Jump to content

Recommended Posts

Posted (edited)

Jakk/Stallone have been attacking many servers lately using linux bots to put servers down.

 

methods such as : udp dns amp, udp chargen, ntp amplification and syn flooding.

 

after dealing a little with it myself, here we go with his current bot list :

92.46.52.139
81.177.139.191
186.202.153.3
186.202.153.123
217.16.27.41
89.107.187.181
178.16.25.111
186.202.153.108
66.23.228.222
93.125.99.5
186.202.153.45
93.125.99.18
186.202.126.217
186.202.153.64
186.202.153.145
186.202.153.55
186.202.153.129
186.202.153.165
81.177.6.151
93.125.99.8
89.107.184.196
122.117.101.5
209.235.136.121
186.202.153.68
186.202.153.164
198.58.80.96
112.137.166.36
210.245.87.116
217.64.194.122
81.177.139.201
201.57.77.139
188.225.33.238
217.114.111.67
91.106.203.48
194.236.32.59
189.38.90.179
189.38.90.62
189.23.86.146
186.202.153.108
186.202.153.123
186.202.153.3
201.57.77.139
189.38.90.62
186.202.153.55
189.38.90.179
94.199.206.65
93.125.99.5
198.58.80.96
217.107.219.81
186.202.153.45
93.125.99.18
93.125.99.8
93.125.99.4
94.199.206.42
186.202.153.129
185.2.168.7
217.198.114.20
186.202.153.64
186.202.153.145
186.202.153.165
186.202.126.155
186.202.126.163
81.177.6.151
186.202.126.217
178.254.11.33
122.117.101.5
194.8.30.40
194.236.32.59
178.254.10.141
188.225.33.238
178.254.10.204
94.102.214.52
91.106.203.48
178.254.11.31
178.16.25.111
217.114.111.67
46.20.44.138
66.23.228.222
217.13.102.56
185.20.227.184
77.79.245.1
213.142.138.251
203.189.105.188
89.212.148.225
89.111.177.110
89.107.186.40
112.137.166.36
27.254.38.131
217.78.9.164
185.4.73.177
217.64.194.122
83.241.218.204
195.250.232.35
78.47.52.168
195.114.19.77
195.114.18.148
93.170.50.219
209.235.136.115
189.23.86.146
81.93.81.74
217.194.5.226
94.199.206.65
81.177.139.191
186.202.153.129
5.9.153.3
213.142.138.251
94.199.206.42

92.46.52.139
81.177.139.191
186.202.153.3
186.202.153.123
217.16.27.41
89.107.187.181
178.16.25.111
186.202.153.108
66.23.228.222
93.125.99.5
186.202.153.45
93.125.99.18
186.202.126.217
186.202.153.64
186.202.153.145
186.202.153.55
186.202.153.129
186.202.153.165
81.177.6.151
93.125.99.8
89.107.184.196
122.117.101.5
209.235.136.121
186.202.153.68
186.202.153.164
198.58.80.96
112.137.166.36
210.245.87.116
217.64.194.122
81.177.139.201
201.57.77.139
188.225.33.238
217.114.111.67
91.106.203.48
194.236.32.59
189.38.90.179
189.38.90.62
189.23.86.146
186.202.153.108
186.202.153.123
186.202.153.3
201.57.77.139
189.38.90.62
186.202.153.55
189.38.90.179
94.199.206.65
93.125.99.5
198.58.80.96
217.107.219.81
186.202.153.45
93.125.99.18
93.125.99.8
93.125.99.4
94.199.206.42
186.202.153.129
185.2.168.7
217.198.114.20
186.202.153.64
186.202.153.145
186.202.153.165
186.202.126.155
186.202.126.163
81.177.6.151
186.202.126.217
178.254.11.33
122.117.101.5
194.8.30.40
194.236.32.59
178.254.10.141
188.225.33.238
178.254.10.204
94.102.214.52
91.106.203.48
178.254.11.31
178.16.25.111
217.114.111.67
46.20.44.138
66.23.228.222
217.13.102.56
185.20.227.184
77.79.245.1
213.142.138.251
203.189.105.188
89.212.148.225
89.111.177.110
89.107.186.40
112.137.166.36
27.254.38.131
217.78.9.164
185.4.73.177
217.64.194.122
83.241.218.204
195.250.232.35
78.47.52.168
195.114.19.77
195.114.18.148
93.170.50.219
209.235.136.115
189.23.86.146
81.93.81.74
217.194.5.226
94.199.206.65
81.177.139.191
186.202.153.129
5.9.153.3
213.142.138.251
94.199.206.42


all these are compromised linux boxes used to perform attacks.

 

feel free to let these network administrators from each ip about this, so these bots can be blocked/removed and he will need to spend some more $ to buy more bots.

Edited by DDoSPolice
Posted (edited)

aready send copy of this bot list to Europol as they are being used via irc.

 

you can also fill a complaint here to help : https://www.europol.europa.eu/content/report-cybercrime-online

 

fill this petition too : https://secure.avaaz.org/en/petition/Europol_They_have_to_find_Jakk_DBSK_from_maxcheaterscom_in_order_to_arrest_him/?copy

Edited by DDoSPolice
Posted

aready send copy of this bot list to Europol as they are being used via irc.

 

you can also fill a complaint here to help : https://www.europol.europa.eu/content/report-cybercrime-online

done i filled the complaint from my pc my mothers pc and my cousins pc, soon ill go to my grand parents pc to fill in 1 more complaint from different hwid , ill also spam my skype / facebook contacts to fill in this

Posted (edited)

lololololol

 

Your lololol sounded like you know something about all this... "yeh it is funny i kno".

Edited by MXCDev
Posted

Your lololol sounded like you know something about all this... "yeh it is funny i kno".

 

jakk = DBSK = madarauchiha

Stalone = MattHaw = L2VADC

Posted (edited)

Pretty guy :D

That DDoSPolice :)))) Thesen random ips you put are pretty funny,brasil ip address,japan ip address really funny bro

Edited by jakk

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now



  • Posts

    • I'll give you my wallet if you want, haha
    • To make up for some of the waiting time we’re hosting a 3v3 Tournament on open Beta, and this time we’re raising the stakes with a $1,300 prize pool 💰   🏆 PRIZE POOL BREAKDOWN (Over 2000$ Worth of prices total)   🥇 1st Place — $700 🥈 2nd Place —$300 🥉 3rd Place — $200 🏅 4th Place — $100  5th -6th Place - $100 in Gold Coins each    All Participating Teams: $50 in Gold!   All Prices will be Paid out instantly after the tour, no waiting time and conditions. This is not simply a marketing move, we want to give back to the community.   📅 Date: Wednesday 06.05.2026 ⏰ Time: 20:00 Central European Timezone (Berlin) 📍Format: 3v3   ⚔️Why join? Cash Prices for top 4 and rewards for all participants Payments to winners sent out straight after the tournament - No waiting time or rules that you have to play live server to obtain the reward. Clean format, smooth matches, and solid prize pool and a chance to experience our brand new files   📝How to join: Form your 3-player team Group Leader Sign up here: ⁠📍・3v3-tour-registration (Include Name of Group, Name of Group Leader)   Be ready on match day!     A separate post with rules for the tournament and class setups will follow shortly.   Tag your teammates, lock in your roster, and get ready to compete. We'll be happy to see you on the OBT!   💬 Questions? Ask in ⁠🎫・ticket or send us a message   See you on L2Dark! 😏   Discord: https://discord.gg/FAJwnFpb8M
    • You should check if that condition is supported by your current sources. You can find this in  DocumentBase#parsePlayerCondition If it isnt there and you want to follow the same pattern of the other item conditions, create a custom condition to parse the classId (or multiple class ids) (there are examples to copy the code). Alternatively, you can create your own condition handler. Your condition should look like this: <cond msgId="1518"> <player classId="ADVENTURER,PALADIN" /> </cond> or <cond msgId="1518"> <player classId="93,5" /> </cond>  
    • it's Interlude client forgot to mention
    • idk if acis have this option, but you can put inside item smth like that atleast on H5         <cond msgId="1518">             <player class_id_restriction="93, 101, 108, 117" /> <!-- Dagger Masters -->         </cond>
  • Topics

×
×
  • Create New...

Important Information

This community uses essential cookies to function properly. Non-essential cookies and third-party services are used only with your consent. Read our Privacy Policy and We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue..