Skip to content

Latest commit

 

History

History
28 lines (17 loc) · 476 Bytes

File metadata and controls

28 lines (17 loc) · 476 Bytes

Challenge:

Looks like there's been a bruteforce/password spray attempt against the website!

What's the contact email for the ISP of the attacker's IP?

Flag format: Email address, case insensitive


Solution:

Search for "login" in the provided JSON to get the IP address, then run:

whois 58.164.62.91 | grep mail

FLAG:
abuse@telstra.net