Latitude:
Longitude:
NetRange: 192.168.0.0 - 192.168.255.255
CIDR: 192.168.0.0/16
NetName: PRIVATE-ADDRESS-CBLK-RFC1918-IANA-RESERVED
NetHandle: NET-192-168-0-0-1
Parent: NET192 (NET-192-0-0-0-0)
NetType: IANA Special Use
OriginAS:
Organization: Internet Assigned Numbers Authority (IANA)
RegDate: 1994-03-15
Updated: 2013-08-30
Comment: These addresses are in use by many millions of independently operated networks, which might be as small as a single computer connected to a home gateway, and are automatically configured in hundreds of millions of devices. They are only intended for use within a private context and traffic that needs to cross the Internet will need to use a different, unique address.
Comment:
Comment: These addresses can be used by anyone without any need to coordinate with IANA or an Internet registry. The traffic from these addresses does not come from ICANN or IANA. We are not the source of activity you may see on logs or in e-mail records. Please refer to http://www.iana.org/abuse/answers
Comment:
Comment: These addresses were assigned by the IETF, the organization that develops Internet protocols, in the Best Current Practice document, RFC 1918 which can be found at:
Comment: http://datatracker.ietf.org/doc/rfc1918
Ref: https://rdap.arin.net/registry/ip/192.168.0.0

OrgName: Internet Assigned Numbers Authority
OrgId: IANA
Address: 12025 Waterfront Drive
Address: Suite 300
City: Los Angeles
StateProv: CA
PostalCode: 90292
Country: US
RegDate:
Updated: 2012-08-31
Ref: https://rdap.arin.net/registry/entity/IANA

OrgAbuseHandle: IANA-IP-ARIN
OrgAbuseName: ICANN
OrgAbusePhone: +1-310-301-5820
OrgAbuseEmail: abuse@iana.org
OrgAbuseRef: https://rdap.arin.net/registry/entity/IANA-IP-ARIN

OrgTechHandle: IANA-IP-ARIN
OrgTechName: ICANN
OrgTechPhone: +1-310-301-5820
OrgTechEmail: abuse@iana.org
OrgTechRef: https://rdap.arin.net/registry/entity/IANA-IP-ARIN
DNS BlackList results:
Most recent complaints on 192.168.13.238
Complaint by Anonymous :

Source host constantly used by Scammers and Fraudsters to send numerous Phishing emails. E.g:- Received: from fep12.mx.upcmail.net ([62.179.121.32]) by **; Sun, 24 Mar 2013 15:18:10 -0700 Received: from edge03.upcmail.net ([192.168.13.238]) by viefep12-int.chello.at (InterMail vM.8.01.05.05 201-2260-151-110-20120111) with ESMTP id <20130324221755.QASW14414.viefep12-int.chello.at@edge03.upcmail.net>; Received: from User ([77.251.139.246]) by edge03.upcmail.net with edge id FaGG1l00X5K9rNt03aGGGj; Sun, 24 Mar 2013 23:17:54 +0100 X-SourceIP: 77.251.139.246 From: "Santander Bank Plc" <onlinebanking@santander.co.uk> Subject: Santander Security & Privacy - Your Account Notification Date: Sun, 24 Mar 2013 23:18:14 +0100 *** Message-Id: <20130324221755.QASW14414.viefep12-int.chello.at@edge03.upcmail.net> Return-Path: onlinebanking@santander.co.uk X-OriginalArrivalTime: 24 Mar 2013 22:18:10.0989 (UTC) FILETIME=[783425D0:01CE28DD] This is an automatic message from Santander Security Team. Starting from March 26 2013, Our bank introduces new authentication procedures in order to protect private information of our account holders. Please note that accounts that are not reviewed within 48hrs are subjected to be terminated. To avoid service interruption follow the reference below to update your account records. *** LINK REMOVED **** Update your account records immediately Helpful Banking. Our Regards Santander Security Department.

Reported on: 25th, Mar. 2013

Please help us keep Internet safer and cleaner by leaving a descriptive comment about 192.168.13.238 IP address


DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.