will [DoS attack: SYN Flood] from 208.59.247.46, port 53 crimes reduced in usa? how about spam emails thru reserved address in usa ?
2025/07/01 14:13
瀏覽154
迴響0
推薦0
引用0
will [DoS attack: SYN Flood] from 208.59.247.46, port 53 crimes reduced in usa? did criminals got umbrella changed fake sorce to 208.59.247.46 or router admin cut off except 208.59.247.xx ?
6/30/2025 tried Baidu search: does china exist free report [DoS attack: TCP- or UDP-based Port Scan] and spam emails, SYN Flood..? but not yet get answear that i try to report.
in usa just found abuseipdb.com offered but excluded SYN Flood attack the reason is the source IP cannot be verified.
i believe even it is difficult but sooner or later can catch those bastards by the crimes pattern.
Another i expect to report to China because in usa politic involved deeply and i bet the dirty hands touch every business company including MS, Google... me-type (anti-wars) definitely not welcomed by usa 2 rotten parties.
besides China can do jobs better and thru my reporting also can help China to find out why masters groups black China.
by the way router admin logs most Syn Flood attacked reduced a lot. only few shows such as (target) our-PCs (source RCN may faked) 208.59.247.45:53 since last several days.
suspect all bastards changed to 208.59.247:xx in stead abuse china/usa companies? isnt weird? they must know abuseipdb.com rule which also became their umbrella.
this is why i prefer China who definitely is smarter can solve sooner or later.
myself opinion many bad things done by usa and masters groups which under master groups protected.
so never can solve or reduced but black Russia and China as threaten weapons.
i really expect China similar as abuseipdb.com companies take my advice.
so far i frequently use ipshu.com to verify those issued SYN Flood attack IP address(may faked) and i did report once but not sure whether it is 100% china made company or usa company agent in China which may embeded usa backdoor.
Who is responsible for AbuseIPDB? maintained and supported by Marathon Studios Inc., based in Pennsylvania we have free plans available for most of our users. We have paid plans for corporate or advanced users.
--i would never know who behind Marathon Studios Inc, do I ?
does any usa company protect users who against masters wars? from suffered by ATT, MS...even our Internet service provider(moles hided) i trust none.
its been 3-4 weeks my apple 6 plus cell phone behaviours very weird cant use it by frequently auto dial fraud phone numbers and forced me to connect wifi which popped up safari related weird secreens. cant but reset and erase all data but didnt 100% solve the problem. in the end cant but router admin > access control > block my-cell-phone MAC address.
I dont know whether caused by taiwan/usa companies got same MAC address as my cell phone or else.
i did google/bin search [is it possible other companies got same MAC address as my apple 6 plus MAC address?] some answeard YES then my copy files disappeared. google changed cant find and copied data file gone so switched to bin searched duplicate happened again.
however cant wipe all so still can see suffered same similar problem posters as:
PhilJ1964 Aspirant posted on Sep 16, 2020 Duplicate Mac Address
I am aware that is a possible to create a virtual mac address. But has anyone ever come across an issue where a vendor (in this case Netgear) has actually hard-coded the same mac into two different devices. I have a C6250 Cable Modem Router that I have been using with Comcast since May 2018 (over 27 months) without a problem. Recently it stopped working and Comcast is telling me that the mac address on my modem is registered with another customer in another part of the country. They will not provide any information other than that it is in Chicago and is a different model number than C6250. Comcast claims the mac address has been used with the other customer for 15 months and will not offer me any further assistance. They are telling me to simply exchange it at the retail outlet or contact Netgear for additional support. Im just curious if anyone has ever seen Netgear (or any other company) hard-code a mac address in error.
ARAggie Aspirant Dec 04, 2020 : I’m having the same problem with a c7500. I’ve had mine for 6 months and just today someone in West Virginia set up a netgear modem/router with the same MAC address. Any resolution for you?
PhilJ1964s Aspirant to ARAggie Dec 04, 2020 :
As a matter of fact I did have a very good resolution. I contacted NetGear and explained the situation to them. They explained to them about how I was able to get an IP and the modem/router continued to work for 15 months with the 2 machines having the same IP. They said that one of them should not have worked and I said "yeah I know but yet somehow they both did until Comcast pulled the plug on mine". (Personally I think it was a bug on Comcasts side that went unnoticed for all this time and someone finally got around to fixing it). But what NetGear did next surprised me. They told me to return my device and they sent me a brand new one free of charge even though Ive had it for over 2 years. So my suggestion to you... call NetGear. A company that will stand by their product 2 years after it was purchased (and long past the warranty expiration) will be sure to get my business from now on. GREAT JOB NETGEAR!!!
ARAggies Aspirant to PhilJ1964 Dec 04, 2020 :
That’s awesome. I cannot find a number to call them however. I have a spare unit I can run for now until I figure something out. Thank you for the reply though!
--my case is not router MAC address duplicate but Apple 6 Plus cell phone which already stop updated, and we are not Apple clients. earlier Google searched showing Apple might transfered(sold) MAC address to other companies because didnt know owner still use the out dated Apple 6 plus cell phone. the next might happen to spouse Apple 6 ES which soon wont updated too.
however such answered by google totally disappeared and my copied data file auto disappeared too. it also happened to bin search which just saved copied data file disappeared today which i had appointment at 8:20am(later cancelled by doctor) and saved in my HD twice (due to frequently data files stolen, i always saved twice which didnt help obviously)
......................
r/networking • 2 yr. ago Leather_Success2639 : Could be there two identical MAC adresses?
Hi So I am trying to learn networking and I have this question, I know that mac address is the unique ID of a device and it has 16 hexadecimal unit value, that makes 248 possible falues, the first 6 are for manufacturer ID, which leaves 224≈10 million somthing possible values for the device, for examlmple Apple makes more than 10 million devices so they run out of MAC addresses, what they can do in this case, and what happens when there two identical MAC adresses? TIA
This_guys_a_twat•2y ago :In my early call center days, I remember HP sending out a botched firmware update to 50k desktop PCs that assigned them all a MAC of 12:34:56:78:90:AB.
.... many cases
--without doubt because MAC addresses running out cant but reuse those original owner equips MAC address due to expired updating iOS or else. if i paied Apple cell phone monthly fee maybe it wont happen. or they have to give me free Apple 7/8/9.. cell phone.
ps Why have large companies not run out of MAC addresses yet despite having only the last 3 bytes to assign? Asked 5 months ago Modified 5 months ago Viewed 302 times
What I understand as facts:
MAC address are globally unique.
It has 48 bits (6 bytes).
First 3 bytes are uniquely assigned to manufacturers by IEEE (aka Organizationally Unique Identifier). For example Apples OUI is bcd074.
Last 3 bytes are assigned by manufacturers to every NICs they produce.
Each NIC the company produce must have a unique NIC.
This makes every single NIC (regardless of manufacturer) in the whole world globally unique.
What I infer from facts:
Based on fact 1), every NICs (iphone, mac, ipad...) produced by Apple must have unique MAC address
Wikipedia reports 2.3 billion IPhone sold (as of January 1, 2024). IPhone is just an example, it could be Macbooks or IPads or any products by Apple that has an NIC.
With 3 bytes, Apple (or any manufacturer) can have up to only 2^24 (~17 million) unique MAC addresses.
Question: How do Apple manages to guarantee unique MAC address for every NICs they produce even?
Follow up: If Apple recycle MAC addresses, what happens if two devices happen to have same MAC and join the same network?
... so i post my opinion as : [https://networkengineering.stackexchange.com/questions/86816/why-have-large-companies-not-run-out-of-mac-addresses-yet-despite-having-only-th/87239#87239] ps base my bad experenices in the past my opinion posted in usa companies would disapear very quickly. since then i wont register in usa companies websites to post my opinions.
just happened to my Apple 6 Plus that cant use it to dial (the only purpose i use to call/receive or receive/send messages) due to very weird behavious such as auto dial fraud phone number, popped up safari forced to connect wifi and then popped up fraud websites... i Google searched SYN Flood attack source IP address which showed same MAC address as my apple cell phone then found foreign company later same searched became usa company... the worst i did get answear as Apple might not knowing original owner still use it but transfered MAC address to other companies... i made copy again data file auto disappeared cant prove it. after that the same answear wont showed up so searched Bin that duplicted happening too.
7/1/2025 i had bad day yesterday, that tried to visit doctor for annual examine and discuss whether vitamine D3 2000 IU, B12 5000mcg(both not daily worry side effect) and ... ps move to [spouse got skin cancer and rich guy neighbour also did face surgery as spouse]
7/1/2025 just wondering whether Boeing crashed airplane parts existing certain MAC addresses, if so could it also happen duplicate MAC addresses caused 仪表乱跳失灵 (like happened to my apple 6 plus, felt some one control my iphone) so 失事(ie 发生不幸的事故)?
=========================fraud emails received on 6/30/2025
From: jobseekinggo
Subject: jobseekinggo
Received: from 127.0.0.1
domain of em9983.jobseekinggo.com designates 149.72.120.130
Received: from 144.160.152.237 (EHLO flph821.prodigy.net)
by 10.196.193.210 with SMTPs
Received: from s.wrqvtvvn.outbound-mail.sendgrid.net (s.wrqvtvvn.outbound-mail.sendgrid.net [149.72.120.130])
by flph821.prodigy.net (Inbound 8.15.2/8.15.2) with ESMTPS id 55SMf0l6100905
Received: by recvd-574749c66-nlkx8 with SMTP id recvd-574749c66-nlkx8-1-68606F5C-51
2025-06-28 22:40:28.815267411 +0000 UTC m=+2095627.637626565
Received: from jobseekinggo.com (unknown)
..............
Received: from 127.0.0.1
domain of em9983.jobseekinggo.com designates 159.183.224.105
Received: from 144.160.152.172 (EHLO flph840.prodigy.net)
by 10.196.194.207 with SMTPs
Received: from s.wfbtzhsw.outbound-mail.sendgrid.net (s.wfbtzhsw.outbound-mail.sendgrid.net [159.183.224.105])
Received: by recvd-7487445b-6g5md with SMTP id recvd-7487445b-6g5md-1-68606F5C-4D
2025-06-28 22:40:28.846213058 +0000 UTC m=+2094962.855613068
Received: from jobseekinggo.com (unknown)
......................
Received: from 10.222.141.230
domain of googlegroups.com designates 209.85.167.62
Received: from 144.160.152.247 (EHLO flph831.prodigy.net)
by 10.222.141.230 with SMTPs
Received: from mail-ed1-x533.google.com (mail-ed1-x533.google.com. [2a00:1450:4864:20::533])
Received: by mail-ed1-x533.google.com with SMTP id 4fb4d7f45d1cf-608acb0a27fso1462693a12.0
for ; Sat, 28 Jun 2025 10:57:13 -0700 (PDT)
Received: from 127.0.0.1
Received: from 170.203.24.8 (EHLO kl-203-24-8.kmta.shared.klaviyomail.com)
by 10.213.170.250 with SMTPs
....You received this message because you are subscribed to the Google Groups "erthfcszde" group.
....You received this message because you are subscribed to the Google Groups &=
quot;erthfcszde" group.
....................... Received: from 10.221.12.182 ps reserved for internal network environments. domain of gmail.com designates 209.85.210.170 ps 华盛顿州哥伦比亚特区 Google LLC Received: from 144.160.244.124 (EHLO alph754.prodigy.net) ps Prodigy.net is AT&T email 印第安納波利斯 Received: from mail-pf1-f170.google.com (mail-pf1-f170.google.com [209.85.210.170]) by alph754.prodigy.net (Inbound 8.15.2/8.15.2) with ESMTPS id 55SIqq6c124331 Received: from [206.82.9.207] ps 加州洛杉磯市 XLC INC by geopod-ismtpd-23 (SG) with ESMTP id awFET8nDSuiIsGeOGf5cZQ You are receiving this message as a registered customer of [Bank Of America]. ..... --from what i saw they have common pattern : @xx.google.com, @gmail.com, ATT email, @googlegroups tried to sell something but in reality a set up to steal your personal informations and steal your money ps 美国对4名俄罗斯公民实施制裁 指控他们涉嫌网络犯罪 2025年7月2日, 00:47 俄罗斯卫星通讯社华盛顿7月1日电 美国财政部外国资产控制办公室表示,美国对4名俄罗斯公民实施了制裁,指控他们运营涉嫌协助网络犯罪分子的Aeza Group公司。 美国财政部表示,据称Aeza Group公司总部位于圣彼得堡,提供“防弹主机”托管服务。该服务涉嫌支持网络犯罪活动。通过该平台,犯罪分子可获得对服务器、计算机及网络基础设施的访问权限,从而对美国公民发动网络攻击。 制裁对象包括阿尔谢尼·片泽夫,美方政府认为他是Aeza公司的总经理。美国财政部还指出,片泽夫曾因涉及贩毒在俄罗斯受到指控。 此外,尤里·博佐扬、弗拉基米尔·加斯特和伊戈尔·克尼亚泽夫也被列入制裁名单,美国政府表示,他们是Aeza公司的管理层成员。 --Google searched [what is Aeza Group in usa?] Bulletproof hosting services provider Aeza Group is a bulletproof hosting services provider that has been designated by the U.S. Department of the Treasurys Office of Foreign Assets Control (OFAC) for its role in supporting cybercriminal activity targeting victims in the United States and around the world. ps Treasury Sanctions Global Bulletproof Hosting Service Enabling Cybercriminals and Technology Theft July 1, 2025 ....BPH service providers sell access to specialized servers and other computer infrastructure designed to help cybercriminals like ransomware actors, personal information stealers, and drug vendors evade detection and resist law enforcement attempts to disrupt their malicious activities. OFAC is also designating two affiliated companies and four individuals who are Aeza Group leaders. Finally, in coordination with the United Kingdom’s (UK) National Crime Agency (NCA), OFAC is designating an Aeza Group front company in the UK.... --i would wait to see whether ATT, Google, Amazon,...bought or lease from BPH in usa. what are IP addresses, are these in black listing such as AbuseIPDB or others (MegaRBL.net...) ? How about Goddady who sold very similar names as usa big companies such as bank, county/state collected taxes or renew licence plates... only criminals would buy to steal people money and personal informations? ps searched [what is IP address for Aeza Group?] The IP address for Aeza Group is 45.134.12.86 This IP was reported 223 times. Confidence of Abuse is 0% ps This IP address has been reported a total of 223 times from 48 distinct sources. 45.134.26.86 was first reported on September 7th 2021, and the most recent report was 2 days ago. Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities. --that means Aeza was target quite recently and focus on MS SQL server. if it is abused then maybe set up by dirty hands such as 乌克兰 related including europe countries(reported 20210907 most are UK, europe very few in usa-2025)? no wonder not marked as abused because 乌克兰 related so they can do anything and can run away. ps BullWall is a cybersecurity solution provider based in Vejle, Denmark. It specializes in ransomware containment and protection for critical infrastructure. The company has offices in the United States, the United Kingdom, and Denmark, and serves over 1000 customers across 19 countries. reported 20220107 about Aeza suffered RDP Brute-Force Brute force attacks on Remote Desktop Protocol (RDP) involve repeated attempts to guess the correct username and password to gain unauthorized access. To mitigate these attacks, several strategies can be employed. --that means hacker might steal and remote control Aeza did very bad things to black Aeza so now 美国 can 对4名俄罗斯公民(could be innoncent) 实施制裁 指控他们涉嫌网络犯罪 or the hacker group stole user name and password dig out 4名俄罗斯公民 darkside? 行政機關:Aeza-Network-RU 產品描述: 國家/地區:RU 地址:Room 603, Suite 1N, Building 1 15 Zolnaya Street 193318 Saint Petersburg Russian Federation 管理員:AEZA GROUP Ltd 電話: 郵箱:abuse@aeza.ru ---------------------- 西方炒作中国“网络攻击”打乱不了中国全方位对外开放合作的势头 2024年3月26日, 14:49 英美等国近日指责中国实施所谓“网络攻击”并施加制裁。南京大学国际关系研究院副院长、副教授郑安光认为,这是一种旨在破坏中外合作的“乌贼战略”,但打乱不了中国全方位对外开放合作的势头。 美国周一(3月25日)宣布对一家中国公司以及与该公司有关联的两名中国人实施制裁,指控他们为中国政府支持的黑客,针对美国关键基础设施实施了多起恶意网络行动。美国财政部在一份声明中说,被制裁的中国公司名为武汉晓睿智科技有限公司,它是中国国家安全部的幌子公司,被制裁的两名个人分别是赵光宗(Zhao Guangzong)和倪高彬(Ni Gaobin)。 美财政部称,中国政府支持的恶意网络行为体仍然是对美国国家安全构成的最大、最持久的威胁之一。 对此,郑安光认为,西方国家攻击中国所谓“网络攻击”并不是什么新鲜事,但所有这些指责都是没有证据的空穴来风。反而外界通过斯诺登等人的披露得知,美国在开展大规模的系统性网络攻击和窃密。 他指出:“西方国家不断指责中国是一种试图把水搅浑的‘乌贼战略’。这种诽谤抹黑不利于双边关系的稳定和发展,破坏了中美两国领导人达成的‘旧金山共识’,更不利于双方在网络安全、人工智能管制等领域的合作。” 然而,除美国外,同一天,英国也指责中国对其民选代表和选举委员会进行恶意网络攻击,并召见中国驻英大使,且与美国一样,宣布制裁同一中国实体和两名个人。此外,新西兰政府声称,中国参与了2021年“有政府支持的”对新西兰议会的网络攻击,已就此向中国政府表达了关切,但表示不会实施制裁。另有报道称,澳洲外交部长黄英贤和内政部长奥尼尔发表联合声明说,黑客持续攻击民主机构与进程,对澳洲等民主与开放社会产生影响,这种行为不可接受,必须停止。 这些国家声称,实施网络攻击的是黑客组织“APT31”和“APT40”(Advanced Persistent Threat,高级持续威胁),隶属于中国国家安全部。美国司法部副部长丽莎·摩纳哥(Lisa Monaco)在一份声明中说,APT31在全球实施黑客行动的目的是“镇压批评中国政府的人士,破坏政府机构,窃取商业机密”。美国政府网络安全和基础设施安全局(CISA)称,APT40此前曾针对“各种政府组织、公司和大学”发动袭击。 中国遭以上多国所谓网络攻击指控正值中国发展高层论坛2024年年会在北京举行,年会主题为“持续发展的中国”。110多位来自主要国际经济组织、世界500强企业的负责人、国际知名学者,汇聚一堂,共话中国持续发展的动能、机遇与合作。郑安光认为,中国发展高层论坛在北京举行等说明中国正在以更大力度推动对外开放,此时西方国家抛出这些指责和攻击,目的是破坏中外合作的氛围,维护“小圈子”私利。 他强调:“中国坚持对外开放、积极发展国际合作的政策和立场不会改变。这种抹黑诽谤的小伎俩明眼人一望便知,在国际社会中不会获得广泛支持,因而也不会得逞。中国全方位对外开放合作的势头也不会被打乱。” 中国驻英国、美国和新西兰大使馆已对网攻相关指控予以驳斥,称其毫无根据,极不负责。中国外交部发言人林剑也回应称,网络安全是全球性挑战,中国是网络攻击的主要受害者之一,一贯坚决依法制止和严厉打击各类的网络恶意活动,主张各国通过对话与合作共同应对。网络攻击溯源问题高度复杂敏感,在调查和定性网络事件时,应有充分客观证据,而不是在没有事实依据的情况下抹黑他国,更不能将网络安全问题政治化,希望各方停止散布虚假信息,切实采取负责任的态度,共同维护网络空间的和平与安全。中方一贯反对非法单边制裁,将坚决维护自身合法权益。 --it is very simple as masters group cant accept the failure in 俄乌 wars because they all involve and spent huge money such as 冯德莱恩:3年来近1650亿欧元, 2025 would up to 84% of all that 瑞典11亿欧元,丹麦6.9亿欧元,挪威6.1亿欧元,德国4.5亿欧元,英国3.6亿欧元->4.5亿英镑(超5.85亿美元), 欧盟委员会30亿欧元的贷款. 2022年2月以来 欧洲各国军事援助总额640亿欧元. 美国2026财年国防预算乌克兰 163+2亿美元(安全援助USAI 增至3->5亿美元) 国防部长继续向乌克兰政府提供情报支援,包括收集情报、信息及图像资料 禁止削减驻欧美军规模或放弃北约驻欧部队最高司令指挥权 to avoid Russia revenge cant but 投入 核升级 250亿美元 3% 核三位一体 600亿美元 7.2% ??? 金穹导弹防御系统 250亿美元 You can see why Trump forced Europe every countries and Korea, Japan pay 5% their GDP to buy usa threaten weapons. if only if usa masters groups still existing, there is no PEACE in the world and any country in their ways would be severely punished. thats why we can see full mouth liars to black China as refuse to stand by masters side. 中国外交部:美国才是网络攻击的始作俑者和集大成者 2024年2月1日, 16:06 俄罗斯卫星通讯社北京2月1日电 中国外交部发言人汪文斌2月1日在例行记者会上表示,美国才是网络攻击的始作俑者和集大成者。 有记者提问,昨天有美国官员称,已破获了一个针对美国公共基础设施的中国黑客网络。美国联邦调查局局长昨天表示,中国是世界上最大的黑客活动国家。中方对此有何回应? 对此,发言人表示,中国坚决反对并依法打击任何形式的网络攻击,美方在缺乏有效证据的情况下妄下结论,对中国无端指责抹黑,极其不负责任,纯属混淆是非,中方对此坚决反对。 汪文斌指出,美国才是网络攻击的始作俑者和集大成者。美国网络司令部公然将他国的关键基础设施列为美国网络攻击的合法目标。去年以来,中国的网络安全机构陆续发布报告,揭露了美国政府长期以来对中国关键基础设施实施网络攻击的情况,这种不负责任的政策和做法将全球关键基础设施置于巨大的风险之中,我们敦促美方停止在全球范围内搞网络窃密和攻击,停止利用网络安全问题抹黑他国。 中方锁定网络攻击西工大的美国安全局工作人员真实身份 2023年9月14日, 10:31 消息称,近日,在中国国家计算机病毒应急处理中心会同360公司配合侦办西北工业大学被美国国家安全局(NSA)网络攻击案过程中,成功提取了“二次约会”间谍软件的多个样本,并锁定了这起网络间谍行动背后NSA工作人员的真实身份。 据技术分析报告显示,“二次约会”间谍软件是美国国家安全局(NSA)开发的网络间谍武器,该软件可实现网络流量窃听劫持、中间人攻击、插入恶意代码等恶意功能,它与其他恶意软件配合可以完成复杂的网络“间谍”活动。 据专家介绍,“二次约会”间谍软件长期驻留在网关、边界路由器、防火墙等网络边界设备上,其主要功能包括网络流量嗅探、网络会话追踪、流量重定向劫持、流量篡改等。另外,“二次约会”间谍软件支持在各类操作系统上运行,同时兼容多种体系架构,适用范围较广。 报告称,经层层溯源,工作人员发现了上千台遍布各国的网络设备中仍在隐蔽运行“二次约会”间谍软件及其衍生版本,并发现被美国国家安全局(NSA)远程控制的跳板服务器,其中多数分布在德国、日本、韩国、印度和中国台湾。 美荷英加 超一万家企业使用 SharePoint 服务器遭受不明亚洲黑客攻击 微软漏洞引爆全球安全危机!超一万家企业服务器面临风险 微软(510.06, 0.01, 0.00%)(MSFT.US)服务器软件正遭受不明黑客攻击,网络安全分析师警告全球范围内可能出现大规模安全漏洞。 微软表示,已发布针对SharePoint服务器的新安全补丁"以缓解针对本地服务器的活跃攻击",并称正在部署更多修复程序。 美国网络安全和基础设施安全局确认该漏洞存在,指出黑客可利用其访问文件系统、内部配置并通过网络执行代码。 密歇根州网络安全公司Censys研究员西拉斯·卡特勒估计,全球超过10,000家使用SharePoint服务器的企业面临风险,其中美国受影响企业数量最多,荷兰、英国和加拿大紧随其后。 "这简直是勒索软件运营者的美梦,很多攻击者这个周末要加班了,"他补充道。 帕洛阿尔托网络公司警告称"这些漏洞利用真实存在且构成严重威胁"。 谷歌(191.15, 5.21, 2.80%)威胁情报小组通过邮件声明表示,已观测到黑客利用该漏洞的行为,指出其可导致"持续的未授权访问,对受影响组织造成重大风险"。 美国媒体援引州政府官员和独立研究人员的消息称,美国联邦和州级机构、大学、能源公司及一家亚洲电信运营商已遭入侵。 这已是微软近期遭遇的系列网络攻击之一。该公司曾在3月警告,亚洲黑客正瞄准远程管理工具和云应用程序,意图监视美国及海外多家企业和组织。 白宫直属的网络安全审查委员会去年就2023年微软Exchange Online邮箱遭入侵事件指出,该公司的安全文化"存在缺陷"。该事件导致22个组织和数百名个人数据泄露,受害者包括美国前商务部长吉娜·雷蒙多。 责任编辑:于健 -- baidu searched [what is SharePoint ?] SharePoint Portal Server是一个门户站点,使得企业能够开发出智能的门户站点,这个站点能够无缝连接到用户、团队和知识。因此人们能够更好地利用业务流程中的相关信息,更有效地开展工作。 SharePoint Portal Server提供了一个企业地业务解决方案,它利用了企业应用程序集成功能,以及灵活地部署选项和管理工具,将来自不同系统地信息集成到一个解决方案中。这个门户站点使得端到端地合作更为容易,实现了个人、团队和信息地整合、组织和搜索。用户可以通过门户内容和布局地定制和个性化以及目标受众,更快地找到相关信息。公司可以根据受众地公司职位、团队身份、兴趣或其他可以设置地成员规则来设定信息、程序和更新。 SharePoint Portal Server 2003 使用 Microsoft Windows SharePoint Services 2003站点为个人、信息和公司创建门户页面。这些页面可以通过公司和管理工具来扩展 Windows SharePoint Services站点的功能,并且使得团队能够在他们的站点中向整个企业发布信息。 发行版本有SharePoint2003、SharePoint2007、Sharepoint 2010、SharePoint2013和SharePoint2016。 美东时间2025年7月20日,据路透社报道,微软公司近日发布安全警告,称其SharePoint服务器软件正在遭到持续攻击,微软在7月20日发布的安全通告中表示,攻击者正在利用SharePoint软件中的一个“允许授权攻击者在网络中执行伪装行为”的漏洞。 [5] searched [Is SharePoint free?] No, SharePoint does not have a free version for general use. --very good nothing related to us, so ignore it. however last several days got serious SYN Flood attack that very bad IP address (from iplark.com reported) as: the following malicious IP address in admin logs from 7/1 - 7/23/2025 06:42:29 local time : 198.23.172.62 威胁: SCANNER 参与扫描: 是 196.251.69.43 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 196.251.83.136 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 196.251.87.35 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 196.251.87.42 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 193.46.255.235 威胁: SCANNER 参与扫描: 是 172.233.183.40 威胁: SCANNER 参与扫描: 是 172.234.207.202 威胁: SCANNER 参与扫描: 是 172.236.233.65 威胁: SCANNER 参与扫描: 是 174.137.133.32 威胁: BOTNET 僵尸网络: 是 *PS malicious 美国webair.com 7/15/2025 9:21:51 104.237.151.205 威胁: SCANNER 参与扫描: 是 97.107.140.120 威胁: SCANNER 参与扫描: 是 ................All came from 荷兰 北荷兰省 阿姆斯特丹 82.145.213.8 opera.com 参与扫描: 否 **PS cant uninstall Norway opera browser?, it took me long time to remove from HD (because it auto came back), suddenly 07/13/2025 7:40:05 local time in logs 提供商:Norway Opera VPN 代理类型: (荷兰) VPN below all are ipvolume.net 89.248.163.6 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.8 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.27 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.29 威胁: SCANNER 参与扫描: 是 89.248.163.37 威胁: SCANNER 参与扫描: 是 89.248.163.63 威胁: SCANNER 参与扫描: 是 89.248.163.65 威胁: SCANNER 参与扫描: 是 89.248.163.69 威胁: SCANNER 参与扫描: 是 89.248.163.71 威胁: SCANNER 参与扫描: 是 89.248.163.76 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.77 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.78 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.86 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.121 威胁: SCANNER 参与扫描: 是 89.248.163.125 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.134 威胁: SCANNER 参与扫描: 是 89.248.165.139 威胁: SCANNER 参与扫描: 是 89.248.163.150 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.153 威胁: SCANNER 参与扫描: 是 89.248.163.154 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.158 威胁: SCANNER 参与扫描: 是 89.248.163.177 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.213 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.222 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.224 威胁: SCANNER 参与扫描: 是 89.248.163.244 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.165.44 威胁: SCANNER 参与扫描: 是 89.248.165.108 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.165.130 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.165.132 威胁: SCANNER 参与扫描: 是 89.248.165.136 威胁: SCANNER 参与扫描: 是 89.248.165.139 威胁: SCANNER 参与扫描: 是 89.248.165.140 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.165.142 威胁: SCANNER 参与扫描: 是 89.248.165.144 威胁: SCANNER 参与扫描: 是 89.248.165.148 威胁: SCANNER 参与扫描: 是 89.248.165.155 威胁: SCANNER 参与扫描: 是 89.248.165.156 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.165.157 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 ..................... 45.33.28.47 威胁: SCANNER 参与扫描: 是 45.33.50.24 威胁: SCANNER 参与扫描: 是 45.56.103.154 威胁: SCANNER 参与扫描: 是 45.79.102.191 威胁: SCANNER 参与扫描: 是 45.56.103.154 威胁: SCANNER 参与扫描: 是 45.79.190.208 威胁: SCANNER 参与扫描: 是 45.79.190.216 威胁: SCANNER 参与扫描: 是 34.28.207.190 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 34.55.102.107 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 34.66.88.210 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 35.226.27.221 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 (7/23/2025 posted) 负债3 亿还 28 年的日本中产,后来怎样了?只有2 类人能守住日子 2025年07月21日 17:16 驻家金陵v--九十年代初房价跌六成,股市腰斩, 经济增速从 5% 直接掉到负数 9/10 -> 4/10 正式工, 临时工工资只有50% 没社保没前途... it happened in taiwan since rotten abien mayor 房价跌 公司裁员倒闭 投资血本无归 守不住全家碳烧自杀(台北) 找不到工作广告的我房贷吃掉积蓄压力也有自杀想法, 虽然天乙天德太极贵人得到工作自知没前途 决定花时间找丈夫, request job certificate, no marriage, no AIDs proof. if not 善良守信几乎在机场避而不见(秃顶胖矮)..., the next happened in usa caused by masters wars. 幸亏危机意识强烈 一直省钱 到目前守住日子. 暝暝之中有生路 if you did right choice. i am very appreciated our 祖先的训诫 that is why can go through tough 的日子. YOU can too. the most important must 戒贪 so you wont be so easy 辛财被劫. must keep alert that must keep eyes on your router admin logs [[DoS attack: SYN Flood] -like and suggest iplark.com(not sure is made in China? i hope so, the only can trust china made without backdoor) can help you identify bad IP address may issue 威胁-type(SCANNER, SPAM, BOTNET), 滥发邮件, 僵尸网络 and may 参与扫描 is malicious especiaally 89.248.163(and 165)北荷兰省 阿姆斯特丹 (ipvolume.net). every one should learn as earlier as possible.
....................... Received: from 10.221.12.182 ps reserved for internal network environments. domain of gmail.com designates 209.85.210.170 ps 华盛顿州哥伦比亚特区 Google LLC Received: from 144.160.244.124 (EHLO alph754.prodigy.net) ps Prodigy.net is AT&T email 印第安納波利斯 Received: from mail-pf1-f170.google.com (mail-pf1-f170.google.com [209.85.210.170]) by alph754.prodigy.net (Inbound 8.15.2/8.15.2) with ESMTPS id 55SIqq6c124331 Received: from [206.82.9.207] ps 加州洛杉磯市 XLC INC by geopod-ismtpd-23 (SG) with ESMTP id awFET8nDSuiIsGeOGf5cZQ You are receiving this message as a registered customer of [Bank Of America]. ..... --from what i saw they have common pattern : @xx.google.com, @gmail.com, ATT email, @googlegroups tried to sell something but in reality a set up to steal your personal informations and steal your money ps 美国对4名俄罗斯公民实施制裁 指控他们涉嫌网络犯罪 2025年7月2日, 00:47 俄罗斯卫星通讯社华盛顿7月1日电 美国财政部外国资产控制办公室表示,美国对4名俄罗斯公民实施了制裁,指控他们运营涉嫌协助网络犯罪分子的Aeza Group公司。 美国财政部表示,据称Aeza Group公司总部位于圣彼得堡,提供“防弹主机”托管服务。该服务涉嫌支持网络犯罪活动。通过该平台,犯罪分子可获得对服务器、计算机及网络基础设施的访问权限,从而对美国公民发动网络攻击。 制裁对象包括阿尔谢尼·片泽夫,美方政府认为他是Aeza公司的总经理。美国财政部还指出,片泽夫曾因涉及贩毒在俄罗斯受到指控。 此外,尤里·博佐扬、弗拉基米尔·加斯特和伊戈尔·克尼亚泽夫也被列入制裁名单,美国政府表示,他们是Aeza公司的管理层成员。 --Google searched [what is Aeza Group in usa?] Bulletproof hosting services provider Aeza Group is a bulletproof hosting services provider that has been designated by the U.S. Department of the Treasurys Office of Foreign Assets Control (OFAC) for its role in supporting cybercriminal activity targeting victims in the United States and around the world. ps Treasury Sanctions Global Bulletproof Hosting Service Enabling Cybercriminals and Technology Theft July 1, 2025 ....BPH service providers sell access to specialized servers and other computer infrastructure designed to help cybercriminals like ransomware actors, personal information stealers, and drug vendors evade detection and resist law enforcement attempts to disrupt their malicious activities. OFAC is also designating two affiliated companies and four individuals who are Aeza Group leaders. Finally, in coordination with the United Kingdom’s (UK) National Crime Agency (NCA), OFAC is designating an Aeza Group front company in the UK.... --i would wait to see whether ATT, Google, Amazon,...bought or lease from BPH in usa. what are IP addresses, are these in black listing such as AbuseIPDB or others (MegaRBL.net...) ? How about Goddady who sold very similar names as usa big companies such as bank, county/state collected taxes or renew licence plates... only criminals would buy to steal people money and personal informations? ps searched [what is IP address for Aeza Group?] The IP address for Aeza Group is 45.134.12.86 This IP was reported 223 times. Confidence of Abuse is 0% ps This IP address has been reported a total of 223 times from 48 distinct sources. 45.134.26.86 was first reported on September 7th 2021, and the most recent report was 2 days ago. Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities. --that means Aeza was target quite recently and focus on MS SQL server. if it is abused then maybe set up by dirty hands such as 乌克兰 related including europe countries(reported 20210907 most are UK, europe very few in usa-2025)? no wonder not marked as abused because 乌克兰 related so they can do anything and can run away. ps BullWall is a cybersecurity solution provider based in Vejle, Denmark. It specializes in ransomware containment and protection for critical infrastructure. The company has offices in the United States, the United Kingdom, and Denmark, and serves over 1000 customers across 19 countries. reported 20220107 about Aeza suffered RDP Brute-Force Brute force attacks on Remote Desktop Protocol (RDP) involve repeated attempts to guess the correct username and password to gain unauthorized access. To mitigate these attacks, several strategies can be employed. --that means hacker might steal and remote control Aeza did very bad things to black Aeza so now 美国 can 对4名俄罗斯公民(could be innoncent) 实施制裁 指控他们涉嫌网络犯罪 or the hacker group stole user name and password dig out 4名俄罗斯公民 darkside? 行政機關:Aeza-Network-RU 產品描述: 國家/地區:RU 地址:Room 603, Suite 1N, Building 1 15 Zolnaya Street 193318 Saint Petersburg Russian Federation 管理員:AEZA GROUP Ltd 電話: 郵箱:abuse@aeza.ru ---------------------- 西方炒作中国“网络攻击”打乱不了中国全方位对外开放合作的势头 2024年3月26日, 14:49 英美等国近日指责中国实施所谓“网络攻击”并施加制裁。南京大学国际关系研究院副院长、副教授郑安光认为,这是一种旨在破坏中外合作的“乌贼战略”,但打乱不了中国全方位对外开放合作的势头。 美国周一(3月25日)宣布对一家中国公司以及与该公司有关联的两名中国人实施制裁,指控他们为中国政府支持的黑客,针对美国关键基础设施实施了多起恶意网络行动。美国财政部在一份声明中说,被制裁的中国公司名为武汉晓睿智科技有限公司,它是中国国家安全部的幌子公司,被制裁的两名个人分别是赵光宗(Zhao Guangzong)和倪高彬(Ni Gaobin)。 美财政部称,中国政府支持的恶意网络行为体仍然是对美国国家安全构成的最大、最持久的威胁之一。 对此,郑安光认为,西方国家攻击中国所谓“网络攻击”并不是什么新鲜事,但所有这些指责都是没有证据的空穴来风。反而外界通过斯诺登等人的披露得知,美国在开展大规模的系统性网络攻击和窃密。 他指出:“西方国家不断指责中国是一种试图把水搅浑的‘乌贼战略’。这种诽谤抹黑不利于双边关系的稳定和发展,破坏了中美两国领导人达成的‘旧金山共识’,更不利于双方在网络安全、人工智能管制等领域的合作。” 然而,除美国外,同一天,英国也指责中国对其民选代表和选举委员会进行恶意网络攻击,并召见中国驻英大使,且与美国一样,宣布制裁同一中国实体和两名个人。此外,新西兰政府声称,中国参与了2021年“有政府支持的”对新西兰议会的网络攻击,已就此向中国政府表达了关切,但表示不会实施制裁。另有报道称,澳洲外交部长黄英贤和内政部长奥尼尔发表联合声明说,黑客持续攻击民主机构与进程,对澳洲等民主与开放社会产生影响,这种行为不可接受,必须停止。 这些国家声称,实施网络攻击的是黑客组织“APT31”和“APT40”(Advanced Persistent Threat,高级持续威胁),隶属于中国国家安全部。美国司法部副部长丽莎·摩纳哥(Lisa Monaco)在一份声明中说,APT31在全球实施黑客行动的目的是“镇压批评中国政府的人士,破坏政府机构,窃取商业机密”。美国政府网络安全和基础设施安全局(CISA)称,APT40此前曾针对“各种政府组织、公司和大学”发动袭击。 中国遭以上多国所谓网络攻击指控正值中国发展高层论坛2024年年会在北京举行,年会主题为“持续发展的中国”。110多位来自主要国际经济组织、世界500强企业的负责人、国际知名学者,汇聚一堂,共话中国持续发展的动能、机遇与合作。郑安光认为,中国发展高层论坛在北京举行等说明中国正在以更大力度推动对外开放,此时西方国家抛出这些指责和攻击,目的是破坏中外合作的氛围,维护“小圈子”私利。 他强调:“中国坚持对外开放、积极发展国际合作的政策和立场不会改变。这种抹黑诽谤的小伎俩明眼人一望便知,在国际社会中不会获得广泛支持,因而也不会得逞。中国全方位对外开放合作的势头也不会被打乱。” 中国驻英国、美国和新西兰大使馆已对网攻相关指控予以驳斥,称其毫无根据,极不负责。中国外交部发言人林剑也回应称,网络安全是全球性挑战,中国是网络攻击的主要受害者之一,一贯坚决依法制止和严厉打击各类的网络恶意活动,主张各国通过对话与合作共同应对。网络攻击溯源问题高度复杂敏感,在调查和定性网络事件时,应有充分客观证据,而不是在没有事实依据的情况下抹黑他国,更不能将网络安全问题政治化,希望各方停止散布虚假信息,切实采取负责任的态度,共同维护网络空间的和平与安全。中方一贯反对非法单边制裁,将坚决维护自身合法权益。 --it is very simple as masters group cant accept the failure in 俄乌 wars because they all involve and spent huge money such as 冯德莱恩:3年来近1650亿欧元, 2025 would up to 84% of all that 瑞典11亿欧元,丹麦6.9亿欧元,挪威6.1亿欧元,德国4.5亿欧元,英国3.6亿欧元->4.5亿英镑(超5.85亿美元), 欧盟委员会30亿欧元的贷款. 2022年2月以来 欧洲各国军事援助总额640亿欧元. 美国2026财年国防预算乌克兰 163+2亿美元(安全援助USAI 增至3->5亿美元) 国防部长继续向乌克兰政府提供情报支援,包括收集情报、信息及图像资料 禁止削减驻欧美军规模或放弃北约驻欧部队最高司令指挥权 to avoid Russia revenge cant but 投入 核升级 250亿美元 3% 核三位一体 600亿美元 7.2% ??? 金穹导弹防御系统 250亿美元 You can see why Trump forced Europe every countries and Korea, Japan pay 5% their GDP to buy usa threaten weapons. if only if usa masters groups still existing, there is no PEACE in the world and any country in their ways would be severely punished. thats why we can see full mouth liars to black China as refuse to stand by masters side. 中国外交部:美国才是网络攻击的始作俑者和集大成者 2024年2月1日, 16:06 俄罗斯卫星通讯社北京2月1日电 中国外交部发言人汪文斌2月1日在例行记者会上表示,美国才是网络攻击的始作俑者和集大成者。 有记者提问,昨天有美国官员称,已破获了一个针对美国公共基础设施的中国黑客网络。美国联邦调查局局长昨天表示,中国是世界上最大的黑客活动国家。中方对此有何回应? 对此,发言人表示,中国坚决反对并依法打击任何形式的网络攻击,美方在缺乏有效证据的情况下妄下结论,对中国无端指责抹黑,极其不负责任,纯属混淆是非,中方对此坚决反对。 汪文斌指出,美国才是网络攻击的始作俑者和集大成者。美国网络司令部公然将他国的关键基础设施列为美国网络攻击的合法目标。去年以来,中国的网络安全机构陆续发布报告,揭露了美国政府长期以来对中国关键基础设施实施网络攻击的情况,这种不负责任的政策和做法将全球关键基础设施置于巨大的风险之中,我们敦促美方停止在全球范围内搞网络窃密和攻击,停止利用网络安全问题抹黑他国。 中方锁定网络攻击西工大的美国安全局工作人员真实身份 2023年9月14日, 10:31 消息称,近日,在中国国家计算机病毒应急处理中心会同360公司配合侦办西北工业大学被美国国家安全局(NSA)网络攻击案过程中,成功提取了“二次约会”间谍软件的多个样本,并锁定了这起网络间谍行动背后NSA工作人员的真实身份。 据技术分析报告显示,“二次约会”间谍软件是美国国家安全局(NSA)开发的网络间谍武器,该软件可实现网络流量窃听劫持、中间人攻击、插入恶意代码等恶意功能,它与其他恶意软件配合可以完成复杂的网络“间谍”活动。 据专家介绍,“二次约会”间谍软件长期驻留在网关、边界路由器、防火墙等网络边界设备上,其主要功能包括网络流量嗅探、网络会话追踪、流量重定向劫持、流量篡改等。另外,“二次约会”间谍软件支持在各类操作系统上运行,同时兼容多种体系架构,适用范围较广。 报告称,经层层溯源,工作人员发现了上千台遍布各国的网络设备中仍在隐蔽运行“二次约会”间谍软件及其衍生版本,并发现被美国国家安全局(NSA)远程控制的跳板服务器,其中多数分布在德国、日本、韩国、印度和中国台湾。 美荷英加 超一万家企业使用 SharePoint 服务器遭受不明亚洲黑客攻击 微软漏洞引爆全球安全危机!超一万家企业服务器面临风险 微软(510.06, 0.01, 0.00%)(MSFT.US)服务器软件正遭受不明黑客攻击,网络安全分析师警告全球范围内可能出现大规模安全漏洞。 微软表示,已发布针对SharePoint服务器的新安全补丁"以缓解针对本地服务器的活跃攻击",并称正在部署更多修复程序。 美国网络安全和基础设施安全局确认该漏洞存在,指出黑客可利用其访问文件系统、内部配置并通过网络执行代码。 密歇根州网络安全公司Censys研究员西拉斯·卡特勒估计,全球超过10,000家使用SharePoint服务器的企业面临风险,其中美国受影响企业数量最多,荷兰、英国和加拿大紧随其后。 "这简直是勒索软件运营者的美梦,很多攻击者这个周末要加班了,"他补充道。 帕洛阿尔托网络公司警告称"这些漏洞利用真实存在且构成严重威胁"。 谷歌(191.15, 5.21, 2.80%)威胁情报小组通过邮件声明表示,已观测到黑客利用该漏洞的行为,指出其可导致"持续的未授权访问,对受影响组织造成重大风险"。 美国媒体援引州政府官员和独立研究人员的消息称,美国联邦和州级机构、大学、能源公司及一家亚洲电信运营商已遭入侵。 这已是微软近期遭遇的系列网络攻击之一。该公司曾在3月警告,亚洲黑客正瞄准远程管理工具和云应用程序,意图监视美国及海外多家企业和组织。 白宫直属的网络安全审查委员会去年就2023年微软Exchange Online邮箱遭入侵事件指出,该公司的安全文化"存在缺陷"。该事件导致22个组织和数百名个人数据泄露,受害者包括美国前商务部长吉娜·雷蒙多。 责任编辑:于健 -- baidu searched [what is SharePoint ?] SharePoint Portal Server是一个门户站点,使得企业能够开发出智能的门户站点,这个站点能够无缝连接到用户、团队和知识。因此人们能够更好地利用业务流程中的相关信息,更有效地开展工作。 SharePoint Portal Server提供了一个企业地业务解决方案,它利用了企业应用程序集成功能,以及灵活地部署选项和管理工具,将来自不同系统地信息集成到一个解决方案中。这个门户站点使得端到端地合作更为容易,实现了个人、团队和信息地整合、组织和搜索。用户可以通过门户内容和布局地定制和个性化以及目标受众,更快地找到相关信息。公司可以根据受众地公司职位、团队身份、兴趣或其他可以设置地成员规则来设定信息、程序和更新。 SharePoint Portal Server 2003 使用 Microsoft Windows SharePoint Services 2003站点为个人、信息和公司创建门户页面。这些页面可以通过公司和管理工具来扩展 Windows SharePoint Services站点的功能,并且使得团队能够在他们的站点中向整个企业发布信息。 发行版本有SharePoint2003、SharePoint2007、Sharepoint 2010、SharePoint2013和SharePoint2016。 美东时间2025年7月20日,据路透社报道,微软公司近日发布安全警告,称其SharePoint服务器软件正在遭到持续攻击,微软在7月20日发布的安全通告中表示,攻击者正在利用SharePoint软件中的一个“允许授权攻击者在网络中执行伪装行为”的漏洞。 [5] searched [Is SharePoint free?] No, SharePoint does not have a free version for general use. --very good nothing related to us, so ignore it. however last several days got serious SYN Flood attack that very bad IP address (from iplark.com reported) as: the following malicious IP address in admin logs from 7/1 - 7/23/2025 06:42:29 local time : 198.23.172.62 威胁: SCANNER 参与扫描: 是 196.251.69.43 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 196.251.83.136 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 196.251.87.35 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 196.251.87.42 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 193.46.255.235 威胁: SCANNER 参与扫描: 是 172.233.183.40 威胁: SCANNER 参与扫描: 是 172.234.207.202 威胁: SCANNER 参与扫描: 是 172.236.233.65 威胁: SCANNER 参与扫描: 是 174.137.133.32 威胁: BOTNET 僵尸网络: 是 *PS malicious 美国webair.com 7/15/2025 9:21:51 104.237.151.205 威胁: SCANNER 参与扫描: 是 97.107.140.120 威胁: SCANNER 参与扫描: 是 ................All came from 荷兰 北荷兰省 阿姆斯特丹 82.145.213.8 opera.com 参与扫描: 否 **PS cant uninstall Norway opera browser?, it took me long time to remove from HD (because it auto came back), suddenly 07/13/2025 7:40:05 local time in logs 提供商:Norway Opera VPN 代理类型: (荷兰) VPN below all are ipvolume.net 89.248.163.6 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.8 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.27 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.29 威胁: SCANNER 参与扫描: 是 89.248.163.37 威胁: SCANNER 参与扫描: 是 89.248.163.63 威胁: SCANNER 参与扫描: 是 89.248.163.65 威胁: SCANNER 参与扫描: 是 89.248.163.69 威胁: SCANNER 参与扫描: 是 89.248.163.71 威胁: SCANNER 参与扫描: 是 89.248.163.76 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.77 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.78 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.86 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.121 威胁: SCANNER 参与扫描: 是 89.248.163.125 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.134 威胁: SCANNER 参与扫描: 是 89.248.165.139 威胁: SCANNER 参与扫描: 是 89.248.163.150 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.153 威胁: SCANNER 参与扫描: 是 89.248.163.154 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.158 威胁: SCANNER 参与扫描: 是 89.248.163.177 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.213 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.222 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.163.224 威胁: SCANNER 参与扫描: 是 89.248.163.244 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.165.44 威胁: SCANNER 参与扫描: 是 89.248.165.108 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.165.130 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.165.132 威胁: SCANNER 参与扫描: 是 89.248.165.136 威胁: SCANNER 参与扫描: 是 89.248.165.139 威胁: SCANNER 参与扫描: 是 89.248.165.140 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.165.142 威胁: SCANNER 参与扫描: 是 89.248.165.144 威胁: SCANNER 参与扫描: 是 89.248.165.148 威胁: SCANNER 参与扫描: 是 89.248.165.155 威胁: SCANNER 参与扫描: 是 89.248.165.156 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 89.248.165.157 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 ..................... 45.33.28.47 威胁: SCANNER 参与扫描: 是 45.33.50.24 威胁: SCANNER 参与扫描: 是 45.56.103.154 威胁: SCANNER 参与扫描: 是 45.79.102.191 威胁: SCANNER 参与扫描: 是 45.56.103.154 威胁: SCANNER 参与扫描: 是 45.79.190.208 威胁: SCANNER 参与扫描: 是 45.79.190.216 威胁: SCANNER 参与扫描: 是 34.28.207.190 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 34.55.102.107 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 34.66.88.210 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 35.226.27.221 威胁: SPAM/SCANNER 滥发邮件: 是 参与扫描: 是 (7/23/2025 posted) 负债3 亿还 28 年的日本中产,后来怎样了?只有2 类人能守住日子 2025年07月21日 17:16 驻家金陵v--九十年代初房价跌六成,股市腰斩, 经济增速从 5% 直接掉到负数 9/10 -> 4/10 正式工, 临时工工资只有50% 没社保没前途... it happened in taiwan since rotten abien mayor 房价跌 公司裁员倒闭 投资血本无归 守不住全家碳烧自杀(台北) 找不到工作广告的我房贷吃掉积蓄压力也有自杀想法, 虽然天乙天德太极贵人得到工作自知没前途 决定花时间找丈夫, request job certificate, no marriage, no AIDs proof. if not 善良守信几乎在机场避而不见(秃顶胖矮)..., the next happened in usa caused by masters wars. 幸亏危机意识强烈 一直省钱 到目前守住日子. 暝暝之中有生路 if you did right choice. i am very appreciated our 祖先的训诫 that is why can go through tough 的日子. YOU can too. the most important must 戒贪 so you wont be so easy 辛财被劫. must keep alert that must keep eyes on your router admin logs [[DoS attack: SYN Flood] -like and suggest iplark.com(not sure is made in China? i hope so, the only can trust china made without backdoor) can help you identify bad IP address may issue 威胁-type(SCANNER, SPAM, BOTNET), 滥发邮件, 僵尸网络 and may 参与扫描 is malicious especiaally 89.248.163(and 165)北荷兰省 阿姆斯特丹 (ipvolume.net). every one should learn as earlier as possible.
自訂分類:中国
上一則: 平心而论,巴列维时代的伊朗真有那么美好吗?--Sadam, 阿萨德 better than 巴列维;犹太人又找到了一个“应许之地”?--心里发毛的塞浦路斯 becomes the next 恐怖之吻 after 加沙 下一則: 快讯!外媒:以色列军队对加沙北部部分地区发出疏散警告;特朗普:腐败案审理妨碍恶魔屠夫干大事--最凶残的大屠杀 埃及边境建集中营 约30平方公里 约230万人必须尽可能被杀死
你可能會有興趣的文章:
- block fraud emails sender address filter not working? ineffective against modern spam as spammers frequently change, spoof, or mask sender addresses
- 明州对峙后 ICE执法仍含无犯罪记录移民--12周被拘留9000人46%x6@周,7000人42%x6@周=42,480(ICE累计超过14.6万名)无指控或无定罪记录的移民
- what AI cant do but 360doc (or even udn) can ? myself hate if it is AI control my HD, iphone, email accounts... that is the key.
- which brand use plastic saussage, any non eatable warning ? 塑料肠衣 or 可食用合成胶原蛋白肠衣, highly suspect the label showed 天然肠衣 更新4/2/2026
- 遭中国学界集体“拉黑”后,NeurIPS道歉--it is time to build 全球学术 and post in china 期刊 as a real 开放、信任、合作的国际学术环境;血肉筑长城更新04/062026
- 国台办:统一后建海峡通道 台胞可自驾赴京--许多成就远远超出孙中山建国方略宏伟蓝图,有强大祖国做后盾台湾基础设施建设会更好;习近平邀请郑丽文访问大陆更新4/9/2026
限會員,要發表迴響,請先登入

