Try the new whois search
To assist you with debugging problems, this whois query was received from IP Address
% APNIC found the following authoritative answer from: whois.ripe.net
% This is the RIPE Database query service. % The objects are in RPSL format. % % The RIPE Database is subject to Terms and Conditions. % See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered. % To receive output for a database update, use the "-B" flag.
% Information related to '62.133.176.0 - 62.133.179.255'
% Abuse contact for '62.133.176.0 - 62.133.179.255' is 'abuse@bashtel.ru'
inetnum: 62.133.176.0 - 62.133.179.255 netname: ru-bashtel descr: Bashinformsvyaz company descr: Russia, Bashkortostan Republic, Ufa, descr: 450000, Lenina street, 32/ country: RU admin-c: ORD5-RIPE tech-c: SSM18-RIPE status: ASSIGNED PA mnt-by: RUMS-MNT mnt-lower: RUMS-MNT mnt-routes: RUMS-MNT created: 2003-03-05T13:45:51Z last-modified: 2019-05-07T12:42:19Z source: RIPE
person: Oleg R. Delmukhametov address: 30, Lenin str., Ufa, Russian Federation, 450077 phone: +7 347 2215475 nic-hdl: ORD5-RIPE mnt-by: RUMS-MNT created: 2014-01-31T10:32:35Z last-modified: 2018-07-30T13:10:39Z source: RIPE # Filtered
person: Stanislav S. Makarov address: PJSC "Bashinformsvyaz" address: Lenin street, 30 address: RUSSIA, 450000, Ufa city phone: +7 3472 215999 nic-hdl: SSM18-RIPE created: 2004-11-22T07:45:45Z last-modified: 2016-09-15T09:49:23Z source: RIPE # Filtered mnt-by: RUMS-MNT mnt-by: BASHNET-MNT
% Information related to '62.133.176.0/21AS12389'
route: 62.133.176.0/21 descr: RU, Ufa, Rostelecom - Bashinformsvyaz origin: AS12389 mnt-by: BASHNET-MNT mnt-by: RUMS-MNT created: 2021-06-01T05:20:27Z last-modified: 2021-06-01T05:20:27Z source: RIPE
% This query was served by the RIPE Database Query Service version 1.114 (DEXTER)
1st level less specific
-i
Inverse attributes
All less specific
-T
Object types
1st level more specific
All more specific
Query hints
Include "AS" in front of an AS number.Example: AS4808
Include "-t" (template only) or "-v" (template and description) in front of an object name to view the templateExample: -t inetnum
Exact match only
Associated reverse domain
For more information see: