tross Burstcoin Pool
-
10 hours of ddos wow I never knew I was so popular or such a large threat that has be taken out. But what happens should I not stop running a pool?
Sounds like a lot of waste of time Mr. ddos!
-
@tross 10 hours is not much, I have suffered attacks of 3 days and what is worse in pages with hardly any users, there is a lot of bad born out there that only seeks to do damage.
Let's hope they get tired soon and stop bothering
-
@Energy I got hit with a lesser form for weeks but you could hardly notice but was enough to make dl bad
-
Tomorrow is moving day and hope to get the pool up and running in no time. But until then we have to put up with this attacker!
Sorry I did the best with what I had.
-
Good luck! I'll light a candle for you :)
-
update test pool on new server is running so just a matter of time to move trosspool
-
Hey tross my old friend ;) i wasnt able to mine the last couple of months (was moving and stuff) looking forward to be back mining on your pool! i remember when you got your pool running, I think I was on of the first who had the pleasure of mining there =) keep up the good work
-
Nice to see ya again cant wait to see those winning blocks!
-
RAFFLE JUNE 30!
Has reached over 10k Burst! to be given out to 3 lucky miners!
BUT ITS NOT TOO LATE
Lexitoshi and tross pool you have to the 29th to enter!
Prizes 5k+ 2k+ 1k+
More people greater the prizes! 100% to the winners!
-
@tross How much to enter the raffle?
And do I just send it to the raffle address?
-
@Althalus BURST-ZUGP-QTVB-L657-75MFW
-
@tross thanks for the quick reply.
How much burst do I send?
-
@Althalus just 200! Good luck!
-
These attacks are getting old! So until my original solution is done. I look at cloudflare tomorrow. But to tell you the truth I have been looking at how they are attacking and think cloudflare wont help as much as people think.
-
i'm not certain but one of the things i read while looking cloudfare up related to ddos attacks is that you can hide your servers ip from the internet by using cloudfare, what i mean is they'll probably only get to know addresses of cloudfare. Was something about messing with a records of domains. But the problem is however, if that's how it's done, is that they already found out your servers ip and if the cloudfare thing is just hiding it, it's already too late unless you have a way to trigger an ip change with your isp somehow. see https://blog.cloudflare.com/ddos-prevention-protecting-the-origin/
-
no big deal I move pool to unknown address.
-
I could also use a dynamic ip lol
-
all it takes (without something as cloudfare) then is just doing an nslookup or just ping the address and it shows the (new) ip. Same thing with dynamic ip's. Another problem with dynamic ip's is the (local) cache of dns records making people not able to connect if your ip changed regularly and they are getting the ip from the dns cache. one could flush dns cache locally though but not everyone might be aware of that. Although with things like dydns or similar so (not certain your using that) you actually only get a subdomain so not sure how it works there.
-
Sitting around watch my pool be attack is not the answer either. I guess if I wasnt smart I would plaster the name of people that would attack me. But with no real proof that would be suicide. Well instead of shooting down my ideas why dont you tell me what I should do for protection <<<that will work!
-
@tross only trying to help, don't know much about it either, only that dynamic ip or just switching address (like domain name) will probably not work, behind the scenes everything is done using ip addresses.
dns servers are basically database telling address.xxx.com equals this ip
so changing address.xxx.com to something new will not work as all they have to do to know the new ip is do a nslookup (query a dns server to get the new ip) or ping the address as it will do it automatically.
My guess with the little understanding i have is either block the traffic someway or use something like cloudfare and use their ddos attack preventing system (which i think basically hides your servers ip and make cloudfare infrastructure handle the load). but even if you use cloudfare after setting it up you need to have least changed your servers ip once (not the address but the ip) because your current ip is comprimised.
I'm sorry i don't know more about it either i'm only a (delphi) programmer by days work
