AS25513


Whois ASN lookup : (WHOIS AS25513)

% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf
% Note: this output has been filtered.
%       To receive output for a database update, use the '-B' flag.
% Information related to 'AS25365 - AS25542'
as-block:       AS25365 - AS25542
descr:          RIPE NCC ASN block
remarks:        These AS Numbers are assigned to network operators in the RIPE NCC service region.
mnt-by:         RIPE-NCC-HM-MNT
created:        2018-11-22T15:27:30Z
last-modified:  2018-11-22T15:27:30Z
source:         RIPE
% Information related to 'AS25513'
% Abuse contact for 'AS25513' is 'abuse@spdop.ru'
aut-num:        AS25513
as-name:        ASN-MGTS-USPD
org:            ORG-OMct1-RIPE
import:         from AS8359 action pref=100; accept ANY
import:         from AS39143 action pref=100; accept ANY
import:         from AS20985 action pref=100; accept ANY
import:         from AS49179 action pref=100; accept AS49179
import:         from AS61436 action pref=100; accept AS61436
import:         from AS51893 action pref=100; accept AS51893
import:         from AS56483 action pref=100; accept {91.223.176.0/24}
import:         from AS199809 action pref=100; accept {80.240.110.0/24}
import:         from AS43993 action pref=100; accept AS43993
import:         from AS202098 action pref=100; accept AS202098
import:         from AS16020 action pref=100; accept AS-TASCOM
import:         from AS60375 action pref=100; accept {195.209.104.0/24}
import:         from AS49246 action pref=100; accept AS49246
import:         from AS42056 action pref=100; accept AS42056
import:         from AS56794 action pref=100; accept AS56794
import:         from AS51791 action pref=100; accept AS51791
import:         from AS28912 action pref=100; accept AS28912
import:         from AS49170 action pref=100; accept {95.64.128.0/17}
import:         from AS205576 action pref=100; accept {46.61.184.0/24}
import:         from AS206054 action pref=100; accept AS206054
import:         from AS35312 action pref=100; accept {141.101.229.0/24}
import:         from AS34500 action pref=100; accept AS34500
import:         from AS58072 action pref=100; accept AS58072
import:         from AS8901 action pref=100; accept {185.173.0.0/23}
import:         from AS35455 action pref=100; accept AS35455
import:         from AS44088 action pref=100; accept AS44088
import:         from AS209369 action pref=100; accept AS209369
export:         to AS8359 announce AS-SPDOP
export:         to AS49179 announce ANY
export:         to AS39143 announce AS-SPDOP
export:         to AS20985 announce AS25513 AS8491 AS39143
export:         to AS61436 announce ANY
export:         to AS51893 announce ANY
export:         to AS56483 announce {0.0.0.0/0}
export:         to AS199809 announce {0.0.0.0/0}
export:         to AS43993 announce {0.0.0.0/0}
export:         to AS202098 announce {0.0.0.0/0}
export:         to AS16020 announce AS25513 {0.0.0.0/0}
export:         to AS60375 announce {0.0.0.0/0}
export:         to AS49246 announce {0.0.0.0/0}
export:         to AS42056 announce {0.0.0.0/0}
export:         to AS56794 announce {0.0.0.0/0}
export:         to AS51791 announce {0.0.0.0/0}
export:         to AS28912 announce {0.0.0.0/0}
export:         to AS49170 announce {0.0.0.0/0}
export:         to AS205576 announce {0.0.0.0/0}
export:         to AS206054 announce {0.0.0.0/0}
export:         to AS209369 announce {0.0.0.0/0}
export:         to AS35312 announce {0.0.0.0/0}
export:         to AS34500 announce {0.0.0.0/0}
export:         to AS58072 announce {0.0.0.0/0}
export:         to AS8901 announce {0.0.0.0/0}
export:         to AS35455 announce {0.0.0.0/0}
export:         to AS44088 announce {0.0.0.0/0}
admin-c:        USPD-RIPE
tech-c:         USPD-RIPE
status:         ASSIGNED
mnt-by:         MGTS-USPD-MNT
mnt-by:         RIPE-NCC-END-MNT
created:        2002-12-17T16:08:58Z
last-modified:  2019-08-05T11:53:48Z
source:         RIPE
organisation:   ORG-OMct1-RIPE
org-name:       OJS Moscow city telephone network
org-type:       LIR
address:        Zeleniy prospekt. bild 7
address:        111141
address:        Moscow
address:        RUSSIAN FEDERATION
phone:          +7 4959500570
fax-no:         +7 4959500598
admin-c:        AVK103-RIPE
admin-c:        RSG7-RIPE
admin-c:        OB36-RIPE
admin-c:        VMK
admin-c:        AGS9167-RIPE
mnt-ref:        MGTS-USPD-MNT
mnt-ref:        RIPE-NCC-HM-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         MGTS-USPD-MNT
abuse-c:        USPD-RIPE
tech-c:         USPD-RIPE
created:        2004-04-17T11:55:11Z
last-modified:  2019-03-14T06:58:15Z
source:         RIPE # Filtered
role:           PJSC Moscow City Telephone Network NOC
address:        USPD MGTS
address:        Moscow, Russia
address:        Khachaturyana 5
admin-c:        AGS9167-RIPE
admin-c:        AVK103-RIPE
tech-c:         AVK103-RIPE
tech-c:         VMK
tech-c:         ANO3-RIPE
abuse-mailbox:  abuse@spdop.ru
nic-hdl:        USPD-RIPE
mnt-by:         MGTS-USPD-MNT
created:        2006-09-11T07:56:01Z
last-modified:  2018-03-15T16:18:45Z
source:         RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.95.1 (ANGUS)

            

BLOCK DDOS ATTACKS ASN : 25513

DDoS-attack last 100 logs

Download DDoS Attacks Report AS25513 December 12 2019 09:49:02

IDDateCountryIPCIDRASNCategories
1.2019-12-12 01:10:21
RU
95.165.244.46 95.165.0.0/16 AS25513 Potentially Bad Traffic HTTP 1.0
2.2019-12-12 00:46:54
RU
195.9.25.42 195.9.0.0/16 AS25513 Potentially Bad Traffic HTTP 1.0
3.2019-12-12 00:46:16
RU
194.135.97.126 194.135.96.0/22 AS25513 Potentially Bad Traffic HTTP 1.0
4.2019-12-12 00:46:16
RU
194.135.238.190 194.135.224.0/20 AS25513 Potentially Bad Traffic HTTP 1.0
5.2019-12-12 00:46:16
RU
194.135.220.162 194.135.208.0/20 AS25513 Potentially Bad Traffic HTTP 1.0
6.2019-12-12 00:46:16
RU
194.135.15.6 194.135.8.0/21 AS25513 Potentially Bad Traffic HTTP 1.0
7.2019-11-26 11:34:51
RU
194.135.243.130 194.135.240.0/21 AS25513 Hackers using Telnet (port 23) to attack
8.2019-11-24 15:38:09
RU
109.252.93.251 109.252.0.0/16 AS25513 ANTI HACKER PROTECTION
9.2019-11-22 02:01:10
RU
62.112.105.99 62.112.96.0/19 AS25513 Hackers using Telnet (port 23) to attack
10.2019-11-19 03:20:18
RU
194.135.110.102 194.135.108.0/22 AS25513 Hackers using Telnet (port 23) to attack
11.2019-11-10 14:02:13
RU
79.139.208.158 79.139.128.0/17 AS25513 Scanning For and Finding Vulnerabilities
12.2019-11-02 21:43:09
RU
194.135.112.133 194.135.112.0/22 AS25513 ANTI HACKER PROTECTION
13.2019-10-27 03:52:31
RU
194.135.42.74 194.135.40.0/22 AS25513 ANTI HACKER PROTECTION
14.2019-10-25 15:37:58
RU
94.29.77.66 94.29.76.0/22 AS25513 Hackers using Telnet (port 23) to attack
15.2019-10-21 07:37:50
RU
46.138.116.172 46.138.0.0/17 AS25513 Scanning For and Finding Vulnerabilities
16.2019-10-17 01:02:07
RU
94.29.97.237 94.29.96.0/19 AS25513 Hackers using Telnet (port 23) to attack
17.2019-10-13 17:02:47
RU
94.29.74.114 94.29.72.0/22 AS25513 SCAN PORT : 80
18.2019-10-06 09:00:38
RU
37.190.61.198 37.190.0.0/17 AS25513 Scan port (21) FTP
19.2019-10-05 16:09:09
RU
46.138.227.140 46.138.192.0/18 AS25513 Scanning For and Finding Vulnerabilities
20.2019-10-03 15:35:08
RU
37.230.157.186 37.230.157.0/24 AS25513 Scanning For and Finding Vulnerabilities
21.2019-10-01 14:00:34
RU
194.135.73.110 194.135.72.0/22 AS25513 Scanning For and Finding Vulnerabilities
22.2019-10-01 09:43:29
RU
128.0.132.253 128.0.128.0/20 AS25513 Web Application Attack
23.2019-10-01 08:55:37
RU
194.135.5.146 194.135.4.0/22 AS25513 Scanning For and Finding Vulnerabilities
24.2019-09-27 18:29:23
RU
158.255.186.205 158.255.128.0/18 AS25513 SYN flood
25.2019-09-27 00:48:57
RU
194.135.53.178 194.135.52.0/22 AS25513 Hackers using Telnet (port 23) to attack
26.2019-09-22 04:38:06
RU
194.135.67.54 194.135.64.0/21 AS25513 SYN flood