DTG=05200527S APR 2023 (-0500) DATE YYYY MM DD=2023 04 05 DESTINATION=Cockerhamonline Articles CONTEXT_DOCUMENT_ROOT=/home1/cockerh1/public_html CONTEXT_PREFIX= DOCUMENT_ROOT=/home1/cockerh1/public_html GATEWAY_INTERFACE=CGI/1.1 HTTPS=on HTTP_ACCEPT=image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8 HTTP_ACCEPT_ENCODING=gzip, deflate, br, sdch HTTP_ACCEPT_LANGUAGE=ru-RU,ru;q=0.9,en-US;q=0.8,en;q=0.7 HTTP_HOST=www.cockerhamonline.com HTTP_REFERER=https://www.cockerhamonline.com/artcom.cgi HTTP_SEC_CH_UA="Chromium";v="110", "Not A(Brand";v="24", "Yandex";v="23" HTTP_SEC_CH_UA_MOBILE=?1 HTTP_SEC_CH_UA_PLATFORM="Android" HTTP_SEC_FETCH_DEST=image HTTP_SEC_FETCH_MODE=no-cors HTTP_SEC_FETCH_SITE=same-origin HTTP_USER_AGENT=Mozilla/5.0 (Linux; arm_64; Android 8.1.0; BKK-LX2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 YaBrowser/23.3.0.219.00 SA/3 Mobile Safari/537.36 HTTP_X_HTTPS=1 PATH=/usr/local/bin:/usr/bin:/bin QUERY_STRING=d=Cockerhamonline%20Articles%20&%20Comments REMOTE_ADDR=188.162.229.17 REMOTE_PORT=21110 REQUEST_METHOD=GET REQUEST_SCHEME=https REQUEST_URI=/neodance/data/Super/MarioKart8.cgi?d=Cockerhamonline%20Articles%20&%20Comments SCRIPT_FILENAME=/home1/cockerh1/public_html/neodance/data/Super/MarioKart8.cgi SCRIPT_NAME=/neodance/data/Super/MarioKart8.cgi SCRIPT_URI=https://www.cockerhamonline.com/neodance/data/Super/MarioKart8.cgi SCRIPT_URL=/neodance/data/Super/MarioKart8.cgi SERVER_ADDR=67.20.76.175 SERVER_ADMIN=webmaster@cockerhamonline.com SERVER_NAME=www.cockerhamonline.com SERVER_PORT=443 SERVER_PROTOCOL=HTTP/2.0 SERVER_SIGNATURE= SERVER_SOFTWARE=Apache SSL_TLS_SNI=www.cockerhamonline.com TZ=America/Boise UNIQUE_ID=ZC4dL_M9CIsMUn-Anr9fCQAA3Sk WHOIS DATA [Querying whois.ripe.net] [whois.ripe.net] % This is the RIPE Database query service. % The objects are in RPSL format. % % The RIPE Database is subject to Terms and Conditions. % See http://www.ripe.net/db/support/db-terms-conditions.pdf % Note: this output has been filtered. % To receive output for a database update, use the "-B" flag. % Information related to '188.162.229.0 - 188.162.229.255' % Abuse contact for '188.162.229.0 - 188.162.229.255' is 'abuse-mailbox@megafon.ru' inetnum: 188.162.229.0 - 188.162.229.255 netname: SCARTEL descr: Khabarovsk Yota PAT Clients country: RU admin-c: AAG12 tech-c: AAG12 status: ASSIGNED PA geoloc: 48.48202501720533 135.06591796875 mnt-by: GDC-TR-CoreIP mnt-by: MEGAFON-RIPE-MNT created: 2013-10-30T17:37:55Z last-modified: 2020-08-20T09:44:03Z source: RIPE person: Scartel Network of PJSC Megafon address: 30, Kadashevskaya emb. address: 115035 address: Moscow address: RUSSIAN FEDERATION phone: +74959801970 nic-hdl: AAG12 mnt-by: SCARTEL-MNT mnt-by: MEGAFON-RIPE-MNT created: 2012-04-11T12:24:51Z last-modified: 2017-10-30T22:19:05Z source: RIPE % Information related to '188.162.229.0/24AS31133' route: 188.162.229.0/24 origin: AS31133 mnt-by: GDC-TR-CoreIP mnt-by: MEGAFON-RIPE-MNT created: 2020-11-06T06:45:55Z last-modified: 2020-11-06T06:46:13Z source: RIPE % This query was served by the RIPE Database Query Service version 1.106 (DEXTER)