[196149] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: BGP hijack: 64.68.207.0/24 from as133955

daemon@ATHENA.MIT.EDU (Clinton Work)
Fri Oct 6 08:17:54 2017

X-Original-To: nanog@nanog.org
From: Clinton Work <clinton@scripty.com>
To: nanog@nanog.org
In-Reply-To: <59D3BB42.9070107@easydns.com>
Date: Tue, 03 Oct 2017 17:29:14 -0600
Errors-To: nanog-bounces@nanog.org

TELUS AS852 has three address blocks hijacked by AS133955 as well.   We
have not been able to get in contact with AS24155.  It looks like they
are buying transit from PCCW AS3491 and Taiwan Internet Gateway AS9505. 

68.182.255.0/24
74.49.255.0/24
96.1.255.0/24


On Tue, Oct 3, 2017, at 10:30 AM, Mark Jeftovic wrote:
> 
> as133955 is broadcasting bogus BGP announcement for our netblock
> 64.68.207.0/24
> 
> It's in China, and we're trying to contact as24155 but they are also in
> China and we're just emailing their whois record address.
> 
> If you're nearby and in a position to block/dampen that might be helpful.
> 
> Thx
> 
> - mark
> 
> -- 
> Mark Jeftovic <markjr@easydns.com>
> Founder & CEO, easyDNS Technologies Inc.
> http://www.easyDNS.com
> 
> 

home help back first fref pref prev next nref lref last post