If so, can you contact me offlist? I seem to have a subnet that you guys don't
like.
Thank You,
Mike
Could someone from GoDaddy please contact me off list? Running into issues
where customers on our network are not able to reach their sites due to
blackhole because of phishing sites that are on the shared IP.
Thanks
Joe Crowe
Comcast
Can someone from Go Daddy contact me off-list about a shared customer issue?
Mark
Comcast DNS
Even if the customers are unaware of the spoofed traffic, ISPs
should be aware which leaves them open for "aiding and abetting".
This doesn't require inspecting the payload of the packets. This
is the IP header which they are expected to examine and for which
there is a BCP saying to drop spoofed
As far as I can tell, AS394786 (Avetria Wireless) made up both AS135022
and the associated bogon IP ranges that AS announces (103.206.16.0/22 &
182.161.32.0/22) for its own use. Avetria's sole upstream provider
appears to be AS54889 (Bluwest Inc). Probably an issue to discuss with
both of these
According to HE's BGP tool, the IP range is actually 103.206.16.0/22 and
it looks like it's a bogon.
http://bgp.he.net/net/103.206.16.0/22#_bogon
Regards,
Filip
On 29.9.2016 21:46, Ken Chase wrote:
My turn for the newb question:
I've got a traceroute with this IP in it thats close to the end
Hello PeeringDB users / hello NANOG,
the PeeringDB Product Committee (PC, [0]) is charged with steering the
future product development and running the market outreach efforts to
continuously improve the value that PeeringDB delivers to the networks
registered with PeeringDB, and the broader commun
My turn for the newb question:
I've got a traceroute with this IP in it thats close to the end of the trace.
103.206.16.46
Chasing down this IP to see who the ISP a friend is using, figured out
the diff between ARIN and APNIC whois for IPs (..bit of a learning curve, not
sure why there's not
by chance -
anyone have a clueful contact at the detroit pistons who can help resolve
an https MITM proxy problem? (likely a misconfigured watchguard.)
trying to diagnose a proxy level certificate problem through a management
level proxy is less than fun.
A quick update on this change: A 2048-bit ZSK has been pre-published in the
root zone as of September 20. We are not aware of any issues related to the
appearance of the larger key.
In less than 48 hours we will being publishing root zones signed with the
2048-bit ZSK. I will send another not
Well there is money to be made in DDoS protection... See our
"friends" still hosting "those" pay sites.
Do not expect the vendors to cut themself of that market.
-
Alain Hebertaheb...@pubnix.net
PubNIX Inc.
50 boul. St-Charles
P.O. Box 26770
In a message written on Tue, Sep 27, 2016 at 08:44:35PM +, White, Andrew
wrote:
> This assumes the ISP manages the customer's CPE or home router, which is
> often not the case. Adding such ACLs to the upstream device, operated by the
> ISP, is not always easy or feasible.
Unicast RFP should
12 matches
Mail list logo