If there is a boring task when you are investigating a security incident, it’s the process of gathering all information related to the involved IP addresses: What are the IP addresses used, routing information (AS), geo-localisation and abuse information gathering. Alexandre Dulaunoy wrote a cool piece of Perl code to
Tag: Abuse
A “Google Analytics” for Government Requests?
Google released interesting statistics about the number of requests they received from Governments Agencies around the world. If you offer free services on the Internet, they are (mis)chances that people will try to abuse of them. Google is certainly not the exception with all the services they provide: webmail, web