Security Log

Sun, 2005-10-16 15:53:08 - TCP Packet - Source:87.1.123.28,1911 Destination:***.**.**.***,6348 - [DOS]
Sun, 2005-10-16 15:53:09 - TCP Packet - Source:151.46.42.230,4047 Destination:***.**.**.***,6348 - [DOS]
Sun, 2005-10-16 15:53:09 - TCP Packet - Source:218.208.236.207,35650 Destination:***.**.**.***,6348 - [DOS]
Sun, 2005-10-16 15:53:10 - TCP Packet - Source:80.67.117.153,4733 Destination:***.**.**.***,6348 - [DOS]
Sun, 2005-10-16 15:53:10 - TCP Packet - Source:82.51.127.101,4047 Destination:***.**.**.***,6348 - [DOS]
Sun, 2005-10-16 15:53:12 - TCP Packet - Source:87.3.212.86,3005 Destination:***.**.**.***,6348 - [DOS]
Sun, 2005-10-16 15:53:16 - TCP Packet - Source:80.67.117.153,4733 Destination:***.**.**.***,6348 - [DOS]
Sun, 2005-10-16 15:53:17 - TCP Packet - Source:80.117.106.252,2794 Destination:***.**.**.***,6348 - [DOS]
Sun, 2005-10-16 15:53:25 - TCP Packet - Source:87.3.227.34,3715 Destination:***.**.**.***,6348 - [DOS]
Sun, 2005-10-16 15:53:30 - TCP Packet - Source:82.55.66.102,4362 Destination:***.**.**.***,6348 - [DOS]
Sun, 2005-10-16 15:53:31 - TCP Packet - Source:82.54.146.234,3025 Destination:***.**.**.***,6348 - [DOS]
Sun, 2005-10-16 15:53:31 - TCP Packet - Source:82.59.46.242,2072 Destination:***.**.**.***,6348 - [DOS]
Sun, 2005-10-16 15:53:32 - TCP Packet - Source:87.2.143.15,3281 Destination:***.**.**.***,6348 - [DOS]
Sun, 2005-10-16 15:53:32 - TCP Packet - Source:84.56.46.83,4813 Destination:***.**.**.***,6348 - [DOS]
Sun, 2005-10-16 15:53:33 - TCP Packet - Source:218.208.236.207,35650 Destination:***.**.**.***,6348 - [DOS]
Sun, 2005-10-16 15:53:39 - TCP Packet - Source:82.55.66.102,4362 Destination:***.**.**.***,6348 - [DOS]
Sun, 2005-10-16 15:53:42 - TCP Packet - Source:83.176.8.76,2001 Destination:***.**.**.***,6348 - [DOS]
Sun, 2005-10-16 15:53:44 - TCP Packet - Source:87.3.231.58,1127 Destination:***.**.**.***,6348 - [DOS]


Questa è solo una minima parte di una LUNGA lista.
Vorrei sapere quale è la linea d'azione da seguire, credo che tali tentativi provengano da sistemi
corrotti a loro volta da soft che vagano in rete alla ricerca di sistemi violabili.


cichity74