Home page logo

nanog logo nanog mailing list archives

Re: a list of hosts in a RPC BOTNET, mostly 209.x.x.x,
From: Jan Czmok <jan.czmok () gatel net>
Date: Wed, 6 Aug 2003 20:34:34 +0200

Pascal Gloor (pascal.gloor () spale com) wrote:

  The controlling node for this problem seems to be:

spaley   spale () le seul ircop a cul nu

This is me, and I blocked the channel. I'm part of the Abuse-Exploit Term of
Undernet and an Undernet Administrator. I am, for sure, not the originator
of those trojans!

Hi Pascal,
Hi Nanog,

i remember that i saw an old cartoon on userfriendly. the 31337 way is:


let them SYN off their own network and repeat it until it stops.
it does not harm ANY resources, except the infected hosts.

just my .2 cents


Jan Czmok, Network Engineering & Support, Global Access Telecomm, Inc.
Ph.: +49 69 299896-35 - fax: +49 69 299896-40 - sip:13129*522 () inoc-dba pch net

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]