public inbox for location@lists.ipfire.org
 help / color / mirror / Atom feed
From: "Peter Müller" <peter.mueller@ipfire.org>
To: location@lists.ipfire.org
Subject: [PATCH] override-{a1,other,xd}: Regular batch of various overrides
Date: Fri, 10 Dec 2021 08:07:09 +0100	[thread overview]
Message-ID: <87e75b89-d6b2-3fcc-4181-dd760347348c@ipfire.org> (raw)

[-- Attachment #1: Type: text/plain, Size: 14361 bytes --]

Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
---
 overrides/override-a1.txt    |  48 ----------------
 overrides/override-other.txt | 104 ++++++++++++++++++++++-------------
 overrides/override-xd.txt    |  50 +++++++++++++++++
 3 files changed, 117 insertions(+), 85 deletions(-)

diff --git a/overrides/override-a1.txt b/overrides/override-a1.txt
index 5734c08..5fce4d9 100644
--- a/overrides/override-a1.txt
+++ b/overrides/override-a1.txt
@@ -82,11 +82,6 @@ descr:				Asiamax Ltd. VPN
 remarks:			VPN provider
 is-anonymous-proxy:		yes
 
-aut-num:			AS39770
-descr:				1337TEAM LIMITED / eliteteam[.]to
-remarks:			Owned by an offshore letterbox company, suspected rogue ISP
-is-anonymous-proxy:		yes
-
 aut-num:			AS43233
 descr:				VPS 404 Ltd.
 remarks:			VPN provider [high confidence, but not proofed] located in ES
@@ -114,12 +109,6 @@ descr:				BeeVPN ApS
 remarks:			VPN provider
 is-anonymous-proxy:		yes
 
-aut-num:			AS51381
-descr:				1337TEAM LIMITED / eliteteam[.]to
-remarks:			Owned by an offshore letterbox company, suspected rogue ISP
-is-anonymous-proxy:		yes
-country:			RU
-
 aut-num:			AS51446
 descr:				SP Argaev Artem Sergeyevich / Foundation Respect My Privacy
 remarks:			VPN provider [high confidence, but not proofed]
@@ -142,17 +131,6 @@ remarks:			Tor relay and VPN provider, traces back to SE [high confidence, but n
 is-anonymous-proxy:		yes
 country:			SE
 
-aut-num:			AS55303
-descr:				Eagle Sky Co., Lt[d ?]
-remarks:			Autonomous System registered to offshore company, abuse contact is a freemail address, address says "0 Market Square, P.O. Box 364, Belize", seems to trace to some location in AP vicinity
-is-anonymous-proxy:		yes
-country:			AP
-
-aut-num:			AS56873
-descr:				1337TEAM LIMITED / eliteteam[.]to
-remarks:			Owned by an offshore letterbox company, suspected rogue ISP
-is-anonymous-proxy:		yes
-
 aut-num:			AS58110
 descr:				IP Volume Ltd. / Epik
 remarks:			Shady Autonomous System registered to letterbox company, possibly copycat operation of Epik registrar, many prefixes announced refer to "anonymize" infrastructure
@@ -168,11 +146,6 @@ descr:				Geotelco Limited
 remarks:			VPN provider [high confidence, but not proofed]
 is-anonymous-proxy:		yes
 
-aut-num:			AS60424
-descr:				1337TEAM LIMITED / eliteteam[.]to
-remarks:			Owned by an offshore letterbox company, suspected rogue ISP
-is-anonymous-proxy:		yes
-
 aut-num:			AS60729
 descr:				Zwiebelfreunde e.V.
 remarks:			Tor relay provider
@@ -214,12 +187,6 @@ descr:				HERN Labs AB
 remarks:			VPN provider [high confidence, but not proofed]
 is-anonymous-proxy:		yes
 
-aut-num:			AS206819
-descr:				ANSON NETWORK LIMITED
-remarks:			Autonomous System registered to UK letterbox company, traces back through shady ISPs to TW
-is-anonymous-proxy:		yes
-country:			TW
-
 aut-num:			AS207688
 descr:				DataHome S.A.
 remarks:			VPN provider located in BR [high confidence, but not proofed]
@@ -1430,11 +1397,6 @@ descr:				Tredinvest LLC / bestwest[.]host
 remarks:			VPN provider or offering similar services [high confidence, but not proofed]
 is-anonymous-proxy:		yes
 
-net:				185.215.113.0/24
-descr:				1337TEAM LIMITED / eliteteam[.]to
-remarks:			Owned by an offshore letterbox company, suspected rogue ISP
-is-anonymous-proxy:		yes
-
 net:				185.220.100.0/22
 descr:				Zwiebelfreunde e.V. / F3 Netze e.V. / The Calyx Institute
 remarks:			Tor relay provider
@@ -1692,11 +1654,6 @@ descr:				LogicWeb Inc. / BGRVPN / Private Internet Access / VPNetworks / Cookie
 remarks:			Hijacked AfriNIC IP chunk mostly used by VPN providers
 is-anonymous-proxy:		yes
 
-net:				196.61.192.0/20
-descr:				Inspiring Networks LTD
-remarks:			hijacked (?) IP network owned by an offshore company [high confidence, but not proofed]
-is-anonymous-proxy:		yes
-
 net:				197.221.161.0/24
 descr:				VPNClientPublics
 remarks:			VPN provider
@@ -2031,8 +1988,3 @@ net:				2c0f:f930::/32
 descr:				Cyberdyne S.A.
 remarks:			Tor relay provider
 is-anonymous-proxy:		yes
-
-net:				2a10:9700::/29
-descr:				1337TEAM LIMITED / eliteteam[.]to
-remarks:			Owned by an offshore letterbox company, suspected rogue ISP
-is-anonymous-proxy:		yes
diff --git a/overrides/override-other.txt b/overrides/override-other.txt
index 7d76534..ca9dbad 100644
--- a/overrides/override-other.txt
+++ b/overrides/override-other.txt
@@ -85,6 +85,11 @@ descr:		Tianhai InfoTech
 remarks:	IP hijacker located somewhere in AP, massively tampers with RIR data
 country:	AP
 
+aut-num:	AS5408
+descr:		Greek Research and Technology Network (GRNET) S.A.
+remarks:	... located in GR
+country:	GR
+
 aut-num:	AS6134
 descr:		XNNET LLC
 remarks:	traces back to an unknown oversea location (HK?), seems to tamper with RIR data
@@ -363,6 +368,11 @@ descr:		CNSERVERS LLC
 remarks:	Shady ISP located in US, tampers with RIR data
 country:	US
 
+aut-num:	AS41047
+descr:		MLAB Open Source Community
+remarks:	traces back to DE
+country:	DE
+
 aut-num:	AS41466
 descr:		Treidinvest LLC
 remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
@@ -408,6 +418,11 @@ descr:		DGN TEKNOLOJI A.S.
 remarks:	ISP located in TR, but many RIR data for announced prefixes contain garbage
 country:	TR
 
+aut-num:	AS43092
+descr:		Kirin Communication Limited
+remarks:	tampers with RIR data, traces back to AP area
+country:	AP
+
 aut-num:	AS43310
 descr:		TOV "LVS"
 remarks:	ISP located in UA, but some RIR data for announced prefixes contain garbage
@@ -498,11 +513,6 @@ descr:		LLC Baxet
 remarks:	tampers with RIR data, traces back to RU
 country:	RU
 
-aut-num:	AS49447
-descr:		Nice IT Services Group Inc.
-remarks:	Rogue ISP located in CH, but some RIR data for announced prefixes contain garbage
-country:	CH
-
 aut-num:	AS49466
 descr:		KLAYER LLC
 remarks:	part of the "Asline" IP hijacking gang, traces back to AP region
@@ -748,6 +758,11 @@ descr:		NForce Entertainment BV
 remarks:	currently hijacks a single stolen /20 AfriNIC IPv4 net, hosted in NL
 country:	NL
 
+aut-num:	AS131685
+descr:		Sun Network (Hong Kong) Limited
+remarks:	ISP and/or IP hijacker located somewhere in AP
+country:	AP
+
 aut-num:	AS132369
 descr:		XIANGAO INTERNATIONAL TELECOMMUNICATION LIMITED
 remarks:	ISP located in HK, tampers with RIR data
@@ -758,9 +773,14 @@ descr:		POWER LINE DATACENTER
 remarks:	ISP and/or IP hijacker located in HK, tampers with RIR data
 country:	HK
 
+aut-num:	AS133201
+descr:		ABCDE GROUP COMPANY LIMITED
+remarks:	ISP and/or IP hijacker located somewhere in AP
+country:	AP
+
 aut-num:	AS133441
 descr:		CloudITIDC Global
-remarks:	ISP and/or IP hijacker located somehwere in AP
+remarks:	ISP and/or IP hijacker located somewhere in AP
 country:	AP
 
 aut-num:	AS133752
@@ -810,7 +830,7 @@ country:	AP
 
 aut-num:	AS136800
 descr:		ICIDC NETWORK
-remarks:	IP hijacker located somehwere in AP, suspected to be part of the "Asline" IP hijacking gang, tampers with RIR data
+remarks:	IP hijacker located somewhere in AP, suspected to be part of the "Asline" IP hijacking gang, tampers with RIR data
 country:	AP
 
 aut-num:	AS136933
@@ -923,6 +943,11 @@ descr:		Incomparable(HK)Network Co., Limited
 remarks:	ISP and/or IP hijacker located in AP area, tampers with RIR data
 country:	AP
 
+aut-num:	AS141746
+descr:		Orenji Server
+remarks:	IP hijacker located somewhere in AP area (JP?)
+country:	AP
+
 aut-num:	AS196682
 descr:		FLP Kochenov Aleksej Vladislavovich
 remarks:	ISP located in UA, but RIR data for announced prefixes all say EU
@@ -933,11 +958,6 @@ descr:		ALEXHOST SRL
 remarks:	ISP located in MD, majority of RIR data for announced prefixes contain garbage, we cannot trust this network
 country:	MD
 
-aut-num:	AS200391
-descr:		KREZ 999 EOOD
-remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
-country:	BG
-
 aut-num:	AS200699
 descr:		Datashield, Inc.
 remarks:	fake offshore location (SC), traces back to NL
@@ -1028,6 +1048,11 @@ descr:		Genius Guard / Genius Security Ltd.
 remarks:	another shady customer of "DDoS Guard Ltd.", probably located in RU
 country:	RU
 
+aut-num:	AS206819
+descr:		ANSON NETWORK LIMITED
+remarks:	Autonomous System registered to UK letterbox company, traces back through shady ISPs to TW
+country:	TW
+
 aut-num:	AS206898
 descr:		Server Hosting Pty Ltd
 remarks:	ISP located in NL, but some RIR data for announced prefixes contain garbage
@@ -1063,11 +1088,6 @@ descr:		Altrosky Technology Ltd.
 remarks:	fake offshore location (SC), traces back to CZ and NL
 country:	EU
 
-aut-num:	AS207812
-descr:		DM AUTO EOOD
-remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
-country:	BG
-
 aut-num:	AS208046
 descr:		Maximilian Kutzner trading as HostSlick
 remarks:	traces back to NL, but some RIR data for announced prefixes contain garbage
@@ -1248,6 +1268,11 @@ descr:		Sun Network Company Limited
 remarks:	IP hijacker, traces back to AP region
 country:	AP
 
+aut-num:	AS328608
+descr:		Africa on Cloud
+remarks:	... for some reason, I doubt a _real_ African ISP would announce solely hijacked prefixes
+country:	AP
+
 aut-num:	AS328703
 descr:		Seven Network Inc.
 remarks:	traces back to ZA
@@ -1313,25 +1338,25 @@ descr:		Wolverine Trading, LLC
 remarks:	IP hijacker located in US, tampers with RIR data
 country:	US
 
-net:        5.1.68.0/24
-descr:      GaiacomLC
-remarks:    routed to DE, inaccurate RIR data
-country:    DE
+net:		5.1.68.0/24
+descr:		GaiacomLC
+remarks:	routed to DE, inaccurate RIR data
+country:	DE
 
-net:        5.1.69.0/24
-descr:      GaiacomLC
-remarks:    routed to DE, inaccurate RIR data
-country:    DE
+net:		5.1.69.0/24
+descr:		GaiacomLC
+remarks:	routed to DE, inaccurate RIR data
+country:	DE
 
-net:        5.1.83.0/24
-descr:      GaiacomLC
-remarks:    routed to DE, inaccurate RIR data
-country:    DE
+net:		5.1.83.0/24
+descr:		GaiacomLC
+remarks:	routed to DE, inaccurate RIR data
+country:	DE
 
-net:        5.1.88.0/24
-descr:      GaiacomLC
-remarks:    routed to DE, inaccurate RIR data
-country:    DE
+net:		5.1.88.0/24
+descr:		GaiacomLC
+remarks:	routed to DE, inaccurate RIR data
+country:	DE
 
 net:		5.252.32.0/22
 descr:		StormWall s.r.o.
@@ -1413,6 +1438,11 @@ descr:		Golden Internet LLC
 remarks:	fake location (KP), WHOIS contact points to RU
 country:   	RU
 
+net:		91.90.120.0/24
+descr:		M247 LTD, Greenland Infrastructure
+remarks:	... traces back to CA
+country:   	CA
+
 net:		91.149.194.0/24
 descr:		IP Volume Ltd. / Epik
 remarks:	fake location (CH), traces back to SE
@@ -1488,10 +1518,10 @@ descr:		Intelcom Group Ltd
 remarks:	fake offshore location (SC), traces back to RU
 country:   	RU
 
-net:        185.140.204.0/22
-descr:      Hornetsecurity GmbH
-remarks:    all suballocations are used in DE, but are assigned to US
-country:    DE
+net:		185.140.204.0/22
+descr:		Hornetsecurity GmbH
+remarks:	all suballocations are used in DE, but are assigned to US
+country:	DE
 
 net:		185.175.93.0/24
 descr:		Perfect Hosting Solutions
diff --git a/overrides/override-xd.txt b/overrides/override-xd.txt
index 7df6188..29057d9 100644
--- a/overrides/override-xd.txt
+++ b/overrides/override-xd.txt
@@ -26,24 +26,57 @@
 # Please keep this file sorted.
 #
 
+aut-num:	AS39770
+descr:		1337TEAM LIMITED / eliteteam[.]to
+remarks:	Owned by an offshore letterbox company, suspected rogue ISP
+drop:		yes
+
 aut-num:	AS48090
 descr:		PPTECHNOLOGY LIMITED
 remarks:	bulletproof ISP (related to AS204655) located in NL
 country:	NL
 drop:		yes
 
+aut-num:	AS49447
+descr:		Nice IT Services Group Inc.
+remarks:	Rogue ISP located in CH, but some RIR data for announced prefixes contain garbage
+country:	CH
+drop:		yes
+
+aut-num:	AS51381
+descr:		1337TEAM LIMITED / eliteteam[.]to
+remarks:	Owned by an offshore letterbox company, suspected rogue ISP
+country:	RU
+drop:		yes
+
+aut-num:	AS55303
+descr:		Eagle Sky Co., Lt[d ?]
+remarks:	Autonomous System registered to offshore company, abuse contact is a freemail address, address says "0 Market Square, P.O. Box 364, Belize", seems to trace to some location in AP vicinity
+country:	AP
+drop:		yes
+
 aut-num:	AS56611
 descr:		REBA Communications BV
 remarks:	bulletproof ISP (related to AS202425) located in NL
 country:	NL
 drop:		yes
 
+aut-num:	AS56873
+descr:		1337TEAM LIMITED / eliteteam[.]to
+remarks:	Owned by an offshore letterbox company, suspected rogue ISP
+drop:		yes
+
 aut-num:	AS57717
 descr:		FiberXpress BV
 remarks:	bulletproof ISP (related to AS202425) located in NL
 country:	NL
 drop:		yes
 
+aut-num:	AS60424
+descr:		1337TEAM LIMITED / eliteteam[.]to
+remarks:	Owned by an offshore letterbox company, suspected rogue ISP
+drop:		yes
+
 aut-num:	AS62068
 descr:		SpectraIP B.V.
 remarks:	bulletproof ISP (linked to AS202425 et al.) located in NL
@@ -62,6 +95,12 @@ remarks:	bulletproof ISP (linked to AS202425 et al.) located in NL
 country:	NL
 drop:		yes
 
+aut-num:	AS200391
+descr:		KREZ 999 EOOD
+remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
+country:	BG
+drop:		yes
+
 aut-num:	AS202425
 descr:		IP Volume Inc.
 remarks:	bulletproof ISP (aka: AS29073 / Ecatel Ltd. / Quasi Networks Ltd.) located in NL
@@ -74,6 +113,12 @@ remarks:	bulletproof ISP and IP hijacker, related to AS202425 and AS62355, trace
 country:	NL
 drop:		yes
 
+aut-num:	AS207812
+descr:		DM AUTO EOOD
+remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
+country:	BG
+drop:		yes
+
 aut-num:	AS204655
 descr:		Novogara Ltd.
 remarks:	bulletproof ISP (strongly linked to AS202425) located in NL
@@ -85,3 +130,8 @@ descr:		Datapacket Maroc SARL
 remarks:	bulletproof ISP (strongly linked to AS202425) located in NL
 country:	NL
 drop:		yes
+
+net:		2a10:9700::/29
+descr:		1337TEAM LIMITED / eliteteam[.]to
+remarks:	Owned by an offshore letterbox company, suspected rogue ISP
+drop:		yes
-- 
2.26.2

             reply	other threads:[~2021-12-10  7:07 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-12-10  7:07 Peter Müller [this message]
2021-12-10  9:00 ` Michael Tremer
2021-12-10  9:36   ` Peter Müller
2022-01-09 12:48 Peter Müller
2022-01-16 11:19 Peter Müller

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=87e75b89-d6b2-3fcc-4181-dd760347348c@ipfire.org \
    --to=peter.mueller@ipfire.org \
    --cc=location@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox