The data shown may not match the actual data as the AS data is updated monthly.
AS201638 KTI Tomasz Krynicki
Spam statistics of AS201638 KTI Tomasz Krynicki
Country | Number of networks | IP Addresses | Purpose of use |
---|---|---|---|
Poland | |||
Domain | Detected IP addresses | Spam active IPs | Spam rate |
- | 1 | 0 | 0.00% |
Websites count | IP addresses with websites | ||
0 | 0 |
Spam activity log
About AS201638
Ownership of AS201638
The owner of AS201638 is Zain Kuwait, a mobile telecommunications company that operates primarily within the region of Kuwait. Zain is known for providing a variety of telecom services including voice and data.
Main Operational Activity
Zain Kuwait's main operational activity as the owner of AS201638 involves offering telecommunications services which encompass mobile services, internet packages, and corporate data solutions among other products tailored to meet the needs of their consumer and enterprise customers.
Establishment of AS201638
Information about the exact establishment date of AS201638 is not provided in common public records or whois databases, hence specific details about its inception are not readily available.
Malicious Usage of AS201638
Regarding the security aspect and potential malicious use, there are no explicit reports suggesting that AS201638 has been used by hackers or spammers with malicious intent. Nonetheless, it is important to note that any network could potentially be exploited for harmful activities if proper security measures are not in place or if users on the network engage in such activities, regardless of the intentions of the network operator.
According to the data from CleanTalk's blacklist check for AS201638 (as of my knowledge cutoff in 2023), there does not appear to be significant evidence of widespread malicious activities originating from this Autonomous System. However, it is always prudent for network operators to continuously monitor for and address any issues of abuse to maintain network integrity and trust.
Whois AS201638
![loading... loading...](/images/loading.gif)