Reminds me of some funny stories I have from when I worked in abuse at an ISP.
One such pinhead called up and demanded to know why we were scanning port 53 on his network. Turns out a domain was registered that pointed to non-existent name servers on his network and they were using the domain to send mail. Joe -----Original Message----- From: Paul Johnson [mailto:[EMAIL PROTECTED] Sent: Thursday, October 28, 2004 9:38 PM To: [EMAIL PROTECTED] Subject: Re: scanning tools -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 James LeClar <[EMAIL PROTECTED]> writes: > I'm looking for a tool that can automate a network scan to determine > the number of hosts on a particular subnet, their ip addy, and their > hostname. Thanks for any advice. nmap can do that, just be sure to only use ping scanning to avoid port scanning everyone (time consuming and may infuriate anal retentive pinheads who have been mis-promoted to network administration status). -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.5 (GNU/Linux) iD8DBQFBgclCUzgNqloQMwcRAmZPAJ4pD4KFcSP1dq/xWkT25H4k5YLHiwCcCZOY odIObwrHSfUIiZnfmzFcbIc= =od0G -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]