istock 000012618480smallNRCW Commercial Website Solutions takes great pride in our expertise and network security. When it comes to weeding out the automated bots and the human attempts to access restricted areas, it’s pretty easy to tell. Today we received a very close-to-home Brute Force Flag from a local Time Warner Road Runner Business customer and it’s got us both laughing and concerned at the same time. Roadrunner servers tend to route from their Akron hub. The details of the attack are below:

IP Address : 24.123.244.22
PTR : rrcs-24-123-244-22.central.biz.rr.com
Registry WHOIS Server : ipmt.rr.com:4321
%rwhois V-1.5:0020b0:00 ipmt.rr.com (by Time Warner Cable, Inc. V-1.0)
network:Class-Name:network
network:ID:NETBLK-ISRC-24.123.128.0-17
network:Auth-Area:24.123.128.0/17
network:Org-Name:Road Runner Commercial
network:Tech-Contact:ipaddreg (at) rr.com
network:Updated:2013-04-02 10:30:25
network:IP-Network:24.123.128.0/17
network:Admin-Contact:IPADD-ARIN
network:IP-Network-Range:24.123.128.0 – 24.123.255.255

organization:Class-Name:organization
organization:ID:NETBLK-ISRC-24.123.128.0-17
organization:Auth-Area:24.123.128.0/17
organization:Org-Name:Road Runner Commercial
organization:Tech-Contact:ipaddreg (at) rr.com
organization:Street-Address:13820 Sunrise Valley Drive
organization:City:Herndon
organization:State:VA
organization:Postal-Code:20171
organization:Country-Code:US
organization:Phone:703-345-3151
organization:Updated:2013-04-02 10:30:25
organization:Created:2013-04-02 10:30:25
organization:Admin-Contact:IPADD-ARIN

Date of excessive logins: 4/2/2013 1:06PM EDT

NRCW Action: Permanent Ban

 

0 comments

You must be logged in to post a comment.

Receive our newsletters

Login