<html xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=utf-8"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
.MsoChpDefault
{mso-style-type:export-only;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style></head><body lang=EN-US link=blue vlink="#954F72"><div class=WordSection1><p class=MsoNormal>Good idea. I will forward one of the emails to that email address (<a href="mailto:abuse@ioflood.com">abuse@ioflood.com</a>) and explain what is going on. Will contact back with results.</p><div style='mso-element:para-border-div;border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in 0in 0in'><p class=MsoNormal style='border:none;padding:0in'><b>From: </b><a href="mailto:mirimir@riseup.net">Mirimir</a><br><b>Sent: </b>Sunday, June 10, 2018 8:52 PM<br><b>To: </b><a href="mailto:tor-relays@lists.torproject.org">tor-relays@lists.torproject.org</a><br><b>Subject: </b>Re: [tor-relays] Fwd: Tor Guard Relay</p></div><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>On 06/10/2018 03:58 PM, grarpamp wrote:</p><p class=MsoNormal>> Horny Rose wants to marry and exploit many people, lol.</p><p class=MsoNormal>> </p><p class=MsoNormal>> Assuming culprit is a stupid nontargeting subscribed address,</p><p class=MsoNormal>> list manager does have a way to expose it, users may gripe</p><p class=MsoNormal>> though, because even if found, reported, and nuked at the source,</p><p class=MsoNormal>> they'll likely just sign up again.</p><p class=MsoNormal>> </p><p class=MsoNormal>> Readers should just filter locally. And mark them as spam</p><p class=MsoNormal>> if they want to risk letting the cloud deal with it in some</p><p class=MsoNormal>> secret and flaky way.</p><p class=MsoNormal>> </p><p class=MsoNormal>> Not posting headers because it's a waste of time.</p><p class=MsoNormal>> </p><p class=MsoNormal>> This saves many people a lot of time...</p><p class=MsoNormal>> https://neomutt.org/</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>I've looked at known spam, and they all come from either</p><p class=MsoNormal>m111.bytekeys.com (104.161.37.109) or us27.axiobyte.com</p><p class=MsoNormal>(104.161.37.152). Both are hosted on mellowhost.com by Input Output</p><p class=MsoNormal>Flood LLC. Funny name, no? The abuse contact is Gabriel Ramuglia</p><p class=MsoNormal>(abuse@ioflood.com). I suggest that we all file abuse reports.</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Here's the supporting data.</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>from https://ipinfo.io/</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>ip: "104.161.37.109"</p><p class=MsoNormal>hostname: "m111.bytekeys.com"</p><p class=MsoNormal>city: "Dhaka"</p><p class=MsoNormal>region: "Dhaka Division"</p><p class=MsoNormal>country: "BD"</p><p class=MsoNormal>loc: "23.7231,90.4086"</p><p class=MsoNormal>postal: "1000"</p><p class=MsoNormal>asn: Object</p><p class=MsoNormal>asn: "AS53755"</p><p class=MsoNormal>name: "Input Output Flood LLC"</p><p class=MsoNormal>domain: "ioflood.com"</p><p class=MsoNormal>route: "104.161.32.0/20"</p><p class=MsoNormal>type: "hosting"</p><p class=MsoNormal>company: Object</p><p class=MsoNormal>name: "Mellowhost"</p><p class=MsoNormal>domain: "mellowhost.com"</p><p class=MsoNormal>type: "hosting"</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>ip: "104.161.37.152"</p><p class=MsoNormal>hostname: "us27.axiobyte.com"</p><p class=MsoNormal>city: "Dhaka"</p><p class=MsoNormal>region: "Dhaka Division"</p><p class=MsoNormal>country: "BD"</p><p class=MsoNormal>loc: "23.7231,90.4086"</p><p class=MsoNormal>postal: "1000"</p><p class=MsoNormal>asn: Object</p><p class=MsoNormal>asn: "AS53755"</p><p class=MsoNormal>name: "Input Output Flood LLC"</p><p class=MsoNormal>domain: "ioflood.com"</p><p class=MsoNormal>route: "104.161.32.0/20"</p><p class=MsoNormal>type: "hosting"</p><p class=MsoNormal>company: Object</p><p class=MsoNormal>name: "Mellowhost"</p><p class=MsoNormal>domain: "mellowhost.com"</p><p class=MsoNormal>type: "hosting"</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>from https://myip.ms/info/whois/104.161.37.109</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Whois Original Data on IP 104.161.37.109</p><p class=MsoNormal>NetRange: 104.161.0.0 - 104.161.255.255</p><p class=MsoNormal>CIDR: 104.161.0.0/16</p><p class=MsoNormal>NetName: IOFLOOD</p><p class=MsoNormal>NetHandle: NET-104-161-0-0-1</p><p class=MsoNormal>Parent: NET104 (NET-104-0-0-0-0)</p><p class=MsoNormal>NetType: Direct Allocation</p><p class=MsoNormal>OriginAS: AS53755</p><p class=MsoNormal>Organization: Input Output Flood LLC (IOFL)</p><p class=MsoNormal>RegDate: 2014-07-28</p><p class=MsoNormal>Updated: 2014-07-28</p><p class=MsoNormal>Comment: http://www.ioflood.com</p><p class=MsoNormal>Ref: https://whois.arin.net/rest/net/NET-104-161-0-0-1</p><p class=MsoNormal>OrgName: Input Output Flood LLC</p><p class=MsoNormal>OrgId: IOFL</p><p class=MsoNormal>Address: 3402 E University Dr. #6</p><p class=MsoNormal>City: Phoenix</p><p class=MsoNormal>StateProv: AZ</p><p class=MsoNormal>PostalCode: 85034</p><p class=MsoNormal>Country: US</p><p class=MsoNormal>RegDate: 2011-05-02</p><p class=MsoNormal>Updated: 2017-01-28</p><p class=MsoNormal>Comment: http://www.ioflood.com</p><p class=MsoNormal>Ref: https://whois.arin.net/rest/org/IOFL</p><p class=MsoNormal>OrgAbuseHandle: RAMUG-ARIN</p><p class=MsoNormal>OrgAbuseName: Ramuglia, Gabriel</p><p class=MsoNormal>OrgAbusePhone: +1-702-482-8064</p><p class=MsoNormal>OrgAbuseEmail: abuse@ioflood.com</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>from https://myip.ms/info/whois/104.161.37.152</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Whois IP Live Results for 104.161.37.152</p><p class=MsoNormal>IP Address: 104.161.37.152</p><p class=MsoNormal>IP Location: USA, Nevada, Mesquite</p><p class=MsoNormal>IP Reverse DNS (Host): us27.axiobyte.com</p><p class=MsoNormal>IP Owner: Input Output Flood Llc</p><p class=MsoNormal>Owner IP Range: 104.161.0.0 - 104.161.255.255 (65,536 ip)</p><p class=MsoNormal>Owner Address: 3402 E University Dr. #6, Phoenix, AZ, 85034, US</p><p class=MsoNormal>Owner Country: USA</p><p class=MsoNormal>Owner Phone: +1-702-482-8064</p><p class=MsoNormal>Owner Website: ioflood.com</p><p class=MsoNormal>Owner CIDR: 104.161.0.0/16</p><p class=MsoNormal>Whois Record Created: 28 Jul 2014</p><p class=MsoNormal>Whois Record Updated: 28 Jan 2017</p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><SNIP></p><p class=MsoNormal>_______________________________________________</p><p class=MsoNormal>tor-relays mailing list</p><p class=MsoNormal>tor-relays@lists.torproject.org</p><p class=MsoNormal>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays</p><p class=MsoNormal><o:p> </o:p></p></div></body></html>