26 Dec
2005
26 Dec
'05
1:04 p.m.
] To get action, lists of compromised (etc) systems NEED to include: ] Date/Time (preferably UTC), exact IP (as hostnames can have multiple ] A-records) and AS number. Agreed! We presumed it in this case, as the attack was "on-going." I really should have included the immediate timestamp, now that I think about it. Doh! -- Rob Thomas Team Cymru http://www.cymru.com/ ASSERT(coffee != empty);