> so you can search your logs for it to make sure they aren't being evil.
This argument doesn't apply if the probe and the attack come from different IPs
> so you can search your logs for it to make sure they aren't being evil.
This argument doesn't apply if the probe and the attack come from different IPs