Custom query (984 matches)

Filters
 
or
 
  
 
Columns

Show under each result:


Results (22 - 24 of 984)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Ticket Resolution Summary Owner Reporter
#1075 pending A question for our google overlords < default > jim@…
Description
google thinks the IETF net is in Korea and insists on redirecting me to google.co.kr and presenting google maps in Hangul. Could you please ask them to fix this?

#1022 fixed A records for example.org returning 127.0.0.1! rob@… dkg@…
Description
weird, eh?

0 dkg@alice:~$ dig example.org
;; ->>HEADER<<- opcode: QUERY; status: NOERROR; id: 52814
;; Flags: qr aa rd ra; QUERY: 1; ANSWER: 1; AUTHORITY: 1; ADDITIONAL: 0

;; QUESTION SECTION:
;; example.org.        		IN	A

;; ANSWER SECTION:
example.org.        	10800	IN	A	127.0.0.1

;; AUTHORITY SECTION:
example.org.        	10800	IN	NS	example.org.

;; Received 59 B
;; Time 2016-11-13 16:09:49 KST
;; From 31.130.229.6@53(UDP) in 5.8 ms
0 dkg@alice:~$

  --dkg
#1136 fixed Abuse from 31.130.230.71 con@… anonymous
Description
Dear Sir/Madam,

We have detected abuse from the IP address ( 31.130.230.71 ), which according to a whois lookup is on your network. We would appreciate if you would investigate and take action as appropriate. Any feedback is welcome but not mandatory.

Log lines are given below, but please ask if you require any further information.

(If you are not the correct person to contact about this please accept our apologies - your e-mail address was extracted from the whois record by an automated process. This mail was generated by Fail2Ban.)

IP of the attacker:  31.130.230.71 

You can contact us by using: abuse-reply@keyweb.de

Addresses to send to:
tickets@meeting.ietf.org

==================== Excerpt from log for 31.130.230.71 ====================
Note: Local timezone is +0200 (CEST)
Jul 19 11:56:33 shared05 sshd[28288]: Invalid user pi from 31.130.230.71
Jul 19 11:56:33 shared05 sshd[28289]: Invalid user pi from 31.130.230.71
Jul 19 11:56:33 shared05 sshd[28289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.130.230.71 
Jul 19 11:56:33 shared05 sshd[28288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.130.230.71 
Jul 19 11:56:35 shared05 sshd[28289]: Failed password for invalid user pi from 31.130.230.71 port 34144 ssh2
Jul 19 11:56:35 shared05 sshd[28289]: Connection closed by 31.130.230.71 [preauth]
Jul 19 11:56:35 shared05 sshd[28288]: Failed password for invalid user pi from 31.130.230.71 port 34142 ssh2
Jul 19 11:56:35 shared05 sshd[28288]: Connection closed by 31.130.230.71 [preauth]
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Note: See TracQuery for help on using queries.