On 2/27/2003 at 9:58 PM, [EMAIL PROTECTED] wrote:

> ...
> NetRange:   69.6.0.0 - 69.6.63.255
> CIDR:       69.6.0.0/18
> NetName:    WHOLE-2
> NetHandle:  NET-69-6-0-0-1
> Parent:     NET-69-0-0-0-0
> NetType:    Direct Allocation
> NameServer: NS1.WHOLESALEBANDWIDTH.COM
> NameServer: NS2.WHOLESALEBANDWIDTH.COM
> ...

> Where are the swips?  The rest of that record makes no mention of an
> rwhois server.  Doing a bunch of whois requests for IPs in that block, I
> found only one swip (for a /21).  I realize the ARIN regs don't seem to
> require that reassignment info be made available to the public (just to
> ARIN), but using your innocent customers (if there are any) as a shield to
> hide your spammer customers is just wrong.  Should I block 69.6.4.0/24
> from sending email into my systems?  69.6.0.0/18?

Correct answer: the /18, and then some.

Oh, how you wished you hadn't posted this to the list (and Cc:'d
wholesalebandwidth.com on it), but chosen reply-to-poster :)

Random example from this block appearing in my rejects:
http://www.openrbl.org/lookup?i=69.6.4.153 or: "I see red!"

Extended answer directly from my auto-complaint override map:

 'as:26956' => 'as:17054,isp:cogent', # netfreeinc.com/wholesalebandwidth.com - rogue 
AS
 'as:11938' => '[EMAIL PROTECTED],isp:verio', # wholesalebandwidth.com - rogue AS
 'as:17054' => '[EMAIL PROTECTED],isp:genuity,[EMAIL PROTECTED],isp:gblx', # 
e-xpedient.com - rogue AS?

Anything announced out of 26956 and 11938 goes straight to the sendmail
access file here, and given the various pointers from OTHER rogues back
to 17054, e-xpedient.com routes will be there RSN, too.


And if you thought /18 is a big block in spammer-hand, go check out various
DNSBLs for listings and the history of AS's announcing portions of:

142.105.0.0/16
162.73.0.0/16
160.122.0.0/16
157.156.0.0/16
138.121.0.0/16
160.116.0.0/16
144.176.0.0/16
146.100.0.0/16

Reply via email to