On Thu, 27 Mar 2003, Sunder wrote: > For the little that I get, this is what I get out of a traceroute: > > 11 acr2-loopback.Seattle.cw.net (208.172.82.62) 79.920 ms 74.381 ms > 88.037 ms > 12 bhr2-pos-0-0.Tukwilase2.cw.net (208.172.81.222) 79.107 ms 83.846 ms > 91.354 ms > 13 * csr11-ve243.Tukwilase2.cw.net (216.34.64.147) 73.553 ms 81.541 ms > 14 * * * > 15 * * * > > I've found one DNS server claiming that this is the right ip for it: > 216.34.94.186
Yup, looks like "whois" got it right - those are Cable & Wireless servers. Could just be a simple flooding DoS attack. But now how do we find all the floding packets and their sources? Patience, persistence, truth, Dr. mike
