In accordance with paragraphs 2.3 and 2.4 of Annex 1 to the Public Offer Contract, your server has been blocked on suspicion of illegal actions.To unblock your server and make it fully operational, please contact our support team.
里面就x-ui和peer2profit,难道peer2profit的锅?没DD,用他家默认的D11
热议
2楼 image 9小时前
弱密码啥的导致被黑以后 被拿去攻击或发垃圾邮件了啥的都是有可能的
具体得看paragraphs 2.3 and 2.4 of Annex 1 to the Public Offer Contract 的内容是啥了
3楼 kuannz 9小时前
让你联系客服解封呢
4楼 Smilence 9小时前
image 发表于 2022-7-28 07:10
弱密码啥的导致被黑以后 被拿去攻击或发垃圾邮件了啥的都是有可能的
具体得看paragraphs 2.3 and 2.4 of An ...
我找了半圈,没找到这个文件
5楼 Smilence 9小时前
2.3. The following is prohibited: 2.3.1. Storage of websites designed to commit fraudulent actions, including but not limited to: Password stealing, phishing. Deceit, donation scam, etc. 2.3.2. Sending or publishing spam or messages that may be misinterpreted as spam. 2.3.3. Violation of generally accepted rules of network etiquette, including, but not limited to: Aggressive index spam (polluting search engines results with irrelevant information useless to humans). Aggressive web scraping (more than 5 GB of incoming traffic per day for external data parsing). 2.3.4. Storage of projects and services related to: Generating junk content to deceive search engines or any other systems. Generating any kind of junk traffic (to equalize traffic ratios for another hosting provider, cheat any rating systems, deceive search engines or any other systems, etc.). 2.3.5. Storing public proxy or 扶墙 servers, as well as systems for performance testing of third party systems. Or storing private servers using more than 10 GB of total traffic per day. 2.3.6. Storing torrent clients or any other file-sharing and P2P-systems. 2.3.7. Storing systems or services related to cryptocurrency mining. 2.3.8. Storing systems or services related to disruption of the internal network or third-party networks operations. 2.4. It is prohibited to attempt to gain illegal access to classified information or violate safety standards, including but not limited to: 2.4.1. Hacking websites, obtaining private data, both from the Contractor's resources and external websites and resources. 2.4.2. Password cracking, network attacks, flood (equipment or information channels/limits overload). 2.4.3. Operating hacked websites or resources that leads to a violation of the network etiquette and other network rules even despite the Customer's will. Hacked resources will be shut down without prior notification, with activation possible only once proper measures are taken to prevent further hacking.
6楼 Smilence 9小时前
看来还是得搭个网站来伪装,裸奔x-ui还是不行的
V-P-N这个词会自动变成扶墙??
7楼 美国总统奥巴马 9小时前
应该是弱密码被爆破了,这两个我都装了,运行快大半年了,没有问题
8楼 韭菜 9小时前
应该不是fq的原因
9楼 misakano 8小时前
p2p这种流量交换有风险的,LET上有老哥说过,挂这种东西,指不定哪天商家发现你IP流量被拿去干欺诈,就封鸡了的
10楼 TMD 8小时前
看来不能太简单
12楼 Smilence 7小时前
peer2profit本来就是拿你机器去做代理的,有一定风险
Hello,
This is a notification of unauthorized uses of systems or networks.
On July 25, 2022, a total of 2 IP addresses from your networks
probed my servers for TCP open ports.Due to their dubious behavior, they
are suspected to be compromised botnet computers.
The log of TCP port scans is included below for your reference
(time zone is UTC).To prevent this mail from getting too big in size,
at most 5 attempts from each attacker IP are included.Those connection
attempts have all passed TCP's 3-way handshake, so you can trust the source
IP addresses to be correct.
If you regularly collect IP traffic information of your network, you will see
the IPs listed connected to various TCP ports of my server at the time logged,
and I suspect that they also connected to TCP ports of many other IPs.
If a Linux system was at the attacker's IP, you might want to use the
command "netstat -ntp" to list its active network connections.If there
is still some suspicious connection, find out what PID/program/user ID they
belong to.You might find something to help you solve this problem.
Please notify the victims (owners of those botnet computers) so that they
can take appropriate action to clean their computers, before even
more severe incidents, like data leakage, DDoS, and the rumored NSA spying
through hijacked botnets, arise.This also helps prevent botnets from
taking up your network bandwidth.
Chih-Cherng Chin
Daily Botnet Statistics
---- log of TCP port scans (time zone is UTC; sent to abuse@mtw.ru) ----
-------------------------------------------------------------------------------
(time in UTC)=2022-07-25T23:12:06 (attacker's IP)=194.87.93.104 (IP being
scanned)=207^2^120^208 (TCP port being scanned)=4807
(time in UTC)=2022-07-25T23:12:12 (attacker's IP)=194.87.93.104 (IP being
scanned)=61^61^171^183 (TCP port being scanned)=10535
(time in UTC)=2022-07-25T23:12:54 (attacker's IP)=194.87.93.104 (IP being
scanned)=207^2^120^208 (TCP port being scanned)=9179
(time in UTC)=2022-07-25T23:13:03 (attacker's IP)=194.87.93.104 (IP being
scanned)=207^2^120^208 (TCP port being scanned)=3105
(time in UTC)=2022-07-25T23:13:32 (attacker's IP)=194.87.93.104 (IP being
scanned)=45^15^179^90 (TCP port being scanned)=11226
(time in UTC)=2022-07-25T10:37:05 (attacker's IP)=194.87.96.135 (IP being
scanned)=207^2^120^208 (TCP port being scanned)=55672
(time in UTC)=2022-07-25T10:39:34 (attacker's IP)=194.87.96.135 (IP being
scanned)=207^2^120^208 (TCP port being scanned)=51521
(time in UTC)=2022-07-25T10:57:43 (attacker's IP)=194.87.96.135 (IP being
scanned)=141^98^134^44 (TCP port being scanned)=3890
(time in UTC)=2022-07-25T10:59:36 (attacker's IP)=194.87.96.135 (IP being
scanned)=207^2^120^208 (TCP port being scanned)=53866
(time in UTC)=2022-07-25T11:01:47 (attacker's IP)=194.87.96.135 (IP being
scanned)=185^164^137^31 (TCP port being scanned)=10884
看来还真是被拿去干好人好事了。。。。
13楼 脱氧核糖核酸 2小时前
看样子没冤枉你
赶快认怂得了
14楼 Smilence 18分钟前
看样子没冤枉你
赶快认怂得了
peer2profit看来不怎么靠谱啊~~~
风险很大!
申明:本文内容由网友收集分享,仅供学习参考使用。如文中内容侵犯到您的利益,请在文章下方留言,本站会第一时间进行处理。
评论前必须登录!
立即登录 注册