North American Network Operators Group Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical Re: a list of hosts in a RPC BOTNET, mostly 209.x.x.x,
Pascal Gloor ([email protected]) wrote: > > > The controlling node for this problem seems to be: > > > > spaley [email protected] > > This is me, and I blocked the channel. I'm part of the Abuse-Exploit Term of > Undernet and an Undernet Administrator. I am, for sure, not the originator > of those trojans! > Hi Pascal, Hi Nanog, i remember that i saw an old cartoon on userfriendly. the 31337 way is: !SYN 127.0.0.1 let them SYN off their own network and repeat it until it stops. it does not harm ANY resources, except the infected hosts. just my .2 cents --jan -- Jan Czmok, Network Engineering & Support, Global Access Telecomm, Inc. Ph.: +49 69 299896-35 - fax: +49 69 299896-40 - sip:13129*[email protected]
|