P2P Enemies (October 23rd, 2002)
If a P2P enemy exists and isn't listed below, or if you have more
information that could be of help to others, please get in contact,
e-mail me...@methmail.cjb.net. Check out the
IPs KNOWN BY FXP BOARDS
aol/warner: 216.52.242.0 - 216.52.242.255
vidius: 207.155.127.0 - 207.155.127.255 **
vidius: 207.155.255.0 - 207.155.255.255 **
overpeer.com: 65.174.255.255
overpeer.com: 65.160.0.0 - 65.160.127.255
rangerinc.com: 216.122.0.0 - 216.122.255.255 **
rangerinc.com: 204.92.244.0, 204.92.244.255
cyveillance.com: 63.64.0.0 - 63.127.255.255
cyveillance.com: 63.148.99.224 - 63.148.99.255
cyveillance.com: 65.118.41.192 - 65.118.41.223
mediaforce.com: 65.192.0.0 - 65.192.0.255
mediaforce.com: 65.223.0.0 - 65.223.255.255 **
mediaforce.com: 4.43.96.0 - 4.43.96.255
mediadefender.com: 66.79.10.0 - 66.79.10.255
mediadefender.com: 66.79.0.0 - 66.79.255.255 **
mediadefender.com: 64.225.292.0 - 64.225.292.64 **
baytsp.com: 209.122.130.0 - 209.122.130.255
baytsp.com: 209.204.128.0 - 209.204.191.255
RIAA: 208.192.0.0 - 208.255.255.255
RIAA: 208.225.90.0 - 208.225.90.255
RIAA: 12.150.191.0 - 12.150.191.255
MPAA: 63.199.57.96 - 63.199.57.128
MPAA: 64.166.187.128 - 64.166.187.192
MPAA: 198.70.114.0 - 198.70.114.255
MPAA: 209.67.0.0 - 209.67.255.255
netpd: 207.155.128.0 - 207.155.255.255
netpd: 128.241.0.0 - 128.241.255.255
unknown C&D Cop: 64.106.170.128 - 64.106.170.192
(** - may well block out a few more addresses than the intended hosts!!)
BUSINESS EMAILS
---------------
hot...@mpaa.org
infor...@overpeer.com
sa...@rangerinc.com
in...@cyveillance.com
cdre...@riaa.com
edit...@p2poverflow.com
TECH/ADMIN EMAILS
-----------------
ma...@BAYTSP.COM (BayTSP domain/tech admin)
jhle...@hotmail.com (OverPeer domain/tech admin)
range...@rangerinc.com (Ranger domain/tech admin)
cy_d...@YAHOO.COM (Cyveillance domain/tech admin)
mediad...@yahoo.com (Jon Gomez, MediaDefender domain/tech admin)
he...@mediaforce.com (MediaForce domain/tech admin)
rcl...@goamerica.net (Ralph Clark, BarbWireNetworks domain/tech admin)
p2pov...@hotmail.com (P2P Overflow domain/tech admin)
hmcca...@RIAA.COM (Howard McCaffrey, RIAA domain/tech admin)
pe...@MPAA.ORG (Paul Egge, MPAA domain/tech admin)
Webm...@lra4law.com (Charles Gurley, NukePirates domain/tech admin)
WEB/FTP/DNS SERVERS
-------------------
www.rangercorp.com - (216.122.215.13) 21/80/443 - Apache/1.3.1.1
SSL/1.15 PHP/4.0b2
www.cyveillance.com (63.100.136.127) - Microsoft-IIS 5.0 (Oh dear!!) :)
www.mediadefender.com (66.79.10.215) - TigerShark 1.0.16/DirectNic
NcFTPd FTP Server
www.mediaforce.com (66.217.219.196) - MS-IIS/5.0 - WFTPD 2.4 (uses FP
extns, Win2k box)
www.OverPeer.com (65.160.127.164) - Microsoft-IIS 5.0
OverPeer.com (65.160.127.68) - Microsoft-IIS 5.0
corp01.ad.mediaforce.com (66.217.219.197) - Microsoft-IIS 5.0 / DNS (port53)
www.p2poverflow.com (62.210.138.142) - Zeus 4.0 (HTTPS/443 also open)
www.barbwirenetworks.com (64.225.154.175) - Microsoft-IIS 5.0 (FTP;
HTTPS/443 open)
www.riaa.org (208.225.90.120) - MS-IIS 4.0/Flexnet MS FTP service/MS-FP
Extns./NT4 Box
www.mpaa.org (209.67.152.159) - MS-IIS 5.0-/Win2k
www.lra4law.com (64.33.33.82) - Apache/1.3.26 (Unix)
FrontPage/5.0.2.2510 (FTP; HTTPS/443)
www.tcpbay.com (209.204.138.224) - MS-IIS 5.0/Win2k FrontPage Extensions
(POPMAIL/110; HTTPS/443)
MAIL SERVERS
------------
(pri=10) smtp.overpeer.com/(pri-10) mail.overpeer.com
(pri=10) by mail1.cyveillance.com/(pri=40) by mail2.cyveillance.com
mail.tspbay.com?/pop.tspbay.com?
mail.mediadefender.com/smpt.mediadefender.com
mail.lra4law.com
mail.rangerinc.com
mail.barbwirenetworks.com (216.168.230.140) - VerisignMail.net
WEBSERVER FEEDBACK
------------------
(format: form-URL///post-URL)
http://www.rangercorp.com/About/1-4.shtml///FormSubmit.php
http://www.riaa.org/contact.cfm///Contact_Confirm.cfm
http://www.p2poverflow.com/contacts.php///email.php
http://www.lra4law.com/proper7/ecorder2.htm///cgi-bin/formmail.cgi
CONTACT ADDRESSES
-----------------
Ranger On-Line, 5510 Morehouse Dr Ste 150, San Diego, CA 92121-3725, US
P2P Overflow, 14, rue Victor Hugo, 35270, Combourg, France
Mediaforce Inc., 304 Park Avenue South, New York, 10010, NY, US
Cyveillance, 1555 Wilson Blvd., Suite 404, Arlington, VA 22209, US
(LRA) Legal Research Associates, 630 Crouch Street, Oceanside, CA 92051, US
MediaDefender, P.O. 3522, Venice, CA 90066, US (Tel:2095554456)
All of the following are involved in "spiking" multimedia files so
that when played using Windows Media Player, popup/under ads appear.
idlicl.com - 209.35.183.206 - subset of Class B for Interland
onsystems.com - 64.225.202.40 - subset of Class B for Interland
mediadefender.com - 66.79.10.215 - "Intercosmos Media Group"
interfriendly.net - 216.247.191.186 - subset of Class B for Interland
filetamer.com - 216.231.11.30 - "E-Commerc Tools COXOCCA-ECOMMERCE-1"
For an example hunt this one down (use sig2dat to create Kazaa dat file):
Length:4591510Bytes,4484KB
UUHash:=L+AN18PbASObHaa/bDOERsvJhCU=
Run the following command to permanently route to hell these ip blocks
(you may have to adjust that latter IP, make it a non-routeable IP), or
use a popup blocker.
route -p add %1 mask 255.255.255.0 192.168.1.200
Better yet, does anyone know of a util to strip such crap out of
multimedia files?
CK
lol tommy, you have as much clue as usual, i see.
yes, the riaa, mpaa, overpeer, etc. are not sharing
their files on p2p networks. i suggest you email them
and ask that they start sharing some files!
i think tommy should be on the list. he is always complaining about how
emule makes you share what you are downloading.
> Better yet, does anyone know of a util to strip such crap out of
> multimedia files?
Sure. The files in question are windows media files, so the appropriate tool
would be graphedit. Its a directshow devlopment tool, takes some practice,
but good for cleaning files.
>
> CK
#GAIN(spyware)
ipchains -A output -j REJECT -d 64.94.89.0/24
#GAINCME(spyware)
ipchains -A output -j REJECT -d 66.35.247.0/24
#GAINCME(spyware)
ipchains -A output -j REJECT -d 66.53.229.0/24
#mpaa:
ipchains -A output -j REJECT -d 209.67.0.0/16
#netpd
ipchains -A output -j REJECT -d 128.241.0.0/16
#mediaforce
ipchains -A output -j REJECT -d 65.192.0.0/24
ipchains -A output -j REJECT -d 4.43.96.0/24
echo Blocks are in position!