From patchwork Sat Feb 5 17:17:57 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Peter_M=C3=BCller?= X-Patchwork-Id: 5084 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384 client-signature ECDSA (P-384) client-digest SHA384) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4JrfHc2NbFz3xfS for ; Sat, 5 Feb 2022 17:18:04 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4JrfHZ2vcrz1GD; Sat, 5 Feb 2022 17:18:02 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4JrfHZ0PYwz2xfN; Sat, 5 Feb 2022 17:18:02 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4JrfHY4tWrz2xd1 for ; Sat, 5 Feb 2022 17:18:01 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4JrfHX1prczbp for ; Sat, 5 Feb 2022 17:17:59 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1644081480; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=F/fPpOcMUQSfmacAiICxUrmyHoYkrf+5nB8zUH9nhGE=; b=g1V4yPYhwqWIWJS09zhQTAIDH2mFnCLpUpNs+dvAfTLQ/Y87rNef0g8PGEkHFnM2cvd32j NHhyVLNnhwdaWgCQ== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1644081480; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=F/fPpOcMUQSfmacAiICxUrmyHoYkrf+5nB8zUH9nhGE=; b=tBqUgjZLh86VoSk4J4/ik5TPOfydtcV8sXy4SJsr+x1h68HhyUfovM0QSF6oVW7X23Vz8F xhRmV1nFLJ9yOCOYxwpx/2hoHPcj45nc5cObZ1sl3LI24VRhVSaPdY6SrISrej48Fkhs9t 5dvd3mMrL1fIfKJHwDemTFY3Xe9gBDhoX2cRdW102xYW3i4A16JNuQjCX+Q929gbpE74E7 1HgGnmEzesqeQKxn+J0z5+VAGf2+z23b4Cicg7hAHKXO61NiwE6QpMPURRmW/kzFnNxUEh mavHOyvnNfIi7dJjW7gPobV8MSfg3dzZjHyqvgQe8Osn7qOxCptft2jPL40AvQ== Message-ID: Date: Sat, 5 Feb 2022 17:17:57 +0000 MIME-Version: 1.0 Content-Language: en-US To: "IPFire: Location" From: =?utf-8?q?Peter_M=C3=BCller?= Subject: [PATCH 1/2] override-other: Fix netcup IP ranges actually located in AT X-BeenThere: location@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: location-bounces@lists.ipfire.org Sender: "Location" See: https://lists.ipfire.org/pipermail/location/2022-January/000519.html Reported-by: Martin Gebhardt Signed-off-by: Peter Müller --- overrides/override-other.txt | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/overrides/override-other.txt b/overrides/override-other.txt index b74c1e3..01cd324 100644 --- a/overrides/override-other.txt +++ b/overrides/override-other.txt @@ -1518,6 +1518,11 @@ descr: Amarutu Technology Ltd. / KoDDoS / ESecurity remarks: fake offshore location (BZ), traces back to US country: US +net: 89.58.16.0/22 +descr: netcup GmbH +remarks: https://lists.ipfire.org/pipermail/location/2022-January/000519.html +country: AT + net: 91.90.120.0/24 descr: M247 LTD, Greenland Infrastructure remarks: ... traces back to CA @@ -1773,6 +1778,11 @@ descr: Securebit AG remarks: ... who thinks assigning networks to unpopulated Bouvet Island (BV) is funny :-/ country: CH +net: 2a0a:4cc0::/40 +descr: netcup GmbH +remarks: https://lists.ipfire.org/pipermail/location/2022-January/000519.html +country: AT + net: 2a0e:b100:3000::/40 descr: 4b42 UG (haftungsbeschränkt) remarks: ... who thinks assigning networks to unpopulated Bouvet Island (BV) is funny :-/ From patchwork Sat Feb 5 17:18:17 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Peter_M=C3=BCller?= X-Patchwork-Id: 5085 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4JrfHw57KXz3xfS for ; Sat, 5 Feb 2022 17:18:20 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4JrfHw0LfLzbp; Sat, 5 Feb 2022 17:18:20 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4JrfHw0nXKz2xy1; Sat, 5 Feb 2022 17:18:20 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4JrfHv4b39z2xfN for ; Sat, 5 Feb 2022 17:18:19 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384)) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4JrfHt3CWhzbp for ; Sat, 5 Feb 2022 17:18:18 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1644081498; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=xTRqqP+JOOus1j2ATuah+X5hK3b3G6tMLGxgAukG8jw=; b=2SZk484XJy7cqw+vDS0lp9F9K9d2P3qs7UKY2oyAoVgV7bAqeMW3hOH3FD/VtXPJnRa07M dQvrs677nwSyWMAQ== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1644081498; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=xTRqqP+JOOus1j2ATuah+X5hK3b3G6tMLGxgAukG8jw=; b=cARrE+yJlAYPD9YvKcw8SlcLjksbo30jYZIKCrTBid2tN49EKCFyxPYSQPyOvHHjQNXsoK jIcDb1eD/aT2cBBHJmCLJBorjtiSaTknD99u5obviztDd7dIrnNKeGMqrn2Hpz8Rhukk9G CgztvE/MuvK6s9buX5yZ4CM6JvD9W4KZy85Rk1DoBvMcfUiwvjVkwus3/br2rt/6Ty5ZBK Tq3gXVMU7D13LuMDVG/Dzuh/Llj8/iydGt4aOdTImJtaxeE3lT+xA2CLs8hEeCTNhsJU0N 3oE9DlFtxNUNjdnujAxIYZSXZDos430RI/CULX9smIuJLLlS8hV2LIuf1DZblw== Message-ID: Date: Sat, 5 Feb 2022 17:18:17 +0000 MIME-Version: 1.0 Subject: [PATCH 2/2] override-{a1,a3,other}: Regular batch of various overrides Content-Language: en-US To: location@lists.ipfire.org References: From: =?utf-8?q?Peter_M=C3=BCller?= In-Reply-To: X-BeenThere: location@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: location-bounces@lists.ipfire.org Sender: "Location" These came to my attention the other day. Signed-off-by: Peter Müller --- overrides/override-a1.txt | 5 +++++ overrides/override-a3.txt | 5 +++++ overrides/override-other.txt | 32 ++++++++++++++++++++++++++------ 3 files changed, 36 insertions(+), 6 deletions(-) diff --git a/overrides/override-a1.txt b/overrides/override-a1.txt index a97e7ce..ec0234f 100644 --- a/overrides/override-a1.txt +++ b/overrides/override-a1.txt @@ -1069,6 +1069,11 @@ descr: Panq B.V. remarks: VPN provider [high confidence, but not proofed] is-anonymous-proxy: yes +net: 138.99.208.0/22 +descr: ESECURITY & ENTERTAINMENT LTD / PureVPN +remarks: VPN provider +is-anonymous-proxy: yes + net: 138.117.53.0/24 descr: Proxy Brazil / Global Flash Telecom remarks: VPN provider [high confidence, but not proofed] diff --git a/overrides/override-a3.txt b/overrides/override-a3.txt index ce51889..da78310 100644 --- a/overrides/override-a3.txt +++ b/overrides/override-a3.txt @@ -1820,6 +1820,11 @@ descr: marbis GmbH remarks: Generic anycast network [high confidence, but not proofed] is-anycast: yes +net: 2a04:de40:1c0::/42 +descr: CreeperHost LTD +remarks: Generic anycast network +is-anycast: yes + net: 2a05:7f00::/29 descr: nic.at GmbH and friends remarks: TLD operator's anycast network diff --git a/overrides/override-other.txt b/overrides/override-other.txt index 01cd324..dd411dc 100644 --- a/overrides/override-other.txt +++ b/overrides/override-other.txt @@ -87,7 +87,7 @@ remarks: has no sane AS name set in APNIC DB aut-num: AS4842 descr: Tianhai InfoTech -remarks: IP hijacker located somewhere in AP, tampers with RIR data +remarks: ISP located somewhere in AP country: AP aut-num: AS5408 @@ -253,6 +253,11 @@ descr: Leaseweb Deutschland GmbH remarks: ISP located in Frankfurt/Main, DE, but many RIR data for announced prefixes contain garbage country: DE +aut-num: AS29405 +descr: ABGON Comunicaciones +remarks: ISP located in SK, but some RIR data for announced prefixes contain garbage (BZ) +country: SK + aut-num: AS30633 descr: Leaseweb USA, Inc. remarks: ISP located in US, but some RIR data for announced prefixes contain garbage (BZ) @@ -578,6 +583,11 @@ descr: DDoS Guard Ltd. / Cognitive Cloud LLP remarks: another shady customer or branch of "DDoS Guard Ltd.", jurisdiction is probably RU, but traceroutes dead-end somewhere else in EU country: EU +aut-num: AS49870 +descr: Alsycon BV +remarks: ISP located in NL, but some RIR data for announced prefixes contain garbage +country: NL + aut-num: AS49921 descr: F.I.H. FORMULA INVESTMENT HOUSE CLEARING LIMITED remarks: claims GR for announced prefixes, but traceroutes dead-end somewhere else in EU @@ -718,11 +728,6 @@ descr: Vault Dweller OU remarks: traceroutes dead-end somewhere in or near RU country: RU -aut-num: AS59796 -descr: Stormwall s.r.o -remarks: appears to scatter across EU at least, RIR data contain garbage, might be an A3 candidate -country: EU - aut-num: AS60144 descr: 3W Infra B.V. remarks: ISP located in NL, but some RIR data for announced prefixes contain garbage @@ -858,6 +863,11 @@ descr: Leaseweb Japan K.K. remarks: ISP located in JP, some RIR data for announced prefixes contain garbage country: JP +aut-num: AS134428 +descr: Brother Internet Technology Co.,Ltd +remarks: ISP located in HK, some RIR data for announced prefixes contain garbage +country: HK + aut-num: AS134548 descr: DXTL Tseung Kwan O Service remarks: tampers with RIR data, traces back to AP region @@ -1038,6 +1048,11 @@ descr: AVATEL TELECOM remarks: ISP located in ES, but some RIR data for announced prefixes contain garbage country: ES +aut-num: AS201702 +descr: skHosting.eu s.r.o. +remarks: ISP located in SK, but some RIR data for announced prefixes contain garbage +country: SK + aut-num: AS201118 descr: Intelcom Group Ltd. remarks: ISP located in RU, but some RIR data for announced prefixes contain garbage @@ -1648,6 +1663,11 @@ descr: Amarutu Technology Ltd. / KoDDoS / ESecurity remarks: fake offshore location (BZ), traces back to US country: US +net: 185.170.129.0/24 +descr: ICLIK SARL +remarks: traces back to NL +country: NL + net: 185.193.91.0/24 descr: Romanenko Stanislav Sergeevich remarks: bulletproof ISP related to AS204655, traces back to BG