Hi All!

On Sat, 11 Mar 2006, Pavel Kankovsky wrote:

On Thu, 9 Mar 2006, Alex wrote:

Could this be a SSH scan by some stupid script kiddie that mistook the telnet port# for that of SSH?

It would have to be a kiddie with an army of zombies at his (or her) disposal. The probes came from hundreds (if not thousands) of different IPs and a small random sample I checked was able to finish the TCP 3-way handshake (and read a server greeting and disconnect) when it probed an address where a telnet server was listening and accessible.

As regards DNS servers, over the -past- few days I -was- getting an *extraordinary* number of plain vanilla spams referencing various http://ns[x].[crackedbox].tld. As in a half dozen to a dozen new ones a day. Oddly though, none yesterday or today. Yet. ;) Sometimes I write to the admins to have a look at it, sometimes I don't, there're too many to personally deal with. But I think it also means there weren't all that many loose boxes to begin with or there'd be more and they'd keep coming. Someone went through a lot of trouble to install their clickthrough pages that didn't result with much.

Have a :) day!

jb

--
jim barchuk
[EMAIL PROTECTED]

Reply via email to