Security Incidents mailing list archives
Re: scan log and subsequent response from the host's ISP
From: goemon () SASAMI ANIME NET (Dan Hollis)
Date: Wed, 5 Jul 2000 16:08:12 -0700
On Mon, 3 Jul 2000, Bradley Woodward wrote:
These scans are so common, I wouldn't bother posting them, except for the rather disappointing response from the ISP's support department. I've included an edited log file and email response.
Hm time to blackhole route 212.216.184.0 - 212.216.191.255? Their response definitely makes them rogue. -Dan
Current thread:
- scan log and subsequent response from the host's ISP Bradley Woodward (Jul 02)
- Fwd: [Fw: Ive been broken into ] JEFF WATSON (Jul 05)
- version.bind from zen.isi.edu Patrick Oonk (Jul 05)
- Re: scan log and subsequent response from the host's ISP Patrick Oonk (Jul 05)
- Re: scan log and subsequent response from the host's ISP Dan Hollis (Jul 05)
- Re: scan log and subsequent response from the host's ISP Dan Hollis (Jul 05)
- Re: scan log and subsequent response from the host's ISP Talisker (Jul 10)
- Re: scan log and subsequent response from the host's ISP Pauel Loshkin (Jul 05)
- how to close security holes from nessus vulnerability scan report ? Chew Poh Chang (CAPL) (Jul 06)
- Snort SMTP expn-root Oxenreider, Jeff (Jul 06)
- Re: Snort SMTP expn-root Joe McAlerney (Jul 06)
- Re: Snort SMTP expn-root Bill Pennington (Jul 06)
- Re: Snort SMTP expn-root dyer (Jul 06)
- Simultaneous Attacks Harlan S. Barney, Jr. (Jul 06)
- Re: Simultaneous Attacks Valdis Kletnieks (Jul 07)
(Thread continues...)