Google Группы больше не поддерживают новые публикации и подписки в сети Usenet. Опубликованный ранее контент останется доступен.

Faites chier les FAI

0 просмотров
Перейти к первому непрочитанному сообщению

Zopilote

не прочитано,
28 окт. 2010 г., 08:16:3528.10.2010
Envoyez leur un max de relev�s de logs afin que leurs routeurs (en particulier les routeurs BGP)
black listent les connexions issues de ce pays de merde qu'est la Chine qui laisse ou encourage le
hacking, les attaques DOS etc.

exemple :
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,27977 - [DOS] 192.168.0.1 28/10 11:15:00.890
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,9090 - [DOS] 192.168.0.1 28/10 11:15:00.890
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,8090 - [DOS] 192.168.0.1 28/10 11:15:00.906
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,1080 - [DOS] 192.168.0.1 28/10 11:15:00.906
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,8000 - [DOS] 192.168.0.1 28/10 11:15:00.937
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,2301 - [DOS] 192.168.0.1 28/10 11:15:00.937
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,8118 - [DOS] 192.168.0.1 28/10 11:15:00.953
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,6588 - [DOS] 192.168.0.1 28/10 11:15:01.015
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,27977 - [DOS] 192.168.0.1 28/10 13:36:02.015
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,9090 - [DOS] 192.168.0.1 28/10 13:36:02.031
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,8090 - [DOS] 192.168.0.1 28/10 13:36:02.031
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,1080 - [DOS] 192.168.0.1 28/10 13:36:02.046
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,8000 - [DOS] 192.168.0.1 28/10 13:36:02.046
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,2301 - [DOS] 192.168.0.1 28/10 13:36:02.062
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,8118 - [DOS] 192.168.0.1 28/10 13:36:02.078
<132>TCP Packet - Source:58.218.204.110,12200 Destination:82.121.236.202,8088 - [DOS] 192.168.0.1 28/10 13:52:58.140
<132>TCP Packet - Source:58.218.204.110,12200 Destination:82.121.236.202,8008 - [DOS] 192.168.0.1 28/10 13:52:58.156
<132>TCP Packet - Source:58.218.204.110,12200 Destination:82.121.236.202,73 - [DOS] 192.168.0.1 28/10 13:52:58.156
<132>TCP Packet - Source:58.218.204.110,12200 Destination:82.121.236.202,7212 - [DOS] 192.168.0.1 28/10 13:52:58.171
<132>TCP Packet - Source:58.218.204.110,12200 Destination:82.121.236.202,6588 - [DOS] 192.168.0.1 28/10 13:52:58.171
<132>TCP Packet - Source:58.218.204.110,12200 Destination:82.121.236.202,8080 - [DOS] 192.168.0.1 28/10 13:52:58.187

Petit Volcan

не прочитано,
30 окт. 2010 г., 02:39:2630.10.2010


On 28/10/10 14:16, in article 4cc9...@news.x-privat.org, "Zopilote"
<ya...@no.mail> wrote:

> Envoyez leur un max de relevés de logs afin que leurs routeurs (en particulier


> les routeurs BGP)
> black listent les connexions issues de ce pays de merde qu'est la Chine qui
> laisse ou encourage le
> hacking, les attaques DOS etc.
>

Pauvre con. Parle un peu avec les chinois avant de raconter n'importe quoi !
Ces blocages sont illusoires !

0 новых сообщений