https://gist.github.com/sh1n0b1/10100394
) ?Hi,
We're going to do some scans of our IPv4 space to look for services
vulnerable to the OpenSSL "heartbleed" vulnerability, so we can open
tickets with customers about it¹.
I am warning you in case you have firewalls / IDS mechanisms that
may panic on seeing someone try to make use of it.
The scans will come from 173.255.227.192 and 88.198.54.123 and will
not cause any damage.
Cheers,
Andy
¹ ("Reasonable effort" courtesy free service, no contact doesn't
mean we are certifying you as safe, conditions apply, your
causality is at risk if you misappropriate entropy, etc. etc.)
--
http://bitfolk.com/ -- No-nonsense VPS hosting
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEAREDAAYFAlNG444ACgkQIJm2TL8VSQsznwCff4VF7BV2992hno3Q0c2bTcad
lloAn35Qn0X4wtX6SYSiF2e+StGIwBGa
=2Gau
-----END PGP SIGNATURE-----
_______________________________________________
announce mailing list
announce@lists.bitfolk.com
https://lists.bitfolk.com/mailman/listinfo/announce
_______________________________________________
users mailing list
users@lists.bitfolk.com
https://lists.bitfolk.com/mailman/listinfo/users