euglug.org got 118 (just since Aug 1), and they all got bounce to a
random IP beginning with 207.46.197.<random>.

All of July we only got 52.


> On 20010802.1825, Seth Cohn said ...
>
> Well, it's still out there.  Proof that M$
> servers don't get patched even when you get the
> FBI involved. :)  See http://www.incidents.org/
> for a good set of graphs...
> 
> grep NNNNN access.log | awk '{print $1} ' | sort
> | uniq -c | sort -rn   
> 
> and add:
> | wc -l 
> for for a quick count (of lines).
> (mine was 42... how appropriate)
> 
> Gives you a nice list like this:
> 
>       1 www.dorcas-edu.org
>       1 vdp027-rod01.gwc.internet.gr
>       1 roc-66-24-101-49.rochester.rr.com
>       1 pa95.wodzislaw.sdi.tpnet.pl
>       1 na-148-243-138-102.na.avantel.net.mx
>       1 l172.ede.bit.nl
>       1 hse-toronto-ppp299177.sympatico.ca
>       1 edumedia.f1.fhtw-berlin.de
>       1 e81167.upc-e.chello.nl
>       1 dial536.acns.fsu.edu
>       1 dhcp-205-139-250-047.adsl.dave-world.net
>       1 cr752933-a.ym1.on.wave.home.com
>       1 c852745-e.flrmnd1.tx.home.com
>       1 c210979-a.epotlnd1.or.home.com
>       1 adsl-80-1-158.mia.bellsouth.net
>       1 adsl-57503.turboline.skynet.be
>       1 66.120.169.142
>       1 66.1.139.173
>       1 66-65-70-201.nyc.rr.com
>       1 64.170.24.108
>       1 62.57.121.225
>       1 61.119.1.182
>       1 38.144.128.75
>       1 212.30.144.48
>       1 211.63.131.213
>       1 211.39.150.206
>       1 211.210.107.132
>       1 211.21.8.50
>       1 211.206.127.61
>       1 211.199.232.151
>       1 211.171.203.241
>       1 210.95.229.66
>       1 210.181.236.83
>       1 210.127.32.151
>       1 206.216.248.214
>       1 203.231.218.15
>       1 202.84.204.17
>       1 202.110.51.169
>       1 202.107.239.66
>       1 202.102.29.60
>       1 200.32.125.134
>       1 200.196.92.154
> 
> 
> 
> __________________________________________________
> Do You Yahoo!?
> Make international calls for as low as $.04/minute with Yahoo! Messenger
> http://phonecard.yahoo.com/
> 
> 

Reply via email to