I did some route traces and I will post the companies who own the domain,
and ips below. I am sure if you contact their abuse departments (info
provided where possible) they can take action against these people for
violating their ToS. I hope valve can come up with a fix though, that is one
nasty hack.


> L 12/07/2005 - 15:53:03: "r4g3dSkillz<186><STEAM_0:0:9671272><>"
> connected, address "*68.37.174.181:27005*"

This guys is in Elizabeth, New Jersey on Comcast. The abuse dept. email is
[EMAIL PROTECTED] or you can contact the network administrator of that
particular node under the registrant info below.

NeoTrace Trace  Version 3.25  Results
Target: 68.37.174.181
Date: 12/16/2005 (Friday), 4:03:39 AM
Nodes: 21


Node Data
Node Net Reg IP Address      Location            Node Name
  21   1   1 68.37.174.181   Elizabeth
pcp09550321pcs.union01.nj.comcast.net

Network Data
Network id#: 1
Comcast Cable Communications, Inc. JUMPSTART-1 (NET-68-32-0-0-1)
                                  68.32.0.0 - 68.63.255.255
Comcast Cable Communications, Inc. NJ-NORTH-18 (NET-68-37-128-0-1)
                                  68.37.128.0 - 68.37.255.255
Registrant:
Comcast Corporation
   1500 Market Street
   Philadelphia, PA 19102
   US

   Domain Name: COMCAST.NET

   Administrative Contact:
      Administrator, Domain Registration ContactMiddleName
[EMAIL PROTECTED]
      Comcast Corporation
      1500 Market, West Tower
      Philadelphia, PA 19102
      US
      215-320-8774 fax: 215-564-0132

   Technical Contact:
      Technical Contact, Domain Reg ContactMiddleName
[EMAIL PROTECTED]
      Comcast Corporation
      1500 Market St.
      9Fl West
      Philadelphia, PA 19102
      US
      215-320-8774 fax: 215-564-0132


L 12/15/2005 - 01:56:29: "The Boy who Lived<1069><STEAM_0:1:6482383><>"
connected, address "70.137.155.158:43620"

This guy is using sbcglobal as an isp, he's on adsl I just traced to him and
he has no firewall up and a few os vulnerabilities I found with eeye digital
securitys retina program (gee if only I were into mischief). I could not
find an abuse dept. email on southerwestern bell's website.

NeoTrace Trace  Version 3.25  Results
Target: 70.137.155.158
Date: 12/16/2005 (Friday), 3:56:04 AM
Nodes: 22

Node Data
Node Net Reg IP Address      Location            Node Name
  22   1   1 70.137.155.158  San Francisco
adsl-70-137-155-158.dsl.snfc21.sbcglobal.net

Network Data
Network id#: 1
SBC Internet Services SBCIS-SIS80 (NET-70-128-0-0-1)
                                  70.128.0.0 - 70.143.255.255
PPPoX Pool Rback39.SNFCCA.1 SBC07013712800019051108163757
(NET-70-137-128-0-1)
                                  70.137.128.0 - 70.137.159.255
Registrant:
SBC Internet Services, Inc.
   1701 Alma dr
   Plano, TX 75075
   US

   Domain Name: SBCGLOBAL.NET

   Administrative Contact, Technical Contact:
      Southwestern, Bell  [EMAIL PROTECTED]
      Southwestern Bell Internet Services
      1701 Alma dr
      Plano, TX 75075
      US
      1-877-722-3755 fax: 214-473-2253

Also, you can get your bandwidth provider to block those ip's at the switch.
That should keep them from ever reaching your network. Between contacting
the abuse department's and blocking at the switch, that should keep them out
of your hair for quite a long time.

One word of caution though. I think both of these isp's use dhcp. So those
ip's are subject to change. But, if you can provide the isp with time/date
info, I am sure they can locate which customer had the ip at that day/time
and cancel their service.

Hope this helps.

-StealthMode



_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds

Reply via email to