July 2009 Archives by author
Starting: Thu Jul 2 07:19:22 EDT 2009
Ending: Fri Jul 31 19:01:36 EDT 2009
Messages: 267
- [nsp-sec] ACK AS20252 - Re: katusha infected drones
Daniel Adinolfi
- [nsp-sec] ACK - black energy botnet
Rodolfo Baader
- [nsp-sec] ACK: buzus infected drones
Rodolfo Baader
- [nsp-sec] More bots to swat
Dave Burke
- [nsp-sec] ACK AS852 - RE: black energy botnet
Chris Calvert
- [nsp-sec] ACK AS852 - RE: Multiple DDoS attacks
Chris Calvert
- [nsp-sec] Multiple DDoS attacks (More outbound bot IP calls)
Chris Calvert
- [nsp-sec] DDoS targeting 77.87.225.2
Chris Calvert
- [nsp-sec] ACK AS852 - RE: katusha infected drones
Chris Calvert
- [nsp-sec] DNS attack on 213.94.190.236/213.94.190.194 (AS5466)
Aidan Carty
- [nsp-sec] ACK AS 1221 Our external SMTP server is being hammered
Chisholm, Glenn L
- [nsp-sec] Paging Dotster, PNAP - Multiple Nameservers Offline
Tom Daly
- [nsp-sec] Why do a route hijack for 1 second?
Eli Dart
- [nsp-sec] katusha infected drones
Paul Dokas
- [nsp-sec] FW: Eircom issues
Sidney Faber
- [nsp-sec] Web Server Attack
Scott Fendley
- [nsp-sec] Web Server Attack
Scott Fendley
- [nsp-sec] Mebroot/Torpig c&c (AS 46475, 15083, 25653)
Tom Fischer
- [nsp-sec] fast-flux botnet
Tom Fischer
- [nsp-sec] Multiple DDoS attacks
John Fraizer
- [nsp-sec] Got traffic?
John Fraizer
- [nsp-sec] Got traffic? - DDoS
John Fraizer
- [nsp-sec] Got traffic? - DDoS
John Fraizer
- [nsp-sec] Paging Akamai
John Fraizer
- [nsp-sec] FW: 48 hour vetting: Jaco Engelbrecht (Clara Net, AS(seebelow))
David Freedman
- [nsp-sec] 48 hour vetting: Andy Davidson (NetSumo, AS(longlist))
David Freedman
- [nsp-sec] 48 hour vetting: Ryan Shea (Verizon Business, AS 701/702..)
Gill, James E (gill)
- [nsp-sec] Multiple DDoS attacks
Stephen Gill
- [nsp-sec] Comcast to the courtesy phone...
Stephen Gill
- [nsp-sec] 48 hour vetting: Andy Davidson (NetSumo, AS(longlist))
Patrick W. Gilmore
- [nsp-sec] 48 hour vetting: Jaco Engelbrecht (Clara Net, AS(seebelow))
Nishal Goburdhan
- [nsp-sec] katusha infected drones
Nishal Goburdhan
- [nsp-sec] Got traffic?
Yiming Gong
- [nsp-sec] Paging Dotster, PNAP - Multiple Nameservers Offline
Chip Gwyn
- [nsp-sec] ACK RE: Multiple DDoS attacks (More outbound bot IP calls)
Krista Hickey
- [nsp-sec] ACK RE: katusha infected drones
Krista Hickey
- [nsp-sec] 48 hour vetting: Andy Davidson (NetSumo, AS(longlist))
Nick Hilliard
- [nsp-sec] 48 hour vetting: Andy Davidson (NetSumo, AS(longlist))
Aaron Hughes
- [nsp-sec] Is www.ssa.gov gone?
Aaron Hughes
- [nsp-sec] 48 hour vetting: Andy Davidson (NetSumo, AS(longlist))
Mike Hughes
- [nsp-sec] 48 hour vetting: Jaco Engelbrecht (Clara Net, AS(seebelow))
Mike Hughes
- [nsp-sec] Information request about upline-club.ru
Thomas Hungenberg
- [nsp-sec] Information request about upline-club.ru
Thomas Hungenberg
- [nsp-sec] DDoS targeting 77.87.225.2
Thomas Hungenberg
- [nsp-sec] DDoS targeting 77.87.225.2
Thomas Hungenberg
- [nsp-sec] FTP dropzones
Thomas Hungenberg
- [nsp-sec] Compromised websites
Thomas Hungenberg
- [nsp-sec] RFI attack URLs
Thomas Hungenberg
- [nsp-sec] Multiple DDoS attacks
Nicholas Ianelli
- [nsp-sec] Multiple DDoS attacks
Nicholas Ianelli
- [nsp-sec] Our external SMTP server is being hammered - ACK 855 + Info
Nicholas Ianelli
- [nsp-sec] UDP based DDoS Attack
Nicholas Ianelli
- [nsp-sec] UDP based DDoS Attack
Nicholas Ianelli
- [nsp-sec] AS46475 - Limestone Networks, Inc.
Nicholas Ianelli
- [nsp-sec] Got traffic?
Nicholas Ianelli
- [nsp-sec] Got traffic?
Nicholas Ianelli
- [nsp-sec] Got traffic? - DDoS
Nicholas Ianelli
- [nsp-sec] AS15623 WCP (or AS3320, AS3549, AS13030, AS16265)
Nicholas Ianelli
- [nsp-sec] UDP DDoS - Ping Cogent, Verizon Business, DTAG, Tiscali, Yahoo, GBLX, Level3
Nicholas Ianelli
- [nsp-sec] Got traffic?
Nicholas Ianelli
- [nsp-sec] Got traffic?
Nicholas Ianelli
- [nsp-sec] AS 46475 - Logging site
Nicholas Ianelli
- [nsp-sec] Korean DDoS update - List confidential
Nicholas Ianelli
- [nsp-sec] Korean DDoS update - List confidential - C2 updates - 2009.07.31
Nicholas Ianelli
- [nsp-sec] black energy botnet
Gabriel Iovino
- [nsp-sec] Bots currently hitting our SMTP server
Gabriel Iovino
- [nsp-sec] DoS attack (9723,24961,31400)
Zane Jarvis
- [nsp-sec] RFI attack URLs - ACK AU
Zane Jarvis
- [nsp-sec] AS 46475 - Logging site
Zane Jarvis
- [nsp-sec] AS 46475 - Logging site
Zane Jarvis
- [nsp-sec] LEO involved in "Korean" DDoS issue
Rodney Joffe
- [nsp-sec] Korean DDoS update - List confidential
Rodney Joffe
- [nsp-sec] Got traffic?
Robert Kiessling
- [nsp-sec] Multiple DDoS attacks
YoungBaek Kim
- [nsp-sec] Multiple DDoS attacks
YoungBaek Kim
- [nsp-sec] Multiple DDoS attacks (More outbound bot IP calls)
YoungBaek Kim
- [nsp-sec] Korea botnet actually deleting files?
YoungBaek Kim
- [nsp-sec] Korean DDoS update - List confidential
YoungBaek Kim
- [nsp-sec] Is www.ssa.gov gone?
Kistler, Kris
- [nsp-sec] Multiple DDoS attacks
Maher, Kevin E.
- [nsp-sec] Abuser IP's, possible bots
Maher, Kevin E.
- [nsp-sec] 48 hour vetting: Andy Davidson (NetSumo, AS(longlist))
Thomas Mangin
- [nsp-sec] buzus infected drones
Carlos Fragoso Mariscal
- [nsp-sec] gov ddos conf call
Jared Mauch
- [nsp-sec] LEO involved in "Korean" DDoS issue
Matthew McGlashan
- [nsp-sec] Multiple DDoS attacks
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Jaco Engelbrecht (Clara Net, AS(seebelow))
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Andy Davidson (NetSumo, AS(longlist))
Scott A. McIntyre
- [nsp-sec] Annoying synfloods: 82.161.224.217 and 82.161.224.160
Scott A. McIntyre
- [nsp-sec] Annoying synfloods: 82.161.224.217 and 82.161.224.160
Scott A. McIntyre
- [nsp-sec] katusha infected drones
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Jason Gardiner (Direcpath, AS31939)
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Ryan Shea (Verizon Business, AS 701/702..)
Scott A. McIntyre
- [nsp-sec] Why do a route hijack for 1 second?
Danny McPherson
- [nsp-sec] Ping KR-CERT
Dave Mitchell
- [nsp-sec] Multiple DDoS attacks
Dave Mitchell
- [nsp-sec] Multiple DDoS attacks
Dave Mitchell
- [nsp-sec] Multiple DDoS attacks
Dave Mitchell
- [nsp-sec] Multiple DDoS attacks
Dave Mitchell
- [nsp-sec] Multiple DDoS attacks
Dave Mitchell
- [nsp-sec] Multiple DDoS attacks
Dave Mitchell
- [nsp-sec] Multiple DDoS attacks (bot list attached)
Dave Mitchell
- [nsp-sec] Multiple DDoS attacks (bot list attached)
Dave Mitchell
- [nsp-sec] Multiple DDoS attacks (ping comcast)
Dave Mitchell
- [nsp-sec] Multiple DDoS attacks (ping comcast)
Dave Mitchell
- [nsp-sec] Multiple DDoS attacks
Dave Mitchell
- [nsp-sec] Multiple DDoS attacks
Dave Mitchell
- [nsp-sec] Multiple DDoS attacks
Dave Mitchell
- [nsp-sec] Multiple DDoS attacks (More outbound bot IP calls)
Dave Mitchell
- [nsp-sec] Multiple DDoS attacks (More outbound bot IP calls)
Dave Mitchell
- [nsp-sec] No access to www.ssa.gov
Dave Mitchell
- [nsp-sec] yahoo.com username/password dropbox: mailupgrade68 at yahoo.com
Dave Mitchell
- [nsp-sec] Multiple DDoS attacks (More outbound bot IP calls)
Taka Mizuguchi
- [nsp-sec] ACK. Re: RFI attack URLs
Taka Mizuguchi
- [nsp-sec] ACK. Re: websites with torpig iframes
Taka Mizuguchi
- [nsp-sec] Daily Reports Summary for week ending 2009-07-13
Dave Monnier
- [nsp-sec] Service Outage - MHR
Dave Monnier
- [nsp-sec] Service Outage - MHR
Dave Monnier
- [nsp-sec] Upcoming Team Cymru Service Maintenance and Outages
Dave Monnier
- [nsp-sec] phish dropbox @gmail.com
Peter Moody
- [nsp-sec] Why do a route hijack for 1 second?
Peter Moody
- [nsp-sec] RFI attack URLs
Peter Moody
- [nsp-sec] phishing mail dropbox: helpdesk.team14 at gmail.com
Peter Moody
- [nsp-sec] gmail phishing drop-box
Peter Moody
- [nsp-sec] Multiple DDoS attacks
Chris Morrow
- [nsp-sec] Multiple DDoS attacks
Chris Morrow
- [nsp-sec] Multiple DDoS attacks
Chris Morrow
- [nsp-sec] internap to the WCP if you please
Chris Morrow
- [nsp-sec] No access to www.ssa.gov
Chris Morrow
- [nsp-sec] Is www.ssa.gov gone?
Chris Morrow
- [nsp-sec] No access to www.ssa.gov
Chris Morrow
- [nsp-sec] Why do a route hijack for 1 second?
Chris Morrow
- [nsp-sec] ping as44050 Petersburg Internet Network LLC
Chris Morrow
- [nsp-sec] Korea botnet actually deleting files?
Jose Nazario
- [nsp-sec] RFI attack URLs
Jose Nazario
- [nsp-sec] RFI attack URLs
Jose Nazario
- [nsp-sec] Twitter contact?
Jose Nazario
- [nsp-sec] IcePoint DDoS Bot Description
Jose Nazario
- [nsp-sec] ack 21844 Re: More bots to swat
Chris Newcomb
- [nsp-sec] Why do a route hijack for 1 second?
Hank Nussbacher
- [nsp-sec] Why do a route hijack for 1 second?
Hank Nussbacher
- [nsp-sec] Why do a route hijack for 1 second?
Hank Nussbacher
- [nsp-sec] Why do a route hijack for 1 second?
Hank Nussbacher
- [nsp-sec] Why do a route hijack for 1 second?
Hank Nussbacher
- [nsp-sec] New Daily Reports Category: Open Resolvers
Hank Nussbacher
- [nsp-sec] New Daily Reports Category: Open Resolvers
Hank Nussbacher
- [nsp-sec] ACK websites with torpig iframes
Zoe O'Connell
- [nsp-sec] phish: Yahoo, live.com and CW Panama please take actions
CERT-UT - Peter
- [nsp-sec] possible malware on sharlatan.ucoz.com
SURFcert - Peter
- [nsp-sec] possible malware on sharlatan.ucoz.com
SURFcert - Peter
- [nsp-sec] phish dropbox @gmail.com
SURFcert - Peter
- [nsp-sec] ACK 1103 katusha infected drones
SURFcert - Peter
- [nsp-sec] ACK 1103 katusha infected drones
SURFcert - Peter
- [nsp-sec] phish: Yahoo, live.com and CW Panama please take actions
SURFcert - Peter
- [nsp-sec] Web Server Attack
SURFcert - Peter
- [nsp-sec] buzus infected drones
SURFcert - Peter
- [nsp-sec] Information request about upline-club.ru
Tarmo Randel
- [nsp-sec] katusha infected drones - ACK AS209
Roper, Sara
- [nsp-sec] ACK AS209 buzus infected drones
Roper, Sara
- [nsp-sec] More bots to swat
Joel Rosenblatt
- [nsp-sec] Our external SMTP server is being hammered
Joel Rosenblatt
- [nsp-sec] PayPal phishing scam - any contacts?
Joel Rosenblatt
- [nsp-sec] Korea botnet actually deleting files?
Joel Rosenblatt
- [nsp-sec] No access to www.ssa.gov
Joel Rosenblatt
- [nsp-sec] Is www.ssa.gov gone?
Joel Rosenblatt
- [nsp-sec] No access to www.ssa.gov
Joel Rosenblatt
- [nsp-sec] Is www.ssa.gov gone?
Joel Rosenblatt
- [nsp-sec] Ping ASN 701 - Verizon - we still can't get to ssa.gov
Joel Rosenblatt
- [nsp-sec] Bots currently hitting our SMTP server
Joel Rosenblatt
- [nsp-sec] Web Server Attack
Joel Rosenblatt
- [nsp-sec] PaeTec Security Contact?
Scalzo, Frank
- [nsp-sec] udp/53 floods from AS20773, c&c?
Felix Schueren
- [nsp-sec] DDoS to 72.167.232.201
Greg Schwimer
- [nsp-sec] Is www.ssa.gov gone?
Greg Schwimer
- [nsp-sec] Is www.ssa.gov gone?
Greg Schwimer
- [nsp-sec] ACK 26496 - Re: RFI attack URLs
Greg Schwimer
- [nsp-sec] ACK 174 RE: Our external SMTP server is being hammered
Shelton, Steve
- [nsp-sec] ACK 174 RE: RFI attack URLs
Shelton, Steve
- [nsp-sec] ACK 174 RE: websites with torpig iframes
Shelton, Steve
- [nsp-sec] Stumbled upon some malware | domain x8f.ru - numerous A' records
Shelton, Steve
- [nsp-sec] Stumbled upon some malware | domain x8f.ru - numerous A'records
Shelton, Steve
- [nsp-sec] gmail phishing drop-box
Michael Sinatra
- [nsp-sec] possible malware on sharlatan.ucoz.com
Smith, Donald
- [nsp-sec] Multiple DDoS attacks
Smith, Donald
- [nsp-sec] Multiple DDoS attacks
Smith, Donald
- [nsp-sec] Multiple DDoS attacks
Smith, Donald
- [nsp-sec] Multiple DDoS attacks
Smith, Donald
- [nsp-sec] Multiple DDoS attacks (More outbound bot IP calls)
Smith, Donald
- [nsp-sec] China to the wcp please:)
Smith, Donald
- [nsp-sec] Korea botnet actually deleting files?
Smith, Donald
- [nsp-sec] Why do a route hijack for 1 second?
Smith, Donald
- [nsp-sec] Why do a route hijack for 1 second?
Smith, Donald
- [nsp-sec] katusha infected drones
Smith, Donald
- [nsp-sec] 48 hour vetting: Jason Gardiner (Direcpath, AS31939)
Smith, Donald
- [nsp-sec] Korean DDoS update - List confidential
Smith, Donald
- [nsp-sec] ping or contact @AS13213
Christoph Sprongl
- [nsp-sec] ping as44050 Petersburg Internet Network LLC
Christoph Sprongl
- [nsp-sec] - ping hotmail
Christoph Sprongl
- [nsp-sec] black energy botnet
Dirk Stander
- [nsp-sec] udp/53 floods from AS20773, c&c?
Dirk Stander
- [nsp-sec] udp/53 floods from AS20773, c&c?
Dirk Stander
- [nsp-sec] .{ru,cn}:8080 infected web sites
Dirk Stander
- [nsp-sec] katusha infected drones
Dirk Stander
- [nsp-sec] Compromised websites
Dirk Stander
- [nsp-sec] Web Server Attack
Dirk Stander
- [nsp-sec] RFI attack URLs
Dirk Stander
- [nsp-sec] websites with torpig iframes
Dirk Stander
- [nsp-sec] buzus infected drones
Dirk Stander
- [nsp-sec] Ping ASN 701 - Verizon - we still can't get to ssa.gov
Justin M. Streiner
- [nsp-sec] Why do a route hijack for 1 second?
Sweeney, William- CIPS
- [nsp-sec] RFI attack URLs
Sweeney, William- CIPS
- [nsp-sec] DoS attack (9723,24961,31400)
Mike Tancsa
- [nsp-sec] katusha infected drones
Philip Taylor
- [nsp-sec] Cisco Security Advisory: Cisco IOS Software Border Gateway Protocol 4-Byte Autonomous System Number Vulnerabilities
Cisco Systems Product Security Incident Response Team
- [nsp-sec] possible malware on sharlatan.ucoz.com
Rob Thomas
- [nsp-sec] Information request about upline-club.ru
Rob Thomas
- [nsp-sec] Multiple DDoS attacks
Rob Thomas
- [nsp-sec] Multiple DDoS attacks
Rob Thomas
- [nsp-sec] DDoS to 72.167.232.201
Rob Thomas
- [nsp-sec] FW: Eircom issues
Rob Thomas
- [nsp-sec] FW: Eircom issues
Rob Thomas
- [nsp-sec] No access to www.ssa.gov
Rob Thomas
- [nsp-sec] No access to www.ssa.gov
Rob Thomas
- [nsp-sec] Got traffic?
Rob Thomas
- [nsp-sec] Got traffic?
Rob Thomas
- [nsp-sec] Twitter contact?
Rob Thomas
- [nsp-sec] AS 46475 - Logging site
Rob Thomas
- [nsp-sec] katusha infected drones - ACK AS680
Torsten Voss
- [nsp-sec] phishing mail dropbox: helpdesk.team14 at gmail.com
Torsten Voss
- [nsp-sec] Comcast to the courtesy phone...
Walker, Severin
- [nsp-sec] FW: Eircom issues
Florian Weimer
- [nsp-sec] Got traffic?
Florian Weimer
- [nsp-sec] Got traffic?
Florian Weimer
- [nsp-sec] Our external SMTP server is being hammered - ACK 855 + Info
White, Gerard
- [nsp-sec] Is www.ssa.gov gone?
White, Gerard
- [nsp-sec] Ping ASN 701 - Verizon - we still can't get to ssa.gov
White, Gerard
- [nsp-sec] ACK 855 : RE: katusha infected drones
White, Gerard
- [nsp-sec] Daily Reports Summary for week ending 2009-07-06
Tim Wilde
- [nsp-sec] Multiple DDoS attacks
Tim Wilde
- [nsp-sec] New Daily Reports "bots" category malware types
Tim Wilde
- [nsp-sec] Multiple DDoS attacks
Tim Wilde
- [nsp-sec] Multiple DDoS attacks
Tim Wilde
- [nsp-sec] Multiple DDoS attacks
Tim Wilde
- [nsp-sec] Daily Reports Summary for week ending 2009-07-20
Tim Wilde
- [nsp-sec] Daily Reports Summary for week ending 2009-07-27
Tim Wilde
- [nsp-sec] New Daily Reports Category: Open Resolvers
Tim Wilde
- [nsp-sec] New Daily Reports Category: Open Resolvers
Tim Wilde
- [nsp-sec] New Daily Reports Category: Open Resolvers
Tim Wilde
- [nsp-sec] New Daily Reports Category: Open Resolvers
Tim Wilde
- [nsp-sec] EDU Phishing site
Jeff Wolfe
- [nsp-sec] EDU Phishing site
Jeff Wolfe
- [nsp-sec] Korea botnet actually deleting files?
Bill Woodcock
- [nsp-sec] 48 hour vetting: Jaco Engelbrecht (Clara Net, AS(seebelow))
Bill Woodcock
- [nsp-sec] Comcast Business
Wes Young
- [nsp-sec] No access to www.ssa.gov
m.campisano at comcast.net
- [nsp-sec] No access to www.ssa.gov
m.campisano at comcast.net
- [nsp-sec] No access to www.ssa.gov
jim deleskie
- [nsp-sec] ThePlanet - heads up
jose nazario
- [nsp-sec] yahoo.com username/password dropbox: mailupgrade68 at yahoo.com
sthaug at nethelp.no
- [nsp-sec] ACK katusha infected drones
par.osterberg at sitic.se
- [nsp-sec] Multiple DDoS attacks
Matthew.Swaar at us-cert.gov
- [nsp-sec] Ping Akamai
Matthew.Swaar at us-cert.gov
- [nsp-sec] Multiple DDoS attacks
Matthew.Swaar at us-cert.gov
- [nsp-sec] Multiple DDoS attacks
Matthew.Swaar at us-cert.gov
- [nsp-sec] Multiple DDoS attacks
Matthew.Swaar at us-cert.gov
- [nsp-sec] Multiple DDoS attacks
Matthew.Swaar at us-cert.gov
- [nsp-sec] Multiple DDoS attacks
구자현
Last message date:
Fri Jul 31 19:01:36 EDT 2009
Archived on: Thu Jan 22 18:52:07 EST 2015
This archive was generated by
Pipermail 0.09 (Mailman edition).