On Mar 11, 2014, at 2:00 PM, Markus <[email protected]> wrote:

> Any advice?

Start with CERT-BUND, maybe?

Although it's questionable whether or not it's possible to remotely absolutely 
ascertain whether the attacking machine in question was being operated by 
miscreants unbeknownst to its actual owner.

-----------------------------------------------------------------------
Roland Dobbins <[email protected]> // <http://www.arbornetworks.com>

          Luck is the residue of opportunity and design.

                       -- John Milton


Reply via email to