AS21021


Whois ASN lookup : (WHOIS AS21021)

% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf
% Note: this output has been filtered.
%       To receive output for a database update, use the '-B' flag.
% Information related to 'AS21004 - AS21151'
as-block:       AS21004 - AS21151
descr:          RIPE NCC ASN block
remarks:        These AS Numbers are assigned to network operators in the RIPE NCC service region.
mnt-by:         RIPE-NCC-HM-MNT
created:        2018-11-22T15:27:27Z
last-modified:  2018-11-22T15:27:27Z
source:         RIPE
% Information related to 'AS21021'
% Abuse contact for 'AS21021' is 'abuse.ip@multimedia.pl'
aut-num:        AS21021
as-name:        MULTIMEDIA-AS
descr:          Cable DTV Internet Voice Provider in Poland.
org:            ORG-MP1-RIPE
remarks:        ##################################################
remarks:        Communities used in AS21021
remarks:        ##################################################
remarks:
remarks:        21021:9000 - prefix is not announced to any peers
remarks:        21021:9100 - prefix is not announced to ext peers
remarks:        21021:9200 - prefix is not announced to int peers
remarks:
remarks:        communities for specific upstream
remarks:        are 21021:--0x :
remarks:        x=0 - do not advertise
remarks:        x=1,2,3 - prepend 1,2,3 times
remarks:
remarks:        21021:120x - TELIA AS1299
remarks:        21021:130x - TINET AS3257
remarks:        21021:140x - T-System AS3320
remarks:        21021:150x - DE-CIX AS6695
remarks:        21021:160x - PLIX AS8545
remarks:        21021:170x - WIX
remarks:        21021:190x - TPSA AS5617
remarks:
remarks:        ##################################################
import:         from AS5550 action pref=100; accept ANY
import:         from AS12831 action pref=100; accept ANY
import:         from AS5617 action pref=200; accept AS5617
import:         from AS12968 action pref=100; accept ANY
import:         from AS12741 action pref=150; accept AS12741
import:         from AS20804 action pref=100; accept ANY
import:         from AS15523 action pref=150; accept AS15523
export:         to AS5550 announce AS21021
export:         to AS12831 announce AS21021
export:         to AS5617 announce AS21021
export:         to AS12968 announce AS21021
export:         to AS12741 announce AS21021
export:         to AS20804 announce AS21021
export:         to AS15523 announce AS21021
default:        to AS5550 action pref=100; networks ANY
admin-c:        MA7021-RIPE
tech-c:         MA7021-RIPE
status:         ASSIGNED
mnt-by:         RIPE-NCC-END-MNT
mnt-by:         MULTIMEDIA-MNT
created:        1970-01-01T00:00:00Z
last-modified:  2017-11-15T09:18:13Z
source:         RIPE # Filtered
organisation:   ORG-MP1-RIPE
org-name:       Multimedia Polska S.A.
org-type:       LIR
address:        ul. T.Wendy 7/9
address:        81-341
address:        GDYNIA
address:        POLAND
phone:          +48177886988
fax-no:         +48627652075
admin-c:        JZ933-RIPE
abuse-c:        MA7021-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        MULTIMEDIA-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         MULTIMEDIA-MNT
created:        2004-04-17T11:48:05Z
last-modified:  2019-03-18T08:54:34Z
source:         RIPE # Filtered
role:           MULTIMEDIA ADMIN
address:        Multimedia Polska S.A.
address:        ul.T. Wendy 7/9
address:        81-341 Gdynia
address:        Poland
phone:          +48177887999
fax-no:         +48177887480
abuse-mailbox:  abuse.ip@multimedia.pl
admin-c:        JZ933-RIPE
tech-c:         PS4509-RIPE
nic-hdl:        MA7021-RIPE
mnt-by:         MULTIMEDIA-MNT
created:        2007-03-07T13:34:38Z
last-modified:  2010-09-01T16:06:19Z
source:         RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.95.1 (WAGYU)

            

BLOCK DDOS ATTACKS ASN : 21021

DDoS-attack last 100 logs

Download DDoS Attacks Report AS21021 December 14 2019 13:34:30

IDDateCountryIPCIDRASNCategories
1.2019-12-14 13:24:24
PL
176.221.122.235 176.221.96.0/19 AS21021 SERVER Error 403 Forbidden
2.2019-12-14 09:12:05
PL
31.42.31.1 31.42.16.0/20 AS21021 ANTI HACKER PROTECTION
3.2019-12-13 22:06:14
PL
83.68.77.185 83.68.64.0/19 AS21021 SERVER 301 Moved Permanently
4.2019-12-13 15:42:02
PL
89.229.108.0 89.229.0.0/16 AS21021 ANTI HACKER PROTECTION
5.2019-12-12 01:10:11
PL
95.129.224.30 95.129.224.0/21 AS21021 Potentially Bad Traffic HTTP 1.0
6.2019-12-12 01:08:03
PL
89.228.201.123 89.228.0.0/16 AS21021 Potentially Bad Traffic HTTP 1.0
7.2019-12-12 01:07:29
PL
87.116.201.80 87.116.192.0/18 AS21021 Potentially Bad Traffic HTTP 1.0
8.2019-12-12 01:05:48
PL
81.190.208.52 81.190.0.0/16 AS21021 Potentially Bad Traffic HTTP 1.0
9.2019-12-10 10:28:37
PL
89.230.28.30 89.230.0.0/16 AS21021 Hackers using Telnet (port 23) to attack
10.2019-12-04 09:03:07
PL
94.251.224.147 94.251.128.0/17 AS21021 ANTI HACKER PROTECTION
11.2019-11-28 05:27:27
PL
46.186.6.71 46.186.0.0/17 AS21021 Hackers using Telnet (port 23) to attack
12.2019-11-25 07:19:16
PL
37.190.240.186 37.190.128.0/17 AS21021 Hackers using Telnet (port 23) to attack
13.2019-11-24 14:13:42
PL
89.231.179.18 89.231.0.0/16 AS21021 Hackers using Telnet (port 23) to attack
14.2019-11-24 04:48:05
PL
84.38.95.147 84.38.80.0/20 AS21021 Hackers using Telnet (port 23) to attack
15.2019-11-24 01:55:14
PL
93.94.186.76 93.94.184.0/21 AS21021 Hackers using Telnet (port 23) to attack
16.2019-11-23 01:41:01
PL
185.31.184.162 185.31.184.0/22 AS21021 Hackers using Telnet (port 23) to attack
17.2019-11-22 20:03:36
PL
62.141.220.253 62.141.192.0/18 AS21021 Hackers using Telnet (port 23) to attack
18.2019-11-17 18:24:55
PL
31.6.207.111 31.6.192.0/19 AS21021 ANTI HACKER PROTECTION
19.2019-11-13 20:41:05
PL
80.245.190.42 80.245.176.0/20 AS21021 Hackers using Telnet (port 23) to attack
20.2019-10-25 17:09:28
PL
89.17.232.123 89.17.224.0/19 AS21021 Potentially Bad Traffic
21.2019-10-17 08:13:48
PL
213.136.240.110 213.136.224.0/19 AS21021 Hackers using Telnet (port 23) to attack
22.2019-10-12 08:44:14
PL
195.93.223.100 195.93.222.0/23 AS21021 SERVER Error 403 Forbidden
23.2019-10-12 08:06:15
PL
193.106.78.196 193.106.76.0/22 AS21021 Hackers using Telnet (port 23) to attack
24.2019-10-10 21:51:24
PL
46.231.57.70 46.231.56.0/21 AS21021 Hackers using Telnet (port 23) to attack
25.2019-10-04 16:28:26
PL
31.6.186.68 31.6.128.0/18 AS21021 Scanning For and Finding Vulnerabilities