8 Mar
2016
8 Mar
'16
12:43 a.m.
Yes of course. I mean to say - legacy IP space isn't immune to compromise or whatever else that causes phish urls, so every so often a manual step does come into the process when I run into a comments field We wouldn't be having this longish discussion otherwise --srs
On 08-Mar-2016, at 1:05 AM, denis <ripedenis@yahoo.co.uk> wrote:
The legacy resources are the only resources in the RIPE Database that currently do not all have an abuse-c. If you use the tools provided by the NCC you should not need to do any manual lookups or read comments.