AS20845


Whois ASN lookup : (WHOIS AS20845)

% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf
% Note: this output has been filtered.
%       To receive output for a database update, use the '-B' flag.
% Information related to 'AS20485 - AS20857'
as-block:       AS20485 - AS20857
descr:          RIPE NCC ASN block
remarks:        These AS Numbers are assigned to network operators in the RIPE NCC service region.
mnt-by:         RIPE-NCC-HM-MNT
created:        2018-11-22T15:27:27Z
last-modified:  2018-11-22T15:27:27Z
source:         RIPE
% Information related to 'AS20845'
% Abuse contact for 'AS20845' is 'abuse@hdsnet.hu'
aut-num:        AS20845
as-name:        DIGICABLE
org:            ORG-EMKL1-RIPE
remarks:
remarks:        *** IPv4 Uplinks ***
import:         from AS8708 action pref=100; accept ANY
export:         to AS8708 announce AS-DIGICABLE
remarks:
remarks:        *** IPv6 Uplinks ***
mp-import:      afi ipv6.unicast from AS8708 accept ANY
mp-export:      afi ipv6.unicast to AS8708 announce AS-DIGICABLE6
remarks:
remarks:        *** IPv4 CLIENTS ***
import:         from AS21229 action pref=200; accept AS-TVNETWORK
export:         to AS21229 announce ANY
import:         from AS197523 action pref=110; accept AS197523
export:         to AS197523 announce ANY
import:         from AS34226 action pref=110; accept AS34226
export:         to AS34226 announce ANY
import:         from AS57657 action pref=110; accept AS57657
export:         to AS57657 announce ANY
import:         from AS45020 action pref=110; accept AS45020
export:         to AS45020 announce ANY
import:         from AS44945 action pref=110; accept AS44945
export:         to AS44945 announce ANY
import:         from AS29657 action pref=110; accept AS29657
export:         to AS29657 announce ANY
import:         from AS41015 action pref=110; accept AS41015
export:         to AS41015 announce ANY
import:         from AS204168 action pref=110; accept AS204168
export:         to AS204168 announce ANY
remarks:
remarks:        *** IPv4 PEERS ***
import:         from AS5507 action pref=110; accept AS-BIX
export:         to AS5507 announce AS-DIGICABLE
import:         from AS12301 action pref=150; accept AS12301:AS-ROUTES
export:         to AS12301 announce AS-DIGICABLE
import:         from AS15169 action pref=150; accept AS-GOOGLE
export:         to AS15169 announce AS-DIGICABLE
import:         from AS29278 action pref=150; accept AS-DENINET
export:         to AS29278 announce AS-DIGICABLE
import:         from AS8448 action pref=150; accept AS8448
export:         to AS8448 announce AS-DIGICABLE
remarks:
remarks:        *** IPv6 PEERS ***
mp-import:      afi ipv6.unicast from AS5507 accept ANY
mp-export:      afi ipv6.unicast to AS5507 announce AS-DIGICABLE6
mp-import:      afi ipv6.unicast from AS12301 accept ANY
mp-export:      afi ipv6.unicast to AS12301 announce AS-DIGICABLE6
mp-import:      afi ipv6.unicast from AS29278 accept ANY
mp-export:      afi ipv6.unicast to AS29278 announce AS-DIGICABLE6
mp-import:      afi ipv6.unicast from AS8448 accept AS8448
mp-export:      afi ipv6.unicast to AS8448 announce AS-DIGICABLE6
remarks:
remarks:        ------------------------------------------------
remarks:        DIGI filters out inbound prefixes longer than /24
remarks:
remarks:        Communities definitions
remarks:        ------------------------------------------------
remarks:        20845:80 Set local preference to 80 inside DIGI
remarks:        20845:120 Set local preference to 120 inside DIGI
remarks:        20845:1000 Advertise the prefix
remarks:        20845:1001 Prepend 1*20845 when advertising
remarks:        20845:1002 Prepend 2*20845 when advertising
remarks:        20845:1003 Prepend 3*20845 when advertising
remarks:
remarks:        20845:2001 Prepend 1*20845 when announcing to domestic peers
remarks:        20845:2002 Prepend 2*20845 when announcing to domestic peers
remarks:        20845:2003 Prepend 3*20845 when announcing to domestic peers
remarks:
remarks:
remarks:        Default local preference
remarks:        --------------------------------------------------------
remarks:        Customer 110
remarks:        Peers 100
remarks:        Backup 80
remarks:
remarks:        --------------------------------------------------------
remarks:        NOC (24x7): noc@hu.digi.tv
remarks:        Peering issues: peering@hu.digi.tv
remarks:        --------------------------------------------------------
admin-c:        HTS51-RIPE
tech-c:         HTS51-RIPE
status:         ASSIGNED
mnt-by:         RIPE-NCC-END-MNT
mnt-by:         HDSNET-MNT
created:        2002-01-09T09:09:24Z
last-modified:  2018-09-04T09:51:15Z
source:         RIPE
organisation:   ORG-EMKL1-RIPE
org-name:       DIGI Tavkozlesi es Szolgaltato Kft.
org-type:       LIR
address:        VACI UT 35
address:        1134
address:        BUDAPEST
address:        HUNGARY
phone:          +3617070707
fax-no:         +3617070009
admin-c:        TS2976-RIPE
admin-c:        SLUG-RIPE
admin-c:        SMOK-RIPE
admin-c:        SKOA-RIPE
abuse-c:        HTS51-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        HDSNET-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         HDSNET-MNT
created:        2007-05-14T10:11:03Z
last-modified:  2019-02-18T10:19:08Z
source:         RIPE # Filtered
role:           HDSNET Technical Staff
address:        Vaci ut. 35
address:        H-1134 Budapest
address:        Hungary
phone:          +36 1 7070707
fax-no:         +36 1 7070009
remarks:        ***********************************************
remarks:        * spam or security notify to: abuse@digi.co.hu *
remarks:        ***********************************************
abuse-mailbox:  abuse@hdsnet.hu
admin-c:        TS2976-RIPE
admin-c:        SKOA-RIPE
admin-c:        SMOK-RIPE
admin-c:        SLUG-RIPE
tech-c:         TS2976-RIPE
tech-c:         SKOA-RIPE
tech-c:         SMOK-RIPE
tech-c:         SLUG-RIPE
nic-hdl:        HTS51-RIPE
mnt-by:         HDSNET-MNT
created:        2007-05-14T11:47:02Z
last-modified:  2019-02-25T14:12:48Z
source:         RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.95.1 (BLAARKOP)

            

BLOCK DDOS ATTACKS ASN : 20845

DDoS-attack last 100 logs

Download DDoS Attacks Report AS20845 December 12 2019 09:38:21

IDDateCountryIPCIDRASNCategories
1.2019-12-12 01:09:53
HU
94.21.184.217 94.21.0.0/16 AS20845 Potentially Bad Traffic HTTP 1.0
2.2019-12-12 01:09:24
HU
92.249.219.47 92.249.128.0/17 AS20845 Potentially Bad Traffic HTTP 1.0
3.2019-12-12 01:09:11
HU
91.83.3.214 91.83.0.0/19 AS20845 Potentially Bad Traffic HTTP 1.0
4.2019-12-12 01:07:17
HU
85.67.189.157 85.66.0.0/15 AS20845 Potentially Bad Traffic HTTP 1.0
5.2019-12-12 01:07:14
HU
85.238.85.137 85.238.64.0/19 AS20845 Potentially Bad Traffic HTTP 1.0
6.2019-12-12 01:06:40
HU
84.236.121.154 84.236.0.0/17 AS20845 Potentially Bad Traffic HTTP 1.0
7.2019-12-12 01:04:31
HU
78.131.58.83 78.131.0.0/17 AS20845 Potentially Bad Traffic HTTP 1.0
8.2019-12-12 00:41:28
HU
185.79.93.150 185.79.92.0/23 AS20845 Potentially Bad Traffic HTTP 1.0
9.2019-12-12 00:37:16
HU
178.164.157.133 178.164.128.0/17 AS20845 Potentially Bad Traffic HTTP 1.0
10.2019-11-27 06:55:24
HU
195.38.104.144 195.38.96.0/19 AS20845 Hackers using Telnet (port 23) to attack
11.2019-11-26 18:23:00
HU
188.143.46.142 188.143.0.0/17 AS20845 Hackers using Telnet (port 23) to attack
12.2019-11-24 13:45:33
HU
176.241.59.1 176.241.0.0/18 AS20845 Hackers using Telnet (port 23) to attack
13.2019-11-23 20:19:18
HU
82.131.226.159 82.131.224.0/19 AS20845 Hackers using Telnet (port 23) to attack
14.2019-11-22 09:08:08
HU
87.97.11.64 87.97.0.0/18 AS20845 Hackers using Telnet (port 23) to attack
15.2019-11-21 07:13:51
HU
77.234.73.86 77.234.64.0/19 AS20845 Hackers using Telnet (port 23) to attack
16.2019-11-21 06:21:26
HU
92.52.228.6 92.52.224.0/19 AS20845 ANTI HACKER PROTECTION
17.2019-11-18 13:48:00
HU
87.97.127.137 87.97.96.0/19 AS20845 ANTI HACKER PROTECTION
18.2019-11-14 08:59:49
HU
62.165.249.170 62.165.192.0/18 AS20845 Hackers using Telnet (port 23) to attack
19.2019-11-11 09:38:06
HU
89.186.118.161 89.186.118.0/23 AS20845 Hackers using Telnet (port 23) to attack
20.2019-11-07 16:43:05
HU
193.110.61.200 193.110.56.0/21 AS20845 Hackers using Telnet (port 23) to attack
21.2019-11-07 12:03:36
HU
89.186.107.250 89.186.106.0/23 AS20845 ANTI HACKER PROTECTION
22.2019-10-24 20:12:44
HU
87.97.94.66 87.97.80.0/20 AS20845 Hackers using Telnet (port 23) to attack
23.2019-10-24 11:38:21
HU
193.226.214.104 193.226.212.0/22 AS20845 Hackers using Telnet (port 23) to attack
24.2019-10-23 02:10:32
HU
82.144.167.156 82.144.164.0/22 AS20845 Hackers using Telnet (port 23) to attack
25.2019-10-16 21:01:08
HU
82.144.188.183 82.144.188.0/23 AS20845 SERVER 301 Moved Permanently
26.2019-10-16 07:25:36
HU
91.83.144.243 91.83.144.0/23 AS20845 Hackers using Telnet (port 23) to attack
27.2019-10-15 07:13:20
HU
91.83.180.40 91.83.180.0/22 AS20845 Hackers using Telnet (port 23) to attack
28.2019-10-12 20:43:16
HU
91.83.33.209 91.83.32.0/21 AS20845 Hackers using Telnet (port 23) to attack
29.2019-10-11 08:09:15
HU
185.79.94.122 185.79.94.0/23 AS20845 Hackers using Telnet (port 23) to attack
30.2019-10-09 11:38:31
HU
79.120.252.191 79.120.252.0/22 AS20845 Hackers using Telnet (port 23) to attack
31.2019-10-07 08:11:12
HU
82.131.204.197 82.131.200.0/21 AS20845 Hackers using Telnet (port 23) to attack
32.2019-10-07 02:08:15
HU
91.83.155.254 91.83.154.0/23 AS20845 Scanning For and Finding Vulnerabilities
33.2019-10-06 06:00:02
HU
89.186.109.157 89.186.108.0/22 AS20845 Scanning For and Finding Vulnerabilities
34.2019-10-06 04:46:51
HU
79.120.171.254 79.120.170.0/23 AS20845 Scanning For and Finding Vulnerabilities
35.2019-10-05 13:56:41
HU
82.131.183.216 82.131.182.0/23 AS20845 Scanning For and Finding Vulnerabilities
36.2019-10-05 13:36:31
HU
193.226.193.152 193.226.192.0/23 AS20845 Scanning For and Finding Vulnerabilities
37.2019-10-05 08:26:59
HU
212.40.65.106 212.40.64.0/20 AS20845 Hackers using Telnet (port 23) to attack
38.2019-10-05 04:01:30
HU
193.226.232.15 193.226.232.0/23 AS20845 Scanning For and Finding Vulnerabilities
39.2019-10-05 01:08:23
HU
91.83.95.39 91.83.94.0/23 AS20845 Scanning For and Finding Vulnerabilities
40.2019-10-04 23:43:05
HU
193.226.244.234 193.226.244.0/22 AS20845 Scanning For and Finding Vulnerabilities
41.2019-10-04 19:54:39
HU
82.131.128.146 82.131.128.0/19 AS20845 Hackers using SSH (port 22) to attack
42.2019-10-04 11:53:50
HU
82.131.223.252 82.131.216.0/21 AS20845 Scanning For and Finding Vulnerabilities
43.2019-10-04 09:38:50
HU
89.186.97.142 89.186.96.0/23 AS20845 Scanning For and Finding Vulnerabilities
44.2019-10-04 08:02:26
HU
91.82.179.179 91.82.176.0/21 AS20845 Scanning For and Finding Vulnerabilities
45.2019-10-04 00:33:17
HU
94.247.95.102 94.247.88.0/21 AS20845 Scanning For and Finding Vulnerabilities
46.2019-10-03 15:06:57
HU
81.0.84.107 81.0.84.0/22 AS20845 Scanning For and Finding Vulnerabilities
47.2019-10-02 20:51:29
HU
91.82.7.167 91.82.0.0/21 AS20845 Scanning For and Finding Vulnerabilities
48.2019-10-01 13:16:09
HU
185.62.129.217 185.62.128.0/22 AS20845 Scanning For and Finding Vulnerabilities
49.2019-10-01 12:41:18
HU
81.0.99.93 81.0.98.0/23 AS20845 Hackers using SSH (port 22) to attack
50.2019-09-30 04:51:46
HU
185.29.82.129 185.29.80.0/22 AS20845 Hackers using Telnet (port 23) to attack
51.2019-09-29 09:51:29
HU
91.83.185.154 91.83.184.0/21 AS20845 Hackers using Telnet (port 23) to attack
52.2019-09-29 02:03:47
HU
89.186.127.84 89.186.120.0/21 AS20845 SCAN PORT : 80
53.2019-09-28 18:30:46
HU
217.197.176.24 217.197.176.0/20 AS20845 SYN flood
54.2019-09-26 17:35:53
HU
89.147.68.124 89.147.64.0/20 AS20845 Web Application Attack
55.2019-09-26 11:30:21
HU
82.131.197.102 82.131.196.0/23 AS20845 Hackers using Telnet (port 23) to attack
56.2019-09-26 09:55:13
HU
91.83.193.168 91.83.192.0/20 AS20845 Web Application Attack
57.2019-09-26 05:51:33
HU
91.83.139.71 91.83.136.0/21 AS20845 Hackers using Telnet (port 23) to attack
58.2019-09-26 00:05:49
HU
212.40.82.160 212.40.80.0/20 AS20845 Hackers using Telnet (port 23) to attack
59.2019-09-24 23:55:44
HU
89.186.112.89 89.186.112.0/22 AS20845 Hackers using Telnet (port 23) to attack
60.2019-09-20 05:17:21
HU
91.82.70.163 91.82.64.0/21 AS20845 SYN flood
61.2019-09-18 21:28:58
HU
82.131.191.116 82.131.184.0/21 AS20845 SYN flood