Pengguna Router MIkrotik:
1. Buat scheduler per 15menit utk menjalankan script
tool fetch https://postpi.org/asn0.rsc;
import asn0.rsc
2. Drop address-list asn0v4 di raw firewall ipv4:
/ip firewall raw
add action=drop chain=prerouting comment="drop asn0v4" dst-address-list=asn0v4 log-prefix="asn0v4 : "
add action=drop chain=prerouting comment="drop asn0v4" log-prefix="asn0v4 : " src-address-list=asn0v4
3. Drop address-list asn0v6 di raw firewall ipv6:
/ipv6 firewall raw
add action=drop chain=prerouting comment="drop asn0v6" dst-address-list=asn0v6
add action=drop chain=prerouting comment="drop asn0v6" src-address-list=asn0v6
Implementasi di Router IX dan Router IIX untuk hasil MAXIMAL lalala lilili
dan ternyata banyak traffic worm/mallware bersliweran dari/ke address-list ans0v4 dan ans0v6
https://www.facebook.com/harijanto/posts/pfbid02fRz8xydHuv2MnixhEQscf6Fjx727DMMBHvrfiMDriyU8Gc9G2zbsj35BouQp4276l?__cft__[0]=AZVRqD2ecojRWm4hYMEF9yziaqij5xGk0fYvqzThjcZZKuTk15NCUpMAhlrCShdyFQ6mIRwvGt-0m6p4V-dbtrA4MM4zpHITmccEsPbT8mZPhw&__cft__[1]=AZVRqD2ecojRWm4hYMEF9yziaqij5xGk0fYvqzThjcZZKuTk15NCUpMAhlrCShdyFQ6mIRwvGt-0m6p4V-dbtrA4MM4zpHITmccEsPbT8mZPhw&__tn__=%2CO%2CP-R]-R