Bitcoin Forum
December 06, 2016, 02:10:25 PM *
News: To be able to use the next phase of the beta forum software, please ensure that your email address is correct/functional.
 
   Home   Help Search Donate Login Register  
Pages: « 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 [92] 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 ... 159 »
  Print  
Author Topic: [~1000 GH/sec] BTC Guild - 0% Fee Pool, LP, SSL, Full Precision, and More  (Read 358842 times)
TeaRex
Member
**
Offline Offline

Activity: 78


View Profile
July 05, 2011, 08:19:39 PM
 #1821

A more general solution to this pretty funny (IMHO) problem is to set your local mining proxy to a non-standard port.

Yeah, I'm simply mining on port 80 now. It's open anyway so I can remotely access the administration functionality of the proxy. And none of the pools in my list use that so no danger of another short circuit... I hope!

*Image Removed*
I'm not asking for donations, but if you think YOUR post is deserving a donation FROM me, send me a message.
1481033425
Hero Member
*
Offline Offline

Posts: 1481033425

View Profile Personal Message (Offline)

Ignore
1481033425
Reply with quote  #2

1481033425
Report to moderator
1481033425
Hero Member
*
Offline Offline

Posts: 1481033425

View Profile Personal Message (Offline)

Ignore
1481033425
Reply with quote  #2

1481033425
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1481033425
Hero Member
*
Offline Offline

Posts: 1481033425

View Profile Personal Message (Offline)

Ignore
1481033425
Reply with quote  #2

1481033425
Report to moderator
1481033425
Hero Member
*
Offline Offline

Posts: 1481033425

View Profile Personal Message (Offline)

Ignore
1481033425
Reply with quote  #2

1481033425
Report to moderator
1481033425
Hero Member
*
Offline Offline

Posts: 1481033425

View Profile Personal Message (Offline)

Ignore
1481033425
Reply with quote  #2

1481033425
Report to moderator
zerokwel
Sr. Member
****
Offline Offline

Activity: 466



View Profile
July 05, 2011, 09:24:09 PM
 #1822

Manually setting the blocks as 120 confirms, even though a few of them aren't yet.  They're secure enough to allow people to get off the pool with 100% of their rewards if this DDoS has completely scared them away.

hell No your still my number 1 pool. And my miners will return when you get back on-line.

The way I see it you stopped a botnet from using your pool and you have the right to refuse anyone you want.

you have kept us updated with what was going on whenever you could.
kjj
Legendary
*
Offline Offline

Activity: 1302



View Profile
July 05, 2011, 09:36:27 PM
 #1823

I've been with BTC Guild since round #28.  I'll be here for round #1464 and all the rest too.

p2pcoin: a USB/CD/PXE p2pool miner - 1N8ZXx2cuMzqBYSK72X4DAy1UdDbZQNPLf - todo
I routinely ignore posters with paid advertising in their sigs.  You should too.
eleuthria
Legendary
*
Offline Offline

Activity: 1750


BTC Guild Owner


View Profile WWW
July 05, 2011, 10:19:18 PM
 #1824

US East is coming back online as the DNS propagates.  Keeping a close eye on it.  I've completely rewritten the "getwork spam" logging to help identify problem IPs as well as potential botnets (high # of IPs on one worker).


US East is running, your shares are counting PERFECTLY.  The user stats are currently disabled just to stop the servers from constantly talking to each other until I know the DDoS is dying out.  You'll see the shares and rewards pop up on a new block as they always have.

I will be taking this unplanned downtime opportunity to rework the stats system to use cached user stats updated at regular intervals, rather than pulling live stats from all of the servers for a user everytime they load the API or My Account page.  This will allow the My Account and API to load almost instantly, the downside being information may be 1-5 minutes stale.

R.I.P. BTC Guild, 2011 - 2015.
BTC Guild Forum Thread
sharky112065
Sr. Member
****
Offline Offline

Activity: 383



View Profile
July 05, 2011, 10:25:16 PM
 #1825

I wonder if the person behind the botnet/ddos was stupid enough to use his isp connection without tor to do the payouts? That would give his IP and he or she could be tracked down.

Donations welcome: 12KaKtrK52iQjPdtsJq7fJ7smC32tXWbWr
TeaRex
Member
**
Offline Offline

Activity: 78


View Profile
July 05, 2011, 10:43:02 PM
 #1826

Great Job eleuthria, my proxy picked it up automatically as soon as it came online... It's a like a pool hopper's wet dream, entering at 0 shares  Cheesy

*Image Removed*
I'm not asking for donations, but if you think YOUR post is deserving a donation FROM me, send me a message.
eleuthria
Legendary
*
Offline Offline

Activity: 1750


BTC Guild Owner


View Profile WWW
July 05, 2011, 10:52:40 PM
 #1827

DDoS is back in full swing flooding our bandwith to its full capacity.

R.I.P. BTC Guild, 2011 - 2015.
BTC Guild Forum Thread
TeaRex
Member
**
Offline Offline

Activity: 78


View Profile
July 05, 2011, 10:54:56 PM
 #1828

Sux... server unreachable again from here. I guess you'd be wholly justified in keeping it offline until you've implemented some real whitelisting. Fucking kiddies.

*Image Removed*
I'm not asking for donations, but if you think YOUR post is deserving a donation FROM me, send me a message.
eleuthria
Legendary
*
Offline Offline

Activity: 1750


BTC Guild Owner


View Profile WWW
July 05, 2011, 11:15:30 PM
 #1829

Sux... server unreachable again from here. I guess you'd be wholly justified in keeping it offline until you've implemented some real whitelisting. Fucking kiddies.

There's no whitelisting.  They're flooding the pipes, and it happens even if I iptable block ALL ips:

http://i.imgur.com/7MBZf.png

R.I.P. BTC Guild, 2011 - 2015.
BTC Guild Forum Thread
Eri
Sr. Member
****
Offline Offline

Activity: 265


View Profile
July 05, 2011, 11:22:03 PM
 #1830

i wonder if you can forward the traffic anywhere useful lol.might as well get Something out of this. too bad Traffic doesn't get ya bitcoins XD though it has shown me just how incredibly inefficient bitcoinplus is. was hoping to get my payout high enough to actually get the little btc i earned with them into my account :/ i don't see it happening *any* time soon lol.
TeaRex
Member
**
Offline Offline

Activity: 78


View Profile
July 05, 2011, 11:47:41 PM
 #1831

Brute-force bandwidth flooding is evil since there seems to be very little you can do about it at your end. For all that I know, unless you have a big, cooperative and probably expensive ISP that is prepared to handle such attacks before they even reach the server, you're SOL.

*Image Removed*
I'm not asking for donations, but if you think YOUR post is deserving a donation FROM me, send me a message.
eleuthria
Legendary
*
Offline Offline

Activity: 1750


BTC Guild Owner


View Profile WWW
July 06, 2011, 12:16:54 AM
 #1832

Latest word from the DE servers is the servers there are getting hammered by 70-85k packets.  Per Second.

R.I.P. BTC Guild, 2011 - 2015.
BTC Guild Forum Thread
newunit16
Member
**
Offline Offline

Activity: 115


View Profile
July 06, 2011, 12:32:59 AM
 #1833

this guy is extremely anti social. he cares not about money, else he would have created his own pool to mine from. the display i have seen here is the worst ever. he mines, gets banned, then ddos's non-stop. no life, no friends, his mom likely hates him too.

the typical anti social "hacker" (and i use that term loosely) would have moved on by now. i am willing to bet he does not know how to setup his own pool.

the sad thing is theres not a lot you can do to stop data coming in. you can tell your router to ignore it, but when its ignoring data, its still getting flooded. the data has to be ignored several hops out, somewhere where there is enough bandwidth to eat the load, to be useful.


keep in mind, he is watching this thread. i wouldnt post any "pool is up" messages.

also, on the upside (is it really an upside since were finding less blocks/hr?) the difficulty rise wont be as bad next time:)
boaz2020
Jr. Member
*
Offline Offline

Activity: 45


View Profile
July 06, 2011, 01:22:01 AM
 #1834

this guy is extremely anti social. he cares not about money, else he would have created his own pool to mine from. the display i have seen here is the worst ever. he mines, gets banned, then ddos's non-stop. no life, no friends, his mom likely hates him too.

the typical anti social "hacker" (and i use that term loosely) would have moved on by now. i am willing to bet he does not know how to setup his own pool.

the sad thing is theres not a lot you can do to stop data coming in. you can tell your router to ignore it, but when its ignoring data, its still getting flooded. the data has to be ignored several hops out, somewhere where there is enough bandwidth to eat the load, to be useful.


keep in mind, he is watching this thread. i wouldnt post any "pool is up" messages.

also, on the upside (is it really an upside since were finding less blocks/hr?) the difficulty rise wont be as bad next time:)
It's likely that they (bot wrangler) haven't noticed and the ongoing "DDoS" attacks are actually rogue zombie miners reporting shares, and the outgoing bandwidth would likely be either ACK's to those shares or LP requests.
bmgjet
Member
**
Offline Offline

Activity: 98


View Profile
July 06, 2011, 01:23:55 AM
 #1835

Really starting to miss BTC. Not much you can really do to stop a dos, What I did 4 years back when one of my servers was getting dos was change the IP address and point the domain name to Microsoft for a day. They will see the attack then get there team on to it and hopefully it will go to there legal team and the attacker gets busted.

Donations to: 1BMGjetfht9XLkGBYR4TSsuXjrYEKACcow
1stbits: 1bmgjet
300MHash/s 6850 http://www.techpowerup.com/gpuz/5u6wr/
Overclocked for 6 years and still strong http://valid.canardpc.com/show_oc.php?id=1931458 & http://valid.canardpc.com/show_oc.php?id=285337
irishmick
Full Member
***
Offline Offline

Activity: 134


View Profile
July 06, 2011, 01:34:39 AM
 #1836

Really starting to miss BTC. Not much you can really do to stop a dos, What I did 4 years back when one of my servers was getting dos was change the IP address and point the domain name to Microsoft for a day. They will see the attack then get there team on to it and hopefully it will go to there legal team and the attacker gets busted.

Lol what? I would have went after the dick sys admin who sent all the traffic my way and disrupted my website because he couldn't handle his own.

http://doge.crypto49er.com:9555         http://doge-eu.crypto49er.com:9555
Pool donations: DTPgwgDvyDL3vcnJFf33nkhBm6o2ZxVT6G
CubedRoot
Sr. Member
****
Offline Offline

Activity: 295


View Profile
July 06, 2011, 01:51:04 AM
 #1837

Really starting to miss BTC. Not much you can really do to stop a dos, What I did 4 years back when one of my servers was getting dos was change the IP address and point the domain name to Microsoft for a day. They will see the attack then get there team on to it and hopefully it will go to there legal team and the attacker gets busted.

Lol what? I would have went after the dick sys admin who sent all the traffic my way and disrupted my website because he couldn't handle his own.

+1 for this comment. Sending your negative traffic to someone else is not the way to do things.  That was a very dick move, and would have been highly frowned upon in most of the professional circles.
newunit16
Member
**
Offline Offline

Activity: 115


View Profile
July 06, 2011, 01:56:19 AM
 #1838

Really starting to miss BTC. Not much you can really do to stop a dos, What I did 4 years back when one of my servers was getting dos was change the IP address and point the domain name to Microsoft for a day. They will see the attack then get there team on to it and hopefully it will go to there legal team and the attacker gets busted.

Lol what? I would have went after the dick sys admin who sent all the traffic my way and disrupted my website because he couldn't handle his own.

+1 for this comment. Sending your negative traffic to someone else is not the way to do things.  That was a very dick move, and would have been highly frowned upon in most of the professional circles.

i work in networking and think its effing hilarious. a rather resourceful way to deal with a DDoS. lol! now, pointing it to some server without a shitton of bandwidth and poor management, would however, be wrong.
PcChip
Sr. Member
****
Offline Offline

Activity: 294



View Profile
July 06, 2011, 02:00:56 AM
 #1839

To the botnet owner: Please stop, you're wasting BTC generation time.  Either move to a different pool with the CPU miners or setup your own private pool.

I'm not saying your pax0ring power isn't impressive, I'm saying the bot's computer owners are going to wonder why their internet is crawling, and the ones that call their ISP will find out they need to disinfect their computer and you'll lose it.  You're less likely to lose it by running the CPU miner on low priority since they can still browse foxnews.com and forward chain-letter-emails to their kids without slowdown.

$ We just want to make some money like you $

All rates with Phoenix 1.50 / PhatK
------------------------------------------------------------------------------------------------------------------------------
5850 - 400 MH/s  |  5850 - 355 MH/s | 5830 - 310 MH/s  |  GTX570 - 115 MH/s | 5770 - 210 MH/s | 5770 - 200 MH/s
CubedRoot
Sr. Member
****
Offline Offline

Activity: 295


View Profile
July 06, 2011, 02:01:36 AM
 #1840

Really starting to miss BTC. Not much you can really do to stop a dos, What I did 4 years back when one of my servers was getting dos was change the IP address and point the domain name to Microsoft for a day. They will see the attack then get there team on to it and hopefully it will go to there legal team and the attacker gets busted.

Lol what? I would have went after the dick sys admin who sent all the traffic my way and disrupted my website because he couldn't handle his own.

+1 for this comment. Sending your negative traffic to someone else is not the way to do things.  That was a very dick move, and would have been highly frowned upon in most of the professional circles.

i work in networking and think its effing hilarious. a rather resourceful way to deal with a DDoS. lol! now, pointing it to some server without a shitton of bandwidth and poor management, would however, be wrong.

Would you be saying the same thing if someone dumped a metric crap ton of DDoS traffic on YOUR network? Would you be so chipper about the situation with your Boss's Boss, and the CIO, and everyone else screaming at you about why they cant they get their webmail, or why the customers cant enter their orders on your website, especially if your job was on the line?
Pages: « 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 [92] 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 ... 159 »
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!