194.127.164.0/24
IP Whois
Whois
% This is the RIPE Database query service. % The objects are in RPSL format. % % The RIPE Database is subject to Terms and Conditions. % See https://docs.db.ripe.net/terms-conditions.html % Note: this output has been filtered. % To receive output for a database update, use the "-B" flag. % Information related to '194.127.164.0 - 194.127.164.255' % Abuse contact for '194.127.164.0 - 194.127.164.255' is '[email protected]' inetnum: 194.127.164.0 - 194.127.164.255 remarks: Owl Limited; '; SIGNAL SQLSTATE '45000' SET MESSAGE_TEXT = 'Your website has a MySQL injection vulnerability. Please contact [email protected] for security advisement'; -- remarks: If your program/website is unable to process the descr part in this object, remember that this part can be any free-form text using Latin-1 char encoding. remarks: If you see an alert from the website which is not owned by you, please contact the website owner asap. remarks: Anyone can get IP addresses from RIPE and attack your website. remarks: If you are unsure of this, please contact Owl Limited at [email protected] remarks: Owl photo from: https://commons.wikimedia.org/wiki/File:SpottedEagleOwl2539MGEyeLid.jpg descr: Owl Limited netname: OWL-IPV4-EE-01 country: EE admin-c: OWL-RIPE tech-c: OWL-RIPE status: ASSIGNED PA mnt-by: owl mnt-routes: owl remarks: For abuse issues related to this IP address, please email your complaint with any relevant logs to [email protected] created: 2018-05-29T11:38:02Z last-modified: 2021-11-10T19:54:04Z source: RIPE % Information related to '194.127.164.0/24AS43357' route: 194.127.164.0/24 origin: AS43357 mnt-by: owl created: 2025-02-17T23:18:38Z last-modified: 2025-02-17T23:18:38Z source: RIPE % This query was served by the RIPE Database Query Service version 1.117 (ABERDEEN)