From: Peter Müller Date: Sat, 15 Oct 2022 08:48:33 +0000 (+0000) Subject: override-{a2,a3,other,xd}: Regular batch of various overrides X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=546aaf99cc88d1dedfc05c3b9f202cf7413f3522;p=location%2Flocation-database.git override-{a2,a3,other,xd}: Regular batch of various overrides Signed-off-by: Peter Müller --- diff --git a/overrides/override-a2.txt b/overrides/override-a2.txt index 4172fc5..0428f06 100644 --- a/overrides/override-a2.txt +++ b/overrides/override-a2.txt @@ -30,6 +30,11 @@ descr: Marlink AS remarks: Satellite Internet provider [high confidence, but not proofed] is-satellite-provider: yes +aut-num: AS5666 +descr: Speedcast Communications, Inc. +remarks: Satellite Internet provider +is-satellite-provider: yes + aut-num: AS6621 descr: Hughes Network Systems remarks: Satellite Internet provider [several satellite dial-in pools] @@ -50,8 +55,8 @@ descr: ViaSat, Inc. remarks: Satellite Internet provider is-satellite-provider: yes -aut-num: AS5666 -descr: Speedcast Communications, Inc. +aut-num: AS8513 +descr: SkyVision Global Networks Ltd remarks: Satellite Internet provider is-satellite-provider: yes diff --git a/overrides/override-a3.txt b/overrides/override-a3.txt index c3ed219..6651a0b 100644 --- a/overrides/override-a3.txt +++ b/overrides/override-a3.txt @@ -234,6 +234,12 @@ descr: StormWall s.r.o. remarks: Worldwide active CDN is-anycast: yes +aut-num: AS60474 +descr: 4b42 UG +remarks: Generic anycast network, pin location to jurisdiction to protect our users +is-anycast: yes +country: DE + aut-num: AS60626 descr: Leaseweb CDN B.V. remarks: Generic anycast network diff --git a/overrides/override-other.txt b/overrides/override-other.txt index bd49e69..d50f8b2 100644 --- a/overrides/override-other.txt +++ b/overrides/override-other.txt @@ -32,6 +32,11 @@ descr: Jisc Services Limited remarks: ISP located in GB, but some RIR data for announced prefixes contain garbage country: GB +aut-num: AS924 +descr: Cloudie Networks LLC +remarks: Tampers with RIR data, location-pin to US to protect our users +country: US + aut-num: AS979 descr: NetLab Global remarks: ISP located in US, but some RIR data for announced prefixes contain garbage @@ -259,6 +264,11 @@ descr: Iranian Research Organization for Science & Technology remarks: ISP located in IR, but some RIR data for announced prefixes contain garbage country: IR +aut-num: AS15723 +descr: "AZERONLINE LTD" JOINT ENTERPRISE +remarks: ISP located in AZ, but some RIR data for announced prefixes contain garbage +country: AZ + aut-num: AS16262 descr: Datacheap Ltd. remarks: ISP located in RU, but some RIR data for announced prefixes contain garbage @@ -908,6 +918,11 @@ descr: Worldstream BV remarks: ISP located in NL, but many RIR data for announced prefixes contain garbage country: NL +aut-num: AS50058 +descr: August Internet Limited +remarks: Tampers with RIR data, pin location to GB (shell corporation only, but hey) +country: GB + aut-num: AS50113 descr: NTX Technologies s.r.o. remarks: ISP located in RU, but some RIR data for announced prefixes contain garbage @@ -1237,6 +1252,11 @@ descr: Spirous LLC remarks: ISP located in US, but some RIR data for announced prefixes contain garbage country: US +aut-num: AS131668 +descr: Taiwan Digital Streaming Co. +remarks: ISP located in TW, but some RIR data for announced prefixes contain garbage +country: TW + aut-num: AS131685 descr: Sun Network (Hong Kong) Limited remarks: ISP and/or IP hijacker located somewhere in AP @@ -1262,6 +1282,11 @@ descr: POWER LINE DATACENTER remarks: ISP and/or IP hijacker located in HK, tampers with RIR data country: HK +aut-num: AS133034 +descr: Virtual American Companies (BD) Limited +remarks: ISP and located in BD, but some prefixes needs manual correction due to ARIN DB situation +country: BD + aut-num: AS133115 descr: HK Kwaifong Group Limited remarks: ... located in HK @@ -1397,6 +1422,11 @@ descr: SUPERCLOUDS LIMITED remarks: ISP located in HK, tampers with RIR data country: HK +aut-num: AS138687 +descr: Xdeer Limited +remarks: Another shady Serverion customer located in NL, but tampers with RIR data en masse +country: NL + aut-num: AS138968 descr: rainbow network limited remarks: IP hijacker located somewhere in AP area, suspected to be part of the "Asline" IP hijacking gang, tampers with RIR data @@ -1602,16 +1632,21 @@ descr: SILVERHILL GROUP HOLDING LTD / SAKIS POLUNIGIS remarks: fake offshore location (SC), traces back to RU country: RU -aut-num: AS202914 -descr: Adeo Datacenter ApS -remarks: According to its website, all datacenters used by this ISP are in DK -country: DK +aut-num: AS202736 +descr: August Internet Limited +remarks: Tampers with RIR data, pin location to GB (shell corporation only, but hey) +country: GB aut-num: AS202505 descr: NETBUDUR TELEKOMUNIKASYON LIMITED SIRKETI remarks: ISP located in TR, but some RIR data for announced prefixes contain garbage country: TR +aut-num: AS202914 +descr: Adeo Datacenter ApS +remarks: According to its website, all datacenters used by this ISP are in DK +country: DK + aut-num: AS203020 descr: HostRoyale Technologies Pvt Ltd remarks: Pin the location of this AS to its jurisdiction (IN) due to massive tampering with RIR data @@ -1827,6 +1862,11 @@ descr: Internet Technologies LLC remarks: ISP located in RU, but some RIR data for announced prefixes contain garbage country: RU +aut-num: AS210537 +descr: PT PEDJOEANG DIGITAL NETWORKS +remarks: Tampers with RIR data a lot, location-pin to ID to protect our users +country: ID + aut-num: AS210644 descr: AEZA GROUP Ltd remarks: ISP located in RU, but some RIR data for announced prefixes contain garbage diff --git a/overrides/override-xd.txt b/overrides/override-xd.txt index 08217ed..efbcbf1 100644 --- a/overrides/override-xd.txt +++ b/overrides/override-xd.txt @@ -135,6 +135,12 @@ remarks: Bulletproof ISP country: RU drop: yes +aut-num: AS53727 +descr: Netsys Global Telecom Limited (?) +remarks: Hijacked AS announced out of some location in AP, possibly HK +country: AP +drop: yes + aut-num: AS54600 descr: PEG TECH INC remarks: ISP and IP hijacker located in US this time, tampers with RIR data