Ongoing ASN and IP Space Hijacks: Update (TimeWarner/Level3/Tiscali)

Ronald F. Guilmette rfg at
Mon Apr 25 22:22:39 UTC 2011

Eleven days ago, I reported here the following highly probable hijacks:

AS27906 - NET-198-23-32-0-1 - NET-198-57-64-0-1 - NET-199-88-32-0-1 - NET-199-192-16-0-1 - NET-199-196-192-0-1 - GT-AGSA1-LACNIC - NET-204-147-240-0-1 - (NET-207-22-192-0-1

Routing to a few of the above IP blocks has now been terminated, however
at present I find that several of them are still very much alive and well,
in particular: - NET-199-88-32-0-1 - NET-199-196-192-0-1 - GT-AGSA1-LACNIC - NET-204-147-240-0-1

As I previously mentioned, these are being used by high-end snowshoe spamming

Simple question:  Does anybody give a damn?


P.S.  Routing for the still-live hijacked blocks is as follows: hijacked via AS29987 (hijacked ASN) via AS3257 ( hijacked via AS8143 (hijacked ASN) via AS19844 (
			via AS4323/TimeWarner & AS3356/Level3 hijacked via AS8143 (hijacked ASN) via AS19844 (
			via AS4323/TimeWarner & AS3356/Level3 hijacked via AS47024 (hijacked ASN) via AS3257 (

P.P.S.  As I also mentioned previously, GoRack seems to have some non-trivial
connection to another South Florida company, Joytel Wireless, which itself
was caught red-handed performing a sizable number of rather brazen IP block
hijackings back in October:

Given that Joytel/GoRack are clearly not at all bashful about what they
are up to, it seems to me that it is incumbant upon TimeWarner and Level3
to take some action here.  Otherwise, these hijackings are obviously just
going to go on and on and on.

As for Tiscali, and its obvious part in all this... well... if anyone is
aware of any concious entity @ Tiscali who might actually give a damn about
anything other than short-term profits, please do let me know.  The people
I've talked to, and the evidence above all indicates that Tiscali is, quite
simply, ready, willing, and able to whore itself out to just about anybody.

More information about the NANOG mailing list