AS63949


Whois ASN lookup : (WHOIS AS63949)

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html
% Information related to 'AS63488 - AS63999'
as-block:       AS63488 - AS63999
descr:          APNIC ASN block
remarks:        These AS numbers are further assigned by APNIC
remarks:        to APNIC members and end-users in the APNIC region
admin-c:        HM20-AP
tech-c:         HM20-AP
mnt-by:         APNIC-HM
mnt-lower:      APNIC-HM
last-modified:  2013-09-11T23:49:48Z
source:         APNIC
role:           APNIC Hostmaster
address:        6 Cordelia Street
address:        South Brisbane
address:        QLD 4101
country:        AU
phone:          +61 7 3858 3100
fax-no:         +61 7 3858 3199
e-mail:         helpdesk@apnic.net
admin-c:        AMS11-AP
tech-c:         AH256-AP
nic-hdl:        HM20-AP
remarks:        Administrator for APNIC
notify:         hostmaster@apnic.net
mnt-by:         MAINT-APNIC-AP
last-modified:  2013-10-23T04:06:51Z
source:         APNIC
% Information related to 'AS63949'
% Abuse contact for 'AS63949' is 'abuse@linode.com'
aut-num:        AS63949
as-name:        LINODE-AP
descr:          Linode, LLC
country:        US
org:            ORG-LL3-AP
admin-c:        LLNA1-AP
tech-c:         LLNA1-AP
mnt-by:         APNIC-HM
mnt-routes:     MAINT-LINODE-AP
mnt-irt:        IRT-LINODE-AP
mnt-lower:      MAINT-LINODE-AP
last-modified:  2019-06-09T22:45:51Z
source:         APNIC
irt:            IRT-LINODE-AP
address:        329 E. Jimmie Leeds Road, Suite A, Galloway, NJ 08205 USA
e-mail:         tasaro@linode.com
abuse-mailbox:  abuse@linode.com
admin-c:        LLNA1-AP
tech-c:         LLNA1-AP
auth:           # Filtered
mnt-by:         MAINT-LINODE-AP
last-modified:  2011-04-28T03:14:32Z
source:         APNIC
organisation:   ORG-LL3-AP
org-name:       Linode, LLC
country:        US
address:        249 Arch Street
phone:          +1-609-380-7100
e-mail:         netops@linode.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2019-04-16T12:55:14Z
source:         APNIC
role:           LINODE LLC - network administrator
address:        329 E. Jimmie Leeds Road, Suite A, Galloway, NJ 08205 USA
country:        US
phone:          +1-609-380-7100
fax-no:         +1-609-380-7200
e-mail:         tasaro@linode.com
admin-c:        LLNA1-AP
tech-c:         LLNA1-AP
nic-hdl:        LLNA1-AP
mnt-by:         MAINT-LINODE-AP
last-modified:  2014-12-17T21:18:07Z
source:         APNIC
% This query was served by the APNIC Whois Service version 1.88.15-46 (WHOIS-UK4)

            

BLOCK DDOS ATTACKS ASN : 63949

DDoS-attack last 100 logs

Download DDoS Attacks Report AS63949 December 12 2019 10:43:04

IDDateCountryIPCIDRASNCategories
1.2019-12-12 01:11:11
US
97.107.136.11 97.107.128.0/20 AS63949 Potentially Bad Traffic HTTP 1.0
2.2019-12-12 01:07:51
GB
88.80.189.7 88.80.184.0/21 AS63949 Potentially Bad Traffic HTTP 1.0
3.2019-12-12 01:05:24
GB
80.85.87.128 80.85.84.0/22 AS63949 Potentially Bad Traffic HTTP 1.0
4.2019-12-12 00:59:34
US
45.79.64.51 45.79.64.0/19 AS63949 Potentially Bad Traffic HTTP 1.0
5.2019-12-12 00:59:34
US
45.79.200.144 45.79.192.0/20 AS63949 Potentially Bad Traffic HTTP 1.0
6.2019-12-12 00:59:34
US
45.79.130.180 45.79.128.0/19 AS63949 Potentially Bad Traffic HTTP 1.0
7.2019-12-12 00:49:03
US
198.58.102.68 198.58.96.0/19 AS63949 Potentially Bad Traffic HTTP 1.0
8.2019-12-12 00:36:46
GB
176.58.97.128 176.58.96.0/19 AS63949 Potentially Bad Traffic HTTP 1.0
9.2019-12-12 00:36:14
US
173.255.201.222 173.255.192.0/20 AS63949 Potentially Bad Traffic HTTP 1.0
10.2019-12-12 00:35:56
US
173.230.139.38 173.230.128.0/20 AS63949 Potentially Bad Traffic HTTP 1.0
11.2019-12-12 00:35:04
US
172.105.23.36 172.105.0.0/19 AS63949 Potentially Bad Traffic HTTP 1.0
12.2019-12-12 00:35:03
US
172.104.32.90 172.104.32.0/19 AS63949 Potentially Bad Traffic HTTP 1.0
13.2019-12-12 00:35:03
US
172.104.138.44 172.104.128.0/19 AS63949 Potentially Bad Traffic HTTP 1.0
14.2019-12-12 00:31:35
US
139.162.245.79 139.162.224.0/19 AS63949 Potentially Bad Traffic HTTP 1.0
15.2019-12-12 00:31:35
SG
139.162.21.219 139.162.0.0/19 AS63949 Potentially Bad Traffic HTTP 1.0
16.2019-12-12 00:31:35
US
139.162.192.135 139.162.192.0/19 AS63949 Potentially Bad Traffic HTTP 1.0
17.2019-12-12 00:31:35
US
139.162.138.103 139.162.128.0/19 AS63949 Potentially Bad Traffic HTTP 1.0
18.2019-12-12 00:25:59
US
104.200.29.105 104.200.28.0/22 AS63949 Potentially Bad Traffic HTTP 1.0
19.2019-12-12 00:24:43
US
103.3.62.75 103.3.60.0/22 AS63949 Potentially Bad Traffic HTTP 1.0
20.2019-11-24 05:15:39
US
139.162.119.197 139.162.96.0/19 AS63949 SERVER Error 403 Forbidden
21.2019-11-23 03:34:16
US
45.33.75.139 45.33.64.0/19 AS63949 Hackers using Telnet (port 23) to attack
22.2019-11-23 02:09:54
US
172.105.93.230 172.105.64.0/19 AS63949 Hackers using SSH (port 22) to attack
23.2019-11-22 17:14:06
US
172.104.242.173 172.104.224.0/19 AS63949 ANTI HACKER PROTECTION
24.2019-11-22 09:13:47
US
139.162.65.76 139.162.64.0/19 AS63949 Scanning For and Finding Vulnerabilities
25.2019-11-21 08:57:34
US
172.104.124.229 172.104.96.0/19 AS63949 Scanning For and Finding Vulnerabilities
26.2019-11-19 23:39:44
US
172.105.207.40 172.105.192.0/19 AS63949 Scanning For and Finding Vulnerabilities
27.2019-11-19 16:47:35
US
172.105.242.193 172.105.224.0/19 AS63949 Hackers using SSH (port 22) to attack
28.2019-11-19 11:42:28
US
172.104.9.241 172.104.8.0/21 AS63949 SERVER 301 Moved Permanently
29.2019-11-19 09:39:02
US
173.255.235.216 173.255.232.0/22 AS63949 ANTI HACKER PROTECTION
30.2019-11-14 12:00:40
US
45.118.135.88 45.118.132.0/22 AS63949 ANTI HACKER PROTECTION
31.2019-11-12 23:12:32
US
45.56.114.239 45.56.112.0/21 AS63949 RECIDIVE
32.2019-11-10 04:23:15
GB
109.74.197.184 109.74.192.0/20 AS63949 Hackers using Telnet (port 23) to attack
33.2019-11-09 16:52:45
US
104.237.156.51 104.237.156.0/24 AS63949 Hackers using Telnet (port 23) to attack
34.2019-11-09 00:07:58
US
45.33.40.23 45.33.40.0/24 AS63949 ANTI HACKER PROTECTION
35.2019-11-07 20:02:12
US
45.56.79.13 45.56.64.0/20 AS63949 SERVER Error 400 Bad Request
36.2019-11-07 18:24:17
US
173.255.247.251 173.255.247.0/24 AS63949 Scanning For and Finding Vulnerabilities
37.2019-11-07 17:34:57
US
45.33.14.194 45.33.0.0/19 AS63949 SERVER Error 403 Forbidden
38.2019-11-07 14:47:58
US
69.164.216.31 69.164.208.0/20 AS63949 SERVER Error 400 Bad Request
39.2019-11-06 00:12:47
US
45.79.54.243 45.79.32.0/19 AS63949 Scanning For and Finding Vulnerabilities
40.2019-11-02 06:00:52
GB
178.79.148.188 178.79.128.0/18 AS63949 Scanning For and Finding Vulnerabilities
41.2019-11-01 21:13:05
GB
213.219.38.251 213.219.36.0/22 AS63949 DNS DENIED
42.2019-11-01 20:50:16
GB
212.71.255.214 212.71.248.0/21 AS63949 DNS DENIED
43.2019-11-01 18:49:47
US
173.230.155.26 173.230.155.0/24 AS63949 DNS DENIED
44.2019-11-01 13:01:53
US
139.162.164.76 139.162.160.0/19 AS63949 DNS DENIED
45.2019-11-01 12:43:48
US
45.56.109.203 45.56.96.0/20 AS63949 RECIDIVE
46.2019-11-01 10:36:55
US
172.104.218.182 172.104.216.0/22 AS63949 DNS DENIED
47.2019-10-30 11:20:08
US
23.239.26.54 23.239.24.0/22 AS63949 SERVER Error 404 File Not Found
48.2019-10-27 04:00:12
US
139.162.45.46 139.162.32.0/19 AS63949 ANTI HACKER PROTECTION
49.2019-10-26 20:02:46
US
172.104.70.106 172.104.64.0/19 AS63949 SERVER 408 Request Timeout
50.2019-10-25 15:36:21
US
72.14.185.157 72.14.176.0/20 AS63949 ANTI HACKER PROTECTION
51.2019-10-25 15:36:13
US
64.62.190.245 64.62.190.0/24 AS63949 ANTI HACKER PROTECTION
52.2019-10-22 19:03:38
US
192.155.92.145 192.155.92.0/22 AS63949 Scanning For and Finding Vulnerabilities
53.2019-10-21 18:29:37
US
74.207.250.152 74.207.250.0/24 AS63949 DNS DENIED
54.2019-10-20 11:44:56
US
50.116.16.218 50.116.16.0/20 AS63949 ANTI HACKER PROTECTION
55.2019-10-19 08:34:55
US
66.228.50.196 66.228.48.0/21 AS63949 SERVER Error 403 Forbidden
56.2019-10-15 19:52:02
US
104.237.154.58 104.237.154.0/24 AS63949 ANTI HACKER PROTECTION
57.2019-10-15 17:24:13
US
104.237.147.37 104.237.144.0/21 AS63949 ANTI HACKER PROTECTION
58.2019-10-15 07:36:21
US
69.164.206.42 69.164.192.0/20 AS63949 ANTI HACKER PROTECTION
59.2019-10-14 17:30:20
US
45.79.11.29 45.79.8.0/22 AS63949 Hackers using SSH (port 22) to attack
60.2019-10-13 23:43:15
US
45.79.4.62 45.79.0.0/21 AS63949 DNS DENIED
61.2019-10-13 22:33:06
US
50.116.1.104 50.116.1.0/24 AS63949 DNS DENIED
62.2019-10-12 12:15:34
US
173.230.148.106 173.230.148.0/24 AS63949 Hackers using SSH (port 22) to attack
63.2019-10-12 00:43:44
US
45.56.91.118 45.56.91.0/24 AS63949 Hackers using Telnet (port 23) to attack
64.2019-10-11 13:28:48
US
172.104.209.139 172.104.208.0/21 AS63949 SERVER Error 403 Forbidden
65.2019-10-11 13:04:55
DE
85.90.246.93 85.90.244.0/22 AS63949 SERVER Error 403 Forbidden
66.2019-10-10 20:17:13
US
23.239.19.234 23.239.16.0/22 AS63949 DNS DENIED
67.2019-10-10 18:52:28
US
104.237.159.50 104.237.159.0/24 AS63949 Scanning For and Finding Vulnerabilities
68.2019-10-10 12:38:37
US
66.175.214.14 66.175.208.0/21 AS63949 DNS DENIED
69.2019-10-06 06:35:14
US
104.200.25.105 104.200.25.0/24 AS63949 Scanning For and Finding Vulnerabilities
70.2019-10-06 00:53:52
US
45.79.222.163 45.79.208.0/20 AS63949 Scanning For and Finding Vulnerabilities
71.2019-10-05 05:01:20
US
162.216.16.88 162.216.16.0/22 AS63949 DNS DENIED
72.2019-10-04 09:11:55
US
172.105.63.237 172.105.32.0/19 AS63949 Hackers using SSH (port 22) to attack
73.2019-10-03 21:24:04
US
45.56.83.185 45.56.83.0/24 AS63949 Scanning For and Finding Vulnerabilities
74.2019-10-03 05:56:51
US
50.116.35.38 50.116.32.0/20 AS63949 Scanning For and Finding Vulnerabilities
75.2019-10-02 23:31:40
US
45.79.175.136 45.79.160.0/20 AS63949 DNS DENIED
76.2019-10-02 13:43:31
US
45.33.60.8 45.33.60.0/24 AS63949 Scanning For and Finding Vulnerabilities
77.2019-10-02 02:34:07
US
74.207.230.64 74.207.224.0/21 AS63949 DDoS Apache Servers
78.2019-10-02 01:43:32
US
172.105.121.27 172.105.112.0/20 AS63949 DNS DENIED
79.2019-10-02 01:04:55
US
198.74.53.177 198.74.52.0/22 AS63949 Scanning For and Finding Vulnerabilities
80.2019-10-01 23:52:36
US
172.104.169.69 172.104.160.0/19 AS63949 Hackers using SSH (port 22) to attack
81.2019-10-01 21:23:38
US
45.33.46.166 45.33.46.0/24 AS63949 Scanning For and Finding Vulnerabilities
82.2019-10-01 05:38:10
GB
85.159.208.128 85.159.208.0/21 AS63949 Scanning For and Finding Vulnerabilities
83.2019-10-01 02:31:17
US
66.228.37.43 66.228.32.0/20 AS63949 Scanning For and Finding Vulnerabilities
84.2019-09-29 22:22:24
US
45.79.106.170 45.79.96.0/20 AS63949 Hackers using SSH (port 22) to attack
85.2019-09-29 13:39:07
US
192.81.128.37 192.81.128.0/24 AS63949 SYN flood
86.2019-09-29 12:33:06
US
45.33.109.12 45.33.109.0/24 AS63949 SYN flood
87.2019-09-28 20:15:17
US
66.175.220.5 66.175.220.0/24 AS63949 SYN flood
88.2019-09-28 18:30:46
US
173.230.152.228 173.230.152.0/24 AS63949 SYN flood
89.2019-09-28 18:25:36
US
103.29.69.96 103.29.68.0/22 AS63949 SYN flood
90.2019-09-24 22:11:46
US
45.79.187.200 45.79.176.0/20 AS63949 Hackers using Telnet (port 23) to attack
91.2019-09-22 03:21:05
US
104.237.133.235 104.237.128.0/21 AS63949 Web Application Attack
92.2019-09-21 01:51:41
US
172.105.98.227 172.105.96.0/20 AS63949 DDoS Apache 40X
93.2019-09-18 13:42:19
US
173.255.209.39 173.255.209.0/24 AS63949 SYN flood
94.2019-09-17 21:09:37
GB
212.71.247.139 212.71.244.0/22 AS63949 SYN flood
95.2019-09-13 07:28:26
GB
212.71.237.188 212.71.232.0/21 AS63949 SYN flood
96.2019-09-12 10:44:52
US
45.79.21.159 45.79.16.0/20 AS63949 SYN flood
97.2019-09-12 02:38:02
US
45.33.125.100 45.33.112.0/20 AS63949 SYN flood
98.2019-09-11 11:08:09
US
173.255.243.141 173.255.243.0/24 AS63949 SYN flood