AS35141


Whois ASN lookup : (WHOIS AS35141)

% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf
% Note: this output has been filtered.
%       To receive output for a database update, use the '-B' flag.
% Information related to 'AS33792 - AS35839'
as-block:       AS33792 - AS35839
descr:          RIPE NCC ASN block
remarks:        These AS Numbers are assigned to network operators in the RIPE NCC service region.
mnt-by:         RIPE-NCC-HM-MNT
created:        2018-11-22T15:27:34Z
last-modified:  2018-11-22T15:27:34Z
source:         RIPE
% Information related to 'AS35141'
% Abuse contact for 'AS35141' is 'RIPE.Abuse@mobiltel.bg'
aut-num:        AS35141
as-name:        MEGALAN
org:            ORG-MN1-RIPE
remarks:
remarks:
remarks:
remarks:        # UPSTREAM
remarks:
remarks:
remarks:
remarks:        UPSTREAM - FOBUL
import:         from AS42459 accept ANY
export:         to AS42459 announce AS-MEGALAN AS20911 AS31296 AS29343
remarks:        UPSTREAM - INVITEL
import:         from AS12301 accept ANY
export:         to AS12301 announce AS-MEGALAN AS20911 AS31296 AS29343
remarks:        UPSTREAM - SPNET
import:         from AS8717 accept ANY
export:         to AS8717 announce AS-MEGALAN AS20911 AS31296
remarks:
remarks:
remarks:
remarks:        # BG PEERING
remarks:
remarks:
remarks:        -- local exchange --
remarks:
import:         from AS39505 accept ANY
export:         to AS39505 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
import:         from AS42555 accept ANY
export:         to AS42555 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
import:         from AS42295 accept ANY
export:         to AS42295 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
import:         from AS8877 accept ANY
export:         to AS8877 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
import:         from AS9127 accept ANY
export:         to AS9127 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
import:         from AS31250 accept ANY
export:         to AS31250 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
import:         from AS8717 accept ANY
export:         to AS8717 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
import:         from AS48452 accept ANY
export:         to AS48452 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
import:         from AS44028 accept ANY
export:         to AS44028 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
import:         from AS42735 accept ANY
export:         to AS42735 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
import:         from AS20911 accept ANY
export:         to AS20911 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
import:         from AS42431 accept ANY
export:         to AS42431 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
import:         from AS42242 accept ANY
export:         to AS42242 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
import:         from AS41782 accept ANY
export:         to AS41782 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
import:         from AS28898 accept ANY
export:         to AS28898 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
import:         from AS31296 accept ANY
export:         to AS31296 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
import:         from AS24750 accept ANY
export:         to AS24750 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
import:         from AS8390 accept ANY
export:         to AS8390 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
remarks:
remarks:        -- full bg peering --
remarks:
import:         from AS9070 accept ANY
export:         to AS9070 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
import:         from AS8866 accept ANY
export:         to AS8866 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
import:         from AS13124 accept ANY
export:         to AS13124 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
remarks:
remarks:        UPSTREAM - NOVATEL
import:         from AS41313 accept ANY
export:         to AS41313 announce AS-MEGALAN AS20911 AS31296 AS29343
import:         from AS8717 accept ANY
export:         to AS8717 announce AS-MEGALAN AS20911 AS31296 AS29343 AS44028
admin-c:        MTC41-RIPE
tech-c:         MTC41-RIPE
status:         ASSIGNED
mnt-by:         RIPE-NCC-END-MNT
mnt-lower:      MNT-MEGALAN
mnt-by:         MNT-MEGALAN
created:        2005-06-09T15:04:05Z
last-modified:  2018-09-04T10:09:41Z
source:         RIPE # Filtered
organisation:   ORG-MN1-RIPE
org-name:       A1 Bulgaria EAD
org-type:       LIR
address:        1 Kukush Str.
address:        1309
address:        Sofia
address:        BULGARIA
phone:          +359 88 8088088
phone:          +35 988 1010
fax-no:         +359 88 110 3970
abuse-c:        AR14215-RIPE
admin-c:        GG15027-RIPE
admin-c:        BH3761-RIPE
admin-c:        MG14247-RIPE
mnt-ref:        AS12716-MNT
mnt-ref:        RIPE-NCC-HM-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         AS12716-MNT
created:        2004-04-17T11:01:14Z
last-modified:  2018-09-13T11:11:28Z
source:         RIPE # Filtered
role:           A1 Bulgaria EAD Tech Contact
address:        M1 building
address:        1, Kukush str.
address:        Sofia
address:        Bulgaria
admin-c:        ET4209-RIPE
admin-c:        BH3761-RIPE
admin-c:        AK14936-RIPE
tech-c:         ET4209-RIPE
tech-c:         AK14936-RIPE
nic-hdl:        MTC41-RIPE
mnt-by:         ROUTE-12716-MNT
abuse-mailbox:  RIPE.Abuse@a1.bg
created:        2007-10-19T08:49:15Z
last-modified:  2018-10-02T06:20:54Z
source:         RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.95.1 (HEREFORD)

            

BLOCK DDOS ATTACKS ASN : 35141

DDoS-attack last 30 logs

Download DDoS Attacks Report AS35141 December 12 2019 10:11:10

IDDateCountryIPCIDRASNCategories
1.2019-12-12 01:10:10
BG
95.111.42.77 95.111.42.0/24 AS35141 Potentially Bad Traffic HTTP 1.0
2.2019-12-12 01:10:10
BG
95.111.3.141 95.111.3.0/24 AS35141 Potentially Bad Traffic HTTP 1.0
3.2019-12-12 01:04:40
BG
78.90.81.184 78.90.81.0/24 AS35141 Potentially Bad Traffic HTTP 1.0
4.2019-12-12 01:04:18
BG
77.70.115.103 77.70.114.0/23 AS35141 Potentially Bad Traffic HTTP 1.0
5.2019-11-19 02:36:05
BG
46.238.53.245 46.238.53.0/24 AS35141 Hackers using SSH (port 22) to attack
6.2019-11-17 05:05:06
BG
77.70.80.234 77.70.80.0/22 AS35141 Hackers using Telnet (port 23) to attack
7.2019-11-17 02:52:31
BG
78.90.79.226 78.90.79.0/24 AS35141 SERVER Error 403 Forbidden
8.2019-11-15 03:55:34
BG
95.111.89.81 95.111.89.0/24 AS35141 Hackers using Telnet (port 23) to attack
9.2019-11-15 02:40:29
BG
95.111.95.12 95.111.95.0/24 AS35141 Hackers using Telnet (port 23) to attack
10.2019-11-11 13:17:42
BG
95.111.74.98 95.111.74.0/23 AS35141 Hackers using SSH (port 22) to attack
11.2019-10-24 04:48:01
BG
77.70.111.103 77.70.110.0/23 AS35141 ANTI HACKER PROTECTION
12.2019-10-21 20:58:54
BG
95.111.66.159 95.111.66.0/24 AS35141 Hackers using Telnet (port 23) to attack
13.2019-10-20 01:53:38
BG
77.70.77.143 77.70.77.0/24 AS35141 Scanning For and Finding Vulnerabilities
14.2019-10-19 20:44:23
BG
77.70.13.111 77.70.13.0/24 AS35141 Hackers using SSH (port 22) to attack
15.2019-10-16 16:50:46
BG
46.238.41.201 46.238.41.0/24 AS35141 Hackers using Telnet (port 23) to attack
16.2019-10-15 12:20:35
BG
95.111.108.46 95.111.108.0/24 AS35141 Hackers using Telnet (port 23) to attack
17.2019-10-11 04:15:07
BG
46.238.10.32 46.238.10.0/24 AS35141 Hackers using Telnet (port 23) to attack
18.2019-10-02 19:25:20
BG
78.90.11.229 78.90.11.0/24 AS35141 Scanning For and Finding Vulnerabilities
19.2019-10-02 14:43:00
BG
95.111.101.45 95.111.101.0/24 AS35141 Scanning For and Finding Vulnerabilities
20.2019-09-29 19:50:15
BG
95.111.59.210 95.111.59.0/24 AS35141 Hackers using SSH (port 22) to attack
21.2019-09-29 17:39:34
BG
78.90.63.34 78.90.63.0/24 AS35141 DDoS Apache Servers
22.2019-09-28 22:57:39
BG
78.90.192.25 78.90.192.0/24 AS35141 SYN flood
23.2019-09-25 20:55:40
BG
89.190.203.54 89.190.203.0/24 AS35141 Hackers using Telnet (port 23) to attack
24.2019-09-25 17:18:42
BG
77.70.8.8 77.70.8.0/24 AS35141 Hackers using Telnet (port 23) to attack
25.2019-09-25 04:05:32
BG
78.90.183.230 78.90.182.0/23 AS35141 Hackers using Telnet (port 23) to attack
26.2019-09-22 15:37:33
BG
78.90.22.7 78.90.20.0/22 AS35141 SYN flood
27.2019-09-21 20:42:31
BG
46.238.35.44 46.238.35.0/24 AS35141 Web Application Attack
28.2019-09-20 05:56:09
BG
77.70.97.142 77.70.96.0/23 AS35141 SYN flood
29.2019-09-10 08:13:36
BG
78.90.113.84 78.90.113.0/24 AS35141 SYN flood
30.2019-09-10 03:32:48
BG
77.70.120.170 77.70.120.0/21 AS35141 SYN flood