Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What happens if an IP, rightfully included in the list, gets assigned to me or, worse, to the server I just rented?

Or if someone added my phone number as a prank, a revenge or an attack on me?



Don't worry, the lost revenue won't be material to earnings.


classy


Additionally some VPNs route through legitimate devices.

The only way I’ve seen this somewhat work is to have a complex system that pulls apart the connection info, and then you use a combination of data science + threat intel + good ol’ reversing to make decisions of if something is malicious or not. Then you need multiple teams to run and tune these functions as attacks change.


Would you be using that IP to make SIP calls or route SIP traffic? The bad actors will only be valid for 7 days.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: