全球主机交流论坛

 找回密码
 注册

QQ登录

只需一步,快速开始

CeraNetworks网络延迟测速工具IP归属甄别会员请立即修改密码
查看: 1502|回复: 15

救救孩子,好像被当肉鸡了,还有救没

[复制链接]
发表于 2020-12-8 20:43:19 来自手机 | 显示全部楼层 |阅读模式
本帖最后由 gold2002 于 2020-12-8 21:00 编辑

rn家黑五刚买的小鸡,突然收到的ticket,大神看看什么情况,还有救没。

个人就用来富强,前几天看流量有点异常,还专门登上去iftop看了看,也没看出来什么,只用过一个tcp.sh的一键换内核脚本外加233boy的v2脚本,哪来的神仙啊,收了神通吧。

\sad
着急了用手机传的图,糊了见谅,下面是全文
最强法务部门恐怖如斯么,我要写保证书还是删机跑路



Hello,

RackNerd has received an abuse complaint concerning your service

For more on our Terms of Service and Acceptable Use Policy, please visit:

https://www.racknerd.com/terms-of-service

We await your response to the below abuse complaint.
=-=-=-=-=-=-=-=
From no-reply@sie.sony.com Mon Dec 7 20:08:59 2020
Received: from lvc-sys-prdmx.sonynei.net ([173.230.196.11])
by home3.multacom.com (8.14.7/8.14.7) with SMTP id 0B848xrT004208
for <abuse@multacom.com>; Mon, 7 Dec 2020 20:08:59 -0800
DKIM-Filter: OpenDKIM Filter v2.11.0 home3.multacom.com 0B848xrT004208
Message-Id: <202012080408.0B848aNm006000@lvc-sec-prspike01.sonynei.net>
Subject: IP address(es) were blacklisted from the PlayStation Network [202012075694]
Date: Mon, 7 Dec 2020 20:08:36 -0800
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
To: abuse@multacom.com
From: no-reply@sie.sony.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by home3.multacom.com id 0B848xrT004208

To whom it may concern,

Pursuant to Sony Interactive Entertainment LLC ("SIE") corporate policy, the below IP addresses were blacklisted from using our services because SIE detected activity that is abusive to our network services. In our determination, the abusive activity was not related to velocity or volume (many users behind the same IP address, i.e. NAT), but matched the specific patterns of known abuse of our publicly available services. This abuse may be the result of a computer on your network that has been compromised and is participating in a botnet abuse of our services.

The following table of IP addresses, dates and times should help you correlate the origin of the abusive activity. The time stamps are approximate from our logs. The actual timing of the events depend on the signature matched. It is very likely to have occurred both before, during and following the times listed.

Approximate Time Range (UTC), IP Address, Reason
2020-12-07 14:12:00 ~ 2020-12-07 15:12:00 (UTC), ip, Account Takeover Attempts

It is most likely the attack traffic is directed at one of the following endpoints:

=-=-=-=-=-=-=-=
Thank You,
cherbim 该用户已被删除
发表于 2020-12-8 20:44:19 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
发表于 2020-12-8 20:44:50 | 显示全部楼层
来人 把朕的哈勃拿来
Fei 该用户已被删除
发表于 2020-12-8 20:44:52 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
发表于 2020-12-8 20:45:12 来自手机 | 显示全部楼层
糊的看不清
 楼主| 发表于 2020-12-8 20:47:24 | 显示全部楼层
Hello,

RackNerd has received an abuse complaint concerning your service

For more on our Terms of Service and Acceptable Use Policy, please visit:

https://www.racknerd.com/terms-of-service

We await your response to the below abuse complaint.
=-=-=-=-=-=-=-=
From no-reply@sie.sony.com Mon Dec 7 20:08:59 2020
Received: from lvc-sys-prdmx.sonynei.net ([173.230.196.11])
by home3.multacom.com (8.14.7/8.14.7) with SMTP id 0B848xrT004208
for <abuse@multacom.com>; Mon, 7 Dec 2020 20:08:59 -0800
DKIM-Filter: OpenDKIM Filter v2.11.0 home3.multacom.com 0B848xrT004208
Message-Id: <202012080408.0B848aNm006000@lvc-sec-prspike01.sonynei.net>
Subject: IP address(es) were blacklisted from the PlayStation Network [202012075694]
Date: Mon, 7 Dec 2020 20:08:36 -0800
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
To: abuse@multacom.com
From: no-reply@sie.sony.com
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by home3.multacom.com id 0B848xrT004208

To whom it may concern,

Pursuant to Sony Interactive Entertainment LLC ("SIE") corporate policy, the below IP addresses were blacklisted from using our services because SIE detected activity that is abusive to our network services. In our determination, the abusive activity was not related to velocity or volume (many users behind the same IP address, i.e. NAT), but matched the specific patterns of known abuse of our publicly available services. This abuse may be the result of a computer on your network that has been compromised and is participating in a botnet abuse of our services.

The following table of IP addresses, dates and times should help you correlate the origin of the abusive activity. The time stamps are approximate from our logs. The actual timing of the events depend on the signature matched. It is very likely to have occurred both before, during and following the times listed.

Approximate Time Range (UTC), IP Address, Reason
2020-12-07 14:12:00 ~ 2020-12-07 15:12:00 (UTC), ip  Account Takeover Attempts

It is most likely the attack traffic is directed at one of the following endpoints:

=-=-=-=-=-=-=-=
Thank You,
 楼主| 发表于 2020-12-8 20:51:24 | 显示全部楼层
cherbim 发表于 2020-12-8 20:44
大哥,上个图床吧

手机版传的,太着急了没注意
发表于 2020-12-8 20:57:09 来自手机 | 显示全部楼层
sony好大的官威
发表于 2020-12-8 20:58:12 | 显示全部楼层
弱密码被破了拿去dd了 上次我的hosthatch被黑也是去d索尼了
发表于 2020-12-8 20:58:17 | 显示全部楼层
各类脚本反正我是不敢用,害怕。
您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|小黑屋|全球主机交流论坛

GMT+8, 2024-5-8 23:00 , Processed in 0.080170 second(s), 10 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表