mrmaxx Posted November 19, 2013 Share Posted November 19, 2013 Since the only contact for this netblock bounces, I would suggest going upstream to abuse[at]nn.com.au. Two different traceroutes show that nn.com.au is the direct uplink. Tracking URL: http://www.spamcop.net/sc?id=z5627421730z1...1d03ab755e563cz Link to comment Share on other sites More sharing options...
Farelf Posted November 20, 2013 Share Posted November 20, 2013 Might be better off with helpdesk[at]seccomglobal.com Seccomglobal/seccomnetworks are LJ Hooker's ISP and LJ Hooker is one of their cherished, headlined "success story" case studies for their "Managed Security Service Provider" business. I'm sure they would be most interested in the abuse of LJ Hooker's MX which is the spam source/relay (also the bouncing of LJ Hooker's abuse address) - might indicate a compromised VPN or something ... anyway some leverage to be had, especially right now. Link to comment Share on other sites More sharing options...
mrmaxx Posted November 29, 2013 Author Share Posted November 29, 2013 Might be better off with helpdesk[at]seccomglobal.com Seccomglobal/seccomnetworks are LJ Hooker's ISP and LJ Hooker is one of their cherished, headlined "success story" case studies for their "Managed Security Service Provider" business. I'm sure they would be most interested in the abuse of LJ Hooker's MX which is the spam source/relay (also the bouncing of LJ Hooker's abuse address) - might indicate a compromised VPN or something ... anyway some leverage to be had, especially right now. Thanks, Farelf. I'll try to remember that next time I see this. Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.