[43796] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: EXAMPLE: ### xxx Canada detected a penetration attempt from 209.123.x.229. Incident# xxxx

daemon@ATHENA.MIT.EDU (Vivien M.)
Fri Oct 26 09:56:35 2001

From: "Vivien M." <vivienm@dyndns.org>
To: <nanog@nanog.org>
Date: Fri, 26 Oct 2001 09:57:01 -0400
Message-ID: <NDBBKECCEHKIHGIMJECACEEBCLAA.vivienm@dyndns.org>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
In-Reply-To: <Pine.WNT.4.33.0110260902230.1388-100000@neon>
Errors-To: owner-nanog-outgoing@merit.edu


> -----Original Message-----
> From: owner-nanog@merit.edu [mailto:owner-nanog@merit.edu]On Behalf Of
> Alex Rubenstein
> Sent: October 26, 2001 9:03 AM
> To: nanog@nanog.org
> Subject: EXAMPLE: ### xxx Canada detected a penetration attempt from
> 209.123.x.229. Incident# xxxx
>=20
> Pursuant to my previous post, I just rec'd this. Not exactly the same, =
but
> very similar.
>=20
> Kind of my point; SO WHAT THAT THIS PERSON WAS SCANNED? Is scanning
> actually an illegal activity? Was anything actually hacked, cracked, =
or
> 0wn3d?
>=20
> It's an absurd waste of resources to be emailed by automagic systems =
every
> time someone sends a stray packet.

At least that one is relatively _polite_; we've received some from =
someone who was very rude and threatened to break into our systems to =
retaliate. Actually, I think it even hinted that the retaliation system =
was automated... not exactly the most comforting thing out there.

Vivien
--=20
Vivien M.
vivienm@dyndns.org
Assistant System Administrator
Dynamic DNS Network Services
http://www.dyndns.org/


home help back first fref pref prev next nref lref last post