Title: Tracing a spoofed IP source?

Has anyone every tried to trace the source of a spoofed DOS attack?

I've got someone with a spoofed IP address trying to tunnel into my network with service 4 and 94.

Is protocol 4 and 94 tunneling protocols?



 

Padden, Greg.vcf

Reply via email to