ymemey
|
|
November 16, 2017, 07:44:08 AM |
|
guys, what multipool with stable online and normal profit you know?
exclude mining-dutch, granatgas and prohashing
|
|
|
|
Antnoob
Newbie
Offline
Activity: 32
Merit: 0
|
|
November 16, 2017, 08:37:40 AM |
|
Anyone ever tried http://italyiimp.com ? I see they are giving good stats for the last few days, but I also see comments from users that they're not paying ...
|
|
|
|
HiBorn
Newbie
Offline
Activity: 87
Merit: 0
|
|
November 16, 2017, 11:30:51 AM |
|
Did anyone receive Nov 1-10 batch L3+?
yes they shipped it early oct 21st for me. Mine hasn't been shipped yet for some reason??? My Nov 1-10 order has not shipped, no response from cuntmain.
|
|
|
|
|
cienki77
Member
Offline
Activity: 123
Merit: 10
|
|
November 16, 2017, 10:37:44 PM |
|
|
FCK COIN REBORN! WE DO GIVE A FCK!
|
|
|
rockyforever
|
|
November 17, 2017, 04:03:43 AM |
|
I don't know about ya'll, but ever since I downloaded that latest D3 firmware, my troubles got waaay worse. These fucking things crash every 12-24 hours or so even with good temps and no HW errors.
This is the L3 not D3 thread....
|
|
|
|
UnknownBTC
|
|
November 17, 2017, 06:55:17 AM |
|
How my L3+ was hacked!Waking up today morning i found my L3+ was not hashing. It turns out it was hashing for some one else on nicehash with BTC address: 14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUf https://www.nicehash.com/miner/14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUfit seems some one out there has auto scanner searching network for L3+ and inputs default password of Root: i only lost 8 hours of hashing on 1 machine. here are the following mistakes i made: 1) I put the L3+ in DMZ (nicehash was not working so i figured DMZ might fix the issue) 2) I kept the default user and password 3) disabled firewall on my router Just a headsup to people. to change the default password. In all honesty it was my own stupidity and complacency. First thing what I did when I booted them - I changed the root password. How come that someone got into your private network first?
|
My custom wallet: 1LearBTCNt5HnruJFdPHH1VAYDKtnTbDYR
|
|
|
litmus
Member
Offline
Activity: 106
Merit: 10
|
|
November 17, 2017, 07:27:03 AM |
|
It's a good heads up, even with your self deprecating admissions of complacency... They should do better to have their new customers not accidentally "mine for awhile" with their pool connection.settings configured. It seems like at the manufactures (even the simple script based ETHOSdistro) does this . Also glad that you got back in with no issues, and nothing worse happened, like malware or something that voided that warranty (or something Bitmain could wiggle out of supporting your for).
Thanks.
|
|
|
|
UnknownBTC
|
|
November 17, 2017, 08:05:45 AM |
|
How my L3+ was hacked!Waking up today morning i found my L3+ was not hashing. It turns out it was hashing for some one else on nicehash with BTC address: 14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUf https://www.nicehash.com/miner/14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUfit seems some one out there has auto scanner searching network for L3+ and inputs default password of Root: i only lost 8 hours of hashing on 1 machine. here are the following mistakes i made: 1) I put the L3+ in DMZ (nicehash was not working so i figured DMZ might fix the issue) 2) I kept the default user and password 3) disabled firewall on my router Just a headsup to people. to change the default password. In all honesty it was my own stupidity and complacency. so you had your baikal hacked too or this is someone else that copied pasted your post? https://deeponion.org/community/threads/how-my-baikal-a2000-was-hacked.9643/
|
My custom wallet: 1LearBTCNt5HnruJFdPHH1VAYDKtnTbDYR
|
|
|
crypticj
|
|
November 17, 2017, 11:17:34 AM |
|
How my L3+ was hacked!Waking up today morning i found my L3+ was not hashing. It turns out it was hashing for some one else on nicehash with BTC address: 14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUf https://www.nicehash.com/miner/14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUfit seems some one out there has auto scanner searching network for L3+ and inputs default password of Root: i only lost 8 hours of hashing on 1 machine. here are the following mistakes i made: 1) I put the L3+ in DMZ (nicehash was not working so i figured DMZ might fix the issue) 2) I kept the default user and password 3) disabled firewall on my router Just a headsup to people. to change the default password. In all honesty it was my own stupidity and complacency. First thing what I did when I booted them - I changed the root password. How come that someone got into your private network first? I had the miner in DMZ because nicehash wasn't working so i thought maybe one of the firewall was blocking it.
|
|
|
|
crypticj
|
|
November 17, 2017, 11:19:38 AM |
|
How my L3+ was hacked!Waking up today morning i found my L3+ was not hashing. It turns out it was hashing for some one else on nicehash with BTC address: 14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUf https://www.nicehash.com/miner/14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUfit seems some one out there has auto scanner searching network for L3+ and inputs default password of Root: i only lost 8 hours of hashing on 1 machine. here are the following mistakes i made: 1) I put the L3+ in DMZ (nicehash was not working so i figured DMZ might fix the issue) 2) I kept the default user and password 3) disabled firewall on my router Just a headsup to people. to change the default password. In all honesty it was my own stupidity and complacency. so you had your baikal hacked too or this is someone else that copied pasted your post? https://deeponion.org/community/threads/how-my-baikal-a2000-was-hacked.9643/That was not me, some one just copied my post for there Baikal incident. some one can't even write there original words. "Imitation is sincerest form of flattery" I guess. Edit: I guess they are copying post to hit there post #s for onion forums i guess.
|
|
|
|
Antnoob
Newbie
Offline
Activity: 32
Merit: 0
|
|
November 17, 2017, 11:37:15 AM |
|
Anyone ever tried http://italyiimp.com ? I see they are giving good stats for the last few days, but I also see comments from users that they're not paying ... Read a little bit more, they say they were hacked then ... And today Nicehash is again the most profitable. I feel like I'm missing something ... turns out that either the people buying hashpower there are at loss, or they know some really profitable trick (that I don't) and can get more money despite the high price they're paying. That's driving me crazy ...
|
|
|
|
ymemey
|
|
November 17, 2017, 05:47:03 PM |
|
Anyone ever tried http://italyiimp.com ? I see they are giving good stats for the last few days, but I also see comments from users that they're not paying ... Read a little bit more, they say they were hacked then ... And today Nicehash is again the most profitable. I feel like I'm missing something ... turns out that either the people buying hashpower there are at loss, or they know some really profitable trick (that I don't) and can get more money despite the high price they're paying. That's driving me crazy ... They are scammers. Super long payout, if you lucky. Or you only loose you money. Go to MD or PH
|
|
|
|
BenRickert
|
|
November 17, 2017, 07:00:11 PM |
|
Anyone ever tried http://italyiimp.com ? I see they are giving good stats for the last few days, but I also see comments from users that they're not paying ... Read a little bit more, they say they were hacked then ... And today Nicehash is again the most profitable. I feel like I'm missing something ... turns out that either the people buying hashpower there are at loss, or they know some really profitable trick (that I don't) and can get more money despite the high price they're paying. That's driving me crazy ... Probably boosted by Large Hash power buyers. Willing to accept lower profits without the PITA of owning and maintaining servers.
|
|
|
|
alred911
Member
Offline
Activity: 72
Merit: 10
|
|
November 17, 2017, 09:17:35 PM |
|
when the december batch will be delivred, do you think there will still money to be made ? or it will be another brick along with the D3 ?
|
|
|
|
Albortz
Sr. Member
Offline
Activity: 420
Merit: 250
Tax Attorney - Investor - Entrepreneur
|
|
November 17, 2017, 09:45:07 PM |
|
How my L3+ was hacked!Waking up today morning i found my L3+ was not hashing. It turns out it was hashing for some one else on nicehash with BTC address: 14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUf https://www.nicehash.com/miner/14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUfit seems some one out there has auto scanner searching network for L3+ and inputs default password of Root: i only lost 8 hours of hashing on 1 machine. here are the following mistakes i made: 1) I put the L3+ in DMZ (nicehash was not working so i figured DMZ might fix the issue) 2) I kept the default user and password 3) disabled firewall on my router Just a headsup to people. to change the default password. In all honesty it was my own stupidity and complacency. First thing what I did when I booted them - I changed the root password. How come that someone got into your private network first? He put them in the DMZ thats before the firewall. Everyone with a bit tech knowledge can search IP addresses and find a miner in the DMZ. Would not advise anyone to put anything there. If you cant get it going with a port forwarding sell it or let it be.
|
|
|
|
ssnova
Newbie
Offline
Activity: 49
Merit: 0
|
|
November 18, 2017, 03:52:19 AM |
|
when the december batch will be delivred, do you think there will still money to be made ? or it will be another brick along with the D3 ?
Hard to say, if so many people are getting in, then it's a diminishing return for the hashrates, haha.. but that's the cryptoworld. On a side note, can anyone suggest a walk through of someone who may have successfully used a wireless router(with ethernet ports) to bridge to a wireless internet connection with these L3+'s (as I know that they only have Ethernet connections)...
|
|
|
|
TK211X
Newbie
Offline
Activity: 24
Merit: 0
|
|
November 18, 2017, 04:45:44 AM |
|
when the december batch will be delivred, do you think there will still money to be made ? or it will be another brick along with the D3 ?
Hard to say, if so many people are getting in, then it's a diminishing return for the hashrates, haha.. but that's the cryptoworld. On a side note, can anyone suggest a walk through of someone who may have successfully used a wireless router(with ethernet ports) to bridge to a wireless internet connection with these L3+'s (as I know that they only have Ethernet connections)... Get an extender. Or a bridge. With an Ethernet switch.
|
|
|
|
Mr_Snipes
|
|
November 18, 2017, 07:36:46 PM |
|
How my L3+ was hacked!Waking up today morning i found my L3+ was not hashing. It turns out it was hashing for some one else on nicehash with BTC address: 14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUf https://www.nicehash.com/miner/14c2ewCFeW1VYtyhLFWB6rFJV36ZysEWUfit seems some one out there has auto scanner searching network for L3+ and inputs default password of Root: i only lost 8 hours of hashing on 1 machine. here are the following mistakes i made: 1) I put the L3+ in DMZ (nicehash was not working so i figured DMZ might fix the issue) 2) I kept the default user and password 3) disabled firewall on my router Just a headsup to people. to change the default password. In all honesty it was my own stupidity and complacency. First thing what I did when I booted them - I changed the root password. How come that someone got into your private network first? He put them in the DMZ thats before the firewall. Everyone with a bit tech knowledge can search IP addresses and find a miner in the DMZ. Would not advise anyone to put anything there. If you cant get it going with a port forwarding sell it or let it be. In shodan you can currently find 1600 antminer-webservers. Maybe one in a hundred will be at default or pw 1234 But then again i found some xampp-servers with all default in the past. If you config it that way, expect to get rekt
|
|
|
|
coldstorage
Member
Offline
Activity: 112
Merit: 11
|
|
November 18, 2017, 09:20:33 PM |
|
Anyone ever reset these with the button the front before? I can seem to get mine to reset. My miner has been running for more than 5 minutes, manual says press and hold for 10 seconds, then release and it will restart with factory settings. I get no response whatsoever, timing myself with my phone's stopwatch and trying iterations of a little more and little less than 10 seconds after that didn't work. There's a help page at bitmain that says 5 seconds, and I tried that too, but that one has a photo of an S series antminer, so I assume the manual is right.
|
|
|
|
|