From patchwork Mon Sep 27 15:21:58 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Peter_M=C3=BCller?= X-Patchwork-Id: 4742 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384 client-signature ECDSA (P-384) client-digest SHA384) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4HJ5w94lS9z3x1J for ; Mon, 27 Sep 2021 15:22:01 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4HJ5w91Zldz192; Mon, 27 Sep 2021 15:22:01 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4HJ5w90qTXz2xgV; Mon, 27 Sep 2021 15:22:01 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384 client-signature ECDSA (P-384) client-digest SHA384) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4HJ5w81MF0z2xPJ for ; Mon, 27 Sep 2021 15:22:00 +0000 (UTC) Received: from people01.haj.ipfire.org (people01.haj.ipfire.org [172.28.1.161]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384 client-signature ECDSA (P-384) client-digest SHA384) (Client CN "people01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4HJ5w735NPz192; Mon, 27 Sep 2021 15:21:59 +0000 (UTC) Received: by people01.haj.ipfire.org (Postfix, from userid 1078) id 4HJ5w71kScz2xKC; Mon, 27 Sep 2021 15:21:59 +0000 (UTC) From: =?utf-8?q?Peter_M=C3=BCller?= To: location@lists.ipfire.org Subject: [PATCH] override-{a3,other}: regular batch of various overrides Date: Mon, 27 Sep 2021 15:21:58 +0000 Message-Id: <20210927152158.19521-1-peter.mueller@ipfire.org> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 X-BeenThere: location@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: location-bounces@lists.ipfire.org Sender: "Location" Signed-off-by: Peter Müller --- overrides/override-a3.txt | 10 ++++++++++ overrides/override-other.txt | 20 ++++++++++++++++++++ 2 files changed, 30 insertions(+) diff --git a/overrides/override-a3.txt b/overrides/override-a3.txt index 83bfb24..6b8f886 100644 --- a/overrides/override-a3.txt +++ b/overrides/override-a3.txt @@ -1790,6 +1790,16 @@ descr: Informatics Solutions Limited remarks: Generic anycast network is-anycast: yes +net: 2001:978:1403::/48 +descr: HAProxy Technologies, Inc. +remarks: Hosted HAProxy Anycast services? +is-anycast: yes + +net: 2600:1400::/24 +descr: Akamai Technologies, Inc. +remarks: Worldwide CDN, does not make sense to assign their networks to a specific country +is-anycast: yes + net: 2606:4700:4700::/48 descr: Cloudflare, Inc. remarks: Public anycast DNS resolver diff --git a/overrides/override-other.txt b/overrides/override-other.txt index e99325b..581ca5a 100644 --- a/overrides/override-other.txt +++ b/overrides/override-other.txt @@ -459,6 +459,11 @@ descr: LLC Baxet remarks: tampers with RIR data, traces back to RU country: RU +aut-num: AS49447 +descr: Nice IT Services Group Inc. +remarks: Rogue ISP located in CH, but some RIR data for announced prefixes contain garbage +country: CH + aut-num: AS49466 descr: KLAYER LLC remarks: part of the "Asline" IP hijacking gang, traces back to AP region @@ -824,6 +829,11 @@ descr: SANREN DATA LIMITED remarks: IP hijacker located somewhere in AP region, tampers with RIR data country: AP +aut-num: AS139640 +descr: HK NEW CLOUD TECHNOLOGY LIMITED +remarks: ISP and/or IP hijacker located in AP area, tampers with RIR data +country: AP + aut-num: AS139646 descr: HONG KONG Megalayer Technology Co.,Limited remarks: ISP and/or IP hijacker located in HK, tampers with RIR data @@ -1069,6 +1079,11 @@ descr: Gudaev Maxim Amrakhovich remarks: announcements scatter across various places in EU (DE/CZ/??), but RIR data contain garbage country: EU +aut-num: AS209519 +descr: Packet Flip, LLC +remarks: ISP located in US, but some RIR data for announced prefixes contain garbage +country: US + aut-num: AS210119 descr: VPSSC Networks LTD remarks: ISP located in UA, but RIR data for announced prefixes contain garbage @@ -1349,6 +1364,11 @@ descr: IP Volume Ltd. / Epik remarks: fake location (CH), traces back to NO country: NO +net: 91.216.210.0/24 +descr: EasyForex Ltd. +remarks: fake location (CY), traces to IE area +country: IE + net: 91.243.32.0/19 descr: Petersburg Internet Network Ltd. remarks: RIR data for suballocations contain garbage, they are all located in RU