[58125] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Re[2]: The in-your-face hijacking example, was: Re: Who is

daemon@ATHENA.MIT.EDU (Scott Granados)
Thu May 1 12:33:58 2003

Date: Thu, 1 May 2003 09:28:46 -0700 (PDT)
From: Scott Granados <scott@wworks.net>
To: Dan Hollis <goemon@anime.net>
Cc: "'nanog@merit.edu'" <nanog@merit.edu>
In-Reply-To: <Pine.LNX.4.44.0304302326520.29182-100000@sasami.anime.net>
Errors-To: owner-nanog-outgoing@merit.edu


Can't have one on 170.208.15.82 I null routed it some time ago as it was a
compromised machine.


On Wed, 30 Apr 2003, Dan Hollis wrote:

>
> On Wed, 30 Apr 2003 emil@atrivo.com wrote:
> > Might I mention that Spews, SpamHaus or anyone that has made these
> > claims has not even attempted to give me a call.
>
> Maybe because they expect your email to actually work, and dont care to
> spend money calling you long distance?
>
> http://groups.google.com/groups?selm=jql2avgk84hporq5cj8vdkcvsghj8ae9so%404ax.com&oe=UTF-8&output=gplain
> Your role address bounces (yes, i did verify emil@atrivo.com bounces), and
> apparently you have a portscanner on 170.208.15.82.
>
> Looking through my logs for April I have received spams from
> 170.208.17.65, 170.208.17.67, 170.208.17.70, 170.208.17.92,
> 170.208.17.112, 170.208.17.113, 170.208.17.114, 170.208.17.115
>
> You have got porno spammers in these netblocks scanning for open relays
> and relay raping innocent third parties.
>
> -Dan
> --
> [-] Omae no subete no kichi wa ore no mono da. [-]
>
>


home help back first fref pref prev next nref lref last post