<html><body><span style="font-family:Verdana; color:#000; font-size:12pt;"><div>hello,</div><div><br></div><div>I have been referred to this mailing list by the Reg Review account.</div><div><br></div><div>I am writing about the current situation with "Quasi Networks", AS29073 .</div><div><br></div><div>This AS is run by a criminal front:</div><div><br></div><div><a href="https://justinpineda.com/2011/04/30/understanding-ecatel">https://justinpineda.com/2011/04/30/understanding-ecatel</a>/</div><div><br></div><div><i>"The Ecatel Network is part of the Russian Business Network (RBN) which is known for cybercrime activities since 2007."</i></div><div><br></div><div>It is completely unaccountable and has been engaging in endless cyber crime activities for a number of years:<br></div><div><br></div><div><a href="https://www.infosecurity-magazine.com/news/us-russia-are-top-cyber-threat-hosts">https://www.infosecurity-magazine.com/news/us-russia-are-top-cyber-threat-hosts</a>/</div><div><i></i><br></div><div><i>"In the first quarter of 2013, the worst host overall was found to be Ecatel Network in the Netherlands, which, while hosting only 13,000 IPs, still manages to host more than it's fair share of malicious content. “This quarter we see the return of Dutch hosting provider Ecatel to the No. 1 rank, having held the position at various times in the past,” Host Exploit said. “Ecatel does not top the rankings for any particular category of activity, but rather for a consistently poor showing across the board.” Botnets in particular seem to like the Dutch provider."</i></div><div><br></div><div>Persistant emails to them are ignored:</div><div><br></div><div><a href="https://badpackets.net/a-conversation-with-ripe-ncc-regarding-quasi-networks-ltd">https://badpackets.net/a-conversation-with-ripe-ncc-regarding-quasi-networks-ltd</a>/</div><div><br></div><div><br></div><div>and due to the absence of an accountability mechanism in RIPE policy, they continue:</div><div><br></div><div><a href="https://www.lowendtalk.com/discussion/70172/ecatel-ltd-quasi-networks-ltd-ibc">https://www.lowendtalk.com/discussion/70172/ecatel-ltd-quasi-networks-ltd-ibc</a></div><div><br></div><div><a href="https://blogs.cisco.com/security/massive-increase-in-reconnaissance-activity-precursor-to-attack">https://blogs.cisco.com/security/massive-increase-in-reconnaissance-activity-precursor-to-attack</a></div><div><br></div><div><a href="http://www.webhostingtalk.com/showthread.php?t=1182576">http://www.webhostingtalk.com/showthread.php?t=1182576</a></div><div><br></div><div><a href="https://justinpineda.com/2011/04/30/understanding-ecatel">https://justinpineda.com/2011/04/30/understanding-ecatel</a>/<br></div><div><br></div><div>Can you introduce a mechanism that ensures that rogue operators like this network are disassembled.</div><div><br></div><div>The current situation is ridiculous! Although I understand there are costs associated with monitoring such complaints, the current situation cannot continue for ever.</div><div><br></div><div>Also, the address used by the AS is a bogus "Seychelles" address and they obviously do not operate out of Seychelles.</div><div><br></div><div>I have suggested to Reg Review that manual dispatching of a paper letter based code to the nominated address be necessary to activate assigned IP addresses ("Two factor authentication").</div><div><br></div><div>They indicate that this would create to much of a burden on your organisation, but the current situation of rogue criminals using false addresses and then RIPE relying on random people to notify RIPE (and then ignore their request!) needs to be addressed.</div><div><br></div><div>-----<br></div></span></body></html>