On Mon, Apr 12, 2010 at 7:31 PM, Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
> Interesting, but is there no investigation on the origins of the leakage?

Well, we know that some sites run Net 1 behind a NAT when they should
be running an RFC 1918 prefix. We also know that pretty much everbody

"Secondary DNS server?� What the hell is that?� OK.. 0.0.0.0.� What do you mean Invalid IP?� OK.. 1.1.1.1.� There - that fixed it!"

Repeat for STUN servers, hosts entries for the Google Ads servers and the Microsoft activation servers, DHCP agent forwarding, highest (or lowest) priority MX records for the server you try and use to avoid botnet spam, etc, etc, etc.

It's a pretty much endless list.

APNIC has said that they will be doing further analysis on the captured data and releasing it in the next few months.

� Scott.