#Bulletproofhosting

The Spamhaus Projectspamhaus@infosec.exchange
2026-01-06

🎯 New Year’s resolution: Get Spamhaus’ free DROP lists to block known malicious IP ranges before they ever reach your network.

Start the year protected - access the list here 👇
spamhaus.org/blocklists/do-not

#DROP #IPs #ThreatIntel #NetworkHygiene #BulletproofHosting

The Spamhaus Projectspamhaus@infosec.exchange
2025-12-02

🔥 Want an easy, free way to block this traffic? Grab the DROP list here: ⬇️ ⬇️
spamhaus.org/blocklists/do-not

#DROP #IPs #BulletproofHosting #ThreatIntel

Erik van StratenErikvanStraten@todon.nl
2025-12-01

Kosten, naar verluidt: € 1,17. Resultaat: de bankrekening achter uw creditcard maximaal in het rood.

Geen dank aan Let's Encrypt voor het certificaat.

En de hele IP-reeks is crimineel (158.94.208.0 - 158.94.211.255, servers waarschijnlijk in Nederland). De nep KPN-inlog website aldaar gehost is ook nog steeds live (screenshots in todon.nl/@ErikvanStraten/11546).

#Phishing #CyberCrime #BulletProofHosting #LANEDONET #LetsEncryptIsEvil

Screenshot van een nep DHL pagina. In dit geval is de websitenaam (domeinnaam):
pakket-deliverynl punt com

Hierin staat (in het Engels) dat uw pakket niet kon worden afgeleverd.Screenshot van een nep DHL pagina. In dit geval is de websitenaam (domeinnaam):
pakket-deliverynl punt com

Na het invullen van veel persoonlijke gegevens (nooit invullen!) wordt om alle tekst op uw creditcard gevraagd (ook dat NIET doen).
2025-11-20

CISA and international partners have issued guidance to help ISPs and defenders mitigate cyber risks linked to Bulletproof Hosting Providers.
These infrastructures continue to support ransomware, phishing, and malware distribution at scale.
Key theme: reduce BPH effectiveness so adversaries are pushed toward compliant, legitimate hosting.
What technical controls would you prioritize?

Follow @technadu for more actionable threat updates.

#infosec #CISA #ThreatIntel #BulletproofHosting #CyberDefense #BlueTeam #NetworkSecurity

Bulletproof Defense: Mitigating Risks From Bulletproof Hosting Providers
The Spamhaus Projectspamhaus@infosec.exchange
2025-11-20

This week, everywhere you look, bulletproof hosting (BPH) is in cyber news headlines. From the CrazyRDP takedown, to sanctions against entities adjacent to Aeza, and most recently Media Land LLC and ML[.]Cloud] LLC (do these measures actually move the needle?), to new CISA guidance on mitigating BPH activities.🛡️

It’s clear the spotlight is firmly on one of cybercrime’s most persistent enablers. And for a good reason. Few infrastructures have enabled so much criminal activity, for so long, with such resilience.

Spamhaus has tracked BPH operators and their evolving tactics for decades. 🕵️ We've watched the ecosystem shift from monolithic BPHs to layered and complex business structures.

So, amid the sensational headlines, we’ve compiled a grounded look at the topic, covering: the history, the current landscape, and where the threat landscape is likely to head next.

Read it in full here 👉 spamhaus.org/resource-hub/bull

#Bulletproofhosting #Cybercrime

The anatomy of bulletproof hosting - past, present, future
The Spamhaus Projectspamhaus@infosec.exchange
2025-11-17

On November 12, around 250 physical servers were seized by the Dutch police at two datacenters in the Netherlands 👉 politie.nl/nieuws/2025/novembe

We assess the unnamed #bulletproofhosting provider (BPH) is CrazyRDP, a major #cybercrime hub previously operating front companies such as 🇺🇸 Delis LLC (AS211252), 🇺🇸 Limenet LLC (AS394711) and, most recently, 🇺🇸 Sovy Cloud Services (AS401110) and its downstreams (all incorporated in 🇺🇸 as well): ... ⤵️ 1/2

The Spamhaus Projectspamhaus@infosec.exchange
2025-11-10

Like all other internet abuse, bulletproof hosting does not just happen - it is enabled by facilitators such as network carriers, datacenter operators, IP brokers and domain registrars. Sometimes, malicious infrastructure agglomerates in the internet vicinity of such facilitators - why not join the show if your criminal competitors thrive there already?🧐

A particularly prolific example is 🇩🇪aurologic GmbH (regular readers might recognize the name), as highlighted by Recorded Future in a report published on November 6 ⤵️
recordedfuture.com/research/ma

#Cybercrime #BulletproofHosting #ThreatIntel #HostingProviders

The Spamhaus Projectspamhaus@infosec.exchange
2025-11-03

This is traffic you DO NOT want to connect with. ✋

🔥 Get FREE access to this additional layer of protection here ⬇️ ⬇️
spamhaus.org/blocklists/do-not

#DROP #IPs #BulletproofHosting #ThreatIntel

Erik van StratenErikvanStraten@todon.nl
2025-10-31

Hey #PoPo , word eens #FSCKING wakker!

BTW "mezohost․cc" (samen met subdomains "plesk." en 'backup.") verstopt zich achter Cloudflare met certificaten van "Google Trust Services": virustotal.com/gui/domain/mezo

(Edit) Sinds 1 juni dit jaar: crt.sh/?Identity=mezohost.cc

#BulletProofHosting #MezoHostCC #RailNetLLC #CyberCrime #CyberCriminaliteit #OVHisEvil #BigTechIsEvil #Politie #GoogleIsEvil #CloudflareIsEvil

Screenshot van (de Details tab) van https://www.virustotal.com/gui/ip-address/158.94.209.86/details

Volgens VirusTotal is het IP-adres in bovenstaande URL van "RailNet LLC" met vestigingsland Nederland (elders op deze pagina, buiten beeld in de screenshot, staat:

organisation: ORG-LD194-RIPE
org-name: Lanedonet Datacenter
org-type: OTHER
remarks: Report your complaint:
remarks: abuse@lanedo.net
address: Strawinskylaan 3051 1077 ZX,Amsterdam,Netherlands
country: NL

Nb. dat soort gegevens kunnen vervalst zijn. In welk datacenter een server met een specifiek IP-adres staat, is veel eenvoudiger op te sporen. Pak de huurder van de server, de verhuurder en het datacenter aan!

Een van de laatste certificaten geassocieerd met dit IP-adres is voor de volgende domeinnaam:
plesk punt metahost punt ccScreenshot van https://mezohost punt cc
The Spamhaus Projectspamhaus@infosec.exchange
2025-10-01

DROP is free to use, giving you an extra layer of protection against the worst IP space on the internet.

Access it here ⬇️ ⬇️
spamhaus.org/blocklists/do-not

#DROP #IPs #BulletproofHosting #ThreatIntel

The Spamhaus Projectspamhaus@infosec.exchange
2025-09-26

(🇺🇸 49.3 Networking LLC), a bulletproof hosting provider we've previously reported on. The sole network it propagates follows a similar hosting pattern than those currently announced by AS213441. Both ASNs share the same uplink, corroborating the suspicion that they might be part of the same cybercriminal operation.

Finished your meal? Have some mint DROPs to take away the phish 👉 spamhaus.org/blocklists/do-not and protect your network. Enjoy!

#BulletproofHosting #Phishing #Cybercrime #OSINT

3/3

The Spamhaus Projectspamhaus@infosec.exchange
2025-09-08
The Spamhaus Projectspamhaus@infosec.exchange
2025-08-06

🔥 Spamhaus provides FREE access to anyone who wants to add this layer of protection.

Get it here ➡️ spamhaus.org/blocklists/do-not

Remember, this is traffic you do not want to connect with. Not ever. DROP it now.

#DROP #IPs #BulletproofHosting #ThreatIntel

⚯ Michel de Cryptadamus ⚯cryptadamist@universeodon.com
2025-07-01

a russian hosting service that takes payment in crypto, Aeza Group, was just hit with #OFAC sanctions.

they've sent funds to a bunch of the shadiest crypto exchanges - #Cryptomus, #MEXC, #Binance, and (of course) #HTX, the crypto exchange run by the business partner of the president of the united states.

also looks like they took payment in #Tether, the #stablecoin whose money is managed by america's secretary of commerce howard lutnick.

* OFAC press release: ofac.treasury.gov/recent-actio
* Wallet: intel.arkm.com/explorer/addres

#JustinSun #threatintel #threatassessment #DNS #bulletproofhosting #cybersecurity #infosec #justinSun #howardlutnick #ransomware #russia #putin #vladimirPutin #ukraine #aeza #aezagroup

AEZA GROUP LLC, Ul. Zolnaya d. 15, str. 1, Pomeshch 1N, Office 603, St. Petersburg 193318, Russia; Kronversky pr-kt, 65 letter B, room 2n, office 1, room 5, St. Petersburg 197198, Russia; Website aeza.ru; Secondary sanctions risk: Ukraine-/Russia-Related Sanctions Regulations, 31 CFR 589.201; alt. Secondary sanctions risk: Ukraine-/Russia-Related Sanctions Regulations, 31 CFR 589.201; Organization Established Date 17 Jun 2021; Digital Currency Address - TRX TU4tDFRvcKhAZ1jdihojmBWZqvJhQCnJ4F; Tax ID No. 7813654490 (Russia); Business Registration Number 1217800095248 (Russia) [CAATSA - RUSSIA] [CYBER4].screenshot of wallet info on arkham
The Spamhaus Projectspamhaus@infosec.exchange
2025-07-01

Get it here ➡️ spamhaus.org/blocklists/do-not

Remember, this is traffic you do not want to connect with. Not ever. DROP it and move on.

#DROP #IPs #BulletproofHosting #ThreatIntel

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst