đŸ•ˇī¸ Crawler Inspector

URL Lookup

Direct Parameter Lookup

Raw Queries and Responses

1. Shard Calculation

Query:
Response:
Calculated Shard: 9 (from laksa128)

2. Crawled Status Check

Query:
Response:

3. Robots.txt Check

Query:
Response:

4. Spam/Ban Check

Query:
Response:

5. Seen Status Check

â„šī¸ Skipped - page is already crawled

📄
INDEXABLE
✅
CRAWLED
1 day ago
🤖
ROBOTS ALLOWED

Page Info Filters

FilterStatusConditionDetails
HTTP statusPASSdownload_http_code = 200HTTP 200
Age cutoffPASSdownload_stamp > now() - 6 MONTH0 months ago
History dropPASSisNull(history_drop_reason)No drop reason
Spam/banPASSfh_dont_index != 1 AND ml_spam_score = 0ml_spam_score=0
CanonicalPASSmeta_canonical IS NULL OR = '' OR = src_unparsedNot set

Page Details

PropertyValue
URLhttps://hackertarget.com/as-ip-lookup/
Last Crawled2026-04-09 14:19:54 (1 day ago)
First Indexed2018-11-30 03:18:55 (7 years ago)
HTTP Status Code200
Meta TitleAutonomous System Lookup (AS / ASN / IP) | HackerTarget.com
Meta DescriptionLookup IPv4 / IPv6 address to AS or ASN to IP ranges. Quickly find the Autonomous System owner using the online tool and the Free API.
Meta Canonicalnull
Boilerpipe Text
Check an Autonomous System Number ( ASN ) for IP prefixes ( subnets ) or lookup an IP address ( IPv4 or IPv6 ) to get details and owner of the AS . To search all ASN's belonging to an organisation, simply enter a text search string. Valid Input: 8.8.8.8 AS3333 Name (String to search) ASN Query Formats Perform ASN lookups as shown in the examples below. Enter either as a single query, a list (IP's or AS Numbers), or a comma-separated list. Lookup one or more IP's Single query or a list 9.9.9.9 8.8.8.8 Comma separated 1.1.1.1,8.8.4.4 Lookup one or more AS Numbers Single query or a list AS15169 3333 Comma separated 15169,3333 Search for AS Names Single query APPLE What is an Autonomous System (AS) The Internet is made up of Autonomous Systems , these are collections of IP routing prefixes that allow Internet connected systems to communicate with each other. Without this routing the Internet simply would not work. Use this tool to identify the registered owner of an IP range , in that the system owner that contains the IP address. Keep in mind that there is no direct correlation between the IP address location from the ASN and geolocation . Many organisations have Autonomous Systems that span continents ; if an IP address is found in an AS based in the United States, this does not necessarily mean the IP address is on a system physically located within the United States. The ASN search tool found here is for quick lookups of an IP address or Autonomous System Number (ASN). Using the Free version of the tool has a limit of 50 lookups a day; this includes use of the other IP Tools that HackerTarget.com has made available. IPv6 ASN Lookup An ASN can be made up of IPv4 and IPv6 prefixes. Our tool will show all prefixes within the ASN including IPv6 network ranges. Querying an IPv6 address with the tool will show the ASN that the address belongs to. When using the ASN search to query a list of IP addresses you are able to mix IPv4 and IPv6 addresses within the one query. ASN Bulk Lookup Non-members can use the form above to enter up to 25 IP addresses or AS numbers to query. Results can be exported to XLSX for inclusion in your security reports or other tools. To use the API see the details below, the API is only configured for single queries. ASN Lookup API This tool is built on a simple API that we have provided to the public as a Free service. To use the FREE version simply query the API and get your results. If you wish to use more than the 50 queries per day quota Remove limits with a Full Membership. . Using the ASN API is a simple matter of querying the following URL with an IP address, or ASN, appended to the "q" parameter. See below for examples using both a plain text response and a JSON response. Use curl from the command line or a scripting language such as php, python, or ruby to make the HTTP request. If you are looking up an ASN ensure the format is as shown in the second example. ASN API - Simple Text Response Response is returned as plain text and in a csv format, comma separated with double quotes surrounding the fields. curl https://api.hackertarget.com/aslookup/?q=1.1.1.1 curl -H "X-API-Key: ***apikeyhere***" https://api.hackertarget.com/aslookup/?q=AS15169 "1.1.1.1","13335","1.1.1.0/24","CLOUDFLARENET, US" Optional: Include additional details of the ASN. The extra fields include Organization from whois data, the primary domain for the autonomous system owner and a description of the organization. curl "https://api.hackertarget.com/aslookup/?q=8.8.8.8&details=true" "8.8.8.8","15169","8.8.8.0/24","GOOGLE, US","Google LLC","google.com","Google LLC is a multinational technology company operating in the internet and software industries. Their primary business purpose involves providing online services, including search, advertising, cloud computing, and hardware development." ASN API - JSON response curl "https://api.hackertarget.com/aslookup/?q=8.8.8.8&output=json" | jq { "asn": "15169", "asn_name": "GOOGLE, US", "asn_range": "8.8.8.0/24", "ip": "8.8.8.8" } Optional: Similar to the text response, we can include additional details of the ASN. The extra fields are Organization from whois data, the primary domain for the autonomous system owner and a description of the organization. curl "https://api.hackertarget.com/aslookup/?q=8.8.8.8&output=json&details=true" | jq { "asn": "15169", "asn_name": "GOOGLE, US", "asn_range": "8.8.8.0/24", "description": "Google LLC is a multinational technology company operating in the internet and software industries. Their primary business purpose involves providing online services, including search, advertising, cloud computing, and hardware development.", "domain": "google.com", "ip": "8.8.8.8", "organization": "Google LLC" } Processing Multiple Requests Using the API get ASN details for a list of IP address is easily achieved with simple scripting. From simple bash as shown below to python or powershell . while read line; do curl "https://api.hackertarget.com/aslookup/?q=$line" done IP Tags / Blocklists We have recently implemented additional IP address meta data from a well known public and open source security lists. If the IP address queried is listed in these resources it will be tagged in the table. List Name Description Link DShield A database of IP addresses reported for suspicious activities maintained by the well known SANS Institute. dshield.org AlienVault OTX An open threat exchange platform providing access to a global community-driven threat data. Alienvault Firehol Abusers Aggregated list of known comment & form spam IP addresses. Firehol Abusers abuse.ch (Feodo) Tracks and monitors Feodo Trojan botnet activities and malware. abuse.ch Spamhaus (Drop / eDrop) Maintains lists of IPs from which unsolicited bulk emails are received. Spamhaus Firehol (level 3) A blocklist aggregating various feeds to protect against the most severe attacks. Firehol 3 Tor Network Provides information on Tor nodes, focusing on anonymity and privacy online. Tor Project Other BGP Resources If you require more detail regarding the BGP routing of an Autonomous System, the Shadow Server Project has an excellent query tool available using DNS or Whois . There is also a Python module available for querying the service. Vulnerability Scans and Network Intelligence Use Cases 28 vulnerability scanners and network tools Membership
Markdown
[Skip to content](https://hackertarget.com/as-ip-lookup/#content) [![HackerTarget.com Logo](https://hackertarget.com/images/hackertarget-logo.png)](https://hackertarget.com/) ##### Menu - [SCANNERS](https://hackertarget.com/as-ip-lookup/) ###### Network - [Nmap Port Scanner](https://hackertarget.com/nmap-online-port-scanner/ "Online Nmap Port Scanner") - [Schedule Nmap Scans](https://hackertarget.com/scheduled-nmap/ "Schedule Nmap scans and get alerted on change") - [OpenVAS Scanner](https://hackertarget.com/openvas-scan/ "OpenVAS Vulnerability Scanner") - [Schedule OpenVAS Scans](https://hackertarget.com/openvas-scheduled-scanning/ "Schedule OpenVAS Scans") - [Zmap Fast Network Scan](https://hackertarget.com/zmap-fast-network-scan/ "Zmap Network Port Scanner") ###### Web - [Nikto Web Scanner](https://hackertarget.com/nikto-website-scanner/ "Nikto Web Security Scanner") - [SSL / TLS Scan](https://hackertarget.com/ssl-check/ "SSL / TLS Security Testing") - [WhatWeb / Wappalyzer](https://hackertarget.com/whatweb-scan/ "WhatWeb / Wappalyzer App Analysis") ###### CMS Apps - [WordPress Scanner](https://hackertarget.com/wordpress-security-scan/ "WordPress Security Scan") - [Joomla Security Scan](https://hackertarget.com/joomla-security-scan/ "Test Joomla Security") - [Drupal Security Scan](https://hackertarget.com/drupal-security-scan/ "Test Drupal with Security Scan") - [SharePoint Security Scan](https://hackertarget.com/sharepoint-security-scan/ "Test SharePoint with Security Scan") ###### Recon - [Domain Profiler (OSINT)](https://hackertarget.com/domain-profiler/ "Attack Surface Analysis with Domain Profiler") - [IP Information Lookup](https://hackertarget.com/server-info/ "IP Address Lookup and Analysis") - [Free DNS / IP Tools](https://hackertarget.com/ip-tools/ "DNS / IP Information Tools") - [TOOLS](https://hackertarget.com/as-ip-lookup/) ###### Network Tests - [Traceroute](https://hackertarget.com/online-traceroute/ "Online Traceroute tool with MTR") - [Test Ping](https://hackertarget.com/test-ping/ "Run an easy ping test") ###### DNS Queries - [DNS lookup](https://hackertarget.com/dns-lookup/ "Web based DNS lookup tool") - [Reverse DNS](https://hackertarget.com/reverse-dns-lookup/ "DNS reverse lookup on IP or net range") - [Find Host Records (Subdomains)](https://hackertarget.com/find-dns-host-records/ "Find Subdomains") - [Find Shared DNS Servers](https://hackertarget.com/find-shared-dns-servers/ "Reverse Lookup on Shared DNS") - [Zone Transfer](https://hackertarget.com/zone-transfer/ "Zone Transfer Online Test") - [Whois Lookup](https://hackertarget.com/whois-lookup/ "Online Whois Lookup Tool") ###### IP Address - [IP Geolocation Lookup](https://hackertarget.com/geoip-ip-location-lookup/ "GeoIP location finder") - [Reverse IP Lookup](https://hackertarget.com/reverse-ip-lookup/ "Reverse IP to get shared hosting") - [TCP Port Scan](https://hackertarget.com/tcp-port-scan/ "TCP Port Scan") - [UDP Port Scan](https://hackertarget.com/udp-port-scan/ "UDP Port Scan") - [Subnet Lookup](https://hackertarget.com/subnet-lookup-online/ "Find Subnet by CIDR or Mask") - [ASN Lookup](https://hackertarget.com/as-ip-lookup/ "Autonomous System Lookup (IP / AS)") - [Banner Grabbing (Search)](https://hackertarget.com/banner-grabbing/ "Banner Grabbing (Search)") ###### Web Tools - [HTTP Headers](https://hackertarget.com/http-header-check/ "Download HTTP Headers") - [Extract Page Links](https://hackertarget.com/extract-links/ "Extract all links from Page") - [Reverse Analytics Search](https://hackertarget.com/reverse-analytics-search/ "Reverse Analytics Search") - [RESEARCH](https://hackertarget.com/as-ip-lookup/) ###### Blog - [Tutorials & Cheat Sheets](https://hackertarget.com/research/#tutorial "Tutorials & Cheat Sheets") - [Open Source Tools](https://hackertarget.com/category/tools/ "Open Source Tools") - [Latest Posts](https://hackertarget.com/blog/ "Latest Posts") - [Research](https://hackertarget.com/research/ "Research") ###### Most Popular - [Modern Threats & the Attack Surface](https://hackertarget.com/static/modern-threats-attack-surface.pdf "Modern Threats & the Attack Surface") - [Cyber Security Training Resources](https://hackertarget.com/cyber-security-training/ "Cyber Security Training Resources") - [Cowrie Honeypot Analysis](https://hackertarget.com/cowrie-honeypot-analysis-24hrs/ "Attack sources to Cowrie Honeypot mapped in this analysis") - [Attacking WordPress](https://hackertarget.com/attacking-wordpress/ "Secure WordPress by Understanding how to attack it") - [Offensive Security Tools for Sysadmins](https://hackertarget.com/11-offensive-security-tools/ "A list of cutting edge penetration tools") - [Nessus, OpenVAS and NexPose vs Metasploitable](https://hackertarget.com/nessus-openvas-nexpose-vs-metasploitable/ "A comparison of Nessus, OpenVAS and Nexpose") - [Wireshark Tutorial and Cheat Sheet](https://hackertarget.com/wireshark-tutorial-and-cheat-sheet/ "Wireshark Tutorial & Tips to Master Network Analysis") - [ASSESSMENTS](https://hackertarget.com/as-ip-lookup/) - [Attack Surface Assessment](https://hackertarget.com/attack-surface-assessment/) - [Vulnerability Assessment](https://hackertarget.com/external-vulnerability-assessment/) - [WordPress Assessment](https://hackertarget.com/wordpress-assessment/) - [ABOUT](https://hackertarget.com/as-ip-lookup/) - [Use Cases](https://hackertarget.com/use-cases/) - [About & FAQ](https://hackertarget.com/about/) - [What is a Vulnerability Scanner?](https://hackertarget.com/vulnerability-scanner/) [PRICING](https://hackertarget.com/scan-membership/) [LOGIN](https://hackertarget.com/wp-login.php) [PRICING](https://hackertarget.com/scan-membership/) [LOG IN](https://hackertarget.com/wp-login.php) # Autonomous System Lookup (AS / ASN / IP) Check an Autonomous System Number (**ASN**) for IP prefixes ([subnets](https://hackertarget.com/subnet-lookup-online/)) or lookup an IP address (**IPv4** or **IPv6**) to get **details and owner of the AS**. To search all ASN's belonging to an organisation, simply enter a **text search** string. Valid Input: 8\.8.8.8 AS3333 Name (String to search) ###### ASN Query Formats Perform ASN lookups as shown in the examples below. Enter either as a single query, a list (IP's or AS Numbers), or a comma-separated list. Lookup one or more IP's Single query or a list 9.9.9.9 8\.8.8.8 Comma separated 1\.1.1.1,8.8.4.4 Lookup one or more AS Numbers Single query or a list AS15169 3333 Comma separated 15169,3333 Search for AS Names Single query APPLE ## What is an Autonomous System (AS) The Internet is made up of [Autonomous Systems](https://en.wikipedia.org/wiki/Autonomous_system_\(Internet\)), these are collections of IP routing prefixes that allow Internet connected systems to communicate with each other. Without this routing the Internet simply would not work. Use this tool to identify the **registered owner of an IP range**, in that the system owner that contains the IP address. Keep in mind that there is no direct correlation between the IP address location from the ASN and [geolocation](https://hackertarget.com/geoip-ip-location-lookup/ "GeoIP Lookup Tool"). Many organisations have **Autonomous Systems that span continents**; if an IP address is found in an AS based in the United States, this does not necessarily mean the IP address is on a system physically located within the United States. The **ASN search tool** found here is for quick lookups of an IP address or Autonomous System Number (ASN). Using the Free version of the tool has a limit of 50 lookups a day; this includes use of the other [IP Tools](https://hackertarget.com/ip-tools/ "IP & DNS Tools") that [HackerTarget.com](https://hackertarget.com/ "Security testing from HackerTarget.com") has made available. ## IPv6 ASN Lookup An ASN can be made up of IPv4 and IPv6 prefixes. Our tool will show all prefixes within the ASN including IPv6 network ranges. Querying an IPv6 address with the tool will show the ASN that the address belongs to. When using the ASN search to query a list of IP addresses you are able to mix IPv4 and IPv6 addresses within the one query. ## ASN Bulk Lookup Non-members can use the form above to enter **up to 25** IP addresses or AS numbers to query. Results can be **exported to XLSX** for inclusion in your security reports or other tools. ###### ASN Lookup Limits | | Free User | Member | |---|---|---| | Queries / day | 50 | 500-20'000 \# based on Plan | | Max Query Size | 25 | 20'000 | With a membership query up to 20000 IP addresses at once. A gold mine of data for security analysts, network defenders and other cyber security professionals. ![Security Cameras with overlay text 'Know your network, know the adversary, know the target'](https://hackertarget.com/wp-content/uploads/2019/09/know-your-network-tools.png) To use the API see the details below, the API is only configured for single queries. ## ASN Lookup API This tool is built on a simple API that we have provided to the public as a Free service. To use the FREE version simply query the API and get your results. If you wish to use more than the **50 queries per day** quota [Remove limits with a Full Membership.](https://hackertarget.com/scan-membership/). Using the ASN API is a simple matter of querying the following URL with an IP address, or ASN, appended to the "q" parameter. See below for examples using both a plain text response and a `JSON` response. Use `curl` from the command line or a scripting language such as php, python, or ruby to make the HTTP request. If you are looking up an ASN ensure the format is as shown in the second example. ### ASN API - Simple Text Response Response is returned as plain text and in a `csv` format, comma separated with double quotes surrounding the fields. ``` curl https://api.hackertarget.com/aslookup/?q=1.1.1.1 curl -H "X-API-Key: ***apikeyhere***" https://api.hackertarget.com/aslookup/?q=AS15169 "1.1.1.1","13335","1.1.1.0/24","CLOUDFLARENET, US" ``` **Optional:** Include additional details of the ASN. The extra fields include Organization from `whois` data, the primary domain for the autonomous system owner and a description of the organization. ``` curl "https://api.hackertarget.com/aslookup/?q=8.8.8.8&details=true" "8.8.8.8","15169","8.8.8.0/24","GOOGLE, US","Google LLC","google.com","Google LLC is a multinational technology company operating in the internet and software industries. Their primary business purpose involves providing online services, including search, advertising, cloud computing, and hardware development." ``` ### ASN API - JSON response ``` curl "https://api.hackertarget.com/aslookup/?q=8.8.8.8&output=json" | jq { "asn": "15169", "asn_name": "GOOGLE, US", "asn_range": "8.8.8.0/24", "ip": "8.8.8.8" } ``` **Optional:** Similar to the text response, we can include additional details of the ASN. The extra fields are Organization from `whois` data, the primary domain for the autonomous system owner and a description of the organization. ``` curl "https://api.hackertarget.com/aslookup/?q=8.8.8.8&output=json&details=true" | jq { "asn": "15169", "asn_name": "GOOGLE, US", "asn_range": "8.8.8.0/24", "description": "Google LLC is a multinational technology company operating in the internet and software industries. Their primary business purpose involves providing online services, including search, advertising, cloud computing, and hardware development.", "domain": "google.com", "ip": "8.8.8.8", "organization": "Google LLC" } ``` ## Processing Multiple Requests Using the API get ASN details for a list of IP address is easily achieved with simple scripting. From simple `bash` as shown below to `python` or `powershell`. ``` while read line; do curl "https://api.hackertarget.com/aslookup/?q=$line" done IP Tags / Blocklists We have recently implemented additional IP address meta data from a well known public and open source security lists. If the IP address queried is listed in these resources it will be tagged in the table. List Name Description Link DShield A database of IP addresses reported for suspicious activities maintained by the well known SANS Institute. dshield.org AlienVault OTX An open threat exchange platform providing access to a global community-driven threat data. Alienvault Firehol Abusers Aggregated list of known comment & form spam IP addresses. Firehol Abusers abuse.ch (Feodo) Tracks and monitors Feodo Trojan botnet activities and malware. abuse.ch Spamhaus (Drop / eDrop) Maintains lists of IPs from which unsolicited bulk emails are received. Spamhaus Firehol (level 3) A blocklist aggregating various feeds to protect against the most severe attacks. Firehol 3 Tor Network Provides information on Tor nodes, focusing on anonymity and privacy online. Tor Project Other BGP Resources If you require more detail regarding the BGP routing of an Autonomous System, the Shadow Server Project has an excellent query tool available using DNS or Whois. There is also a Python module available for querying the service. Trusted Tools Vulnerability Scans and Network Intelligence Use Cases Recon Options Enumerate and Discover. Know the Network IP & DNS Recon Tools Get Access 28 vulnerability scanners and network tools Membership ``` ###### ABOUT From attack surface discovery to vulnerability identification, we host tools to make the job of securing your systems easier. [Membership](https://hackertarget.com/scan-membership/) [Learn More](https://hackertarget.com/use-cases/) ###### CONNECT ###### MAILING LIST *** Copyright Š Hacker Target Pty Ltd 2024 - ACN 600827263 \| [Terms of Use](https://hackertarget.com/terms/) and [Privacy Policy](https://hackertarget.com/privacy-policy/) \| Powered by Open Source Software We use cookies to ensure that we give you the best experience on our site. If you continue to use this site we assume that you accept this. Ok
Readable Markdown
Check an Autonomous System Number (**ASN**) for IP prefixes ([subnets](https://hackertarget.com/subnet-lookup-online/)) or lookup an IP address (**IPv4** or **IPv6**) to get **details and owner of the AS**. To search all ASN's belonging to an organisation, simply enter a **text search** string. Valid Input: 8\.8.8.8 AS3333 Name (String to search) ###### ASN Query Formats Perform ASN lookups as shown in the examples below. Enter either as a single query, a list (IP's or AS Numbers), or a comma-separated list. Lookup one or more IP's Single query or a list 9.9.9.9 8\.8.8.8 Comma separated 1\.1.1.1,8.8.4.4 Lookup one or more AS Numbers Single query or a list AS15169 3333 Comma separated 15169,3333 Search for AS Names Single query APPLE ## What is an Autonomous System (AS) The Internet is made up of [Autonomous Systems](https://en.wikipedia.org/wiki/Autonomous_system_\(Internet\)), these are collections of IP routing prefixes that allow Internet connected systems to communicate with each other. Without this routing the Internet simply would not work. Use this tool to identify the **registered owner of an IP range**, in that the system owner that contains the IP address. Keep in mind that there is no direct correlation between the IP address location from the ASN and [geolocation](https://hackertarget.com/geoip-ip-location-lookup/ "GeoIP Lookup Tool"). Many organisations have **Autonomous Systems that span continents**; if an IP address is found in an AS based in the United States, this does not necessarily mean the IP address is on a system physically located within the United States. The **ASN search tool** found here is for quick lookups of an IP address or Autonomous System Number (ASN). Using the Free version of the tool has a limit of 50 lookups a day; this includes use of the other [IP Tools](https://hackertarget.com/ip-tools/ "IP & DNS Tools") that [HackerTarget.com](https://hackertarget.com/ "Security testing from HackerTarget.com") has made available. ## IPv6 ASN Lookup An ASN can be made up of IPv4 and IPv6 prefixes. Our tool will show all prefixes within the ASN including IPv6 network ranges. Querying an IPv6 address with the tool will show the ASN that the address belongs to. When using the ASN search to query a list of IP addresses you are able to mix IPv4 and IPv6 addresses within the one query. ## ASN Bulk Lookup Non-members can use the form above to enter **up to 25** IP addresses or AS numbers to query. Results can be **exported to XLSX** for inclusion in your security reports or other tools. To use the API see the details below, the API is only configured for single queries. ## ASN Lookup API This tool is built on a simple API that we have provided to the public as a Free service. To use the FREE version simply query the API and get your results. If you wish to use more than the **50 queries per day** quota [Remove limits with a Full Membership.](https://hackertarget.com/scan-membership/). Using the ASN API is a simple matter of querying the following URL with an IP address, or ASN, appended to the "q" parameter. See below for examples using both a plain text response and a `JSON` response. Use `curl` from the command line or a scripting language such as php, python, or ruby to make the HTTP request. If you are looking up an ASN ensure the format is as shown in the second example. ### ASN API - Simple Text Response Response is returned as plain text and in a `csv` format, comma separated with double quotes surrounding the fields. ``` curl https://api.hackertarget.com/aslookup/?q=1.1.1.1 curl -H "X-API-Key: ***apikeyhere***" https://api.hackertarget.com/aslookup/?q=AS15169 "1.1.1.1","13335","1.1.1.0/24","CLOUDFLARENET, US" ``` **Optional:** Include additional details of the ASN. The extra fields include Organization from `whois` data, the primary domain for the autonomous system owner and a description of the organization. ``` curl "https://api.hackertarget.com/aslookup/?q=8.8.8.8&details=true" "8.8.8.8","15169","8.8.8.0/24","GOOGLE, US","Google LLC","google.com","Google LLC is a multinational technology company operating in the internet and software industries. Their primary business purpose involves providing online services, including search, advertising, cloud computing, and hardware development." ``` ### ASN API - JSON response ``` curl "https://api.hackertarget.com/aslookup/?q=8.8.8.8&output=json" | jq { "asn": "15169", "asn_name": "GOOGLE, US", "asn_range": "8.8.8.0/24", "ip": "8.8.8.8" } ``` **Optional:** Similar to the text response, we can include additional details of the ASN. The extra fields are Organization from `whois` data, the primary domain for the autonomous system owner and a description of the organization. ``` curl "https://api.hackertarget.com/aslookup/?q=8.8.8.8&output=json&details=true" | jq { "asn": "15169", "asn_name": "GOOGLE, US", "asn_range": "8.8.8.0/24", "description": "Google LLC is a multinational technology company operating in the internet and software industries. Their primary business purpose involves providing online services, including search, advertising, cloud computing, and hardware development.", "domain": "google.com", "ip": "8.8.8.8", "organization": "Google LLC" } ``` ## Processing Multiple Requests Using the API get ASN details for a list of IP address is easily achieved with simple scripting. From simple `bash` as shown below to `python` or `powershell`. ``` while read line; do curl "https://api.hackertarget.com/aslookup/?q=$line" done IP Tags / Blocklists We have recently implemented additional IP address meta data from a well known public and open source security lists. If the IP address queried is listed in these resources it will be tagged in the table. List Name Description Link DShield A database of IP addresses reported for suspicious activities maintained by the well known SANS Institute. dshield.org AlienVault OTX An open threat exchange platform providing access to a global community-driven threat data. Alienvault Firehol Abusers Aggregated list of known comment & form spam IP addresses. Firehol Abusers abuse.ch (Feodo) Tracks and monitors Feodo Trojan botnet activities and malware. abuse.ch Spamhaus (Drop / eDrop) Maintains lists of IPs from which unsolicited bulk emails are received. Spamhaus Firehol (level 3) A blocklist aggregating various feeds to protect against the most severe attacks. Firehol 3 Tor Network Provides information on Tor nodes, focusing on anonymity and privacy online. Tor Project Other BGP Resources If you require more detail regarding the BGP routing of an Autonomous System, the Shadow Server Project has an excellent query tool available using DNS or Whois. There is also a Python module available for querying the service. Vulnerability Scans and Network Intelligence Use Cases 28 vulnerability scanners and network tools Membership ```
Shard9 (laksa)
Root Hash4751047085223308809
Unparsed URLcom,hackertarget!/as-ip-lookup/ s443