IP: 91.200.14.72 Ukraine Location: Ukraine
Country:
Ukraine
Latitude:
50.4522
Longitude:
30.5287
NetRange: 91.0.0.0 - 91.255.255.255
CIDR: 91.0.0.0/8
NetName: 91-RIPE
NetHandle: NET-91-0-0-0-1
Parent: ()
NetType: Allocated to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2005-06-30
Updated: 2009-05-18
Comment: These addresses have been further assigned to users in
Comment: the RIPE NCC region. Contact information can be found in
Comment: the RIPE database at http://www.ripe.net/whois
Ref: https://rdap.arin.net/registry/ip/91.0.0.0

ResourceLink: https://apps.db.ripe.net/search/query.html
ResourceLink: whois.ripe.net

OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE

ReferralServer: whois://whois.ripe.net
ResourceLink: https://apps.db.ripe.net/search/query.html

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
DNS BlackList results:
Most recent complaints on 91.200.14.72
Complaint by Troy :

Trying to brute force attacks on wordpress websites

Reported on: 16th, Feb. 2014
Complaint by CAPT USA :

Ip is trying Brute force attacks on Wordpress admin sites.

Reported on: 12th, Mar. 2014
Complaint by Dave :

TRying to hack in to my site!

Reported on: 14th, Mar. 2014
Complaint by Andew :

Trying Brute force attack on wordpress admin login

Reported on: 2nd, Apr. 2014
Complaint by Tiffany :

Trying a brute force attack on my Wordpress admin login.

Reported on: 18th, Apr. 2014
Complaint by Silvia :

Trying to access my wordpress site!

Reported on: 20th, May. 2014
Complaint by Sean :

This ip address has tried to brute force attach a wordpress site

Reported on: 23rd, May. 2014
Complaint by hossein :

Trying a brute force attack on my Wordpress admin login.

Reported on: 17th, Jun. 2014
Complaint by AIAOS :

I don't know why someone tried to login our wp admin panel using this ip. I just want to say please do not try again because if you will try then our hope will be destroying. So, please do us a favour don't do it again. It is not our complain, it is just request for all.

Reported on: 19th, Jun. 2014
Complaint by Chintan :

16 failed login attempts (4 lockout(s)) from IP: 91.200.14.72 My WordPress site got attacked!

Reported on: 23rd, Jun. 2014
Complaint by Ian :

IP 91.200.14.72 two wordpress sites that are not linked. I do not know how they found both websites unless they have been hired by my ex. They have spent hours at both sites trying to login - without success.

Reported on: 23rd, Jul. 2014
Complaint by Semih :

Trying to hack my user name. Please stop this guy!

Reported on: 6th, Aug. 2014
Complaint by Corto :

94 failed login attempts from IP: 91.200.14.72 My WordPress site got attacked!

Reported on: 16th, Aug. 2014
Complaint by Jojo :

91.200.14.72 ... wordpress tried to login.

Reported on: 9th, Oct. 2014
Complaint by Mark :

Excessive log in attempts on my Wordpress site

Reported on: 31st, Mar. 2015

Please help us keep Internet safer and cleaner by leaving a descriptive comment about 91.200.14.72 IP address


DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.