On Tue, Mar 4, 2014 at 5:46 AM, fmm <vo...@fakmoymozg.ru> wrote:
> On Tue, 04 Mar 2014 09:00:18 +0100, Jay Ashworth <j...@baylink.com> wrote:
>
>>
>> http://arstechnica.com/security/2014/03/hackers-hijack-300000-plus-wireless-routers-make-malicious-changes/
>>
>> Is there any valid reason not to black hole those /32s on the back bone?
>
>
>
>>> The telltale sign a router has been compromised is DNS settings that have
>>> been changed to 5.45.75.11 and 5.45.76.36. Team Cymru researchers contacted
>>> the provider that hosts those two IP addresses but have yet to receive a
>>> response.
>
>
> you wanted to say "blackhole those 5.45.72.0/22 and 5.45.76.0/22", aren't
> you?
>
>
> Cheers
>

Jay is right, it is just the /32s at the moment...  Dropping the /22s
could cause other sites to be blocked.

inetnum:        5.45.72.0 - 5.45.75.255
netname:        INFERNO-NL-DE
descr:          ********************************************************
descr:          * We provide virtual and dedicated servers on this Subnet.
descr:          *
descr:          * Those services are self managed by our customers
descr:          * therefore, we are not using this IP space ourselves
descr:          * and it could be assigned to various end customers.
descr:          *
descr:          * In case of issues related with SPAM, Fraud,
descr:          * Phishing, DDoS, portscans or others,
descr:          * feel free to contact us with relevant info
descr:          * and we will shut down this server: ab...@3nt.com
descr:          ********************************************************
country:        NL
admin-c:        TNTS-RIPE
tech-c:         TNTS-RIPE
status:         ASSIGNED PA
mnt-by:         MNT-3NT
mnt-routes:     serverius-mnt
source:         RIPE # Filtered




-- 
~ Andrew "lathama" Latham lath...@gmail.com http://lathama.net ~

Reply via email to