全球主机交流论坛

 找回密码
 注册

QQ登录

只需一步,快速开始

CeraNetworks网络延迟测速工具IP归属甄别会员请立即修改密码
查看: 3938|回复: 39
打印 上一主题 下一主题

aws 还是不要乱租给别人,给坛子里的老哥们提个醒

[复制链接]
跳转到指定楼层
1#
发表于 2019-4-4 22:45:33 | 只看该作者 回帖奖励 |正序浏览 |阅读模式
本帖最后由 ff55 于 2019-4-4 22:55 编辑

长期以来 两个号一直出租日本新加坡 lightsail给坛友,至今没有骗过一个人。今天收到aws的警告邮件

We've received a report(s) that your AWS resource(s) listed in the 'Affected resources' tab has been implicated in activity that resembles a Denial of Service attack against remote hosts; please review the information provided below about the activity.

Please take action to stop the reported activity. You would have also received an email notification from [email protected] with this same report. Please reply directly to that email with details of the corrective actions you have taken. If you do not consider the activity described in these reports to be abusive, please reply to that email with details of your use case.

If you're unaware of this activity, it's possible that your environment has been compromised by an external attacker, or a vulnerability is allowing your machine to be used in a way that it was not intended.

We are unable to assist you with troubleshooting or technical inquiries. However, for guidance on securing your instance, we recommend reviewing the following resources:

* Amazon EC2 Security Groups User Guide:
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html (Linux)
https://docs.aws.amazon.com/AWSEC2/latest/WindowsGuide/using-network-security.html (Windows)

* Tips for Securing EC2 Instances:
https://aws.amazon.com/articles/1233 (Linux)
https://aws.amazon.com/articles/1767 (Windows)

* AWS Security Best Practices:
https://d0.awsstatic.com/whitepapers/Security/AWS_Security_Best_Practices.pdf

If you require further assistance with this matter, you can take advantage of our developer forums:

https://forums.aws.amazon.com/index.jspa

Or, if you are subscribed to a Premium Support package, you may reach out for one-on-one assistance here:

https://console.aws.amazon.com/support/home#/case/create?issueType=technical

Please remember that you are responsible for ensuring that your instances and all applications are properly secured. If you require any further information to assist you in identifying or rectifying this issue, please let us know in a direct reply to the email you received from [email protected].

Regards,
AWS Abuse

Abuse Case Number: XXXXXXXX

---Beginning of forwarded report(s)---



* Log Extract:
<<<
AWS Account: 596796963688
Report begin time: 03-04-2019 14:34:19 UTC
Report end time: 03-04-2019 14:35:19 UTC

Protocol: TCP
Remote IP: 183.240.72.121
Remote port(s): 8848

Total bytes sent: 248946237
Total packets sent: 273267
Total bytes received: 0
Total packets received: 0
---------------------------
>>>

* Comments:
<<<

>>>

讲的是某个人拿去攻击其他人。目前账号处于限制状态,可以登录,不能开机器,攻击机器处于黑洞,无法访问外网。这种情况几天前就发生了,我一直以为是aws的网络,换了ip就好了,直到今天登录aws账号,说我有一个事没处理,就是上面这个,让我发邮件解释。然后我登录了下邮箱。。


至于这个人,没骗人,所以就不发他的QQ号以及支付宝了,如果跟客服没py成功,一定会公布出来。
现在求问论坛老哥,怎么处理这事,怎么回复客服
40#
 楼主| 发表于 2019-4-5 14:09:08 | 只看该作者
tem 发表于 2019-4-5 11:38
正常人为了那两毛钱把珍贵的数据放别人账号里的服务器?

都是富强啊,很少拿来干正经事
39#
发表于 2019-4-5 14:08:47 | 只看该作者
这种一般都是你的租客被人黑了
38#
 楼主| 发表于 2019-4-5 14:06:29 | 只看该作者
流浪的鹰 发表于 2019-4-5 11:11
虚拟信用卡,和预付费信用卡了解一下。偷懒肯定有弊端。你签名404了。 ...

有啥预付费的卡,求推荐个
37#
发表于 2019-4-5 11:54:33 | 只看该作者
tem 发表于 2019-4-5 11:38
正常人为了那两毛钱把珍贵的数据放别人账号里的服务器?

一般这样租不会用了做生产环境吧
36#
发表于 2019-4-5 11:52:02 | 只看该作者
流浪的鹰 发表于 2019-4-5 11:49
可是我还想回帖怎么办

那就写个插件吧签名屏蔽了
好奇心使然,多点点也无妨
35#
发表于 2019-4-5 11:49:29 | 只看该作者
mlc 发表于 2019-4-5 11:48
不登录就看不到签名了

可是我还想回帖怎么办
34#
发表于 2019-4-5 11:48:29 | 只看该作者
流浪的鹰 发表于 2019-4-5 11:41
看着签名就想点,这病怎么治

不登录就看不到签名了
33#
发表于 2019-4-5 11:41:09 | 只看该作者
mlc 发表于 2019-4-5 11:39
我只知道移动下访问日常爆炸,没特别关心过其实
感谢提醒,有空换一台机器 ...

看着签名就想点,这病怎么治
32#
发表于 2019-4-5 11:39:26 | 只看该作者
流浪的鹰 发表于 2019-4-5 11:35
可以打开啊,只是显示502 应该和网络没关系。

我只知道移动下访问日常爆炸,没特别关心过其实
感谢提醒,有空换一台机器
您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|小黑屋|全球主机交流论坛

GMT+8, 2025-12-8 14:18 , Processed in 0.062656 second(s), 8 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表