mrmaxx Posted November 19, 2013 Posted November 19, 2013 Since the only contact for this netblock bounces, I would suggest going upstream to abuse[at]nn.com.au. Two different traceroutes show that nn.com.au is the direct uplink. Tracking URL: http://www.spamcop.net/sc?id=z5627421730z1...1d03ab755e563cz
Farelf Posted November 20, 2013 Posted November 20, 2013 Might be better off with helpdesk[at]seccomglobal.com Seccomglobal/seccomnetworks are LJ Hooker's ISP and LJ Hooker is one of their cherished, headlined "success story" case studies for their "Managed Security Service Provider" business. I'm sure they would be most interested in the abuse of LJ Hooker's MX which is the spam source/relay (also the bouncing of LJ Hooker's abuse address) - might indicate a compromised VPN or something ... anyway some leverage to be had, especially right now.
mrmaxx Posted November 29, 2013 Author Posted November 29, 2013 Might be better off with helpdesk[at]seccomglobal.com Seccomglobal/seccomnetworks are LJ Hooker's ISP and LJ Hooker is one of their cherished, headlined "success story" case studies for their "Managed Security Service Provider" business. I'm sure they would be most interested in the abuse of LJ Hooker's MX which is the spam source/relay (also the bouncing of LJ Hooker's abuse address) - might indicate a compromised VPN or something ... anyway some leverage to be had, especially right now. Thanks, Farelf. I'll try to remember that next time I see this.
Recommended Posts
Archived
This topic is now archived and is closed to further replies.