Whois ASN lookup : (WHOIS AS202209)

% This is the RIPE Database query service.
% The objects are in RPSL format.
% The RIPE Database is subject to Terms and Conditions.
% See
% Note: this output has been filtered.
%       To receive output for a database update, use the '-B' flag.
% Information related to 'AS196608 - AS210331'
as-block:       AS196608 - AS210331
descr:          RIPE NCC ASN block
remarks:        These AS Numbers are assigned to network operators in the RIPE NCC service region.
mnt-by:         RIPE-NCC-HM-MNT
created:        2018-12-04T08:56:54Z
last-modified:  2018-12-04T08:56:54Z
source:         RIPE
% Information related to 'AS202209'
% Abuse contact for 'AS202209' is ''
aut-num:        AS202209
as-name:        TVTRYAVNA-AS
org:            ORG-ECL17-RIPE
import:         from  AS12716   action pref=50; accept ANY
export:         to    AS12716   announce AS202209
import:         from  AS8866    action pref=50; accept ANY
export:         to    AS8866    announce AS202209
admin-c:        TNS20-RIPE
tech-c:         TNS20-RIPE
status:         ASSIGNED
mnt-by:         RIPE-NCC-END-MNT
mnt-by:         SPNET-MNT
created:        2014-03-11T12:07:43Z
last-modified:  2018-09-04T11:25:17Z
source:         RIPE
sponsoring-org: ORG-MN1-RIPE
organisation:   ORG-ECL17-RIPE
org-name:       Erma Consulting Ltd.
org-type:       OTHER
address:        Ovcha Kupel 2, bl 31
address:        Sofia, Bulgaria
abuse-c:        AR28831-RIPE
phone:          +359 886 846735
mnt-ref:        SPNET-MNT
mnt-by:         SPNET-MNT
created:        2014-03-10T11:39:57Z
last-modified:  2014-11-17T22:38:51Z
source:         RIPE # Filtered
person:         Tv Net Satellite i SIE
address:        33, Angel Kanchev Str.
address:        Tryavna, Bulgaria
phone:          +359 886 846735
nic-hdl:        TNS20-RIPE
mnt-by:         SPNET-MNT
created:        2014-03-10T11:45:48Z
last-modified:  2014-03-10T11:45:48Z
source:         RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.95.1 (WAGYU)



DDoS-attack last 100 logs

Download DDoS Attacks Report AS202209 November 22 2019 08:03:24

1.2019-11-22 08:00:26
BG AS202209 Hackers using Telnet (port 23) to attack
2.2019-10-16 13:53:12
BG AS202209 Hackers using Telnet (port 23) to attack
3.2019-09-16 12:26:46
BG AS202209 SYN flood