lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <003a01c2fafe$d3720f60$6400a8c0@bytew2k>
From: steve at bytebusters.ca (Stephen Menard)
Subject: Re: improper scan abuse

I do not accept those terms
Or maybe everyone should make such claims!

ports below have _nothing_  to do with freaking email spam
dst:10.162.128.194:6588
dst:10.162.128.194:4480
dst:10.162.128.194:3128
dst:10.162.128.194:1182
dst:10.162.128.194:81 Rule:
dst:10.162.128.194:80 Rule:
dst:10.162.128.194:1180
dst:10.162.128.194:1080
dst:10.162.128.194:1180
dst:10.162.128.194:1080
 dst:10.162.128.194:6588
dst:10.162.128.194:4480
dst:10.162.128.194:3128
dst:10.162.128.194:1182
dst:10.162.128.194:81 Rule:
dst:10.162.128.194:80 Rule:
dst:10.162.128.194:1180
dst:10.162.128.194:1080
dst:10.162.128.194:1180
dst:10.162.128.194:1080
dst:10.162.128.194:6588
:10.162.128.194:4480
dst:10.162.128.194:3128
dst:10.162.128.194:1182
dst:10.162.128.194:81 Rule:
 dst:10.162.128.194:80 Rule:
dst:10.162.128.194:1180
 dst:10.162.128.194:1080
> > Rule: Default deny

----- Original Message -----
From: "Atlantic.Net Abuse Department" <abuse@...antic.net>
To: "Stephen Menard" <steve@...ebusters.ca>
Sent: Friday, April 04, 2003 5:51 PM
Subject: Re: improper scan abuse


> Please see http://njabl.org
>
> o--------------------------------o
>   Atlantic.Net - Abuse Department
>   2815 NW 13th Street, Suite 201
>      Gainesville, FL  32609
>          1-800-921-9328
> o--------------------------------o
>
> On Thu, 3 Apr 2003, Stephen Menard wrote:
>
> >    abuse@...antic.net
> > time AST GMT -0400
> > default deny firewall
> > no servers here
> > do not scan- will report abuse
> > ==================================
> >
> > Apr/02/2003 16:04:32
> >  Drop TCP packet from WAN src:209.208.0.15:10804 dst:10.162.128.194:25
Rule:
> > Default deny
> > Apr/02/2003 16:04:26
> >  Drop TCP packet from WAN src:209.208.0.15:10804 dst:10.162.128.194:25
Rule:
> > Default deny
> > Apr/02/2003 16:04:23
> >  Drop TCP packet from WAN src:209.208.0.15:10804 dst:10.162.128.194:25
Rule:
> > Default deny
> > Apr/02/2003 16:04:17
> >  Drop TCP packet from WAN src:209.208.0.15:9784 dst:10.162.128.194:6588
> > Rule: Default deny
> > Apr/02/2003 16:04:17
> >  Drop TCP packet from WAN src:209.208.0.15:9783 dst:10.162.128.194:4480
> > Rule: Default deny
> > Apr/02/2003 16:04:17
> >  Drop TCP packet from WAN src:209.208.0.15:9782 dst:10.162.128.194:3128
> > Rule: Default deny
> > Apr/02/2003 16:04:17
> >  Drop TCP packet from WAN src:209.208.0.15:9781 dst:10.162.128.194:1182
> > Rule: Default deny
> > Apr/02/2003 16:04:17
> >  Drop TCP packet from WAN src:209.208.0.15:9780 dst:10.162.128.194:81
Rule:
> > Default deny
> > Apr/02/2003 16:04:17
> >  Drop TCP packet from WAN src:209.208.0.15:9779 dst:10.162.128.194:80
Rule:
> > Default deny
> > Apr/02/2003 16:04:17
> >  Drop TCP packet from WAN src:209.208.0.15:9778 dst:10.162.128.194:1180
> > Rule: Default deny
> > Apr/02/2003 16:04:17
> >  Drop TCP packet from WAN src:209.208.0.15:9777 dst:10.162.128.194:1080
> > Rule: Default deny
> > Apr/02/2003 16:04:17
> >  Drop TCP packet from WAN src:209.208.0.15:9776 dst:10.162.128.194:1180
> > Rule: Default deny
> > Apr/02/2003 16:04:17
> >  Drop TCP packet from WAN src:209.208.0.15:9775 dst:10.162.128.194:1080
> > Rule: Default deny
> > Apr/02/2003 16:04:11
> >  Drop TCP packet from WAN src:209.208.0.15:9784 dst:10.162.128.194:6588
> > Rule: Default deny
> > Apr/02/2003 16:04:11
> >  Drop TCP packet from WAN src:209.208.0.15:9783 dst:10.162.128.194:4480
> > Rule: Default deny
> > Apr/02/2003 16:04:11
> >  Drop TCP packet from WAN src:209.208.0.15:9782 dst:10.162.128.194:3128
> > Rule: Default deny
> > Apr/02/2003 16:04:11
> >  Drop TCP packet from WAN src:209.208.0.15:9781 dst:10.162.128.194:1182
> > Rule: Default deny
> > Apr/02/2003 16:04:11
> >  Drop TCP packet from WAN src:209.208.0.15:9780 dst:10.162.128.194:81
Rule:
> > Default deny
> > Apr/02/2003 16:04:11
> >  Drop TCP packet from WAN src:209.208.0.15:9779 dst:10.162.128.194:80
Rule:
> > Default deny
> > Apr/02/2003 16:04:11
> >  Drop TCP packet from WAN src:209.208.0.15:9778 dst:10.162.128.194:1180
> > Rule: Default deny
> > Apr/02/2003 16:04:11
> >  Drop TCP packet from WAN src:209.208.0.15:9777 dst:10.162.128.194:1080
> > Rule: Default deny
> > Apr/02/2003 16:04:11
> >  Drop TCP packet from WAN src:209.208.0.15:9776 dst:10.162.128.194:1180
> > Rule: Default deny
> > Apr/02/2003 16:04:11
> >  Drop TCP packet from WAN src:209.208.0.15:9775 dst:10.162.128.194:1080
> > Rule: Default deny
> > Apr/02/2003 16:04:08
> >  Drop TCP packet from WAN src:209.208.0.15:9784 dst:10.162.128.194:6588
> > Rule: Default deny
> > Apr/02/2003 16:04:08
> >  Drop TCP packet from WAN src:209.208.0.15:9783 dst:10.162.128.194:4480
> > Rule: Default deny
> > Apr/02/2003 16:04:08
> >  Drop TCP packet from WAN src:209.208.0.15:9782 dst:10.162.128.194:3128
> > Rule: Default deny
> > Apr/02/2003 16:04:08
> >  Drop TCP packet from WAN src:209.208.0.15:9781 dst:10.162.128.194:1182
> > Rule: Default deny
> > Apr/02/2003 16:04:08
> >  Drop TCP packet from WAN src:209.208.0.15:9780 dst:10.162.128.194:81
Rule:
> > Default deny
> > Apr/02/2003 16:04:08
> >  Drop TCP packet from WAN src:209.208.0.15:9779 dst:10.162.128.194:80
Rule:
> > Default deny
> > Apr/02/2003 16:04:08
> >  Drop TCP packet from WAN src:209.208.0.15:9778 dst:10.162.128.194:1180
> > Rule: Default deny
> > Apr/02/2003 16:04:08
> >  Drop TCP packet from WAN src:209.208.0.15:9777 dst:10.162.128.194:1080
> > Rule: Default deny
> > Apr/02/2003 16:04:08
> >  Drop TCP packet from WAN src:209.208.0.15:9776 dst:10.162.128.194:1180
> > Rule: Default deny
> > Apr/02/2003 16:04:08
> >  Drop TCP packet from WAN src:209.208.0.15:9775 dst:10.162.128.194:1080
> > Rule: Default deny
> >
> > ---
> > Outgoing mail is certified Virus Free.
> > Checked by AVG anti-virus system (http://www.grisoft.com).
> > Version: 6.0.465 / Virus Database: 263 - Release Date: 3/25/2003
> >
>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ