Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


The World's Worst Abuse Support ISPs/ Port Scan / bad bots / Spoofing / Phishing / Spam
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

The World's Worst Abuse Support ISPs/ Port Scan / bad bots / Spoofing / Phishing / Spam

silicomnetsilicomnet Member
edited September 2023 in General

Hello,

We report more than 10.000 (daily) abusers ips to abuseipdb.com

Our top 15:
1º DigitalOcean.com (40% India, 30% Singapore)
2º Microsoft
3º hostway.ru / beget.ru / smartdata.su (& Russia ISP)
4º Tencent (& China ISP)
5º des.capital (Netherlands)
6º Frantech.ca
7º inetmar.com (Turkey)
8º OVH
9º linode.com
10º amazon.com (40% east-2.compute.amazonaws.com)
11º hetzner.de (70% Finland)
12º superdata.vn (Vietnam)
13º deltacentric.com (India)
14º online.net
15º softlayer.com

Share your top15

Comments

  • DataIdeas-JoshDataIdeas-Josh Member, Patron Provider

    @silicomnet said:
    Hello,

    We report more than 10.000 (daily) abusers ips to abuseipdb.com

    Our top 15:
    1º DigitalOcean.com (40% India, 30% Singapore)
    2º Microsoft
    3º hostway.ru / beget.ru / smartdata.su (& Russia ISP)
    4º Tencent (& China ISP)
    5º des.capital (Netherlands)
    6º Frantech.ca
    7º inetmar.com (Turkey)
    8º OVH
    9º linode.com
    10º amazon.com (40% east-2.compute.amazonaws.com)
    11º hetzner.de (70% Finland)
    12º superdata.vn (Vietnam)
    13º deltacentric.com (India)
    14º online.net
    15º softlayer.com

    Share your top15

    Can you check that IP list against known tor nodes and you might find your answer.

    Thanked by 1Calin
  • silicomnetsilicomnet Member
    edited September 2023

    @DataIdeas-Josh said:

    @silicomnet said:
    Hello,

    We report more than 10.000 (daily) abusers ips to abuseipdb.com

    Our top 15:
    1º DigitalOcean.com (40% India, 30% Singapore)
    2º Microsoft
    3º hostway.ru / beget.ru / smartdata.su (& Russia ISP)
    4º Tencent (& China ISP)
    5º des.capital (Netherlands)
    6º Frantech.ca
    7º inetmar.com (Turkey)
    8º OVH
    9º linode.com
    10º amazon.com (40% east-2.compute.amazonaws.com)
    11º hetzner.de (70% Finland)
    12º superdata.vn (Vietnam)
    13º deltacentric.com (India)
    14º online.net
    15º softlayer.com

    Share your top15

    Can you check that IP list against known tor nodes and you might find your answer.

    This list does not include Tor exit nodes.

  • Block ranges, rather than report ip. Countries like turkey, vietnam entire subnets can be blocked without to much thinking. I block entire countries to slow down abuse rate. But still malice actors probing for vulns.

  • tentortentor Member, Patron Provider
    edited September 2023

    Where china??? It is definitely top1

    DigitalOcean processes abuse complaints if sent in XARF

    OVH processes abuse complaints too, just use their abuse form (sumbission can be automated)

    Amazon processes complaints too and reacts accordingly to ALL complaints we are sending them! They all processed by humans.

    Hetzner sometimes is slow to react but it processes complaints as well. Their network is pretty clean comparing to others given their size.

  • silicomnetsilicomnet Member
    edited September 2023

    @LTniger said:
    Block ranges, rather than report ip. Countries like turkey, vietnam entire subnets can be blocked without to much thinking. I block entire countries to slow down abuse rate. But still malice actors probing for vulns.

    Sure, but you can´t block microsoft, DigitalOcean or Amazon entire network. We block some /16 or /24 subnets of China and Russia, also AbuseIPDB ips with more than 30 reports of abuse.

  • tentortentor Member, Patron Provider
    edited September 2023

    Top 100 ASN with largest total ban time (sum of current ban time for all IP addresses within each ASN):

    4134 (Chinanet): 3297 days, 21:37:37.323926
    4837 (CHINA UNICOM China169 Backbone): 1956 days, 11:25:50.503778
    396982 (GOOGLE-CLOUD-PLATFORM): 1183 days, 0:14:56.820069
    14061 (DIGITALOCEAN-ASN): 948 days, 16:53:52.328952
    4766 (Korea Telecom): 659 days, 1:42:09.826358
    135377 (UCLOUD INFORMATION TECHNOLOGY HK LIMITED): 358 days, 8:14:48.530499
    208843 (Alpha Strike Labs GmbH): 239 days, 7:02:20.970850
    9808 (China Mobile Communications Group Co., Ltd.): 179 days, 10:45:54.094433
    3462 (Data Communication Business Group): 168 days, 4:14:23.901567
    45899 (VNPT Corp): 153 days, 1:01:20.359687
    140726 (UNICOM AnHui province network): 149 days, 18:06:02.762946
    37963 (Hangzhou Alibaba Advertising Co.,Ltd.): 119 days, 13:00:09.959069
    17638 (ASN for TIANJIN Provincial Net of CT): 112 days, 19:39:53.505121
    17621 (China Unicom Shanghai network): 109 days, 20:48:06.992143
    132203 (Tencent Building, Kejizhongyi Avenue): 107 days, 10:29:23.045181
    12389 (Rostelecom): 103 days, 18:21:47.844564
    45090 (Shenzhen Tencent Computer Systems Company Limited): 103 days, 9:19:25.157801
    9829 (National Internet Backbone): 102 days, 12:17:24.279694
    140061 (Qinghai Telecom): 94 days, 18:00:31.093472
    15895 (Kyivstar PJSC): 86 days, 11:44:30.563084
    202425 (IP Volume inc): 85 days, 1:22:01.187513
    4808 (China Unicom Beijing Province Network): 84 days, 2:49:44.516858
    45102 (Alibaba US Technology Co., Ltd.): 83 days, 11:09:01.637902
    7713 (PT Telekomunikasi Indonesia): 79 days, 3:08:27.150150
    47331 (Turk Telekom): 74 days, 7:00:09.952147
    8151 (UNINET): 73 days, 19:03:14.243048
    7552 (Viettel Group): 72 days, 11:28:39.021044
    4812 (China Telecom Group): 67 days, 20:00:37.025505
    150706 (Hong Kong Zhengxing Technology Co., Ltd.): 64 days, 6:01:48.857734
    9981 (Saero Network Service LTD): 60 days, 6:16:52.862812
    24757 (Ethiopian Telecommunication Corporation): 56 days, 11:51:07.882929
    134810 (China Mobile Group JiLin communications corporation): 56 days, 9:27:38.418511
    32748 (STEADFAST): 47 days, 18:50:39.606317
    63949 (Akamai Connected Cloud): 47 days, 16:26:32.339860
    9498 (BHARTI Airtel Ltd.): 44 days, 21:30:17.123174
    8452 (TE Data): 43 days, 12:40:19.515402
    20115 (CHARTER-20115): 41 days, 4:51:50.069776
    9318 (SK Broadband Co Ltd): 40 days, 2:52:47.644638
    140292 (CHINATELECOM Jiangsu province Suzhou 5G network): 39 days, 11:47:10.228553
    23969 (TOT Public Company Limited): 39 days, 8:29:07.905937
    55933 (Cloudie Limited): 39 days, 7:33:57.098880
    16276 (OVH SAS): 39 days, 6:37:43.194962
    29465 (MTN NIGERIA Communication limited): 38 days, 22:16:37.521451
    58224 (Iran Telecommunication Company PJS): 38 days, 2:42:13.375829
    49870 (Alsycon B.V.): 36 days, 9:29:17.106906
    7922 (COMCAST-7922): 35 days, 8:18:08.866776
    3269 (Telecom Italia): 34 days, 12:44:00.420037
    9299 (Philippine Long Distance Telephone Company): 34 days, 1:43:42.894927
    9198 (JSC Kazakhtelecom): 33 days, 21:06:05.194591
    8048 (CANTV Servicios, Venezuela): 33 days, 7:54:55.894438
    7018 (ATT-INTERNET4): 31 days, 23:58:58.334789
    38121 (LG HelloVision Corp.): 31 days, 17:21:16.874446
    701 (UUNET): 31 days, 5:00:40.008041
    56046 (China Mobile communications corporation): 30 days, 15:26:28.498120
    52495 (Cotel Ltda.): 30 days, 0:19:40.931144
    28573 (Claro NXT Telecomunicacoes Ltda): 29 days, 5:05:10.522491
    4713 (NTT Communications Corporation): 28 days, 13:02:29.623685
    135216 (Airway Communication Services India Pvt Ltd): 28 days, 2:52:17.678807
    24547 (Hebei Mobile Communication Company Limited): 27 days, 12:01:46.562918
    17557 (Pakistan Telecommunication Company Limited): 27 days, 8:23:37.044020
    58466 (CHINANET Guangdong province network): 27 days, 1:59:13.782215
    10066 (LG HelloVision Corp.): 25 days, 14:46:44.907185
    34984 (Superonline Iletisim Hizmetleri A.S.): 25 days, 10:12:20.738303
    45820 (Tata Teleservices ISP AS): 25 days, 4:30:44.029993
    51812 (KTVS Ltd.): 24 days, 14:20:43.457376
    24560 (Bharti Airtel Ltd., Telemedia Services): 24 days, 5:46:35.481271
    18403 (FPT Telecom Company): 23 days, 19:49:18.107683
    269788 (DISTRIBUIDORA OFIC TECH DE VENEZUELA C.A.): 23 days, 16:48:03.018446
    47890 (Unmanaged Ltd): 22 days, 3:23:04.100232
    10439 (CARINET): 22 days, 0:59:23.469288
    22884 (TOTAL PLAY TELECOMUNICACIONES SA DE CV): 21 days, 17:25:34.454276
    328543 (sun-asn): 21 days, 11:04:46.578713
    51167 (Contabo GmbH): 21 days, 9:37:34.872170
    3786 (LG DACOM Corporation): 20 days, 21:05:33.134875
    9121 (Turk Telekom): 20 days, 17:11:57.677106
    1257 (Tele2 SWIPnet): 20 days, 11:54:38.274228
    4760 (HKT Limited): 20 days, 11:26:04.874807
    208312 (Red Byte LLC): 20 days, 9:14:39.667784
    271907 (COLNETWORK C.A.): 20 days, 2:36:56.351874
    17839 (LG HelloVision Corp.): 19 days, 18:23:39.054608
    6128 (CABLE-NET-1): 19 days, 16:07:30.901044
    44592 (SkyLink Data Center BV): 19 days, 15:06:20.638203
    17858 (LG POWERCOMM): 19 days, 5:17:21.690438
    31898 (ORACLE-BMC-31898): 19 days, 1:07:23.079560
    56041 (China Mobile communications corporation): 19 days, 0:35:21.003351
    131090 (CAT TELECOM Public Company Ltd,CAT): 19 days, 0:15:41.523275
    24444 (Shandong Mobile Communication Company Limited): 18 days, 20:38:10.714158
    29518 (Bredband2 AB): 18 days, 12:21:15.845688
    57523 (Chang Way Technologies Co. Limited): 18 days, 9:01:39.974701
    7303 (Telecom Argentina S.A.): 18 days, 7:02:09.368279
    45758 (Triple T Broadband Public Company Limited): 18 days, 5:36:13.982977
    138968 (rainbow network limited): 18 days, 0:58:52.002422
    136180 (Beijing Tiantexin Tech. Co., Ltd.): 17 days, 19:57:01.135366
    30722 (Vodafone Italia S.p.A.): 17 days, 10:22:54.404860
    20001 (TWC-20001-PACWEST): 16 days, 20:35:20.677189
    174 (COGENT-174): 16 days, 10:12:20.612264
    208091 (Xhost Internet Solutions Lp): 16 days, 1:01:53.757159
    9341 (PT INDONESIA COMNETS PLUS): 15 days, 0:45:13.062850
    53813 (ZSCALER-INC): 14 days, 14:55:40.304926
    49581 (Tube-Hosting): 14 days, 11:37:32.118222
    
  • tentortentor Member, Patron Provider
    edited September 2023

    @silicomnet said: We report more than 10.000 (daily) abusers ips to abuseipdb.com

    This is a bit more than we have:

    What exactly do you report? In our case it is established TCP connections to the honeypots within our network.

    Also I would recommend you to not use AbuseIPDB, it is pointless. Better send automated email complaints, most of the time it will work flawlessly (except DigitalOcean, OVH, Scaleway, NForce and a few others).

    Thanked by 1chihcherng
  • BetaRacksBetaRacks Member
    edited September 2023

    @silicomnet said:

    @LTniger said:
    Block ranges, rather than report ip. Countries like turkey, vietnam entire subnets can be blocked without to much thinking. I block entire countries to slow down abuse rate. But still malice actors probing for vulns.

    Sure, but you can´t block microsoft, DigitalOcean or Amazon entire network. We block some /16 or /24 subnets of China and Russia, also AbuseIPDB ips with more than 30 reports of abuse.

    These blocking will not play any role, because most of the ip are victims of botnets, and in these countries ISPs in the large-scale use of CGNAT, each user in the disconnect and reconnect to its PPPOE will usually be assigned to another outbound, when you block the public ip, often faced with the IPS in the city of all the users can't access your network
    So, usually you are blocking the normal customers in these countries.
    The attacker just needs to dump the bot and go on with what they're doing.

    Thanked by 1chihcherng
  • tentortentor Member, Patron Provider

    @BetaRacks said: These blocking will not play any role, because most of the ip are victims of botnets, and in these countries ISPs in the large-scale use of CGNAT, each user in the disconnect and reconnect to its PPPOE will usually be assigned to another outbound, when you block the public ip, often faced with the IPS in the city of all the users!

    And this is why you should notify ISP and not report to AbuseIPDB - it is not possible to actively monitor AbuseIPDB, their API lacks support of comments parsing...

  • Here are my top 10 countries/regions with the most unique source IP addresses from incoming port scans on September 26, 2023:

    1. China - 7328 IP addresses
    2. United States - 6546 IP addresses
    3. Singapore - 1459 IP addresses
    4. India - 1323 IP addresses
    5. Russian Federation - 850 IP addresses
    6. Brazil - 752 IP addresses
    7. Hong Kong - 675 IP addresses
    8. South Korea - 622 IP addresses
    9. Indonesia - 571 IP addresses
    10. Vietnam - 528 IP addresses
  • @tentor said:

    @silicomnet said: We report more than 10.000 (daily) abusers ips to abuseipdb.com

    This is a bit more than we have:

    What exactly do you report? In our case it is established TCP connections to the honeypots within our network.

    Also I would recommend you to not use AbuseIPDB, it is pointless. Better send automated email complaints, most of the time it will work flawlessly (except DigitalOcean, OVH, Scaleway, NForce and a few others).

    which system do you use to send the abuse emails?

  • tentortentor Member, Patron Provider

    @AbuseBeacon said: which system do you use to send the abuse emails?

    I have developed golang tool for this purpose

    Thanked by 1loay
  • @tentor said:

    @AbuseBeacon said: which system do you use to send the abuse emails?

    I have developed golang tool for this purpose

    Nice work

    Thanked by 1tentor
  • MaouniqueMaounique Host Rep, Veteran
    edited September 2023

    While I do get this frustration and understand the activity to report etc., overall I believe this is like tilting at windmills. It would do little to increase security and stop abuse traffic.
    Kudos to all of you, keep up the good work, but my personal opinion is that abuse can be blocked more efficiently at the end which I control.

    Thanked by 1tentor
  • tentortentor Member, Patron Provider
    edited September 2023

    @Maounique said: I believe this is like tilting at windmills. It would do little to increase security and stop abuse traffic.

    Kind of, it is hard to take down entire botnets or hackers operating from BPH only with abuse reports, however I believe that when handled appropriately by ISPs it can raise awareness of end-users so attackers will spend a bit more resources to do their illicit activity.

    Thanked by 1Maounique
  • MaouniqueMaounique Host Rep, Veteran

    @tentor said: it can raise awareness of end-users

    I think that maintaining lists of offenders is a good idea because we don't need to raise awareness at the end-user level, but at their ISP's level, people might implement that list of blocks and when there would be tons of complaints x or y destination cant be accessed, a lot of ISPs would try to stay out of those lists by policing their users themselves at a lower cost and increased efficiency.

    Reporting the abusers could help, we act on those within 24 hours and we are grateful for the work done, but only full ISP block could change attitudes of others.

  • tentortentor Member, Patron Provider

    @Maounique said: but only full ISP block could change attitudes of others.

    China citizens will be unhappy with this XD

    https://urlhaus.abuse.ch/statistics/#top_hosters

  • MaouniqueMaounique Host Rep, Veteran

    @tentor said: China citizens will be unhappy with this XD

    I believe that would make a little difference since they are blocked at the source to so many places that it doesn't really matter if a few more destinations are added, their internet is already fuck-ed up by the CCP, how much more could it be disrupted?

  • tentortentor Member, Patron Provider

    Top malware hosting networks, hosting active malware content (counting online malware distribution sites only):
    ...
    3 AS36459 GITHUB US 7 days, 23 hours, 42 minutes 133

    :anguished:

  • tentortentor Member, Patron Provider
    edited September 2023

    @Maounique said: how much more could it be disrupted?

    AFAIK they do still have VPN/Proxies to bypass Great China Firewall and when implementing AS-wide ban we will basically help CCP to conduct their censorship, aren't we?

  • MaouniqueMaounique Host Rep, Veteran

    @tentor said: AFAIK they do still have VPN/Proxies to bypass GFW and when implementing AS-wide ban we will basically help CCP to conduct their censorship, aren't we?

    Yes, any block of Chinese ISPs would help the censorship, but that is valid for any other network blocked, why block so many legitimate ppl for a few bad apples which were probably victims themselves?

    Open the taps and let the bytes be free!!! Resistance is futile.

  • tentortentor Member, Patron Provider
    edited September 2023

    I think the first thing we should do is no-abuse departments' reaction shame list :D

  • chihcherngchihcherng Veteran
    edited September 2023

    @tentor said: DigitalOcean processes abuse complaints if sent in XARF

    After reading what you said earlier, I gave it a shot and sent my report about a single DigitalOcean IP as an X-ARF formatted attachment. I got no response at all, and that's a relief. I'm not sure if my attachment is correctly formatted, but at least my email won't be flooded with replies from DigitalOcean if I begin reporting hundreds of IP addresses.

  • tentortentor Member, Patron Provider

    @chihcherng said: I got no response at all, and that's a relief.

    If you have low volume and wish to receive human response - use their abuse form: https://www.digitalocean.com/company/contact/abuse

    However when you will try to send too much abuse complaint you will be contacted by a human asking you to send X-ARF to them - and I can understand them somehow because they are very huge provider and for some reasons they already have high amount of questionable traffic, thus is it more favourably to automate abuse complaint handling and not to hire additional technicians.

    Amongst big providers there are a few who actually responds to let you know how abuse resolution is going - I can only name AWS and Hetzner.

  • tentortentor Member, Patron Provider
    edited September 2023

    @chihcherng said: at least my email won't be flooded with replies from DigitalOcean if I begin reporting hundreds of IP addresses.

    I filter out all acknowledgment and templated resolution notices by Sieve

  • Block all of China and all frantech and you'll have an instant improvement.

    Thanked by 1webcraft
  • @tentor said:

    @silicomnet said: We report more than 10.000 (daily) abusers ips to abuseipdb.com

    This is a bit more than we have:

    What tool are you using in the pic?

  • tentortentor Member, Patron Provider

    @cheekydozen said: What tool are you using in the pic?

    Kibana to view data from Elasticsearch (I am using it for centralized logs collection)

  • @tentor you send plain emails or you send X-ARF?

  • tentortentor Member, Patron Provider

    @AbuseBeacon said:
    @tentor you send plain emails or you send X-ARF?

    As of now only plaintext unfortunately, proper X-ARF generation requires major changes in how letters are generated, however this is on my roadmap.

Sign In or Register to comment.