Ignacio Agullo inquired:
Was it necessary to attach dozens of files, about one megabyte of size?

Yes; they're all different, with differing goals, impacts, patterns, and the like.

I'd also like to encourage others to attempt similar analyses. It's taking me a couple of months to gather the data and put it into an order which can be examined
to find out why and how so many attacks are being made by servers located at
addresses which cannot be traced. These results show that they can be examined for country of origin, degree of obfuscation, location of additional addresses, etc.

There are other months in the year; one person cannot possibly keep up with the task; yet there are hundreds of folks picking up the traces left behind in the headers of malicious messages; you can find out for yourselves by putting one of the PTR records (a.k.a. hostnames) in an Internet search engine, enclosed in quotation marks, and then gathering the IP addresses gleaned from malicious Internet traffic by the many folks who monitor such traffic. That's another webpage like this excerpt that can be generated.

George Langford

Reply via email to