OpenBCM V1.08-5-g2f4a (Linux)

Packet Radio Mailbox

IZ3LSV

[San Dona' di P. JN]

 Login: GUEST





  
I0OJJ  > SYSOP    09.09.19 20:07l 38 Lines 1351 Bytes #999 (0) @ WW
BID : 57981I0OJJ
Read: GUEST
Subj: i0ojj.ampr.og attached again :)
Path: IZ3LSV<I0OJJ
Sent: 190909/1805z @:I0OJJ.ITA.EU [Rome] #:26539 $:57981i0ojj

>From i0ojj@winlink.org Mon Sep  9 20:05:08 2019
Received: from [44.134.32.240] by i0ojj.ampr.org (JNOS2.0k.3b2) with SMTP
	id AA26539 ; Mon, 09 Sep 2019 20:05:08 +0200
>From: Gustavo Ponza <i0ojj@winlink.org>
Organization: SICD Rome
Message-ID: <ea7cd89e-e82e-127c-0177-fe302b7670e4@winlink.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:52.0) Gecko/20100101 Firefox/52.0
 SeaMonkey/2.49.5
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi all,

this is for inform you that repeated actions with the aim
to force the subject system are repeated several times
during the entire 24 hours of each day.

Since the IPs used from the attacker(s) are part of all
the possible IP number allocations, it means that behind
this fact there is/are people on high level of powers.

The original thing is the use of the I0OJJ callsign,
ah, ah ah !!!

------------
17:21:24  86.120.27.60:4060 - incoming TN request
17:21:24  86.120.27.60:4060 - connected to remote system
17:21:24  86.120.27.60:4060 - from_ax25 loop starting up
17:21:24  34.236.23.227:8772 (3383) - from_remote starting up
17:21:25  34.236.23.227:8772 (3383) - application login as [I0OJJ]
17:22:24  86.120.27.60:4060 - from_ax25 loop terminated 62

-- 
73 and ciao, gustavo i0ojj/ir0aab/ir0eq
Credo quia absurdum est (Tertullianus)



Read previous mail | Read next mail


 18.10.2024 10:39:02lGo back Go up