Name Server: DNS3.SECHOST.RU
Name Server: DNS4.SECHOST.RU
In other words.. You have no hope in hell.inetnum: 184.108.40.206 - 220.127.116.11
descr: 7Web network
status: ASSIGNED PA
source: RIPE # Filtered
I would hardly consider retailiation in that form fair. Yes they are nulling scripts and causing problems, but DDOS's are ILLEGAL in almost all countries, as is hacking, and can easily cause you to go to jail.DDoS is the only option. Or find a php security hole and hack their site with nulling is bad or something like that.
So try mattswebhosting.com; <<>> DiG 9.2.4 <<>> -t A relokoton.com
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56183
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 0
;; QUESTION SECTION:
;relokoton.com. IN A
;; ANSWER SECTION:
relokoton.com. 14400 IN A 18.104.22.168
;; AUTHORITY SECTION:
relokoton.com. 86400 IN NS ns1.mattswebhosting.com.
relokoton.com. 86400 IN NS ns2.mattswebhosting.com.
;; Query time: 204 msec
;; SERVER: 22.214.171.124#53(126.96.36.199)
;; WHEN: Tue Oct 16 21:17:43 2007
;; MSG SIZE rcvd: 99
And its ThePlanet.com where the server is hosted.......rgName: ThePlanet.com Internet Services, Inc.
Address: 1333 North Stemmons Freeway
Address: Suite 110
NetRange: 188.8.131.52 - 184.108.40.206
NetType: Direct Allocation
RTechName: Pathos, Peter
OrgNOCName: Technical Support
OrgTechName: Technical Support
# ARIN WHOIS database, last updated 2007-10-16 19:10
# Enter ? for additional hints on searching ARIN's WHOIS database.
Yeah, But I didn't think of that at the time, I needed to test it so I could release it. I wasn't thinking of anything but getting it on the market.Thats why you serially number your scripts or you add in a varible that makes absolutely no sence so you know who leaked it.