NFOmation.net - Your Ultimate NFO Upload Resource! Viewing NFO file: rented_ovh-tlc-_leaking.to.usenet_-2010-readnfoforaffilsandracers.nfo rented_ovh-tlc-_leaking.to.usenet_-2010-readnfoforaffilsandracers
Hello, my name is Sherlock Scene and i'm here to castrate all dirty leakers :) I heard you all appreciated our last piece of work RENTED.GBIT.CALLED.THE.EDGE.EXPOSED.RUNNING.TORRENTVAULT.ORG.SEEDBOX-TORRENTFAULT Well this time we're about to expose some similar situation.. Many releases are leaking to usenet these days through alt.binaries.foreign @ efnet Started poking around and executing my 1337 social engineering skills: RENTED OVH site run by some friends of CheGuevar from alt.binaries.foreign AKA Gullyside @ Linknet GullySide is do@LinkNet-02ff942a7a.your.banlist.org * GullySide GullySide using link-net.org LinkNet IRC Network GullySide is an SSL Encrypted Client Gullyside End of /WHOIS list. CheGuevar is cheguevara@plz.donthack.us * CheGuevar CheGuevar on @#NZBMatrix.announce CheGuevar using irc.eversible.com Eversible.com Internet Services CheGuevar actually using host 67.220.66.51 CheGuevar End of /WHOIS list. We have an exact list of every file on the DRFTPD and it is 99% identical of what is being posted on >> usenet by 2 bots: https://www.binsearch.info/?max=250&g=alt.binaries.multimedia&a=foreign%404u.tv+%28teevee%29 https://www.binsearch.info/?max=250&g=alt.binaries.multimedia&a=Fake%40address.com+%28tvfreak%29 Releases raced on these sites (SWEDISH, DUTCH, FLEMISH) are mostly auto-uploaded onto usenet.. ############ # Sitename # ############ TLC ########## # AFFILS # ########## KTR OHRLY YUMYUM FuGLi JBM Nukleotide ENEMY G4E CiA SQUiZZiEs SQsR SPORTSBAR EXT REVOLTE FLiK SPiEGEL >> CRiMSON OMiCRON CiO YUMYUM ####### # FTP # ####### 188.165.209.74:1221 [1] Connecting to 188.165.209.74:1221 [1] 220 DrFTPD+ 2.0 (+STABLE+) $Revision: 1761 $ http://drftpd.org [1] AUTH SSL [1] 234 AUTH SSL successful [1] Encryption algorithm: TLSv1 EDH-DSS-DES-CBC3-SHA-168 PORT STATE SERVICE VERSION 21/tcp open ftp ProFTPD 1.3.2c 22/tcp open ssh OpenSSH 5.3p1 Debian 3ubuntu4 (protocol 2.0) | ssh-hostkey: 1024 4f:4b:1d:89:d1:0a:60:46:bf:2d:4d:50:fe:3e:95:c4 (DSA) |_2048 8e:43:08:c3:37:c9:f4:cd:e4:aa:11:09:53:46:64:d6 (RSA) 111/tcp open rpcbind 2 (rpc #100000) 445/tcp filtered microsoft-ds 1099/tcp open ssl/unknown 10000/tcp open http MiniServ 1.530 (Webmin httpd) Feel free to use any exploit u got :) ######## # IRCD # ######## tlcirc.servebeer.com:7171 95.211.85.71:7171 PORT STATE SERVICE VERSION 23/tcp open socks-proxy CCProxy socks proxy (unauthorized) 25/tcp open socks-proxy CCProxy socks proxy (unauthorized) |_smtp-commands: Couldn't establish connection on port 25 110/tcp open socks-proxy CCProxy socks proxy (unauthorized) 119/tcp open socks-proxy CCProxy socks proxy (unauthorized) 135/tcp filtered msrpc 139/tcp filtered netbios-ssn 445/tcp filtered microsoft-ds 808/tcp open http-proxy CCProxy http proxy (unauthorized) 1080/tcp open socks5 (Username/password authentication required) 2121/tcp open socks-proxy CCProxy socks proxy (unauthorized) 3389/tcp open ms-term-serv? 3998/tcp open unknown 5800/tcp open http VNC Server Enterprise Edition httpd E4.5.1 r27892 (VNC port 5900) |_http-methods: No Allow or Public header in OPTIONS response (status code 501) 5900/tcp open vnc VNC (protocol 3.3; Locked out) 49152/tcp open msrpc Microsoft Windows RPC 49153/tcp open msrpc Microsoft Windows RPC 49154/tcp open msrpc Microsoft Windows RPC 49155/tcp open msrpc Microsoft Windows RPC 49156/tcp open msrpc Microsoft Windows RPC ########## # SLAVES # ########## 94.23.210.57 PORT STATE SERVICE VERSION 135/tcp open msrpc Microsoft Windows RPC 3389/tcp open ms-term-serv 188.165.211.176 PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.3p1 Debian 3ubuntu4 (protocol 2.0) | ssh-hostkey: 1024 c9:3e:8d:aa:16:27:36:f1:c7:b1:e8:8f:4b:95:ac:56 (DSA) |_2048 8a:cd:63:38:95:42:ca:95:b5:ee:7f:d2:36:c2:02:c4 (RSA) 445/tcp filtered microsoft-ds 33354/tcp open unknown 40193/tcp open unknown 49175/tcp open unknown //////////////////////////////////////////////////////////////////////////// /// /// If you have any of these users on your sites, please deluser them ! /// /// /// /// Oh, and don't forget to ban all OVH ranges... /// /// /// /// /// /// 87.98.128.0-87.98.255.255 /// /// 91.121.0.0-91.121.255.255 /// /// 94.23.0.0-94.23.255.255 /// /// 178.32.0.0-128.33.255.255 /// /// 188.165.0.0-188.165.255.255 /// /// 213.186.32.0-213.186.63.255 /// /// 213.251.128.0-213.251.191.255 /// /// /// //////////////////////////////////////////////////////////////////////////// #TLC-CHAT %ajay &CM &shaker &TLC-WHORE @P_R_E _clyd_ _rAT ~starr analoque AnSw3R Assassin bar BoNeZ BongMan BreakYoSef c_ C00kie crappi cutme dadude EHCan enforcer enV FenWin funny gb1t GbA GENiUS gow hope imadrunk Impact JHaMSeN keeper Kossiwa ---> user from .nl rented gbit LOS littlebrotha Martin mavado metroguy muiter n3m3s1s Nymph olah paperboy Petabyte pr0k Prime radeno ---> on every Rented site you can imagine RAWisWAR RoxxorsDenoobs rrr Sempron Sharker sharks ShubNiggurath SnakeEye2 Spark01 TiPloiT tyum weiner whitenigger xiU Yaha ZeRaW This NFO File was rendered by NFOmation.net
Hello, my name is Sherlock Scene and i'm here to castrate all dirty leakers :) I heard you all appreciated our last piece of work RENTED.GBIT.CALLED.THE.EDGE.EXPOSED.RUNNING.TORRENTVAULT.ORG.SEEDBOX-TORRENTFAULT Well this time we're about to expose some similar situation.. Many releases are leaking to usenet these days through alt.binaries.foreign @ efnet Started poking around and executing my 1337 social engineering skills: RENTED OVH site run by some friends of CheGuevar from alt.binaries.foreign AKA Gullyside @ Linknet GullySide is do@LinkNet-02ff942a7a.your.banlist.org * GullySide GullySide using link-net.org LinkNet IRC Network GullySide is an SSL Encrypted Client Gullyside End of /WHOIS list. CheGuevar is cheguevara@plz.donthack.us * CheGuevar CheGuevar on @#NZBMatrix.announce CheGuevar using irc.eversible.com Eversible.com Internet Services CheGuevar actually using host 67.220.66.51 CheGuevar End of /WHOIS list. We have an exact list of every file on the DRFTPD and it is 99% identical of what is being posted on >> usenet by 2 bots: https://www.binsearch.info/?max=250&g=alt.binaries.multimedia&a=foreign%404u.tv+%28teevee%29 https://www.binsearch.info/?max=250&g=alt.binaries.multimedia&a=Fake%40address.com+%28tvfreak%29 Releases raced on these sites (SWEDISH, DUTCH, FLEMISH) are mostly auto-uploaded onto usenet.. ############ # Sitename # ############ TLC ########## # AFFILS # ########## KTR OHRLY YUMYUM FuGLi JBM Nukleotide ENEMY G4E CiA SQUiZZiEs SQsR SPORTSBAR EXT REVOLTE FLiK SPiEGEL >> CRiMSON OMiCRON CiO YUMYUM ####### # FTP # ####### 188.165.209.74:1221 [1] Connecting to 188.165.209.74:1221 [1] 220 DrFTPD+ 2.0 (+STABLE+) $Revision: 1761 $ http://drftpd.org [1] AUTH SSL [1] 234 AUTH SSL successful [1] Encryption algorithm: TLSv1 EDH-DSS-DES-CBC3-SHA-168 PORT STATE SERVICE VERSION 21/tcp open ftp ProFTPD 1.3.2c 22/tcp open ssh OpenSSH 5.3p1 Debian 3ubuntu4 (protocol 2.0) | ssh-hostkey: 1024 4f:4b:1d:89:d1:0a:60:46:bf:2d:4d:50:fe:3e:95:c4 (DSA) |_2048 8e:43:08:c3:37:c9:f4:cd:e4:aa:11:09:53:46:64:d6 (RSA) 111/tcp open rpcbind 2 (rpc #100000) 445/tcp filtered microsoft-ds 1099/tcp open ssl/unknown 10000/tcp open http MiniServ 1.530 (Webmin httpd) Feel free to use any exploit u got :) ######## # IRCD # ######## tlcirc.servebeer.com:7171 95.211.85.71:7171 PORT STATE SERVICE VERSION 23/tcp open socks-proxy CCProxy socks proxy (unauthorized) 25/tcp open socks-proxy CCProxy socks proxy (unauthorized) |_smtp-commands: Couldn't establish connection on port 25 110/tcp open socks-proxy CCProxy socks proxy (unauthorized) 119/tcp open socks-proxy CCProxy socks proxy (unauthorized) 135/tcp filtered msrpc 139/tcp filtered netbios-ssn 445/tcp filtered microsoft-ds 808/tcp open http-proxy CCProxy http proxy (unauthorized) 1080/tcp open socks5 (Username/password authentication required) 2121/tcp open socks-proxy CCProxy socks proxy (unauthorized) 3389/tcp open ms-term-serv? 3998/tcp open unknown 5800/tcp open http VNC Server Enterprise Edition httpd E4.5.1 r27892 (VNC port 5900) |_http-methods: No Allow or Public header in OPTIONS response (status code 501) 5900/tcp open vnc VNC (protocol 3.3; Locked out) 49152/tcp open msrpc Microsoft Windows RPC 49153/tcp open msrpc Microsoft Windows RPC 49154/tcp open msrpc Microsoft Windows RPC 49155/tcp open msrpc Microsoft Windows RPC 49156/tcp open msrpc Microsoft Windows RPC ########## # SLAVES # ########## 94.23.210.57 PORT STATE SERVICE VERSION 135/tcp open msrpc Microsoft Windows RPC 3389/tcp open ms-term-serv 188.165.211.176 PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.3p1 Debian 3ubuntu4 (protocol 2.0) | ssh-hostkey: 1024 c9:3e:8d:aa:16:27:36:f1:c7:b1:e8:8f:4b:95:ac:56 (DSA) |_2048 8a:cd:63:38:95:42:ca:95:b5:ee:7f:d2:36:c2:02:c4 (RSA) 445/tcp filtered microsoft-ds 33354/tcp open unknown 40193/tcp open unknown 49175/tcp open unknown //////////////////////////////////////////////////////////////////////////// /// /// If you have any of these users on your sites, please deluser them ! /// /// /// /// Oh, and don't forget to ban all OVH ranges... /// /// /// /// /// /// 87.98.128.0-87.98.255.255 /// /// 91.121.0.0-91.121.255.255 /// /// 94.23.0.0-94.23.255.255 /// /// 178.32.0.0-128.33.255.255 /// /// 188.165.0.0-188.165.255.255 /// /// 213.186.32.0-213.186.63.255 /// /// 213.251.128.0-213.251.191.255 /// /// /// //////////////////////////////////////////////////////////////////////////// #TLC-CHAT %ajay &CM &shaker &TLC-WHORE @P_R_E _clyd_ _rAT ~starr analoque AnSw3R Assassin bar BoNeZ BongMan BreakYoSef c_ C00kie crappi cutme dadude EHCan enforcer enV FenWin funny gb1t GbA GENiUS gow hope imadrunk Impact JHaMSeN keeper Kossiwa ---> user from .nl rented gbit LOS littlebrotha Martin mavado metroguy muiter n3m3s1s Nymph olah paperboy Petabyte pr0k Prime radeno ---> on every Rented site you can imagine RAWisWAR RoxxorsDenoobs rrr Sempron Sharker sharks ShubNiggurath SnakeEye2 Spark01 TiPloiT tyum weiner whitenigger xiU Yaha ZeRaW This NFO File was rendered by NFOmation.net