[55774] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: probable DDOS to 195.238.3.33

daemon@ATHENA.MIT.EDU (Daniel Roesen)
Mon Feb 10 15:39:16 2003

Date: Mon, 10 Feb 2003 21:31:37 +0100
From: Daniel Roesen <dr@cluenet.de>
To: nanog@merit.edu
Mail-Followup-To: nanog@merit.edu
In-Reply-To: <4EE2F983A19E9D4DAD0CDBC8C914ADD8013E29BF@eahq-mb3.rws.ad.ea.com>; from TBulger@ea.com on Mon, Feb 10, 2003 at 12:05:55PM -0800
Errors-To: owner-nanog-outgoing@merit.edu


On Mon, Feb 10, 2003 at 12:05:55PM -0800, Bulger, Tim wrote:
> We're seeing packets with spoofed source addresses destined to
> 195.238.3.33 getting dropped on firewalls at several locations going
> outbound.  Googling has turned up nothing relating to that destination
> IP address.

inetnum:      195.238.0.0 - 195.238.31.255
netname:      SKYNET-B
descr:        Belgacom Skynet SA/NV
descr:        Internet access provider
descr:        A subsidiary of BELGACOM SA/NV
country:      BE

route:        195.238.0.0/19
descr:        Belgacom Skynet SA/NV
origin:       AS5432
notify:       noc@skynet.be

$ host irc.skynet.be
irc.skynet.be. is an alias for chick.skynet.be.
chick.skynet.be. has address 195.238.0.13

Well, close... :-P

You might want to contact noc@skynet.be...


Regards,
Daniel

home help back first fref pref prev next nref lref last post