Re: [swinog] MELANI / GovCERT.ch

2020-02-19 Diskussionsfäden Ralph Krämer
I would suggest to use recent information to file such a mail. For me it looks like the are relying on stale information collected a long time ago. whoever is hosting this stale information ... you simply could query the live DNS and the RIPE whois server ... I agree with Andreas ... they do

Re: [swinog] MELANI / GovCERT.ch

2020-02-18 Diskussionsfäden Silvan M. Gebhardt
So what I suspect happened is this On 2/18/20 1:51 AM, Andreas Fink wrote: > 2. The single IP address in the report is not in my network (I used to > have that IP range in the past but I sold it in 2016. So long long ago. ) it might still be registred to you via shadowservers.org OR another org

[swinog] MELANI / GovCERT.ch

2020-02-17 Diskussionsfäden Andreas Fink
Hello Swinog Users, Has anyone of you received some info from MELANI / GovCERT about some IoT vulnerability you might be exposed to? Well I did and I found very very strange things in this report. 1. The report contains only a timestamp, an IP address and a DNS name. Not which