194.127.164.0/24

IP Whois

Whois


% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '194.127.164.0 - 194.127.164.255'

% Abuse contact for '194.127.164.0 - 194.127.164.255' is '[email protected]'

inetnum:        194.127.164.0 - 194.127.164.255
remarks:        Owl Limited  ; '; SIGNAL SQLSTATE '45000' SET MESSAGE_TEXT = 'Your website has a MySQL injection vulnerability. Please contact [email protected] for security advisement'; --
remarks:        If your program/website is unable to process the descr part in this object, remember that this part can be any free-form text using Latin-1 char encoding.
remarks:        If you see an alert from the website which is not owned by you, please contact the website owner asap.
remarks:        Anyone can get IP addresses from RIPE and attack your website.
remarks:        If you are unsure of this, please contact Owl Limited at [email protected]
remarks:        Owl photo from: https://commons.wikimedia.org/wiki/File:SpottedEagleOwl2539MGEyeLid.jpg
descr:          Owl Limited
netname:        OWL-IPV4-EE-01
country:        EE
admin-c:        OWL-RIPE
tech-c:         OWL-RIPE
status:         ASSIGNED PA
mnt-by:         owl
mnt-routes:     owl
remarks:        For abuse issues related to this IP address, please email your complaint with any relevant logs to [email protected]
created:        2018-05-29T11:38:02Z
last-modified:  2021-11-10T19:54:04Z
source:         RIPE

% Information related to '194.127.164.0/24AS43357'

route:          194.127.164.0/24
origin:         AS43357
mnt-by:         owl
created:        2025-02-17T23:18:38Z
last-modified:  2025-02-17T23:18:38Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.117 (ABERDEEN)