That’s a pretty typical “attack profile” … The victim either moves providers 
trying to escape the attack or the domain expires/deletes, gets picked up and 
the new owner suddenly finds themselves under attack too…


> On Dec 11, 2014, at 4:50 PM, Dnsbed (Jeff) <supp...@dnsbed.com> wrote:
> 
> DNSMadeEasy, DNSimple, 1AND1 were under attacks these days.
> I heard DNSMadeEasy and DNSimple were attacked due to the same domain name 
> hosted there.
> 
> Livingood, Jason wrote:
>> 
>> Seems like a lot of DNS abuse happening this week. Surely there’s a wider 
>> story someplace?
>> 
>> Jason
> 
> --
> Best Regards,
> DNSbed Hosting <http://www.dnsbed.com/>
> 

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Reply via email to