Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 08/05/2013 in all areas

  1. -------- Original Message -------- Subject: [HE ABUSE #448749][65.19.143.4] New malicious URL found on: shop-place.biz (IP: 65.19.143.4) Date: Sun, 4 Aug 2013 02:40:58 -0700 (PDT) From: no-reply@abuse.he.net To: abuse@connexinternet.com We have received a complaint about your account. Please investigate and fix within 24 hours. Hurricane Electric Abuse Department support@he.net From malwaredb@it-mate.co.uk Sun Aug 4 02:40:49 2013 Return-Path: &--#60;malwaredb@it-mate.co.uk&--#62; X-Original-To: report@abuse.he.net Delivered-To: report@abuse.he.net Received: from he.net (he.net [216.218.186.2]) by abuse.he.net (Postfix) with SMTP id BF3CA541100 for &--#60;report@abuse.he.net&--#62;; Sun, 4 Aug 2013 02:40:48 -0700 (PDT) Received: from mysteryfcm.co.uk ([212.56.95.253]) by he.net for &--#60;abuse@he.net&--#62;; Sun, 4 Aug 2013 02:39:22 -0700 Received: from Malmon by mysteryfcm.co.uk (MDaemon PRO v13.0.3) with ESMTP id 23-md50000033171.msg for &--#60;abuse@he.net&--#62;; Sun, 04 Aug 2013 10:39:29 +0100 X-Spam-Processed: mysteryfcm.co.uk, Sun, 04 Aug 2013 10:39:29 +0100 (not processed: spam filter heuristic analysis disabled) X-HashCash: 1:20:130804:md50000033171::UrvVZ9blgAXkJmz+:00002AHb X-Return-Path: malwaredb@it-mate.co.uk X-Envelope-From: malwaredb@it-mate.co.uk X-MDaemon-Deliver-To: abuse@he.net Date: Sun, 04 Aug 2013 10:39:18 +0100 Subject: New malicious URL found on: shop-place.biz (IP: 65.19.143.4) To: abuse@he.net From: malwaredb@it-mate.co.uk Reply-To: services@it-mate.co.uk X-Mailer: I.T. Mate Malware Monitor Message-ID: &--#60;MDAEMON-F201308041039.AA3924845md50000000501@mysteryfcm.co.uk&--#62; A new malicious URL has been found in Hurricane Electric IP space. Host: shop-place.biz IP: 65.19.143.4 URL: http://shop-place.biz Since they weren't very specific about what was "malicious" about your site I have gone ahead and unsuspended it for you. Our virus scanner can't find any malware files on your account either. It might be in your best interest to contact your accusers and find out what they think is malicious about your site, and work with them to make sure they don't report your site again. We take malicious sites and our ToS very seriously. If we receive another report about your site it will be suspended again.
    1 point
  2. Try using this as a source file: #include <iostream> #include <mysql/mysql.h> using namespace std; int main() { cout << "Content-Type: text/plain\n\n"; cout << "Hello, World!\n"; try { cout << "MySQL Client Version: " << mysql_get_client_info() << endl ; } catch(exception& ex) { cout << "ERROR: " << ex.what() << endl; } return 0; } and compile it on the server using a cronjob with the command: g++ -o /home/<user>/public_html/cgi-bin/test.cgi /home/<user>/path/to/test.cpp -lmysqlclient Be sure to set the cronjob to run only once a day and then delete it, also make sure it's set to run several minutes into the future and set using PDT as a guide since that's the server's time zone.
    1 point
  3. Sounds like you triggered brute force protection. When the server decides that you're randomly guessing passwords it locks you out for a period of time. When you stopped trying to log in for a few hours it probably cleared the protection on it's own allowing you to log in or reset your password once again.
    1 point
×
×
  • Create New...