Hi, NANOGers.

] and conversely, all attacks are not preceded by scanning.

Very true.  Most of the attack activity I monitor does not include
scanning activity or any other reconnaissance.  However, those who
attack often enjoy monitoring their progress.  This can be an
interesting (albeit difficult) way to trace back the attack to the
sources.

Thanks,
Rob.
-- 
Rob Thomas
http://www.cymru.com
ASSERT(coffee != empty);


Reply via email to