remarks: Public anycast DNS nameserver network [high confidence, but not proofed]
is-anycast: yes
+aut-num: AS43278
+descr: Instance Group LLC
+remarks: Generic anycast network [high confidence, but not proofed], RIR data contain garbage
+is-anycast: yes
+country: RU
+
aut-num: AS49287
descr: Melbikomas UAB
remarks: Generic anycast network [high confidence, but not proofed]
remarks: Generic anycast network
is-anycast: yes
+aut-num: AS203391
+descr: Cloud DNS Ltd
+remarks: Generic anycast network
+is-anycast: yes
+
aut-num: AS203961
descr: CentralNic Ltd
remarks: Generic anycast network
remarks: Generic anycast network
is-anycast: yes
+net: 2a06:1287:2900::/48
+descr: Erik Larsson
+remarks: Generic anycast network
+is-anycast: yes
+
net: 2a0b:6b83::/48
descr: Roelf Wichertjes
remarks: Generic anycast network
remarks: ISP located in RU, but some RIR data for announced prefixes contain garbage
country: RU
+aut-num: AS12722
+descr: RECONN LLC
+remarks: ISP located in RU, but some RIR data for announced prefixes contain garbage
+country: RU
+
aut-num: AS18013
descr: ASLINE LIMITED
remarks: IP hijacker, traces back to AP region
remarks: tampers with RIR data sometimes, traces back to NL
country: NL
+aut-num: AS43830
+descr: Digital Energy LLC
+remarks: ISP located in RU, but some RIR data for announced prefixes contain garbage
+country: RU
+
aut-num: AS44015
descr: Landgard Management Inc.
remarks: bulletproof ISP with strong links to RU
remarks: part of the "Asline" IP hijacking gang, traces back to AP region
country: AP
+aut-num: AS49453
+descr: Global Layer BV
+remarks: ISP located in NL, but some RIR data for announced prefixes contain garbage
+country: NL
+
aut-num: AS49505
descr: Selectel
remarks: ISP located in RU, but some RIR data for announced prefixes contain garbage
remarks: ISP located in HK, some RIR data for announced prefixes contain garbage
country: HK
+aut-num: AS134121
+descr: rainbow network limited
+remarks: IP hijacker located somewhere in AP area, suspected to be part of the "Asline" IP hijacking gang, tampers with RIR data
+country: AP
+
aut-num: AS134196
descr: ULan Network Limited
remarks: part of the "Asline" IP hijacking gang, tampers with RIR data, traces back to AP region
remarks: tampers with RIR data, traces back to AP region
country: AP
+aut-num: AS134823
+descr: Sky Digital Co., Ltd.
+remarks: IP hijacker located in TW, suspected to be part of the "Asline" IP hijacking gang, tampers with RIR data
+country: TW
+
aut-num: AS136274
descr: Cloud Servers Pvt Ltd
remarks: ISP located in NL, all RIR data for announced prefixes contain garbage
remarks: ISP located in HK, tampers with RIR data
country: HK
+aut-num: AS138968
+descr: rainbow network limited
+remarks: IP hijacker located somewhere in AP area, suspected to be part of the "Asline" IP hijacking gang, tampers with RIR data
+country: AP
+
aut-num: AS139242
descr: Cloudflare Sydney, LLC
remarks: ... but CF failed to set the country for announced prefixes to AU as well :-/
remarks: traces back to SE
country: SE
+aut-num: AS203936
+descr: MismeNet Telecomunicaciones
+remarks: ISP located in ES, but some RIR data for announced prefixes contain garbage
+country: ES
+
aut-num: AS204136
descr: Kevin Holly trading as Silent Ghost e.U.
remarks: AS run by someone who thinks allocating IP networks to AQ is funny (it is not, kid) :-/
remarks: ISP located in NL, but RIR data for announced prefixes contain garbage
country: NL
+aut-num: AS212478
+descr: Massimo Cotrozzi
+remarks: ISP located in GB, but RIR data for announced prefixes contain garbage
+country: GB
+
+aut-num: AS212667
+descr: RECONN LLC
+remarks: ISP located in RU, but RIR data for announced prefixes contain garbage
+country: RU
+
aut-num: AS212962
descr: Quality Area Ltd.
remarks: traceroutes dead-end somewhere near Crimera, UA
remarks: fake offshore location (BZ), traces back to RU
country: RU
+aut-num: AS267784
+descr: Flyservers S.A.
+remarks: ISP located in NL, but RIR data for most announced prefixes contain garbage
+country: NL
+
aut-num: AS328543
descr: Sun Network Company Limited
remarks: IP hijacker, traces back to AP region
remarks: fake offshore location (SC), traces back to RO
country: RO
+net: 45.11.152.0/22
+descr: Karolio IT paslaugos, UAB
+remarks: fake location (IR), traces back to NL
+country: NL
+
net: 45.89.97.0/24
descr: IP Volume Ltd. / Epik
remarks: fake location (CH), traces back to GB