20-30Gbps UDP 1720 traffic appearing to originate from CN in last 24 hours
Has anyone else seen a massive amount of illegitimate UDP 1720 traffic coming from China being sent towards IP addresses which provide VoIP services? I'm talking in the 20-30Gbps range? The first incident was yesterday at around 13:00 EST, the second incident was today at 09:00 EST. I'm assuming this is just another DDoS like all others, but I would be interested to hear if I am not the only one seeing this. On list or off-list is fine. Thanks, -Drew
I’m sure this is just the extension of all the UDP amplification attacks that are ongoing. My experience is that 1720/CUCM should not be connected to a public network as those devices are often not well maintained or patched. If it’s of value I can look at adding this to the set of things that are enumerated as part of the general UDP amplification problems that we continue to face due to the lack of SAV. - Jared
On Jul 20, 2015, at 11:57 AM, Drew Weaver <drew.weaver@thenap.com> wrote:
Has anyone else seen a massive amount of illegitimate UDP 1720 traffic coming from China being sent towards IP addresses which provide VoIP services?
I'm talking in the 20-30Gbps range?
The first incident was yesterday at around 13:00 EST, the second incident was today at 09:00 EST.
I'm assuming this is just another DDoS like all others, but I would be interested to hear if I am not the only one seeing this.
On list or off-list is fine.
Thanks, -Drew
Ah, alright. I've seen the "general" amplification attacks SNMP/DNS/NTP/you name it, plenty but this is the first one I've ever seen one that targeted 1720/5060 and as its mitigated in one place it keeps moving from dst to dst fairly rapidly until none of the dst ips are available. -----Original Message----- From: Jared Mauch [mailto:jared@puck.nether.net] Sent: Monday, July 20, 2015 12:06 PM To: Drew Weaver <drew.weaver@thenap.com> Cc: nanog@nanog.org Subject: Re: 20-30Gbps UDP 1720 traffic appearing to originate from CN in last 24 hours I’m sure this is just the extension of all the UDP amplification attacks that are ongoing. My experience is that 1720/CUCM should not be connected to a public network as those devices are often not well maintained or patched. If it’s of value I can look at adding this to the set of things that are enumerated as part of the general UDP amplification problems that we continue to face due to the lack of SAV. - Jared
On Jul 20, 2015, at 11:57 AM, Drew Weaver <drew.weaver@thenap.com> wrote:
Has anyone else seen a massive amount of illegitimate UDP 1720 traffic coming from China being sent towards IP addresses which provide VoIP services?
I'm talking in the 20-30Gbps range?
The first incident was yesterday at around 13:00 EST, the second incident was today at 09:00 EST.
I'm assuming this is just another DDoS like all others, but I would be interested to hear if I am not the only one seeing this.
On list or off-list is fine.
Thanks, -Drew
On 20 Jul 2015, at 18:12, Drew Weaver wrote:
Ah, alright. I've seen the "general" amplification attacks SNMP/DNS/NTP/you name it, plenty but this is the first one I've ever seen one that targeted 1720/5060 and as its mitigated in one place it keeps moving from dst to dst fairly rapidly until none of the dst ips are available.
What source ports and breadth of purported source IPs? I'm not sure this is reflection/amplification attack, it may be a straight packeting of H.323 systems. ----------------------------------- Roland Dobbins <rdobbins@arbor.net>
route block china range whole of and/or firewall block china range whole of then contact gov and tell them trade talks need to involve china engaging with incident teams and abuse teams colin Sent from my iPhone
On 20 Jul 2015, at 16:57, Drew Weaver <drew.weaver@thenap.com> wrote:
Has anyone else seen a massive amount of illegitimate UDP 1720 traffic coming from China being sent towards IP addresses which provide VoIP services?
I'm talking in the 20-30Gbps range?
The first incident was yesterday at around 13:00 EST, the second incident was today at 09:00 EST.
I'm assuming this is just another DDoS like all others, but I would be interested to hear if I am not the only one seeing this.
On list or off-list is fine.
Thanks, -Drew
My network also saw 30gbps+ originating from the same region on multiple occasions beginning last night around 2300EST. On Jul 20, 2015 12:20 PM, <Valdis.Kletnieks@vt.edu> wrote:
On Mon, 20 Jul 2015 19:04:27 +0100, Colin Johnston said:
route block china range whole of and/or firewall block china range whole of
Do you have an authoritative list of *all* IP blocks that end up routed into China?
For bonus points, IPv6 blocks too. :)
see below for china ranges I believe, ipv4 and ipv6 1.0.1.0/24 1.0.2.0/23 1.0.8.0/21 1.0.32.0/19 1.1.0.0/24 1.1.2.0/23 1.1.4.0/22 1.1.8.0/21 1.1.16.0/20 1.1.32.0/19 1.2.0.0/23 1.2.2.0/24 1.2.4.0/22 1.2.8.0/21 1.2.16.0/20 1.2.32.0/19 1.2.64.0/18 1.3.0.0/16 1.4.1.0/24 1.4.2.0/23 1.4.4.0/22 1.4.8.0/21 1.4.16.0/20 1.4.32.0/19 1.4.64.0/18 1.8.0.0/16 1.10.0.0/21 1.10.8.0/23 1.10.11.0/24 1.10.12.0/22 1.10.16.0/20 1.10.32.0/19 1.10.64.0/18 1.12.0.0/14 1.24.0.0/13 1.34.0.0/32 1.45.0.0/16 1.48.0.0/14 1.56.0.0/13 1.68.0.0/14 1.80.0.0/12 1.116.0.0/14 1.180.0.0/14 1.184.0.0/15 1.188.0.0/14 1.192.0.0/13 1.202.0.0/15 1.204.0.0/14 14.0.0.0/21 14.0.12.0/22 14.1.0.0/22 14.16.0.0/12 14.102.128.0/22 14.102.156.0/22 14.103.0.0/16 14.104.0.0/13 14.112.0.0/12 14.130.0.0/15 14.134.0.0/15 14.144.0.0/12 14.192.60.0/22 14.192.76.0/22 14.196.0.0/15 14.204.0.0/15 14.208.0.0/12 27.8.0.0/13 27.16.0.0/12 27.34.232.0/21 27.36.0.0/14 27.40.0.0/13 27.50.40.0/21 27.50.128.0/17 27.54.72.0/21 27.54.152.0/21 27.54.192.0/18 27.98.208.0/20 27.98.224.0/19 27.99.128.0/17 27.103.0.0/16 27.106.128.0/18 27.106.204.0/22 27.109.32.0/19 27.112.0.0/18 27.112.80.0/20 27.113.128.0/18 27.115.0.0/17 27.116.44.0/22 27.121.72.0/21 27.121.120.0/21 27.128.0.0/15 27.131.220.0/22 27.144.0.0/16 27.148.0.0/14 27.152.0.0/13 27.184.0.0/13 27.192.0.0/11 27.224.0.0/14 31.220.30.224/27 36.0.0.0/22 36.0.8.0/21 36.0.16.0/20 36.0.32.0/19 36.0.64.0/18 36.0.128.0/17 36.1.0.0/16 36.4.0.0/14 36.16.0.0/12 36.32.0.0/14 36.36.0.0/16 36.37.0.0/19 36.37.36.0/23 36.37.39.0/24 36.37.40.0/21 36.37.48.0/20 36.40.0.0/13 36.48.0.0/15 36.51.0.0/16 36.56.0.0/13 36.96.0.0/11 36.128.0.0/10 36.192.0.0/11 36.248.0.0/14 36.254.0.0/16 37.153.134.0/25 37.156.6.0/25 39.0.0.0/24 39.0.2.0/23 39.0.4.0/22 39.0.8.0/21 39.0.16.0/20 39.0.32.0/19 39.0.64.0/18 39.0.128.0/17 39.64.0.0/11 39.96.0.1/32 39.96.0.2/31 39.96.0.4/30 39.96.0.8/29 39.96.0.16/28 39.96.0.32/27 39.96.0.64/26 39.96.0.128/25 39.96.1.0/24 39.96.2.0/23 39.96.4.0/22 39.96.8.0/21 39.96.16.0/20 39.96.32.0/19 39.96.64.0/18 39.96.128.0/17 39.97.0.0/16 39.98.0.0/15 39.100.0.0/14 39.104.0.0/14 39.108.0.0/16 39.128.0.0/10 42.0.0.0/22 42.0.8.0/21 42.0.16.0/21 42.0.24.0/22 42.0.32.0/19 42.0.128.0/17 42.1.0.0/19 42.1.32.0/20 42.1.48.0/21 42.1.56.0/22 42.1.128.0/17 42.4.0.0/14 42.48.0.0/13 42.56.0.0/14 42.62.0.0/17 42.62.128.0/19 42.62.160.0/20 42.62.180.0/22 42.62.184.0/21 42.63.0.0/16 42.80.0.0/15 42.83.64.0/20 42.83.80.0/22 42.83.88.0/21 42.83.96.0/19 42.83.128.0/17 42.84.0.0/14 42.88.0.0/13 42.96.64.0/19 42.96.96.0/21 42.96.108.0/22 42.96.112.0/20 42.96.128.0/17 42.97.0.0/16 42.99.0.0/18 42.99.64.0/19 42.99.96.0/20 42.99.112.0/22 42.99.120.0/21 42.100.0.0/14 42.120.0.0/15 42.122.0.0/16 42.123.0.0/19 42.123.36.0/22 42.123.40.0/21 42.123.48.0/20 42.123.64.0/18 42.123.128.0/17 42.128.0.0/12 42.156.0.0/19 42.156.36.0/22 42.156.40.0/21 42.156.48.0/20 42.156.64.0/18 42.156.128.0/17 42.157.0.0/16 42.158.0.0/15 42.160.0.0/12 42.176.0.0/13 42.184.0.0/15 42.186.0.0/16 42.187.0.0/18 42.187.64.0/19 42.187.96.0/20 42.187.112.0/21 42.187.120.0/22 42.187.128.0/17 42.192.0.0/13 42.201.0.0/17 42.202.0.0/15 42.204.0.0/14 42.208.0.0/12 42.224.0.0/12 42.240.0.0/16 42.242.0.0/15 42.244.0.0/14 42.248.0.0/13 43.224.12.0/22 43.224.24.0/22 43.224.44.0/22 43.224.52.0/22 43.224.56.0/22 43.224.64.0/21 43.224.72.0/22 43.224.80.0/22 43.224.100.0/22 43.224.140.0/22 43.224.144.0/22 43.224.160.0/22 43.224.176.0/22 43.224.184.0/22 43.224.200.0/21 43.224.208.0/21 43.224.216.0/22 43.224.224.0/22 43.224.240.0/22 43.225.76.0/22 43.225.84.0/22 43.225.120.0/21 43.225.140.0/22 43.225.172.0/22 43.225.180.0/22 43.225.184.0/22 43.225.208.0/22 43.225.216.0/21 43.225.224.0/20 43.225.240.0/21 43.225.252.0/22 43.226.32.0/19 43.226.64.0/19 43.226.96.0/20 43.226.112.0/21 43.226.120.0/22 43.226.128.0/18 43.226.192.0/20 43.226.208.0/21 43.226.236.0/22 43.226.240.0/20 43.227.0.0/21 43.227.8.0/22 43.227.28.0/22 43.227.32.0/19 43.227.64.0/19 43.227.96.0/21 43.227.104.0/22 43.227.136.0/21 43.227.144.0/22 43.227.152.0/21 43.227.160.0/20 43.227.176.0/21 43.227.188.0/22 43.227.192.0/19 43.227.232.0/22 43.227.248.0/21 43.228.0.0/18 43.228.64.0/21 43.228.76.0/22 43.228.100.0/22 43.228.116.0/22 43.228.120.0/22 43.228.132.0/22 43.228.136.0/22 43.228.148.0/22 43.228.152.0/22 43.228.180.0/22 43.228.188.0/22 43.228.204.0/22 43.228.240.0/22 43.229.16.0/22 43.229.40.0/22 43.229.48.0/22 43.229.56.0/22 43.229.96.0/22 43.229.108.0/22 43.229.120.0/22 43.229.136.0/21 43.229.144.0/22 43.229.168.0/21 43.229.176.0/20 43.229.192.0/21 43.229.216.0/21 43.229.232.0/21 43.230.20.0/22 43.230.32.0/22 43.230.68.0/22 43.230.72.0/22 43.230.84.0/22 43.230.124.0/22 43.230.136.0/22 43.230.168.0/22 43.230.220.0/22 43.230.224.0/19 43.231.32.0/20 43.231.80.0/20 43.231.96.0/20 43.231.136.0/21 43.231.144.0/20 43.231.160.0/20 43.231.176.0/21 43.236.0.0/15 43.238.0.0/16 43.239.0.0/19 43.239.32.0/20 43.239.48.0/22 43.240.0.0/22 43.240.48.0/22 43.240.56.0/21 43.240.68.0/22 43.240.72.0/21 43.240.84.0/22 43.240.124.0/22 43.240.128.0/21 43.240.136.0/22 43.240.156.0/22 43.240.160.0/19 43.240.192.0/19 43.240.236.0/22 43.240.240.0/20 43.241.0.0/20 43.241.16.0/21 43.241.48.0/22 43.241.76.0/22 43.241.80.0/20 43.241.112.0/22 43.241.168.0/21 43.241.176.0/21 43.241.184.0/22 43.241.196.0/22 43.241.208.0/20 43.241.224.0/20 43.241.240.0/22 43.241.248.0/21 43.242.8.0/21 43.242.16.0/20 43.242.44.0/22 43.242.48.0/20 43.242.64.0/22 43.242.72.0/21 43.242.80.0/20 43.242.96.0/22 43.242.144.0/20 43.242.160.0/21 43.242.168.0/22 43.242.180.0/22 43.242.188.0/22 43.242.192.0/21 43.242.204.0/22 43.242.216.0/21 43.242.252.0/22 43.243.4.0/22 43.243.8.0/21 43.243.16.0/22 43.243.24.0/22 43.243.88.0/22 43.243.128.0/22 43.243.136.0/22 43.243.144.0/21 43.243.156.0/22 43.243.168.0/22 43.243.180.0/22 43.243.188.0/22 43.243.228.0/22 43.243.232.0/22 43.243.244.0/22 43.246.0.0/17 43.247.4.0/22 43.247.8.0/22 43.247.44.0/22 43.247.48.0/22 43.247.68.0/22 43.247.76.0/22 43.247.84.0/22 43.247.88.0/21 43.247.96.0/21 43.247.108.0/22 43.247.112.0/22 43.247.148.0/22 43.247.152.0/22 43.247.176.0/20 43.247.196.0/22 43.247.200.0/21 43.247.208.0/20 43.247.224.0/19 43.248.0.0/21 43.248.20.0/22 43.248.28.0/22 43.248.48.0/22 43.248.56.0/22 43.248.76.0/22 43.248.80.0/20 43.248.96.0/19 43.248.128.0/20 43.248.144.0/21 43.248.176.0/20 43.248.192.0/20 43.248.208.0/22 43.248.228.0/22 43.248.232.0/22 43.248.244.0/22 43.249.0.0/21 43.249.8.0/22 43.249.24.0/22 43.249.120.0/22 43.249.132.0/22 43.249.136.0/22 43.249.144.0/20 43.249.160.0/21 43.249.168.0/22 43.249.192.0/22 43.249.236.0/22 43.250.4.0/22 43.250.12.0/22 43.250.16.0/21 43.250.28.0/22 43.250.32.0/21 43.250.72.0/22 43.250.96.0/20 43.250.112.0/21 43.250.128.0/22 43.250.144.0/21 43.250.160.0/22 43.250.168.0/21 43.250.176.0/22 43.250.200.0/22 43.250.212.0/22 43.250.216.0/21 43.250.236.0/22 43.250.244.0/22 43.251.4.0/22 43.251.8.0/21 43.251.16.0/23 43.251.36.0/22 43.251.116.0/22 43.251.192.0/22 43.251.232.0/21 43.251.244.0/22 43.252.48.0/22 43.252.56.0/22 43.252.224.0/22 43.254.0.0/21 43.254.8.0/22 43.254.24.0/22 43.254.36.0/22 43.254.44.0/22 43.254.52.0/22 43.254.64.0/22 43.254.72.0/22 43.254.84.0/22 43.254.88.0/21 43.254.100.0/22 43.254.104.0/22 43.254.112.0/21 43.254.128.0/22 43.254.136.0/21 43.254.144.0/20 43.254.168.0/21 43.254.180.0/22 43.254.184.0/21 43.254.192.0/21 43.254.200.0/22 43.254.208.0/22 43.254.220.0/22 43.254.224.0/20 43.254.240.0/22 43.254.248.0/21 43.255.0.0/21 43.255.8.0/22 43.255.16.0/22 43.255.48.0/22 43.255.60.0/23 43.255.62.0/24 43.255.64.0/20 43.255.84.0/22 43.255.96.0/22 43.255.108.0/22 43.255.144.0/22 43.255.168.0/22 43.255.176.0/22 43.255.184.0/22 43.255.192.0/22 43.255.200.0/21 43.255.208.0/21 43.255.224.0/21 43.255.232.0/22 43.255.244.0/22 45.59.171.0/24 45.61.112.0/20 45.64.112.0/23 45.112.132.0/22 45.112.188.0/22 45.112.208.0/20 45.112.228.0/22 45.112.232.0/21 45.113.12.0/22 45.113.16.0/20 45.113.40.0/22 45.113.52.0/22 45.113.56.0/22 45.113.72.0/22 45.113.108.0/22 45.113.144.0/21 45.113.168.0/22 45.113.176.0/22 45.113.184.0/22 45.113.200.0/21 45.113.208.0/20 45.113.228.0/22 45.113.240.0/22 45.113.252.0/22 45.114.0.0/22 45.114.12.0/22 45.114.32.0/22 45.114.40.0/22 45.114.52.0/22 45.114.96.0/22 45.114.104.0/22 45.114.136.0/22 45.114.196.0/22 45.114.200.0/22 45.114.228.0/22 45.114.236.0/22 45.114.252.0/22 45.115.44.0/22 45.115.100.0/22 45.115.120.0/22 45.115.132.0/22 45.115.144.0/22 45.115.156.0/22 45.115.164.0/22 45.115.200.0/22 45.115.212.0/22 45.115.216.0/22 45.115.228.0/22 45.115.236.0/22 45.115.244.0/22 45.115.248.0/22 45.116.16.0/21 45.116.24.0/22 45.116.32.0/21 45.116.52.0/22 45.116.60.0/22 45.116.64.0/22 45.116.96.0/21 45.116.140.0/22 45.116.152.0/22 45.116.208.0/22 45.117.8.0/22 45.117.20.0/22 45.117.40.0/22 45.117.68.0/22 45.117.124.0/22 45.117.252.0/22 45.119.52.0/22 45.119.60.0/22 45.119.64.0/21 45.119.72.0/22 45.119.104.0/22 45.119.116.0/22 45.119.160.0/22 45.119.232.0/22 45.120.100.0/22 45.120.140.0/22 45.120.158.0/23 45.120.164.0/22 45.120.220.0/22 45.120.240.0/22 45.121.20.0/22 45.121.52.0/22 45.121.64.0/21 45.121.72.0/22 45.121.92.0/22 45.121.96.0/22 45.121.104.0/22 45.121.172.0/22 45.121.176.0/22 45.121.212.0/22 45.121.240.0/20 45.122.0.0/19 45.122.32.0/21 45.122.40.0/22 46.36.194.111/32 46.36.194.112/29 46.36.194.120/32 46.102.251.0/25 46.161.56.128/25 47.92.0.0/14 47.96.0.0/11 49.4.0.0/14 49.51.0.0/16 49.52.0.0/14 49.64.0.0/11 49.112.0.0/13 49.120.0.0/14 49.128.0.0/24 49.128.2.0/23 49.140.0.0/15 49.152.0.0/14 49.208.0.0/14 49.220.0.0/14 49.232.0.0/14 49.239.0.0/18 49.239.192.0/18 49.246.224.0/19 50.2.252.64/29 50.118.128.0/24 54.222.0.0/15 54.231.208.0/20 58.14.0.0/15 58.16.0.0/13 58.24.0.0/15 58.30.0.0/15 58.32.0.0/11 58.65.232.0/21 58.66.0.0/15 58.68.128.0/17 58.82.0.0/17 58.83.0.0/16 58.87.64.0/18 58.99.128.0/17 58.100.0.0/15 58.116.0.0/14 58.128.0.0/13 58.144.0.0/16 58.154.0.0/15 58.192.0.0/11 58.240.0.0/12 59.32.0.0/11 59.64.0.0/12 59.80.0.0/14 59.107.0.0/16 59.108.0.0/14 59.151.0.0/17 59.155.0.0/16 59.172.0.0/14 59.191.0.0/17 59.191.240.0/21 59.191.248.0/22 59.191.252.0/23 59.191.254.0/24 59.192.0.0/10 60.0.0.0/11 60.55.0.0/16 60.63.0.0/16 60.160.0.0/11 60.194.0.0/15 60.200.0.0/13 60.208.0.0/12 60.232.0.0/15 60.235.0.0/16 60.245.128.0/17 60.247.0.0/16 60.252.0.0/16 60.253.128.0/17 60.255.0.0/16 61.4.80.0/20 61.4.176.0/20 61.8.160.0/20 61.28.0.0/17 61.28.195.0/24 61.28.196.0/24 61.29.128.0/17 61.45.128.0/18 61.45.224.0/20 61.47.128.0/18 61.48.0.0/13 61.87.192.0/18 61.128.0.0/10 61.232.0.0/14 61.236.0.0/15 61.240.0.0/14 63.162.142.0/24 64.71.172.0/28 64.71.172.16/31 64.71.172.19/32 64.71.172.20/30 64.71.172.24/29 64.71.172.32/27 64.71.172.64/26 64.71.172.128/25 64.78.162.0/24 64.104.125.0/24 65.19.152.0/24 65.19.188.0/24 65.255.36.0/22 66.160.130.0/24 66.160.162.0/24 66.201.188.0/24 72.28.117.0/24 74.125.16.64/26 77.81.167.0/24 91.234.36.0/24 95.130.197.0/25 98.126.221.0/24 98.126.222.0/24 101.0.0.0/22 101.1.0.0/22 101.2.172.0/22 101.4.0.0/14 101.16.0.0/12 101.32.0.0/12 101.48.0.0/15 101.50.56.0/22 101.52.0.0/16 101.53.100.0/22 101.54.0.0/16 101.55.224.0/21 101.64.0.0/13 101.72.0.0/14 101.76.0.0/15 101.78.0.0/22 101.78.32.0/19 101.80.0.0/12 101.96.0.0/21 101.96.8.0/22 101.96.16.0/20 101.96.128.0/17 101.99.96.0/19 101.101.64.0/19 101.101.100.0/24 101.101.102.0/23 101.101.104.0/21 101.101.112.0/20 101.102.64.0/19 101.102.100.0/23 101.102.102.0/24 101.102.104.0/21 101.102.112.0/20 101.104.0.0/14 101.110.64.0/19 101.110.96.0/20 101.110.116.0/22 101.110.120.0/21 101.120.0.0/14 101.124.0.0/15 101.126.0.0/16 101.128.0.0/22 101.128.8.0/21 101.128.16.0/20 101.128.32.0/19 101.129.0.0/16 101.130.0.0/15 101.132.0.0/14 101.144.0.0/12 101.192.0.0/13 101.200.0.0/15 101.203.128.0/19 101.203.160.0/21 101.203.172.0/22 101.203.176.0/20 101.204.0.0/14 101.224.0.0/13 101.232.0.0/15 101.234.64.0/21 101.234.76.0/22 101.234.80.0/20 101.234.96.0/19 101.236.0.0/14 101.240.0.0/13 101.248.0.0/15 101.251.0.0/22 101.251.8.0/21 101.251.16.0/20 101.251.32.0/19 101.251.64.0/18 101.251.128.0/17 101.252.0.0/15 101.254.0.0/16 103.1.8.0/22 103.1.20.0/22 103.1.24.0/22 103.1.72.0/22 103.1.88.0/22 103.1.168.0/22 103.2.108.0/22 103.2.156.0/22 103.2.164.0/22 103.2.200.0/21 103.2.208.0/21 103.3.84.0/22 103.3.88.0/21 103.3.96.0/19 103.3.128.0/20 103.3.148.0/22 103.3.152.0/21 103.4.56.0/22 103.4.168.0/22 103.4.184.0/22 103.5.36.0/22 103.5.52.0/22 103.5.56.0/22 103.5.252.0/22 103.6.76.0/22 103.6.220.0/22 103.7.4.0/22 103.7.28.0/22 103.7.212.0/22 103.7.216.0/21 103.8.4.0/22 103.8.8.0/22 103.8.32.0/22 103.8.52.0/22 103.8.108.0/22 103.8.156.0/22 103.8.200.0/21 103.8.220.0/22 103.9.152.0/22 103.9.248.0/21 103.10.0.0/22 103.10.16.0/22 103.10.84.0/22 103.10.111.0/24 103.10.140.0/22 103.11.180.0/22 103.12.32.0/22 103.12.68.0/22 103.12.136.0/22 103.12.184.0/22 103.12.232.0/22 103.13.124.0/22 103.13.144.0/22 103.13.196.0/22 103.13.244.0/22 103.14.84.0/22 103.14.132.0/22 103.14.136.0/22 103.14.156.0/22 103.14.240.0/22 103.15.4.0/22 103.15.8.0/22 103.15.16.0/22 103.15.96.0/22 103.15.200.0/22 103.16.52.0/22 103.16.80.0/21 103.16.88.0/22 103.16.108.0/22 103.16.124.0/22 103.17.40.0/22 103.17.120.0/22 103.17.160.0/22 103.17.204.0/22 103.17.228.0/22 103.18.192.0/22 103.18.208.0/21 103.18.224.0/22 103.19.12.0/22 103.19.40.0/21 103.19.64.0/21 103.19.72.0/22 103.19.232.0/22 103.20.12.0/22 103.20.32.0/22 103.20.112.0/22 103.20.128.0/22 103.20.160.0/22 103.20.248.0/22 103.21.112.0/21 103.21.136.0/21 103.21.176.0/22 103.21.208.0/22 103.21.240.0/22 103.22.0.0/18 103.22.64.0/19 103.22.100.0/22 103.22.104.0/21 103.22.112.0/20 103.22.188.0/22 103.22.228.0/22 103.22.252.0/22 103.23.8.0/22 103.23.56.0/22 103.23.160.0/21 103.23.176.0/22 103.23.228.0/22 103.24.116.0/22 103.24.128.0/22 103.24.144.0/22 103.24.176.0/22 103.24.184.0/22 103.24.220.0/22 103.24.228.0/22 103.24.248.0/21 103.25.8.0/23 103.25.20.0/22 103.25.24.0/21 103.25.32.0/21 103.25.40.0/22 103.25.48.0/22 103.25.64.0/21 103.25.148.0/22 103.25.156.0/22 103.25.216.0/22 103.26.0.0/22 103.26.64.0/22 103.26.156.0/22 103.26.160.0/22 103.26.228.0/22 103.26.240.0/22 103.27.4.0/22 103.27.12.0/22 103.27.24.0/22 103.27.56.0/22 103.27.96.0/22 103.27.208.0/22 103.27.240.0/22 103.28.4.0/22 103.28.8.0/22 103.28.204.0/22 103.29.16.0/22 103.29.128.0/21 103.29.136.0/22 103.30.20.0/22 103.30.96.0/22 103.30.148.0/22 103.30.200.0/22 103.30.216.0/22 103.30.228.0/22 103.30.236.0/22 103.31.0.0/22 103.31.48.0/20 103.31.64.0/21 103.31.148.0/22 103.31.160.0/22 103.31.168.0/22 103.31.200.0/22 103.32.0.0/15 103.34.0.0/16 103.35.0.0/19 103.35.32.0/20 103.35.48.0/22 103.36.20.0/22 103.36.28.0/22 103.36.36.0/22 103.36.56.0/21 103.36.64.0/22 103.36.72.0/22 103.36.96.0/22 103.36.132.0/22 103.36.136.0/22 103.36.160.0/19 103.36.192.0/19 103.36.224.0/20 103.36.240.0/21 103.37.0.0/22 103.37.12.0/22 103.37.16.0/22 103.37.24.0/22 103.37.44.0/22 103.37.52.0/22 103.37.56.0/22 103.37.72.0/22 103.37.100.0/22 103.37.104.0/22 103.37.124.0/22 103.37.136.0/21 103.37.144.0/20 103.37.160.0/21 103.37.172.0/22 103.37.176.0/22 103.37.208.0/20 103.37.248.0/21 103.38.0.0/22 103.38.32.0/22 103.38.40.0/21 103.38.56.0/22 103.38.76.0/22 103.38.84.0/22 103.38.92.0/22 103.38.96.0/22 103.38.116.0/22 103.38.132.0/22 103.38.140.0/22 103.38.220.0/22 103.38.224.0/21 103.38.232.0/22 103.38.252.0/22 103.39.16.0/22 103.39.64.0/22 103.39.88.0/22 103.39.100.0/22 103.39.104.0/21 103.39.144.0/22 103.39.160.0/19 103.39.200.0/21 103.39.208.0/20 103.39.224.0/21 103.39.232.0/22 103.40.12.0/22 103.40.16.0/20 103.40.32.0/20 103.40.88.0/22 103.40.100.0/22 103.40.112.0/22 103.40.192.0/22 103.40.212.0/22 103.40.220.0/22 103.40.228.0/22 103.40.232.0/21 103.40.240.0/20 103.41.0.0/22 103.41.16.0/22 103.41.52.0/22 103.41.116.0/22 103.41.140.0/22 103.41.148.0/22 103.41.152.0/22 103.41.160.0/21 103.41.220.0/22 103.41.224.0/21 103.41.232.0/22 103.42.8.0/22 103.42.24.0/21 103.42.32.0/22 103.42.64.0/21 103.42.76.0/22 103.42.104.0/22 103.42.180.0/22 103.42.232.0/22 103.43.16.0/22 103.43.24.0/22 103.43.84.0/22 103.43.96.0/21 103.43.104.0/22 103.43.124.0/22 103.43.132.0/22 103.43.164.0/22 103.43.184.0/22 103.43.192.0/21 103.43.208.0/22 103.43.220.0/22 103.43.224.0/22 103.43.232.0/22 103.43.240.0/22 103.44.56.0/22 103.44.80.0/22 103.44.88.0/22 103.44.120.0/21 103.44.132.0/22 103.44.144.0/22 103.44.152.0/22 103.44.168.0/22 103.44.176.0/20 103.44.192.0/20 103.44.224.0/22 103.44.236.0/22 103.44.240.0/20 103.45.0.0/18 103.45.72.0/21 103.45.80.0/20 103.45.96.0/19 103.45.128.0/18 103.45.192.0/19 103.45.224.0/22 103.45.248.0/22 103.46.0.0/22 103.46.12.0/22 103.46.16.0/20 103.46.32.0/19 103.46.64.0/18 103.46.128.0/21 103.46.136.0/22 103.46.142.0/24 103.46.152.0/21 103.46.160.0/20 103.46.176.0/21 103.46.244.0/22 103.46.248.0/22 103.47.4.0/22 103.47.20.0/22 103.47.36.0/22 103.47.40.0/22 103.47.48.0/22 103.47.80.0/22 103.47.96.0/22 103.47.108.0/22 103.47.116.0/22 103.47.120.0/22 103.47.136.0/21 103.47.144.0/24 103.47.200.0/22 103.47.212.0/22 103.47.220.0/22 103.47.248.0/22 103.48.20.0/22 103.48.52.0/22 103.48.92.0/22 103.48.144.0/20 103.48.202.0/23 103.48.216.0/21 103.48.224.0/20 103.48.240.0/21 103.49.12.0/22 103.49.20.0/22 103.49.72.0/21 103.49.92.0/22 103.49.96.0/22 103.49.108.0/22 103.49.128.0/22 103.49.176.0/21 103.49.196.0/22 103.49.248.0/22 103.50.36.0/22 103.50.44.0/22 103.50.48.0/20 103.50.64.0/21 103.50.72.0/22 103.50.108.0/22 103.50.112.0/20 103.50.132.0/22 103.50.136.0/21 103.50.172.0/22 103.50.176.0/20 103.50.192.0/21 103.50.200.0/22 103.50.220.0/22 103.50.224.0/20 103.50.240.0/21 103.50.248.0/22 103.52.40.0/22 103.52.72.0/21 103.52.80.0/21 103.52.96.0/21 103.52.104.0/22 103.52.160.0/21 103.52.172.0/22 103.52.176.0/22 103.52.184.0/22 103.52.196.0/22 103.53.4.0/22 103.53.64.0/21 103.53.92.0/22 103.53.100.0/22 103.53.124.0/22 103.53.128.0/20 103.53.144.0/22 103.53.160.0/22 103.53.180.0/22 103.53.204.0/22 103.53.208.0/22 103.53.216.0/22 103.53.236.0/22 103.53.248.0/22 103.54.8.0/22 103.54.48.0/22 103.54.60.0/22 103.54.160.0/21 103.54.212.0/22 103.54.228.0/22 103.54.240.0/22 103.55.24.0/22 103.55.80.0/22 103.55.120.0/22 103.55.152.0/22 103.55.172.0/22 103.55.204.0/22 103.55.208.0/22 103.55.228.0/22 103.55.236.0/22 103.55.240.0/22 103.56.8.0/22 103.56.16.0/21 103.56.32.0/22 103.56.56.0/21 103.56.72.0/21 103.56.100.0/22 103.56.104.0/22 103.56.140.0/22 103.56.152.0/22 103.56.184.0/22 103.56.200.0/22 103.57.12.0/22 103.57.52.0/22 103.57.56.0/22 103.57.76.0/22 103.57.108.0/22 103.57.136.0/22 103.57.196.0/22 103.58.24.0/22 103.58.182.0/23 103.59.76.0/22 103.59.100.0/22 103.59.112.0/20 103.59.128.0/22 103.59.148.0/22 103.59.164.0/22 103.59.216.0/22 103.60.32.0/22 103.60.44.0/22 103.60.164.0/22 103.60.228.0/22 103.60.236.0/22 103.61.60.0/22 103.61.104.0/22 103.61.140.0/22 103.61.152.0/21 103.61.160.0/22 103.61.172.0/22 103.61.176.0/22 103.61.184.0/21 103.62.24.0/22 103.62.52.0/22 103.62.72.0/21 103.62.80.0/21 103.62.88.0/22 103.62.96.0/19 103.62.128.0/21 103.224.40.0/21 103.224.60.0/22 103.224.220.0/22 103.224.224.0/21 103.224.232.0/22 103.225.84.0/22 103.226.16.0/22 103.226.40.0/22 103.226.56.0/21 103.226.80.0/22 103.226.116.0/22 103.226.132.0/22 103.226.156.0/22 103.226.180.0/22 103.226.196.0/22 103.227.48.0/22 103.227.72.0/21 103.227.80.0/22 103.227.100.0/22 103.227.120.0/22 103.227.132.0/22 103.227.136.0/22 103.227.196.0/22 103.227.204.0/22 103.227.212.0/22 103.227.228.0/22 103.228.12.0/22 103.228.28.0/22 103.228.68.0/22 103.228.88.0/22 103.228.128.0/22 103.228.160.0/22 103.228.176.0/22 103.228.204.0/22 103.228.208.0/22 103.228.228.0/22 103.228.232.0/22 103.229.20.0/22 103.229.136.0/22 103.229.148.0/22 103.229.172.0/22 103.229.212.0/22 103.229.216.0/21 103.229.228.0/22 103.229.236.0/22 103.229.240.0/22 103.230.0.0/22 103.230.28.0/22 103.230.40.0/21 103.230.96.0/22 103.230.196.0/22 103.230.200.0/21 103.230.212.0/22 103.230.236.0/22 103.231.16.0/21 103.231.64.0/21 103.231.144.0/22 103.231.180.0/22 103.231.184.0/22 103.231.244.0/22 103.232.4.0/22 103.232.144.0/22 103.232.212.0/22 103.233.4.0/22 103.233.44.0/22 103.233.52.0/22 103.233.104.0/22 103.233.128.0/22 103.233.136.0/22 103.233.228.0/22 103.234.0.0/22 103.234.20.0/22 103.234.56.0/22 103.234.124.0/22 103.234.128.0/22 103.234.172.0/22 103.234.180.0/22 103.235.16.0/22 103.235.48.0/22 103.235.56.0/21 103.235.80.0/21 103.235.128.0/20 103.235.144.0/21 103.235.184.0/22 103.235.192.0/22 103.235.200.0/22 103.235.220.0/22 103.235.224.0/19 103.236.0.0/17 103.237.0.0/20 103.237.24.0/21 103.237.68.0/22 103.237.88.0/22 103.237.152.0/22 103.237.176.0/20 103.237.192.0/18 103.238.0.0/21 103.238.16.0/20 103.238.32.0/20 103.238.48.0/21 103.238.56.0/22 103.238.88.0/21 103.238.96.0/22 103.238.132.0/22 103.238.140.0/22 103.238.144.0/22 103.238.160.0/19 103.238.196.0/22 103.238.204.0/22 103.238.252.0/22 103.239.0.0/22 103.239.40.0/21 103.239.68.0/22 103.239.96.0/22 103.239.152.0/21 103.239.176.0/21 103.239.184.0/22 103.239.192.0/21 103.239.204.0/22 103.239.208.0/22 103.239.224.0/22 103.239.244.0/22 103.240.16.0/22 103.240.36.0/22 103.240.72.0/22 103.240.84.0/22 103.240.124.0/22 103.240.156.0/22 103.240.172.0/22 103.240.244.0/22 103.241.12.0/22 103.241.72.0/22 103.241.92.0/22 103.241.96.0/22 103.241.160.0/22 103.241.184.0/21 103.241.220.0/22 103.242.8.0/22 103.242.64.0/22 103.242.128.0/21 103.242.160.0/22 103.242.168.0/21 103.242.176.0/22 103.242.200.0/22 103.242.212.0/22 103.242.220.0/22 103.242.240.0/22 103.243.24.0/22 103.243.136.0/22 103.243.252.0/22 103.244.16.0/22 103.244.58.0/23 103.244.60.0/22 103.244.64.0/20 103.244.80.0/21 103.244.164.0/22 103.244.232.0/22 103.244.252.0/22 103.245.23.0/24 103.245.52.0/22 103.245.60.0/22 103.245.80.0/22 103.245.124.0/22 103.245.128.0/22 103.246.8.0/21 103.246.120.0/21 103.246.132.0/22 103.246.152.0/21 103.247.168.0/21 103.247.176.0/22 103.247.200.0/22 103.247.212.0/22 103.248.0.0/23 103.248.64.0/22 103.248.100.0/22 103.248.124.0/22 103.248.152.0/22 103.248.168.0/22 103.248.192.0/22 103.248.212.0/22 103.248.224.0/21 103.249.12.0/22 103.249.52.0/22 103.249.128.0/22 103.249.136.0/22 103.249.144.0/22 103.249.164.0/22 103.249.168.0/21 103.249.176.0/22 103.249.188.0/22 103.249.192.0/22 103.249.244.0/22 103.249.252.0/22 103.250.32.0/22 103.250.104.0/22 103.250.124.0/22 103.250.180.0/22 103.250.192.0/22 103.250.216.0/22 103.250.224.0/22 103.250.236.0/22 103.250.248.0/21 103.251.32.0/22 103.251.84.0/22 103.251.96.0/22 103.251.124.0/22 103.251.128.0/22 103.251.160.0/22 103.251.204.0/22 103.251.240.0/22 103.252.28.0/22 103.252.36.0/22 103.252.64.0/22 103.252.104.0/22 103.252.172.0/22 103.252.204.0/22 103.252.208.0/22 103.252.232.0/22 103.252.248.0/22 103.253.4.0/22 103.253.60.0/22 103.253.204.0/22 103.253.220.0/22 103.253.224.0/22 103.253.232.0/22 103.254.8.0/22 103.254.20.0/22 103.254.64.0/20 103.254.112.0/22 103.254.176.0/22 103.254.188.0/22 103.254.196.0/24 103.255.68.0/22 103.255.88.0/21 103.255.136.0/21 103.255.184.0/22 103.255.200.0/22 103.255.208.0/21 103.255.228.0/22 104.37.2.0/24 104.166.103.0/24 104.167.214.0/24 104.167.231.0/24 104.207.86.0/24 104.222.196.0/24 104.250.160.0/24 106.0.0.0/24 106.0.2.0/23 106.0.4.0/22 106.0.8.0/21 106.0.16.0/20 106.0.64.0/18 106.2.0.0/15 106.4.0.0/14 106.8.0.0/15 106.11.0.0/16 106.12.0.0/14 106.16.0.0/12 106.32.0.0/12 106.48.0.0/15 106.50.0.0/16 106.52.0.0/14 106.56.0.0/13 106.74.0.0/15 106.80.0.0/12 106.108.0.0/14 106.112.0.0/12 106.224.0.0/12 107.150.96.0/20 110.6.0.0/15 110.16.0.0/14 110.34.140.0/22 110.40.0.0/14 110.44.144.0/20 110.48.0.0/16 110.51.0.0/16 110.52.0.0/15 110.56.0.0/13 110.64.0.0/15 110.72.0.0/15 110.75.0.0/16 110.76.0.0/18 110.76.156.0/22 110.76.184.0/22 110.76.192.0/18 110.77.0.0/17 110.80.0.0/13 110.88.0.0/14 110.93.32.0/19 110.94.0.0/15 110.96.0.0/11 110.152.0.0/14 110.156.0.0/15 110.165.32.0/19 110.166.0.0/15 110.172.192.0/18 110.173.0.0/19 110.173.32.0/20 110.173.64.0/18 110.173.192.0/19 110.176.0.0/12 110.192.0.0/11 110.228.0.0/14 110.232.32.0/19 110.236.0.0/15 110.240.0.0/12 111.0.0.0/10 111.66.0.0/16 111.67.192.0/20 111.68.64.0/19 111.72.0.0/13 111.85.0.0/16 111.91.192.0/19 111.112.0.0/14 111.116.0.0/15 111.118.200.0/21 111.119.64.0/18 111.119.128.0/19 111.120.0.0/14 111.124.0.0/16 111.126.0.0/15 111.128.0.0/11 111.160.0.0/13 111.170.0.0/16 111.172.0.0/14 111.176.0.0/13 111.186.0.0/15 111.192.0.0/12 111.208.0.0/13 111.221.28.0/24 111.221.128.0/17 111.222.0.0/16 111.223.240.0/22 111.223.248.0/22 111.224.0.0/13 111.235.96.0/19 111.235.156.0/22 111.235.160.0/19 112.0.0.0/10 112.64.0.0/14 112.73.0.0/16 112.74.0.0/15 112.80.0.0/12 112.96.0.0/13 112.109.128.0/17 112.111.0.0/16 112.112.0.0/14 112.116.0.0/15 112.122.0.0/15 112.124.0.0/14 112.128.0.0/14 112.132.0.0/16 112.137.48.0/21 112.192.0.0/14 112.224.0.0/11 113.0.0.0/13 113.8.0.0/15 113.11.192.0/19 113.12.0.0/14 113.16.0.0/15 113.18.0.0/16 113.24.0.0/14 113.31.0.0/16 113.44.0.0/14 113.48.0.0/14 113.52.160.0/19 113.54.0.0/15 113.56.0.0/15 113.58.0.0/16 113.59.0.0/17 113.59.224.0/22 113.62.0.0/15 113.64.0.0/10 113.128.0.0/15 113.130.96.0/20 113.130.112.0/21 113.132.0.0/14 113.136.0.0/13 113.194.0.0/15 113.197.100.0/22 113.200.0.0/15 113.202.0.0/16 113.204.0.0/14 113.208.96.0/19 113.208.128.0/17 113.209.0.0/16 113.212.0.0/18 113.212.100.0/22 113.212.184.0/21 113.213.0.0/17 113.214.0.0/15 113.218.0.0/15 113.220.0.0/14 113.224.0.0/12 113.240.0.0/13 113.248.0.0/14 114.28.0.0/16 114.54.0.0/15 114.60.0.0/14 114.64.0.0/14 114.68.0.0/16 114.79.64.0/18 114.80.0.0/12 114.96.0.0/13 114.104.0.0/14 114.110.0.0/20 114.110.64.0/18 114.111.0.0/19 114.111.160.0/19 114.112.0.0/17 114.112.128.0/18 114.112.192.0/19 114.112.232.0/22 114.113.0.0/17 114.113.128.0/18 114.113.195.0/24 114.113.196.0/22 114.113.200.0/21 114.113.208.0/20 114.113.224.0/20 114.113.240.0/21 114.113.248.0/22 114.114.0.0/15 114.116.0.0/14 114.132.0.0/16 114.135.0.0/16 114.138.0.0/15 114.141.64.0/21 114.141.128.0/18 114.196.0.0/15 114.198.248.0/21 114.208.0.0/12 114.224.0.0/11 115.24.0.0/14 115.28.0.0/15 115.32.0.0/14 115.44.0.0/14 115.48.0.0/12 115.69.64.0/20 115.84.0.0/18 115.84.192.0/19 115.85.192.0/18 115.100.0.0/14 115.104.0.0/14 115.120.0.0/14 115.124.16.0/20 115.148.0.0/14 115.152.0.0/13 115.166.64.0/19 115.168.0.0/13 115.180.0.0/14 115.190.0.0/15 115.192.0.0/11 115.224.0.0/12 116.0.8.0/21 116.0.24.0/21 116.1.0.0/16 116.2.0.0/15 116.4.0.0/14 116.8.0.0/14 116.13.0.0/16 116.16.0.0/12 116.50.0.0/20 116.52.0.0/14 116.56.0.0/15 116.58.128.0/20 116.58.208.0/20 116.60.0.0/14 116.66.0.0/17 116.69.0.0/16 116.70.0.0/17 116.76.0.0/14 116.85.0.0/16 116.89.144.0/20 116.90.80.0/20 116.90.184.0/21 116.95.0.0/16 116.112.0.0/14 116.116.0.0/15 116.128.0.0/10 116.192.0.0/16 116.193.16.0/20 116.193.32.0/19 116.193.176.0/21 116.194.0.0/15 116.196.0.0/16 116.198.0.0/16 116.199.0.0/17 116.199.128.0/19 116.204.0.0/15 116.207.0.0/16 116.208.0.0/14 116.212.160.0/20 116.213.64.0/18 116.213.128.0/17 116.214.32.0/19 116.214.64.0/20 116.214.128.0/17 116.215.0.0/16 116.216.0.0/14 116.224.0.0/12 116.242.0.0/15 116.244.0.0/14 116.248.0.0/15 116.251.64.0/18 116.252.0.0/15 116.254.128.0/17 116.255.128.0/17 117.8.0.0/13 117.18.38.0/24 117.21.0.0/16 117.22.0.0/15 117.24.0.0/13 117.32.0.0/13 117.40.0.0/14 117.44.0.0/15 117.48.0.0/14 117.53.48.0/20 117.53.176.0/20 117.57.0.0/16 117.58.0.0/17 117.59.0.0/16 117.60.0.0/14 117.64.0.0/13 117.72.0.0/15 117.74.64.0/19 117.74.128.0/17 117.75.0.0/16 117.76.0.0/14 117.80.0.0/12 117.100.0.0/15 117.103.16.0/20 117.103.40.0/21 117.103.72.0/21 117.103.128.0/20 117.104.168.0/21 117.106.0.0/15 117.112.0.0/13 117.120.64.0/18 117.120.128.0/17 117.121.0.0/17 117.121.128.0/18 117.121.192.0/21 117.122.128.0/17 117.124.0.0/14 117.128.0.0/10 118.24.0.0/15 118.26.0.0/16 118.28.0.0/14 118.64.0.0/15 118.66.0.0/16 118.67.112.0/20 118.72.0.0/13 118.80.0.0/15 118.84.0.0/15 118.88.32.0/19 118.88.64.0/18 118.88.128.0/17 118.89.0.0/16 118.91.240.0/20 118.102.16.0/20 118.102.32.0/21 118.103.240.0/21 118.112.0.0/13 118.120.0.0/14 118.124.0.0/15 118.126.0.0/16 118.127.128.0/19 118.132.0.0/14 118.144.0.0/14 118.178.0.0/16 118.180.0.0/14 118.184.0.0/16 118.186.0.0/15 118.188.0.0/16 118.190.0.0/15 118.192.0.0/16 118.193.0.0/17 118.193.128.0/18 118.193.192.0/19 118.193.225.0/24 118.193.226.0/23 118.193.228.0/22 118.193.232.0/21 118.193.240.0/20 118.194.0.0/15 118.196.0.0/14 118.202.0.0/15 118.204.0.0/14 118.212.0.0/15 118.224.0.0/14 118.228.0.0/15 118.230.0.0/16 118.239.0.0/16 118.242.0.0/16 118.244.0.0/14 118.248.0.0/13 119.0.0.0/15 119.2.0.0/19 119.2.128.0/17 119.4.0.0/14 119.8.0.0/16 119.10.0.0/17 119.15.136.0/21 119.16.0.0/16 119.18.192.0/20 119.18.208.0/21 119.18.224.0/19 119.19.0.0/16 119.20.0.0/14 119.27.64.0/18 119.27.128.0/17 119.28.0.0/15 119.30.48.0/20 119.31.192.0/19 119.32.0.0/13 119.40.0.0/18 119.40.64.0/20 119.40.128.0/17 119.41.0.0/16 119.42.0.0/19 119.42.128.0/20 119.42.224.0/19 119.44.0.0/15 119.48.0.0/13 119.57.0.0/16 119.58.0.0/16 119.59.128.0/17 119.60.0.0/15 119.62.0.0/16 119.63.32.0/19 119.75.208.0/20 119.78.0.0/15 119.80.0.0/16 119.81.248.88/29 119.82.208.0/20 119.84.0.0/14 119.88.0.0/14 119.96.0.0/13 119.108.0.0/15 119.112.0.0/12 119.128.0.0/12 119.144.0.0/14 119.148.160.0/19 119.151.192.0/18 119.160.200.0/21 119.161.128.0/17 119.162.0.0/15 119.164.0.0/14 119.176.0.0/12 119.232.0.0/15 119.235.128.0/18 119.248.0.0/14 119.252.96.0/21 119.252.240.0/20 119.253.0.0/16 119.254.0.0/15 120.0.0.0/12 120.24.0.0/14 120.30.0.0/15 120.32.0.0/12 120.48.0.0/15 120.52.0.0/14 120.64.0.0/13 120.72.32.0/19 120.72.128.0/17 120.76.0.0/14 120.80.0.0/13 120.88.8.0/21 120.90.0.0/15 120.92.0.0/16 120.94.0.0/15 120.128.0.0/13 120.136.128.0/18 120.137.0.0/17 120.143.128.0/19 120.192.0.0/10 121.0.8.0/21 121.0.16.0/20 121.4.0.0/15 121.8.0.0/13 121.16.0.0/12 121.32.0.0/13 121.40.0.0/14 121.46.0.0/15 121.48.0.0/15 121.50.8.0/21 121.51.0.0/16 121.52.160.0/19 121.52.208.0/20 121.52.224.0/19 121.54.176.0/21 121.55.0.0/18 121.56.0.0/15 121.58.0.0/17 121.58.136.0/21 121.58.144.0/20 121.58.160.0/21 121.59.0.0/16 121.60.0.0/14 121.68.0.0/14 121.76.0.0/15 121.79.128.0/18 121.89.0.0/16 121.100.128.0/17 121.101.0.0/18 121.101.208.0/20 121.192.0.0/13 121.200.192.0/21 121.201.0.0/16 121.204.0.0/14 121.224.0.0/12 121.248.0.0/14 121.255.0.0/16 122.0.64.0/18 122.0.128.0/17 122.4.0.0/14 122.8.0.0/16 122.10.112.0/21 122.10.128.0/17 122.11.0.0/17 122.12.0.0/15 122.14.0.0/17 122.14.128.0/24 122.14.138.1/32 122.14.138.2/31 122.14.138.4/30 122.14.138.8/29 122.14.138.16/28 122.14.138.32/27 122.14.138.64/26 122.14.138.128/25 122.14.139.0/24 122.14.140.0/22 122.14.144.0/20 122.14.160.0/19 122.14.192.0/18 122.48.0.0/16 122.49.0.0/18 122.51.0.0/16 122.64.0.0/11 122.96.0.0/15 122.102.0.0/20 122.102.64.0/19 122.112.0.0/15 122.114.0.0/16 122.115.0.0/18 122.115.64.0/21 122.115.72.0/22 122.115.80.0/20 122.115.96.0/19 122.115.128.0/17 122.119.0.0/16 122.128.120.0/21 122.136.0.0/13 122.144.128.0/17 122.152.192.0/18 122.156.0.0/14 122.188.0.0/14 122.192.0.0/14 122.198.0.0/16 122.200.64.0/18 122.201.48.0/20 122.204.0.0/14 122.224.0.0/12 122.240.0.0/13 122.248.24.0/21 122.248.48.0/20 122.255.64.0/21 123.0.128.0/18 123.4.0.0/14 123.8.0.0/13 123.49.128.0/17 123.50.160.0/19 123.52.0.0/14 123.56.0.0/14 123.61.0.0/16 123.62.0.0/16 123.64.0.0/11 123.96.0.0/15 123.98.0.0/17 123.99.128.0/17 123.100.0.0/19 123.101.0.0/16 123.103.0.0/17 123.108.128.0/20 123.108.208.0/20 123.112.0.0/12 123.128.0.0/13 123.136.80.0/20 123.137.0.0/16 123.138.0.0/15 123.144.0.0/12 123.160.0.0/12 123.176.60.0/22 123.176.80.0/20 123.177.0.0/16 123.178.0.0/15 123.180.0.0/14 123.184.0.0/13 123.196.0.0/15 123.199.128.0/17 123.206.0.0/15 123.232.0.0/14 123.242.0.0/17 123.244.0.0/14 123.249.0.0/16 123.253.0.0/16 124.6.64.0/18 124.14.0.0/15 124.16.0.0/15 124.20.0.0/14 124.28.192.0/18 124.29.0.0/17 124.31.0.0/16 124.40.112.0/20 124.40.128.0/18 124.40.192.0/19 124.42.0.0/16 124.47.0.0/18 124.64.0.0/15 124.66.0.0/17 124.67.0.0/16 124.68.0.0/14 124.72.0.0/13 124.88.0.0/13 124.108.8.0/21 124.108.40.0/21 124.109.96.0/21 124.112.0.0/13 124.126.0.0/15 124.128.0.0/13 124.147.128.0/17 124.151.0.0/16 124.152.0.0/16 124.156.0.0/16 124.160.0.0/13 124.172.0.0/14 124.192.0.0/15 124.196.0.0/16 124.200.0.0/13 124.220.0.0/14 124.224.0.0/12 124.240.0.0/17 124.240.128.0/18 124.242.0.0/16 124.243.192.0/18 124.248.0.0/17 124.249.0.0/16 124.250.0.0/15 124.254.0.0/18 125.31.192.0/18 125.32.0.0/12 125.58.128.0/17 125.61.128.0/17 125.62.0.0/18 125.64.0.0/11 125.96.0.0/15 125.98.0.0/16 125.104.0.0/13 125.112.0.0/12 125.169.0.0/16 125.171.0.0/16 125.208.0.0/18 125.210.0.0/15 125.213.0.0/17 125.214.96.0/19 125.215.0.0/18 125.216.0.0/13 125.254.128.0/17 139.9.0.0/16 139.129.0.0/16 139.148.0.0/16 139.155.0.0/16 139.159.0.0/16 139.170.0.0/16 139.176.0.0/16 139.183.0.0/16 139.186.0.0/16 139.189.0.0/16 139.196.0.0/14 139.200.0.0/13 139.208.0.0/13 139.217.0.0/16 139.219.0.0/16 139.220.0.0/15 139.224.0.0/16 139.226.0.0/15 140.75.0.0/16 140.143.0.0/16 140.205.0.0/16 140.206.0.0/15 140.210.0.0/16 140.224.0.0/16 140.237.0.0/16 140.240.0.0/16 140.243.0.0/16 140.246.0.0/16 140.249.0.0/16 140.250.0.0/16 140.255.0.0/16 142.4.107.0/24 142.4.118.0/23 142.4.121.0/24 142.4.122.0/23 142.4.125.0/24 144.0.0.0/16 144.7.0.0/16 144.12.0.0/16 144.36.146.0/23 144.36.218.0/24 144.36.240.0/23 144.52.0.0/16 144.123.0.0/16 144.255.0.0/16 147.243.224.0/19 150.0.0.0/16 150.115.0.0/16 150.121.0.0/16 150.122.0.0/16 150.129.8.0/23 150.129.10.0/24 150.129.152.0/22 150.129.192.0/22 150.129.216.0/22 150.129.252.0/22 150.138.0.0/15 150.223.0.0/16 150.242.0.0/21 150.242.8.0/22 150.242.28.0/22 150.242.44.0/22 150.242.48.0/21 150.242.56.0/22 150.242.76.0/22 150.242.80.0/22 150.242.92.0/22 150.242.96.0/22 150.242.112.0/21 150.242.120.0/22 150.242.152.0/21 150.242.160.0/21 150.242.168.0/22 150.242.184.0/21 150.242.192.0/22 150.242.212.0/22 150.242.224.0/22 150.242.232.0/21 150.242.240.0/21 150.242.248.0/22 150.255.0.0/16 152.104.128.0/17 153.0.0.0/16 153.3.0.0/16 153.34.0.0/15 153.36.0.0/15 153.99.0.0/16 153.101.0.0/16 153.118.0.0/15 155.254.199.0/24 155.254.236.0/24 157.0.0.0/16 157.18.0.0/16 157.61.0.0/16 157.122.0.0/16 157.148.0.0/16 157.156.0.0/16 157.255.0.0/16 159.153.120.0/22 159.226.0.0/16 161.202.3.80/28 161.207.0.0/16 162.105.0.0/16 162.254.0.0/21 163.0.0.0/16 163.47.4.0/22 163.53.0.0/20 163.53.36.0/22 163.53.40.0/21 163.53.48.0/20 163.53.64.0/22 163.53.88.0/21 163.53.96.0/19 163.53.128.0/21 163.53.136.0/22 163.53.160.0/20 163.53.188.0/22 163.53.220.0/22 163.53.240.0/22 163.125.0.0/16 163.142.0.0/16 163.177.0.0/16 163.179.0.0/16 163.204.0.0/16 163.244.246.0/24 166.111.0.0/16 167.88.102.0/23 167.139.0.0/16 167.189.0.0/16 168.160.0.0/16 171.8.0.0/13 171.34.0.0/15 171.36.0.0/14 171.40.0.0/13 171.80.0.0/12 171.104.0.0/13 171.112.0.0/12 171.208.0.0/12 173.1.158.48/28 173.44.248.240/29 173.231.194.0/24 173.231.196.0/22 173.231.201.0/24 173.231.223.0/24 173.231.228.0/24 173.231.230.0/24 173.231.233.0/24 173.232.149.96/29 173.249.207.0/24 173.253.64.0/21 173.253.80.0/20 173.253.98.0/23 173.253.100.0/22 173.253.104.0/21 175.0.0.0/12 175.16.0.0/13 175.24.0.0/14 175.30.0.0/15 175.42.0.0/15 175.44.0.0/16 175.46.0.0/15 175.48.0.0/12 175.64.0.0/11 175.102.0.0/16 175.106.128.0/17 175.146.0.0/15 175.148.0.0/14 175.152.0.0/14 175.160.0.0/12 175.178.0.0/16 175.184.128.0/18 175.185.0.0/16 175.186.0.0/15 175.188.0.0/14 180.76.0.0/14 180.84.0.0/15 180.86.0.0/16 180.87.10.20/30 180.88.0.0/14 180.94.56.0/21 180.94.96.0/20 180.95.128.0/17 180.96.0.0/11 180.129.128.0/17 180.130.0.0/16 180.136.0.0/13 180.148.16.0/21 180.148.152.0/21 180.148.216.0/21 180.148.224.0/19 180.149.128.0/19 180.150.160.0/19 180.152.0.0/13 180.160.0.0/12 180.178.192.0/18 180.184.0.0/14 180.188.0.0/17 180.189.148.0/22 180.200.252.0/22 180.201.0.0/16 180.202.0.0/15 180.208.0.0/15 180.210.224.0/19 180.212.0.0/15 180.222.224.0/19 180.223.0.0/16 180.233.0.0/18 180.233.64.0/19 180.235.64.0/19 182.16.192.0/19 182.18.0.0/17 182.23.184.0/21 182.23.200.0/21 182.32.0.0/12 182.48.96.0/19 182.49.0.0/16 182.50.0.0/20 182.50.112.0/20 182.51.0.0/16 182.54.0.0/17 182.61.0.0/16 182.80.0.0/13 182.88.0.0/14 182.92.0.0/16 182.96.0.0/11 182.128.0.0/12 182.144.0.0/13 182.157.0.0/16 182.160.64.0/19 182.174.0.0/15 182.200.0.0/13 182.236.128.0/17 182.238.0.0/16 182.239.0.0/19 182.240.0.0/13 182.254.0.0/16 183.0.0.0/10 183.64.0.0/13 183.78.180.0/22 183.81.180.0/22 183.84.0.0/15 183.91.128.0/22 183.91.136.0/21 183.91.144.0/20 183.92.0.0/14 183.128.0.0/11 183.160.0.0/13 183.168.0.0/15 183.170.0.0/16 183.172.0.0/14 183.182.0.0/19 183.184.0.0/13 183.192.0.0/10 185.46.86.128/25 185.56.163.112/28 188.213.218.128/25 188.240.211.0/25 192.137.31.0/24 192.151.208.0/20 192.151.224.0/20 192.151.255.0/24 192.161.92.0/22 192.188.170.0/24 192.200.24.0/24 198.16.32.0/20 198.16.48.0/21 198.40.48.0/24 198.40.50.0/24 198.40.59.0/24 198.40.63.0/24 198.200.33.240/28 198.244.53.0/24 198.244.63.0/24 199.15.119.0/24 199.244.118.0/24 202.0.100.0/23 202.0.122.0/23 202.3.128.0/23 202.4.128.0/19 202.4.252.0/22 202.6.6.0/23 202.6.66.0/23 202.6.72.0/23 202.6.87.0/24 202.6.88.0/23 202.6.92.0/23 202.6.103.0/24 202.6.108.0/24 202.6.110.0/23 202.6.114.0/24 202.6.176.0/20 202.8.0.0/24 202.8.2.0/23 202.8.4.0/23 202.8.12.0/24 202.8.24.0/24 202.8.77.0/24 202.8.128.0/19 202.8.192.0/20 202.9.32.0/24 202.9.34.0/23 202.9.48.0/23 202.9.51.0/24 202.9.52.0/22 202.9.57.0/24 202.9.58.0/23 202.10.64.0/20 202.12.1.0/24 202.12.2.0/24 202.12.17.0/24 202.12.18.0/24 202.12.72.0/24 202.12.84.0/23 202.12.96.0/24 202.12.98.0/23 202.12.106.0/24 202.12.111.0/24 202.12.116.0/24 202.14.64.0/23 202.14.69.0/24 202.14.73.0/24 202.14.74.0/23 202.14.76.0/24 202.14.78.0/23 202.14.88.0/24 202.14.97.0/24 202.14.104.0/23 202.14.108.0/23 202.14.111.0/24 202.14.114.0/23 202.14.118.0/23 202.14.124.0/23 202.14.127.0/24 202.14.129.0/24 202.14.135.0/24 202.14.136.0/24 202.14.149.0/24 202.14.151.0/24 202.14.157.0/24 202.14.158.0/23 202.14.169.0/24 202.14.170.0/23 202.14.176.0/24 202.14.184.0/23 202.14.208.0/23 202.14.213.0/24 202.14.219.0/24 202.14.220.0/24 202.14.222.0/23 202.14.224.0/22 202.14.231.0/24 202.14.235.0/24 202.14.236.0/22 202.14.246.0/24 202.14.251.0/24 202.20.66.0/24 202.20.79.0/24 202.20.87.0/24 202.20.88.0/23 202.20.90.0/24 202.20.94.0/23 202.20.114.0/24 202.20.117.0/24 202.20.120.0/24 202.20.125.0/24 202.20.127.0/24 202.21.131.0/24 202.21.132.0/24 202.21.141.0/24 202.21.142.0/24 202.21.147.0/24 202.21.148.0/24 202.21.150.0/23 202.21.152.0/23 202.21.154.0/24 202.21.156.0/24 202.22.248.0/21 202.27.136.0/23 202.38.0.0/22 202.38.8.0/21 202.38.48.0/20 202.38.64.0/18 202.38.128.0/21 202.38.136.0/23 202.38.138.0/24 202.38.140.0/22 202.38.146.0/23 202.38.149.0/24 202.38.150.0/23 202.38.152.0/22 202.38.156.0/24 202.38.158.0/23 202.38.160.0/23 202.38.164.0/22 202.38.168.0/22 202.38.176.0/23 202.38.184.0/21 202.38.192.0/18 202.40.4.0/23 202.40.7.0/24 202.40.15.0/24 202.40.135.0/24 202.40.136.0/24 202.40.140.0/24 202.40.143.0/24 202.40.144.0/23 202.40.150.0/24 202.40.155.0/24 202.40.156.0/24 202.40.158.0/23 202.40.162.0/24 202.41.8.0/23 202.41.11.0/24 202.41.12.0/23 202.41.128.0/24 202.41.130.0/23 202.41.152.0/21 202.41.192.0/24 202.41.240.0/20 202.43.76.0/22 202.43.144.0/20 202.44.16.0/20 202.44.67.0/24 202.44.74.0/24 202.44.129.0/24 202.44.132.0/23 202.44.146.0/23 202.45.0.0/23 202.45.2.0/24 202.45.15.0/24 202.45.16.0/20 202.46.16.0/23 202.46.18.0/24 202.46.20.0/23 202.46.32.0/19 202.46.128.0/24 202.46.224.0/20 202.47.82.0/23 202.47.126.0/24 202.47.128.0/24 202.47.130.0/23 202.57.240.0/20 202.58.0.0/24 202.59.0.0/24 202.59.212.0/22 202.59.232.0/23 202.59.236.0/24 202.60.48.0/21 202.60.96.0/21 202.60.112.0/20 202.60.132.0/22 202.60.136.0/21 202.60.144.0/20 202.62.112.0/22 202.62.248.0/22 202.62.252.0/24 202.62.255.0/24 202.63.80.0/20 202.63.160.0/19 202.63.248.0/22 202.65.0.0/21 202.65.8.0/23 202.67.0.0/22 202.69.4.0/22 202.69.16.0/20 202.70.0.0/19 202.70.96.0/20 202.70.192.0/20 202.72.40.0/21 202.72.80.0/20 202.73.128.0/22 202.74.8.0/21 202.74.80.0/20 202.74.254.0/23 202.75.208.0/20 202.75.252.0/22 202.76.252.0/22 202.77.80.0/21 202.77.92.0/22 202.77.170.48/28 202.78.8.0/21 202.79.224.0/21 202.79.248.0/22 202.80.192.0/20 202.81.0.0/22 202.82.16.160/29 202.83.252.0/22 202.84.4.0/22 202.84.8.0/21 202.84.16.0/23 202.84.24.0/21 202.85.208.0/20 202.86.249.0/24 202.86.252.0/22 202.87.80.0/20 202.89.8.0/21 202.89.21.0/24 202.89.232.0/21 202.90.0.0/22 202.90.112.0/20 202.90.196.0/24 202.90.224.0/20 202.91.0.0/22 202.91.96.0/20 202.91.128.0/22 202.91.176.0/20 202.91.224.0/19 202.92.0.0/22 202.92.8.0/21 202.92.48.0/20 202.92.252.0/22 202.93.0.0/22 202.93.252.0/22 202.94.92.0/22 202.95.0.0/19 202.95.240.0/21 202.95.252.0/22 202.96.0.0/12 202.112.0.0/13 202.120.0.0/15 202.122.0.0/21 202.122.32.0/21 202.122.64.0/19 202.122.112.0/20 202.122.128.0/24 202.122.132.0/24 202.123.96.0/20 202.124.16.0/21 202.124.24.0/22 202.125.112.0/20 202.125.176.0/20 202.127.0.0/21 202.127.12.0/22 202.127.16.0/20 202.127.40.0/21 202.127.48.0/20 202.127.112.0/20 202.127.128.0/19 202.127.160.0/21 202.127.192.0/20 202.127.208.0/23 202.127.212.0/22 202.127.216.0/21 202.127.224.0/19 202.130.0.0/19 202.130.224.0/19 202.131.16.0/21 202.131.48.0/20 202.131.208.0/20 202.133.32.0/20 202.134.58.0/24 202.134.128.0/20 202.136.48.0/20 202.136.208.0/20 202.136.224.0/20 202.137.231.0/24 202.141.160.0/19 202.142.16.0/20 202.143.4.0/22 202.143.16.0/20 202.143.32.0/20 202.143.56.0/21 202.146.160.0/20 202.146.188.0/22 202.146.196.0/22 202.146.200.0/21 202.147.144.0/20 202.148.32.0/20 202.148.64.0/18 202.149.32.0/19 202.149.160.0/19 202.149.224.0/19 202.150.16.0/20 202.150.32.0/20 202.150.56.0/22 202.150.192.0/20 202.150.224.0/19 202.151.0.0/22 202.151.128.0/19 202.152.176.0/20 202.153.0.0/22 202.153.48.0/20 202.157.192.0/19 202.158.160.0/19 202.160.176.0/20 202.162.67.0/24 202.162.75.0/24 202.164.0.0/20 202.164.96.0/19 202.165.176.0/20 202.165.208.0/20 202.165.239.0/24 202.165.240.0/23 202.165.243.0/24 202.165.245.0/24 202.165.251.0/24 202.165.252.0/22 202.166.224.0/19 202.168.160.0/19 202.170.128.0/19 202.170.216.0/21 202.170.224.0/19 202.171.216.0/21 202.171.235.0/24 202.172.0.0/22 202.173.0.0/22 202.173.8.0/21 202.173.224.0/19 202.174.64.0/20 202.176.224.0/19 202.179.240.0/20 202.180.128.0/19 202.180.208.0/21 202.181.112.0/20 202.182.32.0/20 202.182.192.0/19 202.189.0.0/18 202.189.80.0/20 202.189.184.0/21 202.191.0.0/24 202.191.68.0/22 202.191.72.0/21 202.191.80.0/20 202.192.0.0/12 203.0.4.0/22 203.0.10.0/23 203.0.18.0/24 203.0.24.0/24 203.0.42.0/23 203.0.45.0/24 203.0.46.0/23 203.0.81.0/24 203.0.82.0/23 203.0.90.0/23 203.0.96.0/23 203.0.104.0/21 203.0.114.0/23 203.0.122.0/24 203.0.128.0/24 203.0.130.0/23 203.0.132.0/22 203.0.137.0/24 203.0.142.0/24 203.0.144.0/24 203.0.146.0/24 203.0.148.0/24 203.0.150.0/23 203.0.152.0/24 203.0.177.0/24 203.0.224.0/24 203.1.4.0/22 203.1.18.0/24 203.1.26.0/23 203.1.65.0/24 203.1.66.0/23 203.1.70.0/23 203.1.76.0/23 203.1.90.0/24 203.1.97.0/24 203.1.98.0/23 203.1.100.0/22 203.1.108.0/24 203.1.253.0/24 203.1.254.0/24 203.2.64.0/21 203.2.73.0/24 203.2.112.0/21 203.2.126.0/23 203.2.140.0/24 203.2.150.0/24 203.2.152.0/22 203.2.156.0/23 203.2.160.0/21 203.2.180.0/23 203.2.196.0/23 203.2.209.0/24 203.2.214.0/23 203.2.226.0/23 203.2.229.0/24 203.2.236.0/23 203.3.68.0/24 203.3.72.0/23 203.3.75.0/24 203.3.80.0/21 203.3.96.0/22 203.3.105.0/24 203.3.112.0/21 203.3.120.0/24 203.3.123.0/24 203.3.135.0/24 203.3.139.0/24 203.3.143.0/24 203.4.132.0/23 203.4.134.0/24 203.4.151.0/24 203.4.152.0/22 203.4.174.0/23 203.4.180.0/24 203.4.186.0/24 203.4.205.0/24 203.4.208.0/22 203.4.227.0/24 203.4.230.0/23 203.5.4.0/23 203.5.7.0/24 203.5.8.0/23 203.5.11.0/24 203.5.21.0/24 203.5.22.0/24 203.5.44.0/24 203.5.46.0/23 203.5.52.0/22 203.5.56.0/23 203.5.60.0/23 203.5.114.0/23 203.5.118.0/24 203.5.120.0/24 203.5.172.0/24 203.5.180.0/23 203.5.182.0/24 203.5.185.0/24 203.5.186.0/24 203.5.188.0/23 203.5.190.0/24 203.5.195.0/24 203.5.214.0/23 203.5.218.0/23 203.6.131.0/24 203.6.136.0/24 203.6.138.0/23 203.6.142.0/24 203.6.150.0/23 203.6.157.0/24 203.6.159.0/24 203.6.224.0/20 203.6.248.0/23 203.7.129.0/24 203.7.138.0/23 203.7.147.0/24 203.7.150.0/23 203.7.158.0/24 203.7.192.0/23 203.7.200.0/24 203.8.0.0/24 203.8.8.0/24 203.8.23.0/24 203.8.70.0/24 203.8.82.0/24 203.8.86.0/23 203.8.91.0/24 203.8.110.0/23 203.8.115.0/24 203.8.166.0/23 203.8.169.0/24 203.8.173.0/24 203.8.184.0/24 203.8.186.0/23 203.8.190.0/23 203.8.192.0/24 203.8.197.0/24 203.8.198.0/23 203.8.203.0/24 203.8.209.0/24 203.8.210.0/23 203.8.212.0/22 203.8.217.0/24 203.8.220.0/24 203.9.32.0/24 203.9.36.0/23 203.9.57.0/24 203.9.63.0/24 203.9.65.0/24 203.9.70.0/23 203.9.72.0/24 203.9.75.0/24 203.9.76.0/23 203.9.96.0/22 203.9.100.0/23 203.9.108.0/24 203.9.158.0/24 203.10.34.0/24 203.10.56.0/24 203.10.74.0/23 203.10.84.0/22 203.10.88.0/24 203.10.95.0/24 203.10.125.0/24 203.11.70.0/24 203.11.76.0/22 203.11.82.0/24 203.11.84.0/22 203.11.100.0/22 203.11.109.0/24 203.11.117.0/24 203.11.122.0/24 203.11.126.0/24 203.11.136.0/22 203.11.141.0/24 203.11.142.0/23 203.11.180.0/22 203.11.208.0/22 203.12.16.0/24 203.12.19.0/24 203.12.24.0/24 203.12.57.0/24 203.12.65.0/24 203.12.66.0/24 203.12.70.0/23 203.12.87.0/24 203.12.100.0/23 203.12.103.0/24 203.12.114.0/24 203.12.118.0/24 203.12.130.0/24 203.12.137.0/24 203.12.196.0/22 203.12.211.0/24 203.12.219.0/24 203.12.226.0/24 203.12.240.0/22 203.13.18.0/24 203.13.24.0/24 203.13.44.0/23 203.13.88.0/23 203.13.92.0/22 203.13.173.0/24 203.13.224.0/23 203.13.227.0/24 203.13.233.0/24 203.14.24.0/22 203.14.33.0/24 203.14.56.0/24 203.14.61.0/24 203.14.62.0/24 203.14.104.0/24 203.14.114.0/23 203.14.118.0/24 203.14.162.0/24 203.14.192.0/24 203.14.194.0/23 203.14.214.0/24 203.14.231.0/24 203.14.246.0/24 203.15.0.0/20 203.15.20.0/23 203.15.22.0/24 203.15.87.0/24 203.15.88.0/23 203.15.105.0/24 203.15.112.0/21 203.15.130.0/23 203.15.149.0/24 203.15.151.0/24 203.15.156.0/22 203.15.174.0/24 203.15.227.0/24 203.15.232.0/21 203.15.240.0/23 203.15.246.0/24 203.16.10.0/24 203.16.12.0/23 203.16.16.0/21 203.16.27.0/24 203.16.38.0/24 203.16.49.0/24 203.16.50.0/23 203.16.58.0/24 203.16.133.0/24 203.16.161.0/24 203.16.162.0/24 203.16.186.0/23 203.16.228.0/24 203.16.238.0/24 203.16.240.0/24 203.16.245.0/24 203.17.2.0/24 203.17.18.0/24 203.17.28.0/24 203.17.39.0/24 203.17.56.0/24 203.17.74.0/23 203.17.88.0/23 203.17.136.0/24 203.17.164.0/24 203.17.187.0/24 203.17.190.0/23 203.17.231.0/24 203.17.233.0/24 203.17.248.0/24 203.17.255.0/24 203.18.2.0/23 203.18.4.0/24 203.18.7.0/24 203.18.31.0/24 203.18.37.0/24 203.18.48.0/23 203.18.52.0/24 203.18.72.0/22 203.18.80.0/23 203.18.87.0/24 203.18.100.0/23 203.18.105.0/24 203.18.107.0/24 203.18.110.0/24 203.18.129.0/24 203.18.131.0/24 203.18.132.0/23 203.18.144.0/24 203.18.153.0/24 203.18.199.0/24 203.18.208.0/24 203.18.211.0/24 203.18.215.0/24 203.19.18.0/24 203.19.24.0/24 203.19.30.0/24 203.19.41.0/24 203.19.44.0/23 203.19.46.0/24 203.19.58.0/24 203.19.60.0/23 203.19.64.0/24 203.19.68.0/24 203.19.72.0/24 203.19.101.0/24 203.19.111.0/24 203.19.131.0/24 203.19.133.0/24 203.19.144.0/24 203.19.149.0/24 203.19.156.0/24 203.19.176.0/24 203.19.178.0/23 203.19.208.0/24 203.19.228.0/22 203.19.233.0/24 203.19.242.0/24 203.19.248.0/23 203.19.255.0/24 203.20.17.0/24 203.20.40.0/23 203.20.48.0/24 203.20.61.0/24 203.20.65.0/24 203.20.84.0/23 203.20.89.0/24 203.20.106.0/23 203.20.115.0/24 203.20.117.0/24 203.20.118.0/23 203.20.122.0/24 203.20.126.0/23 203.20.135.0/24 203.20.150.0/24 203.20.230.0/24 203.20.232.0/24 203.20.236.0/24 203.21.0.0/23 203.21.2.0/24 203.21.8.0/24 203.21.10.0/24 203.21.18.0/24 203.21.33.0/24 203.21.34.0/24 203.21.41.0/24 203.21.44.0/24 203.21.68.0/24 203.21.82.0/24 203.21.96.0/22 203.21.124.0/24 203.21.136.0/23 203.21.145.0/24 203.21.206.0/24 203.22.24.0/24 203.22.28.0/23 203.22.31.0/24 203.22.68.0/24 203.22.76.0/24 203.22.78.0/24 203.22.84.0/24 203.22.87.0/24 203.22.92.0/22 203.22.99.0/24 203.22.106.0/24 203.22.122.0/23 203.22.131.0/24 203.22.163.0/24 203.22.166.0/24 203.22.170.0/24 203.22.194.0/24 203.22.242.0/23 203.22.245.0/24 203.22.246.0/24 203.22.252.0/23 203.23.0.0/24 203.23.47.0/24 203.23.61.0/24 203.23.62.0/23 203.23.73.0/24 203.23.85.0/24 203.23.92.0/22 203.23.98.0/24 203.23.107.0/24 203.23.112.0/24 203.23.130.0/24 203.23.140.0/23 203.23.172.0/24 203.23.182.0/24 203.23.186.0/23 203.23.192.0/24 203.23.197.0/24 203.23.198.0/24 203.23.204.0/22 203.23.224.0/24 203.23.226.0/23 203.23.228.0/22 203.23.249.0/24 203.23.251.0/24 203.24.13.0/24 203.24.18.0/24 203.24.27.0/24 203.24.43.0/24 203.24.56.0/24 203.24.58.0/24 203.24.67.0/24 203.24.74.0/24 203.24.79.0/24 203.24.80.0/23 203.24.84.0/23 203.24.86.0/24 203.24.90.0/24 203.24.111.0/24 203.24.112.0/24 203.24.116.0/24 203.24.122.0/23 203.24.145.0/24 203.24.152.0/23 203.24.157.0/24 203.24.161.0/24 203.24.167.0/24 203.24.186.0/23 203.24.199.0/24 203.24.202.0/24 203.24.212.0/23 203.24.217.0/24 203.24.219.0/24 203.24.244.0/24 203.25.19.0/24 203.25.20.0/23 203.25.46.0/24 203.25.64.0/23 203.25.91.0/24 203.25.99.0/24 203.25.100.0/24 203.25.106.0/24 203.25.131.0/24 203.25.135.0/24 203.25.138.0/24 203.25.147.0/24 203.25.153.0/24 203.25.154.0/23 203.25.164.0/24 203.25.166.0/24 203.25.174.0/23 203.25.180.0/24 203.25.182.0/24 203.25.191.0/24 203.25.199.0/24 203.25.200.0/24 203.25.202.0/23 203.25.208.0/20 203.25.229.0/24 203.25.235.0/24 203.25.236.0/24 203.25.242.0/24 203.26.12.0/24 203.26.34.0/24 203.26.49.0/24 203.26.50.0/24 203.26.55.0/24 203.26.56.0/23 203.26.60.0/24 203.26.65.0/24 203.26.68.0/24 203.26.76.0/24 203.26.80.0/24 203.26.84.0/24 203.26.97.0/24 203.26.102.0/23 203.26.115.0/24 203.26.116.0/24 203.26.129.0/24 203.26.143.0/24 203.26.144.0/24 203.26.148.0/23 203.26.154.0/24 203.26.158.0/23 203.26.170.0/24 203.26.173.0/24 203.26.176.0/24 203.26.185.0/24 203.26.202.0/23 203.26.210.0/24 203.26.214.0/24 203.26.222.0/24 203.26.224.0/24 203.26.228.0/24 203.26.232.0/24 203.27.0.0/24 203.27.10.0/24 203.27.15.0/24 203.27.16.0/24 203.27.20.0/24 203.27.22.0/23 203.27.40.0/24 203.27.45.0/24 203.27.53.0/24 203.27.65.0/24 203.27.66.0/24 203.27.81.0/24 203.27.88.0/24 203.27.102.0/24 203.27.109.0/24 203.27.117.0/24 203.27.121.0/24 203.27.122.0/23 203.27.125.0/24 203.27.200.0/24 203.27.202.0/24 203.27.233.0/24 203.27.241.0/24 203.27.250.0/24 203.28.10.0/24 203.28.12.0/24 203.28.33.0/24 203.28.34.0/23 203.28.43.0/24 203.28.44.0/24 203.28.54.0/24 203.28.56.0/24 203.28.73.0/24 203.28.74.0/24 203.28.76.0/24 203.28.86.0/24 203.28.88.0/24 203.28.112.0/24 203.28.131.0/24 203.28.136.0/24 203.28.140.0/24 203.28.145.0/24 203.28.165.0/24 203.28.169.0/24 203.28.170.0/24 203.28.178.0/23 203.28.185.0/24 203.28.187.0/24 203.28.196.0/24 203.28.226.0/23 203.28.239.0/24 203.29.2.0/24 203.29.8.0/23 203.29.13.0/24 203.29.14.0/24 203.29.28.0/24 203.29.46.0/24 203.29.57.0/24 203.29.61.0/24 203.29.63.0/24 203.29.69.0/24 203.29.73.0/24 203.29.81.0/24 203.29.90.0/24 203.29.95.0/24 203.29.100.0/24 203.29.103.0/24 203.29.112.0/24 203.29.120.0/22 203.29.182.0/23 203.29.187.0/24 203.29.189.0/24 203.29.190.0/24 203.29.205.0/24 203.29.210.0/24 203.29.217.0/24 203.29.227.0/24 203.29.231.0/24 203.29.233.0/24 203.29.234.0/24 203.29.248.0/24 203.29.254.0/23 203.30.16.0/23 203.30.25.0/24 203.30.27.0/24 203.30.29.0/24 203.30.66.0/24 203.30.81.0/24 203.30.87.0/24 203.30.111.0/24 203.30.121.0/24 203.30.123.0/24 203.30.152.0/24 203.30.156.0/24 203.30.162.0/24 203.30.173.0/24 203.30.175.0/24 203.30.187.0/24 203.30.194.0/24 203.30.217.0/24 203.30.220.0/24 203.30.222.0/24 203.30.232.0/23 203.30.235.0/24 203.30.240.0/23 203.30.246.0/24 203.30.250.0/23 203.31.45.0/24 203.31.46.0/24 203.31.49.0/24 203.31.51.0/24 203.31.54.0/23 203.31.69.0/24 203.31.72.0/24 203.31.80.0/24 203.31.85.0/24 203.31.97.0/24 203.31.105.0/24 203.31.106.0/24 203.31.108.0/23 203.31.124.0/24 203.31.162.0/24 203.31.174.0/24 203.31.177.0/24 203.31.181.0/24 203.31.187.0/24 203.31.189.0/24 203.31.204.0/24 203.31.220.0/24 203.31.222.0/23 203.31.225.0/24 203.31.229.0/24 203.31.248.0/23 203.31.253.0/24 203.32.20.0/24 203.32.48.0/23 203.32.56.0/24 203.32.60.0/24 203.32.62.0/24 203.32.68.0/23 203.32.76.0/24 203.32.81.0/24 203.32.84.0/23 203.32.95.0/24 203.32.102.0/24 203.32.105.0/24 203.32.130.0/24 203.32.133.0/24 203.32.140.0/24 203.32.152.0/24 203.32.186.0/23 203.32.192.0/24 203.32.196.0/24 203.32.203.0/24 203.32.204.0/23 203.32.212.0/24 203.33.4.0/24 203.33.7.0/24 203.33.21.0/24 203.33.26.0/24 203.33.32.0/24 203.33.63.0/24 203.33.64.0/24 203.33.67.0/24 203.33.68.0/24 203.33.73.0/24 203.33.79.0/24 203.33.100.0/24 203.33.122.0/24 203.33.129.0/24 203.33.131.0/24 203.33.145.0/24 203.33.156.0/24 203.33.158.0/23 203.33.174.0/24 203.33.185.0/24 203.33.200.0/24 203.33.202.0/23 203.33.204.0/24 203.33.206.0/23 203.33.214.0/23 203.33.224.0/23 203.33.226.0/24 203.33.233.0/24 203.33.243.0/24 203.33.250.0/24 203.34.4.0/24 203.34.21.0/24 203.34.27.0/24 203.34.39.0/24 203.34.48.0/23 203.34.54.0/24 203.34.56.0/23 203.34.67.0/24 203.34.69.0/24 203.34.76.0/24 203.34.92.0/24 203.34.106.0/24 203.34.113.0/24 203.34.147.0/24 203.34.150.0/24 203.34.152.0/23 203.34.161.0/24 203.34.162.0/24 203.34.187.0/24 203.34.204.0/22 203.34.232.0/24 203.34.240.0/24 203.34.242.0/24 203.34.245.0/24 203.34.251.0/24 203.55.2.0/23 203.55.4.0/24 203.55.10.0/24 203.55.13.0/24 203.55.22.0/24 203.55.30.0/24 203.55.93.0/24 203.55.101.0/24 203.55.109.0/24 203.55.110.0/24 203.55.116.0/23 203.55.119.0/24 203.55.128.0/23 203.55.146.0/23 203.55.192.0/24 203.55.196.0/24 203.55.218.0/23 203.55.221.0/24 203.55.224.0/24 203.56.1.0/24 203.56.4.0/24 203.56.12.0/24 203.56.24.0/24 203.56.38.0/24 203.56.40.0/24 203.56.46.0/24 203.56.68.0/23 203.56.82.0/23 203.56.84.0/23 203.56.95.0/24 203.56.110.0/24 203.56.121.0/24 203.56.161.0/24 203.56.169.0/24 203.56.172.0/23 203.56.175.0/24 203.56.183.0/24 203.56.185.0/24 203.56.187.0/24 203.56.192.0/24 203.56.198.0/24 203.56.201.0/24 203.56.208.0/23 203.56.210.0/24 203.56.214.0/24 203.56.216.0/24 203.56.227.0/24 203.56.228.0/24 203.56.232.0/24 203.56.240.0/24 203.56.252.0/24 203.56.254.0/24 203.57.5.0/24 203.57.6.0/24 203.57.12.0/23 203.57.28.0/24 203.57.39.0/24 203.57.46.0/24 203.57.58.0/24 203.57.61.0/24 203.57.66.0/24 203.57.69.0/24 203.57.70.0/23 203.57.73.0/24 203.57.90.0/24 203.57.101.0/24 203.57.109.0/24 203.57.123.0/24 203.57.157.0/24 203.57.200.0/24 203.57.202.0/24 203.57.206.0/24 203.57.222.0/24 203.57.224.0/20 203.57.246.0/23 203.57.249.0/24 203.57.253.0/24 203.57.254.0/23 203.62.2.0/24 203.62.131.0/24 203.62.139.0/24 203.62.161.0/24 203.62.197.0/24 203.62.228.0/22 203.62.234.0/24 203.62.246.0/24 203.76.160.0/22 203.76.168.0/22 203.77.180.0/22 203.78.48.0/20 203.79.0.0/20 203.80.4.0/23 203.80.32.0/20 203.80.57.0/24 203.80.132.0/22 203.80.144.0/20 203.81.16.0/20 203.82.0.0/23 203.83.0.0/22 203.83.56.0/21 203.83.224.0/20 203.86.0.0/17 203.86.254.0/23 203.88.32.0/19 203.88.192.0/19 203.89.0.0/22 203.89.136.0/22 203.90.0.0/22 203.90.8.0/22 203.90.128.0/18 203.90.192.0/19 203.91.32.0/19 203.91.96.0/20 203.91.120.0/21 203.92.0.0/22 203.92.160.0/19 203.93.0.0/16 203.94.0.0/19 203.95.0.0/21 203.95.96.0/19 203.95.128.0/18 203.95.224.0/19 203.99.16.0/20 203.99.80.0/20 203.100.32.0/20 203.100.63.0/24 203.100.80.0/20 203.100.96.0/19 203.100.192.0/20 203.104.32.0/20 203.105.96.0/19 203.105.128.0/19 203.107.0.0/17 203.110.160.0/19 203.110.208.0/20 203.110.232.0/23 203.110.234.0/24 203.114.244.0/22 203.118.192.0/19 203.118.241.0/24 203.118.248.0/22 203.119.24.0/21 203.119.32.0/22 203.119.80.0/22 203.119.85.0/24 203.119.113.0/24 203.119.114.0/23 203.119.116.0/22 203.119.128.0/17 203.128.32.0/19 203.128.96.0/19 203.130.32.0/19 203.132.32.0/19 203.134.240.0/21 203.135.96.0/19 203.135.160.0/20 203.142.224.0/19 203.144.96.0/19 203.145.0.0/19 203.148.0.0/18 203.148.64.0/20 203.148.80.0/22 203.148.86.0/23 203.149.92.0/22 203.152.64.0/19 203.152.128.0/19 203.153.0.0/22 203.156.192.0/18 203.158.16.0/21 203.160.129.0/24 203.160.192.0/19 203.161.0.0/22 203.161.180.0/24 203.161.192.0/19 203.166.160.0/19 203.168.0.0/19 203.170.58.0/23 203.171.0.0/22 203.171.224.0/20 203.174.4.0/24 203.174.7.0/24 203.174.96.0/19 203.175.128.0/19 203.175.192.0/18 203.176.0.0/18 203.176.64.0/19 203.176.168.0/21 203.184.80.0/20 203.187.160.0/19 203.189.0.0/23 203.189.6.0/23 203.189.112.0/22 203.189.192.0/19 203.190.96.0/20 203.190.249.0/24 203.191.0.0/23 203.191.20.0/22 203.191.28.0/22 203.191.64.0/18 203.191.144.0/20 203.192.0.0/19 203.193.81.60/30 203.193.224.0/19 203.195.64.0/19 203.195.128.0/17 203.196.0.0/21 203.202.236.0/22 203.205.64.0/19 203.205.128.0/17 203.207.64.0/18 203.207.128.0/17 203.208.0.0/20 203.208.16.0/22 203.208.32.0/19 203.209.224.0/19 203.212.0.0/20 203.212.80.0/20 203.215.146.0/24 204.69.150.0/24 206.221.221.64/29 207.117.165.0/24 207.254.180.0/22 207.254.185.0/24 207.254.186.0/23 207.254.188.0/24 209.93.189.0/24 209.93.190.0/23 210.2.0.0/19 210.5.0.0/19 210.5.56.0/21 210.5.128.0/19 210.12.0.0/15 210.14.64.0/19 210.14.112.0/20 210.14.128.0/17 210.15.0.0/17 210.15.128.0/18 210.16.128.0/18 210.21.0.0/16 210.22.0.0/16 210.23.32.0/19 210.25.0.0/16 210.26.0.0/15 210.28.0.0/14 210.32.0.0/12 210.51.0.0/16 210.52.0.0/18 210.52.64.0/19 210.52.96.0/21 210.52.104.0/22 210.52.108.0/24 210.52.110.0/23 210.52.112.0/20 210.52.128.0/17 210.53.0.0/16 210.56.192.0/19 210.72.0.0/14 210.76.0.0/15 210.78.0.0/16 210.79.64.0/18 210.79.224.0/19 210.82.0.0/15 210.87.128.0/18 210.176.26.0/27 210.177.188.84/32 210.185.192.0/18 210.192.96.0/19 211.64.0.0/13 211.80.0.0/12 211.96.0.0/13 211.136.0.0/13 211.144.0.0/12 211.160.0.0/13 212.63.183.19/32 218.0.0.0/11 218.56.0.0/13 218.64.0.0/11 218.96.0.0/14 218.100.88.0/21 218.100.96.0/19 218.100.128.0/17 218.104.0.0/14 218.108.0.0/15 218.185.192.0/19 218.185.240.0/21 218.192.0.0/12 218.240.0.0/13 218.249.0.0/16 219.72.0.0/16 219.82.0.0/16 219.83.128.0/17 219.128.0.0/11 219.216.0.0/13 219.224.0.0/12 219.242.0.0/15 219.244.0.0/14 220.101.192.0/18 220.112.0.0/14 220.152.128.0/17 220.154.0.0/15 220.160.0.0/11 220.192.0.0/12 220.231.0.0/18 220.231.128.0/17 220.232.64.0/18 220.234.0.0/16 220.242.0.0/15 220.247.136.0/21 220.248.0.0/14 220.252.0.0/16 221.0.0.0/13 221.8.0.0/14 221.12.0.0/17 221.12.128.0/18 221.13.0.0/16 221.14.0.0/15 221.122.0.0/15 221.128.128.0/17 221.129.0.0/16 221.130.0.0/15 221.133.224.0/19 221.136.0.0/15 221.172.0.0/14 221.176.0.0/13 221.192.0.0/14 221.196.0.0/15 221.198.0.0/16 221.199.0.0/17 221.199.128.0/18 221.199.192.0/20 221.199.224.0/19 221.200.0.0/13 221.208.0.0/12 221.224.0.0/12 222.16.0.0/12 222.32.0.0/11 222.64.0.0/11 222.125.0.0/16 222.126.128.0/17 222.128.0.0/12 222.160.0.0/14 222.168.0.0/13 222.176.0.0/12 222.192.0.0/11 222.240.0.0/13 222.248.0.0/15 223.0.0.0/12 223.20.0.0/15 223.27.184.0/22 223.64.0.0/11 223.96.0.0/12 223.112.0.0/14 223.116.0.0/15 223.120.0.0/13 223.128.0.0/15 223.144.0.0/12 223.160.0.0/14 223.166.0.0/15 223.192.0.0/15 223.198.0.0/15 223.201.0.0/16 223.202.0.0/15 223.208.0.0/13 223.220.0.0/15 223.223.176.0/20 223.223.192.0/20 223.240.0.0/13 223.248.0.0/14 223.252.128.0/19 223.252.160.0/24 223.252.161.0/26 223.252.161.128/25 223.252.162.0/23 223.252.164.0/22 223.252.168.0/21 223.252.176.0/20 223.252.192.0/18 223.254.0.0/16 223.255.0.0/17 223.255.236.0/22 223.255.252.0/23 2001:250::/39 2001:250:200::/46 2001:250:204::/47 2001:250:206::/48 2001:250:207::/49 2001:250:207:8000::/49 2001:250:208::/49 2001:250:208:8000::/49 2001:250:209::/49 2001:250:209:8000::/49 2001:250:20a::/49 2001:250:20a:8000::/49 2001:250:20b::/48 2001:250:20c::/46 2001:250:210::/46 2001:250:214::/47 2001:250:216::/48 2001:250:217::/49 2001:250:217:8000::/49 2001:250:218::/48 2001:250:219::/49 2001:250:219:8000::/49 2001:250:21a::/47 2001:250:21c::/46 2001:250:220::/43 2001:250:240::/42 2001:250:280::/41 2001:250:300::/40 2001:250:400::/48 2001:250:401::/48 2001:250:402::/47 2001:250:404::/48 2001:250:405::/49 2001:250:405:8000::/49 2001:250:406::/47 2001:250:408::/45 2001:250:410::/44 2001:250:420::/43 2001:250:440::/42 2001:250:480::/41 2001:250:500::/40 2001:250:600::/39 2001:250:800::/38 2001:250:c00::/48 2001:250:c01::/49 2001:250:c01:8000::/49 2001:250:c02::/49 2001:250:c02:8000::/49 2001:250:c03::/48 2001:250:c04::/46 2001:250:c08::/45 2001:250:c10::/44 2001:250:c20::/43 2001:250:c40::/42 2001:250:c80::/41 2001:250:d00::/40 2001:250:e00::/39 2001:250:1000::/48 2001:250:1001::/49 2001:250:1001:8000::/49 2001:250:1002::/49 2001:250:1002:8000::/49 2001:250:1003::/48 2001:250:1004::/49 2001:250:1004:8000::/49 2001:250:1005::/48 2001:250:1006::/48 2001:250:1007::/48 2001:250:1008::/45 2001:250:1010::/44 2001:250:1020::/43 2001:250:1040::/42 2001:250:1080::/41 2001:250:1100::/40 2001:250:1200::/39 2001:250:1400::/48 2001:250:1401::/49 2001:250:1401:8000::/49 2001:250:1402::/48 2001:250:1403::/49 2001:250:1403:8000::/49 2001:250:1404::/46 2001:250:1408::/45 2001:250:1410::/44 2001:250:1420::/43 2001:250:1440::/42 2001:250:1480::/41 2001:250:1500::/40 2001:250:1600::/39 2001:250:1800::/38 2001:250:1c00::/47 2001:250:1c02::/49 2001:250:1c02:8000::/49 2001:250:1c03::/48 2001:250:1c04::/46 2001:250:1c08::/45 2001:250:1c10::/44 2001:250:1c20::/43 2001:250:1c40::/42 2001:250:1c80::/41 2001:250:1d00::/40 2001:250:1e00::/39 2001:250:2000::/48 2001:250:2001::/49 2001:250:2001:8000::/49 2001:250:2002::/48 2001:250:2003::/49 2001:250:2003:8000::/49 2001:250:2004::/48 2001:250:2005::/49 2001:250:2005:8000::/49 2001:250:2006::/48 2001:250:2007::/49 2001:250:2007:8000::/49 2001:250:2008::/48 2001:250:2009::/49 2001:250:2009:8000::/49 2001:250:200a::/47 2001:250:200c::/46 2001:250:2010::/44 2001:250:2020::/43 2001:250:2040::/42 2001:250:2080::/41 2001:250:2100::/40 2001:250:2200::/39 2001:250:2400::/38 2001:250:2800::/49 2001:250:2800:8000::/49 2001:250:2801::/48 2001:250:2802::/47 2001:250:2804::/46 2001:250:2808::/45 2001:250:2810::/44 2001:250:2820::/43 2001:250:2840::/42 2001:250:2880::/41 2001:250:2900::/40 2001:250:2a00::/39 2001:250:2c00::/38 2001:250:3000::/49 2001:250:3000:8000::/49 2001:250:3001::/48 2001:250:3002::/49 2001:250:3002:8000::/49 2001:250:3003::/48 2001:250:3004::/46 2001:250:3008::/45 2001:250:3010::/44 2001:250:3020::/43 2001:250:3040::/42 2001:250:3080::/41 2001:250:3100::/40 2001:250:3200::/39 2001:250:3400::/38 2001:250:3800::/38 2001:250:3c00::/49 2001:250:3c00:8000::/49 2001:250:3c01::/48 2001:250:3c02::/49 2001:250:3c02:8000::/49 2001:250:3c03::/48 2001:250:3c04::/46 2001:250:3c08::/45 2001:250:3c10::/44 2001:250:3c20::/43 2001:250:3c40::/42 2001:250:3c80::/41 2001:250:3d00::/40 2001:250:3e00::/39 2001:250:4000::/48 2001:250:4001::/49 2001:250:4001:8000::/49 2001:250:4002::/49 2001:250:4002:8000::/49 2001:250:4003::/49 2001:250:4003:8000::/49 2001:250:4004::/48 2001:250:4005::/48 2001:250:4006::/47 2001:250:4008::/45 2001:250:4010::/44 2001:250:4020::/43 2001:250:4040::/42 2001:250:4080::/41 2001:250:4100::/40 2001:250:4200::/39 2001:250:4400::/48 2001:250:4401::/49 2001:250:4401:8000::/49 2001:250:4402::/49 2001:250:4402:8000::/49 2001:250:4403::/49 2001:250:4403:8000::/49 2001:250:4404::/46 2001:250:4408::/45 2001:250:4410::/44 2001:250:4420::/43 2001:250:4440::/42 2001:250:4480::/41 2001:250:4500::/40 2001:250:4600::/39 2001:250:4800::/45 2001:250:4808::/48 2001:250:4809::/49 2001:250:4809:8000::/49 2001:250:480a::/47 2001:250:480c::/47 2001:250:480e::/48 2001:250:480f::/49 2001:250:480f:8000::/49 2001:250:4810::/46 2001:250:4814::/49 2001:250:4814:8000::/49 2001:250:4815::/48 2001:250:4816::/47 2001:250:4818::/45 2001:250:4820::/43 2001:250:4840::/42 2001:250:4880::/41 2001:250:4900::/40 2001:250:4a00::/39 2001:250:4c00::/38 2001:250:5000::/47 2001:250:5002::/48 2001:250:5003::/48 2001:250:5004::/49 2001:250:5004:8000::/49 2001:250:5005::/48 2001:250:5006::/47 2001:250:5008::/46 2001:250:500c::/47 2001:250:500e::/48 2001:250:500f::/49 2001:250:500f:8000::/49 2001:250:5010::/44 2001:250:5020::/43 2001:250:5040::/42 2001:250:5080::/41 2001:250:5100::/40 2001:250:5200::/39 2001:250:5400::/48 2001:250:5401::/49 2001:250:5401:8000::/49 2001:250:5402::/49 2001:250:5402:8000::/49 2001:250:5403::/48 2001:250:5404::/49 2001:250:5404:8000::/49 2001:250:5405::/49 2001:250:5405:8000::/49 2001:250:5406::/47 2001:250:5408::/47 2001:250:540a::/49 2001:250:540a:8000::/49 2001:250:540b::/48 2001:250:540c::/46 2001:250:5410::/44 2001:250:5420::/43 2001:250:5440::/42 2001:250:5480::/41 2001:250:5500::/40 2001:250:5600::/39 2001:250:5800::/37 2001:250:6000::/38 2001:250:6400::/45 2001:250:6408::/47 2001:250:640a::/49 2001:250:640a:8000::/49 2001:250:640b::/48 2001:250:640c::/46 2001:250:6410::/44 2001:250:6420::/43 2001:250:6440::/42 2001:250:6480::/41 2001:250:6500::/40 2001:250:6600::/39 2001:250:6800::/48 2001:250:6801::/48 2001:250:6802::/48 2001:250:6803::/49 2001:250:6803:8000::/49 2001:250:6804::/49 2001:250:6804:8000::/49 2001:250:6805::/48 2001:250:6806::/47 2001:250:6808::/45 2001:250:6810::/44 2001:250:6820::/43 2001:250:6840::/42 2001:250:6880::/41 2001:250:6900::/40 2001:250:6a00::/39 2001:250:6c00::/49 2001:250:6c00:8000::/49 2001:250:6c01::/48 2001:250:6c02::/48 2001:250:6c03::/48 2001:250:6c04::/46 2001:250:6c08::/45 2001:250:6c10::/44 2001:250:6c20::/43 2001:250:6c40::/42 2001:250:6c80::/41 2001:250:6d00::/40 2001:250:6e00::/39 2001:250:7000::/38 2001:250:7400::/48 2001:250:7401::/48 2001:250:7402::/47 2001:250:7404::/46 2001:250:7408::/45 2001:250:7410::/44 2001:250:7420::/43 2001:250:7440::/42 2001:250:7480::/41 2001:250:7500::/40 2001:250:7600::/39 2001:250:7800::/48 2001:250:7801::/49 2001:250:7801:8000::/49 2001:250:7802::/49 2001:250:7802:8000::/49 2001:250:7803::/48 2001:250:7804::/46 2001:250:7808::/45 2001:250:7810::/44 2001:250:7820::/43 2001:250:7840::/42 2001:250:7880::/41 2001:250:7900::/40 2001:250:7a00::/39 2001:250:7c00::/38 2001:250:8000::/33 2001:251::/32 2001:252::/32 2001:254::/32 2001:256::/40 2001:256:100::/49 2001:256:100:8000::/49 2001:256:101::/48 2001:256:102::/47 2001:256:104::/46 2001:256:108::/45 2001:256:110::/44 2001:256:120::/43 2001:256:140::/42 2001:256:180::/41 2001:256:200::/39 2001:256:400::/38 2001:256:800::/37 2001:256:1000::/36 2001:256:2000::/35 2001:256:4000::/34 2001:256:8000::/33 2001:420:5883::/49 2001:420:5895::/49 2001:420:5a40::/49 2001:420:5a44:1200::/56 2001:420:c0d8::/49 2001:470:24::/49 2001:470:66::/49 2001:470:49e5:8000::/49 2001:470:8092::/49 2001:470:80b7::/49 2001:470:8328::/49 2001:470:83bc::/49 2001:470:83d0:8000::/49 2001:470:83e9::/49 2001:470:8579::/49 2001:470:f1fb::/49 2001:470:f383::/49 2001:470:f3be::/48 2001:470:f4b4:8000::/49 2001:470:f4c4::/49 2001:470:f892::/49 2001:470:f91c::/49 2001:470:fa49::/49 2001:470:fb3c::/49 2001:470:fc63::/49 2001:470:fe7c:8000::/49 2001:7fa:5::/48 2001:7fa:10::/48 2001:c68::/32 2001:cc0::/35 2001:cc0:2000::/44 2001:cc0:2010::/47 2001:cc0:2012::/49 2001:cc0:2012:8000::/49 2001:cc0:2013::/48 2001:cc0:2014::/47 2001:cc0:2016::/48 2001:cc0:2017::/48 2001:cc0:2018::/49 2001:cc0:2018:8000::/49 2001:cc0:2019::/48 2001:cc0:201a::/47 2001:cc0:201c::/47 2001:cc0:201e::/49 2001:cc0:201e:8000::/49 2001:cc0:201f::/48 2001:cc0:2020::/49 2001:cc0:2020:8000::/49 2001:cc0:2021::/48 2001:cc0:2022::/49 2001:cc0:2022:8000::/49 2001:cc0:2023::/48 2001:cc0:2024::/49 2001:cc0:2024:8000::/49 2001:cc0:2025::/48 2001:cc0:2026::/49 2001:cc0:2026:8000::/49 2001:cc0:2027::/48 2001:cc0:2028::/49 2001:cc0:2028:8000::/49 2001:cc0:2029::/48 2001:cc0:202a::/49 2001:cc0:202a:8000::/49 2001:cc0:202b::/48 2001:cc0:202c::/49 2001:cc0:202c:8000::/49 2001:cc0:202d::/48 2001:cc0:202e::/47 2001:cc0:2030::/46 2001:cc0:2034::/49 2001:cc0:2034:8000::/49 2001:cc0:2035::/48 2001:cc0:2036::/47 2001:cc0:2038::/46 2001:cc0:203c::/49 2001:cc0:203c:8000::/49 2001:cc0:203d::/48 2001:cc0:203e::/47 2001:cc0:2040::/46 2001:cc0:2044::/49 2001:cc0:2044:8000::/49 2001:cc0:2045::/48 2001:cc0:2046::/47 2001:cc0:2048::/45 2001:cc0:2050::/44 2001:cc0:2060::/43 2001:cc0:2080::/41 2001:cc0:2100::/40 2001:cc0:2200::/39 2001:cc0:2400::/44 2001:cc0:2410::/45 2001:cc0:2418::/46 2001:cc0:241c::/49 2001:cc0:241c:8000::/49 2001:cc0:241d::/48 2001:cc0:241e::/47 2001:cc0:2420::/46 2001:cc0:2424::/47 2001:cc0:2426::/49 2001:cc0:2426:8000::/49 2001:cc0:2427::/48 2001:cc0:2428::/45 2001:cc0:2430::/44 2001:cc0:2440::/44 2001:cc0:2450::/45 2001:cc0:2458::/46 2001:cc0:245c::/49 2001:cc0:245c:8000::/49 2001:cc0:245d::/48 2001:cc0:245e::/47 2001:cc0:2460::/43 2001:cc0:2480::/41 2001:cc0:2500::/40 2001:cc0:2600::/39 2001:cc0:2800::/38 2001:cc0:2c00::/39 2001:cc0:2e00::/40 2001:cc0:2f00::/41 2001:cc0:2f80::/42 2001:cc0:2fc0::/43 2001:cc0:2fe0::/44 2001:cc0:2ff0::/45 2001:cc0:2ff8::/46 2001:cc0:2ffc::/47 2001:cc0:2ffe::/48 2001:cc0:2fff::/49 2001:cc0:2fff:8000::/49 2001:cc0:3000::/36 2001:cc0:4000::/34 2001:cc0:8000::/35 2001:cc0:a000::/46 2001:cc0:a004::/49 2001:cc0:a004:8000::/49 2001:cc0:a005::/48 2001:cc0:a006::/49 2001:cc0:a006:8000::/49 2001:cc0:a007::/48 2001:cc0:a008::/49 2001:cc0:a008:8000::/49 2001:cc0:a009::/48 2001:cc0:a00a::/49 2001:cc0:a00a:8000::/49 2001:cc0:a00b::/48 2001:cc0:a00c::/49 2001:cc0:a00c:8000::/49 2001:cc0:a00d::/48 2001:cc0:a00e::/49 2001:cc0:a00e:8000::/49 2001:cc0:a00f::/48 2001:cc0:a010::/47 2001:cc0:a012::/48 2001:cc0:a013::/48 2001:cc0:a014::/49 2001:cc0:a014:8000::/49 2001:cc0:a015::/48 2001:cc0:a016::/47 2001:cc0:a018::/49 2001:cc0:a018:8000::/49 2001:cc0:a019::/48 2001:cc0:a01a::/47 2001:cc0:a01c::/46 2001:cc0:a020::/43 2001:cc0:a040::/42 2001:cc0:a080::/41 2001:cc0:a100::/40 2001:cc0:a200::/39 2001:cc0:a400::/38 2001:cc0:a800::/37 2001:cc0:b000::/47 2001:cc0:b002::/49 2001:cc0:b002:8000::/49 2001:cc0:b003::/48 2001:cc0:b004::/49 2001:cc0:b004:8000::/49 2001:cc0:b005::/48 2001:cc0:b006::/47 2001:cc0:b008::/46 2001:cc0:b00c::/49 2001:cc0:b00c:8000::/49 2001:cc0:b00d::/48 2001:cc0:b00e::/47 2001:cc0:b010::/44 2001:cc0:b020::/43 2001:cc0:b040::/42 2001:cc0:b080::/41 2001:cc0:b100::/40 2001:cc0:b200::/39 2001:cc0:b400::/38 2001:cc0:b800::/37 2001:cc0:c000::/47 2001:cc0:c002::/49 2001:cc0:c002:8000::/49 2001:cc0:c003::/48 2001:cc0:c004::/46 2001:cc0:c008::/49 2001:cc0:c008:8000::/49 2001:cc0:c009::/48 2001:cc0:c00a::/47 2001:cc0:c00c::/46 2001:cc0:c010::/44 2001:cc0:c020::/43 2001:cc0:c040::/42 2001:cc0:c080::/41 2001:cc0:c100::/40 2001:cc0:c200::/39 2001:cc0:c400::/38 2001:cc0:c800::/37 2001:cc0:d000::/47 2001:cc0:d002::/49 2001:cc0:d002:8000::/49 2001:cc0:d003::/48 2001:cc0:d004::/49 2001:cc0:d004:8000::/49 2001:cc0:d005::/48 2001:cc0:d006::/47 2001:cc0:d008::/45 2001:cc0:d010::/44 2001:cc0:d020::/43 2001:cc0:d040::/42 2001:cc0:d080::/41 2001:cc0:d100::/40 2001:cc0:d200::/39 2001:cc0:d400::/38 2001:cc0:d800::/37 2001:cc0:e000::/36 2001:cc0:f000::/45 2001:cc0:f008::/49 2001:cc0:f008:8000::/49 2001:cc0:f009::/48 2001:cc0:f00a::/47 2001:cc0:f00c::/46 2001:cc0:f010::/44 2001:cc0:f020::/43 2001:cc0:f040::/42 2001:cc0:f080::/41 2001:cc0:f100::/40 2001:cc0:f200::/39 2001:cc0:f400::/38 2001:cc0:f800::/37 2001:da8::/41 2001:da8:80::/43 2001:da8:a0::/45 2001:da8:a8::/46 2001:da8:ac::/47 2001:da8:ae::/48 2001:da8:af::/49 2001:da8:af:8000::/49 2001:da8:b0::/45 2001:da8:b8::/46 2001:da8:bc::/48 2001:da8:bd::/49 2001:da8:bd:8000::/49 2001:da8:be::/47 2001:da8:c0::/42 2001:da8:100::/40 2001:da8:200::/49 2001:da8:200:8000::/49 2001:da8:201::/49 2001:da8:201:8000::/49 2001:da8:202::/48 2001:da8:203::/48 2001:da8:204::/49 2001:da8:204:8000::/49 2001:da8:205::/49 2001:da8:205:8000::/49 2001:da8:206::/48 2001:da8:207::/48 2001:da8:208::/48 2001:da8:209::/49 2001:da8:209:8000::/49 2001:da8:20a::/49 2001:da8:20a:8000::/49 2001:da8:20b::/48 2001:da8:20c::/48 2001:da8:20d::/49 2001:da8:20d:8000::/49 2001:da8:20e::/48 2001:da8:20f::/49 2001:da8:20f:8000::/49 2001:da8:210::/48 2001:da8:211::/48 2001:da8:212::/47 2001:da8:214::/49 2001:da8:214:8000::/49 2001:da8:215::/48 2001:da8:216::/48 2001:da8:217::/48 2001:da8:218::/49 2001:da8:218:8000::/49 2001:da8:219::/49 2001:da8:219:8000::/49 2001:da8:21a::/47 2001:da8:21c::/49 2001:da8:21c:8000::/49 2001:da8:21d::/49 2001:da8:21d:8000::/49 2001:da8:21e::/47 2001:da8:220::/46 2001:da8:224::/48 2001:da8:225::/49 2001:da8:225:8000::/49 2001:da8:226::/47 2001:da8:228::/47 2001:da8:22a::/49 2001:da8:22a:8000::/49 2001:da8:22b::/48 2001:da8:22c::/48 2001:da8:22d::/48 2001:da8:22e::/47 2001:da8:230::/49 2001:da8:230:8000::/49 2001:da8:231::/48 2001:da8:232::/49 2001:da8:232:8000::/49 2001:da8:233::/48 2001:da8:234::/48 2001:da8:235::/49 2001:da8:235:8000::/49 2001:da8:236::/48 2001:da8:237::/48 2001:da8:238::/49 2001:da8:238:8000::/49 2001:da8:239::/48 2001:da8:23a::/48 2001:da8:23b::/49 2001:da8:23b:8000::/49 2001:da8:23c::/49 2001:da8:23c:8000::/49 2001:da8:23d::/49 2001:da8:23d:8000::/49 2001:da8:23e::/47 2001:da8:240::/45 2001:da8:248::/46 2001:da8:24c::/47 2001:da8:24e::/49 2001:da8:24e:8000::/49 2001:da8:24f::/48 2001:da8:250::/47 2001:da8:252::/48 2001:da8:253::/49 2001:da8:253:8000::/49 2001:da8:254::/48 2001:da8:255::/49 2001:da8:255:8000::/49 2001:da8:256::/47 2001:da8:258::/49 2001:da8:258:8000::/49 2001:da8:259::/48 2001:da8:25a::/47 2001:da8:25c::/46 2001:da8:260::/43 2001:da8:280::/41 2001:da8:300::/40 2001:da8:400::/38 2001:da8:800::/37 2001:da8:1000::/47 2001:da8:1002::/48 2001:da8:1003::/49 2001:da8:1003:8000::/49 2001:da8:1004::/49 2001:da8:1004:8000::/49 2001:da8:1005::/49 2001:da8:1005:8000::/49 2001:da8:1006::/49 2001:da8:1006:8000::/49 2001:da8:1007::/49 2001:da8:1007:8000::/49 2001:da8:1008::/49 2001:da8:1008:8000::/49 2001:da8:1009::/48 2001:da8:100a::/49 2001:da8:100a:8000::/49 2001:da8:100b::/48 2001:da8:100c::/47 2001:da8:100e::/49 2001:da8:100e:8000::/49 2001:da8:100f::/48 2001:da8:1010::/48 2001:da8:1011::/49 2001:da8:1011:8000::/49 2001:da8:1012::/47 2001:da8:1014::/46 2001:da8:1018::/45 2001:da8:1020::/44 2001:da8:1030::/48 2001:da8:1031::/49 2001:da8:1031:8000::/49 2001:da8:1032::/49 2001:da8:1032:8000::/49 2001:da8:1033::/48 2001:da8:1034::/46 2001:da8:1038::/45 2001:da8:1040::/42 2001:da8:1080::/41 2001:da8:1100::/40 2001:da8:1200::/39 2001:da8:1400::/38 2001:da8:1800::/37 2001:da8:2000::/47 2001:da8:2002::/48 2001:da8:2003::/48 2001:da8:2004::/49 2001:da8:2004:8000::/49 2001:da8:2005::/49 2001:da8:2005:8000::/49 2001:da8:2006::/49 2001:da8:2006:8000::/49 2001:da8:2007::/48 2001:da8:2008::/47 2001:da8:200a::/48 2001:da8:200b::/48 2001:da8:200c::/47 2001:da8:200e::/49 2001:da8:200e:8000::/49 2001:da8:200f::/49 2001:da8:200f:8000::/49 2001:da8:2010::/49 2001:da8:2010:8000::/49 2001:da8:2011::/48 2001:da8:2012::/48 2001:da8:2013::/49 2001:da8:2013:8000::/49 2001:da8:2014::/47 2001:da8:2016::/48 2001:da8:2017::/49 2001:da8:2017:8000::/49 2001:da8:2018::/48 2001:da8:2019::/49 2001:da8:2019:8000::/49 2001:da8:201a::/47 2001:da8:201c::/48 2001:da8:201d::/49 2001:da8:201d:8000::/49 2001:da8:201e::/47 2001:da8:2020::/43 2001:da8:2040::/42 2001:da8:2080::/41 2001:da8:2100::/40 2001:da8:2200::/39 2001:da8:2400::/38 2001:da8:2800::/37 2001:da8:3000::/48 2001:da8:3001::/49 2001:da8:3001:8000::/49 2001:da8:3002::/47 2001:da8:3004::/49 2001:da8:3004:8000::/49 2001:da8:3005::/48 2001:da8:3006::/47 2001:da8:3008::/45 2001:da8:3010::/47 2001:da8:3012::/49 2001:da8:3012:8000::/49 2001:da8:3013::/48 2001:da8:3014::/46 2001:da8:3018::/45 2001:da8:3020::/43 2001:da8:3040::/42 2001:da8:3080::/41 2001:da8:3100::/40 2001:da8:3200::/39 2001:da8:3400::/38 2001:da8:3800::/37 2001:da8:4000::/48 2001:da8:4001::/48 2001:da8:4002::/49 2001:da8:4002:8000::/49 2001:da8:4003::/49 2001:da8:4003:8000::/49 2001:da8:4004::/46 2001:da8:4008::/47 2001:da8:400a::/48 2001:da8:400b::/49 2001:da8:400b:8000::/49 2001:da8:400c::/46 2001:da8:4010::/46 2001:da8:4014::/48 2001:da8:4015::/49 2001:da8:4015:8000::/49 2001:da8:4016::/47 2001:da8:4018::/48 2001:da8:4019::/49 2001:da8:4019:8000::/49 2001:da8:401a::/47 2001:da8:401c::/46 2001:da8:4020::/43 2001:da8:4040::/42 2001:da8:4080::/41 2001:da8:4100::/40 2001:da8:4200::/39 2001:da8:4400::/38 2001:da8:4800::/37 2001:da8:5000::/49 2001:da8:5000:8000::/49 2001:da8:5001::/48 2001:da8:5002::/47 2001:da8:5004::/46 2001:da8:5008::/46 2001:da8:500c::/48 2001:da8:500d::/49 2001:da8:500d:8000::/49 2001:da8:500e::/47 2001:da8:5010::/46 2001:da8:5014::/48 2001:da8:5015::/49 2001:da8:5015:8000::/49 2001:da8:5016::/47 2001:da8:5018::/49 2001:da8:5018:8000::/49 2001:da8:5019::/48 2001:da8:501a::/47 2001:da8:501c::/46 2001:da8:5020::/43 2001:da8:5040::/42 2001:da8:5080::/41 2001:da8:5100::/40 2001:da8:5200::/39 2001:da8:5400::/38 2001:da8:5800::/37 2001:da8:6000::/49 2001:da8:6000:8000::/49 2001:da8:6001::/48 2001:da8:6002::/48 2001:da8:6003::/49 2001:da8:6003:8000::/49 2001:da8:6004::/49 2001:da8:6004:8000::/49 2001:da8:6005::/50 2001:da8:6005:4000::/52 2001:da8:6005:5000::/53 2001:da8:6005:5800::/55 2001:da8:6005:5a00::/56 2001:da8:6005:5b00::/56 2001:da8:6005:5c00::/54 2001:da8:6005:6000::/51 2001:da8:6005:8000::/49 2001:da8:6006::/47 2001:da8:6008::/46 2001:da8:600c::/47 2001:da8:600e::/49 2001:da8:600e:8000::/49 2001:da8:600f::/48 2001:da8:6010::/44 2001:da8:6020::/43 2001:da8:6040::/42 2001:da8:6080::/41 2001:da8:6100::/40 2001:da8:6200::/39 2001:da8:6400::/38 2001:da8:6800::/37 2001:da8:7000::/48 2001:da8:7001::/49 2001:da8:7001:8000::/49 2001:da8:7002::/48 2001:da8:7003::/49 2001:da8:7003:8000::/49 2001:da8:7004::/47 2001:da8:7006::/48 2001:da8:7007::/49 2001:da8:7007:8000::/49 2001:da8:7008::/45 2001:da8:7010::/47 2001:da8:7012::/49 2001:da8:7012:8000::/49 2001:da8:7013::/49 2001:da8:7013:8000::/49 2001:da8:7014::/46 2001:da8:7018::/45 2001:da8:7020::/43 2001:da8:7040::/42 2001:da8:7080::/41 2001:da8:7100::/40 2001:da8:7200::/39 2001:da8:7400::/38 2001:da8:7800::/37 2001:da8:8000::/47 2001:da8:8002::/49 2001:da8:8002:8000::/49 2001:da8:8003::/48 2001:da8:8004::/48 2001:da8:8005::/48 2001:da8:8006::/48 2001:da8:8007::/49 2001:da8:8007:8000::/49 2001:da8:8008::/49 2001:da8:8008:8000::/49 2001:da8:8009::/48 2001:da8:800a::/49 2001:da8:800a:8000::/49 2001:da8:800b::/48 2001:da8:800c::/49 2001:da8:800c:8000::/49 2001:da8:800d::/49 2001:da8:800d:8000::/49 2001:da8:800e::/47 2001:da8:8010::/45 2001:da8:8018::/47 2001:da8:801a::/48 2001:da8:801b::/49 2001:da8:801b:8000::/49 2001:da8:801c::/46 2001:da8:8020::/43 2001:da8:8040::/42 2001:da8:8080::/41 2001:da8:8100::/40 2001:da8:8200::/39 2001:da8:8400::/38 2001:da8:8800::/37 2001:da8:9000::/49 2001:da8:9000:8000::/49 2001:da8:9001::/49 2001:da8:9001:8000::/49 2001:da8:9002::/49 2001:da8:9002:8000::/49 2001:da8:9003::/48 2001:da8:9004::/47 2001:da8:9006::/49 2001:da8:9006:8000::/51 2001:da8:9006:a000::/52 2001:da8:9006:b000::/54 2001:da8:9006:b400::/54 2001:da8:9006:b800::/53 2001:da8:9006:c000::/50 2001:da8:9007::/49 2001:da8:9007:8000::/49 2001:da8:9008::/45 2001:da8:9010::/44 2001:da8:9020::/43 2001:da8:9040::/42 2001:da8:9080::/41 2001:da8:9100::/40 2001:da8:9200::/39 2001:da8:9400::/38 2001:da8:9800::/37 2001:da8:a000::/49 2001:da8:a000:8000::/49 2001:da8:a001::/48 2001:da8:a002::/49 2001:da8:a002:8000::/49 2001:da8:a003::/48 2001:da8:a004::/46 2001:da8:a008::/48 2001:da8:a009::/49 2001:da8:a009:8000::/49 2001:da8:a00a::/47 2001:da8:a00c::/46 2001:da8:a010::/44 2001:da8:a020::/43 2001:da8:a040::/42 2001:da8:a080::/41 2001:da8:a100::/40 2001:da8:a200::/39 2001:da8:a400::/38 2001:da8:a800::/48 2001:da8:a801::/49 2001:da8:a801:8000::/49 2001:da8:a802::/47 2001:da8:a804::/46 2001:da8:a808::/47 2001:da8:a80a::/49 2001:da8:a80a:8000::/49 2001:da8:a80b::/48 2001:da8:a80c::/46 2001:da8:a810::/44 2001:da8:a820::/43 2001:da8:a840::/42 2001:da8:a880::/41 2001:da8:a900::/40 2001:da8:aa00::/39 2001:da8:ac00::/38 2001:da8:b000::/49 2001:da8:b000:8000::/49 2001:da8:b001::/48 2001:da8:b002::/48 2001:da8:b003::/49 2001:da8:b003:8000::/49 2001:da8:b004::/49 2001:da8:b004:8000::/49 2001:da8:b005::/49 2001:da8:b005:8000::/49 2001:da8:b006::/49 2001:da8:b006:8000::/49 2001:da8:b007::/48 2001:da8:b008::/46 2001:da8:b00c::/48 2001:da8:b00d::/49 2001:da8:b00d:8000::/49 2001:da8:b00e::/47 2001:da8:b010::/44 2001:da8:b020::/43 2001:da8:b040::/42 2001:da8:b080::/41 2001:da8:b100::/40 2001:da8:b200::/39 2001:da8:b400::/38 2001:da8:b800::/49 2001:da8:b800:8000::/49 2001:da8:b801::/48 2001:da8:b802::/48 2001:da8:b803::/49 2001:da8:b803:8000::/49 2001:da8:b804::/47 2001:da8:b806::/48 2001:da8:b807::/48 2001:da8:b808::/45 2001:da8:b810::/44 2001:da8:b820::/43 2001:da8:b840::/42 2001:da8:b880::/41 2001:da8:b900::/40 2001:da8:ba00::/39 2001:da8:bc00::/38 2001:da8:c000::/49 2001:da8:c000:8000::/49 2001:da8:c001::/48 2001:da8:c002::/48 2001:da8:c003::/49 2001:da8:c003:8000::/49 2001:da8:c004::/46 2001:da8:c008::/45 2001:da8:c010::/44 2001:da8:c020::/43 2001:da8:c040::/42 2001:da8:c080::/41 2001:da8:c100::/40 2001:da8:c200::/39 2001:da8:c400::/38 2001:da8:c800::/49 2001:da8:c800:8000::/49 2001:da8:c801::/48 2001:da8:c802::/48 2001:da8:c803::/49 2001:da8:c803:8000::/49 2001:da8:c804::/49 2001:da8:c804:8000::/49 2001:da8:c805::/48 2001:da8:c806::/47 2001:da8:c808::/45 2001:da8:c810::/44 2001:da8:c820::/43 2001:da8:c840::/42 2001:da8:c880::/41 2001:da8:c900::/40 2001:da8:ca00::/39 2001:da8:cc00::/38 2001:da8:d000::/48 2001:da8:d001::/49 2001:da8:d001:8000::/49 2001:da8:d002::/47 2001:da8:d004::/46 2001:da8:d008::/45 2001:da8:d010::/44 2001:da8:d020::/43 2001:da8:d040::/42 2001:da8:d080::/41 2001:da8:d100::/40 2001:da8:d200::/39 2001:da8:d400::/38 2001:da8:d800::/49 2001:da8:d800:8000::/49 2001:da8:d801::/48 2001:da8:d802::/47 2001:da8:d804::/48 2001:da8:d805::/48 2001:da8:d806::/48 2001:da8:d807::/49 2001:da8:d807:8000::/49 2001:da8:d808::/45 2001:da8:d810::/44 2001:da8:d820::/43 2001:da8:d840::/42 2001:da8:d880::/41 2001:da8:d900::/40 2001:da8:da00::/39 2001:da8:dc00::/38 2001:da8:e000::/49 2001:da8:e000:8000::/49 2001:da8:e001::/48 2001:da8:e002::/47 2001:da8:e004::/46 2001:da8:e008::/45 2001:da8:e010::/44 2001:da8:e020::/43 2001:da8:e040::/42 2001:da8:e080::/41 2001:da8:e100::/40 2001:da8:e200::/39 2001:da8:e400::/38 2001:da8:e800::/48 2001:da8:e801::/48 2001:da8:e802::/48 2001:da8:e803::/49 2001:da8:e803:8000::/49 2001:da8:e804::/55 2001:da8:e804:200::/55 2001:da8:e804:400::/54 2001:da8:e804:800::/53 2001:da8:e804:1000::/52 2001:da8:e804:2000::/51 2001:da8:e804:4000::/50 2001:da8:e804:8000::/49 2001:da8:e805::/48 2001:da8:e806::/47 2001:da8:e808::/45 2001:da8:e810::/44 2001:da8:e820::/43 2001:da8:e840::/42 2001:da8:e880::/41 2001:da8:e900::/40 2001:da8:ea00::/39 2001:da8:ec00::/38 2001:da8:f000::/37 2001:da8:f800::/38 2001:da8:fc00::/39 2001:da8:fe00::/40 2001:da8:ff00::/43 2001:da8:ff20::/44 2001:da8:ff30::/45 2001:da8:ff38::/47 2001:da8:ff3a::/49 2001:da8:ff3a:8000::/49 2001:da8:ff3b::/48 2001:da8:ff3c::/46 2001:da8:ff40::/42 2001:da8:ff80::/41 2001:da9::/32 2001:daa::/32 2001:dc7::/32 2001:dd8:1::/48 2001:dd8:5::/48 2001:dd8:1a::/48 2001:df0:27e::/48 2001:df0:2e9::/48 2001:df0:423::/48 2001:df3:800::/44 2001:df5:7800::/48 2001:df6:6800::/48 2001:e08::/32 2001:e18::/32 2001:e80::/32 2001:e88::/32 2001:f38::/32 2001:f88::/32 2001:4438::/32 2001:4510::/29 2001:b010:fc80::/49 2400:1380::/32 2400:3200::/32 2400:3280::/32 2400:3600::/32 2400:3a00::/32 2400:3e00::/32 2400:4600::/32 2400:4e00::/32 2400:5080::/32 2400:5280::/32 2400:5400::/32 2400:5580::/32 2400:5600::/32 2400:5a00::/32 2400:5c80::/32 2400:5e80::/32 2400:6000::/32 2400:6200::/32 2400:6600::/32 2400:6a00::/32 2400:6e00::/32 2400:6f80::/32 2400:7100::/32 2400:7200::/32 2400:7680::/32 2400:7f80::/32 2400:8080::/32 2400:8200::/32 2400:8580::/32 2400:8600::/32 2400:8780::/32 2400:8980::/32 2400:8e00::/32 2400:8f00::/32 2400:9580::/32 2400:9600::/32 2400:9a00::/32 2400:9e00::/32 2400:a380::/32 2400:a480::/33 2400:a480:8000::/35 2400:a480:a000::/37 2400:a480:a800::/39 2400:a480:aa00::/41 2400:a480:aa80::/43 2400:a480:aaa0::/45 2400:a480:aaa8::/47 2400:a480:aaaa::/49 2400:a480:aaaa:8000::/49 2400:a480:aaab::/48 2400:a480:aaac::/46 2400:a480:aab0::/44 2400:a480:aac0::/42 2400:a480:ab00::/40 2400:a480:ac00::/38 2400:a480:b000::/36 2400:a480:c000::/34 2400:a780::/32 2400:a900::/32 2400:a980::/32 2400:ae00::/32 2400:b200::/32 2400:b500::/32 2400:b600::/32 2400:b700::/32 2400:ba00::/32 2400:be00::/32 2400:bf00::/32 2400:c200::/32 2400:c380::/32 2400:cb80::/32 2400:cc80::/32 2400:ce00::/32 2400:cf80::/32 2400:d100::/32 2400:d200::/32 2400:d300::/32 2400:d380::/32 2400:d600::/32 2400:d780::/32 2400:da00::/32 2400:dd00::/32 2400:dd01::/36 2400:dd01:1000::/48 2400:dd01:1001::/49 2400:dd01:1001:8000::/49 2400:dd01:1002::/49 2400:dd01:1002:8000::/49 2400:dd01:1003::/48 2400:dd01:1004::/46 2400:dd01:1008::/48 2400:dd01:1009::/49 2400:dd01:1009:8000::/49 2400:dd01:100a::/47 2400:dd01:100c::/47 2400:dd01:100e::/49 2400:dd01:100e:8000::/49 2400:dd01:100f::/48 2400:dd01:1010::/44 2400:dd01:1020::/49 2400:dd01:1020:8000::/49 2400:dd01:1021::/48 2400:dd01:1022::/47 2400:dd01:1024::/46 2400:dd01:1028::/45 2400:dd01:1030::/44 2400:dd01:1040::/42 2400:dd01:1080::/41 2400:dd01:1100::/40 2400:dd01:1200::/39 2400:dd01:1400::/38 2400:dd01:1800::/37 2400:dd01:2000::/49 2400:dd01:2000:8000::/49 2400:dd01:2001::/48 2400:dd01:2002::/47 2400:dd01:2004::/46 2400:dd01:2008::/47 2400:dd01:200a::/49 2400:dd01:200a:8000::/49 2400:dd01:200b::/48 2400:dd01:200c::/49 2400:dd01:200c:8000::/49 2400:dd01:200d::/48 2400:dd01:200e::/47 2400:dd01:2010::/44 2400:dd01:2020::/43 2400:dd01:2040::/42 2400:dd01:2080::/41 2400:dd01:2100::/40 2400:dd01:2200::/39 2400:dd01:2400::/38 2400:dd01:2800::/37 2400:dd01:3000::/49 2400:dd01:3000:8000::/49 2400:dd01:3001::/48 2400:dd01:3002::/47 2400:dd01:3004::/46 2400:dd01:3008::/45 2400:dd01:3010::/44 2400:dd01:3020::/43 2400:dd01:3040::/42 2400:dd01:3080::/41 2400:dd01:3100::/40 2400:dd01:3200::/39 2400:dd01:3400::/38 2400:dd01:3800::/37 2400:dd01:4000::/34 2400:dd01:8000::/33 2400:dd02::/31 2400:dd04::/36 2400:dd04:1000::/47 2400:dd04:1002::/48 2400:dd04:1003::/49 2400:dd04:1003:8000::/49 2400:dd04:1004::/49 2400:dd04:1004:8000::/49 2400:dd04:1005::/49 2400:dd04:1005:8000::/49 2400:dd04:1006::/47 2400:dd04:1008::/45 2400:dd04:1010::/44 2400:dd04:1020::/43 2400:dd04:1040::/42 2400:dd04:1080::/41 2400:dd04:1100::/40 2400:dd04:1200::/39 2400:dd04:1400::/38 2400:dd04:1800::/37 2400:dd04:2000::/35 2400:dd04:4000::/34 2400:dd04:8000::/33 2400:dd05::/32 2400:dd06::/32 2400:dd07::/36 2400:dd07:1000::/47 2400:dd07:1002::/48 2400:dd07:1003::/49 2400:dd07:1003:8000::/49 2400:dd07:1004::/46 2400:dd07:1008::/45 2400:dd07:1010::/44 2400:dd07:1020::/43 2400:dd07:1040::/42 2400:dd07:1080::/41 2400:dd07:1100::/40 2400:dd07:1200::/39 2400:dd07:1400::/38 2400:dd07:1800::/37 2400:dd07:2000::/35 2400:dd07:4000::/34 2400:dd07:8000::/33 2400:dd08::/32 2400:dd09::/36 2400:dd09:1000::/47 2400:dd09:1002::/49 2400:dd09:1002:8000::/49 2400:dd09:1003::/48 2400:dd09:1004::/46 2400:dd09:1008::/45 2400:dd09:1010::/44 2400:dd09:1020::/43 2400:dd09:1040::/42 2400:dd09:1080::/41 2400:dd09:1100::/40 2400:dd09:1200::/39 2400:dd09:1400::/38 2400:dd09:1800::/37 2400:dd09:2000::/35 2400:dd09:4000::/34 2400:dd09:8000::/33 2400:dd0a::/31 2400:dd0c::/32 2400:dd0d::/36 2400:dd0d:1000::/48 2400:dd0d:1001::/49 2400:dd0d:1001:8000::/49 2400:dd0d:1002::/47 2400:dd0d:1004::/46 2400:dd0d:1008::/45 2400:dd0d:1010::/44 2400:dd0d:1020::/43 2400:dd0d:1040::/42 2400:dd0d:1080::/41 2400:dd0d:1100::/40 2400:dd0d:1200::/39 2400:dd0d:1400::/38 2400:dd0d:1800::/37 2400:dd0d:2000::/35 2400:dd0d:4000::/34 2400:dd0d:8000::/33 2400:dd0e::/31 2400:de00::/32 2400:de80::/32 2400:e680::/32 2400:e880::/32 2400:ee00::/32 2400:f480::/32 2400:f980::/32 2400:fe00::/32 2401:80::/32 2401:780::/32 2401:800::/32 2401:a00::/32 2401:e00::/32 2401:1000::/32 2401:1200::/32 2401:1e00::/32 2401:2080::/32 2401:2600::/32 2401:2780::/32 2401:2980::/32 2401:2a00::/32 2401:2e00::/32 2401:3100::/32 2401:3380::/32 2401:3480::/32 2401:3780::/32 2401:3800::/32 2401:3880::/32 2401:3980::/32 2401:3a00::/32 2401:3a80::/32 2401:3b80::/32 2401:3c80::/32 2401:3d80::/32 2401:3e80::/32 2401:3f80::/32 2401:4080::/32 2401:4180::/32 2401:4280::/32 2401:4380::/32 2401:4480::/32 2401:4580::/32 2401:4680::/32 2401:4780::/32 2401:4880::/32 2401:4a80::/32 2401:4b00::/32 2401:4f80::/32 2401:5180::/32 2401:5680::/32 2401:5880::/32 2401:5c80::/32 2401:7180::/32 2401:7580::/32 2401:7680::/32 2401:7700::/32 2401:7780::/32 2401:7880::/32 2401:7980::/32 2401:7a00::/32 2401:7a80::/32 2401:7b80::/32 2401:7c80::/32 2401:7d80::/32 2401:7e00::/32 2401:7f80::/32 2401:8000::/49 2401:8200::/32 2401:8380::/32 2401:8600::/32 2401:8680::/32 2401:8d00::/47 2401:8d00:2::/48 2401:8d00:3::/49 2401:8d00:3:8000::/49 2401:8d00:4::/46 2401:8d00:8::/45 2401:8d00:10::/44 2401:8d00:20::/43 2401:8d00:40::/42 2401:8d00:80::/41 2401:8d00:100::/40 2401:8d00:200::/39 2401:8d00:400::/38 2401:8d00:800::/37 2401:8d00:1000::/36 2401:8d00:2000::/35 2401:8d00:4000::/34 2401:8d00:8000::/33 2401:9380::/32 2401:9600::/32 2401:9a00::/32 2401:9a80::/32 2401:9b80::/32 2401:9f80::/32 2401:a180::/32 2401:a980::/32 2401:aa00::/32 2401:b180::/32 2401:b400::/32 2401:b480::/32 2401:b580::/32 2401:b600::/32 2401:b680::/32 2401:ba00::/32 2401:bb80::/32 2401:be00::/32 2401:c200::/32 2401:c600::/32 2401:ca00::/32 2401:ca80::/32 2401:cb80::/32 2401:cc00::/32 2401:ce00::/32 2401:d180::/32 2401:d780::/32 2401:da00::/32 2401:de00::/48 2401:de00:1::/49 2401:de00:1:8000::/49 2401:de00:2::/47 2401:de00:4::/46 2401:de00:8::/45 2401:de00:10::/44 2401:de00:20::/43 2401:de00:40::/42 2401:de00:80::/41 2401:de00:100::/40 2401:de00:200::/39 2401:de00:400::/38 2401:de00:800::/37 2401:de00:1000::/36 2401:de00:2000::/35 2401:de00:4000::/34 2401:de00:8000::/33 2401:e080::/32 2401:ec00::/44 2401:ec00:10::/46 2401:ec00:14::/48 2401:ec00:15::/49 2401:ec00:15:8000::/49 2401:ec00:16::/48 2401:ec00:17::/49 2401:ec00:17:8000::/49 2401:ec00:18::/45 2401:ec00:20::/44 2401:ec00:30::/45 2401:ec00:38::/49 2401:ec00:38:8000::/49 2401:ec00:39::/48 2401:ec00:3a::/47 2401:ec00:3c::/46 2401:ec00:40::/42 2401:ec00:80::/44 2401:ec00:90::/46 2401:ec00:94::/47 2401:ec00:96::/48 2401:ec00:97::/49 2401:ec00:97:8000::/49 2401:ec00:98::/45 2401:ec00:a0::/43 2401:ec00:c0::/42 2401:ec00:100::/45 2401:ec00:108::/49 2401:ec00:108:8000::/49 2401:ec00:109::/48 2401:ec00:10a::/47 2401:ec00:10c::/46 2401:ec00:110::/44 2401:ec00:120::/43 2401:ec00:140::/43 2401:ec00:160::/48 2401:ec00:161::/49 2401:ec00:161:8000::/49 2401:ec00:162::/47 2401:ec00:164::/46 2401:ec00:168::/45 2401:ec00:170::/44 2401:ec00:180::/41 2401:ec00:200::/39 2401:ec00:400::/38 2401:ec00:800::/37 2401:ec00:1000::/44 2401:ec00:1010::/47 2401:ec00:1012::/49 2401:ec00:1012:8000::/49 2401:ec00:1013::/48 2401:ec00:1014::/46 2401:ec00:1018::/45 2401:ec00:1020::/49 2401:ec00:1020:8000::/49 2401:ec00:1021::/48 2401:ec00:1022::/47 2401:ec00:1024::/46 2401:ec00:1028::/45 2401:ec00:1030::/49 2401:ec00:1030:8000::/49 2401:ec00:1031::/48 2401:ec00:1032::/47 2401:ec00:1034::/46 2401:ec00:1038::/45 2401:ec00:1040::/49 2401:ec00:1040:8000::/49 2401:ec00:1041::/48 2401:ec00:1042::/47 2401:ec00:1044::/46 2401:ec00:1048::/45 2401:ec00:1050::/44 2401:ec00:1060::/43 2401:ec00:1080::/41 2401:ec00:1100::/40 2401:ec00:1200::/39 2401:ec00:1400::/38 2401:ec00:1800::/37 2401:ec00:2000::/36 2401:ec00:3000::/47 2401:ec00:3002::/48 2401:ec00:3003::/49 2401:ec00:3003:8000::/49 2401:ec00:3004::/49 2401:ec00:3004:8000::/49 2401:ec00:3005::/48 2401:ec00:3006::/47 2401:ec00:3008::/45 2401:ec00:3010::/44 2401:ec00:3020::/43 2401:ec00:3040::/42 2401:ec00:3080::/41 2401:ec00:3100::/40 2401:ec00:3200::/39 2401:ec00:3400::/38 2401:ec00:3800::/37 2401:ec00:4000::/34 2401:ec00:8000::/33 2401:f300::/32 2401:fa00:40::/49 2401:fa00:41::/49 2401:fa00:42::/49 2401:fa80::/32 2401:fb80::/32 2401:fc80::/32 2401:fe80::/32 2402:880::/32 2402:e00::/32 2402:1000::/32 2402:1600::/32 2402:1f80::/32 2402:2000::/32 2402:2280::/32 2402:2780::/32 2402:2a00::/32 2402:2b80::/32 2402:2d00::/32 2402:2d80::/32 2402:2e80::/32 2402:3080::/32 2402:3180::/32 2402:3c00::/32 2402:3e00::/32 2402:3f80::/32 2402:4500::/32 2402:4a00::/32 2402:4a80::/32 2402:4b80::/32 2402:4d80::/32 2402:4e00::/32 2402:4f80::/32 2402:5180::/32 2402:5880::/32 2402:5b80::/32 2402:5d00::/32 2402:5e00::/32 2402:6280::/32 2402:6a00::/32 2402:6e00::/32 2402:7d00::/32 2402:8300::/32 2402:8800::/32 2402:8900::/32 2402:a200::/32 2402:ae00::/32 2402:b200::/32 2402:cf00::/32 2402:d300::/32 2402:f000::/48 2402:f000:1::/48 2402:f000:2::/47 2402:f000:4::/48 2402:f000:5::/48 2402:f000:6::/48 2402:f000:7::/48 2402:f000:8::/48 2402:f000:9::/49 2402:f000:9:8000::/49 2402:f000:a::/47 2402:f000:c::/46 2402:f000:10::/44 2402:f000:20::/43 2402:f000:40::/42 2402:f000:80::/41 2402:f000:100::/40 2402:f000:200::/39 2402:f000:400::/38 2402:f000:800::/37 2402:f000:1000::/36 2402:f000:2000::/35 2402:f000:4000::/34 2402:f000:8000::/34 2402:f000:c000::/35 2402:f000:e000::/36 2402:f000:f000::/37 2402:f000:f800::/38 2402:f000:fc00::/39 2402:f000:fe00::/40 2402:f000:ff00::/41 2402:f000:ff80::/42 2402:f000:ffc0::/43 2402:f000:ffe0::/44 2402:f000:fff0::/45 2402:f000:fff8::/46 2402:f000:fffc::/47 2402:f000:fffe::/48 2402:f000:ffff::/49 2402:f000:ffff:8000::/49 2403:600::/32 2403:700::/32 2403:800::/31 2403:f00::/32 2403:2a00::/32 2403:4300::/32 2403:6a00::/32 2403:7700::/32 2403:7b00::/32 2403:8900::/32 2403:8b00::/32 2403:8c00::/32 2403:8d00::/32 2403:9b00::/32 2403:9d00::/32 2403:a100::/32 2403:a200::/32 2403:a300::/32 2403:ac00::/48 2403:ac00:1::/48 2403:ac00:2::/49 2403:ac00:2:8000::/49 2403:ac00:3::/48 2403:ac00:4::/46 2403:ac00:8::/45 2403:ac00:10::/44 2403:ac00:20::/43 2403:ac00:40::/42 2403:ac00:80::/41 2403:ac00:100::/40 2403:ac00:200::/39 2403:ac00:400::/38 2403:ac00:800::/37 2403:ac00:1000::/36 2403:ac00:2000::/35 2403:ac00:4000::/34 2403:ac00:8000::/33 2403:b400::/32 2403:c100::/32 2403:d400::/36 2403:d400:1000::/49 2403:d400:1000:8000::/49 2403:d400:1001::/48 2403:d400:1002::/47 2403:d400:1004::/46 2403:d400:1008::/45 2403:d400:1010::/44 2403:d400:1020::/43 2403:d400:1040::/42 2403:d400:1080::/41 2403:d400:1100::/40 2403:d400:1200::/39 2403:d400:1400::/38 2403:d400:1800::/37 2403:d400:2000::/35 2403:d400:4000::/34 2403:d400:8000::/33 2403:db00::/32 2403:e300::/32 2403:e500::/32 2403:e700::/32 2403:ed00::/32 2403:f100::/32 2403:f300::/32 2403:f800::/32 2403:f900::/32 2403:fb00::/32 2404:100::/32 2404:158::/32 2404:f00::/32 2404:3300::/32 2404:3700::/32 2404:3b00::/32 2404:4d00::/32 2404:5b00::/32 2404:5d00::/32 2404:6000::/32 2404:6100::/32 2404:6500::/32 2404:6700::/32 2404:7100::/32 2404:7600::/32 2404:7d00::/32 2404:8700::/32 2404:8b00::/32 2404:a000::/32 2404:b100::/32 2404:b900::/32 2404:c300::/32 2404:cd00::/32 2404:df00::/32 2405:3b00::/32 2405:5b00::/32 2405:6200::/32 2405:6f00::/32 2405:9300::/32 2405:9700::/32 2405:9900::/32 2405:9b00::/32 2405:9e00::/32 2405:a500::/32 2405:a900::/32 2405:ab00::/32 2405:ad00::/32 2405:af00::/32 2405:b100::/32 2405:b300::/32 2405:bb00::/32 2405:bd00::/32 2405:bf00::/32 2405:c500::/32 2405:d700::/32 2405:d900::/32 2405:e000::/32 2405:e600::/32 2406:1100::/32 2406:2700::/32 2406:3300::/32 2406:3700::/32 2406:4500::/32 2406:4d00::/32 2406:4f00::/32 2406:6100::/32 2406:6300::/32 2406:6500::/32 2406:7d00::/32 2406:8500::/32 2406:9200::/32 2406:c900::/32 2406:cf00::/32 2406:dc00::/32 2406:dd00::/32 2406:e500::/32 2406:f300::/32 2406:ff00::/32 2407:1900::/32 2407:1d00::/32 2407:3700::/32 2407:3900::/32 2407:4f00::/32 2407:5500::/32 2407:7d00::/32 2407:9f00::/32 2407:ba00::/32 2407:bc00::/32 2407:c400::/32 2407:c900::/32 2407:cf00::/32 2407:e800::/32 2408:8000::/27 2408:8020::/29 2408:8028::/31 2408:802a::/33 2408:802a:8000::/38 2408:802a:8400::/39 2408:802a:8600::/40 2408:802a:8700::/48 2408:802a:8701::/49 2408:802a:8701:8000::/49 2408:802a:8702::/49 2408:802a:8702:8000::/49 2408:802a:8703::/49 2408:802a:8703:8000::/49 2408:802a:8704::/47 2408:802a:8706::/49 2408:802a:8706:8000::/49 2408:802a:8707::/48 2408:802a:8708::/48 2408:802a:8709::/49 2408:802a:8709:8000::/49 2408:802a:870a::/48 2408:802a:870b::/49 2408:802a:870b:8000::/49 2408:802a:870c::/46 2408:802a:8710::/44 2408:802a:8720::/43 2408:802a:8740::/42 2408:802a:8780::/41 2408:802a:8800::/37 2408:802a:9000::/38 2408:802a:9400::/39 2408:802a:9600::/40 2408:802a:9700::/47 2408:802a:9702::/49 2408:802a:9702:8000::/49 2408:802a:9703::/48 2408:802a:9704::/48 2408:802a:9705::/49 2408:802a:9705:8000::/49 2408:802a:9706::/47 2408:802a:9708::/45 2408:802a:9710::/44 2408:802a:9720::/43 2408:802a:9740::/42 2408:802a:9780::/41 2408:802a:9800::/38 2408:802a:9c00::/39 2408:802a:9e00::/40 2408:802a:9f00::/46 2408:802a:9f04::/47 2408:802a:9f06::/49 2408:802a:9f06:8000::/49 2408:802a:9f07::/48 2408:802a:9f08::/45 2408:802a:9f10::/44 2408:802a:9f20::/43 2408:802a:9f40::/42 2408:802a:9f80::/41 2408:802a:a000::/35 2408:802a:c000::/34 2408:802b::/32 2408:802c::/30 2408:8030::/31 2408:8032::/32 2408:8033::/33 2408:8033:8000::/46 2408:8033:8004::/49 2408:8033:8004:8000::/49 2408:8033:8005::/48 2408:8033:8006::/48 2408:8033:8007::/49 2408:8033:8007:8000::/49 2408:8033:8008::/46 2408:8033:800c::/47 2408:8033:800e::/48 2408:8033:800f::/49 2408:8033:800f:8000::/49 2408:8033:8010::/45 2408:8033:8018::/49 2408:8033:8018:8000::/49 2408:8033:8019::/48 2408:8033:801a::/47 2408:8033:801c::/46 2408:8033:8020::/43 2408:8033:8040::/46 2408:8033:8044::/48 2408:8033:8045::/49 2408:8033:8045:8000::/49 2408:8033:8046::/48 2408:8033:8047::/49 2408:8033:8047:8000::/49 2408:8033:8048::/47 2408:8033:804a::/48 2408:8033:804b::/49 2408:8033:804b:8000::/49 2408:8033:804c::/47 2408:8033:804e::/48 2408:8033:804f::/48 2408:8033:8050::/49 2408:8033:8050:8000::/49 2408:8033:8051::/49 2408:8033:8051:8000::/49 2408:8033:8052::/49 2408:8033:8052:8000::/49 2408:8033:8053::/48 2408:8033:8054::/48 2408:8033:8055::/48 2408:8033:8056::/47 2408:8033:8058::/45 2408:8033:8060::/43 2408:8033:8080::/41 2408:8033:8100::/40 2408:8033:8200::/39 2408:8033:8400::/38 2408:8033:8800::/37 2408:8033:9000::/36 2408:8033:a000::/35 2408:8033:c000::/34 2408:8034::/30 2408:8038::/29 2408:8040::/28 2408:8050::/30 2408:8054::/31 2408:8056::/48 2408:8056:1::/49 2408:8056:1:8000::/49 2408:8056:2::/47 2408:8056:4::/46 2408:8056:8::/45 2408:8056:10::/44 2408:8056:20::/44 2408:8056:30::/49 2408:8056:30:8000::/49 2408:8056:31::/48 2408:8056:32::/47 2408:8056:34::/46 2408:8056:38::/45 2408:8056:40::/42 2408:8056:80::/41 2408:8056:100::/40 2408:8056:200::/39 2408:8056:400::/38 2408:8056:800::/37 2408:8056:1000::/36 2408:8056:2000::/35 2408:8056:4000::/34 2408:8056:8000::/33 2408:8057::/32 2408:8058::/29 2408:8060::/27 2408:8080::/25 2408:8100::/24 2408:8200::/23 2408:8400::/22 2408:8800::/21 2409:8000::/20 240a:8000::/21 240b:8000::/21 240c::/31 240c:2::/32 240c:3::/40 240c:3:100::/45 240c:3:108::/48 240c:3:109::/48 240c:3:10a::/47 240c:3:10c::/46 240c:3:110::/44 240c:3:120::/43 240c:3:140::/42 240c:3:180::/41 240c:3:200::/39 240c:3:400::/38 240c:3:800::/37 240c:3:1000::/36 240c:3:2000::/35 240c:3:4000::/34 240c:3:8000::/33 240c:4::/30 240c:8::/29 240c:8000::/21 240d:8000::/24 240e::/25 240e:80::/27 240e:a0::/30 240e:a4::/34 240e:a4:4000::/35 240e:a4:6000::/47 240e:a4:6002::/48 240e:a4:6003::/49 240e:a4:6003:8000::/49 240e:a4:6004::/46 240e:a4:6008::/45 240e:a4:6010::/44 240e:a4:6020::/43 240e:a4:6040::/42 240e:a4:6080::/41 240e:a4:6100::/40 240e:a4:6200::/39 240e:a4:6400::/38 240e:a4:6800::/37 240e:a4:7000::/36 240e:a4:8000::/33 240e:a5::/32 240e:a6::/31 240e:a8::/29 240e:b0::/29 240e:b8::/30 240e:bc::/33 240e:bc:8000::/34 240e:bc:c000::/45 240e:bc:c008::/46 240e:bc:c00c::/48 240e:bc:c00d::/49 240e:bc:c00d:8000::/49 240e:bc:c00e::/47 240e:bc:c010::/44 240e:bc:c020::/43 240e:bc:c040::/42 240e:bc:c080::/41 240e:bc:c100::/40 240e:bc:c200::/39 240e:bc:c400::/38 240e:bc:c800::/37 240e:bc:d000::/36 240e:bc:e000::/35 240e:bd::/32 240e:be::/31 240e:c0::/27 240e:e0::/29 240e:e8::/30 240e:ec::/39 240e:ec:200::/44 240e:ec:210::/48 240e:ec:211::/49 240e:ec:211:8000::/49 240e:ec:212::/47 240e:ec:214::/46 240e:ec:218::/45 240e:ec:220::/43 240e:ec:240::/42 240e:ec:280::/41 240e:ec:300::/40 240e:ec:400::/38 240e:ec:800::/37 240e:ec:1000::/36 240e:ec:2000::/35 240e:ec:4000::/35 240e:ec:6000::/38 240e:ec:6400::/40 240e:ec:6500::/41 240e:ec:6580::/42 240e:ec:65c0::/43 240e:ec:65e0::/48 240e:ec:65e1::/49 240e:ec:65e1:8000::/49 240e:ec:65e2::/47 240e:ec:65e4::/46 240e:ec:65e8::/45 240e:ec:65f0::/44 240e:ec:6600::/39 240e:ec:6800::/37 240e:ec:7000::/36 240e:ec:8000::/33 240e:ed::/32 240e:ee::/31 240e:f0::/29 240e:f8::/31 240e:fa::/48 240e:fa:1::/49 240e:fa:1:8000::/49 240e:fa:2::/47 240e:fa:4::/46 240e:fa:8::/45 240e:fa:10::/44 240e:fa:20::/43 240e:fa:40::/42 240e:fa:80::/41 240e:fa:100::/40 240e:fa:200::/39 240e:fa:400::/38 240e:fa:800::/37 240e:fa:1000::/36 240e:fa:2000::/35 240e:fa:4000::/34 240e:fa:8000::/33 240e:fb::/32 240e:fc::/30 240e:100::/24 240e:200::/23 240e:400::/22 240e:800::/21 240f:8000::/24 2620:0:dd0::/49 Colin
On 20 Jul 2015, at 19:18, Valdis.Kletnieks@vt.edu wrote:
On Mon, 20 Jul 2015 19:04:27 +0100, Colin Johnston said:
route block china range whole of and/or firewall block china range whole of
Do you have an authoritative list of *all* IP blocks that end up routed into China?
For bonus points, IPv6 blocks too. :)
On Mon, 20 Jul 2015 19:42:39 +0100, Colin Johnston said:
see below for china ranges I believe, ipv4 and ipv6
You may believe... but are you *sure*? (Over the years, we've seen *lots* of "block China" lists that accidentally block chunks allocated to Taiwan or Australia or other Pacific Rim destinations). And remember - asking the NIC doesn't help, because there are almost certainly blocks allocated that the registration points to Korea or someplace, but the provider routes a sub-block to China. And let's not even get started on blocks allocated by ARIN or RIPE.... (Yes, it *was* a trick question :)
in war you take information at face value and use it if needed to mitigate risk, if there is legit traffic in blocked ranges then excemption procedure in place to unblock. colin Sent from my iPhone
On 20 Jul 2015, at 19:57, Valdis.Kletnieks@vt.edu wrote:
On Mon, 20 Jul 2015 19:42:39 +0100, Colin Johnston said:
see below for china ranges I believe, ipv4 and ipv6
You may believe... but are you *sure*? (Over the years, we've seen *lots* of "block China" lists that accidentally block chunks allocated to Taiwan or Australia or other Pacific Rim destinations).
And remember - asking the NIC doesn't help, because there are almost certainly blocks allocated that the registration points to Korea or someplace, but the provider routes a sub-block to China. And let's not even get started on blocks allocated by ARIN or RIPE....
(Yes, it *was* a trick question :)
On Mon, 20 Jul 2015 20:18:46 +0100, Colin Johnston said:
in war you take information at face value and use it if needed to mitigate risk, if there is legit traffic in blocked ranges then excemption procedure in place to unblock.
So how does Joe Aussie-Sixpack notify you that you goofed, when you've blocked his IP range?
On 20 Jul 2015, at 21:04, Valdis.Kletnieks@vt.edu wrote:
On Mon, 20 Jul 2015 20:18:46 +0100, Colin Johnston said:
in war you take information at face value and use it if needed to mitigate risk, if there is legit traffic in blocked ranges then excemption procedure in place to unblock.
So how does Joe Aussie-Sixpack notify you that you goofed, when you've blocked his IP range?
source user to use phone contact and or postal service to establish contact instead to build trust and then enable internet unblock depending on outcome. Sad fact it has come to this since engagement with China folks goes no where, always open to dialogue though to engage on this further. Colin
On Mon, 20 Jul 2015 21:12:33 +0100, Colin Johnston said:
source user to use phone contact and or postal service to establish contact
And your phone and postal addresses are listed *where* that Joe Aussie-Sixpack is likely to be able to find? (Hint 1: If it's on your website, they can't find it.) (Hint 2: Mortal users have never heard of WHOIS or similar services) And what are the chances that after 3-4 days of unreachable, the user will simply conclude you've gone out of business and you've lost a customer/reader to a competitor?
blocking to mitigate risk is a better trade off gaining better percentage legit traffic against a indventant minor valid good network range. Sent from my iPhone
On 20 Jul 2015, at 21:20, Valdis.Kletnieks@vt.edu wrote:
On Mon, 20 Jul 2015 21:12:33 +0100, Colin Johnston said:
source user to use phone contact and or postal service to establish contact
And your phone and postal addresses are listed *where* that Joe Aussie-Sixpack is likely to be able to find?
(Hint 1: If it's on your website, they can't find it.)
(Hint 2: Mortal users have never heard of WHOIS or similar services)
And what are the chances that after 3-4 days of unreachable, the user will simply conclude you've gone out of business and you've lost a customer/reader to a competitor?
On Mon, Jul 20, 2015 at 09:50:44PM +0100, Colin Johnston wrote:
blocking to mitigate risk is a better trade off gaining better percentage legit traffic against a indventant minor valid good network range.
That may be your call, or your management's call, but that doesn't make it *my* call or my management's call. Reasonable people can disagree about this. -- Mike Andrews, W5EGO mikea@mikea.ath.cx Tired old sysadmin
I'm reminded of the "the russians are hacking our water system" stories from a few years back, when it turned out the water system adminstrator was on vacation in russia. often traffic comes from unexpected locations. perhaps you should fail-closed with good business practices to open things up. perhaps you fail-open then mitigate risk by using a blocklist. my suggestion is that if you didn't live through the days of the bogon lists, which were later allocated to RIRs, a block list is likely not the right approach if you truly working on security posture. - Jared On Mon, Jul 20, 2015 at 09:50:44PM +0100, Colin Johnston wrote:
blocking to mitigate risk is a better trade off gaining better percentage legit traffic against a indventant minor valid good network range.
Sent from my iPhone
On 20 Jul 2015, at 21:20, Valdis.Kletnieks@vt.edu wrote:
On Mon, 20 Jul 2015 21:12:33 +0100, Colin Johnston said:
source user to use phone contact and or postal service to establish contact
And your phone and postal addresses are listed *where* that Joe Aussie-Sixpack is likely to be able to find?
(Hint 1: If it's on your website, they can't find it.)
(Hint 2: Mortal users have never heard of WHOIS or similar services)
And what are the chances that after 3-4 days of unreachable, the user will simply conclude you've gone out of business and you've lost a customer/reader to a competitor?
-- Jared Mauch | pgp key available via finger from jared@puck.nether.net clue++; | http://puck.nether.net/~jared/ My statements are only mine.
Hello, folks! Could anybody tun my toolkit https://github.com/FastVPSEestiOu/fastnetmon with collect_attack_pcap_dumps = on option agains this attack type? With pcap dump we could do detailed analyze and share all details with Community. On Tue, Jul 21, 2015 at 2:16 PM, Jared Mauch <jared@puck.nether.net> wrote:
I'm reminded of the "the russians are hacking our water system" stories from a few years back, when it turned out the water system adminstrator was on vacation in russia.
often traffic comes from unexpected locations. perhaps you should fail-closed with good business practices to open things up. perhaps you fail-open then mitigate risk by using a blocklist.
my suggestion is that if you didn't live through the days of the bogon lists, which were later allocated to RIRs, a block list is likely not the right approach if you truly working on security posture.
- Jared
On Mon, Jul 20, 2015 at 09:50:44PM +0100, Colin Johnston wrote:
blocking to mitigate risk is a better trade off gaining better percentage legit traffic against a indventant minor valid good network range.
Sent from my iPhone
On 20 Jul 2015, at 21:20, Valdis.Kletnieks@vt.edu wrote:
On Mon, 20 Jul 2015 21:12:33 +0100, Colin Johnston said:
source user to use phone contact and or postal service to establish contact
And your phone and postal addresses are listed *where* that Joe Aussie-Sixpack is likely to be able to find?
(Hint 1: If it's on your website, they can't find it.)
(Hint 2: Mortal users have never heard of WHOIS or similar services)
And what are the chances that after 3-4 days of unreachable, the user will simply conclude you've gone out of business and you've lost a customer/reader to a competitor?
-- Jared Mauch | pgp key available via finger from jared@puck.nether.net clue++; | http://puck.nether.net/~jared/ My statements are only mine.
-- Sincerely yours, Pavel Odintsov
On Mon, 20 Jul 2015, Colin Johnston wrote:
blocking to mitigate risk is a better trade off gaining better percentage legit traffic against a indventant minor valid good network range.
There are bound to be an awful lot of babies in that bathwater you're planning to throw out. You're certainly free to block whatever traffic you wish, but your customers might not appreciate a heavy-handed approach to stopping bad traffic at the gates. jms
On 07/22/2015 09:01 PM, Justin M. Streiner wrote:
You're certainly free to block whatever traffic you wish, but your customers might not appreciate a heavy-handed approach to stopping bad traffic at the gates.
As opposed to not being able to pass traffic at all? After all, isn't the goal of a distributed denial of service supposed to be to block people using the Internet? Show me a DDoS that just blocks rich people, for example.
How will the customer know the ISP is blocking the traffic? Does the FCC make ISPs disclose this information? Thank you, - Nich Warren On 07/22/2015 09:01 PM, Justin M. Streiner wrote:
You're certainly free to block whatever traffic you wish, but your customers might not appreciate a heavy-handed approach to stopping bad traffic at the gates.
On Thu, 23 Jul 2015, Nicholas Warren wrote:
How will the customer know the ISP is blocking the traffic? Does the FCC make ISPs disclose this information?
If a customer is legitimately trying to reach someone in one of the affected IP ranges and failing, at some point, they will either a) give up and try later, or b) contact their provider to try to find out what's going on. If it's something widespread enough that the ISP's support line is blowing up with calls, I'd hope they would either put some sort of announcement on their website/support site/support line. As with anything else in the ISP world, it's about striking an appropriate balance. If ISP X is getting hit with DDoS traffic hard enough to severely impact their business, that can warrant an emergency response, albeit likely a short-term/tactical response. If not, perhaps a more limited response is better. Again, each provider is free to run their network as they see fit. The balance point can also change if downstream ISPs are involved, since ISP X might be making the decision to block or not block traffic for the downstreams, with or without their consent. jms
On 07/22/2015 09:01 PM, Justin M. Streiner wrote:
You're certainly free to block whatever traffic you wish, but your customers might not appreciate a heavy-handed approach to stopping bad traffic at the gates.
On Thu, Jul 23, 2015 at 6:25 AM, Justin M. Streiner <streiner@cluebyfour.org
wrote:
On Thu, 23 Jul 2015, Nicholas Warren wrote:
How will the customer know the ISP is blocking the traffic? Does the FCC
make ISPs disclose this information?
If a customer is legitimately trying to reach someone in one of the affected IP ranges and failing, at some point, they will either a) give up and try later, or b) contact their provider to try to find out what's going on.
If it's something widespread enough that the ISP's support line is blowing up with calls, I'd hope they would either put some sort of announcement on their website/support site/support line.
As with anything else in the ISP world, it's about striking an appropriate balance. If ISP X is getting hit with DDoS traffic hard enough to severely impact their business, that can warrant an emergency response, albeit likely a short-term/tactical response. If not, perhaps a more limited response is better. Again, each provider is free to run their network as they see fit.
The balance point can also change if downstream ISPs are involved, since ISP X might be making the decision to block or not block traffic for the downstreams, with or without their consent.
jms
I agree with you about balance. The issue is that for many of us, UDP floods / DDoS, is daily business. It is not an emergency when you have a baseline for UDP and police it. Or, you can careen from emergency to emergency. CB
On 07/22/2015 09:01 PM, Justin M. Streiner wrote:
You're certainly free to block whatever traffic you wish, but your customers might not appreciate a heavy-handed approach to stopping bad traffic at the gates.
On Thu, 23 Jul 2015 09:25:33 -0400, "Justin M. Streiner" said:
If a customer is legitimately trying to reach someone in one of the affected IP ranges and failing, at some point, they will either a) give up and try later, or b) contact their provider to try to find out what's going on.
You missed (c) give up after a few days of retrying and figure the destination has folded and gone dark, and not bother trying anymore. It's particularly likely to happen if you haven't given *detailed* instructions to the people who answer your phones *and* a host they can test from *outside* your blocking. If your help desk responds with "It doesn't seem to be up for me either", outcome (c) is almost guaranteed...
Probably not that big of a deal. ----- Mike Hammett Intelligent Computing Solutions http://www.ics-il.com ----- Original Message ----- From: "Valdis Kletnieks" <Valdis.Kletnieks@vt.edu> To: "Colin Johnston" <colinj@gt86car.org.uk> Cc: nanog@nanog.org Sent: Monday, July 20, 2015 3:20:01 PM Subject: Re: 20-30Gbps UDP 1720 traffic appearing to originate from CN in last 24 hours On Mon, 20 Jul 2015 21:12:33 +0100, Colin Johnston said:
source user to use phone contact and or postal service to establish contact
And your phone and postal addresses are listed *where* that Joe Aussie-Sixpack is likely to be able to find? (Hint 1: If it's on your website, they can't find it.) (Hint 2: Mortal users have never heard of WHOIS or similar services) And what are the chances that after 3-4 days of unreachable, the user will simply conclude you've gone out of business and you've lost a customer/reader to a competitor?
On Mon, Jul 20, 2015 at 3:18 PM, Colin Johnston <colinj@gt86car.org.uk> wrote:
in war you take information at face value and use it if needed to mitigate risk, if there is legit traffic in blocked ranges then excemption procedure in place to unblock.
it's not clear how blocking any list of addresse stops the 20-30gbps of packets from arriving at your doorstep, but if you feel you're doing the right thing for your network, I can only echo the words of another: "I encourage my competitors to do this"
colin
Sent from my iPhone
On 20 Jul 2015, at 19:57, Valdis.Kletnieks@vt.edu wrote:
On Mon, 20 Jul 2015 19:42:39 +0100, Colin Johnston said:
see below for china ranges I believe, ipv4 and ipv6
You may believe... but are you *sure*? (Over the years, we've seen *lots* of "block China" lists that accidentally block chunks allocated to Taiwan or Australia or other Pacific Rim destinations).
And remember - asking the NIC doesn't help, because there are almost certainly blocks allocated that the registration points to Korea or someplace, but the provider routes a sub-block to China. And let's not even get started on blocks allocated by ARIN or RIPE....
(Yes, it *was* a trick question :)
On 7/20/2015 2:57 PM, Valdis.Kletnieks@vt.edu wrote:
On Mon, 20 Jul 2015 19:42:39 +0100, Colin Johnston said:
see below for china ranges I believe, ipv4 and ipv6 You may believe... but are you *sure*? (Over the years, we've seen *lots* of "block China" lists that accidentally block chunks allocated to Taiwan or Australia or other Pacific Rim destinations).
If you really wanted to go the route of blocking all/almost all China. Isn't there a short list of ASNs that provide transit to China citizens/networks? I'm referring to AS4134, AS4837, etc Wouldn't blackholing any prefix with those ASNs in the AS path accomplish the goal and stay up to date with a new prefixes originated from China?
On Mon, Jul 20, 2015 at 3:40 PM, ML <ml@kenweb.org> wrote:
On 7/20/2015 2:57 PM, Valdis.Kletnieks@vt.edu wrote:
On Mon, 20 Jul 2015 19:42:39 +0100, Colin Johnston said:
see below for china ranges I believe, ipv4 and ipv6
You may believe... but are you *sure*? (Over the years, we've seen *lots* of "block China" lists that accidentally block chunks allocated to Taiwan or Australia or other Pacific Rim destinations).
If you really wanted to go the route of blocking all/almost all China. Isn't there a short list of ASNs that provide transit to China citizens/networks? I'm referring to AS4134, AS4837, etc Wouldn't blackholing any prefix with those ASNs in the AS path accomplish the goal and stay up to date with a new prefixes originated from China?
That would prevent you from responding to their traffic (assuming DFZ), but their traffic would still have a valid route to your network. JM
new idea to free up network ranges for arin and ripe give a class c to china firewall, then put all the existing china ranges back in allocation pool and reallocate to new customers. anounce these new ranges with a higher pref than china ranges and then watch china start to cooperate at the nic level and abuse level colin Sent from my iPhone
On 20 Jul 2015, at 20:40, ML <ml@kenweb.org> wrote:
On 7/20/2015 2:57 PM, Valdis.Kletnieks@vt.edu wrote: On Mon, 20 Jul 2015 19:42:39 +0100, Colin Johnston said:
see below for china ranges I believe, ipv4 and ipv6 You may believe... but are you *sure*? (Over the years, we've seen *lots* of "block China" lists that accidentally block chunks allocated to Taiwan or Australia or other Pacific Rim destinations).
If you really wanted to go the route of blocking all/almost all China. Isn't there a short list of ASNs that provide transit to China citizens/networks? I'm referring to AS4134, AS4837, etc Wouldn't blackholing any prefix with those ASNs in the AS path accomplish the goal and stay up to date with a new prefixes originated from China?
On Mon, 20 Jul 2015 15:40:09 -0400, ML said:
If you really wanted to go the route of blocking all/almost all China. Isn't there a short list of ASNs that provide transit to China citizens/networks? I'm referring to AS4134, AS4837, etc Wouldn't blackholing any prefix with those ASNs in the AS path accomplish the goal and stay up to date with a new prefixes originated from China?
What do you do if AS4134 has customers in Australia as well? And how do you even *tell* if they do or not, if the space hasn't been SWIP'ed or otherwise noted as customer space?
Folks, it may be time to take the next step and admit that UDP is too broken to support https://tools.ietf.org/html/draft-byrne-opsec-udp-advisory-00 Your comments have been requested On Mon, Jul 20, 2015 at 8:57 AM, Drew Weaver <drew.weaver@thenap.com> wrote:
Has anyone else seen a massive amount of illegitimate UDP 1720 traffic coming from China being sent towards IP addresses which provide VoIP services?
I'm talking in the 20-30Gbps range?
The first incident was yesterday at around 13:00 EST, the second incident was today at 09:00 EST.
I'm assuming this is just another DDoS like all others, but I would be interested to hear if I am not the only one seeing this.
On list or off-list is fine.
Thanks, -Drew
Ca,
Folks, it may be time to take the next step and admit that UDP is too broken to support
https://tools.ietf.org/html/draft-byrne-opsec-udp-advisory-00
Your comments have been requested
My comment would be that UDP is still widely used for game server traffic. This is unlikely to change in the near future because TCP (by default) is not well-suited for highly time-sensitive data, as even a small amount of packet loss causes significant delays. In light of this, it is a bad idea for network operators to apply overall rate-limits to UDP traffic right now. Rate-limiting specific UDP /ports/ that are frequently seen in reflection attacks -- such as 19, 123, and 1900 -- is a more reasonable practice, however, and it is becoming more common/. /UDP-based application protocols can be implemented correctly, such that they also have handshakes that limit their ability to be used for reflection attacks, and modern services (including modern game servers) do this. TCP and UDP can both be spoofed and used for direct attacks; we see this all the time. UDP is preferred due to many applications protocols' susceptibility to amplification attacks, but spoofed TCP attacks are often a bit thornier to deal with from the standpoint of a host attempting to externally mitigate, because tracking the three-way handshake requires keeping state. I spoke with Drew earlier and his attacks do not appear to be reflected, so this is orthogonal to his concern today. He is seeing directly-generated traffic, which could use any protocol. -John
On Monday, July 20, 2015, John Weekes <jw@nuclearfallout.net> wrote:
Ca,
Folks, it may be time to take the next step and admit that UDP is too
broken to support
https://tools.ietf.org/html/draft-byrne-opsec-udp-advisory-00
Your comments have been requested
My comment would be that UDP is still widely used for game server traffic. This is unlikely to change in the near future because TCP (by default) is not well-suited for highly time-sensitive data, as even a small amount of packet loss causes significant delays.
First, thanks for feedback. Opsec mailer in the ietf is a good place for detailed feedback.
TCP packets travel at the same speed as udp. In fact nearly all video is delivered as tcp (youtube, netflix) Your level of tcp window pacing is relevant to your congestion algo. There is also sctp ....
In light of this, it is a bad idea for network operators to apply overall rate-limits to UDP traffic right now. Rate-limiting specific UDP /ports/ that are frequently seen in reflection attacks -- such as 19, 123, and 1900 -- is a more reasonable practice, however, and it is becoming more common/.
I noticed you did not include today's reported udp1720. Somebody took it on the chin because they did not rate limit that port. Tomorrow it will be a different port. Going back to the draft, it states that you should create a basline and understand it.
/UDP-based application protocols can be implemented correctly, such that they also have handshakes that limit their ability to be used for reflection attacks, and modern services (including modern game servers) do this.
Agreed. The issue is that there is so much broken ntp / chargen / ssdp .... That udp is a threat and "your udp app" will be collateral damage at some point (now, or in the future)
TCP and UDP can both be spoofed and used for direct attacks; we see this all the time. UDP is preferred due to many applications protocols' susceptibility to amplification attacks, but spoofed TCP attacks are often a bit thornier to deal with from the standpoint of a host attempting to externally mitigate, because tracking the three-way handshake requires keeping state.
What is the attack bandwidth volume ratio you see between tcp and udp? Mine is nearly 100% udp, but i have an eyeball network
I spoke with Drew earlier and his attacks do not appear to be reflected, so this is orthogonal to his concern today. He is seeing directly-generated traffic, which could use any protocol.
-John
But it is udp, so it is not orthogonal and would hit the bitbucket on protocol level policer without anyone opening a ticket or getting pages. This draft is not trying to deperecate udp. It is simply illuminating a situation and a trend and providing advice. As a network operator, my concern is that protocols doing cool things like quic and webrtc will grow very quickly on udp and the signal will mix with ddos noise in such a way that i cannot tease them apart. Today, i rate limit udp with a sledge hammer just to keep the network up. If you say i have to rate limit with a scalpel, that probably wont work. CB
TCP packets travel at the same speed as udp.
I will go into more detail. TCP is designed to be a reliable protocol. When a packet is lost, TCP reduces the transfer rate and retransmits the packet. If enough packets are lost, the connection is reset entirely. This is not desirable with a video game, where game state is being constantly refreshed already; retransmissions are redundant, and the developer wants to control when the connection is considered unsalvageable. There are also other factors. A game developer could go into more detail with you on this (I am not involved with such decisions), but the simple fact is that UDP is used almost exclusively with fast-action video games. That definitely won't change for already-released games and it's unlikely to change in the near future for new games.
Your level of tcp window pacing is relevant to your congestion algo. There is also sctp ....
Yes, but the game developers want to control the way that congestion is handled, without trying to turn global knobs in the OS that may not even be exposed.
I noticed you did not include today's reported udp1720.
UDP port 1720 was the destination port here, not the source port. As I understand it, the attack did not involve reflection and this is not a common target. His problem was mostly that a botnet was sending him attack traffic, not that it was using a specific protocol or port (those are just variables that the attacker could adjust -- and botnet users certainly will adjust to TCP if UDP starts seeing more rate-limiting). Blocking a destination service port like this would be akin to blocking TCP port 80 in response to an attack that involves spoofed TCP SYN traffic to port 80. That might be appropriate in some circumstances, such as if the victim is not a webserver, but it's not generally a good idea to limit it globally, and it's even less of a good idea to limit TCP overall.
Somebody took it on the chin because they did not rate limit that port. Tomorrow it will be a different port.
It is not the case that high-amplification-factor UDP services are discovered on a daily basis -- or anything close to that.
What is the attack bandwidth volume ratio you see between tcp and udp? Mine is nearly 100% udp, but i have an eyeball network
Attackers usually turn to UDP first, and if they use a spoofing traffic source, the preferred vector will usually be amplification using one of the big three -- NTP, DNS, or SSDP. When this fails, they will often turn to TCP attacks, or application-specific attacks. Those with botnets often use TCP SYN or small UDP packets to start. My networks have a large component of game server traffic, so at least 75% of legitimate traffic that we see is also UDP. I would expect to see most attacks here also use UDP, just because attackers frequently choose the protocol vector to match the service.
But it is udp, so it is not orthogonal and would hit the bitbucket on protocol level policer without anyone opening a ticket or getting pages.
A policer would degrade any UDP application and he'd probably have even more trouble tickets from customers than he would from just immediately null-routing the target IP addresses. Such tickets would could be a bit more complicated to troubleshoot, as staff and customers may not expect a UDP rate-limit to be the cause. My main point is that an overall UDP rate-limit is not a good idea for most networks -- and certainly not eyeball networks -- and we don't want to encourage it. Rate-limits (or other rules) on specific ports that are used in amplification attacks, however, might make a lot of sense, depending on the network. Potentially, an overall UDP rate-limit on individual users might also make sense (if those users are known to not need to use UDP).
This draft is not trying to deperecate udp. It is simply illuminating a situation and a trend and providing advice. As a network operator, my concern is that protocols doing cool things like quic and webrtc will grow very quickly on udp and the signal will mix with ddos noise in such a way that i cannot tease them apart.
My concerns with this document, and the sentiment behind it, are primarily twofold. 1. Network operators may see it and think that an overall network-wide rate-limit UDP is a good idea, when there are much smarter mitigation options available. 2. Developers may read the document, consider UDP deprecated, and start to redevelop their libraries to use other protocols that may not be the right fit or might have a higher cost to develop. This unnecessarily burdens them. Right now, I haven't heard a lot of organizations tell me that they're rate-limiting UDP overall, thankfully. I really don't want it to start, and I hate to think that this sort of exposure might encourage that decision to be made more widely. Network operators reading this, please don't blanket rate-limit UDP across your network!
Today, i rate limit udp with a sledge hammer just to keep the network up. If you say i have to rate limit with a scalpel, that probably wont work.
If you have an eyeball network that might have any gamers on it, you should consider switching to just a regular hammer, by limiting the major amplification vectors instead of UDP overall. At the very least, limit commonly-used reflection ports in an earlier rule, to pull out just the reflection traffic before resorting to the sledge. -John
DNS is still largely UDP. --Curtis On 7/20/2015 5:40 PM, Ca By wrote:
Folks, it may be time to take the next step and admit that UDP is too broken to support
https://tools.ietf.org/html/draft-byrne-opsec-udp-advisory-00
Your comments have been requested
On Mon, Jul 20, 2015 at 8:57 AM, Drew Weaver <drew.weaver@thenap.com> wrote:
Has anyone else seen a massive amount of illegitimate UDP 1720 traffic coming from China being sent towards IP addresses which provide VoIP services?
I'm talking in the 20-30Gbps range?
The first incident was yesterday at around 13:00 EST, the second incident was today at 09:00 EST.
I'm assuming this is just another DDoS like all others, but I would be interested to hear if I am not the only one seeing this.
On list or off-list is fine.
Thanks, -Drew
-- Best Regards Curtis Maurand Principal Xyonet Web Hosting mailto:cmaurand@xyonet.com http://www.xyonet.com
On Tue, Jul 21, 2015 at 08:09:56AM -0400, Curtis Maurand wrote:
DNS is still largely UDP.
Water is also still wet :) - but you may not be doing 10% of your links as UDP/53. DNS can also use TCP as well, including sending more than one query in a pipelined fashion. The challenge that Cameron is trying to document here is when seeing large volumes of UDP it becomes necessary to do something to keep the network up. This response is frustrating for those of us who prefer to have a unfiltered e2e network but maintaining the network as up in the face of these adverse conditions is important. - Jared
--Curtis
On 7/20/2015 5:40 PM, Ca By wrote:
Folks, it may be time to take the next step and admit that UDP is too broken to support
https://tools.ietf.org/html/draft-byrne-opsec-udp-advisory-00
Your comments have been requested
On Mon, Jul 20, 2015 at 8:57 AM, Drew Weaver <drew.weaver@thenap.com> wrote:
Has anyone else seen a massive amount of illegitimate UDP 1720 traffic coming from China being sent towards IP addresses which provide VoIP services?
I'm talking in the 20-30Gbps range?
The first incident was yesterday at around 13:00 EST, the second incident was today at 09:00 EST.
I'm assuming this is just another DDoS like all others, but I would be interested to hear if I am not the only one seeing this.
On list or off-list is fine.
Thanks, -Drew
-- Best Regards Curtis Maurand Principal Xyonet Web Hosting mailto:cmaurand@xyonet.com http://www.xyonet.com
-- Jared Mauch | pgp key available via finger from jared@puck.nether.net clue++; | http://puck.nether.net/~jared/ My statements are only mine.
Has anyone tried to implement real-time SQC in their network? You can calculate summary statistics and use math to determine if traffic is "normal" or if there's a chance it's garbage. You won't be able to notice one-off attacks, but anything that repeats enough times should pop up. Facebook uses similar technology to figure out what kind of useless news to display on your feed. In summary, instead of blocking an entire country, we should be able to analyze traffic as it comes, and determine a DDoS attack without human intervention. On Tue, Jul 21, 2015 at 7:43 AM, Jared Mauch <jared@puck.nether.net> wrote:
On Tue, Jul 21, 2015 at 08:09:56AM -0400, Curtis Maurand wrote:
DNS is still largely UDP.
Water is also still wet :) - but you may not be doing 10% of your links as UDP/53.
DNS can also use TCP as well, including sending more than one query in a pipelined fashion.
The challenge that Cameron is trying to document here is when seeing large volumes of UDP it becomes necessary to do something to keep the network up. This response is frustrating for those of us who prefer to have a unfiltered e2e network but maintaining the network as up in the face of these adverse conditions is important.
- Jared
--Curtis
On 7/20/2015 5:40 PM, Ca By wrote:
Folks, it may be time to take the next step and admit that UDP is too broken to support
https://tools.ietf.org/html/draft-byrne-opsec-udp-advisory-00
Your comments have been requested
On Mon, Jul 20, 2015 at 8:57 AM, Drew Weaver <drew.weaver@thenap.com>
wrote:
Has anyone else seen a massive amount of illegitimate UDP 1720 traffic coming from China being sent towards IP addresses which provide VoIP services?
I'm talking in the 20-30Gbps range?
The first incident was yesterday at around 13:00 EST, the second
incident
was today at 09:00 EST.
I'm assuming this is just another DDoS like all others, but I would be interested to hear if I am not the only one seeing this.
On list or off-list is fine.
Thanks, -Drew
-- Best Regards Curtis Maurand Principal Xyonet Web Hosting mailto:cmaurand@xyonet.com http://www.xyonet.com
-- Jared Mauch | pgp key available via finger from jared@puck.nether.net clue++; | http://puck.nether.net/~jared/ My statements are only mine.
You could do SQC with FastNetMon. We have per subnet / per host and per protocol counters. We are working on multi 100GE mode very well :) On Tue, Jul 21, 2015 at 4:07 PM, Rafael Possamai <rafael@gav.ufsc.br> wrote:
Has anyone tried to implement real-time SQC in their network? You can calculate summary statistics and use math to determine if traffic is "normal" or if there's a chance it's garbage. You won't be able to notice one-off attacks, but anything that repeats enough times should pop up. Facebook uses similar technology to figure out what kind of useless news to display on your feed.
In summary, instead of blocking an entire country, we should be able to analyze traffic as it comes, and determine a DDoS attack without human intervention.
On Tue, Jul 21, 2015 at 7:43 AM, Jared Mauch <jared@puck.nether.net> wrote:
On Tue, Jul 21, 2015 at 08:09:56AM -0400, Curtis Maurand wrote:
DNS is still largely UDP.
Water is also still wet :) - but you may not be doing 10% of your links as UDP/53.
DNS can also use TCP as well, including sending more than one query in a pipelined fashion.
The challenge that Cameron is trying to document here is when seeing large volumes of UDP it becomes necessary to do something to keep the network up. This response is frustrating for those of us who prefer to have a unfiltered e2e network but maintaining the network as up in the face of these adverse conditions is important.
- Jared
--Curtis
On 7/20/2015 5:40 PM, Ca By wrote:
Folks, it may be time to take the next step and admit that UDP is too broken to support
https://tools.ietf.org/html/draft-byrne-opsec-udp-advisory-00
Your comments have been requested
On Mon, Jul 20, 2015 at 8:57 AM, Drew Weaver <drew.weaver@thenap.com>
wrote:
Has anyone else seen a massive amount of illegitimate UDP 1720 traffic coming from China being sent towards IP addresses which provide VoIP services?
I'm talking in the 20-30Gbps range?
The first incident was yesterday at around 13:00 EST, the second
incident
was today at 09:00 EST.
I'm assuming this is just another DDoS like all others, but I would be interested to hear if I am not the only one seeing this.
On list or off-list is fine.
Thanks, -Drew
-- Best Regards Curtis Maurand Principal Xyonet Web Hosting mailto:cmaurand@xyonet.com http://www.xyonet.com
-- Jared Mauch | pgp key available via finger from jared@puck.nether.net clue++; | http://puck.nether.net/~jared/ My statements are only mine.
-- Sincerely yours, Pavel Odintsov
Pavel, what kind of resources does the analysis of a 100G circuit require? Or is it just counting packets? On Tue, Jul 21, 2015 at 8:11 AM, Pavel Odintsov <pavel.odintsov@gmail.com> wrote:
You could do SQC with FastNetMon. We have per subnet / per host and per protocol counters. We are working on multi 100GE mode very well :)
Has anyone tried to implement real-time SQC in their network? You can calculate summary statistics and use math to determine if traffic is "normal" or if there's a chance it's garbage. You won't be able to notice one-off attacks, but anything that repeats enough times should pop up. Facebook uses similar technology to figure out what kind of useless news to display on your feed.
In summary, instead of blocking an entire country, we should be able to analyze traffic as it comes, and determine a DDoS attack without human intervention.
On Tue, Jul 21, 2015 at 7:43 AM, Jared Mauch <jared@puck.nether.net> wrote:
On Tue, Jul 21, 2015 at 08:09:56AM -0400, Curtis Maurand wrote:
DNS is still largely UDP.
Water is also still wet :) - but you may not be doing 10% of your links as UDP/53.
DNS can also use TCP as well, including sending more than one query in a pipelined fashion.
The challenge that Cameron is trying to document here is when seeing large volumes of UDP it becomes necessary to do something to keep the network up. This response is frustrating for
of us who prefer to have a unfiltered e2e network but maintaining the network as up in the face of these adverse conditions is important.
- Jared
--Curtis
On 7/20/2015 5:40 PM, Ca By wrote:
Folks, it may be time to take the next step and admit that UDP is
too
broken to support
https://tools.ietf.org/html/draft-byrne-opsec-udp-advisory-00
Your comments have been requested
On Mon, Jul 20, 2015 at 8:57 AM, Drew Weaver <drew.weaver@thenap.com
wrote:
Has anyone else seen a massive amount of illegitimate UDP 1720
On Tue, Jul 21, 2015 at 4:07 PM, Rafael Possamai <rafael@gav.ufsc.br> wrote: those traffic
coming from China being sent towards IP addresses which provide VoIP services?
I'm talking in the 20-30Gbps range?
The first incident was yesterday at around 13:00 EST, the second incident was today at 09:00 EST.
I'm assuming this is just another DDoS like all others, but I would be interested to hear if I am not the only one seeing this.
On list or off-list is fine.
Thanks, -Drew
-- Best Regards Curtis Maurand Principal Xyonet Web Hosting mailto:cmaurand@xyonet.com http://www.xyonet.com
-- Jared Mauch | pgp key available via finger from jared@puck.nether.net clue++; | http://puck.nether.net/~jared/ My statements are only mine.
-- Sincerely yours, Pavel Odintsov
Hello! There are few vendors which could offer 100GE capture solutions which could be used with FastNetMon. I could share vendor names off list if you are interested in it. Now we do only packet counting and compare it with fixed thresholds. But we are working on deep packet inspection of attacks. But pps/bps thresholds still useful in this case too. On Tue, Jul 21, 2015 at 5:48 PM, Rafael Possamai <rafael@gav.ufsc.br> wrote:
Pavel, what kind of resources does the analysis of a 100G circuit require? Or is it just counting packets?
On Tue, Jul 21, 2015 at 8:11 AM, Pavel Odintsov <pavel.odintsov@gmail.com> wrote:
You could do SQC with FastNetMon. We have per subnet / per host and per protocol counters. We are working on multi 100GE mode very well :)
On Tue, Jul 21, 2015 at 4:07 PM, Rafael Possamai <rafael@gav.ufsc.br> wrote:
Has anyone tried to implement real-time SQC in their network? You can calculate summary statistics and use math to determine if traffic is "normal" or if there's a chance it's garbage. You won't be able to notice one-off attacks, but anything that repeats enough times should pop up. Facebook uses similar technology to figure out what kind of useless news to display on your feed.
In summary, instead of blocking an entire country, we should be able to analyze traffic as it comes, and determine a DDoS attack without human intervention.
On Tue, Jul 21, 2015 at 7:43 AM, Jared Mauch <jared@puck.nether.net> wrote:
On Tue, Jul 21, 2015 at 08:09:56AM -0400, Curtis Maurand wrote:
DNS is still largely UDP.
Water is also still wet :) - but you may not be doing 10% of your links as UDP/53.
DNS can also use TCP as well, including sending more than one query in a pipelined fashion.
The challenge that Cameron is trying to document here is when seeing large volumes of UDP it becomes necessary to do something to keep the network up. This response is frustrating for those of us who prefer to have a unfiltered e2e network but maintaining the network as up in the face of these adverse conditions is important.
- Jared
--Curtis
On 7/20/2015 5:40 PM, Ca By wrote:
Folks, it may be time to take the next step and admit that UDP is too broken to support
https://tools.ietf.org/html/draft-byrne-opsec-udp-advisory-00
Your comments have been requested
On Mon, Jul 20, 2015 at 8:57 AM, Drew Weaver <drew.weaver@thenap.com>
wrote:
>Has anyone else seen a massive amount of illegitimate UDP 1720 > traffic >coming from China being sent towards IP addresses which provide > VoIP >services? > >I'm talking in the 20-30Gbps range? > >The first incident was yesterday at around 13:00 EST, the second
incident
>was today at 09:00 EST. > >I'm assuming this is just another DDoS like all others, but I would > be >interested to hear if I am not the only one seeing this. > >On list or off-list is fine. > >Thanks, >-Drew > >
-- Best Regards Curtis Maurand Principal Xyonet Web Hosting mailto:cmaurand@xyonet.com http://www.xyonet.com
-- Jared Mauch | pgp key available via finger from jared@puck.nether.net clue++; | http://puck.nether.net/~jared/ My statements are only mine.
-- Sincerely yours, Pavel Odintsov
-- Sincerely yours, Pavel Odintsov
"Facebook uses similar technology to figure out what kind of useless news to display on your feed." In this case, it'll be of no use whatsoever. ;-) ----- Mike Hammett Intelligent Computing Solutions http://www.ics-il.com ----- Original Message ----- From: "Rafael Possamai" <rafael@gav.ufsc.br> To: "Jared Mauch" <jared@puck.nether.net> Cc: nanog@nanog.org Sent: Tuesday, July 21, 2015 8:07:34 AM Subject: Re: 20-30Gbps UDP 1720 traffic appearing to originate from CN in last 24 hours Has anyone tried to implement real-time SQC in their network? You can calculate summary statistics and use math to determine if traffic is "normal" or if there's a chance it's garbage. You won't be able to notice one-off attacks, but anything that repeats enough times should pop up. Facebook uses similar technology to figure out what kind of useless news to display on your feed. In summary, instead of blocking an entire country, we should be able to analyze traffic as it comes, and determine a DDoS attack without human intervention. On Tue, Jul 21, 2015 at 7:43 AM, Jared Mauch <jared@puck.nether.net> wrote:
On Tue, Jul 21, 2015 at 08:09:56AM -0400, Curtis Maurand wrote:
DNS is still largely UDP.
Water is also still wet :) - but you may not be doing 10% of your links as UDP/53.
DNS can also use TCP as well, including sending more than one query in a pipelined fashion.
The challenge that Cameron is trying to document here is when seeing large volumes of UDP it becomes necessary to do something to keep the network up. This response is frustrating for those of us who prefer to have a unfiltered e2e network but maintaining the network as up in the face of these adverse conditions is important.
- Jared
--Curtis
On 7/20/2015 5:40 PM, Ca By wrote:
Folks, it may be time to take the next step and admit that UDP is too broken to support
https://tools.ietf.org/html/draft-byrne-opsec-udp-advisory-00
Your comments have been requested
On Mon, Jul 20, 2015 at 8:57 AM, Drew Weaver <drew.weaver@thenap.com>
wrote:
Has anyone else seen a massive amount of illegitimate UDP 1720 traffic coming from China being sent towards IP addresses which provide VoIP services?
I'm talking in the 20-30Gbps range?
The first incident was yesterday at around 13:00 EST, the second
incident
was today at 09:00 EST.
I'm assuming this is just another DDoS like all others, but I would be interested to hear if I am not the only one seeing this.
On list or off-list is fine.
Thanks, -Drew
-- Best Regards Curtis Maurand Principal Xyonet Web Hosting mailto:cmaurand@xyonet.com http://www.xyonet.com
-- Jared Mauch | pgp key available via finger from jared@puck.nether.net clue++; | http://puck.nether.net/~jared/ My statements are only mine.
Yeah, it hurts to see advanced analytics being used to sort the kitten videos you're most likely to watch, but somehow they make money off of it. On the other hand, their datacenter and new switching technologies are really interesting, so that's an opposite example where their corporate investments can benefit society in general. On Tue, Jul 21, 2015 at 8:22 AM, Mike Hammett <nanog@ics-il.net> wrote:
"Facebook uses similar technology to figure out what kind of useless news to display on your feed."
In this case, it'll be of no use whatsoever. ;-)
----- Mike Hammett Intelligent Computing Solutions http://www.ics-il.com
----- Original Message -----
From: "Rafael Possamai" <rafael@gav.ufsc.br> To: "Jared Mauch" <jared@puck.nether.net> Cc: nanog@nanog.org Sent: Tuesday, July 21, 2015 8:07:34 AM Subject: Re: 20-30Gbps UDP 1720 traffic appearing to originate from CN in last 24 hours
Has anyone tried to implement real-time SQC in their network? You can calculate summary statistics and use math to determine if traffic is "normal" or if there's a chance it's garbage. You won't be able to notice one-off attacks, but anything that repeats enough times should pop up. Facebook uses similar technology to figure out what kind of useless news to display on your feed.
In summary, instead of blocking an entire country, we should be able to analyze traffic as it comes, and determine a DDoS attack without human intervention.
On Tue, Jul 21, 2015 at 7:43 AM, Jared Mauch <jared@puck.nether.net> wrote:
On Tue, Jul 21, 2015 at 08:09:56AM -0400, Curtis Maurand wrote:
DNS is still largely UDP.
Water is also still wet :) - but you may not be doing 10% of your links as UDP/53.
DNS can also use TCP as well, including sending more than one query in a pipelined fashion.
The challenge that Cameron is trying to document here is when seeing large volumes of UDP it becomes necessary to do something to keep the network up. This response is frustrating for those of us who prefer to have a unfiltered e2e network but maintaining the network as up in the face of these adverse conditions is important.
- Jared
--Curtis
On 7/20/2015 5:40 PM, Ca By wrote:
Folks, it may be time to take the next step and admit that UDP is too broken to support
https://tools.ietf.org/html/draft-byrne-opsec-udp-advisory-00
Your comments have been requested
On Mon, Jul 20, 2015 at 8:57 AM, Drew Weaver <drew.weaver@thenap.com>
Has anyone else seen a massive amount of illegitimate UDP 1720
wrote: traffic
coming from China being sent towards IP addresses which provide VoIP services?
I'm talking in the 20-30Gbps range?
The first incident was yesterday at around 13:00 EST, the second incident was today at 09:00 EST.
I'm assuming this is just another DDoS like all others, but I would be interested to hear if I am not the only one seeing this.
On list or off-list is fine.
Thanks, -Drew
-- Best Regards Curtis Maurand Principal Xyonet Web Hosting mailto:cmaurand@xyonet.com http://www.xyonet.com
-- Jared Mauch | pgp key available via finger from jared@puck.nether.net clue++; | http://puck.nether.net/~jared/ My statements are only mine.
On Tue, Jul 21, 2015 at 08:07:34AM -0500, Rafael Possamai wrote:
Has anyone tried to implement real-time SQC in their network? You can calculate summary statistics and use math to determine if traffic is "normal" or if there's a chance it's garbage. You won't be able to notice one-off attacks, but anything that repeats enough times should pop up. Facebook uses similar technology to figure out what kind of useless news to display on your feed.
In summary, instead of blocking an entire country, we should be able to analyze traffic as it comes, and determine a DDoS attack without human intervention.
We profile the protocols on our network so understand what the level of UDP, ICMP, IPv6, etc are. It's easy to pick out spikes in the graphs that are related to attacks. Setting thresholds related to this to minimize impact for customers is important as it eliminates the garbage that networks carry and reduce the impact to sites that are under attack. - Jared -- Jared Mauch | pgp key available via finger from jared@puck.nether.net clue++; | http://puck.nether.net/~jared/ My statements are only mine.
On 7/21/2015 8:43 AM, Jared Mauch wrote:
DNS is still largely UDP. Water is also still wet :) - but you may not be doing 10% of your
On Tue, Jul 21, 2015 at 08:09:56AM -0400, Curtis Maurand wrote: links as UDP/53.
DNS can also use TCP as well, including sending more than one query in a pipelined fashion.
The challenge that Cameron is trying to document here is when seeing large volumes of UDP it becomes necessary to do something to keep the network up. This response is frustrating for those of us who prefer to have a unfiltered e2e network but maintaining the network as up in the face of these adverse conditions is important.
- Jared Point well taken.
-Curtis
--Curtis
On 7/20/2015 5:40 PM, Ca By wrote:
Folks, it may be time to take the next step and admit that UDP is too broken to support
https://tools.ietf.org/html/draft-byrne-opsec-udp-advisory-00
Your comments have been requested
On Mon, Jul 20, 2015 at 8:57 AM, Drew Weaver <drew.weaver@thenap.com> wrote:
Has anyone else seen a massive amount of illegitimate UDP 1720 traffic coming from China being sent towards IP addresses which provide VoIP services?
I'm talking in the 20-30Gbps range?
The first incident was yesterday at around 13:00 EST, the second incident was today at 09:00 EST.
I'm assuming this is just another DDoS like all others, but I would be interested to hear if I am not the only one seeing this.
On list or off-list is fine.
Thanks, -Drew
-- Best Regards Curtis Maurand Principal Xyonet Web Hosting mailto:cmaurand@xyonet.com http://www.xyonet.com
-- Best Regards Curtis Maurand Principal Xyonet Web Hosting mailto:cmaurand@xyonet.com http://www.xyonet.com
participants (21)
-
Bryan Tong
-
Ca By
-
Christopher Morrow
-
Colin Johnston
-
Curtis Maurand
-
Drew Weaver
-
James Milko
-
Jared Mauch
-
Jared Mauch
-
John
-
John Weekes
-
Justin M. Streiner
-
Mike Hammett
-
mikea
-
ML
-
Nicholas Warren
-
Pavel Odintsov
-
Rafael Possamai
-
Roland Dobbins
-
Stephen Satchell
-
Valdis.Kletnieks@vt.edu