[148246] in North American Network Operators' Group
looking for traffic sources aimed at 192.153.154.124
daemon@ATHENA.MIT.EDU (Alan Clegg)
Fri Jan 6 10:13:56 2012
Date: Fri, 06 Jan 2012 10:12:37 -0500
From: Alan Clegg <alan@clegg.com>
To: "nanog@nanog. org list" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigA8D0256BB7ABB8881D816247
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
If anyone has some spare cycles and wants to help disrupt a DDoS, if you
can look for traffic sourced within your network, destination
192.153.154.124 port 80, I'd appreciate it.
I've been under attack for about the last 12 hours.
Other pointers to resources to trace the miscreants responsible would
also be appreciated.
Thanks,
AlanC
--=20
alan@clegg.com | aclegg@infoblox.com
1.919.355.8851
--------------enigA8D0256BB7ABB8881D816247
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAk8HD3gACgkQcKpYUrUDCYfqigCdH2CRl4Pag4gleDtdnQmfzL+q
p+IAnREEUyjpQl9zsKSV2b03eNrvacNp
=+g3o
-----END PGP SIGNATURE-----
--------------enigA8D0256BB7ABB8881D816247--