IP CheckerMy IP:  34.232.62.64

This IP Abuse Checker is probably the most comprehensive tool to find out who owns an IP address, domain or website, including abuse score, spam reputation, certificate info and ping response. It is useful for locating the origin of unwanted emails or the source of spam, virus and attacks.

If you enter an IP Address, we are querying the RIPE database for all relevant owner information, check if it has a reverse DNS record and show the geographical location of the IP address.

If you enter a Domain Name, we make a WHOIS query and show the public owner and registration information from the authoritative domain registry. We will show all DNS entries, and if there is an SSL/TLS web server running, we also check if the TLS certificate is valid. By the way, website URLs can be pasted directly into the search field, no need to manually extract the domain. Of course, we fully support Internationalized Domain Names (IDN).

In both cases, we finally perform an abuse check and show if the IP address was reported for fraudulent or malicious activity and if it is listed on major spam block lists. If malicious activity was detected, a calculated Abuse Score is shown together with technical details of the most recent abuse reports.

We also check if IP addresses are responding to ICMP Ping requests and show the response time measured from a large datacenter in Germany. Being fully IPv6 ready, you can use it for quick IPV6 accessibility checks.

This online tool is ad-free. If you like it, please help spread the word about it!


IT Security News

today:  Vulnerabilities and Threat Research – Qualys Security Blog
ACSC Essential 8 Cybersecurity Strategies, Maturity Levels, and Best Practices

today:  Vulnerabilities and Threat Research – Qualys Security Blog
The March 2023 Patch Tuesday Security Update Review

today:  Naked Security
WooCommerce Payments plugin for WordPress has an admin-level hole – patch now!

today:  Naked Security
Windows 11 also vulnerable to “aCropalypse” image data leakage

today:  Qualys Security Blog
ACSC Essential 8 Cybersecurity Strategies, Maturity Levels, and Best Practices

today:  Qualys Security Blog
Staying Ahead of Ransomware Threats

today:  ZDNET | security RSS
How to find and remove spyware from your phone

today:  ZDNET | security RSS
Windows: Still insecure after all these years