<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="MSHTML 6.00.2800.1649" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face=Arial size=2>Hi,</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>> <FONT face="Times New Roman" size=3>A simple
script to parse it then extract the list of attackers IP, compile them and send
them out to the list.</FONT><BR></DIV></FONT>
<DIV><FONT face=Arial size=2>Hacker will not always use a fixed ip. They might
rent cheap cloud serve or vps and change their ip often. So, I think upload
those ip to public black list is not much meaningful. And, if you occasionally
rent a server with exactly one of those ip, it is unfair to you.
</DIV></FONT>
<DIV> </DIV>
<DIV> </DIV>
<DIV> </DIV>
<DIV> </DIV>
<DIV><FONT face=Arial size=2></FONT><BR>Regards</DIV>
<DIV> </DIV>
<DIV>David</DIV>
<DIV> </DIV>
<DIV>================================<BR>VOIP solution provider<BR><A
href="http://www.iaxtalk.com">http://www.iaxtalk.com</A></DIV>
<DIV> </DIV>
<DIV> </DIV>
<BLOCKQUOTE
style="PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV style="FONT: 10pt arial">----- Original Message ----- </DIV>
<DIV
style="BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: black"><B>From:</B>
<A title=jack@asteriskhoneypot.com
href="mailto:jack@asteriskhoneypot.com">Jack Honey Pot</A> </DIV>
<DIV style="FONT: 10pt arial"><B>To:</B> <A
title=asterisk-security@lists.digium.com
href="mailto:asterisk-security@lists.digium.com">asterisk-security@lists.digium.com</A>
</DIV>
<DIV style="FONT: 10pt arial"><B>Sent:</B> Thursday, October 13, 2011 1:51
AM</DIV>
<DIV style="FONT: 10pt arial"><B>Subject:</B> [asterisk-security] Honeypot
Project</DIV>
<DIV><BR></DIV>Hi All,<BR><BR>I'm not the first to try to start a VOIP
blacklist but currently working on a project for the next 12 hours, hopefully
I can get it up soon. What I intend to do is to work with a few reliable
Harvester to gather the logs. A simple script to parse it then extract the
list of attackers IP, compile them and send them out to the list.<BR><BR>If
any of you are kind enough to zip and send me a /var/log/asterisk/messages
that contain hacker's scan & attack, it will be helpful to my research. Do
email me at <A
href="mailto:jack@asteriskhoneypot.com">jack@asteriskhoneypot.com</A> . Let me
know if you are keen to be a harvester as
well.Thanks.<BR><BR>Regards,<BR>Jackster
<P>
<HR>
<P></P>--<BR>_____________________________________________________________________<BR>--
Bandwidth and Colocation Provided by http://www.api-digital.com
--<BR><BR>asterisk-security mailing list<BR>To UNSUBSCRIBE or update options
visit:<BR>
http://lists.digium.com/mailman/listinfo/asterisk-security</BLOCKQUOTE></BODY></HTML>