InvestorsHub Logo
Followers 1
Posts 173
Boards Moderated 0
Alias Born 09/12/2007

Re: None

Saturday, 03/15/2008 4:17:22 PM

Saturday, March 15, 2008 4:17:22 PM

Post# of 8105
read halfway down page any comments on any relation to vtec or any stock promoter

If you would like to receive information on major updates to completewhois and related projects, please enter your email below to be added to our announcements mail list:


If you represent company listed on this page and disagree this the listing here, we now have a dispute resolution procedures that you can follow for us to re-evaluate this listing with the help of the public.

Main Hijacker Groups
While there are cases where ip blocks are hijacked individually, usually this is done by organizations or groups which hijack ip blocks and then try to sell the ip blocks or use them for themselves. Some groups listed here also hijack AS numbers (or directly get it from ARIN or other RIR as its not too difficult) and use those to setup what may seem like legitimate ISPs but these ISPs are in reality setup primarily to route the hijacked ip blocks and as such we call them "Rogue ISPs". The AS numbers that are under control of such a group and are primarily used for advertising hijacked ip blocks are called "Rogue AS" and should be blocked by others ISPs that do not want to help hijackers in their activities and if your ISP and if you're network provider and have one of the "Rogue ISP" listed here come to you as potential client, please read all information below and consider carefully if you really want such company as a client

Group and/or
people involved IP blocks hijacked ASNs used ISPs possibly related to this group Suspected Group Activities
VMX/AdvisTechSA
-
Chris Smith,
Nick Geyer,
Josh Harris,
James Dyer,
Jon Christopherson 64.79.128.0/19, 66.135.64.0/19, 128.13.0.0/16, 131.157.0.0/16, 134.33.0.0/16, 137.171.0.0/16, 138.121.0.0/16, 143.49.0.0/16, 144.2.0.0/16, 144.128.0.0/16, 147.111.0.0/16, 155.73.0.0/16, 157.156.0.0/16, 160.116.0.0/16, 160.122.0.0/16, 162.73.0.0/16, 167.179.0.0/16, 169.141.0.0/16, 192.83.0.0/16, 196.4.167.0/24, 198.204.0.0/21, 198.178.249.0/24, 198.278.250.0/23
suspected to also have been involved in hijacking of:
139.81.0.0/16, 141.196.0.0/16, 142.105.0.0/16, 144.176.0.0/15, 144.179.0.0/16, 144.180.0.0/15, , 157.237.0.0/16, 158.181.0.0/16, 167.212.0.0/16, 170.67.0.0/16, 170.208.0.0/16, 192.67.16.0/24,
216.64.224.0/20 AS8143,
AS15188,
AS26797,
AS27255, ISPs Setup by Advistech:
VMX Networks -
vmxnetworks.com

AdvisTechSA -
advistechsa.com
advistech.co.cr

CodexHosting -
www.codexcorp.net

PremiumLogic -
premiumlogic.com

possibly also:
MassiveISP.Net
NetVikings.Net
Hijacking ip blocks. Using ip blocks to send unsolicited emails (SPAM). Selling and leasing ip blocks in whole or in parts. Billing and credit card fraud. Joe-Jobs against opponents and previous ISPs.
INGS/Five-Elements -
Thomas Weisel, Paul Matuszewsky, Phil Doroff,
Jeff Wheeler,
Matthew Hallacy 199.120.163.0/23,
199.166.200.0/22,
199.201.151.0/23,
204.89.156.0/23 AS26891 Five-Elements.Com

INGS.COM Sending unsolicited emails (SPAM). Hijacking ip blocks (or leasing/buying hijacked ip blocks from others)
Web Design House and Starlan
-
Jim Cheung,
Michael Booth 148.3.0.0/16,
199.60.102.0/24,
199.120.254.0/24 AS26857,
AS27526 AS26857.NET
RAIKOUNET.NET

Web Design House - WDH.COM

Starlan -
starlan.com Sending unsolicited emails (SPAM). Hijacking ip blocks and possibly leasing/buying them
RackSource
-
Chris Tibaldo,
Greg Nowakowski 192.150.201.0/24,
192.150.240.0/24,
192.153.43.0/24,
192.160.34.0/24,
205.159.23.0/24,
205.159.34.0/24,
205.159.72..0/24,
205.159.126.0/24
suspected to also have been involved in hijacking of:
192.107.49.0/24,
199.245.138.0/24,
204.89.224.0/24
AS30040,
AS8129
Also these two ISPs may have association with them:
AS10741,
AS23522
Light One Comm. / LightCom Ventures -
lightened.com
lightened.net
Racksource -
racksource.net

CT Holding LLC -
UNF.NET

Health Products -
life-x.net
healthproductsnow.net
Hijacking legacy ARIN ip blocks. Using ip block to send unsolicited emails and hosting sites advertised by that. Billing and credit card fraud. Hosting of child pornography.
DoS Attacks and hacking when blackmailing opponents and previous ISPs.
RouteX LTD
-
Gordon Lantz 34.0.0.0/8,
159.2.0.0/16 AS23184 Routex Ltd -
routexltd.net
Hijacking legacy ARIN and IANA ip blocks (they are the only group known to have hijacked /8 ip block). They also know some people from VMX.
OneRoute,
OptInc Inc, Secureio Inc, Amreiser LLC
-
Adam Reiser,
Eddy Marin
and his other associates 205.235.64.0/20,
206.197.49.0/24,
206.197.28.0/24,
206.197.29.0/24,
206.197.175.0/24,
206.197.176.0/24,
206.197.177.0/24 AS29698,
AS29713,
AS29761 OptIn Inc / OptIn LLC
opt-in3.com, optin5.com
and many others...
Secureio Inc -
secureio.com

OC3 Networks -
oc3networks.com

Internet America -
internetamericallc.com
Hijacking ARIN ip blocks for use by Eddy Marin's OneRoute spam
operation. Hosting sites advertised by unsolicited emails and sending them.
Empire Towers
-
Thomas Cowles,
Tom Herman,
Aaron Smith 142.247.0.0/16,

ad page