[37080] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: black hat .cn networks

daemon@ATHENA.MIT.EDU (Dan Hollis)
Tue May 1 00:57:23 2001

Date: Mon, 30 Apr 2001 18:09:25 -0700 (PDT)
From: Dan Hollis <goemon@anime.net>
To: k claffy <kc@ipn.caida.org>
Cc: "Segal, Mark" <Mark.Segal@Corp.Axxent.Ca>,
	"'nanog@merit.edu'" <nanog@merit.edu>
In-Reply-To: <20010430180129.B13809@caida.org>
Message-ID: <Pine.LNX.4.30.0104301807140.12166-100000@anime.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


On Mon, 30 Apr 2001, k claffy wrote:
> On Mon, Apr 30, 2001 at 03:51:09PM -0700, Dan Hollis wrote:
>   On Mon, 30 Apr 2001, Segal, Mark wrote:
>   > if it is actually based from there...
>   The ones being picked up by the distributed intrusion sensor projects
>   indicate they are.
> what distributed intrusion sensor projects
> are those?

dshield and mynetwatch

chinanet shows up several times in the lists of 'top attack ip sources',
along with "no response" (to emails reporting to them the attacks)

-Dan



home help back first fref pref prev next nref lref last post