David Smulsky wrote:
> Next, if you really think hes an intruder, go for the source,
> find an admin, or a ISP admin that hosts mump.bestiary.com
Careful here, since that's simply the PTR record for the IP address 204.225.173.21.
It's perfectly feasible, extremely easy and all-too-common for PTR records to be
out-of-date, misleading, or downright untruths.
In this case, the contact details for the netblock are:
OrgName: Mountain Lake Software Corporation
OrgID: MLSC-1
NetRange: 204.225.173.0 - 204.225.173.255
CIDR: 204.225.173.0/24
NetName: MTNNET
NetHandle: NET-204-225-173-0-1
Parent: NET-204-0-0-0-0
NetType: Direct Assignment
NameServer: NS.TAPSCOTT.COM
NameServer: GEAR.TORQUE.NET
NameServer: NS3.TORQUE.NET
Comment:
RegDate: 1995-01-10
Updated: 1999-04-06
TechHandle: NA12-ORG-ARIN
TechName: Network Administrator
TechPhone: +1-416-367-7300
TechEmail: [EMAIL PROTECTED]
and for the domain 'bestiary.net':
Administrative Contact:
Pete Bevin
Pete Bevin
65 Empire Ave.
Toronto, ON M4M2L3
CA
Phone: (416) 461-5871
Email: [EMAIL PROTECTED]
Well, look. The area code's the same. You'll be needing to contact either of the two
listed above, and explain that MUMP.BESTIARY.NET is possibly cracked, or at the very
least being misused. If they're the ones being the bad person, they'll soon back off.
If however they're simply innocent bystanders and their machine has been broken into,
you can walk off safe in the knowledge that you've just done your bit to secure their
network. Especially as it's one of their primary nameservers. There, ain't that a nice
warm feeling? :)
Graeme
--
Graeme Fowler
System Administrator
Host Europe Group PLC
_______________________________________________
cobalt-security mailing list
[EMAIL PROTECTED]
http://list.cobalt.com/mailman/listinfo/cobalt-security