remarks: VPN provider
is-anonymous-proxy: yes
+net: 45.192.0.0/12
+descr: Cloud Innovation Ltd.
+remarks: hijacked AFRINIC IP chunk owned by an offshore company, routed to several dirty networks worldwide, cannot tell what is going on here
+is-anonymous-proxy: yes
+
net: 45.220.72.0/22
descr: Low budget VPN service
remarks: VPN provider
remarks: VPN provider [high confidence, but not proofed]
is-anonymous-proxy: yes
+net: 92.118.204.0/22
+descr: Mo's Operations GmbH
+remarks: VPN provider [high confidence, but not proofed]
+is-anonymous-proxy: yes
+
net: 94.199.160.0/23
descr: MIK Telecom VPN pool
remarks: VPN provider
remarks: VPN provider [high confidence, but not proofed]
is-anonymous-proxy: yes
+net: 154.192.0.0/11
+descr: Cloud Innovation Ltd.
+remarks: hijacked AFRINIC IP chunk, owned by suspicous offshore company, scattered across dirty networks worldwide - not a safe place to go
+is-anonymous-proxy: yes
+
net: 161.129.60.0/24
descr: 10VPN Hosting
remarks: VPN provider
remarks: large IP chunk mostly used by VPN providers
is-anonymous-proxy: yes
+net: 196.61.192.0/20
+descr: Inspiring Networks LTD
+remarks: hijacked (?) IP network owned by an offshore company [high confidence, but not proofed]
+is-anonymous-proxy: yes
+
net: 197.221.161.0/24
descr: VPNClientPublics
remarks: VPN provider
net: 202.9.16.0/20
descr: VPNsolutions Pty Ltd
remarks: VPN provider
+
is-anonymous-proxy: yes
net: 202.152.146.0/24
remarks: Generic anycast network [high confidence, but not proofed]
is-anycast: yes
+aut-num: AS16625
+descr: Akamai Technologies, Inc.
+remarks: Worldwide CDN, does not make sense to assign their networks to a specific country
+is-anycast: yes
+
+aut-num: AS20940
+descr: Akamai International BV
+remarks: Worldwide CDN, does not make sense to assign their networks to a specific country
+is-anycast: yes
+
aut-num: AS31529
descr: DENIC eG
remarks: TLD operator's anycast network
remarks: part of the "Asline" IP hijacking gang, traces back to AP region
country: AP
+aut-num: AS22769
+descr: DDOSING NETWORK
+remarks: IP hijacker located somewhere in AP, massively tampers with RIR data
+country: AP
+
+aut-num: AS24009
+descr: HK UNITE TELECOMMUNICATIONS DEVELOPMENT LIMITED
+remarks: IP hijacker (?) located in HK, tampers with RIR data
+country: HK
+
aut-num: AS24700
descr: Yes Networks Unlimited Ltd
remarks: traces to UA, but some RIR entries seem to contain garbage (VG)
remarks: ISP located in BG, but RIR data for announced prefixes contain garbage
country: BG
+aut-num: AS35251
+descr: NetLab
+remarks: tampers with RIR data, most probabyl located in HK
+country: HK
+
aut-num: AS35478
descr: Buena Telecom SRL
remarks: ISP located in RO, but RIR data for announced prefixes contain garbage
remarks: bulletproof ISP, claims to be located in CH, but traces to NL
country: NL
+aut-num: AS62468
+descr: VpsQuan L.L.C.
+remarks: claims to be located in US, but traces to HK
+country: HK
+
aut-num: AS134548
descr: DXTL Tseung Kwan O Service
remarks: tampers with RIR data, traces back to AP region
country: AP
+aut-num: AS137443
+descr: Anchnet Asia Limited
+remarks: IP hijacker located in HK, tampers with RIR data
+country: HK
+
aut-num: AS137951
descr: Clayer Limited
remarks: part of the "Asline" IP hijacking gang, tampers with RIR data, traces back to AP region
remarks: fake offshore location (SC), traces back to RO
country: RO
+net: 45.93.16.0/22
+descr: IPv4 Superhub Limited
+remarks: network owned by an HK company, traces back to HK as well - but is assigned to DE. Nice try...
+country: HK
+
+net: 45.134.144.0/22
+descr: IPv4 Superhub Limited
+remarks: same as 45.93.16.0/22
+country: HK
+
net: 45.145.36.0/22
descr: GlobalCache Technology CO., Ltd.
remarks: claims to be located in DE, but traces back to HK