Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


has anyone gone through this - Page 3
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

has anyone gone through this

13

Comments

  • lexandrilexandri Member
    edited April 2023

    @CheepCluck said:

    @lexandri said: and how do you explain to me the traffic that does not exist?

    >
    What do you mean it does not exist? Are you telling me that every source listed here is fake? Do you think all these people are just saying they got a bruteforce from this IP just because they don't like you or something - or do you think the provider is making bogus complaints because reasons?

    you are another stupid that you are getting into they may have a compromised network
    for any vulnerability because the panel shows traffic exiting with the server off
    apart from the reports that exist without me even being a customer

  • CheepCluckCheepCluck Member
    edited April 2023

    @lexandri said: you are another stupid that you are getting into they may have a compromised network
    for any vulnerability because the panel shows traffic exiting with the server off

    Right, I'm stupid because i can lock down SSH and monitor my service. You're smart because you're too good to address your compromised machine. We're all dumb here, and we're so happy to be graced by your fine administrative abilities.

  • @lexandri said:
    this is so hilarious the server has been down for 12 hours
    and has an attack record with 7 hours with the server off

    Let's just say that if you slow down, you'll find that the time of the outbound attacks logged in the report comments are sometimes earlier than the time of the reports -- so there could be a lag time in reporting for an incident occurring earlier.

  • @CheepCluck said:

    @lexandri said: you are another stupid that you are getting into they may have a compromised network
    for any vulnerability because the panel shows traffic exiting with the server off

    Right, I'm stupid because i can lock down SSH and monitor my service. You're smart because you're too good to address your compromised machine. We're all dumb here, and we're so happy to be graced by your fine administrative abilities.

    server is completely offline how am i going to monitor and block on something off

    do you know the word off/down?

    and the ghost is inside it turned off doing brute force and sending traffic to the solusvm control panel

  • @lexandri said:

    @CheepCluck said:

    @lexandri said: and how do you explain to me the traffic that does not exist?

    >
    What do you mean it does not exist? Are you telling me that every source listed here is fake? Do you think all these people are just saying they got a bruteforce from this IP just because they don't like you or something - or do you think the provider is making bogus complaints because reasons?

    you are another stupid that you are getting into they may have a compromised network
    for any vulnerability because the panel shows traffic exiting with the server off
    apart from the reports that exist without me even being a customer

    I guess you don't understand that "the most recent report was 7 hours ago" does not mean "the attack took place 7 hours ago".

    By the way, were you using a weak password?

  • @tototo said:

    @lexandri said:

    @CheepCluck said:

    @lexandri said: and how do you explain to me the traffic that does not exist?

    >
    What do you mean it does not exist? Are you telling me that every source listed here is fake? Do you think all these people are just saying they got a bruteforce from this IP just because they don't like you or something - or do you think the provider is making bogus complaints because reasons?

    you are another stupid that you are getting into they may have a compromised network
    for any vulnerability because the panel shows traffic exiting with the server off
    apart from the reports that exist without me even being a customer

    I guess you don't understand that "the most recent report was 7 hours ago" does not mean "the attack took place 7 hours ago".

    By the way, were you using a weak password?

    I think you didn't read or didn't understand that the machine was suspended more than 24 hours ago it was activated for 1 hour and formatted and turned off more than 12 hours ago and before being a client it already had the reports and the server is still offline and reports are coming .... are they using an analog machine to make these reports?

  • @lexandri said:
    server is completely offline how am i going to monitor and block on something off

    do you know the word off/down?

    and the ghost is inside it turned off doing brute force and sending traffic to the solusvm control panel

    Do you know that the abuse reporting site you just used isn't real-time tracking of your abuse complaints right? IPDB is stating 7 hours ago, and no new ones since. Since you're obviously a 420IQ wizard, you should know what a delay is ... right?

    I don't understand how you can be so defensively stupid about your ineptitudes.

    Thanked by 1JasonM
  • lexandrilexandri Member
    edited April 2023

    @CheepCluck said:

    @lexandri said: and how do you explain to me the traffic that does not exist?

    >
    What do you mean it does not exist? Are you telling me that every source listed here is fake? Do you think all these people are just saying they got a bruteforce from this IP just because they don't like you or something - or do you think the provider is making bogus complaints because reasons?

    I see you are stupid as their team is defending.
    trafficking is incompatible with brute force
    they only read the last 5 reports out of 249 over 6 months
    after 249 reports and they decided to take some action or find someone to blame because the reports came before I had the services active
    Bandwidth logging is incompatible with brute force syslog has no ssh output
    HD read and write same thing
    what capacity does a vps single core 2gb brute force without crashing and push 5.1tb of traffic in 24 hours

  • @TrK said:
    Idk but i want the stuff OP is smoking.

    Still want what this guy is smoking?
    Someones going to need to slap a prop 65 warning on OP.

    Thanked by 2JasonM dahartigan
  • lexandrilexandri Member
    edited April 2023


    if it were to use or make attacks I would do it through these other 12 servers
    I just wouldn't use a single core vps with 2gb

  • @lexandri said:
    I think you didn't read or didn't understand that the machine was suspended more than 24 hours ago it was activated for 1 hour and formatted and turned off more than 12 hours ago

    Since you have reformatted your machine, this is an excellent chance to commence logging on all outbound packets destined for port 22. Those very logs can exonerate you of subsequent attacks attributed to your VPS.

    I would also consider performing hourly incremental backup of your work until the attacks are resolved (excellent for rollback during troubleshooting). Since node.js is primarily used on your VPS, you should not rule out that the node.js libraries used are not compromised -- the packet logging will point clearly to the node.js process if indeed the problem.

    Best of luck Sherlock!

  • @joshnsg said:

    @lexandri said:
    I think you didn't read or didn't understand that the machine was suspended more than 24 hours ago it was activated for 1 hour and formatted and turned off more than 12 hours ago

    Since you have reformatted your machine, this is an excellent chance to commence logging on all outbound packets destined for port 22. Those very logs can exonerate you of subsequent attacks attributed to your VPS.

    I would also consider performing hourly incremental backup of your work until the attacks are resolved (excellent for rollback during troubleshooting). Since node.js is primarily used on your VPS, you should not rule out that the node.js libraries used are not compromised -- the packet logging will point clearly to the node.js process if indeed the problem.

    Best of luck Sherlock!

    if it were the node, there would still be output logs in the syslog problem is that it does not have this and it is impossible for a single core vps to push 5tb in 24 hours

  • Just by the subject of this thread we all knew PEBKAC.

    Seriously, why is a useful subject describing the point of the thread so fucking hard? People like this should get their Internet suspended.

    Thanked by 2dahartigan Void
  • mmm tasty drama

  • lol we checked with our team of lawyers and very interesting the ceo/owner has 52 lawsuits by racknerd this will soon be a bankruptcy estate they won't have money to recoup

  • @CheepCluck said:

    @lexandri said: and how do you explain to me the traffic that does not exist?

    >
    What do you mean it does not exist? Are you telling me that every source listed here is fake? Do you think all these people are just saying they got a bruteforce from this IP just because they don't like you or something - or do you think the provider is making bogus complaints because reasons?

    He is only right here rest everyone is lying

  • lexandrilexandri Member
    edited April 2023

    @sreekanth850 said:

    @CheepCluck said:

    @lexandri said: and how do you explain to me the traffic that does not exist?

    >
    What do you mean it does not exist? Are you telling me that every source listed here is fake? Do you think all these people are just saying they got a bruteforce from this IP just because they don't like you or something - or do you think the provider is making bogus complaints because reasons?

    He is only right here rest everyone is lying

    I think another one who didn't read and took the plane walking
    the logs and abuses exist in ipabuse
    however there is no log inside the vps server with 2gb of single core ram
    push 5tb in 24 hours by brute force on a single core machine with 2gb
    I want to know what magic is this for a single core vps to do this miracle

    I want this magic so I don't have to pay for multiple servers and balance with a single core working multithreaded miracles

  • CheepCluckCheepCluck Member
    edited April 2023

    Yup, this is a psyop against OP. I confirmed this by consuming some mescaline and talked to the logging gods. Racknard obviously paid all these other people into reporting the IP so he can stave off bankruptcy for another week.

    The world is out against OP by reporting his IP for ssh brute forces. They did nothing wrong. We're all wrong, and we should feel like ourselves - very stupids.

    Edit:
    And to confirm, I consulted my friend who runs a minecraft server - you need a 69THz 420core CPU with SMT-8 and a 1Pbit port to send SSH bruteforce attacks. There was absolutely no way he could've done this!

    Thanked by 3bruh21 kasodk Void
  • fazarfazar Member

    112 cores with load avg. 73. What the..

  • ralfralf Member

    @fazar said:

    112 cores with load avg. 73. What the..

    That's a lot of ssh key exchanges..

    Thanked by 2CheepCluck dystopia
  • Either OP got hacked and turned into a node on a botnet or OP is a skid who is abusing ones and zeros.

    My bet is the latter.

  • @dahartigan said:
    Either OP got hacked and turned into a node on a botnet or OP is a skid who is abusing ones and zeros.

    My bet is the latter.

    If OP is hacked, he will be willing to do things like many said here, instead he keep on bashing the host and people here and trying prove verbally that he is not the one who abuses but the network is hacked.

  • @sreekanth850 said:

    @dahartigan said:
    Either OP got hacked and turned into a node on a botnet or OP is a skid who is abusing ones and zeros.

    My bet is the latter.

    If OP is hacked, he will be willing to do things like many said here, instead he keep on bashing the host and people here and trying prove verbally that he is not the one who abuses but the network is hacked.

    I think I'm the one who looked for the company to deal with the solution, they just ignored it and wanted to abuse it, nothing more, not very concerned about customers their rule I simply do it my way and that's it, you customer, let yourself customer I let them down and let's take this to the law for company abuse it's not for the money or for the server, yes, for the abuse of the company, let's give him work in court

  • @fazar said:

    112 cores with load avg. 73. What the..

    I don't think you can imagine what it would be like to work with a big tech streaming
    that's just one of the small servers there are others at peak hours that use 90%

  • rustelekomrustelekom Member, Patron Provider

    Let me draw your attention to the reasons why service providers are only willing to run a server after it has been reinstalled. This measure is necessary to prevent hackers from gaining access to stolen data and then using it to launch new attacks against systems hosted on the Internet.

  • @rustelekom said:
    Let me draw your attention to the reasons why service providers are only willing to run a server after it has been reinstalled. This measure is necessary to prevent hackers from gaining access to stolen data and then using it to launch new attacks against systems hosted on the Internet.

    let me alert you that the system / vps / machine had no output logs just the ip and network

    it is clearly configured that their network allows spoofing or someone has not been compromised it is impossible for a single core vps 2gb to push 5tb of traffic in 1 day running brute force attack it does not run 200 threads ever from a bruteforce

  • rustelekomrustelekom Member, Patron Provider

    @lexandri said: let me alert you that the system / vps / machine had no output logs just the ip and network

    it is clearly configured that their network allows spoofing or someone has not been compromised it is impossible for a single core vps 2gb to push 5tb of traffic in 1 day running brute force attack it does not run 200 threads ever from a bruteforce

    I respectfully refuse to delve into the specifics of this case in detail. Instead, I tried to explain the reasons behind the actions taken by the service provider in certain circumstances.

    I have no authority or trust in you to make any accusations against you.

    Thanked by 1dystopia
  • @rustelekom said:

    @lexandri said: let me alert you that the system / vps / machine had no output logs just the ip and network

    it is clearly configured that their network allows spoofing or someone has not been compromised it is impossible for a single core vps 2gb to push 5tb of traffic in 1 day running brute force attack it does not run 200 threads ever from a bruteforce

    I respectfully refuse to delve into the specifics of this case in detail. Instead, I tried to explain the reasons behind the actions taken by the service provider in certain circumstances.

    I have no authority or trust in you to make any accusations against you.

    You can't argue with him so don't waste your time on him.

    He's bashing everyone who either trying to help him or pointing his mistakes.

  • lexandrilexandri Member
    edited April 2023

    @BingoBongo said:

    @rustelekom said:

    @lexandri said: let me alert you that the system / vps / machine had no output logs just the ip and network

    it is clearly configured that their network allows spoofing or someone has not been compromised it is impossible for a single core vps 2gb to push 5tb of traffic in 1 day running brute force attack it does not run 200 threads ever from a bruteforce

    I respectfully refuse to delve into the specifics of this case in detail. Instead, I tried to explain the reasons behind the actions taken by the service provider in certain circumstances.

    I have no authority or trust in you to make any accusations against you.

    You can't argue with him so don't waste your time on him.

    He's bashing everyone who either trying to help him or pointing his mistakes.

    I'm just answering... idiots who want to accuse without knowing the case one of them would be you

    throughout my career I've seen so many whmcs being hacked from these hosts and for many years hackers roamed inside enabling servers to create vps install rootkits in node

  • they hacked WHMCS, and decided your VM was the lucky number out of a /24 to send bruteforce attacks.
    Whos the crazy one here?

This discussion has been closed.