SCOUG Logo


Next Meeting: Sat, TBD
Meeting Directions


Be a Member
Join SCOUG

Navigation:


Help with Searching

20 Most Recent Documents
Search Archives
Index by date, title, author, category.


Features:

Mr. Know-It-All
Ink
Download!










SCOUG:

Home

Email Lists

SIGs (Internet, General Interest, Programming, Network, more..)

Online Chats

Business

Past Presentations

Credits

Submissions

Contact SCOUG

Copyright SCOUG



warp expowest
Pictures from Sept. 1999

The views expressed in articles on this site are those of their authors.

warptech
SCOUG was there!


Copyright 1998-2024, Southern California OS/2 User Group. ALL RIGHTS RESERVED.

SCOUG, Warp Expo West, and Warpfest are trademarks of the Southern California OS/2 User Group. OS/2, Workplace Shell, and IBM are registered trademarks of International Business Machines Corporation. All other trademarks remain the property of their respective owners.

The Southern California OS/2 User Group
USA

SCOUG-HELP Mailing List Archives

Return to [ 02 | February | 2007 ]

<< Previous Message <<


Date: Fri, 2 Feb 2007 22:46:17 -0800
From: Gary Wong <gary.wong@sbcglobal.net >
Reply-To: scoug-help@scoug.com
To: scoug-help@scoug.com
Subject: SCOUG-Help: IP lookup of FTP hacker ?

Content Type: text/plain

Peter Skye wrote:
> I'm getting a lot more FTP infiltration attempts on my server here.
> My FTPD syslog.msg shows:
>
> 2007/02/01 13.19: FTPD:1673: connection from 61.136.60.164
> 2007/02/01 13.19: FTPD:1673: 61.136.60.164 attempting to login with wrong information
> 2007/02/01 13.19: FTPD:1673: max login failures from 61.136.60.164 reached
> 2007/02/01 13.19: FTPD:1686: connection from 61.136.60.164
> ...
> 2007/02/02 01.06: FTPD:259: 61.136.60.164 attempting to login with wrong information
> 2007/02/02 01.06: FTPD:259: max login failures from 61.136.60.164 reached
> 2007/02/02 01.06: FTPD:213: connection from 61.136.60.164
> 2007/02/02 01.06: FTPD:213: 61.136.60.164 attempting to login with wrong information
> 2007/02/02 01.06: FTPD:213: FTP LOGOFF from 61.136.60.164
>
> This guy tried for 12 hours with an automated script.
>
> How do I reverse lookup the above IP? NSLOOKUP doesn't find it:
>
> [G:\]nslookup 61.136.60.164
> Server: vnsc-pri.sys.gtei.net
> Address: 4.2.2.1
> *** vnsc-pri.sys.gtei.net can't find 61.136.60.164: Non-existent domain
>
> A Google search on the IP shows I'm not the only one this guy has tried to hack. I'd just like to know what country he's in.
>
> - Peter
>
>
I use www.arin.net/whois/.

It is somewhere overseas.

=====================================================

To unsubscribe from this list, send an email message
to "steward@scoug.com". In the body of the message,
put the command "unsubscribe scoug-help".

For problems, contact the list owner at
"postmaster@scoug.com".

=====================================================


<< Previous Message <<

Return to [ 02 | February | 2007 ]



The Southern California OS/2 User Group
P.O. Box 26904
Santa Ana, CA 92799-6904, USA

Copyright 2001 the Southern California OS/2 User Group. ALL RIGHTS RESERVED.

SCOUG, Warp Expo West, and Warpfest are trademarks of the Southern California OS/2 User Group. OS/2, Workplace Shell, and IBM are registered trademarks of International Business Machines Corporation. All other trademarks remain the property of their respective owners.