I'm seeing quite a few hits for the past two or three weeks from (usually) "broadband" IPs that have been compromised and are being driven with FWD_FOR from WebAir ranges - probably only a handful of IPs. Not sure if the WebAir IPs have been compromised or if they are "owned" by baddies.
The point isn't blocking webair - I've been doing that for years.
My point is: they are using compromised broadband IPs as proxies - ie the IP only shows in the FWD_FOR header. Which I've also been blocking for a long time, depending on the FWD IP, but which I've noticed quite a bit for this one company (found another IP from them just after posting).
I reported elsewhere that this is a general problem, with a variety of (probably) compromised servers calling the shots. This is a specific persistent source: WebAir.
dstiles, There are quite a few major internet providers in the US that have open proxies, and despite the providers being aware of the issues it creates for spammers and botnets, the proxies remain open. Go figure!