NRCW Commercial Website Solutions takes great pride in our expertise and network security. When it comes to weeding out the automated bots and the human attempts to access restricted areas, it’s pretty easy to tell. Today we received a very close-to-home Brute Force Flag from a local Time Warner Road Runner Business customer and it’s got us both laughing and concerned at the same time. Roadrunner servers tend to route from their Akron hub. The details of the attack are below:
IP Address : 24.123.244.22
PTR : rrcs-24-123-244-22.central.biz.rr.com
Registry WHOIS Server : ipmt.rr.com:4321
%rwhois V-1.5:0020b0:00 ipmt.rr.com (by Time Warner Cable, Inc. V-1.0)
network:Class-Name:network
network:ID:NETBLK-ISRC-24.123.128.0-17
network:Auth-Area:24.123.128.0/17
network:Org-Name:Road Runner Commercial
network:Tech-Contact:ipaddreg (at) rr.com
network:Updated:2013-04-02 10:30:25
network:IP-Network:24.123.128.0/17
network:Admin-Contact:IPADD-ARIN
network:IP-Network-Range:24.123.128.0 – 24.123.255.255
organization:Class-Name:organization
organization:ID:NETBLK-ISRC-24.123.128.0-17
organization:Auth-Area:24.123.128.0/17
organization:Org-Name:Road Runner Commercial
organization:Tech-Contact:ipaddreg (at) rr.com
organization:Street-Address:13820 Sunrise Valley Drive
organization:City:Herndon
organization:State:VA
organization:Postal-Code:20171
organization:Country-Code:US
organization:Phone:703-345-3151
organization:Updated:2013-04-02 10:30:25
organization:Created:2013-04-02 10:30:25
organization:Admin-Contact:IPADD-ARIN
Date of excessive logins: 4/2/2013 1:06PM EDT
NRCW Action: Permanent Ban
0 comments