ASN information of 175.139.83.180

Query

175.139.83.180

ASN Information

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '175.139.0.0 - 175.139.255.255'

% Abuse contact for '175.139.0.0 - 175.139.255.255' is '[email protected]'

inetnum:        175.139.0.0 - 175.139.255.255
netname:        ADSL-STREAMYX
descr:          TMNST
country:        MY
admin-c:        EAK2-AP
tech-c:         EAK2-AP
abuse-c:        AM2355-AP
status:         ALLOCATED NON-PORTABLE
notify:         [email protected]
mnt-by:         MAINT-MY-WEBE
mnt-lower:      MAINT-MY-WEBE
mnt-routes:     MAINT-MY-WEBE
mnt-irt:        IRT-MY-WEBE
last-modified:  2023-08-17T04:29:23Z
source:         APNIC

irt:            IRT-MY-WEBE
address:        Menara TM, Jalan Pantai Baharu,
address:        59100 Kuala Lumpur, Wilayah Persekutuan Kuala Lumpur
address:        Malaysia
phone:          +601110001000
e-mail:         [email protected]
abuse-mailbox:  [email protected]
admin-c:        ICO1-AP
tech-c:         ICO1-AP
auth:           # Filtered
remarks:        TM AS4788 had recently installed RPKI validator and will be dropping the ????????????Invalid???????????? route by November 2023. Please update your ROA accordingly.
remarks:        [email protected] was validated on 2025-05-28
mnt-by:         MAINT-MY-WEBE
last-modified:  2025-05-28T14:49:19Z
source:         APNIC

role:           ABUSE MYWEBE
country:        ZZ
address:        Menara TM, Jalan Pantai Baharu,
address:        59100 Kuala Lumpur, Wilayah Persekutuan Kuala Lumpur
address:        Malaysia
phone:          +601110001000
e-mail:         [email protected]
admin-c:        ICO1-AP
tech-c:         ICO1-AP
nic-hdl:        AM2355-AP
remarks:        Generated from irt object IRT-MY-WEBE
remarks:        [email protected] was validated on 2025-05-28
abuse-mailbox:  [email protected]
mnt-by:         APNIC-ABUSE
last-modified:  2025-05-28T14:49:31Z
source:         APNIC

person:         EMRAN AHMED KAMAL
nic-hdl:        EAK2-AP
e-mail:         [email protected]
address:        Telekom Malaysia
address:        Jalan Pantai Baru, Kuala Lumpur.
phone:          +6-03-83185434
fax-no:         +6-03-22402126
country:        MY
mnt-by:         TM-NET-AP
abuse-mailbox:  [email protected]
last-modified:  2014-02-11T04:58:41Z
source:         APNIC

% Information related to '175.139.80.0/21AS4788'

route:          175.139.80.0/21
origin:         AS4788
descr:          Telekom Malaysia Berhad
                Core IP & NGN
                17th Floor, TM Annexe 1
                Jalan Pantai Baru
mnt-by:         MAINT-MY-WEBE
last-modified:  2023-08-17T04:24:03Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-US2)


ASN Lookup


Quickly lookup updated information about specific Autonomous System Number (ASN), Organization, CIDR, or registered IP addresses (IPv4 and IPv6).

An ASN (Autonomous System Number) Lookup tool is a service that allows you to find information about an Autonomous System (AS), which is a collection of networks that operate under a single administrative domain. An AS is identified by a unique ASN, which is assigned by the Internet Assigned Numbers Authority (IANA). The ASN Lookup tool allows you to find information about an AS, including its name, country, and internet service provider (ISP).

How to Use an ASN Lookup Tool?

Enter the ASN number.

You can find the ASN number by using other networking tools, such as traceroute, or by searching for the organization name or ISP associated with the AS.

Run the Lookup tool: Click the "Check" button to run the ASN Lookup tool. The tool will scan its database and provide information about the AS associated with the ASN number.

Review the results: The ASN Lookup tool will provide a report that lists the name of the AS, the country where it is located, and the ISP that manages the AS. It may also provide additional information, such as the IP address ranges associated with the AS.

Use the information: Once you've looked up the ASN, you can use the information for a variety of purposes, such as troubleshooting network issues, identifying potential security threats, or optimizing network performance.