![]() |
Illegal password access - Printable Version +- VadaVaka (https://vadavaka.com/forums) +-- Forum: Gamers Corner (https://vadavaka.com/forums/forumdisplay.php?fid=9) +--- Forum: Half-Life (https://vadavaka.com/forums/forumdisplay.php?fid=58) +---- Forum: Ricochet (https://vadavaka.com/forums/forumdisplay.php?fid=18) +---- Thread: Illegal password access (/showthread.php?tid=350) |
Illegal password access - PIX - 06-12-2003 I had someone use my rcon password on uT server illegally and I shut it down to investigate. Can anyone scan Holdout's logs for IP 66.136.201.29 and see who it is?? Can you scan the forum logs to for members with this IP? I am on the warpath:angry:This is Operation Broken Covenent! Please help Gwar, GRITS and Stefan. I am going full throttle on this mofo. Here is my trace: NeoTrace Trace Version 3.25 Results Target: 66.136.201.29 Date: 6/12/2003 (Thursday), 8:49:15 PM Nodes: 17 Node Data Node Net Reg IP Address Location Node Name 1 - - 192.168.49.234 Memphis saturn 2 1 - 192.168.49.1 Unknown 3 2 1 216.37.82.1 Unknown net-216-37-82-1.in-addr.worldspice.net 4 2 2 216.37.64.129 Unknown net-216-37-64-129.in-addr.mrep.net 5 3 3 63.150.224.5 Kansas City kcm-edge-02.inet.qwest.net 6 4 3 205.171.29.41 Kansas City kcm-core-02.inet.qwest.net 7 4 3 205.171.8.141 Unknown dal-core-02.inet.qwest.net 8 4 3 205.171.25.50 Unknown dal-brdr-02.inet.qwest.net 9 5 4 144.232.19.213 Fort Worth sl-bb22-fw-8-0.sprintlink.net 10 5 4 144.232.11.33 Fort Worth sl-bb27-fw-12-0.sprintlink.net 11 5 4 144.232.11.65 Fort Worth sl-gw39-fw-1-0.sprintlink.net 12 6 4 144.228.130.186 Unknown sl-swb-58-0.sprintlink.net 13 7 5 151.164.240.233 Unknown bb1-p14-0.rcsntx.sbcglobal.net 14 7 5 151.164.243.14 Unknown bb1-p5-0.austtx.sbcglobal.net 15 7 6 151.164.20.248 Austin dist1-vlan40.austtx.swbell.net 16 7 6 151.164.20.80 Austin rback5-fa2-1.austtx.swbell.net 17 8 6 66.136.201.29 Austin adsl-66-136-201-29.dsl.austtx.swbell.net NeoTrace Trace Version 3.25 Results Target: 66.136.201.29 Date: 6/12/2003 (Thursday), 8:52:21 PM Nodes: 17 Node Data Node Net Reg IP Address Location Node Name 1 - - 192.168.49.234 Memphis saturn 2 1 - 192.168.49.1 Unknown 3 2 1 216.37.82.1 Unknown net-216-37-82-1.in-addr.worldspice.net 4 2 2 216.37.64.129 Unknown net-216-37-64-129.in-addr.mrep.net 5 3 3 63.150.224.5 Kansas City kcm-edge-02.inet.qwest.net 6 4 3 205.171.29.41 Kansas City kcm-core-02.inet.qwest.net 7 4 3 205.171.8.141 Unknown dal-core-02.inet.qwest.net 8 4 3 205.171.25.50 Unknown dal-brdr-02.inet.qwest.net 9 5 4 144.232.19.213 Fort Worth sl-bb22-fw-8-0.sprintlink.net 10 5 4 144.232.11.33 Fort Worth sl-bb27-fw-12-0.sprintlink.net 11 5 4 144.232.11.65 Fort Worth sl-gw39-fw-1-0.sprintlink.net 12 6 4 144.228.130.186 Unknown sl-swb-58-0.sprintlink.net 13 7 5 151.164.240.233 Unknown bb1-p14-0.rcsntx.sbcglobal.net 14 7 5 151.164.243.14 Unknown bb1-p5-0.austtx.sbcglobal.net 15 7 6 151.164.20.248 Austin dist1-vlan40.austtx.swbell.net 16 7 6 151.164.20.80 Austin rback5-fa2-1.austtx.swbell.net 17 8 6 66.136.201.29 Austin adsl-66-136-201-29.dsl.austtx.swbell.net Illegal password access - Wha? - 06-12-2003 How did they get the pw? I read the thing on rcon from the SDK, it sounded really easy to catch if you listen to incoming data on the server's port with some sort of tool, but otherwise it looks like guesswork. Quote:Revised 1/3/2001 ywb -- Added new rcon protocol info: Illegal password access - GRITS - 06-12-2003 I will scan the logs and get GB to look at the fourms sorry I know how it feels Illegal password access - GRITS - 06-12-2003 done check your pm PIX Illegal password access - _Acid_Head_ - 06-12-2003 Call swbell in austin texas and report adsl-66-136-201-29 to his ISP:) Just hope his IP is static. Illegal password access - CloudFuel - 06-12-2003 it was me...omg! I thought you were afk so I left...lol sorry PIX! Illegal password access - PIX - 06-12-2003 GAWD !! Well, I kept scanning who was in there and didn't see anyone familiar, so I said...that's it...shutdown time to be safe. I kept thinking, who do I know in Texas??? Don't scare me like that. I had a lockdown and changed everything. I even locked your IP out of the forums....LOL. Ya can't scare Network Engineers like that....PHEW!! We tend to overreact. I was getting wierd messages in my console when this happened and that freaked me out. There is the problem of you joining other servers and enacting the exec adminpass.cfg file and them having your passwords to adminmod for our server. Sorry ol chap. I think I'm gonna go have ALOT of vodka now.:wacko: Tks GRITS. PS SOrry bout the huge DoS attack I let go on your IP from the DS-3. I hope it didn't make it.;) Illegal password access - CloudFuel - 06-12-2003 OMG that was what happened??? Jesus christ...I thought my system had spazzed big time! Illegal password access - Gwarsbane - 06-12-2003 DS-3 vs what a modem? Hmmm, I don't even know if my original DSL connection could handle that for long. hehe.... Illegal password access - ][_ i m i t | e s s - 06-16-2003 Speaking of passwords, do I have admijn yet on the uT server PIX? And how does it work i've never been admin Illegal password access - PIX - 06-16-2003 I have posted it for you guys. How to use it is listed by someone else there too. |