AS45916


Whois ASN lookup : (WHOIS AS45916)

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html
% Information related to 'AS45056 - AS46079'
as-block:       AS45056 - AS46079
descr:          APNIC ASN block
remarks:        These AS numbers are further assigned by APNIC
remarks:        to APNIC members and end-users in the APNIC region
admin-c:        HM20-AP
tech-c:         HM20-AP
mnt-by:         APNIC-HM
mnt-lower:      APNIC-HM
last-modified:  2009-09-29T05:48:11Z
source:         APNIC
role:           APNIC Hostmaster
address:        6 Cordelia Street
address:        South Brisbane
address:        QLD 4101
country:        AU
phone:          +61 7 3858 3100
fax-no:         +61 7 3858 3199
e-mail:         helpdesk@apnic.net
admin-c:        AMS11-AP
tech-c:         AH256-AP
nic-hdl:        HM20-AP
remarks:        Administrator for APNIC
notify:         hostmaster@apnic.net
mnt-by:         MAINT-APNIC-AP
last-modified:  2013-10-23T04:06:51Z
source:         APNIC
% Information related to 'AS45916'
% Abuse contact for 'AS45916' is 'abuse.report@gtpl.net'
aut-num:        AS45916
as-name:        GTPL-AS-AP
descr:          Gujarat Telelink Pvt Ltd
country:        IN
admin-c:        IA301-AP
tech-c:         IA301-AP
mnt-by:         MAINT-IN-IRINN
mnt-routes:     MAINT-IN-GTPL
mnt-irt:        IRT-GTPL-IN
last-modified:  2019-02-07T05:47:42Z
source:         APNIC
irt:            IRT-GTPL-IN
address:        202, shahjanand Complex
address:        Opp. Swaminarayan Temple
address:        Shahibag Ahmedabad Gujarat
e-mail:         ip.admin@gtpl.net
abuse-mailbox:  abuse.report@gtpl.net
admin-c:        IA301-AP
tech-c:         IA301-AP
auth:           # Filtered
mnt-by:         MAINT-IN-GTPL
last-modified:  2019-02-07T07:42:36Z
source:         APNIC
role:           IP ADMIN
address:        202, shahjanand Complex
address:        Opp. Swaminarayan Temple
address:        Shahibag Ahmedabad Gujarat
country:        IN
phone:          +91 7069085558
e-mail:         ip.admin@gtpl.net
admin-c:        IA301-AP
tech-c:         IA301-AP
nic-hdl:        IA301-AP
mnt-by:         MAINT-IN-GTPL
last-modified:  2019-02-07T06:25:44Z
source:         APNIC
% This query was served by the APNIC Whois Service version 1.88.15-46 (WHOIS-US3)

            

BLOCK DDOS ATTACKS ASN : 45916

DDoS-attack last 100 logs

Download DDoS Attacks Report AS45916 December 12 2019 10:26:42

IDDateCountryIPCIDRASNCategories
1.2019-12-12 00:57:33
IN
43.224.8.14 43.224.8.0/24 AS45916 Potentially Bad Traffic HTTP 1.0
2.2019-12-12 00:56:03
IN
27.116.51.114 27.116.51.0/24 AS45916 Potentially Bad Traffic HTTP 1.0
3.2019-12-12 00:33:16
IN
157.119.207.36 157.119.207.0/24 AS45916 Potentially Bad Traffic HTTP 1.0
4.2019-12-12 00:32:25
IN
150.129.201.30 150.129.201.0/24 AS45916 Potentially Bad Traffic HTTP 1.0
5.2019-12-12 00:24:41
IN
103.251.57.23 103.251.57.0/24 AS45916 Potentially Bad Traffic HTTP 1.0
6.2019-12-12 00:24:41
IN
103.251.219.178 103.251.219.0/24 AS45916 Potentially Bad Traffic HTTP 1.0
7.2019-12-12 00:24:40
IN
103.250.166.17 103.250.166.0/24 AS45916 Potentially Bad Traffic HTTP 1.0
8.2019-12-12 00:24:40
IN
103.250.157.43 103.250.157.0/24 AS45916 Potentially Bad Traffic HTTP 1.0
9.2019-12-12 00:24:40
IN
103.250.148.82 103.250.148.0/24 AS45916 Potentially Bad Traffic HTTP 1.0
10.2019-12-12 00:24:36
IN
103.240.168.130 103.240.168.0/24 AS45916 Potentially Bad Traffic HTTP 1.0
11.2019-12-12 00:24:36
IN
103.240.160.21 103.240.160.0/24 AS45916 Potentially Bad Traffic HTTP 1.0
12.2019-12-12 00:24:35
IN
103.238.109.79 103.238.109.0/24 AS45916 Potentially Bad Traffic HTTP 1.0
13.2019-12-12 00:24:27
IN
103.216.82.29 103.216.82.0/24 AS45916 Potentially Bad Traffic HTTP 1.0
14.2019-12-12 00:24:19
IN
103.21.161.105 103.21.161.0/24 AS45916 Potentially Bad Traffic HTTP 1.0
15.2019-12-12 00:24:18
IN
103.21.160.120 103.21.160.0/24 AS45916 Potentially Bad Traffic HTTP 1.0
16.2019-11-19 06:33:21
IN
103.250.147.209 103.250.147.0/24 AS45916 Hackers using Telnet (port 23) to attack
17.2019-11-19 01:51:43
IN
103.1.100.95 103.1.100.0/24 AS45916 Hackers using Telnet (port 23) to attack
18.2019-11-18 23:14:21
IN
43.248.32.53 43.248.32.0/24 AS45916 Hackers using Telnet (port 23) to attack
19.2019-11-18 03:26:46
IN
150.129.106.199 150.129.106.0/24 AS45916 Hackers using Telnet (port 23) to attack
20.2019-11-17 22:42:46
IN
150.129.114.247 150.129.114.0/24 AS45916 Hackers using Telnet (port 23) to attack
21.2019-11-13 08:57:54
IN
43.250.158.84 43.250.158.0/24 AS45916 Hackers using SSH (port 22) to attack
22.2019-11-11 15:14:47
IN
43.249.228.38 43.249.228.0/24 AS45916 Hackers using SSH (port 22) to attack
23.2019-11-09 18:09:30
IN
43.251.75.93 43.251.75.0/24 AS45916 Hackers using Telnet (port 23) to attack
24.2019-11-03 04:15:42
IN
103.251.56.226 103.251.56.0/24 AS45916 Access blocked (abuse detected) FORBIDDEN (403)
25.2019-11-02 11:36:15
IN
103.240.162.146 103.240.162.0/24 AS45916 Scanning For and Finding Vulnerabilities
26.2019-11-02 09:47:18
IN
43.249.229.28 43.249.229.0/24 AS45916 Hackers using SSH (port 22) to attack
27.2019-10-31 13:21:15
IN
103.241.226.144 103.241.226.0/24 AS45916 RECIDIVE
28.2019-10-28 02:39:47
IN
150.129.204.114 150.129.204.0/24 AS45916 Hackers using Telnet (port 23) to attack
29.2019-10-27 04:52:21
IN
103.251.16.149 103.251.16.0/24 AS45916 Hackers using Telnet (port 23) to attack
30.2019-10-25 06:21:59
IN
103.238.110.245 103.238.110.0/24 AS45916 Hackers using Telnet (port 23) to attack
31.2019-10-21 22:00:04
IN
103.251.19.47 103.251.19.0/24 AS45916 Hackers using SSH (port 22) to attack
32.2019-10-21 13:15:47
IN
182.237.13.237 182.237.13.0/24 AS45916 SERVER Error 403 Forbidden
33.2019-10-19 19:25:36
IN
103.250.158.227 103.250.158.0/24 AS45916 ANTI HACKER PROTECTION
34.2019-10-19 16:37:05
IN
103.81.95.75 103.81.95.0/24 AS45916 Hackers using Telnet (port 23) to attack
35.2019-10-18 04:51:40
IN
103.251.225.13 103.251.225.0/24 AS45916 ANTI HACKER PROTECTION
36.2019-10-17 13:13:55
IN
27.116.48.102 27.116.48.0/24 AS45916 Hackers using Telnet (port 23) to attack
37.2019-10-17 11:22:55
IN
150.107.240.125 150.107.240.0/24 AS45916 Scanning For and Finding Vulnerabilities
38.2019-10-17 05:47:43
IN
103.240.79.176 103.240.79.0/24 AS45916 Hackers using Telnet (port 23) to attack
39.2019-10-17 00:45:22
IN
103.36.81.19 103.36.81.0/24 AS45916 SERVER 301 Moved Permanently
40.2019-10-16 15:11:20
IN
150.129.115.117 150.129.115.0/24 AS45916 Hackers using Telnet (port 23) to attack
41.2019-10-14 21:11:24
IN
103.250.188.10 103.250.188.0/24 AS45916 ANTI HACKER PROTECTION
42.2019-10-13 21:41:05
IN
103.250.152.52 103.250.152.0/24 AS45916 Hackers using Telnet (port 23) to attack
43.2019-10-10 22:33:28
IN
43.251.72.250 43.251.72.0/24 AS45916 Hackers using Telnet (port 23) to attack
44.2019-10-08 19:53:54
IN
103.216.83.109 103.216.83.0/24 AS45916 Hackers using Telnet (port 23) to attack
45.2019-10-07 17:13:45
IN
150.129.149.114 150.129.149.0/24 AS45916 Hackers using Telnet (port 23) to attack
46.2019-10-07 01:17:22
IN
103.21.163.5 103.21.163.0/24 AS45916 Scanning For and Finding Vulnerabilities
47.2019-10-06 17:11:04
IN
103.250.156.23 103.250.156.0/24 AS45916 Hackers using Telnet (port 23) to attack
48.2019-10-05 22:59:58
IN
103.86.19.82 103.86.19.0/24 AS45916 Scan port (21) FTP
49.2019-10-05 13:30:44
IN
103.240.76.207 103.240.76.0/24 AS45916 Scanning For and Finding Vulnerabilities
50.2019-10-05 10:51:48
IN
103.249.233.244 103.249.233.0/24 AS45916 Scan port (21) FTP
51.2019-10-04 19:13:11
IN
14.192.28.135 14.192.28.0/24 AS45916 Scanning For and Finding Vulnerabilities
52.2019-10-04 11:12:51
IN
43.250.165.152 43.250.165.0/24 AS45916 Scan port (21) FTP
53.2019-10-03 22:31:17
IN
43.241.192.53 43.241.192.0/24 AS45916 Scanning For and Finding Vulnerabilities
54.2019-10-03 20:43:07
IN
103.251.218.196 103.251.218.0/24 AS45916 Scanning For and Finding Vulnerabilities
55.2019-10-01 20:03:30
IN
103.250.153.146 103.250.153.0/24 AS45916 Scanning For and Finding Vulnerabilities
56.2019-10-01 15:55:23
IN
163.53.209.12 163.53.209.0/24 AS45916 DDoS Apache Servers
57.2019-10-01 12:00:09
IN
150.107.242.60 150.107.242.0/24 AS45916 Scanning For and Finding Vulnerabilities
58.2019-10-01 04:10:28
IN
103.240.77.70 103.240.77.0/24 AS45916 DDoS Apache Servers
59.2019-09-30 16:28:11
IN
103.85.11.74 103.85.11.0/24 AS45916 Scan port (21) FTP
60.2019-09-30 15:45:52
IN
103.238.106.182 103.238.106.0/24 AS45916 Scan port (21) FTP
61.2019-09-29 11:43:43
IN
43.241.146.142 43.241.146.0/24 AS45916 Scan port (21) FTP
62.2019-09-29 04:53:37
IN
43.241.145.248 43.241.145.0/24 AS45916 Hackers using SSH (port 22) to attack
63.2019-09-29 01:02:35
IN
43.248.35.148 43.248.35.0/24 AS45916 SCAN PORT : 80
64.2019-09-28 20:01:30
IN
43.241.144.122 43.241.144.0/24 AS45916 Scan port (21) FTP
65.2019-09-28 17:53:25
IN
103.241.227.105 103.241.227.0/24 AS45916 SCAN PORT : 80
66.2019-09-26 03:39:24
IN
43.249.232.64 43.249.232.0/24 AS45916 Web Application Attack
67.2019-09-25 09:19:03
IN
150.129.151.207 150.129.151.0/24 AS45916 Web Application Attack
68.2019-09-25 00:03:53
IN
103.209.65.12 103.209.65.0/24 AS45916 Web Application Attack
69.2019-09-24 16:46:34
IN
43.224.9.113 43.224.9.0/24 AS45916 Hackers using Telnet (port 23) to attack
70.2019-09-24 04:06:22
IN
43.250.164.197 43.250.164.0/24 AS45916 DDoS Apache Servers
71.2019-09-23 21:34:10
IN
103.240.206.198 103.240.206.0/24 AS45916 Web Application Attack
72.2019-09-23 13:22:19
IN
150.129.171.123 150.129.171.0/24 AS45916 Hackers using Telnet (port 23) to attack
73.2019-09-23 08:30:00
IN
103.228.144.57 103.228.144.0/24 AS45916 Hackers using Telnet (port 23) to attack
74.2019-09-23 08:17:14
IN
103.240.161.238 103.240.161.0/24 AS45916 Hackers using Telnet (port 23) to attack
75.2019-09-21 01:51:29
IN
103.251.58.60 103.251.58.0/24 AS45916 404 Bot Attack
76.2019-09-12 04:48:25
IN
103.251.59.190 103.251.59.0/24 AS45916 SYN flood