SRS zone push happened 10 minutes ago. (It is pushed out hourly now) So the site/domain is dead and the whole thing has become a moot point. :) Mark. -----Original Message----- From: Juha Saarinen [mailto:juha(a)saarinen.org] Sent: Friday, 30 September 2005 10:08 a.m. To: Webmaster Cc: nznog(a)list.waikato.ac.nz Subject: Re: [nznog] Bankdirect phish - perl script Webmaster wrote:
I'd suggest that the loop have a longish sleep - say 10 seconds or so - so that it does not look like a denial of service attack.
The host used to forward usernames/passwords to the phisher is likely a compromised box belonging to someone unaware of the situation. Looks like it's in Japan... admins there are usually good about responding, in my experience. IMO, it'd make more sense to trace the origin of the phisher instead of bombarding that box with bogus data that's easy enough to filter out. -- Juha Pas de conneries la! _______________________________________________ NZNOG mailing list NZNOG(a)list.waikato.ac.nz http://list.waikato.ac.nz/mailman/listinfo/nznog