That’s a pretty typical “attack profile” … The victim either moves providers trying to escape the attack or the domain expires/deletes, gets picked up and the new owner suddenly finds themselves under attack too…
> On Dec 11, 2014, at 4:50 PM, Dnsbed (Jeff) <supp...@dnsbed.com> wrote: > > DNSMadeEasy, DNSimple, 1AND1 were under attacks these days. > I heard DNSMadeEasy and DNSimple were attacked due to the same domain name > hosted there. > > Livingood, Jason wrote: >> >> Seems like a lot of DNS abuse happening this week. Surely there’s a wider >> story someplace? >> >> Jason > > -- > Best Regards, > DNSbed Hosting <http://www.dnsbed.com/> >
signature.asc
Description: Message signed with OpenPGP using GPGMail
_______________________________________________ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations dns-jobs mailing list https://lists.dns-oarc.net/mailman/listinfo/dns-jobs