Re: cloudflare hosting a ddos service?

2016-07-26 Thread Steve Atkins

> On Jul 26, 2016, at 7:58 PM, Justin Paine  wrote:
> 
> Folks,
> 
> "For a long time their abuse@ alias was (literally) routed to /dev/null. I'm 
> not
> sure whether that's still the case or whether they now ignore reports 
> manually."
> 
> @Steve   It (literally) never was. :)

Yes, it was. The smiley doesn't make your statement true.

> The team I manage processes
> reports all day
> long. If you have a report to file certainly do so,
> https://www.cloudflare.com/abuse

I gave up on doing that in late 2014 after reporting thousands of pieces of spam
advertising websites hosted by Cloudflare, with no action taken, no reply 
received,
no ticket created, *nothing*. Not in response to mail sent to abuse@cloudflare,
not in response to backchannel reports, not in response to mentions in person to
staff at conferences. (This was mostly people selling lists of credit card 
numbers
rather than booters, but it's the same sort of issue).

Just to see what had changed, I went back to look at the sites I reported to
Cloudflare in 2014. The couple I spot-checked are still hosted by Cloudflare.

Given that you (Cloudflare, rather than you personally) haven't changed
your policy of never terminating abusive websites you host then continuing to
report them to you seems fairly pointless.

> 
> 
> On the topic of booters:
> 
> Short version -- As someone already mentioned, CloudFlare continues
> not to be a hosting provider.

That's untrue, of course. You terminate the http connection; you're
hosting the website; you're hiding the identity of any other operators
involved; you continue to serve the website even when the backing
server has been terminated. Adding an interstitial for sites hosting
malware is nice and all, but the problematic customers are the ones
that are selling access to those malware compromised machines.

You are taking sole responsibility by your actions, while denying all
responsibility in your public statements.

> 
> Our CEO has broadly covered this topic several times.
> https://blog.cloudflare.com/thoughts-on-abuse/
> 
> Even if we removed our service the website does not go away,it
> doesn't solve the problem if we temporarily stop providing DNS to the
> domain(s). An often overlooked but extremely important note: there are
> some situations where law
> enforcement has required that we *not* terminate service to certain
> websites. In those situations we are of course not allowed to discuss
> specifics.

Cheers,
  Steve




Re: cloudflare hosting a ddos service?

2016-07-26 Thread Paras Jha
10:33 PM, Paras Jha <pa...@protrafsolutions.com
>> >
>> > wrote:
>> >
>> >> This is quite common, almost all of the DDoS-for-hire services are
>> hosted
>> >> behind CloudFlare, and a great majority of them take PayPal. Another
>> one
>> >> had even managed to secure an EV SSL cert.
>> >>
>> >> On Tue, Jul 26, 2016 at 10:24 PM, Dovid Bender <do...@telecurve.com>
>> >> wrote:
>> >>
>> >>> I used to have a boss that was convinced that MCafee was writing
>> viruses
>> >>> to stay in business
>> >>>
>> >>> Regards,
>> >>>
>> >>> Dovid
>> >>>
>> >>> -Original Message-
>> >>> From: Phil Rosenthal <p...@isprime.com>
>> >>> Sender: "NANOG" <nanog-boun...@nanog.org>Date: Tue, 26 Jul 2016
>> 22:17:53
>> >>> To: jim deleskie<deles...@gmail.com>
>> >>> Cc: NANOG list<nanog@nanog.org>
>> >>> Subject: Re: cloudflare hosting a ddos service?
>> >>>
>> >>> Plus, it’s good for business!
>> >>>
>> >>> -Phil
>> >>>
>> >>> > On Jul 26, 2016, at 10:14 PM, jim deleskie <deles...@gmail.com>
>> wrote:
>> >>> >
>> >>> > sigh...
>> >>> >
>> >>> > On Tue, Jul 26, 2016 at 10:55 PM, Patrick W. Gilmore <
>> patr...@ianai.net
>> >>> >
>> >>> > wrote:
>> >>> >
>> >>> >> CloudFlare will claim they are not hosting the problem. They are
>> just
>> >>> >> hosting the web page that lets you pay for or points at or
>> otherwise
>> >>> >> directs you to the problem.
>> >>> >>
>> >>> >> The actual source of packets is some other IP address. Therefore,
>> they
>> >>> can
>> >>> >> keep hosting the web page. It is not sending the actual
>> >>> >> [spam|DDoS|hack|etc.], right? So stop asking them to do something
>> >>> about it!
>> >>> >>
>> >>> >> Whether you think that is the proper way to provide service on the
>> >>> >> Internet is left as an exercise to the reader.
>> >>> >>
>> >>> >> --
>> >>> >> TTFN,
>> >>> >> patrick
>> >>> >>
>> >>> >>> On Jul 26, 2016, at 9:49 PM, Mike <mike-na...@tiedyenetworks.com>
>> >>> wrote:
>> >>> >>>
>> >>> >>> Hi,
>> >>> >>>
>> >>> >>>   So vbooter.org's dns and web is hosted by cloudflare?
>> >>> >>>
>> >>> >>> "Using vBooter you can take down home internet connections,
>> websites
>> >>> and
>> >>> >> game servers such us Minecraft, XBOX Live, PSN and many more."
>> >>> >>>
>> >>> >>>   dig -t ns vbooter.org
>> >>> >>>
>> >>> >>> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org
>> >>> >>> ;; global options: +cmd
>> >>> >>> ;; Got answer:
>> >>> >>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177
>> >>> >>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0,
>> ADDITIONAL: 1
>> >>> >>>
>> >>> >>> ;; OPT PSEUDOSECTION:
>> >>> >>> ; EDNS: version: 0, flags:; udp: 512
>> >>> >>> ;; QUESTION SECTION:
>> >>> >>> ;vbooter.org.INNS
>> >>> >>>
>> >>> >>> ;; ANSWER SECTION:
>> >>> >>> vbooter.org.21599INNSrick.ns.cloudflare.com.
>> >>> >>> vbooter.org.21599INNSamy.ns.cloudflare.com.
>> >>> >>>
>> >>> >>> dig -t a www.vbooter.org
>> >>> >>>
>> >>> >>> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org
>> >>> >>> ;; global options: +cmd
>> >>> >>> ;; Got answer:
>> >>> >>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920
>> >>> >>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0,
>> ADDITIONAL: 1
>> >>> >>>
>> >>> >>> ;; OPT PSEUDOSECTION:
>> >>> >>> ; EDNS: version: 0, flags:; udp: 512
>> >>> >>> ;; QUESTION SECTION:
>> >>> >>> ;www.vbooter.org.INA
>> >>> >>>
>> >>> >>> ;; ANSWER SECTION:
>> >>> >>> www.vbooter.org.299INCNAMEvbooter.org.
>> >>> >>> vbooter.org.299INA104.28.13.7
>> >>> >>> vbooter.org.299INA104.28.12.7
>> >>> >>>
>> >>> >>>
>> >>> >>>   Can anyone from cloudflare answer me why this fits with your
>> >>> business
>> >>> >> model?
>> >>> >>>
>> >>> >>> Mike-
>> >>> >>
>> >>> >>
>> >>>
>> >>>
>> >>
>> >>
>> >> --
>> >> Regards,
>> >> Paras
>> >>
>> >> President
>> >> ProTraf Solutions, LLC
>> >> Enterprise DDoS Mitigation
>> >>
>> >
>> >
>> >
>> > --
>> > Regards,
>> > Paras
>> >
>> > President
>> > ProTraf Solutions, LLC
>> > Enterprise DDoS Mitigation
>>
>
>
>
> --
> Regards,
> Paras
>
> President
> ProTraf Solutions, LLC
> Enterprise DDoS Mitigation
>



-- 
Regards,
Paras

President
ProTraf Solutions, LLC
Enterprise DDoS Mitigation


Re: cloudflare hosting a ddos service?

2016-07-26 Thread Paras Jha
Justin,

The only problem with that statement is that it's not true: if you did
terminate service to them, the websites would go away. Maybe not today, but
eventually. "Network stresser" owners are notorious for trying to take out
the competition. Cloudflare provides free protection for these services to
stay online. Most other ISPs wouldn't tolerate such shenanigans, whether it
be for facilitating illegal activities or being on the receiving end of
DDoS attacks, and would kick them off.

On Tue, Jul 26, 2016 at 10:58 PM, Justin Paine <jus...@cloudflare.com>
wrote:

> Folks,
>
> "For a long time their abuse@ alias was (literally) routed to /dev/null.
> I'm not
> sure whether that's still the case or whether they now ignore reports
> manually."
>
> @Steve   It (literally) never was. :) The team I manage processes
> reports all day
> long. If you have a report to file certainly do so,
> https://www.cloudflare.com/abuse
>
>
> On the topic of booters:
>
> Short version -- As someone already mentioned, CloudFlare continues
> not to be a hosting provider.
>
> Our CEO has broadly covered this topic several times.
> https://blog.cloudflare.com/thoughts-on-abuse/
>
> Even if we removed our service the website does not go away, it
> doesn't solve the problem if we temporarily stop providing DNS to the
> domain(s). An often overlooked but extremely important note: there are
> some situations where law
> enforcement has required that we *not* terminate service to certain
> websites. In those situations we are of course not allowed to discuss
> specifics.
>
> 
> Justin Paine
> Head of Trust & Safety
> CloudFlare Inc.
> PGP: BBAA 6BCE 3305 7FD6 6452 7115 57B6 0114 DE0B 314D
>
>
> On Tue, Jul 26, 2016 at 7:42 PM, Paras Jha <pa...@protrafsolutions.com>
> wrote:
> > A five minute Google search revealed this, which is just the tip of the
> > iceberg
> >
> > booter.xyz
> > exitus.to
> > zstress.net
> > critical-boot.com
> > instress.club
> > webstresser.co
> > anonymousstresser.com
> > rawdos.com
> > kronosbooter.com
> > alphastress.com
> > synergy.so
> > str3ssed.me
> > layer7.pw
> >
> > There are probably hundreds
> >
> >
> >
> > On Tue, Jul 26, 2016 at 10:33 PM, Paras Jha <pa...@protrafsolutions.com>
> > wrote:
> >
> >> This is quite common, almost all of the DDoS-for-hire services are
> hosted
> >> behind CloudFlare, and a great majority of them take PayPal. Another one
> >> had even managed to secure an EV SSL cert.
> >>
> >> On Tue, Jul 26, 2016 at 10:24 PM, Dovid Bender <do...@telecurve.com>
> >> wrote:
> >>
> >>> I used to have a boss that was convinced that MCafee was writing
> viruses
> >>> to stay in business
> >>>
> >>> Regards,
> >>>
> >>> Dovid
> >>>
> >>> -Original Message-
> >>> From: Phil Rosenthal <p...@isprime.com>
> >>> Sender: "NANOG" <nanog-boun...@nanog.org>Date: Tue, 26 Jul 2016
> 22:17:53
> >>> To: jim deleskie<deles...@gmail.com>
> >>> Cc: NANOG list<nanog@nanog.org>
> >>> Subject: Re: cloudflare hosting a ddos service?
> >>>
> >>> Plus, it’s good for business!
> >>>
> >>> -Phil
> >>>
> >>> > On Jul 26, 2016, at 10:14 PM, jim deleskie <deles...@gmail.com>
> wrote:
> >>> >
> >>> > sigh...
> >>> >
> >>> > On Tue, Jul 26, 2016 at 10:55 PM, Patrick W. Gilmore <
> patr...@ianai.net
> >>> >
> >>> > wrote:
> >>> >
> >>> >> CloudFlare will claim they are not hosting the problem. They are
> just
> >>> >> hosting the web page that lets you pay for or points at or otherwise
> >>> >> directs you to the problem.
> >>> >>
> >>> >> The actual source of packets is some other IP address. Therefore,
> they
> >>> can
> >>> >> keep hosting the web page. It is not sending the actual
> >>> >> [spam|DDoS|hack|etc.], right? So stop asking them to do something
> >>> about it!
> >>> >>
> >>> >> Whether you think that is the proper way to provide service on the
> >>> >> Internet is left as an exercise to the reader.
> >>> >>
> >>> >> --
> >>> >> TTFN,
> >>> >> patrick
> &

Re: cloudflare hosting a ddos service?

2016-07-26 Thread Mike

On 07/26/2016 07:42 PM, Paras Jha wrote:

A five minute Google search revealed this, which is just the tip of the
iceberg

booter.xyz
exitus.to
zstress.net
critical-boot.com
instress.club
webstresser.co
anonymousstresser.com
rawdos.com
kronosbooter.com
alphastress.com
synergy.so
str3ssed.me
layer7.pw

There are probably hundreds





I should also point out that the page for www.vbooter.org also had a 
google ad (for me anyways) at the bottom advertising arbor networks!


It seems that cloudflare being an anti-ddos company needs to clean house 
then, and that if they really are conscious of this, that their 'good 
guy!' persona has taken a real beating.


Mike-



Re: cloudflare hosting a ddos service?

2016-07-26 Thread Eric Kuhnke
Looks like barrier to obtaining an EV SSL certificate is not very high
these days.

There's documentation requirements, but root CAs can't be seen to
discriminate against companies in the developing world. I suppose all you
need is a scanned business license/incorporation documents from your local
municipality in Outer Elbonia, and a few scanned copies of fake ID, and
your $99 payment for the first year.



On Tue, Jul 26, 2016 at 7:33 PM, Paras Jha <pa...@protrafsolutions.com>
wrote:

> This is quite common, almost all of the DDoS-for-hire services are hosted
> behind CloudFlare, and a great majority of them take PayPal. Another one
> had even managed to secure an EV SSL cert.
>
> On Tue, Jul 26, 2016 at 10:24 PM, Dovid Bender <do...@telecurve.com>
> wrote:
>
> > I used to have a boss that was convinced that MCafee was writing viruses
> > to stay in business
> >
> > Regards,
> >
> > Dovid
> >
> > -Original Message-
> > From: Phil Rosenthal <p...@isprime.com>
> > Sender: "NANOG" <nanog-boun...@nanog.org>Date: Tue, 26 Jul 2016 22:17:53
> > To: jim deleskie<deles...@gmail.com>
> > Cc: NANOG list<nanog@nanog.org>
> > Subject: Re: cloudflare hosting a ddos service?
> >
> > Plus, it’s good for business!
> >
> > -Phil
> >
> > > On Jul 26, 2016, at 10:14 PM, jim deleskie <deles...@gmail.com> wrote:
> > >
> > > sigh...
> > >
> > > On Tue, Jul 26, 2016 at 10:55 PM, Patrick W. Gilmore <
> patr...@ianai.net>
> > > wrote:
> > >
> > >> CloudFlare will claim they are not hosting the problem. They are just
> > >> hosting the web page that lets you pay for or points at or otherwise
> > >> directs you to the problem.
> > >>
> > >> The actual source of packets is some other IP address. Therefore, they
> > can
> > >> keep hosting the web page. It is not sending the actual
> > >> [spam|DDoS|hack|etc.], right? So stop asking them to do something
> about
> > it!
> > >>
> > >> Whether you think that is the proper way to provide service on the
> > >> Internet is left as an exercise to the reader.
> > >>
> > >> --
> > >> TTFN,
> > >> patrick
> > >>
> > >>> On Jul 26, 2016, at 9:49 PM, Mike <mike-na...@tiedyenetworks.com>
> > wrote:
> > >>>
> > >>> Hi,
> > >>>
> > >>>   So vbooter.org's dns and web is hosted by cloudflare?
> > >>>
> > >>> "Using vBooter you can take down home internet connections, websites
> > and
> > >> game servers such us Minecraft, XBOX Live, PSN and many more."
> > >>>
> > >>>   dig -t ns vbooter.org
> > >>>
> > >>> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org
> > >>> ;; global options: +cmd
> > >>> ;; Got answer:
> > >>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177
> > >>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
> > >>>
> > >>> ;; OPT PSEUDOSECTION:
> > >>> ; EDNS: version: 0, flags:; udp: 512
> > >>> ;; QUESTION SECTION:
> > >>> ;vbooter.org.INNS
> > >>>
> > >>> ;; ANSWER SECTION:
> > >>> vbooter.org.21599INNSrick.ns.cloudflare.com.
> > >>> vbooter.org.21599INNSamy.ns.cloudflare.com.
> > >>>
> > >>> dig -t a www.vbooter.org
> > >>>
> > >>> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org
> > >>> ;; global options: +cmd
> > >>> ;; Got answer:
> > >>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920
> > >>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
> > >>>
> > >>> ;; OPT PSEUDOSECTION:
> > >>> ; EDNS: version: 0, flags:; udp: 512
> > >>> ;; QUESTION SECTION:
> > >>> ;www.vbooter.org.INA
> > >>>
> > >>> ;; ANSWER SECTION:
> > >>> www.vbooter.org.299INCNAMEvbooter.org.
> > >>> vbooter.org.299INA104.28.13.7
> > >>> vbooter.org.299INA104.28.12.7
> > >>>
> > >>>
> > >>>   Can anyone from cloudflare answer me why this fits with your
> business
> > >> model?
> > >>>
> > >>> Mike-
> > >>
> > >>
> >
> >
>
>
> --
> Regards,
> Paras
>
> President
> ProTraf Solutions, LLC
> Enterprise DDoS Mitigation
>


Re: cloudflare hosting a ddos service?

2016-07-26 Thread Paras Jha
A five minute Google search revealed this, which is just the tip of the
iceberg

booter.xyz
exitus.to
zstress.net
critical-boot.com
instress.club
webstresser.co
anonymousstresser.com
rawdos.com
kronosbooter.com
alphastress.com
synergy.so
str3ssed.me
layer7.pw

There are probably hundreds



On Tue, Jul 26, 2016 at 10:33 PM, Paras Jha <pa...@protrafsolutions.com>
wrote:

> This is quite common, almost all of the DDoS-for-hire services are hosted
> behind CloudFlare, and a great majority of them take PayPal. Another one
> had even managed to secure an EV SSL cert.
>
> On Tue, Jul 26, 2016 at 10:24 PM, Dovid Bender <do...@telecurve.com>
> wrote:
>
>> I used to have a boss that was convinced that MCafee was writing viruses
>> to stay in business
>>
>> Regards,
>>
>> Dovid
>>
>> -Original Message-
>> From: Phil Rosenthal <p...@isprime.com>
>> Sender: "NANOG" <nanog-boun...@nanog.org>Date: Tue, 26 Jul 2016 22:17:53
>> To: jim deleskie<deles...@gmail.com>
>> Cc: NANOG list<nanog@nanog.org>
>> Subject: Re: cloudflare hosting a ddos service?
>>
>> Plus, it’s good for business!
>>
>> -Phil
>>
>> > On Jul 26, 2016, at 10:14 PM, jim deleskie <deles...@gmail.com> wrote:
>> >
>> > sigh...
>> >
>> > On Tue, Jul 26, 2016 at 10:55 PM, Patrick W. Gilmore <patr...@ianai.net
>> >
>> > wrote:
>> >
>> >> CloudFlare will claim they are not hosting the problem. They are just
>> >> hosting the web page that lets you pay for or points at or otherwise
>> >> directs you to the problem.
>> >>
>> >> The actual source of packets is some other IP address. Therefore, they
>> can
>> >> keep hosting the web page. It is not sending the actual
>> >> [spam|DDoS|hack|etc.], right? So stop asking them to do something
>> about it!
>> >>
>> >> Whether you think that is the proper way to provide service on the
>> >> Internet is left as an exercise to the reader.
>> >>
>> >> --
>> >> TTFN,
>> >> patrick
>> >>
>> >>> On Jul 26, 2016, at 9:49 PM, Mike <mike-na...@tiedyenetworks.com>
>> wrote:
>> >>>
>> >>> Hi,
>> >>>
>> >>>   So vbooter.org's dns and web is hosted by cloudflare?
>> >>>
>> >>> "Using vBooter you can take down home internet connections, websites
>> and
>> >> game servers such us Minecraft, XBOX Live, PSN and many more."
>> >>>
>> >>>   dig -t ns vbooter.org
>> >>>
>> >>> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org
>> >>> ;; global options: +cmd
>> >>> ;; Got answer:
>> >>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177
>> >>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
>> >>>
>> >>> ;; OPT PSEUDOSECTION:
>> >>> ; EDNS: version: 0, flags:; udp: 512
>> >>> ;; QUESTION SECTION:
>> >>> ;vbooter.org.INNS
>> >>>
>> >>> ;; ANSWER SECTION:
>> >>> vbooter.org.21599INNSrick.ns.cloudflare.com.
>> >>> vbooter.org.21599INNSamy.ns.cloudflare.com.
>> >>>
>> >>> dig -t a www.vbooter.org
>> >>>
>> >>> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org
>> >>> ;; global options: +cmd
>> >>> ;; Got answer:
>> >>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920
>> >>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
>> >>>
>> >>> ;; OPT PSEUDOSECTION:
>> >>> ; EDNS: version: 0, flags:; udp: 512
>> >>> ;; QUESTION SECTION:
>> >>> ;www.vbooter.org.INA
>> >>>
>> >>> ;; ANSWER SECTION:
>> >>> www.vbooter.org.299INCNAMEvbooter.org.
>> >>> vbooter.org.299INA104.28.13.7
>> >>> vbooter.org.299INA104.28.12.7
>> >>>
>> >>>
>> >>>   Can anyone from cloudflare answer me why this fits with your
>> business
>> >> model?
>> >>>
>> >>> Mike-
>> >>
>> >>
>>
>>
>
>
> --
> Regards,
> Paras
>
> President
> ProTraf Solutions, LLC
> Enterprise DDoS Mitigation
>



-- 
Regards,
Paras

President
ProTraf Solutions, LLC
Enterprise DDoS Mitigation


Re: cloudflare hosting a ddos service?

2016-07-26 Thread Larry Sheldon



On 7/26/2016 21:19, jim deleskie wrote:

Back in the day didn't we refer to such hosting as bulletproof hosting?


Not HERE!

NANA-E, sure.



--
"Everybody is a genius.  But if you judge a fish by
its ability to climb a tree, it will live its whole
life believing that it is stupid."

--Albert Einstein

From Larry's Cox account.


Re: cloudflare hosting a ddos service?

2016-07-26 Thread Steve Atkins

> On Jul 26, 2016, at 7:15 PM, Mehmet Akcin  wrote:
> 
> Have you tried to contact their Abuse?.

For a long time their abuse@ alias was (literally) routed to /dev/null. I'm not
sure whether that's still the case or whether they now ignore reports manually.

Cheers,
  Steve

> 
> mehmet
> 
> On Tue, Jul 26, 2016 at 6:49 PM, Mike  wrote:
> 
>> Hi,
>> 
>>So vbooter.org's dns and web is hosted by cloudflare?
>> 
>> "Using vBooter you can take down home internet connections, websites and
>> game servers such us Minecraft, XBOX Live, PSN and many more."
>> 
>>dig -t ns vbooter.org
>> 
>> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org
>> ;; global options: +cmd
>> ;; Got answer:
>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177
>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
>> 
>> ;; OPT PSEUDOSECTION:
>> ; EDNS: version: 0, flags:; udp: 512
>> ;; QUESTION SECTION:
>> ;vbooter.org.INNS
>> 
>> ;; ANSWER SECTION:
>> vbooter.org.21599INNSrick.ns.cloudflare.com.
>> vbooter.org.21599INNSamy.ns.cloudflare.com.
>> 
>> dig -t a www.vbooter.org
>> 
>> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org
>> ;; global options: +cmd
>> ;; Got answer:
>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920
>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
>> 
>> ;; OPT PSEUDOSECTION:
>> ; EDNS: version: 0, flags:; udp: 512
>> ;; QUESTION SECTION:
>> ;www.vbooter.org.INA
>> 
>> ;; ANSWER SECTION:
>> www.vbooter.org.299INCNAMEvbooter.org.
>> vbooter.org.299INA104.28.13.7
>> vbooter.org.299INA104.28.12.7
>> 
>> 
>>Can anyone from cloudflare answer me why this fits with your business
>> model?
>> 
>> Mike-
>> 
>> 



Re: cloudflare hosting a ddos service?

2016-07-26 Thread Ethan

   So vbooter.org's dns and web is hosted by cloudflare?
"Using vBooter you can take down home internet connections, websites and game 
servers such us Minecraft, XBOX Live, PSN and many more."


Buy some time on it to DDoS cloudflare sites.



Re: cloudflare hosting a ddos service?

2016-07-26 Thread Paras Jha
This is quite common, almost all of the DDoS-for-hire services are hosted
behind CloudFlare, and a great majority of them take PayPal. Another one
had even managed to secure an EV SSL cert.

On Tue, Jul 26, 2016 at 10:24 PM, Dovid Bender <do...@telecurve.com> wrote:

> I used to have a boss that was convinced that MCafee was writing viruses
> to stay in business
>
> Regards,
>
> Dovid
>
> -Original Message-
> From: Phil Rosenthal <p...@isprime.com>
> Sender: "NANOG" <nanog-boun...@nanog.org>Date: Tue, 26 Jul 2016 22:17:53
> To: jim deleskie<deles...@gmail.com>
> Cc: NANOG list<nanog@nanog.org>
> Subject: Re: cloudflare hosting a ddos service?
>
> Plus, it’s good for business!
>
> -Phil
>
> > On Jul 26, 2016, at 10:14 PM, jim deleskie <deles...@gmail.com> wrote:
> >
> > sigh...
> >
> > On Tue, Jul 26, 2016 at 10:55 PM, Patrick W. Gilmore <patr...@ianai.net>
> > wrote:
> >
> >> CloudFlare will claim they are not hosting the problem. They are just
> >> hosting the web page that lets you pay for or points at or otherwise
> >> directs you to the problem.
> >>
> >> The actual source of packets is some other IP address. Therefore, they
> can
> >> keep hosting the web page. It is not sending the actual
> >> [spam|DDoS|hack|etc.], right? So stop asking them to do something about
> it!
> >>
> >> Whether you think that is the proper way to provide service on the
> >> Internet is left as an exercise to the reader.
> >>
> >> --
> >> TTFN,
> >> patrick
> >>
> >>> On Jul 26, 2016, at 9:49 PM, Mike <mike-na...@tiedyenetworks.com>
> wrote:
> >>>
> >>> Hi,
> >>>
> >>>   So vbooter.org's dns and web is hosted by cloudflare?
> >>>
> >>> "Using vBooter you can take down home internet connections, websites
> and
> >> game servers such us Minecraft, XBOX Live, PSN and many more."
> >>>
> >>>   dig -t ns vbooter.org
> >>>
> >>> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org
> >>> ;; global options: +cmd
> >>> ;; Got answer:
> >>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177
> >>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
> >>>
> >>> ;; OPT PSEUDOSECTION:
> >>> ; EDNS: version: 0, flags:; udp: 512
> >>> ;; QUESTION SECTION:
> >>> ;vbooter.org.INNS
> >>>
> >>> ;; ANSWER SECTION:
> >>> vbooter.org.21599INNSrick.ns.cloudflare.com.
> >>> vbooter.org.21599INNSamy.ns.cloudflare.com.
> >>>
> >>> dig -t a www.vbooter.org
> >>>
> >>> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org
> >>> ;; global options: +cmd
> >>> ;; Got answer:
> >>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920
> >>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
> >>>
> >>> ;; OPT PSEUDOSECTION:
> >>> ; EDNS: version: 0, flags:; udp: 512
> >>> ;; QUESTION SECTION:
> >>> ;www.vbooter.org.INA
> >>>
> >>> ;; ANSWER SECTION:
> >>> www.vbooter.org.299INCNAMEvbooter.org.
> >>> vbooter.org.299INA104.28.13.7
> >>> vbooter.org.299INA104.28.12.7
> >>>
> >>>
> >>>   Can anyone from cloudflare answer me why this fits with your business
> >> model?
> >>>
> >>> Mike-
> >>
> >>
>
>


-- 
Regards,
Paras

President
ProTraf Solutions, LLC
Enterprise DDoS Mitigation


Re: cloudflare hosting a ddos service?

2016-07-26 Thread Dovid Bender
I used to have a boss that was convinced that MCafee was writing viruses to 
stay in business
 
Regards,

Dovid

-Original Message-
From: Phil Rosenthal <p...@isprime.com>
Sender: "NANOG" <nanog-boun...@nanog.org>Date: Tue, 26 Jul 2016 22:17:53 
To: jim deleskie<deles...@gmail.com>
Cc: NANOG list<nanog@nanog.org>
Subject: Re: cloudflare hosting a ddos service?

Plus, it’s good for business!

-Phil

> On Jul 26, 2016, at 10:14 PM, jim deleskie <deles...@gmail.com> wrote:
> 
> sigh...
> 
> On Tue, Jul 26, 2016 at 10:55 PM, Patrick W. Gilmore <patr...@ianai.net>
> wrote:
> 
>> CloudFlare will claim they are not hosting the problem. They are just
>> hosting the web page that lets you pay for or points at or otherwise
>> directs you to the problem.
>> 
>> The actual source of packets is some other IP address. Therefore, they can
>> keep hosting the web page. It is not sending the actual
>> [spam|DDoS|hack|etc.], right? So stop asking them to do something about it!
>> 
>> Whether you think that is the proper way to provide service on the
>> Internet is left as an exercise to the reader.
>> 
>> --
>> TTFN,
>> patrick
>> 
>>> On Jul 26, 2016, at 9:49 PM, Mike <mike-na...@tiedyenetworks.com> wrote:
>>> 
>>> Hi,
>>> 
>>>   So vbooter.org's dns and web is hosted by cloudflare?
>>> 
>>> "Using vBooter you can take down home internet connections, websites and
>> game servers such us Minecraft, XBOX Live, PSN and many more."
>>> 
>>>   dig -t ns vbooter.org
>>> 
>>> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org
>>> ;; global options: +cmd
>>> ;; Got answer:
>>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177
>>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
>>> 
>>> ;; OPT PSEUDOSECTION:
>>> ; EDNS: version: 0, flags:; udp: 512
>>> ;; QUESTION SECTION:
>>> ;vbooter.org.INNS
>>> 
>>> ;; ANSWER SECTION:
>>> vbooter.org.21599INNSrick.ns.cloudflare.com.
>>> vbooter.org.21599INNSamy.ns.cloudflare.com.
>>> 
>>> dig -t a www.vbooter.org
>>> 
>>> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org
>>> ;; global options: +cmd
>>> ;; Got answer:
>>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920
>>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
>>> 
>>> ;; OPT PSEUDOSECTION:
>>> ; EDNS: version: 0, flags:; udp: 512
>>> ;; QUESTION SECTION:
>>> ;www.vbooter.org.INA
>>> 
>>> ;; ANSWER SECTION:
>>> www.vbooter.org.299INCNAMEvbooter.org.
>>> vbooter.org.299INA104.28.13.7
>>> vbooter.org.299INA104.28.12.7
>>> 
>>> 
>>>   Can anyone from cloudflare answer me why this fits with your business
>> model?
>>> 
>>> Mike-
>> 
>> 



Re: cloudflare hosting a ddos service?

2016-07-26 Thread jim deleskie
Back in the day didn't we refer to such hosting as bulletproof hosting?

On Tue, Jul 26, 2016 at 11:17 PM, Phil Rosenthal  wrote:

> Plus, it’s good for business!
>
> -Phil
>
> > On Jul 26, 2016, at 10:14 PM, jim deleskie  wrote:
> >
> > sigh...
> >
> > On Tue, Jul 26, 2016 at 10:55 PM, Patrick W. Gilmore 
> > wrote:
> >
> >> CloudFlare will claim they are not hosting the problem. They are just
> >> hosting the web page that lets you pay for or points at or otherwise
> >> directs you to the problem.
> >>
> >> The actual source of packets is some other IP address. Therefore, they
> can
> >> keep hosting the web page. It is not sending the actual
> >> [spam|DDoS|hack|etc.], right? So stop asking them to do something about
> it!
> >>
> >> Whether you think that is the proper way to provide service on the
> >> Internet is left as an exercise to the reader.
> >>
> >> --
> >> TTFN,
> >> patrick
> >>
> >>> On Jul 26, 2016, at 9:49 PM, Mike 
> wrote:
> >>>
> >>> Hi,
> >>>
> >>>   So vbooter.org's dns and web is hosted by cloudflare?
> >>>
> >>> "Using vBooter you can take down home internet connections, websites
> and
> >> game servers such us Minecraft, XBOX Live, PSN and many more."
> >>>
> >>>   dig -t ns vbooter.org
> >>>
> >>> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org
> >>> ;; global options: +cmd
> >>> ;; Got answer:
> >>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177
> >>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
> >>>
> >>> ;; OPT PSEUDOSECTION:
> >>> ; EDNS: version: 0, flags:; udp: 512
> >>> ;; QUESTION SECTION:
> >>> ;vbooter.org.INNS
> >>>
> >>> ;; ANSWER SECTION:
> >>> vbooter.org.21599INNSrick.ns.cloudflare.com.
> >>> vbooter.org.21599INNSamy.ns.cloudflare.com.
> >>>
> >>> dig -t a www.vbooter.org
> >>>
> >>> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org
> >>> ;; global options: +cmd
> >>> ;; Got answer:
> >>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920
> >>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
> >>>
> >>> ;; OPT PSEUDOSECTION:
> >>> ; EDNS: version: 0, flags:; udp: 512
> >>> ;; QUESTION SECTION:
> >>> ;www.vbooter.org.INA
> >>>
> >>> ;; ANSWER SECTION:
> >>> www.vbooter.org.299INCNAMEvbooter.org.
> >>> vbooter.org.299INA104.28.13.7
> >>> vbooter.org.299INA104.28.12.7
> >>>
> >>>
> >>>   Can anyone from cloudflare answer me why this fits with your business
> >> model?
> >>>
> >>> Mike-
> >>
> >>
>
>


Re: cloudflare hosting a ddos service?

2016-07-26 Thread Phil Rosenthal
Plus, it’s good for business!

-Phil

> On Jul 26, 2016, at 10:14 PM, jim deleskie  wrote:
> 
> sigh...
> 
> On Tue, Jul 26, 2016 at 10:55 PM, Patrick W. Gilmore 
> wrote:
> 
>> CloudFlare will claim they are not hosting the problem. They are just
>> hosting the web page that lets you pay for or points at or otherwise
>> directs you to the problem.
>> 
>> The actual source of packets is some other IP address. Therefore, they can
>> keep hosting the web page. It is not sending the actual
>> [spam|DDoS|hack|etc.], right? So stop asking them to do something about it!
>> 
>> Whether you think that is the proper way to provide service on the
>> Internet is left as an exercise to the reader.
>> 
>> --
>> TTFN,
>> patrick
>> 
>>> On Jul 26, 2016, at 9:49 PM, Mike  wrote:
>>> 
>>> Hi,
>>> 
>>>   So vbooter.org's dns and web is hosted by cloudflare?
>>> 
>>> "Using vBooter you can take down home internet connections, websites and
>> game servers such us Minecraft, XBOX Live, PSN and many more."
>>> 
>>>   dig -t ns vbooter.org
>>> 
>>> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org
>>> ;; global options: +cmd
>>> ;; Got answer:
>>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177
>>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
>>> 
>>> ;; OPT PSEUDOSECTION:
>>> ; EDNS: version: 0, flags:; udp: 512
>>> ;; QUESTION SECTION:
>>> ;vbooter.org.INNS
>>> 
>>> ;; ANSWER SECTION:
>>> vbooter.org.21599INNSrick.ns.cloudflare.com.
>>> vbooter.org.21599INNSamy.ns.cloudflare.com.
>>> 
>>> dig -t a www.vbooter.org
>>> 
>>> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org
>>> ;; global options: +cmd
>>> ;; Got answer:
>>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920
>>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
>>> 
>>> ;; OPT PSEUDOSECTION:
>>> ; EDNS: version: 0, flags:; udp: 512
>>> ;; QUESTION SECTION:
>>> ;www.vbooter.org.INA
>>> 
>>> ;; ANSWER SECTION:
>>> www.vbooter.org.299INCNAMEvbooter.org.
>>> vbooter.org.299INA104.28.13.7
>>> vbooter.org.299INA104.28.12.7
>>> 
>>> 
>>>   Can anyone from cloudflare answer me why this fits with your business
>> model?
>>> 
>>> Mike-
>> 
>> 



Re: cloudflare hosting a ddos service?

2016-07-26 Thread Mehmet Akcin
Have you tried to contact their Abuse?.

mehmet

On Tue, Jul 26, 2016 at 6:49 PM, Mike  wrote:

> Hi,
>
> So vbooter.org's dns and web is hosted by cloudflare?
>
> "Using vBooter you can take down home internet connections, websites and
> game servers such us Minecraft, XBOX Live, PSN and many more."
>
> dig -t ns vbooter.org
>
> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177
> ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
>
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags:; udp: 512
> ;; QUESTION SECTION:
> ;vbooter.org.INNS
>
> ;; ANSWER SECTION:
> vbooter.org.21599INNSrick.ns.cloudflare.com.
> vbooter.org.21599INNSamy.ns.cloudflare.com.
>
>  dig -t a www.vbooter.org
>
> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920
> ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
>
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags:; udp: 512
> ;; QUESTION SECTION:
> ;www.vbooter.org.INA
>
> ;; ANSWER SECTION:
> www.vbooter.org.299INCNAMEvbooter.org.
> vbooter.org.299INA104.28.13.7
> vbooter.org.299INA104.28.12.7
>
>
> Can anyone from cloudflare answer me why this fits with your business
> model?
>
> Mike-
>
>


Re: cloudflare hosting a ddos service?

2016-07-26 Thread jim deleskie
sigh...

On Tue, Jul 26, 2016 at 10:55 PM, Patrick W. Gilmore 
wrote:

> CloudFlare will claim they are not hosting the problem. They are just
> hosting the web page that lets you pay for or points at or otherwise
> directs you to the problem.
>
> The actual source of packets is some other IP address. Therefore, they can
> keep hosting the web page. It is not sending the actual
> [spam|DDoS|hack|etc.], right? So stop asking them to do something about it!
>
> Whether you think that is the proper way to provide service on the
> Internet is left as an exercise to the reader.
>
> --
> TTFN,
> patrick
>
> > On Jul 26, 2016, at 9:49 PM, Mike  wrote:
> >
> > Hi,
> >
> >So vbooter.org's dns and web is hosted by cloudflare?
> >
> > "Using vBooter you can take down home internet connections, websites and
> game servers such us Minecraft, XBOX Live, PSN and many more."
> >
> >dig -t ns vbooter.org
> >
> > ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org
> > ;; global options: +cmd
> > ;; Got answer:
> > ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177
> > ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
> >
> > ;; OPT PSEUDOSECTION:
> > ; EDNS: version: 0, flags:; udp: 512
> > ;; QUESTION SECTION:
> > ;vbooter.org.INNS
> >
> > ;; ANSWER SECTION:
> > vbooter.org.21599INNSrick.ns.cloudflare.com.
> > vbooter.org.21599INNSamy.ns.cloudflare.com.
> >
> > dig -t a www.vbooter.org
> >
> > ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org
> > ;; global options: +cmd
> > ;; Got answer:
> > ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920
> > ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
> >
> > ;; OPT PSEUDOSECTION:
> > ; EDNS: version: 0, flags:; udp: 512
> > ;; QUESTION SECTION:
> > ;www.vbooter.org.INA
> >
> > ;; ANSWER SECTION:
> > www.vbooter.org.299INCNAMEvbooter.org.
> > vbooter.org.299INA104.28.13.7
> > vbooter.org.299INA104.28.12.7
> >
> >
> >Can anyone from cloudflare answer me why this fits with your business
> model?
> >
> > Mike-
>
>


Re: cloudflare hosting a ddos service?

2016-07-26 Thread Patrick W. Gilmore
CloudFlare will claim they are not hosting the problem. They are just hosting 
the web page that lets you pay for or points at or otherwise directs you to the 
problem.

The actual source of packets is some other IP address. Therefore, they can keep 
hosting the web page. It is not sending the actual [spam|DDoS|hack|etc.], 
right? So stop asking them to do something about it!

Whether you think that is the proper way to provide service on the Internet is 
left as an exercise to the reader.

-- 
TTFN,
patrick

> On Jul 26, 2016, at 9:49 PM, Mike  wrote:
> 
> Hi,
> 
>So vbooter.org's dns and web is hosted by cloudflare?
> 
> "Using vBooter you can take down home internet connections, websites and game 
> servers such us Minecraft, XBOX Live, PSN and many more."
> 
>dig -t ns vbooter.org
> 
> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177
> ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
> 
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags:; udp: 512
> ;; QUESTION SECTION:
> ;vbooter.org.INNS
> 
> ;; ANSWER SECTION:
> vbooter.org.21599INNSrick.ns.cloudflare.com.
> vbooter.org.21599INNSamy.ns.cloudflare.com.
> 
> dig -t a www.vbooter.org
> 
> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920
> ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
> 
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags:; udp: 512
> ;; QUESTION SECTION:
> ;www.vbooter.org.INA
> 
> ;; ANSWER SECTION:
> www.vbooter.org.299INCNAMEvbooter.org.
> vbooter.org.299INA104.28.13.7
> vbooter.org.299INA104.28.12.7
> 
> 
>Can anyone from cloudflare answer me why this fits with your business 
> model?
> 
> Mike-



cloudflare hosting a ddos service?

2016-07-26 Thread Mike

Hi,

So vbooter.org's dns and web is hosted by cloudflare?

"Using vBooter you can take down home internet connections, websites and 
game servers such us Minecraft, XBOX Live, PSN and many more."


dig -t ns vbooter.org

; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177
;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;vbooter.org.INNS

;; ANSWER SECTION:
vbooter.org.21599INNSrick.ns.cloudflare.com.
vbooter.org.21599INNSamy.ns.cloudflare.com.

 dig -t a www.vbooter.org

; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920
;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;www.vbooter.org.INA

;; ANSWER SECTION:
www.vbooter.org.299INCNAMEvbooter.org.
vbooter.org.299INA104.28.13.7
vbooter.org.299INA104.28.12.7


Can anyone from cloudflare answer me why this fits with your 
business model?


Mike-