Christian Bierre wrote:
>
> Lloyd Bryant wrote:
>> And I've got several more sources doing exactly the same thing:
>
>> 64.62.210.2
>> 64.62.210.3
>> 64.62.210.4
>> 64.62.210.66
>> 64.62.210.67
>> 64.62.210.68
>>
>> 78.129.136.194
>> 78.129.136.195
>
> Do you have any more information e.g., some sample query hits?
>
> Is this a typo? It belongs to a university unrelated to the above addresses.
>> 78.128.136.196
Yes - that one was a typo - should have been 78.129.136.196
>
>> Tracerouting them shows the 64.62.210.x addresses route via Hurricane
>> Electric (no surprise there), while the 78.129.136.x addresses route via
>> RapidSwitch (which we've already got a couple of "hostiles.txt" entries on).
>
> You don't have to traceroute them. That's also *dangerous* because they can
> see
> that. whoooooo! Just use whois. Sometimes the hosters/ISPs even run a whois
> server and you can check which business/individual the range is assigned to
> which
> helps to correlate things.
Thanks for the tip.
Here's the "more info" you requested:
* * * * *
07-10-08 15:31:37 (WARNING): [weird #1] node 64.62.210.195:12480
(LimeWire/4.12.8) advertised 64.62.210.195 but now says Query Hits from
193.23.174.86:48294
----------------- Query Hit Data (weird):
Offset 0 1 2 3 4 5 6 7 8 9 a b c d e f 0123456789abcdef
0 03 a6 bc c1 17 ae 56 04 10 00 00 1a 00 00 00 20 ......V.........
16 1d 30 00 30 32 5f 2d 5f 69 74 27 73 20 61 6c 72 .0.02_-_it's.alr
32 69 67 68 74 2e 6d 70 33 00 75 72 6e 3a 73 68 61 ight.mp3.urn:sha
48 31 3a 54 50 42 32 56 4a 4d 36 44 4f 46 34 46 32 1:TPB2VJM6DOF4F2
64 43 4c 34 57 47 4e 55 50 43 33 57 57 55 50 4f 4b CL4WGNUPC3WWUPOK
80 4b 48 1c c3 82 43 54 44 80 6d 18 45 00 57 00 00 KH...CTD.m.E.W..
96 00 40 6a 21 00 30 32 2d 49 74 27 73 20 41 6c 72 [EMAIL PROTECTED]'s.Alr
112 69 67 68 74 5f 31 32 38 5f 6c 61 6d 65 5f 63 62 ight_128_lame_cb
128 72 28 61 6c 62 75 6d 20 76 65 72 73 69 6f 6e 29 r(album.version)
144 2e 6d 34 61 00 75 72 6e 3a 73 68 61 31 3a 4d 51 .m4a.urn:sha1:MQ
160 4a 53 32 32 58 58 53 32 45 43 43 32 43 4f 4e 47 JS22XXS2ECC2CONG
176 32 4e 42 49 47 42 57 57 52 52 4f 4b 4b 48 1c c3 2NBIGBWWRROKKH..
192 82 43 54 44 80 6d 18 45 00 56 00 00 00 90 ee 30 .CTD.m.E.V.....0
208 00 30 32 2d 69 74 27 73 20 61 6c 72 69 67 68 74 .02-it's.alright
224 2d 31 36 30 5f 6c 61 6d 65 5f 63 62 72 2e 6d 34 -160_lame_cbr.m4
240 61 00 75 72 6e 3a 73 68 61 31 3a 54 33 32 51 4a a.urn:sha1:T32QJ
Offset 0 1 2 3 4 5 6 7 8 9 a b c d e f 0123456789abcdef
256 48 4f 34 32 36 46 49 33 47 55 32 4d 57 34 4c 49 HO426FI3GU2MW4LI
272 32 32 54 50 52 55 51 4f 4b 4b 48 1c c3 82 43 54 22TPRUQOKKH...CT
288 44 80 6d 18 45 00 4c 49 4d 45 04 3c 39 69 01 01 D.m.E.LIME..I
672 a4 e3 25 ae 3d 4f eb ff 7c 05 3e a6 01 96 00 ..%.=O..|.>....
----------------- (687 bytes).
07-10-08 15:31:37 (WARNING): [weird #2] Node 64.62.210.195:12480
(LimeWire/4.12.8) has GUID 49a4e325ae3d4febff7c053ea6019600 but used
5baae3910b1c4f70ffe0057dff01f700 in Q-Hit (699 bytes) [hops=1, TTL=4]
07-10-08 15:31:37 (WARNING): [weird #3] node 64.62.210.195:12480
(LimeWire/4.12.8) advertised 193.23.174.86 but now says Query Hits from
68.37.223.25:16182
* * * * *
07-10-08 15:32:36 (WARNING): [weird #1] node 64.62.210.194:52768
(LimeWire/4.12.8) advertised 64.62.210.194 but now says Query Hits from
84.62.244.173:23094
----------------- Query Hit Data (weird):
Offset 0 1 2 3 4 5 6 7 8 9 a b c d e f 0123456789abcdef
0 03 36 5a 54 3e f4 ad 2c 01 00 00 59 00 00 00 c0 .6ZT>..,...Y....
16 95 2c 00 31 37 2e 20 6c 69 67 68 74 20 6d 79 20 .,.17..light.my.
32 66 69 72 65 2e 6d 34 61 00 75 72 6e 3a 73 68 61 fire.m4a.urn:sha
48 31 3a 47 4e 4f 56 32 52 58 32 53 4d 32 32 37 48 1:GNOV2RX2SM227H
64 52 4a 32 53 58 36 32 4f 41 32 53 50 51 55 4f 4e RJ2SX62OA2SPQUON
80 50 4f 1c c3 82 43 54 44 80 6d 18 45 00 33 00 00 PO...CTD.m.E.3..
96 00 b0 8b 36 00 4c 69 67 68 74 20 4d 79 20 46 69 ...6.Light.My.Fi
112 72 65 2d 55 62 34 30 2e 77 6d 61 00 75 72 6e 3a re-Ub40.wma.urn:
128 73 68 61 31 3a 34 37 46 57 36 54 32 34 36 32 49 sha1:47FW6T2462I
144 4e 50 43 4b 45 52 51 32 57 42 33 35 54 56 55 52 NPCKERQ2WB35TVUR
160 53 4f 4e 54 4f 1c c3 82 43 54 44 80 6d 18 45 00 SONTO...CTD.m.E.
176 4b 00 00 00 c0 85 96 00 4c 69 67 68 74 20 4d 79 K.......Light.My
192 20 46 69 72 65 20 2d 20 55 62 34 30 20 2d 20 74 .Fire.-.Ub40.-.t
208 6f 72 72 65 6e 74 61 7a 6f 73 2e 63 6f 6d 2e 77 orrentazos.com.w
224 6d 61 00 75 72 6e 3a 73 68 61 31 3a 4d 58 37 4c ma.urn:sha1:MX7L
240 49 41 32 45 50 36 4f 4a 56 56 49 51 33 36 52 4e IA2EP6OJVVIQ36RN
Offset 0 1 2 3 4 5 6 7 8 9 a b c d e f 0123456789abcdef
256 4f 33 45 44 50 54 56 53 4f 4e 57 4f 1c c3 82 43 O3EDPTVSONWO...C
272 54 44 80 6d 18 45 00 4c 49 4d 45 04 3c 39 35 01 TD.m.E.LIME.<
400 61 75 64 69 6f 20 74 69 74 6c 65 3d 22 4c 69 67 audio.title="Lig
416 68 74 20 4d 79 20 46 69 72 65 22 20 73 65 63 6f ht.My.Fire".seco
432 6e 64 73 3d 22 32 32 35 22 20 62 69 74 72 61 74 nds="225".bitrat
448 65 3d 22 39 36 22 20 69 6e 64 65 78 3d 22 30 22 e="96".index="0"
464 2f 3e 3c 61 75 64 69 6f 20 61 72 74 69 73 74 3d />.....
608 a6 fa 4f c6 ff 5e 05 a7 f1 00 3b 00 ..O..^....;.
----------------- (620 bytes).
07-10-08 15:32:36 (WARNING): [weird #2] Node 64.62.210.194:52768
(LimeWire/4.12.8) has GUID a49ae312a6fa4fc6ff5e05a7f1003b00 but used
d19be3372bbf4fe3fff905c494006800 in Q-Hit (685 bytes) [hops=1, TTL=4]
07-10-08 15:32:36 (WARNING): [weird #3] node 64.62.210.194:52768
(LimeWire/4.12.8) advertised 84.62.244.173 but now says Query Hits from
24.230.44.159:18941
* * * * *
It's the same behaviour as before - The nodes are sending query hits with
varying IP addresses. For each of these, I get the exact same pattern, until
it hits MAX_WEIRD_MSG and is disconnected with a security violation. So far,
all of the query hits have been for audio files (mp3, wma, m4a).
Note that all of these report the same vendor (Limewire 4.12.8).
And I've picked up a couple of new ones. Here's the full list of addresses
(with ports) that I've caught in this behavior:
64.62.210.2:2668
64.62.210.2:3308
64.62.210.2:34200
64.62.210.2:39036
64.62.210.2:43610
64.62.210.2:48895
64.62.210.2:50769
64.62.210.2:56321
64.62.210.2:57196
64.62.210.2:60001
64.62.210.3:21777
64.62.210.3:32085
64.62.210.3:42775
64.62.210.3:44404
64.62.210.3:58403
64.62.210.4:49107
64.62.210.4:52713
64.62.210.4:55577
64.62.210.4:60984
64.62.210.66:2482
64.62.210.66:4753
64.62.210.66:63098
64.62.210.66:64201
64.62.210.67:10070
64.62.210.67:12497
64.62.210.67:33383
64.62.210.67:37377
64.62.210.67:42784
64.62.210.67:52350
64.62.210.68:12316
64.62.210.68:30965
64.62.210.68:39403
64.62.210.68:42283
64.62.210.68:51446
64.62.210.68:54860
64.62.210.68:64875
64.62.210.194:18219
64.62.210.194:29079
64.62.210.194:46586
64.62.210.194:8269
64.62.210.195:15423
64.62.210.195:21109
64.62.210.195:21295
64.62.210.195:33465
64.62.210.195:33544
64.62.210.195:40568
64.62.210.195:42204
64.62.210.195:59786
64.62.210.195:8736
64.62.210.196:1203
64.62.210.196:12875
64.62.210.196:15054
64.62.210.196:19510
64.62.210.196:24982
64.62.210.196:25451
64.62.210.196:37360
64.62.210.196:41339
64.62.210.196:41684
64.62.210.196:63747
64.62.214.66:61718
64.62.214.66:65244
64.62.214.66:8734
64.62.214.67:16583
64.62.214.67:37236
64.62.214.67:39182
64.62.214.68:11865
64.62.214.68:22690
64.62.214.68:30510
64.62.214.68:52299
64.62.214.68:7758
78.129.136.194:14112
78.129.136.194:14506
78.129.136.194:17646
78.129.136.194:30975
78.129.136.194:59832
78.129.136.194:60668
78.129.136.194:64981
78.129.136.195:14258
78.129.136.195:15823
78.129.136.195:57627
78.129.136.195:62307
78.129.136.195:7942
78.129.136.196:21222
78.129.136.196:29123
78.129.136.196:40755
78.129.136.196:42916
78.129.136.228:1669
78.129.136.228:47797
78.129.136.228:52646
The 64.62.210.x addresses are Hurricane Electric. The 64.62.214.x addresses
trace back to a "Michael Dillon" using "radianz.com" as an ISP. The
78.129.136.x addresses seem to belong to "Darkstar Management", with
RapidSwitch as the ISP.
Let me know if you need more detail. I've currently got a 58Mb "errors" file,
which should provide enough detail for just about anything :-)
Lloyd B.
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
gtk-gnutella-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/gtk-gnutella-devel