On 11/20/2003 at 10:51 AM, "Paul S. Brown" <[EMAIL PROTECTED]> wrote:
> Nope,
> Just an ISP with normal ISP type operational spam problems. I'm trying to
> quantify how often we actually appear on RBL, but I want to get some idea of
> how much credence to give to appearing on any given list.
Paging Motorola. Please leave some system resources for the rest of
us and LOG OFF when you're done. Thank you.
bye,Kai
sonet:~$ date
Mon Nov 10 13:56:46 EST 2003
sonet:~$ telnet route-views.oregon-ix.net
[]
route-views.oregon-ix.net>who
Line User Host(s) Idle
On 10/9/2003 at 12:49 PM, "Avleen Vig" <[EMAIL PROTECTED]> wrote:
> I want to create a mapping of IP addresses to ASN, for a specific like
> of IP addresses. Eg:
> 1.2.3.4
> 12.34.56.78
> etc, gathered from my system logs.
> What is the best way of doing this?
http://www.spamshield.org/#t
On Mon, 6 Oct 2003 14:01:31 -0700, Roland Dobbins wrote
> Folks,
>
> We've been handling a multi-vector DDoS - 40-byte spoofed SYN-flooding
> towards www.cisco.com (198.133.219.25/32) as well as an HTTP-AUTH
> resource-exhaustion attack, and working these issues with our
> upstreams. Our apol
On 9/25/2003 at 3:04 PM, "Susan Harris" <[EMAIL PROTECTED]> wrote to me:
> This is the third time I've contacted you concerning violations of the
> NANOG list AUP. Your message below focuses on spam/blacklists, issues
> that are not considered operational and are therefore off-topic for the
> li
On 9/25/2003 at 2:19 PM, "Deepak Jain" <[EMAIL PROTECTED]> wrote:
>> But it's ok when AboveNet does it?...or actually does much worse by
>> secretly and arbitrarily blackholing various networks at will, while
>> advertising connectivity to those networks to their BGP customers and
>> peers?
>>
[at the risk of getting whacked by Sue Harris, like: what does "operational"
mean anyway when the flood of criminal activity that's been the subject of
discussion here in recent days is frustrating massive amounts of ordinary
customers/Internet users, who will turn away from the Internet in frustr
On 9/23/2003 at 5:16 PM, "Mike Tancsa" <[EMAIL PROTECTED]> wrote:
> http://www.openrbl.org
> is also offline due to a DDoS.
And the ignorance of front-end personnel in LE agencies, unless you are
the NY Times and claim $500,000 in purely fictious damages, can be a bit
frustrating.
Spamcop and
>From the [Hijacked] list:
> The ARIN information has been updated to have up-to-date contact info for
> the original owner, the original owners' ISP is announcing 4 /18s but AT&T
> is still announcing 157.112.0.0/16. Can whoever's been bugging AT&T to stop
> announcing it to bug them some more?
(whois.arin.net once again resolves, thanks Rodney Joffe who
seems to have gotten this fixed before I could reply to him)
Now today:
route-views.oregon-ix.net>sh ip bgp 63.0.0.0/8
BGP routing table entry for 63.0.0.0/8, version 1548358
Paths: (1 available, best #1, table Default-IP-Routing-Tabl
110
BUCHU.arin.net. 3H IN A 192.100.59.110
;; Total query time: 117 msec
;; FROM: sonet.conti.nu to SERVER: 198.133.199.110
;; WHEN: Mon Sep 8 18:36:01 2003
;; MSG SIZE sent: 26 rcvd: 437
The *.nstld.com servers are answering to these queries in
normal fashion.
bye,Kai
--
&
On 9/8/2003 at 3:58 PM, "Stephen J. Wilcox" <[EMAIL PROTECTED]> wrote:
> I dont have a url for such an app (assuming one has been written) but you should
> be able to run a traceroute using the tcp ports and see where it stops?
> Steve
> On Mon, 8 Sep 2003, William Devine, II wrote:
>>
>> Ca
On 9/3/2003 at 8:17 PM, "Jeroen Massar" <[EMAIL PROTECTED]> wrote:
> -BEGIN PGP SIGNED MESSAGE-
> As people are complaining all around about ISP's,
> here is my small question. Who has a _working_ contact at
> "CalPOP" (216.240.128.0/19 and others). It is not in puck :(
> If anybody ha
On 8/17/2003 at 5:27 PM, "[EMAIL PROTECTED]" <[EMAIL PROTECTED]> wrote:
> It's just come back now. Must have been a temporary holding page while
> they did some maintenance.
> On Sun, 17 Aug 2003, [EMAIL PROTECTED] wrote:
>>
>> Hi all,
>>
>> I was just updating a couple of Windows machines
(off-topic)
On 8/4/2003 at 10:26 PM, "Jeff Kell" <[EMAIL PROTECTED]> wrote:
> After several run-ins with Edge 1 Networks [69.44.28.0/22] having their
> machines "hijack" victim machines on our networks infected with Jeem,
> and then making their spam runs, I've had it. I have reported both t
Coming back from my vacation, I had to discover that some losers
(who, no doubt, had something to lose as far as their hijacked IP space
is concerned) have attempted to DoS the MX for pac-rim.net/spamshield.org
by sending a few 100,000 spams with randomized @pac-rim.net return
addresses around Jun
On 6/9/2003 at 4:06 PM, "Christopher L. Morrow" <[EMAIL PROTECTED]> wrote:
> Sure, you are announcing 196.1.1.0/24 and only that, fine, but are you
> allowed to announce that prefix? Are you "Centre for Monitoring Indian
> Economy" ?? Or is this your direct customer and you are just the sat-link
On 5/27/2003 at 3:26 PM, I wrote:
> Speaking of the archives: www.nanog.org makes no reference to the list
> archives at http://www.nanog.org/email.html any longer - where did they
> go? humans finding and using it is desirable :) (rather than illegal web
> harvesters)
Thanks to a number of peo
I have received spam to a [EMAIL PROTECTED] address belonging
to a post to NANOG 2 years ago:
Date: Fri, 18 May 2001 13:59:06 -0400
From: Kai Schlichting <[EMAIL PROTECTED]>
Message-ID: <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: mobile.att.net MX meltdown
Speaking of
On 2/27/2003 at 9:58 PM, [EMAIL PROTECTED] wrote:
> ...
> NetRange: 69.6.0.0 - 69.6.63.255
> CIDR: 69.6.0.0/18
> NetName:WHOLE-2
> NetHandle: NET-69-6-0-0-1
> Parent: NET-69-0-0-0-0
> NetType:Direct Allocation
> NameServer: NS1.WHOLESALEBANDWIDTH.COM
> NameServer: NS2.WHOLESA
On 2/27/2003 at 1:44 PM, [EMAIL PROTECTED] (Will Yardley) wrote:
> There is no public access to rwhois.level3.net (it worked at one point,
> but, accurding to Level3, not intentionally). They say that they don't
> have to make this information available to anyone except ARIN. I was
> always under
News reports say that about 10:10am EST, a refinery (Mobile Port) at the
channel between New Jersey and Staten Island caught fire due to a propane
barge explosion:
When I passed by the Verrezano Narrows bridge (on the other side of S.I.,
towards Brooklyn) at around 10:25am, there was a GIANT plume
On 11/20/2002 at 1:37 PM, Jared Mauch <[EMAIL PROTECTED]> wrote:
> I was getting dns resolver errors earlier back.
> (like the zone expired)
> it appears someone fixed something since.
> - jared
Mental note to self: never rely on results of an investigation
you
On 11/20/2002 at 12:40 PM, <[EMAIL PROTECTED]> wrote:
> In addition to thousands of open relays, which are bad enough in
> their own right, there are also thousands of open proxy servers
> which a growing number of spammers have been using to launch spam
> runs lately. I suspect that's what you
As some of you have noticed, the BGP4 route containing the address for
route-views.oregon-ix.net has disappeared a while ago (mid-October?).
Their website seems to be gone, and I swear, I couldn't resolve
the domain for a little while just now. Has the Oregon IX been shut down?
Their route-server
ynx to VeryUglio, From Exorcism to Worldcunt.
The bigger, the more bankrupt, the more aiding and abetting.
It's 5pm: do you know who you work for?
--
"Just say No" to Spam Kai Schlichting
New York, Palo Alto, You name it Sophisticated Technical Peon
Kai'
es like 10-15 bystanding rackspace.com customers with a "Nadine-
type" mailer in neighboring IP space be damned: "move your servers into a
different slum, cause da landlord's running down 'da neighborhood".
--
"Just say No" to Spam
27 matches
Mail list logo