The Case of the Disconnected Spammer, 2004-01-18
On Jan 18th, our DNS root server measurements showed a sudden increase in traffic. It lasted for a little more than two days. Note in the graph below that about 12 hours after the initial spike, there is another increase. The second increase is mostly in MX, AAAA, and A6 records. The AAAA/A6 queries are for [a-m].root-servers.net, because those records timed out of the clients caches after not getting any responses for 12 hours.
The high number of MX queries should be a tip-off to what was going on here...
These graphs show that a single /24 network is responsible for a significant amount of the traffic. About 1700 queries/second averaged over the first 17 hours of Jan 19th! Or 35% of all queries received during that period.
This is a much higher rate than we normally see from abusive sources. I wonder how many different hosts are involved?
> tcpdump -n -i em0 -c 100000 src net 207.244.46 | awk '{print $2}' | sort | uniq
207.244.46.21.1024
207.244.46.22.1024
207.244.46.23.1024
207.244.46.24.1024
207.244.46.25.1024
207.244.46.26.1024
207.244.46.28.1024
207.244.46.29.1024
207.244.46.30.1024
207.244.46.31.1024
207.244.46.33.1024
207.244.46.34.1024
207.244.46.35.1024
207.244.46.37.1024
207.244.46.38.1024
207.244.46.39.1024
207.244.46.40.1024
207.244.46.41.1024
207.244.46.42.1024
207.244.46.43.1024
207.244.46.44.1024
207.244.46.45.1024
207.244.46.46.1024
207.244.46.48.1024
207.244.46.49.1024
207.244.46.50.1024
207.244.46.51.1024
207.244.46.52.1024
207.244.46.53.1024
207.244.46.54.1024
207.244.46.55.1024
207.244.46.56.1024
207.244.46.57.1024
207.244.46.58.1024
207.244.46.59.1024
207.244.46.61.1024
207.244.46.62.1024
207.244.46.64.1024
207.244.46.65.1024
207.244.46.66.1024
207.244.46.67.1024
207.244.46.68.1024
207.244.46.69.1024
207.244.46.70.1024
207.244.46.72.4692
207.244.46.73.2137
207.244.46.74.2657
207.244.46.75.2593
207.244.46.76.3419
207.244.46.77.1796
207.244.46.78.2745
207.244.46.79.2427
207.244.46.80.2407
207.244.46.81.1338
207.244.46.82.1913
207.244.46.83.3891
207.244.46.84.2421
207.244.46.85.1972
207.244.46.86.2445
207.244.46.87.3626
207.244.46.88.1092
207.244.46.89.1507
207.244.46.90.4715
207.244.46.91.4978
207.244.46.92.3125
207.244.46.93.2774
207.244.46.94.2623
207.244.46.95.2380
207.244.46.96.3252
207.244.46.97.3466
207.244.46.98.2126
207.244.46.99.4252
207.244.46.100.1150
207.244.46.101.3849
207.244.46.102.4498
207.244.46.103.4887
207.244.46.104.3402
207.244.46.105.1177
207.244.46.106.4493
207.244.46.107.4185
207.244.46.108.4122
207.244.46.109.3093
207.244.46.110.3349
207.244.46.111.3668
207.244.46.112.3643
207.244.46.113.2588
207.244.46.114.3565
207.244.46.115.4164
207.244.46.116.2112
207.244.46.117.3984
Wow!
I wonder if they have reverse DNS set up correctly?
> host 207.244.46.21 21.46.244.207.IN-ADDR.ARPA domain name pointer 207-244-46-21.no-icmp-accepted.adsl.atl.ga.cdc.net > host 207.244.46.22 22.46.244.207.IN-ADDR.ARPA domain name pointer 207-244-46-22.no-icmp-accepted.adsl.atl.ga.cdc.net > host 207.244.46.23 23.46.244.207.IN-ADDR.ARPA domain name pointer 207-244-46-23.no-icmp-accepted.adsl.atl.ga.cdc.net > host 207.244.46.24 24.46.244.207.IN-ADDR.ARPA domain name pointer 207-244-46-24.no-icmp-accepted.adsl.atl.ga.cdc.net > host 207.244.46.25 25.46.244.207.IN-ADDR.ARPA domain name pointer 207-244-46-25.no-icmp-accepted.adsl.atl.ga.cdc.net
Okay...
Let's see who this network belongs to:
> whois -a 207.244.46.0
Chattanooga Data Connection, Inc. CHATDATA (NET-207-244-0-0-1)
207.244.0.0 - 207.244.63.255
Success Marketing Associates, LLC CDC-LEASED-IAG-40 (NET-207-244-40-0-1)
207.244.40.0 - 207.244.47.255
Success Marketing, you say?
> whois -a NET-207-244-40-0-1 OrgName: Success Marketing Associates, LLC OrgID: SMAL-3 Address: 701 N. Green Valley Parkway Address: Suite 200 City: Henderson StateProv: NV PostalCode: 89074 Country: US NetRange: 207.244.40.0 - 207.244.47.255 CIDR: 207.244.40.0/21 NetName: CDC-LEASED-IAG-40 NetHandle: NET-207-244-40-0-1 Parent: NET-207-244-0-0-1 NetType: Reassigned Comment: RegDate: 2005-01-10 Updated: 2005-01-10 OrgTechHandle: IPMAN10-ARIN OrgTechName: IP Manager OrgTechPhone: +1-800-477-1477 OrgTechEmail: ipmanager@successmarketingassoc.com
Hm, a network recently registered with ARIN? We sent a friendly email to ipmanager@successmarketingassoc.com. After a short wait, here is the reply:
Hi. This is the qmail-send program at mail.smsonline.net. I'm afraid I wasn't able to deliver your message to the following addresses. This is a permanent error; I've given up. Sorry it didn't work out. <ipmanager@successmarketingassoc.com>: This address no longer accepts mail.
You're not the only one who's sorry...
Let's try their ISP:
> whois -a NET-207-244-0-0-1 OrgName: Chattanooga Data Connection, Inc. OrgID: CHAT Address: PO Box 5269, 2003 Amnicola Hwy. City: Chattanooga StateProv: TN PostalCode: 37406 Country: US NetRange: 207.244.0.0 - 207.244.63.255 CIDR: 207.244.0.0/18 NetName: CHATDATA NetHandle: NET-207-244-0-0-1 Parent: NET-207-0-0-0-0 NetType: Direct Allocation NameServer: DNS1.CHATTANOOGA.CDC.NET NameServer: DNS2.CHATTANOOGA.CDC.NET Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE RegDate: 1996-11-06 Updated: 2002-02-08 TechHandle: CNO2-ARIN TechName: Network Operations Center TechPhone: +1-423-266-3369 TechEmail: noc@cdc.net
We phoned 423-266-3369. An automated system gives us three choices: one for tech support, two for accounting information, three for sales. Tech support should be able to help.
Sadly, no. The woman we spoke with insisted that I call back and speak with someone in sales, because they are "in the other building." I am not making this up!
Maybe noc@cdc.net goes to a more clueful person than the one who answers tech support calls. We sent another message to noc@cdc.net. I didn't bounce, but we haven't received a reply yet. Probably shouldn't be surprised since they can't even run a web site.
At this point we wondered if Chattanooga Data Connection was indeed the ISP for Success Marketing Associates, LLC (or whoever is sourcing these packets). A traceroute reveals:
# traceroute -n 207.244.46.83 traceroute to 207.244.46.83 (207.244.46.83), 64 hops max, 40 byte packets 1 * * * 2 * * * 3 * * * 4 * * * ^C
Wow, so our first-hop router doesn't have a route for this network?
route-views.oregon-ix.net>show ip route 207.244.46.0 % Network not in table
I see.... I wonder where this traffic is really coming from?
Seems like either this IP space was hijacked, or someone was using it before, and then it broke. We decided to download a bunch of the archived BGP tables from routeviews and find out if anyone was recently advertising this space. The results:
2005-01-01-0000:* 207.244.46.0 64.200.151.12 0 7911 6389 6387 25817 21529 i 2005-01-02-0000:* 207.244.46.0 129.250.0.85 11 0 2914 209 25817 25817 25817 21529 i 2005-01-03-0000:* 207.244.46.0 129.250.0.85 11 0 2914 209 25817 25817 25817 21529 i 2005-01-04-0000:* 207.244.46.0 209.10.12.28 3 0 4513 701 6389 6387 25817 21529 i 2005-01-05-0000:* 207.244.46.0 209.10.12.28 3 0 4513 701 6389 6387 25817 21529 i 2005-01-06-0000:* 207.244.46.0 209.10.12.28 3 0 4513 701 6389 6387 25817 21529 i 2005-01-07-0000:* 207.244.46.0 216.218.252.152 0 6939 6389 6387 25817 21529 i 2005-01-08-0000: 2005-01-09-0000: 2005-01-10-0000: 2005-01-11-0000: 2005-01-12-0000:* 207.244.46.0/23 203.62.252.26 0 1221 4637 6461 30092 i 2005-01-13-0000:* 207.244.46.0/23 208.186.154.35 0 0 5650 6461 30092 i 2005-01-14-0000:* 207.244.46.0/23 208.186.154.35 0 0 5650 6461 30092 i 2005-01-15-0000:* 207.244.46.0/23 217.75.96.60 0 0 16150 15703 20495 6461 30092 i 2005-01-16-0000:* 207.244.46.0/23 129.250.0.11 6 0 2914 6461 30092 i 2005-01-17-0000:* 207.244.46.0/23 217.75.96.60 0 0 16150 15703 20495 6461 30092 i 2005-01-18-0000:* 207.244.46.0/23 196.7.106.245 0 0 2905 701 6461 30092 i 2005-01-19-0000"
AS 21529 is the aforementioned, clue-deprived CDC.net. Interesting that the space was more recently advertised by AS 30092, which turns out to be assertive.ca.
I wrote to the NOC at assertive.ca and received a quick and friendly reply from Chris Phillips. Turns out this space was announced by them on behalf of a new customer that turned out to be a spammer. Although the route was withdrawn, apparently their boxes remained connected. Assertive Networks disconnected their servers a short while later, and the flood of queries stopped.
Todays Internet Lesson: Don't just withdraw routes to spammers, yank the network cables out of their boxes!