Well, I'm stumped. I mean, really stumped.

I've had a host scanning my network for the past three days, and it
initially looked like one of the automated scans we've all become so
familiar with (unfortunately). Naturally, the automatic defense was
engaged, and I thought that would be the end of it. Nope.

It continues to send SYN packets, and although it's dropped off in attacks
to the other machines, it still pounds at the doors of two of them. Those
two machines have a couple of things in common: they are both running BIND
9, and are both OpenBSD {mumble}.

I've sent email off to the RIPE contacts for the IP (195.250.227.226), and
to the WHOIS contacts for the domain (ocem.com), and to [EMAIL PROTECTED] as
well. Nothing. If I take off the null routing on either of those machines,
it immediately starts hammering at them, with no signs of cessation. I have
considered just letting it finish, but I'm more concerned that there's a
new variant on this moronic scan that doesn't know when to quit. I suspect
that the continuation is because they are DNS servers, since I took the
blocking off of one of the other machines also running OpenBSD, and the
scanning did not resume (although I had expected it to).

I'm at a loss. If anyone knows Italian (I don't), and can contact one of:

[EMAIL PROTECTED]
[EMAIL PROTECTED]
[EMAIL PROTECTED]

or anyone at ocem.com, please, let them know that the machine is
compromised, and that they need to take it off line, and clean it up.

TIA and all that.

--
There are two ways, my friend, that you can be rich in life.
One is to make a lot of money and the other is to have few needs.

William Sloane Coffin, "Letters to a Young Doubter"
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to