cloudflare hosting a ddos service?
Hi, So vbooter.org's dns and web is hosted by cloudflare? "Using vBooter you can take down home internet connections, websites and game servers such us Minecraft, XBOX Live, PSN and many more." dig -t ns vbooter.org ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177 ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;vbooter.org. IN NS ;; ANSWER SECTION: vbooter.org. 21599 IN NS rick.ns.cloudflare.com. vbooter.org. 21599 IN NS amy.ns.cloudflare.com. dig -t a www.vbooter.org ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920 ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;www.vbooter.org. IN A ;; ANSWER SECTION: www.vbooter.org. 299 IN CNAME vbooter.org. vbooter.org. 299 IN A 104.28.13.7 vbooter.org. 299 IN A 104.28.12.7 Can anyone from cloudflare answer me why this fits with your business model? Mike-
CloudFlare will claim they are not hosting the problem. They are just hosting the web page that lets you pay for or points at or otherwise directs you to the problem. The actual source of packets is some other IP address. Therefore, they can keep hosting the web page. It is not sending the actual [spam|DDoS|hack|etc.], right? So stop asking them to do something about it! Whether you think that is the proper way to provide service on the Internet is left as an exercise to the reader. -- TTFN, patrick
On Jul 26, 2016, at 9:49 PM, Mike <mike-nanog@tiedyenetworks.com> wrote:
Hi,
So vbooter.org's dns and web is hosted by cloudflare?
"Using vBooter you can take down home internet connections, websites and game servers such us Minecraft, XBOX Live, PSN and many more."
dig -t ns vbooter.org
; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177 ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;vbooter.org. IN NS
;; ANSWER SECTION: vbooter.org. 21599 IN NS rick.ns.cloudflare.com. vbooter.org. 21599 IN NS amy.ns.cloudflare.com.
dig -t a www.vbooter.org
; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920 ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;www.vbooter.org. IN A
;; ANSWER SECTION: www.vbooter.org. 299 IN CNAME vbooter.org. vbooter.org. 299 IN A 104.28.13.7 vbooter.org. 299 IN A 104.28.12.7
Can anyone from cloudflare answer me why this fits with your business model?
Mike-
sigh... On Tue, Jul 26, 2016 at 10:55 PM, Patrick W. Gilmore <patrick@ianai.net> wrote:
CloudFlare will claim they are not hosting the problem. They are just hosting the web page that lets you pay for or points at or otherwise directs you to the problem.
The actual source of packets is some other IP address. Therefore, they can keep hosting the web page. It is not sending the actual [spam|DDoS|hack|etc.], right? So stop asking them to do something about it!
Whether you think that is the proper way to provide service on the Internet is left as an exercise to the reader.
-- TTFN, patrick
On Jul 26, 2016, at 9:49 PM, Mike <mike-nanog@tiedyenetworks.com> wrote:
Hi,
So vbooter.org's dns and web is hosted by cloudflare?
"Using vBooter you can take down home internet connections, websites and game servers such us Minecraft, XBOX Live, PSN and many more."
dig -t ns vbooter.org
; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177 ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;vbooter.org. IN NS
;; ANSWER SECTION: vbooter.org. 21599 IN NS rick.ns.cloudflare.com. vbooter.org. 21599 IN NS amy.ns.cloudflare.com.
dig -t a www.vbooter.org
; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920 ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;www.vbooter.org. IN A
;; ANSWER SECTION: www.vbooter.org. 299 IN CNAME vbooter.org. vbooter.org. 299 IN A 104.28.13.7 vbooter.org. 299 IN A 104.28.12.7
Can anyone from cloudflare answer me why this fits with your business model?
Mike-
Plus, it’s good for business! -Phil
On Jul 26, 2016, at 10:14 PM, jim deleskie <deleskie@gmail.com> wrote:
sigh...
On Tue, Jul 26, 2016 at 10:55 PM, Patrick W. Gilmore <patrick@ianai.net> wrote:
CloudFlare will claim they are not hosting the problem. They are just hosting the web page that lets you pay for or points at or otherwise directs you to the problem.
The actual source of packets is some other IP address. Therefore, they can keep hosting the web page. It is not sending the actual [spam|DDoS|hack|etc.], right? So stop asking them to do something about it!
Whether you think that is the proper way to provide service on the Internet is left as an exercise to the reader.
-- TTFN, patrick
On Jul 26, 2016, at 9:49 PM, Mike <mike-nanog@tiedyenetworks.com> wrote:
Hi,
So vbooter.org's dns and web is hosted by cloudflare?
"Using vBooter you can take down home internet connections, websites and game servers such us Minecraft, XBOX Live, PSN and many more."
dig -t ns vbooter.org
; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177 ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;vbooter.org. IN NS
;; ANSWER SECTION: vbooter.org. 21599 IN NS rick.ns.cloudflare.com. vbooter.org. 21599 IN NS amy.ns.cloudflare.com.
dig -t a www.vbooter.org
; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920 ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;www.vbooter.org. IN A
;; ANSWER SECTION: www.vbooter.org. 299 IN CNAME vbooter.org. vbooter.org. 299 IN A 104.28.13.7 vbooter.org. 299 IN A 104.28.12.7
Can anyone from cloudflare answer me why this fits with your business model?
Mike-
Back in the day didn't we refer to such hosting as bulletproof hosting? On Tue, Jul 26, 2016 at 11:17 PM, Phil Rosenthal <pr@isprime.com> wrote:
Plus, it’s good for business!
-Phil
On Jul 26, 2016, at 10:14 PM, jim deleskie <deleskie@gmail.com> wrote:
sigh...
On Tue, Jul 26, 2016 at 10:55 PM, Patrick W. Gilmore <patrick@ianai.net> wrote:
CloudFlare will claim they are not hosting the problem. They are just hosting the web page that lets you pay for or points at or otherwise directs you to the problem.
The actual source of packets is some other IP address. Therefore, they can keep hosting the web page. It is not sending the actual [spam|DDoS|hack|etc.], right? So stop asking them to do something about it!
Whether you think that is the proper way to provide service on the Internet is left as an exercise to the reader.
-- TTFN, patrick
On Jul 26, 2016, at 9:49 PM, Mike <mike-nanog@tiedyenetworks.com> wrote:
Hi,
So vbooter.org's dns and web is hosted by cloudflare?
"Using vBooter you can take down home internet connections, websites and game servers such us Minecraft, XBOX Live, PSN and many more."
dig -t ns vbooter.org
; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177 ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;vbooter.org. IN NS
;; ANSWER SECTION: vbooter.org. 21599 IN NS rick.ns.cloudflare.com. vbooter.org. 21599 IN NS amy.ns.cloudflare.com.
dig -t a www.vbooter.org
; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920 ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;www.vbooter.org. IN A
;; ANSWER SECTION: www.vbooter.org. 299 IN CNAME vbooter.org. vbooter.org. 299 IN A 104.28.13.7 vbooter.org. 299 IN A 104.28.12.7
Can anyone from cloudflare answer me why this fits with your business model?
Mike-
On 7/26/2016 21:19, jim deleskie wrote:
Back in the day didn't we refer to such hosting as bulletproof hosting?
Not HERE! NANA-E, sure. -- "Everybody is a genius. But if you judge a fish by its ability to climb a tree, it will live its whole life believing that it is stupid." --Albert Einstein From Larry's Cox account.
I used to have a boss that was convinced that MCafee was writing viruses to stay in business.... Regards, Dovid -----Original Message----- From: Phil Rosenthal <pr@isprime.com> Sender: "NANOG" <nanog-bounces@nanog.org>Date: Tue, 26 Jul 2016 22:17:53 To: jim deleskie<deleskie@gmail.com> Cc: NANOG list<nanog@nanog.org> Subject: Re: cloudflare hosting a ddos service? Plus, it’s good for business! -Phil
On Jul 26, 2016, at 10:14 PM, jim deleskie <deleskie@gmail.com> wrote:
sigh...
On Tue, Jul 26, 2016 at 10:55 PM, Patrick W. Gilmore <patrick@ianai.net> wrote:
CloudFlare will claim they are not hosting the problem. They are just hosting the web page that lets you pay for or points at or otherwise directs you to the problem.
The actual source of packets is some other IP address. Therefore, they can keep hosting the web page. It is not sending the actual [spam|DDoS|hack|etc.], right? So stop asking them to do something about it!
Whether you think that is the proper way to provide service on the Internet is left as an exercise to the reader.
-- TTFN, patrick
On Jul 26, 2016, at 9:49 PM, Mike <mike-nanog@tiedyenetworks.com> wrote:
Hi,
So vbooter.org's dns and web is hosted by cloudflare?
"Using vBooter you can take down home internet connections, websites and game servers such us Minecraft, XBOX Live, PSN and many more."
dig -t ns vbooter.org
; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177 ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;vbooter.org. IN NS
;; ANSWER SECTION: vbooter.org. 21599 IN NS rick.ns.cloudflare.com. vbooter.org. 21599 IN NS amy.ns.cloudflare.com.
dig -t a www.vbooter.org
; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920 ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;www.vbooter.org. IN A
;; ANSWER SECTION: www.vbooter.org. 299 IN CNAME vbooter.org. vbooter.org. 299 IN A 104.28.13.7 vbooter.org. 299 IN A 104.28.12.7
Can anyone from cloudflare answer me why this fits with your business model?
Mike-
This is quite common, almost all of the DDoS-for-hire services are hosted behind CloudFlare, and a great majority of them take PayPal. Another one had even managed to secure an EV SSL cert. On Tue, Jul 26, 2016 at 10:24 PM, Dovid Bender <dovid@telecurve.com> wrote:
I used to have a boss that was convinced that MCafee was writing viruses to stay in business....
Regards,
Dovid
-----Original Message----- From: Phil Rosenthal <pr@isprime.com> Sender: "NANOG" <nanog-bounces@nanog.org>Date: Tue, 26 Jul 2016 22:17:53 To: jim deleskie<deleskie@gmail.com> Cc: NANOG list<nanog@nanog.org> Subject: Re: cloudflare hosting a ddos service?
Plus, it’s good for business!
-Phil
On Jul 26, 2016, at 10:14 PM, jim deleskie <deleskie@gmail.com> wrote:
sigh...
On Tue, Jul 26, 2016 at 10:55 PM, Patrick W. Gilmore <patrick@ianai.net> wrote:
CloudFlare will claim they are not hosting the problem. They are just hosting the web page that lets you pay for or points at or otherwise directs you to the problem.
The actual source of packets is some other IP address. Therefore, they can keep hosting the web page. It is not sending the actual [spam|DDoS|hack|etc.], right? So stop asking them to do something about it!
Whether you think that is the proper way to provide service on the Internet is left as an exercise to the reader.
-- TTFN, patrick
On Jul 26, 2016, at 9:49 PM, Mike <mike-nanog@tiedyenetworks.com> wrote:
Hi,
So vbooter.org's dns and web is hosted by cloudflare?
"Using vBooter you can take down home internet connections, websites and game servers such us Minecraft, XBOX Live, PSN and many more."
dig -t ns vbooter.org
; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177 ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;vbooter.org. IN NS
;; ANSWER SECTION: vbooter.org. 21599 IN NS rick.ns.cloudflare.com. vbooter.org. 21599 IN NS amy.ns.cloudflare.com.
dig -t a www.vbooter.org
; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920 ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;www.vbooter.org. IN A
;; ANSWER SECTION: www.vbooter.org. 299 IN CNAME vbooter.org. vbooter.org. 299 IN A 104.28.13.7 vbooter.org. 299 IN A 104.28.12.7
Can anyone from cloudflare answer me why this fits with your business model?
Mike-
-- Regards, Paras President ProTraf Solutions, LLC Enterprise DDoS Mitigation
A five minute Google search revealed this, which is just the tip of the iceberg booter.xyz exitus.to zstress.net critical-boot.com instress.club webstresser.co anonymousstresser.com rawdos.com kronosbooter.com alphastress.com synergy.so str3ssed.me layer7.pw There are probably hundreds On Tue, Jul 26, 2016 at 10:33 PM, Paras Jha <paras@protrafsolutions.com> wrote:
This is quite common, almost all of the DDoS-for-hire services are hosted behind CloudFlare, and a great majority of them take PayPal. Another one had even managed to secure an EV SSL cert.
On Tue, Jul 26, 2016 at 10:24 PM, Dovid Bender <dovid@telecurve.com> wrote:
I used to have a boss that was convinced that MCafee was writing viruses to stay in business....
Regards,
Dovid
-----Original Message----- From: Phil Rosenthal <pr@isprime.com> Sender: "NANOG" <nanog-bounces@nanog.org>Date: Tue, 26 Jul 2016 22:17:53 To: jim deleskie<deleskie@gmail.com> Cc: NANOG list<nanog@nanog.org> Subject: Re: cloudflare hosting a ddos service?
Plus, it’s good for business!
-Phil
On Jul 26, 2016, at 10:14 PM, jim deleskie <deleskie@gmail.com> wrote:
sigh...
On Tue, Jul 26, 2016 at 10:55 PM, Patrick W. Gilmore <patrick@ianai.net
wrote:
CloudFlare will claim they are not hosting the problem. They are just hosting the web page that lets you pay for or points at or otherwise directs you to the problem.
The actual source of packets is some other IP address. Therefore, they can keep hosting the web page. It is not sending the actual [spam|DDoS|hack|etc.], right? So stop asking them to do something about it!
Whether you think that is the proper way to provide service on the Internet is left as an exercise to the reader.
-- TTFN, patrick
On Jul 26, 2016, at 9:49 PM, Mike <mike-nanog@tiedyenetworks.com> wrote:
Hi,
So vbooter.org's dns and web is hosted by cloudflare?
"Using vBooter you can take down home internet connections, websites and game servers such us Minecraft, XBOX Live, PSN and many more."
dig -t ns vbooter.org
; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177 ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;vbooter.org. IN NS
;; ANSWER SECTION: vbooter.org. 21599 IN NS rick.ns.cloudflare.com. vbooter.org. 21599 IN NS amy.ns.cloudflare.com.
dig -t a www.vbooter.org
; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920 ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;www.vbooter.org. IN A
;; ANSWER SECTION: www.vbooter.org. 299 IN CNAME vbooter.org. vbooter.org. 299 IN A 104.28.13.7 vbooter.org. 299 IN A 104.28.12.7
Can anyone from cloudflare answer me why this fits with your business model?
Mike-
-- Regards, Paras
President ProTraf Solutions, LLC Enterprise DDoS Mitigation
-- Regards, Paras President ProTraf Solutions, LLC Enterprise DDoS Mitigation
On 07/26/2016 07:42 PM, Paras Jha wrote:
A five minute Google search revealed this, which is just the tip of the iceberg
booter.xyz exitus.to zstress.net critical-boot.com instress.club webstresser.co anonymousstresser.com rawdos.com kronosbooter.com alphastress.com synergy.so str3ssed.me layer7.pw
There are probably hundreds
I should also point out that the page for www.vbooter.org also had a google ad (for me anyways) at the bottom advertising arbor networks! It seems that cloudflare being an anti-ddos company needs to clean house then, and that if they really are conscious of this, that their 'good guy!' persona has taken a real beating. Mike-
Looks like barrier to obtaining an EV SSL certificate is not very high these days. There's documentation requirements, but root CAs can't be seen to discriminate against companies in the developing world. I suppose all you need is a scanned business license/incorporation documents from your local municipality in Outer Elbonia, and a few scanned copies of fake ID, and your $99 payment for the first year. On Tue, Jul 26, 2016 at 7:33 PM, Paras Jha <paras@protrafsolutions.com> wrote:
This is quite common, almost all of the DDoS-for-hire services are hosted behind CloudFlare, and a great majority of them take PayPal. Another one had even managed to secure an EV SSL cert.
On Tue, Jul 26, 2016 at 10:24 PM, Dovid Bender <dovid@telecurve.com> wrote:
I used to have a boss that was convinced that MCafee was writing viruses to stay in business....
Regards,
Dovid
-----Original Message----- From: Phil Rosenthal <pr@isprime.com> Sender: "NANOG" <nanog-bounces@nanog.org>Date: Tue, 26 Jul 2016 22:17:53 To: jim deleskie<deleskie@gmail.com> Cc: NANOG list<nanog@nanog.org> Subject: Re: cloudflare hosting a ddos service?
Plus, it’s good for business!
-Phil
On Jul 26, 2016, at 10:14 PM, jim deleskie <deleskie@gmail.com> wrote:
sigh...
On Tue, Jul 26, 2016 at 10:55 PM, Patrick W. Gilmore < patrick@ianai.net> wrote:
CloudFlare will claim they are not hosting the problem. They are just hosting the web page that lets you pay for or points at or otherwise directs you to the problem.
The actual source of packets is some other IP address. Therefore, they can keep hosting the web page. It is not sending the actual [spam|DDoS|hack|etc.], right? So stop asking them to do something about it!
Whether you think that is the proper way to provide service on the Internet is left as an exercise to the reader.
-- TTFN, patrick
On Jul 26, 2016, at 9:49 PM, Mike <mike-nanog@tiedyenetworks.com> wrote:
Hi,
So vbooter.org's dns and web is hosted by cloudflare?
"Using vBooter you can take down home internet connections, websites and game servers such us Minecraft, XBOX Live, PSN and many more."
dig -t ns vbooter.org
; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177 ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;vbooter.org. IN NS
;; ANSWER SECTION: vbooter.org. 21599 IN NS rick.ns.cloudflare.com. vbooter.org. 21599 IN NS amy.ns.cloudflare.com.
dig -t a www.vbooter.org
; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920 ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;www.vbooter.org. IN A
;; ANSWER SECTION: www.vbooter.org. 299 IN CNAME vbooter.org. vbooter.org. 299 IN A 104.28.13.7 vbooter.org. 299 IN A 104.28.12.7
Can anyone from cloudflare answer me why this fits with your business model?
Mike-
-- Regards, Paras
President ProTraf Solutions, LLC Enterprise DDoS Mitigation
Have you tried to contact their Abuse?. mehmet On Tue, Jul 26, 2016 at 6:49 PM, Mike <mike-nanog@tiedyenetworks.com> wrote:
Hi,
So vbooter.org's dns and web is hosted by cloudflare?
"Using vBooter you can take down home internet connections, websites and game servers such us Minecraft, XBOX Live, PSN and many more."
dig -t ns vbooter.org
; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177 ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;vbooter.org. IN NS
;; ANSWER SECTION: vbooter.org. 21599 IN NS rick.ns.cloudflare.com. vbooter.org. 21599 IN NS amy.ns.cloudflare.com.
dig -t a www.vbooter.org
; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920 ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;www.vbooter.org. IN A
;; ANSWER SECTION: www.vbooter.org. 299 IN CNAME vbooter.org. vbooter.org. 299 IN A 104.28.13.7 vbooter.org. 299 IN A 104.28.12.7
Can anyone from cloudflare answer me why this fits with your business model?
Mike-
On Jul 26, 2016, at 7:15 PM, Mehmet Akcin <mehmet@akcin.net> wrote:
Have you tried to contact their Abuse?.
For a long time their abuse@ alias was (literally) routed to /dev/null. I'm not sure whether that's still the case or whether they now ignore reports manually. Cheers, Steve
mehmet
On Tue, Jul 26, 2016 at 6:49 PM, Mike <mike-nanog@tiedyenetworks.com> wrote:
Hi,
So vbooter.org's dns and web is hosted by cloudflare?
"Using vBooter you can take down home internet connections, websites and game servers such us Minecraft, XBOX Live, PSN and many more."
dig -t ns vbooter.org
; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177 ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;vbooter.org. IN NS
;; ANSWER SECTION: vbooter.org. 21599 IN NS rick.ns.cloudflare.com. vbooter.org. 21599 IN NS amy.ns.cloudflare.com.
dig -t a www.vbooter.org
; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920 ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;www.vbooter.org. IN A
;; ANSWER SECTION: www.vbooter.org. 299 IN CNAME vbooter.org. vbooter.org. 299 IN A 104.28.13.7 vbooter.org. 299 IN A 104.28.12.7
Can anyone from cloudflare answer me why this fits with your business model?
Mike-
participants (11)
-
Dovid Bender
-
Eric Kuhnke
-
Ethan
-
jim deleskie
-
Larry Sheldon
-
Mehmet Akcin
-
Mike
-
Paras Jha
-
Patrick W. Gilmore
-
Phil Rosenthal
-
Steve Atkins