Telemach,
ne mogu da pristupim ruteru (ubee) sa user/pass admin/admin. Ima li neka alternativa ili da zovem korisnicki servis?
Telemach,
ne mogu da pristupim ruteru (ubee) sa user/pass admin/admin. Ima li neka alternativa ili da zovem korisnicki servis?
Leo Messi no es de este mundo !!! Gvardiola...14. Grazias Pep.
Za moj problem vam ne treba nikakav ugovor. Radi se o infekciji jednog ili vishe vasih korisnika i pretvaranje njihovih masina u zombi racunare.
Idite na https://www.abuseat.org/lookup.cgi i ukucajte(ili ne mojte) 79.140.149.254 za IP adresu. I dobicete sledece:
Composite Blocking List - A Division of Spamhaus
Select LanguageAfrikaansAlbanianAmharicArabicArmenianAzer baijaniBasqueBelarusianBengaliBosnianBulgarianCata lanCebuanoChichewaChinese (Simplified)Chinese (Traditional)CorsicanCroatianCzechDanishDutchEsper antoEstonianFilipinoFinnishFrenchFrisianGalicianGe orgianGermanGreekGujaratiHaitian CreoleHausaHawaiianHebrewHindiHmongHungarianIcelan dicIgboIndonesianIrishItalianJapaneseJavaneseKanna daKazakhKhmerKoreanKurdish (Kurmanji)KyrgyzLaoLatinLatvianLithuanianLuxembour gishMacedonianMalagasyMalayMalayalamMalteseMaoriMa rathiMongolianMyanmar (Burmese)NepaliNorwegianPashtoPersianPolishPortugu esePunjabiRomanianRussianSamoanScots GaelicSerbianSesothoShonaSindhiSinhalaSlovakSloven ianSomaliSpanishSundaneseSwahiliSwedishTajikTamilT eluguThaiTurkishUkrainianUrduUzbekVietnameseWelshX hosaYiddishYorubaZulu
Powered by Translate
CBL LOOKUP
IMPORTANT: Many CBL/XBL listings are caused by a vulnerability in Mikrotik routers. If you have a Mikrotik router, please check out the Mikrotik blog on this subject and follow the instructions before attempting to remove your CBL listing.
RESULTS OF LOOKUP
IP Address:
79.140.149.254 is listed
This IP address was detected and listed 155 times in the past 28 days, and 4 times in the past 24 hours. The most recent detection was at Thu Nov 29 17:15:00 2018 UTC +/- 5 minutes
This IP address is infected with, or is NATting for a machine infected with the Conficker malicious botnet.
More information about Conficker can be obtained from Wikipedia
Please follow these instructions.
Dshield has a diary item containing many third party resources, especially removal tools such as Norton Power Eraser, Stinger, MSRT etc.
One of the most critical items is to make sure that all of your computers have the MS08-067 patch installed. But even with the patch installed, machines can get reinfected.
There are several ways to identify Conficker infections remotely. For a fairly complete approach, see Sophos.
If you have full firewall logs turned on at the time of detection, this may be sufficient to find the infection on a NAT:
This was detected by a TCP connection from "79.140.149.254" on port "47694" going to IP address "104.244.14.252" (the sinkhole) on port "80".
The botnet command and control domain for this connection was "n/a".
This detection corresponds to a connection at Thu Nov 29 17:18:32 2018 UTC (this timestamp is believed accurate to within one second).
Behind a NAT, you should be able to find the infected machine by looking for attempted connections to IP address "104.244.14.252" or host name "n/a" on any port with a network sniffer such as Wireshark. Equivalently, you can examine your DNS server or proxy server logs to references to "104.244.14.252" or "n/a". See Advanced Techniques for more detail on how to use Wireshark - ignore the references to port 25/SMTP traffic - the identifying activity is NOT on port 25.
Detection Information Summary Destination IP 104.244.14.252 Destination port 80 Source IP 79.140.149.254 Source port 47694 C&C name/domain n/a Protocol TCP Time Thu Nov 29 17:18:32 2018 UTC
Please note that some of the above quoted information may be empty ("") or "na" or "-". In those cases, the feed has declined or is unable to give us that information. Hopefully enough information will be present to allow you to pinpoint the connections. If not, the destination ports to check are usually port 80, 8080, 443 or high ports (around 16000) outbound from your network. Most of these infections make very large numbers of connections; they should stand out.
If you don't have full firewall logging, perhaps you can set up a firewall block/log of all access (any port) to IP address 104.244.14.252 and keep watch for hits.
Recent versions of NMap can detect Conficker, but it's not 100% reliable at finding every infection. Nmap is available for Linux, xxxBSD, Windows and Mac. Nessus can also find Conficker infections remotely. Several other scanners are available here.
Enigma Software's scanner is apparently good at finding Conficker A.
University of Bonn has a number of scan/removal tools.
If you're unable to find the infection, consider:
- If you used a network scanner, make sure that the network specification you used to check your network was right, and you understand how to interpret a conficker detection.
- Some network conficker scanners only detect some varieties of conficker. For example, nmap misses some. If you can't find it with nmap, try other scanners like McAfee's. In other words, try at least two.
- Are you sure you have found _all_ computers in your network? Sometimes there are machines quietly sitting in back rooms somewhere that got forgotten about. It would be a good idea to runnmap -sP <ALL of your network specifications>
which should list all your computers, printers and other network devices. Did you see all the computers you expected to see?- The infected computer may be turned off at the time you ran the scan or not on the network. Double-check everything was turned on during the scan.
- If you have wireless, make sure it's secured with WPA or WPA2, and that "strangers" can't connect. WEP security is NOT good enough.
- Many versions of Conficker propagate via infected thumbdrives/USB keys. When an infected machine is found, ALL such devices associated with the machine should be considered suspect, and either destroyed or completely reformatted.
- Conficker also propagates by file and printer shares.
SELF REMOVAL:
Normally, you can remove the CBL listing yourself. If no removal link is given below, follow the instructions, and come back and do the lookup again, and the removal link will appear.
Delisting of 79.140.149.254 inhibited until 12 hours after the listing - approximately Fri Nov 30 05:15:00 2018 UTC +/- 5 minutes
LOOKUP/REMOVE
© 2018 CBL. A DIVISION OF SPAMHAUS. ALL RIGHTS RESERVED. | PRIVACY POLICY | TERMS AND CONDITIONS
--------------------------------------------------------------------------------------------------------------------------------------------------------------------
SKLONITE TE KORISNIKE ILI KORSNIKA SA MREZE DOK SE NE OCISTI ZARAZENI KOMPJUTER ili KOMPJUTERI ILI SVAKOME DAJTE JAVNU ADRESU i BATALITE NATOVANJE!!!
@Telemach
Kolega juce produzen ugovor Total je u pitanju nisu mi pustili kanale da li da cekam jos ili broj ugovora da ti pustim
Telemach cisto sam radoznao . Jer sam Budvanin plus prirodom posla dnevno razgovaram sa mnogo ljudi svih uzrasta i bas nikoga ne čuh da koristi vašu platformu . Čak ima i onih koji u par zgrada koriste optiku Telekoma sto je isto raritet jer je ne šire od startovanja . Ali zaista za vas nisam čuo da bilo ko koristi . Ili se jednostavno tako desilo ili vi uopšte ne postojite u Budvi u kojoj mislim da ni poslovnicu nemate . Koje je to dio Bd koji ste pokrili ako to nije neka poslovna tajna
Evo ugradiše mi ovaj EON. Što se tiče televizije sve je vrhunski. Ali internet je preloš. Treba biti 200mbps, preko wifi dosad najviše 105 mbps da sam izvukao (pored rutera). Ruter je neki Ubee ( nikad čuo) pa signal je veoma slab i ako se udaljim 10m ( 2 zida) internet brzina je 2mbps. Ne znam da li su računali ljudi da ja neću da sjedim pored rutera sve vrijeme da bih imao dobar net? Nemam pri sebi laptop sa LAN ulazom pa ne mogu još da provjerim kakav je net preko kabla. Jel ima neko da preporuči neki ruter koji ima jak signal?
Sent from my ONEPLUS A3000 using Tapatalk
Isključi 2.4GHz mrežu, ostavi upaljenu 5GHz, podesi bandwith na 80MHz i imaćeš oko 180-190Mbit, ruter je skroz ok.
War. War never changes.
Ruter je bez veze, od kako sam uveo telemach jedino fatam signal u dnevnu sobu i kuhinju, u sobe nema sanse ni da ufati. Ocajan je.
Sent from my SM-A520F using Tapatalk
Kvalitet rutera se ne mjeri po jačini signala, sve više se poštuju regulative pa su proizvođači primorani da stave slabije antene nego što bi realno mogli, Cisco je najbolji primjer, premium brend ali poštuje regulative i ne izlaze iz standarda.
Vazda možeš uzet neku kinesku Tendu đe ćeš signala imat u cijelu ulicu, da opada kosa s glave...
Što se tiče Ubee-a, solidan ruter, mana je što nema opcije za promjenu DNS-a, ali barem za sada radi stabilno. U hodniku kod soba sam ubacio Ubiquiti AP i uglavnom svuđe po stanu imam full signal i 150Mbit+ net...
Ono što mene nervira je što baš često cdm sajt i forum zna da otvara po 10-ak sekundi, što kroz Tapatalk, što kroz Chrome, mislim da tu DNS zajebava...
Last edited by BiTrAtE; 04-12-18 at 12:09.
War. War never changes.
Prednosti 5GHz signala:
- mnogo veće brzine, praktično neophodan za 130Mbit+
- 99% ćete biti jedini 5Ghz signal u komšiluku, dakle nema interferencije, miješanja signala...
Mane 5Ghz signala:
- pokriva manju površinu u odnosu na 2.4Ghz
- u odnosu na 2.4Ghz, mnogo manje imun u odnosu na fizičke prepreke
Suma sumarum, nabavi se još jedan 5Ghz AP i gazi...
Kasnije ću slikati moje 5Ghz postavke...
War. War never changes.
Oću popodne kad dođem doma, zaboravih juče...
War. War never changes.
Da li za Budvu postoji mogucnost uvodjenja televizije i interneta?
Sent from my SM-G955F using Tapatalk
There are currently 1 users browsing this thread. (0 members and 1 guests)
Bookmarks