The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#11
|
|||
|
|||
![]() Quote:
Unless, of course, you have DNS records active which still resolve to your server's IP address. |
#12
|
|||
|
|||
![]()
Yes, but if you resolve that IP address, it resolves to Cloudflare.
http://www.ip-adress.com/ip_tracer/108.162.199.26 |
#13
|
||||
|
||||
![]()
Use a third party server, like a cheap VPS to send your mail from and then just modify the mail headers of exim to hide the sender ip, that the only IP being shared is that of the vps and not the actual source server (vbulletin) that hosts the mail sending script.
Double up with this www.vbulletin.org/forum/showthread.php?t=313353 |
#14
|
||||
|
||||
![]()
If they are getting your Server IP through Email (Email Headers), why not buy an Email Subscription? Will that work? Because then the attacker will get the Email Service provider IP, correct? Or am I wrong?
If you want to get an Email Subscription, Namecheap's OX Private Mail service is really good. I only have my Domain and Email hosted with Namecheap, and they have a REALLY good Email Service. I have the second package, which costs me about $29 per year, and it comes with One Mail Box, I think 10 Alias's, 10GB Mail Storage, 10GB File Storage, Full Mobile Support, and the server runs on HTTPS/SSL. I use Namecheap's OX Private Mail for my vBulletin forum too, and its great, its a really great service. |
#15
|
||||
|
||||
![]()
How do you know they are getting your ip from your email? That does not make much sense to me really.
|
#16
|
|||
|
|||
![]()
A bit like this. Server ip and domain it was sent from is found.
Code:
Received: by 10.64.236.40 with SMTP id ur8csp270236iec; Sat, 16 Aug 2014 22:01:33 -0700 (PDT) X-Received: by 10.236.129.3 with SMTP id g3mr42503511yhi.67.1408251693456; Sat, 16 Aug 2014 22:01:33 -0700 (PDT) Return-Path: <bounce-md_30152195.53f036ff.v1-4a68e3a9c92a4da1abcc77bffb4b1933@mandrillapp.com> Received: from cloudmail.curse.com (cloudmail.curse.com. [205.201.137.179]) by mx.google.com with ESMTPS id k26si17311804yhh.188.2014.08.16.22.01.33 |
#17
|
||||
|
||||
![]()
Why do you even think you are getting DDoS attacked?
I have worked on a lot of peoples websites and forums who thought they were getting DDoS attacked and it was never the case. In almost every situation at least that I have dealt with, it was simply bots hitting your website and causing server overloads. I had this happen on my forums about a year ago maybe and I used Ban Spiders by User Agent along with a few htacces goodies and some ip range blocks to stop bots from terrorizing my forums. This is more likely what you have and not a DDoS attack. If you were actually getting DDoS attacked and if you are on a shared server, your host would quickly look into it and do something about it because it not only affects your website but a whole lot others as well. If you want I can take a look for you if that is the case, I would of course need an admin account and access to your cPanel to monitor what is going on throughout the day. Send me a private message if you still need help. |
2 благодарности(ей) от: | ||
Max Taxable, RichieBoy67 |
#18
|
||||
|
||||
![]() Quote:
My first question still stands as well. What does the security log show that represents a ddos attack and what ports are being targeted? My servers and most if not all others are probed hundreds if not thousands of times daily. These do not represent attacks and I am curious if that is what is happening here. And how is email being tied to this? What is the evidence of it? |
2 благодарности(ей) от: | ||
CAG CheechDogg, Max Taxable |
![]() |
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|