标题:wordpress的自动转WEBP插件跟自动添加水印起冲突了怎么办
作者:山本大意失仙人
原帖:https://hostloc.com/thread-965665-1-1.html
摘要:rt
wordpress的自动转WEBP插件跟自动添加水印起冲突了怎么办
有解决思路么
作者:山本大意失仙人
原帖:https://hostloc.com/thread-965665-1-1.html
摘要:rt
wordpress的自动转WEBP插件跟自动添加水印起冲突了怎么办
有解决思路么
标题:神通广大的mjj对屏幕有研究吗
作者:AD盖
原帖:https://hostloc.com/thread-965664-1-1.html
摘要:我想添加块副屏看代码,16:10,4k优先考虑,有diy方案或者厂商推荐吗?
作者:AD盖
原帖:https://hostloc.com/thread-965664-1-1.html
摘要:我想添加块副屏看代码,16:10,4k优先考虑,有diy方案或者厂商推荐吗?
标题:春节期间VPS不卡顿了
作者:openssh
原帖:https://hostloc.com/thread-965666-1-1.html
摘要:美国VPS晚高峰,速度和白天比较没有什么变化,各位MJJ可以度过一个愉快的春节假期了
作者:openssh
原帖:https://hostloc.com/thread-965666-1-1.html
摘要:美国VPS晚高峰,速度和白天比较没有什么变化,各位MJJ可以度过一个愉快的春节假期了
标题:小鸡被暂停,有大佬帮忙看看这个是什么情况吗
作者:Antony
原帖:https://hostloc.com/thread-965671-1-1.html
摘要:小鸡被暂停了,有大佬帮忙看看这个是什么情况吗?
(我看是扫ssh,但这不是我扫的)
是中了木马吗?
=================
以下是ticket
=================
您好,在今天收到了两封关于您滥用服务器的邮件 根据tos 暂时为你做出封禁处理
第一封
An attempt to brute-force account passwords over SSH/FTP by a machine in your domain or in your network has been detected. Attached are the host who attacks and time / date of activity. Please take the necessary action(s) to stop this activity immediately. If you have any questions please reply to this email.
Host of attacker: 我的ip => =>
Responsible email contacts: abuse@kirino.co
Attacked hosts in our Network: 37.228.155.100, 178.250.10.81
Logfile entries (time is CE(S)T):
Mon Jan 31 20:45:08 2022: user: root service: ssh target: 178.250.10.81 source: 我的ip
Mon Jan 31 20:44:18 2022: user: root service: ssh target: 178.250.10.81 source: 我的ip
Mon Jan 31 20:43:08 2022: user: root service: ssh target: 178.250.10.81 source: 我的ip
Mon Jan 31 20:32:41 2022: user: student service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:31:51 2022: user: mitch service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:31:01 2022: user: ritchie service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:30:01 2022: user: amaya service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:29:11 2022: user: cherie service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:28:21 2022: user: isha service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:27:31 2022: user: victoria service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:26:41 2022: user: charmaine service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:25:51 2022: user: brandon service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:25:01 2022: user: abraham service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:24:11 2022: user: linsey service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:23:21 2022: user: ucla service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:22:31 2022: user: vcsa service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:21:31 2022: user: jory service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:20:41 2022: user: dalia service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:19:51 2022: user: talisha service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:18:21 2022: user: giselle service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:17:31 2022: user: angel service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:16:21 2022: user: happy service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:15:01 2022: user: unitedlinux service: ssh target: 37.228.155.100 source: 我的ip
...
Regards,
Profihost AG Team
The recipient address of this report was provided by the Abuse Contact DB by abusix.com.
Abusix provides a free proxy DB service which provides the abuse@ address for all global RIRs.
Abusix does not maintain the core DB content but provides a service built on top of the RIR databases.
If you wish to change or report a non-working abuse contact address.
please contact the appropriate RIR responsible for managing the underlying data.
If you have any further questions about using the Abusix Abuse Contact DB, please either contact abusix.com directly via email (info@abusix.com) or visit the URL here: https://abusix.com/contactdb
Abusix is neither responsible nor liable for the content or accuracy of this message.
第二封
Hello Abuse-Team,
your Server/Customer with the IP: 我的ip (我的ip) has attacked one of our servers/partners.
The attackers used the method/service: ssh on: Mon, 31 Jan 2022 20:43:48 +0100 .
The time listed is from the server-time of the Blocklist-user who submitted the report.
The attack was reported to the Blocklist.de-System on: Mon, 31 Jan 2022 20:43:49 +0100
!!! Do not answer to this Mail! Use support@ or contact-form for Questions (no resolve-messages, no u ...
作者:Antony
原帖:https://hostloc.com/thread-965671-1-1.html
摘要:小鸡被暂停了,有大佬帮忙看看这个是什么情况吗?
(我看是扫ssh,但这不是我扫的)
是中了木马吗?
=================
以下是ticket
=================
您好,在今天收到了两封关于您滥用服务器的邮件 根据tos 暂时为你做出封禁处理
第一封
An attempt to brute-force account passwords over SSH/FTP by a machine in your domain or in your network has been detected. Attached are the host who attacks and time / date of activity. Please take the necessary action(s) to stop this activity immediately. If you have any questions please reply to this email.
Host of attacker: 我的ip => =>
Responsible email contacts: abuse@kirino.co
Attacked hosts in our Network: 37.228.155.100, 178.250.10.81
Logfile entries (time is CE(S)T):
Mon Jan 31 20:45:08 2022: user: root service: ssh target: 178.250.10.81 source: 我的ip
Mon Jan 31 20:44:18 2022: user: root service: ssh target: 178.250.10.81 source: 我的ip
Mon Jan 31 20:43:08 2022: user: root service: ssh target: 178.250.10.81 source: 我的ip
Mon Jan 31 20:32:41 2022: user: student service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:31:51 2022: user: mitch service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:31:01 2022: user: ritchie service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:30:01 2022: user: amaya service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:29:11 2022: user: cherie service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:28:21 2022: user: isha service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:27:31 2022: user: victoria service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:26:41 2022: user: charmaine service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:25:51 2022: user: brandon service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:25:01 2022: user: abraham service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:24:11 2022: user: linsey service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:23:21 2022: user: ucla service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:22:31 2022: user: vcsa service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:21:31 2022: user: jory service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:20:41 2022: user: dalia service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:19:51 2022: user: talisha service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:18:21 2022: user: giselle service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:17:31 2022: user: angel service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:16:21 2022: user: happy service: ssh target: 37.228.155.100 source: 我的ip
Mon Jan 31 20:15:01 2022: user: unitedlinux service: ssh target: 37.228.155.100 source: 我的ip
...
Regards,
Profihost AG Team
The recipient address of this report was provided by the Abuse Contact DB by abusix.com.
Abusix provides a free proxy DB service which provides the abuse@ address for all global RIRs.
Abusix does not maintain the core DB content but provides a service built on top of the RIR databases.
If you wish to change or report a non-working abuse contact address.
please contact the appropriate RIR responsible for managing the underlying data.
If you have any further questions about using the Abusix Abuse Contact DB, please either contact abusix.com directly via email (info@abusix.com) or visit the URL here: https://abusix.com/contactdb
Abusix is neither responsible nor liable for the content or accuracy of this message.
第二封
Hello Abuse-Team,
your Server/Customer with the IP: 我的ip (我的ip) has attacked one of our servers/partners.
The attackers used the method/service: ssh on: Mon, 31 Jan 2022 20:43:48 +0100 .
The time listed is from the server-time of the Blocklist-user who submitted the report.
The attack was reported to the Blocklist.de-System on: Mon, 31 Jan 2022 20:43:49 +0100
!!! Do not answer to this Mail! Use support@ or contact-form for Questions (no resolve-messages, no u ...
标题:为什么Dropbox扩容到18G竟然要20.
作者:yxb
原帖:https://hostloc.com/thread-965673-1-1.html
摘要:想弄个dropbox,看看价格觉得没必要啊
作者:yxb
原帖:https://hostloc.com/thread-965673-1-1.html
摘要:想弄个dropbox,看看价格觉得没必要啊
标题:两台日本鸡443端口被封
作者:wyyadd
原帖:https://hostloc.com/thread-965674-1-1.html
摘要:用的trojan协议, 一台搬瓦工软银做主力, 一台解锁流媒体。 怎么回事呢, 自用, 平时也没有大流量。
作者:wyyadd
原帖:https://hostloc.com/thread-965674-1-1.html
摘要:用的trojan协议, 一台搬瓦工软银做主力, 一台解锁流媒体。 怎么回事呢, 自用, 平时也没有大流量。
标题:咨询个vir 超流量的问题
作者:coolloves
原帖:https://hostloc.com/thread-965676-1-1.html
摘要:vir 的一机器500g每月,每个月一般会用300-400g,一月份访问量有点大,昨天超了,然后给我暂停了服务.
请问大佬们,这种情况怎么搞啊,我提了个ticket,不会给我删号了吧
作者:coolloves
原帖:https://hostloc.com/thread-965676-1-1.html
摘要:vir 的一机器500g每月,每个月一般会用300-400g,一月份访问量有点大,昨天超了,然后给我暂停了服务.
请问大佬们,这种情况怎么搞啊,我提了个ticket,不会给我删号了吧
标题:请问WIN RDP 远程连接怎样比较安全?
作者:JtrD
原帖:https://hostloc.com/thread-965679-1-1.html
摘要:记得之前有个帖子说过可以添加密钥验证,但是搜索了一下没找到,请问除了改端口外,还有哪些比较安全的方式呢?
作者:JtrD
原帖:https://hostloc.com/thread-965679-1-1.html
摘要:记得之前有个帖子说过可以添加密钥验证,但是搜索了一下没找到,请问除了改端口外,还有哪些比较安全的方式呢?
标题:谁有ONLINE 29.9欧 特价机 官方清退了
作者:eudx
原帖:https://hostloc.com/thread-965678-1-1.html
摘要:好不地道 花了不少初装费,玩了几年就咔嚓了
不过我也刚看到消息, 有没有坛友跟ONLINE撕过的
Dear customer,
Following the email you received a few weeks ago (Subject : End of support for some Dedibox servers followed by end of life), we are reminding you of this matter in this ticket, along with the key dates and list of your impacted servers.
You still have time to plan the migration of your services and applications with peace of mind in the coming months.
Dates to keep in mind:
From January 1 2022: Arrival of new ultra-competitive dedicated server offers, always more adapted to your needs.
February 1, 2022: end of service and support on the affected servers. At this stage, in the event of a breakdown, we will no longer be able to repair or get your server back into service.
April 4, 2022: the affected servers will be shut down and decommissioned.
作者:eudx
原帖:https://hostloc.com/thread-965678-1-1.html
摘要:好不地道 花了不少初装费,玩了几年就咔嚓了
不过我也刚看到消息, 有没有坛友跟ONLINE撕过的
Dear customer,
Following the email you received a few weeks ago (Subject : End of support for some Dedibox servers followed by end of life), we are reminding you of this matter in this ticket, along with the key dates and list of your impacted servers.
You still have time to plan the migration of your services and applications with peace of mind in the coming months.
Dates to keep in mind:
From January 1 2022: Arrival of new ultra-competitive dedicated server offers, always more adapted to your needs.
February 1, 2022: end of service and support on the affected servers. At this stage, in the event of a breakdown, we will no longer be able to repair or get your server back into service.
April 4, 2022: the affected servers will be shut down and decommissioned.
标题:知名表情包“为友谊干杯”女主韩再芬亮相春晚
作者:N0rthkorea
原帖:https://hostloc.com/thread-965680-1-1.html
摘要:昨晚的春节联欢晚会中,央视精心准确了十几个节目,虽然语言类节目被吐槽,不过戏曲、歌舞类节目水准很高,戏曲表演更是40年来从未缺席春晚。在戏曲联唱中,有网友发现了一个表情包女主,就是那个流传很广的“为我们的友谊干杯”表情包,原本这个表情包是大家调侃父母、爷爷奶奶辈的老年人用的,现在正主出现了。
在昨晚的春晚中,韩再芬没有表演《女驸马》曲目,而是表现了黄梅戏《天女散花》选段,举手投足仙气十足。
据资料,韩再芬,是中国黄梅戏表演艺术家、国家一级演员、国家级非物质文化遗产项目代表性传承人,享受国务院"政府特殊津贴"。
1984年,韩再芬因主演黄梅戏电视连续剧《郑小姣》一举成名,1994年首次登上央视春晚,迄今已经8次在央视春晚亮相。
作者:N0rthkorea
原帖:https://hostloc.com/thread-965680-1-1.html
摘要:昨晚的春节联欢晚会中,央视精心准确了十几个节目,虽然语言类节目被吐槽,不过戏曲、歌舞类节目水准很高,戏曲表演更是40年来从未缺席春晚。在戏曲联唱中,有网友发现了一个表情包女主,就是那个流传很广的“为我们的友谊干杯”表情包,原本这个表情包是大家调侃父母、爷爷奶奶辈的老年人用的,现在正主出现了。
在昨晚的春晚中,韩再芬没有表演《女驸马》曲目,而是表现了黄梅戏《天女散花》选段,举手投足仙气十足。
据资料,韩再芬,是中国黄梅戏表演艺术家、国家一级演员、国家级非物质文化遗产项目代表性传承人,享受国务院"政府特殊津贴"。
1984年,韩再芬因主演黄梅戏电视连续剧《郑小姣》一举成名,1994年首次登上央视春晚,迄今已经8次在央视春晚亮相。
标题:腾讯QQ安装包容量逼近1GB的原因:集成UE4引擎
作者:N0rthkorea
原帖:https://hostloc.com/thread-965682-1-1.html
摘要:前不久手机QQ容量逼近1GB的消息引发网友热议,这个安装包的容量都比当年的WinXP系统还要高了,大家都对腾讯QQ的臃肿表示疑惑,腾讯到底干什么需要这么大的容量?QQ容量大增的一个重要原因是集成了UE4虚幻引擎。
QQ集成UE4引擎的目的又是什么呢?这事也逐渐露出水面,腾讯已经开始灰度测试“超级QQ秀“功能,这不仅是此前被热传下线的QQ秀功能的3D版,而是腾讯的元宇宙野心。
据悉,“超级QQ秀“是一套全新的家园系统,不仅有3D版的QQ秀服装、换脸等内容,还有一套房产系统——QQ小窝,还有配套的家具系统,玩家可以在里面搭建自己的家园,还可以添加好友。
目前“超级QQ秀“功能还在灰度测试,没有大规模推广,但是从QQ集成UE4引擎的动作来看,腾讯希望打造一个QQ元宇宙,规模要比之前的QQ秀大得多,要把玩家的衣食住行都要装进去,形成一个超级社交平台。
作者:N0rthkorea
原帖:https://hostloc.com/thread-965682-1-1.html
摘要:前不久手机QQ容量逼近1GB的消息引发网友热议,这个安装包的容量都比当年的WinXP系统还要高了,大家都对腾讯QQ的臃肿表示疑惑,腾讯到底干什么需要这么大的容量?QQ容量大增的一个重要原因是集成了UE4虚幻引擎。
QQ集成UE4引擎的目的又是什么呢?这事也逐渐露出水面,腾讯已经开始灰度测试“超级QQ秀“功能,这不仅是此前被热传下线的QQ秀功能的3D版,而是腾讯的元宇宙野心。
据悉,“超级QQ秀“是一套全新的家园系统,不仅有3D版的QQ秀服装、换脸等内容,还有一套房产系统——QQ小窝,还有配套的家具系统,玩家可以在里面搭建自己的家园,还可以添加好友。
目前“超级QQ秀“功能还在灰度测试,没有大规模推广,但是从QQ集成UE4引擎的动作来看,腾讯希望打造一个QQ元宇宙,规模要比之前的QQ秀大得多,要把玩家的衣食住行都要装进去,形成一个超级社交平台。
标题:新年快乐,虎年大吉,新年原价出5刀小独服
作者:aa8
原帖:https://hostloc.com/thread-965683-1-1.html
摘要:饭桶家psychz小独服5刀每月
配置:
City:Los Angeles, CA (US West)
Processor:Atom D525 - 1.80 GHz
Memory:4GB
Primary Drive:500GB HDD
Bandwidth:30TB
IP Address Allocation:IPv4 /30 - 1 IP
Port Speed:100Mbps Copper
DDoS Mitigation Service:20Gbps
带ipmi
他家只能push
账户里还有700多余额,原价700出
tg:yicat
企鹅166129051
作者:aa8
原帖:https://hostloc.com/thread-965683-1-1.html
摘要:饭桶家psychz小独服5刀每月
配置:
City:Los Angeles, CA (US West)
Processor:Atom D525 - 1.80 GHz
Memory:4GB
Primary Drive:500GB HDD
Bandwidth:30TB
IP Address Allocation:IPv4 /30 - 1 IP
Port Speed:100Mbps Copper
DDoS Mitigation Service:20Gbps
带ipmi
他家只能push
账户里还有700多余额,原价700出
tg:yicat
企鹅166129051
标题:有什么稳定的理财产品 年化5%附近的
作者:Gently
原帖:https://hostloc.com/thread-965685-1-1.html
摘要:目前农行理财 2.75%左右,太低了,里面有个定期3年4.5%,准备等下次金融危机进行抄底 ,所以不想存定期
MJJ们有没有好的理财产品推荐一下
作者:Gently
原帖:https://hostloc.com/thread-965685-1-1.html
摘要:目前农行理财 2.75%左右,太低了,里面有个定期3年4.5%,准备等下次金融危机进行抄底 ,所以不想存定期
MJJ们有没有好的理财产品推荐一下