Yes they scan everything. For ssh don't use passwords, disable it and use keys only. Stops Chinese scanners dead in their tracks and is just good practice.
You tell me how many numers 32 bits can hold. Then you tell me how many numbers 128 bits can hold
2 months ago
Anonymous
but scanning could still be done, could it not?
I guess not everyone uses ipv6.
2 months ago
Anonymous
My home network has 1 septillion addresses.
There's not enough time in the world to scan the entire IPv6 address space.
2 months ago
Anonymous
A botnet could manage. It's less moronic than matching (matching as in - getting lucky) hashes.
2 months ago
Anonymous
Even if you go through 1mil addresses in a day, that's still going to take a very, very long time.
2 months ago
Anonymous
If you scanned 500 billion addresses per second it would take 20 quintillion years to scan every IPv6 address.
For comparison, I saw a video where a guy pinged every IPv4 address with his laptop in a week.
I have ipv6 at home, I should disable my server's ipv4 address. Any drawbacks? How many people don't have ipv6?
2 months ago
Anonymous
how will you route to v4 addresses? NAT64?
2 months ago
Anonymous
Do I need to do that? I'm not sure what I'd need to connect to from my server other than to update software, distros usually have ipv6 mirrors don't they?
the entire internet has been under completely automated attack for a really long time now
morons who talk about how they're not a target because they've done nothing wrong, or aren't special, or have nothing of value are just as moronic as the schizos with delusions of grandeur who believe in gangstalking and that every car is filled with government agents
the only difference is the ego
you're a target because everything is and just having a clean identity not associated with malicious traffic is something of value
there's no van sitting outside your house filled with spies, you have no FBI agent tracking you
they are spying on every single thing you do, at all times, aggregating immense amounts of data
but since everything is completely automated you can just mostly sidestep it by not doing anything too odd and keeping a low profile but not too low because that loops back into making you a target
Eh, sometimes they do and sometimes they don't. It's not some sort of solution. It's mainly to waste the time of people who are dumb enough to use something that does follow redirects. Same with things like endlessh, not a solution but it sure wastes time/resources (even if it's not a lot) if they don't put in a timeout. Had one Chinese guy that was stuck in endlessh for a week recently.
ching chong nip nong nong 127.0.0.1
if you dress like a bawd, don't complain if you get raped
all woman clothes are bawd clothes i don't care if you got a nun uniform you a hoe
>all woman clothes are bawd clothes
False some women dress for modesty. Only western prostitutes dress immodesty.
>tight body sleeve that pronounces her curves
>you can see the outlines of her bra
cope, she is a prostitute
what do these bytes even mean? what service are the chinks trying to exploit?
probably a zero day sidechannel type attack to install a crypto miner
>Using a zero day exploit to gain access to anons porn stash
Nihao! Sorry OP it was me
I hear people talking about how they open a port or start up an ssh.
But how are they even finding out, are they scanning the prostitute internet routinely or what?
Yes they scan everything. For ssh don't use passwords, disable it and use keys only. Stops Chinese scanners dead in their tracks and is just good practice.
yeah I've been working on my security/anon practices, Thanks for the new one.
I use key only but still get like 30 login attempts a minute in my log. Knowing they can't get in doesn't decrease the annoyance.
Yes. They scan every ipv4
why not ipv6 addresses?
You tell me how many numers 32 bits can hold. Then you tell me how many numbers 128 bits can hold
but scanning could still be done, could it not?
I guess not everyone uses ipv6.
My home network has 1 septillion addresses.
There's not enough time in the world to scan the entire IPv6 address space.
A botnet could manage. It's less moronic than matching (matching as in - getting lucky) hashes.
Even if you go through 1mil addresses in a day, that's still going to take a very, very long time.
If you scanned 500 billion addresses per second it would take 20 quintillion years to scan every IPv6 address.
For comparison, I saw a video where a guy pinged every IPv4 address with his laptop in a week.
Because nothing and no one relevant uses ipv6 for anything worth taking over in the first place.
>b-b-but I use it!
q.e.d.
If people think that, then it's gotta be good for opsec therefor a need to scan? or am i wrong?
I have ipv6 at home, I should disable my server's ipv4 address. Any drawbacks? How many people don't have ipv6?
how will you route to v4 addresses? NAT64?
Do I need to do that? I'm not sure what I'd need to connect to from my server other than to update software, distros usually have ipv6 mirrors don't they?
the entire internet has been under completely automated attack for a really long time now
morons who talk about how they're not a target because they've done nothing wrong, or aren't special, or have nothing of value are just as moronic as the schizos with delusions of grandeur who believe in gangstalking and that every car is filled with government agents
the only difference is the ego
you're a target because everything is and just having a clean identity not associated with malicious traffic is something of value
there's no van sitting outside your house filled with spies, you have no FBI agent tracking you
they are spying on every single thing you do, at all times, aggregating immense amounts of data
but since everything is completely automated you can just mostly sidestep it by not doing anything too odd and keeping a low profile but not too low because that loops back into making you a target
Script kiddies aren't government agents anon
ok and?
how long must we suffer the Chinese?
just until a big solar flare hits the chinks and maybe some neighboring countries
what is this tool i want it?
It's probably an interface from some cloud virtual server provider
oh cool, is this similar to wireshark.
how could you even tell if it's a metasploit?
since anon misled you
https://github.com/crowdsecurity/crowdsec
cool thanks anon, may the good lord bless thy.
>thy
https://www.diva-portal.org/smash/get/diva2:3508/FULLTEXT01.pdf
Just whitelist your country or countries wich you have business with
me chinese
me want root
me want rm rf boot
fail2ban will help, as will range blocking China.
I set up a Grafana dashboard yesterday to watch it on a map
Also error_page 400 =301 https://ash-speed.hetzner.com/10GB.bin;
Something that isn't even speaking HTTP won't follow redirect.
Eh, sometimes they do and sometimes they don't. It's not some sort of solution. It's mainly to waste the time of people who are dumb enough to use something that does follow redirects. Same with things like endlessh, not a solution but it sure wastes time/resources (even if it's not a lot) if they don't put in a timeout. Had one Chinese guy that was stuck in endlessh for a week recently.
>over 9001 metasploit queries every day from pajeet
just block them moron
>the ones that went through aren't logged here
Respond with 200's and then route them to a tarpit.