APNIC - Query the APNIC Whois Database

To assist you with debugging problems, this whois query was received from IP Address

% APNIC found the following authoritative answer from: whois.ripe.net
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://apps.db.ripe.net/docs/HTML-Terms-And-Conditions
% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.
% Information related to 'AS47385 - AS50218'
as-block:       AS47385 - AS50218
descr:          RIPE NCC ASN block
remarks:        These AS Numbers are assigned to network operators in the RIPE NCC service region.
mnt-by:         RIPE-NCC-HM-MNT
created:        2024-05-01T14:06:55Z
last-modified:  2024-05-01T14:06:55Z
source:         RIPE
% Information related to 'AS49170'
% Abuse contact for 'AS49170' is 'abuse@mtu.ru'
aut-num:        AS49170
as-name:        MKSBALASHIHI-AS
org:            ORG-ZM1-RIPE
import:         from AS8359 accept ANY
export:         to AS8359 announce AS49170
import:         from AS25513 accept ANY
export:         to AS25513 announce AS49170
admin-c:        MTU1-RIPE
tech-c:         MTU1-RIPE
status:         ASSIGNED
mnt-by:         RIPE-NCC-END-MNT
mnt-by:         MTU-NOC
created:        2009-04-22T09:36:32Z
last-modified:  2021-09-03T12:45:02Z
source:         RIPE
organisation:   ORG-ZM1-RIPE
org-name:       MTS PJSC
country:        RU
org-type:       LIR
address:        Smolenskaya-Sennaya sq., 27 bld 2
address:        119121
address:        Moscow
address:        RUSSIAN FEDERATION
phone:          +74957213499
fax-no:         +74992318129
admin-c:        LAP-RIPE
admin-c:        TABY-RIPE
admin-c:        LMUR-RIPE
admin-c:        YUF-RIPE
admin-c:        RPS-RIPE
abuse-c:        MAB8359-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        MTU-NOC
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         MTU-NOC
created:        2004-04-17T11:55:44Z
last-modified:  2024-01-16T14:42:44Z
source:         RIPE # Filtered
role:           MTS backbone NOC
address:        PJSC MTS / former CJSC Comstar-Direct
address:        Petrovsky blvd 12, bldg 3
address:        P.O. BOX 4711 127051
address:        Moscow, Russia
remarks:        **************************************
remarks:        Contact addresses:
remarks:        routing & peering noc@mtu.ru
remarks:        spam & security abuse@mtu.ru
remarks:        mail postmaster@mtu.ru
remarks:        ddos reports ddos-reports@mtu.ru
remarks:        **************************************
phone:          +7 495 721-34-99
fax-no:         +7 495 956-07-07
admin-c:        EDA-RIPE
admin-c:        RPS-RIPE
tech-c:         EDA-RIPE
nic-hdl:        MTU1-RIPE
mnt-by:         MTU-NOC
created:        2002-10-18T13:29:19Z
last-modified:  2022-04-08T13:50:05Z
source:         RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.111 (SHETLAND)
  • Bold: Object type.
  • Underlined: Primary key(s).
  • Hyperlinks: Searchable Attributes.
4 records found for 'AS49170'
Search for  
IP address lookups Miscellaneous queries
-l

1st level less specific

Returns smallest IP address range that includes the queried IP address or range

-i

Inverse attributes

Returns objects with an attribute that matches the query text and attribute type
-L

All less specific

Return all larger IP address ranges that include the queried IP address or range

-T

Object types

Results that match the query and are of a specified object type
-m

1st level more specific

Returns first level more specific address ranges within the boundaries of the queried IP address range
-M

All more specific

Returns all more specific address ranges within the boundaries of the queried IP address range

Query hints

  • Include "AS" in front of an AS number.
    Example: AS4808

  • Include "-t" (template only) or "-v" (template and description) in front of an object name to view the template
    Example: -t inetnum

-x

Exact match only

Returns address range that exactly matches the queried IP address range
-d

Associated reverse domain

Returns IP address range and associated reverse domain

For more information see: