Try the new whois search
To assist you with debugging problems, this whois query was received from IP Address
% APNIC found the following authoritative answer from: whois.ripe.net
% This is the RIPE Database query service. % The objects are in RPSL format. % % The RIPE Database is subject to Terms and Conditions. % See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered. % To receive output for a database update, use the "-B" flag.
% Information related to '109.187.128.0 - 109.187.255.255'
% Abuse contact for '109.187.128.0 - 109.187.255.255' is 'abuse@bashtel.ru'
inetnum: 109.187.128.0 - 109.187.255.255 netname: DSL-POOL descr: Bashinformsvyaz Company, RUMS, DSL POOL country: RU admin-c: SSM18-RIPE tech-c: AAR21-RIPE status: ASSIGNED PA mnt-by: RUMS-MNT mnt-lower: RUMS-MNT mnt-routes: RUMS-MNT created: 2010-01-29T08:22:22Z last-modified: 2017-12-06T09:29:02Z source: RIPE
person: Alexei A. Roumyantsev address: JSC Bashinformsvyaz address: Lenin street, 30, RUMS address: RUSSIA, 450000, Ufa city phone: +7 3472 001198 nic-hdl: AAR21-RIPE created: 2003-03-21T08:02:23Z last-modified: 2016-04-06T06:07:53Z mnt-by: RIPE-NCC-LOCKED-MNT source: RIPE # Filtered
person: Stanislav S. Makarov address: PJSC "Bashinformsvyaz" address: Lenin street, 30 address: RUSSIA, 450000, Ufa city phone: +7 3472 215999 nic-hdl: SSM18-RIPE created: 2004-11-22T07:45:45Z last-modified: 2016-09-15T09:49:23Z source: RIPE # Filtered mnt-by: RUMS-MNT mnt-by: BASHNET-MNT
% Information related to '109.187.192.0/18AS12389'
route: 109.187.192.0/18 descr: RU, Ufa, Rostelecom - Bashinformsvyaz origin: AS12389 mnt-by: BASHNET-MNT mnt-by: RUMS-MNT created: 2021-06-01T05:12:31Z last-modified: 2021-06-01T05:12:31Z source: RIPE
% This query was served by the RIPE Database Query Service version 1.114 (ABERDEEN)
1st level less specific
-i
Inverse attributes
All less specific
-T
Object types
1st level more specific
All more specific
Query hints
Include "AS" in front of an AS number.Example: AS4808
Include "-t" (template only) or "-v" (template and description) in front of an object name to view the templateExample: -t inetnum
Exact match only
Associated reverse domain
For more information see: