Bitcoin Forum
December 13, 2024, 04:45:30 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 3 4 »  All
  Print  
Author Topic: OMG OMG 51% attack?!?! 88.208.1.24  (Read 5115 times)
JFrancis (OP)
Newbie
*
Offline Offline

Activity: 9
Merit: 0


View Profile
September 05, 2013, 02:54:17 AM
 #1

So, the price of bitcoin crashed like 15% in the last 24 hours, with the adoption of the new unnecessary 0.8.4, the still guarenteed threat of more war in the middle east, and now 88.208.1.24.

http://blockchain.info/blocks/88.208.1.24

This IP, supposedly from Virginia, has more processing power than the world has ever seen before. (speculation)

They discovered 3 blocks in one ten minute period, and another 3 blocks in a 14 minute period.

That makes them capable of a 51% attack.

WHO ARE THEY AND WILL THEY RAPE THE NETWORK? Shocked
_xyz
Newbie
*
Offline Offline

Activity: 37
Merit: 0


View Profile
September 05, 2013, 03:17:58 AM
 #2

...Luck happens  Grin
Singlebyte
Hero Member
*****
Offline Offline

Activity: 854
Merit: 1000



View Profile
September 05, 2013, 03:20:40 AM
 #3

This is concerning to say the least.


I wonder if these guys have fired up their 25TH Machines?
https://bitcointalk.org/index.php?topic=288045.new;topicseen#new

...Luck happens  Grin

Yea Right....  They are not THAT lucky. 
JFrancis (OP)
Newbie
*
Offline Offline

Activity: 9
Merit: 0


View Profile
September 05, 2013, 03:37:07 AM
 #4

Price is starting to recover.

Any idea what caused the crash?

It wasn't any of the things listed above.

Did a whale move or something?

(Also,88.208.1.24 is still very concerning - to me, it looks like a trial run of a network of datacenters working together to be able to overtake the bitcoin network... and you realize, they don't have to take over forever - just long enough to screwup the chain and crash the BTC price. GO AMERICA! Where's my I love NSA, you love NSA image.......)
JFrancis (OP)
Newbie
*
Offline Offline

Activity: 9
Merit: 0


View Profile
September 05, 2013, 03:49:59 AM
 #5

Something to note:

Ashburn, VA (where the IP originates) is about 25 miles/40km from the CIA headquarters.
yochdog
Legendary
*
Offline Offline

Activity: 2044
Merit: 1000



View Profile
September 05, 2013, 03:53:11 AM
 #6

Hmmm

I am a trusted trader!  Ask Inaba, Luo Demin, Vanderbleek, Sannyasi, Episking, Miner99er, Isepick, Amazingrando, Cablez, ColdHardMetal, Dextryn, MB300sd, Robocoder, gnar1ta$ and many others!
BCB
CTG
VIP
Legendary
*
Offline Offline

Activity: 1078
Merit: 1002


BCJ


View Profile
September 05, 2013, 03:54:33 AM
 #7

ASIC Farm
kwaaak
Full Member
***
Offline Offline

Activity: 139
Merit: 100


View Profile
September 05, 2013, 04:15:07 AM
 #8

ghash.io
BCB
CTG
VIP
Legendary
*
Offline Offline

Activity: 1078
Merit: 1002


BCJ


View Profile
September 05, 2013, 04:52:42 AM
 #9

who's that?
Nigeria Prince
Newbie
*
Offline Offline

Activity: 28
Merit: 0



View Profile
September 05, 2013, 04:59:53 AM
 #10

It is CIA starting 51% attack.

It is their new data center in Ashburn, VA, near Langley, VA.

http://cqcounter.com/whois/?query=88.208.1.24&map=1#map_geo_location
blarg
Full Member
***
Offline Offline

Activity: 170
Merit: 100



View Profile
September 05, 2013, 05:07:28 AM
 #11

i dont like the sound of this    Undecided
blarg
Full Member
***
Offline Offline

Activity: 170
Merit: 100



View Profile
September 05, 2013, 05:17:06 AM
 #12

advancedhosters.com

these guys are the IP and have large data centers.

r3wt
Hero Member
*****
Offline Offline

Activity: 686
Merit: 504


always the student, never the master.


View Profile
September 05, 2013, 05:19:46 AM
 #13

http://cqcounter.com/traceroute/?query=88.208.1.24

share-bt.net registered with with Advanced Hosters, a shell company owned by a company named Haldex, LTD.

check out the traceroute. they are behind several proxies, some of which have omitted geolocation data.

but look what Avast says:


My negative trust rating is reflective of a personal vendetta by someone on default trust.
JFrancis (OP)
Newbie
*
Offline Offline

Activity: 9
Merit: 0


View Profile
September 05, 2013, 05:49:20 AM
 #14

I don't know exactly what traceroute is good for...

But the end result, hop 11 and 12, are 149.11.134.22, which is registered in the District of Columbia, to Cogent Communications.
edit: ok, I reloaded and the end result is again 88.208.1.24, after the 11th hop being 149.11.134.22.

I'm not sure why Avast points to the Netherlands.

I've pinged the IP, it's still up. I'm doing a portscan on it.... not sure how that would be beneficial, but I don't know what to do in a situation like this....

using nmap

Discovered open port 110/tcp on 88.208.1.24
Discovered open port 443/tcp on 88.208.1.24
Discovered open port 25/tcp on 88.208.1.24
Discovered open port 143/tcp on 88.208.1.24
Discovered open port 993/tcp on 88.208.1.24
Discovered open port 80/tcp on 88.208.1.24
Discovered open port 995/tcp on 88.208.1.24
Discovered open port 587/tcp on 88.208.1.24

and still trying the other 60+ thousand TCP ports.

I attempted to use the IP as an SMTP server, but my client rejected me, saying it wasn't in the accepted list of rcpthosts.

Anyway... like I said, this is above my head... I know there are known ranges of US gov IP addresses, but I haven't found any available for free yet.
r3wt
Hero Member
*****
Offline Offline

Activity: 686
Merit: 504


always the student, never the master.


View Profile
September 05, 2013, 05:55:35 AM
 #15

I don't know exactly what traceroute is good for...

But the end result, hop 11 and 12, are 149.11.134.22, which is registered in the District of Columbia.

I'm not sure why Avast points to the Netherlands.

I've pinged the IP, it's still up. I'm doing a portscan on it.... not sure how that would be beneficial, but I don't know what to do in a situation like this....

using nmap

Discovered open port 110/tcp on 88.208.1.24
Discovered open port 443/tcp on 88.208.1.24
Discovered open port 25/tcp on 88.208.1.24
Discovered open port 143/tcp on 88.208.1.24
Discovered open port 993/tcp on 88.208.1.24
Discovered open port 80/tcp on 88.208.1.24
Discovered open port 995/tcp on 88.208.1.24
Discovered open port 587/tcp on 88.208.1.24

and still trying the other 60+ thousand TCP ports.

I attempted to use the IP as an SMTP server, but my client rejected me, saying it wasn't in the accepted list of rcpthosts.

Anyway... like I said, this is above my head... I know there are known ranges of US gov IP addresses, but I haven't found any available for free yet.

do a scan on port 1327. if its open then the machine is exploitable. i'm willing to bet its open, because my antivirus blocks the ip address as malicious due to botnet activity

My negative trust rating is reflective of a personal vendetta by someone on default trust.
JFrancis (OP)
Newbie
*
Offline Offline

Activity: 9
Merit: 0


View Profile
September 05, 2013, 06:03:23 AM
Last edit: September 05, 2013, 06:17:12 AM by JFrancis
 #16

First time using nmap was earlier today for a completely different use. I'll try. TCP or what? for 1327.
So far I'm only doing TCP.

Discovered open port 3333/tcp on 88.208.1.24
Discovered open port 3334/tcp on 88.208.1.24
Discovered open port 4369/tcp on 88.208.1.24
Discovered open port 5222/tcp on 88.208.1.24
Discovered open port 5269/tcp on 88.208.1.24
Discovered open port 5280/tcp on 88.208.1.24
Discovered open port 5223/tcp on 88.208.1.24
Discovered open port 7777/tcp on 88.208.1.24
Discovered open port 8332/tcp on 88.208.1.24
Discovered open port 8333/tcp on 88.208.1.24

done TCP scan; 1327 TCP is not open.
kwaaak
Full Member
***
Offline Offline

Activity: 139
Merit: 100


View Profile
September 05, 2013, 06:17:16 AM
 #17

Jesus christ its not the cia, the blocks are found by https://ghash.io
r3wt
Hero Member
*****
Offline Offline

Activity: 686
Merit: 504


always the student, never the master.


View Profile
September 05, 2013, 06:27:13 AM
 #18

Jesus christ its not the cia, the blocks are found by https://ghash.io

for some reason that website is blocked by my antivirus

My negative trust rating is reflective of a personal vendetta by someone on default trust.
melon
Full Member
***
Offline Offline

Activity: 134
Merit: 100



View Profile
September 05, 2013, 06:27:33 AM
 #19

why is avast pointing to the Frisian islands?..WTF...lol

Once was a man his name was Jed..had a lot of hair but it wasn't on his head !
JFrancis (OP)
Newbie
*
Offline Offline

Activity: 9
Merit: 0


View Profile
September 05, 2013, 06:51:07 AM
Last edit: September 05, 2013, 07:27:30 AM by JFrancis
 #20

You sure it's from GHash.io?

Does GHash.io have a public block history? (like BTCGuild https://www.btcguild.com/index.php?page=pool_stats)



To put this into perspective (edited to take into account timezone differences):

From 20:52 to 1:22 (blockchain.info time), 12 blocks were mined by 88.208.1.24, and only 5 blocks by BTCGuild.


http://blockorigin.pfoe.be/blocklist.php
according to this, they have been identified as coming from GHash.io. I'm not familiar with their identification process. I've read that it can be faked.

Unless I see confirmation from a GHash.IO source, I'm skeptical.
BTCGuild currently says they have a Pool Speed of 222,571 GH/s
GHash.io currently says they have a Pool Speed of 140,540 GH/s (daily average or peak, not sure)
Pages: [1] 2 3 4 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!