[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Corporate Identity Theft: Azuki, LLC -- AS13389, 216.179.128.0/17
- Subject: Corporate Identity Theft: Azuki, LLC -- AS13389, 216.179.128.0/17
- From: ross at tajvar.io (Ross Tajvar)
- Date: Fri, 9 Aug 2019 20:33:13 -0400
- In-reply-to: <CALZ3u+YWYU0hiP09kcKp0Y9oyxKmopxD5A=AzCPVw=UfpUYLbw@mail.gmail.com>
- References: <[email protected]> <CALZ3u+YWYU0hiP09kcKp0Y9oyxKmopxD5A=AzCPVw=UfpUYLbw@mail.gmail.com>
First he thought that a /17 got stolen (by creating a company with the same
name as the original, now-defunct owner), but he then said he was wrong and
actually it either 1) got transferred against ARIN policy or 2) was made to
look like it was transferred by altering the whois data.
On Fri, Aug 9, 2019, 4:47 PM Töma Gavrichenkov <ximaera at gmail.com> wrote:
> Peace,
>
> On Thu, Aug 8, 2019 at 10:54 PM Ronald F. Guilmette
> <rfg at tristatelogic.com> wrote:
> > Corporate identity theft is a simple ploy which may be used to illicitly
> > obtain valuable IPv4 address space. Actual use of this fradulent ploy
> > was first described publicly in April, 2008 (https://wapo.st/2YLEhlZ).
>
> nostromo:tmp ximaera$ wc guilmette_combined.mbox
> 249 2122 13695 guilmette_combined.mbox
> nostromo:tmp ximaera$
>
> I wish I had enough spare time to read this.
>
> May we have a tl;dr version of this?
>
> --
> Töma
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20190809/017a4b0c/attachment.html>