[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Cogent & FDCServers: Knowingly aiding and abetting fraud and theft?
- Subject: Cogent & FDCServers: Knowingly aiding and abetting fraud and theft?
- From: rfg at tristatelogic.com (Ronald F. Guilmette)
- Date: Fri, 06 Sep 2019 14:58:31 -0700
- In-reply-to: <[email protected]>
In message <67B3E0D5-7D09-42E2-A753-EB6C93859F12 at getmailspring.com>,
Florian Brandstetter <florianb at globalone.io> wrote:
>if you'd open the traceroute you just sent you'd see that the target
>is route looping and not actually used by their alleged customer?
Yea. So? How is that relevant to my fundamental narrative?
Cogent was announcing the whole of 188.8.131.52/16. Do we agree?
Theye were most probably *not* doing so just for laughs or just to
create routing loops. Do we agree?
Traceroutes show that from Cogent, packets were further being passed
to FDCServers. Do we agree?
Now, if you want to know who FDCSewer's customer was in this case,
why don't you try asking them?
I am satisfied that the intel that I've already collected indicates
the exceptionally high probability that this entire legacy /16 block...
along with many many others, also of entirely dubious provenance...
were all being routed to and for a certain Mr. Elad Cohen and his
company, Netstyle Atarim, Ltd.:
org-name: NETSTYLE A. LTD
address: Derech Menachem Begin 156
e-mail: info (at) netstyle.io
>Also, what would the target IP have been in this case, since it was omitted?
If you look carefully, I gave that in the post you are responding to:
>> My apologies. In my furious haste, I botched that one URL. Here is the
>> correct file conatining my traceroute to 184.108.40.206 as performed by
>> me on August 23rd: