The data shown may not match the actual data as the AS data is updated monthly.
AS15288 NOKIA-NA, US
Spam statistics of AS15288 NOKIA-NA, US
Country | Number of networks | IP Addresses | Purpose of use |
---|---|---|---|
United States | |||
Domain | Detected IP addresses | Spam active IPs | Spam rate |
- | 1 | 0 | 0.00% |
Websites count | IP addresses with websites | ||
0 | 0 |
Spam activity log
About AS15288
Owner of AS15288
The owner of Autonomous System (AS) AS15288 is the United States Department of Defense Network Information Center (DoD NIC).
Main Operational Activity of AS15288's Owner
The main operational activity of the DoD NIC, as the owner of AS15288, is to provide information technology services and support for the U.S. Department of Defense (DoD). This includes managing a range of IP resources, ensuring network security, and facilitating communications within various branches of the military and other associated entities.
Establishment of AS15288
There is no specific public record available about the exact date when AS15288 was established. Typically, the establishment dates of autonomous systems are not widely publicized, especially when it concerns government or military networks where information may be sensitive or classified.
Malicious Use of AS15288
As with any large network, there is a potential for abuse by hackers or spammers. However, given that AS15288 is managed by the Department of Defense, one would expect stringent security measures to be in place to minimize such activities. According to CleanTalk.org, a service providing data on spam and hacking activities, there might be isolated incidents of malicious intent. Specific details about these incidents, including their nature and frequency, can be found at their website, but it should be noted that such information could be prone to change over time and might require verification for accuracy.
Details from CleanTalk.org
At the time of writing, and per the information provided on CleanTalk.org, there might be records of suspicious activities originating from AS15288, which could include spamming or other forms of network abuse. However, it's important to consider the context and scale of such reports, as the activities of individual users do not necessarily reflect the practices or intentions of the organization managing the AS.
Whois AS15288
![loading... loading...](/images/loading.gif)