AS1680


Whois ASN lookup : (WHOIS AS1680)

#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2019, American Registry for Internet Numbers, Ltd.
#
ASNumber:       1680
ASName:         RIPE-ASNBLOCK-1680
ASHandle:       AS1680
RegDate:        2002-10-15
Updated:        2003-04-25
Comment:        These addresses have been further assigned to users in
Comment:        the RIPE NCC region. Contact information can be found in
Comment:        the RIPE database at http://www.ripe.net/whois    
Ref:            https://rdap.arin.net/registry/autnum/1680
ResourceLink:  https://apps.db.ripe.net/search/query.html
ResourceLink:  whois.ripe.net
OrgName:        RIPE Network Coordination Centre
OrgId:          RIPE
Address:        P.O. Box 10096
City:           Amsterdam
StateProv:      
PostalCode:     1001EB
Country:        NL
RegDate:        
Updated:        2013-07-29
Ref:            https://rdap.arin.net/registry/entity/RIPE
ReferralServer:  whois://whois.ripe.net
ResourceLink:  https://apps.db.ripe.net/search/query.html
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName:   Abuse Contact
OrgAbusePhone:  +31205354444 
OrgAbuseEmail:  abuse@ripe.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
OrgTechHandle: RNO29-ARIN
OrgTechName:   RIPE NCC Operations
OrgTechPhone:  +31 20 535 4444 
OrgTechEmail:  hostmaster@ripe.net
OrgTechRef:    https://rdap.arin.net/registry/entity/RNO29-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2019, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.ripe.net.
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf
% Note: this output has been filtered.
%       To receive output for a database update, use the '-B' flag.
% Information related to 'AS1680 - AS1680'
as-block:       AS1680 - AS1680
descr:          RIPE NCC ASN block
remarks:        These AS Numbers are assigned to network operators in the RIPE NCC service region.
mnt-by:         RIPE-NCC-HM-MNT
created:        2018-11-22T15:27:11Z
last-modified:  2018-11-22T15:27:11Z
source:         RIPE
% Information related to 'AS1680'
% Abuse contact for 'AS1680' is 'nvabuse@cellcom.co.il'
aut-num:        AS1680
as-name:        NV-ASN
org:            ORG-NL5-RIPE
descr:          CELLCOM ltd.
admin-c:        GW390-RIPE
tech-c:         GW390-RIPE
status:         LEGACY
admin-c:        NN105-RIPE
tech-c:         NN105-RIPE
mnt-by:         NV-MNT-RIPE
mnt-by:         CELLCOM-MNT
created:        2002-08-21T16:42:11Z
last-modified:  2018-02-22T09:11:26Z
source:         RIPE # Filtered
organisation:   ORG-NL5-RIPE
org-name:       Cellcom Fixed Line Communication L.P.
org-type:       LIR
address:        10 Hagavish st.
address:        4250708
address:        Netanya
address:        ISRAEL
phone:          +97273-7000073
fax-no:         +97248550454
abuse-c:        AR15573-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        NV-MNT-RIPE
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         NV-MNT-RIPE
created:        2004-04-17T11:27:52Z
last-modified:  2019-04-03T13:17:55Z
source:         RIPE # Filtered
role:           CELLCOM NOC team
address:        Omega Building
address:        MATAM industrial park
address:        Haifa 31905
address:        Israel
phone:          +972 4 8560 600
fax-no:         +972 4 8551 132
abuse-mailbox:  nvabuse@cellcom.co.il
remarks:        Send Spam and Abuse complains ONLY to the above address!
admin-c:        NVAC-RIPE
tech-c:         NVTC-RIPE
nic-hdl:        NN105-RIPE
mnt-by:         NV-MNT-RIPE
created:        1970-01-01T00:00:00Z
last-modified:  2018-02-22T09:10:47Z
source:         RIPE # Filtered
person:         Group WAN
address:        Group, WAN
                NetVision LTD.
                Omega Advanced Technology Center,
                MATAM Post Office
                Haifa, 31905
                IL
phone:          +972 4 8560 550
fax-no:         +972 4 8550 345
nic-hdl:        GW390-RIPE
mnt-by:         RIPE-ERX-MNT
created:        2002-08-21T15:45:33Z
last-modified:  2002-08-21T15:45:33Z
source:         RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.95.1 (WAGYU)

            

BLOCK DDOS ATTACKS ASN : 1680

DDoS-attack last 100 logs

Download DDoS Attacks Report AS1680 January 15 2020 04:01:56

IDDateCountryIPCIDRASNCategories
1.2020-01-15 03:52:37
IL
80.250.158.35 80.250.144.0/20 AS1680 ANTI HACKER PROTECTION
2.2019-12-20 19:06:54
IL
212.143.220.167 212.143.208.0/20 AS1680 Hackers using Telnet (port 23) to attack
3.2019-11-27 11:10:29
IL
95.35.175.201 95.35.0.0/16 AS1680 Hackers using Telnet (port 23) to attack
4.2019-11-27 09:33:13
IL
85.65.26.53 85.65.0.0/16 AS1680 Hackers using Telnet (port 23) to attack
5.2019-11-27 02:04:58
IL
82.166.57.2 82.166.32.0/19 AS1680 Hackers using Telnet (port 23) to attack
6.2019-11-25 23:53:40
IL
93.172.137.168 93.172.0.0/16 AS1680 Hackers using Telnet (port 23) to attack
7.2019-11-25 06:42:55
IL
46.116.206.21 46.116.0.0/16 AS1680 Hackers using Telnet (port 23) to attack
8.2019-11-24 21:10:41
IL
109.186.136.127 109.186.0.0/16 AS1680 Hackers using Telnet (port 23) to attack
9.2019-11-24 07:03:24
IL
217.132.186.245 217.132.0.0/16 AS1680 Hackers using Telnet (port 23) to attack
10.2019-11-23 06:23:23
IL
85.250.113.189 85.250.0.0/16 AS1680 Hackers using Telnet (port 23) to attack
11.2019-11-22 21:44:56
IL
89.138.107.208 89.138.0.0/16 AS1680 Hackers using Telnet (port 23) to attack
12.2019-11-21 23:53:32
IL
212.143.225.240 212.143.224.0/19 AS1680 Hackers using Telnet (port 23) to attack
13.2019-11-21 09:28:02
IL
212.150.221.157 212.150.0.0/16 AS1680 Hackers using Telnet (port 23) to attack
14.2019-11-20 21:02:26
IL
89.139.53.74 89.139.0.0/16 AS1680 Hackers using SSH (port 22) to attack
15.2019-11-19 12:49:22
IL
93.173.6.201 93.173.0.0/16 AS1680 Hackers using Telnet (port 23) to attack
16.2019-11-19 09:46:49
IL
46.117.176.102 46.117.0.0/16 AS1680 Hackers using Telnet (port 23) to attack
17.2019-11-18 16:13:02
IL
199.203.62.89 199.203.32.0/19 AS1680 Hackers using Telnet (port 23) to attack
18.2019-11-18 02:10:27
IL
212.143.163.159 212.143.128.0/18 AS1680 Hackers using Telnet (port 23) to attack
19.2019-11-17 07:36:42
IL
199.203.186.142 199.203.184.0/22 AS1680 Hackers using Telnet (port 23) to attack
20.2019-11-16 07:06:37
IL
85.64.245.121 85.64.0.0/16 AS1680 Hackers using Telnet (port 23) to attack
21.2019-11-12 02:53:29
IL
62.90.164.177 62.90.0.0/16 AS1680 Hackers using Telnet (port 23) to attack
22.2019-11-10 02:14:50
IL
176.12.128.11 176.12.128.0/17 AS1680 Hackers using Telnet (port 23) to attack
23.2019-11-09 19:28:45
IL
46.210.105.46 46.210.0.0/16 AS1680 Hackers using Telnet (port 23) to attack
24.2019-11-05 06:22:14
IL
212.143.120.230 212.143.0.0/17 AS1680 Hackers using Telnet (port 23) to attack
25.2019-11-01 08:15:25
IL
82.166.134.224 82.166.128.0/18 AS1680 Hackers using Telnet (port 23) to attack
26.2019-10-31 05:31:47
IL
109.207.78.241 109.207.78.0/24 AS1680 Scanning For and Finding Vulnerabilities
27.2019-10-24 20:05:17
IL
82.166.239.79 82.166.232.0/21 AS1680 ANTI HACKER PROTECTION
28.2019-10-22 18:53:47
IL
82.166.84.218 82.166.64.0/19 AS1680 Hackers using Telnet (port 23) to attack
29.2019-10-21 12:50:10
IL
199.203.211.117 199.203.192.0/18 AS1680 Hackers using Telnet (port 23) to attack
30.2019-10-20 19:39:50
IL
82.166.3.178 82.166.0.0/20 AS1680 Hackers using Telnet (port 23) to attack
31.2019-10-15 11:36:39
IL
199.203.111.58 199.203.108.0/22 AS1680 Hackers using Telnet (port 23) to attack
32.2019-10-05 22:47:51
IL
62.0.75.135 62.0.64.0/18 AS1680 Scanning For and Finding Vulnerabilities
33.2019-10-03 00:08:53
IL
82.166.219.53 82.166.192.0/19 AS1680 Scanning For and Finding Vulnerabilities
34.2019-10-01 04:57:36
IL
207.232.5.101 207.232.0.0/18 AS1680 Scanning For and Finding Vulnerabilities
35.2019-09-29 13:07:25
IL
82.166.240.122 82.166.240.0/20 AS1680 SCAN PORT : 80
36.2019-09-25 10:38:35
IL
199.203.77.251 199.203.64.0/19 AS1680 Web Application Attack
37.2019-09-25 05:35:15
IL
82.166.27.77 82.166.24.0/22 AS1680 Hackers using Telnet (port 23) to attack