bash-2.03# traceroute 12.30.163.51
traceroute to 12.30.163.51 (12.30.163.51), 30 hops max, 40 byte packets
1 m10 (192.168.1.254) 1.107 ms 0.964 ms 0.980 ms
2 203-79-82-254.adsl-wns.paradise.net.nz (203.79.82.254) 140.054 ms
84.662 ms 66.697 ms
3 192.168.253.225 (192.168.253.225) 44.785 ms 44.695 ms 44.548 ms
4 kelly.ipnet.paradise.net.nz (203.96.153.138) 45.616 ms 45.496 ms
45.879 ms
5 cassandra.paradise.net.nz (203.96.152.3) 45.281 ms 46.657 ms 46.064
ms
6 a4-0-0-5.akbr1.netgate.net.nz (202.37.246.77) 56.524 ms 56.097 ms
55.997 ms
7 a0-0-0-2.tkbr1.netgate.net.nz (202.37.246.121) 57.098 ms 56.995 ms
57.062 ms
8 s1-1-1.labr1.netgate.net.nz (202.37.245.170) 183.135 ms 237.940 ms
185.116 ms
9 s5-0-0.lsanca1-cr1.bbnplanet.net (4.24.24.17) 185.678 ms 181.413 ms
182.776 ms
10 p2-1.lsanca1-ba1.bbnplanet.net (4.24.4.5) 182.427 ms 181.607 ms
181.451 ms
11 p1-0.lsanca1-ba2.bbnplanet.net (4.24.4.30) 239.627 ms 236.779 ms
236.387 ms
12 p2-1.sanjose1-nbr1.bbnplanet.net (4.0.1.17) 258.681 ms 243.815 ms
243.602 ms
13 p3-0-0.sanjose1-cr1.bbnplanet.net (4.0.3.202) 244.550 ms 245.610 ms
243.748 ms
14 gr1-h20.sffca.ip.att.net (192.205.31.53) 196.649 ms 197.296 ms
196.466 ms
15 gbr2-p40.sffca.ip.att.net (12.123.12.230) 196.028 ms 198.808 ms
196.160 ms
16 gbr1-p50.sl9mo.ip.att.net (12.122.3.18) 290.260 ms 288.724 ms 291.225
ms
17 br2-a3120s9.sl9mo.ip.att.net (12.123.24.174) 236.103 ms 238.213 ms
240.360 ms
18 sar1-a360s1.sl9mo.ip.att.net (12.127.4.49) 236.299 ms 235.668 ms
235.606 ms
19 12.126.95.74 (12.126.95.74) 284.350 ms 248.101 ms 253.541 ms
20 12.30.163.51 (12.30.163.51) 305.843 ms 302.771 ms 303.961 ms
bash-2.03# whois -h whois.arin.net 12.30.163.51
AT&T ITS (NET-ATT)
101 Crawfords Corner Rd
Holmdel, NJ 07733-3030
US
Netname: ATT
Netblock: 12.0.0.0 - 12.255.255.255
Maintainer: ATTW
Coordinator:
Kostick, Deirdre (DK71-ARIN) [EMAIL PROTECTED]
(888)613-6330
Domain System inverse mapping provided by:
DBRU.BR.NS.ELS-GMS.ATT.NET 199.191.128.106
DMTU.MT.NS.ELS-GMS.ATT.NET 12.127.16.70
CBRU.BR.NS.ELS-GMS.ATT.NET 199.191.128.105
CMTU.MT.NS.ELS-GMS.ATT.NET 12.127.16.69
Record last updated on 26-Sep-1998.
Database last updated on 17-Dec-1999 04:14:49 EDT.
bash-2.03# whois -h abuse.net att.net
[EMAIL PROTECTED]
Send Ms Kostick and [EMAIL PROTECTED] a polite message stating your concerns,
including what evidence you have of the cracking.
HTH,
-- Juha
> -----Original Message-----
> From: Jeff Smelser [mailto:[EMAIL PROTECTED]]
> Sent: Friday, 17 December 1999 09:39
> To: [EMAIL PROTECTED]
> Subject: someone is trying
>
>
> Today, as for the last few days, I have been trying to track this down.
> Please help.
>
> Dec 16 13:27:38 c465357-a portsentry[8432]: attackalert: Connect from
> host: 12.30.163.51/12.30.163.51 to UDP port: 137
> Dec 16 13:27:38 c465357-a portsentry[8432]: attackalert: Host:
> 12.30.163.51 is already blocked. Ignoring
> Dec 16 13:28:48 c465357-a portsentry[8432]: attackalert: Connect from
> host: 12.30.163.51/12.30.163.51 to UDP port: 137
> Dec 16 13:28:48 c465357-a portsentry[8432]: attackalert: Host:
> 12.30.163.51 is already blocked. Ignoring
>
>
> He has been talking to nothing since he has been forwarded to localhost
> for weeks, but this week he seems persistant.. I did a nslookup and its
> either not a valid ip, or he has his own and is not publishing it. I just
> need to some help tracking it down so he can be taken off the net.
>
> I have logs of him trying to crack inetd, and various other ports. Since
> inetd was the on;y open slot, thats the only one he tried for 10 mins.
> Trying to buffer overflow it i think.
>
> Thanks
> Jeff
>
>
>
>
--
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.