rn家黑五刚买的小鸡,突然收到的ticket,大神看看什么情况,还有救没。
个人就用来富强,前几天看流量有点异常,还专门登上去iftop看了看,也没看出来什么,只用过一个tcp.sh的一键换内核脚本外加233boy的v2脚本,哪来的神仙啊,收了神通吧。
\sad
着急了用手机传的图,糊了见谅,下面是全文
最强法务部门恐怖如斯么,我要写保证书还是删机跑路
Hello,
RackNerd has received an abuse complaint concerning your service
For more on our Terms of Service and Acceptable Use Policy, please visit:
https://www.racknerd.com/terms-of-service
We await your response to the below abuse complaint.
=-=-=-=-=-=-=-=
From no-reply@sie.sony.com Mon Dec 7 20:08:59 2020
Received: from lvc-sys-prdmx.sonynei.net ([173.230.196.11])
by home3.multacom.com (8.14.7/8.14.7) with SMTP id 0B848xrT004208
for ; Mon, 7 Dec 2020 20:08:59 -0800
DKIM-Filter: OpenDKIM Filter v2.11.0 home3.multacom.com 0B848xrT004208
Message-Id:
Subject: IP address(es) were blacklisted from the PlayStation Network [202012075694]
Date: Mon, 7 Dec 2020 20:08:36 -0800
Mime-Version: 1.0
Content-Type: text/plain; charset=”iso-8859-1″
To: abuse@multacom.com
From: no-reply@sie.sony.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by home3.multacom.com id 0B848xrT004208
To whom it may concern,
Pursuant to Sony Interactive Entertainment LLC (“SIE”) corporate policy, the below IP addresses were blacklisted from using our services because SIE detected activity that is abusive to our network services. In our determination, the abusive activity was not related to velocity or volume (many users behind the same IP address, i.e. NAT), but matched the specific patterns of known abuse of our publicly available services. This abuse may be the result of a computer on your network that has been compromised and is participating in a botnet abuse of our services.
The following table of IP addresses, dates and times should help you correlate the origin of the abusive activity. The time stamps are approximate from our logs. The actual timing of the events depend on the signature matched. It is very likely to have occurred both before, during and following the times listed.
Approximate Time Range (UTC), IP Address, Reason
2020-12-07 14:12:00 ~ 2020-12-07 15:12:00 (UTC), ip, Account Takeover Attempts
It is most likely the attack traffic is directed at one of the following endpoints:
=-=-=-=-=-=-=-=
Thank You,
河北省网友说:大哥,上个图床吧
江西省网友说:来人 把朕的哈勃拿来
山东省网友说:这个元老是买的吧,一点不清真。
陕西省网友说:糊的看不清
四川省网友说:Hello,
RackNerd has received an abuse complaint concerning your service
For more on our Terms of Service and Acceptable Use Policy, please visit:
https://www.racknerd.com/terms-of-service
We await your response to the below abuse complaint.
=-=-=-=-=-=-=-=
From no-reply@sie.sony.com Mon Dec 7 20:08:59 2020
Received: from lvc-sys-prdmx.sonynei.net ([173.230.196.11])
by home3.multacom.com (8.14.7/8.14.7) with SMTP id 0B848xrT004208
for ; Mon, 7 Dec 2020 20:08:59 -0800
DKIM-Filter: OpenDKIM Filter v2.11.0 home3.multacom.com 0B848xrT004208
Message-Id:
Subject: IP address(es) were blacklisted from the PlayStation Network [202012075694]
Date: Mon, 7 Dec 2020 20:08:36 -0800
Mime-Version: 1.0
Content-Type: text/plain; charset=”iso-8859-1″
To: abuse@multacom.com
From: no-reply@sie.sony.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by home3.multacom.com id 0B848xrT004208
To whom it may concern,
Pursuant to Sony Interactive Entertainment LLC (“SIE”) corporate policy, the below IP addresses were blacklisted from using our services because SIE detected activity that is abusive to our network services. In our determination, the abusive activity was not related to velocity or volume (many users behind the same IP address, i.e. NAT), but matched the specific patterns of known abuse of our publicly available services. This abuse may be the result of a computer on your network that has been compromised and is participating in a botnet abuse of our services.
The following table of IP addresses, dates and times should help you correlate the origin of the abusive activity. The time stamps are approximate from our logs. The actual timing of the events depend on the signature matched. It is very likely to have occurred both before, during and following the times listed.
Approximate Time Range (UTC), IP Address, Reason
2020-12-07 14:12:00 ~ 2020-12-07 15:12:00 (UTC), ip Account Takeover Attempts
It is most likely the attack traffic is directed at one of the following endpoints:
=-=-=-=-=-=-=-=
Thank You,
贵州省网友说:手机版传的,太着急了没注意
青海省网友说:sony好大的官威
贵州省网友说:弱密码被破了拿去dd了 上次我的hosthatch被黑也是去d索尼了
贵州省网友说:各类脚本反正我是不敢用,害怕。
吉林省网友说:机器好像没给我删,但是富强连不上了,现在暂时关了保命
吉林省网友说:重装 不要用各种脚本,自己安装一个也不难。脚本尽量使用github版的。百度谷歌来的脚本不靠谱。测速请测完后重装。
黑龙江省网友说:我也用过这两个脚本,怎么一点事没有?你看看是不是自己的ssh密码被爆破了