[nsp-sec] DNS Flood to Ultra - Updated list - looking for the malware

Klaus Moeller moeller at dfn-cert.de
Fri Apr 3 09:19:16 EDT 2009


Am Donnerstag, 2. April 2009 23:13:44 schrieb Nicholas Ianelli:
> Targeting: 204.74.66.131 and 204.74.67.131 - port 53/UDP
> Date of traffic: 2009.04.02
> Time: between 20:08 - 20:18 GMT

ACK AS 553, 680, 8365

Best regards,
		Klaus Möller, DFN-CERT

-- 
Dipl. Inform. Klaus Moeller (Incident Response Team)
Phone: +49 40 808077-555, Fax: +49 40 808077-556

DFN-CERT Services GmbH, https://www.dfn-cert.de,  Phone  +49 40 808077-555
Sitz / Register: Hamburg, AG Hamburg, HRB 88805,  Ust-IdNr.:  DE 232129737
Sachsenstrase 5, 20097 Hamburg/Germany, CEO: Dr. Klaus-Peter Kossakowski
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 486 bytes
Desc: This is a digitally signed message part.
URL: <https://puck.nether.net/mailman/private/nsp-security/attachments/20090403/8e87a1b2/attachment-0001.sig>


More information about the nsp-security mailing list