North American Network Operators Group|
Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical
Re: a list of hosts in a RPC BOTNET, mostly 209.x.x.x,
Someone has changed the channel topic to "CLOSED, Thanks for the post to NANOG :-(" But I don't see hosts being k-lined - I imagine if IRCops took an interest in this they'd be lopping off heads. The controlling node for this problem seems to be: spaley email@example.com But the forward lookup on the name leads to RFC 1918 space. The nice folks in #hack seem to have taken an interest in this problem ... perhaps they have some secret t3kn33k for dealing with such things. ~I've tried contacting abuse departments of several of these isps and none of them seem ~to care, so I figured I would post the info ~here, and maybe someone will let them know, the biggest offender is atlantech. These ~are all hosts that have been compromised by ~the same person, they're being used to SYN flood 188.8.131.52 ~If you want to see this glorious channel for your self its called #!LPOL! on Undernet.