[119874] in North American Network Operators' Group
Re: port scanning from spoofed addresses
daemon@ATHENA.MIT.EDU (Charles Wyble)
Thu Dec 3 13:02:51 2009
From: Charles Wyble <charles@thewybles.com>
In-Reply-To: <483E6B0272B0284BA86D7596C40D29F9D775E7EE2C@PUR-EXCH07.ox.com>
Date: Thu, 3 Dec 2009 10:00:32 -0800
To: Matthew Huff <mhuff@ox.com>
Cc: " \(nanog@nanog.org\)" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Dec 3, 2009, at 9:53 AM, Matthew Huff wrote:
> The source address appears to be fixed as well as the source port =
(6666), scanning different destinations and ports.
>=20
>=20
Some script kiddies found nmap and decided to target you for some =
reason. It happens. It's annoying.=20=