Jump to content

Wikipedia:WikiProject Spam/LinkReports/neustar.biz

From Wikipedia, the free encyclopedia



[edit]

Users

[edit]

Additions

[edit]
  1. 2014-03-14 13:12:11 (UTC): User Michael Minh t • c • dc • l • ef • b • bl; (58) to .cn (edit | talk | history | links | watch | logs) (diff  top?) - Link: www.neustar.biz/services/domain-name-registry/find-a-registrar (R/Xmeta/L)
    Other links: www.neustar.biz/services/domain-name-registry/find-a-registrar (58, 61, 1, 1- R/X/L)
  2. 2014-10-18 15:31:38 (UTC): User K7L t • c • dc • l • ef • b • bl; (8743) to Number pooling (edit | talk | history | links | watch | logs) (diff  top?) - Link: www.neustar.biz/about-us/our-history (R/Xmeta/L)
    Other links: www.npac.com/the-npac/neustar (8743, 5, X, X- R/X/L) www.npac.com/the-npac/neustar (8743, 5, X, X- R/X/L) www.nationalpooling.org (8743, 2, X, X- R/X/L) www.nationalpooling.org (8743, 2, X, X- R/X/L) www.law.cornell.edu/cfr/text/47/52.20 (8743, -1, X, X- R/X/L) www.law.cornell.edu/cfr/text/47/52.20 (8743, -1, X, X- R/X/L) wutc.wa.gov/telecom/numberpool (8743, 21, X, X- R/X/L) wutc.wa.gov/telecom/numberpool (8743, 21, X, X- R/X/L) connectedplanetonline.com/mag/telecom_lnp_number_pooling/ (8743, 59, X, X- R/X/L) connectedplanetonline.com/mag/telecom_lnp_number_pooling/ (8743, 59, X, X- R/X/L) www.ported.com/Trialex.html (8743, 2, X, X- R/X/L) www.ported.com/Trialex.html (8743, 2, X, X- R/X/L) www.neustar.biz/about-us/our-history (8743, 61, X, X- R/X/L) www.neustar.biz/about-us/our-history (8743, 61, X, X- R/X/L)

    User is in a trusted group bot on some wikis
  3. 2014-10-29 00:07:36 (UTC): w:sco:User:AmaryllisGardener (t - c; 72426) to w:sco:.cn (diff  top?) - Link: www.neustar.biz/enterprise/domain-name-registry/cn-domain-names (R/Xmeta/L)
    Other links: big5.chinanews.com.cn:89/special/guoqing/60/2009/06-25/122.shtml (72426, -1, X, X- R/X/L) www.neustar.biz/enterprise/domain-name-registry/cn-domain-names (72426, 61, X, X- R/X/L) www1.cnnic.cn (72426, 67, X, X- R/X/L) www.cnnic.net.cn/html/Dir/2003/11/27/1510.htm (72426, 59, X, X- R/X/L) www.cnnic.net.cn/html/Dir/2005/03/24/2861.htm (72426, 59, X, X- R/X/L)

    User is in trusted groups sysop, rollbacker, reviewer on some wikis
  4. 2014-11-13 19:11:00 (UTC): User 166.137.139.32 t • c • dc • l • ef • b • bl; (1) to Denial-of-service attack (edit | talk | history | links | watch | logs) (diff  top?) - Link: www.neustar.biz/services/ddos-protection (R/Xmeta/L)
    Other links: www.neustar.biz/services/ddos-protection (1, 61, 1, 1- R/X/L)
  5. 2014-11-14 05:37:56 (UTC): User BG19bot t • c • dc • l • ef • b • bl; (49914) to Denial-of-service attack (edit | talk | history | links | watch | logs) (diff  top?) - Link: www.neustar.biz/services/ddos-protection (R/Xmeta/L)
    Other links: www.neustar.biz/services/ddos-protection (49914, 61, X, X- R/X/L)

    User is in a trusted group bot on some wikis
  6. 2014-12-08 01:14:13 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Denial-of-service attack (edit | talk | history | links | watch | logs) (diff  top?) - Link: www.neustar.biz/services/ddos-protection (R/Xmeta/L)
    Other links: cyber.law.harvard.edu/publications/2010/DDoS_Independent_Media_and_Human_Rights (-1, , X, X- R/X/L) atlas.arbor.net/summary/dos (-1, , X, X- R/X/L) www.cert.org/tech_tips/denial_of_service.html (-1, , X, X- R/X/L) www.w3.org/Security/Faq/wwwsf6.html (-1, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/* (-1, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/* (-1, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/DDoS%20Public%20Media%20Reports_0.xls (-1, , X, X- R/X/L) www.webcitation.org/5ws9nHATo (-1, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf (-1, , X, X- R/X/L) www.webcitation.org/5ws9RPpXi (-1, , X, X- R/X/L) www.huffingtonpost.com/2013/01/12/anonymous-ddos-petition-white-house_n_2463009.html (-1, , X, X- R/X/L) www.youtube.com/watch?v=59AlNnX_Ksg&feature=feedu (-1, -1, X, X- R/X/L) www.gpo.gov/fdsys/pkg/USCODE-2010-title18/html/USCODE-2010-title18-partI-chap47-sec1030.htm (-1, , X, X- R/X/L) news.cnet.com/U.K.-outlaws-denial-of-service-attacks/2100-7348_3-6134472.html (-1, -1, X, X- R/X/L) www.caida.org/publications/animations/ (-1, , X, X- R/X/L) www.darkreading.com/securityservices/security/intrusion-prevention/showArticle.jhtml?articleID=219900002 (-1, , X, X- R/X/L) www.business.att.com/content/productbrochures/ddos_prodbrief.pdf (-1, , X, X- R/X/L) www.tatacommunications.com/news/release-view.asp?d=20110907-DDOS-protection (-1, , X, X- R/X/L) www.theregister.co.uk/Print/2013/06/03/dns_reflection_ddos_amplification_hacker_method/ (-1, , X, X- R/X/L) www.neustar.biz/services/ddos-protection (-1, 61, X, X- R/X/L) www.arbornetworks.com/arbor-partner/alliances/technology-alliances/clean-pipes-2-0 (-1, , X, X- R/X/L) research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080921012859/http://research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (-1, -1, X, X- R/X/L) www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_7-4/dos_attacks.html (-1, , X, X- R/X/L) www.ecommercewisdom.com/relationship-firewalls-protection-ddos/ (-1, , X, X- R/X/L) mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080910202908/http://mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (-1, -1, X, X- R/X/L) www.computerworld.com/s/article/94014/How_to_defend_against_DDoS_attacks (-1, , X, X- R/X/L) dx.doi.org/10.1093%2Fcomjnl%2Fbxp078 (-1, , X, X- R/X/L) staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-DoSSurveyComputerJournal.pdf (-1, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/ (-1, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/ (-1, , X, X- R/X/L) wnmufm.org/post/people-overload-website-hoping-help-search-missing-jet (-1, , X, X- R/X/L) news.bbc.co.uk/2/hi/business/6108502.stm (-1, , X, X- R/X/L) productforums.google.com/forum/?hl=en#!category-topic/websearch/unexpected-search-results/uFcXXixhiBw (-1, , X, X- R/X/L) news.bbc.co.uk/1/hi/8120324.stm (-1, , X, X- R/X/L) www.ic3.gov/media/2013/130107.aspx (-1, , X, X- R/X/L) www.fbi.gov/newark/press-releases/2010/nk051110.htm (-1, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA13-088A (-1, , X, X- R/X/L) www.isotf.org/news/DNS-Amplification-Attacks.pdf (-1, , X, X- R/X/L) web.archive.org/web/20101214074629/http://www.isotf.org/news/DNS-Amplification-Attacks.pdf (-1, -1, X, X- R/X/L) dx.doi.org/10.1145/2663716.2663731 (-1, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA14-017A (-1, , X, X- R/X/L) www.icir.org/vern/papers/reflectors.CCR.01/reflectors.html (-1, , X, X- R/X/L) www.internetsociety.org/sites/default/files/01_5.pdf (-1, , X, X- R/X/L) www.internetsociety.org/sites/default/files/01_5.pdf (-1, , X, X- R/X/L) firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/ (-1, , X, X- R/X/L) firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/ (-1, , X, X- R/X/L) www.theregister.co.uk/2004/09/23/authorize_ddos_attack/ (-1, , X, X- R/X/L) www.sans.org/resources/idfaq/trinoo.php (-1, , X, X- R/X/L) staff.washington.edu/dittrich/misc/stacheldraht.analysis.txt (-1, , X, X- R/X/L) d-scholarship.pitt.edu/19225/1/FinalVersion.pdf (-1, 313, X, X- R/X/L) www.owasp.org/images/4/43/Layer_7_DDOS.pdf (-1, , X, X- R/X/L) eusecwest.com/speakers.html#PhlashDance (-1, , X, X- R/X/L) web.archive.org/web/20090201173324/http://eusecwest.com/speakers.html#PhlashDance (-1, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=154270&WT.svl=news1_1 (-1, , X, X- R/X/L) web.archive.org/web/20081208002732/http://www.darkreading.com/security/management/showArticle.jhtml?articleID=211201088 (-1, -1, X, X- R/X/L) www.theregister.co.uk/2008/05/21/phlashing/ (-1, , X, X- R/X/L) www.microsoft.com/technet/security/advisory/975497.mspx (-1, , X, X- R/X/L) www.zdnet.com/blog/security/windows-7-vista-exposed-to-teardrop-attack/4222 (-1, , X, X- R/X/L) www.cert.org/historical/advisories/ca-1997-28.cfm (-1, , X, X- R/X/L) tools.ietf.org/html/rfc4987 (-1, , X, X- R/X/L) anml.iu.edu/ddos/types.html (-1, , X, X- R/X/L) web.archive.org/web/20100914222536/http://anml.iu.edu/ddos/types.html (-1, -1, X, X- R/X/L) dx.doi.org/10.4236%2Fjis.2010.12010 (-1, , X, X- R/X/L) web.archive.org/web/20131104052804/http://www.us-cert.gov/ncas/tips/st04-015 (-1, -1, X, X- R/X/L) www.us-cert.gov/ncas/tips/st04-015 (-1, , X, X- R/X/L) www.bizjournals.com/atlanta/stories/2002/07/22/story4.html?page=allf (-1, -1, X, X- R/X/L) arxiv.org/ftp/arxiv/papers/0912/0912.5101.pdf (-1, , X, X- R/X/L) dx.doi.org/10.1109%2FMSP.2010.2 (-1, , X, X- R/X/L) www.radicalphilosophy.com/article/the-philosophy-of-anonymous (-1, , X, X- R/X/L) dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/ (-1, , X, X- R/X/L) www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (-1, , X, X- R/X/L) www.eweek.com/security/slideshows/ddos-attack-volume-escalates-as-new-methods-emerge.html (-1, , X, X- R/X/L) www.owasp.org/index.php/OWASP_HTTP_Post_Tool (-1, , X, X- R/X/L) eusecwest.com (-1, , X, X- R/X/L)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  7. 2015-02-03 06:53:41 (UTC): wikidata:www:User:Dexbot (t - c; 181353) to wikidata:www:Q7002903 (diff  top?) - Link: www.neustar.biz (R/Xmeta/L)
    Other links: www.neustar.biz (181353, 61, X, X- R/X/L) www.neustar.biz (181353, 61, X, X- R/X/L)

    User is in trusted groups sysop, bot, rollbacker on some wikis
  8. 2015-02-28 15:36:46 (UTC): User Pankaj Sukale t • c • dc • l • ef • b • bl; (3) to Category:Load testing tools (edit | talk | history | links | watch | logs) (diff  top?) - Link: home.wpm.neustar.biz (R/Xmeta/L)
    Other links: www.youtube.com/watch?v=NFNbsTnm_64 (3, -1, X, X- R/X/L) home.wpm.neustar.biz (3, 2, 2, 1- R/X/L)
  9. 2015-02-28 15:49:15 (UTC): User Pankaj Sukale t • c • dc • l • ef • b • bl; (3) to Website monitoring (edit | talk | history | links | watch | logs) (diff  top?) - Link: home.wpm.neustar.biz (R/Xmeta/L)
    Other links: home.wpm.neustar.biz (3, 2, 2, 1- R/X/L)
  10. 2015-03-06 06:55:48 (UTC): User 74.96.191.209 t • c • dc • l • ef • b • bl; (48) to User:Anchit92/sandbox (edit | talk | history | links | watch | logs) (diff  top?) - Link: www.neustar.biz/services/ddos-protection/ddos-mitigation-technology (R/Xmeta/L)
    Other links: www.quanza.net/en/expertise/ddos/ (48, , X, X- R/X/L) www.quanza.net/en/expertise/ddos/ (48, , X, X- R/X/L) metasure.co.uk/partners/ (48, , X, X- R/X/L) metasure.co.uk/partners/ (48, , X, X- R/X/L) www.media-frontiers.org/?p=46 (48, , X, X- R/X/L) www.media-frontiers.org/?p=46 (48, , X, X- R/X/L) haniyatech.com/nextgen.html (48, , X, X- R/X/L) haniyatech.com/nextgen.html (48, , X, X- R/X/L) nevotechnologies.com/en/products/security1/riorey (48, , X, X- R/X/L) nevotechnologies.com/en/products/security1/riorey (48, , X, X- R/X/L) www.odysseyconsultants.com/PartnersAndAffiliates (48, , X, X- R/X/L) www.odysseyconsultants.com/PartnersAndAffiliates (48, , X, X- R/X/L) www.businesswire.com/news/home/20110214006007/en/Myricom-Announces-Sniffer10G-2.0-10GbE-Packet-Injection#.VPlIlPnF_fc (48, , X, X- R/X/L) www.businesswire.com/news/home/20110214006007/en/Myricom-Announces-Sniffer10G-2.0-10GbE-Packet-Injection#.VPlIlPnF_fc (48, , X, X- R/X/L) www.neustar.biz/services/ddos-protection/ddos-mitigation-technology (48, 61, X, X- R/X/L) www.neustar.biz/services/ddos-protection/ddos-mitigation-technology (48, 61, X, X- R/X/L) www.it-nerdz.com/profile/riorey/ (48, , X, X- R/X/L) www.it-nerdz.com/profile/riorey/ (48, , X, X- R/X/L) www.real-sec.com/index.php/en/component/search/?searchword=riorey&searchphrase=all&Itemid=101 (48, , X, X- R/X/L) www.real-sec.com/index.php/en/component/search/?searchword=riorey&searchphrase=all&Itemid=101 (48, , X, X- R/X/L) www.dragonsoft.com/product/RioRey/rr_p03.php (48, , X, X- R/X/L) www.dragonsoft.com/product/RioRey/rr_p03.php (48, , X, X- R/X/L) www.securesos.com/index.php/rio-rey/13-partners (48, , X, X- R/X/L) www.securesos.com/index.php/rio-rey/13-partners (48, , X, X- R/X/L) www.mobilitytechzone.com/news/2009/11/05/4465208.htm (48, , X, X- R/X/L) www.mobilitytechzone.com/news/2009/11/05/4465208.htm (48, , X, X- R/X/L) www.hostingjournalist.com/6642/dedicated-hosting/server-mania-adds-riorey-ddos-mitigation-appliances-to-its-buffalo-ny-data-denter/ (48, , X, X- R/X/L) www.hostingjournalist.com/6642/dedicated-hosting/server-mania-adds-riorey-ddos-mitigation-appliances-to-its-buffalo-ny-data-denter/ (48, , X, X- R/X/L) zbode.com/gameserver-protection.php (48, , X, X- R/X/L) zbode.com/gameserver-protection.php (48, , X, X- R/X/L) javapipe.com/ddos-protection-for-networks.php (48, , X, X- R/X/L) javapipe.com/ddos-protection-for-networks.php (48, , X, X- R/X/L) www.datatrend.com/library/Brief-RioRey-0910.pdf (48, , X, X- R/X/L) www.datatrend.com/library/Brief-RioRey-0910.pdf (48, , X, X- R/X/L) www-304.ibm.com/partnerworld/gsd/solutiondetails.do?solution=42440&lc=en&stateCd=P&tab=2 (48, , X, X- R/X/L) www-304.ibm.com/partnerworld/gsd/solutiondetails.do?solution=42440&lc=en&stateCd=P&tab=2 (48, , X, X- R/X/L) www.netdef.co.uk/media/51481/riorey.pdf (48, , X, X- R/X/L) www.netdef.co.uk/media/51481/riorey.pdf (48, , X, X- R/X/L) finance.yahoo.com/news/press-release-common-criteria-certification-130000323.html (48, , X, X- R/X/L) finance.yahoo.com/news/press-release-common-criteria-certification-130000323.html (48, , X, X- R/X/L) www.advfn.com/news_Press-Release-Re-Common-Criteria-Certification_56345898.html (48, , X, X- R/X/L) www.advfn.com/news_Press-Release-Re-Common-Criteria-Certification_56345898.html (48, , X, X- R/X/L) www.bloomberg.com/research/stocks/private/snapshot.asp?privcapId=29157158 (48, , X, X- R/X/L) www.bloomberg.com/research/stocks/private/snapshot.asp?privcapId=29157158 (48, , X, X- R/X/L) www.quora.com/Who-are-the-major-providers-to-protect-against-a-DDoS-attack (48, , X, X- R/X/L) www.quora.com/Who-are-the-major-providers-to-protect-against-a-DDoS-attack (48, , X, X- R/X/L) www-304.ibm.com/partnerworld/gsd/solutiondetails.do?solution=42440&lc=en&stateCd=P&tab=1 (48, , X, X- R/X/L) www-304.ibm.com/partnerworld/gsd/solutiondetails.do?solution=42440&lc=en&stateCd=P&tab=1 (48, , X, X- R/X/L)
  11. 2015-04-23 00:48:43 (UTC): User Pinecar t • c • dc • l • ef • b • bl; (37) to Rob Strickland (edit | talk | history | links | watch | logs) (diff  top?) - Link: www.neustar.biz/blog/six-communications-technology-takeaways-from-iis-2014 (R/Xmeta/L)
    Other links: www.neustar.biz/blog/six-communications-technology-takeaways-from-iis-2014 (37, 61, 3, 1- R/X/L) www.neustar.biz/blog/six-communications-technology-takeaways-from-iis-2014 (37, 61, 3, 1- R/X/L)
  12. 2015-05-11 21:43:58 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Denial-of-service attack (edit | talk | history | links | watch | logs) (diff  top?) - Link: www.neustar.biz/services/ddos-protection (R/Xmeta/L)
    Other links: www.cert.org/tech_tips/denial_of_service.html (-1, , X, X- R/X/L) www.w3.org/Security/Faq/wwwsf6.html (-1, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/* (-1, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/* (-1, , X, X- R/X/L) www.internetsociety.org/doc/amplification-hell-revisiting-network-protocols-ddos-abuse (-1, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/DDoS%20Public%20Media%20Reports_0.xls (-1, , X, X- R/X/L) www.webcitation.org/5ws9nHATo (-1, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf (-1, , X, X- R/X/L) www.webcitation.org/5ws9RPpXi (-1, , X, X- R/X/L) www.huffingtonpost.com/2013/01/12/anonymous-ddos-petition-white-house_n_2463009.html (-1, , X, X- R/X/L) www.youtube.com/watch?v=59AlNnX_Ksg&feature=feedu (-1, -1, X, X- R/X/L) www.gpo.gov/fdsys/pkg/USCODE-2010-title18/html/USCODE-2010-title18-partI-chap47-sec1030.htm (-1, , X, X- R/X/L) news.cnet.com/U.K.-outlaws-denial-of-service-attacks/2100-7348_3-6134472.html (-1, -1, X, X- R/X/L) www.caida.org/publications/animations/ (-1, , X, X- R/X/L) www.verizon.com/about/news/verizon-digital-media-services-launches-cloud-based-web-application-firewall-increases-defenses (-1, , X, X- R/X/L) www.verizonenterprise.com/products/security/enforcement-protection (-1, , X, X- R/X/L) www.darkreading.com/securityservices/security/intrusion-prevention/showArticle.jhtml?articleID=219900002 (-1, , X, X- R/X/L) www.tatacommunications.com/news/release-view.asp?d=20110907-DDOS-protection (-1, , X, X- R/X/L) www.sprint.com/business/solutions/sprint_enablers/managed_security/index.html (-1, , X, X- R/X/L) www.theregister.co.uk/Print/2013/06/03/dns_reflection_ddos_amplification_hacker_method/ (-1, , X, X- R/X/L) www.neustar.biz/services/ddos-protection (-1, 61, X, X- R/X/L) f5.com/products/platforms/silverline/f5-silverline-ddos-protection/under-attack (-1, , X, X- R/X/L) www.business.att.com/content/productbrochures/ddos_prodbrief.pdf (-1, , X, X- R/X/L) www.arbornetworks.com/arbor-partner/alliances/technology-alliances/clean-pipes-2-0 (-1, , X, X- R/X/L) research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080921012859/http://research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (-1, -1, X, X- R/X/L) www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_7-4/dos_attacks.html (-1, , X, X- R/X/L) www.ecommercewisdom.com/relationship-firewalls-protection-ddos/ (-1, , X, X- R/X/L) mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080910202908/http://mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (-1, -1, X, X- R/X/L) www.computerworld.com/s/article/94014/How_to_defend_against_DDoS_attacks (-1, , X, X- R/X/L) staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-DoSSurveyComputerJournal.pdf (-1, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/ (-1, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/ (-1, , X, X- R/X/L) wnmufm.org/post/people-overload-website-hoping-help-search-missing-jet (-1, , X, X- R/X/L) news.bbc.co.uk/2/hi/business/6108502.stm (-1, , X, X- R/X/L) productforums.google.com/forum/?hl=en#!category-topic/websearch/unexpected-search-results/uFcXXixhiBw (-1, , X, X- R/X/L) news.bbc.co.uk/1/hi/8120324.stm (-1, , X, X- R/X/L) www.ic3.gov/media/2013/130107.aspx (-1, , X, X- R/X/L) www.fbi.gov/newark/press-releases/2010/nk051110.htm (-1, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA13-088A (-1, , X, X- R/X/L) www.isotf.org/news/DNS-Amplification-Attacks.pdf (-1, , X, X- R/X/L) web.archive.org/web/20101214074629/http://www.isotf.org/news/DNS-Amplification-Attacks.pdf (-1, -1, X, X- R/X/L) dx.doi.org/10.1145/2663716.2663731 (-1, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA14-017A (-1, , X, X- R/X/L) www.icir.org/vern/papers/reflectors.CCR.01/reflectors.html (-1, , X, X- R/X/L) www.internetsociety.org/sites/default/files/01_5.pdf (-1, , X, X- R/X/L) www.internetsociety.org/sites/default/files/01_5.pdf (-1, , X, X- R/X/L) firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/ (-1, , X, X- R/X/L) firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/ (-1, , X, X- R/X/L) www.theregister.co.uk/2004/09/23/authorize_ddos_attack/ (-1, , X, X- R/X/L) www.sans.org/resources/idfaq/trinoo.php (-1, , X, X- R/X/L) staff.washington.edu/dittrich/misc/stacheldraht.analysis.txt (-1, , X, X- R/X/L) d-scholarship.pitt.edu/19225/1/FinalVersion.pdf (-1, 313, X, X- R/X/L) www.owasp.org/images/4/43/Layer_7_DDOS.pdf (-1, , X, X- R/X/L) eusecwest.com/speakers.html#PhlashDance (-1, , X, X- R/X/L) web.archive.org/web/20090201173324/http://eusecwest.com/speakers.html#PhlashDance (-1, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=154270&WT.svl=news1_1 (-1, , X, X- R/X/L) web.archive.org/web/20081208002732/http://www.darkreading.com/security/management/showArticle.jhtml?articleID=211201088 (-1, -1, X, X- R/X/L) www.theregister.co.uk/2008/05/21/phlashing/ (-1, , X, X- R/X/L) www.microsoft.com/technet/security/advisory/975497.mspx (-1, , X, X- R/X/L) www.zdnet.com/blog/security/windows-7-vista-exposed-to-teardrop-attack/4222 (-1, , X, X- R/X/L) www.cert.org/historical/advisories/ca-1997-28.cfm (-1, , X, X- R/X/L) tools.ietf.org/html/rfc4987 (-1, , X, X- R/X/L) anml.iu.edu/ddos/types.html (-1, , X, X- R/X/L) web.archive.org/web/20100914222536/http://anml.iu.edu/ddos/types.html (-1, -1, X, X- R/X/L) web.archive.org/web/20131104052804/http://www.us-cert.gov/ncas/tips/st04-015 (-1, -1, X, X- R/X/L) www.us-cert.gov/ncas/tips/st04-015 (-1, , X, X- R/X/L) www.bizjournals.com/atlanta/stories/2002/07/22/story4.html?page=allf (-1, -1, X, X- R/X/L) arxiv.org/ftp/arxiv/papers/0912/0912.5101.pdf (-1, , X, X- R/X/L) www.radicalphilosophy.com/article/the-philosophy-of-anonymous (-1, , X, X- R/X/L) dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/ (-1, , X, X- R/X/L) web.archive.org/web/20140513044100/http://dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/? (-1, -1, X, X- R/X/L) www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (-1, , X, X- R/X/L) web.archive.org/web/20140311070205/http://www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (-1, -1, X, X- R/X/L) www.eweek.com/security/slideshows/ddos-attack-volume-escalates-as-new-methods-emerge.html (-1, , X, X- R/X/L) www.owasp.org/index.php/OWASP_HTTP_Post_Tool (-1, , X, X- R/X/L) eusecwest.com (-1, , X, X- R/X/L) cyber.law.harvard.edu/publications/2010/DDoS_Independent_Media_and_Human_Rights (-1, , X, X- R/X/L) atlas.arbor.net/summary/dos (-1, , X, X- R/X/L)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  13. 2015-06-11 07:00:26 (UTC): w:de:User:Arj83 (t - c; 37) to w:de:Top-Level-Domain (diff  top?) - Link: www.neustar.biz/services/domain-name-registry/ (R/Xmeta/L)
    Other links: www.neustar.biz/services/domain-name-registry/ (37, 61, 1, 1- R/X/L)
  14. 2015-06-23 20:20:14 (UTC): User Kbrose t • c • dc • l • ef • b • bl; (516) to Number Portability Administration Center (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/thetechnology/npac#.VYm471VVhBc (R/Xmeta/L)
    Other links: www.bizjournals.com/washington/blog/techflash/2015/03/neustar-loses-bid-for-lucrative-contract-after-fcc.html (516, -1, X, X- R/X/L) www.neustar.biz/thetechnology/npac#.VYm471VVhBc (516, 61, X, X- R/X/L)

    User is in trusted groups rollbacker, reviewer on some wikis
  15. 2015-06-23 20:53:36 (UTC): User Kbrose t • c • dc • l • ef • b • bl; (516) to Number Portability Administration Center (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/thetechnology/npac/faqs#.VYnDVFVVhBc (R/Xmeta/L)
    Other links: www.neustar.biz/thetechnology/npac/faqs#.VYnDVFVVhBc (516, 61, X, X- R/X/L) digital.library.unt.edu/ark:/67531/metadc2049/m1/397/ (516, 5664, X, X- R/X/L) www.law.cornell.edu/uscode/47/251.html (516, -1, X, X- R/X/L)

    User is in trusted groups rollbacker, reviewer on some wikis
  16. 2015-08-10 12:50:37 (UTC): w:pl:User:Argonowski (t - c; 366) to w:pl:DNS Advantage (diff  !top) - Link: www.neustar.biz/services/dns-services/free-recursive-dns (R/Xmeta/L)
    Other links: www.computerworld.pl/news/323890/Darmowe.DNS.zbyt.piekne.by.bylo.prawdziwe.html (366, 411, 2, 0- R/X/L) www.prnewswire.com/news-releases/neustar-launches-dns-advantagetm-service-58660712.html (366, -1, X, X- R/X/L) www.neustar.biz/services/dns-services/free-recursive-dns (366, 61, 1, 1- R/X/L)
  17. 2015-12-17 17:42:10 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Denial-of-service attack (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/services/ddos-protection (R/Xmeta/L)
    Other links: cyber.law.harvard.edu/publications/2010/DDoS_Independent_Media_and_Human_Rights (-1, , X, X- R/X/L) atlas.arbor.net/summary/dos (-1, , X, X- R/X/L) www.cert.org/tech_tips/denial_of_service.html (-1, , X, X- R/X/L) www.w3.org/Security/Faq/wwwsf6.html (-1, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/* (-1, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/* (-1, , X, X- R/X/L) www.internetsociety.org/doc/amplification-hell-revisiting-network-protocols-ddos-abuse (-1, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/DDoS%20Public%20Media%20Reports_0.xls (-1, , X, X- R/X/L) www.webcitation.org/5ws9nHATo (-1, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf (-1, , X, X- R/X/L) www.webcitation.org/5ws9RPpXi (-1, , X, X- R/X/L) www.youtube.com/watch?v=59AlNnX_Ksg&feature=feedu (-1, -1, X, X- R/X/L) www.huffingtonpost.com/2013/01/12/anonymous-ddos-petition-white-house_n_2463009.html (-1, , X, X- R/X/L) www.legislation.gov.uk/ukpga/1990/18/section/3 (-1, , X, X- R/X/L) www.gpo.gov/fdsys/pkg/USCODE-2010-title18/html/USCODE-2010-title18-partI-chap47-sec1030.htm (-1, , X, X- R/X/L) www.caida.org/publications/animations/ (-1, , X, X- R/X/L) wnmufm.org/post/people-overload-website-hoping-help-search-missing-jet (-1, , X, X- R/X/L) news.bbc.co.uk/2/hi/business/6108502.stm (-1, , X, X- R/X/L) productforums.google.com/forum/?hl=en#!category-topic/websearch/unexpected-search-results/uFcXXixhiBw (-1, , X, X- R/X/L) news.bbc.co.uk/1/hi/8120324.stm (-1, , X, X- R/X/L) www.verizon.com/about/news/verizon-digital-media-services-launches-cloud-based-web-application-firewall-increases-defenses (-1, , X, X- R/X/L) www.verizonenterprise.com/products/security/enforcement-protection (-1, , X, X- R/X/L) www.darkreading.com/securityservices/security/intrusion-prevention/showArticle.jhtml?articleID=219900002 (-1, , X, X- R/X/L) www.tatacommunications.com/news/release-view.asp?d=20110907-DDOS-protection (-1, , X, X- R/X/L) www.staminus.net (-1, , X, X- R/X/L) www.telx.com/news/staminus-establishes-presence-in-telxs-60-hudson-street-data-center-in-new/ (-1, , X, X- R/X/L) www.sprint.com/business/solutions/sprint_enablers/managed_security/index.html (-1, , X, X- R/X/L) www.theregister.co.uk/Print/2013/06/03/dns_reflection_ddos_amplification_hacker_method/ (-1, , X, X- R/X/L) www.neustar.biz/services/ddos-protection (-1, 61, X, X- R/X/L) www.incapsula.com/infrastructure-ddos-protection-services.html (-1, , X, X- R/X/L) f5.com/products/platforms/silverline/f5-silverline-ddos-protection/under-attack (-1, , X, X- R/X/L) www.business.att.com/content/productbrochures/ddos_prodbrief.pdf (-1, , X, X- R/X/L) www.arbornetworks.com/arbor-partner/alliances/technology-alliances/clean-pipes-2-0 (-1, , X, X- R/X/L) www.radware.com/Products/DefensePipe/ (-1, , X, X- R/X/L) research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080921012859/http://research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (-1, -1, X, X- R/X/L) www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_7-4/dos_attacks.html (-1, , X, X- R/X/L) www.ecommercewisdom.com/relationship-firewalls-protection-ddos/ (-1, , X, X- R/X/L) www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0004963006220628 (-1, , X, X- R/X/L) mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080910202908/http://mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (-1, -1, X, X- R/X/L) www.computerworld.com/s/article/94014/How_to_defend_against_DDoS_attacks (-1, , X, X- R/X/L) staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-DoSSurveyComputerJournal.pdf (-1, , X, X- R/X/L) www.scmagazineuk.com/akamai-warns-of-increased-activity-from-ddos-extortion-group/article/438333/ (-1, , X, X- R/X/L) www.bloomberg.com/news/articles/2015-09-09/bitcoin-ddos-ransom-demands-raise-dd4bc-profile?mod=djemRiskCompliance (-1, , X, X- R/X/L) blog.cloudbric.com/2015/09/whos-behind-ddos-attacks-and-how-can.html (-1, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/ (-1, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/ (-1, , X, X- R/X/L) ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6158635 (-1, , X, X- R/X/L) www.ic3.gov/media/2013/130107.aspx (-1, , X, X- R/X/L) www.fbi.gov/newark/press-releases/2010/nk051110.htm (-1, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA13-088A (-1, , X, X- R/X/L) www.isotf.org/news/DNS-Amplification-Attacks.pdf (-1, , X, X- R/X/L) web.archive.org/web/20101214074629/http://www.isotf.org/news/DNS-Amplification-Attacks.pdf (-1, -1, X, X- R/X/L) www.usenix.org/conference/woot15/workshop-program/presentation/p2p-file-sharing-hell-exploiting-bittorrent (-1, , X, X- R/X/L) dx.doi.org/10.1145/2663716.2663731 (-1, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA14-017A (-1, , X, X- R/X/L) www.icir.org/vern/papers/reflectors.CCR.01/reflectors.html (-1, , X, X- R/X/L) www.internetsociety.org/sites/default/files/01_5.pdf (-1, , X, X- R/X/L) www.internetsociety.org/sites/default/files/01_5.pdf (-1, , X, X- R/X/L) firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/ (-1, , X, X- R/X/L) firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/ (-1, , X, X- R/X/L) www.theregister.co.uk/2004/09/23/authorize_ddos_attack/ (-1, , X, X- R/X/L) www.sans.org/resources/idfaq/trinoo.php (-1, , X, X- R/X/L) staff.washington.edu/dittrich/misc/stacheldraht.analysis.txt (-1, , X, X- R/X/L) blog.cloudbric.com/2015/08/has-your-website-been-bitten-by-zombie.html (-1, , X, X- R/X/L) www.owasp.org/images/4/43/Layer_7_DDOS.pdf (-1, , X, X- R/X/L) aws.amazon.com/cloudwatch/ (-1, , X, X- R/X/L) aws.amazon.com/cloudwatch/ (-1, , X, X- R/X/L) eusecwest.com/speakers.html#PhlashDance (-1, , X, X- R/X/L) web.archive.org/web/20090201173324/http://eusecwest.com/speakers.html#PhlashDance (-1, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=154270&WT.svl=news1_1 (-1, , X, X- R/X/L) web.archive.org/web/20081208002732/http://www.darkreading.com/security/management/showArticle.jhtml?articleID=211201088 (-1, -1, X, X- R/X/L) www.theregister.co.uk/2008/05/21/phlashing/ (-1, , X, X- R/X/L) dcpp.wordpress.com/2007/05/22/denying-distributed-attacks/ (-1, , X, X- R/X/L) www.securityfocus.com/news/11466 (-1, , X, X- R/X/L) www.prolexic.com/news/20070514-alert.php (-1, , X, X- R/X/L) web.archive.org/web/20070803175513/http://www.prolexic.com/news/20070514-alert.php (-1, -1, X, X- R/X/L) www.microsoft.com/technet/security/advisory/975497.mspx (-1, , X, X- R/X/L) www.zdnet.com/blog/security/windows-7-vista-exposed-to-teardrop-attack/4222 (-1, , X, X- R/X/L) www.cert.org/historical/advisories/ca-1997-28.cfm (-1, , X, X- R/X/L) tools.ietf.org/html/rfc4987 (-1, , X, X- R/X/L) anml.iu.edu/ddos/types.html (-1, , X, X- R/X/L) web.archive.org/web/20100914222536/http://anml.iu.edu/ddos/types.html (-1, -1, X, X- R/X/L) d-scholarship.pitt.edu/19225/1/FinalVersion.pdf (-1, 313, X, X- R/X/L) web.archive.org/web/20131104052804/http://www.us-cert.gov/ncas/tips/st04-015 (-1, -1, X, X- R/X/L) www.us-cert.gov/ncas/tips/st04-015 (-1, , X, X- R/X/L) www.radicalphilosophy.com/article/the-philosophy-of-anonymous (-1, , X, X- R/X/L) dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/ (-1, , X, X- R/X/L) web.archive.org/web/20140513044100/http://dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/? (-1, -1, X, X- R/X/L) www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (-1, , X, X- R/X/L) web.archive.org/web/20140311070205/http://www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (-1, -1, X, X- R/X/L) www.owasp.org/index.php/OWASP_HTTP_Post_Tool (-1, , X, X- R/X/L) eusecwest.com (-1, , X, X- R/X/L)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  18. 2015-12-29 09:52:47 (UTC): w:pt:User:Rhuano (t - c; 242) to w:pt:.co (diff  !top) - Link: www.neustar.biz/services/domain-name-registry (R/Xmeta/L)
    Other links: domainincite.com/16166-neustar-pays-109-million-for-co-internet (242, 226, 1, 1- R/X/L) www.neustar.biz/services/domain-name-registry (242, 61, 2, 1- R/X/L) www.iana.org/reports/2009/co-report-24nov2009.html (242, -1, X, X- R/X/L)
  19. 2016-01-12 14:05:33 (UTC): w:ru:User:KMaxxx (t - c; 1) to w:ru:NeuStar (diff  !top) - Link: www.neustar.biz (R/Xmeta/L)
    Other links: www.neustar.biz (1, 61, 1, 1- R/X/L)
  20. 2016-01-19 19:37:40 (UTC): w:pt:User:Rhuano (t - c; 242) to w:pt:.cn (diff  !top) - Link: www.neustar.biz/services/domain-name-registry/find-a-registrar (R/Xmeta/L)
    Other links: www.neustar.biz/services/domain-name-registry/find-a-registrar (242, 61, 2, 1- R/X/L)
  21. 2016-02-25 20:14:48 (UTC): wikidata:www:User:156.154.81.55 (t - c; 2) to wikidata:www:Q7002903 (diff  !top) - Link: www.neustar.biz (R/Xmeta/L)
    Other links: www.neustar.biz (2, 61, 2, 1- R/X/L) www.neustar.biz (2, 61, 2, 1- R/X/L)
  22. 2016-02-27 16:04:59 (UTC): User Dcirovic t • c • dc • l • ef • b • bl; (587630) to Denial-of-service attack (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/services/ddos-protection (R/Xmeta/L)
    Other links: sourceforge.net/projects/high-orbit-ion-cannon/ (587630, , X, X- R/X/L) sourceforge.net/projects/loic0/ (587630, , X, X- R/X/L) atlas.arbor.net/summary/dos (587630, , X, X- R/X/L) www.cert.org/tech_tips/denial_of_service.html (587630, , X, X- R/X/L) www.w3.org/Security/Faq/wwwsf6.html (587630, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/DDoS%20Public%20Media%20Reports_0.xls (587630, , X, X- R/X/L) www.webcitation.org/5ws9nHATo (587630, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf (587630, , X, X- R/X/L) www.webcitation.org/5ws9RPpXi (587630, , X, X- R/X/L) www.youtube.com/watch?v=59AlNnX_Ksg&feature=feedu (587630, -1, X, X- R/X/L) www.huffingtonpost.com/2013/01/12/anonymous-ddos-petition-white-house_n_2463009.html (587630, , X, X- R/X/L) www.legislation.gov.uk/ukpga/1990/18/section/3 (587630, , X, X- R/X/L) www.europol.europa.eu/content/international-action-against-dd4bc-cybercriminal-group (587630, , X, X- R/X/L) www.gpo.gov/fdsys/pkg/USCODE-2010-title18/html/USCODE-2010-title18-partI-chap47-sec1030.htm (587630, , X, X- R/X/L) www.caida.org/publications/animations/ (587630, , X, X- R/X/L) wnmufm.org/post/people-overload-website-hoping-help-search-missing-jet (587630, , X, X- R/X/L) news.bbc.co.uk/2/hi/business/6108502.stm (587630, , X, X- R/X/L) productforums.google.com/forum/?hl=en#!category-topic/websearch/unexpected-search-results/uFcXXixhiBw (587630, , X, X- R/X/L) news.bbc.co.uk/1/hi/8120324.stm (587630, , X, X- R/X/L) www.verizon.com/about/news/verizon-digital-media-services-launches-cloud-based-web-application-firewall-increases-defenses (587630, , X, X- R/X/L) www.verizonenterprise.com/products/security/enforcement-protection (587630, , X, X- R/X/L) www.darkreading.com/attacks-breaches/verisign-rolls-out-ddos-monitoring-service/d/d-id/1131916 (587630, , X, X- R/X/L) www.tatacommunications.com/news/release-view.asp?d=20110907-DDOS-protection (587630, , X, X- R/X/L) www.staminus.net (587630, , X, X- R/X/L) www.telx.com/news/staminus-establishes-presence-in-telxs-60-hudson-street-data-center-in-new/ (587630, , X, X- R/X/L) www.sprint.com/business/solutions/sprint_enablers/managed_security/index.html (587630, , X, X- R/X/L) www.theregister.co.uk/Print/2013/06/03/dns_reflection_ddos_amplification_hacker_method/ (587630, , X, X- R/X/L) www.neustar.biz/services/ddos-protection (587630, 61, X, X- R/X/L) www.incapsula.com/infrastructure-ddos-protection-services.html (587630, , X, X- R/X/L) f5.com/products/platforms/silverline/f5-silverline-ddos-protection/under-attack (587630, , X, X- R/X/L) www.business.att.com/content/productbrochures/ddos_prodbrief.pdf (587630, , X, X- R/X/L) www.arbornetworks.com/arbor-partner/alliances/technology-alliances/clean-pipes-2-0 (587630, , X, X- R/X/L) www.radware.com/Products/DefensePipe/ (587630, , X, X- R/X/L) research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (587630, , X, X- R/X/L) web.archive.org/web/20080921012859/http://research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (587630, -1, X, X- R/X/L) www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_7-4/dos_attacks.html (587630, , X, X- R/X/L) www.ecommercewisdom.com/relationship-firewalls-protection-ddos/ (587630, , X, X- R/X/L) www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0004963006220628 (587630, , X, X- R/X/L) mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (587630, , X, X- R/X/L) web.archive.org/web/20080910202908/http://mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (587630, -1, X, X- R/X/L) www.computerworld.com/s/article/94014/How_to_defend_against_DDoS_attacks (587630, , X, X- R/X/L) staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-DoSSurveyComputerJournal.pdf (587630, , X, X- R/X/L) www.scmagazineuk.com/akamai-warns-of-increased-activity-from-ddos-extortion-group/article/438333/ (587630, , X, X- R/X/L) www.bloomberg.com/news/articles/2015-09-09/bitcoin-ddos-ransom-demands-raise-dd4bc-profile?mod=djemRiskCompliance (587630, , X, X- R/X/L) blog.cloudbric.com/2015/09/whos-behind-ddos-attacks-and-how-can.html (587630, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/ (587630, , X, X- R/X/L) ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6158635 (587630, , X, X- R/X/L) www.ic3.gov/media/2013/130107.aspx (587630, , X, X- R/X/L) www.fbi.gov/newark/press-releases/2010/nk051110.htm (587630, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA13-088A (587630, , X, X- R/X/L) www.isotf.org/news/DNS-Amplification-Attacks.pdf (587630, , X, X- R/X/L) web.archive.org/web/20101214074629/http://www.isotf.org/news/DNS-Amplification-Attacks.pdf (587630, -1, X, X- R/X/L) www.usenix.org/conference/woot15/workshop-program/presentation/p2p-file-sharing-hell-exploiting-bittorrent (587630, , X, X- R/X/L) dx.doi.org/10.1145/2663716.2663731 (587630, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA14-017A (587630, , X, X- R/X/L) www.icir.org/vern/papers/reflectors.CCR.01/reflectors.html (587630, , X, X- R/X/L) www.internetsociety.org/sites/default/files/01_5.pdf (587630, , X, X- R/X/L) theintercept.com/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/ (587630, , X, X- R/X/L) www.theregister.co.uk/2004/09/23/authorize_ddos_attack/ (587630, , X, X- R/X/L) www.sans.org/resources/idfaq/trinoo.php (587630, , X, X- R/X/L) staff.washington.edu/dittrich/misc/stacheldraht.analysis.txt (587630, , X, X- R/X/L) blog.cloudbric.com/2015/08/has-your-website-been-bitten-by-zombie.html (587630, , X, X- R/X/L) www.owasp.org/images/4/43/Layer_7_DDOS.pdf (587630, , X, X- R/X/L) aws.amazon.com/cloudwatch/ (587630, , X, X- R/X/L) eusecwest.com/speakers.html#PhlashDance (587630, , X, X- R/X/L) web.archive.org/web/20090201173324/http://eusecwest.com/speakers.html#PhlashDance (587630, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=154270&WT.svl=news1_1 (587630, , X, X- R/X/L) web.archive.org/web/20081208002732/http://www.darkreading.com/security/management/showArticle.jhtml?articleID=211201088 (587630, -1, X, X- R/X/L) www.theregister.co.uk/2008/05/21/phlashing/ (587630, , X, X- R/X/L) dcpp.wordpress.com/2007/05/22/denying-distributed-attacks/ (587630, , X, X- R/X/L) www.securityfocus.com/news/11466 (587630, , X, X- R/X/L) www.prolexic.com/news/20070514-alert.php (587630, , X, X- R/X/L) web.archive.org/web/20070803175513/http://www.prolexic.com/news/20070514-alert.php (587630, -1, X, X- R/X/L) www.microsoft.com/technet/security/advisory/975497.mspx (587630, , X, X- R/X/L) www.zdnet.com/blog/security/windows-7-vista-exposed-to-teardrop-attack/4222 (587630, , X, X- R/X/L) www.cert.org/historical/advisories/ca-1997-28.cfm (587630, , X, X- R/X/L) tools.ietf.org/html/rfc4987 (587630, , X, X- R/X/L) anml.iu.edu/ddos/types.html (587630, , X, X- R/X/L) web.archive.org/web/20100914222536/http://anml.iu.edu/ddos/types.html (587630, -1, X, X- R/X/L) d-scholarship.pitt.edu/19225/1/FinalVersion.pdf (587630, 313, X, X- R/X/L) web.archive.org/web/20131104052804/http://www.us-cert.gov/ncas/tips/st04-015 (587630, -1, X, X- R/X/L) www.us-cert.gov/ncas/tips/st04-015 (587630, , X, X- R/X/L) www.radicalphilosophy.com/article/the-philosophy-of-anonymous (587630, , X, X- R/X/L) dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/ (587630, , X, X- R/X/L) web.archive.org/web/20140513044100/http://dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/? (587630, -1, X, X- R/X/L) www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (587630, , X, X- R/X/L) web.archive.org/web/20140311070205/http://www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (587630, -1, X, X- R/X/L) www.owasp.org/index.php/OWASP_HTTP_Post_Tool (587630, , X, X- R/X/L) eusecwest.com (587630, , X, X- R/X/L)

    User is in trusted groups sysop, rollbacker, reviewer on some wikis
  23. 2016-02-29 02:33:38 (UTC): w:es:User:Barri (t - c; 3375) to w:es:Sistema de nombres de dominio (diff  !top) - Link: www.neustar.biz/blog/history-evolution-dns (R/Xmeta/L)
    Other links: www.neustar.biz/blog/history-evolution-dns (3375, 61, 1, 1- R/X/L)
  24. 2016-03-06 01:59:10 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Denial-of-service attack (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/services/ddos-protection (R/Xmeta/L)
    Other links: sourceforge.net/projects/loicslow/ (-1, , X, X- R/X/L) sourceforge.net/projects/high-orbit-ion-cannon/ (-1, , X, X- R/X/L) sourceforge.net/projects/loic0/ (-1, , X, X- R/X/L) atlas.arbor.net/summary/dos (-1, , X, X- R/X/L) www.cert.org/tech_tips/denial_of_service.html (-1, , X, X- R/X/L) www.w3.org/Security/Faq/wwwsf6.html (-1, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/DDoS%20Public%20Media%20Reports_0.xls (-1, , X, X- R/X/L) www.webcitation.org/5ws9nHATo (-1, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf (-1, , X, X- R/X/L) www.webcitation.org/5ws9RPpXi (-1, , X, X- R/X/L) www.youtube.com/watch?v=59AlNnX_Ksg&feature=feedu (-1, -1, X, X- R/X/L) www.huffingtonpost.com/2013/01/12/anonymous-ddos-petition-white-house_n_2463009.html (-1, , X, X- R/X/L) www.legislation.gov.uk/ukpga/1990/18/section/3 (-1, , X, X- R/X/L) www.europol.europa.eu/content/international-action-against-dd4bc-cybercriminal-group (-1, , X, X- R/X/L) www.gpo.gov/fdsys/pkg/USCODE-2010-title18/html/USCODE-2010-title18-partI-chap47-sec1030.htm (-1, , X, X- R/X/L) www.caida.org/publications/animations/ (-1, , X, X- R/X/L) wnmufm.org/post/people-overload-website-hoping-help-search-missing-jet (-1, , X, X- R/X/L) news.bbc.co.uk/2/hi/business/6108502.stm (-1, , X, X- R/X/L) productforums.google.com/forum/?hl=en#!category-topic/websearch/unexpected-search-results/uFcXXixhiBw (-1, , X, X- R/X/L) news.bbc.co.uk/1/hi/8120324.stm (-1, , X, X- R/X/L) www.verizon.com/about/news/verizon-digital-media-services-launches-cloud-based-web-application-firewall-increases-defenses (-1, , X, X- R/X/L) www.verizonenterprise.com/products/security/enforcement-protection (-1, , X, X- R/X/L) www.darkreading.com/attacks-breaches/verisign-rolls-out-ddos-monitoring-service/d/d-id/1131916 (-1, , X, X- R/X/L) www.tatacommunications.com/news/release-view.asp?d=20110907-DDOS-protection (-1, , X, X- R/X/L) www.staminus.net (-1, , X, X- R/X/L) www.telx.com/news/staminus-establishes-presence-in-telxs-60-hudson-street-data-center-in-new/ (-1, , X, X- R/X/L) www.sprint.com/business/solutions/sprint_enablers/managed_security/index.html (-1, , X, X- R/X/L) www.theregister.co.uk/Print/2013/06/03/dns_reflection_ddos_amplification_hacker_method/ (-1, , X, X- R/X/L) www.neustar.biz/services/ddos-protection (-1, 61, X, X- R/X/L) www.incapsula.com/infrastructure-ddos-protection-services.html (-1, , X, X- R/X/L) f5.com/products/platforms/silverline/f5-silverline-ddos-protection/under-attack (-1, , X, X- R/X/L) www.business.att.com/content/productbrochures/ddos_prodbrief.pdf (-1, , X, X- R/X/L) www.arbornetworks.com/arbor-partner/alliances/technology-alliances/clean-pipes-2-0 (-1, , X, X- R/X/L) www.radware.com/Products/DefensePipe/ (-1, , X, X- R/X/L) research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080921012859/http://research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (-1, -1, X, X- R/X/L) www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_7-4/dos_attacks.html (-1, , X, X- R/X/L) www.ecommercewisdom.com/relationship-firewalls-protection-ddos/ (-1, , X, X- R/X/L) www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0004963006220628 (-1, , X, X- R/X/L) mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080910202908/http://mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (-1, -1, X, X- R/X/L) www.computerworld.com/s/article/94014/How_to_defend_against_DDoS_attacks (-1, , X, X- R/X/L) staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-DoSSurveyComputerJournal.pdf (-1, , X, X- R/X/L) www.scmagazineuk.com/akamai-warns-of-increased-activity-from-ddos-extortion-group/article/438333/ (-1, , X, X- R/X/L) www.bloomberg.com/news/articles/2015-09-09/bitcoin-ddos-ransom-demands-raise-dd4bc-profile?mod=djemRiskCompliance (-1, , X, X- R/X/L) blog.cloudbric.com/2015/09/whos-behind-ddos-attacks-and-how-can.html (-1, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/ (-1, , X, X- R/X/L) ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6158635 (-1, , X, X- R/X/L) www.ic3.gov/media/2013/130107.aspx (-1, , X, X- R/X/L) www.fbi.gov/newark/press-releases/2010/nk051110.htm (-1, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA13-088A (-1, , X, X- R/X/L) www.isotf.org/news/DNS-Amplification-Attacks.pdf (-1, , X, X- R/X/L) web.archive.org/web/20101214074629/http://www.isotf.org/news/DNS-Amplification-Attacks.pdf (-1, -1, X, X- R/X/L) www.usenix.org/conference/woot15/workshop-program/presentation/p2p-file-sharing-hell-exploiting-bittorrent (-1, , X, X- R/X/L) dx.doi.org/10.1145/2663716.2663731 (-1, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA14-017A (-1, , X, X- R/X/L) www.icir.org/vern/papers/reflectors.CCR.01/reflectors.html (-1, , X, X- R/X/L) www.internetsociety.org/sites/default/files/01_5.pdf (-1, , X, X- R/X/L) theintercept.com/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/ (-1, , X, X- R/X/L) www.theregister.co.uk/2004/09/23/authorize_ddos_attack/ (-1, , X, X- R/X/L) www.sans.org/resources/idfaq/trinoo.php (-1, , X, X- R/X/L) staff.washington.edu/dittrich/misc/stacheldraht.analysis.txt (-1, , X, X- R/X/L) blog.cloudbric.com/2015/08/has-your-website-been-bitten-by-zombie.html (-1, , X, X- R/X/L) www.owasp.org/images/4/43/Layer_7_DDOS.pdf (-1, , X, X- R/X/L) aws.amazon.com/cloudwatch/ (-1, , X, X- R/X/L) eusecwest.com/speakers.html#PhlashDance (-1, , X, X- R/X/L) web.archive.org/web/20090201173324/http://eusecwest.com/speakers.html#PhlashDance (-1, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=154270&WT.svl=news1_1 (-1, , X, X- R/X/L) web.archive.org/web/20081208002732/http://www.darkreading.com/security/management/showArticle.jhtml?articleID=211201088 (-1, -1, X, X- R/X/L) www.theregister.co.uk/2008/05/21/phlashing/ (-1, , X, X- R/X/L) dcpp.wordpress.com/2007/05/22/denying-distributed-attacks/ (-1, , X, X- R/X/L) www.securityfocus.com/news/11466 (-1, , X, X- R/X/L) www.prolexic.com/news/20070514-alert.php (-1, , X, X- R/X/L) web.archive.org/web/20070803175513/http://www.prolexic.com/news/20070514-alert.php (-1, -1, X, X- R/X/L) www.microsoft.com/technet/security/advisory/975497.mspx (-1, , X, X- R/X/L) www.zdnet.com/blog/security/windows-7-vista-exposed-to-teardrop-attack/4222 (-1, , X, X- R/X/L) www.cert.org/historical/advisories/ca-1997-28.cfm (-1, , X, X- R/X/L) tools.ietf.org/html/rfc4987 (-1, , X, X- R/X/L) anml.iu.edu/ddos/types.html (-1, , X, X- R/X/L) web.archive.org/web/20100914222536/http://anml.iu.edu/ddos/types.html (-1, -1, X, X- R/X/L) d-scholarship.pitt.edu/19225/1/FinalVersion.pdf (-1, 313, X, X- R/X/L) web.archive.org/web/20131104052804/http://www.us-cert.gov/ncas/tips/st04-015 (-1, -1, X, X- R/X/L) www.us-cert.gov/ncas/tips/st04-015 (-1, , X, X- R/X/L) www.radicalphilosophy.com/article/the-philosophy-of-anonymous (-1, , X, X- R/X/L) dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/ (-1, , X, X- R/X/L) web.archive.org/web/20140513044100/http://dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/? (-1, -1, X, X- R/X/L) www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (-1, , X, X- R/X/L) web.archive.org/web/20140311070205/http://www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (-1, -1, X, X- R/X/L) www.owasp.org/index.php/OWASP_HTTP_Post_Tool (-1, , X, X- R/X/L) eusecwest.com (-1, , X, X- R/X/L)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  25. 2016-05-07 10:49:28 (UTC): wikidata:www:User:Balajijagadesh (t - c; 224658) to wikidata:www:Q4052342 (diff  !top) - Link: www.neustar.biz (R/Xmeta/L)
    Other links: www.neustar.biz (224658, 61, X, X- R/X/L) www.neustar.biz (224658, 61, X, X- R/X/L)

    User is in trusted groups sysop, rollbacker on some wikis
  26. 2016-06-15 02:38:53 (UTC): User Wasmum t • c • dc • l • ef • b • bl; (202) to User:Wasmum/sandbox (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/services/M90-protection (R/Xmeta/L)
    Other links: www.scmagazineuk.com/video-games-company-hit-by-38-day-M90-attack/article/367329/ (202, , X, X- R/X/L) d-scholarship.pitt.edu/19225/1/FinalVersion.pdf (202, 313, X, X- R/X/L) web.archive.org/web/20131104052804/http://www.us-cert.gov/ncas/tips/st04-015 (202, -1, X, X- R/X/L) www.us-cert.gov/ncas/tips/st04-015 (202, , X, X- R/X/L) www.scmagazineuk.com/M90-attacks-on-the-rise--touching-500gbps/article/467665/ (202, , X, X- R/X/L) www.radicalphilosophy.com/article/the-philosophy-of-anonymous (202, , X, X- R/X/L) dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/ (202, , X, X- R/X/L) web.archive.org/web/20140513044100/http://dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/? (202, -1, X, X- R/X/L) www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (202, , X, X- R/X/L) web.archive.org/web/20140311070205/http://www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (202, -1, X, X- R/X/L) blog.cloudflare.com/empty-M90-threats-meet-the-armada-collective/ (202, , X, X- R/X/L) www.us-cert.gov/ncas/tips/ST04-015 (202, , X, X- R/X/L) sourceforge.net/projects/r-u-dead-yet/ (202, , X, X- R/X/L) eusecwest.com (202, , X, X- R/X/L) www.owasp.org/index.php/OWASP_HTTP_Post_Tool (202, , X, X- R/X/L) sourceforge.net/projects/loicslow/ (202, , X, X- R/X/L) sourceforge.net/projects/high-orbit-ion-cannon/ (202, , X, X- R/X/L) sourceforge.net/projects/loic0/ (202, , X, X- R/X/L) atlas.arbor.net/summary/M90 (202, , X, X- R/X/L) www.cert.org/tech_tips/denial_of_service.html (202, , X, X- R/X/L) www.w3.org/Security/Faq/wwwsf6.html (202, , X, X- R/X/L) www.akamai.com/soti (202, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/M90%20Public%20Media%20Reports_0.xls (202, , X, X- R/X/L) www.webcitation.org/5ws9nHATo (202, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_M90_Attacks_Human_Rights_and_Media.pdf (202, , X, X- R/X/L) www.webcitation.org/5ws9RPpXi (202, , X, X- R/X/L) www.youtube.com/watch?v=59AlNnX_Ksg&feature=feedu (202, -1, X, X- R/X/L) www.huffingtonpost.com/2013/01/12/anonymous-M90-petition-white-house_n_2463009.html (202, , X, X- R/X/L) www.legislation.gov.uk/ukpga/1990/18/section/3 (202, , X, X- R/X/L) www.europol.europa.eu/content/international-action-against-dd4bc-cybercriminal-group (202, , X, X- R/X/L) www.gpo.gov/fdsys/pkg/USCODE-2010-title18/html/USCODE-2010-title18-partI-chap47-sec1030.htm (202, , X, X- R/X/L) www.caida.org/publications/animations/ (202, , X, X- R/X/L) wnmufm.org/post/people-overload-website-hoping-help-search-missing-jet (202, , X, X- R/X/L) news.bbc.co.uk/2/hi/business/6108502.stm (202, , X, X- R/X/L) productforums.google.com/forum/?hl=en#!category-topic/websearch/unexpected-search-results/uFcXXixhiBw (202, , X, X- R/X/L) news.bbc.co.uk/1/hi/8120324.stm (202, , X, X- R/X/L) www.verizon.com/about/news/verizon-digital-media-services-launches-cloud-based-web-application-firewall-increases-defenses (202, , X, X- R/X/L) www.verizonenterprise.com/products/security/enforcement-protection (202, , X, X- R/X/L) www.darkreading.com/attacks-breaches/verisign-rolls-out-M90-monitoring-service/d/d-id/1131916 (202, , X, X- R/X/L) www.tatacommunications.com/news/release-view.asp?d=20110907-M90-protection (202, , X, X- R/X/L) www.staminus.net (202, , X, X- R/X/L) www.telx.com/news/staminus-establishes-presence-in-telxs-60-hudson-street-data-center-in-new/ (202, , X, X- R/X/L) www.sprint.com/business/solutions/sprint_enablers/managed_security/index.html (202, , X, X- R/X/L) www.theregister.co.uk/Print/2013/06/03/dns_reflection_M90_amplification_hacker_method/ (202, , X, X- R/X/L) www.neustar.biz/services/M90-protection (202, 61, X, X- R/X/L) www.incapsula.com/infrastructure-M90-protection-services.html (202, , X, X- R/X/L) f5.com/products/platforms/silverline/f5-silverline-M90-protection/under-attack (202, , X, X- R/X/L) www.business.att.com/content/productbrochures/M90_prodbrief.pdf (202, , X, X- R/X/L) www.arbornetworks.com/arbor-partner/alliances/technology-alliances/clean-pipes-2-0 (202, , X, X- R/X/L) www.radware.com/Products/DefensePipe/ (202, , X, X- R/X/L) www.level3.com/en/products/M90-mitigation/ (202, , X, X- R/X/L) arstechnica.com/security/2014/02/biggest-M90-ever-aimed-at-cloudflares-content-delivery-network/ (202, -1, X, X- R/X/L) research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (202, , X, X- R/X/L) web.archive.org/web/20080921012859/http://research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (202, -1, X, X- R/X/L) mehmet.suzen.googlepages.com/qos_ios_M90_suzen2005.pdf (202, , X, X- R/X/L) web.archive.org/web/20080910202908/http://mehmet.suzen.googlepages.com/qos_ios_M90_suzen2005.pdf (202, -1, X, X- R/X/L) www.computerworld.com/s/article/94014/How_to_defend_against_M90_attacks (202, , X, X- R/X/L) www.ecommercewisdom.com/relationship-firewalls-protection-M90/ (202, , X, X- R/X/L) www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_7-4/M90_attacks.html (202, , X, X- R/X/L) www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0004963006220628 (202, , X, X- R/X/L) staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-M90SurveyComputerJournal.pdf (202, , X, X- R/X/L) www.ic3.gov/media/2013/130107.aspx (202, , X, X- R/X/L) www.fbi.gov/newark/press-releases/2010/nk051110.htm (202, , X, X- R/X/L) www.microsoft.com/technet/security/advisory/975497.mspx (202, , X, X- R/X/L) www.zdnet.com/blog/security/windows-7-vista-exposed-to-teardrop-attack/4222 (202, , X, X- R/X/L) www.cert.org/historical/advisories/ca-1997-28.cfm (202, , X, X- R/X/L) tools.ietf.org/html/rfc4987 (202, , X, X- R/X/L) sourceforge.net/projects/slow-http-test/ (202, , X, X- R/X/L) ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6158635 (202, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA13-088A (202, , X, X- R/X/L) www.isotf.org/news/DNS-Amplification-Attacks.pdf (202, , X, X- R/X/L) web.archive.org/web/20101214074629/http://www.isotf.org/news/DNS-Amplification-Attacks.pdf (202, -1, X, X- R/X/L) www.usenix.org/conference/woot15/workshop-program/presentation/p2p-file-sharing-hell-exploiting-bittorrent (202, , X, X- R/X/L) dx.doi.org/10.1145/2663716.2663731 (202, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA14-017A (202, , X, X- R/X/L) www.icir.org/vern/papers/reflectors.CCR.01/reflectors.html (202, , X, X- R/X/L) www.internetsociety.org/sites/default/files/01_5.pdf (202, , X, X- R/X/L) eusecwest.com/speakers.html#PhlashDance (202, , X, X- R/X/L) web.archive.org/web/20090201173324/http://eusecwest.com/speakers.html#PhlashDance (202, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=154270&WT.svl=news1_1 (202, , X, X- R/X/L) web.archive.org/web/20081208002732/http://www.darkreading.com/security/management/showArticle.jhtml?articleID=211201088 (202, -1, X, X- R/X/L) www.theregister.co.uk/2008/05/21/phlashing/ (202, , X, X- R/X/L) dcpp.wordpress.com/2007/05/22/denying-distributed-attacks/ (202, , X, X- R/X/L) www.securityfocus.com/news/11466 (202, , X, X- R/X/L) www.prolexic.com/news/20070514-alert.php (202, , X, X- R/X/L) web.archive.org/web/20070803175513/http://www.prolexic.com/news/20070514-alert.php (202, -1, X, X- R/X/L) anml.iu.edu/M90/types.html (202, , X, X- R/X/L) web.archive.org/web/20100914222536/http://anml.iu.edu/M90/types.html (202, -1, X, X- R/X/L) www.owasp.org/images/4/43/Layer_7_M90.pdf (202, , X, X- R/X/L) www.scmagazineuk.com/akamai-warns-of-increased-activity-from-M90-extortion-group/article/438333/ (202, , X, X- R/X/L) www.bloomberg.com/news/articles/2015-09-09/bitcoin-M90-ransom-demands-raise-dd4bc-profile?mod=djemRiskCompliance (202, , X, X- R/X/L) blog.cloudbric.com/2015/09/whos-behind-M90-attacks-and-how-can.html (202, , X, X- R/X/L) www.incapsula.com/blog/cctv-M90-botnet-back-yard.html (202, , X, X- R/X/L) www.incapsula.com/blog/cctv-M90-botnet-back-yard.html (202, , X, X- R/X/L) thehackernews.com/2015/10/cctv-camera-hacking.html (202, , X, X- R/X/L) www.theregister.co.uk/2004/09/23/authorize_M90_attack/ (202, , X, X- R/X/L) www.sans.org/resources/idfaq/trinoo.php (202, , X, X- R/X/L) blog.cloudbric.com/2015/08/has-your-website-been-bitten-by-zombie.html (202, , X, X- R/X/L) aws.amazon.com/cloudwatch/ (202, , X, X- R/X/L) theintercept.com/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/ (202, , X, X- R/X/L) staff.washington.edu/dittrich/misc/stacheldraht.analysis.txt (202, , X, X- R/X/L)
  27. 1970-01-01 00:00:00 (UTC): User Wasmum t • c • dc • l • ef • b • bl; (202) to Mitchell M90 (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/services/M90-protection (R/Xmeta/L)
    Other links: sourceforge.net/projects/r-u-dead-yet/ (202, , X, X- R/X/L) eusecwest.com (202, , X, X- R/X/L) www.owasp.org/index.php/OWASP_HTTP_Post_Tool (202, , X, X- R/X/L) thehackernews.com/2015/10/cctv-camera-hacking.html (202, , X, X- R/X/L) www.theregister.co.uk/2004/09/23/authorize_M90_attack/ (202, , X, X- R/X/L) www.sans.org/resources/idfaq/trinoo.php (202, , X, X- R/X/L) blog.cloudbric.com/2015/08/has-your-website-been-bitten-by-zombie.html (202, , X, X- R/X/L) aws.amazon.com/cloudwatch/ (202, , X, X- R/X/L) theintercept.com/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/ (202, , X, X- R/X/L) staff.washington.edu/dittrich/misc/stacheldraht.analysis.txt (202, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-M90-attack/article/367329/ (202, , X, X- R/X/L) d-scholarship.pitt.edu/19225/1/FinalVersion.pdf (202, 313, X, X- R/X/L) web.archive.org/web/20131104052804/http://www.us-cert.gov/ncas/tips/st04-015 (202, -1, X, X- R/X/L) www.us-cert.gov/ncas/tips/st04-015 (202, , X, X- R/X/L) www.scmagazineuk.com/M90-attacks-on-the-rise--touching-500gbps/article/467665/ (202, , X, X- R/X/L) www.radicalphilosophy.com/article/the-philosophy-of-anonymous (202, , X, X- R/X/L) dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/ (202, , X, X- R/X/L) web.archive.org/web/20140513044100/http://dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/? (202, -1, X, X- R/X/L) www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (202, , X, X- R/X/L) web.archive.org/web/20140311070205/http://www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (202, -1, X, X- R/X/L) blog.cloudflare.com/empty-M90-threats-meet-the-armada-collective/ (202, , X, X- R/X/L) www.us-cert.gov/ncas/tips/ST04-015 (202, , X, X- R/X/L) www.cert.org/historical/advisories/ca-1997-28.cfm (202, , X, X- R/X/L) tools.ietf.org/html/rfc4987 (202, , X, X- R/X/L) sourceforge.net/projects/slow-http-test/ (202, , X, X- R/X/L) ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6158635 (202, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA13-088A (202, , X, X- R/X/L) www.isotf.org/news/DNS-Amplification-Attacks.pdf (202, , X, X- R/X/L) web.archive.org/web/20101214074629/http://www.isotf.org/news/DNS-Amplification-Attacks.pdf (202, -1, X, X- R/X/L) www.usenix.org/conference/woot15/workshop-program/presentation/p2p-file-sharing-hell-exploiting-bittorrent (202, , X, X- R/X/L) dx.doi.org/10.1145/2663716.2663731 (202, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA14-017A (202, , X, X- R/X/L) www.icir.org/vern/papers/reflectors.CCR.01/reflectors.html (202, , X, X- R/X/L) www.internetsociety.org/sites/default/files/01_5.pdf (202, , X, X- R/X/L) eusecwest.com/speakers.html#PhlashDance (202, , X, X- R/X/L) web.archive.org/web/20090201173324/http://eusecwest.com/speakers.html#PhlashDance (202, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=154270&WT.svl=news1_1 (202, , X, X- R/X/L) web.archive.org/web/20081208002732/http://www.darkreading.com/security/management/showArticle.jhtml?articleID=211201088 (202, -1, X, X- R/X/L) www.theregister.co.uk/2008/05/21/phlashing/ (202, , X, X- R/X/L) dcpp.wordpress.com/2007/05/22/denying-distributed-attacks/ (202, , X, X- R/X/L) www.securityfocus.com/news/11466 (202, , X, X- R/X/L) www.prolexic.com/news/20070514-alert.php (202, , X, X- R/X/L) web.archive.org/web/20070803175513/http://www.prolexic.com/news/20070514-alert.php (202, -1, X, X- R/X/L) anml.iu.edu/M90/types.html (202, , X, X- R/X/L) web.archive.org/web/20100914222536/http://anml.iu.edu/M90/types.html (202, -1, X, X- R/X/L) www.owasp.org/images/4/43/Layer_7_M90.pdf (202, , X, X- R/X/L) www.scmagazineuk.com/akamai-warns-of-increased-activity-from-M90-extortion-group/article/438333/ (202, , X, X- R/X/L) www.bloomberg.com/news/articles/2015-09-09/bitcoin-M90-ransom-demands-raise-dd4bc-profile?mod=djemRiskCompliance (202, , X, X- R/X/L) blog.cloudbric.com/2015/09/whos-behind-M90-attacks-and-how-can.html (202, , X, X- R/X/L) www.incapsula.com/blog/cctv-M90-botnet-back-yard.html (202, , X, X- R/X/L) www.incapsula.com/blog/cctv-M90-botnet-back-yard.html (202, , X, X- R/X/L) www.ic3.gov/media/2013/130107.aspx (202, , X, X- R/X/L) www.fbi.gov/newark/press-releases/2010/nk051110.htm (202, , X, X- R/X/L) www.microsoft.com/technet/security/advisory/975497.mspx (202, , X, X- R/X/L) www.zdnet.com/blog/security/windows-7-vista-exposed-to-teardrop-attack/4222 (202, , X, X- R/X/L) www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0004963006220628 (202, , X, X- R/X/L) staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-M90SurveyComputerJournal.pdf (202, , X, X- R/X/L) www.incapsula.com/infrastructure-M90-protection-services.html (202, , X, X- R/X/L) f5.com/products/platforms/silverline/f5-silverline-M90-protection/under-attack (202, , X, X- R/X/L) www.business.att.com/content/productbrochures/M90_prodbrief.pdf (202, , X, X- R/X/L) www.arbornetworks.com/arbor-partner/alliances/technology-alliances/clean-pipes-2-0 (202, , X, X- R/X/L) www.radware.com/Products/DefensePipe/ (202, , X, X- R/X/L) www.level3.com/en/products/M90-mitigation/ (202, , X, X- R/X/L) arstechnica.com/security/2014/02/biggest-M90-ever-aimed-at-cloudflares-content-delivery-network/ (202, -1, X, X- R/X/L) research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (202, , X, X- R/X/L) web.archive.org/web/20080921012859/http://research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (202, -1, X, X- R/X/L) mehmet.suzen.googlepages.com/qos_ios_M90_suzen2005.pdf (202, , X, X- R/X/L) web.archive.org/web/20080910202908/http://mehmet.suzen.googlepages.com/qos_ios_M90_suzen2005.pdf (202, -1, X, X- R/X/L) www.computerworld.com/s/article/94014/How_to_defend_against_M90_attacks (202, , X, X- R/X/L) www.ecommercewisdom.com/relationship-firewalls-protection-M90/ (202, , X, X- R/X/L) www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_7-4/M90_attacks.html (202, , X, X- R/X/L) www.huffingtonpost.com/2013/01/12/anonymous-M90-petition-white-house_n_2463009.html (202, , X, X- R/X/L) www.legislation.gov.uk/ukpga/1990/18/section/3 (202, , X, X- R/X/L) www.europol.europa.eu/content/international-action-against-dd4bc-cybercriminal-group (202, , X, X- R/X/L) www.gpo.gov/fdsys/pkg/USCODE-2010-title18/html/USCODE-2010-title18-partI-chap47-sec1030.htm (202, , X, X- R/X/L) www.caida.org/publications/animations/ (202, , X, X- R/X/L) wnmufm.org/post/people-overload-website-hoping-help-search-missing-jet (202, , X, X- R/X/L) news.bbc.co.uk/2/hi/business/6108502.stm (202, , X, X- R/X/L) productforums.google.com/forum/?hl=en#!category-topic/websearch/unexpected-search-results/uFcXXixhiBw (202, , X, X- R/X/L) news.bbc.co.uk/1/hi/8120324.stm (202, , X, X- R/X/L) www.verizon.com/about/news/verizon-digital-media-services-launches-cloud-based-web-application-firewall-increases-defenses (202, , X, X- R/X/L) www.verizonenterprise.com/products/security/enforcement-protection (202, , X, X- R/X/L) www.darkreading.com/attacks-breaches/verisign-rolls-out-M90-monitoring-service/d/d-id/1131916 (202, , X, X- R/X/L) www.tatacommunications.com/news/release-view.asp?d=20110907-M90-protection (202, , X, X- R/X/L) www.staminus.net (202, , X, X- R/X/L) www.telx.com/news/staminus-establishes-presence-in-telxs-60-hudson-street-data-center-in-new/ (202, , X, X- R/X/L) www.sprint.com/business/solutions/sprint_enablers/managed_security/index.html (202, , X, X- R/X/L) www.theregister.co.uk/Print/2013/06/03/dns_reflection_M90_amplification_hacker_method/ (202, , X, X- R/X/L) www.neustar.biz/services/M90-protection (202, 61, X, X- R/X/L) sourceforge.net/projects/loicslow/ (202, , X, X- R/X/L) sourceforge.net/projects/high-orbit-ion-cannon/ (202, , X, X- R/X/L) sourceforge.net/projects/loic0/ (202, , X, X- R/X/L) atlas.arbor.net/summary/M90 (202, , X, X- R/X/L) www.cert.org/tech_tips/denial_of_service.html (202, , X, X- R/X/L) www.w3.org/Security/Faq/wwwsf6.html (202, , X, X- R/X/L) www.akamai.com/soti (202, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/M90%20Public%20Media%20Reports_0.xls (202, , X, X- R/X/L) www.webcitation.org/5ws9nHATo (202, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_M90_Attacks_Human_Rights_and_Media.pdf (202, , X, X- R/X/L) www.webcitation.org/5ws9RPpXi (202, , X, X- R/X/L) www.youtube.com/watch?v=59AlNnX_Ksg&feature=feedu (202, -1, X, X- R/X/L)
  28. 2016-06-21 14:36:19 (UTC): User Pinecar t • c • dc • l • ef • b • bl; (37) to Neustar (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/about-us/news-room/press-releases/2016/neustar-to-become-two-independent-publicly-traded-companies (R/Xmeta/L)
    Other links: www.neustar.biz/about-us/news-room/press-releases/2016/neustar-to-become-two-independent-publicly-traded-companies (37, 61, 3, 1- R/X/L)
  29. 2016-08-15 19:30:09 (UTC): w:ru:User:Dedalus715 (t - c; 24) to w:ru:ENUM (diff  !top) - Link: www.neustar.biz (R/Xmeta/L)
    Other links: www.neustar.biz (24, 61, 3, 2- R/X/L) www.neustar.biz (24, 61, 3, 2- R/X/L)
  30. 2016-08-15 20:00:25 (UTC): w:fr:User:Dedalus715 (t - c; 24) to w:fr:Domaine de premier niveau (diff  !top) - Link: www.neustar.biz (R/Xmeta/L)
    Other links: www.neustar.biz (24, 61, 3, 2- R/X/L)
  31. 2016-08-17 13:59:44 (UTC): w:it:User:Allexj (t - c; 33) to w:it:Denial of service (diff  !top) - Link: www.neustar.biz/blog/http-post-flood-ddos-attack-definition-mitigation (R/Xmeta/L)
    Other links: www.neustar.biz/blog/http-post-flood-ddos-attack-definition-mitigation (33, 61, 1, 1- R/X/L) www.verisign.com/en_US/security-services/ddos-protection/ddos-attack/index.xhtml (33, 192, 1, 1- R/X/L) web.archive.org/web/20081208002732/http://www.darkreading.com/security/management/showArticle.jhtml?articleID=211201088 (33, -1, X, X- R/X/L) d-scholarship.pitt.edu/19225/1/FinalVersion.pdf (33, 313, 2, 0- R/X/L) d-scholarship.pitt.edu/19225/1/FinalVersion.pdf (33, 313, 2, 0- R/X/L)
  32. 2016-10-22 22:32:35 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Denial-of-service attack (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/services/ddos-protection (R/Xmeta/L)
    Other links: www.radicalphilosophy.com/article/the-philosophy-of-anonymous (-1, , X, X- R/X/L) dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/ (-1, , X, X- R/X/L) web.archive.org/web/20140513044100/http://dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/? (-1, -1, X, X- R/X/L) www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (-1, , X, X- R/X/L) web.archive.org/web/20140311070205/http://www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (-1, -1, X, X- R/X/L) blog.cloudflare.com/empty-ddos-threats-meet-the-armada-collective/ (-1, , X, X- R/X/L) www.us-cert.gov/ncas/tips/ST04-015 (-1, , X, X- R/X/L) sourceforge.net/projects/r-u-dead-yet/ (-1, , X, X- R/X/L) eusecwest.com (-1, , X, X- R/X/L) www.owasp.org/index.php/OWASP_HTTP_Post_Tool (-1, , X, X- R/X/L) sourceforge.net/projects/loicslow/ (-1, , X, X- R/X/L) sourceforge.net/projects/high-orbit-ion-cannon/ (-1, , X, X- R/X/L) sourceforge.net/projects/loic0/ (-1, , X, X- R/X/L) atlas.arbor.net/summary/dos (-1, , X, X- R/X/L) www.cert.org/tech_tips/denial_of_service.html (-1, , X, X- R/X/L) www.w3.org/Security/Faq/wwwsf6.html (-1, , X, X- R/X/L) www.akamai.com/soti (-1, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/DDoS%20Public%20Media%20Reports_0.xls (-1, , X, X- R/X/L) www.webcitation.org/5ws9nHATo (-1, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf (-1, , X, X- R/X/L) www.webcitation.org/5ws9RPpXi (-1, , X, X- R/X/L) www.youtube.com/watch?v=59AlNnX_Ksg&feature=feedu (-1, -1, X, X- R/X/L) www.huffingtonpost.com/2013/01/12/anonymous-ddos-petition-white-house_n_2463009.html (-1, , X, X- R/X/L) www.legislation.gov.uk/ukpga/1990/18/section/3 (-1, , X, X- R/X/L) www.europol.europa.eu/content/international-action-against-dd4bc-cybercriminal-group (-1, , X, X- R/X/L) www.gpo.gov/fdsys/pkg/USCODE-2010-title18/html/USCODE-2010-title18-partI-chap47-sec1030.htm (-1, , X, X- R/X/L) www.caida.org/publications/animations/ (-1, , X, X- R/X/L) wnmufm.org/post/people-overload-website-hoping-help-search-missing-jet (-1, , X, X- R/X/L) news.bbc.co.uk/2/hi/business/6108502.stm (-1, , X, X- R/X/L) productforums.google.com/forum/?hl=en#!category-topic/websearch/unexpected-search-results/uFcXXixhiBw (-1, , X, X- R/X/L) news.bbc.co.uk/1/hi/8120324.stm (-1, , X, X- R/X/L) www.verizon.com/about/news/verizon-digital-media-services-launches-cloud-based-web-application-firewall-increases-defenses (-1, , X, X- R/X/L) www.verizonenterprise.com/products/security/enforcement-protection (-1, , X, X- R/X/L) www.darkreading.com/attacks-breaches/verisign-rolls-out-ddos-monitoring-service/d/d-id/1131916 (-1, , X, X- R/X/L) www.tatacommunications.com/news/release-view.asp?d=20110907-DDOS-protection (-1, , X, X- R/X/L) www.staminus.net (-1, , X, X- R/X/L) www.telx.com/news/staminus-establishes-presence-in-telxs-60-hudson-street-data-center-in-new/ (-1, , X, X- R/X/L) www.sprint.com/business/solutions/sprint_enablers/managed_security/index.html (-1, , X, X- R/X/L) www.theregister.co.uk/Print/2013/06/03/dns_reflection_ddos_amplification_hacker_method/ (-1, , X, X- R/X/L) nominum.com/wp-content/uploads/2016/06/Nominum-Product-Brief-N2-ThreatAvert.pdf (-1, , X, X- R/X/L) www.neustar.biz/services/ddos-protection (-1, 61, X, X- R/X/L) www.incapsula.com/infrastructure-ddos-protection-services.html (-1, , X, X- R/X/L) f5.com/products/platforms/silverline/f5-silverline-ddos-protection/under-attack (-1, , X, X- R/X/L) www.business.att.com/content/productbrochures/ddos_prodbrief.pdf (-1, , X, X- R/X/L) www.arbornetworks.com/arbor-partner/alliances/technology-alliances/clean-pipes-2-0 (-1, , X, X- R/X/L) www.radware.com/Products/DefensePipe/ (-1, , X, X- R/X/L) www.level3.com/en/products/ddos-mitigation/ (-1, , X, X- R/X/L) arstechnica.com/security/2014/02/biggest-ddos-ever-aimed-at-cloudflares-content-delivery-network/ (-1, -1, X, X- R/X/L) research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080921012859/http://research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (-1, -1, X, X- R/X/L) mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080910202908/http://mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (-1, -1, X, X- R/X/L) www.computerworld.com/s/article/94014/How_to_defend_against_DDoS_attacks (-1, , X, X- R/X/L) www.ecommercewisdom.com/relationship-firewalls-protection-ddos/ (-1, , X, X- R/X/L) www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_7-4/dos_attacks.html (-1, , X, X- R/X/L) www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0004963006220628 (-1, , X, X- R/X/L) staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-DoSSurveyComputerJournal.pdf (-1, , X, X- R/X/L) www.ic3.gov/media/2013/130107.aspx (-1, , X, X- R/X/L) www.fbi.gov/newark/press-releases/2010/nk051110.htm (-1, , X, X- R/X/L) www.microsoft.com/technet/security/advisory/975497.mspx (-1, , X, X- R/X/L) www.zdnet.com/blog/security/windows-7-vista-exposed-to-teardrop-attack/4222 (-1, , X, X- R/X/L) www.cert.org/historical/advisories/ca-1997-28.cfm (-1, , X, X- R/X/L) tools.ietf.org/html/rfc4987 (-1, , X, X- R/X/L) sourceforge.net/projects/slow-http-test/ (-1, , X, X- R/X/L) ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6158635 (-1, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA13-088A (-1, , X, X- R/X/L) www.isotf.org/news/DNS-Amplification-Attacks.pdf (-1, , X, X- R/X/L) web.archive.org/web/20101214074629/http://www.isotf.org/news/DNS-Amplification-Attacks.pdf (-1, -1, X, X- R/X/L) www.usenix.org/conference/woot15/workshop-program/presentation/p2p-file-sharing-hell-exploiting-bittorrent (-1, , X, X- R/X/L) dx.doi.org/10.1145/2663716.2663731 (-1, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA14-017A (-1, , X, X- R/X/L) www.icir.org/vern/papers/reflectors.CCR.01/reflectors.html (-1, , X, X- R/X/L) www.internetsociety.org/sites/default/files/01_5.pdf (-1, , X, X- R/X/L) eusecwest.com/speakers.html#PhlashDance (-1, , X, X- R/X/L) web.archive.org/web/20090201173324/http://eusecwest.com/speakers.html#PhlashDance (-1, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=154270&WT.svl=news1_1 (-1, , X, X- R/X/L) web.archive.org/web/20081208002732/http://www.darkreading.com/security/management/showArticle.jhtml?articleID=211201088 (-1, -1, X, X- R/X/L) www.theregister.co.uk/2008/05/21/phlashing/ (-1, , X, X- R/X/L) dcpp.wordpress.com/2007/05/22/denying-distributed-attacks/ (-1, , X, X- R/X/L) www.securityfocus.com/news/11466 (-1, , X, X- R/X/L) www.prolexic.com/news/20070514-alert.php (-1, , X, X- R/X/L) web.archive.org/web/20070803175513/http://www.prolexic.com/news/20070514-alert.php (-1, -1, X, X- R/X/L) anml.iu.edu/ddos/types.html (-1, , X, X- R/X/L) web.archive.org/web/20100914222536/http://anml.iu.edu/ddos/types.html (-1, -1, X, X- R/X/L) www.owasp.org/images/4/43/Layer_7_DDOS.pdf (-1, , X, X- R/X/L) www.scmagazineuk.com/akamai-warns-of-increased-activity-from-ddos-extortion-group/article/438333/ (-1, , X, X- R/X/L) www.bloomberg.com/news/articles/2015-09-09/bitcoin-ddos-ransom-demands-raise-dd4bc-profile?mod=djemRiskCompliance (-1, , X, X- R/X/L) blog.cloudbric.com/2015/09/whos-behind-ddos-attacks-and-how-can.html (-1, , X, X- R/X/L) www.incapsula.com/blog/cctv-ddos-botnet-back-yard.html (-1, , X, X- R/X/L) www.incapsula.com/blog/cctv-ddos-botnet-back-yard.html (-1, , X, X- R/X/L) thehackernews.com/2015/10/cctv-camera-hacking.html (-1, , X, X- R/X/L) www.theregister.co.uk/2004/09/23/authorize_ddos_attack/ (-1, , X, X- R/X/L) www.sans.org/resources/idfaq/trinoo.php (-1, , X, X- R/X/L) blog.cloudbric.com/2015/08/has-your-website-been-bitten-by-zombie.html (-1, , X, X- R/X/L) aws.amazon.com/cloudwatch/ (-1, , X, X- R/X/L) theintercept.com/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/ (-1, , X, X- R/X/L) staff.washington.edu/dittrich/misc/stacheldraht.analysis.txt (-1, , X, X- R/X/L) web.archive.org/web/20131104052804/http://www.us-cert.gov/ncas/tips/st04-015 (-1, -1, X, X- R/X/L) www.us-cert.gov/ncas/tips/st04-015 (-1, , X, X- R/X/L) krebsonsecurity.com/2015/08/stress-testing-the-booter-services-financially/ (-1, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/ (-1, , X, X- R/X/L) krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/ (-1, , X, X- R/X/L) d-scholarship.pitt.edu/19225/1/FinalVersion.pdf (-1, 313, X, X- R/X/L)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  33. 2016-11-04 11:05:57 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Denial-of-service attack (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/services/ddos-protection (R/Xmeta/L)
    Other links: eusecwest.com (-1, , X, X- R/X/L) www.owasp.org/index.php/OWASP_HTTP_Post_Tool (-1, , X, X- R/X/L) sourceforge.net/projects/loicslow/ (-1, , X, X- R/X/L) sourceforge.net/projects/high-orbit-ion-cannon/ (-1, , X, X- R/X/L) sourceforge.net/projects/loic0/ (-1, , X, X- R/X/L) atlas.arbor.net/summary/dos (-1, , X, X- R/X/L) www.cert.org/tech_tips/denial_of_service.html (-1, , X, X- R/X/L) www.w3.org/Security/Faq/wwwsf6.html (-1, , X, X- R/X/L) www.akamai.com/soti (-1, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/DDoS%20Public%20Media%20Reports_0.xls (-1, , X, X- R/X/L) www.webcitation.org/5ws9nHATo (-1, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf (-1, , X, X- R/X/L) www.webcitation.org/5ws9RPpXi (-1, , X, X- R/X/L) www.youtube.com/watch?v=59AlNnX_Ksg&feature=feedu (-1, -1, X, X- R/X/L) www.huffingtonpost.com/2013/01/12/anonymous-ddos-petition-white-house_n_2463009.html (-1, , X, X- R/X/L) www.legislation.gov.uk/ukpga/1990/18/section/3 (-1, , X, X- R/X/L) www.europol.europa.eu/content/international-action-against-dd4bc-cybercriminal-group (-1, , X, X- R/X/L) www.gpo.gov/fdsys/pkg/USCODE-2010-title18/html/USCODE-2010-title18-partI-chap47-sec1030.htm (-1, , X, X- R/X/L) www.caida.org/publications/animations/ (-1, , X, X- R/X/L) wnmufm.org/post/people-overload-website-hoping-help-search-missing-jet (-1, , X, X- R/X/L) news.bbc.co.uk/2/hi/business/6108502.stm (-1, , X, X- R/X/L) productforums.google.com/forum/?hl=en#!category-topic/websearch/unexpected-search-results/uFcXXixhiBw (-1, , X, X- R/X/L) news.bbc.co.uk/1/hi/8120324.stm (-1, , X, X- R/X/L) www.verizon.com/about/news/verizon-digital-media-services-launches-cloud-based-web-application-firewall-increases-defenses (-1, , X, X- R/X/L) www.verizonenterprise.com/products/security/enforcement-protection (-1, , X, X- R/X/L) www.darkreading.com/attacks-breaches/verisign-rolls-out-ddos-monitoring-service/d/d-id/1131916 (-1, , X, X- R/X/L) www.tatacommunications.com/news/release-view.asp?d=20110907-DDOS-protection (-1, , X, X- R/X/L) www.staminus.net (-1, , X, X- R/X/L) www.telx.com/news/staminus-establishes-presence-in-telxs-60-hudson-street-data-center-in-new/ (-1, , X, X- R/X/L) www.sprint.com/business/solutions/sprint_enablers/managed_security/index.html (-1, , X, X- R/X/L) www.theregister.co.uk/Print/2013/06/03/dns_reflection_ddos_amplification_hacker_method/ (-1, , X, X- R/X/L) nominum.com/wp-content/uploads/2016/06/Nominum-Product-Brief-N2-ThreatAvert.pdf (-1, , X, X- R/X/L) www.neustar.biz/services/ddos-protection (-1, 61, X, X- R/X/L) www.incapsula.com/infrastructure-ddos-protection-services.html (-1, , X, X- R/X/L) f5.com/products/platforms/silverline/f5-silverline-ddos-protection/under-attack (-1, , X, X- R/X/L) www.business.att.com/content/productbrochures/ddos_prodbrief.pdf (-1, , X, X- R/X/L) www.arbornetworks.com/arbor-partner/alliances/technology-alliances/clean-pipes-2-0 (-1, , X, X- R/X/L) www.radware.com/Products/DefensePipe/ (-1, , X, X- R/X/L) www.level3.com/en/products/ddos-mitigation/ (-1, , X, X- R/X/L) arstechnica.com/security/2014/02/biggest-ddos-ever-aimed-at-cloudflares-content-delivery-network/ (-1, -1, X, X- R/X/L) research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080921012859/http://research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (-1, -1, X, X- R/X/L) mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080910202908/http://mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (-1, -1, X, X- R/X/L) www.computerworld.com/s/article/94014/How_to_defend_against_DDoS_attacks (-1, , X, X- R/X/L) www.ecommercewisdom.com/relationship-firewalls-protection-ddos/ (-1, , X, X- R/X/L) www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_7-4/dos_attacks.html (-1, , X, X- R/X/L) www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0004963006220628 (-1, , X, X- R/X/L) staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-DoSSurveyComputerJournal.pdf (-1, , X, X- R/X/L) www.ic3.gov/media/2013/130107.aspx (-1, , X, X- R/X/L) www.fbi.gov/newark/press-releases/2010/nk051110.htm (-1, , X, X- R/X/L) www.microsoft.com/technet/security/advisory/975497.mspx (-1, , X, X- R/X/L) www.zdnet.com/blog/security/windows-7-vista-exposed-to-teardrop-attack/4222 (-1, , X, X- R/X/L) www.cert.org/historical/advisories/ca-1997-28.cfm (-1, , X, X- R/X/L) tools.ietf.org/html/rfc4987 (-1, , X, X- R/X/L) sourceforge.net/projects/slow-http-test/ (-1, , X, X- R/X/L) ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6158635 (-1, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA13-088A (-1, , X, X- R/X/L) www.isotf.org/news/DNS-Amplification-Attacks.pdf (-1, , X, X- R/X/L) web.archive.org/web/20101214074629/http://www.isotf.org/news/DNS-Amplification-Attacks.pdf (-1, -1, X, X- R/X/L) www.usenix.org/conference/woot15/workshop-program/presentation/p2p-file-sharing-hell-exploiting-bittorrent (-1, , X, X- R/X/L) dx.doi.org/10.1145/2663716.2663731 (-1, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA14-017A (-1, , X, X- R/X/L) www.icir.org/vern/papers/reflectors.CCR.01/reflectors.html (-1, , X, X- R/X/L) www.internetsociety.org/sites/default/files/01_5.pdf (-1, , X, X- R/X/L) eusecwest.com/speakers.html#PhlashDance (-1, , X, X- R/X/L) web.archive.org/web/20090201173324/http://eusecwest.com/speakers.html#PhlashDance (-1, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=154270&WT.svl=news1_1 (-1, , X, X- R/X/L) web.archive.org/web/20081208002732/http://www.darkreading.com/security/management/showArticle.jhtml?articleID=211201088 (-1, -1, X, X- R/X/L) www.theregister.co.uk/2008/05/21/phlashing/ (-1, , X, X- R/X/L) dcpp.wordpress.com/2007/05/22/denying-distributed-attacks/ (-1, , X, X- R/X/L) www.securityfocus.com/news/11466 (-1, , X, X- R/X/L) www.prolexic.com/news/20070514-alert.php (-1, , X, X- R/X/L) web.archive.org/web/20070803175513/http://www.prolexic.com/news/20070514-alert.php (-1, -1, X, X- R/X/L) anml.iu.edu/ddos/types.html (-1, , X, X- R/X/L) web.archive.org/web/20100914222536/http://anml.iu.edu/ddos/types.html (-1, -1, X, X- R/X/L) www.owasp.org/images/4/43/Layer_7_DDOS.pdf (-1, , X, X- R/X/L) www.scmagazineuk.com/akamai-warns-of-increased-activity-from-ddos-extortion-group/article/438333/ (-1, , X, X- R/X/L) www.bloomberg.com/news/articles/2015-09-09/bitcoin-ddos-ransom-demands-raise-dd4bc-profile?mod=djemRiskCompliance (-1, , X, X- R/X/L) blog.cloudbric.com/2015/09/whos-behind-ddos-attacks-and-how-can.html (-1, , X, X- R/X/L) www.incapsula.com/blog/cctv-ddos-botnet-back-yard.html (-1, , X, X- R/X/L) www.incapsula.com/blog/cctv-ddos-botnet-back-yard.html (-1, , X, X- R/X/L) thehackernews.com/2015/10/cctv-camera-hacking.html (-1, , X, X- R/X/L) www.theregister.co.uk/2004/09/23/authorize_ddos_attack/ (-1, , X, X- R/X/L) www.sans.org/resources/idfaq/trinoo.php (-1, , X, X- R/X/L) blog.cloudbric.com/2015/08/has-your-website-been-bitten-by-zombie.html (-1, , X, X- R/X/L) aws.amazon.com/cloudwatch/ (-1, , X, X- R/X/L) theintercept.com/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/ (-1, , X, X- R/X/L) staff.washington.edu/dittrich/misc/stacheldraht.analysis.txt (-1, , X, X- R/X/L) web.archive.org/web/20131104052804/http://www.us-cert.gov/ncas/tips/st04-015 (-1, -1, X, X- R/X/L) www.us-cert.gov/ncas/tips/st04-015 (-1, , X, X- R/X/L) krebsonsecurity.com/2015/08/stress-testing-the-booter-services-financially/ (-1, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/ (-1, , X, X- R/X/L) thehackernews.com/2016/09/ddos-attack-iot.html (-1, , X, X- R/X/L) d-scholarship.pitt.edu/19225/1/FinalVersion.pdf (-1, 313, X, X- R/X/L) www.radicalphilosophy.com/article/the-philosophy-of-anonymous (-1, , X, X- R/X/L) dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/ (-1, , X, X- R/X/L) web.archive.org/web/20140513044100/http://dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/? (-1, -1, X, X- R/X/L) www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (-1, , X, X- R/X/L) web.archive.org/web/20140311070205/http://www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (-1, -1, X, X- R/X/L) blog.cloudflare.com/empty-ddos-threats-meet-the-armada-collective/ (-1, , X, X- R/X/L) www.us-cert.gov/ncas/tips/ST04-015 (-1, , X, X- R/X/L) sourceforge.net/projects/r-u-dead-yet/ (-1, , X, X- R/X/L)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  34. 2017-02-14 01:45:50 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Denial-of-service attack (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/services/ddos-protection (R/Xmeta/L)
    Other links: sourceforge.net/projects/loicslow/ (-1, , X, X- R/X/L) sourceforge.net/projects/high-orbit-ion-cannon/ (-1, , X, X- R/X/L) sourceforge.net/projects/loic0/ (-1, , X, X- R/X/L) atlas.arbor.net/summary/dos (-1, , X, X- R/X/L) www.cert.org/tech_tips/denial_of_service.html (-1, , X, X- R/X/L) www.w3.org/Security/Faq/wwwsf6.html (-1, , X, X- R/X/L) www.akamai.com/soti (-1, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/DDoS%20Public%20Media%20Reports_0.xls (-1, , X, X- R/X/L) www.webcitation.org/5ws9nHATo?url=http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/DDoS%20Public%20Media%20Reports_0.xls (-1, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf (-1, , X, X- R/X/L) www.webcitation.org/5ws9RPpXi?url=http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf (-1, , X, X- R/X/L) www.youtube.com/watch?v=59AlNnX_Ksg&feature=feedu (-1, -1, X, X- R/X/L) www.huffingtonpost.com/2013/01/12/anonymous-ddos-petition-white-house_n_2463009.html (-1, , X, X- R/X/L) www.legislation.gov.uk/ukpga/1990/18/section/3 (-1, , X, X- R/X/L) www.europol.europa.eu/content/international-action-against-dd4bc-cybercriminal-group (-1, , X, X- R/X/L) www.gpo.gov/fdsys/pkg/USCODE-2010-title18/html/USCODE-2010-title18-partI-chap47-sec1030.htm (-1, , X, X- R/X/L) www.caida.org/publications/animations/ (-1, , X, X- R/X/L) wnmufm.org/post/people-overload-website-hoping-help-search-missing-jet (-1, , X, X- R/X/L) news.bbc.co.uk/2/hi/business/6108502.stm (-1, , X, X- R/X/L) productforums.google.com/forum/?hl=en#!category-topic/websearch/unexpected-search-results/uFcXXixhiBw (-1, , X, X- R/X/L) news.bbc.co.uk/1/hi/8120324.stm (-1, , X, X- R/X/L) www.verizon.com/about/news/verizon-digital-media-services-launches-cloud-based-web-application-firewall-increases-defenses (-1, , X, X- R/X/L) www.verizonenterprise.com/products/security/enforcement-protection (-1, , X, X- R/X/L) www.darkreading.com/attacks-breaches/verisign-rolls-out-ddos-monitoring-service/d/d-id/1131916 (-1, , X, X- R/X/L) www.tatacommunications.com/news/release-view.asp?d=20110907-DDOS-protection (-1, , X, X- R/X/L) techcrunch.com/2013/12/02/akamai-buys-ddos-prevention-specialist-prolexic-for-370m-to-ramp-up-security-offerings/ (-1, -1, X, X- R/X/L) www.neustar.biz/services/ddos-protection (-1, 61, X, X- R/X/L) www.incapsula.com/infrastructure-ddos-protection-services.html (-1, , X, X- R/X/L) f5.com/products/platforms/silverline/f5-silverline-ddos-protection/under-attack (-1, , X, X- R/X/L) www.business.att.com/content/productbrochures/ddos_prodbrief.pdf (-1, , X, X- R/X/L) www.arbornetworks.com/arbor-partner/alliances/technology-alliances/clean-pipes-2-0 (-1, , X, X- R/X/L) www.radware.com/Products/DefensePipe/ (-1, , X, X- R/X/L) www.level3.com/en/products/ddos-mitigation/ (-1, , X, X- R/X/L) arstechnica.com/security/2014/02/biggest-ddos-ever-aimed-at-cloudflares-content-delivery-network/ (-1, -1, X, X- R/X/L) research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080921012859/http://research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (-1, -1, X, X- R/X/L) mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080910202908/http://mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (-1, -1, X, X- R/X/L) www.computerworld.com/s/article/94014/How_to_defend_against_DDoS_attacks (-1, , X, X- R/X/L) www.ecommercewisdom.com/relationship-firewalls-protection-ddos/ (-1, , X, X- R/X/L) www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_7-4/dos_attacks.html (-1, , X, X- R/X/L) www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0004963006220628 (-1, , X, X- R/X/L) staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-DoSSurveyComputerJournal.pdf (-1, , X, X- R/X/L) www.ic3.gov/media/2013/130107.aspx (-1, , X, X- R/X/L) www.fbi.gov/newark/press-releases/2010/nk051110.htm (-1, , X, X- R/X/L) www.microsoft.com/technet/security/advisory/975497.mspx (-1, , X, X- R/X/L) www.zdnet.com/blog/security/windows-7-vista-exposed-to-teardrop-attack/4222 (-1, , X, X- R/X/L) www.cert.org/historical/advisories/ca-1997-28.cfm (-1, , X, X- R/X/L) tools.ietf.org/html/rfc4987 (-1, , X, X- R/X/L) sourceforge.net/projects/slow-http-test/ (-1, , X, X- R/X/L) ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6158635 (-1, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA13-088A (-1, , X, X- R/X/L) www.isotf.org/news/DNS-Amplification-Attacks.pdf (-1, , X, X- R/X/L) web.archive.org/web/20101214074629/http://www.isotf.org/news/DNS-Amplification-Attacks.pdf (-1, -1, X, X- R/X/L) www.usenix.org/conference/woot15/workshop-program/presentation/p2p-file-sharing-hell-exploiting-bittorrent (-1, , X, X- R/X/L) dx.doi.org/10.1145/2663716.2663731 (-1, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA14-017A (-1, , X, X- R/X/L) www.icir.org/vern/papers/reflectors.CCR.01/reflectors.html (-1, , X, X- R/X/L) www.internetsociety.org/sites/default/files/01_5.pdf (-1, , X, X- R/X/L) eusecwest.com/speakers.html#PhlashDance (-1, , X, X- R/X/L) web.archive.org/web/20090201173324/http://eusecwest.com/speakers.html#PhlashDance (-1, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=154270&WT.svl=news1_1 (-1, , X, X- R/X/L) web.archive.org/web/20081208002732/http://www.darkreading.com/security/management/showArticle.jhtml?articleID=211201088 (-1, -1, X, X- R/X/L) www.theregister.co.uk/2008/05/21/phlashing/ (-1, , X, X- R/X/L) dcpp.wordpress.com/2007/05/22/denying-distributed-attacks/ (-1, , X, X- R/X/L) www.securityfocus.com/news/11466 (-1, , X, X- R/X/L) www.prolexic.com/news/20070514-alert.php (-1, , X, X- R/X/L) web.archive.org/web/20070803175513/http://www.prolexic.com/news/20070514-alert.php (-1, -1, X, X- R/X/L) anml.iu.edu/ddos/types.html (-1, , X, X- R/X/L) web.archive.org/web/20100914222536/http://anml.iu.edu/ddos/types.html (-1, -1, X, X- R/X/L) www.owasp.org/images/4/43/Layer_7_DDOS.pdf (-1, , X, X- R/X/L) www.scmagazineuk.com/akamai-warns-of-increased-activity-from-ddos-extortion-group/article/438333/ (-1, , X, X- R/X/L) www.bloomberg.com/news/articles/2015-09-09/bitcoin-ddos-ransom-demands-raise-dd4bc-profile?mod=djemRiskCompliance (-1, , X, X- R/X/L) blog.cloudbric.com/2015/09/whos-behind-ddos-attacks-and-how-can.html (-1, , X, X- R/X/L) www.incapsula.com/blog/cctv-ddos-botnet-back-yard.html (-1, , X, X- R/X/L) www.incapsula.com/blog/cctv-ddos-botnet-back-yard.html (-1, , X, X- R/X/L) thehackernews.com/2015/10/cctv-camera-hacking.html (-1, , X, X- R/X/L) www.theregister.co.uk/2004/09/23/authorize_ddos_attack/ (-1, , X, X- R/X/L) www.sans.org/resources/idfaq/trinoo.php (-1, , X, X- R/X/L) blog.cloudbric.com/2015/08/has-your-website-been-bitten-by-zombie.html (-1, , X, X- R/X/L) aws.amazon.com/cloudwatch/ (-1, , X, X- R/X/L) theintercept.com/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/ (-1, , X, X- R/X/L) staff.washington.edu/dittrich/misc/stacheldraht.analysis.txt (-1, , X, X- R/X/L) web.archive.org/web/20131104052804/http://www.us-cert.gov/ncas/tips/st04-015 (-1, -1, X, X- R/X/L) www.us-cert.gov/ncas/tips/st04-015 (-1, , X, X- R/X/L) krebsonsecurity.com/2015/08/stress-testing-the-booter-services-financially/ (-1, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/ (-1, , X, X- R/X/L) web-beta.archive.org/web/20160930031903/https://thehackernews.com/2016/09/ddos-attack-iot.html (-1, , X, X- R/X/L) thehackernews.com/2016/09/ddos-attack-iot.html (-1, , X, X- R/X/L) web.archive.org/web/20161002000235/http://arstechnica.com/security/2016/09/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever/ (-1, -1, X, X- R/X/L) arstechnica.com/security/2016/09/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever/ (-1, -1, X, X- R/X/L) d-scholarship.pitt.edu/19225/1/FinalVersion.pdf (-1, 313, X, X- R/X/L) www.radicalphilosophy.com/article/the-philosophy-of-anonymous (-1, , X, X- R/X/L) dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/ (-1, , X, X- R/X/L) web.archive.org/web/20140513044100/http://dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/? (-1, -1, X, X- R/X/L) www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (-1, , X, X- R/X/L) web.archive.org/web/20140311070205/http://www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (-1, -1, X, X- R/X/L) blog.cloudflare.com/empty-ddos-threats-meet-the-armada-collective/ (-1, , X, X- R/X/L) www.us-cert.gov/ncas/tips/ST04-015 (-1, , X, X- R/X/L) sourceforge.net/projects/r-u-dead-yet/ (-1, , X, X- R/X/L) eusecwest.com (-1, , X, X- R/X/L) www.owasp.org/index.php/OWASP_HTTP_Post_Tool (-1, , X, X- R/X/L)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  35. 2017-03-16 15:12:31 (UTC): User Newtonke t • c • dc • l • ef • b • bl; (2) to Barrett Lyon (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/about-us/news-room/press-releases/2017/lyon (R/Xmeta/L)
    Other links: www.neustar.biz/about-us/news-room/press-releases/2017/lyon (2, 61, 2, 1- R/X/L) www.neustar.biz/about-us/news-room/press-releases/2017/lyon (2, 61, 2, 1- R/X/L)
  36. 2017-04-23 16:26:27 (UTC): w:tr:User:Aacan (t - c; 87) to w:tr:Denial-of-service attack (diff  !top) - Link: www.neustar.biz/services/ddos-protection (R/Xmeta/L)
    Other links: www.youtube.com/watch?v=59AlNnX_Ksg&feature=feedu (87, -1, X, X- R/X/L) www.huffingtonpost.com/2013/01/12/anonymous-ddos-petition-white-house_n_2463009.html (87, , X, X- R/X/L) www.legislation.gov.uk/ukpga/1990/18/section/3 (87, , X, X- R/X/L) www.europol.europa.eu/content/international-action-against-dd4bc-cybercriminal-group (87, , X, X- R/X/L) www.gpo.gov/fdsys/pkg/USCODE-2010-title18/html/USCODE-2010-title18-partI-chap47-sec1030.htm (87, , X, X- R/X/L) www.caida.org/publications/animations/ (87, , X, X- R/X/L) wnmufm.org/post/people-overload-website-hoping-help-search-missing-jet (87, , X, X- R/X/L) news.bbc.co.uk/2/hi/business/6108502.stm (87, , X, X- R/X/L) productforums.google.com/forum/?hl=en#!category-topic/websearch/unexpected-search-results/uFcXXixhiBw (87, , X, X- R/X/L) news.bbc.co.uk/1/hi/8120324.stm (87, , X, X- R/X/L) www.verizon.com/about/news/verizon-digital-media-services-launches-cloud-based-web-application-firewall-increases-defenses (87, , X, X- R/X/L) www.verizonenterprise.com/products/security/enforcement-protection (87, , X, X- R/X/L) www.darkreading.com/attacks-breaches/verisign-rolls-out-ddos-monitoring-service/d/d-id/1131916 (87, , X, X- R/X/L) www.tatacommunications.com/news/release-view.asp?d=20110907-DDOS-protection (87, , X, X- R/X/L) www.neustar.biz/services/ddos-protection (87, 61, X, X- R/X/L) www.incapsula.com/infrastructure-ddos-protection-services.html (87, , X, X- R/X/L) f5.com/products/platforms/silverline/f5-silverline-ddos-protection/under-attack (87, , X, X- R/X/L) www.business.att.com/content/productbrochures/ddos_prodbrief.pdf (87, , X, X- R/X/L) www.arbornetworks.com/arbor-partner/alliances/technology-alliances/clean-pipes-2-0 (87, , X, X- R/X/L) www.radware.com/Products/DefensePipe/ (87, , X, X- R/X/L) www.level3.com/en/products/ddos-mitigation/ (87, , X, X- R/X/L) arstechnica.com/security/2014/02/biggest-ddos-ever-aimed-at-cloudflares-content-delivery-network/ (87, -1, X, X- R/X/L) techcrunch.com/2013/12/02/akamai-buys-ddos-prevention-specialist-prolexic-for-370m-to-ramp-up-security-offerings/ (87, -1, X, X- R/X/L) research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (87, , X, X- R/X/L) web.archive.org/web/20080921012859/http://research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (87, -1, X, X- R/X/L) mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (87, , X, X- R/X/L) web.archive.org/web/20080910202908/http://mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (87, -1, X, X- R/X/L) www.computerworld.com/s/article/94014/How_to_defend_against_DDoS_attacks (87, , X, X- R/X/L) www.ecommercewisdom.com/relationship-firewalls-protection-ddos/ (87, , X, X- R/X/L) www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_7-4/dos_attacks.html (87, , X, X- R/X/L) www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0004963006220628 (87, , X, X- R/X/L) staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-DoSSurveyComputerJournal.pdf (87, , X, X- R/X/L) www.ic3.gov/media/2013/130107.aspx (87, , X, X- R/X/L) www.fbi.gov/newark/press-releases/2010/nk051110.htm (87, , X, X- R/X/L) www.microsoft.com/technet/security/advisory/975497.mspx (87, , X, X- R/X/L) www.zdnet.com/blog/security/windows-7-vista-exposed-to-teardrop-attack/4222 (87, , X, X- R/X/L) www.cert.org/historical/advisories/ca-1997-28.cfm (87, , X, X- R/X/L) sourceforge.net/projects/slow-http-test/ (87, , X, X- R/X/L) www.worldcat.org/issn/0018-9340 (87, , X, X- R/X/L) ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6158635 (87, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA13-088A (87, , X, X- R/X/L) www.isotf.org/news/DNS-Amplification-Attacks.pdf (87, , X, X- R/X/L) web.archive.org/web/20101214074629/http://www.isotf.org/news/DNS-Amplification-Attacks.pdf (87, -1, X, X- R/X/L) www.usenix.org/conference/woot15/workshop-program/presentation/p2p-file-sharing-hell-exploiting-bittorrent (87, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA14-017A (87, , X, X- R/X/L) www.icir.org/vern/papers/reflectors.CCR.01/reflectors.html (87, , X, X- R/X/L) www.internetsociety.org/sites/default/files/01_5.pdf (87, , X, X- R/X/L) eusecwest.com/speakers.html#PhlashDance (87, , X, X- R/X/L) web.archive.org/web/20090201173324/http://eusecwest.com/speakers.html#PhlashDance (87, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=154270&WT.svl=news1_1 (87, , X, X- R/X/L) web.archive.org/web/20081208002732/http://www.darkreading.com/security/management/showArticle.jhtml?articleID=211201088 (87, -1, X, X- R/X/L) www.theregister.co.uk/2008/05/21/phlashing/ (87, , X, X- R/X/L) dcpp.wordpress.com/2007/05/22/denying-distributed-attacks/ (87, , X, X- R/X/L) www.securityfocus.com/news/11466 (87, , X, X- R/X/L) www.prolexic.com/news/20070514-alert.php (87, , X, X- R/X/L) web.archive.org/web/20070803175513/http://www.prolexic.com/news/20070514-alert.php (87, -1, X, X- R/X/L) anml.iu.edu/ddos/types.html (87, , X, X- R/X/L) web.archive.org/web/20100914222536/http://anml.iu.edu/ddos/types.html (87, -1, X, X- R/X/L) www.owasp.org/images/4/43/Layer_7_DDOS.pdf (87, , X, X- R/X/L) www.scmagazineuk.com/akamai-warns-of-increased-activity-from-ddos-extortion-group/article/438333/ (87, , X, X- R/X/L) www.bloomberg.com/news/articles/2015-09-09/bitcoin-ddos-ransom-demands-raise-dd4bc-profile?mod=djemRiskCompliance (87, , X, X- R/X/L) blog.cloudbric.com/2015/09/whos-behind-ddos-attacks-and-how-can.html (87, , X, X- R/X/L) www.incapsula.com/blog/cctv-ddos-botnet-back-yard.html (87, , X, X- R/X/L) thehackernews.com/2015/10/cctv-camera-hacking.html (87, , X, X- R/X/L) www.theregister.co.uk/2004/09/23/authorize_ddos_attack/ (87, , X, X- R/X/L) www.sans.org/resources/idfaq/trinoo.php (87, , X, X- R/X/L) blog.cloudbric.com/2015/08/has-your-website-been-bitten-by-zombie.html (87, , X, X- R/X/L) theintercept.com/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/ (87, , X, X- R/X/L) aws.amazon.com/cloudwatch/ (87, , X, X- R/X/L) staff.washington.edu/dittrich/misc/stacheldraht.analysis.txt (87, , X, X- R/X/L) web.archive.org/web/20131104052804/http://www.us-cert.gov/ncas/tips/st04-015 (87, -1, X, X- R/X/L) www.us-cert.gov/ncas/tips/st04-015 (87, , X, X- R/X/L) krebsonsecurity.com/2015/08/stress-testing-the-booter-services-financially/ (87, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/ (87, , X, X- R/X/L) web-beta.archive.org/web/20160930031903/https://thehackernews.com/2016/09/ddos-attack-iot.html (87, , X, X- R/X/L) thehackernews.com/2016/09/ddos-attack-iot.html (87, , X, X- R/X/L) web.archive.org/web/20161002000235/http://arstechnica.com/security/2016/09/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever/ (87, -1, X, X- R/X/L) arstechnica.com/security/2016/09/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever/ (87, -1, X, X- R/X/L) tqaweekly.com/episodes/season5/tqa-se5ep11.php (87, , X, X- R/X/L) d-scholarship.pitt.edu/19225/1/FinalVersion.pdf (87, 313, X, X- R/X/L) www.radicalphilosophy.com/article/the-philosophy-of-anonymous (87, , X, X- R/X/L) dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/ (87, , X, X- R/X/L) web.archive.org/web/20140513044100/http://dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/? (87, -1, X, X- R/X/L) www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (87, , X, X- R/X/L) web.archive.org/web/20140311070205/http://www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (87, -1, X, X- R/X/L) blog.cloudflare.com/empty-ddos-threats-meet-the-armada-collective/ (87, , X, X- R/X/L) www.us-cert.gov/ncas/tips/ST04-015 (87, , X, X- R/X/L)
  37. 2017-04-25 10:55:20 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Denial-of-service attack (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/services/ddos-protection (R/Xmeta/L)
    Other links: sourceforge.net/projects/loicslow/ (-1, , X, X- R/X/L) sourceforge.net/projects/high-orbit-ion-cannon/ (-1, , X, X- R/X/L) sourceforge.net/projects/loic0/ (-1, , X, X- R/X/L) atlas.arbor.net/summary/dos (-1, , X, X- R/X/L) www.cert.org/tech_tips/denial_of_service.html (-1, , X, X- R/X/L) www.w3.org/Security/Faq/wwwsf6.html (-1, , X, X- R/X/L) www.akamai.com/soti (-1, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/DDoS%20Public%20Media%20Reports_0.xls (-1, , X, X- R/X/L) www.webcitation.org/5ws9nHATo?url=http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/DDoS%20Public%20Media%20Reports_0.xls (-1, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf (-1, , X, X- R/X/L) www.webcitation.org/5ws9RPpXi?url=http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf (-1, , X, X- R/X/L) www.youtube.com/watch?v=59AlNnX_Ksg&feature=feedu (-1, -1, X, X- R/X/L) www.huffingtonpost.com/2013/01/12/anonymous-ddos-petition-white-house_n_2463009.html (-1, , X, X- R/X/L) www.legislation.gov.uk/ukpga/1990/18/section/3 (-1, , X, X- R/X/L) www.europol.europa.eu/content/international-action-against-dd4bc-cybercriminal-group (-1, , X, X- R/X/L) www.gpo.gov/fdsys/pkg/USCODE-2010-title18/html/USCODE-2010-title18-partI-chap47-sec1030.htm (-1, , X, X- R/X/L) www.caida.org/publications/animations/ (-1, , X, X- R/X/L) wnmufm.org/post/people-overload-website-hoping-help-search-missing-jet (-1, , X, X- R/X/L) news.bbc.co.uk/2/hi/business/6108502.stm (-1, , X, X- R/X/L) productforums.google.com/forum/?hl=en#!category-topic/websearch/unexpected-search-results/uFcXXixhiBw (-1, , X, X- R/X/L) news.bbc.co.uk/1/hi/8120324.stm (-1, , X, X- R/X/L) www.verizon.com/about/news/verizon-digital-media-services-launches-cloud-based-web-application-firewall-increases-defenses (-1, , X, X- R/X/L) www.verizonenterprise.com/products/security/enforcement-protection (-1, , X, X- R/X/L) www.darkreading.com/attacks-breaches/verisign-rolls-out-ddos-monitoring-service/d/d-id/1131916 (-1, , X, X- R/X/L) www.tatacommunications.com/news/release-view.asp?d=20110907-DDOS-protection (-1, , X, X- R/X/L) www.neustar.biz/services/ddos-protection (-1, 61, X, X- R/X/L) www.incapsula.com/infrastructure-ddos-protection-services.html (-1, , X, X- R/X/L) f5.com/products/platforms/silverline/f5-silverline-ddos-protection/under-attack (-1, , X, X- R/X/L) www.business.att.com/content/productbrochures/ddos_prodbrief.pdf (-1, , X, X- R/X/L) www.arbornetworks.com/arbor-partner/alliances/technology-alliances/clean-pipes-2-0 (-1, , X, X- R/X/L) www.radware.com/Products/DefensePipe/ (-1, , X, X- R/X/L) www.level3.com/en/products/ddos-mitigation/ (-1, , X, X- R/X/L) arstechnica.com/security/2014/02/biggest-ddos-ever-aimed-at-cloudflares-content-delivery-network/ (-1, -1, X, X- R/X/L) techcrunch.com/2013/12/02/akamai-buys-ddos-prevention-specialist-prolexic-for-370m-to-ramp-up-security-offerings/ (-1, -1, X, X- R/X/L) research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080921012859/http://research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (-1, -1, X, X- R/X/L) mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080910202908/http://mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (-1, -1, X, X- R/X/L) www.computerworld.com/s/article/94014/How_to_defend_against_DDoS_attacks (-1, , X, X- R/X/L) www.ecommercewisdom.com/relationship-firewalls-protection-ddos/ (-1, , X, X- R/X/L) www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_7-4/dos_attacks.html (-1, , X, X- R/X/L) www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0004963006220628 (-1, , X, X- R/X/L) staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-DoSSurveyComputerJournal.pdf (-1, , X, X- R/X/L) www.ic3.gov/media/2013/130107.aspx (-1, , X, X- R/X/L) www.fbi.gov/newark/press-releases/2010/nk051110.htm (-1, , X, X- R/X/L) www.microsoft.com/technet/security/advisory/975497.mspx (-1, , X, X- R/X/L) www.zdnet.com/blog/security/windows-7-vista-exposed-to-teardrop-attack/4222 (-1, , X, X- R/X/L) www.cert.org/historical/advisories/ca-1997-28.cfm (-1, , X, X- R/X/L) tools.ietf.org/html/rfc4987 (-1, , X, X- R/X/L) sourceforge.net/projects/slow-http-test/ (-1, , X, X- R/X/L) ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6158635 (-1, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA13-088A (-1, , X, X- R/X/L) www.isotf.org/news/DNS-Amplification-Attacks.pdf (-1, , X, X- R/X/L) web.archive.org/web/20101214074629/http://www.isotf.org/news/DNS-Amplification-Attacks.pdf (-1, -1, X, X- R/X/L) www.usenix.org/conference/woot15/workshop-program/presentation/p2p-file-sharing-hell-exploiting-bittorrent (-1, , X, X- R/X/L) dx.doi.org/10.1145/2663716.2663731 (-1, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA14-017A (-1, , X, X- R/X/L) www.icir.org/vern/papers/reflectors.CCR.01/reflectors.html (-1, , X, X- R/X/L) www.internetsociety.org/sites/default/files/01_5.pdf (-1, , X, X- R/X/L) eusecwest.com/speakers.html#PhlashDance (-1, , X, X- R/X/L) web.archive.org/web/20090201173324/http://eusecwest.com/speakers.html#PhlashDance (-1, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=154270&WT.svl=news1_1 (-1, , X, X- R/X/L) web.archive.org/web/20081208002732/http://www.darkreading.com/security/management/showArticle.jhtml?articleID=211201088 (-1, -1, X, X- R/X/L) www.theregister.co.uk/2008/05/21/phlashing/ (-1, , X, X- R/X/L) dcpp.wordpress.com/2007/05/22/denying-distributed-attacks/ (-1, , X, X- R/X/L) www.securityfocus.com/news/11466 (-1, , X, X- R/X/L) www.prolexic.com/news/20070514-alert.php (-1, , X, X- R/X/L) web.archive.org/web/20070803175513/http://www.prolexic.com/news/20070514-alert.php (-1, -1, X, X- R/X/L) anml.iu.edu/ddos/types.html (-1, , X, X- R/X/L) web.archive.org/web/20100914222536/http://anml.iu.edu/ddos/types.html (-1, -1, X, X- R/X/L) www.owasp.org/images/4/43/Layer_7_DDOS.pdf (-1, , X, X- R/X/L) www.scmagazineuk.com/akamai-warns-of-increased-activity-from-ddos-extortion-group/article/438333/ (-1, , X, X- R/X/L) www.bloomberg.com/news/articles/2015-09-09/bitcoin-ddos-ransom-demands-raise-dd4bc-profile?mod=djemRiskCompliance (-1, , X, X- R/X/L) blog.cloudbric.com/2015/09/whos-behind-ddos-attacks-and-how-can.html (-1, , X, X- R/X/L) www.incapsula.com/blog/cctv-ddos-botnet-back-yard.html (-1, , X, X- R/X/L) thehackernews.com/2015/10/cctv-camera-hacking.html (-1, , X, X- R/X/L) www.theregister.co.uk/2004/09/23/authorize_ddos_attack/ (-1, , X, X- R/X/L) www.sans.org/resources/idfaq/trinoo.php (-1, , X, X- R/X/L) blog.cloudbric.com/2015/08/has-your-website-been-bitten-by-zombie.html (-1, , X, X- R/X/L) aws.amazon.com/cloudwatch/ (-1, , X, X- R/X/L) theintercept.com/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/ (-1, , X, X- R/X/L) staff.washington.edu/dittrich/misc/stacheldraht.analysis.txt (-1, , X, X- R/X/L) web.archive.org/web/20131104052804/http://www.us-cert.gov/ncas/tips/st04-015 (-1, -1, X, X- R/X/L) www.us-cert.gov/ncas/tips/st04-015 (-1, , X, X- R/X/L) krebsonsecurity.com/2015/08/stress-testing-the-booter-services-financially/ (-1, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/ (-1, , X, X- R/X/L) web-beta.archive.org/web/20160930031903/https://thehackernews.com/2016/09/ddos-attack-iot.html (-1, , X, X- R/X/L) thehackernews.com/2016/09/ddos-attack-iot.html (-1, , X, X- R/X/L) web.archive.org/web/20161002000235/http://arstechnica.com/security/2016/09/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever/ (-1, -1, X, X- R/X/L) arstechnica.com/security/2016/09/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever/ (-1, -1, X, X- R/X/L) tqaweekly.com/episodes/season5/tqa-se5ep11.php (-1, , X, X- R/X/L) d-scholarship.pitt.edu/19225/1/FinalVersion.pdf (-1, 313, X, X- R/X/L) www.radicalphilosophy.com/article/the-philosophy-of-anonymous (-1, , X, X- R/X/L) dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/ (-1, , X, X- R/X/L) web.archive.org/web/20140513044100/http://dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/? (-1, -1, X, X- R/X/L) www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (-1, , X, X- R/X/L) web.archive.org/web/20140311070205/http://www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (-1, -1, X, X- R/X/L) blog.cloudflare.com/empty-ddos-threats-meet-the-armada-collective/ (-1, , X, X- R/X/L) www.us-cert.gov/ncas/tips/ST04-015 (-1, , X, X- R/X/L) sourceforge.net/projects/r-u-dead-yet/ (-1, , X, X- R/X/L) eusecwest.com (-1, , X, X- R/X/L) www.owasp.org/index.php/OWASP_HTTP_Post_Tool (-1, , X, X- R/X/L)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  38. 2017-09-14 06:31:33 (UTC): User SrihariThalla t • c • dc • l • ef • b • bl; (96) to Neustar (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz (R/Xmeta/L)
    Other links: www.neustar.biz (96, 61, 1, 1- R/X/L)
  39. 2017-09-30 07:49:37 (UTC): User 2001:470:1F1D:66:A88C:D42D:EDFF:7C05 t • c • dc • l • ef • b • bl; (1) to DNS Advantage (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/security/dns-services/free-recursive-dns-service (R/Xmeta/L)
    Other links: www.neustar.biz/security/dns-services/free-recursive-dns-service (1, 61, 1, 1- R/X/L)
  40. 2017-11-02 17:55:40 (UTC): User 79.214.127.27 t • c • dc • l • ef • b • bl; (3) to OneID (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz (R/Xmeta/L)
    Other links: www.neustar.biz (3, 61, 1, 1- R/X/L)
  41. 2017-11-09 09:52:02 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Denial-of-service attack (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/services/ddos-protection (R/Xmeta/L)
    Other links: sourceforge.net/projects/loicslow/ (-1, , X, X- R/X/L) sourceforge.net/projects/high-orbit-ion-cannon/ (-1, , X, X- R/X/L) sourceforge.net/projects/loic0/ (-1, , X, X- R/X/L) atlas.arbor.net/summary/dos (-1, , X, X- R/X/L) www.cert.org/tech_tips/denial_of_service.html (-1, , X, X- R/X/L) www.w3.org/Security/Faq/wwwsf6.html (-1, , X, X- R/X/L) www.akamai.com/soti (-1, , X, X- R/X/L) www.pcworld.com/article/2056805/applicationlayer-ddos-attacks-are-becoming-increasingly-sophisticated.html (-1, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/DDoS%20Public%20Media%20Reports_0.xls (-1, , X, X- R/X/L) www.webcitation.org/5ws9nHATo?url=http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/DDoS%20Public%20Media%20Reports_0.xls (-1, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf (-1, , X, X- R/X/L) www.webcitation.org/5ws9RPpXi?url=http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf (-1, , X, X- R/X/L) www.youtube.com/watch?v=59AlNnX_Ksg (-1, -1, X, X- R/X/L) www.huffingtonpost.com/2013/01/12/anonymous-ddos-petition-white-house_n_2463009.html (-1, , X, X- R/X/L) www.legislation.gov.uk/ukpga/1990/18/section/3 (-1, , X, X- R/X/L) www.europol.europa.eu/content/international-action-against-dd4bc-cybercriminal-group (-1, , X, X- R/X/L) www.gpo.gov/fdsys/pkg/USCODE-2010-title18/html/USCODE-2010-title18-partI-chap47-sec1030.htm (-1, , X, X- R/X/L) www.caida.org/publications/animations/ (-1, , X, X- R/X/L) wnmufm.org/post/people-overload-website-hoping-help-search-missing-jet (-1, , X, X- R/X/L) news.bbc.co.uk/2/hi/business/6108502.stm (-1, , X, X- R/X/L) productforums.google.com/forum/?hl=en#!category-topic/websearch/unexpected-search-results/uFcXXixhiBw (-1, , X, X- R/X/L) news.bbc.co.uk/1/hi/8120324.stm (-1, , X, X- R/X/L) www.verizon.com/about/news/verizon-digital-media-services-launches-cloud-based-web-application-firewall-increases-defenses (-1, , X, X- R/X/L) www.verizonenterprise.com/products/security/enforcement-protection (-1, , X, X- R/X/L) www.darkreading.com/attacks-breaches/verisign-rolls-out-ddos-monitoring-service/d/d-id/1131916 (-1, , X, X- R/X/L) www.tatacommunications.com/news/release-view.asp?d=20110907-DDOS-protection (-1, , X, X- R/X/L) www.neustar.biz/services/ddos-protection (-1, 61, X, X- R/X/L) www.incapsula.com/infrastructure-ddos-protection-services.html (-1, , X, X- R/X/L) f5.com/products/platforms/silverline/f5-silverline-ddos-protection/under-attack (-1, , X, X- R/X/L) www.business.att.com/content/productbrochures/ddos_prodbrief.pdf (-1, , X, X- R/X/L) www.arbornetworks.com/arbor-partner/alliances/technology-alliances/clean-pipes-2-0 (-1, , X, X- R/X/L) www.radware.com/Products/DefensePipe/ (-1, , X, X- R/X/L) www.level3.com/en/products/ddos-mitigation/ (-1, , X, X- R/X/L) arstechnica.com/security/2014/02/biggest-ddos-ever-aimed-at-cloudflares-content-delivery-network/ (-1, -1, X, X- R/X/L) techcrunch.com/2013/12/02/akamai-buys-ddos-prevention-specialist-prolexic-for-370m-to-ramp-up-security-offerings/ (-1, -1, X, X- R/X/L) research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080921012859/http://research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (-1, -1, X, X- R/X/L) mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080910202908/http://mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (-1, -1, X, X- R/X/L) www.computerworld.com/s/article/94014/How_to_defend_against_DDoS_attacks (-1, , X, X- R/X/L) www.ecommercewisdom.com/relationship-firewalls-protection-ddos/ (-1, , X, X- R/X/L) www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_7-4/dos_attacks.html (-1, , X, X- R/X/L) www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0004963006220628 (-1, , X, X- R/X/L) staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-DoSSurveyComputerJournal.pdf (-1, , X, X- R/X/L) www.ic3.gov/media/2013/130107.aspx (-1, , X, X- R/X/L) www.fbi.gov/newark/press-releases/2010/nk051110.htm (-1, , X, X- R/X/L) www.microsoft.com/technet/security/advisory/975497.mspx (-1, , X, X- R/X/L) www.zdnet.com/blog/security/windows-7-vista-exposed-to-teardrop-attack/4222 (-1, , X, X- R/X/L) www.cert.org/historical/advisories/ca-1997-28.cfm (-1, , X, X- R/X/L) tools.ietf.org/html/rfc4987 (-1, , X, X- R/X/L) sourceforge.net/projects/slow-http-test/ (-1, , X, X- R/X/L) ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6158635 (-1, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA13-088A (-1, , X, X- R/X/L) www.isotf.org/news/DNS-Amplification-Attacks.pdf (-1, , X, X- R/X/L) web.archive.org/web/20101214074629/http://www.isotf.org/news/DNS-Amplification-Attacks.pdf (-1, -1, X, X- R/X/L) www.usenix.org/conference/woot15/workshop-program/presentation/p2p-file-sharing-hell-exploiting-bittorrent (-1, , X, X- R/X/L) dx.doi.org/10.1145/2663716.2663731 (-1, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA14-017A (-1, , X, X- R/X/L) www.icir.org/vern/papers/reflectors.CCR.01/reflectors.html (-1, , X, X- R/X/L) www.internetsociety.org/sites/default/files/01_5.pdf (-1, , X, X- R/X/L) eusecwest.com/speakers.html#PhlashDance (-1, , X, X- R/X/L) web.archive.org/web/20090201173324/http://eusecwest.com/speakers.html#PhlashDance (-1, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=154270&WT.svl=news1_1 (-1, , X, X- R/X/L) web.archive.org/web/20081208002732/http://www.darkreading.com/security/management/showArticle.jhtml?articleID=211201088 (-1, -1, X, X- R/X/L) www.theregister.co.uk/2008/05/21/phlashing/ (-1, , X, X- R/X/L) dcpp.wordpress.com/2007/05/22/denying-distributed-attacks/ (-1, , X, X- R/X/L) www.securityfocus.com/news/11466 (-1, , X, X- R/X/L) www.prolexic.com/news/20070514-alert.php (-1, , X, X- R/X/L) web.archive.org/web/20070803175513/http://www.prolexic.com/news/20070514-alert.php (-1, -1, X, X- R/X/L) anml.iu.edu/ddos/types.html (-1, , X, X- R/X/L) web.archive.org/web/20100914222536/http://anml.iu.edu/ddos/types.html (-1, -1, X, X- R/X/L) www.owasp.org/images/4/43/Layer_7_DDOS.pdf (-1, , X, X- R/X/L) www.scmagazineuk.com/akamai-warns-of-increased-activity-from-ddos-extortion-group/article/438333/ (-1, , X, X- R/X/L) www.bloomberg.com/news/articles/2015-09-09/bitcoin-ddos-ransom-demands-raise-dd4bc-profile?mod=djemRiskCompliance (-1, , X, X- R/X/L) blog.cloudbric.com/2015/09/whos-behind-ddos-attacks-and-how-can.html (-1, , X, X- R/X/L) www.incapsula.com/blog/cctv-ddos-botnet-back-yard.html (-1, , X, X- R/X/L) thehackernews.com/2015/10/cctv-camera-hacking.html (-1, , X, X- R/X/L) www.theregister.co.uk/2004/09/23/authorize_ddos_attack/ (-1, , X, X- R/X/L) www.sans.org/resources/idfaq/trinoo.php (-1, , X, X- R/X/L) blog.cloudbric.com/2015/08/has-your-website-been-bitten-by-zombie.html (-1, , X, X- R/X/L) aws.amazon.com/cloudwatch/ (-1, , X, X- R/X/L) theintercept.com/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/ (-1, , X, X- R/X/L) staff.washington.edu/dittrich/misc/stacheldraht.analysis.txt (-1, , X, X- R/X/L) web.archive.org/web/20131104052804/http://www.us-cert.gov/ncas/tips/st04-015 (-1, -1, X, X- R/X/L) www.us-cert.gov/ncas/tips/st04-015 (-1, , X, X- R/X/L) krebsonsecurity.com/2015/08/stress-testing-the-booter-services-financially/ (-1, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/ (-1, , X, X- R/X/L) www.darkreading.com/attacks-breaches/ddos-attack-used-headless-browsers-in-15/240162777 (-1, , X, X- R/X/L) web.archive.org/web/20140122165039/http://www.darkreading.com/attacks-breaches/ddos-attack-used-headless-browsers-in-15/240162777 (-1, -1, X, X- R/X/L) blogs.akamai.com/2015/01/q4-2014-state-of-the-internet---security-report-some-numbers.html (-1, , X, X- R/X/L) www.ababj.com/component/k2/item/4354-what-you-should-know-about-worsening-ddos-attacks (-1, , X, X- R/X/L) www.gartner.com/newsroom/id/2344217 (-1, , X, X- R/X/L) web.archive.org/web/20160930031903/https://thehackernews.com/2016/09/ddos-attack-iot.html (-1, -1, X, X- R/X/L) thehackernews.com/2016/09/ddos-attack-iot.html (-1, , X, X- R/X/L) web.archive.org/web/20161002000235/http://arstechnica.com/security/2016/09/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever/ (-1, -1, X, X- R/X/L) arstechnica.com/security/2016/09/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever/ (-1, -1, X, X- R/X/L) d-scholarship.pitt.edu/19225/1/FinalVersion.pdf (-1, 313, X, X- R/X/L) tqaweekly.com/episodes/season5/tqa-se5ep11.php (-1, , X, X- R/X/L) www.radicalphilosophy.com/article/the-philosophy-of-anonymous (-1, , X, X- R/X/L) dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/ (-1, , X, X- R/X/L) web.archive.org/web/20140513044100/http://dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/ (-1, -1, X, X- R/X/L) www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (-1, , X, X- R/X/L) web.archive.org/web/20140311070205/http://www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (-1, -1, X, X- R/X/L) blog.cloudflare.com/empty-ddos-threats-meet-the-armada-collective/ (-1, , X, X- R/X/L) www.us-cert.gov/ncas/tips/ST04-015 (-1, , X, X- R/X/L) sourceforge.net/projects/r-u-dead-yet/ (-1, , X, X- R/X/L) eusecwest.com (-1, , X, X- R/X/L) www.owasp.org/index.php/OWASP_HTTP_Post_Tool (-1, , X, X- R/X/L)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  42. 2017-11-22 01:51:15 (UTC): User Davydog t • c • dc • l • ef • b • bl; (22) to .us (edit | talk | history | links | watch | logs) (diff  !top) - Link: ns-cdn.neustar.biz/creative_services/biz/neustar/www/resources/domain-names/us-locality-compliance-report.pdf (R/Xmeta/L)
    Other links: ns-cdn.neustar.biz/creative_services/biz/neustar/www/resources/domain-names/us-locality-compliance-report.pdf (22, 1, 1, 1- R/X/L)
  43. 2017-11-26 15:35:57 (UTC): User AbeAbeModiin t • c • dc • l • ef • b • bl; (59) to User:AbeAbeModiin/sandbox (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/marketing/marketing-analytics (R/Xmeta/L)
    Other links: www.milkeninstitute.org/events/conferences/global-conference/2006/speaker-detail/2194 (59, , X, X- R/X/L) www.fortuneconferences.com/brainstormtech2010/speakers.html (59, , X, X- R/X/L) www.forbes.com/conferences/2012/cmo-summit-2012.html (59, , X, X- R/X/L) www.youtube.com/watch?v=g_BF5XEgTVY (59, -1, X, X- R/X/L) docplayer.org/796061-Congress-hall-mittwoch-wednesday-september-10-2014.html (59, , X, X- R/X/L) dld-conference.com/users/wes-nichols (59, , X, X- R/X/L) www.darwins-circle.com (59, , X, X- R/X/L) www.ami.org.au/imis15/News_2013_Nov/Annual_Conference_Review.aspx (59, , X, X- R/X/L) www.ana.net/conference/show/id/anc-oct11 (59, , X, X- R/X/L) ameblo.jp/adtechtokyo/theme-10016903393.html (59, , X, X- R/X/L) www.neustar.biz/blog/the-next-era-in-marketing-attribution-from-adobe-digital-marketing-summit-2012 (59, 61, X, X- R/X/L) hbr.org/2013/03/advertising-analytics-20 (59, , X, X- R/X/L) hbr.org/search?term=wes+nichols (59, , X, X- R/X/L) www.forbes.com/sites/neustar/2016/11/03/the-internet-of-things-is-disrupting-marketing-attribution-and-marketing-roi-will-never-be-the-same-again/#7d1fcf422acd (59, , X, X- R/X/L) www.rmc.edu/offices/president/board-of-trustees/members (59, , X, X- R/X/L) lapolicefoundation.org/who-we-are/our-leadership/ (59, , X, X- R/X/L) wfoa.wharton.upenn.edu/gab/nichols-wes/ (59, , X, X- R/X/L) www.reuters.com/article/brief-comscore-names-new-independent-dir/brief-comscore-names-new-independent-directors-to-board-idUSASB0BLDM (59, , X, X- R/X/L) quotes.wsj.com/BJRI/company-people (59, , X, X- R/X/L) ir.true.com/directors.cfm (59, , X, X- R/X/L) www.reuters.com/article/us-neustar-m-a-golden-gate/neustar-to-go-private-in-2-9-billion-deal-including-debt-idUSKBN1431J8 (59, , X, X- R/X/L) www.crunchbase.com/search/organizations/field/organizations/num_exits/upfront-ventures (59, , X, X- R/X/L) www.reuters.com/article/us-neustar-m-a-golden-gate/neustar-to-go-private-in-2-9-billion-deal-including-debt-idUSKBN1431J8 (59, , X, X- R/X/L) web.archive.org/web/20161213064345/https:/www.neustar.biz/about-us/leadership (59, -1, X, X- R/X/L) www.adweek.com/digital/neustar-buys-marketshare-partners-450-million-167978/#/ (59, , X, X- R/X/L) www.businesswire.com/news/home/20151105006876/en/Neustar-Acquire-Marketing-Analytics-Technology-Provider-MarketShare (59, , X, X- R/X/L) adage.com/article/cmo-strategy/neustar-purchases-marketshare-partners-450-million-deal/301249/ (59, , X, X- R/X/L) www.wsj.com/articles/ad-tech-company-neustar-agrees-to-buy-marketshare-for-450-million-1446757618 (59, , X, X- R/X/L) reprints.forrester.com/#/assets/2/79/'RES122695'/reports (59, , X, X- R/X/L) reprints.forrester.com/#/assets/2/79/'RES122695'/reports (59, , X, X- R/X/L) www.forrester.com/report/The+Forrester+Wave+CrossChannel+Attribution+Providers+Q4+2014/-/E-RES115221 (59, , X, X- R/X/L) www.forrester.com/report/The+Forrester+Wave+Marketing+Mix+Modeling+Q3+2011/-/E-RES60121 (59, , X, X- R/X/L) www.gartner.com/doc/1625815?ref=ddisp (59, , X, X- R/X/L) www.neustar.biz/about-us/news-room/press-releases/2015/for-third-straight-year-marketshare-named-one-of-the-fastest-growing-companies-in-north-america-on-deloittes-2015-technology-fast-500 (59, 61, X, X- R/X/L) www.inc.com/ss/em-maier/los-angeles-10-hottest-start-ups (59, , X, X- R/X/L) www.crunchbase.com/organization/marketshare (59, , X, X- R/X/L) labusinessjournal.com/news/2015/nov/05/marketshare-sold-450-million/ (59, , X, X- R/X/L) www.adweek.com/brand-marketing/tequila-brand-sense-work-together-62767/#/ (59, , X, X- R/X/L) www.campaignlive.co.uk/article/omnicom-launches-tequila-north-america/159134 (59, , X, X- R/X/L) adage.com/article/news/omnicom-buy-direct-partners/25292/ (59, , X, X- R/X/L) www.neustar.biz/marketing/marketing-analytics (59, 61, X, X- R/X/L) ir.comscore.com/board-of-directors (59, , X, X- R/X/L) insiders.morningstar.com/trading/board-of-directors.action?t=BJRI&region=usa&culture=en-US (59, , X, X- R/X/L) ir.true.com/directors.cfm (59, , X, X- R/X/L) upfront.com/team (59, , X, X- R/X/L) relationshipscience.com/johns-hopkins-university-carey-business-school-o27424312 (59, , X, X- R/X/L) www.rmc.edu/news-and-calendar/current-news/2016/06/27/wes-nichols-86-receives-prestigious-award (59, , X, X- R/X/L) www.businesswire.com/news/home/20160622006214/en/EY-Announces-Winners-EY-Entrepreneur-Year%C2%AE-2016 (59, , X, X- R/X/L) www.ami.org.au/imis15/News_2013_Nov/Annual_Conference_Review.aspx (59, , X, X- R/X/L) www.ami.org.au/imis15/News_2013_Nov/Annual_Conference_Review.aspx (59, , X, X- R/X/L) www.ypo.org/2015/03/dreams-to-reality-2015-global-edge-concludes-in-melbourne/ (59, , X, X- R/X/L) www.youtube.com/watch?v=Ak0AQ1ptm3I (59, -1, X, X- R/X/L) sites.google.com/site/thinktechsg/agenda-speakers (59, , X, X- R/X/L)
  44. 2017-11-29 00:57:21 (UTC): User Zone-Ghost t • c • dc • l • ef • b • bl; (2) to Neustar (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/about-us/news-room/press-releases/2016/neustar-to-be-acquired-by-group-led-by-golden-gate-capital (R/Xmeta/L)
    Other links: www.neustar.biz/about-us/news-room/press-releases/2017/acquisitionclose (2, 61, 2, 1- R/X/L) www.neustar.biz/about-us/news-room/press-releases/2016/neustar-to-be-acquired-by-group-led-by-golden-gate-capital (2, 61, 2, 1- R/X/L)
  45. 2017-12-21 00:54:55 (UTC): User Kbrose t • c • dc • l • ef • b • bl; (516) to Neustar (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/enterprise/ip-intelligence/digital-rights-management (R/Xmeta/L)
    Other links: www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2011/12/19/prweb9052269.DTL (516, -1, X, X- R/X/L) www.quova.com/about-us/ (516, 6, X, X- R/X/L) www.neustar.biz/enterprise/ip-intelligence/digital-rights-management (516, 61, X, X- R/X/L)

    User is in trusted groups rollbacker, reviewer on some wikis
  46. 2017-12-21 01:01:34 (UTC): User Kbrose t • c • dc • l • ef • b • bl; (516) to Neustar (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/security/dns-services/free-recursive-dns-service (R/Xmeta/L)
    Other links: www.enterprisenetworkingplanet.com/netsp/article.php/3727951 (516, 137, X, X- R/X/L) www.enterprisenetworkingplanet.com/netsp/article.php/3727951 (516, 137, X, X- R/X/L) www.dnsadvantage.com/about/index.html (516, 6, X, X- R/X/L) www.techworld.com/networking/features/index.cfm?featureid=3978&pn=2 (516, 401, X, X- R/X/L) web.archive.org/web/20080127134757/http://www.isp-planet.com/equipment/2008/neustar_ultra_services.html (516, -1, X, X- R/X/L) www.isp-planet.com/equipment/2008/neustar_ultra_services.html (516, 23, X, X- R/X/L) www.dnsadvantage.com/about/media_center.html (516, 6, X, X- R/X/L) www.prnewswire.com/news-releases/neustar-launches-dns-advantagetm-service-58660712.html (516, -1, X, X- R/X/L) www.neustar.biz/security/dns-services/free-recursive-dns-service (516, 61, X, X- R/X/L)

    User is in trusted groups rollbacker, reviewer on some wikis
  47. 2018-01-15 09:38:37 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Denial-of-service attack (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/services/ddos-protection (R/Xmeta/L)
    Other links: www.akamai.com/soti (-1, , X, X- R/X/L) tools.ietf.org/html/rfc4732 (-1, , X, X- R/X/L) www.pcworld.com/article/2056805/applicationlayer-ddos-attacks-are-becoming-increasingly-sophisticated.html (-1, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/DDoS%20Public%20Media%20Reports_0.xls (-1, , X, X- R/X/L) www.webcitation.org/5ws9nHATo?url=http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/DDoS%20Public%20Media%20Reports_0.xls (-1, , X, X- R/X/L) cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf (-1, , X, X- R/X/L) www.webcitation.org/5ws9RPpXi?url=http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf (-1, , X, X- R/X/L) www.youtube.com/watch?v=59AlNnX_Ksg (-1, -1, X, X- R/X/L) www.huffingtonpost.com/2013/01/12/anonymous-ddos-petition-white-house_n_2463009.html (-1, , X, X- R/X/L) www.legislation.gov.uk/ukpga/1990/18/section/3 (-1, , X, X- R/X/L) www.europol.europa.eu/content/international-action-against-dd4bc-cybercriminal-group (-1, , X, X- R/X/L) www.gpo.gov/fdsys/pkg/USCODE-2010-title18/html/USCODE-2010-title18-partI-chap47-sec1030.htm (-1, , X, X- R/X/L) www.caida.org/publications/animations/ (-1, , X, X- R/X/L) wnmufm.org/post/people-overload-website-hoping-help-search-missing-jet (-1, , X, X- R/X/L) news.bbc.co.uk/2/hi/business/6108502.stm (-1, , X, X- R/X/L) productforums.google.com/forum/?hl=en#!category-topic/websearch/unexpected-search-results/uFcXXixhiBw (-1, , X, X- R/X/L) news.bbc.co.uk/1/hi/8120324.stm (-1, , X, X- R/X/L) www.verizon.com/about/news/verizon-digital-media-services-launches-cloud-based-web-application-firewall-increases-defenses (-1, , X, X- R/X/L) www.verizonenterprise.com/products/security/enforcement-protection (-1, , X, X- R/X/L) www.darkreading.com/attacks-breaches/verisign-rolls-out-ddos-monitoring-service/d/d-id/1131916 (-1, , X, X- R/X/L) www.tatacommunications.com/news/release-view.asp?d=20110907-DDOS-protection (-1, , X, X- R/X/L) www.neustar.biz/services/ddos-protection (-1, 61, X, X- R/X/L) www.incapsula.com/infrastructure-ddos-protection-services.html (-1, , X, X- R/X/L) f5.com/products/platforms/silverline/f5-silverline-ddos-protection/under-attack (-1, , X, X- R/X/L) www.allot.com/service-providers/solutions/ddos-protection (-1, , X, X- R/X/L) www.business.att.com/content/productbrochures/ddos_prodbrief.pdf (-1, , X, X- R/X/L) www.arbornetworks.com/arbor-partner/alliances/technology-alliances/clean-pipes-2-0 (-1, , X, X- R/X/L) web.archive.org/web/20140714140141/http://www.arbornetworks.com/arbor-partner/alliances/technology-alliances/clean-pipes-2-0 (-1, -1, X, X- R/X/L) www.radware.com/Products/DefensePipe/ (-1, , X, X- R/X/L) www.level3.com/en/products/ddos-mitigation/ (-1, , X, X- R/X/L) arstechnica.com/security/2014/02/biggest-ddos-ever-aimed-at-cloudflares-content-delivery-network/ (-1, -1, X, X- R/X/L) techcrunch.com/2013/12/02/akamai-buys-ddos-prevention-specialist-prolexic-for-370m-to-ramp-up-security-offerings/ (-1, -1, X, X- R/X/L) research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080921012859/http://research.sprintlabs.com/publications/uploads/RR04-ATL-013177.pdf (-1, -1, X, X- R/X/L) mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080910202908/http://mehmet.suzen.googlepages.com/qos_ios_dos_suzen2005.pdf (-1, -1, X, X- R/X/L) www.computerworld.com/s/article/94014/How_to_defend_against_DDoS_attacks (-1, , X, X- R/X/L) www.ecommercewisdom.com/relationship-firewalls-protection-ddos/ (-1, , X, X- R/X/L) www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_7-4/dos_attacks.html (-1, , X, X- R/X/L) www.scitepress.org/DigitalLibrary/Link.aspx?doi=10.5220/0004963006220628 (-1, , X, X- R/X/L) staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-DoSSurveyComputerJournal.pdf (-1, , X, X- R/X/L) www.ic3.gov/media/2013/130107.aspx (-1, , X, X- R/X/L) www.fbi.gov/newark/press-releases/2010/nk051110.htm (-1, , X, X- R/X/L) www.microsoft.com/technet/security/advisory/975497.mspx (-1, , X, X- R/X/L) www.zdnet.com/blog/security/windows-7-vista-exposed-to-teardrop-attack/4222 (-1, , X, X- R/X/L) www.cert.org/historical/advisories/ca-1997-28.cfm (-1, , X, X- R/X/L) tools.ietf.org/html/rfc4987 (-1, , X, X- R/X/L) sourceforge.net/projects/slow-http-test/ (-1, , X, X- R/X/L) ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6158635 (-1, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA13-088A (-1, , X, X- R/X/L) www.isotf.org/news/DNS-Amplification-Attacks.pdf (-1, , X, X- R/X/L) web.archive.org/web/20101214074629/http://www.isotf.org/news/DNS-Amplification-Attacks.pdf (-1, -1, X, X- R/X/L) www.usenix.org/conference/woot15/workshop-program/presentation/p2p-file-sharing-hell-exploiting-bittorrent (-1, , X, X- R/X/L) dx.doi.org/10.1145/2663716.2663731 (-1, , X, X- R/X/L) www.us-cert.gov/ncas/alerts/TA14-017A (-1, , X, X- R/X/L) www.icir.org/vern/papers/reflectors.CCR.01/reflectors.html (-1, , X, X- R/X/L) www.internetsociety.org/sites/default/files/01_5.pdf (-1, , X, X- R/X/L) eusecwest.com/speakers.html#PhlashDance (-1, , X, X- R/X/L) web.archive.org/web/20090201173324/http://eusecwest.com/speakers.html#PhlashDance (-1, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=154270&WT.svl=news1_1 (-1, , X, X- R/X/L) web.archive.org/web/20081208002732/http://www.darkreading.com/security/management/showArticle.jhtml?articleID=211201088 (-1, -1, X, X- R/X/L) www.theregister.co.uk/2008/05/21/phlashing/ (-1, , X, X- R/X/L) dcpp.wordpress.com/2007/05/22/denying-distributed-attacks/ (-1, , X, X- R/X/L) www.securityfocus.com/news/11466 (-1, , X, X- R/X/L) www.prolexic.com/news/20070514-alert.php (-1, , X, X- R/X/L) web.archive.org/web/20070803175513/http://www.prolexic.com/news/20070514-alert.php (-1, -1, X, X- R/X/L) anml.iu.edu/ddos/types.html (-1, , X, X- R/X/L) web.archive.org/web/20100914222536/http://anml.iu.edu/ddos/types.html (-1, -1, X, X- R/X/L) www.owasp.org/images/4/43/Layer_7_DDOS.pdf (-1, , X, X- R/X/L) www.scmagazineuk.com/akamai-warns-of-increased-activity-from-ddos-extortion-group/article/438333/ (-1, , X, X- R/X/L) www.bloomberg.com/news/articles/2015-09-09/bitcoin-ddos-ransom-demands-raise-dd4bc-profile?mod=djemRiskCompliance (-1, , X, X- R/X/L) blog.cloudbric.com/2015/09/whos-behind-ddos-attacks-and-how-can.html (-1, , X, X- R/X/L) www.incapsula.com/blog/cctv-ddos-botnet-back-yard.html (-1, , X, X- R/X/L) thehackernews.com/2015/10/cctv-camera-hacking.html (-1, , X, X- R/X/L) www.theregister.co.uk/2004/09/23/authorize_ddos_attack/ (-1, , X, X- R/X/L) www.sans.org/resources/idfaq/trinoo.php (-1, , X, X- R/X/L) blog.cloudbric.com/2015/08/has-your-website-been-bitten-by-zombie.html (-1, , X, X- R/X/L) aws.amazon.com/cloudwatch/ (-1, , X, X- R/X/L) theintercept.com/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/ (-1, , X, X- R/X/L) staff.washington.edu/dittrich/misc/stacheldraht.analysis.txt (-1, , X, X- R/X/L) web.archive.org/web/20131104052804/http://www.us-cert.gov/ncas/tips/st04-015 (-1, -1, X, X- R/X/L) www.us-cert.gov/ncas/tips/st04-015 (-1, , X, X- R/X/L) krebsonsecurity.com/2015/08/stress-testing-the-booter-services-financially/ (-1, , X, X- R/X/L) www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/ (-1, , X, X- R/X/L) www.darkreading.com/attacks-breaches/ddos-attack-used-headless-browsers-in-15/240162777 (-1, , X, X- R/X/L) web.archive.org/web/20140122165039/http://www.darkreading.com/attacks-breaches/ddos-attack-used-headless-browsers-in-15/240162777 (-1, -1, X, X- R/X/L) blog.cloudflare.com/the-new-ddos-landscape/ (-1, , X, X- R/X/L) blogs.akamai.com/2015/01/q4-2014-state-of-the-internet---security-report-some-numbers.html (-1, , X, X- R/X/L) www.ababj.com/component/k2/item/4354-what-you-should-know-about-worsening-ddos-attacks (-1, , X, X- R/X/L) www.gartner.com/newsroom/id/2344217 (-1, , X, X- R/X/L) web.archive.org/web/20160930031903/https://thehackernews.com/2016/09/ddos-attack-iot.html (-1, -1, X, X- R/X/L) thehackernews.com/2016/09/ddos-attack-iot.html (-1, , X, X- R/X/L) web.archive.org/web/20161002000235/http://arstechnica.com/security/2016/09/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever/ (-1, -1, X, X- R/X/L) arstechnica.com/security/2016/09/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever/ (-1, -1, X, X- R/X/L) d-scholarship.pitt.edu/19225/1/FinalVersion.pdf (-1, 313, X, X- R/X/L) tqaweekly.com/episodes/season5/tqa-se5ep11.php (-1, , X, X- R/X/L) www.radicalphilosophy.com/article/the-philosophy-of-anonymous (-1, , X, X- R/X/L) dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/ (-1, , X, X- R/X/L) web.archive.org/web/20140513044100/http://dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/ (-1, -1, X, X- R/X/L) www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (-1, , X, X- R/X/L) web.archive.org/web/20140311070205/http://www.interpacket.com/42882/brand-com-victim-blackmail-attempt-says-president-mike-zammuto/ (-1, -1, X, X- R/X/L) blog.cloudflare.com/empty-ddos-threats-meet-the-armada-collective/ (-1, , X, X- R/X/L) www.us-cert.gov/ncas/tips/ST04-015 (-1, , X, X- R/X/L) sourceforge.net/projects/r-u-dead-yet/ (-1, , X, X- R/X/L) eusecwest.com (-1, , X, X- R/X/L) www.owasp.org/index.php/OWASP_HTTP_Post_Tool (-1, , X, X- R/X/L) sourceforge.net/projects/loicslow/ (-1, , X, X- R/X/L) sourceforge.net/projects/high-orbit-ion-cannon/ (-1, , X, X- R/X/L) sourceforge.net/projects/loic0/ (-1, , X, X- R/X/L) atlas.arbor.net/summary/dos (-1, , X, X- R/X/L) www.cert.org/tech_tips/denial_of_service.html (-1, , X, X- R/X/L) www.w3.org/Security/Faq/wwwsf6.html (-1, , X, X- R/X/L)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  48. 2019-07-12 23:30:57 (UTC): w:ar:User:JarBot (t - c; 4692528) to w:ar:ليزا هووك (diff  !top) - Link: www.neustar.biz/about-neustar/executive-team (R/Xmeta/L)
    Other links: web.archive.org/web/20101226125258/http://dc.citybizlist.com/5/2010/10/6/Neustar-Names-Lisa-Hook-CEO.aspx (4692528, -1, X, X- R/X/L) dc.citybizlist.com/5/2010/10/6/Neustar-Names-Lisa-Hook-CEO.aspx (4692528, 29, X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/article/2010/01/13/AR2010011304311.html (4692528, -1, X, X- R/X/L) www.neustar.biz/about-neustar/executive-team (4692528, 61, X, X- R/X/L)

    User is in a trusted group bot on some wikis
  49. 2019-12-10 20:41:11 (UTC): User LightandDark2000 t • c • dc • l • ef • b • bl; (20230) to Neustar (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/enterprise/ip-intelligence/digital-rights-management (R/Xmeta/L)
    Other links: www.neustar.biz/security/dns-services/free-recursive-dns-service (20230, 61, X, X- R/X/L) www.enterprisenetworkingplanet.com/netsp/article.php/3727951 (20230, 137, X, X- R/X/L) www.dnsadvantage.com/about/index.html (20230, 6, X, X- R/X/L) www.techworld.com/networking/features/index.cfm?featureid=3978&pn=2 (20230, 401, X, X- R/X/L) web.archive.org/web/20080127134757/http://www.isp-planet.com/equipment/2008/neustar_ultra_services.html (20230, -1, X, X- R/X/L) www.isp-planet.com/equipment/2008/neustar_ultra_services.html (20230, 23, X, X- R/X/L) www.dnsadvantage.com/about/media_center.html (20230, 6, X, X- R/X/L) www.prnewswire.com/news-releases/neustar-launches-dns-advantagetm-service-58660712.html (20230, -1, X, X- R/X/L) www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2011/12/19/prweb9052269.DTL (20230, -1, X, X- R/X/L) www.quova.com/about-us/ (20230, 6, X, X- R/X/L) www.neustar.biz/enterprise/ip-intelligence/digital-rights-management (20230, 61, X, X- R/X/L) techcrunch.com/2019/01/31/cloud-movie-locker-ultraviolet-is-finally-closing/ (20230, -1, X, X- R/X/L) techcrunch.com/2019/01/31/cloud-movie-locker-ultraviolet-is-finally-closing/ (20230, -1, X, X- R/X/L)

    User is in trusted groups rollbacker, reviewer on some wikis
  50. 2019-12-10 20:56:48 (UTC): User ChipWolf t • c • dc • l • ef • b • bl; (157) to Neustar (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/enterprise/ip-intelligence/digital-rights-management (R/Xmeta/L- still there)
    Other links: www.neustar.biz/security/dns-services/free-recursive-dns-service (157, 61, 2, 1- R/X/L) www.enterprisenetworkingplanet.com/netsp/article.php/3727951 (157, 137, 1, 1- R/X/L) www.dnsadvantage.com/about/index.html (157, 6, 2, 1- R/X/L) www.techworld.com/networking/features/index.cfm?featureid=3978&pn=2 (157, 401, 1, 0- R/X/L) web.archive.org/web/20080127134757/http://www.isp-planet.com/equipment/2008/neustar_ultra_services.html (157, -1, X, X- R/X/L) www.isp-planet.com/equipment/2008/neustar_ultra_services.html (157, 23, 1, 1- R/X/L) www.dnsadvantage.com/about/media_center.html (157, 6, 2, 1- R/X/L) www.prnewswire.com/news-releases/neustar-launches-dns-advantagetm-service-58660712.html (157, -1, X, X- R/X/L) www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2011/12/19/prweb9052269.DTL (157, -1, X, X- R/X/L) www.quova.com/about-us/ (157, 6, 1, 1- R/X/L) www.neustar.biz/enterprise/ip-intelligence/digital-rights-management (157, 61, 2, 1- R/X/L) techcrunch.com/2019/01/31/cloud-movie-locker-ultraviolet-is-finally-closing/ (157, -1, X, X- R/X/L) techcrunch.com/2019/01/31/cloud-movie-locker-ultraviolet-is-finally-closing/ (157, -1, X, X- R/X/L) www.alexa.com/siteinfo/neustar.biz (157, -1, X, X- R/X/L) www.ownit.nyc (157, 8, 1, 1- R/X/L)
  51. 2019-12-13 03:10:29 (UTC): User TheSunofman t • c • dc • l • ef • b • bl; (504) to Neustar (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.neustar.biz/enterprise/ip-intelligence/digital-rights-management (R/Xmeta/L- still there)
    Other links: www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2011/12/19/prweb9052269.DTL (504, -1, X, X- R/X/L) www.quova.com/about-us/ (504, 6, 1, 1- R/X/L) www.neustar.biz/enterprise/ip-intelligence/digital-rights-management (504, 61, 1, 1- R/X/L)
  • Displayed all 51 additions.