collapse collapse

* Recent News

Meta Connect 2024 by Tbone
[September 25, 2024, 01:37:22 pm]


Fifth Matrix Film Announced! by Lithium
[April 07, 2024, 09:49:37 pm]


Quest Headsets Will No Longer Require Facebook Account by Tbone
[July 07, 2022, 03:17:21 pm]


New Matrix Online? "Matrix Awakens" UE5 Demo by Tbone
[December 28, 2021, 01:05:59 pm]

* Recent Posts

FA in DC? by Subb
[November 01, 2024, 03:55:27 pm]


Meta Connect 2024 by Tbone
[September 25, 2024, 01:37:22 pm]


Fifth Matrix Film Announced! by Lithium
[April 07, 2024, 09:49:37 pm]


2024: New PC for VR! by Tbone
[April 06, 2024, 12:22:30 pm]


MOVED: Fifth Matrix Film Announced! by Tbone
[April 06, 2024, 12:18:27 pm]


Holiday Fun by Tbone
[March 01, 2024, 09:09:44 pm]


Quest 2 Link Best Settings (Finally Better Than Rift S) by Tbone
[November 27, 2023, 04:57:46 pm]


randomness by Jeyk
[November 27, 2023, 09:42:30 am]

Author Topic: Hacking Attempt  (Read 2281 times)

Offline Tbone

  • FA FOUNDER
  • Administrator
  • *****
  • Join Date: Apr 2004
  • Posts: 9973
  • Probably Rifting
    • View Profile
    • http://www.thefuriousangels.com
Hacking Attempt
« on: January 14, 2005, 12:11:10 pm »
As you know, every once in a while someone or some group like to try to hack our site. Don't know why...guess they get bored. Anyway, we had another attempt last night. The IP is: 202.33.24.60

Likwidtek and I both received one email about someone trying to reset our password. I was wondering if the rest of you received a similar email. The reason I ask is that the log shows the person loaded up the lost password page quite a few times, but we only received one email each. It appears the "hacker" was trying to brute force his way in - he was still trying WHILE I was reading the log...lol. We banned the IP, but I was just wondering if he was somehow able to access our member list. Your help is appreciated. Thanks!

Offline Tbone

  • FA FOUNDER
  • Administrator
  • *****
  • Join Date: Apr 2004
  • Posts: 9973
  • Probably Rifting
    • View Profile
    • http://www.thefuriousangels.com
Hacking Attempt
« Reply #1 on: January 14, 2005, 12:18:45 pm »
So far myself, likwidtek, and Grim all received an email. Who else?

Offline Tbone

  • FA FOUNDER
  • Administrator
  • *****
  • Join Date: Apr 2004
  • Posts: 9973
  • Probably Rifting
    • View Profile
    • http://www.thefuriousangels.com
Hacking Attempt
« Reply #2 on: January 14, 2005, 12:39:56 pm »
Tbone
likwidtek
GrimKitten
Boombye
Zink

Anonymous

  • Guest
Hacking Attempt
« Reply #3 on: January 14, 2005, 12:42:53 pm »
It might have something to do with our event tomorrow night.

What a perfect target it is for machines and merovinginans clans.  Some players have already said that they wish they could crash it.  Maybe someone wants to get in our site to learn exactly where and when it is.

Anonymous

  • Guest
Hacking Attempt
« Reply #4 on: January 14, 2005, 12:54:04 pm »
Could be, Anyway, I got one.  T already knows but here is the low down.

Subject: Confirmation code for Aaura
From: tbone@followtheangel.org  
Date: Fri, 14 Jan 2005 04:14:49 -0600
Sent from IP: 202.33.24.60

It was sent nearly three hours ago from the time of this post.  It's 18:52 my time.

Somone likes us! :d
Probablly somone looking to hack in and get the details of tomorrows event.

Anonymous

  • Guest
Hacking Attempt
« Reply #5 on: January 14, 2005, 01:07:33 pm »
Just in case you are interested.....

OrgName:    Asia Pacific Network Information Centre
OrgID:      APNIC
Address:    PO Box 2131
City:       Milton
StateProv:  QLD
PostalCode: 4064
Country:    AU

ReferralServer: whois://whois.apnic.net

NetRange:   202.0.0.0 - 203.255.255.255
CIDR:       202.0.0.0/7
NetName:    APNIC-CIDR-BLK
NetHandle:  NET-202-0-0-0-1
Parent:    
NetType:    Allocated to APNIC
NameServer: NS1.APNIC.NET
NameServer: NS3.APNIC.NET
NameServer: NS4.APNIC.NET
NameServer: TINNIE.ARIN.NET
NameServer: NS.RIPE.NET
NameServer: DNS1.TELSTRA.NET
Comment:    This IP address range is not registered in the ARIN database.
Comment:    For details, refer to the APNIC Whois Database via
Comment:    WHOIS.APNIC.NET or http://www.apnic.net/apnic-bin/whois2.pl
Comment:    ** IMPORTANT NOTE: APNIC is the Regional Internet Registry
Comment:    for the Asia Pacific region. APNIC does not operate networks
Comment:    using this IP address range and is not able to investigate
Comment:    spam or abuse reports relating to these addresses. For more
Comment:    help, refer to http://www.apnic.net/info/faq/abuse
Comment:    
RegDate:    1994-04-05
Updated:    2004-03-30

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3100
OrgTechEmail:  search-apnic-not-arin at apnic.net

# ARIN WHOIS database, last updated 2005-01-13 19:10
# Enter ? for additional hints on searching ARIN's WHOIS database.



... here is another whois look up result for 202.33.24.60 from whois.apnic.net :

% [whois.apnic.net node-2]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

inetnum:      202.32.0.0 - 202.35.255.255
netname:      JPNIC-NET-JP
descr:        Japan Network Information Center
country:      JP
admin-c:      JNIC1-AP
tech-c:       JNIC1-AP
remarks:      JPNIC Allocation Block
remarks:      Authoritative information regarding assignments and
remarks:      allocations made from within this block can also be
remarks:      queried at whois.nic.ad.jp. To obtain an English
remarks:      output query whois -h whois.nic.ad.jp x.x.x.x/e
mnt-by:       MAINT-JPNIC
changed:      apnic-ftp at nic.ad.jp 19991208
status:       ALLOCATED PORTABLE
source:       APNIC

role:         Japan Network Information Center
address:      Kokusai-Kougyou-Kanda Bldg 6F, 2-3-4 Uchi-Kanda
address:      Chiyoda-ku, Tokyo 101-0047, Japan
country:      JP
phone:        +81-3-5297-2311
fax-no:       +81-3-5297-2312
e-mail:       hostmaster at nic.ad.jp
admin-c:      SS13-AP
tech-c:       SY7-AP
nic-hdl:      JNIC1-AP
mnt-by:       MAINT-JPNIC
changed:      apnic-ftp at nic.ad.jp 19990629
changed:      ip-staff at nic.ad.jp 20030806
source:       APNIC

inetnum:      202.33.24.0 - 202.33.24.255
netname:      MIL-HS
descr:        JENS Corporation
country:      JP
admin-c:      HO035JP
tech-c:       HO035JP
remarks:      This information has been partially mirrored by APNIC from
remarks:      JPNIC. To obtain more specific information, please use the
remarks:      JPNIC whois server at whois.nic.ad.jp. (This defaults to
remarks:      Japanese output, use the /e switch for English output)
changed:      apnic-ftp at nic.ad.jp 20021010
remarks:      This information has been partially mirrored by APNIC from
remarks:      JPNIC. To obtain more specific information, please use the
remarks:      JPNIC whois server at whois.nic.ad.jp. (This defaults to
remarks:      Japanese output, use the /e switch for English output)
changed:      apnic-ftp at nic.ad.jp 20021112
source:       JPNIC

** You can contact this ISP and inquire about the user of 202.33.24.60 at the time of the incident....

Don't F**k with the Angels!  We can find you anywhere.

**There are other tools I could use to track further and get closer to the source/user who attempted the attack, but I do not have the time at this moment...

Anonymous

  • Guest
Hacking Attempt
« Reply #6 on: January 14, 2005, 01:19:24 pm »
i knew it was the azns...their always after us. hehe yah looks like he was going for "veteran" members, something like that?

Anonymous

  • Guest
Hacking Attempt
« Reply #7 on: January 14, 2005, 01:42:16 pm »
I got one, too.  I didn't respond for obvious reasons. :)

Anonymous

  • Guest
Hacking Attempt
« Reply #8 on: January 14, 2005, 01:57:21 pm »
Just for the record, I didn't get anything.

Anonymous

  • Guest
Hacking Attempt
« Reply #9 on: January 14, 2005, 02:05:08 pm »
I got one

Offline Broin

  • Second-in-Command
  • VETERAN ANGEL
  • *******
  • Join Date: Jul 2004
  • Posts: 2978
    • View Profile
Hacking Attempt
« Reply #10 on: January 14, 2005, 03:22:22 pm »
I recieved one... I guess it is nice to know that we are known as individuals as well as F.A.  :D

Go ahead, make my day.

Anonymous

  • Guest
Hacking Attempt
« Reply #11 on: January 14, 2005, 03:42:02 pm »
I did not recieve one.  However, that's because I dont have my email listed in my account..

Offline Eroz

  • VETERAN ANGEL
  • *******
  • Join Date: May 2004
  • Posts: 2015
    • View Profile
Hacking Attempt
« Reply #12 on: January 14, 2005, 04:32:10 pm »
I got one.... does that mean my password has been reset?
"Have you ever tried to dismantle a snowball?" - Linus, Peanut's Gang.

Anonymous

  • Guest
Hacking Attempt
« Reply #13 on: January 14, 2005, 06:00:19 pm »
I didn't get one... :(

Anonymous

  • Guest
Hacking Attempt
« Reply #14 on: January 14, 2005, 06:09:54 pm »
I got one...

 

 

* Discord

Calendar

November 2024
Sun Mon Tue Wed Thu Fri Sat
1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 [25] 26 27 28 29 30

No calendar events were found.

* Who's Online

  • Dot Guests: 108
  • Dot Hidden: 0
  • Dot Users: 0

There aren't any users online.

Social