remarks: VPN provider
is-anonymous-proxy: yes
+net: 23.230.23.0/24
+descr: Colorberry VPN Services
+remarks: VPN provider
+is-anonymous-proxy: yes
+
net: 23.239.176.0/22
descr: CloudVPN Inc.
remarks: VPN provider
remarks: VPN provider
is-anonymous-proxy: yes
+net: 107.186.38.0/24
+descr: Colorberry VPN services
+remarks: VPN provider
+is-anonymous-proxy: yes
+
net: 109.70.100.0/24
descr: Foundation for Applied Privacy
remarks: Tor relay provider
remarks: VPN provider
is-anonymous-proxy: yes
+net: 142.252.111.0/24
+descr: Hurricane VPN
+remarks: VPN provider
+is-anonymous-proxy: yes
+
net: 145.249.104.0/22
descr: Liberty Services / IP Volume Inc.
remarks: VPN provider [high confidence, but not proofed]
remarks: VPN provider
is-anonymous-proxy: yes
+net: 205.164.4.0/24
+descr: OpenVPN Technologies, Inc.
+remarks: VPN provider
+is-anonymous-proxy: yes
+
net: 205.185.193.0/24
descr: SecuredConnectivity
remarks: VPN provider
remarks: ISP located in RU, but some RIR data for announced prefixes contain garbage
country: RU
+aut-num: AS41564
+descr: Packet Exchange Limited
+remarks: shady uplink for a bunch of dirty ISPs in SE (and likely elsewhere in EU), routing stolen AfriNIC networks, RIR data of prefixes announced by this AS cannot be trusted
+country: EU
+
aut-num: AS42397
descr: Bunea TELECOM SRL
remarks: ISP located in RO, but some RIR data for announced prefixes contain garbage
remarks: bulletproof ISP (related to AS204655) located in NL
country: NL
+aut-num: AS41564
+descr: Global Colocation Limited
+remarks: part of a dirty ISP conglomerate most likely operating out of SE
+country: SE
+
aut-num: AS49466
descr: KLAYER LLC
remarks: part of the "Asline" IP hijacking gang, traces back to AP region
remarks: bulletproof ISP (related to AS202425) located in NL
country: NL
+aut-num: AS57858
+descr: Inter Connects Inc.
+remarks: part of a dirty ISP conglomerate operating most likely out of SE, hijacking stolen AfriNIC networks, massively tampers with RIR data
+country: SE
+
aut-num: AS58073
descr: YISP BV
remarks: ISP located in NL, but some RIR data for announced prefixes contain garbage
remarks: ISP located in RU, but some RIR data for announced prefixes contain garbage
country: RU
+aut-num: AS60485
+descr: Inter Connects Inc. / Jing Yun
+remarks: part of a dirty ISP conglomerate operating most likely out of SE, hijacking AfriNIC networks
+country: SE
+
aut-num: AS62355
descr: Network Dedicated SAS
remarks: bulletproof ISP and IP hijacker, claims to be located in CH, but traces to NL
remarks: claims to be located in US, but traces to HK
country: HK
+aut-num: AS63119
+descr: Inter Connects Inc.
+remarks: part of a dirty ISP conglomerate, traces back to US this time
+country: US
+
aut-num: AS64437
descr: NForce Entertainment BV
remarks: currently hijacks a single stolen /20 AfriNIC IPv4 net, hosted in NL
remarks: AS run by someone who thinks allocating IP networks to AQ is funny (it is not, kid) :-/
country: NL
+aut-num: AS204353
+descr: Global Offshore Limited
+remarks: part of a dirty ISP conglomerate with links to SE, RIR data of prefixes announced by this AS cannot be trusted
+country: EU
+
aut-num: AS204655
descr: Novogara Ltd.
remarks: bulletproof ISP (strongly linked to AS202425) located in NL
remarks: ISP located in HK, tampers with RIR data
country: HK
+aut-num: AS398826
+descr: OLink Cloud LLC
+remarks: shady ISP located in US, but some RIR data for announced prefixes contain garbage
+country: US
+
net: 5.1.68.0/24
descr: GaiacomLC
remarks: routed to DE, inaccurate RIR data