{"id":87,"date":"2003-07-15T03:01:47","date_gmt":"2003-07-14T20:01:47","guid":{"rendered":""},"modified":"2003-07-15T03:01:47","modified_gmt":"2003-07-14T20:01:47","slug":"gnutella-blackhole","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2003\/07\/gnutella-blackhole\/","title":{"rendered":"Gnutella blackhole"},"content":{"rendered":"<p>there is a script active on Gnutella that is an IP trap.<\/p>\n<p>there are two files that show up, one named &#8220;how to download (search term).html&#8221;, the other named &#8220;(search term).mpg&#8221;<\/p>\n<p>the IP supporting these files fall in the range of 194.228.211.200 to 194.228.211.207<br \/>\n194.228.211.204 is the most common.  any others are downloads in the share folders of victims of this trap.<\/p>\n<p>these IP&#8217;s belong to Jitka Vackova of Czechoslavakia.<!--more--><\/p>\n<p>if the name doesn&#8217;t ring a bell, he was a major force in busting HotLine and Napster servers.  basically, he&#8217;s been getting rich writing scripts and tracers that automatically list pirating IP&#8217;s, selling the results to warez cops for top dollar.<\/p>\n<p>so if you are still using Gnutella, do not download these files, unless you want your IP to be on a list he sells to RIAA.  if you have downloaded them, find a new ISP immediately and hope it doesn&#8217;t haunt you.<\/p>\n<p>feel free to pass this post along to other sites.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ip warning 194.228.211.200 to 194.228.211.207<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-87","post","type-post","status-publish","format-standard","hentry","category-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-1p","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/87","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=87"}],"version-history":[{"count":0,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/87\/revisions"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=87"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=87"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=87"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}