GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   F*cking Asian asshole hackers (https://gfy.com/showthread.php?t=512423)

Realpascal 09-04-2005 01:35 PM

F*cking Asian asshole hackers
 
Straight from the server logs yesterday:

Authentication Failures:
root (220.228.225.34): 564 Time(s)
unknown (220.228.225.34): 92 Time(s)

Every fucking day:

220.228.225.34 Failed password for invalid user clark from
220.228.225.34 Failed password for invalid user jackal from
220.228.225.34 Failed password for invalid user clinton from
etc...

:disgust

Young 09-04-2005 01:37 PM

http://www.big-boys.com/articles/ghettofight.html

that should make you feel better

QuaWee 09-04-2005 01:42 PM

Where did you get Asian from....

Realpascal 09-04-2005 01:44 PM

Quote:

Originally Posted by Young
http://www.big-boys.com/articles/ghettofight.html

that should make you feel better

Hmm.. maybe a little overdone.
Just give me 5 mins with him in a room without windows... I'll let him shit his pants. That would make me happy. :)

Realpascal 09-04-2005 01:44 PM

Quote:

Originally Posted by QuaWee
Where did you get Asian from....

220.228.225.34 traced to: adsl-220-228-225-34.BC.sparqnet.net

First Prime 09-04-2005 01:46 PM

Quote:

Originally Posted by QuaWee
Where did you get Asian from....

It looks like the IP address is from Taiwan.

directfiesta 09-04-2005 01:50 PM

it's everyday.. this is not the worse ...

Invalid Users:
Unknown Account: 12704 Time(s)
Authentication Failures:
unknown (newweb.speedscript.com ): 3001 Time(s)

This is a fucking pharmacy that probably is looking to spam thru others mail servers ....
I mailbomb these guys and DDOS them after I warned their provider, which never answers. I take it as a taxit aknowledgement and permission to do so.

Arty 09-04-2005 01:52 PM

Quote:

Originally Posted by Realpascal
Straight from the server logs yesterday:

Authentication Failures:
root (220.228.225.34): 564 Time(s)
unknown (220.228.225.34): 92 Time(s)

Every fucking day:

220.228.225.34 Failed password for invalid user clark from
220.228.225.34 Failed password for invalid user jackal from
220.228.225.34 Failed password for invalid user clinton from
etc...

:disgust

Change your ssh port to something else than default...that'll help...

Realpascal 09-04-2005 01:54 PM

Quote:

Originally Posted by Arty
Change your ssh port to something else than default...that'll help...

He's already trying a wide range of ports..Almost every attempt is at a different port.
But thanks for the tip anyway man ! :thumbsup

chaze 09-04-2005 01:56 PM

Join the club :disgust

mrkris 09-04-2005 01:56 PM

Quote:

Originally Posted by directfiesta
it's everyday.. this is not the worse ...

Invalid Users:
Unknown Account: 12704 Time(s)
Authentication Failures:
unknown (newweb.speedscript.com ): 3001 Time(s)

This is a fucking pharmacy that probably is looking to spam thru others mail servers ....
I mailbomb these guys and DDOS them after I warned their provider, which never answers. I take it as a taxit aknowledgement and permission to do so.

So let me guess, because they didn't reply your warnings, you decided to take it into your own hands and DDoS them, mailbomb them, etc? Wow you are fucking retarded. Not only is it retarded to do that, but you spout it out here on a public forum. Also, any system connected to the internet gets probed regularly for everything from IIS exploits to SSH login/pass combos.

Realpascal 09-04-2005 02:00 PM

Quote:

Originally Posted by mrkris
So let me guess, because they didn't reply your warnings, you decided to take it into your own hands and DDoS them, mailbomb them, etc? Wow you are fucking retarded. Not only is it retarded to do that, but you spout it out here on a public forum. Also, any system connected to the internet gets probed regularly for everything from IIS exploits to SSH login/pass combos.

I agree with DirectFiesta. You email them, you email the ISP.. no response means war. :thumbsup

directfiesta 09-04-2005 02:02 PM

Quote:

Originally Posted by mrkris
So let me guess, because they didn't reply your warnings, you decided to take it into your own hands and DDoS them, mailbomb them, etc? Wow you are fucking retarded. Not only is it retarded to do that, but you spout it out here on a public forum. Also, any system connected to the internet gets probed regularly for everything from IIS exploits to SSH login/pass combos.

:1orglaugh :1orglaugh :1orglaugh

or I bend over and take it up the ass ????

No thanks ....

directfiesta 09-04-2005 02:05 PM

Quote:

Originally Posted by Realpascal
I agree with DirectFiesta. You email them, you email the ISP.. no response means war. :thumbsup

Exactly!

Otherwise , I will have 300 fucking phone calls from clients if one of these pricks compromise one of my boxes ....

rebel23 09-04-2005 02:07 PM

Quote:

Originally Posted by Realpascal
Straight from the server logs yesterday:

Authentication Failures:
root (220.228.225.34): 564 Time(s)
unknown (220.228.225.34): 92 Time(s)

Every fucking day:

220.228.225.34 Failed password for invalid user clark from
220.228.225.34 Failed password for invalid user jackal from
220.228.225.34 Failed password for invalid user clinton from
etc...

:disgust

yes, this is fucking annoying, there are things you can do in your ssh_config like limit attempts from same IP to 2 times only, or change your port like someone else said...

Realpascal 09-04-2005 02:10 PM

Quote:

Originally Posted by rebel23
yes, this is fucking annoying, there are things you can do in your ssh_config like limit attempts from same IP to 2 times only, or change your port like someone else said...

Blocking more than f.e. 5 attempts from 1 ip looks like a good one to me..
Thanks man !

tranza 09-04-2005 06:03 PM

they don't have anything else to do...happens every day

reynold 09-04-2005 07:00 PM

nice to see you do some threads now dude. :thumbsup

thaifan99 09-04-2005 08:03 PM

Quote:

Originally Posted by directfiesta
it's everyday.. this is not the worse ...

Invalid Users:
Unknown Account: 12704 Time(s)
Authentication Failures:
unknown (newweb.speedscript.com ): 3001 Time(s)

This is a fucking pharmacy that probably is looking to spam thru others mail servers ....
I mailbomb these guys and DDOS them after I warned their provider, which never answers. I take it as a taxit aknowledgement and permission to do so.

Sometimes the only way!

Nismo 09-04-2005 08:05 PM

only Azn Can Hack A Box Like What

RRRED 09-04-2005 08:06 PM

Hey now let's not have racist remarkson GFY :winkwink:

mrkris 09-04-2005 11:58 PM

Quote:

Originally Posted by directfiesta
Exactly!

Otherwise , I will have 300 fucking phone calls from clients if one of these pricks compromise one of my boxes ....

Let me keep this short and sweet. A security-aware system administrator would not worry about probes, as they should be confident they have there packet filtering and system patches up to date. If you are lacking, that is your fault, not others, idiot.

bringer 09-05-2005 12:01 AM

setup a firewall and block the ip
it could be worse so stop looking at it log attempts and block them before they get in

Doctor Dre 09-05-2005 12:03 AM

What's new ...

PussyTeenies 09-05-2005 12:06 AM

maybe a firewall :)
or just add in hosts.deny or only allow ssh from YOUR ips :)

Realpascal 09-05-2005 12:30 AM

Thanks for all tips guys.. :thumbsup

woj 09-05-2005 12:36 AM

welcome to the internet :)

XWS Negotiator 09-05-2005 12:39 AM

Its natural thing don't be pissed off...


All times are GMT -7. The time now is 03:14 AM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123