AS27805


Whois ASN lookup : (WHOIS AS27805)

% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries
 
% LACNIC resource: whois.lacnic.net
% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2019-10-12 23:19:13 (-03 -03:00)
aut-num:     AS27805
owner:       EPM Telecomunicaciones S.A. E.S.P.
ownerid:     CO-EPME1-LACNIC
responsible: Administrador EPMNET
address:     Carrera 16 # 11A Sur -100, -, Los Balsos
address:     050022 - Medellin - CO
country:     CO
phone:       +57  43251505 [0000]
owner-c:     YGO2
routing-c:   OEG
abuse-c:     OEG
created:     20060131
changed:     20100115
nic-hdl:     OEG
person:      Administrador UNE
e-mail:      adminternet@UNE.NET.CO
address:     Carrera 58 No 42-125, 0, 
address:     0 - Medellin - An
country:     CO
phone:       +57 4 3822020 []
created:     20051122
changed:     20091105
nic-hdl:     YGO2
person:      AdmInternet Tigo Col
e-mail:      adminternet@UNE.NET.CO
address:     Cra. 16 Nro. 11A Sur 100, 100, --
address:     NA - Medellin - An
country:     CO
phone:       +57  45150505 [0]
created:     20030120
changed:     20190530
% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.

            

BLOCK DDOS ATTACKS ASN : 27805

DDoS-attack last 100 logs

Download DDoS Attacks Report AS27805 December 12 2019 09:53:17

IDDateCountryIPCIDRASNCategories
1.2019-12-12 00:49:24
CO
200.122.217.82 200.122.192.0/19 AS27805 Potentially Bad Traffic HTTP 1.0
2.2019-12-12 00:42:48
CO
190.9.249.221 190.9.224.0/19 AS27805 Potentially Bad Traffic HTTP 1.0
3.2019-12-12 00:42:44
CO
190.29.26.190 190.29.0.0/16 AS27805 Potentially Bad Traffic HTTP 1.0
4.2019-12-12 00:42:31
CO
190.0.61.18 190.0.32.0/19 AS27805 Potentially Bad Traffic HTTP 1.0
5.2019-12-12 00:38:02
CO
181.143.69.27 181.136.0.0/13 AS27805 Potentially Bad Traffic HTTP 1.0
6.2019-12-12 00:38:02
CO
181.133.180.2 181.128.0.0/13 AS27805 Potentially Bad Traffic HTTP 1.0
7.2019-11-27 01:02:27
CO
200.114.11.217 200.114.0.0/20 AS27805 Hackers using Telnet (port 23) to attack
8.2019-11-26 18:45:10
CO
200.122.240.210 200.122.240.0/20 AS27805 ANTI HACKER PROTECTION
9.2019-11-20 06:59:16
CO
200.6.179.155 200.6.176.0/20 AS27805 Hackers using Telnet (port 23) to attack
10.2019-11-18 17:48:51
CO
190.249.161.3 190.248.0.0/15 AS27805 Hackers using Telnet (port 23) to attack
11.2019-11-17 08:56:36
CO
200.116.13.42 200.116.0.0/17 AS27805 Hackers using Telnet (port 23) to attack
12.2019-11-17 08:31:17
CO
190.128.114.108 190.128.64.0/18 AS27805 Hackers using Telnet (port 23) to attack
13.2019-11-17 05:48:10
CO
190.28.169.65 190.28.0.0/16 AS27805 Hackers using Telnet (port 23) to attack
14.2019-11-16 10:01:47
CO
190.70.37.43 190.70.0.0/17 AS27805 Hackers using Telnet (port 23) to attack
15.2019-11-16 05:25:33
CO
201.233.91.17 201.233.0.0/17 AS27805 Hackers using Telnet (port 23) to attack
16.2019-11-14 08:59:33
CO
200.116.171.81 200.116.128.0/17 AS27805 Hackers using Telnet (port 23) to attack
17.2019-11-14 00:05:22
CO
190.128.11.24 190.128.0.0/19 AS27805 Hackers using Telnet (port 23) to attack
18.2019-11-10 20:29:52
CO
190.250.124.30 190.250.0.0/15 AS27805 Hackers using Telnet (port 23) to attack
19.2019-11-09 16:11:35
CO
186.0.123.61 186.0.64.0/18 AS27805 Hackers using Telnet (port 23) to attack
20.2019-11-08 09:51:16
CO
201.236.228.11 201.236.224.0/19 AS27805 Hackers using Telnet (port 23) to attack
21.2019-11-06 14:09:24
CO
190.240.138.203 190.240.128.0/17 AS27805 Hackers using Telnet (port 23) to attack
22.2019-11-06 10:03:41
CO
201.232.15.47 201.232.0.0/17 AS27805 Hackers using Telnet (port 23) to attack
23.2019-11-05 05:29:11
CO
190.70.150.205 190.70.128.0/17 AS27805 Hackers using Telnet (port 23) to attack
24.2019-11-02 13:54:54
CO
190.0.16.155 190.0.0.0/19 AS27805 Hackers using Telnet (port 23) to attack
25.2019-10-30 17:04:29
CO
190.165.180.180 190.165.128.0/17 AS27805 Hackers using Telnet (port 23) to attack
26.2019-10-29 06:40:57
CO
201.233.150.71 201.233.128.0/17 AS27805 Hackers using Telnet (port 23) to attack
27.2019-10-29 05:30:43
CO
201.236.200.242 201.236.192.0/19 AS27805 ANTI HACKER PROTECTION
28.2019-10-20 11:34:48
CO
186.0.53.151 186.0.0.0/18 AS27805 Hackers using Telnet (port 23) to attack
29.2019-10-05 05:40:25
CO
190.240.18.207 190.240.0.0/18 AS27805 Scanning For and Finding Vulnerabilities
30.2019-09-29 10:26:28
CO
200.122.224.225 200.122.224.0/20 AS27805 SCAN PORT : 80
31.2019-09-29 05:43:26
CO
190.7.147.3 190.7.144.0/20 AS27805 SCAN PORT : 80
32.2019-09-24 02:13:32
CO
200.6.166.34 200.6.160.0/20 AS27805 Hackers using Telnet (port 23) to attack
33.2019-09-21 07:11:22
CO
190.7.137.210 190.7.128.0/20 AS27805 Web Application Attack
34.2019-09-16 01:35:20
CO
190.165.60.231 190.165.0.0/18 AS27805 SYN flood