AS10429


Whois ASN lookup : (WHOIS AS10429)

#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2019, American Registry for Internet Numbers, Ltd.
#
ASNumber:       10429
ASName:         LACNIC-10429
ASHandle:       AS10429
RegDate:        2002-07-26
Updated:        2007-12-17
Comment:        This AS is under LACNIC responsibility for further allocations to
Comment:        users in LACNIC region.
Comment:        Please see http://www.lacnic.net/ for further details, or check the
Comment:        WHOIS server located at http://whois.lacnic.net    
Ref:            https://rdap.arin.net/registry/autnum/10429
ResourceLink:  http://lacnic.net/cgi-bin/lacnic/whois
ResourceLink:  whois.lacnic.net
OrgName:        Latin American and Caribbean IP address Regional Registry
OrgId:          LACNIC
Address:        Rambla Republica de Mexico 6125
City:           Montevideo
StateProv:      
PostalCode:     11400
Country:        UY
RegDate:        2002-07-26
Updated:        2018-03-15
Ref:            https://rdap.arin.net/registry/entity/LACNIC
ReferralServer:  whois://whois.lacnic.net
ResourceLink:  http://lacnic.net/cgi-bin/lacnic/whois
OrgAbuseHandle: LWI100-ARIN
OrgAbuseName:   LACNIC Whois Info
OrgAbusePhone:  +598-2604-2222 
OrgAbuseEmail:  abuse@lacnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LWI100-ARIN
OrgTechHandle: LACNIC-ARIN
OrgTechName:   LACNIC Whois Info
OrgTechPhone:  +598-2604-2222 
OrgTechEmail:  whois-contact@lacnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/LACNIC-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2019, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.lacnic.net.
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries
 
% Brazilian resource: whois.registro.br
% Copyright (c) Nic.br
%  The use of the data below is only permitted as described in
%  full by the terms of use at https://registro.br/termo/en.html ,
%  being prohibited its distribution, commercialization or
%  reproduction, in particular, to use it for advertising or
%  any similar purpose.
%  2019-10-12T21:36:12-03:00
aut-num:     AS10429
owner:       TELEFNICA BRASIL S.A
ownerid:     02.558.157/0001-62
responsible: Diretoria de Planejamento e Tecnologia
country:     BR
owner-c:     ARITE
routing-c:   TEBSA15
abuse-c:     CSTBR
created:     19991116
changed:     20190730
inetnum:     200.205.0.0/16
inetnum:     200.148.128.0/17
inetnum:     200.232.0.0/17
inetnum:     200.153.0.0/17
inetnum:     200.168.160.0/19
inetnum:     200.168.192.0/18
inetnum:     200.171.192.0/19
inetnum:     200.206.0.0/17
inetnum:     200.159.0.0/18
inetnum:     200.159.64.0/18
inetnum:     201.28.0.0/17
inetnum:     201.28.128.0/17
inetnum:     201.63.0.0/16
inetnum:     201.91.0.0/16
inetnum:     189.20.0.0/16
inetnum:     189.44.0.0/16
inetnum:     189.56.0.0/15
inetnum:     2001:12e0::/32
inetnum:     189.108.0.0/15
inetnum:     187.8.0.0/15
inetnum:     187.50.0.0/15
inetnum:     187.92.0.0/15
inetnum:     186.200.0.0/15
inetnum:     186.238.0.0/15
inetnum:     168.227.192.0/22
inetnum:     177.25.0.0/18
inetnum:     177.61.128.0/18
nic-hdl-br:  ARITE
person:      Administrao Rede IP Telesp
e-mail:      dominios-vivo.br@telefonica.com
country:     BR
created:     20080407
changed:     20160621
nic-hdl-br:  TEBSA15
person:      TELEFONICA BRASIL S.A
e-mail:      roteamento.br@telefonica.com
country:     BR
created:     20190530
changed:     20190530
nic-hdl-br:  CSTBR
person:      CSIRT TELEFONICA BR
e-mail:      abuse.br@telefonica.com
country:     BR
created:     20180713
changed:     20180713
% Security and mail abuse issues should also be addressed to
% cert.br, http://www.cert.br/ , respectivelly to cert@cert.br
% and mail-abuse@cert.br
%
% whois.registro.br accepts only direct match queries. Types
% of queries are: domain (.br), registrant (tax ID), ticket,
% provider, contact handle (ID), CIDR block, IP and ASN.

            

BLOCK DDOS ATTACKS ASN : 10429

DDoS-attack last 100 logs

Download DDoS Attacks Report AS10429 December 12 2019 08:47:22

IDDateCountryIPCIDRASNCategories
1.2019-12-12 00:42:29
BR
189.44.178.170 189.44.128.0/17 AS10429 Potentially Bad Traffic HTTP 1.0
2.2019-12-12 00:42:26
BR
189.20.22.18 189.20.0.0/17 AS10429 Potentially Bad Traffic HTTP 1.0
3.2019-12-12 00:42:02
BR
187.93.139.20 187.93.0.0/16 AS10429 Potentially Bad Traffic HTTP 1.0
4.2019-12-12 00:42:01
BR
187.8.182.30 187.8.0.0/16 AS10429 Potentially Bad Traffic HTTP 1.0
5.2019-12-12 00:41:59
BR
187.50.59.252 187.50.0.0/16 AS10429 Potentially Bad Traffic HTTP 1.0
6.2019-11-26 22:58:09
BR
187.113.174.98 187.113.160.0/20 AS10429 Hackers using Telnet (port 23) to attack
7.2019-11-22 21:33:08
BR
201.91.195.58 201.91.128.0/17 AS10429 Scanning For and Finding Vulnerabilities
8.2019-11-22 18:30:38
BR
200.153.115.124 200.153.64.0/18 AS10429 Hackers using Telnet (port 23) to attack
9.2019-11-21 11:48:29
AU
191.248.198.216 191.248.192.0/19 AS10429 Hackers using Telnet (port 23) to attack
10.2019-11-21 07:24:32
BR
179.83.250.152 179.83.224.0/19 AS10429 Hackers using Telnet (port 23) to attack
11.2019-11-21 05:44:34
BR
179.180.19.230 179.180.0.0/19 AS10429 Hackers using Telnet (port 23) to attack
12.2019-11-20 18:41:35
BR
187.113.111.65 187.113.64.0/18 AS10429 Hackers using Telnet (port 23) to attack
13.2019-11-20 04:12:46
BR
179.162.76.250 179.162.64.0/19 AS10429 Hackers using Telnet (port 23) to attack
14.2019-11-19 02:46:21
BR
177.135.139.97 177.135.128.0/20 AS10429 Hackers using Telnet (port 23) to attack
15.2019-11-18 14:12:05
BR
189.56.88.83 189.56.0.0/16 AS10429 Hackers using Telnet (port 23) to attack
16.2019-11-18 12:36:25
BR
189.108.123.18 189.108.0.0/16 AS10429 Hackers using Telnet (port 23) to attack
17.2019-11-17 18:27:27
BR
201.63.196.124 201.63.128.0/17 AS10429 RECIDIVE
18.2019-11-17 08:28:18
BR
177.98.143.98 177.98.128.0/19 AS10429 ANTI HACKER PROTECTION
19.2019-11-16 18:02:03
BR
187.9.122.210 187.9.0.0/16 AS10429 Hackers using SSH (port 22) to attack
20.2019-11-16 17:30:09
BR
179.95.208.232 179.95.192.0/19 AS10429 Hackers using Telnet (port 23) to attack
21.2019-11-16 15:05:38
BR
177.17.33.44 177.17.32.0/19 AS10429 Hackers using Telnet (port 23) to attack
22.2019-11-16 13:52:06
BR
200.171.210.148 200.171.208.0/20 AS10429 Hackers using Telnet (port 23) to attack
23.2019-11-16 13:23:18
BR
177.207.204.230 177.207.204.0/22 AS10429 Scanning For and Finding Vulnerabilities
24.2019-11-16 04:42:49
BR
177.40.133.16 177.40.128.0/19 AS10429 Hackers using Telnet (port 23) to attack
25.2019-11-15 15:02:53
BR
200.232.6.107 200.232.0.0/18 AS10429 ANTI HACKER PROTECTION
26.2019-11-15 11:39:12
EU
189.56.179.218 189.56.0.0/16 AS10429 ANTI HACKER PROTECTION
27.2019-11-15 01:41:45
BR
177.206.108.81 177.206.104.0/21 AS10429 Hackers using Telnet (port 23) to attack
28.2019-11-14 06:08:04
BR
177.133.148.210 177.133.128.0/19 AS10429 Hackers using Telnet (port 23) to attack
29.2019-11-12 13:38:58
BR
187.92.27.130 187.92.0.0/17 AS10429 ANTI HACKER PROTECTION
30.2019-11-11 19:04:37
BR
177.43.171.21 177.43.168.0/21 AS10429 SERVER Error 403 Forbidden
31.2019-11-11 08:59:22
BR
177.98.74.52 177.98.64.0/19 AS10429 Hackers using Telnet (port 23) to attack
32.2019-11-10 17:29:44
BR
191.248.206.3 191.248.192.0/19 AS10429 Hackers using Telnet (port 23) to attack
33.2019-11-10 15:26:09
BR
179.180.220.53 179.180.208.0/20 AS10429 Hackers using Telnet (port 23) to attack
34.2019-11-09 07:26:39
BR
186.212.123.119 186.212.96.0/19 AS10429 Hackers using Telnet (port 23) to attack
35.2019-11-09 03:52:58
BR
186.201.78.64 186.201.0.0/16 AS10429 Hackers using Telnet (port 23) to attack
36.2019-11-08 20:37:07
BR
189.20.178.14 189.20.128.0/17 AS10429 Hackers using Telnet (port 23) to attack
37.2019-11-07 12:43:47
BR
189.109.127.130 189.109.0.0/16 AS10429 Scanning For and Finding Vulnerabilities
38.2019-11-07 06:27:15
BR
177.40.220.249 177.40.192.0/19 AS10429 Hackers using Telnet (port 23) to attack
39.2019-11-04 20:33:45
BR
200.153.11.82 200.153.0.0/18 AS10429 Scanning For and Finding Vulnerabilities
40.2019-11-04 19:05:01
BR
187.51.177.178 187.51.0.0/16 AS10429 ANTI HACKER PROTECTION
41.2019-11-02 05:49:38
BR
186.200.214.136 186.200.0.0/16 AS10429 ANTI HACKER PROTECTION
42.2019-11-01 20:28:59
BR
189.57.88.99 189.57.0.0/16 AS10429 ANTI HACKER PROTECTION
43.2019-11-01 09:14:49
BR
201.91.87.106 201.91.0.0/17 AS10429 Hackers using Telnet (port 23) to attack
44.2019-10-28 04:59:45
BR
200.206.63.34 200.206.0.0/18 AS10429 Access blocked (abuse detected) FORBIDDEN (403)
45.2019-10-26 17:59:08
BR
179.95.175.201 179.95.160.0/20 AS10429 Hackers using Telnet (port 23) to attack
46.2019-10-24 13:34:26
BR
201.47.124.126 201.47.112.0/20 AS10429 Hackers using Telnet (port 23) to attack
47.2019-10-19 14:55:47
BR
177.43.160.224 177.43.160.0/23 AS10429 ANTI HACKER PROTECTION
48.2019-10-15 05:43:36
BR
201.28.96.5 201.28.64.0/18 AS10429 Hackers using Telnet (port 23) to attack
49.2019-10-14 15:32:49
BR
177.205.144.74 177.205.144.0/21 AS10429 Hackers using Telnet (port 23) to attack
50.2019-10-11 21:40:16
BR
177.41.12.255 177.41.0.0/20 AS10429 Hackers using Telnet (port 23) to attack
51.2019-10-11 21:14:53
BR
177.205.27.165 177.205.16.0/20 AS10429 Hackers using Telnet (port 23) to attack
52.2019-10-10 14:47:16
BR
177.19.182.176 177.19.176.0/20 AS10429 Hackers using Telnet (port 23) to attack
53.2019-10-10 07:17:51
BR
177.206.90.130 177.206.88.0/21 AS10429 Hackers using Telnet (port 23) to attack
54.2019-10-09 19:30:40
BR
177.207.173.90 177.207.168.0/21 AS10429 Hackers using Telnet (port 23) to attack
55.2019-10-08 08:43:04
BR
177.40.229.220 177.40.224.0/20 AS10429 Hackers using Telnet (port 23) to attack
56.2019-10-06 11:16:34
BR
177.17.67.246 177.17.64.0/20 AS10429 Hackers using Telnet (port 23) to attack
57.2019-10-06 06:27:24
BR
177.205.154.190 177.205.152.0/22 AS10429 Scanning For and Finding Vulnerabilities
58.2019-10-05 20:55:12
BR
177.205.4.21 177.205.0.0/21 AS10429 Hackers using Telnet (port 23) to attack
59.2019-10-05 20:52:57
BR
177.19.51.97 177.19.48.0/20 AS10429 Scanning For and Finding Vulnerabilities
60.2019-10-05 14:53:56
BR
177.205.255.12 177.205.248.0/21 AS10429 Scanning For and Finding Vulnerabilities
61.2019-10-04 12:43:30
BR
189.115.219.219 189.115.208.0/20 AS10429 Scanning For and Finding Vulnerabilities
62.2019-10-04 06:15:00
BR
200.168.228.101 200.168.224.0/19 AS10429 Scanning For and Finding Vulnerabilities
63.2019-10-03 17:51:36
BR
200.205.51.66 200.205.0.0/17 AS10429 Scanning For and Finding Vulnerabilities
64.2019-10-03 17:35:17
BR
177.16.134.31 177.16.132.0/22 AS10429 Scanning For and Finding Vulnerabilities
65.2019-10-03 12:42:36
BR
179.183.50.49 179.183.48.0/20 AS10429 Scanning For and Finding Vulnerabilities
66.2019-10-03 10:53:33
BR
191.35.6.19 191.35.0.0/20 AS10429 Scanning For and Finding Vulnerabilities
67.2019-10-03 05:46:59
BR
179.178.252.247 179.178.240.0/20 AS10429 Scanning For and Finding Vulnerabilities
68.2019-10-02 22:58:23
BR
200.139.70.224 200.139.64.0/20 AS10429 Scanning For and Finding Vulnerabilities
69.2019-10-02 21:58:25
BR
187.58.186.248 187.58.184.0/21 AS10429 SERVER Error 403 Forbidden
70.2019-10-01 23:04:41
BR
189.115.174.33 189.115.160.0/20 AS10429 Scanning For and Finding Vulnerabilities
71.2019-10-01 18:31:17
BR
177.205.182.199 177.205.176.0/21 AS10429 DDoS Apache Servers
72.2019-09-30 20:25:41
BR
177.205.227.106 177.205.224.0/20 AS10429 Hackers using Telnet (port 23) to attack
73.2019-09-29 22:03:09
BR
177.19.238.91 177.19.224.0/20 AS10429 Hackers using Telnet (port 23) to attack
74.2019-09-29 16:00:00
BR
179.176.40.75 179.176.32.0/20 AS10429 Hackers using Telnet (port 23) to attack
75.2019-09-29 14:05:25
BR
187.59.225.234 187.59.224.0/20 AS10429 Hackers using Telnet (port 23) to attack
76.2019-09-29 08:56:16
BR
179.187.224.50 179.187.224.0/20 AS10429 SYN flood
77.2019-09-29 05:40:54
BR
179.182.124.27 179.182.112.0/20 AS10429 SCAN PORT : 80
78.2019-09-28 21:37:27
BR
179.178.10.22 179.178.0.0/20 AS10429 SYN flood
79.2019-09-27 22:29:20
BR
191.250.157.109 191.250.144.0/20 AS10429 Hackers using Telnet (port 23) to attack
80.2019-09-26 19:41:34
BR
187.115.253.246 187.115.240.0/20 AS10429 Web Application Attack
81.2019-09-26 15:23:30
BR
186.215.13.28 186.215.0.0/20 AS10429 Hackers using Telnet (port 23) to attack
82.2019-09-26 05:58:01
BR
177.41.238.224 177.41.224.0/20 AS10429 Hackers using Telnet (port 23) to attack
83.2019-09-25 12:01:56
BR
189.44.111.60 189.44.0.0/17 AS10429 Web Application Attack
84.2019-09-25 11:14:45
BR
177.98.6.102 177.98.0.0/20 AS10429 DDoS Apache Servers
85.2019-09-24 18:15:42
BR
179.183.162.104 179.183.160.0/21 AS10429 Hackers using Telnet (port 23) to attack
86.2019-09-24 07:48:33
BR
201.63.46.107 201.63.0.0/17 AS10429 Web Application Attack
87.2019-09-23 21:52:52
BR
187.59.245.237 187.59.240.0/21 AS10429 Hackers using Telnet (port 23) to attack
88.2019-09-23 18:45:33
BR
191.32.248.78 191.32.240.0/20 AS10429 Hackers using Telnet (port 23) to attack
89.2019-09-23 11:54:46
BR
179.182.166.192 179.182.160.0/20 AS10429 Hackers using Telnet (port 23) to attack
90.2019-09-23 07:47:21
BR
179.180.136.72 179.180.128.0/20 AS10429 Hackers using Telnet (port 23) to attack
91.2019-09-22 17:49:27
BR
177.43.130.221 177.43.128.0/21 AS10429 Web Application Attack
92.2019-09-21 14:06:33
BR
179.184.134.18 179.184.132.0/22 AS10429 Web Application Attack
93.2019-09-21 07:28:58
BR
200.232.64.50 200.232.64.0/18 AS10429 Web Application Attack
94.2019-09-19 17:52:22
BR
179.181.236.32 179.181.224.0/20 AS10429 SYN flood
95.2019-09-16 23:53:53
BR
177.207.227.34 177.207.224.0/20 AS10429 SYN flood
96.2019-09-10 00:17:46
BR
179.177.43.247 179.177.32.0/20 AS10429 SYN flood