Jump to content

Routing details for 2402:bc00:0:a216:0:0:19:124 invalid ?


Recommended Posts

From the parser output you linked

Quote

I refuse to bother helpdesk@apnic.net.

Using helpdesk#apnic.net@devnull.spamcop.net for statistical tracking.

I refuse to bother netops@apnic.net.

Using netops#apnic.net@devnull.spamcop.net for statistical tracking.

Using last resort contacts netops#apnic.net@devnull.spamcop.net helpdesk#apnic.net@devnull.spamcop.net

APNIC is an " Internet that serves the entire Asia Pacific community. "  Guessing they would get more spam reports that they would bother to process.

I APNIC is not going to fix the problem, why should spamcop wast the bandwidth or clutter the web with a report that will be put in the bit bucket.

To directly answer you question, this is not an error it is a decision not to sent a report.  Do note that your submitted spam does feed the SCBL (Using ... for statistical tracking.)

Link to comment
Share on other sites

If you know the correct/a better abuse address for this IP then the "Routing/Routing Address Issues" sub forum would be the correct place to post the results of your research.

I thought your post was questioning that fact that the spam Report went to @devnull.spamcop.net

Link to comment
Share on other sites

if I use my "potaroo.net" IPv6 checker on the aforementioned IPv6 address:

http://www.potaroo.net/cgi-bin/ipv6addr?pfx=2402%3Abc00%3A0%3Aa216%3A%3A19%3A124

I see the following comment in the APNIC entry:

remarks:	 	This information has been partially mirrored by APNIC from
remarks:	 	JPNIC. To obtain more specific information, please use the
remarks:	 	JPNIC WHOIS Gateway at
remarks:	 	http://www.nic.ad.jp/en/db/whois/en-gateway.html or
remarks:	 	whois.nic.ad.jp for WHOIS client. (The WHOIS client
remarks:	 	defaults to Japanese output, use the /e switch for English
remarks:	 	output)
last-modified:	 	2014-03-10T22:41:03Z 

not shown above are other "last-modified" entries, the oldest dating 2009-11-04T06:54:54Z (that's a 10 year old listing), while the shown last-modified is 5 years old, whois.nic.ad.jp should have the current listing

although I do not find the abuse address mentioned by MIG, I find 2 entries, both using the same email address

https://whois.nic.ad.jp/cgi-bin/whois_gw?key=JP00076967/e

and

https://whois.nic.ad.jp/cgi-bin/whois_gw?key=JP00065730/e

Group Contact Information:
[Group Handle]                  JP00076967
[Group Name]                    networkhozen
[E-Mail]                        SS01629@enecom.co.jp  <---
[Organization]                  Energia Communications,Inc
[Division]                      
[TEL]                           050-8201-2351
[FAX]                           
[Last Update]                   2017/04/05 16:53:06(JST)

one is from 2011 and this one from 2017...

Link to comment
Share on other sites

  • 2 weeks later...
On 5/25/2019 at 4:29 PM, MIG said:

This potaroo

potaroo.jpg.f2968fba20c6c0298bc91183539e79c2.jpg

RobiBue?

G🤗H

almost :) -- it's missing the net net.jpg.b416a9aa44de9d3aa0d4b3326e38bcb1.jpg;)

(sorry for the late reply, have been busy otherwise. Even my spam folder accumulated several days of unreported spam 🤫)

Link to comment
Share on other sites

On 6/3/2019 at 9:31 PM, petzl said:

I are not getting any spam.

I went through my logs and noticed I didn't have any from the the IP range of 2402:bc00::/32.  The last time I had anything from 2402::/16 was in 2017.  So I definitely missed this.

Link to comment
Share on other sites

9 hours ago, gnarlymarley said:

I went through my logs and noticed I didn't have any from the the IP range of 2402:bc00::/32.  The last time I had anything from 2402::/16 was in 2017.  So I definitely missed this.

mine was through my SpamCop email account over 100 a day (reported everyone), mainly through Chinese Botnet, with Chinese writing,  along with worldwide  botnet fake drug etc,  but stopped around a month ago now nothing
I suspect the spam content was "red hearing" e.g. putting Chinese in spam body and using Chinese botnet? 
Typical report below

botnet source - ddos
111.76.169.40   anti-spamxns.chinanet.cn.net
see  
http://www.abuseat.org/lookup.cgi?ip=111.76.169.40

email server - reset password
219.235.112.153   ipasxcnnic.cn, 
 Warning - Does not support TLS. 

offending email forwarded also, can be read as text attachment with a text/ASCII editor like notepad or eml text reader

Link to comment
Share on other sites

On 6/4/2019 at 1:19 PM, RobiBue said:

 missing the net net.jpg.b416a9aa44de9d3aa0d4b3326e38bcb1.jpg

Not necessary, a gentle, under chin tickle, has them purring like kittens😽

Late, never, busy ow, did notice your absence, glad you're back & in such fine form!

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

×
×
  • Create New...