I would start here:
Search results for: 81.196.69.167
OrgName: RIPE Network Coordination Centre
OrgID: RIPE
Address: Singel 258
Address: 1016 AB
City: Amsterdam
StateProv:
PostalCode:
Country: NL
ReferralServer: whois://whois.ripe.net:43
NetRange: 81.0.0.0 - 81.255.255.255
CIDR: 81.0.0.0/8
NetName: 81-RIPE
NetHandle: NET-81-0-0-0-1
Parent:
NetType: Allocated to RIPE NCC
NameServer: NS-PRI.RIPE.NET
NameServer: NS3.NIC.FR
NameServer: SUNIC.SUNET.SE
NameServer: AUTH62.NS.UU.NET
NameServer: SEC1.APNIC.NET
NameServer: SEC3.APNIC.NET
NameServer: TINNIE.ARIN.NET
Comment: These addresses have been further assigned to users in
Comment: the RIPE NCC region. Contact information can be found in
Comment: the RIPE database at
http://www.ripe.net/whoisRegDate:
Updated: 2004-03-16
That is the ip that the hack originated from.
It looks like they changed a user password for nina, deleted nina and readded the username, messed with /etc/named.conf aka bind, ssh, qmailr, groups, slapd, local hosts, smbd, imap mailboxes database, and not sure what else. Looks like they were trying to gain e-mail use for spam, imho. I personally would re-do the box with different usernames and a stronger admin password. I would create a username for the person who is going to administer the box and set them up through the user-manager, so they do not use the admin account.
Just my 2cents.
HTH marco