As soon as I open my port 80...

It's All Fucked Shirt $22.14

Homeless People Are Sexy Shirt $21.68

It's All Fucked Shirt $22.14

  1. 2 months ago
    Anonymous

    ching chong nip nong nong 127.0.0.1

  2. 2 months ago
    Anonymous

    if you dress like a bawd, don't complain if you get raped

    • 2 months ago
      Anonymous

      all woman clothes are bawd clothes i don't care if you got a nun uniform you a hoe

      • 2 months ago
        Anonymous

        >all woman clothes are bawd clothes
        False some women dress for modesty. Only western prostitutes dress immodesty.

        • 2 months ago
          Anonymous

          >tight body sleeve that pronounces her curves
          >you can see the outlines of her bra
          cope, she is a prostitute

  3. 2 months ago
    Anonymous

    what do these bytes even mean? what service are the chinks trying to exploit?

    • 2 months ago
      Anonymous

      probably a zero day sidechannel type attack to install a crypto miner

      • 2 months ago
        Anonymous

        >Using a zero day exploit to gain access to anons porn stash

  4. 2 months ago
    Anonymous

    Nihao! Sorry OP it was me

  5. 2 months ago
    Anonymous

    I hear people talking about how they open a port or start up an ssh.

    But how are they even finding out, are they scanning the prostitute internet routinely or what?

    • 2 months ago
      Anonymous

      Yes they scan everything. For ssh don't use passwords, disable it and use keys only. Stops Chinese scanners dead in their tracks and is just good practice.

      • 2 months ago
        Anonymous

        yeah I've been working on my security/anon practices, Thanks for the new one.

      • 2 months ago
        Anonymous

        I use key only but still get like 30 login attempts a minute in my log. Knowing they can't get in doesn't decrease the annoyance.

    • 2 months ago
      Anonymous

      Yes. They scan every ipv4

      • 2 months ago
        Anonymous

        why not ipv6 addresses?

        • 2 months ago
          Anonymous

          You tell me how many numers 32 bits can hold. Then you tell me how many numbers 128 bits can hold

          • 2 months ago
            Anonymous

            but scanning could still be done, could it not?
            I guess not everyone uses ipv6.

          • 2 months ago
            Anonymous

            My home network has 1 septillion addresses.
            There's not enough time in the world to scan the entire IPv6 address space.

          • 2 months ago
            Anonymous

            A botnet could manage. It's less moronic than matching (matching as in - getting lucky) hashes.

          • 2 months ago
            Anonymous

            Even if you go through 1mil addresses in a day, that's still going to take a very, very long time.

          • 2 months ago
            Anonymous

            If you scanned 500 billion addresses per second it would take 20 quintillion years to scan every IPv6 address.
            For comparison, I saw a video where a guy pinged every IPv4 address with his laptop in a week.

        • 2 months ago
          Anonymous

          Because nothing and no one relevant uses ipv6 for anything worth taking over in the first place.
          >b-b-but I use it!
          q.e.d.

          • 2 months ago
            Anonymous

            If people think that, then it's gotta be good for opsec therefor a need to scan? or am i wrong?

        • 2 months ago
          Anonymous

          I have ipv6 at home, I should disable my server's ipv4 address. Any drawbacks? How many people don't have ipv6?

          • 2 months ago
            Anonymous

            how will you route to v4 addresses? NAT64?

          • 2 months ago
            Anonymous

            Do I need to do that? I'm not sure what I'd need to connect to from my server other than to update software, distros usually have ipv6 mirrors don't they?

    • 2 months ago
      Anonymous

      the entire internet has been under completely automated attack for a really long time now
      morons who talk about how they're not a target because they've done nothing wrong, or aren't special, or have nothing of value are just as moronic as the schizos with delusions of grandeur who believe in gangstalking and that every car is filled with government agents
      the only difference is the ego

      you're a target because everything is and just having a clean identity not associated with malicious traffic is something of value
      there's no van sitting outside your house filled with spies, you have no FBI agent tracking you
      they are spying on every single thing you do, at all times, aggregating immense amounts of data
      but since everything is completely automated you can just mostly sidestep it by not doing anything too odd and keeping a low profile but not too low because that loops back into making you a target

      • 2 months ago
        Anonymous

        Script kiddies aren't government agents anon

  6. 2 months ago
    Anonymous

    ok and?

  7. 2 months ago
    Anonymous
    • 2 months ago
      Anonymous

      how long must we suffer the Chinese?

      • 2 months ago
        Anonymous

        just until a big solar flare hits the chinks and maybe some neighboring countries

    • 2 months ago
      Anonymous

      what is this tool i want it?

      • 2 months ago
        Anonymous

        It's probably an interface from some cloud virtual server provider

        • 2 months ago
          Anonymous

          oh cool, is this similar to wireshark.

          how could you even tell if it's a metasploit?

      • 2 months ago
        Anonymous

        since anon misled you
        https://github.com/crowdsecurity/crowdsec

        • 2 months ago
          Anonymous

          cool thanks anon, may the good lord bless thy.

          • 2 months ago
            Anonymous

            >thy
            https://www.diva-portal.org/smash/get/diva2:3508/FULLTEXT01.pdf

  8. 2 months ago
    Anonymous

    Just whitelist your country or countries wich you have business with

  9. 2 months ago
    Anonymous

    me chinese
    me want root
    me want rm rf boot

  10. 2 months ago
    Anonymous

    fail2ban will help, as will range blocking China.

  11. 2 months ago
    Anonymous

    I set up a Grafana dashboard yesterday to watch it on a map
    Also error_page 400 =301 https://ash-speed.hetzner.com/10GB.bin;

    • 2 months ago
      Anonymous

      Something that isn't even speaking HTTP won't follow redirect.

      • 2 months ago
        Anonymous

        Eh, sometimes they do and sometimes they don't. It's not some sort of solution. It's mainly to waste the time of people who are dumb enough to use something that does follow redirects. Same with things like endlessh, not a solution but it sure wastes time/resources (even if it's not a lot) if they don't put in a timeout. Had one Chinese guy that was stuck in endlessh for a week recently.

  12. 2 months ago
    Anonymous

    >over 9001 metasploit queries every day from pajeet
    just block them moron

  13. 2 months ago
    Anonymous

    >the ones that went through aren't logged here

  14. 2 months ago
    Anonymous

    Respond with 200's and then route them to a tarpit.

Your email address will not be published. Required fields are marked *