Crack attempt
Brian Densmore
DensmoreB at ctbsonline.com
Fri Oct 29 10:17:27 CDT 2004
FYI.
This guy spent two hours Thursday, 3am-5am,
trying to break into my server's root account.
168.68.129.127
Dig says:
; <<>> DiG 2.1 <<>> @dns1.menandmice.is 168.68.129.127 A
; (1 server found)
;; res options: init recurs defnam dnsrch
;; got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10
;; flags: qr rd ra; Ques: 1, Ans: 0, Auth: 1, Addit: 0
;; QUESTIONS:
;; 168.68.129.127, type = A, class = IN
;; AUTHORITY RECORDS:
. 300 SOA A.ROOT-SERVERS.NET. NSTLD.VERISIGN-GRS.COM. (
2004102900 serial
1800 refresh (30 mins)
900 retry (15 mins)
604800 expire (7 days)
86400 ) minimum (1 day)
;; Total query time: 2 msec
;; FROM: us.mirror.menandmice.com to SERVER: default -- 0.0.0.0
;; WHEN: Fri Oct 29 09:09:57 2004
;; MSG SIZE sent: 32 rcvd: 107
*********************************************************8
ARIN says:
OrgName: USDA Office of Operations
OrgID: UOO-2
Address: Suite 133, Building A
Address: 2150 Centre Ave
City: Fort Collins
StateProv: CO
PostalCode: 80526
Country: US
NetRange: 168.68.0.0 - 168.68.255.255
CIDR: 168.68.0.0/16
NetName: PPQ
NetHandle: NET-168-68-0-0-1
Parent: NET-168-0-0-0-0
NetType: Direct Assignment
NameServer: NS1.USDA.GOV
NameServer: NS2.USDA.GOV
NameServer: NS3.USDA.GOV
Comment:
RegDate: 1994-01-26
Updated: 2003-04-30
OrgAbuseHandle: ZU20-ARIN
OrgAbuseName: USDA - Office of the ChiefInformation Officer
OrgAbusePhone: +1-970-295-5277
OrgAbuseEmail: Network.Operations at usda.gov
OrgNOCHandle: ZU20-ARIN
OrgNOCName: USDA - Office of the ChiefInformation Officer
OrgNOCPhone: +1-970-295-5277
OrgNOCEmail: Network.Operations at usda.gov
OrgTechHandle: ZU20-ARIN
OrgTechName: USDA - Office of the ChiefInformation Officer
OrgTechPhone: +1-970-295-5277
OrgTechEmail: Network.Operations at usda.gov
# ARIN WHOIS database, last updated 2004-10-28 19:10
# Enter ? for additional hints on searching ARIN's WHOIS database.
More information about the Kclug
mailing list