I have just received a spam which has a so-called "payload" URL which
the spammer wants me to visit, apparently so that I can be sold some
male performance drugs of dubious origin.

The domain part of the URL resolves to the IPv4 address 217.8.117.98.

That address lies within a pair of bogon (unallocated) IPv4 address
blocks, 217.8.116.0/24 and 217.8.117.0/24, that are both being routed
by a common ASN, i.e. AS47510.

https://bgp.he.net/AS47510#_prefixes

It appears that AS47510 is itself an unallocated bogon at the present
time:

https://bgp.he.net/AS47510#_asinfo

As can be readily seen at the above link, AS47510 is peering with only
two other ASNs, i.e. AS29226 - JSC Mastertel (Russia) and AS35555 -
Crex Fex Pex Internet System Solutions" LLC.

The latter ASN, AS35555 also appears to be an unallocated bogon ASN
at the present time.  Nontheless, that does not appear to be preventing
it from peering with yet another Russian network, AS213254 - OOO Rait
Telecom:

https://bgp.he.net/AS35555

It would be Nice, in my opinion, if someone who speaks Russian could
make contact with the operators of AS29226 and AS213254 and respectfully
suggest to them that they should cease peering with bogon ASNs, such as
AS47510 and AS35555, including but not limited to bogon ASNs that are
at present routing bogon IPv4 address space.


Regards,
rfg


P.S.  It appears that the company "Crex Fex Pex Internet System Solutions,
LLC" which was the former owner of AS47510 and AS35555 and also AS60031
was a Russian entity, and one that most likely no longer qualifies as
what one would call a "going concern":

https://crex-fex-pex.ru/


Reply via email to