Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!

If you have any problems with the registration process or your account login, please contact us.

Post New Thread Reply

Register GFY Rules Calendar
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed.

 
Thread Tools
Old 10-24-2001, 03:01 PM   #1
Bear
Confirmed User
 
Join Date: Jul 2001
Posts: 261
How to find a hacker ISP?

Hi all,

My server is attacked by a hacker, he try to guess my member area password. I already deny his IP but he still try to access my site and make my server generate a lot of 403 error.

I just traced his IP:

Reston3.er.usgs.gov (130.11.48.6) 5 ms 3 ms 5 ms
2 MenloPark5-a4-0.usgs.net (198.187.220.105) 84 ms 84 ms 82 ms
3 MenloPark66-v67.usgs.net (130.118.255.253) 84 ms 84 ms 83 ms
4 MaeWest9-p1-0-0-67.usgs.net (130.118.255.249) 84 ms 85 ms 85 ms
5 fddi0-0-0.edge1.fix-west1.level3.net (198.32.136.24) 84 ms 85 ms 85 ms
6 pos1-0.core2.SanJose1.Level3.net (209.244.3.181) 85 ms 85 ms 84 ms
7 ae0-52.mp2.SanJose1.Level3.net (64.159.2.33) 85 ms 85 ms 86 ms
8 * * *
9 * * *
10 * * *
11 bbr0218-mht.lightship.net (216.204.102.18) 193 ms 192 ms 192 ms
12 ipn6-e0126.net-resource.net (216.204.100.126) 191 ms 191 ms 192 ms
13 * * *
14 ipn9-d9200.net-resource.net (216.204.19.200) 594 ms 660 ms 550 ms

But when I go to net-resource.net, I can't access this site. Does any body know how can I find out which ISP that the hacker is using?

He's really crazy, he runs so many request to my server per second. Some body please help!

Bear
Bear is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 10-24-2001, 03:07 PM   #2
[Labret]
Registered User
 
Industry Role:
Join Date: May 2001
Location: Са́нкт-Петербу́рг
Posts: 10,945

Your fucked and its most likely nothing would happen to them anyways. I used to go thru extraordinary lengths when I first started paysites to track down who was hammering my servers with brute force login and password attacks. 10's of thousands of requests per day. Seemed like they went around the clock. Its easy enough to stop a password leak, but the brute forcing can just be brutal.

My advice is give up. For a reasonable price you can get Pennywize installed and it has helped me out alot.
[Labret] is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 10-24-2001, 03:11 PM   #3
m0rph3us
Confirmed User
 
Join Date: Mar 2001
Location: Principality of Sealand
Posts: 2,033
Quote:
Originally posted by Bear:
Hi all,
He's really crazy, he runs so many request to my server per second. Some body please help!

Bear
That doesn't mean he's a hacker dude.
m0rph3us is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 10-24-2001, 03:17 PM   #4
onlyreal
Confirmed User
 
Join Date: Jun 2001
Posts: 853
maybe a kind of DOS attack


Quote:
Originally posted by Bear:
Hi all,
He's really crazy, he runs so many request to my server per second. Some body please help!

Bear
onlyreal is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 10-24-2001, 03:38 PM   #5
GiggleBerries
Confirmed User
 
Join Date: Oct 2001
Location: The pay phone outside the 7-11
Posts: 357
Per second? I have a hard time believing that. What makes you so sure it's the same guy? I see no evidence of that so far. Post times, error messages, etc. Hell, maybe even several lines straight from your error log. I can help you get this crap stopped if it's truly an attack but really if it's a brute fore hack attempt, they're easy to stop. Is any of your content really THAT important?

------------------
Dot Matrix TGP System
GiggleBerries.com TGP
Russian TGP Submitter
GiggleBerries is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 10-24-2001, 04:25 PM   #6
Bear
Confirmed User
 
Join Date: Jul 2001
Posts: 261
Yeah, I checked my access log. He can run more than 10 requests within a second. I think it's a brute fore attack becasue it points to my member area.

He already ran it several days already.
Bear is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 10-24-2001, 04:42 PM   #7
AaronM
Too lazy to set a custom title
 
AaronM's Avatar
 
Industry Role:
Join Date: Oct 2001
Location: ┌∩┐ ◣_◢ ┌∩┐
Posts: 46,909
Quote:
Originally posted by Bear:
Yeah, I checked my access log. He can run more than 10 requests within a second. I think it's a brute fore attack becasue it points to my member area.

He already ran it several days already.
Here is the answer to your question.
Mail Call (NETBLK-RESO-216-204-19-192)
10 Northern Blvd, Suite 1
Amherst, NH 03031
US

Netname: RESO-216-204-19-192
Netblock: 216.204.19.192 - 216.204.19.255

Coordinator:
Grillo, Paul (ZPG1-ARIN) [email protected]
603-598-3684 3010

Call them. They may or may not give a fuck but it may be worth a try.

------------------
Aaron Matthews Productions

aaron-matthews.com
AaronM is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 10-24-2001, 10:35 PM   #8
pr0
rockin tha trailerpark
 
pr0's Avatar
 
Industry Role:
Join Date: May 2001
Location: ~Coastal~
Posts: 23,088
Reston3.er.usgs.gov (130.11.48.6) 5 ms 3 ms 5 ms


Nice originating IP ...remind me not to do business with you ; )D

------------------
pr0 is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 10-25-2001, 12:04 AM   #9
AaronM
Too lazy to set a custom title
 
AaronM's Avatar
 
Industry Role:
Join Date: Oct 2001
Location: ┌∩┐ ◣_◢ ┌∩┐
Posts: 46,909
Quote:
Originally posted by pr0:
Reston3.er.usgs.gov (130.11.48.6) 5 ms 3 ms 5 ms


Nice originating IP ...remind me not to do business with you ; )D

LOL, no doubt.
An employee of The United States Geological Survey is hardly a threat though.
AaronM is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 10-25-2001, 10:31 AM   #10
awechen
Confirmed User
 
Join Date: Oct 2001
Location: LA
Posts: 162
Quote:
Originally posted by Bear:
Hi all,

My server is attacked by a hacker, he try to guess my member area password. I already deny his IP but he still try to access my site and make my server generate a lot of 403 error.
dont denny the IP in your webserver.
if u using unix / linux / BSD
reject in the system route table the IP !
if linux
/sbin/route add -host IPOFUSER gw 127.0.0.1
bsd :
route add -host IP_OF_USER -reject
BUT read bevor the "man route" for rejecting this
or give ne a query on ICQ ...




------------------
"Shock your systemadministration! Read manual-pages!"
awechen is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 10-25-2001, 03:42 PM   #11
kenjin
Registered User
 
Join Date: Oct 2001
Location: UK
Posts: 62
i wouldn`t bother with those IP address, hes using a brute force program , it will be using 100`s of public proxies not his own ip address, leaving him anonymous.

------------------
www.thaigirlfriend.net
kenjin is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 10-25-2001, 03:54 PM   #12
kenjin
Registered User
 
Join Date: Oct 2001
Location: UK
Posts: 62
Quote:
Originally posted by GiggleBerries:
Per second? I have a hard time believing that. What makes you so sure it's the same guy? I see no evidence of that so far. Post times, error messages, etc. Hell, maybe even several lines straight from your error log. I can help you get this crap stopped if it's truly an attack but really if it's a brute fore hack attempt, they're easy to stop. Is any of your content really THAT important?

a brute force program can run 10 attacks per second no problem, it uses bots, say you have 50 bots running simultaneously all using a different IP address,(public proxies) a program like that could run 5,000 password combinations in less than 5 mins quite easily, its only a matter of time before the program gets a correct password combination.it isnt going to use any bandwidth while its attacking the only thing you have to worry about is that the password will probably be given out to 1000s of others free-loaders on request boards. but there is a program that detects if the members are coming from different ip address using the same pass.

------------------
www.thaigirlfriend.net
kenjin is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 10-25-2001, 09:19 PM   #13
awechen
Confirmed User
 
Join Date: Oct 2001
Location: LA
Posts: 162
i protect our sites for this with a own login system with session ID an SSL
... show me a ssl passcrack bot

also we send a cookie ...
easy protection agins the fuckers ..

i think to relase the loginsystem for public use ...

... but alos a easy way is make a loginform wih flash.
and a dynamic position of the input box

....



------------------
"Shock your systemadministration! Read manual-pages!"
awechen is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Post New Thread Reply
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >

Bookmarks



Advertising inquiries - marketing at gfy dot com

Contact Admin - Advertise - GFY Rules - Top

©2000-, AI Media Network Inc



Powered by vBulletin
Copyright © 2000- Jelsoft Enterprises Limited.