RSS种子
新闻
May
16
Windows独立主机勒索病毒更新安全补丁说明
发布人 qian d 发表于 16 May 2017 10:09 AM

尊敬的Windows独立主机用户:

 

对于近期出现的勒索蠕虫病毒,对于Windows独立主机用户,请到以下链接下载相关的教程文档来更新加固您的主机,以避免出现不必要的风险和损失。

http://desk.cn.bluehost.com/index.php?/Knowledgebase/Article/View/44/2/windows

 

如果您有任何疑问和问题,请及时和我们售后技术团队联系,谢谢您的理解和配合。


查看更多 »



Dec
31

我们正在遭受UDP flood 攻击,其中受到影响的IP: "103.224.22.16", "103.224.22.100", "103.224.22.104", "103.224.22.105"(4个共享IP),下面的IP目前正在缓解中。

We are facing UDP flood attack on one of the IP address "103.224.22.16", "103.224.22.100", "103.224.22.104", "103.224.22.105"( 4 Shared IPs) due to which the below mentioned IP address is under mitigation.
 

受影响的IP:

103.224.22.16(共享)

103.224.22.100(共享)

103.224.22.104(共享)

103.224.22.105(共享)

Affected IP address :

103.224.22.16(Shared IPs)

103.224.22.100(Shared IPs)

103.224.22.104(Shared IPs)

103.224.22.105(Shared IPs)

 

我们将持续跟进这个问题,如果您遇到无法登陆网站或者无法收发邮件,请您将您本地的tracert结果发送给我们,并将您使用的网络运营商以及IP地址等提供给我们,我们将尽快改善这个问题。

We will keep this thread updated with the latest developments. If you face issues while accessing websites or mails hosted on this subnet, please get touch with our Support help desk with the 'traceroute' result and your ISP details so that we can check it further.

由于该问题引起的无法使用的情况,我们深感抱歉

Apologies for the inconvenience caused due to this.


查看更多 »



Dec
29
【公告】域名网站无法访问解决方法
发布人 juanhao z 发表于 29 December 2015 01:17 PM
如果您在本地出现ping以及tracert返回无数据,请您尝试将您的本地的DNS设置成首选项为8.8.8.8,此选项为114.114.114.114
设置方法如下:
网络(右击)属性---选择本地连接---右键---属性---选择“Internet协议版本 4(TCP/Ipv4)”双击打开
选择“使用下面的DNS服务器地址” 在下面的首选DNS服务器地址框内填入以下
202.98.96.68、61.166.150.123、61.139.54.66、8.8.8.8、8.8.4.4 114.114.114.114 中任意一个,点击确定。当然这里的地址根据自己特定的服务器来确定。
如果您无法打开,请您尝试清空一下浏览器缓存或者更换一下浏览器
如果依然无法打开,请您提供一下如下信息:
1.Ping一下您的域名数据
2.tracert一下您的域名数据
3.您的网络供应商
4.您的网络使用地点
5.您的电脑使用的IP地址。
并将截图以工单的形式发送给我们,我们将会为您进一步判断故障问题

查看更多 »



Dec
23
UDP flood attack on one of the IP address
发布人 juanhao z 发表于 23 December 2015 02:49 PM

We are facing UDP flood attack on one of the IP address "209.99.16.57", due to which the below mentioned IP address is under mitigation.
 
Subnet : 209.99.16.0/24
Affected IP address : 209.99.16.57
Affected Services : All services hosted on the server "cp-42.webhostbox.net".
 
We have applied global filters on the IP addresses "209.99.16.57" in which we have noticed the attack. You should not face any issues on other IP addresses of this range "209.99.16.0/24".
 
We will keep this thread updated with the latest developments. If you face issues while accessing websites or mails hosted on this subnet, please get touch with our Support help desk with the 'traceroute' result and your ISP details so that we can check it further.
 
Apologies for the inconvenience caused due to this.


查看更多 »