AS8708


Whois ASN lookup : (WHOIS AS8708)

% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf
% Note: this output has been filtered.
%       To receive output for a database update, use the '-B' flag.
% Information related to 'AS8525 - AS8769'
as-block:       AS8525 - AS8769
descr:          RIPE NCC ASN block
remarks:        These AS Numbers are assigned to network operators in the RIPE NCC service region.
mnt-by:         RIPE-NCC-HM-MNT
created:        2018-11-22T15:27:23Z
last-modified:  2018-11-22T15:27:23Z
source:         RIPE
% Information related to 'AS8708'
% Abuse contact for 'AS8708' is 'abuse@rcs-rds.ro'
aut-num:        AS8708
as-name:        RCS-RDS
descr:          73-75 Dr. Staicovici
descr:          Bucharest, ROMANIA
org:            ORG-RA18-RIPE
admin-c:        GEPU1-RIPE
tech-c:         RDS-RIPE
remarks:        ------------------------------------------------
remarks:        RDS filters out inbound prefixes longer than /24
remarks:        MEDs are overwritten unless special arrangements have been made
remarks:
remarks:        Communities
remarks:        ------------------------------------------------
remarks:        8708:80   Set local preference to 80 inside RDS
remarks:        8708:120  Set local preference to 120 inside RDS
remarks:
remarks:        8708:1001 Prepend 1*8708 when advertising to transit providers and international peers
remarks:        8708:1002 Prepend 2*8708 when advertising to transit providers and international peers
remarks:        8708:1003 Prepend 3*8708 when advertising to transit providers and international peers
remarks:        8708:1009 Do not advertise to transit providers
remarks:
remarks:        8708:2001 Prepend 1*8708 when announcing to Bucharest peers
remarks:        8708:2002 Prepend 2*8708 when announcing to Bucharest peers
remarks:        8708:2003 Prepend 3*8708 when announcing to Bucharest peers
remarks:        8708:2009 Do not advertise to Bucharest peers
remarks:
remarks:        8708:2101 Prepend 1*8708 when announcing to Budapest peers
remarks:        8708:2102 Prepend 2*8708 when announcing to Budapest peers
remarks:        8708:2103 Prepend 3*8708 when announcing to Budapest peers
remarks:        8708:2109 Do not advertise to Budapest peers
remarks:
remarks:        8708:2201 Prepend 1*8708 when announcing to Frankfurt peers
remarks:        8708:2202 Prepend 2*8708 when announcing to Frankfurt peers
remarks:        8708:2203 Prepend 3*8708 when announcing to Frankfurt peers
remarks:        8708:2209 Do not advertise to Frankfurt peers
remarks:
remarks:        8708:2301 Prepend 1*8708 when announcing to Amsterdam peers
remarks:        8708:2302 Prepend 2*8708 when announcing to Amsterdam peers
remarks:        8708:2303 Prepend 3*8708 when announcing to Amsterdam peers
remarks:        8708:2309 Do not advertise to Amsterdam peers
remarks:
remarks:        8708:2401 Prepend 1*8708 when announcing to London peers
remarks:        8708:2402 Prepend 2*8708 when announcing to London peers
remarks:        8708:2403 Prepend 3*8708 when announcing to London peers
remarks:        8708:2409 Do not advertise to London peers
remarks:
remarks:        8708:2501 Prepend 1*8708 when announcing to Sofia peers
remarks:        8708:2502 Prepend 2*8708 when announcing to Sofia peers
remarks:        8708:2503 Prepend 3*8708 when announcing to Sofia peers
remarks:        8708:2509 Do not advertise to Sofia peers
remarks:
remarks:        8708:100 RDS aggregates and BGP customers
remarks:        8708:200 Bucharest peers
remarks:        8708:301 Budapest peers
remarks:        8708:302 Frankfurt peers
remarks:        8708:303 Amsterdam peers
remarks:        8708:304 London peers
remarks:        8708:305 Sofia peers
remarks:
remarks:        8708:9999 Blackhole (discard) traffic (for filtering purposes, only /32 blocks)
remarks:
remarks:        Local preference
remarks:        --------------------------------------------------------
remarks:        Customer prefer  120
remarks:        Customer default  110
remarks:        Customer backup  80
remarks:        Bucharest peers  75
remarks:        International peers  [50-70]
remarks:        Transit providers  [30-40]
remarks:
remarks:        BGP customers requests: http://clienti.rcs-rds.ro/net/bgp/
remarks:        Peering requests: peering@rcs-rds.ro
remarks:
remarks:        --------------------------------------------------------
remarks:        Call center (24x7) +40 31 400 4401
remarks:        NOC (24x7): nmc@rcs-rds.ro
remarks:        Peering issues: peering@rcs-rds.ro
remarks:        --------------------------------------------------------
remarks:
export:         to AS5507 announce AS-RDSNET
status:         ASSIGNED
mnt-by:         RIPE-NCC-END-MNT
mnt-by:         AS8708-MNT
created:        2002-08-27T06:24:01Z
last-modified:  2018-08-22T13:22:43Z
source:         RIPE # Filtered
organisation:   ORG-RA18-RIPE
org-name:       RCS & RDS SA
org-type:       LIR
address:        Forum 2000 Building
                75 Dr. Staicovici
address:        050557
address:        Bucharest
address:        ROMANIA
phone:          +40 314 004 444
phone:          +40 314 004 440
fax-no:         +40 314 004 441
admin-c:        GEPU1-RIPE
admin-c:        MANU5-RIPE
abuse-c:        RDS-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        AS8708-MNT
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         AS8708-MNT
created:        2004-04-17T11:49:55Z
last-modified:  2018-10-16T09:44:12Z
source:         RIPE # Filtered
role:           RCS & RDS NOC
address:        71-75 Dr. Staicovici
address:        Bucharest / ROMANIA
phone:          +40 21 30 10 888
fax-no:         +40 21 30 10 892
abuse-mailbox:  abuse@rcs-rds.ro
admin-c:        GEPU1-RIPE
tech-c:         GEPU1-RIPE
nic-hdl:        RDS-RIPE
mnt-by:         RDS-MNT
remarks:        +------------------------------------------------------------+
remarks:        | Please use ABUSE@RCS-RDS.RO for complaints and only after  |
remarks:        | you have tried contacting directly our customers according |
remarks:        | to the details registered in RIPE database.                |
remarks:        +------------------------------------------------------------+
remarks:        | DO NOT CALL, FAX, OR CONTACT US BY ANY OTHER MEANS EXCEPT  |
remarks:        |                    abuse@rcs-rds.ro                        |
remarks:        +------------------------------------------------------------+
created:        1970-01-01T00:00:00Z
last-modified:  2019-08-21T07:16:42Z
source:         RIPE # Filtered
person:         Dan Epure
address:        RCS & RDS S.A
address:        Forum 2000 Building 71-75 Dr. Staicovici
address:        Bucharest, ROMANIA
phone:          +40 31 400 4240
fax-no:         +40 31 400 4207
nic-hdl:        GEPU1-RIPE
mnt-by:         AS8708-MNT
created:        2002-06-17T10:14:28Z
last-modified:  2013-05-10T23:02:58Z
source:         RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.95.1 (WAGYU)

            

BLOCK DDOS ATTACKS ASN : 8708

DDoS-attack last 100 logs

Download DDoS Attacks Report AS8708 December 12 2019 08:35:36

IDDateCountryIPCIDRASNCategories
1.2019-12-12 01:07:24
RO
86.125.112.230 86.124.0.0/15 AS8708 Potentially Bad Traffic HTTP 1.0
2.2019-12-12 01:07:24
RO
86.123.188.209 86.120.0.0/14 AS8708 Potentially Bad Traffic HTTP 1.0
3.2019-12-12 01:06:19
RO
82.77.113.102 82.77.0.0/16 AS8708 Potentially Bad Traffic HTTP 1.0
4.2019-12-12 01:06:18
RO
82.76.96.23 82.76.0.0/17 AS8708 Potentially Bad Traffic HTTP 1.0
5.2019-12-12 01:05:48
RO
81.196.41.75 81.196.0.0/18 AS8708 Potentially Bad Traffic HTTP 1.0
6.2019-12-12 01:04:58
RO
79.115.40.3 79.112.0.0/13 AS8708 Potentially Bad Traffic HTTP 1.0
7.2019-12-12 01:01:07
RO
5.2.237.21 5.2.128.0/17 AS8708 Potentially Bad Traffic HTTP 1.0
8.2019-12-12 01:00:32
RO
5.14.62.149 5.12.0.0/14 AS8708 Potentially Bad Traffic HTTP 1.0
9.2019-12-12 00:42:13
RO
188.27.137.163 188.27.0.0/16 AS8708 Potentially Bad Traffic HTTP 1.0
10.2019-12-12 00:42:13
RO
188.26.5.254 188.26.0.0/17 AS8708 Potentially Bad Traffic HTTP 1.0
11.2019-12-12 00:42:12
RO
188.24.203.179 188.24.0.0/15 AS8708 Potentially Bad Traffic HTTP 1.0
12.2019-11-19 18:39:55
RO
86.126.139.143 86.126.0.0/16 AS8708 Hackers using Telnet (port 23) to attack
13.2019-11-18 14:50:43
RO
84.232.212.156 84.232.128.0/17 AS8708 Hackers using Telnet (port 23) to attack
14.2019-11-18 05:42:21
RO
81.196.183.36 81.196.128.0/18 AS8708 Hackers using Telnet (port 23) to attack
15.2019-11-18 01:40:39
RO
82.76.175.78 82.76.128.0/18 AS8708 RECIDIVE
16.2019-11-17 11:56:42
RO
82.76.218.165 82.76.192.0/19 AS8708 Hackers using Telnet (port 23) to attack
17.2019-11-17 08:37:20
RO
82.79.148.13 82.79.128.0/17 AS8708 Hackers using Telnet (port 23) to attack
18.2019-11-17 04:17:34
RO
81.181.140.151 81.181.136.0/21 AS8708 Hackers using Telnet (port 23) to attack
19.2019-11-16 21:36:37
RO
82.78.138.150 82.78.0.0/16 AS8708 Hackers using Telnet (port 23) to attack
20.2019-11-15 08:20:38
RO
188.26.156.245 188.26.128.0/18 AS8708 ANTI HACKER PROTECTION
21.2019-11-14 15:07:13
RO
81.196.226.79 81.196.224.0/19 AS8708 Hackers using Telnet (port 23) to attack
22.2019-11-11 17:13:58
RO
81.196.97.221 81.196.96.0/22 AS8708 Hackers using Telnet (port 23) to attack
23.2019-11-10 13:38:10
RO
62.231.106.1 62.231.64.0/18 AS8708 Hackers using Telnet (port 23) to attack
24.2019-11-09 08:59:42
RO
86.127.9.61 86.127.0.0/19 AS8708 Hackers using Telnet (port 23) to attack
25.2019-11-09 05:07:16
RO
213.157.191.193 213.157.190.0/23 AS8708 Hackers using Telnet (port 23) to attack
26.2019-11-06 23:50:13
RO
188.26.224.41 188.26.224.0/19 AS8708 Hackers using Telnet (port 23) to attack
27.2019-11-06 12:15:29
RO
86.127.145.182 86.127.128.0/17 AS8708 Hackers using Telnet (port 23) to attack
28.2019-11-05 02:35:14
RO
86.127.112.229 86.127.64.0/18 AS8708 Hackers using Telnet (port 23) to attack
29.2019-11-01 19:19:05
RO
82.79.70.226 82.79.64.0/19 AS8708 SERVER Error 403 Forbidden
30.2019-10-31 22:53:09
RO
213.157.187.185 213.157.184.0/22 AS8708 Hackers using Telnet (port 23) to attack
31.2019-10-30 21:02:04
RO
82.137.34.79 82.137.32.0/19 AS8708 Hackers using Telnet (port 23) to attack
32.2019-10-29 05:10:54
RO
212.54.115.0 212.54.112.0/21 AS8708 ANTI HACKER PROTECTION
33.2019-10-27 03:05:42
RO
82.79.44.54 82.79.44.0/22 AS8708 ANTI HACKER PROTECTION
34.2019-10-25 21:38:31
RO
82.79.115.161 82.79.112.0/22 AS8708 Hackers using Telnet (port 23) to attack
35.2019-10-08 22:32:31
RO
82.79.104.204 82.79.104.0/21 AS8708 Hackers using Telnet (port 23) to attack
36.2019-10-08 21:07:27
RO
82.137.2.70 82.137.0.0/21 AS8708 Hackers using Telnet (port 23) to attack
37.2019-10-08 08:38:23
RO
82.137.26.42 82.137.16.0/20 AS8708 Hackers using Telnet (port 23) to attack
38.2019-10-06 03:13:49
RO
81.196.207.251 81.196.207.0/24 AS8708 Scanning For and Finding Vulnerabilities
39.2019-10-05 23:47:33
RO
81.196.66.238 81.196.64.0/21 AS8708 Scanning For and Finding Vulnerabilities
40.2019-10-03 19:07:56
RO
86.127.32.104 86.127.32.0/20 AS8708 Scanning For and Finding Vulnerabilities
41.2019-10-03 01:15:40
RO
82.79.35.16 82.79.32.0/21 AS8708 Scanning For and Finding Vulnerabilities