lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <009801c4e446$30a415c0$eb9df718@celeron> From: dsbryhan at chartermi.net (Scot Bryhan) Subject: TCP Port 42 port scans? hello, CAIDA, the Cooperative Association for Internet Data Analysis - (www.caida.org), also has a machine [that is actually located in arin.net's IP space - "skitter.arin.net", IP address: 192.149.252.8] that was "used to map the internet" according to hostmaster@...n.net . damn thing fell in love with my PC's IP back in late May and early June... hostmaster@...n.net told me that - "The box will be looked at to ensure it isn't improperly bombarding your network with pings. Feel free to filter out 192.149.252.8 if you so desire." Scot ----- Original Message ----- From: "Michael Scheidell" <scheidell@...nap.net> To: "James Lay" <jlay@...riben.com>; "Full-Disclosure (E-mail)" <full-disclosure@...ts.netsys.com> Sent: Monday, December 13, 2004 8:34 PM Subject: RE: [Full-Disclosure] TCP Port 42 port scans? What the heck over... > hmm well, pdx.edu has a computer scanning the world, hit hundreds of other hosts > > http://www.mynetwatchman.com/LID.asp?ip=131.252.116.141 > > > http://www.dshield.org/ipinfo.php?ip=131.252.116.141 > > > maybe you call them and ask? > > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists