during the last few month I noticed an increasing number of unk-tags from MLDonkey-Clients, e.g. from a few minutes ago:
Quote
08.08.2006 11:03:36: Unknown eDonkey Protocol Opcode: 0xfa, Size=3.16 KB, Data=[42 01 75 56 a1 35 e3 c5 3d dc 3c cd 13 b6 f9 0b 14 a9 dd be bc 65 36 12 dd be bc 65 dd be ad c2 36 12 dd be ad c2 da 5a 14 c3 cc 29 da 5a 14 c3 d9 ec ec 0a 36 12 d9 ec ec 0a d9 ec d6 ad 36 12 d9 ec d6 ad d9 ec b1 bd 36 12 d9 ec b1 bd d9 ea 7f 4d 36 12 d9 ea 7f 4d d9 ea 7e 3b 36 12 d9 ea 7e 3b d9 e8..]; Client=XXX.XXX.XXX.XXX 'vmqooo' (MLdonkey v2.7.3,Connected/None/None)
08.08.2006 11:03:38: Unknown eDonkey Protocol Opcode: 0xfa, Size=3.60 KB, Data=[6f 01 75 56 a1 35 e3 c5 3d dc 3c cd 13 b6 f9 0b 14 a9 dd be bc 65 36 12 dd be bc 65 dd be ad c2 36 12 dd be ad c2 da 5a 14 c3 cc 29 da 5a 14 c3 d9 ec ec 0a 36 12 d9 ec ec 0a d9 ec d6 ad 36 12 d9 ec d6 ad d9 ec b1 bd 36 12 d9 ec b1 bd d9 ec b0 37 36 12 d9 ec b0 37 d9 ea 7f 4d 36 12 d9 ea 7f 4d d9 ea..]; Client=XXX.XXX.XXX.XXX 'zpqlnv' (MLdonkey v2.7.7,Connected/None/None)
As you can see I modified both the output as well as the number of chars to print to point out what enormous kind of spam that is! Just read it again: >30kB(!) on an unk tag - what's going on!? It seems to be some kind of "code" - if you compare the latter 2 examples you can see that they are very equal...
Does someone know what they are (trying) to send here?
GreetZ,
WiZ