26 Dec
                
                    2005
                
            
            
                26 Dec
                
                '05
                
            
            
            
        
    
                6:04 p.m.
            
        ] To get action, lists of compromised (etc) systems NEED to include: ] Date/Time (preferably UTC), exact IP (as hostnames can have multiple ] A-records) and AS number. Agreed! We presumed it in this case, as the attack was "on-going." I really should have included the immediate timestamp, now that I think about it. Doh! -- Rob Thomas Team Cymru http://www.cymru.com/ ASSERT(coffee != empty);