{"id":1533,"date":"2024-04-03T17:19:13","date_gmt":"2024-04-03T21:19:13","guid":{"rendered":"https:\/\/www.magicspam.com\/blog\/?p=1533"},"modified":"2024-04-03T17:19:14","modified_gmt":"2024-04-03T21:19:14","slug":"asn-lookup-finding-source-spam","status":"publish","type":"post","link":"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/","title":{"rendered":"ASN Lookup: Finding the source of all that spam"},"content":{"rendered":"\n<p>Ever wonder where all of that incoming spam comes from? It&#8217;s easy to jump to conclusions about the source of the traffic, but what may seem like random domain names and servers might not be as random as you think. Fortunately, we as email administrators can always tell what IP the source came from. That IP belongs to a network, and that network can be attributed to an <a href=\"#jumplink2\">Autonomous System Number (ASN)<\/a>. By performing an ASN lookup, we can figure out who operates the network of that IP.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What is an Autonomous System Number (ASN)?<\/strong><\/h3>\n\n\n\n<p>The internet is home to over 4 billion possible IP addresses, right? Not all of them are observable (many are either reserved addresses or operated by single large entities that aren&#8217;t really visible), but many of them are. A single IP can be responsible for hundreds of thousands of domains and email addresses, and every IP belongs to a network. As such, every network has information we can use. By researching which networks spam is coming from, you can not only discover interesting countermeasures, but take action against entire networks rather than IP by IP (if a network is abusing your server).<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>Typically, when you wish to know more about an IP, the <strong>&#8220;Whois&#8221;<\/strong> lookup tool can provide you some information. That said, not all Whois data is completely accurate.&nbsp;<\/em><\/p>\n<\/blockquote>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e746891e4e4&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e746891e4e4\" class=\"wp-block-image size-full wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1380\" height=\"648\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/whois-wide.png\" alt=\"whois lookup on a laptop in front of white wall\" class=\"wp-image-2092\" srcset=\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/whois-wide.png 1380w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/whois-wide-300x141.png 300w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/whois-wide-1024x481.png 1024w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/whois-wide-768x361.png 768w\" sizes=\"auto, (max-width: 1380px) 100vw, 1380px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p>The <a id=\"jumplink1\"><strong>Regional Internet Registries (RIRs)<\/strong><\/a> long ago agreed that every operator of networks must have a unique number for routing and interoperability reasons. Every IP on the internet has to have both a &#8220;route&#8221; as well as be associated with an &#8220;operator.&#8221; The ASN number reflects the latter.<\/p>\n\n\n\n<p>In essence, <strong><a id=\"jumplink2\">Autonomous System Numbers (ASNs)<\/a><\/strong> identify those who operate networks on the internet. These are formatted as <strong>AS + number<\/strong>; for example, Microsoft&#8217;s ASN is AS8075.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e746891ef63&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e746891ef63\" class=\"aligncenter size-full is-resized wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1903\" height=\"827\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/ASN-Microsoft-Example.png\" alt=\"ipinfo asn number lookup\" class=\"wp-image-2043\" style=\"width:840px;height:auto\" srcset=\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/ASN-Microsoft-Example.png 1903w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/ASN-Microsoft-Example-300x130.png 300w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/ASN-Microsoft-Example-1024x445.png 1024w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/ASN-Microsoft-Example-768x334.png 768w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/ASN-Microsoft-Example-1536x668.png 1536w\" sizes=\"auto, (max-width: 1903px) 100vw, 1903px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><figcaption class=\"wp-element-caption\"><em>Courtesy of <a href=\"http:\/\/ipinfo.io\">ipinfo.io<\/a><\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<p>Without an ASN, the autonomous way networks talk to each other would not work. This information is also important to many internet protocols, including <strong>Border Gateway Protocol (BGP)<\/strong>.<\/p>\n\n\n\n<p>Because ASNs indicate who operates which group of IPs, they can be used in researching the abusive network. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>RBLs: A long-term solution for spam and network abuse<\/strong> <\/h4>\n\n\n\n<p>Let&#8217;s say you get a ton of unwanted traffic from an IP. You could try blacklisting every domain or email address individually, but it&#8217;d be a lot easier to block the IP entirely. While there are only 4 billion IPs, there are almost unlimited domain names and email addresses. <\/p>\n\n\n\n<p>Manually adding IPs to your blacklists can also be a huge time and energy sink. Every time you receive spam, you would have to manually go in, find the IP address, and block it. <strong>Real-Time Blackhole Lists (RBLs)<\/strong>, like <a href=\"https:\/\/www.spamrats.com\/?link_id=M0hMSN7N02\">SpamRATS<\/a> RBL, save you the work of having to identify and manually blacklist IPs. <\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p><em>RBLs are IP-based, but if enough IPs from a single operator are listed, you may want to know all of the IPs that operator is using. This is where an ASN lookup comes in handy!<\/em><\/p><\/blockquote><\/figure>\n\n\n\n<p>If you use <a href=\"https:\/\/www.magicspam.com\/?link_id=M0hMSN7N02\">MagicSpam<\/a> to protect your server, this comes with SpamRATS built in. It automates the process with utmost <a href=\"https:\/\/www.intra2net.com\/en\/support\/antispam\/index.php_sort=accuracy_order=desc.html\">accuracy<\/a>, as well as range, so you need not manually block IPs or emails. You simply install and forget.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What does an ASN lookup tell us?<\/strong><\/h3>\n\n\n\n<p>To perform an ASN lookup, you must know the IP address responsible for sending an email. You can find this in your email logs, or by looking at the raw information in your emails. You can find the sender&#8217;s IP address in the email &#8220;header;&#8221; this is visible by going to the email and clicking <strong>View Source<\/strong>, <strong>View original<\/strong>, or the like.<\/p>\n\n\n\n<p>For example, here is a piece of common spam that you might see. The IP address is available in the header. In this case, it is <strong>159.65.131.137<\/strong>.<\/p>\n\n\n<div class=\"wp-block-image is-style-default\">\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e746891facb&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e746891facb\" class=\"aligncenter size-full wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"572\" height=\"401\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/bad-ip-address-e1711132024583.jpg\" alt=\"opening header email finding ip address\" class=\"wp-image-1956\" srcset=\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/bad-ip-address-e1711132024583.jpg 572w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/bad-ip-address-e1711132024583-300x210.jpg 300w\" sizes=\"auto, (max-width: 572px) 100vw, 572px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><figcaption class=\"wp-element-caption\">The Bad Actor is using IP Address: 159.65.131.137<\/figcaption><\/figure>\n<\/div>\n\n\n<p>Once you have the IP, you can plug it into a reverse Whois, an online Whois lookup tool, or another 3rd party service to find out more. The <strong>American Registry for Internet Numbers (ARIN)<\/strong> administered this particular IP address as part of a network block back in 2017. When they transferred this block, they associated it with the operator&#8217;s <a href=\"#jumplink2\">ASN<\/a>: AS14061.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7468920470&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e7468920470\" class=\"aligncenter size-full is-resized wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"976\" height=\"257\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/Screenshot-from-2024-04-01-09-33-53.png\" alt=\"whois lookup digitalocean results\" class=\"wp-image-2076\" style=\"width:840px;height:auto\" srcset=\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/Screenshot-from-2024-04-01-09-33-53.png 976w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/Screenshot-from-2024-04-01-09-33-53-300x79.png 300w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/Screenshot-from-2024-04-01-09-33-53-768x202.png 768w\" sizes=\"auto, (max-width: 976px) 100vw, 976px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><figcaption class=\"wp-element-caption\">Using Whois to reveal additional details about IP 159.65.131.137<\/figcaption><\/figure>\n<\/div>\n\n\n<p>Services like custom Whois servers and <em>ipinfo.io<\/em> can offer details about the IP, network, operator, and even the region. In our example, though this block is under ARIN&#8217;s responsibility, it appears it&#8217;s being used in Singapore. We can also see the ASN associated with this operator, DigitalOcean. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7468920eac&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e7468920eac\" class=\"aligncenter size-full is-resized wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1379\" height=\"878\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/looking-up-an-ip-address-on-ipinfo.png\" alt=\"looking up ip address on ipinfo\n\" class=\"wp-image-2055\" style=\"width:649px;height:auto\" srcset=\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/looking-up-an-ip-address-on-ipinfo.png 1379w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/looking-up-an-ip-address-on-ipinfo-300x191.png 300w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/looking-up-an-ip-address-on-ipinfo-1024x652.png 1024w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/looking-up-an-ip-address-on-ipinfo-768x489.png 768w\" sizes=\"auto, (max-width: 1379px) 100vw, 1379px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><figcaption class=\"wp-element-caption\">Looking up an IP via <em>ipinfo<\/em>.<\/figcaption><\/figure>\n<\/div>\n\n\n<p>Now, despite the RIRs&#8217; best efforts, not all network ownership information you see in an ASN lookup is always accurate. Some companies have network blocks with vague, misleading, or even fake information. Reach out to the team at <a href=\"https:\/\/www.linuxmagic.com\/contact\/\">LinuxMagic<\/a> if you need help identifying accurate, up-to-date ASN ownership information.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>What to do after identifying the ASN<\/strong><\/h4>\n\n\n\n<p>After identifying the ASN, we can find all the other networks operated by the same organization.  To do this, you can use a custom Whois lookup from dedicated Whois services that provide this information. <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><code>whois -h whois.radb.net -- '-i origin' AS14061 | grep \"^route\\:\" | cut -d\\: -f2 | awk '{$1=$1};1' | sort -n | uniq<\/code><\/p>\n<\/blockquote>\n\n\n\n<p>Running the above command, we can see that AS14061 (DigitalOcean, LLC) has 920 networks recorded as belonging to the same organization.  <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why do we care about the organization with the ASN?<\/h2>\n\n\n\n<p>You would think that before an organization can get IP space, they must show they will use it for legitimate purposes and legal activities, right? Well, actually, no.<\/p>\n\n\n\n<p>The RIRs (like <a href=\"https:\/\/www.arin.net\/reference\/materials\/abuse\/\">ARIN<\/a>, <a href=\"https:\/\/www.apnic.net\/manage-ip\/using-whois\/abuse-and-spamming\/reporting-abuse-and-spam\/\">APNIC<\/a>, and <a href=\"https:\/\/www.ripe.net\/support\/abuse\/\">RIPE<\/a>) choose not to get involved in this. It&#8217;s just not part of their mandate. On top of this, many large organizations with IP space &#8220;rent&#8221; parts of their networks to other companies. If they so please, these organizations can disregard what the IPs are used for, so long as the renting party has a proven need and the registration information is accurate.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7468921a34&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e7468921a34\" class=\"wp-block-image size-full wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"4096\" height=\"2225\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/hacker-at-laptop-relaxing2.png\" alt=\"man at computer hacking and relaxing\" class=\"wp-image-2155\" srcset=\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/hacker-at-laptop-relaxing2.png 4096w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/hacker-at-laptop-relaxing2-300x163.png 300w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/hacker-at-laptop-relaxing2-1024x556.png 1024w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/hacker-at-laptop-relaxing2-768x417.png 768w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/hacker-at-laptop-relaxing2-1536x834.png 1536w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/hacker-at-laptop-relaxing2-2048x1113.png 2048w\" sizes=\"auto, (max-width: 4096px) 100vw, 4096px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p>As you may suspect, some of these organizations may &#8220;rent&#8221; IPs to nefarious actors. Of course, this would facilitate spam and malicious attacks. Remember, the laws are different around the world, so you can&#8217;t rely on the legal frameworks to prevent bad things from happening.  <\/p>\n\n\n\n<p>If an organization has a track record of hosting bad actors, should we trust any IP within its networks? Probably not, especially when the organization ignores or takes a long time to take down these actors. This is particularly frustrating for <strong>Information Security (InfoSec) <\/strong>researchers, as well as law enforcement. A simple search on Twitter\/X will find lots of reports about various network operators.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e74689223d2&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e74689223d2\" class=\"aligncenter size-full wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"1080\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/hacker-getting-data.jpg\" alt=\"hacker acquiring data under ASN\" class=\"wp-image-2190\" srcset=\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/hacker-getting-data.jpg 2000w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/hacker-getting-data-300x162.jpg 300w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/hacker-getting-data-1024x553.jpg 1024w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/hacker-getting-data-768x415.jpg 768w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/hacker-getting-data-1536x829.jpg 1536w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n<\/div>\n\n\n<p>We&#8217;ve recently seen more international efforts to go after some of these networks, especially ones used in obvious cybercriminal activity. In our industry, we call these kinds of organizations <strong>bulletproof hosts<\/strong>. These are hosting companies that either promise they won&#8217;t shut you down for your activities publicly, or have a history of doing nothing to address abuse reports.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Case Study: Hotmilk Studios LTD<\/strong><\/h4>\n\n\n\n<p>An organization mentioned in recent InfoSec reports has reportedly been hosting malware. The IP 94.156.8.244 has supposedly been up for over a month without the complaints being addressed. A <a href=\"https:\/\/hetrixtools.com\/blacklist-check\/94.156.8.244\">quick check on HetrixTools<\/a> shows that IP appears on many RBLs. This also enables you to check other IPs belonging to the same organization by using the ASN lookup.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7468922e6b&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e7468922e6b\" class=\"aligncenter size-full is-resized wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"748\" height=\"345\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/Screenshot-from-2024-04-01-10-39-48.png\" alt=\"whois lookup sircrosarnet bulletproof host\" class=\"wp-image-2079\" style=\"width:834px;height:auto\" srcset=\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/Screenshot-from-2024-04-01-10-39-48.png 748w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/Screenshot-from-2024-04-01-10-39-48-300x138.png 300w\" sizes=\"auto, (max-width: 748px) 100vw, 748px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><figcaption class=\"wp-element-caption\">Whois shows that this IP currently belongs to&#8230;<\/figcaption><\/figure>\n<\/div>\n\n\n<p>The <strong>Referral Whois (RWhois)<\/strong> provides additional details, like who is routing traffic to this ASN. In this case, that would be the company called NETERRA, the organization that supposedly owns this IP block (SircosarNET, Bulgaria), and the company currently listed as using it (Hotmilk, Great Britain). <\/p>\n\n\n\n<p>Interestingly, when doing a lookup at RIPE, the responsible Regional Internet Registry, we see the following posted:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"947\" height=\"165\" src=\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/Screenshot-from-2024-04-01-10-50-07.png\" alt=\"\" class=\"wp-image-2080\" srcset=\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/Screenshot-from-2024-04-01-10-50-07.png 947w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/Screenshot-from-2024-04-01-10-50-07-300x52.png 300w, https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/04\/Screenshot-from-2024-04-01-10-50-07-768x134.png 768w\" sizes=\"auto, (max-width: 947px) 100vw, 947px\" \/><\/figure>\n\n\n\n<p>Given the situation, this should help you decide whether you want to play whack-a-mole as each IP comes across your desk, or apply the same rules for the whole ASN.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Recognize a bad ASN when you see one <\/strong><\/h3>\n\n\n\n<p>ASN lookup is not guaranteed to be foolproof. However, the internet community reports many ASNs out there as threats. Many network operators go as far as to block all traffic from ASN operators that are deemed dirty, suspicious, or have a history of criminal activity. These include ASN operators that seemingly do not care about or address abuse issues.<\/p>\n\n\n\n<p>You can check these out further in the SpamRATS RATS-NULL or SpamHaus DROP lists. You can even add them to your firewalls, or network layers. The easiest and most effective solution is to sign-up for a data feed that monitors ASNs, or use a product like <a href=\"https:\/\/www.magicspam.com\/?link_id=M0hMSN7N02\">MagicSpam<\/a> to mitigate spam at the SMPT level. <\/p>\n\n\n\n<p>But remember, one ASN could house hundreds of networks and thousands of IPs. Using ASN lookup tools is much easier than trying to address threats across all 4 billion IPs. Furthermore, if you know or find fake information used in registering an ASN, contact the responsible RIR with your evidence. Those IPs can be returned to the IP pool for the use by legitimate operators.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ever wonder where all of that incoming spam comes from? It&#8217;s easy to jump to conclusions about the source of the traffic, but what may seem like random domain names and servers might not be as random as you think. Fortunately, we as email administrators can always tell what IP the source came from. That [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":2037,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24,16],"tags":[54,46,45,44,38,47,26,52,39,42,41,55,56,53,43,50,48,40,49,51],"class_list":["post-1533","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email-security","category-magicspam","tag-arin","tag-as","tag-asn","tag-autonomous-system-as","tag-autonomous-system-number-asn","tag-bulletproof-hosting","tag-cybersecurity","tag-digitalocean","tag-email-server","tag-hosting-provider","tag-ip","tag-ip-address","tag-ip-space","tag-ipinfo","tag-ipv4","tag-network","tag-rir","tag-spam","tag-threat-intelligence","tag-whois"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ASN Lookup: Finding the source of all that spam - MagicSpam Blog<\/title>\n<meta name=\"description\" content=\"Looking up Autonomous System Numbers (ASNs) allows you to trace an IP back to the source. This will tell us about the hosting organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ASN Lookup: Finding the source of all that spam - MagicSpam Blog\" \/>\n<meta property=\"og:description\" content=\"Looking up Autonomous System Numbers (ASNs) allows you to trace an IP back to the source. This will tell us about the hosting organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/\" \/>\n<meta property=\"og:site_name\" content=\"MagicSpam Business Email Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-03T21:19:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-03T21:19:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/ASN-Lookup-Article.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Curtis Joe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@magicspam\" \/>\n<meta name=\"twitter:site\" content=\"@magicspam\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Curtis Joe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/\"},\"author\":{\"name\":\"Curtis Joe\",\"@id\":\"https:\/\/www.magicspam.com\/blog\/#\/schema\/person\/c6cdf8f1780a94f94acfa7fe509e78a6\"},\"headline\":\"ASN Lookup: Finding the source of all that spam\",\"datePublished\":\"2024-04-03T21:19:13+00:00\",\"dateModified\":\"2024-04-03T21:19:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/\"},\"wordCount\":1499,\"publisher\":{\"@id\":\"https:\/\/www.magicspam.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/ASN-Lookup-Article.jpg\",\"keywords\":[\"ARIN\",\"AS\",\"ASN\",\"Autonomous System (AS)\",\"Autonomous System Number (ASN)\",\"Bulletproof Hosting\",\"Cybersecurity\",\"DigitalOcean\",\"Email server\",\"hosting provider\",\"IP\",\"IP address\",\"IP space\",\"ipinfo\",\"IPv4\",\"Network\",\"RIR\",\"Spam\",\"Threat Intelligence\",\"whois\"],\"articleSection\":[\"Email Security\",\"MagicSpam\"],\"inLanguage\":\"en-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/\",\"url\":\"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/\",\"name\":\"ASN Lookup: Finding the source of all that spam - MagicSpam Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.magicspam.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/ASN-Lookup-Article.jpg\",\"datePublished\":\"2024-04-03T21:19:13+00:00\",\"dateModified\":\"2024-04-03T21:19:14+00:00\",\"description\":\"Looking up Autonomous System Numbers (ASNs) allows you to trace an IP back to the source. This will tell us about the hosting organization.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/#primaryimage\",\"url\":\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/ASN-Lookup-Article.jpg\",\"contentUrl\":\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/ASN-Lookup-Article.jpg\",\"width\":2560,\"height\":1280,\"caption\":\"autonomous system number lookup\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.magicspam.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ASN Lookup: Finding the source of all that spam\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.magicspam.com\/blog\/#website\",\"url\":\"https:\/\/www.magicspam.com\/blog\/\",\"name\":\"MagicSpam Email Security Blog\",\"description\":\"Helping Email Administrators stopping threats\",\"publisher\":{\"@id\":\"https:\/\/www.magicspam.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.magicspam.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.magicspam.com\/blog\/#organization\",\"name\":\"mThreat Technologies Inc - MagicSpam Spam and Threat Protection\",\"url\":\"https:\/\/www.magicspam.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/www.magicspam.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2022\/07\/cropped-Logo-3x3x.png\",\"contentUrl\":\"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2022\/07\/cropped-Logo-3x3x.png\",\"width\":853,\"height\":234,\"caption\":\"mThreat Technologies Inc - MagicSpam Spam and Threat Protection\"},\"image\":{\"@id\":\"https:\/\/www.magicspam.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/magicspam\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.magicspam.com\/blog\/#\/schema\/person\/c6cdf8f1780a94f94acfa7fe509e78a6\",\"name\":\"Curtis Joe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/www.magicspam.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5e4779861d2377288e005128adc76ff52451e5da0eb250332bafd40d9b6790e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5e4779861d2377288e005128adc76ff52451e5da0eb250332bafd40d9b6790e?s=96&d=mm&r=g\",\"caption\":\"Curtis Joe\"},\"url\":\"https:\/\/www.magicspam.com\/blog\/author\/curtis\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ASN Lookup: Finding the source of all that spam - MagicSpam Blog","description":"Looking up Autonomous System Numbers (ASNs) allows you to trace an IP back to the source. This will tell us about the hosting organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/","og_locale":"en_US","og_type":"article","og_title":"ASN Lookup: Finding the source of all that spam - MagicSpam Blog","og_description":"Looking up Autonomous System Numbers (ASNs) allows you to trace an IP back to the source. This will tell us about the hosting organization.","og_url":"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/","og_site_name":"MagicSpam Business Email Security Blog","article_published_time":"2024-04-03T21:19:13+00:00","article_modified_time":"2024-04-03T21:19:14+00:00","og_image":[{"width":2560,"height":1280,"url":"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/ASN-Lookup-Article.jpg","type":"image\/jpeg"}],"author":"Curtis Joe","twitter_card":"summary_large_image","twitter_creator":"@magicspam","twitter_site":"@magicspam","twitter_misc":{"Written by":"Curtis Joe","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/#article","isPartOf":{"@id":"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/"},"author":{"name":"Curtis Joe","@id":"https:\/\/www.magicspam.com\/blog\/#\/schema\/person\/c6cdf8f1780a94f94acfa7fe509e78a6"},"headline":"ASN Lookup: Finding the source of all that spam","datePublished":"2024-04-03T21:19:13+00:00","dateModified":"2024-04-03T21:19:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/"},"wordCount":1499,"publisher":{"@id":"https:\/\/www.magicspam.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/ASN-Lookup-Article.jpg","keywords":["ARIN","AS","ASN","Autonomous System (AS)","Autonomous System Number (ASN)","Bulletproof Hosting","Cybersecurity","DigitalOcean","Email server","hosting provider","IP","IP address","IP space","ipinfo","IPv4","Network","RIR","Spam","Threat Intelligence","whois"],"articleSection":["Email Security","MagicSpam"],"inLanguage":"en-CA"},{"@type":"WebPage","@id":"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/","url":"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/","name":"ASN Lookup: Finding the source of all that spam - MagicSpam Blog","isPartOf":{"@id":"https:\/\/www.magicspam.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/#primaryimage"},"image":{"@id":"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/ASN-Lookup-Article.jpg","datePublished":"2024-04-03T21:19:13+00:00","dateModified":"2024-04-03T21:19:14+00:00","description":"Looking up Autonomous System Numbers (ASNs) allows you to trace an IP back to the source. This will tell us about the hosting organization.","breadcrumb":{"@id":"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/#primaryimage","url":"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/ASN-Lookup-Article.jpg","contentUrl":"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2024\/03\/ASN-Lookup-Article.jpg","width":2560,"height":1280,"caption":"autonomous system number lookup"},{"@type":"BreadcrumbList","@id":"https:\/\/www.magicspam.com\/blog\/asn-lookup-finding-source-spam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.magicspam.com\/blog\/"},{"@type":"ListItem","position":2,"name":"ASN Lookup: Finding the source of all that spam"}]},{"@type":"WebSite","@id":"https:\/\/www.magicspam.com\/blog\/#website","url":"https:\/\/www.magicspam.com\/blog\/","name":"MagicSpam Email Security Blog","description":"Helping Email Administrators stopping threats","publisher":{"@id":"https:\/\/www.magicspam.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.magicspam.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Organization","@id":"https:\/\/www.magicspam.com\/blog\/#organization","name":"mThreat Technologies Inc - MagicSpam Spam and Threat Protection","url":"https:\/\/www.magicspam.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.magicspam.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2022\/07\/cropped-Logo-3x3x.png","contentUrl":"https:\/\/www.magicspam.com\/blog\/wp-content\/uploads\/2022\/07\/cropped-Logo-3x3x.png","width":853,"height":234,"caption":"mThreat Technologies Inc - MagicSpam Spam and Threat Protection"},"image":{"@id":"https:\/\/www.magicspam.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/magicspam"]},{"@type":"Person","@id":"https:\/\/www.magicspam.com\/blog\/#\/schema\/person\/c6cdf8f1780a94f94acfa7fe509e78a6","name":"Curtis Joe","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.magicspam.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d5e4779861d2377288e005128adc76ff52451e5da0eb250332bafd40d9b6790e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5e4779861d2377288e005128adc76ff52451e5da0eb250332bafd40d9b6790e?s=96&d=mm&r=g","caption":"Curtis Joe"},"url":"https:\/\/www.magicspam.com\/blog\/author\/curtis\/"}]}},"_links":{"self":[{"href":"https:\/\/www.magicspam.com\/blog\/wp-json\/wp\/v2\/posts\/1533","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.magicspam.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.magicspam.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.magicspam.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.magicspam.com\/blog\/wp-json\/wp\/v2\/comments?post=1533"}],"version-history":[{"count":210,"href":"https:\/\/www.magicspam.com\/blog\/wp-json\/wp\/v2\/posts\/1533\/revisions"}],"predecessor-version":[{"id":2231,"href":"https:\/\/www.magicspam.com\/blog\/wp-json\/wp\/v2\/posts\/1533\/revisions\/2231"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.magicspam.com\/blog\/wp-json\/wp\/v2\/media\/2037"}],"wp:attachment":[{"href":"https:\/\/www.magicspam.com\/blog\/wp-json\/wp\/v2\/media?parent=1533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.magicspam.com\/blog\/wp-json\/wp\/v2\/categories?post=1533"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.magicspam.com\/blog\/wp-json\/wp\/v2\/tags?post=1533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}