[nsp-sec] Potential DoS data for 89.45.193.200 and 204.188.216.183

Mike Tancsa mike at sentex.net
Thu Dec 16 16:01:33 EST 2010


On 12/16/2010 2:27 PM, Buraglio, Nicholas D wrote:
> ----------- nsp-security Confidential --------
> 
> 
> 
> 
> I'm looking for data that anyone can provide us on the addresses 89.45.193.200 from 11:43:23  to 11:53:22  and 204.188.216.183 from  11:38:44 to 11:48:45 All times are GMT -6.  We (AS38 in this case) believe we were the source of a port 80 DoS attack toward those two hosts.  Specifically, I'm looking for any other networks sourcing to those addresses during this same timeframe. We saw a very large amount of single packet flows in a relatively short amount of time and are trying to drill down if we were part of something larger.  
> 
> AS      | IP               | AS Name
> 34358   | 89.45.193.200    | CLAXTELECOM CLAX TELECOM SRL
> 
> AS      | IP               | AS Name
> 46844   | 204.188.216.183  | ST-BGP - SHARKTECH INTERNET SERVICES

I see the odd bit of back scatter... Sheesh, is it spoof Sentex's IP space today?!?! Oh wait, thats every day :(

 ra -t 12 -L0 -Zb -nr argus-sites-radium - host 204.188.216.183 or host 89.45.193.200 and not udp
         StartTime    Flgs  Proto            SrcAddr  Sport   Dir            DstAddr  Dport  TotPkts   TotBytes State 
12-16 12:38:07.006 Ne         tcp    204.188.216.183.80        ->      199.71.252.19.19463         7        308   SA_
12-16 12:38:38.998 Ne         tcp    204.188.216.183.80        ->      199.71.252.19.19463         1         44   SA_
12-16 12:40:45.136 Ne         tcp    204.188.216.183.80        ?>       67.43.137.90.26637         1         44   RA_
12-16 12:42:13.626  e         tcp    204.188.216.183.80        ?>       67.43.143.58.30740         1         60   RA_
12-16 12:43:25.849 Ne         tcp    204.188.216.183.80        ?>       199.85.118.0.20796         1         44   RA_
12-16 12:43:57.804  e         tcp    204.188.216.183.80        ?>      98.159.242.91.38531         1         60   RA_
12-16 12:44:59.314  *         tcp    204.188.216.183.80        ?>        64.7.133.47.56335         1         62   RA_
12-16 12:44:59.314  e         tcp    204.188.216.183.80        ?>        64.7.133.47.56335         1         60   RA_
12-16 12:47:42.302 Ne         tcp    204.188.216.183.80        ?>        64.7.136.98.21575         1         44   RA_
12-16 12:48:55.057  e         tcp      89.45.193.200.80        ->      98.159.242.82.41034         1         60   SA_
12-16 12:49:17.085  e         tcp      89.45.193.200.80        ->       67.43.130.62.4764          2        118 SA_RA
12-16 12:50:27.741  e         tcp      89.45.193.200.80        ->       64.7.156.122.56179         1         60   SA_
12-16 12:50:55.086  e         tcp      89.45.193.200.80        ->       67.43.143.82.52142         1         60   SA_
12-16 12:50:49.010 Ne         tcp      89.45.193.200.80        ->      198.73.240.58.15192         1         40   SA_
12-16 12:51:43.726  e         tcp      89.45.193.200.80        ->       64.7.157.126.6665          1         60   SA_
12-16 12:52:50.225 Ne         tcp      89.45.193.200.80        ->       67.43.136.67.48341         1         40   SA_

	---Mike

> 
> 
> 
> Thanks,
> 
> nb
> 
> ---
> Nick Buraglio   
> Network Engineer
> University of Illinois CITES / ICCN
> GPG key 0x2E5B44F4
> Phone: 217.244.6428
> buraglio at illinois.edu
> 
> 
> 
> 
> 
> 
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
> 
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________




More information about the nsp-security mailing list