Jan 18 10:43:08 internal2 named[15414]: client 76.9.16.171#23672: query (cache) './NS/IN' denied
since i blocked the second group (coincidentally they fall under one cidr range), they have been hammering my firewall with (what i'm assuming is) the same crap they were pelting my DNS server with...Jan 20 10:57:29 internal2 named[15414]: client 66.230.160.1#26242: query (cache) './NS/IN' denied
Jan 20 10:57:30 internal2 named[15414]: client 66.230.128.15#16886: query (cache) './NS/IN' denied
i've already emailed their abuse department without reply.IN=eth2 OUT=eth1 SRC=66.230.160.1 DST=192.168.1.11 LEN=45 TOS=0x00 PREC=0x00 TTL=48 ID=45945 PROTO=UDP SPT=20735 DPT=53 LEN=25
IN=eth2 OUT=eth1 SRC=66.230.128.15 DST=192.168.1.11 LEN=45 TOS=0x00 PREC=0x00 TTL=47 ID=39060 PROTO=UDP SPT=20161 DPT=53 LEN=25
IN=eth2 OUT=eth1 SRC=66.230.160.1 DST=192.168.1.11 LEN=45 TOS=0x00 PREC=0x00 TTL=47 ID=56296 PROTO=UDP SPT=63917 DPT=53 LEN=25
IN=eth2 OUT=eth1 SRC=76.9.16.171 DST=192.168.1.11 LEN=45 TOS=0x00 PREC=0x00 TTL=50 ID=64518 PROTO=UDP SPT=47812 DPT=53 LEN=25
IN=eth2 OUT=eth1 SRC=66.230.160.1 DST=192.168.1.11 LEN=45 TOS=0x00 PREC=0x00 TTL=48 ID=63675 PROTO=UDP SPT=17111 DPT=53 LEN=25
IN=eth2 OUT=eth1 SRC=66.230.160.1 DST=192.168.1.11 LEN=45 TOS=0x00 PREC=0x00 TTL=48 ID=64200 PROTO=UDP SPT=18622 DPT=53 LEN=25
IN=eth2 OUT=eth1 SRC=66.230.128.15 DST=192.168.1.11 LEN=45 TOS=0x00 PREC=0x00 TTL=47 ID=56195 PROTO=UDP SPT=59044 DPT=53 LEN=25
IN=eth2 OUT=eth1 SRC=66.230.128.15 DST=192.168.1.11 LEN=45 TOS=0x00 PREC=0x00 TTL=47 ID=29707 PROTO=UDP SPT=23832 DPT=53 LEN=25
i realize that these exploits might not originate from their networks, that those servers may be mere relaying the packets to my server...
all that said, has anyone else experienced these attacks via this company? anything i can do besides block them?
thanks



