百度网盘 大佬有话说 : 20 分钟前
hetzner收到了滥用警告是啥情况
rt,杜甫安装的proxmox开小鸡转存百度网盘什么的,刚才突然收到了滥用警告,查看了下没有异常的进程,母鸡和消极都是设置的16位随机生成大小写数字混合字符强密码,请教下各位大佬这是啥情况yc002t
We have received a security alert from the German Federal Office for Information Security (BSI).
Please see the original report included below for details.
We are automatically forwarding this alert on to you, for your information.
You do not need to send us, or the BSI, a response.
However, we do ask that you check the alert and to resolve any potential issues.
Additional information is provided with the HOWTOs referenced in the report.
In case of further questions, please contact [email protected] and keep the ticket number of the original report in the subject line. Do not reply toas this is just the sender address for the reports and messages sent to this address will not be read.
Kind regards
Abuse Team
Hetzner Online GmbH
On 29 Sep 10:35, [email protected] wrote:
Dear Sir or Madam,
the Portmapper service (portmap, rpcbind) is required for mapping RPC
requests to a network service. The Portmapper service is needed e.g.
for mounting network shares using the Network File System (NFS).
The Portmapper service runs on port 111 tcp/udp.
In addition to being abused for DDoS reflection attacks, the
Portmapper service can be used by attackers to obtain information
on the target network like available RPC services or network shares.
Over the past months, systems responding to Portmapper requests from
anywhere on the Internet have been increasingly abused DDoS reflection
attacks against third parties.
Please find below a list of affected systems hosted on your network.
The timestamp (timezone UTC) indicates when the openly accessible
Portmapper service was identified.
We would like to ask you to check this issue and take appropriate
steps to secure the Portmapper services on the affected systems or
notify your customers accordingly.
If you have recently solved the issue but received this notification
again, please note the timestamp included below. You should not
receive any further notifications with timestamps after the issue
has been solved.
Additional information on this notification, advice on how to fix
reported issues and answers to frequently asked questions:
This message is digitally signed using PGP.
Information on the signature key is available at:
Please note:
This is an automatically generated message. Replies to the
sender addresswill NOT be read
but silently be discarded. In case of questions, please contact
and keep the ticket number
of this message in the subject line.
Affected systems on your network:
Format: ASN | IP | Timestamp (UTC) | RPC response
24940 | **.**.**.** | 2021-09-28 05:43:07 | 100000 4 111/udp; 100000 3 111/udp; 100000 2 111/udp; 100000 4 111/udp; 100000 3 111/udp; 100000 2 111/udp;
机翻:
9月29日10:35,[email protected]写道:
亲爱的先生或女士:,
映射RPC需要端口映射程序服务(portmap,rpcbind)
对网络服务的请求。需要端口映射器服务,例如。
用于使用网络文件系统(NFS)装载网络共享。
Portmapper服务在端口111 tcp/udp上运行。
除了被滥用进行DDoS反射攻击之外
攻击者可以使用Portmapper服务获取信息
在目标网络上,例如可用的RPC服务或网络共享。
在过去的几个月中,系统响应来自的Portmapper请求
互联网上的任何地方都被越来越多的DDoS反射所滥用
对第三方的攻击。
请在下面找到网络上托管的受影响系统的列表。
时间戳(时区UTC)指示可公开访问的时间
已识别Portmapper服务。
我们希望您检查此问题并采取适当措施
在受影响的系统或服务器上保护Portmapper服务的步骤
相应地通知您的客户。
如果您最近已解决问题,但收到此通知
同样,请注意下面包含的时间戳。你不应该
在问题发生后接收任何带有时间戳的进一步通知
已经解决了。
有关此通知的其他信息,关于如何修复的建议
报告的问题和常见问题解答:
这是一条自动生成的消息。对报告的答复
无法读取发件人地址
但默默地被抛弃。
网络上受影响的系统:
Format: ASN | IP | Timestamp (UTC) | RPC response
24940 | **.**.**.** | 2021-09-28 05:43:07 | 100000 4 111/udp; 100000 3 111/udp; 100000 2 111/udp; 100000 4 111/udp; 100000 3 111/udp; 100000 2 111/udp;
optimism 大佬有话说 : 16 分钟前
检查了没问题就行