This thread has been locked, it will not receive new replies. |
Locked on 11/07/2006 2:33:44 PM PST by John Robinson, reason: |
Posted on 11/07/2006 1:56:22 PM PST by jamesrichards
FBI: Hackers Shut Down Bouchard Web site
The FBI is investigating an attack by hackers on Republican Candidate for Senate Michael Bouchard's Web site, www.mikeformichigan.com.
The site was also hacked three weeks ago, but at the time it was believed to be because of interest in Bouchard's daughter, the FBI said.
The FBI said it traced the activity back to Maryland, and is on its way to investigate.
Few ballots in gop precincts for heather wilson but plenty for madrid.
In philly few republicans are being intimidated to vote dem in polling places.
Steele and chafee signs taken down over nigh
And yet, when they DO win, it is always a threadbare one. :)
they can't win an election honestly. They have to pull this stuff. Then they try to get one of their judges to overturn the election. They don't believe in "one man, one vote."
66.82.9.55
66.82.9.56
http://michellemalkin.com/archives/006299.htm
Doing a lookup on that IP range I find they are leased to DirecPc, which was recently bought by Hughes Network Systems, a broadband internet provider in Germantown, Maryland.
The time is currently 5pm eastern, it should be stupidly-easy to find out who has those two IP addresses checked out (dhcp or static) at this time. Just call the network security manager below (with a warrant) and get it.
http://www.arin.net/whois/
Fully WHOIS lookup below:
Search results for: 66.82.9.55 OrgName: Hughes Network Systems OrgID: HNS Address: 11717 Exploration Lane Address: DirecWAY Network Management Center Address: attn: Network Security Manager City: Germantown StateProv: MD PostalCode: 20876 Country: US NetRange: 66.82.0.0 - 66.82.255.255 CIDR: 66.82.0.0/16 NetName: DIRECPC-1BLK NetHandle: NET-66-82-0-0-1 Parent: NET-66-0-0-0-0 NetType: Direct Allocation NameServer: NS1.DIRECPC.COM NameServer: NS2.DIRECPC.COM Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE RegDate: 2001-02-28 Updated: 2003-01-21 RTechHandle: ZD63-ARIN RTechName: Abuse RTechPhone: +1-301-601-7205 RTechEmail: abuse@hughes.net OrgTechHandle: NSM5-ARIN OrgTechName: Network Security Manager OrgTechPhone: +1-301-601-7205 OrgTechEmail: abuse@hughes.net # ARIN WHOIS database, last updated 2006-11-06 19:10 # Enter ? for additional hints on searching ARIN's WHOIS database.
It's the only way they can win. Pathtic dimwits.
It is highly unlikely that that is correct. If they are claming it is a DDoS, then two machines couldn't be responsible. The most likely possibility would be a distributed SYN flood, and they wouldn't have valid source IPs to learn anything from. The attacking machines are probably botnet infected Windows machines with their owners completely unaware.
Those two IPs are likely part of a larger web cache cluster. We get heaps of legitimate traffic from those addresses and thereabouts.
I'd say that depends on what server resource is being attacked. If the attackers are exploiting a bug or inefficiency in the system they may not need to employ many of their own resources.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.