Byron,

Have you contacted the admin at
charcot.neurology.washington.edu? I'm sure they would
want to know that one of their machines is being used
for this purpose.

Registrant:
University of Washington (WASHINGTON-DOM)
   4545 15th Ave NE
   Seattle, WA 98105-4527
   US

   Domain Name: WASHINGTON.EDU

   Administrative Contact, Technical Contact:
      UW Network Operations Center  (UW-NOC) 
[EMAIL PROTECTED]
      University of Washington
      Networks and Distributed Computing
      4545 15th Avenue NE,  354841
      Seattle, WA 98105-4527
      US
      (206) 543-5128
      Fax- (206) 685-4044
   Billing Contact:
      InterNIC Billing  (IB173-ORG) 
[EMAIL PROTECTED]
      University of Washington
      Computing and Communications
      Networks&Distributed Computing
      4545 15th Ave NE
      Seattle, WA 98195
      206-685-6233

   Record last updated on 06-Mar-2000.
   Record created on 04-Sep-1986.
   Database last updated on 5-Nov-2001 19:06:00 EST.

   Domain servers in listed order:

   HANNA.CAC.WASHINGTON.EDU     140.142.5.5
   MARGE.CAC.WASHINGTON.EDU     140.142.5.13
   NS.UNET.UMN.EDU              128.101.101.101

John Hebert

--- john beamon <[EMAIL PROTECTED]> wrote:
> portmap is a service associated with NFS, and I
> *think* a few RPC calls.
> It's a necessary element in NFS, though.  This looks
> like some sort of bot
> or script that's been left running in the background
> until you screw up
> and turn this service on.  I can recommend a couple
> things.  You might
> want to add a black hole route for this guy, saying
> that the path to his
> box is through 127.0.0.1.  You might want to start a
> little scripting
> project to remove lines containing "blah", listed in
> a conf file
> somewhere, from your logs on a periodic basis.  I
> have a set of tools for
> removing all the "C:\...\winnt\" requests from my
> web server logs,
> courtesy of CR and nimbda.  It'd be neat to expand
> that to something like
> a conf_file loaded into a Perl hash, then export
> each line that doesn't
> match anything in the hash to a tmp file, then copy
> the tmp file back to
> the original.  I don't really "do" Perl yet, but I'm
> a little familiar
> with the vocab.
> 
> Any request blocked by an ipchains firewall, which
> is "doing its job",
> goes to logs.  The idea is not to prevent logging,
> but to prune it and
> acclimate it once a harmless but persisten intruder
> has been identified.
> If someone spends a week scanning a port I don't
> have open, I figure
> they've left it running the background and waiting
> for a reply.  It likely
> won't go away.  I had a guy scan a particular port
> of mine several times a
> minute for over three months.  I eventually just
> started "grep -v"
> removing his IP from my logs, but the firewall was
> doing its job.
> 
> -- 
> -j
> 
> On Mon, 5 Nov 2001, Byron Como wrote:
> 
> > Date: Mon, 05 Nov 2001 23:42:31 -0600
> > From: Byron Como <[EMAIL PROTECTED]>
> > Reply-To: [EMAIL PROTECTED]
> > To: [EMAIL PROTECTED]
> > Subject: [brluglist] Sombody at my front door.
> >
> > The attached text file has the ip addresses that
> are interesting. I
> > personally don't think there is a problem because
> it seems like some
> > kind of automated script kiddie attack that is
> mindlessly plodding
> > along. Although my log files have rolled over, I
> did write down the name
> > of the machine that appeared in an earlier logfile
> from which there were
> > attempted connects:
> charcot.neurology.washington.edu. Anybody care to
> > characterize what these logfile entries mean?
> >
> 
> ================================================
> BRLUG - The Baton Rouge Linux User Group
> Visit http://www.brlug.net for more information.
> Send email to [EMAIL PROTECTED] to change
> your subscription information.
> ================================================


__________________________________________________
Do You Yahoo!?
Find a job, post your resume.
http://careers.yahoo.com
================================================
BRLUG - The Baton Rouge Linux User Group
Visit http://www.brlug.net for more information.
Send email to [EMAIL PROTECTED] to change
your subscription information.
================================================

Reply via email to