This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/anti-abuse-wg@ripe.net/
[anti-abuse-wg] RIPE policy
- Previous message (by thread): [anti-abuse-wg] RIPE policy
- Next message (by thread): [anti-abuse-wg] RIPE policy
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Suresh Ramasubramanian
ops.lists at gmail.com
Wed Mar 9 16:03:20 CET 2011
On Wed, Mar 9, 2011 at 8:25 PM, Gert Doering <gert at space.net> wrote: > >> Funnily enough, not that you'd notice at all. >> So again, what makes RIPE unique here? > > Dunno. Where's all the chinese-hosted spam coming from? Large broadband pools infested with pirated windows machines, mainly. These are swipped to local chinese ISPs, who get their IP space from CNNIC (and/or some older netblocks from APNIC) In other words, what is happening there is a bunch of SPs with an infested network who could do stuff like walled gardens, port 25 filtering etc. I haven't seen spammers or malware artists getting themselves a PI /15 from CNNIC or APNIC Smaller netblocks direct from the RIR maybe. Or hijacked IP space repurposed from defunct companies. Not one case that I can remember of PI /15s acquired through LIRs. --srs -- Suresh Ramasubramanian (ops.lists at gmail.com)
- Previous message (by thread): [anti-abuse-wg] RIPE policy
- Next message (by thread): [anti-abuse-wg] RIPE policy
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]