Subj : Re: Banned To : Mike Powell From : Jas Hud Date : Thu May 02 2024 19:24:29 To: Mike Powell Re: Re: Banned By: Mike Powell to DIGIMAUS on Wed May 01 2024 08:22 am > From Newsgroup: micronet.comp > > > What's funny is that I have port 22 wide open and interestingly enough, > > the rest of my filters are empty: > > > {'recidive-subnet': ['163.47.39.0', '129.226.147.0', '43.134.118.0', > > '154.16.56.0', '192.144.65.0', '43.163.237.0', '124.156.223.0', > > '43.130.42.0', '43.163.214.0', '43.134.111.0', '20.197.49.0']} > > > Almost all of the above are from Chinese ISPs. > > Many of mine are from China also. When I had 22 open I noticed that the > scripts hit that port (SSH) a *lot* harder than the standard telnet port. > I found that interesting since SSH is encrypted but, then again, most IoT > devices are probably more likely to have an SSH port open vs. a telnet port. > > Mike i've been running servers for so long i don't even pay attention to that stuff unless it's intelligent or causing harm. i took over datastream from a dead ssyop and he had MD and he tried every online scheme to make money and that caused a lot of traffic over the years. --- Synchronet 3.19b-Win32 NewsLink 1.113 * bbses.info - http://bbses.info - telnet://bbses.info * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (618:250/1) .