Try the new whois search
To assist you with debugging problems, this whois query was received from IP Address
% APNIC found the following authoritative answer from: whois.ripe.net
% This is the RIPE Database query service. % The objects are in RPSL format. % % The RIPE Database is subject to Terms and Conditions. % See https://apps.db.ripe.net/docs/HTML-Terms-And-Conditions
% Note: this output has been filtered. % To receive output for a database update, use the "-B" flag.
% Information related to '79.133.178.0 - 79.133.178.255'
% Abuse contact for '79.133.178.0 - 79.133.178.255' is 'abuse@on-telecom.ru'
inetnum: 79.133.178.0 - 79.133.178.255 netname: SYSTEM-NET descr: Fatmetal Project country: RU org: ORG-ONTE1-RIPE admin-c: ALNT-RIPE tech-c: ALNT-RIPE status: ASSIGNED PA mnt-by: MNT-EMERALD mnt-routes: ONTELECOM-MNT mnt-domains: ONTELECOM-MNT created: 2021-12-06T06:49:12Z last-modified: 2024-03-21T11:09:39Z source: RIPE geoloc: 54.628102 39.728634
organisation: ORG-ONTE1-RIPE org-name: OnTelecom LLC country: RU org-type: Other address: 390023, Russian Federation, Ryazan, Yablochkova 5 building 35A abuse-c: AR24984-RIPE mnt-ref: ONTELECOM-MNT mnt-by: ONTELECOM-MNT created: 2014-05-30T06:44:13Z last-modified: 2022-12-01T17:22:03Z source: RIPE # Filtered
person: NOC Emerald address: Jeseniova 1151/55, Prague, Czech Republic mnt-by: MNT-EMERALD phone: +420226020395 nic-hdl: ALNT-RIPE created: 2009-11-25T11:01:13Z last-modified: 2023-02-16T12:52:15Z source: RIPE # Filtered
% Information related to '79.133.178.0/24AS60042'
route: 79.133.178.0/24 origin: AS60042 mnt-by: MNT-EMERALD mnt-by: ONTELECOM-MNT mnt-by: MNT-EMERALD mnt-by: ONTELECOM-MNT created: 2021-12-06T06:49:45Z last-modified: 2021-12-06T06:50:08Z source: RIPE
% This query was served by the RIPE Database Query Service version 1.112 (ABERDEEN)
1st level less specific
-i
Inverse attributes
All less specific
-T
Object types
1st level more specific
All more specific
Query hints
Include "AS" in front of an AS number.Example: AS4808
Include "-t" (template only) or "-v" (template and description) in front of an object name to view the templateExample: -t inetnum
Exact match only
Associated reverse domain
For more information see: