To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
----------
Hi,

since

xinetd_open("Apr-3","02:02:27","ftp","211.99.156.152").
ftp_connect("Apr-3","02:03:09","211.99.156.152").
ftp_complained("([EMAIL PROTECTED]) [WARNING] Authentication failed for user 
[Administrator]","Apr-3","02:03:11").
ftp_complained("([EMAIL PROTECTED]) [WARNING] Authentication failed for user 
[Administrator]","Apr-3","02:03:47").
ftp_complained("([EMAIL PROTECTED]) [ERROR] Too many authentication 
failures","Apr-3","02:04:05").
xinetd_close("Apr-3","02:04:05","ftp").

xinetd_open("Apr-3","15:14:20","ftp","213.61.14.86").
ftp_connect("Apr-3","15:14:22","www.bscreen.de").
ftp_complained("([EMAIL PROTECTED]) [WARNING] Authentication failed for user 
[Administrator]","Apr-3","15:14:23").
ftp_complained("([EMAIL PROTECTED]) [ERROR] Too many authentication 
failures","Apr-3","15:15:14").
xinetd_close("Apr-3","15:15:14","ftp").

I have seen a mounting number of nocks at my ftp door.

I tried to reach the later system but their mailer could not deliver:

"<[EMAIL PROTECTED]>: mail for mail.bscreen.de loops back to myself"

Most of them come from dynamic addresses.

User "[EMAIL PROTECTED]" suggests a windows on the attacking machine.

Only user [Administrator] on the target system suggests they are looking
for a windows system.

Normally "visitors" go away before my inetd has started in.ftpd. So at least
they have changed behaviour.

Recent visits last for hours

xinetd_open("Apr-6","20:33:53","ftp","91.121.10.168").
ftp_connect("Apr-6","20:33:55","ns23102.ovh.net").
ftp_complained("([EMAIL PROTECTED]) [WARNING] Authentication failed for user 
[Administrator]","Apr-6","20:33:56").
ftp_complained("([EMAIL PROTECTED]) [WARNING] Authentication failed for user 
[Administrator]","Apr-6","20:34:32").
ftp_complained("([EMAIL PROTECTED]) [ERROR] Too many authentication 
failures","Apr-6","20:34:48").
xinetd_close("Apr-6","20:34:49","ftp").
...
xinetd_open("Apr-6","23:32:39","ftp","91.121.10.168").
ftp_connect("Apr-6","23:32:39","ns23102.ovh.net").
ftp_complained("([EMAIL PROTECTED]) [WARNING] Authentication failed for user 
[Administrator]","Apr-6","23:32:39").
ftp_complained("([EMAIL PROTECTED]) [ERROR] Too many authentication 
failures","Apr-6","23:33:33").
xinetd_close("Apr-6","23:33:33","ftp").

This one is still going on.

Starting nmap V. 3.00 ( www.insecure.org/nmap/ )
Interesting ports on ns23102.ovh.net (91.121.10.168):
(The 1589 ports scanned but not shown below are in state: closed)
Port       State       Service
21/tcp     open        ftp
22/tcp     open        ssh
25/tcp     open        smtp
53/tcp     open        domain
80/tcp     open        http
110/tcp    open        pop-3
111/tcp    open        sunrpc
143/tcp    open        imap2
445/tcp    filtered    microsoft-ds
465/tcp    open        smtps
5432/tcp   open        postgres
10000/tcp  open        snet-sensor-mgmt

Nmap run completed -- 1 IP address (1 host up) scanned in 58 seconds


DNS seems to be working, returns the real root-servers.

ftp, ssh, smtp do not answer.

http wants to see username and password.


Kind regards
Peter and Karin Dambier

-- 
Peter and Karin Dambier
Cesidian Root - Radice Cesidiana
Rimbacher Strasse 16
D-69509 Moerlenbach-Bonsweiher
+49(6209)795-816 (Telekom)
+49(6252)750-308 (VoIP: sipgate.de)
mail: [EMAIL PROTECTED]
mail: [EMAIL PROTECTED]
http://iason.site.voila.fr/
https://sourceforge.net/projects/iason/
http://www.cesidianroot.com/

_______________________________________________
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets

Reply via email to