AS60683 Geo Teknoloji A.S
IP Address Ranges
Netblock | Number of IPs | |
---|---|---|
31.210.35.0/24 | 256 | |
31.210.40.0/24 | 256 | |
31.210.45.0/24 | 256 | |
31.210.47.0/24 | 256 | |
77.92.131.0/24 | 256 | |
78.135.88.0/24 | 256 | |
78.135.103.0/24 | 256 | |
188.132.163.0/24 | 256 | |
188.132.166.0/24 | 256 | |
188.132.206.0/24 | 256 | |
188.132.223.0/24 | 256 | |
188.132.250.0/23 | 512 | |
212.68.58.0/24 | 256 |
Netblock | Number of IPs | |
---|---|---|
2a10:9440::/48 | 1,208,925,819,614,629,174,706,176 | |
2a10:9440:2::/47 | 2,417,851,639,229,258,349,412,352 | |
2a10:9440:4::/46 | 4,835,703,278,458,516,698,824,704 | |
2a10:9440:8::/45 | 9,671,406,556,917,033,397,649,408 | |
2a10:9440:10::/44 | 19,342,813,113,834,066,795,298,816 | |
2a10:9440:20::/43 | 38,685,626,227,668,133,590,597,632 | |
2a10:9440:40::/42 | 77,371,252,455,336,267,181,195,264 | |
2a10:9440:80::/41 | 154,742,504,910,672,534,362,390,528 | |
2a10:9440:100::/40 | 309,485,009,821,345,068,724,781,056 | |
2a10:9440:200::/39 | 618,970,019,642,690,137,449,562,112 | |
2a10:9440:400::/38 | 1,237,940,039,285,380,274,899,124,224 | |
2a10:9440:800::/37 | 2,475,880,078,570,760,549,798,248,448 | |
2a10:9440:1000::/36 | 4,951,760,157,141,521,099,596,496,896 | |
2a10:9440:2000::/35 | 9,903,520,314,283,042,199,192,993,792 | |
2a10:9440:4000::/34 | 19,807,040,628,566,084,398,385,987,584 | |
2a10:9440:8000::/33 | 39,614,081,257,132,168,796,771,975,168 | |
2a10:9441::/32 | 79,228,162,514,264,337,593,543,950,336 | |
2a10:9442::/31 | 158,456,325,028,528,675,187,087,900,672 | |
2a10:9444::/30 | 316,912,650,057,057,350,374,175,801,344 |
Upstreams
There are no upstreams for this ASN.
Downstreams
There are no downstreams for this ASN.
What is an Autonomous System (AS)?
An Autonomous System (AS) is a collection of connected networks that operate under a common administrative domain and share routing policies. Each AS is identified by a unique Autonomous System Number (ASN), which is used to exchange routing information with other ASs. AS can control how traffic flows through networks and then filter out unwanted traffic.