public inbox for location@lists.ipfire.org
 help / color / mirror / Atom feed
* [PATCH] override-{a1,other,xd}: Regular batch of various overrides
@ 2022-01-09 12:48 Peter Müller
  0 siblings, 0 replies; 5+ messages in thread
From: Peter Müller @ 2022-01-09 12:48 UTC (permalink / raw)
  To: location

[-- Attachment #1: Type: text/plain, Size: 13121 bytes --]

Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
---
 overrides/override-a1.txt    | 37 +-------------
 overrides/override-other.txt | 95 ++++++++++++++++++++++++++++--------
 overrides/override-xd.txt    | 34 ++++++++++++-
 3 files changed, 108 insertions(+), 58 deletions(-)

diff --git a/overrides/override-a1.txt b/overrides/override-a1.txt
index 5b620fe..43e0174 100644
--- a/overrides/override-a1.txt
+++ b/overrides/override-a1.txt
@@ -729,21 +729,6 @@ descr:				GZ Systems Limited / PureVPN
 remarks:			VPN provider
 is-anonymous-proxy:		yes
 
-net:				62.73.7.0/24
-descr:				Privax LTD / AVAST s.r.o.
-remarks:			VPN provider
-is-anonymous-proxy:		yes
-
-net:				62.73.8.0/23
-descr:				Privax LTD / AVAST s.r.o.
-remarks:			VPN provider
-is-anonymous-proxy:		yes
-
-net:				62.73.10.0/24
-descr:				Privax LTD / AVAST s.r.o.
-remarks:			VPN provider
-is-anonymous-proxy:		yes
-
 net:				62.149.160.0/20
 descr:				Aruba VPN
 remarks:			VPN provider
@@ -835,7 +820,7 @@ is-anonymous-proxy:		yes
 
 net:				80.254.74.0/20
 descr:				Monzoon / SwissVPN
-remarks:			VPN provider [high confidence, but not proofed]
+remarks:			VPN provider
 is-anonymous-proxy:		yes
 
 net:				82.199.130.0/24
@@ -1135,11 +1120,6 @@ remarks:			VPN provider [high confidence, but not proofed]
 is-anonymous-proxy:		yes
 country:			FR
 
-net:				156.0.200.0/22
-descr:				xTom Limited
-remarks:			... network operator thinks messing with countries and having an offshore company for it is funny :-/
-is-anonymous-proxy:		yes
-
 net:				159.197.128.0/17
 descr:				Nationwide Computer Systems, Inc. trading as IPTrading.com
 remarks:			Hijacked and loaded with proxies, see also: https://krebsonsecurity.com/2019/08/the-rise-of-bulletproof-residential-networks/
@@ -1236,16 +1216,6 @@ descr:				Private Internet Access
 remarks:			VPN provider
 is-anonymous-proxy:		yes
 
-net:				173.239.252.0/24
-descr:				OculusProxies
-remarks:			VPN provider [high confidence, but not proofed]
-is-anonymous-proxy:		yes
-
-net:				173.239.252.0/24
-descr:				BGRVPN
-remarks:			VPN provider
-is-anonymous-proxy:		yes
-
 net:				173.244.32.0/19
 descr:				LogicWeb Inc. / BGRVPN / Private Internet Access / VPNetworks / CookieProxy / etc. pp.
 remarks:			large IP chunk mostly used by VPN providers
@@ -1505,11 +1475,6 @@ descr:				GZ Systems Limited / PureVPN
 remarks:			VPN provider
 is-anonymous-proxy:		yes
 
-net:				190.115.16.0/20
-descr:				DDOS-GUARD CORP.
-remarks:			IP chunk owned by an offshore company, abuse contact is a freemail address, address says "1/2 Miles Northern Highway, Belize"
-is-anonymous-proxy:		yes
-
 net:				191.96.1.0/23
 descr:				GZ Systems Limited / PureVPN
 remarks:			VPN provider
diff --git a/overrides/override-other.txt b/overrides/override-other.txt
index 56bb12e..89ad8e0 100644
--- a/overrides/override-other.txt
+++ b/overrides/override-other.txt
@@ -92,8 +92,8 @@ country:	GR
 
 aut-num:	AS6134
 descr:		XNNET LLC
-remarks:	traces back to an unknown oversea location (HK?), seems to tamper with RIR data
-country:	AP
+remarks:	traces back to HK, seems to tamper with RIR data
+country:	HK
 
 aut-num:	AS6412
 name:		Zajil International Telecom Company
@@ -144,6 +144,11 @@ descr:		Nexril
 remarks:	ISP located in US, but some RIR data for announced prefixes contain garbage
 country:	US
 
+aut-num:	AS15611
+descr:		Iranian Research Organization for Science & Technology
+remarks:	ISP located in IR, but some RIR data for announced prefixes contain garbage
+country:	IR
+
 aut-num:	AS15828
 descr:		Blue Diamond Network Co., Ltd.
 remarks:	Shady ISP located somewhere in AP
@@ -268,6 +273,11 @@ descr:		ASLINE LIMITED
 remarks:	... located in HK
 country:	HK
 
+aut-num:	AS34837
+descr:		Institute for Research in Fundamental Sciences
+remarks:	ISP located in IR, but some RIR data for announced prefixes contain garbage
+country:	IR
+
 aut-num:	AS34985
 descr:		Kirin Communication Limited
 remarks:	ISP located in JP, but some RIR data for announced prefixes contain garbage
@@ -468,6 +478,11 @@ descr:		KeonWoo PARK
 remarks:	claims US for its prefixes announced, but traces back to KR
 country:	KR
 
+aut-num:	AS45250
+descr:		Vocom International Telecommunications AP Area
+remarks:	ISP located in AP area, some RIR data for announced prefixes contain garbage
+country:	AP
+
 aut-num:	AS45671
 descr:		Servers Australia Pty. Ltd.
 remarks:	ISP located in AU, but some RIR data for announced prefixes contain garbage
@@ -578,11 +593,6 @@ descr:		WhiteHat Inc.
 remarks:	tampers with RIR data
 country:	EU
 
-aut-num:	AS54600
-descr:		PEG TECH INC
-remarks:	ISP and/or IP hijacker located in US this time, tampers with RIR data
-country:	US
-
 aut-num:	AS55330
 descr:		AFGHANTELECOM GOVERNMENT COMMUNICATION NETWORK
 remarks:	For some reason, some "Airbus Defence and Space AS" prefixes are announced by this one...
@@ -658,6 +668,21 @@ descr:		INNETRA PC
 remarks:	another shady customer of "DDoS Guard Ltd.", jurisdiction is probably RU, but traceroutes dead-end somewhere else in EU
 country:	EU
 
+aut-num:	AS58879
+descr:		Shanghai Anchang Network Security Technology Co.,Ltd.
+remarks:	... network infrastructure is believed to be located in HK, has some links to ASLINE hijacking gang
+country:   	HK
+
+aut-num:	AS59043
+descr:		Guangzhou LanDong Information technology co., LTD
+remarks:	... network infrastructure is believed to be located in HK
+country:   	HK
+
+aut-num:	AS59117
+descr:		DREAM CLOUD INNOVATION PTE. LTD.
+remarks:	Claims to be located in JP or SG, but is likely located in HK
+country:	HK
+
 aut-num:	AS59253
 descr:		Leaseweb Asia Pacific pte. ltd.
 remarks:	ISP located in SG, but some RIR data for announced prefixes contain garbage
@@ -773,6 +798,11 @@ descr:		XIANGAO INTERNATIONAL TELECOMMUNICATION LIMITED
 remarks:	ISP located in HK, tampers with RIR data
 country:	HK
 
+aut-num:	AS132813
+descr:		HK AISI CLOUD COMPUTING LIMITED
+remarks:	ISP and/or IP hijacker located in HK, tampers with RIR data
+country:	HK
+
 aut-num:	AS132839
 descr:		POWER LINE DATACENTER
 remarks:	ISP and/or IP hijacker located in HK, tampers with RIR data
@@ -799,7 +829,7 @@ remarks:	IP hijacker located somewhere in AP area, suspected to be part of the "
 country:	AP
 
 aut-num:	AS134196
-descr:		Cloudie Limited
+descr:		ANYUN INTERNET TECHNOLOGY (HK) CO.,LIMITED
 remarks:	part of the "Asline" IP hijacking gang, tampers with RIR data, traces back to AP region (HK? CN?)
 country:	AP
 
@@ -818,6 +848,11 @@ descr:		Sky Digital Co., Ltd.
 remarks:	IP hijacker located in TW, suspected to be part of the "Asline" IP hijacking gang, tampers with RIR data
 country:	TW
 
+aut-num:	AS135097
+descr:		LUOGELANG (FRANCE) LIMITED
+remarks:	Shady ISP located in HK, RIR data for announced prefixes contain garbage
+country:	HK
+
 aut-num:	AS136274
 descr:		Cloud Servers Pvt Ltd
 remarks:	ISP located in NL, all RIR data for announced prefixes contain garbage
@@ -828,11 +863,26 @@ descr:		Optix Pakistan (Pvt.) Limited
 remarks:	ISP located in PK, some RIR data for announced prefixes (bogons?) contain garbage
 country:	PK
 
+aut-num:	AS136744
+descr:		DREAM POWER TECHNOLOGY LIMITED
+remarks:	Located somewhere in AP (HK? KR?), tampers with RIR data a lot
+country:	AP
+
+aut-num:	AS136746
+descr:		XRCLOUD.NET INC.
+remarks:	... located in HK
+country:	HK
+
 aut-num:	AS136933
 descr:		Gigabitbank Global / Anchnet Asia Limited (?)
 remarks:	IP hijacker located somewhere in AP area, suspected to be part of the "Asline" IP hijacking gang, tampers with RIR data
 country:	AP
 
+aut-num:	AS136950
+descr:		Hong Kong FireLine Network LTD
+remarks:	... located in HK (surprise!), but thinks allocating things to random countries worldwide is funny
+country:	HK
+
 aut-num:	AS136988
 descr:		Leaseweb Australia Pty. Ltd.
 remarks:	ISP located in AU, some RIR data for announced prefixes contain garbage
@@ -843,11 +893,6 @@ descr:		Anchnet Asia Limited
 remarks:	IP hijacker located in HK, tampers with RIR data
 country:	HK
 
-aut-num:	AS137523
-descr:		HONGKONG CLOUD NETWORK TECHNOLOGY CO., LIMITED
-remarks:	ISP and IP hijacker located in HK, tampers with RIR data
-country:	HK
-
 aut-num:	AS138195
 descr:		MOACK.Co.LTD
 remarks:	ISP located in KR, some RIR data for announced prefixes contain garbage
@@ -878,6 +923,11 @@ descr:		SANREN DATA LIMITED
 remarks:	IP hijacker located somewhere in AP region, tampers with RIR data
 country:	AP
 
+aut-num:	AS139471
+descr:		HWA CENT TELECOMMUNICATIONS LIMITED
+remarks:	ISP and/or IP hijacker located in AP area, tampers with RIR data
+country:	AP
+
 aut-num:	AS139640
 descr:		HK NEW CLOUD TECHNOLOGY LIMITED
 remarks:	ISP and/or IP hijacker located in AP area, tampers with RIR data
@@ -908,6 +958,11 @@ descr:		Galaxy Broadband
 remarks:	ISP located in PK, but announces 204.137.128.0/18, which is ARIN space, assigned to "AGIS" / Cogent - odd...
 country:	PK
 
+aut-num:	AS140214
+descr:		Create Prominent Information Limited
+remarks:	Shady ISP located in HK
+country:	HK
+
 aut-num:	AS140224
 descr:		White-Sand Cloud Computing(HK) Co., LIMITED
 remarks:	part of the "Asline" IP hijacking gang, tampers with RIR data, traces back to AP region
@@ -938,6 +993,11 @@ descr:		FLP Kochenov Aleksej Vladislavovich
 remarks:	ISP located in UA, but RIR data for announced prefixes all say EU
 country:	UA
 
+aut-num:	AS197540
+descr:		netcup GmbH
+remarks:	ISP located in DE, some RIR data for announced prefixes contain garbage
+country:	DE
+
 aut-num:	AS200019
 descr:		ALEXHOST SRL
 remarks:	ISP located in MD, majority of RIR data for announced prefixes contain garbage, we cannot trust this network
@@ -1260,8 +1320,8 @@ country:	ZA
 
 aut-num:	AS328608
 descr:		Africa on Cloud
-remarks:	... for some reason, I doubt a _real_ African ISP would announce solely hijacked prefixes
-country:	AP
+remarks:	... for some reason, I doubt a _real_ African ISP would announce solely hijacked prefixes - anyway, traces back to ZA :-/
+country:	ZA
 
 aut-num:	AS328703
 descr:		Seven Network Inc.
@@ -1678,11 +1738,6 @@ descr:		4b42 UG (haftungsbeschränkt)
 remarks:	... who thinks assigning networks to unpopulated Bouvet Island (BV) is funny :-/
 country:   	DE
 
-net:		2a0f:7a80::/29
-descr:		ASLINE Limited
-remarks:	APNIC chunk owned by a HK-based company, but assigned to DE
-country:	AP
-
 net:		2a0f:e400:3000::/40
 descr:		Kevin Buehl
 remarks:	... who thinks assigning networks to unpopulated Bouvet Island (BV) is funny :-/
diff --git a/overrides/override-xd.txt b/overrides/override-xd.txt
index 76ceab3..738a699 100644
--- a/overrides/override-xd.txt
+++ b/overrides/override-xd.txt
@@ -40,8 +40,8 @@ drop:		yes
 
 aut-num:	AS211849
 descr:		Kakharov Orinbassar Maratuly
-remarks:	ISP and IP hijacker located in RU, many RIR data for announced prefixes contain garbage
-country:	RU
+remarks:	ISP and IP hijacker located in KZ, many RIR data for announced prefixes contain garbage
+country:	KZ
 drop:		yes
 
 aut-num:	AS24009
@@ -97,6 +97,12 @@ remarks:	Owned by an offshore letterbox company, suspected rogue ISP
 country:	RU
 drop:		yes
 
+aut-num:	AS54600
+descr:		PEG TECH INC
+remarks:	ISP and IP hijacker located in US this time, tampers with RIR data
+country:	US
+drop:		yes
+
 aut-num:	AS55303
 descr:		Eagle Sky Co., Lt[d ?]
 remarks:	Autonomous System registered to offshore company, abuse contact is a freemail address, address says "0 Market Square, P.O. Box 364, Belize", seems to trace to some location in AP vicinity
@@ -166,6 +172,12 @@ remarks:	IP hijacker located in HK, suspected to be part of the "Asline" IP hija
 country:	HK
 drop:		yes
 
+aut-num:	AS137523
+descr:		HONGKONG CLOUD NETWORK TECHNOLOGY CO., LIMITED
+remarks:	ISP and IP hijacker located in HK, tampers with RIR data
+country:	HK
+drop:		yes
+
 aut-num:	AS137951
 descr:		Clayer Limited
 remarks:	part of the "Asline" IP hijacking gang, tampers with RIR data, traces back to HK
@@ -261,6 +273,18 @@ remarks:	ISP located in HK, tampers with RIR data
 country:	HK
 drop:		yes
 
+aut-num:	AS398993
+descr:		PEG TECH INC
+remarks:	ISP located in JP, tampers with RIR data
+country:	JP
+drop:		yes
+
+aut-num:	AS399195
+descr:		PEG TECH INC
+remarks:	ISP located in KR, tampers with RIR data
+country:	KR
+drop:		yes
+
 net:		196.11.32.0/20
 descr:		Sanlam Life Insurance Limited
 remarks:	Stolen AfriNIC IPv4 space announced from NL
@@ -272,6 +296,12 @@ descr:		NZB.si Enterprises
 remarks:	Tampers with RIR data, not a safe place to route traffic to
 drop:		yes
 
+net:		2a0f:7a80::/29
+descr:		ASLINE Limited
+remarks:	APNIC chunk owned by a HK-based IP hijacker, but assigned to DE
+country:	HK
+drop:		yes
+
 net:		2a10:9700::/29
 descr:		1337TEAM LIMITED / eliteteam[.]to
 remarks:	Owned by an offshore letterbox company, suspected rogue ISP
-- 
2.26.2

^ permalink raw reply	[flat|nested] 5+ messages in thread

* [PATCH] override-{a1,other,xd}: Regular batch of various overrides
@ 2022-01-16 11:19 Peter Müller
  0 siblings, 0 replies; 5+ messages in thread
From: Peter Müller @ 2022-01-16 11:19 UTC (permalink / raw)
  To: location

[-- Attachment #1: Type: text/plain, Size: 12866 bytes --]

Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
---
 overrides/override-a1.txt    |  5 ++
 overrides/override-other.txt | 92 ++++++++++++++++++------------------
 overrides/override-xd.txt    | 66 +++++++++++++++++++++++---
 3 files changed, 111 insertions(+), 52 deletions(-)

diff --git a/overrides/override-a1.txt b/overrides/override-a1.txt
index 43e0174..a97e7ce 100644
--- a/overrides/override-a1.txt
+++ b/overrides/override-a1.txt
@@ -639,6 +639,11 @@ descr:				Gabor Marton
 remarks:			Loaded with proxies, see also: https://krebsonsecurity.com/2019/08/the-rise-of-bulletproof-residential-networks/
 is-anonymous-proxy:		yes
 
+net:				45.203.128.0/18
+descr:				ProxyWow LLC
+remarks:			CloudInnovation space leased to "ProxyWow LLC" - not a safe area to accept traffic from anyways
+is-anonymous-proxy:		yes
+
 net:				45.220.72.0/22
 descr:				Low budget VPN service
 remarks:			VPN provider
diff --git a/overrides/override-other.txt b/overrides/override-other.txt
index 89ad8e0..c33e642 100644
--- a/overrides/override-other.txt
+++ b/overrides/override-other.txt
@@ -63,6 +63,11 @@ aut-num:	AS4134
 name:		Chinanet Backbone
 remarks:	has no sane AS name set in APNIC DB
 
+aut-num:	AS4609
+descr:		Companhia de Telecomunicacones de Macau SARL
+remarks:	ISP located in MO, but some RIR data needs manual correction due to ARIN DB situation
+country:	MO
+
 aut-num:	AS4754
 name:		Software Technology Park of India
 remarks:	has no sane AS name set in APNIC DB
@@ -90,6 +95,11 @@ descr:		Greek Research and Technology Network (GRNET) S.A.
 remarks:	... located in GR
 country:	GR
 
+aut-num:	AS6079
+descr:		RCN
+remarks:	ISP located in US, but some RIR data for announced prefixes contain garbage
+country:	US
+
 aut-num:	AS6134
 descr:		XNNET LLC
 remarks:	traces back to HK, seems to tamper with RIR data
@@ -208,6 +218,11 @@ descr:		Unicycle, LLC
 remarks:	traces back to NL
 country:	NL
 
+aut-num:	AS26548
+descr:		PureVoltage Hosting Inc.
+remarks:	ISP and IP hijacker located in US, but some RIR data for announced prefixes contain garbage
+country:	US
+
 aut-num:	AS26636
 descr:		GBTCloud, Inc.
 remarks:	ISP located in US, but some RIR data for announced prefixes contain garbage
@@ -263,6 +278,11 @@ descr:		Neterra Ltd.
 remarks:	ISP located in BG, but some RIR data for announced prefixes contain garbage
 country:	BG
 
+aut-num:	AS34549
+descr:		meerfarbig GmbH & Co. KG
+remarks:	ISP located in DE, but some RIR data for announced prefixes contain garbage
+country:	DE
+
 aut-num:	AS34665
 descr:		Petersburg Internet Network Ltd.
 remarks:	ISP located in RU, but some RIR data for announced prefixes contain garbage
@@ -388,10 +408,10 @@ descr:		MLAB Open Source Community
 remarks:	traces back to DE
 country:	DE
 
-aut-num:	AS41564
-descr:		Orion Network Limited
-remarks:	shady uplink for a bunch of dirty ISPs in SE (and likely elsewhere in EU), routing stolen AfriNIC networks, RIR data of prefixes announced by this AS cannot be trusted
-country:	SE
+aut-num:	AS41378
+descr:		Kirino LLC
+remarks:	traces back to AP vincinity, tampers with RIR data
+country:	AP
 
 aut-num:	AS41608
 descr:		NextGenWebs, S.L.
@@ -603,11 +623,6 @@ descr:		Reliance Jio Infocomm Limited
 remarks:	ISP located in IN, but some RIR data for announced prefixes contain garbage
 country:	IN
 
-aut-num:	AS55933
-descr:		Cloudie Limited
-remarks:	part of the "Asline" IP hijacking gang, tampers with RIR data, traces back to AP region
-country:	AP
-
 aut-num:	AS56322
 descr:		ServerAstra Kft.
 remarks:	ISP located in HU, but some RIR data for announced prefixes contain garbage
@@ -633,16 +648,6 @@ descr:		Telefonica LLC
 remarks:	ISP located in RU, but some RIR data for announced prefixes contain garbage
 country:	RU
 
-aut-num:	AS57858
-descr:		Inter Connects Inc.
-remarks:	part of a dirty ISP conglomerate operating most likely out of SE, hijacking stolen AfriNIC networks, massively tampers with RIR data
-country:	SE
-
-aut-num:	AS57972
-descr:		Inter Connects Inc.
-remarks:	part of a dirty ISP conglomerate operating most likely out of SE, hijacking stolen AfriNIC networks, massively tampers with RIR data
-country:	SE
-
 aut-num:	AS58061
 descr:		Scalaxy B.V.
 remarks:	ISP located in NL, but some RIR data for announced prefixes contain garbage
@@ -665,8 +670,8 @@ country:	BG
 
 aut-num:	AS58349
 descr:		INNETRA PC
-remarks:	another shady customer of "DDoS Guard Ltd.", jurisdiction is probably RU, but traceroutes dead-end somewhere else in EU
-country:	EU
+remarks:	... traceroutes dead-end in NL
+country:	NL
 
 aut-num:	AS58879
 descr:		Shanghai Anchang Network Security Technology Co.,Ltd.
@@ -723,11 +728,6 @@ descr:		DignusData LLC
 remarks:	ISP located in PL, but _all_ RIR data for announced prefixes contain garbage
 country:	PL
 
-aut-num:	AS60485
-descr:		Inter Connects Inc. / Jing Yun
-remarks:	part of a dirty ISP conglomerate operating most likely out of SE, hijacking AfriNIC networks
-country:	SE
-
 aut-num:	AS60546
 descr:		EU Routing Ltd
 remarks:	fake offshore location (CY), hosted in NL
@@ -818,6 +818,11 @@ descr:		CloudITIDC Global
 remarks:	ISP and/or IP hijacker located somewhere in AP
 country:	AP
 
+aut-num:	AS133613
+descr:		MTel telecommunication company ltd.
+remarks:	ISP and located in MO, but some prefixes needs manual correction due to ARIN DB situation
+country:	MO
+
 aut-num:	AS133752
 descr:		Leaseweb Asia Pacific pte. ltd.
 remarks:	ISP located in HK, some RIR data for announced prefixes contain garbage
@@ -853,6 +858,11 @@ descr:		LUOGELANG (FRANCE) LIMITED
 remarks:	Shady ISP located in HK, RIR data for announced prefixes contain garbage
 country:	HK
 
+aut-num:	AS136167
+descr:		China Telecom (Macau) Company Limited
+remarks:	located in MO, yet some prefixes show CN or HK instead
+country:	MO
+
 aut-num:	AS136274
 descr:		Cloud Servers Pvt Ltd
 remarks:	ISP located in NL, all RIR data for announced prefixes contain garbage
@@ -918,11 +928,6 @@ descr:		Cloudflare Sydney, LLC
 remarks:	... but CF failed to set the country for announced prefixes to AU as well :-/
 country:	AU
 
-aut-num:	AS139330
-descr:		SANREN DATA LIMITED
-remarks:	IP hijacker located somewhere in AP region, tampers with RIR data
-country:	AP
-
 aut-num:	AS139471
 descr:		HWA CENT TELECOMMUNICATIONS LIMITED
 remarks:	ISP and/or IP hijacker located in AP area, tampers with RIR data
@@ -955,7 +960,7 @@ country:	HK
 
 aut-num:	AS139879
 descr:		Galaxy Broadband
-remarks:	ISP located in PK, but announces 204.137.128.0/18, which is ARIN space, assigned to "AGIS" / Cogent - odd...
+remarks:	ISP located in PK, but some RIR data need manual correction due to ARIN DB situation
 country:	PK
 
 aut-num:	AS140214
@@ -983,10 +988,10 @@ descr:		Full Time Hosting
 remarks:	ISP located in DE, tampers with RIR data
 country:	DE
 
-aut-num:	AS141746
-descr:		Orenji Server
-remarks:	IP hijacker located somewhere in AP area (JP?)
-country:	AP
+aut-num:	AS141677
+descr:		Nathosts Limited
+remarks:	... located in HK?
+country:	HK
 
 aut-num:	AS196682
 descr:		FLP Kochenov Aleksej Vladislavovich
@@ -1198,11 +1203,6 @@ descr:		Des Capital B.V.
 remarks:	Shady ISP located in NL, but RIR data for announced prefixes contain garbage
 country:	NL
 
-aut-num:	AS210848
-descr:		Telkom Internet LTD
-remarks:	shady ISP currently located in NL
-country:	NL
-
 aut-num:	AS211380
 descr:		PAYWISE HOLDING Sp. z.o.o.
 remarks:	ISP located in NL, but RIR data for announced prefixes contain garbage
@@ -1248,11 +1248,6 @@ descr:		MILEGROUP LTD
 remarks:	traceroutes dead-end somewhere in Central Europe
 country:	EU
 
-aut-num:	AS212552
-descr:		BitCommand LLC
-remarks:	Hides behind a CDN ISP, traceroutes dead-end somewhere in Central Europe
-country:	EU
-
 aut-num:	AS212667
 descr:		RECONN LLC
 remarks:	ISP located in RU, but RIR data for announced prefixes contain garbage
@@ -1533,6 +1528,11 @@ descr:		SpaceX Canada Corp.
 remarks:	Accurate country code missing due to ARIN DB situation, see also: #12746
 country:	CA
 
+net:		103.126.4.0/23
+descr:		Cyber Telecom ISP
+remarks:	Despite being allocated to AF, traceroutes end in NL
+country:	NL
+
 net:		103.197.148.0/22
 descr:		I.C.S. Trabia-Network S.R.L.
 remarks:	fake offshore location (HK), traces back to MD
diff --git a/overrides/override-xd.txt b/overrides/override-xd.txt
index 738a699..2b50406 100644
--- a/overrides/override-xd.txt
+++ b/overrides/override-xd.txt
@@ -67,6 +67,12 @@ descr:		1337TEAM LIMITED / eliteteam[.]to
 remarks:	Owned by an offshore letterbox company, suspected rogue ISP
 drop:		yes
 
+aut-num:	AS41564
+descr:		Orion Network Limited
+remarks:	shady uplink for a bunch of dirty ISPs in SE (and likely elsewhere in EU), routing stolen AfriNIC networks, RIR data of prefixes announced by this AS cannot be trusted
+country:	EU
+drop:		yes
+
 aut-num:	AS43092
 descr:		Kirin Communication Limited
 remarks:	Hijacks IP space and tampers with RIR data, traces back to JP
@@ -79,6 +85,12 @@ remarks:	bulletproof ISP with strong links to RU
 country:	RU
 drop:		yes
 
+aut-num:	AS44446
+descr:		OOO SibirInvest
+remarks:	bulletproof ISP (related to AS202425 and AS57717) located in NL
+country:	NL
+drop:		yes
+
 aut-num:	AS48090
 descr:		PPTECHNOLOGY LIMITED
 remarks:	bulletproof ISP (related to AS204655) located in NL
@@ -109,6 +121,12 @@ remarks:	Autonomous System registered to offshore company, abuse contact is a fr
 country:	AP
 drop:		yes
 
+aut-num:	AS55933
+descr:		Cloudie Limited
+remarks:	part of the "Asline" IP hijacking gang, tampers with RIR data, traces back to AP region
+country:	AP
+drop:		yes
+
 aut-num:	AS56611
 descr:		REBA Communications BV
 remarks:	bulletproof ISP (related to AS202425) located in NL
@@ -126,6 +144,18 @@ remarks:	bulletproof ISP (related to AS202425) located in NL
 country:	NL
 drop:		yes
 
+aut-num:	AS57858
+descr:		Inter Connects Inc.
+remarks:	part of a dirty ISP conglomerate operating most likely out of SE, hijacking stolen AfriNIC networks, massively tampers with RIR data
+country:	SE
+drop:		yes
+
+aut-num:	AS57972
+descr:		Inter Connects Inc.
+remarks:	part of a dirty ISP conglomerate operating most likely out of SE, hijacking stolen AfriNIC networks, massively tampers with RIR data
+country:	SE
+drop:		yes
+
 aut-num:	AS58271
 descr:		FOP Gubina Lubov Petrivna
 remarks:	bulletproof ISP operating from a war zone in eastern UA
@@ -143,6 +173,12 @@ descr:		1337TEAM LIMITED / eliteteam[.]to
 remarks:	Owned by an offshore letterbox company, suspected rogue ISP
 drop:		yes
 
+aut-num:	AS60485
+descr:		Inter Connects Inc. / Jing Yun
+remarks:	part of a dirty ISP conglomerate operating most likely out of SE, hijacking AfriNIC networks
+country:	SE
+drop:		yes
+
 aut-num:	AS61414
 descr:		EDGENAP LTD
 remarks:	IP hijacking? Rogue ISP?
@@ -190,6 +226,12 @@ remarks:	IP hijacker located somewhere in AP area
 country:	AP
 drop:		yes
 
+aut-num:	AS139330
+descr:		SANREN DATA LIMITED
+remarks:	IP hijacker located somewhere in AP region, tampers with RIR data
+country:	AP
+drop:		yes
+
 aut-num:	AS140107
 descr:		CITIS CLOUD GROUP LIMITED
 remarks:	part of the "Asline" IP hijacking gang, tampers with RIR data, location unknown (AP? HK? US?)
@@ -201,6 +243,12 @@ remarks:	ISP and IP hijacker located in HK, tampers with RIR data
 country:	HK
 drop:		yes
 
+aut-num:	AS141746
+descr:		Orenji Server
+remarks:	IP hijacker located somewhere in AP area (JP?)
+country:	AP
+drop:		yes
+
 aut-num:	AS200391
 descr:		KREZ 999 EOOD
 remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
@@ -231,24 +279,30 @@ remarks:	bulletproof ISP (strongly linked to AS202425) located in NL
 country:	NL
 drop:		yes
 
-aut-num:	AS207812
-descr:		DM AUTO EOOD
-remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
-country:	BG
-drop:		yes
-
 aut-num:	AS209272
 descr:		Alviva Holding Limited
 remarks:	bulletproof ISP operating from a war zone in eastern UA
 country:	UA
 drop:		yes
 
+aut-num:	AS210848
+descr:		Telkom Internet LTD
+remarks:	Rogue ISP (linked to AS202425) located in NL
+country:	NL
+drop:		yes
+
 aut-num:	AS211193
 descr:		ABDILAZIZ UULU ZHUSUP
 remarks:	bulletproof ISP and IP hijacker, traces to RU
 country:	RU
 drop:		yes
 
+aut-num:	AS212552
+descr:		BitCommand LLC
+remarks:	Dirty ISP located somewhere in EU, cannot trust RIR data of this network
+country:	EU
+drop:		yes
+
 aut-num:	AS213058
 descr:		Private Internet Hosting LTD
 remarks:	bulletproof ISP located in RU
-- 
2.31.1

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH] override-{a1,other,xd}: Regular batch of various overrides
  2021-12-10  9:00 ` Michael Tremer
@ 2021-12-10  9:36   ` Peter Müller
  0 siblings, 0 replies; 5+ messages in thread
From: Peter Müller @ 2021-12-10  9:36 UTC (permalink / raw)
  To: location

[-- Attachment #1: Type: text/plain, Size: 15958 bytes --]

Hello Michael,

thanks for your reply.

No, they are all still alive and kicking, but fit the "XD" category better. Some of them,
to the best of my knowledge, recently stopped using proxy/VPN services, so I removed them
from the A1 override file for improved accuracy.

Thanks, and best regards,
Peter Müller


> Thank you. Merged.
> 
> All those networks that were removed, did they just cease to exist?
> 
> -Michael
> 
>> On 10 Dec 2021, at 07:07, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>
>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
>> ---
>> overrides/override-a1.txt    |  48 ----------------
>> overrides/override-other.txt | 104 ++++++++++++++++++++++-------------
>> overrides/override-xd.txt    |  50 +++++++++++++++++
>> 3 files changed, 117 insertions(+), 85 deletions(-)
>>
>> diff --git a/overrides/override-a1.txt b/overrides/override-a1.txt
>> index 5734c08..5fce4d9 100644
>> --- a/overrides/override-a1.txt
>> +++ b/overrides/override-a1.txt
>> @@ -82,11 +82,6 @@ descr:				Asiamax Ltd. VPN
>> remarks:			VPN provider
>> is-anonymous-proxy:		yes
>>
>> -aut-num:			AS39770
>> -descr:				1337TEAM LIMITED / eliteteam[.]to
>> -remarks:			Owned by an offshore letterbox company, suspected rogue ISP
>> -is-anonymous-proxy:		yes
>> -
>> aut-num:			AS43233
>> descr:				VPS 404 Ltd.
>> remarks:			VPN provider [high confidence, but not proofed] located in ES
>> @@ -114,12 +109,6 @@ descr:				BeeVPN ApS
>> remarks:			VPN provider
>> is-anonymous-proxy:		yes
>>
>> -aut-num:			AS51381
>> -descr:				1337TEAM LIMITED / eliteteam[.]to
>> -remarks:			Owned by an offshore letterbox company, suspected rogue ISP
>> -is-anonymous-proxy:		yes
>> -country:			RU
>> -
>> aut-num:			AS51446
>> descr:				SP Argaev Artem Sergeyevich / Foundation Respect My Privacy
>> remarks:			VPN provider [high confidence, but not proofed]
>> @@ -142,17 +131,6 @@ remarks:			Tor relay and VPN provider, traces back to SE [high confidence, but n
>> is-anonymous-proxy:		yes
>> country:			SE
>>
>> -aut-num:			AS55303
>> -descr:				Eagle Sky Co., Lt[d ?]
>> -remarks:			Autonomous System registered to offshore company, abuse contact is a freemail address, address says "0 Market Square, P.O. Box 364, Belize", seems to trace to some location in AP vicinity
>> -is-anonymous-proxy:		yes
>> -country:			AP
>> -
>> -aut-num:			AS56873
>> -descr:				1337TEAM LIMITED / eliteteam[.]to
>> -remarks:			Owned by an offshore letterbox company, suspected rogue ISP
>> -is-anonymous-proxy:		yes
>> -
>> aut-num:			AS58110
>> descr:				IP Volume Ltd. / Epik
>> remarks:			Shady Autonomous System registered to letterbox company, possibly copycat operation of Epik registrar, many prefixes announced refer to "anonymize" infrastructure
>> @@ -168,11 +146,6 @@ descr:				Geotelco Limited
>> remarks:			VPN provider [high confidence, but not proofed]
>> is-anonymous-proxy:		yes
>>
>> -aut-num:			AS60424
>> -descr:				1337TEAM LIMITED / eliteteam[.]to
>> -remarks:			Owned by an offshore letterbox company, suspected rogue ISP
>> -is-anonymous-proxy:		yes
>> -
>> aut-num:			AS60729
>> descr:				Zwiebelfreunde e.V.
>> remarks:			Tor relay provider
>> @@ -214,12 +187,6 @@ descr:				HERN Labs AB
>> remarks:			VPN provider [high confidence, but not proofed]
>> is-anonymous-proxy:		yes
>>
>> -aut-num:			AS206819
>> -descr:				ANSON NETWORK LIMITED
>> -remarks:			Autonomous System registered to UK letterbox company, traces back through shady ISPs to TW
>> -is-anonymous-proxy:		yes
>> -country:			TW
>> -
>> aut-num:			AS207688
>> descr:				DataHome S.A.
>> remarks:			VPN provider located in BR [high confidence, but not proofed]
>> @@ -1430,11 +1397,6 @@ descr:				Tredinvest LLC / bestwest[.]host
>> remarks:			VPN provider or offering similar services [high confidence, but not proofed]
>> is-anonymous-proxy:		yes
>>
>> -net:				185.215.113.0/24
>> -descr:				1337TEAM LIMITED / eliteteam[.]to
>> -remarks:			Owned by an offshore letterbox company, suspected rogue ISP
>> -is-anonymous-proxy:		yes
>> -
>> net:				185.220.100.0/22
>> descr:				Zwiebelfreunde e.V. / F3 Netze e.V. / The Calyx Institute
>> remarks:			Tor relay provider
>> @@ -1692,11 +1654,6 @@ descr:				LogicWeb Inc. / BGRVPN / Private Internet Access / VPNetworks / Cookie
>> remarks:			Hijacked AfriNIC IP chunk mostly used by VPN providers
>> is-anonymous-proxy:		yes
>>
>> -net:				196.61.192.0/20
>> -descr:				Inspiring Networks LTD
>> -remarks:			hijacked (?) IP network owned by an offshore company [high confidence, but not proofed]
>> -is-anonymous-proxy:		yes
>> -
>> net:				197.221.161.0/24
>> descr:				VPNClientPublics
>> remarks:			VPN provider
>> @@ -2031,8 +1988,3 @@ net:				2c0f:f930::/32
>> descr:				Cyberdyne S.A.
>> remarks:			Tor relay provider
>> is-anonymous-proxy:		yes
>> -
>> -net:				2a10:9700::/29
>> -descr:				1337TEAM LIMITED / eliteteam[.]to
>> -remarks:			Owned by an offshore letterbox company, suspected rogue ISP
>> -is-anonymous-proxy:		yes
>> diff --git a/overrides/override-other.txt b/overrides/override-other.txt
>> index 7d76534..ca9dbad 100644
>> --- a/overrides/override-other.txt
>> +++ b/overrides/override-other.txt
>> @@ -85,6 +85,11 @@ descr:		Tianhai InfoTech
>> remarks:	IP hijacker located somewhere in AP, massively tampers with RIR data
>> country:	AP
>>
>> +aut-num:	AS5408
>> +descr:		Greek Research and Technology Network (GRNET) S.A.
>> +remarks:	... located in GR
>> +country:	GR
>> +
>> aut-num:	AS6134
>> descr:		XNNET LLC
>> remarks:	traces back to an unknown oversea location (HK?), seems to tamper with RIR data
>> @@ -363,6 +368,11 @@ descr:		CNSERVERS LLC
>> remarks:	Shady ISP located in US, tampers with RIR data
>> country:	US
>>
>> +aut-num:	AS41047
>> +descr:		MLAB Open Source Community
>> +remarks:	traces back to DE
>> +country:	DE
>> +
>> aut-num:	AS41466
>> descr:		Treidinvest LLC
>> remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
>> @@ -408,6 +418,11 @@ descr:		DGN TEKNOLOJI A.S.
>> remarks:	ISP located in TR, but many RIR data for announced prefixes contain garbage
>> country:	TR
>>
>> +aut-num:	AS43092
>> +descr:		Kirin Communication Limited
>> +remarks:	tampers with RIR data, traces back to AP area
>> +country:	AP
>> +
>> aut-num:	AS43310
>> descr:		TOV "LVS"
>> remarks:	ISP located in UA, but some RIR data for announced prefixes contain garbage
>> @@ -498,11 +513,6 @@ descr:		LLC Baxet
>> remarks:	tampers with RIR data, traces back to RU
>> country:	RU
>>
>> -aut-num:	AS49447
>> -descr:		Nice IT Services Group Inc.
>> -remarks:	Rogue ISP located in CH, but some RIR data for announced prefixes contain garbage
>> -country:	CH
>> -
>> aut-num:	AS49466
>> descr:		KLAYER LLC
>> remarks:	part of the "Asline" IP hijacking gang, traces back to AP region
>> @@ -748,6 +758,11 @@ descr:		NForce Entertainment BV
>> remarks:	currently hijacks a single stolen /20 AfriNIC IPv4 net, hosted in NL
>> country:	NL
>>
>> +aut-num:	AS131685
>> +descr:		Sun Network (Hong Kong) Limited
>> +remarks:	ISP and/or IP hijacker located somewhere in AP
>> +country:	AP
>> +
>> aut-num:	AS132369
>> descr:		XIANGAO INTERNATIONAL TELECOMMUNICATION LIMITED
>> remarks:	ISP located in HK, tampers with RIR data
>> @@ -758,9 +773,14 @@ descr:		POWER LINE DATACENTER
>> remarks:	ISP and/or IP hijacker located in HK, tampers with RIR data
>> country:	HK
>>
>> +aut-num:	AS133201
>> +descr:		ABCDE GROUP COMPANY LIMITED
>> +remarks:	ISP and/or IP hijacker located somewhere in AP
>> +country:	AP
>> +
>> aut-num:	AS133441
>> descr:		CloudITIDC Global
>> -remarks:	ISP and/or IP hijacker located somehwere in AP
>> +remarks:	ISP and/or IP hijacker located somewhere in AP
>> country:	AP
>>
>> aut-num:	AS133752
>> @@ -810,7 +830,7 @@ country:	AP
>>
>> aut-num:	AS136800
>> descr:		ICIDC NETWORK
>> -remarks:	IP hijacker located somehwere in AP, suspected to be part of the "Asline" IP hijacking gang, tampers with RIR data
>> +remarks:	IP hijacker located somewhere in AP, suspected to be part of the "Asline" IP hijacking gang, tampers with RIR data
>> country:	AP
>>
>> aut-num:	AS136933
>> @@ -923,6 +943,11 @@ descr:		Incomparable(HK)Network Co., Limited
>> remarks:	ISP and/or IP hijacker located in AP area, tampers with RIR data
>> country:	AP
>>
>> +aut-num:	AS141746
>> +descr:		Orenji Server
>> +remarks:	IP hijacker located somewhere in AP area (JP?)
>> +country:	AP
>> +
>> aut-num:	AS196682
>> descr:		FLP Kochenov Aleksej Vladislavovich
>> remarks:	ISP located in UA, but RIR data for announced prefixes all say EU
>> @@ -933,11 +958,6 @@ descr:		ALEXHOST SRL
>> remarks:	ISP located in MD, majority of RIR data for announced prefixes contain garbage, we cannot trust this network
>> country:	MD
>>
>> -aut-num:	AS200391
>> -descr:		KREZ 999 EOOD
>> -remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
>> -country:	BG
>> -
>> aut-num:	AS200699
>> descr:		Datashield, Inc.
>> remarks:	fake offshore location (SC), traces back to NL
>> @@ -1028,6 +1048,11 @@ descr:		Genius Guard / Genius Security Ltd.
>> remarks:	another shady customer of "DDoS Guard Ltd.", probably located in RU
>> country:	RU
>>
>> +aut-num:	AS206819
>> +descr:		ANSON NETWORK LIMITED
>> +remarks:	Autonomous System registered to UK letterbox company, traces back through shady ISPs to TW
>> +country:	TW
>> +
>> aut-num:	AS206898
>> descr:		Server Hosting Pty Ltd
>> remarks:	ISP located in NL, but some RIR data for announced prefixes contain garbage
>> @@ -1063,11 +1088,6 @@ descr:		Altrosky Technology Ltd.
>> remarks:	fake offshore location (SC), traces back to CZ and NL
>> country:	EU
>>
>> -aut-num:	AS207812
>> -descr:		DM AUTO EOOD
>> -remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
>> -country:	BG
>> -
>> aut-num:	AS208046
>> descr:		Maximilian Kutzner trading as HostSlick
>> remarks:	traces back to NL, but some RIR data for announced prefixes contain garbage
>> @@ -1248,6 +1268,11 @@ descr:		Sun Network Company Limited
>> remarks:	IP hijacker, traces back to AP region
>> country:	AP
>>
>> +aut-num:	AS328608
>> +descr:		Africa on Cloud
>> +remarks:	... for some reason, I doubt a _real_ African ISP would announce solely hijacked prefixes
>> +country:	AP
>> +
>> aut-num:	AS328703
>> descr:		Seven Network Inc.
>> remarks:	traces back to ZA
>> @@ -1313,25 +1338,25 @@ descr:		Wolverine Trading, LLC
>> remarks:	IP hijacker located in US, tampers with RIR data
>> country:	US
>>
>> -net:        5.1.68.0/24
>> -descr:      GaiacomLC
>> -remarks:    routed to DE, inaccurate RIR data
>> -country:    DE
>> +net:		5.1.68.0/24
>> +descr:		GaiacomLC
>> +remarks:	routed to DE, inaccurate RIR data
>> +country:	DE
>>
>> -net:        5.1.69.0/24
>> -descr:      GaiacomLC
>> -remarks:    routed to DE, inaccurate RIR data
>> -country:    DE
>> +net:		5.1.69.0/24
>> +descr:		GaiacomLC
>> +remarks:	routed to DE, inaccurate RIR data
>> +country:	DE
>>
>> -net:        5.1.83.0/24
>> -descr:      GaiacomLC
>> -remarks:    routed to DE, inaccurate RIR data
>> -country:    DE
>> +net:		5.1.83.0/24
>> +descr:		GaiacomLC
>> +remarks:	routed to DE, inaccurate RIR data
>> +country:	DE
>>
>> -net:        5.1.88.0/24
>> -descr:      GaiacomLC
>> -remarks:    routed to DE, inaccurate RIR data
>> -country:    DE
>> +net:		5.1.88.0/24
>> +descr:		GaiacomLC
>> +remarks:	routed to DE, inaccurate RIR data
>> +country:	DE
>>
>> net:		5.252.32.0/22
>> descr:		StormWall s.r.o.
>> @@ -1413,6 +1438,11 @@ descr:		Golden Internet LLC
>> remarks:	fake location (KP), WHOIS contact points to RU
>> country:   	RU
>>
>> +net:		91.90.120.0/24
>> +descr:		M247 LTD, Greenland Infrastructure
>> +remarks:	... traces back to CA
>> +country:   	CA
>> +
>> net:		91.149.194.0/24
>> descr:		IP Volume Ltd. / Epik
>> remarks:	fake location (CH), traces back to SE
>> @@ -1488,10 +1518,10 @@ descr:		Intelcom Group Ltd
>> remarks:	fake offshore location (SC), traces back to RU
>> country:   	RU
>>
>> -net:        185.140.204.0/22
>> -descr:      Hornetsecurity GmbH
>> -remarks:    all suballocations are used in DE, but are assigned to US
>> -country:    DE
>> +net:		185.140.204.0/22
>> +descr:		Hornetsecurity GmbH
>> +remarks:	all suballocations are used in DE, but are assigned to US
>> +country:	DE
>>
>> net:		185.175.93.0/24
>> descr:		Perfect Hosting Solutions
>> diff --git a/overrides/override-xd.txt b/overrides/override-xd.txt
>> index 7df6188..29057d9 100644
>> --- a/overrides/override-xd.txt
>> +++ b/overrides/override-xd.txt
>> @@ -26,24 +26,57 @@
>> # Please keep this file sorted.
>> #
>>
>> +aut-num:	AS39770
>> +descr:		1337TEAM LIMITED / eliteteam[.]to
>> +remarks:	Owned by an offshore letterbox company, suspected rogue ISP
>> +drop:		yes
>> +
>> aut-num:	AS48090
>> descr:		PPTECHNOLOGY LIMITED
>> remarks:	bulletproof ISP (related to AS204655) located in NL
>> country:	NL
>> drop:		yes
>>
>> +aut-num:	AS49447
>> +descr:		Nice IT Services Group Inc.
>> +remarks:	Rogue ISP located in CH, but some RIR data for announced prefixes contain garbage
>> +country:	CH
>> +drop:		yes
>> +
>> +aut-num:	AS51381
>> +descr:		1337TEAM LIMITED / eliteteam[.]to
>> +remarks:	Owned by an offshore letterbox company, suspected rogue ISP
>> +country:	RU
>> +drop:		yes
>> +
>> +aut-num:	AS55303
>> +descr:		Eagle Sky Co., Lt[d ?]
>> +remarks:	Autonomous System registered to offshore company, abuse contact is a freemail address, address says "0 Market Square, P.O. Box 364, Belize", seems to trace to some location in AP vicinity
>> +country:	AP
>> +drop:		yes
>> +
>> aut-num:	AS56611
>> descr:		REBA Communications BV
>> remarks:	bulletproof ISP (related to AS202425) located in NL
>> country:	NL
>> drop:		yes
>>
>> +aut-num:	AS56873
>> +descr:		1337TEAM LIMITED / eliteteam[.]to
>> +remarks:	Owned by an offshore letterbox company, suspected rogue ISP
>> +drop:		yes
>> +
>> aut-num:	AS57717
>> descr:		FiberXpress BV
>> remarks:	bulletproof ISP (related to AS202425) located in NL
>> country:	NL
>> drop:		yes
>>
>> +aut-num:	AS60424
>> +descr:		1337TEAM LIMITED / eliteteam[.]to
>> +remarks:	Owned by an offshore letterbox company, suspected rogue ISP
>> +drop:		yes
>> +
>> aut-num:	AS62068
>> descr:		SpectraIP B.V.
>> remarks:	bulletproof ISP (linked to AS202425 et al.) located in NL
>> @@ -62,6 +95,12 @@ remarks:	bulletproof ISP (linked to AS202425 et al.) located in NL
>> country:	NL
>> drop:		yes
>>
>> +aut-num:	AS200391
>> +descr:		KREZ 999 EOOD
>> +remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
>> +country:	BG
>> +drop:		yes
>> +
>> aut-num:	AS202425
>> descr:		IP Volume Inc.
>> remarks:	bulletproof ISP (aka: AS29073 / Ecatel Ltd. / Quasi Networks Ltd.) located in NL
>> @@ -74,6 +113,12 @@ remarks:	bulletproof ISP and IP hijacker, related to AS202425 and AS62355, trace
>> country:	NL
>> drop:		yes
>>
>> +aut-num:	AS207812
>> +descr:		DM AUTO EOOD
>> +remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
>> +country:	BG
>> +drop:		yes
>> +
>> aut-num:	AS204655
>> descr:		Novogara Ltd.
>> remarks:	bulletproof ISP (strongly linked to AS202425) located in NL
>> @@ -85,3 +130,8 @@ descr:		Datapacket Maroc SARL
>> remarks:	bulletproof ISP (strongly linked to AS202425) located in NL
>> country:	NL
>> drop:		yes
>> +
>> +net:		2a10:9700::/29
>> +descr:		1337TEAM LIMITED / eliteteam[.]to
>> +remarks:	Owned by an offshore letterbox company, suspected rogue ISP
>> +drop:		yes
>> -- 
>> 2.26.2
> 

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH] override-{a1,other,xd}: Regular batch of various overrides
  2021-12-10  7:07 Peter Müller
@ 2021-12-10  9:00 ` Michael Tremer
  2021-12-10  9:36   ` Peter Müller
  0 siblings, 1 reply; 5+ messages in thread
From: Michael Tremer @ 2021-12-10  9:00 UTC (permalink / raw)
  To: location

[-- Attachment #1: Type: text/plain, Size: 15226 bytes --]

Thank you. Merged.

All those networks that were removed, did they just cease to exist?

-Michael

> On 10 Dec 2021, at 07:07, Peter Müller <peter.mueller(a)ipfire.org> wrote:
> 
> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
> ---
> overrides/override-a1.txt    |  48 ----------------
> overrides/override-other.txt | 104 ++++++++++++++++++++++-------------
> overrides/override-xd.txt    |  50 +++++++++++++++++
> 3 files changed, 117 insertions(+), 85 deletions(-)
> 
> diff --git a/overrides/override-a1.txt b/overrides/override-a1.txt
> index 5734c08..5fce4d9 100644
> --- a/overrides/override-a1.txt
> +++ b/overrides/override-a1.txt
> @@ -82,11 +82,6 @@ descr:				Asiamax Ltd. VPN
> remarks:			VPN provider
> is-anonymous-proxy:		yes
> 
> -aut-num:			AS39770
> -descr:				1337TEAM LIMITED / eliteteam[.]to
> -remarks:			Owned by an offshore letterbox company, suspected rogue ISP
> -is-anonymous-proxy:		yes
> -
> aut-num:			AS43233
> descr:				VPS 404 Ltd.
> remarks:			VPN provider [high confidence, but not proofed] located in ES
> @@ -114,12 +109,6 @@ descr:				BeeVPN ApS
> remarks:			VPN provider
> is-anonymous-proxy:		yes
> 
> -aut-num:			AS51381
> -descr:				1337TEAM LIMITED / eliteteam[.]to
> -remarks:			Owned by an offshore letterbox company, suspected rogue ISP
> -is-anonymous-proxy:		yes
> -country:			RU
> -
> aut-num:			AS51446
> descr:				SP Argaev Artem Sergeyevich / Foundation Respect My Privacy
> remarks:			VPN provider [high confidence, but not proofed]
> @@ -142,17 +131,6 @@ remarks:			Tor relay and VPN provider, traces back to SE [high confidence, but n
> is-anonymous-proxy:		yes
> country:			SE
> 
> -aut-num:			AS55303
> -descr:				Eagle Sky Co., Lt[d ?]
> -remarks:			Autonomous System registered to offshore company, abuse contact is a freemail address, address says "0 Market Square, P.O. Box 364, Belize", seems to trace to some location in AP vicinity
> -is-anonymous-proxy:		yes
> -country:			AP
> -
> -aut-num:			AS56873
> -descr:				1337TEAM LIMITED / eliteteam[.]to
> -remarks:			Owned by an offshore letterbox company, suspected rogue ISP
> -is-anonymous-proxy:		yes
> -
> aut-num:			AS58110
> descr:				IP Volume Ltd. / Epik
> remarks:			Shady Autonomous System registered to letterbox company, possibly copycat operation of Epik registrar, many prefixes announced refer to "anonymize" infrastructure
> @@ -168,11 +146,6 @@ descr:				Geotelco Limited
> remarks:			VPN provider [high confidence, but not proofed]
> is-anonymous-proxy:		yes
> 
> -aut-num:			AS60424
> -descr:				1337TEAM LIMITED / eliteteam[.]to
> -remarks:			Owned by an offshore letterbox company, suspected rogue ISP
> -is-anonymous-proxy:		yes
> -
> aut-num:			AS60729
> descr:				Zwiebelfreunde e.V.
> remarks:			Tor relay provider
> @@ -214,12 +187,6 @@ descr:				HERN Labs AB
> remarks:			VPN provider [high confidence, but not proofed]
> is-anonymous-proxy:		yes
> 
> -aut-num:			AS206819
> -descr:				ANSON NETWORK LIMITED
> -remarks:			Autonomous System registered to UK letterbox company, traces back through shady ISPs to TW
> -is-anonymous-proxy:		yes
> -country:			TW
> -
> aut-num:			AS207688
> descr:				DataHome S.A.
> remarks:			VPN provider located in BR [high confidence, but not proofed]
> @@ -1430,11 +1397,6 @@ descr:				Tredinvest LLC / bestwest[.]host
> remarks:			VPN provider or offering similar services [high confidence, but not proofed]
> is-anonymous-proxy:		yes
> 
> -net:				185.215.113.0/24
> -descr:				1337TEAM LIMITED / eliteteam[.]to
> -remarks:			Owned by an offshore letterbox company, suspected rogue ISP
> -is-anonymous-proxy:		yes
> -
> net:				185.220.100.0/22
> descr:				Zwiebelfreunde e.V. / F3 Netze e.V. / The Calyx Institute
> remarks:			Tor relay provider
> @@ -1692,11 +1654,6 @@ descr:				LogicWeb Inc. / BGRVPN / Private Internet Access / VPNetworks / Cookie
> remarks:			Hijacked AfriNIC IP chunk mostly used by VPN providers
> is-anonymous-proxy:		yes
> 
> -net:				196.61.192.0/20
> -descr:				Inspiring Networks LTD
> -remarks:			hijacked (?) IP network owned by an offshore company [high confidence, but not proofed]
> -is-anonymous-proxy:		yes
> -
> net:				197.221.161.0/24
> descr:				VPNClientPublics
> remarks:			VPN provider
> @@ -2031,8 +1988,3 @@ net:				2c0f:f930::/32
> descr:				Cyberdyne S.A.
> remarks:			Tor relay provider
> is-anonymous-proxy:		yes
> -
> -net:				2a10:9700::/29
> -descr:				1337TEAM LIMITED / eliteteam[.]to
> -remarks:			Owned by an offshore letterbox company, suspected rogue ISP
> -is-anonymous-proxy:		yes
> diff --git a/overrides/override-other.txt b/overrides/override-other.txt
> index 7d76534..ca9dbad 100644
> --- a/overrides/override-other.txt
> +++ b/overrides/override-other.txt
> @@ -85,6 +85,11 @@ descr:		Tianhai InfoTech
> remarks:	IP hijacker located somewhere in AP, massively tampers with RIR data
> country:	AP
> 
> +aut-num:	AS5408
> +descr:		Greek Research and Technology Network (GRNET) S.A.
> +remarks:	... located in GR
> +country:	GR
> +
> aut-num:	AS6134
> descr:		XNNET LLC
> remarks:	traces back to an unknown oversea location (HK?), seems to tamper with RIR data
> @@ -363,6 +368,11 @@ descr:		CNSERVERS LLC
> remarks:	Shady ISP located in US, tampers with RIR data
> country:	US
> 
> +aut-num:	AS41047
> +descr:		MLAB Open Source Community
> +remarks:	traces back to DE
> +country:	DE
> +
> aut-num:	AS41466
> descr:		Treidinvest LLC
> remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
> @@ -408,6 +418,11 @@ descr:		DGN TEKNOLOJI A.S.
> remarks:	ISP located in TR, but many RIR data for announced prefixes contain garbage
> country:	TR
> 
> +aut-num:	AS43092
> +descr:		Kirin Communication Limited
> +remarks:	tampers with RIR data, traces back to AP area
> +country:	AP
> +
> aut-num:	AS43310
> descr:		TOV "LVS"
> remarks:	ISP located in UA, but some RIR data for announced prefixes contain garbage
> @@ -498,11 +513,6 @@ descr:		LLC Baxet
> remarks:	tampers with RIR data, traces back to RU
> country:	RU
> 
> -aut-num:	AS49447
> -descr:		Nice IT Services Group Inc.
> -remarks:	Rogue ISP located in CH, but some RIR data for announced prefixes contain garbage
> -country:	CH
> -
> aut-num:	AS49466
> descr:		KLAYER LLC
> remarks:	part of the "Asline" IP hijacking gang, traces back to AP region
> @@ -748,6 +758,11 @@ descr:		NForce Entertainment BV
> remarks:	currently hijacks a single stolen /20 AfriNIC IPv4 net, hosted in NL
> country:	NL
> 
> +aut-num:	AS131685
> +descr:		Sun Network (Hong Kong) Limited
> +remarks:	ISP and/or IP hijacker located somewhere in AP
> +country:	AP
> +
> aut-num:	AS132369
> descr:		XIANGAO INTERNATIONAL TELECOMMUNICATION LIMITED
> remarks:	ISP located in HK, tampers with RIR data
> @@ -758,9 +773,14 @@ descr:		POWER LINE DATACENTER
> remarks:	ISP and/or IP hijacker located in HK, tampers with RIR data
> country:	HK
> 
> +aut-num:	AS133201
> +descr:		ABCDE GROUP COMPANY LIMITED
> +remarks:	ISP and/or IP hijacker located somewhere in AP
> +country:	AP
> +
> aut-num:	AS133441
> descr:		CloudITIDC Global
> -remarks:	ISP and/or IP hijacker located somehwere in AP
> +remarks:	ISP and/or IP hijacker located somewhere in AP
> country:	AP
> 
> aut-num:	AS133752
> @@ -810,7 +830,7 @@ country:	AP
> 
> aut-num:	AS136800
> descr:		ICIDC NETWORK
> -remarks:	IP hijacker located somehwere in AP, suspected to be part of the "Asline" IP hijacking gang, tampers with RIR data
> +remarks:	IP hijacker located somewhere in AP, suspected to be part of the "Asline" IP hijacking gang, tampers with RIR data
> country:	AP
> 
> aut-num:	AS136933
> @@ -923,6 +943,11 @@ descr:		Incomparable(HK)Network Co., Limited
> remarks:	ISP and/or IP hijacker located in AP area, tampers with RIR data
> country:	AP
> 
> +aut-num:	AS141746
> +descr:		Orenji Server
> +remarks:	IP hijacker located somewhere in AP area (JP?)
> +country:	AP
> +
> aut-num:	AS196682
> descr:		FLP Kochenov Aleksej Vladislavovich
> remarks:	ISP located in UA, but RIR data for announced prefixes all say EU
> @@ -933,11 +958,6 @@ descr:		ALEXHOST SRL
> remarks:	ISP located in MD, majority of RIR data for announced prefixes contain garbage, we cannot trust this network
> country:	MD
> 
> -aut-num:	AS200391
> -descr:		KREZ 999 EOOD
> -remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
> -country:	BG
> -
> aut-num:	AS200699
> descr:		Datashield, Inc.
> remarks:	fake offshore location (SC), traces back to NL
> @@ -1028,6 +1048,11 @@ descr:		Genius Guard / Genius Security Ltd.
> remarks:	another shady customer of "DDoS Guard Ltd.", probably located in RU
> country:	RU
> 
> +aut-num:	AS206819
> +descr:		ANSON NETWORK LIMITED
> +remarks:	Autonomous System registered to UK letterbox company, traces back through shady ISPs to TW
> +country:	TW
> +
> aut-num:	AS206898
> descr:		Server Hosting Pty Ltd
> remarks:	ISP located in NL, but some RIR data for announced prefixes contain garbage
> @@ -1063,11 +1088,6 @@ descr:		Altrosky Technology Ltd.
> remarks:	fake offshore location (SC), traces back to CZ and NL
> country:	EU
> 
> -aut-num:	AS207812
> -descr:		DM AUTO EOOD
> -remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
> -country:	BG
> -
> aut-num:	AS208046
> descr:		Maximilian Kutzner trading as HostSlick
> remarks:	traces back to NL, but some RIR data for announced prefixes contain garbage
> @@ -1248,6 +1268,11 @@ descr:		Sun Network Company Limited
> remarks:	IP hijacker, traces back to AP region
> country:	AP
> 
> +aut-num:	AS328608
> +descr:		Africa on Cloud
> +remarks:	... for some reason, I doubt a _real_ African ISP would announce solely hijacked prefixes
> +country:	AP
> +
> aut-num:	AS328703
> descr:		Seven Network Inc.
> remarks:	traces back to ZA
> @@ -1313,25 +1338,25 @@ descr:		Wolverine Trading, LLC
> remarks:	IP hijacker located in US, tampers with RIR data
> country:	US
> 
> -net:        5.1.68.0/24
> -descr:      GaiacomLC
> -remarks:    routed to DE, inaccurate RIR data
> -country:    DE
> +net:		5.1.68.0/24
> +descr:		GaiacomLC
> +remarks:	routed to DE, inaccurate RIR data
> +country:	DE
> 
> -net:        5.1.69.0/24
> -descr:      GaiacomLC
> -remarks:    routed to DE, inaccurate RIR data
> -country:    DE
> +net:		5.1.69.0/24
> +descr:		GaiacomLC
> +remarks:	routed to DE, inaccurate RIR data
> +country:	DE
> 
> -net:        5.1.83.0/24
> -descr:      GaiacomLC
> -remarks:    routed to DE, inaccurate RIR data
> -country:    DE
> +net:		5.1.83.0/24
> +descr:		GaiacomLC
> +remarks:	routed to DE, inaccurate RIR data
> +country:	DE
> 
> -net:        5.1.88.0/24
> -descr:      GaiacomLC
> -remarks:    routed to DE, inaccurate RIR data
> -country:    DE
> +net:		5.1.88.0/24
> +descr:		GaiacomLC
> +remarks:	routed to DE, inaccurate RIR data
> +country:	DE
> 
> net:		5.252.32.0/22
> descr:		StormWall s.r.o.
> @@ -1413,6 +1438,11 @@ descr:		Golden Internet LLC
> remarks:	fake location (KP), WHOIS contact points to RU
> country:   	RU
> 
> +net:		91.90.120.0/24
> +descr:		M247 LTD, Greenland Infrastructure
> +remarks:	... traces back to CA
> +country:   	CA
> +
> net:		91.149.194.0/24
> descr:		IP Volume Ltd. / Epik
> remarks:	fake location (CH), traces back to SE
> @@ -1488,10 +1518,10 @@ descr:		Intelcom Group Ltd
> remarks:	fake offshore location (SC), traces back to RU
> country:   	RU
> 
> -net:        185.140.204.0/22
> -descr:      Hornetsecurity GmbH
> -remarks:    all suballocations are used in DE, but are assigned to US
> -country:    DE
> +net:		185.140.204.0/22
> +descr:		Hornetsecurity GmbH
> +remarks:	all suballocations are used in DE, but are assigned to US
> +country:	DE
> 
> net:		185.175.93.0/24
> descr:		Perfect Hosting Solutions
> diff --git a/overrides/override-xd.txt b/overrides/override-xd.txt
> index 7df6188..29057d9 100644
> --- a/overrides/override-xd.txt
> +++ b/overrides/override-xd.txt
> @@ -26,24 +26,57 @@
> # Please keep this file sorted.
> #
> 
> +aut-num:	AS39770
> +descr:		1337TEAM LIMITED / eliteteam[.]to
> +remarks:	Owned by an offshore letterbox company, suspected rogue ISP
> +drop:		yes
> +
> aut-num:	AS48090
> descr:		PPTECHNOLOGY LIMITED
> remarks:	bulletproof ISP (related to AS204655) located in NL
> country:	NL
> drop:		yes
> 
> +aut-num:	AS49447
> +descr:		Nice IT Services Group Inc.
> +remarks:	Rogue ISP located in CH, but some RIR data for announced prefixes contain garbage
> +country:	CH
> +drop:		yes
> +
> +aut-num:	AS51381
> +descr:		1337TEAM LIMITED / eliteteam[.]to
> +remarks:	Owned by an offshore letterbox company, suspected rogue ISP
> +country:	RU
> +drop:		yes
> +
> +aut-num:	AS55303
> +descr:		Eagle Sky Co., Lt[d ?]
> +remarks:	Autonomous System registered to offshore company, abuse contact is a freemail address, address says "0 Market Square, P.O. Box 364, Belize", seems to trace to some location in AP vicinity
> +country:	AP
> +drop:		yes
> +
> aut-num:	AS56611
> descr:		REBA Communications BV
> remarks:	bulletproof ISP (related to AS202425) located in NL
> country:	NL
> drop:		yes
> 
> +aut-num:	AS56873
> +descr:		1337TEAM LIMITED / eliteteam[.]to
> +remarks:	Owned by an offshore letterbox company, suspected rogue ISP
> +drop:		yes
> +
> aut-num:	AS57717
> descr:		FiberXpress BV
> remarks:	bulletproof ISP (related to AS202425) located in NL
> country:	NL
> drop:		yes
> 
> +aut-num:	AS60424
> +descr:		1337TEAM LIMITED / eliteteam[.]to
> +remarks:	Owned by an offshore letterbox company, suspected rogue ISP
> +drop:		yes
> +
> aut-num:	AS62068
> descr:		SpectraIP B.V.
> remarks:	bulletproof ISP (linked to AS202425 et al.) located in NL
> @@ -62,6 +95,12 @@ remarks:	bulletproof ISP (linked to AS202425 et al.) located in NL
> country:	NL
> drop:		yes
> 
> +aut-num:	AS200391
> +descr:		KREZ 999 EOOD
> +remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
> +country:	BG
> +drop:		yes
> +
> aut-num:	AS202425
> descr:		IP Volume Inc.
> remarks:	bulletproof ISP (aka: AS29073 / Ecatel Ltd. / Quasi Networks Ltd.) located in NL
> @@ -74,6 +113,12 @@ remarks:	bulletproof ISP and IP hijacker, related to AS202425 and AS62355, trace
> country:	NL
> drop:		yes
> 
> +aut-num:	AS207812
> +descr:		DM AUTO EOOD
> +remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
> +country:	BG
> +drop:		yes
> +
> aut-num:	AS204655
> descr:		Novogara Ltd.
> remarks:	bulletproof ISP (strongly linked to AS202425) located in NL
> @@ -85,3 +130,8 @@ descr:		Datapacket Maroc SARL
> remarks:	bulletproof ISP (strongly linked to AS202425) located in NL
> country:	NL
> drop:		yes
> +
> +net:		2a10:9700::/29
> +descr:		1337TEAM LIMITED / eliteteam[.]to
> +remarks:	Owned by an offshore letterbox company, suspected rogue ISP
> +drop:		yes
> -- 
> 2.26.2


^ permalink raw reply	[flat|nested] 5+ messages in thread

* [PATCH] override-{a1,other,xd}: Regular batch of various overrides
@ 2021-12-10  7:07 Peter Müller
  2021-12-10  9:00 ` Michael Tremer
  0 siblings, 1 reply; 5+ messages in thread
From: Peter Müller @ 2021-12-10  7:07 UTC (permalink / raw)
  To: location

[-- Attachment #1: Type: text/plain, Size: 14361 bytes --]

Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
---
 overrides/override-a1.txt    |  48 ----------------
 overrides/override-other.txt | 104 ++++++++++++++++++++++-------------
 overrides/override-xd.txt    |  50 +++++++++++++++++
 3 files changed, 117 insertions(+), 85 deletions(-)

diff --git a/overrides/override-a1.txt b/overrides/override-a1.txt
index 5734c08..5fce4d9 100644
--- a/overrides/override-a1.txt
+++ b/overrides/override-a1.txt
@@ -82,11 +82,6 @@ descr:				Asiamax Ltd. VPN
 remarks:			VPN provider
 is-anonymous-proxy:		yes
 
-aut-num:			AS39770
-descr:				1337TEAM LIMITED / eliteteam[.]to
-remarks:			Owned by an offshore letterbox company, suspected rogue ISP
-is-anonymous-proxy:		yes
-
 aut-num:			AS43233
 descr:				VPS 404 Ltd.
 remarks:			VPN provider [high confidence, but not proofed] located in ES
@@ -114,12 +109,6 @@ descr:				BeeVPN ApS
 remarks:			VPN provider
 is-anonymous-proxy:		yes
 
-aut-num:			AS51381
-descr:				1337TEAM LIMITED / eliteteam[.]to
-remarks:			Owned by an offshore letterbox company, suspected rogue ISP
-is-anonymous-proxy:		yes
-country:			RU
-
 aut-num:			AS51446
 descr:				SP Argaev Artem Sergeyevich / Foundation Respect My Privacy
 remarks:			VPN provider [high confidence, but not proofed]
@@ -142,17 +131,6 @@ remarks:			Tor relay and VPN provider, traces back to SE [high confidence, but n
 is-anonymous-proxy:		yes
 country:			SE
 
-aut-num:			AS55303
-descr:				Eagle Sky Co., Lt[d ?]
-remarks:			Autonomous System registered to offshore company, abuse contact is a freemail address, address says "0 Market Square, P.O. Box 364, Belize", seems to trace to some location in AP vicinity
-is-anonymous-proxy:		yes
-country:			AP
-
-aut-num:			AS56873
-descr:				1337TEAM LIMITED / eliteteam[.]to
-remarks:			Owned by an offshore letterbox company, suspected rogue ISP
-is-anonymous-proxy:		yes
-
 aut-num:			AS58110
 descr:				IP Volume Ltd. / Epik
 remarks:			Shady Autonomous System registered to letterbox company, possibly copycat operation of Epik registrar, many prefixes announced refer to "anonymize" infrastructure
@@ -168,11 +146,6 @@ descr:				Geotelco Limited
 remarks:			VPN provider [high confidence, but not proofed]
 is-anonymous-proxy:		yes
 
-aut-num:			AS60424
-descr:				1337TEAM LIMITED / eliteteam[.]to
-remarks:			Owned by an offshore letterbox company, suspected rogue ISP
-is-anonymous-proxy:		yes
-
 aut-num:			AS60729
 descr:				Zwiebelfreunde e.V.
 remarks:			Tor relay provider
@@ -214,12 +187,6 @@ descr:				HERN Labs AB
 remarks:			VPN provider [high confidence, but not proofed]
 is-anonymous-proxy:		yes
 
-aut-num:			AS206819
-descr:				ANSON NETWORK LIMITED
-remarks:			Autonomous System registered to UK letterbox company, traces back through shady ISPs to TW
-is-anonymous-proxy:		yes
-country:			TW
-
 aut-num:			AS207688
 descr:				DataHome S.A.
 remarks:			VPN provider located in BR [high confidence, but not proofed]
@@ -1430,11 +1397,6 @@ descr:				Tredinvest LLC / bestwest[.]host
 remarks:			VPN provider or offering similar services [high confidence, but not proofed]
 is-anonymous-proxy:		yes
 
-net:				185.215.113.0/24
-descr:				1337TEAM LIMITED / eliteteam[.]to
-remarks:			Owned by an offshore letterbox company, suspected rogue ISP
-is-anonymous-proxy:		yes
-
 net:				185.220.100.0/22
 descr:				Zwiebelfreunde e.V. / F3 Netze e.V. / The Calyx Institute
 remarks:			Tor relay provider
@@ -1692,11 +1654,6 @@ descr:				LogicWeb Inc. / BGRVPN / Private Internet Access / VPNetworks / Cookie
 remarks:			Hijacked AfriNIC IP chunk mostly used by VPN providers
 is-anonymous-proxy:		yes
 
-net:				196.61.192.0/20
-descr:				Inspiring Networks LTD
-remarks:			hijacked (?) IP network owned by an offshore company [high confidence, but not proofed]
-is-anonymous-proxy:		yes
-
 net:				197.221.161.0/24
 descr:				VPNClientPublics
 remarks:			VPN provider
@@ -2031,8 +1988,3 @@ net:				2c0f:f930::/32
 descr:				Cyberdyne S.A.
 remarks:			Tor relay provider
 is-anonymous-proxy:		yes
-
-net:				2a10:9700::/29
-descr:				1337TEAM LIMITED / eliteteam[.]to
-remarks:			Owned by an offshore letterbox company, suspected rogue ISP
-is-anonymous-proxy:		yes
diff --git a/overrides/override-other.txt b/overrides/override-other.txt
index 7d76534..ca9dbad 100644
--- a/overrides/override-other.txt
+++ b/overrides/override-other.txt
@@ -85,6 +85,11 @@ descr:		Tianhai InfoTech
 remarks:	IP hijacker located somewhere in AP, massively tampers with RIR data
 country:	AP
 
+aut-num:	AS5408
+descr:		Greek Research and Technology Network (GRNET) S.A.
+remarks:	... located in GR
+country:	GR
+
 aut-num:	AS6134
 descr:		XNNET LLC
 remarks:	traces back to an unknown oversea location (HK?), seems to tamper with RIR data
@@ -363,6 +368,11 @@ descr:		CNSERVERS LLC
 remarks:	Shady ISP located in US, tampers with RIR data
 country:	US
 
+aut-num:	AS41047
+descr:		MLAB Open Source Community
+remarks:	traces back to DE
+country:	DE
+
 aut-num:	AS41466
 descr:		Treidinvest LLC
 remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
@@ -408,6 +418,11 @@ descr:		DGN TEKNOLOJI A.S.
 remarks:	ISP located in TR, but many RIR data for announced prefixes contain garbage
 country:	TR
 
+aut-num:	AS43092
+descr:		Kirin Communication Limited
+remarks:	tampers with RIR data, traces back to AP area
+country:	AP
+
 aut-num:	AS43310
 descr:		TOV "LVS"
 remarks:	ISP located in UA, but some RIR data for announced prefixes contain garbage
@@ -498,11 +513,6 @@ descr:		LLC Baxet
 remarks:	tampers with RIR data, traces back to RU
 country:	RU
 
-aut-num:	AS49447
-descr:		Nice IT Services Group Inc.
-remarks:	Rogue ISP located in CH, but some RIR data for announced prefixes contain garbage
-country:	CH
-
 aut-num:	AS49466
 descr:		KLAYER LLC
 remarks:	part of the "Asline" IP hijacking gang, traces back to AP region
@@ -748,6 +758,11 @@ descr:		NForce Entertainment BV
 remarks:	currently hijacks a single stolen /20 AfriNIC IPv4 net, hosted in NL
 country:	NL
 
+aut-num:	AS131685
+descr:		Sun Network (Hong Kong) Limited
+remarks:	ISP and/or IP hijacker located somewhere in AP
+country:	AP
+
 aut-num:	AS132369
 descr:		XIANGAO INTERNATIONAL TELECOMMUNICATION LIMITED
 remarks:	ISP located in HK, tampers with RIR data
@@ -758,9 +773,14 @@ descr:		POWER LINE DATACENTER
 remarks:	ISP and/or IP hijacker located in HK, tampers with RIR data
 country:	HK
 
+aut-num:	AS133201
+descr:		ABCDE GROUP COMPANY LIMITED
+remarks:	ISP and/or IP hijacker located somewhere in AP
+country:	AP
+
 aut-num:	AS133441
 descr:		CloudITIDC Global
-remarks:	ISP and/or IP hijacker located somehwere in AP
+remarks:	ISP and/or IP hijacker located somewhere in AP
 country:	AP
 
 aut-num:	AS133752
@@ -810,7 +830,7 @@ country:	AP
 
 aut-num:	AS136800
 descr:		ICIDC NETWORK
-remarks:	IP hijacker located somehwere in AP, suspected to be part of the "Asline" IP hijacking gang, tampers with RIR data
+remarks:	IP hijacker located somewhere in AP, suspected to be part of the "Asline" IP hijacking gang, tampers with RIR data
 country:	AP
 
 aut-num:	AS136933
@@ -923,6 +943,11 @@ descr:		Incomparable(HK)Network Co., Limited
 remarks:	ISP and/or IP hijacker located in AP area, tampers with RIR data
 country:	AP
 
+aut-num:	AS141746
+descr:		Orenji Server
+remarks:	IP hijacker located somewhere in AP area (JP?)
+country:	AP
+
 aut-num:	AS196682
 descr:		FLP Kochenov Aleksej Vladislavovich
 remarks:	ISP located in UA, but RIR data for announced prefixes all say EU
@@ -933,11 +958,6 @@ descr:		ALEXHOST SRL
 remarks:	ISP located in MD, majority of RIR data for announced prefixes contain garbage, we cannot trust this network
 country:	MD
 
-aut-num:	AS200391
-descr:		KREZ 999 EOOD
-remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
-country:	BG
-
 aut-num:	AS200699
 descr:		Datashield, Inc.
 remarks:	fake offshore location (SC), traces back to NL
@@ -1028,6 +1048,11 @@ descr:		Genius Guard / Genius Security Ltd.
 remarks:	another shady customer of "DDoS Guard Ltd.", probably located in RU
 country:	RU
 
+aut-num:	AS206819
+descr:		ANSON NETWORK LIMITED
+remarks:	Autonomous System registered to UK letterbox company, traces back through shady ISPs to TW
+country:	TW
+
 aut-num:	AS206898
 descr:		Server Hosting Pty Ltd
 remarks:	ISP located in NL, but some RIR data for announced prefixes contain garbage
@@ -1063,11 +1088,6 @@ descr:		Altrosky Technology Ltd.
 remarks:	fake offshore location (SC), traces back to CZ and NL
 country:	EU
 
-aut-num:	AS207812
-descr:		DM AUTO EOOD
-remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
-country:	BG
-
 aut-num:	AS208046
 descr:		Maximilian Kutzner trading as HostSlick
 remarks:	traces back to NL, but some RIR data for announced prefixes contain garbage
@@ -1248,6 +1268,11 @@ descr:		Sun Network Company Limited
 remarks:	IP hijacker, traces back to AP region
 country:	AP
 
+aut-num:	AS328608
+descr:		Africa on Cloud
+remarks:	... for some reason, I doubt a _real_ African ISP would announce solely hijacked prefixes
+country:	AP
+
 aut-num:	AS328703
 descr:		Seven Network Inc.
 remarks:	traces back to ZA
@@ -1313,25 +1338,25 @@ descr:		Wolverine Trading, LLC
 remarks:	IP hijacker located in US, tampers with RIR data
 country:	US
 
-net:        5.1.68.0/24
-descr:      GaiacomLC
-remarks:    routed to DE, inaccurate RIR data
-country:    DE
+net:		5.1.68.0/24
+descr:		GaiacomLC
+remarks:	routed to DE, inaccurate RIR data
+country:	DE
 
-net:        5.1.69.0/24
-descr:      GaiacomLC
-remarks:    routed to DE, inaccurate RIR data
-country:    DE
+net:		5.1.69.0/24
+descr:		GaiacomLC
+remarks:	routed to DE, inaccurate RIR data
+country:	DE
 
-net:        5.1.83.0/24
-descr:      GaiacomLC
-remarks:    routed to DE, inaccurate RIR data
-country:    DE
+net:		5.1.83.0/24
+descr:		GaiacomLC
+remarks:	routed to DE, inaccurate RIR data
+country:	DE
 
-net:        5.1.88.0/24
-descr:      GaiacomLC
-remarks:    routed to DE, inaccurate RIR data
-country:    DE
+net:		5.1.88.0/24
+descr:		GaiacomLC
+remarks:	routed to DE, inaccurate RIR data
+country:	DE
 
 net:		5.252.32.0/22
 descr:		StormWall s.r.o.
@@ -1413,6 +1438,11 @@ descr:		Golden Internet LLC
 remarks:	fake location (KP), WHOIS contact points to RU
 country:   	RU
 
+net:		91.90.120.0/24
+descr:		M247 LTD, Greenland Infrastructure
+remarks:	... traces back to CA
+country:   	CA
+
 net:		91.149.194.0/24
 descr:		IP Volume Ltd. / Epik
 remarks:	fake location (CH), traces back to SE
@@ -1488,10 +1518,10 @@ descr:		Intelcom Group Ltd
 remarks:	fake offshore location (SC), traces back to RU
 country:   	RU
 
-net:        185.140.204.0/22
-descr:      Hornetsecurity GmbH
-remarks:    all suballocations are used in DE, but are assigned to US
-country:    DE
+net:		185.140.204.0/22
+descr:		Hornetsecurity GmbH
+remarks:	all suballocations are used in DE, but are assigned to US
+country:	DE
 
 net:		185.175.93.0/24
 descr:		Perfect Hosting Solutions
diff --git a/overrides/override-xd.txt b/overrides/override-xd.txt
index 7df6188..29057d9 100644
--- a/overrides/override-xd.txt
+++ b/overrides/override-xd.txt
@@ -26,24 +26,57 @@
 # Please keep this file sorted.
 #
 
+aut-num:	AS39770
+descr:		1337TEAM LIMITED / eliteteam[.]to
+remarks:	Owned by an offshore letterbox company, suspected rogue ISP
+drop:		yes
+
 aut-num:	AS48090
 descr:		PPTECHNOLOGY LIMITED
 remarks:	bulletproof ISP (related to AS204655) located in NL
 country:	NL
 drop:		yes
 
+aut-num:	AS49447
+descr:		Nice IT Services Group Inc.
+remarks:	Rogue ISP located in CH, but some RIR data for announced prefixes contain garbage
+country:	CH
+drop:		yes
+
+aut-num:	AS51381
+descr:		1337TEAM LIMITED / eliteteam[.]to
+remarks:	Owned by an offshore letterbox company, suspected rogue ISP
+country:	RU
+drop:		yes
+
+aut-num:	AS55303
+descr:		Eagle Sky Co., Lt[d ?]
+remarks:	Autonomous System registered to offshore company, abuse contact is a freemail address, address says "0 Market Square, P.O. Box 364, Belize", seems to trace to some location in AP vicinity
+country:	AP
+drop:		yes
+
 aut-num:	AS56611
 descr:		REBA Communications BV
 remarks:	bulletproof ISP (related to AS202425) located in NL
 country:	NL
 drop:		yes
 
+aut-num:	AS56873
+descr:		1337TEAM LIMITED / eliteteam[.]to
+remarks:	Owned by an offshore letterbox company, suspected rogue ISP
+drop:		yes
+
 aut-num:	AS57717
 descr:		FiberXpress BV
 remarks:	bulletproof ISP (related to AS202425) located in NL
 country:	NL
 drop:		yes
 
+aut-num:	AS60424
+descr:		1337TEAM LIMITED / eliteteam[.]to
+remarks:	Owned by an offshore letterbox company, suspected rogue ISP
+drop:		yes
+
 aut-num:	AS62068
 descr:		SpectraIP B.V.
 remarks:	bulletproof ISP (linked to AS202425 et al.) located in NL
@@ -62,6 +95,12 @@ remarks:	bulletproof ISP (linked to AS202425 et al.) located in NL
 country:	NL
 drop:		yes
 
+aut-num:	AS200391
+descr:		KREZ 999 EOOD
+remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
+country:	BG
+drop:		yes
+
 aut-num:	AS202425
 descr:		IP Volume Inc.
 remarks:	bulletproof ISP (aka: AS29073 / Ecatel Ltd. / Quasi Networks Ltd.) located in NL
@@ -74,6 +113,12 @@ remarks:	bulletproof ISP and IP hijacker, related to AS202425 and AS62355, trace
 country:	NL
 drop:		yes
 
+aut-num:	AS207812
+descr:		DM AUTO EOOD
+remarks:	another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
+country:	BG
+drop:		yes
+
 aut-num:	AS204655
 descr:		Novogara Ltd.
 remarks:	bulletproof ISP (strongly linked to AS202425) located in NL
@@ -85,3 +130,8 @@ descr:		Datapacket Maroc SARL
 remarks:	bulletproof ISP (strongly linked to AS202425) located in NL
 country:	NL
 drop:		yes
+
+net:		2a10:9700::/29
+descr:		1337TEAM LIMITED / eliteteam[.]to
+remarks:	Owned by an offshore letterbox company, suspected rogue ISP
+drop:		yes
-- 
2.26.2

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2022-01-16 11:19 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-01-09 12:48 [PATCH] override-{a1,other,xd}: Regular batch of various overrides Peter Müller
  -- strict thread matches above, loose matches on Subject: below --
2022-01-16 11:19 Peter Müller
2021-12-10  7:07 Peter Müller
2021-12-10  9:00 ` Michael Tremer
2021-12-10  9:36   ` Peter Müller

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox