On Wed, 29 May 2019, Paul Ferguson wrote:
AS | IP | AS Name
14061 | 68.183.65[.]234| DIGITALOCEAN-ASN - DigitalOcean, LLC, US (shared
hosting)
16276 | 158.69.127[.]22| OVH, FR (shared hosting)
51167 | 173.249.2[.]31 | CONTABO, DE (shared hosting)
46475 |
> On May 29, 2019, at 9:14 AM, Niels Bakker wrote:
>
> * fergdawgs...@mykolab.com (Paul Ferguson) [Wed 29 May 2019, 18:04 CEST]:
>> This is apparently (?) part of a wave of spoofed malspams impersonating
>> messages with ‘weaponized' attachments sent to the NANOG (North American
>> Network
* fergdawgs...@mykolab.com (Paul Ferguson) [Wed 29 May 2019, 18:04 CEST]:
This is apparently (?) part of a wave of spoofed malspams
impersonating messages with ‘weaponized' attachments sent to the
NANOG (North American Network Operators Group) mailing list.
They're not sent to the list,
*Just an FYI, the obfuscated URLs and IPs below are malicious.*
This is apparently (?) part of a wave of spoofed malspams impersonating
messages with ‘weaponized' attachments sent to the NANOG (North American
Network Operators Group) mailing list. Background:
4 matches
Mail list logo