Solved

Which DNS authority to report to

Posted on 2011-02-20
4
267 Views
Last Modified: 2012-05-11
Hi there,
Running server 2008 domain.  Running TS Webaccess so that my users can work on a couple of databases. A couple of users try to abuse the system.  I know the IP addresses.  What should be done at this point.  What is the best option for me.  Which DNS authority to report to?
Imagining that thir ISP is doing nothing.  Any help in this regard would be appreciated.
Thanks
0
Comment
Question by:amanzoor
  • 2
4 Comments
 
LVL 57

Accepted Solution

by:
giltjr earned 250 total points
ID: 34939773
You don't report to DNS authority.  You go to the ISP that has delagated the IP address.  You can go to ARIN at:

     https://www.arin.net/abuse.html

Search on hackers and see their recommendations.
0
 
LVL 33

Assisted Solution

by:Dave Howe
Dave Howe earned 250 total points
ID: 34949344
normally you would do a whois on the user ip and report to their isp - but you would *also* (unless you believe one of your users share an isp) block the entire IP block for that ISP at the firewall.

I would be surprised if the report does anything though - I have blocked the whole of china (upwards of 200 attacks seen per day, with no response from isps) and have at least 20 other blocks of IPs on the list.
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 34949367
other common approaches -

move TS to a port above 5000 - most attackers try only "common" ports, and this will reduce your attack profile almost instantly.

make sure you are using ssl certificates for your RDP - again, makes it harder for the attacker, and many will either move on, or not recognise the TS is there.
0
 
LVL 4

Author Comment

by:amanzoor
ID: 34960566
Thanks Guys:
I really appreciate your time, I like the idea of blocking onto the firewall and using ssl.
THanks once again.
0

Featured Post

Flexible connectivity for any environment

The KE6900 series can extend and deploy computers with high definition displays across multiple stations in a variety of applications that suit any environment. Expand computer use to stations across multiple rooms with dynamic access.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
Do you know what to look for when considering cloud computing? Should you hire someone or try to do it yourself? I'll be covering these questions and looking at the best options for you and your business.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question