<html><head><meta http-equiv="Content-Type" content="text/html charset=windows-1252"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" class="">That’s a pretty typical “attack profile” … The victim either moves providers trying to escape the attack or the domain expires/deletes, gets picked up and the new owner suddenly finds themselves under attack too…<div class=""><br class=""></div><div class=""><br class=""><div><blockquote type="cite" class=""><div class="">On Dec 11, 2014, at 4:50 PM, Dnsbed (Jeff) <<a href="mailto:support@dnsbed.com" class="">support@dnsbed.com</a>> wrote:</div><br class="Apple-interchange-newline"><div class="">
<meta content="text/html; charset=ISO-8859-1" http-equiv="Content-Type" class="">
<div bgcolor="#FFFFFF" text="#000000" class="">DNSMadeEasy, DNSimple, 
1AND1 were under attacks these days.<br class="">
I heard DNSMadeEasy and DNSimple were attacked due to the same domain 
name hosted there.<br class="">
<br class="">
Livingood, Jason wrote:
<blockquote cite="mid:D0AF8A30.EDE67%25jason_livingood@cable.comcast.com" type="cite" class="">
  <div class="">Seems like a lot of DNS abuse happening this week. Surely there’s
 a wider story someplace?</div>

  <div class=""><br class="">
  </div>

  <div class="">Jason</div>
</blockquote>
<br class="">
<div class="moz-signature">-- <br class="">Best Regards,<br class="">


<a href="http://www.dnsbed.com/" class="">DNSbed Hosting</a><br class="">


<br class="">

</div>
</div></div></blockquote></div><br class=""></div></body></html>