2 # override-other [.txt]
4 # This file contains Autonomous Systems (AS) or IP networks/addresses
5 # whose country information in corresponding RIR data is believed or proven
6 # to be invalid or inaccurate and which do not match to one of the special categories
9 # Such networks might be legitimate (poorly maintained WHOIS data), shady
10 # (networks owned by letterbox companies in offshore jurisdictions) or
11 # hostile (faked RIR data in order to bypass location-based filtering).
13 # Please keep this file sorted.
17 descr: PJSC "Vimpelcom"
18 remarks: ISP located in RU, but some RIR data for announced prefixes contain garbage
23 remarks: traces back to an unknown oversea location (HK?), seems to tamper with RIR data
28 remarks: ISP located in RU, but some RIR data for announced prefixes contain garbage
32 descr: Iron Mountain Data Center
33 remarks: ISP located in US, but some RIR data for announced prefixes contain garbage
38 remarks: IP hijacker, traces back to AP region
43 remarks: part of the "Asline" IP hijacking gang, traces back to AP region
47 descr: DDOSING NETWORK
48 remarks: IP hijacker located somewhere in AP, massively tampers with RIR data
52 descr: HK UNITE TELECOMMUNICATIONS DEVELOPMENT LIMITED
53 remarks: IP hijacker (?) located in HK, tampers with RIR data
57 descr: Yes Networks Unlimited Ltd
58 remarks: traces to UA, but some RIR entries seem to contain garbage (VG)
62 descr: Netcalibre Ltd.
63 remarks: ISP located in GB, but some RIR data for announced prefixes contain garbage/
67 descr: ABGON Comunicaciones
68 remarks: ISP located in CL, but some RIR data for announced prefixes contain garbage (BZ)
72 descr: IP Interactive UG (haftungsbeschraenkt)
73 remarks: ISP located in BG, but RIR data for announced prefixes contain garbage
78 remarks: tampers with RIR data, most probably located in HK
82 descr: Buena Telecom SRL
83 remarks: ISP located in RO, but RIR data for announced prefixes contain garbage
87 descr: Fiber Grid Inc.
88 remarks: tampers with RIR data, traces back to SE
92 descr: ab stract / Peter Kolmisoppi
93 remarks: tampers with RIR data, traces back to SE
97 descr: Confluence Networks Inc.
98 remarks: fake offshore location (VG), traces back to Austin, TX, US
102 descr: Treidinvest LLC
103 remarks: ISP located in RU, but some RIR data for announced prefixes contain garbage
107 descr: Packet Exchange Limited
108 remarks: shady uplink for a bunch of dirty ISPs in SE (and likely elsewhere in EU), routing stolen AfriNIC networks, RIR data of prefixes announced by this AS cannot be trusted
112 descr: Bunea TELECOM SRL
113 remarks: ISP located in RO, but some RIR data for announced prefixes contain garbage
117 descr: Safe Value Limited
118 remarks: tampers with RIR data, traces back to somewhere in central Europe
123 remarks: ISP located in GB, but some RIR data for announced prefixes contain garbage
127 descr: Cloud Management LLC
128 remarks: tampers with RIR data, traces back to HK
132 descr: Landgard Management Inc.
133 remarks: bulletproof ISP with strong links to RU
137 descr: IP Oleinichenko Denis
138 remarks: ISP located in RU, but some RIR data for announced prefixes contain garbage
142 descr: PPTECHNOLOGY LIMITED
143 remarks: bulletproof ISP (related to AS204655) located in NL
147 descr: Global Colocation Limited
148 remarks: part of a dirty ISP conglomerate most likely operating out of SE
153 remarks: part of the "Asline" IP hijacking gang, traces back to AP region
158 remarks: ISP located in RU, but some RIR data for announced prefixes contain garbage
162 descr: F.I.H. FORMULA INVESTMENT HOUSE CLEARING LIMITED
163 remarks: claims GR for announced prefixes, but traceroutes dead-end somewhere else in EU
167 descr: Smart Telecom S.A.R.L
168 remarks: tampers with RIR data, traces back to RU
172 descr: Cloudie Limited
173 remarks: part of the "Asline" IP hijacking gang, tampers with RIR data, traces back to AP region
177 descr: REBA Communications BV
178 remarks: bulletproof ISP (related to AS202425) located in NL
182 descr: PE Skurykhin Mukola Volodumurovuch
183 remarks: tampers with RIR data, traces back to UA
187 descr: FiberXpress BV
188 remarks: bulletproof ISP (related to AS202425) located in NL
192 descr: DDOS-GUARD LTD
193 remarks: shady ISP, customers massively tamper with RIR data, we cannot trust this network
197 descr: Inter Connects Inc.
198 remarks: part of a dirty ISP conglomerate operating most likely out of SE, hijacking stolen AfriNIC networks, massively tampers with RIR data
203 remarks: ISP located in NL, but some RIR data for announced prefixes contain garbage
207 descr: FOP Gubina Lubov Petrivna
208 remarks: bulletproof ISP operating from a war zone in eastern UA
213 remarks: another shady customer of "DDoS Guard Ltd.", jurisdiction is probably RU, but traceroutes dead-end somewhere else in EU
217 descr: Batterflyai Media Ltd.
218 remarks: ISP located in RU, but some RIR data for announced prefixes contain garbage
222 descr: Inter Connects Inc. / Jing Yun
223 remarks: part of a dirty ISP conglomerate operating most likely out of SE, hijacking AfriNIC networks
227 descr: Network Dedicated SAS
228 remarks: bulletproof ISP and IP hijacker, claims to be located in CH, but traces to NL
232 descr: Vivo Trade L.P.
233 remarks: another shady customer of "DDoS Guard Ltd."
237 descr: VpsQuan L.L.C.
238 remarks: claims to be located in US, but traces to HK
242 descr: Inter Connects Inc.
243 remarks: part of a dirty ISP conglomerate, traces back to US this time
247 descr: NForce Entertainment BV
248 remarks: currently hijacks a single stolen /20 AfriNIC IPv4 net, hosted in NL
252 descr: DXTL Tseung Kwan O Service
253 remarks: tampers with RIR data, traces back to AP region
257 descr: Anchnet Asia Limited
258 remarks: IP hijacker located in HK, tampers with RIR data
262 descr: Clayer Limited
263 remarks: part of the "Asline" IP hijacking gang, tampers with RIR data, traces back to AP region
267 descr: SANREN DATA LIMITED
268 remarks: IP hijacker located somewhere in AP region, tampers with RIR data
272 descr: Wujidun Network Limited
273 remarks: part of the "Asline" IP hijacking gang, tampers with RIR data, traces back to AP region
278 remarks: ISP located in MD, majority of RIR data for announced prefixes contain garbage, we cannot trust this network
282 descr: Datashield, Inc.
283 remarks: fake offshore location (SC), traces back to NL
287 descr: AVATEL TELECOM
288 remarks: ISP located in ES, but some RIR data for announced prefixes contain garbage
292 descr: Intelcom Group Ltd.
293 remarks: ISP located in RU, but some RIR data for announced prefixes contain garbage
298 remarks: ISP located in BG, but RIR data for announced prefixes contain garbage
302 descr: FutureNow Incorporated
303 remarks: ISP located in BG, but RIR data for announced prefixes contain garbage
308 remarks: another shady customer of "DDoS Guard Ltd."
312 descr: IP Volume Inc.
313 remarks: bulletproof ISP (aka: AS29073 / Ecatel Ltd. / Quasi Networks Ltd.) located in NL
317 descr: SILVERHILL GROUP HOLDING LTD / SAKIS POLUNIGIS
318 remarks: fake offshore location (SC), traces back to NL
322 descr: Cooperative Investments LLC
323 remarks: bulletproof ISP and IP hijacker, related to AS202425 and AS62355, traces to NL
327 descr: Kevin Holly trading as Silent Ghost e.U.
328 remarks: AS run by someone who thinks allocating IP networks to AQ is funny (it is not, kid) :-/
332 descr: Global Offshore Limited
333 remarks: part of a dirty ISP conglomerate with links to SE, RIR data of prefixes announced by this AS cannot be trusted
338 remarks: bulletproof ISP (strongly linked to AS202425) located in NL
342 descr: Hauer Hosting Services Limited
343 remarks: ISP located in ES, but some RIR data for announced prefixes contain garbage
347 descr: Genius Guard / Genius Security Ltd.
348 remarks: another shady customer of "DDoS Guard Ltd.", probably located in RU
352 descr: Xtudio Networks S.L.U.
353 remarks: ISP located in ES, but some RIR data for announced prefixes contain garbage
357 descr: Altrosky Technology Ltd.
358 remarks: fake offshore location (SC), traces back to CZ and NL
362 descr: Maximilian Kutzner trading as HostSlick
363 remarks: traces back to NL, but some RIR data for announced prefixes contain garbage
367 descr: Alviva Holding Limited
368 remarks: ISP located in BG, but RIR data for announced prefixes contain garbage
372 descr: Alviva Holding Limited
373 remarks: bulletproof ISP operating from a war zone in eastern UA
377 descr: Gudaev Maxim Amrakhovich
378 remarks: announcements scatter across various places in EU (DE/CZ/??), but RIR data contain garbage
382 descr: Kakharov Orinbassar Maratuly
383 remarks: ISP located in RU, but RIR data for announced prefixes contain garbage
388 remarks: ISP located in NL, but RIR data for most announced prefixes contain garbage
392 descr: Private Internet Hosting LTD
393 remarks: bulletproof ISP located in RU
397 descr: IP Connect Inc.
398 remarks: fake offshore location (SC), traces back to NL
402 descr: DDOS-GUARD CORP.
403 remarks: fake offshore location (BZ), traces back to RU
407 descr: Sun Network Company Limited
408 remarks: IP hijacker, traces back to AP region
412 descr: Datapacket Maroc SARL
413 remarks: bulletproof ISP (strongly linked to AS202425) located in NL
418 remarks: ISP located in HK, tampers with RIR data
422 descr: OLink Cloud LLC
423 remarks: shady ISP located in US, but some RIR data for announced prefixes contain garbage
428 remarks: routed to DE, inaccurate RIR data
433 remarks: routed to DE, inaccurate RIR data
438 remarks: routed to DE, inaccurate RIR data
443 remarks: routed to DE, inaccurate RIR data
447 descr: StormWall s.r.o.
448 remarks: claims to be located in DE, but traces back to somewhere else in central Europe
452 descr: Amarutu Technology Ltd. / KoDDoS / ESecurity
453 remarks: fake offshore location (BZ), traces back to NL
457 descr: Amarutu Technology Ltd. / KoDDoS / ESecurity
458 remarks: fake offshore location (BZ), traces back to NL
463 remarks: fake offshore location (SC), traces back to RO
467 descr: IPv4 Superhub Limited
468 remarks: network owned by an HK company, traces back to HK as well - but is assigned to DE. Nice try...
472 descr: MS Network LTD
473 remarks: fake offshore location (SC), traces back to NLm
477 descr: IPv4 Superhub Limited
478 remarks: same as 45.93.16.0/22
482 descr: GlobalCache Technology CO., Ltd.
483 remarks: claims to be located in DE, but traces back to HK
487 descr: US AFG 20200130
488 remarks: claims to be located in US, but traces back to SK
492 descr: Vodafone US Inc.
493 remarks: large Vodafone IP chunk used in ES, but assigned by ARIN (inaccurate data)
497 descr: Amarutu Technology Ltd. / KoDDoS / ESecurity
498 remarks: fake offshore location (BZ), traces back to US
502 descr: Golden Internet LLC
503 remarks: fake location (KP), WHOIS contact points to RU
507 descr: Petersburg Internet Network Ltd.
508 remarks: RIR data for suballocations contain garbage, they are all located in RU
513 remarks: fake location (US), WHOIS contact and traceroutes point to RU
516 net: 103.197.148.0/22
517 descr: I.C.S. Trabia-Network S.R.L.
518 remarks: fake offshore location (HK), traces back to MD
522 descr: PSINet, Inc. (PSI) / Cogent Communications
523 remarks: Cogent IP range used in Europe, according to ARIN whois ("COGENT-EUROPEAN-OPERATIONS-001")
527 descr: Anthony Marshall / Game Hosting Net / FlokiNET Ltd.
528 remarks: fake location (BA), traces back to RO
533 remarks: fake offshore location (SC), traces back to RO
537 descr: Datashield, Inc.
538 remarks: fake offshore location (SC), traces back to NL
542 descr: Intelcom Group Ltd
543 remarks: fake offshore location (SC), traces back to RU
546 net: 185.140.204.0/22
547 descr: Hornetsecurity GmbH
548 remarks: all suballocations are used in DE, but are assigned to US
552 descr: Perfect Hosting Solutions
553 remarks: bulletproof ISP related to AS204655, traces back to BG
556 net: 185.169.253.0/24
557 descr: Amarutu Technology Ltd. / KoDDoS / ESecurity
558 remarks: fake offshore location (BZ), traces back to US
562 descr: Romanenko Stanislav Sergeevich
563 remarks: bulletproof ISP related to AS204655, traces back to BG
566 net: 185.193.124.0/22
567 descr: ab stract / Njalla
568 remarks: bogus RIR data pointing to the unpopulated Bouvet Island (BV), suballocations trace back to SE
571 net: 185.227.152.0/22
572 descr: XinYuan Interconnect (HONG KONG [sic!]) Limited
573 remarks: claims to be located in DE, traces back to HK
577 descr: WorldStream (LATAM) BV
578 remarks: LACNIC IP chunk solely used in NL (inaccurate data)
582 descr: Deep Eddy Internet Consulting
583 remarks: claims to be located in US, traces back to AP region
587 descr: Bunea TELECOM SRL
588 remarks: RIR data contain garbage for this network
592 descr: NetConn Services Ltd
593 remarks: APNIC chunk owned by a HK-based company, routed to AP region, but assigned to SC
597 descr: Posta Crne Gore
598 remarks: Orphaned RIR data, see: https://lists.ipfire.org/pipermail/location/2021-April/000267.html
601 net: 195.252.115.0/24
603 remarks: Orphaned RIR data, see: https://lists.ipfire.org/pipermail/location/2021-April/000267.html
606 net: 195.252.120.0/24
608 remarks: Orphaned RIR data, see: https://lists.ipfire.org/pipermail/location/2021-April/000267.html
611 net: 198.144.120.0/23
612 descr: Amarutu Technology Ltd. / KoDDoS / ESecurity
613 remarks: fake offshore location (BZ), traces back to NL
616 net: 202.128.108.0/23
617 descr: NetConn Services Ltd
618 remarks: APNIC chunk owned by a HK-based company, routed to AP region, but assigned to SC
621 net: 2a02:e00:ffe7::/48
622 descr: Bradler & Krantz GmbH & Co. KG
623 remarks: allocated to DE, but actually announced from LT
626 net: 2a02:e00:ffe8::/48
627 descr: Bradler & Krantz GmbH & Co. KG
628 remarks: allocated to DE, but actually announced from MD
631 net: 2a02:e00:ffe9::/48
632 descr: Bradler & Krantz GmbH & Co. KG
633 remarks: allocated to DE, but actually announced from GB
637 descr: Sibyl System LTD
638 remarks: RIR data contain garbage
642 descr: Datashield, Inc.
643 remarks: fake offshore location (SC), traces back to NL
647 descr: ASLINE Limited
648 remarks: APNIC chunk owned by a HK-based company, but assigned to DE