Re: digitalelement.com GeoIP?
You may try to check and reach InfoSniper instead. https://community.hulu.com/s/idea/0871L00V3ntQAC/detail (https://community.hulu.com/s/idea/0871L00V3ntQAC/detail) M. Omer GOLGELI --- AS202365 https://as202365.peeringdb.com (https://as202365.peeringdb.com) https://bgp.he.net/AS202365 (https://bgp.he.net/AS202365) NOC: Phone: +90-533-2600533 Email: o...@chronos.com.tr (mailto:o...@chronos.com.tr) January 24, 2020 11:21 AM, "Justin Wilson" mailto:li...@mtin.net?to=%22Justin%20Wilson%22%20)> wrote: Has anyone have a contact with digitalelement.com (http://digitalelement.com) and their GeoIP stuff? We received a new ipv4 block from ARIN last week and HULU tells digitalelement.com (http://digitalelement.com) is who they use. Our new block is not being coded correctly. I can not find any sort of technical contact on the Digital Element web-site. It’s all marketing stuff. Any help would be appreciated. Justin Wilson j...@mtin.net (mailto:j...@mtin.net) — https://j2sw.com (https://j2sw.com) - All things jsw (AS209109) https://blog.j2sw.com (https://blog.j2sw.com) - Podcast and Blog
Re: Spamming of NANOG list members
There are also variants of it with subjects like " Ref Id: %VARIABLE% " and "%Domain.tld% Ref Id: %VARIABLE% " And as Bryan said, we are increasingly getting more and more as well. M. Omer GOLGELI --- AS202365 June 1, 2019 6:05 AM, "Richard" mailto:rgolod...@infratection.com?to=%22Richard%22%20)> wrote: On 5/31/19 8:07 PM, Niels Bakker wrote: * br...@shout.net (mailto:br...@shout.net) (Bryan Holloway) [Sat 01 Jun 2019, 01:54 CEST]:Anybody else noticed a significant uptick in these e-mails? When I first saw this thread, I hadn't seen any. A couple days later, I got my first one. (yay!) Now I'm getting 2-3 a day. (yay?) Yes. It's pretty annoying. And somebody seems to be burning through a lot of stolen credentials. I wonder what the success rate is... -- Niels. I am getting several a day as well as ugly MS Word based trojan. They come to me from all over the world with the subject line: "NANOG Payment Remittance Advice" I agree with Niels, someone or some spamming outfit is burning through quite a bit of stolen credentials. Richard Golodner Infratection
Re: Most peered AS per country
Checking Isolario Project, I've noticed in Isolario has something country-related as they are displaying country statics on the main page (Screenshot attached) Even if they do not publicly display the data, maybe the guys have something! Alessandro might give you better insight I guess. M. OMER GOLGELI --- AS202365 [1] https://as202365.peeringdb.com [2] https://bgp.he.net/AS202365 [1] NOC: Phone: +90-533-2600533 Email: o...@chronos.com.tr On 2018-11-28 04:37, Mehmet Akcin wrote: > Hello there, > > http://as-rank.caida.org/ is impressively showing ranking of ISPs and how > well peered they are and I love this. > > Is there any research / page similar to this which shows similar data but per > country basis breakdown instead of showing globally? > > thanks in advance for your help > > Mehmet Links: -- [1] https://bgp.he.net/AS202365 [2] https://as202365.peeringdb.com/
Re: Unsolicited LinkedIn requests
Well said... But I can't see that on his website... M. OMER GOLGELI --- AS202365 On 2018-12-12 00:39, Daniel Corbe wrote: If you don’t want people contacting you on Linkedin then why do you have a link to your profile on your website? at 4:08 PM, Alfie Pates wrote: Hi folks, I'm not going to name-and-shame, but I just got a LinkedIn connection request completely out of the blue from somebody with the comment "Greetings from another NANOG user!" I didn't recognise the name, and a quick search of my email history suggests we haven't interacted before. Please don't do this: It's not very polite. ~A
Re: Unsolicited LinkedIn requests
Well, that must be my curse... Even when adblocker doesn't notify me, I have stuff blocking stuff... :) M. OMER GOLGELI --- AS202365 [1] https://as202365.peeringdb.com [2] https://bgp.he.net/AS202365 [1] NOC: Phone: +90-533-2600533 Email: o...@chronos.com.tr On 2018-12-12 00:57, Daniel Corbe wrote: > at 4:48 PM, M. Omer GOLGELI wrote: > Well said... > > But I can't see that on his website... > > M. OMER GOLGELI > --- > AS202365 > > On 2018-12-12 00:39, Daniel Corbe wrote: > If you don't want people contacting you on Linkedin then why do you > have a link to your profile on your website? > at 4:08 PM, Alfie Pates wrote: > Hi folks, > I'm not going to name-and-shame, but I just got a LinkedIn connection request > completely out of the blue from somebody with the comment "Greetings from > another NANOG user!" > I didn't recognise the name, and a quick search of my email history suggests > we haven't interacted before. > Please don't do this: It's not very polite. > ~A Links: -- [1] https://bgp.he.net/AS202365 [2] https://as202365.peeringdb.com/
Re: Unsolicited LinkedIn requests
Well, that must be my curse... Even when adblocker doesn't notify me, I have stuff blocking stuff... :) M. OMER GOLGELI --- AS202365 [1] https://as202365.peeringdb.com [2] https://bgp.he.net/AS202365 [1] NOC: Phone: +90-533-2600533 Email: o...@chronos.com.tr On 2018-12-12 00:57, Daniel Corbe wrote: > at 4:48 PM, M. Omer GOLGELI wrote: > Well said... > > But I can't see that on his website... > > M. OMER GOLGELI > --- > AS202365 > > On 2018-12-12 00:39, Daniel Corbe wrote: > If you don't want people contacting you on Linkedin then why do you > have a link to your profile on your website? > at 4:08 PM, Alfie Pates wrote: > Hi folks, > I'm not going to name-and-shame, but I just got a LinkedIn connection request > completely out of the blue from somebody with the comment "Greetings from > another NANOG user!" > I didn't recognise the name, and a quick search of my email history suggests > we haven't interacted before. > Please don't do this: It's not very polite. > ~A Links: -- [1] https://bgp.he.net/AS202365 [2] https://as202365.peeringdb.com/
Re: historical Bogon lists
I think Alessandro Isolario Project may be of help completing the missing data where you fell short. M. --- On 2018-12-19 18:07, Alberto Dainotti wrote: Hi all, CAIDA has been collecting Team Cymru’s bogon list from 2013-09-18 to 2018-03-23. Unfortunately we just noticed the script hasn’t been working since then but we just fixed it and restarted it. We’re happy to share the data as long as Team Cymru’s is ok with it. Cheers, Alberto PS I think Rabbi+Randy also helped us in the past by recovering diffs for 2010-2013 data. Looking for the files. Stay tuned. On Dec 18, 2018, at 9:00 AM, Rabbi Rob Thomas wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Dear Tom, I wonder if there's value in having the lists that Team Cymru generates auto pushed to a public Git repo. Covers historical changes for folks who want that, and also provides a more modern ingestion method for automation around that info. (Not that I'm hating on wget / curl ... :) ) We'd be happy to make that happen, if folks are keen. We're fine with Git, as we use it regularly. Be well! Rob. - -- Rabbi Rob Thomas Team Cymru "It is easy to believe in freedom of speech for those with whom we agree." - Leo McKern -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEDcVjavXj08cL/QwdQ+hhYvqF8o0FAlwZJ5wACgkQQ+hhYvqF 8o2ULQ/+N++KAtZkfuYvzjnAwFQZGWvfTmFcmEwQKtbS+O53ymn2tGfMf/NjZKrS AyJdiNby1PFjDd4X/4bKsm1k4pOcqIvWHrNuQfSCMnsAAVlWWZr1SWjkV+rD2o80 XSrpz1nXYFH/Et3TMedc6fKLt6UgKlfua1t7xm4pBypjSHTBari601cvGMqa++4k wqAB5KUoIC1Ni5GVff1i+NCQ+6kfuVvXvnTHBjq6q6O+rLC5KpQwI/9pY3J5LODm 3nfqPYEo/otNRn/vX4lENMI/3lrMIXC4NO8fjYDgStVZ/1CZVWzxNFc4MgplpwKJ k/VLYnkuai7o4yT5Ao4xhKIctGOO79v8Gmgv9NJUXkfcqrL+EVI6FGQoWB8PiHxI ZWppA3kdiB7csG+zHG/+hliB5xI3SzlvNH/ywPzym06FLK5/1yKSI788qjyXBgZ4 h/Vs14DSrtqw/VlgBAV0f25PPJllmZeJwrtgqGzgwakLKqrk9ByCHBA77Xhk3XN8 Y5klq2uE8n2tYq5RHlUg1/+jdj6kQo2APHN7Q3H7FWv0CrW8JluHQdb7dLCnqFR8 Obo4H/G1DtjR60ECXvnS7X/6Fzs0KZFhd0E+jAbb2ErKQ2ZL+6+XuzaCXkDJ3oEp M+RftjLnwywE1MNf7q3Hmrpt3ku7HKjDQjvLZv2h8/f92rwy/1M= =i27M -END PGP SIGNATURE-
Re: Real-time BGP hijacking detection: ARTEMIS-1.0.0 just released
Hi Vasileios, Congratulations of building this. Wanted to try it out as a VM but frankly... The "docker" part put me off... M. --- On 2018-12-20 20:23, Vasileios Kotronis wrote: Dear operators, FORTH's INSPIRE group and CAIDA are delighted to announce the public release of the ARTEMIS BGP prefix hijacking detection tool, available as open-source software at https://github.com/FORTH-ICS-INSPIRE/artemis ARTEMIS is designed to be operated by an AS in order to monitor BGP for potential hijacking attempts against its own prefixes. The system detects such attacks within seconds, enabling immediate mitigation. The current release has been tested at a major greek ISP, a dual-homed edge academic network, and a major US R&E backbone network. We would be happy if you'd give it a try and provide feedback. Feel free to make pull requests on GitHub and help us make this a true community project. ARTEMIS is funded by European Research Council (ERC) grant agreement no. 338402 (NetVolution Project), the RIPE NCC Community Projects 2017, the Comcast Innovation Fund, US NSF grants OAC-1848641 and CNS-1423659 and US DHS S&T contract HHSP233201600012C. Best regards, Vasileios
Merhaba
Selamlar M. Omer GOLGELI --- AS202365 https://as202365.peeringdb.com https://bgp.he.net/AS202365 NOC: Phone: +90-533-2600533 Email: o...@chronos.com.tr