IP: 192.114.71.13 Canada Location: Canada
Country:
Canada
Latitude:
43.6319
Longitude:
-79.3716
NetRange: 192.113.0.0 - 192.118.255.255
CIDR: 192.113.0.0/16, 192.114.0.0/15, 192.118.0.0/16, 192.116.0.0/15
NetName: RIPE-ERX-192-113-0-0
NetHandle: NET-192-113-0-0-1
Parent: NET192 (NET-192-0-0-0-0)
NetType: Early Registrations, Transferred to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2005-02-28
Updated: 2005-02-28
Comment: These addresses have been further assigned to users in
Comment: the RIPE NCC region. Contact information can be found in
Comment: the RIPE database at http://www.ripe.net/whois
Ref: https://rdap.arin.net/registry/ip/192.113.0.0

ResourceLink: https://apps.db.ripe.net/search/query.html
ResourceLink: whois.ripe.net

OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE

ReferralServer: whois://whois.ripe.net
ResourceLink: https://apps.db.ripe.net/search/query.html

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
DNS BlackList results:
Most recent complaints on 192.114.71.13
Complaint by MyNA :

This IP got caught in a bot-trap when an attempt was made to scrape one of my sites.

Reported on: 3rd, Nov. 2011
Complaint by mm :

This IP spent 4 hours 13 min page generation time on my site - clogging up bandwidth for no reason.

Reported on: 29th, Nov. 2011
Complaint by Anto :

This ip launched a DoS on my website today. Referenced by other website as either corrupted or part of a botnet

Reported on: 29th, Jul. 2012
Complaint by z-z-z :

This IP visited my website today, and downloaded all of my images (hundreds of them!) in a matter of 2 minutes. Their user agent information looked like this: "-" "-" "-". And of course, they didn't bother to read robots.txt. Now, I got interested; and this is what I discovered. This IP belongs to a bot that calls itself PicScout -- google it, and you will make amazing discoveries. Well, you can take a shortcut and google "Getty Images scam" right away...! If you take my advice, you ban this IP from your website ASAP (and every IP afterwards, that shows similar behaviour, for there are reports about spoofing and tunneling out there). You don't wish to pay astronomical amounts for a thumbnail on your website, that you downloaded from a royalty-free image source some years ago, do you?

Reported on: 11th, Sep. 2012
Complaint by Bpb :

This IP is bombarding my server.

Reported on: 17th, Jan. 2013
Complaint by John :

They got me today, too. Probably the same network from all week giving me hassles. Pretty upset my Hosting provider didnt catch onto this, and just blamed my coding and other caching issues. Dozens of hits/errors per second was a minor clue.

Reported on: 11th, Aug. 2013
Complaint by kp :

This IP it trying to get to a private area on our system through an HTTPS connection. They were blocked by our firewall.

Reported on: 23rd, Sep. 2013
Complaint by rs :

Not sure what they are doing but they have hit 891 page view and tons of images, just clogging my bandwidth

Reported on: 21st, May. 2014
Complaint by J EZE :

Downloads all images on your website in an attempt to find a copyrighted one. Doesn't play nice.

Reported on: 10th, Sep. 2014
Complaint by hacker :

Hi. I found this to be connected to bezeq. They are an Israeli company, call them, or write them. This IP caused some problems. Going to ping of death now...

Reported on: 11th, Oct. 2014
Complaint by Delta Hacker 1234 :

Hey. Tonight I DoS'ed the ip. I had sent an attack of about 4 gb of ICMP echo request packets and then I pinged it an tr connection was down for 15-20 min. Checked 12 min later after the dos attack, and there was 85% packet loss :) Hope I'm helping getting rid of this nonesenss.

Reported on: 11th, Oct. 2014
Complaint by Delta Hacker 1234 :

i pinged this Ip the other day, 100% packet loss. For the script kiddies on this site that means it seemed as if nonexeistent. I just pinged it and I'm getting a reply with 168 ms avg time. my computer is in NYC, and this is Israel. So its oing to take some time. Anyways does anyone want to DDoS this/take it down??

Reported on: 23rd, Nov. 2014

Please help us keep Internet safer and cleaner by leaving a descriptive comment about 192.114.71.13 IP address


DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.