Jump to content


  • Content Count

  • Joined

  • Last visited

Posts posted by goldeneye

  1. I think some of us have been getting spam from these bastards over the last few years - they used to use tiscali to host but then tiscali kicked them out earlier this year and have moved out to colocrossing (and some of these are now using the google link shortener as a new tactic)... Their MO seems to be "hijacking" IP addresses to attack port 25 to send this sh** and even a few of the IP addresses link to no one at all...

    I have noticed that they usually strike on Tuesdays and Fridays (or Mondays and Thursdays) typically...

    Here are some of the spam reports...





    Wonder who this spam gang is for that matter?


  2. This week alone, I've been getting hit with at least two dozen spamvertized links from an apparent botnet in the range (located in Bulgaria)...

























    So far, the spamvertized IP's are:

    Are we dealing with a potential botnet here?

  3. Oh believe me, I've had to deal with snowshoe spams for several months from Romania back in 2009 or thereabouts and those spams had hyperlinks which traced to Romanian servers.

    I think I've sent countless, probably over 100 abuse reports on those spams with absolutely zero reply and maybe in fact encouragement from the abuse desks who were probably in cahoots with the spammers (or spam gangs) themselves who could be Romanian, but more likely Russian. The language barrier doesn't help either.

    They got flagged eventually by one of the BLs, but only after probably hundreds, if not thousands of reports on them.

    This is what colors my thought about Romanians on the at least the dealing with the spam front - and the apparent correct address in which spam complaints go to which now bounces does not help either in my assessment.

  4. Since about the end of March, I've been noticing spamming from Romania has picked up quite a bit and quite a few weren't caught on my ISP's spam filter, including 3 of the last 4 spams that weren't caught...

    Here are all of them dating back from March 29:






    In all five of these cases, the reports that are apparently sent to aren't to a postmaster or abuse address - I wonder if the spammers themselves in Romania are setting them up so that spamcop reports go to them and then they revenge spam using spamcop reports.

    Romania is still one very lawless country that still hasn't gotten its act together when it comes to spam - it shouldn't even have been allowed to enter the EU in the first place.

  5. Has anyone dealt with ISPs in Turkey recently - as I've gotten a pair of spams which point to a Turkish provider - and apparently the homepage of that provider is in Turkish only...



    Also the abuse address for the server being misused to send the spam isn't pointing to an abuse mailbox - is this common?

    These types of spams were apparently started when Romanian servers were involved, but now it appears that Romania clamped down on them and they now have moved operations to Turkey apparently.

    Now, those damn spammers added at least one "Content-type: #" to screw up the damn parser, so I had to remove those lines so that Spamcop can properly parse it... Secondly, the damn spammers also fudged the URLs with apparent "blank" characters or things like "j" to screw with the parser - and in the first case, spamcop read the "blank" character as an extra forward slash in the URL which forced me to resubmit by editing and removing the "invisible character" or converting the "escaped" character.

    Anyone else dealt with those types of spams recently that forced them to resubmit?

  6. This is at least the third email I got with a URL that refers to that IP when parsed - and it isn't the IP block - it is the particular, specific IP.


    Whatever that reporting e-mail that is (dgoulakos[at]optima.org), it doesn't sound right at all and it's bounced 6 out of 7.

    Not only that, but ARIN claims that the block is that particular contact.

    Another snowshoe spam artist - such idiocy...

  7. Except that this time, it now references to a set of IP address space with no contact info, which has now been sent to nomaster because of the lack of contact info...

    8 out my last 13 sent submissions, and that has been since April 24 are for this Romanian snowshoe crap with

    The space or better yet, the space should be totally blocked until that snowshoe spam farm has been kicked out.

    The IP addresses (sending and referred) have been this list:

    And according to robtex...

    All of these IP addresses belong to AS47931, ALE-NETWORK, apparently based out of (surprise, surprise) Romania.

    And they apparently own these netblocks... ALE NETWORK ALE NETWORK ALE NETWORK

    The reason why I am calling for the entire netblock to be blocked is every known registered IP block of either and are known Romanian snowshoe spam farm suspects.

    Spamcop - please block the entire netblock for these reasons.

  8. Add three more spams, even tho one of these is probably not a Romanian one...


    IPs of this first one: and, from network ID AS15884, part of network


    IPs of this second one:, from network IDs AS20001, AS33597 and AS46801, part of networks, and (not sure which is the legitimate owner of these addresses, sounds like stolen IP space)., from network IDs AS28045 (), part of networks and, probably another set of stolen IP space.


    IPs of this third one: and, AGAIN from network ID AS15884, part of network

  9. Add one more Romanian network to add to the idiocy...


    New crap IPs...

    First one is from the supernetwork, network ID AS50075 - probably a fake network set up just for spamming

    Second one is from the supernetwork, network ID AS50319 - yet again another fake network just to use for spam.

    Added - another piece of crap from Network ID AS48976


    New crap IP of

    Note that the forged domain (hibr123picked.com) is from - however, from the same Network ID AS48976, with supernetwork

  10. As an update - I put in four more reports, but yet to submit...





    I put in two more earlier today, but submitted to my own address...



    IPs so far identified...

    The 93.168.88.x crap is apparently part of the supernetwork from network ID AS48976, not blacklisted anywhere.

    Spamhaus has already blacklisted the 95.157.91.x crap from network, network ID AS47968 as a snowshoe spam operation according to http://www.spamhaus.org/sbl/sbl.lasso?query=SBL76453

    The 188.170.209.x one comes from supernetwork, network ID AS50041, not blacklisted anywhere.

    The 188.208.50.x crap comes from supernetwork, network ID AS49436, not blacklisted anywhere.

    That 188.229.96.x one comes from supernetwork, network ID AS50068, not blacklisted anywhere either.

    I wonder if we should start rejecting anything coming from network IDs AS47968, AS48976, AS49436, AS50041 and AS50068 among others (a few more, and it includes AS50042).

    Some of those AS's are very suspicious too IMO.

    Another spam from those idiots just came in...


    New crap IP from Romania again... - from supernetwork, network ID AS44954

  11. I am getting bombarded with at least 2 of those per day that are not caught in my e-mail account's spam filter, and they are always image spam, directing to IP addresses in Romania - and usually now in octal IP addresses.

    Problem is that the default reporting addresses point back to an abuse address at a domain which is controlled by the spammer network themselves.

    Would it be best to report to their upstreams? I can provide IP addresses and AS numbers if necessary, but those should be pretty known to be IP networks/AS numbers that are totally owned by spammers themselves (either bought out or totally stolen). Usually these are /20 or /21 IP blocks, but are known to go to as much as a /16 or /15, based on the IP addresses involved.