I have just received a spam which has a so-called "payload" URL which
the spammer wants me to visit, apparently so that I can be sold some
male performance drugs of dubious origin.
The domain part of the URL resolves to the IPv4 address
217.8.117.98.
That address lies within a pair of bogon (unallocated) IPv4 address
blocks, 217.8.116.0/24 and 217.8.117.0/24, that are both being routed
by a common ASN, i.e. AS47510.
https://bgp.he.net/AS47510#_prefixesIt appears that AS47510 is itself an unallocated bogon at the present
time:
https://bgp.he.net/AS47510#_asinfoAs can be readily seen at the above link, AS47510 is peering with only
two other ASNs, i.e. AS29226 - JSC Mastertel (Russia) and AS35555 -
Crex Fex Pex Internet System Solutions" LLC.
The latter ASN, AS35555 also appears to be an unallocated bogon ASN
at the present time. Nontheless, that does not appear to be preventing
it from peering with yet another Russian network, AS213254 - OOO Rait
Telecom:
https://bgp.he.net/AS35555It would be Nice, in my opinion, if someone who speaks Russian could
make contact with the operators of AS29226 and AS213254 and respectfully
suggest to them that they should cease peering with bogon ASNs, such as
AS47510 and AS35555, including but not limited to bogon ASNs that are
at present routing bogon IPv4 address space.