Posts: 354
Threads: 19
Joined: Jun 2010
18 Oct 10, 10:50PM
(This post was last modified: 19 Oct 10, 09:25AM by RandumKiwi.)
Someone has created a website called assault-cube.com ,where they pose as the game authors, and use a modified installer and package of AC to spread malware.
Do not download the game from this site.
I have contacted them, and also the virus-check sites they abused to lure people into false security. I suspect that the "installer" is malware free, since it's very small I guess it's just for downloading their tainted package after you execute it.
If it weren't that sad, I'd be amused at what sort of pathetic low-lives creep around out there...
Posts: 1,823
Threads: 20
Joined: Jun 2010
It means we're popular enough to be impersonated!
Posts: 239
Threads: 15
Joined: Aug 2010
That's an ugly website. Don't click the link because it will hurt your eyes.
Posts: 591
Threads: 19
Joined: Jun 2010
18 Oct 10, 11:42PM
(This post was last modified: 19 Oct 10, 12:03AM by Alien.)
no worries :P internet dont cover these assholes :P
1. report it at registrator http://www.namecheap.com/
Domain Name: ASSAULT-CUBE.COM
Registrar: ENOM, INC.
Whois Server: whois.enom.com
Referral URL: http://www.enom.com
Name Server: NS.SOURCEDNS.COM
Name Server: NS1.SOURCEDNS.COM
Status: clientTransferProhibited
Updated Date: 16-sep-2010
Creation Date: 16-sep-2010
Expiration Date: 16-sep-2011
2. hosting
http://www.liquidweb.com/
NetRange: 69.167.128.0 - 69.167.191.255
CIDR: 69.167.128.0/18
OriginAS: AS32244
NetName: LIQUIDWEB-9
NetHandle: NET-69-167-128-0-1
Parent: NET-69-0-0-0-0
NetType: Direct Allocation
NameServer: NS.LIQUIDWEB.COM
NameServer: NS1.LIQUIDWEB.COM
RegDate: 2009-02-23
Updated: 2009-02-23
Ref: http://whois.arin.net/rest/net/NET-69-167-128-0-1
OrgName: Liquid Web, Inc.
OrgId: LQWB
Address: 4210 Creyts Rd.
City: Lansing
StateProv: MI
PostalCode: 48917
Country: US
RegDate: 2001-07-20
Updated: 2008-12-19
Ref: http://whois.arin.net/rest/org/LQWB
ReferralServer: rwhois://rwhois.liquidweb.com:4321/
OrgAbuseHandle: ABUSE551-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-800-580-4985
OrgAbuseEmail: [email protected]
OrgAbuseRef: http://whois.arin.net/rest/poc/ABUSE551-ARIN
OrgTechHandle: IPADM47-ARIN
OrgTechName: IP Administrator
OrgTechPhone: +1-800-580-4985
OrgTechEmail: [email protected]
OrgTechRef: http://whois.arin.net/rest/poc/IPADM47-ARIN
Posts: 3,462
Threads: 72
Joined: Jun 2010
Should we cube, carve, slice, slash, butcher, shank, hash, knife, or shred them to pieces by (killers) knife?
Posts: 70
Threads: 22
Joined: Jun 2010
i posted a thread about a google ad i viewed after going to sourceforge a day after the 1.1.0.3 release. it had a slightly different file name to click on(but i didn't). anyone know if that was official or not ? i just downloaded it from sourceforge the normal way but watched the ad that had video of people playing the game. the ad was in a window on sourceforge.
Posts: 739
Threads: 20
Joined: Jun 2010
19 Oct 10, 06:29AM
(This post was last modified: 19 Oct 10, 07:55PM by pwnage{TyD}.)
(Content removed)
Mod edit: Do not pust stuff like this in future. And stay on topic when posting.
Posts: 377
Threads: 4
Joined: Jun 2010
..... NOT MEAT SPIN
fml......
Posts: 1,039
Threads: 77
Joined: Jun 2010
If imitation is the highest form of flattery, then I hope the owner of that site is a beautiful woman, not an ugly old man.
Posts: 1,039
Threads: 77
Joined: Jun 2010
If someone sees one of these assaultcube adverts, that are not for assaultcube (i.e. malware) can you please copy/paste the page source (in firefox, click "view" then "pagesource") and send all of that in an email to me.
Posts: 488
Threads: 12
Joined: Jun 2010
Could a mod or dev please censor the link.. seeing as we have 'minors' viewing these forums..
Posts: 1,436
Threads: 7
Joined: Jun 2010
[standard@nemo ~]$ hexdump -C /tmp/AssaultCube-Installer.exe | grep -in nsis
1837:000076f0 73 2e 73 66 2e 6e 65 74 2f 4e 53 49 53 5f 45 72 |s.sf.net/NSIS_Er|
1843:00007750 70 00 00 00 4e 53 49 53 20 45 72 72 6f 72 00 00 |p...NSIS Error..|
3338:0000dc20 6c 6c 73 6f 66 74 2e 4e 53 49 53 2e 65 78 65 68 |llsoft.NSIS.exeh|
Indeed, NSIS.
Do you know for sure that it installs malware? (yes, I know that this whole website and stuff stinks as hell, but I don't actually feel like trying it out...)
Posts: 157
Threads: 5
Joined: Jun 2010
Well, unless anyone wants to be our guinea pig for the day.....
Posts: 297
Threads: 5
Joined: Jun 2010
One of you 'tec' types could run it in a virtual sandbox and then you would know.
Posts: 481
Threads: 11
Joined: Jul 2010
honestly i will be happy to be your guinea pig. how do i do this? just download and install the program?
school computers ftw! ;)
Posts: 1,436
Threads: 7
Joined: Jun 2010
19 Oct 10, 10:00PM
(This post was last modified: 19 Oct 10, 10:00PM by tempest.)
Oh no, you better don't. This appears to be an installer hidden in an installer (PeaZip ftw, it can extract compiled NSIS archive-executables)
The actual payload:
http://img842.imageshack.us/img842/3326/stinks.png
Definitely not what should be there, and I bet it's full of bad stuff. If you're lucky, it's just adware.
Posts: 533
Threads: 33
Joined: Jun 2010
Most complains I heard about it´s adware installing Bing as default search engine and such dumb stuff. Anyways, it´s illegal and does harm our image ...
Posts: 1,436
Threads: 7
Joined: Jun 2010
19 Oct 10, 10:07PM
(This post was last modified: 19 Oct 10, 10:08PM by tempest.)
(19 Oct 10, 10:07PM)ärkefiende Wrote: Most complains I heard about it´s adware installing Bing as default search engine... Now what the hell would that be good for? Lol, those guys are so incredibly stupid.
Posts: 44
Threads: 6
Joined: Aug 2010
20 Oct 10, 12:03AM
(This post was last modified: 20 Oct 10, 12:03AM by eynstyne.)
Can someone PM me the link to the suspicious file?
I may be able to examine it in full detail. I'll try my best.
Thanks
Posts: 1,823
Threads: 20
Joined: Jun 2010
eynstyne: read the first post.
OH NO, it's Bing!
Posts: 44
Threads: 6
Joined: Aug 2010
20 Oct 10, 01:10AM
(This post was last modified: 20 Oct 10, 06:59PM by eynstyne.)
Please DO NOT under any circumstances download any files from that domain.
Below is my analysis from the exe/server
I can assure you IT IS NOT just a Bing toolbar installer
The main index.html page
<?php
$referrer = $_SERVER['HTTP_REFERER'];
if (preg_match("forum.cubers.net",$referrer)) {
header('Location: ');
} else {
};
?> completely visible and shows bad coding in general
Some javascript is completely obfuscated (gpl_lp.js)
Open Ports on 69.167.x.x Thanks NMAP :)
21/tcp open ftp PureFTPd
22/tcp open ssh OpenSSH 4.3 (protocol 2.0)
| ssh-hostkey: 1024 3f:c9:96:84:9f:37:6a:20:4c:90:44:47:5b:ec:0e:05 (DSA)
|_2048 4b:80:de:1f:ad:3f:25:f4:a7:52:f9:6f:98:23:68:de (RSA)
53/tcp open domain
| dns-zone-transfer:
| assault-cube.com SOA ns1.awesomefreegames.net sid18.gmx.com
| assault-cube.com MX assault-cube.com
| assault-cube.com NS ns1.awesomefreegames.net
| assault-cube.com NS ns2.awesomefreegames.net
| assault-cube.com A 69.167.170.233
| cpanel.assault-cube.com A 69.167.170.233
| ftp.assault-cube.com A 69.167.170.233
| localhost.assault-cube.com A 127.0.0.1
| mail.assault-cube.com CNAME
| track.assault-cube.com A 69.167.170.233
| www.track.assault-cube.com A 69.167.170.233
| webdisk.assault-cube.com A 69.167.170.233
| webmail.assault-cube.com A 69.167.170.233
| whm.assault-cube.com A 69.167.170.233
| www.assault-cube.com CNAME
|_assault-cube.com SOA ns1.awesomefreegames.net sid18.gmx.com
80/tcp open http Apache httpd 2.0.63 ((Unix) mod_ssl/2.0.63 OpenSSL/0.9.
8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PH
P/5.2.14)
| robots.txt: has 3 disallowed entries
|_/final-step/ /track/ /files/
|_html-title: AssaultCube
|_http-favicon: Unknown favicon MD5: BDF12BD1423753562AAFB2E4E2CE9600
110/tcp open pop3 Courier pop3d
|_pop3-capabilities: USER STLS IMPLEMENTATION(Courier Mail Server) UIDL PIPELINI
NG LOGIN-DELAY(10) TOP OK(K Here s what I can do)
143/tcp open imap Courier Imapd (released 2008)
|_imap-capabilities: THREAD=ORDEREDSUBJECT QUOTA STARTTLS THREAD=REFERENCES UIDP
LUS ACL2=UNION SORT ACL IMAP4rev1 IDLE NAMESPACE CHILDREN
443/tcp open http Apache httpd 2.0.63 ((Unix) mod_ssl/2.0.63 OpenSSL/0.9.
8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PH
P/5.2.14)
|_html-title: Site doesn't have a title (text/html).
465/tcp open ssl/smtp Exim smtpd 4.69
|_sslv2: server still supports SSLv2
| smtp-commands: EHLO host.awesomefreegames.net Hello 206-248-163-81.dsl.teksavv
y.com [206.248.163.81], SIZE 52428800, PIPELINING, AUTH PLAIN LOGIN, HELP
|_HELP Commands supported: AUTH HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
993/tcp open ssl/imap Courier Imapd (released 2008)
|_sslv2: server still supports SSLv2
|_imap-capabilities: THREAD=ORDEREDSUBJECT QUOTA AUTH=PLAIN THREAD=REFERENCES UI
DPLUS ACL2=UNION SORT ACL IMAP4rev1 IDLE NAMESPACE CHILDREN
995/tcp open ssl/pop3 Courier pop3d
|_sslv2: server still supports SSLv2
|_pop3-capabilities: USER IMPLEMENTATION(Courier Mail Server) UIDL PIPELINING OK
(K Here s what I can do) TOP LOGIN-DELAY(10)
3306/tcp open mysql MySQL (unauthorized)
6666/tcp open melange Melange Chat Server 1.10
Device type: WAP|general purpose|firewall
Running (JUST GUESSING) : Linksys Linux 2.4.X (92%), Linux 2.4.X|2.6.X (91%), Ch
eck Point Linux 2.4.X (86%)
Aggressive OS guesses: OpenWrt White Russian 0.9 (Linux 2.4.30) (92%), OpenWrt 0
.9 - 7.09 (Linux 2.4.30 - 2.4.34) (91%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (9
1%), Linux 2.6.20.6 (87%), Linux 2.6.19 - 2.6.24 (87%), Linux 2.6.18 (86%), Linu
x 2.6.18 - 2.6.21 (86%), OpenWrt Kamikaze 7.09 (Linux 2.6.17 - 2.6.21) (86%), Li
nux 2.6.22 (Fedora 7) (86%), Check Point NGX R65 firewall (Linux 2.4.21) (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 14 hops
TCP Sequence Prediction: Difficulty=206 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: Host: host.awesomefreegames.net
TRACEROUTE (using port 20/tcp)
HOP RTT ADDRESS
1 26.00 ms 206.248.154.104
2 79.00 ms 69.196.136.34
3 92.00 ms peer1.bdr02.tor.packetflow.ca (64.34.236.121)
4 119.00 ms 10ge.xe-2-0-0.tor-151f-cor-1.peer1.net (216.187.114.145)
5 121.00 ms 10ge.xe-0-0-0.tor-1yg-cor-1.peer1.net (216.187.114.133)
6 123.00 ms 10ge.xe-0-0-0.chi-eqx-dis-1.peer1.net (216.187.114.141)
7 125.00 ms ge-6-23.car4.Chicago1.Level3.net (4.71.102.13)
8 128.00 ms ae-32-56.ebr2.Chicago1.Level3.net (4.68.101.190)
9 130.00 ms ae-5-5.ebr2.Chicago2.Level3.net (4.69.140.194)
10 142.00 ms ae-2-52.edge2.Chicago2.Level3.net (4.69.138.163)
11 225.00 ms GLOBAL-INTE.edge2.Chicago2.Level3.net (4.59.29.78)
12 193.00 ms lw-core4-te91.rtr.liquidweb.com (209.59.157.206)
13 163.00 ms lw-dc3-dist8-po5.rtr.liquidweb.com (69.167.128.133)
14 139.00 ms 69.167.170.233 <---- The webserver
Location: Lansing, Michigan, United States
Exe file installer :
Unpacks the following in temporary directory
NSISdl.dll <-- NSIS silent downloader. Attempts to download Zugo which is known for distirbution of malware
gmx-silent-1.exe <-- Spawned subprocess from the assaultcube-installer.exe file
getCountry <-- Text file containing region acquired from windows
System.dll <-- Set PAGE_EXECUTE_READWRITE on a certain block of Virtual memory
Math.dll <-- safe NSIS file
inetc.dll <-- Attempts to download any files from a remote ftp site (safe NSIS file)
nsisos.dll <-- Profile OS as winnt,9x,31 or unknown (safe NSIS file)
GetVersion.dll <-- Gets current version of windows. Checks for SP6 (safe NSIS file)
MD5dll.dll <-- Its fine...
registeraction
and much more, but I stopped debugging at that time
The sub installer gmx-silent-1.exe queries Application Data/Mozilla Firefox/profiles.ini
Reads under profiles/<name>.default/prefs.js
Reads browserconfig.properties
Checks for various registry keys
- HCKU\Software\Wyzo, Some firefox keys
And changes browser search settings to definitely unwanted stuff
Attempts to Install items in Program Files\GMX
Finds Internet Explorer, Opera, Firefox
Attempts to Install C:\Program Files\Search Toolbar
ShellExecute (Call the fake web page with some BS locale info gathering)
Installs Registry Key under HKCU\Software\Zugo
Subkey SID with string data 24xvb
Self Destruct
BTW, Still looking into it
Posts: 684
Threads: 36
Joined: Jun 2010
Great work in debugging, eynstyne! :)
Does it try to get passwords and other secured info?
Posts: 157
Threads: 5
Joined: Jun 2010
So now that we've found out that these guys are distributing malware / adware. What can we do to take them off the web?
Posts: 44
Threads: 6
Joined: Aug 2010
20 Oct 10, 02:46AM
(This post was last modified: 20 Oct 10, 03:04AM by eynstyne.)
Well, with lots of ports open and some unprotected services, it is possible but not exactly ethical to bring it down by using exploits on the particular service versions running. Or simply DDOS them with hping.
Just Ideas, but not going that far. The data should be enough to contact the proper authorities to get this fixed.
@Brahma
No it doesn't keylog, or install rootkis/spyware. The installer is merely like a trojan to fetch bad search providers and change as many browser preferences as possible on as many browsers. It is the toolbars and payload it fetches that is the most concern.
Posts: 481
Threads: 11
Joined: Jul 2010
._. that looks deadly...
eynstyne should be given a medal of honor for saving innocent people from fake-ac malware :D
Posts: 562
Threads: 61
Joined: Jul 2010
20 Oct 10, 03:45AM
(This post was last modified: 20 Oct 10, 03:52AM by vonunov.)
Since no one else did it yet, I booted up the ol' Windows VM to see what it does on a practical basis.
It starts out appearing as a normal AC installer, ending with the expected opening of the AC website:
1. https://uloadr.com/u/l5p.png
2. https://uloadr.com/u/onc.png
3. https://uloadr.com/u/8lg.png
4. https://uloadr.com/u/6t3.png
5. https://uloadr.com/u/cny.png
6. https://uloadr.com/u/958.png
7. https://uloadr.com/u/jrt.png
8. https://uloadr.com/u/3p4.png
9. https://uloadr.com/u/t4m.png
10. https://uloadr.com/u/3ng.png
11. https://uloadr.com/u/87d.png
During and after this installation, Process Explorer shows no malicious processes:
12. https://uloadr.com/u/654.png
13. https://uloadr.com/u/tuy.png
The AC which was just installed launches OK:
14. https://uloadr.com/u/u6n.png
After launching AC and after closing it, there are still no malicious processes:
15. https://uloadr.com/u/81p.png
16. https://uloadr.com/u/5q2.png
17. https://uloadr.com/u/3yb.png
At this point I rebooted just in case any malware needed a chance to get going.
Updated MBAM and ran a quick scan (full scan is not necessary):
18. https://uloadr.com/u/49j.png
While that was running, I ran a checksum on the "fake" AC installer and the "real" one hosted on the genuine site. They match (fake first, real second):
19. https://uloadr.com/u/am0.png
20. https://uloadr.com/u/0ok.png
The MBAM scan completed clean:
21. https://uloadr.com/u/i05.png
As a final check, GMER (rootkit detector) was also clean. (No screenshot included as there is absolutely nothing to see.)
Conclusion: No malware or anything otherwise malicious -- the installer wasn't even tampered with -- except misdirecting users, possibly in an attempt to get advertisement hits or to establish the false site as genuine for future attacks.
Also, browser search settings were not tampered with, nor were any toolbars or other unwanted packages installed.
Posts: 1,039
Threads: 77
Joined: Jun 2010
They changed the executable download. I'm sure it used to direct somewhere else, where-as now it directs to sourceforge (our host) to download our file.
Posts: 3,780
Threads: 33
Joined: Jun 2010
20 Oct 10, 07:28AM
(This post was last modified: 20 Oct 10, 07:35AM by V-Man.)
Sure makes Bing.com look bad (I mean worse than it already looked).
I remember being taken to assault-cube.com after clicking a Google ad for AssaultCube from Sourceforge... Does Google have anything to do with it / know about this travesty?
As for what we should do, ...is there a specific target? Where is the fraudulent Facebook account so we can report it to the Facebook staff?
Posts: 269
Threads: 11
Joined: Jun 2010
Let's get Undead to DDoS them :P
I reported the website to Google and Mozilla. For gorgery and as a security threat.
Posts: 44
Threads: 6
Joined: Aug 2010
20 Oct 10, 04:41PM
(This post was last modified: 20 Oct 10, 06:57PM by eynstyne.)
When you first enter the site, the download is the proper one. However, moving anywhere else on the site such as the screenshots page will also contain a download link. This is where I got the file, not the index page.
This is the same link that has the assaultcube-installer.exe fake package
However, today the links point to a mediafire file. Which is indeed a properly sized Assaultcube installer file!
Either they are trying to cover their tracks, or an XSS exploit was found.
Still, the facebook link with the naughty file is still active
If you wish to contact these ppl... http://72.52.143.151/cgi-sys/ will link you to a 403 forbidden, but contains a link to mail to these ppl / subhumans.
Mailing address: [email protected]
Here is some more stuff -> http://72.52.143.151/cgi-sys/defaultwebpage.cgi (Running Apache 2.0.63 with WHM)
http://72.52.143.151/~facebook/ <-- Error, which can potentially lead to exploit
NMAP scan shows the exact same ports open and exact same versions of services:
PORT STATE SERVICE VERSION
20/tcp closed ftp-data
21/tcp open ftp PureFTPd
22/tcp open ssh OpenSSH 4.3 (protocol 2.0)
| ssh-hostkey: 1024 f9:d3:d6:85:43:46:32:57:40:48:c2:d6:b8:af:00:0d (DSA)
|_2048 03:da:1f:cd:ba:5c:63:5e:de:a5:d3:e6:e3:5b:b0:89 (RSA)
53/tcp open domain
| dns-zone-transfer:
| superfastredirect.com SOA ns1.superfastredirect.com sid18.gmx.c
om
| superfastredirect.com MX superfastredirect.com
| superfastredirect.com NS ns1.superfastredirect.com
| superfastredirect.com NS ns2.superfastredirect.com
| superfastredirect.com A 72.52.143.151
| 1.superfastredirect.com A 72.52.143.151
| www.1.superfastredirect.com A 72.52.143.151
| ftp.superfastredirect.com CNAME
| lambda.superfastredirect.com A 72.52.143.151
| localhost.superfastredirect.com A 127.0.0.1
| mail.superfastredirect.com CNAME
| www.superfastredirect.com CNAME
|_superfastredirect.com SOA ns1.superfastredirect.com sid18.gmx.c
om
80/tcp open http Apache httpd 2.0.63 ((Unix) mod_ssl/2.0.63 OpenSSL/0.9.
8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PH
P/5.2.9)
|_html-title: Site doesn't have a title (text/html).
110/tcp open pop3 Courier pop3d
|_pop3-capabilities: USER STLS IMPLEMENTATION(Courier Mail Server) UIDL PIPELINI
NG LOGIN-DELAY(10) TOP OK(K Here s what I can do)
143/tcp open imap Courier Imapd (released 2008)
|_imap-capabilities: THREAD=ORDEREDSUBJECT QUOTA STARTTLS THREAD=REFERENCES UIDP
LUS ACL2=UNION SORT ACL IMAP4rev1 IDLE NAMESPACE CHILDREN
443/tcp open http Apache httpd 2.0.63 ((Unix) mod_ssl/2.0.63 OpenSSL/0.9.
8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PH
P/5.2.9)
|_html-title: Site doesn't have a title (text/html).
465/tcp open ssl/smtp Exim smtpd 4.69
|_sslv2: server still supports SSLv2
| smtp-commands: EHLO host.superfastredirect.com Hello 206-248-163-81.dsl.teksav
vy.com [206.248.163.81], SIZE 52428800, PIPELINING, AUTH PLAIN LOGIN, HELP
|_HELP Commands supported: AUTH HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
993/tcp open ssl/imap Courier Imapd (released 2008)
|_sslv2: server still supports SSLv2
|_imap-capabilities: THREAD=ORDEREDSUBJECT QUOTA AUTH=PLAIN THREAD=REFERENCES UI
DPLUS ACL2=UNION SORT ACL IMAP4rev1 IDLE NAMESPACE CHILDREN
995/tcp open ssl/pop3 Courier pop3d
|_sslv2: server still supports SSLv2
|_pop3-capabilities: USER IMPLEMENTATION(Courier Mail Server) UIDL PIPELINING OK
(K Here s what I can do) TOP LOGIN-DELAY(10)
3306/tcp open mysql MySQL (unauthorized)
6666/tcp closed irc
Device type: WAP|general purpose|firewall
Running (JUST GUESSING) : Linksys Linux 2.4.X (92%), Linux 2.4.X|2.6.X (91%), Ch
eck Point Linux 2.4.X (86%)
Aggressive OS guesses: OpenWrt White Russian 0.9 (Linux 2.4.30) (92%), OpenWrt 0
.9 - 7.09 (Linux 2.4.30 - 2.4.34) (91%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (9
1%), Linux 2.6.20.6 (87%), Linux 2.6.19 - 2.6.24 (87%), Linux 2.6.18 (86%), Linu
x 2.6.18 - 2.6.21 (86%), OpenWrt Kamikaze 7.09 (Linux 2.6.17 - 2.6.21) (86%), Li
nux 2.6.22 (Fedora 7) (86%), Check Point NGX R65 firewall (Linux 2.4.21) (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 15 hops
TCP Sequence Prediction: Difficulty=206 (Good luck!)
IP ID Sequence Generation: All zeros
TRACEROUTE (using port 20/tcp)
HOP RTT ADDRESS
1 15.00 ms 206.248.154.104
2 15.00 ms 69.196.136.34
3 15.00 ms peer1.bdr02.tor.packetflow.ca (64.34.236.121)
4 15.00 ms 10ge.xe-2-0-0.tor-151f-cor-1.peer1.net (216.187.114.145)
5 0.00 ms 10ge.xe-0-0-0.tor-1yg-cor-1.peer1.net (216.187.114.133)
6 31.00 ms 10ge.xe-0-0-0.chi-eqx-dis-1.peer1.net (216.187.114.141)
7 78.00 ms ge-6-23.car4.Chicago1.Level3.net (4.71.102.13)
8 31.00 ms ae-31-53.ebr1.Chicago1.Level3.net (4.68.101.94)
9 31.00 ms ae-6-6.ebr1.Chicago2.Level3.net (4.69.140.190)
10 31.00 ms ae-1-51.edge2.Chicago2.Level3.net (4.69.138.131)
11 32.00 ms GLOBAL-INTE.edge2.Chicago2.Level3.net (4.59.29.78)
12 32.00 ms lw-core4-te91.rtr.liquidweb.com (209.59.157.206)
13 16.00 ms lw-dc2-core4-ge2-15.rtr.liquidweb.com (209.59.157.106)
14 31.00 ms lw-dc2-sec1-dist2-po2.rtr.liquidweb.com (209.59.157.130)
15 31.00 ms host.superfastredirect.com (72.52.143.151)
Same exact location : Lansing, Michigan. But different server
So they have 2 of them, maybe even more.
|