AS34661


Whois ASN lookup : (WHOIS AS34661)

% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf
% Note: this output has been filtered.
%       To receive output for a database update, use the '-B' flag.
% Information related to 'AS33792 - AS35839'
as-block:       AS33792 - AS35839
descr:          RIPE NCC ASN block
remarks:        These AS Numbers are assigned to network operators in the RIPE NCC service region.
mnt-by:         RIPE-NCC-HM-MNT
created:        2018-11-22T15:27:34Z
last-modified:  2018-11-22T15:27:34Z
source:         RIPE
% Information related to 'AS34661'
% Abuse contact for 'AS34661' is 'abuse@breezein.net'
aut-num:        AS34661
as-name:        BREEZE-NETWORK
org:            ORG-TT21-RIPE
import:         from AS42    accept   AS-PCH
import:         from AS3255  accept   ANY
import:         from AS3856  accept   AS-PCH
import:         from AS6703  accept   AS-UCOMLINE
import:         from AS8192  accept   AS-TM
import:         from AS12578 accept   AS-LATTELEKOM
import:         from AS15595 accept   AS-SKYLINE-TO-ODEX
import:         from AS29597 accept   AS29597
import:         from AS35320 accept   ANY
import:         from AS43103 accept   AS-ONETELECOM
import:         from AS44193 accept   AS-ODIX
import:         from AS45044 accept   AS45044
import:         from AS59613 accept   AS-UBNIX
export:         to   AS42    announce AS-BRIZ
export:         to   AS3255  announce AS-BRIZ-TO-ODIX
export:         to   AS3856  announce AS-BRIZ
export:         to   AS6703  announce AS-BRIZ
export:         to   AS8192  announce ANY
export:         to   AS12578 announce AS-BRIZ
export:         to   AS15595 announce AS-BRIZ
export:         to   AS29597 announce RS-default
export:         to   AS35320 announce AS-BRIZ-TO-ETT
export:         to   AS43103 announce AS-BRIZ-TO-ODIX
export:         to   AS44193 announce AS-BRIZ-TO-ODIX
export:         to   AS45044 announce RS-default
export:         to   AS59613 announce AS-BRIZ
admin-c:        NOC34661-RIPE
tech-c:         NOC34661-RIPE
status:         ASSIGNED
mnt-by:         AS34661-MNT
mnt-by:         RIPE-NCC-END-MNT
created:        2005-03-10T13:01:46Z
last-modified:  2018-09-04T10:07:43Z
source:         RIPE
organisation:   ORG-TT21-RIPE
org-name:       TOV TRK 'Briz'
org-type:       LIR
address:        Bocharova street 2
address:        65111
address:        Odessa
address:        UKRAINE
phone:          +380487972828
fax-no:         +380487972828
abuse-c:        NOC34661-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        AS34661-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         AS34661-MNT
created:        2008-01-03T08:51:25Z
last-modified:  2016-08-18T14:10:53Z
source:         RIPE # Filtered
role:           TOV TRK Briz
address:        TOV TRK 'Briz'
address:        BOCHAROVA 2
address:        65111 ODESSA, UKRAINE
abuse-mailbox:  abuse@breezein.net
phone:          +380487972828
admin-c:        SB15807-RIPE
tech-c:         VM-RIPE
nic-hdl:        NOC34661-RIPE
mnt-by:         AS34661-MNT
created:        2012-02-17T08:49:03Z
last-modified:  2013-06-25T11:33:56Z
source:         RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.95.1 (HEREFORD)

            

BLOCK DDOS ATTACKS ASN : 34661

DDoS-attack last 100 logs

Download DDoS Attacks Report AS34661 November 29 2019 16:46:45

IDDateCountryIPCIDRASNCategories
1.2019-11-29 16:45:25
UA
109.200.231.177 109.200.224.0/19 AS34661 Hackers using Telnet (port 23) to attack
2.2019-11-23 18:53:23
UA
213.231.28.142 213.231.0.0/18 AS34661 Hackers using Telnet (port 23) to attack
3.2019-11-22 18:59:16
UA
46.250.17.53 46.250.0.0/19 AS34661 Hackers using Telnet (port 23) to attack
4.2019-11-17 02:26:43
UA
94.74.97.253 94.74.96.0/23 AS34661 Hackers using Telnet (port 23) to attack
5.2019-11-15 00:38:17
UA
94.74.84.29 94.74.84.0/24 AS34661 Hackers using Telnet (port 23) to attack
6.2019-11-13 06:50:14
UA
94.74.99.231 94.74.98.0/23 AS34661 Hackers using Telnet (port 23) to attack
7.2019-11-11 15:32:41
UA
94.74.80.68 94.74.80.0/24 AS34661 Hackers using Telnet (port 23) to attack
8.2019-11-10 23:03:48
UA
94.74.81.174 94.74.81.0/24 AS34661 Hackers using Telnet (port 23) to attack
9.2019-10-30 09:53:20
UA
94.74.83.86 94.74.82.0/23 AS34661 Hackers using Telnet (port 23) to attack
10.2019-10-28 14:10:39
UA
94.74.100.3 94.74.100.0/22 AS34661 SERVER 301 Moved Permanently
11.2019-10-25 00:47:16
UA
94.74.88.72 94.74.88.0/22 AS34661 Hackers using Telnet (port 23) to attack
12.2019-10-22 21:16:49
UA
94.74.104.243 94.74.104.0/22 AS34661 Hackers using Telnet (port 23) to attack
13.2019-10-16 08:49:10
UA
94.74.75.39 94.74.74.0/23 AS34661 Hackers using Telnet (port 23) to attack
14.2019-10-05 11:34:54
UA
185.6.185.234 185.6.184.0/22 AS34661 Hackers using Telnet (port 23) to attack
15.2019-10-01 07:24:53
UA
94.74.126.214 94.74.120.0/21 AS34661 Scanning For and Finding Vulnerabilities
16.2019-10-01 06:28:37
UA
94.74.94.180 94.74.92.0/22 AS34661 Scanning For and Finding Vulnerabilities
17.2019-09-29 13:10:13
UA
194.143.137.77 194.143.136.0/23 AS34661 Hackers using Telnet (port 23) to attack
18.2019-09-26 13:06:54
UA
195.66.214.9 195.66.212.0/22 AS34661 Hackers using Telnet (port 23) to attack
19.2019-09-14 11:42:23
UA
195.66.221.171 195.66.216.0/21 AS34661 SYN flood