[139958] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Ongoing ASN and IP Space Hijacks: Update

daemon@ATHENA.MIT.EDU (David Conrad)
Mon Apr 25 18:58:43 2011

From: David Conrad <drc@virtualized.org>
In-Reply-To: <18699.1303770159@tristatelogic.com>
Date: Mon, 25 Apr 2011 12:58:33 -1000
To: "Ronald F. Guilmette" <rfg@tristatelogic.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Ron,

On Apr 25, 2011, at 12:22 PM, Ronald F. Guilmette wrote:
> 199.88.32.0/20 - NET-199-88-32-0-1
> 199.196.192.0/19 - NET-199-196-192-0-1
> 200.107.216.0/21 - GT-AGSA1-LACNIC
> 204.147.240.0/20 - NET-204-147-240-0-1
>=20
> As I previously mentioned, these are being used by high-end snowshoe =
spamming
> operations.
>=20
> Simple question:  Does anybody give a damn?

I suspect a lot of folks do, however giving a damn and having the =
ability to do anything about it may not coincide.

Where can people go to gain more understanding of the methodologies you =
use to establish probable hijacks?

Regards,
-drc



home help back first fref pref prev next nref lref last post