4 # This file contains Autonomous Systems and IP networks strongly believed or proofed to be hostile,
5 # posing a _technical_ threat against libloc users in general and/or IPFire users in particular.
7 # libloc neither was intended to be an "opinionated" database, nor should it become that way. Please
8 # refer to commit 69b3d894fbee6e94afc2a79593f7f6b300b88c10 for the rationale of implementing a special
9 # flag for hostile networks.
11 # Technical threats cover publicly routable network infrastructure solely dedicated or massively abused to
12 # host phishing, malware, C&C servers, non-benign vulnerability scanners, or being used as a "bulletproof"
13 # hosting space for cybercrime infrastructure.
15 # This file should not contain short-lived threats being hosted within legitimate infrastructures, as
16 # libloc it neither intended nor suitable to protect against such threats in a timely manner - by default,
17 # clients download a new database once a week.
19 # Networks posing non-technical threats - i. e. not covered by the definition above - must not be listed
22 # Improvement suggestions are appreciated, please submit them as patches to the location mailing
23 # list. Refer to https://lists.ipfire.org/mailman/listinfo/location and https://wiki.ipfire.org/devel/contact
24 # for further information.
26 # Please keep this file sorted.
31 remarks: IP hijacker operating out of AP area (HK or TW?)
36 descr: 1337TEAM LIMITED / eliteteam[.]to
37 remarks: Bulletproof ISP tampering with RIR data
42 descr: Orion Network Limited
43 remarks: shady uplink for a bunch of dirty ISPs, routing stolen AfriNIC networks
48 remarks: all cybercrime hosting, all the time
53 descr: Global-Data System IT Corporation (f/k/a Simple Carrier LLC)
54 remarks: Bulletproof ISP tampering with RIR data, used to trace back to NL
59 descr: STARK INDUSTRIES SOLUTIONS LTD
60 remarks: Rogue ISP in multiple locations, some RIR data contain garbage
64 descr: PPTECHNOLOGY LIMITED
65 remarks: bulletproof ISP (related to AS204655) located in NL
70 descr: GLOBAL COLOCATION LIMITED
71 remarks: Part of the "Fiber Grid" IP hijacking / dirty hosting operation, RIR data cannot be trusted
77 remarks: Shady ISP (related to AS204655 et al., same postal address) located in NL, but some RIR data for announced prefixes contain garbage
83 remarks: part of the "Asline" IP hijacking gang, traces back to San Jose, CR
88 descr: 1337TEAM LIMITED / eliteteam[.]to
89 remarks: Bulletproof ISP
94 descr: TANGRAM CANADA INC.
95 remarks: Rogue ISP related to Stark Industries / AS44477
101 remarks: ISP and IP hijacker located in US this time, tampers with RIR data
107 remarks: part of the "Asline" IP hijacking gang (?), tampers with RIR data, traces back to HK
112 descr: Eagle Sky Co., Lt[d ?]
113 remarks: Autonomous System registered to offshore company, abuse contact is a freemail address, address says "0 Market Square, P.O. Box 364, Belize", seems to trace to some location in AP vicinity
118 descr: Cloudie Limited / Worria
119 remarks: part of the "Asline" IP hijacking gang, tampers with RIR data, traces back to HK
124 descr: L&L Investment Ltd.
125 remarks: another shady customer of "Tamatiya EOOD / 4Vendeta"
130 descr: REBA Communications BV
131 remarks: bulletproof ISP (related to AS202425) located in NL
136 descr: 1337TEAM LIMITED / eliteteam[.]to
137 remarks: Bulletproof ISP
142 descr: Chang Way Technologies Co. Limited
143 remarks: Bulletproof ISP
148 descr: FiberXpress BV
149 remarks: bulletproof ISP (related to AS202425) located in NL
154 descr: Inter Connects Inc.
155 remarks: part of a dirty ISP conglomerate operating most likely out of SE, hijacking stolen AfriNIC networks, massively tampers with RIR data
160 descr: Inter Connects Inc.
161 remarks: part of a dirty ISP conglomerate operating most likely out of SE, hijacking stolen AfriNIC networks, massively tampers with RIR data
166 descr: Tyatkova Oksana Valerievna
167 remarks: bulletproof ISP operating from a war zone in eastern UA
173 remarks: Autonomous System registered to offshore company, abuse contact is a freemail address, seems to trace to some location in AP vicinity
178 descr: 24.hk global BGP
179 remarks: Part of the "ASLINE" IP hijacking operation
190 descr: Inter Connects Inc. / Jing Yun
191 remarks: part of a dirty ISP conglomerate operating most likely out of SE, hijacking AfriNIC networks
197 remarks: Bulletproof ISP
201 descr: TOV VAIZ PARTNER
206 descr: SpectraIP B.V.
207 remarks: bulletproof ISP (linked to AS202425 et al.) located in NL
212 descr: SKB Enterprise B.V.
213 remarks: bulletproof ISP (linked to AS202425 et al.) located in NL
218 descr: ABCDE GROUP COMPANY LIMITED
219 remarks: ISP and/or IP hijacker located in HK
224 descr: LUOGELANG (FRANCE) LIMITED
225 remarks: Shady ISP located in HK, RIR data for announced prefixes contain garbage, solely announcing "Cloud Innovation Ltd." space - no one will miss it
230 descr: Blue Data Center
231 remarks: IP hijacker located somewhere in AP area, tampers with RIR data
237 remarks: IP hijacker located in HK, suspected to be part of the "Asline" IP hijacking gang, tampers with RIR data
242 descr: Anchnet Asia Limited
243 remarks: IP hijacker located in HK, tampers with RIR data
248 descr: HONGKONG CLOUD NETWORK TECHNOLOGY CO., LIMITED
249 remarks: ISP and IP hijacker located in HK, tampers with RIR data
254 descr: Clayer Limited
255 remarks: part of the "Asline" IP hijacking gang, tampers with RIR data, traces back to HK
260 descr: ASLINE Global Exchange
261 remarks: IP hijacker located in HK
266 descr: SANREN DATA LIMITED
267 remarks: IP hijacker located somewhere in AP region, tampers with RIR data
272 descr: CITIS CLOUD GROUP LIMITED
273 remarks: part of the "Asline" IP hijacking gang, tampers with RIR data
278 descr: Hong Kong Communications International Co., Limited
279 remarks: part of the "Asline" IP hijacking gang, tampers with RIR data, traces back to AP region
284 descr: Incomparable(HK)Network Co., Limited
285 remarks: ISP and IP hijacker located in HK, tampers with RIR data
291 remarks: IP hijacker located somewhere in AP area (JP?)
296 descr: HONGKONG XING TONG HUI TECHNOLOGY CO.,LIMITED
297 remarks: Dirty ISP located in NL
303 remarks: All bulletproof/cybercrime hosting, all the time, not a safe AS to connect to
308 remarks: another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
314 remarks: another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
319 descr: IP Volume Inc.
320 remarks: bulletproof ISP (aka: AS29073 / Ecatel Ltd. / Quasi Networks Ltd.) located in NL
325 descr: NETSTYLE A. LTD
326 remarks: bulletproof ISP and IP hijacker, related to AS202425 and AS62355, traces to NL
331 descr: Global Offshore Limited
332 remarks: part of a dirty ISP conglomerate with links to SE, RIR data of prefixes announced by this AS cannot be trusted
338 remarks: another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
343 descr: Partner LLC / LetHost LLC
344 remarks: Bulletproof ISP
348 descr: Media Land LLC
349 remarks: bulletproof ISP, see: https://krebsonsecurity.com/2019/07/meet-the-worlds-biggest-bulletproof-hoster/
354 descr: Chang Way Technologies Co. Limited
360 descr: Miti 2000 EOOD
361 remarks: another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG, tampers with RIR data
366 descr: Alviva Holding Limited
367 remarks: bulletproof ISP operating from a war zone in eastern UA
372 descr: XHOST INTERNET SOLUTIONS LP
373 remarks: Rogue ISP (linked to AS202425) located in NL
379 remarks: All cybercrime hosting, all the time
384 descr: AEZA GROUP Ltd
385 remarks: In all networks currently propagated by this AS, one is unable to find anything that has even a patina of legitimacy
390 descr: Telkom Internet LTD
391 remarks: Rogue ISP (linked to AS202425) located in NL
396 descr: Tribeka Web Advisors S.A.
397 remarks: Dirty ISP, see individual network entries below
401 descr: ABDILAZIZ UULU ZHUSUP
402 remarks: bulletproof ISP and IP hijacker, traces to RU
408 remarks: Bulletproof Serverion customer in NL, many RIR data for announced prefixes contain garbage
413 descr: Private-Hosting di Cipriano Oscar
414 remarks: Bulletproof combahton GmbH customer in DE
419 descr: Media Land LLC
420 remarks: bulletproof ISP, see: https://krebsonsecurity.com/2019/07/meet-the-worlds-biggest-bulletproof-hoster/
425 descr: Kakharov Orinbassar Maratuly
426 remarks: ISP and IP hijacker located in KZ, many RIR data for announced prefixes contain garbage
431 descr: ROZA HOLIDAYS EOOD
432 remarks: another shady customer of "Tamatiya EOOD / 4Vendeta", located in BG
437 descr: BitCommand LLC
438 remarks: Dirty ISP located somewhere in EU, cannot trust RIR data of this network
443 descr: Private Internet Hosting LTD
444 remarks: bulletproof ISP located in RU
449 descr: Alfa Web Solutions Ltd
450 remarks: Rogue ISP (linked to AS57717) located in NL
455 descr: OOO RAIT TELECOM
456 remarks: Bulletproof connectivity procurer for AS51381
461 descr: GLOBAL CONNECTIVITY SOLUTIONS LLP
462 remarks: Rogue ISP related to AS44477
466 descr: Sun Network Company Limited
467 remarks: IP hijacker, traces back to AP region
472 descr: EightJoy Network LLC
473 remarks: Most likely hijacked or criminal AS
479 remarks: ISP located in HK, part of the ASLINE IP hijacking gang (?), tampers with RIR data
485 remarks: ISP located in JP, tampers with RIR data
491 remarks: ISP located in KR, tampers with RIR data
496 descr: Academy of Internet Research Limited Liability Company
497 remarks: Mass-scanning, apparently without legitimate intention
502 remarks: Solely announces hijacked prefixes out of JP, no legitimate infrastructure
507 descr: TOV VAIZ PARTNER
508 remarks: Attack network tracing back to NL
513 descr: Sanlam Life Insurance Limited
514 remarks: Stolen AfriNIC IPv4 space announced from NL?
518 net: 2a0e:b107:17fe::/47
519 descr: Amarai-Network - Location Test @ Antarctic
520 remarks: Tampers with RIR data, not a safe place to route traffic to
523 net: 2a0e:b107:d10::/44
524 descr: NZB.si Enterprises
525 remarks: Tampers with RIR data, not a safe place to route traffic to
529 descr: ASLINE Limited
530 remarks: APNIC chunk owned by a HK-based IP hijacker, but assigned to DE