[179551] in North American Network Operators' Group
Re: 192.0.1.0/24?
daemon@ATHENA.MIT.EDU (Harley H)
Fri Apr 17 16:26:45 2015
X-Original-To: nanog@nanog.org
In-Reply-To: <CAN9qwJ8cCR9HeH-f5cr3EEEd0pPZsoKXpGzMQaKvBm4Sik0dng@mail.gmail.com>
Date: Fri, 17 Apr 2015 16:26:42 -0400
From: Harley H <bobb.harley@gmail.com>
To: Josh Luthman <josh@imaginenetworksllc.com>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org
It is mentioned in RFC 1166 as "BBN-TEST-C". I suppose it's still not
publicly allocated.
On Fri, Apr 17, 2015 at 4:18 PM, Josh Luthman <josh@imaginenetworksllc.com>
wrote:
> No one?
>
> http://whois.arin.net/rest/net/NET-192-0-0-0-0/pft
>
>
> http://www.dslreports.com/forum/r28692406-Outgoing-traffic-to-192.0.1.0-port-1000-
>
>
> Josh Luthman
> Office: 937-552-2340
> Direct: 937-552-2343
> 1100 Wayne St
> Suite 1337
> Troy, OH 45373
>
> On Fri, Apr 17, 2015 at 4:14 PM, Harley H <bobb.harley@gmail.com> wrote:
>
>> Does anyone know the status of this netblock? I've come across a malware
>> sample configured to callback to an IP in that range but it does not
>> appear
>> to be routable. Yet, it is not mentioned in RFC 5735 nor does it have any
>> whois information.
>>
>> Thanks,
>> Harley
>>
>
>