PaulDotCom mailing list archives

http://twitter.com/sotohide_log


From: xgermx at gmail.com (xgermx)
Date: Mon, 28 Dec 2009 14:49:17 -0600

Looks like they have a twitter list as well http://twitter.com/sotohide/misc

On Mon, Dec 28, 2009 at 1:57 PM, Nicholas B. <nberthaume at gmail.com> wrote:

I see this as being ripe for abuse provided you can determine which
system(s) are blocking the connections.  Using twitter to enumerate
how they block ssh connection attempts and then working around these.

On Mon, Dec 28, 2009 at 1:12 PM, Scott Webster <websterstech at gmail.com>
wrote:
Its been running from 10/9/2009, using perl net. And not very productive,
the times seem random.



From: pauldotcom-bounces at mail.pauldotcom.com
[mailto:pauldotcom-bounces at mail.pauldotcom.com] On Behalf Of xgermx
Sent: Monday, December 28, 2009 8:46 AM
To: PaulDotCom Security Weekly Mailing List
Subject: [Pauldotcom] http://twitter.com/sotohide_log



So I was checking some of my web server logs and I ran across an SHH
brute
force attack coming from a Chinese IP. Upon googling the IP I find this
http://twitter.com/sotohide_log
Does anyone have any insight?

_______________________________________________
Pauldotcom mailing list
Pauldotcom at mail.pauldotcom.com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

_______________________________________________
Pauldotcom mailing list
Pauldotcom at mail.pauldotcom.com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.pauldotcom.com/pipermail/pauldotcom/attachments/20091228/3f59f7c5/attachment.htm 


Current thread: