLOODING ATTACK:SRC=110.75.162.238 DST=82.168.106.27 [last message repeated 2 times in 0 seconds] 16 2014-02-20 14:52:25 alert SYN_FLOODING ATTACK:SRC=110.75.162.239 DST=82.168.106.27 [last message repeated 1 times in 0 seconds] 17 2014-02-20 14:52:25 alert SYN_FLOODING ATTACK:SRC=110.75.162.238 DST=82.168.106.27 18 2014-02-20 14:27:30 info Time initialized by NTP server 19 2014-02-20 14:27:24 info NTP new time: February 20 14:27:30 20 2014-02-20 14:27:24 info Re-sync with NTP server ... 21 2014-02-19 14:27:23 info Time initialized by NTP server 22 2014-02-19 14:27:17 info NTP new time: February 19 14:27:23 23 2014-02-19 14:27:17 info Re-sync with NTP server ... 24 2014-02-18 14:27:15 info Time initialized by NTP server 25 2014-02-18 14:27:09 info NTP new time: February 18 14:27:15 26 2014-02-18 14:27:09 info Re-sync with NTP server ... 27 2014-02-17 14:27:08 info Time initialized by NTP server 28 2014-02-17 14:27:02 info NTP new time: February 17 14:27:08 29 2014-02-17 14:27:02 info Re-sync with NTP server ... 30 2014-02-16 14:27:00 info Time initialized by NTP server 31 2014-02-16 14:26:54 info NTP new time: February 16 14:27:00 32 2014-02-16 14:26:54 info Re-sync with NTP server ... 33 2014-02-15 14:26:53 info Time initialized by NTP server 34 2014-02-15 14:26:47 info NTP new time: February 15 14:26:53 35 2014-02-15 14:26:47 info Re-sync with NTP server ... 36 2014-02-14 14:26:45 info Time initialized by NTP server 37 2014-02-14 14:26:39 info NTP new time: February 14 14:26:45 38 2014-02-14 14:26:39 info Re-sync with NTP server ... 39 2014-02-13 14:26:38 info Time initialized by NTP server 40 2014-02-13 14:26:32 info NTP new time: February 13 14:26:38 41 2014-02-13 14:26:32 info Re-sync with NTP server ... 42 2014-02-12 14:26:30 info Time initialized by NTP server 43 2014-02-12 14:26:24 info NTP new time: February 12 14:26:30 44 2014-02-12 14:26:24 info Re-sync with NTP server ... 45 2014-02-11 14:26:23 info Time initialized by NTP server 46 2014-02-11 14:26:17 info NTP new time: February 11 14:26:23 47 2014-02-11 14:26:17 info Re-sync with NTP server ... 48 2014-02-10 14:26:15 info Time initialized by NTP server 49 2014-02-10 14:26:09 info NTP new time: February 10 14:26:15 50 2014-02-10 14:26:09 info Re-sync with NTP server ... 51 2014-02-09 14:26:08 info Time initialized by NTP server 52 2014-02-09 14:26:02 info NTP new time: February 09 14:26:08 53 2014-02-09 14:26:02 info Re-sync with NTP server ... 54 2014-02-08 14:26:01 info Time initialized by NTP server 55 2014-02-08 14:25:54 info NTP new time: February 08 14:26:01 56 2014-02-08 14:25:54 info Re-sync with NTP server ... 57 2014-02-07 14:25:53 info Time initialized by NTP server 58 2014-02-07 14:25:47 info NTP new time: February 07 14:25:53 59 2014-02-07 14:25:47 info Re-sync with NTP server ... 60 2014-02-06 14:25:46 info Time initialized by NTP server 61 2014-02-06 14:25:39 info NTP new time: February 06 14:25:46 62 2014-02-06 14:25:39 info Re-sync with NTP server ... 63 2014-02-05 22:36:23 alert PortScan ATTACK:SRC=188.138.4.152 DST=82.168.106.27 [last message repeated 3 times in 0 seconds] 64 2014-02-05 22:36:23 alert PortScan ATTACK:SRC=188.138.4.152 DST=82.168.106.27 65 2014-02-05 22:36:23 alert PortScan ATTACK:SRC=188.138.4.152 DST=82.168.106.27 66 2014-02-05 22:36:23 alert PortScan ATTACK:SRC=188.138.4.152 DST=82.168.106.27 67 2014-02-05 22:36:23 alert PortScan ATTACK:SRC=188.138.4.152 DST=82.168.106.27 [last message repeated 1 times in 0 seconds]

Reported on: 24th, Feb. 2014

Please help us keep Internet safer and cleaner by leaving a descriptive comment about 188.54.112.200 IP address


DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.