Pelican Parts
Parts Catalog Accessories Catalog How To Articles Tech Forums
Call Pelican Parts at 888-280-7799
Shopping Cart Cart | Project List | Order Status | Help



Go Back   Pelican Parts Forums > Miscellaneous and Off Topic Forums > Off Topic Discussions


Reply
 
LinkBack Thread Tools Rate Thread
Author
Thread Post New Thread    Reply
Registered
 
Sonic dB's Avatar
 
Join Date: Apr 2003
Posts: 4,904
Garage
cyber sleuth some IPs for me

Can anyone track these IP addresses for me and get any detailed
information more than what I already have?

I realize that these may be dynamic IPs and difficult to track,
however a couple of them point to specific companies. Can any
more info be learned about these IPS other than what I have
below? thx.

66.180.82.81, 66.180.82.85 & 66.180.82.89

3 seperate log ins...all from this company, which makes
virus software....hmmm thats very intersting.

66.180.80.0 - 66.180.95.255
CIDR: 66.180.80.0/20
NetName: NET-TRENDMICRO-COM
NetHandle: NET-66-180-80-0-1
Parent: NET-66-0-0-0-0
NetType: Direct Assignment
NameServer: TMNS1.TRENDMICRO.COM
NameServer: TMNS2.TRENDMICRO.COM
Comment:
RegDate: 2005-12-22
Updated: 2005-12-22


64.246.165.180
One log in, and is probably a hosting company so would
be dynamic IP

OrgName: Compass Communications, Inc.
OrgID: CPCM
Address: 2001 6th Avenue
Address: Suite 3205
City: Seattle
StateProv: WA
PostalCode: 98121
Country: US

ReferralServer: rwhois://rwhoisd.ccom.net:4321

NetRange: 64.246.160.0 - 64.246.191.255
CIDR: 64.246.160.0/19
NetName: CCOM-2003
NetHandle: NET-64-246-160-0-1
Parent: NET-64-0-0-0-0
NetType: Direct Allocation
NameServer: NS1.CCOM.NET
NameServer: NS2.CCOM.NET
Comment:
RegDate: 2003-05-16
Updated: 2004-03-10



74.6.72.165

This is from a company that is now Yahoo Seach Sponsorship,
which is very interesting...as why would someone there be
interested in my site.

OrgName: Inktomi Corporation
OrgID: INKT
Address: 701 First Ave
City: Sunnyvale
StateProv: CA
PostalCode: 94089
Country: US

NetRange: 74.6.0.0 - 74.6.255.255
CIDR: 74.6.0.0/16
NetName: INKTOMI-BLK-6
NetHandle: NET-74-6-0-0-1
Parent: NET-74-0-0-0-0
NetType: Direct Allocation
NameServer: NS1.YAHOO.COM
NameServer: NS2.YAHOO.COM
NameServer: NS3.YAHOO.COM
NameServer: NS4.YAHOO.COM
NameServer: NS5.YAHOO.COM
Comment:
RegDate: 2006-02-13
Updated: 2006-02-13


Last edited by Sonic dB; 02-27-2007 at 02:16 AM..
Old 02-27-2007, 01:04 AM
  Pelican Parts Catalog | Tech Articles | Promos & Specials    Reply With Quote #1 (permalink)
Registered
 
jeffgrant's Avatar
 
Join Date: Mar 2005
Location: London, ON, Canada
Posts: 1,737
Actually, the WHOIS database is regularly "snarfed" for data, so that the website address (the URL, not the IP) can be spidered for any email addresses to add to spam lists.

This happens to me a ton... I've got about 5 domains that have never been published anywhere, and are used only by me for various purposes (projects that never got released, etc), and each one has a "webserver admin" email address that is listed on it.

Those email addresses start receiving spam, and it's all generated by the Whois Lookup.

Never mind spam to the actual WHOIS database email contact itself.


Personally, I doubt that it's the same person.
Old 02-27-2007, 02:04 AM
  Pelican Parts Catalog | Tech Articles | Promos & Specials    Reply With Quote #2 (permalink)
Registered
 
jeffgrant's Avatar
 
Join Date: Mar 2005
Location: London, ON, Canada
Posts: 1,737
Re: cyber sleuth some IPs for me

Quote:
Originally posted by Sonic dB
3 seperate log ins...all from this company, which makes
virus software....hmmm thats very intersting.
I'm sure you meant anti-virus.


FYI, most of this spidering is done using viruses and malware.

Anti-virus companies, among others, usually operate what are called "honeypots", which basically attract and incubate viruses/malware so that they can be studied, dissected, and an anti-virus developed.

Wikipedia description here: http://en.wikipedia.org/wiki/Honeypot_%28computing%29


Odds are that in the normal process of the virus doing it's thing, it happened to have you in it's sights, but it just happened to be running from within an anti-virus company's honeypot... or they actually have some infected computers in their network. (Cobbler's children and all that).

Most larger anti-virus companies that I've worked with in the past (I do Internet security "stuff" for banks and governments, among other things) usually keep their honeypots Internet location (IP's) as a closely guarded secret, so that it's not easily detectable. This is because some high-tech, uber-smart virus writers make their code NOT go there so that their creations can last a little longer in the wild. Having those boxes be configured in reverse DNS is kind of a "beginner's mistake", if you will.


Last edited by jeffgrant; 02-27-2007 at 02:28 AM..
Old 02-27-2007, 02:12 AM
  Pelican Parts Catalog | Tech Articles | Promos & Specials    Reply With Quote #3 (permalink)
Reply


 


All times are GMT -8. The time now is 02:54 AM.


 
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
Search Engine Optimization by vBSEO 3.6.0
Copyright 2025 Pelican Parts, LLC - Posts may be archived for display on the Pelican Parts Website -    DMCA Registered Agent Contact Page
 

DTO Garage Plus vBulletin Plugins by Drive Thru Online, Inc.