Network Attribution Audit
Generated 2026-05-13T14:47:39.212535+00:00. Source: OFAC enhanced XML websites + RIPEstat live enrichment.
Summary
- Entities with website features: 1131
- Entities country=Russia: 354
- Cross-matched to pipeline sanctioned set: 241 / 3187 pipeline-sanctioned entities
- Coverage gap: 2946 pipeline-sanctioned entities have NO domain on file (OFAC Website feature missing). All 95 suspect targets also have no domain source — they need rusprofile/EGRUL website-field scraping before they can be probed.
- Domains resolved (got at least one A record): 787
- Domains that failed DNS: 474
- Subdomains discovered via subfinder (kept after multi-tenant filter): 26,530
- Unique IPs enriched via RIPEstat (incl. subdomain-derived): 6,275 (of 6,275 unique)
- IPs flagged as jurisdiction laundering (non-RU country flag, RU operator): 74
- IPs on Russian-operator infrastructure overall (incl. honest RU hosting): 5147
- IPs sitting in known RETN-laundered prefixes: 0
🔒 Premium brief — request full access
This brief's evidentiary detail, specific targets, and designation recommendations are available to subscribing compliance teams, law firms, and government analysts. The teaser above shows the headline methodology; the full document includes case-number citations, target INNs, SDN-adjacency numbers, and recommended secondary-designation scope.
Email derek.linz@linzalytics.com or click below to request access. Include your organization, role, and intended use.
Request access → See pricing tiers