AS14080


Whois ASN lookup : (WHOIS AS14080)

#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2019, American Registry for Internet Numbers, Ltd.
#
ASNumber:       14080
ASName:         LACNIC-14080
ASHandle:       AS14080
RegDate:        2002-07-26
Updated:        2007-12-17
Comment:        This AS is under LACNIC responsibility for further allocations to
Comment:        users in LACNIC region.
Comment:        Please see http://www.lacnic.net/ for further details, or check the
Comment:        WHOIS server located at http://whois.lacnic.net    
Ref:            https://rdap.arin.net/registry/autnum/14080
ResourceLink:  http://lacnic.net/cgi-bin/lacnic/whois
ResourceLink:  whois.lacnic.net
OrgName:        Latin American and Caribbean IP address Regional Registry
OrgId:          LACNIC
Address:        Rambla Republica de Mexico 6125
City:           Montevideo
StateProv:      
PostalCode:     11400
Country:        UY
RegDate:        2002-07-26
Updated:        2018-03-15
Ref:            https://rdap.arin.net/registry/entity/LACNIC
ReferralServer:  whois://whois.lacnic.net
ResourceLink:  http://lacnic.net/cgi-bin/lacnic/whois
OrgTechHandle: LACNIC-ARIN
OrgTechName:   LACNIC Whois Info
OrgTechPhone:  +598-2604-2222 
OrgTechEmail:  whois-contact@lacnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/LACNIC-ARIN
OrgAbuseHandle: LWI100-ARIN
OrgAbuseName:   LACNIC Whois Info
OrgAbusePhone:  +598-2604-2222 
OrgAbuseEmail:  abuse@lacnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LWI100-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2019, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.lacnic.net.
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries
 
% LACNIC resource: whois.lacnic.net
% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2019-10-13 08:44:37 (-03 -03:00)
aut-num:     AS14080
owner:       Telmex Colombia S.A.
ownerid:     CO-ACSA-LACNIC
responsible: Operaciones Core IP
address:     CLARO FIJO COLOMBIA - Cra 68A No. 24B-10, 11111, 
address:     11111 - Bogota - DC
country:     CO
phone:       +57 01 7480000 []
owner-c:     ATI
routing-c:   ATI
abuse-c:     ATI
created:     19991015
changed:     20010126
nic-hdl:     ATI
person:      Network Security Team
e-mail:      abuse@TELMEXLA.NET.CO
address:     Carrera 68a #24b-10, 00, Plaza Claro
address:     111321 - Bogota - DC
country:     CO
phone:       +57  017480456 [81966]
created:     20020909
changed:     20180302
% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.

            

BLOCK DDOS ATTACKS ASN : 14080

DDoS-attack last 100 logs

Download DDoS Attacks Report AS14080 December 12 2019 09:11:56

IDDateCountryIPCIDRASNCategories
1.2019-12-12 00:42:47
CO
190.85.115.78 190.85.96.0/19 AS14080 Potentially Bad Traffic HTTP 1.0
2.2019-12-12 00:42:35
CO
190.145.132.250 190.145.128.0/19 AS14080 Potentially Bad Traffic HTTP 1.0
3.2019-12-12 00:42:35
CO
190.144.51.114 190.144.48.0/20 AS14080 Potentially Bad Traffic HTTP 1.0
4.2019-12-12 00:38:33
CO
181.57.144.66 181.57.144.0/20 AS14080 Potentially Bad Traffic HTTP 1.0
5.2019-12-12 00:38:33
CO
181.49.106.227 181.49.96.0/19 AS14080 Potentially Bad Traffic HTTP 1.0
6.2019-12-12 00:38:32
CO
181.48.154.98 181.48.128.0/19 AS14080 Potentially Bad Traffic HTTP 1.0
7.2019-11-30 06:17:24
CO
190.85.163.36 190.85.160.0/19 AS14080 Hackers using Telnet (port 23) to attack
8.2019-11-29 21:44:39
CO
181.49.157.10 181.49.128.0/19 AS14080 Hackers using SSH (port 22) to attack
9.2019-11-28 12:36:04
CO
190.145.55.89 190.145.32.0/19 AS14080 Hackers using SSH (port 22) to attack
10.2019-11-28 01:27:26
CO
181.48.202.218 181.48.192.0/19 AS14080 RECIDIVE
11.2019-11-27 00:34:38
CO
190.144.119.70 190.144.96.0/19 AS14080 Hackers using Telnet (port 23) to attack
12.2019-11-25 10:53:51
CO
190.144.71.194 190.144.64.0/19 AS14080 Hackers using Telnet (port 23) to attack
13.2019-11-24 10:17:48
CO
181.49.4.11 181.49.0.0/19 AS14080 Hackers using Telnet (port 23) to attack
14.2019-11-22 09:07:01
CO
181.48.84.155 181.48.64.0/19 AS14080 Hackers using Telnet (port 23) to attack
15.2019-11-22 08:59:08
CO
190.145.101.213 190.145.96.0/19 AS14080 Hackers using Telnet (port 23) to attack
16.2019-11-22 05:22:41
CO
190.85.82.150 190.85.64.0/19 AS14080 ANTI HACKER PROTECTION
17.2019-11-21 13:19:14
CO
190.85.143.34 190.85.128.0/19 AS14080 Hackers using Telnet (port 23) to attack
18.2019-11-21 08:12:11
CO
190.85.24.94 190.85.0.0/19 AS14080 ANTI HACKER PROTECTION
19.2019-11-18 05:28:50
CO
190.147.139.54 190.147.139.0/24 AS14080 Hackers using Telnet (port 23) to attack
20.2019-11-15 19:09:17
CO
181.48.33.18 181.48.32.0/19 AS14080 ANTI HACKER PROTECTION
21.2019-11-10 10:14:58
CO
181.48.111.246 181.48.96.0/19 AS14080 SERVER 301 Moved Permanently
22.2019-11-02 14:40:31
CO
190.145.255.218 190.145.248.0/21 AS14080 Hackers using Telnet (port 23) to attack
23.2019-10-25 00:50:14
CO
190.85.213.50 190.85.192.0/19 AS14080 Hackers using Telnet (port 23) to attack
24.2019-10-24 13:03:39
CO
190.85.234.215 190.85.224.0/20 AS14080 Hackers using SSH (port 22) to attack
25.2019-10-23 20:50:55
CO
190.145.23.202 190.145.0.0/19 AS14080 Scanning For and Finding Vulnerabilities
26.2019-10-21 08:33:29
CO
181.49.164.253 181.49.160.0/19 AS14080 Hackers using SSH (port 22) to attack
27.2019-10-20 19:30:23
CO
181.49.60.6 181.49.60.0/23 AS14080 ANTI HACKER PROTECTION
28.2019-10-19 22:37:58
CO
181.49.199.202 181.49.192.0/19 AS14080 Hackers using Telnet (port 23) to attack
29.2019-10-19 00:23:24
CO
181.48.164.130 181.48.160.0/19 AS14080 ANTI HACKER PROTECTION
30.2019-10-18 11:05:10
CO
181.48.29.77 181.48.0.0/19 AS14080 ANTI HACKER PROTECTION
31.2019-10-17 23:09:11
CO
181.57.167.246 181.57.164.0/22 AS14080 ANTI HACKER PROTECTION
32.2019-10-16 10:14:41
CO
181.49.240.174 181.49.224.0/19 AS14080 Hackers using Telnet (port 23) to attack
33.2019-10-15 19:21:57
CO
190.145.224.174 190.145.224.0/22 AS14080 ANTI HACKER PROTECTION
34.2019-10-15 05:00:53
CO
190.85.54.217 190.85.32.0/19 AS14080 Hackers using Telnet (port 23) to attack
35.2019-10-15 04:22:13
CO
181.57.133.130 181.57.132.0/22 AS14080 Hackers using SSH (port 22) to attack
36.2019-10-12 20:29:47
CO
190.144.33.65 190.144.32.0/20 AS14080 Scanning For and Finding Vulnerabilities
37.2019-10-12 17:04:06
CO
181.57.208.226 181.57.192.0/19 AS14080 Hackers using Telnet (port 23) to attack
38.2019-10-11 16:52:36
CO
190.145.208.45 190.145.192.0/19 AS14080 Hackers using Telnet (port 23) to attack
39.2019-10-10 23:11:29
CO
181.57.162.52 181.57.162.0/23 AS14080 Hackers using Telnet (port 23) to attack
40.2019-10-08 09:31:19
CO
190.145.91.38 190.145.64.0/19 AS14080 Hackers using Telnet (port 23) to attack
41.2019-10-05 17:20:51
CO
181.48.245.170 181.48.240.0/21 AS14080 Scanning For and Finding Vulnerabilities
42.2019-10-04 10:17:24
CO
181.57.175.11 181.57.168.0/21 AS14080 Scanning For and Finding Vulnerabilities
43.2019-10-04 07:25:03
CO
181.57.138.186 181.57.136.0/21 AS14080 Scanning For and Finding Vulnerabilities
44.2019-10-02 16:01:46
CO
190.144.18.77 190.144.16.0/20 AS14080 Scanning For and Finding Vulnerabilities
45.2019-09-29 15:20:29
CO
190.144.164.66 190.144.160.0/19 AS14080 Hackers using Telnet (port 23) to attack
46.2019-09-29 08:43:56
CO
190.145.237.22 190.145.232.0/21 AS14080 SCAN PORT : 80
47.2019-09-29 07:36:53
CO
181.48.225.54 181.48.224.0/20 AS14080 Hackers using Telnet (port 23) to attack
48.2019-09-28 23:48:03
CO
190.144.145.146 190.144.128.0/19 AS14080 Hackers using SSH (port 22) to attack
49.2019-09-26 00:50:34
CO
190.145.168.169 190.145.160.0/19 AS14080 Web Application Attack
50.2019-09-23 15:40:17
CO
190.143.125.13 190.143.124.0/23 AS14080 DDoS Apache Servers
51.2019-09-23 12:33:36
CO
190.144.198.82 190.144.192.0/19 AS14080 DDoS Apache Servers
52.2019-09-23 02:39:46
CO
190.144.6.89 190.144.0.0/20 AS14080 DDoS Apache Servers
53.2019-09-15 14:49:39
CO
181.49.41.10 181.49.32.0/20 AS14080 SYN flood