AS8473


Whois ASN lookup : (WHOIS AS8473)

% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf
% Note: this output has been filtered.
%       To receive output for a database update, use the '-B' flag.
% Information related to 'AS8192 - AS8523'
as-block:       AS8192 - AS8523
descr:          RIPE NCC ASN block
remarks:        These AS Numbers are assigned to network operators in the RIPE NCC service region.
mnt-by:         RIPE-NCC-HM-MNT
created:        2018-11-22T15:27:23Z
last-modified:  2018-11-22T15:27:23Z
source:         RIPE
% Information related to 'AS8473'
% Abuse contact for 'AS8473' is 'abuse@bahnhof.net'
aut-num:        AS8473
as-name:        BAHNHOF
org:            ORG-BIA1-RIPE
descr:          http://www.bahnhof.net/
remarks:        ------------------------------------------------------
remarks:        Bahnhof - AS8473:
remarks:        ------------------------------------------------------
remarks:        Please see https://as8473.peeringdb.com for
remarks:        IXPs and facilities where we are present.
remarks:
remarks:        BGP Graceful Shutdown (RFC8326): Supported
remarks:        RPKI Invalids (RFC8481): Dropped
remarks:        Customer MEDs: Honored
remarks:        Peer MEDs: Ignored
remarks:        AS-set announced: AS-BAHNHOF
remarks:
remarks:        ------------------------------------------------------
remarks:        Control section:
remarks:        ------------------------------------------------------
remarks:        BGP Community support for AS8473 customers:
remarks:
remarks:        8473:1050 Set local pref 50 (lowest preference)
remarks:        8473:1100 Set local pref 100 (transit preference)
remarks:        8473:1150 Set local pref 150 (backup peer preference)
remarks:        8473:1200 Set local pref 200 (peer preference)
remarks:        8473:1250 Set local pref 250 (backup downstream preference)
remarks:        (Default) local pref 300
remarks:
remarks:        8473:2000 Do not announce to transits
remarks:        8473:2001 Announce to transits prepend x1
remarks:        8473:2002 Announce to transits prepend x2
remarks:        8473:2003 Announce to transits prepend x3
remarks:        8473:2005 Announce to transits with no-export
remarks:
remarks:        8473:3000 Do not announce to peers
remarks:        8473:3001 Announce to peers prepend x1
remarks:        8473:3002 Announce to peers prepend x2
remarks:        8473:3003 Announce to peers prepend x3
remarks:        8473:3005 Announce to peers with no-export
remarks:
remarks:        8473:999 Blackhole community
remarks:
remarks:        ------------------------------------------------------
remarks:        Contact:
remarks:        ------------------------------------------------------
remarks:        * Routing: ncc@bahnhof.net
remarks:        * Peering: peering@bahnhof.net
remarks:        * Abuse: abuse@bahnhof.net
remarks:        ------------------------------------------------------
remarks:        Bahnhof applies selective peering
remarks:        ------------------------------------------------------
import-via:     AS6777 from AS-ANY ACCEPT ANY
export-via:     AS6777 to AS-ANY EXCEPT AS20940 announce AS-BAHNHOF
admin-c:        BD856-RIPE
tech-c:         BD856-RIPE
status:         ASSIGNED
mnt-by:         RIPE-NCC-END-MNT
mnt-by:         BAHNHOF-NCC
created:        2001-12-10T13:09:20Z
last-modified:  2019-05-20T12:26:53Z
source:         RIPE
organisation:   ORG-BIA1-RIPE
org-name:       Bahnhof AB
org-type:       LIR
address:        Fack 534 FE 756
address:        751 75
address:        Uppsala
address:        SWEDEN
phone:          +46(0)8 55577155
fax-no:         +46855577199
abuse-c:        AR13477-RIPE
admin-c:        MP18473-RIPE
admin-c:        NW1687-RIPE
admin-c:        BD856-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        BAHNHOF-NCC
mnt-ref:        RIPE-NCC-HM-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         BAHNHOF-NCC
created:        2004-04-17T12:02:22Z
last-modified:  2018-06-19T12:00:01Z
source:         RIPE # Filtered
role:           Bahnhof DBM
address:        Bahnhof AB
address:        Isafjordsgatan 32B
address:        164 40 Kista
address:        Sweden
admin-c:        BD856-RIPE
tech-c:         BD856-RIPE
nic-hdl:        BD856-RIPE
mnt-by:         BAHNHOF-NCC
created:        2004-03-01T23:41:37Z
last-modified:  2012-08-16T09:14:55Z
source:         RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.95.1 (BLAARKOP)

            

BLOCK DDOS ATTACKS ASN : 8473

DDoS-attack last 100 logs

Download DDoS Attacks Report AS8473 December 12 2019 08:34:39

IDDateCountryIPCIDRASNCategories
1.2019-12-12 01:07:15
SE
85.24.129.223 85.24.128.0/17 AS8473 Potentially Bad Traffic HTTP 1.0
2.2019-12-12 01:05:31
SE
81.170.250.118 81.170.128.0/17 AS8473 Potentially Bad Traffic HTTP 1.0
3.2019-12-12 01:00:21
SE
46.59.89.18 46.59.0.0/17 AS8473 Potentially Bad Traffic HTTP 1.0
4.2019-12-12 00:56:43
SE
37.123.172.213 37.123.128.0/18 AS8473 Potentially Bad Traffic HTTP 1.0
5.2019-12-12 00:52:34
SE
213.80.122.16 213.80.96.0/19 AS8473 Potentially Bad Traffic HTTP 1.0
6.2019-12-12 00:51:58
SE
212.116.65.244 212.116.64.0/19 AS8473 Potentially Bad Traffic HTTP 1.0
7.2019-12-12 00:36:31
SE
176.10.206.235 176.10.128.0/17 AS8473 Potentially Bad Traffic HTTP 1.0
8.2019-12-12 00:33:18
SE
158.174.103.25 158.174.0.0/16 AS8473 Potentially Bad Traffic HTTP 1.0
9.2019-12-12 00:33:02
SE
155.4.148.252 155.4.0.0/16 AS8473 Potentially Bad Traffic HTTP 1.0
10.2019-12-11 13:39:32
SE
88.151.172.243 88.151.172.0/22 AS8473 Hackers using Telnet (port 23) to attack
11.2019-11-25 11:27:04
SE
98.128.207.186 98.128.0.0/16 AS8473 Hackers using Telnet (port 23) to attack
12.2019-11-24 17:26:52
SE
79.136.32.120 79.136.0.0/17 AS8473 Hackers using SSH (port 22) to attack
13.2019-11-24 03:36:55
SE
62.63.237.141 62.63.192.0/18 AS8473 Hackers using Telnet (port 23) to attack
14.2019-11-19 19:40:28
SE
5.150.215.19 5.150.192.0/18 AS8473 Hackers using Telnet (port 23) to attack
15.2019-11-19 18:20:47
SE
178.174.180.84 178.174.128.0/17 AS8473 Hackers using Telnet (port 23) to attack
16.2019-11-13 15:37:34
SE
94.254.50.192 94.254.0.0/17 AS8473 Hackers using Telnet (port 23) to attack
17.2019-10-15 02:51:05
SE
82.145.153.146 82.145.152.0/21 AS8473 ANTI HACKER PROTECTION
18.2019-10-10 03:22:49
SE
82.196.123.154 82.196.96.0/19 AS8473 Hackers using Telnet (port 23) to attack
19.2019-10-06 01:34:03
SE
109.228.173.241 109.228.128.0/18 AS8473 Scanning For and Finding Vulnerabilities
20.2019-10-02 19:26:29
SE
212.85.94.198 212.85.64.0/19 AS8473 Scanning For and Finding Vulnerabilities