ORG-AG58-RIPE admin-c: AG10224-RIPE tech-c: AG10224-RIPE status: ASSIGNED PI mnt-by: RIPE-NCC-END-MNT mnt-lower: RIPE-NCC-END-MNT mnt-by: GORBY-MNT mnt-routes: GORBY-MNT mnt-domains: GORBY-MNT source: RIPE # Filtered: 126.96.36.199 - 188.8.131.52 netname: GORBY-VPN-NET descr: Alexandr Gorbunov remarks: MyVPN service country: UA org:
AAG76-RIPE tech-c: AAG76-RIPE mnt-ref: GORBY-MNT abuse-mailbox: email@example.com mnt-by: GORBY-MNT source: RIPE # Filtered: ORG-AG58-RIPE org-name: Alexandr Anatolyevich Gorbunov remarks: MyVPN service org-type: OTHER address: Moskva, Yasniy proezd 14a, kv. 73 phone: +79025392311 admin-c:
person: Alex Gorbunov address: Moskva, Yasniy proezd 14a, kv. 73 phone: +79025392311 GORBY-MNT source: RIPE # Filtered: AG10224-RIPE mnt-by:
% Information related to '184.108.40.206/24AS51303'
Google says of AS51303:
Diagnostic page for AS51303
What happened when Google visited sites hosted on this network?
Of the 23 site(s) we tested on this network over the past 90 days, none served content that resulted in malicious software being downloaded and installed without user consent.
The last time Google tested a site on this network was on 2010-10-27, and the last time suspicious content was found was on 2010-10-27.
Has this network hosted sites acting as intermediaries for further malware distribution?
Over the past 90 days, we found 5 site(s) on this network, including, for example, semikemi.info/, surogatesm.info/, meinisp.info/, that appeared to function as intermediaries for the infection of 16 other site(s) including, for example, vlasti.net/, inmobiliaria-habitat.es/, inoxmarti.com/.
Has this network hosted sites that have distributed malware?
Yes, this network has hosted sites that have distributed malicious software in the past 90 days. We found 15 site(s), including, for example, semikemi.info/, terikmask.info/, qstrokes.info/, that infected 176 other site(s), including, for example, montealea.com/, ideal.es/, crosswordscrucigramas.com/.
You can see a list of domains and MyWOT reputations here [csv], the current list of domains that I can see is below: