[191655] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Krebs on Security booted off Akamai network after DDoS attack

daemon@ATHENA.MIT.EDU (Ca By)
Sat Sep 24 22:49:10 2016

X-Original-To: nanog@nanog.org
In-Reply-To: <6CB7A90CA0C0D3CE.6E724E09-9FD0-4486-89BF-1A624A0F076A@mail.outlook.com>
From: Ca By <cb.list6@gmail.com>
Date: Sat, 24 Sep 2016 19:46:59 -0700
To: Justin Paine <justin@cloudflare.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

On Saturday, September 24, 2016, Justin Paine via NANOG <nanog@nanog.org>
wrote:

>
> DNS Results for query A krebsonsecurity.comAnswer:krebsonsecurity.com 157
> IN A 130.211.45.45
>
> On Google now.
>
>
Next question.

Will google use the information from the telemetry, rumored to be webcams,
to defang the bot ?  Like post an informative message that the source
network is hosting a bad actor (same nat ipv4, /25, ... ). Or , work with
the access networks (Comcast, rcs/rds, china telecom) to disconnect and
manage the abusers ?


>

home help back first fref pref prev next nref lref last post