February 2011 Archives by date
Starting: Tue Feb 1 00:49:57 EST 2011
Ending: Mon Feb 28 23:39:45 EST 2011
Messages: 112
- [nsp-sec] Possible C&C server at 213.251.184.85, port 6600
Jason Chambers
- [nsp-sec] Contact at AS49367 and AS3313?
Tom Fischer
- [nsp-sec] Possible C&C server at 213.251.184.85, port 6600
Tim Wilde
- [nsp-sec] Possible C&C server at 213.251.184.85, port 6600
Darren Grabowski
- [nsp-sec] ATT Yahoo/AOL scam drop box
Jeff Wolfe
- [nsp-sec] ATT Yahoo/AOL scam drop box
Salusky, William
- [nsp-sec] Something odd in the mail queue. AS30496
Scott A. McIntyre
- [nsp-sec] Attn Yahoo (AS36752) - Rimecud URL hosted
Carol Overes
- [nsp-sec] ASN 16276 contact?
Tom Fischer
- [nsp-sec] Daily Reports Summary for week ending 2011-02-07
Tim Wilde
- [nsp-sec] Can someone from Google contact me off list...regarding doubleclick
Buchanan, Mark
- [nsp-sec] Can someone from Google contact me off list...regarding doubleclick
Chris Morrow
- [nsp-sec] signing off...
Michael Sinatra
- [nsp-sec] Google: phishing using spreadsheet
Niels den Otter
- [nsp-sec] Cost of "cleaning up" networks
Rodney Joffe
- [nsp-sec] attn Google, gmail dropbox used in phish
RuthAnne Bevier
- [nsp-sec] attn Google, gmail dropbox used in phish
Peter Moody
- [nsp-sec] ChinaNet contact? 222.73.173.229 bots and brute force ssh
Aaron Hughes
- [nsp-sec] Daily Reports Summary for week ending 2011-02-14
Tim Wilde
- [nsp-sec] Leaving NSP-Sec (for the time being I suspect)
john l clarke III
- [nsp-sec] ping as9050 & as8708 romtelecom
Christoph Sprongl
- [nsp-sec] ACK: Re: Stolen FTP credentials
Justin M. Streiner
- [nsp-sec] Stolen FTP credentials
Dirk Stander
- [nsp-sec] Stolen FTP credentials
Thomas Hungenberg
- [nsp-sec] ACK 174 RE: Stolen FTP credentials
Shelton, Steve
- [nsp-sec] Stolen FTP credentials
Jeff Wolfe
- [nsp-sec] Stolen FTP credentials
Gert Doering
- [nsp-sec] ACK 3561 Stolen FTP credentials
Buchanan, Mark
- [nsp-sec] ACK AS26 - Re: Stolen FTP credentials
Daniel Robert Adinolfi
- [nsp-sec] ACK: 2119, 8434 & 8786 - Stolen FTP credentials
Helge Aksdal
- [nsp-sec] Stolen FTP credentials
Aaron Hughes
- [nsp-sec] ACK: Stolen FTP credentials
Gabriel Iovino
- [nsp-sec] ACK RE: Stolen FTP credentials
Marc Kneppers
- [nsp-sec] ACK RE: [OFFENSIVE] Stolen FTP credentials
Krista Hickey
- [nsp-sec] Stolen FTP credentials
Stijn Jonker
- [nsp-sec] Stolen FTP credentials
Tarmo Randel
- [nsp-sec] Stolen FTP credentials
Carles Fragoso
- [nsp-sec] ACK71,5714,10782 : Stolen FTP credentials
Helmut Springer
- [nsp-sec] Ack5400 - Stolen FTP credentials
Schaminee, Jacques (eu.bt.net)
- [nsp-sec] ACK71,5714,10782 : Stolen FTP credentials
Helmut Springer
- [nsp-sec] Stolen FTP credentials
Jaco Engelbrecht
- [nsp-sec] ACK: Stolen FTP credentials
Alfredo Sola
- [nsp-sec] Stolen FTP credentials - Ack 855
White, Gerard
- [nsp-sec] ACK for as553 - Stolen FTP credentials
Tim Kleefass
- [nsp-sec] Ack: Stolen FTP credentials
Hank Nussbacher
- [nsp-sec] Stolen FTP credentials
Walker, Severin
- [nsp-sec] Stolen FTP credentials
Dirk Stander
- [nsp-sec] Stolen FTP credentials
Sebastian Abt
- [nsp-sec] Stolen FTP credentials
Mike Seddon
- [nsp-sec] ACK RE: Stolen FTP credentials
Matthew.Swaar at us-cert.gov
- [nsp-sec] ACK: 2116 - Stolen FTP credentials
Vidar Østmo
- [nsp-sec] ACK 1221 Stolen FTP credentials
Saunders, D'Wayne S
- [nsp-sec] Old data still available on rentaplayer.com
Carol Overes
- [nsp-sec] Some from Swisscom AS3303
Carles Fragoso
- [nsp-sec] ACK 2914 - Re: Stolen FTP credentials
Tino Steward
- [nsp-sec] ACK Stolen FTP credentials
Torsten Voss
- [nsp-sec] ACK6805 Stolen FTP credentials
Henner Vogt
- [nsp-sec] Abuse from perfect-privacy.com ( UK2 customer )
Jason Chambers
- [nsp-sec] More stolen FTP credentials
Thomas Hungenberg
- [nsp-sec] More stolen FTP credentials
Dirk Stander
- [nsp-sec] More stolen FTP credentials
SURFcert - Peter
- [nsp-sec] Stolen HTTP(s) login credentials
Thomas Hungenberg
- [nsp-sec] Stolen HTTP(s) login credentials
Carles Fragoso
- [nsp-sec] Stolen HTTP(s) login credentials
SURFcert - Peter
- [nsp-sec] Stolen HTTP(s) login credentials
Thomas Hungenberg
- [nsp-sec] Corrected: Stolen HTTP(s) login credentials
Thomas Hungenberg
- [nsp-sec] Corrected: Stolen HTTP(s) login credentials
Buchanan, Mark
- [nsp-sec] Stolen FTP credentials
Anthony Edwards
- [nsp-sec] Corrected: Stolen HTTP(s) login credentials
Anthony Edwards
- [nsp-sec] ACK6805 Corrected: Stolen HTTP(s) login credentials
Henner Vogt
- [nsp-sec] Corrected: Stolen HTTP(s) login credentials
SURFcert - Peter
- [nsp-sec] Stolen HTTP(s) login credentials
Gabriel Iovino
- [nsp-sec] Corrected: Stolen HTTP(s) login credentials
David Freedman
- [nsp-sec] ACK 174 RE: Corrected: Stolen HTTP(s) login credentials
Shelton, Steve
- [nsp-sec] ACK 2914 Re: Stolen HTTP(s) login credentials
Tino Steward
- [nsp-sec] ACK 26496 RE: Stolen HTTP(s) login credentials
Greg Schwimer
- [nsp-sec] ACK 2914 Re: Corrected: Stolen HTTP(s) login credentials
Tino Steward
- [nsp-sec] Stolen FTP credentials
Buraglio, Nicholas D
- [nsp-sec] ACK AS209 Corrected: Stolen HTTP(s) login credentials
Roper, Sara
- [nsp-sec] ACK5714,6900,10782: Stolen HTTP(s) login credentials
Helmut Springer
- [nsp-sec] Corrected: Stolen HTTP(s) login credentials
Monika Machado
- [nsp-sec] Ping: PCCW/Beyond The Network America
Nicholas Ianelli
- [nsp-sec] Corrected: Stolen HTTP(s) login credentials
Dirk Stander
- [nsp-sec] Someone from Qualys AS27385 ? - ping me back
Carles Fragoso
- [nsp-sec] Someone from Qualys AS27385 ? - ping me back
sthaug at nethelp.no
- [nsp-sec] DDoS against www.gva.es
Carles Fragoso
- [nsp-sec] DDoS against www.gva.es
Yonglin ZHOU
- [nsp-sec] DDoS against www.gva.es
Carles Fragoso
- [nsp-sec] Daily Reports Summary for week ending 2011-02-21
Tim Wilde
- [nsp-sec] Please confirm DDoS entry 208.73.210.29
Jason Chambers
- [nsp-sec] Please confirm DDoS entry 208.73.210.29
Chris Morrow
- [nsp-sec] Please confirm DDoS entry 208.73.210.29
Dave Monnier
- [nsp-sec] Open resolver reports
Dave Monnier
- [nsp-sec] Open resolver reports
Dave Monnier
- [nsp-sec] What about 69.43.160.174? (was: Re: Please confirm DDoS entry 208.73.210.29)
Rune Sydskjør
- [nsp-sec] What about 69.43.160.174?
Dave Monnier
- [nsp-sec] amazon cloud cidrs?
Smith, Donald
- [nsp-sec] amazon cloud cidrs?
Dave Burke
- [nsp-sec] amazon cloud cidrs?
Nick Hilliard
- [nsp-sec] Any contact of NetEarth One, Inc?
Yonglin ZHOU
- [nsp-sec] 209.51.152.26 (AS3595, AS16626) here?
Yonglin ZHOU
- [nsp-sec] amazon cloud cidrs?
Chris Morrow
- [nsp-sec] Amazon Web Services / EC2 to the white courtesy phone please...
Peter Losher
- [nsp-sec] Amazon Web Services / EC2 to the white courtesy phone please...
Dave Burke
- [nsp-sec] DDoS towards Rabobank.nl, rijksoverheid.nl and ing.nl
Dave Woutersen (GOVCERT.NL)
- [nsp-sec] FYI
Jared Mauch
- [nsp-sec] Attn Hotmail - user/pwd dropbox
Torbjorn.Wictorin at cert.sunet.se
- [nsp-sec] Cymru Feeds Down
Tim Wilde
- [nsp-sec] ACK AS209 RE: DDoS towards Rabobank.nl, rijksoverheid.nl and ing.nl
Hicks, Howard
- [nsp-sec] Daily Reports Summary for week ending 2011-02-28
Tim Wilde
- [nsp-sec] DNS Reflection DDoS
Nicholas Ianelli
- [nsp-sec] DNS Reflection DDoS
King, Link
Last message date:
Mon Feb 28 23:39:45 EST 2011
Archived on: Thu Jan 22 18:52:15 EST 2015
This archive was generated by
Pipermail 0.09 (Mailman edition).