AS6400


Whois ASN lookup : (WHOIS AS6400)

#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2019, American Registry for Internet Numbers, Ltd.
#
ASNumber:       6400
ASName:         LACNIC-6400
ASHandle:       AS6400
RegDate:        2002-07-26
Updated:        2007-12-17
Comment:        This AS is under LACNIC responsibility for further allocations to
Comment:        users in LACNIC region.
Comment:        Please see http://www.lacnic.net/ for further details, or check the
Comment:        WHOIS server located at http://whois.lacnic.net    
Ref:            https://rdap.arin.net/registry/autnum/6400
ResourceLink:  http://lacnic.net/cgi-bin/lacnic/whois
ResourceLink:  whois.lacnic.net
OrgName:        Latin American and Caribbean IP address Regional Registry
OrgId:          LACNIC
Address:        Rambla Republica de Mexico 6125
City:           Montevideo
StateProv:      
PostalCode:     11400
Country:        UY
RegDate:        2002-07-26
Updated:        2018-03-15
Ref:            https://rdap.arin.net/registry/entity/LACNIC
ReferralServer:  whois://whois.lacnic.net
ResourceLink:  http://lacnic.net/cgi-bin/lacnic/whois
OrgAbuseHandle: LWI100-ARIN
OrgAbuseName:   LACNIC Whois Info
OrgAbusePhone:  +598-2604-2222 
OrgAbuseEmail:  abuse@lacnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LWI100-ARIN
OrgTechHandle: LACNIC-ARIN
OrgTechName:   LACNIC Whois Info
OrgTechPhone:  +598-2604-2222 
OrgTechEmail:  whois-contact@lacnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/LACNIC-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2019, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.lacnic.net.
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries
 
% LACNIC resource: whois.lacnic.net
% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2019-10-12 18:40:57 (-03 -03:00)
aut-num:     AS6400
owner:       Compaa Dominicana de Telfonos, C. por A. - CODETEL
ownerid:     DO-CODE-LACNIC
responsible: Timoteo Perez
address:     Av. John F Kenedy, 54, -
address:     1377 - Santo Domingo - DN
country:     DO
phone:       +1  8092203331 [0000]
owner-c:     TIP22
routing-c:   ABT
abuse-c:     ABT
created:     19960329
changed:     20021127
nic-hdl:     ABT
person:      TIMOTEO PEREZ
e-mail:      abuse@CODETEL.NET.DO
address:     Av. Jhon F Kennedy # 54, 1101, -
address:     1377 - Santo Domingo - DN
country:     DO
phone:       +1809  8092202000 [3331]
created:     20021127
changed:     20190815
nic-hdl:     TIP22
person:      Timoteo Perez
e-mail:      timoteo_perez@CLARO.COM.DO
address:     Av. Jhon F Kenedy, 54, -
address:     1377 - DN Santo Domingo - Santiago
country:     DO
phone:       +1809  2202000 [3331]
created:     20190321
changed:     20190819
% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.

            

BLOCK DDOS ATTACKS ASN : 6400

DDoS-attack last 100 logs

Download DDoS Attacks Report AS6400 December 12 2019 08:23:10

IDDateCountryIPCIDRASNCategories
1.2019-12-12 00:42:39
DO
190.167.228.37 190.167.224.0/19 AS6400 Potentially Bad Traffic HTTP 1.0
2.2019-12-12 00:42:38
DO
190.167.215.170 190.167.208.0/20 AS6400 Potentially Bad Traffic HTTP 1.0
3.2019-12-12 00:42:38
DO
190.166.249.44 190.166.240.0/20 AS6400 Potentially Bad Traffic HTTP 1.0
4.2019-12-12 00:37:41
DO
179.52.41.183 179.52.32.0/19 AS6400 Potentially Bad Traffic HTTP 1.0
5.2019-12-12 00:37:41
DO
179.52.1.126 179.52.0.0/19 AS6400 Potentially Bad Traffic HTTP 1.0
6.2019-12-12 00:32:13
DO
148.255.111.63 148.255.0.0/16 AS6400 Potentially Bad Traffic HTTP 1.0
7.2019-12-12 00:32:12
DO
148.101.94.209 148.101.0.0/17 AS6400 Potentially Bad Traffic HTTP 1.0
8.2019-11-25 09:08:54
DO
190.166.119.224 190.166.64.0/18 AS6400 SERVER Error 403 Forbidden
9.2019-11-25 08:54:31
DO
152.0.202.98 152.0.128.0/17 AS6400 SERVER Error 403 Forbidden
10.2019-11-25 00:57:30
DO
179.53.250.181 179.53.224.0/19 AS6400 Hackers using Telnet (port 23) to attack
11.2019-11-24 21:02:50
DO
152.0.50.20 152.0.0.0/18 AS6400 Hackers using Telnet (port 23) to attack
12.2019-11-24 15:22:36
DO
179.52.243.127 179.52.224.0/19 AS6400 Hackers using SSH (port 22) to attack
13.2019-11-24 02:23:34
DO
190.166.138.63 190.166.128.0/18 AS6400 ANTI HACKER PROTECTION
14.2019-11-23 18:09:37
DO
148.0.159.45 148.0.128.0/19 AS6400 SERVER Error 400 Bad Request
15.2019-11-23 15:38:42
DO
186.7.146.64 186.7.128.0/18 AS6400 Hackers using Telnet (port 23) to attack
16.2019-11-21 18:10:47
DO
148.0.46.88 148.0.0.0/18 AS6400 ANTI HACKER PROTECTION
17.2019-11-21 06:22:30
DO
179.52.132.17 179.52.128.0/19 AS6400 Hackers using SSH (port 22) to attack
18.2019-11-21 04:07:28
DO
179.52.176.170 179.52.160.0/19 AS6400 Hackers using Telnet (port 23) to attack
19.2019-11-19 12:10:37
DO
186.6.206.30 186.6.192.0/19 AS6400 Hackers using Telnet (port 23) to attack
20.2019-11-19 02:31:07
DO
186.7.124.112 186.7.0.0/17 AS6400 Hackers using Telnet (port 23) to attack
21.2019-11-18 21:59:17
DO
148.0.80.204 148.0.64.0/18 AS6400 Hackers using Telnet (port 23) to attack
22.2019-11-18 20:00:26
DO
148.101.175.247 148.101.128.0/17 AS6400 Hackers using Telnet (port 23) to attack
23.2019-11-18 05:37:08
DO
186.6.227.83 186.6.224.0/19 AS6400 Hackers using Telnet (port 23) to attack
24.2019-11-18 05:33:25
DO
190.80.200.206 190.80.192.0/19 AS6400 Hackers using Telnet (port 23) to attack
25.2019-11-15 02:50:13
DO
200.88.175.3 200.88.160.0/19 AS6400 SERVER Error 403 Forbidden
26.2019-11-14 12:53:35
DO
190.167.69.191 190.167.64.0/19 AS6400 Hackers using Telnet (port 23) to attack
27.2019-11-12 11:27:05
DO
179.53.114.204 179.53.64.0/18 AS6400 Hackers using Telnet (port 23) to attack
28.2019-11-12 04:53:08
DO
66.98.7.18 66.98.0.0/19 AS6400 Hackers using Telnet (port 23) to attack
29.2019-11-12 01:29:43
DO
179.52.66.238 179.52.64.0/18 AS6400 Hackers using SSH (port 22) to attack
30.2019-11-10 21:24:17
DO
201.229.170.222 201.229.128.0/18 AS6400 Hackers using SSH (port 22) to attack
31.2019-11-10 05:23:53
DO
152.0.71.183 152.0.64.0/19 AS6400 Hackers using SSH (port 22) to attack
32.2019-11-10 00:19:26
DO
64.32.109.207 64.32.64.0/18 AS6400 Hackers using Telnet (port 23) to attack
33.2019-11-05 01:48:43
DO
179.53.31.82 179.53.0.0/19 AS6400 SERVER Error 403 Forbidden
34.2019-11-04 23:53:37
DO
186.6.161.137 186.6.128.0/18 AS6400 SERVER Error 403 Forbidden
35.2019-11-02 01:44:40
DO
190.166.54.220 190.166.32.0/19 AS6400 Hackers using Telnet (port 23) to attack
36.2019-10-31 20:21:26
DO
190.80.150.161 190.80.150.0/23 AS6400 Hackers using Telnet (port 23) to attack
37.2019-10-23 22:37:39
DO
148.0.169.8 148.0.160.0/19 AS6400 Hackers using SSH (port 22) to attack
38.2019-10-19 13:25:49
DO
179.52.214.246 179.52.192.0/19 AS6400 ANTI HACKER PROTECTION
39.2019-10-18 04:53:34
DO
148.0.245.190 148.0.192.0/18 AS6400 ANTI HACKER PROTECTION
40.2019-10-16 23:26:39
DO
186.6.122.157 186.6.0.0/17 AS6400 ANTI HACKER PROTECTION
41.2019-10-10 10:35:07
DO
190.167.136.146 190.167.128.0/20 AS6400 Hackers using Telnet (port 23) to attack
42.2019-10-05 17:01:13
DO
179.53.33.245 179.53.32.0/20 AS6400 Scanning For and Finding Vulnerabilities
43.2019-10-04 19:21:26
DO
179.53.143.33 179.53.128.0/18 AS6400 Scanning For and Finding Vulnerabilities
44.2019-10-02 14:24:17
DO
190.80.186.91 190.80.160.0/19 AS6400 Scanning For and Finding Vulnerabilities
45.2019-09-30 14:21:00
DO
190.166.21.137 190.166.16.0/20 AS6400 Hackers using Telnet (port 23) to attack
46.2019-09-30 10:13:07
DO
186.7.252.40 186.7.240.0/20 AS6400 Hackers using Telnet (port 23) to attack
47.2019-09-30 10:02:11
DO
190.167.43.203 190.167.40.0/21 AS6400 Hackers using Telnet (port 23) to attack
48.2019-09-29 17:12:50
DO
152.0.101.102 152.0.96.0/20 AS6400 DDoS Apache Servers
49.2019-09-29 07:55:30
DO
190.167.17.89 190.167.16.0/20 AS6400 SYN flood
50.2019-09-28 20:21:03
DO
190.167.100.30 190.167.96.0/20 AS6400 SYN flood
51.2019-09-26 19:13:42
DO
186.7.204.179 186.7.192.0/20 AS6400 Hackers using Telnet (port 23) to attack
52.2019-09-25 18:19:56
DO
190.167.175.167 190.167.168.0/21 AS6400 Hackers using Telnet (port 23) to attack
53.2019-09-25 02:29:31
DO
186.7.235.37 186.7.224.0/20 AS6400 Web Application Attack
54.2019-09-24 19:53:53
DO
190.80.226.254 190.80.224.0/20 AS6400 Web Application Attack
55.2019-09-24 08:59:09
DO
179.53.58.6 179.53.48.0/20 AS6400 Web Application Attack
56.2019-09-23 10:27:13
DO
190.167.37.192 190.167.36.0/22 AS6400 Hackers using Telnet (port 23) to attack
57.2019-09-20 17:44:29
DO
190.167.115.184 190.167.112.0/20 AS6400 SYN flood
58.2019-09-20 15:56:00
DO
190.166.206.199 190.166.192.0/20 AS6400 SYN flood
59.2019-09-20 11:57:18
DO
190.167.13.122 190.167.0.0/20 AS6400 SYN flood