AS42555


Whois ASN lookup : (WHOIS AS42555)

% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf
% Note: this output has been filtered.
%       To receive output for a database update, use the '-B' flag.
% Information related to 'AS42383 - AS45055'
as-block:       AS42383 - AS45055
descr:          RIPE NCC ASN block
remarks:        These AS Numbers are assigned to network operators in the RIPE NCC service region.
mnt-by:         RIPE-NCC-HM-MNT
created:        2018-11-22T15:27:34Z
last-modified:  2018-11-22T15:27:34Z
source:         RIPE
% Information related to 'AS42555'
% Abuse contact for 'AS42555' is 'ripe@optic-com.eu'
aut-num:        AS42555
as-name:        Optic-Com-EU
org:            ORG-DE13-RIPE
remarks:        *********************************************************
remarks:        Upstream ISPs
remarks:        *********************************************************
import:         from AS12615 accept ANY
export:         to AS12615 announce AS-OPTICCOM-OUT
import:         from AS2914 accept ANY
export:         to AS2914 announce AS-OPTICCOM-OUT
import:         from AS3356 accept ANY
export:         to AS3356 announce AS-OPTICCOM-OUT
remarks:        *********************************************************
remarks:        Downstream ISPs
remarks:        *********************************************************
import:         from AS35428 accept AS35428
import:         from AS39683 accept AS39683
import:         from AS41234 accept AS41234
import:         from AS41946 accept AS41946
import:         from AS42398 accept AS42398
import:         from AS44077 accept AS44077
import:         from AS44529 accept AS44529
import:         from AS48181 accept AS48181
import:         from AS56389 accept AS56389
import:         from AS57765 accept AS57765
import:         from AS59772 accept AS59772
import:         from AS60974 accept AS60974
import:         from AS62052 accept AS62052
import:         from AS197304 accept AS197304
import:         from AS197929 accept AS197929
import:         from AS200617 accept AS200617
import:         from AS200872 accept AS200872
import:         from AS201233 accept AS201233
import:         from AS201351 accept AS201351
import:         from AS201613 accept AS201613
import:         from AS204232 accept AS204232
import:         from AS200859 accept AS200859
import:         from AS48264 accept AS48264
import:         from AS43147 accept AS43147
import:         from AS201288 accept AS201288
import:         from AS204105 accept AS204105
import:         from AS60168 accept AS60168
import:         from AS49084 accept AS49084
import:         from AS-NETSERVICE accept AS-NETSERVICE
export:         to AS35428 announce any
export:         to AS39683 announce any
export:         to AS41234 announce any
export:         to AS41946 announce any
export:         to AS42398 announce any
export:         to AS44077 announce any
export:         to AS44529 announce any
export:         to AS48181 announce any
export:         to AS56389 announce any
export:         to AS57765 announce any
export:         to AS59772 announce any
export:         to AS60974 announce any
export:         to AS62052 announce any
export:         to AS197304 announce any
export:         to AS197929 announce any
export:         to AS200617 announce any
export:         to AS200872 announce any
export:         to AS201233 announce any
export:         to AS201351 announce any
export:         to AS201613 announce any
export:         to AS204232 announce any
export:         to AS200859 announce any
export:         to AS48264 announce any
export:         to AS43147 announce any
export:         to AS201288 announce any
export:         to AS204105 announce any
export:         to AS60168 announce any
export:         to AS49084 announce any
export:         to AS-NETSERVICE announce any
admin-c:        SR5092-RIPE
tech-c:         IP1442-RIPE
status:         ASSIGNED
mnt-by:         RIPE-NCC-END-MNT
mnt-by:         MNT-OC
created:        2007-03-09T12:18:02Z
last-modified:  2019-08-27T14:32:45Z
source:         RIPE
organisation:   ORG-DE13-RIPE
org-name:       OPTICCOM- BULGARIA Ltd.
org-type:       LIR
address:        Boyan Magesnik 66 Str.
address:        1000
address:        Sofia
address:        BULGARIA
phone:          +359878411277
fax-no:         +35928713479
admin-c:        IP1442-RIPE
admin-c:        SR5092-RIPE
admin-c:        IS4635-RIPE
abuse-c:        IS4636-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        MNT-OC
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         MNT-OC
created:        2008-10-13T13:50:44Z
last-modified:  2017-10-30T14:52:36Z
source:         RIPE # Filtered
person:         Ivan Parashkevov
address:        Sofia , Bulgaria
phone:          +359878411277
nic-hdl:        IP1442-RIPE
mnt-by:         MNT-OC
created:        2008-10-13T18:42:05Z
last-modified:  2011-08-25T11:48:09Z
source:         RIPE # Filtered
person:         Stanislav Radkov
address:        Sofia , Bulgaria
phone:          +359878337025
nic-hdl:        SR5092-RIPE
mnt-by:         MNT-OC
created:        2008-10-13T16:22:10Z
last-modified:  2014-11-04T10:11:58Z
source:         RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.95.1 (BLAARKOP)

            

BLOCK DDOS ATTACKS ASN : 42555

DDoS-attack last 100 logs

Download DDoS Attacks Report AS42555 December 12 2019 10:21:08

IDDateCountryIPCIDRASNCategories
1.2019-12-12 01:09:57
BG
94.236.198.160 94.236.198.0/24 AS42555 Potentially Bad Traffic HTTP 1.0
2.2019-11-21 01:18:03
BG
94.236.201.156 94.236.201.0/24 AS42555 SERVER Error 403 Forbidden
3.2019-10-31 23:57:23
BG
94.236.194.201 94.236.194.0/24 AS42555 Hackers using Telnet (port 23) to attack
4.2019-10-25 23:18:52
BG
94.236.214.217 94.236.212.0/22 AS42555 Hackers using Telnet (port 23) to attack
5.2019-10-11 09:27:24
BG
94.236.199.198 94.236.199.0/24 AS42555 Hackers using Telnet (port 23) to attack
6.2019-10-05 21:58:17
BG
94.236.200.182 94.236.200.0/24 AS42555 Scanning For and Finding Vulnerabilities
7.2019-10-04 10:34:54
BG
94.236.226.147 94.236.226.0/23 AS42555 Scanning For and Finding Vulnerabilities
8.2019-09-25 23:27:47
BG
94.236.134.247 94.236.128.0/20 AS42555 Hackers using Telnet (port 23) to attack