Using Kiwi syslog daemon, I have recently noticed a lot of inbound UDP and TCP/IP packets from 126.96.36.199 & 188.8.131.52 & 184.108.40.206 & 220.127.116.11 on many different ports including ports 1026. I assumed it was just some spammer trying to send pop-ups to anyone listening on 1027 but there are a lot of other ports they are sending UDP to. The whois returned the data below. And I reported the traffic to their Abuse submission form. I doubt anything will happen.
My question is, who else can I report this too? Besides blocking the IP range at my firewall, what else can I do to protect against it? I'd like to forward the packets from that IP range to a linux box to get a look at them.
Thanks for any help.
Search results for: 18.104.22.168
OrgName: FAST COLOCATION SERVICES
Address: 3791 N. Edgewater Dr
NetRange: 22.214.171.124 - 126.96.36.199
NetType: Direct Allocation
Comment: For Abuse Notices please visit http://www.fastcolocation.net/abuse/
RAbuseName: NOC Abuse Department
RNOCName: Network Operations Center
RTechName: Network Operations Center
OrgAbuseName: NOC Abuse Department
OrgTechName: Network Operations Center
# ARIN WHOIS database, last updated 2007-03-19 19:10
# Enter ? for additional hints on searching ARIN's WHOIS database.