Answer the question
In order to leave comments, you need to log in
A hacker's proxy on hosting - what is fraught with for him?
The site was hacked, in the server logs I see IP 194.34.132.58, in the 2ip service Host: host-194-34-132-58.creanova.org i.e. does this ip belong to creanova.org hosting? Then there is such a train of thought: the hacker made a proxy on the hosting and used it for anonymity, or he hacked someone else's site on this hosting and used it for the same purposes. Judging by other actions of the hacker, he is not very experienced, for example, he did not change the dates of editing files and did not clean up the logs on the server after himself, as a result of which the shells flooded by him were found.
Question: what is the probability that the hosting provider still has its real ip address and the hacker did not use the proxy chain, as a result of which he can be held accountable? That's right, for the sake of sports interest, it became interesting what could be done against a not very smart hacker.
Answer the question
In order to leave comments, you need to log in
At the very least, it is necessary to roll abuse into hosting. They even have a link on their site Report Abuse
If the hacker really acted from his VPS, then most likely he will lose it.
In an ideal spherical world, the hoster, of course, would agree to go through the logs, perhaps he found the IP, and perhaps he could bring someone to justice.
In the real world, Finnish hosting CreaNova is highly doubtful that it will do anything other than #opy. Here even the state would find it difficult, and for an ordinary person without connections, there is simply no way out of the word at all.
We are against Internet control - they said - we are for anonymity! Tor, i2p and ... ... ... (here everyone substitutes what he considers necessary) - this is our everything!
...until this very anonymity began to turn to them #oops.
Pass the data to the host, the Ministry of Internal Affairs is not interested.
Give the shells to antivirus companies.
Draw conclusions from the hack.
PS
I didn’t delete anything because it was deleted from the hosting at the time of using the proxy and access to your proxy was configured from the ip of that hoster
80% - He used a proxy chain.
For him, this is fraught with at least the closure of the VPS, and the maximum with arrest and a fine.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question