tell me more about telecom ddos protection, what is the purpose of this technology (i forgot Arbor) ? can be as precise as the megabits/s. you didn't change your point since the last time. what does your attack have more than flooding dummy request ? nothing. argue with all the script kiddies threat but 1g is not a lot. mainly filtered out by the operator, so what was the point about the 30g ?
all of those effort for 1 btc. you're the best here
You must not be a blackhat, so you are unaware of the IP hit-lists now an days. Once an IP is posted on said list, the fellow attackers will point all their bandwidth to that IP and will get paid if it is a successful takedown.
We have ~30 Gbps of bandwidth available
so you need to know the iP to hit it.
So to defeat the hit-list simply alter your IP and be done with your attacks.
Or Do I not understand this.
For example the other day I got a new router hooked it into my network and got a different IP I no longer have the ip I did a few weeks ago. So do I understand this. Or am I lost.
Your right, to an extent.
A server will always have the same IP, unless ordered a new one. But by doing so is still visible to everyone, especially if using a "A" record like stratum.mmpool.org or whatever it is.
As a suggestion, why don't you just make the pool a closed pool, and have admin validation by asking for their wallet address, and checking on blockchain.
tell me more about telecom ddos protection, what is the purpose of this technology (i forgot Arbor) ? can be as precise as the megabits/s. you didn't change your point since the last time. what does your attack have more than flooding dummy request ? nothing. argue with all the script kiddies threat but 1g is not a lot. mainly filtered out by the operator, so what was the point about the 30g ?
all of those effort for 1 btc. you're the best here
You must not be a blackhat, so you are unaware of the IP hit-lists now an days. Once an IP is posted on said list, the fellow attackers will point all their bandwidth to that IP and will get paid if it is a successful takedown.
We took down BTCDig at 560 Mbps, and MMpool at 810 Mbps.
We can get more bandwidth if we spread it over IRC, and put the URL/IP on the "watch list" which is watched by many "script kiddies" with offshore VPS's.
I haven't really mined much lately- too hot- but this still pisses me off.
mmpool, you should post the loser's BTC and email address. No reason to protect his privacy. It might help someone figure out who the guy is, you never know.
There's no point in anyone paying the guy- even on the offchance that he did leave the pool alone after that (which seems like a really long shot- what would he gain by stopping his DDOS?) if there's a weakness then someone else will find it, or the same guy will make another alias and repeat.
-- novak
The BTC Wallet is to a new address, no traceable.
The email we used is admin1@mmpool.org - Since BTC Talk doe snot require email verification.
Also, we can bypass any firewall like CloudFlare and other "Anti-DDoS" software online because we can get the main server IP.
And unless your host is willing to spend thousands upon thousands for Brocade Layer 7 prevention, it will not help!
direct ip is not an issue, most of my customer protect themselves on site (or datacenter ) and it doesn't cost them a lot especially when its running on evaluation licence I'm really impatient to hear more from mmpool to block your shitty script kiddies
Unless he is going to pay for HARDWARE through Brocade at 30 Gbps, then he cannot stop us.
Software will not help. His upstream host has already mitigated the attack by null routing his site IP to localhost.
And also, Antpool has been in the works for a while, ever since the 51% centralization note.
David McKinnon we suggest you be nice to us. It won't be hard to get your IP from your post by dropping the MySQL tables into plain text. Just like CLoudMinr.io ....
Also, we can bypass any firewall like CloudFlare and other "Anti-DDoS" software online because we can get the main server IP.
And unless your host is willing to spend thousands upon thousands for Brocade Layer 7 prevention, it will not help!
Ah yes, all the more reason for us to blindly trust you- you've really been the paragon of virtue thus far. Your trustworthiness is known across the land, far and- wait, no, you're at best a B-grade extortionist, screwing a few people over for the lulz, and having a ball off the power trip. Eat shit and die.
-- novak
It's people like you who provoked it because you are representing mmpool when you start swearing.
At their request, we will issue a Layer 4 to F2Pool, or 182.92.251.251
I haven't really mined much lately- too hot- but this still pisses me off.
mmpool, you should post the loser's BTC and email address. No reason to protect his privacy. It might help someone figure out who the guy is, you never know.
There's no point in anyone paying the guy- even on the offchance that he did leave the pool alone after that (which seems like a really long shot- what would he gain by stopping his DDOS?) if there's a weakness then someone else will find it, or the same guy will make another alias and repeat.
-- novak
The BTC Wallet is to a new address, no traceable.
The email we used is admin1@mmpool.org - Since BTC Talk doe snot require email verification.
Also, we can bypass any firewall like CloudFlare and other "Anti-DDoS" software online because we can get the main server IP.
And unless your host is willing to spend thousands upon thousands for Brocade Layer 7 prevention, it will not help!