[159164] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: really facebook?

daemon@ATHENA.MIT.EDU (joel jaeggli)
Thu Dec 27 12:26:24 2012

Date: Thu, 27 Dec 2012 09:25:58 -0800
From: joel jaeggli <joelja@bogus.com>
To: mike <mike@mtcc.com>
In-Reply-To: <50DC7FA1.6080504@mtcc.com>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 12/27/12 9:04 AM, mike wrote:
>
> I reloaded their app (yes, I know... sew me) and got this warning:
>
> IP address:     2600:100f:b119:c6bc:bd6f:fabb:ff30:2a3d
> Estimated location:     Livingston, NJ, US
That's a rather good estimation of where many verizon wireless customers 
appear to come from.

> Which seems pretty bizarre. I'm guessing they must be getting it from
> whois or something based on the address block for Verizon. The reverse
> map according to
>
> host 2600:100f:b119:c6bc:bd6f:fabb:ff30:2a3d
one assumes they have a an geoip database like they have for ipv4
>
> comes back with NXDOMAIN. I suppose the real issue here is with Vz
> and why they don't have v6 reverse maps, but it did throw me thinking 
> that
> somebody in New Jersey might have hacked my account.
Well could certainly wildcard their responses, not sure that dynamic dns 
updates would be either scalable or appropiate.
>
> Mike
>



home help back first fref pref prev next nref lref last post