Thursday, November 11, 2010

IP addresses of Chinese attack servers

After looking at a month of error logs from attempts to hack my poor little Linux server, I've captured what I contend are China-based root attack machines. A given attack will cycle through servers around the world, and a sub-five-second delay between widely dispersed geographic locations proves beyond doubt that a master engine is doing the attacking. Most of the other attacking IP addresses are likely systems that have been taken over by überhackers, but  the following China-based IP addresses are IMHO manned by Chinese personnel who are on the attack:
119.164.255.4         61.55.173.39      61.151.246.140    118.126.14.37 
221.10.254.205    218.241.161.186      210.51.10.160      112.90.146.2 
220.171.12.184      221.224.81.194      210.83.70.185    219.235.4.123    
220.165.28.67     123.150.187.228         60.12.105.30    222.221.17.40    
219.235.4.123         117.41.169.21       119.164.255.4      218.1.114.75 
219.153.49.151        210.42.123.10      60.13.129.139    202.194.15.192    
122.227.22.52         123.196.113.11    61.151.246.140      118.144.76.16 
59.108.54.6             219.149.43.254       221.174.25.3       221.174.25.3 
221.238.152.179       222.44.123.136   60.208.113.131      61.164.41.141  
218.22.180.182          58.49.104.164     58.49.104.164     61.145.118.190 
221.192.141.97         219.153.49.151   119.145.254.10     211.144.112.20 
My reason for making such a claim: China is a totalitarian state bent on world cyber-domination, and nothing happens on the Internet without the tacit approval of Chinese authorities. My goal in this post is not to propose any kind of retaliation (because inciting such a response is strictly against some pretty asinine U. S. cyber laws), but to shine a light on a bunch of cockroaches. So no, I am not proposing that these IP addresses be attacked and shut down. No, I am not proposing that little genius virus applets be covertly loaded on every EPROM connected to every peripheral device on these systems, to be periodically awakened to wreak havoc on every other computer and user that touches these systems. No, I am not proposing that every file on these systems be replaced with repeating text saying, "Greetings from the Destroying Angel." And no, I am not proposing that email from these systems be sent to every important address in China announcing the next neighborhood Falun Gong meeting. Because all of the above would be illegal under US Law (did I mention that these laws are asinine?), not to mention that it would be just plain wrong to place the operators of those systems in mortal peril at the hands of a paranoid regime. No, my future amy of cyber privateers, I just wanted to shine a flashlight on a bunch of cockroaches.

No comments:

Post a Comment

Implementation suggestions for THE MORGAN DOCTRINE are most welcome. What are the "Got'chas!"? What questions would some future Cyber Privateering Czar have to answer about this in a Senate confirmation hearing?