The data shown may not match the actual data as the AS data is updated monthly.
AS55458 Thomson Reuters
Spam statistics of AS55458 Thomson Reuters
Country | Number of networks | IP Addresses | Purpose of use |
---|---|---|---|
United States | |||
Domain | Detected IP addresses | Spam active IPs | Spam rate |
- | 256 | 0 | 0.00% |
Websites count | IP addresses with websites | ||
0 | 0 |
Spam activity log
About AS55458
Owner of AS55458
The owner of Autonomous System (AS) AS55458 is Smartfren Telecom in Indonesia.
Main Operational Activity
The main operational activity of Smartfren Telecom is providing wireless telecommunications services including 4G LTE and VoLTE (Voice over LTE) services to its customers in Indonesia. The company operates as a mobile network operator with an extensive range of services catering to both individual consumers and business clients.
Establishment of AS55458
There's no specific public record readily available detailing the exact establishment date of AS55458 within this context. Typically, information regarding the establishment dates of AS numbers is not as commonly documented as that of companies or services.
Malicious Use of AS55458
As for the involvement in malicious activities such as hacking or spamming, there have been instances recorded on platforms tracking such behavior. According to CleanTalk, a service monitoring blacklists, AS55458 has been reported for activity that could be associated with spamming or other forms of unwanted behaviors. However, it should be noted that the presence of an AS number in such a database does not necessarily mean that the entire network is malicious. It could be due to a small number of devices or users within the network engaging in such activities without the knowledge or consent of the network administrator.
Details from CleanTalk
On CleanTalk's website, they maintain a record of various IP addresses that have engaged in potentially harmful or unwanted online behavior. As per their data, AS55458 may have had certain IP addresses listed for such activities. This information can be used by network administrators to help mitigate risks and address vulnerabilities within their networks.