APNIC - Query the APNIC Whois Database

To assist you with debugging problems, this whois query was received from IP Address

% APNIC found the following authoritative answer from: whois.ripe.net
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://apps.db.ripe.net/docs/HTML-Terms-And-Conditions
% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.
% Information related to '217.116.224.0 - 217.116.255.255'
% Abuse contact for '217.116.224.0 - 217.116.255.255' is 'abuse@sentia.dk'
inetnum:        217.116.224.0 - 217.116.255.255
netname:        DK-SENTIA-20010206
country:        DK
org:            ORG-JA1-RIPE
admin-c:        JN500-RIPE
tech-c:         JN500-RIPE
status:         ALLOCATED PA
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         JAYNET
mnt-routes:     JAYNET
mnt-domains:    JAYNET
created:        2002-09-27T13:57:44Z
last-modified:  2020-08-26T07:48:20Z
source:         RIPE
organisation:   ORG-JA1-RIPE
org-name:       Sentia Denmark A/S
country:        DK
org-type:       LIR
address:        Lyskær 3A
address:        2730
address:        Herlev
address:        DENMARK
phone:          +45 33 36 63 00
fax-no:         +45 33 36 63 01
admin-c:        JN500-RIPE
mnt-ref:        JAYNET
mnt-ref:        RIPE-NCC-HM-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         JAYNET
abuse-c:        JN500-RIPE
created:        2004-04-17T11:14:24Z
last-modified:  2023-05-22T12:15:45Z
source:         RIPE # Filtered
role:           Jaynet Network Operation Center
address:        Smedeland 32
address:        2600 Glostrup
address:        Denmark
phone:          +45 33 36 63 00
fax-no:         +45 33 36 63 01
abuse-mailbox:  abuse@sentia.dk
admin-c:        YOYO-RIPE
admin-c:        BE1547-RIPE
admin-c:        CAPN2-RIPE
admin-c:        MA19472-RIPE
tech-c:         YOYO-RIPE
tech-c:         BE1547-RIPE
tech-c:         CAPN2-RIPE
tech-c:         MA19472-RIPE
nic-hdl:        JN500-RIPE
mnt-by:         JAYNET
created:        2005-08-09T12:40:35Z
last-modified:  2021-02-22T08:21:52Z
source:         RIPE # Filtered
% Information related to '217.116.224.0/19AS16245'
route:          217.116.224.0/19
descr:          Netgroup A/S
origin:         AS16245
remarks:        +-----------------------------------------------+
remarks:        | Network security issues: security@netgroup.dk |
remarks:        +-----------------------------------------------+
mnt-by:         NETGROUP-NETADMIN
created:        2002-09-27T14:05:41Z
last-modified:  2016-09-14T14:22:05Z
source:         RIPE # Filtered
% Information related to '217.116.224.0/19AS47292'
route:          217.116.224.0/19
origin:         AS47292
created:        2022-06-13T13:09:11Z
last-modified:  2022-06-13T13:09:11Z
source:         RIPE
mnt-by:         JAYNET
% This query was served by the RIPE Database Query Service version 1.111 (DEXTER)
  • Bold: Object type.
  • Underlined: Primary key(s).
  • Hyperlinks: Searchable Attributes.
5 records found for '217.116.248.4'
Search for  
IP address lookups Miscellaneous queries
-l

1st level less specific

Returns smallest IP address range that includes the queried IP address or range

-i

Inverse attributes

Returns objects with an attribute that matches the query text and attribute type
-L

All less specific

Return all larger IP address ranges that include the queried IP address or range

-T

Object types

Results that match the query and are of a specified object type
-m

1st level more specific

Returns first level more specific address ranges within the boundaries of the queried IP address range
-M

All more specific

Returns all more specific address ranges within the boundaries of the queried IP address range

Query hints

  • Include "AS" in front of an AS number.
    Example: AS4808

  • Include "-t" (template only) or "-v" (template and description) in front of an object name to view the template
    Example: -t inetnum

-x

Exact match only

Returns address range that exactly matches the queried IP address range
-d

Associated reverse domain

Returns IP address range and associated reverse domain

For more information see: