| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | anyone heard of these idiots |
omc> In-Reply-To:
omc> From: "Mark D. Overholser"
omc> Subject: Re: anyone heard of these idiots
omc> Reply-To: os2user{at}yahoogroups.com
omc> BBF Tech. Support wrote:
>> 12.233.88.55
>> 216.156.98.4
>> THey ar throwing some wierd stuff at my servers and it appears Injoy can't
>> stop it from
>> hitting.
omc> http://ws.arin.net/cgi-bin/whois.pl>
omc> says:
omc> Search results for: 12.233.88.55
[trim]
omc> Search results for: 216.156.98.4
[trim]
omc> I knew who 12.x.x.x is (I have this ISP too)
omc> Isn't the Internet cool, now you know who to go look for...
correction, now you know who to report it to... you didn't do a reverse DNS
to see who those IPs belonged to... the XO one is assigned to an entity
known as WorldWideScam.com... the other rDNS'd back to a standard attbi
client name...
my point is that you should always try to rDNS back the IP and see who the
domain is... then whois on both the domain AND the ip number... the domain
gets a complaint and the IP owner (the domain's upstream) gets a
complaint... this way, the upstream can stop them if necessary...
)\/(ark
* Origin: (1:3634/12)SEEN-BY: 633/267 270 @PATH: 3634/12 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.