As soon as I open my port 80...

Black Rifle Cuck Company, Conservative Humor Shirt $21.68

DMT Has Friends For Me Shirt $21.68

Black Rifle Cuck Company, Conservative Humor Shirt $21.68

  1. 3 weeks ago
    Anonymous

    ching chong nip nong nong 127.0.0.1

  2. 3 weeks ago
    Anonymous

    if you dress like a bawd, don't complain if you get raped

    • 3 weeks ago
      Anonymous

      all woman clothes are bawd clothes i don't care if you got a nun uniform you a hoe

      • 3 weeks ago
        Anonymous

        >all woman clothes are bawd clothes
        False some women dress for modesty. Only western prostitutes dress immodesty.

        • 3 weeks ago
          Anonymous

          >tight body sleeve that pronounces her curves
          >you can see the outlines of her bra
          cope, she is a prostitute

  3. 3 weeks ago
    Anonymous

    what do these bytes even mean? what service are the chinks trying to exploit?

    • 3 weeks ago
      Anonymous

      probably a zero day sidechannel type attack to install a crypto miner

      • 3 weeks ago
        Anonymous

        >Using a zero day exploit to gain access to anons porn stash

  4. 3 weeks ago
    Anonymous

    Nihao! Sorry OP it was me

  5. 3 weeks ago
    Anonymous

    I hear people talking about how they open a port or start up an ssh.

    But how are they even finding out, are they scanning the prostitute internet routinely or what?

    • 3 weeks ago
      Anonymous

      Yes they scan everything. For ssh don't use passwords, disable it and use keys only. Stops Chinese scanners dead in their tracks and is just good practice.

      • 3 weeks ago
        Anonymous

        yeah I've been working on my security/anon practices, Thanks for the new one.

      • 3 weeks ago
        Anonymous

        I use key only but still get like 30 login attempts a minute in my log. Knowing they can't get in doesn't decrease the annoyance.

    • 3 weeks ago
      Anonymous

      Yes. They scan every ipv4

      • 3 weeks ago
        Anonymous

        why not ipv6 addresses?

        • 3 weeks ago
          Anonymous

          You tell me how many numers 32 bits can hold. Then you tell me how many numbers 128 bits can hold

          • 3 weeks ago
            Anonymous

            but scanning could still be done, could it not?
            I guess not everyone uses ipv6.

          • 3 weeks ago
            Anonymous

            My home network has 1 septillion addresses.
            There's not enough time in the world to scan the entire IPv6 address space.

          • 3 weeks ago
            Anonymous

            A botnet could manage. It's less moronic than matching (matching as in - getting lucky) hashes.

          • 3 weeks ago
            Anonymous

            Even if you go through 1mil addresses in a day, that's still going to take a very, very long time.

          • 3 weeks ago
            Anonymous

            If you scanned 500 billion addresses per second it would take 20 quintillion years to scan every IPv6 address.
            For comparison, I saw a video where a guy pinged every IPv4 address with his laptop in a week.

        • 3 weeks ago
          Anonymous

          Because nothing and no one relevant uses ipv6 for anything worth taking over in the first place.
          >b-b-but I use it!
          q.e.d.

          • 3 weeks ago
            Anonymous

            If people think that, then it's gotta be good for opsec therefor a need to scan? or am i wrong?

        • 3 weeks ago
          Anonymous

          I have ipv6 at home, I should disable my server's ipv4 address. Any drawbacks? How many people don't have ipv6?

          • 3 weeks ago
            Anonymous

            how will you route to v4 addresses? NAT64?

          • 3 weeks ago
            Anonymous

            Do I need to do that? I'm not sure what I'd need to connect to from my server other than to update software, distros usually have ipv6 mirrors don't they?

    • 3 weeks ago
      Anonymous

      the entire internet has been under completely automated attack for a really long time now
      morons who talk about how they're not a target because they've done nothing wrong, or aren't special, or have nothing of value are just as moronic as the schizos with delusions of grandeur who believe in gangstalking and that every car is filled with government agents
      the only difference is the ego

      you're a target because everything is and just having a clean identity not associated with malicious traffic is something of value
      there's no van sitting outside your house filled with spies, you have no FBI agent tracking you
      they are spying on every single thing you do, at all times, aggregating immense amounts of data
      but since everything is completely automated you can just mostly sidestep it by not doing anything too odd and keeping a low profile but not too low because that loops back into making you a target

      • 3 weeks ago
        Anonymous

        Script kiddies aren't government agents anon

  6. 3 weeks ago
    Anonymous

    ok and?

  7. 3 weeks ago
    Anonymous
    • 3 weeks ago
      Anonymous

      how long must we suffer the Chinese?

      • 3 weeks ago
        Anonymous

        just until a big solar flare hits the chinks and maybe some neighboring countries

    • 3 weeks ago
      Anonymous

      what is this tool i want it?

      • 3 weeks ago
        Anonymous

        It's probably an interface from some cloud virtual server provider

        • 3 weeks ago
          Anonymous

          oh cool, is this similar to wireshark.

          how could you even tell if it's a metasploit?

      • 3 weeks ago
        Anonymous

        since anon misled you
        https://github.com/crowdsecurity/crowdsec

        • 3 weeks ago
          Anonymous

          cool thanks anon, may the good lord bless thy.

          • 3 weeks ago
            Anonymous

            >thy
            https://www.diva-portal.org/smash/get/diva2:3508/FULLTEXT01.pdf

  8. 3 weeks ago
    Anonymous

    Just whitelist your country or countries wich you have business with

  9. 3 weeks ago
    Anonymous

    me chinese
    me want root
    me want rm rf boot

  10. 3 weeks ago
    Anonymous

    fail2ban will help, as will range blocking China.

  11. 3 weeks ago
    Anonymous

    I set up a Grafana dashboard yesterday to watch it on a map
    Also error_page 400 =301 https://ash-speed.hetzner.com/10GB.bin;

    • 3 weeks ago
      Anonymous

      Something that isn't even speaking HTTP won't follow redirect.

      • 3 weeks ago
        Anonymous

        Eh, sometimes they do and sometimes they don't. It's not some sort of solution. It's mainly to waste the time of people who are dumb enough to use something that does follow redirects. Same with things like endlessh, not a solution but it sure wastes time/resources (even if it's not a lot) if they don't put in a timeout. Had one Chinese guy that was stuck in endlessh for a week recently.

  12. 3 weeks ago
    Anonymous

    >over 9001 metasploit queries every day from pajeet
    just block them moron

  13. 3 weeks ago
    Anonymous

    >the ones that went through aren't logged here

  14. 3 weeks ago
    Anonymous

    Respond with 200's and then route them to a tarpit.

Your email address will not be published. Required fields are marked *