On Thu, 27 Mar 2003, Sunder wrote:

> For the little that I get, this is what I get out of a traceroute:
>
> 11  acr2-loopback.Seattle.cw.net (208.172.82.62)  79.920 ms  74.381 ms
> 88.037 ms
> 12  bhr2-pos-0-0.Tukwilase2.cw.net (208.172.81.222)  79.107 ms  83.846 ms
> 91.354 ms
> 13  * csr11-ve243.Tukwilase2.cw.net (216.34.64.147)  73.553 ms  81.541 ms
> 14  * * *
> 15  * * *
>
> I've found one DNS server claiming that this is the right ip for it:
> 216.34.94.186

Yup, looks like "whois" got it right - those are Cable & Wireless servers.

Could just be a simple flooding DoS attack.  But now how do we find all
the floding packets and their sources?

Patience, persistence, truth,
Dr. mike

Reply via email to