AS49800


Whois ASN lookup : (WHOIS AS49800)

% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf
% Note: this output has been filtered.
%       To receive output for a database update, use the '-B' flag.
% Information related to 'AS47104 - AS52223'
as-block:       AS47104 - AS52223
descr:          RIPE NCC ASN block
remarks:        These AS Numbers are assigned to network operators in the RIPE NCC service region.
mnt-by:         RIPE-NCC-HM-MNT
created:        2018-11-22T15:27:34Z
last-modified:  2018-11-22T15:27:34Z
source:         RIPE
% Information related to 'AS49800'
% Abuse contact for 'AS49800' is 'abuse@gnc.am'
aut-num:        AS49800
org:            ORG-GC21-RIPE
as-name:        GNC-ALFA
descr:          GNC Alfa CJSC (Rostelecom Armenia)
descr:          -=BioNet=-
import:         from AS42991 accept AS42991
export:         to AS42991 announce ANY
descr:          --NetSys--
import:         from AS21104 accept AS21104
export:         to AS21104 announce ANY
descr:          --ADC--
export:         to AS42109 announce ANY
import:         from AS42109 accept AS42109
descr:          --Arminco--
export:         to AS8226 announce ANY
import:         from AS8226 accept AS8226:AS-CUST
import:         from AS8226 accept AS8226
descr:          --WEB--
export:         to AS16190 announce ANY
import:         from AS16190 accept AS-WEB
descr:          --UCOM--
export:         to AS44395 announce ANY
import:         from AS44395 accept AS44395
descr:          --CrossNet--
import:         from AS39863 accept AS39863
export:         to AS39863 announce ANY
descr:          --VIVACELL--
import:         from AS43733 accept AS43733
export:         to AS43733 announce ANY
descr:          -=GNC2=-
import:         from AS6682 action pref=100; accept ANY
export:         to AS6682 announce AS-GNC
descr:          -=GNC3=-
import:         from AS196709 action pref=100; accept ANY
export:         to AS196709 announce AS-GNC
descr:          -=Apaga Technologies=-
import:         from AS48861 accept AS48861
export:         to AS48861 announce ANY
descr:          -=Aranea=-
import:         from AS34083 accept AS34083
export:         to AS34083 announce ANY
descr:          -=HachnISP=-
import:         from AS51342 accept AS51342
export:         to AS51342 announce ANY
descr:          -=Ashtarak Elite=-
import:         from AS51371 accept AS51371
export:         to AS51371 announce ANY
descr:          -=Infotech=-
import:         from AS50623 accept AS50623
export:         to AS50623 announce ANY
descr:          -=Voloff=-
import:         from AS56956 accept AS56956
export:         to AS56956 announce ANY
descr:          -=Vivaro_Betconstruct=-
import:         from AS199062 accept AS199062
export:         to AS199062 announce ANY
descr:          -=ARM-IX=-
import:         from AS51225 accept ANY
export:         to AS60548 announce ANY
descr:          -=K-root=-
import:         from AS25152 accept AS25152
export:         to AS25152 announce ANY
descr:          -=South Caucasian Railways=-
import:         from AS204194 accept AS204194
export:         to AS204194 announce ANY
descr:          -=Nikita Mobile=-
import:         from AS208526 accept AS208526
export:         to AS208526 announce ANY
descr:          -=ICN=-
import:         from AS208997 accept AS208997
export:         to AS208997 announce ANY
admin-c:        GAR131-RIPE
tech-c:         GAR131-RIPE
status:         ASSIGNED
mnt-by:         RIPE-NCC-END-MNT
mnt-by:         MNT-GNC
created:        2009-09-14T08:52:20Z
last-modified:  2019-09-20T17:28:55Z
source:         RIPE
organisation:   ORG-GC21-RIPE
org-name:       GNC-Alfa CJSC
org-type:       LIR
address:        1 Khaghaghutyan str.
address:        2201
address:        Abovyan
address:        ARMENIA
phone:          +37460469901
fax-no:         +37460469901
mnt-ref:        MNT-GNC
mnt-ref:        RIPE-NCC-HM-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         MNT-GNC
abuse-c:        GAR131-RIPE
created:        2010-10-22T12:21:16Z
last-modified:  2019-02-11T11:54:54Z
source:         RIPE # Filtered
role:           GNC Admin Role
address:        Armenia, Abovyan, Khakhaghutyan str. 1
admin-c:        MT13409-RIPE
tech-c:         AA8916-RIPE
tech-c:         MK10494-RIPE
tech-c:         MN10636-RIPE
abuse-mailbox:  abuse@gnc.am
mnt-by:         MNT-GNC
nic-hdl:        GAR131-RIPE
created:        2010-06-28T06:38:53Z
last-modified:  2017-08-09T09:17:05Z
source:         RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.95.1 (BLAARKOP)

            

BLOCK DDOS ATTACKS ASN : 49800

DDoS-attack last 100 logs

Download DDoS Attacks Report AS49800 December 12 2019 10:30:55

IDDateCountryIPCIDRASNCategories
1.2019-12-12 01:01:34
AM
5.63.165.178 5.63.164.0/22 AS49800 Potentially Bad Traffic HTTP 1.0
2.2019-11-26 15:55:35
AM
195.250.75.198 195.250.64.0/19 AS49800 Hackers using Telnet (port 23) to attack
3.2019-11-26 06:36:22
AM
62.89.22.42 62.89.0.0/19 AS49800 Hackers using Telnet (port 23) to attack
4.2019-11-23 10:21:55
AM
37.186.92.112 37.186.64.0/18 AS49800 Hackers using Telnet (port 23) to attack
5.2019-11-20 03:20:53
AM
217.113.24.216 217.113.16.0/20 AS49800 Hackers using Telnet (port 23) to attack
6.2019-11-19 18:31:41
AM
78.109.78.34 78.109.64.0/20 AS49800 Hackers using Telnet (port 23) to attack
7.2019-11-18 17:56:26
AM
83.139.53.68 83.139.48.0/20 AS49800 Hackers using Telnet (port 23) to attack
8.2019-11-18 15:31:08
AM
93.185.39.250 93.185.32.0/20 AS49800 Hackers using Telnet (port 23) to attack
9.2019-11-16 02:11:05
AM
212.42.218.150 212.42.216.0/21 AS49800 Hackers using Telnet (port 23) to attack
10.2019-11-14 12:26:55
AM
185.21.255.167 185.21.252.0/22 AS49800 Hackers using Telnet (port 23) to attack
11.2019-11-11 15:33:35
AM
212.42.213.220 212.42.208.0/21 AS49800 Hackers using Telnet (port 23) to attack
12.2019-11-01 04:20:22
AM
31.47.198.50 31.47.198.0/24 AS49800 Hackers using SSH (port 22) to attack
13.2019-10-21 23:13:03
AM
46.19.101.242 46.19.96.0/21 AS49800 Hackers using Telnet (port 23) to attack
14.2019-10-02 14:27:49
AM
5.134.85.1 5.134.80.0/21 AS49800 Scanning For and Finding Vulnerabilities
15.2019-09-29 11:36:05
AM
130.193.121.36 130.193.120.0/21 AS49800 SCAN PORT : 80
16.2019-09-15 10:04:48
AM
212.42.193.74 212.42.192.0/20 AS49800 SYN flood