Sounds like fairly typical background noise to me. Null route the IP
if you're concerned but it's probably a zombie in someone's botnet or
a chinese user trying his luck. If your IP is listed publicly on tor,
expect to be probed every now and then.
On 3 July 2014 04:14, Larry Brandt wrote:
>
Hi,
You can run the bridge wherever you like, you can change region like
so:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-regions-availability-zones.html
There isn't any difference from that point on.
When the documentation was first made, I believe US East 1 was the
only location t
On 4 January 2015 at 11:00, wrote:
> I should have specified that I was talking about brute force attempts against
> http servers, not SSH servers. I don't get any complaints about SSH brute
> force attempts.
I have also had a spike these last few days, mainly against sysads
running Wordpress.
If I recall correctly, icecast is streaming software that runs on port
8000. I assume that someone through your node is trying to "rip" the
content, which is what the "RIP Attempt" would be. (Not sure where you got
the info that it is too many connections?)
If you block port 8000, that could stop
; catalog.
>
> Blocking the IP associated with icecat.biz is the first thing I did.
> That didn't stop the abuse reports. It seems that they have servers
> distributed all over the world, and the reports don't say what server
> experienced the abuse.
>
I can also confirm same attack it must have been huge o.o
On 22 May 2012 20:17, tor-admin wrote:
> mick wrote on 22.05.2012:
> > I assume you mean "IP address" rather than "port" here.
> >
> > Despite offering, I wasn't given the opportunity to do that.
> >
> > Interesting that you also see
Hi Rejo,
On 22 May 2012 22:12, Rejo Zenger wrote:
>
>
> Who knows about cases where the owner of Tor exit node was prosecuted or
> taken to court for information that was up- or downloaded using his/her Tor
> node? Basically, I'm looking for case law on running Tor exit-nodes.
>From the Legal F
Email me offlist if you would like a dedicated IP and SSL cert on our
European servers.
Dan
On 18 October 2012 12:29, admin wrote:
> Hi Andreas, Jacob,
>
> On Thu, 18 Oct 2012 09:40:35 +0200 Andreas Krey wrote
>
> >On Thu, 18 Oct 2012 00:21:57 +, Jacob Appelbaum wrote:
> >...
> >
I have a real world example of this. My forum was being abused by several
users all originating from the Tor network, so the first thing I did (and
any sane admin would do) was block Tor access (with a note) for a few hours
while I figured out what to do. I ended up unbloacking the network and
show
This might be a bit of a shameless plug, but I used to use bitfolk (
bitfolk.com) - they have a generous allowance of bandwidth and allow tor as
long as you set it up correctly.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.tor
> [422949.356062] TCP: Peer 79.22.114.39:60467/9001 unexpectedly shrunk
> window 2565384113:2565389251 (repaired)
Those errors appear in our dmesg at work and we're not a relay (port 80
instead which is where our web services run) - just thought I'd chime in
and say it isn't TOR specific.
http://lmgtfy.com/?q=What+is+Tortilla+Tor%3F
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Uhh, what?
This is a mailing list. You signed up to it, and you will need to remove
yourself by signing into here:
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.
>they are all being stretched to their capacity.
1: Anti virus and malware detection don't have a 'capacity' - no idea what
you're talking about.
Make it so no one can connect to Tor unless they are certified clean.
>
2: Whether your an exit relay or not, viruses would not come from Tor. Your
r
> if a given IP address is actually a Tor exit server
Should probably be "node" rather than router, that seems to fit better.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
You self signed your site certificate...?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Fabiano,
You're aware this is a public mailing list, where everything posted here is
already public right, and any police force who want to can already see it?
And you're also aware that while you're subscribed to the mailing list, you
will receive everything in said list? You can't tell the entir
17 matches
Mail list logo