[quote:8f856fa3e2][i:8f856fa3e2]Originally posted by xnull[/i:8f856fa3e2]
Heh, that's nothing.. We were getting 2mb-20mb attack logs by email every day for about 8 months.. They stopped for a while and I'm getting them again every once in a while now (software error? or no attacks?) lol..[/quote:8f856fa3e2]
it seems that you are new to hackers I wrote it in this thread about what they want to do
http://forums.cpanel.net/read.php?TID=3523
RPC information located at Port 111 is a place to find out where services are running. Numerous vulnerabilities exist, along with exploits ready and waiting for services such as rpcbind and rpcmountd. Network File Service (NFS) has a known rpc-update exploit, the Network Information Service (NIS) update daemon rpc.ypupdated contains vulnerabilities in how it passes commands to certain function calls. This could allow a remote attacker to trick the service into executing arbitrary commands on the system with root privileges. Additionally, client server environments that use remote program calls and port 111 to register and make themselves available, are unfortunately also listing their availability to the less-than nice people who are trying to crack your system. For the unprotected systems that have portmapper running on port 111, a simple &rpcinfo& request is adequate for the potential exploiter to obtain a list of all services running.
Also bind 9.2.1 has vulnerability now that will be resolved in the next version 9.2.2 or 9.30
There are some of these exploits that hackers try to get into your system