Quote:
This question cannot be answered unless you describe the nature of the attack.
Your question is so vague, that we have no idea, really what you are talking about. A web attack? An SSH login attempt? A simple scan? Spam? What kind of attack?
Why would you ask such a question without providing any details and expect to get a useful answer?
Sorry.
To provide more details, with "attack" i meant SSH brute force - somebody tries to login as "Administrator" or with other users over SSH for many times. I think the IPs are always dynamic. To spam, what do you think of offers on the Web to subscribe for spam and of using it to spam spammers? Using email aliases, it would be possible. And, i didn't know (email) spam is considered as an attack.
To make my question in the first posting more precise: did I understand it right that for an attacker there will be no consequences?