AS28812


Whois ASN lookup : (WHOIS AS28812)

% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf
% Note: this output has been filtered.
%       To receive output for a database update, use the '-B' flag.
% Information related to 'AS28699 - AS28912'
as-block:       AS28699 - AS28912
descr:          RIPE NCC ASN block
remarks:        These AS Numbers are assigned to network operators in the RIPE NCC service region.
mnt-by:         RIPE-NCC-HM-MNT
created:        2018-11-22T15:27:31Z
last-modified:  2018-11-22T15:27:31Z
source:         RIPE
% Information related to 'AS28812'
% Abuse contact for 'AS28812' is 'abuse@bashtel.ru'
aut-num:        AS28812
as-name:        JSCBIS-AS
org:            ORG-BC2-RIPE
remarks:        ---------------
remarks:        Upstreams
remarks:        ---------------
import:         from AS12389 accept ANY
export:         to AS12389 announce AS-JSCBIS
import:         from AS3216 accept ANY
export:         to AS3216 announce AS-JSCBIS
remarks:        ---------------
remarks:        Clients
remarks:        ---------------
import:         from AS28881 accept AS-BASHNET
export:         to AS28881 announce ANY
import:         from AS35769 accept AS35769
export:         to AS35769 announce ANY
import:         from AS45048 accept AS45048
export:         to AS45048 announce ANY
import:         from AS47733 accept AS47733
export:         to AS47733 announce ANY
import:         from AS51153 accept AS51153
export:         to AS51153 announce ANY
import:         from AS61228 accept AS61228
export:         to AS61228 announce ANY
import:         from AS39113 accept AS39113
export:         to AS39113 announce ANY
import:         from AS204925 accept AS204925
export:         to AS204925 announce ANY
import:         from AS208352 accept AS208352
export:         to AS208352 announce ANY
admin-c:        ORD5-RIPE
tech-c:         SSM18-RIPE
status:         ASSIGNED
mnt-by:         RIPE-NCC-END-MNT
mnt-by:         RUMS-MNT
created:        2003-03-03T14:48:35Z
last-modified:  2019-08-21T09:37:19Z
source:         RIPE
organisation:   ORG-BC2-RIPE
org-name:       PJSC 'Bashinformsvyaz'
org-type:       LIR
address:        Lenin street, 30
address:        450077
address:        Ufa
address:        RUSSIAN FEDERATION
phone:          +7 3472 215999
phone:          +7 3472 215475
fax-no:         +7 3472 516523
abuse-c:        AR16575-RIPE
admin-c:        ORD5-RIPE
admin-c:        AAR21-RIPE
admin-c:        SSM18-RIPE
mnt-ref:        RUMS-MNT
mnt-ref:        RIPE-NCC-HM-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         RUMS-MNT
created:        2004-04-17T11:50:43Z
last-modified:  2019-05-08T04:19:24Z
source:         RIPE # Filtered
person:         Oleg R. Delmukhametov
address:        30, Lenin str., Ufa, Russian Federation, 450077
phone:          +7 347 2215475
nic-hdl:        ORD5-RIPE
mnt-by:         RUMS-MNT
created:        2014-01-31T10:32:35Z
last-modified:  2018-07-30T13:10:39Z
source:         RIPE # Filtered
person:         Stanislav S. Makarov
address:        PJSC 'Bashinformsvyaz'
address:        Lenin street, 30
address:        RUSSIA, 450000, Ufa city
phone:          +7 3472 215999
nic-hdl:        SSM18-RIPE
created:        2004-11-22T07:45:45Z
last-modified:  2016-09-15T09:49:23Z
source:         RIPE # Filtered
mnt-by:         RUMS-MNT
mnt-by:         BASHNET-MNT
% This query was served by the RIPE Database Query Service version 1.95.1 (HEREFORD)

            

BLOCK DDOS ATTACKS ASN : 28812

DDoS-attack last 100 logs

Download DDoS Attacks Report AS28812 December 12 2019 09:58:43

IDDateCountryIPCIDRASNCategories
1.2019-12-12 01:04:28
RU
77.94.122.19 77.94.96.0/19 AS28812 Potentially Bad Traffic HTTP 1.0
2.2019-11-23 09:04:42
RU
83.174.251.207 83.174.224.0/19 AS28812 Hackers using Telnet (port 23) to attack
3.2019-11-23 07:32:44
RU
95.110.16.144 95.110.0.0/17 AS28812 Hackers using Telnet (port 23) to attack
4.2019-11-23 06:15:40
RU
109.187.213.117 109.187.192.0/18 AS28812 Hackers using Telnet (port 23) to attack
5.2019-11-23 04:15:10
RU
109.187.35.232 109.187.0.0/18 AS28812 Hackers using Telnet (port 23) to attack
6.2019-11-22 19:40:11
RU
31.8.30.75 31.8.0.0/17 AS28812 Hackers using SSH (port 22) to attack
7.2019-11-21 08:14:35
RU
37.122.113.94 37.122.64.0/18 AS28812 Hackers using Telnet (port 23) to attack
8.2019-11-20 10:57:41
RU
178.129.158.148 178.129.128.0/18 AS28812 Hackers using SSH (port 22) to attack
9.2019-11-16 19:49:20
RU
178.129.125.40 178.129.64.0/18 AS28812 Hackers using Telnet (port 23) to attack
10.2019-11-15 15:41:47
RU
178.129.20.143 178.129.0.0/18 AS28812 Hackers using Telnet (port 23) to attack
11.2019-11-15 06:07:04
RU
178.129.219.186 178.129.192.0/18 AS28812 Hackers using Telnet (port 23) to attack
12.2019-11-14 19:58:27
RU
92.245.60.252 92.245.32.0/19 AS28812 Hackers using Telnet (port 23) to attack
13.2019-11-08 16:02:22
RU
109.187.185.231 109.187.128.0/18 AS28812 ANTI HACKER PROTECTION
14.2019-11-07 09:46:24
RU
37.122.62.114 37.122.0.0/18 AS28812 ANTI HACKER PROTECTION
15.2019-10-31 05:03:27
RU
94.75.48.178 94.75.0.0/18 AS28812 Hackers using SSH (port 22) to attack
16.2019-10-27 14:43:02
RU
31.8.139.235 31.8.128.0/18 AS28812 Hackers using Telnet (port 23) to attack
17.2019-10-26 17:31:06
RU
109.187.108.142 109.187.64.0/18 AS28812 Hackers using Telnet (port 23) to attack
18.2019-10-25 09:36:39
RU
62.133.179.245 62.133.176.0/21 AS28812 SERVER Error 403 Forbidden
19.2019-10-18 05:40:04
RU
83.174.214.197 83.174.212.0/22 AS28812 ANTI HACKER PROTECTION
20.2019-10-10 22:07:38
RU
62.133.174.29 62.133.160.0/20 AS28812 Hackers using Telnet (port 23) to attack
21.2019-10-05 18:41:06
RU
83.174.220.46 83.174.216.0/21 AS28812 Scanning For and Finding Vulnerabilities
22.2019-09-29 03:28:51
RU
83.174.209.87 83.174.208.0/23 AS28812 SYN flood
23.2019-09-27 03:14:38
RU
62.133.184.175 62.133.184.0/22 AS28812 Web Application Attack