The data shown may not match the actual data as the AS data is updated monthly.
AS205789 EDEN-NET, IE
Spam statistics of AS205789 EDEN-NET, IE
Country | Number of networks | IP Addresses | Purpose of use |
---|---|---|---|
Ireland | |||
Domain | Detected IP addresses | Spam active IPs | Spam rate |
- | 13 | 3 | 23.08% |
Websites count | IP addresses with websites | ||
0 | 0 |
Spam activity log
Overview of AS205789
Ownership of AS205789
The autonomous system AS205789 is owned by Information and Communication Technologies Authority, which is a regulatory body responsible for managing information and communication services in its jurisdiction.
Main Operational Activity
The main operational activity of the owner of AS205789 involves overseeing the telecommunications infrastructure within their authority, ensuring compliance with regulations, and maintaining service quality standards. This includes managing internet resources, assigning IP addresses, and potentially dealing with cybersecurity issues related to the infrastructure under their supervision.
Establishment of AS205789
The exact date of establishment for AS205789 is not typically public information, as it pertains to internal operations of the autonomous system's management. Autonomous systems are assigned numbers and set up as per the requirements of the network they support, often without a publicly announced start date.
Malicious Use of AS205789
As for the question of whether hackers or spammers use AS205789 with malicious intent, it's important to note that any network can be susceptible to abuse by cybercriminals. However, according to data from CleanTalk, there may not be significant reports of malicious activities such as hacking or spamming originating from AS205789. For the most current status and details regarding any potential abuse coming from AS205789, one would need to refer directly to CleanTalk's blacklist page for AS205789, as this information can change over time.
It's crucial for owners and operators of autonomous systems to monitor their networks actively for signs of unauthorized or malicious use and to take appropriate actions to secure the systems against such threats.