That's really interesting. Seems that someone is using Twitter to track
the success or failure of their automated attack attempts. Neat
concept.
________________________________
From: [email protected]
[mailto:[email protected]] On Behalf Of xgermx
Sent: Monday, December 28, 2009 10:46 AM
To: PaulDotCom Security Weekly Mailing List
Subject: [Pauldotcom] http://twitter.com/sotohide_log
So I was checking some of my web server logs and I ran across an SHH
brute force attack coming from a Chinese IP. Upon googling the IP I find
this http://twitter.com/sotohide_log
Does anyone have any insight?
******************************************************************************
This email contains confidential and proprietary information and is not to be
used or disclosed to anyone other than the named recipient of this email,
and is to be used only for the intended purpose of this communication.
******************************************************************************
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com