Normally I wouldn't say anything to anyone about anything so mundane as brute-force SSH attacks, but this one caught my eye just because of the IP address:
1.234.35.245
I wanna get a connection in Korea so I can have 1.234.56.78.
jms
Normally I wouldn't say anything to anyone about anything so mundane as brute-force SSH attacks, but this one caught my eye just because of the IP address:
1.234.35.245
I wanna get a connection in Korea so I can have 1.234.56.78.
jms
That is awesome 1.234.x.x
While you're in Korea, you could talk to Samsung as well about
123.32.0.0/12 (including 123.45.67.89). Closer to home, you could
also talk to AT&T about 12.0.0.0/8 (12.34.56.78).
--Richard
Or if you don't mind a "little" unsolicited traffic you could always
ask APNIC if you could have 1.2.3.0/24 which is unlikely to ever get
assigned by the normal process (currently assigned to the debogon
project but i don't think they are actively doing anything with it
just waiting for it to become usable some day)
Also had a look and it appears that along with 8.8.8.0/24 google also
got assigned 4.3.2.0/24 by Level3, but they aren't currently using it.
I wonder which company has the "best" collection of IP assignments...
- Mike
Ughhh been getting cPanel SSH brute force alerts all weekend because of him
-C
Somewhat surprisingly, AT&T doesn't seem to be *doing* anything special with
12.34.56.78.
Cheers,
-- jra
Level3 also has a 'unique' possibility they don't seem to be doing anything
with. 8.16.24.32/32 could be
inside 8.16.24/24
inside 8.16/16
inside 8/8