标题:新年诚意收一个稳一年开了Arm机器的甲骨文首尔
作者:用户
原帖:https://hostloc.com/thread-965654-1-1.html
摘要:老玩家了,自己的玩坏了开不出机器,只好收一个。
带价来,联系方式见签名。
作者:用户
原帖:https://hostloc.com/thread-965654-1-1.html
摘要:老玩家了,自己的玩坏了开不出机器,只好收一个。
带价来,联系方式见签名。
标题:【求助】青龙面板+nvjdc登录过验证码问题求助
作者:Gblaowang
原帖:https://hostloc.com/thread-965655-1-1.html
摘要:本帖最后由 Gblaowang 于 2022-2-1 19:06 编辑
nvjdc默认带的验证是滑块验证,但是现在京东的验证变成了选字验证,因此自带的验证也就失效了,有什么别的方案或者怎么把验证改为手动(已经试过把AutoCaptchaCount参数设置为其他,无效),所以来求助各位mjj
作者:Gblaowang
原帖:https://hostloc.com/thread-965655-1-1.html
摘要:本帖最后由 Gblaowang 于 2022-2-1 19:06 编辑
nvjdc默认带的验证是滑块验证,但是现在京东的验证变成了选字验证,因此自带的验证也就失效了,有什么别的方案或者怎么把验证改为手动(已经试过把AutoCaptchaCount参数设置为其他,无效),所以来求助各位mjj
标题:240收半年以上的Oracle的首尔或者春川
作者:WZ-Software
原帖:https://hostloc.com/thread-965656-1-1.html
摘要:RT,其他地区也可,折点价,任意区域都可!!
大家放心,任意区域不会低于180,除春川和首尔240外其他地区价格面议
TG:@lhqmaigua
作者:WZ-Software
原帖:https://hostloc.com/thread-965656-1-1.html
摘要:RT,其他地区也可,折点价,任意区域都可!!
大家放心,任意区域不会低于180,除春川和首尔240外其他地区价格面议
TG:@lhqmaigua
标题:收xmr,价格按照localmonero上面的来
作者:2975436656
原帖:https://hostloc.com/thread-965657-1-1.html
摘要:联系QQ 501057170
作者:2975436656
原帖:https://hostloc.com/thread-965657-1-1.html
摘要:联系QQ 501057170
标题:收老的ksle,有没有闲置的大佬割爱
作者:geff
原帖:https://hostloc.com/thread-965659-1-1.html
摘要:下单了一个ksle plus一周都没审核,看看能不能直接收台旧的ksle
作者:geff
原帖:https://hostloc.com/thread-965659-1-1.html
摘要:下单了一个ksle plus一周都没审核,看看能不能直接收台旧的ksle
标题:哈登你妈的逼生蛆了?
作者:F22
原帖:https://hostloc.com/thread-965658-1-1.html
摘要:哈登你妈的逼生蛆了?还是全家今天都死了?全市火葬场火力全开烧你一家都烧不赢!
狗日的**玩意,我他妈天天看你逮到人就骂别人死全家。你就不愁愁自己家死了几口?
作者:F22
原帖:https://hostloc.com/thread-965658-1-1.html
摘要:哈登你妈的逼生蛆了?还是全家今天都死了?全市火葬场火力全开烧你一家都烧不赢!
狗日的**玩意,我他妈天天看你逮到人就骂别人死全家。你就不愁愁自己家死了几口?
标题:论 白手起家到idc,步入衣食无忧
作者:ipssale
原帖:https://hostloc.com/thread-965661-1-1.html
摘要:详细步骤
1 . 注册个免费的空间
2 . 注册一个免费的域名
3. 使用开心版本whmcs系统, 或者boxbill系统
4. 挂商品
5. 根据自己蹩脚技术水平修改网页,搞得高大上,
6 喝上两杯二锅头,进群随便水,空头支票随便开
7 有人下单了(请选择)
7.a 拿钱跑了
7.b 拿钱去便宜得vps搞个,赚个黄牛票,继续吹(记得api接入,后面忽悠更加easy)
8. 选择7.a的搞大了可能就从此衣食无忧,也可能全网记录一次
选择7.b的搞大了就可能衣食无忧,搞小了也是idc一枚
====================步骤说好了==============
准备发财去把
作者:ipssale
原帖:https://hostloc.com/thread-965661-1-1.html
摘要:详细步骤
1 . 注册个免费的空间
2 . 注册一个免费的域名
3. 使用开心版本whmcs系统, 或者boxbill系统
4. 挂商品
5. 根据自己蹩脚技术水平修改网页,搞得高大上,
6 喝上两杯二锅头,进群随便水,空头支票随便开
7 有人下单了(请选择)
7.a 拿钱跑了
7.b 拿钱去便宜得vps搞个,赚个黄牛票,继续吹(记得api接入,后面忽悠更加easy)
8. 选择7.a的搞大了可能就从此衣食无忧,也可能全网记录一次
选择7.b的搞大了就可能衣食无忧,搞小了也是idc一枚
====================步骤说好了==============
准备发财去把
标题:wordpress的自动转WEBP插件跟自动添加水印起冲突了怎么办
作者:山本大意失仙人
原帖:https://hostloc.com/thread-965665-1-1.html
摘要:rt
wordpress的自动转WEBP插件跟自动添加水印起冲突了怎么办
有解决思路么
作者:山本大意失仙人
原帖:https://hostloc.com/thread-965665-1-1.html
摘要:rt
wordpress的自动转WEBP插件跟自动添加水印起冲突了怎么办
有解决思路么
标题:神通广大的mjj对屏幕有研究吗
作者:AD盖
原帖:https://hostloc.com/thread-965664-1-1.html
摘要:我想添加块副屏看代码,16:10,4k优先考虑,有diy方案或者厂商推荐吗?
作者:AD盖
原帖:https://hostloc.com/thread-965664-1-1.html
摘要:我想添加块副屏看代码,16:10,4k优先考虑,有diy方案或者厂商推荐吗?
标题:春节期间VPS不卡顿了
作者:openssh
原帖:https://hostloc.com/thread-965666-1-1.html
摘要:美国VPS晚高峰,速度和白天比较没有什么变化,各位MJJ可以度过一个愉快的春节假期了
作者:openssh
原帖:https://hostloc.com/thread-965666-1-1.html
摘要:美国VPS晚高峰,速度和白天比较没有什么变化,各位MJJ可以度过一个愉快的春节假期了
标题:小鸡被暂停,有大佬帮忙看看这个是什么情况吗
作者:Antony
原帖:https://hostloc.com/thread-965671-1-1.html
摘要:小鸡被暂停了,有大佬帮忙看看这个是什么情况吗?
(我看是扫ssh,但这不是我扫的)
是中了木马吗?
=================
以下是ticket
=================
您好,在今天收到了两封关于您滥用服务器的邮件 根据tos 暂时为你做出封禁处理
第一封
An attempt to brute-force account passwords over SSH/FTP by a machine in your domain or in your network has been detected. Attached are the host who attacks and time / date of activity. Please take the necessary action(s) to stop this activity immediately. If you have any questions please reply to this email.
Host of attacker: 我的ip => =>
Responsible email contacts: abuse@kirino.co
Attacked hosts in our Network: 37.228.155.100, 178.250.10.81
Logfile entries (time is CE(S)T):
Mon Jan 31 20:45:08 2022: user: root service: ssh target: 178.250.10.81 source: 我的ip
Mon Jan 31 20:44:18 2022: user: root service: ssh target: 178.250.10.81 source: 我的ip
Mon Jan 31 20:43:08 2022: user: root service: ssh target: 178.250.10.81 source: 我的ip
Mon Jan 31 20:32:41 2022: user: student service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:31:51 2022: user: mitch service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:31:01 2022: user: ritchie service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:30:01 2022: user: amaya service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:29:11 2022: user: cherie service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:28:21 2022: user: isha service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:27:31 2022: user: victoria service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:26:41 2022: user: charmaine service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:25:51 2022: user: brandon service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:25:01 2022: user: abraham service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:24:11 2022: user: linsey service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:23:21 2022: user: ucla service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:22:31 2022: user: vcsa service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:21:31 2022: user: jory service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:20:41 2022: user: dalia service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:19:51 2022: user: talisha service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:18:21 2022: user: giselle service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:17:31 2022: user: angel service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:16:21 2022: user: happy service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:15:01 2022: user: unitedlinux service: ssh target: 37.228.155.100 source: 我的ip
...
Regards,
Profihost AG Team
The recipient address of this report was provided by the Abuse Contact DB by abusix.com.
Abusix provides a free proxy DB service which provides the abuse@ address for all global RIRs.
Abusix does not maintain the core DB content but provides a service built on top of the RIR databases.
If you wish to change or report a non-working abuse contact address.
please contact the appropriate RIR responsible for managing the underlying data.
If you have any further questions about using the Abusix Abuse Contact DB, please either contact abusix.com directly via email (info@abusix.com) or visit the URL here: https://abusix.com/contactdb
Abusix is neither responsible nor liable for the content or accuracy of this message.
第二封
Hello Abuse-Team,
your Server/Customer with the IP: 我的ip (我的ip) has attacked one of our servers/partners.
The attackers used the method/service: ssh on: Mon, 31 Jan 2022 20:43:48 +0100 .
The time listed is from the server-time of the Blocklist-user who submitted the report.
The attack was reported to the Blocklist.de-System on: Mon, 31 Jan 2022 20:43:49 +0100
!!! Do not answer to this Mail! Use support@ or contact-form for Questions (no resolve-messages, no u ...
作者:Antony
原帖:https://hostloc.com/thread-965671-1-1.html
摘要:小鸡被暂停了,有大佬帮忙看看这个是什么情况吗?
(我看是扫ssh,但这不是我扫的)
是中了木马吗?
=================
以下是ticket
=================
您好,在今天收到了两封关于您滥用服务器的邮件 根据tos 暂时为你做出封禁处理
第一封
An attempt to brute-force account passwords over SSH/FTP by a machine in your domain or in your network has been detected. Attached are the host who attacks and time / date of activity. Please take the necessary action(s) to stop this activity immediately. If you have any questions please reply to this email.
Host of attacker: 我的ip => =>
Responsible email contacts: abuse@kirino.co
Attacked hosts in our Network: 37.228.155.100, 178.250.10.81
Logfile entries (time is CE(S)T):
Mon Jan 31 20:45:08 2022: user: root service: ssh target: 178.250.10.81 source: 我的ip
Mon Jan 31 20:44:18 2022: user: root service: ssh target: 178.250.10.81 source: 我的ip
Mon Jan 31 20:43:08 2022: user: root service: ssh target: 178.250.10.81 source: 我的ip
Mon Jan 31 20:32:41 2022: user: student service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:31:51 2022: user: mitch service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:31:01 2022: user: ritchie service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:30:01 2022: user: amaya service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:29:11 2022: user: cherie service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:28:21 2022: user: isha service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:27:31 2022: user: victoria service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:26:41 2022: user: charmaine service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:25:51 2022: user: brandon service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:25:01 2022: user: abraham service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:24:11 2022: user: linsey service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:23:21 2022: user: ucla service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:22:31 2022: user: vcsa service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:21:31 2022: user: jory service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:20:41 2022: user: dalia service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:19:51 2022: user: talisha service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:18:21 2022: user: giselle service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:17:31 2022: user: angel service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:16:21 2022: user: happy service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:15:01 2022: user: unitedlinux service: ssh target: 37.228.155.100 source: 我的ip
...
Regards,
Profihost AG Team
The recipient address of this report was provided by the Abuse Contact DB by abusix.com.
Abusix provides a free proxy DB service which provides the abuse@ address for all global RIRs.
Abusix does not maintain the core DB content but provides a service built on top of the RIR databases.
If you wish to change or report a non-working abuse contact address.
please contact the appropriate RIR responsible for managing the underlying data.
If you have any further questions about using the Abusix Abuse Contact DB, please either contact abusix.com directly via email (info@abusix.com) or visit the URL here: https://abusix.com/contactdb
Abusix is neither responsible nor liable for the content or accuracy of this message.
第二封
Hello Abuse-Team,
your Server/Customer with the IP: 我的ip (我的ip) has attacked one of our servers/partners.
The attackers used the method/service: ssh on: Mon, 31 Jan 2022 20:43:48 +0100 .
The time listed is from the server-time of the Blocklist-user who submitted the report.
The attack was reported to the Blocklist.de-System on: Mon, 31 Jan 2022 20:43:49 +0100
!!! Do not answer to this Mail! Use support@ or contact-form for Questions (no resolve-messages, no u ...
标题:为什么Dropbox扩容到18G竟然要20.
作者:yxb
原帖:https://hostloc.com/thread-965673-1-1.html
摘要:想弄个dropbox,看看价格觉得没必要啊
作者:yxb
原帖:https://hostloc.com/thread-965673-1-1.html
摘要:想弄个dropbox,看看价格觉得没必要啊
标题:两台日本鸡443端口被封
作者:wyyadd
原帖:https://hostloc.com/thread-965674-1-1.html
摘要:用的trojan协议, 一台搬瓦工软银做主力, 一台解锁流媒体。 怎么回事呢, 自用, 平时也没有大流量。
作者:wyyadd
原帖:https://hostloc.com/thread-965674-1-1.html
摘要:用的trojan协议, 一台搬瓦工软银做主力, 一台解锁流媒体。 怎么回事呢, 自用, 平时也没有大流量。